Information Technology Reference
In-Depth Information
to examine fabrication of information online.
Marketing Letters, 14
(4), 257-272.
tion: Determining how and why privacy matters.
Journal of Direct Marketing, 9
(3), 46-60.
Malhotra, N.K., Kim, S.S., & Agarwal, J. (2004).
Internet users' information privacy concerns
(IUIPC): The construct, the scale and a causal
model.
Information Systems Research, 15
, 336-
355.
Nua Internet Surveys. (2002). How many online?
Retrieved August 4, 2007, from
http://Www.Nua.
Com/Surveys/How_Many_Online/Index.html
Nua Internet Surveys. (2003). Nielsen Netrat-
ings: Global net population increases. Retrieved
August 4, 2007, from http://www.Nua.Com/Sur-
veys/Index
Mascarenhas, O.A.J., Kesavan, R., & Bernacchi,
M.D. (2003). Co-managing online privacy: A call
for joint ownership.
The Journal of Consumer
Marketing, 20
(7), 686-702.
Office of the Federal Privacy Commissioner.
(2001a). Privacy and the community (Roy Mor-
gan Research). Retrieved August 4, 2007, from
http://www.privacy.gov.au/publications/rcom-
munity.pdf
McCloskey, H. (1980). Privacy and the right to
privacy.
Philosophy, 55
(211), 17-38.
Milne, G.R., & Rohm, A.J. (2000). Consumer
privacy and name removal across direct marketing
channels: Exploring opt-in and opt-out alterna-
tives.
Journal of Public Policy & Marketing,
19
(2), 238-249.
Orwell, G. (1951).
Nineteen eighty-four
. London:
Secker and Warburg.
Paine, C., Reips, U.-D., Stieger, S., Joinson, A.N.,
& Buchanan, T. (2006).
Internet users' perceptions
of “privacy concerns” and “privacy actions.”
Manuscript submitted for publication.
Milne, G.R, Rohm, A.J, & Bahl, S. (2004).
Consumers protection of online privacy and
identity.
The Journal of Consumer Affairs, 38
(2),
217-232.
Pavlou, P. (2003). Consumer acceptance of elec-
tronic commerce: Interrating trust and risk with
the technology acceptance model.
International
Journal of Electronic Commerce, 7
(3), 101-134.
Mitchell, V.-W. (1999). Consumer perceived risk:
Conceptualisations and models.
European Jour-
nal of Marketing, 33
(1/2), 163-195.
Perri 6. (2002). Who wants privacy protection
and what do they want?
Journal of Consumer
Behaviour, 2
(1), 80-100.
Miyazaki, A., & Fernandez, A. (2001). Consumer
perceptions of privacy and security risks for on-
line shopping.
The Journal of Consumer Affairs,
35
(1), 27-44.
Peslak, A.R. (2006). Internet privacy policies of
the largest international companies.
Journal of
Electronic Commerce in Organisations,
4
(3),
46-62.
Myspace.com. (2007).
Privacy policy
. Retrieved
August 4, 2007, from
http://www.myspace.com/
Modules/Common/Pages/Privacy.aspx
Rainie, L., & Kohut, A. (2000). Tracking online
life: How women use the Internet to cultivate
relationships with family and friends.
Nijboer, J. (2004). Big brother versus anonym-
ity on the Internet: Implications for Internet
service providers.
New Library World, 105
(7/8),
256-261.
Retsky, M.L. (2001). Just posting cookies agree-
ment not enough.
Marketing News, 35
(20), 12-
13.
Nowak, G.J., & Phelps, J. (1995). Direct marketing
and the use of individual-level consumer informa-
Search WWH ::
Custom Search