The challenges of personal data markets and privacy
暂无分享,去创建一个
Alessandro Acquisti | Rainer Böhme | Kai Lung Hui | Sarah Spiekermann | Rainer Böhme | K. Hui | S. Spiekermann | Alessandro Acquisti
[1] D. Zwick,et al. Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing , 2004 .
[2] Benjamin E. Hermalin,et al. Privacy, property rights and efficiency: The economics of privacy as secrecy , 2006 .
[3] Tyler Moore,et al. Economics of Information Security and Privacy , 2014 .
[4] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[5] Alessandro Acquisti,et al. When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information , 2007, WEIS.
[6] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[7] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[8] Sumit Sarkar,et al. A Data Perturbation Approach to Privacy Protection in Data Mining , 2004, ICIS.
[9] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[10] E. J. Dommering. Property rights in personal data: A European perspective: proefschrift van mr. N. Purtova , 2012 .
[11] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[12] A. Acquisti. Privacy, Big Data, and the Public Good: The Economics and Behavioral Economics of Privacy , 2014 .
[13] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[14] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[15] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[16] Rainer Böhme,et al. Valuating Privacy with Option Pricing Theory , 2009, WEIS.
[17] Avi Goldfarb,et al. Online advertising, behavioral targeting, and privacy , 2011, Commun. ACM.
[18] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[19] Sarah Spiekermann,et al. A vision for global privacy bridges: Technical and legal measures for international data markets , 2015, Comput. Law Secur. Rev..
[20] Jeffrey Friedberg,et al. A metadata-based architecture for user-centered data accountability , 2015, Electron. Mark..
[21] George Danezis,et al. How Much Is Location Privacy Worth? , 2005, WEIS.
[22] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[23] Nadezhda Purtova. Property Rights in Personal Data. A European Perspective , 2011 .
[24] Alessandro Acquisti,et al. Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .
[25] B Rainer,et al. Privacy in Online Social Lending , 2010, AAAI 2010.
[26] Siani Pearson,et al. Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.
[27] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[28] Sumit Sarkar,et al. Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data , 2006, Inf. Syst. Res..
[29] Benjamin Thomsen,et al. Personal data: how context shapes consumers’ data sharing with organizations from various sectors , 2015, Electron. Mark..
[30] Curtis R. Taylor. Consumer Privacy and the Market for Customer Information , 2004 .
[31] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[32] Rainer Böhme,et al. Pricing strategies in electronic marketplaces with privacy-enhancing technologies , 2007, Wirtsch..
[33] Pamela Samuelson,et al. Privacy as intellectual property , 2000 .
[34] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[35] P. Schwartz. Property, Privacy, and Personal Data , 2004 .
[36] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[37] Lorrie Faith Cranor,et al. Web Privacy with P3p , 2002 .
[38] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[39] Michael E. Lesk. The Price of Privacy , 2012, IEEE Security & Privacy.
[40] Rafael Accorsi,et al. Personalization in privacy-aware highly dynamic systems , 2006, CACM.
[41] Thomas Hess,et al. Ökonomie der Privatsphäre , 2012, Datenschutz und Datensicherheit - DuD.
[42] H. Varian,et al. Conditioning Prices on Purchase History , 2005 .
[43] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[44] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[45] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[46] Alessandro Acquisti,et al. Empirical Analysis of Data Breach Litigation , 2013, WEIS.
[47] Dale A. Stirling,et al. Information rules , 2003, SGMD.
[48] Alessandro Acquisti,et al. Nudging Privacy: The Behavioral Economics of Personal Information , 2009, IEEE Security & Privacy.
[49] Joachim Henkel,et al. Welfare Implications of User Innovation , 2003 .
[50] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[51] Christine Bauer,et al. Psychology of Ownership and Asset Defense: Why People Value Their Personal Information Beyond Privacy , 2012, ICIS.
[52] A. Acquisti. The Economics of Personal Data and the Economics of Privacy , 2010 .
[53] Rainer Böhme,et al. Privacy in Online Social Lending , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.
[54] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[55] Larry Korba,et al. Applying digital rights management systems to privacy rights management , 2002, Comput. Secur..
[56] V. Stodden,et al. Privacy, Big Data, and the Public Good: Frameworks For Engagement , 2014 .
[57] R. Coase,et al. The Problem of Social Cost , 1960, The Journal of Law and Economics.
[58] Sumit Sarkar,et al. Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns , 2005, Inf. Syst. Res..
[59] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[60] S. Stringer. Economic Analysis , 2002, The Laryngoscope.
[61] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[62] G. Dangelmayer. Economic Analysis , 2020, Economic Analysis.
[63] Jessica Litman,et al. Information Privacy/Information Property , 2000 .