An Investigation of Consumer's Security and Privacy Perceptions in Mobile Commerce
暂无分享,去创建一个
Lakshmi S. Iyer | Rahul Singh | Hua Dai | Hua Dai | L. Iyer | Rahul Singh
[1] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[2] Paul Zellweger,et al. Web-based Sales: Defining the Cognitive Buyer , 1997, Electron. Mark..
[3] William David Salisbury,et al. Perceived security and World Wide Web purchase intention , 2001, Ind. Manag. Data Syst..
[4] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[5] Chang Liu,et al. Acceptance of Wireless Internet via Mobile Technology in China , 2005, AMCIS.
[6] Charles R. Hudson,et al. Wireless Security , 2007, Information Security Management Handbook, 6th ed..
[7] Godwin J. Udo,et al. Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..
[8] M. Jones. Privacy: A Significant Marketing Issue for the 1990s , 1991 .
[9] Keng Siau,et al. Building customer trust in mobile commerce , 2003, CACM.
[10] Kenneth C. Laudon,et al. Essentials of Management Information Systems , 2000 .
[11] Mark R. Brown,et al. Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..
[12] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[13] Brenda Dervin,et al. Private Rights, Public Wrongs: The Computer and Personal Privacy , 1989 .
[14] Anthony D. Miyazaki,et al. Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .
[15] George R. Milne. Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue , 2000 .
[16] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[17] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[18] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[19] Richard Beckwith,et al. Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..
[20] Ingoo Han,et al. The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..
[21] R. Rettie,et al. Adoption and usage of M-commerce: a cross-cultural comparison of Hong Kong and the United Kingdom , 2005 .
[22] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[23] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[24] Sirkka L. Jarvenpaa,et al. Managing the Paradoxes of Mobile Technology , 2005, Inf. Syst. Manag..
[25] Peter A. Todd,et al. Consumer Reactions to Electronic Shopping on the World Wide Web , 1996, Int. J. Electron. Commer..
[26] J. Rubenfeld. The Right of Privacy , 1989 .
[27] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[28] Bernd Carsten Stahl,et al. Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? , 2004, J. Organ. End User Comput..
[29] John Mylonakis,et al. Can mobile services facilitate commerce? Findings from the Greek telecommunications market , 2004, Int. J. Mob. Commun..
[30] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[31] Anil K. Gupta,et al. Trust within the Organization: Integrating the Trust Literature with Agency Theory and Transaction Costs Economics , 1999 .
[32] Annie I. Antón,et al. Addressing End-User Privacy Concerns , 2004, AMCIS.
[33] Annie I. Antón,et al. Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.
[34] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[35] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[36] David Pollino,et al. Wireless security , 2002 .
[37] Ellen R. Foxman,et al. Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .
[38] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[39] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[40] Sirkka L. Jarvenpaa,et al. Mobile commerce at crossroads , 2003, CACM.
[41] Robert P. Minch,et al. Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.