2011
DOI: 10.1007/s10796-011-9336-7
|View full text |Cite
|
Sign up to set email alerts
|

Privacy policies and national culture on the internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
2

Year Published

2014
2014
2020
2020

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 43 publications
0
16
0
2
Order By: Relevance
“…So that, it is reasonable to consider the cultural characteristics when implement new technological innovations like e-government. The most popular and extensively used cultural dimensions are the Hofstede's one [11] while Reay [31] asserts that cultural dimensions of Hofstede have used extensively in cross-cultural information technology studies. In addition, Reay [31] has pointed out the importance of culture in their study.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…So that, it is reasonable to consider the cultural characteristics when implement new technological innovations like e-government. The most popular and extensively used cultural dimensions are the Hofstede's one [11] while Reay [31] asserts that cultural dimensions of Hofstede have used extensively in cross-cultural information technology studies. In addition, Reay [31] has pointed out the importance of culture in their study.…”
Section: Introductionmentioning
confidence: 99%
“…The most popular and extensively used cultural dimensions are the Hofstede's one [11] while Reay [31] asserts that cultural dimensions of Hofstede have used extensively in cross-cultural information technology studies. In addition, Reay [31] has pointed out the importance of culture in their study. They have considered Hofstede and Hall's cultural dimensions and examined how cultural characteristics of individuals impact for internet based websites.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy, security, and confidentiality can be decoupled through consideration of social context. First, we note findings that privacy is grounded in social interaction: privacy is distinct from seclusion because it arises with respect to others (Marshall, 1972;Reay et al, 2011;Westin et al, 1979). Second, we note that security and confidentiality arise in response to motivations such as compliance with legal and professional obligations, and economic competition.…”
Section: Theoretical Orientationmentioning
confidence: 84%
“…Several researches have relied on Alexa data to obtain traffic rankings of different Internet properties by countries (see Ennew et al, 2005;Price and Grann, 2012;Reay et al, 2013;Wu and Ackland, 2014). Unfortunately, Alexa's open information is limited to the first 500 most visited entities per country.…”
Section: Methodsmentioning
confidence: 99%