Information Privacy Protection Practices in Africa: A Review through the Lens of Critical Social Theory
暂无分享,去创建一个
[1] Alfred Kobsa,et al. Personalized hypermedia and international privacy , 2002, CACM.
[2] F. Cate. The Failure of Fair Information Practice Principles , 2006 .
[3] Jae-Hyeon Ahn,et al. Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection , 2011, MIS Q..
[4] Lorrie Faith Cranor,et al. Platform for Privacy Preferences - P3P , 2000, Datenschutz und Datensicherheit.
[5] J. Britz,et al. Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa , 2007 .
[6] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[7] M. Chinn,et al. ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration , 2006, SSRN Electronic Journal.
[8] J. Winn. Consumer protection in the age of the 'information economy' , 2006 .
[9] France Bélanger,et al. Social Networks and Information Privacy: A Model for Low-income Countries , 2013, AMCIS.
[10] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[11] Cheryl Brown,et al. An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites , 2013 .
[12] Veda C. Storey,et al. Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.
[13] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[14] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[15] Samuel E. Trosow. A Holistic Model of Information Policy , 2010 .
[16] Ya-Ching Lee. Will self-regulation work in protecting online privacy? , 2003, Online Inf. Rev..
[17] France Bélanger,et al. A framework for e-government: privacy implications , 2006, Bus. Process. Manag. J..
[18] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[19] Alex B. Makulilo. Privacy and data protection in Africa: a state of the art , 2012 .
[20] Yves Poullet,et al. EU data protection policy. The Directive 95/46/EC: Ten years after , 2006, Comput. Law Secur. Rev..
[21] D. Cecez-Kecmanovic. Basic Assumptions of the Critical Research Perspectives in Information Systems , 2005 .
[22] Seda F. Gürses. Can you engineer privacy? , 2014, CACM.
[23] Christian Fuchs,et al. Africa and the digital divide , 2008, Telematics Informatics.
[24] Graham Greenleaf. Five Years of the Apec Privacy Framework: Failure or Promise? , 2009, Comput. Law Secur. Rev..
[25] Tomaz Klobucar,et al. Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.
[26] Gehan Gunasekara. The 'final' privacy frontier? Regulating trans-border data flows , 2007, Int. J. Law Inf. Technol..
[27] Thomas Allmer,et al. A critical contribution to theoretical foundations of privacy studies , 2011, J. Inf. Commun. Ethics Soc..
[28] Anneliese Roos. Personal Data Protection in New Zealand: Lessons for South Africa? , 2008 .
[29] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[30] Michael D Birnhack,et al. The EU Data Protection Directive: An engine of a global regime , 2008, Comput. Law Secur. Rev..
[31] Hilde A. M. Voorveld,et al. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe , 2014, Comput. Hum. Behav..
[32] Karol I. Pelc. Diffusion of Innovation in Social Networking , 2017 .
[33] Banji Oyelaran-Oyeyinka,et al. Internet diffusion in sub-Saharan Africa: A cross-country analysis , 2005 .
[34] Lewis Auerbach,et al. Privacy and Canadian telecommunications regulation , 1983 .
[35] Veda C. Storey,et al. Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? , 2006, Inf. Manag..
[36] Bruce Robinson,et al. The mysterious case of the missing paradigm: a review of critical information systems research 1991–2001 , 2007, Inf. Syst. J..
[37] K. Malik,et al. Human Development Report 2013. The Rise of the South: Human Progress in a Diverse World , 2013 .
[38] Michael D. Myers,et al. A Set of Principles for Conducting Critical Research in Information Systems , 2011, MIS Q..
[39] Michael Santer. A model to describe the adoption of mobile internet in Sub-Saharan Africa , 2013 .
[40] Shirin Elahi. Privacy and consent in the digital era , 2009, Inf. Secur. Tech. Rep..
[41] Anne Layne-Farrar,et al. The Benefits and Costs of Online Privacy Legislation , 2001 .
[42] Gabriela Kennedy,et al. Data protection in the Asia-Pacific region , 2009, Comput. Law Secur. Rev..
[43] Making the most of Africa’s commodities: industrializing for growth, jobs and economic transformation* , 2014 .
[44] A. Molla. Downloading or uploading? The information economy and Africa's current status , 2000 .
[45] Ingo Take,et al. Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS , 2012 .
[46] W. Hofkirchner. A Critical Social Systems View of the Internet , 2007 .