{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:02:31Z","timestamp":1725465751213},"publisher-location":"Vienna","reference-count":40,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3211241485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-211-27283-6_25","type":"book-chapter","created":{"date-parts":[[2005,11,10]],"date-time":"2005-11-10T00:08:26Z","timestamp":1131581306000},"page":"273-284","source":"Crossref","is-referenced-by-count":3,"title":["An International Comparison of Approaches to Online Privacy Protection"],"prefix":"10.1007","author":[{"given":"Peter","family":"O'Connor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","DOI":"10.7591\/9781501722134","volume-title":"Regulating Privacy: Data Protection and Public Policy in Europe and the United States","author":"C. Bennett","year":"1992","unstructured":"Bennett, C (1992). Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca: NY: Cornell University Press."},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/01972240252818216","volume":"18","author":"J.-F. Blanchette","year":"2002","unstructured":"Blanchette, J.-F. and D. G. Johnson (2002). Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness. The Information Society 18: 33\u201345.","journal-title":"The Information Society"},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/13600860220136084","volume":"16","author":"R. Cain","year":"2002","unstructured":"Cain, R (2002). Global Privacy Concerns and Regulation-Is the United States a World Apart? International Review of Law Computers & Technology, 16(1), pp 23\u201334.","journal-title":"International Review of Law Computers & Technology"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1080\/019722499128411","volume":"15","author":"L. J. Camp","year":"1999","unstructured":"Camp, L. J. (1999). Web Security and Privacy: An American Perspective. The Information Society 15: 249\u2013256.","journal-title":"The Information Society"},{"issue":"3","key":"25_CR5","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1002\/dir.10036","volume":"16","author":"B. Carroll","year":"2002","unstructured":"Carroll, B. (2002). Price of Privacy: Selling Consumer Databases in Bankruptcy. Journal of Interactive Marketing 16(3): 47\u201358.","journal-title":"Journal of Interactive Marketing"},{"issue":"1","key":"25_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1509\/jppm.19.1.20.16944","volume":"19","author":"M. Culnan","year":"2000","unstructured":"Culnan, M. (2000). Protecting Privacy Online: Is Self-Regulation Working? Journal of Public Policy and Marketing 19(1): 20\u201326.","journal-title":"Journal of Public Policy and Marketing"},{"issue":"2","key":"25_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/13600830120074690","volume":"10","author":"A. Endeshaw","year":"2001","unstructured":"Endeshaw, A. (2001). The Legal Significance of Trademarks. Information & Communications Technology Law 10(2): 203\u2013230.","journal-title":"Information & Communications Technology Law"},{"key":"25_CR8","volume-title":"Privacy","author":"EPIC Alert","year":"2000","unstructured":"EPIC Alert (2000). Privacy. Washington DC, Electronic Privacy Information Center: 7.16."},{"key":"25_CR9","unstructured":"EPIC (2003). Privacy & Human Rights: An International Survey of Privacy Laws and Developments, Electronic Privacy Information Center"},{"key":"25_CR10","unstructured":"European Community (1995). Directive 95\/46\/EC of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Community (November): 23:L 281."},{"key":"25_CR11","volume-title":"Privacy Online: Fair Information Practices in the Electronic Marketplace","author":"Federal Trade Commission","year":"2000","unstructured":"Federal Trade Commission (2000). Privacy Online: Fair Information Practices in the Electronic Marketplace, Federal Trade Commission's Consumer Response Center. Washington."},{"key":"25_CR12","unstructured":"Georgia Tech Research Corporation (1997). Seventh WWW User Survey, http:\/\/www.cc.gatech.edu\/gvu\/user_surveys."},{"key":"25_CR13","unstructured":"Gilbert, J. (2001). Privacy? Who needs Privacy? Business 2.0 (August): 20."