Can Consumers Experience Ownership for Their Personal Data?From Issues of Scope and Invisibility to Agents Handling Our Digital Blueprints
暂无分享,去创建一个
[1] J. Greeno. Gibson's affordances. , 1994, Psychological review.
[2] Grant Mccracken. Culture and Consumption: A Theoretical Account of the Structure and Movement of the Cultural Meaning of Consumer Goods , 1986 .
[3] Vincent Conitzer,et al. Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases , 2011, Mark. Sci..
[4] Stephen H. Wagner,et al. EMPLOYEES THAT THINK AND ACT LIKE OWNERS: EFFECTS OF OWNERSHIP BELIEFS AND BEHAVIORS ON ORGANIZATIONAL EFFECTIVENESS , 2003 .
[5] Herb Childress,et al. Teenagers, Territory and the Appropriation of Space , 2004 .
[6] B. Kamleitner. A Metaphorical Synthesis of the Impact of Ownership on Consumer Behavior , 2014 .
[7] Paul Bloom,et al. Celebrity Contagion and the Value of Objects , 2011 .
[8] J. Sartre,et al. Being and nothingness : a phenomenological essay on ontology , 1992 .
[9] Valentin Zacharias,et al. Applying quantified self approaches to support reflective learning , 2012, LAK.
[10] Vijay Erramilli,et al. Your browsing behavior for a big mac: economics of personal information online , 2011, WWW.
[11] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[12] Hamed Haddadi,et al. Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.
[13] R. Belk. Possessions and the Extended Self , 1988 .
[14] Sören Preibusch,et al. Price versus privacy: an experiment into the competitive advantage of collecting less personal information , 2013, Electron. Commer. Res..
[15] Nadezhda Purtova,et al. The illusion of personal data as no one's property , 2015 .
[16] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[17] Lita Furby,et al. The Origins and Early Development of Possessive Behavior , 1980 .
[18] Mihaela Popescu,et al. Big data analytics and the limits of privacy self-management , 2017, New Media Soc..
[19] Nancy S. Kim,et al. A proximity effect in adults’ contamination intuitions , 2011, Judgment and Decision Making.
[20] L. Jean Camp,et al. Peer-produced privacy protection , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.
[21] Jennifer J. Argo,et al. Consumer Contamination: How Consumers React to Products Touched by Others , 2006 .
[22] Mike Molesworth,et al. Possession Work on Hosted Digital Consumption Objects as Consumer Ensnarement , 2016, Journal of the Association for Consumer Research.
[23] Amitai Etzioni. The Privacy Merchants: What is to Be Done? , 2012 .
[24] B. Pelham,et al. Name letter preferences are not merely mere exposure: Implicit egotism as self-regulation. , 2002 .
[25] Harald Weston. Data Analytics as Predictor of Character or Virtues, and the Risks to Autonomy , 2016 .
[26] Caglar Irmak,et al. The Endowment Effect as Self-Enhancement in Response to Threat , 2013 .
[27] Joshua A. Hicks,et al. Death, Life, Scarcity, and Value: An Alternative Perspective on the Meaning of Death , 2009, Psychological science.
[28] Alessandro Acquisti,et al. Personal data markets , 2015, Electron. Mark..
[29] B. Loken. Consumer psychology: categorization, inferences, affect, and persuasion. , 2006, Annual review of psychology.
[30] Jin Chen,et al. Information Privacy Concern About Peer Disclosure in Online Social Networks , 2015, IEEE Transactions on Engineering Management.
[31] Carsten Ochs,et al. Do-It-Yourself Data Protection—Empowerment or Burden? , 2016 .
[32] Madison L. Pesowski,et al. Identical but not interchangeable: Preschoolers view owned objects as non-fungible , 2016, Cognition.
[33] Jon L. Pierce,et al. Toward an Understanding of the Development of Ownership Feelings , 2014 .
[34] Catherine Tucker,et al. Social Networks, Personalized Advertising, and Privacy Controls , 2013 .
[35] Julie E. Cohen. Examined Lives: Informational Privacy and the Subject as Object , 2000 .
[36] E. Dijk,et al. Wanna trade? Product knowledge and the perceived differences between the gains and losses of trade , 2005 .
[37] J. Stigler,et al. The laws of sympathetic magic , 1990 .
[38] M. Loureiro,et al. Do experimental auction estimates pass the scope test , 2013 .
[39] Heribert Gierl,et al. Are scarce products always more attractive? The interaction of different types of scarcity signals with products' suitability for conspicuous consumption , 2010 .
[40] Jun Zhao,et al. Privacy Languages: Are we there yet to enable user controls? , 2016, WWW.
[41] B. Hood,et al. The effect of labour on ownership decisions in two cultures: developmental evidence from Japan and the United Kingdom. , 2014, The British journal of developmental psychology.
[42] Gina Brown,et al. Blind in one eye: How psychological ownership of ideas affects the types of suggestions people adopt , 2012 .
[43] James B. Avey,et al. Psychological ownership: theoretical extensions, measurement and relation to work outcomes , 2009, Journal of Organizational Behavior.
[44] Paul Slovic,et al. Psychological aspects of the rejection of recycled water: Contamination, purification and disgust , 2015, Judgment and Decision Making.
[45] Weston L. Baxter,et al. A psychological ownership approach to designing object attachment , 2015 .
[46] Alessandro Acquisti,et al. Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.
[47] A. Chemero. An Outline of a Theory of Affordances , 2003, How Shall Affordances be Refined? Four Perspectives.
[48] Dawn Nafus,et al. This One Does Not Go Up to 11: The Quantified Self Movement as an Alternative Big Data Practice , 2014 .
[49] Merrill Warkentin,et al. An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..
[50] J. Peck,et al. The Effect of Mere Touch on Perceived Ownership , 2009 .
[51] Sarah Spiekermann,et al. Towards a value theory for personal data , 2017, J. Inf. Technol..
[52] York Hagmayer,et al. Categories and causality: The neglected direction , 2006, Cognitive Psychology.
[53] Ori Friedman,et al. Children and Adults Use Gender and Age Stereotypes in Ownership Judgments , 2014 .
[54] Kent Grayson,et al. Indexicality and the Verification Function of Irreplaceable Possessions: A Semiotic Analysis , 2000 .
[55] Shu Li,et al. The Territorial Prior-Residence Effect and Children's Behavior in Social Dilemmas , 2009 .
[56] Hamed Haddadi,et al. Information bazaar: a contextual evaluation , 2013, HotPlanet '13.
[57] Sarah Spiekermann,et al. Networks of Control: A Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy , 2016 .
[58] Patty Kostkova,et al. Who Owns the Data? Open Data for Healthcare , 2016, Front. Public Health.
[59] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[60] J. L. Pierce,et al. The State of Psychological Ownership: Integrating and Extending a Century of Research , 2003 .
[61] O. Friedman,et al. Creation in judgments about the establishment of ownership , 2015 .
[62] Bernadette Kamleitner,et al. “As if It Were Mine”: Imagery Works by Inducing Psychological Ownership , 2015 .
[63] Frank Schweitzer,et al. Online privacy as a collective phenomenon , 2014, COSN '14.
[64] A. Shaw,et al. Ideas versus labor: What do children value in artistic creation? , 2013, Cognition.
[65] Fanglin Chen,et al. StudentLife: assessing mental health, academic performance and behavioral trends of college students using smartphones , 2014, UbiComp.
[66] Doan T. Le,et al. Acquiring ownership and the attribution of responsibility , 2012, Cognition.
[67] Carey K. Morewedge,et al. Explanations of the endowment effect: an integrative review , 2015, Trends in Cognitive Sciences.
[68] L. Furby. Possession in humans: An exploratory study of its meaning and motivation. , 1978 .
[69] Marsha L. Richins. Special Possessions and the Expression of Material Values , 1994 .
[70] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[71] Mimmi Sjöklint,et al. The measurable me: the influence of self-quantification on the online user's decision-making process , 2014, ISWC '14 Adjunct.
[72] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.
[73] Christopher Rees,et al. Who Owns Our Data? , 2013 .
[74] Bernadette Kamleitner,et al. Payment method and perceptions of ownership , 2013 .
[75] R. Belk. The ineluctable mysteries of possessions. , 1991 .
[76] The Psychology of Perception: A Philosophical Examination of Gestalt Theory and Derivative Theories of Perception , 1958 .
[77] Jon L. Pierce,et al. Psychological Ownership and the Organizational Context: Theory, Research Evidence, and Application , 2011 .
[78] M. Lepper,et al. When choice is demotivating: Can one desire too much of a good thing? , 2000 .
[79] Ernst Prelinger,et al. Extension and Structure of the Self , 1959 .
[80] Alessandro Acquisti,et al. An Online Survey Experiment on Ambiguity and Privacy , 2012 .
[81] Meredith Render,et al. The Concept of Property , 2017 .
[82] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[83] O. Friedman,et al. If I am free, you can’t own me: Autonomy makes entities less ownable , 2016, Cognition.
[84] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[85] J. M. Nuttin. Affective consequences of mere ownership: The name letter effect in twelve European languages , 1987 .
[86] Jeffrey Rosen,et al. The Right to Be Forgotten , 2012 .
[87] Jacob A. Benfield,et al. Territorial markings as a predictor of driver aggression and road rage , 2008 .
[88] Herbert Gintis,et al. The evolution of private property , 2007 .
[89] Paul Rozin,et al. The Contagion Concept in Adult Thinking in the United States: Transmission of Germs and of Interpersonal Influence , 1994 .
[90] Yu Pu,et al. Towards a Model on the Factors Influencing Social App Users’ Valuation of Interdependent Privacy , 2016, Proc. Priv. Enhancing Technol..
[91] Nancy J. King,et al. Data analytics and consumer profiling: Finding appropriate privacy principles for discovered data , 2016, Comput. Law Secur. Rev..