Information Technology Reference
In-Depth Information
Olaniran, B. A., & Williams, D. E. (1995). Com-
munication distortion: An intercultural lesson
from the visa application process. Communication
Quarterly, 43 , 225-240.
mation in database-driven relationship marketing.
Journal of Interactive Marketing, 16 (3), 2- 16.
Shaw, T. R. (2003). The moral intensity of privacy:
An empirical study of Webmasters' attitudes.
Journal of Business Ethics, 46 (4), 301-318.
Olivero, N., & Lunt, P. (2004). Privacy versus
willingness to disclose in e-commerce exchanges:
The effect of risk awareness on the relative role of
trust and control. Journal of Economic Psychol-
ogy, 25 (2), 243-262.
Sheehan, K. B. (2002). Toward a typology of
Internet users and online privacy concerns. The
Information Society, 18 , 21-32.
Sheehan, K. B., & Hoy, M. G. (2000). Dimen-
sions of online privacy concerns among online
consumers. Journal of Public Policy & Market-
ing, 19 (1), 62-73.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy
concerns and consumer willingness to provide
personal information. Journal of Public Policy
& Marketing, 19 (1), 27-41.
Sinrod, E. J. (2001). The future of Internet privacy.
Journal of Internet Law, 4 (9), 22-25.
Presler-Marshall, M. (2000). Web privacy and
the P3P standard. IBM Raleigh Lab . Retrieved
f from ht t p://w w w7.sof t ware.ibm.com /vad.
nsf/Data/Document2363?OpenDocument&p
=1&BCT=1Footer=1
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996).
Information privacy: Measuring individuals'
concerns about organizational practices. MIS
Quarterly, 20 (2), 167-196.
Reagle, J., & Cranor, L. F. (1999). The platform
for privacy preferences. Communications of the
ACM, 42 (2), 48-55.
Stead, B. A., & Gilbert, J. (2001). Ethical issues
in electronic commerce. Journal of Business
Ethics, 34 (2), 75-85.
Reda, S. (2000). VeriFone and Russell Reynolds
Associates Top 100 Internet retailers. Stores .
Retrieved September 2000, from https://www.
stores.org/archives/00top100int_1.asp
Stempel, G. H., & Wesley, B. H. (Eds.). (1981).
Research methods in mass communication .
Englewood Cliffs, NJ: Prentice-Hall.
Roznowski, J. A. (2003). A content analysis of
mass media. Stories surrounding the consumer
privacy issue 1990-2001. Journal of Interactive
Marketing, 17 (2), 52-69.
Stewart, K. A., & Segars, A. H. (2002). An em-
pirical examination of the concern for informa-
tion privacy instrument. Information Systems
Research, 13 (1), 36-49.
Ryker, R., Lafleur, E., McManis, B., & Cox, K. C.
(2002). Online privacy policies: An assessment
of the Fortune E-50. The Journal of Computer
Information Systems, 42 (4), 15-20.
Stillar, G. F. (1998). Analyzing everyday texts.
Discourse, rhetoric, and social perspectives .
Thousand Oaks, CA: Sage.
Strauss, A. L., & Corbin, J. (1990). Basics of quali-
tative research: Grounded theory procedures and
techniques . Newbury Park, CA: Sage.
Sama. L. M., & Shoaf, V. (2002). Ethics on the
Web: Applying moral decision-making to the new
media. Journal of Business Ethics, 36 , 93-103.
Stubbs, M. (2001). Words and phrases. Corpus
studies of lexical semantics . Oxford: Blackwell.
Schoenbachler, D. D., & Gordon, G. L. (2002).
Trust and customer willingness to provide infor-
Search WWH ::




Custom Search