Alfieri C, Di Rocco J, Inverardi P and T. Nguyen P.
(2024). Exploring user privacy awareness on GitHub: an empirical study. Empirical Software Engineering. 29:6. Online publication date: 1-Nov-2024.
Ishida M, Ikematsu K and Igarashi Y.
(2024). Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing Environments. Proceedings of the ACM on Human-Computer Interaction. 8:ISS. (165-188). Online publication date: 24-Oct-2024.
Dong M.
(2024). Explaining Privacy Paradox on WeChat. International Journal of Information Security and Privacy. 18:1. (1-24). Online publication date: 15-Oct-2024.
Thilderkvist E and Dobslaw F.
(2024). On current limitations of online eye-tracking to study the visual processing of source code. Information and Software Technology. 174:C. Online publication date: 1-Oct-2024.
Gerasimou S and Limniotis K.
(2024). A study on privacy and security aspects of personalised apps. International Journal of Information Security. 23:5. (3217-3239). Online publication date: 1-Oct-2024.
Lieberknecht A. Exploring Determinants of Parental Engagement in Online Privacy Protection: A Qualitative Approach. Proceedings of the 2024 European Symposium on Usable Security. (94-111).
Windl M, Schlegel M and Mayer S.
(2024). Exploring Users' Mental Models and Privacy Concerns During Interconnected Interactions. Proceedings of the ACM on Human-Computer Interaction. 8:MHCI. (1-23). Online publication date: 24-Sep-2024.
Nam S and Kwon Y.
(2024). Is pay-or-consent for privacy justifiable? Evidence from different users' privacy attitudes toward behavioral data collection in South Korea. Telecommunications Policy. 48:7. Online publication date: 1-Aug-2024.
Windl M and Feger S. Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration Options. Proceedings of the 2024 ACM Designing Interactive Systems Conference. (3372-3388).
Reeck C, Guo X, Dimoka A and Pavlou P.
(2024). Uncovering the Neural Processes of Privacy. Information Systems Research. 35:2. (727-746). Online publication date: 1-Jun-2024.
Liu Y, Wu Y, Li C, Song C and Hsu W.
(2024). Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo. Telecommunications Policy. 48:5. Online publication date: 1-Jun-2024.
Ladak A, Harris J and Anthis J. Which Artificial Intelligences Do People Care About Most? A Conjoint Experiment on Moral Consideration. Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. (1-11).
Lee H, Yang Y, Von Davier T, Forlizzi J and Das S. Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks. Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. (1-19).
Song Q, Ma R, Kou Y and Gui X.
(2024). Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. Wade. Proceedings of the ACM on Human-Computer Interaction. 8:CSCW1. (1-35). Online publication date: 17-Apr-2024.
Elmimouni H, Baumer E and Forte A.
(2024). On Being an Expert: Habitus as a Lens for Understanding Privacy Expertise. Proceedings of the ACM on Human-Computer Interaction. 8:CSCW1. (1-25). Online publication date: 17-Apr-2024.
Ali A, Zaaba Z and Singh M.
(2024). The rise of “security and privacy”: bibliometric analysis of computer privacy research. International Journal of Information Security. 23:2. (863-885). Online publication date: 1-Apr-2024.
Saxborn M, Pan Y and Said A. Trust Through Recommendation in E-commerce. Proceedings of the 2024 Conference on Human Information Interaction and Retrieval. (87-96).
Choi D and Lowry P.
(2024). Balancing the commitment to the common good and the protection of personal privacy. Information and Management. 61:1. Online publication date: 1-Jan-2024.
Alashoor T, Keil M, Smith H and McConnell A.
(2023). Too Tired and in Too Good of a Mood to Worry About Privacy. Information Systems Research. 34:4. (1415-1436). Online publication date: 1-Dec-2023.
Gieselmann M and Sassenberg K.
(2023). The More Competent, the Better? The Effects of Perceived Competencies on Disclosure Towards Conversational Artificial Intelligence. Social Science Computer Review. 41:6. (2342-2363). Online publication date: 1-Dec-2023.
