[page 133↓]


Abrams, M. (2001): The Notices Project: Common Short Informing Notices, Interagency Public Workshop: Get Noticed: Effective Financial Privacy Notices, Washington, DC. http://www.ftc.gov/bcp/workshops/glb/presentations/abrams.pdf

Abrams, M. (2003): Making Notices Work For Real People., Proceedings of the 25th International Conference of Data Protection & Privacy Commissioners, Sydney, Australia. http://www.privacyconference2003.org/

Ackerman, M.S.; Cranor, L. and Reagle, J. (1999): Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences, Proceedings of the 1st ACM E-Commerce Conference, Denver, Co.

Agrawal, R.; Bayardo, R.J.; Faloutsos, C.; Kiernan, J.; Rantzau, R. and Srikant, R. (2004): Auditing Compliance with a Hippocratic Database, Proceedings of the 30th International Conference on Very Large Data Bases, Toronto, Canada.

Agrawal, R.; Imielinski, T. and Swami, A. (1993): Mining Associations between Sets of Items in Massive Databases, Proceedings of the ACM-SIGMOD International Conference on Management of Data, Washington D.C.

Agrawal, R.; Kiernan, J.; Srikant, R. and Xu, Y. (2002): Hippocratic Databases, 28th International Conference on Very Large Databases, Hong Kong, China. http://www.vldb.org/conf/2002/S05P02.pdf

Agrawal, R. and Srikant, R. (2000): Privacy-Preserving Data Mining, ACM-SIGMOD 2000 Conference on Management of Data, Dallas, TX.

Agre, P.E. and Rotenberg, M. (1997): Technology and Privacy: The New Landscape, MIT Press, Cambridge, MA.

Ajzen, I. (1991): The theory of planned behavior, Organizational Behavior and Human Decision Processes, (vol. 50), pp.179-211.

Alba, J.; Lynch, J.; Weitz, B.; Janiszewski, C.; Lutz, R.; Sawyer, A. and Wood, S. (1997): Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces, Journal of Marketing, (vol. 61), No. 3, pp.38-53.

Andersen Legal 2001 Internet Privacy Survey - A Re-Survey of the Privacy Practices of Australia's Most Popular Websites Sydney 12 April 2001.

Andrews, Sarah 2002 Privacy and Human Rights 2002 London UK Electronic Privacy Information Center http://www.privacyinternational.org/survey/phr2002/

Ardissono, L. and Goy, A. (1999): Tailoring the Interaction with Users in Electronic Shops, User Modeling: Proceedings of the 7th International Conference, Banff, Canada. http://www.cs.usask.ca/UM99/Proc/ardissono.pdf

Ardissono, Liliana and Goy, Anna (2000): Dynamic Generation of Adaptive Web Catalogs, Brusilivsky, Peter; Stock, Oliviero and Strappavara, Carlo, Eds, Adaptive Hypermedia and Adaptive Web-Based Systems (vol. 1892), pp. 5-16, Springer, Berlin.

Asonov, D. and Freytag, J. C. (2002): Almost Optimal Private Information Retrieval, Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET '02), San Francisco.

AT&T 2002 AT&T Privacybird http://www.privacybird.com/

Baldi, P.; Frasconi, P. and Smyth, P. (2003): Modeling the Internet and the Web. Probabilistic Methods and Algorithms., John Wiley & Sons, Chichester, UK.

BCG and Shop.Org (2002): The State of Retailing Online 5.0.

BDSG 2003 Bundesdatenschutzgesetz http://bundesrecht.juris.de/bundesrecht/bdsg_1990/htmltree.html

Beal, B. 2003 Analyzing the CRM analytics race SearchCRM.com http://searchcrm.techtarget.com/originalContent/0,289142,sid11_gci929770,00.html

Beck, L.L. (1980): A security mechanism for statistical databases, ACM Transactions on Database Systems, (vol. 5), No. 5, pp.316-328.

Behrens, L. 2001 Privacy and Security: The Hidden Growth Strategy Secondary Author: Gartner 31 May 2001

Belanger, F.; Hiller, J.S. and Smith, W.J. (2002): Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, Journal of Strategic Information Systems, (vol. 11), pp.245-270.

Bensberg, F. (2001): Web Log Mining als Instrument der Marketingforschung - Ein systemgestaltender Ansatz für internetbasierte Märkte [Web Log Mining as an Instrument for Marketing Research], Institut für Wirtschaftsinformatik: Westfälische Wilhelms-Universität Münster Wiesbaden, Germany.

Berendt, B.; Günther, O. and Spiekermann, S. (2005): Privacy in E-Commerce: Stated Preferences vs. Actual Behavior, Communication of the ACM, (vol. 48), No. 4, pp.101-106.

Berendt, B.; Mobasher, B.; Spiliopoulou, M. and Wiltshire, J. (2001): Measuring the accuracy of sessionizers for web usage analysis, Proceedings of the Workshop on Web Mining at SIAM Data Mining Conference, Chicago, IL.

Berendt, B. and Spiliopoulou, M. (2000): Analysing navigation behaviour in Web sites integrating multiple information systems, VLDB Journal: Special Issue on Databases and the Web, (vol. 9), No. 1, pp.56-75.

Berendt, B. and Teltzrow, M. (2005): Addressing Users Privacy Concerns for Improving Personalization Quality: Towards an Integration of User Studies and Algorithm Evaluation, Mobasher, B. and Anand, S.S., Eds, Intelligent Techniques for Web Personalization, Berlin etc.: Springer. LNAI.

Berry, L.L. (1995): Relationship Marketing of Services - Growing Interest, Emerging Perspectives, Journal of the Academy of Marketing Science, (vol. 23), No. 3, pp.236-245.

Berthon, P.; Pitt, L.F. and Watson, R.T. (1996): The World Wide Web as an Advertising Medium, Journal of Advertising Research, (vol. 36), No. 1, pp.43-54.

Bhattacherjee, A. (2002): Individual trust in online firms: scale development and initial trust, Journal of Management Information Systems, (vol. 19), No. 1, pp.213-243.

Boyens, C. (2004): On privacy trade-offs in web-based services, Institute of Information Systems: Humboldt-Universität zu Berlin Berlin.

