-
1
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
Denver, CO, Nov.
-
M. Ackerman, L. Cranor, and J. Reagle. Privacy in e-commerce: Examining user scenarios and privacy preferences. In Proceedings of the ACM Conference on Electronic Commerce (EC), pages 1-8, Denver, CO, Nov. 1999.
-
(1999)
Proceedings of the ACM Conference on Electronic Commerce (EC)
, pp. 1-8
-
-
Ackerman, M.1
Cranor, L.2
Reagle, J.3
-
2
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Jan.-Feb.
-
A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1):26-33, Jan.-Feb. 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
80955180170
-
Do interruptions pay off? Effects of interruptive ads on consumers' willingness to pay
-
Nov.
-
A. Acquisti and S. Spiekermann. Do interruptions pay off? Effects of interruptive ads on consumers' willingness to pay. Journal of Interactive Marketing, 25(4):226-240, Nov. 2011.
-
(2011)
Journal of Interactive Marketing
, vol.25
, Issue.4
, pp. 226-240
-
-
Acquisti, A.1
Spiekermann, S.2
-
4
-
-
0043232732
-
Users are not the enemy
-
A. Adams and A. Sasse. Users are not the enemy. Communications of the ACM, 42(12):41-46, Dec. 1999. (Pubitemid 129568045)
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
6
-
-
11144344147
-
Meta-analyses of the effectiveness of warning labels
-
Fall
-
J. Argo and K. Main. Meta-analyses of the effectiveness of warning labels. Journal of Public Policy & Marketing, 23(2):193-208, Fall 2004.
-
(2004)
Journal of Public Policy & Marketing
, vol.23
, Issue.2
, pp. 193-208
-
-
Argo, J.1
Main, K.2
-
7
-
-
0000699305
-
Efficient regulation of consumer information
-
Dec.
-
H. Beales, R. Craswell, and S. Salop. Efficient regulation of consumer information. Journal of Law & Economics, 24(3):491-539, Dec. 1981.
-
(1981)
Journal of Law & Economics
, vol.24
, Issue.3
, pp. 491-539
-
-
Beales, H.1
Craswell, R.2
Salop, S.3
-
8
-
-
77950564668
-
The compliance budget: Managing security behaviour in organisations
-
A. Beautement, A. Sasse, and M. Wonham. The compliance budget: Managing security behaviour in organisations. In Proceedings of the New Security Paradigms Workshop (NSPW), Lake Tahoe, CA, Sept. 2008.
-
Proceedings of the New Security Paradigms Workshop (NSPW), Lake Tahoe, CA, Sept. 2008
-
-
Beautement, A.1
Sasse, A.2
Wonham, M.3
-
9
-
-
33645321640
-
One-sided contracts in competitive consumer markets
-
L. Bebchuk and R. Posner. One-sided contracts in competitive consumer markets. Michigan Law Review, 104(5):827-835, Mar. 2006. (Pubitemid 43474653)
-
(2006)
Michigan Law Review
, vol.104
, Issue.5
, pp. 827-835
-
-
Bebchuk, L.A.1
Posner, R.A.2
-
10
-
-
84855707459
-
The impact of social navigation on privacy policy configuration
-
page article 7, Redmond, WA, July
-
A. Besmer, J. Watson, and H. R. Lipford. The impact of social navigation on privacy policy configuration. In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), page article 7, Redmond, WA, July 2010.
-
(2010)
Proceedings of the Symposium On Usable Privacy and Security (SOUPS)
-
-
Besmer, A.1
Watson, J.2
Lipford, H.R.3
-
15
-
-
15944363496
-
Readability of notice of privacy forms used by major health care institutions [5]
-
DOI 10.1001/jama.293.13.1593
-
P. Breese and W. Burman. Readability of notice of privacy forms used by major health care institutions. Journal of the American Medical Association, 293(13):1593-1594, Apr. 2005. (Pubitemid 40476159)
-
(2005)
Journal of the American Medical Association
, vol.293
, Issue.13
, pp. 1593-1594
-
-
Breese, P.1
Burman, W.2
-
17
-
-
0242678541
-
Computing productivity: Firm-level evidence
-
DOI 10.1162/003465303772815736
-
E. Brynjolfsson and L. Hitt. Computing productivity: Firm-level evidence. The Review of Economics and Statistics, 85(4):793-808, Nov. 2003. (Pubitemid 37417018)
-
(2003)
Review of Economics and Statistics
, vol.85
, Issue.4
, pp. 793-808
-
-
Brynjolfsson, E.1
Hitt, L.M.2
-
20
-
-
33846047871
-
Unrealistic optimism in internet events
-
DOI 10.1016/j.chb.2004.12.005, PII S0747563204002237, Including the Special Issue: Avoiding Simplicity, Confronting Complexity: Advances in Designing Powerful Electronic Learning Environments
-
J. Campbell, N. Greenauer, K. Macaluso, and C. End. Unrealistic optimism in internet events. Computers in Human Behavior, 23(3):1273-1284, May 2007. (Pubitemid 46073576)
-
(2007)
Computers in Human Behavior
, vol.23
, Issue.3
, pp. 1273-1284
-
-
Campbell, J.1
Greenauer, N.2
Macaluso, K.3
End, C.4
-
22
-
-
84855715127
-
Contractual assent and enforceability in cyberspace
-
Fall
-
R. Casamiquela. Contractual assent and enforceability in cyberspace. Berkeley Technology Law Journal, 17(1):475-495, Fall 2002.
-
(2002)
Berkeley Technology Law Journal
, vol.17
, Issue.1
, pp. 475-495
-
-
Casamiquela, R.1
-
23
-
-
84855674241
-
-
Center for Information Policy Leadership at Hunton & Williams. February
-
Center for Information Policy Leadership at Hunton & Williams. HIPAA privacy notice highlights template, February 2003. http://www.hunton.com/files/ tbl-s10News\%5CFileUpload44\%5C10102\%5CHIPAA-Template.pdf.
-
(2003)
HIPAA Privacy Notice Highlights Template
-
-
-
24
-
-
85047681068
-
Heuristic versus systematic information processing and the use of source versus message cues in persuasion
-
Nov.
-
S. Chaiken. Heuristic versus systematic information processing and the use of source versus message cues in persuasion. Journal of Personality and Social Psychology, 39(5):752-766, Nov. 1980.
-
(1980)
Journal of Personality and Social Psychology
, vol.39
, Issue.5
, pp. 752-766
-
-
Chaiken, S.1
-
26
-
-
85057287090
-
It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice
-
N. Christin, S. Egelman, T. Vidas, and J. Grossklags. It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice. In Proceedings of the Fifteenth International Conference on Financial Cryptography and Data Security (FC'11), Rodney Bay, St. Lucia, Feb.-Mar. 2011.
-
Proceedings of the Fifteenth International Conference on Financial Cryptography and Data Security (FC'11), Rodney Bay, St. Lucia, Feb.-Mar. 2011
-
-
Christin, N.1
Egelman, S.2
Vidas, T.3
Grossklags, J.4
-
27
-
-
77957089545
-
A focus theory of normative conduct: A theoretical refinement and reevaluation of the role of norms in human behavior
-
R. Cialdini, C. Kallgren, and R. Reno. A focus theory of normative conduct: A theoretical refinement and reevaluation of the role of norms in human behavior. Advances in Experimental Social Psychology, 24:201-234, 1991.
-
(1991)
Advances in Experimental Social Psychology
, vol.24
, pp. 201-234
-
-
Cialdini, R.1
Kallgren, C.2
Reno, R.3
-
28
-
-
79955555647
-
Deficit in switching between functional brain networks underlies the impact of multitasking on working memory in older adults
-
Apr.
-
W. Clapp, M. Rubens, J. Sabharwal, and A. Gazzaley. Deficit in switching between functional brain networks underlies the impact of multitasking on working memory in older adults. Proceedings of the National Academy of Sciences, 108(17):7212-7217, Apr. 2011.
-
(2011)
Proceedings of the National Academy of Sciences
, vol.108
, Issue.17
, pp. 7212-7217
-
-
Clapp, W.1
Rubens, M.2
Sabharwal, J.3
Gazzaley, A.4
-
29
-
-
0035480037
-
Identity management and its support of multilateral security
-
Oct.
-
S. Clauß and M. Köhntopp. Identity management and its support of multilateral security. Computer Networks, 37(2):204-219, Oct. 2001.
