{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:05:15Z","timestamp":1764331515872,"version":"3.41.2"},"reference-count":17,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,3,1]]},"abstract":"<jats:p>The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the guarantees of privacy when using e\u2010commerce and the Internet. Some companies collect marketing information on consumers\u2019 Internet habits without their knowledge or consent. This study looks at stated policies appearing on the Web sites of a number of major e\u2010commerce companies regarding Internet privacy. This was accomplished by the examination of information related to current Internet policies posted on these firms\u2019 Web sites. Also examined was whether these policies have been changed over a three\u2010year time period. Five policy categories were examined over this three\u2010year period using a consistent rating scale. These categories were privacy, returns, shipping, warranty, and security.<\/jats:p>","DOI":"10.1108\/09685220310463696","type":"journal-article","created":{"date-parts":[[2003,3,12]],"date-time":"2003-03-12T03:20:29Z","timestamp":1047439229000},"page":"19-27","source":"Crossref","is-referenced-by-count":22,"title":["E\u2010commerce policies and customer privacy"],"prefix":"10.1108","volume":"11","author":[{"given":"Mayur S.","family":"Desai","sequence":"first","affiliation":[]},{"given":"Thomas C.","family":"Richards","sequence":"additional","affiliation":[]},{"given":"Kiran J.","family":"Desai","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021719473484800_B1","unstructured":"(The) Atlanta Journal\u2010Constitution (2001), \u201cEasy access: Web\u2019s detrimental benefit\u201d, The Atlanta Journal\u2010Constitution, 26 July."},{"key":"key2022021719473484800_B2","unstructured":"Bloomberg News (2001), \u201cDoubleClick privacy lawsuit dismissed\u201d, The New York Times, 31 March."},{"key":"key2022021719473484800_B3","unstructured":"Federal Trade Commission (FTC) (2000), \u201cElectronic commerce. Selling internationally: a guide for business\u201d, March, available at: www.ftc.gov\/bcp\/conline\/pubs\/alerts\/ecombalrt.htm"},{"key":"key2022021719473484800_B4","unstructured":"Johnston, M. (2000), \u201cCongressional staffers hear online privacy debate\u201d, IDG News Service, International Data Group, Inc., March."},{"key":"key2022021719473484800_B5","unstructured":"Kanner, B. (2000), \u201cOne person\u2019s privacy is another\u2019s free goody\u201d, The San Diego Union\u2010Tribune, 21 August."},{"key":"key2022021719473484800_B6","doi-asserted-by":"crossref","unstructured":"Lechner, U. and Hummel, J. (2002), \u201cBusiness models and system architectures of virtual communities: from a sociological phenomenon to peer\u2010to\u2010peer architectures\u201d, International Journal of Electronic Commerce, Vol. 6 No. 3, Spring, pp. 41\u20102.","DOI":"10.1080\/10864415.2002.11044242"},{"key":"key2022021719473484800_B7","unstructured":"Sanders, E. (2001), \u201cFirms renew assault on privacy rules under fresh attach from lobbyists\u201d, The Los Angeles Times, 27 March."},{"key":"key2022021719473484800_B8","unstructured":"Schwartz, J. (2001), \u201cSeeking privacy online, even as security tightens\u201d, The New York Times, 11 November."},{"key":"key2022021719473484800_B9","unstructured":"Shadid, A. (2001), \u201cTechnology & innovation: crackdown seen on customer databases\u201d,  The Boston Globe, 8 January."},{"key":"key2022021719473484800_B10","unstructured":"Soto, M. (2001), \u201cTFC clears Amazon policy\u201d, The Seattle Times, 26 May."},{"key":"key2022021719473484800_B11","unstructured":"Stoughton, S. (2001), \u201cOnline insecurity firms aim to ease fears about personal data\u201d, The Boston Globe, 6 March."},{"key":"key2022021719473484800_B12","unstructured":"Andrews, D., Preece, J. and Turoff, M. (2001), \u201cA conceptual framework for demographic groups resistant to online community interaction\u201d, International Journal of Electronic Commerce, Vol. 13 No. 2, pp. 1\u20107."},{"key":"key2022021719473484800_B13","unstructured":"Heighes, M.\u2010L. (2002), \u201cDevelop an effective e\u2010commerce policy\u201d, Credit Union Magazine, Vol. 68 No. 3, March, pp. 87\u20109."},{"key":"key2022021719473484800_B14","unstructured":"Lee, A. (2001), \u201cDTI E\u2010commerce policy slammed\u201d, Engineer, Vol. 29 No. 7, pp. 10\u201015."},{"key":"key2022021719473484800_B15","doi-asserted-by":"crossref","unstructured":"Liu, C. (2002), \u201cAn examination of privacy policies in Fortune 500 Web sites\u201d, Mid\u2010American Journal of Business, Vol. 17 No. 1, Spring, pp. 13\u201022.","DOI":"10.1108\/19355181200200001"},{"key":"key2022021719473484800_B16","unstructured":"Todd, J. (1998), \u201cA good start for Canada\u2019s E\u2010commerce policy\u201d, Tax Executive, Vol. 3 No. 9, September\/October."},{"key":"key2022021719473484800_B17","unstructured":"Wojcik, J. (2001), \u201cInsurers cut e\u2010risks from policies\u201d, Business Insurance, Vol. 35 No. 3,  10 September, pp. 1\u20102."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220310463696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220310463696\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220310463696\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:44Z","timestamp":1753402124000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/11\/1\/19-27\/174122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,3,1]]}},"alternative-id":["10.1108\/09685220310463696"],"URL":"https:\/\/doi.org\/10.1108\/09685220310463696","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2003,3,1]]}}}