-
2
-
-
84963494223
-
-
accessed July 14, 2013
-
Android Apps on Google Play. 2013. https://play.google.com/store/apps?feature=corpus_selector (accessed July 14, 2013).
-
(2013)
-
-
-
3
-
-
84963608480
-
-
accessed July 14, 2013
-
App Store Downloads on iTunes. 2013. https://itunes.apple.com/us/genre/ios/id36?mt=8 (accessed July 14, 2013).
-
(2013)
-
-
-
4
-
-
42349116295
-
Choice or consequences: Protecting privacy in commercial information
-
J.H.Beales,, and T.J.Muris. 2008. Choice or consequences: Protecting privacy in commercial information. University of Chicago Law Review 75 (1):109–135.
-
(2008)
University of Chicago Law Review
, vol.75
, Issue.1
, pp. 109-135
-
-
Beales, J.H.1
Muris, T.J.2
-
5
-
-
80052833420
-
The viability of crowdsourcing for survey research
-
T.S.Behrend,, D.J.Sharek, A.W.Meade, and E.N.Wiebe. 2011. The viability of crowdsourcing for survey research. Behavior Research Methods 43 (3):800–813. http://dx.doi.org/10.3758/s13428-011-0081-0.
-
(2011)
Behavior Research Methods
, vol.43
, Issue.3
, pp. 800-813
-
-
Behrend, T.S.1
Sharek, D.J.2
Meade, A.W.3
Wiebe, E.N.4
-
6
-
-
84864517335
-
Evaluating Online labor markets for experimental research: Amazon.com's Mechanical Turk
-
A.J.Berinsky,, G.A.Huber, and G.S.Lenz. 2012. Evaluating Online labor markets for experimental research: Amazon.com's Mechanical Turk. Political Analysis 20 (3):351–368. http://dx.doi.org/10.1093/pan/mpr057.
-
(2012)
Political Analysis
, vol.20
, Issue.3
, pp. 351-368
-
-
Berinsky, A.J.1
Huber, G.A.2
Lenz, G.S.3
-
7
-
-
33745804732
-
Privacy rights on the Internet: Self-regulation or government regulation?
-
N.E.Bowie,, and K.Jamal. 2006. Privacy rights on the Internet: Self-regulation or government regulation? Business Ethics Quarterly 16 (3):323–342.
-
(2006)
Business Ethics Quarterly
, vol.16
, Issue.3
, pp. 323-342
-
-
Bowie, N.E.1
Jamal, K.2
-
8
-
-
84877993440
-
-
Washington, DC: Pew Internet & American Life Project, accessed October 8, 2012
-
J.L.Boyles,, A.Smith, and M.Madden. 2012. Privacy and data management on mobile devices. Washington, DC: Pew Internet & American Life Project. http://www.pewinternet.org/Reports/2012/Mobile-Privacy.aspx (accessed October 8, 2012).
-
(2012)
Privacy and data management on mobile devices
-
-
Boyles, J.L.1
Smith, A.2
Madden, M.3
-
9
-
-
84889757331
-
Indirect content privacy surveys: Measuring privacy without asking about it
-
14, New York, NY: ACM
-
A.Braunstein,, L.Granka, and J.Staddon. 2011. Indirect content privacy surveys: Measuring privacy without asking about it. In SOUPS 2011 Proceedings of the Seventh Symposium on Usable Privacy and Security 15:1–15:14. New York, NY: ACM.
-
(2011)
SOUPS 2011 Proceedings of the Seventh Symposium on Usable Privacy and Security
, vol.15
, pp. 1-15
-
-
Braunstein, A.1
Granka, L.2
Staddon, J.3
-
10
-
-
33846372664
-
Development of measures of online privacy concern and protection for use on the Internet
-
T.Buchanan,, C.Paine, A.N.Joinson, and U.-D.Reips. 2007. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology 58 (2):157–165.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 157-165
-
-
Buchanan, T.1
Paine, C.2
Joinson, A.N.3
Reips, U.-D.4
-
11
-
-
84904204472
-
Privacy and narrativity in the Internet era
-
J.C.Buitelaar, 2014. Privacy and narrativity in the Internet era. The Information Society 30 (4):266–281.
