-
1
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
Ackerman, M.S., Cranor, L.F., and Reagle, J. Privacy in e-commerce: examining user scenarios and privacy preferences. Proc. of the 1st ACM conference on Electronic commerce, (1999), 1-8.
-
(1999)
Proc. of the 1st ACM Conference on Electronic Commerce
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
2
-
-
34249871944
-
A qualitative study of users' view on information security
-
Albrechtsen, E. A qualitative study of users' view on information security. Computers & Security 26, 4 (2007), 276-289.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
3
-
-
0036211735
-
Can you see the real me ? Activation and expression of the "true Self " on the Internet
-
Bargh, J.A., McKenna, K.Y.A., and Fitzsimons, G.M. Can You See the Real Me ? Activation and Expression of the " True Self " on the Internet. Journal of social issues 58, 1 (2002), 33-48.
-
(2002)
Journal of Social Issues
, vol.58
, Issue.1
, pp. 33-48
-
-
Bargh, J.A.1
McKenna, K.Y.A.2
Fitzsimons, G.M.3
-
4
-
-
16444368611
-
Privacy in e-commerce: Stated preferences vs. actual behavior
-
Berendt, B. Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM 48, 4 (2005), 101-106.
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
-
5
-
-
85132398985
-
4chan and/b: An analysis of anonymity and ephemerality in a large online community
-
AAAI Press
-
Bernstein, M.S., Monroy-Hernández, A., Harry, D., André, P., Panovich, K., and Vargas, G. 4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community. Proc. of ICWSM 2011, AAAI Press (2011), 50-57.
-
(2011)
Proc. of ICWSM 2011
, pp. 50-57
-
-
Bernstein, M.S.1
Monroy-Hernández, A.2
Harry, D.3
André, P.4
Panovich, K.5
Vargas, G.6
-
6
-
-
4043132397
-
Protecting personal information online: A survey of user privacy concerns and control techniques
-
Chen, K. and Rea, A. Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems 44, 4 (2004), 85-92.
-
(2004)
Journal of Computer Information Systems
, vol.44
, Issue.4
, pp. 85-92
-
-
Chen, K.1
Rea, A.2
-
7
-
-
34249930118
-
The positive and negative implications of anonymity in Internet social interactions
-
Christopherson, K.M. The positive and negative implications of anonymity in Internet social interactions. Computers in Human Behavior 23, 6(2007), 3038-3056.
-
(2007)
Computers in Human Behavior
, vol.23
, Issue.6
, pp. 3038-3056
-
-
Christopherson, K.M.1
-
9
-
-
36849070859
-
An honest man has nothing to fear: User perceptions on web-based information disclosure
-
Conti, G. and Sobiesk, E. An honest man has nothing to fear: user perceptions on web-based information disclosure. SOUPS, (2007), 112-121.
-
(2007)
SOUPS
, pp. 112-121
-
-
Conti, G.1
Sobiesk, E.2
-
11
-
-
35348992672
-
Methodological fit in management field research
-
Edmonson, A.C., and McManus, S. E. Methodological fit in management field research. Academy of Management, 32, (2007), 1155-1179.
-
(2007)
Academy of Management
, vol.32
, pp. 1155-1179
-
-
Edmonson, A.C.1
McManus, S.E.2
-
12
-
-
0000023439
-
Oppositionists and group norms: The reciprocal influence of whistle-blowers and co-workers
-
Greenberger, D.B., Miceli, M.P., and Cohen, D.J. Oppositionists and group norms: The reciprocal influence of whistle-blowers and co-workers. Journal of Business Ethics 6, 7 (1987), 527-542.
-
(1987)
Journal of Business Ethics
, vol.6
, Issue.7
, pp. 527-542
-
-
Greenberger, D.B.1
Miceli, M.P.2
Cohen, D.J.3
-
13
-
-
70349266490
-
-
Hernan, S., Lambert, S., Ostwald, T., and Shostack, A. Uncover Security Design Flaws Using The STRIDE Approach. http://msdn.microsoft.com/enus/magazine/ cc163519.aspx.
-
Uncover Security Design Flaws Using the STRIDE Approach
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
14
-
-
0002402168
-
Dimensions of national cultures in fifty countries and three regions
-
J.Deregowski, S. Dzuirawiec and R. Annis, eds.
