Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
Information Technology and Management
Conditioning Prices on Purchase History
Marketing Science
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
The privacy cost of the second-chance offer
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-enhanced personalization
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Sharing everyday places I go while preserving privacy
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Examining the content and privacy of web browsing incidental information
Proceedings of the 15th international conference on World Wide Web
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
An analysis of P3P-enabled web sites among top-20 search results
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Randomization as a strategy for sellers during price discrimination, and impact on bidders' privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
A study on the value of location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Online information disclosure: Motivators and measurements
ACM Transactions on Internet Technology (TOIT)
PrivateBits: managing visual privacy in web browsers
GI '07 Proceedings of Graphics Interface 2007
A roadmap for comprehensive online privacy policy management
Communications of the ACM - Creating a science of games
Controlling inference: avoiding p-level reduction during analysis
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Privacy-enhanced personalization
Communications of the ACM
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
Privacy patterns for online interactions
Proceedings of the 2006 conference on Pattern languages of programs
Computational challenges in e-commerce
Communications of the ACM - Rural engineering development
On the need for user-defined fine-grained access control policies for social networking applications
Proceedings of the workshop on Security in Opportunistic and SOCial networks
Involuntary Information Leakage in Social Network Services
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
A business privacy model for virtual communities
International Journal of Web Based Communities
Online consumer privacy concerns and willingness to provide personal data on the internet
International Journal of Networking and Virtual Organisations
Analysis of Information Disclosure on a Social Networking Site
OCSC '09 Proceedings of the 3d International Conference on Online Communities and Social Computing: Held as Part of HCI International 2009
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
PriMa: an effective privacy protection mechanism for social networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy-preserving credentials upon trusted computing augmented servers
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Privacy-enhanced web personalization
The adaptive web
Electronic Commerce Research and Applications
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Information Systems Research
Journal of Management Information Systems
For sale : your data: by : you
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Proceedings of the Seventh Symposium on Usable Privacy and Security
Affect, cognition and reward: Predictors of privacy protection online
Computers in Human Behavior
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Blending different latency traffic with alpha-mixing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
From the economics to the behavioral economics of privacy: a note
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Collective exposure: peer effects in voluntary disclosure of personal data
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
International Journal of Information Management: The Journal for Information Professionals
Android permissions: user attention, comprehension, and behavior
Proceedings of the Eighth Symposium on Usable Privacy and Security
Risk communication design: video vs. text
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Type indeterminacy in privacy decisions: the privacy paradox revisited
QI'12 Proceedings of the 6th international conference on Quantum Interaction
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Preference-based location sharing: are more privacy options really better?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy nudges for social media: an exploratory Facebook study
Proceedings of the 22nd international conference on World Wide Web companion
Sleights of privacy: framing, disclosures, and the limits of transparency
Proceedings of the Ninth Symposium on Usable Privacy and Security
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
A time-evolution model for the privacy degree of information disseminated in online social networks
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.02 |
Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully explained. We apply lessons from the research on behavioral economics to understand the individual decision making process with respect to privacy in electronic commerce. We show that it is unrealistic to expectindividual rationality in this context. Models of self-control problems and immediate gratification offer more realistic descriptions of the decision process and are more consistent with currently available data. In particular, we show why individuals who may genuinely want to protect their privacy might not do so because of psychological distortions well documented in the behavioral literature; we show that these distortions may affect not only 'naive' individuals but also 'sophisticated' ones; and we prove that this may occur also when individuals perceive the risks from not protecting their privacy as significant.