메뉴 건너뛰기




Volumn 7, Issue 2, 2007, Pages 89-116

Privacy and e-commerce: A consumer-centric perspective

Author keywords

E commerce; Privacy; Privacy enhancing technology

Indexed keywords

CONSUMER PROTECTION; DATA PRIVACY;

EID: 34547110384     PISSN: 13895753     EISSN: 15729362     Source Type: Journal    
DOI: 10.1007/s10660-007-9002-9     Document Type: Review
Times cited : (46)

References (83)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam, N.R., & Worthmann, J.C. (1989). Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), 515-556
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 5
    • 0004152399 scopus 로고
    • Chicago: University of Chicago Press
    • Arendt, H. (1958). The Human Condition. Chicago: University of Chicago Press
    • (1958) The Human Condition
    • Arendt, H.1
  • 7
    • 0242624597 scopus 로고    scopus 로고
    • From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise
    • In New York: ACM
    • Ashley, P., Powers, C., & Schunter, M. (2002). From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise. In Proceedings of the 2002 workshop on new security paradigms (pp. 43-50). New York: ACM
    • (2002) Proceedings of the 2002 Workshop on New Security Paradigms , pp. 43-50
    • Ashley, P.1    Powers, C.2    Schunter, M.3
  • 8
    • 0019056889 scopus 로고
    • A security mechanism for statistical databases
    • Beck, L.L. (1980). A security mechanism for statistical databases. ACM Transactions on Database Systems, 5(3), 316-338
    • (1980) ACM Transactions on Database Systems , vol.5 , Issue.3 , pp. 316-338
    • Beck, L.L.1
  • 10
    • 0002964190 scopus 로고
    • Privacy as an aspect of human dignity
    • Bloustein, E.J. (1964). Privacy as an aspect of human dignity. New York University Law Review, 39, 962-1007
    • (1964) New York University Law Review , vol.39 , pp. 962-1007
    • Bloustein, E.J.1
  • 12
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • In B. Pfitzmann (Ed.) Heidelberg: Springer
    • Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann (Ed.), Advances in cryptology - EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045 (pp. 93-118). Heidelberg: Springer
    • (2001) Advances in Cryptology - EUROCRYPT 2001. Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030-1044
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 15
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • In Heidelberg: Springer
    • Chaum, D., & Evertse, J.-H. (1987). A secure and privacy-protecting protocol for transmitting personal information between organizations. In CRYPTO 86. Lecture Notes in Computer Science, vol. 263 (pp. 118-167). Heidelberg: Springer
    • (1987) CRYPTO 86. Lecture Notes in Computer Science , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 16
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84-90
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 17
  • 18
    • 0020205885 scopus 로고
    • Auditing and inference control in statistical databases
    • Chin, F.Y., & Ozsoyoglu, G. (1982). Auditing and inference control in statistical databases. IEEE Transactions Software Engineering, 8(6), 113-139
    • (1982) IEEE Transactions Software Engineering , vol.8 , Issue.6 , pp. 113-139
    • Chin, F.Y.1    Ozsoyoglu, G.2
  • 20
    • 84882756366 scopus 로고    scopus 로고
    • The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences
    • In New York: ACM
    • Cranor, L.F. (2002). The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences. In Proceedings of the 12th annual conference on computers, freedom and privacy, (pp. 1-8). New York: ACM
    • (2002) Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy , pp. 1-8
    • Cranor, L.F.1
  • 22
    • 85031802442 scopus 로고
    • Payment systems and credential mechanism with provable security against abuse by individuals
    • In Heidelberg: Springer
    • Damguård, I. (1990). Payment systems and credential mechanism with provable security against abuse by individuals. In CRYPTO 88. Lecture Notes in Computer Science, vol. 403 (pp. 328-335). Heidelberg: Springer
    • (1990) CRYPTO 88. Lecture Notes in Computer Science , vol.403 , pp. 328-335
    • Damguård, I.1
  • 27
    • 0038898605 scopus 로고    scopus 로고
    • Forrester Research (September)
    • Forrester Research (1999). Post-web retail (September). http://www.forrester.com/
    • (1999) Post-web Retail
  • 30
