Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing

[1]  Gediminas Adomavicius,et al.  Business Computing , 2009 .

[2]  Paul R. Daugherty,et al.  HUMAN + MACHINE: REIMAGINING WORK IN THE AGE OF AI , 2020 .

[3]  Scott W. Duxbury,et al.  Criminal network security: An agent‐based approach to evaluating network resilience* , 2019, Criminology.

[4]  Dhruv Grewal,et al.  Service Robots Rising: How Humanoid Robots Influence Service Experiences and Elicit Compensatory Consumer Responses , 2019, Journal of Marketing Research.

[5]  Kartik Hosanagar A Human's Guide to Machine Intelligence: How Algorithms Are Shaping Our Lives and How We Can Stay in Control , 2019 .

[6]  Evan Selinger,et al.  Robot Eyes Wide Shut: Understanding Dishonest Anthropomorphism , 2019, FAT.

[7]  Hsinchun Chen,et al.  DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics , 2019, MIS Q..

[8]  Alessandro Acquisti,et al.  Choice Architecture, Framing, and Cascaded Privacy Choices , 2018, Manag. Sci..

[9]  Kai Lung Hui,et al.  See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums , 2019, MIS Q..

[10]  Isak Ladegaard Crime displacement in digital drug markets. , 2019, The International journal on drug policy.

[11]  Robert W. Palmatier,et al.  Creating Effective Online Customer Experiences , 2018, Journal of Marketing.

[12]  P. Brandtzæg,et al.  Chatbots , 2018, Interactions.

[13]  Theo Araujo,et al.  Living up to the chatbot hype: The influence of anthropomorphic design cues and communicative agency framing on conversational agent and company perceptions , 2018, Comput. Hum. Behav..

[14]  Sveinung Sandberg,et al.  Coordination problems in cryptomarkets: Changes in cooperation, competition and valuation , 2018 .

[15]  Pradeep Chintagunta,et al.  Personalization in Email Marketing: The Role of Noninformative Advertising Content , 2018, Mark. Sci..

[16]  Eric Jardine,et al.  Tor, what is it good for? Political repression and the use of online anonymity-granting technologies , 2018, New Media Soc..

[17]  Harry Shum,et al.  From Eliza to XiaoIce: challenges and opportunities with social chatbots , 2018, Frontiers of Information Technology & Electronic Engineering.

[18]  Asbjørn Følstad,et al.  Why People Use Chatbots , 2017, INSCI.

[19]  Arne De Keyser,et al.  “Service Encounter 2.0”: an investigation into the roles of technology, employees and customers , 2017 .

[20]  Jeanna Neefe Matthews,et al.  Toward algorithmic transparency and accountability , 2017, Commun. ACM.

[21]  Ingrid Poncin,et al.  Animated conversational agents and e-consumer productivity: The roles of agents and individual characteristics , 2017, Inf. Manag..

[22]  R. Rust,et al.  Technology-driven service strategy , 2017 .

[23]  D. Stewart A comment on privacy , 2017 .

[24]  Kelly D. Martin,et al.  The role of data privacy in marketing , 2016, Journal of the Academy of Marketing Science.

[25]  Amy L. Ostrom,et al.  Domo Arigato Mr. Roboto , 2017 .

[26]  Alexander Maedche,et al.  Towards Designing Cooperative and Social Conversational Agents for Customer Service , 2017, ICIS.

[27]  Bart P. Knijnenburg,et al.  Inferring Capabilities of Intelligent Agents from Their External Traits , 2016, ACM Trans. Interact. Intell. Syst..

[28]  Cait Lamberton,et al.  A Thematic Exploration of Digital, Social Media, and Mobile Marketing: Research Evolution from 2000 to 2015 and an Agenda for Future Inquiry , 2016 .

[29]  Zhiyuan Liu,et al.  Neural Sentiment Classification with User and Product Attention , 2016, EMNLP.

