RFID, privacy and the perception of risk: A strategic framework
暂无分享,去创建一个
[1] Mark Cenite. Code and Other Laws of Cyberspace , 2000 .
[2] Ortwin Renn. Strategies of risk communication: Observations from two participatory experiments , 1991 .
[3] S. Shapiro. The Social Control of Impersonal Trust , 1987, American Journal of Sociology.
[4] Ray Kurzweil,et al. Kurzweil vs. Dertouzos , 2001 .
[5] Roger E. Kasperson,et al. Communicating Risks to the Public , 1991 .
[6] J. H. Davis,et al. An integrative model of organizational trust, Academy of Management Review, : . , 1995 .
[7] Bruce Eckfeldt,et al. What does RFID do for the consumer? , 2005, CACM.
[8] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[9] The Social Amplification of Risk: Searching for the public policy relevance of the risk amplification framework , 2003 .
[10] Ari Juels,et al. RFID PRIVACY : A TECHNICAL PRIMER FOR THE NON-TECHNICAL READER , 2005 .
[11] Ian Byfield,et al. Developments in RFID , 1996 .
[12] Rodger Jamieson,et al. Integrating trust and risk perceptions in business-to-consumer electronic commerce with the technology acceptance model , 2003, ECIS.
[13] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[14] Raktim Pal,et al. Auto-ID: managing anything, anywhere, anytime in the supply chain , 2005, CACM.
[15] Mare Langheinrich,et al. Personal privacy in ubiquitous computing: Tools and system support , 2005 .
[16] V. Venkatesh,et al. AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .
[17] Matthew W. Seeger,et al. Public relations and crisis communication: Organizing and chaos , 2001 .
[18] C. Slade. Privacy and regulation , 1997 .
[19] Paul Slovic,et al. Risk, Media, and Stigma at Rocky Flats , 1998 .
[20] Viswanath Venkatesh,et al. Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation , 1999, MIS Q..
[21] Daniel J. Solove,et al. Information Privacy Law , 2003 .
[22] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[23] June Lu,et al. Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology , 2005, J. Strateg. Inf. Syst..
[24] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[25] Ritu Agarwal,et al. Are Individual Differences Germane to the Acceptance of New Information Technologies , 1999 .
[26] Ortwin Renn,et al. Credibility and trust in risk communication , 1991 .
[27] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[28] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[29] Fred D. Davis,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .
[30] R. Harding. Environmental decision-making : the roles of scientists, engineers, and the public , 1998 .
[31] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[32] David Gefen,et al. The conceptualization of trust, risk and their electronic commerce: the need for clarifications , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[33] E. Elliott. Risk and Culture: An Essay on the Selection of Technical and Environmental Dangers , 1983 .
[34] Katherine Albrecht,et al. Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .
[35] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[36] R. Spinello. Privacy Rights in the Information Economy , 1998 .
[37] Graham Murdock,et al. The Social Amplification of Risk: After amplification: rethinking the role of the media in risk communication , 2003 .
[38] R. Lewicki,et al. Trust in relationships: A model of development and decline. , 1995 .
[39] W. Atkinson. Tagged: the risks and rewards of RFID technology , 2004 .
[40] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[41] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[42] Peter P. Swire. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .
[43] Sandra J. Milberg,et al. Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe , 2001 .
[44] P. Pavlou. INTEGRATING TRUST IN ELECTRONIC COMMERCE WITH THE TECHNOLOGY ACCEPTANCE MODEL: MODEL DEVELOPMENT AND VALIDATION , 2001 .
[45] Ritu Agarwal,et al. A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..
[46] VenkateshViswanath. Determinants of Perceived Ease of Use , 2000 .
[47] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[48] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[49] Katherine J. Strandburg,et al. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .
[50] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[51] P. A. Dabholkar. Consumer evaluations of new technology-based self-service options: An investigation of alternative models of service quality , 1996 .
[52] P. Lesly. Public relations handbook. , 1981, Journal of the American Medical Record Association.
[53] Nadia Caidi,et al. How much is too little? Privacy and smart cards in Hong Kong and Ontario , 2005, J. Inf. Sci..
[54] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[55] Arthur Jones,et al. Trust and Crime in Information Societies , 2006 .
[56] Marc Langheinrich,et al. Personal Privacy in Ubiquitous Computing , 2005 .
[57] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[58] B. Fischhoff,et al. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .
[59] R. Kasperson. The social amplification of risk: progress in developing an integrative framework of risk’, in S. , 1992 .
[60] S. Krimsky,et al. Social Theories of Risk , 1992 .
[61] Paul Slovic,et al. Perception of risk: Reflections on the psychometric paradigm , 1992 .
[62] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[63] George Roussos,et al. Building Consumer Trust in Pervasive Retail , 2004 .
[64] Theo Vurdubakis,et al. Chasing Shadows: Control, Virtuality and the Production of Trust , 2001 .
[65] P Slovic,et al. Perceived Risk, Trust, and the Politics of Nuclear Waste , 1991, Science.
[66] K. E. Jones. BSE, risk and the communication of uncertainty: a review of Lord Phillips' report from the BSE inquiry (UK). , 2001, Canadian journal of sociology = Cahiers canadiens de sociologie.
[67] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[68] Baruch Fischhoff,et al. Facts and Fears: Societal Perception of Risk , 1981 .
[69] Norman L. Chervany,et al. Conceptualizing trust: a typology and e-commerce customer relationships model , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[70] R. Kasperson,et al. The Social Amplification of Risk , 2003 .
[71] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[72] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[73] Richard,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace , 2022 .
[74] Ing-Long Wu,et al. An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study , 2005, Int. J. Hum. Comput. Stud..
[75] George Gaskell,et al. Perceptions of risk in cyber space , 2004 .
[76] Roy Want,et al. The Magic of RFID , 2004, ACM Queue.
[77] TractinskyNoam,et al. Consumer trust in an Internet store , 2000 .
[78] Mojca Drevenšek. Negotiation as the Driving Force of Environmental Citizenship , 2005 .
[79] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[80] Günter Karjoth,et al. Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.
[81] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[82] Young-Gul Kim,et al. Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..