Gupta S, Kamboj S and Bag S.
(2023). Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain. Information Systems Frontiers. 25:6. (2257-2274). Online publication date: 1-Dec-2023.
Yuan X, Ye H, Tang Z, Zhu X, Yao Y and Tong X. RedCapes: the Design and Evaluation of a Game Towards Improving Autistic Children's Privacy Awareness. Proceedings of the Eleventh International Symposium of Chinese CHI. (110-126).
Shams S and Reinhardt D. Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies. Proceedings of the 2023 European Symposium on Usable Security. (253-259).
Huang Z and Huang T.
(2023). Privacy Calculus Theory in the Digital Government Context. Social Science Computer Review. 41:5. (1745-1766). Online publication date: 1-Oct-2023.
Dogruel L, Joeckel S and Henke J.
(2023). Disclosing Personal Information in mHealth Apps. Testing the Role of Privacy Attitudes, App Habits, and Social Norm Cues. Social Science Computer Review. 41:5. (1791-1810). Online publication date: 1-Oct-2023.
Liu H, Li K, Chen Y and Luo X.
(2023). Is personally identifiable information really more valuable? Evidence from consumers' willingness-to-accept valuation of their privacy information. Decision Support Systems. 173:C. Online publication date: 1-Oct-2023.
Liu C, Zhu T, Zhang J and Zhou W.
(2022). Privacy Intelligence: A Survey on Image Privacy in Online Social Networks. ACM Computing Surveys. 55:8. (1-35). Online publication date: 31-Aug-2023.
Moniz D, Mehrnezhad M and Almeida T. Intimate Data: Exploring Perceptions of Privacy and Privacy-Seeking Behaviors Through the Story Completion Method. Human-Computer Interaction – INTERACT 2023. (533-543).
Ma Y, Zhou Q, Tag B, Sarsenbayeva Z, Knibbe J and Goncalves J. “Hello, Fellow Villager!”: Perceptions and Impact of Displaying Users’ Locations on Weibo. Human-Computer Interaction – INTERACT 2023. (511-532).
Rijshouwer E and van Zoonen L.
(2023). Doing Research With a Gamified Survey. Social Science Computer Review. 41:4. (1363-1380). Online publication date: 1-Aug-2023.
Pathmabandu C, Grundy J, Chhetri M and Baig Z.
(2023). Privacy for IoT. Future Generation Computer Systems. 145:C. (367-383). Online publication date: 1-Aug-2023.
Speck S, Pauli C, Ursprung C, Wallimann M, Huber R and Misoch S. “I Simply Accept the Terms and Conditions so that I Can Use an App at All”: Smartphone Use and Privacy Among Older Adults in Switzerland. HCI International 2023 – Late Breaking Papers. (191-202).
Gieselmann M and Sassenberg K. The Relevance of Perceived Interactivity for Disclosure Towards Conversational Artificial Intelligence. Artificial Intelligence in HCI. (55-67).
Alshomrani N, Furnell S and He Y. Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings. HCI for Cybersecurity, Privacy and Trust. (557-575).
Lenz J, Bozakov Z, Wendzel S and Vrhovec S.
(2023). Why people replace their aging smart devices. Computers and Security. 130:C. Online publication date: 1-Jul-2023.
Kulyk O, Renaud K and Costica S.
(2023). People want reassurance when making privacy-related decisions — Not technicalities. Journal of Systems and Software. 200:C. Online publication date: 1-Jun-2023.
Alimamy S and Kuhail M.
(2023). I will be with you Alexa! The impact of intelligent virtual assistant's authenticity and personalization on user reusage intentions. Computers in Human Behavior. 143:C. Online publication date: 1-Jun-2023.
Rehman S, Manickam S and Al-Charchafchi A.
(2022). Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university. Education and Information Technologies. 28:6. (7205-7223). Online publication date: 1-Jun-2023.
Jung F, Kaiser J, Von Holdt K, Heuten W and Meyer J. The Art of Privacy – A Theatrical Privacy Installation in Virtual Reality. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems. (1-5).
