Information Technology Reference
In-Depth Information
Olaniran, B. A., & Williams, D. E. (1995). Com-
munication distortion: An intercultural lesson
from the visa application process.
Communication
Quarterly, 43
, 225-240.
mation in database-driven relationship marketing.
Journal of Interactive Marketing, 16
(3), 2- 16.
Shaw, T. R. (2003). The moral intensity of privacy:
An empirical study of Webmasters' attitudes.
Journal of Business Ethics,
46
(4), 301-318.
Olivero, N., & Lunt, P. (2004). Privacy versus
willingness to disclose in e-commerce exchanges:
The effect of risk awareness on the relative role of
trust and control.
Journal of Economic Psychol-
ogy, 25
(2), 243-262.
Sheehan, K. B. (2002). Toward a typology of
Internet users and online privacy concerns.
The
Information Society,
18
, 21-32.
Sheehan, K. B., & Hoy, M. G. (2000). Dimen-
sions of online privacy concerns among online
consumers.
Journal of Public Policy & Market-
ing, 19
(1), 62-73.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy
concerns and consumer willingness to provide
personal information.
Journal of Public Policy
& Marketing, 19
(1), 27-41.
Sinrod, E. J. (2001). The future of Internet privacy.
Journal of Internet Law, 4
(9), 22-25.
Presler-Marshall, M. (2000). Web privacy and
the P3P standard.
IBM Raleigh Lab
.
Retrieved
f from ht t p://w w w7.sof t ware.ibm.com /vad.
nsf/Data/Document2363?OpenDocument&p
=1&BCT=1Footer=1
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996).
Information privacy: Measuring individuals'
concerns about organizational practices.
MIS
Quarterly,
20
(2), 167-196.
Reagle, J., & Cranor, L. F. (1999). The platform
for privacy preferences.
Communications of the
ACM, 42
(2), 48-55.
Stead, B. A., & Gilbert, J. (2001). Ethical issues
in electronic commerce.
Journal of Business
Ethics,
34
(2), 75-85.
Reda, S. (2000). VeriFone and Russell Reynolds
Associates Top 100 Internet retailers.
Stores
.
Retrieved September 2000, from https://www.
stores.org/archives/00top100int_1.asp
Stempel, G. H., & Wesley, B. H. (Eds.). (1981).
Research methods in mass communication
.
Englewood Cliffs, NJ: Prentice-Hall.
Roznowski, J. A. (2003). A content analysis of
mass media. Stories surrounding the consumer
privacy issue 1990-2001.
Journal of Interactive
Marketing,
17
(2), 52-69.
Stewart, K. A., & Segars, A. H. (2002). An em-
pirical examination of the concern for informa-
tion privacy instrument.
Information Systems
Research, 13
(1), 36-49.
Ryker, R., Lafleur, E., McManis, B., & Cox, K. C.
(2002). Online privacy policies: An assessment
of the Fortune E-50.
The Journal of Computer
Information Systems,
42
(4), 15-20.
Stillar, G. F. (1998).
Analyzing everyday texts.
Discourse, rhetoric, and social perspectives
.
Thousand Oaks, CA: Sage.
Strauss, A. L., & Corbin, J. (1990).
Basics of quali-
tative research: Grounded theory procedures and
techniques
. Newbury Park, CA: Sage.
Sama. L. M., & Shoaf, V. (2002). Ethics on the
Web: Applying moral decision-making to the new
media.
Journal of Business Ethics, 36
, 93-103.
Stubbs, M. (2001).
Words and phrases. Corpus
studies of lexical semantics
. Oxford: Blackwell.
Schoenbachler, D. D., & Gordon, G. L. (2002).
Trust and customer willingness to provide infor-
Search WWH ::
Custom Search