i
BIBLIOGRAPHY
Alan D. Smith, (2004), “E-security issues and policy development in an information-
sharing and networked environment”, Aslib Proceedings: New Information
Perspectives, Vol. 56(5), (2004), PP: 272-285
Alba, Joseph, John Lynch, Barton Weitz, Chris Janiszewski, Richard Lutz, Alan Sawyer,
Stacey Wood, (1997), “Interactive home shopping: Consumer, Retailer, and
Manufacturer incentives to participate in electronic marketplaces”, Journal of
Marketing, Vol. 61, (July, 1997), PP: 38–53
Aldridge, A., White, M. and Forcht, K., (1997), “Security considerations of doing business
via the Internet: Cautions to be Considered”, Journal of Internet Research,
Vol. 7(1), PP: 9-15
Ali M. Noor , Zetty M.M. Zaini, Mohd Raziff Jamaluddin and Mohd Salehuddin Mohd
Zahari, (2011), “Exploratory Studies on Online Grocery Shopping”, 3rd International
Conference on Information and Financial Engineering, IPEDR, Vol.12, (2011),
PP: 423-427, IACSIT Press, Singapore
Almousa M., (2011), “Perceived risk in apparel online shopping: A multi dimension
perspective” , Journal of Canadian Social Science, Vol. 7(2), (2011), PP: 23-31
Alsmadi Smadi, (2002), “Consumer attitudes toward online shopping in Jordan:
opportunities and challenges”, International Journal of Management, Vol. 13(2),
(2002), PP: 131-144
AMA (American Marketing Association), (2004), FBI Internet Fraud Complaint Center
(2001); Internet Fraud Watch of the National Consumer League (NCL), 2001 NCL’s
On-line shopping survey, carried out in US with a sample of 1003 adults, in Aug
2001.
Amaratunga, D., Baldry, D., Sarshar, M., and Newton, R., (2002), “Quantitative and
qualitative research in the built environment: Application of Mixed research
approach”, Work Study, Vol. 51(1), (2002), PP: 17-31
Anahita Bagherzad Halimi,,Alireza Chavosh,,Somayeh Soheilirad, Pejman Sheibani
Esferjani and Arian Ghajarzadeh, (2010), “ The Impact of Culture on young
consumer’s intension towards online shopping in Malaysia”, International
Conference on Business and Economics Research, Third session, Vol.1, PP: 120-
124
ii
Adam Sarner (2007), “E-Marketing Improves the Customer's Buying Process”, Gartner
Research, Assessed April 2009, Available at http://www.gartner.com/id=501732
Anderson, Chris, (2009), “The long tail: why the future of business is selling less of
more”, Commonwealth Publishing Co., Ltd, 1st Edition, Taipei. Publication- Hyperion
Anderson, E. and Weitz, E., (1989), “Determinants of continuity in conventional industrial
channel dyads”, Journal of Marketing Science, Vol. 8, PP: 310-323
Anderson, J. C. and Gerbing, D. W., (1984), “The effect of sampling error on
convergence, improper solutions and goodness-of-fit indices for maximum likelihood
confirmatory factor analysis”, Psychometrika , Vol. 49, (1984), PP: 155-173
Anderson, R.E., and Srinivasan, S.S., (2003), “E-satisfaction and E-loyalty: A
contingency framework”, Journal of Psychology and Marketing, Vol. 20(2), (2003),
PP: 123-138
Andrews, A., (2004b), “Internet newsletters”, Kybernetes, Vol. 33(1), (2004), PP: 22-25
Anil Samtani, (2000), “Electronic commerce law in Asia: legal, regulatory and policy
issues”, The proceedings of international conference on electronic commerce:
Emerging trends in e-commerce, (Nov. 2000), Multi Media University Kuala
Lumpur, Malaysia.
Ann E. Schlosser, Tiffany Barnett White and Susan M. Lloyd, (2006), “Converting Web Site
Visitors into Buyers: How Web Site Investment Increases Consumer Trusting
Beliefs and Online Purchase Intentions”, Journal of Marketing, Vol. 70 (April 2006),
PP. 133–148
Anthony D. Miyazaki, (2008), “Online Privacy and the Disclosure of Cookie Use: Effects
on Consumer Trust and Anticipated Patronage”, Journal of American Marketing
Association, Vol. 27 (1) (Spring 2008), PP: 19–33
Anthony Miyazaki (2008), “Online Privacy and the Disclosure of Cookie Use: Effects of
Consumer Trust and Anticipated Patronage”, Journal of Public Policy and
Marketing, Vol. 27, (Spring 2008), PP: 19–33
AOL/NCSA, (2004), “online safety study”, Assessed June 2008, Available:
http://www.staysafeonline.info/pdf/safety study v04.pdf, October 2008
Arnold, M. J., & Reynolds, K. E., (2009), “Affect and Retail Shopping Behavior:
Understanding the Role of Mood Regulation and Regulatory Focus”, Journal of
Retailing, Vol.85 (3), (2009), PP: 308-320
Arnold, S. J., V. Roth and D. J. Tigert., (1980), “Conditional logit versus MDA in the
prediction of store choice. In Kent B. Monroe, Ed. Advances in Consumer Research
iii
Ann Arbor, Michigan, Association for Consumer Research, Vol. 8, (1980), PP: 665-670
Arumuga perumal, S., (2006), “Effective method of security measures in virtual banking”,
Journal of Internet Banking and Commerce, Vol. 11(1), (April 2006), E- paper,
Available at: http://www.arraydev.com/commerce/JIBC/2006-04/VB.asp
(Accessed 17 January 2010)
Austin M. Jill and Reed Mary Lynn, (1999), “Targeting children online: Internet advertising
ethics issues”, Journal of consumer Marketing, Vol. 16, PP: 590-602
Bagozzi, R.P., and Yi, Y., (1988), “On the Evaluation of Structure Equation Models”,
Journal of the Academy of Marketing science, Vol. 16(1), PP: 70-83
Bakos, J.Y., (1997), “Reducing buyer search costs: implications for electronic
marketplaces”, Journal of Management Science, Vol. 43(12), (1997), PP: 1676-
1692
Barkowitz. N., (1992), “Marketing” 2nd Edition. Burr Redge IL Richard D. Lrwim P. 90.
Barnes SJ, Scornavacca E, (2004), “Mobile marketing: the role of permission and
acceptance”, International Journal Mobile Communication, Vol. 2(2), (2204), PP:
128-139
Bartlett, M.S., (1954), “A note on the multiplying factors for various chi square
approximations”, Journal of the Royal Statistical Society, Vol. 16(Series B), (1954),
PP: 296-298
Bayan, Ruby (2001), “Privacy Means Knowing Your Cookies,” Link-Up, Vol. 18(1)
(January–February 2001), PP: 22–23
BBC (2208), “Plastic card fraud goes back up”, BBC, (March 12, 2008),
http://news.bbc.co.uk/2/hi/business/7289856.stm. Accessed January 2, 2010
BCG (Boston Consulting Group), (1997), “E-Trust Internet Privacy Study: Summery of
market survey results”, Assessed (Sept. 2009), Available:
http://www.ftc.gov/bcp/privacy/wkshp97/comments1/etrust
Beard, F. K., (2003), “College student attitudes toward advertising’s ethical, economic, and
social consequences”, Journal of Business Ethics, Vol. 48, PP: 217-228.
Belch, G.E. & Belch, M.A., (2004), “Advertising and promotion: an integrated marketing
communications perspective”, 6th
Edition, New York: McGraw-Hill
Bellovin, S.M., (2004), “Spamming, phishing, authentication, and privacy”,
Communications of the ACM, Vol. 47(2), (2004), PP:144
iv
Beltramini, Richard (2003), “Application of the Unfairness Doctrine to Marketing
Communications on the Internet”, Journal of Business Ethics, Vol. 42(4), (2003),
PP: 393-400
Benjamin, R. and Wigand, R., (1995), “Electronic markets and virtual value chains on the
information superhighway”, Journal of Sloan Management Review, Vol. 36(2),
(Winter 1995), PP: 62-72
Bette Ann stead and Jackie Gilbert (2001), “Ethical issues in Electronic Commerce”,
Journal of business Ethics, Vol.25 (1), (2001), PP: 167-186
Bezjian-Avery, A., Calder, B. and Iacobucci, D., (1998), “New media interactive advertising
v/s traditional advertising”, Journal of Advertising Research, Vol. 38(4), (1998),
PP: 23-32
Bhatnagar, A., and Ghose, S., (2004a), “A Latent Class Segmentation Analysis of E-
Shoppers”, Journal of Business Research, Vol. 57(7), (2004), PP: 758–767
Bhatnagar, A., and Ghose, S., (2004b), “Segmenting Consumers Based on the Benefits and
Risks of Internet Shopping”, Journal of Business Research, Vol. 57(12), (2004), PP:
1352–1360
Bhatnagar, A., Misra, S., and Rao, H.R., (2000), “On Risk, Convenience, and Internet
Shopping Behavior”, Association for Computing Machinery, Communications of the
ACM, Vol. 43(11), (2000), PP: 98–110
Bhattacherjee, A., (2001), “An empirical analysis of the antecedents of electronic commerce
service continuance”, Journal of Decision Support Systems, Vol. (32), (2001), PP:
201-214
Bhattacherjee, A., (2001a), “Understanding information systems continuance: an
expectation-confirmation model”, Journal of MIS Quarterly, Vol. 25(3), (2001), PP:
351–370
Blundon Bill, and Bonde Allen (1999), “Beyond the Transaction: Online sales are only part
of the E-business life cycle; to succeed, companies must customize service and
adapt to change”, Information Week, (November 16, 1999), Available:
http://www.informationweek.com/709/09iuss2.htm
Bothma. C.H. (2000), “E-commerce for South African Managers”, Irene, South Africa:
Interactive Reality
Boyer, K. K., and Hult, G. T. M., (2005), “Customer behavior in an online ordering
application: A decision scoring model”, Journal of Decision Sciences, Vol. 36(4),
(2005), PP: 569-598
v
Bradley, P., (2003), “The great spam experiment”, Library and Information Update, Vol.
1(9), (2003), PP: 50-101
Branscum, D., (2000), “Guarding on-line privacy”, Newsweek, Vol. 135 (23), (2000), PP:
77–78.
