Assessing Theories for Research on Personal Data Transparency
暂无分享,去创建一个
[1] Emilee J. Rader,et al. Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google , 2014, SOUPS.
[2] Herman T. Tavani,et al. PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .
[3] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[4] Daniel J. Veit,et al. Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization , 2017, J. Manag. Inf. Syst..
[5] Johana Cabinakova,et al. An Empirical Analysis of Privacy Dashboard Acceptance: the Google Case , 2016, ECIS.
[6] K. Eisenhardt. Agency Theory: An Assessment and Review , 1989 .
[7] H. Tavani. Informational Privacy: Concepts, Theories, and Controversies , 2009 .
[8] J. Greenberg,et al. A Taxonomy of Organizational Justice Theories , 1987 .
[9] Kristen L. Walker. Surrendering Information through the Looking Glass: Transparency, Trust, and Protection , 2016 .
[10] Marit Hansen,et al. Marrying Transparency Tools with User-Controlled Identity Management , 2007, FIDIS.
[11] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[12] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[13] M. Spence. Job Market Signaling , 1973 .
[14] H. Simon,et al. A Behavioral Model of Rational Choice , 1955 .
[15] Christian Fuchs,et al. Towards an Alternative Concept of Privacy , 2011, J. Inf. Commun. Ethics Soc..
[16] Shirley Gregor,et al. The Nature of Theory in Information Systems , 2006, MIS Q..
[17] P. K. Kannan,et al. The customer economics of internet privacy , 2002 .
[18] Jennifer A. Pope,et al. Marketing implications of privacy concerns in the US and Canada , 2009 .
[19] Irene Pollach,et al. Privacy Statements as a Means of Uncertainty Reduction in WWW Interactions , 2006, J. Organ. End User Comput..
[20] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[21] Shara Monteleone. Addressing the 'Failure' of Informed Consent in Online Data Protection: Learning the Lessons from Behaviour-Aware Regulation , 2015 .
[22] I. Ajzen,et al. Predicting and Changing Behavior: The Reasoned Action Approach , 2009 .
[23] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[24] E CrosslerRobert,et al. Company information privacy orientation , 2015 .
[25] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[26] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[27] Kelly G. Shaver,et al. THE ENVIRONMENT AND SOCIAL BEHAVIOR , 2015 .
[28] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[29] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[30] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[31] Benjamin Thomsen,et al. Personal data: how context shapes consumers’ data sharing with organizations from various sectors , 2015, Electron. Mark..
[32] Jennifer Heath,et al. Contemporary Privacy Theory Contributions to Learning Analytics , 2014, J. Learn. Anal..
[33] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[34] Dirk Ifenthaler,et al. Student perceptions of privacy principles for learning analytics , 2016, Educational Technology Research and Development.
[35] Alessandro Acquisti,et al. Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.
[36] S. Petronio. Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .
[37] Alessandro Acquisti,et al. Sleights of privacy: framing, disclosures, and the limits of transparency , 2013, SOUPS.
[38] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[39] Robert G. Capra,et al. Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..
[40] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[41] Wolfgang Maass,et al. Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts , 2012, MCIS.
[42] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[43] M. E. Gordon,et al. Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .
[44] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[45] Barry M. Staw,et al. What Theory is Not , 1995 .
[46] A. Tversky,et al. The framing of decisions and the psychology of choice. , 1981, Science.
[47] Simone Fischer-Hübner,et al. Tools for Achieving Usable Ex Post Transparency: A Survey , 2017, IEEE Access.
[48] Bo Zhang,et al. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes , 2016, CSCW.
[49] Jules Polonetsky,et al. To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising , 2011 .
[50] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[51] Robert E. Crossler,et al. Company information privacy orientation: a conceptual framework , 2015, Inf. Syst. J..
[52] A. Tversky,et al. Judgment under Uncertainty , 1982 .
[53] Markus Raab,et al. Theories of Decision Making , 2011 .
[54] Frantz Rowe,et al. What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..
[55] I. Ajzen. The theory of planned behavior , 1991 .
[56] Marit Hansen,et al. Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals , 2011, PrimeLife.
[57] George Siemens,et al. Ethical and privacy principles for learning analytics , 2014, Br. J. Educ. Technol..
[58] Yuan Li,et al. Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..
[59] H. Simon,et al. Theories of Decision-Making in Economics and Behavioural Science , 1966 .
[60] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[61] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[62] Mireille Hildebrandt,et al. The Dawn of a Critical Transparency Right for the Profiling Era , 2012 .
[63] Daniel Veit,et al. The Influence of Privacy Dispositions on Perceptions of Information Transparency and Personalization Preferences , 2017, HICSS.