-
1
-
-
84900515472
-
Privacy in pervasive environments: Next generation labeling protocols
-
doi:10.1007/s00779-004-0305-8
-
Ackerman, M. S. 2004. Privacy in pervasive environments: Next generation labeling protocols. Personal and Ubiquitous Computing 8 (6): 430-439. doi:10.1007/s00779-004-0305-8
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 430-439
-
-
Ackerman, M.S.1
-
2
-
-
84883892066
-
-
Paper Read at 1st ACM Conference on Electronic Commerce, Denver, CO, November 3-5
-
Ackerman, M. S., L. F. Cranor, and J. Reagle. 1999. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. Paper Read at 1st ACM Conference on Electronic Commerce, Denver, CO, November 3-5.
-
(1999)
Privacy In E-Commerce: Examining User Scenarios and Privacy Preferences
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
3
-
-
0003508667
-
-
Monterey, CA: Brooks/Cole
-
Altman, I., 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA: Brooks/Cole.
-
(1975)
The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding
-
-
Altman, I.1
-
4
-
-
78649430572
-
-
American Institute of Certified Public Accountants/Canadian Institute of Chartered Accountants (AICPA/CICA), New York, NY: AICPA/CICA
-
American Institute of Certified Public Accountants/Canadian Institute of Chartered Accountants (AICPA/CICA). 2009. Generally Accepted Privacy Principles. New York, NY: AICPA/CICA. Available at: http://infotech.aicpa.org/Resources/Privacy/GenerallythAcceptedthPrivacythPrinciples/GenerallythAcceptedthPrivacythPrinciples.htm
-
(2009)
Generally Accepted Privacy Principles
-
-
-
5
-
-
33745713930
-
Market reaction to e-commerce impairments evidenced by website outages
-
doi:10.1016/j.accinf.2005.10.002
-
Anthony, J. H., W. Choi, and S. Grabski. 2006. Market reaction to e-commerce impairments evidenced by website outages. International Journal of Accounting Information Systems 7 (2): 60-78. doi:10.1016/j.accinf.2005.10.002
-
(2006)
International Journal of Accounting Information Systems
, vol.7
, Issue.2
, pp. 60-78
-
-
Anthony, J.H.1
Choi, W.2
Grabski, S.3
-
6
-
-
2342522578
-
Financial privacy policies and the need for standardization
-
doi:10.1109/MSECP.2004.1281243
-
Anton, A. I., J. B. Earp, H. Qingfeng, W. Stufflebeam, D. Bolchini, and C. Jensen. 2004. Financial privacy policies and the need for standardization. IEEE Security & Privacy 2 (2): 36-45. doi:10.1109/MSECP.2004.1281243
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 36-45
-
-
Anton, A.I.1
Earp, J.B.2
Qingfeng, H.3
Stufflebeam, W.4
Bolchini, D.5
Jensen, C.6
-
8
-
-
0037703469
-
E-P3P Privacy Policies and Privacy Authorization
-
Washington, D.C., November 21
-
Ashley, P., S. Hada, G. Karjoth, and M. Schunter. 2002. E-P3P Privacy Policies and Privacy Authorization. Paper Read at the 2002 ACM Workshop on Privacy in the Electronic Society, Washington, D.C., November 21.
-
(2002)
Paper Read At the 2002 ACM Workshop On Privacy In the Electronic Society
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
9
-
-
33748705940
-
Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns
-
doi:10.1007/s10551-006-9007-7
-
Ashworth, L., and C. Free. 2006. Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. Journal of Business Ethics 67 (2): 107-123. doi:10.1007/s10551-006-9007-7
-
(2006)
Journal of Business Ethics
, vol.67
, Issue.2
, pp. 107-123
-
-
Ashworth, L.1
Free, C.2
-
10
-
-
83455227525
-
Ottawa takes on social media giant for violating Canada's law
-
July 17
-
Bardeesy, K. 2009. Ottawa takes on social media giant for violating Canada's law. The Globe and Mail (July 17): A1-A4.
-
(2009)
The Globe and Mail
-
-
Bardeesy, K.1
-
11
-
-
3042736362
-
Internet privacy law: A comparison between the United States and the European Union
-
doi:10.1016/j.cose.2003.11.001
-
Baumer, D. L., J. B. Earp, and J. C. Poindexter. 2004. Internet privacy law: A comparison between the United States and the European Union. Computers & Security 23 (5): 400-412. doi:10.1016/j.cose.2003.11.001
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 400-412
-
-
Baumer, D.L.1
Earp, J.B.2
Poindexter, J.C.3
-
12
-
-
0006364798
-
Design for privacy in multimedia computing and communications environments
-
edited by Agre, P. E., and M. Rotenberg, Cambridge, MA: MIT Press
-
Bellotti, V. 1997. Design for privacy in multimedia computing and communications environments. In Technology and Privacy: The New Landscape, edited by Agre, P. E., and M. Rotenberg, 63-98. Cambridge, MA: MIT Press.
-
(1997)
Technology and Privacy: The New Landscape
, pp. 63-98
-
-
Bellotti, V.1
-
13
-
-
21744443556
-
Information systems assurance
-
edited by Arnold, V., and S. G. Sutton, Sarasota, FL: American Accounting Association
-
Boritz, J. E. 2002. Information systems assurance. In Research Accounting as an Information Systems Discipline, edited by Arnold, V., and S. G. Sutton, 231-255. Sarasota, FL: American Accounting Association.
-
(2002)
Research Accounting As An Information Systems Discipline
, pp. 231-255
-
-
Boritz, J.E.1
-
15
-
-
33745804732
-
Privacy rights on the Internet: Self-regulation or government regulation?
-
Bowie, N. E., and K. Jamal. 2006. Privacy rights on the Internet: Self-regulation or government regulation? Business Ethics Quarterly 16 (3): 323-342.
-
(2006)
Business Ethics Quarterly
, vol.16
, Issue.3
, pp. 323-342
-
-
Bowie, N.E.1
Jamal, K.2
-
16
-
-
83455227519
-
Wal-Mart radio tags to track clothing
-
July 23
-
Bustillo, M. 2010. Wal-Mart radio tags to track clothing. Wall Street Journal (July 23).
