-
1
-
-
3242812017
-
Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce (pp. 21–29)
-
Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce (pp. 21–29). ACM.
-
(2004)
ACM
-
-
Acquisti, A.1
-
2
-
-
75149142201
-
Nudging privacy: the behavioral economics of personal information
-
Acquisti, A. (2009). Nudging privacy: the behavioral economics of personal information. IEEE Security and Privacy Magazine, 7(6), 82–85.
-
(2009)
IEEE Security and Privacy Magazine
, vol.7
, Issue.6
, pp. 82-85
-
-
Acquisti, A.1
-
4
-
-
84963970476
-
The economics and behavioral economics of privacy
-
Privacy, big data, and the public good: Frameworks for engagement. Cambridge University Press
-
Acquisti, A. (2014). The economics and behavioral economics of privacy. In: J. Lane, V. Stodden, S. Bender, H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement. Cambridge University Press.
-
(2014)
-
-
Acquisti, A.1
Lane, V.S.2
Bender, S.3
Nissenbaum, H.4
-
5
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy Magazine, 3(1), 26–33.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
6
-
-
14744280530
-
Conditioning prices on purchase history
-
Acquisti, A., & Varian, H. (2005). Conditioning prices on purchase history. Marketing Science, 24(3), 367–381.
-
(2005)
Marketing Science
, vol.24
, Issue.3
, pp. 367-381
-
-
Acquisti, A.1
Varian, H.2
-
7
-
-
84870158114
-
Is there a cost to privacy breaches? An event study analysis
-
ICIS, Milwaukee
-
Acquisti, A., Friedman, A., Telang, R. (2006). Is there a cost to privacy breaches? An event study analysis. Proc International Conference on Information Systems (ICIS), Milwaukee.
-
(2006)
Proc International Conference on Information Systems
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
8
-
-
84883690601
-
What is privacy worth?
-
Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274.
-
(2013)
The Journal of Legal Studies
, vol.42
, Issue.2
, pp. 249-274
-
-
Acquisti, A.1
John, L.K.2
Loewenstein, G.3
-
9
-
-
33750687395
-
The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization
-
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28.
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 13-28
-
-
Awad, N.F.1
Krishnan, M.S.2
-
10
-
-
16444368611
-
Privacy in e-commerce: stated preferences vs. actual behavior
-
Berendt, B., Guenther, O., & Spiekermann, S. (2005). Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101–106.
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Guenther, O.2
Spiekermann, S.3
-
11
-
-
78650136870
-
Valuating privacy with option pricing theory
-
Moore T, Pym D, Ioannidis C, (eds), Springer, New York
-
Berthold, S., & Böhme, R. (2009). Valuating privacy with option pricing theory. In T. Moore, D. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 187–209). New York: Springer.
-
(2009)
Economics of information security and privacy
, pp. 187-209
-
-
Berthold, S.1
Böhme, R.2
-
12
-
-
34948903742
-
Pricing strategies in electronic marketplaces with privacy-enhancing technologies
-
Böhme, R., & Koble, S. (2007). Pricing strategies in electronic marketplaces with privacy-enhancing technologies. Wirtschaftsinformatik, 49(1), 16–25.
-
(2007)
Wirtschaftsinformatik
, vol.49
, Issue.1
, pp. 16-25
-
-
Böhme, R.1
Koble, S.2
-
13
-
-
77954716855
-
Privacy in online social lending. Proc AAAI Spring Symposium: Intelligent Information Privacy Management
-
Böhme, R., & Pötzsch, S. (2010). Privacy in online social lending. Proc AAAI Spring Symposium: Intelligent Information Privacy Management, Palo Alto, pp 23–28.
-
(2010)
Palo Alto
, pp. 23-28
-
-
Böhme, R.1
Pötzsch, S.2
-
15
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
Chaum, D. (1985). Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030–1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
0002071502
-
The problem of social cost
-
Coase, R. (1960). The problem of social cost. Journal of Law and Economics, 3(1), 1–44.
