Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing
暂无分享,去创建一个
[1] Gediminas Adomavicius,et al. Business Computing , 2009 .
[2] Paul R. Daugherty,et al. HUMAN + MACHINE: REIMAGINING WORK IN THE AGE OF AI , 2020 .
[3] Scott W. Duxbury,et al. Criminal network security: An agent‐based approach to evaluating network resilience* , 2019, Criminology.
[4] Dhruv Grewal,et al. Service Robots Rising: How Humanoid Robots Influence Service Experiences and Elicit Compensatory Consumer Responses , 2019, Journal of Marketing Research.
[5] Kartik Hosanagar. A Human's Guide to Machine Intelligence: How Algorithms Are Shaping Our Lives and How We Can Stay in Control , 2019 .
[6] Evan Selinger,et al. Robot Eyes Wide Shut: Understanding Dishonest Anthropomorphism , 2019, FAT.
[7] Hsinchun Chen,et al. DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics , 2019, MIS Q..
[8] Alessandro Acquisti,et al. Choice Architecture, Framing, and Cascaded Privacy Choices , 2018, Manag. Sci..
[9] Kai Lung Hui,et al. See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums , 2019, MIS Q..
[10] Isak Ladegaard. Crime displacement in digital drug markets. , 2019, The International journal on drug policy.
[11] Robert W. Palmatier,et al. Creating Effective Online Customer Experiences , 2018, Journal of Marketing.
[12] P. Brandtzæg,et al. Chatbots , 2018, Interactions.
[13] Theo Araujo,et al. Living up to the chatbot hype: The influence of anthropomorphic design cues and communicative agency framing on conversational agent and company perceptions , 2018, Comput. Hum. Behav..
[14] Sveinung Sandberg,et al. Coordination problems in cryptomarkets: Changes in cooperation, competition and valuation , 2018 .
[15] Pradeep Chintagunta,et al. Personalization in Email Marketing: The Role of Noninformative Advertising Content , 2018, Mark. Sci..
[16] Eric Jardine,et al. Tor, what is it good for? Political repression and the use of online anonymity-granting technologies , 2018, New Media Soc..
[17] Harry Shum,et al. From Eliza to XiaoIce: challenges and opportunities with social chatbots , 2018, Frontiers of Information Technology & Electronic Engineering.
[18] Asbjørn Følstad,et al. Why People Use Chatbots , 2017, INSCI.
[19] Arne De Keyser,et al. “Service Encounter 2.0”: an investigation into the roles of technology, employees and customers , 2017 .
[20] Jeanna Neefe Matthews,et al. Toward algorithmic transparency and accountability , 2017, Commun. ACM.
[21] Ingrid Poncin,et al. Animated conversational agents and e-consumer productivity: The roles of agents and individual characteristics , 2017, Inf. Manag..
[22] R. Rust,et al. Technology-driven service strategy , 2017 .
[23] D. Stewart. A comment on privacy , 2017 .
[24] Kelly D. Martin,et al. The role of data privacy in marketing , 2016, Journal of the Academy of Marketing Science.
[25] Amy L. Ostrom,et al. Domo Arigato Mr. Roboto , 2017 .
[26] Alexander Maedche,et al. Towards Designing Cooperative and Social Conversational Agents for Customer Service , 2017, ICIS.
[27] Bart P. Knijnenburg,et al. Inferring Capabilities of Intelligent Agents from Their External Traits , 2016, ACM Trans. Interact. Intell. Syst..
[28] Cait Lamberton,et al. A Thematic Exploration of Digital, Social Media, and Mobile Marketing: Research Evolution from 2000 to 2015 and an Agenda for Future Inquiry , 2016 .
[29] Zhiyuan Liu,et al. Neural Sentiment Classification with User and Product Attention , 2016, EMNLP.
[30] Gina Neff,et al. Talking to Bots: Symbiotic Agency and the Case of Tay , 2016 .
[31] Kannan Balakrishnan,et al. Implementation of an inquisitive chatbot for database supported knowledge bases , 2016 .
[32] Jay F. Nunamaker,et al. Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System , 2016, J. Manag. Inf. Syst..
[33] Raimondo Bruno,et al. Characterising dark net marketplace purchasers in a sample of regular psychostimulant users. , 2016, The International journal on drug policy.
[34] Monica J Barratt,et al. Safer scoring? Cryptomarkets, social supply and drug market violence. , 2016, The International journal on drug policy.
[35] M. Barratt,et al. Results of an international drug testing service for cryptomarket users. , 2016, The International journal on drug policy.
[36] Diyi Yang,et al. Hierarchical Attention Networks for Document Classification , 2016, NAACL.
[37] Rebecca Walker Reczek,et al. An Audience of One: Behaviorally Targeted Ads as Implied Social Labels , 2016 .
[38] J. Rowley. Building customer relationships , 2016 .
[39] David Griol,et al. The Conversational Interface: Talking to Smart Devices , 2016 .
[40] Michael Trusov,et al. Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting , 2016, Mark. Sci..
