Achieving a Balance Between Privacy Protection and Data Collection: A Field Experimental Examination of a Theory-Driven Information Technology Solution
暂无分享,去创建一个
[1] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[2] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[3] H. Teo,et al. Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior , 2004 .
[4] Laurence Ashworth,et al. Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .
[5] Anupam Das,et al. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.
[6] Dane K. Peterson,et al. Privacy Policy Statements and Consumer Willingness to Provide Personal Information , 2006, J. Electron. Commer. Organ..
[7] J. Cacioppo,et al. Communication and persuasion , 1986 .
[8] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[9] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[10] Yuan Li,et al. A multi-level model of individual information privacy beliefs , 2014, Electron. Commer. Res. Appl..
[11] Daniel J. Veit,et al. Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization , 2017, J. Manag. Inf. Syst..
[12] Sumeet Gupta,et al. Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..
[13] David Gefen,et al. Do context and personality matter? Trust and privacy concerns in disclosing private information online , 2016, Inf. Manag..
[14] Shyi-Ming Chen,et al. Handling multicriteria fuzzy decision-making problems based on vague set theory , 1994 .
[15] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[16] Jen-Her Wu,et al. Proactive privacy practices in transition: Toward ubiquitous services , 2014, Inf. Manag..
[17] Tao Zhou,et al. The effect of perceived justice on LBS users’ privacy concern , 2016 .
[18] Hock-Hai Teo,et al. Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..
[19] Zhenhui Jiang,et al. Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior , 2016, J. Manag. Inf. Syst..
[20] Camilla M. Holmvall,et al. Predicting Customer Service Employees’ Job Satisfaction and Turnover Intentions: The Roles of Customer Interactional Injustice and Interdependent Self-Construal , 2007 .
[21] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[22] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[23] Yue Liu. User control of personal information concerning mobile-app: Notice and consent? , 2014, Comput. Law Secur. Rev..
[24] David N. Chin. Information Filtering, Expertise and Cognitive Load , 2007, HCI.
[25] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[26] Norman M. Sadeh,et al. The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences , 2020, Proc. Priv. Enhancing Technol..
[27] Rüdiger Grimm,et al. Can P3P help to protect privacy worldwide? , 2000, MULTIMEDIA '00.
[28] Peter D. Nyheim,et al. Predictors of avoidance towards personalization of restaurant smartphone advertising: A study from the Millennials’ perspective , 2015 .
[29] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[30] Stefano Taddei,et al. Privacy, trust and control: Which relationships with online self-disclosure? , 2013, Comput. Hum. Behav..
[31] Jie Gu,et al. Privacy concerns for mobile app download: An elaboration likelihood model perspective , 2017, Decis. Support Syst..
[32] Zhu Jian. Aggregation Approach of Two Kinds of Three-Point Interval Number Comparison Matrix in Group Decision Making , 2007 .
[33] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[34] L. A. ZADEH,et al. The concept of a linguistic variable and its application to approximate reasoning - I , 1975, Inf. Sci..
[35] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[36] Yang Wang,et al. Nudges for Privacy and Security , 2017, ACM Comput. Surv..
[37] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[38] Elisa Bertino,et al. Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.
[39] Zeshui Xu,et al. An interactive procedure for linguistic multiple attribute decision making with incomplete weight information , 2007, Fuzzy Optim. Decis. Mak..
[40] Sören Preibusch,et al. Implementing Privacy Negotiations in E-Commerce , 2006, APWeb.
[41] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[42] David A. Wagner,et al. The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[43] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[44] Robert E. Crossler,et al. Disclosing too much? Situational factors affecting information disclosure in social commerce environment , 2014, Electron. Commer. Res. Appl..
[45] Ken Barker,et al. A Model for Privacy Compromisation Value , 2014, EUSPN/ICTH.
[46] Ohbyung Kwon,et al. A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce , 2010, Decis. Support Syst..
[47] Rong Lan,et al. TOPSIS Decision-Making Method for Three Parameters Interval-Valued Fuzzy Sets , 2009 .
[48] S. Upadhyaya,et al. Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens , 2009, IEEE Transactions on Professional Communication.
[49] Beverley Sparks,et al. Justice strategy options for increased customer satisfaction in a services recovery setting , 2001 .