Broekhuizen, T. and Huizingh, E., (2009), “Online purchase determinants: is their effect
moderated by direct experience,” Management Research News, Vol. 32(5), (2009),
PP: 440-457
Brooks, G., (2007), “Secret society”, New Media Age, Vol. 13 (Dec. 2007) , P:10
Brown, P. (2007), “Spyware and pre texting: Recent developments”, The Computer &
Internet Lawyer, Vol. 24(6), (2007), PP: 14-20
Brynjolfsson, E. and Smith, M., (2000), “Frictionless commerce: A comparison of
Internet and conventional retailers”, Journal of Management Science, Vol. 46(4),
(2000), PP: 563-585
Buckner, K., Gillham, M., (2000), "Using e-mail for social and domestic purposes:
processes, practices and attitudes”, Home-Orientated Informatics and Telematics
International Working Conference, (June 28-30, 2000), PP: 87-98
Business Week, (1997), “Internet communities”, Special report, (5 May 1997)
Campbell, A. J. (1997), “Relationship marketing in consumer markets: a comparison of
managerial and consumer attitudes about information privacy,” Journal of Interactive
Marketing, Vol. 11, (1997), PP: 44–57
Carlos Flavian and Miguel Guinalıu, (2006), “Consumer trust, perceived security and
privacy policy Three basic elements of loyalty to a web site”, Industrial Management
and Data Systems, Vol. 106(5), (2006), PP: 601-620
Carmen Puiu, Mirela Sirbu and Codrula Baltescu, (2010), “Internet Marketing Target the
Young Generation”, Recent Researches in Tourism and Economic Development,
Vol. 3, (2010), PP: 470-476
CAUCE (2003), “Coalition against unsolicited commercial e-mail”, Available at:
www.cauce.org
Caudill Eve M and Murphy Patrick E., (2000), “Consumer Online Privacy: Legal and
Ethical Issues”, Journal of Public Policy & Marketing, Vol. 19 (1), (2000), PP: 7-19
CDT (Center for Democracy and Technology), (2003), “Why am I getting all this Spam?”
Unsolicited Commercial E-mail Research Six Month Report, (March 2003)
vi
Chaffey, D., Mayer, R., Johnston, K. and Ellis-Chadwick, F., (2003), “Internet Marketing:
Strategy, Implementation and Practice”, 2nd
Edition, Prentice-Hall, Englewood Cliffs,
NJ.
Chang, Susan and Mariko Morimoto (2003), “An Assessment of Consumer Attitudes
toward Direct Marketing Communication Channels: A Comparison between
Unsolicited Commercial E-mail and Postal Direct Mail”, Paper presented at the
annual convention of The Association for Education in Journalism and Mass
Communication, Kansas City, MO, (August 2003)
Chao Wen, Victor R. Prybutok and Chenyan XU, (2011), “An Integrated Model for
customer inline repurchase intension”, Journal of Computer Information Systems,
Vol. 52(1), (2011), PP: 14-23
Cheeseman. H.R. (2000), “Contemporary Business and E-Commerce Law”, 2nd
Edition,
USA: Pearson, New Jersey
Chellappa, K.R and Pavlou A.P. (2002), “Perceived information security, financial
liability and consumer trust in electronic commerce transactions”, Journal of
Logistics Information Management, Vol. 15(5), (2002), PP: 358-368
Cheung, C and Lee, Matthew, K.O., (1999), “Trust in Internet Shopping: A Proposed
Model and Measurement Instrument”, Proceeding of the Americas conference on
information system (AMCIS, 1999), Long Beach, California. Available at:
www.learningpark.cityu.edu.hk/student/ AISWeb/Christy.htm (Accessed 10
September 2009)
Cheung, C and Lee, Matthew, K.O., (2006), “Understanding Consumer Trust in Internet
Shopping: A Multidisciplinary Approach”, Journal of the American Society for
Information Science and Technology, Vol. 57(4), (2006), PP: 479-492
Childers, T., Carr, C., Peck, J. and Carson, S., (1997), “Hedonic and Utilitarian
Motivations for Online Retail Shopping Behavior”, Journal of Retailing, Vol. 77,
(1997), PP: 511-535
Chiung-wen (Julia) Hsu, (2006), “Privacy concerns, privacy practices and web site
categories toward a situational paradigm” Online Information Review, Vol. 30(5),
(May 2006), PP: 569-586
Choi, J. & Lee, K., (2003), “Risk perception and e-shopping: a cross-cultural study”,
Journal of Fashion Marketing and Management, Vol. 7(1), (2003), PP: 49-64
CIS (Consumer Information Sheet) (2012), “Protect Your Computer from Viruses,
Hackers, and Spies” State of California, office of the Attorney General.
vii
Civic Consulting report, (2011), “Consumer market study on the functioning of e- commerce
and Internet marketing and selling techniques in the retail of goods”, Civic
Consulting (Executive Agency for Health and Consumers)
Claire Gauzente and Ashok Ranchhod (2001), “Ethical Marketing for Competitive
Advantage on the Internet” Academy of Marketing Science Review, Vol.10,
(2001), PP: 251-259
Coleman, D. and Levine, S., (2008), “Collaboration 2.0: Technology and Best Practices for
Successful Collaboration in a Web 2.0 world Cupertino”, (HappyAbout.Info.)
CPC (Computer Consultants), (2008), INC. - WWW.CPCCCI.COM
Crabtree B. F., and Miller, W. L. (1999), “Using codes and code manuals: a template
organizing style of interpretation”, Doing Qualitative Research, London, Sage, 2nd
Edition, Newbury Park, California: Sage
Cranor Lorrie Faith & LaMacchia, Brain.A., (1998), “Spam!”, Journal of Communications
of the ACM, Vol. 41(8), (Aug. 1998),PP: 74-83
Creyer, E.H., and Ross, W.T., (1997), “The Influence of Firm Behavior on Purchase
Intention: Do Consumers Really Care About Business Ethics?” Journal of Consumer
Marketing, Vol. 14(6), (1997), PP: 421-432
Cristianini, N., & Taylor, J. S. (2003), “An Introduction to Support Vector Machines and
Other Kernel Based Learning Methods”, Cambridge University Press, Vol. 24(2),
(2003), PP: 105-106
Cronbach Lee Joseph (1990), “Essentials of Psychological Testing”, 5th Edition, New
York: Harper & Row
Crowe, E., & Higgins, T. (1997), “Regulatory Focus and Strategic Inclinations: Promotion
and Prevention in Decision-Making”, Organizational Behavior and Human
Decision Processes, Vol. 69 (2), (1997), PP: 117-132
Csikszentmihalyi, Mihaly (1977), “Beyond Boredom and Anxiety”, 2nd
printing. San
Francisco: Jossey-Bass.
Culnan Marry J. (1999), “Georgetown Internet Privacy Policy Study”, (August 1999),
Available at: http://neptune.gsb.georgetown.edu/culnan/gippshom.htm
Culnan, Mary J. (2000), “Protecting Privacy Online: Is Self-Regulation Working?”,
Journal of Public Policy and Marketing, Vol. 19(1), (2000), PP: 20-26
Culnan, Mary J., and Pamela K. Armstrong, (1999), “Information Privacy Concerns,
Procedural Fairness and Impersonal Trust: An Empirical Investigation”, Organization
Science, Vol. 10(1), (1999), PP: 104-115
viii
Cyr, Diane (2000), “Your New Customer”, Catalog Age, (July, 2000) PP: 125–132
Rowland D. and McDonald E. (2000), “Information Technology Law”, 2nd
Edition,
Cavendish Publishing, 2000
Dall’Olmo Riley Francesca, Scarpi Daniele & Manaresi Angelo (2005), “Drivers and
barriers to online shopping: An examination of product, consumer and retailers
factors”, In I. Clarke & T.B. Flaherty (Eds.) Advances in Electronic Marketing. USA:
Idea Group.
Dancey, C.P.andReidy, J. (2007), Statistics without maths for psychology, England,
Pearson Education Limited.
Dane Myer, “A Cure for Credit Card Fraud - Orbiscom shoots to end e-shoppers' security
concerns.(Company Business and Marketing)”, Ziff Davis Smart Business for the
New
David B. Meinert and Dane K. Peterson, (2006), “Would Regulation of Web Site Privacy
Policy Statements Increase Consumer Trust?”, Journal of Informing Science, Vol. 9,
(2006), PP: 123
Davis, F.D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of
information technology”, Journal of MIS Quarterly, Vol. 13(3), (1989), PP: 319-40
Davis, Judy (1997), “Property Rights to Consumer Information: A Proposed Policy
Framework for Direct Marketing”, Journal of Direct Marketing, Vol. 11 (summer),
PP: 32-43
Davis, Scott, Eitan Gerstner and Michael Hagerty (1995), “Money Back Guarantees in
Retailing: Matching Products to Consumer Tastes,” Journal of Retailing, Vol.
71(Spring), PP: 7-22
Dayal, S., Landesberg, H., Zeisser, M., (1999), “How to build trust online”, Journal of
Marketing Management, Vol. 8 (3), (1999), PP: 64–71
Deborah M. Markley and David L. Barkley, (2005), “Case Studies of E-commerce
activity in rural and small town businesses”, Cooperative State Research, Education
and Extension Service, U.S. Department of Agriculture
Deborah Platt Majoras, (2007), “Implementing the Children’s online privacy Protection
Act”, A Federal Trade Commission Report to Congress, (May 2007)
Deckmyn, D. (1999), “Critics say self-regulation effort may 'legitimize' Spam”,
Computerworld, Vol. 33(35), (1999), PP: 41-42
Deitel, H., Deitel, P., and Neito, T. (2001), “E-Business and E-Commerce (How To
Program)”, Prentice Hall, 4th Edition, New Jersey
ix
Delafrooz N, Paim LH, Haron SA, Sidin SM, Khatibi A (2009), “Factors affecting
students’ attitude toward online shopping”, African Journal of Business
Management, Vol. 3(5), (2009), PP: 200-209
Dellaert, Benedict G.C. and Barbara E. Kahn (1999), “How Tolerable is Delay: consumers’
Evaluations of Internet Web Sites after Waiting,” Journal of Interactive Marketing,
Vol. 13(1), (winter 1999), PP: 41-54
Derbaix, C. (1983), “Perceived Risk and Risk Relievers: An Empirical Investigation”,
Journal of Economic Psychology, Vol. 3, (1983), PP: 19–38
Derlega, Valerian J., and Alan L. Chaikin (1975), “Sharing intimacy”, Prentice-Hall
Devaraj, S., Fan, M., Kohli, R. (2003), “E-loyalty: Elusive ideal or competitive edge?”,
Journal of Communications of the ACM, Vol. 46(9), (2003), PP: 184-191
Dhillon, Gurpreet S., and Trevort T. Moores (2001), “Internet Privacy: Interpreting Key
Issues”, Information Resources Management Journal, Vol.14 (4), (2001), PP: 33-37
Dhinaharan Nagamalai, Cynthia Dhinakaran, and Jae Kwang Lee (2007), “Multi layer
approach to defend DDoS attacks caused by spam”, Proceeding of International
Conference on Multimedia and Ubiquitous Engineering, PP: 97-102
Dibb, S., Simkin, S., Pride, W. and Ferrel, O. (2001), “Marketing. Concepts and strategies”,
Forth European Edition, New York: Houghton Mifflin
Dillon, T. D., and Reif, H. L., (2004), “Factors influencing consumer’s e-commerce
commodity purchases”, Journal of Information Technology, Vol. 22(2), (2004), PP:
1-12
Dittmar, H., Long, K. and Meek, R. (2004), “Buying on the internet: gender difference in on-
line and conventional buying motivations’, Sex Roles, Vol. 50(5), PP: 423–444
Dobie, K., Grant, J. and Ready, K. (2001), “Product motivation and purchasing activity: an
explanatory study of consumers: Internet purchasing activity”, Journal of Promotion
Management, Vol. 6(1/2), PP. 31-43
Dommeyer, Curt J. and Barbara L. Gross (2003), “What Consumers Know and What
They Do: An Investigation of Consumer Knowledge, Awareness, and Use of Privacy
Protection Strategies”, Journal of Interactive Marketing, Vol. 17 (2), (2003), PP: 34-
51
Doney, P. M. and Cannon, J. P., (1997), “An Examination of the Nature of Trust in
Buyer-Seller Relationships”, Journal of Marketing, Vol. 61, (April 1997), PP: 35-51
Donna L. Hoffman, Thomas P. Novak, and Marcos Peralta, (1999), “Building Con Trust
Online”, Journal of Communication of the ACM, Vol. 42(4), (April 1999)
x
Doolin B., Dillon S., Thompson F. and J. L. Corner, (2005), “Perceived Risk, the Internet
Shopping Experience and Online Purchasing Behaviour: A New Zealand
Perspective”, Journal of Global Information Management, Vol. 13(2), (2005), PP:
66-88
Dora Brown, Gerard Oleksik and Dinah Bisdee, (2007), “Consumer attitudes review”,
Report Prepared for the Office of Fair Trading
Douglas, Ching Shan HUI (2001), “Key Aspects on Consumer Behaviour of Hong Kong
Internet Shopper”, Social Science Research Network Electronic Paper Collection,
(Oct. 2001), Available at SSRN: http://ssrn.com/abstract=287917 or
http://dx.doi.org/10.2139/ssrn.287917
DPA (Data protection report), (2000), “Personal information online code of practice”
Ducoffe, R.H. (1996), “Advertising value and advertising on the web”, Journal of
Advertising Research, Vol. 36, (September/October 1996), PP: 21–36
E-commerce Survey Project (2000), Reverse Logistics Executive Council & University of
Nevada, Reno, February 2000.