-
(2001)
Computer Networks
, vol.37
, Issue.2
, pp. 204-219
-
-
Clauß, S.1
Köhntopp, M.2
-
31
-
-
3042822164
-
P3P: Making privacy policies more useful
-
Nov.-Dec.
-
L. F. Cranor. P3P : Making privacy policies more useful. IEEE Security & Privacy, 1(6):50-55, Nov.-Dec. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 50-55
-
-
Cranor, L.F.1
-
33
-
-
33745816410
-
Why phishing works
-
Montreal, Canada, Apr.
-
R. Dhamija, J. Tygar, and M. Hearst. Why phishing works. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'06), pages 581-590, Montreal, Canada, Apr. 2006.
-
(2006)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'06)
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.2
Hearst, M.3
-
35
-
-
77951760266
-
Efficiency, trust, and visual appeal: Usability testing through eye tracking
-
S. Djamasbi, M. Siegel, T. Tullis, and R. Dai. Efficiency, trust, and visual appeal: Usability testing through eye tracking. In Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), Kauai, HI, Jan. 2010.
-
Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), Kauai, HI, Jan. 2010
-
-
Djamasbi, S.1
Siegel, M.2
Tullis, T.3
Dai, R.4
-
36
-
-
79951954228
-
Adverse selection in online "trust" certifications and search results
-
Jan.-Feb.
-
B. Edelman. Adverse selection in online "trust" certifications and search results. Electronic Commerce Research and Applications, 10(1):17-25, Jan.-Feb. 2011.
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.1
, pp. 17-25
-
-
Edelman, B.1
-
37
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
Florence, Italy, Apr.
-
S. Egelman, L. Cranor, and J. Hong. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'08), pages 1065-1074, Florence, Italy, Apr. 2008.
-
(2008)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'08)
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.2
Hong, J.3
-
38
-
-
84892467344
-
Timing is everything? The effects of timing and placement of online privacy indicators
-
Boston, MA, Apr.
-
S. Egelman, J. Tsai, L. Cranor, and A. Acquisti. Timing is everything? The effects of timing and placement of online privacy indicators. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'09), pages 319-328, Boston, MA, Apr. 2009.
-
(2009)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'09)
, pp. 319-328
-
-
Egelman, S.1
Tsai, J.2
Cranor, L.3
Acquisti, A.4
-
39
-
-
84934349827
-
Können Befragte lügen? Zum Konzept des "wahren Wertes" im Rahmen der handlungstheoretischen Erklärung von Situationseinflüssen bei der Befragung
-
H. Esser. Können Befragte lügen? Zum Konzept des "wahren Wertes" im Rahmen der handlungstheoretischen Erklärung von Situationseinflüssen bei der Befragung. Kölner Zeitschrift für Soziologie und Sozialpsychologie, 38:314-336, 1986.
-
(1986)
Kölner Zeitschrift für Soziologie und Sozialpsychologie
, vol.38
, pp. 314-336
-
-
Esser, H.1
-
40
-
-
33847082205
-
Attention economies
-
Mar.
-
J. Falkinger. Attention economies. Journal of Economic Theory, 133(1):266-294, Mar. 2007.
-
(2007)
Journal of Economic Theory
, vol.133
, Issue.1
, pp. 266-294
-
-
Falkinger, J.1
-
43
-
-
84948688880
-
Informed consent in the Mozilla browser: Implementing value sensitive design
-
B. Friedman, D. Howe, and E. Felten. Informed consent in the Mozilla browser: Implementing value sensitive design. In Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS), Big Island, HI, Jan. 2002.
-
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS), Big Island, HI, Jan. 2002
-
-
Friedman, B.1
Howe, D.2
Felten, E.3
-
44
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
R. Dingledine and P. Golle, editors, Financial Cryptography, Berlin Heidelberg, Springer
-
N. Fultz and J. Grossklags. Blue versus red: Towards a model of distributed security attacks. In R. Dingledine and P. Golle, editors, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 167-183, Berlin Heidelberg, 2009. Springer.
