Information Privacy Research: An Interdisciplinary Review
暂无分享,去创建一个
[1] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[2] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[3] Jacques Penders,et al. Privacy in (mobile) Telecommunications Services , 2004, Ethics and Information Technology.
[4] Robert C. Post,et al. The Social Foundations of Privacy: Community and Self in the Common Law Tort , 1989 .
[5] Michael Miller. Absolute PC Security and Privacy , 2002 .
[6] David H. Holtzman,et al. Privacy Lost: How Technology Is Endangering Your Privacy , 2006 .
[7] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[8] Myron Brenton. The privacy invaders , 1964 .
[9] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[10] Sumit Sarkar,et al. Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data , 2006, Inf. Syst. Res..
[11] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[12] Charles K. Parsons,et al. Employee privacy , 1990 .
[13] Tsvi Kuflik,et al. Privacy-enhanced collaborative filtering , 2005 .
[14] Tara M. Swaminatha,et al. Wireless Security and Privacy: Best Practices and Design Techniques , 2002 .
[15] John C. Raines. Attack on privacy , 1974 .
[16] G. Hofstede,et al. Culture′s Consequences: International Differences in Work-Related Values , 1980 .
[17] Wenliang Du,et al. Privacy-Preserving Collaborative Filtering , 2005, Int. J. Electron. Commer..
[18] Alfred Kobsa,et al. Uncovering privacy attitudes and practices in instant messaging , 2005, GROUP.
[19] Alfred Kobsa,et al. Privacy-enhanced personalization , 2007, CACM.
[20] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[21] Richard F. Hixson. Privacy in a Public Society: Human Rights in Conflict , 1987 .
[22] D. Davis,et al. Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .
[23] Colin J. Bennett,et al. The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..
[24] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[25] Laurie Thomas Lee. Defining Privacy: Freedom in a Democratic Constitutional State , 2002 .
[26] Laurence Ashworth,et al. Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .
[27] P. Klopfer,et al. The Concept Privacy and Its Biological Basis , 1977 .
[28] Lieutenant Governor,et al. 2007 Health Insurance Market Report , 2007 .
[29] Tom Peters,et al. Computerized monitoring and online privacy , 1999 .
[30] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[31] Charles Jennings,et al. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet , 2000 .
[32] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[33] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[34] Trevor T. Moores,et al. Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.
[35] Deckle McLean. Privacy and its invasion , 1995 .
[36] Canice Prendergast,et al. The Tenuous Trade‐off between Risk and Incentives , 2000, Journal of Political Economy.
[37] Adam Carlyle Breckenridge. The Right to Privacy , 1970 .
[38] Sirkka L. Jarvenpaa,et al. Communication and Trust in Global Virtual Teams , 1999 .
[39] Tony Smythe,et al. The invasion of privacy , 1974 .
[40] Dorothy E. Leidner,et al. Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..
[41] Patricia Brierley Newell. A cross-cultural comparison of privacy definitions and functions: a systems approach , 1998 .
[42] R. Winer. A Framework for Customer Relationship Management , 2001 .
[43] Brock N. Meeks. The Privacy Hoax , 1999 .
[44] Youngme Moon. Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .
[45] Gurpreet Dhillon,et al. Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..
[46] Andrew T. Frackman,et al. Internet and Online Privacy: A Legal and Business Guide , 2002 .
[47] Helen Nissenbaum,et al. The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..
[48] Kim Bartel Sheehan,et al. Using E-mail To Survey Internet Users In The United States: Methodology And Assessment , 2006, J. Comput. Mediat. Commun..
[49] Thomas A. Peters,et al. Privacy on the line: The politics of wiretapping and encryption , 1998 .
[50] Simone Fischer Hübner. IT-Security and Privacy : Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[51] Mary J. Culnan,et al. Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys , 2002, Inf. Soc..
[52] Colin J. Bennett,et al. The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .
[53] Priscilla M. Regan. Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.
[54] Jan van Dijk,et al. Personalization in the public sector: An inventory of organizational and user obstacles towards personalization of electronic services in the public sector , 2007, Gov. Inf. Q..
[55] Andrew Odlyzko. Privacy, Economics, and Price Discrimination on the Internet , 2003 .
[56] D. Zwick,et al. Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing , 2004 .
[57] Thomas A. Peters. Privacy on the Line: The Politics of Wiretapping and Encryption, by Whitfield Diffie and Susan Landau , 1998, J. Am. Soc. Inf. Sci..
[58] Don R. Pember. Privacy and the Press: The Law, the Mass Media, and the First Amendment, , 1972 .
[59] Shivendu Shivendu,et al. An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online Personalization , 2006, J. Manag. Inf. Syst..
[60] Carson K. Eoyang,et al. Effects of group size and privacy in residential crowding. , 1974 .
[61] R. Posner. The Economics of Privacy , 1981 .
[62] Alan R. Peslak. Internet Privacy Policies: A Review and Survey of the Fortune 50 , 2005, Inf. Resour. Manag. J..
[63] Heng Xu,et al. Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy , 2009 .
[64] Andrew J. Rohm,et al. Consumers' Protection of Online Privacy and Identity , 2004 .
[65] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[66] Dwayne Whitten,et al. What is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles , 2005, Commun. Assoc. Inf. Syst..
[67] Bradley J. Alge,et al. Information privacy in organizations: empowering creative and extrarole performance. , 2006, The Journal of applied psychology.
[68] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[69] Anthony D. Miyazaki,et al. Internet Privacy and Security: An Examination of Online Retailer Disclosures , 2000 .
[70] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.
[71] Charles C. Hinnant,et al. Examining pre-adoption interest in online innovations: an exploratory study of e-service personalization in the public sector , 2003, IEEE Trans. Engineering Management.
[72] Lynette I. Millett,et al. Authentication, Privacy, and the Federal E-Government , 2005, Inf. Soc..