Rossmy B, Terzimehić N, Döring T, Buschek D and Wiethoff A. Point of no Undo: Irreversible Interactions as a Design Strategy. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. (1-18).
Elmimouni H, Shusas E, Skeba P, Baumer E and Forte A. What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies. Information for a Better World: Normality, Virtuality, Physicality, Inclusivity. (229-250).
van der Schyff K and Flowerday S.
(2023). The mediating role of perceived risks and benefits when self-disclosing. Computers and Security. 126:C. Online publication date: 1-Mar-2023.
Sandhu R, Vasconcelos-Gomes J, Thomas M and Oliveira T.
(2023). Unfolding the popularity of video conferencing apps – A privacy calculus perspective. International Journal of Information Management: The Journal for Information Professionals. 68:C. Online publication date: 1-Feb-2023.
Pan Y, Chen H and Yeh K.
(2023). Exploring the Privacy Paradox in Social Network Users. Mobile Information Systems. 2023. Online publication date: 1-Jan-2023.
Brunotte W, Specht A, Chazette L and Schneider K.
(2023). Privacy explanations – A means to end-user trust. Journal of Systems and Software. 195:C. Online publication date: 1-Jan-2023.
Seo D, Gharibdoust S and Mandl T.
(2022). Comparing factors affecting self-disclosure behavior between German and South Korean SNS users. Telematics and Informatics. 75:C. Online publication date: 1-Dec-2022.
Fleischhauer D, Engelstätter B and Tafreschi O. The Privacy Paradox in Smartphone Users. Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia. (62-70).
Maragkoudaki S and Kalloniatis C. Virtual Reality as a mean for increasing privacy awareness: The escape room example. Proceedings of the 26th Pan-Hellenic Conference on Informatics. (261-266).
Jung F, von Holdt K, Krüger R, Meyer J and Heuten W. I do. Do I? – Understanding User Perspectives on the Privacy Paradox. Proceedings of the 25th International Academic Mindtrek Conference. (268-277).
Chapman K, Klimes M, Wellman B, Smith G, Mondal M, Smith S, Chen Y, Hao H and Page X. A Privacy Paradox? Impact of Privacy Concerns on Willingness to Disclose COVID-19 Health Status in the United States. Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing. (159-162).
Garrido G, Sedlmeir J, Uludağ Ö, Alaoui I, Luckow A and Matthes F.
(2022). Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT. Journal of Network and Computer Applications. 207:C. Online publication date: 1-Nov-2022.
Schlatt V, Sedlmeir J, Feulner S and Urbach N.
(2022). Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity. Information and Management. 59:7. Online publication date: 1-Nov-2022.
Agesilaou A and Kyza E.
(2022). Whose data are they? Elementary school students’ conceptualization of data ownership and privacy of personal digital data. International Journal of Child-Computer Interaction. 33:C. Online publication date: 1-Sep-2022.
Hannibal G, Dobrosovestnova A and Weiss A. Tolerating Untrustworthy Robots: Studying Human Vulnerability Experience within a Privacy Scenario for Trust in Robots. 2022 31st IEEE International Conference on Robot and Human Interactive Communication (RO-MAN). (821-828).
Zibaei S, Malapaya D, Mercier B, Salehi-Abari A and Thorpe J. Do password managers nudge secure (random) passwords?. Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security. (581-597).
Alfnes F and Wasenden O.
(2022). Your privacy for a discount? Exploring the willingness to share personal data for personalized offers. Telecommunications Policy. 46:7. Online publication date: 1-Aug-2022.
Ben Salem R, Aïmeur E and Hage H. Aegis: An Agent for Multi-party Privacy Preservation. Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society. (68-77).
Kyytsönen M, Ikonen J, Aalto A and Vehko T.
(2022). The self-assessed information security skills of the Finnish population. Computers and Security. 118:C. Online publication date: 1-Jul-2022.
Bajaj A and Laknaoui W.
(2022). Behavioral Inhibition as an Antecedent to Multi-Dimensional Attitudes Towards Surveillance Technology. International Journal of Information Systems and Social Change. 13:1. (1-17). Online publication date: 30-Jun-2022.