Boyens, C.; Günther, O. and Teltzrow, M. (2002): Privacy Conflicts in CRM Services for Online Shops: A Case Study, Proceedings of the IEEE Workshop on Privacy, Security, and Data Mining, Maebashi, Japan.

Brodie, C.; Karat, C.-M. and Karat, J. (2004): How Personalization of an E-Commerce Website Affects Consumer Trust, Karat, J., Ed, Designing Personalized User Experience for eCommerce, pp. 185-206, Kluwer Academic Publishers, Dordrecht, Netherlands.

Brusilovsky, P. (2001): Adaptive hypermedia, User Modeling and User-Adapted Interaction, (vol. 11), No. 1-2, pp.87-110.

Brusilovsky, P.; Kobsa, A. and Vassileva, J. (1998): Adaptive Hypertext and Hypermedia, Kluwer Academic Publishers, Dordrecht, Netherlands.

Büchner, A.; Mulvenna, M.; Anand, S. and Hughes, J. (1999): An Internet-enabled Knowledge Discovery Process, Proceedings of the 9th International Database Conference on Heterogeneous and Internet Databases, Hong Kong, China.

BWahlG 2005 Bundeswahlgesetz http://bundesrecht.juris.de/bundesrecht/bwahlg/

Byrne, B. M. (1998): Structural equation modeling with LISREL, PRELIS, and SIMPLIS: basic concepts, applications, and programming, Lawrence Erlbaum Associates, Mahwah, NJ.

CG&I-R 2001 Privacy Policies Critical to Online Consumer Trust Secondary Author: Columbus Group and Ipsos-Reid Canadian Inter@ctive Reid Report

Chellappa, R.K. 2001 Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security Secondary Title: Working Paper http://asura.usc.edu/~ram/rcf-papers/sec-priv.pdf

Chin, D. N. (1989): KNOME: Modeling What the User Knows in UC, Kobsa, A. and Wahlster, W., Eds, User Models in Dialog Systems, pp. 74-107, Berlin, Heidelberg.

Chittaro, L. and Ranon, R. (2000): Adding Adaptive Features to Virtual Reality Interfaces for E-Commerce, Brusilivsky, P.; Stock, O. and Strappavara, C., Eds, Adaptive Hypermedia and Adaptive Web-Based Systems (vol. 1892), pp. 86-91, Springer, Berlin etc..

Cooley, R.; Mobasher, B. and Srivastava, J. (1999): Data preparation for mining World Wide Web browsing patterns, Journal of Knowledge and Information Systems, (vol. 1), No. 1, pp.5-32.

Cox, L.H. (1980): Suppression methodology and statistical disclosure control, Journal of the American Statistical Association, (vol. 75), No. 370, pp.377-385.

Cranor, L.; Langheinrich, M.; Marchiori, M.; Presler-Marshall, M. and Reagle, J. 2002 The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation 16 April 2002, http://www.w3.org/TR/P3P/

Cranor, L.; Reagle, J. and Ackerman, M. 1999 Beyond Concern: Understanding Net Users' Attitudes About Online Privacy AT&T Labs - Research Type of Work: Technical Report http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm

Crocker, D. and Overel, P. Augmented BNF for Syntax Specifications: ABNF, RFC2234 IETF http://www.ietf.org/rfc/rfc2234.txt

Cronbach, L. J. (1951): Coefficient alpha and the internal structure of tests, Psychometrika, (vol. 16), pp.297-334.

Culnan, M.J. and Bies, R.J. (2003): Consumer Privacy: Balancing Economic and Justice Considerations, Journal of Social Issues, (vol. 59), pp.323-353.

Culnan, M.J. and Milne, G.R. (2001): The Culnan-Milne Survey on Consumers & Online Privacy Notices: Summary of Responses, Interagency Public Workshop: Get Noticed: Effective Financial Privacy Notices, Washington, D.C.. http://www.ftc.gov/bcp/workshops/glb/supporting/culnan-milne.pdf

Cutler, M. and Sterne, J. 2000 E-Metrics - Business Metrics for the New Economy Netgenesis Corp. Type of Work: Technical Report http://www.emetrics.org/articles/emetrics.pdf

Cyber Dialogue 2001 UCO Software To Address Retailers' $6.2 Billion Privacy Problem http://www.cyberdialogue.com/news/releases/2001/11-07-uco-retail.pdf

Dai, H. and Mobasher, B. (2003): A Road map to More Effective Web Personalization: Integrating Domain Knowledge with Web Usage Mining, Proceedings of the International Conference on Internet Computing, Las Vegas, Nevada.

De Ruyter, K.; Wetzels, M. and Kleijnen, M. (2001): Customer adoption of e-services: an experimental study, International Journal of Service Industry Management, (vol. 12), No. 2, pp.184-207.

Debevc, M.; Meyer, B.; Donlagic, D. and Svecko, R. (1996): Design and evaluation of an adaptive icon toolbar, User Modeling and User-Adapted Interaction, (vol. 6), No. 1, pp.1-21.

Deloitte Touche Tohmatsu 2001 Dimension Data Privacy Survey Canberra http://www.didata.com.au/news/newsdetail.asp?ctID=174&sort=ctDateOfPubl%20DESC&filter=in&currentpage=1

Denning, D.E. (1982): Cryptography and Data Security, Addison-Wesley, Reading, MA.

Denning, D.E.; Denning, P.J. and Schwartz, M.D. (1979): The tracker: A threat to statistical database security, ACM Transactions on Database Systems, (vol. 4), No. 1, pp.76-79.

Department for Trade and Industry 2001 Informing Consumers about E-Commerce London Conducted by MORI, London: DTI http://www.mori.com/polls/2001/pdf/dti-e-commerce.pdf

Deutsche Post Direkt GmbH 2004 One to one: mit guten Adressen die Richtigen erreichen 5th of January, 2005 http://www.deutschepost.de//mlm.html/dpag/images/download/broschueren.Par.0107.File.pdf//download/broschueren/adressmanag_internet.pdf

Dobkin, D.; Jones, A.K. and Lipton, R.J. (1979): Secure databases: Protection against user influence, ACM Transactions on Database Systems, (vol. 4), No. 1, pp.97-106.

Domingo-Ferrer, J. and Herrera-Joancomarti, J. (1999): A privacy homomorphism allowing field operations on encrypted data, Jornades de Matematica Discreta i Algorismica, Universitat Politecnica de Catalunya.

