Author:
Nofer Michael,Hinz Oliver,Muntermann Jan,Roßnagel Heiko
Publisher
Springer Science and Business Media LLC
Reference74 articles.
1. Ackerman M (2004) Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing 8(6):430–439
2. Acquisti A, Friedman A, Telang R (2006) Is there a cost to privacy breaches? An event study. In: Proc 27th international conference on information systems, Milwaukee
3. Andoh-Baidoo FK, Amoako-Gyampah K, Osei-Bryson KM (2010) How Internet security breaches harm market value. IEEE Security and Privacy 8(1):36–42
4. Barber BM, Odean T (2001) Boys will be boys: gender, overconfidence, and common stock investment. Quarterly Journal of Economics 116(1):261–292
5. Belanger F, Hiller JS, Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11(3-4):245–270
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献