[73] William S. Hubbartt. The new battle over workplace privacy : how far can management go? what rights do employees have? : safe practices to minimize conflict, confusion, and litigation , 1998 .
[74] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[75] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[76] Miriam J. Metzger. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..
[77] Kathrin M. Möslein,et al. Identities Management for E-Commerce and Collaboration Applications , 2005, Int. J. Electron. Commer..
[78] Heng Xu,et al. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.
[79] Michael D. Smith,et al. Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2007, J. Manag. Inf. Syst..
[80] H. Nissenbaum. Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.
[81] Sumeet Gupta,et al. The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..
[82] Colin J. Bennett. The governance of privacy , 2003 .
[83] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[84] Colin J. Bennett,et al. The Distribution of Privacy Risks , 1998 .
[85] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[86] Kai Lung Hui,et al. Disclosure : Motivators and Measurements , 2006 .
[87] Gary T. Marx,et al. What's in a Name? Some Reflections on the Sociology of Anonymity , 1999, Inf. Soc..
[88] Simon Rogerson,et al. Are they really listening?: An investigation into published online privacy policies at the beginning of the third millennium , 2004, Inf. Technol. People.
[89] James Marting,et al. Security, Accuracy, and Privacy in Computer Systems , 1973 .
[90] Rivka Ribak,et al. Internet Power and Social Context: A Globalization Approach to Web Privacy Concerns , 2003 .
[91] JoAnn Greco. PRIVACY WHOSE RIGHT IS IT ANYHOW , 2001 .
[92] J. Reiman,et al. Privacy, Intimacy, and Personhood , 1984 .
[93] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[94] Amitai Etzioni,et al. The Limits Of Privacy , 1999 .
[95] Louis R. Mizell. Invasion of Privacy , 1998 .
[96] Frank Biocca,et al. Internet attitudes and Internet use: some surprising findings from the HomeNetToo project , 2003, Int. J. Hum. Comput. Stud..
[97] Donald T. Dickson. Confidentiality and Privacy in Social Work: A Guide to the Law for Practitioners and Students , 1998 .
[98] Barbara Couture,et al. References for The Private, the Public, and the Published: Reconciling Private Lives and Public Rhetoric , 2004 .
[99] Julia Brande Earp,et al. An experimental economics approach toward quantifying online privacy choices , 2006, Inf. Syst. Frontiers.
[100] H. Varian,et al. Conditioning Prices on Purchase History , 2005 .
[101] Colin J. Bennett,et al. The Adequacy of Privacy: the European Union Data Protection Directive and the North American Response , 1997, Inf. Soc..
[102] Serge Gutwirth,et al. Privacy and the Information Age , 2001 .
[103] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[104] Fritz H. Grupe,et al. Dealing with Data Privacy Protection: An Issue for the 21st Century , 2002, Inf. Syst. Manag..
[105] Anthony D. Miyazaki,et al. Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions , 2002 .
[106] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[107] Michael A. Caloyannides. Computer Forensics and Privacy , 2001 .
[108] Keng Siau,et al. e-Healthcare in ABC county health department (ABCCHD): trade-offs analysis and evaluation , 2006, J. Inf. Technol..
[109] Sijun Wang,et al. Signaling the trustworthiness of small online retailers , 2004 .
[110] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[111] Darhl M. Pedersen,et al. MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .
[112] Don E. Schultz,et al. On merging, purging and privacy , 1988 .
[113] V. Derlega,et al. Privacy and self-disclosure in social relationships. , 1977 .
[114] S. Berkovsky. Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering , 2006 .
[115] Roger Clarke,et al. Human Identification in Information Systems , 1994 .
[116] Harry Kalven,et al. The Right of Privacy in Tort Law - Were Warren and Brandeis Wrong? , 1966 .
[117] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[118] Garry L. White,et al. Privacy Protection Overseas as Perceived by USA-Based IT Professionals , 2007, J. Glob. Inf. Manag..
[119] Virginia W. Kupritz,et al. Privacy matters , 1998, Nature Genetics.
[120] Linda Little,et al. Public space systems: Designing for privacy? , 2005, Int. J. Hum. Comput. Stud..
[121] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[122] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[123] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[124] S. Dolnicar,et al. A Market-Oriented Approach to Responsibly Managing Information Privacy Concerns in Direct Marketing , 2007 .
[125] Curtis R. Taylor. Privacy and Information Acquisition in Competitive Markets , 2004 .
[126] Susan M. Sorensen,et al. Outsourcing, Offshoring, Nearshoring: What to Do? Whether You Outsource Locally or Globally, You're Still Responsible for Client Privacy , 2005 .
[127] Fay Cobb Payton,et al. e-Health Models Leading to Business-to-Employee Commerce in the Human Resources Function , 2003, J. Organ. Comput. Electron. Commer..
[128] Samuel Greengard,et al. Privacy matters , 2008, CACM.
[129] Janice C. Sipior,et al. The ethical and legal quandary of email privacy , 1995, CACM.
[130] Peter P. Swire. Efficient Confidentiality for Privacy, Security, and Confidential Business Information , 2003 .
[131] Roger Clarke,et al. Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.
[132] Rita Walczuch,et al. Implications of the new EU Directive on data protection for multinational corporations , 2001, Inf. Technol. People.
[133] A. Kuper,et al. Who Should Know What? Social Science, Privacy and Ethics , 1983 .
[134] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[135] Lorrie Faith Cranor. Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy , 2002, Inf. Soc..
[136] H. J. Smith,et al. Managing Privacy: Information Technology and Corporate America , 1994 .
[137] William J. Gonzenbach,et al. Press coverage and public perception of direct marketing and consumer privacy , 1994 .
[138] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[139] Alfred Kobsa,et al. Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.
[140] Felix Stalder. Opinion. Privacy is not the antidote to surveillance , 2002 .