[30]  Gina Neff,et al.  Talking to Bots: Symbiotic Agency and the Case of Tay , 2016 .

[31]  Kannan Balakrishnan,et al.  Implementation of an inquisitive chatbot for database supported knowledge bases , 2016 .

[32]  Jay F. Nunamaker,et al.  Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System , 2016, J. Manag. Inf. Syst..

[33]  Raimondo Bruno,et al.  Characterising dark net marketplace purchasers in a sample of regular psychostimulant users. , 2016, The International journal on drug policy.

[34]  Monica J Barratt,et al.  Safer scoring? Cryptomarkets, social supply and drug market violence. , 2016, The International journal on drug policy.

[35]  M. Barratt,et al.  Results of an international drug testing service for cryptomarket users. , 2016, The International journal on drug policy.

[36]  Diyi Yang,et al.  Hierarchical Attention Networks for Document Classification , 2016, NAACL.

[37]  Rebecca Walker Reczek,et al.  An Audience of One: Behaviorally Targeted Ads as Implied Social Labels , 2016 .

[38]  J. Rowley Building customer relationships , 2016 .

[39]  David Griol,et al.  The Conversational Interface: Talking to Smart Devices , 2016 .

[40]  Michael Trusov,et al.  Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting , 2016, Mark. Sci..

[41]  Martin Wetzels,et al.  The personalization-privacy paradox: implications for new media , 2016 .

[42]  T. Holt,et al.  Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets , 2016 .

[43]  Lexing Xie,et al.  SentiCap: Generating Image Descriptions with Sentiments , 2015, AAAI.

[44]  Michel Wedel,et al.  Adaptive personalization using social networks , 2015, Journal of the Academy of Marketing Science.

[45]  Chayan Chakrabarti,et al.  Artificial conversations for customer service chatter bots: Architecture, algorithms, and evaluation metrics , 2015, Expert Syst. Appl..

[46]  Elgar Fleisch,et al.  Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..

[47]  Maik Eisenbeiss,et al.  The Importance of Trust for Personalized Online Advertising , 2015 .

[48]  Mohammed Slim Ben Mimoun,et al.  A valued agent: How ECAs affect website customers' satisfaction and behaviors , 2015 .

[49]  Paul Jen-Hwa Hu,et al.  Role of Affect in Self-Disclosure on Social Network Websites: A Test of Two Competing Models , 2015, J. Manag. Inf. Syst..

[50]  Elena Karahanna,et al.  Online Recommendation Systems in a B2C E-Commerce Context: A Review and Future Directions , 2015, J. Assoc. Inf. Syst..

[51]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[52]  Sumit Sarkar,et al.  Selling vs. Profiling: Optimizing the Offer Set in Web-Based Personalization , 2014, Inf. Syst. Res..

[53]  Tibert Verhagen,et al.  Virtual Customer Service Agents: Using Social Presence and Personalization to Shape Online Service Encounters , 2014, J. Comput. Mediat. Commun..

[54]  Jan H. Schumann,et al.  Targeted Online Advertising: Using Reciprocity Appeals to Increase Acceptance among Users of Free Web Services , 2014 .

[55]  Justin Scott Giboney,et al.  Facilitating Natural Conversational Agent Interactions: Lessons from a Deception Experiment , 2014, ICIS.

[56]  Robert F. Bordley,et al.  Morphing Banner Advertising , 2014, Mark. Sci..

[57]  Matthew Crosby,et al.  Association for the Advancement of Artificial Intelligence , 2014 .

[58]  P Pafko,et al.  [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.

[59]  Catherine E. Tucker,et al.  When Does Retargeting Work? Information Specificity in Online Advertising , 2013 .

[60]  Jamil Bojei,et al.  The empirical link between relationship marketing tools and consumer retention in retail marketing , 2013 .

