A Case Study on Privacy Vs Security with Reference to Online Transactions
DOI:
https://doi.org/10.21095/ajmr/2018/v11/i1/139601Abstract
No Abstract.References
Assembly, U. G. (1948). Universal declaration of human rights. UN General Assembly.
Breaux, T., &Antón, A. (2008). Analyzing regulatory rules for privacy and security requirements. IEEE transactions on software engineering, 34(1), 5-20.
Campbell, H. (1990). Black’s law dictionary. St Paul Minn: West Publishing Co.
Cavoukian, A. (2011). Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policymakers.
Flaherty, D. H. (1989). Protecting privacy in surveillance societies (p. 306). Chapel Hill: University of North Carolina Press.
Flavián, C., &GuinalÃu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of l o y a l t y t o a w e b s i t e . I n d u s t r i a l Management & Data Systems, 106(5), 601-620.
Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev., 79, 119. 25
Pfleeger, C. P., &Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.
Udo, G. J. (2001). Privacy and security concerns as major barriers for ecommerce: a survey study. Information Management & Computer Security, 9(4), 165-174.
Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.