Doney, P.M. and Cannon, J.P. (1997): An examination of the nature of trust in buyer-seller relationships, Journal of Marketing, (vol. 61), No. 2, pp.35-51.

Doyle, J.I. 2003 UCLA Internet Report University of California, LA February 2003 http://ccp.ucla.edu/pdf/UCLA-Internet-Report-Year-Three.pdf

Earp, J.B. and Baumer, D.C. (2003): Innovative Web Use to Learn about Consumer Behavior and Online Privacy, Communications of the ACM, (vol. 46), No. 4, pp.81-83.

Engel, J.F.; Kollat, D.T. and Blackwell, R.D. (1968): Consumer Behavior, Holt, Rinehart and Winston.

Ernst&Young May 2004 P3P Dashboard Report http://www.ey.com/global/download.nsf/US/P3P_Dashboard_-_May_2004/$file/E&YP3PDashboardMay2004.pdf

EU (1995): Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data, Official Journal of the European Communities, No. 23 November 1995 No L. 281, p.31ff.

EU (2002): Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector.

Fellegi, I.P. (1972): On the question of statistical confidentiality, Journal of American Statistical Association, (vol. 67), No. 337, pp.7-18.

Fink, J.; Kobsa, A. and Nill, A. (1998): Adaptable and Adaptive Information Provision for All Users, Including Disabled and Elderly People, The New Review of Hypermedia and Multimedia, (vol. 4), pp.163-188.

Fischer-Hübner, S. (2001): IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms (vol. 1958 LNCS), Springer, Heidelberg-Berlin, Germany.

Fiutak, M. 2004 Cookies als Netzindikatoren ungeeignet Secondary Author: ZDNet http://www.zdnet.de/news/tkomm/0,39023151,39126407,00.htm

Forrester 2001 Privacy issues inhibit online spending Cambridge, MA Forrester Research Type of Work: Survey Summary http://www.nua.ie/surveys?f=VS&art_id=905357259&rel=true

Foster, C. 2000 The Personalization Chain Secondary Title: Site Operations/Volume 3 Jupiter Communications

Fox, S.; Rainie, L.; Horrigan, J.; Lenhart, A.; Spooner, T. and Carter, C. 2000 Trust and Privacy Online: Why Americans Want to Rewrite the Rules Washington, DC The Pew Internet & American Life Project http://www.pewinternet.org/pdfs/PIP_Trust_Privacy_Report.pdf

Friedman, B.; Howe, D.C. and Felten, E. (2002): Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design, Proceedings of the 35th Hawaii International Conference on System Sciences, Hawaii.

Fu, Y.; Sandhu, K. and Shih, M. (1999): Generalization-Based Approach to Clustering of Web Usage Sessions, Proceedings of the WebKDD Workshop, San Diego, CA.

Gallaugher, J.M. (2002): E-Commerce and the Undulating Distribution Channel, Communications of the ACM, (vol. 45), No. 7, pp.89-95.

Gallo, R. and McAlister, J. 2003 The Top 50 Retailers Retailforward August 2003 Type of Work: Technical Report http://www.retailforward.com

Gallup Organization 2001 Majority of E-mail Users Express Concern about Internet Privacy Washington DC June 28, 2001

Ganesan, S. (1994): Determinants of long-term orientation in buyer-seller relationships, Journal of Marketing, (vol. 58), No. 2, pp.1-19.

Garbarino, E. and Johnson, M.S. (1999): The Different Roles of Satisfaction, Trust, and Commitment in Customer Relationships, Journal of Marketing, (vol. 63), No. 4, pp.70-87.

GartnerG2 2001 Privacy and Security: The Hidden Growth Strategy Secondary Title: Press Release http://www4.gartner.com/5_about/press_releases/2001/pr20010807d.html

Gefen, D. (2000): E-commerce: the role of familiarity and trust, Omega: The International Journal of Management Science, (vol. 28), No. 6, pp.725-737.

Goersch, D. (2003): Multi-Channel Integration in the Retail of Physical Products, PhD School in Informatics: Copenhagen Business School Copenhagen, Denmark.

Grabner-Kräuter, S. and Kaluscha, E.A. (2003): Empirical research in on-line trust: a review and critical assessment, International Journal of Human-Computer Studies, (vol. 58), No. 6, pp.783-812.

Gulati, R. and Garino, J. (2000): Get the Right Mix of Bricks and Clicks, Harvard Business Review, (vol. 78), No. 3, pp.107-114.

GVU 1998 GVU's 10th WWW User Survey Graphics, Visualization and Usability Lab, Georgia Tech 28th of May, 2000 http://www.cc.gatech.edu/gvu/user_surveys/survey-1998-10/

Han, J. and Kamber, M. (2000): Data Mining: Concepts and Techniques, Gray, J., Ed, Morgan Kaufmann Series in Data Management Systems.

Hansen, R. (2002): E-Commerce und Recht - Ein Leitfaden für Unternehmen, (Hrsg.), Hamann/Weidert, Ed, Erich-Schmidt-Verlag, Bielefeld.

Harper, J. and Singleton, S. 2001 With a Grain of Salt: What Consumer Privacy Surveys Don't Tell Us Competitive Enterprises Institute http://www.cei.org/PDFs/with_a_grain_of_salt.pdf

Harris Interactive 2000 A Survey of Consumer Privacy Attitudes and Behaviors Rochester, NY http://www.bbbonline.org/UnderstandingPrivacy/library/harrissummary.pdf

Harris Interactive 2001 Privacy Notices Research, Final Results Secondary Author: Initiative, Privacy Leadership Rochester, NY

Harris Interactive (2003): Most People Are Privacy Pragmatists, Rochester NY.

Hawes, J.M.; Mast, K.W. and Swan, J.E. (1989): Trust earning perceptions of sellers and buyers, Journal of Personal Selling and Sales Management, (vol. 9), No. 1, pp.1-8.

Heer, J. and Chi, E.H (2002): Separating the Swarm: Categorization Methods for User Access Sessions on the Web, Proceedings of the ACM CHI 2002 Conference on Human Factors in Computing Systems, Minneapolis, MN.

Heijden, H. van der; Verhagen, T. and Creemers, M. (2001): Predicting Online Purchase Behavior: Replications and Test of Competing Models, Proceedings of the 34th Hawaii International Conference on System Sciences, Hawaii.

