bibliography -...

35
i BIBLIOGRAPHY Alan D. Smith, (2004), “E-security issues and policy development in an information- sharing and networked environment”, Aslib Proceedings: New Information Perspectives, Vol. 56(5), (2004), PP: 272-285 Alba, Joseph, John Lynch, Barton Weitz, Chris Janiszewski, Richard Lutz, Alan Sawyer, Stacey Wood, (1997), “Interactive home shopping: Consumer, Retailer, and Manufacturer incentives to participate in electronic marketplaces”, Journal of Marketing, Vol. 61, (July, 1997), PP: 3853 Aldridge, A., White, M. and Forcht, K., (1997), “Security considerations of doing business via the Internet: Cautions to be Considered”, Journal of Internet Research, Vol. 7(1), PP: 9-15 Ali M. Noor , Zetty M.M. Zaini, Mohd Raziff Jamaluddin and Mohd Salehuddin Mohd Zahari, (2011), “Exploratory Studies on Online Grocery Shopping”, 3rd International Conference on Information and Financial Engineering, IPEDR, Vol.12, (2011), PP: 423-427, IACSIT Press, Singapore Almousa M., (2011), “Perceived risk in apparel online shopping: A multi dimension perspective” , Journal of Canadian Social Science, Vol. 7(2), (2011), PP: 23-31 Alsmadi Smadi, (2002), “Consumer attitudes toward online shopping in Jordan: opportunities and challenges”, International Journal of Management, Vol. 13(2), (2002), PP: 131-144 AMA (American Marketing Association), (2004), FBI Internet Fraud Complaint Center (2001); Internet Fraud Watch of the National Consumer League (NCL), 2001 NCL’s On-line shopping survey, carried out in US with a sample of 1003 adults, in Aug 2001. Amaratunga, D., Baldry, D., Sarshar, M., and Newton, R., (2002), “Quantitative and qualitative research in the built environment: Application of Mixed research approach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza Chavosh,,Somayeh Soheilirad, Pejman Sheibani Esferjani and Arian Ghajarzadeh, (2010), “ The Impact of Culture on young consumer’s intension towards online shopping in Malaysia”, International Conference on Business and Economics Research, Third session, Vol.1, PP: 120- 124

Upload: others

Post on 23-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

i

BIBLIOGRAPHY

Alan D. Smith, (2004), “E-security issues and policy development in an information-

sharing and networked environment”, Aslib Proceedings: New Information

Perspectives, Vol. 56(5), (2004), PP: 272-285

Alba, Joseph, John Lynch, Barton Weitz, Chris Janiszewski, Richard Lutz, Alan Sawyer,

Stacey Wood, (1997), “Interactive home shopping: Consumer, Retailer, and

Manufacturer incentives to participate in electronic marketplaces”, Journal of

Marketing, Vol. 61, (July, 1997), PP: 38–53

Aldridge, A., White, M. and Forcht, K., (1997), “Security considerations of doing business

via the Internet: Cautions to be Considered”, Journal of Internet Research,

Vol. 7(1), PP: 9-15

Ali M. Noor , Zetty M.M. Zaini, Mohd Raziff Jamaluddin and Mohd Salehuddin Mohd

Zahari, (2011), “Exploratory Studies on Online Grocery Shopping”, 3rd International

Conference on Information and Financial Engineering, IPEDR, Vol.12, (2011),

PP: 423-427, IACSIT Press, Singapore

Almousa M., (2011), “Perceived risk in apparel online shopping: A multi dimension

perspective” , Journal of Canadian Social Science, Vol. 7(2), (2011), PP: 23-31

Alsmadi Smadi, (2002), “Consumer attitudes toward online shopping in Jordan:

opportunities and challenges”, International Journal of Management, Vol. 13(2),

(2002), PP: 131-144

AMA (American Marketing Association), (2004), FBI Internet Fraud Complaint Center

(2001); Internet Fraud Watch of the National Consumer League (NCL), 2001 NCL’s

On-line shopping survey, carried out in US with a sample of 1003 adults, in Aug

2001.

Amaratunga, D., Baldry, D., Sarshar, M., and Newton, R., (2002), “Quantitative and

qualitative research in the built environment: Application of Mixed research

approach”, Work Study, Vol. 51(1), (2002), PP: 17-31

Anahita Bagherzad Halimi,,Alireza Chavosh,,Somayeh Soheilirad, Pejman Sheibani

Esferjani and Arian Ghajarzadeh, (2010), “ The Impact of Culture on young

consumer’s intension towards online shopping in Malaysia”, International

Conference on Business and Economics Research, Third session, Vol.1, PP: 120-

124

Page 2: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

ii

Adam Sarner (2007), “E-Marketing Improves the Customer's Buying Process”, Gartner

Research, Assessed April 2009, Available at http://www.gartner.com/id=501732

Anderson, Chris, (2009), “The long tail: why the future of business is selling less of

more”, Commonwealth Publishing Co., Ltd, 1st Edition, Taipei. Publication- Hyperion

Anderson, E. and Weitz, E., (1989), “Determinants of continuity in conventional industrial

channel dyads”, Journal of Marketing Science, Vol. 8, PP: 310-323

Anderson, J. C. and Gerbing, D. W., (1984), “The effect of sampling error on

convergence, improper solutions and goodness-of-fit indices for maximum likelihood

confirmatory factor analysis”, Psychometrika , Vol. 49, (1984), PP: 155-173

Anderson, R.E., and Srinivasan, S.S., (2003), “E-satisfaction and E-loyalty: A

contingency framework”, Journal of Psychology and Marketing, Vol. 20(2), (2003),

PP: 123-138

Andrews, A., (2004b), “Internet newsletters”, Kybernetes, Vol. 33(1), (2004), PP: 22-25

Anil Samtani, (2000), “Electronic commerce law in Asia: legal, regulatory and policy

issues”, The proceedings of international conference on electronic commerce:

Emerging trends in e-commerce, (Nov. 2000), Multi Media University Kuala

Lumpur, Malaysia.

Ann E. Schlosser, Tiffany Barnett White and Susan M. Lloyd, (2006), “Converting Web Site

Visitors into Buyers: How Web Site Investment Increases Consumer Trusting

Beliefs and Online Purchase Intentions”, Journal of Marketing, Vol. 70 (April 2006),

PP. 133–148

Anthony D. Miyazaki, (2008), “Online Privacy and the Disclosure of Cookie Use: Effects

on Consumer Trust and Anticipated Patronage”, Journal of American Marketing

Association, Vol. 27 (1) (Spring 2008), PP: 19–33

Anthony Miyazaki (2008), “Online Privacy and the Disclosure of Cookie Use: Effects of

Consumer Trust and Anticipated Patronage”, Journal of Public Policy and

Marketing, Vol. 27, (Spring 2008), PP: 19–33

AOL/NCSA, (2004), “online safety study”, Assessed June 2008, Available:

http://www.staysafeonline.info/pdf/safety study v04.pdf, October 2008

Arnold, M. J., & Reynolds, K. E., (2009), “Affect and Retail Shopping Behavior:

Understanding the Role of Mood Regulation and Regulatory Focus”, Journal of

Retailing, Vol.85 (3), (2009), PP: 308-320

Arnold, S. J., V. Roth and D. J. Tigert., (1980), “Conditional logit versus MDA in the

prediction of store choice. In Kent B. Monroe, Ed. Advances in Consumer Research

Page 3: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

iii

Ann Arbor, Michigan, Association for Consumer Research, Vol. 8, (1980), PP: 665-670

Arumuga perumal, S., (2006), “Effective method of security measures in virtual banking”,

Journal of Internet Banking and Commerce, Vol. 11(1), (April 2006), E- paper,

Available at: http://www.arraydev.com/commerce/JIBC/2006-04/VB.asp

(Accessed 17 January 2010)

Austin M. Jill and Reed Mary Lynn, (1999), “Targeting children online: Internet advertising

ethics issues”, Journal of consumer Marketing, Vol. 16, PP: 590-602

Bagozzi, R.P., and Yi, Y., (1988), “On the Evaluation of Structure Equation Models”,

Journal of the Academy of Marketing science, Vol. 16(1), PP: 70-83

Bakos, J.Y., (1997), “Reducing buyer search costs: implications for electronic

marketplaces”, Journal of Management Science, Vol. 43(12), (1997), PP: 1676-

1692

Barkowitz. N., (1992), “Marketing” 2nd Edition. Burr Redge IL Richard D. Lrwim P. 90.

Barnes SJ, Scornavacca E, (2004), “Mobile marketing: the role of permission and

acceptance”, International Journal Mobile Communication, Vol. 2(2), (2204), PP:

128-139

Bartlett, M.S., (1954), “A note on the multiplying factors for various chi square

approximations”, Journal of the Royal Statistical Society, Vol. 16(Series B), (1954),

PP: 296-298

Bayan, Ruby (2001), “Privacy Means Knowing Your Cookies,” Link-Up, Vol. 18(1)

(January–February 2001), PP: 22–23

BBC (2208), “Plastic card fraud goes back up”, BBC, (March 12, 2008),

http://news.bbc.co.uk/2/hi/business/7289856.stm. Accessed January 2, 2010

BCG (Boston Consulting Group), (1997), “E-Trust Internet Privacy Study: Summery of

market survey results”, Assessed (Sept. 2009), Available:

http://www.ftc.gov/bcp/privacy/wkshp97/comments1/etrust

Beard, F. K., (2003), “College student attitudes toward advertising’s ethical, economic, and

social consequences”, Journal of Business Ethics, Vol. 48, PP: 217-228.

Belch, G.E. & Belch, M.A., (2004), “Advertising and promotion: an integrated marketing

communications perspective”, 6th

Edition, New York: McGraw-Hill

Bellovin, S.M., (2004), “Spamming, phishing, authentication, and privacy”,

Communications of the ACM, Vol. 47(2), (2004), PP:144

Page 4: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

iv

Beltramini, Richard (2003), “Application of the Unfairness Doctrine to Marketing

Communications on the Internet”, Journal of Business Ethics, Vol. 42(4), (2003),

PP: 393-400

Benjamin, R. and Wigand, R., (1995), “Electronic markets and virtual value chains on the

information superhighway”, Journal of Sloan Management Review, Vol. 36(2),

(Winter 1995), PP: 62-72

Bette Ann stead and Jackie Gilbert (2001), “Ethical issues in Electronic Commerce”,

Journal of business Ethics, Vol.25 (1), (2001), PP: 167-186

Bezjian-Avery, A., Calder, B. and Iacobucci, D., (1998), “New media interactive advertising

v/s traditional advertising”, Journal of Advertising Research, Vol. 38(4), (1998),

PP: 23-32

Bhatnagar, A., and Ghose, S., (2004a), “A Latent Class Segmentation Analysis of E-

Shoppers”, Journal of Business Research, Vol. 57(7), (2004), PP: 758–767

Bhatnagar, A., and Ghose, S., (2004b), “Segmenting Consumers Based on the Benefits and

Risks of Internet Shopping”, Journal of Business Research, Vol. 57(12), (2004), PP:

1352–1360

Bhatnagar, A., Misra, S., and Rao, H.R., (2000), “On Risk, Convenience, and Internet

Shopping Behavior”, Association for Computing Machinery, Communications of the

ACM, Vol. 43(11), (2000), PP: 98–110

Bhattacherjee, A., (2001), “An empirical analysis of the antecedents of electronic commerce

service continuance”, Journal of Decision Support Systems, Vol. (32), (2001), PP:

201-214

Bhattacherjee, A., (2001a), “Understanding information systems continuance: an

expectation-confirmation model”, Journal of MIS Quarterly, Vol. 25(3), (2001), PP:

351–370

Blundon Bill, and Bonde Allen (1999), “Beyond the Transaction: Online sales are only part

of the E-business life cycle; to succeed, companies must customize service and

adapt to change”, Information Week, (November 16, 1999), Available:

http://www.informationweek.com/709/09iuss2.htm

Bothma. C.H. (2000), “E-commerce for South African Managers”, Irene, South Africa:

Interactive Reality

Boyer, K. K., and Hult, G. T. M., (2005), “Customer behavior in an online ordering

application: A decision scoring model”, Journal of Decision Sciences, Vol. 36(4),

(2005), PP: 569-598

Page 5: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

v

Bradley, P., (2003), “The great spam experiment”, Library and Information Update, Vol.

