E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery

被引:39
作者
Boritz, J. Efrim [1 ]
No, Won Gyun [2 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
[2] Iowa State Univ, Ames, IA USA
关键词
privacy; e-commerce; review; research opportunities;
D O I
10.2308/isys-10090
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
Electronic commerce (e-commerce) has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction and the risk of negative consequences from providing such information. This requirement and the increased sophistication of companies' personal information gathering have made e-commerce privacy a critical issue and have spawned a broad research literature that is reviewed in this paper. Key research issues and findings are organized, using a framework defined by four key stakeholder groups-companies, customers, privacy solution providers (PSPs), and governments-as well as the interactions among them. The review indicates that the published research on ecommerce privacy peaked in the early 2000s; thus, it has not addressed many of the technological advances and other relevant developments of the past decade. Potential research opportunities for researchers in Management Information Systems (MIS) and Accounting Information Systems (AIS) include: company privacy strategies, operations, disclosures, and compliance practices; customer privacy concerns arising from company practices such as Internet activity tracking, physical location tracking, personal information gathering by social networks, and information exchanges in cloud computing environments; privacy-enhancing technologies, controls, and assurance practices developed by PSPs; and privacy regulations relating to various industries, countries, and cultures. More use of experimental and archival research is encouraged.
引用
收藏
页码:11 / 45
页数:35
相关论文
共 140 条
  • [51] Hoffman DL, 1999, INFORM SOC, V15, P129, DOI 10.1080/019722499128583
  • [52] Hofstede G., 1980, CULTURES CONSEQUENCE
  • [53] Hofstede G., 1991, CULTURES ORG SOFTWAR
  • [54] Hoover J. N., 2010, INFORMATIONWEEK
  • [55] Explaining intranet use with the technology acceptance model
    Horton, RP
    Buck, T
    Waterson, PE
    Clegg, CW
    [J]. JOURNAL OF INFORMATION TECHNOLOGY, 2001, 16 (04) : 237 - 249
  • [56] Hoy MG, 2003, J PUBLIC POLICY MARK, V22, P58, DOI 10.1509/jppm.22.1.58.17619
  • [57] An agent-based privacy-enhancing model
    Department of Computer Science, San José State University, San José, CA, United States
    [J]. Inf. Manage. Comput. Secur., 2008, 3 (305-319):
  • [58] Hughes D. A., 2010, WALL STREET J
  • [59] Hui KL, 2007, MIS QUART, V31, P19
  • [60] Ingram M., 2009, GLOBE MAIL, pA1