-
(2009)
Lecture Notes in Computer Science
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
45
-
-
34447503284
-
Assessing the security perceptions of personal Internet users
-
DOI 10.1016/j.cose.2007.03.001, PII S0167404807000363
-
S. Furnell, P. Bryant, and A. Phippen. Assessing the security perceptions of personal Internet users. Computers & Security, 26(5):410-417, Aug. 2007. (Pubitemid 47079135)
-
(2007)
Computers and Security
, vol.26
, Issue.5
, pp. 410-417
-
-
Furnell, S.M.1
Bryant, P.2
Phippen, A.D.3
-
46
-
-
77953767524
-
Stopping spyware at the gate: A user study of privacy, notice and spyware
-
Pittsburgh, PA, July
-
N. Good, R. Dhamija, J. Grossklags, S. Aronovitz, D. Thaw, D. Mulligan, and J. Konstan. Stopping spyware at the gate: A user study of privacy, notice and spyware. In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), pages 43-52, Pittsburgh, PA, July 2005.
-
(2005)
Proceedings of the Symposium On Usable Privacy and Security (SOUPS)
, pp. 43-52
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Aronovitz, S.4
Thaw, D.5
Mulligan, D.6
Konstan, J.7
-
47
-
-
35348905154
-
Noticing notice: A largescale experiment on the timing of software license agreements
-
San Jose, CA, Apr.- May
-
N. Good, J. Grossklags, D. Mulligan, and J. Konstan. Noticing notice: A largescale experiment on the timing of software license agreements. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2007), pages 607-616, San Jose, CA, Apr.-May 2007.
-
(2007)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2007)
, pp. 607-616
-
-
Good, N.1
Grossklags, J.2
Mulligan, D.3
Konstan, J.4
-
48
-
-
38549085605
-
Empirical studies on software notices to inform policy makers and usability designers
-
Scarborough, Trinidad and Tobago, Feb.
-
J. Grossklags and N. Good. Empirical studies on software notices to inform policy makers and usability designers. In Proceedings of the International Workshop on Usable Security (USEC'07), pages 341-355, Scarborough, Trinidad and Tobago, Feb. 2007.
-
(2007)
Proceedings of the International Workshop on Usable Security (USEC'07)
, pp. 341-355
-
-
Grossklags, J.1
Good, N.2
-
49
-
-
0014413249
-
The tragedy of the commons
-
Dec.
-
G. Hardin. The tragedy of the commons. Science, 162(3859):1243-1248, Dec. 1968.
-
(1968)
Science
, vol.162
, Issue.3859
, pp. 1243-1248
-
-
Hardin, G.1
-
50
-
-
0015829919
-
Common property, congestion, and environmental pollution
-
May
-
R. Haveman. Common property, congestion, and environmental pollution. Quarterly Journal of Economics, 87(2):278-287, May 1973.
-
(1973)
Quarterly Journal of Economics
, vol.87
, Issue.2
, pp. 278-287
-
-
Haveman, R.1
-
56
-
-
52149113072
-
The economics of attention: Maximizing user value in information-rich environments
-
Aug.
-
B. Huberman and F. Wu. The economics of attention: Maximizing user value in information-rich environments. Advances in Complex Systems, 11(4):487-496, Aug. 2008.
-
(2008)
Advances in Complex Systems
, vol.11
, Issue.4
, pp. 487-496
-
-
Huberman, B.1
Wu, F.2
-
57
-
-
0034571771
-
When choice is demotivating: Can one desire too much of a good thing?
-
Dec.
-
S. Iyengar and M. Lepper. When choice is demotivating: Can one desire too much of a good thing? Journal of Personality and Social Psychology, 79(6):995-1006, Dec. 2000.
-
(2000)
Journal of Personality and Social Psychology
, vol.79
, Issue.6
, pp. 995-1006
-
-
Iyengar, S.1
Lepper, M.2
-
59
-
-
19944420514
-
Privacy practices of Internet users: Self-reports versus observed behavior
-
DOI 10.1016/j.ijhcs.2005.04.019, PII S1071581905000650, HCI Research in Privacy and Security
-
C. Jensen, C. Potts, and C. Jensen. Privacy practices of internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1-2):203-227, July 2005. (Pubitemid 40753499)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
60
-
-
70350605916
-
Adaptive security dialogs for improved security behavior of users
-
T. Gross et al., editor, Proceedings of the International Conference on Human-Computer Interaction (INTERACT 2009), Berlin Heidelberg, Springer
-
F. Keukelaere, S. Yoshihama, S. Trent, Y. Zhang, L. Luo, and M. Zurko. Adaptive security dialogs for improved security behavior of users. In T. Gross et al., editor, Proceedings of the International Conference on Human-Computer Interaction (INTERACT 2009), volume 5726 of Lecture Notes in Computer Science, pages 510-523, Berlin Heidelberg, 2009. Springer.
