{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:22:27Z","timestamp":1725517347633},"publisher-location":"Berlin, Heidelberg","reference-count":52,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540857167"},{"type":"electronic","value":"9783540857174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85717-4_3","type":"book-chapter","created":{"date-parts":[[2008,8,22]],"date-time":"2008-08-22T14:19:42Z","timestamp":1219414782000},"page":"21-30","source":"Crossref","is-referenced-by-count":2,"title":["Online Privacy: Measuring Individuals\u2019 Concerns"],"prefix":"10.1007","author":[{"given":"Maria","family":"Moloney","sequence":"first","affiliation":[]},{"given":"Frank","family":"Bannister","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","volume-title":"The 1st ACM conference on Electronic commerce Denver, Colorado, United States","author":"M.S. Ackerman","year":"1999","unstructured":"Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In: The 1st ACM conference on Electronic commerce Denver, Colorado, United States. ACM Press, New York (1999"},{"key":"3_CR2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6682.001.0001","volume-title":"Technology and Privacy: The New Landscape","author":"P.E. Agre","year":"1997","unstructured":"Agre, P.E., Rotenberg., M.: Technology and Privacy: The New Landscape. MIT Press, London (1997)"},{"key":"3_CR3","unstructured":"Altman, I.: The Environment and Social Behavior, Monteray, California. Brooks\/Cole (1975)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Altman, I., Chemers, M.: Culture and Environment, Monteray, California. Brooks\/Cole Publishing Company (1980)","DOI":"10.1007\/978-1-4899-0451-5"},{"key":"3_CR5","unstructured":"Altman, I., Taylor, D.: Social Penetration: The Development and Dissolution of Interpersonal Relationships, London, Holt. Rinehart and Winston (1973)"},{"key":"3_CR6","volume-title":"A Trust Model of Buying Behavior in Electronic Retailing","author":"P.J. Ambrose","year":"1998","unstructured":"Ambrose, P.J., Johnson, G.L.: A Trust Model of Buying Behavior in Electronic Retailing. The Association for Information Systems, Baltimore (1998)"},{"key":"3_CR7","unstructured":"Barber, B.: The Logic and Limits of Trust, New Brunswick, New Jersey. Rutgers University Press (1983)"},{"key":"3_CR8","unstructured":"Boritz, E., No, W.G., Sundarraj, R.P.: Internet Privacy: Framework, Review and Opportunities for Future Research (2006), http:\/\/ssrn.com\/abstract=908647"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10660-007-9000-y","volume":"7","author":"J.A. Casta\u00f1eda","year":"2007","unstructured":"Casta\u00f1eda, J.A., Montoro, F.J.: The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research\u00a07, 117\u2013141 (2007)","journal-title":"Electronic Commerce Research"},{"key":"3_CR10","first-page":"1","volume":"6","author":"V.T. Covello","year":"1992","unstructured":"Covello, V.T.: Trust and Credibility in Risk Communication. Health Environment Digest\u00a06, 1\u20134 (1992)","journal-title":"Health Environment Digest"},{"key":"3_CR11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.4018\/irmj.2001100104","volume":"14","author":"G.S. Dhillon","year":"2001","unstructured":"Dhillon, G.S., Moores, T.T.: Internet Privacy: Interpreting Key Issues. Information Resources Management Journal\u00a014, 33\u201337 (2001)","journal-title":"Information Resources Management Journal"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1080\/01449290410001715723","volume":"23","author":"T. Dinev","year":"2004","unstructured":"Dinev, T., Hart, P.: Internet Privacy Concerns and their Antecedents - Measurement Validity and a Regression Model. Behaviour and information Technology\u00a023, 413\u2013422 (2004)","journal-title":"Behaviour and information Technology"},{"key":"3_CR13","unstructured":"Drury, I.: Oops! MoD lost THREE laptops, not just one, admits minister. The Daily Mail (2008), http:\/\/www.dailymail.co.uk\/pages\/live\/articles\/news\/news.html?in_article_id=509629&in_page_id=1770&in_page_id=1770&expand=true ed"},{"key":"3_CR14","volume-title":"Computers, Ethics & Society","author":"C. Fried","year":"1990","unstructured":"Fried, C.: Privacy: A Rational Context. In: Erman, M.D., Williams, M.B., Gutierrez, C. (eds.) Computers, Ethics & Society, New York. Oxford University Press, Oxford (1990)"},{"key":"3_CR15","first-page":"725","volume":"28","author":"D. Gefen","year":"2000","unstructured":"Gefen, D.: E-Commerce: The role of familiarity and trust. The International Journal of Management Science\u00a028, 725\u2013737 (2000)","journal-title":"The International Journal of Management Science"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"George, J.F.: The Theory of Planned Behavior and Internet Purchasing Internet Research: Electronic Networking Applications and Policy, vol.\u00a014, pp. 198\u2013212 (2004)","DOI":"10.1108\/10662240410542634"},{"key":"3_CR17","unstructured":"Gershaw, D.: Line on Life: AIDS and Teenagers (1989), http:\/\/virgil.azwestern.edu\/~dag\/lol\/AIDSTeens.html"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1207\/s15327663jcp0103_04","volume":"1","author":"C. Goodwin","year":"1992","unstructured":"Goodwin, C.: A Conceptualization of Motives to Seek Privacy for Nondeviant Consumption. Journal of Consumer Psychology\u00a01, 261\u2013284 (1992)","journal-title":"Journal of Consumer Psychology"},{"key":"3_CR19","unstructured":"Interactive, H.: Privacy On and Off the Internet: What Consumers Want. Harris Interactive Inc., Hackensack, New Jersey, Privacy & American Business (2002)"},{"key":"3_CR20","unstructured":"Heffernan, B., Kennedy, E.: Alert as 170,000 blood donor files are stolen The Irish Independant, Dublin (2008), http:\/\/www.independent.ie\/national-news\/alert-as-170000-blood-donor-files-are-stolen-1294079.html"},{"key":"3_CR21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","volume":"31","author":"K.L. Hui","year":"2007","unstructured":"Hui, K.L., Teo, H.H., Lee, S.Y.T.: The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly\u00a031, 19\u201333 (2007)","journal-title":"MIS Quarterly"},{"key":"3_CR22","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1007965.1007970","volume":"35","author":"K.K. Kim","year":"2004","unstructured":"Kim, K.K., Prabhakar, B.: Initial Trust and the Adoption of B2C e-Commerce: The Case of Internet Banking. Database for Advances in Information Systems Control Journal\u00a035, 50\u201365 (2004)","journal-title":"Database for Advances in Information Systems Control Journal"},{"key":"3_CR23","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/10864415.2001.11044227","volume":"6","author":"M.K.O. Lee","year":"2001","unstructured":"Lee, M.K.O., Turban, E.: A Trust Model for Consumer Internet Shopping. International Journal of Electronic Commerce\u00a06, 75\u201391 (2001)","journal-title":"International Journal of Electronic Commerce"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1037\/h0035357","volume":"41","author":"H. Levenson","year":"1973","unstructured":"Levenson, H.: Multidimensional Locus of Control in Psychiatric Patients. Journal of Consulting and Clinical Psychology\u00a041, 397\u2013404 (1973)","journal-title":"Journal of Consulting and Clinical Psychology"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.im.2004.01.003","volume":"42","author":"C. Liu","year":"2005","unstructured":"Liu, C., Marchewka, J.T., Lu, J., Yu, C.-S.: Beyond Concern - A Privacy-Trust-Behavioral Intention Model of Electronic Commerce. Information & Management\u00a042, 289\u2013304 (2005)","journal-title":"Information & Management"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1111\/1540-4560.00071","volume":"59","author":"S.T. Margulis","year":"2003","unstructured":"Margulis, S.T.: On the Status and Contribution of Westin\u2019s and Altman\u2019s Theories of Privacy. The Journal of Social Issues\u00a059, 411\u2013429 (2003a)","journal-title":"The Journal of Social Issues"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1111\/1540-4560.00063","volume":"59","author":"S.T. Margulis","year":"2003","unstructured":"Margulis, S.T.: Privacy as a Social Issue and Behavioral Concept. The Journal of Social Issues\u00a059, 243\u2013262 (2003)","journal-title":"The Journal of Social Issues"},{"key":"3_CR28","volume-title":"The Harris-Westin\u2019s Index of General Concern About Privacy: An Attempted Conceptual Replication","author":"S.T. Margulis","year":"2006","unstructured":"Margulis, S.T., Pope, J.A., Lowen, A.: The Harris-Westin\u2019s Index of General Concern About Privacy: An Attempted Conceptual Replication, Seidman College of Business. Grand Valley State University, Grand Rapids, Michigan (2006)"},{"key":"3_CR29","unstructured":"Notes"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1207\/s15327906mbr0903_1","volume":"9","author":"N. Marshall","year":"1974","unstructured":"Marshall, N.: Dimensions of Privacy Preferences. Multivariate Behavioral. Research\u00a09, 255\u2013271 (1974)","journal-title":"Multivariate Behavioral. Research"},{"key":"3_CR31","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/10864415.2001.11044235","volume":"6","author":"D.H. Mcknight","year":"2001","unstructured":"Mcknight, D.H., Chervany, N.L.: What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology. International Journal of Electronic Commerce\u00a06, 35\u201359 (2001)","journal-title":"International Journal of Electronic Commerce"},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2307\/259290","volume":"23","author":"D.H. Mcknight","year":"1998","unstructured":"Mcknight, D.H., Cummings, L.L., Chervany, N.L.: Initial Trust Formation in New Organisational Relationships. Academy of Management Review\u00a023, 473\u2013490 (1998)","journal-title":"Academy of Management Review"},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/219663.219683","volume":"38","author":"S.J. Milberg","year":"1995","unstructured":"Milberg, S.J., Burke, S.J., Smith, H.J., Kallman, E.A.: Values, Personal Information Privacy, and Regulatory Approaches. Communications of the ACM\u00a038, 65\u201374 (1995)","journal-title":"Communications of the