Skip to main content Accessibility help
  • Print publication year: 2018
  • Online publication date: April 2018

10 - Privacy and Human Behavior in the Information Age*

from Part III - Ethical and Legal Reservations about Tracking Technologies
1.Mayer-Schönberger, V., Delete: The Virtue of Forgetting in the Digital Age (Princeton Univ. Press, Princeton, 2011).
2.Sweeney, L., Int. J. Uncert. Fuzziness Knowl. Based Syst. 10, 557570 (2002).
3.McAfee, A., Brynjolfsson, E., Harv. Bus. Rev. 90, 6066, 68, 128 (2012).
4.Tatonetti, N. P., Ye, P. P., Daneshjou, R., Altman, R. B., Sci. Transl. Med. 4, 125ra31 (2012).
5.Cohen, J. E., Stanford Law Rev. 52, 13731438 (2000).
6.Crawford, K., Miltner, K., Gray, M. L., Int. J. Commun. 8, 16631672 (2014).
7.Posner, R. A., Am. Econ. Rev. 71, 405409 (1981).
8.Solove, D. J., Harv. Law Rev. 126, 18801903 (2013).
9.Solove, D. J., Univ. Penn. L. Rev. 154, 477564 (2006).
10.Schoeman, F., Ed., Philosophical Dimensions of Privacy: An Anthology (Cambridge Univ. Press, New York, 1984).
11.DePaulo, B. M., Wetzel, C., Weylin Sternglanz, R., Wilson, M. J. W., J. Soc. Issues 59, 391410 (2003).
12.Margulis, S. T., J. Soc. Issues 59, 243261 (2003).
13.Goffman, E., Relations in Public: Microstudies of the Public Order (Harper & Row, New York, 1971).
14.Sundstrom, E., Altman, I., Hum. Ecol. 4, 4767 (1976).
15.Schwartz, B., Am. J. Sociol. 73, 741752 (1968).
16.Laufer, R. S., Wolfe, M., J. Soc. Issues 33, 2242 (1977).
17.Tsai, J. Y., Egelman, S., Cranor, L., Acquisti, A., Inf. Syst. Res. 22, 254268 (2011).
18.Slovic, P., Am. Psychol. 50, 364371 (1995).
19.Singer, E., Hippler, H., Schwarz, N., Int. J. Public Opin. Res. 4, 256268 (1992).
20.Skotko, V. P., Langmeyer, D., Sociometry 40, 178182 (1977).
21.A. Westin, Harris Louis & Associates, Harris-Equifax Consumer Privacy Survey (Tech. rep. 1991).
22.Culnan, M. J., Armstrong, P. K., Organ. Sci. 10, 104115 (1999).
23.Smith, H. J., Milberg, S. J., Burke, S. J., Manage. Inf. Syst. Q. 20, 167196 (1996).
24.Lubin, B., Harrison, R. L., Psychol. Rep. 15, 7778 (1964).
25.Spiekermann, S., Grossklags, J., Berendt, B., E-Privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior (Third ACM Conference on Electronic Commerce, Tampa, 2001), pp. 3847.
26.Norberg, P. A., Horne, D. R., Horne, D. A., J. Consum. Aff. 41, 100126 (2007).
27.Ajzen, I., Fishbein, M., Psychol. Bull. 84, 888918 (1977).
28.Klopfer, P. H., Rubenstein, D. I., J. Soc. Issues 33, 5265 (1977).
29.Acquisti, A., Gross, R., in Privacy Enhancing Technologies, Danezis, G., Golle, P. Eds. (Springer, New York, 2006), pp. 3658.
30.Acquisti, A., Privacy in Electronic Commerce and the Economics of Immediate Gratification (Fifth ACM Conference on Electronic Commerce, New York, 2004), pp. 2129.
31.Hann, I., Hui, K., Lee, S. T., Png, I. P. L., J. Manage. Inf. Syst. 24, 1342 (2007).