1(9), (2003), PP: 50-101

Branscum, D., (2000), “Guarding on-line privacy”, Newsweek, Vol. 135 (23), (2000), PP:

77–78.

Broekhuizen, T. and Huizingh, E., (2009), “Online purchase determinants: is their effect

moderated by direct experience,” Management Research News, Vol. 32(5), (2009),

PP: 440-457

Brooks, G., (2007), “Secret society”, New Media Age, Vol. 13 (Dec. 2007) , P:10

Brown, P. (2007), “Spyware and pre texting: Recent developments”, The Computer &

Internet Lawyer, Vol. 24(6), (2007), PP: 14-20

Brynjolfsson, E. and Smith, M., (2000), “Frictionless commerce: A comparison of

Internet and conventional retailers”, Journal of Management Science, Vol. 46(4),

(2000), PP: 563-585

Buckner, K., Gillham, M., (2000), "Using e-mail for social and domestic purposes:

processes, practices and attitudes”, Home-Orientated Informatics and Telematics

International Working Conference, (June 28-30, 2000), PP: 87-98

Business Week, (1997), “Internet communities”, Special report, (5 May 1997)

Campbell, A. J. (1997), “Relationship marketing in consumer markets: a comparison of

managerial and consumer attitudes about information privacy,” Journal of Interactive

Marketing, Vol. 11, (1997), PP: 44–57

Carlos Flavian and Miguel Guinalıu, (2006), “Consumer trust, perceived security and

privacy policy Three basic elements of loyalty to a web site”, Industrial Management

and Data Systems, Vol. 106(5), (2006), PP: 601-620

Carmen Puiu, Mirela Sirbu and Codrula Baltescu, (2010), “Internet Marketing Target the

Young Generation”, Recent Researches in Tourism and Economic Development,

Vol. 3, (2010), PP: 470-476

CAUCE (2003), “Coalition against unsolicited commercial e-mail”, Available at:

www.cauce.org

Caudill Eve M and Murphy Patrick E., (2000), “Consumer Online Privacy: Legal and

Ethical Issues”, Journal of Public Policy & Marketing, Vol. 19 (1), (2000), PP: 7-19

CDT (Center for Democracy and Technology), (2003), “Why am I getting all this Spam?”

Unsolicited Commercial E-mail Research Six Month Report, (March 2003)

Page 6: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

vi

Chaffey, D., Mayer, R., Johnston, K. and Ellis-Chadwick, F., (2003), “Internet Marketing:

Strategy, Implementation and Practice”, 2nd

Edition, Prentice-Hall, Englewood Cliffs,

NJ.

Chang, Susan and Mariko Morimoto (2003), “An Assessment of Consumer Attitudes

toward Direct Marketing Communication Channels: A Comparison between

Unsolicited Commercial E-mail and Postal Direct Mail”, Paper presented at the

annual convention of The Association for Education in Journalism and Mass

Communication, Kansas City, MO, (August 2003)

Chao Wen, Victor R. Prybutok and Chenyan XU, (2011), “An Integrated Model for

customer inline repurchase intension”, Journal of Computer Information Systems,

Vol. 52(1), (2011), PP: 14-23

Cheeseman. H.R. (2000), “Contemporary Business and E-Commerce Law”, 2nd

Edition,

USA: Pearson, New Jersey

Chellappa, K.R and Pavlou A.P. (2002), “Perceived information security, financial

liability and consumer trust in electronic commerce transactions”, Journal of

Logistics Information Management, Vol. 15(5), (2002), PP: 358-368

Cheung, C and Lee, Matthew, K.O., (1999), “Trust in Internet Shopping: A Proposed

Model and Measurement Instrument”, Proceeding of the Americas conference on

information system (AMCIS, 1999), Long Beach, California. Available at:

www.learningpark.cityu.edu.hk/student/ AISWeb/Christy.htm (Accessed 10

September 2009)

Cheung, C and Lee, Matthew, K.O., (2006), “Understanding Consumer Trust in Internet

Shopping: A Multidisciplinary Approach”, Journal of the American Society for

Information Science and Technology, Vol. 57(4), (2006), PP: 479-492

Childers, T., Carr, C., Peck, J. and Carson, S., (1997), “Hedonic and Utilitarian

Motivations for Online Retail Shopping Behavior”, Journal of Retailing, Vol. 77,

(1997), PP: 511-535

Chiung-wen (Julia) Hsu, (2006), “Privacy concerns, privacy practices and web site

categories toward a situational paradigm” Online Information Review, Vol. 30(5),

(May 2006), PP: 569-586

Choi, J. & Lee, K., (2003), “Risk perception and e-shopping: a cross-cultural study”,

Journal of Fashion Marketing and Management, Vol. 7(1), (2003), PP: 49-64

CIS (Consumer Information Sheet) (2012), “Protect Your Computer from Viruses,

Hackers, and Spies” State of California, office of the Attorney General.

Page 7: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

vii

Civic Consulting report, (2011), “Consumer market study on the functioning of e- commerce

and Internet marketing and selling techniques in the retail of goods”, Civic

Consulting (Executive Agency for Health and Consumers)

Claire Gauzente and Ashok Ranchhod (2001), “Ethical Marketing for Competitive

Advantage on the Internet” Academy of Marketing Science Review, Vol.10,

(2001), PP: 251-259

Coleman, D. and Levine, S., (2008), “Collaboration 2.0: Technology and Best Practices for

Successful Collaboration in a Web 2.0 world Cupertino”, (HappyAbout.Info.)

CPC (Computer Consultants), (2008), INC. - WWW.CPCCCI.COM

Crabtree B. F., and Miller, W. L. (1999), “Using codes and code manuals: a template

organizing style of interpretation”, Doing Qualitative Research, London, Sage, 2nd

Edition, Newbury Park, California: Sage

Cranor Lorrie Faith & LaMacchia, Brain.A., (1998), “Spam!”, Journal of Communications

of the ACM, Vol. 41(8), (Aug. 1998),PP: 74-83

Creyer, E.H., and Ross, W.T., (1997), “The Influence of Firm Behavior on Purchase

Intention: Do Consumers Really Care About Business Ethics?” Journal of Consumer

Marketing, Vol. 14(6), (1997), PP: 421-432

Cristianini, N., & Taylor, J. S. (2003), “An Introduction to Support Vector Machines and

Other Kernel Based Learning Methods”, Cambridge University Press, Vol. 24(2),

(2003), PP: 105-106

Cronbach Lee Joseph (1990), “Essentials of Psychological Testing”, 5th Edition, New

York: Harper & Row

Crowe, E., & Higgins, T. (1997), “Regulatory Focus and Strategic Inclinations: Promotion

and Prevention in Decision-Making”, Organizational Behavior and Human

Decision Processes, Vol. 69 (2), (1997), PP: 117-132

Csikszentmihalyi, Mihaly (1977), “Beyond Boredom and Anxiety”, 2nd

printing. San

Francisco: Jossey-Bass.

Culnan Marry J. (1999), “Georgetown Internet Privacy Policy Study”, (August 1999),

Available at: http://neptune.gsb.georgetown.edu/culnan/gippshom.htm

Culnan, Mary J. (2000), “Protecting Privacy Online: Is Self-Regulation Working?”,

Journal of Public Policy and Marketing, Vol. 19(1), (2000), PP: 20-26

Culnan, Mary J., and Pamela K. Armstrong, (1999), “Information Privacy Concerns,

Procedural Fairness and Impersonal Trust: An Empirical Investigation”, Organization

Science, Vol. 10(1), (1999), PP: 104-115

Page 8: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

viii

Cyr, Diane (2000), “Your New Customer”, Catalog Age, (July, 2000) PP: 125–132

Rowland D. and McDonald E. (2000), “Information Technology Law”, 2nd

Edition,

Cavendish Publishing, 2000

Dall’Olmo Riley Francesca, Scarpi Daniele & Manaresi Angelo (2005), “Drivers and

barriers to online shopping: An examination of product, consumer and retailers

factors”, In I. Clarke & T.B. Flaherty (Eds.) Advances in Electronic Marketing. USA:

Idea Group.

Dancey, C.P.andReidy, J. (2007), Statistics without maths for psychology, England,

Pearson Education Limited.

Dane Myer, “A Cure for Credit Card Fraud - Orbiscom shoots to end e-shoppers' security

concerns.(Company Business and Marketing)”, Ziff Davis Smart Business for the

New

David B. Meinert and Dane K. Peterson, (2006), “Would Regulation of Web Site Privacy

Policy Statements Increase Consumer Trust?”, Journal of Informing Science, Vol. 9,

(2006), PP: 123

Davis, F.D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of

information technology”, Journal of MIS Quarterly, Vol. 13(3), (1989), PP: 319-40

Davis, Judy (1997), “Property Rights to Consumer Information: A Proposed Policy

Framework for Direct Marketing”, Journal of Direct Marketing, Vol. 11 (summer),

PP: 32-43

Davis, Scott, Eitan Gerstner and Michael Hagerty (1995), “Money Back Guarantees in

Retailing: Matching Products to Consumer Tastes,” Journal of Retailing, Vol.

