-
1
-
-
75149142201
-
Nudging privacy: the behavioral economics of personal information
-
Acquisti, A. (2009), “Nudging privacy: the behavioral economics of personal information”, IEEE Security and Privacy, Vol. 7 No. 6, pp. 82-85.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.6
, pp. 82-85
-
-
Acquisti, A.1
-
2
-
-
84993068179
-
-
(Eds), “Imagined communities: awareness, information sharing, and privacy on the Facebook”, Proceedings of 6th Workshop on Privacy Enhancing Technologies, 28-30 June, Robinson College, Cambridge, UK
-
Acquisti, A. and Gross, R. (2006) in Ed. Golle, P. and Ed. Danezis, G. (Eds), “Imagined communities: awareness, information sharing, and privacy on the Facebook”, Proceedings of 6th Workshop on Privacy Enhancing Technologies, 28-30 June, Robinson College, Cambridge, UK.
-
(2006)
-
-
Acquisti, A.1
Gross, R.2
Golle, P.3
Danezis, G.4
-
3
-
-
67650500737
-
Predicting Social Security numbers from public data
-
Acquisti, A. and Gross, R. (2009 a), “Predicting Social Security numbers from public data”, Proceedings of the National Academy of Sciences (PNAS), Vol. 106 No. 27, pp. 10975-80.
-
(2009)
Proceedings of the National Academy of Sciences (PNAS)
, vol.106
, Issue.27
, pp. 10975-10980
-
-
Acquisti, A.1
Gross, R.2
-
4
-
-
77951935108
-
Social insecurity: the unintended consequences of identity fraud prevention policies
-
paper presented at the Workshop on the Economics of Information Security, 24-25 June, University College London, London
-
Acquisti, A. and Gross, R. (2009 b), “Social insecurity: the unintended consequences of identity fraud prevention policies”, paper presented at the Workshop on the Economics of Information Security, 24-25 June, University College London, London.
-
(2009)
-
-
Acquisti, A.1
Gross, R.2
-
5
-
-
77952415199
-
Towards a privacy-enhanced social networking site
-
Proceedings of the ARES International Conference on Availability, Reliability and Security, 15-18 February, Krakow
-
Aïmeur, E., Gambs, S. and Ho, A. (2010), “Towards a privacy-enhanced social networking site”, Proceedings of the ARES International Conference on Availability, Reliability and Security, 15-18 February, Krakow.
-
(2010)
-
-
Aïmeur, E.1
Gambs, S.2
Ho, A.3
-
7
-
-
41849093342
-
Online social networking as participatory surveillance
-
available at: (accessed 5 October 2010)
-
Albrechtslund, A. (2008), “Online social networking as participatory surveillance”, First Monday, Vol. 13 No. 3, available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949 (accessed 5 October 2010).
-
(2008)
First Monday
, vol.13
, Issue.3
-
-
Albrechtslund, A.1
-
10
-
-
80052569029
-
-
Brooks/Cole Publishing Pacific Grove, CA, (originally published in 1975)
-
Altman, I. (1977), Framework of Privacy Optimization, Brooks/Cole Publishing, Pacific Grove, CA, (originally published in 1975).
-
(1977)
Framework of Privacy Optimization
-
-
Altman, I.1
-
11
-
-
44949116134
-
Cyberbullying among Turkish adolescents
-
Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yismaz, N. and Memmedov, C. (2008), “Cyberbullying among Turkish adolescents”, Cyber Psychology & Behavior, Vol. 11 No. 3, pp. 253-261.
-
(2008)
Cyber Psychology & Behavior
, vol.11
, Issue.3
, pp. 253-261
-
-
Aricak, T.1
Siyahhan, S.2
Uzunhasanoglu, A.3
Saribeyoglu, S.4
Ciplak, S.5
Yismaz, N.6
Memmedov, C.7
-
12
-
-
33749386628
-
A privacy paradox: social networking in the United States
-
available at: (accessed 3 November 2010)
-
Barnes, S.B. (2006), “A privacy paradox: social networking in the United States”, First Monday, Vol. 11 No. 9, available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/1394/1312#b3 (accessed 3 November 2010).