[41] Martin Wetzels,et al. The personalization-privacy paradox: implications for new media , 2016 .
[42] T. Holt,et al. Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets , 2016 .
[43] Lexing Xie,et al. SentiCap: Generating Image Descriptions with Sentiments , 2015, AAAI.
[44] Michel Wedel,et al. Adaptive personalization using social networks , 2015, Journal of the Academy of Marketing Science.
[45] Chayan Chakrabarti,et al. Artificial conversations for customer service chatter bots: Architecture, algorithms, and evaluation metrics , 2015, Expert Syst. Appl..
[46] Elgar Fleisch,et al. Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..
[47] Maik Eisenbeiss,et al. The Importance of Trust for Personalized Online Advertising , 2015 .
[48] Mohammed Slim Ben Mimoun,et al. A valued agent: How ECAs affect website customers' satisfaction and behaviors , 2015 .
[49] Paul Jen-Hwa Hu,et al. Role of Affect in Self-Disclosure on Social Network Websites: A Test of Two Competing Models , 2015, J. Manag. Inf. Syst..
[50] Elena Karahanna,et al. Online Recommendation Systems in a B2C E-Commerce Context: A Review and Future Directions , 2015, J. Assoc. Inf. Syst..
[51] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[52] Sumit Sarkar,et al. Selling vs. Profiling: Optimizing the Offer Set in Web-Based Personalization , 2014, Inf. Syst. Res..
[53] Tibert Verhagen,et al. Virtual Customer Service Agents: Using Social Presence and Personalization to Shape Online Service Encounters , 2014, J. Comput. Mediat. Commun..
[54] Jan H. Schumann,et al. Targeted Online Advertising: Using Reciprocity Appeals to Increase Acceptance among Users of Free Web Services , 2014 .
[55] Justin Scott Giboney,et al. Facilitating Natural Conversational Agent Interactions: Lessons from a Deception Experiment , 2014, ICIS.
[56] Robert F. Bordley,et al. Morphing Banner Advertising , 2014, Mark. Sci..
[57] Matthew Crosby,et al. Association for the Advancement of Artificial Intelligence , 2014 .
[58] P Pafko,et al. [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.
[59] Catherine E. Tucker,et al. When Does Retargeting Work? Information Specificity in Online Advertising , 2013 .
[60] Jamil Bojei,et al. The empirical link between relationship marketing tools and consumer retention in retail marketing , 2013 .
[61] Aaron C. Elkins,et al. The Sound of Trust: Voice as a Measurement of Trust During Interactions with Embodied Conversational Agents , 2013 .
[62] Mohammed Slim Ben Mimoun,et al. Case study—Embodied virtual agents: An analysis on reasons for failure , 2012 .
[63] Juan E. Gilbert,et al. Virtual agents in retail web sites: Benefits of simulated social interaction for older users , 2012, Comput. Hum. Behav..
[64] Erik Brynjolfsson,et al. Big data: the management revolution. , 2012, Harvard business review.
[65] Karl F. MacDorman,et al. The Uncanny Valley [From the Field] , 2012, IEEE Robotics Autom. Mag..
[66] Beibei Li,et al. Designing Ranking Systems for Hotels on Travel Search Engines by Mining User-Generated and Crowd-Sourced Content , 2011, Mark. Sci..
[67] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[68] Ritu Agarwal,et al. The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..
[69] Rathindra Sarathy,et al. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..
[70] Ronald T. Cenfetelli,et al. The Adoption of Online Shopping Assistants: Perceived Similarity as an Antecedent to Evaluative Beliefs , 2011, J. Assoc. Inf. Syst..
[71] Gokhan Tur,et al. Spoken Language Understanding: Systems for Extracting Semantic Information from Speech , 2011 .
[72] Gokhan Tur,et al. Intent Determination and Spoken Utterance Classification , 2011 .
[73] B. Edvardsson,et al. Expanding understanding of service exchange and value co-creation: a social construction approach , 2011 .
[74] Sherry Turkle,et al. Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .
[75] Zhongfu Wu,et al. Personalisation in web computing and informatics: Theories, techniques, applications, and future research , 2010, Inf. Syst. Frontiers.
[76] Rahul Telang,et al. Converting Pirates Without Cannibalizing Purchasers: The Impact of Digital Distribution on Physical Sales and Internet Piracy , 2010, Mark. Sci..
[77] Ofer Arazy,et al. A Theory-Driven Design Framework for Social Recommender Systems , 2010, J. Assoc. Inf. Syst..
[78] Rajiv K. Sinha,et al. Don't Think Twice, It's All Right: Music Piracy and Pricing in a DRM-Free Environment , 2010 .
[79] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[80] Izak Benbasat,et al. Evaluating Anthropomorphic Product Recommendation Agents: A Social Relationship Perspective to Designing Information Systems , 2009, J. Manag. Inf. Syst..
[81] Sanjay Jain,et al. Digital Piracy: A Competitive Analysis , 2008, Mark. Sci..