-
(2009)
Lecture Notes in Computer Science
, vol.5726
, pp. 510-523
-
-
Keukelaere, F.1
Yoshihama, S.2
Trent, S.3
Zhang, Y.4
Luo, L.5
Zurko, M.6
-
61
-
-
77957962684
-
Wrap contracts and privacy
-
M. Genesereth, R. Vogl, and M.-A. Williams, editors, Menlo Park, CA, Mar.
-
N. Kim. 'Wrap contracts and privacy. In M. Genesereth, R. Vogl, and M.-A. Williams, editors, AAAI Spring Symposium on Intelligent Privacy Management, pages 110-112, Menlo Park, CA, Mar. 2010.
-
(2010)
AAAI Spring Symposium on Intelligent Privacy Management
, pp. 110-112
-
-
Kim, N.1
-
63
-
-
23844490219
-
Pricing electronic mail to solve the problem of spam
-
DOI 10.1207/s15327051hci2001&2-7, Revisiting and Reinventing e-mail
-
R. Kraut, S. Sunder, R. Telang, and J. Morris. Pricing electronic mail to solve the problem of spam. Human-Computer Interaction, 20(1):195-223, June 2005. (Pubitemid 41158326)
-
(2005)
Human-Computer Interaction
, vol.20
, Issue.1-2
, pp. 195-223
-
-
Kraut, R.E.1
Sunder, S.2
Telang, R.3
Morris, J.4
-
64
-
-
84984100041
-
Response strategies for coping with the cognitive demands of attitude measures in surveys
-
May-Jun.
-
J. Krosnick. Response strategies for coping with the cognitive demands of attitude measures in surveys. Applied Cognitive Psychology, 5(3):213-236, May-Jun. 1991.
-
(1991)
Applied Cognitive Psychology
, vol.5
, Issue.3
, pp. 213-236
-
-
Krosnick, J.1
-
65
-
-
34247329930
-
An evaluation of a cognitive theory of response-order effects in survey measurement
-
Summer
-
J. Krosnick and D. Alwin. An evaluation of a cognitive theory of response-order effects in survey measurement. Public Opinion Quarterly, 51(2):201-219, Summer 1987.
-
(1987)
Public Opinion Quarterly
, vol.51
, Issue.2
, pp. 201-219
-
-
Krosnick, J.1
Alwin, D.2
-
67
-
-
24144487101
-
Consumers' attitudes towards online and mobile banking in China
-
DOI 10.1108/02652320510629250
-
S. Laforet and X. Li. Consumers' attitudes towards online and mobile banking in China. The International Journal of Bank Marketing, 23(5):362-380, May 2005. (Pubitemid 41240294)
-
(2005)
International Journal of Bank Marketing
, vol.23
, Issue.5
, pp. 362-380
-
-
Laforet, S.1
Li, X.2
-
69
-
-
33847386764
-
Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior
-
Summer
-
R. Larose and N. Rifon. Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. The Journal of Consumer Affairs, 41(1):127-149, Summer 2007.
-
(2007)
The Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 127-149
-
-
Larose, R.1
Rifon, N.2
-
70
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
DOI 10.1145/1076211.1076243
-
Y. Lee and K. Kozar. Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM, 48:72-77, Aug. 2005. (Pubitemid 41101418)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-77
-
-
Lee, Y.1
Kozar, K.A.2
-
72
-
-
30344444323
-
Attention web designers: You have 50 milliseconds to make a good first impression!
-
Mar.-Apr.
-
G. Lindgaard, G. Fernandes, C. Dudek, and J. Brown. Attention web designers: You have 50 milliseconds to make a good first impression! Behaviour & Information Technology, 25(2):115-126, Mar.-Apr. 2006.