71(Spring), PP: 7-22

Dayal, S., Landesberg, H., Zeisser, M., (1999), “How to build trust online”, Journal of

Marketing Management, Vol. 8 (3), (1999), PP: 64–71

Deborah M. Markley and David L. Barkley, (2005), “Case Studies of E-commerce

activity in rural and small town businesses”, Cooperative State Research, Education

and Extension Service, U.S. Department of Agriculture

Deborah Platt Majoras, (2007), “Implementing the Children’s online privacy Protection

Act”, A Federal Trade Commission Report to Congress, (May 2007)

Deckmyn, D. (1999), “Critics say self-regulation effort may 'legitimize' Spam”,

Computerworld, Vol. 33(35), (1999), PP: 41-42

Deitel, H., Deitel, P., and Neito, T. (2001), “E-Business and E-Commerce (How To

Program)”, Prentice Hall, 4th Edition, New Jersey

Page 9: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

ix

Delafrooz N, Paim LH, Haron SA, Sidin SM, Khatibi A (2009), “Factors affecting

students’ attitude toward online shopping”, African Journal of Business

Management, Vol. 3(5), (2009), PP: 200-209

Dellaert, Benedict G.C. and Barbara E. Kahn (1999), “How Tolerable is Delay: consumers’

Evaluations of Internet Web Sites after Waiting,” Journal of Interactive Marketing,

Vol. 13(1), (winter 1999), PP: 41-54

Derbaix, C. (1983), “Perceived Risk and Risk Relievers: An Empirical Investigation”,

Journal of Economic Psychology, Vol. 3, (1983), PP: 19–38

Derlega, Valerian J., and Alan L. Chaikin (1975), “Sharing intimacy”, Prentice-Hall

Devaraj, S., Fan, M., Kohli, R. (2003), “E-loyalty: Elusive ideal or competitive edge?”,

Journal of Communications of the ACM, Vol. 46(9), (2003), PP: 184-191

Dhillon, Gurpreet S., and Trevort T. Moores (2001), “Internet Privacy: Interpreting Key

Issues”, Information Resources Management Journal, Vol.14 (4), (2001), PP: 33-37

Dhinaharan Nagamalai, Cynthia Dhinakaran, and Jae Kwang Lee (2007), “Multi layer

approach to defend DDoS attacks caused by spam”, Proceeding of International

Conference on Multimedia and Ubiquitous Engineering, PP: 97-102

Dibb, S., Simkin, S., Pride, W. and Ferrel, O. (2001), “Marketing. Concepts and strategies”,

Forth European Edition, New York: Houghton Mifflin

Dillon, T. D., and Reif, H. L., (2004), “Factors influencing consumer’s e-commerce

commodity purchases”, Journal of Information Technology, Vol. 22(2), (2004), PP:

1-12

Dittmar, H., Long, K. and Meek, R. (2004), “Buying on the internet: gender difference in on-

line and conventional buying motivations’, Sex Roles, Vol. 50(5), PP: 423–444

Dobie, K., Grant, J. and Ready, K. (2001), “Product motivation and purchasing activity: an

explanatory study of consumers: Internet purchasing activity”, Journal of Promotion

Management, Vol. 6(1/2), PP. 31-43

Dommeyer, Curt J. and Barbara L. Gross (2003), “What Consumers Know and What

They Do: An Investigation of Consumer Knowledge, Awareness, and Use of Privacy

Protection Strategies”, Journal of Interactive Marketing, Vol. 17 (2), (2003), PP: 34-

51

Doney, P. M. and Cannon, J. P., (1997), “An Examination of the Nature of Trust in

Buyer-Seller Relationships”, Journal of Marketing, Vol. 61, (April 1997), PP: 35-51

Donna L. Hoffman, Thomas P. Novak, and Marcos Peralta, (1999), “Building Con Trust

Online”, Journal of Communication of the ACM, Vol. 42(4), (April 1999)

Page 10: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

x

Doolin B., Dillon S., Thompson F. and J. L. Corner, (2005), “Perceived Risk, the Internet

Shopping Experience and Online Purchasing Behaviour: A New Zealand

Perspective”, Journal of Global Information Management, Vol. 13(2), (2005), PP:

66-88

Dora Brown, Gerard Oleksik and Dinah Bisdee, (2007), “Consumer attitudes review”,

Report Prepared for the Office of Fair Trading

Douglas, Ching Shan HUI (2001), “Key Aspects on Consumer Behaviour of Hong Kong

Internet Shopper”, Social Science Research Network Electronic Paper Collection,

(Oct. 2001), Available at SSRN: http://ssrn.com/abstract=287917 or

http://dx.doi.org/10.2139/ssrn.287917

DPA (Data protection report), (2000), “Personal information online code of practice”

Ducoffe, R.H. (1996), “Advertising value and advertising on the web”, Journal of

Advertising Research, Vol. 36, (September/October 1996), PP: 21–36

E-commerce Survey Project (2000), Reverse Logistics Executive Council & University of

Nevada, Reno, February 2000.

Efrim Boritz and Won Gyun, (2002), “Internet Privacy: Framework, Review and

Opportunities for Future Research”, Proceedings of 41st Annual Hawaii

International Conference on System Sciences

Efrim Boritz, Sundar Raj, (2006), “Internet Privacy Research: Framework, Review and

Opportunities”, Advances in experimental social psychology, Vol. 20, (June 2006),

PP: 1-63

Egger A. (2006), “Intangibility and perceived risk in online environments”, paper presented

at the Academy of Marketing, University of Middlesex, London, (July 2006)

Eighmey, J., (1997), “Profiling user responses to commercial Web sites”, Journal of

Advertising Research, Vol. 37(3), (1997), PP : 59-66

Elliot, S. and Fowell, S. (2000), “Expectations versus reality: A snapshot of consumer

experiences with Internet retailing”, International Journal of Information

Management, Vol. 20(5), (2000), PP: 323-336

Engstrom U, Sandred J. (1999), Etik och moral -en kompass i cyberrymder, Argument

Forlag AB, Uppsala

Enrico Blanzieri and Anton Bryl, (2007), “A Survey of Learning-Based Techniques of

Email Spam Filtering”, Information Engineering and computer science department,

University of Trento

Page 11: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xi

Ernst and Young (1999), “The second annual Ernst and Young Internet shopping study”,

Assessed August 10, 2007 from http://www.e-

consultancy.com/knowledge/whitepapers/9/the/second-annual-Internet-shopping-

study.html.

European Commission, (2012), “Bringing e-commerce benefits to consumers”,

Commission Staff working document

Evangelos Moustakas, C. Ranganathan and Penny Duquenoy (1997), “Unsolicited

Commercial Email (Spam): An Exploratory understanding using stakeholder

analysis”

Evangelos Moustakas, C. Ranganathan, and Penny Duquenoy (2005), “Combating spam

through legislation: A comparative analysis of us and European approaches”,

Proceedings of Second Conference on Email and Anti- Spam, CEAS-2005

Ewald A. Kaluscha and Sonja Grabner-Krauter, (1996), “Towards A pattern language for

consumer trust in electronic commerce”, Eighth European Conference on Pattern

Languages of Programs (EuroPLop'03), 25-29 June 2003, Irsee, Germany

Eytan Adar and Bernardo Huberman (2001), “A Market for Secrets,” First Monday 6(8),

August 6, 2001. http://www.firstmonday.org/issues/issue6 8/adar/

Fabio Ancarani and Venkatesh Shankar, (2002), “Price Levels and Price Dispersion: A

Comparison of Pure Play v/s Bricks-and-Mortar v/s Bricks-and-Clicks Retailers”, E-

business Research Center Working Paper, Assessed (July 2007) On-line, Available:

http://www.ebrc.psu.edu/publications/researchpapers.html.

Faisal Al-Madi, Abdelghafour Al-Zawahreh, Suha Al-Qawasmi, (2005), “Determinants of

Consumer's Attitudes to Electronic Marketing in Jordan”, International Journal of

Management, Vol. 30(2), (2005), PP: 536-545

Farahat, A. and Bailey, M. (2012), “How effective is targeted advertising?”, Proceedings of

the 21st international conference on World Wide Web”, PP: 111-120

Farookh Khadeer Hussain, Elizabeth Chang and Tharam Dillon, (1998), “Factors of trust that

influence trustworthiness in Peer-to-Peer based E-commerce”, Proceeding of

international workshop of Business and information, Taipei, Taiwan

Fatimah, M.A. (2000), “Prioritizing research agenda for e-commerce in Malaysia”,

Proceedings of International Conference on Electronic Commerce, Emerging

Trends in E-Commerce, Kuala Lumpur, Malaysia, (Nov. 2000), Multi Media

University

Page 12: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xii

FBI Internet Fraud Complaint Center (2001), “Internet Fraud Watch of the National

Consumer League (NCL)”, NCL’s On-line shopping survey, (Aug 2001)

Federal Trade Commission (1998), “Privacy Online: A Report to Congress”, Accessed

June 2011, Available at: http://www.ftc. gov/reports/privacy3/priv23a.pdf

Federal Trade Commission (2005), “The UD safe web Act, protecting consumers from

Spam, spyware and fraud”, A legislative recommendation to congress, June 2005,

www.ftc.gov.

Federal Trade Commission, (1998), “Privacy Online”, Report to Congress, June 1998, PP: 24

First Data report (FDR), (2008), “Consumer Online Shopping Fears”

Fisher Dennis (2005), “Phishing is big business”, eWeek, (7 March 2005), Available at:

www.eweek.com/print_article2/0,2533,a ¼ 147067,00.asp

Forrester Research (2000a), “Young consumers ignore offline brands’’, Available at:

www.forrester.com

Forsythe, S.M. and Shi, B. (2003), “Consumer patronage and risk perceptions in internet

shopping”, Journal of Business Research, Vol. 56(11), (2003), PP: 867-875

Fox, S. (2000), “Trust and privacy online: Why Americans want to rewrite the rules”,

Pew Internet & American Life Project, Assessed September, 2009, from

http://www.pewinternet.org

Foxman, Ellen R. and Paula Kilcoyne (1993), “Information Technology, Marketing

Practice, and Consumer Privacy: Ethical Issues”, Journal of Public Policy and

Marketing, Vol. 12 (Spring), (1993), PP: 106-19

France Belanger, Janine S. Hiller and Wanda J. Smith, (2002), “Trustworthiness in

electronic commerce: the role of privacy, security, and site attributes”, Journal of

Strategic Information Systems, Vol. 11, (2002), PP: 245–270

Freeman, L. A. and Urbaczewski, A. (2005), “Why do people hate Spyware?”, Journal of

Communications of the ACM, Vol. 48(8), (2005), PP: 5053

FTC (2000), online profiling: A report to congress, July 2000, Federal Trade Commission

FTC (2008), “Minimizing the Effects of Malware on computer”

Ganesan S. (1994), “Determinants of long-term orientation in buyer-seller relationships”,

Journal of Marketing, Vol. 58, (1994), PP: 1-19

Gary S. Robertshaw and Norman E. Marr, (1998), “Voluntary Disclosures of Personal

Information for Direct Marketing Purposes: A Quantitative and Qualitative

Comparison of Differences between Contributors and Abstainers”, Journal of Direct,

Data and Digital Marketing Practice, Vol. 5(34), (1998)

Page 13: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xiii

Gefen D. and Straub D. W., (2000), “The relative importance of perceived ease-of-use in IS

acceptance: A study of e-commerce acceptance”, Journal of Association for

Information Systems, Vol. 1(8), (2000), PP: 1-30

Gefen, D. (2000), “E-commerce: The role of familiarity and trust”, OMEGA, The

International Journal of Management Science, Vol. 28(6), (2000), PP: 725-737

Gefen, D., Karahanna, E., and Straub, D. W., (2003), “Trust and TAM in Online Shopping:

an Integrated Model”, Journal of Management Information Systems Quarterly,

Vol. 27(1), (2003), PP: 51-90

Gefen, E. Karahanna, and D. W. Straub, (2003), “Inexperience and Experience With

Online Stores: The Importance of TAM and Trust”, IEEE Transactions On

Engineering Management, Vol. 50, (2003), PP: 307-321

George R. Milne and Andrew J. Rohm, (2000), “Consumer Privacy and Name Removal

Across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives”,

Journal of Public Policy & Marketing, Vol. 19(2), (Fall 2000), PP: 238-249

George R. Milne, (2000), “Privacy and Ethical Issues in Database/Interactive Marketing and

Public Policy: Research Framework and Overview of the Special Issue”, Journal of

Public Policy & Marketing, Vol. 19(1), (Spring 2000), PP: 1-6

Gerbing, D. W. and Anderson, J. C. (1988), “An updated paradigm for scale development

incorporating unidimensionality and its assessment”, Journal of Marketing

Research, Vol. 25(2), (1988), PP: 186-192

Gervey. B and J. Lin (2000), “Obstacles on the Internet: a new Advertising Age survey

finds privacy and security concerns are blocking the growth of e-commerce,” Journal

of Public Policy & Marketing, Vol. 19(3), PP: 12-26.

