Information Technology Reference
In-Depth Information
Bradac, J. J. (2001). Theory comparison: Uncer-
tainty reduction, problematic integration, uncer-
tainty management, and other curious constructs.
Journal of Communication, 51 (3), 456-476.
Culnan, M. J. (1993). How did they get my name?
An exploratory investigation of consumer at-
titudes toward secondary information use. MIS
Quarterly, 17 (3), 341-361.
Brown, M., & Muchira, R. (2004). Investigating
the relationship between Internet privacy concerns
and online purchase behavior. Journal of Elec-
tronic Commerce Research, 5 (1), 62-70.
Culnan, M. J. (1999). Georgetown Internet pri-
vacy policy survey: Report to the Federal Trade
Commission . Retrieved from http://www.msb.
edu/faculty/culnanm/gippshome.html
Callow, K. (1998). Man and message. A guide to
meaning-based text analysis . Boston: University
Press of America.
Culnan, M. J., & Armstrong, P. K. (1999). Infor-
mation privacy concerns, procedural fairness,
and impersonal trust: An empirical investigation.
Organization Science, 10 (1), 104-115.
Caudill, E. M., & Murphy, P. E. (2000). Consumer
online privacy: Legal and ethical issues. Journal
of Public Policy & Marketing, 19 (1), 7-19.
Cunningham, P. J. (2002). Are cookies hazard-
ous to your privacy? Information Management
Journal, 36 (3), 52-54.
Charters, D. (2002). Electronic monitoring and
privacy issues in business-marketing: The ethics
of the DoubleClick experience. Journal of Busi-
ness Ethics, 35 , 243-254.
Daly, J. P., Pouder, R. W., & Kabanoff, B. (2004).
The effects of initial differences in firms' espoused
values on their postmerger performance. The
Journal of Applied Behavioral Science, 40 (3),
323-343.
Cragan, J. F., & Shields, D. C. (1998). Understand-
ing communication theory. The communicative
forces for human action . Boston: Allyn and
Bacon.
Danna, A., & Gandy, O. H., Jr. (2002). All that
glitters is not gold: Digging beneath the surface
of data mining. Journal of Business Ethics, 40 ,
373-386.
Cranor, L. F. (1998). Internet privacy: A public
concern. netWorker: The Craft of Network Com-
puting, 2 (2), 13-18.
Delaney, E. M., Goldstein, C. E., Gutterman, J.,
& Wagner, S. N. (2003). Automated computer
privacy preferences slowly gain popularity. In-
tellectual Property & Technology Law Journal,
15 (8), 17.
Cranor, L. F., Byers, S., & Kormann, D. (2003).
An analysis of P3P deployment on commercial,
government, and children's Web sites as of May
2003 (Technical Report prepared for the 14 May
2003 Federal Trade Commission Workshop on
Technologies for Protecting Personal Informa-
tion). Retrieved from http://www.research.att.
com/projects/p3p/
Dhillon, G. S., & Moores, T. T. (2001). Internet
privacy: Interpreting key issues. Information
Resources Management Journal, 14 (4), 33-37.
Dommeyer, C. J., & Gross, B. L. (2003). What
consumers know and what they do: An investi-
gation of consumer knowledge, awareness, and
use of privacy protection strategies. Journal of
Interactive Marketing, 17 (2), 34-51.
Cranor, L. F., Reagle, J., & Ackerman, M. S.
(1999). Beyond concern: Understanding net
users' attitudes about online privacy (AT&T
Labs-Research Technical Report TR 99.4.3).
Retrieved from http://www.research.att.com/proj-
ects/privacystudy/
Döring, N. (2002). Personal home pages on the
Web: A review of research. Journal of Computer-
Search WWH ::




Custom Search