32.Acquisti, A., John, L. K., Loewenstein, G., J. Legal Stud. 42, 249274 (2013).
33.Altman, I., Taylor, D., Social Penetration: The Development of Interpersonal Relationships (Holt, Rinehart & Winston, New York, 1973).
34.Frattaroli, J., Psychol. Bull. 132, 823865 (2006).
35.Pennebaker, J. W., Behav. Res. Ther. 31, 539548 (1993).
36.Steinfield, C., Ellison, N. B., Lampe, C., J. Appl. Dev. Psychol. 29, 434445 (2008).
37.Toma, C. L., Hancock, J. T., Pers. Soc. Psychol. Bull. 39, 321331 (2013).
38.Tamir, D. I., Mitchell, J. P., Proc. Natl. Acad. Sci. U.S.A. 109, 80388043 (2012).
39.Westin, A., Privacy and Freedom (Athenäum, New York, 1967).
40.Hoofnagle, C. J., Urban, J. M., Wake Forest Law Rev. 49, 261321 (2014).
41.Marx, G., Ethics Inf. Technol. 3, 157169 (2001).
42.Thibaut, J. W., Kelley, H. H., The Social Psychology of Groups (Wiley, Oxford, 1959).
43.Nissenbaum, H., Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Univ. Press, Redwood City, 2009).
44.Boyd, d., It’s Complicated: The Social Lives of Networked Teens (Yale Univ. Press, New Haven, 2014).
45.Stutzman, F., Gross, R., Acquisti, A., J. Priv. Confidential. 4, 741 (2013).
46.Xu, H., Teo, H. H., Tan, B. C., Agarwal, R., J. Manage. Inf. Syst. 26, 135174 (2009).
47.John, L. K., Acquisti, A., Loewenstein, G., J. Consum. Res. 37, 858873 (2011).
48.Altman, I., The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding (Cole, Monterey, 1975).
49.Chaikin, A. L., Derlega, V. J., Miller, S. J., J. Couns. Psychol. 23, 479481 (1976).
50.Derlega, V. J., Chaikin, A. L., J. Soc. Issues 33, 102115 (1977).
51.Acquisti, A., John, L. K., Loewenstein, G., J. Mark. Res. 49, 160174 (2012).
52.Moon, Y., J. Consum. Res. 26, 323339 (2000).
53.Petronio, S., Boundaries of Privacy: Dialectics of Disclosure (SUNY Press, Albany, 2002).
54.Stutzman, F., Kramer-Duffield, J., Friends Only: Examining a Privacy-Enhancing Behavior in Facebook (SIGCHI Conference on Human Factors in Computing Systems, ACM, Atlanta, 2010), pp. 15531562.
55.Honess, T., Charman, E., Closed Circuit Television in Public Places: Its Acceptability and Perceived Effectiveness (Police Research Group, London, 1992).
56.Gagné, M., Deci, E. L., J. Organ. Behav. 26, 331362 (2005).
57.Oulasvirta, A. et al., Long-Term Effects of Ubiquitous Surveillance in the Home (ACM Conference on Ubiquitous Computing, Pittsburgh, 2012), pp. 4150.
58.Palen, L., Dourish, P., Unpacking “Privacy” For a Networked World (SIGCHI Conference on Human Factors in Computing Systems, ACM, Fort Lauderdale, 2003), pp. 129136.
59.Tufekci, Z., Bull. Sci. Technol. Soc. 28, 2036 (2008).
60.Bargh, J. A., McKenna, K. Y. A., Fitzsimons, G. M., J. Soc. Issues 58, 3348 (2002).
61.Calo, R., Geo. Wash. L. Rev. 82, 9951304 (2014).
62.Johnson, E. J., Goldstein, D., Science 302, 13381339 (2003).
63.McKenzie, C. R., Liersch, M. J., Finkelstein, S. R., Psychol. Sci. 17, 414420 (2006).