-
(2010)
Wall Street Journal
-
-
Bustillo, M.1
-
17
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., L. A. Gordon, M. P. Loeb, and L. Zhou. 2003. The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security 11 (3): 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
18
-
-
80051917451
-
Tracking is an assault on liberty, with real dangers
-
August 6
-
Carr, N. 2010. Tracking is an assault on liberty, with real dangers. Wall Street Journal (August 6). Available at: http://online.wsj.com/article/SB10001424052748703748904575411682714389888.html
-
(2010)
Wall Street Journal
-
-
Carr, N.1
-
19
-
-
0034399178
-
Consumer online privacy: Legal and ethical issues
-
doi:10.1509/jppm.19.1.7.16951
-
Caudill, E. M., and P. E. Murphy. 2000. Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing 19 (1): 7-19. doi:10.1509/jppm.19.1.7.16951
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 7-19
-
-
Caudill, E.M.1
Murphy, P.E.2
-
20
-
-
84889571788
-
ISPs must help police snoop on internet under new bill
-
January 3, Available at
-
CBC News. 2009. ISPs must help police snoop on internet under new bill. CBC News (January 3). Available at: http://www.cbc.ca/technology/story/2009/06/18/tech-internet-police-bill-intercept-electronic-communications.html?ref=rss
-
(2009)
CBC News
-
-
News, C.B.C.1
-
21
-
-
0141447415
-
Electronic monitoring and privacy issues in business-marketing: The ethics of the DoubleClick experience
-
doi:10.1023/ A:1013824909970
-
Charters, D. 2002. Electronic monitoring and privacy issues in business-marketing: The ethics of the DoubleClick experience. Journal of Business Ethics 35 (4): 243-254. doi:10.1023/ A:1013824909970
-
(2002)
Journal of Business Ethics
, vol.35
, Issue.4
, pp. 243-254
-
-
Charters, D.1
-
22
-
-
84889571821
-
Google trims privacy policy
-
September 26 2010
-
Claburn, T. 2010. Google trims privacy policy. InformationWeek (September 26 2010). Available at: http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=227300202
-
(2010)
InformationWeek
-
-
Claburn, T.1
-
23
-
-
0004034959
-
-
Committee of Sponsoring Organizations of the Treadway Commission (COSO), New York, NY: AICPA
-
Committee of Sponsoring Organizations of the Treadway Commission (COSO). 1992. Internal Control Integrated Framework. New York, NY: AICPA.
-
(1992)
Internal Control Integrated Framework
-
-
-
24
-
-
16844361812
-
-
Committee of Sponsoring Organizations of the Treadway Commission (COSO), New York, NY: AICPA
-
Committee of Sponsoring Organizations of the Treadway Commission (COSO). 2004. Enterprise Risk Management-Integrated Framework. New York, NY: AICPA.
-
(2004)
Enterprise Risk Management-Integrated Framework
-
-
-
25
-
-
35248861302
-
Use of a P3P User Agent by Early Adopters
-
Washington, D.C., November
-
Cranor, L. F., M. Arjula, and P. Guduru. 2002. Use of a P3P User Agent by Early Adopters. Paper Read at Workshop on Privacy in the Electronic Society, Washington, D.C., November 21.
-
(2002)
Paper Read At Workshop On Privacy In the Electronic Society
, pp. 21
-
-
Cranor, L.F.1
Arjula, M.2
Guduru, P.3
-
26
-
-
52049110745
-
P3P deployment on websites
-
doi:10.1016/j.elerap.2008.04.003
-
Cranor, L. F., S. Egelman, S. Sheng, A. McDonald, and A. Chowdhury. 2008. P3P deployment on websites. Electronic Commerce Research and Applications 7 (3): 274-293. doi:10.1016/j.elerap.2008.04.003
-
(2008)
Electronic Commerce Research and Applications
, vol.7
, Issue.3
, pp. 274-293
-
-
Cranor, L.F.1
Egelman, S.2
Sheng, S.3
McDonald, A.4
Chowdhury, A.5
-
27
-
-
0034396278
-
Protecting privacy online: Is self-regulation working?
-
doi:10.1509/jppm.19.1.20.16944
-
Culnan, M. J. 2000. Protecting privacy online: Is self-regulation working? Journal of Public Policy & Marketing 19 (1): 20-26. doi:10.1509/jppm.19.1.20.16944
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 20-26
-
-
Culnan, M.J.1
-
28
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
-
doi:10.1287/orsc.10.1.104
-
Culnan, M. J., and P. K. Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science 10 (1): 104-115. doi:10.1287/orsc.10.1.104
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
32
-
-
33646577199
-
Ethics research in AIS
-
edited by Arnold, V., and S. G. Sutton, Sarasota, FL: American Accounting Association
-
Dillard, J. F., and K. Yuthas. 2002. Ethics research in AIS. In Research Accounting as an Information Systems Discipline, edited by Arnold, V., and S. G. Sutton, 181-206. Sarasota, FL: American Accounting Association.
-
(2002)
Research Accounting As An Information Systems Discipline
, pp. 181-206
-
-
Dillard, J.F.1
Yuthas, K.2
-
33
-
-
18544382993
-
Examining Internet privacy policies within the context of user privacy values
-
doi:10.1109/TEM.2005.844927
-
Earp, J. B., A. I. Anton, L. Aiman-Smith, and W. H. Stufflebeam. 2005. Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management 52 (2): 227-237. doi:10.1109/TEM.2005.844927
-
(2005)
IEEE Transactions On Engineering Management
, vol.52
, Issue.2
, pp. 227-237
-
-
Earp, J.B.1
Anton, A.I.2
Aiman-Smith, L.3
Stufflebeam, W.H.4
-
34
-
-
2342615771
-
Innovative web use to learn about consumer behavior and online privacy
-
doi:10.1145/641205.641209
-
Earp, J. B., and D. Baumer. 2003. Innovative web use to learn about consumer behavior and online privacy. Communications of the ACM 46 (4): 81-83. doi:10.1145/641205.641209
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 81-83
-
-
Earp, J.B.1
Baumer, D.2
-
35
-
-
33745211471
-
Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment
-
doi:10.1016/j.jbusres.2006.02.006
-
Eastlick, M. A., S. L. Lotz, and P. Warrington. 2006. Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59 (8): 877-886. doi:10.1016/j.jbusres.2006.02.006
-
(2006)
Journal of Business Research
, vol.59
, Issue.8
, pp. 877-886
-
-
Eastlick, M.A.1
Lotz, S.L.2
Warrington, P.3
-
36
-
-
83455236341
-
Google settles privacy lawsuit for $8.5 million
-
September 3
-
Efrati, A. 2010. Google settles privacy lawsuit for $8.5 million. Wall Street Journal (September 3). Available at: http://online.wsj.com/article/SB10001424052748703946504575470510382073060.html
-
(2010)
Wall Street Journal
-
-
Efrati, A.1
-
39
-
-
0004165956
-
-
London, U.K.: Routledge & Kegan Paul
-
Fowler, R., H. Bob, G. Kress, and T. Trew. 1979. Language and Control. London, U.K.: Routledge & Kegan Paul.