-
(2006)
Behaviour & Information Technology
, vol.25
, Issue.2
, pp. 115-126
-
-
Lindgaard, G.1
Fernandes, G.2
Dudek, C.3
Brown, J.4
-
73
-
-
3242777742
-
An economic answer to unsolicited communication
-
New York, NY, May
-
T. Loder, M. van Alstyne, and R. Wash. An economic answer to unsolicited communication. In Proceedings of the ACM Conference on Electronic Commerce (EC), pages 40-50, New York, NY, May 2004.
-
(2004)
Proceedings of the ACM Conference on Electronic Commerce (EC)
, pp. 40-50
-
-
Loder, T.1
Van Alstyne, M.2
Wash, R.3
-
74
-
-
84855705669
-
Opt-in dystopias
-
Apr.
-
N. Lundblad and B. Masiello. Opt-in dystopias. SCRIPTed, 7(1):155-165, Apr. 2010.
-
(2010)
SCRIPTed
, vol.7
, Issue.1
, pp. 155-165
-
-
Lundblad, N.1
Masiello, B.2
-
75
-
-
78649369600
-
No free lunch: Price premium for privacy seal-bearing vendors
-
Fall
-
B. Mai, N. Menon, and S. Sarkar. No free lunch: Price premium for privacy seal-bearing vendors. Journal of Management Information Systems, 27(2):189-212, Fall 2010.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.2
, pp. 189-212
-
-
Mai, B.1
Menon, N.2
Sarkar, S.3
-
76
-
-
70349515951
-
Competition and the quality of standard form contracts: An empirical analysis of software license agreements
-
Sept.
-
F. Marotta-Wurgler. Competition and the quality of standard form contracts: An empirical analysis of software license agreements. Journal of Empirical Legal Studies, 5(3):447-475, Sept. 2008.
-
(2008)
Journal of Empirical Legal Studies
, vol.5
, Issue.3
, pp. 447-475
-
-
Marotta-Wurgler, F.1
-
78
-
-
84984136407
-
Comprehension of legal contracts by nonexperts: Effectiveness of plain language redrafting
-
Feb.
-
M. Masson and M. Waldron. Comprehension of legal contracts by nonexperts: Effectiveness of plain language redrafting. Applied Cognitive Psychology, 8:67-85, Feb. 1994.
-
(1994)
Applied Cognitive Psychology
, vol.8
, pp. 67-85
-
-
Masson, M.1
Waldron, M.2
-
81
-
-
33845791661
-
A longitudinal assessment of online privacy notice readability
-
Fall
-
G. Milne, M. Culnan, and H. Greene. A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing, 25(2):238-249, Fall 2006.
-
(2006)
Journal of Public Policy & Marketing
, vol.25
, Issue.2
, pp. 238-249
-
-
Milne, G.1
Culnan, M.2
Greene, H.3
-
82
-
-
78751561458
-
Would a 'cyber warrior' protect us? Exploring trade-offs between attack and defense of information systems
-
T. Moore, A. Friedman, and A. Procaccia. Would a 'cyber warrior' protect us? Exploring trade-offs between attack and defense of information systems. In Proceedings of the New Security Paradigms Workshop (NSPW), Concord, MA, Sept. 2010.
-
Proceedings of the New Security Paradigms Workshop (NSPW), Concord, MA, Sept. 2010
-
-
Moore, T.1
Friedman, A.2
Procaccia, A.3
-
83
-
-
80052803379
-
Do Windows users follow the principle of least privilege? Investigating user account control practices
-
Redmond, WA, July
-
S. Motiee, K. Hawkey, and K. Beznosov. Do Windows users follow the principle of least privilege? Investigating user account control practices. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), pages 1-13, Redmond, WA, July 2010.
-
(2010)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
, pp. 1-13
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
84
-
-
84855653949
-
-
National Cyber Security Alliance, Norton by Symantec, and Zogby International. October
-
National Cyber Security Alliance, Norton by Symantec, and Zogby International. 2010 NCSA / Norton by Symantec Online Safety Study, October 2010.
-
(2010)
2010 NCSA / Norton by Symantec Online Safety Study
-
-
-
85
-
-
72449138631
-
When more is less: The paradox of choice in search engine use
-
Boston, MA, July
-
A. Oulasvirta, J. Hukkinen, and B. Schwartz. When more is less: The paradox of choice in search engine use. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 516-523, Boston, MA, July 2009.