Ghose, S. and Dou, W. (1998), “Interactive functions and their impacts on the appeal of

Internet presence sites”, Journal of Advertising Research, Vol. 38(2), (1998), PP: 29-

43

Gina Stevens, (2010), “Federal Information Security and Data Breach Notification

Laws”, Congressional Research Service Report for Congress

Glass, A.D., (1998), “Acountdown to the age of secure electronic commerce”, Credit

World, Vol. 86(5), (1998), PP: 29–31

Godwin J. Udo, (2001), “Privacy and security concerns as major barriers for e-commerce:

a survey study”, Journal of Information Management and Computer Security, Vol.

9(4), (2001), PP: 165-174

Page 14: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xiv

Goodwin, Cathy (1991), “Privacy: Recognition of a Consumer Right”, Journal of Public

Policy and Marketing, Vol. 10, (Spring 1991), PP: 149-66

Govani, T., and Pashley, H., (2009), “Student Awareness of the Privacy Implications

while Using Facebook” Assessed Nov. 2009 from

http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf, 2009

Gralla, Preston (2007), “How to Surf Anonymously without a Trace,” Computerworld,

(March 2007), Accessed March 24, 2009 from http://www.computerworld.com

Green, H., Yang, C., Judge, P.C., (1998), “A little privacy, please”, Business Week, 3569,

PP: 98–99

Grimes, G. (2004), “Issues with Spam”, Computer Fraud & Security, Vol. 5, (2004), PP: 12-

16

Gohary (2010), “Understanding Credit Card Frauds”, Journal of Cards Business Review,

Vol. 15(2), 2004, PP: 16-27

Grossbart, S. and Kennedy, P. (1995), “Interactive media and retail patronage”, W.R. (Ed.),

The Cutting Edge

Guangying Hua, (2009), “An Experimental Investigation of Online Banking Adoption in

China”, Journal of Internet Banking and Commerce, Vol. 14(1), (April 2009)

Gurvinder S Shergill and Zhaobin Chen, (2005), “Web based shopping: Consumer’s

attitudes towards online shopping in New Zealand”, Journal of Electronic

Commerce Research, Vol. 6(2)

GVU (Graphic, Visualization and Usability Centre), (1998), “The GVU's Ninth WWW

User Survey Report” Graphic, Visualization and Usability Center, Georgia Tech

Research Corporation, 1998.

Ha, Vicki, Farah Al Shaar, Kori Inkpen, and Lina Hdeib (2006), “An Examination of

User Perception and Misconception of Internet Cookies,” in CHI 2006 Extended

Abstracts on Human Factors in Computing Systems. Montreal: Association for

computer Machinery Digital Library, 833–38.

Haines, M. (2001), “E-marketing efforts of IT solution providers: what can be expected in

the next 12 months”, Var Business, Vol. 17(14), (2001), PP: 68

Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E. and Tatham, R. L. (2009),

“Multivariate Data Analysis”, 7th Edition, Upper Saddle River, Pearson Education,

Inc. Delhi

Hair, J. F., Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998), “Multivariate

Data Analysis” 5th Edition, California: Prentice-Hall International Inc, 1998

Page 15: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xv

Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C., (1995), “Multivariate Data

Analysis”, 4th Edition, New Jersey:Prentice Hall, 1995

Hamed Armesh, Habibollah Salarzehi, Noor Mohammad Yaghoobi, Alireza heydari and

Davoud Nikbin, (2010), “The Effects of Security and Privacy Information on Trust

and Trustworthiness and Loyalty in Online Marketing in Malaysia”, International

Journal of Marketing Studies, Vol. 2(2), (November 2010)

Harris Interactive, Why some companies are trusted and others are not: personal experience

and knowledge of company more important than glitz, June 2001b, Retrieved on June

2009: http://www.harrisinteractive.com/harris_poll/index.asp?PID ¼ 237.

Harris Poll. (2000), “Online Privacy: A Growing Threat”, Business Week, (March 20,

2000), PP: 96

Harry, B., (1992), “Cultural Diversity, Families, and the Special Education System”,

Teachers College Press, New York, NY, 1992

Hassan, T., Cole, P., & Fung C.C. (2006), “An Intelligent SPAM Filter – GetEmail5”,

Proceedings of the 2nd IEEE International Conference on Cybernetics and

Intelligent Systems (CIS2006), Bangkok Thailand, 7-9 June, PP: 86-90

Hassanein, K. and Head, M., (2007), “Manipulating perceived social presence through the

web interface and its impact on attitude towards online shopping,” Human-Computer

Studies, Vol. 65, (2007), PP: 689-708

Haubl Gerald and Trifts Valerie (2000), “Consumer decision making in online shopping

environments: The effects of interactive decision aids”, Journal of Marketing

Science, Vol. 19(1), (Winter 2000), PP: 4-21

Hauser, J. and Wernerfelt, B. (1990), “An evaluation cost model of consideration sets”,

Journal of Consumer Research, Vol. 16(4), PP: 393-408

Heijden H., T. Verhagen and M. Creemers, (2001), “Predicting online purchase behaviour:

Replications and tests of competing models”, Proceedings of the 34th Hawaii

International Conference on Systems Sciences

Hess, D. J., Chu, W., and Gerstner, E. (1996), “Controlling Product Returns in Direct

Marketing,” Marketing Letters, Vol. 7(4), (1996), PP: 307-317

Higgins, A. (2003), “Anti-Spam Anti- Spam Anti- Spam”, IBM Corporation, White

Plains, NY.

Ho, C. F. & Wu, W. H. (1999), “Antecedents of Customer Satisfaction on the Internet: An

Empirical Study of Online Shopping”, Proceedings of the 32nd Hawaii

International Conference on System Sciences, Hawaii, USA

Page 16: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xvi

Hoa Nguyen, Ariel Fuxman, Stelios Paparizos, Juliana Freire and Rakesh Agrawal,

(2011), “Synthesizing Products for Online Catalogs”, August 29th - September 3rd

2011, Seattle, Washington, Proceedings of the VLDB Endowment, Vol. 4(7), PP:

409-418

Hochhauser, M. (2003), “Why Patients Won’t Understand Their HIPAA Notices”,

Privacy Rights Clearinghouse, website: http://www.privacyrights.org/ar/HIPAA-

Readability.htm.

Hoffman, Donna L. and Thomas P. Novak (1996a), “Marketing in Hypermedia Computer-

Mediated Environments: Conceptual Foundations,” Journal of Marketing,

Vol. 60 (July 1996), PP: 50-68.

Hoffman, Donna L., Novak, Thomas P., & Chatterjee, P. (1995), “Commercial Scenarios for

the Web: Opportunities and Challenges”, Journal of Computer-Mediated

Communication, Vol. 1(3). Available at: http://www.shum.cc.huji.ac.il/jcmc/vol1/

issue3/vol1no3.html.dec1995

Hoyer, wayne D (1984), “An examination of consumer decision making for common

repeat purchase product”, Journal of consumer research, Vol.11, PP: 822-29

Hui, K.-L., Teo, H. H., and Lee, S.-Y. T., (2007), “The Value of Privacy Assurance: An

Exploratory Field Experiment”, Journal of MIS Quarterly, Vol. 31(1), 2007, PP: 19-

33

Human Capital (2009), “Youth and Music Survey”, Available online at:

http://www.marrakeshrecords.com/Youth%20and%20Music%20Survey%202009%20

(c)%20Marrakesh%20Records%20Ltd.pdf (accessed 23.03.09)

Internet & Mobile Association of India report, (2008), “Online Banner Advertisement

Market in India”, A Report by the E-Technology Group for Internet and Mobile

Association of India

Iyer, G.R., Miyazaki, A.D., Grewal, D., & Giordano, M. (2002), “Linking Web-Based

Segmentation to Pricing Tactics”, Journal of Product and Brand Management, Vol.

11, PP: 288–302

Jacobs, P., (1997), “Privacy: what you need to know”, Information World, Vol.: 19(44),

(1997), PP: 111–112

Jacqueline D. (2010), “Lipton, Mapping Online Privacy”, 140 N.W. U. L Rev. 477, 481-82

(2010)

Jacques Nantel and William A. Weeks (1996), “Marketing ethics: is there more to it than the

utilitarian approach?”, European Journal of Marketing, Vol. 30(5), (1996), PP: 9-19

Page 17: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xvii

Janice Y. Tsai, Serge Egelman, Lorrie Cranor and Alessandro Acquisti, (2011), “The

Effect of Online Privacy Information on Purchasing Behavior: An Experimental

Study”, Journal of Information Systems Research, Vol. 22(2), (June 2011), PP:

254–268

Jarvenpaa, S. and Todd P. A. (1997), “Consumer reactions to electronic shopping on the

World Wide Web”, International Journal of Electronic Commerce, Vol. 1(2), 1996–

1997, PP: 59–88

Jarvenpaa, S. L. (1996-1997), “Consumer reactions to electronic shopping on the World

Wide Web”, International Journal of Electronic Commerce, Vol. 1(2), PP: 59-88

Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000), “Consumer trust in an Internet

store”, Journal of Information Technology and Management, Vol. 1, (2000), PP:

45-71

Jarvenpaa, S.L., Tractinsky, N., Saarinen L., and Vitale, M. (1999), “Consumer trust in an

Internet store: a cross-cultural validation”, Journal of Computer Mediated

Communication, Vol. 15(2), PP: 1-37

Jason Chan, Zhenhui Jiang, and Bernard Tan, (2009), “Understanding Online

Interruption-Based Advertising: Impacts of Exposure Timing, Advertising Intent and

Brand Image”, Journal of IEEE Transactions on Engineering Management, Vol.