-
(1979)
Language and Control
-
-
Fowler, R.1
Bob, H.2
Kress, G.3
Trew, T.4
-
40
-
-
4644318170
-
Professionalization in action: Accountants' attempt at building a network of support for the WebTrust seal of assurance
-
doi:10.1506/H1C0-EU27-UU2K-8EC8
-
Gendron, Y., and M. Barrett. 2004. Professionalization in action: Accountants' attempt at building a network of support for the WebTrust seal of assurance. Contemporary Accounting Research 21 (3): 563-602. doi:10.1506/H1C0-EU27-UU2K-8EC8
-
(2004)
Contemporary Accounting Research
, vol.21
, Issue.3
, pp. 563-602
-
-
Gendron, Y.1
Barrett, M.2
-
41
-
-
0036339847
-
Influences on the intent to make Internet purchases
-
doi:10.1108/10662240210422521
-
George, J. F. 2002. Influences on the intent to make Internet purchases. Internet Research-Electronic Networking Applications and Policy 12 (2): 165-180. doi:10.1108/10662240210422521
-
(2002)
Internet Research-Electronic Networking Applications and Policy
, vol.12
, Issue.2
, pp. 165-180
-
-
George, J.F.1
-
42
-
-
3042747513
-
The theory of planned behavior and Internet purchasing
-
doi:10.1108/10662240410542634
-
George, J. F. 2004. The theory of planned behavior and Internet purchasing. Internet Research-Electronic Networking Applications and Policy 14 (3): 198-212. doi:10.1108/10662240410542634
-
(2004)
Internet Research-Electronic Networking Applications and Policy
, vol.14
, Issue.3
, pp. 198-212
-
-
George, J.F.1
-
43
-
-
84889568549
-
Twitter's rapid growth raises regulation issues
-
Available at
-
Goldie, L. 2009. Twitter's rapid growth raises regulation issues. New Media Age (February 25). Available at: http://www.nma.co.uk/news/twitters-rapid-growth-raises-regulation-issues/41620.article
-
(2009)
New Media Age (February
, pp. 25
-
-
Goldie, L.1
-
44
-
-
20244377956
-
Research opportunities in electronic commerce
-
edited by Arnold, V., and S. G. Sutton, Sarasota, FL: American Accounting Association
-
Gray, G. L., and R. Debreceny. 2002. Research opportunities in electronic commerce. In Research Accounting as an Information Systems Discipline, edited by Arnold, V., and S. G. Sutton, 209-230. Sarasota, FL: American Accounting Association.
-
(2002)
Research Accounting As An Information Systems Discipline
, pp. 209-230
-
-
Gray, G.L.1
Debreceny, R.2
-
45
-
-
83455236329
-
Extending the accounting brand to privacy services
-
doi:10.2308/jis.2003.17.2.87
-
Greenstein, M. M., and J. E. Hunton. 2003. Extending the accounting brand to privacy services. Journal of Information Systems 17 (2): 87-110. doi:10.2308/jis.2003.17.2.87
-
(2003)
Journal of Information Systems
, vol.17
, Issue.2
, pp. 87-110
-
-
Greenstein, M.M.1
Hunton, J.E.2
-
47
-
-
0346339768
-
"To legislate or not to legislate": A comparative exploratory study of privacy/personalization factors affecting French
-
U.K. and U.S, doi:10.1108/07363760310506184
-
Gurau, C., A. Ranchhod, and C. Gauzente. 2003. "To legislate or not to legislate": A comparative exploratory study of privacy/personalization factors affecting French, U.K. and U.S. websites. Journal of Consumer Marketing 20 (7): 652-664. doi:10.1108/07363760310506184
-
(2003)
Websites. Journal of Consumer Marketing
, vol.20
, Issue.7
, pp. 652-664
-
-
Gurau, C.1
Ranchhod, A.2
Gauzente, C.3
-
48
-
-
83455169918
-
It's modern trade: Web users get as much as they give
-
August 7
-
Harper, J. 2010. It's modern trade: Web users get as much as they give. Wall Street Journal (August 7). Available at: http://online.wsj.com/article/SB10001424052748703748904575411530096840958.html
-
(2010)
Wall Street Journal
-
-
Harper, J.1
-
51
-
-
84993048403
-
The platform for privacy preference as a social protocol: An examination within the U.S. policy context
-
doi:10.1145/604596
-
Hochheiser, H. 2002. The platform for privacy preference as a social protocol: An examination within the U.S. policy context. ACM Transactions on Internet Technology 2 (4): 276-306. doi:10.1145/604596.
-
(2002)
ACM Transactions On Internet Technology
, vol.2
, Issue.4
, pp. 276-306
-
-
Hochheiser, H.1
-
52
-
-
0033114507
-
Information privacy in the marketspace: Implications for the commercial uses of anonymity on the web
-
doi:10.1080/019722499128583
-
Hoffman, D. L., T. P. Novak, and M. A. Peralta. 1999. Information privacy in the marketspace: Implications for the commercial uses of anonymity on the web. The Information Society 15 (2): 129-139. doi:10.1080/019722499128583
-
(1999)
The Information Society
, vol.15
, Issue.2
, pp. 129-139
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, M.A.3
-
55
-
-
84889590400
-
Federal CIOs issue cloud computing privacy framework
-
August 25
-
Hoover, J. N. 2010. Federal CIOs issue cloud computing privacy framework. InformationWeek (August 25). Available at: http://www.informationweek.com/news/government/cloud-saas/showArticle.jhtml?articleID=227001084
-
(2010)
InformationWeek
-
-
Hoover, J.N.1
-
56
-
-
0035649345
-
Explaining intranet use with the technology acceptance model
-
Horton, R. P., T. Buck, P. E. Waterson, and C. W. Clegg. 2001. Explaining intranet use with the technology acceptance model. Journal of Information Technology 16 (4): 237-249.
-
(2001)
Journal of Information Technology
, vol.16
, Issue.4
, pp. 237-249
-
-
Horton, R.P.1
Buck, T.2
Waterson, P.E.3
Clegg, C.W.4
-
57
-
-
0038209609
-
Consumer privacy and security protection on church Web sites: Reasons for concern
-
doi:10.1509/jppm.22.1.58.17619
-
Hoy, M. G., and J. Phelps. 2003. Consumer privacy and security protection on church Web sites: Reasons for concern. Journal of Public Policy & Marketing 22 (1): 58-70. doi:10.1509/jppm.22.1.58.17619
-
(2003)
Journal of Public Policy & Marketing
, vol.22
, Issue.1
, pp. 58-70
-
-
Hoy, M.G.1
Phelps, J.2
-
58
-
-
84889579744
-
Twitter settles FTC privacy charges
-
(June 25)
-
Hughes, D. A. 2010. Twitter settles FTC privacy charges. Wall Street Journal (June 25). Available at: http://online.wsj.com/article/SB10001424052748704911704575326774191987024.html
-
(2010)
Wall Street Journal
, pp. 25
-
-
Hughes, D.A.1
-
59
-
-
33847712553
-
The value of privacy assurance: An exploratory field experiment
-
Hui, K. L., H. H. Teo, and S. Y. Lee. 2007. The value of privacy assurance: An exploratory field experiment. Management Information Systems Quarterly 31 (1): 19-33.
-
(2007)
Management Information Systems Quarterly
, vol.31
, Issue.1
, pp. 19-33
-
-
Hui, K.L.1
Teo, H.H.2
Lee, S.Y.3
-
60
-
-
83455227522
-
Welcome to the social network, where your privacy has to be flexible
-
(July 17)
-
Ingram, M. 2009. Welcome to the social network, where your privacy has to be flexible. The Globe and Mail (July 17): A1-A4.
