{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:16:47Z","timestamp":1764332207494,"version":"3.41.2"},"reference-count":30,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,7,13]],"date-time":"2012-07-13T00:00:00Z","timestamp":1342137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The present research is an updated and expanded continuation of an article by Parayitam <jats:italic>et al.<\/jats:italic> from 2008. The purpose of this study is to examine several internet policies and whether the communication of these policies to the customer has significantly changed during a ten year period.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The study defines published policies of how a company operates with respect to different factors. The policies examined are privacy, security, shipping, returns, and warranty. Each of the policies described above were then rated as per the rating scale defined by the authors. The 525 e\u2010commerce sites studied were divided into service and product sites, respectively. The e\u2010commerce sites were also separated into 28 industry groups. The data were also collected on some of the other factors that were important in this study.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>E\u2010commerce companies do not fully inform their customers. The results showed no significant relationships between the policy ratings and any of the other factors taken into account.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The net incomes collected were the companies' entire income, not exclusively from online sales. The present study used an unbalanced sample size consisting of more product sites than service sites.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>People doing business over internet with e\u2010commerce companies need to read the privacy policy carefully and should be aware of how their information will be used by the e\u2010commerce companies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The study provides valuable information about e\u2010commerce companies in communicating their customer service policies and very little changes have taken place in the last ten year period.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685221211247325","type":"journal-article","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T04:31:40Z","timestamp":1390451500000},"page":"222-244","source":"Crossref","is-referenced-by-count":5,"title":["E\u2010commerce policies and customer privacy: a longitudinal study (2000\u20102010)"],"prefix":"10.1108","volume":"20","author":[{"given":"Mayur S.","family":"Desai","sequence":"first","affiliation":[]},{"given":"Kiran J.","family":"Desai","sequence":"additional","affiliation":[]},{"given":"Lonnie D.","family":"Phelps","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031120094061600_b6","doi-asserted-by":"crossref","unstructured":"Eid, R. and Trueman, M. (2004), \u201cFactors affecting the success of business\u2010to\u2010business international internet marketing (B\u2010to\u2010B IIM): an empirical study of UK companies\u201d, Industrial Management & Data Systems, Vol. 104 Nos 1\/2, p. 16.","DOI":"10.1108\/02635570410514061"},{"key":"key2022031120094061600_b7","doi-asserted-by":"crossref","unstructured":"Furnell, S.M., Chiliarchaki, P. and Download, P.S. (2001), \u201cSecurity analysers: administrator assistants or hacker helpers?\u201d, Information Management & Computer Security, Vol. 9 No. 2, pp. 93\u2010101.","DOI":"10.1108\/09685220110388872"},{"key":"key2022031120094061600_b8","doi-asserted-by":"crossref","unstructured":"Gao, Y. and Wu, X. (2010), \u201cA cognitive model of trust in e\u2010commerce: evidence from a field study in China\u201d, Journal of Applied Business Research, Vol. 26 No. 1, p. 37.","DOI":"10.19030\/jabr.v26i1.275"},{"key":"key2022031120094061600_b9","doi-asserted-by":"crossref","unstructured":"Gudigantala, N., Song, J. and Jones, D.R. (2008), \u201cHow well do e\u2010commerce web sites support compensatory and non\u2010compensatory decision strategies? An exploratory study\u201d, International Journal of E\u2010Business Research, Vol. 4 No. 4, pp. 43\u201057.","DOI":"10.4018\/jebr.2008100104"},{"key":"key2022031120094061600_b10","doi-asserted-by":"crossref","unstructured":"Hormozi, A.M. (2005), \u201cCookies and privacy\u201d, Journal Information Security, Vol. 13 No. 6, pp. 51\u20109.","DOI":"10.1201\/1086\/44954.13.6.20050101\/86221.8"},{"key":"key2022031120094061600_b13","doi-asserted-by":"crossref","unstructured":"Lwin, M.O. and Williams, J.D. (2006), \u201cPromises, promises: how consumers respond to warranties in internet retailing\u201d, The Journal of Consumer Affairs, Vol. 40 No. 2, pp. 236\u201060.","DOI":"10.1111\/j.1745-6606.2006.00057.x"},{"key":"key2022031120094061600_b15","doi-asserted-by":"crossref","unstructured":"Meinert, D.B., Peterson, D.K., Criswell, J.R. and Crossland, M.D. (2006), \u201cPrivacy policy statement and consumer willingness to provide personal information\u201d, Journal of Electronic Commerce in Organizations, Vol. 4 No. 1, pp. 1\u201017.","DOI":"10.4018\/jeco.2006010101"},{"key":"key2022031120094061600_b16","doi-asserted-by":"crossref","unstructured":"Meziane, F. and Kasiran, M.K. (2008), \u201cEvaluating trust in electronic commerce: a study based on the information provided on merchants' websites\u201d, The Journal of the Operational Research Society, Vol. 59 No. 4, pp. 464\u201072 (suppl. part special issue: intelligent management system).","DOI":"10.1057\/palgrave.jors.2602430"},{"key":"key2022031120094061600_b17","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.D. and Krishnamurthy, S. (2002), \u201cInternet seals of approval: effects on online privacy policies and consumer perceptions\u201d, The Journal of Consumer Affairs, Vol. 36 No. 1, p. 28.","DOI":"10.1111\/j.1745-6606.2002.tb00419.x"},{"key":"key2022031120094061600_frd9","unstructured":"Parayitam, S., Desai, K. and Desai, M. (2008), \u201cE\u2010commerce policies, customer privacy, and customer confidence\u201d, Vilakshan, XIMB Journal of Management, Vol. 5, pp. 45\u201058."},{"key":"key2022031120094061600_b18","unstructured":"Peeples, D.K. (2002), \u201cInstilling consumer confidence in e\u2010commerce\u201d, S.A.M. Advanced Management Journal, Vol. 67 No. 4, pp. 26\u201031 (quarterly journal)."},{"key":"key2022031120094061600_b19","doi-asserted-by":"crossref","unstructured":"Pollach, I. (2005), \u201cA typology of communicative strategies in online privacy policies: ethics, power and informed consent\u201d, Journal of Business Ethics, Vol. 62, pp. 221\u201035.","DOI":"10.1007\/s10551-005-7898-3"},{"key":"key2022031120094061600_b29","doi-asserted-by":"crossref","unstructured":"Ranganathan, C., and Ganapathy, S. (2002), \u201cKey dimensions of business\u2010consumer web sites\u201d, Information and Management, Vol. 39, pp. 457\u201065.","DOI":"10.1016\/S0378-7206(01)00112-4"},{"key":"key2022031120094061600_b21","doi-asserted-by":"crossref","unstructured":"Storey, V.C., Kane, G.C. and Schwaig, K.S. (2009), \u201cThe quality of online privacy policies: a resource\u2010dependency perspective\u201d, Journal of Database Management, Vol. 20 No. 2, pp. 19\u201037.","DOI":"10.4018\/jdm.2009040102"},{"key":"key2022031120094061600_b22","unstructured":"Stylianou, P. (2008), \u201cOnline dispute resolution: the case for a treaty between the United States and the European union in resolving cross\u2010border e\u2010commerce disputes\u201d, Syracuse Journal of International Law and Commerce, Vol. 36 No. 1, pp. 117\u201043."},{"key":"key2022031120094061600_b23","doi-asserted-by":"crossref","unstructured":"Sun, T. (2011), \u201cThe roles of trust and experience in consumer confidence in conducting e\u2010commerce: a cross\u2010cultural comparison between France and Germany\u201d, International Journal of Consumer Studies, Vol. 35 No. 3, pp. 330\u20107.","DOI":"10.1111\/j.1470-6431.2010.00938.x"},{"key":"key2022031120094061600_b24","doi-asserted-by":"crossref","unstructured":"Taylor, D.G., Davis, D.F. and Jillapalli, R. (2009), \u201cPrivacy concern and online personalization: the moderating effects of information control and compensation\u201d, Electronic Commerce Research, Vol. 9, March, pp. 203\u201023.","DOI":"10.1007\/s10660-009-9036-2"},{"key":"key2022031120094061600_b25","doi-asserted-by":"crossref","unstructured":"Tsai, J.Y., Egleman, S., Cranor, L. and Acquisti, A. (2011), \u201cThe effect of online privacy information on purchasing behavior: an experimental study\u201d, Information Systems Research, Vol. 22 No. 2, pp. 254\u2010268, 415,417.","DOI":"10.1287\/isre.1090.0260"},{"key":"key2022031120094061600_b27","doi-asserted-by":"crossref","unstructured":"Van Slyke, C., Shim, J.T., Johnson, R. and Jiang, J. (2006), \u201cConcern for information privacy and online consumer purchasing\u201d, Journal of the Association for Information Systems, Vol. 7 No. 6, pp. 415\u201031.","DOI":"10.17705\/1jais.00092"},{"key":"key2022031120094061600_b28","doi-asserted-by":"crossref","unstructured":"Wirtz, J., Lwin, M.O. and Williams, J.D. (2007), \u201cCauses and consequences of consumer online privacy concern\u201d, International Journal of Service Industry Management, Vol. 18 No. 4, pp. 326\u201048.","DOI":"10.1108\/09564230710778128"},{"key":"key2022031120094061600_frd1","unstructured":"American Bar Association, Business Law Section (2010), \u201cPrivacy: how will you maintain your privacy?\u201d, available at: www.safeshopping.org\/pp.shtml (accessed April 30, 2010)."},{"key":"key2022031120094061600_frd2","doi-asserted-by":"crossref","unstructured":"Chatferjee, S. and Datta, P. (2008), \u201cExamining inefficiencies and consumer uncertainty in e\u2010commerce\u201d, Communications of the Association for Information Systems, Vol. 22, pp. 525\u201046.","DOI":"10.17705\/1CAIS.02229"},{"key":"key2022031120094061600_frd3","unstructured":"Cook, D.L. (2002), \u201cGovernance mechanisms as a means of increasing consumer trust in online exchanges: a signaling perspective\u201d, dissertation submitted by Don Lloyd Cook, J.D., Doctoral Candidate, Virginia Polytechnic Institute and State University, Blacksburg, VA."},{"key":"key2022031120094061600_frd4","doi-asserted-by":"crossref","unstructured":"Dotan, T. (2002), \u201cHow can eBusiness improve customer satisfaction? Case studies in the financial service industry\u201d, Journal of Information Technology Case and Application Research, Vol. 4 No. 4, p. 22.","DOI":"10.1080\/15228053.2002.10856009"},{"key":"key2022031120094061600_frd5","doi-asserted-by":"crossref","unstructured":"Edwards, L. and Wilson, C. (2005), \u201cRedress and alternative dispute resolution in EU cross\u2010border e\u2010commerce transactions\u201d, International Review of Law, Computers & Technology, Vol. 21 No. 3, p. 315.","DOI":"10.1080\/13600860701701603"},{"key":"key2022031120094061600_frd6","unstructured":"Kundi, G.M. and Shah, B. (2007), \u201ceBusiness in Pakistan: opportunities and threats\u201d, Journal of Internet Banking and Commerce, Vol. 12 No. 3, pp. 1\u201014, 16\u201023."},{"key":"key2022031120094061600_frd7","unstructured":"Leahy, P. (2009), \u201cPersonal data privacy and security act of 2009\u201d, available at: www.govtrack.us\/congress\/billtext.xpd?bill=s111\u20101490 (accessed April 30, 2010), Text of s. 1490."},{"key":"key2022031120094061600_frd8","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004), \u201cInternet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model\u201d, Information Systems Research, Vol. 15 No. 4, pp. 336\u201055.","DOI":"10.1287\/isre.1040.0032"},{"key":"key2022031120094061600_frd10","unstructured":"United States Computer Emergency Readiness Team \u2013 National Cyber Alert System (2008), \u201cCyber Security Tip ST07\u2010001\u201d, available at: www.us\u2010cert.gov\/cas\/tips\/ST07\u2010001.html (accessed April 30, 2010)."},{"key":"key2022031120094061600_frd11","doi-asserted-by":"crossref","unstructured":"Yenisey, M.M., Ozok, A.A. and Salvendy, G. (2005), \u201cPerceived security determinants in e\u2010commerce among Turkish university students\u201d, Behavior & Information Technology, Vol. 24, pp. 259\u201074.","DOI":"10.1080\/0144929042000320992"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685221211247325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221211247325\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221211247325\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:25Z","timestamp":1753402165000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/20\/3\/222-244\/181182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,13]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7,13]]}},"alternative-id":["10.1108\/09685221211247325"],"URL":"https:\/\/doi.org\/10.1108\/09685221211247325","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2012,7,13]]}}}