-
1
-
-
84908230216
-
-
available at last accessed 24 March
-
Costello, S., How Many Apps are in the iPhone App Store, available at: http://ipod.about.com/od/iphonesoftwareterms/qt/apps-inapp-store.htm (last accessed 24 March 2014)
-
(2014)
How Many Apps Are in the IPhone App Store
-
-
Costello, S.1
-
2
-
-
84908249165
-
Andorid@mobile world congress: It's all about the ecosystem
-
27 Feb available at last accessed 20 March 2014
-
Rubin, A., Andorid@Mobile World Congress: It's all about the Ecosystem (Google Mobile Blog 27 Feb. 2012), available at: http://googlemobile.blogspot.com/2012/02/androidmobile-world-congress-its-all.html (last accessed 20 March 2014)
-
(2012)
Google Mobile Blog
-
-
Rubin, A.1
-
3
-
-
84908251131
-
-
No equivalent studies have been conducted in China. This survey was conducted in the USA September available at last accessed 24 March 2014
-
No equivalent studies have been conducted in China. This survey was conducted in the USA. Boyles, J.L., Smith, A. & Madden, M. Privacy and Data Management on Mobile Devices (5 September 2012) , available at: http://pewinternet.org/Reports/2012/Mobile-Privacy. aspx (last accessed 24 March 2014)
-
(2012)
Privacy and Data Management on Mobile Devices
, vol.5
-
-
Boyles, J.L.1
Smith, A.M.2
-
4
-
-
84908248964
-
-
15 September available at last accessed 15 March 2014
-
See generally,A rnes, A. & Nes, C. What Does Your App Know About You? (15 September 2011), available at: http://www.datatilsynet. no/Global/english/APPrappenglish.pdf (last accessed 15 March 2014)
-
(2011)
What Does Your App Know about You
-
-
Arnes, A.1
Nes, C.2
-
10
-
-
84908239381
-
-
Article 29 Data Protection Working Party (February 2013), available at last accessed 27 March 2014
-
Article 29 Data Protection Working Party (February 2013), available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp202-en.pdf (last accessed 2 7 March 2014)
-
-
-
-
11
-
-
70349593268
-
The gramm-leach-bliley act, information privacy and the limits of default rules
-
Janger, E.J. & Schwartz, P.M. (2002) The Gramm-Leach-Bliley Act, Information privacy and the limits of default rules, Minnesota Law Review, 86: 1219-1230
-
(2002)
Minnesota Law Review
, vol.86
, pp. 1219-1230
-
-
Janger, E.J.1
Schwartz, P.M.2
-
13
-
-
84908223456
-
-
(2012e2013), available at: last accessed 1 April emphasis added by author
-
Mobile App Maker privacy policy (2012e2013), available at: http://www.mobileappmaker.com/privacy-policy/(last accessed 1 April, 2014); emphasis added by author
-
(2014)
Mobile App Maker Privacy Policy
-
-
-
14
-
-
84908240637
-
-
ABCYa.com, Apps for kids available at last accessed 1 April 2014 emphasis added by author
-
ABCYa.com, Apps for kids (2012), available at: http://www.abcya.com/mobile-app-privacy-policy.htm (last accessed 1 April 2014); emphasis added by author
-
(2012)
-
-
-
15
-
-
84873934205
-
The federal trade commission and consumer privacy in the coming decade, i/s
-
A similar view has also been discussed by
-
A similar view has also been discussed by Turow, J. et al. (2007) The federal trade commission and consumer privacy in the coming decade, I/S, Journal of Law &Policy for Information Soci ety 3(3): 723-724
-
(2007)
Journal of Law &policy for Information Society
, vol.3
, Issue.3
, pp. 723-724
-
-
Turow, J.1
-
16
-
-
0023324565
-
Perception of risk
-
Slovic, P. (1987) Perception of risk, Science, 236(4799): 280-285
-
(1987)
Science
, vol.236
, Issue.4799
, pp. 280-285
-
-
Slovic, P.1
-
17
-
-
84908252565
-
-
For further discussion available at last accessed, 15 March 2014
-
For further discussion, see Calo, M.R. Against notice skepticism in privacy (2011), available at http://ssrn.com/abstract¼1790144 (last accessed, 15 March 2014)
-
(2011)
Against Notice Skepticism in Privacy
-
-
Calo, M.R.1
-
18
-
-
84908257739
-
-
(Strandburg, K.J. & Raicu, D.S. eds
-
See, Acquisti, A. & Grossklags, J. (2006) Privacy and rationality: A survey, Privacy and Technologies of Identity 15, 16 (Strandburg, K.J. & Raicu, D.S. eds)
-
(2006)
Privacy and Rationality: A Survey, Privacy and Technologies of Identity
, vol.15
, pp. 16
-
-
Acquisti, A.1
Grossklags, J.2
-
19
-
-
84995590301
-
What can behavioral economics teach us about privacy
-
(Acquisti, A & Gritzalis, S. et al. eds.
-
Acquisti , A. & Grossklags, J. (2008) What can behavioral economics teach us about privacy? Digital Privacy: 363-369 (Acquisti, A & Gritzalis, S. et al. eds.).
-
(2008)
Digital Privacy
, pp. 363-369
-
-
Acquisti, A.1
Grossklags, J.2
-
21
-
-
84908247464
-
-
We Chat is a social app that gathers all of the user's sharing and communication tools in one place, including video calls, text messages and im ages. It's an easy way to connect with friends across all platforms. Read more: WeChat e Free download and software reviews e CNET Download.com last accessed, 11 April 20 14
-
WeChat is a social app that gathers all of the user's sharing and communication tools in one place, including video calls, text messages and im ages. It's an easy way to connect with friends across all platforms. Read more: WeChat e Free download and software reviews e CNET Download.com http://download.cnet. com/WeChat/3000-12941-4-75703835.html#ixzz2yZCcgN8g (last accessed, 11 April 20 14)
-
-
-
-
22
-
-
0345880365
-
The zones of cyberspace
-
Lessig, L. (1996), The Zones of Cyberspace, Stanford Law Review 1, 48: 403e1411
-
(1996)
Stanford Law Review
, vol.1
, Issue.48
, pp. 403e1411
-
-
Lessig, L.1
-
23
-
-
0038006949
-
When code isn't law
-
Wu, T. (2003), When Code Isn't Law, Virginia Law Review, 89: 103e170
-
(2003)
Virginia Law Review
, vol.89
, pp. 103e170
-
-
Wu, T.1
-
24
-
-
84877983179
-
Introduction: Privacy self-management and the consent dilemma
-
Solove, D.J. (2013) Introduction: Privacy self-management and the consent dilemma, Harvard Law Review, 1900, 126:1880e1903
-
(2013)
Harvard Law Review
, vol.1900
, Issue.126
, pp. 1880e1903
-
-
Solove, D.J.1
-
25
-
-
84908247544
-
-
25 July 2012) (last accessed 17 April
-
Report from iResearch, http://bbs.360.cn/5295927/254544894. html?recommend¼1 (25 July 2012) (last accessed 17 April 2014)
-
(2014)
Report from IResearch
-
-
-
26
-
-
84908254997
-
-
For more about 360 Mobile Safe last accessed 17 April (2005e2013
-
For more about 360 Mobile Safe, see Products and Services, Qihu 360 Technology http://corp.360.cn/ps/coresecuritylayer. html#3ms (2005e2013) (last accessed 17 April 2014)
-
(2014)
Products and Services, Qihu 360 Technology
-
-
-
27
-
-
84908226469
-
-
Privacy by Design means that privacy and data protection are embedded throughout the entire life cycle of technologies, from the early design stage to their deployment, use and ultimate disposal For more discussion, see 2014 (last accessed 20 April 2014
-
Privacy by Design means that privacy and data protection are embedded throughout the entire life cycle of technologies, from the early design stage to their deployment, use and ultimate disposal. For more discussion, see http://privacybydesign.ca (2014) (last accessed 20 April 2014)
-
-
-
|