57(3), (August 2010), PP: 365-379

Javis, S. (2000), “Companies tell all about consumer privacy”, Marketing News,

Vol.:34,(December 4 2000), PP: 3

Jedd, M. (2000), “Returns happen”, Journal of Inbound Logistics, (February 2000), PP: 22-

30

Jensen, C. and Potts, C. (2004), “Privacy policies as decision-making tools: an evaluation

of online privacy notices”, Proceedings of the SIGCHI conference on Human

Factors in Computing Systems, PP: 471-478

Jensen, Carlos, Colin Potts, and Christian Jensen (2005), “Privacy Practices of Internet

Users: Self-Reports Versus Observed Behavior,” International Journal of Human-

Computer Studies, Vol. 63 (July 2005), PP: 203–227

John B. Horrigan, (2008), “Internet users like the convenience but worry about the

security of their financial information” Pew Internet and American life Project,

Available at: http://www.pewinternet.org/

Page 18: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xviii

Jonna Jarvelainen (2007), “Online Purchase Intentions: An Empirical Testing of a

Multiple-Theory Model”, Journal of organizational computing and electronic

commerce, Vol. 17(1), (2007), PP: 53–74

Joppe, M. (2000), “The Research Process”, Retrieved February 25, 2009, (Online)

Available:http://www.htm.uoguelph.ca/pagefiles/MJResearch/ResearchProcess/home.

html

Jun, M., Yang, Z. & Kim, D.S. (2004), “Customers’ perceptions of online retailing

service quality and their satisfaction”, International Journal of Quality & Reliability

Management, Vol. 21(8), (2004), PP: 817-840

Jupiter Communications (2000), “Creating Loyalty: Building Profitable Relationships”,

Jupiter Vision Report: Digital Commerce, Vol. 2

Jupitor Communication (2000), “E-Mail Marketing Delivering the Message” Available at:

http/cybertias.internet.com/markets/advertising/article/0,1323,5941,356791.

Kaiser, H. (1974), “An index of factorial simplicity”, Journal of Psychometrika, Vol. 39,

(1974), PP: 31-36

Kang, J. (1998), “Information Privacy in Cyberspace Transactions”, Stanford Law

Review, Vol. 50, (1998), PP: 1193-1294

Kathleen Ann Ruane (2008), “Selected Laws Governing the Disclosure of Customer

Phone Records by Telecommunications Carriers”, Congressional Research Service

report for congress

Keen, P.G.W. (1999), “Electronic Commerce Relationships: Trust by Design”, Englewood

Cliffs, NJ: Prentice-Hall, 1999

Keeney, R.L., (1999), “The value of Internet commerce to the customer,” Journal of

Management Science, Vol. 45(4), (1999), PP: 533-542

Kerlinger, F. N. (1973), “Foundation of Bahaviour Research”, Holt, Rienhaet and Winston,

Inc., New York, NY

Kidwel B., and Jewel R., (2003), “An examination of perceived behavioral control:

internal and external influences on intention”, Journal of Psychology and Marketing,

Vol. 20(7), (2003), PP: 625-640

Kim, D.J., Ferrin, D.L. and Rao, H.R., (2009), “Trust and satisfaction, the two wheels for

successful e-commerce relationships: a longitudinal exploration,” Journal of

Information Systems Research, Vol. 20(2), (2009), PP: 237-257

Page 19: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xix

Kinnard, Shannon (2000), “Marketing With E-mail. A Spam-Free Guide to Increasing

Sales, Building Loyalty, and Increasing Awareness”, Second Edition. Gulf Breeze:

Maximum Press.

Kleinmuntz, Don N., David A. Schkade (1993), “Information displays and decision

processes”, Journal of Psychological Science, Vol. 4(4), (July 1993), PP: 221-227

Kobsa A. (2004), “Clear Privacy Practices Boost Online Sales”, Assessed November 22,

2009 from http://www.truste.org/articles/kobsa~oct.php

Kosiur Dave (1997), “Understanding Electronic Commerce”, Microsoft Press.

Kossecki Pawel, Swierczynska-Kaczor Urzula (2003), “No Trust, No Transaction-The

Implication for Te Internet Suppliers”, Information Security Solution European

Conference, The European contribution, Speech/00/344.

Kotler Philip (2003), “Marketing Management”, 11th

Edition, Upper saddle River, NJ:

Prentice Hall

Kotler Philip (2004), “Principles of marketing”, European Fourth Edition, Prentice Hall

Krishnamurthy Sandeep (2000), “Spam Revisited”, Journal of Computer world, Vol.

32(18), (2000), PP: 33-34

Krishnamurthy Sandeep (2000), “Spam revisited”, Quarterly Journal of Electronic

Commerce, Vol. 1(4), (2000), PP: 305-321

Kunkel, D., & Wilcox, B. (2001), “Children and media policy” In D. G. Singer and J. L.

Singer (Eds.), Handbook of children and the media, Thousand Oaks, CA: Sage, PP:

589-604

Kuo Y. F., (2003), “A study on service quality of virtual community websites”, Total

Quality Management, Vol. 14(4), (2003), PP: 461-473

Kuo, W.H. and L. Nan, (1977), “Assimilation of Chinese-Americans in Washington”, The

Sociological Quarterly, Vol. 18, (Summer 1977), PP: 340-352

L. Ha, (1996), “Observations: Advertising Clutter in Consumer Magazines: Dimensions and

Effects”, Journal of Advertising Research, Vol. 36, (1996), PP: 76-84

L.R. Vijayasarathy and J.M. Jones. (2000), “Print and Internet catalog shopping: Assessing

attitudes and intentions”, Journal of Internet Research, Vol. 10(3), (Summer 2000),

PP: 191-202

La Rose, Robert and Nora J. Rifon. (2007), “Promoting i-Safety: Effects of Privacy

Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior”,

Journal of Consumer Affairs, Vol. 41(1), (2007), PP: 127-149

Langford D. (2000), “The Internet Ethics”, Macmillan Press Ltd London

Page 20: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xx

Lardner, J. (1999), “I know what you did last summer and fall’’, US News and World

Report, Vol. 126(15), (1999), PP: 55

Lavin Marilyn (2006), “Cookies: What do consumers know and what can they learn?”,

Journal of Targeting, Measurement and Analysis for Marketing, Vol. 14(4), (2006),

PP: 279–288

Lee, Charles M. C. (1992), “Earnings News and Small Traders: An Intraday Analysis,”

Journal of Accounting and Economics, Vol. 15, (1992), PP: 265 - 302

Lewis Michael (2005), “The Effect of Shipping Fees on Purchase Quantity, Customer

Acquisition and Store Traffic,” Working Paper, University of Florida

Li Guo (2011), “A Research on Influencing Factors of Consumer Purchasing Behaviors in

Cyberspace”, International Journal of Marketing Studies, Vol. 3(3), August 2011

Li, H., Kuo, C., and Russell, M. G. (1999), “The impact of perceived channel utilities,

shopping orientations, and demographics on the consumers online buying behavior”,

Journal of Computer-Mediated Communication, Vol. 5(2), (1999), PP: 1-20

Liao, Z. and Cheung, M. T. (2001), “Internet based E-shopping and Consumer Attitudes: An

Empirical Study,” Journal of Information and Management, Vol.38, (2001), PP:

299-306.

Lim, N. (2003), “Consumer’s perceived risk: sources versus consequences”, Electronic

Commerce Research and Applications, Vol. 2(3), (2003), PP: 216-228

Linn A (2004), “Bugged by Spies” Imports Clag Computers USA Today (November 01)

Linn, John (2005), “Technology and Web User Data Privacy,” Journal of IEEE Security

and Privacy, Vol. 3 (January–February 2005), PP: 52–58

Liu C., Arnett K. P., (2000), “Exploring the factors associated with Web site success in the

context of electronic commerce”, Journal of Information and Management, Vol. 38,

(2000), PP: 23–33

Liu, C., Marchewka, J. T., and Ku, C. (2004), “American and Taiwanese perceptions

concerning privacy, trust, and behavioral intentions in electronic commerce”,

Journal of Global Information Management, Vol. 12(1), (2004), PP:18-40

Liu, C., Marchewka, J. T., Lu, J., and Yu, C-S., (2005), “Beyond concern—a privacy-

trust-behavioral intention model of electronic commerce”, Journal of Information

and Management, Vol. (42), (2005), PP: 289-304

Livingstone Sonia and Bober Magdalena (2005), “UK children go online: Final report of key

project findings”, London: London School of Economics and Political Science

Page 21: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxi

Lohse, G. L., and Spiller, P., (1998), “Electronic Shopping: Quantifying the Effect of

Customer Interfaces on Traffic and Sales”, Journal of Communications of the ACM,

Vol. 41(7), (1998)

Lorek, L. A. (2003), “Buyers catch on to online shopping”, San Antonio Express-News,

(Online), (Assessed Dec. 22, 2008), http://web.lexisnexis. com/universe/document

Louviere J. and G. Gaeth (1987), “Decomposing the determinants of retail facility choice

using the method of hierarchical information integration: A supermarket illustration”,

Journal of Retailing, Vol. 63, (1987), PP: 25-48

Lucian Vasiu, Matt Warren and David Mackay, (2002), Personal information Privacy

Issues in B2C E-commerce: A Theoretical Framework”, Available at:

http://www.collecter.org/archives/2002_December/16.pdf

M Jaeger and N L. Clarke (2006), “The Awareness and Perception of Spyware amongst

Home PC Computer Users”, published in the Proceedings of 7th Australian

Information Warfare and Security Conference, Edith Cowan University, Perth

Western Australia, 4th - 5th December, 2006

M. Jose Garrido Samaniego, Ana M. Gutierrez Arranz and Rebeca San Jose Cabezudo,

(2006), “Determinants of internet use in the purchasing process”, Journal of Business

and Industrial Marketing, Vol. 21(3), (2006), PP. 164–174

M. Porter, (2000), “Buyers want Web Privacy”, Purchasing, Vol. 129, (Sep. 2000), PP: 22-25

Mackline Ben (1999), “E-Commerce at what price: Privacy protection in the Information

Economy”, Berkeley Technology Law Journal, Vol. 20, (March 1999), PP: 14-28

Maes (1999), “Smart Commerce: The Future of Intelligent Agents in Cyberspace”,

Journal of Interactive Marketing, Vol. 13(3), (1999), PP: 66-76

Magee, M. (2003), “Boom or bust for e-shopping”, The Sunday Tribune, (Online),

Assessed December 22, 2008, http://web.lexisnexis.com/universe/document

Maignan, I., and Lukas, B.A. (1997), “The Nature and Social Uses of the Internet: A

Qualitative Investigation”, Journal of Consumer Affairs, Vol. 31(2), (1997), PP:

346–371

Mainardi, J. (1998), “Electric Marketing is wired to sales growth”, Life Association News

(LAN), Vol. 93(4), (1998), PP: 108-109

Malhotra, B. A. (2005), “Electronic retailing”, In M. Krafft & M. K. Mantrala (Ed.),

Retailing in the 21st Century Current and Future Trends (PP: 309–323), Berlin,

Germany: Springer

Page 22: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxii

Mannix, M. (1999), “Watch for Web hazards and you’ll shop hitch free”, U.S. News and

World report, Vol. 13, (1999), PP: 76

Mariko Morimoto and Susan Chang,(2006), “Consumers’ attitudes toward unsolicited

commercial e-mail and postal direct mail marketing methods: intrusiveness, perceived

loss of control, and irritation”, The Journal of Interactive Advertising, Vol. 7(1),

(2006)

Martin, B. A. S., (2003), “Email Advertising: Exploratory Insights from Finland”,

Journal of Advertising Research, Vol. (43)3, (2003), PP: 293-300

Martin, David, Hailin Wu, and Adil Alsaid (2003), “Hidden Surveillance by Web Sites:

Web Bugs in Contemporary Use,” Journal of Communications of the ACM, Vol. 46,

(Dec. 2003), PP: 258–264

Mathias Klang (2004), “Spyware – the ethics of covert software”, Journal of Ethics and

