-
1
-
-
84995590301
-
What can behavioral economics teach us about privacy?
-
In, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. di Vimercati, (Eds.),, New York and London, Auerbach Publications
-
Acquisti, A., & Grossklags, J. (2008). What can behavioral economics teach us about privacy? In A. Acquisti, S. Gritzalis, C. Lambrinoudakis, & S. di Vimercati (Eds.), Digital privacy: Theory, technologies, and practices (pp. 363–377). New York and London: Auerbach Publications.
-
(2008)
Digital privacy: Theory, technologies, and practices
, pp. 363-377
-
-
Acquisti, A.1
Grossklags, J.2
-
2
-
-
14744280530
-
Conditioning prices on purchase history
-
Acquisti, A., & Varian, H.R. (2005). Conditioning prices on purchase history. Marketing Science, 24(3), 367–381.
-
(2005)
Marketing Science
, vol.24
, Issue.3
, pp. 367-381
-
-
Acquisti, A.1
Varian, H.R.2
-
3
-
-
84883690601
-
What is privacy worth?
-
Acquisti, A., John, L.K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274.
-
(2013)
The Journal of Legal Studies
, vol.42
, Issue.2
, pp. 249-274
-
-
Acquisti, A.1
John, L.K.2
Loewenstein, G.3
-
4
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Washington, DC
-
Barth, A., Datta, A., Mitchell, J. C., & Nissenbaum, H. (2006). Privacy and contextual integrity: Framework and applications (pp. 184–198). Presented at the SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), Washington, DC: IEEE Computer Society.
-
(2006)
Presented at the SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), IEEE Computer Society
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
5
-
-
80052833420
-
The viability of crowdsourcing for survey research
-
Behrend, T.S., Sharek, D.J., Meade, A.W., & Wiebe, E.N. (2011). The viability of crowdsourcing for survey research. Behavior Research Methods, 43(3), 800–813.
-
(2011)
Behavior Research Methods
, vol.43
, Issue.3
, pp. 800-813
-
-
Behrend, T.S.1
Sharek, D.J.2
Meade, A.W.3
Wiebe, E.N.4
-
6
-
-
84867973432
-
Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
-
Belanger, F., Hiller, J.S., & Smith, W.J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245–270.
-
(2002)
The Journal of Strategic Information Systems
, vol.11
, Issue.3
, pp. 245-270
-
-
Belanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
7
-
-
84864517335
-
Evaluating online labor markets for experimental research: Amazon.com's mechanical turk
-
Berinsky, A.J., Huber, G.A., & Lenz, G.S. (2012). Evaluating online labor markets for experimental research: Amazon.com's mechanical turk. Political Analysis, 20(3), 351–368.
-
(2012)
Political Analysis
, vol.20
, Issue.3
, pp. 351-368
-
-
Berinsky, A.J.1
Huber, G.A.2
Lenz, G.S.3
-
8
-
-
84877993440
-
-
Washington, D.C., Pew Internet & American Life Project., Retrieved from
-
Boyles, J.L., Smith, A., & Madden, M. (2012). Privacy and data management on Mobile Devices. Washington, D.C.: Pew Internet & American Life Project. Retrieved from http://www.pewinternet.org/Reports/2012/Mobile-Privacy.aspx
-
(2012)
Privacy and data management on Mobile Devices
-
-
Boyles, J.L.1
Smith, A.2
Madden, M.3
-
9
-
-
33846372664
-
Development of measures of online privacy concern and protection for use on the internet
-
Buchanan, T., Paine, C., Joinson, A.N., & Reips, U.-D. (2007). Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science and Technology, 58(2), 157–165.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 157-165
-
-
Buchanan, T.1
Paine, C.2
Joinson, A.N.3
Reips, U.-D.4
-
10
-
-
14744270170
-
Personalization versus privacy: An empirical examination of the online consumer's dilemma
-
Chellappa, R.K., & Sin, R.G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2–3), 181–202.