-
(2009)
Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 516-523
-
-
Oulasvirta, A.1
Hukkinen, J.2
Schwartz, B.3
-
87
-
-
0000851466
-
The effects of automobile safety regulation
-
Aug.
-
S. Peltzman. The effects of automobile safety regulation. Journal of Political Economy, 83(4):677-726, Aug. 1975.
-
(1975)
Journal of Political Economy
, vol.83
, Issue.4
, pp. 677-726
-
-
Peltzman, S.1
-
90
-
-
84888268369
-
Helping engineers design NEAT security warnings
-
R. Reeder, E. Kowalczyk, and A. Shostack. Helping engineers design NEAT security warnings. In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 2011.
-
Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 2011.
-
-
Reeder, R.1
Kowalczyk, E.2
Shostack, A.3
-
91
-
-
0343498102
-
Individual management of personal reachability in mobile communication
-
L. Yngström and J. Carlsen, editors, Information Security in Research and Business (IFIP SEC '97)
-
M. Reichenbach, H. Damker, H. Federrath, and K. Rannenberg. Individual management of personal reachability in mobile communication. In L. Yngström and J. Carlsen, editors, Information Security in Research and Business (IFIP SEC '97), volume 92 of IFIP Conference Proceedings, pages 164-174, 1997.
-
(1997)
IFIP Conference Proceedings
, vol.92
, pp. 164-174
-
-
Reichenbach, M.1
Damker, H.2
Federrath, H.3
Rannenberg, K.4
-
93
-
-
58149161688
-
Leading the herd astray: An experimental study of self-fulfilling prophecies in an artificial cultural market
-
Dec.
-
M. Salganik and D. Watts. Leading the herd astray: An experimental study of self-fulfilling prophecies in an artificial cultural market. Social Psychology Quarterly, 71(4):338-355, Dec. 2008.
-
(2008)
Social Psychology Quarterly
, vol.71
, Issue.4
, pp. 338-355
-
-
Salganik, M.1
Watts, D.2
-
94
-
-
33847358210
-
The unfairness of click-on software licenses
-
Winter
-
R. Schechter. The unfairness of click-on software licenses. Wayne Law Review, 4(46):1735-1803, Winter 2000.
-
(2000)
Wayne Law Review
, vol.4
, Issue.46
, pp. 1735-1803
-
-
Schechter, R.1
-
95
-
-
34548786769
-
The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
Oakland, CA, May
-
S. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51-65, Oakland, CA, May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
100
-
-
70350616118
-
Failure to recognize fake internet popup warning messages
-
New York, NY, Sept.
-
D. Sharek, C. Swofford, and M. Wogalter. Failure to recognize fake internet popup warning messages. In Proceedings of the 52nd Annual Meeting of the Human Factors and Ergonomics Society, pages 557-560, New York, NY, Sept. 2008.
-
(2008)
Proceedings of the 52nd Annual Meeting of the Human Factors and Ergonomics Society
, pp. 557-560
-
-
Sharek, D.1
Swofford, C.2
Wogalter, M.3
-
101
-
-
0003346050
-
Designing organizations for an information rich world
-
M. Greenberger, editor, John Hopkins Press
-
H. Simon. Designing organizations for an information rich world. In M. Greenberger, editor, Computers, Communications and the Public Interest, pages 38-52. John Hopkins Press, 1971.
-
(1971)
Computers, Communications and the Public Interest
, pp. 38-52
-
-
Simon, H.1
-
103
-
-
57149083110
-
Exploring user reactions to new browser cues for extended validation certificates
-
Malaga, Spain, Oct.
-
J. Sobey, R. Biddle, P. van Oorschot, and A. Patrick. Exploring user reactions to new browser cues for extended validation certificates. In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS), pages 411-427, Malaga, Spain, Oct. 2008.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS)
, pp. 411-427
-
-
Sobey, J.1
Biddle, R.2
Van Oorschot, P.3
Patrick, A.4
-
104
-
-
0038588436
-
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
-
Tampa, FL, Oct.
-
S. Spiekermann, J. Grossklags, and B. Berendt. E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In Proceedings of the ACM Conference on Electronic Commerce (EC), pages 38-47, Tampa, FL, Oct. 2001.
