865
Views
23
CrossRef citations to date
0
Altmetric
Articles

Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques

&
Pages 85-92 | Published online: 01 Feb 2016

References

  • Al-Jabri, I. “Gender Differences in Computer Attitudes among Secondary School Students in Saudi Arabia,” Journal of Computer Information Systems, 37:1, 1996, pp. 70–75.
  • Arbaugh, J.B. “An Exploratory Study of Effects of Gender on Student Learning and Class Participation in an Internet-based MBA Course,” Management Learning, 31:4, 2000, pp. 503–519.
  • Bahmanziari, T., J. Pearson, and L. Crosby. “Is Trust Important in Technology Adoption? A Policy Capturing Approach,” Journal of Computer Information Systems, 43:4, 2003, pp. 46–54.
  • Brown, T., R. Williams, and J. Brown. “A Comparison of Attitudes toward Computers among Business Professionals in China, Japan, and the United States,” Journal of Computer Information Systems, 38:3, 1998, pp. 1–5.
  • Brunner, C. “Gender and Distance Learning,” Annals of the American Academy of Political and Social Science, 1991, pp. 133–145.
  • Chen, K., I. Chen, and H. Paul. “Explaining Online Behavioral Differences: An Internet Dependency Perspective,” Journal of Computer Information Systems, 41:3, 2001, pp. 59–63.
  • Chua, S.L., D.T. Chen, and A.F.L. Wong. “Computer Anxiety and Its Correlates: A Meta-Analysis,” Computers in Human Behaviors, 15, 1999, pp. 609–623.
  • Clarke, R. “Internet Privacy Concerns Confirm the Case for Intervention,” Communications of the ACM, 42:2, 1999, pp. 60–67.
  • D'Astous, A. “Irritating Aspects of the Shopping Environment,” Journal of Business Research, 49, 2000, pp. 149–156.
  • Festa, P. “Windows Media Aware of DVDs Watched,” CNet News, 2002. Retrieved April 8, 2003, from http://news.com.com/2100-1023-841766.html.
  • Fram, E.H. and D.B. Grady. “Internet Shoppers: Is There a Surfer Gender Gap?” Direct Marketing, January 1997, pp. 46–50.
  • Gefen, D. and D.W. Straub. “Gender Differences in the Perception and Use of Email: An Extension to the Technology Acceptance Model,” MIS Quarterly, 21:4, 1997, pp. 389–4000.
  • Goodwin, C. “Privacy: Recognition of a Consumer Right,” Journal of Public Policy & Marketing, 10:1, 1991, pp. 149–166.
  • Herring, S.C. “Gender and Participation in Computer-mediated Linguistic Discourse,” ERIC Clearinghouse on Languages and Linguistics, 1992, Document no. ED 345552.
  • Hoffman, D.L., T.P. Novak, and M. Peralta. “Building Consumer Trust Online,” Communications of the ACM, 42:4, 1999, pp. 80–85.
  • Kilbourne, W. and S. Weeks. “A Socio-economic Perspective on Gender Bias in Technology,” Journal of Socio-Economics, 26:1, 1997, pp. 243–260.
  • King, J., T. Bond, and S. Blandford. “An Investigation of Computer Anxiety by Gender and Grade,” Computers in Human Behavior, 18, 2002, pp. 69–84.
  • Large, A., J. Beheshti, and T. Rahman. “Gender Differences in Collaborative Web Searching Behavior: An Elementary School Study,” Information Processing & Management, 38, 2002, pp. 427–443.
  • Lazar, J. and J. Preece. “Designing and Implementing Web-based Surveys,” Journal of Computer Information Systems, 39:4, 1999, pp. 63–67.
  • Liu, C. and K. Arnett. “Raising a Red Flag on Global WWW Privacy Policies,” Journal of Computer Information Systems, 43:1, 2002, pp. 117–127.
  • McKnight, D.H., V. Choudhury, and C. Kacmar. “Trust in E-commerce Vendors: A Two-stage Model,” Proceedings of the Association for Information Systems, 2000, pp. 532–536.
  • Meyers-Levy, J. and D. Maheswaran. “Exploring Differences in Males' and Females' Processing Strategies,” Journal of Consumer Research, 18, June 1991, pp. 63–70.