[141] Felix Stalder,et al. Failures and Successes: Notes on the Development of Electronic Cash , 2002, Inf. Soc..
[142] David Mason,et al. Technology and ethical dilemmas in a medical setting: Privacy, professional autonomy, life and death , 2001, Ethics and Information Technology.
[143] Robert Boncella. Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..
[144] K. Toll. Privacy and Freedom. By Alan F. Westin. New York: Atheneum Press, 1967. $10.00 , 1968 .
[145] A. Joinson,et al. Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..
[146] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[147] R. Mason. Four ethical issues of the information age , 1986 .
[148] Dianna L. Stone,et al. Personnel Selection Procedures and Invasion of Privacy , 2003 .
[149] Lorrie Faith Cranor. Ten years of computers, freedom and privacy: a personal retrospective , 2000, CFP '00.
[150] J. Webster,et al. Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .
[151] Chang Liu,et al. Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..
[152] Kai Lung Hui,et al. Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits , 2004, ICIS.
[153] Robert M. Davison,et al. Information Privacy in a Globally Networked Society: Implications for IS Research , 2003, Commun. Assoc. Inf. Syst..
[154] John Weckert,et al. Computer and Information Ethics , 1997 .
[155] J. P. Gould,et al. Privacy and the Economics of Information , 1980, The Journal of Legal Studies.
[156] Hock-Hai Teo,et al. Privacy Considerations in Location-Based Advertising , 2005, Designing Ubiquitous Information Environments.
[157] Meg McGinity. Staying connected: surfing the turf , 2000 .
[158] S. Margulis. Conceptions of Privacy: Current Status and Next Steps , 1977 .
[159] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[160] Iris A. Junglas,et al. A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[161] K. Hui,et al. Economics of Privacy , 2005 .
[162] Miriam J. Metzger,et al. Public Opinion and Policy Initiatives for Online Privacy Protection , 2003 .
[163] Christopher E. Beaudoin,et al. Internet privacy practices of news media and implications for online journalism , 2005 .
[164] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[165] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[166] Yolande E. Chan,et al. Information Privacy: Management, Marketplace, and Legal Challenges , 2005, Commun. Assoc. Inf. Syst..
[167] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[168] Robert E. Thomas,et al. Database Marketing Practice: Protecting Consumer Privacy , 1997 .
[169] Fred H. Cate,et al. Privacy in the Information Age , 1997 .
[170] Gerald L. Lohse,et al. International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..
[171] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[172] R. Gavison. Privacy and the Limits of Law , 1980 .
[173] Vasilios Katos,et al. Modelling corporate wireless security and privacy , 2005, J. Strateg. Inf. Syst..
[174] Peter P. Swire. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .
[175] Hock-Hai Teo,et al. Consumers' Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal , 2005, ECIS.
[176] N. Sanders,et al. Journal of behavioral decision making: "The need for contextual and technical knowledge in judgmental forecasting", 5 (1992) 39-52 , 1992 .
[177] Hua Qian,et al. Anonymity and Self-Disclosure on Weblogs , 2007, J. Comput. Mediat. Commun..
[178] D. Lyon. Surveillance society: Monitoring Everyday Life , 2001 .
[179] S. Alpert,et al. Protecting Medical Privacy: Challenges in the Age of Genetic Information , 2003 .
[180] Oscar H. Gandy,et al. The Political Economy of Personal Information , 2011 .
[181] James Michael. Privacy and human rights : an international and comparative study, with special reference to developments in information technology , 1994 .
[182] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[183] Lorrie Faith Cranor,et al. Power strips, prophylactics, and privacy, oh my! , 2006, SOUPS '06.
[184] Jean-Francois Blanchette. Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie and Susan Landau , 2004, Ethics and Information Technology.
[185] Sanjay Bapna,et al. A Wavelet-Based Approach to Preserve Privacy for Classification Mining , 2006, Decis. Sci..
[186] Catherine Dwyer,et al. Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[187] Hock-Hai Teo,et al. AIS Electronic , 2013 .
[188] Ted Gottfried. Privacy : individual right v. social needs , 1994 .
[189] Gordon C. Bruner,et al. Attitude toward Location-based Advertising , 2007 .
[190] Mike Thelwall,et al. Web crawling ethics revisited: Cost, privacy, and denial of service , 2006 .
[191] I. Firestone,et al. Compensatory Responses to Crowding: Effects of Personal Space Intrusion and Privacy Reduction , 1977 .
[192] Anita L. Allen,et al. Is privacy now possible? A brief history of an obsession , 2001 .
[193] Lisa A. Ennis. Information ethics: Privacy, property, and power , 2007, J. Assoc. Inf. Sci. Technol..
[194] Giles D'Souza,et al. Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .
[195] Richard Volkman,et al. Privacy as life, liberty, property , 2004, Ethics and Information Technology.
[196] Don Tapscott,et al. Who Knows? : Safeguarding Your Privacy in a Networked World , 1995 .
[197] Andrea Monti,et al. The Network Society as Seen From Italy , 2002, Inf. Soc..
[198] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[199] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[200] T. Peters. Computerization and Controversy: Value Conflicts and Social Choices (2nd Ed.), edited by Rob Kling , 1996, J. Am. Soc. Inf. Sci..
[201] Rob Kling,et al. Information Technologies and the Shifting Balance between Privacy and Social Control , 1995, Computerization and Controversy, 2nd Ed..
[202] Ronald E. Rice,et al. Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..
[203] Gary Roboff,et al. Privacy of financial information in cyberspace: banks addressing what consumers want , 1998 .
[204] Mizuko Ito. Mobile Phones, Japanese Youth, and the Re-placement of Social Contact , 2005 .
[205] D. M. Pedersen. PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .
[206] Paul A. Pavlou,et al. Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..
[207] Chin-Laung Lei,et al. Privacy and Anonymity Protection with Blind Threshold Signatures , 2002, Int. J. Electron. Commer..
