-
1
-
-
79751480868
-
Is There a Cost to Privacy Breaches? An Event Study
-
September 4-6
-
Acquisto, A., Friedman, A., and Telang, R. 2006. "Is There a Cost to Privacy Breaches? An Event Study," in Proceedings of the 3rd International Conference on Intelligent Systems, September 4-6, pp. 19-41.
-
(2006)
Proceedings of the 3rd International Conference on Intelligent Systems
, pp. 19-41
-
-
Acquisto, A.1
Friedman, A.2
Telang, R.3
-
2
-
-
81355155705
-
A two-phase authentication protocol using the cell phone as a token
-
Adams, C., and Dimitriou, A. 2008. "A Two-Phase Authentication Protocol Using the Cell Phone as a Token," Journal of Information Privacy & Security (4:2), pp. 23-39.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.2
, pp. 23-39
-
-
Adams, C.1
Dimitriou, A.2
-
3
-
-
81355137231
-
Exoinformation space audits: An information richness view of privacy and security obligations
-
Adams, C., and Katos, V. 2007. "Exoinformation Space Audits: An Information Richness View of Privacy and Security Obligations," Journal of Information Privacy & Security (3:3), pp. 29-44.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.3
, pp. 29-44
-
-
Adams, C.1
Katos, V.2
-
4
-
-
85136049562
-
Vision paper: Enabling privacy for the paranoids
-
Toronto, Canada, August 29-September 3
-
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Mishra, N., Motwani, R., Srivastava, U., Thomas, D., Widom, J., and Xu, Y. 2004. "Vision Paper: Enabling Privacy for the Paranoids," in Proceedings of the 30th International Conference on Very Large Data Bases-Volume 30, Toronto, Canada, August 29-September 3, pp. 708-719.
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
, vol.30
, pp. 708-719
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Mishra, N.6
Motwani, R.7
Srivastava, U.8
Thomas, D.9
Widom, J.10
Xu, Y.11
-
5
-
-
81355166784
-
Controlling the threat to personal privacy: Corporate policies must be created
-
Agranoff, M. H. 1991. "Controlling the Threat to Personal Privacy: Corporate Policies Must Be Created," Information Systems Management (8:3), pp. 18-52.
-
(1991)
Information Systems Management
, vol.8
, Issue.3
, pp. 18-52
-
-
Agranoff, M.H.1
-
6
-
-
47849110512
-
A statistical matching approach to detect privacy violation for trust-based collaborations
-
June 16
-
Ahmed, M., Quercia, D., and Hailes, S. 2005. "A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations,"in Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, June 16, pp. 598-602.
-
(2005)
Proceedings of the 6th IEEE International Symposium on A World of Wireless Mobile and Multimedia Networks
, pp. 598-602
-
-
Ahmed, M.1
Quercia, D.2
Hailes, S.3
-
9
-
-
84870957986
-
The antecedents of customer self-disclosure to online virtual advisors
-
Phoenix, AZ, December
-
Al-Natour, S., Benbasat, I., and Cenfetelli, R. 2009. "The Antecedents of Customer Self-Disclosure to Online Virtual Advisors," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
-
(2009)
Proceedings of the 30th International Conference on Information Systems
, pp. 15-18
-
-
Al-Natour, S.1
Benbasat, I.2
Cenfetelli, R.3
-
10
-
-
81355126390
-
Examining the impact of e-privacy risk concerns on citizens' intentions to use e-government services: An oman perspective
-
Al Abri, D., McGill, T., and Dixon, M. 2009. "Examining the Impact of e-Privacy Risk Concerns on Citizens' Intentions to Use e-Government Services: An Oman Perspective," Journal of Information Privacy & Security (5:2), pp. 3-26.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.2
, pp. 3-26
-
-
Al Abri, D.1
McGill, T.2
Dixon, M.3
-
11
-
-
31344436619
-
Information privacy in organizations: Empowering creative and extrarole performance
-
DOI 10.1037/0021-9010.91.1.221
-
Alge, B. J., Ballinger, G. A., Tangirala, S., and Oakley, J. L. 2006. "Information Privacy in Organizations: Empowering Creative and Extrarole Performance," Journal of Applied Psychology (91:1), pp. 221-232. (Pubitemid 43145702)
-
(2006)
Journal of Applied Psychology
, vol.91
, Issue.1
, pp. 221-232
-
-
Alge, B.J.1
Ballinger, G.A.2
Tangirala, S.3
Oakley, J.L.4
-
12
-
-
48149108946
-
Workplace surveillance and managing privacy boundaries
-
Allen, M. W., Coopman, S. J., Hart, J. L., and Walker, K. L. 2007. "Workplace Surveillance and Managing Privacy Boundaries," Management Communication Quarterly (21:2), pp. 172-200.
-
(2007)
Management Communication Quarterly
, vol.21
, Issue.2
, pp. 172-200
-
-
Allen, M.W.1
Coopman, S.J.2
Hart, J.L.3
Walker, K.L.4
-
13
-
-
34250710593
-
A bayesian network approach to detecting privacy intrusion
-
IEEE Computer Society
-
An, X., Jutla, D., and Cercone, N. 2006. "A Bayesian Network Approach to Detecting Privacy Intrusion," in Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE Computer Society, pp. 73-76.
-
(2006)
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 73-76
-
-
An, X.1
Jutla, D.2
Cercone, N.3
-
14
-
-
84870971211
-
Genetic information altruists: How far and to whom does their generosity extend?
-
Phoenix, AZ, December 15-18
-
Anderson, C. L., and Agarwal, R. 2009. "Genetic Information Altruists: How Far and to Whom Does Their Generosity Extend?," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18
-
(2009)
Proceedings of the 30th International Conference on Information Systems
-
-
Anderson, C.L.1
Agarwal, R.2
-
15
-
-
84870163786
-
Digital health records and privacy concerns: Overcoming key barriers to adoption
-
Milwaukee, WI, December
-
Angst, C., and Agarwal, R. 2006. "Digital Health Records and Privacy Concerns: Overcoming Key Barriers to Adoption," in Proceedings of the 27th International Conference on Information Systems, Milwaukee, WI, December 10-13.
-
(2006)
Proceedings of the 27th International Conference on Information Systems
, pp. 10-13
-
-
Angst, C.1
Agarwal, R.2
-
16
-
-
66449136652
-
Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion
-
Angst, C., and Agarwal, R. 2009. "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion," MIS Quarterly (33:2), pp. 339-370.
-
(2009)
MIS Quarterly
, vol.33
, Issue.2
, pp. 339-370
-
-
Angst, C.1
Agarwal, R.2
-
51
-
-
81355137225
-
Stimulus provisions will improve hipaa
-
Anonymous
-
Anonymous. 2009e. "Stimulus Provisions Will Improve HIPAA," Information Management Journal (43:4), p. 6.
-
(2009)
Information Management Journal
, vol.43
, Issue.4
, pp. 6
-
-
-
56
-
-
81355137210
-
Texas law overrides hipaa, court says
-
Anonymous
-
Anonymous. 2009j. "Texas Law Overrides HIPAA, Court Says," Information Management Journal (43:5), p. 14.
-
(2009)
Information Management Journal
, vol.43
, Issue.5
, pp. 14
-
-
-
58
-
-
0038373425
-
Anonymous e-prescriptions
-
Washington, DC
-
Ateniese, G., and de Medeiros, B. 2002. "Anonymous E-Prescriptions," in Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, Washington, DC, pp. 19-31.
-
(2002)
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society
, pp. 19-31
-
-
Ateniese, G.1
De Medeiros, B.2
-
59
-
-
0021448166
-
Professional responsibility for information privacy
-
Auerbach, I. L. 1985. "Professional Responsibility for Information Privacy," Computers & Security (4:2), pp. 103-107.
-
(1985)
Computers & Security
, vol.4
, Issue.2
, pp. 103-107
-
-
Auerbach, I.L.1
-
60
-
-
0020722017
-
Privacy and canadian telecommunications regulation
-
Auerbach, L. 1983. "Privacy and Canadian Telecommunications Regulation," Telecommunications Policy (7:1), pp. 35-42.
-
(1983)
Telecommunications Policy
, vol.7
, Issue.1
, pp. 35-42
-
-
Auerbach, L.1
-
61
-
-
33750687395
-
The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization
-
Awad, N. F., and Krishnan, M. S. 2006. "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization," MIS Quarterly (30:1), pp. 13-28. (Pubitemid 44971423)
-
(2006)
MIS Quarterly: Management Information Systems
, vol.30
, Issue.1
, pp. 13-28
-
-
Awad, N.F.1
Krishnan, M.S.2
-
62
-
-
78649292048
-
Technologies of compliance: Risk and regulation in a digital age
-
Bamberger, K. 2010. "Technologies of Compliance: Risk and Regulation in a Digital Age," Texas Law Review (88:4), pp. 669-739.
-
(2010)
Texas Law Review
, vol.88
, Issue.4
, pp. 669-739
-
-
Bamberger, K.1
-
63
-
-
84870963426
-
The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation
-
Paris, France, December
-
Bansal, G., Zahedi, F., and Gefen, D. 2008. "The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
-
(2008)
Proceedings of the 29th International Conference on Information Systems
, pp. 14-17
-
-
Bansal, G.1
Zahedi, F.2
Gefen, D.3
-
64
-
-
81355155698
-
Public information technology and e-governance: Managing the virtual state
-
Basu, C. 2006a. "Public Information Technology and E-Governance: Managing the Virtual State," Journal of Information Privacy & Security (2:3), pp. 65-67.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.3
, pp. 65-67
-
-
Basu, C.1
-
66
-
-
81355155271
-
Expert opinion: Interview with: Peter zaballos, vice president frazier technology ventures seattle, wa
-
Basu, C. 2007b. "Expert Opinion: Interview With: Peter Zaballos, Vice President Frazier Technology Ventures Seattle, WA," Journal of Information Privacy & Security (3:2), pp. 59-60.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.2
, pp. 59-60
-
-
Basu, C.1
-
67
-
-
81355137221
-
Geekonomics-The real cost of insecure software
-
Basu, C. 2007c. "Geekonomics-The Real Cost of Insecure Software," Journal of Information Privacy & Security (3:3), p. 71.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.3
, pp. 71
-
-
Basu, C.1
-
69
-
-
81355155694
-
Interview with: Damani short, cio united states olympic committee
-
Basu, C. 2007e. "Interview With: Damani Short, CIO United States Olympic Committee," Journal of Information Privacy & Security (3:4), pp. 53-54.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.4
, pp. 53-54
-
-
Basu, C.1
-
70
-
-
81355166766
-
Interview with: Hemadri gurramkonda: Director, centrica informatics
-
Basu, C. 2007f. "Interview With: Hemadri Gurramkonda: Director, Centrica Informatics," Journal of Information Privacy & Security (3:1), pp. 63-64.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.1
, pp. 63-64
-
-
Basu, C.1
-
72
-
-
81355137222
-
Born digital-understanding the first generation of digital natives
-
Basu, C. 2008a. "Born Digital-Understanding the First Generation of Digital Natives," Journal of Information Privacy & Security (4:3), pp. 66-67.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.3
, pp. 66-67
-
-
Basu, C.1
-
76
-
-
81355166326
-
Interview with: Ravi pakala manager, fis (fidelity national information systems)
-
Basu, C. 2009c. "Interview With: Ravi Pakala Manager, Fis (Fidelity National Information Systems)," Journal of Information Privacy & Security (5:2), pp. 65-66.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.2
, pp. 65-66
-
-
Basu, C.1
-
77
-
-
81355166767
-
Quest for universal identification-A commentary
-
Basu, C. 2009d. "Quest for Universal Identification-A Commentary," Journal of Information Privacy & Security (5:3), pp. 44-54.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.3
, pp. 44-54
-
-
Basu, C.1
-
78
-
-
81355136829
-
Interview with: Robert voliva and jeremy fields
-
Basu, C., and Chenoweth, J. 2006a. "Interview With: Robert Voliva and Jeremy Fields," Journal of Information Privacy & Security (2:4), pp. 60-62.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.4
, pp. 60-62
-
-
Basu, C.1
Chenoweth, J.2
-
79
-
-
81355137208
-
Expert opinion: An interview with sindey schueler-platz state administrator, kansas
-
Bureau of Investigation
-
Basu, S. C. 2005a. "Expert Opinion: An Interview with Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation," Journal of Information Privacy & Security (1:1), pp. 40-42.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 40-42
-
-
Basu, S.C.1
-
80
-
-
81355137219
-
Expert opinion: Marilyn wood, security officer jim amundson, server administration & network solutions department of agriculture, trade and consumer protection (datcp-wisconsin)
-
Basu, S. C. 2005b. "Expert Opinion: Marilyn Wood, Security Officer Jim Amundson, Server Administration & Network Solutions Department of Agriculture, Trade and Consumer Protection (Datcp-Wisconsin)," Journal of Information Privacy & Security (1:2), pp. 67-68.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.2
, pp. 67-68
-
-
Basu, S.C.1
-
81
-
-
81355137219
-
Expert opinion: Marilyn wood, security officer jim amundson, server administration & network solutions department of agriculture, trade and consumer protection (datcp wisconsin)
-
Basu, S. C. 2005c. "Expert Opinion: Marilyn Wood, Security Officer Jim Amundson, Server Administration & Network Solutions Department of Agriculture, Trade and Consumer Protection (Datcp Wisconsin)," Journal of Information Privacy & Security (1:1), pp. 67-68.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 67-68
-
-
Basu, S.C.1
-
82
-
-
81355126384
-
On issues of computer crimes, online security and legal resources
-
Basu, S. C. 2005d. "On Issues of Computer Crimes, Online Security and Legal Resources," Journal of Information Privacy & Security (1:4), p. 1.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.4
, pp. 1
-
-
Basu, S.C.1
-
83
-
-
81355137216
-
On issues of convenience, privacy and security
-
Basu, S. C. 2005e. "On Issues of Convenience, Privacy and Security," Journal of Information Privacy & Security (1:2), p. 1.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.2
, pp. 1
-
-
Basu, S.C.1
-
84
-
-
81355166765
-
An interview with sindey schueler-platz state administrator, kansas
-
Bureau of Investigation
-
Basu, S. C. 2006b. "An Interview with Sindey Schueler-Platz State Administrator, Kansas Bureau of Investigation," Journal of Information Privacy & Security (2:3), pp. 62-65.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.3
, pp. 62-65
-
-
Basu, S.C.1
-
85
-
-
81355137224
-
Frameworks and proposed models
-
Basu, S. C., and Chenoweth, J. 2006b. "Frameworks and Proposed Models," Journal of Information Privacy & Security (2:2), p. 1.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.2
, pp. 1
-
-
Basu, S.C.1
Chenoweth, J.2
-
86
-
-
84867973432
-
Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
-
Bélanger, F., Hiller, J., and Smith, W. J. 2002. "Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes," Journal of Strategic Information Systems (11:3/4), pp. 245-270.
-
(2002)
Journal of Strategic Information Systems
, vol.11
, Issue.3-4
, pp. 245-270
-
-
Bélanger, F.1
Hiller, J.2
Smith, W.J.3
-
87
-
-
31644433090
-
A framework for e-government: Privacy implications
-
DOI 10.1108/14637150610643751, E-government
-
Bélanger, F., and Hiller, J. S. 2006. "A Framework for E-Government: Privacy Implications," Business Process Management Journal (12:1), pp. 48-60. (Pubitemid 43170470)
-
(2006)
Business Process Management Journal
, vol.12
, Issue.SPEC. ISS.1
, pp. 48-60
-
-
Belanger, F.1
Hiller, J.S.2
-
88
-
-
42349100769
-
The memory gap in surveillance law
-
Bellia, P. 2008. "The Memory Gap in Surveillance Law," The University of Chicago Law Review (75:1), pp. 137-179.
-
(2008)
The University of Chicago Law Review
, vol.75
, Issue.1
, pp. 137-179
-
-
Bellia, P.1
-
89
-
-
7544251123
-
International differences in information privacy concerns: A global survey of consumers
-
DOI 10.1080/01972240490507956
-
Bellman, S., Johnson, E., Kobrin, S., and Lohse, G. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers," The Information Society (20:5), pp. 313-324. (Pubitemid 39454127)
-
(2004)
Information Society
, vol.20
, Issue.5
, pp. 313-324
-
-
Bellman, S.1
Johnson, E.J.2
Kobrin, S.J.3
Lohse, G.L.4
-
90
-
-
0002587094
-
TRUSTe: An online privacy seal program
-
Benassi, P. 1999. "TRUSTe: An Online Privacy Seal Program," Association for Computing Machinery. Communications of the ACM (42:2), pp. 56-59. (Pubitemid 129566439)
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 56-59
-
-
Benassi, P.1
-
91
-
-
81355137215
-
Privacy, computers, and personal information: Toward equality and equity in an information age
-
Benjamin, L. M. 1991. "Privacy, Computers, and Personal Information: Toward Equality and Equity in an Information Age," Communications and the Law (13:2), pp. 3-16.
-
(1991)
Communications and the Law
, vol.13
, Issue.2
, pp. 3-16
-
-
Benjamin, L.M.1
-
92
-
-
18844391574
-
Consumer financial privacy legislation and regulation - 2004 developments
-
Benoit, M. A., and Lovoy, E. A. 2005. "Consumer Financial Privacy Legislation and Regulation-2004 Developments," The Business Lawyer (60:2), pp. 713-722. (Pubitemid 40688159)
-
(2005)
Business Lawyer
, vol.60
, Issue.2
, pp. 713-722
-
-
Benoit, M.A.1
Lovoy, E.A.2
-
93
-
-
81355166763
-
The great chinese firewall: A safeguard or stop sign?
-
Bensen, T., Henze, P., and Farnsworth, G. 2006. "The Great Chinese Firewall: A Safeguard or Stop Sign?," Journal of Information Privacy & Security (2:3), pp. 42-61.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.3
, pp. 42-61
-
-
Bensen, T.1
Henze, P.2
Farnsworth, G.3
-
94
-
-
81355166760
-
A proposed integrated framework for coordinating computer security incident response team
-
Bhaskar, R. 2005. "A Proposed Integrated Framework for Coordinating Computer Security Incident Response Team," Journal of Information Privacy & Security (1:3), pp. 3-17.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 3-17
-
-
Bhaskar, R.1
-
95
-
-
81355126383
-
Knowledge sharing in law enforcement: A case study
-
Bhaskar, R., and Zhang, Y. 2007. "Knowledge Sharing in Law Enforcement: A Case Study," Journal of Information Privacy & Security (3:3), pp. 45-68.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.3
, pp. 45-68
-
-
Bhaskar, R.1
Zhang, Y.2
-
96
-
-
84938704593
-
Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques
-
IEEE Computer Society
-
Blazic, A. J., Dolinar, K., and Porekar, J. 2007. "Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques," in Proceedings of the First International Conference on the Digital Society, IEEE Computer Society, pp. 30-35.
-
(2007)
Proceedings of the First International Conference on the Digital Society
, pp. 30-35
-
-
Blazic, A.J.1
Dolinar, K.2
Porekar, J.3
-
97
-
-
38049068075
-
Secure web service-based resource sharing in erp networks
-
Brehm, N., and Gómez, J. M. 2005. "Secure Web Service-Based Resource Sharing in ERP Networks," Journal of Information Privacy & Security (1:2), pp. 29-48.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.2
, pp. 29-48
-
-
Brehm, N.1
Gómez, J.M.2
-
98
-
-
33947186222
-
Investigating the relationship between internet privacy concerns and online purchase behavior
-
Brown, M., and Muchira, R. 2004. "Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior," Journal of Electronic Commerce Research (5:1), pp. 62-70.
-
(2004)
Journal of Electronic Commerce Research
, vol.5
, Issue.1
, pp. 62-70
-
-
Brown, M.1
Muchira, R.2
-
99
-
-
81355126378
-
A theoretical model to deliver value in electronic commerce
-
Brown, S. A. 2007. "A Theoretical Model to Deliver Value in Electronic Commerce," Journal of Information Privacy & Security (3:1), pp. 3-29.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.1
, pp. 3-29
-
-
Brown, S.A.1
-
100
-
-
0012394212
-
Global privacy concerns and regulation-is the united states a world apart?
-
Cain, R. M. 2002. "Global Privacy Concerns and Regulation-Is the United States a World Apart?," International Review of Law, Computers & Technology (16:1), pp. 23-34.
-
(2002)
International Review of Law, Computers & Technology
, vol.16
, Issue.1
, pp. 23-34
-
-
Cain, R.M.1
-
101
-
-
0040249189
-
Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy
-
Campbell, A. J. 1997. "Relationship Marketing in Consumer Markets: A Comparison of Managerial and Consumer Attitudes About Information Privacy," Journal of Direct Marketing (11:3), pp. 44-57.