[61]  Aaron C. Elkins,et al.  The Sound of Trust: Voice as a Measurement of Trust During Interactions with Embodied Conversational Agents , 2013 .

[62]  Mohammed Slim Ben Mimoun,et al.  Case study—Embodied virtual agents: An analysis on reasons for failure , 2012 .

[63]  Juan E. Gilbert,et al.  Virtual agents in retail web sites: Benefits of simulated social interaction for older users , 2012, Comput. Hum. Behav..

[64]  Erik Brynjolfsson,et al.  Big data: the management revolution. , 2012, Harvard business review.

[65]  Karl F. MacDorman,et al.  The Uncanny Valley [From the Field] , 2012, IEEE Robotics Autom. Mag..

[66]  Beibei Li,et al.  Designing Ranking Systems for Hotels on Travel Search Engines by Mining User-Generated and Crowd-Sourced Content , 2011, Mark. Sci..

[67]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[68]  Ritu Agarwal,et al.  The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..

[69]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[70]  Ronald T. Cenfetelli,et al.  The Adoption of Online Shopping Assistants: Perceived Similarity as an Antecedent to Evaluative Beliefs , 2011, J. Assoc. Inf. Syst..

[71]  Gokhan Tur,et al.  Spoken Language Understanding: Systems for Extracting Semantic Information from Speech , 2011 .

[72]  Gokhan Tur,et al.  Intent Determination and Spoken Utterance Classification , 2011 .

[73]  B. Edvardsson,et al.  Expanding understanding of service exchange and value co-creation: a social construction approach , 2011 .

[74]  Sherry Turkle,et al.  Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .

[75]  Zhongfu Wu,et al.  Personalisation in web computing and informatics: Theories, techniques, applications, and future research , 2010, Inf. Syst. Frontiers.

[76]  Rahul Telang,et al.  Converting Pirates Without Cannibalizing Purchasers: The Impact of Digital Distribution on Physical Sales and Internet Piracy , 2010, Mark. Sci..

[77]  Ofer Arazy,et al.  A Theory-Driven Design Framework for Social Recommender Systems , 2010, J. Assoc. Inf. Syst..

[78]  Rajiv K. Sinha,et al.  Don't Think Twice, It's All Right: Music Piracy and Pricing in a DRM-Free Environment , 2010 .

[79]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[80]  Izak Benbasat,et al.  Evaluating Anthropomorphic Product Recommendation Agents: A Social Relationship Perspective to Designing Information Systems , 2009, J. Manag. Inf. Syst..

[81]  Sanjay Jain,et al.  Digital Piracy: A Competitive Analysis , 2008, Mark. Sci..

[82]  Kai Lung Hui,et al.  Consumer Privacy and Marketing Avoidance: A Static Model , 2008, Manag. Sci..

[83]  Yogesh V. Joshi,et al.  Putting one-to-one marketing to work: Personalization, customization, and choice , 2008 .

[84]  Izak Benbasat,et al.  Attributions of Trust in Decision Support Technologies: A Study of Recommendation Agents for E-Commerce , 2008, J. Manag. Inf. Syst..

[85]  Rajiv K. Sinha,et al.  Preventing Digital Music Piracy: The Carrot or the Stick? , 2008 .

[86]  Gediminas Adomavicius,et al.  Personalization and Recommender Systems , 2008 .

[87]  P. Aggarwal,et al.  Is That Car Smiling at Me? Schema Congruity as a Basis for Evaluating Anthropomorphized Products , 2007 .

[88]  Stephen J. Cox,et al.  Analysis of User Interaction with Service Oriented Chatbot Systems , 2007, HCI.

[89]  Heloir,et al.  The Uncanny Valley , 2019, The Animation Studies Reader.

[90]  Gediminas Adomavicius,et al.  Personalization technologies: A process-oriented perspective , 2006, Wirtschaftsinf..

[91]  Shuk Ying Ho,et al.  Understanding the Impact of Web Personalization on User Information Processing and Decision Outcomes , 2006, MIS Q..