[208] C. Goodwin. Privacy: Recognition of a Consumer Right , 1991 .
[209] N. Fairweather. Surveillance in Employment: The Case of Teleworking , 1999 .
[210] Curtis R. Taylor. Consumer Privacy and the Market for Customer Information , 2004 .
[211] Jane Webster,et al. Personality as a moderator of monitoring acceptance , 2003, Comput. Hum. Behav..
[212] Mathias Klang,et al. Human Rights in the Digital Age , 2004 .
[213] Norhayati Zakaria,et al. Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East , 2003, Inf. Technol. People.
[214] Alida Brill,et al. Nobody's business : paradoxes of privacy , 1990 .
[215] Peter P. Swire. Financial Privacy and the Theory of High-Tech Government Surveillance , 1998 .
[216] Robert F. Otondo,et al. Individual Rights to Privacy and Corporate E-mail , 1997 .
[217] E. Berscheid,et al. Privacy: A hidden variable in experimental social psychology. , 1977 .
[218] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[219] Peter M. Shane. A Little Knowledge: Privacy, Security and Public Information After September 11 , 2004 .
[220] Jacqueline Klosek. Data Privacy in the Information Age , 2000 .
[221] Geoff Brumfiel,et al. Nanotechnology: A little knowledge... , 2003, Nature.
[222] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[223] Barrington Moore,et al. Privacy: Studies in Social and Cultural History. , 1986 .
[224] R. I. Sutton,et al. Organizational behavior: linking individuals and groups to organizational contexts. , 1993, Annual review of psychology.
[225] George R. Milne,et al. Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .
[226] Stephen Hsu,et al. Internet Privacy and Security: A Startup's Perspective Information Dynamics in the Networked Society, April 4–5, 2002 , 2003, Inf. Syst. Frontiers.
[227] Virgílio A. F. Almeida,et al. Masks: Bringing Anonymity and Personalization Together , 2003, IEEE Secur. Priv..
[228] Geoff Walsham,et al. Ethical theory, codes of ethics and IS practice , 1996 .
[229] Clinton E. White,et al. The Information Center Concept: A Normative Model and a Study of Six Installations , 1987, MIS Q..
[230] Gerard Salton. A progress report on information privacy and data security , 1980, J. Am. Soc. Inf. Sci..
[231] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[232] Gary L. Kreps,et al. A rose by any other name: The vitality of group communication research , 1994 .
[233] Nathaniel Good,et al. Shock: Aggregating Information While Preserving Privacy , 2003, Inf. Syst. Frontiers.
[234] Kuanchin Chen,et al. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..
[235] Andrew T. Kenyon,et al. New dimensions in privacy law , 2006 .
[236] Stephanos Bibas,et al. A Contractual Approach to Data Privacy , 1994 .
[237] Jeffrey Rosen,et al. The Unwanted Gaze: The Destruction of Privacy in America , 2000 .
[238] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[239] Lorrie Faith Cranor. Internet Privacy - Introduction. , 1999 .
[240] Sejung Marina Choi,et al. Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .
[241] Roberto Di Pietro,et al. Security and privacy issues of handheld and wearable wireless devices , 2003, CACM.
[242] L. Jean Camp. Web Security and Privacy: An American Perspective , 1999, Inf. Soc..
[243] Jonna Häkkilä,et al. 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication , 2005, Mobile HCI.
[244] Kai Lung Hui,et al. Consumer Trust and Online Information Privacy , 2003, ICIS.
[245] Joy L. Hart,et al. Workplace Surveillance and Managing Privacy Boundaries , 2007 .
[246] K. Sheehan,et al. Dimensions of Privacy Concern among Online Consumers , 2000 .
[247] Thomas C. Rindfleisch,et al. Privacy, information technology, and health care , 1997, CACM.
[248] Boaz Gelbord,et al. New surveillance techniques raise privacy concerns , 2002, CACM.
[249] Lois G. Forer,et al. A Chilling Effect: The Mounting Threat of Libel and Invasion of Privacy Actions to the First Amendment , 1987 .
[250] W. M. Beaney,et al. The Right to Privacy and American Law , 1966 .
[251] Willis H Ware. Privacy Issues and the Private Sector , 1976 .
[252] Keri E. Pearlson,et al. Managing and Using Information Systems , 2001 .
[253] Daniel J. Solove,et al. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .
[254] Willis H. Ware,et al. Security and privacy in computer systems , 1899, AFIPS '67 (Spring).
[255] Sonny S. Ariss,et al. Computer monitoring: benefits and pitfalls facing management , 2002, Inf. Manag..
[256] Joey F. George. Computers in society : privacy, ethics, and the Internet , 2003 .
[257] Kai Lung Hui,et al. What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses , 2002, ICIS.
[258] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[259] GLENN,et al. Philosophical Views on the Value of Privacy , 1966 .
[260] Noël Coward,et al. Private Lives , 1930 .
[261] Nikhilesh Dholakia,et al. Contrasting European and American Approaches to Privacy in Electronic Markets: Property Right versus Civil Right , 2001, Electron. Mark..
[262] K. Sheehan,et al. Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns , 1999 .
[263] Nick Taylor,et al. State Surveillance and the Right to Privacy. , 2002 .
[264] Scott Nicholson,et al. Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA , 2007 .
[265] Joshua B. Konvisser. WHO OWNS INFORMATION ? FROM PRIVACY TO PUBLIC ACCESS , 2003 .
[266] Bashar Nuseibeh,et al. Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..
[267] Susan Sprecher,et al. Social Exchange Perspectives on the Dissolution of Close Relationships , 1992 .
[268] Peter G. Neumann,et al. Don't Trade Privacy for Security , 2005 .
[269] Ibrahim Cingil,et al. A broader approach to personalization , 2000, CACM.
[270] Kathleen S. Hartzel,et al. Exploring the privacy implications of addressable advertising and viewer profiling , 2006, CACM.
