Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Research Report: Empirical Test of an EDI Adoption Model
Information Systems Research
HICSS '95 Proceedings of the 28th Hawaii International Conference on System Sciences
Privacy-Preserving Cooperative Statistical Analysis
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Information Sharing in a Supply Chain with Horizontal Competition
Management Science
Supply Chain Inventory Management and the Value of Shared Information
Management Science
Trust and Radio Frequency Identification (RFID) Adoption within an Alliance
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Towards Traceability across Sovereign, Distributed RFID Databases
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Global RFID: The Value of the EPCglobal Network for Supply Chain Management
Global RFID: The Value of the EPCglobal Network for Supply Chain Management
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Information Technology and Management
FairplayMP: a system for secure multi-party computation
Proceedings of the 15th ACM conference on Computer and communications security
Protecting Sensitive Business Information While Sharing Serial-Level Data
EDOCW '08 Proceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops
Proceedings of the 1st international conference on The internet of things
IOT'08 Proceedings of the 1st international conference on The internet of things
Public-key encrypted bloom filters with applications to supply chain integrity
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Encryption-enforced access control for an RFID discovery service
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
An empirical examination of user adoption of location-based services
Electronic Commerce Research
Hi-index | 0.00 |
When information is available about the path, on which individual items move through the real world, many beneficial applications can be designed. The necessary data can be generated through attaching identifiers to items and deploying suitable readers all over the supply chain that capture the information on the identifiers. Organizations only have access to data about item movements within their organizational boundaries. Therefore sharing of data between organizations is required to gain full visibility. However, the willingness of organizations to share data is considered to be low. In this paper we present the results of a study that aimed at investigating the actual willingness of companies to share item-level data and at exploring the perceived privacy risks that may restrain companies from sharing item-level data. From the findings, requirements for the design of inter-organizational data sharing infrastructures are derived.