{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:02:45Z","timestamp":1725465765129},"publisher-location":"Vienna","reference-count":34,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3211241485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-211-27283-6_26","type":"book-chapter","created":{"date-parts":[[2005,11,10]],"date-time":"2005-11-10T05:08:26Z","timestamp":1131599306000},"page":"285-295","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Concerns and Purchase of Travel Product Online"],"prefix":"10.1007","author":[{"given":"Mark R.","family":"Brown","sequence":"first","affiliation":[]},{"given":"Udo","family":"Gottlieba","sequence":"additional","affiliation":[]},{"given":"Rose","family":"Muchira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1108\/09685220010321335","volume":"8","author":"M. Attaran","year":"2000","unstructured":"Attaran, M. (2000). Managing Legal Liability of the Net: a Ten Step Guide for IT Managers. Information Management and Computer Security 8(2): 98\u2013100.","journal-title":"Information Management and Computer Security"},{"key":"26_CR2","unstructured":"Berman, J. & Mulligan, D. (1999). Privacy in the Digital Age: Work in Progress. Nova Law Review 23(2)."},{"issue":"2","key":"26_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1086\/208856","volume":"8","author":"B.J. Calder","year":"1981","unstructured":"Calder, B.J., Phillips, L.W. and Tybout, A.M. (1981). Designing Research for Application. Journal of Consumer Research 8(2): 197\u2013207.","journal-title":"Journal of Consumer Research"},{"issue":"8","key":"26_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1002\/(SICI)1522-7138(199722)11:3<44::AID-DIR7>3.0.CO;2-X","volume":"11","author":"A. Campbell","year":"1997","unstructured":"Campbell, A. (1997). Relationship Marketing in Consumer Markets: A Comparison of Managerial and Consumer Attitudes About Information Privacy. Journal of Direct Marketing 11(8): 44\u201357.","journal-title":"Journal of Direct Marketing"},{"key":"26_CR5","unstructured":"Cranor, L.F., Reagle, J., and Ackerman, M.S. (1999). Beyond Concern: Understanding Net Users' Attitudes About Online Privacy. AT&T Labs-Research Technical Report TR 99.4.3, April 14, http:\/\/www.research.att.com\/resources\/trs\/TRs\/99\/99.4\/99.4.3\/report.htm."},{"key":"26_CR6","unstructured":"CyberAtlas (2001). Demographics; Asians Among Most Wired Americans, December 18, http:\/\/cyberatlas.internet.com\/big_picture\/demographics\/article\/0,,5901_942621,00.html"},{"issue":"10","key":"26_CR7","first-page":"26","volume":"82","author":"Federal Trade Commission","year":"1999","unstructured":"Federal Trade Commission (1999). Privacy Policies On-line: Improving for Consumers. Consumers Research Magazine 82(10): 26\u201330.","journal-title":"Consumers Research Magazine"},{"issue":"2","key":"26_CR8","first-page":"30","volume":"103","author":"J. Foust","year":"2000","unstructured":"Foust, J. (2000). Protecting Your Privacy Online. Technology Review 103(2): 30\u201331.","journal-title":"Technology Review"},{"issue":"12","key":"26_CR9","first-page":"38","volume":"32","author":"D. Gillmor","year":"1998","unstructured":"Gillmor, D. (1998). Violating Privacy is Bad Business. Computerworld 32(12): 38\u20139.","journal-title":"Computerworld"},{"key":"26_CR10","volume-title":"Relationship Marketing: New Strategies, Techniques and Technologies to Win the Customers You Want and Keep Them Forever","author":"I. Gordon","year":"1998","unstructured":"Gordon, I. (1998). Relationship Marketing: New Strategies, Techniques and Technologies to Win the Customers You Want and Keep Them Forever Toronto: John Wiley and Sons."},{"key":"26_CR11","unstructured":"Greenspan, R. 2002, Travel Industry Helped by Web, Frequency December 24, http:\/\/www.clickz.com\/stats\/markets\/travel\/article.php\/l560861."},{"key":"26_CR12","unstructured":"Greenspan, R. (2003). Traveler's First Trip is Often the Internet May 27, http:\/\/www.clickz.com\/stats\/markets\/travel\/article.php\/2211341."},{"key":"26_CR13","unstructured":"InternetWeek (2004). Some People Like Spam According To Poll July 27, http:\/\/www.internetweek.com\/breakingNews\/showArticle.jhtml?articleID=26100190."},{"key":"26_CR14","volume-title":"Consumer buying intentions and purchase probability","author":"F. T. Juster","year":"1966","unstructured":"Juster, F. T. (1966). Consumer buying intentions and purchase probability New York: Columbia University Press."},{"issue":"1","key":"26_CR15","first-page":"15","volume":"18","author":"J. Kakalik","year":"1996","unstructured":"Kakalik, J. and Wright, M. (1996). Responding to Privacy Concerns of Consumers. Review of Business 18(1): 15\u201318.","journal-title":"Review of Business"},{"key":"26_CR16","unstructured":"Kehoe, C, Pitkow, J. and Morton, K. (1997). Eighth WWW User Survey, http:\/\/www.cc.ptech.edu\/gvu\/user_surveys\/survey-1997-10."},{"issue":"2","key":"26_CR17","first-page":"26","volume":"64","author":"O. M. Khalil","year":"1999","unstructured":"Khalil, O. M. and Harcar, T. D. (1999). Relationship Marketing and Data Quality Management. SAM Advanced Management Journal 64(2): 26\u201333.","journal-title":"SAM Advanced Management Journal"},{"issue":"2","key":"26_CR18","first-page":"53","volume":"39","author":"P. Korgaonkar","year":"1999","unstructured":"Korgaonkar, P and Wolin, L. (1999). A Multivariate Analysis of Web Usage. Journal of Advertising Research 39(2): 53\u201370.","journal-title":"Journal of Advertising Research"},{"key":"26_CR19","unstructured":"Lester, T. (2001). The Reinvention of Privacy. The Atlantic Monthly March: 27\u201339."