Emerging Technologies, Emerging Privacy Issues
暂无分享,去创建一个
[1] B Warneke,et al. Smart Dust 立方ミリメートル・コンピュータと通信する , 2001 .
[2] Andrew S. Tanenbaum,et al. RFID malware: truth vs. myth , 2006, IEEE Security & Privacy.
[3] D. Harrison Charles J Vivek McKnight,et al. Dispositional Trust And Distrust Distinctions in Predicting High- and Low-Risk Internet Expert Advice Site Perceptions , 2005 .
[4] Alan S Wernick. Data theft and state law. , 2006, Journal of AHIMA.
[5] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[6] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[7] Claire Gauzente. WEB MERCHANTS' PRIVACY AND SECURITY STATEMENTS: HOW REASSURING ARE THEY FOR CONSUMERS? A TWO-SIDED APPROACH , 2004 .
[8] Tadayoshi Kohno,et al. Devices That Tell On You: The Nike+iPod Sport Kit , 2006 .
[9] H. Jeff Smith. Information Privacy and its Management , 2004, MIS Q. Executive.
[10] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[11] Lance J. Hoffman,et al. Trust beyond security: an expanded trust model , 2006, CACM.
[12] Dorothy E. Denning,et al. HIDING CRIMES IN CYBERSPACE , 1999 .
[13] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[14] John G. Lynch,et al. Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces , 1997 .
[15] A. Wall,et al. Identifying the Links Between White-collar Crime and Terrorism , 2006 .
[16] Matthew K. O. Lee,et al. The asymmetric effect of web site attribute performance on web satisfaction: An empirical study , 2004 .
[17] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[18] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[19] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[20] Diana C. Mutz. Social Trust and E-Commerce Experimental Evidence for the Effects of Social Trust on Individuals’ Economic Behavior , 2005 .
[21] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[22] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[23] Michael J. Gallivan,et al. Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..
[24] Stuart J. Barnes,et al. Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..
[25] John A. Pelesko. Self assembly-promises and challenges , 2005, 2005 International Conference on MEMS,NANO and Smart Systems.
[26] Karen D. Loch,et al. Ethics and computer use , 1995, CACM.
[27] William J. Kirsch,et al. The protection of privacy and transborder flows of personal data: the work of the Council of Europe, the Organization for Economic Co-operation and Development and the European Economic Community , 1982, Legal Issues of Economic Integration.
[28] Veda C. Storey,et al. Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.
[29] Bradford W. Parkinson,et al. Global Positioning System , 1995 .
[30] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[31] Gordon Bell,et al. A personal digital store , 2001, CACM.
[32] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[33] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[34] Gabor Karsai,et al. Smart Dust: communicating with a cubic-millimeter computer , 2001 .
[35] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[36] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[37] Peter P. Swire. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .
[38] Aristides A. G. Requicha. Nanorobots, NEMS, and nanoassembly , 2003 .
[39] Srinivasan Seshan,et al. IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..
[40] Moez Limayem,et al. A Critical Review of Online Consumer Behavior: Empirical Research , 2005, J. Electron. Commer. Organ..
[41] D. Wyld. Radio Frequency Identification , 2008 .
[42] Stuart Dillon,et al. Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..
[43] Paul A. Karger,et al. IBM Research Report Preventing Security and Privacy Attacks on Machine Readable Travel Documents (MRTDs) , 2005 .