Valuing Personal Data with Privacy Consideration
暂无分享,去创建一个
[1] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[2] Jason R. W. Merrick,et al. The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media , 2018, Decis. Sci..
[3] Stratis Ioannidis,et al. Privacy Auctions for Recommender Systems , 2014, TEAC.
[4] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[5] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[6] Adam N. Joinson,et al. Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys , 2008, Comput. Hum. Behav..
[7] Sarah Spiekermann,et al. Towards a value theory for personal data , 2017, J. Inf. Technol..
[8] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[9] Alessandro Acquisti,et al. Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .
[10] Charles F. Hofacker,et al. Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust , 2010, Int. J. Electron. Commer..
[11] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[12] T. Graeff,et al. Collecting and using personal data: consumers’ awareness and concerns , 2002 .
[13] George R. Milne,et al. Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .
[14] Adam N. Joinson,et al. Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..
[15] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[16] Khaled El Emam,et al. Guide to the De-Identification of Personal Health Information , 2013 .
[17] R. Vohra,et al. Algorithmic Game Theory: Sponsored Search Auctions , 2007 .
[18] Daniel R. Vincent,et al. The Declining Price Anomaly , 1993 .
[19] Aaron Roth,et al. Selling privacy at auction , 2015, Games Econ. Behav..
[20] Avi Goldfarb,et al. Shifts in Privacy Concerns , 2011 .
[21] Vijay Erramilli,et al. Your browsing behavior for a big mac: economics of personal information online , 2011, WWW.
[22] H. Humphrey,et al. Standards for privacy of individually identifiable health information. , 2003, Health care law monthly.
[23] Cory R. A. Hallam,et al. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards , 2017, Comput. Hum. Behav..
[24] Sumit Sarkar,et al. Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data , 2011, Inf. Syst. Res..
[25] George Danezis,et al. A study on the value of location privacy , 2006, WPES '06.
[26] Agustí Verde Parera,et al. General data protection regulation , 2018 .
[27] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[28] O. Ashenfelter. How Auctions Work for Wine and Art , 1989 .
[29] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[30] Nicu Sebe,et al. Money walks: a human-centric study on the economics of personal mobile data , 2014, UbiComp.
[31] S. Wold,et al. PLS-regression: a basic tool of chemometrics , 2001 .
[32] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[33] John A. List,et al. What Experimental Protocol Influence Disparities Between Actual and Hypothetical Stated Values? , 2001 .
[34] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[35] Elizabeth A. Skewes,et al. Item Nonresponse: Distinguishing between don't Know and Refuse , 2002 .
[36] ティモシー モリー,et al. Customer Data : Designing for Transparency and Trust , 2015 .
[37] Sven de Vries,et al. Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..
[38] HallamCory,et al. Online self-disclosure , 2017 .
[39] Michael H. Rothkopf,et al. Thirteen Reasons Why the Vickrey-Clarke-Groves Process Is Not Practical , 2007, Oper. Res..
[40] Glenn Woroch,et al. The demographics of the do-not-call list [security of data] , 2005, IEEE Security & Privacy.
[41] Yuan Li,et al. Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework , 2011, Commun. Assoc. Inf. Syst..
[42] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[43] Alessandro Acquisti,et al. When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information , 2007, WEIS.
[44] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[45] Ronald M. Harstad,et al. Computationally Manageable Combinational Auctions , 1998 .
[46] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[47] P. Rautava,et al. Non-response and related factors in a nation-wide health survey , 2004, European Journal of Epidemiology.
[48] J. G. Adair,et al. The Hawthorne effect: A reconsideration of the methodological artifact. , 1984 .
[49] Irwin Brown,et al. Examining the influence of demographic factors on internet users' information privacy concerns , 2007, SAICSIT '07.
[50] K. McConnell,et al. A Review of Wta/Wtp Studies , 2000 .
[51] Sören Preibusch,et al. Guide to measuring privacy concern: Review of survey and observational instruments , 2013, Int. J. Hum. Comput. Stud..
[52] D. Pitta,et al. Consumer Concerns for Healthcare Information Privacy: A Comparison of US and Canadian Perspectives , 2009 .
[53] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[54] Xiaoping Liu,et al. Acquiring High Quality Customer Data with Low Cost , 2015, WEB.
[55] Swinder Janda,et al. Exploring Consumer Concerns Related to the Internet , 2004 .
[56] Dara V. O'Neil. Analysis of Internet Users’ Level of Online Privacy Concerns , 2001 .
[57] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[58] D. Elbourne,et al. Systematic review of the Hawthorne effect: New concepts are needed to study research participation effects☆ , 2014, Journal of clinical epidemiology.
[59] Anindya Ghose,et al. An Empirical Analysis of Search Engine Advertising: Sponsored Search in Electronic Markets , 2009, Manag. Sci..