The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios
暂无分享,去创建一个
Lujo Bauer | Lorrie Faith Cranor | Pardis Emami Naeini | Mohammad R. Haghighat | Martin Degeling | Richard Chow | Heather M. Patterson | Lujo Bauer | L. Cranor | M. Haghighat | Richard Chow | Martin Degeling | Heather M. Patterson
[1] John M. Levine,et al. Social support and conformity: The role of independent assessment of reality , 1971 .
[2] Edward Lank,et al. Privacy Personas: Clustering Users via Attitudes and Behaviors toward Security Practices , 2016, CHI.
[3] M. Angela Sasse,et al. Desperately seeking assurances: Segmenting users by their information-seeking preferences , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[4] Roger Ratcliff,et al. Statistical mimicking of reaction time data: Single-process models, parameter variability, and mixtures , 1995, Psychonomic bulletin & review.
[5] Bill Tomlinson,et al. Who are the Turkers? Worker Demographics in Amazon Mechanical Turk , 2009 .
[6] Herman Aguinis,et al. Best Practice Recommendations for Designing and Implementing Experimental Vignette Methodology Studies , 2014 .
[7] Todd Lucas,et al. Self‐efficacy and independence from social influence: Discovery of an efficacy–difficulty effect , 2006 .
[8] V. L. Allen. Situational Factors In Conformity1 , 1965 .
[9] Alfred Kobsa,et al. Understanding user privacy in Internet of Things environments , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[10] Hauke R. Heekeren,et al. How Expert Advice Influences Decision Making , 2012, PloS one.
[11] Diego Andres Perez Ruiz. Statistical Rethinking: A Bayesian Course with Examples in R and Stan Richard McElreath CRC Press, 2015, 469 pages, £67.99, hardcover ISBN: 978-1-482-25344-3 , 2017 .
[12] Andrew T. Hartnett,et al. This PDF file includes: Materials and Methods SOM Text Figs. S1 to S12 Table S1 Full Reference List , 2022 .
[13] Robert S. Baron,et al. The forgotten variable in conformity research: Impact of task importance on social influence. , 1996 .
[14] Laura A. Dabbish,et al. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.
[15] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[16] Joseph A. Konstan,et al. Collaborative Filtering: Supporting Social Navigation in Large, Crowded Infospaces , 2003, Designing Information Spaces.
[17] N. Lazar,et al. Methods and Criteria for Model Selection , 2004 .
[18] Izak Benbasat,et al. A Research Agenda for Trust in Online Environments , 2008, J. Manag. Inf. Syst..
[19] Tao Zhou,et al. An Empirical Examination of Initial Trust in Mobile Banking , 2011, Internet Res..
[20] D. Moore,et al. Effects of Task Difficulty on Use of Advice , 2007 .
[21] Alfred Kobsa,et al. With a little help from my friends: can social navigation inform interpersonal privacy preferences? , 2011, CSCW.
[22] Judy Kay,et al. Viewing and Controlling Personal Sensor Data: What Do Users Want? , 2013, PERSUASIVE.
[23] Michael D. Buhrmester,et al. Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.
[24] V. Isaeva. Self-organization in biological systems , 2012, Biology Bulletin.
[25] Diane M. Mackie,et al. Systematic and nonsystematic processing of majority and minority persuasive communications. , 1987 .
[26] Yaniv,et al. Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.
[27] J. Baron. Thinking and Deciding , 2023 .
[28] Elizabeth D. Mynatt,et al. Supporting Privacy Management via Community Experience and Expertise , 2005 .
[29] E. Renold,et al. The use of vignettes in qualitative research , 1999 .
[30] R. L. Winkler,et al. Combining Economic Forecasts , 1986 .
[31] R. Burt. Structural Holes versus Network Closure as Social Capital , 2001 .
[32] Serge Egelman,et al. Information Disclosure Concerns in The Age of Wearable Computing , 2016 .
[33] Albert E. Mannes. Are We Wise About the Wisdom of Crowds? The Use of Group Judgments in Belief Revision , 2009, Manag. Sci..
[34] Heather Richter Lipford,et al. The impact of social navigation on privacy policy configuration , 2010, SOUPS.
[35] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[36] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[37] H. Kelman. Compliance, identification, and internalization three processes of attitude change , 1958 .
[38] A. Jenness,et al. The role of discussion in changing opinion regarding a matter of fact. , 1932 .
[39] Laura A. Dabbish,et al. The Role of Social Influence in Security Feature Adoption , 2015, CSCW.
[40] Jeffrey T. Hancock,et al. Should I Share That? Prompting Social Norms That Influence Privacy Behaviors on a Social Networking Site , 2017, J. Comput. Mediat. Commun..
[41] Eleanor McLellan,et al. Codebook Development for Team-Based Qualitative Analysis , 1998 .
[42] Eran Toch,et al. Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources , 2017, CSCW.
[43] Claudio J. Tessone,et al. Effects of Social Influence on the Wisdom of Crowds , 2012, ArXiv.
[44] R L Sielken,et al. Estimation of "safe doses" in carcinogenic experiments. , 1977, Journal of environmental pathology and toxicology.
[45] Ilaria Torre,et al. Supporting users to take informed decisions on privacy settings of personal devices , 2018, Personal and Ubiquitous Computing.
[46] Sally Andrews,et al. To transform or not to transform: using generalized linear mixed models to analyse reaction time data , 2015, Front. Psychol..
[47] B. Latané. The psychology of social impact. , 1981 .
[48] Anupam Das,et al. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.
[49] Paul Hewson. Statistical Rethinking: a Bayesian Course with Examples in R and Stan R. McElreath, 2015 Boca Raton Chapman and Hall–CRC 470 pp., £60.99 ISBN 978‐1‐482‐25344‐3 , 2016 .
[50] R. Nickerson. Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .
[51] Helmut Jungermann,et al. Using Expertise and Experience for Giving and Taking Advice , 2014 .
[52] Paul Dourish,et al. Social navigation as a model for usable security , 2005, SOUPS '05.
[53] D. Helbing,et al. How social influence can undermine the wisdom of crowd effect , 2011, Proceedings of the National Academy of Sciences.
[54] Richard P. Larrick,et al. Intuitions About Combining Opinions: Misappreciation of the Averaging Principle , 2006, Manag. Sci..
[55] L. Weingart,et al. Representational gaps, information processing, and conflict in functionally diverse teams , 2007 .
[56] Rodney X. Sturdivant,et al. Applied Logistic Regression: Hosmer/Applied Logistic Regression , 2005 .
[57] Noah J. Goldstein,et al. Social influence: compliance and conformity. , 2004, Annual review of psychology.
[58] L. Festinger. A Theory of Social Comparison Processes , 1954 .
[59] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[60] Robin Martin,et al. Levels of consensus and majority and minority influence. , 2002 .
[61] Amar Cheema,et al. Data collection in a flat world: the strengths and weaknesses of mechanical turk samples , 2013 .
[62] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[63] Nora A Draper,et al. From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates , 2017 .
[64] S. Asch. Studies of independence and conformity: I. A minority of one against a unanimous majority. , 1956 .
[65] Bert H. Hodges,et al. Speaking from ignorance: not agreeing with others we believe are correct. , 2014, Journal of personality and social psychology.
[66] Alfred Kobsa,et al. Privacy preference modeling and prediction in a simulated campuswide IoT environment , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[67] Oded Nov,et al. The Effect of Exposure to Social Annotation on Online Informed Consent Beliefs and Behavior , 2016, CSCW.
[68] Richard P. Larrick,et al. Cognitive Repairs : How Organizational Practices Can Compensate for Individual Shortcomings , 1998 .
[69] Dirk Helbing,et al. Collective Information Processing and Pattern Formation in Swarms, Flocks, and Crowds , 2009, Top. Cogn. Sci..
[70] Bart P. Knijnenburg. Privacy? I Can’t Even! Making a Case for User-Tailored Privacy , 2017, IEEE Security & Privacy.
[71] Lujo Bauer,et al. Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.
[72] Klaus Wehrle,et al. Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.
[73] S. Bikhchandani,et al. You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .
[74] J. R. Landis,et al. The measurement of observer agreement for categorical data. , 1977, Biometrics.
[75] Claudio J. Tessone,et al. Quantifying the effects of social influence , 2013, Scientific Reports.
[76] Richard McElreath. Statistical rethinking: A bayesian course with R examples , 2015 .
[77] David W. Hosmer,et al. Applied Logistic Regression , 1991 .
[78] Albert E. Mannes,et al. Judgmental aggregation strategies depend on whether the self is involved , 2011 .
[79] Alessandro Acquisti,et al. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.
[80] Damla Turgut,et al. Investigating the Value of Privacy within the Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[81] Paul Resnick,et al. Reputation systems , 2000, CACM.
[82] Ulf Toelch,et al. Decreased environmental variability induces a bias for social information use in humans , 2009 .
[83] R. R. Blake,et al. Task difficulty and conformity pressures. , 1958, Journal of abnormal psychology.
[84] Michael Vitale,et al. The Wisdom of Crowds , 2015, Cell.
[85] N. Harvey,et al. Taking Advice: Accepting Help, Improving Judgment, and Sharing Responsibility☆☆☆ , 1997 .
[86] Muzafer Sherif,et al. A study of some social factors in perception. , 1935 .
[87] Predrag V. Klasnja,et al. Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.
[88] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[89] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[90] M. Deutsch,et al. A study of normative and informational social influences upon individual judgement. , 1955, Journal of abnormal psychology.
[91] Elizabeth D. Mynatt,et al. Challenges in supporting end-user privacy and security management with social navigation , 2009, SOUPS.
[92] Richard Chow,et al. The Last Mile for IoT Privacy , 2017, IEEE Security & Privacy.