-
(2009)
The Globe and Mail
, vol.17
-
-
Ingram, M.1
-
61
-
-
0038739087
-
Privacy in e-commerce: Development of reporting standards, disclosure, and assurance services in an unregulated market
-
doi:10.1111/1475-679X.00104
-
Jamal, K., M. Maier, and S. Sunder. 2003. Privacy in e-commerce: Development of reporting standards, disclosure, and assurance services in an unregulated market. Journal of Accounting Research 41 (2): 285-309. doi:10.1111/1475-679X.00104
-
(2003)
Journal of Accounting Research
, vol.41
, Issue.2
, pp. 285-309
-
-
Jamal, K.1
Maier, M.2
Sunder, S.3
-
62
-
-
14844283799
-
Enforced standards versus evolution by general acceptance: A comparative study of e-commerce privacy disclosure and practice in the United States and the United Kingdom
-
doi:10.1111/j.1475-679x.2004.00163.x
-
Jamal, K., M. Maier, and S. Sunder. 2005. Enforced standards versus evolution by general acceptance: A comparative study of e-commerce privacy disclosure and practice in the United States and the United Kingdom. Journal of Accounting Research 43 (1): 73-96. doi:10.1111/j.1475-679x.2004.00163.x
-
(2005)
Journal of Accounting Research
, vol.43
, Issue.1
, pp. 73-96
-
-
Jamal, K.1
Maier, M.2
Sunder, S.3
-
63
-
-
84986038278
-
B2C data privacy policies: Current trends
-
doi:10.1108/00251740110391420
-
Johnson-Page, G. F., and R. S. Thatcher. 2001. B2C data privacy policies: Current trends. Management Decision 39 (4): 261-271. doi:10.1108/00251740110391420
-
(2001)
Management Decision
, vol.39
, Issue.4
, pp. 261-271
-
-
Johnson-Page, G.F.1
Thatcher, R.S.2
-
64
-
-
84889590417
-
ChoicePoint faces inquiry, will curtail data sales
-
March 4
-
Kane, M., and M. Hines. 2005. ChoicePoint faces inquiry, will curtail data sales. CNET (March 4). Available at: http://news.cnet.com/ChoicePoint-faces-inquiry,-will-curtail-data-sales/2100-1029_3-5599516.html
-
(2005)
CNET
-
-
Kane, M.1
Hines, M.2
-
65
-
-
0038498146
-
A web assurance services model of trust for B2C e-commerce
-
doi:10.1016/S1467-0895(03)00005-8
-
Kaplan, S. E., and R. J. Nieschwietz. 2003. A web assurance services model of trust for B2C e-commerce. International Journal of Accounting Information Systems 4 (2): 95-114. doi:10.1016/S1467-0895(03)00005-8
-
(2003)
International Journal of Accounting Information Systems
, vol.4
, Issue.2
, pp. 95-114
-
-
Kaplan, S.E.1
Nieschwietz, R.J.2
-
67
-
-
83455260135
-
A survey of consumer information privacy from the Accounting Information Systems research perspective
-
Kauffman, R. J., Y. J. Lee, M. Prosch, and P. J. Steinbart. 2011. A survey of consumer information privacy from the Accounting Information Systems research perspective. Journal of Information Systems 25 (2): 47-79.
-
(2011)
Journal of Information Systems
, vol.25
, Issue.2
, pp. 47-79
-
-
Kauffman, R.J.1
Lee, Y.J.2
Prosch, M.3
Steinbart, P.J.4
-
68
-
-
53749094694
-
Public key cryptography based privacy preserving multi-context RFID infrastructure
-
doi:10.1016/j.adhoc.2007.12.004
-
Kaya, S. V., E. Savas, A. Levi, and O. Ercetin. 2009. Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks 7 (1): 136-152. doi:10.1016/j.adhoc.2007.12.004
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.1
, pp. 136-152
-
-
Kaya, S.V.1
Savas, E.2
Levi, A.3
Ercetin, O.4
-
69
-
-
0036431099
-
Applying digital rights management systems to privacy rights management
-
doi:10.1016/S0167-4048(02)01117-3
-
Kenny, S., and L. Korba. 2002. Applying digital rights management systems to privacy rights management. Computers & Security 21 (7): 648-664. doi:10.1016/S0167-4048(02)01117-3
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 648-664
-
-
Kenny, S.1
Korba, L.2
-
70
-
-
0011373794
-
Consumer responses to the CPA WebTrust assurance
-
doi:10.2308/jis.2000.14.1.17
-
Kovar, S. E., K. G. Burke, and B. R. Kovar. 2000. Consumer responses to the CPA WebTrust assurance. Journal of Information Systems 14 (1): 17-35. doi:10.2308/jis.2000.14.1.17
-
(2000)
Journal of Information Systems
, vol.14
, Issue.1
, pp. 17-35
-
-
Kovar, S.E.1
Burke, K.G.2
Kovar, B.R.3
-
71
-
-
0038135064
-
E-commerce and consumer's purchasing behaviour
-
doi:10.1080/0003684022000020850
-
Koyuncu, C., and D. Lien. 2003. E-commerce and consumer's purchasing behaviour. Applied Economics 35 (6): 721-726. doi:10.1080/0003684022000020850
-
(2003)
Applied Economics
, vol.35
, Issue.6
, pp. 721-726
-
-
Koyuncu, C.1
Lien, D.2
-
72
-
-
0036888983
-
The impact of relative information quality of e-commerce assurance seals on Internet purchasing behavior
-
doi:10.1016/S1467-0895(02)00069-6
-
Lala, V., V. Arnold, S. G. Sutton, and L. Guan. 2002. The impact of relative information quality of e-commerce assurance seals on Internet purchasing behavior. International Journal of Accounting Information Systems 3 (4): 237-253. doi:10.1016/S1467-0895(02)00069-6
-
(2002)
International Journal of Accounting Information Systems
, vol.3
, Issue.4
, pp. 237-253
-
-
Lala, V.1
Arnold, V.2
Sutton, S.G.3
Guan, L.4
-
73
-
-
33847386764
-
Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior
-
doi:10. 1111/j.1745-6606.2006.00071.x
-
LaRose, R., and N. Rifon. 2007. Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. The Journal of Consumer Affairs 41 (1): 127-149. doi:10. 1111/j.1745-6606.2006.00071.x
-
(2007)
The Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 127-149
-
-
Larose, R.1
Rifon, N.2
-
74
-
-
0030241302
-
Markets and privacy
-
doi:10.1145/234215.234476
-
Laudon, K. C. 1996. Markets and privacy. Communications of the ACM 39 (9): 92-104. doi:10.1145/234215.234476
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 92-104
-
-
Laudon, K.C.1
-
75
-
-
84993660913
-
Privacy as a concept and a social issue: A multidimensional developmental theory
-
doi:10.1111/j.1540-4560.1977.tb01880.x
-
Laufer, R. S., and M. Wolfe. 1977. Privacy as a concept and a social issue: A multidimensional developmental theory. The Journal of Social Issues 33 (3): 22-42. doi:10.1111/j.1540-4560.1977.tb01880.x
-
(1977)
The Journal of Social Issues
, vol.33
, Issue.3
, pp. 22-42
-
-
Laufer, R.S.1
Wolfe, M.2
-
76
-
-
49249110565
-
An agent-based privacy-enhancing model
-
doi:10.1108/09685220810893234
-
Lee, H.-H., and M. Stamp. 2008. An agent-based privacy-enhancing model. Information Management & Computer Security 16 (3): 305-319. doi:10.1108/09685220810893234
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.3
, pp. 305-319
-
-
Lee, H.-H.1
Stamp, M.2
-
77
-
-
84889562373
-
Half of social networkers worried about privacy: Poll
-
Available at
-
Lippmann, D. 2010. Half of social networkers worried about privacy: Poll. Reuters (July 15). Available at: http://www.reuters.com/article/idUSTRE66E41820100715
-
(2010)
Reuters (July
, pp. 15
-
-
Lippmann, D.1
-
78
-
-
0344219790
-
An examination of privacy policies in Fortune 500 Web sites
-
Liu, C., and K. P. Arnett. 2002. An examination of privacy policies in Fortune 500 Web sites. MidAmerican Journal of Business 17 (1): 13-21.