-
(2005)
Information Technology and Management
, vol.6
, Issue.2-3
, pp. 181-202
-
-
Chellappa, R.K.1
Sin, R.G.2
-
11
-
-
0001369142
-
Tests of Equality Between Sets of Coefficients in Two Linear Regressions
-
Chow, G. (1960). Tests of Equality Between Sets of Coefficients in Two Linear Regressions. Econometrica, 28(3), 591–605. doi:10.2307/1910133.
-
(1960)
Econometrica
, vol.28
, Issue.3
, pp. 591-605
-
-
Chow, G.1
-
12
-
-
84963506095
-
Roundup of mobile apps & app store forecasts, 2013
-
Retrieved from, June 9
-
Columbus, L. (2013). Roundup of mobile apps & app store forecasts, 2013. Forbes. Retrieved from http://www.forbes.com/sites/louiscolumbus/2013/06/09/roundup-of-mobile-apps-app-store-forecasts-2013/; June 9.
-
(2013)
Forbes
-
-
Columbus, L.1
-
13
-
-
0038803995
-
Consumer privacy: Balancing economic and justice considerations
-
Culnan, M.J., & Bies, R.J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 323-342
-
-
Culnan, M.J.1
Bies, R.J.2
-
14
-
-
84880141929
-
-
Washington, DC, Pew Internet & American Life Project
-
Duggan, M. (2013). Cell phone activities 2013. Washington, DC: Pew Internet & American Life Project.
-
(2013)
Cell phone activities 2013
-
-
Duggan, M.1
-
15
-
-
33745211471
-
Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment
-
Eastlick, M.A., Lotz, S.L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886.
-
(2006)
Journal of Business Research
, vol.59
, Issue.8
, pp. 877-886
-
-
Eastlick, M.A.1
Lotz, S.L.2
Warrington, P.3
-
17
-
-
33645700210
-
Multiple Segment factorial vignette designs
-
Ganong, L.H., & Coleman, M. (2006). Multiple Segment factorial vignette designs. Journal of Marriage and Family, 68(2), 455–468.
-
(2006)
Journal of Marriage and Family
, vol.68
, Issue.2
, pp. 455-468
-
-
Ganong, L.H.1
Coleman, M.2
-
18
-
-
84952674732
-
The privacy paradox: a Facebook case study
-
In, Arlington, VA SSRN. Retrieved from
-
Garg, V., Benton, K., & Camp, L. J. (2014). The privacy paradox: a Facebook case study. In Proceedings of the 2014 Telecommunications Policy Research Conference (TPRC). Arlington, VA: SSRN. Retrieved from http://papers.ssrn.com.proxy-um.researchport.umd.edu/sol3/papers.cfm?abstract_id=2411672
-
(2014)
Proceedings of the 2014 Telecommunications Policy Research Conference (TPRC)
-
-
Garg, V.1
Benton, K.2
Camp, L.J.3
-
19
-
-
84871553108
-
The boundaries of trust and risk: The quadratic moderating role of institutional structures
-
Gefen, D., & Pavlou, P.A. (2012). The boundaries of trust and risk: The quadratic moderating role of institutional structures. Information Systems Research, 23(3 Pt -2), 940–959.
-
(2012)
Information Systems Research
, vol.23
, Issue.3
, pp. 940-959
-
-
Gefen, D.1
Pavlou, P.A.2
-
20
-
-
79960844583
-
The online laboratory: Conducting experiments in a real labor market
-
Horton, J. J., Rand, D. G., & Zeckhauser, R. J. (2011). The online laboratory: Conducting experiments in a real labor market. Experimental Economics, 14(3), 399–425.
-
(2011)
Experimental Economics
, vol.14
, Issue.3
, pp. 399-425
-
-
Horton, J.J.1
Rand, D.G.2
Zeckhauser, R.J.3
-
21
-
-
84898936417
-
The policy knot: Re-integrating policy, practice and design in Cscw studies of social computing
-
In, New York, ACM
-
Jackson, S.J., Gillespie, T., & Payette, S. (2014). The policy knot: Re-integrating policy, practice and design in Cscw studies of social computing. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 588–602). New York: ACM.
-
(2014)
Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing
, pp. 588-602
-
-
Jackson, S.J.1
Gillespie, T.2
Payette, S.3
-
22
-
-
31944451470
-
Factorial survey methods for studying beliefs and judgments
-
Jasso, G. (2006). Factorial survey methods for studying beliefs and judgments. Sociological Methods & Research, 34(3), 334–423.
-
(2006)
Sociological Methods & Research
, vol.34
, Issue.3
, pp. 334-423
-
-
Jasso, G.1
-
23
-
-
84963564034
-
Flashlight app kept users in the dark about sharing location data: FTC
-
December 6)., Retrieved from
-
Kang, C. (2013, December 6). Flashlight app kept users in the dark about sharing location data: FTC. The Washington Post. Retrieved from http://www.washingtonpost.com/business/technology/flashlight-app-kept-users-in-the-dark-about-sharing-location-data-ftc/2013/12/05/1be26fa6-5dc7-11e3-be07-006c776266ed_story.html
-
(2013)
The Washington Post
-
-
Kang, C.1
-
24
-
-
84901214012
-
-
(SSRN Scholarly Paper ID 2228728). Rochester, NY Social Science Research Network. Retrieved from
-
Lease, M., Hullman, J., Bigham, J., Bernstein, M., Kim, J., Lasecki, W., … Miller, R. (2013). Mechanical Turk is Not Anonymous (SSRN Scholarly Paper No. ID 2228728). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2228728
-
(2013)
Mechanical Turk is Not Anonymous
-
-
Lease, M.1
Hullman, J.2
Bigham, J.3
Bernstein, M.4
Kim, J.5
Lasecki, W.6
Miller, R.7
-
25
-
-
78649949513
-
Understanding situational online information disclosure as a privacy calculus
-
Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62–71.
-
(2010)
Journal of Computer Information Systems
, vol.51
, Issue.1
, pp. 62-71
-
-
Li, H.1
Sarathy, R.2
Xu, H.3
-
27
-
-
13244298307
-
Internet Users' Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model
-
Malhotra, N.K., Kim, S.S., & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
28
-
-
84871311194
-
Diminished or just different? A factorial vignette study of privacy as a social contract
-
Martin, K.E. (2012). Diminished or just different? A factorial vignette study of privacy as a social contract. Journal of Business Ethics, 111(4), 519–539.
-
(2012)
Journal of Business Ethics
, vol.111
, Issue.4
, pp. 519-539
-
-
Martin, K.E.1
-
29
-
-
84891897350
-
Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online
-
Retrieved from
-
Martin, K.E. (2013). Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online. First Monday, 18(12). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/4838
-
(2013)
First Monday
, vol.18
, Issue.12
-
-
Martin, K.E.1
-
30
-
-
82655180226
-
Conducting behavioral research on Amazon's Mechanical Turk
-
Mason, W., & Suri, S. (2012). Conducting behavioral research on Amazon's Mechanical Turk. Behavior Research Methods, 44(1), 1–23.
-
(2012)
Behavior Research Methods
, vol.44
, Issue.1
, pp. 1-23
-
-
Mason, W.1
Suri, S.2
-
31
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R.C., Davis, J.H., & Schoorman, F.D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.
-
(1995)
Academy of Management Review
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
32
-
-
0009925685
-
Initial trust formation in new organizational relationships
-
McKnight, D.H., Cummings, L.L., & Chervany, N.L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.
-
(1998)
Academy of Management Review
, vol.23
, Issue.3
, pp. 473-490
-
-
McKnight, D.H.1
Cummings, L.L.2
Chervany, N.L.3
-
33
-
-
79958169881
-
Situating the concern for information privacy through an empirical study of responses to video recording
-
In, New York, ACM
-
Nguyen, D.H., Bedford, A., Bretana, A.G., & Hayes, G.R. (2011). Situating the concern for information privacy through an empirical study of responses to video recording. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 3207–3216). New York: ACM.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 3207-3216
-
-
Nguyen, D.H.1
Bedford, A.2
Bretana, A.G.3
Hayes, G.R.4
-
35
-
-
81355132819
-
State of the information privacy literature: Where are we now and where should we go
-
Pavlou, P.A. (2011). State of the information privacy literature: Where are we now and where should we go. MIS Quarterly, 35(4), 977–988.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 977-988
-
-
Pavlou, P.A.1
-
36
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
Pavlou, P.A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37–59.
-
(2004)
Information Systems Research
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
37
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
Pavlou, P.A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
38
-
-
84978932390
-
Nielsen and comScore duel over mobile ad-tracking
-
Retrieved from, April 17, New York
-
Perlberg, S. (2014). Nielsen and comScore duel over mobile ad-tracking. The Wall Street Journal. Retrieved from http://blogs.wsj.com/digits/2014/04/17/nielsen-comscore-mobile-ad-tracking/; April 17, New York.
-
(2014)
The Wall Street Journal
-
-
Perlberg, S.1
-
39
-
-
84914109388
-
-
December 27)., Retrieved April 7, 2014, Retrieved from
-
Pew Research Internet Project. (2013, December 27). Mobile Technology Fact Sheet. Retrieved April 7, 2014, Retrieved from http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/
-
(2013)
Mobile Technology Fact Sheet
-
-
-
40
-
-
84978979156
-
-
(SSRN Scholarly Paper ID 2260527)., Rochester, NY, Social Science Research Network, Retrieved from
-
Pirson, M., Martin, K. E., & Parmar, B. L. (2013). Formation of Stakeholder Trust in Business and the Role of Personal Values (SSRN Scholarly Paper No. ID 2260527). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2260527
-
(2013)
Formation of Stakeholder Trust in Business and the Role of Personal Values
-
-
Pirson, M.1
Martin, K.E.2
Parmar, B.L.3
-
41
-
-
85184835801
-
-
In, B. Moriarty, (Ed.),, Cambridge, UK, Cambridge University Press
-
Pirson, M., Martin, K.E., & Parmar, B.L. (2014). Public trust in business. In B. Moriarty (Ed.), Public trust in business (pp. 116–152). Cambridge, UK: Cambridge University Press.
-
(2014)
Public trust in business
, pp. 116-152
-
-
Pirson, M.1
Martin, K.E.2
Parmar, B.L.3
-
42
-
-
77953088193
-
Who are the crowdworkers?: Shifting demographics in mechanical turk
-
In, New York, ACM
-
Ross, J., Irani, L., Silberman, M.S., Zaldivar, A., & Tomlinson, B. (2010). Who are the crowdworkers?: Shifting demographics in mechanical turk. In CHI '10 Extended Abstracts on Human Factors in Computing Systems (pp. 2863–2872). New York: ACM.
-
(2010)
CHI '10 Extended Abstracts on Human Factors in Computing Systems
, pp. 2863-2872
-
-
Ross, J.1
Irani, L.2
Silberman, M.S.3
Zaldivar, A.4
Tomlinson, B.5
-
44
-
-
84866501595
-
Participatory personal data: An emerging research challenge for the information sciences
-
Shilton, K. (2012). Participatory personal data: An emerging research challenge for the information sciences. Journal for the American Society of Information Science, 63(10), 1905–1915.
