Misplaced Confidences: Privacy and the Control Paradox.
暂无分享,去创建一个
[1] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[2] Mary Beth Rosson,et al. journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .
[3] Alessandro Acquisti,et al. Predicting Social Security numbers from public data , 2009, Proceedings of the National Academy of Sciences.
[4] Kristopher J Preacher,et al. Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models , 2008, Behavior research methods.
[5] Matthew S. Fritz,et al. Mediation analysis. , 2019, Annual review of psychology.
[6] Loran F. Nordgren,et al. Unpacking perceived control in risk perception: The mediating role of anticipated regret , 2007 .
[7] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[8] G. Loewenstein,et al. The Economist as Therapist: Methodological Ramifications of 'Light' Paternalism , 2007 .
[9] Adam N. Joinson,et al. Personalization, authentication and self-disclosure in self-administered Internet surveys , 2004, Comput. Hum. Behav..
[10] Daniel J. Solove. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , 2007 .
[11] R. Aumann,et al. Unraveling in Guessing Games : An Experimental Study , 2007 .
[12] Heng Xu,et al. The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.
[13] Joe C Magee,et al. PSYCHOLOGICAL SCIENCE Research Article Power and Perspectives Not Taken , 2022 .
[14] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[15] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[16] Adam S. Goodie,et al. The Role of Perceived Control and Overconfidence in Pathological Gambling , 2005, Journal of Gambling Studies.
[17] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[18] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[19] Kristopher J Preacher,et al. SPSS and SAS procedures for estimating indirect effects in simple mediation models , 2004, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[20] K. Forster,et al. Forty-five years after Broadbent (1958): still no identification without attention. , 2004, Psychological review.
[21] W. Keith Campbell,et al. Narcissism, confidence, and risk attitude , 2004, Journal of Behavioral Decision Making.
[22] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[23] R. Dukas,et al. Causes and Consequences of Limited Attention , 2004, Brain, Behavior and Evolution.
[24] N. C. Schaeffer,et al. The Science of Asking Questions , 2003 .
[25] E. Soane,et al. Trading on illusions: unrealistic perceptions of control and trading performance , 2003 .
[26] V. Crawford. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .
[27] A. Acquisti. Losses , Gains , and Hyperbolic Discounting : An Experimental Approach to Information Security Attitudes and Behavior , 2003 .
[28] Lawrence Lessig. Privacy as Property , 2015 .
[29] H. Varian,et al. Conditioning Prices on Purchase History , 2005 .
[30] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[31] Adam D. Galinsky,et al. Creating and reducing intergroup conflict: The role of perspective-taking in affecting out-group evaluations , 2002 .
[32] Gerald L. Lohse,et al. Defaults, Framing and Privacy: Why Opting In-Opting Out1 , 2002 .
[33] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[34] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[35] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[36] M. Wardlaw,et al. Three lessons for a better cycling future , 2000, BMJ : British Medical Journal.
[37] C. Whan Park,et al. Choosing What I Want versus Rejecting What I Do Not Want: An Application of Decision Framing to Product Option Choice Decisions , 2000 .
[38] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[39] T. Gilovich,et al. The spotlight effect in social judgment: an egocentric bias in estimates of the salience of one's own actions and appearance. , 2000, Journal of personality and social psychology.
[40] Gary Klein,et al. Sources of Power: How People Make Decisions , 2017 .
[41] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[42] Wiji Arulampalam,et al. A NOTE ON ESTIMATED COEFFICIENTS IN RANDOM EFFECTS PROBIT MODELS , 1999 .
[43] Colin Camerer,et al. Iterated Dominance and Iterated Best-Response in Experimental P-Beauty Contests , 1998 .
[44] Jerry Kang. Information Privacy in Cyberspace Transactions , 1998 .
[45] L Sweeney,et al. Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.
[46] Zoonky Lee,et al. Push -Pull: The Information Tug of War A Framework for Information Deliveryand Acquisition Systems Design , 1997 .
[47] Tom W. Smith,et al. ASKING SENSITIVE QUESTIONS THE IMPACT OF DATA COLLECTION MODE, QUESTION FORMAT, AND QUESTION CONTEXT , 1996 .
[48] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[49] Suzanne P. Weisband,et al. Self disclosure on computer forms: meta-analysis and implications , 1996, CHI.
[50] Peter R. Harris,et al. Sufficient grounds for optimism? The relationship between perceived controllability and optimistic bias , 1996 .
[51] C. Ess. Philosophical Perspectives on Computer-Mediated Communication , 1996 .
[52] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[53] Shlomo Zilberstein,et al. Models of Bounded Rationality , 1995 .
[54] D. Stahl,et al. Experimental evidence on players' models of other players , 1994 .
[55] W. Klein,et al. Exaggerated Self-Assessments and the Preference for Controllable Risks , 1994 .
[56] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[57] Hans-Jürgen Hippler,et al. CONFIDENTIALITY ASSURANCES IN SURVEYS: REASSURANCE OR THREAT? , 1992 .
[58] S. Rose. Selective attention , 1992, Nature.
[59] D H Barlow,et al. The influence of an illusion of control on panic attacks induced via inhalation of 5.5% carbon dioxide-enriched air. , 1989, Archives of general psychiatry.
[60] P. Slovic. Perception of risk. , 1987, Science.
[61] J. H. Frey. An Experiment with a Confidentiality Reminder in a Telephone Survey , 1986 .
[62] S. Zeger,et al. Longitudinal data analysis using generalized linear models , 1986 .
[63] F. Schoeman,et al. Philosophical Dimensions of Privacy , 1984 .
[64] N D Weinstein,et al. Why it won't happen to me: perceptions of risk factors and susceptibility. , 1984, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[65] D. Broadbent. Task combination and selective intake of information. , 1982, Acta psychologica.
[66] G. Stigler. An Introduction to Privacy in Economics and Politics , 1980, The Journal of Legal Studies.
[67] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[68] Richard A. Posner,et al. Privacy, Secrecy, and Reputation , 1978 .
[69] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[70] S. Peltzman. The Effects of Automobile Safety Regulation , 1975, Journal of Political Economy.
[71] P. Slovic. Choice Between Equally Valued Alternatives. , 1975 .
[72] D. Kahneman,et al. Attention and Effort , 1973 .
[73] A. Westin,et al. The assault on privacy , 1971 .
[74] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[75] J. Henslin,et al. Craps and Magic , 1967, American Journal of Sociology.
[76] D. Broadbent. A mechanical model for human attention and immediate memory. , 1957, Psychological review.
[77] C. L. M.. The Psychology of Attention , 1890, Nature.