• Dennehy D, Murphy S, Foley S, McCarthy J and Morrissey K. (2024). Keeping Fit & Staying Safe. International Journal of Human-Computer Studies. 192:C. Online publication date: 1-Dec-2024.

    https://doi.org/10.1016/j.ijhcs.2024.103361

  • Zhang J, Koivumäki T and Chalmers D. (2024). Privacy vs convenience. Computers in Human Behavior. 160:C. Online publication date: 1-Nov-2024.

    https://doi.org/10.1016/j.chb.2024.108382

  • Alfieri C, Di Rocco J, Inverardi P and T. Nguyen P. (2024). Exploring user privacy awareness on GitHub: an empirical study. Empirical Software Engineering. 29:6. Online publication date: 1-Nov-2024.

    https://doi.org/10.1007/s10664-024-10544-7

  • Ishida M, Ikematsu K and Igarashi Y. (2024). Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing Environments. Proceedings of the ACM on Human-Computer Interaction. 8:ISS. (165-188). Online publication date: 24-Oct-2024.

    https://doi.org/10.1145/3698133

  • Dong M. (2024). Explaining Privacy Paradox on WeChat. International Journal of Information Security and Privacy. 18:1. (1-24). Online publication date: 15-Oct-2024.

    https://doi.org/10.4018/IJISP.357250

  • Thilderkvist E and Dobslaw F. (2024). On current limitations of online eye-tracking to study the visual processing of source code. Information and Software Technology. 174:C. Online publication date: 1-Oct-2024.

    https://doi.org/10.1016/j.infsof.2024.107502

  • Gerasimou S and Limniotis K. (2024). A study on privacy and security aspects of personalised apps. International Journal of Information Security. 23:5. (3217-3239). Online publication date: 1-Oct-2024.

    https://doi.org/10.1007/s10207-024-00887-z

  • Lieberknecht A. Exploring Determinants of Parental Engagement in Online Privacy Protection: A Qualitative Approach. Proceedings of the 2024 European Symposium on Usable Security. (94-111).

    https://doi.org/10.1145/3688459.3688476

  • Windl M, Schlegel M and Mayer S. (2024). Exploring Users' Mental Models and Privacy Concerns During Interconnected Interactions. Proceedings of the ACM on Human-Computer Interaction. 8:MHCI. (1-23). Online publication date: 24-Sep-2024.

    https://doi.org/10.1145/3676504

  • Nam S and Kwon Y. (2024). Is pay-or-consent for privacy justifiable? Evidence from different users' privacy attitudes toward behavioral data collection in South Korea. Telecommunications Policy. 48:7. Online publication date: 1-Aug-2024.

    https://doi.org/10.1016/j.telpol.2024.102794

  • Windl M and Feger S. Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration Options. Proceedings of the 2024 ACM Designing Interactive Systems Conference. (3372-3388).

    https://doi.org/10.1145/3643834.3661527

  • Reeck C, Guo X, Dimoka A and Pavlou P. (2024). Uncovering the Neural Processes of Privacy. Information Systems Research. 35:2. (727-746). Online publication date: 1-Jun-2024.

    https://doi.org/10.1287/isre.2021.0550

  • Liu Y, Wu Y, Li C, Song C and Hsu W. (2024). Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo. Telecommunications Policy. 48:5. Online publication date: 1-Jun-2024.

    https://doi.org/10.1016/j.telpol.2024.102759

  • Ladak A, Harris J and Anthis J. Which Artificial Intelligences Do People Care About Most? A Conjoint Experiment on Moral Consideration. Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. (1-11).

    https://doi.org/10.1145/3613904.3642403

  • Lee H, Yang Y, Von Davier T, Forlizzi J and Das S. Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks. Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. (1-19).

    https://doi.org/10.1145/3613904.3642116

  • Song Q, Ma R, Kou Y and Gui X. (2024). Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. Wade. Proceedings of the ACM on Human-Computer Interaction. 8:CSCW1. (1-35). Online publication date: 17-Apr-2024.

    https://doi.org/10.1145/3641000

  • Elmimouni H, Baumer E and Forte A. (2024). On Being an Expert: Habitus as a Lens for Understanding Privacy Expertise. Proceedings of the ACM on Human-Computer Interaction. 8:CSCW1. (1-25). Online publication date: 17-Apr-2024.

    https://doi.org/10.1145/3637379

  • Ali A, Zaaba Z and Singh M. (2024). The rise of “security and privacy”: bibliometric analysis of computer privacy research. International Journal of Information Security. 23:2. (863-885). Online publication date: 1-Apr-2024.

