메뉴 건너뛰기




Volumn 35, Issue 4, 2011, Pages 1017-1041

Privacy in the digital age: A review of information privacy research in information systems

Author keywords

Information privacy; Information privacy concerns; Information privacy framework; Level of analysis; Privacy

Indexed keywords

DATA PRIVACY; INFORMATION SYSTEMS;

EID: 81355150547     PISSN: 02767783     EISSN: 21629730     Source Type: Journal    
DOI: 10.2307/41409971     Document Type: Review
Times cited : (1055)

References (472)
  • 2
    • 81355155705 scopus 로고    scopus 로고
    • A two-phase authentication protocol using the cell phone as a token
    • Adams, C., and Dimitriou, A. 2008. "A Two-Phase Authentication Protocol Using the Cell Phone as a Token," Journal of Information Privacy & Security (4:2), pp. 23-39.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.2 , pp. 23-39
    • Adams, C.1    Dimitriou, A.2
  • 3
    • 81355137231 scopus 로고    scopus 로고
    • Exoinformation space audits: An information richness view of privacy and security obligations
    • Adams, C., and Katos, V. 2007. "Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations," Journal of Information Privacy & Security (3:3), pp. 29-44.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.3 , pp. 29-44
    • Adams, C.1    Katos, V.2
  • 5
    • 81355166784 scopus 로고
    • Controlling the threat to personal privacy: Corporate policies must be created
    • Agranoff, M. H. 1991. "Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created," Information Systems Management (8:3), pp. 18-52.
    • (1991) Information Systems Management , vol.8 , Issue.3 , pp. 18-52
    • Agranoff, M.H.1
  • 10
    • 81355126390 scopus 로고    scopus 로고
    • Examining the impact of e-privacy risk concerns on citizens' intentions to use e-government services: An oman perspective
    • Al Abri, D., McGill, T., and Dixon, M. 2009. "Examining the Impact of e-Privacy Risk Concerns on Citizens' Intentions to Use e-Government Services: An Oman Perspective," Journal of Information Privacy & Security (5:2), pp. 3-26.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.2 , pp. 3-26
    • Al Abri, D.1    McGill, T.2    Dixon, M.3
  • 11
    • 31344436619 scopus 로고    scopus 로고
    • Information privacy in organizations: Empowering creative and extrarole performance
    • DOI 10.1037/0021-9010.91.1.221
    • Alge, B. J., Ballinger, G. A., Tangirala, S., and Oakley, J. L. 2006. "Information Privacy in Organizations: Empowering Creative and Extrarole Performance," Journal of Applied Psychology (91:1), pp. 221-232. (Pubitemid 43145702)
    • (2006) Journal of Applied Psychology , vol.91 , Issue.1 , pp. 221-232
    • Alge, B.J.1    Ballinger, G.A.2    Tangirala, S.3    Oakley, J.L.4
  • 16
    • 66449136652 scopus 로고    scopus 로고
    • Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion
    • Angst, C., and Agarwal, R. 2009. "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion," MIS Quarterly (33:2), pp. 339-370.
    • (2009) MIS Quarterly , vol.33 , Issue.2 , pp. 339-370
    • Angst, C.1    Agarwal, R.2
  • 51
    • 81355137225 scopus 로고    scopus 로고
    • Stimulus provisions will improve hipaa
    • Anonymous
    • Anonymous. 2009e. "Stimulus Provisions Will Improve HIPAA," Information Management Journal (43:4), p. 6.
    • (2009) Information Management Journal , vol.43 , Issue.4 , pp. 6
  • 56
    • 81355137210 scopus 로고    scopus 로고
    • Texas law overrides hipaa, court says
    • Anonymous
    • Anonymous. 2009j. "Texas Law Overrides HIPAA, Court Says," Information Management Journal (43:5), p. 14.
    • (2009) Information Management Journal , vol.43 , Issue.5 , pp. 14
  • 59
    • 0021448166 scopus 로고
    • Professional responsibility for information privacy
    • Auerbach, I. L. 1985. "Professional Responsibility for Information Privacy," Computers & Security (4:2), pp. 103-107.
    • (1985) Computers & Security , vol.4 , Issue.2 , pp. 103-107
    • Auerbach, I.L.1
  • 60
    • 0020722017 scopus 로고
    • Privacy and canadian telecommunications regulation
    • Auerbach, L. 1983. "Privacy and Canadian Telecommunications Regulation," Telecommunications Policy (7:1), pp. 35-42.
    • (1983) Telecommunications Policy , vol.7 , Issue.1 , pp. 35-42
    • Auerbach, L.1
  • 61
    • 33750687395 scopus 로고    scopus 로고
    • The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization
    • Awad, N. F., and Krishnan, M. S. 2006. "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization," MIS Quarterly (30:1), pp. 13-28. (Pubitemid 44971423)
    • (2006) MIS Quarterly: Management Information Systems , vol.30 , Issue.1 , pp. 13-28
    • Awad, N.F.1    Krishnan, M.S.2
  • 62
    • 78649292048 scopus 로고    scopus 로고
    • Technologies of compliance: Risk and regulation in a digital age
    • Bamberger, K. 2010. "Technologies of Compliance: Risk and Regulation in a Digital Age," Texas Law Review (88:4), pp. 669-739.
    • (2010) Texas Law Review , vol.88 , Issue.4 , pp. 669-739
    • Bamberger, K.1
  • 63
    • 84870963426 scopus 로고    scopus 로고
    • The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation
    • Paris, France, December
    • Bansal, G., Zahedi, F., and Gefen, D. 2008. "The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
    • (2008) Proceedings of the 29th International Conference on Information Systems , pp. 14-17
    • Bansal, G.1    Zahedi, F.2    Gefen, D.3
  • 64
    • 81355155698 scopus 로고    scopus 로고
    • Public information technology and e-governance: Managing the virtual state
    • Basu, C. 2006a. "Public Information Technology and E-Governance: Managing the Virtual State," Journal of Information Privacy & Security (2:3), pp. 65-67.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.3 , pp. 65-67
    • Basu, C.1
  • 66
    • 81355155271 scopus 로고    scopus 로고
    • Expert opinion: Interview with: Peter zaballos, vice president frazier technology ventures seattle, wa
    • Basu, C. 2007b. "Expert Opinion: Interview With: Peter Zaballos, Vice President Frazier Technology Ventures Seattle, WA," Journal of Information Privacy & Security (3:2), pp. 59-60.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.2 , pp. 59-60
    • Basu, C.1
  • 67
    • 81355137221 scopus 로고    scopus 로고
    • Geekonomics-The real cost of insecure software
    • Basu, C. 2007c. "Geekonomics-The Real Cost of Insecure Software," Journal of Information Privacy & Security (3:3), p. 71.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.3 , pp. 71
    • Basu, C.1
  • 69
    • 81355155694 scopus 로고    scopus 로고
    • Interview with: Damani short, cio united states olympic committee
    • Basu, C. 2007e. "Interview With: Damani Short, CIO United States Olympic Committee," Journal of Information Privacy & Security (3:4), pp. 53-54.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.4 , pp. 53-54
    • Basu, C.1
  • 70
    • 81355166766 scopus 로고    scopus 로고
    • Interview with: Hemadri gurramkonda: Director, centrica informatics
    • Basu, C. 2007f. "Interview With: Hemadri Gurramkonda: Director, Centrica Informatics," Journal of Information Privacy & Security (3:1), pp. 63-64.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.1 , pp. 63-64
    • Basu, C.1
  • 72
    • 81355137222 scopus 로고    scopus 로고
    • Born digital-understanding the first generation of digital natives
    • Basu, C. 2008a. "Born Digital-Understanding the First Generation of Digital Natives," Journal of Information Privacy & Security (4:3), pp. 66-67.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.3 , pp. 66-67
    • Basu, C.1
  • 76
    • 81355166326 scopus 로고    scopus 로고
    • Interview with: Ravi pakala manager, fis (fidelity national information systems)
    • Basu, C. 2009c. "Interview With: Ravi Pakala Manager, Fis (Fidelity National Information Systems)," Journal of Information Privacy & Security (5:2), pp. 65-66.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.2 , pp. 65-66
    • Basu, C.1
  • 77
    • 81355166767 scopus 로고    scopus 로고
    • Quest for universal identification-A commentary
    • Basu, C. 2009d. "Quest for Universal Identification-A Commentary," Journal of Information Privacy & Security (5:3), pp. 44-54.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.3 , pp. 44-54
    • Basu, C.1
  • 79
    • 81355137208 scopus 로고    scopus 로고
    • Expert opinion: An interview with sindey schueler-platz state administrator, kansas
    • Bureau of Investigation
    • Basu, S. C. 2005a. "Expert Opinion: An Interview with Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation," Journal of Information Privacy & Security (1:1), pp. 40-42.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 40-42
    • Basu, S.C.1
  • 80
    • 81355137219 scopus 로고    scopus 로고
    • Expert opinion: Marilyn wood, security officer jim amundson, server administration & network solutions department of agriculture, trade and consumer protection (datcp-wisconsin)
    • Basu, S. C. 2005b. "Expert Opinion: Marilyn Wood, Security Officer Jim Amundson, Server Administration & Network Solutions Department of Agriculture, Trade and Consumer Protection (Datcp-Wisconsin)," Journal of Information Privacy & Security (1:2), pp. 67-68.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.2 , pp. 67-68
    • Basu, S.C.1
  • 81
    • 81355137219 scopus 로고    scopus 로고
    • Expert opinion: Marilyn wood, security officer jim amundson, server administration & network solutions department of agriculture, trade and consumer protection (datcp wisconsin)
    • Basu, S. C. 2005c. "Expert Opinion: Marilyn Wood, Security Officer Jim Amundson, Server Administration & Network Solutions Department of Agriculture, Trade and Consumer Protection (Datcp Wisconsin)," Journal of Information Privacy & Security (1:1), pp. 67-68.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 67-68
    • Basu, S.C.1
  • 82
    • 81355126384 scopus 로고    scopus 로고
    • On issues of computer crimes, online security and legal resources
    • Basu, S. C. 2005d. "On Issues of Computer Crimes, Online Security and Legal Resources," Journal of Information Privacy & Security (1:4), p. 1.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.4 , pp. 1
    • Basu, S.C.1
  • 83
    • 81355137216 scopus 로고    scopus 로고
    • On issues of convenience, privacy and security
    • Basu, S. C. 2005e. "On Issues of Convenience, Privacy and Security," Journal of Information Privacy & Security (1:2), p. 1.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.2 , pp. 1
    • Basu, S.C.1
  • 84
    • 81355166765 scopus 로고    scopus 로고
    • An interview with sindey schueler-platz state administrator, kansas
    • Bureau of Investigation
    • Basu, S. C. 2006b. "An Interview with Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation," Journal of Information Privacy & Security (2:3), pp. 62-65.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.3 , pp. 62-65
    • Basu, S.C.1
  • 86
    • 84867973432 scopus 로고    scopus 로고
    • Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
    • Bélanger, F., Hiller, J., and Smith, W. J. 2002. "Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes," Journal of Strategic Information Systems (11:3/4), pp. 245-270.
    • (2002) Journal of Strategic Information Systems , vol.11 , Issue.3-4 , pp. 245-270
    • Bélanger, F.1    Hiller, J.2    Smith, W.J.3
  • 87
    • 31644433090 scopus 로고    scopus 로고
    • A framework for e-government: Privacy implications
    • DOI 10.1108/14637150610643751, E-government
    • Bélanger, F., and Hiller, J. S. 2006. "A Framework for E-Government: Privacy Implications," Business Process Management Journal (12:1), pp. 48-60. (Pubitemid 43170470)
    • (2006) Business Process Management Journal , vol.12 , Issue.SPEC. ISS.1 , pp. 48-60
    • Belanger, F.1    Hiller, J.S.2
  • 88
    • 42349100769 scopus 로고    scopus 로고
    • The memory gap in surveillance law
    • Bellia, P. 2008. "The Memory Gap in Surveillance Law," The University of Chicago Law Review (75:1), pp. 137-179.
    • (2008) The University of Chicago Law Review , vol.75 , Issue.1 , pp. 137-179
    • Bellia, P.1
  • 89
    • 7544251123 scopus 로고    scopus 로고
    • International differences in information privacy concerns: A global survey of consumers
    • DOI 10.1080/01972240490507956
    • Bellman, S., Johnson, E., Kobrin, S., and Lohse, G. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers," The Information Society (20:5), pp. 313-324. (Pubitemid 39454127)
    • (2004) Information Society , vol.20 , Issue.5 , pp. 313-324
    • Bellman, S.1    Johnson, E.J.2    Kobrin, S.J.3    Lohse, G.L.4
  • 90
    • 0002587094 scopus 로고    scopus 로고
    • TRUSTe: An online privacy seal program
    • Benassi, P. 1999. "TRUSTe: An Online Privacy Seal Program," Association for Computing Machinery. Communications of the ACM (42:2), pp. 56-59. (Pubitemid 129566439)
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 56-59
    • Benassi, P.1
  • 91
    • 81355137215 scopus 로고
    • Privacy, computers, and personal information: Toward equality and equity in an information age
    • Benjamin, L. M. 1991. "Privacy, Computers, and Personal Information: Toward Equality and Equity in an Information Age," Communications and the Law (13:2), pp. 3-16.
    • (1991) Communications and the Law , vol.13 , Issue.2 , pp. 3-16
    • Benjamin, L.M.1
  • 92
    • 18844391574 scopus 로고    scopus 로고
    • Consumer financial privacy legislation and regulation - 2004 developments
    • Benoit, M. A., and Lovoy, E. A. 2005. "Consumer Financial Privacy Legislation and Regulation-2004 Developments," The Business Lawyer (60:2), pp. 713-722. (Pubitemid 40688159)
    • (2005) Business Lawyer , vol.60 , Issue.2 , pp. 713-722
    • Benoit, M.A.1    Lovoy, E.A.2
  • 94
    • 81355166760 scopus 로고    scopus 로고
    • A proposed integrated framework for coordinating computer security incident response team
    • Bhaskar, R. 2005. "A Proposed Integrated Framework for Coordinating Computer Security Incident Response Team," Journal of Information Privacy & Security (1:3), pp. 3-17.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.3 , pp. 3-17
    • Bhaskar, R.1
  • 95
    • 81355126383 scopus 로고    scopus 로고
    • Knowledge sharing in law enforcement: A case study
    • Bhaskar, R., and Zhang, Y. 2007. "Knowledge Sharing in Law Enforcement: A Case Study," Journal of Information Privacy & Security (3:3), pp. 45-68.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.3 , pp. 45-68
    • Bhaskar, R.1    Zhang, Y.2
  • 96
    • 84938704593 scopus 로고    scopus 로고
    • Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques
    • IEEE Computer Society
    • Blazic, A. J., Dolinar, K., and Porekar, J. 2007. "Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques," in Proceedings of the First International Conference on the Digital Society, IEEE Computer Society, pp. 30-35.
    • (2007) Proceedings of the First International Conference on the Digital Society , pp. 30-35
    • Blazic, A.J.1    Dolinar, K.2    Porekar, J.3
  • 97
    • 38049068075 scopus 로고    scopus 로고
    • Secure web service-based resource sharing in erp networks
    • Brehm, N., and Gómez, J. M. 2005. "Secure Web Service-Based Resource Sharing in ERP Networks," Journal of Information Privacy & Security (1:2), pp. 29-48.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.2 , pp. 29-48
    • Brehm, N.1    Gómez, J.M.2
  • 98
    • 33947186222 scopus 로고    scopus 로고
    • Investigating the relationship between internet privacy concerns and online purchase behavior
    • Brown, M., and Muchira, R. 2004. "Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior," Journal of Electronic Commerce Research (5:1), pp. 62-70.
    • (2004) Journal of Electronic Commerce Research , vol.5 , Issue.1 , pp. 62-70
    • Brown, M.1    Muchira, R.2
  • 99
    • 81355126378 scopus 로고    scopus 로고
    • A theoretical model to deliver value in electronic commerce
    • Brown, S. A. 2007. "A Theoretical Model to Deliver Value in Electronic Commerce," Journal of Information Privacy & Security (3:1), pp. 3-29.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.1 , pp. 3-29
    • Brown, S.A.1
  • 100
    • 0012394212 scopus 로고    scopus 로고
    • Global privacy concerns and regulation-is the united states a world apart?
    • Cain, R. M. 2002. "Global Privacy Concerns and Regulation-Is the United States a World Apart?," International Review of Law, Computers & Technology (16:1), pp. 23-34.