-
(2002)
MidAmerican Journal of Business
, vol.17
, Issue.1
, pp. 13-21
-
-
Liu, C.1
Arnett, K.P.2
-
79
-
-
10644254580
-
Beyond concern-A privacy-trust-behavioral intention model of electronic commerce
-
doi:10.1016/j.im.2004.01.003
-
Liu, C., J. T. Marchewka, J. Lu, and C.-S. Yu. 2005. Beyond concern-A privacy-trust-behavioral intention model of electronic commerce. Information & Management 42 (2): 289-304. doi:10.1016/j.im.2004.01.003
-
(2005)
Information & Management
, vol.42
, Issue.2
, pp. 289-304
-
-
Liu, C.1
Marchewka, J.T.2
Lu, J.3
Yu, C.-S.4
-
80
-
-
3843078499
-
A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online
-
doi:10.1023/B:MARK.0000012471.31858.e5
-
Lwin, M. O., and J. D. Williams. 2003. A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters 14 (4): 257-272. doi:10.1023/B:MARK.0000012471.31858.e5
-
(2003)
Marketing Letters
, vol.14
, Issue.4
, pp. 257-272
-
-
Lwin, M.O.1
Williams, J.D.2
-
81
-
-
84889585456
-
RealNetworks faced with second privacy suit
-
November 10
-
Macavinta, C. 1999. RealNetworks faced with second privacy suit. CNET (November 10). Available at: http://news.cnet.com/2100-1001-232766.html
-
(1999)
CNET
-
-
Macavinta, C.1
-
82
-
-
33645518225
-
Privacy policy statements and consumer willingness to provide personal information
-
Meinert, D. B., D. K. Peterson, J. R. Criswell, and M. D. Crossland. 2006. Privacy policy statements and consumer willingness to provide personal information. Journal of Electronic Commerce in Organizations 4 (1): 1-17.
-
(2006)
Journal of Electronic Commerce In Organizations
, vol.4
, Issue.1
, pp. 1-17
-
-
Meinert, D.B.1
Peterson, D.K.2
Criswell, J.R.3
Crossland, M.D.4
-
83
-
-
84976793562
-
Values, personal information privacy, and regulatory approaches
-
doi:10.1145/219663.219683
-
Milberg, S. J., S. J. Burke, H. J. Smith, and E. A. Kallman. 1995. Values, personal information privacy, and regulatory approaches. Communications of the ACM 38 (12): 65-74. doi:10.1145/219663.219683
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 65-74
-
-
Milberg, S.J.1
Burke, S.J.2
Smith, H.J.3
Kallman, E.A.4
-
84
-
-
0034418444
-
Information privacy: Corporate management and national regulation
-
doi:10.1287/orsc.11.1.35.12567
-
Milberg, S. J., H. J. Smith, and S. J. Burke. 2000. Information privacy: Corporate management and national regulation. Organization Science 11 (1): 35-57. doi:10.1287/orsc.11.1.35.12567
-
(2000)
Organization Science
, vol.11
, Issue.1
, pp. 35-57
-
-
Milberg, S.J.1
Smith, H.J.2
Burke, S.J.3
-
85
-
-
0037660092
-
Trust and concern in consumers' perceptions of marketing information management practices
-
doi:10.1002/(SICI)1520-6653(199924)13:1,5::AID-DIR2.3.0.CO;2-9
-
Milne, G. R., and M.-E. Boza. 1999. Trust and concern in consumers' perceptions of marketing information management practices. Journal of Interactive Marketing 13 (1): 5-24. doi:10.1002/(SICI)1520-6653(199924)13:1,5::AID-DIR2.3.0.CO;2-9
-
(1999)
Journal of Interactive Marketing
, vol.13
, Issue.1
, pp. 5-24
-
-
Milne, G.R.1
Boza, M.-E.2
-
86
-
-
0036814612
-
Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 U.S. web surveys
-
doi:10.1080/01972240290108168
-
Milne, G. R., and M. J. Culnan. 2002. Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 U.S. web surveys. The Information Society 18 (5): 345-359. doi:10.1080/01972240290108168
-
(2002)
The Information Society
, vol.18
, Issue.5
, pp. 345-359
-
-
Milne, G.R.1
Culnan, M.J.2
-
87
-
-
4644366146
-
Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices
-
doi:10.1002/dir.20009
-
Milne, G. R., and M. J. Culnan. 2004. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing 18 (3): 15-29. doi:10.1002/dir.20009
-
(2004)
Journal of Interactive Marketing
, vol.18
, Issue.3
, pp. 15-29
-
-
Milne, G.R.1
Culnan, M.J.2
-
88
-
-
33845791661
-
A longitudinal assessment of online privacy notice readability
-
doi:10.1509/jppm.25.2.238
-
Milne, G. R., M. J. Culnan, and H. Greene. 2006. A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing 25 (2): 238-249. doi:10.1509/jppm.25.2.238
-
(2006)
Journal of Public Policy & Marketing
, vol.25
, Issue.2
, pp. 238-249
-
-
Milne, G.R.1
Culnan, M.J.2
Greene, H.3
-
89
-
-
0034552722
-
Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives
-
doi:10.1509/jppm.19.2.238.17136
-
Milne, G. R., and A. J. Rohm. 2000. Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives. Journal of Public Policy & Marketing 19 (2): 238-249. doi:10.1509/jppm.19.2.238.17136
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.2
, pp. 238-249
-
-
Milne, G.R.1
Rohm, A.J.2
-
90
-
-
0034384929
-
Internet privacy and security: An examination of online retailer disclosures
-
doi:10.1509/jppm.19.1.54.16942
-
Miyazaki, A. D., and A. Fernandez. 2000. Internet privacy and security: An examination of online retailer disclosures. Journal of Public Policy & Marketing 19 (1): 54-61. doi:10.1509/jppm.19.1.54.16942
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 54-61
-
-
Miyazaki, A.D.1
Fernandez, A.2
-
91
-
-
14544301547
-
Do consumers understand the role of privacy seals in e-commerce?