[271] Markus Schneider,et al. Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System , 2005, Inf. Syst. Frontiers.
[272] Ritu Agarwal,et al. Overcoming Personal Barriers to Adoption When Technology Enables Information to Be Available to Others , 2006 .
[273] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[274] Mark Monmonier,et al. Spying with Maps: Surveillance Technologies and the Future of Privacy , 2002 .
[275] Christine Hine,et al. Privacy in the Marketplace , 1998, Inf. Soc..
[276] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[277] William Bonner,et al. Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar , 2007 .
[278] Lee S. Strickland,et al. Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..
[279] Harry Henderson. Privacy in the Information Age , 1999 .
[280] Anil Kumar. Understanding Privacy , 2010 .
[281] Eric Jorstad. The Privacy Paradox , 2001 .
[282] Chris Weber,et al. Privacy Defended: Protecting Yourself Online , 2002 .
[283] Subhasish Dasgupta,et al. Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals , 2003, Inf. Syst. Manag..
[284] Jeretta Horn Nord,et al. E-monitoring in the workplace: privacy, legislation, and surveillance software , 2006, CACM.
[285] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[286] Leysia Palen,et al. Instant messaging in teen life , 2002, CSCW '02.
[287] S. Jourard. Some Psychological Aspects of Privacy , 1966 .
[288] Brock N. Meeks,et al. Electronic Frontier: The privacy hoax , 1999, CACM.
[289] Silvana Trimi,et al. Influence of the Web Vendor's Interventions on Privacy-related Behaviors in E-commerce , 2006, Commun. Assoc. Inf. Syst..
[290] Rich Ling. The Coordination of Everyday Life , 2004 .
[291] Alessandro Acquisti,et al. Uncertainty, Ambiguity and Privacy , 2005, WEIS.
[292] Julia Brande Earp,et al. Innovative web use to learn about consumer behavior and online privacy , 2003, CACM.
[293] Donna L. Hoffman,et al. Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web , 1999, Inf. Soc..
[294] Gurpreet Dhillon,et al. Do privacy seals in e-commerce really work? , 2003, CACM.
[295] J. C. Cannon. Privacy: What Developers and IT Professionals Should Know , 2004 .
[296] Neil M. Richards,et al. Privacy's Other Path: Recovering the Law of Confidentiality , 2007 .
[297] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[298] Roger Brownsword. Human Rights in the Digital Age , 2021, Human Rights and the Internet.
[299] George R. Milne. Consumer Participation in Mailing Lists: A Field Experiment , 1997 .
[300] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[301] Jeff Smith,et al. Privacy policies and practices: inside the organizational maze , 1993, CACM.
[302] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[303] Tyrone Grandison. Don't Trade Privacy for Security , 2005 .
[304] Bruce Schneier,et al. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .
[305] Annie I. Antón,et al. Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.
[306] Charles J. Sykes. The End of Privacy , 1999 .
[307] J. R. Landis,et al. The measurement of observer agreement for categorical data. , 1977, Biometrics.
[308] Gary T. Marx,et al. A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .
[309] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..
[310] Michael A Caloyannides,et al. Privacy protection and computer forensics , 2004 .
[311] Fay Cobb Payton,et al. Information Privacy in the Service Sector: An Exploratory Study of Health Care and Banking Professionals , 2006, J. Organ. Comput. Electron. Commer..
[312] Kurt H. Decker. A manager's guide to employee privacy : laws, policies, and procedures , 1989 .
[313] M. Lwin,et al. A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online , 2003 .
[314] David G. Bromley,et al. Secrecy: A Cross-Cultural Perspective. , 1982 .
[315] Brock N. Meeks. Privacy lost, anytime, anywhere , 1997, CACM.
[316] Robert LaRose,et al. Your privacy is assured - of being disturbed: websites with and without privacy seals , 2006, New Media Soc..
[317] Clay Calvert,et al. Voyeur Nation: Media, Privacy, And Peering In Modern Culture , 2000 .
[318] E. Shils,et al. Privacy: Its Constitution and Vicissitudes , 1966 .
[319] Mun-Cho Kim,et al. Surveillance Technology, Privacy and Social Control , 2004 .
[320] Mary J. Culnan,et al. How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..
[321] Hal Berghel. Hijacking the web , 2002, CACM.
[322] Stefan Edlund,et al. The Social Contract Core , 2005, Electron. Commer. Res..
[323] Paul J. Hart,et al. Privacy Concerns and Levels of Information Exchange: An Empirical Investigation of Intended e-Services Use , 2006 .
[324] SewellGraham,et al. Neither good, nor bad, but dangerous , 2001 .
[325] David L. Paul,et al. Assessing technological barriers to telemedicine: technology-management implications , 1999 .
[326] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[327] Mike Chiasson,et al. If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy , 2005, Inf. Organ..
[328] Zhen Lin,et al. Genomic Research and Human Subject Privacy , 2004, Science.
[329] K. Mccrohan. Information Technology, Privacy, and the Public Good , 1989 .
[330] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[331] J. Stanton,et al. Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. , 2002 .
[332] Milton R. Konvitz,et al. Privacy and the Law: A Philosophical Prelude , 1966 .
[333] Sissela Bok,et al. Secrets: On the Ethics of Concealment and Revelation , 1982 .
[334] Fred A. Mael,et al. NONE OF YOUR BUSINESS: PARAMETERS OF BIODATA INVASIVENESS , 1996 .
[335] Susan Landau,et al. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 1998 .
[336] Erich Novak,et al. Special issue , 2006, J. Complex..
[337] Peter Swire,et al. Security and privacy after September 11: the health care example , 2002, CFP '02.
[338] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[339] Hock-Hai Teo,et al. Information Privacy in the Digital Era: An Exploratory Research Framework , 2006, AMCIS.