-
(2014)
The Information Society
, vol.30
, Issue.4
, pp. 266-281
-
-
Buitelaar, J.C.1
-
12
-
-
77950654898
-
The limits of notice and choice
-
F.H.Cate, 2010. The limits of notice and choice. IEEE Security Privacy 8 (2):59–62. http://dx.doi.org/10.1109/MSP.2010.84.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.2
, pp. 59-62
-
-
Cate, F.H.1
-
13
-
-
84908647000
-
-
Toronto, ON, Canada: Office of the Privacy Commissioner, Ontario, Canada, accessed July 17, 2013
-
A.Cavoukian, 2012. Operationalizing privacy by design: A guide to implementing strong privacy practices. Toronto, ON, Canada: Office of the Privacy Commissioner, Ontario, Canada. http://www.privacybydesign.ca/index.php/paper/operationalizing-privacy-by-design-a-guide-to-implementing-strong-privacy-practices (accessed July 17, 2013).
-
(2012)
Operationalizing privacy by design: A guide to implementing strong privacy practices
-
-
Cavoukian, A.1
-
14
-
-
84963506095
-
Roundup of mobile apps & App Store forecasts, 2013
-
June 9, sec. tech, accessed July 14, 2013
-
L.Columbus, 2013. Roundup of mobile apps & App Store forecasts, 2013. Forbes, June 9, sec. tech. http://www.forbes.com/sites/louiscolumbus/2013/06/09/roundup-of-mobile-apps-app-store-forecasts-2013 (accessed July 14, 2013).
-
(2013)
Forbes
-
-
Columbus, L.1
-
15
-
-
0010273740
-
Consumer awareness of name removal procedures: Implications for direct marketing
-
M.J.Culnan, 1995. Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing 9 (2):10–19.
-
(1995)
Journal of Direct Marketing
, vol.9
, Issue.2
, pp. 10-19
-
-
Culnan, M.J.1
-
16
-
-
0038803995
-
Consumer privacy: Balancing economic and justice considerations
-
M.J.Culnan,, and R.J.Bies. 2003. Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues 59 (2):323–342. http://dx.doi.org/10.1111/1540-4560.00067.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 323-342
-
-
Culnan, M.J.1
Bies, R.J.2
-
17
-
-
72049116025
-
How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches
-
M.J.Culnan,, and C.C.Williams. 2009. How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches. Management Information Systems Quarterly 33 (4):673–687.
-
(2009)
Management Information Systems Quarterly
, vol.33
, Issue.4
, pp. 673-687
-
-
Culnan, M.J.1
Williams, C.C.2
-
18
-
-
7544221359
-
Emergency response systems and the creeping legibility of people and places
-
M.R.Curry,, D.J.Phillips, and P.M.Regan. 2004. Emergency response systems and the creeping legibility of people and places. The Information Society 20 (5):357–69.
-
(2004)
The Information Society
, vol.20
, Issue.5
, pp. 357-369
-
-
Curry, M.R.1
Phillips, D.J.2
Regan, P.M.3
-
19
-
-
0033409760
-
Social contracts and marketing ethics
-
T.W.Dunfee,, N.C.Smith, and W.T.Ross,Jr. 1999. Social contracts and marketing ethics. Journal of Marketing 63 (3):14–32.
-
(1999)
Journal of Marketing
, vol.63
, Issue.3
, pp. 14-32
-
-
Dunfee, T.W.1
Smith, N.C.2
Ross, W.T.3
-
20
-
-
33745211471
-
Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment
-
M.A.Eastlick,, S.L.Lotz, and P.Warrington. 2006. Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59 (8):877–886.