-
(1997)
Journal of Direct Marketing
, vol.11
, Issue.3
, pp. 44-57
-
-
Campbell, A.J.1
-
102
-
-
81355136827
-
A research framework for information systems security
-
Cannoy, S., Palvia, P. C., and Schilhavy, R. 2006. "A Research Framework for Information Systems Security," Journal of Information Privacy & Security (2:2), pp. 3-29.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.2
, pp. 3-29
-
-
Cannoy, S.1
Palvia, P.C.2
Schilhavy, R.3
-
103
-
-
79955622073
-
User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy
-
Cao, J., and Everard, A. 2008. "User Attitude Towards Instant Messaging: The Effect of Espoused National Cultural Values on Awareness and Privacy," Journal of Global Information Technology Management (11:2), pp. 30-57.
-
(2008)
Journal of Global Information Technology Management
, vol.11
, Issue.2
, pp. 30-57
-
-
Cao, J.1
Everard, A.2
-
104
-
-
81355137212
-
The big switch: Rewiring the world, from edison to google
-
Carr, N. 2009. "The Big Switch: Rewiring the World, from Edison to Google," Journal of Information Privacy & Security (5:2), pp. 67-68.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.2
, pp. 67-68
-
-
Carr, N.1
-
105
-
-
77649281933
-
Information privacy concerns and e-government: A research agenda
-
Carter, L., and McBride, A. 2010. "Information Privacy Concerns and E-Government: A Research Agenda," Transforming Government: People, Process and Policy (4:1), pp. 10-13.
-
(2010)
Transforming Government: People, Process and Policy
, vol.4
, Issue.1
, pp. 10-13
-
-
Carter, L.1
McBride, A.2
-
106
-
-
81355166761
-
How do the privacy laws and usa patriot act apply to the life settlement industry?
-
Casey, B. T. 2007. "How Do the Privacy Laws and USA Patriot Act Apply to the Life Settlement Industry?," Journal of Structured Finance (13:2), pp. 76-82.
-
(2007)
Journal of Structured Finance
, vol.13
, Issue.2
, pp. 76-82
-
-
Casey, B.T.1
-
108
-
-
66949126522
-
Internet and online information privacy: An exploratory study of preteens and early teens
-
Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H., and Upadhyaya, S. 2009. "Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens," IEEE Transactions on Professional Communication (52:2), pp. 167-182.
-
(2009)
IEEE Transactions on Professional Communication
, vol.52
, Issue.2
, pp. 167-182
-
-
Chai, S.1
Bagchi-Sen, S.2
Morrell, C.3
Rao, H.4
Upadhyaya, S.5
-
109
-
-
81355155686
-
Privacy preserving combinatorial reverse auction protocol for a market-oriented grid based on secure group communication
-
Chakraborty, S., and Sharma, S. K. 2005. "Privacy Preserving Combinatorial Reverse Auction Protocol for a Market-Oriented Grid Based on Secure Group Communication," Journal of Information Privacy & Security (1:3), pp. 42-56.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 42-56
-
-
Chakraborty, S.1
Sharma, S.K.2
-
110
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
Chan, M., Woon, I., and Kankanhalli, A. 2005a. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy & Security (1:3), pp. 18-41.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
111
-
-
34547753207
-
Information privacy: Management, marketplace, and legal challenges
-
Chan, Y. E., Culnan, M. J., Greenaway, K., Laden, G., Levin, A., and Smith, H. J. 2005b. "Information Privacy: Management, Marketplace, and Legal Challenges," Communications of the Association for Information Systems (16:12), pp. 270-298.
-
(2005)
Communications of the Association for Information Systems
, vol.16
, Issue.12
, pp. 270-298
-
-
Chan, Y.E.1
Culnan, M.J.2
Greenaway, K.3
Laden, G.4
Levin, A.5
Smith, H.J.6
-
117
-
-
81355125989
-
Threat, authentication, and privacy
-
Changchit, C. 2008c. "Threat, Authentication, and Privacy," Journal of Information Privacy & Security (4:2), pp. i-ii.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.2
-
-
Changchit, C.1
-
119
-
-
81355125983
-
Privacy governance, law, and growth perspective in security
-
Changchit, C. 2009b. "Privacy Governance, Law, and Growth Perspective in Security," Journal of Information Privacy & Security (5:4), pp. i-ii.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.4
-
-
Changchit, C.1
-
121
-
-
81355125952
-
Online privacy, information security and security investment
-
Changchit, C. 2010. "Online Privacy, Information Security and Security Investment," Journal of Information Privacy & Security (6:1), pp. i-ii.
-
(2010)
Journal of Information Privacy & Security
, vol.6
, Issue.1
-
-
Changchit, C.1
-
122
-
-
33745866914
-
A model of advertiser - Portal contracts: Personalization strategies under privacy concerns
-
DOI 10.1007/s10799-006-5726-9
-
Chellappa, R. K., and Shivendu, S. 2006. "A Model of Advertiser-Portal Contracts: Personalization Strategies Under Privacy Concerns," Information Technology and Management (7:1), pp. 7-19. (Pubitemid 44026995)
-
(2006)
Information Technology and Management
, vol.7
, Issue.1
, pp. 7-19
-
-
Chellappa, R.K.1
Shivendu, S.2
-
123
-
-
81355137213
-
A model of portal competition in the presence of privacy concerns: Strategic and welfare implications
-
R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
-
Chellappa, R., and Sin, R. 2004. "A Model of Portal Competition in the Presence of Privacy Concerns: Strategic and Welfare Implications," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 15-27.
-
(2004)
Proceedings of the 25th International Conference on Information Systems
, pp. 15-27
-
-
Chellappa, R.1
Sin, R.2
-
124
-
-
14744270170
-
Personalization versus privacy: An empirical examination of the online consumer's dilemma
-
DOI 10.1007/s10799-005-5879-y
-
Chellappa, R. K., and Sin, R. G. 2005. "Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management (6), pp. 181-202. (Pubitemid 40735257)
-
(2005)
Information Technology and Management
, vol.6
, Issue.2-3
, pp. 181-202
-
-
Chellappa, R.K.1
Sin, R.G.2
-
125
-
-
85069300282
-
Am i Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context
-
Phoenix, AZ, December
-
Chen, J., Ping, W., Xu, Y., and Tan, B. C. Y. 2009. "Am I Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
-
(2009)
Proceedings of the 30th International Conference on Information Systems
, pp. 15-18
-
-
Chen, J.1
Ping, W.2
Xu, Y.3
Tan, B.C.Y.4
-
126
-
-
4043132397
-
Protecting personal information online: A survey of user privacy concerns and control techniques
-
Chen, K., and Rea Jr., A. I. 2004. "Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques," The Journal of Computer Information Systems (44:4), pp. 85-92. (Pubitemid 39068895)
-
(2004)
Journal of Computer Information Systems
, vol.44
, Issue.4
, pp. 85-92
-
-
Chen, K.1
Rea Jr., A.I.2
-
127
-
-
81355136852
-
An analysis of security threats of electronic election systems
-
Cheng, C. H., and Wong, K. F. 2006. "An Analysis of Security Threats of Electronic Election Systems," Journal of Information Privacy & Security (2:3), pp. 4-20.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.3
, pp. 4-20
-
-
Cheng, C.H.1
Wong, K.F.2
-
128
-
-
81355125990
-
Book review: The art of deception: Controlling the human element of security
-
Chenoweth, J. D. 2005a. "Book Review: The Art of Deception: Controlling the Human Element of Security," Journal of Information Privacy & Security (1:2), pp. 69-70.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.2
, pp. 69-70
-
-
Chenoweth, J.D.1
-
129
-
-
81355125990
-
Book review: The art of deception: Controlling the human element of security
-
Chenoweth, J. D. 2005b. "Book Review: The Art of Deception: Controlling the Human Element of Security," Journal of Information Privacy & Security (1:1), pp. 69-70.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 69-70
-
-
Chenoweth, J.D.1
-
130
-
-
81355136828
-
Computer security: 20 things every employee should know
-
Chenoweth, J. D. 2005c. "Computer Security: 20 Things Every Employee Should Know," Journal of Information Privacy & Security (1:1), p. 45.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 45
-
-
Chenoweth, J.D.1
-
132
-
-
81355155683
-
Expert opinion: Kelly hansen, ceo, neohapsis inc
-
Chenoweth, J. D. 2005e. "Expert Opinion: Kelly Hansen, Ceo, Neohapsis Inc," Journal of Information Privacy & Security (1:3), pp. 57-58.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 57-58
-
-
Chenoweth, J.D.1
-
133
-
-
81355125957
-
Information security policies, procedures, and standards: Guidelines for effective information security management
-
Chenoweth, J. D. 2005f. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management," Journal of Information Privacy & Security (1:1), pp. 43-44.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 43-44
-
-
Chenoweth, J.D.1
-
134
-
-
81355125956
-
Secrets & lies: Digital security in a networked world
-
Chenoweth, J. D. 2005g. "Secrets & Lies: Digital Security in a Networked World," Journal of Information Privacy & Security (1:3), p. 59-60.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 59-60
-
-
Chenoweth, J.D.1
-
136
-
-
81355155304
-
Cybercrime: Digital cops in a networked environment
-
Chenoweth, J. D. 2007. "Cybercrime: Digital Cops in a Networked Environment," Journal of Information Privacy & Security (3:1), pp. 65-66.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.1
, pp. 65-66
-
-
Chenoweth, J.D.1
-
137
-
-
81355166756
-
Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies
-
Cho, H. 2010. "Determinants of Behavioral Responses to Online Privacy: The Effects of Concern, Risk Beliefs, Self-Efficacy, and Communication Sources on Self-Protection Strategies," Journal of Information Privacy & Security (6:1), pp. 3-27.
-
(2010)
Journal of Information Privacy & Security
, vol.6
, Issue.1
, pp. 3-27
-
-
Cho, H.1
-
138
-
-
55949096818
-
Scalable methodology for supply chain inventory coordination with private information
-
Chu, C., and Leon, V. 2009. "Scalable Methodology for Supply Chain Inventory Coordination with Private Information," European Journal of Operational Research (195:1), pp. 262-279.
-
(2009)
European Journal of Operational Research
, vol.195
, Issue.1
, pp. 262-279
-
-
Chu, C.1
Leon, V.2
-
139
-
-
33847309878
-
E-commerce and information privacy: Privacy policies as personal information protectors
-
Ciocchetti, C. A. 2007. "E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors," American Business Law Journal (44:1), pp. 55-126.
-
(2007)
American Business Law Journal
, vol.44
, Issue.1
, pp. 55-126
-
-
Ciocchetti, C.A.1
-
140
-
-
81355126372
-
Security and privacy governance: Criteria for systems design
-
Clark, J., Beebe, N., Williams, K., and Shepherd, L. 2009. "Security and Privacy Governance: Criteria for Systems Design," Journal of Information Privacy & Security (5:4), pp. 3-30.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.4
, pp. 3-30
-
-
Clark, J.1
Beebe, N.2
Williams, K.3
Shepherd, L.4
-
141
-
-
0036184272
-
Protecting free expression online with freenet
-
DOI 10.1109/4236.978368
-
Clarke, I., Miller, S. G., Hong, T. W., Sandberg, O., and Wiley, B. 2002. "Protecting Free Expression Online with Freenet," Internet Computing (6:1), pp. 40-49. (Pubitemid 34198226)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Miller, S.G.2
Hong, T.W.3
Sandberg, O.4
Wiley, B.5
-
142
-
-
81355166327
-
Information privacy: Culture, legislation and user attitudes
-
Cockcroft, S. 2006. "Information Privacy: Culture, Legislation and User Attitudes," Australasian Journal of Information Systems (14:1), pp. 55-68.
-
(2006)
Australasian Journal of Information Systems
, vol.14
, Issue.1
, pp. 55-68
-
-
Cockcroft, S.1
-
143
-
-
0010315737
-
Chief privacy officers
-
Cohen, S. 2001. "Chief Privacy Officers," Risk Management (48:7), pp. 9-9.
-
(2001)
Risk Management
, vol.48
, Issue.7
, pp. 9-9
-
-
Cohen, S.1
-
145
-
-
63649164020
-
Personal information privacy: A multi-party endeavor
-
Conger, S. 2009. "Personal Information Privacy: A Multi-Party Endeavor," Journal of Electronic Commerce in Organizations (7:1), pp. 71-82.
-
(2009)
Journal of Electronic Commerce in Organizations
, vol.7
, Issue.1
, pp. 71-82
-
-
Conger, S.1
-
146
-
-
81355166757
-
Introducing the information technology security essential body of knowledge framework
-
Conklin, W., and McLeod, A. 2009. "Introducing the Information Technology Security Essential Body of Knowledge Framework," Journal of Information Privacy & Security (5:2), pp. 27-40.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.2
, pp. 27-40
-
-
Conklin, W.1
McLeod, A.2
-
147
-
-
0037768438
-
M-commerce in Canada: An interaction framework for wireless privacy
-
Coursaris, C., Hassanein, K., and Head, M. 2003. "m-Commerce in Canada: An Interaction Framework for Wireless Privacy," Canadian Journal of Administrative Sciences (20:1), pp. 54-73. (Pubitemid 36618965)
-
(2003)
Canadian Journal of Administrative Sciences
, vol.20
, Issue.1
, pp. 54-73
-
-
Coursaris, C.1
Hassanein, K.2
Head, M.3
-
148
-
-
84870973348
-
The effect of online privacy information on purchasing behavior: An experimental study
-
Montreal, Quebec, Canada, December
-
Cranor, L., Egelman, S., Tsai, J., and Acquisti, A. 2007. "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study," in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
-
(2007)
Proceedings of the 28th International Conference on Information Systems
, pp. 9-12
-
-
Cranor, L.1
Egelman, S.2
Tsai, J.3
Acquisti, A.4
-
150
-
-
33646680778
-
What do they "Indicate?" evaluating security and privacy indicators
-
Cranor, L. F. 2006. "What Do They 'Indicate?': Evaluating Security and Privacy Indicators," Interactions (13:3), pp. 45-47. (Pubitemid 43734554)
-
(2006)
Interactions
, vol.13
, Issue.3
, pp. 45-47
-
-
Cranor, L.F.1
-
151
-
-
33749617824
-
User interfaces for privacy agents
-
DOI 10.1145/1165734.1165735
-
Cranor, L. F., Guduru, P., and Arjula, M. 2006. "User Interfaces for Privacy Agents," ACM Transactions on Computer-Human Interaction (13:2), pp. 135-178. (Pubitemid 44546465)
-
(2006)
ACM Transactions on Computer-Human Interaction
, vol.13
, Issue.2
, pp. 135-178
-
-
Cranor, L.F.1
Guduru, P.2
Arjula, M.3
-
152
-
-
79960036218
-
The impact of consumer perceptions of information privacy and security risks on the adoption of residual rfid technologies
-
Crazier, J., Jensen, A., and Dave, D. 2008. "The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies," Communications of the Association for Information Systems (23:14), pp. 235-256.
-
(2008)
Communications of the Association for Information Systems
, vol.23
, Issue.14
, pp. 235-256
-
-
Crazier, J.1
Jensen, A.2
Dave, D.3
-
153
-
-
51449092702
-
Citizens' concerns about the privacy of personal information held by government: A comparative study, japan and new zealand
-
Los Alamitos, CA: IEEE Computer Society Press
-
Cullen, R. 2008. "Citizens' Concerns About the Privacy of Personal Information Held by Government: A Comparative Study, Japan and New Zealand," in Proceedings of the 41st Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 224-224.
-
(2008)
Proceedings of the 41st Annual Hawaii International Conference on System Sciences
, pp. 224-224
-
-
Cullen, R.1
-
154
-
-
70249123439
-
Culture, identity and information privacy in the age of digital government
-
Cullen, R. 2009. "Culture, Identity and Information Privacy in the Age of Digital Government," Online Information Review (33:3), pp. 405-421.
-
(2009)
Online Information Review
, vol.33
, Issue.3
, pp. 405-421
-
-
Cullen, R.1
-
155
-
-
39749102272
-
Information privacy and trust in government: A citizen-based perspective from new zealand
-
Los Alamitos, CA: IEEE Computer Society Press
-
Cullen, R., and Reilly, P. 2007. "Information Privacy and Trust in Government: A Citizen-Based Perspective from New Zealand," in Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 109-118.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences
, pp. 109-118
-
-
Cullen, R.1
Reilly, P.2
-
156
-
-
0001501223
-
How did they get my name?': An exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M. J. 1993. "'How Did They Get My Name?': An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly (17:3), pp. 341-363.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.J.1
-
157
-
-
0034396278
-
Protecting privacy online: Is self-regulation working?
-
Culnan, M. J. 2000. "Protecting Privacy Online: Is Self-Regulation Working?," Journal of Public Policy & Marketing (19:1), pp. 20-26.
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 20-26
-
-
Culnan, M.J.1
-
158
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
-
Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science (10:1), pp. 104-115.
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
159
-
-
81355155318
-
Computer privacy annoyances-how to avoid the most annoying invasions of your personal and online privacy
-
Cutshall, R. 2007. "Computer Privacy Annoyances-How to Avoid the Most Annoying Invasions of Your Personal and Online Privacy," Journal of Information Privacy & Security (3:4), pp. 55-56.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.4
, pp. 55-56
-
-
Cutshall, R.1
-
160
-
-
81355155680
-
An architecture for automatic and adaptive defense
-
Dantu, R., and Cangussu, J. W. 2007. "An Architecture for Automatic and Adaptive Defense," Journal of Information Privacy & Security (3:2), pp. 37-58.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.2
, pp. 37-58
-
-
Dantu, R.1
Cangussu, J.W.2
-
161
-
-
34247374924
-
Understanding consumer information privacy in the realm of internet commerce: Personhood and pragmatism, pop-tarts and six-packs
-
DeMarco, D. A. 2006. "Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs," Texas Law Review (84:4), pp. 1013-1064.
-
(2006)
Texas Law Review
, vol.84
, Issue.4
, pp. 1013-1064
-
-
Demarco, D.A.1
-
162
-
-
0037592645
-
E-commerce policies and customer privacy
-
Desai, M. S., Richards, T. C., and Desai, K. J. 2003. "e-Commerce Policies and Customer Privacy," Information Management & Computer Security (11:1), pp. 19-27.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.1
, pp. 19-27
-
-
Desai, M.S.1
Richards, T.C.2
Desai, K.J.3
-
163
-
-
51349134970
-
Towards mixed-initiative access control
-
New York, November 12-15
-
Dewan, P., Grudin, J., and Horvitz, E. 2007. "Towards Mixed-Initiative Access Control," in Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, New York, November 12-15, pp. 64-71.
-
(2007)
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing
, pp. 64-71
-
-
Dewan, P.1
Grudin, J.2
Horvitz, E.3
-
164
-
-
36049013776
-
Mobile payment adoption in the us: A cross-industry, cross-platform solution
-
Dewan, S. G., and Chen, L. 2005. "Mobile Payment Adoption in the US: A Cross-Industry, Cross-Platform Solution," Journal of Information Privacy & Security (1:2), pp. 4-28.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.2
, pp. 4-28
-
-
Dewan, S.G.1
Chen, L.2
-
165
-
-
72749110934
-
A multi-objective approach to data sharing with privacy constraints and preference based objectives
-
Montreal, Quebec, Canada, July 8-12
-
Dewri, R., Whitley, D., Ray, I., and Ray, I. 2009. "A Multi-Objective Approach to Data Sharing with Privacy Constraints and Preference Based Objectives," in Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. Montreal, Quebec, Canada, July 8-12, pp. 1499-1506.
-
(2009)
Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation
, pp. 1499-1506
-
-
Dewri, R.1
Whitley, D.2
Ray, I.3
Ray, I.4
-
166
-
-
25844466463
-
Value focused assessment of individual privacy concerns for internet commerce
-
L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
-
Dhillon, G., Bardacino, J., and Hackney, R. 2002. "Value Focused Assessment of Individual Privacy Concerns for Internet Commerce," in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 705-709.
-
(2002)
Proceedings of the 23rd International Conference on Information Systems
, pp. 705-709
-
-
Dhillon, G.1
Bardacino, J.2
Hackney, R.3
-
167
-
-
43249123099
-
The importance of communicating workplace privacy policies
-
Dillon, T. W., Hamilton, A. J., Thomas, D. S., and Usry, M. L. 2008. "The Importance of Communicating Workplace Privacy Policies," Employee Responsibilities and Rights Journal (20:2), pp. 119-139.
-
(2008)
Employee Responsibilities and Rights Journal
, vol.20
, Issue.2
, pp. 119-139
-
-
Dillon, T.W.1
Hamilton, A.J.2
Thomas, D.S.3
Usry, M.L.4
-
168
-
-
33750996095
-
Internet users' privacy concerns and beliefs about government surveillance: An exploratory study of differences between italy and the united states
-
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. 2006a. "Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences between Italy and the United States," Journal of Global Information Management (14:4), pp. 57-93.
