Beckett, P. (2020) GDPR: Two Years On, Alvarez & Marsal | Management Consulting | Professional Services. Available at: https://www.alvarezandmarsal.com/insights/gdpr-two-years (Accessed: 20 August 2020).
Boerman, S. C., Kruikemeier, S. and Zuiderveen Borgesius, F. J. (2017) ‘Online Behavioral Advertising: A Literature Review and Research Agenda’, Journal of Advertising, 46(3), pp. 363–376. doi: 10.1080/00913367.2017.1339368.
Bohn, D. (2020) Google to ‘phase out’ third-party cookies in Chrome, but not for two years, The Verge. Available at: https://www.theverge.com/2020/1/14/21064698/google-third-party-cookies-chrome-two-years-privacy-safari-firefox (Accessed: 20 August 2020).
Capgemini Research Institute (2019) Report_Championing-Data-Protection-and-Privacy.pdf. Available at: https://www.capgemini.com/wp-content/uploads/2019/09/Report_Championing-Data-Protection-and-Privacy.pdf (Accessed: 4 April 2020).
Cavoukian, A. (2010) ‘Privacy by Design The 7 Foundational Principles’, p. 5.
Chapman, S. and Dhillon, G. S. (2002) ‘Privacy and the Internet: The Case of the DoubleClick, Inc.’, in Social Responsibility in the Information Age: Issues and Controversies. IGI Global, pp. 75–88.
Chellappa, R. and Sin, R. (2005) ‘Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma’, Information Technology and Management, 6, pp. 181–202. doi: 10.1007/s10799-005-5879-y.
Cofone, I. N. (2016) ‘The way the cookie crumbles: online tracking meets behavioural economics: Table A1’:, International Journal of Law and Information Technology, p. eaw013. doi: 10.1093/ijlit/eaw013.
Cranor, L. F., Byers, S. and Kormann, D. (2003) ‘An analysis of P3P deployment on commercial, government, and children’s web sites as of May 2003’, Washington, DC: Federal Trade Commission.
Davis, F. D. (1989) ‘Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology’, MIS Quarterly, 13(3), p. 319. doi: 10.2307/249008.
Engberg, S. (2015) When Consent does not makes sense, Security by Design must be required, FUTURIUM - European Commission. Available at: https://ec.europa.eu/futurium/en/content/when-consent-does-not-makes-sense-security-design-must-be-required (Accessed: 18 August 2020).
GDPR.EU (2019) GDPR fines after one year: Key takeaways for businesses, GDPR.eu. Available at: https://gdpr.eu/gdpr-fines-so-far/ (Accessed: 3 April 2020).
Help University, Malaysia and Lai, P. (2017) ‘THE LITERATURE REVIEW OF TECHNOLOGY ADOPTION MODELS AND THEORIES FOR THE NOVELTY TECHNOLOGY’, Journal of Information Systems and Technology Management, 14(1). doi: 10.4301/S1807-17752017000100002.
Hoban, P. R. and Bucklin, R. E. (2015) ‘Effects of Internet Display Advertising in the Purchase Funnel: Model-Based Insights from a Randomized Field Experiment’, Journal of Marketing Research, 52(3), pp. 375–393. doi: 10.1509/jmr.13.0277.
Hoffman, D., Novak, T. and Peralta, M. (1999) ‘Building Consumer Trust Online’, Commun. ACM, 42, pp. 80–85. doi: 10.1145/299157.299175.
Jarvenpaa, S., Tractinsky, N. and Vitale, M. (2000) ‘Consumer trust in an Internet Store’, International Journal of Information Technology and Management - IJITM, 1. doi: 10.1023/A:1019104520776.
Jutla, D. and Bodorik, P. (2005) ‘Sociotechnical Architecture for Online Privacy’, Security & Privacy, IEEE, 3, pp. 29–39. doi: 10.1109/MSP.2005.50.
Kotler, P. (1984) Marketing Essentials. Prentice-Hall. Available at: https://books.google.ie/books?id=Bl8PAQAAMAAJ.
Kurtz, C., Semmann, M. and Bã, T. (2018) ‘Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors’, p. 10.
Lardinois, F. (2020) ‘Google wants to phase out support for third-party cookies in Chrome within two years’, TechCrunch, 14 January. Available at: https://social.techcrunch.com/2020/01/14/google-wants-to-phase-out-support-for-third-party-cookies-in-chrome-within-two-years/ (Accessed: 29 June 2020).