Hine, C. and Eve, J. (1998): Privacy in the Marketplace, The Information Society, (vol. 14), No. 4, pp.253-262. http://taylorandfrancis.metapress.com/link.asp?id=033wvkeqd2weapjf.

Holynski, M. (1988): User-adaptive computer graphics, International Journal of Man-Machine Studies, (vol. 29), No. 5, pp.539-548.

Höök, K.; Karlgren, J.; Waern, A.; Dahlbäck, N.; Jansson, C.; Karlgren, K. and Lemaire, B. (1996): A glass box approach to adaptive hypermedia, User Modeling and User-Adapted Interaction, (vol. 6), No. 2-3, pp.157-184.

Howard, J.A. and Sheth, J.N. (1969): The Theory of Buying Behavior, John Wiley & Sons Inc., New York.

Hupprich, L. and Fan, J. 2004 Nielsen/Netratings Global Webwatch Finds Audiences of Top 10 Global Properties all Majority Male December 2004 http://www.nielsen-netratings.com/pr/pr_020117_eratings.pdf

Interactive Policy 2002 Views on Data Protection, Questionnaire on the Implementation of the Data Protection Directive (95/46/EC). Results of Online Consultation, 20th of June - 15th of September 2002 Brussels

Ipsos Reid, Emailthatpays 2001 Canadians' Love Affair with Email Continues http://www.ipsos-reid.com/media/content/displaypr.cfm?id_to_view=1345

Jameson, A.; Schäfer, R.; Simons, J. and Weis, Th. (1995): Adaptive Provision of Evaluation-Oriented Information: Tasks and Techniques, Proceedings of the 14th International Joint Conference on Artificial Intelligence, Montreal, San Mateo, CA.

Jarvenpaa, S. (1999): Consumer Trust in an Internet Store: A Cross-Cultural Validation, Journal of Computer-Mediated Communication, (vol. 5), No. 2.

Jarvenpaa, S.; Tractinsky, N. and Vitale, M. (2000): Consumer trust in an Internet store, Information Technology and Management, (vol. 1), No. 1-2, pp.45-71.

Jennrich, R. I. and Sampson, P. F. (1966): Rotation for simple loadings, Psychometrika, (vol. 31), pp.313-323.

Joachims, Th.; Freitag, D. and Mitchell, T. (1997): WebWatcher: A Tour Guide for the World Wide Web, Proceedings of the International Joint Conference on Artificial Intelligence, Nagoya, Japan.

Joerding, T. (1999) (1999): A temporary user modeling approach for adaptive shopping on the web, Proceedings of the 2nd Workshop on Adaptive Systems and User Modeling on the WWW, WWW-8, Toronto, Canada and UM99, Banff, Canada.

Jöreskog, K.G. and Sörbom, D. (1979): Advances in factor analysis and structural equation models, Cambridge, Mass.: Abt Books.

Jöreskog, K.G. and Sörbom, D. (1996): LISREL 8: Structural equation modeling with the SIMPLIS command language, Chicago, IL: Scientific Software International.

Jöreskog, K.G. and Sörbom, D. (2003): LISREL 8.54, SSI Central.

Jupiter Research Corporation 2001 CRM Moves into the Check-out Aisle - Multichannel Customer Integration Strategies JUPT691271

Kaplan, C.; Fenwick, J. and Chen, J. (1993): Adaptive hypertext navigation based on user goals and context, User Modeling and User-Adapted Interaction, (vol. 3), No. 3, pp.193-220.

Karat, C.; Brodie, C.; Karat, J.; Vergo, J. and Alpert, S. (2003): Personalizing the User Experience on ibm.com, IBM Systems Journal, (vol. 42), No. 2, pp.686-701.

Karjoth, G.; Schunter, M. and Waidner, M. (2003): Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data, Proceedings of the 2nd Workshop on Privacy Enhancing Technologies, LNCS Volume 2482, San Francisco, USA.

KDNuggets 2005 Data Mining, Knowledge Discovery, Genomic Mining, Web Mining http://www.kdnuggets.com

Kobsa, A. (2001): Generic User Modeling Systems, User Modeling and User-Adapted Interaction, (vol. 11), No. 1-2, pp.49-63.

Kobsa, A. 2002 Personalized Hypermedia and International Privacy Secondary Title: Communications of the ACM 45 5 64-67 http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf

Kobsa, A. (2003): A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems, Proceedings of the 3rd Workshop on Privacy Enhancing Technologies, Dresden, Germany.

Kobsa, A.; Koenemann, J. and Pohl, W. (2001): Personalized Hypermedia Presentation Techniques for Improving Customer Relationships, The Knowledge Engineering Review, (vol. 16), No. 2, pp.111-155.

Kobsa, A.; Müller, D. and Nill, A. (1994): KN-AHS: An Adaptive Hypertext Client of the User Modeling System BGP-MS, Proceedings of the 4th International Conference on User Modeling, Hyannis, MA.

Kobsa, A. and Schreck, J. (2003): Privacy through Pseudonymity in User-Adaptive Systems, ACM Transactions on Internet Technology, (vol. 3), No. 2, pp.149-183.

Kobsa, A. and Teltzrow, M. (2004): Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing Behavior, Proceedings of the 4th Workshop on Privacy Enhancing Technologies, Toronto, Canada.

Kobsa, A. and Teltzrow, M. (2005): Impacts of Contextualized Communication of Privacy Practices and Personalization Benefits on Purchase Behavior and Perceived Quality of Recommendation, Proceedings of the Workshop "Beyond Personalization 2005: A Workshop on the Next Stage of Recommender Systems Research" (IUI 2005), San Diego, CA.

Kobsa, Alfred; Koenemann, Jürgen and Pohl, Wolfgang 2001 Personalized Hypermedia Presentation Techniques for Improving Customer Relationships Secondary Title: The Knowledge Engineering Review 16 2 111-155 http://fit.gmd.de/~kobsa/papers/Kobsa-PHPT-draft.pdf

Koch, R. (1998): The 80/20 Principle: The Secret of Achieving More With Less, Bantam Doubleday Dell Publishing, New York.

Kohavi, R. (2001): Mining E-Commerce Data: the Good, the Bad, and the Ugly, Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA.