    https://doi.org/10.1007/s10207-023-00761-4

  • Saxborn M, Pan Y and Said A. Trust Through Recommendation in E-commerce. Proceedings of the 2024 Conference on Human Information Interaction and Retrieval. (87-96).

    https://doi.org/10.1145/3627508.3638294

  • Choi D and Lowry P. (2024). Balancing the commitment to the common good and the protection of personal privacy. Information and Management. 61:1. Online publication date: 1-Jan-2024.

    https://doi.org/10.1016/j.im.2023.103876

  • Knowles B and Conchie S. (2023). Un-Paradoxing Privacy: Considering Hopeful Trust. ACM Transactions on Computer-Human Interaction. 30:6. (1-24). Online publication date: 31-Dec-2024.

    https://doi.org/10.1145/3609329

  • Alashoor T, Keil M, Smith H and McConnell A. (2023). Too Tired and in Too Good of a Mood to Worry About Privacy. Information Systems Research. 34:4. (1415-1436). Online publication date: 1-Dec-2023.

    https://doi.org/10.1287/isre.2022.1182

  • Gieselmann M and Sassenberg K. (2023). The More Competent, the Better? The Effects of Perceived Competencies on Disclosure Towards Conversational Artificial Intelligence. Social Science Computer Review. 41:6. (2342-2363). Online publication date: 1-Dec-2023.

    https://doi.org/10.1177/08944393221142787

  • Gupta S, Kamboj S and Bag S. (2023). Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain. Information Systems Frontiers. 25:6. (2257-2274). Online publication date: 1-Dec-2023.

    https://doi.org/10.1007/s10796-021-10174-0

  • Yuan X, Ye H, Tang Z, Zhu X, Yao Y and Tong X. RedCapes: the Design and Evaluation of a Game Towards Improving Autistic Children's Privacy Awareness. Proceedings of the Eleventh International Symposium of Chinese CHI. (110-126).

    https://doi.org/10.1145/3629606.3629618

  • Shams S and Reinhardt D. Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies. Proceedings of the 2023 European Symposium on Usable Security. (253-259).

    https://doi.org/10.1145/3617072.3617105

  • Agbesi S, Budurushi J, Dalela A and Kulyk O. Investigating Transparency Dimensions for Internet Voting. Electronic Voting. (1-17).

    https://doi.org/10.1007/978-3-031-43756-4_1

  • Huang Z and Huang T. (2023). Privacy Calculus Theory in the Digital Government Context. Social Science Computer Review. 41:5. (1745-1766). Online publication date: 1-Oct-2023.

    https://doi.org/10.1177/08944393221117500

  • Dogruel L, Joeckel S and Henke J. (2023). Disclosing Personal Information in mHealth Apps. Testing the Role of Privacy Attitudes, App Habits, and Social Norm Cues. Social Science Computer Review. 41:5. (1791-1810). Online publication date: 1-Oct-2023.

    https://doi.org/10.1177/08944393221108820

  • Liu H, Li K, Chen Y and Luo X. (2023). Is personally identifiable information really more valuable? Evidence from consumers' willingness-to-accept valuation of their privacy information. Decision Support Systems. 173:C. Online publication date: 1-Oct-2023.

    https://doi.org/10.1016/j.dss.2023.114010

  • Liu C, Zhu T, Zhang J and Zhou W. (2022). Privacy Intelligence: A Survey on Image Privacy in Online Social Networks. ACM Computing Surveys. 55:8. (1-35). Online publication date: 31-Aug-2023.

    https://doi.org/10.1145/3547299

  • Moniz D, Mehrnezhad M and Almeida T. Intimate Data: Exploring Perceptions of Privacy and Privacy-Seeking Behaviors Through the Story Completion Method. Human-Computer Interaction – INTERACT 2023. (533-543).

    https://doi.org/10.1007/978-3-031-42286-7_30

  • Ma Y, Zhou Q, Tag B, Sarsenbayeva Z, Knibbe J and Goncalves J. “Hello, Fellow Villager!”: Perceptions and Impact of Displaying Users’ Locations on Weibo. Human-Computer Interaction – INTERACT 2023. (511-532).

    https://doi.org/10.1007/978-3-031-42286-7_29

  • Rijshouwer E and van Zoonen L. (2023). Doing Research With a Gamified Survey. Social Science Computer Review. 41:4. (1363-1380). Online publication date: 1-Aug-2023.

    https://doi.org/10.1177/08944393211073508

  • Pathmabandu C, Grundy J, Chhetri M and Baig Z. (2023). Privacy for IoT. Future Generation Computer Systems. 145:C. (367-383). Online publication date: 1-Aug-2023.