    • 0001601662 scopus 로고
    • Privacy
    • [a moral analysis]
    • Fried, C. (1968). Privacy [a moral analysis]. Yale Law Journal, 77, 475-493
    • (1968) Yale Law Journal , vol.77 , pp. 475-493
    • Fried, C.1
  • 32
    • 84925914934 scopus 로고
    • Intimacy and privacy
    • Gerstein, R.S. (1978). Intimacy and privacy. Ethics, 89, 76-81
    • (1978) Ethics , vol.89 , pp. 76-81
    • Gerstein, R.S.1
  • 34
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • In Berlin/Heidelberg: Springer
    • Goldschlag, D.M., Reed, M.G., & Syverson, P.F. (1996). Hiding routing information. In Information Hiding (pp. 137-150). Berlin/ Heidelberg: Springer
    • (1996) Information Hiding , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 46
    • 0042923706 scopus 로고    scopus 로고
    • Towards a theory of privacy in the information age
    • Moor, J.H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27(3), 27-32
    • (1997) ACM SIGCAS Computers and Society , vol.27 , Issue.3 , pp. 27-32
    • Moor, J.H.1
  • 47
    • 29844455709 scopus 로고    scopus 로고
    • Do privacy seals in e-commerce really work?
    • Moores, T.T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communications of the ACM, 46(12), 265-271
    • (2003) Communications of the ACM , vol.46 , Issue.12 , pp. 265-271
    • Moores, T.T.1    Dhillon, G.2
  • 48
    • 0345716708 scopus 로고
    • Social distance and the veil
    • In Cambridge: Cambridge University Press (chapter 2)
    • Murphy, R.F. (1984). Social distance and the veil. In Philosophical dimensions of privacy: An anthology (pp. 34-54). Cambridge: Cambridge University Press (chapter f2)
    • (1984) Philosophical Dimensions of Privacy: An Anthology , pp. 34-54
    • Murphy, R.F.1
  • 51
    • 85131783489 scopus 로고    scopus 로고
    • Technologies for trust in electronic commerce
    • Patton, M.A., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1-2), 9-21
    • (2004) Electronic Commerce Research , vol.4 , Issue.1-2 , pp. 9-21
    • Patton, M.A.1    Jøsang, A.2
  • 52
    • 0039084976 scopus 로고
    • An economic theory of privacy
    • In Cambridge: Cambridge University Press (chapter 15)
    • Posner, R.A. (1984). An economic theory of privacy. In Philosophical dimensions of privacy: An anthology (pp. 333-345). Cambridge: Cambridge University Press (chapter 15)
    • (1984) Philosophical Dimensions of Privacy: An Anthology , pp. 333-345
    • Posner, R.A.1
  • 53
    • 34247150045 scopus 로고    scopus 로고
    • Privacy International
    • Privacy International. National id cards. http://www.privacy.org/pi/ activities/idcard/
    • National Id Cards
  • 54
    • 0000839286 scopus 로고
    • Privacy
    • [a legal analysis]
    • Prosser, W.L. (1960). Privacy [a legal analysis]. Harvard Law Review, 48, 338-423
    • (1960) Harvard Law Review , vol.48 , pp. 338-423
    • Prosser, W.L.1
  • 55
    • 84876010344 scopus 로고
    • Why privacy is important
    • Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4(4), 323-333
    • (1975) Philosophy and Public Affairs , vol.4 , Issue.4 , pp. 323-333
    • Rachels, J.1
  • 56
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Reagle, J., & Cranor, L.F. (1999). The platform for privacy preferences. Communications of the ACM, 42(2), 48-55
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 57
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • Reiss, S.P. (1984). Practical data-swapping: The first steps. ACM Transactions on Database Systems, 9(1), 20-37
    • (1984) ACM Transactions on Database Systems , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.P.1
  • 59
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter, M.K., & Rubin, A.D. (1999). Anonymous web transactions with crowds. Communications of the ACM, 42(2), 32-48
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 61
    • 0010155502 scopus 로고
    • Classical greek conceptions of public and private
    • In New York: St. Martins (chapter 15)
    • Saxonhouse, A.W. (1983). Classical greek conceptions of public and private. In Public and private in social life (pp. 363-384). New York: St. Martins (chapter 15)
    • (1983) Public and Private in Social Life , pp. 363-384
    • Saxonhouse, A.W.1
  • 63
    • 0016409563 scopus 로고
    • Identification and retrieval of personal records from a statistical data bank
