Privacy and human behavior in the age of information
暂无分享,去创建一个
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] H. Kelley,et al. The social psychology of groups , 1960 .
[3] R. F. Murphy,et al. Social Distance and the Veil1 , 1964 .
[4] R. Harrison,et al. Predicting Small Group Behavior with the Self-Disclosure Inventory , 1964 .
[5] B. Schwartz. The Social Psychology of Privacy , 1968, American Journal of Sociology.
[6] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[7] E. Goffman. Relations in Public: Microstudies of the Public Order , 1971 .
[8] I. Altman,et al. Social penetration: The development of interpersonal relationships , 1973 .
[9] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[10] Sarah J. Miller,et al. Effects of room environment on self-disclosure in a counseling analogue. , 1976 .
[11] E. Sundstrom,et al. Interpersonal relationships and personal space: Research review and theoretical model , 1976 .
[12] P. Klopfer,et al. The Concept Privacy and Its Biological Basis , 1977 .
[13] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[14] D. Langmeyer,et al. The effects of interaction distance and gender on self-disclosure in the dyad. , 1977, Sociometry.
[15] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[16] I. Ajzen,et al. Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .
[17] V. Derlega,et al. Privacy and self-disclosure in social relationships. , 1977 .
[18] Donald J. Munro,et al. Individualism and Holism , 1981 .
[19] R. Posner. The Economics of Privacy , 1981 .
[20] Sara Kiesler,et al. Social psychological aspects of computer-mediated communication , 1984 .
[21] Alan Westin. Philosophical Dimensions of Privacy: The origins of modern claims to privacy , 1984 .
[22] Lewis A. Coser,et al. Privacy: Studies in Social and Cultural History. , 1985 .
[23] Privacy in Confucian and Taoist Thought , 1985 .
[24] Barrington Moore,et al. Privacy: Studies in Social and Cultural History. , 1986 .
[25] John C. Traupman,et al. A History of Private Life: From Pagan Rome to Byzantium , 1990 .
[26] Hans-Jürgen Hippler,et al. CONFIDENTIALITY ASSURANCES IN SURVEYS: REASSURANCE OR THREAT? , 1992 .
[27] J. Pennebaker. Putting stress into words: health, linguistic, and therapeutic implications. , 1993, Behaviour research and therapy.
[28] P. Slovic. The Construction of Preference , 1995 .
[29] Suzanne P. Weisband,et al. Self disclosure on computer forms: meta-analysis and implications , 1996, CHI.
[30] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[31] T. Postmes,et al. Deindividuation and antinormative behavior: A meta-analysis. , 1998 .
[32] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[33] Youngme Moon. Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .
[34] Julie E. Cohen. Examined Lives: Informational Privacy and the Subject as Object , 2000 .
[35] M. Milinski,et al. Cooperation through image scoring in humans. , 2000, Science.
[36] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[37] A. Joinson. Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity , 2001 .
[38] Privacy in antiquity , 2001 .
[39] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[40] Katelyn Y. A. McKenna,et al. Can you see the real me? Activation and expression of the "true self" on the Internet. , 2002 .
[41] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[42] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[43] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[44] Gerald L. Lohse,et al. Defaults, Framing and Privacy: Why Opting In-Opting Out1 , 2002 .
[45] Eric J. Johnson,et al. The Construction of Preference: Do Defaults Save Lives? , 2006 .
[46] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[47] Colin Camerer,et al. Regulation for Conservatives: Behavioral Economics and the Case for 'Asymmetric Paternalism' , 2003 .
[48] Molly J. Walker Wilson,et al. Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .
[49] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[50] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[51] Colin Potts,et al. Privacy policies as decision-making tools: an evaluation of online privacy notices , 2004, CHI.
[52] John Suler,et al. The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..
[53] E. Deci,et al. Self‐determination theory and work motivation , 2005 .
[54] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[55] 宁北芳,et al. 疟原虫var基因转换速率变化导致抗原变异[英]/Paul H, Robert P, Christodoulou Z, et al//Proc Natl Acad Sci U S A , 2005 .
[56] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[57] Stacey R. Finkelstein,et al. Recommendations Implicit in Policy Defaults , 2006, Psychological science.
[58] Acknowledgments , 2006, Molecular and Cellular Endocrinology.
[59] J. Frattaroli. Experimental disclosure and its moderators: a meta-analysis. , 2006, Psychological bulletin.
[60] Stephen A. Weis. Privacy Enhancing Technologies , 2006, IEEE Security & Privacy Magazine.
[61] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[62] A. Shariff,et al. PSYCHOLOGICAL SCIENCE Research Article God Is Watching You Priming God Concepts Increases Prosocial Behavior in an Anonymous Economic Game , 2022 .
[63] R. Tourangeau,et al. Sensitive questions in surveys. , 2007, Psychological bulletin.
[64] Muhammad Aslam Hayat. Privacy and Islam: From the Quran to data protection in Pakistan , 2007 .
[65] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[66] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[67] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[68] E. Hargittai. This is the pre-print copy of a chapter in Grusky, David. 2008. Social Stratification. Boulder, Colorado: Westview Press. Do not distribute on any mailing lists or post on any Web site. The Digital Reproduction of Inequality , 2008 .
[69] N. Ellison,et al. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis , 2008 .
[70] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[71] S. Shavitt,et al. Getting too personal: Reactance to highly personalized email solicitations , 2008 .
[72] S. Kitayama,et al. Minimal Social Cues in the Dictator Game , 2009 .
[73] Aleecia M. McDonald,et al. The Cost of Reading Privacy Policies , 2009 .
[74] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[75] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[76] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[77] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[78] F. Gino,et al. Good Lamps Are the Best Police , 2010, Psychological science.
[79] Mikko Tapani Karaiste. Delete: The virtue of forgetting in the digital age , 2010 .
[80] Jacob Kramer-Duffield,et al. Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.
[81] Gregory J. Conti,et al. Malicious interface design: exploiting the user , 2010, WWW '10.
[82] Alessandro Acquisti,et al. Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .
[83] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[84] Woodrow Hartzog. Website Design as Contract , 2011 .
[85] Desney S. Tan,et al. Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008 , 2005, CHI 2008.
[86] Avi Goldfarb,et al. Online Display Advertising: Targeting and Obtrusiveness , 2011, Mark. Sci..
[87] Jason P. Mitchell,et al. Disclosing information about the self is intrinsically rewarding , 2012, Proceedings of the National Academy of Sciences.
[88] G. Loewenstein,et al. The Impact of Relative Standards on the Propensity to Disclose , 2012 .
[89] Antti Oulasvirta,et al. Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.
[90] Erik Brynjolfsson,et al. Big data: the management revolution. , 2012, Harvard business review.
[91] R. Altman,et al. Data-Driven Prediction of Drug Effects and Interactions , 2012, Science Translational Medicine.
[92] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[93] Ryan Calo. Digital Market Manipulation , 2013 .
[94] Daniel J. Solove,et al. Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .
[95] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[96] Jeffrey T. Hancock,et al. Self-Affirmation Underlies Facebook Use , 2013, Personality & social psychology bulletin.
[97] danah boyd,et al. It's Complicated: The Social Lives of Networked Teens , 2014 .
[98] Kate M. Miltner,et al. Critiquing Big Data: Politics, Ethics, Epistemology , 2014 .
[99] Jennifer M. Urban,et al. Alan Westin's Privacy Homo Economicus , 2014 .
[100] Laurence Clennett-Sirois. It's Complicated: The Social Lives of Networked Teens , 2014 .
[101] Lois Ann Scheidt,et al. It’s Complicated: The Social Lives of Networked Teens , 2015, New Media Soc..
[102] J. Reeve,et al. Solutions to problematic polypharmacy: learning from the expertise of patients. , 2015, The British journal of general practice : the journal of the Royal College of General Practitioners.