Kohavi, R. 2003 Seminar on Computational Learning and Adaptation on Real-world Insights from Mining Retail E-Commerce Data Stanford University, Center for the Study of Language and Information (CSLI) May 22, 2003 http://ai.stanford.edu/users/ronnyk/realInsights.ppt

Kohavi, R. (2004): Front Line Internet Analytics at Amazon.com, Proceedings of the Emetrics Conference, June 2004, Santa Barbara, CA.

Kohavi, R. and Parekh, R. (2003): Ten Supplementary Analyses to Improve E-commerce Web Sites, Proceedings of the 5th ACM WebKDD 2003 Web Mining for E-Commerce Workshop "Webmining as a Premise to Effective and Intelligent Web Applications", Washington, D.C..

Konstan, J. A.; Miller, B. N.; Maltz, D.; Herlocker, J. L.; Gordon, L. R. and Riedl, J. (1997): GroupLens: Applying Collaborative Filtering to Usenet News, Communications of the ACM, (vol. 40), No. 3, pp.77-87.

Kosala, R. and Blockeel, H. (2000): Web mining research: A survey., SIGKDD Explorations, (vol. 2), No. 1, pp.1-15.

Koufaris, M. and Hampton-Sosa, W. 2002 Customer trust online: examining the role of the experience with the Web-site Secondary Title: CIS Working Paper Series Zicklin School of Business, Baruch College, New York, NY http://cisnet.baruch.cuny.edu/papers/cis200205.pdf

Kozierok, R. and Maes, P. (1993): A Learning Interface Agent for Scheduling Meetings, Proceedings of the International Workshop on Intelligent User Interfaces, Orlando, FL.

Krogsaeter, M.; Oppermann, R. and Thomas, C. G. (1994): A User Interface Integrating Adaptability and Adaptivity, Oppermann, R., Ed, Adaptive User Support, pp. 97-125, Lawrence Erlbaum Associates, Inc..

Küpper, D. and Kobsa, A. (1999): User-Tailored Plan Generation, Proceedings of the User Modeling 7th International Conference, Banff, Canada. http://www.ics.uci.edu/~kobsa/papers/1999-UM99-kobsa.pdf

Lamm, S.E. ; Reed, D.A. and Scullin, W.H. (1996): Real-Time Geographic Visualization of World Wide Web Traffic, Computer Networks, (vol. 28), No. 7-11, pp.1457-1468.

Lederer, S.; Dey, A. and Mankoff, J. 2002 A Conceptual Model and Metaphor of Everyday Privacy in Ubiquitous Computing Secondary Author: Research, Intel Secondary Title: Technical Report IRB-TR-02-017 http://www.intel-research.net/Publications/Berkeley/120520020944_107.pdf

Lee, J.; Podlaseck, M.; Schonberg, E. and Hoch, R. (2001): Visualization and Analysis of Clickstream Data of Online Stores for Understanding Web Merchandizing, Data Mining and Knowledge Discovery, (vol. 5), No. 1/2, pp.59-84.

LeFevre, K.; Agrawal, R.; Ercegovac, V.; Ramakrishnan, R.; Xu, Y. and DeWitt, D.J. (2004): Limiting Disclosure in Hippocratic Databases, Proceedings of the 30th International Conference on Very Large Data Bases, Toronto, Canada.

Lefons, E.; Silvestri, A. and Tangorra, F. (1983): An analytical approach to statistical databases, Proceedings of the 9th International Conference on Very Large Databases.

Lesh, N.; Rich, C. and Sidner, C.L. (1999): Using plan recognition in human-computer collaboration, Proceedings of the User Modeling 7th International Conference, Banff, Canada.

Lieberman, H. (1995): Letizia: An Agent that Assists Web Browsing, Proceedings of the 14th International Joint Conference on Artificial Intelligence, Montreal, Canada.

Likert, R. (1932): A Technique for the Measurement of Attitudes, Summers, G., Ed, Attitude Measurement, pp. 149-158, Rand McNally&Company, Chicago, IL.

Lorenz, M. O. (1905): Methods for Measuring the Concentration of Wealth, American Statistical Association, (vol. 9), pp.209-219.

Lynch, P.J. and Horton, S. (2001): Web Style Guide, Yale University. http://www.webstyleguide.com/site/index.html

Mabley, Kevin 2000 Privacy vs. Personalization: Part III Cyber Dialogue, Inc. http://www.cyberdialogue.com/library/pdfs/wp-cd-2000-privacy.pdf

Maes, P. (1994): Agents that Reduce Work and Information Overload, Communications of the ACM, (vol. 37), No. 7, pp.31-40.

Malacinski, A.; Dominick, S. and Hatrick, T. 2001 Measuring Web Traffic Secondary Author: IBM http://www-106.ibm.com/developerworks/web/library/wa-mwt1

Markillie, P. (2004): A Perfect Market: A Survey of E-Commerce, Economist (vol. 371), No. 8375, pp. 3-5.

Melissa Data 2004 IP2Location - Know where your web visitors are located 5th of January, 2005 http://www.melissadata.com/lookups/ip2location.asp

Miglautsch, J.R. (2000): Thoughts on RFM scoring, Journal of Database Marketing, (vol. 8), No. 1, pp.67-72.

Mitchell, T.; Caruana, R.; Freitag, D.; McDermott, J. and Zabowski, D. (1994): Experience with a Learning Personal Assistant, Communications of the ACM, (vol. 37), No. 7, pp.81-91.

Mobasher, B.; Cooley, R. and Srivastava, J. (2000): Automatic personalization based on web usage mining, Communications of the ACM, (vol. 43), No. 8, pp.142-151.

Mobasher, B.; Dai, H.; Luo, T. and Nakagawa, M. (2002): Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization., Data Mining and Knowledge Discovery, (vol. 6), No. 1, pp.61-82.

Mobasher, B.; Dai, H.; Luo, T.; Sung, Y. and Zhu, J. (2000): Integrating Web Usage and Content Mining for More Effective Personalization, Proceedings of the International Conference on E-Commerce and Web Technologies (ECWeb2000), Greenwich, UK.

Moe, W. (2001): Buying, Searching, or Browsing: Differentiating between Online Shoppers In-Store Navigational Clickstream, Journal of Consumer Psychology, (vol. 13), No. 1&2.

