JonDonym Users' Information Privacy Concerns
暂无分享,去创建一个
[1] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[2] Lujo Bauer,et al. Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.
[3] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[4] Thijs Veugen,et al. Transparency Enhancing Tools (TETs): An Overview , 2013, 2013 Third Workshop on Socio-Technical Aspects in Security and Trust.
[5] M. Hill,et al. Consumer privacy and the Internet in Europe: a view from Germany , 2003 .
[6] Naresh K. Malhotra,et al. Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..
[7] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[8] Jon Heales,et al. The Influence of Privacy, Trust, and National Culture on Internet Transactions , 2017, HCI.
[9] Sebastian Pape,et al. Privacy Concerns and Behavior of Pokémon Go Players in Germany , 2017, Privacy and Identity Management.
[10] Sarah Spiekermann. The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services , 2005, Int. J. Technol. Hum. Interact..
[11] Ganesh Iyer,et al. A Usability Evaluation of Tor Launcher , 2017, Proc. Priv. Enhancing Technol..
[12] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[13] Ioannis Krontiris,et al. User Acceptance Factors for Anonymous Credentials: An Empirical Investigation , 2015, WEIS.
[14] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[15] M. Sarstedt,et al. A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .
[16] Charles D. Raab,et al. Laws, PETs and Other Technologies for Privacy Protection , 2001, J. Inf. Law Technol..
[17] R. M. Fano,et al. Some thoughts about the social implications of accessible computing , 1899, AFIPS '65 (Fall, part I).
[18] Constantin Blome,et al. Ethical Climate and Purchasing Social Responsibility: A Benevolence Focus , 2013 .
[19] Sebastian Pape,et al. Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go , 2017, 2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR).
[20] Larry D. Rosen,et al. The Media and Technology Usage and Attitudes Scale: An empirical investigation , 2013, Comput. Hum. Behav..
[21] Antonio Krüger,et al. Towards Understanding the Influence of Personality on Mobile App Permission Settings , 2017, INTERACT.
[22] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .