A Case Study on Privacy Vs Security with Reference to Online Transactions


  •   Divya Bansal MBA Department Adarsh Institute of Management & Information Technology
  •   Emil Suresh Adarsh Institute of Management & Information Technology




No Abstract.




How to Cite

Bansal, D., & Suresh, E. (2018). A Case Study on Privacy Vs Security with Reference to Online Transactions. Adarsh Journal of Management Research, 11(1), 19–25. https://doi.org/10.21095/ajmr/2018/v11/i1/139601





Assembly, U. G. (1948). Universal declaration of human rights. UN General Assembly.

Breaux, T., &Antón, A. (2008). Analyzing regulatory rules for privacy and security requirements. IEEE transactions on software engineering, 34(1), 5-20.

Campbell, H. (1990). Black’s law dictionary. St Paul Minn: West Publishing Co.

Cavoukian, A. (2011). Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policymakers.

Flaherty, D. H. (1989). Protecting privacy in surveillance societies (p. 306). Chapel Hill: University of North Carolina Press.

Flavián, C., &Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of l o y a l t y t o a w e b s i t e . I n d u s t r i a l Management & Data Systems, 106(5), 601-620.

Nissenbaum, H. (2004). Privacy as contextual integrity. Wash. L. Rev., 79, 119. 25

Pfleeger, C. P., &Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.

Udo, G. J. (2001). Privacy and security concerns as major barriers for ecommerce: a survey study. Information Management & Computer Security, 9(4), 165-174.

Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.