},{"key":"25_CR14","volume-title":"Permission Marketing: Turning Strangers into Friends, and Friends into Customers","author":"S. Godin","year":"1999","unstructured":"Godin, S (1999). Permission Marketing: Turning Strangers into Friends, and Friends into Customers, Simon and Schuster, New York."},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1023\/A:1016323815802","volume":"39","author":"S. Grabner-Kraeuter","year":"2002","unstructured":"Grabner-Kraeuter, S (2002). The Role of Consumers' Trust in Online Shopping. Journal of Business Ethics, 39: 43\u201350.","journal-title":"Journal of Business Ethics"},{"key":"25_CR16","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3233\/HSM-2001-20208","volume":"20","author":"M. Head","year":"2001","unstructured":"Head, M & Yuan, Y (2001). Privacy protection in electronic commerce \u2014 a theoretical framework. Human Systems Management, 20 pp 149\u2013160.","journal-title":"Human Systems Management"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/S0167-4048(98)80069-2","volume":"17","author":"S. Hinde","year":"1998","unstructured":"Hinde, S. (1998). Privacy and Security-The Drivers for Growth of E-Commerce. Computers and Security 17: 475\u2013478.","journal-title":"Computers and Security"},{"key":"25_CR18","unstructured":"Internet & American Life (2000). New Internet Users: What They Do Online, What They Don't and Implications for the Net's Future. Washington DC, http:\/\/www.pewinternet.org\/reports\/toc.asp?Report=22."},{"issue":"2","key":"25_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1111\/1475-679X.00104","volume":"41","author":"K. Jamal","year":"2003","unstructured":"Jamal, K, Maier, M, & Sunder, S (2003). Privacy in E-Commerce: Development of Reporting Standards, Disclosure and Assurance Services in an Unregulated Market. Journal of Accounting Research, 41(2) pp285\u2013309.","journal-title":"Journal of Accounting Research"},{"key":"25_CR20","volume-title":"The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet","author":"C. Jennings","year":"2001","unstructured":"Jennings C & Fena L (2001). The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet, The Free Press, New York, 2000."},{"key":"25_CR21","unstructured":"Kandra, A & Brandt, A (2003). The Great American Privacy Makeover, PC World, November pp 145\u2013160."},{"key":"25_CR22","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3233\/HSM-2000-19403","volume":"19","author":"E. Kelly","year":"2000","unstructured":"Kelly, E (2000). Ethical aspects of managing customer privacy in electronic commerce, Human Systems Management, 19, pp 237\u2013244.","journal-title":"Human Systems Management"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, S (2001). A Comprehensive Analysis of Permission Marketing, Journal of Computer-Mediated Communication, 6(2), http:\/\/www.ascusc.org\/jcmc\/vo16\/issue2\/krishnamurthv.html","DOI":"10.1111\/j.1083-6101.2001.tb00119.x"},{"key":"25_CR24","unstructured":"Lee Larson, J, Larson, R and Greenlee, J (2003). Privacy Protection on the Internet. Strategic Finance, June, pp 49\u201353."},{"issue":"3","key":"25_CR25","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1080\/13501760210138778","volume":"9","author":"W. Long","year":"2002","unstructured":"Long, W & Quek, M (2002). Personal data privacy protection in an age of globalization: the US-EU safe harbour compromise. Journal of European Public Policy 9(3), pp 325\u2013344","journal-title":"Journal of European Public Policy"},{"issue":"3","key":"25_CR26","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/S0267-3649(98)80024-1","volume":"14","author":"V. Mayer-Schonberger","year":"1998","unstructured":"Mayer-Schonberger, V (1998). The Internet and Privacy Legislation: Cookies for a treat? Computer Law & Security Report, 14(3) pp 166\u2013174.","journal-title":"Computer Law & Security Report"},{"key":"25_CR27","unstructured":"Metz, C. (2001). What They Know. PC Magazine (November 13): 104\u2013118."},{"issue":"1","key":"25_CR28","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1111\/j.1745-6606.2002.tb00419.x","volume":"36","author":"A. Miyazaki","year":"2002","unstructured":"Miyazaki, A & Krishnamurthy, S (2002), Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions, Journal of Consumer Affairs, 36(1),, 28\u201349","journal-title":"Journal of Consumer Affairs"},{"key":"25_CR29","unstructured":"Nunes, P. and A. Kambil (2001). Personalization? No Thanks. Harvard Business Review (April): 32\u201334."},{"key":"25_CR30","first-page":"401","volume-title":"Information and Communications Technologies in Tourism 2003","author":"P. O'Connor","year":"2004","unstructured":"O'Connor, P (2004). Privacy and the Online Hotel Customer: An Analysis of the Use of Fair Information Practices by International Hotel Companies in AJ. Frew (Ed) Information and Communications Technologies in Tourism 2003, Spinger, New York, p 401\u2013413"},{"key":"25_CR31","first-page":"382","volume-title":"Information and Communications Technologies in Tourism 2003","author":"P. O'Connor","year":"2003","unstructured":"O'Connor, P (2003) Privacy and the Online Hotel Customer: An analysis of Fair Information Practices by International Hotel Companies, in Information and Communications Technologies in Tourism 2003, Andrew J Frew, Peter O'Connor and Martin Hitz (eds.), New York, Springer-Verlag Wien, p 382\u2013392"},{"key":"25_CR32","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/S0167-739X(99)00062-X","volume":"16","author":"R. Opplinger","year":"2000","unstructured":"Opplinger, R. (2000). Privacy Protection and anonymity services for the World Wide Web (WWW). Future Generation Computer Systems 16: 379\u2013391.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"25_CR33","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/dir.1019","volume":"15","author":"J. E. Phelps","year":"2001","unstructured":"Phelps, J. E., G. D'Souza, et al. (2001). Antecedents and Consequences of Consumer Privacy Concerns: An Empirical Investigation. Journal of Interactive Marketing 15(4): 2\u201317.","journal-title":"Journal of Interactive Marketing"},{"issue":"4","key":"25_CR34","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1177\/009207002236917","volume":"30","author":"R. Rust","year":"2002","unstructured":"Rust, R, Kannan, P and Peng, N (2002). The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science, 30(4) pp 455\u2013464.","journal-title":"Journal of the Academy of Marketing Science"},{"key":"25_CR35","unstructured":"Ryker, R., E. LaFleur, et al. (2002). Online Privacy Policies: An assessment of the Fortune E-50. Journal of Computer Information Systems (Summer): 15\u201320."},{"key":"25_CR36","unstructured":"Taylor S (2003). Protecting Privacy In Canada's Private Sector. The Information Management Journal, July \/ August, pp 33\u201339."},{"key":"25_CR37","first-page":"72","volume":"124","author":"A. Turinas","year":"2002","unstructured":"Turinas A & Bart Showalter (2002). Privacy in the electronic age. Managing Intellectual Property, 124, pp 72\u201378.","journal-title":"Managing Intellectual Property"},{"key":"25_CR38","first-page":"407","volume":"16","author":"D. Valentine","year":"2000","unstructured":"Valentine, D. (2000). Privacy on the Internet: The evolving legal landscape. Santa Clara Computer and High Tech Law Journal (16): 407\u2013408.","journal-title":"Santa Clara Computer and High Tech Law Journal"},{"key":"25_CR39","unstructured":"Weber, T. (2000). On the Internet, Everybody wants to be a Nobody. WSJ Europe. Paris: 26."},{"issue":"2","key":"25_CR40","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1080\/101967801300197034","volume":"11","author":"D. Zwick","year":"2001","unstructured":"Zwick, D & Dholakia, N (2001). Contrasting European and American Approaches to Privacy in Electronic Markets: Property Right vs. Civil Right, Electronic Markets, 11(2) 116\u2013120.","journal-title":"Electronic Markets"}],"container-title":["Information and Communication Technologies in Tourism 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-211-27283-6_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T09:30:27Z","timestamp":1626687027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-211-27283-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3211241485"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/3-211-27283-6_25","relation":{},"subject":[]}}