Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 42, 2010 - Issue 1
189
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

An Evaluation of Consumer Privacy Protection in E-Commerce Websites: A Comparative Study of Six E-Stores: Part I

Pages 1-16 | Published online: 23 Nov 2010

REFERENCES

  • Al-Muhtadi , J. , Campbell , R. , Kapadia , A. , Mickunas , M. D. and Yi , Seung . Routing through the mist: Privacy preserving communication in ubiquitous computing environments . Proceedings of the International Conference of Distributed Computing Systems . pp. 65 – 74 .
  • Araujo , I. Privacy mechanisms supporting the building of trust in E-Commerce . Proceedings of the 21st International Conference on Data Engineering Workshops (ICDEW'05) 0 . pp. 1193
  • Bass , G. 2003 . “ Case study: One company's response to the California Identity Theft Law. SANS Security Essentials ” . In GSEC Practical Assignment 10 – 13 . Version 1.4b
  • Belanger , F. , Hiller , J. and Smith , W. 2002 . Trustworthiness in electronic commerce: the role of privacy, security, and site attributes . Journal of Strategic Information Systems , 11 : 245 – 270 .
  • Bellamy , C. and Taylor , J. A. 1998 . Governing in the Information Age , Buckingham : Open University Press .
  • Bhatti , R. , Bertino , E. , Ghafoor , A. and Joshi , J. 2004 . XML based specification for Web services document security . IEEE Computer Society , : 41 – 49 .
  • Bigley , G. and Pearce , J. 1998 . Straining for Shared Meaning in Organization Science: Problems of Trust and Distrust . Academy of Management Review , 23 ( 3 ) : 405 – 421 .
  • Boni , M. D. and Prigmore , M. Cultural Aspects of Internet Privacy . In Proceedings of the 7th annual UK Academy for Information Systems Conference (UKAIS’02) . pp. 1 – 7 .
  • Brown , M. and Muchira , R. 2004 . Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior . Journal of Electronic Commerce Research , 5 ( 1 ) : 62 – 70 .
  • Chen , F. and Sandhu , R. 1996 . Constraints for role-based access control . Association for Computing Machinery, ACM RBAC Workshop, , : 39 – 46 .
  • Chung , W. and Paynter , J. Privacy Issues on the Internet . In Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE . pp. 1 – 9 .
  • Das , T.K. and Teng , B.-S. 1998 . Between trust and control: Developing confidence in partner cooperation in alliances . Academy of Management Review , 23 ( 3 ) : 491 – 512 .
  • Geffen , D. , Karahanna , E. and Straub , D. 2003 . Trust and TAM in Online Shopping: An Integrated Model . MIS Quarterly , 27 ( 1 ) March : 51 – 90 .
  • Gefen , D , Rose , G. , Warkentin , M. and Pavlou , P. 2005 . Cultural diversity and trust in IT adoption:A comparison of potential e-Voters in the USA and South Africa . Journal of Global Information Management , 13 ( 1 ) : 54 – 79 .
  • Hosmer , L. 1995 . Trust: The Connecting Link Between Organizational Theory and Philosophical Ethics . Academy of Management Review , 20 ( 2 ) : 379 – 403 .
  • IBM & Microsoft. (2002). Security in a Web services world a proposed architecture and roadmap http://www-128.ibm.com/developerworks/webservices/library/ws-secmap/index.html#2.5 (http://www-128.ibm.com/developerworks/webservices/library/ws-secmap/index.html#2.5) (Accessed: 15 December 2009 ).
  • Iyer , B. , Freedman , J. , Gaynor , M. and Wyner , G. 2003 . Web services: Enabling dynamic business networks . Communications of the Association for Information Systems , 11 : 525 – 554 .
  • Joshi , J.B.D. , Aref , W.G. , Ghafoor , A. and Simon , E.. 2001 . Security model for Web-based applications . Communication of the ACM , 44 ( 2 ) : 38 – 44 .
  • Jupp , V. and Shine , S. Government portals: The next generation of government online. In the . Proceedings of the 1st European Conference on E-Government . pp. 217 – 223 .
  • Kim , S. and Montalto , C.P. 2002 . Perceived risk of privacy invasion and the use of online technology by consumers . Consumer Interests Annual , 48 : 1 – 9 .
  • Koshutanski , H. and Massacci , F. 2003 . An access control framework for business processes for Web services . ACM Workshop on XML Security , : 15 – 24 .
  • Kuanchin , C. and Rea , A.L. Jr. 2004 . Protecting private information online privacy concerns and control techniques . Journal of Computer Information Systems , 44 ( 4 ) : 85 – 92 .
  • Layne , K. and Lee , J. 2001 . Developing fully functional egovernment: A four stage model . Government Information Quarterly , 18 ( 2 ) : 122
  • Lee , M. and Turban , E. 2001 . A Trust Model for Consumer Internet Shopping . International Journal of Electronic Commerce , 6 ( 1 ) : 75 – 91 .
  • Lewis , D. and Weigert , A. 1985 . Trust as a Social Reality . Social Forces , 63 ( 4 ) : 967 – 985 .
  • McKnight , D. , Choudhury , V. and Kacmar , C. 2002 . Developing and validating trust measures for e-Commerce: An integrative typology . Information Systems Research , 13 ( 3 ) : 334 – 359 .
  • Muir , B.M. 1987 . Trust Between Humans and Machines, and the Design of Decision Aids . International Journal of Man-Machine Systems , 27 ( 5 ) : 527 – 539 .
  • Olivier , M. FLOCKS: Distributed proxies for browsing privacy . Proceedings of SAICSIT . Stellenbosch , South Africa. pp. 79 – 88 .
  • Rezgui , A. , Bouguettaya , A. and Eltoweissy , M. Y. 2003 . Privacy on the Web: Facts, Challenges, and Solutions . IEEE Security & Privacy, , : 40 – 49 .
  • Rousseau , Denise , M. , Sitkin , S.B. , Burt , R.S. and Camerer , C. 1998 . Not so different after all: A cross-discipline view of trust . Academy of Management Review , 23 ( 3 ) : 393 – 404 .
  • Sandhu , R. , Coyne , E. and Youman , C. 1996 . Role-based access control models . IEEE Computer Society , 29 ( 2 ) : 38 – 47 .
  • Shneiderman , B. 2000 . Designing Trust into Online Experiences . Communications of the ACM , 43 ( 12 ) December : 57 – 59 .
  • Sleeper , B. 2001 . Defining Web services , San Francisco : The Stencil Group .
  • Soppera , A. and Burbridge , T. 2004 . Maintaining privacy in pervasive computing—Enabling acceptance of sensor-based services . BT Technology Journal , 22 ( 3 ) : 106 – 118 .
  • Torkzadeh , G. and Dhillon , G. 2002 . Measuring Factors that Influence the Success of Internet Commerce . Information Systems Research , 13 ( 1 ) June : 187 – 204 .
  • Watson, M.L.(2004). Can There Be Just One Trust? http://www.instituteforpr.org/files/uploads/2004_Watson.pdf (http://www.instituteforpr.org/files/uploads/2004_Watson.pdf) (Accessed: 31 June 2010 ).
  • Yoon , S. 2002 . The Antecedents and Consequences of Trust in Online-Purchase Decisions . Journal of Interactive Marketing , 16 ( 2 ) : 47 – 63 .
  • Zucker , L.G. 1986 . Production of Trust: Institutional Sources of Economic Sources . Research in Organizational Behaviour , 8 : 53 – 111 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.