-
(2006)
First Monday
, vol.11
, Issue.9
-
-
Barnes, S.B.1
-
13
-
-
1842743666
-
Privacy, freedom and respect for persons
-
Atherton Press New York, NY
-
Benn, S.I. (1971), “Privacy, freedom and respect for persons”, in Ed. Pennock, J.R. and Ed. Chapman, J.W. (Eds), Privacy (Nomos XIII), Atherton Press, New York, NY.
-
(1971)
Privacy (Nomos XIII)
-
-
Benn, S.I.1
Pennock, J.R.2
Chapman, J.W.3
-
15
-
-
84937387501
-
Is privacy still possible in the twenty-first century?
-
Berman, J. and Bruening, P. (2001), “Is privacy still possible in the twenty-first century?”, Social Research, Vol. 68 No. 1, pp. 306-318.
-
(2001)
Social Research
, vol.68
, Issue.1
, pp. 306-318
-
-
Berman, J.1
Bruening, P.2
-
16
-
-
84878528535
-
-
(Eds), “The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites”, Proceedings of the 27th Annual CHI Conference on Human Factors in Computing Systems, 4-9 April, ACM, Boston, MA
-
Binder, J., Howes, A. and Sutcliffe, A. (2009) in Ed. Greenberg, S., Ed. Hudson, S.E., Ed. Hinckley, K. and Ed. Morris, M.R. (Eds), “The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites”, Proceedings of the 27th Annual CHI Conference on Human Factors in Computing Systems, 4-9 April, ACM, Boston, MA.
-
(2009)
-
-
Binder, J.1
Howes, A.2
Sutcliffe, A.3
Greenberg, S.4
Hudson, S.E.5
Hinckley, K.6
Morris, M.R.7
-
18
-
-
79955854747
-
The privacy jungle: on the market for data protection in social networks
-
paper presented at the Eighth Workshop on the Economics of Information Security (WEIS), 24-25 June, London
-
Bonneau, J. and Preibusch, S. (2009), “The privacy jungle: on the market for data protection in social networks”, paper presented at the Eighth Workshop on the Economics of Information Security (WEIS), 24-25 June, London.
-
(2009)
-
-
Bonneau, J.1
Preibusch, S.2
-
19
-
-
84965703890
-
Maintaining and restoring privacy through communication in different types of relationship
-
Burgoon, J.K., Parrot, R., Lepoire, B.A., Kelley, D.L., Walther, J.B. and Perry, D. (1989), “Maintaining and restoring privacy through communication in different types of relationship”, Journal of Social and Personal Relationships, Vol. 6, pp. 131-158.
-
(1989)
Journal of Social and Personal Relationships
, vol.6
, pp. 131-158
-
-
Burgoon, J.K.1
Parrot, R.2
Lepoire, B.A.3
Kelley, D.L.4
Walther, J.B.5
Perry, D.6
-
20
-
-
67650686664
-
Determinants of success in open source software networks
-
Casaló, L.V., Cisneros, J., Flavián, C. and Guinalíu, M. (2009), “Determinants of success in open source software networks”, Industrial Management & Data Systems, Vol. 109 No. 4, pp. 532-549.
-
(2009)
Industrial Management & Data Systems
, vol.109
, Issue.4
, pp. 532-549
-
-
Casaló, L.V.1
Cisneros, J.2
Flavián, C.3
Guinalíu, M.4
-
21
-
-
68949189364
-
Information disclosure and control on facebook: are they two sides of the same coin or two different processes?
-
Christofides, E., Muise, A. and Desmarais, S. (2009), “Information disclosure and control on facebook: are they two sides of the same coin or two different processes?”, Cyber Psychology & Behavior, Vol. 12 No. 3, pp. 341-5.
-
(2009)
Cyber Psychology & Behavior
, vol.12
, Issue.3
, pp. 341-345
-
-
Christofides, E.1
Muise, A.2
Desmarais, S.3
-
22
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
-
Culnan, M.J. and Armstrong, P.K. (1999), “Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation”, Organization Science, Vol. 10 No. 1, pp. 104-115.
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
23
-
-
84861007122
-
-
Cornell University Press Ithaca, NY
-
De Cew, J. (1997), In Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Cornell University Press, Ithaca, NY.
