2015
DOI: 10.12720/joams.3.1.50-53
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Privacy Protection in E-commerce

Abstract: Online-purchase changed the life of customers. Ebusiness enterprises offer various personalized products to their clients through collecting private information. Customers enjoy the convenience that the personalized products bring to while suffering the risk that their privacy may be second used by firms. The conflict between consumers' privacy concern and personalization offered by firm causes many problems deserved to be studied. Many researchers study about different kinds of privacy protection. This paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Privacy related to issues of concern for both current and prospective e-commerce customers (Lanier and Saini, 2008;Shah et al, 2013). There are a number of ways in which individual information can be found on the Internet, such as reading individual entries on a newsgroup posting; looking at individual names and identities in the Internet directory; by reading emails, conducting surveillance on employees, wiretapping wireless and listening to employees; asking an individual to complete website registration, and gathering information on individuals while they access the website by making use of cookies (Turban and King, 2004;Karakaya and Stark, 2013;Chen and Liu, 2015).…”
Section: Privacy Factorsmentioning
confidence: 99%
“…Privacy related to issues of concern for both current and prospective e-commerce customers (Lanier and Saini, 2008;Shah et al, 2013). There are a number of ways in which individual information can be found on the Internet, such as reading individual entries on a newsgroup posting; looking at individual names and identities in the Internet directory; by reading emails, conducting surveillance on employees, wiretapping wireless and listening to employees; asking an individual to complete website registration, and gathering information on individuals while they access the website by making use of cookies (Turban and King, 2004;Karakaya and Stark, 2013;Chen and Liu, 2015).…”
Section: Privacy Factorsmentioning
confidence: 99%