Information Privacy Research: An Interdisciplinary Review

To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we classify previous literature in two ways: (1) using an ethics-based nomenclature of normative, purely descriptive, and empirically descriptive, and (2) based on their level of analysis: individual, group, organizational, and societal. Based upon our analyses via these two classification approaches, we identify three major areas in which previous research contributions reside: the conceptualization of information privacy, the relationship between information privacy and other constructs, and the contextual nature of these relationships. As we consider these major areas, we draw three overarching conclusions. First, there are many theoretical developments in the body of normative and purely descriptive studies that have not been addressed in empirical research on privacy. Rigorous studies that either trace processes associated with, or test implied assertions from, these value-laden arguments could add great value. Second, some of the levels of analysis have received less attention in certain contexts than have others in the research to date. Future empirical studies-both positivist and interpretive--could profitably be targeted to these under-researched levels of analysis. Third, positivist empirical studies will add the greatest value if they focus on antecedents to privacy concerns and on actual outcomes. In that light, we recommend that researchers be alert to an overarching macro model that we term APCO (Antecedents → Privacy Concerns → Outcomes).

[1]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[2]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[3]  Jacques Penders,et al.  Privacy in (mobile) Telecommunications Services , 2004, Ethics and Information Technology.

[4]  Robert C. Post,et al.  The Social Foundations of Privacy: Community and Self in the Common Law Tort , 1989 .

[5]  Michael Miller Absolute PC Security and Privacy , 2002 .

[6]  David H. Holtzman,et al.  Privacy Lost: How Technology Is Endangering Your Privacy , 2006 .

[7]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[8]  Myron Brenton The privacy invaders , 1964 .

[9]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[10]  Sumit Sarkar,et al.  Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data , 2006, Inf. Syst. Res..

[11]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[12]  Charles K. Parsons,et al.  Employee privacy , 1990 .

[13]  Tsvi Kuflik,et al.  Privacy-enhanced collaborative filtering , 2005 .

[14]  Tara M. Swaminatha,et al.  Wireless Security and Privacy: Best Practices and Design Techniques , 2002 .

[15]  John C. Raines Attack on privacy , 1974 .

[16]  G. Hofstede,et al.  Culture′s Consequences: International Differences in Work-Related Values , 1980 .

[17]  Wenliang Du,et al.  Privacy-Preserving Collaborative Filtering , 2005, Int. J. Electron. Commer..

[18]  Alfred Kobsa,et al.  Uncovering privacy attitudes and practices in instant messaging , 2005, GROUP.

[19]  Alfred Kobsa,et al.  Privacy-enhanced personalization , 2007, CACM.

[20]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[21]  Richard F. Hixson Privacy in a Public Society: Human Rights in Conflict , 1987 .

[22]  D. Davis,et al.  Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .

[23]  Colin J. Bennett,et al.  The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..

[24]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[25]  Laurie Thomas Lee Defining Privacy: Freedom in a Democratic Constitutional State , 2002 .

[26]  Laurence Ashworth,et al.  Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .

[27]  P. Klopfer,et al.  The Concept Privacy and Its Biological Basis , 1977 .

[28]  Lieutenant Governor,et al.  2007 Health Insurance Market Report , 2007 .

[29]  Tom Peters,et al.  Computerized monitoring and online privacy , 1999 .

[30]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[31]  Charles Jennings,et al.  The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet , 2000 .

[32]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[33]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[34]  Trevor T. Moores,et al.  Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.

[35]  Deckle McLean Privacy and its invasion , 1995 .

[36]  Canice Prendergast,et al.  The Tenuous Trade‐off between Risk and Incentives , 2000, Journal of Political Economy.

[37]  Adam Carlyle Breckenridge The Right to Privacy , 1970 .

[38]  Sirkka L. Jarvenpaa,et al.  Communication and Trust in Global Virtual Teams , 1999 .

[39]  Tony Smythe,et al.  The invasion of privacy , 1974 .

[40]  Dorothy E. Leidner,et al.  Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..

[41]  Patricia Brierley Newell A cross-cultural comparison of privacy definitions and functions: a systems approach , 1998 .

[42]  R. Winer A Framework for Customer Relationship Management , 2001 .

[43]  Brock N. Meeks The Privacy Hoax , 1999 .

[44]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[45]  Gurpreet Dhillon,et al.  Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..

[46]  Andrew T. Frackman,et al.  Internet and Online Privacy: A Legal and Business Guide , 2002 .

[47]  Helen Nissenbaum,et al.  The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..

[48]  Kim Bartel Sheehan,et al.  Using E-mail To Survey Internet Users In The United States: Methodology And Assessment , 2006, J. Comput. Mediat. Commun..

[49]  Thomas A. Peters,et al.  Privacy on the line: The politics of wiretapping and encryption , 1998 .

[50]  Simone Fischer Hübner IT-Security and Privacy : Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[51]  Mary J. Culnan,et al.  Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys , 2002, Inf. Soc..

[52]  Colin J. Bennett,et al.  The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .

[53]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[54]  Jan van Dijk,et al.  Personalization in the public sector: An inventory of organizational and user obstacles towards personalization of electronic services in the public sector , 2007, Gov. Inf. Q..

[55]  Andrew Odlyzko Privacy, Economics, and Price Discrimination on the Internet , 2003 .

[56]  D. Zwick,et al.  Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing , 2004 .

[57]  Thomas A. Peters Privacy on the Line: The Politics of Wiretapping and Encryption, by Whitfield Diffie and Susan Landau , 1998, J. Am. Soc. Inf. Sci..

[58]  Don R. Pember Privacy and the Press: The Law, the Mass Media, and the First Amendment, , 1972 .

[59]  Shivendu Shivendu,et al.  An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online Personalization , 2006, J. Manag. Inf. Syst..

[60]  Carson K. Eoyang,et al.  Effects of group size and privacy in residential crowding. , 1974 .

[61]  R. Posner The Economics of Privacy , 1981 .

[62]  Alan R. Peslak Internet Privacy Policies: A Review and Survey of the Fortune 50 , 2005, Inf. Resour. Manag. J..

