Information privacy research: an interdisciplinary review
To date, many important threads of information privacy research have developed, but these
threads have not been woven together into a cohesive fabric. This paper provides an …
threads have not been woven together into a cohesive fabric. This paper provides an …
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Towards a unified customer experience in online shop** environments: Antecedents and outcomes
Purpose–New developments in e-commerce and m-commerce technologies along with the
wide adoption of mobile devices and social media have enabled companies to enhance …
wide adoption of mobile devices and social media have enabled companies to enhance …
Willingness to provide personal information: Perspective of privacy calculus in IoT services
Recent developments in the Internet of Things (IoT) technology provide an unprecedented
opportunity for personalized services. To take advantage of this great potential, consumers …
opportunity for personalized services. To take advantage of this great potential, consumers …
The importance of trust for personalized online advertising
A Bleier, M Eisenbeiss - Journal of Retailing, 2015 - Elsevier
With the amount of online advertising on a steady rise, generic ads noticeably lose
effectiveness. In order to break through the clutter, retailers employ a method called …
effectiveness. In order to break through the clutter, retailers employ a method called …
The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing
Despite the vast opportunities offered by location-aware marketing (LAM), mobile customers'
privacy concerns appear to be a major inhibiting factor in their acceptance of LAM. This …
privacy concerns appear to be a major inhibiting factor in their acceptance of LAM. This …
Cybersecurity enterprises policies: A comparative study
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …
also by national security. To safeguard an organization's cyberenvironments, information …
[KSIĄŻKA][B] Interactions with search systems
RW White - 2016 - books.google.com
Information seeking is a fundamental human activity. In the modern world, it is frequently
conducted through interactions with search systems. The retrieval and comprehension of …
conducted through interactions with search systems. The retrieval and comprehension of …
Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model
C Liao, CC Liu, K Chen - Electronic Commerce Research and Applications, 2011 - Elsevier
Much interest in privacy and trust studies is about shop**, but privacy research in other
forms of online activities is beginning to emerge. This study examined the antecedents of …
forms of online activities is beginning to emerge. This study examined the antecedents of …
Personalized social search based on the user's social network
This work investigates personalized social search based on the user's social relations--
search results are re-ranked according to their relations with individuals in the user's social …
search results are re-ranked according to their relations with individuals in the user's social …