-
(1997)
In Pursuit of Privacy: Law, Ethics, and the Rise of Technology
-
-
De Cew, J.1
-
24
-
-
34548285057
-
The benefits of Facebook Friends: social capital and college students' use of online social network sites
-
available at: (accessed 7 October 2010)
-
Ellison, N.B., Steinfield, C. and Lampe, C. (2007), “The benefits of Facebook Friends: social capital and college students' use of online social network sites”, Journal of Computer-Mediated Communication, Vol. 12 No. 4, available at: http://jcmc.indiana.edu/vol12/issue4/ellison.html (accessed 7 October 2010).
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
-
-
Ellison, N.B.1
Steinfield, C.2
Lampe, C.3
-
25
-
-
84992999557
-
ENISA
-
European Network and Information Security Agency (ENISA) Heraklion
-
ENISA (2010), Online as Soon as it Happens, European Network and Information Security Agency (ENISA), Heraklion.
-
(2010)
Online as Soon as it Happens
-
-
-
27
-
-
33947424124
-
Privacy: one concept or many?
-
Atherton Press New York, NY
-
Freund, P.A. (1971), “Privacy: one concept or many?”, in Ed. Pennock, J.R. and Ed. Chapman, J.W. (Eds), Privacy (Nomos XIII), Atherton Press, New York, NY.
-
(1971)
Privacy (Nomos XIII)
-
-
Freund, P.A.1
Pennock, J.R.2
Chapman, J.W.3
-
28
-
-
0001601662
-
Privacy
-
Fried, C. (1968), “Privacy”, Yale Law Journal, Vol. 77, pp. 475-493.
-
(1968)
Yale Law Journal
, vol.77
, pp. 475-493
-
-
Fried, C.1
-
29
-
-
84993092473
-
-
Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and My Space by Students in Salzburg in the Context of Electronic Surveillance, Research Group Unified Theory of Information, Salzburg/Vienna, available at: (accessed 4 August 2010)
-
Fuchs, C. (2009), Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and My Space by Students in Salzburg in the Context of Electronic Surveillance, Research Group Unified Theory of Information, Salzburg/Vienna, available at: http://fuchs.icts.sbg.ac.at/SNS_Surveillance_Fuchs.pdf (accessed 4 August 2010).
-
(2009)
-
-
Fuchs, C.1
-
30
-
-
77952546924
-
studiVZ: social networking in the surveillance society
-
Fuchs, C. (2010), “studiVZ: social networking in the surveillance society”, Ethics and Information Technology, Vol. 12 No. 2, pp. 171-185.
-
(2010)
Ethics and Information Technology
, vol.12
, Issue.2
, pp. 171-185
-
-
Fuchs, C.1
-
31
-
-
84923486508
-
Privacy and the limits of law
-
Gavison, R. (1980), “Privacy and the limits of law”, Yale Law Journal, Vol. 89, pp. 421-471.
-
(1980)
Yale Law Journal
, vol.89
, pp. 421-471
-
-
Gavison, R.1
-
32
-
-
0009220930
-
-
Doubleday Anchor Books Garden City, NY
-
Goffman, E, (1959), Presentation of Self, Doubleday Anchor Books, Garden City, NY.
-
(1959)
Presentation of Self
-
-
Goffman, E.1
-
33
-
-
33749016498
-
-
(Eds), “Information revelation and privacy in online social networks (The Facebook case)”, Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES), 5-7 November, ACM, Alexandria, VA
-
Gross, R., Acquisti, A. and Heinz Iii, H.J. (2005) in Ed. De Capitani Di Vimercati, S. and Ed. Dingledine, R. (Eds), “Information revelation and privacy in online social networks (The Facebook case)”, Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES), 5-7 November, ACM, Alexandria, VA.
-
(2005)
-
-
Gross, R.1
Acquisti, A.2
Heinz Iii, H.J.3
De Capitani Di Vimercati, S.4
Dingledine, R.5
-
34
-
-
77954923926
-
To add or not to add: privacy and social honeypots
-
IEEE 23-27 May, IEEE, Capetown, South Africa
-
Haddadi, H. and Hui, P. (2010) in Ed. IEEE (Ed.), “To add or not to add: privacy and social honeypots”, Proceedings of the ICC 2010: IEEE International Conference on Communications, 23-27 May, IEEE, Capetown, South Africa.