  • Morris, L. and S. Pharr. “Invasion of Privacy: A Dilemma for Marketing Research and Database Technology,” Journal of Systems Management, October 1992, pp. 10–11, 30–31, 42–43.
  • Oakes, C. “Mouse Pointer Records Clicks,” Wired News, 1999. Retrieved April 8, 2003, from http://www.wired.com/news/print/0,1294,32788.00.html.
  • Pearson, J., L. Crosby, T. Bahmanziari, and E Conrad. “An Empirical Investigation into the Relationship between Organizational Culture and Computer Efficacy as Moderated by Age and Gender,” Journal of Computer Information Systems, 43:2, 2003, pp. 58–70.
  • Perri 6. “Who Wants Privacy Protection, and What Do They Want?” Journal of Consumer Behavior, 2:1, 2002, pp. 80–100.
  • Phelps, J., G. Nowak, and E. Ferrell. “Privacy Concerns and Consumer Willingness to Provide Personal Information,” Journal of Public Policy & Marketing, 19:1, 2000, pp. 27–41.
  • Qutami, Y. and M. Abu-Jaber. “Students' Self-efficacy in Computer Skills as a Function of Gender and Cognitive Learning Style at Sultan Qaboos University,” International Journal of Instructional Media, 24:1, 1997, pp. 63–74.
  • Radcliff, D. “Giving Users Back Their Privacy,” ComputerWorld, 2001. Retrieved April 8, 2003, from http://www.computerworld.com/storyba/0,4125,NAV47_STO61981,00.html.
  • Rainer, R., K. Laosethakul, and M. Astone. “Are Gender Perceptions of Computing Changing Over Time?” Journal of Computer Information Systems, 43:4, 2003, pp. 108–114.
  • Ranganathan, C. and E. Grandon. “An Exploratory Examination of Factors Affecting Online Sales,” Journal of Computer Information Systems, 42:3, 2002, pp. 87–93.
  • Robinson, J.P., P.R. Shaver, and L.S. Wrightsman. “Criteria for Scale Selection and Evaluation,” In Robinson, J.P., P.R. Shaver, and L.S. Wrightsman (Eds.). Measures of Personality and Social Psychological Attitudes. San Diego: Academia, 1991.
  • Ryker, R., E. Lafleur, B. McManis, and K. Cox. “Online Privacy Policies: An Assessment of the Fortune E-50,” Journal of Computer Information Systems, 42:4, 2002, pp. 15–20.
  • Schoder, D. and P. Yin. “Building Firm Trust Online,” Communications of the ACM, 43:12, 2000, pp. 73–79.
  • Sheehan, K.B. and M.G. Hog. “Dimensions of Privacy Concern Among Online Consumers,” Journal of Public Policy & Marketing, 19:1, 2000, pp. 62–73.
  • Smith, H.J., S.J. Milberg, and S.J. Burke. “Information Privacy: Measuring Individuals' Concerns about Organizational Practices,” MIS Quarterly, June 1996, pp. 167–196.
  • Stewart, K.A. and A.H. Segars. “An Empirical Examination of the Concern for Information Privacy Instrument,” Information Systems Research, 13:1, 2002, pp. 36–49.
  • Walstrom, K. “Chief Executive Officer's Misperceptions: Should Students be used as Surrogates?” Journal of Computer Information Systems, 37:2, 1996–1997, pp. 108–112.
  • Wang, H., M. Lee, and C. Wang. “Consumer Privacy Concerns about Internet Marketing,” Communications of the ACM, 41:3, 1998, pp. 63–71.
  • Whitman, M., A. Hendrickson, A. Townsend, and R. Rensvold. “Computer Aversion and Computer-use Ethics in U.S. and Asian Cultures,” Journal of Computer Information Systems, 38:4, 1998, pp. 19–24.
  • Winter, S., C. Saunders, and P. Hart. “Electronic Window Dressing: Impression Management on the Internet.” Paper presented at the International Conference on Information systems, Atlanta, GA, 1997.
  • Wood, W. and R. Glass. “Sex as a Determinant of Software Piracy,” Journal of Computer Information Systems, 36:2, 1995–1996, pp. 37–43.
  • Wright, M. and J. Kakalik. “The Erosion of Privacy,” Computers and Society, 27:4, 1997, pp. 22–25.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.