-
(2012)
Journal for the American Society of Information Science
, vol.63
, Issue.10
, pp. 1905-1915
-
-
Shilton, K.1
-
45
-
-
84962948807
-
Mobile privacy expectations in context
-
In, Arlington, VA, SSRN
-
Shilton, K., & Martin, K.E. (2013). Mobile privacy expectations in context. In Proceedings of the 41th Research Conference on Communication, Information and Internet Policy (TPRC 2013). Arlington, VA: SSRN.
-
(2013)
Proceedings of the 41th Research Conference on Communication, Information and Internet Policy (TPRC 2013)
-
-
Shilton, K.1
Martin, K.E.2
-
46
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith, H.J., Milberg, S.J., & Burke, S.J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
47
-
-
84978997972
-
Trust in Public Institutions over the Business Cycle (Working Paper No. 16891)
-
Retrieved from
-
Stevenson, B., & Wolfers, J. (2011). Trust in Public Institutions over the Business Cycle (Working Paper No. 16891). National Bureau of Economic Research. Retrieved from http://www.nber.org/papers/w16891
-
(2011)
National Bureau of Economic Research
-
-
Stevenson, B.1
Wolfers, J.2
-
48
-
-
13844272147
-
Technology, security, and individual privacy: New tools, new threats, and new public perceptions
-
Strickland, L.S., & Hunt, L.E. (2005). Technology, security, and individual privacy: New tools, new threats, and new public perceptions. Journal of the American Society for Information Science and Technology, 56(3), 221–234.
-
(2005)
Journal of the American Society for Information Science and Technology
, vol.56
, Issue.3
, pp. 221-234
-
-
Strickland, L.S.1
Hunt, L.E.2
-
49
-
-
2442462168
-
The evolving role of the internet in marketing strategy: An exploratory study
-
Sultan, F., & Rohm, A.J. (2004). The evolving role of the internet in marketing strategy: An exploratory study. Journal of Interactive Marketing, 18(2), 6–19.
-
(2004)
Journal of Interactive Marketing
, vol.18
, Issue.2
, pp. 6-19
-
-
Sultan, F.1
Rohm, A.J.2
-
50
-
-
84866660483
-
-
Berkeley, CA University of California at Berkeley—Center for the Study of Law and Society. Retrieved from
-
Urban, J.M., Hoofnagle, C.J., & Li, S. (2012). Mobile Phones and Privacy. Berkeley, CA: University of California at Berkeley—Center for the Study of Law and Society. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2103405
-
(2012)
Mobile Phones and Privacy
-
-
Urban, J.M.1
Hoofnagle, C.J.2
Li, S.3
-
51
-
-
40749111254
-
Concern for information privacy and online consumer purchasing
-
Van Slyke, C., Shim, J., Johnson, R., & Jiang, J.J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 415–444.
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.1
, pp. 415-444
-
-
Van Slyke, C.1
Shim, J.2
Johnson, R.3
Jiang, J.J.4
-
53
-
-
70349098855
-
25 years of factorial surveys in sociology: A review
-
Wallander, L. (2009). 25 years of factorial surveys in sociology: A review. Social Science Research, 38(3), 505–520.
-
(2009)
Social Science Research
, vol.38
, Issue.3
, pp. 505-520
-
-
Wallander, L.1
-
55
-
-
84891892610
-
Exploring the role of overt vs. covert personalization strategy in privacy calculus
-
Xu, H., Zhang, C., Shi, P., & Song, P. (2009). Exploring the role of overt vs. covert personalization strategy in privacy calculus. Academy of Management Proceedings, 2009(1), 1–6.
-
(2009)
Academy of Management Proceedings
, vol.2009
, Issue.1
, pp. 1-6
-
-
Xu, H.1
Zhang, C.2
Shi, P.3
Song, P.4
-
56
-
-
33947397191
-
Predicting user concerns about online privacy
-
Yao, M.Z., Rice, R.E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710–722.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.5
, pp. 710-722
-
-
Yao, M.Z.1
Rice, R.E.2
Wallis, K.3
|