-
(2010)
Proceedings of the ICC 2010: IEEE International Conference on Communications
-
-
Haddadi, H.1
Hui, P.2
-
35
-
-
38549162730
-
Personal information of adolescents on the internet: a quantitative content analysis of My Space
-
Hinduja, S. and Patchin, J.W. (2008), “Personal information of adolescents on the internet: a quantitative content analysis of My Space”, Journal of Adolescence, Vol. 31 No. 1, pp. 125-146.
-
(2008)
Journal of Adolescence
, vol.31
, Issue.1
, pp. 125-146
-
-
Hinduja, S.1
Patchin, J.W.2
-
36
-
-
33847133945
-
Risk taking, boundary performance and intentional school internet misuse
-
Hope, A. (2007), “Risk taking, boundary performance and intentional school internet misuse”, Discourse: Studies in the Cultural Politics of Education, Vol. 28 No. 1, pp. 87-99.
-
(2007)
Discourse: Studies in the Cultural Politics of Education
, vol.28
, Issue.1
, pp. 87-99
-
-
Hope, A.1
-
37
-
-
77951890827
-
Privacy, social network sites, and social relations
-
Houghton, D.J. and Joinson, A.N. (2010), “Privacy, social network sites, and social relations”, Journal of Technology in Human Services, Vol. 2 No. 1, pp. 74-94.
-
(2010)
Journal of Technology in Human Services
, vol.2
, Issue.1
, pp. 74-94
-
-
Houghton, D.J.1
Joinson, A.N.2
-
38
-
-
34848911641
-
Social phishing
-
Jagatic, T.N., Johnson, N.A., Jakobsson, M. and Menczer, F. (2007), “Social phishing”, Communications of the ACM, Vol. 50 No. 10, pp. 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
39
-
-
77950645714
-
Tag this article! Today's learners and the use of Web 2.0 in teaching
-
Jeffries, W.B. and Szarek, J.L. (2010), “Tag this article! Today's learners and the use of Web 2.0 in teaching”, Molecular Interventions, Vol. 10 No. 2, pp. 60-64.
-
(2010)
Molecular Interventions
, vol.10
, Issue.2
, pp. 60-64
-
-
Jeffries, W.B.1
Szarek, J.L.2
-
40
-
-
67649510567
-
Privacy and fair information practices in ubiquitous environments: research challenges and future directions
-
Karyda, M., Gritzalis, S., Park, J.H. and Kokolakis, S. (2009), “Privacy and fair information practices in ubiquitous environments: research challenges and future directions”, Internet Research, Vol. 19 No. 2, pp. 194-208.
-
(2009)
Internet Research
, vol.19
, Issue.2
, pp. 194-208
-
-
Karyda, M.1
Gritzalis, S.2
Park, J.H.3
Kokolakis, S.4
-
41
-
-
70350731253
-
A nutrition label for privacy
-
Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), 15-17 July, ACM, Mountain View, CA
-
Kelley, P.G., Bresee, J., Cranor, L.F. and Reeder, R.W. (2009), “A nutrition label for privacy”, Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), 15-17 July, ACM, Mountain View, CA.
-
(2009)
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
-
42
-
-
33947382579
-
Privacy
-
Kemp, R. and Moore, A.D. (2007), “Privacy”, Library Hi Tech, Vol. 25 No. 1, pp. 58-78.
-
(2007)
Library Hi Tech
, vol.25
, Issue.1
, pp. 58-78
-
-
Kemp, R.1
Moore, A.D.2
-
43
-
-
77951706686
-
Privacy calculus on social networking sites: explorative evidence from Germany and USA
-
Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), 5-8 January, IEEE, Koloa, Hawaii
-
Krasnova, H. and Veltri, N.F. (2010), “Privacy calculus on social networking sites: explorative evidence from Germany and USA”, Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), 5-8 January, IEEE, Koloa, Hawaii.
