Privacy Issues in the Era of Ubiquitous Commerce
暂无分享,去创建一个
[1] Fiona Fui-Hoon Nah,et al. HCI Research Issues in Electronic Commerce , 2002, J. Electron. Commer. Res..
[2] J CulnanMary,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust , 1999 .
[3] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[4] Anne Adams,et al. Users' perception of privacy in multimedia communication , 1999, CHI Extended Abstracts.
[5] Anne Adams,et al. Privacy in Multimedia Communications: Protecting Users, Not Just Data , 2001, BCS HCI/IHM.
[6] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[7] Iris A. Junglas,et al. A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[8] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[9] George R. Milne,et al. Avoiding Misuse of New Information Technologies: Legal and Societal Considerations , 1994 .
[10] Gildas Avoine,et al. Privacy Issues in RFID Banknote Protection Schemes , 2004, CARDIS.
[11] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[12] Holtjona Galanxhi-Janaqi,et al. U-commerce: emerging trends and research issues , 2004, Ind. Manag. Data Syst..
[13] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[14] K. Siau,et al. Development of a Framework for Trust in Mobile Commerce , 2003 .
[15] Mark Cenite. Code and Other Laws of Cyberspace , 2000 .
[16] Paul J. Hart,et al. PRIVACY CONCERNS AND INTERNET USE--A MODEL OF TRADE-OFF FACTORS. , 2003 .
[17] Veda C. Storey,et al. Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.
[18] Jonathan Grudin,et al. Group dynamics and ubiquitous computing , 2002, CACM.
[19] Gordon B. Davis,et al. Anytime/anyplace computing and the future of knowledge work , 2002, CACM.
[20] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[21] Nikhilesh Dholakia,et al. Contrasting European and American Approaches to Privacy in Electronic Markets: Property Right versus Civil Right , 2001, Electron. Mark..
[22] Richard T. Watson,et al. U-Commerce: An Experimental Investigation of Ubiquity and Uniqueness , 2003, ICIS.
[23] L. Kolbe,et al. CULTURAL CONTRADICTIONS OF THE ANYTIME, ANYWHERE ECONOMY , 2001 .
[24] Keng Siau,et al. Building customer trust in mobile commerce , 2003, CACM.
[25] Nikhilesh Dholakia,et al. Cultural contradictions of the anytime, anywhere economy: reframing communication technology , 2004, Telematics Informatics.
[26] R. Watson,et al. U-commerce: Expanding the universe of marketing , 2002 .
[27] Robert P. Minch,et al. Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[28] Khawaja Saeed,et al. Controlling Sourcing Risk in Electronic Marketplaces , 2003, Electron. Mark..
[29] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[30] S. Bibb,et al. Building customer trust , 2004 .
[31] Keng Siau,et al. Values of Silent Commerce: A Study Using Value-Focused Thinking Approach , 2005, AMCIS.
[32] Friedemann Mattern,et al. Living in a smart environment - implications for the coming ubiquitous information society , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[33] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[34] Keng Siau,et al. Mobile Commerce: Promises, Challenges and Research Agenda , 2001, J. Database Manag..
[35] Pamela Samuelson,et al. Privacy as intellectual property , 2000 .
[36] George Roussos,et al. Consumer perceptions of privacy, security and trust in ubiquitous commerce , 2004, Personal and Ubiquitous Computing.
[37] J. Rubenfeld. The Right of Privacy , 1989 .
[38] Marc Langheinrich,et al. Privacy Invasions in Ubiquitous Computing , 2002 .
[39] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[40] Keng Siau,et al. Mobile communications and mobile services , 2003, Int. J. Mob. Commun..
[41] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[42] Keng Siau,et al. A qualitative investigation on consumer trust in mobile commerce , 2004, Int. J. Electron. Bus..
[43] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[44] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[45] J. H. Davis,et al. An integrative model of organizational trust, Academy of Management Review, : . , 1995 .
[46] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[47] D. Zwick,et al. Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing , 2004 .