Users’ willingness to pay for web identity management systems
暂无分享,去创建一个
Jan Muntermann | Jan Zibuschka | Heiko Rossnagel | Oliver Hinz | Jan Muntermann | O. Hinz | Heiko Rossnagel | Jan Zibuschka
[1] A. Culyer,et al. Discrete Choice Experiments , 2014 .
[2] Dominique Peyrat-Guillard,et al. Cultural and generational influences on privacy concerns: a qualitative study in seven European countries , 2014, Eur. J. Inf. Syst..
[3] Jianan Wu,et al. The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective , 2013, Eur. J. Inf. Syst..
[4] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[5] Edgar A. Whitley,et al. On technology neutral policies for e–identity: a critical reflection based on UK identity policy , 2013 .
[6] Sven Theysohn,et al. Willingness-to-pay estimation with choice-based conjoint analysis: Addressing extreme response behavior with individually adapted designs , 2012, Eur. J. Oper. Res..
[7] Jan Zibuschka,et al. On Some Conjectures in IT Security: The Case for Viable Security Solutions , 2012, Sicherheit.
[8] Tyler Moore,et al. Economic Tussles in Federated Identity Management , 2012, WEIS.
[9] Oliver Hinz,et al. Price Discrimination in E-Commerce? An Examination of Dynamic Pricing in Name-Your-Own Price Markets , 2011, MIS Q..
[10] Klaus Miller,et al. How Should Consumers’ Willingness to Pay be Measured? An Empirical Comparison of State-of-the-Art Approaches , 2011 .
[11] Bart van Delft,et al. A Security Analysis of OpenID , 2010, IDMAN.
[12] John K Kruschke,et al. Bayesian data analysis. , 2010, Wiley interdisciplinary reviews. Cognitive science.
[13] Jörg Schwenk,et al. Security Analysis of OpenID , 2010, Sicherheit.
[14] Jan Zibuschka,et al. Diffusion of Federated Identity Management , 2010, Sicherheit.
[15] Jörg Schwenk,et al. Risks of the CardSpace Protocol , 2009, ISC.
[16] Rohit Verma,et al. Issues in the use of ratings-based versus choice-based conjoint analysis in operations management research , 2009, Eur. J. Oper. Res..
[17] Klaus Miller,et al. How should we measure consumers' willingness to pay? An empirical comparison of State-of-the-Art approaches , 2009 .
[18] Gerrit Hornung,et al. Data protection in Germany I: The population census decision and the right to informational self-determination , 2009, Comput. Law Secur. Rev..
[19] Jakov Krolo,et al. Security of Web Level User Identity Management , 2009 .
[20] Edgar A. Whitley,et al. Doing the politics of technological decision making: due process and the debate about identity cards in the U.K. , 2008, Eur. J. Inf. Syst..
[21] Angela M. Dean,et al. The Construction of Optimal Stated Choice Experiments: Theory and Methods , 2008 .
[22] Rachna Dhamija,et al. The Seven Flaws of Identity Management: Usability and Security Challenges , 2008, IEEE Security & Privacy.
[23] Eve Maler,et al. The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.
[24] Alessandro Acquisti,et al. Identity Management, Privacy, and Price Discrimination , 2008, IEEE Security & Privacy.
[25] D. Boyd. Facebook's Privacy Trainwreck , 2008 .
[26] Christopher N. Chapman,et al. Quantitative Early-Phase User Research Methods: Hard Data for Initial Product Design , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[27] William P. Wagner,et al. Tools for Building Information Systems , 2007 .
[28] Sean W. Smith,et al. Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.
[29] D. Street,et al. The Construction of Optimal Stated Choice Experiments: Theory and Methods by STREET, D. J. and BURGESS, L. , 2007 .
[30] Deborah J. Street,et al. The Construction of Optimal Stated Choice Experiments , 2007 .
[31] Paul C. van Oorschot,et al. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer , 2007, Financial Cryptography.
[32] Elisa Bertino,et al. An integrated approach to federated identity and privilege management in open systems , 2007, CACM.
[33] Audun Jøsang,et al. Usability and Privacy in Identity Management Architectures , 2007, ACSW.
[34] Jan Zibuschka,et al. Implementing Strong Authentication Interoperability with Legacy Systems , 2007, IDMAN.
[35] Michael B. Jones,et al. Design Rationale behind the Identity Metasystem Architecture , 2007, ISSE.