    • (2002) International Review of Law, Computers & Technology , vol.16 , Issue.1 , pp. 23-34
    • Cain, R.M.1
  • 101
    • 0040249189 scopus 로고    scopus 로고
    • Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy
    • Campbell, A. J. 1997. "Relationship Marketing in Consumer Markets: A Comparison of Managerial and Consumer Attitudes About Information Privacy," Journal of Direct Marketing (11:3), pp. 44-57.
    • (1997) Journal of Direct Marketing , vol.11 , Issue.3 , pp. 44-57
    • Campbell, A.J.1
  • 103
    • 79955622073 scopus 로고    scopus 로고
    • User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy
    • Cao, J., and Everard, A. 2008. "User Attitude Towards Instant Messaging: The Effect of Espoused National Cultural Values on Awareness and Privacy," Journal of Global Information Technology Management (11:2), pp. 30-57.
    • (2008) Journal of Global Information Technology Management , vol.11 , Issue.2 , pp. 30-57
    • Cao, J.1    Everard, A.2
  • 104
    • 81355137212 scopus 로고    scopus 로고
    • The big switch: Rewiring the world, from edison to google
    • Carr, N. 2009. "The Big Switch: Rewiring the World, from Edison to Google," Journal of Information Privacy & Security (5:2), pp. 67-68.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.2 , pp. 67-68
    • Carr, N.1
  • 106
    • 81355166761 scopus 로고    scopus 로고
    • How do the privacy laws and usa patriot act apply to the life settlement industry?
    • Casey, B. T. 2007. "How Do the Privacy Laws and USA Patriot Act Apply to the Life Settlement Industry?," Journal of Structured Finance (13:2), pp. 76-82.
    • (2007) Journal of Structured Finance , vol.13 , Issue.2 , pp. 76-82
    • Casey, B.T.1
  • 107
  • 109
    • 81355155686 scopus 로고    scopus 로고
    • Privacy preserving combinatorial reverse auction protocol for a market-oriented grid based on secure group communication
    • Chakraborty, S., and Sharma, S. K. 2005. "Privacy Preserving Combinatorial Reverse Auction Protocol for a Market-Oriented Grid Based on Secure Group Communication," Journal of Information Privacy & Security (1:3), pp. 42-56.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.3 , pp. 42-56
    • Chakraborty, S.1    Sharma, S.K.2
  • 110
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • Chan, M., Woon, I., and Kankanhalli, A. 2005a. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy & Security (1:3), pp. 18-41.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 119
    • 81355125983 scopus 로고    scopus 로고
    • Privacy governance, law, and growth perspective in security
    • Changchit, C. 2009b. "Privacy Governance, Law, and Growth Perspective in Security," Journal of Information Privacy & Security (5:4), pp. i-ii.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.4
    • Changchit, C.1
  • 121
    • 81355125952 scopus 로고    scopus 로고
    • Online privacy, information security and security investment
    • Changchit, C. 2010. "Online Privacy, Information Security and Security Investment," Journal of Information Privacy & Security (6:1), pp. i-ii.
    • (2010) Journal of Information Privacy & Security , vol.6 , Issue.1
    • Changchit, C.1
  • 122
    • 33745866914 scopus 로고    scopus 로고
    • A model of advertiser - Portal contracts: Personalization strategies under privacy concerns
    • DOI 10.1007/s10799-006-5726-9
    • Chellappa, R. K., and Shivendu, S. 2006. "A Model of Advertiser-Portal Contracts: Personalization Strategies Under Privacy Concerns," Information Technology and Management (7:1), pp. 7-19. (Pubitemid 44026995)
    • (2006) Information Technology and Management , vol.7 , Issue.1 , pp. 7-19
    • Chellappa, R.K.1    Shivendu, S.2
  • 123
    • 81355137213 scopus 로고    scopus 로고
    • A model of portal competition in the presence of privacy concerns: Strategic and welfare implications
    • R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
    • Chellappa, R., and Sin, R. 2004. "A Model of Portal Competition in the Presence of Privacy Concerns: Strategic and Welfare Implications," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 15-27.
    • (2004) Proceedings of the 25th International Conference on Information Systems , pp. 15-27
    • Chellappa, R.1    Sin, R.2
  • 124
    • 14744270170 scopus 로고    scopus 로고
    • Personalization versus privacy: An empirical examination of the online consumer's dilemma
    • DOI 10.1007/s10799-005-5879-y
    • Chellappa, R. K., and Sin, R. G. 2005. "Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management (6), pp. 181-202. (Pubitemid 40735257)
    • (2005) Information Technology and Management , vol.6 , Issue.2-3 , pp. 181-202
    • Chellappa, R.K.1    Sin, R.G.2
  • 125
    • 85069300282 scopus 로고    scopus 로고
    • Am i Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context
    • Phoenix, AZ, December
    • Chen, J., Ping, W., Xu, Y., and Tan, B. C. Y. 2009. "Am I Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
    • (2009) Proceedings of the 30th International Conference on Information Systems , pp. 15-18
    • Chen, J.1    Ping, W.2    Xu, Y.3    Tan, B.C.Y.4
  • 126
    • 4043132397 scopus 로고    scopus 로고
    • Protecting personal information online: A survey of user privacy concerns and control techniques
    • Chen, K., and Rea Jr., A. I. 2004. "Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques," The Journal of Computer Information Systems (44:4), pp. 85-92. (Pubitemid 39068895)
    • (2004) Journal of Computer Information Systems , vol.44 , Issue.4 , pp. 85-92
    • Chen, K.1    Rea Jr., A.I.2
  • 127
    • 81355136852 scopus 로고    scopus 로고
    • An analysis of security threats of electronic election systems
    • Cheng, C. H., and Wong, K. F. 2006. "An Analysis of Security Threats of Electronic Election Systems," Journal of Information Privacy & Security (2:3), pp. 4-20.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.3 , pp. 4-20
    • Cheng, C.H.1    Wong, K.F.2
  • 128
    • 81355125990 scopus 로고    scopus 로고
    • Book review: The art of deception: Controlling the human element of security
    • Chenoweth, J. D. 2005a. "Book Review: The Art of Deception: Controlling the Human Element of Security," Journal of Information Privacy & Security (1:2), pp. 69-70.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.2 , pp. 69-70
    • Chenoweth, J.D.1
  • 129
    • 81355125990 scopus 로고    scopus 로고
    • Book review: The art of deception: Controlling the human element of security
    • Chenoweth, J. D. 2005b. "Book Review: The Art of Deception: Controlling the Human Element of Security," Journal of Information Privacy & Security (1:1), pp. 69-70.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 69-70
    • Chenoweth, J.D.1
  • 130
    • 81355136828 scopus 로고    scopus 로고
    • Computer security: 20 things every employee should know
    • Chenoweth, J. D. 2005c. "Computer Security: 20 Things Every Employee Should Know," Journal of Information Privacy & Security (1:1), p. 45.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 45
    • Chenoweth, J.D.1
  • 132
    • 81355155683 scopus 로고    scopus 로고
    • Expert opinion: Kelly hansen, ceo, neohapsis inc
    • Chenoweth, J. D. 2005e. "Expert Opinion: Kelly Hansen, Ceo, Neohapsis Inc," Journal of Information Privacy & Security (1:3), pp. 57-58.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.3 , pp. 57-58
    • Chenoweth, J.D.1
  • 133
    • 81355125957 scopus 로고    scopus 로고
    • Information security policies, procedures, and standards: Guidelines for effective information security management
    • Chenoweth, J. D. 2005f. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management," Journal of Information Privacy & Security (1:1), pp. 43-44.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 43-44
    • Chenoweth, J.D.1
  • 134
    • 81355125956 scopus 로고    scopus 로고
    • Secrets & lies: Digital security in a networked world
    • Chenoweth, J. D. 2005g. "Secrets & Lies: Digital Security in a Networked World," Journal of Information Privacy & Security (1:3), p. 59-60.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.3 , pp. 59-60
    • Chenoweth, J.D.1
  • 136
    • 81355155304 scopus 로고    scopus 로고
    • Cybercrime: Digital cops in a networked environment
    • Chenoweth, J. D. 2007. "Cybercrime: Digital Cops in a Networked Environment," Journal of Information Privacy & Security (3:1), pp. 65-66.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.1 , pp. 65-66
    • Chenoweth, J.D.1
  • 137
    • 81355166756 scopus 로고    scopus 로고
    • Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies
    • Cho, H. 2010. "Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies," Journal of Information Privacy & Security (6:1), pp. 3-27.
    • (2010) Journal of Information Privacy & Security , vol.6 , Issue.1 , pp. 3-27
    • Cho, H.1
  • 138
    • 55949096818 scopus 로고    scopus 로고
    • Scalable methodology for supply chain inventory coordination with private information
    • Chu, C., and Leon, V. 2009. "Scalable Methodology for Supply Chain Inventory Coordination with Private Information," European Journal of Operational Research (195:1), pp. 262-279.
    • (2009) European Journal of Operational Research , vol.195 , Issue.1 , pp. 262-279
    • Chu, C.1    Leon, V.2
  • 139
    • 33847309878 scopus 로고    scopus 로고
    • E-commerce and information privacy: Privacy policies as personal information protectors
    • Ciocchetti, C. A. 2007. "E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors," American Business Law Journal (44:1), pp. 55-126.
    • (2007) American Business Law Journal , vol.44 , Issue.1 , pp. 55-126
    • Ciocchetti, C.A.1
  • 141
    • 0036184272 scopus 로고    scopus 로고
    • Protecting free expression online with freenet
    • DOI 10.1109/4236.978368
    • Clarke, I., Miller, S. G., Hong, T. W., Sandberg, O., and Wiley, B. 2002. "Protecting Free Expression Online with Freenet," Internet Computing (6:1), pp. 40-49. (Pubitemid 34198226)
    • (2002) IEEE Internet Computing , vol.6 , Issue.1 , pp. 40-49
    • Clarke, I.1    Miller, S.G.2    Hong, T.W.3    Sandberg, O.4    Wiley, B.5
  • 142
    • 81355166327 scopus 로고    scopus 로고
    • Information privacy: Culture, legislation and user attitudes
    • Cockcroft, S. 2006. "Information Privacy: Culture, Legislation and User Attitudes," Australasian Journal of Information Systems (14:1), pp. 55-68.
    • (2006) Australasian Journal of Information Systems , vol.14 , Issue.1 , pp. 55-68
    • Cockcroft, S.1
  • 143
    • 0010315737 scopus 로고    scopus 로고
    • Chief privacy officers
    • Cohen, S. 2001. "Chief Privacy Officers," Risk Management (48:7), pp. 9-9.
    • (2001) Risk Management , vol.48 , Issue.7 , pp. 9-9
    • Cohen, S.1
  • 145
    • 63649164020 scopus 로고    scopus 로고
    • Personal information privacy: A multi-party endeavor
    • Conger, S. 2009. "Personal Information Privacy: A Multi-Party Endeavor," Journal of Electronic Commerce in Organizations (7:1), pp. 71-82.
    • (2009) Journal of Electronic Commerce in Organizations , vol.7 , Issue.1 , pp. 71-82
    • Conger, S.1
  • 146
    • 81355166757 scopus 로고    scopus 로고
    • Introducing the information technology security essential body of knowledge framework
    • Conklin, W., and McLeod, A. 2009. "Introducing the Information Technology Security Essential Body of Knowledge Framework," Journal of Information Privacy & Security (5:2), pp. 27-40.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.2 , pp. 27-40
    • Conklin, W.1    McLeod, A.2
  • 147
    • 0037768438 scopus 로고    scopus 로고
    • M-commerce in Canada: An interaction framework for wireless privacy
    • Coursaris, C., Hassanein, K., and Head, M. 2003. "m-Commerce in Canada: An Interaction Framework for Wireless Privacy," Canadian Journal of Administrative Sciences (20:1), pp. 54-73. (Pubitemid 36618965)
    • (2003) Canadian Journal of Administrative Sciences , vol.20 , Issue.1 , pp. 54-73
    • Coursaris, C.1    Hassanein, K.2    Head, M.3
  • 150
    • 33646680778 scopus 로고    scopus 로고
    • What do they "Indicate?" evaluating security and privacy indicators
    • Cranor, L. F. 2006. "What Do They 'Indicate?': Evaluating Security and Privacy Indicators," Interactions (13:3), pp. 45-47. (Pubitemid 43734554)
    • (2006) Interactions , vol.13 , Issue.3 , pp. 45-47
    • Cranor, L.F.1
  • 152
    • 79960036218 scopus 로고    scopus 로고
    • The impact of consumer perceptions of information privacy and security risks on the adoption of residual rfid technologies
    • Crazier, J., Jensen, A., and Dave, D. 2008. "The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies," Communications of the Association for Information Systems (23:14), pp. 235-256.
    • (2008) Communications of the Association for Information Systems , vol.23 , Issue.14 , pp. 235-256
    • Crazier, J.1    Jensen, A.2    Dave, D.3
  • 153
    • 51449092702 scopus 로고    scopus 로고
    • Citizens' concerns about the privacy of personal information held by government: A comparative study, japan and new zealand
    • Los Alamitos, CA: IEEE Computer Society Press
    • Cullen, R. 2008. "Citizens' Concerns About the Privacy of Personal Information Held by Government: A Comparative Study, Japan and New Zealand," in Proceedings of the 41st Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 224-224.
    • (2008) Proceedings of the 41st Annual Hawaii International Conference on System Sciences , pp. 224-224
    • Cullen, R.1
  • 154
    • 70249123439 scopus 로고    scopus 로고
    • Culture, identity and information privacy in the age of digital government
    • Cullen, R. 2009. "Culture, Identity and Information Privacy in the Age of Digital Government," Online Information Review (33:3), pp. 405-421.
    • (2009) Online Information Review , vol.33 , Issue.3 , pp. 405-421
    • Cullen, R.1
  • 155
    • 39749102272 scopus 로고    scopus 로고
    • Information privacy and trust in government: A citizen-based perspective from new zealand
    • Los Alamitos, CA: IEEE Computer Society Press
    • Cullen, R., and Reilly, P. 2007. "Information Privacy and Trust in Government: A Citizen-Based Perspective from New Zealand," in Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 109-118.
    • (2007) Proceedings of the 40th Annual Hawaii International Conference on System Sciences , pp. 109-118
    • Cullen, R.1    Reilly, P.2
  • 156
    • 0001501223 scopus 로고
    • How did they get my name?': An exploratory investigation of consumer attitudes toward secondary information use
    • Culnan, M. J. 1993. "'How Did They Get My Name?': An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly (17:3), pp. 341-363.
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 341-363
    • Culnan, M.J.1
  • 157
    • 0034396278 scopus 로고    scopus 로고
    • Protecting privacy online: Is self-regulation working?
    • Culnan, M. J. 2000. "Protecting Privacy Online: Is Self-Regulation Working?," Journal of Public Policy & Marketing (19:1), pp. 20-26.
    • (2000) Journal of Public Policy & Marketing , vol.19 , Issue.1 , pp. 20-26
    • Culnan, M.J.1
  • 158
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
    • Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science (10:1), pp. 104-115.
    • (1999) Organization Science , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.J.1    Armstrong, P.K.2
  • 159
    • 81355155318 scopus 로고    scopus 로고
    • Computer privacy annoyances-how to avoid the most annoying invasions of your personal and online privacy
    • Cutshall, R. 2007. "Computer Privacy Annoyances-How to Avoid the Most Annoying Invasions of Your Personal and Online Privacy," Journal of Information Privacy & Security (3:4), pp. 55-56.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.4 , pp. 55-56
    • Cutshall, R.1
  • 161
    • 34247374924 scopus 로고    scopus 로고
    • Understanding consumer information privacy in the realm of internet commerce: Personhood and pragmatism, pop-tarts and six-packs
    • DeMarco, D. A. 2006. "Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs," Texas Law Review (84:4), pp. 1013-1064.
    • (2006) Texas Law Review , vol.84 , Issue.4 , pp. 1013-1064
    • Demarco, D.A.1
  • 164
    • 36049013776 scopus 로고    scopus 로고
    • Mobile payment adoption in the us: A cross-industry, cross-platform solution
    • Dewan, S. G., and Chen, L. 2005. "Mobile Payment Adoption in the US: A Cross-Industry, Cross-Platform Solution," Journal of Information Privacy & Security (1:2), pp. 4-28.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.2 , pp. 4-28
    • Dewan, S.G.1    Chen, L.2
  • 165
    • 72749110934 scopus 로고    scopus 로고
    • A multi-objective approach to data sharing with privacy constraints and preference based objectives
    • Montreal, Quebec, Canada, July 8-12
    • Dewri, R., Whitley, D., Ray, I., and Ray, I. 2009. "A Multi-Objective Approach to Data Sharing with Privacy Constraints and Preference Based Objectives," in Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. Montreal, Quebec, Canada, July 8-12, pp. 1499-1506.
