Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/336992.336995acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
Article
Free access

Privacy in e-commerce: examining user scenarios and privacy preferences

Published: 01 November 1999 Publication History
First page of PDF

References

[1]
Ackerman, Mark S. and Lorrie F. Cranor (1999). Privacy Critics: UI Components to Safeguard Users' Privacy. Proceedings of the A CM Conference on Human Factors in Computing Systems (CHI'99), short papers (v.2.), 258-259.
[2]
Benassi, Paola. TRUSTe: an online privacy seal program (1999). Communications of the A CM 42(2):56-59.
[3]
Cranor, Lorrie F. and Joseph Reagle (1998). Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project. In Jeffrey K. MacKie-Mason and David Waterman, eds., Telephony, the Internet, and the Media. Mahwah: Lawrence Erlbaum Associates.
[4]
Cranor, Lorrie F., Joseph Reagle, and Mark S. Ackerman (1999). Beyond Concern: Understanding Net Users' Attitudes about Online Privacy. AT&T Labs-Research technical report TR 99.4.3. http://www.research.att.com/library/trs/TRs/99/99.4.
[5]
Culnan, Mary J. (1993). "How did they get my name?": an exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17:341-364.
[6]
Georgia Tech Graphics, Visualization & Usability Center (1998). GVU's 10th WWW User Survey. http ://www. gvu. gatech, edu/usersurveys
[7]
Hine, Christine and Juliet Eve (1998). Privacy in the marketplace. The Information Society 14(4):253-262.
[8]
Milne, George R. and Maria-Eugenia Boza (1998). Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices. Marketing Science Institute Working Paper Report No. 98-117.
[9]
Pew Research Center for the People & the Press (1999). Online Newcomers More Middle-Brow, Less Work-Oriented: The Internet News Audience Goes Ordinary. http://www.peoplepress.org/tech98sum.htm
[10]
Raab, Charles D. and Colin J. Bennett (1998). The Distribution of Privacy Risks: Who Needs Protection? The Information Society 14(4):253-262.
[11]
Reagle, Joseph and Lorrie Faith Cranor (1999). The platform for privacy preferences. Communications of the A CM 42(2):48-55.
[12]
Turner, Charles, and Elizabeth Martin, ed. (1984). Surveying Subjective Phenomena. New York: Russell Sage Foundation.
[13]
Westin, Alan F. (1991 ). Harris-Equifax Consumer Privacy Survey 1991. Atlanta, GA: Equifax Inc.
[14]
Westin, Alan F. (1994). Equifax-Harris Consumer Privacy Survey 1994. Atlanta, GA: Equifax Inc.
[15]
Westin, Alan F. (1996). The 1996 Equifax-Harris Consumer Privacy Survey. Atlanta, GA: Equifax Inc.
[16]
Westin, Alan F. (1998). E-commerce & Privacy: What Net Users Want. Hackensack, NJ: Privacy & American Business.

Cited By

View all
  • (2024)A Study on Exploring the Intersectionality Between India's Data Protection Laws and Consumer Digital PrivacyIntersections Between Rights and Technology10.4018/979-8-3693-1127-1.ch007(101-134)Online publication date: 10-Jul-2024
  • (2024)Patient Satisfaction with the Mawiidi Hospital Appointment Scheduling Application: Insights from the Information Systems Success Model and Technology Acceptance Model in a Moroccan Healthcare SettingBig Data and Cognitive Computing10.3390/bdcc81201808:12(180)Online publication date: 3-Dec-2024
  • (2024)Pattern Analysis of Cyber Crime Incidents to Predict Occurrence and Selection of The Best Technology to Prevent ITInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT24106110410:6(624-629)Online publication date: 8-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
EC '99: Proceedings of the 1st ACM conference on Electronic commerce
November 1999
187 pages
ISBN:1581131763
DOI:10.1145/336992
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1999

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Platform for Privacy Preferences
  2. World Wide Web
  3. electronic commerce
  4. privacy
  5. privacy protocols
  6. user survey

Qualifiers

  • Article

Conference

EC99
Sponsor:
EC99: ACM Conference on Electronic Commerce
November 3 - 5, 1999
Colorado, Denver, USA

Acceptance Rates

Overall Acceptance Rate 664 of 2,389 submissions, 28%

Upcoming Conference

EC '25
The 25th ACM Conference on Economics and Computation
July 7 - 11, 2025
Stanford , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)993
  • Downloads (Last 6 weeks)90
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Study on Exploring the Intersectionality Between India's Data Protection Laws and Consumer Digital PrivacyIntersections Between Rights and Technology10.4018/979-8-3693-1127-1.ch007(101-134)Online publication date: 10-Jul-2024
  • (2024)Patient Satisfaction with the Mawiidi Hospital Appointment Scheduling Application: Insights from the Information Systems Success Model and Technology Acceptance Model in a Moroccan Healthcare SettingBig Data and Cognitive Computing10.3390/bdcc81201808:12(180)Online publication date: 3-Dec-2024
  • (2024)Pattern Analysis of Cyber Crime Incidents to Predict Occurrence and Selection of The Best Technology to Prevent ITInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT24106110410:6(624-629)Online publication date: 8-Nov-2024
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • (2024)Fair Recommendations with Limited Sensitive Attributes: A Distributionally Robust Optimization ApproachProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657822(448-457)Online publication date: 10-Jul-2024
  • (2024)Examining Human Perception of Generative Content Replacement in Image Privacy ProtectionProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642103(1-16)Online publication date: 11-May-2024
  • (2024)Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce servicesComputers and Security10.1016/j.cose.2023.103646138:COnline publication date: 1-Mar-2024
  • (2024)How might the GDPR evolve? A question of politics, pace and punishmentComputer Law & Security Review10.1016/j.clsr.2024.10603354(106033)Online publication date: Sep-2024
  • (2023)"Is reporting worth the sacrifice of revealing what i've sent?"Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632213(491-508)Online publication date: 7-Aug-2023
  • (2023)"If sighted people know, i should be able to know"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620498(4661-4678)Online publication date: 9-Aug-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media