-
1
-
-
10444279257
-
None of our business
-
Fusaro R (2004) None of our business. Harv Bus Rev 82(12):33-44
-
(2004)
Harv Bus Rev
, vol.82
, Issue.12
, pp. 33-44
-
-
Fusaro, R.1
-
2
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith H, Milberg J, Burke, J (1996) Information privacy: Measuring individuals' concerns about organizational practices. MIS Q 20(2):167-196
-
(1996)
MIS Q
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.1
Milberg, J.2
Burke, J.3
-
6
-
-
2642558489
-
-
In: A.-I. Center (ed.). Auto-ID Center, Massachusetts Institute of Technology (MIT), Cambridge
-
Duce H (2003) Public policy: Understanding public opinion. In: A.-I. Center (ed.). Auto-ID Center, Massachusetts Institute of Technology (MIT), Cambridge
-
(2003)
Public Policy: Understanding Public Opinion
-
-
Duce, H.1
-
9
-
-
67650318624
-
-
In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge
-
Auto-ID Center, Technology Guide (2002) In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge
-
(2002)
Auto-ID Center, Technology Guide
-
-
-
10
-
-
67650337939
-
-
GCI G.C. Initiative and IBM (eds) GCI, Metro Gruppe, IBM Inc
-
GCI (2003) G.C.I., Global Commerce initiative EPC roadmap. G.C. Initiative and IBM (eds) GCI, Metro Gruppe, IBM Inc., Köln
-
(2003)
G.C.I., Global Commerce Initiative EPC Roadmap
-
-
-
11
-
-
33745629748
-
-
Auto-ID Center A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
-
Auto-ID Center (2003) EPC-256: The 256-bit electronic product code representation. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
-
(2003)
EPC-256: The 256-bit Electronic Product Code Representation
-
-
-
12
-
-
33745624977
-
-
Auto-ID Center A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
-
Auto-ID Center (2003) EPC information service - data model and queries. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
-
(2003)
EPC Information Service - Data Model and Queries
-
-
-
13
-
-
26444597824
-
-
Auto-ID Center Mealling M (ed) Auto-ID Center, Cambridge
-
Auto-ID Center (2003) Auto-ID object name service (ONS) 1.0. Mealling M (ed) Auto-ID Center, Cambridge
-
(2003)
Auto-ID Object Name Service (ONS) 1.0
-
-
-
15
-
-
33750402779
-
Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience
-
In: New Brunswick, Canada
-
Engberg S, Harning M, Damsgaard Jensen C (2004) Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In: Second annual conference on privacy, security and trust, New Brunswick, Canada
-
(2004)
Second Annual Conference on Privacy, Security and Trust
-
-
Engberg, S.1
Harning, M.2
Damsgaard Jensen, C.3
-
16
-
-
42149195728
-
Maintaining privacy in RFID enabled environments - Proposal for a disable-model
-
In: Robinson P, Vogt H, Wagealla W (eds) Springer, Vienna
-
Spiekermann S, Berthold O (2004) Maintaining privacy in RFID enabled environments - proposal for a disable-model. In: Robinson P, Vogt H, Wagealla W (eds) Privacy, security and trust within the context of pervasive computing. Springer, Vienna
-
(2004)
Privacy, Security and Trust Within the Context of Pervasive Computing
-
-
Spiekermann, S.1
Berthold, O.2
-
17
-
-
33144466214
-
RFID privacy using user-controllable uniqueness
-
In: Massachusetts Institute of Technology (MIT), Cambridge
-
Inoue S, Yasuura H (2004) RFID privacy using user-controllable uniqueness. In: RFID privacy workshop. Massachusetts Institute of Technology (MIT), Cambridge
-
(2004)
RFID Privacy Workshop
-
-
Inoue, S.1
Yasuura, H.2
-
18
-
-
29344433081
-
Scanning with a purpose - Supporting the fair information principles in RFID protocols
-
In: Murakami H et al (eds) Springer, Tokyo
-
Floerkemeier C, Schneider R, Langheinrich M (2004) Scanning with a purpose - supporting the fair information principles in RFID protocols. In: Murakami H et al (eds) Ubiquitious computing systems. Springer, Tokyo
-
(2004)
Ubiquitious Computing Systems
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
22
-
-
3042822164
-
