Valuing Personal Data with Privacy Consideration

[1]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[2]  Jason R. W. Merrick,et al.  The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media , 2018, Decis. Sci..

[3]  Stratis Ioannidis,et al.  Privacy Auctions for Recommender Systems , 2014, TEAC.

[4]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[5]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[6]  Adam N. Joinson,et al.  Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys , 2008, Comput. Hum. Behav..

[7]  Sarah Spiekermann,et al.  Towards a value theory for personal data , 2017, J. Inf. Technol..

[8]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[9]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[10]  Charles F. Hofacker,et al.  Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust , 2010, Int. J. Electron. Commer..

[11]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[12]  T. Graeff,et al.  Collecting and using personal data: consumers’ awareness and concerns , 2002 .

[13]  George R. Milne,et al.  Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .

[14]  Adam N. Joinson,et al.  Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..

[15]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[16]  Khaled El Emam,et al.  Guide to the De-Identification of Personal Health Information , 2013 .

[17]  R. Vohra,et al.  Algorithmic Game Theory: Sponsored Search Auctions , 2007 .

[18]  Daniel R. Vincent,et al.  The Declining Price Anomaly , 1993 .

[19]  Aaron Roth,et al.  Selling privacy at auction , 2015, Games Econ. Behav..

[20]  Avi Goldfarb,et al.  Shifts in Privacy Concerns , 2011 .

[21]  Vijay Erramilli,et al.  Your browsing behavior for a big mac: economics of personal information online , 2011, WWW.

[22]  H. Humphrey,et al.  Standards for privacy of individually identifiable health information. , 2003, Health care law monthly.

[23]  Cory R. A. Hallam,et al.  Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards , 2017, Comput. Hum. Behav..

[24]  Sumit Sarkar,et al.  Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data , 2011, Inf. Syst. Res..

[25]  George Danezis,et al.  A study on the value of location privacy , 2006, WPES '06.

[26]  Agustí Verde Parera,et al.  General data protection regulation , 2018 .

[27]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[28]  O. Ashenfelter How Auctions Work for Wine and Art , 1989 .

[29]  Eric R. Ziegel,et al.  The Elements of Statistical Learning , 2003, Technometrics.

[30]  Nicu Sebe,et al.  Money walks: a human-centric study on the economics of personal mobile data , 2014, UbiComp.

[31]  S. Wold,et al.  PLS-regression: a basic tool of chemometrics , 2001 .

[32]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[33]  John A. List,et al.  What Experimental Protocol Influence Disparities Between Actual and Hypothetical Stated Values? , 2001 .

[34]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[35]  Elizabeth A. Skewes,et al.  Item Nonresponse: Distinguishing between don't Know and Refuse , 2002 .

[36]  ティモシー モリー,et al.  Customer Data : Designing for Transparency and Trust , 2015 .

[37]  Sven de Vries,et al.  Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..

[38]  HallamCory,et al.  Online self-disclosure , 2017 .

[39]  Michael H. Rothkopf,et al.  Thirteen Reasons Why the Vickrey-Clarke-Groves Process Is Not Practical , 2007, Oper. Res..

[40]  Glenn Woroch,et al.  The demographics of the do-not-call list [security of data] , 2005, IEEE Security & Privacy.

[41]  Yuan Li,et al.  Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework , 2011, Commun. Assoc. Inf. Syst..

[42]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[43]  Alessandro Acquisti,et al.  When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information , 2007, WEIS.

[44]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[45]  Ronald M. Harstad,et al.  Computationally Manageable Combinational Auctions , 1998 .

[46]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[47]  P. Rautava,et al.  Non-response and related factors in a nation-wide health survey , 2004, European Journal of Epidemiology.

[48]  J. G. Adair,et al.  The Hawthorne effect: A reconsideration of the methodological artifact. , 1984 .

[49]  Irwin Brown,et al.  Examining the influence of demographic factors on internet users' information privacy concerns , 2007, SAICSIT '07.

[50]  K. McConnell,et al.  A Review of Wta/Wtp Studies , 2000 .

[51]  Sören Preibusch,et al.  Guide to measuring privacy concern: Review of survey and observational instruments , 2013, Int. J. Hum. Comput. Stud..

[52]  D. Pitta,et al.  Consumer Concerns for Healthcare Information Privacy: A Comparison of US and Canadian Perspectives , 2009 .

[53]  Paul A. Pavlou,et al.  State of the information privacy literature: where are we now and where should we go? , 2011 .

[54]  Xiaoping Liu,et al.  Acquiring High Quality Customer Data with Low Cost , 2015, WEB.

[55]  Swinder Janda,et al.  Exploring Consumer Concerns Related to the Internet , 2004 .

[56]  Dara V. O'Neil Analysis of Internet Users’ Level of Online Privacy Concerns , 2001 .

[57]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[58]  D. Elbourne,et al.  Systematic review of the Hawthorne effect: New concepts are needed to study research participation effects☆ , 2014, Journal of clinical epidemiology.

[59]  Anindya Ghose,et al.  An Empirical Analysis of Search Engine Advertising: Sponsored Search in Electronic Markets , 2009, Manag. Sci..