{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T08:37:01Z","timestamp":1777538221378,"version":"3.51.4"},"reference-count":43,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2004,6]]},"DOI":"10.1080\/08874417.2004.11647599","type":"journal-article","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T14:58:21Z","timestamp":1770389901000},"page":"85-92","source":"Crossref","is-referenced-by-count":12,"title":["Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques"],"prefix":"10.1080","volume":"44","author":[{"given":"Kuanchin","family":"Chen","sequence":"first","affiliation":[{"name":"Western Michigan University, Kalamazoo, Michigan 49008"}]},{"suffix":"Jr.","given":"Alan I.","family":"Rea","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, Michigan 49008"}]}],"member":"301","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.1996.11647249"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1350507600314006"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2003.11647533"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.1998.11647334"},{"key":"e_1_2_1_6_1","first-page":"133","volume-title":"Annals of the American Academy of Political and Social Science","author":"Brunner C.","year":"1991","unstructured":"Brunner, C. \u201cGender and Distance Learning,\u201d Annals of the American Academy of Political and Social Science, 1991, pp. 133\u2013145."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2001.11647009"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(99)00039-4"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293475"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(99)00002-8"},{"key":"e_1_2_1_11_1","volume-title":"CNet News","author":"Festa P.","year":"2002","unstructured":"Festa, P. \u201cWindows Media Aware of DVDs Watched,\u201d CNet News, 2002. Retrieved April 8, 2003, from http:\/\/news.com.com\/2100-1023-841766.html."},{"key":"e_1_2_1_12_1","first-page":"46","volume-title":"Direct Marketing","author":"Fram E.H.","year":"1997","unstructured":"Fram, E.H. and D.B. Grady. \u201cInternet Shoppers: Is There a Surfer Gender Gap?\u201d Direct Marketing, January 1997, pp. 46\u201350."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/249720"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/074391569101000111"},{"key":"e_1_2_1_15_1","volume-title":"ERIC Clearinghouse on Languages and Linguistics","author":"Herring S.C.","year":"1992","unstructured":"Herring, S.C. \u201cGender and Participation in Computer-mediated Linguistic Discourse,\u201d ERIC Clearinghouse on Languages and Linguistics, 1992, Document no. ED 345552."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1053-5357(97)90018-4"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(01)00030-9"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(01)00034-6"},{"issue":"4","key":"e_1_2_1_20_1","first-page":"63","article-title":"\u201cDesigning and Implementing Web-based Surveys,\u201d","volume":"39","author":"Lazar J.","year":"1999","unstructured":"Lazar, J. and J. Preece. \u201cDesigning and Implementing Web-based Surveys,\u201d Journal of Computer Information Systems, 39:4, 1999, pp. 63\u201367.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11647076"},{"key":"e_1_2_1_22_1","first-page":"532","volume-title":"Proceedings of the Association for Information Systems","author":"McKnight D.H.","year":"2000","unstructured":"McKnight, D.H., V. Choudhury, and C. Kacmar. \u201cTrust in E-commerce Vendors: A Two-stage Model,\u201d Proceedings of the Association for Information Systems, 2000, pp. 532\u2013536."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1086\/209241"},{"key":"e_1_2_1_24_1","first-page":"10","volume-title":"Journal of Systems Management","author":"Morris L.","year":"1992","unstructured":"Morris, L. and S. Pharr. \u201cInvasion of Privacy: A Dilemma for Marketing Research and Database Technology,\u201d Journal of Systems Management, October 1992, pp. 10\u201311, 30\u201331, 42\u201343."},{"key":"e_1_2_1_25_1","volume-title":"Wired News","author":"Oakes C.","year":"1999","unstructured":"Oakes, C. \u201cMouse Pointer Records Clicks,\u201d Wired News, 1999. Retrieved April 8, 2003, from http:\/\/www.wired.com\/news\/print\/0,1294,32788.00.html."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2003.11647086"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/cb.91"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"issue":"1","key":"e_1_2_1_29_1","first-page":"63","article-title":"\u201cStudents' Self-efficacy in Computer Skills as a Function of Gender and Cognitive Learning Style at Sultan Qaboos University,\u201d","volume":"24","author":"Qutami Y.","year":"1997","unstructured":"Qutami, Y. and M. Abu-Jaber. \u201cStudents' Self-efficacy in Computer Skills as a Function of Gender and Cognitive Learning Style at Sultan Qaboos University,\u201d International Journal of Instructional Media, 24:1, 1997, pp. 63\u201374.","journal-title":"International Journal of Instructional Media"},{"key":"e_1_2_1_30_1","volume-title":"ComputerWorld","author":"Radcliff D.","year":"2001","unstructured":"Radcliff, D. \u201cGiving Users Back Their Privacy,\u201d ComputerWorld, 2001. Retrieved April 8, 2003, from http:\/\/www.computerworld.com\/storyba\/0,4125,NAV47_STO61981,00.html."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2003.11647540"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11647507"},{"key":"e_1_2_1_33_1","volume-title":"Measures of Personality and Social Psychological Attitudes.","author":"Robinson J.P.","year":"1991","unstructured":"Robinson, J.P., P.R. Shaver, and L.S. Wrightsman. \u201cCriteria for Scale Selection and Evaluation,\u201d In Robinson, J.P., P.R. Shaver, and L.S. Wrightsman (Eds.). Measures of Personality and Social Psychological Attitudes. San Diego: Academia, 1991."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11647048"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355127"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"e_1_2_1_37_1","first-page":"167","volume-title":"MIS Quarterly","author":"Smith H.J.","year":"1996","unstructured":"Smith, H.J., S.J. Milberg, and S.J. Burke. \u201cInformation Privacy: Measuring Individuals' Concerns about Organizational Practices,\u201d MIS Quarterly, June 1996, pp. 167\u2013196."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"issue":"2","key":"e_1_2_1_39_1","first-page":"108","article-title":"\u201cChief Executive Officer's Misperceptions: Should Students be used as Surrogates?\u201d","volume":"37","author":"Walstrom K.","year":"1996","unstructured":"Walstrom, K. \u201cChief Executive Officer's Misperceptions: Should Students be used as Surrogates?\u201d Journal of Computer Information Systems, 37:2, 1996\u20131997, pp. 108\u2013112.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/272287.272299"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.1998.11647352"},{"key":"e_1_2_1_42_1","volume-title":"\u201cElectronic Window Dressing: Impression Management on the Internet.\u201d","author":"Winter S.","year":"1997","unstructured":"Winter, S., C. Saunders, and P. Hart. \u201cElectronic Window Dressing: Impression Management on the Internet.\u201d Paper presented at the International Conference on Information systems, Atlanta, GA, 1997."},{"issue":"2","key":"e_1_2_1_43_1","first-page":"37","article-title":"\u201cSex as a Determinant of Software Piracy,\u201d","volume":"36","author":"Wood W.","year":"1995","unstructured":"Wood, W. and R. Glass. \u201cSex as a Determinant of Software Piracy,\u201d Journal of Computer Information Systems, 36:2, 1995\u20131996, pp. 37\u201343.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/270913.270922"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2004.11647599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T14:58:26Z","timestamp":1770389906000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2004.11647599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,6]]}},"alternative-id":["10.1080\/08874417.2004.11647599"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2004.11647599","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,6]]}}}