-
(2001)
Proceedings of the ACM Conference on Electronic Commerce (EC)
, pp. 38-47
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
105
-
-
84869407868
-
The underground economy of fake antivirus software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, and D. Steigerwald. The underground economy of fake antivirus software. In Workshop on the Economics of Information Security (WEIS), Fairfax, VA, June 2011.
-
Workshop on the Economics of Information Security (WEIS), Fairfax, VA, June 2011
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
-
106
-
-
0001793899
-
Thinking, judging, and communicating: A process account of context effects in attitude surveys
-
H.-J. Hippler, editor, Springer, New York, 2. edition
-
F. Strack and L. Martin. Thinking, judging, and communicating: A process account of context effects in attitude surveys. In H.-J. Hippler, editor, Social Information Processing and Survey Methodology, pages 123-148. Springer, New York, 2. edition, 1988.
-
(1988)
Social Information Processing and Survey Methodology
, pp. 123-148
-
-
Strack, F.1
Martin, L.2
-
107
-
-
84926351578
-
Crying wolf: An empirical study of ssl warning effectiveness
-
Montreal, Canada, Aug.
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. Cranor. Crying wolf: An empirical study of ssl warning effectiveness. In Proceedings of the 18th USENIX Security Symposium, pages 399-416, Montreal, Canada, Aug. 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 399-416
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.5
-
108
-
-
27644580707
-
Demystifying the threat modeling process
-
Sep.-Oct.
-
P. Torr. Demystifying the threat modeling process. IEEE Security & Privacy, 3(5):66-70, Sep.-Oct. 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 66-70
-
-
Torr, P.1
-
111
-
-
33750482906
-
System reliability and free riding
-
L. Camp and S. Lewis, editors, Economics of Information Security Kluwer Academic Publishers, Dordrecht, The Netherlands
-
H. Varian. System reliability and free riding. In L. Camp and S. Lewis, editors, Economics of Information Security (Advances in Information Security, Volume 12), pages 1-15. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2004.
-
(2004)
Advances in Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.1
-
112
-
-
77956121769
-
Computer mediated transactions
-
May
-
H. Varian. Computer mediated transactions. American Economic Review, 100(2):1-10, May 2010.
-
(2010)
American Economic Review
, vol.100
, Issue.2
, pp. 1-10
-
-
Varian, H.1
-
114
-
-
14744272698
-
Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market
-
L. Camp and S. Lewis, editors, Economics of Information Security Kluwer Academic Publishers, Dordrecht, The Netherlands
-
T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market. In L. Camp and S. Lewis, editors, Economics of Information Security (Advances in Information Security, Volume 12), pages 143-153. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2004.
-
(2004)
Advances in Information Security
, vol.12
, pp. 143-153
-
-
Vila, T.1
Greenstadt, R.2
Molnar, D.3
-
116
-
-
23944500332
-
Friends troubleshooting network: Towards privacy-preserving, automatic troubleshooting
-
San Diego, CA, Feb.
-
H. Wang, Y. Hu, C. Yuan, Z. Zhang, and Y. Wang. Friends troubleshooting network: Towards privacy-preserving, automatic troubleshooting. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS), pages 184-194, San Diego, CA, Feb. 2004.
-
(2004)
Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS)
, pp. 184-194
-
-
Wang, H.1
Hu, Y.2
Yuan, C.3
Zhang, Z.4
Wang, Y.5
-
117
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Washington, DC, Aug.
-
A. Whitten and D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages 169-184, Washington, DC, Aug. 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, D.2
-
121
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
Montreal, Canada, Apr.
-
M. Wu, R. Miller, and S. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'06), pages 601-610, Montreal, Canada, Apr. 2006.
-
(2006)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'06)
, pp. 601-610
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
122
-
-
84948973276
-
Did you ever have to make up your mind? What Notes users do when faced with a security decision
-
Las Vegas, NV, Dec.
-
M. Zurko, C. Kaufman, K. Spanbauer, and C. Bassett. Did you ever have to make up your mind? What Notes users do when faced with a security decision. In Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), pages 371-381, Las Vegas, NV, Dec. 2002.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC)
, pp. 371-381
-
-
Zurko, M.1
Kaufman, C.2
Spanbauer, K.3
Bassett, C.4
|