-
(1960)
Journal of Law and Economics
, vol.3
, Issue.1
-
-
Coase, R.1
-
17
-
-
70849117794
-
Web privacy with P3P
-
Cranor, L. F. (2002). Web privacy with P3P. O’Reilly.
-
(2002)
O’Reilly
-
-
Cranor, L.F.1
-
18
-
-
67650871152
-
How much is location privacy worth?
-
WEIS, Harvard Univ
-
Danezis, G., Lewis, S., Anderson, R. J. (2005). How much is location privacy worth? Proc 4th annual Workshop on the Economics of Information Security (WEIS), Harvard Univ.
-
(2005)
Proc 4th annual Workshop on the Economics of Information Security
-
-
Danezis, G.1
Lewis, S.2
Anderson, R.J.3
-
19
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
20
-
-
78650804208
-
A firm foundation for private data analysis
-
Dwork, C. (2011). A firm foundation for private data analysis. Communications of the ACM, 54(1), 86–95.
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
21
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Gentry, C. (2010). Computing arbitrary functions of encrypted data. Communications of the ACM, 53(3), 97–105.
-
(2010)
Communications of the ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
22
-
-
84871380312
-
Online advertising, behavioral targeting, and privacy
-
Goldfarb, A., & Tucker, C. (2011). Online advertising, behavioral targeting, and privacy. Communications of the ACM, 54(5), 25–27.
-
(2011)
Communications of the ACM
, vol.54
, Issue.5
, pp. 25-27
-
-
Goldfarb, A.1
Tucker, C.2
-
23
-
-
67650897413
-
When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information
-
Grossklags, J., & Acquisti, A. (2007). When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In: WEIS.
-
(2007)
In: WEIS
-
-
Grossklags, J.1
Acquisti, A.2
-
25
-
-
38349195111
-
Overcoming online information privacy concerns: an information processing theory approach
-
Hann, I. H., Hui, K. L., Lee, T. S. Y., & Png, I. P. L. (2007). Overcoming online information privacy concerns: an information processing theory approach. Journal of Management Information Systems, 42(2), 13–42.
-
(2007)
Journal of Management Information Systems
, vol.42
, Issue.2
, pp. 13-42
-
-
Hann, I.H.1
Hui, K.L.2
Lee, T.S.Y.3
Png, I.P.L.4
-
26
-
-
1642281602
-
Privacy-enhancing identity management
-
Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., & Waidner, M. (2004). Privacy-enhancing identity management. Information Security Technical Report, 9(1), 35–44.
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clauß, S.4
Pfitzmann, A.5
Waidner, M.6
-
27
-
-
37849185652
-
Welfare implications of user innovation
-
Henkel, J., & von Hippel, E. (2005). Welfare implications of user innovation. Journal of Technology Transfer, 30(1/2), 73–87.
-
(2005)
Journal of Technology Transfer
, vol.30
, Issue.1-2
, pp. 73-87
-
-
Henkel, J.1
von Hippel, E.2
-
28
-
-
84873952528
-
Internet privacy concerns: an integrated conceptualization and four empirical studies
-
Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.
-
(2013)
MIS Quarterly
, vol.37
, Issue.1
, pp. 275-298
-
-
Hong, W.1
Thong, J.Y.L.2
-
29
-
-
27644505323
-
Valuating privacy
-
Huberman, B. A., Adar, E., & Fine, L. R. (2005). Valuating privacy. IEEE Security and Privacy Magazine, 3(1), 22–25.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.1
, pp. 22-25
-
-
Huberman, B.A.1
Adar, E.2
Fine, L.R.3
-
30
-
-
85018123777
-
The economics of privacy. In: T. J. Hendershott (ed), Handbooks in information systems. Vol 1 (pp. 471–493)
-
Hui, K. L., & Png, I. P. L. (2006). The economics of privacy. In: T. J. Hendershott (ed), Handbooks in information systems. Vol 1 (pp. 471–493). Elsevier.
-
(2006)
Elsevier
-
-
Hui, K.L.1
Png, I.P.L.2
-
31
-
-
33847712553
-
The value of privacy assurance: an exploratory field experiment
-
Hui, K. L., Teo, H. H., & Lee, T. S. Y. (2007). The value of privacy assurance: an exploratory field experiment. MIS Quarterly, 31(1), 19–33.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 19-33
-
-
Hui, K.L.1
Teo, H.H.2
Lee, T.S.Y.3
-
33
-
-
85018130163
-
In: Twitter usage [Online]
-
Internet Life Stats (2014). In: Twitter usage [Online]. Available at: http://www.internetlivestats.com/twitter-statistics/#trend.
-
(2014)
Available at:
-
-
Stats, I.L.1
-
35
-
-
78751545877
-
Strangers on a plane: context-dependent willingness to divulge personal information
-
John, L., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: context-dependent willingness to divulge personal information. Journal of Consumer Research, 37(5), 858–873.
-
(2011)
Journal of Consumer Research
, vol.37
, Issue.5
, pp. 858-873
-
-
John, L.1
Acquisti, A.2
Loewenstein, G.3
-
36
-
-
0036431099
-
Applying digital rights management systems to privacy rights management
-
Kenny, S., & Korba, L. (2002). Applying digital rights management systems to privacy rights management. Computers & Security, 21(7), 648–664.
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 648-664
-
-
Kenny, S.1
Korba, L.2
-
37
-
-
0030241302
-
Markets and privacy
-
Laudon, K. C. (1996). Markets and privacy. Communications of the ACM, 39(9), 92–104.
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 92-104
-
-
Laudon, K.C.1
-
39
-
-
33748519577
-
A data perturbation approach to privacy protection in data mining
-
Li, X., & Sarkar, S. (2006). A data perturbation approach to privacy protection in data mining. Information Systems Research, 17(3), 254–270.
-
(2006)
Information Systems Research
, vol.17
, Issue.3
, pp. 254-270
-
-
Li, X.1
Sarkar, S.2
-
40
-
-
84930086521
-
A metadata-based architecture for user-centered data accountability
-
Maguire, S., Friedberg, J., Nguyen, M.-H. C., Haynes, P. (2015). A metadata-based architecture for user-centered data accountability. Electronic Markets, 25(2). doi:10.1007/s12525-015-0184-z.
-
(2015)
Electronic Markets
, vol.25
, Issue.2
-
-
Maguire, S.1
Friedberg, J.2
Nguyen, M.-H.C.3
Haynes, P.4
-
41
-
-
25844456648
-
Maximizing accuracy of shares databases when concealing sensitive patterns
-
Menon, S., Sarkar, S., & Mukherjee, S. (2005). Maximizing accuracy of shares databases when concealing sensitive patterns. Information Systems Research, 16(3), 256–270.
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
42
-
-
84930091171
-
-
NA (2013). Unpublished manuscript submitted to ECIS 2013
-
NA (2013). Unpublished manuscript submitted to ECIS 2013.
-
-
-
-
43
-
-
33847382472
-
The privacy paradox: personal information disclosure intentions versus behavior
-
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: personal information disclosure intentions versus behavior. Journal of Consumer Affairs, 41(1), 100–126.
-
(2007)
Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
44
-
-
85018115885
-
In: The top 20 valuable Facebook statistics—Updated October 2014
-
Noyes, D. (2014). In: The top 20 valuable Facebook statistics—Updated October 2014. zephoria internet marketing solutions. Available at: https://zephoria.com/social-media/top-15-valuable-facebook-statistics/. Accessed 20 Jan 2015.
-
(2014)
zephoria internet marketing solutions
-
-
Noyes, D.1
-
45
-
-
85037996235
-
Exploring the economics of personal data: A survey of methodologies for measuring monetary value
-
OECD, Paris
-
OECD. (2013). Exploring the economics of personal data: A survey of methodologies for measuring monetary value. In OECD digital economy papers. Paris: OECD.
-
(2013)
OECD digital economy papers
-
-
OECD1
-
46
-
-
80052848840
-
Sticky policies: an approach for managing privacy across multiple parties
-
Pearson, S., & Mont, M. C. (2011). Sticky policies: an approach for managing privacy across multiple parties. IEEE Computer, 44(9), 60–68.
-
(2011)
IEEE Computer
, vol.44
, Issue.9
, pp. 60-68
-
-
Pearson, S.1
Mont, M.C.2
-
49
-
-
84930091097
-
Personal data: how context shapes consumers’ data sharing with organizations from various sectors
-
Roeber, B., Rehse, O., Knorrek, R., Thomsen, B. (2015). Personal data: how context shapes consumers’ data sharing with organizations from various sectors. Electronic Markets 25(2). doi:10.1007/s12525-015-0183-0.
-
(2015)
Electronic Markets
, vol.25
, Issue.2
-
-
Roeber, B.1
Rehse, O.2
Knorrek, R.3
Thomsen, B.4
-
51
-
-
33748532138
-
Personalization in privacy-aware highly dynamic systems
-
Sackmann, S., Strüker, J., & Accorsi, R. (2006). Personalization in privacy-aware highly dynamic systems. Communications of the ACM, 49(9), 32–38.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 32-38
-
-
Sackmann, S.1
Strüker, J.2
Accorsi, R.3
-
52
-
-
0345792391
-
Privacy as intellectual property?
-
Samuelson, P. (2000). Privacy as intellectual property?. Stanford Law Review, 1125–1173.
-
(2000)
Stanford Law Review
, pp. 1125-1173
-
-
Samuelson, P.1
-
54
-
-
2642572012
-
Property, privacy, and personal data
-
Schwartz, P. M. (2004). Property, privacy, and personal data. Harvard Law Review, 117(7), 2056–2128.
-
(2004)
Harvard Law Review
, vol.117
, Issue.7
, pp. 2056-2128
-
-
Schwartz, P.M.1
-
57
-
-
0000981743
-
Information privacy: measuring individuals’ concerns about organizational practices
-
Smith, J. H., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, J.H.1
Milberg, S.J.2
Burke, S.J.3
-
59
-
-
84925402991
-
A vision for global privacy bridges: technical and legal measures for international data markets
-
Spiekermann, S., & Novotny, A. (2015). A vision for global privacy bridges: technical and legal measures for international data markets. Compuer Law & Security Review (CLSR), 31(2), 181–200.
-
(2015)
Compuer Law & Security Review (CLSR)
, vol.31
, Issue.2
, pp. 181-200
-
-
Spiekermann, S.1
Novotny, A.2
-
60
-
-
84886522385
-
Psychology of ownership and asset defence: Why people value their personal information beyond privacy
-
ICIS, Orlando
-
Spiekermann, S., Korunovska, J., Bauer, C. (2012). Psychology of ownership and asset defence: Why people value their personal information beyond privacy. Proc International Conference on Information Systems (ICIS), Orlando.
-
(2012)
Proc International Conference on Information Systems
-
-
Spiekermann, S.1
Korunovska, J.2
Bauer, C.3
-
62
-
-
84994215884
-
The value of our digital identity
-
The Boston Consulting Group (2012). The value of our digital identity. Liberty Global.
-
(2012)
Liberty Global
-
-
-
63
-
-
47549106092
-
Can you see me now? Audience and disclosure regulation in online social network sites
-
Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science Technology and Society, 28(1), 20–36.
-
(2008)
Bulletin of Science Technology and Society
, vol.28
, Issue.1
, pp. 20-36
-
-
Tufekci, Z.1
-
64
-
-
84930088039
-
-
The emergence of a new asset class, Davos
-
World Economic Forum (2011). Personal data: The emergence of a new asset class. Davos.
-
(2011)
Personal data
-
-
-
65
-
-
85018112328
-
Rethinking personal data: Strengthening trust
-
World Economic Forum (2012). Rethinking personal data: Strengthening trust. Davos.
-
(2012)
Davos
-
-
-
66
-
-
84990334690
-
Whose identity is it anyway? Consumer representation in the age of database marketing
-
Zwick, D., & Dholakia, N. (2004). Whose identity is it anyway? Consumer representation in the age of database marketing. Journal of Macromarketing, 24(1), 31–43.
-
(2004)
Journal of Macromarketing
, vol.24
, Issue.1
, pp. 31-43
-
-
Zwick, D.1
Dholakia, N.2
|