Instructible agents: software that just keeps getting better
IBM Systems Journal
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Intelligent profiling by example
Proceedings of the 6th international conference on Intelligent user interfaces
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The security challenges for mobile ubiquitous services
Information Security Tech. Report
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Between Extreme Rejection and Cautious Acceptance
Social Science Computer Review
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
Behavior and perceptions of Greek consumers in business related e-communities
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys
Computers in Human Behavior
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Analyzing privacy and security issues in the information age - an ethical perspective
WSEAS Transactions on Information Science and Applications
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Lattice Based Privacy Negotiation Rule Generation for Context-Aware Service
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure
Decision Support Systems
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Privacy-enhanced web personalization
The adaptive web
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Trust management model and architecture for context-aware service platforms
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Identity in the Information Society
What blogs tell us about websites: a demographics study
Proceedings of the fourth ACM international conference on Web search and data mining
A Galois lattice approach to a context-aware privacy negotiation service
Expert Systems with Applications: An International Journal
Privacy-enhancing identity management in business
Digital privacy
Temporal sensitivity for location disclosure through mobile photo-sharing
Proceedings of the 1st international workshop on Mobile location-based service
Does privacy information influence users' online purchasing behavior?
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust
International Journal of Electronic Commerce
The Signaling Role of IT Features in Influencing Trust and Participation in Online Communities
International Journal of Electronic Commerce
Journal of Management Information Systems
E-commerce: protecting purchaser privacy to enforce trust
Electronic Commerce Research
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
ITWP'03 Proceedings of the 2003 international conference on Intelligent Techniques for Web Personalization
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Economics of identity management: a supply-side perspective
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Collective exposure: peer effects in voluntary disclosure of personal data
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Towards a similarity metric for comparing machine-readable privacy policies
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
An empirical investigation of factors affecting ubiquitous computing use and U-business value
International Journal of Information Management: The Journal for Information Professionals
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Long-term effects of ubiquitous surveillance in the home
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Theories in online information privacy research: A critical review and an integrated framework
Decision Support Systems
My privacy policy: exploring end-user specification of free-form location access rules
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
Type indeterminacy in privacy decisions: the privacy paradox revisited
QI'12 Proceedings of the 6th international conference on Quantum Interaction
Journal of Global Information Management
Why do people seek anonymity on the internet?: informing policy and design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The influence of user affect in online information disclosure
The Journal of Strategic Information Systems
Modeling the Impact of Biometric Security on Millennials' Protection Motivation
Journal of Organizational and End User Computing
Hi-index | 0.00 |
In times of ubiquitous electronic communication and increasing industry pressure for standard electronic authentication, the maintenance of privacy, or "the right to be left alone" becomes a subject of increasing concern. The possibility of a "transparent human," whose vital information is up for grabs, can most easily be envisioned in the realm of e-commerce, due in part to the large amounts of data available, and in part to the high payoffs expected from using this data for marketing purposes.