    https://doi.org/10.1016/j.future.2023.03.045

  • Speck S, Pauli C, Ursprung C, Wallimann M, Huber R and Misoch S. “I Simply Accept the Terms and Conditions so that I Can Use an App at All”: Smartphone Use and Privacy Among Older Adults in Switzerland. HCI International 2023 – Late Breaking Papers. (191-202).

    https://doi.org/10.1007/978-3-031-48041-6_14

  • Gieselmann M and Sassenberg K. The Relevance of Perceived Interactivity for Disclosure Towards Conversational Artificial Intelligence. Artificial Intelligence in HCI. (55-67).

    https://doi.org/10.1007/978-3-031-35894-4_4

  • Alshomrani N, Furnell S and He Y. Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings. HCI for Cybersecurity, Privacy and Trust. (557-575).

    https://doi.org/10.1007/978-3-031-35822-7_36

  • Arzoglou E and Kortesniemi Y. Alternative Platforms and Privacy Paradox: A System Dynamics Analysis. Computational Science – ICCS 2023. (163-176).

    https://doi.org/10.1007/978-3-031-35995-8_12

  • Lenz J, Bozakov Z, Wendzel S and Vrhovec S. (2023). Why people replace their aging smart devices. Computers and Security. 130:C. Online publication date: 1-Jul-2023.

    https://doi.org/10.1016/j.cose.2023.103258

  • Kulyk O, Renaud K and Costica S. (2023). People want reassurance when making privacy-related decisions — Not technicalities. Journal of Systems and Software. 200:C. Online publication date: 1-Jun-2023.

    https://doi.org/10.1016/j.jss.2023.111620

  • Alimamy S and Kuhail M. (2023). I will be with you Alexa! The impact of intelligent virtual assistant's authenticity and personalization on user reusage intentions. Computers in Human Behavior. 143:C. Online publication date: 1-Jun-2023.

    https://doi.org/10.1016/j.chb.2023.107711

  • Rehman S, Manickam S and Al-Charchafchi A. (2022). Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university. Education and Information Technologies. 28:6. (7205-7223). Online publication date: 1-Jun-2023.

    https://doi.org/10.1007/s10639-022-11459-w

  • Khan M, Loh J, Hossain A and Hasan Talukder M. (2023). Cynicism as strength. Computers in Human Behavior. 142:C. Online publication date: 1-May-2023.

    https://doi.org/10.1016/j.chb.2022.107638

  • Jung F, Kaiser J, Von Holdt K, Heuten W and Meyer J. The Art of Privacy – A Theatrical Privacy Installation in Virtual Reality. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems. (1-5).

    https://doi.org/10.1145/3544549.3583893

  • Rossmy B, Terzimehić N, Döring T, Buschek D and Wiethoff A. Point of no Undo: Irreversible Interactions as a Design Strategy. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. (1-18).

    https://doi.org/10.1145/3544548.3581433

  • Elmimouni H, Shusas E, Skeba P, Baumer E and Forte A. What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies. Information for a Better World: Normality, Virtuality, Physicality, Inclusivity. (229-250).

    https://doi.org/10.1007/978-3-031-28032-0_20

  • van der Schyff K and Flowerday S. (2023). The mediating role of perceived risks and benefits when self-disclosing. Computers and Security. 126:C. Online publication date: 1-Mar-2023.

    https://doi.org/10.1016/j.cose.2022.103071

  • Sandhu R, Vasconcelos-Gomes J, Thomas M and Oliveira T. (2023). Unfolding the popularity of video conferencing apps – A privacy calculus perspective. International Journal of Information Management: The Journal for Information Professionals. 68:C. Online publication date: 1-Feb-2023.

    https://doi.org/10.1016/j.ijinfomgt.2022.102569

  • Ebina T and Kinjo K. (2021). Paradox of choice and sharing personal information. AI & Society. 38:1. (121-132). Online publication date: 1-Feb-2023.

    https://doi.org/10.1007/s00146-021-01291-0

  • Pan Y, Chen H and Yeh K. (2023). Exploring the Privacy Paradox in Social Network Users. Mobile Information Systems. 2023. Online publication date: 1-Jan-2023.

    https://doi.org/10.1155/2023/4987364

  • Brunotte W, Specht A, Chazette L and Schneider K. (2023). Privacy explanations – A means to end-user trust. Journal of Systems and Software. 195:C. Online publication date: 1-Jan-2023.

    https://doi.org/10.1016/j.jss.2022.111545

  • Seo D, Gharibdoust S and Mandl T. (2022). Comparing factors affecting self-disclosure behavior between German and South Korean SNS users. Telematics and Informatics. 75:C. Online publication date: 1-Dec-2022.

    https://doi.org/10.1016/j.tele.2022.101904

  • Fleischhauer D, Engelstätter B and Tafreschi O. The Privacy Paradox in Smartphone Users. Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia. (62-70).