64.Gross, R., Acquisti, A., Information Revelation and Privacy in Online Social Networks (ACM Workshop–Privacy in the Electronic Society, New York, 2005), pp. 7180.
65.Johnson, E. J., Bellman, S., Lohse, G. L., Mark. Lett. 13, 515 (2002).
66.Hartzog, W., Am. Univ. L. Rev. 60, 16351671 (2010).
67.Conti, G., Sobiesk, E., Malicious Interface Design: Exploiting the User (19th International Conference on World Wide Web, ACM, Raleigh, 2010), pp. 271280.
68.Goldfarb, A., Tucker, C., Mark. Sci. 30, 389404 (2011).
69.White, T. B., Zahay, D. L., Thorbjørnsen, H., Shavitt, S., Mark. Lett. 19, 3950 (2008).
70.Smith, H. J., Dinev, T., Xu, H., Manage. Inf. Syst. Q. 35, 9891016 (2011).
71.Brandimarte, L., Acquisti, A., Loewenstein, G., Soc. Psychol. Personal. Sci. 4, 340347 (2013).
72.Jensen, C., Potts, C., Jensen, C., Int. J. Hum. Comput. Stud. 63, 203227 (2005).
73.Jensen, C., Potts, C., Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices (SIGCHI Conference on Human factors in computing systems, ACM, Vienna, 2004), pp. 471478.
74.McDonald, A. M., Cranor, L. F., I/S: J. L. Policy Inf. Society. 4, 540565 (2008).
75.Wedekind, C., Milinski, M., Science 288, 850852 (2000).
76.Rigdon, M., Ishii, K., Watabe, M., Kitayama, S., J. Econ. Psychol. 30, 358367 (2009).
77.Kiesler, S., Siegel, J., McGuire, T. W., Am. Psychol. 39, 11231134 (1984).
78.Joinson, A. N., Eur. J. Soc. Psychol. 31, 177192 (2001).
79.Weisband, S., Kiesler, S., Self-Disclosure on Computer Forms: Meta-Analysis and Implications (SIGCHI Conference Conference on Human Factors in Computing Systems, ACM, Vancouver, 1996), pp. 310.
80.Tourangeau, R., Yan, T., Psychol. Bull. 133, 859883 (2007).
81.Postmes, T., Spears, R., Psychol. Bull. 123, 238259 (1998).
82.Zhong, C. B., Bohns, V. K., Gino, F., Psychol. Sci. 21, 311314 (2010).
83.Suler, J., Cyberpsychol. Behav. 7, 321326 (2004).
84.Shariff, A. F., Norenzayan, A., Psychol. Sci. 18, 803809 (2007).
85.Moore, B., Privacy: Studies in Social and Cultural History (Armonk, New York, 1984).
86.Records, Computers and the Rights of Citizens (Secretary’s Advisory Committee, US Dept. of Health, Education and Welfare, Washington, DC, 1973).
87.Hargittai, E., in Social Stratification, Grusky, D. Ed. (Westview, Boulder, 2008), pp. 936113.
88.Ariès, P., Duby, G. (Eds.), A History of Private Life: From Pagan Rome to Byzantium (Harvard Univ. Press, Cambridge, 1992).
89.Murphy, R. F., Am. Anthropol. 66, 12571274 (1964).
90.Westin, A., in Philosophical Dimensions of Privacy: An Anthology, Schoeman, F.D. Ed. (Cambridge Univ. Press, Cambridge, 1984), pp. 5674.
91.Altman, I., J. Soc. Issues 33, 6684 (1977).
92.Hayat, M. A., Inf. Comm. Tech. L. 16, 137148 (2007).
93.Enkin, A., “Privacy,” (2014).
94.Rykwert, J., Soc. Res. (New York) 68, 2940 (2001).
95.Whitman, C. B., in Individualism and Holism: Studies in Confucian and Taoist Values, Munro, D. J., Ed. (Center for Chinese Studies, Univ. Michigan, Ann Arbor, 1985), pp. 85100.