Cyber Shopping and Privacy

Cyber Shopping and Privacy

Jatinder N.D. Gupta (Ball State University, USA) and Sushil K. Sharma (Ball State University, USA)
Copyright: © 2002 |Pages: 15
DOI: 10.4018/978-1-930708-12-9.ch014
OnDemand PDF Download:
$37.50

Abstract

At times, privacy issues are perceived as a part of security issues, therefore, let us differentiate them. Security refers to the integrity of the data storage, processing and transmitting system and includes concerns about the reliability of hardware and software, the protection against intrusion or infiltration by unauthorized users. Privacy, on the other hand, refers to controlling the dissemination and use of data, including information that is knowingly or unknowingly disclosed. Privacy could also be the by-product of the information technologies themselves (Cate, 1997). Over the past decade, numerous surveys conducted around the world have found consistently high levels of concern about privacy. Many studies (Dorney, 1997; Allard, 1998; Harris and Westin, 1999) found that more than 80% of Net users are concerned about threats to their privacy while online. The Federal Trade Commission discovered (Privacy online: A report to Congress/Federal Trade Commission, United States, Federal Trade Commission, 1998) that many Web sites collect personal information and release the same without the users’ knowledge and permission. There are methods (Adam et al., 1996; Verton, 2000; Wen, 2001; McGuire, 2000; Feghhi, 1999) that make cyber shopping secure, although consumers may still have concerns about security aspects of cyber shopping. How can one keep information about his/her Internet browsing habits to oneself? It’s a challenge in this era of technological advancements. In this chapter, we focus exclusively on privacy issues that arise in cyber shopping. In the recent past, many articles on privacy have appeared in journals. In this chapter, we review these publications on privacy.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Aryya Gangopadhyay
Chapter 1
Leila Alem, Ryszard Kowalczyk, Maria R. Lee
Intelligent negotiation agents are software agents, which can negotiate the terms of transactions on behalf of purchasers and vendors on the... Sample PDF
Supporting Electronic Negotiation for Intelligent Trading
$37.50
Chapter 2
Peter Rittgen
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g., accounting). But since the Internet... Sample PDF
E-Commerce Software: From Analysis to Design
$37.50
Chapter 3
Bernhard Strauch, Robert Winter
E-commerce is changing the nature of business. To support ‘buying and selling over digital media’ for private and corporate Web users, companies... Sample PDF
Towards a Methodology for the Development of Web-Based Systems: Models, Methods and Activities for Conceptual Design of Large Web-Based Information Systems
$37.50
Chapter 4
Anupam Joshi, Zhihua Jiang
Web search engines have become increasingly ineffective as the number of documents on the Web have proliferated. Typical queries retrieve hundreds... Sample PDF
Retriever: Improving Web Search Engine Results Using Clustering
$37.50
Chapter 5
Ramesh Subramanian, Minnie Yi-Miin Yen
In this chapter, we examine Digital Asset Management concepts, detail the desirable features and components of DAM, the taxonomy of the DAM systems... Sample PDF
Digital Asset Management: Concepts and Issues
$37.50
Chapter 6
Kemal Altinkemer, Kerem Tomak
The study divides the Internet Economy into four layers. The first layer consists of the telecommunications companies, Internet Service Providers... Sample PDF
Pricing and Service Quality in Electronic Commerce
$37.50
Chapter 7
Subhasish Dasgupta, Rajesh Chandrashekaran
In this chapter we propose a framework for the delivery and tracking of rotating banner advertisements on the World Wide Web (WWW). The proposed... Sample PDF
Delivery and Tracking of Rotating Banner Advertisements on the World Wide Web: An Information System Model
$37.50
Chapter 8
Merrill Warkenton, Akhilesh Bajaj
Traditional business models are increasingly being replaced by newer business models based on relationships enabled by information technologies. In... Sample PDF
The On-Demand Delivery Services Model for eCommerce
$37.50
Chapter 9
Pat Finnegan, John Kilmartin
The advantages of electronic trading are numerous, with benefits for both users and merchants. However for electronic trading to reach its full... Sample PDF
Electronic Payment Systems: An Empirical Investigation of Customer and Merchant Requirements
$37.50
Chapter 10
Richard Holowczak
The financial services industry consists of retail financial services such as retail banking, consumer lending and mortgage banking, insurance... Sample PDF
E-Commerce in the Financial Services Industry
$37.50
Chapter 11
Parvez Ahmed
Over the last five years, firms with strong presence on the Internet have seen increases in the value of their firms to what some consider obscene... Sample PDF
E-Capital Budgeting: Managing Strategic Investments in a World of Uncertainty
$37.50
Chapter 12
Ulrike Baumoel, Thomas Stiffel, Robert Winter
Although many corporations currently try to establish e-commerce as a new field of business and as many corporations are already in the middle of... Sample PDF
A Concept for the Evaluation of E-Commerce-Ability
$37.50
Chapter 13
Martin Barnett, Janice M. Burn
This chapter looks at models for organizational development using the potential of virtual organization for established firms. For established... Sample PDF
Strategies for Bricks to Beat Clicks - How Established Business Can Incorporate the New Technologies
$37.50
Chapter 14
Jatinder N.D. Gupta, Sushil K. Sharma
At times, privacy issues are perceived as a part of security issues, therefore, let us differentiate them. Security refers to the integrity of the... Sample PDF
Cyber Shopping and Privacy
$37.50
About the Authors