Wei T, Cao C and Shi Y. Personal Information Protection Behaviors of Consumers in Different Country Context and User Interface Designs. Cross-Cultural Design. Applications in Business, Communication, Health, Well-being, and Inclusiveness. (82-98).
Arzoglou E, Kortesniemi Y, Ruutu S and Elo T. Privacy Paradox in Social Media: A System Dynamics Analysis. Computational Science – ICCS 2022. (651-666).
Trestian R, Celeste E, Xie G, Lohar P, Bendechache M, Brennan R and Ta I. The Privacy Paradox - Investigating People's Attitude Towards Privacy in a Time of COVID-19. 2022 14th International Conference on Communications (COMM). (1-6).
Godinho de Matos M and Adjerid I.
(2022). Consumer Consent and Firm Targeting After GDPR. Management Science. 68:5. (3330-3378). Online publication date: 1-May-2022.
Kurz C and König A.
(2022). Predicting time preference from social media behavior. Future Generation Computer Systems. 130:C. (155-163). Online publication date: 1-May-2022.
Seberger J, Shklovski I, Swiatek E and Patil S. Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. (1-19).
Albayaydh W and Flechais I. Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. (1-24).
Jung K, Park Y, Kim H and Lee J. Let's Talk @Clubhouse: Exploring Voice-Centered Social Media Platform and its Opportunities, Challenges, and Design Guidelines. Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. (1-6).
Park J, Ahmed E, Asif H, Vaidya J and Singh V. Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users. Information for a Better World: Shaping the Global Future. (332-346).
Parkin S, Chua Y, Groß T and Viganò L.
(2022). A cyber-risk framework for coordination of the prevention and preservation of behaviours. Journal of Computer Security. 30:3. (327-356). Online publication date: 1-Jan-2022.
Bandara R, Fernando M and Akter S.
(2021). Construing online consumers’ information privacy decisions. Information and Management. 58:7. Online publication date: 1-Nov-2021.
McDonald N and Forte A.
(2021). Powerful Privacy Norms in Social Network Discourse. Proceedings of the ACM on Human-Computer Interaction. 5:CSCW2. (1-27). Online publication date: 13-Oct-2021.
Huang Y, Li W, Wang J, Cai Z and Bourgeois A.
(2022). Privacy protection among three antithetic-parties for context-aware services. Journal of Network and Computer Applications. 191:C. Online publication date: 1-Oct-2021.
Moriarty J.
(2021). Why online personalized pricing is unfair. Ethics and Information Technology. 23:3. (495-503). Online publication date: 1-Sep-2021.
Tahaei M, Frik A and Vaniea K. Deciding on personalized ads. Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security. (573-595).
Zhang-Kennedy L and Chiasson S. "Whether it's moral is a whole other story". Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security. (197-216).
Vimalkumar M, Sharma S, Singh J and Dwivedi Y.
(2021). ‘Okay google, what about my privacy?’. Computers in Human Behavior. 120:C. Online publication date: 1-Jul-2021.
Tamò-Larrieux A, Zihlmann Z, Garcia K and Mayer S. The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy. Privacy Technologies and Policy. (3-22).
Holt J, Nicholson J and Smeddinck J. From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data. Proceedings of the Web Conference 2021. (2745-2756).
Ortloff A, Zimmerman S, Elsweiler D and Henze N. The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment. Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. (63-73).
Coopamootoo K. Usage Patterns of Privacy-Enhancing Technologies. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. (1371-1390).
Doty P.
(2020). Oxymorons of privacy and surveillance in “smart homes”. Proceedings of the Association for Information Science and Technology. 57:1. Online publication date: 22-Oct-2020.
Ioannou A, Tussyadiah I and Lu Y.
(2020). Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management: The Journal for Information Professionals. 54:C. Online publication date: 1-Oct-2020.
Arend I, Shabtai A, Idan T, Keinan R and Bereby-Meyer Y.
(2020). Passive- and not active-risk tendencies predict cyber security behavior. Computers and Security. 97:C. Online publication date: 1-Oct-2020.
