Online privacy and informed consent: The dilemma of information asymmetry
暂无分享,去创建一个
Masooda Bashir | Jay P. Kesan | Masooda N. Bashir | Carol Hayes | April Lambert | J. Kesan | Carol Hayes | April Lambert | C. Hayes
[1] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[2] Robert P. Bartlett,et al. Blind Consent? A Social Psychological Investigation of Non-Readership of Click-Through Agreements , 2011, Law and human behavior.
[3] Thea van der Geest,et al. Informed Consent to Address Trust, Control, and Privacy Concerns in User Profiling , 2005 .
[4] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[5] Jay P. Kesan,et al. A Comprehensive Empirical Study of Data Privacy, Trust, and Consumer Autonomy , 2015 .
[6] Yannis Bakos,et al. Does Anyone Read the Fine Print? Testing a Law and Economics Approach to Standard Form Contracts , 2009 .
[7] Jay P. Kesan,et al. Information Privacy and Data Control in Cloud Computing: Consumers, Privacy Preferences, and Market Efficiency , 2012 .
[8] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[9] Kellyton dos Santos Brito,et al. How people care about their personal data released on social media , 2013, PST.
[10] George S. Day,et al. Consumer Research and the Evaluation of Information Disclosure Requirements: The Case of Truth in Lending , 1974 .
[11] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[12] Ira S. Rubinstein,et al. Privacy and Security in the Cloud: Some Realism About Technical Solutions to Transnational Surveillance in the Post-Snowden Era , 2014 .
[13] Aleecia M. McDonald,et al. The Cost of Reading Privacy Policies , 2009 .
[14] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[15] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[16] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[17] Robert Gellman,et al. Fair Information Practices: A Basic History - Version 2.20 , 2017 .
[18] Yang Wang,et al. What matters to users?: factors that affect users' willingness to share information with online advertisers , 2013, SOUPS.
[19] Monika Taddicken,et al. The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..
[20] Marit Hansen,et al. Privacy Policy Icons , 2011, Privacy and Identity Management for Life.
[21] Jay P. Kesan,et al. Knowledge-based Individualized Privacy Plans ( KIPPs ) : A Potential Tool to Improve the Effectiveness of Privacy Notices By : , 2014 .
[22] Deirdre K. Mulligan,et al. Stopping spyware at the gate: a user study of privacy, notice and spyware , 2005, SOUPS '05.
[23] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[24] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[25] J. Reeve,et al. Solutions to problematic polypharmacy: learning from the expertise of patients. , 2015, The British journal of general practice : the journal of the Royal College of General Practitioners.