    • Schlörer, J. (1975). Identification and retrieval of personal records from a statistical data bank. Methods of Information in Medicine, 14(1), 7-13
    • (1975) Methods of Information in Medicine , vol.14 , Issue.1 , pp. 7-13
    • Schlörer, J.1
  • 64
    • 84976738484 scopus 로고
    • Confidentiality and security in statistical data banks
    • In Munich: Verlag Dokumentation
    • Schlörer, J. (1977). Confidentiality and security in statistical data banks. In Proceedings of workshop on data documentation (pp. 101-123). Munich: Verlag Dokumentation
    • (1977) Proceedings of Workshop on Data Documentation , pp. 101-123
    • Schlörer, J.1
  • 65
    • 0019546487 scopus 로고
    • Security of statistical databases: Multidimensional transformation
    • Schlörer, J. (1981). Security of statistical databases: multidimensional transformation. ACM Transactions on Database Systems, 6(1), 95-112
    • (1981) ACM Transactions on Database Systems , vol.6 , Issue.1 , pp. 95-112
    • Schlörer, J.1
  • 66
    • 0003297655 scopus 로고
    • Privacy: Philosophical dimensions of the literature
    • In Cambridge: Cambridge University Press (chapter 1)
    • Schoeman, F. (1984). Privacy: Philosophical dimensions of the literature. In Philosophical dimensions of privacy: An anthology (pp. 1-33). Cambridge: Cambridge University Press (chapter 1)
    • (1984) Philosophical Dimensions of Privacy: An Anthology , pp. 1-33
    • Schoeman, F.1
  • 68
    • 0020313372 scopus 로고
    • Statistical databases: Characteristics, problems, and some solutions
    • In September 8-10, Mexico city, Mexico San Francisco, CA: Morgan Kaufmann
    • Shoshani, A. (1982). Statistical databases: Characteristics, problems, and some solutions. In Proceedings of the eighth international conference on very large data bases. September 8-10, Mexico city, Mexico (pp. 208-222). San Francisco, CA: Morgan Kaufmann
    • (1982) Proceedings of the Eighth International Conference on Very Large Data Bases , pp. 208-222
    • Shoshani, A.1
  • 72
    • 0347978457 scopus 로고
    • The underpinnings of privacy protection
    • Tuerkheimer, F.M. (1993). The underpinnings of privacy protection. Communications of the ACM, 36(8), 69-73
    • (1993) Communications of the ACM , vol.36 , Issue.8 , pp. 69-73
    • Tuerkheimer, F.M.1
  • 74
    • 0003034904 scopus 로고    scopus 로고
    • Personalization and privacy
    • Volokh, E. (2000). Personalization and privacy. Communications of the ACM, 43(8), 84-88
    • (2000) Communications of the ACM , vol.43 , Issue.8 , pp. 84-88
    • Volokh, E.1
  • 75
    • 0000320829 scopus 로고
    • The right to privacy
    • [the implicit made explicit]
    • Warren, S.D., & Brandeis, L.D. (1890). The right to privacy [the implicit made explicit]. Harvard Law Review, 4(5), 193-220
    • (1890) Harvard Law Review , vol.4 , Issue.5 , pp. 193-220
    • Warren, S.D.1    Brandeis, L.D.2
  • 76
    • 5544232055 scopus 로고
    • Privacy: Some arguments and assumptions
    • In Cambridge: Cambridge University Press (chapter 14)
    • Wasserstrom, R.A. (1984). Privacy: Some arguments and assumptions. In Philosophical dimensions of privacy: An anthology (pp. 317-332). Cambridge: Cambridge University Press (chapter 14)
    • (1984) Philosophical Dimensions of Privacy: An Anthology , pp. 317-332
    • Wasserstrom, R.A.1
  • 77
    • 0001775434 scopus 로고    scopus 로고
    • The theory and politics of the public/private distinction
    • In Chicago: University of Chicago Press (chapter 1)
    • Weintraub, J. (1997). The theory and politics of the public/private distinction. In Public and private in thouht and practise (pp. 1-42). Chicago: University of Chicago Press (chapter 1)
    • (1997) Public and Private in Thought and Practise , pp. 1-42
    • Weintraub, J.1
  • 80
    • 0037672590 scopus 로고
    • The origins of modern claims to privacy
    • In Cambridge, UK: Cambridge University Press (chapter 3)
    • Westin, A.F. (1984). The origins of modern claims to privacy. In Philosophical dimensions of privacy: An anthology (pp. 56-74). Cambridge, UK: Cambridge University Press (chapter 3)
    • (1984) Philosophical Dimensions of Privacy: An Anthology , pp. 56-74
    • Westin, A.F.1
  • 83
    • 31144473961 scopus 로고
    • Millar vs. Taylor
    • Yates, J. (1769). Millar vs. Taylor. In 4 Burr. (pp. 2303-2379)
    • (1769) 4 Burr , pp. 2303-2379
    • Yates, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.