-
1
-
-
75149142201
-
Nudging privacy: The behavioral economics of personal information
-
Acquisti, A. Nudging privacy: The behavioral economics of personal information. Security & Privacy, IEEE 7.6 (2009), 82-85.
-
(2009)
Security & Privacy, IEEE
, vol.7
, Issue.6
, pp. 82-85
-
-
Acquisti, A.1
-
2
-
-
84883088902
-
What can behavioral economics teach us about privacy
-
Acquisti, A., Grossklags, J. What can behavioral economics teach us about privacy. DIGITAL PRIVACY (2009), 329.
-
(2009)
Digital Privacy
, pp. 329
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
0032285185
-
Constructive consumer choice processes
-
Bettman, J. R., and M. F. Luce. Constructive Consumer Choice Processes. Journal of consumer research 25, no. 3 (1998), 187-217.
-
(1998)
Journal of Consumer Research
, vol.25
, Issue.3
, pp. 187-217
-
-
Bettman, J.R.1
Luce, M.F.2
-
4
-
-
77956252170
-
Facebook privacy settings: Who cares
-
Boyd, D., Eszter H. Facebook privacy settings: Who cares. First Monday 15.8 (2010): 2.
-
(2010)
First Monday
, vol.15
, Issue.8
, pp. 2
-
-
Boyd, D.1
Eszter, H.2
-
7
-
-
84889757331
-
Indirect content privacy surveys: Measuring privacy without asking about it
-
ACM Press 15
-
Braunstein, A., Granka, L., Staddon, J. Indirect content privacy surveys: measuring privacy without asking about it. In Proceedings of the Seventh Symposium on Usable Privacy and Security (p. 15). ACM Press, (2011), 15.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security
, pp. 15
-
-
Braunstein, A.1
Granka, L.2
Staddon, J.3
-
8
-
-
21344492992
-
Capturing the complexity in advanced technology use: Adaptive structuration theory
-
Desanctis, G. & Poole, M. S. Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science. 5 (1994), 121-147.
-
(1994)
Organization Science
, vol.5
, pp. 121-147
-
-
Desanctis, G.1
Poole, M.S.2
-
11
-
-
33847712553
-
The value of privacy assurance: An exploratory field experiment
-
Hui, K., H. H. Teo, and S. Y. T. Lee. The Value of Privacy Assurance: An Exploratory Field Experiment. Mis Quarterl 31, no. 1 (2007), 19-33.
-
(2007)
Mis Quarterl
, vol.31
, Issue.1
, pp. 19-33
-
-
Hui, K.1
Teo, H.H.2
Lee, S.Y.T.3
-
12
-
-
19944420514
-
Privacy practices of internet users: Self-reports versus observed behavior
-
Jensen, C., Potts, C., Jensen, C. Privacy practices of Internet users: self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1), (2005), 203-227.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
13
-
-
35348877228
-
Giddens's structuration theory and information systems research
-
Jones, M. R., Karsten, H. Giddens's structuration theory and information systems research. Mis Quarterly, 32(1), (2008), 127-157.
-
(2008)
Mis Quarterly
, vol.32
, Issue.1
, pp. 127-157
-
-
Jones, M.R.1
Karsten, H.2
-
14
-
-
84860299162
-
Privacy management on social media sites
-
Madden, M. Privacy management on social media sites. Pew Internet Report (2012).
-
(2012)
Pew Internet Report
-
-
Madden, M.1
-
15
-
-
70450172446
-
From spaces to places: Emerging contexts in mobile privacy
-
ACM Press
-
Mancini, C., Thomas, K., Rogers, Y., Price, B. A., Jedrzejczyk, L., Bandara, A. K., Nuseibeh, B. From spaces to places: emerging contexts in mobile privacy. In Proc. Ubicomp. ACM Press (2009), 1-10.
-
(2009)
Proc. Ubicomp
, pp. 1-10
-
-
Mancini, C.1
Thomas, K.2
Rogers, Y.3
Price, B.A.4
Jedrzejczyk, L.5
Bandara, A.K.6
Nuseibeh, B.7
-
16
-
-
33847382472
-
The privacy paradox: Personal information disclosure intentions versus behaviors
-
Norberg, P. A., D. R. Horne, and D. A. Horne. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs (2007), 100-126.
-
(2007)
Journal of Consumer Affairs
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
17
-
-
1142268161
-
Privacy, economics, and price discrimination on the internet
-
ACM Press
-
Odlyzko, A. Privacy, economics, and price discrimination on the Internet. In Proc. Electronic commerce, ACM Press (2003), 355-366.
-
(2003)
Proc. Electronic Commerce
, pp. 355-366
-
-
Odlyzko, A.1
-
18
-
-
84934453961
-
The duality of technology: Rethinking the concept of technology in organizations
-
Orlikowski, W., J. The duality of technology: Rethinking the concept of technology in organizations. Organization science 3, no. 3 (1992), 398-427.
-
(1992)
Organization Science
, vol.3
, Issue.3
, pp. 398-427
-
-
Orlikowski, W.J.1
-
20
-
-
0038588436
-
E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior
-
ACM Press
-
Spiekermann, S., Grossklags, J., Berendt, B. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proc. Electronic Commerce. ACM Press (2001), 38-47.
-
(2001)
Proc. Electronic Commerce
, pp. 38-47
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
21
-
-
84862078767
-
The implications of offering more disclosure choices for social location sharing
-
ACM Press
-
Tang, K., Hong, J., Siewiorek, D. The implications of offering more disclosure choices for social location sharing. In Proc. Human factors in computing systems ACM Press (2012), 391-394.
-
(2012)
Proc. Human Factors in Computing Systems
, pp. 391-394
-
-
Tang, K.1
Hong, J.2
Siewiorek, D.3
-
22
-
-
84892447976
-
Who's viewed you?: The impact of feedback in a mobile location-sharing application
-
ACM Press
-
Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N. Who's viewed you?: the impact of feedback in a mobile location-sharing application. In Proc. Human factors in computing systems 2009, ACM Press (2009), 2003-2012.
-
(2009)
Proc. Human Factors in Computing Systems 2009
, pp. 2003-2012
-
-
Tsai, J.Y.1
Kelley, P.2
Drielsma, P.3
Cranor, L.F.4
Hong, J.5
Sadeh, N.6
-
23
-
-
80054081236
-
Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share
-
Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., Zimmerman, J. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share. In Proc. of the 13th International Conference on Ubiquitous Computing, (2011).
-
(2011)
Proc. of the 13th International Conference on Ubiquitous Computing
-
-
Wiese, J.1
Kelley, P.G.2
Cranor, L.F.3
Dabbish, L.4
Hong, J.I.5
Zimmerman, J.6
-
24
-
-
79955599955
-
A personalized approach to web privacy: Awareness, attitudes and actions
-
Wills, C., E., Mihajlo Zeljkovic. A personalized approach to web privacy: awareness, attitudes and actions. Information Management & Computer Security 19.1 (2011): 53-73.
-
(2011)
Information Management & Computer Security
, vol.19
, Issue.1
, pp. 53-73
-
-
Wills, C.1
Mihajlo Zeljkovic, E.2
-
25
-
-
84868320644
-
Location data and privacy: A framework for analysis
-
Bernard Stiegler (ed.) FYP EDITIONS
-
Zafeiropoulou, A. M., K. O'Hara, D. Millard, and C. Webber. Location Data and Privacy: A Framework for Analysis. In Bernard Stiegler (ed.),Réseaux sociaux: Culture politique et ingénierie des réseaux sociaux. FYP EDITIONS (2012), 185-200.
-
(2012)
Réseaux Sociaux: Culture Politique et Ingénierie des Réseaux Sociaux
, pp. 185-200
-
-
Zafeiropoulou, A.M.1
O'Hara, K.2
Millard, D.3
Webber, C.4
-
26
-
-
84908647000
-
Operationalizing privacy by design: A guide to implementing strong privacy practices
-
Ontario, Canada
-
Cavoukian, A. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices. Information and Privacy Commissioner, Ontario, Canada, (2012).
-
(2012)
Information and Privacy Commissioner
-
-
Cavoukian, A.1
-
27
-
-
84879821584
-
Privacy in context. Technology, policy, and the integrity of social life
-
Nissenbaum, H. Privacy in Context. Technology, Policy, and the Integrity of Social Life. In Stanford Law Books, (2010).
-
(2010)
Stanford Law Books
-
-
Nissenbaum, H.1
|