[36] Munirpallam A. Venkataramanan,et al. Profitability in product line pricing and composition with manufacturing commonalities , 2006, Eur. J. Oper. Res..
[37] William L. Moore,et al. The no-choice option and dual response choice designs , 2006 .
[38] Drummond Reed,et al. OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.
[39] Milton L. Mueller,et al. Digital identity: How users value the attributes of online identifiers , 2006, Inf. Econ. Policy.
[40] Günther Pernul,et al. Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers , 2006, EC-Web.
[41] Heiko Rossnagel,et al. On Diffusion and Confusion - Why Electronic Signatures Have Failed , 2006, TrustBus.
[42] Günter Müller,et al. Privacy with Delegation of Rights by Identity Management , 2006, ETRICS.
[43] Stuart E. Schechter,et al. Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.
[44] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[45] Heiko Rossnagel,et al. Geschäftsmodelle für signaturgesetzkonforme Trust Center , 2005, Wirtschaftsinformatik.
[46] Rolf Oppliger,et al. Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..
[47] Victor Raskin,et al. The user non-acceptance paradigm: INFOSEC's dirty little secret , 2004, NSPW '04.
[48] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[49] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[50] Paul F. Syverson,et al. What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.
[51] David S. Evans. Some Empirical Aspects of Multi-sided Platform Industries , 2003 .
[52] James Backhouse,et al. Toward public-key infrastructure interoperability , 2003, CACM.
[53] S. Stashevsky,et al. Perceived risks as barriers to Internet and e‐commerce usage , 2002 .
[54] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[55] Jan De Clercq,et al. Single Sign-On Architectures , 2002, InfraSec.
[56] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[57] Martin Natter,et al. Real world performance of choice-based conjoint models , 2002, Eur. J. Oper. Res..
[58] J. M. Katz,et al. Optimal product design using conjoint analysis : Computational complexity and algorithms * , 2002 .
[59] Nick Feamster,et al. Dos and don'ts of client authentication on the web , 2001 .
[60] Hans-Georg Häusel. Der Umgang mit Geld und Gut in seiner Beziehung zum Alter , 2001 .
[61] Aviel D. Rubin,et al. Risks of the Passport single signon protocol , 2000, Comput. Networks.
[62] Helmut Bäumler,et al. Datenschutz im Internet , 2000 .
[63] R. G. Cummings,et al. Unbiased Value Estimates for Environmental Goods: A Cheap Talk Design for the Contingent Valuation Method , 1999 .
[64] Hal R. Varian,et al. Information rules - a strategic guide to the network economy , 1999 .
[65] B. Ratchford,et al. Consumer information search revisited: Theory and empirical analysis , 1997 .
[66] Paul E. Green,et al. Modifying Cluster-Based Segments to Enhance Agreement with an Exogenous Response Variable , 1996 .
[67] David B. Dunson,et al. Bayesian Data Analysis , 2010 .
[68] S. Auty. Using Conjoint Analysis in Industrial Marketing The Role of Judgment , 1995 .
[69] C. Shapiro,et al. Systems Competition and Network Effects , 1994 .
[70] Peter G. Neumann,et al. Risks of passwords , 1994, CACM.
[71] C. R. Cloninger,et al. The temperament and character inventory (TCI) : a guide to its development and use , 1994 .
[72] Richard G. Netemeyer,et al. Price Perceptions and Consumer Shopping Behavior: A Field Study , 1993 .
[73] P. Costa,et al. Revised NEO Personality Inventory (NEO-PI-R) and NEO-Five-Factor Inventory (NEO-FFI) , 1992 .
[74] Paul E. Green,et al. Segmenting Markets with Conjoint Analysis , 1991 .
[75] Yannis Bakos,et al. Information Links and Electronic Marketplaces: The Role of Interorganizational Information Systems in Vertical Markets , 1991, J. Manag. Inf. Syst..
[76] Ramesh Krishnamurti,et al. Optimal product design using conjoint analysis: Computational complexity and algorithms , 1989 .
[77] Terry L. Childers. Assessment of the Psychometric Properties of an Opinion Leadership Scale , 1986 .
[78] Christopher Podmore. Information economics and policy: In the United States edited by Michael Rubin Libraries Unlimited, Littleton, CO 1983, 340 pp , 1984 .
[79] Girish N. Punj,et al. Cluster Analysis in Marketing Research: Review and Suggestions for Application , 1983 .
[80] J. H. Ward. Hierarchical Grouping to Optimize an Objective Function , 1963 .