[92]  Izak Benbasat,et al.  Research Note: The Influence of Recommendations and Consumer Reviews on Evaluations of Websites , 2006, Inf. Syst. Res..

[93]  Izak Benbasat,et al.  The Role of Design Characteristics in Shaping Perceptions of Similarity: The Case of Online Shopping Assistants , 2006, J. Assoc. Inf. Syst..

[94]  Colin J. Bennett,et al.  The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .

[95]  Kathleen S. Hartzel,et al.  Exploring the privacy implications of addressable advertising and viewer profiling , 2006, CACM.

[96]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[97]  Heather H. Mitchell,et al.  Social Cues in Animated Conversational Agents , 2005 .

[98]  Gediminas Adomavicius,et al.  Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.

[99]  Kannan Srinivasan,et al.  Modeling Online Browsing and Path Analysis Using Clickstream Data , 2004 .

[100]  Heikki Mannila,et al.  Discovery of Frequent Episodes in Event Sequences , 1997, Data Mining and Knowledge Discovery.

[101]  P. Chatterjee,et al.  Modeling the Clickstream: Implications for Web-Based Advertising Efforts , 2003 .

[102]  Sumit Sarkar,et al.  The Role of the Management Sciences in Research on Personalization , 2003, Manag. Sci..

[103]  Catarina Sismeiro,et al.  A Model of Web Site Browsing Behavior Estimated on Clickstream Data , 2003 .

[104]  Nicole Shechtman,et al.  Media inequality in conversation: how people behave differently when interacting with computers and people , 2003, CHI '03.

[105]  Youngme Moon,et al.  Don’t Blame the Computer: When Self-Disclosure Moderates the Self-Serving Bias , 2003 .

[106]  Shichao Zhang,et al.  Product hierarchy-based customer profiles for electronic commerce recommendation , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[107]  Nikhilesh Dholakia,et al.  Privacy and Consumer Agency in the Information Age: Between Prying Profilers and Preening Webcams , 2005 .

[108]  Charles L. Martin,et al.  Building customer relationships: an inventory of service providers’ objectives and practices , 2001 .

[109]  Zhiqiang Zheng,et al.  Personalization from incomplete data: what you don't know can hurt , 2001, KDD '01.

[110]  Gediminas Adomavicius,et al.  Using Data Mining Methods to Build Customer Profiles , 2001, Computer.

[111]  Sandra J. Milberg,et al.  Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe , 2001 .

[112]  Anne Rogers,et al.  Hancock: a language for extracting signatures from data streams , 2000, KDD '00.

[113]  Jaideep Srivastava,et al.  Automatic personalization based on Web usage mining , 2000, CACM.

[114]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[115]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[116]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[117]  C. Nass,et al.  Machines and Mindlessness , 2000 .

[118]  Raymond R. Burke Do you see what I see? The future of virtual shopping , 1997 .

[119]  John Deighton,et al.  Commentary on “Exploring the implications of the internet for consumer marketing” , 1997 .

[120]  Bart J. Bronnenberg,et al.  Exploring the implications of the internet for consumer marketing , 1997 .

[121]  S. Floyd,et al.  Adaptive Web , 1997 .

[122]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[123]  Clifford Nass,et al.  Computers are social actors , 1994, CHI '94.

[124]  E. Langer,et al.  Matters of mind: Mindfulness/mindlessness in perspective , 1992, Consciousness and Cognition.

[125]  S. Fiske,et al.  Social Psychology , 2019, Encyclopedia of Personality and Individual Differences.

[126]  John Short,et al.  The social psychology of telecommunications , 1976 .

[127]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[128]  W C Bornemeier,et al.  The carrot or the stick. , 1973, JAMA.

[129]  John R Connery,et al.  The right to privacy. , 1973, The Linacre quarterly.

[130]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[131]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .