Personal information privacy and emerging technologies

This research presents a model of personal information privacy (PIP) that includes not only transactional data gathering, but also interorganisational data sharing. Emerging technologies are used as a lens through which the discussion of PIP management is extended. Research directions are developed for aspects of privacy, privacy‐preserving technologies, interorganisational data sharing and policy development.

[1]  Michael Friedewald,et al.  Safeguards in a World of Ambient Intelligence (The International Library of Ethics, Law and Technology) , 2008 .

[2]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[3]  H. Jeff Smith Information Privacy and its Management , 2004, MIS Q. Executive.

[4]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[5]  Andrew Savitz,et al.  The Triple Bottom Line: How Today's Best-Run Companies Are Achieving Economic, Social and Environmental Success -- and How You Can Too , 2006 .

[6]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[7]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[8]  Fabrice Jotterand,et al.  Emerging conceptual, ethical and policy issues in bionanotechnology , 2008 .

[9]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[10]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[11]  R. Bucklin,et al.  Click Here for Internet Insight: Advances in Clickstream Data Analysis in Marketing , 2009 .

[12]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[13]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[14]  K.S.J. Pister,et al.  An ultra-low energy microcontroller for Smart Dust wireless sensor networks , 2004, 2004 IEEE International Solid-State Circuits Conference (IEEE Cat. No.04CH37519).

[15]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[16]  Alfred Kobsa,et al.  Privacy-enhanced personalization , 2006, FLAIRS.

[17]  Jason Scott Robert Nanoscience, Nanoscientists, and Controversy , 2009 .

[18]  Adam N. Joinson,et al.  Privacy and self-disclosure online , 2006, CHI Extended Abstracts.

[19]  Steven D. Zink,et al.  High tech/high touch: technology and our search for meaning , 2000 .

[20]  Joanne H. Pratt,et al.  Privacy Loss: An Expanded Model of Legal and Illegal Data Exchange , 2011 .

[21]  Murugan Anandarajan,et al.  Hiding Crimes in Cyberspace: Crime and Victimization in Public Access Internet Facilities , 2009 .

[22]  F. Nelson Ford,et al.  Information Security Effectiveness: Conceptualization and Validation of a Theory , 2007, Int. J. Inf. Secur. Priv..

[23]  Chen Wang,et al.  Consumer privacy concerns about Internet marketing , 1998, CACM.

[24]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[25]  D. Wilemon,et al.  From emerging technology to competitive advantage , 1999, PICMET '99: Portland International Conference on Management of Engineering and Technology. Proceedings Vol-1: Book of Summaries (IEEE Cat. No.99CH36310).

[26]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[27]  J. Rubenfeld The Right of Privacy , 1989 .

[28]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[29]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[30]  Peter Teunissen,et al.  Testing a new multivariate GNSS carrier phase attitude determination method for remote sensing platforms , 2010 .

[31]  Alfred Kobsa,et al.  Privacy-enhanced personalization , 2007, CACM.

[32]  Joanne H. Pratt,et al.  Without Permission: Privacy on the Line , 2009, Int. J. Inf. Secur. Priv..

[33]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[34]  Yolande E. Chan,et al.  Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..

[35]  John Horgan,et al.  Terrorism and Organized Crime: A Theoretical Perspective , 2009 .

[36]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[37]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[38]  D. Harrison Charles J Vivek McKnight,et al.  Dispositional Trust And Distrust Distinctions in Predicting High- and Low-Risk Internet Expert Advice Site Perceptions , 2005 .

[39]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[40]  Robin L. Wakefield,et al.  Examining User Perceptions of Third-Party Organizations Credibility and Trust in an E-Retailer , 2006, J. Organ. End User Comput..

[41]  Moez Limayem,et al.  A Critical Review of Online Consumer Behavior: Empirical Research , 2005, J. Electron. Commer. Organ..

[42]  Katina Michael,et al.  A Note on Überveillance / A Note on Uberveillance , 2007 .

[43]  Robert M. Deiters Organization for Economic Co-Operation and Development (OECD). , 1968 .