549
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

E-Government users’ privacy and security concerns and availability of laws in Dubai

, &

References

  • Bannister, F. 2005. “The Panoptic State: PRIVACY, Surveillance, the Balance of Risk.” Information Policy 10 (1&2): 65–78.
  • Baum, C., and A. Di Maio. 2008. Gartner's Four Phases of E-Government Model. Gartner Group Research, 2001, Accessed October 5, 2011. http://aln.hha.dk/IFI/Hdi/2001/ITstrat/Download/Gartner_eGovernment.pdf
  • Bellamy, C., C. Raab, and T. Perry. 2005a. “Joined-Up Government and Privacy in the United Kingdom: Managing Tensions between Data Protection and Social Policy (part 1).” Public Administration 83 (1): 111–133. doi: 10.1111/j.0033-3298.2005.00440.x
  • Bellamy, C., C. Raab, and T. Perry. 2005b. “Joined-Up Government and Privacy in the United Kingdom: Managing Tensions between Data Protection and Social Policy (part 2).” Public Administration 83 (2): 393–415. doi: 10.1111/j.0033-3298.2005.00455.x
  • Bloom, P. N., G. R. Milne, and R. Adler. January, 1994. “Avoiding Misuse of New Information Technologies: Legal and Societal Consideration.” Journal of Marketing 58: 98–110. doi: 10.2307/1252254
  • Cespedes, F. V., and J. H. Smith. 1993. “Database Marketing: New Rules for Policy and Practice.” Sloan Management Review 34: 7–22.
  • Cheng, F. C., and W. H. Lai. 2012. “The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy.” Procedia Engineering, International Workshop on Information and Electronics Engineering 29: 241–25.
  • Clark, R. 2009. “Privacy Impact Assessment: Its Origins and Development.” Computer Law & Security Review 25: 123–135. doi: 10.1016/j.clsr.2009.02.002
  • Clarke, R. 1999. “Internet Privacy Concerns Confirm the Case for Intervention.” Communication of the ACM 42: 60–67. doi: 10.1145/293411.293475
  • Costa, L. 2012. “Privacy and the Precautionary Principle.” Computer Law & Security Review 28: 14–24. doi: 10.1016/j.clsr.2011.11.004
  • Cullen, R. 2009. “Culture, Identity and Information Privacy in the Age of Digital Government.” Online Information Review 33 (3): 405–421. doi: 10.1108/14684520910969871
  • Culnan, M. J. 1993. “How did they Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use.” MIS Quarterly 17: 341–362. doi: 10.2307/249775
  • Culnan, M. J. and Amstrong, P. K. 1999. “Information Privacy Concerns, Procedural Fairness and Impersonal Trust: An Empirical Investigation.” Organisation Science 10 (1): 104–115. doi: 10.1287/orsc.10.1.104
  • Davis, F. D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.” MIS Quarterly 13 (3): 319–340. doi: 10.2307/249008
  • Dinev, T., and P. Hart. 2006. “An Extended Privacy Calculus Model for E-Commerce Transactions.” Information Systems Research 17 (1): 61–80. doi: 10.1287/isre.1060.0080
  • Foley, P., A. Ximena, and M. Al Sakko. 2006. “Information Sharing for Social Inclusion in England: A Review of Activities, Barriers and Future Directions.” Journal of Information, Communication and Ethics in Society 4 (4): 191–203. doi: 10.1108/14779960680000292
  • Hallinan, D., M. Friedewald, and P. McCarthy. 2012. “Citizens’ Perceptions of Data Protection and Privacy in Europe.” Computer Law & Security Review 28: 263–272. doi: 10.1016/j.clsr.2012.03.005
  • Hiller, J. S., and R. Cohen. 2001. Internet Law and Policy. Upper Saddle River, NJ: Prentice-Hall.
  • Hoffman, D., T. Novak, and M. Peralta. 1999. “Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web.” The Information Society 15 (2): 129–139. doi: 10.1080/019722499128583
  • Howard, M. 2001. “E-Government Across the Globe: How Will E- Change Government?.” Government Finance Review 17 (4): 6–9.
  • Khan, S. 2010. “Apps.Gov: Assessing Privacy in the Cloud Computing.” NCJL & Tech 11: 259–289.
  • Kim, D. J., Y. I. Song, S. B. Braynov, and H. R. Rao. 2005. “A Multidimenstional Trust Formation Model in B-to-C E-Commerce: A Conceptual Framework and Content Analyses of Academia/Practitioner Perspectives.” Decision Support Systems 40: 143–165. doi: 10.1016/j.dss.2004.01.006
  • Koufaris, M., and W. Hampton-Sosa. 2004. “The Development of Initial Trust in an Online Company by New Customers.” Information & Management 41 (3): 377–397. doi: 10.1016/j.im.2003.08.004
  • Laczniak, E. R., and P. E. Murphy. 1993. Ethical Marketing Decisions: The Higher Road. Boston, MA: Allyn and Bacon.