Lee, P. (2011) ‘The impact of cookie “consent” on targeted adverts’, Journal of Database Marketing & Customer Strategy Management, 18(3), pp. 205–209. doi: 10.1057/dbm.2011.20.
Leenes, R. (2017) ‘From regulatory failure to user empowerment?’, p. 20.
Legroju (2017) Proposal for an ePrivacy Regulation, Shaping Europe’s digital future - European Commission. Available at: https://ec.europa.eu/digital-single-market/en/proposal-eprivacy-regulation (Accessed: 3 April 2020).
Marcus, A. (2016) Design, User Experience, and Usability: Design Thinking and Methods: 5th International Conference, DUXU 2016, Held as Part of HCI International 2016, Toronto, Canada, July 17–22, 2016, Proceedings, Part I. Springer.
McCoy, J. (2016) What are EAT and YMYL: New Google Search Guidelines Acronyms, SEMrush Blog. Available at: https://www.semrush.com/blog/eat-and-ymyl-new-google-search-guidelines-acronyms-of-quality-content/ (Accessed: 15 October 2020).
McStay, A. (2013) ‘I consent: An analysis of the Cookie Directive and its implications for UK behavioral advertising’, New Media & Society, 15(4), pp. 596–611. doi: 10.1177/1461444812458434.
Poole, B. (2019) The end of digital marketing, Think with Google. Available at: https://www.thinkwithgoogle.com/marketing-resources/data-measurement/digital-marketing-mindset/ (Accessed: 8 November 2019).
Porter, M. E. (1996) ‘What Is Strategy?’ Available at: https://www.hbs.edu/faculty/Pages/item.aspx?num=10698 (Accessed: 22 June 2020).
Rogers, D. L. (2016) The Digital Transformation Playbook: Rethink Your Business for the Digital Age. Columbia University Press (Columbia Business School Publishing). Available at: https://books.google.ie/books?id=LsF1CwAAQBAJ.
Ross, J. (2014) the_business_value_of_user_experience-3.pdf. Available at: http://www.infragistics.com/media/335732/the_business_value_of_user_experience-3.pdf (Accessed: 24 June 2020).
San, M. S. and Camarero, C. (2009) ‘How perceived risk affects online buying’, Online Information Review, 33(4), pp. 629–654. doi: 10.1108/14684520910985657.
Saunders, M., Lewis, P. and Thornhill, A. (2019) Research methods for business students. Harlow: Pearson Education. Available at: http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781292208794.
Schmidt-Subramanian, M. (2014) ‘The Business Impact Of Customer Experience, 2014’, p. 12.
Schofield, J. (2018) ‘What should I do about all the GDPR pop-ups on websites?’, The Guardian, 5 July. Available at: https://www.theguardian.com/technology/askjack/2018/jul/05/what-should-i-do-about-all-the-gdpr-pop-ups-on-websites (Accessed: 4 April 2020).
Slefo, G. P. (2020) Behind Google’s decision to remove third-party cookies from Chrome. Available at: https://adage.com/article/digital/behind-googles-decision-remove-third-party-cookies-chrome/2227126 (Accessed: 20 August 2020).
Stewart, H. and Jürjens, J. (2018) Data Security and Consumer Trust in FinTech Innovation in Germany. Emerald Group Publishing Limited. Available at: https://books.google.ie/books?id=UyvPvQEACAAJ.
Trevisan, M. et al. (2019) ‘4 Years of EU Cookie Law: Results and Lessons Learned’, Proceedings on Privacy Enhancing Technologies, 2019(2), pp. 126–145. doi: 10.2478/popets-2019-0023.
Ur, B. et al. (2012) ‘Smart, useful, scary, creepy: perceptions of online behavioral advertising’, in Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS ’12. the Eighth Symposium, Washington, D.C.: ACM Press, p. 1. doi: 10.1145/2335356.2335362.
Venkatesh, V. and Bala, H. (2008) ‘Technology Acceptance Model 3 and a Research Agenda on Interventions’, Decision Sciences, 39(2), pp. 273–315. doi: 10.1111/j.1540-5915.2008.00192.x.
Walport, M. and Thomas, R. (2008) Data Sharing Review Report. Available at: https://amberhawk.typepad.com/files/thomas-walport-datasharingreview2008.pdf (Accessed: 11 October 2020).
Authors who publish with DBS Business Review agree to the following terms:
a) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons BY-NC-SA Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b) Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c) Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Open Access Citation Advantage).