Gender Female
Male
Age 18 - 29
30 - 49 50+
Education High school or less Some college College graduate
REFERENCES
Agarwal, R. and Prasad, J. (1999). Are individual differences germane to the acceptance of new information technologies? Decision Sciences, 30(2), 361-191.
Agranoff, M. H. (1991). Controlling the threat to personal privacy: Corporate policies must be created. Journal of Information Systems Management, 8, 48-52.
Ajzen, I. and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice-Hall.
Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107(2), 234-246.
Bentler, P. M. and Chou, C.-P. (1993). Some new covariance structure model improvement statistics. In Bollen, K. A. and Long, J. S. (Eds.), Testing
Structural Equation Models. Newbury Park, CA: Sage.
Buckley, P. (1999). The emerging digital economy II, US Department of Commerce.
Retrieved February 1, 2000 on the World Wide Web: http://
www.ecommerce.gov/ede/chapter1.html.
Carmines, E. G. and McIver, J. P. (1981). Analyzing models with unobserved variables: Analysis of covariance structures. In Bohrnstedt, G. W. and Borgatta, E. F. (Eds.), Social Measurement: Current Issues. Newbury Park, CA: Sage.
Chin, W.W. and Todd, P.A. (1995). On the use, usefulness, and ease of use of structural equation modeling in MIS research: A note of caution. MIS Quarterly, 19(2), 237-246.
Cranor, L. F., Reagle, J. and Ackerman, M. S. (1999). Beyond concern: Understand- ing net users’ attitudes about online privacy. AT&T Labs-Research Technical Report TR 99.4.3. Retrieved February 1, 2000 on the World Wide Web: http:/
/www.research.att.com/library/TRs/99/99.4/99.4.3/report.htm.
Culnan, M. J. (1993). How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341-363.
Culnan, M. J. (1999a). The Georgetown Internet Privacy Policy Survey. Retrieved December 1, 1999 on the World Wide Web: http://www.msb.edu/faculty/
culnanm/gippshome.html.
Culnan, M. J. (1999b). Privacy and the top 100 Web sites: A report to the Federal Trade Commission. The Online Privacy Alliance. Retrieved December 1, 1999 on the World Wide Web: http://www.msb.edu/faculty/culnanm/
gippshome.html.
Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003.
Drucker, P. F. (1999). Beyond the information revolution, The Atlantic Monthly.
Fishbein, M. and Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
FTC. (1998). Privacy online: A report to congress. Federal Trade Commission.
Retrieved on the World Wide Web: http://www.ftc.gov/privacy.
FTC. (1999). Self-regulation and privacy online: A report to Congress. Federal Trade Commission. Retrieved December 1, 1999 on the World Wide Web:
http://www.ftc.gov/privacy.
FTC. (2000). Privacy online: Fair information practices in the electronic market- place. Federal Trade Commission. Retrieved June 21, 2000 on the World Wide Web: http://www.ftc.gov/reports.
Garfinkel, S. (2000). Protecting your privacy concerns about third-party monitoring putting a damper on e-commerce. Boston Globe, January, C4.
Garver, M. S. and Mentzer, J. T. (1999). Logistics research methods: Employing structural equation modeling to test for construct validity. Journal of Business Logistics, 20(1), 33-57.
GVU. (1998). GVU’s 10th WWW user survey. Georgia Tech Graphics, Visualiza- tion & Usability Center. Retrieved on the World Wide Web: http://
www.gvu.gatech.edu/user_surveys.
Hair, J. F., Jr., Anderson, R. E., Tatham, R. L. and Black, W. C. (1998). Multivariate Data Analysis (5th ed.). Englewood Cliffs, NJ: Prentice Hall.
Harris Louis and Associates and Westin, A. F. (1991). Harris-Equifax Consumer Privacy Survey 1991. Atlanta, Georgia: Equifax, Inc.
Harris Louis and Associates and Westin, A. F. (1994). Equifax-Harris Consumer Privacy Survey 1994. Atlanta, Georgia: Equifax, Inc.
Harris Louis and Associates and Westin, A. F. (1996). The 1996 Equifax-Harris Consumer Privacy Survey. Atlanta, Georgia: Equifax, Inc.
Harrison, A. W. and Rainer, R. K., Jr. (1992). The influence of individual differences on skill in end-user computing. Journal of Management Informa- tion Systems, 9(1), 93-111.
Hartwick, J. and Barki, H. (1994). Explaining the role of user participation in information system use. Management Science, 40(4), 440-465.
Hoffman, D. L., Novak, T. P. and Chatterjee, P. (1993). Commercial scenarios for the Web: Opportunities and challenges, Journal of Computer-Mediated Communication, 1.