Information Technology, Vol. 6, (2004), PP: 193–202

Mayer and Viktor (1996), “Improving Computer Security on the Internet through Novel

Legal Venues - Cookies for a Treat”? Proceedings of European Institute for

Computer Anti-Virus Research, (1996), PP: 155-162

McCandlish, Stanton (2009), “EFF’s Top 12 Ways to Protect Your Online Privacy”,

Electronic Frontier Foundation, (10 April 2001), Assessed: December 2009,

http://www.eff.org/Privacy/ eff_privacy_top_12.html

McCloskey, D. W. and Whiteley, D. (2002), “Electronic Commerce Acceptance: A Study

Comparing the United States and the United Kingdom”, Strategies for ecommerce

success, Hersey, PA, USA, Idea Publishing, (2002), PP: 185-195

McCole, P. and Palmer, A. (2001), “A critical evaluation of the role of trust in direct

marketing over the internet”, Paper presented at the World Marketing Congress,

University of Cardiff, Wales, (2001)

McDonald Aleecia and Cranor Lorrie Faith (2009), “The Cost of Reading Privacy

Policies”, Journal of Law and Policy for the Information Society, Available at:

http://www.is-journal.org/

McDonald, M. and Wilson, H. (1999), “E-Marketing: Improving Marketing Effectiveness

in a Digital World”, Financial Times Management, Pearson Education, Harlow, UK

McKinney, V., K. Yoon, F. Zahedi (2002), “The Measurement of Web-Customer

Satisfaction: An Expectation and Disconfirmation Approach”, Journal of

Information Systems Research, Vol. 13(3), (2002), PP: 296-315

Page 23: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxiii

Meade, Joe. (2003), “Spam – The death of E-mail?” Proceedings of EEMA conference,

Dublin

Mehta, R. and E. Sivadas (1995), “Comparing Response Rates and Response Content in

Mail Versus Electronic Mail Surveys”, Journal of the Market Research Society, Vol.

(37)4, (1995), PP: 429-439

Mehta, R. and Sivadas, E. (1995), “Direct marketing on the Internet: an empirical assessment

of consumer attitudes”, Journal of Direct Marketing, Vol. 9, (1995), PP: 21-32

Michael Henderson, Melissa de Zwart, David Lindsay and Michael Phillips, (2011),

“Student’s use of social networking tools: Legal risks and other implications”,

ACEC2010, Digital Diversity: proceedings of the Australian Computers in

Education Conference 6-9 April 2010

Micu, C. C., and Chowdhury, T. G. (2010), “The Effect of Message's Regulatory Focus and

Product Type on Persuasion”, Journal of Marketing Theory and Practice, Vol.

18(2), (2010), PP: 181-190

Mikko Siponen and Carl Stucke (2006), “Elective anti-spam strategies in companies: An

international study”, In Proceedings of HICSS 2006, Vol. 6, (2006)

Millett, Lynette I., Batya Friedman, and Edward Felten (2001), “Cookies and Web

Browser Design: Toward Realizing Informed Consent Online,” Proceedings of the

SIGCHI Conference on Human Factors in Computing Systems, New York:

Association for Computer Machinery, PP: 46–52, (2001)

Milne , Shalini Bahl, and Andrew Rohm (2008), “Toward a Framework for Assessing

Covert Marketing Practices,” Journal of Public Policy and Marketing, Vol. 27

(Spring 2008), PP: 57–62

Milne, George R., Mary J. Culnan, and Henry Greene (2006), “A Longitudinal

Assessment of Online Privacy Notice Readability”, Journal of Public Policy and

Marketing, Vol. 25(2), (2006), PP: 238-249

Miyazaki, A.D., Fernandez, A., (2000), “Internet privacy and security: an examination of

online retailer disclosures”, Journal of Public Policy and Marketing, Vol. 19(1),

(2000), PP: 54–61

Miyazako A.D., and Fernandez A., (2001), “Consumer perceptions of privacy and

security risks for online shopping”, The Journal of Consumer Affairs, Vol. 35(1),

(2001), PP: 27-44

Page 24: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxiv

Mohamed Khalifa and Vanessa Liu (2007), “Online consumer retention: contingent

effects of online shopping habit and online shopping experience”, European Journal

of Information Systems, Vol. 16, (2007), PP: 780–792

Mohsen Attaran (1999), “Internet-based business opportunities: buyers beware of scams”,

Journal of Information Management and Computer Security, Vol. 7(4), (1999), PP:

176-177

Mohsen Attaran and Ilja VanLaar (1999), “Privacy and security on the Internet: how to

secure your personal information and company data”, Journal of Information

Management and Computer Security, Vol. 7(5), (1999), PP: 241-246

Moschis, G. P., (1987), “Consumer Socialization: A Life-Cycle Perspective”, Publisher:

Lexington Books, Lexington, MA, (1987)

Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy (2006), “A crawler-based study of

spyware on the web”, Proceedings of the Network and Distributed System Security

Symposium, NDSS 2006, San Diego, California, USA, (2006)

Munusamy, J., and Wong, C. H. (2007), “Attitude towards advertising among students at

private higher learning institutions in Selangor”, UnisTAR E-Journal, Vol.3, (2007),

PP: 31-51

Murphy Patrick E., (2005), “Consumer Online Privacy: Legal and Ethical Issues”,

Journal of Public Policy & Marketing, Vol. 19 (1), (2000), PP: 7-19

Naiyi Ye, (2004), “Dimensions of consumer’s perceived risk in online shopping”, Journal of

Electronic Science and Technology of China, vol. 2(3), (2004), PP: 177-182

NCSA (2005), “AOL/National Cyber Security Alliance (NCSA) online safety study”,

National Cyber Security Alliance, (2005), PP: 111

Nebenzhal, I.D. and Jaffe, E.D. (1998), “Ethical dimensions of advertising executions”,

Journal of Business Ethics, Vol. 17(7), (1998), PP: 805-815

Neelkanta, B.C. and H.B. Anand (1992), “Educating the Consumer”, Journal of Social

Welfare, Vol. 37(11-12), (1992), PP: 5-6

Netemeyer, R. G., Beard, W. O. and Sharma, S. (2003), “Scaling procedures issues and

Applications”, Thousand Oaks: Sage Publication

Nettleton, E. (2004), “Electronic marketing and the new anti-spam regulations”, Journal of

Database Marketing and Customer Strategy Management, Vol. 11(3), (2004),

PP:235-40

Network wizards (1999), “NUA Internet Surveys”, September 17, 1999

Page 25: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxv

Newman Graeme and Ronald Clarke (2003), “Superhighway Robbery: Preventing E-

Commerce Crime”, London: Willan (Publisher)

Nunally, J. (1967), “Psychometric theory”, Mc-Graw Hill, (1st. Ed.) New York, NY

Nunnally, J. (1978), “Psychometric Theory”, McGraw-Hill, New York, NY

Octane Research (2011), “Annual India E-marketing”, Benchmark Research on India

Digital Marketing, (Jan. 2011)

OFT (Office of Fair Trading), (2007), “Internet shopping”, OFT market study (2007)

Oghazi Pejvak, Mostaghel Rana1 and Parida Vinit, (2012), “Prioritization of Service

Quality Factors in E-purchasing - A Cross Cultural Study”, Journal of Advances In

Management, Vol. 5(6), (June, 2012)

Olery-kelly, S. W. and Vokurka. R. J. (1998), “The empirical assessment of construct

validity”, Journal of Operation Management, Vol. 16, (1998), PP: 387-405

Oliva, R.A. (2004), “Spam!”, Journal of Marketing Management, Vol. 13(1), (2004), PP:

50-63

Oswell, D. (2008), “Media and communications regulation and child protection: An

overview of the field”, The international handbook of children, media and culture,

London: sage, PP: 475-492

Ovans, A., (1999), “Is Your web site socially savvy?”, Harvard Business Review, Vol.

77(3), (1999), PP: 20–21

P&AB (Privacy and American Business), (2005), “New survey reports an increase in ID

theft and decrease in consumer confidence”, Conducted by Harris Interactive,

Available at: http://www.pandab.org/deloitteidsurveypr.html.

P. S. Speck and M. T. Elliott, (1997), “Predictors of Advertising Avoidance in Print and

Broadcast Media”, Journal of Advertising, Vol. 26, (1997), PP: 61-76

P.L. Alreck and R.B. Settle, (2002), “The hurried consumer: Time-saving perceptions of

Internet and catalogue shopping,” Journal of Database Marketing, Vol. 10(1), 2002,

PP: 25-35

Paine, C., Reips, U.-D., Stieger, S., Joinson, A., and Buchanan, T., (2007), “Internet

users’ perceptions of ‘privacy concerns’ and ‘privacy actions”, International Journal

of Human-Computer Studies, Vol. 65, 2007, PP: 526-536

Pallant Julie (2001), “SPSS Survival Manual: A step-by-step guide to data analysis using

SPSS”, Publisher: Open University Press, 1st Ed. Buckingham

Palmer J. W., (2002), “Web site usability, design, and performance metrics”, Journal of

Information Systems Research, Vol. 13(2), (2002), PP: 151–167

Page 26: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxvi

Pan, Y. and Zinkhan, G. M., (2006), “Exploring the impact of online privacy disclosures on

consumer trust”, Journal of Retailing, Vol. 82(4), 2006, PP: 331-338

Parasuraman, A. (2000), “Technology Readiness Index (TRI): a multiple-item scale to

measure readiness to embrace new technologies”, Journal of Service Research, 2000,

PP: 307-320

Pastore Michael (2001), “Privacy remains a concern for online consumers”, Cyber Atlas,

Assessed: 2013 April, http://www.clickz.com/clickz/news/1717092/privacy-remains-

concern-online-consumers

Patterson, P.G., L.W. Johnson, R.A. Spreng. (1997), “Modeling the determinants of

customer satisfaction for business to business professional services”, Academy

Marketing Science Journal, Vol. 25(1), 1997, PP: 4-17

Patton, M.Q. (2002), “Qualitative Research and Evaluation Methods”, UK, Sage

Publications

Pavlou, Paul A., (2003), “Consumer’s Acceptance of E-Commerce: Integrating Trust and

Risk with the Technology Acceptance Model”, Vol. 7(3), 2003, PP: 101-134

Paweł Kossecki and Urszula Kaczor, (2004), “No Trust, No Transaction –The

Implications For The Internet Suppliers”, Proceeding of 6th International

Interdisciplinary Conference on Electronic Commerce, 2004, PP: 303 – 309

Peishih Chang and David Mendonça, (2004), “ Inside the Customer: Modeling Cognition

during Online Shopping”, Proceedings of the 10th

Americas Conference on

Information Systems(AMCIS), Aug. 2004, PP: 429, New York, New York

Pescovitz David (2000), “Undercover agents” The Standard.com, January, PP: 3

Peter G. Neumann (1994), “Computer-Related Risks”, ACM Press/Addison-Wesley,

1994

Petersen, Andrea (2001), “Private Matters: It Seems That Trust Equals Revenue, Even

Online”, The Wall Street Journal Europe, Special Section on E-Commerce, 2001

Peterson, R.A., Albaum, G., & Ridgway, N.M. (1989), “Consumers Who Buy from

Direct Sales Companies”, Journal of Retailing, Vol. 65(2), 1989, PP: 273–288

Peterson, Robert A., Sridhar Balasubramanian, and Bart J. Bronnenberg (1997), “Exploring

the Implication of the Internet for Consumer Marketing,” Journal of the Academy

of Marketing Science, Vol. 25(4), 1997, PP: 329-346

Petrovic (2011), “ Ethical E-marketing”, European Journal of Marketing, Vol. 31(6),

2005, PP: 24-29

Page 27: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxvii

Petronas, U.T. and B. Seri., (2001), “Malaysian Internet User’s Motivation and Concerns for

Shopping Online”, Malaysian Journal of Library and Information Science, Vol.

