Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Laczniak, Gene R.
and
Murphy, Patrick E.
2006.
Marketing, Consumers and Technology: Perspectives for Enhancing Ethical Transactions.
Business Ethics Quarterly,
Vol. 16,
Issue. 3,
p.
313.
Castañeda, J. Alberto
Montoso, Francisco J.
and
Luque, Teodoro
2007.
The dimensionality of customer privacy concern on the internet.
Online Information Review,
Vol. 31,
Issue. 4,
p.
420.
Reay, Ian K.
Beatty, Patricia
Dick, Scott
and
Miller, James
2007.
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future.
IEEE Transactions on Dependable and Secure Computing,
Vol. 4,
Issue. 2,
p.
151.
No, Won Gyun
Boritz, J. Efrim
and
Sundarraj, R. P.
2008.
Do Companies' Online Privacy Policy Disclosures Match Customer Needs?.
SSRN Electronic Journal,
Boritz, Efrim
and
No, Won Gyun
2009.
A Gap in Perceived Importance of Privacy Policies between Individuals and Companies.
p.
181.
Reay, Ian
Beatty, Patricia
Dick, Scott
and
Miller, James
2009.
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.
International Journal of Information Security and Privacy,
Vol. 3,
Issue. 4,
p.
68.
Reay, Ian
Dick, Scott
and
Miller, James
2009.
A large-scale empirical study of P3P privacy policies.
ACM Transactions on the Web,
Vol. 3,
Issue. 2,
p.
1.
Reay, Ian
Beatty, Patricia
Dick, Scott
and
Miller, James
2011.
Security and Privacy Assurance in Advancing Technologies.
p.
374.
Beatty, Patricia
Reay, Ian
Dick, Scott
and
Miller, James
2011.
Consumer trust in e-commerce web sites.
ACM Computing Surveys,
Vol. 43,
Issue. 3,
p.
1.
Debatin, Bernhard
2011.
Privacy Online.
p.
47.
Boritz, J. Efrim
and
No, Won Gyun
2011.
E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery.
Journal of Information Systems,
Vol. 25,
Issue. 2,
p.
11.
Pollach, Irene
2011.
Online privacy as a corporate social responsibility: an empirical study.
Business Ethics: A European Review,
Vol. 20,
Issue. 1,
p.
88.
Lai, Fujun
Li, Dahui
and
Hsieh, Chang-Tseh
2012.
Fighting identity theft: The coping perspective.
Decision Support Systems,
Vol. 52,
Issue. 2,
p.
353.
Reay, Ian
Beatty, Patricia
Dick, Scott
and
Miller, James
2012.
Cyber Crime.
p.
1193.
Zahir Irani, Professor
C. Sipior, Janice
T. Ward, Burke
and
Connolly, Regina
2013.
Empirically assessing the continued applicability of the IUIPC construct.
Journal of Enterprise Information Management,
Vol. 26,
Issue. 6,
p.
661.
Aaken, Dominik van
Ostermaier, Andreas
and
Picot, Arnold Oskar
2013.
Privacy and Freedom: An Economic (Re-)Evaluation of Privacy.
SSRN Electronic Journal,
Bansal, Gaurav
and
Zahedi, Fatemeh Mariam
2014.
Trust-Discount Tradeoff in Three Contexts: Frugality Moderating Privacy and Security Concerns.
Journal of Computer Information Systems,
Vol. 55,
Issue. 1,
p.
13.
Chang, Linda
and
Chen, Jengchung Victor
2014.
Aligning principal and agent’s incentives: A principal–agent perspective of social networking sites.
Expert Systems with Applications,
Vol. 41,
Issue. 6,
p.
3091.
van Aaken, Dominik
Ostermaier, Andreas
and
Picot, Arnold
2014.
Privacy and Freedom: An Economic (Re‐)Evaluation of Privacy.
Kyklos,
Vol. 67,
Issue. 2,
p.
133.
Broman Toft, Madeleine
Schuitema, Geertje
and
Thøgersen, John
2014.
The importance of framing for consumer acceptance of the Smart Grid: A comparative study of Denmark, Norway and Switzerland.
Energy Research & Social Science,
Vol. 3,
Issue. ,
p.
113.