Efrim Boritz and Won Gyun, (2002), “Internet Privacy: Framework, Review and
Opportunities for Future Research”, Proceedings of 41st Annual Hawaii
International Conference on System Sciences
Efrim Boritz, Sundar Raj, (2006), “Internet Privacy Research: Framework, Review and
Opportunities”, Advances in experimental social psychology, Vol. 20, (June 2006),
PP: 1-63
Egger A. (2006), “Intangibility and perceived risk in online environments”, paper presented
at the Academy of Marketing, University of Middlesex, London, (July 2006)
Eighmey, J., (1997), “Profiling user responses to commercial Web sites”, Journal of
Advertising Research, Vol. 37(3), (1997), PP : 59-66
Elliot, S. and Fowell, S. (2000), “Expectations versus reality: A snapshot of consumer
experiences with Internet retailing”, International Journal of Information
Management, Vol. 20(5), (2000), PP: 323-336
Engstrom U, Sandred J. (1999), Etik och moral -en kompass i cyberrymder, Argument
Forlag AB, Uppsala
Enrico Blanzieri and Anton Bryl, (2007), “A Survey of Learning-Based Techniques of
Email Spam Filtering”, Information Engineering and computer science department,
University of Trento
xi
Ernst and Young (1999), “The second annual Ernst and Young Internet shopping study”,
Assessed August 10, 2007 from http://www.e-
consultancy.com/knowledge/whitepapers/9/the/second-annual-Internet-shopping-
study.html.
European Commission, (2012), “Bringing e-commerce benefits to consumers”,
Commission Staff working document
Evangelos Moustakas, C. Ranganathan and Penny Duquenoy (1997), “Unsolicited
Commercial Email (Spam): An Exploratory understanding using stakeholder
analysis”
Evangelos Moustakas, C. Ranganathan, and Penny Duquenoy (2005), “Combating spam
through legislation: A comparative analysis of us and European approaches”,
Proceedings of Second Conference on Email and Anti- Spam, CEAS-2005
Ewald A. Kaluscha and Sonja Grabner-Krauter, (1996), “Towards A pattern language for
consumer trust in electronic commerce”, Eighth European Conference on Pattern
Languages of Programs (EuroPLop'03), 25-29 June 2003, Irsee, Germany
Eytan Adar and Bernardo Huberman (2001), “A Market for Secrets,” First Monday 6(8),
August 6, 2001. http://www.firstmonday.org/issues/issue6 8/adar/
Fabio Ancarani and Venkatesh Shankar, (2002), “Price Levels and Price Dispersion: A
Comparison of Pure Play v/s Bricks-and-Mortar v/s Bricks-and-Clicks Retailers”, E-
business Research Center Working Paper, Assessed (July 2007) On-line, Available:
http://www.ebrc.psu.edu/publications/researchpapers.html.
Faisal Al-Madi, Abdelghafour Al-Zawahreh, Suha Al-Qawasmi, (2005), “Determinants of
Consumer's Attitudes to Electronic Marketing in Jordan”, International Journal of
Management, Vol. 30(2), (2005), PP: 536-545
Farahat, A. and Bailey, M. (2012), “How effective is targeted advertising?”, Proceedings of
the 21st international conference on World Wide Web”, PP: 111-120
Farookh Khadeer Hussain, Elizabeth Chang and Tharam Dillon, (1998), “Factors of trust that
influence trustworthiness in Peer-to-Peer based E-commerce”, Proceeding of
international workshop of Business and information, Taipei, Taiwan
Fatimah, M.A. (2000), “Prioritizing research agenda for e-commerce in Malaysia”,
Proceedings of International Conference on Electronic Commerce, Emerging
Trends in E-Commerce, Kuala Lumpur, Malaysia, (Nov. 2000), Multi Media
University
xii
FBI Internet Fraud Complaint Center (2001), “Internet Fraud Watch of the National
Consumer League (NCL)”, NCL’s On-line shopping survey, (Aug 2001)
Federal Trade Commission (1998), “Privacy Online: A Report to Congress”, Accessed
June 2011, Available at: http://www.ftc. gov/reports/privacy3/priv23a.pdf
Federal Trade Commission (2005), “The UD safe web Act, protecting consumers from
Spam, spyware and fraud”, A legislative recommendation to congress, June 2005,
www.ftc.gov.
Federal Trade Commission, (1998), “Privacy Online”, Report to Congress, June 1998, PP: 24
First Data report (FDR), (2008), “Consumer Online Shopping Fears”
Fisher Dennis (2005), “Phishing is big business”, eWeek, (7 March 2005), Available at:
www.eweek.com/print_article2/0,2533,a ¼ 147067,00.asp
Forrester Research (2000a), “Young consumers ignore offline brands’’, Available at:
www.forrester.com
Forsythe, S.M. and Shi, B. (2003), “Consumer patronage and risk perceptions in internet
shopping”, Journal of Business Research, Vol. 56(11), (2003), PP: 867-875
Fox, S. (2000), “Trust and privacy online: Why Americans want to rewrite the rules”,
Pew Internet & American Life Project, Assessed September, 2009, from
http://www.pewinternet.org
Foxman, Ellen R. and Paula Kilcoyne (1993), “Information Technology, Marketing
Practice, and Consumer Privacy: Ethical Issues”, Journal of Public Policy and
Marketing, Vol. 12 (Spring), (1993), PP: 106-19
France Belanger, Janine S. Hiller and Wanda J. Smith, (2002), “Trustworthiness in
electronic commerce: the role of privacy, security, and site attributes”, Journal of
Strategic Information Systems, Vol. 11, (2002), PP: 245–270
Freeman, L. A. and Urbaczewski, A. (2005), “Why do people hate Spyware?”, Journal of
Communications of the ACM, Vol. 48(8), (2005), PP: 5053
FTC (2000), online profiling: A report to congress, July 2000, Federal Trade Commission
FTC (2008), “Minimizing the Effects of Malware on computer”
Ganesan S. (1994), “Determinants of long-term orientation in buyer-seller relationships”,
Journal of Marketing, Vol. 58, (1994), PP: 1-19
Gary S. Robertshaw and Norman E. Marr, (1998), “Voluntary Disclosures of Personal
Information for Direct Marketing Purposes: A Quantitative and Qualitative
Comparison of Differences between Contributors and Abstainers”, Journal of Direct,
Data and Digital Marketing Practice, Vol. 5(34), (1998)
xiii
Gefen D. and Straub D. W., (2000), “The relative importance of perceived ease-of-use in IS
acceptance: A study of e-commerce acceptance”, Journal of Association for
Information Systems, Vol. 1(8), (2000), PP: 1-30
Gefen, D. (2000), “E-commerce: The role of familiarity and trust”, OMEGA, The
International Journal of Management Science, Vol. 28(6), (2000), PP: 725-737
Gefen, D., Karahanna, E., and Straub, D. W., (2003), “Trust and TAM in Online Shopping:
an Integrated Model”, Journal of Management Information Systems Quarterly,
Vol. 27(1), (2003), PP: 51-90
Gefen, E. Karahanna, and D. W. Straub, (2003), “Inexperience and Experience With
Online Stores: The Importance of TAM and Trust”, IEEE Transactions On
Engineering Management, Vol. 50, (2003), PP: 307-321
George R. Milne and Andrew J. Rohm, (2000), “Consumer Privacy and Name Removal
Across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives”,
Journal of Public Policy & Marketing, Vol. 19(2), (Fall 2000), PP: 238-249
George R. Milne, (2000), “Privacy and Ethical Issues in Database/Interactive Marketing and
Public Policy: Research Framework and Overview of the Special Issue”, Journal of
Public Policy & Marketing, Vol. 19(1), (Spring 2000), PP: 1-6
Gerbing, D. W. and Anderson, J. C. (1988), “An updated paradigm for scale development
incorporating unidimensionality and its assessment”, Journal of Marketing
Research, Vol. 25(2), (1988), PP: 186-192
Gervey. B and J. Lin (2000), “Obstacles on the Internet: a new Advertising Age survey
finds privacy and security concerns are blocking the growth of e-commerce,” Journal
of Public Policy & Marketing, Vol. 19(3), PP: 12-26.
Ghose, S. and Dou, W. (1998), “Interactive functions and their impacts on the appeal of
Internet presence sites”, Journal of Advertising Research, Vol. 38(2), (1998), PP: 29-
43
Gina Stevens, (2010), “Federal Information Security and Data Breach Notification
Laws”, Congressional Research Service Report for Congress
Glass, A.D., (1998), “Acountdown to the age of secure electronic commerce”, Credit
World, Vol. 86(5), (1998), PP: 29–31
Godwin J. Udo, (2001), “Privacy and security concerns as major barriers for e-commerce:
a survey study”, Journal of Information Management and Computer Security, Vol.