Moe, W. and Fader, P. 2000 Capturing Evolving Visit Behavior in Clickstream Data. Secondary Title: The Wharton School, Working Paper http://www-marketing.wharton.upenn.edu/ideas/pdf/00-003.pdf

Monticino, M. (1998): Web-Analysis: stripping away the hype, IEEE Computer, (vol. 31), No. 12, pp.130-132.

Morgan, R.M. and Hunt, S.D. (1994): The Commitment-Trust Theory of Relationship Marketing, Journal of Marketing, (vol. 58), No. 3, pp.20-38.

Mulvenna, M. D.; Anand, S.S. and Buchner, A.G. (2000): Personalization on the net using web mining, Communications of the ACM, (vol. 43), No. 8, pp.123-125.

Neiling, M. (2004): Identifizierung von Realwelt-Objekten in multiplen Datenbanken, Brandenburgische Technische Universität Cottbus. http://www.ub.tu-cottbus.de/hss/diss/fak1/neiling_m/pdf/diss_neiling.pdf

Nelson, P.J. (1974): Advertising as Information, Journal of Political Economy, (vol. 82), No. 4, pp.729-754.

Newcombe, H.B.; Fair, M.E. and Lalonde, P. (1992): The use of names for linking personal records, Journal of the American Statistical Association, (vol. 87), pp.1193-1204.

Nicosia, F.M. (1966): Consumer Decision Processes, Prentice-Hall, Englewood Cliffs, NJ.

Olsen, S. 2000 Geographic tracking raises opportunities, fears Secondary Author: CNET News.com 28th of April, 2005 http://news.com.com/2100-1023-248274.html?legacy=cnet

Omwando, H. 2002 Choosing the Right Retail Channel Strategy Forrester Research, Tech Strategy Report

Otto, J.R. and Chung, Q.B. (2000): A Framework for Cyber Enhanced Retailing, Electronic Markets, (vol. 10), No. 3, pp.185-191.

P3P 2002 W3C Platform for Privacy Preferences Initiative, Version 1.0 as of April 2002 http://www.w3.org/P3P

Palen, L. and Dourish, P. (2002): Unpacking “Privacy” for a Networked World, Proceedings of the Conference on Human Factors in Computing Systems, Ft. Lauderdale, Florida, USA.

Patrick, A.S. and Kenny, S. 2003 From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interfaces Secondary Author: Dingledine, R. Secondary Title: Privacy Enhancing Technologies Heidelberg, Germany Springer Verlag LNCS 2760 107-124 http://www.andrewpatrick.ca/legint/pet-workshop-patrick-kenny.pdf

Patrick, A.S. and Kenny, S. (2003): From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interfaces, Dingledine, R., Ed, Privacy Enhancing Technologies (vol. LNCS 2760), pp. 107-124, Springer Verlag, Heidelberg, Germany. http://www.andrewpatrick.ca/legint/pet-workshop-patrick-kenny.pdf

Pavlou, P.A. (2003): Consumer acceptance of electronic commerce - integrating trust and risk with the technology acceptance model, International Journal of Electronic Commerce, (vol. 7), No. 3, pp.69-103.

Pazzani, M. and Billsus, D. (1997): Learning and Revising User Profiles: The Identification of Interesting Web Sites, Machine Learning, (vol. 27), pp.313-331.

Pepper, P. 2003 Funktionale Programmierung in OPAL, ML, HASKELL und Gofer. Springer 2nd edition

Perkowitz, M. and Etzioni, O. (1998): Adaptive web pages: Automatically synthesizing web pages., Proceedings of the Innovative Applications of Artificial Intelligence Conference, Madison, Wisconsin.

Perkowitz, M. and Etzioni, O. (2000): Adaptive web sites, Communications of the ACM, (vol. 43), No. 8, pp.152-158.

Personalization Consortium 2000 Personalization & Privacy Survey Edgewater Place, MA Personalization Consortium http://www.personalization.org/SurveyResults.pdf

Phau, I. and Poon, S.M. (2000): Factors Influencing the Types of Products and Services Purchased over the Internet, Internet Research, (vol. 10), No. 2, pp.102-113.

Pohle, C. and Spiliopoulou, M. (2002): Building and Exploiting Ad Hoc Concept Hierarchies for Web Log Analysis, Proceedings of the 4th International Conference Data Warehousing and Knowledge Discovery (DaWaK), Aix-en-Provence, France.

Popp, H. and Lödel, D. (1996): Fuzzy techniques and user modeling in sales assistants, User Modeling and User-Adapted Interaction, (vol. 5), No. 3-4, pp.349-370.

Privacy & American Business 1999 Personalized Marketing and Privacy on The Net: What Consumers Want November 1999 http://www.pandab.org/doubleclicksummary.html

Reinartz, W.J. and Kumar, V. (2003): The Impact of Customer Relationship Characteristics on Profitable Lifetime Duration, (vol. 67), No. 1, pp.77-99.

Resnick, P. and Varian, H. R. (1997): Recommender Systems, Communications of the ACM, (vol. 40), No. 3, pp.56-58.

Responsys.com (2000): Online Marketers Have Little Confidence in Self-Regulation of Internet Privacy. Sponsored by Millard Brown IntelliQuest, Palo Alto, CA.

Rivest, R.; Adleman, L. and Dertouzos, M. (1978): On Data Banks and Privacy Homomorphisms, DeMillo, R.A., Ed, Foundations of Secure Computation, Academic Press, New York.

Rosen, K.T. and Howard, A.L. (2000): E-Retail: Gold Rush or Fool's Gold?, California Management Review, (vol. 42), No. 3, pp.72-100.

Rotenberg, Marc (2001): The Privacy Law Sourcebook 2001: United States Law, International Law, and Recent Developments, EPIC, Washington, DC.

Roy Morgan Research 2001 Privacy and the Community Sydney Prepared for the Office of the Federal Privacy Commissioner http://www.privacy.gov.au/publications/rcommunity.html

Sakagami, H.; Kamba, T.; Sugiura, A. and Koseki, Y. (1998): Effective personalization of push-type systems: visualizing information freshness, Proceedings of the 7th World Wide Web Conference, Brisbane, Australia.

SAP AG (2001) CRM Analytics, Presentation Slides, part of my SAP CRM

Sarwar, B.; Karypis, G.; Konstan, J. and Riedl, J. (2000): Analysis of Recommendation Algorithms for E-Commerce., Proceedings of the 1st ACM Conference on Electronic Commerce, San Diego, CA.