-
(2010)
-
-
Krasnova, H.1
Veltri, N.F.2
-
44
-
-
84870964011
-
Investigating the value of privacy in online social networks: conjoint analysis
-
Paper 173, paper presented at the 13th International Conference on Information Systems (ICIS), 15-18 December, Phoenix, AR
-
Krasnova, H., Hildebrand, T. and Günther, O. (2009 b), “Investigating the value of privacy in online social networks: conjoint analysis”, Paper 173, paper presented at the 13th International Conference on Information Systems (ICIS), 15-18 December, Phoenix, AR.
-
(2009)
-
-
Krasnova, H.1
Hildebrand, T.2
Günther, O.3
-
45
-
-
78651388409
-
Privacy concerns and identity in online social networks
-
Krasnova, H., Günther, O., Spiekermann, S. and Koroleva, K. (2009 a), “Privacy concerns and identity in online social networks”, Identity in the Information Society, Vol. 2 No. 1, pp. 39-63.
-
(2009)
Identity in the Information Society
, vol.2
, Issue.1
, pp. 39-63
-
-
Krasnova, H.1
Günther, O.2
Spiekermann, S.3
Koroleva, K.4
-
46
-
-
0036211736
-
Internet paradox revisited
-
Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V. and Crawford, A. (2002), “Internet paradox revisited”, Journal of Social Issues, Vol. 58 No. 1, pp. 49-74.
-
(2002)
Journal of Social Issues
, vol.58
, Issue.1
, pp. 49-74
-
-
Kraut, R.1
Kiesler, S.2
Boneva, B.3
Cummings, J.4
Helgeson, V.5
Crawford, A.6
-
47
-
-
0032172155
-
Internet paradox: a social technology that reduces social involvement and psychological well-being?
-
Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukopadhyay, T. and Scherlis, W. (1998), “Internet paradox: a social technology that reduces social involvement and psychological well-being?”, American Psychologist, Vol. 53, pp. 1017-31.
-
(1998)
American Psychologist
, vol.53
, pp. 1017-1031
-
-
Kraut, R.1
Patterson, M.2
Lundmark, V.3
Kiesler, S.4
Mukopadhyay, T.5
Scherlis, W.6
-
48
-
-
79960492102
-
A study of the perceptions of students on privacy and security on social networking sites (SNS), on the internet
-
available at: (accessed 30 June 2010)
-
Lawler, J.P. and Molluzzo, J.C. (2010), “A study of the perceptions of students on privacy and security on social networking sites (SNS), on the internet”, Journal of Information Systems Applied Research, Vol. 3 No. 12, available at: http://jisar.org/3/12/ (accessed 30 June 2010).
-
(2010)
Journal of Information Systems Applied Research
, vol.3
, Issue.12
-
-
Lawler, J.P.1
Molluzzo, J.C.2
-
49
-
-
84993013472
-
-
Social Media & Mobile Internet Use Among Teens and Young Adults (Report of Pew Internet & American Life Project), Pew Interent & Amercian Life Project, available at: (accessed 10 September 2010)
-
Lenhart, A., Purcell, K., Smith, A. and Zickuhr, K. (2010), Social Media & Mobile Internet Use Among Teens and Young Adults (Report of Pew Internet & American Life Project), Pew Interent & Amercian Life Project, available at: www.pewinternet.org/∼/media//Files/Reports/2010/PIP_Social_Media_and_Young_Adults_Report.pdf (accessed 10 September 2010).
-
(2010)
-
-
Lenhart, A.1
Purcell, K.2
Smith, A.3
Zickuhr, K.4
-
50
-
-
43449104752
-
Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression
-
Livingstone, S. (2008), “Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression”, New Media & Society, Vol. 10 No. 3, pp. 393-411.
-
(2008)
New Media & Society
, vol.10
, Issue.3
, pp. 393-411
-
-
Livingstone, S.1
-
51
-
-
71749091817
-
On the rapid rise of social networking sites: new findings and policy implications
-
Livingstone, S. and Brake, D.R. (2010), “On the rapid rise of social networking sites: new findings and policy implications”, Children & Society, Vol. 24 No. 1, pp. 75-83.
