-
1
-
-
84870158114
-
Is there a cost to privacy breaches? An event study
-
D. Straub, S. Klein
-
A. Acquisti, A. Friedman, and R. Telang Is there a cost to privacy breaches? An event study D. Straub, S. Klein, Proceedings of 27th Annual International Conference on Information Systems, Milwaukee, WI 2006
-
(2006)
Proceedings of 27th Annual International Conference on Information Systems, Milwaukee, WI
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
2
-
-
24944504048
-
Online privacy policies: An empirical perspective on self-regulatory practices
-
N. Ashrafi, and J. Kuilboer Online privacy policies: an empirical perspective on self-regulatory practices Journal of Electronic Commerce in Organizations 3 4 2005 61 74 (Pubitemid 41305754)
-
(2005)
Journal of Electronic Commerce in Organizations
, vol.3
, Issue.4
, pp. 61-74
-
-
Ashrafi, N.1
Kuilboer, J.-P.2
-
3
-
-
33750687395
-
The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization
-
N.F. Awad, and M. Krishnan The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization MIS Quarterly 30 1 2006 13 28 (Pubitemid 44971423)
-
(2006)
MIS Quarterly: Management Information Systems
, vol.30
, Issue.1
, pp. 13-28
-
-
Awad, N.F.1
Krishnan, M.S.2
-
6
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
H. Cavusoglu, B. Mishra, and S. Raghunathan The effect of Internet security breach announcements on market value: capital market reactions for breached firms and Internet security developers International Journal of Electronic Commerce 9 1 2004 69 104 (Pubitemid 39444049)
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
7
-
-
80052930099
-
-
San Francisco, CA, April 22 current, March 1, 2011
-
B. Crothers, Intel finds stolen laptops can be costly, Nanotech - The circuits blog, CNET News, San Francisco, CA, April 22, 2009, news.cnet.com/8301-13924-3-10225626-64.html?tag=mncol;title, current, March 1, 2011.
-
(2009)
Intel Finds Stolen Laptops Can Be Costly, Nanotech - The Circuits Blog, CNET News
-
-
Crothers, B.1
-
8
-
-
0001501223
-
How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use
-
M.J. Culnan How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use MIS Quarterly 17 3 1993 341 363
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.J.1
-
9
-
-
0034396278
-
Protecting privacy online: Is self-regulation working?
-
M.J. Culnan Protecting privacy online: is self-regulation working? Journal of Public Policy and Marketing 19 1 2000 20 26
-
(2000)
Journal of Public Policy and Marketing
, vol.19
, Issue.1
, pp. 20-26
-
-
Culnan, M.J.1
-
10
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
-
M.J. Culnan, and P.K. Armstrong Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation Organization Science 10 1 1999 104 115
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
11
-
-
0038803995
-
Consumer privacy: Balancing economic and justice considerations
-
DOI 10.1111/1540-4560.00067
-
M.J. Culnan, and R.J. Bies Consumer privacy: balancing economic and justice considerations Journal of Social Issues 59 2 2003 323 342 (Pubitemid 36775194)
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 323-342
-
-
Culnan, M.J.1
Bies, R.J.2
-
12
-
-
72049116025
-
How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches
-
M.J. Culnan, and C.C. Williams How ethics can enhance organizational privacy: lessons from the ChoicePoint and TJX data breaches MIS Quarterly 33 4 2009 673 687
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 673-687
-
-
Culnan, M.J.1
Williams, C.C.2
-
13
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
DOI 10.1287/isre.1060.0080
-
T. Dinev, and P. Hart An extended privacy calculus model for e-commerce transactions Information Systems Research 17 1 2006 61 80 (Pubitemid 43450179)
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
14
-
-
80052935633
-
Self-regulation and privacy online
-
Federal Trade Commission current, March 1, 2011
-
Federal Trade Commission Self-regulation and privacy online Prepared statement for the Subcommittee on Communications of the Committee on Commerce, Science and Transportation, United States Senate, Washington, DC, July 27, 1999 1999 www.ftc.gov/os/1999/07/privacy99.pdf current, March 1, 2011
-
(1999)
Prepared Statement for the Subcommittee on Communications of the Committee on Commerce, Science and Transportation, United States Senate, Washington, DC, July 27, 1999
-
-
-
15
-
-
80052957586
-
-
F-Secure current, March 1, 2011
-
F-Secure On-going targeted attacks against U.S. military contractors, blog post, San Jose, CA, January 18, 2010 www.f-secure.com/weblog/archives/ 00001859.html 2010 current, March 1, 2011
-
(2010)
On-going Targeted Attacks Against U.S. Military Contractors, Blog Post, San Jose, CA, January 18, 2010
-
-
-
18
-
-
0025723587
-
Impact of information systems on organizations and markets
-
DOI 10.1145/99977.99990
-
V. Gurbaxani, and S.J. Whang The impact of information systems on organizations and markets Communications of the ACM 34 1 1991 59 73 (Pubitemid 21731491)
-
(1991)
Communications of the ACM
, vol.34
, Issue.1
, pp. 59-73
-
-
Gurbaxani Vijay1
Whang Seungjin2
-
19
-
-
38349195111
-
Overcoming online information privacy concerns: An information processing theory approach
-
I. Hann, K. Hui, S.T. Lee, and I.P.L. Png Overcoming online information privacy concerns: an information processing theory approach Journal of Management Information Systems 24 2 2007 13 42
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.2
, pp. 13-42
-
-
Hann, I.1
Hui, K.2
Lee, S.T.3
Png, I.P.L.4
-
20
-
-
80052945216
-
How much is enough?
-
Ph.D. dissertation, Graduate School of Engineering, Stanford University, Palo Alto, CA
-
K.J.S. Hoo, How much is enough? A risk management approach to computer security, Ph.D. dissertation, Graduate School of Engineering, Stanford University, Palo Alto, CA, 2000.
-
(2000)
A Risk Management Approach to Computer Security
-
-
Hoo, K.J.S.1
-
22
-
-
80052923577
-
-
current, July 10, 2010
-
Internet Security Alliance Cyber security social contract, Arlington, VA, January 2010 2010 www.isalliance.org/index.php?option=com-content&task= view&id=173&Itemid=335 current, July 10, 2010
-
(2010)
Cyber Security Social Contract, Arlington, VA, January 2010
-
-
Security Alliance, I.1
-
24
-
-
49049088363
-
Risk management of contract portfolios in IT services: The profit-at-risk approach
-
R.J. Kauffman, and R. Sougstad Risk management of contract portfolios in IT services: the profit-at-risk approach Journal of Management Information Systems 25 1 2008 17 48
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.1
, pp. 17-48
-
-
Kauffman, R.J.1
Sougstad, R.2
-
25
-
-
36249020892
-
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents
-
DOI 10.1016/j.dss.2007.07.001, PII S0167923607001005
-
D.J. Kim, D.J. Ferrin, and H.R. Rao A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents Decision Support Systems 44 2 2008 544 564 (Pubitemid 350138190)
-
(2008)
Decision Support Systems
, vol.44
, Issue.2
, pp. 544-564
-
-
Kim, D.J.1
Ferrin, D.L.2
Rao, H.R.3
-
26
-
-
34547692964
-
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment
-
DOI 10.1016/j.dss.2006.04.008, PII S0167923606000674
-
J.K. Lee, and H.R. Rao Perceived risks, counter-beliefs, and intentions to use anti-counterterrorism Web sites: an exploratory study of government-citizens online interactions in a turbulent environment Decision Support Systems 43 4 2007 1431 1449 (Pubitemid 47223475)
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1431-1449
-
-
Lee, J.1
Rao, H.R.2
-
27
-
-
0344219790
-
An examination of privacy policies in Fortune 500 Web sites
-
C. Liu, and K.P. Arnett An examination of privacy policies in Fortune 500 Web sites Mid-American Journal of Business 17 1 2002 13 21
-
(2002)
Mid-American Journal of Business
, vol.17
, Issue.1
, pp. 13-21
-
-
Liu, C.1
Arnett, K.P.2
-
28
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
DOI 10.1287/isre.1040.0032
-
N.K. Malhotra, S.S. Kim, and J. Agarwal Internet users' information privacy concerns: the construct, the scale, and a causal model Information Systems Research 15 4 2004 336 355 (Pubitemid 40192456)
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
30
-
-
10844290435
-
Consumers' protection of online privacy and identity
-
G.R. Milne, A.J. Rohm, and S. Bahl Consumers' protection of online privacy and identity Journal of Consumer Affairs 38 2 2004 217 232 (Pubitemid 39666076)
-
(2004)
Journal of Consumer Affairs
, vol.38
, Issue.2
, pp. 217-232
-
-
Milne, G.R.1
Rohm, A.J.2
Bahl, S.3
-
31
-
-
80052923811
-
-
Open Security Foundation current, March 1, 2011.
-
Open Security Foundation Data loss statistics, Glen Allen, VA, July 10, 2010 www.dataloss.org current, March 1, 2011.
-
Data Loss Statistics, Glen Allen, VA, July 10, 2010
-
-
-
32
-
-
38349085594
-
Interoperability of e-government information systems: Issues of identification and data sharing
-
B. Otjacques, P. Hitzelberger, and F. Feltz Interoperability of e-government information systems: issues of identification and data sharing Journal of Management Information Systems 23 4 2007 29 52
-
(2007)
Journal of Management Information Systems
, vol.23
, Issue.4
, pp. 29-52
-
-
Otjacques, B.1
Hitzelberger, P.2
Feltz, F.3
-
33
-
-
1842423764
-
Price-at-risk: A methodology for pricing utility computing services
-
G.A. Paleologo Price-at-risk: a methodology for pricing utility computing services IBM Systems Journal 43 1 2004 20 31
-
(2004)
IBM Systems Journal
, vol.43
, Issue.1
, pp. 20-31
-
-
Paleologo, G.A.1
-
35
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
P.A. Pavlou, H. Liang, and Y. Xue Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective MIS Quarterly 31 1 2007 105 136
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
36
-
-
80052959121
-
-
current, March 1, 2011
-
PayPal PayPal security key, San Jose, CA www.paypal.com/cgi-bin/webscr? cmd=xpt/Marketing-CommandDriven/securitycenter/PayPalSecurityKey-outside 2010 current, March 1, 2011
-
(2010)
PayPal Security Key, San Jose, CA
-
-
-
37
-
-
80052933254
-
Safeguarding the new currency of business: Findings from the 2008 Global State of Information Security Study
-
PriceWaterhouseCoopers, Security Advisory Services New York, NY
-
PriceWaterhouseCoopers Safeguarding the new currency of business: findings from the 2008 Global State of Information Security Study White paper 2008 Security Advisory Services New York, NY
-
(2008)
White Paper
-
-
-
38
-
-
78650046325
-
-
Privacy Rights Clearinghouse current, March 1, 2011
-
Privacy Rights Clearinghouse Chronology of data breaches: security breaches 2005-present, San Diego, CA, July 7, 2010 www.privacyrights.org/ar/ ChrondataBreaches.htm 2010 current, March 1, 2011
-
(2010)
Chronology of Data Breaches: Security Breaches 2005-present, San Diego, CA, July 7, 2010
-
-
-
39
-
-
33749622781
-
Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures?
-
DOI 10.1016/j.im.2006.07.003, PII S037872060600070X
-
K.S. Schwaig, G.C. Kane, and V.C. Storey Compliance to the Fair Information Practices: how are the Fortune 500 handling online privacy disclosures? Information Management 43 7 2006 805 820 (Pubitemid 44548297)
-
(2006)
Information and Management
, vol.43
, Issue.7
, pp. 805-820
-
-
Schwaig, K.S.1
Kane, G.C.2
Storey, V.C.3
-
40
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
H.J. Smith, S.J. Milberg, and S.J. Burke Information privacy: measuring individuals' concerns about organizational practices MIS Quarterly 20 2 1996 167 196
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
41
-
-
0002734011
-
The economics of information
-
G.J. Stigler The economics of information Journal of Political Economy 69 3 1961 213 225
-
(1961)
Journal of Political Economy
, vol.69
, Issue.3
, pp. 213-225
-
-
Stigler, G.J.1
-
42
-
-
80052927107
-
-
Sungard Availability Services, current, July 10, 2010
-
Sungard Availability Services Customer success story: the NYBOT wanted to improve its information availability capabilities to provide uninterrupted operations, Case study, Wayne, PA, 2008 www.availability.sungard.com/Documents/ NYBOT%20CaseStudy.pdf current, July 10, 2010
-
Customer Success Story: The NYBOT Wanted to Improve Its Information Availability Capabilities to Provide Uninterrupted Operations, Case Study, Wayne, PA, 2008
-
-
-
44
-
-
40749111254
-
Concern for information privacy and online consumer purchasing
-
C. Van Slyke, J.T. Shim, R. Johnson, and J. Jiang Concern for information privacy and online consumer purchasing Journal of the Association for Information Systems 7 6 2006 415 443
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.6
, pp. 415-443
-
-
Van Slyke, C.1
Shim, J.T.2
Johnson, R.3
Jiang, J.4
-
45
-
-
61349180141
-
A value-at-risk approach to information security investment
-
J. Wang, A. Chaudhury, and H.R. Rao A value-at-risk approach to information security investment Information Systems Research 19 1 2008 102 120
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 102-120
-
-
Wang, J.1
Chaudhury, A.2
Rao, H.R.3
|