-
1
-
-
75149142201
-
Nudging privacy: The behavioral economics of personal information
-
November/December 2009
-
Acquisti, A. (2009), Nudging privacy: The behavioral economics of personal information. Security & Privacy Economics. November/December 2009.
-
(2009)
Security & Privacy Economics
-
-
Acquisti, A.1
-
2
-
-
14744275332
-
Privacy and rationality in individual decision making
-
January-February
-
Acquisti, A., Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy. January-February, 24-30.
-
(2005)
IEEE Security & Privacy
, pp. 24-30
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
84883067343
-
Sleights of privacy: Framing, disclosures, and the limits of transparency
-
Article No. 9
-
Adjerid, I., Acquisti, Brandimarte, L. & Loewenstein, G. (2013). Sleights of privacy: Framing, disclosures, and the limits of transparency. SOUPS '13 Proceedings of the ninth symposium on usable privacy and security, Article No. 9.
-
(2013)
SOUPS '13 Proceedings of the ninth symposium on usable privacy and security
-
-
Adjerid, I.1
Acquisti, B.L.2
Loewenstein, G.3
-
7
-
-
85030096558
-
-
University of Washington School of Law Research Paper No. 2013-27; 2013-08-15
-
Calo, M. R. (2013), Digital market manipulation, University of Washington School of Law Research Paper No. 2013-27; 2013-08-15.
-
(2013)
Digital market manipulation
-
-
Calo, M.R.1
-
8
-
-
35248867327
-
Data mining and group profiling on the internet
-
AntonVedder (Ed.), Antwerpen: Intersentia
-
Custers, B. H. M. (2001). Data mining and group profiling on the internet. In Anton. Vedder (Ed.), Ethics and the internet (pp. 87-104). Antwerpen: Intersentia.
-
(2001)
Ethics and the Internet
, pp. 87-104
-
-
Custers, B.H.M.1
-
10
-
-
84901602891
-
Informed consent in social media use. The gap between user expectations and EU personal data protection law
-
Custers, B., van der Hof, S., Schermer, B., Appleby-Arnold, S., & Brockdorff, N. (2013). Informed consent in social media use. The gap between user expectations and EU personal data protection law. Journal of Law and Technology, 10(4), 435-457.
-
(2013)
Journal of Law and Technology
, vol.10
, Issue.4
, pp. 435-457
-
-
Custers, B.1
van der Hof, S.2
Schermer, B.3
Appleby-Arnold, S.4
Brockdorff, N.5
-
12
-
-
84925182304
-
The moral magic of consent
-
Hurd, H. M. (1996). The moral magic of consent. Legal Theory, 2, 121.
-
(1996)
Legal Theory
, vol.2
, pp. 121
-
-
Hurd, H.M.1
-
13
-
-
84901617204
-
-
Internet Society, Accessed February 14, 2014
-
Internet Society. (2012). Global internet user survey, summary report. http://www. internetsociety. org/sites/default/files/rep-GIUS2012global-201211-en. pdf. Accessed February 14, 2014.
-
(2012)
Global internet user survey, summary report
-
-
-
14
-
-
33645299546
-
Debiasing through law
-
Jolls, C., & Sunstein, C. (2006). Debiasing through law. The Journal for Legal Studies, 35(1), 199.
-
(2006)
The Journal for Legal Studies
, vol.35
, Issue.1
, pp. 199
-
-
Jolls, C.1
Sunstein, C.2
-
15
-
-
84920569586
-
The nature of consent
-
(Miller & Wertheim, ed.), New York: Oxford University Press
-
Kleinig, J. (2010). The nature of consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press.
-
(2010)
The ethics of consent: Theory and practice
-
-
Kleinig, J.1
-
18
-
-
84901639953
-
Nano-notice: Privacy disclosure at a mobile scale
-
McDonald, M., & Lowenthal, T. (2013). Nano-notice: Privacy disclosure at a mobile scale. Journal of Information Policy, 3(2013), 331-354.
-
(2013)
Journal of Information Policy
, vol.3
, Issue.2013
, pp. 331-354
-
-
McDonald, M.1
Lowenthal, T.2
-
19
-
-
77955313361
-
Preface to a theory of consent: beyond valid consent
-
(Miller & Wertheim, ed.), New York: Oxford University Press
-
Miller, F. G. & Wertheim, A. (2010). Preface to a theory of consent: beyond valid consent. In The ethics of consent: Theory and practice (Miller & Wertheim, ed.), New York: Oxford University Press.
-
(2010)
The ethics of consent: Theory and practice
-
-
Miller, F.G.1
Wertheim, A.2
-
20
-
-
80054959388
-
The fair transaction model of informed consent: An alternative to autonomous authorization
-
Miller, F. G., & Wertheim, A. (2011). The fair transaction model of informed consent: An alternative to autonomous authorization. Kennedy Institute of Ethics Journal, 21(3), 201.
-
(2011)
Kennedy Institute of Ethics Journal
, vol.21
, Issue.3
, pp. 201
-
-
Miller, F.G.1
Wertheim, A.2
-
21
-
-
80053267657
-
A contextual approach to privacy online
-
Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32-48.
-
(2011)
Daedalus
, vol.140
, Issue.4
, pp. 32-48
-
-
Nissenbaum, H.1
-
22
-
-
34548433382
-
What's wrong with online privacy policies?
-
Pollach, I. (2007). What's wrong with online privacy policies? Communications of the ACM, 50(9), 103-108.
-
(2007)
Communications of the ACM
, vol.50
, Issue.9
, pp. 103-108
-
-
Pollach, I.1
-
25
-
-
84877983179
-
Privacy self-management and the consent dilemma
-
Solove, D. J. (2013). Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880-1903.
-
(2013)
Harvard Law Review
, vol.126
, pp. 1880-1903
-
-
Solove, D.J.1
-
26
-
-
84867313472
-
What happens to my data? A novel approach to informing users of data processing practices
-
van den Berg, B., & van der Hof, S. (2012). What happens to my data? A novel approach to informing users of data processing practices. First Monday, 17(7), 2.
-
(2012)
First Monday
, vol.17
, Issue.7
, pp. 2
-
-
van den Berg, B.1
van der Hof, S.2
|