-
1
-
-
75149142201
-
Nudging privacy: The behavioral economics of personal information
-
doi:, accessed 10 December 2013.
-
Alessandro Acquisti, 2009. "Nudging privacy: The behavioral economics of personal information," IEEE Security & Privacy, volume 7, number 6, pp. 82-85. doi: http://dx.doi.org/10.1109/MSP.2009.163, accessed 10 December 2013.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.6
, pp. 82-85
-
-
Acquisti, A.1
-
2
-
-
14744275332
-
Privacy and rationality in decision making
-
accessed 10 December 2013.
-
Alessandro Acquisti and Jens Grosslags, 2005. "Privacy and rationality in decision making," IEEE Security & Privacy, volume 3, number 1, pp. 26-33. http://dx.doi.org/10.1109/MSP.2005.22, accessed 10 December 2013.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grosslags, J.2
-
3
-
-
85005305538
-
The market for 'lemons': Quality uncertainty and the market mechanism
-
doi:, accessed 10 December 2013.
-
George A. Akerlof, 1970. "The market for 'lemons': Quality uncertainty and the market mechanism," Quarterly Journal of Economics, volume 84, number 3, pp. 488-500. doi: http://dx.doi.org/10.2307/1879431, accessed 10 December 2013.
-
(1970)
Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
4
-
-
34548682604
-
The impact of individual ethics on reactions to potentially invasive HR practices
-
doi:, accessed 10 December 2013.
-
G. Stoney Alder, Marshall Schminke, and Terry W. Noel. 2007. "The impact of individual ethics on reactions to potentially invasive HR practices," Journal of Business Ethics, volume 75, number 2, pp. 201-214. doi: http://dx.doi.org/10.1007/s10551-006-9247-6, accessed 10 December 2013.
-
(2007)
Journal of Business Ethics
, vol.75
, Issue.2
, pp. 201-214
-
-
Alder, G.S.1
Schminke, M.2
Noel, T.W.3
-
5
-
-
84891891705
-
Privacy study: Top U.S. Web sites share visitor personal data
-
(11 October) at accessed 10 December 2013.
-
Julia Angwin, 2011. "Privacy study: Top U.S. Web sites share visitor personal data," Wall Street Journal (11 October), at http://blogs.wsj.com/digits/2011/10/11/privacy-study-top-u-s-websites-share-visitor-personal-data/, accessed 10 December 2013.
-
(2011)
Wall Street Journal
-
-
Angwin, J.1
-
6
-
-
10044225615
-
Rule pragmatism: Theory and application to qualified immunity analysis
-
and at, accessed 10 December 2013.
-
Melissa Armstrong, 2004. "Rule pragmatism: Theory and application to qualified immunity analysis," Columbia Journal of Law & Social Problems, volume 38, pp. 107-130, and at http://www.columbia.edu/cu/jlsp/pdf/Fall%202004/Armstrong381-A.pdf, accessed 10 December 2013.
-
(2004)
Columbia Journal of Law & Social Problems
, vol.38
, pp. 107-130
-
-
Armstrong, M.1
-
7
-
-
84862080297
-
Flash cookies and privacy II: Now with HTML5 and ETag respawning
-
(29 July), at, accessed 10 December 2013.
-
Mika D. Ayenson, Dietrich J. Wambach, Ashkan Soltani, Nathaniel Good, and Chris J. Hoofnagle, 2011. "Flash cookies and privacy II: Now with HTML5 and ETag respawning" (29 July), at http://dx.doi.org/10.2139/ssrn.1898390, accessed 10 December 2013.
-
(2011)
-
-
Ayenson, M.D.1
Wambach, D.J.2
Soltani, A.3
Good, N.4
Hoofnagle, C.J.5
-
8
-
-
84867830561
-
"The new intrusion,"
-
accessed 10 December 2013.
-
Jane Yakowitz Bambauer, 2012. "The new intrusion," Notre Dame Law Review, volume 88, number 1, pp. 205-523, and at http://scholarship.law.nd.edu/ndlr/vol88/iss1/5/, accessed 10 December 2013.
-
(2012)
Notre Dame Law Review
, vol.88
, Issue.1
, pp. 205-523
-
-
Bambauer, J.Y.1
-
10
-
-
84859720698
-
The value of behavioral targeting
-
at, accessed 10 December 2013.
-
Howard Beales, 2010. "The value of behavioral targeting." Network Advertising Initiative, at http://www.networkadvertising.org/pdfs/Beales_NAI_Study.pdf, accessed 10 December 2013.
-
(2010)
Network Advertising Initiative
-
-
Beales, H.1
-
11
-
-
42349116295
-
Choice or consequences: Protecting privacy in commercial information
-
doi:, accessed 10 December 2013.
-
J. Howard Beales and Timothy J. Muris, 2008. "Choice or consequences: Protecting privacy in commercial information," University of Chicago Law Review, volume 75, number 1, pp. 109-135. doi: https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/75.1/75_1_Muris_Beales.pdf, accessed 10 December 2013.
-
(2008)
University of Chicago Law Review
, vol.75
, Issue.1
, pp. 109-135
-
-
Beales, J.H.1
Muris, T.J.2
-
12
-
-
84891898754
-
The privacy problem: We have met the enemy and he is us
-
Tech Crunch (5 March), at, accessed 10 December 2013.
-
John Biggs, 2012. "The privacy problem: We have met the enemy and he is us," Tech Crunch (5 March), at http://techcrunch.com/2012/03/05/the-privacy-problem-we-have-met-the-enemy-and-he-is-us/, accessed 10 December 2013.
-
(2012)
-
-
Biggs, J.1
-
13
-
-
33745804732
-
Privacy rights on the Internet: Self-regulation or government regulation
-
Norman E. Bowie and Karim Jamal, 2006. "Privacy rights on the Internet: Self-regulation or government regulation?" Business Ethics Quarterly, volume 16, number 3, pp. 323-342.