-
(2006)
Journal of Global Information Management
, vol.14
, Issue.4
, pp. 57-93
-
-
Dinev, T.1
Bellotto, M.2
Hart, P.3
Russo, V.4
Serra, I.5
Colautti, C.6
-
169
-
-
33749322976
-
Privacy calculus model in e-commerce - A study of Italy and the United States
-
DOI 10.1057/palgrave.ejis.3000590, PII 3000590
-
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. 2006b. "Privacy Calculus Model in E-Commerce-A Study of Italy and the United States," European Journal of Information Systems (15:4), pp. 389-402. (Pubitemid 44494838)
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 389-402
-
-
Dinev, T.1
Bellotto, M.2
Hart, P.3
Russo, V.4
Serra, I.5
Colautti, C.6
-
170
-
-
8344248697
-
Internet privacy concerns and their antecedents-measurement validity and a regression model
-
Dinev, T., and Hart, P. 2004. "Internet Privacy Concerns and Their Antecedents-Measurement Validity and a Regression Model," Behaviour & Information Technology (23:6), pp. 413-422.
-
(2004)
Behaviour & Information Technology
, vol.23
, Issue.6
, pp. 413-422
-
-
Dinev, T.1
Hart, P.2
-
171
-
-
33645785886
-
Internet privacy concerns and social awareness as determinants of intention to transact
-
DOI 10.2753/JEC1086-4415100201
-
Dinev, T., and Hart, P. 2005. "Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact," International Journal of Electronic Commerce (10:2), pp. 7-29. (Pubitemid 43554387)
-
(2005)
International Journal of Electronic Commerce
, vol.10
, Issue.2
, pp. 7-29
-
-
Dinev, T.1
Hart, P.2
-
172
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
DOI 10.1287/isre.1060.0080
-
Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research (17:1), pp. 61-80. (Pubitemid 43450179)
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
173
-
-
63349106129
-
Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy
-
Los Alamitos, CA: IEEE Computer Society Press
-
Dinev, T., Xu, H., and Smith, H. J. 2009. "Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy," Proceedings of the 42nd Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
-
(2009)
Proceedings of the 42nd Hawaii International Conference on System Sciences
-
-
Dinev, T.1
Xu, H.2
Smith, H.J.3
-
174
-
-
81355136832
-
Behavioral marketing: Security and privacy issues
-
Dobosz, B., Green, K., and Sisler, G. 2006. "Behavioral Marketing: Security and Privacy Issues," Journal of Information Privacy & Security (2:4), pp. 45-59.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.4
, pp. 45-59
-
-
Dobosz, B.1
Green, K.2
Sisler, G.3
-
175
-
-
71749108242
-
Protecting consumer privacy in the company's best interest
-
Dolnicar, S., and Jordaan, Y. 2006. "Protecting Consumer Privacy in the Company's Best Interest," Australasian Marketing Journal (14:1), pp. 39-61.
-
(2006)
Australasian Marketing Journal
, vol.14
, Issue.1
, pp. 39-61
-
-
Dolnicar, S.1
Jordaan, Y.2
-
176
-
-
34547267405
-
A market-oriented approach to responsibly managing information privacy concerns in direct marketing
-
Dolnicar, S., and Jordaan, Y. 2007. "A Market-Oriented Approach to Responsibly Managing Information Privacy Concerns in Direct Marketing," Journal of Advertising (36:2), pp. 123-149.
-
(2007)
Journal of Advertising
, vol.36
, Issue.2
, pp. 123-149
-
-
Dolnicar, S.1
Jordaan, Y.2
-
177
-
-
58049130062
-
A shared steganographic file system with error correction
-
Sabadell, Spain Springer-Verlag
-
Domingo-Ferrer, J., and Bras-Amoros, M. 2008. "A Shared Steganographic File System with Error Correction," in Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence. Sabadell, Spain Springer-Verlag, pp. 227-238.
-
(2008)
Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
, pp. 227-238
-
-
Domingo-Ferrer, J.1
Bras-Amoros, M.2
-
178
-
-
84938780205
-
Privacy, risk perception, and expert online behavior: An exploratory study of household end users
-
Drennan, J., Mort, G. S., and Previte, J. 2006. "Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users," Journal of Organizational and End User Computing (18:1), pp. 1-22.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, Issue.1
, pp. 1-22
-
-
Drennan, J.1
Mort, G.S.2
Previte, J.3
-
179
-
-
33744972118
-
Dynamic aspects of the infopriv model for information privacy
-
Vienna, Austria, August 26-28
-
Dreyer, L. C. J., and Olivier, M. S. 1998. "Dynamic Aspects of the InfoPriv Model for Information Privacy," in Proceedings of the 9th International Workshop on Database and Expert Systems Applications, Vienna, Austria, August 26-28, pp. 340-345.
-
(1998)
Proceedings of the 9th International Workshop on Database and Expert Systems Applications
, pp. 340-345
-
-
Dreyer, L.C.J.1
Olivier, M.S.2
-
180
-
-
67449161997
-
Personal information privacy and shopping behavior on the internet
-
Dubelaar, C., Jevons, C., and Parker, L. 2003. "Personal Information Privacy and Shopping Behavior on the Internet," Journal of Asia Pacific Marketing (2:1), pp. 65-74.
-
(2003)
Journal of Asia Pacific Marketing
, vol.2
, Issue.1
, pp. 65-74
-
-
Dubelaar, C.1
Jevons, C.2
Parker, L.3
-
181
-
-
18544382993
-
Examining Internet privacy policies within the context of user privacy values
-
DOI 10.1109/TEM.2005.844927
-
Earp, J. B., Anton, A. I., Aiman-Smith, L., and Stufflebeam, W. H. 2005. "Examining Internet Privacy Policies within the Context of User Privacy Values," IEEE Transactions on Engineering Management (52:2), pp. 227-237. (Pubitemid 40654472)
-
(2005)
IEEE Transactions on Engineering Management
, vol.52
, Issue.2
, pp. 227-237
-
-
Earp, J.B.1
Anton, A.I.2
Aiman-Smith, L.3
Stufflebeam, W.H.4
-
182
-
-
33745683343
-
Information privacy in the service sector: An exploratory study of health care and banking professionals
-
DOI 10.1207/s15327744joce1602-2
-
Earp, J. B., and Payton, F. C. 2006. "Information Privacy in the Service Sector: An Exploratory Study of Health Care and Banking Professionals," Journal of Organizational Computing and Electronic Commerce (16:2), pp. 105-122. (Pubitemid 43998378)
-
(2006)
Journal of Organizational Computing and Electronic Commerce
, vol.16
, Issue.2
, pp. 105-122
-
-
Earp, J.B.1
Payton, F.C.2
-
183
-
-
33745211471
-
Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment
-
DOI 10.1016/j.jbusres.2006.02.006, PII S0148296306000713
-
Eastlick, M. A., Lotz, S. L., and Warrington, P. 2006. "Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment," Journal of Business Research (59:8), pp. 877-886. (Pubitemid 43905939)
-
(2006)
Journal of Business Research
, vol.59
, Issue.8
, pp. 877-886
-
-
Eastlick, M.A.1
Lotz, S.L.2
Warrington, P.3
-
184
-
-
63649153633
-
Customer information: Protecting the organization's most critical asset from misappropriation and identity theft
-
Elson, R. J., and LeClerc, R. 2006. "Customer Information: Protecting the Organization's Most Critical Asset from Misappropriation and Identity Theft," Journal of Information Privacy & Security (2:1), pp. 3-15.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.1
, pp. 3-15
-
-
Elson, R.J.1
Leclerc, R.2
-
185
-
-
81355155278
-
Privacy concerns in e-commerce: An empirical investigation of gender differences
-
Faja, S., and Trimi, S. 2008. "Privacy Concerns in E-Commerce: An Empirical Investigation of Gender Differences," International Journal of Electronic Business (6:4), pp. 386-404.
-
(2008)
International Journal of Electronic Business
, vol.6
, Issue.4
, pp. 386-404
-
-
Faja, S.1
Trimi, S.2
-
186
-
-
84870957265
-
Incentives and perceptions of information security risks
-
Paris, France, December
-
Farahmand, F., Atallah, M., and Konsynski, B. 2008. "Incentives and Perceptions of Information Security Risks," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
-
(2008)
Proceedings of the 29th International Conference on Information Systems
, pp. 14-17
-
-
Farahmand, F.1
Atallah, M.2
Konsynski, B.3
-
187
-
-
4444292882
-
Impact of HIPAA on the integrity of healthcare information
-
DOI 10.1504/IJHTM.2004.004954
-
Fedorowicz, J., and Ray, A. W. 2004. "Impact of HIPAA on the Integrity of Healthcare Information," International Journal of Healthcare Technology & Management (6:2), pp. 142-157. (Pubitemid 39172502)
-
(2004)
International Journal of Healthcare Technology and Management
, vol.6
, Issue.2
, pp. 142-157
-
-
Fedorowicz, J.1
Ray, A.W.2
-
188
-
-
34248393568
-
Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices
-
Feng-Yang, K., Cathy, S. L., and Meng-Hsiang, H. 2007. "Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices," Journal of Business Ethics (73:2), pp. 145-160.
-
(2007)
Journal of Business Ethics
, vol.73
, Issue.2
, pp. 145-160
-
-
Feng-Yang, K.1
Cathy, S.L.2
Meng-Hsiang, H.3
-
189
-
-
85003114126
-
Editorial
-
Finch, E. 2003. "Editorial," Facilities (21:5/6), pp. 93-93.
-
(2003)
Facilities
, vol.21
, Issue.5-6
, pp. 93-93
-
-
Finch, E.1
-
190
-
-
81355155273
-
Security enhanced linux to enforce mandatory access control in health information systems
-
Wollongong, NSW, Australia
-
Franco, L., Sahama, T., and Croll, P. 2008. "Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems," in Proceedings of the 2nd Australasian Workshop on Health Data and Knowledge Management-Volume 80, Wollongong, NSW, Australia, pp. 27-33.
-
(2008)
Proceedings of the 2nd Australasian Workshop on Health Data and Knowledge Management
, vol.80
, pp. 27-33
-
-
Franco, L.1
Sahama, T.2
Croll, P.3
-
191
-
-
34250004313
-
Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use
-
Friedman, B. A., and Reed, L. J. 2007. "Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-Mail Use," Employee Responsibilities and Rights Journal (19:2), pp. 75-83.
-
(2007)
Employee Responsibilities and Rights Journal
, vol.19
, Issue.2
, pp. 75-83
-
-
Friedman, B.A.1
Reed, L.J.2
-
192
-
-
81355155311
-
Book review: Cyberregs-A business guide to web property, privacy, and patents
-
Fugate, J. 2008. "Book Review: CyberRegs-A Business Guide to Web Property, Privacy, and Patents," Journal of Information Privacy & Security (4:4), pp. 64-65.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.4
, pp. 64-65
-
-
Fugate, J.1
-
193
-
-
3042747513
-
The theory of planned behavior and Internet purchasing
-
DOI 10.1108/10662240410542634
-
George, J. F. 2004. "The Theory of Planned Behavior and Internet Purchasing," Internet Research (14:3), pp. 198-212. (Pubitemid 38888464)
-
(2004)
Internet Research
, vol.14
, Issue.3
, pp. 198-212
-
-
George, J.F.1
-
194
-
-
0347496225
-
Business ethics and the information age
-
George, R. T. D. 1999. "Business Ethics and the Information Age," Business and Society Review (104:3), pp. 261-278.
-
(1999)
Business and Society Review
, vol.104
, Issue.3
, pp. 261-278
-
-
George, R.T.D.1
-
195
-
-
81355125985
-
Faults & failures: Pentium serial number pains privacy groups
-
Geppert, L. 1999. "Faults & Failures: Pentium Serial Number Pains Privacy Groups," IEEE Spectrum (36:6), pp. 92-92.
-
(1999)
IEEE Spectrum
, vol.36
, Issue.6
, pp. 92-92
-
-
Geppert, L.1
-
196
-
-
38149067484
-
Towards a framework for tracking legal compliance in healthcare
-
J. Krogstie, A. Opdahl, and G. Sindre (eds.), Berlin: Springer-Verlag
-
Ghanavati, S., Amyot, D., and Peyton, L. 2007. "Towards a Framework for Tracking Legal Compliance in Healthcare," in Proceedings of the 19th International Conference on Advanced Information Systems Engineering, J. Krogstie, A. Opdahl, and G. Sindre (eds.), Berlin: Springer-Verlag, pp. 218-232.
-
(2007)
Proceedings of the 19th International Conference on Advanced Information Systems Engineering
, pp. 218-232
-
-
Ghanavati, S.1
Amyot, D.2
Peyton, L.3
-
197
-
-
79251545908
-
Personal information and privacy in e-commerce application
-
Cairo, Egypt, December 29-31
-
Ghani, N. A., and Sidek, Z. M. 2008. "Personal Information and Privacy in E-Commerce Application," in Proceedings of the 7th WSEAS International Conference on Information Security and Privacy, Cairo, Egypt, December 29-31, pp. 28-32.
-
(2008)
Proceedings of the 7th WSEAS International Conference on Information Security and Privacy
, pp. 28-32
-
-
Ghani, N.A.1
Sidek, Z.M.2
-
198
-
-
77951109210
-
Owner-controlled towards personal information stored in hippocratic database
-
Kota Kinabalu, Malaysia, November 13-15
-
Ghani, N. A., and Sidek, Z. M. 2009. "Owner-Controlled Towards Personal Information Stored in Hippocratic Database," in Proceedings of the 2009 International Conference on Computer Technology and Development-Volume 02, Kota Kinabalu, Malaysia, November 13-15, pp. 227-231.
-
(2009)
Proceedings of the 2009 International Conference on Computer Technology and Development
, vol.2
, pp. 227-231
-
-
Ghani, N.A.1
Sidek, Z.M.2
-
199
-
-
74049090975
-
Prime iii: Defense-in-depth approach to electronic voting
-
Gilbert, J., MacDonald, J., Hill, R., Sanders, D., Mkpong-Ruffin, I., Cross II, E., Rouse, K., McClendon, J., and Rogers, G. 2008. "Prime III: Defense-in-Depth Approach to Electronic Voting," Journal of Information Privacy & Security (4:3), pp. 16-35.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.3
, pp. 16-35
-
-
Gilbert, J.1
MacDonald, J.2
Hill, R.3
Sanders, D.4
Mkpong-Ruffin, I.5
Cross, I.I.E.6
Rouse, K.7
McClendon, J.8
Rogers, G.9
-
200
-
-
0346873587
-
Lost and found in cyberspace: Informational privacy in the age of the internet
-
Gindin, S. E. 1997. "Lost and Found in Cyberspace: Informational Privacy in the Age of the Internet," The San Diego Law Review (34:3), pp. 1153-1223.
-
(1997)
The San Diego Law Review
, vol.34
, Issue.3
, pp. 1153-1223
-
-
Gindin, S.E.1
-
201
-
-
0034363675
-
Protecting health information privacy: The case for self-regulation of electronically held medical records
-
Glenn, C. L. 2000. "Protecting Health Information Privacy: The Case for Self-Regulation of Electronically Held Medical Records," Vanderbilt Law Review (53:5), pp. 1605-1635.
-
(2000)
Vanderbilt Law Review
, vol.53
, Issue.5
, pp. 1605-1635
-
-
Glenn, C.L.1
-
202
-
-
79952405422
-
Intrusion detection management system for ecommerce security
-
Gómez, J., and Lichtenberg, J. 2007. "Intrusion Detection Management System for Ecommerce Security," Journal of Information Privacy & Security (3:4), pp. 19-31.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.4
, pp. 19-31
-
-
Gómez, J.1
Lichtenberg, J.2
-
203
-
-
81355155313
-
Online security solutions in the financial industry based on a commercial risk assessment matrix
-
Gómez, J. M., and Paxmann, S. 2006. "Online Security Solutions in the Financial Industry Based on a Commercial Risk Assessment Matrix," Journal of Information Privacy & Security (2:3), pp. 21-41.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.3
, pp. 21-41
-
-
Gómez, J.M.1
Paxmann, S.2
-
204
-
-
79953849516
-
Privacy, computers, and the commercial dissemination of personal information
-
Graham, J. P. 1987. "Privacy, Computers, and the Commercial Dissemination of Personal Information," Texas Law Review (65:7), pp. 1395-1439.
-
(1987)
Texas Law Review
, vol.65
, Issue.7
, pp. 1395-1439
-
-
Graham, J.P.1
-
205
-
-
81355155314
-
Protecting adolescents' personal information online: Constraints and parameters
-
Gray, D., and Christiansen, L. 2009. "Protecting Adolescents' Personal Information Online: Constraints and Parameters," Journal of Information Privacy & Security (5:4), pp. 31-50.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.4
, pp. 31-50
-
-
Gray, D.1
Christiansen, L.2
-
206
-
-
34547257455
-
Theoretical explanations for firms-information privacy
-
Greenaway, K. E., and Chan, Y. E. 2005. "Theoretical Explanations for Firms-Information Privacy," Journal of the Association for Information Systems (6:6), pp. 171-198.
-
(2005)
Journal of the Association for Information Systems
, vol.6
, Issue.6
, pp. 171-198
-
-
Greenaway, K.E.1
Chan, Y.E.2
-
207
-
-
15344348886
-
Electronic prescribing and HIPAA privacy regulation
-
Greenberg, M. D., Ridgely, M. S., and Bell, D. S. 2004. "Electronic Prescribing and HIPAA Privacy Regulation," Inquiry-Excellus Health Plan (41:4), pp. 461-468. (Pubitemid 40393060)
-
(2004)
Inquiry
, vol.41
, Issue.4
, pp. 461-468
-
-
Greenberg, M.D.1
Ridgely, M.S.2
Bell, D.S.3
-
209
-
-
84870973762
-
Privacy design in online social networks: Learning from privacy breaches and community feedback
-
Paris, France, December
-
Gurses, S., Rizk, R., and Gunther, O. 2008. "Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
-
(2008)
Proceedings of the 29th International Conference on Information Systems
, pp. 14-17
-
-
Gurses, S.1
Rizk, R.2
Gunther, O.3
-
210
-
-
74549121822
-
A framework of authentication and authorization for e-health services
-
Alexandria, VA, October 30-November 3
-
Han, S., Skinner, G., Potdar, V., and Chang, E. 2006. "A Framework of Authentication and Authorization for E-Health Services," in Proceedings of the 3rd ACM Workshop on Secure Web Services. Alexandria, VA, October 30-November 3, pp. 105-106.
-
(2006)
Proceedings of the 3rd ACM Workshop on Secure Web Services
, pp. 105-106
-
-
Han, S.1
Skinner, G.2
Potdar, V.3
Chang, E.4
-
211
-
-
39749104393
-
Analyzing online information privacy concerns: An information processing theory approach
-
Los Alamitos, CA: IEEE Computer Society Press
-
Hann, I. H., Hui, K. L., Lee, S. Y. T., and Png, I. P. L. 2007. "Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach," in Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences
-
-
Hann, I.H.1
Hui, K.L.2
Lee, S.Y.T.3
Png, I.P.L.4
-
212
-
-
61849128934
-
Consumer privacy and marketing avoidance: A static model
-
Hann, I. H., Hui, K. L., Lee, S. Y. T., and Png, I. P. L. 2008. "Consumer Privacy and Marketing Avoidance: A Static Model," Management Science (54:6), p. 1094-1103.
-
(2008)
Management Science
, vol.54
, Issue.6
, pp. 1094-1103
-
-
Hann, I.H.1
Hui, K.L.2
Lee, S.Y.T.3
Png, I.P.L.4
-
213
-
-
79960359586
-
Online information privacy: Measuring the cost-benefit trade-off
-
L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
-
Hann, I. H., Hui, K. L., Lee, T. S., and Png, I. P. L. 2002. "Online Information Privacy: Measuring the Cost-Benefit Trade-Off," in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 1-10.
-
(2002)
Proceedings of the 23rd International Conference on Information Systems
, pp. 1-10
-
-
Hann, I.H.1
Hui, K.L.2
Lee, T.S.3
Png, I.P.L.4
-
215
-
-
70849131437
-
Exploring a human centered approach to managing visual privacy concerns during collaboration
-
Vancouver, British Columbia, Canada, October 26-31
-
Hawkey, K. 2008. "Exploring a Human Centered Approach to Managing Visual Privacy Concerns During Collaboration," in Proceeding of the 3rd ACM International Workshop on Human-Centered Computing, Vancouver, British Columbia, Canada, October 26-31, pp. 69-76.
-
(2008)
Proceeding of the 3rd ACM International Workshop on Human-Centered Computing
, pp. 69-76
-
-
Hawkey, K.1
-
216
-
-
81355155312
-
The impact of privacy on intellectual property in canada
-
Hayes, M. 2006. "The Impact of Privacy on Intellectual Property in Canada," Intellectual Property Journal (20), pp. 67-90.
