메뉴 건너뛰기




Volumn 13, Issue 6, 2009, Pages 423-434

RFID and privacy: What consumers really want and fear

Author keywords

Acceptance; Behavior; Privacy; Privacy Enhancing Technologies (PETs); RFID

Indexed keywords

ACCEPTANCE; BEHAVIOR; PRIVACY; PRIVACY ENHANCING TECHNOLOGIES (PETS); RFID;

EID: 67650324012     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-008-0215-2     Document Type: Conference Paper
Times cited : (16)

References (41)
  • 1
    • 10444279257 scopus 로고    scopus 로고
    • None of our business
    • Fusaro R (2004) None of our business. Harv Bus Rev 82(12):33-44
    • (2004) Harv Bus Rev , vol.82 , Issue.12 , pp. 33-44
    • Fusaro, R.1
  • 2
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • Smith H, Milberg J, Burke, J (1996) Information privacy: Measuring individuals' concerns about organizational practices. MIS Q 20(2):167-196
    • (1996) MIS Q , vol.20 , Issue.2 , pp. 167-196
    • Smith, H.1    Milberg, J.2    Burke, J.3
  • 6
    • 2642558489 scopus 로고    scopus 로고
    • In: A.-I. Center (ed.). Auto-ID Center, Massachusetts Institute of Technology (MIT), Cambridge
    • Duce H (2003) Public policy: Understanding public opinion. In: A.-I. Center (ed.). Auto-ID Center, Massachusetts Institute of Technology (MIT), Cambridge
    • (2003) Public Policy: Understanding Public Opinion
    • Duce, H.1
  • 9
    • 67650318624 scopus 로고    scopus 로고
    • In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge
    • Auto-ID Center, Technology Guide (2002) In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge
    • (2002) Auto-ID Center, Technology Guide
  • 10
    • 67650337939 scopus 로고    scopus 로고
    • GCI G.C. Initiative and IBM (eds) GCI, Metro Gruppe, IBM Inc
    • GCI (2003) G.C.I., Global Commerce initiative EPC roadmap. G.C. Initiative and IBM (eds) GCI, Metro Gruppe, IBM Inc., Köln
    • (2003) G.C.I., Global Commerce Initiative EPC Roadmap
  • 11
    • 33745629748 scopus 로고    scopus 로고
    • Auto-ID Center A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
    • Auto-ID Center (2003) EPC-256: The 256-bit electronic product code representation. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
    • (2003) EPC-256: The 256-bit Electronic Product Code Representation
  • 12
    • 33745624977 scopus 로고    scopus 로고
    • Auto-ID Center A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
    • Auto-ID Center (2003) EPC information service - data model and queries. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
    • (2003) EPC Information Service - Data Model and Queries
  • 13
    • 26444597824 scopus 로고    scopus 로고
    • Auto-ID Center Mealling M (ed) Auto-ID Center, Cambridge
    • Auto-ID Center (2003) Auto-ID object name service (ONS) 1.0. Mealling M (ed) Auto-ID Center, Cambridge
    • (2003) Auto-ID Object Name Service (ONS) 1.0
  • 15
    • 33750402779 scopus 로고    scopus 로고
    • Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience
    • In: New Brunswick, Canada
    • Engberg S, Harning M, Damsgaard Jensen C (2004) Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In: Second annual conference on privacy, security and trust, New Brunswick, Canada
    • (2004) Second Annual Conference on Privacy, Security and Trust
    • Engberg, S.1    Harning, M.2    Damsgaard Jensen, C.3
  • 16
    • 42149195728 scopus 로고    scopus 로고
    • Maintaining privacy in RFID enabled environments - Proposal for a disable-model
    • In: Robinson P, Vogt H, Wagealla W (eds) Springer, Vienna
    • Spiekermann S, Berthold O (2004) Maintaining privacy in RFID enabled environments - proposal for a disable-model. In: Robinson P, Vogt H, Wagealla W (eds) Privacy, security and trust within the context of pervasive computing. Springer, Vienna
    • (2004) Privacy, Security and Trust Within the Context of Pervasive Computing
    • Spiekermann, S.1    Berthold, O.2
  • 17
    • 33144466214 scopus 로고    scopus 로고
    • RFID privacy using user-controllable uniqueness
    • In: Massachusetts Institute of Technology (MIT), Cambridge
    • Inoue S, Yasuura H (2004) RFID privacy using user-controllable uniqueness. In: RFID privacy workshop. Massachusetts Institute of Technology (MIT), Cambridge
    • (2004) RFID Privacy Workshop
    • Inoue, S.1    Yasuura, H.2
  • 18
    • 29344433081 scopus 로고    scopus 로고
    • Scanning with a purpose - Supporting the fair information principles in RFID protocols
    • In: Murakami H et al (eds) Springer, Tokyo
    • Floerkemeier C, Schneider R, Langheinrich M (2004) Scanning with a purpose - supporting the fair information principles in RFID protocols. In: Murakami H et al (eds) Ubiquitious computing systems. Springer, Tokyo