-
doi:10.1145/1047671.1047674
-
Moores, T. T. 2005. Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM 48 (3): 86-91. doi:10.1145/1047671.1047674
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 86-91
-
-
Moores, T.T.1
-
92
-
-
84889594353
-
-
National Conference of State Legislatures (NCSL), Washington, D.C.: NCSL
-
National Conference of State Legislatures (NCSL). 2009. State Laws Related to Internet Privacy. Washington, D.C.: NCSL. Available at: http://www.ncsl.org/default.aspx?tabid=13463
-
(2009)
State Laws Related to Internet Privacy
-
-
-
93
-
-
49249101016
-
Information assurance seals: How they impact consumer purchasing behavior
-
doi:10.2308/jis.2006.20.1.1
-
Nikitkov, A. 2006. Information assurance seals: How they impact consumer purchasing behavior. Journal of Information Systems 20 (1): 1-17. doi:10.2308/jis.2006.20.1.1
-
(2006)
Journal of Information Systems
, vol.20
, Issue.1
, pp. 1-17
-
-
Nikitkov, A.1
-
94
-
-
0035530890
-
Analysis of Internet users' level of online privacy concerns
-
doi:10.1177/089443930101900103
-
O'Neil, D. 2001. Analysis of Internet users' level of online privacy concerns. Social Science Computer Review 19 (1): 17-31. doi:10.1177/089443930101900103
-
(2001)
Social Science Computer Review
, vol.19
, Issue.1
, pp. 17-31
-
-
O'Neil, D.1
-
95
-
-
24144458645
-
Privacy-enhancing technologies for the World Wide Web
-
doi:10.1016/j.comcom.2005.02.003
-
Oppliger, R. 2005. Privacy-enhancing technologies for the World Wide Web. Computer Communications 28 (16): 1791-1797. doi:10.1016/j.comcom.2005.02.003
-
(2005)
Computer Communications
, vol.2
, Issue.16
, pp. 1791-1797
-
-
Oppliger, R.1
-
96
-
-
0003333609
-
The role of intermediaries in the development of trust on the WWW: The use and prominence of trusted third parties and privacy statements
-
Palmer, J. W., J. P. Bailey, and S. Faraj. 2000. The role of intermediaries in the development of trust on the WWW: The use and prominence of trusted third parties and privacy statements. Journal of Computer-Mediated Communication 5(3).
-
(2000)
Journal of Computer-Mediated Communication
, vol.5
, Issue.3
-
-
Palmer, J.W.1
Bailey, J.P.2
Faraj, S.3
-
97
-
-
33745054096
-
Online privacy and consumer protection: An analysis of portal privacy statements
-
doi:10.1207/s15506878jobem4903_1
-
Papacharissi, Z., and J. Fernback. 2005. Online privacy and consumer protection: An analysis of portal privacy statements. Journal of Broadcasting & Electronic Media 49 (3): 259-281. doi:10.1207/s15506878jobem4903_1
-
(2005)
Journal of Broadcasting & Electronic Media
, vol.49
, Issue.3
, pp. 259-281
-
-
Papacharissi, Z.1
Fernback, J.2
-
98
-
-
70149099545
-
Information privacy research: Framework for integrating multiple publics, information channels, and responses
-
doi:10.1016/j.intmar.2009.02.007
-
Peltier, J. W., G. R. Milne, and J. E. Phelps. 2009. Information privacy research: Framework for integrating multiple publics, information channels, and responses. Journal of Interactive Marketing 23 (2): 191-205. doi:10.1016/j.intmar.2009.02.007
-
(2009)
Journal of Interactive Marketing
, vol.23
, Issue.2
, pp. 191-205
-
-
Peltier, J.W.1
Milne, G.R.2
Phelps, J.E.3
-
99
-
-
23944471341
-
An ethical exploration of privacy and radio frequency identification
-
doi:10.1007/s10551-005-2928-8
-
Peslak, A. R. 2005. An ethical exploration of privacy and radio frequency identification. Journal of Business Ethics 59 (4): 327-345. doi:10.1007/s10551-005-2928-8
-
(2005)
Journal of Business Ethics
, vol.59
, Issue.4
, pp. 327-345
-
-
Peslak, A.R.1
-
100
-
-
0034386678
-
Marketing without consent: Consumer choice and costs, privacy, and public policy
-
doi:10.1509/jppm.19.1.42.16940
-
Petty, R. D. 2000. Marketing without consent: Consumer choice and costs, privacy, and public policy. Journal of Public Policy & Marketing 19 (1): 42-53. doi:10.1509/jppm.19.1.42.16940
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 42-53
-
-
Petty, R.D.1
-
101
-
-
0034394385
-
Privacy concerns and consumer willingness to provide personal information
-
doi:10.1509/jppm.19.1.27.16941
-
Phelps, J., G. Nowak, and E. Ferrell. 2000. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing 19 (1): 27-41. doi:10.1509/jppm.19.1.27.16941
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 27-41
-
-
Phelps, J.1
Nowak, G.2
Ferrell, E.3
-
102
-
-
34548433382
-
What's wrong with online privacy policies?