  • Lam, W. 2005. “Barriers to E-Government Integration.” Journal of Enterprise Information Management 18 (5): 511–530. doi: 10.1108/17410390510623981
  • Layne, K., and J. Lee. 2001. “Developing Fully Functional E-Government: A Four Stage Model.” Government Information Quarterly 18 (2): 122–136. doi: 10.1016/S0740-624X(01)00066-1
  • Lee, M. K. O., and E. Turban. 2001. “A Trusted Model for Consumer Internet Shopping.” International Journal of Electronic Commerce 1 (1): 75–91.
  • Miyazaki, A. D., and A. Fernandez. 2001. “Consumer Perceptions of Privacy and Security Risks for Online Shopping.” The Journal of Consumer Affairs 35 (1): 27–44. doi: 10.1111/j.1745-6606.2001.tb00101.x
  • Moon, M. J. 2002. “The Evolution of E-Government among Municipalities: Rhetoric or Reality?” Public Administration Review 62 (4): 424–432. doi: 10.1111/0033-3352.00196
  • Nam, C., C. Song, E. Lee, and C. Park. 2006. “Consumers Privacy Concerns and Willingness to Provide Marketing-Related Personal Information Online.” Advances in Consumer Research 33: 212–217.
  • Pavlou, P. A. 2003. “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model.” International Journal of Electronic Commerce 7 (3): 101–134.
  • Personalliberty.com. 2011. “Privacy Concern of Consumers”. http://www.personalliberty.com
  • Phelps, J., G. Nowak, and E. Ferrell. 2000. “Privacy Concerns and Consumer Willingness to Provide Personal Information.” Journal of Public Policy & Marketing 19: 27–41. doi: 10.1509/jppm.19.1.27.16941
  • Pincus, L. B., and R. Johns. 1997. “Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for their Comparative Evaluation.” Journal of Business Ethics 16: 1237–1260. doi: 10.1023/A:1005746000135
  • Pitt, L. F., R. T. Watson, and C. B. Kavan. 1995. “Service Quality: A Measure of Information Systems Effectiveness.” MIS Quarterly 19 (2): 173–188. doi: 10.2307/249687
  • Raab, C. D. 1998. “Trust Technology and Privacy.” http://www.abdn.ac.uk/Philosophy/endsendmeans/vol3no1/raab.shtml
  • Raja, V. T., and N. J. King. 2012. “Protecting the Privacy and Security of Sensitive Customer Data in the Cloud.” Computer Law and Security Review 28: 308–319. doi: 10.1016/j.clsr.2012.03.003
  • Reidenberg, J. R. 1996. “Governing networks and rule-making in cyberspace.” Emory Law Journal 45: 896–897.
  • Safire, W. 2002. “The Intrusion Explosion.” The New York Times (May 2): 27.
  • Sarikas, O. D., and V. Weerakkody. 2007. “Realising Integrated E-Government Services: A UK Local Government Perspective.” Transforming Government: People, Process and Policy 1 (2): 153–173. doi: 10.1108/17506160710751986
  • Schneier, L. R., August 20, 2007. “Your Data are Less Safe today than 2 Years Ago.” Computer World. http://www.computerworld.com
  • Sheehan, K. B., and M. G. Hoy. 1999. “Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns.” Journal of Advertising 28: 37–51. doi: 10.1080/00913367.1999.10673588
  • Smith, H. J., S. J. Milberg, and S. J. Burke. 1996. “Information Privacy: Measuring Individuals’ Concerns about Organizational Practices.” MIS Quarterly 20 (June): 167–196. doi: 10.2307/249477
  • Solove, D. J. 2008. Understanding Privacy. Cambridge, Massachusetts: Harvard University Press.
  • Strader, T. J., and M. J. Shaw. 1997. “Characteristics of Electronic Markets.” Decision Support Systems 21: 185–198. doi: 10.1016/S0167-9236(97)00028-6
  • Suh, B., and I. Han. 2003. “The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce.” International Journal of Electronic Commerce 73: 135–161.
  • Van Slyke, C., J. T. Shim, R. Johnson, and J. Jiang. 2006. “Concern for Information Privacy and Online Consumer Purchasing.” Journal of the Association for Information Systems 7 (6): 415–443.
  • Westin, A. F. 1967. Privacy Freedom. New York: Athenem.
  • Wolfinbarger, M., and M. Gilly. 2001. “Shopping Online for Freedom, Control, and Fun.” California Management Review 7 (3): 7–37.
  • Wu, K. W., S. Y. Huan, D. C. Yen, and I. Popova. 2012. “The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust.” Computers in Human Behavior 28: 889–897. doi: 10.1016/j.chb.2011.12.008
  • Zhao, J. J., and S. J. Zhao. 2010. “Opportunities and Threats: A Security Assessment of State E-Government Websites.” Government Information Quarterly 27: 49–56. doi: 10.1016/j.giq.2009.07.004

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.