Valuation of Personal Information Completed Research Paper
暂无分享,去创建一个
[1] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[2] Benjamin Thomsen,et al. Personal data: how context shapes consumers’ data sharing with organizations from various sectors , 2015, Electron. Mark..
[3] Sumit Sarkar,et al. Digression and Value Concatenation to Enable Privacy-Preserving Regression , 2014, MIS Q..
[4] Nicu Sebe,et al. Money walks: a human-centric study on the economics of personal mobile data , 2014, UbiComp.
[5] Sören Preibusch,et al. Guide to measuring privacy concern: Review of survey and observational instruments , 2013, Int. J. Hum. Comput. Stud..
[6] Khaled El Emam,et al. Guide to the De-Identification of Personal Health Information , 2013 .
[7] Sumit Sarkar,et al. Class-Restricted Clustering and Microperturbation for Data Privacy , 2013, Manag. Sci..
[8] Vijay Erramilli,et al. Your browsing behavior for a big mac: economics of personal information online , 2011, WWW.
[9] Christine Bauer,et al. Psychology of Ownership and Asset Defense: Why People Value Their Personal Information Beyond Privacy , 2012, ICIS.
[10] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[11] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[12] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[13] Shivendu Shivendu,et al. Mechanism Design for "Free" but "No Free Disposal" Services: The Economics of Personalization Under Privacy Concerns , 2010, Manag. Sci..
[14] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[15] Joshua Fogel,et al. Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..
[16] Adam N. Joinson,et al. Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys , 2008, Comput. Hum. Behav..
[17] Kai Lung Hui,et al. Consumer Privacy and Marketing Avoidance: A Static Model , 2008, Manag. Sci..
[18] Irwin Brown,et al. Examining the influence of demographic factors on internet users' information privacy concerns , 2007, SAICSIT '07.
[19] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[20] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[21] George Danezis,et al. A study on the value of location privacy , 2006, WPES '06.
[22] E. Maasland,et al. Auction Theory , 2021, Springer Texts in Business and Economics.
[23] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[24] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[25] Glenn Woroch,et al. The demographics of the do-not-call list [security of data] , 2005, IEEE Security & Privacy.
[26] George Danezis,et al. How Much Is Location Privacy Worth? , 2005, WEIS.
[27] Kuanchin Chen,et al. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..
[28] P. Rautava,et al. Non-response and related factors in a nation-wide health survey , 2004, European Journal of Epidemiology.
[29] H. Humphrey,et al. Standards for privacy of individually identifiable health information. , 2003, Health care law monthly.
[30] H. Varian,et al. Conditioning Prices on Purchase History , 2005 .
[31] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[32] T. Graeff,et al. Collecting and using personal data: consumers’ awareness and concerns , 2002 .
[33] Elizabeth A. Skewes,et al. Item Nonresponse: Distinguishing between don't Know and Refuse , 2002 .
[34] J. Schafer,et al. Missing data: our view of the state of the art. , 2002, Psychological methods.
[35] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[36] John A. List,et al. What Experimental Protocol Influence Disparities Between Actual and Hypothetical Stated Values? , 2001 .
[37] S. Wold,et al. PLS-regression: a basic tool of chemometrics , 2001 .
[38] Dara V. O'Neil. Analysis of Internet Users’ Level of Online Privacy Concerns , 2001 .
[39] K. McConnell,et al. A Review of Wta/Wtp Studies , 2000 .
[40] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[41] Daniel R. Vincent,et al. The Declining Price Anomaly , 1993 .
[42] M. Degroot,et al. Measuring utility by a single-response sequential method. , 1964, Behavioral science.