    https://doi.org/10.1145/3568444.3568467

  • Maragkoudaki S and Kalloniatis C. Virtual Reality as a mean for increasing privacy awareness: The escape room example. Proceedings of the 26th Pan-Hellenic Conference on Informatics. (261-266).

    https://doi.org/10.1145/3575879.3576002

  • Jung F, von Holdt K, Krüger R, Meyer J and Heuten W. I do. Do I? – Understanding User Perspectives on the Privacy Paradox. Proceedings of the 25th International Academic Mindtrek Conference. (268-277).

    https://doi.org/10.1145/3569219.3569358

  • Chapman K, Klimes M, Wellman B, Smith G, Mondal M, Smith S, Chen Y, Hao H and Page X. A Privacy Paradox? Impact of Privacy Concerns on Willingness to Disclose COVID-19 Health Status in the United States. Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing. (159-162).

    https://doi.org/10.1145/3500868.3559471

  • Garrido G, Sedlmeir J, Uludağ Ö, Alaoui I, Luckow A and Matthes F. (2022). Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT. Journal of Network and Computer Applications. 207:C. Online publication date: 1-Nov-2022.

    https://doi.org/10.1016/j.jnca.2022.103465

  • Schlatt V, Sedlmeir J, Feulner S and Urbach N. (2022). Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity. Information and Management. 59:7. Online publication date: 1-Nov-2022.

    https://doi.org/10.1016/j.im.2021.103553

  • Wessel D, Claudy S, Hanke K, Herzog C, Preiß R, Wegner C and Heine M. Prototypes for E-government Websites to support the Digital Sovereignty of Citizens. Proceedings of Mensch und Computer 2022. (615-617).

    https://doi.org/10.1145/3543758.3547514

  • Agesilaou A and Kyza E. (2022). Whose data are they? Elementary school students’ conceptualization of data ownership and privacy of personal digital data. International Journal of Child-Computer Interaction. 33:C. Online publication date: 1-Sep-2022.

    https://doi.org/10.1016/j.ijcci.2022.100462

  • Hannibal G, Dobrosovestnova A and Weiss A. Tolerating Untrustworthy Robots: Studying Human Vulnerability Experience within a Privacy Scenario for Trust in Robots. 2022 31st IEEE International Conference on Robot and Human Interactive Communication (RO-MAN). (821-828).

    https://doi.org/10.1109/RO-MAN53752.2022.9900830

  • Zibaei S, Malapaya D, Mercier B, Salehi-Abari A and Thorpe J. Do password managers nudge secure (random) passwords?. Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security. (581-597).

    /doi/10.5555/3563609.3563640

  • Alfnes F and Wasenden O. (2022). Your privacy for a discount? Exploring the willingness to share personal data for personalized offers. Telecommunications Policy. 46:7. Online publication date: 1-Aug-2022.

    https://doi.org/10.1016/j.telpol.2022.102308

  • Ben Salem R, Aïmeur E and Hage H. Aegis: An Agent for Multi-party Privacy Preservation. Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society. (68-77).

    https://doi.org/10.1145/3514094.3534134

  • Kyytsönen M, Ikonen J, Aalto A and Vehko T. (2022). The self-assessed information security skills of the Finnish population. Computers and Security. 118:C. Online publication date: 1-Jul-2022.

    https://doi.org/10.1016/j.cose.2022.102732

  • Bajaj A and Laknaoui W. (2022). Behavioral Inhibition as an Antecedent to Multi-Dimensional Attitudes Towards Surveillance Technology. International Journal of Information Systems and Social Change. 13:1. (1-17). Online publication date: 30-Jun-2022.

    https://doi.org/10.4018/IJISSC.303600

  • Wei T, Cao C and Shi Y. Personal Information Protection Behaviors of Consumers in Different Country Context and User Interface Designs. Cross-Cultural Design. Applications in Business, Communication, Health, Well-being, and Inclusiveness. (82-98).

    https://doi.org/10.1007/978-3-031-06050-2_7

  • Arzoglou E, Kortesniemi Y, Ruutu S and Elo T. Privacy Paradox in Social Media: A System Dynamics Analysis. Computational Science – ICCS 2022. (651-666).

    https://doi.org/10.1007/978-3-031-08751-6_47

  • Trestian R, Celeste E, Xie G, Lohar P, Bendechache M, Brennan R and Ta I. The Privacy Paradox - Investigating People's Attitude Towards Privacy in a Time of COVID-19. 2022 14th International Conference on Communications (COMM). (1-6).

    https://doi.org/10.1109/COMM54429.2022.9817170

  • Godinho de Matos M and Adjerid I. (2022). Consumer Consent and Firm Targeting After GDPR. Management Science. 68:5. (3330-3378). Online publication date: 1-May-2022.

    https://doi.org/10.1287/mnsc.2021.4054

  • Kurz C and König A. (2022). Predicting time preference from social media behavior. Future Generation Computer Systems. 130:C. (155-163). Online publication date: 1-May-2022.

    https://doi.org/10.1016/j.future.2021.12.017

  • Seberger J, Shklovski I, Swiatek E and Patil S. Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. (1-19).

    https://doi.org/10.1145/3491102.3502112

  • Albayaydh W and Flechais I. Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. (1-24).

    https://doi.org/10.1145/3491102.3502097

  • Jung K, Park Y, Kim H and Lee J. Let's Talk @Clubhouse: Exploring Voice-Centered Social Media Platform and its Opportunities, Challenges, and Design Guidelines. Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. (1-6).

    https://doi.org/10.1145/3491101.3519774

  • Park J, Ahmed E, Asif H, Vaidya J and Singh V. Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users. Information for a Better World: Shaping the Global Future. (332-346).

    https://doi.org/10.1007/978-3-030-96960-8_22

  • Parkin S, Chua Y, Groß T and Viganò L. (2022). A cyber-risk framework for coordination of the prevention and preservation of behaviours. Journal of Computer Security. 30:3. (327-356). Online publication date: 1-Jan-2022.

    https://doi.org/10.3233/JCS-210047

  • Pal R, Light C, Dong Y, Liu M, Wang Y, Ghosh P, Nagubandi H, Golubchik L, Nag B and De S. Do people favor personal data markets in a surveillance society?. Proceedings of the Winter Simulation Conference. (1-12).

    /doi/10.5555/3522802.3523035

  • Bandara R, Fernando M and Akter S. (2021). Construing online consumers’ information privacy decisions. Information and Management. 58:7. Online publication date: 1-Nov-2021.

    https://doi.org/10.1016/j.im.2021.103497

  • McDonald N and Forte A. (2021). Powerful Privacy Norms in Social Network Discourse. Proceedings of the ACM on Human-Computer Interaction. 5:CSCW2. (1-27). Online publication date: 13-Oct-2021.

    https://doi.org/10.1145/3479565

  • Huang Y, Li W, Wang J, Cai Z and Bourgeois A. (2022). Privacy protection among three antithetic-parties for context-aware services. Journal of Network and Computer Applications. 191:C. Online publication date: 1-Oct-2021.

    https://doi.org/10.1016/j.jnca.2021.103115

  • Moriarty J. (2021). Why online personalized pricing is unfair. Ethics and Information Technology. 23:3. (495-503). Online publication date: 1-Sep-2021.

    https://doi.org/10.1007/s10676-021-09592-0

  • Tahaei M, Frik A and Vaniea K. Deciding on personalized ads. Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security. (573-595).

    /doi/10.5555/3563572.3563602

  • Zhang-Kennedy L and Chiasson S. "Whether it's moral is a whole other story". Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security. (197-216).

    /doi/10.5555/3563572.3563583

  • Vimalkumar M, Sharma S, Singh J and Dwivedi Y. (2021). ‘Okay google, what about my privacy?’. Computers in Human Behavior. 120:C. Online publication date: 1-Jul-2021.

    https://doi.org/10.1016/j.chb.2021.106763

  • Tamò-Larrieux A, Zihlmann Z, Garcia K and Mayer S. The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy. Privacy Technologies and Policy. (3-22).

    https://doi.org/10.1007/978-3-030-76663-4_1

  • Holt J, Nicholson J and Smeddinck J. From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data. Proceedings of the Web Conference 2021. (2745-2756).

    https://doi.org/10.1145/3442381.3450030

  • Ortloff A, Zimmerman S, Elsweiler D and Henze N. The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment. Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. (63-73).

    https://doi.org/10.1145/3406522.3446014

  • Coopamootoo K. Usage Patterns of Privacy-Enhancing Technologies. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. (1371-1390).

    https://doi.org/10.1145/3372297.3423347

  • Doty P. (2020). Oxymorons of privacy and surveillance in “smart homes”. Proceedings of the Association for Information Science and Technology. 57:1. Online publication date: 22-Oct-2020.

    https://doi.org/10.1002/pra2.222

  • Ioannou A, Tussyadiah I and Lu Y. (2020). Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management: The Journal for Information Professionals. 54:C. Online publication date: 1-Oct-2020.

    https://doi.org/10.1016/j.ijinfomgt.2020.102122

  • Arend I, Shabtai A, Idan T, Keinan R and Bereby-Meyer Y. (2020). Passive- and not active-risk tendencies predict cyber security behavior. Computers and Security. 97:C. Online publication date: 1-Oct-2020.

    https://doi.org/10.1016/j.cose.2020.101964

  • Sun Q, Willemsen M and Knijnenburg B. (2020). Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing. Computers and Security. 97:C. Online publication date: 1-Oct-2020.

    https://doi.org/10.1016/j.cose.2020.101924

  • Parkin S and Chua Y. Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Socio-Technical Aspects in Security and Trust. (23-42).

    https://doi.org/10.1007/978-3-030-79318-0_2

  • McDonald N, Larsen A, Battisti A, Madjaroff G, Massey A and Mentis H. Realizing choice. Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security. (99-110).

    /doi/10.5555/3488905.3488911

  • Richards K. Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability. HCI for Cybersecurity, Privacy and Trust. (499-512).

    https://doi.org/10.1007/978-3-030-50309-3_33

  • Koltsova O, Sinyavskaya Y and Terpilovskii M. Designing an Experiment on Recognition of Political Fake News by Social Media Users: Factors of Dropout. Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis. (261-277).

    https://doi.org/10.1007/978-3-030-49570-1_18

  • Jozani M, Ayaburi E, Ko M and Choo K. (2020). Privacy concerns and benefits of engagement with social media-enabled apps. Computers in Human Behavior. 107:C. Online publication date: 1-Jun-2020.

    https://doi.org/10.1016/j.chb.2020.106260

  • Huh-Yoo J and Rader E. (2020). It's the Wild, Wild West: Lessons Learned From IRB Members' Risk Perceptions Toward Digital Research Data. Proceedings of the ACM on Human-Computer Interaction. 4:CSCW1. (1-22). Online publication date: 28-May-2020.

    https://doi.org/10.1145/3392868

  • Seymour W, Kraemer M, Binns R and Van Kleek M. Informing the Design of Privacy-Empowering Tools for the Connected Home. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. (1-14).

    https://doi.org/10.1145/3313831.3376264

  • Ferra F, Wagner I, Boiten E, Hadlington L, Psychoula I and Snape R. (2020). Challenges in assessing privacy impact. Security and Privacy. 3:2. Online publication date: 3-Mar-2020.

    https://doi.org/10.1002/spy2.101

  • Rook L, Sabic A and Zanker M. (2020). Engagement in proactive recommendations. Journal of Intelligent Information Systems. 54:1. (79-100). Online publication date: 1-Feb-2020.

    https://doi.org/10.1007/s10844-018-0529-0

  • Aivazpour Z and Rao V. (2020). Information Disclosure and Privacy Paradox. ACM SIGMIS Database: the DATABASE for Advances in Information Systems. 51:1. (14-36). Online publication date: 21-Jan-2020.

    https://doi.org/10.1145/3380799.3380803

  • de Lima Salgado A, Dias F, Mattos J, de Mattos Fortes R and Hung P. Smart toys and children's privacy. Proceedings of the 37th ACM International Conference on the Design of Communication. (1-8).

    https://doi.org/10.1145/3328020.3353951

  • Daems K, De Pelsmacker P and Moons I. (2019). The effect of ad integration and interactivity on young teenagers’ memory, brand attitude and personal data sharing. Computers in Human Behavior. 99:C. (245-259). Online publication date: 1-Oct-2019.

    https://doi.org/10.1016/j.chb.2019.05.031

  • Vgena K, Kitsiou A, Kalloniatis C and Kavroudakis D. Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing. Trust, Privacy and Security in Digital Business. (3-16).

    https://doi.org/10.1007/978-3-030-27813-7_1

  • Apthorpe N, Varghese S and Feamster N. Evaluating the contextual integrity of privacy regulation. Proceedings of the 28th USENIX Conference on Security Symposium. (123-140).

    /doi/10.5555/3361338.3361348

  • Ayalon O and Toch E. Evaluating users' perceptions about a system's privacy. Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security. (41-59).

    /doi/10.5555/3361476.3361480

  • Li P, Cho H and Goh Z. (2019). Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus. Telematics and Informatics. 41:C. (114-125). Online publication date: 1-Aug-2019.

    https://doi.org/10.1016/j.tele.2019.04.006

  • Barth S, de Jong M, Junger M, Hartel P and Roppelt J. (2019). Putting the privacy paradox to the test. Telematics and Informatics. 41:C. (55-69). Online publication date: 1-Aug-2019.

    https://doi.org/10.1016/j.tele.2019.03.003

  • Alaqra A and Wästlund E. Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors. HCI for Cybersecurity, Privacy and Trust. (355-370).

    https://doi.org/10.1007/978-3-030-22351-9_24

  • Khan Z and Shaw N. Adding ‘Social’ to Commerce to Influence Purchasing Behaviour. HCI in Business, Government and Organizations. eCommerce and Consumer Behavior. (257-273).

    https://doi.org/10.1007/978-3-030-22335-9_17

  • Vassallo M. (2019). The Privacy Paradox in the Big Data Era? No Thanks, We Are the E-People. International Journal of Cyber Behavior, Psychology and Learning. 9:3. (32-47). Online publication date: 1-Jul-2019.

    https://doi.org/10.4018/IJCBPL.2019070103

  • Anic I, Škare V and Kursan Milaković I. (2019). The determinants and effects of online privacy concerns in the context of e-commerce. Electronic Commerce Research and Applications. 36:C. Online publication date: 1-Jul-2019.

    https://doi.org/10.1016/j.elerap.2019.100868

  • Kim K, Kim K, Lee D and Kim M. (2019). Identification of critical quality dimensions for continuance intention in mHealth services. International Journal of Information Management: The Journal for Information Professionals. 46:C. (187-197). Online publication date: 1-Jun-2019.

    https://doi.org/10.1016/j.ijinfomgt.2018.12.008

  • Gonzalez-Compean J, Telles O, Lopez-Arevalo I, Morales-Sandoval M, Sosa-Sosa V and Carretero J. (2019). A policy-based containerized filter for secure information sharing in organizational environments. Future Generation Computer Systems. 95:C. (430-444). Online publication date: 1-Jun-2019.

    https://doi.org/10.1016/j.future.2019.01.002

  • Saia R and Carta S. (2019). Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks. Future Generation Computer Systems. 93:C. (18-32). Online publication date: 1-Apr-2019.

    https://doi.org/10.1016/j.future.2018.10.016

  • Han X, Liu Y, Wang J and Tian D. (2019). Computational habitual privacy. Transactions on Emerging Telecommunications Technologies. 30:3. Online publication date: 18-Mar-2019.

    https://doi.org/10.1002/ett.3509

  • Slade S, Prinsloo P and Khalil M. Learning analytics at the intersections of student trust, disclosure and benefit. Proceedings of the 9th International Conference on Learning Analytics & Knowledge. (235-244).

    https://doi.org/10.1145/3303772.3303796

  • Wu P. (2019). The privacy paradox in the context of online social networking. Journal of the Association for Information Science and Technology. 70:3. (207-217). Online publication date: 6-Feb-2019.

    https://doi.org/10.1002/asi.24113

  • Huang H and Bashir M. (2019). Surfing safely. Proceedings of the Association for Information Science and Technology. 55:1. (188-197). Online publication date: 1-Feb-2019.

    https://doi.org/10.1002/pra2.2018.14505501021

  • Paci F, Squicciarini A and Zannone N. (2018). Survey on Access Control for Community-Centered Collaborative Systems. ACM Computing Surveys. 51:1. (1-38). Online publication date: 31-Jan-2019.

    https://doi.org/10.1145/3146025

  • Ferreira A, Teles S and Vieira-Marques P. (2019). SoTRAACE for smart security in ambient assisted living. Journal of Ambient Intelligence and Smart Environments. 11:4. (323-334). Online publication date: 1-Jan-2019.

    https://doi.org/10.3233/AIS-190531

  • Farhang S, Weidman J, Kamani M, Grossklags J and Liu P. Take It or Leave It. Proceedings of the 34th Annual Computer Security Applications Conference. (490-504).

    https://doi.org/10.1145/3274694.3274733

  • Chen Z and Cheung M. (2018). Privacy perception and protection on Chinese social media. Ethics and Information Technology. 20:4. (279-289). Online publication date: 1-Dec-2018.

    https://doi.org/10.1007/s10676-018-9480-6

  • Kim J, Gambino A, Sundar S, Rosson M, Aritajati C, Ge J and Fanning C. (2018). Interface Cues to Promote Disclosure and Build Community. Proceedings of the ACM on Human-Computer Interaction. 2:CSCW. (1-18). Online publication date: 1-Nov-2018.

    https://doi.org/10.1145/3274359

  • Tan J, Sharif M, Bhagavatula S, Beckerle M, Mazurek M and Bauer L. Comparing Hypothetical and Realistic Privacy Valuations. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. (168-182).

    https://doi.org/10.1145/3267323.3268961

  • Rueben M, Aroyo A, Lutz C, Schmölz J, Van Cleynenbreugel P, Corti A, Agrawal S and Smart W. Themes and Research Directions in Privacy-Sensitive Robotics. 2018 IEEE Workshop on Advanced Robotics and its Social Impacts (ARSO). (77-84).

    https://doi.org/10.1109/ARSO.2018.8625758

  • Zou Y, Mhaidli A, McCall A and Schaub F. "I've got nothing to lose". Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security. (197-216).

    /doi/10.5555/3291228.3291245

  • Habib H, Emami-Naeini P, Devlin S, Oates M, Swoopes C, Bauer L, Christin N and Cranor L. User behaviors and attitudes under password expiration policies. Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security. (13-30).

    /doi/10.5555/3291228.3291231

  • Gerber N, Gerber P and Volkamer M. (2018). Explaining the privacy paradox. Computers and Security. 77:C. (226-261). Online publication date: 1-Aug-2018.

    https://doi.org/10.1016/j.cose.2018.04.002

  • Symeonidis I, Biczók G, Shirazi F, Pérez-Solà C, Schroers J and Preneel B. (2018). Collateral damage of Facebook third-party applications. Computers and Security. 77:C. (179-208). Online publication date: 1-Aug-2018.

    https://doi.org/10.1016/j.cose.2018.03.015

  • Claybaugh C, Chen L, Haried P and Zhou D. Risk and Information Disclosure in Google Drive Sharing of Tax Data. HCI in Business, Government, and Organizations. (42-50).

    https://doi.org/10.1007/978-3-319-91716-0_4

  • Rudolph M, Feth D and Polst S. Why Users Ignore Privacy Policies – A Survey and Intention Model for Explaining User Privacy Behavior. Human-Computer Interaction. Theories, Methods, and Human Issues. (587-598).

    https://doi.org/10.1007/978-3-319-91238-7_45

  • Heravi A, Mubarak S and Raymond Choo K. (2018). Information privacy in online social networks. Computers in Human Behavior. 84:C. (441-459). Online publication date: 1-Jul-2018.

    https://doi.org/10.1016/j.chb.2018.03.016

  • Zou Y and Schaub F. Concern But No Action. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. (1-6).

    https://doi.org/10.1145/3170427.3188510

  • van Schaik P, Jansen J, Onibokun J, Camp J and Kusev P. (2018). Security and privacy in online social networking. Computers in Human Behavior. 78:C. (283-297). Online publication date: 1-Jan-2018.

    https://doi.org/10.1016/j.chb.2017.10.007

  • Steinfeld N. (2017). Track me, track me not. Telematics and Informatics. 34:8. (1663-1672). Online publication date: 1-Dec-2017.

    https://doi.org/10.1016/j.tele.2017.07.012

  • Barth S and de Jong M. (2017). The privacy paradox Investigating discrepancies between expressed privacy concerns and actual online behavior A systematic literature review. Telematics and Informatics. 34:7. (1038-1058). Online publication date: 1-Nov-2017.

    https://doi.org/10.1016/j.tele.2017.04.013

  • Hew J, Tan G, Lin B and Ooi K. (2017). Generating travel-related contents through mobile social tourism. Telematics and Informatics. 34:7. (914-935). Online publication date: 1-Nov-2017.

    https://doi.org/10.1016/j.tele.2017.04.001

  • Gerber N, Gerber P and Hernando M. Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook. Human Aspects of Information Security, Privacy and Trust. (640-655).

    https://doi.org/10.1007/978-3-319-58460-7_44

  • Anastasopoulou K, Kokolakis S and Andriotis P. Privacy Decision-Making in the Digital Era: A Game Theoretic Review. Human Aspects of Information Security, Privacy and Trust. (589-603).

    https://doi.org/10.1007/978-3-319-58460-7_41

  • Chua H, Herbland A, Wong S and Chang Y. (2017). Compliance to personal data protection principles. Telematics and Informatics. 34:4. (157-170). Online publication date: 1-Jul-2017.

    https://doi.org/10.1016/j.tele.2017.01.008

  • Hallam C and Zanella G. (2017). Online self-disclosure. Computers in Human Behavior. 68:C. (217-227). Online publication date: 1-Mar-2017.

    https://doi.org/10.1016/j.chb.2016.11.033

  • Mendel T and Toch E. Susceptibility to Social Influence of Privacy Behaviors. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. (581-593).

    https://doi.org/10.1145/2998181.2998323

  • (2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.

    /doi/10.5555/3192245.3192252

  • (2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.

    /doi/10.5555/3192237.3192244

  • (2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.

    /doi/10.5555/3192229.3192236

  • (2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.

    /doi/10.5555/3192221.3192228

  • Bandara R, Fernando M and Akter S. (2017). The Privacy Paradox in the Data-Driven Marketplace. Procedia Computer Science. 121:C. (562-567). Online publication date: 1-Jan-2017.

    https://doi.org/10.1016/j.procs.2017.11.074