-
doi:10.1145/1284621.1284627
-
Pollach, I. 2007. What's wrong with online privacy policies? Communications of the ACM 50 (9): 103-108. doi:10.1145/1284621.1284627
-
(2007)
Communications of the ACM
, vol.50
, Issue.9
, pp. 103-108
-
-
Pollach, I.1
-
104
-
-
79961058252
-
Protecting personal information using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to enhance corporate governance
-
doi:10.1057/jdg.2008.7
-
Prosch, M. 2008. Protecting personal information using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to enhance corporate governance. International Journal of Disclosure and Governance 5 (2): 153-166. doi:10.1057/jdg.2008.7
-
(2008)
International Journal of Disclosure and Governance
, vol.5
, Issue.2
, pp. 153-166
-
-
Prosch, M.1
-
105
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
doi:10.1109/MSECP.2003.1203220
-
Provos, N., and P. Honeyman. 2003. Hide and seek: An introduction to steganography. IEEE Security & Privacy 1 (3): 32-44. doi:10.1109/MSECP.2003.1203220
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
108
-
-
0036567901
-
Key dimensions of business-to-consumer Web sites
-
doi:10.1016/S0378-7206(01)00112-4
-
Ranganathan, C., and S. Ganapathy. 2002. Key dimensions of business-to-consumer Web sites. Information & Management 39 (6): 457-465. doi:10.1016/S0378-7206(01)00112-4
-
(2002)
Information & Management
, vol.39
, Issue.6
, pp. 457-465
-
-
Ranganathan, C.1
Ganapathy, S.2
-
109
-
-
0002265410
-
The platform for privacy preferences
-
doi:10.1145/293411.293455
-
Reagle, J., and L. F. Cranor. 1999. The platform for privacy preferences. Communications of the ACM 42 (2): 48-55. doi:10.1145/293411.293455
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
110
-
-
59149083360
-
An analysis of privacy signals on the World Wide Web: Past, present and future
-
doi:10.1016/j.ins.2008.12.012
-
Reay, I., S. Dick, and J. Miller. 2009a. An analysis of privacy signals on the World Wide Web: Past, present and future. Information Sciences 179 (8): 1102-1115. doi:10.1016/j.ins.2008.12.012
-
(2009)
Information Sciences
, vol.179
, Issue.8
, pp. 1102-1115
-
-
Reay, I.1
Dick, S.2
Miller, J.3
-
111
-
-
70349754413
-
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations
-
doi:10.1145/1513876.1513878
-
Reay, I., S. Dick, and J. Miller. 2009b. A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. ACM Transactions on the Web 3 (2): 1-34. doi:10.1145/1513876.1513878
-
(2009)
ACM Transactions On the Web
, vol.3
, Issue.2
, pp. 1-34
-
-
Reay, I.1
Dick, S.2
Miller, J.3
-
112
-
-
34249005931
-
A survey and analysis of the P3P protocol's agents, adoption, maintenance, and future
-
doi:10.1109/TDSC.2007.1004
-
Reay, I., P. Beatty, S. Dick, and J. Miller. 2007. A survey and analysis of the P3P protocol's agents, adoption, maintenance, and future. IEEE Transactions on Dependable and Secure Computing 4 (2): 151-164. doi:10.1109/TDSC.2007.1004
-
(2007)
IEEE Transactions On Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 151-164
-
-
Reay, I.1
Beatty, P.2
Dick, S.3
Miller, J.4
-
113
-
-
13244295115
-
Customer data means money
-
August 20
-
Rendleman, J. 2001. Customer data means money. InformationWeek (August 20). Available at: http://www.informationweek.com/news/showArticle.jhtml?articleID=6506304
-
(2001)
InformationWeek
-
-
Rendleman, J.1
-
114
-
-
3042784586
-
Privacy on the web: Facts, challenges, and solutions
-
Rezgui, A., A. Bouguettaya, and M. Y. Eltoweissy. 2003. Privacy on the web: Facts, challenges, and solutions. IEEE Security & Privacy 1 (6): 40-49.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 40-49
-
-
Rezgui, A.1
Bouguettaya, A.2
Eltoweissy, M.Y.3
-
115
-
-
84889572834
-
Privacy, freedom and public-key cryptography
-
Rice, R. 1986. Privacy, freedom and public-key cryptography. Information Age 8 (4): 208-214.
-
(1986)
Information Age
, vol.8
, Issue.4
, pp. 208-214
-
-
Rice, R.1
-
116
-
-
0347931683
-
Strategic and ethical considerations in managing digital privacy
-
doi:10.1023/A:1025001627419
-
Sarathy, R., and C. J. Robertson. 2003. Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics 46 (2): 111-126. doi:10.1023/A:1025001627419
-
(2003)
Journal of Business Ethics
, vol.46
, Issue.2
, pp. 111-126
-
-
Sarathy, R.1
Robertson, C.J.2
-
117
-
-
33751188289
-
Privacy, fair information practices and the Fortune 500: The virtual reality of compliance
-
doi:10.1145/1047070. 1047075
-
Schwaig, K. S., G. C. Kane, and V. C. Storey. 2005. Privacy, fair information practices and the Fortune 500: The virtual reality of compliance. ACM SIGMIS Database 36 (1): 49-63. doi:10.1145/1047070. 1047075
-
(2005)
ACM SIGMIS Database
, vol.36
, Issue.1
, pp. 49-63
-
-
Schwaig, K.S.1
Kane, G.C.2
Storey, V.C.3
-
118
-
-
33749622781
-
Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures?
-
doi:10.1016/j.im.2006.07.003
-
Schwaig, K. S., G. C. Kane, and V. C. Storey. 2006. Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? Information & Management 43 (7): 805-820. doi:10.1016/j.im.2006.07.003
-
(2006)
Information & Management
, vol.43
, Issue.7
, pp. 805-820
-
-
Schwaig, K.S.1
Kane, G.C.2
Storey, V.C.3
-
119
-
-
0037402796
-
Privacy-enhancing technologies-Approaches and development
-
doi:10.1016/S0920-5489(03)00003-5
-
Senic ̌ar, V., B. Jerman-Blaz ̌ic ̌, and T. Klobuc ̌ar. 2003. Privacy-enhancing technologies-Approaches and development. Computer Standards & Interfaces 25 (2): 147-158. doi:10.1016/S0920-5489(03)00003-5
-
(2003)
Computer Standards & Interfaces
, vol.25
, Issue.2
, pp. 147-158
-
-
Seničar, V.1
Jerman-Blažič, B.2
Klobučar, T.3
-
120
-
-
84867939023
-
Online trust: A stakeholder perspective, concepts, implications, and future directions
-
doi:10.1016/S0963-8687(02)00022-7
-
Shankar, V., G. L. Urban, and F. Sultan. 2002. Online trust: A stakeholder perspective, concepts, implications, and future directions. The Journal of Strategic Information Systems 11 (3-4): 325-344. doi:10.1016/S0963-8687(02)00022-7
-
(2002)
The Journal of Strategic Information Systems
, vol.11
, Issue.3-4
, pp. 325-344
-
-
Shankar, V.1
Urban, G.L.2
Sultan, F.3
-
121
-
-
0038648204
-
Information technology and the social construction of information privacy
-
doi:10.1016/S0278-4254(01)00037-0
-
Shapiro, B., and C. R. Baker. 2001. Information technology and the social construction of information privacy. Journal of Accounting and Public Policy 20 (4): 295-322. doi:10.1016/S0278-4254(01)00037-0
-
(2001)
Journal of Accounting and Public Policy
, vol.20
, Issue.4
, pp. 295-322
-
-
Shapiro, B.1
Baker, C.R.2
-
122
-
-
0009946245
-
An investigation of gender differences in online privacy concerns and resultant behaviors
-
doi:10.1002/(SICI)1520-6653(199923)13:4,24::AID-DIR3.3.0.CO;2-O
-
Sheehan, K. B. 1999. An investigation of gender differences in online privacy concerns and resultant behaviors. Journal of Interactive Marketing 13 (4): 24-38. doi:10.1002/(SICI)1520-6653(199923)13:4,24::AID-DIR3.3.0.CO;2-O
-
(1999)
Journal of Interactive Marketing
, vol.13
, Issue.4
, pp. 24-38
-
-
Sheehan, K.B.1
-
123
-
-
0036005221
-
Toward a typology of Internet users and online privacy concerns
-
doi:10.1080/01972240252818207
-
Sheehan, K. B. 2002. Toward a typology of Internet users and online privacy concerns. The Information Society 18 (1): 21-32. doi:10.1080/01972240252818207
-
(2002)
The Information Society
, vol.18
, Issue.1
, pp. 21-32
-
-
Sheehan, K.B.1
-
124
-
-
0002179878
-
Flaming, complaining, abstaining: How online users respond to privacy concerns
-
Sheehan, K. B., and M. G. Hoy. 1999. Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising 28 (3): 37-51.