6(2), 2001, PP: 21-33

Pew (2004), “The Can-Spam Act has not helped most email users so far”, Pew Internet

Project Data memo, (March 2004), Available at:

http://www.pewinternet.org/pdfs/PIP_Data_Memo_on_Spam.pdf

Pew Research Center (2003), “Spam: How is it Hurting Email and Degrading Life on the

Internet”, Pew Internet and American Life project

Pine, B. Joseph and James H. Gilmore (1999), “The Experience Economy: Work Is

Theater & Every Business a Stage”, Boston, MA: Harvard Business Press

Pine, J. and Gilmore, J., (1998), “Welcome to the Experience Economy”, Journal of

Harvard Business Review, July 1998, PP: 97—103

Pollach, Irene. (2005), “A Typology of Communicative Strategies in Online Privacy

Policies: Ethics, Power and Informed Consent”, Journal of Business Ethics, Vol. 62

(3), 2005, PP: 221-235

Ponnurangam Kumaraguru and Lorrie Cranor, (2006), “Privacy in India: Attitudes and

Awareness”, Journal of Computer Science, Vol. 3856, 2006, PP: 243-258

Prema Nakra, (2001), “Consumer privacy rights: CPR and the age of the Internet”,

Journal of Management Decision, Vol. 39(4), 2001, PP: 272-278

Q. Hu and T. Dinev, (2005), “Is spyware an internet nuisance or public menace?”,

Journal of Communications of the ACM, Vol. 48(8), 2005, PP: 61–66

Quelch, John and Loisa Klein (1996), “The Internet and International Marketing”,

Journal of Sloan Management Review, Spring 1996, PP: 60-75

Quinton, (2005), “Online Privacy and the Disclosure of Cookie Use: Effects on Consumer

Trust and Anticipated Patronage”, Journal of American Marketing

Association, Vol. 17, PP: 12–36

R Lain. (2000), “Internet shopping soars at the end of the century”, In The Mercury, IT

Technology, January 2000, PP:3

R.-A. Shang, Y.-C. Chen, and L. Shen, (2005), “Extrinsic versus intrinsic motivations for

consumers to shop on-line”, Journal of Information and Management, Vol. 42,

March 2005, PP: 401-413

R.L. McArthur (2001), “Reasonable Expectations of Privacy”, Journal of Ethics and

Information Technology, Vol. 3, 2001. PP: 123–128

Page 28: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxviii

Rachel Greenstadt and Michael D. Smith, (2005), “Protecting Personal Information:

Obstacles and Directions”, Proceedings of the Fourth Workshop on Economics and

Information Security, Cambridge, Massachusetts, May 2005

Rachels,J ames ( 1975), “Why Privacy Is Important”, Journal of Philosophy and Public

Affairs, Vol.4, Summer 1975, PP: 323-33

Radosevich, L. (1997), “Fixing Web site usability”, InformationWorld, Vol. 19(50),

1997, PP: 81-82

Raghu, T.S., P.K. Kannan, H.R. Rao, and A.B. Whinston (2001), “Dynamic Profiling of

Consumers for Customized Offerings over the Internet: A Model and Analysis,”

Journal of Decision Support Systems, Vol. 32, December 2001, PP: 117–34

Rajasree K. Rajamma, Audhesh K. Paswan and Muhammad M. Hossain, (2009), “Why do

shoppers abandon shopping cart? Perceived waiting time, risk, and transaction

inconvenience”, Journal of Product and Brand Management, Vol. 18(3), 2009,

PP:188–197

Ramayah, T., Aafaqi, B., & Jantan, M. (2003), “Internet usage among students of institution

of higher learning: the role of motivational variables”, Proceedings of the 1st

International Conference on Asian Academy of Applied Business Conference,

Sabah, Malaysia 10-12 July, 2003

Reedly, J., Schullo, S. and Zimmerman, K. (2000), “Electronic marketing: Integrating

electronic resources into the marketing process”, Harcourt college publishers

Reibstein, D.J. (2002), “What attracts customers to online stores, and what keeps them

coming back?”, Journal of Academy of Marketing Science, Vol. 30(4), 2002,

PP:465-473

Rendleman J. (2001), “Customer Data Means Money”, Information Week, August 20,

2001

Retail Merchandiser (2003), “Online spending jumps”, Retail Merchandiser (Online),

Assessed December 22, 2009, http://web.lexisnexis. com/universe/document

Rice, M., (1997), “What makes users revisit a web site”, Marketing News, Vol. 31(6),

1997, PP: 23

Richards, J.I. (1990), “Deceptive advertising: Behavioral study of a legal concept”,

Hillsdale, New Jersey: Lawrence Erlbaum Associates

Rimmer, S. (2003), “Death to spam”, Assessed 30 July 2009, Available at:

http://www.mindworkshop.com/alchemy/nospam.html

Page 29: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxix

Robert Owen and Patricia Humphrey, (2010), “The structure of online marketing

communication channels”, Journal of Management and Marketing Research, Vol.

2, (2010), PP: 54-62

Robert Sprague and Corey Ciocchetti, (2009), “Preserving identities: Protecting personal

identifying information through enhanced privacy policies and laws”, Albany Law

Journal of Science and Technology, Vol. 19(1), 2009

Robert W. Hahn and Anne Layne-Farrar, (2001), “The Benefits and Costs of Online

Privacy Legislation”, Oct. 2001, Working Paper 01-14,

http://papers.ssrn.com/abstract_id=292649

Roberts, M. L. (2003), “Internet Marketing: Integrating Online and Offline Strategies”,

McGraw Hill, New York, NY

Rochelle A. Cadogan (2003), “The Ethics Of Data Privacy In An Electronic Marketplace:

The Incorporation Of Fair Information Practice Principles Into Privacy Policies”,

Review of Business Information Systems Journal, Vol.7(1), 2003

Rochelle Codogen (2001) “The Ethics of data privacy is an Electronic Market Place”,

Dec. 2001

Ronald Jeurissen and Bert van de Ven, (2006), “Development in Marketing Ethics” ,

Journal of Business Ethics Quarterly, Vol. 16(3), PP. 427-439

Rubin, Zick. (1975), “Disclosing oneself to a stranger: Reciprocity and its limits”,

Journal of Experimental Social Psychology, Vol.1, (1975), PP :233-260

Rudolph T., Rosenbloom B., Wagner T. (2004), “Barriers to Online Shopping in

Switzerland”, Journal of International Consumer Marketing, vol. 16(3), 2004, PP:

55-74

Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller, D.W. (2001), “Perceived

security and worldwide web purchase intention”, Journal of Industrial Management

and Data Systems, Vol. 101(4), 2001, PP: 165-177

Sally Harridge, (2004), “Electronic marketing, the new kid on the block”, Journal of

Marketing Intelligence and Planning, Vol. 22(3), 2004, PP: 297-309

Sally Harridge, (2006), “Can the building of trust overcome consumer perceived risk

online?”, Journal of Marketing Intelligence and Planning, Vol. 24(7), 2006, PP:

746-761

Sandra L. Calvert(2008), (2008), “Children as Consumers: Advertising and Marketing”,

Journal of The Future of Children, Vol. 18(1), Spring 2008, PP: 205-234,

www.futureofchildren.org

Page 30: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxx

Sara Rodriguez, (2009), “Economic Climate Shifts Consumers Online”, Consumer

Behavior Report by PriceGrabber.com

Sarkar Pradipta K., & Cybulski, J. L. (2002), “Understanding a product line of electronic

business systems”, School of Information Systems, Deakin University

Satinder Kumar and Rishi Raj Sharma (2012), “Perceptual study of Spamming an unethical

practice in E-marketing”, International journal of Marketing and Management

research, Vol. 3(1), 2012, PP: 1-25

Security Fears, Increased e-Business Investment Top Survey of (2001) by IT Security,

Venue: IT Pros; Network World Study Also Reveals Significant Growth in Handheld

Devices and Major Concerns With Storage’, April,

2001,http://www.itsecurity.com/tecsnews/apr2001/apr44.htm

Seitz, V.A., Massey, T.K.,(1990), “The acceptability of catalogs for apparel purchases”,

Clothing and Textiles Research Journal, Vol. 8(4), 1990, PP: 28-33.

Sekaran, U. (2000), “Research Methods for Business: A skill building approach”, 2nd Ed.

John Wiley and Sons, Inc.

Seligman T.J and Taylor ,J.D. (2000), “FTC Reverses Privacy Policy”, New York Law

Journal, June 19,2000, Available at: www.loeb.com/ CM/Articles/articles24.asp

Shane Hird, (2002), “Technical Solutions for Controlling Spam”, Proceedings of AUUG,

2002, Melbourne, 4-6 September 2002

Sharma, A. and Sheth, J.N. (2004), “Web-based marketing: the coming revolution in

marketing thought and strategy”, Journal of Business Research, Vol. 57(7), 2004,

PP: 696–702

Sheehan, K. B. and S. J. McMillan (1999), “Response Variation in E-Mail Surveys: An

Exploration”, Journal of Advertising Research, Vol. (39)4, 1999, PP: 45-55

Sheehan, Kim Bartel (1999), “An investigation of gender differences in on-line privacy

concerns and resultant behaviors”, Journal of Interactive Marketing, Vol. 13(4),

1999, PP : 24-38

Shermach (2005), “Nature of e-business ethical dilemmas”, Information Management and

Computer Security, Vol. 15(2), 2004, PP: 16-27

Singh, B. & Malhotra, P., (2004), “Adoption of Internet banking: an empirical

investigation of Indian Banking sector”, Journal of Internet Banking and

Commerce, Vol. 9(2), 2004

Sipior, J.C., Ward, B.T. and Bonner, P.G. (2004), “Should spam be on the menu?”,

Journal of Communications of the ACM, Vol. 47(6), 2004, PP: 59-64

Page 31: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxxi

Smith H. J., Milburg S. J., and S. J. Burke, (1996), “Information Privacy: Measuring

Individuals' Concerns about Organizational Practices”, Journal of MIS Quarterly,

Vol. 20, (June 1996), PP: 167-196

Smith, P.R and Chaffey, D. (2001), “E-marketing excellence: at the heart of e-Business”,

Butterworth Heinemann, Oxford, UK

Soltani A., Canty S., Mayo Q., Thomas L., and Hoofnagle C. J. (2010), “Flash cookies and

privacy”, Accessed 15 Apr 2010, August 11 2009, Available at:

http://ssrn.com/abstract=1446862.

