On the value of private information
TARK '01 Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge
Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach
Journal of Management Information Systems
Analyzing privacy and security issues in the information age - an ethical perspective
WSEAS Transactions on Information Science and Applications
A privacy expectations and security assurance offer system
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
The sisterhood of the traveling packets
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Enhancing privacy management support in instant messaging
Interacting with Computers
Privacy issues in educational systems
International Journal of Internet Technology and Secured Transactions
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
When do firms invest in privacy-preserving technologies?
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Quantifying privacy violations
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Investment in privacy-preserving technologies under uncertainty
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Contexts and sharing/not sharing private information
Proceedings of the 50th Annual Southeast Regional Conference
Self-disclosure decision making based on intimacy and privacy
Information Sciences: an International Journal
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
A flexible framework for context-aware recommendations in the social commerce domain
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Your browsing behavior for a big mac: economics of personal information online
Proceedings of the 22nd international conference on World Wide Web
Information bazaar: a contextual evaluation
Proceedings of the 5th ACM workshop on HotPlanet
The price is right?: economic value of location sharing
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Hi-index | 0.00 |
In several experimental auctions, participants put a dollar value on private information before revealing it to a group. An analysis of results show that a trait's desirability in relation to the group played a key role in the amount people demanded to publicize private information.