[340] Jan Camenisch,et al. Information privacy?! , 2012, Comput. Networks.
[341] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[342] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[343] Lorrie Faith Cranor,et al. 'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.
[344] Ina Fourie. Naked in Cyberspace: How to Find Personal Information Online (2nd ed.) , 2003 .
[345] Peter P. Swire. Of Elephants, Mice, and Privacy: International Choice of Law and the Internet , 1998 .
[346] C. Ranganathan,et al. Key dimensions of business-to-consumer web sites , 2002, Inf. Manag..
[347] Telecommunications Board,et al. Engaging Privacy and Information Technology in a Digital Age , 2007 .
[348] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[349] Clare-Marie Karat,et al. Usable privacy and security for personal information management , 2006, CACM.
[350] Nora J. Rifon,et al. Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior , 2007 .
[351] Susan E. Anderson,et al. Using Electronic Mail Surveys and Computer-Monitored Data for Studying Computer-Mediated Communication Systems , 1995 .
[352] Lawrence Meir Friedman. Private Lives: Families, Individuals, and the Law , 2005 .
[353] Barbara Dill. The Journalist's Handbook on Libel and Privacy , 1986 .
[354] Ingoo Han,et al. The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..
[355] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[356] Brenda Dervin,et al. Private Rights, Public Wrongs: The Computer and Personal Privacy , 1989 .
[357] Gregory J. Pottie,et al. Privacy in the global e-village , 2004, CACM.
[358] Jeffry Allen Rice. A Review of: “The Private, the Public, and the Published: Reconciling Private Lives and Public Rhetoric” , 2006 .
[359] Benjamin Edelman,et al. Adverse selection in online "trust" certifications and search results , 2011, Electron. Commer. Res. Appl..
[360] André Bacard,et al. The Computer Privacy Handbook , 1995 .
[361] Frederick S. Lane,et al. The Naked Employee: How Technology Is Compromising Workplace Privacy , 2003 .
[362] Robert Jensen,et al. Fables of Abundance: A Cultural History of Advertising in America@@@Marketing Modernism in Fin-de-Siecle Europe@@@Privacy and Publicity: Modern Architecture as Mass Media , 1995 .
[363] R. Kling,et al. Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .
[364] Darien A McWhirter. Search, seizure, and privacy , 1994 .
[365] Reginald Whitaker,et al. The End of Privacy: How Total Surveillance Is Becoming a Reality , 1999 .
[366] Oscar H. Gandy,et al. Public Opinion Surveys and the Formation of Privacy Policy , 2003 .
[367] J. Hirshleifer. Privacy: Its Origin, Function, and Future , 1980, The Journal of Legal Studies.
[368] Ian Goldberg,et al. Privacy-Enhancing Technologies for the Internet, II: Five Years Later , 2002, Privacy Enhancing Technologies.
[369] Simson Garfinkel,et al. Database Nation , 2000 .
[370] William P. Smith,et al. Privacy and Electronic Monitoring in the Workplace: A Model of Managerial Cognition and Relational Trust Development , 2005 .
[371] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[372] Joseph Turow,et al. Americans Online Privacy: The System Is Broken , 2003 .
[373] Molly J. Walker Wilson,et al. Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .
[374] V. Packard,et al. The Naked Society , 1964 .
[375] S. Petronio. Balancing the Secrets of Private Disclosures , 2000 .
[376] E. Sundstrom,et al. Privacy at Work: Architectural Correlates of Job Satisfaction and Job Performance , 1980 .
[377] James T. Bennett,et al. Information Technology and the World of Work , 2004 .
[378] Stefan Linnhoff,et al. The Emergence of Biometrics and Its Effect on Consumers , 2005 .
[379] Mark S. Ackerman,et al. Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.
[380] Mark Cenite. The Unwanted Gaze: The Destruction of Privacy in America , 2001 .
[381] Tamara Dinev,et al. Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..
[382] H. Jeff Smith. Information Privacy and its Management , 2004, MIS Q. Executive.
[383] R. Petty. Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .
[384] Tsvi Kuflik,et al. PRAW - A PRivAcy model for the Web , 2005, J. Assoc. Inf. Sci. Technol..
[385] J. Phelps,et al. Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .
[386] Xueming Luo. Trust production and privacy concerns on the Internet , 2002 .
[387] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[388] Veda C. Storey,et al. Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? , 2006, Inf. Manag..
[389] M. Nakada,et al. Japanese Conceptions of Privacy: An Intercultural Perspective , 2005, Ethics and Information Technology.
[390] Scott C. D'Urso,et al. Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .
[391] Keng Siau,et al. An Experimental Study on U-Commerce Adoption: The Impact of Personalization and Privacy Concerns , 2006, AMCIS.
[392] Georg Aichholzer,et al. Public Sector Information in the Digital Age , 2004 .
[393] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[394] A. Michael Froomkin,et al. Legal Issues in Anonymity and Pseudonymity , 1999, Inf. Soc..
[395] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[396] Tom Spencer. Privacy and transparency: the race to the bottom , 2006 .
[397] Subhasish Dasgupta,et al. ICT and Business in the New Economy: Globalization and Attitudes Towards eCommerce , 2004, J. Glob. Inf. Manag..
[398] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[399] David Lyon,et al. The Electronic Eye: The Rise of Surveillance Society , 1994 .
[400] Richard D. Christy,et al. Relationship marketing in consumer markets , 1996 .
[401] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[402] Eric K. Clemons,et al. Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market , 2000, J. Manag. Inf. Syst..
[403] Mary J. Culnan,et al. Giant Food and Elensys: Looking Out For Customer Gross Privacy Invasion? , 2005, Commun. Assoc. Inf. Syst..
[404] K. Sheehan,et al. An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .
[405] Rob Kling,et al. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference , 1999, Inf. Soc..
[406] Anthony D. Miyazaki,et al. Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .
[407] George R. Milne. Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue , 2000 .
