Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences
暂无分享,去创建一个
Allison Woodruff | Alessandro Acquisti | Vasyl Pihur | Sunny Consolvo | Lauren Schmidt | Laura Brandimarte | A. Acquisti | Sunny Consolvo | L. Brandimarte | Allison Woodruff | Vasyl Pihur | Lauren Schmidt
[1] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[2] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[3] Dean S. Karlan,et al. Tying Odysseus to the Mast: Evidence from a Commitment Savings Product in the Philippines , 2005 .
[4] J. Shaffer. Multiple Hypothesis Testing , 1995 .
[5] S. Gosling,et al. A very brief measure of the Big-Five personality domains , 2003 .
[6] Lorrie Faith Cranor,et al. Improving Computer Security Dialogs , 2011, INTERACT.
[7] Joseph Turow,et al. Americans Online Privacy: The System Is Broken , 2003 .
[8] Martin Ortlieb,et al. A Comparison of Six Sample Providers Regarding Online Privacy Benchmarks , 2014 .
[9] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[10] Brian A. Nosek,et al. Liberals and conservatives rely on different sets of moral foundations. , 2009, Journal of personality and social psychology.
[11] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[12] Adam N. Joinson,et al. Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..
[13] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[14] T. Rajaretnam,et al. Statistics for social sciences , 2016 .
[15] Adam N. Joinson,et al. Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..
[16] S. Frederick. Journal of Economic Perspectives—Volume 19, Number 4—Fall 2005—Pages 25–42 Cognitive Reflection and Decision Making , 2022 .
[17] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[18] J. Turow,et al. Open to Exploitation: America's Shoppers Online and Offline , 2005 .
[19] Arthur D. Fisk,et al. Privacy and technology: folk definitions and perspectives , 2008, CHI Extended Abstracts.
[20] M. Johnston,et al. Measures in Health Psychology: A User's Portfolio , 1995 .
[21] M. Angela Sasse,et al. Privacy is a process, not a PET: a theory for effective privacy practice , 2012, NSPW '12.
[22] Jennifer King,et al. A Supermajority of Californians Supports Limits on Law Enforcement Access to Cell Phone Location Information , 2008 .
[23] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[24] Su Li,et al. Mobile Phones and Privacy , 2012 .
[25] S. Stanley Young,et al. Deming, data and observational studies , 2011 .
[26] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[27] Tomasz Zaleskiewicz,et al. Beyond risk seeking and risk aversion: personality and the dual nature of economic risk taking , 2001 .
[28] D. Bates,et al. Linear Mixed-Effects Models using 'Eigen' and S4 , 2015 .
[29] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[30] Konstantin Beznosov,et al. Does my password go up to eleven?: the impact of password meters on password selection , 2013, CHI.
[31] Sören Preibusch,et al. Guide to measuring privacy concern: Review of survey and observational instruments , 2013, Int. J. Hum. Comput. Stud..
[32] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[33] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[34] Brian C. Grams. Privacy Concerns and Personality Traits Influencing Online Behavior: A Structural Model , 2005 .
[35] M. Angela Sasse,et al. "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure , 2013, TRUST.
[36] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[37] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[38] Susan Landau,et al. Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.
[39] Mario Callegaro,et al. Online Panel Research: A Data Quality Perspective , 2014 .
[40] Jr. A. P. Mac Donald,et al. Revised Scale for Ambiguity Tolerance: Reliability and Validity , 1970 .