9(4), (2001), PP: 165-174
xiv
Goodwin, Cathy (1991), “Privacy: Recognition of a Consumer Right”, Journal of Public
Policy and Marketing, Vol. 10, (Spring 1991), PP: 149-66
Govani, T., and Pashley, H., (2009), “Student Awareness of the Privacy Implications
while Using Facebook” Assessed Nov. 2009 from
http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf, 2009
Gralla, Preston (2007), “How to Surf Anonymously without a Trace,” Computerworld,
(March 2007), Accessed March 24, 2009 from http://www.computerworld.com
Green, H., Yang, C., Judge, P.C., (1998), “A little privacy, please”, Business Week, 3569,
PP: 98–99
Grimes, G. (2004), “Issues with Spam”, Computer Fraud & Security, Vol. 5, (2004), PP: 12-
16
Gohary (2010), “Understanding Credit Card Frauds”, Journal of Cards Business Review,
Vol. 15(2), 2004, PP: 16-27
Grossbart, S. and Kennedy, P. (1995), “Interactive media and retail patronage”, W.R. (Ed.),
The Cutting Edge
Guangying Hua, (2009), “An Experimental Investigation of Online Banking Adoption in
China”, Journal of Internet Banking and Commerce, Vol. 14(1), (April 2009)
Gurvinder S Shergill and Zhaobin Chen, (2005), “Web based shopping: Consumer’s
attitudes towards online shopping in New Zealand”, Journal of Electronic
Commerce Research, Vol. 6(2)
GVU (Graphic, Visualization and Usability Centre), (1998), “The GVU's Ninth WWW
User Survey Report” Graphic, Visualization and Usability Center, Georgia Tech
Research Corporation, 1998.
Ha, Vicki, Farah Al Shaar, Kori Inkpen, and Lina Hdeib (2006), “An Examination of
User Perception and Misconception of Internet Cookies,” in CHI 2006 Extended
Abstracts on Human Factors in Computing Systems. Montreal: Association for
computer Machinery Digital Library, 833–38.
Haines, M. (2001), “E-marketing efforts of IT solution providers: what can be expected in
the next 12 months”, Var Business, Vol. 17(14), (2001), PP: 68
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E. and Tatham, R. L. (2009),
“Multivariate Data Analysis”, 7th Edition, Upper Saddle River, Pearson Education,
Inc. Delhi
Hair, J. F., Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998), “Multivariate
Data Analysis” 5th Edition, California: Prentice-Hall International Inc, 1998
xv
Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C., (1995), “Multivariate Data
Analysis”, 4th Edition, New Jersey:Prentice Hall, 1995
Hamed Armesh, Habibollah Salarzehi, Noor Mohammad Yaghoobi, Alireza heydari and
Davoud Nikbin, (2010), “The Effects of Security and Privacy Information on Trust
and Trustworthiness and Loyalty in Online Marketing in Malaysia”, International
Journal of Marketing Studies, Vol. 2(2), (November 2010)
Harris Interactive, Why some companies are trusted and others are not: personal experience
and knowledge of company more important than glitz, June 2001b, Retrieved on June
2009: http://www.harrisinteractive.com/harris_poll/index.asp?PID ¼ 237.
Harris Poll. (2000), “Online Privacy: A Growing Threat”, Business Week, (March 20,
2000), PP: 96
Harry, B., (1992), “Cultural Diversity, Families, and the Special Education System”,
Teachers College Press, New York, NY, 1992
Hassan, T., Cole, P., & Fung C.C. (2006), “An Intelligent SPAM Filter – GetEmail5”,
Proceedings of the 2nd IEEE International Conference on Cybernetics and
Intelligent Systems (CIS2006), Bangkok Thailand, 7-9 June, PP: 86-90
Hassanein, K. and Head, M., (2007), “Manipulating perceived social presence through the
web interface and its impact on attitude towards online shopping,” Human-Computer
Studies, Vol. 65, (2007), PP: 689-708
Haubl Gerald and Trifts Valerie (2000), “Consumer decision making in online shopping
environments: The effects of interactive decision aids”, Journal of Marketing
Science, Vol. 19(1), (Winter 2000), PP: 4-21
Hauser, J. and Wernerfelt, B. (1990), “An evaluation cost model of consideration sets”,
Journal of Consumer Research, Vol. 16(4), PP: 393-408
Heijden H., T. Verhagen and M. Creemers, (2001), “Predicting online purchase behaviour:
Replications and tests of competing models”, Proceedings of the 34th Hawaii
International Conference on Systems Sciences
Hess, D. J., Chu, W., and Gerstner, E. (1996), “Controlling Product Returns in Direct
Marketing,” Marketing Letters, Vol. 7(4), (1996), PP: 307-317
Higgins, A. (2003), “Anti-Spam Anti- Spam Anti- Spam”, IBM Corporation, White
Plains, NY.
Ho, C. F. & Wu, W. H. (1999), “Antecedents of Customer Satisfaction on the Internet: An
Empirical Study of Online Shopping”, Proceedings of the 32nd Hawaii
International Conference on System Sciences, Hawaii, USA
xvi
Hoa Nguyen, Ariel Fuxman, Stelios Paparizos, Juliana Freire and Rakesh Agrawal,
(2011), “Synthesizing Products for Online Catalogs”, August 29th - September 3rd
2011, Seattle, Washington, Proceedings of the VLDB Endowment, Vol. 4(7), PP:
409-418
Hochhauser, M. (2003), “Why Patients Won’t Understand Their HIPAA Notices”,
Privacy Rights Clearinghouse, website: http://www.privacyrights.org/ar/HIPAA-
Readability.htm.
Hoffman, Donna L. and Thomas P. Novak (1996a), “Marketing in Hypermedia Computer-
Mediated Environments: Conceptual Foundations,” Journal of Marketing,
Vol. 60 (July 1996), PP: 50-68.
Hoffman, Donna L., Novak, Thomas P., & Chatterjee, P. (1995), “Commercial Scenarios for
the Web: Opportunities and Challenges”, Journal of Computer-Mediated
Communication, Vol. 1(3). Available at: http://www.shum.cc.huji.ac.il/jcmc/vol1/
issue3/vol1no3.html.dec1995
Hoyer, wayne D (1984), “An examination of consumer decision making for common
repeat purchase product”, Journal of consumer research, Vol.11, PP: 822-29
Hui, K.-L., Teo, H. H., and Lee, S.-Y. T., (2007), “The Value of Privacy Assurance: An
Exploratory Field Experiment”, Journal of MIS Quarterly, Vol. 31(1), 2007, PP: 19-
33
Human Capital (2009), “Youth and Music Survey”, Available online at:
http://www.marrakeshrecords.com/Youth%20and%20Music%20Survey%202009%20
(c)%20Marrakesh%20Records%20Ltd.pdf (accessed 23.03.09)
Internet & Mobile Association of India report, (2008), “Online Banner Advertisement
Market in India”, A Report by the E-Technology Group for Internet and Mobile
Association of India
Iyer, G.R., Miyazaki, A.D., Grewal, D., & Giordano, M. (2002), “Linking Web-Based
Segmentation to Pricing Tactics”, Journal of Product and Brand Management, Vol.
11, PP: 288–302
Jacobs, P., (1997), “Privacy: what you need to know”, Information World, Vol.: 19(44),
(1997), PP: 111–112
Jacqueline D. (2010), “Lipton, Mapping Online Privacy”, 140 N.W. U. L Rev. 477, 481-82
(2010)
Jacques Nantel and William A. Weeks (1996), “Marketing ethics: is there more to it than the
utilitarian approach?”, European Journal of Marketing, Vol. 30(5), (1996), PP: 9-19
xvii
Janice Y. Tsai, Serge Egelman, Lorrie Cranor and Alessandro Acquisti, (2011), “The
Effect of Online Privacy Information on Purchasing Behavior: An Experimental
Study”, Journal of Information Systems Research, Vol. 22(2), (June 2011), PP:
254–268
Jarvenpaa, S. and Todd P. A. (1997), “Consumer reactions to electronic shopping on the
World Wide Web”, International Journal of Electronic Commerce, Vol. 1(2), 1996–
1997, PP: 59–88
Jarvenpaa, S. L. (1996-1997), “Consumer reactions to electronic shopping on the World
Wide Web”, International Journal of Electronic Commerce, Vol. 1(2), PP: 59-88
Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000), “Consumer trust in an Internet
store”, Journal of Information Technology and Management, Vol. 1, (2000), PP:
45-71
Jarvenpaa, S.L., Tractinsky, N., Saarinen L., and Vitale, M. (1999), “Consumer trust in an
Internet store: a cross-cultural validation”, Journal of Computer Mediated
Communication, Vol. 15(2), PP: 1-37
Jason Chan, Zhenhui Jiang, and Bernard Tan, (2009), “Understanding Online
Interruption-Based Advertising: Impacts of Exposure Timing, Advertising Intent and
Brand Image”, Journal of IEEE Transactions on Engineering Management, Vol.
57(3), (August 2010), PP: 365-379
Javis, S. (2000), “Companies tell all about consumer privacy”, Marketing News,
Vol.:34,(December 4 2000), PP: 3
Jedd, M. (2000), “Returns happen”, Journal of Inbound Logistics, (February 2000), PP: 22-
30
Jensen, C. and Potts, C. (2004), “Privacy policies as decision-making tools: an evaluation
of online privacy notices”, Proceedings of the SIGCHI conference on Human
Factors in Computing Systems, PP: 471-478
Jensen, Carlos, Colin Potts, and Christian Jensen (2005), “Privacy Practices of Internet
Users: Self-Reports Versus Observed Behavior,” International Journal of Human-
Computer Studies, Vol. 63 (July 2005), PP: 203–227
John B. Horrigan, (2008), “Internet users like the convenience but worry about the
security of their financial information” Pew Internet and American life Project,
Available at: http://www.pewinternet.org/
xviii
Jonna Jarvelainen (2007), “Online Purchase Intentions: An Empirical Testing of a
Multiple-Theory Model”, Journal of organizational computing and electronic
commerce, Vol. 17(1), (2007), PP: 53–74
Joppe, M. (2000), “The Research Process”, Retrieved February 25, 2009, (Online)
Available:http://www.htm.uoguelph.ca/pagefiles/MJResearch/ResearchProcess/home.
html
Jun, M., Yang, Z. & Kim, D.S. (2004), “Customers’ perceptions of online retailing
service quality and their satisfaction”, International Journal of Quality & Reliability
Management, Vol. 21(8), (2004), PP: 817-840
Jupiter Communications (2000), “Creating Loyalty: Building Profitable Relationships”,
Jupiter Vision Report: Digital Commerce, Vol. 2
Jupitor Communication (2000), “E-Mail Marketing Delivering the Message” Available at:
http/cybertias.internet.com/markets/advertising/article/0,1323,5941,356791.
Kaiser, H. (1974), “An index of factorial simplicity”, Journal of Psychometrika, Vol. 39,
(1974), PP: 31-36
Kang, J. (1998), “Information Privacy in Cyberspace Transactions”, Stanford Law
Review, Vol. 50, (1998), PP: 1193-1294
Kathleen Ann Ruane (2008), “Selected Laws Governing the Disclosure of Customer
Phone Records by Telecommunications Carriers”, Congressional Research Service
report for congress
Keen, P.G.W. (1999), “Electronic Commerce Relationships: Trust by Design”, Englewood
Cliffs, NJ: Prentice-Hall, 1999
Keeney, R.L., (1999), “The value of Internet commerce to the customer,” Journal of
Management Science, Vol. 45(4), (1999), PP: 533-542
Kerlinger, F. N. (1973), “Foundation of Bahaviour Research”, Holt, Rienhaet and Winston,
Inc., New York, NY
Kidwel B., and Jewel R., (2003), “An examination of perceived behavioral control:
internal and external influences on intention”, Journal of Psychology and Marketing,
Vol. 20(7), (2003), PP: 625-640
Kim, D.J., Ferrin, D.L. and Rao, H.R., (2009), “Trust and satisfaction, the two wheels for
successful e-commerce relationships: a longitudinal exploration,” Journal of
Information Systems Research, Vol. 20(2), (2009), PP: 237-257
xix
Kinnard, Shannon (2000), “Marketing With E-mail. A Spam-Free Guide to Increasing
Sales, Building Loyalty, and Increasing Awareness”, Second Edition. Gulf Breeze:
Maximum Press.
Kleinmuntz, Don N., David A. Schkade (1993), “Information displays and decision
processes”, Journal of Psychological Science, Vol. 4(4), (July 1993), PP: 221-227
Kobsa A. (2004), “Clear Privacy Practices Boost Online Sales”, Assessed November 22,
2009 from http://www.truste.org/articles/kobsa~oct.php
Kosiur Dave (1997), “Understanding Electronic Commerce”, Microsoft Press.
Kossecki Pawel, Swierczynska-Kaczor Urzula (2003), “No Trust, No Transaction-The
Implication for Te Internet Suppliers”, Information Security Solution European
Conference, The European contribution, Speech/00/344.
Kotler Philip (2003), “Marketing Management”, 11th
Edition, Upper saddle River, NJ:
Prentice Hall
Kotler Philip (2004), “Principles of marketing”, European Fourth Edition, Prentice Hall
Krishnamurthy Sandeep (2000), “Spam Revisited”, Journal of Computer world, Vol.
32(18), (2000), PP: 33-34
Krishnamurthy Sandeep (2000), “Spam revisited”, Quarterly Journal of Electronic
Commerce, Vol. 1(4), (2000), PP: 305-321
Kunkel, D., & Wilcox, B. (2001), “Children and media policy” In D. G. Singer and J. L.
Singer (Eds.), Handbook of children and the media, Thousand Oaks, CA: Sage, PP:
589-604
Kuo Y. F., (2003), “A study on service quality of virtual community websites”, Total
Quality Management, Vol. 14(4), (2003), PP: 461-473
Kuo, W.H. and L. Nan, (1977), “Assimilation of Chinese-Americans in Washington”, The
Sociological Quarterly, Vol. 18, (Summer 1977), PP: 340-352
L. Ha, (1996), “Observations: Advertising Clutter in Consumer Magazines: Dimensions and
Effects”, Journal of Advertising Research, Vol. 36, (1996), PP: 76-84
L.R. Vijayasarathy and J.M. Jones. (2000), “Print and Internet catalog shopping: Assessing
attitudes and intentions”, Journal of Internet Research, Vol. 10(3), (Summer 2000),
PP: 191-202
La Rose, Robert and Nora J. Rifon. (2007), “Promoting i-Safety: Effects of Privacy
Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior”,
Journal of Consumer Affairs, Vol. 41(1), (2007), PP: 127-149
Langford D. (2000), “The Internet Ethics”, Macmillan Press Ltd London
xx
Lardner, J. (1999), “I know what you did last summer and fall’’, US News and World
Report, Vol. 126(15), (1999), PP: 55
Lavin Marilyn (2006), “Cookies: What do consumers know and what can they learn?”,
Journal of Targeting, Measurement and Analysis for Marketing, Vol. 14(4), (2006),
PP: 279–288
Lee, Charles M. C. (1992), “Earnings News and Small Traders: An Intraday Analysis,”
Journal of Accounting and Economics, Vol. 15, (1992), PP: 265 - 302
Lewis Michael (2005), “The Effect of Shipping Fees on Purchase Quantity, Customer
Acquisition and Store Traffic,” Working Paper, University of Florida
Li Guo (2011), “A Research on Influencing Factors of Consumer Purchasing Behaviors in
Cyberspace”, International Journal of Marketing Studies, Vol. 3(3), August 2011
Li, H., Kuo, C., and Russell, M. G. (1999), “The impact of perceived channel utilities,
shopping orientations, and demographics on the consumers online buying behavior”,
Journal of Computer-Mediated Communication, Vol. 5(2), (1999), PP: 1-20
Liao, Z. and Cheung, M. T. (2001), “Internet based E-shopping and Consumer Attitudes: An
Empirical Study,” Journal of Information and Management, Vol.38, (2001), PP:
299-306.
Lim, N. (2003), “Consumer’s perceived risk: sources versus consequences”, Electronic
Commerce Research and Applications, Vol. 2(3), (2003), PP: 216-228
Linn A (2004), “Bugged by Spies” Imports Clag Computers USA Today (November 01)
Linn, John (2005), “Technology and Web User Data Privacy,” Journal of IEEE Security
and Privacy, Vol. 3 (January–February 2005), PP: 52–58
Liu C., Arnett K. P., (2000), “Exploring the factors associated with Web site success in the
context of electronic commerce”, Journal of Information and Management, Vol. 38,
(2000), PP: 23–33
Liu, C., Marchewka, J. T., and Ku, C. (2004), “American and Taiwanese perceptions
concerning privacy, trust, and behavioral intentions in electronic commerce”,
Journal of Global Information Management, Vol. 12(1), (2004), PP:18-40
Liu, C., Marchewka, J. T., Lu, J., and Yu, C-S., (2005), “Beyond concern—a privacy-
trust-behavioral intention model of electronic commerce”, Journal of Information
and Management, Vol. (42), (2005), PP: 289-304
Livingstone Sonia and Bober Magdalena (2005), “UK children go online: Final report of key
project findings”, London: London School of Economics and Political Science
xxi
Lohse, G. L., and Spiller, P., (1998), “Electronic Shopping: Quantifying the Effect of
Customer Interfaces on Traffic and Sales”, Journal of Communications of the ACM,
Vol. 41(7), (1998)
Lorek, L. A. (2003), “Buyers catch on to online shopping”, San Antonio Express-News,
(Online), (Assessed Dec. 22, 2008), http://web.lexisnexis. com/universe/document
Louviere J. and G. Gaeth (1987), “Decomposing the determinants of retail facility choice
using the method of hierarchical information integration: A supermarket illustration”,
Journal of Retailing, Vol. 63, (1987), PP: 25-48
Lucian Vasiu, Matt Warren and David Mackay, (2002), Personal information Privacy
Issues in B2C E-commerce: A Theoretical Framework”, Available at:
http://www.collecter.org/archives/2002_December/16.pdf
M Jaeger and N L. Clarke (2006), “The Awareness and Perception of Spyware amongst
Home PC Computer Users”, published in the Proceedings of 7th Australian
Information Warfare and Security Conference, Edith Cowan University, Perth
Western Australia, 4th - 5th December, 2006
M. Jose Garrido Samaniego, Ana M. Gutierrez Arranz and Rebeca San Jose Cabezudo,
(2006), “Determinants of internet use in the purchasing process”, Journal of Business
and Industrial Marketing, Vol. 21(3), (2006), PP. 164–174
M. Porter, (2000), “Buyers want Web Privacy”, Purchasing, Vol. 129, (Sep. 2000), PP: 22-25
Mackline Ben (1999), “E-Commerce at what price: Privacy protection in the Information
Economy”, Berkeley Technology Law Journal, Vol. 20, (March 1999), PP: 14-28
Maes (1999), “Smart Commerce: The Future of Intelligent Agents in Cyberspace”,
Journal of Interactive Marketing, Vol. 13(3), (1999), PP: 66-76
Magee, M. (2003), “Boom or bust for e-shopping”, The Sunday Tribune, (Online),
Assessed December 22, 2008, http://web.lexisnexis.com/universe/document
Maignan, I., and Lukas, B.A. (1997), “The Nature and Social Uses of the Internet: A
Qualitative Investigation”, Journal of Consumer Affairs, Vol. 31(2), (1997), PP:
346–371
Mainardi, J. (1998), “Electric Marketing is wired to sales growth”, Life Association News
(LAN), Vol. 93(4), (1998), PP: 108-109
Malhotra, B. A. (2005), “Electronic retailing”, In M. Krafft & M. K. Mantrala (Ed.),
Retailing in the 21st Century Current and Future Trends (PP: 309–323), Berlin,
Germany: Springer
xxii
Mannix, M. (1999), “Watch for Web hazards and you’ll shop hitch free”, U.S. News and
World report, Vol. 13, (1999), PP: 76
Mariko Morimoto and Susan Chang,(2006), “Consumers’ attitudes toward unsolicited
commercial e-mail and postal direct mail marketing methods: intrusiveness, perceived
loss of control, and irritation”, The Journal of Interactive Advertising, Vol. 7(1),
(2006)
Martin, B. A. S., (2003), “Email Advertising: Exploratory Insights from Finland”,
Journal of Advertising Research, Vol. (43)3, (2003), PP: 293-300
Martin, David, Hailin Wu, and Adil Alsaid (2003), “Hidden Surveillance by Web Sites:
Web Bugs in Contemporary Use,” Journal of Communications of the ACM, Vol. 46,
(Dec. 2003), PP: 258–264
Mathias Klang (2004), “Spyware – the ethics of covert software”, Journal of Ethics and
Information Technology, Vol. 6, (2004), PP: 193–202
Mayer and Viktor (1996), “Improving Computer Security on the Internet through Novel
Legal Venues - Cookies for a Treat”? Proceedings of European Institute for
Computer Anti-Virus Research, (1996), PP: 155-162
McCandlish, Stanton (2009), “EFF’s Top 12 Ways to Protect Your Online Privacy”,
Electronic Frontier Foundation, (10 April 2001), Assessed: December 2009,
http://www.eff.org/Privacy/ eff_privacy_top_12.html
McCloskey, D. W. and Whiteley, D. (2002), “Electronic Commerce Acceptance: A Study
Comparing the United States and the United Kingdom”, Strategies for ecommerce
success, Hersey, PA, USA, Idea Publishing, (2002), PP: 185-195
McCole, P. and Palmer, A. (2001), “A critical evaluation of the role of trust in direct
marketing over the internet”, Paper presented at the World Marketing Congress,
University of Cardiff, Wales, (2001)
McDonald Aleecia and Cranor Lorrie Faith (2009), “The Cost of Reading Privacy
Policies”, Journal of Law and Policy for the Information Society, Available at:
http://www.is-journal.org/
McDonald, M. and Wilson, H. (1999), “E-Marketing: Improving Marketing Effectiveness
in a Digital World”, Financial Times Management, Pearson Education, Harlow, UK
McKinney, V., K. Yoon, F. Zahedi (2002), “The Measurement of Web-Customer
Satisfaction: An Expectation and Disconfirmation Approach”, Journal of
Information Systems Research, Vol. 13(3), (2002), PP: 296-315
xxiii
Meade, Joe. (2003), “Spam – The death of E-mail?” Proceedings of EEMA conference,
Dublin
Mehta, R. and E. Sivadas (1995), “Comparing Response Rates and Response Content in
Mail Versus Electronic Mail Surveys”, Journal of the Market Research Society, Vol.