-
(2010)
Children & Society
, vol.24
, Issue.1
, pp. 75-83
-
-
Livingstone, S.1
Brake, D.R.2
-
52
-
-
13244298307
-
Internet Users' Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model
-
Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004), “Internet Users' Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model”, Information Systems Research, Vol. 15 No. 4, pp. 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
53
-
-
44449135495
-
The moral value of informational privacy in cyberspace
-
Michelfelder, D.P. (2001), “The moral value of informational privacy in cyberspace”, Ethics and Information Technology, Vol. 3 No. 2, pp. 129-135.
-
(2001)
Ethics and Information Technology
, vol.3
, Issue.2
, pp. 129-135
-
-
Michelfelder, D.P.1
-
54
-
-
0034418444
-
Information privacy: corporate management and national regulation
-
Milberg, S.J., Smith, H.J. and Burke, S.J. (2000), “Information privacy: corporate management and national regulation”, Organization Science, Vol. 11 No. 1, pp. 35-57.
-
(2000)
Organization Science
, vol.11
, Issue.1
, pp. 35-57
-
-
Milberg, S.J.1
Smith, H.J.2
Burke, S.J.3
-
55
-
-
0003488992
-
-
Harvard University Press Cambridge
-
Miller, A. (1971), The Assault on Privacy, Harvard University Press, Cambridge.
-
(1971)
The Assault on Privacy
-
-
Miller, A.1
-
56
-
-
0042422943
-
The ethics of privacy protection
-
Moor, J.H. (1990), “The ethics of privacy protection”, Library Trends, Vol. 39 No. 1+2, pp. 69-82.
-
(1990)
Library Trends
, vol.39
, Issue.1+2
, pp. 69-82
-
-
Moor, J.H.1
-
57
-
-
0042923706
-
Towards a theory of privacy in the information age
-
Moor, J.H. (1997), “Towards a theory of privacy in the information age”, Computers and Society, Vol. 27 No. 3, pp. 27-32.
-
(1997)
Computers and Society
, vol.27
, Issue.3
, pp. 27-32
-
-
Moor, J.H.1
-
58
-
-
28844438350
-
Privacy: its meaning and value
-
Moore, A. (2003), “Privacy: its meaning and value”, American Philosophical Quarterly, Vol. 40, pp. 215-227.
-
(2003)
American Philosophical Quarterly
, vol.40
, pp. 215-227
-
-
Moore, A.1
-
59
-
-
84992976651
-
NCC
-
NCC National Computing Center (NCC), Manchester, in partnership with Ernst&Young, Computer Weekly and Information Risk Management (IRM)
-
NCC (2003) in Ed. NCC (Ed.), Survey of information security policy and practice 2004, National Computing Center (NCC), Manchester, in partnership with Ernst&Young, Computer Weekly and Information Risk Management (IRM).
-
(2003)
Survey of information security policy and practice 2004
-
-
-
60
-
-
0038528522
-
Information(al), matters: bioethics and the boundaries of the public and the private
-
Parker, L.S. (2002), “Information(al), matters: bioethics and the boundaries of the public and the private”, Social Philosophy and Policy, Vol. 19 No. 2, pp. 83-112.
-
(2002)
Social Philosophy and Policy
, vol.19
, Issue.2
, pp. 83-112
-
-
Parker, L.S.1
-
63
-
-
84876010344
-
Why privacy is important
-
Rachels, J. (1975), “Why privacy is important”, Philosophy and Public Affairs, Vol. 4 No. 4, pp. 323-333.
-
(1975)
Philosophy and Public Affairs
, vol.4
, Issue.4
, pp. 323-333
-
-
Rachels, J.1
-
64
-
-
77955497017
-
Privacy, intimacy, and personhood
-
Reiman, J.H. (1976), “Privacy, intimacy, and personhood”, Philosophy & Public Affairs, Vol. 6, pp. 26-44.
-
(1976)
Philosophy & Public Affairs
, vol.6
, pp. 26-44
-
-
Reiman, J.H.1
-
65
-
-
33644699528
-
An examination of the concern for information privacy in the New Zealand regulatory context
-
Rose, E.A. (2006), “An examination of the concern for information privacy in the New Zealand regulatory context”, Information & Management, Vol. 43 No. 3, pp. 322-335.
