Abstract
The relationships among nationality, cultural values, personal information privacy concerns, and information privacy regulation are examined in this article.
- 1 Almond, G.A., and Verba, S. The Civic Culture: Political Attitudes and Democracy in Five Nations. Princeton University Press, Princeton, NJ, 1963.Google Scholar
- 2 Bennett, C.J. Regulating Privacy. Cornell University Press, Ithaca, NY, 1992.Google Scholar
- 3 Cespedes, F.V. and Smith, H.J. Database marketing: New rules for policy and practice. Sloan Management Rev. (Summer 1993), 7-22.Google Scholar
- 4 Culnan, M.J. How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MISQ. (Sept. 1993), 341-363.Google Scholar
- 5 Donaldson, T. and Dunfee, T.W. Toward a unified conception of business ethics: Integrative Social Contracts Theory. Acad. Manage. Rev. 19, 2 (1994), 252-284.Google ScholarCross Ref
- 6 Engel, J.F., Blackwell, R.D., and Miniard, P.W. Consumer Behavior. Dryden, Hinsdale, II1., 1986.Google Scholar
- 7 Flaherty, D.H. Protecting Privacy in Surveillance Societies. University of North Carolina Press, Chapel Hill, NC, 1989.Google Scholar
- 8 Hanushek, E.A. and Jackson, J.E. Statistical Methods for Social Scientists. Academic Press, Orlando, Fla., 1977.Google Scholar
- 9 Hofstede, G. Culture's Consequences: International Differences in Work-Related Values. Sage, Beverly Hills, Calif., 1980.Google Scholar
- 10 Hofstede, G. Cultures and Organizations. McGraw-Hill, Berkshire, England, 1991.Google Scholar
- 11 Hume, D. A Treatise of Human Nature. Oxford University Press, Oxford, 1888/1978.Google Scholar
- 12 Ives, B. andJarvenpaa, S.L. Applications of global information technology: Key issues for management. MIS Q. (Mar. 1991), 33-48. Google ScholarDigital Library
- 13 Mason, R.O. Four ethical issues of the information age. MIS Q. (Mar. 1986), 4-12.Google Scholar
- 14 Madsen, W. Handbook of Personal Data Protection. Macmillan, New York, 1992. Google ScholarDigital Library
- 15 Miller, A. Computers and privacy. In W. Hoffman and J.M. Moore, Eds., Ethics and the Management of Computer Technology. Oelgeschlager, Gunn and Hain, Cambridge, Mass., 1982, 93-108.Google Scholar
- 16 Mulder, M. The Daily Power Game. Martinus Nijhoff, Leyden, 1977.Google ScholarCross Ref
- 17 Smith, H.J. Managing Privacy: Information Technology and Corporate America. University of North Carolina Press, Chapel Hill, NC, 1994. Google ScholarDigital Library
- 18 Smith, H.J. and Kallman, E.A. Internationalprivacy policies and practices: An exploratory study from an organizational perspective. Working paper, Georgetown University and Bentley College (1994).Google Scholar
- 19 Smith, H.J., Milberg, S.J., and Burke, S.J. Information privacy: Measuring individuals' concerns about corporate practices. Working paper, Georgetown University (1994).Google Scholar
- 20 Stone, E.F. and Stone, D.L. Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Res. Pers. Hum. Resource Manage. 8 (1990), 349-411.Google Scholar
- 21 Stone, E.F., Gardner, D.G., Gueutal, H.G., and McClure, S. A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Applied Psychol. 68, 3 (1983), 459-468.Google ScholarCross Ref
- 22 Trompenaars, F. Riding the Waves of Culture: Understanding Diversity in Global Business. Irwin, New York, 1994.Google Scholar
- 23 Westin, A. Privacy and Freedom. Atheneum, New York, 1967.Google Scholar
Index Terms
- Values, personal information privacy, and regulatory approaches
Recommendations
Controlling and disclosing your personal information
As organizations come to rely on the collection and use of personal information in order to complete the transactions and providing good services to their users, more and more user personal information is being shared with web service providers leading ...
Comments