Schneemann, K. 2003 Who clicks Who? Online Reichweiten Monitor 2003 II Secondary Author: G+J Electronic Media Sales GmbH Secondary Title: Die Blaue Reihe http://www.gujmedia.de/_components/sidebars/mediaservice_sidebar/EMS_ORM_2003_II.pdf

Schwickert, A. C. (2001): Controlling-Kennzahlen für Web Sites, 5. Internationale Tagung Wirtschaftsinformatik "Information Age Economy", Augsburg, Germany.

Shahabi, C.; Zarkesh, A.M.; Adibi, J. and Shah, V. (1997): Knowledge Discovery from User's Web-page Navigation, Proceedings of the 7th IEEE International Conference On Research Issues in Data Engineering.

Shardanand, U. and Maes, P. (1995): Social Information Filtering: Algorithms for Automating 'Word of Mouth', Proceedings of CHI-95 (Human Factors in Computing).

Shern, S. 2001 Global Online Retailing Secondary Author: Ernst&Young http://www.ey.com/global/download.nsf/International/Global_Online_Retailing_-_Special_Report_2001/$file/GOR_2001.pdf

Shneiderman, B. (2000): Universal Usability, Communications of the ACM, (vol. 43), No. 5, pp.85-91.

Shneiderman, B. and Plaisant, C. 2004 Designing the User Interface Pearson Addison Wesley 4th

Shop.org and Forrester Research 2004 The State of Retailing Online 7.0 http://www.shop.org/research/SRO7/SRO7main.asp

Silverstein, M.J.; Sirkin, H.L. and Stanger, P. 2002 The State of Retailing Online 5.0 Secondary Author: BCG and Shop.org 28th of April, 2005 http://www.bcg.com/publications/publications_search_results.jsp?PUBID=755

Sitkin, S.B. and Weingart, L.R. (1995): Determinants of risky decision-making behavior: a test of the mediating role of risk perceptions and propensity, Academy of Management Journal, (vol. 38), No. 6, pp.1573-1592.

Sommerville, I. (2004): Software Engineering, 8th. ed., Pearson.

Specht, M. (1998): Empirical Evaluation of Adaptive Annotation in Hypermedia, Proceedings of the ED-MEDIA98, Freiburg, Germany.

Spiekermann, S.; Grossklags, J. and Berendt, B. (2001): E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior, Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL.

Spiliopoulou, M. (1999): The laborious way from data mining to Web mining, International Journal of Computer Systems, Science & Engineering, Special Issue on "Semantics of the Web", (vol. 14), pp.113-126.

Spiliopoulou, M. (2000): Web usage mining for Web site evaluation, Communications of the ACM, (vol. 43), No. 8, pp.127-134.

Spiliopoulou, M. and Berendt, B. (2001): Kontrolle der Präsentation und Vermarktung von Gütern im WWW anhand von Data-Mining-Techniken, Hippner, H.; Küsters, M.; Meyer, M. and Wilde, K.D., Eds, Handbuch Data Mining - Knowledge Discovery in Databases, pp. 855-873, Vieweg, Wiesbaden, Germany.

Spiliopoulou, M. and Faulstich, L. C. (1999): WUM: A Tool for Web Utilization Analysis, Extended Version of Proceedings Workshop WebDB'98 at the International Conference on Extending DataBase Technology (LNCS 1590, pp. 184-203).

Spiliopoulou, M. and Faulstich, L.C. (1998): WUM: A Web utilization miner, Proceedings of the Workshop WebDB98 at the International Conference on Extending Database Technology, Valencia, Spain.

Spiliopoulou, M.; Mobasher, B. and Berendt, B. (2002): Web Usage Mining for E-Business Applications, Tutorial at the 13th European Conference on Machine Learning (ECML'02) / 6th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD'02), Helsinki, Finland.

Spiliopoulou, M.; Mobasher, B.; Berendt, B. and Nakagawa, M. (2003): A framework for the evaluation of session reconstruction heuristics in Web-usage analysis, INFORMS Journal on Computing, (vol. 15), pp.171-190.

Spiliopoulou, M. and Pohle, C. (2001): Data mining for measuring and improving the success of web sites, Data Mining and Knowledge Discovery, (vol. 5), No. 1-2, pp.85-114.

Spiliopoulou, M.; Pohle, C. and Teltzrow, M. (2002): Modelling Web Site Usage with Sequences of Goal-Oriented Tasks, Multikonferenz Wirtschaftsinformatik, Nürnberg, Germany.

Srivastava, J.; Cooley, R.; Deshpande, M. and Tan, P.-N. (2000): Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data, SIGKDD Explorations, (vol. 1), No. 2, pp.12-23.

Srivastava, J.; Prasanna, D. and Kumar, V. (2002): Web Mining: Accomplishments & Future Directions, National Science Foundation Workshop on Next Generation Data Mining (NGDM'02), Baltimore, Maryland.

Stallings, W. (1999): Cryptography and Network Security: Principles and Practice, Prentice Hall.

Steinfield, C. (2002): Understanding Click and Mortar E-Commerce Approaches: A Conceptual Framework and Research Agenda, Journal of Interactive Advertising, (vol. 2), No. 2.

Stone, M.; Hobbs, M. and Khaleeli, M. (2002): Multichannel customer management: the benefits and challenges, Journal of Database Marketing, (vol. 10), No. 1, pp.39-53.

Subramaniam, C.; Shaw, M.J. and Gardner, D.M. (2000): Product Marketing and Channel Management in Electronic Commerce, Information Systems Frontier, (vol. 1), No. 4, pp.363-378.

Sweeney, L. (2001): Computational Disclosure Control: A Primer on Data Privacy Protection, Massachusetts Institute of Technology Cambridge. http://www.swiss.ai.mit.edu/classes/6.805/articles/privacy/sweeney-thesis-draft.pdf

Sweeney, L. (2002): K-anonymity: A model for protecting privacy, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, (vol. 10), No. 7, pp.557-570.