},{"key":"26_CR20","volume-title":"Marketing Research: An Applied Approach","author":"N. K. Malhotra","year":"1996","unstructured":"Malhotra, N. K., Hall, J., Shaw, M. and Crisp, M. (1996). Marketing Research: An Applied Approach Sydney: Prentice-Hall."},{"issue":"38","key":"26_CR21","first-page":"58","volume":"8","author":"A. Mand","year":"1998","unstructured":"Mand, A. (1998). Portals Plug Privacy Push. Mediaweek 8(38): 58.","journal-title":"Mediaweek"},{"key":"26_CR22","unstructured":"Marcussen, C.H. (2004). Trends in European Internet Distribution of Travel and Tourism Services May 27, http:\/\/www.crt.dk\/uk\/staff\/chm\/trends.htm."},{"issue":"7","key":"26_CR23","first-page":"36","volume":"22","author":"R. McKim","year":"1999","unstructured":"McKim, R. (1999). Information: the Newest Currency. Target Marketing 22(7): 36\u20137.","journal-title":"Target Marketing"},{"issue":"1","key":"26_CR24","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1002\/(SICI)1522-7138(199624)10:1<22::AID-DIR2>3.0.CO;2-1","volume":"10","author":"G. R. Milne","year":"1996","unstructured":"Milne, G. R., Beckman, J. and Taubman, M. L. (1996). Consumer Attitudes Towards Privacy and Direct Marketing in Argentina. Journal of Direct Marketin 10(1): 22\u201329.","journal-title":"Journal of Direct Marketin"},{"key":"26_CR25","volume-title":"Internet Marketing","author":"R.A. Mohammed","year":"2004","unstructured":"Mohammed, R.A., Fisher, R.J., Jaworski, B.J. and Paddison, G.J. (2004). Internet Marketing 2nd Edition, New York: McGraw Hill \/Irwin.","edition":"2nd Edition"},{"issue":"1","key":"26_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/1252059","volume":"57","author":"C. Moorman","year":"1993","unstructured":"Moorman, C, Deshpande, R. and Zaltman, G. (1993). Factors Affecting Trust in Market Research Relationships. Journal of Marketing 57(1): 81\u2013101.","journal-title":"Journal of Marketing"},{"issue":"4","key":"26_CR27","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1002\/(SICI)1520-6653(199823)12:4<22::AID-DIR3>3.0.CO;2-Y","volume":"12","author":"S. Nicovich","year":"1998","unstructured":"Nicovich, S. and Cornwell, T. B. (1998). An Internet Culture?: Implications for Marketing. Journal of Interactive Marketing 12(4): 22\u201333.","journal-title":"Journal of Interactive Marketing"},{"issue":"4","key":"26_CR28","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1002\/dir.4000060407","volume":"6","author":"G. Nowak","year":"1992","unstructured":"Nowak, G. and Phelps, J. (1992). Understanding Privacy Concerns: An Assessment of Consumer Information-Related Knowledge and Beliefs. Journal of Direct Marketing, 6(4): 28\u201339.","journal-title":"Journal of Direct Marketing"},{"issue":"4","key":"26_CR29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1002\/dir.4000090404","volume":"9","author":"L.A. Petrison","year":"1993","unstructured":"Petrison, L.A. and Wang, P. (1993). Exploring the Dimensions of Consumer Privacy: An Analysis of Coverage in British and American Media. Journal of Direct Marketing, 9(4): 19\u201337.","journal-title":"Journal of Direct Marketing"},{"issue":"4","key":"26_CR30","first-page":"329","volume":"25","author":"P. R. Prabhaker","year":"2000","unstructured":"Prabhaker, P. R. (2000). Who Owns the Online Consumer? Journal of Consumer Marketing, 25(4): 329\u2013346.","journal-title":"Journal of Consumer Marketing"},{"issue":"3","key":"26_CR31","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1080\/00913367.1999.10673588","volume":"28","author":"K.B. Sheehan","year":"1999","unstructured":"Sheehan, K.B. and Hoy, M.G (1999). Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns. Journal of Advertising 28(3): 37\u201361.","journal-title":"Journal of Advertising"},{"key":"26_CR32","unstructured":"Smith J., Milberg, S. and Burke, S. (1995).Information Privacy and Marketing Practices: The Role of Consumer Concerns. Unpublished working paper."},{"key":"26_CR33","first-page":"349","volume":"8","author":"E. F. Stone","year":"1990","unstructured":"Stone, E. F. and Stone, D. L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings and Protection Mechanisms. Research in Personnel and Human Resources Management 8: 349\u2013411.","journal-title":"Research in Personnel and Human Resources Management"},{"issue":"25","key":"26_CR34","first-page":"66","volume":"20","author":"D. Tweney","year":"1998","unstructured":"Tweney, D. (1998). The Consumer Battle over Online Information Privacy Has Just Begun. InfoWorld 20(25): 66.","journal-title":"InfoWorld"}],"container-title":["Information and Communication Technologies in Tourism 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-211-27283-6_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:41:46Z","timestamp":1619556106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-211-27283-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3211241485"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/3-211-27283-6_26","relation":{},"subject":[]}}