[63]  Heng Xu,et al.  Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy , 2009 .

[64]  Andrew J. Rohm,et al.  Consumers' Protection of Online Privacy and Identity , 2004 .

[65]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[66]  Dwayne Whitten,et al.  What is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles , 2005, Commun. Assoc. Inf. Syst..

[67]  Bradley J. Alge,et al.  Information privacy in organizations: empowering creative and extrarole performance. , 2006, The Journal of applied psychology.

[68]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[69]  Anthony D. Miyazaki,et al.  Internet Privacy and Security: An Examination of Online Retailer Disclosures , 2000 .

[70]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[71]  Charles C. Hinnant,et al.  Examining pre-adoption interest in online innovations: an exploratory study of e-service personalization in the public sector , 2003, IEEE Trans. Engineering Management.

[72]  Lynette I. Millett,et al.  Authentication, Privacy, and the Federal E-Government , 2005, Inf. Soc..

[73]  William S. Hubbartt The new battle over workplace privacy : how far can management go? what rights do employees have? : safe practices to minimize conflict, confusion, and litigation , 1998 .

[74]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[75]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[76]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[77]  Kathrin M. Möslein,et al.  Identities Management for E-Commerce and Collaboration Applications , 2005, Int. J. Electron. Commer..

[78]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[79]  Michael D. Smith,et al.  Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2007, J. Manag. Inf. Syst..

[80]  H. Nissenbaum Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.

[81]  Sumeet Gupta,et al.  The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..

[82]  Colin J. Bennett The governance of privacy , 2003 .

[83]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[84]  Colin J. Bennett,et al.  The Distribution of Privacy Risks , 1998 .

[85]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[86]  Kai Lung Hui,et al.  Disclosure : Motivators and Measurements , 2006 .

[87]  Gary T. Marx,et al.  What's in a Name? Some Reflections on the Sociology of Anonymity , 1999, Inf. Soc..

[88]  Simon Rogerson,et al.  Are they really listening?: An investigation into published online privacy policies at the beginning of the third millennium , 2004, Inf. Technol. People.

[89]  James Marting,et al.  Security, Accuracy, and Privacy in Computer Systems , 1973 .

[90]  Rivka Ribak,et al.  Internet Power and Social Context: A Globalization Approach to Web Privacy Concerns , 2003 .

[91]  JoAnn Greco PRIVACY WHOSE RIGHT IS IT ANYHOW , 2001 .

[92]  J. Reiman,et al.  Privacy, Intimacy, and Personhood , 1984 .

[93]  Erik R. Eddy,et al.  THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .

[94]  Amitai Etzioni,et al.  The Limits Of Privacy , 1999 .

[95]  Louis R. Mizell Invasion of Privacy , 1998 .

[96]  Frank Biocca,et al.  Internet attitudes and Internet use: some surprising findings from the HomeNetToo project , 2003, Int. J. Hum. Comput. Stud..

[97]  Donald T. Dickson Confidentiality and Privacy in Social Work: A Guide to the Law for Practitioners and Students , 1998 .

[98]  Barbara Couture,et al.  References for The Private, the Public, and the Published: Reconciling Private Lives and Public Rhetoric , 2004 .

[99]  Julia Brande Earp,et al.  An experimental economics approach toward quantifying online privacy choices , 2006, Inf. Syst. Frontiers.

[100]  H. Varian,et al.  Conditioning Prices on Purchase History , 2005 .

[101]  Colin J. Bennett,et al.  The Adequacy of Privacy: the European Union Data Protection Directive and the North American Response , 1997, Inf. Soc..

[102]  Serge Gutwirth,et al.  Privacy and the Information Age , 2001 .

[103]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[104]  Fritz H. Grupe,et al.  Dealing with Data Privacy Protection: An Issue for the 21st Century , 2002, Inf. Syst. Manag..

[105]  Anthony D. Miyazaki,et al.  Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions , 2002 .

[106]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[107]  Michael A. Caloyannides Computer Forensics and Privacy , 2001 .

[108]  Keng Siau,et al.  e-Healthcare in ABC county health department (ABCCHD): trade-offs analysis and evaluation , 2006, J. Inf. Technol..

[109]  Sijun Wang,et al.  Signaling the trustworthiness of small online retailers , 2004 .

[110]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[111]  Darhl M. Pedersen,et al.  MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .

[112]  Don E. Schultz,et al.  On merging, purging and privacy , 1988 .

[113]  V. Derlega,et al.  Privacy and self-disclosure in social relationships. , 1977 .

[114]  S. Berkovsky Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering , 2006 .

[115]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[116]  Harry Kalven,et al.  The Right of Privacy in Tort Law - Were Warren and Brandeis Wrong? , 1966 .

[117]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[118]  Garry L. White,et al.  Privacy Protection Overseas as Perceived by USA-Based IT Professionals , 2007, J. Glob. Inf. Manag..

[119]  Virginia W. Kupritz,et al.  Privacy matters , 1998, Nature Genetics.

[120]  Linda Little,et al.  Public space systems: Designing for privacy? , 2005, Int. J. Hum. Comput. Stud..

[121]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[122]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[123]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[124]  S. Dolnicar,et al.  A Market-Oriented Approach to Responsibly Managing Information Privacy Concerns in Direct Marketing , 2007 .

[125]  Curtis R. Taylor Privacy and Information Acquisition in Competitive Markets , 2004 .

[126]  Susan M. Sorensen,et al.  Outsourcing, Offshoring, Nearshoring: What to Do? Whether You Outsource Locally or Globally, You're Still Responsible for Client Privacy , 2005 .

[127]  Fay Cobb Payton,et al.  e-Health Models Leading to Business-to-Employee Commerce in the Human Resources Function , 2003, J. Organ. Comput. Electron. Commer..

[128]  Samuel Greengard,et al.  Privacy matters , 2008, CACM.

[129]  Janice C. Sipior,et al.  The ethical and legal quandary of email privacy , 1995, CACM.

[130]  Peter P. Swire Efficient Confidentiality for Privacy, Security, and Confidential Business Information , 2003 .

