{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:44:12Z","timestamp":1769550252250,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T00:00:00Z","timestamp":1432598400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10660-015-9187-2","type":"journal-article","created":{"date-parts":[[2015,5,25]],"date-time":"2015-05-25T15:36:39Z","timestamp":1432568199000},"page":"185-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Privacy as a right or as a commodity in the online world: the limits of regulatory reform and self-regulation"],"prefix":"10.1007","volume":"17","author":[{"given":"Diana","family":"Walsh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James M.","family":"Parisi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katia","family":"Passerini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,5,26]]},"reference":[{"key":"9187_CR1","unstructured":"Lepore, J. (2013, June). Privacy in an age of publicity. http:\/\/www.newyorker.com\/reporting\/2013\/06\/24\/130624fa_fact_lepore?currentPage=all . Accessed 15 Mar 2015."},{"key":"9187_CR2","volume-title":"Law and ethics in the business environment (Legal Studies in Business)","author":"T Halbert","year":"2014","unstructured":"Halbert, T., & Ingulli, E. (2014). Law and ethics in the business environment (Legal Studies in Business). Stamford: Cengage Learning."},{"issue":"4","key":"9187_CR3","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989\u20131016.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9187_CR4","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1111\/1540-4560.00067","volume":"59","author":"MJ Culnan","year":"2003","unstructured":"Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323\u2013342.","journal-title":"Journal of Social Issues"},{"issue":"1","key":"9187_CR5","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","volume":"54","author":"Y Li","year":"2012","unstructured":"Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471\u2013481.","journal-title":"Decision Support Systems"},{"key":"9187_CR6","doi-asserted-by":"publisher","first-page":"225","DOI":"10.2307\/1927286","volume":"43","author":"KJ Arrow","year":"1961","unstructured":"Arrow, K. J., Chenery, H. B., Minhas, B. S., & Solow, R. M. (1961). Capital-labor substitution and economic efficiency. The Review of Economics and Statistics, 43, 225\u2013250.","journal-title":"The Review of Economics and Statistics"},{"key":"9187_CR7","volume-title":"The measurement of productive efficiency: Techniques and applications\u2014Techniques and applications","author":"O Harold","year":"1993","unstructured":"Harold, O. (1993). The measurement of productive efficiency: Techniques and applications\u2014Techniques and applications. Oxford: Oxford University Press."},{"issue":"3","key":"9187_CR8","first-page":"303","volume":"21","author":"KJ Arrow","year":"1973","unstructured":"Arrow, K. J. (1973). Social responsibility and economic efficiency. Public Policy, 21(3), 303\u2013317.","journal-title":"Public Policy"},{"issue":"2","key":"9187_CR9","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/1540-4560.00072","volume":"59","author":"AF Westin","year":"2003","unstructured":"Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431\u2013453.","journal-title":"Journal of Social Issues"},{"issue":"6","key":"9187_CR10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.17705\/1jais.00161","volume":"9","author":"H Sheng","year":"2008","unstructured":"Sheng, H., Nah, F. F.-H., & Siau, K. (2008). An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 15.","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"9187_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","volume":"51","author":"H Xu","year":"2011","unstructured":"Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42\u201352.","journal-title":"Decision Support Systems"},{"key":"9187_CR12","doi-asserted-by":"crossref","DOI":"10.4324\/9781315064390","volume-title":"Conservation and economic efficiency: An approach to materials policy","author":"T Page","year":"2013","unstructured":"Page, T. (2013). Conservation and economic efficiency: An approach to materials policy. London: Routledge."