Hughes, C. T. and Gibson, M. L. (1991). Students as surrogates for managers in a decision-making environment: An experimental study. Journal of Manage- ment Information Systems, 8(2), 153-166.
Igbaria, M. and Parsuraman, S. (1989). A path analytic study of individual characteristics, computer anxiety, and attitudes toward microcomputers.
Journal of Management, 15(3), 373-388.
LaRussa, R. S. (2000, June 9). Cover letter to U.S. organizations. Acting Under Secretary for International Trade Administration. Retrieved on the World Wide Web: http://www.ita.doc.gov/td/ecomm/LaRussaLetJune2000.htm.
Levin, T. and Gordon, C. (1989). Effect of gender and computer experience on attitudes towards computers. Journal of Educational Computing Research, 5(1), 69-88.
Lindorf, R. and Wygant, S. (2000). Surveying collegiate surfers-Web methodology or mythology? Quirks Marketing Research Review. Retrieved June 20, 2000 on the World Wide Web: http://www.surveynetwork.com/surveys.asp.
Louis Harris & Associates Inc. (1999). IBM Multi-National Consumer Privacy Survey. New York, NY: IBM Global Services.
Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 10(1), 4-12.
Milberg, S. J., Burke, S. J., Smith, H. J. and Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65-74.
Milberg, S. J., Smith, H. J. and Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35-57.
Mogg, J. F. (2000, July 27). Letter from Commission Services transmitting the European Commission’s adequacy finding, European Commission Internal Market Director-General. Retrieved September 7, 2000 on the World Wide Web: http://www.ita.doc.gov/td/ecom/EUletter27JulyHeader.htm.
Nickell, G. S. and Pinto, J. N. (1986). The computer attitude scale. Computers in Human Behavior, 2, 301-306.
Nunally, J.C. (1978). Psychometric Theory, 2nd ed., McGraw-Hill: New York.
OECD. (1997). OECD Policy Brief No. 1-1997: Electronic commerce. Organiza- tion for Economic Co-operation and Development. Retrieved March 7, 2000 on the World Wide Web: http://www.oecd.org/publications/Pol_brief/
9701_Pol.htm.
Oracle. (1999). The Internet changes everything. CIO.
PwC. (1999a). Electronic Business Outlook. PricewaterhouseCoopers LLP. Re- trieved July 13, 2000 on the World Wide Web: http://www.e- business.pwcglobal.com/pdf/PwCPrivacy.pdf. C:\MyFiles\ECPrivacy.wpd.
PwC. (1999b). Privacy...A weak-link in the cyber-chain: Privacy risk management in the information economy. PricewaterhouseCoopers LLP. Retrieved July 13, 2000 on the World Wide Web: http://www.e-business.pwcglobal.com/
pdf/PwCPrivacy.dbf.
Remus, W. (1986). Graduate students as surrogates for managers in experiments on business decision making. Journal of Business Research, 14, 19-25.
Santosus, M. (1998). Too much ado about nothing. CIO, August.
Schwartz, J. (2000). FTC to propose new online privacy rules. The Washington Post, E1.
Segars, A. H. and Grover, V. (1993). Re-examining perceived ease of use and usefulness: A confirmatory factor analysis. MIS Quarterly, 17(4), 517-525.
Smith, H. J. (1993). Privacy policies and practices: Inside the organizational maze.
Communications of the ACM, 36(12), 105-122.
Smith, H. J. (1994). Managing Privacy: Information Technology and Corporate America. Chapel Hill, NC: University of North Carolina Press.
Smith, H. J., Milberg, S. J. and Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167195.
Stone, E. F., Gardner, D. G., Gueutal, H. G. and McClure, S. (1983). A field experiment comparing information—privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
Stone, E. F. and Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. In Rowland, K. M. and Ferris, F. R. (Eds.), Research in Personnel and Human Resources Management, 349- 411. Greenwich, CT: JAI Press.
Swanson, E. B. (1982). Measuring user attitudes in MIS research: A review.
OMEGA, 10, 157-165.
Swanson, E. B. (1988). Information System Implementation: Bridging the Gap Between Design and Utilization. Homewood, IL: Irwin.
US DOC. (2000). Defying definition. U.S. Department of Commerce. Retrieved March 7, 2000 on the World Wide Web: http://www.ecommerce.gov/6.htm.
Westin, A. F. (1967). Privacy and Freedom. New York: Atheneum.
Wheaton, B. B., Muthen, B., Alwin, D. F. and Summers, G. F. (1977). Assessing reliability and stability in panel models. In Heise, D. R. (Ed.), Sociological Methodology. San Francisco: Jossey-Bass.