    • (2009) Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation , pp. 1499-1506
    • Dewri, R.1    Whitley, D.2    Ray, I.3    Ray, I.4
  • 166
    • 25844466463 scopus 로고    scopus 로고
    • Value focused assessment of individual privacy concerns for internet commerce
    • L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
    • Dhillon, G., Bardacino, J., and Hackney, R. 2002. "Value Focused Assessment of Individual Privacy Concerns for Internet Commerce," in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 705-709.
    • (2002) Proceedings of the 23rd International Conference on Information Systems , pp. 705-709
    • Dhillon, G.1    Bardacino, J.2    Hackney, R.3
  • 168
    • 33750996095 scopus 로고    scopus 로고
    • Internet users' privacy concerns and beliefs about government surveillance: An exploratory study of differences between italy and the united states
    • Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. 2006a. "Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences between Italy and the United States," Journal of Global Information Management (14:4), pp. 57-93.
    • (2006) Journal of Global Information Management , vol.14 , Issue.4 , pp. 57-93
    • Dinev, T.1    Bellotto, M.2    Hart, P.3    Russo, V.4    Serra, I.5    Colautti, C.6
  • 169
    • 33749322976 scopus 로고    scopus 로고
    • Privacy calculus model in e-commerce - A study of Italy and the United States
    • DOI 10.1057/palgrave.ejis.3000590, PII 3000590
    • Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. 2006b. "Privacy Calculus Model in E-Commerce-A Study of Italy and the United States," European Journal of Information Systems (15:4), pp. 389-402. (Pubitemid 44494838)
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 389-402
    • Dinev, T.1    Bellotto, M.2    Hart, P.3    Russo, V.4    Serra, I.5    Colautti, C.6
  • 170
    • 8344248697 scopus 로고    scopus 로고
    • Internet privacy concerns and their antecedents-measurement validity and a regression model
    • Dinev, T., and Hart, P. 2004. "Internet Privacy Concerns and Their Antecedents-Measurement Validity and a Regression Model," Behaviour & Information Technology (23:6), pp. 413-422.
    • (2004) Behaviour & Information Technology , vol.23 , Issue.6 , pp. 413-422
    • Dinev, T.1    Hart, P.2
  • 171
    • 33645785886 scopus 로고    scopus 로고
    • Internet privacy concerns and social awareness as determinants of intention to transact
    • DOI 10.2753/JEC1086-4415100201
    • Dinev, T., and Hart, P. 2005. "Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact," International Journal of Electronic Commerce (10:2), pp. 7-29. (Pubitemid 43554387)
    • (2005) International Journal of Electronic Commerce , vol.10 , Issue.2 , pp. 7-29
    • Dinev, T.1    Hart, P.2
  • 172
    • 33645133251 scopus 로고    scopus 로고
    • An extended privacy calculus model for e-commerce transactions
    • DOI 10.1287/isre.1060.0080
    • Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research (17:1), pp. 61-80. (Pubitemid 43450179)
    • (2006) Information Systems Research , vol.17 , Issue.1 , pp. 61-80
    • Dinev, T.1    Hart, P.2
  • 173
    • 63349106129 scopus 로고    scopus 로고
    • Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy
    • Los Alamitos, CA: IEEE Computer Society Press
    • Dinev, T., Xu, H., and Smith, H. J. 2009. "Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy," Proceedings of the 42nd Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
    • (2009) Proceedings of the 42nd Hawaii International Conference on System Sciences
    • Dinev, T.1    Xu, H.2    Smith, H.J.3
  • 175
    • 71749108242 scopus 로고    scopus 로고
    • Protecting consumer privacy in the company's best interest
    • Dolnicar, S., and Jordaan, Y. 2006. "Protecting Consumer Privacy in the Company's Best Interest," Australasian Marketing Journal (14:1), pp. 39-61.
    • (2006) Australasian Marketing Journal , vol.14 , Issue.1 , pp. 39-61
    • Dolnicar, S.1    Jordaan, Y.2
  • 176
    • 34547267405 scopus 로고    scopus 로고
    • A market-oriented approach to responsibly managing information privacy concerns in direct marketing
    • Dolnicar, S., and Jordaan, Y. 2007. "A Market-Oriented Approach to Responsibly Managing Information Privacy Concerns in Direct Marketing," Journal of Advertising (36:2), pp. 123-149.
    • (2007) Journal of Advertising , vol.36 , Issue.2 , pp. 123-149
    • Dolnicar, S.1    Jordaan, Y.2
  • 178
    • 84938780205 scopus 로고    scopus 로고
    • Privacy, risk perception, and expert online behavior: An exploratory study of household end users
    • Drennan, J., Mort, G. S., and Previte, J. 2006. "Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users," Journal of Organizational and End User Computing (18:1), pp. 1-22.
    • (2006) Journal of Organizational and End User Computing , vol.18 , Issue.1 , pp. 1-22
    • Drennan, J.1    Mort, G.S.2    Previte, J.3
  • 180
    • 67449161997 scopus 로고    scopus 로고
    • Personal information privacy and shopping behavior on the internet
    • Dubelaar, C., Jevons, C., and Parker, L. 2003. "Personal Information Privacy and Shopping Behavior on the Internet," Journal of Asia Pacific Marketing (2:1), pp. 65-74.
    • (2003) Journal of Asia Pacific Marketing , vol.2 , Issue.1 , pp. 65-74
    • Dubelaar, C.1    Jevons, C.2    Parker, L.3
  • 181
    • 18544382993 scopus 로고    scopus 로고
    • Examining Internet privacy policies within the context of user privacy values
    • DOI 10.1109/TEM.2005.844927
    • Earp, J. B., Anton, A. I., Aiman-Smith, L., and Stufflebeam, W. H. 2005. "Examining Internet Privacy Policies within the Context of User Privacy Values," IEEE Transactions on Engineering Management (52:2), pp. 227-237. (Pubitemid 40654472)
    • (2005) IEEE Transactions on Engineering Management , vol.52 , Issue.2 , pp. 227-237
    • Earp, J.B.1    Anton, A.I.2    Aiman-Smith, L.3    Stufflebeam, W.H.4
  • 182
    • 33745683343 scopus 로고    scopus 로고
    • Information privacy in the service sector: An exploratory study of health care and banking professionals
    • DOI 10.1207/s15327744joce1602-2
    • Earp, J. B., and Payton, F. C. 2006. "Information Privacy in the Service Sector: An Exploratory Study of Health Care and Banking Professionals," Journal of Organizational Computing and Electronic Commerce (16:2), pp. 105-122. (Pubitemid 43998378)
    • (2006) Journal of Organizational Computing and Electronic Commerce , vol.16 , Issue.2 , pp. 105-122
    • Earp, J.B.1    Payton, F.C.2
  • 183
    • 33745211471 scopus 로고    scopus 로고
    • Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment
    • DOI 10.1016/j.jbusres.2006.02.006, PII S0148296306000713
    • Eastlick, M. A., Lotz, S. L., and Warrington, P. 2006. "Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment," Journal of Business Research (59:8), pp. 877-886. (Pubitemid 43905939)
    • (2006) Journal of Business Research , vol.59 , Issue.8 , pp. 877-886
    • Eastlick, M.A.1    Lotz, S.L.2    Warrington, P.3
  • 184
    • 63649153633 scopus 로고    scopus 로고
    • Customer information: Protecting the organization's most critical asset from misappropriation and identity theft
    • Elson, R. J., and LeClerc, R. 2006. "Customer Information: Protecting the Organization's Most Critical Asset from Misappropriation and Identity Theft," Journal of Information Privacy & Security (2:1), pp. 3-15.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.1 , pp. 3-15
    • Elson, R.J.1    Leclerc, R.2
  • 185
    • 81355155278 scopus 로고    scopus 로고
    • Privacy concerns in e-commerce: An empirical investigation of gender differences
    • Faja, S., and Trimi, S. 2008. "Privacy Concerns in E-Commerce: An Empirical Investigation of Gender Differences," International Journal of Electronic Business (6:4), pp. 386-404.
    • (2008) International Journal of Electronic Business , vol.6 , Issue.4 , pp. 386-404
    • Faja, S.1    Trimi, S.2
  • 187
    • 4444292882 scopus 로고    scopus 로고
    • Impact of HIPAA on the integrity of healthcare information
    • DOI 10.1504/IJHTM.2004.004954
    • Fedorowicz, J., and Ray, A. W. 2004. "Impact of HIPAA on the Integrity of Healthcare Information," International Journal of Healthcare Technology & Management (6:2), pp. 142-157. (Pubitemid 39172502)
    • (2004) International Journal of Healthcare Technology and Management , vol.6 , Issue.2 , pp. 142-157
    • Fedorowicz, J.1    Ray, A.W.2
  • 188
    • 34248393568 scopus 로고    scopus 로고
    • Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices
    • Feng-Yang, K., Cathy, S. L., and Meng-Hsiang, H. 2007. "Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices," Journal of Business Ethics (73:2), pp. 145-160.
    • (2007) Journal of Business Ethics , vol.73 , Issue.2 , pp. 145-160
    • Feng-Yang, K.1    Cathy, S.L.2    Meng-Hsiang, H.3
  • 189
    • 85003114126 scopus 로고    scopus 로고
    • Editorial
    • Finch, E. 2003. "Editorial," Facilities (21:5/6), pp. 93-93.
    • (2003) Facilities , vol.21 , Issue.5-6 , pp. 93-93
    • Finch, E.1
  • 191
    • 34250004313 scopus 로고    scopus 로고
    • Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use
    • Friedman, B. A., and Reed, L. J. 2007. "Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-Mail Use," Employee Responsibilities and Rights Journal (19:2), pp. 75-83.
    • (2007) Employee Responsibilities and Rights Journal , vol.19 , Issue.2 , pp. 75-83
    • Friedman, B.A.1    Reed, L.J.2
  • 192
    • 81355155311 scopus 로고    scopus 로고
    • Book review: Cyberregs-A business guide to web property, privacy, and patents
    • Fugate, J. 2008. "Book Review: CyberRegs-A Business Guide to Web Property, Privacy, and Patents," Journal of Information Privacy & Security (4:4), pp. 64-65.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.4 , pp. 64-65
    • Fugate, J.1
  • 193
    • 3042747513 scopus 로고    scopus 로고
    • The theory of planned behavior and Internet purchasing
    • DOI 10.1108/10662240410542634
    • George, J. F. 2004. "The Theory of Planned Behavior and Internet Purchasing," Internet Research (14:3), pp. 198-212. (Pubitemid 38888464)
    • (2004) Internet Research , vol.14 , Issue.3 , pp. 198-212
    • George, J.F.1
  • 194
    • 0347496225 scopus 로고    scopus 로고
    • Business ethics and the information age
    • George, R. T. D. 1999. "Business Ethics and the Information Age," Business and Society Review (104:3), pp. 261-278.
    • (1999) Business and Society Review , vol.104 , Issue.3 , pp. 261-278
    • George, R.T.D.1
  • 195
    • 81355125985 scopus 로고    scopus 로고
    • Faults & failures: Pentium serial number pains privacy groups
    • Geppert, L. 1999. "Faults & Failures: Pentium Serial Number Pains Privacy Groups," IEEE Spectrum (36:6), pp. 92-92.
    • (1999) IEEE Spectrum , vol.36 , Issue.6 , pp. 92-92
    • Geppert, L.1
  • 200
    • 0346873587 scopus 로고    scopus 로고
    • Lost and found in cyberspace: Informational privacy in the age of the internet
    • Gindin, S. E. 1997. "Lost and Found in Cyberspace: Informational Privacy in the Age of the Internet," The San Diego Law Review (34:3), pp. 1153-1223.
    • (1997) The San Diego Law Review , vol.34 , Issue.3 , pp. 1153-1223
    • Gindin, S.E.1
  • 201
    • 0034363675 scopus 로고    scopus 로고
    • Protecting health information privacy: The case for self-regulation of electronically held medical records
    • Glenn, C. L. 2000. "Protecting Health Information Privacy: The Case for Self-Regulation of Electronically Held Medical Records," Vanderbilt Law Review (53:5), pp. 1605-1635.
    • (2000) Vanderbilt Law Review , vol.53 , Issue.5 , pp. 1605-1635
    • Glenn, C.L.1
  • 202
    • 79952405422 scopus 로고    scopus 로고
    • Intrusion detection management system for ecommerce security
    • Gómez, J., and Lichtenberg, J. 2007. "Intrusion Detection Management System for Ecommerce Security," Journal of Information Privacy & Security (3:4), pp. 19-31.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.4 , pp. 19-31
    • Gómez, J.1    Lichtenberg, J.2
  • 203
    • 81355155313 scopus 로고    scopus 로고
    • Online security solutions in the financial industry based on a commercial risk assessment matrix
    • Gómez, J. M., and Paxmann, S. 2006. "Online Security Solutions in the Financial Industry Based on a Commercial Risk Assessment Matrix," Journal of Information Privacy & Security (2:3), pp. 21-41.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.3 , pp. 21-41
    • Gómez, J.M.1    Paxmann, S.2
  • 204
    • 79953849516 scopus 로고
    • Privacy, computers, and the commercial dissemination of personal information
    • Graham, J. P. 1987. "Privacy, Computers, and the Commercial Dissemination of Personal Information," Texas Law Review (65:7), pp. 1395-1439.
    • (1987) Texas Law Review , vol.65 , Issue.7 , pp. 1395-1439
    • Graham, J.P.1
  • 205
    • 81355155314 scopus 로고    scopus 로고
    • Protecting adolescents' personal information online: Constraints and parameters
    • Gray, D., and Christiansen, L. 2009. "Protecting Adolescents' Personal Information Online: Constraints and Parameters," Journal of Information Privacy & Security (5:4), pp. 31-50.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.4 , pp. 31-50
    • Gray, D.1    Christiansen, L.2
  • 207
    • 15344348886 scopus 로고    scopus 로고
    • Electronic prescribing and HIPAA privacy regulation
    • Greenberg, M. D., Ridgely, M. S., and Bell, D. S. 2004. "Electronic Prescribing and HIPAA Privacy Regulation," Inquiry-Excellus Health Plan (41:4), pp. 461-468. (Pubitemid 40393060)
    • (2004) Inquiry , vol.41 , Issue.4 , pp. 461-468
    • Greenberg, M.D.1    Ridgely, M.S.2    Bell, D.S.3
  • 209
    • 84870973762 scopus 로고    scopus 로고
    • Privacy design in online social networks: Learning from privacy breaches and community feedback
    • Paris, France, December
    • Gurses, S., Rizk, R., and Gunther, O. 2008. "Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
    • (2008) Proceedings of the 29th International Conference on Information Systems , pp. 14-17
    • Gurses, S.1    Rizk, R.2    Gunther, O.3
  • 210
    • 74549121822 scopus 로고    scopus 로고
    • A framework of authentication and authorization for e-health services
    • Alexandria, VA, October 30-November 3
    • Han, S., Skinner, G., Potdar, V., and Chang, E. 2006. "A Framework of Authentication and Authorization for E-Health Services," in Proceedings of the 3rd ACM Workshop on Secure Web Services. Alexandria, VA, October 30-November 3, pp. 105-106.
    • (2006) Proceedings of the 3rd ACM Workshop on Secure Web Services , pp. 105-106
    • Han, S.1    Skinner, G.2    Potdar, V.3    Chang, E.4
  • 212
    • 61849128934 scopus 로고    scopus 로고
    • Consumer privacy and marketing avoidance: A static model
    • Hann, I. H., Hui, K. L., Lee, S. Y. T., and Png, I. P. L. 2008. "Consumer Privacy and Marketing Avoidance: A Static Model," Management Science (54:6), p. 1094-1103.
    • (2008) Management Science , vol.54 , Issue.6 , pp. 1094-1103
    • Hann, I.H.1    Hui, K.L.2    Lee, S.Y.T.3    Png, I.P.L.4
  • 213
    • 79960359586 scopus 로고    scopus 로고
    • Online information privacy: Measuring the cost-benefit trade-off
    • L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
    • Hann, I. H., Hui, K. L., Lee, T. S., and Png, I. P. L. 2002. "Online Information Privacy: Measuring the Cost-Benefit Trade-Off," in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 1-10.
