PRIVACY IN ONLINE SOCIAL NETWORKS
暂无分享,去创建一个
Pieter H. Hartel | Zekeriya Erkin | Reginald L. Lagendijk | Michael Beye | Qiang Tang | Arjan Jeckmans | P. Hartel | Qiang Tang | R. Lagendijk | Z. Erkin | M. Beye | Arjan Jeckmans
[1] Sonja Buchegger,et al. A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.
[2] W. Mcdougall. An introduction to social psychology , 1912 .
[3] Paul Wang,et al. Direct marketing activities and personal privacy , 1993 .
[4] Caroline Frear Burk. The Collecting Instinct , 1900 .
[5] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[6] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[7] Jerry Kang. Information Privacy in Cyberspace Transactions , 1998 .
[8] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[9] Elizabeth J. Van Every,et al. The Emergent Organization : Communication As Its Site and Surface , 1999 .
[10] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[11] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[12] Christena Nippert-Eng,et al. Calendars and keys: The classification of “home” and “work” , 1996 .
[13] Barbara Carminati,et al. Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[14] Elena Karahanna,et al. Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..
[15] Virgílio A. F. Almeida,et al. Characterizing user behavior in online social networks , 2009, IMC '09.
[16] Robert P. Bostrom,et al. Role conflict and ambiguity: Critical variables in the MIS user-designer relationship , 1980, SIGCPR '80.
[17] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[18] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[19] M. Jones. Privacy: A Significant Marketing Issue for the 1990s , 1991 .
[20] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[21] Shyhtsun Felix Wu,et al. All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[22] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[23] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[24] Stefan Weiss. The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications , 2007, FIDIS.
[25] Blake E. Ashforth,et al. All in a Day'S Work: Boundaries and Micro Role Transitions , 2000 .
[26] Anthony D. Miyazaki,et al. Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions , 2002 .
[27] Judee K. Burgoon,et al. Maintaining and Restoring Privacy through Communication in Different Types of Relationships , 1989 .
[28] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[29] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[30] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[31] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[32] Panagiotis G. Ipeirotis. Demographics of Mechanical Turk , 2010 .
[33] R. Priest. Data Protection Act , 1988 .
[34] A. Joinson,et al. Self-disclosure, Privacy and the Internet , 2009 .
[35] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[36] E. Michael Maximilien,et al. Enabling Privacy as a Fundamental Construct for Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[37] Jerald Hage,et al. YOUTH CRIME IN POSTINDUSTRIAL SOCIETIES An Integrated Perspective , 1976 .
[38] Frank Stajano,et al. Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.
[39] Jo Ellen Moore,et al. One Road to Turnover: An Examination of Work Exhaustion in Technology Professionals , 2000, MIS Q..
[40] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[41] Michael J. Freedman,et al. Efficient Private Techniques for Verifying Social Proximity , 2007, IPTPS.
[42] Kenneth A. Bollen,et al. Regression Diagnostics , 1985 .
[43] Elizabeth D. Mynatt,et al. Challenges in supporting end-user privacy and security management with social navigation , 2009, SOUPS.
[44] Steven Lysonski,et al. A boundary theory investigation of the product manager's role. , 1985 .
[45] J. Porteous. Home: The Territorial Core , 1976 .
[46] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[47] Detmar W. Straub,et al. When Subordinates Become IT Contractors: Persistent Managerial Expectations in IT Outsourcing , 2003, Inf. Syst. Res..
[48] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[49] Sirkka L. Jarvenpaa,et al. Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..
[50] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[51] William Lewis,et al. Research Note - Statistical Power in Analyzing Interaction Effects: Questioning the Advantage of PLS with Product Indicators , 2007, Inf. Syst. Res..
[52] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[53] Scott Michaelsen,et al. Border Theory: The Limits of Cultural Politics , 1997 .
[54] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[55] Ram Dantu,et al. Privacy Management for Facebook , 2008, ICISS.
[56] E. Schegloff,et al. A simplest systematics for the organization of turn-taking for conversation , 1974 .
[57] Judee K. Burgoon,et al. Privacy and Communication , 1982 .
[58] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[59] Mary Beth Rosson,et al. journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .
[60] S. Lirtzman,et al. Role Conflict and Ambiguity in Complex Organizations. , 1970 .
[61] Colin J. Bennett. Regulating privacy: data protection and public policy in europe and the u , 1992 .
[62] Helen Harris Perlman. Persona: Social Role and Personality , 1986 .
[63] Blase Ur,et al. Enhancing Privacy on Social Networks By Segregating Different Social Spheres , 2008 .
[64] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[65] Jorge Correia Jesuino,et al. Role-Conflict, Ambiguity, and Overload - a 21-Nation Study , 1995 .
[66] Tor Guimaraes,et al. Determinants of Turnover Intentions: Comparing IC and IS Personnel , 1992, Inf. Syst. Res..
[67] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[68] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[69] Mark S. Ackerman,et al. Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.
[70] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[71] D. Cardon,et al. Le design de la visibilité , 2008 .
[72] Heather Richter Lipford,et al. Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.
[73] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[74] Darhl M. Pedersen,et al. MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .
[75] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[76] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[77] Panagiotis Papadimitratos,et al. Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.
[78] Andrew J. Rohm,et al. Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .
[79] John F. Rockart,et al. An Examination of Work-Related Correl ates of Job Satisfaction in Programmer/Analysts , 1984, ICIS.
[80] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[81] Jack J. Baroudi. The impact of role variables on IS personnel work attitudes and intentions , 1985 .
[82] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[83] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[84] Angelos Konstantinidis,et al. What Types of Learning may occur through Casual Use of a Social Network Site?The Case of Facebook , 2014 .
[85] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[86] Ramón Cáceres,et al. Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.
[87] Eviatar Zerubavel,et al. The fine line : making distinctions in everyday life , 1993 .
[88] Bill C. Hardgrave,et al. Emotional Dissonance and the Information Technology Professional , 2008, MIS Q..
[89] K. Sheehan,et al. Dimensions of Privacy Concern among Online Consumers , 2000 .
[90] R. Staelin,et al. A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .
[91] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[92] Christopher A. Higgins,et al. After-Hours Telecommuting and Work-Family Conflict: A Comparative Analysis , 1992, Inf. Syst. Res..
[93] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[94] D. Cardon,et al. Le design de la visibilité : Un essai de cartographie du web 2.0 , 2008 .
[95] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[96] Catherine Dwyer,et al. Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[97] R. Kahn,et al. Organizational Stress: Studies in Role Conflict and Ambiguity. , 1965 .
[98] David S. Rosenblum,et al. What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.
[99] D. Hall. A theoretical model of career subidentity development in organizational settings , 1971 .
[100] Heng Xu,et al. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.
[101] Arnold Kamis,et al. Using an Attribute-Based Decision Support System for User-Customized Products Online: An Experimental Investigation , 2008, MIS Q..
[102] Mike Z. Yao,et al. Predicting user concerns about online privacy , 2007 .
[103] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[104] J. Reinsch,et al. Multicommunicating: A Practice Whose Time Has Come? , 2008 .
[105] Ronald E. Leenes. Context Is Everything Sociality and Privacy in Online Social Network Sites , 2009, PrimeLife.