-
(2006)
Information & Management
, vol.43
, Issue.3
, pp. 322-335
-
-
Rose, E.A.1
-
66
-
-
34250001672
-
What anyone can know: the privacy risks of social networking sites
-
Rosenblum, D. (2007), “What anyone can know: the privacy risks of social networking sites”, IEEE Security & Privacy, Vol. 5 No. 3, pp. 40-49.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.3
, pp. 40-49
-
-
Rosenblum, D.1
-
67
-
-
76649116529
-
Self-exposure and exposure of the self: informational privacy and the presentation of identity
-
Shoemaker, D.A. (2010), “Self-exposure and exposure of the self: informational privacy and the presentation of identity”, Ethics in Information Technology, Vol. 12 No. 1, pp. 3-15.
-
(2010)
Ethics in Information Technology
, vol.12
, Issue.1
, pp. 3-15
-
-
Shoemaker, D.A.1
-
68
-
-
0000981743
-
Information privacy: measuring individuals' concerns about organizational practices
-
Smith, J.H., Milberg, S.J. and Burke, S.J. (1996), “Information privacy: measuring individuals' concerns about organizational practices”, MIS Quarterly, Vol. 20 No. 2, pp. 167-196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, J.H.1
Milberg, S.J.2
Burke, S.J.3
-
69
-
-
0036045758
-
Conceptualizing privacy
-
Solove, D.J. (2002), “Conceptualizing privacy”, California Law Review, Vol. 90, pp. 1087-156.
-
(2002)
California Law Review
, vol.90
, pp. 1087-1156
-
-
Solove, D.J.1
-
70
-
-
84903015184
-
-
Yale University Press New Haven, CT
-
Solove, D.J. (2007), The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Yale University Press, New Haven, CT.
-
(2007)
The Future of Reputation: Gossip, Rumor, and Privacy on the Internet
-
-
Solove, D.J.1
-
71
-
-
64849113360
-
-
GWU Legal Studies Research Paper 420 Harvard University Press available at: (accessed 5 April 2009)
-
Solove, D.J. (2008), Understanding Privacy, GWU Legal Studies Research Paper 420 Harvard University Press, pp. 1-24, available at: www.usdrinc.com/downloads/Privacy.pdf (accessed 5 April 2009).
-
(2008)
Understanding Privacy
, pp. 1-24
-
-
Solove, D.J.1
-
72
-
-
84993104349
-
Sophos
-
Security Threat Report: 2010, Sophos Group, Boston, MA, available at: (accessed 25 August 2010)
-
Sophos (2010), Security Threat Report: 2010, Sophos Group, Boston, MA, available at: www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf (accessed 25 August 2010).
-
(2010)
-
-
-
73
-
-
0036004583
-
An empirical examination of the concern for information privacy instrument
-
Stewart, K.A. and Segars, A.H. (2002), “An empirical examination of the concern for information privacy instrument”, Information Systems Research, Vol. 13 No. 1, pp. 36-49.
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
74
-
-
84923802627
-
Strategies and struggles with privacy in an online social networking community
-
Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, 1-5 September, British Computer Society, Liverpool
-
Strater, K. and Lipford, H.R. (2008), “Strategies and struggles with privacy in an online social networking community”, Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, 1-5 September, British Computer Society, Liverpool.
-
(2008)
-
-
Strater, K.1
Lipford, H.R.2
-
75
-
-
2542469289
-
Privacy protection, control of information, and privacy-enhancing technologies
-
Tavani, H. and Moor, J. (2001), “Privacy protection, control of information, and privacy-enhancing technologies”, ACM SIGCAS Computers and Society, Vol. 31 No. 1, pp. 6-11.
-
(2001)
ACM SIGCAS Computers and Society
, vol.31
, Issue.1
, pp. 6-11
-
-
Tavani, H.1
Moor, J.2
-
76
-
-
52149113254
-
Philosophical theories of privacy: implications for an adequate online privacy policy
-
Tavani, H.T. (2007), “Philosophical theories of privacy: implications for an adequate online privacy policy”, Metaphilosophy, Vol. 38 No. 1, pp. 1-22.
-
(2007)
Metaphilosophy
, vol.38
, Issue.1
, pp. 1-22
-
-
Tavani, H.T.1
-
77
-
-
77953866748
-
Understanding information disclosure behaviour in Australian Facebook users
-
Tow, W.N.-F.H., Dell, P. and Venable, J. (2010), “Understanding information disclosure behaviour in Australian Facebook users”, Journal of Information Technology Research, Vol. 25, pp. 126-136.
-
(2010)
Journal of Information Technology Research
, vol.25
, pp. 126-136
-
-
Tow, W.N.F.H.1
Dell, P.2
Venable, J.3
-
78
-
-
47549106092
-
Can you see me now? Audience and disclosure regulation in online social network sites
-
Tufekci, Z. (2008), “Can you see me now? Audience and disclosure regulation in online social network sites”, Bulletin of Science, Technology & Society, Vol. 28 No. 1, pp. 20-36.
-
(2008)
Bulletin of Science, Technology & Society
, vol.28
, Issue.1
, pp. 20-36
-
-
Tufekci, Z.1
-
79
-
-
61849172270
-
Social consequences of the internet for adolescents: a decade of research
-
Valkenburg, P.M. and Peter, J. (2009), “Social consequences of the internet for adolescents: a decade of research”, Current Directions in Psychological Science, Vol. 18 No. 1, pp. 1-5.
-
(2009)
Current Directions in Psychological Science
, vol.18
, Issue.1
, pp. 1-5
-
-
Valkenburg, P.M.1
Peter, J.2
-
80
-
-
84993034213
-
Academic use of a group on Facebook: initial findings and perceptions
-
Proceedings of Informing Science & IT Education Conference (InSITE), 21-24 June, Cassino, Italy
-
Villiers De, M.R. (2010), “Academic use of a group on Facebook: initial findings and perceptions”, Proceedings of Informing Science & IT Education Conference (InSITE), 21-24 June, Cassino, Italy.
-
(2010)
-
-
Villiers De, M.R.1
-
81
-
-
84925957168
-
Motives for using social network sites (SNSs), – an analysis of SNS adoption among students
-
Proceedings of 22nd Bled eConference, June 14-17, Bled, Slovenia
-
Vom Brocke, J., Richter, D. and Riemer, K. (2009), “Motives for using social network sites (SNSs), – an analysis of SNS adoption among students”, Proceedings of 22nd Bled eConference, June 14-17, Bled, Slovenia.
-
(2009)
-
-
Vom Brocke, J.1
Richter, D.2
Riemer, K.3
-
82
-
-
0000320829
-
The right to privacy
-
Warren, S.D. and Brandeis, L.D. (1890), “The right to privacy”, Harvard Law Review, Vol. 4 No. 5, pp. 193-220.
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
83
-
-
84992973751
-
Online social networks and the need for new privacy research in information and communication technology
-
Proceedings of the Third International Summer School: The Future of Identity in the Information Society (IFIP, in cooperation with FIDIS Network of Excellence and HumanIT), 6-10 August, Karlstad
-
Weiss, S. (2007), “Online social networks and the need for new privacy research in information and communication technology”, Proceedings of the Third International Summer School: The Future of Identity in the Information Society (IFIP, in cooperation with FIDIS Network of Excellence and HumanIT), 6-10 August, Karlstad.
-
(2007)
-
-
Weiss, S.1
-
85
-
-
0038803983
-
Social and political dimensions of privacy
-
Westin, A.F. (2003), “Social and political dimensions of privacy”, Journal of Social Issues, Vol. 59 No. 2, pp. 431-453.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 431-453
-
-
Westin, A.F.1
-
86
-
-
77954916116
-
Information revelation and internet privacy concerns on social network sites: a case study of Facebook
-
Proceedings of the 4th International Conference on Communities & Technologies (C&T'09), 25-27 June, ACM, Pennsylvania, PA
-
Young, A.L. and Quan-Haase, A. (2009), “Information revelation and internet privacy concerns on social network sites: a case study of Facebook”, Proceedings of the 4th International Conference on Communities & Technologies (C&T'09), 25-27 June, ACM, Pennsylvania, PA.
-
(2009)
-
-
Young, A.L.1
Quan-Haase, A.2
|