    • (2002) Proceedings of the 23rd International Conference on Information Systems , pp. 1-10
    • Hann, I.H.1    Hui, K.L.2    Lee, T.S.3    Png, I.P.L.4
  • 215
    • 70849131437 scopus 로고    scopus 로고
    • Exploring a human centered approach to managing visual privacy concerns during collaboration
    • Vancouver, British Columbia, Canada, October 26-31
    • Hawkey, K. 2008. "Exploring a Human Centered Approach to Managing Visual Privacy Concerns During Collaboration," in Proceeding of the 3rd ACM International Workshop on Human-Centered Computing, Vancouver, British Columbia, Canada, October 26-31, pp. 69-76.
    • (2008) Proceeding of the 3rd ACM International Workshop on Human-Centered Computing , pp. 69-76
    • Hawkey, K.1
  • 216
    • 81355155312 scopus 로고    scopus 로고
    • The impact of privacy on intellectual property in canada
    • Hayes, M. 2006. "The Impact of Privacy on Intellectual Property in Canada," Intellectual Property Journal (20), pp. 67-90.
    • (2006) Intellectual Property Journal , vol.20 , pp. 67-90
    • Hayes, M.1
  • 217
    • 79952938824 scopus 로고    scopus 로고
    • An empirical investigation of factors influencing information security behavior
    • Hazari, S., Hargrave, W., and Clenney, B. 2008. "An Empirical Investigation of Factors Influencing Information Security Behavior," Journal of Information Privacy & Security (4:4), pp. 3-20.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.4 , pp. 3-20
    • Hazari, S.1    Hargrave, W.2    Clenney, B.3
  • 218
    • 0000179686 scopus 로고    scopus 로고
    • Personal information privacy: Implications for mis managers
    • Henderson, S. C., and Snyder, C. A. 1999. "Personal Information Privacy: Implications for MIS Managers," Information & Management (36:4), pp. 213-220.
    • (1999) Information & Management , vol.36 , Issue.4 , pp. 213-220
    • Henderson, S.C.1    Snyder, C.A.2
  • 220
    • 56749176497 scopus 로고    scopus 로고
    • A globally optimal local inventory control policy for multistage supply chains
    • Hennet, J. 2009. "A Globally Optimal Local Inventory Control Policy for Multistage Supply Chains," International Journal of Production Research (47:2), pp. 435-453.
    • (2009) International Journal of Production Research , vol.47 , Issue.2 , pp. 435-453
    • Hennet, J.1
  • 222
    • 81355166359 scopus 로고    scopus 로고
    • Separation, risk, and the necessity of privacy to well-being: A comment on adam moore's toward informational privacy rights
    • Himma, K. E. 2007a. "Separation, Risk, and the Necessity of Privacy to Well-Being: A Comment on Adam Moore's toward Informational Privacy Rights," The San Diego Law Review (44:4), pp. 847-858.
    • (2007) The San Diego Law Review , vol.44 , Issue.4 , pp. 847-858
    • Himma, K.E.1
  • 223
    • 33947411847 scopus 로고    scopus 로고
    • Foundational issues in information ethics
    • Himma, K. E. 2007b. "Foundational Issues in Information Ethics," Library Hi Tech (25:1), pp. 79-94.
    • (2007) Library Hi Tech , vol.25 , Issue.1 , pp. 79-94
    • Himma, K.E.1
  • 224
    • 0032352537 scopus 로고    scopus 로고
    • Privacy in the marketplace: Social construction of privacy
    • Hine, C., and Eve, J. 1998. "Privacy in the Marketplace: Social Construction of Privacy," The Information Society (14:4), pp. 253-262.
    • (1998) The Information Society , vol.14 , Issue.4 , pp. 253-262
    • Hine, C.1    Eve, J.2
  • 225
    • 73749088345 scopus 로고    scopus 로고
    • Privacy as information access and illusory control: The case of the facebook news feed privacy outcry
    • Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry," Electronic Commerce Research and Applications (9), pp. 50-60.
    • (2010) Electronic Commerce Research and Applications , vol.9 , pp. 50-60
    • Hoadley, C.M.1    Xu, H.2    Lee, J.J.3    Rosson, M.B.4
  • 227
    • 70249109213 scopus 로고    scopus 로고
    • Establishing business integrity in an online environment
    • Hooper, T., and Vos, M. 2009. "Establishing Business Integrity in an Online Environment," Online Information Review (33:2), pp. 343-361.
    • (2009) Online Information Review , vol.33 , Issue.2 , pp. 343-361
    • Hooper, T.1    Vos, M.2
  • 228
    • 33750026772 scopus 로고    scopus 로고
    • Privacy concerns, privacy practices and web site categories
    • Hsu, C. 2006. "Privacy Concerns, Privacy Practices and Web Site Categories," Online Information Review (30:5), pp. 569-586.
    • (2006) Online Information Review , vol.30 , Issue.5 , pp. 569-586
    • Hsu, C.1
  • 229
    • 0346040110 scopus 로고    scopus 로고
    • The effect of organization-based self-esteem and deindividuation in protecting personal information privacy
    • Hsu, M. H., and Kuo, F. Y. 2003. "The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy," Journal of Business Ethics (42:4), pp. 305-320.
    • (2003) Journal of Business Ethics , vol.42 , Issue.4 , pp. 305-320
    • Hsu, M.H.1    Kuo, F.Y.2
  • 232
    • 70349339168 scopus 로고    scopus 로고
    • Digitising criminal justice in england and wales: Revisiting information-growth dynamics
    • Iannacci, F. 2009. "Digitising Criminal Justice in England and Wales: Revisiting Information-Growth Dynamics," Transforming Government: People, Process and Policy (3:1), pp. 50-64.
    • (2009) Transforming Government: People, Process and Policy , vol.3 , Issue.1 , pp. 50-64
    • Iannacci, F.1
  • 233
    • 81355125980 scopus 로고    scopus 로고
    • Exploratory analysis of the readability of information privacy statement of the primary social networks
    • Jafar, M., and Abdullat, A. 2009. "Exploratory Analysis of the Readability of Information Privacy Statement of the Primary Social Networks," Journal of Business & Economics Research (7:12), pp. 123-142.
    • (2009) Journal of Business & Economics Research , vol.7 , Issue.12 , pp. 123-142
    • Jafar, M.1    Abdullat, A.2
  • 234
    • 0013270513 scopus 로고    scopus 로고
    • Database security and privacy
    • Jajodia, S. 1996. "Database Security and Privacy," ACM Computing Surveys (28:1), pp. 129-131. (Pubitemid 126499042)
    • (1996) ACM Computing Surveys , vol.28 , Issue.1 , pp. 129-131
    • Jajodia, S.1
  • 235
    • 79951661105 scopus 로고    scopus 로고
    • Business and security executives views of information security investment drivers: Results from a delphi study
    • Johnson, A. 2009. "Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study," Journal of Information Privacy & Security (5:1), pp. 3-27.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.1 , pp. 3-27
    • Johnson, A.1
  • 236
    • 40949158933 scopus 로고    scopus 로고
    • Information privacy compliance in the healthcare industry
    • DOI 10.1108/09685220810862715
    • Johnston, A. C., and Warkentin, M. 2008. "Information Privacy Compliance in the Healthcare Industry," Information Management & Computer Security (16:1), pp. 5-19. (Pubitemid 351403702)
    • (2008) Information Management and Computer Security , vol.16 , Issue.1 , pp. 5-19
    • Johnston, A.C.1    Warkentin, M.2
  • 237
    • 0347989497 scopus 로고    scopus 로고
    • Information privacy in cyberspace transactions
    • Kang, J. 1998. "Information Privacy in Cyberspace Transactions," Stanford Law Review (50:4), pp. 1193-1294. (Pubitemid 128093131)
    • (1998) Stanford Law Review , vol.50 , Issue.4 , pp. 1193-1294
    • Kang, J.1
  • 238
    • 25844445352 scopus 로고    scopus 로고
    • Modelling corporate wireless security and privacy
    • DOI 10.1016/j.jsis.2005.07.006, PII S0963868705000429, The Future is UNWIRED: Organizational and Strategic Perspectives
    • Katos, V., and Adams, C. 2005. "Modelling Corporate Wireless Security and Privacy," The Journal of Strategic Information Systems (14:3), pp. 307-321. (Pubitemid 41400616)
    • (2005) Journal of Strategic Information Systems , vol.14 , Issue.3 , pp. 307-321
    • Katos, V.1    Adams, C.2
  • 240
    • 68549093911 scopus 로고    scopus 로고
    • What Is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles
    • Kayworth, T., Brocato, L., and Whitten, D. 2005. "What Is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles," Communications of the Association for Information Systems (16:6), pp. 110-126.
    • (2005) Communications of the Association for Information Systems , vol.16 , Issue.6 , pp. 110-126
    • Kayworth, T.1    Brocato, L.2    Whitten, D.3
  • 242
    • 40249119459 scopus 로고    scopus 로고
    • Adoption and implementation problems of e-banking: A study of the managerial perspective of the banking industry in oman
    • Khalfan, A. M., and Alshawaf, A. 2004. "Adoption and Implementation Problems of E-Banking: A Study of the Managerial Perspective of the Banking Industry in Oman," Journal of Global Information Technology Management (7:1), pp. 47-64.
    • (2004) Journal of Global Information Technology Management , vol.7 , Issue.1 , pp. 47-64
    • Khalfan, A.M.1    Alshawaf, A.2
  • 243
    • 79951753282 scopus 로고    scopus 로고
    • Cognition-based versus affect-based trust determinants in e-commerce: Cross-cultural comparison study
    • D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14
    • Kim, D. 2005. "Cognition-Based Versus Affect-Based Trust Determinants in E-Commerce: Cross-Cultural Comparison Study," in Proceedings of the 26th International Conference on Information Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, pp. 741-753.
    • (2005) Proceedings of the 26th International Conference on Information Systems , pp. 741-753
    • Kim, D.1
  • 244
    • 68949144813 scopus 로고    scopus 로고
    • E-service quality competition through personalization under consumer privacy concerns
    • Kim, E., and Lee, B. 2009. "E-Service Quality Competition through Personalization under Consumer Privacy Concerns," Electronic Commerce Research and Applications (8:4), pp. 182-190.
    • (2009) Electronic Commerce Research and Applications , vol.8 , Issue.4 , pp. 182-190
    • Kim, E.1    Lee, B.2
  • 246
    • 27844453166 scopus 로고    scopus 로고
    • On-line privacy in europe-new regulation for cookies
    • King, I. 2003. "On-Line Privacy in Europe-New Regulation for Cookies," Information & Communications Technology Law (12:3), pp. 225-236.
    • (2003) Information & Communications Technology Law , vol.12 , Issue.3 , pp. 225-236
    • King, I.1
  • 247
    • 81355125982 scopus 로고    scopus 로고
    • Book review: Security metrics-replacing fear, uncertainty, and doubt
    • Klaus, T. 2008. "Book Review: Security Metrics-Replacing Fear, Uncertainty, and Doubt," Journal of Information Privacy & Security (4:2), pp. 62-63.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.2 , pp. 62-63
    • Klaus, T.1
  • 248
  • 249
    • 81355166356 scopus 로고    scopus 로고
    • Information assurance technical framework and end user information ownership: A critical analysis
    • Korotka, M. S., Yin, L. R., and Basu, S. C. 2005. "Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis," Journal of Information Privacy & Security (1:1), pp. 45-62.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 45-62
    • Korotka, M.S.1    Yin, L.R.2    Basu, S.C.3
  • 250
    • 51249101713 scopus 로고    scopus 로고
    • The influence of personality traits and information privacy concerns on behavioral intentions
    • Korzaan, M. L., and Boswell, K. T. 2008. "The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions," The Journal of Computer Information Systems (48:4), pp. 15-24.
    • (2008) The Journal of Computer Information Systems , vol.48 , Issue.4 , pp. 15-24
    • Korzaan, M.L.1    Boswell, K.T.2
  • 251
    • 0242575367 scopus 로고    scopus 로고
    • Environment and policy factors shaping e-commerce diffusion: A cross-country comparison
    • L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
    • Kraemer, K., Gibbs, J., and Dedrick, J. 2002. "Environment and Policy Factors Shaping E-Commerce Diffusion: A Cross-Country Comparison,"in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 325-335.
    • (2002) Proceedings of the 23rd International Conference on Information Systems , pp. 325-335
    • Kraemer, K.1    Gibbs, J.2    Dedrick, J.3
  • 253
  • 254
    • 34250359041 scopus 로고    scopus 로고
    • Best practices and tools for personal information compliance management
    • DOI 10.1147/sj.462.0235
    • Kudo, M., Araki, Y., Nomiyama, H., Saito, S., and Sohda, Y. 2007. "Best Practices and Tools for Personal Information Compliance Management," IBM Systems Journal (46:2), pp. 235-253. (Pubitemid 46909502)
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 235-253
    • Kudo, M.1    Araki, Y.2    Nomiyama, H.3    Saito, S.4    Sohda, Y.5
  • 256
    • 34248393568 scopus 로고    scopus 로고
    • Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices
    • Kuo, F. Y., Lin, C. S., and Hsu, M. H. 2007. "Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices," Journal of Business Ethics (73:2), pp. 145-160.
    • (2007) Journal of Business Ethics , vol.73 , Issue.2 , pp. 145-160
    • Kuo, F.Y.1    Lin, C.S.2    Hsu, M.H.3
  • 258
    • 85106728240 scopus 로고    scopus 로고
    • Opting-in or opting-out on the internet: Does it really matter
    • R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
    • Lai, Y. L., and Hui, K. L. 2004. "Opting-in or Opting-out on the Internet: Does It Really Matter," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 781-791.
    • (2004) Proceedings of the 25th International Conference on Information Systems , pp. 781-791
    • Lai, Y.L.1    Hui, K.L.2
  • 260
    • 0030295475 scopus 로고    scopus 로고
    • Privacy versus accessibility: The impact of situationally conditioned belief
    • Lally, L. 1996. "Privacy Versus Accessibility: The Impact of Situationally Conditioned Belief," Journal of Business Ethics (15:11), pp. 1221-1226. (Pubitemid 126174333)
    • (1996) Journal of Business Ethics , vol.15 , Issue.11 , pp. 1221-1226
    • Lally, L.1
  • 261
    • 0017360990 scopus 로고
    • The measurement of observer agreement for categorical data
    • Landis, J. R., and Koch, G. G. 1977. "The Measurement of Observer Agreement for Categorical Data," Biometrics (22), pp. 79-94.
    • (1977) Biometrics , vol.22 , pp. 79-94
    • Landis, J.R.1    Koch, G.G.2
  • 262
    • 68349125675 scopus 로고    scopus 로고
    • Consumer concerns for healthcare information privacy: A comparison of us and canadian perspectives
    • Laric, M., Pitta, D., and Katsanis, L. 2009. "Consumer Concerns for Healthcare Information Privacy: A Comparison of Us and Canadian Perspectives," Research in Healthcare Financial Management (12:1), pp. 93-111.
    • (2009) Research in Healthcare Financial Management , vol.12 , Issue.1 , pp. 93-111
    • Laric, M.1    Pitta, D.2    Katsanis, L.3
  • 263
    • 71849112218 scopus 로고    scopus 로고
    • Preserving patient privacy in the quest for health care economies
    • Laric, M. V., and Pitta, D. A. 2009. "Preserving Patient Privacy in the Quest for Health Care Economies," The Journal of Consumer Marketing (26:7), pp. 477-486.
    • (2009) The Journal of Consumer Marketing , vol.26 , Issue.7 , pp. 477-486
    • Laric, M.V.1    Pitta, D.A.2
  • 264
    • 0030241302 scopus 로고    scopus 로고
    • Markets and privacy
    • Laudon, K. C. 1996. "Markets and Privacy," Communications of the ACM (39:9), pp. 92-104. (Pubitemid 126428152)
    • (1996) Communications of the ACM , vol.39 , Issue.9 , pp. 92-104
    • Laudon, K.C.1
  • 265
    • 81355125981 scopus 로고    scopus 로고
    • Corporate governance and data security and privacy
    • Laurent, W. 2006. "Corporate Governance and Data Security and Privacy," DM Review (16:12), pp. 27-27.