-
(2006)
Business Ethics Quarterly
, vol.16
, Issue.3
, pp. 323-342
-
-
Bowie, N.E.1
Jamal, K.2
-
14
-
-
84861974217
-
Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon
-
doi:, accessed 10 December 2013.
-
danah boyd and Kate Crawford, 2012. "Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon," Information, Communication & Society, volume 15, number 5, pp. 662-679. doi: http://dx.doi.org/10.1080/1369118X.2012.678878, accessed 10 December 2013.
-
(2012)
Information, Communication & Society
, vol.15
, Issue.5
, pp. 662-679
-
-
Boyd, D.1
Crawford, K.2
-
15
-
-
79958731816
-
Vernacular resistance to data collection and analysis: A political theory of obfuscation
-
at accessed 10 December 2013.
-
Finn Brunton and Helen Nissenbaum. 2011. "Vernacular resistance to data collection and analysis: A political theory of obfuscation," First Monday, volume 16, number 5, at http://firstmonday.org/article/view/3493/2955, accessed 10 December 2013.
-
(2011)
First Monday
, vol.16
, Issue.5
-
-
Brunton, F.1
Nissenbaum, H.2
-
16
-
-
84859015072
-
Against notice skepticism in privacy (and elsewhere)
-
at, accessed 10 December 2013.
-
M. Ryan Calo, 2013. "Against notice skepticism in privacy (and elsewhere)," Notre Dame Law Review, volume 87, number 3, at http://scholarship.law.nd.edu/ndlr/vol87/iss3/3/, accessed 10 December 2013.
-
(2013)
Notre Dame Law Review
, vol.87
, Issue.3
-
-
Calo, M.R.1
-
17
-
-
79953138427
-
The boundaries of privacy harm
-
at, accessed 10 December 2013.
-
M. Ryan Calo, 2011. "The boundaries of privacy harm," Indiana Law Journal, volume 86, number 3, pp. 1,131-1,162, at http://ilj.law.indiana.edu/articles/86/86_3_Calo.pdf, accessed 10 December 2013.
-
(2011)
Indiana Law Journal
, vol.86
, Issue.3
, pp. 1131-1162
-
-
Calo, M.R.1
-
18
-
-
84891892403
-
The 7 biggest fan page marketing mistakes
-
AllFacebook (17 May). at, accessed 10 December 2013.
-
Brian Carter, 2011. "The 7 biggest fan page marketing mistakes," AllFacebook (17 May). at http://allfacebook.com/7-biggest-fan-page-marketing-mistakes_b43011, accessed 10 December 2013.
-
(2011)
-
-
Carter, B.1
-
19
-
-
84891895151
-
No opting out of Facebook turning your check-ins, likes into ads
-
Ars Technica (26 January)., accessed 10 December 2013.
-
Jacqui Cheng, 2011. "No opting out of Facebook turning your check-ins, likes into ads," Ars Technica (26 January). http://arstechnica.com/business/2011/01/no-opting-out-from-facebook-turning-your-check-ins-likes-into-ads/, accessed 10 December 2013.
-
(2011)
-
-
Cheng, J.1
-
20
-
-
84917078687
-
2. The nature of the firm: Meaning
-
Ronald H. Coase, 1988. "2. The nature of the firm: Meaning," Journal of Law, Economics and Organization, volume 4, number 1, pp. 19-32.
-
(1988)
Journal of Law, Economics and Organization
, vol.4
, Issue.1
, pp. 19-32
-
-
Coase, R.H.1
-
21
-
-
84979188687
-
The nature of the firm
-
Ronald H. Coase, 1937. "The nature of the firm," Economica, New series, volume 4, number 16, pp. 386-405.
-
(1937)
Economica, New series
, vol.4
, Issue.16
, pp. 386-405
-
-
Coase, R.H.1
-
22
-
-
84891896675
-
Examination of privacy policies shows a few troubling trends
-
TechCrunch (30 November), at, accessed 10 December 2013.
-
Devin Coldewey, 2011. "Examination of privacy policies shows a few troubling trends," TechCrunch (30 November), at http://techcrunch.com/2011/11/30/examination-of-privacy-policies-shows-a-few-troubling-trends/, accessed 10 December 2013.
-
(2011)
-
-
Coldewey, D.1
-
23
-
-
84891894948
-
Overview of universal opt-out mechanisms for Web tracking
-
IETF draft (7 March), at, accessed 10 December 2013.
-
A. Cooper and H. Tschofenig, 2011. "Overview of universal opt-out mechanisms for Web tracking," IETF draft (7 March), at http://tools.ietf.org/search/draft-cooper-web-tracking-opt-outs-00, accessed 10 December 2013.
-
(2011)
-
-
Cooper, A.1
Tschofenig, H.2
-
24
-
-
0003047641
-
The cost of Coase
-
Robert Cooter, 1982. "The cost of Coase," Journal of Legal Studies, volume 11, number 1, pp. 1-33.
-
(1982)
Journal of Legal Studies
, vol.11
, Issue.1
, pp. 1-33
-
-
Cooter, R.1
-
25
-
-
0001501223
-
How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use
-
Mary J. Culnan, 1993. "How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use," MIS Quarterly, volume 17, number 3, pp. 341-363.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.J.1
-
26
-
-
72049116025
-
How ethics can enhance organizational privacy: Lessons from the Choicepoint and TJX data breaches
-
Mary J. Culnan and Cynthia Clark Williams, 2009. "How ethics can enhance organizational privacy: Lessons from the Choicepoint and TJX data breaches," MIS Quarterly, volume 33, number 4, pp. 673-687.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 673-687
-
-
Culnan, M.J.1
Williams, C.C.2
-
27
-
-
0038803995
-
Consumer privacy: Balancing economic and justice considerations
-
doi:, accessed 10 December 2013.
-
Mary J. Culnan and Robert J. Bies, 2003. "Consumer privacy: Balancing economic and justice considerations," Journal of Social Issues, volume 59, number 2, pp. 323-342. doi: http://dx.doi.org/10.1111/1540-4560.00067, accessed 10 December 2013.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 323-342
-
-
Culnan, M.J.1
Bies, R.J.2
-
28
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
-
doi:, accessed 10 December 2013.
-
Mary J. Culnan and Pamela K. Armstrong, 1999. "Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation," Organization Science, volume 10, number 1, pp. 104-115. doi: http://dx.doi.org/10.1287/orsc.10.1.104, accessed 10 December 2013.
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
29
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
doi:, accessed 10 December 2013.
-
Tamara Dinev and Paul Hart, 2006. "An extended privacy calculus model for e-commerce transactions," Information Systems Research, volume 17, number 1, pp. 61-80. doi: http://dx.doi.org/10.1287/isre.1060.0080, accessed 10 December 2013.
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
30
-
-
0039216951
-
The case for Coase and against Coaseanism
-
and at, accessed 10 December 2013.
-
Robert C. Ellickson, 1989. "The case for Coase and against Coaseanism," Yale Law Journal, volume 99, pp. 611-630, and at http://digitalcommons.law.yale.edu/fss_papers/462/, accessed 10 December 2013.
-
(1989)
Yale Law Journal
, vol.99
, pp. 611-630
-
-
Ellickson, R.C.1
-
31
-
-
84891895889
-
Disconnect 2 brings more privacy to your browser, lets you block 2K+ sites From tracking your activity online
-
TechCrunch (17 April), at, accessed 10 December 2013.
-
Rip Empson, 2013. "Disconnect 2 brings more privacy to your browser, lets you block 2K+ sites From tracking your activity online," TechCrunch (17 April), at http://techcrunch.com/2013/04/17/disconnect-2-brings-more-privacy-to-your-browser-lets-you-block-2k-sites-from-tracking-your-activity-online/, accessed 10 December 2013.
-
(2013)
-
-
Empson, R.1
-
32
-
-
84891891295
-
Apple keeps anonymized voice data related to virtual assistant Siri for up to 2 years
-
TechCrunch (19 April), at, accessed 10 December 2013.
-
Darrell Etherington, 2013. "Apple keeps anonymized voice data related to virtual assistant Siri for up to 2 years," TechCrunch (19 April), at http://techcrunch.com/2013/04/19/apple-keeps-anonymized-voice-data-related-to-virtual-assistant-siri-for-up-to-2-years/, accessed 10 December 2013.
-
(2013)
-
-
Etherington, D.1
-
33
-
-
33750992195
-
Four challenges for a theory of international privacy
-
doi:, accessed 10 December 2013.
-
Luciano Floridi, 2006. "Four challenges for a theory of international privacy," Ethics and Information Technology, volume 8, number 3, pp. 109-119. doi: http://dx.doi.org/10.1007/s10676-006-9121-3, accessed 10 December 2013.
-
(2006)
Ethics and Information Technology
, vol.8
, Issue.3
, pp. 109-119
-
-
Floridi, L.1
-
34
-
-
79551691593
-
Privacy regulation and online advertising
-
doi:, accessed 10 December 2013.
-
Avi Goldfarb and Catherine E. Tucker, 2011. "Privacy regulation and online advertising," Management Science, volume 57, number 1, pp. 57-71. doi: http://dx.doi.org/10.1287/mnsc.1100.1246, accessed 10 December 2013.
-
(2011)
Management Science
, vol.57
, Issue.1
, pp. 57-71
-
-
Goldfarb, A.1
Tucker, C.E.2
-
35
-
-
84891894652
-
Utilitarianism and business ethics
-
In: Thomas Donaldson and Patricia H. Werhane (editors). Upper Saddle River, N.J.: Pearson/Prentice Hall.
-
Andrew Gustafson, 2008. "Utilitarianism and business ethics," In: Thomas Donaldson and Patricia H. Werhane (editors). Ethical issues in business: A philosophical approach Eighth edition. Upper Saddle River, N.J.: Pearson/Prentice Hall.
-
(2008)
Ethical issues in business: A philosophical approach Eighth edition
-
-
Gustafson, A.1
-
36
-
-
61849128934
-
Consumer privacy and marketing avoidance: A static model
-
doi:, accessed 10 December 2013.
-
Il-Horn Hann, Kai-Lung Hui, Sang-Yong T. Lee, and Ivan P.L. Png, 2008. "Consumer privacy and marketing avoidance: A static model," Management Science, volume 54, number 6, pp. 1,094-1,103. doi: http://dx.doi.org/10.1287/mnsc.1070.0837, accessed 10 December 2013.
-
(2008)
Management Science
, vol.54
, Issue.6
, pp. 1094-1103
-
-
Hann, I.-H.1
Hui, K.-L.2
Lee, S.-Y.T.3
Png, I.P.L.4
-
37
-
-
84874925899
-
The case for online obscurity
-
and at, accessed 10 December 2013.
-
Woodrow Hartzog and Frederic D. Stutzman, 2010. "The case for online obscurity," California Law Review, volume 101, number 1, pp. 1-49, and at http://www.californialawreview.org/assets/pdfs/101-1/01-HartzogStutzman.pdf, accessed 10 December 2013.
-
(2010)
California Law Review
, vol.101
, Issue.1
, pp. 1-49
-
-
Hartzog, W.1
Stutzman, F.D.2
-
38
-
-
84891893493
-
Internet freak-out over Google's new privacy policy proves again that no one actually reads privacy policies
-
Forbes (25 January), at, accessed 10 December 2013.
-
Kashmir Hill, 2012. "Internet freak-out over Google's new privacy policy proves again that no one actually reads privacy policies," Forbes (25 January), at http://www.forbes.com/sites/kashmirhill/2012/01/25/internet-freak-out-over-googles-new-privacy-policy-proves-no-one-actually-reads-privacy-policies/, accessed 10 December 2013.
-
(2012)
-
-
Hill, K.1
-
39
-
-
84891900696
-
The really smart phone
-
(23 April) at, accessed 10 December 2013.
-
Robert Lee Hotz, 2011. "The really smart phone," Wall Street Journal (23 April), at http://online.wsj.com/news/articles/SB10001424052748704547604576263261679848814, accessed 10 December 2013.
-
(2011)
Wall Street Journal
-
-
Hotz, R.L.1
-
40
-
-
79957972012
-
Gender differences in privacy-related measures for young adult Facebook users
-
at, accessed 10 December 2013.
-
Mariea Grubbs Hoy and George Milne, 2010. "Gender differences in privacy-related measures for young adult Facebook users," Journal of Interactive Advertising, volume 10, number 2, at http://jiad.org/article130.html, accessed 10 December 2013.
-
(2010)
Journal of Interactive Advertising
, vol.10
, Issue.2
-
-
Hoy, M.G.1
Milne, G.2
-
41
-
-
80355139531
-
Contextual gaps: Privacy issues on Facebook
-
doi:, accessed 10 December 2013.
-
Gordon Hull, Heather Richter Lipford, and Celine Latulipe, 2011. "Contextual gaps: Privacy issues on Facebook," Ethics and Information Technology, volume 13, number 4, pp. 289-302. doi: http://dx.doi.org/10.1007/s10676-010-9224-8, accessed 10 December 2013.
-
(2011)
Ethics and Information Technology
, vol.13
, Issue.4
, pp. 289-302
-
-
Hull, G.1
Lipford, H.R.2
Latulipe, C.3
-
42
-
-
84891898556
-
The next online privacy battle: Powerful supercookies
-
Atlantic (18 August) at, accessed 10 December 2013.
-
Nicholas Jackson, 2011. "The next online privacy battle: Powerful supercookies," Atlantic (18 August), at http://www.theatlantic.com/technology/archive/2011/08/the-next-online-privacy-battle-powerful-supercookies/243800/, accessed 10 December 2013.
-
(2011)
-
-
Jackson, N.1
-
43
-
-
70350731253
-
A 'nutrition label' for privacy
-
SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security, article. doi:, accessed 10 December 2013.
-
Patrick Gage Kelley, Joanna Bresee, and Lorrie Faith Cranor, and Robert W. Reeder, 2009. "A 'nutrition label' for privacy," SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security, article number 4. doi: http://dx.doi.org/10.1145/1572532.1572538, accessed 10 December 2013.
-
(2009)
, Issue.4
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
-
44
-
-
84891894584
-
Michigan passes law to protect social network account protection bill
-
Verge (30 December) at, accessed 10 December 2013.
-
Ben Kersey, 2012. "Michigan passes law to protect social network account protection bill," Verge (30 December), at http://www.theverge.com/2012/12/30/3817588/michigan-passes-social-network-account-protection-bill, accessed 10 December 2013.
-
(2012)
-
-
Kersey, B.1
-
45
-
-
0004210003
-
Competition and entrepreneurship
-
Chicago: University of Chicago Press.
-
Israel M. Kirzner, 1973. Competition and entrepreneurship. Chicago: University of Chicago Press.
-
(1973)
-
-
Kirzner, I.M.1
-
46
-
-
84881874212
-
The emergence of exchange structures: An experimental study of uncertainty, commitment, and trust
-
Peter Kollock, 1994. "The emergence of exchange structures: An experimental study of uncertainty, commitment, and trust," American Journal of Sociology, volume 100, number 2, pp. 313-345.
-
(1994)
American Journal of Sociology
, vol.100
, Issue.2
, pp. 313-345
-
-
Kollock, P.1
-
47
-
-
84891898600
-
Judge rejects Facebook 'Sponsored Stories' lawsuit settlement
-
Wired (18 August) at, accessed 10 December 2013.
-
David Kravets, 2012. "Judge rejects Facebook 'Sponsored Stories' lawsuit settlement," Wired (18 August), at http://www.wired.com/threatlevel/2012/08/facebook-settlement-rejected/, accessed 10 December 2013.
-
(2012)
-
-
Kravets, D.1
-
48
-
-
78649949513
-
Understanding situational online information disclosure as a privacy calculus
-
Han Li, Rathindra Sarathy, and Heng Xu, 2010. "Understanding situational online information disclosure as a privacy calculus," Journal of Computer Information Systems, volume 51, number 1, pp. 62-71.
-
(2010)
Journal of Computer Information Systems
, vol.51
, Issue.1
, pp. 62-71
-
-
Li, H.1
Sarathy, R.2
Xu, H.3
-
49
-
-
84891896756
-
Study: Usability issues plague tools that limit online behavioral advertising
-
(31 October) at, accessed 10 December 2013.
-
Tom Loftus, 2011. "Study: Usability issues plague tools that limit online behavioral advertising," Wall Street Journal (31 October), at http://blogs.wsj.com/digits/2011/10/31/study-usability-issues-plague-tools-that-limit-online-behavioral-advertising/, accessed 10 December 2013.
-
(2011)
Wall Street Journal
-
-
Loftus, T.1
-
50
-
-
84891892524
-
Dave Morin, CEO of Path: 'If Facebook is a Chevy, then we're a BMW'; 'Family friendly' network pushes 6M users, launches virtual goods
-
Ingrid Lunden, 2013. "Dave Morin, CEO of Path: 'If Facebook is a Chevy, then we're a BMW'; 'Family friendly' network pushes 6M users, launches virtual goods," TechCrunch (21 January), at http://techcrunch.com/2013/01/21/dave-morin-ceo-of-path-says-if-facebook-is-a-chevy-then-were-a-bmw-as-family-friendly-network-pushes-6m-users-looks-to-launch-more-virtual-goods/, accessed 10 December 2013.
-
(2013)
TechCrunch (21 January) at, accessed 10 December 2013.
-
-
Lunden, I.1
-
51
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
Naresh K. Malhorta, Sung S. Kim, and James Agarwal, 2004. "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model," Information Systems Research, volume 15, number 4, pp. 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhorta, N.K.1
Kim, S.S.2
Agarwal, J.3
-
52
-
-
84873318566
-
Some realities of online contracting
-
Florencia Marotta-Wurgler, 2011. "Some realities of online contracting," Supreme Court Economic Review, volume 19, number 1, pp. 11-23.
-
(2011)
Supreme Court Economic Review
, vol.19
, Issue.1
, pp. 11-23
-
-
Marotta-Wurgler, F.1
-
53
-
-
84886266985
-
Privacy concerns and the Census Long Form: Some evidence from Census 2000
-
U.S. Census Bureau, Survey Methodology, number 2006-10, at, accessed 10 December 2013.
-
Elizabeth Martin, 2006. "Privacy concerns and the Census Long Form: Some evidence from Census 2000," U.S. Census Bureau, Survey Methodology, number 2006-10, at http://www.census.gov/srd/papers/pdf/rsm2006-10.pdf, accessed 10 December 2013.
-
(2006)
-
-
Martin, E.1
-
54
-
-
84871311194
-
Diminished or just different? A factorial vignette study of privacy as a social contract
-
doi:, accessed 10 December 2013.
-
Kirsten E. Martin, 2012. "Diminished or just different? A factorial vignette study of privacy as a social contract," Journal of Business Ethics, volume 111, number 4, pp. 519-539. doi: http://dx.doi.org/10.1007/s10551-012-1215-8, accessed 10 December 2013.
-
(2012)
Journal of Business Ethics
, vol.111
, Issue.4
, pp. 519-539
-
-
Martin, K.E.1
-
55
-
-
84891893652
-
TMI (Too Much Information): The role of friction and familiarity in disclosing information
-
at, accessed 10 December 2013.
-
Kirsten E. Martin, 2011. "TMI (Too Much Information): The role of friction and familiarity in disclosing information," Business and Professional Ethics Journal, volume 30, numbers 1-2, at http://faculty.cua.edu/martink/BPEJMartin2011.pdf, accessed 10 December 2013.
-
(2011)
Business and Professional Ethics Journal
, vol.30
, Issue.1-2
-
-
Martin, K.E.1
-
56
-
-
84859016541
-
Tracking the trackers: Where everybody knows your username
-
Center for Internet and Society, Stanford Law School (11 October), at, accessed 10 December 2013.
-
Jonathan Mayer, 2011. "Tracking the trackers: Where everybody knows your username," Center for Internet and Society, Stanford Law School (11 October), at http://cyberlaw.stanford.edu/blog/2011/10/tracking-trackers-where-everybody-knows-your-username, accessed 10 December 2013.
-
(2011)
-
-
Mayer, J.1
-
57
-
-
84862738315
-
Do not track: Universal Web tracking opt-out
-
IAB Internet Privacy Workshop position paper (5 November), at, accessed 10 December 2013.
-
Jonathan Mayer and Avrind Narayanan, 2010. "Do not track: Universal Web tracking opt-out," IAB Internet Privacy Workshop position paper (5 November), at http://www.iab.org/wp-content/IAB-uploads/2011/03/jonathan_mayer.pdf, accessed 10 December 2013.
-
(2010)
-
-
Mayer, J.1
Narayanan, A.2
-
58
-
-
80051634906
-
Cost of reading privacy policies
-
and at, accessed 10 December 2013.
-
Aleecia M. McDonald and Lorrie Faith Cranor, 2008. "Cost of reading privacy policies," I/S: A Journal of Law and Policy for the Information Society, volume 4, number 3, pp. 541-565, and at http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Cranor_Formatted_Final.pdf, accessed 10 December 2013.
-
(2008)
I/S: A Journal of Law and Policy for the Information Society
, vol.4
, Issue.3
, pp. 541-565
-
-
McDonald, A.M.1
Cranor, L.F.2
-
59
-
-
84891897228
-
The law of friction
-
University of Chicago Legal Forum; Minnesota Legal Studies Research Paper, 12-66, at, accessed 10 December 2013.
-
William McGeveran, 2012. "The law of friction," University of Chicago Legal Forum; Minnesota Legal Studies Research Paper, 12-66, at http://ssrn.com/abstract=2192191, accessed 10 December 2013.
-
(2012)
-
-
McGeveran, W.1
-
60
-
-
0004247732
-
Utilitarianism
-
London: Parker, son, and Bourn.
-
John Stuart Mill, 1863. Utilitarianism. London: Parker, son, and Bourn.
-
(1863)
-
-
Mill, J.S.1
-
61
-
-
84878371061
-
Third-party Web tracking: Policy and technology
-
Proceedings of the 2012 IEEE Symposium of Security and Privacy,. doi:, accessed 10 December 2013.
-
John C. Mitchell and Jonathan R. Mayer, 2012. "Third-party Web tracking: Policy and technology," Proceedings of the 2012 IEEE Symposium of Security and Privacy, pp.413-427. doi: http://doi.ieeecomputersociety.org/10.1109/SP.2012.47, accessed 10 December 2013.
-
(2012)
, pp. 413-427
-
-
Mitchell, J.C.1
Mayer, J.R.2
-
62
-
-
80053267657
-
A contextual approach to privacy online
-
at, accessed 10 December 2013.
-
Helen Nissenbaum, 2011. "A contextual approach to privacy online," Daedalus, volume 140, number 4, pp. 32-48, at http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf, accessed 10 December 2013.
-
(2011)
Daedalus
, vol.140
, Issue.4
, pp. 32-48
-
-
Nissenbaum, H.1
-
63
-
-
78049439042
-
Privacy in context: Technology, policy, and the integrity of social life
-
Stanford, Calif.: Stanford Law Books.
-
Helen Nissenbaum, 2010. Privacy in context: Technology, policy, and the integrity of social life. Stanford, Calif.: Stanford Law Books.
-
(2010)
-
-
Nissenbaum, H.1
-
64
-
-
1842538795
-
Privacy as contextual integrity
-
Helen Nissenbaum, 2004. "Privacy as contextual integrity," Washington Law Review, volume 79, number 1, pp. 119-158.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
65
-
-
84873889715
-
Branding privacy
-
and at, accessed 10 December 2013.
-
Paul Ohm, 2013. "Branding privacy," Minnesota Law Review, volume 97, pp. 907-989, and at http://www.minnesotalawreview.org/wp-content/uploads/2013/02/Ohm_MLR.pdf, accessed 10 December 2013.
-
(2013)
Minnesota Law Review
, vol.97
, pp. 907-989
-
-
Ohm, P.1
-
66
-
-
79959279009
-
Unraveling privacy: The personal prospectus and the threat of a full disclosure future
-
and at, accessed 10 December 2013.
-
Scott R. Peppet, 2010. "Unraveling privacy: The personal prospectus and the threat of a full disclosure future," Northwestern University Law Review, volume 105, number 3, pp. 1,153-1,203, and at https://www.law.northwestern.edu/lawreview/v105/n3/1153/LR105n3Peppet.pdf, accessed 10 December 2013.
-
(2010)
Northwestern University Law Review
, vol.105
, Issue.3
, pp. 1153-1203
-
-
Peppet, S.R.1
-
67
-
-
84891900435
-
Private photo And video sharing service For families, Famil.io, is like a dropbox For memories
-
TechCrunch (22 March), at, accessed 10 December 2013.
-
Sarah Perez, 2013a. "Private photo And video sharing service For families, Famil.io, is like a dropbox For memories," TechCrunch (22 March), at http://techcrunch.com/2013/03/22/private-photo-and-video-sharing-service-for-families-famil-io-is-like-a-dropbox-for-memories/, accessed 10 December 2013.
-
(2013)
-
-
Perez, S.1
-
68
-
-
84891898585
-
After getting booted from Apple's App Store, mobile privacy app Clueful returns on Android
-
TechCrunch (21 May)., accessed 10 December 2013.
-
Sarah Perez, 2013b. "After getting booted from Apple's App Store, mobile privacy app Clueful returns on Android," TechCrunch (21 May). http://techcrunch.com/2013/05/21/after-getting-booted-from-apples-app-store-mobile-privacy-app-clueful-returns-on-android/, accessed 10 December 2013.
-
(2013)
-
-
Perez, S.1
-
69
-
-
23944471341
-
An ethical exploration of privacy and radio frequency identification
-
doi:, accessed 10 December 2013.
-
Alan R. Peslak, 2005. "An ethical exploration of privacy and radio frequency identification," Journal of Business Ethics, volume 59, number 4, pp. 327-345. doi: http://dx.doi.org/10.1007/s10551-005-2928-8, accessed 10 December 2013.
-
(2005)
Journal of Business Ethics
, vol.59
, Issue.4
, pp. 327-345
-
-
Peslak, A.R.1
-
70
-
-
0000839286
-
Privacy
-
and at, accessed 10 December 2013.
-
William L. Prosser, 1960. "Privacy," California Law Review, volume 48, number 3, pp. 383-423, and at http://www.californialawreview.org/assets/pdfs/misc/prosser_privacy.pdf, accessed 10 December 2013.
-
(1960)
California Law Review
, vol.48
, Issue.3
, pp. 383-423
-
-
Prosser, W.L.1
-
71
-
-
84859562293
-
The right to be forgotten
-
and at, accessed 10 December 2013.
-
Jeffrey Rosen, 2012. "The right to be forgotten," Stanford Law Review, volume 64, pp. 88-92, and at http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten, accessed 10 December 2013.
-
(2012)
Stanford Law Review
, vol.64
, pp. 88-92
-
-
Rosen, J.1
-
72
-
-
84891893599
-
Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents
-
and at, accessed 10 December 2013.
-
Ira Rubinstein and Nathaniel Good, 2013. "Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents," Berkeley Technology Law Journal, volume 28, pp. 1,333-1,413, and at http://btlj.org/data/articles/28_2/1333-1414_Rubinstein&Good_11262013_Web.pdf, accessed 10 December 2013.
-
(2013)
Berkeley Technology Law Journal
, vol.28
, pp. 1333-1413
-
-
Rubinstein, I.1
Good, N.2
-
73
-
-
0005165090
-
Coase defends Coase: Why lawyers listen and economists do not
-
Stewart Schwab, 1989. "Coase defends Coase: Why lawyers listen and economists do not," Michigan Law Review, volume 87, number 6, pp. 1,171-1,198.
-
(1989)
Michigan Law Review
, vol.87
, Issue.6
, pp. 1171-1198
-
-
Schwab, S.1
-
74
-
-
84950315198
-
Beyond notice and choice: Privacy, norms, and consent
-
at, accessed 10 December 2013.
-
Richard H. Sloan and Robert Warner, 2013. "Beyond notice and choice: Privacy, norms, and consent," Suffolk University Journal of High Technology Law, at http://ssrn.com/abstract=2239099, accessed 10 December 2013.
-
(2013)
Suffolk University Journal of High Technology Law
-
-
Sloan, R.H.1
Warner, R.2
-
75
-
-
81355150537
-
Information privacy research: An interdisciplinary review
-
H. JeffSmith, Tamara Dinev, and Heng Xu, 2011. "Information privacy research: An interdisciplinary review," MIS Quarterly, volume 35, number 4, pp. 989-1,015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
76
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about corporate practices
-
H. JeffSmith, Sandra J. Milberg, and Sandra J. Burke, 1996. "Information privacy: Measuring individuals' concerns about corporate practices," MIS Quarterly, volume 20, number 2, pp. 167-196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
77
-
-
33644925852
-
A taxonomy of privacy
-
and at, accessed 10 December 2013.
-
Daniel J. Solove, 2006. "A taxonomy of privacy," University of Pennsylvania Law Review, volume 154, number 3, pp. 477-560, and at https://www.law.upenn.edu/journals/lawreview/articles/volume154/issue3/Solove154U. Pa. L. Rev.477%282006%29.pdf, accessed 10 December 2013.
-
(2006)
University of Pennsylvania Law Review
, vol.154
, Issue.3
, pp. 477-560
-
-
Solove, D.J.1
-
78
-
-
0036045758
-
Conceptualizing privacy
-
and at, accessed 10 December 2013.
-
Daniel J. Solove, 2002. "Conceptualizing privacy," California Law Review, volume 90, number 4, pp. 1,087-1,155, and at http://scholarship.law.berkeley.edu/californialawreview/vol90/iss4/2/, accessed 10 December 2013.
-
(2002)
California Law Review
, vol.90
, Issue.4
, pp. 1087-1155
-
-
Solove, D.J.1
-
79
-
-
3042749885
-
Information privacy law
-
Fourth edition. New York: Wolters Kluwer Law & Business.
-
Daniel J. Solove and Paul M. Schwartz., 2011. Information privacy law. Fourth edition. New York: Wolters Kluwer Law & Business.
-
(2011)
-
-
Solove, D.J.1
Schwartz, P.M.2
-
80
-
-
60449120378
-
Engineering privacy
-
doi:, accessed 10 December 2013
-
Sarah Spiekermann and Lorrie Faith Cranor, 2009. "Engineering privacy," IEEE Transactions on Software Engineering, volume 35, number 1, pp. 67-82. doi: http://dx.doi.org/10.1109/TSE.2008.88, accessed 10 December 2013.
-
(2009)
IEEE Transactions on Software Engineering
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
Cranor, L.F.2
-
81
-
-
0036004583
-
An empirical examination of the concern for information privacy instrument
-
doi:, accessed 10 December 2013.
-
Kathy A. Stewart and Albert H. Segars, 2002. "An empirical examination of the concern for information privacy instrument," Information Systems Research, volume 13, number 1, pp. 36-49. doi: http://dx.doi.org/10.1287/isre.13.1.36.97, accessed 10 December 2013.
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
82
-
-
84856148882
-
Simple demographics often identify people uniquely
-
Data Privacy Working Paperat, accessed 10 December 2013.
-
Latanya Sweeney, 2000. "Simple demographics often identify people uniquely," Carnegie Mellon University, Data Privacy Working Paper, number 3, at http://dataprivacylab.org/projects/identifiability/paper1.pdf, accessed 10 December 2013.
-
(2000)
Carnegie Mellon University
, Issue.3
-
-
Sweeney, L.1
-
83
-
-
84873689219
-
Social networks, privacy, and freedom of association: Data empowerment vs. data protection
-
at, accessed 10 December 2013.
-
Peter Swire, 2012. "Social networks, privacy, and freedom of association: Data empowerment vs. data protection," North Carolina Law Review, volume 90, number 5, pp. 1,371-1,416, at http://www.nclawreview.org/2012/10/social-networks-privacy-and-freedom-of-association-data-protection-vs-data-empowerment/, accessed 10 December 2013.
-
(2012)
North Carolina Law Review
, vol.90
, Issue.5
, pp. 1371-1416
-
-
Swire, P.1
-
84
-
-
0004052665
-
The possibility of cooperation
-
New York: Cambridge University Press.
-
Michael Taylor, 1987. The possibility of cooperation. New York: Cambridge University Press.
-
(1987)
-
-
Taylor, M.1
-
85
-
-
84866107712
-
Privacy in the age of big data: A time for big decisions
-
at, accessed 10 December 2013.
-
Omer Tene and Jules Polonetsky, 2012. "Privacy in the age of big data: A time for big decisions," Stanford Law Review, volume 64, pp. 63-69, at http://www.stanfordlawreview.org/online/privacy-paradox/big-data, accessed 10 December 2013.
-
(2012)
Stanford Law Review
, vol.64
, pp. 63-69
-
-
Tene, O.1
Polonetsky, J.2
-
86
-
-
84891896195
-
-
"Terms of Service; Didn't Read" (TOS;DR, accessed 10 December 2013.
-
"Terms of Service; Didn't Read" (TOS;DR http://tosdr.org, accessed 10 December 2013.
-
-
-
-
87
-
-
84891894622
-
Web-connected cars bring privacy concerns
-
Washington Post (5 March), at, accessed 10 December 2013.
-
Craig Timberg, 2013. "Web-connected cars bring privacy concerns," Washington Post (5 March), at http://articles.washingtonpost.com/2013-03-05/business/37453419_1_car-insurance-companies-new-cars-seat-belt, accessed 10 December 2013.
-
(2013)
-
-
Timberg, C.1
-
88
-
-
84891892277
-
Google Play privacy slip-up sends app buyers personal details to developers
-
ZDNet (13 February) at, accessed 10 December 2013.
-
Liam Tung, 2013. "Google Play privacy slip-up sends app buyers personal details to developers," ZDNet (13 February), at http://www.zdnet.com/google-play-privacy-slip-up-sends-app-buyers-personal-details-to-developers-7000011249/, accessed 10 December 2013.
-
(2013)
-
-
Tung, L.1
-
89
-
-
77956141828
-
Americans reject tailored advertising and three activities that enable it
-
at, accessed 10 December 2013.
-
Joseph Turow, Jennifer King, Christopher J. Hoofnagle, Amy Bleakley, and Michael Hennessy, 2009. "Americans reject tailored advertising and three activities that enable it," at https://www.nytimes.com/packages/pdf/business/20090929-Tailored_Advertising.pdf, accessed 10 December 2013.
-
(2009)
-
-
Turow, J.1
King, J.2
Hoofnagle, C.J.3
Bleakley, A.4
Hennessy, M.5
-
90
-
-
84865029187
-
Protecting consumer privacy in an era of rapid chang
-
U.S. Federal Trade Commission., (5 March), at, accessed 10 December 2013.
-
U.S. Federal Trade Commission., 2012a. "Protecting consumer privacy in an era of rapid change" (5 March), at http://www.ftc.gov/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations, accessed 10 December 2013.
-
(2012)
-
-
-
91
-
-
84872412140
-
Fair information practice principle
-
U.S. Federal Trade Commission., (23 November), at
-
U.S. Federal Trade Commission., 2012b. "Fair information practice principles" (23 November), at http://www.gov/reports/privacy3/fairinfo.shtm
-
(2012)
-
-
-
92
-
-
84861393010
-
Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy
-
U.S. White House, at, accessed 10 December 2013.
-
U.S. White House, 2012. "Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy," at http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, accessed 10 December 2013.
-
(2012)
-
-
-
93
-
-
33644925628
-
The internal morality of contracting: Advancing the contractualist endeavor in business ethics
-
J. (Hans) van Oosterhout, Pursey P. M. A. R. Heugens and Muel Kaptein, 2006. "The internal morality of contracting: Advancing the contractualist endeavor in business ethics," Academy of Management Review, volume 31, number 3, pp. 521-539.
-
(2006)
Academy of Management Review
, vol.31
, Issue.3
, pp. 521-539
-
-
Oosterhout, J.V.1
Heugens, P.P.M.A.R.2
Kaptein, M.3
-
94
-
-
0038803983
-
Social and political dimensions of privacy
-
Alan F. Westin, 2003. "Social and political dimensions of privacy," Journal of Social Issues, volume 59, number 2, pp. 431-453.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 431-453
-
-
Westin, A.F.1
-
95
-
-
84877994062
-
Unpacking privacy's price
-
Jan Whittington and Chris Jay Hoofnagle, 2012. "Unpacking privacy's price," North Carolina Law Review, volume 90, number 5, pp. 1,327-1,370.
-
(2012)
North Carolina Law Review
, vol.90
, Issue.5
, pp. 1327-1370
-
-
Whittington, J.1
Hoofnagle, C.J.2
-
96
-
-
84891900156
-
Internet privacy policies: A composite index For measuring compliance to the fair information practices at
-
Felicia Williams, 2006, "Internet privacy policies: A composite index For measuring compliance to the fair information practices," at http://ftc.gov/os/comments/behavioraladvertising/071010feliciawilliams.pdf.
-
(2006)
-
-
Williams, F.1
-
97
-
-
33747390174
-
The economics of governance
-
doi:, accessed 10 December 2013.
-
Oliver E. Williamson, 2005. "The economics of governance," American Economic Review, volume 95, number 2, pp. 1-18. doi: http://dx.doi.org/10.1257/000282805774669880, accessed 10 December 2013.
-
(2005)
American Economic Review
, vol.95
, Issue.2
, pp. 1-18
-
-
Williamson, O.E.1
-
98
-
-
0038895695
-
The theory of the firm as governance structure: From choice to contract
-
doi:, accessed 10 December 2013.
-
Oliver E. Williamson, 2002. "The theory of the firm as governance structure: From choice to contract," Journal of Economic Perspectives, volume 16, number 3, pp. 171-195. doi: http://dx.doi.org/10.1257/089533002760278776, accessed 10 December 2013.
-
(2002)
Journal of Economic Perspectives
, vol.16
, Issue.3
, pp. 171-195
-
-
Williamson, O.E.1
-
99
-
-
85022739470
-
Calculativeness, trust, and economic organization
-
doi:, accessed 10 December 2013.
-
Oliver E. Williamson, 1993. "Calculativeness, trust, and economic organization," Journal of Law and Economics, volume 36, number 1, part 2, pp. 453-486. doi: http://dx.doi.org/10.1086/467284, accessed 10 December 2013.
-
(1993)
Journal of Law and Economics
, vol.36
, Issue.1-2
, pp. 453-486
-
-
Williamson, O.E.1
-
100
-
-
84881832826
-
The economics of organization: The transaction cost approach
-
doi:, accessed 10 December 2013.
-
Oliver E. Williamson, 1981. "The economics of organization: The transaction cost approach," American Journal of Sociology, volume 87, number 3, pp. 548-577. doi: http://dx.doi.org/10.1086/227496, accessed 10 December 2013.
-
(1981)
American Journal of Sociology
, vol.87
, Issue.3
, pp. 548-577
-
-
Williamson, O.E.1
-
101
-
-
0001470630
-
Transaction-cost economics: The governance of contractual relations
-
Oliver E. Williamson, 1979. "Transaction-cost economics: The governance of contractual relations," Journal of Law and Economics, volume 22, number 2, pp. 233-261.
-
(1979)
Journal of Law and Economics
, vol.22
, Issue.2
, pp. 233-261
-
-
Williamson, O.E.1
-
102
-
-
0003965377
-
Markets and hierarchies, analysis and antitrust implications: A study in the economics of internal organization
-
New York: Free Press.
-
Oliver E. Williamson, 1975. Markets and hierarchies, analysis and antitrust implications: A study in the economics of internal organization. New York: Free Press.
-
(1975)
-
-
Williamson, O.E.1
-
103
-
-
84891892610
-
Exploring the role of overt vs. covert personalization strategy in privacy calculus
-
Academy of Management Proceedings (August Meeting Abstract Supplement)doi:, accessed 10 December 2013.
-
Heng Xu, Cheng Zhang, Pan Shi, and Peijian Song, 2009. "Exploring the role of overt vs. covert personalization strategy in privacy calculus," Academy of Management Proceedings (August Meeting Abstract Supplement), pp. 1-6. doi: http://dx.doi.org/10.5465/AMBPP.2009.44249857, accessed 10 December 2013.
-
(2009)
, pp. 1-6
-
-
Xu, H.1
Zhang, C.2
Shi, P.3
Song, P.4
|