[82] Kai Lung Hui,et al. Consumer Privacy and Marketing Avoidance: A Static Model , 2008, Manag. Sci..
[83] Yogesh V. Joshi,et al. Putting one-to-one marketing to work: Personalization, customization, and choice , 2008 .
[84] Izak Benbasat,et al. Attributions of Trust in Decision Support Technologies: A Study of Recommendation Agents for E-Commerce , 2008, J. Manag. Inf. Syst..
[85] Rajiv K. Sinha,et al. Preventing Digital Music Piracy: The Carrot or the Stick? , 2008 .
[86] Gediminas Adomavicius,et al. Personalization and Recommender Systems , 2008 .
[87] P. Aggarwal,et al. Is That Car Smiling at Me? Schema Congruity as a Basis for Evaluating Anthropomorphized Products , 2007 .
[88] Stephen J. Cox,et al. Analysis of User Interaction with Service Oriented Chatbot Systems , 2007, HCI.
[89] Heloir,et al. The Uncanny Valley , 2019, The Animation Studies Reader.
[90] Gediminas Adomavicius,et al. Personalization technologies: A process-oriented perspective , 2006, Wirtschaftsinf..
[91] Shuk Ying Ho,et al. Understanding the Impact of Web Personalization on User Information Processing and Decision Outcomes , 2006, MIS Q..
[92] Izak Benbasat,et al. Research Note: The Influence of Recommendations and Consumer Reviews on Evaluations of Websites , 2006, Inf. Syst. Res..
[93] Izak Benbasat,et al. The Role of Design Characteristics in Shaping Perceptions of Similarity: The Case of Online Shopping Assistants , 2006, J. Assoc. Inf. Syst..
[94] Colin J. Bennett,et al. The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .
[95] Kathleen S. Hartzel,et al. Exploring the privacy implications of addressable advertising and viewer profiling , 2006, CACM.
[96] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[97] Heather H. Mitchell,et al. Social Cues in Animated Conversational Agents , 2005 .
[98] Gediminas Adomavicius,et al. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.
[99] Kannan Srinivasan,et al. Modeling Online Browsing and Path Analysis Using Clickstream Data , 2004 .
[100] Heikki Mannila,et al. Discovery of Frequent Episodes in Event Sequences , 1997, Data Mining and Knowledge Discovery.
[101] P. Chatterjee,et al. Modeling the Clickstream: Implications for Web-Based Advertising Efforts , 2003 .
[102] Sumit Sarkar,et al. The Role of the Management Sciences in Research on Personalization , 2003, Manag. Sci..
[103] Catarina Sismeiro,et al. A Model of Web Site Browsing Behavior Estimated on Clickstream Data , 2003 .
[104] Nicole Shechtman,et al. Media inequality in conversation: how people behave differently when interacting with computers and people , 2003, CHI '03.
[105] Youngme Moon,et al. Don’t Blame the Computer: When Self-Disclosure Moderates the Self-Serving Bias , 2003 .
[106] Shichao Zhang,et al. Product hierarchy-based customer profiles for electronic commerce recommendation , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[107] Nikhilesh Dholakia,et al. Privacy and Consumer Agency in the Information Age: Between Prying Profilers and Preening Webcams , 2005 .
[108] Charles L. Martin,et al. Building customer relationships: an inventory of service providers’ objectives and practices , 2001 .
[109] Zhiqiang Zheng,et al. Personalization from incomplete data: what you don't know can hurt , 2001, KDD '01.
[110] Gediminas Adomavicius,et al. Using Data Mining Methods to Build Customer Profiles , 2001, Computer.
[111] Sandra J. Milberg,et al. Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe , 2001 .
[112] Anne Rogers,et al. Hancock: a language for extracting signatures from data streams , 2000, KDD '00.
[113] Jaideep Srivastava,et al. Automatic personalization based on Web usage mining , 2000, CACM.
[114] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[115] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[116] Youngme Moon. Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .
[117] C. Nass,et al. Machines and Mindlessness , 2000 .
[118] Raymond R. Burke. Do you see what I see? The future of virtual shopping , 1997 .
[119] John Deighton,et al. Commentary on “Exploring the implications of the internet for consumer marketing” , 1997 .
[120] Bart J. Bronnenberg,et al. Exploring the implications of the internet for consumer marketing , 1997 .
[121] S. Floyd,et al. Adaptive Web , 1997 .
[122] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[123] Clifford Nass,et al. Computers are social actors , 1994, CHI '94.
[124] E. Langer,et al. Matters of mind: Mindfulness/mindlessness in perspective , 1992, Consciousness and Cognition.
[125] S. Fiske,et al. Social Psychology , 2019, Encyclopedia of Personality and Individual Differences.
[126] John Short,et al. The social psychology of telecommunications , 1976 .
[127] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[128] W C Bornemeier,et al. The carrot or the stick. , 1973, JAMA.
[129] John R Connery,et al. The right to privacy. , 1973, The Linacre quarterly.
[130] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[131] Louis D. Brandeis,et al. The Right to Privacy , 1890 .