22.12.2012 Views

www.sharexxx.net - free books & magazines

www.sharexxx.net - free books & magazines

www.sharexxx.net - free books & magazines

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Electronic Commerce and Data Privacy 235<br />

Chin, W.W. and Todd, P.A. (1995). On the use, usefulness, and ease of use of<br />

structural equation modeling in MIS research: A note of caution. MIS<br />

Quarterly, 19(2), 237-246.<br />

Cranor, L. F., Reagle, J. and Ackerman, M. S. (1999). Beyond concern:<br />

Understanding <strong>net</strong> users’ attitudes about online privacy. AT&T Labs-<br />

Research Technical Report TR 99.4.3. Retrieved February 1, 2000 on the<br />

World Wide Web: http://<strong>www</strong>.research.att.com/library/TRs/99/99.4/99.4.3/<br />

report.htm.<br />

Culnan, M. J. (1993). How did they get my name? An exploratory investigation of<br />

consumer attitudes toward secondary information use. MIS Quarterly,<br />

17(3), 341-363.<br />

Culnan, M. J. (1999a). The Georgetown Inter<strong>net</strong> Privacy Policy Survey.<br />

Retrieved December 1, 1999 on the World Wide Web: http://<strong>www</strong>.msb.edu/<br />

faculty/culnanm/gippshome.html.<br />

Culnan, M. J. (1999b). Privacy and the top 100 Web sites: A report to the Federal<br />

Trade Commission. The Online Privacy Alliance. Retrieved December 1,<br />

1999 on the World Wide Web: http://<strong>www</strong>.msb.edu/faculty/culnanm/<br />

gippshome.html.<br />

Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989). User acceptance of<br />

computer technology: A comparison of two theoretical models. Management<br />

Science, 35(8), 982-1003.<br />

Drucker, P. F. (1999). Beyond the information revolution, The Atlantic Monthly.<br />

Fishbein, M. and Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An<br />

Introduction to Theory and Research. Reading, MA: Addison-Wesley.<br />

FTC. (1998). Privacy online: A report to congress. Federal Trade Commission.<br />

Retrieved on the World Wide Web: http://<strong>www</strong>.ftc.gov/privacy.<br />

FTC. (1999). Self-regulation and privacy online: A report to Congress. Federal<br />

Trade Commission. Retrieved December 1, 1999 on the World Wide Web:<br />

http://<strong>www</strong>.ftc.gov/privacy.<br />

FTC. (2000). Privacy online: Fair information practices in the electronic marketplace.<br />

Federal Trade Commission. Retrieved June 21, 2000 on the World<br />

Wide Web: http://<strong>www</strong>.ftc.gov/reports.<br />

Garfinkel, S. (2000). Protecting your privacy concerns about third-party monitoring<br />

putting a damper on e-commerce. Boston Globe, January, C4.<br />

Garver, M. S. and Mentzer, J. T. (1999). Logistics research methods: Employing<br />

structural equation modeling to test for construct validity. Journal of Business<br />

Logistics, 20(1), 33-57.<br />

GVU. (1998). GVU’s 10th WWW user survey. Georgia Tech Graphics,<br />

Visualization & Usability Center. Retrieved on the World Wide Web: http:/<br />

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without written<br />

permission of Idea Group Inc. is prohibited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!