-
(2006)
Journal of Business Research
, vol.59
, Issue.8
, pp. 877-886
-
-
Eastlick, M.A.1
Lotz, S.L.2
Warrington, P.3
-
21
-
-
79953718623
-
-
Washington, DC: Federal Trade Commission, accessed May 18, 2012
-
Federal Trade Commission. 2010. Protecting consumer privacy in an era of rapid change. Washington, DC: Federal Trade Commission. http://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-bureau-consumer-protection-preliminary-ftc-staff-report-protecting-consumer/101201privacyreport.pdf (accessed May 18, 2012).
-
(2010)
Protecting consumer privacy in an era of rapid change
-
-
-
24
-
-
84866867441
-
Breaching the contract? Privacy and the UK Census
-
C.Heeney, 2012. Breaching the contract? Privacy and the UK Census. The Information Society 28 (5):316–328.
-
(2012)
The Information Society
, vol.28
, Issue.5
, pp. 316-328
-
-
Heeney, C.1
-
25
-
-
0033114507
-
Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web
-
D.L.Hoffman,, T.P.Novak, and M.A.Peralta. 1999. Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web. The Information Society 15 (2):129–39.
-
(1999)
The Information Society
, vol.15
, Issue.2
, pp. 129-139
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, M.A.3
-
26
-
-
33847712553
-
The value of privacy assurance: An exploratory field experiment
-
K.-L.Hui,, H.H.Teo, and S.-Y.Tom Lee. 2007. The value of privacy assurance: An exploratory field experiment. MIS Quarterly 31 (1):19–33.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 19-33
-
-
Hui, K.-L.1
Teo, H.H.2
Tom Lee, S.-Y.3
-
27
-
-
31944451470
-
Factorial survey methods for studying beliefs and judgments
-
G.Jasso, 2006. Factorial survey methods for studying beliefs and judgments. Sociological Methods & Research 34 (3):334–423.
-
(2006)
Sociological Methods & Research
, vol.34
, Issue.3
, pp. 334-423
-
-
Jasso, G.1
-
28
-
-
84963528728
-
Is the global information infrastructure a democratic technology?
-
2nd ed., Sudbury, MA: Jones and Bartlett
-
D.G.Johnson, 2004. Is the global information infrastructure a democratic technology? In Readings in cyberethics, ed. R.A.Spinello and H.T.Tavani, 2nd ed., 121–133. Sudbury, MA: Jones and Bartlett.
-
(2004)
Readings in cyberethics
, pp. 121-133
-
-
Johnson, D.G.1
Spinello, R.A.2
Tavani, H.T.3
-
29
-
-
84963564034
-
Flashlight app kept users in the dark about sharing location data: FTC
-
December 6, sec. Tech, accessed May 14, 2014
-
C.Kang, 2013. Flashlight app kept users in the dark about sharing location data: FTC. The Washington Post, December 6, sec. Tech. http://www.washingtonpost.com/business/technology/flashlight-app-kept-users-in-the-dark-about-sharing-location-data-ftc/2013/12/05/1be26fa6-5dc7-11e3-be07-006c776266ed_story.html (accessed May 14, 2014).
-
(2013)
The Washington Post
-
-
Kang, C.1
-
30
-
-
84919335835
-
A strategy for operationalizing privacy by design
-
I.Kroener,, and D.Wright. 2014. A strategy for operationalizing privacy by design. The Information Society 30 (5):355–65.
-
(2014)
The Information Society
, vol.30
, Issue.5
, pp. 355-365
-
-
Kroener, I.1
Wright, D.2
-
31
-
-
84901214012
-
-
(SSRN Scholarly Paper ID 2228728), Rochester, NY: Social Science Research Network, accessed March 8 2013
-
M.Lease,, J.Hullman, J.Bigham, M.Bernstein, J.Kim, W.Lasecki, S.Bakhshi, T.Mitra, and R.Miller. 2013. Mechanical Turk is not anonymous (SSRN Scholarly Paper ID 2228728). Rochester, NY: Social Science Research Network. http://papers.ssrn.com/abstract=2228728 (accessed March 8 2013).