[408] Thomas D. Clark,et al. The Dynamic Structure of Management Support Systems: Theory Development, Research Focus, and Direction , 2007, MIS Q..
[409] Robert C. Post,et al. Three Concepts of Privacy , 2001 .
[410] Alberto Escudero-Pascual,et al. Questioning lawful access to traffic data , 2004, CACM.
[411] Roger Clarke,et al. The Digital Persona and Its Application to Data Surveillance , 1994, Inf. Soc..
[412] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[413] John Weckert. Electronic monitoring in the workplace: controversies and solutions , 2004 .
[414] Daniel J. Solove. The Digital Person , 2022 .
[415] Renée Marlin-Bennett,et al. Knowledge Power: Intellectual Property, Information, and Privacy , 2004 .
[416] M. E. Gordon,et al. Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .
[417] Oren Etzioni,et al. Privacy interfaces for information management , 1999, CACM.
[418] M. Jones. Privacy: A Significant Marketing Issue for the 1990s , 1991 .
[419] D. Boyd. Facebook's Privacy Trainwreck , 2008 .
[420] S. I. Benn. Philosophical Dimensions of Privacy: Privacy, freedom, and respect for persons , 1984 .
[421] James R. Barker,et al. Neither good, nor bad, but dangerous: Surveillance as an ethical paradox , 2001, Ethics and Information Technology.
[422] Ellen Alderman,et al. Right to Privacy , 2001, Challenging Human Rights Violations: Using International Law in U.S. Courts.
[423] Warren Freedman. The right of privacy in the computer age , 1987 .
[424] Evan Hendricks,et al. Your Right to Privacy: A Basic Guide to Legal Rights in an Information Society , 1990 .
[425] Mary Ann Eastlick,et al. Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment , 2006 .
[426] H. Raghav Rao,et al. Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use , 2006, J. Assoc. Inf. Syst..
[427] Ted O’Donoghue,et al. The economics of immediate gratification , 2000 .
[428] Alfred Kobsa,et al. Personalized hypermedia and international privacy , 2002, CACM.
[429] Raymond K. Wong,et al. End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach , 2007, Inf. Syst. Frontiers.
[430] D. D. Schoenbachler,et al. Trust and customer willingness to provide information in database-driven relationship marketing , 2002 .
[431] Miriam J. Metzger. Communication Privacy Management in Electronic Commerce , 2007, J. Comput. Mediat. Commun..
[432] Patricia H. Werhane. The Normative/Descriptive Distinction in Methodologies of Business Ethics , 1994, Business Ethics Quarterly.
[433] G. Zinkhan,et al. Exploring the Impact of Online Privacy Disclosures on Consumer Trust , 2006 .
[434] Alessandro Pavan,et al. On the Optimality of Privacy in Sequential Contracting , 2006, J. Econ. Theory.
[435] P. Schwartz,et al. Privacy and the economics of personal health care information. , 1997, Texas law review.
[436] Herbert Burkert,et al. Privacy-enhancing technologies: typology, critique, vision , 1997 .
[437] John Sopinka. Freedom of Speech and Privacy in the Information Age , 1997, Inf. Soc..
[438] Annie I. Antón,et al. Financial privacy policies and the need for standardization , 2004, IEEE Security & Privacy Magazine.
[439] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[440] Avraham N. Kluger,et al. The error of accepting the "theoretical" null hypothesis: the rise, fall, and resurrection of commonsense hypotheses in psychology. , 2001, Psychological bulletin.
[441] H. Teo,et al. Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior , 2004 .
[442] M. C. Slough. Privacy, freedom, and responsibility , 1969 .
[443] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[444] P. K. Kannan,et al. The customer economics of internet privacy , 2002 .
[445] T. White,et al. Consumer Disclosure and Disclosure Avoidance: A Motivational Framework , 2004 .
[446] Mary Beth Rosson,et al. journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .
[447] Matthew Rabin,et al. Choice and Procrastination , 2000 .
[448] Jacqueline Klosek. The War on Privacy , 2006 .
[449] Alfred Kobsa,et al. Personalised hypermedia presentation techniques for improving online customer relationships , 2001, The Knowledge Engineering Review.
[450] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[451] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[452] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[453] Sirkka L. Jarvenpaa,et al. Integrating market, technology, and policy opportunities in e-business strategy , 1999, J. Strateg. Inf. Syst..
[454] Robert C. Blattberg,et al. Interactive Marketing: Exploiting the Age of Addressability , 1991 .
[455] Paulo B. Góes,et al. Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat , 2002, Manag. Sci..
[456] Julie E. Cohen. Privacy, Ideology, and Technology: A Response to Jeffrey Rosen , 2001 .
[457] R. Chellappa. Consumers ’ Trust in Electronic Commerce Transactions : The Role of Perceived Privacy and Perceived Security 1 Introduction , 2007 .
[458] Mark E. Budnitz. Privacy Protection for Consumer Transactions in Electronic Commerce: Why Self-Regulation Is Inadequate , 1998 .
[459] Burke T. Ward,et al. Ethical Management of Employee E-Mail Privacy , 1998, Inf. Syst. Manag..
[460] Rob Kling,et al. Assessing Anonymous Communication on the Internet: Policy Deliberations , 1999, Inf. Soc..
[461] Paul Wang,et al. Exploring the Dimensions of Consumer Privacy: An Analysis of Coverage in British and American Media , 1995 .
[462] Priscilla M. Regan. Safe Harbors or Free Frontiers? Privacy and Transborder Data Flows , 2003 .
[463] Sanjay K. Singh,et al. An analysis of the cultural motivations for transborder data flow legislation , 1995, Inf. Technol. People.
[464] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[465] Barbara Laslett,et al. Privacy and Secrecy: A Conceptual Comparison , 1977 .
[466] Veda C. Storey,et al. Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.
[467] Paul A. Swatman,et al. The Price of Convenience: Developing a Framework for Analysing Privacy Sensitivity in the Adoption of Wireless Applications , 2003, Bled eConference.
[468] S. Davies. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity , 1997 .
[469] Kevin C. Desouza,et al. Chief Privacy Officers , 2004 .
[470] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[471] G. Stigler. An Introduction to Privacy in Economics and Politics , 1980, The Journal of Legal Studies.
[472] Madeleine Schachter. Informational and Decisional Privacy , 2003 .
[473] Virginia E. Schein,et al. Individual Privacy and Personnel Psychology: The Need for a Broader Perspective , 1977 .
[474] D. F. Linowes. Privacy in America: Is Your Private Life in the Public Eye? , 1989 .
[475] David Salomon,et al. Data Privacy and Security , 2003, Springer New York.
[476] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[477] P. Kelvin. A Social‐Psychological Examination of Privacy , 1973 .
[478] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[479] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[480] Vincenzo Russo,et al. Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States , 2006, J. Glob. Inf. Manag..
[481] H. J. Smith,et al. Database Marketing: New Rules for Policy and Practice , 1993 .
[482] J. P. Peter,et al. A Comparative Analysis of Three Consumer Decision Strategies , 1975 .
[483] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[484] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[485] Kai Lung Hui,et al. Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[486] Charles A. Snyder,et al. Personal information privacy: implications for MIS managers , 1999, Inf. Manag..
[487] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[488] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[489] Edward J. Valauskas,et al. Knowledge Power: Intellectual Property, Information, and Privacy , 2005 .
[490] S. Nock. The Costs of Privacy: Surveillance and Reputation in America , 1993 .
[491] Philip H. Melanson. Secrecy Wars: National Security, Privacy, and the Public's Right to Know , 2001 .
[492] Rob Kling,et al. Computerization and controversy (2nd ed.): value conflicts and social choices , 1995 .
[493] Colin J. Bennett. Regulating privacy: data protection and public policy in europe and the u , 1992 .
[494] Michael D. Smith,et al. Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2005, WEIS.
[495] Lorrie Faith Cranor,et al. User interfaces for privacy agents , 2006, TCHI.
[496] J. Michael,et al. Privacy and human rights , 1994 .
[497] Lorrie Faith Cranor,et al. Web Privacy with P3p , 2002 .
[498] Stuart Shapiro,et al. Places and Spaces: The Historical Interaction of Technology, Home, and Privacy , 1998, Inf. Soc..
[499] David H. Flaherty,et al. Controlling surveillance: can privacy protection be made effective? , 1997 .
[500] L. Sherby. Self-Disclosure , 2005 .
[501] Deborah G. Johnson,et al. Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..
[502] Robert R. Harmon,et al. Perceived Effectiveness of Push vs. Pull Mobile Location Based Advertising , 2007 .
[503] A. Branscomb. Who Owns Information?: From Privacy To Public Access , 1994 .
[504] John Karat,et al. Privacy in information technology: Designing to enable privacy policy management in organizations , 2005, Int. J. Hum. Comput. Stud..
[505] Edward Zwick,et al. Models of Privacy in the Digital Age : Implications for Marketing and , 1999 .
[506] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[507] Michael A. Genovese,et al. Privacy, law, and public policy , 1979 .
[508] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[509] Paul D. Tolchinsky,et al. A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .
[510] K. Jamal,et al. Privacy Rights on the Internet: Self-Regulation or Government Regulation? , 2006, Business Ethics Quarterly.
[511] Herman T. Tavani,et al. Privacy online , 1999, CSOC.
[512] Andrew J. Rohm,et al. Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .
[513] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[514] Heng Xu,et al. The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.
[515] David Gefen,et al. The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.
[516] David H. Benson. A Field Study of End User Computing: Findings and Issues , 1983, MIS Q..
[517] David Lyon,et al. Computers, Surveillance, and Privacy , 1996 .
[518] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[519] D. Lyon. Facing the future: Seeking ethics for everyday surveillance , 2001, Ethics and Information Technology.
[520] Barbara L. Gross,et al. What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies , 2003 .
[521] Fritz H. Grupe,et al. Commercializing public information: A critical issue for governmental IS professionals , 1995, Inf. Manag..
[522] Hock-Hai Teo,et al. Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.
[523] M. Carlson,et al. Panopticon.com: Online Surveillance and the Commodification of Privacy , 2002 .
[524] Sandra J. Milberg,et al. Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe , 2001 .
[525] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[526] Ellen R. Foxman,et al. Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .
[527] O. Gandy,et al. Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .
[528] I. Altman,et al. Privacy regulation, territorial displays, and effectiveness of individual functioning. , 1980 .
[529] Hannah A. Levin,et al. Privacy in the Courts: Law and Social Reality , 1977 .
[530] Curtis D. Frye. Privacy-Enhanced Business: Adapting to the Online Environment , 2000 .
[531] Craig Llewellyn LaMay. Journalism and the debate over privacy , 2003 .
[532] I. Altman. Privacy: A Conceptual Analysis. , 1976 .
[533] Amit Basu,et al. Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy , 2006, Manag. Sci..
[534] J. Phelps,et al. Understanding privacy concerns , 1992 .
[535] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[536] Anup K. Ghosh. E-Commerce Security and Privacy , 2001, Advances in Information Security.
[537] Daniel R. Horne,et al. Privacy attitudes and privacy-related behavior. , 2007 .
[538] James R. Rosenfilld. From the practitioners , 1995 .
[539] Lawrence J. R. Herson. The politics of ideas : political theory and American public policy , 1984 .
[540] Yolande E. Chan,et al. Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..
[541] Peter Singer,et al. A companion to ethics , 1993 .
[542] Leo R. Vijayasarathy,et al. Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..
[543] R. Posner. Philosophical Dimensions of Privacy: An economic theory of privacy , 1984 .
[544] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.