-
(1999)
Journal of Advertising
, vol.28
, Issue.3
, pp. 37-51
-
-
Sheehan, K.B.1
Hoy, M.G.2
-
125
-
-
0036563984
-
What companies are(n't) doing about website assurance
-
doi:10.1109/MITP.2002.1008535
-
Sivasailam, N., D. J. Kim, and H. R. Rao. 2002. What companies are(n't) doing about website assurance. IT Professional 4 (3): 33-40. doi:10.1109/MITP.2002.1008535
-
(2002)
IT Professional
, vol.4
, Issue.3
, pp. 33-40
-
-
Sivasailam, N.1
Kim, D.J.2
Rao, H.R.3
-
126
-
-
0035631803
-
Information privacy and marketing: What the U.S. should (and shouldn't) learn from Europe
-
Smith, H. J. 2001. Information privacy and marketing: What the U.S. should (and shouldn't) learn from Europe. California Management Review 43 (2): 8-33.
-
(2001)
California Management Review
, vol.43
, Issue.2
, pp. 8-33
-
-
Smith, H.J.1
-
127
-
-
34547110384
-
Privacy and e-commerce: A consumer-centric perspective
-
doi:10.1007/s10660-007-9002-9
-
Smith, R., and J. Shao. 2007. Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research 7 (2): 89-116. doi:10.1007/s10660-007-9002-9
-
(2007)
Electronic Commerce Research
, vol.7
, Issue.2
, pp. 89-116
-
-
Smith, R.1
Shao, J.2
-
128
-
-
84889565501
-
Smartphone trackers raise privacy worries
-
June 14
-
Steel, E., and J. Scheck. 2010. Smartphone trackers raise privacy worries. Wall Street Journal (June 14). Available at: http://online.wsj.com/article/SB10001424052748704067504575304643134531922.html
-
(2010)
Wall Street Journal
-
-
Steel, E.1
Scheck, J.2
-
129
-
-
78650572661
-
Facebook, MySpace confront privacy loophole
-
May 21
-
Steel, E., and J. E. Vascellaro. 2010. Facebook, MySpace confront privacy loophole. Wall Street Journal (May 21). Available at: http://online.wsj.com/article/SB10001424052748704513104575256701215465596.html
-
(2010)
Wall Street Journal
-
-
Steel, E.1
Vascellaro, J.E.2
-
130
-
-
0000322208
-
Privacy in organizations: Theoretical issues, research findings, and protection mechanisms
-
Stone, D. L., and E. F. Stone. 1990. Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management 8: 349-411.
-
(1990)
Research In Personnel and Human Resources Management
, vol.8
, pp. 349-411
-
-
Stone, D.L.1
Stone, E.F.2
-
132
-
-
80052091244
-
Slow-going for web-privacy software
-
September 8
-
Tuna, C. 2010. Slow-going for web-privacy software. Wall Street Journal (September 8). Available at: http://online.wsj.com/article/SB10001424052748703946504575469621089587394.html
-
(2010)
Wall Street Journal
-
-
Tuna, C.1
-
133
-
-
0037412301
-
Privacy on the web: An examination of user concerns, technology, and implications for business organizations and individuals
-
doi:10.1201/1078/43203.20.1.20031201/40079.2
-
Turner, E. C., and S. Dasgupta. 2003. Privacy on the web: An examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management 20 (1): 8-18. doi:10.1201/1078/43203.20.1.20031201/40079.2
-
(2003)
Information Systems Management
, vol.20
, Issue.1
, pp. 8-18
-
-
Turner, E.C.1
Dasgupta, S.2
-
134
-
-
84889574036
-
-
U.S. Census Bureau, Washington, D.C.: U.S. Census Bureau
-
U.S. Census Bureau. 2009. E-Stats. Washington, D.C.: U.S. Census Bureau. Available at: http://www. census.gov/econ/estats/2008/2008reportfinal.pdf
-
(2009)
E-Stats
-
-
-
135
-
-
49149130858
-
An empirical study of consumer perceptions and comprehension of Web site privacy policies
-
doi:10.1109/TEM.2008.922634
-
Vail, M. W., J. B. Earp, and A. I. Anton. 2008. An empirical study of consumer perceptions and comprehension of Web site privacy policies. IEEE Transactions on Engineering Management 55 (3): 442-454. doi:10.1109/TEM.2008.922634
-
(2008)
IEEE Transactions On Engineering Management
, vol.55
, Issue.3
, pp. 442-454
-
-
Vail, M.W.1
Earp, J.B.2
Anton, A.I.3
-
136
-
-
0000320829
-
The right to privacy
-
doi:10. 2307/1321160
-
Warren, S. D., and L. D. Brandeis. 1890. The right to privacy. Harvard Law Review 4 (5): 193-220. doi:10. 2307/1321160
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
137
-
-
29144489246
-
Public Key Infrastructure Overview
-
Palo Alto, CA: Sun Microsystems, Inc
-
Weise, J. 2001. Public Key Infrastructure Overview. Palo Alto, CA: Sun Microsystems, Inc. Available at: http://www.sun.com/blueprints/0801/publickey.pdf.
-
(2001)
Available At
-
-
Weise, J.1
-
138
-
-
0004073139
-
-
1st edition. New York, NY: Atheneum
-
Westin, A. F. 1967. Privacy and Freedom. 1st edition. New York, NY: Atheneum.
-
(1967)
Privacy and Freedom
-
-
Westin, A.F.1
-
139
-
-
0038803983
-
Social and political dimensions of privacy
-
doi:10.1111/1540-4560.00072
-
Westin, A. F. 2003. Social and political dimensions of privacy. The Journal of Social Issues 59 (2): 431- 453. doi:10.1111/1540-4560.00072
-
(2003)
The Journal of Social Issues
, vol.59
, Issue.2
, pp. 431-453
-
-
Westin, A.F.1
-
140
-
-
84869713803
-
Zogby Poll: Most Americans Worry About Identity Theft
-
Utica, NY: Zogby International
-
Zogby International. 2007. Zogby Poll: Most Americans Worry about Identity Theft. Utica, NY: Zogby International. Available at: http://www.zogby.com/NEWS/ReadNews.dbm?ID=1275
-
(2007)
-
-
|