-
(2013)
Mechanical Turk is not anonymous
-
-
Lease, M.1
Hullman, J.2
Bigham, J.3
Bernstein, M.4
Kim, J.5
Lasecki, W.6
Bakhshi, S.7
Mitra, T.8
Miller, R.9
-
32
-
-
78649949513
-
Understanding situational online information disclosure as a privacy calculus
-
H.Li,, R.Sarathy, and H.Xu. 2010. Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems 51 (1):62–71.
-
(2010)
Journal of Computer Information Systems
, vol.51
, Issue.1
, pp. 62-71
-
-
Li, H.1
Sarathy, R.2
Xu, H.3
-
33
-
-
84867459428
-
Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing
-
New York, NY: ACM
-
J.Lin,, S.Amini, J.I.Hong, N.Sadeh, J.Lindqvist, and J.Zhang. 2012. Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In UbiComp ’12 Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501–510. New York, NY: ACM. http://dx.doi.org/10.1145/2370216.2370290.
-
(2012)
UbiComp ’12 Proceedings of the 2012 ACM Conference on Ubiquitous Computing
, pp. 501-510
-
-
Lin, J.1
Amini, S.2
Hong, J.I.3
Sadeh, N.4
Lindqvist, J.5
Zhang, J.6
-
34
-
-
84891897350
-
Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online
-
online
-
K.Martin, 2013. Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online. First Monday 18 (12):online.
-
(2013)
First Monday
, vol.18
, Issue.12
-
-
Martin, K.1
-
35
-
-
84923239709
-
Understanding privacy online: Development of a social contract approach to privacy
-
K.Martin, 2015. Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics: 1–19. https://link.springer.com/article/10.1007/s10551-015-2565-9.
-
(2015)
Journal of Business Ethics
-
-
Martin, K.1
-
36
-
-
84871311194
-
Diminished or just different? A factorial vignette study of privacy as a social contract
-
K.E.Martin, 2012. Diminished or just different? A factorial vignette study of privacy as a social contract. Journal of Business Ethics 111 (4):519–539. http://dx.doi.org/10.1007/s10551-012-1215-8.
-
(2012)
Journal of Business Ethics
, vol.111
, Issue.4
, pp. 519-539
-
-
Martin, K.E.1
-
38
-
-
77955273255
-
Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns
-
P.McCole,, E.Ramsey, and J.Williams. 2010. Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns. Journal of Business Research 63 (9):1018–1024.
-
(2010)
Journal of Business Research
, vol.63
, Issue.9
, pp. 1018-1024
-
-
McCole, P.1
Ramsey, E.2
Williams, J.3
-
40
-
-
0036814612
-
Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 US Web surveys
-
G.R.Milne,, and M.J.Culnan. 2002. Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 US Web surveys. The Information Society 18 (5):345–59.
-
(2002)
The Information Society
, vol.18
, Issue.5
, pp. 345-359
-
-
Milne, G.R.1
Culnan, M.J.2
-
42
-
-
21344485586
-
Direct mail privacy-efficiency trade-offs within an implied social contract framework
-
G.R.Milne,, and M.E.Gordon. 1993. Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing 12 (2):206–15.
-
(1993)
Journal of Public Policy & Marketing
, vol.12
, Issue.2
, pp. 206-215
-
-
Milne, G.R.1
Gordon, M.E.2
-
43
-
-
1842538795
-
Privacy as contextual integrity
-
H.Nissenbaum, 2004. Privacy as contextual integrity. Washington Law Review 79 (1):119–58.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
45
-
-
80053267657
-
A contextual approach to privacy online
-
H.Nissenbaum, 2011. A contextual approach to privacy online. Daedalus 140 (4):32–48.
-
(2011)
Daedalus
, vol.140
, Issue.4
, pp. 32-48
-
-
Nissenbaum, H.1
-
46
-
-
84870660287
-
Survey experiments
-
Bingley, UK: Emerald Group Publishing
-
S.Nock,, and T.Guterbock. 2010. Survey experiments. In Handbook of survey research, eds. P.V.Marsden and J.D.Wright, 837–864. Bingley, UK: Emerald Group Publishing.
-
(2010)
Handbook of survey research
, pp. 837-864
-
-
Nock, S.1
Guterbock, T.2
Marsden, P.V.3
Wright, J.D.4
-
47
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
P.A.Pavlou,, and D.Gefen. 2004. Building effective online marketplaces with institution-based trust. Information Systems Research 15 (1):37–59.
-
(2004)
Information Systems Research
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
48
-
-
0034394385
-
Privacy concerns and consumer willingness to provide personal information
-
J.Phelps,, G.Nowak, and E.Ferrell. 2000. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing 19 (1):27–41.
-
(2000)
Journal of Public Policy & Marketing
, vol.19
, Issue.1
, pp. 27-41
-
-
Phelps, J.1
Nowak, G.2
Ferrell, E.3
-
49
-
-
84886398304
-
Captive but mobile: Privacy concerns and remedies for the mobile environment
-
M.Popescu,, and L.Baruh. 2013. Captive but mobile: Privacy concerns and remedies for the mobile environment. The Information Society 29 (5):272–86.
-
(2013)
The Information Society
, vol.29
, Issue.5
, pp. 272-286
-
-
Popescu, M.1
Baruh, L.2
-
50
-
-
77953088193
-
Who are the crowdworkers?: Shifting demographics in Mechanical Turk
-
New York, NY: ACM
-
J.Ross,, L.Irani, M.S.Silberman, A.Zaldivar, and B.Tomlinson. 2010. Who are the crowdworkers?: Shifting demographics in Mechanical Turk. In CHI EA ’10: CHI ’10 extended abstracts on human factors in computing systems, 2863–2872. New York, NY: ACM. http://dx.doi.org/10.1145/1753846.1753873.
-
(2010)
CHI EA ’10: CHI ’10 extended abstracts on human factors in computing systems
, pp. 2863-2872
-
-
Ross, J.1
Irani, L.2
Silberman, M.S.3
Zaldivar, A.4
Tomlinson, B.5
-
52
-
-
0036005221
-
Toward a typology of internet users and online privacy concerns
-
K.B.Sheehan, 2002. Toward a typology of internet users and online privacy concerns. The Information Society 18 (1):21–32.
-
(2002)
The Information Society
, vol.18
, Issue.1
, pp. 21-32
-
-
Sheehan, K.B.1
-
53
-
-
77954021717
-
Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection
-
K.Shilton, 2009. Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection. Communications of the ACM 52 (11):48–53.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
, pp. 48-53
-
-
Shilton, K.1
-
57
-
-
70349098855
-
25 Years of factorial surveys in sociology: A review
-
L.Wallander, 2009. 25 Years of factorial surveys in sociology: A review. Social Science Research 38 (3):505–20.
-
(2009)
Social Science Research
, vol.38
, Issue.3
, pp. 505-520
-
-
Wallander, L.1
-
58
-
-
84871593116
-
Research noteࣧEffects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services
-
H.Xu,, H.-H.Teo, B.C.Y.Tan, and R.Agarwal. 2012. Research noteࣧEffects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research 23 (4):1342–1363. http://dx.doi.org/10.1287/isre.1120.0416.
-
(2012)
Information Systems Research
, vol.23
, Issue.4
, pp. 1342-1363
-
-
Xu, H.1
Teo, H.-H.2
Tan, B.C.Y.3
Agarwal, R.4
-
59
-
-
84891892610
-
Exploring the role of overt vs. covert personalization strategy in privacy calculus
-
H.Xu,, C.Zhang, P.Shi, and P.Song. 2009. Exploring the role of overt vs. covert personalization strategy in privacy calculus. Academy of Management Proceedings 2009 (1):1–6. http://dx.doi.org/10.5465/AMBPP.2009.44249857.
-
(2009)
Academy of Management Proceedings
, vol.2009
, Issue.1
, pp. 1-6
-
-
Xu, H.1
Zhang, C.2
Shi, P.3
Song, P.4
|