{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:03:13Z","timestamp":1772809393553,"version":"3.50.1"},"reference-count":33,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2002,9]]},"DOI":"10.1080\/08874417.2002.11647076","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:28:18Z","timestamp":1722616098000},"page":"117-127","source":"Crossref","is-referenced-by-count":25,"title":["Raising a Red Flag on Global WWW Privacy Policies"],"prefix":"10.1080","volume":"43","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[{"name":"Northern Illinois University, Dekalb, Illinois 60115"}]},{"given":"Kirk P.","family":"Arnett","sequence":"additional","affiliation":[{"name":"Mississippi State University, Mississippi State, Mississippi 39762"}]}],"member":"301","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919399609540264"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293461"},{"key":"e_1_2_1_4_1","first-page":"s14","volume-title":"Catalog Age","author":"Choate T.","year":"2000","unstructured":"Choate, T. \u201c5 Keys to Customer Conversion,\u201d Catalog Age, august 2000, pp. s14\u2013s15."},{"key":"e_1_2_1_5_1","volume-title":"CIO Metrics","year":"2001","unstructured":"CIO Metrics. http:\/\/www2.cio.com\/forums\/viewmetric_content.cfm?ID=all&METRIC=159, 2001. Visited March 5, 2001."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42413"},{"key":"e_1_2_1_7_1","volume-title":"\u201cGeorgetown Internet Privacy Policy Survey,\u201d","author":"Culnan M.J.","year":"2000","unstructured":"Culnan, M.J. \u201cGeorgetown Internet Privacy Policy Survey,\u201d www.msb.georgetown.edu\/faculty\/culnanm\/gippshome.html, 2000. Visited December 18, 2001."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/249775"},{"key":"e_1_2_1_9_1","volume-title":"Chemical Week","author":"D'Amico E.","year":"2001","unstructured":"D'Amico, E. \u201cGlobal e-Commerce,\u201d Chemical Week, September 26, 2001."},{"key":"e_1_2_1_10_1","volume-title":"\u201cGlobal E-Commerce: How Products and Services Help Sites Expand Worldwide,\u201d","author":"Engler N.","year":"1999","unstructured":"Engler, N. \u201cGlobal E-Commerce: How Products and Services Help Sites Expand Worldwide,\u201d http:\/\/www.informationweek.com\/755\/global.htm, 1999."},{"key":"e_1_2_1_11_1","volume-title":"\u201cCouncil Definitively Adopts Directive of Protection of Personal Data,\u201d","author":"European Commission Press Release","year":"1995","unstructured":"European Commission Press Release. \u201cCouncil Definitively Adopts Directive of Protection of Personal Data,\u201d http:\/\/www.privacy.org\/pi\/intl_orgs\/ec\/dep_EC_press_release.txt, 1995."},{"issue":"4","key":"e_1_2_1_12_1","first-page":"26","article-title":"\u201cPersonal Values,\u201d","volume":"160","author":"Fluendy S.","year":"2000","unstructured":"Fluendy, S. \u201cPersonal Values,\u201d Far Eastern Economic Review, 160:4, 2000, p. 26.","journal-title":"Far Eastern Economic Review"},{"key":"e_1_2_1_13_1","volume-title":"\u201cSelf-regulation and Privacy Online: A Report to Congress,\u201d","author":"FTC Congress Report","year":"2000","unstructured":"FTC Congress Report. \u201cSelf-regulation and Privacy Online: A Report to Congress,\u201d Federal Trade Commission, 2000."},{"key":"e_1_2_1_14_1","first-page":"38","article-title":"\u201cPrivacy: Outrage on the Web,\u201d","volume":"3668","author":"Green H.","year":"2000","unstructured":"Green, H., N. Alster, A. Borrus, and C. Yang. \u201cPrivacy: Outrage on the Web,\u201d Business Week, 3668, February 14 2000, pp. 38\u201340.","journal-title":"Business Week"},{"issue":"10","key":"e_1_2_1_15_1","first-page":"29","article-title":"\u201cInternet Security: The Business Challenge,\u201d","volume":"30","author":"Guy R.","year":"1996","unstructured":"Guy, R. \u201cInternet Security: The Business Challenge,\u201d Telecommunications, 30:10, 1996, pp. 29\u201330.","journal-title":"Telecommunications"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"e_1_2_1_17_1","volume-title":"CNN Financial Network","author":"Kleinbard D.","year":"2000","unstructured":"Kleinbard, D. \u201cWeb has Its Eye on You,\u201d CNN Financial Network, 2000. http:\/\/cnnfn.com\/2000\/03\/06\/technology\/privacy_main."