[131]  Roger Clarke,et al.  Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.

[132]  Rita Walczuch,et al.  Implications of the new EU Directive on data protection for multinational corporations , 2001, Inf. Technol. People.

[133]  A. Kuper,et al.  Who Should Know What? Social Science, Privacy and Ethics , 1983 .

[134]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[135]  Lorrie Faith Cranor Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy , 2002, Inf. Soc..

[136]  H. J. Smith,et al.  Managing Privacy: Information Technology and Corporate America , 1994 .

[137]  William J. Gonzenbach,et al.  Press coverage and public perception of direct marketing and consumer privacy , 1994 .

[138]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[139]  Alfred Kobsa,et al.  Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.

[140]  Felix Stalder Opinion. Privacy is not the antidote to surveillance , 2002 .

[141]  Felix Stalder,et al.  Failures and Successes: Notes on the Development of Electronic Cash , 2002, Inf. Soc..

[142]  David Mason,et al.  Technology and ethical dilemmas in a medical setting: Privacy, professional autonomy, life and death , 2001, Ethics and Information Technology.

[143]  Robert Boncella Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..

[144]  K. Toll Privacy and Freedom. By Alan F. Westin. New York: Atheneum Press, 1967. $10.00 , 1968 .

[145]  A. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[146]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[147]  R. Mason Four ethical issues of the information age , 1986 .

[148]  Dianna L. Stone,et al.  Personnel Selection Procedures and Invasion of Privacy , 2003 .

[149]  Lorrie Faith Cranor Ten years of computers, freedom and privacy: a personal retrospective , 2000, CFP '00.

[150]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[151]  Chang Liu,et al.  Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..

[152]  Kai Lung Hui,et al.  Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits , 2004, ICIS.

[153]  Robert M. Davison,et al.  Information Privacy in a Globally Networked Society: Implications for IS Research , 2003, Commun. Assoc. Inf. Syst..

[154]  John Weckert,et al.  Computer and Information Ethics , 1997 .

[155]  J. P. Gould,et al.  Privacy and the Economics of Information , 1980, The Journal of Legal Studies.

[156]  Hock-Hai Teo,et al.  Privacy Considerations in Location-Based Advertising , 2005, Designing Ubiquitous Information Environments.

[157]  Meg McGinity Staying connected: surfing the turf , 2000 .

[158]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[159]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[160]  Iris A. Junglas,et al.  A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[161]  K. Hui,et al.  Economics of Privacy , 2005 .

[162]  Miriam J. Metzger,et al.  Public Opinion and Policy Initiatives for Online Privacy Protection , 2003 .

[163]  Christopher E. Beaudoin,et al.  Internet privacy practices of news media and implications for online journalism , 2005 .

[164]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[165]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[166]  Yolande E. Chan,et al.  Information Privacy: Management, Marketplace, and Legal Challenges , 2005, Commun. Assoc. Inf. Syst..

[167]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[168]  Robert E. Thomas,et al.  Database Marketing Practice: Protecting Consumer Privacy , 1997 .

[169]  Fred H. Cate,et al.  Privacy in the Information Age , 1997 .

[170]  Gerald L. Lohse,et al.  International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..

[171]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[172]  R. Gavison Privacy and the Limits of Law , 1980 .

[173]  Vasilios Katos,et al.  Modelling corporate wireless security and privacy , 2005, J. Strateg. Inf. Syst..

[174]  Peter P. Swire Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .

[175]  Hock-Hai Teo,et al.  Consumers' Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal , 2005, ECIS.

[176]  N. Sanders,et al.  Journal of behavioral decision making: "The need for contextual and technical knowledge in judgmental forecasting", 5 (1992) 39-52 , 1992 .

[177]  Hua Qian,et al.  Anonymity and Self-Disclosure on Weblogs , 2007, J. Comput. Mediat. Commun..

[178]  D. Lyon Surveillance society: Monitoring Everyday Life , 2001 .

[179]  S. Alpert,et al.  Protecting Medical Privacy: Challenges in the Age of Genetic Information , 2003 .

[180]  Oscar H. Gandy,et al.  The Political Economy of Personal Information , 2011 .

[181]  James Michael Privacy and human rights : an international and comparative study, with special reference to developments in information technology , 1994 .

[182]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[183]  Lorrie Faith Cranor,et al.  Power strips, prophylactics, and privacy, oh my! , 2006, SOUPS '06.

[184]  Jean-Francois Blanchette Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie and Susan Landau , 2004, Ethics and Information Technology.

[185]  Sanjay Bapna,et al.  A Wavelet-Based Approach to Preserve Privacy for Classification Mining , 2006, Decis. Sci..

[186]  Catherine Dwyer,et al.  Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[187]  Hock-Hai Teo,et al.  AIS Electronic , 2013 .

[188]  Ted Gottfried Privacy : individual right v. social needs , 1994 .

[189]  Gordon C. Bruner,et al.  Attitude toward Location-based Advertising , 2007 .

[190]  Mike Thelwall,et al.  Web crawling ethics revisited: Cost, privacy, and denial of service , 2006 .

[191]  I. Firestone,et al.  Compensatory Responses to Crowding: Effects of Personal Space Intrusion and Privacy Reduction , 1977 .

[192]  Anita L. Allen,et al.  Is privacy now possible? A brief history of an obsession , 2001 .

[193]  Lisa A. Ennis Information ethics: Privacy, property, and power , 2007, J. Assoc. Inf. Sci. Technol..

[194]  Giles D'Souza,et al.  Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .

[195]  Richard Volkman,et al.  Privacy as life, liberty, property , 2004, Ethics and Information Technology.

[196]  Don Tapscott,et al.  Who Knows? : Safeguarding Your Privacy in a Networked World , 1995 .

[197]  Andrea Monti,et al.  The Network Society as Seen From Italy , 2002, Inf. Soc..

[198]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[199]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[200]  T. Peters Computerization and Controversy: Value Conflicts and Social Choices (2nd Ed.), edited by Rob Kling , 1996, J. Am. Soc. Inf. Sci..