ACM"},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9","volume":"13","author":"G.R. Milne","year":"1999","unstructured":"Milne, G.R., Boza, M.E.: Trust and Concern in Consumers\u2019 Perceptions of Marketing Information Management Practices. Journal of Interactive Marketing\u00a013, 5\u201324 (1999)","journal-title":"Journal of Interactive Marketing"},{"key":"3_CR35","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"J.H. Moor","year":"1997","unstructured":"Moor, J.H.: Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society\u00a027, 27\u201332 (1997)","journal-title":"ACM SIGCAS Computers and Society"},{"key":"3_CR36","first-page":"559","volume":"17","author":"H. Nissenbaum","year":"1998","unstructured":"Nissenbaum, H.: Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy\u00a017, 559\u2013596 (1998)","journal-title":"Law and Philosophy"},{"key":"3_CR37","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/BF00144949","volume":"2","author":"W.A. Parent","year":"1983","unstructured":"Parent, W.A.: A New definition of Privacy for the Law. Law and Philosophy\u00a02, 305\u2013338 (1983)","journal-title":"Law and Philosophy"},{"key":"3_CR38","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J. Phelps","year":"2000","unstructured":"Phelps, J., Nowak, G., Ferrell, E.: Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing\u00a019, 27\u201342 (2000)","journal-title":"Journal of Public Policy & Marketing"},{"key":"3_CR39","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/dir.1019","volume":"15","author":"J.E. Phelps","year":"2001","unstructured":"Phelps, J.E., D\u2019souza, G., Nowak, G.J.: Antecedents and Consequences of Consumer Privacy Concerns: An Empirical Investigation. Journal of Interactive Marketing\u00a015, 2\u201317 (2001)","journal-title":"Journal of Interactive Marketing"},{"key":"3_CR40","unstructured":"Privacy Rights Clearinghouse, A Chronology of Data Breaches. Privacy Rights Clearinghouse, San Diego (2005)"},{"key":"3_CR41","unstructured":"Rotenburg, M.: What Larry Doesn\u2019t Get: Fair Information Practices and the Architecture of Privacy. Stanford Technology Law Review (2000)"},{"key":"3_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/h0092976","volume":"80","author":"J.B. Rotter","year":"1966","unstructured":"Rotter, J.B.: Generalized expectancies for internal versus external control of reinforcements. Psychological Monographs\u00a080, 1\u201328 (1966)","journal-title":"Psychological Monographs"},{"key":"3_CR43","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/S0963-8687(02)00022-7","volume":"11","author":"V. Shankar","year":"2002","unstructured":"Shankar, V., Urban, G.L., Sultan, F.: Online Trust: A Stakeholder Perspective, concepts, implications and Future Directions. Journal of Strategic information Systems\u00a011, 325\u2013344 (2002)","journal-title":"Journal of Strategic information Systems"},{"key":"3_CR44","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"H.J. Smith","year":"1996","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information Privacy: Measuring Individuals\u2019 Concerns about Organizational Practices. MIS Quarterly\u00a020, 167\u2013196 (1996)","journal-title":"MIS Quarterly"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Taviani, H.T.: Philosophical Theories of Privacy: Implications for An Adequate Online Privacy Policy. Metaphysics\u00a038 (2007)","DOI":"10.1111\/j.1467-9973.2006.00474.x"},{"key":"3_CR46","unstructured":"The Council of Europe, The European Convention on Human Rights. C364 (1950)"},{"key":"3_CR47","unstructured":"The Council of Europe, The Charter of Fundamental Rights of the European Union. C364 (2000)"},{"key":"3_CR48","unstructured":"United Nations, Universal Declaration of Human Rights. General Assembly resolution (1948)"},{"key":"3_CR49","unstructured":"Webster, P., O\u2019Neill, S., Blakely, R.: 25 million exposed to risk of ID fraud. Times Online, London (2007), http:\/\/www.timesonline.co.uk\/tol\/news\/uk\/article2910705.ece"},{"key":"3_CR50","volume-title":"Privacy and Freedom","author":"A.F. Westin","year":"1970","unstructured":"Westin, A.F.: Privacy and Freedom. The Bodley Head Ltd., London (1970)"},{"key":"3_CR51","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/1540-4560.00072","volume":"59","author":"A.F. Westin","year":"2003","unstructured":"Westin, A.F.: Social and Political Dimensions of Privacy. The Journal of Social Issues\u00a059, 431\u2013453 (2003)","journal-title":"The Journal of Social Issues"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Zhao, S.: Do Internet Users have more Social Ties? A Call for Differentiated Analyses of Internet Journal of Computer-Mediated Communication\u00a011 (2006)","DOI":"10.1111\/j.1083-6101.2006.00038.x"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85717-4_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:34:18Z","timestamp":1606185258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85717-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540857167","9783540857174"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85717-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}