Emerging Technologies, Emerging Privacy Issues

[1]  B Warneke,et al.  Smart Dust 立方ミリメートル・コンピュータと通信する , 2001 .

[2]  Andrew S. Tanenbaum,et al.  RFID malware: truth vs. myth , 2006, IEEE Security & Privacy.

[3]  D. Harrison Charles J Vivek McKnight,et al.  Dispositional Trust And Distrust Distinctions in Predicting High- and Low-Risk Internet Expert Advice Site Perceptions , 2005 .

[4]  Alan S Wernick Data theft and state law. , 2006, Journal of AHIMA.

[5]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[6]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[7]  Claire Gauzente WEB MERCHANTS' PRIVACY AND SECURITY STATEMENTS: HOW REASSURING ARE THEY FOR CONSUMERS? A TWO-SIDED APPROACH , 2004 .

[8]  Tadayoshi Kohno,et al.  Devices That Tell On You: The Nike+iPod Sport Kit , 2006 .

[9]  H. Jeff Smith Information Privacy and its Management , 2004, MIS Q. Executive.

[10]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[11]  Lance J. Hoffman,et al.  Trust beyond security: an expanded trust model , 2006, CACM.

[12]  Dorothy E. Denning,et al.  HIDING CRIMES IN CYBERSPACE , 1999 .

[13]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[14]  John G. Lynch,et al.  Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces , 1997 .

[15]  A. Wall,et al.  Identifying the Links Between White-collar Crime and Terrorism , 2006 .

[16]  Matthew K. O. Lee,et al.  The asymmetric effect of web site attribute performance on web satisfaction: An empirical study , 2004 .

[17]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[18]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[19]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[20]  Diana C. Mutz Social Trust and E-Commerce Experimental Evidence for the Effects of Social Trust on Individuals’ Economic Behavior , 2005 .

[21]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[22]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[23]  Michael J. Gallivan,et al.  Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..

[24]  Stuart J. Barnes,et al.  Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..

[25]  John A. Pelesko Self assembly-promises and challenges , 2005, 2005 International Conference on MEMS,NANO and Smart Systems.

[26]  Karen D. Loch,et al.  Ethics and computer use , 1995, CACM.

[27]  William J. Kirsch,et al.  The protection of privacy and transborder flows of personal data: the work of the Council of Europe, the Organization for Economic Co-operation and Development and the European Economic Community , 1982, Legal Issues of Economic Integration.

[28]  Veda C. Storey,et al.  Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.

[29]  Bradford W. Parkinson,et al.  Global Positioning System , 1995 .

[30]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[31]  Gordon Bell,et al.  A personal digital store , 2001, CACM.

[32]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[33]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[34]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[35]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[36]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[37]  Peter P. Swire Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .

[38]  Aristides A. G. Requicha Nanorobots, NEMS, and nanoassembly , 2003 .

[39]  Srinivasan Seshan,et al.  IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..

[40]  Moez Limayem,et al.  A Critical Review of Online Consumer Behavior: Empirical Research , 2005, J. Electron. Commer. Organ..

[41]  D. Wyld Radio Frequency Identification , 2008 .

[42]  Stuart Dillon,et al.  Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..

[43]  Paul A. Karger,et al.  IBM Research Report Preventing Security and Privacy Attacks on Machine Readable Travel Documents (MRTDs) , 2005 .