-
(2006)
Intellectual Property Journal
, vol.20
, pp. 67-90
-
-
Hayes, M.1
-
217
-
-
79952938824
-
An empirical investigation of factors influencing information security behavior
-
Hazari, S., Hargrave, W., and Clenney, B. 2008. "An Empirical Investigation of Factors Influencing Information Security Behavior," Journal of Information Privacy & Security (4:4), pp. 3-20.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.4
, pp. 3-20
-
-
Hazari, S.1
Hargrave, W.2
Clenney, B.3
-
218
-
-
0000179686
-
Personal information privacy: Implications for mis managers
-
Henderson, S. C., and Snyder, C. A. 1999. "Personal Information Privacy: Implications for MIS Managers," Information & Management (36:4), pp. 213-220.
-
(1999)
Information & Management
, vol.36
, Issue.4
, pp. 213-220
-
-
Henderson, S.C.1
Snyder, C.A.2
-
220
-
-
56749176497
-
A globally optimal local inventory control policy for multistage supply chains
-
Hennet, J. 2009. "A Globally Optimal Local Inventory Control Policy for Multistage Supply Chains," International Journal of Production Research (47:2), pp. 435-453.
-
(2009)
International Journal of Production Research
, vol.47
, Issue.2
, pp. 435-453
-
-
Hennet, J.1
-
221
-
-
33646814741
-
Extending context models for privacy in pervasive computing environments
-
DOI 10.1109/PERCOMW.2005.36, 1392792, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
-
Henricksen, K., Wishart, R., McFadden, T., and Indulska, J. 2005. "Extending Context Models for Privacy in Pervasive Computing Environments," in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops, March 8-12, pp. 20-24. (Pubitemid 43762814)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
, vol.2005
, pp. 20-24
-
-
Henricksen, K.1
Wishart, R.2
McFadden, T.3
Indulska, J.4
-
222
-
-
81355166359
-
Separation, risk, and the necessity of privacy to well-being: A comment on adam moore's toward informational privacy rights
-
Himma, K. E. 2007a. "Separation, Risk, and the Necessity of Privacy to Well-Being: A Comment on Adam Moore's toward Informational Privacy Rights," The San Diego Law Review (44:4), pp. 847-858.
-
(2007)
The San Diego Law Review
, vol.44
, Issue.4
, pp. 847-858
-
-
Himma, K.E.1
-
223
-
-
33947411847
-
Foundational issues in information ethics
-
Himma, K. E. 2007b. "Foundational Issues in Information Ethics," Library Hi Tech (25:1), pp. 79-94.
-
(2007)
Library Hi Tech
, vol.25
, Issue.1
, pp. 79-94
-
-
Himma, K.E.1
-
224
-
-
0032352537
-
Privacy in the marketplace: Social construction of privacy
-
Hine, C., and Eve, J. 1998. "Privacy in the Marketplace: Social Construction of Privacy," The Information Society (14:4), pp. 253-262.
-
(1998)
The Information Society
, vol.14
, Issue.4
, pp. 253-262
-
-
Hine, C.1
Eve, J.2
-
225
-
-
73749088345
-
Privacy as information access and illusory control: The case of the facebook news feed privacy outcry
-
Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry," Electronic Commerce Research and Applications (9), pp. 50-60.
-
(2010)
Electronic Commerce Research and Applications
, vol.9
, pp. 50-60
-
-
Hoadley, C.M.1
Xu, H.2
Lee, J.J.3
Rosson, M.B.4
-
226
-
-
0041540817
-
Building consumer trust online
-
Hoffman, D. L., Novak, T. P., and Peralta, M. 1999. "Building Consumer Trust Online," Communications of the ACM (42:4), pp. 80-85. (Pubitemid 129570615)
-
(1999)
Communications of the ACM
, vol.42
, Issue.4
, pp. 80-85
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, M.3
-
227
-
-
70249109213
-
Establishing business integrity in an online environment
-
Hooper, T., and Vos, M. 2009. "Establishing Business Integrity in an Online Environment," Online Information Review (33:2), pp. 343-361.
-
(2009)
Online Information Review
, vol.33
, Issue.2
, pp. 343-361
-
-
Hooper, T.1
Vos, M.2
-
228
-
-
33750026772
-
Privacy concerns, privacy practices and web site categories
-
Hsu, C. 2006. "Privacy Concerns, Privacy Practices and Web Site Categories," Online Information Review (30:5), pp. 569-586.
-
(2006)
Online Information Review
, vol.30
, Issue.5
, pp. 569-586
-
-
Hsu, C.1
-
229
-
-
0346040110
-
The effect of organization-based self-esteem and deindividuation in protecting personal information privacy
-
Hsu, M. H., and Kuo, F. Y. 2003. "The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy," Journal of Business Ethics (42:4), pp. 305-320.
-
(2003)
Journal of Business Ethics
, vol.42
, Issue.4
, pp. 305-320
-
-
Hsu, M.H.1
Kuo, F.Y.2
-
230
-
-
33845388608
-
Online information disclosure
-
Hui, K. L., Tan, B. C. Y., and Goh, C. Y. 2006. "Online Information Disclosure," ACM Transactions on Internet Technology (6:4), pp. 415-441.
-
(2006)
ACM Transactions on Internet Technology
, vol.6
, Issue.4
, pp. 415-441
-
-
Hui, K.L.1
Tan, B.C.Y.2
Goh, C.Y.3
-
231
-
-
33847712553
-
The value of privacy assurance: An exploratory field experiment
-
Hui, K. L., Teo, H. H., and Lee, S. Y. T. 2007. "The Value of Privacy Assurance: An Exploratory Field Experiment," MIS Quarterly (31:1), pp. 19-33. (Pubitemid 46382516)
-
(2007)
MIS Quarterly: Management Information Systems
, vol.31
, Issue.1
, pp. 19-33
-
-
Hui, K.-L.1
Teo, H.H.2
Lee, S.-Y.T.3
-
232
-
-
70349339168
-
Digitising criminal justice in england and wales: Revisiting information-growth dynamics
-
Iannacci, F. 2009. "Digitising Criminal Justice in England and Wales: Revisiting Information-Growth Dynamics," Transforming Government: People, Process and Policy (3:1), pp. 50-64.
-
(2009)
Transforming Government: People, Process and Policy
, vol.3
, Issue.1
, pp. 50-64
-
-
Iannacci, F.1
-
233
-
-
81355125980
-
Exploratory analysis of the readability of information privacy statement of the primary social networks
-
Jafar, M., and Abdullat, A. 2009. "Exploratory Analysis of the Readability of Information Privacy Statement of the Primary Social Networks," Journal of Business & Economics Research (7:12), pp. 123-142.
-
(2009)
Journal of Business & Economics Research
, vol.7
, Issue.12
, pp. 123-142
-
-
Jafar, M.1
Abdullat, A.2
-
234
-
-
0013270513
-
Database security and privacy
-
Jajodia, S. 1996. "Database Security and Privacy," ACM Computing Surveys (28:1), pp. 129-131. (Pubitemid 126499042)
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
, pp. 129-131
-
-
Jajodia, S.1
-
235
-
-
79951661105
-
Business and security executives views of information security investment drivers: Results from a delphi study
-
Johnson, A. 2009. "Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study," Journal of Information Privacy & Security (5:1), pp. 3-27.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.1
, pp. 3-27
-
-
Johnson, A.1
-
236
-
-
40949158933
-
Information privacy compliance in the healthcare industry
-
DOI 10.1108/09685220810862715
-
Johnston, A. C., and Warkentin, M. 2008. "Information Privacy Compliance in the Healthcare Industry," Information Management & Computer Security (16:1), pp. 5-19. (Pubitemid 351403702)
-
(2008)
Information Management and Computer Security
, vol.16
, Issue.1
, pp. 5-19
-
-
Johnston, A.C.1
Warkentin, M.2
-
237
-
-
0347989497
-
Information privacy in cyberspace transactions
-
Kang, J. 1998. "Information Privacy in Cyberspace Transactions," Stanford Law Review (50:4), pp. 1193-1294. (Pubitemid 128093131)
-
(1998)
Stanford Law Review
, vol.50
, Issue.4
, pp. 1193-1294
-
-
Kang, J.1
-
238
-
-
25844445352
-
Modelling corporate wireless security and privacy
-
DOI 10.1016/j.jsis.2005.07.006, PII S0963868705000429, The Future is UNWIRED: Organizational and Strategic Perspectives
-
Katos, V., and Adams, C. 2005. "Modelling Corporate Wireless Security and Privacy," The Journal of Strategic Information Systems (14:3), pp. 307-321. (Pubitemid 41400616)
-
(2005)
Journal of Strategic Information Systems
, vol.14
, Issue.3
, pp. 307-321
-
-
Katos, V.1
Adams, C.2
-
239
-
-
63349089430
-
Cost-effective investments in customer information privacy
-
Los Alamitos, CA: IEEE Computer Society Press
-
Kauffman, R. J., Lee, Y. J., and Sougstad, R. 2009. "Cost-Effective Investments in Customer Information Privacy," in Proceedings of the 42nd Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
-
(2009)
Proceedings of the 42nd Hawaii International Conference on System Sciences
-
-
Kauffman, R.J.1
Lee, Y.J.2
Sougstad, R.3
-
240
-
-
68549093911
-
What Is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles
-
Kayworth, T., Brocato, L., and Whitten, D. 2005. "What Is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles," Communications of the Association for Information Systems (16:6), pp. 110-126.
-
(2005)
Communications of the Association for Information Systems
, vol.16
, Issue.6
, pp. 110-126
-
-
Kayworth, T.1
Brocato, L.2
Whitten, D.3
-
241
-
-
19044396918
-
Health information privacy and e-healthcare
-
DOI 10.1504/IJHTM.2002.001128
-
Kelly, E. P., and Unsal, F. 2002. "Health Information Privacy and E-Healthcare," International Journal of Healthcare Technology & Management (4:1,2), pp. 41-52. (Pubitemid 36166201)
-
(2001)
International Journal of Healthcare Technology and Management
, vol.4
, Issue.1-2
, pp. 41-52
-
-
Kelly, E.P.1
Unsal, F.2
-
242
-
-
40249119459
-
Adoption and implementation problems of e-banking: A study of the managerial perspective of the banking industry in oman
-
Khalfan, A. M., and Alshawaf, A. 2004. "Adoption and Implementation Problems of E-Banking: A Study of the Managerial Perspective of the Banking Industry in Oman," Journal of Global Information Technology Management (7:1), pp. 47-64.
-
(2004)
Journal of Global Information Technology Management
, vol.7
, Issue.1
, pp. 47-64
-
-
Khalfan, A.M.1
Alshawaf, A.2
-
243
-
-
79951753282
-
Cognition-based versus affect-based trust determinants in e-commerce: Cross-cultural comparison study
-
D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14
-
Kim, D. 2005. "Cognition-Based Versus Affect-Based Trust Determinants in E-Commerce: Cross-Cultural Comparison Study," in Proceedings of the 26th International Conference on Information Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, pp. 741-753.
-
(2005)
Proceedings of the 26th International Conference on Information Systems
, pp. 741-753
-
-
Kim, D.1
-
244
-
-
68949144813
-
E-service quality competition through personalization under consumer privacy concerns
-
Kim, E., and Lee, B. 2009. "E-Service Quality Competition through Personalization under Consumer Privacy Concerns," Electronic Commerce Research and Applications (8:4), pp. 182-190.
-
(2009)
Electronic Commerce Research and Applications
, vol.8
, Issue.4
, pp. 182-190
-
-
Kim, E.1
Lee, B.2
-
245
-
-
81355155309
-
Managing anti-circumvention technology for digital content
-
Kim, T., Kim, Y., and Talalayevsky, A. 2008. "Managing Anti-Circumvention Technology for Digital Content," Journal of Information Privacy & Security (4:1), pp. 21-41.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.1
, pp. 21-41
-
-
Kim, T.1
Kim, Y.2
Talalayevsky, A.3
-
246
-
-
27844453166
-
On-line privacy in europe-new regulation for cookies
-
King, I. 2003. "On-Line Privacy in Europe-New Regulation for Cookies," Information & Communications Technology Law (12:3), pp. 225-236.
-
(2003)
Information & Communications Technology Law
, vol.12
, Issue.3
, pp. 225-236
-
-
King, I.1
-
247
-
-
81355125982
-
Book review: Security metrics-replacing fear, uncertainty, and doubt
-
Klaus, T. 2008. "Book Review: Security Metrics-Replacing Fear, Uncertainty, and Doubt," Journal of Information Privacy & Security (4:2), pp. 62-63.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.2
, pp. 62-63
-
-
Klaus, T.1
-
248
-
-
33751111179
-
Cifs: A trust-based multilayer information filtering system for multi-agent mobile information systems
-
Moncton, New Brunswick, Canada, May 24-25
-
Kondratova, E., Ghorbani, A., and Marsh, S. 2006. "CIFS: A Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems," in Proceedings of the 4th Annual Communication Networks and Services Research Conference, Moncton, New Brunswick, Canada, May 24-25, pp. 300-310.
-
(2006)
Proceedings of the 4th Annual Communication Networks and Services Research Conference
, pp. 300-310
-
-
Kondratova, E.1
Ghorbani, A.2
Marsh, S.3
-
249
-
-
81355166356
-
Information assurance technical framework and end user information ownership: A critical analysis
-
Korotka, M. S., Yin, L. R., and Basu, S. C. 2005. "Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis," Journal of Information Privacy & Security (1:1), pp. 45-62.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 45-62
-
-
Korotka, M.S.1
Yin, L.R.2
Basu, S.C.3
-
250
-
-
51249101713
-
The influence of personality traits and information privacy concerns on behavioral intentions
-
Korzaan, M. L., and Boswell, K. T. 2008. "The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions," The Journal of Computer Information Systems (48:4), pp. 15-24.
-
(2008)
The Journal of Computer Information Systems
, vol.48
, Issue.4
, pp. 15-24
-
-
Korzaan, M.L.1
Boswell, K.T.2
-
251
-
-
0242575367
-
Environment and policy factors shaping e-commerce diffusion: A cross-country comparison
-
L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
-
Kraemer, K., Gibbs, J., and Dedrick, J. 2002. "Environment and Policy Factors Shaping E-Commerce Diffusion: A Cross-Country Comparison,"in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 325-335.
-
(2002)
Proceedings of the 23rd International Conference on Information Systems
, pp. 325-335
-
-
Kraemer, K.1
Gibbs, J.2
Dedrick, J.3
-
252
-
-
84870964011
-
Investigating the value of privacy in online social networks: Conjoint analysis
-
Phoenix, AZ, December
-
Krasnova, H., Hildebrand, T., and Guenther, O. 2009. "Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
-
(2009)
Proceedings of the 30th International Conference on Information Systems
, pp. 15-18
-
-
Krasnova, H.1
Hildebrand, T.2
Guenther, O.3
-
253
-
-
80053471048
-
An empirical assessment of factors impeding effective password management
-
Kruger, H., Steyn, T., Medlin, B., and Drevin, L. 2008. "An Empirical Assessment of Factors Impeding Effective Password Management," Journal of Information Privacy & Security (4:4), pp. 45-59.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.4
, pp. 45-59
-
-
Kruger, H.1
Steyn, T.2
Medlin, B.3
Drevin, L.4
-
254
-
-
34250359041
-
Best practices and tools for personal information compliance management
-
DOI 10.1147/sj.462.0235
-
Kudo, M., Araki, Y., Nomiyama, H., Saito, S., and Sohda, Y. 2007. "Best Practices and Tools for Personal Information Compliance Management," IBM Systems Journal (46:2), pp. 235-253. (Pubitemid 46909502)
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 235-253
-
-
Kudo, M.1
Araki, Y.2
Nomiyama, H.3
Saito, S.4
Sohda, Y.5
-
255
-
-
54849413213
-
A block cipher based upon permutation, substitution and iteration
-
Kumar, S. U., Sastry, V. U. K., and Babu, A. V. 2007. "A Block Cipher Based Upon Permutation, Substitution and Iteration," Journal of Information Privacy & Security (3:1), pp. 47-62.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.1
, pp. 47-62
-
-
Kumar, S.U.1
Sastry, V.U.K.2
Babu, A.V.3
-
256
-
-
34248393568
-
Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices
-
Kuo, F. Y., Lin, C. S., and Hsu, M. H. 2007. "Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices," Journal of Business Ethics (73:2), pp. 145-160.
-
(2007)
Journal of Business Ethics
, vol.73
, Issue.2
, pp. 145-160
-
-
Kuo, F.Y.1
Lin, C.S.2
Hsu, M.H.3
-
257
-
-
57049171395
-
Privacy and technology: Folk definitions and perspectives
-
Florence, Italy, April 5-10
-
Kwasny, M., Caine, K., Rogers, W. A., and Fisk, A. D. 2008. "Privacy and Technology: Folk Definitions and Perspectives," in CHI '08 Extended Abstracts on Human Factors in Computing Systems. Florence, Italy, April 5-10, pp. 3291-3296.
-
(2008)
CHI '08 Extended Abstracts on Human Factors in Computing Systems
, pp. 3291-3296
-
-
Kwasny, M.1
Caine, K.2
Rogers, W.A.3
Fisk, A.D.4
-
258
-
-
85106728240
-
Opting-in or opting-out on the internet: Does it really matter
-
R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
-
Lai, Y. L., and Hui, K. L. 2004. "Opting-in or Opting-out on the Internet: Does It Really Matter," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 781-791.
-
(2004)
Proceedings of the 25th International Conference on Information Systems
, pp. 781-791
-
-
Lai, Y.L.1
Hui, K.L.2
-
259
-
-
33745834004
-
Internet opt-in and opt-out: Investigating the roles of frames, defaults and privacy concerns
-
Claremont, CA, April 13-15
-
Lai, Y. L., and Hui, K. L. 2006. "Internet Opt-in and Opt-Out: Investigating the Roles of Frames, Defaults and Privacy Concerns," in Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research: Forty Four Years of Computer Personnel Research: Achievements, Challenges & the Future, Claremont, CA, April 13-15, pp. 253-263.
-
(2006)
Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research: Forty Four Years of Computer Personnel Research: Achievements, Challenges & the Future
, pp. 253-263
-
-
Lai, Y.L.1
Hui, K.L.2
-
260
-
-
0030295475
-
Privacy versus accessibility: The impact of situationally conditioned belief
-
Lally, L. 1996. "Privacy Versus Accessibility: The Impact of Situationally Conditioned Belief," Journal of Business Ethics (15:11), pp. 1221-1226. (Pubitemid 126174333)
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.11
, pp. 1221-1226
-
-
Lally, L.1
-
261
-
-
0017360990
-
The measurement of observer agreement for categorical data
-
Landis, J. R., and Koch, G. G. 1977. "The Measurement of Observer Agreement for Categorical Data," Biometrics (22), pp. 79-94.
-
(1977)
Biometrics
, vol.22
, pp. 79-94
-
-
Landis, J.R.1
Koch, G.G.2
-
262
-
-
68349125675
-
Consumer concerns for healthcare information privacy: A comparison of us and canadian perspectives
-
Laric, M., Pitta, D., and Katsanis, L. 2009. "Consumer Concerns for Healthcare Information Privacy: A Comparison of Us and Canadian Perspectives," Research in Healthcare Financial Management (12:1), pp. 93-111.
-
(2009)
Research in Healthcare Financial Management
, vol.12
, Issue.1
, pp. 93-111
-
-
Laric, M.1
Pitta, D.2
Katsanis, L.3
-
263
-
-
71849112218
-
Preserving patient privacy in the quest for health care economies
-
Laric, M. V., and Pitta, D. A. 2009. "Preserving Patient Privacy in the Quest for Health Care Economies," The Journal of Consumer Marketing (26:7), pp. 477-486.
-
(2009)
The Journal of Consumer Marketing
, vol.26
, Issue.7
, pp. 477-486
-
-
Laric, M.V.1
Pitta, D.A.2
-
264
-
-
0030241302
-
Markets and privacy
-
Laudon, K. C. 1996. "Markets and Privacy," Communications of the ACM (39:9), pp. 92-104. (Pubitemid 126428152)
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 92-104
-
-
Laudon, K.C.1
-
265
-
-
81355125981
-
Corporate governance and data security and privacy
-
Laurent, W. 2006. "Corporate Governance and Data Security and Privacy," DM Review (16:12), pp. 27-27.
-
(2006)
DM Review
, vol.16
, Issue.12
, pp. 27-27
-
-
Laurent, W.1
-
267
-
-
72849117132
-
Criteria for measuring information privacy in context-aware computing environments
-
Qingdao, China, June 4-6
-
Lee, Y., and Kwon, O. 2009. "Criteria for Measuring Information Privacy in Context-Aware Computing Environments," in Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, June 4-6, pp. 158-163.
-
(2009)
Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering
, pp. 158-163
-
-
Lee, Y.1
Kwon, O.2
-
268
-
-
0037655087
-
Information technology and the social construction of information privacy: Comment
-
DOI 10.1016/S0278-4254(03)00023-1, PII S0278425403000231
-
Levine, P. 2003. "Information Technology and the Social Construction of Information Privacy: Comment," Journal of Accounting and Public Policy (22:3), pp. 281-285. (Pubitemid 36567357)
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.3
, pp. 281-285
-
-
Levine, P.1
-
269
-
-
10444228149
-
Algorithms for automated negotiations and their applications in information privacy
-
Beijing, China, September 13-15
-
Li, H., Ahn, D., and Hung, P. C. K. 2004. "Algorithms for Automated Negotiations and Their Applications in Information Privacy," in Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, Beijing, China, September 13-15, pp. 255-262.
-
(2004)
Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business
, pp. 255-262
-
-
Li, H.1
Ahn, D.2
Hung, P.C.K.3
-
270
-
-
84870969074
-
Understanding online information disclosure as a privacy calculus adjusted by exchange fairness
-
Montreal, Quebec, Canada, December
-
Li, H., and Sarathy, R. 2007. "Understanding Online Information Disclosure as a Privacy Calculus Adjusted by Exchange Fairness,"in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
-
(2007)
Proceedings of the 28th International Conference on Information Systems
, pp. 9-12
-
-
Li, H.1
Sarathy, R.2
-
271
-
-
81355166355
-
The role of emotions in shaping consumers' privacy beliefs about unfamiliar online vendors
-
Li, H., Sarathy, R., and Zhang, J. 2008. "The Role of Emotions in Shaping Consumers' Privacy Beliefs About Unfamiliar Online Vendors," Journal of Information Privacy & Security (4:3), pp. 36-62.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.3
, pp. 36-62
-
-
Li, H.1
Sarathy, R.2
Zhang, J.3
-
272
-
-
81355155308
-
A data perturbation approach to privacy protection in data mining
-
R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
-
Li, X. B., and Sarkar, S. 2004. "A Data Perturbation Approach to Privacy Protection in Data Mining," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 995-1008.
-
(2004)
Proceedings of the 25th International Conference on Information Systems
, pp. 995-1008
-
-
Li, X.B.1
Sarkar, S.2
-
273
-
-
84870968318
-
More than just friends? Facebook, disclosive ethics and the morality of technology
-
Paris, France, December
-
Light, B., McGrath, K., and Griffiths, M. 2008. "More Than Just Friends? Facebook, Disclosive Ethics and the Morality of Technology," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
-
(2008)
Proceedings of the 29th International Conference on Information Systems
, pp. 14-17
-
-
Light, B.1
McGrath, K.2
Griffiths, M.3
-
275
-
-
81355136850
-
-
D.B.A. thesis, Golden Gate University, San Francisco
-
Lin, Y. 2005. "Information Privacy Concerns in the Customer Relationship Management Context: A Comparison of Consumer Attitudes in the United States, China, and Taiwan," D.B.A. thesis, Golden Gate University, San Francisco.
-
(2005)
Information Privacy Concerns in the Customer Relationship Management Context: A Comparison of Consumer Attitudes in the United States, China, and Taiwan
-
-
Lin, Y.1
-
276
-
-
81355155305
-
Information privacy concerns, government involvement, and corporate policies in the customer relationship management context
-
Lin, Y., and Wu, H. Y. 2008. "Information Privacy Concerns, Government Involvement, and Corporate Policies in the Customer Relationship Management Context," Journal of Global Business and Technology (4:1), pp. 79-91.
-
(2008)
Journal of Global Business and Technology
, vol.4
, Issue.1
, pp. 79-91
-
-
Lin, Y.1
Wu, H.Y.2
-
277
-
-
78751510570
-
Digital multi-media and the limits of privacy law
-
Lipton, J. 2010. "Digital Multi-Media and the Limits of Privacy Law," Case Western Reserve Journal of International Law (42:3), pp. 551-571.
-
(2010)
Case Western Reserve Journal of International Law
, vol.42
, Issue.3
, pp. 551-571
-
-
Lipton, J.1
-
278
-
-
0347945330
-
Information privacy/information property
-
Litman, J. 2000. "Information Privacy/Information Property," Stanford Law Review (52:5), pp. 1283-1313.
-
(2000)
Stanford Law Review
, vol.52
, Issue.5
, pp. 1283-1313
-
-
Litman, J.1
-
279
-
-
0036758891
-
Raising a red flag on global www privacy policies
-
Liu, C., and Arnett, K. P. 2002. "Raising a Red Flag on Global WWW Privacy Policies," The Journal of Computer Information Systems (43:1), pp. 117-127.
-
(2002)
The Journal of Computer Information Systems
, vol.43
, Issue.1
, pp. 117-127
-
-
Liu, C.1
Arnett, K.P.2
-
280
-
-
10644254580
-
Beyond concern-A privacy-trust-behavioral intention model of electronic commerce
-
Liu, C., Marchewka, J. T., Lu, J., and Yu, C. S. 2005. "Beyond Concern-A Privacy-Trust-Behavioral Intention Model of Electronic Commerce," Information & Management (42:2), pp. 289-304.
-
(2005)
Information & Management
, vol.42
, Issue.2
, pp. 289-304
-
-
Liu, C.1
Marchewka, J.T.2
Lu, J.3
Yu, C.S.4
-
281
-
-
77957943305
-
Location privacy in sparse environment
-
Shenyang, China, March 27-29
-
Liu, H., Wang, T., Sun, M., Liu, Z., and Zhou, M. 2010. "Location Privacy in Sparse Environment," in 2010 2nd International Conference on Advanced Computer Control, Shenyang, China, March 27-29, pp. 258-261.
-
(2010)
2010 2nd International Conference on Advanced Computer Control
, pp. 258-261
-
-
Liu, H.1
Wang, T.2
Sun, M.3
Liu, Z.4
Zhou, M.5
-
282
-
-
85138743041
-
Inducing customers to disclose personal information to internet businesses with social adjustment benefits
-
R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
-
Lu, Y., Tan, B., and Hui, K. L. 2004. "Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 571-581.
-
(2004)
Proceedings of the 25th International Conference on Information Systems
, pp. 571-581
-
-
Lu, Y.1
Tan, B.2
Hui, K.L.3
-
283
-
-
77954787874
-
Data security and information privacy for pda accessible clinical-log for medical education in problem-based learning (pbl) approach
-
Perth, Australia, April 20-23
-
Luanrattana, R., Win, K. T., and Fulcher, J. 2010. "Data Security and Information Privacy for PDA Accessible Clinical-Log for Medical Education in Problem-Based Learning (PBL) Approach," in Proceedings of the IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, Perth, Australia, April 20-23, pp. 979-984.
-
(2010)
Proceedings of the IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
, pp. 979-984
-
-
Luanrattana, R.1
Win, K.T.2
Fulcher, J.3
-
284
-
-
33746874429
-
Using local health information to promote public health
-
DOI 10.1377/hlthaff.25.4.979
-
Luck, J., Chang, C., Brown, E. R., and Lumpkin, J. 2006. "Using Local Health Information to Promote Public Health," Health Affairs (25:4), pp. 979-991. (Pubitemid 44188231)
-
(2006)
Health Affairs
, vol.25
, Issue.4
, pp. 979-991
-
-
Luck, J.1
Chang, C.2
Brown, E.R.3
Lumpkin, J.4
-
285
-
-
81355155297
-
Protecting information privacy when retiring old computers
-
Lunsford, D. L., Robbins, W. A., and Bizarro, P. A. 2004. "Protecting Information Privacy When Retiring Old Computers," The CPA Journal (74:7), pp. 60-62.
-
(2004)
The CPA Journal
, vol.74
, Issue.7
, pp. 60-62
-
-
Lunsford, D.L.1
Robbins, W.A.2
Bizarro, P.A.3
-
286
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
DOI 10.1287/isre.1040.0032
-
Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research (15:4), pp. 336-355. (Pubitemid 40192456)
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
287
-
-
81355136846
-
A distributed defensive architecture for dos/ddos attacks
-
Malliga, S., and Tamilarasi, A. 2008. "A Distributed Defensive Architecture for DoS/DDoS Attacks," Journal of Information Privacy & Security (4:4), pp. 21-44.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.4
, pp. 21-44
-
-
Malliga, S.1
Tamilarasi, A.2
-
288
-
-
63249116880
-
Health information privacy: Why trust matters
-
Mancilla, D. M. R., and Biedermann, S. M. R. 2009. "Health Information Privacy: Why Trust Matters," The Health Care Manager (28:1), pp. 71-74.
-
(2009)
The Health Care Manager
, vol.28
, Issue.1
, pp. 71-74
-
-
Mancilla, D.M.R.1
Biedermann, S.M.R.2
-
289
-
-
81355136848
-
Security service packages: Partitioning the security space
-
Marks, D. G., and Hale, J. 2006. "Security Service Packages: Partitioning the Security Space," Journal of Information Privacy & Security (2:4), pp. 30-44.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.4
, pp. 30-44
-
-
Marks, D.G.1
Hale, J.2
-
290
-
-
74049137924
-
E-mail address privacy via pea's (proxy e-mails accounts)
-
Mashwani, S. R., Khusro, S., and Tjoa, A. M. 2009. "E-Mail Address Privacy Via Pea's (Proxy E-Mails Accounts)," Second International Symposium on Electronic Commerce and Security, pp. 346-351.
-
(2009)
Second International Symposium on Electronic Commerce and Security
, pp. 346-351
-
-
Mashwani, S.R.1
Khusro, S.2
Tjoa, A.M.3
-
291
-
-
0002560477
-
Surfing your turf
-
McGinity, M. 2000. "Surfing Your Turf," Communications of the ACM (43:4), pp. 19-21.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 19-21
-
-
McGinity, M.1
-
292
-
-
78650608727
-
Consumer's pcs: A study of hard drive forensics, data recovery, and exploitation
-
Medlin, B., Cazier, J., and Weaver, R. 2008. "Consumer's PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation," Journal of Information Privacy & Security (4:3), pp. 3-15.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.3
, pp. 3-15
-
-
Medlin, B.1
Cazier, J.2
Weaver, R.3
-
293
-
-
39149111081
-
An investigative study: Consumers password choices on an e-commerce site
-
Medlin, B. D., and Cazier, J. A. 2005. "An Investigative Study: Consumers Password Choices on an E-Commerce Site," Journal of Information Privacy & Security (1:4), pp. 33-52.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.4
, pp. 33-52
-
-
Medlin, B.D.1
Cazier, J.A.2
-
294
-
-
81355125978
-
An investigative study: Health care workers as security threat suppliers
-
Medlin, B. D., and Romaniello, A. 2007. "An Investigative Study: Health Care Workers as Security Threat Suppliers," Journal of Information Privacy & Security (3:1), pp. 30-46.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.1
, pp. 30-46
-
-
Medlin, B.D.1
Romaniello, A.2
-
295
-
-
33645518225
-
Privacy policy statements and consumer willingness to provide personal information
-
Meinert, D. B., Peterson, D. K., Criswell, J. R., and Crossland, M. D. 2006. "Privacy Policy Statements and Consumer Willingness to Provide Personal Information," Journal of Electronic Commerce in Organizations (4:1), pp. 1-17.
-
(2006)
Journal of Electronic Commerce in Organizations
, vol.4
, Issue.1
, pp. 1-17
-
-
Meinert, D.B.1
Peterson, D.K.2
Criswell, J.R.3
Crossland, M.D.4
-
297
-
-
84976793562
-
Values, personal information privacy, and regulatory approaches
-
Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. 1995. "Values, Personal Information Privacy, and Regulatory Approaches," Communications of the ACM (38:12), pp. 65-74.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 65-74
-
-
Milberg, S.J.1
Burke, S.J.2
Smith, H.J.3
Kallman, E.A.4
-
298
-
-
0034418444
-
Information privacy: Corporate management and national regulation
-
Milberg, S. J., Smith, H. J., and Burke, S. J. 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science (11:1), pp. 35-57.
-
(2000)
Organization Science
, vol.11
, Issue.1
, pp. 35-57
-
-
Milberg, S.J.1
Smith, H.J.2
Burke, S.J.3
-
299
-
-
79952900097
-
Web 2.0 emergency applications: How useful can twitter be for emergency response?
-
Mills, A., Chen, R., Lee, J., and Rao, H. 2009. "Web 2.0 Emergency Applications: How Useful Can Twitter Be for Emergency Response?," Journal of Information Privacy & Security (5:3), pp. 3-26.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.3
, pp. 3-26
-
-
Mills, A.1
Chen, R.2
Lee, J.3
Rao, H.4
-
300
-
-
0036814612
-
Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 us web surveys
-
Milne, G. R., and Culnan, M. J. 2002. "Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 US Web Surveys," Information Society (18:5), pp. 345-359.
-
(2002)
Information Society
, vol.18
, Issue.5
, pp. 345-359
-
-
Milne, G.R.1
Culnan, M.J.2
-
301
-
-
4644366146
-
Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices
-
DOI 10.1002/dir.20009
-
Milne, G. R., and Culnan, M. J. 2004. "Strategies for Reducing Online Privacy Risks: Why Consumers Read (or Don't Read) Online Privacy Notices," Journal of Interactive Marketing (18:3), pp. 15-29. (Pubitemid 39289315)
-
(2004)
Journal of Interactive Marketing
, vol.18
, Issue.3
, pp. 15-29
-
-
Milne, G.R.1
Culnan, M.J.2
-
302
-
-
33845791661
-
A longitudinal assessment of online privacy notice readability
-
Milne, G. R., Culnan, M. J., and Greene, H. 2006. "A Longitudinal Assessment of Online Privacy Notice Readability," Journal of Public Policy & Marketing (25:2), pp. 238-249.
-
(2006)
Journal of Public Policy & Marketing
, vol.25
, Issue.2
, pp. 238-249
-
-
Milne, G.R.1
Culnan, M.J.2
Greene, H.3
-
303
-
-
21344485586
-
Direct mail privacy-efficiency trade-offs within an implied social contract framework
-
Milne, G. R., and Gordon, M. E. 1993. "Direct Mail Privacy-Efficiency Trade-Offs within an Implied Social Contract Framework," Journal of Public Policy & Marketing (12:2), pp. 206-215.
-
(1993)
Journal of Public Policy & Marketing
, vol.12
, Issue.2
, pp. 206-215
-
-
Milne, G.R.1
Gordon, M.E.2
-
304
-
-
10844290435
-
Consumers' protection of online privacy and identity
-
Milne, G. R., Rohm, A. J., and Bahl, S. 2004. "Consumers' Protection of Online Privacy and Identity," Journal of Consumer Affairs (38:2), pp. 217-232. (Pubitemid 39666076)
-
(2004)
Journal of Consumer Affairs
, vol.38
, Issue.2
, pp. 217-232
-
-
Milne, G.R.1
Rohm, A.J.2
Bahl, S.3
-
305
-
-
0034384929
-
Internet privacy and security: An examination of online retailer disclosures
-
Miyazaki, A. D., and Fernandez, A. 2000. "Internet Privacy and Security: An Examination of Online Retailer Disclosures," Journal of Public Policy & Marketing (19:1), pp. 54-61.
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 54-61
-
-
Miyazaki, A.D.1
Fernandez, A.2
-
306
-
-
0035587412
-
Consumer perceptions of privacy and security risks for online shopping
-
Miyazaki, A. D., and Fernandez, A. 2001. "Consumer Perceptions of Privacy and Security Risks for Online Shopping," The Journal of Consumer Affairs (35:1), pp. 27-44.
-
(2001)
The Journal of Consumer Affairs
, vol.35
, Issue.1
, pp. 27-44
-
-
Miyazaki, A.D.1
Fernandez, A.2
-
307
-
-
0036252879
-
Internet seals of approval: Effects on online privacy policies and consumer perceptions
-
Miyazaki, A. D., and Krishnamurthy, S. 2002. "Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions," The Journal of Consumer Affairs (36:1), pp. 28-49. (Pubitemid 40815764)
-
(2002)
Journal of Consumer Affairs
, vol.36
, Issue.1
, pp. 28-49
-
-
Miyazaki, A.D.1
Krishnamurthy, S.2
-
308
-
-
31044449275
-
The internet and japanese conception of privacy
-
Mizutani, M., Dorsey, J., and Moor, J. H. 2004. "The Internet and Japanese Conception of Privacy," Ethics and Information Technology (6:2), pp. 121-128.
-
(2004)
Ethics and Information Technology
, vol.6
, Issue.2
, pp. 121-128
-
-
Mizutani, M.1
Dorsey, J.2
Moor, J.H.3
-
309
-
-
81355155303
-
Book review: Management of information security
-
Mollick, J. S. 2008. "Book Review: Management of Information Security," Journal of Information Privacy & Security (4:1), pp. 64-65.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.1
, pp. 64-65
-
-
Mollick, J.S.1
-
310
-
-
81355166351
-
Determinants of perceived customer-centrism in managing information about customers
-
Mollick, J. S. 2009. "Determinants of Perceived Customer-Centrism in Managing Information About Customers," Journal of American Academy of Business (15:1), pp. 9-15.
-
(2009)
Journal of American Academy of Business
, vol.15
, Issue.1
, pp. 9-15
-
-
Mollick, J.S.1
-
311
-
-
71149086168
-
Do concerns about error in data and access to data affect students' feeling of alienation?
-
Mollick, J. S. 2006. "Do Concerns About Error in Data and Access to Data Affect Students' Feeling of Alienation?," Journal of Information Privacy & Security (2:1), pp. 29-46.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.1
, pp. 29-46
-
-
Mollick, J.S.1
-
312
-
-
70349105092
-
The importance of privacy revisited
-
Mooradian, N. 2009. "The Importance of Privacy Revisited," Ethics and Information Technology (11:3), pp. 163-174.
-
(2009)
Ethics and Information Technology
, vol.11
, Issue.3
, pp. 163-174
-
-
Mooradian, N.1
-
313
-
-
81355155302
-
Keys for securing private information in an edms
-
Mooradian, N. 2008. "Keys for Securing Private Information in an EDMS," Information Management Journal (42:2), pp. 42-50.
-
(2008)
Information Management Journal
, vol.42
, Issue.2
, pp. 42-50
-
-
Mooradian, N.1
-
314
-
-
14544301547
-
Do consumers understand The role of privacy seals in E-commerce?
-
DOI 10.1145/1047671.1047674
-
Moores, T. 2005. "Do Consumers Understand the Role of Privacy Seals in E-Commerce?," Communications of the ACM (48:3), pp. 86-91. (Pubitemid 40303816)
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 86-91
-
-
Moores, T.1
-
315
-
-
29844455709
-
Do privacy seals in e-commerce really work?
-
Moores, T. T., and Dhillon, G. 2003. "Do Privacy Seals in e-Commerce Really Work?," Communications of the ACM (46:12), pp. 265-271.
-
(2003)
Communications of the ACM
, vol.46
, Issue.12
, pp. 265-271
-
-
Moores, T.T.1
Dhillon, G.2
-
316
-
-
0038910354
-
Information privacy and performance appraisal: An examination of employee perceptions and reactions
-
Mossholder, K. W., Giles, W. F., and Wesolowski, M. A. 1991. "Information Privacy and Performance Appraisal: An Examination of Employee Perceptions and Reactions," Journal of Business Ethics (10:2), pp. 151-156.
-
(1991)
Journal of Business Ethics
, vol.10
, Issue.2
, pp. 151-156
-
-
Mossholder, K.W.1
Giles, W.F.2
Wesolowski, M.A.3
-
317
-
-
49049120098
-
Subject-wise policy based access control mechanism for protection of personal information
-
Y. J. Na (ed.), Los Alamitos, CA: IEEE Computer Society Press
-
Mun, H. J., Um, N. K., Sun, N., Li, Y. Z., and Lee, S. 2007. "Subject-Wise Policy Based Access Control Mechanism for Protection of Personal Information," in Proceedings of the International Conference on Convergence Information Technology, Y. J. Na (ed.), Los Alamitos, CA: IEEE Computer Society Press, pp. 2242-2247.
-
(2007)
Proceedings of the International Conference on Convergence Information Technology
, pp. 2242-2247
-
-
Mun, H.J.1
Um, N.K.2
Sun, N.3
Li, Y.Z.4
Lee, S.5
-
318
-
-
77955580458
-
Understanding etrust
-
Nabil, T., and Rose, S. 2007. "Understanding eTrust," Journal of Information Privacy & Security (3:2), pp. 3-17.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.2
, pp. 3-17
-
-
Nabil, T.1
Rose, S.2
-
319
-
-
84870967893
-
Thank you, come again examining the role of quality and trust on e-commerce repurchase intentions
-
Paris, France, December
-
Navlakha, S. J., Bateman, P. J., and Carr, C. L. 2008. "Thank You, Come Again Examining the Role of Quality and Trust on E-Commerce Repurchase Intentions," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
-
(2008)
Proceedings of the 29th International Conference on Information Systems
, pp. 14-17
-
-
Navlakha, S.J.1
Bateman, P.J.2
Carr, C.L.3
-
320
-
-
0037310460
-
Recognizing the societal value in information privacy
-
Nehf, J. P. 2003. "Recognizing the Societal Value in Information Privacy," Washington Law Review (78:1), pp. 1-91. (Pubitemid 36420127)
-
(2003)
Washington Law Review
, vol.78
, Issue.1
, pp. 1-91
-
-
Nehf, J.P.1
-
321
-
-
59249087086
-
An empirical investigation of concerns of everyday tracking and recording technologies
-
Seoul, Korea
-
Nguyen, D. H., Kobsa, A., and Hayes, G. R. 2008. "An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies," in Proceedings of the 10th International Conference on Ubiquitous Computing, Seoul, Korea, pp. 182-191.
-
(2008)
Proceedings of the 10th International Conference on Ubiquitous Computing
, pp. 182-191
-
-
Nguyen, D.H.1
Kobsa, A.2
Hayes, G.R.3
-
322
-
-
81355166350
-
The digital persona and trust bank: A privacy management framework
-
Nilakanta, S., and Scheibe, K. 2005. "The Digital Persona and Trust Bank: A Privacy Management Framework," Journal of Information Privacy & Security (1:4), pp. 3-21.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.4
, pp. 3-21
-
-
Nilakanta, S.1
Scheibe, K.2
-
323
-
-
85138741914
-
The role of trust and assurance services in electronic channels: An exploratory study
-
P. De and J. I. DeGross (eds.), Charlotte, NC, December 12-15
-
Noeteberg, A., Christiaanse, E., and Wallage, P. 1999. "The Role of Trust and Assurance Services in Electronic Channels: An Exploratory Study," in Proceedings of the 20th International Conference on Information Systems, P. De and J. I. DeGross (eds.), Charlotte, NC, December 12-15, pp. 472-478.
-
(1999)
Proceedings of the 20th International Conference on Information Systems
, pp. 472-478
-
-
Noeteberg, A.1
Christiaanse, E.2
Wallage, P.3
-
324
-
-
34748896579
-
Privacy attitudes and privacy-related behavior
-
Norberg, P. A., and Horne, D. R. 2007. "Privacy Attitudes and Privacy-Related Behavior," Psychology & Marketing (24:10), pp. 829-847.
-
(2007)
Psychology & Marketing
, vol.24
, Issue.10
, pp. 829-847
-
-
Norberg, P.A.1
Horne, D.R.2
-
325
-
-
33847382472
-
The privacy paradox: Personal information disclosure intentions versus behaviors
-
Norberg, P. A., Horne, D. R., and Horne, D. A. 2007. "The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors," The Journal of Consumer Affairs (41:1), pp. 100-126.
-
(2007)
The Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
326
-
-
2342496000
-
Direct marketing and the use of individual-level consumer information: Determining how and when 'privacy' matters
-
Nowak, G. J., and Phelps, J. 1997. "Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When 'Privacy' Matters," Journal of Interactive Marketing (11:4), pp. 46-60.
-
(1997)
Journal of Interactive Marketing
, vol.11
, Issue.4
, pp. 46-60
-
-
Nowak, G.J.1
Phelps, J.2
-
327
-
-
0018497180
-
Freedom of information, privacy, and information control: A contemporary administrative dilemma
-
O'Brien, D. M. 1979. "Freedom of Information, Privacy, and Information Control: A Contemporary Administrative Dilemma," Public Administration Review (39:4), pp. 323-328.
-
(1979)
Public Administration Review
, vol.39
, Issue.4
, pp. 323-328
-
-
O'Brien, D.M.1
-
328
-
-
47649107660
-
A strategy to automatically feed oms and implement information privacy
-
Melbourne, Australia, April 26-28
-
Ochoa, S. F., Herskovic, V., and Pino, J. A. 2007. "A Strategy to Automatically Feed OMS and Implement Information Privacy," in Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, Melbourne, Australia, April 26-28, pp. 846-851.
-
(2007)
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design
, pp. 846-851
-
-
Ochoa, S.F.1
Herskovic, V.2
Pino, J.A.3
-
329
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
Ohm, P. 2010. "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," UCLA Law Review (57:6), pp. 1701-1777.
-
(2010)
UCLA Law Review
, vol.57
, Issue.6
, pp. 1701-1777
-
-
Ohm, P.1
-
330
-
-
85016340804
-
Email and internet monitoring in the workplace: Information privacy and contracting-out
-
Oliver, H. 2002. "Email and Internet Monitoring in the Workplace: Information Privacy and Contracting-Out," The Industrial Law Journal (31:4), pp. 321-352.
-
(2002)
The Industrial Law Journal
, vol.31
, Issue.4
, pp. 321-352
-
-
Oliver, H.1
-
331
-
-
62949235993
-
Chain ontology based: A model for protecting personal information privacy
-
London, November 13-16
-
Omran, E., Bokma, A., and Abu Al-Maati, S. 2008. "Chain Ontology Based: A Model for Protecting Personal Information Privacy," in Proceedings of the 3rd International Conference on Digital Information Management, London, November 13-16, pp. 363-368.
-
(2008)
Proceedings of the 3rd International Conference on Digital Information Management
, pp. 363-368
-
-
Omran, E.1
Bokma, A.2
Abu Al-Maati, S.3
-
332
-
-
74049123160
-
Distortion-based anonymity for continuous queries in location-based mobile services
-
Seattle, WA, November 4-6
-
Pan, X., Meng, X., and Xu, J. 2009. "Distortion-Based Anonymity for Continuous Queries in Location-Based Mobile Services," in Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, WA, November 4-6, pp. 256-265.
-
(2009)
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 256-265
-
-
Pan, X.1
Meng, X.2
Xu, J.3
-
333
-
-
84870966516
-
The study on the relationship between privacy concerns and information systems effectiveness
-
Phoenix, AZ, December
-
Park, I. 2009. "The Study on the Relationship between Privacy Concerns and Information Systems Effectiveness," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
-
(2009)
Proceedings of the 30th International Conference on Information Systems
, pp. 15-18
-
-
Park, I.1
-
334
-
-
40749094800
-
Privacy regime, culture and user practices in the cyber-marketplace
-
Park, Y. J. P. 2008. "Privacy Regime, Culture and User Practices in the Cyber-Marketplace," Info: The Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media (10:2), pp. 57-74.
-
(2008)
Info: The Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media
, vol.10
, Issue.2
, pp. 57-74
-
-
Park, Y.J.P.1
-
335
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective," MIS Quarterly (31:1), pp. 105-136.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
336
-
-
70149099545
-
Information privacy research: Framework for integrating multiple publics, information channels, and responses
-
Peltier, J., Milne, G., and Phelps, J. 2009. "Information Privacy Research: Framework for Integrating Multiple Publics, Information Channels, and Responses," Journal of Interactive Marketing (23:2), pp. 191-205.
-
(2009)
Journal of Interactive Marketing
, vol.23
, Issue.2
, pp. 191-205
-
-
Peltier, J.1
Milne, G.2
Phelps, J.3
-
337
-
-
77954600726
-
Teaching information privacy in marketing courses: Key educational issues for principles of marketing and elective marketing courses
-
Peltier, J., Milne, G., Phelps, J., and Barrett, J. 2010. "Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses," Journal of Marketing Education (32:2), pp. 224-246.
-
(2010)
Journal of Marketing Education
, vol.32
, Issue.2
, pp. 224-246
-
-
Peltier, J.1
Milne, G.2
Phelps, J.3
Barrett, J.4
-
338
-
-
71049165502
-
Protecting the privacy based on reasoning in e-business using anonymous
-
Wuhan, China, July 4-5
-
Peng, T., Jiang, M., and Hu, M. 2009b. "Protecting the Privacy Based on Reasoning in E-business Using Anonymous," in Proceedings of the International Conference on Environmental Science and Information Application Technology, Wuhan, China, July 4-5, pp. 232-235.
-
(2009)
Proceedings of the International Conference on Environmental Science and Information Application Technology
, pp. 232-235
-
-
Peng, T.1
Jiang, M.2
Hu, M.3
-
340
-
-
10444255427
-
Internet privacy policies: A review and survey of the fortune 50
-
Peslak, A. R. 2005. "Internet Privacy Policies: A Review and Survey of the Fortune 50," Information Resources Management Journal (18:1), pp. 29-41.
-
(2005)
Information Resources Management Journal
, vol.18
, Issue.1
, pp. 29-41
-
-
Peslak, A.R.1
-
341
-
-
33749399316
-
Internet privacy policies of the largest international companies
-
Peslak, A. R. 2006. "Internet Privacy Policies of the Largest International Companies," Journal of Electronic Commerce in Organizations (4:3), pp. 46-62. (Pubitemid 44506508)
-
(2006)
Journal of Electronic Commerce in Organizations
, vol.4
, Issue.3
, pp. 46-62
-
-
Peslak, A.R.1
-
342
-
-
84961841379
-
System implications of information privacy
-
Atlantic City, NJ, April 18-20
-
Petersen, H. E., and Turn, R. 1967. "System Implications of Information Privacy," in Proceedings of the Spring Joint Computer Conference, Atlantic City, NJ, April 18-20, pp. 291-300.
-
(1967)
Proceedings of the Spring Joint Computer Conference
, pp. 291-300
-
-
Petersen, H.E.1
Turn, R.2
-
343
-
-
0348028757
-
Your life as an open book: Has technology rendered personal privacy virtually obsolete?
-
Petersen, S. B. 1995. "Your Life as an Open Book: Has Technology Rendered Personal Privacy Virtually Obsolete?," Federal Communications Law Journal (48:1), pp. 163-186.
-
(1995)
Federal Communications Law Journal
, vol.48
, Issue.1
, pp. 163-186
-
-
Petersen, S.B.1
-
344
-
-
34548433382
-
What's wrong with online privacy policies?
-
DOI 10.1145/1284621.1284627
-
Pollach, I. 2007. "What's Wrong with Online Privacy Policies?," Communications of the ACM (50:9), pp. 103-108. (Pubitemid 47366821)
-
(2007)
Communications of the ACM
, vol.50
, Issue.9
, pp. 103-108
-
-
Pollach, I.1
-
345
-
-
81355125975
-
The efficacy of emphasizing a legal system approach to computer security
-
Post, G. V., and Kagan, A. 2006. "The Efficacy of Emphasizing a Legal System Approach to Computer Security," Journal of Information Privacy & Security (2:4), pp. 3-27.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.4
, pp. 3-27
-
-
Post, G.V.1
Kagan, A.2
-
347
-
-
72949100730
-
Consumer acceptance of rfid-enabled services: A model of multiple attitudes, perceived system characteristics and individual traits
-
Pramatari, K., and Theotokis, A. 2009. "Consumer Acceptance of RFID-Enabled Services: A Model of Multiple Attitudes, Perceived System Characteristics and Individual Traits," European Journal of Information Systems (18:6), pp. 541-552.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.6
, pp. 541-552
-
-
Pramatari, K.1
Theotokis, A.2
-
348
-
-
81055127589
-
Privacy implications of technology innovation processes
-
D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14
-
Prince, K., and Barrett, M. 2005. "Privacy Implications of Technology Innovation Processes," in Proceedings of the 26th International Conference on Information Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, pp. 423-433.
-
(2005)
Proceedings of the 26th International Conference on Information Systems
, pp. 423-433
-
-
Prince, K.1
Barrett, M.2
-
349
-
-
79961058252
-
Protecting personal information using generally accepted privacy principles (gapp) and continuous control monitoring to enhance corporate governance
-
Prosch, M. 2008. "Protecting Personal Information Using Generally Accepted Privacy Principles (GAPP) and Continuous Control Monitoring to Enhance Corporate Governance," International Journal of Disclosure and Governance (5:2), pp. 153-166.
-
(2008)
International Journal of Disclosure and Governance
, vol.5
, Issue.2
, pp. 153-166
-
-
Prosch, M.1
-
350
-
-
50749133808
-
Security and privacy
-
Pujals, J. M. 1993. "Security and Privacy," Computers & Security (12:1), pp. 22-27.
-
(1993)
Computers & Security
, vol.12
, Issue.1
, pp. 22-27
-
-
Pujals, J.M.1
-
351
-
-
80052507069
-
Information privacy and employee records in australia: Which way forward?
-
Pyman, A., O'Rourke, A., and Teicher, J. 2008. "Information Privacy and Employee Records in Australia: Which Way Forward?," Australian Bulletin of Labour (34:1), pp. 28-46.
-
(2008)
Australian Bulletin of Labour
, vol.34
, Issue.1
, pp. 28-46
-
-
Pyman, A.1
O'Rourke, A.2
Teicher, J.3
-
352
-
-
40949085962
-
Research on context-aware architecture for personal information privacy protection
-
DOI 10.1109/ICSMC.2007.4414056, 4414056, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007
-
Qingsheng, Z., Yong, Q., Jizhong, Z., Di, H., and Yujie, N. 2007. "Research on Context-Aware Architecture for Personal Information Privacy Protection," in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montrea, Quebec, Canada, October 7-10, pp. 3912-3916. (Pubitemid 351410186)
-
(2007)
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
, pp. 3912-3916
-
-
Qingsheng, Z.1
Yong, Q.2
Jizhong, Z.3
Di, H.4
Yujie, N.5
-
353
-
-
81355166348
-
Svdc: Preserving privacy in clustering using singular value decomposition
-
Rajavel, M., and Karuppuswamy, D. 2008. "SVDC: Preserving Privacy in Clustering Using Singular Value Decomposition," Journal of Information Privacy & Security (4:2), pp. 40-54.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.2
, pp. 40-54
-
-
Rajavel, M.1
Karuppuswamy, D.2
-
354
-
-
77954948284
-
Privacy Is Dead, Get over It! Information Privacy and the Dream of a Risk-Free Society
-
Rauhofer, J. 2008. "Privacy Is Dead, Get Over It! Information Privacy and the Dream of a Risk-Free Society," Information & Communications Technology Law (17:3), pp. 185-197.
-
(2008)
Information & Communications Technology Law
, vol.17
, Issue.3
, pp. 185-197
-
-
Rauhofer, J.1
-
355
-
-
34547169479
-
A grounded theory of information sharing behavior in a personal learning space
-
DOI 10.1145/1180875.1180946, Proceedings of the 20th Anniversary ACM Conference on Computer Supported Cooperative Work, CSCW 2006
-
Razavi, M. N., and Iverson, L. 2006. "A Grounded Theory of Information Sharing Behavior in a Personal Learning Space," in Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work, Banff, Alberta, Canada, November 4-8, pp. 459-468. (Pubitemid 47112436)
-
(2006)
Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW
, pp. 459-468
-
-
Razavi, M.N.1
Iverson, L.2
-
356
-
-
77950485034
-
A framework for privacy support in group information management systems
-
Sanibel Island, FL, November 4-7
-
Razavi, M. N., and Iverson, L. 2007. "A Framework for Privacy Support in Group Information Management Systems," in GROUP '07 Doctoral Consortium Papers, Sanibel Island, FL, November 4-7, pp. 1-2.
-
(2007)
GROUP '07 Doctoral Consortium Papers
, pp. 1-2
-
-
Razavi, M.N.1
Iverson, L.2
-
357
-
-
80051685255
-
Consumer concerns regarding rfid privacy: An empirical study
-
Razzouk, N. Y., Seitz, V., and Nicolaou, M. 2008. "Consumer Concerns Regarding RFID Privacy: An Empirical Study," Journal of Global Business and Technology (4:1), pp. 69-78.
-
(2008)
Journal of Global Business and Technology
, vol.4
, Issue.1
, pp. 69-78
-
-
Razzouk, N.Y.1
Seitz, V.2
Nicolaou, M.3
-
358
-
-
0002265410
-
The platform for privacy preferences
-
Reagle, J., and Cranor, L. F. 1999. "The Platform for Privacy Preferences," Communications of the ACM (42:2), pp. 48-51.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-51
-
-
Reagle, J.1
Cranor, L.F.2
-
359
-
-
70449494655
-
Using object-oriented concepts to develop a high-level information privacy risk management model
-
Athens, Greece, June 14-19
-
Reddy, K., and Venter, H. S. 2009. "Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model," in Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies, Athens, Greece, June 14-19, pp. 23-30.
-
(2009)
Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies
, pp. 23-30
-
-
Reddy, K.1
Venter, H.S.2
-
360
-
-
67650080222
-
Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy
-
L. Korba, S. Marsh, and R. Safavi-Naini (eds.), Fredericton, New Brunswick, Canada, October 1-3
-
Reddy, K., Venter, H. S., Olivier, M., and Currie, I. 2008. "Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy," in Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, L. Korba, S. Marsh, and R. Safavi-Naini (eds.), Fredericton, New Brunswick, Canada, October 1-3, pp. 56-64.
-
(2008)
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust
, pp. 56-64
-
-
Reddy, K.1
Venter, H.S.2
Olivier, M.3
Currie, I.4
-
361
-
-
78549275007
-
Federal security breach notifications: Politics and approaches
-
Regan, P. 2009. "Federal Security Breach Notifications: Politics and Approaches," Berkeley Technology Law Journal (24:3), pp. 1103-1132.
-
(2009)
Berkeley Technology Law Journal
, vol.24
, Issue.3
, pp. 1103-1132
-
-
Regan, P.1
-
362
-
-
81355166330
-
Information security: Risks and solutions
-
Reid, L. A. 2006a. "Information Security: Risks and Solutions," Journal of Information Privacy & Security (2:1), pp. 1-2.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.1
, pp. 1-2
-
-
Reid, L.A.1
-
364
-
-
81355125959
-
Expert opinion: Amanda M. Hubbard, J. D. Fulbright scholar former trial attorney, computer crime and intellectual property section
-
U.S. Department of Justice
-
Reid, L. A. 2006b. "Expert Opinion: Amanda M. Hubbard, J. D. Fulbright Scholar Former Trial Attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice," Journal of Information Privacy & Security (2:1), pp. 47-56.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.1
, pp. 47-56
-
-
Reid, L.A.1
-
365
-
-
0344515598
-
Perceptions of Customer Service, Information Privacy, and Product Quality from Semiotic Design Features in an Online Web Store
-
Resnick, M. L., and Montania, R. 2003. "Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features
-
(2003)
International Journal of Human-Computer Interaction
, vol.16
, Issue.2
, pp. 211-234
-
-
Resnick, M.L.1
Montania, R.2
-
367
-
-
0002779304
-
Privacy, information technology, and health care
-
Rindfleisch, T. C. 1997. "Privacy, Information Technology, and Health Care," Communications of the ACM (40:8), pp. 92-100.
-
(1997)
Communications of the ACM
, vol.40
, Issue.8
, pp. 92-100
-
-
Rindfleisch, T.C.1
-
368
-
-
0035498784
-
Seeking explanation in theory: Reflections on the social practices of organizations that distribute public use microdata files for research purposes
-
DOI 10.1002/asi.1183
-
Robbin, A., and Koball, H. 2001. "Seeking Explanation in Theory: Reflections on the Social Practices of Organizations That Distribute Public Use Microdata Files for Research Purposes," Journal of the American Society for Information Science and Technology (52:13), pp. 1169-1189. (Pubitemid 33028598)
-
(2001)
Journal of the American Society for Information Science and Technology
, vol.52
, Issue.13
, pp. 1169-1189
-
-
Robbin, A.1
Koball, H.2
-
369
-
-
60849129603
-
Security breaches, privacy intrusions, and reporting of computer crimes
-
Roberts, G. K. 2005. "Security Breaches, Privacy Intrusions, and Reporting of Computer Crimes," Journal of Information Privacy & Security (1:4), pp. 22-32.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.4
, pp. 22-32
-
-
Roberts, G.K.1
-
370
-
-
4043101215
-
Just what the doctor ordered. The role of information sensitivity and trust in reducing medical information privacy concern
-
DOI 10.1016/S0148-2963(02)00345-4, PII S0148296302003454
-
Rohm, A. J., and Milne, G. R. 2004. "Just What the Doctor Ordered: The Role of Information Sensitivity and Trust in Reducing Medical Information Privacy Concern," Journal of Business Research (57:9), pp. 1000-1011. (Pubitemid 39072429)
-
(2004)
Journal of Business Research
, vol.57
, Issue.9
, pp. 1000-1011
-
-
Rohm, A.J.1
Milne, G.R.2
-
371
-
-
33644699528
-
An examination of the concern for information privacy in the New Zealand regulatory context
-
DOI 10.1016/j.im.2005.08.002, PII S0378720605000686
-
Rose, E. A. 2006. "An Examination of the Concern for Information Privacy in the New Zealand Regulatory Context," Information & Management (43:3), pp. 322-335. (Pubitemid 43333004)
-
(2006)
Information and Management
, vol.43
, Issue.3
, pp. 322-335
-
-
Rose, E.A.1
-
372
-
-
85006640312
-
Information protection at telecommunications firms: Human resource management strategies and their impact on organizational justice
-
Ross, W., Meyer, C., Chen, J., and Keaton, P. 2009. "Information Protection at Telecommunications Firms: Human Resource Management Strategies and Their Impact on Organizational Justice," Journal of Information Privacy & Security (5:1), pp. 49-77.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.1
, pp. 49-77
-
-
Ross, W.1
Meyer, C.2
Chen, J.3
Keaton, P.4
-
373
-
-
0038083524
-
Transborder data flows: Adoption and diffusion of protective legislation in the global electronic commerce environment
-
Rudraswamy, V., and Vance, D. A. 2001. "Transborder Data Flows: Adoption and Diffusion of Protective Legislation in the Global Electronic Commerce Environment," Logistics Information Management (14:1/2), pp. 127-137.
-
(2001)
Logistics Information Management
, vol.14
, Issue.1-2
, pp. 127-137
-
-
Rudraswamy, V.1
Vance, D.A.2
-
374
-
-
0036020373
-
Online privacy policies: An assessment of the fortune e-50
-
Ryker, R., Lafleur, E., McManis, B., and Cox, K. C. 2002. "Online Privacy Policies: An Assessment of the Fortune e-50," Journal of Computer Information Systems (42:4), pp. 15-20.
-
(2002)
Journal of Computer Information Systems
, vol.42
, Issue.4
, pp. 15-20
-
-
Ryker, R.1
Lafleur, E.2
McManis, B.3
Cox, K.C.4
-
375
-
-
65349181019
-
Consumerism and information privacy: How upton sinclair can again save us from ourselves
-
Sachs, B. 2009. "Consumerism and Information Privacy: How Upton Sinclair Can Again Save Us from Ourselves," Virginia Law Review (95:1), pp. 205-252.
-
(2009)
Virginia Law Review
, vol.95
, Issue.1
, pp. 205-252
-
-
Sachs, B.1
-
376
-
-
84981986836
-
A progress report on information privacy and data security
-
Salton, G. 1980. "A Progress Report on Information Privacy and Data Security," Journal of the American Society for Information Science (31:2), pp. 75-83.
-
(1980)
Journal of the American Society for Information Science
, vol.31
, Issue.2
, pp. 75-83
-
-
Salton, G.1
-
377
-
-
0345792391
-
Privacy as intellectual property?
-
Samuelson, P. 2000. "Privacy as Intellectual Property?," Stanford Law Review (52:5), pp. 1125-1173.
-
(2000)
Stanford Law Review
, vol.52
, Issue.5
, pp. 1125-1173
-
-
Samuelson, P.1
-
378
-
-
81355125967
-
Expert opinion: Critical thinker series: An interview with ian browde director of strategy and business development, enterprise solutions division, nokia, inc
-
Sánchez, C. 2005. "Expert Opinion: Critical Thinker Series: An Interview with Ian Browde Director of Strategy and Business Development, Enterprise Solutions Division, Nokia, Inc," Journal of Information Privacy & Security (1:1), pp. 4-9.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 4-9
-
-
Sánchez, C.1
-
379
-
-
33751188289
-
Privacy, fair information practices and the fortune 500: The virtual reality of compliance
-
Schwaig, K. S., Kane, G. C., and Storey, V. C. 2005. "Privacy, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance," The Data Base for Advances In Information Systems (36:1), pp. 49-63. (Pubitemid 44775666)
-
(2005)
Data Base for Advances in Information Systems
, vol.36
, Issue.1
, pp. 49-63
-
-
Schwaig, K.S.1
Kane, G.C.2
Storey, V.C.3
-
380
-
-
33749622781
-
Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures?
-
DOI 10.1016/j.im.2006.07.003, PII S037872060600070X
-
Schwaig, K. S., Kane, G. C., and Storey, V. C. 2006. "Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?," Information & Management (43:7), pp. 805-820. (Pubitemid 44548297)
-
(2006)
Information and Management
, vol.43
, Issue.7
, pp. 805-820
-
-
Schwaig, K.S.1
Kane, G.C.2
Storey, V.C.3
-
381
-
-
0041052041
-
Free speech vs. Information privacy: Eugene volokh's first amendment jurisprudence
-
Schwartz, P. M. 2000. "Free Speech Vs. Information Privacy: Eugene Volokh's First Amendment Jurisprudence," Stanford Law Review (52:5), pp. 1559-1572.
-
(2000)
Stanford Law Review
, vol.52
, Issue.5
, pp. 1559-1572
-
-
Schwartz, P.M.1
-
382
-
-
0038648204
-
Information technology and the social construction of information privacy
-
DOI 10.1016/S0278-4254(01)00037-0, PII S0278425401000370
-
Shapiro, B., and Baker, C. R. 2001. "Information Technology and the Social Construction of Information Privacy," Journal of Accounting and Public Policy (20:4,5), pp. 295-322. (Pubitemid 33623633)
-
(2001)
Journal of Accounting and Public Policy
, vol.20
, Issue.4-5
, pp. 295-322
-
-
Shapiro, B.1
Baker, C.R.2
-
383
-
-
81355125970
-
Exploring the role of identification in the privacy decisions of webmasters
-
J. I. DeGross, R. Hirschheim, and M. Newman, (eds.), Helsinki, Finland, December 13-16
-
Shaw, T. 1998. "Exploring the Role of Identification in the Privacy Decisions of Webmasters," in Proceedings of the 19th International Conference on Information Systems, J. I. DeGross, R. Hirschheim, and M. Newman, (eds.), Helsinki, Finland, December 13-16, pp. 358-364.
-
(1998)
Proceedings of the 19th International Conference on Information Systems
, pp. 358-364
-
-
Shaw, T.1
-
384
-
-
29144492869
-
In poor health: An assessment of privacy policies at direct-to-consumer web sites
-
DOI 10.1509/jppm.2005.24.2.273
-
Sheehan, K. B. 2005. "In Poor Health: An Assessment of Privacy Policies at Direct-to-Consumer Web Sites," Journal of Public Policy & Marketing (24:2), pp. 273-283. (Pubitemid 41806826)
-
(2005)
Journal of Public Policy and Marketing
, vol.24
, Issue.2
, pp. 273-283
-
-
Sheehan, K.B.1
-
385
-
-
33644526852
-
Managerial issues for expanding into international web-based electronic commerce
-
Sheldon, L. A., and Strader, T. J. 2002. "Managerial Issues for Expanding into International Web-Based Electronic Commerce," S.A.M. Advanced Management Journal 67: 3 22-30.
-
(2002)
S.A.M Advanced Management Journal
, vol.67
, Issue.3
, pp. 22-30
-
-
Sheldon, L.A.1
Strader, T.J.2
-
386
-
-
71049163493
-
A digital rights management model for healthcare
-
London, July 20-22
-
Sheppard, N. P., Safavi-Naini, R., and Jafari, M. 2009. "A Digital Rights Management Model for Healthcare," in Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, London, July 20-22, pp. 106-109.
-
(2009)
Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks
, pp. 106-109
-
-
Sheppard, N.P.1
Safavi-Naini, R.2
Jafari, M.3
-
387
-
-
49049084840
-
Text steganography in sms
-
Y. J. Na (ed.), Los Alamitos, CA: IEEE Computer Society Press
-
Shirali-Shahreza, M., and Shirali-Shahreza, M. H. 2007. "Text Steganography in SMS," in Proceedings of the International Conference on Convergence Information Technology, Y. J. Na (ed.), Los Alamitos, CA: IEEE Computer Society Press, pp. 2260-2265.
-
(2007)
Proceedings of the International Conference on Convergence Information Technology
, pp. 2260-2265
-
-
Shirali-Shahreza, M.1
Shirali-Shahreza, M.H.2
-
388
-
-
77955446739
-
Misuse cases for identifying system dependability threats
-
Sindre, G., and Opdahl, A. 2008. "Misuse Cases for Identifying System Dependability Threats," Journal of Information Privacy & Security (4:2), pp. 3-22.
-
(2008)
Journal of Information Privacy & Security
, vol.4
, Issue.2
, pp. 3-22
-
-
Sindre, G.1
Opdahl, A.2
-
389
-
-
81355166341
-
United states cases of employee e-mail privacy intrusions: Do you really know the legal consequences
-
J. I. DeGross, S. L. Jarvenpaa, and A. Srinivasan (eds.), Cleveland, OH, December 16-18
-
Sipior, J., and Ward, B. 1996. "United States Cases of Employee E-Mail Privacy Intrusions: Do You Really Know the Legal Consequences," in Proceedings of the 17th International Conference on Information Systems, J. I. DeGross, S. L. Jarvenpaa, and A. Srinivasan (eds.), Cleveland, OH, December 16-18, pp. 223-234.
-
(1996)
Proceedings of the 17th International Conference on Information Systems
, pp. 223-234
-
-
Sipior, J.1
Ward, B.2
-
391
-
-
51349093332
-
The tlc-pp framework for delivering a privacy augmented collaborative environment (pace)
-
New York, November 12-15
-
Skinner, G. 2007b. "The TLC-PP Framework for Delivering a Privacy Augmented Collaborative Environment (PACE)," in Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, , New York, November 12-15, pp. 289-293.
-
(2007)
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing
, pp. 289-293
-
-
Skinner, G.1
-
392
-
-
81355125963
-
Security for a privacy augmented collaborative environment with a combined authentication scheme encapsulation
-
Istanbul, Turkey
-
Skinner, G. 2008. "Security for a Privacy Augmented Collaborative Environment with a Combined Authentication Scheme Encapsulation," in Proceedings of the 8th WSEAS International Conference on Applied Computing Conference, Istanbul, Turkey, pp. 145-151.
-
(2008)
Proceedings of the 8th WSEAS International Conference on Applied Computing Conference
, pp. 145-151
-
-
Skinner, G.1
-
393
-
-
34748905388
-
An environmentally adaptive conceptual framework for addressing information privacy issues in digital ecosystems
-
DOI 10.1109/DEST.2007.371988, 4233722, Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007
-
Skinner, G., and Chang, E. 2007. "An Environmentally Adaptive Conceptual Framework for Addressing Information Privacy Issues in Digital Ecosystems," in Proceedings of the Inaugural IEEE-IES International Digital EcoSystems and Technologies Conference, Cairns, Australia, February 21-23, pp. 302-307. (Pubitemid 47468330)
-
(2007)
Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007
, pp. 302-307
-
-
Skinner, G.D.1
Chang, E.2
-
394
-
-
84990978822
-
Defining and protecting meta privacy: A new conceptual framework within information privacy
-
Atlanta, GA, April
-
Skinner, G., Han, S., and Chang, E. 2006a. "Defining and Protecting Meta Privacy: A New Conceptual Framework within Information Privacy," in Proceedings of the 22nd International Conference on Data Engineering Workshops, Atlanta, GA, April 3-8.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering Workshops
, pp. 3-8
-
-
Skinner, G.1
Han, S.2
Chang, E.3
-
395
-
-
51349107985
-
Integration of situational and reward elements for fair privacy principles and preferences (f3p)
-
Mumbai, India, December 15-17
-
Skinner, G., Han, S., and Chang, E. 2006b. "Integration of Situational and Reward Elements for Fair Privacy Principles and Preferences (F3P)," in Proceedings of the IEEE International Conference on Industrial Technology, Mumbai, India, December 15-17, pp. 3078-3082.
-
(2006)
Proceedings of the IEEE International Conference on Industrial Technology
, pp. 3078-3082
-
-
Skinner, G.1
Han, S.2
Chang, E.3
-
397
-
-
0035631803
-
Information privacy and marketing: What the u.s. should (and shouldn't) learn from europe
-
Smith, H. J. 2001. "Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe," California Management Review (43:2), pp. 8-33.
-
(2001)
California Management Review
, vol.43
, Issue.2
, pp. 8-33
-
-
Smith, H.J.1
-
398
-
-
37849054139
-
Information privacy and its management
-
Smith, H. J. 2004. "Information Privacy and Its Management," MIS Quarterly Executive (3:4), pp. 291-313.
-
(2004)
MIS Quarterly Executive
, vol.3
, Issue.4
, pp. 291-313
-
-
Smith, H.J.1
-
399
-
-
81355150537
-
Information privacy research: An interdisciplinary review
-
Smith, H. J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review," MIS Quarterly (35:4), pp. 989-1016.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1016
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
400
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly (20:2), pp. 167-196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
401
-
-
33644925852
-
A taxonomy of privacy
-
Solove, D. J. 2006. "A Taxonomy of Privacy," University of Pennsylvania Law Review (154:3), pp. 477-564. (Pubitemid 43385739)
-
(2006)
University of Pennsylvania Law Review
, vol.154
, Issue.3
, pp. 477-564
-
-
Solove, D.J.1
-
402
-
-
50249151484
-
Internet users' information privacy-protective responses: A taxonomy and a nomological model
-
Son, J. Y., and Kim, S. S. 2008. "Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model," MIS Quarterly (32:3), pp. 503-529.
-
(2008)
MIS Quarterly
, vol.32
, Issue.3
, pp. 503-529
-
-
Son, J.Y.1
Kim, S.S.2
-
403
-
-
51949092268
-
Improving smes business environment using innovative ict technologies
-
Cluj-Napoca, Romania, May 22-25
-
Spiridon, G., and Dichiu, D. 2008. "Improving SMEs Business Environment Using Innovative ICT Technologies," in Proceedings of the IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, May 22-25, pp. 204-206.
-
(2008)
Proceedings of the IEEE International Conference on Automation, Quality and Testing, Robotics
, pp. 204-206
-
-
Spiridon, G.1
Dichiu, D.2
-
404
-
-
0029252642
-
Secure communications in atm networks
-
Stevenson, D., Hillery, N., and Byrd, G. 1995. "Secure Communications in ATM Networks," Communications of the ACM (38:2), pp. 45-52.
-
(1995)
Communications of the ACM
, vol.38
, Issue.2
, pp. 45-52
-
-
Stevenson, D.1
Hillery, N.2
Byrd, G.3
-
405
-
-
0036004583
-
An empirical examination of the concern for information privacy instrument
-
Stewart, K. A., and Segars, A. H. 2002. "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research (13:1), pp. 36-49.
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
406
-
-
81355166336
-
Developing trust in m-commerce: A vendor and certificate authority model
-
Stewart, N., Spencer, J., and Melby, N. 2006. "Developing Trust in M-Commerce: A Vendor and Certificate Authority Model," Journal of Information Privacy & Security (2:2), pp. 51-58.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.2
, pp. 51-58
-
-
Stewart, N.1
Spencer, J.2
Melby, N.3
-
407
-
-
81355166338
-
A holistic perspective on the science of computer forensics
-
Stippich, M. J., and Stippich, C. J. 2005. "A Holistic Perspective on the Science of Computer Forensics," Journal of Information Privacy & Security (1:1), pp. 27-39.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 27-39
-
-
Stippich, M.J.1
Stippich, C.J.2
-
408
-
-
57949113919
-
Conditional privacy using re-encryption
-
Shanghai, China, October 18-20
-
Suriadi, S., Foo, E., and Smith, J. 2008. "Conditional Privacy Using Re-Encryption," IFIP International Conference on Network and Parallel Computing, Shanghai, China, October 18-20, pp. 18-25.
-
(2008)
IFIP International Conference on Network and Parallel Computing
, pp. 18-25
-
-
Suriadi, S.1
Foo, E.2
Smith, J.3
-
409
-
-
70349321099
-
Dimensions of network security planning for web services
-
Swart, R. S., Marshall, B. A., Harris, M. E., Forcht, K. A., and Olsen, D. 2005. "Dimensions of Network Security Planning for Web Services," Journal of Information Privacy & Security (1:1), pp. 49-66.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.1
, pp. 49-66
-
-
Swart, R.S.1
Marshall, B.A.2
Harris, M.E.3
Forcht, K.A.4
Olsen, D.5
-
411
-
-
81355136836
-
Business associates in the national health information network: Implications for medical information privacy
-
Szewczak, E., and Snodgrass, C. 2009. "Business Associates in the National Health Information Network: Implications for Medical Information Privacy," International Journal of E-Business Research (5:2), pp. 48-62.
-
(2009)
International Journal of E-Business Research
, vol.5
, Issue.2
, pp. 48-62
-
-
Szewczak, E.1
Snodgrass, C.2
-
412
-
-
34548130845
-
Association rule discovery of privacy information
-
DOI 10.1109/ITNG.2007.41, 4151710, Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
-
Taghva, K., Bondugula, P., and Gala, D. 2007. "Association Rule Discovery of Privacy Information," in Proceedings of the Fourth International Conference on Information Technology, Las Vegas, NV, April 2-4, pp. 361-365. (Pubitemid 47298483)
-
(2007)
Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
, pp. 361-365
-
-
Taghva, K.1
Bondugula, P.2
Gala, D.3
-
413
-
-
81355136838
-
Expert opinion
-
Tai, A., and Ayyagari, R. 2009. "Expert Opinion," Journal of Information Privacy & Security (5:1), pp. 78-80.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.1
, pp. 78-80
-
-
Tai, A.1
Ayyagari, R.2
-
414
-
-
84928601187
-
What do they want? Motivating consumers to disclose personal information to internet businesses
-
L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
-
Tam, E. C., Hui, K. L., and Tan, B. 2002. "What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses," in 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 11-21.
-
(2002)
23rd International Conference on Information Systems
, pp. 11-21
-
-
Tam, E.C.1
Hui, K.L.2
Tan, B.3
-
415
-
-
77955580458
-
Understanding etrust
-
Tamimi, N., and Sebastianelli, R. 2007. "Understanding eTrust," Journal of Information Privacy & Security (3:2), pp. 3-17.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.2
, pp. 3-17
-
-
Tamimi, N.1
Sebastianelli, R.2
-
416
-
-
84869032579
-
Information voyeurism: Social impact of physically large displays on information privacy
-
Ft. Lauderdale, FL, April 5-10
-
Tan, D. S., and Czerwinski, M. 2003. "Information Voyeurism: Social Impact of Physically Large Displays on Information Privacy," in Proceedings of the CHI '03 Extended Abstracts on Human Factors in Computing Systems, Ft. Lauderdale, FL, April 5-10, pp. 748-749.
-
(2003)
Proceedings of the CHI '03 Extended Abstracts on Human Factors in Computing Systems
, pp. 748-749
-
-
Tan, D.S.1
Czerwinski, M.2
-
417
-
-
81355155281
-
Explorative assessment of internet hacking: An agent-based modeling approach
-
Tang, Z., Bagchi, K., and Jain, A. 2009. "Explorative Assessment of Internet Hacking: An Agent-Based Modeling Approach," Journal of Information Privacy & Security (5:2), pp. 42-64.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.2
, pp. 42-64
-
-
Tang, Z.1
Bagchi, K.2
Jain, A.3
-
418
-
-
0033877785
-
Managing the costs of informational privacy: Bundling as a strategy in the individual health insurance market
-
Los Alamitos, CA: IEEE Computer Society Press
-
Thatcher, M. E., and Clemons, E. K. 2000. "Managing the Costs of Informational Privacy: Bundling as a Strategy in the Individual Health Insurance Market," in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
-
(2000)
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences
-
-
Thatcher, M.E.1
Clemons, E.K.2
-
419
-
-
34547663047
-
RFID, privacy and the perception of risk: A strategic framework
-
DOI 10.1016/j.jsis.2007.05.006, PII S0963868707000248, Security and Privacy
-
Thiesse, F. 2007. "RFID, Privacy and the Perception of Risk: A Strategic Framework," The Journal of Strategic Information Systems (16:2), pp. 214-232. (Pubitemid 47223695)
-
(2007)
Journal of Strategic Information Systems
, vol.16
, Issue.2
, pp. 214-232
-
-
Thiesse, F.1
-
420
-
-
84870963839
-
Users' perceptions of benefits and costs of personalization
-
Montreal, Quebec, Canada, December
-
Treiblmaier, H., and Pollach, I. 2007. "Users' Perceptions of Benefits and Costs of Personalization," in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
-
(2007)
Proceedings of the 28th International Conference on Information Systems
, pp. 9-12
-
-
Treiblmaier, H.1
Pollach, I.2
-
421
-
-
70049110855
-
The effect of online privacy information on purchasing behavior: An experimental study
-
Pittsburgh, PA, June
-
Tsai, J., Egelman, S., Cranor, L., and Acquisti, A. 2007. "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study," in Proceedings of the 6th Workshop on the Economics of Information Security, Pittsburgh, PA, June 7-8.
-
(2007)
Proceedings of the 6th Workshop on the Economics of Information Security
, pp. 7-8
-
-
Tsai, J.1
Egelman, S.2
Cranor, L.3
Acquisti, A.4
-
422
-
-
71849106921
-
Examining customer privacy concerns in dealings with financial institutions
-
Tsarenko, Y., and Tojib, D. R. 2009. "Examining Customer Privacy Concerns in Dealings with Financial Institutions," The Journal of Consumer Marketing (26:7), pp. 468-476.
-
(2009)
The Journal of Consumer Marketing
, vol.26
, Issue.7
, pp. 468-476
-
-
Tsarenko, Y.1
Tojib, D.R.2
-
423
-
-
85138707710
-
An empirical investigation of virtual communities and trust
-
V. Storey, S. Sarkar, and J. I. DeGross (eds.), New Orleans, LA, December 16-19
-
Tung, L., Tan, P., Chia, P., Koh, Y., and Yeo, H.-L. 2001. "An empirical Investigation of Virtual Communities and Trust," in Proceedings of the 22nd International Conference on Information Systems, V. Storey, S. Sarkar, and J. I. DeGross (eds.), New Orleans, LA, December 16-19, pp. 307-319.
-
(2001)
Proceedings of the 22nd International Conference on Information Systems
, pp. 307-319
-
-
Tung, L.1
Tan, P.2
Chia, P.3
Koh, Y.4
Yeo, H.-L.5
-
424
-
-
0035780881
-
Privacy and security concerns as major barriers for e-commerce: A survey study
-
DOI 10.1108/EUM0000000005808
-
Udo, G. J. 2001. "Privacy and Security Concerns as Major Barriers for E-Commerce: A Survey Study," Information Management & Computer Security (9:4), pp. 165-174. (Pubitemid 35355405)
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.4
, pp. 165-174
-
-
Udo, G.J.1
-
425
-
-
81355155288
-
Information privacy and internet company insolvencies: When a business fails, does divestiture or bankruptcy better protect the consumer?
-
Usmani, F. Z. 2003. "Information Privacy and Internet Company Insolvencies: When a Business Fails, Does Divestiture or Bankruptcy Better Protect the Consumer?," Fordham Journal of Corporate & Financial Law (8:1), pp. 273-331.
-
(2003)
Fordham Journal of Corporate & Financial Law
, vol.8
, Issue.1
, pp. 273-331
-
-
Usmani, F.Z.1
-
426
-
-
40749111254
-
Concern for information privacy and online consumer purchasing
-
Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. 2006. "Concern for Information Privacy and Online Consumer Purchasing," Journal of the Association for Information Systems (7:6), pp. 415-444.
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.6
, pp. 415-444
-
-
Van Slyke, C.1
Shim, J.T.2
Johnson, R.3
Jiang, J.4
-
427
-
-
8644291627
-
PIDS: A privacy intrusion detection system
-
DOI 10.1108/10662240410566953
-
Venter, H. S., Olivier, M. S., and Eloff, J. H. P. 2004. "PIDS: A Privacy Intrusion Detection System " Internet Research (14:5), pp. 360-365. (Pubitemid 39499379)
-
(2004)
Internet Research
, vol.14
, Issue.5
, pp. 360-365
-
-
Venter, H.S.1
Olivier, M.S.2
Eloff, J.H.P.3
-
428
-
-
0347315060
-
Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
-
Volokh, E. 2000a. "Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You," Stanford Law Review (52:5), pp. 1049-1124.
-
(2000)
Stanford Law Review
, vol.52
, Issue.5
, pp. 1049-1124
-
-
Volokh, E.1
-
429
-
-
0003034904
-
Personalization and privacy
-
Volokh, E. 2000b. "Personalization and Privacy," Communications of the ACM (43:8), pp. 84-88.
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
, pp. 84-88
-
-
Volokh, E.1
-
430
-
-
81355166334
-
Profiling user behavior for intrusion detection using item response modeling
-
Wang, Y., Melby, N., and Kim, I. 2007. "Profiling User Behavior for Intrusion Detection Using Item Response Modeling," Journal of Information Privacy & Security (3:4), pp. 3-17.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.4
, pp. 3-17
-
-
Wang, Y.1
Melby, N.2
Kim, I.3
-
431
-
-
77955101093
-
An xml-based intelligent agent protocol design framework for individualized privacy postures within trusted network environments
-
Warkentin, M., and Johnston, A. C. 2006. "An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments," Journal of Information Privacy & Security (2:1), pp. 16-28.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.1
, pp. 16-28
-
-
Warkentin, M.1
Johnston, A.C.2
-
432
-
-
84986156413
-
Right to privacy? The protection of personal data in UK public organisations
-
Warren, A. 2002. "Right to Privacy? The Protection of Personal Data in UK Public Organisations," New Library World (103:11/12), pp. 446-456. (Pubitemid 36063306)
-
(2002)
New Library World
, vol.103
, Issue.1182-1183
, pp. 446-456
-
-
Warren, A.1
-
433
-
-
81355166337
-
Groundswell: Winning in a world transformed by social technologies
-
Weaver, E. 2010. "Groundswell: Winning in a World Transformed by Social Technologies," Journal of Information Privacy & Security (6:1), pp. 75-78.
-
(2010)
Journal of Information Privacy & Security
, vol.6
, Issue.1
, pp. 75-78
-
-
Weaver, E.1
-
434
-
-
0000041375
-
Desktop videoconferencing: Experiences of complete users, wary users, and non-users
-
Webster, J. 1998. "Desktop Videoconferencing: Experiences of Complete Users, Wary Users, and Non-Users," MIS Quarterly (22:3), pp. 257-286. (Pubitemid 128684568)
-
(1998)
MIS Quarterly: Management Information Systems
, vol.22
, Issue.3
, pp. 257-286
-
-
Webster, J.1
-
435
-
-
81355125960
-
Development of a mobile commerce security analysis method
-
Wei, J., and Ozok, A. 2009. "Development of a Mobile Commerce Security Analysis Method," Journal of Information Privacy & Security (5:1), pp. 28-48.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.1
, pp. 28-48
-
-
Wei, J.1
Ozok, A.2
-
436
-
-
0347315058
-
Hardware-based id, rights management, and trusted systems
-
Weinberg, J. 2000. "Hardware-Based Id, Rights Management, and Trusted Systems," Stanford Law Review (52:5), pp. 1251-1281.
-
(2000)
Stanford Law Review
, vol.52
, Issue.5
, pp. 1251-1281
-
-
Weinberg, J.1
-
437
-
-
67349125489
-
Privacy threat model for data portability in social network applications
-
Weiss, S. 2009. "Privacy Threat Model for Data Portability in Social Network Applications," International Journal of Information Management (29:4), pp. 249-254.
-
(2009)
International Journal of Information Management
, vol.29
, Issue.4
, pp. 249-254
-
-
Weiss, S.1
-
438
-
-
81355155289
-
The story of us: Resolving the face-off between autobiographical speech and information privacy
-
West, S. 2010. "The Story of Us: Resolving the Face-Off between Autobiographical Speech and Information Privacy," Washington and Lee Law Review (67:2), pp. 589-650.
-
(2010)
Washington and Lee Law Review
, vol.67
, Issue.2
, pp. 589-650
-
-
West, S.1
-
439
-
-
81355155285
-
Looking for love in all the wrong places: A security case study on online identity theft
-
White, D., and Rea, A. 2007. "Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft," Journal of Information Privacy & Security (3:3), pp. 3-27.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.3
, pp. 3-27
-
-
White, D.1
Rea, A.2
-
440
-
-
23044531831
-
Electronic commerce law: 2001 developments
-
Winn, J. K. 2001. "Electronic Commerce Law: 2001 Developments," The Business Lawyer (57:1), pp. 541-586.
-
(2001)
The Business Lawyer
, vol.57
, Issue.1
, pp. 541-586
-
-
Winn, J.K.1
-
441
-
-
65449130175
-
E-government-A webservices framework
-
Wong, K. F., Tam, M. K. W., and Cheng, C. H. 2006. "E-Government-A Webservices Framework," Journal of Information Privacy & Security (2:2), pp. 30-50.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.2
, pp. 30-50
-
-
Wong, K.F.1
Tam, M.K.W.2
Cheng, C.H.3
-
442
-
-
0001375953
-
A survey of employee perceptions of information privacy in organizations
-
Woodman, R. W., Ganster, D. C., Adams, J., McCuddy, M. K., Tolchinsky, P. D. and Fromkin, H. 1982. "A Survey of Employee Perceptions of Information Privacy in Organizations," Academy of Management Journal (25:3), pp. 647-663.
-
(1982)
Academy of Management Journal
, vol.25
, Issue.3
, pp. 647-663
-
-
Woodman, R.W.1
Ganster, D.C.2
Adams, J.3
McCuddy, M.K.4
Tolchinsky, P.D.5
Fromkin, H.6
-
443
-
-
57849151558
-
A novel authentication protocol for sensitive information privacy protection using dynamic key based group key management
-
Daejeon, Korea, August 28-30
-
Wu, X., Ngo, H. H., Le, P. D., and Srinivasan, B. 2008. "A Novel Authentication Protocol for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management," in Proceedings of the Third International Conference on Convergence and Hybrid Information Technology-Volume 02, Daejeon, Korea, August 28-30, pp. 1113-1119.
-
(2008)
Proceedings of the Third International Conference on Convergence and Hybrid Information Technology
, vol.2
, pp. 1113-1119
-
-
Wu, X.1
Ngo, H.H.2
Le, P.D.3
Srinivasan, B.4
-
444
-
-
84870962433
-
Influence of social context and affect on individuals' implementation of information security safeguards
-
Phoenix, AZ, December
-
Wu, Y. A., Ryan, S., and Windsor, J. 2009. "Influence of Social Context and Affect on Individuals' Implementation of Information Security Safeguards," in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
-
(2009)
Proceedings of the 30th International Conference on Information Systems
, pp. 15-18
-
-
Wu, Y.A.1
Ryan, S.2
Windsor, J.3
-
445
-
-
34247513977
-
Application of fuzzy logic in federated trust management for pervasive computing
-
Chicago, September 18-21
-
Wu, Z., and Weaver, A. C. 2006. "Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing," in Proceedings of the 30th Annual International Computer Software and Applications Conference, Chicago, September 18-21, pp. 215-222.
-
(2006)
Proceedings of the 30th Annual International Computer Software and Applications Conference
, pp. 215-222
-
-
Wu, Z.1
Weaver, A.C.2
-
446
-
-
79953141623
-
A cross-cultural analysis of privacy notices of the global 2000
-
Xiaoni, Z., Toru, S., and Max, K. 2007. "A Cross-Cultural Analysis of Privacy Notices of the Global 2000," Journal of Information Privacy & Security (3:2), pp. 18-36.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.2
, pp. 18-36
-
-
Xiaoni, Z.1
Toru, S.2
Max, K.3
-
447
-
-
84870960533
-
The effects of self-construal and perceived control on privacy concerns
-
Montreal, Quebec, Canada, December
-
Xu, H. 2007. "The Effects of Self-Construal and Perceived Control on Privacy Concerns," in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
-
(2007)
Proceedings of the 28th International Conference on Information Systems
, pp. 9-12
-
-
Xu, H.1
-
448
-
-
73749086272
-
Consumer responses to the introduction of privacy protection measures: An exploratory research framework
-
Xu, H. 2009. "Consumer Responses to the Introduction of Privacy Protection Measures: An Exploratory Research Framework," International Journal of E-Business Research (5:2), pp. 21-47.
-
(2009)
International Journal of E-Business Research
, vol.5
, Issue.2
, pp. 21-47
-
-
Xu, H.1
-
449
-
-
80053127414
-
Locus of control and location privacy: An empirical study in singapore
-
Xu, H. 2010. "Locus of Control and Location Privacy: An Empirical Study in Singapore," Journal of Global Information Technology Management (13:3), pp. 63-87.
-
(2010)
Journal of Global Information Technology Management
, vol.13
, Issue.3
, pp. 63-87
-
-
Xu, H.1
-
450
-
-
84870972411
-
Examining the formation of individual's privacy concerns: Toward an integrative view
-
paper 6
-
Xu, H., Dinev, T., Smith, H. J., and Hart, P. 2008a. "Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View," ICIS 2008 Proceedings, paper 6. http://aisel.aisnet.org/icis2008/6.
-
(2008)
ICIS 2008 Proceedings
-
-
Xu, H.1
Dinev, T.2
Smith, H.J.3
Hart, P.4
-
451
-
-
77951860033
-
The effects of privacy concerns and personal innovativeness on potential and experienced customers' adoption of location-based services
-
Xu, H., and Gupta, S. 2009. "The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers' Adoption of Location-Based Services," Electronic Markets-The International Journal on Networked Business (19:2), pp. 137-140.
-
(2009)
Electronic Markets-The International Journal on Networked Business
, vol.19
, Issue.2
, pp. 137-140
-
-
Xu, H.1
Gupta, S.2
-
452
-
-
84870964591
-
Alleviating parental concerns for children's online privacy: A value sensitive design investigation
-
Paris, France, December
-
Xu, H., Irani, N., Zhu, S., and Xu, W. 2008b. "Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation," in Proceedings of the 29th International Conference on Information Systems, Paris, France, December 14-17.
-
(2008)
Proceedings of the 29th International Conference on Information Systems
, pp. 14-17
-
-
Xu, H.1
Irani, N.2
Zhu, S.3
Xu, W.4
-
453
-
-
85138703933
-
Alleviating consumers' privacy concerns in location-based services: A psychological control perspective
-
R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15
-
Xu, H., and Teo, H. H. 2004. "Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective," in Proceedings of the 25th International Conference on Information Systems, R. Agarwal, L. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 12-15, pp. 793-806.
-
(2004)
Proceedings of the 25th International Conference on Information Systems
, pp. 793-806
-
-
Xu, H.1
Teo, H.H.2
-
454
-
-
84869807425
-
Predicting the adoption of location-based services: The role of trust and perceived privacy risk
-
D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14
-
Xu, H., Teo, H.-H., and Tan, B. 2005. "Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk," in Proceedings of the 26th International Conference on Information Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, pp. 897-910.
-
(2005)
Proceedings of the 26th International Conference on Information Systems
, pp. 897-910
-
-
Xu, H.1
Teo, H.-H.2
Tan, B.3
-
455
-
-
77749333391
-
The role of push-pull technology in privacy calculus: The case of location-based services
-
Xu, H., Teo, H. H., Tan, B. C. Y., and Agarwal, R. 2010. "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services," Journal of Management Information Systems (26:3), pp. 137-176.
-
(2010)
Journal of Management Information Systems
, vol.26
, Issue.3
, pp. 137-176
-
-
Xu, H.1
Teo, H.H.2
Tan, B.C.Y.3
Agarwal, R.4
-
456
-
-
85109569787
-
Consumer trust and online information privacy
-
S. T. March, A. Massey, and J. I. DeGross (eds.), Seattle, WA, December 14-17
-
Xu, Y., Tan, B., and Hui, K.-L. 2003. "Consumer Trust and Online Information Privacy," in Proceedings of the 24th International Conference on Information Systems, S. T. March, A. Massey, and J. I. DeGross (eds.), Seattle, WA, December 14-17, pp. 538-548.
-
(2003)
Proceedings of the 24th International Conference on Information Systems
, pp. 538-548
-
-
Xu, Y.1
Tan, B.2
Hui, K.-L.3
-
457
-
-
51849154713
-
Information sharing and privacy protection of terrorist or criminal social networks
-
Taipei, Taiwan, June 17-20
-
Yang, C. C. 2008. "Information Sharing and Privacy Protection of Terrorist or Criminal Social Networks," in Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Taipei, Taiwan, June 17-20, pp. 40-45.
-
(2008)
Proceedings of the IEEE International Conference on Intelligence and Security Informatics
, pp. 40-45
-
-
Yang, C.C.1
-
458
-
-
34147192155
-
Privacy disclosures of web sites in taiwan
-
Yang, H. L., and Chiu, H. K. 2002. "Privacy Disclosures of Web Sites in Taiwan," Journal of Information Technology Theory and Application (4:3), pp. 15-42.
-
(2002)
Journal of Information Technology Theory and Application
, vol.4
, Issue.3
, pp. 15-42
-
-
Yang, H.L.1
Chiu, H.K.2
-
459
-
-
58049111121
-
Concern for information privacy and intention to transact online
-
Dalian, China, October 12-14
-
Yang, H. L., and Miao, X. M. 2008. "Concern for Information Privacy and Intention to Transact Online " in Proceedings of the Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October 12-14, pp. 1-4.
-
(2008)
Proceedings of the Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1-4
-
-
Yang, H.L.1
Miao, X.M.2
-
460
-
-
70349160412
-
Authentication protocol in mobile rfid network
-
Gosier, Guadeloupe, France, March 1-6
-
Yang, M. H., and Luo, J.-N. 2009. "Authentication Protocol in Mobile RFID Network," in Proceedings of the 4th International Conference on Systems, Gosier, Guadeloupe, France, March 1-6, pp. 108-113.
-
(2009)
Proceedings of the 4th International Conference on Systems
, pp. 108-113
-
-
Yang, M.H.1
Luo, J.-N.2
-
461
-
-
70349368917
-
Electronic voting system characteristics and voter participation intention
-
L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18
-
Yao, Y., and Houston, A. 2002. "Electronic Voting System Characteristics and Voter Participation Intention," in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. D. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, December 15-18, pp. 717-722.
-
(2002)
Proceedings of the 23rd International Conference on Information Systems
, pp. 717-722
-
-
Yao, Y.1
Houston, A.2
-
462
-
-
81355125961
-
Book review: I. T. Wars managing the business-technology weave in the new millennium
-
Yin, R. 2006. "Book Review: I. T. Wars Managing the Business-Technology Weave in the New Millennium," Journal of Information Privacy & Security (2:4), pp. 63-64.
-
(2006)
Journal of Information Privacy & Security
, vol.2
, Issue.4
, pp. 63-64
-
-
Yin, R.1
-
463
-
-
81355155283
-
Growth perspective of information security
-
Young, R. 2009. "Growth Perspective of Information Security," Journal of Information Privacy & Security (5:4), pp. 51-68.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.4
, pp. 51-68
-
-
Young, R.1
-
464
-
-
81355155276
-
Illegal computer hacking: An assessment of factors that encourage and deter the behavior
-
Young, R., and Zhang, L. 2007. "Illegal Computer Hacking: An Assessment of Factors That Encourage and Deter the Behavior," Journal of Information Privacy & Security (3:4), pp. 33-52.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.4
, pp. 33-52
-
-
Young, R.1
Zhang, L.2
-
465
-
-
81355136831
-
Is your email box safe?
-
Zhang, F., and Dayarathn, R. 2010. "Is Your Email Box Safe?," Journal of Information Privacy & Security (6:1), pp. 28-52.
-
(2010)
Journal of Information Privacy & Security
, vol.6
, Issue.1
, pp. 28-52
-
-
Zhang, F.1
Dayarathn, R.2
-
466
-
-
79953141623
-
A cross-cultural analysis of privacy notices of the global 2000
-
Zhang, X., Sakaguchi, T., and Kennedy, M. 2007. "A Cross-Cultural Analysis of Privacy Notices of the Global 2000," Journal of Information Privacy & Security (3:2), pp. 18-36.
-
(2007)
Journal of Information Privacy & Security
, vol.3
, Issue.2
, pp. 18-36
-
-
Zhang, X.1
Sakaguchi, T.2
Kennedy, M.3
-
467
-
-
81355166331
-
A framework of using captive insurance to streamline it control and compliance management
-
Zhao, X., and Xue, L. 2009. "A Framework of Using Captive Insurance to Streamline It Control and Compliance Management," Journal of Information Privacy & Security (5:3), pp. 27-43.
-
(2009)
Journal of Information Privacy & Security
, vol.5
, Issue.3
, pp. 27-43
-
-
Zhao, X.1
Xue, L.2
-
468
-
-
84870965920
-
Identity disclosure protection: A data reconstruction approach for preserving privacy in data mining
-
Montreal, Quebec, Canada, December
-
Zhu, D., Li, X.-B., and Wu, S. 2007. "Identity Disclosure Protection: A Data Reconstruction Approach for Preserving Privacy in Data Mining," in Proceedings of the 28th International Conference on Information Systems, Montreal, Quebec, Canada, December 9-12.
-
(2007)
Proceedings of the 28th International Conference on Information Systems
, pp. 9-12
-
-
Zhu, D.1
Li, X.-B.2
Wu, S.3
-
470
-
-
70149086230
-
Users' perceptions on privacy and their intention to transact online: A study on greek internet users
-
Zorotheos, A., and Kafeza, E. 2009. "Users' Perceptions on Privacy and Their Intention to Transact Online: A Study on Greek Internet Users," Direct Marketing (3:2), pp. 139-153.
-
(2009)
Direct Marketing
, vol.3
, Issue.2
, pp. 139-153
-
-
Zorotheos, A.1
Kafeza, E.2
-
471
-
-
41149084965
-
Examining the influence of demographic factors on internet users' information privacy concerns
-
DOI 10.1145/1292491.1292514, Proceedings of SAICSIT 2007: Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
-
Zukowski, T., and Brown, I. 2007. "Examining the Influence of Demographic Factors on Internet Users' Information Privacy Concerns," in Proceedings of the 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, Port Elizabeth, South Africa, pp. 197-204. (Pubitemid 351429329)
-
(2007)
ACM International Conference Proceeding Series
, vol.226
, pp. 197-204
-
-
Zukowski, T.1
Brown, I.2
-
472
-
-
35548931529
-
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
-
DOI 10.1007/s10796-007-9057-0
-
Zuo, Y., and O'Keefe, T. 2007. "Post-Release Information Privacy Protection: A Framework and Next-Generation Privacy-Enhanced Operating System," Information Systems Frontiers (9:5), pp. 451-467. (Pubitemid 350007342)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 451-467
-
-
Zuo, Y.1
O'keefe, T.2
|