    • (2004) Ubiquitious Computing Systems
    • Floerkemeier, C.1    Schneider, R.2    Langheinrich, M.3
  • 22
    • 3042822164 scopus 로고    scopus 로고
    • P3P: Making privacy policies more useful
    • Cranor LF (2003) P3P: Making privacy policies more useful. In: IEEE security and privacy, pp 50-55
    • (2003) IEEE Security and Privacy , pp. 50-55
    • Cranor, L.F.1
  • 24
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A (1979) How to share a secret. Commun ACM (CACM) 22(11):612-613
    • (1979) Commun ACM (CACM) , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 27
    • 0002305454 scopus 로고
    • From intentions to actions: A theory of planned behavior
    • In: Kuhi J, Beckmann J (eds) Springer, Heidelberg
    • Ajzen I (1985) From intentions to actions: A theory of planned behavior. In: Kuhi J, Beckmann J (eds) ActionFcontrol: from cognition to behavior. Springer, Heidelberg, pp 11-39
    • (1985) Action-Control: From Cognition to Behavior , pp. 11-39
    • Ajzen, I.1
  • 28
    • 33645013501 scopus 로고    scopus 로고
    • The influence of attitudes on behavior
    • In: Albarracin D, Johnson BT, Zanna MP (eds) Erlbaum, Mahwah
    • Ajzen I, Fishbein M (2005) The influence of attitudes on behavior. In: Albarracin D, Johnson BT, Zanna MP (eds) The handbook of attitudes on behavior. Erlbaum, Mahwah, pp 173-221
    • (2005) The Handbook of Attitudes on Behavior , pp. 173-221
    • Ajzen, I.1    Fishbein, M.2
  • 30
    • 0034559541 scopus 로고    scopus 로고
    • Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model
    • Venkatesh V (2000) Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342-365
    • (2000) Inf Syst Res , vol.11 , Issue.4 , pp. 342-365
    • Venkatesh, V.1
  • 33
    • 16444368611 scopus 로고    scopus 로고
    • Privacy in E-commerce: Stated preferences vs. actual behavior
    • Berendt B, Guenther O, Spiekermann S (2005) Privacy in E-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101-106
    • (2005) Commun ACM , vol.48 , Issue.4 , pp. 101-106
    • Berendt, B.1    Guenther, O.2    Spiekermann, S.3
  • 34
    • 0002934032 scopus 로고
    • Content analysis in consumer research
    • Kassarjian HH (1977) Content analysis in consumer research. J Consumer Res 4(1):8-18
    • (1977) J Consumer Res , vol.4 , Issue.1 , pp. 8-18
    • Kassarjian, H.H.1
  • 35
    • 0038615886 scopus 로고    scopus 로고
    • Empirical research in on-line trust: A review and critical assessment
    • Grabner-Kräuter S, Kaluscha EA (2003) Empirical research in on-line trust: A review and critical assessment. Int J Hum Comput Stud 58(6):783-812
    • (2003) Int J Hum Comput Stud , vol.58 , Issue.6 , pp. 783-812
    • Grabner-Kräuter, S.1    Kaluscha, E.A.2
  • 36
    • 7444221668 scopus 로고    scopus 로고
    • Interpreting dimensions of consumer trust in E-commerce
    • Chen SC, Dhillon GS (2003) Interpreting dimensions of consumer trust in E-commerce. Inf Technol Manage 4(2-3):303-318
    • (2003) Inf Technol Manage , vol.4 , Issue.2-3 , pp. 303-318
    • Chen, S.C.1    Dhillon, G.S.2
  • 37
    • 36549056853 scopus 로고    scopus 로고
    • Designing systems that people will trust
    • In: Cranor LF, Garfinkel S (eds) O'REILLY, Sebastopol
    • Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor LF, Garfinkel S (eds) Security and usability. O'REILLY, Sebastopol, pp 75-99
    • (2005) Security and Usability , pp. 75-99
    • Patrick, A.S.1    Briggs, P.2    Marsh, S.3
  • 38
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy - Why users compromise computer security mechanisms and how to take remedial measures
    • Adams A, Sasse A (1999) Users are not the enemy - why users compromise computer security mechanisms and how to take remedial measures. Commun ACM 42(12):40-46
    • (1999) Commun ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, A.2
  • 40
    • 85006082697 scopus 로고    scopus 로고
    • Intention-behavior relations: A conceptual and empirical review
    • In: Stroebe W, Hewstone M (eds) Wiley, Chichester
    • Sheeran P (2002) Intention-behavior relations: A conceptual and empirical review. In: Stroebe W, Hewstone M (eds) European review of social psychology. Wiley, Chichester, pp 1-36
    • (2002) European Review of Social Psychology , pp. 1-36
    • Sheeran, P.1
  • 41
    • 0036511549 scopus 로고    scopus 로고
    • Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty
    • Trafimow D et al (2002) Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. Br J Soc Psychol 41:101-121
    • (2002) Br J Soc Psychol , vol.41 , pp. 101-121
    • Trafimow, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.