The Market Failure of Anonymity Services
暂无分享,去创建一个
[1] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[2] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[3] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[4] Dennis F. Galletta,et al. Web Site Delays: How Tolerant are Users? , 2004, J. Assoc. Inf. Syst..
[5] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[6] Heiko Roßnagel,et al. Mobile qualifizierte elektronische Signaturen , 2009 .
[7] Sarah Spiekermann. The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services , 2005, Int. J. Technol. Hum. Interact..
[8] Ann Cavoukian,et al. Privacy in the clouds , 2008 .
[9] George A. Akerlof. The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .
[10] Joan Feigenbaum,et al. Economic Barriers to the Deployment of Existing Privacy Technologies , 2002 .
[11] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[12] Alessandro Acquisti,et al. Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.
[13] Alessandro Acquisti,et al. Privacy and Rationality , 2006 .
[14] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[15] Young U. Ryu,et al. International Conference on Information Systems ( ICIS ) December 2005 I Am Fine but You Are Not : Optimistic Bias and Illusion of Control on Information Security , 2017 .
[16] Roger Dingledine,et al. On the Economics of Anonymity , 2003, Financial Cryptography.
[17] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[18] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[19] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[20] Hannes Federrath. Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.
[21] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[22] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[23] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[24] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[25] Mark J. Safferstone. Information Rules: A Strategic Guide to the Network Economy , 1999 .
[26] Andrew Grantham,et al. Diffusing wireless applications in a mobile world , 2005 .
[27] Stuart E. Schechter,et al. Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.
[28] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[29] Gurpreet Dhillon,et al. Do privacy seals in e-commerce really work? , 2003, CACM.
[30] Franz Pichler,et al. Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.
[31] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[32] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[33] P. Syverson. The Paradoxical Value of Privacy , 2003 .
[34] Jan Zibuschka,et al. Facilitating the Adoption of Tor by Focusing on a Promising Target Group , 2009, NordSec.
[35] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[36] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[37] N. Weinstein. Optimistic biases about personal risks. , 1989, Science.
[38] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[39] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[40] Jeremy Clark,et al. Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.
[41] S. Oren,et al. Critical Mass and Tariff Structure in Electronic Communications Markets , 1981 .
[42] A. Adam. Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .
[43] E. Rogers. Diffusion of Innovations , 1962 .
[44] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[45] Robert J. Kauffman,et al. Proceedings of the ninth international conference on Electronic commerce , 2003, ICEC 2007.
[46] Nick Mathewson,et al. Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.
[47] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[48] Habtamu Abie,et al. Towards a Research Road Map for the Management of Privacy Risks in Information Systems , 2008, Sicherheit.
[49] E. Rogers,et al. The diffusion of interactive communication innovations and the critical mass: the adoption of telecommunications services by German banks , 1999 .
[50] Rachel Greenstadt,et al. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market , 2003, ICEC '03.
[51] Andrew M. Odlyzko. Privacy and the clandestine evolution of e-commerce , 2007, ICEC.
[52] B. Ryan. The diffusion of hybrid seed corn in two Iowa communities , 1943 .
[53] Sarah Spiekermann. Die Konsumenten der Anonymität - Wer nutzt Anonymisierungsdienste? , 2003, Datenschutz und Datensicherheit.
[54] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[55] Otto Spaniol,et al. Mobilkommunikation ohne Bewegungsprofile , 1996, Informationstechnik Tech. Inform..
[56] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[57] James A. Hendler,et al. Information accountability , 2008, CACM.