572
Views
32
CrossRef citations to date
0
Altmetric
Privacy and Security in E-Business

Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals

&

References

  • Chaum , D. 1997 . David Chaum on Electronic Commerce: How Much Do You Trust Big Brother . IEEE Internet Computing , November/December : 8 – 16 .
  • Bakos , J. and Brynjolfsson , E. 1999 . Bundling Information Goods: Pricing, Profits, and Efficiency . Management Science , 45 ( 12 ) December : 1613 – 1630 .
  • Straub , D. and Collins , R. 1990 . Key Information Liability Issues Facing Managers: Software Piracy, Databases and Individual Rights to Privacy . MIS Quarterly , June : 143 – 156 .
  • Joss , M. June 1 2001 . “ Do You Need a CPO? ” . In ComputerUser June 1 , available at http://www.computeruser.com/articles/2006.1.2.0601.01.html
  • 2000 . Business Week-Harris Poll . Results printed in Business Week , March 20 issue
  • Payton , F. 2001 . Ecommerce: Technologies That Do Steal! . Decision Line , March : 13 – 14 .
  • Sipior , J. 1998 . Ethical Management of Employee E-Mail Privacy . Information Systems Management , 15 Winter : 41 – 48 .
  • Warren , S. and Brandeis , L. 1890 . The Right of Privacy . Harvard Law Review , 4:5 March : 193 – 220 .
  • Schoemann , F. 1984 . Philosophical Dimensions of Privacy: An Anthology , New York : Cambridge University Press .
  • Westin , A. 1967 . Privacy and Freedom , New York : Atheneum .
  • Toscana , P. 2001 . Taming the Cyber Frontier: Security Is Not Enough! available at http://www.usertrust.com/news/taming-cyberspace.html
  • Mason , R. , Culnan , M. , Ang , S. , Mason , F. , Dickson , G. and DeSantis , G. 2001 . “ Information Technology and the Future Enterprise: New Models for Managers ” . In Privacy in the Age of the Internet , Upper Saddle River, NJ : Prentice-Hall .
  • Clarke , R. 1988 . Information Technology and Dataveillance . Communications of the ACM , May : 498 – 512 .
  • Davis , J. 2000 . Protecting Privacy in the Cyber Era . IEEE Technology and Society Magazine , Summer : 10 – 22 .
  • Louis Harris and Associates, Inc. 1992 . Harris-Equifax Consumer Privacy Survey 1992 , Atlanta, GA : Equifax Inc. .
  • Ackerman , M. , Cranor , L. and Reagle , J. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences . Proceedings of the ACM Conference on E-Commerce . Denver, CO
  • Grimm , R. and Rossnagel , A. 2000 . Can P3P Help to Protect Privacy Worldwide? . ACM Multimedia Workshop , January
  • Culnan , M. 1993 . How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use . MIS Quarterly , September : 341
  • Baker , J. , Warren , J. , Thorwaldson , J. and Koball , B. Personal Information and Privacy, Proceedings of the First Conference on Computers, Freedom and Privacy . pp. 42 – 45 . Los Alamitos, CA : IEEE Computer Society Press .
  • Westin , A. 1991 . “ Domestic and International Data Protection Issues ” . In How the American Public Views Consumer Privacy Issues in the Early 90′s—And Why, Testimony before the Subcommittee on Government Information, Justice and Agriculture , 54 – 68 . Washington, D.C. : Committee on Government Relations, U.S. House of Representatives, U.S. Government Printing Office .
  • Spiekermann , S. , Grossklags , J. and Bettina , B. E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior . Proceedings of the ACM Conference on Electronic Commerce EG'01 . October .
  • Gordon , H. , Roth , S. , Lieberman , S. , Zeller , A. and McConnell , A. Customer Relationship Management: A Senior Management Guide to Technology for Creating a Customer-Centric Business available at http://www.the-dma.org/library/publications/customerrelationship.shtml
  • 2001 . Direct Marketing Association White Paper . The Impact of Data Restrictions on Consumer Distance Shopping , March available at http://www.the-dma.org/library/whitepapers