-
Hofstede, G. Dimensions of national cultures in fifty countries and three regions. In J.Deregowski, S. Dzuirawiec and R. Annis, eds., Explications in Cross-Cultural Psychology. 1983.
-
(1983)
Explications in Cross-Cultural Psychology
-
-
Hofstede, G.1
-
15
-
-
19944420514
-
Privacy practices of Internet users: Self-reports versus observed behavior
-
Jensen, C. and Potts, C. Privacy practices of Internet users: self-reports versus observed behavior. International Journal of Human-Computer Studies 63, 1 (2005), 203-227.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
-
18
-
-
0033244306
-
What's in a name ? Some reflections on the sociology of anonymity
-
Marx, G.T. What's in a Name ? Some Reflections on the Sociology of Anonymity. The Information Society 15, 2 (1999), 99-112.
-
(1999)
The Information Society
, vol.15
, Issue.2
, pp. 99-112
-
-
Marx, G.T.1
-
19
-
-
77953980425
-
Access control for home data sharing: Attitudes, needs and practices
-
ACM
-
Mazurek, M.L., Arsenault, J.P., Bresee, J., et al. Access Control for Home Data Sharing: Attitudes, Needs and Practices. Proc. of CHI 2010, ACM (2010), 645-654.
-
(2010)
Proc. of CHI 2010
, pp. 645-654
-
-
Mazurek, M.L.1
Arsenault, J.P.2
Bresee, J.3
-
20
-
-
0034338890
-
Plan 9 from cyberspace: The implications of the internet for personality and social psychology
-
McKenna, K.Y.A. and Bargh, J.A. Plan 9 From Cyberspace: The Implications of the Internet for Personality and Social Psychology. Personality and Social Psychology Review 4, 1 (2000), 57-75.
-
(2000)
Personality and Social Psychology Review
, vol.4
, Issue.1
, pp. 57-75
-
-
McKenna, K.Y.A.1
Bargh, J.A.2
-
21
-
-
84862075140
-
Lost in translation: Understanding the possession of digital things in the cloud
-
ACM
-
Odom, W., Sellen, A., Harper, R., and Thereska, E. Lost in translation: understanding the possession of digital things in the cloud. Proc. of CHI 2012, ACM (2012), 781-790.
-
(2012)
Proc. of CHI 2012
, pp. 781-790
-
-
Odom, W.1
Sellen, A.2
Harper, R.3
Thereska, E.4
-
24
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
Pfitzmann, A. and Köhntopp, M. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. Designing privacy enhancing technologies, (2001), 1-9.
-
(2001)
Designing Privacy Enhancing Technologies
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
25
-
-
57549102289
-
More than meets the eye: Transforming the user experience of home network management
-
ACM Press
-
Poole, E.S., Chetty, M., Grinter, R.E., and Edwards, W.K. More than meets the eye: transforming the user experience of home network management. Proc. DIS 2008, ACM Press (2008), 455-464.
-
(2008)
Proc. DIS 2008
, pp. 455-464
-
-
Poole, E.S.1
Chetty, M.2
Grinter, R.E.3
Edwards, W.K.4
-
26
-
-
1142279649
-
The top five reasons for lurking: Improving community experiences for everyone
-
Preece, J., Nonnecke, B., and Andrews, D. The top five reasons for lurking: improving community experiences for everyone. Computers in Human Behavior 20, 2 (2004), 201-223.
-
(2004)
Computers in Human Behavior
, vol.20
, Issue.2
, pp. 201-223
-
-
Preece, J.1
Nonnecke, B.2
Andrews, D.3
-
27
-
-
84872380171
-
Are personal health records safe? A review of free web- accessible personal health record privacy policies
-
Señor, I.C., Fernández-Alemán, J.L., and Toval, A. Are Personal Health Records Safe? A Review of Free Web- Accessible Personal Health Record Privacy Policies. Journal of Medical Internet Research 14, 4(2012), e114.
-
(2012)
Journal of Medical Internet Research
, vol.14
, Issue.4
-
-
Señor, I.C.1
Fernández-Alemán, J.L.2
Toval, A.3
-
28
-
-
79958149262
-
Online contribution practices in countries that engage in internet blocking and censorship
-
ACM
-
Shklovski, I. and Kotamraju, N. Online contribution practices in countries that engage in internet blocking and censorship. Proc. of CHI 2011, ACM (2011), 1109-1118.
-
(2011)
Proc. of CHI 2011
, pp. 1109-1118
-
-
Shklovski, I.1
Kotamraju, N.2
-
29
-
-
84858181853
-
Social transparency in networked information exchange: A theoretical framework
-
ACM
-
Stuart, H.C., Dabbish, L., Kiesler, S., Kinnaird, P., and Kang, R. Social transparency in networked information exchange: a theoretical framework. Proc. of CSCW 2012, ACM (2012), 451-460.
-
(2012)
Proc. of CSCW 2012
, pp. 451-460
-
-
Stuart, H.C.1
Dabbish, L.2
Kiesler, S.3
Kinnaird, P.4
Kang, R.5
-
30
-
-
3042815772
-
The online disinhibition effect
-
Suler, J. The online disinhibition effect. Cyberpsychology & behavior 7, 3 (2004), 321-326.
-
(2004)
Cyberpsychology & Behavior
, vol.7
, Issue.3
, pp. 321-326
-
-
Suler, J.1
-
31
-
-
0033244305
-
Anonymous communication policies for the Internet: Results and recommendations of the AAAS conference
-
Teich, A., Frankel, M.S., Kling, R., and Lee, Y. Anonymous communication policies for the Internet: Results and recommendations of the AAAS conference. The Information Society 15, 2 (1999), 71-77.
-
(1999)
The Information Society
, vol.15
, Issue.2
, pp. 71-77
-
-
Teich, A.1
Frankel, M.S.2
Kling, R.3
Lee, Y.4
-
32
-
-
47549106092
-
Can you see me now? Audience and disclosure regulation in online social network sites
-
Tufekci, Z. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28, 1 (2007), 20-36.
-
(2007)
Bulletin of Science, Technology & Society
, vol.28
, Issue.1
, pp. 20-36
-
-
Tufekci, Z.1
-
33
-
-
0037412301
-
Privacy on the Web: An examination of user concerns, technology, and implications for business organizations and individuals
-
Turner, E. and Dasgupta, S. Privacy on the Web: An examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management, (2003), 8-19.
-
(2003)
Information Systems Management
, pp. 8-19
-
-
Turner, E.1
Dasgupta, S.2
-
35
-
-
77956042348
-
A study of the human flesh search engine: Crowd-powered expansion of online knowledge
-
Wang, F.Y., Zeng, D., et al. A study of the human flesh search engine: crowd-powered expansion of online knowledge. Computer 43, 8 (2010), 45-53.
-
(2010)
Computer
, vol.43
, Issue.8
, pp. 45-53
-
-
Wang, F.Y.1
Zeng, D.2
-
36
-
-
85037377488
-
Who is concerned about what ? A study of American, Chinese and Indian users ' privacy concerns on social network sites
-
Wang, Y., Norice, G., and Cranor, L. Who Is Concerned about What ? A Study of American, Chinese and Indian Users ' Privacy Concerns on Social Network Sites. Trust and Trustworthy Computing, (2011), 146-153.
-
(2011)
Trust and Trustworthy Computing
, pp. 146-153
-
-
Wang, Y.1
Norice, G.2
Cranor, L.3
-
37
-
-
28844484526
-
An exploration of identity re-creation in the context of internet dating
-
Yurchisin, J., Watchravesringkan, K., and Mccabe, D.B. An Exploration of Identity Re-creation in the Context of Internet Dating. Social Behavior and Personality: an international journal 33, 8 (2005), 735-750.
-
(2005)
Social Behavior and Personality: An International Journal
, vol.33
, Issue.8
, pp. 735-750
-
-
Yurchisin, J.1
Watchravesringkan, K.2
McCabe, D.B.3
-
38
-
-
23344449408
-
What do consumers really know about spyware?
-
Zhang, X. What do consumers really know about spyware? Communications of the ACM 48, 8 (2005), 44-48.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 44-48
-
-
Zhang, X.1
|