[201]  Rob Kling,et al.  Information Technologies and the Shifting Balance between Privacy and Social Control , 1995, Computerization and Controversy, 2nd Ed..

[202]  Ronald E. Rice,et al.  Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..

[203]  Gary Roboff,et al.  Privacy of financial information in cyberspace: banks addressing what consumers want , 1998 .

[204]  Mizuko Ito Mobile Phones, Japanese Youth, and the Re-placement of Social Contact , 2005 .

[205]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[206]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[207]  Chin-Laung Lei,et al.  Privacy and Anonymity Protection with Blind Threshold Signatures , 2002, Int. J. Electron. Commer..

[208]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[209]  N. Fairweather Surveillance in Employment: The Case of Teleworking , 1999 .

[210]  Curtis R. Taylor Consumer Privacy and the Market for Customer Information , 2004 .

[211]  Jane Webster,et al.  Personality as a moderator of monitoring acceptance , 2003, Comput. Hum. Behav..

[212]  Mathias Klang,et al.  Human Rights in the Digital Age , 2004 .

[213]  Norhayati Zakaria,et al.  Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East , 2003, Inf. Technol. People.

[214]  Alida Brill,et al.  Nobody's business : paradoxes of privacy , 1990 .

[215]  Peter P. Swire Financial Privacy and the Theory of High-Tech Government Surveillance , 1998 .

[216]  Robert F. Otondo,et al.  Individual Rights to Privacy and Corporate E-mail , 1997 .

[217]  E. Berscheid,et al.  Privacy: A hidden variable in experimental social psychology. , 1977 .

[218]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[219]  Peter M. Shane A Little Knowledge: Privacy, Security and Public Information After September 11 , 2004 .

[220]  Jacqueline Klosek Data Privacy in the Information Age , 2000 .

[221]  Geoff Brumfiel,et al.  Nanotechnology: A little knowledge... , 2003, Nature.

[222]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[223]  Barrington Moore,et al.  Privacy: Studies in Social and Cultural History. , 1986 .

[224]  R. I. Sutton,et al.  Organizational behavior: linking individuals and groups to organizational contexts. , 1993, Annual review of psychology.

[225]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[226]  Stephen Hsu,et al.  Internet Privacy and Security: A Startup's Perspective Information Dynamics in the Networked Society, April 4–5, 2002 , 2003, Inf. Syst. Frontiers.

[227]  Virgílio A. F. Almeida,et al.  Masks: Bringing Anonymity and Personalization Together , 2003, IEEE Secur. Priv..

[228]  Geoff Walsham,et al.  Ethical theory, codes of ethics and IS practice , 1996 .

[229]  Clinton E. White,et al.  The Information Center Concept: A Normative Model and a Study of Six Installations , 1987, MIS Q..

[230]  Gerard Salton A progress report on information privacy and data security , 1980, J. Am. Soc. Inf. Sci..

[231]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[232]  Gary L. Kreps,et al.  A rose by any other name: The vitality of group communication research , 1994 .

[233]  Nathaniel Good,et al.  Shock: Aggregating Information While Preserving Privacy , 2003, Inf. Syst. Frontiers.

[234]  Kuanchin Chen,et al.  Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..

[235]  Andrew T. Kenyon,et al.  New dimensions in privacy law , 2006 .

[236]  Stephanos Bibas,et al.  A Contractual Approach to Data Privacy , 1994 .

[237]  Jeffrey Rosen,et al.  The Unwanted Gaze: The Destruction of Privacy in America , 2000 .

[238]  Lorrie Faith Cranor,et al.  Internet privacy , 1999, CACM.

[239]  Lorrie Faith Cranor Internet Privacy - Introduction. , 1999 .

[240]  Sejung Marina Choi,et al.  Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .

[241]  Roberto Di Pietro,et al.  Security and privacy issues of handheld and wearable wireless devices , 2003, CACM.

[242]  L. Jean Camp Web Security and Privacy: An American Perspective , 1999, Inf. Soc..

[243]  Jonna Häkkilä,et al.  'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication , 2005, Mobile HCI.

[244]  Kai Lung Hui,et al.  Consumer Trust and Online Information Privacy , 2003, ICIS.

[245]  Joy L. Hart,et al.  Workplace Surveillance and Managing Privacy Boundaries , 2007 .

[246]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[247]  Thomas C. Rindfleisch,et al.  Privacy, information technology, and health care , 1997, CACM.

[248]  Boaz Gelbord,et al.  New surveillance techniques raise privacy concerns , 2002, CACM.

[249]  Lois G. Forer,et al.  A Chilling Effect: The Mounting Threat of Libel and Invasion of Privacy Actions to the First Amendment , 1987 .

[250]  W. M. Beaney,et al.  The Right to Privacy and American Law , 1966 .

[251]  Willis H Ware Privacy Issues and the Private Sector , 1976 .

[252]  Keri E. Pearlson,et al.  Managing and Using Information Systems , 2001 .

[253]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[254]  Willis H. Ware,et al.  Security and privacy in computer systems , 1899, AFIPS '67 (Spring).

[255]  Sonny S. Ariss,et al.  Computer monitoring: benefits and pitfalls facing management , 2002, Inf. Manag..

[256]  Joey F. George Computers in society : privacy, ethics, and the Internet , 2003 .

[257]  Kai Lung Hui,et al.  What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses , 2002, ICIS.

[258]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[259]  GLENN,et al.  Philosophical Views on the Value of Privacy , 1966 .

[260]  Noël Coward,et al.  Private Lives , 1930 .

[261]  Nikhilesh Dholakia,et al.  Contrasting European and American Approaches to Privacy in Electronic Markets: Property Right versus Civil Right , 2001, Electron. Mark..

[262]  K. Sheehan,et al.  Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns , 1999 .

[263]  Nick Taylor,et al.  State Surveillance and the Right to Privacy. , 2002 .

[264]  Scott Nicholson,et al.  Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA , 2007 .

[265]  Joshua B. Konvisser WHO OWNS INFORMATION ? FROM PRIVACY TO PUBLIC ACCESS , 2003 .