    • (2006) DM Review , vol.16 , Issue.12 , pp. 27-27
    • Laurent, W.1
  • 268
    • 0037655087 scopus 로고    scopus 로고
    • Information technology and the social construction of information privacy: Comment
    • DOI 10.1016/S0278-4254(03)00023-1, PII S0278425403000231
    • Levine, P. 2003. "Information Technology and the Social Construction of Information Privacy: Comment," Journal of Accounting and Public Policy (22:3), pp. 281-285. (Pubitemid 36567357)
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.3 , pp. 281-285
    • Levine, P.1
  • 270
    • 84870969074 scopus 로고    scopus 로고
    • Understanding online information disclosure as a privacy calculus adjusted by exchange fairness
    • Montreal, Quebec, Canada, December
    • Li, H., and Sarathy, R. 2007. "Understanding Online Information Disclosure as a Privacy Calculus Adjusted by Exchange Fairness,"in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
    • (2007) Proceedings of the 28th International Conference on Information Systems , pp. 9-12
    • Li, H.1    Sarathy, R.2
  • 271
    • 81355166355 scopus 로고    scopus 로고
    • The role of emotions in shaping consumers' privacy beliefs about unfamiliar online vendors
    • Li, H., Sarathy, R., and Zhang, J. 2008. "The Role of Emotions in Shaping Consumers' Privacy Beliefs About Unfamiliar Online Vendors," Journal of Information Privacy & Security (4:3), pp. 36-62.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.3 , pp. 36-62
    • Li, H.1    Sarathy, R.2    Zhang, J.3
  • 272
    • 81355155308 scopus 로고    scopus 로고
    • A data perturbation approach to privacy protection in data mining
    • R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
    • Li, X. B., and Sarkar, S. 2004. "A Data Perturbation Approach to Privacy Protection in Data Mining," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 995-1008.
    • (2004) Proceedings of the 25th International Conference on Information Systems , pp. 995-1008
    • Li, X.B.1    Sarkar, S.2
  • 276
    • 81355155305 scopus 로고    scopus 로고
    • Information privacy concerns, government involvement, and corporate policies in the customer relationship management context
    • Lin, Y., and Wu, H. Y. 2008. "Information Privacy Concerns, Government Involvement, and Corporate Policies in the Customer Relationship Management Context," Journal of Global Business and Technology (4:1), pp. 79-91.
    • (2008) Journal of Global Business and Technology , vol.4 , Issue.1 , pp. 79-91
    • Lin, Y.1    Wu, H.Y.2
  • 277
    • 78751510570 scopus 로고    scopus 로고
    • Digital multi-media and the limits of privacy law
    • Lipton, J. 2010. "Digital Multi-Media and the Limits of Privacy Law," Case Western Reserve Journal of International Law (42:3), pp. 551-571.
    • (2010) Case Western Reserve Journal of International Law , vol.42 , Issue.3 , pp. 551-571
    • Lipton, J.1
  • 278
    • 0347945330 scopus 로고    scopus 로고
    • Information privacy/information property
    • Litman, J. 2000. "Information Privacy/Information Property," Stanford Law Review (52:5), pp. 1283-1313.
    • (2000) Stanford Law Review , vol.52 , Issue.5 , pp. 1283-1313
    • Litman, J.1
  • 279
    • 0036758891 scopus 로고    scopus 로고
    • Raising a red flag on global www privacy policies
    • Liu, C., and Arnett, K. P. 2002. "Raising a Red Flag on Global WWW Privacy Policies," The Journal of Computer Information Systems (43:1), pp. 117-127.
    • (2002) The Journal of Computer Information Systems , vol.43 , Issue.1 , pp. 117-127
    • Liu, C.1    Arnett, K.P.2
  • 280
    • 10644254580 scopus 로고    scopus 로고
    • Beyond concern-A privacy-trust-behavioral intention model of electronic commerce
    • Liu, C., Marchewka, J. T., Lu, J., and Yu, C. S. 2005. "Beyond Concern-A Privacy-Trust-Behavioral Intention Model of Electronic Commerce," Information & Management (42:2), pp. 289-304.
    • (2005) Information & Management , vol.42 , Issue.2 , pp. 289-304
    • Liu, C.1    Marchewka, J.T.2    Lu, J.3    Yu, C.S.4
  • 282
    • 85138743041 scopus 로고    scopus 로고
    • Inducing customers to disclose personal information to internet businesses with social adjustment benefits
    • R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
    • Lu, Y., Tan, B., and Hui, K. L. 2004. "Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 571-581.
    • (2004) Proceedings of the 25th International Conference on Information Systems , pp. 571-581
    • Lu, Y.1    Tan, B.2    Hui, K.L.3
  • 284
    • 33746874429 scopus 로고    scopus 로고
    • Using local health information to promote public health
    • DOI 10.1377/hlthaff.25.4.979
    • Luck, J., Chang, C., Brown, E. R., and Lumpkin, J. 2006. "Using Local Health Information to Promote Public Health," Health Affairs (25:4), pp. 979-991. (Pubitemid 44188231)
    • (2006) Health Affairs , vol.25 , Issue.4 , pp. 979-991
    • Luck, J.1    Chang, C.2    Brown, E.R.3    Lumpkin, J.4
  • 285
    • 81355155297 scopus 로고    scopus 로고
    • Protecting information privacy when retiring old computers
    • Lunsford, D. L., Robbins, W. A., and Bizarro, P. A. 2004. "Protecting Information Privacy When Retiring Old Computers," The CPA Journal (74:7), pp. 60-62.
    • (2004) The CPA Journal , vol.74 , Issue.7 , pp. 60-62
    • Lunsford, D.L.1    Robbins, W.A.2    Bizarro, P.A.3
  • 286
    • 13244298307 scopus 로고    scopus 로고
    • Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
    • DOI 10.1287/isre.1040.0032
    • Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research (15:4), pp. 336-355. (Pubitemid 40192456)
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 287
  • 288
    • 63249116880 scopus 로고    scopus 로고
    • Health information privacy: Why trust matters
    • Mancilla, D. M. R., and Biedermann, S. M. R. 2009. "Health Information Privacy: Why Trust Matters," The Health Care Manager (28:1), pp. 71-74.
    • (2009) The Health Care Manager , vol.28 , Issue.1 , pp. 71-74
    • Mancilla, D.M.R.1    Biedermann, S.M.R.2
  • 289
    • 81355136848 scopus 로고    scopus 로고
    • Security service packages: Partitioning the security space
    • Marks, D. G., and Hale, J. 2006. "Security Service Packages: Partitioning the Security Space," Journal of Information Privacy & Security (2:4), pp. 30-44.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.4 , pp. 30-44
    • Marks, D.G.1    Hale, J.2
  • 291
  • 292
    • 78650608727 scopus 로고    scopus 로고
    • Consumer's pcs: A study of hard drive forensics, data recovery, and exploitation
    • Medlin, B., Cazier, J., and Weaver, R. 2008. "Consumer's PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation," Journal of Information Privacy & Security (4:3), pp. 3-15.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.3 , pp. 3-15
    • Medlin, B.1    Cazier, J.2    Weaver, R.3
  • 293
    • 39149111081 scopus 로고    scopus 로고
    • An investigative study: Consumers password choices on an e-commerce site
    • Medlin, B. D., and Cazier, J. A. 2005. "An Investigative Study: Consumers Password Choices on an E-Commerce Site," Journal of Information Privacy & Security (1:4), pp. 33-52.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.4 , pp. 33-52
    • Medlin, B.D.1    Cazier, J.A.2
  • 294
    • 81355125978 scopus 로고    scopus 로고
    • An investigative study: Health care workers as security threat suppliers
    • Medlin, B. D., and Romaniello, A. 2007. "An Investigative Study: Health Care Workers as Security Threat Suppliers," Journal of Information Privacy & Security (3:1), pp. 30-46.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.1 , pp. 30-46
    • Medlin, B.D.1    Romaniello, A.2
  • 297
    • 84976793562 scopus 로고
    • Values, personal information privacy, and regulatory approaches
    • Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. 1995. "Values, Personal Information Privacy, and Regulatory Approaches," Communications of the ACM (38:12), pp. 65-74.
    • (1995) Communications of the ACM , vol.38 , Issue.12 , pp. 65-74
    • Milberg, S.J.1    Burke, S.J.2    Smith, H.J.3    Kallman, E.A.4
  • 298
    • 0034418444 scopus 로고    scopus 로고
    • Information privacy: Corporate management and national regulation
    • Milberg, S. J., Smith, H. J., and Burke, S. J. 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science (11:1), pp. 35-57.
    • (2000) Organization Science , vol.11 , Issue.1 , pp. 35-57
    • Milberg, S.J.1    Smith, H.J.2    Burke, S.J.3
  • 299
    • 79952900097 scopus 로고    scopus 로고
    • Web 2.0 emergency applications: How useful can twitter be for emergency response?
    • Mills, A., Chen, R., Lee, J., and Rao, H. 2009. "Web 2.0 Emergency Applications: How Useful Can Twitter Be for Emergency Response?," Journal of Information Privacy & Security (5:3), pp. 3-26.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.3 , pp. 3-26
    • Mills, A.1    Chen, R.2    Lee, J.3    Rao, H.4
  • 300
    • 0036814612 scopus 로고    scopus 로고
    • Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 us web surveys
    • Milne, G. R., and Culnan, M. J. 2002. "Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 US Web Surveys," Information Society (18:5), pp. 345-359.
    • (2002) Information Society , vol.18 , Issue.5 , pp. 345-359
    • Milne, G.R.1    Culnan, M.J.2
  • 301
    • 4644366146 scopus 로고    scopus 로고
    • Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices
    • DOI 10.1002/dir.20009
    • Milne, G. R., and Culnan, M. J. 2004. "Strategies for Reducing Online Privacy Risks: Why Consumers Read (or Don't Read) Online Privacy Notices," Journal of Interactive Marketing (18:3), pp. 15-29. (Pubitemid 39289315)
    • (2004) Journal of Interactive Marketing , vol.18 , Issue.3 , pp. 15-29
    • Milne, G.R.1    Culnan, M.J.2
  • 302
    • 33845791661 scopus 로고    scopus 로고
    • A longitudinal assessment of online privacy notice readability
    • Milne, G. R., Culnan, M. J., and Greene, H. 2006. "A Longitudinal Assessment of Online Privacy Notice Readability," Journal of Public Policy & Marketing (25:2), pp. 238-249.
    • (2006) Journal of Public Policy & Marketing , vol.25 , Issue.2 , pp. 238-249
    • Milne, G.R.1    Culnan, M.J.2    Greene, H.3
  • 303
    • 21344485586 scopus 로고
    • Direct mail privacy-efficiency trade-offs within an implied social contract framework
    • Milne, G. R., and Gordon, M. E. 1993. "Direct Mail Privacy-Efficiency Trade-Offs within an Implied Social Contract Framework," Journal of Public Policy & Marketing (12:2), pp. 206-215.
    • (1993) Journal of Public Policy & Marketing , vol.12 , Issue.2 , pp. 206-215
    • Milne, G.R.1    Gordon, M.E.2
  • 304
    • 10844290435 scopus 로고    scopus 로고
    • Consumers' protection of online privacy and identity
    • Milne, G. R., Rohm, A. J., and Bahl, S. 2004. "Consumers' Protection of Online Privacy and Identity," Journal of Consumer Affairs (38:2), pp. 217-232. (Pubitemid 39666076)
    • (2004) Journal of Consumer Affairs , vol.38 , Issue.2 , pp. 217-232
    • Milne, G.R.1    Rohm, A.J.2    Bahl, S.3
  • 305
    • 0034384929 scopus 로고    scopus 로고
    • Internet privacy and security: An examination of online retailer disclosures
    • Miyazaki, A. D., and Fernandez, A. 2000. "Internet Privacy and Security: An Examination of Online Retailer Disclosures," Journal of Public Policy & Marketing (19:1), pp. 54-61.
    • (2000) Journal of Public Policy & Marketing , vol.19 , Issue.1 , pp. 54-61
    • Miyazaki, A.D.1    Fernandez, A.2
  • 306
    • 0035587412 scopus 로고    scopus 로고
    • Consumer perceptions of privacy and security risks for online shopping
    • Miyazaki, A. D., and Fernandez, A. 2001. "Consumer Perceptions of Privacy and Security Risks for Online Shopping," The Journal of Consumer Affairs (35:1), pp. 27-44.
    • (2001) The Journal of Consumer Affairs , vol.35 , Issue.1 , pp. 27-44
    • Miyazaki, A.D.1    Fernandez, A.2
  • 307
    • 0036252879 scopus 로고    scopus 로고
    • Internet seals of approval: Effects on online privacy policies and consumer perceptions
    • Miyazaki, A. D., and Krishnamurthy, S. 2002. "Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions," The Journal of Consumer Affairs (36:1), pp. 28-49. (Pubitemid 40815764)
    • (2002) Journal of Consumer Affairs , vol.36 , Issue.1 , pp. 28-49
    • Miyazaki, A.D.1    Krishnamurthy, S.2
  • 309
    • 81355155303 scopus 로고    scopus 로고
    • Book review: Management of information security
    • Mollick, J. S. 2008. "Book Review: Management of Information Security," Journal of Information Privacy & Security (4:1), pp. 64-65.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.1 , pp. 64-65
    • Mollick, J.S.1
  • 310
    • 81355166351 scopus 로고    scopus 로고
    • Determinants of perceived customer-centrism in managing information about customers
    • Mollick, J. S. 2009. "Determinants of Perceived Customer-Centrism in Managing Information About Customers," Journal of American Academy of Business (15:1), pp. 9-15.
    • (2009) Journal of American Academy of Business , vol.15 , Issue.1 , pp. 9-15
    • Mollick, J.S.1
  • 311
    • 71149086168 scopus 로고    scopus 로고
    • Do concerns about error in data and access to data affect students' feeling of alienation?
    • Mollick, J. S. 2006. "Do Concerns About Error in Data and Access to Data Affect Students' Feeling of Alienation?," Journal of Information Privacy & Security (2:1), pp. 29-46.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.1 , pp. 29-46
    • Mollick, J.S.1
  • 312
    • 70349105092 scopus 로고    scopus 로고
    • The importance of privacy revisited
    • Mooradian, N. 2009. "The Importance of Privacy Revisited," Ethics and Information Technology (11:3), pp. 163-174.
    • (2009) Ethics and Information Technology , vol.11 , Issue.3 , pp. 163-174
    • Mooradian, N.1
  • 313
    • 81355155302 scopus 로고    scopus 로고
    • Keys for securing private information in an edms
    • Mooradian, N. 2008. "Keys for Securing Private Information in an EDMS," Information Management Journal (42:2), pp. 42-50.
    • (2008) Information Management Journal , vol.42 , Issue.2 , pp. 42-50
    • Mooradian, N.1
  • 314
    • 14544301547 scopus 로고    scopus 로고
    • Do consumers understand The role of privacy seals in E-commerce?
    • DOI 10.1145/1047671.1047674
    • Moores, T. 2005. "Do Consumers Understand the Role of Privacy Seals in E-Commerce?," Communications of the ACM (48:3), pp. 86-91. (Pubitemid 40303816)
    • (2005) Communications of the ACM , vol.48 , Issue.3 , pp. 86-91
    • Moores, T.1
  • 315
    • 29844455709 scopus 로고    scopus 로고
    • Do privacy seals in e-commerce really work?
    • Moores, T. T., and Dhillon, G. 2003. "Do Privacy Seals in e-Commerce Really Work?," Communications of the ACM (46:12), pp. 265-271.
    • (2003) Communications of the ACM , vol.46 , Issue.12 , pp. 265-271
    • Moores, T.T.1    Dhillon, G.2
  • 316
    • 0038910354 scopus 로고
    • Information privacy and performance appraisal: An examination of employee perceptions and reactions
    • Mossholder, K. W., Giles, W. F., and Wesolowski, M. A. 1991. "Information Privacy and Performance Appraisal: An Examination of Employee Perceptions and Reactions," Journal of Business Ethics (10:2), pp. 151-156.
    • (1991) Journal of Business Ethics , vol.10 , Issue.2 , pp. 151-156
    • Mossholder, K.W.1    Giles, W.F.2    Wesolowski, M.A.3
  • 317
    • 49049120098 scopus 로고    scopus 로고
    • Subject-wise policy based access control mechanism for protection of personal information
    • Y. J. Na (ed.), Los Alamitos, CA: IEEE Computer Society Press
    • Mun, H. J., Um, N. K., Sun, N., Li, Y. Z., and Lee, S. 2007. "Subject-Wise Policy Based Access Control Mechanism for Protection of Personal Information," in Proceedings of the International Conference on Convergence Information Technology, Y. J. Na (ed.), Los Alamitos, CA: IEEE Computer Society Press, pp. 2242-2247.