Swerdlow, F.S.; Deeks, J. and Cassar, K. 2002 In-Store Pickup Implement Last Mile Policies to Optimize Technology Investments. Jupiter Research, Tech Report, vol. 10

TDDSG 2001 Gesetz über den Datenschutz bei Telediensten (Teledienstedatenschutzgesetz - TDDSG) [Teleservices Data Protection Law]. Artikel 3 des Gesetzes über rechtliche Rahmenbedingungen für den elektronischen Geschäftsverkehr (Elektronischer Geschäftsverkehr-Gesetz – EGG) vom 14 Dezember 2001 BGBl I, 3721.

Tedeschi, B. 2001 Web Retailers Add In-Store Pick-Up 360Commerce 5th of January, 2005 http://www.360commerce.com/display.php?tid=129

Teltzrow, M. and Berendt, B. (2003): Web-Usage-Based Success Metrics for Multi-Channel Businesses, Proceedings of the 5th ACM WebKDD 2003 Web Mining for E-Commerce Workshop, Washington, D.C..

Teltzrow, M.; Berendt, B. and Günther, O. (2003): Consumer Behaviour at Multi-Channel Retailers, Proceedings of the 4th IBM eBusiness Conference, University of Surrey, School of Management, UK. http://www.wiwi.hu-berlin.de/~teltzrow/MCBehavior.pdf

Teltzrow, M.; Berendt, B. and Günther, O. (2004): Ein Kennzahlensystem für Mehrkanalhändler, Multikonferenz Wirtschaftsinformatik (MKWI), Essen, Germany.

Teltzrow, M. and Günther, O. (2001): eCRM: Konzeption und Möglichkeiten zur Effizienzmessung [eCRM: Concepts and Options for Performance Evaluation], Praxis der Wirtschaftsinformatik, (vol. 221), pp.16-26.

Teltzrow, M. and Günther, O. (2003): Web Usage Metrics for Multi-Channel Retailers, Proceedings of the 4th International Conference EC-Web, Prague, Czech Republic.

Teltzrow, M.; Günther, O. and Pohle, C. (2003): Analyzing Consumer Behavior at Retailers with Hybrid Distribution Channels - A Trust Perspective, ACM International Conference Proceedings, Proc. 5th International Conference of Electronic Commerce, Pittsburgh, Pennsylvania.

Teltzrow, M. and Kobsa, A. (2003): Impacts of User Privacy Preferences on Personalized Systems - a Comparative Study, CHI-2003 Workshop "Designing Personalized User Experiences for eCommerce: Theory, Methods, and Research", Fort Lauderdale, FL.

Teltzrow, M. and Kobsa, A. (2004): Communication of Privacy and Personalization in E-Business, Proceedings of the Workshop “WHOLES: A Multiple View of Individual Privacy in a Networked World”, Stockholm, Sweden. http://www.ics.uci.edu/~kobsa/papers/2004-WHOLES-kobsa.pdf

Teltzrow, M. and Kobsa, A. (2004): Impacts of User Privacy Preferences on Personalized Systems: a Comparative Study, Karat, C.-M.; Blom, J. and Karat, J., Eds, Designing Personalized User Experiences for eCommerce, pp. 315-332, Kluwer Academic Publishers, Dordrecht, Netherlands.

Teltzrow, M.; Preibusch, S. and Berendt, B. (2004): SIMT - A Privacy-Preserving Web Metrics Tool, Proceedings of the IEEE Conference on Electronic Commerce (CEC04), San Diego.

Teo, Hock-Hai ; Wan, W. and Li, L. (2004): Volunteering Personal Information on the Internet: Effects of Reputation, Privacy Initiatives, and Reward on Online Consumer Behavior, Proceedings of the 37th Hawaii International Conference on System Sciences, Big Island, Hawaii, USA.

Torra, V. (2000): Re-identifying individuals using OWA operators, Proceedings of the 6th International Conference on Soft Computing, Iizuka, Fukuoka, Japan.

UMR (2001): Privacy Concerns Loom Large. Conducted for the Privacy Commissioner of New Zealand, Survey summary, Auckland: PC of New Zealand. http://www.privacy.org.nz/privword/42pr.html

USA Today 2003 Internet sales soar over Thanksgiving weekend Secondary Title: Money New York 2nd of December, 2003 http://www.usatoday.com/money/industries/retail/2003-12-02-internet-sales_x.htm

van Duyne, D. K.; Landay, J. A. and Hong, J. I. (2002): The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience, Addison-Wesley, Boston.

W3C 1995 Logging Control In W3C httpd http://www.w3.org/Daemon/User/Config/Logging.html

Weichert, T. (2004): Geomarketing und Datenschutz, Symposium "Living by numbers", Düsseldorf, Germany. http://www.datenschutzzentrum.de/wirtschaft/vortrag_geomarketing.htm

Weigend, A. (2003): Analyzing Customer Behavior at Amazon.com (Invited Talk), Proceedings of the ACM Conference on Knowledge Discovery and Data Mining, Washington, DC.

Wilde, E. (2003): Wilde's WWW - Technical Foundations of the World Wide Web, 2nd. ed., Springer, New York.

Willenborg, L. and Waal, T. de (2001): Elements of Statistical Disclosure Control, Addison Wesley.

Winkler, W.E. (1995): Matching and record linkage, Cox, B.G., Ed, Business Survey Methods, pp. 355-384, J. Wiley, New York.

Wright, A.A. and Lynch, J.G.Jr. (1995): Communications effects of advertising versus direct experience when both search and experience attributes are present, Journal of Consumer Research, (vol. 21), No. 3, pp.708-718.

Yu, C.T. and Chin, F.Y. (1977): A study on the protection of statistical databases, Proceedings of the ACM SIGMOD International Conference of the Management of Data, Toronto, Canada.

Zaiane, O.R.; Xin, M. and Han, J. (1998): Discovering web access patterns and trends by applying OLAP and data mining technology on web logs, Proceedings of Advances in Digital Libraries Conference (ADL'98), Santa Barbara, CA.

© Die inhaltliche Zusammenstellung und Aufmachung dieser Publikation sowie die elektronische Verarbeitung sind urheberrechtlich geschützt. Jede Verwertung, die nicht ausdrücklich vom Urheberrechtsgesetz zugelassen ist, bedarf der vorherigen Zustimmung. Das gilt insbesondere für die Vervielfältigung, die Bearbeitung und Einspeicherung und Verarbeitung in elektronische Systeme.
DiML DTD Version 4.0Zertifizierter Dokumentenserver
der Humboldt-Universität zu Berlin
HTML generated: