Users’ willingness to pay for web identity management systems

[1]  A. Culyer,et al.  Discrete Choice Experiments , 2014 .

[2]  Dominique Peyrat-Guillard,et al.  Cultural and generational influences on privacy concerns: a qualitative study in seven European countries , 2014, Eur. J. Inf. Syst..

[3]  Jianan Wu,et al.  The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective , 2013, Eur. J. Inf. Syst..

[4]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[5]  Edgar A. Whitley,et al.  On technology neutral policies for e–identity: a critical reflection based on UK identity policy , 2013 .

[6]  Sven Theysohn,et al.  Willingness-to-pay estimation with choice-based conjoint analysis: Addressing extreme response behavior with individually adapted designs , 2012, Eur. J. Oper. Res..

[7]  Jan Zibuschka,et al.  On Some Conjectures in IT Security: The Case for Viable Security Solutions , 2012, Sicherheit.

[8]  Tyler Moore,et al.  Economic Tussles in Federated Identity Management , 2012, WEIS.

[9]  Oliver Hinz,et al.  Price Discrimination in E-Commerce? An Examination of Dynamic Pricing in Name-Your-Own Price Markets , 2011, MIS Q..

[10]  Klaus Miller,et al.  How Should Consumers’ Willingness to Pay be Measured? An Empirical Comparison of State-of-the-Art Approaches , 2011 .

[11]  Bart van Delft,et al.  A Security Analysis of OpenID , 2010, IDMAN.

[12]  John K Kruschke,et al.  Bayesian data analysis. , 2010, Wiley interdisciplinary reviews. Cognitive science.

[13]  Jörg Schwenk,et al.  Security Analysis of OpenID , 2010, Sicherheit.

[14]  Jan Zibuschka,et al.  Diffusion of Federated Identity Management , 2010, Sicherheit.

[15]  Jörg Schwenk,et al.  Risks of the CardSpace Protocol , 2009, ISC.

[16]  Rohit Verma,et al.  Issues in the use of ratings-based versus choice-based conjoint analysis in operations management research , 2009, Eur. J. Oper. Res..

[17]  Klaus Miller,et al.  How should we measure consumers' willingness to pay? An empirical comparison of State-of-the-Art approaches , 2009 .

[18]  Gerrit Hornung,et al.  Data protection in Germany I: The population census decision and the right to informational self-determination , 2009, Comput. Law Secur. Rev..

[19]  Jakov Krolo,et al.  Security of Web Level User Identity Management , 2009 .

[20]  Edgar A. Whitley,et al.  Doing the politics of technological decision making: due process and the debate about identity cards in the U.K. , 2008, Eur. J. Inf. Syst..

[21]  Angela M. Dean,et al.  The Construction of Optimal Stated Choice Experiments: Theory and Methods , 2008 .

[22]  Rachna Dhamija,et al.  The Seven Flaws of Identity Management: Usability and Security Challenges , 2008, IEEE Security & Privacy.

[23]  Eve Maler,et al.  The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.

[24]  Alessandro Acquisti,et al.  Identity Management, Privacy, and Price Discrimination , 2008, IEEE Security & Privacy.

[25]  D. Boyd Facebook's Privacy Trainwreck , 2008 .

[26]  Christopher N. Chapman,et al.  Quantitative Early-Phase User Research Methods: Hard Data for Initial Product Design , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[27]  William P. Wagner,et al.  Tools for Building Information Systems , 2007 .

[28]  Sean W. Smith,et al.  Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.

[29]  D. Street,et al.  The Construction of Optimal Stated Choice Experiments: Theory and Methods by STREET, D. J. and BURGESS, L. , 2007 .

[30]  Deborah J. Street,et al.  The Construction of Optimal Stated Choice Experiments , 2007 .

[31]  Paul C. van Oorschot,et al.  Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer , 2007, Financial Cryptography.

[32]  Elisa Bertino,et al.  An integrated approach to federated identity and privilege management in open systems , 2007, CACM.

[33]  Audun Jøsang,et al.  Usability and Privacy in Identity Management Architectures , 2007, ACSW.

[34]  Jan Zibuschka,et al.  Implementing Strong Authentication Interoperability with Legacy Systems , 2007, IDMAN.

[35]  Michael B. Jones,et al.  Design Rationale behind the Identity Metasystem Architecture , 2007, ISSE.

[36]  Munirpallam A. Venkataramanan,et al.  Profitability in product line pricing and composition with manufacturing commonalities , 2006, Eur. J. Oper. Res..

[37]  William L. Moore,et al.  The no-choice option and dual response choice designs , 2006 .

