Factors Influencing User's Attitude to Secondary Information Sharing and Usage
暂无分享,去创建一个
[1] Alfred Kobsa,et al. Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems , 2013, TIIS.
[2] James Dean Brown,et al. Choosing the Right Type of Rotation in PCA and EFA , 2009 .
[3] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[4] Anthony Jameson,et al. User Modeling and User-Adapted Interaction , 2004, User Modeling and User-Adapted Interaction.
[5] Lorrie Faith Cranor,et al. Timing is everything?: the effects of timing and placement of online privacy indicators , 2009, CHI.
[6] Stefan Poslad,et al. Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .
[7] H. E. Tinsley,et al. Uses of factor analysis in counseling psychology research. , 1987 .
[8] Rudolf R. Sinkovics,et al. The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .
[9] Michael D. Buhrmester,et al. Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.
[10] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[11] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[12] Julita Vassileva,et al. Modeling the efficacy of persuasive strategies for different gamer types in serious games for health , 2014, User Modeling and User-Adapted Interaction.
[13] Olli Pitkänen,et al. Users' Awareness of Privacy on Online Social Networking Sites - Case Facebook , 2009, Bled eConference.
[14] Julita Vassileva,et al. Multi-Agent Multi-User Modeling in I-Help , 2003, User Modeling and User-Adapted Interaction.
[15] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .
[16] G. Loewenstein,et al. Misplaced Confidences: Privacy and the Control Paradox. , 2010 .
[17] Alfred Kobsa,et al. Helping users with information disclosure decisions: potential for adaptation , 2013, IUI '13.
[18] Mary Madden and Aaron Smith,et al. Reputation Management and Social Media , 2010 .
[19] Julita Vassileva,et al. A Decentralized Architecture for Sharing and Reusing Lifelogs , 2013, UMAP Workshops.
[20] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[21] Julita Vassileva,et al. A Framework for Privacy-Aware User Data Trading , 2013, UMAP.
[22] Nicola Henze,et al. Linkage, aggregation, alignment and enrichment of public user profiles with Mypes , 2010, I-SEMANTICS '10.
[23] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[24] Ashwin Machanavajjhala,et al. Defining and Enforcing Privacy in Data Sharing , 2008 .
[25] John Michael Pearson,et al. An Exploratory Examination of Antecedents to Software Piracy: A Cross-Cultural Comparison , 2012, 2012 45th Hawaii International Conference on System Sciences.
[26] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[27] Alessandro Acquisti,et al. 1 What is privacy worth ? , 2009 .
[28] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[29] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[30] Siddharth Suri,et al. Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.
[31] Yang Wang,et al. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.
[32] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[33] E. Kupek,et al. Beyond logistic regression: structural equations modelling for binary variables and its application to investigating unobserved confounders , 2006, BMC medical research methodology.
[34] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[35] Bernardo A. Huberman,et al. A Market for Unbiased Private Data: Paying Individuals According to Their Privacy Attitudes , 2012, First Monday.
[36] Omer Tene Jules Polonetsky,et al. Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .
[38] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[39] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[40] S. Holm. A Simple Sequentially Rejective Multiple Test Procedure , 1979 .
[41] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[42] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[43] Boris Brandherm,et al. Decentralized User Modeling with UserML and GUMO , 2005 .
[44] George Danezis,et al. A study on the value of location privacy , 2006, WPES '06.
[45] Seng Wai Loke,et al. Context-aware pervasive systems - architectures for a new breed of applications , 2019 .
[46] R. Thaler. Toward a positive theory of consumer choice , 1980 .
[47] Jeffrey Heer,et al. Crowdsourcing graphical perception: using mechanical turk to assess visualization design , 2010, CHI.
[48] L. Carvajal,et al. IEEE Transactions on Software Engineering , 2016 .