Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Near rationality and competitive equilibria in networked systems
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
Information Technology and Management
Conditioning Prices on Purchase History
Marketing Science
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting private data in public
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Understanding the whethers, hows, and whys of divisible interfaces
Proceedings of the working conference on Advanced visual interfaces
Revisiting the uniqueness of simple demographics in the US population
Proceedings of the 5th ACM workshop on Privacy in electronic society
A study on the value of location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Doppelganger: Better browser privacy without the bother
Proceedings of the 13th ACM conference on Computer and communications security
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Secure or insure?: a game-theoretic analysis of information security games
Proceedings of the 17th international conference on World Wide Web
Security and insurance management in networks with heterogeneous agents
Proceedings of the 9th ACM conference on Electronic commerce
Predicted and observed user behavior in the weakest-link security game
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Computers in Human Behavior
Gaining Access with Social Engineering: An Empirical Study of the Threat
Information Systems Security
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Discovering the Scope of Privacy Needs in Collaborative Search
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Hassle free fitness monitoring
Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
A business privacy model for virtual communities
International Journal of Web Based Communities
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
Electronic Commerce Research
A Comparative Study of Online Privacy Policies and Formats
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Uncertainty in the weakest-link security game
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
PriMa: an effective privacy protection mechanism for social networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy-enhanced web personalization
The adaptive web
Empirical studies on software notices to inform policy makers and usability designers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Participatory design and web 2.0: the case of PIPWatch, the collaborative privacy toolbar
Proceedings of the Tenth Anniversary Conference on Participatory Design 2008
Privacy issues in educational systems
International Journal of Internet Technology and Secured Transactions
Privacy-awareness information for web forums: results from an empirical study
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Nudge: intermediaries' role in interdependent network security
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Privacy policies for shared content in social network sites
The VLDB Journal — The International Journal on Very Large Data Bases
A Galois lattice approach to a context-aware privacy negotiation service
Expert Systems with Applications: An International Journal
Privacy-enhancing identity management in business
Digital privacy
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Information Systems Research
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Tensions in developing a secure collective information practice - the case of agile ridesharing
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Journal of Management Information Systems
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Affect, cognition and reward: Predictors of privacy protection online
Computers in Human Behavior
When information improves information security
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
From the economics to the behavioral economics of privacy: a note
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Collective exposure: peer effects in voluntary disclosure of personal data
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
It's all about the benjamins: an empirical study on incentivizing users to ignore security advice
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
Guiding decisions on authorization policies: a participatory approach to decision support
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
Caprice: a tool for engineering adaptive privacy
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
Privacy consensus in anonymization systems via game theory
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Risk communication design: video vs. text
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Long-term effects of ubiquitous surveillance in the home
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Type indeterminacy in privacy decisions: the privacy paradox revisited
QI'12 Proceedings of the 6th international conference on Quantum Interaction
Usable privacy by visual and interactive control of information flow
SP'12 Proceedings of the 20th international conference on Security Protocols
Usable privacy by visual and interactive control of information flow (transcript of discussion)
SP'12 Proceedings of the 20th international conference on Security Protocols
Privacy policies and national culture on the internet
Information Systems Frontiers
Two new economic models for privacy
ACM SIGMETRICS Performance Evaluation Review
Emergence of privacy conventions in online social networks
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Privacy nudges for social media: an exploratory Facebook study
Proceedings of the 22nd international conference on World Wide Web companion
Your browsing behavior for a big mac: economics of personal information online
Proceedings of the 22nd international conference on World Wide Web
Measurement and analysis of child pornography trafficking on P2P networks
Proceedings of the 22nd international conference on World Wide Web
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
International Journal of Human-Computer Studies
International Journal of Human-Computer Studies
Privacy intrusiveness and web audiences: Empirical evidence
Telecommunications Policy
Social Science Computer Review
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
International Journal of Human-Computer Studies
Hi-index | 0.01 |
Traditional theory suggests consumers should be able to manage their privacy. Yet, empirical and theoretical research shows that consumers often lack enough information to make privacy-sensitive decisions and, even with sufficient information, are likely to trade off long-term privacy for short-term benefits.