    • (2007) Proceedings of the International Conference on Convergence Information Technology , pp. 2242-2247
    • Mun, H.J.1    Um, N.K.2    Sun, N.3    Li, Y.Z.4    Lee, S.5
  • 320
    • 0037310460 scopus 로고    scopus 로고
    • Recognizing the societal value in information privacy
    • Nehf, J. P. 2003. "Recognizing the Societal Value in Information Privacy," Washington Law Review (78:1), pp. 1-91. (Pubitemid 36420127)
    • (2003) Washington Law Review , vol.78 , Issue.1 , pp. 1-91
    • Nehf, J.P.1
  • 322
    • 81355166350 scopus 로고    scopus 로고
    • The digital persona and trust bank: A privacy management framework
    • Nilakanta, S., and Scheibe, K. 2005. "The Digital Persona and Trust Bank: A Privacy Management Framework," Journal of Information Privacy & Security (1:4), pp. 3-21.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.4 , pp. 3-21
    • Nilakanta, S.1    Scheibe, K.2
  • 323
    • 85138741914 scopus 로고    scopus 로고
    • The role of trust and assurance services in electronic channels: An exploratory study
    • P. De and J. I. DeGross (eds.), Charlotte, NC, December 12-15
    • Noeteberg, A., Christiaanse, E., and Wallage, P. 1999. "The Role of Trust and Assurance Services in Electronic Channels: An Exploratory Study," in Proceedings of the 20th International Conference on Information Systems, P. De and J. I. DeGross (eds.), Charlotte, NC, December 12-15, pp. 472-478.
    • (1999) Proceedings of the 20th International Conference on Information Systems , pp. 472-478
    • Noeteberg, A.1    Christiaanse, E.2    Wallage, P.3
  • 324
    • 34748896579 scopus 로고    scopus 로고
    • Privacy attitudes and privacy-related behavior
    • Norberg, P. A., and Horne, D. R. 2007. "Privacy Attitudes and Privacy-Related Behavior," Psychology & Marketing (24:10), pp. 829-847.
    • (2007) Psychology & Marketing , vol.24 , Issue.10 , pp. 829-847
    • Norberg, P.A.1    Horne, D.R.2
  • 325
    • 33847382472 scopus 로고    scopus 로고
    • The privacy paradox: Personal information disclosure intentions versus behaviors
    • Norberg, P. A., Horne, D. R., and Horne, D. A. 2007. "The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors," The Journal of Consumer Affairs (41:1), pp. 100-126.
    • (2007) The Journal of Consumer Affairs , vol.41 , Issue.1 , pp. 100-126
    • Norberg, P.A.1    Horne, D.R.2    Horne, D.A.3
  • 326
    • 2342496000 scopus 로고    scopus 로고
    • Direct marketing and the use of individual-level consumer information: Determining how and when 'privacy' matters
    • Nowak, G. J., and Phelps, J. 1997. "Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When 'Privacy' Matters," Journal of Interactive Marketing (11:4), pp. 46-60.
    • (1997) Journal of Interactive Marketing , vol.11 , Issue.4 , pp. 46-60
    • Nowak, G.J.1    Phelps, J.2
  • 327
    • 0018497180 scopus 로고
    • Freedom of information, privacy, and information control: A contemporary administrative dilemma
    • O'Brien, D. M. 1979. "Freedom of Information, Privacy, and Information Control: A Contemporary Administrative Dilemma," Public Administration Review (39:4), pp. 323-328.
    • (1979) Public Administration Review , vol.39 , Issue.4 , pp. 323-328
    • O'Brien, D.M.1
  • 329
    • 77957594024 scopus 로고    scopus 로고
    • Broken promises of privacy: Responding to the surprising failure of anonymization
    • Ohm, P. 2010. "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," UCLA Law Review (57:6), pp. 1701-1777.
    • (2010) UCLA Law Review , vol.57 , Issue.6 , pp. 1701-1777
    • Ohm, P.1
  • 330
    • 85016340804 scopus 로고    scopus 로고
    • Email and internet monitoring in the workplace: Information privacy and contracting-out
    • Oliver, H. 2002. "Email and Internet Monitoring in the Workplace: Information Privacy and Contracting-Out," The Industrial Law Journal (31:4), pp. 321-352.
    • (2002) The Industrial Law Journal , vol.31 , Issue.4 , pp. 321-352
    • Oliver, H.1
  • 333
    • 84870966516 scopus 로고    scopus 로고
    • The study on the relationship between privacy concerns and information systems effectiveness
    • Phoenix, AZ, December
    • Park, I. 2009. "The Study on the Relationship between Privacy Concerns and Information Systems Effectiveness," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
    • (2009) Proceedings of the 30th International Conference on Information Systems , pp. 15-18
    • Park, I.1
  • 335
    • 33847764616 scopus 로고    scopus 로고
    • Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
    • Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective," MIS Quarterly (31:1), pp. 105-136.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 105-136
    • Pavlou, P.A.1    Liang, H.2    Xue, Y.3
  • 336
    • 70149099545 scopus 로고    scopus 로고
    • Information privacy research: Framework for integrating multiple publics, information channels, and responses
    • Peltier, J., Milne, G., and Phelps, J. 2009. "Information Privacy Research: Framework for Integrating Multiple Publics, Information Channels, and Responses," Journal of Interactive Marketing (23:2), pp. 191-205.
    • (2009) Journal of Interactive Marketing , vol.23 , Issue.2 , pp. 191-205
    • Peltier, J.1    Milne, G.2    Phelps, J.3
  • 337
    • 77954600726 scopus 로고    scopus 로고
    • Teaching information privacy in marketing courses: Key educational issues for principles of marketing and elective marketing courses
    • Peltier, J., Milne, G., Phelps, J., and Barrett, J. 2010. "Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses," Journal of Marketing Education (32:2), pp. 224-246.
    • (2010) Journal of Marketing Education , vol.32 , Issue.2 , pp. 224-246
    • Peltier, J.1    Milne, G.2    Phelps, J.3    Barrett, J.4
  • 340
    • 10444255427 scopus 로고    scopus 로고
    • Internet privacy policies: A review and survey of the fortune 50
    • Peslak, A. R. 2005. "Internet Privacy Policies: A Review and Survey of the Fortune 50," Information Resources Management Journal (18:1), pp. 29-41.
    • (2005) Information Resources Management Journal , vol.18 , Issue.1 , pp. 29-41
    • Peslak, A.R.1
  • 341
    • 33749399316 scopus 로고    scopus 로고
    • Internet privacy policies of the largest international companies
    • Peslak, A. R. 2006. "Internet Privacy Policies of the Largest International Companies," Journal of Electronic Commerce in Organizations (4:3), pp. 46-62. (Pubitemid 44506508)
    • (2006) Journal of Electronic Commerce in Organizations , vol.4 , Issue.3 , pp. 46-62
    • Peslak, A.R.1
  • 343
    • 0348028757 scopus 로고
    • Your life as an open book: Has technology rendered personal privacy virtually obsolete?
    • Petersen, S. B. 1995. "Your Life as an Open Book: Has Technology Rendered Personal Privacy Virtually Obsolete?," Federal Communications Law Journal (48:1), pp. 163-186.
    • (1995) Federal Communications Law Journal , vol.48 , Issue.1 , pp. 163-186
    • Petersen, S.B.1
  • 344
    • 34548433382 scopus 로고    scopus 로고
    • What's wrong with online privacy policies?
    • DOI 10.1145/1284621.1284627
    • Pollach, I. 2007. "What's Wrong with Online Privacy Policies?," Communications of the ACM (50:9), pp. 103-108. (Pubitemid 47366821)
    • (2007) Communications of the ACM , vol.50 , Issue.9 , pp. 103-108
    • Pollach, I.1
  • 345
    • 81355125975 scopus 로고    scopus 로고
    • The efficacy of emphasizing a legal system approach to computer security
    • Post, G. V., and Kagan, A. 2006. "The Efficacy of Emphasizing a Legal System Approach to Computer Security," Journal of Information Privacy & Security (2:4), pp. 3-27.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.4 , pp. 3-27
    • Post, G.V.1    Kagan, A.2
  • 347
    • 72949100730 scopus 로고    scopus 로고
    • Consumer acceptance of rfid-enabled services: A model of multiple attitudes, perceived system characteristics and individual traits
    • Pramatari, K., and Theotokis, A. 2009. "Consumer Acceptance of RFID-Enabled Services: A Model of Multiple Attitudes, Perceived System Characteristics and Individual Traits," European Journal of Information Systems (18:6), pp. 541-552.
    • (2009) European Journal of Information Systems , vol.18 , Issue.6 , pp. 541-552
    • Pramatari, K.1    Theotokis, A.2
  • 348
    • 81055127589 scopus 로고    scopus 로고
    • Privacy implications of technology innovation processes
    • D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14
    • Prince, K., and Barrett, M. 2005. "Privacy Implications of Technology Innovation Processes," in Proceedings of the 26th International Conference on Information Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, pp. 423-433.
    • (2005) Proceedings of the 26th International Conference on Information Systems , pp. 423-433
    • Prince, K.1    Barrett, M.2
  • 349
    • 79961058252 scopus 로고    scopus 로고
    • Protecting personal information using generally accepted privacy principles (gapp) and continuous control monitoring to enhance corporate governance
    • Prosch, M. 2008. "Protecting Personal Information Using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to Enhance Corporate Governance," International Journal of Disclosure and Governance (5:2), pp. 153-166.
    • (2008) International Journal of Disclosure and Governance , vol.5 , Issue.2 , pp. 153-166
    • Prosch, M.1
  • 350
    • 50749133808 scopus 로고
    • Security and privacy
    • Pujals, J. M. 1993. "Security and Privacy," Computers & Security (12:1), pp. 22-27.
    • (1993) Computers & Security , vol.12 , Issue.1 , pp. 22-27
    • Pujals, J.M.1
  • 351
    • 80052507069 scopus 로고    scopus 로고
    • Information privacy and employee records in australia: Which way forward?
    • Pyman, A., O'Rourke, A., and Teicher, J. 2008. "Information Privacy and Employee Records in Australia: Which Way Forward?," Australian Bulletin of Labour (34:1), pp. 28-46.
    • (2008) Australian Bulletin of Labour , vol.34 , Issue.1 , pp. 28-46
    • Pyman, A.1    O'Rourke, A.2    Teicher, J.3
  • 352
    • 40949085962 scopus 로고    scopus 로고
    • Research on context-aware architecture for personal information privacy protection
    • DOI 10.1109/ICSMC.2007.4414056, 4414056, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007
    • Qingsheng, Z., Yong, Q., Jizhong, Z., Di, H., and Yujie, N. 2007. "Research on Context-Aware Architecture for Personal Information Privacy Protection," in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montrea, Quebec, Canada, October 7-10, pp. 3912-3916. (Pubitemid 351410186)
    • (2007) Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics , pp. 3912-3916
    • Qingsheng, Z.1    Yong, Q.2    Jizhong, Z.3    Di, H.4    Yujie, N.5
  • 353
    • 81355166348 scopus 로고    scopus 로고
    • Svdc: Preserving privacy in clustering using singular value decomposition
    • Rajavel, M., and Karuppuswamy, D. 2008. "SVDC: Preserving Privacy in Clustering Using Singular Value Decomposition," Journal of Information Privacy & Security (4:2), pp. 40-54.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.2 , pp. 40-54
    • Rajavel, M.1    Karuppuswamy, D.2
  • 354
    • 77954948284 scopus 로고    scopus 로고
    • Privacy Is Dead, Get over It! Information Privacy and the Dream of a Risk-Free Society
    • Rauhofer, J. 2008. "Privacy Is Dead, Get Over It! Information Privacy and the Dream of a Risk-Free Society," Information & Communications Technology Law (17:3), pp. 185-197.
    • (2008) Information & Communications Technology Law , vol.17 , Issue.3 , pp. 185-197
    • Rauhofer, J.1
  • 355
    • 34547169479 scopus 로고    scopus 로고
    • A grounded theory of information sharing behavior in a personal learning space
    • DOI 10.1145/1180875.1180946, Proceedings of the 20th Anniversary ACM Conference on Computer Supported Cooperative Work, CSCW 2006
    • Razavi, M. N., and Iverson, L. 2006. "A Grounded Theory of Information Sharing Behavior in a Personal Learning Space," in Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work, Banff, Alberta, Canada, November 4-8, pp. 459-468. (Pubitemid 47112436)
    • (2006) Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW , pp. 459-468
    • Razavi, M.N.1    Iverson, L.2
  • 356
    • 77950485034 scopus 로고    scopus 로고
    • A framework for privacy support in group information management systems
    • Sanibel Island, FL, November 4-7
    • Razavi, M. N., and Iverson, L. 2007. "A Framework for Privacy Support in Group Information Management Systems," in GROUP '07 Doctoral Consortium Papers, Sanibel Island, FL, November 4-7, pp. 1-2.
    • (2007) GROUP '07 Doctoral Consortium Papers , pp. 1-2
    • Razavi, M.N.1    Iverson, L.2
  • 358
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Reagle, J., and Cranor, L. F. 1999. "The Platform for Privacy Preferences," Communications of the ACM (42:2), pp. 48-51.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 48-51
    • Reagle, J.1    Cranor, L.F.2
  • 360
    • 67650080222 scopus 로고    scopus 로고
    • Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy
    • L. Korba, S. Marsh, and R. Safavi-Naini (eds.), Fredericton, New Brunswick, Canada, October 1-3
    • Reddy, K., Venter, H. S., Olivier, M., and Currie, I. 2008. "Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy," in Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, L. Korba, S. Marsh, and R. Safavi-Naini (eds.), Fredericton, New Brunswick, Canada, October 1-3, pp. 56-64.
    • (2008) Proceedings of the Sixth Annual Conference on Privacy, Security and Trust , pp. 56-64
    • Reddy, K.1    Venter, H.S.2    Olivier, M.3    Currie, I.4
  • 361
    • 78549275007 scopus 로고    scopus 로고
    • Federal security breach notifications: Politics and approaches
    • Regan, P. 2009. "Federal Security Breach Notifications: Politics and Approaches," Berkeley Technology Law Journal (24:3), pp. 1103-1132.
    • (2009) Berkeley Technology Law Journal , vol.24 , Issue.3 , pp. 1103-1132
    • Regan, P.1
  • 362
    • 81355166330 scopus 로고    scopus 로고
    • Information security: Risks and solutions
    • Reid, L. A. 2006a. "Information Security: Risks and Solutions," Journal of Information Privacy & Security (2:1), pp. 1-2.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.1 , pp. 1-2
    • Reid, L.A.1
  • 364
    • 81355125959 scopus 로고    scopus 로고
    • Expert opinion: Amanda M. Hubbard, J. D. Fulbright scholar former trial attorney, computer crime and intellectual property section
    • U.S. Department of Justice
    • Reid, L. A. 2006b. "Expert Opinion: Amanda M. Hubbard, J. D. Fulbright Scholar Former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice," Journal of Information Privacy & Security (2:1), pp. 47-56.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.1 , pp. 47-56
    • Reid, L.A.1
  • 365
    • 0344515598 scopus 로고    scopus 로고
    • Perceptions of Customer Service, Information Privacy, and Product Quality from Semiotic Design Features in an Online Web Store
    • Resnick, M. L., and Montania, R. 2003. "Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features
    • (2003) International Journal of Human-Computer Interaction , vol.16 , Issue.2 , pp. 211-234
    • Resnick, M.L.1    Montania, R.2
  • 367
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • Rindfleisch, T. C. 1997. "Privacy, Information Technology, and Health Care," Communications of the ACM (40:8), pp. 92-100.
    • (1997) Communications of the ACM , vol.40 , Issue.8 , pp. 92-100
    • Rindfleisch, T.C.1
  • 368
    • 0035498784 scopus 로고    scopus 로고
    • Seeking explanation in theory: Reflections on the social practices of organizations that distribute public use microdata files for research purposes
    • DOI 10.1002/asi.1183
    • Robbin, A., and Koball, H. 2001. "Seeking Explanation in Theory: Reflections on the Social Practices of Organizations That Distribute Public Use Microdata Files for Research Purposes," Journal of the American Society for Information Science and Technology (52:13), pp. 1169-1189. (Pubitemid 33028598)
    • (2001) Journal of the American Society for Information Science and Technology , vol.52 , Issue.13 , pp. 1169-1189
    • Robbin, A.1    Koball, H.2
  • 369
    • 60849129603 scopus 로고    scopus 로고
    • Security breaches, privacy intrusions, and reporting of computer crimes
    • Roberts, G. K. 2005. "Security Breaches, Privacy Intrusions, and Reporting of Computer Crimes," Journal of Information Privacy & Security (1:4), pp. 22-32.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.4 , pp. 22-32
    • Roberts, G.K.1
  • 370
    • 4043101215 scopus 로고    scopus 로고
    • Just what the doctor ordered. The role of information sensitivity and trust in reducing medical information privacy concern
    • DOI 10.1016/S0148-2963(02)00345-4, PII S0148296302003454
    • Rohm, A. J., and Milne, G. R. 2004. "Just What the Doctor Ordered: The Role of Information Sensitivity and Trust in Reducing Medical Information Privacy Concern," Journal of Business Research (57:9), pp. 1000-1011. (Pubitemid 39072429)
    • (2004) Journal of Business Research , vol.57 , Issue.9 , pp. 1000-1011
    • Rohm, A.J.1    Milne, G.R.2
  • 371
    • 33644699528 scopus 로고    scopus 로고
    • An examination of the concern for information privacy in the New Zealand regulatory context
    • DOI 10.1016/j.im.2005.08.002, PII S0378720605000686
    • Rose, E. A. 2006. "An Examination of the Concern for Information Privacy in the New Zealand Regulatory Context," Information & Management (43:3), pp. 322-335. (Pubitemid 43333004)
    • (2006) Information and Management , vol.43 , Issue.3 , pp. 322-335
    • Rose, E.A.1
  • 372
    • 85006640312 scopus 로고    scopus 로고
    • Information protection at telecommunications firms: Human resource management strategies and their impact on organizational justice
    • Ross, W., Meyer, C., Chen, J., and Keaton, P. 2009. "Information Protection at Telecommunications Firms: Human Resource Management Strategies and Their Impact on Organizational Justice," Journal of Information Privacy & Security (5:1), pp. 49-77.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.1 , pp. 49-77
    • Ross, W.1    Meyer, C.2    Chen, J.3    Keaton, P.4
  • 373
    • 0038083524 scopus 로고    scopus 로고
    • Transborder data flows: Adoption and diffusion of protective legislation in the global electronic commerce environment
    • Rudraswamy, V., and Vance, D. A. 2001. "Transborder Data Flows: Adoption and Diffusion of Protective Legislation in the Global Electronic Commerce Environment," Logistics Information Management (14:1/2), pp. 127-137.
    • (2001) Logistics Information Management , vol.14 , Issue.1-2 , pp. 127-137
    • Rudraswamy, V.1    Vance, D.A.2
  • 375
    • 65349181019 scopus 로고    scopus 로고
    • Consumerism and information privacy: How upton sinclair can again save us from ourselves
    • Sachs, B. 2009. "Consumerism and Information Privacy: How Upton Sinclair Can Again Save Us from Ourselves," Virginia Law Review (95:1), pp. 205-252.
    • (2009) Virginia Law Review , vol.95 , Issue.1 , pp. 205-252
    • Sachs, B.1
  • 376
  • 377
    • 0345792391 scopus 로고    scopus 로고
    • Privacy as intellectual property?
    • Samuelson, P. 2000. "Privacy as Intellectual Property?," Stanford Law Review (52:5), pp. 1125-1173.
    • (2000) Stanford Law Review , vol.52 , Issue.5 , pp. 1125-1173
    • Samuelson, P.1
  • 378
    • 81355125967 scopus 로고    scopus 로고
    • Expert opinion: Critical thinker series: An interview with ian browde director of strategy and business development, enterprise solutions division, nokia, inc
    • Sánchez, C. 2005. "Expert Opinion: Critical Thinker Series: An Interview with Ian Browde Director of Strategy and Business Development, Enterprise Solutions Division, Nokia, Inc," Journal of Information Privacy & Security (1:1), pp. 4-9.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.1 , pp. 4-9
    • Sánchez, C.1
  • 379
    • 33751188289 scopus 로고    scopus 로고
    • Privacy, fair information practices and the fortune 500: The virtual reality of compliance
    • Schwaig, K. S., Kane, G. C., and Storey, V. C. 2005. "Privacy, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance," The Data Base for Advances In Information Systems (36:1), pp. 49-63. (Pubitemid 44775666)
    • (2005) Data Base for Advances in Information Systems , vol.36 , Issue.1 , pp. 49-63
    • Schwaig, K.S.1    Kane, G.C.2    Storey, V.C.3
  • 380
    • 33749622781 scopus 로고    scopus 로고
    • Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures?
    • DOI 10.1016/j.im.2006.07.003, PII S037872060600070X
    • Schwaig, K. S., Kane, G. C., and Storey, V. C. 2006. "Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?," Information & Management (43:7), pp. 805-820. (Pubitemid 44548297)
    • (2006) Information and Management , vol.43 , Issue.7 , pp. 805-820
    • Schwaig, K.S.1    Kane, G.C.2    Storey, V.C.3
  • 381
    • 0041052041 scopus 로고    scopus 로고
    • Free speech vs. Information privacy: Eugene volokh's first amendment jurisprudence
    • Schwartz, P. M. 2000. "Free Speech Vs. Information Privacy: Eugene Volokh's First Amendment Jurisprudence," Stanford Law Review (52:5), pp. 1559-1572.
    • (2000) Stanford Law Review , vol.52 , Issue.5 , pp. 1559-1572
    • Schwartz, P.M.1
  • 382
    • 0038648204 scopus 로고    scopus 로고
    • Information technology and the social construction of information privacy
    • DOI 10.1016/S0278-4254(01)00037-0, PII S0278425401000370
    • Shapiro, B., and Baker, C. R. 2001. "Information Technology and the Social Construction of Information Privacy," Journal of Accounting and Public Policy (20:4,5), pp. 295-322. (Pubitemid 33623633)
    • (2001) Journal of Accounting and Public Policy , vol.20 , Issue.4-5 , pp. 295-322
    • Shapiro, B.1    Baker, C.R.2
  • 383
    • 81355125970 scopus 로고    scopus 로고
    • Exploring the role of identification in the privacy decisions of webmasters
    • J. I. DeGross, R. Hirschheim, and M. Newman, (eds.), Helsinki, Finland, December 13-16
    • Shaw, T. 1998. "Exploring the Role of Identification in the Privacy Decisions of Webmasters," in Proceedings of the 19th International Conference on Information Systems, J. I. DeGross, R. Hirschheim, and M. Newman, (eds.), Helsinki, Finland, December 13-16, pp. 358-364.
    • (1998) Proceedings of the 19th International Conference on Information Systems , pp. 358-364
    • Shaw, T.1
  • 384
    • 29144492869 scopus 로고    scopus 로고
    • In poor health: An assessment of privacy policies at direct-to-consumer web sites
    • DOI 10.1509/jppm.2005.24.2.273
    • Sheehan, K. B. 2005. "In Poor Health: An Assessment of Privacy Policies at Direct-to-Consumer Web Sites," Journal of Public Policy & Marketing (24:2), pp. 273-283. (Pubitemid 41806826)
    • (2005) Journal of Public Policy and Marketing , vol.24 , Issue.2 , pp. 273-283
    • Sheehan, K.B.1
  • 385
    • 33644526852 scopus 로고    scopus 로고
    • Managerial issues for expanding into international web-based electronic commerce
    • Sheldon, L. A., and Strader, T. J. 2002. "Managerial Issues for Expanding into International Web-Based Electronic Commerce," S.A.M. Advanced Management Journal 67: 3 22-30.
    • (2002) S.A.M Advanced Management Journal , vol.67 , Issue.3 , pp. 22-30
    • Sheldon, L.A.1    Strader, T.J.2
  • 388
    • 77955446739 scopus 로고    scopus 로고
    • Misuse cases for identifying system dependability threats
    • Sindre, G., and Opdahl, A. 2008. "Misuse Cases for Identifying System Dependability Threats," Journal of Information Privacy & Security (4:2), pp. 3-22.
    • (2008) Journal of Information Privacy & Security , vol.4 , Issue.2 , pp. 3-22
    • Sindre, G.1    Opdahl, A.2
  • 389
    • 81355166341 scopus 로고    scopus 로고
    • United states cases of employee e-mail privacy intrusions: Do you really know the legal consequences
    • J. I. DeGross, S. L. Jarvenpaa, and A. Srinivasan (eds.), Cleveland, OH, December 16-18
    • Sipior, J., and Ward, B. 1996. "United States Cases of Employee E-Mail Privacy Intrusions: Do You Really Know the Legal Consequences," in Proceedings of the 17th International Conference on Information Systems, J. I. DeGross, S. L. Jarvenpaa, and A. Srinivasan (eds.), Cleveland, OH, December 16-18, pp. 223-234.
    • (1996) Proceedings of the 17th International Conference on Information Systems , pp. 223-234
    • Sipior, J.1    Ward, B.2
  • 392
    • 81355125963 scopus 로고    scopus 로고
    • Security for a privacy augmented collaborative environment with a combined authentication scheme encapsulation
    • Istanbul, Turkey
    • Skinner, G. 2008. "Security for a Privacy Augmented Collaborative Environment with a Combined Authentication Scheme Encapsulation," in Proceedings of the 8th WSEAS International Conference on Applied Computing Conference, Istanbul, Turkey, pp. 145-151.
    • (2008) Proceedings of the 8th WSEAS International Conference on Applied Computing Conference , pp. 145-151
    • Skinner, G.1
  • 393
    • 34748905388 scopus 로고    scopus 로고
    • An environmentally adaptive conceptual framework for addressing information privacy issues in digital ecosystems
    • DOI 10.1109/DEST.2007.371988, 4233722, Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007
    • Skinner, G., and Chang, E. 2007. "An Environmentally Adaptive Conceptual Framework for Addressing Information Privacy Issues in Digital Ecosystems," in Proceedings of the Inaugural IEEE-IES International Digital EcoSystems and Technologies Conference, Cairns, Australia, February 21-23, pp. 302-307. (Pubitemid 47468330)
    • (2007) Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007 , pp. 302-307
    • Skinner, G.D.1    Chang, E.2
  • 395
    • 51349107985 scopus 로고    scopus 로고
    • Integration of situational and reward elements for fair privacy principles and preferences (f3p)
    • Mumbai, India, December 15-17
    • Skinner, G., Han, S., and Chang, E. 2006b. "Integration of Situational and Reward Elements for Fair Privacy Principles and Preferences (F3P)," in Proceedings of the IEEE International Conference on Industrial Technology, Mumbai, India, December 15-17, pp. 3078-3082.
    • (2006) Proceedings of the IEEE International Conference on Industrial Technology , pp. 3078-3082
    • Skinner, G.1    Han, S.2    Chang, E.3
  • 397
    • 0035631803 scopus 로고    scopus 로고
    • Information privacy and marketing: What the u.s. should (and shouldn't) learn from europe
    • Smith, H. J. 2001. "Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe," California Management Review (43:2), pp. 8-33.
    • (2001) California Management Review , vol.43 , Issue.2 , pp. 8-33
    • Smith, H.J.1
  • 398
    • 37849054139 scopus 로고    scopus 로고
    • Information privacy and its management
    • Smith, H. J. 2004. "Information Privacy and Its Management," MIS Quarterly Executive (3:4), pp. 291-313.
    • (2004) MIS Quarterly Executive , vol.3 , Issue.4 , pp. 291-313
    • Smith, H.J.1
  • 399
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research: An interdisciplinary review
    • Smith, H. J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review," MIS Quarterly (35:4), pp. 989-1016.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1016
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 400
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly (20:2), pp. 167-196.
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 167-196
    • Smith, H.J.1    Milberg, S.J.2    Burke, S.J.3
  • 401
    • 33644925852 scopus 로고    scopus 로고
    • A taxonomy of privacy
    • Solove, D. J. 2006. "A Taxonomy of Privacy," University of Pennsylvania Law Review (154:3), pp. 477-564. (Pubitemid 43385739)
    • (2006) University of Pennsylvania Law Review , vol.154 , Issue.3 , pp. 477-564
    • Solove, D.J.1
  • 402
    • 50249151484 scopus 로고    scopus 로고
    • Internet users' information privacy-protective responses: A taxonomy and a nomological model
    • Son, J. Y., and Kim, S. S. 2008. "Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model," MIS Quarterly (32:3), pp. 503-529.
    • (2008) MIS Quarterly , vol.32 , Issue.3 , pp. 503-529
    • Son, J.Y.1    Kim, S.S.2
  • 405
    • 0036004583 scopus 로고    scopus 로고
    • An empirical examination of the concern for information privacy instrument
    • Stewart, K. A., and Segars, A. H. 2002. "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research (13:1), pp. 36-49.
    • (2002) Information Systems Research , vol.13 , Issue.1 , pp. 36-49
    • Stewart, K.A.1    Segars, A.H.2
  • 406
    • 81355166336 scopus 로고    scopus 로고
    • Developing trust in m-commerce: A vendor and certificate authority model
    • Stewart, N., Spencer, J., and Melby, N. 2006. "Developing Trust in M-Commerce: A Vendor and Certificate Authority Model," Journal of Information Privacy & Security (2:2), pp. 51-58.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.2 , pp. 51-58
    • Stewart, N.1    Spencer, J.2    Melby, N.3
  • 407
  • 411
    • 81355136836 scopus 로고    scopus 로고
    • Business associates in the national health information network: Implications for medical information privacy
    • Szewczak, E., and Snodgrass, C. 2009. "Business Associates in the National Health Information Network: Implications for Medical Information Privacy," International Journal of E-Business Research (5:2), pp. 48-62.
    • (2009) International Journal of E-Business Research , vol.5 , Issue.2 , pp. 48-62
    • Szewczak, E.1    Snodgrass, C.2
  • 414
    • 84928601187 scopus 로고    scopus 로고
    • What do they want? Motivating consumers to disclose personal information to internet businesses
    • L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
    • Tam, E. C., Hui, K. L., and Tan, B. 2002. "What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses," in 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 11-21.
    • (2002) 23rd International Conference on Information Systems , pp. 11-21
    • Tam, E.C.1    Hui, K.L.2    Tan, B.3
  • 417
    • 81355155281 scopus 로고    scopus 로고
    • Explorative assessment of internet hacking: An agent-based modeling approach
    • Tang, Z., Bagchi, K., and Jain, A. 2009. "Explorative Assessment of Internet Hacking: An Agent-Based Modeling Approach," Journal of Information Privacy & Security (5:2), pp. 42-64.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.2 , pp. 42-64
    • Tang, Z.1    Bagchi, K.2    Jain, A.3
  • 418
    • 0033877785 scopus 로고    scopus 로고
    • Managing the costs of informational privacy: Bundling as a strategy in the individual health insurance market
    • Los Alamitos, CA: IEEE Computer Society Press
    • Thatcher, M. E., and Clemons, E. K. 2000. "Managing the Costs of Informational Privacy: Bundling as a Strategy in the Individual Health Insurance Market," in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
    • (2000) Proceedings of the 33rd Annual Hawaii International Conference on System Sciences
    • Thatcher, M.E.1    Clemons, E.K.2
  • 419
    • 34547663047 scopus 로고    scopus 로고
    • RFID, privacy and the perception of risk: A strategic framework
    • DOI 10.1016/j.jsis.2007.05.006, PII S0963868707000248, Security and Privacy
    • Thiesse, F. 2007. "RFID, Privacy and the Perception of Risk: A Strategic Framework," The Journal of Strategic Information Systems (16:2), pp. 214-232. (Pubitemid 47223695)
    • (2007) Journal of Strategic Information Systems , vol.16 , Issue.2 , pp. 214-232
    • Thiesse, F.1
  • 422
    • 71849106921 scopus 로고    scopus 로고
    • Examining customer privacy concerns in dealings with financial institutions
    • Tsarenko, Y., and Tojib, D. R. 2009. "Examining Customer Privacy Concerns in Dealings with Financial Institutions," The Journal of Consumer Marketing (26:7), pp. 468-476.
    • (2009) The Journal of Consumer Marketing , vol.26 , Issue.7 , pp. 468-476
    • Tsarenko, Y.1    Tojib, D.R.2
  • 423
    • 85138707710 scopus 로고    scopus 로고
    • An empirical investigation of virtual communities and trust
    • V. Storey, S. Sarkar, and J. I. DeGross (eds.), New Orleans, LA, December 16-19
    • Tung, L., Tan, P., Chia, P., Koh, Y., and Yeo, H.-L. 2001. "An empirical Investigation of Virtual Communities and Trust," in Proceedings of the 22nd International Conference on Information Systems, V. Storey, S. Sarkar, and J. I. DeGross (eds.), New Orleans, LA, December 16-19, pp. 307-319.
    • (2001) Proceedings of the 22nd International Conference on Information Systems , pp. 307-319
    • Tung, L.1    Tan, P.2    Chia, P.3    Koh, Y.4    Yeo, H.-L.5
  • 424
    • 0035780881 scopus 로고    scopus 로고
    • Privacy and security concerns as major barriers for e-commerce: A survey study
    • DOI 10.1108/EUM0000000005808
    • Udo, G. J. 2001. "Privacy and Security Concerns as Major Barriers for E-Commerce: A Survey Study," Information Management & Computer Security (9:4), pp. 165-174. (Pubitemid 35355405)
    • (2001) Information Management and Computer Security , vol.9 , Issue.4 , pp. 165-174
    • Udo, G.J.1
  • 425
    • 81355155288 scopus 로고    scopus 로고
    • Information privacy and internet company insolvencies: When a business fails, does divestiture or bankruptcy better protect the consumer?
    • Usmani, F. Z. 2003. "Information Privacy and Internet Company Insolvencies: When a Business Fails, Does Divestiture or Bankruptcy Better Protect the Consumer?," Fordham Journal of Corporate & Financial Law (8:1), pp. 273-331.
    • (2003) Fordham Journal of Corporate & Financial Law , vol.8 , Issue.1 , pp. 273-331
    • Usmani, F.Z.1
  • 427
    • 8644291627 scopus 로고    scopus 로고
    • PIDS: A privacy intrusion detection system
    • DOI 10.1108/10662240410566953
    • Venter, H. S., Olivier, M. S., and Eloff, J. H. P. 2004. "PIDS: A Privacy Intrusion Detection System " Internet Research (14:5), pp. 360-365. (Pubitemid 39499379)
    • (2004) Internet Research , vol.14 , Issue.5 , pp. 360-365
    • Venter, H.S.1    Olivier, M.S.2    Eloff, J.H.P.3
  • 428
    • 0347315060 scopus 로고    scopus 로고
    • Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
    • Volokh, E. 2000a. "Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You," Stanford Law Review (52:5), pp. 1049-1124.
    • (2000) Stanford Law Review , vol.52 , Issue.5 , pp. 1049-1124
    • Volokh, E.1
  • 429
    • 0003034904 scopus 로고    scopus 로고
    • Personalization and privacy
    • Volokh, E. 2000b. "Personalization and Privacy," Communications of the ACM (43:8), pp. 84-88.
    • (2000) Communications of the ACM , vol.43 , Issue.8 , pp. 84-88
    • Volokh, E.1
  • 430
    • 81355166334 scopus 로고    scopus 로고
    • Profiling user behavior for intrusion detection using item response modeling
    • Wang, Y., Melby, N., and Kim, I. 2007. "Profiling User Behavior for Intrusion Detection Using Item Response Modeling," Journal of Information Privacy & Security (3:4), pp. 3-17.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.4 , pp. 3-17
    • Wang, Y.1    Melby, N.2    Kim, I.3
  • 431
    • 77955101093 scopus 로고    scopus 로고
    • An xml-based intelligent agent protocol design framework for individualized privacy postures within trusted network environments
    • Warkentin, M., and Johnston, A. C. 2006. "An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments," Journal of Information Privacy & Security (2:1), pp. 16-28.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.1 , pp. 16-28
    • Warkentin, M.1    Johnston, A.C.2
  • 432
    • 84986156413 scopus 로고    scopus 로고
    • Right to privacy? The protection of personal data in UK public organisations
    • Warren, A. 2002. "Right to Privacy? The Protection of Personal Data in UK Public Organisations," New Library World (103:11/12), pp. 446-456. (Pubitemid 36063306)
    • (2002) New Library World , vol.103 , Issue.1182-1183 , pp. 446-456
    • Warren, A.1
  • 433
    • 81355166337 scopus 로고    scopus 로고
    • Groundswell: Winning in a world transformed by social technologies
    • Weaver, E. 2010. "Groundswell: Winning in a World Transformed by Social Technologies," Journal of Information Privacy & Security (6:1), pp. 75-78.
    • (2010) Journal of Information Privacy & Security , vol.6 , Issue.1 , pp. 75-78
    • Weaver, E.1
  • 434
    • 0000041375 scopus 로고    scopus 로고
    • Desktop videoconferencing: Experiences of complete users, wary users, and non-users
    • Webster, J. 1998. "Desktop Videoconferencing: Experiences of Complete Users, Wary Users, and Non-Users," MIS Quarterly (22:3), pp. 257-286. (Pubitemid 128684568)
    • (1998) MIS Quarterly: Management Information Systems , vol.22 , Issue.3 , pp. 257-286
    • Webster, J.1
  • 435
    • 81355125960 scopus 로고    scopus 로고
    • Development of a mobile commerce security analysis method
    • Wei, J., and Ozok, A. 2009. "Development of a Mobile Commerce Security Analysis Method," Journal of Information Privacy & Security (5:1), pp. 28-48.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.1 , pp. 28-48
    • Wei, J.1    Ozok, A.2
  • 436
    • 0347315058 scopus 로고    scopus 로고
    • Hardware-based id, rights management, and trusted systems
    • Weinberg, J. 2000. "Hardware-Based Id, Rights Management, and Trusted Systems," Stanford Law Review (52:5), pp. 1251-1281.
    • (2000) Stanford Law Review , vol.52 , Issue.5 , pp. 1251-1281
    • Weinberg, J.1
  • 437
    • 67349125489 scopus 로고    scopus 로고
    • Privacy threat model for data portability in social network applications
    • Weiss, S. 2009. "Privacy Threat Model for Data Portability in Social Network Applications," International Journal of Information Management (29:4), pp. 249-254.
    • (2009) International Journal of Information Management , vol.29 , Issue.4 , pp. 249-254
    • Weiss, S.1
  • 438
    • 81355155289 scopus 로고    scopus 로고
    • The story of us: Resolving the face-off between autobiographical speech and information privacy
    • West, S. 2010. "The Story of Us: Resolving the Face-Off between Autobiographical Speech and Information Privacy," Washington and Lee Law Review (67:2), pp. 589-650.
    • (2010) Washington and Lee Law Review , vol.67 , Issue.2 , pp. 589-650
    • West, S.1
  • 439
    • 81355155285 scopus 로고    scopus 로고
    • Looking for love in all the wrong places: A security case study on online identity theft
    • White, D., and Rea, A. 2007. "Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft," Journal of Information Privacy & Security (3:3), pp. 3-27.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.3 , pp. 3-27
    • White, D.1    Rea, A.2
  • 440
    • 23044531831 scopus 로고    scopus 로고
    • Electronic commerce law: 2001 developments
    • Winn, J. K. 2001. "Electronic Commerce Law: 2001 Developments," The Business Lawyer (57:1), pp. 541-586.
    • (2001) The Business Lawyer , vol.57 , Issue.1 , pp. 541-586
    • Winn, J.K.1
  • 444
    • 84870962433 scopus 로고    scopus 로고
    • Influence of social context and affect on individuals' implementation of information security safeguards
    • Phoenix, AZ, December
    • Wu, Y. A., Ryan, S., and Windsor, J. 2009. "Influence of Social Context and Affect on Individuals' Implementation of Information Security Safeguards," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
    • (2009) Proceedings of the 30th International Conference on Information Systems , pp. 15-18
    • Wu, Y.A.1    Ryan, S.2    Windsor, J.3
  • 446
    • 79953141623 scopus 로고    scopus 로고
    • A cross-cultural analysis of privacy notices of the global 2000
    • Xiaoni, Z., Toru, S., and Max, K. 2007. "A Cross-Cultural Analysis of Privacy Notices of the Global 2000," Journal of Information Privacy & Security (3:2), pp. 18-36.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.2 , pp. 18-36
    • Xiaoni, Z.1    Toru, S.2    Max, K.3
  • 447
    • 84870960533 scopus 로고    scopus 로고
    • The effects of self-construal and perceived control on privacy concerns
    • Montreal, Quebec, Canada, December
    • Xu, H. 2007. "The Effects of Self-Construal and Perceived Control on Privacy Concerns," in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
    • (2007) Proceedings of the 28th International Conference on Information Systems , pp. 9-12
    • Xu, H.1
  • 448
    • 73749086272 scopus 로고    scopus 로고
    • Consumer responses to the introduction of privacy protection measures: An exploratory research framework
    • Xu, H. 2009. "Consumer Responses to the Introduction of Privacy Protection Measures: An Exploratory Research Framework," International Journal of E-Business Research (5:2), pp. 21-47.
    • (2009) International Journal of E-Business Research , vol.5 , Issue.2 , pp. 21-47
    • Xu, H.1
  • 449
    • 80053127414 scopus 로고    scopus 로고
    • Locus of control and location privacy: An empirical study in singapore
    • Xu, H. 2010. "Locus of Control and Location Privacy: An Empirical Study in Singapore," Journal of Global Information Technology Management (13:3), pp. 63-87.
    • (2010) Journal of Global Information Technology Management , vol.13 , Issue.3 , pp. 63-87
    • Xu, H.1
  • 450
    • 84870972411 scopus 로고    scopus 로고
    • Examining the formation of individual's privacy concerns: Toward an integrative view
    • paper 6
    • Xu, H., Dinev, T., Smith, H. J., and Hart, P. 2008a. "Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View," ICIS 2008 Proceedings, paper 6. http://aisel.aisnet.org/icis2008/6.
    • (2008) ICIS 2008 Proceedings
    • Xu, H.1    Dinev, T.2    Smith, H.J.3    Hart, P.4
  • 451
    • 77951860033 scopus 로고    scopus 로고
    • The effects of privacy concerns and personal innovativeness on potential and experienced customers' adoption of location-based services
    • Xu, H., and Gupta, S. 2009. "The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers' Adoption of Location-Based Services," Electronic Markets-The International Journal on Networked Business (19:2), pp. 137-140.
    • (2009) Electronic Markets-The International Journal on Networked Business , vol.19 , Issue.2 , pp. 137-140
    • Xu, H.1    Gupta, S.2
  • 452
    • 84870964591 scopus 로고    scopus 로고
    • Alleviating parental concerns for children's online privacy: A value sensitive design investigation
    • Paris, France, December
    • Xu, H., Irani, N., Zhu, S., and Xu, W. 2008b. "Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
    • (2008) Proceedings of the 29th International Conference on Information Systems , pp. 14-17
    • Xu, H.1    Irani, N.2    Zhu, S.3    Xu, W.4
  • 453
    • 85138703933 scopus 로고    scopus 로고
    • Alleviating consumers' privacy concerns in location-based services: A psychological control perspective
    • R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
    • Xu, H., and Teo, H. H. 2004. "Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 793-806.
    • (2004) Proceedings of the 25th International Conference on Information Systems , pp. 793-806
    • Xu, H.1    Teo, H.H.2
  • 454
    • 84869807425 scopus 로고    scopus 로고
    • Predicting the adoption of location-based services: The role of trust and perceived privacy risk
    • D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14
    • Xu, H., Teo, H.-H., and Tan, B. 2005. "Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk," in Proceedings of the 26th International Conference on Information Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, pp. 897-910.
    • (2005) Proceedings of the 26th International Conference on Information Systems , pp. 897-910
    • Xu, H.1    Teo, H.-H.2    Tan, B.3
  • 455
    • 77749333391 scopus 로고    scopus 로고
    • The role of push-pull technology in privacy calculus: The case of location-based services
    • Xu, H., Teo, H. H., Tan, B. C. Y., and Agarwal, R. 2010. "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services," Journal of Management Information Systems (26:3), pp. 137-176.
    • (2010) Journal of Management Information Systems , vol.26 , Issue.3 , pp. 137-176
    • Xu, H.1    Teo, H.H.2    Tan, B.C.Y.3    Agarwal, R.4
  • 456
    • 85109569787 scopus 로고    scopus 로고
    • Consumer trust and online information privacy
    • S. T. March, A. Massey, and J. I. DeGross (eds.), Seattle, WA, December 14-17
    • Xu, Y., Tan, B., and Hui, K.-L. 2003. "Consumer Trust and Online Information Privacy," in Proceedings of the 24th International Conference on Information Systems, S. T. March, A. Massey, and J. I. DeGross (eds.), Seattle, WA, December 14-17, pp. 538-548.
    • (2003) Proceedings of the 24th International Conference on Information Systems , pp. 538-548
    • Xu, Y.1    Tan, B.2    Hui, K.-L.3
  • 460
    • 70349160412 scopus 로고    scopus 로고
    • Authentication protocol in mobile rfid network
    • Gosier, Guadeloupe, France, March 1-6
    • Yang, M. H., and Luo, J.-N. 2009. "Authentication Protocol in Mobile RFID Network," in Proceedings of the 4th International Conference on Systems, Gosier, Guadeloupe, France, March 1-6, pp. 108-113.
    • (2009) Proceedings of the 4th International Conference on Systems , pp. 108-113
    • Yang, M.H.1    Luo, J.-N.2
  • 461
    • 70349368917 scopus 로고    scopus 로고
    • Electronic voting system characteristics and voter participation intention
    • L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
    • Yao, Y., and Houston, A. 2002. "Electronic Voting System Characteristics and Voter Participation Intention," in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 717-722.
    • (2002) Proceedings of the 23rd International Conference on Information Systems , pp. 717-722
    • Yao, Y.1    Houston, A.2
  • 462
    • 81355125961 scopus 로고    scopus 로고
    • Book review: I. T. Wars managing the business-technology weave in the new millennium
    • Yin, R. 2006. "Book Review: I. T. Wars Managing the Business-Technology Weave in the New Millennium," Journal of Information Privacy & Security (2:4), pp. 63-64.
    • (2006) Journal of Information Privacy & Security , vol.2 , Issue.4 , pp. 63-64
    • Yin, R.1
  • 463
    • 81355155283 scopus 로고    scopus 로고
    • Growth perspective of information security
    • Young, R. 2009. "Growth Perspective of Information Security," Journal of Information Privacy & Security (5:4), pp. 51-68.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.4 , pp. 51-68
    • Young, R.1
  • 464
    • 81355155276 scopus 로고    scopus 로고
    • Illegal computer hacking: An assessment of factors that encourage and deter the behavior
    • Young, R., and Zhang, L. 2007. "Illegal Computer Hacking: An Assessment of Factors That Encourage and Deter the Behavior," Journal of Information Privacy & Security (3:4), pp. 33-52.
    • (2007) Journal of Information Privacy & Security , vol.3 , Issue.4 , pp. 33-52
    • Young, R.1    Zhang, L.2
  • 467
    • 81355166331 scopus 로고    scopus 로고
    • A framework of using captive insurance to streamline it control and compliance management
    • Zhao, X., and Xue, L. 2009. "A Framework of Using Captive Insurance to Streamline It Control and Compliance Management," Journal of Information Privacy & Security (5:3), pp. 27-43.
    • (2009) Journal of Information Privacy & Security , vol.5 , Issue.3 , pp. 27-43
    • Zhao, X.1    Xue, L.2
  • 468
    • 84870965920 scopus 로고    scopus 로고
    • Identity disclosure protection: A data reconstruction approach for preserving privacy in data mining
    • Montreal, Quebec, Canada, December
    • Zhu, D., Li, X.-B., and Wu, S. 2007. "Identity Disclosure Protection: A Data Reconstruction Approach for Preserving Privacy in Data Mining," in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
    • (2007) Proceedings of the 28th International Conference on Information Systems , pp. 9-12
    • Zhu, D.1    Li, X.-B.2    Wu, S.3
  • 470
    • 70149086230 scopus 로고    scopus 로고
    • Users' perceptions on privacy and their intention to transact online: A study on greek internet users
    • Zorotheos, A., and Kafeza, E. 2009. "Users' Perceptions on Privacy and Their Intention to Transact Online: A Study on Greek Internet Users," Direct Marketing (3:2), pp. 139-153.
    • (2009) Direct Marketing , vol.3 , Issue.2 , pp. 139-153
    • Zorotheos, A.1    Kafeza, E.2
  • 471
    • 41149084965 scopus 로고    scopus 로고
    • Examining the influence of demographic factors on internet users' information privacy concerns
    • DOI 10.1145/1292491.1292514, Proceedings of SAICSIT 2007: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
    • Zukowski, T., and Brown, I. 2007. "Examining the Influence of Demographic Factors on Internet Users' Information Privacy Concerns," in Proceedings of the 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, Port Elizabeth, South Africa, pp. 197-204. (Pubitemid 351429329)
    • (2007) ACM International Conference Proceeding Series , vol.226 , pp. 197-204
    • Zukowski, T.1    Brown, I.2
  • 472
    • 35548931529 scopus 로고    scopus 로고
    • Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
    • DOI 10.1007/s10796-007-9057-0
    • Zuo, Y., and O'Keefe, T. 2007. "Post-Release Information Privacy Protection: A Framework and Next-Generation Privacy-Enhanced Operating System," Information Systems Frontiers (9:5), pp. 451-467. (Pubitemid 350007342)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 451-467
    • Zuo, Y.1    O'keefe, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.