[266]  Bashar Nuseibeh,et al.  Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..

[267]  Susan Sprecher,et al.  Social Exchange Perspectives on the Dissolution of Close Relationships , 1992 .

[268]  Peter G. Neumann,et al.  Don't Trade Privacy for Security , 2005 .

[269]  Ibrahim Cingil,et al.  A broader approach to personalization , 2000, CACM.

[270]  Kathleen S. Hartzel,et al.  Exploring the privacy implications of addressable advertising and viewer profiling , 2006, CACM.

[271]  Markus Schneider,et al.  Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System , 2005, Inf. Syst. Frontiers.

[272]  Ritu Agarwal,et al.  Overcoming Personal Barriers to Adoption When Technology Enables Information to Be Available to Others , 2006 .

[273]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[274]  Mark Monmonier,et al.  Spying with Maps: Surveillance Technologies and the Future of Privacy , 2002 .

[275]  Christine Hine,et al.  Privacy in the Marketplace , 1998, Inf. Soc..

[276]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[277]  William Bonner,et al.  Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar , 2007 .

[278]  Lee S. Strickland,et al.  Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..

[279]  Harry Henderson Privacy in the Information Age , 1999 .

[280]  Anil Kumar Understanding Privacy , 2010 .

[281]  Eric Jorstad The Privacy Paradox , 2001 .

[282]  Chris Weber,et al.  Privacy Defended: Protecting Yourself Online , 2002 .

[283]  Subhasish Dasgupta,et al.  Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals , 2003, Inf. Syst. Manag..

[284]  Jeretta Horn Nord,et al.  E-monitoring in the workplace: privacy, legislation, and surveillance software , 2006, CACM.

[285]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[286]  Leysia Palen,et al.  Instant messaging in teen life , 2002, CSCW '02.

[287]  S. Jourard Some Psychological Aspects of Privacy , 1966 .

[288]  Brock N. Meeks,et al.  Electronic Frontier: The privacy hoax , 1999, CACM.

[289]  Silvana Trimi,et al.  Influence of the Web Vendor's Interventions on Privacy-related Behaviors in E-commerce , 2006, Commun. Assoc. Inf. Syst..

[290]  Rich Ling The Coordination of Everyday Life , 2004 .

[291]  Alessandro Acquisti,et al.  Uncertainty, Ambiguity and Privacy , 2005, WEIS.

[292]  Julia Brande Earp,et al.  Innovative web use to learn about consumer behavior and online privacy , 2003, CACM.

[293]  Donna L. Hoffman,et al.  Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web , 1999, Inf. Soc..

[294]  Gurpreet Dhillon,et al.  Do privacy seals in e-commerce really work? , 2003, CACM.

[295]  J. C. Cannon Privacy: What Developers and IT Professionals Should Know , 2004 .

[296]  Neil M. Richards,et al.  Privacy's Other Path: Recovering the Law of Confidentiality , 2007 .

[297]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[298]  Roger Brownsword Human Rights in the Digital Age , 2021, Human Rights and the Internet.

[299]  George R. Milne Consumer Participation in Mailing Lists: A Field Experiment , 1997 .

[300]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[301]  Jeff Smith,et al.  Privacy policies and practices: inside the organizational maze , 1993, CACM.

[302]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[303]  Tyrone Grandison Don't Trade Privacy for Security , 2005 .

[304]  Bruce Schneier,et al.  The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .

[305]  Annie I. Antón,et al.  Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.

[306]  Charles J. Sykes The End of Privacy , 1999 .

[307]  J. R. Landis,et al.  The measurement of observer agreement for categorical data. , 1977, Biometrics.

[308]  Gary T. Marx,et al.  A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .

[309]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[310]  Michael A Caloyannides,et al.  Privacy protection and computer forensics , 2004 .

[311]  Fay Cobb Payton,et al.  Information Privacy in the Service Sector: An Exploratory Study of Health Care and Banking Professionals , 2006, J. Organ. Comput. Electron. Commer..

[312]  Kurt H. Decker A manager's guide to employee privacy : laws, policies, and procedures , 1989 .

[313]  M. Lwin,et al.  A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online , 2003 .

[314]  David G. Bromley,et al.  Secrecy: A Cross-Cultural Perspective. , 1982 .

[315]  Brock N. Meeks Privacy lost, anytime, anywhere , 1997, CACM.

[316]  Robert LaRose,et al.  Your privacy is assured - of being disturbed: websites with and without privacy seals , 2006, New Media Soc..

[317]  Clay Calvert,et al.  Voyeur Nation: Media, Privacy, And Peering In Modern Culture , 2000 .

[318]  E. Shils,et al.  Privacy: Its Constitution and Vicissitudes , 1966 .

[319]  Mun-Cho Kim,et al.  Surveillance Technology, Privacy and Social Control , 2004 .

[320]  Mary J. Culnan,et al.  How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..

[321]  Hal Berghel Hijacking the web , 2002, CACM.

[322]  Stefan Edlund,et al.  The Social Contract Core , 2005, Electron. Commer. Res..

[323]  Paul J. Hart,et al.  Privacy Concerns and Levels of Information Exchange: An Empirical Investigation of Intended e-Services Use , 2006 .

[324]  SewellGraham,et al.  Neither good, nor bad, but dangerous , 2001 .

[325]  David L. Paul,et al.  Assessing technological barriers to telemedicine: technology-management implications , 1999 .

[326]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[327]  Mike Chiasson,et al.  If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy , 2005, Inf. Organ..

[328]  Zhen Lin,et al.  Genomic Research and Human Subject Privacy , 2004, Science.

[329]  K. Mccrohan Information Technology, Privacy, and the Public Good , 1989 .

[330]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[331]  J. Stanton,et al.  Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. , 2002 .

[332]  Milton R. Konvitz,et al.  Privacy and the Law: A Philosophical Prelude , 1966 .

[333]  Sissela Bok,et al.  Secrets: On the Ethics of Concealment and Revelation , 1982 .

[334]  Fred A. Mael,et al.  NONE OF YOUR BUSINESS: PARAMETERS OF BIODATA INVASIVENESS , 1996 .

