Preference-based location sharing: are more privacy options really better?
暂无分享,去创建一个
[1] Alessandro Acquisti,et al. Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .
[2] Gregory D. Abowd,et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.
[3] Lorrie Faith Cranor,et al. Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.
[4] V. Srinivasan,et al. A CONJUNCTIVE-COMPENSATORY APPROACH TO THE SELF-EXPLICATION OF MULTIATTRIBUTED PREFERENCES* , 1988 .
[5] G. Loewenstein,et al. Misplaced Confidences: Privacy and the Control Paradox. , 2010 .
[6] M. F. Luce,et al. Constructive Consumer Choice Processes , 1998 .
[7] R. Luce,et al. The Choice Axiom after Twenty Years , 1977 .
[8] Jens Grossklags,et al. What Can Behavioral Economics Teach Us about Privacy , 2008 .
[9] R. Duncan Luce,et al. Individual Choice Behavior: A Theoretical Analysis , 1979 .
[10] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[11] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[12] Alfred Kobsa,et al. Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems , 2013, TIIS.
[13] George P. Huber,et al. Multi-Attribute Utility Models: A Review of Field and Field-Like Studies , 1974 .
[14] R. Luce,et al. Individual Choice Behavior: A Theoretical Analysis. , 1960 .
[15] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[16] S. Davies. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity , 1997 .
[17] Joel Huber,et al. Market Boundaries and Product Choice: Illustrating Attraction and Substitution Effects , 1983 .
[18] Lorrie Faith Cranor,et al. Location-Sharing Technologies: Privacy Risks and Controls , 2009 .
[19] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[20] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[21] A. Tversky. Elimination by aspects: A theory of choice. , 1972 .
[22] Rui Aguiar,et al. Low-latency privacy-enabled Context Distribution Architecture , 2012, 2012 IEEE International Conference on Communications (ICC).
[23] Lorrie Faith Cranor,et al. Empirical models of privacy in location sharing , 2010, UbiComp.
[24] Daniel P. Siewiorek,et al. The implications of offering more disclosure choices for social location sharing , 2012, CHI.
[25] I. Simonson,et al. Choice Based on Reasons: The Case of Attraction and Compromise Effects , 1989 .
[26] B. Schwartz. The Paradox of Choice: Why More Is Less , 2004 .
[27] A. Acquisti,et al. Digital privacy : theory, technologies, and practices , 2007 .
[28] Alfred Kobsa,et al. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns , 2012, ICWSM.
[29] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[30] Aniket Kittur,et al. Crowdsourcing user studies with Mechanical Turk , 2008, CHI.
[31] Alfred Kobsa,et al. Methodological reflections on a field study of a globally distributed software project , 2011, Inf. Softw. Technol..
[32] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[33] Alistair Kelman,et al. Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..
[34] M. Carlson,et al. Panopticon.com: Online Surveillance and the Commodification of Privacy , 2002 .
[35] Bas van Schoonhoven,et al. User Privacy in Applications for Well-being and Well-working : Requirements and Approaches for User Controlled Privacy , 2012 .
[36] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[37] Kai-Lung Hui,et al. Internet opt-in and opt-out: investigating the roles of frames, defaults and privacy concerns , 2006, SIGMIS CPR '06.
[38] A. Chernev. When More Is Less and Less Is More: the Role of Ideal Point Availability and Assortment in Consumer Choice This Research Argues That Choices from Different Size Assort- Ments Are a Function of the Degree to Which Consumers Have , 2022 .
[39] Luís Fernandes Sousa. PRIVACY POLICY DYNAMICS IN LOCATION SHARING APPLICATIONS , 2009 .
[40] Alessandro Acquisti,et al. Nudging Users Towards Privacy on Mobile Devices , 2011 .
[41] Alfred Kobsa,et al. Uncovering privacy attitudes and practices in instant messaging , 2005, GROUP.
[42] Aarathi Prasad. Exposing privacy concerns in mHealth data sharing , 2012 .