메뉴 건너뛰기




Volumn 3, Issue 4, 2005, Pages 61-74

Online privacy policies: An empirical perspective on self-regulatory practices

Author keywords

E commerce; Fair information practices; Privacy; Seals programs; Self regulatory practices

Indexed keywords

DATA PRIVACY; ELECTRONIC COMMERCE; INTERNET; LAWS AND LEGISLATION; PUBLIC POLICY; USER INTERFACES;

EID: 24944504048     PISSN: 15392937     EISSN: 15392929     Source Type: Journal    
DOI: 10.4018/jeco.2005100104     Document Type: Review
Times cited : (16)

References (32)
  • 1
    • 85039374740 scopus 로고    scopus 로고
    • BBBOnline. Retrieved from
    • BBBOnline. (2003). Retrieved from http://www.bbbonline.org/
    • (2003)
  • 2
    • 0002587094 scopus 로고    scopus 로고
    • TRUSTe: An online privacy seal program
    • Benassi, P. (1999). TRUSTe: An online privacy seal program. Communications of the ACM, 42(2), 56-59.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 56-59
    • Benassi, P.1
  • 4
    • 85008065261 scopus 로고    scopus 로고
    • Cyberprivacy in the new millenium
    • Berghel, H. (2001). Cyberprivacy in the new millenium. IEEE Computer, 34(1), 132-134.
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 132-134
    • Berghel, H.1
  • 5
  • 7
    • 0039456088 scopus 로고    scopus 로고
    • Internet privacy concerns confirm the case for intervention
    • Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 60-67
    • Clarke, R.1
  • 13
    • 24944592105 scopus 로고    scopus 로고
    • Privacy versus convenience
    • Flammia, G. (2000). Privacy versus convenience. IEEE Intelligent Systems, 75(3), 12-13.
    • (2000) IEEE Intelligent Systems , vol.75 , Issue.3 , pp. 12-13
    • Flammia, G.1
  • 16
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., Gopal, R., & Goes, P. (2002). Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science, 48(6), 749-764.
    • (2002) Management Science , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 18
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private Internet connections
    • Goldschlag, D. M. Reed, and Syverson P. (1999). Onion routing for anonymous and private Internet connections. Communications of the ACM, 42(2), 39-41.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Reed, G.D.M.1    Syverson, P.2
  • 19
    • 24944439539 scopus 로고    scopus 로고
    • Securing privacy
    • Greisiger, M. (2001). Securing privacy. Risk Management, 48(10), 14-19.
    • (2001) Risk Management , vol.48 , Issue.10 , pp. 14-19
    • Greisiger, M.1
  • 20
    • 0035449307 scopus 로고    scopus 로고
    • Is technology meeting the privacy challenge
    • Lawton, G. (2001). Is technology meeting the privacy challenge. IEEE Computer, 34(9), 16-18.
    • (2001) IEEE Computer , vol.34 , Issue.9 , pp. 16-18
    • Lawton, G.1
  • 21
    • 24944482780 scopus 로고    scopus 로고
    • Keeping score
    • McCormick, J. (2000). Keeping score. Interactive Week, 7(48), 56-78.
    • (2000) Interactive Week , vol.7 , Issue.48 , pp. 56-78
    • McCormick, J.1
  • 23
    • 0036814612 scopus 로고    scopus 로고
    • Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 U.S. Web surveys
    • Milne G.R. & Culnan, M.J. (2002). Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 U.S. Web surveys. The Information Society, 18(5), 345-359.
    • (2002) The Information Society , vol.18 , Issue.5 , pp. 345-359
    • Milne, G.R.1    Culnan, M.J.2
  • 24
    • 85039383179 scopus 로고    scopus 로고
    • Retrieved from
    • PricewaterhouseCoopers. (2003). Privacy practice. Retrieved from http://www.pwcglobal.com
    • (2003) Privacy Practice
  • 26
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Reagle, J. & Cranor, L.F. (1999). The platform for privacy preferences. Communications of the ACM, 42(2), 48-55.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 27
    • 0345792363 scopus 로고    scopus 로고
    • Resolving conflicting international data privacy rules in cyberspace
    • Reidenberg, J. (2000). Resolving conflicting international data privacy rules in cyberspace. Stanford Law Review, 52, 1315-1371.
    • (2000) Stanford Law Review , vol.52 , pp. 1315-1371
    • Reidenberg, J.1
  • 28
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web transactions with crowds
    • Reiter, M. & Rubin, A.D. (1999). Anonymous Web transactions with crowds. Communications of the ACM, 42(2), 32-38.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, M.1    Rubin, A.D.2
  • 29
    • 85039367090 scopus 로고    scopus 로고
    • UN: Worldwide use of Internet, e-commerce still growing
    • November 21
    • Rohde, L. (2002, November 21). UN: Worldwide use of Internet, e-commerce still growing. IDG News Service.
    • (2002) IDG News Service
    • Rohde, L.1
  • 30
    • 24944590081 scopus 로고    scopus 로고
    • Lord of the things
    • March.
    • Thomas, O. (2002, March). Lord of the things. Business 2.0.
    • (2002) Business 2.0
    • Thomas, O.1
  • 31
    • 85039374338 scopus 로고    scopus 로고
    • Retrieved from
    • TRUSTe. (2003). Retrieved from http://www.truste.org/
    • (2003)
  • 32
    • 85039372715 scopus 로고    scopus 로고
    • Retrieved
    • U.S. Department of Commerce. (2003). Safe harbor privacy framework. Retrieved from http://www.export.gov/safeharbor/
    • (2003) Safe Harbor Privacy Framework.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.