SEARCH

SEARCH BY CITATION

References

  • Afifi, W. A., & Guerrero, L. K. (2000). Motivations underlying topic avoidance in close relationships. In S.Petronio (Ed.), Balancing the Secrets of Private Disclosures (pp. 165179). Mahwah, NJ: Erlbuam.
  • Altman, I., & Taylor, D. A. (1973). Social Penetration: The Development of Interpersonal Relationships. New York: Holt, Rinehart, & Winston.
  • Berger, C., & Calabrese, R. (1975). Some explorations in initial interactions and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1(2), 99112.
  • Bhatnagar, A., Misra, S., & Rao, H. R. (2000). On risk, convenience, and Internet shopping behavior. Communications of the ACM, 43(11), 98105.
  • Burgoon, J. K., Buller, D. B., Grandpre, J. R., & Kalbfleisch, P. (1998). Sex differences in presenting and detecting deceptive messages. In D. J.Canary & K.Dindia (Eds.), Sex Differences and Similarities in Communication: Critical Essays and Empirical Investigations of Sex and Gender in Interaction (pp. 263280). Mahwah, NJ: Erlbaum.
  • Chelune, G. J. (1987). A neuropsychological perspective of interpersonal communication. In V. J.Derlega & J. H.Berg (Eds.), Self-Disclosure: Theory, Research, and Therapy (pp. 1034). New York: Plenum.
  • Culnan, M. J. (2001, December 4). Consumers & privacy notices. Paper presented at the Federal Trade Commission’s Interagency Public Workshop, Get Noticed: Effective Financial Privacy Notices, Washington, D.C. Retrieved December 12, 2006 from http://www.ftc.gov/bcp/workshops/glb/
  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104115.
  • DePaulo, B. M., Epstein, J. A., & Wyer, M. M. (1993). Sex differences in lying: How women and men deal with the dilemma of deceit. In M.Lewis & C.Saarni (Eds.), Lying and Deception in Everyday Life (pp. 126147). New York: Guilford.
  • Digital Future Report. (2005, December). USC Annenberg School Center for the Digital Future. Five Years of Exploring the Digital Domain. Retrieved December 15, 2005 from http://www.digitalcenter.org/pages/current_report.asp?intGlobalId=19
  • Federal Trade Commission. (1998, June). Privacy Online: A Report to Congress. Retrieved January 23, 2002 from http://www.ftc.gov/reports/privacy3/index.htm
  • Federal Trade Commission. (2000, May). Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress. Retrieved January 23, 2002 from http://www.ftc.gov/reports/privacy2000/privacy2000.pdf
  • Fox, S. (2000). Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Retreived November 2, 2000 from http://pewinternet.org/reports/toc.asp?Report=19
  • Hann, I.-H., Hui, K.-L., Lee, T. S., & Png, I. P. L. (2002, December 15-18). Online information privacy: Measuring the cost-benefit trade-off. Paper presented at the Twenty-Third International Conference on Information Systems, Barcelona, Spain. Retrieved December 12, 2006 from http://www.comp.nus.edu.sg/~ipng/research/privacy_icis.pdf
  • Jarvenpaa, S. L., & Tractinsky, N. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). Retrieved December 15, 2006 from http://jcmc.indiana.edu/vol5/issue2/jarvenpaa.html
  • Jourard, S. M., & Lasakow, P. (1958). Some factors in self-disclosure. Journal of Abnormal & Social Psychology, 56, 9198.
  • Kehoe, C., Pitkow, J., Sutton, K., Aggarwal, G., & Rogers, J. D. (1999, May). GVU’s 10th WWW User Survey. Retrieved December 12, 2006 from http://www.gvu.gatech.edu/user_surveys/survey-1998-10/
  • LaRose, R. (2004, May). Promoting I-safety: The effect of consumer information and privacy seals on risk assessment and online privacy behavior. Paper presented at the International Communication Association annual meeting, New Orleans, LA.
  • Metzger, M. J. (2006). Effects of site, vendor, and consumer characteristics on website trust and disclosure. Communication Research, 33(3), 155179.
  • Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information, privacy, and regulatory approaches. Communications of the ACM, 38(12), 6574.
  • Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs, 35(1), 2745.
  • Nunnally, J. (1967). Psychometric Theory. New York: McGraw-Hill.
  • Palmer, J. W., Bailey, J. P., & Faraj, S. (2000). The role of intermediaries in the development of trust on the WWW: The use and prominence of third-parties and privacy statements. Journal of Computer-Mediated Communication, 5 (3). Retrieved December 15, 2006 from http://jcmc.indiana.edu/vol5/issue3/palmer.htm
  • Pastore, M. (2000a, April 24). Demographics influence online spending. Retrieved December 12, 2006 from http://www.ecommerce-guide.com/news/trends/article.php/346411
  • Pastore, M. (2000b). U.S. college students use Net for shopping. Retrieved March 17 2003 from http://cyberatlas.internet.com/big_picture/demographics/article/0,1323,5901_432631,00.html
  • Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: State University of New York Press.
  • Pitkow, J. & Kehoe, C. (1997, June). GVU’s 7th WWW User Survey. Retrieved December 12, 2006 from http://www.gvu.gatech.edu/user_surveys/survey-1997-04/
  • Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 2438.
  • Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising, 28(3), 3751.
  • Spiekermann, S., Grossklags, J., & Berendt, B. (2001). Stated privacy preferences versus actual behaviour in EC environments: A reality check. Paper presented at the 5th International Conference Wirtschaftsinformatik, Augsburg, Germany. Retrieved March 24, 2004 from http://www.sims.berkeley.edu/~jensg/research/paper/final_privacy.pdf
  • Stanton, J. M., & Stam, K. R. (2003). Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveillance & Society, 1(2), 152-190. Retrieved December 12, 2006 from http://www.surveillance-and-society.org/articles1(2)/boundarytheory.pdf
  • Swaminathan, V., Lepkowska-White, E., & Rao, B. P. (1999). Browsers or buyers in cyberspace? An investigation of factors influencing electronic exchange. Journal of Computer- Mediated Communication, 5(2). Retrieved December 15, 2006 from http://jcmc.indiana.edu/vol5/issue2/swaminathan.htm
  • UCLA Center for Communication Policy. (2003, February). UCLA Internet Report: Surveying the Digital Future, Year Three. Retrieved August 25, 2002 from http://ccp.ucla.edu/
  • Westin, A. (1967). Privacy and Freedom. New York: Atheneum.
  • West, R., L., & Turner, L. H. (2004). Introducing Communication Theory: Analysis and Application (2nd ed.). Boston: McGraw-Hill.
  • Wharton Forum on Electronic Commerce. (2000, March 1). Is online consumer spending slowing down? Retrieved August 25, 2002 from http://knowledge.wharton.upenn.edu/index.cfm?fa=printArticle&ID=142
  • White, T. B. (2004). Consumer disclosure and disclosure avoidance: A motivational framework. Journal of Consumer Psychology, 14(1&2), 4151.