Sonja Petrovic-Lazarevic and Amrik S. Sohal, (2004), “Nature of e-business ethical

dilemmas”, Information Management & Computer Security, Vol. 12(2), 2004, PP:

167-177

Sorkin, D. (2001), “Technical and legal approaches to unsolicited electronic mail”, USFL

Review, Winter 2001, PP: 325-83

Spam Filter Review (2005), “Spam Statistics 2004”, http://spam-filter-

review.toptenreviews.com/spam-statistics.html

Special Report from Oppenheimer Funds survey, (2007), “Protect Yourself Against

Identity Theft”, 2007

Stewart, D.W. and Pavlou, P.A. (2002), “From consumer response to active consumer:

Measuring the effectiveness of interactive media”, Journal of the Academy of

Marketing Science, Vol. 30(4), 2002, PP : 376–396

Strauss Judy and Frost Raymond (2010), “E-Marketing”, 5th

Ed., PHI Learning Private Ltd

Suki N.M., Suki N.M, (2007), “Online buying innovativeness: Effects of perceived

value, perceived risk and perceived enjoyment”, International Journal of Business

and Society, Vol. 8(2), 2007, PP: 81-93

Suki, N. B. M., Ahmad M. I., & Thyagarajan, V. (2002), “Motivation and concern factors

for internet shopping: A Malaysian perspective”, The Electronic Journal for

Ecommerce Tools and Applications, Vol. 1, 2002, PP: 1–18

Sullivan JD, De Leeuw MB (2003), “Spam after Can-Spam: How Inconsistent Thinking Has

Made a Hash out of Unsolicited Commercial E-Mail Policy”, Santa Clara Computer

and High Tech journal., Vol. 20, 2003, PP : 887

Sullivan, J. and Walstrom, K. (2001), “Consumer perspectives on service qualities of

electronic commerce Web Sites”, Journal of Computer Information Systems, Vol.

41(3), 2001, PP: 8-15

Page 32: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxxii

Sun, L. (2007), “Who can fix the spyware problem?”, Berkeley Technology Law Journal,

Vol. 22, 2007, PP :555-575

Surendra Sisodia (2010), “Role of integrated marketing communication in modern Indian

business”, Journal of Arts Science and Commerce, Vol. 1(1), 2010, PP: 134-138

Suri Ajneesh and Marissa Phillip (2004), “Impact of Gender Differences on the Evaluation

of Promotional Emails”, Journal of advertising research, Vol. 10, 2004, PP:360-

368

Swartz. J. (2004), “Is the future of Email under cyber attack?”, USA today

Syed Shah Alam and Norjaya Mohd Yasin, (2010), “What factors influence online brand

trust: evidence from online tickets buyers in Malaysia”, Journal of Theoretical and

Applied Electronic Commerce Research, Vol. 5(3), Dec. 2010, PP: 78-89

Syed Shah Alam and Norjaya Mohd. Yasin, (2010), “An Investigation into the

Antecedents of Customer Satisfaction of Online Shopping”, Journal of Marketing

Development and Competitiveness, Vol. 5(1), 2010

Symantec, Spam statistics, Accessed 06-11-2009.

http://www.symantec.com/region/de/PressCenter/spam.html ,

Szymanski, D., R. Hise (2000), “E-Satisfaction: An initial examination”, Journal of

Retailing, Vol. 76(3), 2000, PP: 309-322

T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer (2006), “Social phishing”, Journal of

Communications of the ACM, Vol. 50(10), Oct 2006, PP :94-100

Tabachnick, B.G., and Fidell, L.S. (1996), “Using Multivariate statistics” (3rd Ed.)

Harper Collins College Publishers: New York. NY

Tai, S. H. C. (2007), “Correlates of successful brand advertising in China”, Asia Pacific

Journal of Marketing and Logistics, Vol. 19(1), 2007, PP: 40-56

Tamara Eisenschitz (2001), “Email Law”, Proceeding of Aslib, Vol-54(1), 2001, PP: 41-47

Tanzila Ahmed, Charles Oppenheim, (2006), “Experiments to identify the causes of

spam”, Proceeding of Aslib, Vol. 58(3), (2006), PP: 156 - 178

Taylor Nelsen Sofres, (2002), “TNS Annual Report”, Taylor Nelson Sofres, 2002

Tej Paul Bhatla, Vikram Prabhu & Amit Dua, (2003), “Understanding Credit Card

Frauds”, Journal of Cards Business Review, Tata Consultancy Services

Tonita Pereay Monsuwe, Benedict G.C. Dellaert and Ko de Ruyter, (2004), “What drives

consumers to shop online? A literature review”, International Journal of Service

Industry Management, Vol. 15(1), 2004, PP : 102-121

Page 33: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxxiii

Turban, E., King, D., Mckay, J., Marshall, P., Lee, J., and Viehland, D., (2008), “Electronic

Commerce: A Managerial Perspective”, (5th ed.). Upper Saddle River, U.S.: Pearson

Prentice Hall, 2008

Turban, E., Lee, J., King, D. and Chung, H.M. (2000), “Electronic Commerce: A Managerial

Perspective”, 1st Ed., Prentice-Hall, Englewood Cliffs, NJ

Tynan, D., (2000), “Privacy 2000: in web we trust?”, PC World, June 2000, PP: 103–116

Udo, G.J. (2001), “Privacy and security concerns as major barriers for e-commerce: a

survey study”, Journal of Information Management and Computer Security, Vol. 9,

2001, PP: 165-174

UNCTAD, (2007), “Information Economy Report 2007-2008: Science and technology for

development: the new paradigm of ICT (Online)” Available at:

http://www.unctad.org/Templates/Page.asp?intItemID=1888&lang=1 (Accessed 12

December 2009)

Unsigned (1999), “Companies Learn That Selling Merchandise On Line Can Be

Surprisingly Messy, Especially Those Pesky Returns,” New York Times, August 23,

Section C, Page 3, Column 1.

Urbach, R. and G. A. Kibel (2004), “Adware/Spyware: an update regarding pending

litigation and legislation”, Intellectual Property and Technology Law Journal, Vol.

16(7), 2004, PP: 12-16

Vande Venn, A. H. and Ferry, D. I. (1980), “Measuring and Assessing Organization”,

John Wiley and Sons Inc., New York, NY

Vibhor Kalra, (2010), “E-marketing”, (Accessed November, 2011), Available at

http://www.scribd.com/doc/38318465/EMarketing

Vicomsoft (2002), “Spam FAQs”, (Accessed October 2009), Available at:

http://www.vicomsoft.com/knowledge/reference/spam.html

Vijayasarathy, L. R. (2002), “Product characteristics and Internet shopping intentions”,

Internet Research: Electronic Networking Applications and Policy, Vol. 12(5),

2002, PP: 411-426

Visualization and Usability Center, Georgia Tech Research Corporation, 9th Survey,

(10 April- 15 May ,1998)

Wainer, H., and Braun, H. I. (1988), “Test validity” Hilldale, NJ: Lawrence Erlbaum

Associates

Walker Smith (2003), “Consumers want personalization in exchange for private

information”

Page 34: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxxiv

Wang, H., M. K. O. Lee, and C. Wang (1998), “Consumer privacy concerns about

Internet marketing Communications of the Association for Computing Machinery”,

Vol. 41, 1998, PP: 63–70

Watson Richard Thomas, Berthon, P., Pitt, L. and Zinkhan, G. (2000), “Electronic

Commerce: the strategic perspective”, Fort Worth, Texas: Dryden Press.

Webroot Software Inc (2005), “State of Spyware Q3 2005”, Webroot Software Inc., PP:

191

Wehling, B. (1996), “The future of marketing”, Vital Speeches of the Day, Vol. 62(6),

1996, PP: 170-174

Wells Barron and Spinks Nelda (1996), “Ethics must be communicated from the top

down”, Career Development International, Vol. 1(7), 1996, PP: 28–30

Whelan, Bridget.(2009), “Facebook, a fun resource or invasion of privacy”

Athensnews.com. 08 September 2005. 17 September 2009

<http://athensnews.com/issue/article.php3?story_id=21491>.

Wikipedia (2009), “HTTP cookie”, accessed 11/1/09, www.wikipedia.com

Wills, C.E. & Zeljkovic, M. (2011), “A Personalized Approach to Web Privacy:

Awareness, Attitudes, and Actions”, Journal of Information Management and

Computer Science, Vol. 19(1), 2011, PP: 53-73

Wilsker Ira (2002), “The Internet Security: Cookies, Spyware, and other Privacy Threats on

the Net”, Available at:

http://www.1960pcug.org/~pcnews/2002/01/privacy_threats.htm

Winn K Jane (2005), “Contracting Spyware by Contract”, European Journal of Marketing,

Vol. 31(6), 2005, PP: 24-29

Wolfinbarger, M., M. Gilly. (2001), “Shopping online for freedom, control, and fun”,

Journal of California Management Review, Vol. 43(2), 2001, PP: 34-55

Wood, C. M., & Scheer, L. K. (1996), “Incorporating perceived risk into models of

consumer deal assessment and purchase intent”, Journal of Advances in Consumer

research, Vol. 23, 1996, PP: 399-406

Woolsey, B., (2008), “Credit card 'phishing: What it means, how to prevent it”, (Online),

Available: http://www.creditcards.com/credit-card-news/phishing-credit-card-scam-

fraud-1282.php (Accessed June 20, 2009)

Ye Diana Wang and Henry H. Emurian, (2005), “An overview of online trust: Concepts,

elements, and implications”, Journal of Computers in Human Behavior, Vol. 21,

2005, PP: 105–125

Page 35: BIBLIOGRAPHY - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/100821/19/19_bibliography.pdfapproach”, Work Study, Vol. 51(1), (2002), PP: 17-31 Anahita Bagherzad Halimi,,Alireza

xxxv

YPRT (Youth Protection Roundtable) (2009), Stiftung Digitale Chancen. Youth Protection

Toolkit, (Public Paper) Available at

www.yprt.eu/transfer/assets/final_YPRT_Toolkit.pdf p. 11)

Zack, Michael H. (1993), “Interactivity and communication mode choice in ongoing

management groups”, Information Systems, Vol.4(3), 1993, PP: 207–239

Zhang, P., and von Dran, G. M. (2000), “Satisfactor and dissatisfactorers: A two-factor

model for website design and evaluation”, Journal of the American Society for

Information Science, Vol. 51(4), 2000, PP: 1253-1268

Zhang, P., von Dran, G. M., Small, R. V. and Barcellos, S. (1999), “Websites that satisfy

users: a theoretical framework for web user interface design and evaluation”,

Proceedings of the 32nd Annual Hawaii International Conference on System

Sciences (HICSS32), January 1999

Zhang, P., von Dran, G. M., Small, R. V. and Barcellos, S. (2000), “A two-factor theory for

website design”, Proceedings of the 33rd

Annual Hawaii International

Conference on System Sciences (HICSS33), January 2000

Zhang, X. (2005), “What do consumers really know about spyware?”, Journal of

Communications of the ACM, Vol. 48(8), 2005, PP: 4448

Zhao, Ying, & Zhang, Yue, (2004), “Characteristics of consumer behaviors in Electronic

commerce environment and the impacts on Internet marketing”, Jiangsu Commercial

Forum, 2004