(37)4, (1995), PP: 429-439
Mehta, R. and Sivadas, E. (1995), “Direct marketing on the Internet: an empirical assessment
of consumer attitudes”, Journal of Direct Marketing, Vol. 9, (1995), PP: 21-32
Michael Henderson, Melissa de Zwart, David Lindsay and Michael Phillips, (2011),
“Student’s use of social networking tools: Legal risks and other implications”,
ACEC2010, Digital Diversity: proceedings of the Australian Computers in
Education Conference 6-9 April 2010
Micu, C. C., and Chowdhury, T. G. (2010), “The Effect of Message's Regulatory Focus and
Product Type on Persuasion”, Journal of Marketing Theory and Practice, Vol.
18(2), (2010), PP: 181-190
Mikko Siponen and Carl Stucke (2006), “Elective anti-spam strategies in companies: An
international study”, In Proceedings of HICSS 2006, Vol. 6, (2006)
Millett, Lynette I., Batya Friedman, and Edward Felten (2001), “Cookies and Web
Browser Design: Toward Realizing Informed Consent Online,” Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, New York:
Association for Computer Machinery, PP: 46–52, (2001)
Milne , Shalini Bahl, and Andrew Rohm (2008), “Toward a Framework for Assessing
Covert Marketing Practices,” Journal of Public Policy and Marketing, Vol. 27
(Spring 2008), PP: 57–62
Milne, George R., Mary J. Culnan, and Henry Greene (2006), “A Longitudinal
Assessment of Online Privacy Notice Readability”, Journal of Public Policy and
Marketing, Vol. 25(2), (2006), PP: 238-249
Miyazaki, A.D., Fernandez, A., (2000), “Internet privacy and security: an examination of
online retailer disclosures”, Journal of Public Policy and Marketing, Vol. 19(1),
(2000), PP: 54–61
Miyazako A.D., and Fernandez A., (2001), “Consumer perceptions of privacy and
security risks for online shopping”, The Journal of Consumer Affairs, Vol. 35(1),
(2001), PP: 27-44
xxiv
Mohamed Khalifa and Vanessa Liu (2007), “Online consumer retention: contingent
effects of online shopping habit and online shopping experience”, European Journal
of Information Systems, Vol. 16, (2007), PP: 780–792
Mohsen Attaran (1999), “Internet-based business opportunities: buyers beware of scams”,
Journal of Information Management and Computer Security, Vol. 7(4), (1999), PP:
176-177
Mohsen Attaran and Ilja VanLaar (1999), “Privacy and security on the Internet: how to
secure your personal information and company data”, Journal of Information
Management and Computer Security, Vol. 7(5), (1999), PP: 241-246
Moschis, G. P., (1987), “Consumer Socialization: A Life-Cycle Perspective”, Publisher:
Lexington Books, Lexington, MA, (1987)
Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy (2006), “A crawler-based study of
spyware on the web”, Proceedings of the Network and Distributed System Security
Symposium, NDSS 2006, San Diego, California, USA, (2006)
Munusamy, J., and Wong, C. H. (2007), “Attitude towards advertising among students at
private higher learning institutions in Selangor”, UnisTAR E-Journal, Vol.3, (2007),
PP: 31-51
Murphy Patrick E., (2005), “Consumer Online Privacy: Legal and Ethical Issues”,
Journal of Public Policy & Marketing, Vol. 19 (1), (2000), PP: 7-19
Naiyi Ye, (2004), “Dimensions of consumer’s perceived risk in online shopping”, Journal of
Electronic Science and Technology of China, vol. 2(3), (2004), PP: 177-182
NCSA (2005), “AOL/National Cyber Security Alliance (NCSA) online safety study”,
National Cyber Security Alliance, (2005), PP: 111
Nebenzhal, I.D. and Jaffe, E.D. (1998), “Ethical dimensions of advertising executions”,
Journal of Business Ethics, Vol. 17(7), (1998), PP: 805-815
Neelkanta, B.C. and H.B. Anand (1992), “Educating the Consumer”, Journal of Social
Welfare, Vol. 37(11-12), (1992), PP: 5-6
Netemeyer, R. G., Beard, W. O. and Sharma, S. (2003), “Scaling procedures issues and
Applications”, Thousand Oaks: Sage Publication
Nettleton, E. (2004), “Electronic marketing and the new anti-spam regulations”, Journal of
Database Marketing and Customer Strategy Management, Vol. 11(3), (2004),
PP:235-40
Network wizards (1999), “NUA Internet Surveys”, September 17, 1999
xxv
Newman Graeme and Ronald Clarke (2003), “Superhighway Robbery: Preventing E-
Commerce Crime”, London: Willan (Publisher)
Nunally, J. (1967), “Psychometric theory”, Mc-Graw Hill, (1st. Ed.) New York, NY
Nunnally, J. (1978), “Psychometric Theory”, McGraw-Hill, New York, NY
Octane Research (2011), “Annual India E-marketing”, Benchmark Research on India
Digital Marketing, (Jan. 2011)
OFT (Office of Fair Trading), (2007), “Internet shopping”, OFT market study (2007)
Oghazi Pejvak, Mostaghel Rana1 and Parida Vinit, (2012), “Prioritization of Service
Quality Factors in E-purchasing - A Cross Cultural Study”, Journal of Advances In
Management, Vol. 5(6), (June, 2012)
Olery-kelly, S. W. and Vokurka. R. J. (1998), “The empirical assessment of construct
validity”, Journal of Operation Management, Vol. 16, (1998), PP: 387-405
Oliva, R.A. (2004), “Spam!”, Journal of Marketing Management, Vol. 13(1), (2004), PP:
50-63
Oswell, D. (2008), “Media and communications regulation and child protection: An
overview of the field”, The international handbook of children, media and culture,
London: sage, PP: 475-492
Ovans, A., (1999), “Is Your web site socially savvy?”, Harvard Business Review, Vol.
77(3), (1999), PP: 20–21
P&AB (Privacy and American Business), (2005), “New survey reports an increase in ID
theft and decrease in consumer confidence”, Conducted by Harris Interactive,
Available at: http://www.pandab.org/deloitteidsurveypr.html.
P. S. Speck and M. T. Elliott, (1997), “Predictors of Advertising Avoidance in Print and
Broadcast Media”, Journal of Advertising, Vol. 26, (1997), PP: 61-76
P.L. Alreck and R.B. Settle, (2002), “The hurried consumer: Time-saving perceptions of
Internet and catalogue shopping,” Journal of Database Marketing, Vol. 10(1), 2002,
PP: 25-35
Paine, C., Reips, U.-D., Stieger, S., Joinson, A., and Buchanan, T., (2007), “Internet
users’ perceptions of ‘privacy concerns’ and ‘privacy actions”, International Journal
of Human-Computer Studies, Vol. 65, 2007, PP: 526-536
Pallant Julie (2001), “SPSS Survival Manual: A step-by-step guide to data analysis using
SPSS”, Publisher: Open University Press, 1st Ed. Buckingham
Palmer J. W., (2002), “Web site usability, design, and performance metrics”, Journal of
Information Systems Research, Vol. 13(2), (2002), PP: 151–167
xxvi
Pan, Y. and Zinkhan, G. M., (2006), “Exploring the impact of online privacy disclosures on
consumer trust”, Journal of Retailing, Vol. 82(4), 2006, PP: 331-338
Parasuraman, A. (2000), “Technology Readiness Index (TRI): a multiple-item scale to
measure readiness to embrace new technologies”, Journal of Service Research, 2000,
PP: 307-320
Pastore Michael (2001), “Privacy remains a concern for online consumers”, Cyber Atlas,
Assessed: 2013 April, http://www.clickz.com/clickz/news/1717092/privacy-remains-
concern-online-consumers
Patterson, P.G., L.W. Johnson, R.A. Spreng. (1997), “Modeling the determinants of
customer satisfaction for business to business professional services”, Academy
Marketing Science Journal, Vol. 25(1), 1997, PP: 4-17
Patton, M.Q. (2002), “Qualitative Research and Evaluation Methods”, UK, Sage
Publications
Pavlou, Paul A., (2003), “Consumer’s Acceptance of E-Commerce: Integrating Trust and
Risk with the Technology Acceptance Model”, Vol. 7(3), 2003, PP: 101-134
Paweł Kossecki and Urszula Kaczor, (2004), “No Trust, No Transaction –The
Implications For The Internet Suppliers”, Proceeding of 6th International
Interdisciplinary Conference on Electronic Commerce, 2004, PP: 303 – 309
Peishih Chang and David Mendonça, (2004), “ Inside the Customer: Modeling Cognition
during Online Shopping”, Proceedings of the 10th
Americas Conference on
Information Systems(AMCIS), Aug. 2004, PP: 429, New York, New York
Pescovitz David (2000), “Undercover agents” The Standard.com, January, PP: 3
Peter G. Neumann (1994), “Computer-Related Risks”, ACM Press/Addison-Wesley,
1994
Petersen, Andrea (2001), “Private Matters: It Seems That Trust Equals Revenue, Even
Online”, The Wall Street Journal Europe, Special Section on E-Commerce, 2001
Peterson, R.A., Albaum, G., & Ridgway, N.M. (1989), “Consumers Who Buy from
Direct Sales Companies”, Journal of Retailing, Vol. 65(2), 1989, PP: 273–288
Peterson, Robert A., Sridhar Balasubramanian, and Bart J. Bronnenberg (1997), “Exploring
the Implication of the Internet for Consumer Marketing,” Journal of the Academy
of Marketing Science, Vol. 25(4), 1997, PP: 329-346
Petrovic (2011), “ Ethical E-marketing”, European Journal of Marketing, Vol. 31(6),
2005, PP: 24-29
xxvii
Petronas, U.T. and B. Seri., (2001), “Malaysian Internet User’s Motivation and Concerns for
Shopping Online”, Malaysian Journal of Library and Information Science, Vol.