},{"key":"9187_CR13","unstructured":"Unger, D. J. (2013, October). Energy efficiency: How the internet can lower your electric bill. http:\/\/www.csmonitor.com\/Environment\/2013\/1006\/Energy-efficiency-How-the-Internet-can-lower-your-electric-bill\/(page)\/2 . Accessed 15 Mar 2015."},{"key":"9187_CR14","unstructured":"Unknown. (2014). How green is the internet? https:\/\/www.google.com\/green\/efficiency\/industry-collaboration\/ . Accessed 15 Mar 2015."},{"issue":"3","key":"9187_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"DG Taylor","year":"2009","unstructured":"Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203\u2013223.","journal-title":"Electronic Commerce Research"},{"issue":"4","key":"9187_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/641205.641209","volume":"46","author":"JB Earp","year":"2003","unstructured":"Earp, J. B., & Baumer, D. (2003). Innovative web use to learn about consumer behavior and online privacy. Communications of the ACM, 46(4), 81\u201383.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9187_CR17","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","volume":"19","author":"M Taddicken","year":"2014","unstructured":"Taddicken, M. (2014). The \u2018Privacy Paradox\u2019 in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248\u2013273.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9187_CR18","unstructured":"Case. (2012). Pneus Touchette Distribution inc. c. Pneus Chartrand inc. - 2012 QCCS 3241 (CanLII) - Quebec, Canada. http:\/\/www.canlii.org\/fr\/qc\/qccs\/doc\/2012\/2012qccs3241\/2012qccs3241.html . Accessed 1 Mar 2015."},{"key":"9187_CR19","unstructured":"Case. (2012). Images Turbo inc. c. Marquis - 2012 QCCS 4386 - Quebec, Canada. http:\/\/www.canlii.org\/fr\/qc\/qccs\/doc\/2012\/2012qccs4386\/2012qccs4386.pdf . Accessed 1 Mar 2015."},{"issue":"1","key":"9187_CR20","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10660-010-9067-8","volume":"11","author":"Y Ren","year":"2011","unstructured":"Ren, Y., Cheng, F., Peng, Z., Huang, X., & Song, W. (2011). A privacy policy conflict detection method for multi-owner privacy data protection. Electronic Commerce Research, 11(1), 103\u2013121. doi: 10.1007\/s10660-010-9067-8 .","journal-title":"Electronic Commerce Research"},{"key":"9187_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2013.90","volume":"4","author":"S Landau","year":"2013","unstructured":"Landau, S. (2013). Making sense from Snowden. IEEE Security & Privacy Magazine, 4, 54\u201363.","journal-title":"IEEE Security & Privacy Magazine"},{"key":"9187_CR22","unstructured":"MPR. (2013). Conflict between privacy rights and security is nothing new. http:\/\/www.mprnews.org\/story\/2013\/06\/18\/daily-circuit-government-surveillance . Accessed 15 Mar 2015."},{"issue":"1","key":"9187_CR23","first-page":"106","volume":"1","author":"JE Robbin","year":"1980","unstructured":"Robbin, J. E. (1980). Geodemographics: The new magic. Campaigns and Elections, 1(1), 106\u2013125.","journal-title":"Campaigns and Elections"},{"key":"9187_CR24","unstructured":"Marwick, A. E. (2014, January). How your data are being deeply mined. http:\/\/www.nybooks.com\/articles\/archives\/2014\/jan\/09\/how-your-data-are-being-deeply-mined\/ . Accessed 15 Mar 2015."},{"key":"9187_CR25","unstructured":"Lohr, S. (2014, May). New curbs sought on the personal data industry. http:\/\/www.nytimes.com\/2014\/05\/28\/technology\/ftc-urges-legislation-to-shed-more-light-on-data-collection.html?hpw&rref=busines&_r=0 . Accessed 15 Mar 2015."},{"issue":"4","key":"9187_CR26","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101\u2013106.","journal-title":"Communications of the ACM"},{"issue":"4","key":"9187_CR27","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/S0378-7206(99)00019-1","volume":"36","author":"SC Henderson","year":"1999","unstructured":"Henderson, S. C., & Snyder, C. A. (1999). Personal information privacy: Implications for MIS managers. Information & Management, 36(4), 213\u2013220.","journal-title":"Information & Management"},{"issue":"7082","key":"9187_CR28","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1038\/440279a","volume":"440","author":"J Kleinberg","year":"2006","unstructured":"Kleinberg, J. (2006). The world at your fingertips. Nature, 440(7082), 279\u2013280.","journal-title":"Nature"},{"key":"9187_CR29","unstructured":"Miller, C. C. (2014, May). It\u2019s not as simple as asking to \u2018Be Forgotten\u2019 by google. http:\/\/www.nytimes.com\/2014\/05\/27\/upshot\/its-not-as-simple-as-asking-to-be-forgotten-by-google.html?hpw&rref=&_r=1 . Accessed 15 Mar 2015."