  • Artz , J. March 2001 . Protecting Privacy in Cyberspace: Just Selfishness or Is It Immoral?, Presentation at George Washington University Seminar Series on the History of Recent Science March , Washington, D.C.
  • Lin , D. and Loui , M. 1998 . Taking the Byte out of Cookies: Privacy . Consent and the Web, Computer and Society , June
  • Mason , R. 1986 . Four Ethical Issues of the Information Age . MIS Quarterly , June : 143 – 156 .
  • White , J. 1991 . President's Letter . Communications of the ACM , 34 ( 5 ) May : 15 – 16 .
  • Swire , P. 1999 . Privacy Excerpt from “Towards Digital eQuality: The U.S. Government Working Group on Electronic Commerce” . 2nd Annual Report , December www.ecommerce.gov
  • Federal Trade Commission . May 2000 . “ Privacy Online: Fair Information Practices in the Electronic Marketplace ” . In A Report to Congress May , Washington, D.C.
  • Consumer International, Privacy@net: An International Comparative Study of Consumer Privacy on the Internet, January 2001.
  • Culnan , M. 1999 . Georgetown Internet Privacy Policy Study Washington, D.C. http://www.msb.edu/faculty/cunanm/GIPPS/mmexs
  • An up-to-date summary of pending privacy legislation can be found at the Center for Democracy and Technology Web site located at http://www.cdt.org/legislation/107th/privacy
  • Kristol , D. 2001 . HTTP Cookies: Standard, Privacy and Politics . ACM Transactions on Internet Technology , 1 ( 2 ) November : 151 – 198 .
  • Berghel , H. 2001 . Cyberprivacy in the New Millenium . IEEE Computer Magazine , 34 ( 1 ) January : 133 – 134 .
  • Harding , W. 2001 . Cookies and Web Bugs: What They Are and How They Work Together . Information Systems Management, Boston , 18 ( 3 ) Summer : 17 – 25 .
  • Shapiro , C. and Varian , H. 1999 . Information Rules: A Strategic Guide to the Network Economy , Boston, MA : Harvard Business School Press .
  • McGraw , G. and Morrisett , G. 2000 . Attacking Malicious Code: A Report to the Infosec Research Council . IEEE Software , September/October : 33 – 41 .
  • December 1999 . “ Electronic Privacy Information Center ” . In Surfer Beware III: Privacy Policies without Privacy Protection December , Washington, D.C. http://www.epic.org/reports/surfer-beware3.html
  • Gabber , E. , Gibbons , P. , Kristol , D. , Mataias , Y. and Mayer , A. 1999 . Consistent, Yet Anonymous Access with LPWA . Communications of the ACM , February : 39 – 41 .
  • Berghel , H. 2002 . Hijacking the Web: Cookies Revisited: Continuing the Dialogue on Personal Security and Underlying Privacy Issues . Communications of the ACM , April : 23 – 28 .
  • Pew Internet and American Life Project, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, August 2000 http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privac y_Report.pdf
  • P3P 1.0: A New Standard in Online Privacy, http://www.w3c.org/P3P/
  • Martin , D. , Smith , R. , Brittain , M. , Fetch , I. and Wu , H. 2000 . The Privacy Practices of Web Browser Extensions . Communications of the ACM , February : 45 – 50 .
  • Bellman , S. , Johnson , E. and Lohse , G. 2001 . To Opt-In or Opt-Out? It Depends on the Question . Communications of the ACM , February : 25 – 27 .
  • Hochheiser , H. Principles for Privacy Protection Software . Proceedings of the Conference on Freedom and Privacy .
  • Bakos , J. and Kemerer , C. 1992 . Recent Applications of Economic Theory in Information Technology Research . Decision Support Systems , 8 : 365 – 386 .
  • Rogers , E. 1995 . Diffusion of Innovations , 4th ed. , New York : The Free Press .
  • Davis , F. , Bagozzi , R. and Warshaw , P. 1989 . User Acceptance of Computer Technology: A Comparison of Two Theoretical Models . Management Science , 35 ( 8 ) August : 985

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.