P3P: Making privacy policies more useful
-
Cranor LF (2003) P3P: Making privacy policies more useful. In: IEEE security and privacy, pp 50-55
-
(2003)
IEEE Security and Privacy
, pp. 50-55
-
-
Cranor, L.F.1
-
25
-
-
0018545449
-
How to share a secret
-
Shamir A (1979) How to share a secret. Commun ACM (CACM) 22(11):612-613
-
(1979)
Commun ACM (CACM)
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
0002305454
-
From intentions to actions: A theory of planned behavior
-
In: Kuhi J, Beckmann J (eds) Springer, Heidelberg
-
Ajzen I (1985) From intentions to actions: A theory of planned behavior. In: Kuhi J, Beckmann J (eds) ActionFcontrol: from cognition to behavior. Springer, Heidelberg, pp 11-39
-
(1985)
Action-Control: From Cognition to Behavior
, pp. 11-39
-
-
Ajzen, I.1
-
28
-
-
33645013501
-
The influence of attitudes on behavior
-
In: Albarracin D, Johnson BT, Zanna MP (eds) Erlbaum, Mahwah
-
Ajzen I, Fishbein M (2005) The influence of attitudes on behavior. In: Albarracin D, Johnson BT, Zanna MP (eds) The handbook of attitudes on behavior. Erlbaum, Mahwah, pp 173-221
-
(2005)
The Handbook of Attitudes on Behavior
, pp. 173-221
-
-
Ajzen, I.1
Fishbein, M.2
-
30
-
-
0034559541
-
Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model
-
Venkatesh V (2000) Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342-365
-
(2000)
Inf Syst Res
, vol.11
, Issue.4
, pp. 342-365
-
-
Venkatesh, V.1
-
33
-
-
16444368611
-
Privacy in E-commerce: Stated preferences vs. actual behavior
-
Berendt B, Guenther O, Spiekermann S (2005) Privacy in E-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101-106
-
(2005)
Commun ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Guenther, O.2
Spiekermann, S.3
-
34
-
-
0002934032
-
Content analysis in consumer research
-
Kassarjian HH (1977) Content analysis in consumer research. J Consumer Res 4(1):8-18
-
(1977)
J Consumer Res
, vol.4
, Issue.1
, pp. 8-18
-
-
Kassarjian, H.H.1
-
35
-
-
0038615886
-
Empirical research in on-line trust: A review and critical assessment
-
Grabner-Kräuter S, Kaluscha EA (2003) Empirical research in on-line trust: A review and critical assessment. Int J Hum Comput Stud 58(6):783-812
-
(2003)
Int J Hum Comput Stud
, vol.58
, Issue.6
, pp. 783-812
-
-
Grabner-Kräuter, S.1
Kaluscha, E.A.2
-
36
-
-
7444221668
-
Interpreting dimensions of consumer trust in E-commerce
-
Chen SC, Dhillon GS (2003) Interpreting dimensions of consumer trust in E-commerce. Inf Technol Manage 4(2-3):303-318
-
(2003)
Inf Technol Manage
, vol.4
, Issue.2-3
, pp. 303-318
-
-
Chen, S.C.1
Dhillon, G.S.2
-
37
-
-
36549056853
-
Designing systems that people will trust
-
In: Cranor LF, Garfinkel S (eds) O'REILLY, Sebastopol
-
Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor LF, Garfinkel S (eds) Security and usability. O'REILLY, Sebastopol, pp 75-99
-
(2005)
Security and Usability
, pp. 75-99
-
-
Patrick, A.S.1
Briggs, P.2
Marsh, S.3
-
38
-
-
0043232732
-
Users are not the enemy - Why users compromise computer security mechanisms and how to take remedial measures
-
Adams A, Sasse A (1999) Users are not the enemy - why users compromise computer security mechanisms and how to take remedial measures. Commun ACM 42(12):40-46
-
(1999)
Commun ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, A.2
-
40
-
-
85006082697
-
Intention-behavior relations: A conceptual and empirical review
-
In: Stroebe W, Hewstone M (eds) Wiley, Chichester
-
Sheeran P (2002) Intention-behavior relations: A conceptual and empirical review. In: Stroebe W, Hewstone M (eds) European review of social psychology. Wiley, Chichester, pp 1-36
-
(2002)
European Review of Social Psychology
, pp. 1-36
-
-
Sheeran, P.1
-
41
-
-
0036511549
-
Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty
-
Trafimow D et al (2002) Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. Br J Soc Psychol 41:101-121
-
(2002)
Br J Soc Psychol
, vol.41
, pp. 101-121
-
-
Trafimow, D.1
|