},{"issue":"4","key":"9187_CR30","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10660-011-9083-3","volume":"11","author":"G Antoniou","year":"2011","unstructured":"Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421\u2013456. doi: 10.1007\/s10660-011-9083-3 .","journal-title":"Electronic Commerce Research"},{"key":"9187_CR31","doi-asserted-by":"publisher","first-page":"323","DOI":"10.5840\/beq200616340","volume":"16","author":"NE Bowie","year":"2006","unstructured":"Bowie, N. E., & Jamal, K. (2006). Privacy rights on the internet: self-regulation or government regulation? Business Ethics Quarterly, 16, 323\u2013342.","journal-title":"Business Ethics Quarterly"},{"key":"9187_CR32","first-page":"85","volume":"54","author":"RW Hahn","year":"2002","unstructured":"Hahn, R. W., & Layne-Farrar, A. (2002). The benefits and costs of online privacy legislation. Administrative Law Review, 54, 85\u2013171.","journal-title":"Administrative Law Review"},{"issue":"2","key":"9187_CR33","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10551-006-9007-7","volume":"67","author":"L Ashworth","year":"2006","unstructured":"Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers\u2019 online privacy concerns. Journal of Business Ethics, 67(2), 107\u2013123.","journal-title":"Journal of Business Ethics"},{"key":"9187_CR34","unstructured":"Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace: Proceedings of AMCIS 2007 (p. 339)."},{"key":"9187_CR35","doi-asserted-by":"publisher","unstructured":"Raji, F., Miri, A., Jazi, M. D., & Malek, B. (2011). Online social network with flexible and dynamic privacy policies: CSI International Symposium on Computer Science and Software Engineering (CSSE), 2011 (pp. 135\u2013142). IEEE.","DOI":"10.1109\/CSICSSE.2011.5963982"},{"key":"9187_CR36","unstructured":"Saltz, J. (2014, January). Art at arm\u2019s length: A history of the selfie. http:\/\/www.vulture.com\/2014\/01\/history-of-the-selfie.html . Accessed 15 Mar 2015."},{"issue":"1\u20133","key":"9187_CR37","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10551-005-1421-8","volume":"58","author":"DE Palmer","year":"2005","unstructured":"Palmer, D. E. (2005). Pop-ups, cookies, and spam: Toward a deeper analysis of the ethical significance of Internet marketing practices. Journal of Business Ethics, 58(1\u20133), 271\u2013280.","journal-title":"Journal of Business Ethics"},{"key":"9187_CR38","unstructured":"Kakutani, M. (2014, May). Snowden\u2019s story, behind the scenes. http:\/\/www.nytimes.com\/2014\/05\/13\/books\/no-place-to-hide-by-glenn-greenwald.html?_r=1 . Accessed 15 Mar 2015."},{"issue":"6","key":"9187_CR39","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.2307\/4135723","volume":"113","author":"JQ Whitman","year":"2004","unstructured":"Whitman, J. Q. (2004). The two western cultures of privacy: Dignity versus liberty. Yale Law Journal, 113(6), 1151\u20131221.","journal-title":"Yale Law Journal"},{"issue":"4","key":"9187_CR40","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10660-013-9130-3","volume":"13","author":"S Preibusch","year":"2013","unstructured":"Preibusch, S., K\u00fcbler, D., & Beresford, A. R. (2013). Price versus privacy: An experiment into the competitive advantage of collecting less personal information. Electronic Commerce Research, 13(4), 423\u2013455. doi: 10.1007\/s10660-013-9130-3 . Accessed 15 Mar 2015.","journal-title":"Electronic Commerce Research"},{"key":"9187_CR41","unstructured":"Case. (1965). Griswold versus Connecticut, 381 U.S. 479 - US Supreme Court. http:\/\/laws.findlaw.com\/us\/381\/479.html ."},{"key":"9187_CR42","unstructured":"Case. (1967). Katz versus US, 389 U.S. 347 - US Supreme Court. https:\/\/supreme.justia.com\/cases\/federal\/us\/389\/347\/case.html . Accessed 15 Mar 2015."},{"key":"9187_CR43","volume-title":"Cyberlaw: The law of the internet and information technology","author":"B Craig","year":"2013","unstructured":"Craig, B. (2013). Cyberlaw: The law of the internet and information technology. Prentice Hall: Pearson Education Inc."},{"key":"9187_CR44","unstructured":"DOJ. (1966). What is FOIA. http:\/\/www.foia.gov\/about.html . Accessed 15 Mar 2015."},{"key":"9187_CR45","first-page":"791","volume":"779","author":"BS Schultz","year":"1999","unstructured":"Schultz, B. S. (1999). Electronic money, internet commerce, and the right to financial privacy: A call for new federal guidelines. University of Cincinnati Law Review 67, 779, 791\u2013792.","journal-title":"University of Cincinnati Law Review 67"},{"key":"9187_CR46","first-page":"457","volume":"439","author":"DD Hirsh","year":"2011","unstructured":"Hirsh, D. D. (2011). The law and policy of online privacy: Regulation, self-regulation, or co-regulation. The Seattle University Law Review, 439, 457\u2013458.","journal-title":"The Seattle University Law Review"},{"key":"9187_CR47","unstructured":"Case. (2010). Young versus Facebook, Inc - U.S. Dist. - (N.D.Cal. Oct. 25, 2010). https:\/\/scholar.google.com\/scholar_case?case=14196698777849520612&q=Young+v.+Facebook&hl=en&as_sdt=2,5&as_ylo=2011 . Accessed 15 Mar 2015."},{"key":"9187_CR48","unstructured":"Case. (2010). FenF, LLC versus Healio Health, Inc. - U.S. Dist. https:\/\/scholar.google.com\/scholar_case?case=9276471333322576008&q=FenF,+LLC+v.+Healio+Health,+Inc&hl=en&as_sdt=6,33&as_vis=1 . Accessed 15 Mar 2015."},{"key":"9187_CR49","unstructured":"Case. (1976). United States versus Miller - 425 U.S. 435, 443 - US Supreme Court. http:\/\/caselaw.lp.findlaw.com\/scripts\/getcase.pl?court=US&vol=425&invol=435 . Accessed 15 Mar 2015."},{"key":"9187_CR50","unstructured":"Case. (2010). Courtright versus Madigan - Civil No. 09-CV-208-JPG WL 3713654 (S.D.Ill. Nov. 4, 2009). https:\/\/scholar.google.com\/scholar_case?case=7495388096977244675&q=Courtright+v.+Madigan&hl=en&as_sdt=6,33&as_vis=1 . Accessed 15 Mar 2015."},{"key":"9187_CR51","unstructured":"Kang, C. (2011, April). Kerry, McCain offer bill to protect web users\u2019 privacy rights, p. 203."},{"key":"9187_CR52","unstructured":"Case. (2006). United States versus Schuster - 467 F.3d 614, 616 (7th Cir. 2006). https:\/\/casetext.com\/case\/us-v-schuster-4 . Accessed 15 Mar 2015."},{"key":"9187_CR53","unstructured":"BCP. (2009). The CAN-SPAM act: A compliance guide for business - the federal trade commission. http:\/\/business.ftc.gov\/documents\/bus61-can-spam-act-compliance-guide-business\/ . Accessed 15 Mar 2015."},{"key":"9187_CR54","first-page":"435","volume":"43","author":"FH Cate","year":"2008","unstructured":"Cate, F. H. (2008). Government data mining: The need for a legal framework. Harvard Civil Rights-Civil Liberties Law Review (CR-CL), 43, 435\u2013438.","journal-title":"Harvard Civil Rights-Civil Liberties Law Review (CR-CL)"},{"key":"9187_CR55","volume-title":"Targeted: How technology is revolutionizing advertising and the way companies reach consumers","author":"M Smith","year":"2014","unstructured":"Smith, M. (2014). Targeted: How technology is revolutionizing advertising and the way companies reach consumers. New York: AMACOM Div American Mgmt Assn."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-015-9187-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-015-9187-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-015-9187-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-015-9187-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T15:39:12Z","timestamp":1599061152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-015-9187-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,26]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9187"],"URL":"https:\/\/doi.org\/10.1007\/s10660-015-9187-2","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,26]]}}}