6(2), 2001, PP: 21-33
Pew (2004), “The Can-Spam Act has not helped most email users so far”, Pew Internet
Project Data memo, (March 2004), Available at:
http://www.pewinternet.org/pdfs/PIP_Data_Memo_on_Spam.pdf
Pew Research Center (2003), “Spam: How is it Hurting Email and Degrading Life on the
Internet”, Pew Internet and American Life project
Pine, B. Joseph and James H. Gilmore (1999), “The Experience Economy: Work Is
Theater & Every Business a Stage”, Boston, MA: Harvard Business Press
Pine, J. and Gilmore, J., (1998), “Welcome to the Experience Economy”, Journal of
Harvard Business Review, July 1998, PP: 97—103
Pollach, Irene. (2005), “A Typology of Communicative Strategies in Online Privacy
Policies: Ethics, Power and Informed Consent”, Journal of Business Ethics, Vol. 62
(3), 2005, PP: 221-235
Ponnurangam Kumaraguru and Lorrie Cranor, (2006), “Privacy in India: Attitudes and
Awareness”, Journal of Computer Science, Vol. 3856, 2006, PP: 243-258
Prema Nakra, (2001), “Consumer privacy rights: CPR and the age of the Internet”,
Journal of Management Decision, Vol. 39(4), 2001, PP: 272-278
Q. Hu and T. Dinev, (2005), “Is spyware an internet nuisance or public menace?”,
Journal of Communications of the ACM, Vol. 48(8), 2005, PP: 61–66
Quelch, John and Loisa Klein (1996), “The Internet and International Marketing”,
Journal of Sloan Management Review, Spring 1996, PP: 60-75
Quinton, (2005), “Online Privacy and the Disclosure of Cookie Use: Effects on Consumer
Trust and Anticipated Patronage”, Journal of American Marketing
Association, Vol. 17, PP: 12–36
R Lain. (2000), “Internet shopping soars at the end of the century”, In The Mercury, IT
Technology, January 2000, PP:3
R.-A. Shang, Y.-C. Chen, and L. Shen, (2005), “Extrinsic versus intrinsic motivations for
consumers to shop on-line”, Journal of Information and Management, Vol. 42,
March 2005, PP: 401-413
R.L. McArthur (2001), “Reasonable Expectations of Privacy”, Journal of Ethics and
Information Technology, Vol. 3, 2001. PP: 123–128
xxviii
Rachel Greenstadt and Michael D. Smith, (2005), “Protecting Personal Information:
Obstacles and Directions”, Proceedings of the Fourth Workshop on Economics and
Information Security, Cambridge, Massachusetts, May 2005
Rachels,J ames ( 1975), “Why Privacy Is Important”, Journal of Philosophy and Public
Affairs, Vol.4, Summer 1975, PP: 323-33
Radosevich, L. (1997), “Fixing Web site usability”, InformationWorld, Vol. 19(50),
1997, PP: 81-82
Raghu, T.S., P.K. Kannan, H.R. Rao, and A.B. Whinston (2001), “Dynamic Profiling of
Consumers for Customized Offerings over the Internet: A Model and Analysis,”
Journal of Decision Support Systems, Vol. 32, December 2001, PP: 117–34
Rajasree K. Rajamma, Audhesh K. Paswan and Muhammad M. Hossain, (2009), “Why do
shoppers abandon shopping cart? Perceived waiting time, risk, and transaction
inconvenience”, Journal of Product and Brand Management, Vol. 18(3), 2009,
PP:188–197
Ramayah, T., Aafaqi, B., & Jantan, M. (2003), “Internet usage among students of institution
of higher learning: the role of motivational variables”, Proceedings of the 1st
International Conference on Asian Academy of Applied Business Conference,
Sabah, Malaysia 10-12 July, 2003
Reedly, J., Schullo, S. and Zimmerman, K. (2000), “Electronic marketing: Integrating
electronic resources into the marketing process”, Harcourt college publishers
Reibstein, D.J. (2002), “What attracts customers to online stores, and what keeps them
coming back?”, Journal of Academy of Marketing Science, Vol. 30(4), 2002,
PP:465-473
Rendleman J. (2001), “Customer Data Means Money”, Information Week, August 20,
2001
Retail Merchandiser (2003), “Online spending jumps”, Retail Merchandiser (Online),
Assessed December 22, 2009, http://web.lexisnexis. com/universe/document
Rice, M., (1997), “What makes users revisit a web site”, Marketing News, Vol. 31(6),
1997, PP: 23
Richards, J.I. (1990), “Deceptive advertising: Behavioral study of a legal concept”,
Hillsdale, New Jersey: Lawrence Erlbaum Associates
Rimmer, S. (2003), “Death to spam”, Assessed 30 July 2009, Available at:
http://www.mindworkshop.com/alchemy/nospam.html
xxix
Robert Owen and Patricia Humphrey, (2010), “The structure of online marketing
communication channels”, Journal of Management and Marketing Research, Vol.
2, (2010), PP: 54-62
Robert Sprague and Corey Ciocchetti, (2009), “Preserving identities: Protecting personal
identifying information through enhanced privacy policies and laws”, Albany Law
Journal of Science and Technology, Vol. 19(1), 2009
Robert W. Hahn and Anne Layne-Farrar, (2001), “The Benefits and Costs of Online
Privacy Legislation”, Oct. 2001, Working Paper 01-14,
http://papers.ssrn.com/abstract_id=292649
Roberts, M. L. (2003), “Internet Marketing: Integrating Online and Offline Strategies”,
McGraw Hill, New York, NY
Rochelle A. Cadogan (2003), “The Ethics Of Data Privacy In An Electronic Marketplace:
The Incorporation Of Fair Information Practice Principles Into Privacy Policies”,
Review of Business Information Systems Journal, Vol.7(1), 2003
Rochelle Codogen (2001) “The Ethics of data privacy is an Electronic Market Place”,
Dec. 2001
Ronald Jeurissen and Bert van de Ven, (2006), “Development in Marketing Ethics” ,
Journal of Business Ethics Quarterly, Vol. 16(3), PP. 427-439
Rubin, Zick. (1975), “Disclosing oneself to a stranger: Reciprocity and its limits”,
Journal of Experimental Social Psychology, Vol.1, (1975), PP :233-260
Rudolph T., Rosenbloom B., Wagner T. (2004), “Barriers to Online Shopping in
Switzerland”, Journal of International Consumer Marketing, vol. 16(3), 2004, PP:
55-74
Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller, D.W. (2001), “Perceived
security and worldwide web purchase intention”, Journal of Industrial Management
and Data Systems, Vol. 101(4), 2001, PP: 165-177
Sally Harridge, (2004), “Electronic marketing, the new kid on the block”, Journal of
Marketing Intelligence and Planning, Vol. 22(3), 2004, PP: 297-309
Sally Harridge, (2006), “Can the building of trust overcome consumer perceived risk
online?”, Journal of Marketing Intelligence and Planning, Vol. 24(7), 2006, PP:
746-761
Sandra L. Calvert(2008), (2008), “Children as Consumers: Advertising and Marketing”,
Journal of The Future of Children, Vol. 18(1), Spring 2008, PP: 205-234,
www.futureofchildren.org
xxx
Sara Rodriguez, (2009), “Economic Climate Shifts Consumers Online”, Consumer
Behavior Report by PriceGrabber.com
Sarkar Pradipta K., & Cybulski, J. L. (2002), “Understanding a product line of electronic
business systems”, School of Information Systems, Deakin University
Satinder Kumar and Rishi Raj Sharma (2012), “Perceptual study of Spamming an unethical
practice in E-marketing”, International journal of Marketing and Management
research, Vol. 3(1), 2012, PP: 1-25
Security Fears, Increased e-Business Investment Top Survey of (2001) by IT Security,
Venue: IT Pros; Network World Study Also Reveals Significant Growth in Handheld
Devices and Major Concerns With Storage’, April,
2001,http://www.itsecurity.com/tecsnews/apr2001/apr44.htm
Seitz, V.A., Massey, T.K.,(1990), “The acceptability of catalogs for apparel purchases”,
Clothing and Textiles Research Journal, Vol. 8(4), 1990, PP: 28-33.
Sekaran, U. (2000), “Research Methods for Business: A skill building approach”, 2nd Ed.
John Wiley and Sons, Inc.
Seligman T.J and Taylor ,J.D. (2000), “FTC Reverses Privacy Policy”, New York Law
Journal, June 19,2000, Available at: www.loeb.com/ CM/Articles/articles24.asp
Shane Hird, (2002), “Technical Solutions for Controlling Spam”, Proceedings of AUUG,
2002, Melbourne, 4-6 September 2002
Sharma, A. and Sheth, J.N. (2004), “Web-based marketing: the coming revolution in
marketing thought and strategy”, Journal of Business Research, Vol. 57(7), 2004,
PP: 696–702
Sheehan, K. B. and S. J. McMillan (1999), “Response Variation in E-Mail Surveys: An
Exploration”, Journal of Advertising Research, Vol. (39)4, 1999, PP: 45-55
Sheehan, Kim Bartel (1999), “An investigation of gender differences in on-line privacy
concerns and resultant behaviors”, Journal of Interactive Marketing, Vol. 13(4),
1999, PP : 24-38
Shermach (2005), “Nature of e-business ethical dilemmas”, Information Management and
Computer Security, Vol. 15(2), 2004, PP: 16-27
Singh, B. & Malhotra, P., (2004), “Adoption of Internet banking: an empirical
investigation of Indian Banking sector”, Journal of Internet Banking and
Commerce, Vol. 9(2), 2004
Sipior, J.C., Ward, B.T. and Bonner, P.G. (2004), “Should spam be on the menu?”,
Journal of Communications of the ACM, Vol. 47(6), 2004, PP: 59-64
xxxi
Smith H. J., Milburg S. J., and S. J. Burke, (1996), “Information Privacy: Measuring
Individuals' Concerns about Organizational Practices”, Journal of MIS Quarterly,
Vol. 20, (June 1996), PP: 167-196
Smith, P.R and Chaffey, D. (2001), “E-marketing excellence: at the heart of e-Business”,
Butterworth Heinemann, Oxford, UK
Soltani A., Canty S., Mayo Q., Thomas L., and Hoofnagle C. J. (2010), “Flash cookies and
privacy”, Accessed 15 Apr 2010, August 11 2009, Available at:
http://ssrn.com/abstract=1446862.