[335]  Susan Landau,et al.  Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 1998 .

[336]  Erich Novak,et al.  Special issue , 2006, J. Complex..

[337]  Peter Swire,et al.  Security and privacy after September 11: the health care example , 2002, CFP '02.

[338]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[339]  Hock-Hai Teo,et al.  Information Privacy in the Digital Era: An Exploratory Research Framework , 2006, AMCIS.

[340]  Jan Camenisch,et al.  Information privacy?! , 2012, Comput. Networks.

[341]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[342]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[343]  Lorrie Faith Cranor,et al.  'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.

[344]  Ina Fourie Naked in Cyberspace: How to Find Personal Information Online (2nd ed.) , 2003 .

[345]  Peter P. Swire Of Elephants, Mice, and Privacy: International Choice of Law and the Internet , 1998 .

[346]  C. Ranganathan,et al.  Key dimensions of business-to-consumer web sites , 2002, Inf. Manag..

[347]  Telecommunications Board,et al.  Engaging Privacy and Information Technology in a Digital Age , 2007 .

[348]  Yossi Matias,et al.  How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.

[349]  Clare-Marie Karat,et al.  Usable privacy and security for personal information management , 2006, CACM.

[350]  Nora J. Rifon,et al.  Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior , 2007 .

[351]  Susan E. Anderson,et al.  Using Electronic Mail Surveys and Computer-Monitored Data for Studying Computer-Mediated Communication Systems , 1995 .

[352]  Lawrence Meir Friedman Private Lives: Families, Individuals, and the Law , 2005 .

[353]  Barbara Dill The Journalist's Handbook on Libel and Privacy , 1986 .

[354]  Ingoo Han,et al.  The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..

[355]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[356]  Brenda Dervin,et al.  Private Rights, Public Wrongs: The Computer and Personal Privacy , 1989 .

[357]  Gregory J. Pottie,et al.  Privacy in the global e-village , 2004, CACM.

[358]  Jeffry Allen Rice A Review of: “The Private, the Public, and the Published: Reconciling Private Lives and Public Rhetoric” , 2006 .

[359]  Benjamin Edelman,et al.  Adverse selection in online "trust" certifications and search results , 2011, Electron. Commer. Res. Appl..

[360]  André Bacard,et al.  The Computer Privacy Handbook , 1995 .

[361]  Frederick S. Lane,et al.  The Naked Employee: How Technology Is Compromising Workplace Privacy , 2003 .

[362]  Robert Jensen,et al.  Fables of Abundance: A Cultural History of Advertising in America@@@Marketing Modernism in Fin-de-Siecle Europe@@@Privacy and Publicity: Modern Architecture as Mass Media , 1995 .

[363]  R. Kling,et al.  Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .

[364]  Darien A McWhirter Search, seizure, and privacy , 1994 .

[365]  Reginald Whitaker,et al.  The End of Privacy: How Total Surveillance Is Becoming a Reality , 1999 .

[366]  Oscar H. Gandy,et al.  Public Opinion Surveys and the Formation of Privacy Policy , 2003 .

[367]  J. Hirshleifer Privacy: Its Origin, Function, and Future , 1980, The Journal of Legal Studies.

[368]  Ian Goldberg,et al.  Privacy-Enhancing Technologies for the Internet, II: Five Years Later , 2002, Privacy Enhancing Technologies.

[369]  Simson Garfinkel,et al.  Database Nation , 2000 .

[370]  William P. Smith,et al.  Privacy and Electronic Monitoring in the Workplace: A Model of Managerial Cognition and Relational Trust Development , 2005 .

[371]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[372]  Joseph Turow,et al.  Americans Online Privacy: The System Is Broken , 2003 .

[373]  Molly J. Walker Wilson,et al.  Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .

[374]  V. Packard,et al.  The Naked Society , 1964 .

[375]  S. Petronio Balancing the Secrets of Private Disclosures , 2000 .

[376]  E. Sundstrom,et al.  Privacy at Work: Architectural Correlates of Job Satisfaction and Job Performance , 1980 .

[377]  James T. Bennett,et al.  Information Technology and the World of Work , 2004 .

[378]  Stefan Linnhoff,et al.  The Emergence of Biometrics and Its Effect on Consumers , 2005 .

[379]  Mark S. Ackerman,et al.  Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.

[380]  Mark Cenite The Unwanted Gaze: The Destruction of Privacy in America , 2001 .

[381]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[382]  H. Jeff Smith Information Privacy and its Management , 2004, MIS Q. Executive.

[383]  R. Petty Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .

[384]  Tsvi Kuflik,et al.  PRAW - A PRivAcy model for the Web , 2005, J. Assoc. Inf. Sci. Technol..

[385]  J. Phelps,et al.  Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .

[386]  Xueming Luo Trust production and privacy concerns on the Internet , 2002 .

[387]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[388]  Veda C. Storey,et al.  Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? , 2006, Inf. Manag..

[389]  M. Nakada,et al.  Japanese Conceptions of Privacy: An Intercultural Perspective , 2005, Ethics and Information Technology.

[390]  Scott C. D'Urso,et al.  Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .

[391]  Keng Siau,et al.  An Experimental Study on U-Commerce Adoption: The Impact of Personalization and Privacy Concerns , 2006, AMCIS.

[392]  Georg Aichholzer,et al.  Public Sector Information in the Digital Age , 2004 .

[393]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[394]  A. Michael Froomkin,et al.  Legal Issues in Anonymity and Pseudonymity , 1999, Inf. Soc..

[395]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[396]  Tom Spencer Privacy and transparency: the race to the bottom , 2006 .

[397]  Subhasish Dasgupta,et al.  ICT and Business in the New Economy: Globalization and Attitudes Towards eCommerce , 2004, J. Glob. Inf. Manag..

[398]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[399]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[400]  Richard D. Christy,et al.  Relationship marketing in consumer markets , 1996 .

[401]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[402]  Eric K. Clemons,et al.  Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market , 2000, J. Manag. Inf. Syst..