},{"key":"e_1_2_1_18_1","volume-title":"Australian IT","author":"Mackenzie K.","year":"2001","unstructured":"Mackenzie, K. \u201cCybercrime Laws Passed,\u201d Australian IT, http:\/\/australianit.news.com.au\/articles\/0,7204,2944524%5E153006%Enbv%E,00.html, 2001."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/248873"},{"issue":"863","key":"e_1_2_1_20_1","first-page":"34","article-title":"\u201cIBM: Privacy is Still Top of Mind,\u201d","volume":"34","author":"McDougall P.","year":"2001","unstructured":"McDougall, P. \u201cIBM: Privacy is Still Top of Mind,\u201d Informationweek, 34:863, 2001, p. 34.","journal-title":"Informationweek"},{"issue":"42","key":"e_1_2_1_21_1","first-page":"36","article-title":"\u201cOnline Identity Crisis,\u201d","volume":"21","author":"Mendel B.","year":"1999","unstructured":"Mendel, B. \u201cOnline Identity Crisis,\u201d InfoWorld, 21:42, 1999, pp. 36\u201337.","journal-title":"InfoWorld"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"key":"e_1_2_1_23_1","volume-title":"North American Industry Classification System, United States","author":"Office of Management and Budget","year":"1997","unstructured":"Office of Management and Budget. North American Industry Classification System, United States, 1997."},{"issue":"5","key":"e_1_2_1_24_1","first-page":"22","article-title":"\u201cBuyers Want Web Privacy,\u201d","volume":"129","author":"Porter A.M.","year":"2000","unstructured":"Porter, A.M. \u201cBuyers Want Web Privacy,\u201d Purchasing, 129:5, 2000, pp. 22\u201325.","journal-title":"Purchasing"},{"issue":"9","key":"e_1_2_1_25_1","first-page":"65","article-title":"\u201cThe Real Internet Security Issue,\u201d","volume":"10","author":"Punch L.","year":"1997","unstructured":"Punch, L. \u201cThe Real Internet Security Issue,\u201d Credit Card Management, 10:9, 1997, pp. 65\u201367.","journal-title":"Credit Card Management"},{"key":"e_1_2_1_26_1","first-page":"13","volume-title":"Business Horizons","author":"Scheibal W.J.","year":"2000","unstructured":"Scheibal, W.J. and J.A. Gladstone. \u201cPrivacy on the Net: Europe Changes the Rules,\u201d Business Horizons, May-June 2000, pp. 13\u201318."},{"key":"e_1_2_1_27_1","volume-title":"\u201cGlobalization Slow in E-Retail,\u201d","author":"Sliwa C.","year":"2001","unstructured":"Sliwa, C. \u201cGlobalization Slow in E-Retail,\u201d http:\/\/Computerworld.com\/cwi\/Printer_Friendly_Version\/0,1212,NAAV47_NLTam_STO57041. 2001."},{"key":"e_1_2_1_28_1","volume-title":"\u201cIBM Survey Says Privacy Key to E-commerce,\u201d","author":"Songini M.","year":"2001","unstructured":"Songini, M. \u201cIBM Survey Says Privacy Key to E-commerce,\u201d http:\/\/cnn.com\/TECH\/computing\/9911\/12\/ibm.survey.privacy.idg\/index.html, 2001."},{"key":"e_1_2_1_29_1","first-page":"EB30","volume-title":"Business Week","author":"Stepanek M.","year":"1999","unstructured":"Stepanek, M. \u201cProtecting e-Privacy: Washington Must Step In,\u201d Business Week, July 26, 1999, p. EB30."},{"key":"e_1_2_1_30_1","first-page":"1","volume-title":"Computerworld","author":"Thibodeau P.","year":"2000","unstructured":"Thibodeau, P. \u201cPrivacy Legislation Raises Questions: Will Americans Envy Strong EU Protections?\u201d Computerworld, November 4, 2000, 45, pp. 1, 14."},{"key":"e_1_2_1_31_1","volume-title":"CIO Magazine","author":"Towle H.","year":"2000","unstructured":"Towle, H. \u201cNo Guiding Light,\u201d CIO Magazine, August 15, 2000."},{"key":"e_1_2_1_32_1","volume-title":"Electronic Commerce: A Managerial Perspective","author":"Turban E.","year":"2000","unstructured":"Turban E., J. Lee, D. King, and H.M. Chung. Electronic Commerce: A Managerial Perspective. Upper Saddle River, NKJ: Prentice Hall, 2000."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/249666"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2002.11647076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:31:02Z","timestamp":1722616262000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2002.11647076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,9]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,9]]}},"alternative-id":["10.1080\/08874417.2002.11647076"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2002.11647076","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,9]]}}}