Sonja Petrovic-Lazarevic and Amrik S. Sohal, (2004), “Nature of e-business ethical
dilemmas”, Information Management & Computer Security, Vol. 12(2), 2004, PP:
167-177
Sorkin, D. (2001), “Technical and legal approaches to unsolicited electronic mail”, USFL
Review, Winter 2001, PP: 325-83
Spam Filter Review (2005), “Spam Statistics 2004”, http://spam-filter-
review.toptenreviews.com/spam-statistics.html
Special Report from Oppenheimer Funds survey, (2007), “Protect Yourself Against
Identity Theft”, 2007
Stewart, D.W. and Pavlou, P.A. (2002), “From consumer response to active consumer:
Measuring the effectiveness of interactive media”, Journal of the Academy of
Marketing Science, Vol. 30(4), 2002, PP : 376–396
Strauss Judy and Frost Raymond (2010), “E-Marketing”, 5th
Ed., PHI Learning Private Ltd
Suki N.M., Suki N.M, (2007), “Online buying innovativeness: Effects of perceived
value, perceived risk and perceived enjoyment”, International Journal of Business
and Society, Vol. 8(2), 2007, PP: 81-93
Suki, N. B. M., Ahmad M. I., & Thyagarajan, V. (2002), “Motivation and concern factors
for internet shopping: A Malaysian perspective”, The Electronic Journal for
Ecommerce Tools and Applications, Vol. 1, 2002, PP: 1–18
Sullivan JD, De Leeuw MB (2003), “Spam after Can-Spam: How Inconsistent Thinking Has
Made a Hash out of Unsolicited Commercial E-Mail Policy”, Santa Clara Computer
and High Tech journal., Vol. 20, 2003, PP : 887
Sullivan, J. and Walstrom, K. (2001), “Consumer perspectives on service qualities of
electronic commerce Web Sites”, Journal of Computer Information Systems, Vol.
41(3), 2001, PP: 8-15
xxxii
Sun, L. (2007), “Who can fix the spyware problem?”, Berkeley Technology Law Journal,
Vol. 22, 2007, PP :555-575
Surendra Sisodia (2010), “Role of integrated marketing communication in modern Indian
business”, Journal of Arts Science and Commerce, Vol. 1(1), 2010, PP: 134-138
Suri Ajneesh and Marissa Phillip (2004), “Impact of Gender Differences on the Evaluation
of Promotional Emails”, Journal of advertising research, Vol. 10, 2004, PP:360-
368
Swartz. J. (2004), “Is the future of Email under cyber attack?”, USA today
Syed Shah Alam and Norjaya Mohd Yasin, (2010), “What factors influence online brand
trust: evidence from online tickets buyers in Malaysia”, Journal of Theoretical and
Applied Electronic Commerce Research, Vol. 5(3), Dec. 2010, PP: 78-89
Syed Shah Alam and Norjaya Mohd. Yasin, (2010), “An Investigation into the
Antecedents of Customer Satisfaction of Online Shopping”, Journal of Marketing
Development and Competitiveness, Vol. 5(1), 2010
Symantec, Spam statistics, Accessed 06-11-2009.
http://www.symantec.com/region/de/PressCenter/spam.html ,
Szymanski, D., R. Hise (2000), “E-Satisfaction: An initial examination”, Journal of
Retailing, Vol. 76(3), 2000, PP: 309-322
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer (2006), “Social phishing”, Journal of
Communications of the ACM, Vol. 50(10), Oct 2006, PP :94-100
Tabachnick, B.G., and Fidell, L.S. (1996), “Using Multivariate statistics” (3rd Ed.)
Harper Collins College Publishers: New York. NY
Tai, S. H. C. (2007), “Correlates of successful brand advertising in China”, Asia Pacific
Journal of Marketing and Logistics, Vol. 19(1), 2007, PP: 40-56
Tamara Eisenschitz (2001), “Email Law”, Proceeding of Aslib, Vol-54(1), 2001, PP: 41-47
Tanzila Ahmed, Charles Oppenheim, (2006), “Experiments to identify the causes of
spam”, Proceeding of Aslib, Vol. 58(3), (2006), PP: 156 - 178
Taylor Nelsen Sofres, (2002), “TNS Annual Report”, Taylor Nelson Sofres, 2002
Tej Paul Bhatla, Vikram Prabhu & Amit Dua, (2003), “Understanding Credit Card
Frauds”, Journal of Cards Business Review, Tata Consultancy Services
Tonita Pereay Monsuwe, Benedict G.C. Dellaert and Ko de Ruyter, (2004), “What drives
consumers to shop online? A literature review”, International Journal of Service
Industry Management, Vol. 15(1), 2004, PP : 102-121
xxxiii
Turban, E., King, D., Mckay, J., Marshall, P., Lee, J., and Viehland, D., (2008), “Electronic
Commerce: A Managerial Perspective”, (5th ed.). Upper Saddle River, U.S.: Pearson
Prentice Hall, 2008
Turban, E., Lee, J., King, D. and Chung, H.M. (2000), “Electronic Commerce: A Managerial
Perspective”, 1st Ed., Prentice-Hall, Englewood Cliffs, NJ
Tynan, D., (2000), “Privacy 2000: in web we trust?”, PC World, June 2000, PP: 103–116
Udo, G.J. (2001), “Privacy and security concerns as major barriers for e-commerce: a
survey study”, Journal of Information Management and Computer Security, Vol. 9,
2001, PP: 165-174
UNCTAD, (2007), “Information Economy Report 2007-2008: Science and technology for
development: the new paradigm of ICT (Online)” Available at:
http://www.unctad.org/Templates/Page.asp?intItemID=1888&lang=1 (Accessed 12
December 2009)
Unsigned (1999), “Companies Learn That Selling Merchandise On Line Can Be
Surprisingly Messy, Especially Those Pesky Returns,” New York Times, August 23,
Section C, Page 3, Column 1.
Urbach, R. and G. A. Kibel (2004), “Adware/Spyware: an update regarding pending
litigation and legislation”, Intellectual Property and Technology Law Journal, Vol.
16(7), 2004, PP: 12-16
Vande Venn, A. H. and Ferry, D. I. (1980), “Measuring and Assessing Organization”,
John Wiley and Sons Inc., New York, NY
Vibhor Kalra, (2010), “E-marketing”, (Accessed November, 2011), Available at
http://www.scribd.com/doc/38318465/EMarketing
Vicomsoft (2002), “Spam FAQs”, (Accessed October 2009), Available at:
http://www.vicomsoft.com/knowledge/reference/spam.html
Vijayasarathy, L. R. (2002), “Product characteristics and Internet shopping intentions”,
Internet Research: Electronic Networking Applications and Policy, Vol. 12(5),
2002, PP: 411-426
Visualization and Usability Center, Georgia Tech Research Corporation, 9th Survey,
(10 April- 15 May ,1998)
Wainer, H., and Braun, H. I. (1988), “Test validity” Hilldale, NJ: Lawrence Erlbaum
Associates
Walker Smith (2003), “Consumers want personalization in exchange for private
information”
xxxiv
Wang, H., M. K. O. Lee, and C. Wang (1998), “Consumer privacy concerns about
Internet marketing Communications of the Association for Computing Machinery”,
Vol. 41, 1998, PP: 63–70
Watson Richard Thomas, Berthon, P., Pitt, L. and Zinkhan, G. (2000), “Electronic
Commerce: the strategic perspective”, Fort Worth, Texas: Dryden Press.
Webroot Software Inc (2005), “State of Spyware Q3 2005”, Webroot Software Inc., PP:
191
Wehling, B. (1996), “The future of marketing”, Vital Speeches of the Day, Vol. 62(6),
1996, PP: 170-174
Wells Barron and Spinks Nelda (1996), “Ethics must be communicated from the top
down”, Career Development International, Vol. 1(7), 1996, PP: 28–30
Whelan, Bridget.(2009), “Facebook, a fun resource or invasion of privacy”
Athensnews.com. 08 September 2005. 17 September 2009
<http://athensnews.com/issue/article.php3?story_id=21491>.
Wikipedia (2009), “HTTP cookie”, accessed 11/1/09, www.wikipedia.com
Wills, C.E. & Zeljkovic, M. (2011), “A Personalized Approach to Web Privacy:
Awareness, Attitudes, and Actions”, Journal of Information Management and
Computer Science, Vol. 19(1), 2011, PP: 53-73
Wilsker Ira (2002), “The Internet Security: Cookies, Spyware, and other Privacy Threats on
the Net”, Available at:
http://www.1960pcug.org/~pcnews/2002/01/privacy_threats.htm
Winn K Jane (2005), “Contracting Spyware by Contract”, European Journal of Marketing,
Vol. 31(6), 2005, PP: 24-29
Wolfinbarger, M., M. Gilly. (2001), “Shopping online for freedom, control, and fun”,
Journal of California Management Review, Vol. 43(2), 2001, PP: 34-55
Wood, C. M., & Scheer, L. K. (1996), “Incorporating perceived risk into models of
consumer deal assessment and purchase intent”, Journal of Advances in Consumer
research, Vol. 23, 1996, PP: 399-406
Woolsey, B., (2008), “Credit card 'phishing: What it means, how to prevent it”, (Online),
Available: http://www.creditcards.com/credit-card-news/phishing-credit-card-scam-
fraud-1282.php (Accessed June 20, 2009)
Ye Diana Wang and Henry H. Emurian, (2005), “An overview of online trust: Concepts,
elements, and implications”, Journal of Computers in Human Behavior, Vol. 21,
2005, PP: 105–125
xxxv
YPRT (Youth Protection Roundtable) (2009), Stiftung Digitale Chancen. Youth Protection
Toolkit, (Public Paper) Available at
www.yprt.eu/transfer/assets/final_YPRT_Toolkit.pdf p. 11)
Zack, Michael H. (1993), “Interactivity and communication mode choice in ongoing
management groups”, Information Systems, Vol.4(3), 1993, PP: 207–239
Zhang, P., and von Dran, G. M. (2000), “Satisfactor and dissatisfactorers: A two-factor
model for website design and evaluation”, Journal of the American Society for
Information Science, Vol. 51(4), 2000, PP: 1253-1268
Zhang, P., von Dran, G. M., Small, R. V. and Barcellos, S. (1999), “Websites that satisfy
users: a theoretical framework for web user interface design and evaluation”,
Proceedings of the 32nd Annual Hawaii International Conference on System
Sciences (HICSS32), January 1999
Zhang, P., von Dran, G. M., Small, R. V. and Barcellos, S. (2000), “A two-factor theory for
website design”, Proceedings of the 33rd
Annual Hawaii International
Conference on System Sciences (HICSS33), January 2000
Zhang, X. (2005), “What do consumers really know about spyware?”, Journal of
Communications of the ACM, Vol. 48(8), 2005, PP: 4448
Zhao, Ying, & Zhang, Yue, (2004), “Characteristics of consumer behaviors in Electronic
commerce environment and the impacts on Internet marketing”, Jiangsu Commercial
Forum, 2004