[403]  Mary J. Culnan,et al.  Giant Food and Elensys: Looking Out For Customer Gross Privacy Invasion? , 2005, Commun. Assoc. Inf. Syst..

[404]  K. Sheehan,et al.  An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .

[405]  Rob Kling,et al.  Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference , 1999, Inf. Soc..

[406]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[407]  George R. Milne Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue , 2000 .

[408]  Thomas D. Clark,et al.  The Dynamic Structure of Management Support Systems: Theory Development, Research Focus, and Direction , 2007, MIS Q..

[409]  Robert C. Post,et al.  Three Concepts of Privacy , 2001 .

[410]  Alberto Escudero-Pascual,et al.  Questioning lawful access to traffic data , 2004, CACM.

[411]  Roger Clarke,et al.  The Digital Persona and Its Application to Data Surveillance , 1994, Inf. Soc..

[412]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[413]  John Weckert Electronic monitoring in the workplace: controversies and solutions , 2004 .

[414]  Daniel J. Solove The Digital Person , 2022 .

[415]  Renée Marlin-Bennett,et al.  Knowledge Power: Intellectual Property, Information, and Privacy , 2004 .

[416]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[417]  Oren Etzioni,et al.  Privacy interfaces for information management , 1999, CACM.

[418]  M. Jones Privacy: A Significant Marketing Issue for the 1990s , 1991 .

[419]  D. Boyd Facebook's Privacy Trainwreck , 2008 .

[420]  S. I. Benn Philosophical Dimensions of Privacy: Privacy, freedom, and respect for persons , 1984 .

[421]  James R. Barker,et al.  Neither good, nor bad, but dangerous: Surveillance as an ethical paradox , 2001, Ethics and Information Technology.

[422]  Ellen Alderman,et al.  Right to Privacy , 2001, Challenging Human Rights Violations: Using International Law in U.S. Courts.

[423]  Warren Freedman The right of privacy in the computer age , 1987 .

[424]  Evan Hendricks,et al.  Your Right to Privacy: A Basic Guide to Legal Rights in an Information Society , 1990 .

[425]  Mary Ann Eastlick,et al.  Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment , 2006 .

[426]  H. Raghav Rao,et al.  Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use , 2006, J. Assoc. Inf. Syst..

[427]  Ted O’Donoghue,et al.  The economics of immediate gratification , 2000 .

[428]  Alfred Kobsa,et al.  Personalized hypermedia and international privacy , 2002, CACM.

[429]  Raymond K. Wong,et al.  End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach , 2007, Inf. Syst. Frontiers.

[430]  D. D. Schoenbachler,et al.  Trust and customer willingness to provide information in database-driven relationship marketing , 2002 .

[431]  Miriam J. Metzger Communication Privacy Management in Electronic Commerce , 2007, J. Comput. Mediat. Commun..

[432]  Patricia H. Werhane The Normative/Descriptive Distinction in Methodologies of Business Ethics , 1994, Business Ethics Quarterly.

[433]  G. Zinkhan,et al.  Exploring the Impact of Online Privacy Disclosures on Consumer Trust , 2006 .

[434]  Alessandro Pavan,et al.  On the Optimality of Privacy in Sequential Contracting , 2006, J. Econ. Theory.

[435]  P. Schwartz,et al.  Privacy and the economics of personal health care information. , 1997, Texas law review.

[436]  Herbert Burkert,et al.  Privacy-enhancing technologies: typology, critique, vision , 1997 .

[437]  John Sopinka Freedom of Speech and Privacy in the Information Age , 1997, Inf. Soc..

[438]  Annie I. Antón,et al.  Financial privacy policies and the need for standardization , 2004, IEEE Security & Privacy Magazine.

[439]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[440]  Avraham N. Kluger,et al.  The error of accepting the "theoretical" null hypothesis: the rise, fall, and resurrection of commonsense hypotheses in psychology. , 2001, Psychological bulletin.

[441]  H. Teo,et al.  Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior , 2004 .

[442]  M. C. Slough Privacy, freedom, and responsibility , 1969 .

[443]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[444]  P. K. Kannan,et al.  The customer economics of internet privacy , 2002 .

[445]  T. White,et al.  Consumer Disclosure and Disclosure Avoidance: A Motivational Framework , 2004 .

[446]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[447]  Matthew Rabin,et al.  Choice and Procrastination , 2000 .

[448]  Jacqueline Klosek The War on Privacy , 2006 .

[449]  Alfred Kobsa,et al.  Personalised hypermedia presentation techniques for improving online customer relationships , 2001, The Knowledge Engineering Review.

[450]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[451]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[452]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[453]  Sirkka L. Jarvenpaa,et al.  Integrating market, technology, and policy opportunities in e-business strategy , 1999, J. Strateg. Inf. Syst..

[454]  Robert C. Blattberg,et al.  Interactive Marketing: Exploiting the Age of Addressability , 1991 .

[455]  Paulo B. Góes,et al.  Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat , 2002, Manag. Sci..

[456]  Julie E. Cohen Privacy, Ideology, and Technology: A Response to Jeffrey Rosen , 2001 .

[457]  R. Chellappa Consumers ’ Trust in Electronic Commerce Transactions : The Role of Perceived Privacy and Perceived Security 1 Introduction , 2007 .

[458]  Mark E. Budnitz Privacy Protection for Consumer Transactions in Electronic Commerce: Why Self-Regulation Is Inadequate , 1998 .

[459]  Burke T. Ward,et al.  Ethical Management of Employee E-Mail Privacy , 1998, Inf. Syst. Manag..

[460]  Rob Kling,et al.  Assessing Anonymous Communication on the Internet: Policy Deliberations , 1999, Inf. Soc..

[461]  Paul Wang,et al.  Exploring the Dimensions of Consumer Privacy: An Analysis of Coverage in British and American Media , 1995 .

[462]  Priscilla M. Regan Safe Harbors or Free Frontiers? Privacy and Transborder Data Flows , 2003 .

[463]  Sanjay K. Singh,et al.  An analysis of the cultural motivations for transborder data flow legislation , 1995, Inf. Technol. People.

[464]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[465]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[466]  Veda C. Storey,et al.  Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.

[467]  Paul A. Swatman,et al.  The Price of Convenience: Developing a Framework for Analysing Privacy Sensitivity in the Adoption of Wireless Applications , 2003, Bled eConference.

[468]  S. Davies Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity , 1997 .

[469]  Kevin C. Desouza,et al.  Chief Privacy Officers , 2004 .

[470]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[471]  G. Stigler An Introduction to Privacy in Economics and Politics , 1980, The Journal of Legal Studies.

[472]  Madeleine Schachter Informational and Decisional Privacy , 2003 .

[473]  Virginia E. Schein,et al.  Individual Privacy and Personnel Psychology: The Need for a Broader Perspective , 1977 .

[474]  D. F. Linowes Privacy in America: Is Your Private Life in the Public Eye? , 1989 .

[475]  David Salomon,et al.  Data Privacy and Security , 2003, Springer New York.

[476]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[477]  P. Kelvin A Social‐Psychological Examination of Privacy , 1973 .

[478]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[479]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[480]  Vincenzo Russo,et al.  Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States , 2006, J. Glob. Inf. Manag..

[481]  H. J. Smith,et al.  Database Marketing: New Rules for Policy and Practice , 1993 .

[482]  J. P. Peter,et al.  A Comparative Analysis of Three Consumer Decision Strategies , 1975 .

[483]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[484]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[485]  Kai Lung Hui,et al.  Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[486]  Charles A. Snyder,et al.  Personal information privacy: implications for MIS managers , 1999, Inf. Manag..

[487]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..

[488]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[489]  Edward J. Valauskas,et al.  Knowledge Power: Intellectual Property, Information, and Privacy , 2005 .

[490]  S. Nock The Costs of Privacy: Surveillance and Reputation in America , 1993 .

[491]  Philip H. Melanson Secrecy Wars: National Security, Privacy, and the Public's Right to Know , 2001 .

[492]  Rob Kling,et al.  Computerization and controversy (2nd ed.): value conflicts and social choices , 1995 .

[493]  Colin J. Bennett Regulating privacy: data protection and public policy in europe and the u , 1992 .

[494]  Michael D. Smith,et al.  Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2005, WEIS.

[495]  Lorrie Faith Cranor,et al.  User interfaces for privacy agents , 2006, TCHI.

[496]  J. Michael,et al.  Privacy and human rights , 1994 .

[497]  Lorrie Faith Cranor,et al.  Web Privacy with P3p , 2002 .

[498]  Stuart Shapiro,et al.  Places and Spaces: The Historical Interaction of Technology, Home, and Privacy , 1998, Inf. Soc..

[499]  David H. Flaherty,et al.  Controlling surveillance: can privacy protection be made effective? , 1997 .

[500]  L. Sherby Self-Disclosure , 2005 .

[501]  Deborah G. Johnson,et al.  Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..

[502]  Robert R. Harmon,et al.  Perceived Effectiveness of Push vs. Pull Mobile Location Based Advertising , 2007 .

[503]  A. Branscomb Who Owns Information?: From Privacy To Public Access , 1994 .

[504]  John Karat,et al.  Privacy in information technology: Designing to enable privacy policy management in organizations , 2005, Int. J. Hum. Comput. Stud..

[505]  Edward Zwick,et al.  Models of Privacy in the Digital Age : Implications for Marketing and , 1999 .

[506]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[507]  Michael A. Genovese,et al.  Privacy, law, and public policy , 1979 .

[508]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[509]  Paul D. Tolchinsky,et al.  A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .

[510]  K. Jamal,et al.  Privacy Rights on the Internet: Self-Regulation or Government Regulation? , 2006, Business Ethics Quarterly.

[511]  Herman T. Tavani,et al.  Privacy online , 1999, CSOC.

[512]  Andrew J. Rohm,et al.  Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .

[513]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[514]  Heng Xu,et al.  The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.

[515]  David Gefen,et al.  The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.

[516]  David H. Benson A Field Study of End User Computing: Findings and Issues , 1983, MIS Q..

[517]  David Lyon,et al.  Computers, Surveillance, and Privacy , 1996 .

[518]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[519]  D. Lyon Facing the future: Seeking ethics for everyday surveillance , 2001, Ethics and Information Technology.

[520]  Barbara L. Gross,et al.  What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies , 2003 .

[521]  Fritz H. Grupe,et al.  Commercializing public information: A critical issue for governmental IS professionals , 1995, Inf. Manag..

[522]  Hock-Hai Teo,et al.  Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.

[523]  M. Carlson,et al.  Panopticon.com: Online Surveillance and the Commodification of Privacy , 2002 .

[524]  Sandra J. Milberg,et al.  Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe , 2001 .

[525]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[526]  Ellen R. Foxman,et al.  Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .

[527]  O. Gandy,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[528]  I. Altman,et al.  Privacy regulation, territorial displays, and effectiveness of individual functioning. , 1980 .

[529]  Hannah A. Levin,et al.  Privacy in the Courts: Law and Social Reality , 1977 .

[530]  Curtis D. Frye Privacy-Enhanced Business: Adapting to the Online Environment , 2000 .

[531]  Craig Llewellyn LaMay Journalism and the debate over privacy , 2003 .

[532]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[533]  Amit Basu,et al.  Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy , 2006, Manag. Sci..

[534]  J. Phelps,et al.  Understanding privacy concerns , 1992 .

[535]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[536]  Anup K. Ghosh E-Commerce Security and Privacy , 2001, Advances in Information Security.

[537]  Daniel R. Horne,et al.  Privacy attitudes and privacy-related behavior. , 2007 .

[538]  James R. Rosenfilld From the practitioners , 1995 .

[539]  Lawrence J. R. Herson The politics of ideas : political theory and American public policy , 1984 .

[540]  Yolande E. Chan,et al.  Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..

[541]  Peter Singer,et al.  A companion to ethics , 1993 .

[542]  Leo R. Vijayasarathy,et al.  Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..

[543]  R. Posner Philosophical Dimensions of Privacy: An economic theory of privacy , 1984 .

[544]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.