Sun Q, Willemsen M and Knijnenburg B.
(2020). Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing. Computers and Security. 97:C. Online publication date: 1-Oct-2020.
Parkin S and Chua Y. Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Socio-Technical Aspects in Security and Trust. (23-42).
Richards K. Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability. HCI for Cybersecurity, Privacy and Trust. (499-512).
Koltsova O, Sinyavskaya Y and Terpilovskii M. Designing an Experiment on Recognition of Political Fake News by Social Media Users: Factors of Dropout. Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis. (261-277).
Jozani M, Ayaburi E, Ko M and Choo K.
(2020). Privacy concerns and benefits of engagement with social media-enabled apps. Computers in Human Behavior. 107:C. Online publication date: 1-Jun-2020.
Huh-Yoo J and Rader E.
(2020). It's the Wild, Wild West: Lessons Learned From IRB Members' Risk Perceptions Toward Digital Research Data. Proceedings of the ACM on Human-Computer Interaction. 4:CSCW1. (1-22). Online publication date: 28-May-2020.
Seymour W, Kraemer M, Binns R and Van Kleek M. Informing the Design of Privacy-Empowering Tools for the Connected Home. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. (1-14).
Rook L, Sabic A and Zanker M.
(2020). Engagement in proactive recommendations. Journal of Intelligent Information Systems. 54:1. (79-100). Online publication date: 1-Feb-2020.
Aivazpour Z and Rao V.
(2020). Information Disclosure and Privacy Paradox. ACM SIGMIS Database: the DATABASE for Advances in Information Systems. 51:1. (14-36). Online publication date: 21-Jan-2020.
Daems K, De Pelsmacker P and Moons I.
(2019). The effect of ad integration and interactivity on young teenagers’ memory, brand attitude and personal data sharing. Computers in Human Behavior. 99:C. (245-259). Online publication date: 1-Oct-2019.
Vgena K, Kitsiou A, Kalloniatis C and Kavroudakis D. Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing. Trust, Privacy and Security in Digital Business. (3-16).
Apthorpe N, Varghese S and Feamster N. Evaluating the contextual integrity of privacy regulation. Proceedings of the 28th USENIX Conference on Security Symposium. (123-140).
Ayalon O and Toch E. Evaluating users' perceptions about a system's privacy. Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security. (41-59).
Li P, Cho H and Goh Z.
(2019). Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus. Telematics and Informatics. 41:C. (114-125). Online publication date: 1-Aug-2019.
Barth S, de Jong M, Junger M, Hartel P and Roppelt J.
(2019). Putting the privacy paradox to the test. Telematics and Informatics. 41:C. (55-69). Online publication date: 1-Aug-2019.
Alaqra A and Wästlund E. Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors. HCI for Cybersecurity, Privacy and Trust. (355-370).
Khan Z and Shaw N. Adding ‘Social’ to Commerce to Influence Purchasing Behaviour. HCI in Business, Government and Organizations. eCommerce and Consumer Behavior. (257-273).
Vassallo M.
(2019). The Privacy Paradox in the Big Data Era? No Thanks, We Are the E-People. International Journal of Cyber Behavior, Psychology and Learning. 9:3. (32-47). Online publication date: 1-Jul-2019.
Anic I, Škare V and Kursan Milaković I.
(2019). The determinants and effects of online privacy concerns in the context of e-commerce. Electronic Commerce Research and Applications. 36:C. Online publication date: 1-Jul-2019.
Kim K, Kim K, Lee D and Kim M.
(2019). Identification of critical quality dimensions for continuance intention in mHealth services. International Journal of Information Management: The Journal for Information Professionals. 46:C. (187-197). Online publication date: 1-Jun-2019.
Saia R and Carta S.
(2019). Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks. Future Generation Computer Systems. 93:C. (18-32). Online publication date: 1-Apr-2019.
Han X, Liu Y, Wang J and Tian D.
(2019). Computational habitual privacy. Transactions on Emerging Telecommunications Technologies. 30:3. Online publication date: 18-Mar-2019.
Slade S, Prinsloo P and Khalil M. Learning analytics at the intersections of student trust, disclosure and benefit. Proceedings of the 9th International Conference on Learning Analytics & Knowledge. (235-244).
Wu P.
(2019). The privacy paradox in the context of online social networking. Journal of the Association for Information Science and Technology. 70:3. (207-217). Online publication date: 6-Feb-2019.
Huang H and Bashir M.
(2019). Surfing safely. Proceedings of the Association for Information Science and Technology. 55:1. (188-197). Online publication date: 1-Feb-2019.
Paci F, Squicciarini A and Zannone N.
(2018). Survey on Access Control for Community-Centered Collaborative Systems. ACM Computing Surveys. 51:1. (1-38). Online publication date: 31-Jan-2019.
Ferreira A, Teles S and Vieira-Marques P.
(2019). SoTRAACE for smart security in ambient assisted living. Journal of Ambient Intelligence and Smart Environments. 11:4. (323-334). Online publication date: 1-Jan-2019.
Chen Z and Cheung M.
(2018). Privacy perception and protection on Chinese social media. Ethics and Information Technology. 20:4. (279-289). Online publication date: 1-Dec-2018.
Kim J, Gambino A, Sundar S, Rosson M, Aritajati C, Ge J and Fanning C.
(2018). Interface Cues to Promote Disclosure and Build Community. Proceedings of the ACM on Human-Computer Interaction. 2:CSCW. (1-18). Online publication date: 1-Nov-2018.
Zou Y, Mhaidli A, McCall A and Schaub F. "I've got nothing to lose". Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security. (197-216).
Gerber N, Gerber P and Volkamer M.
(2018). Explaining the privacy paradox. Computers and Security. 77:C. (226-261). Online publication date: 1-Aug-2018.
Claybaugh C, Chen L, Haried P and Zhou D. Risk and Information Disclosure in Google Drive Sharing of Tax Data. HCI in Business, Government, and Organizations. (42-50).
Rudolph M, Feth D and Polst S. Why Users Ignore Privacy Policies – A Survey and Intention Model for Explaining User Privacy Behavior. Human-Computer Interaction. Theories, Methods, and Human Issues. (587-598).
Heravi A, Mubarak S and Raymond Choo K.
(2018). Information privacy in online social networks. Computers in Human Behavior. 84:C. (441-459). Online publication date: 1-Jul-2018.
van Schaik P, Jansen J, Onibokun J, Camp J and Kusev P.
(2018). Security and privacy in online social networking. Computers in Human Behavior. 78:C. (283-297). Online publication date: 1-Jan-2018.
Barth S and de Jong M.
(2017). The privacy paradox Investigating discrepancies between expressed privacy concerns and actual online behavior A systematic literature review. Telematics and Informatics. 34:7. (1038-1058). Online publication date: 1-Nov-2017.
Hew J, Tan G, Lin B and Ooi K.
(2017). Generating travel-related contents through mobile social tourism. Telematics and Informatics. 34:7. (914-935). Online publication date: 1-Nov-2017.
Gerber N, Gerber P and Hernando M. Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook. Human Aspects of Information Security, Privacy and Trust. (640-655).
Anastasopoulou K, Kokolakis S and Andriotis P. Privacy Decision-Making in the Digital Era: A Game Theoretic Review. Human Aspects of Information Security, Privacy and Trust. (589-603).
Chua H, Herbland A, Wong S and Chang Y.
(2017). Compliance to personal data protection principles. Telematics and Informatics. 34:4. (157-170). Online publication date: 1-Jul-2017.
Mendel T and Toch E. Susceptibility to Social Influence of Privacy Behaviors. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. (581-593).
(2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.
(2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.
(2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.
(2017). Determinants of information disclosure intention in mobile commerce. International Journal of Computer Applications in Technology. 56:4. (319-329). Online publication date: 1-Jan-2017.
Bandara R, Fernando M and Akter S.
(2017). The Privacy Paradox in the Data-Driven Marketplace. Procedia Computer Science. 121:C. (562-567). Online publication date: 1-Jan-2017.