Information privacy research: an interdisciplinary review

HJ Smith, T Dinev, H Xu - MIS quarterly, 2011 - JSTOR
To date, many important threads of information privacy research have developed, but these
threads have not been woven together into a cohesive fabric. This paper provides an …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Towards a unified customer experience in online shop** environments: Antecedents and outcomes

A Bilgihan, J Kandampully, T Zhang - International Journal of Quality …, 2016 - emerald.com
Purpose–New developments in e-commerce and m-commerce technologies along with the
wide adoption of mobile devices and social media have enabled companies to enhance …

Willingness to provide personal information: Perspective of privacy calculus in IoT services

D Kim, K Park, Y Park, JH Ahn - Computers in Human Behavior, 2019 - Elsevier
Recent developments in the Internet of Things (IoT) technology provide an unprecedented
opportunity for personalized services. To take advantage of this great potential, consumers …

The importance of trust for personalized online advertising

A Bleier, M Eisenbeiss - Journal of Retailing, 2015 - Elsevier
With the amount of online advertising on a steady rise, generic ads noticeably lose
effectiveness. In order to break through the clutter, retailers employ a method called …

The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing

H Xu, XR Luo, JM Carroll, MB Rosson - Decision support systems, 2011 - Elsevier
Despite the vast opportunities offered by location-aware marketing (LAM), mobile customers'
privacy concerns appear to be a major inhibiting factor in their acceptance of LAM. This …

Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

[KSIĄŻKA][B] Interactions with search systems

RW White - 2016 - books.google.com
Information seeking is a fundamental human activity. In the modern world, it is frequently
conducted through interactions with search systems. The retrieval and comprehension of …

Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model

C Liao, CC Liu, K Chen - Electronic Commerce Research and Applications, 2011 - Elsevier
Much interest in privacy and trust studies is about shop**, but privacy research in other
forms of online activities is beginning to emerge. This study examined the antecedents of …

Personalized social search based on the user's social network

D Carmel, N Zwerdling, I Guy, S Ofek-Koifman… - Proceedings of the 18th …, 2009 - dl.acm.org
This work investigates personalized social search based on the user's social relations--
search results are re-ranked according to their relations with individuals in the user's social …