Privacy by design and customers' perceived privacy and security concerns in the success of e-commerce
暂无分享,去创建一个
Suzanne Zyngier | Ibraheem Mubarak Alharbi | Chris Hodkinson | Suzanne Zyngier | Christopher S. Hodkinson | I. Alharbi
[1] Vincenzo Russo,et al. Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States , 2006, J. Glob. Inf. Manag..
[2] Athman Bouguettaya,et al. Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..
[3] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[4] Tomaz Klobucar,et al. Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.
[5] R. Petty. Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .
[6] Chen Wang,et al. Consumer privacy concerns about Internet marketing , 1998, CACM.
[7] Pauline Ratnasingam,et al. The Role of E-Commerce Adoption Among Small Businesses: An Exploratory Study , 2006 .
[8] I. Ajzen. The theory of planned behavior , 1991 .
[9] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[10] Hsiu-Sen Chiang,et al. Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..
[11] J. Efrim Boritz,et al. E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery , 2011, J. Inf. Syst..
[12] J. Creswell,et al. Determining Validity in Qualitative Inquiry , 2000 .
[13] Nina Evans,et al. Internet Usage in Small Businesses in Regional South Australia: Service Learning Opportunities for a Local University. , 2009 .
[14] Peter Schaar,et al. Privacy by Design , 2010 .
[15] Robert W. Zmud,et al. Arrangements for Information Technology Governance: A Theory of Multiple Contingencies , 1999, MIS Q..
[16] Ann Cavoukian,et al. Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D , 2010 .
[17] Carmela Troncoso,et al. Engineering Privacy by Design , 2011 .
[18] Steven Furnell,et al. Security implications of electronic commerce: a survey of consumers and businesses , 1999, Internet Res..
[19] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[20] S. C. L. Koh,et al. The adoption of e‐business and knowledge management in SMEs , 2007 .
[21] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[22] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[23] Steven De Haes,et al. An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment , 2009, Inf. Syst. Manag..
[24] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[25] S. Laforet,et al. CONSUMERS’ ATTITUDES TOWARDS ONLINE AND MOBILE BANKING IN CHINA , 2005 .
[26] M. D. Myers,et al. Qualitative Research in Business & Management , 2008 .
[27] Angèle L. M. Cavaye,et al. Case study research: a multi‐faceted research approach for IS , 1996, Inf. Syst. J..
[28] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[29] C. R. Baker,et al. Information Technology and the Social Construction of Information Privacy , 2001 .
[30] Nena Lim,et al. Consumers' perceived risk: sources versus consequences , 2003, Electron. Commer. Res. Appl..
[31] L. Kool,et al. Privacy by Design: an alternative to existing practice in safeguarding privacy , 2011 .
[32] John Mingers,et al. Combining IS Research Methods: Towards a Pluralist Methodology , 2001, Inf. Syst. Res..
[33] Carlos Flavián,et al. Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..
[34] J. Alberto Castañeda,et al. The dimensionality of customer privacy concern on the internet , 2007, Online Inf. Rev..
[35] David C. Yen,et al. Cyberspace security management , 1999 .
[36] Matthew K. O. Lee,et al. A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..
[37] Greg Dimitriadis,et al. Focus Groups: Strategic Articulations of Pedagogy, Politics, and Inquiry. , 2005 .
[38] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[39] Juan José García,et al. The importance of perceived trust, security and privacy in online trading systems , 2009, Inf. Manag. Comput. Secur..
[40] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[41] Michael D. Myers,et al. Qualitative Research in Information Systems , 1997, MIS Q..
[42] Elizabeth Dowler,et al. Short cuts to safety: Risk and 'rules of thumb' in accounts of food choice , 2003 .
[43] Michael D. Myers,et al. The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..