[38]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[39]  Milton L. Mueller,et al.  Digital identity: How users value the attributes of online identifiers , 2006, Inf. Econ. Policy.

[40]  Günther Pernul,et al.  Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers , 2006, EC-Web.

[41]  Heiko Rossnagel,et al.  On Diffusion and Confusion - Why Electronic Signatures Have Failed , 2006, TrustBus.

[42]  Günter Müller,et al.  Privacy with Delegation of Rights by Identity Management , 2006, ETRICS.

[43]  Stuart E. Schechter,et al.  Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.

[44]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[45]  Heiko Rossnagel,et al.  Geschäftsmodelle für signaturgesetzkonforme Trust Center , 2005, Wirtschaftsinformatik.

[46]  Rolf Oppliger,et al.  Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..

[47]  Victor Raskin,et al.  The user non-acceptance paradigm: INFOSEC's dirty little secret , 2004, NSPW '04.

[48]  Helmut Schneider,et al.  The domino effect of password reuse , 2004, CACM.

[49]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[50]  Paul F. Syverson,et al.  What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.

[51]  David S. Evans Some Empirical Aspects of Multi-sided Platform Industries , 2003 .

[52]  James Backhouse,et al.  Toward public-key infrastructure interoperability , 2003, CACM.

[53]  S. Stashevsky,et al.  Perceived risks as barriers to Internet and e‐commerce usage , 2002 .

[54]  Jan Camenisch,et al.  Design and implementation of the idemix anonymous credential system , 2002, CCS '02.

[55]  Jan De Clercq,et al.  Single Sign-On Architectures , 2002, InfraSec.

[56]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[57]  Martin Natter,et al.  Real world performance of choice-based conjoint models , 2002, Eur. J. Oper. Res..

[58]  J. M. Katz,et al.  Optimal product design using conjoint analysis : Computational complexity and algorithms * , 2002 .

[59]  Nick Feamster,et al.  Dos and don'ts of client authentication on the web , 2001 .

[60]  Hans-Georg Häusel Der Umgang mit Geld und Gut in seiner Beziehung zum Alter , 2001 .

[61]  Aviel D. Rubin,et al.  Risks of the Passport single signon protocol , 2000, Comput. Networks.

[62]  Helmut Bäumler,et al.  Datenschutz im Internet , 2000 .

[63]  R. G. Cummings,et al.  Unbiased Value Estimates for Environmental Goods: A Cheap Talk Design for the Contingent Valuation Method , 1999 .

[64]  Hal R. Varian,et al.  Information rules - a strategic guide to the network economy , 1999 .

[65]  B. Ratchford,et al.  Consumer information search revisited: Theory and empirical analysis , 1997 .

[66]  Paul E. Green,et al.  Modifying Cluster-Based Segments to Enhance Agreement with an Exogenous Response Variable , 1996 .

[67]  David B. Dunson,et al.  Bayesian Data Analysis , 2010 .

[68]  S. Auty Using Conjoint Analysis in Industrial Marketing The Role of Judgment , 1995 .

[69]  C. Shapiro,et al.  Systems Competition and Network Effects , 1994 .

[70]  Peter G. Neumann,et al.  Risks of passwords , 1994, CACM.

[71]  C. R. Cloninger,et al.  The temperament and character inventory (TCI) : a guide to its development and use , 1994 .

[72]  Richard G. Netemeyer,et al.  Price Perceptions and Consumer Shopping Behavior: A Field Study , 1993 .

[73]  P. Costa,et al.  Revised NEO Personality Inventory (NEO-PI-R) and NEO-Five-Factor Inventory (NEO-FFI) , 1992 .

[74]  Paul E. Green,et al.  Segmenting Markets with Conjoint Analysis , 1991 .

[75]  Yannis Bakos,et al.  Information Links and Electronic Marketplaces: The Role of Interorganizational Information Systems in Vertical Markets , 1991, J. Manag. Inf. Syst..

[76]  Ramesh Krishnamurti,et al.  Optimal product design using conjoint analysis: Computational complexity and algorithms , 1989 .

[77]  Terry L. Childers Assessment of the Psychometric Properties of an Opinion Leadership Scale , 1986 .

[78]  Christopher Podmore Information economics and policy: In the United States edited by Michael Rubin Libraries Unlimited, Littleton, CO 1983, 340 pp , 1984 .

[79]  Girish N. Punj,et al.  Cluster Analysis in Marketing Research: Review and Suggestions for Application , 1983 .

[80]  J. H. Ward Hierarchical Grouping to Optimize an Objective Function , 1963 .