User:Nankingaszz/Shadow Profile/Bibliography

Bibliography for Shadow Profile

 * 1) Papson, Scott and Ram. M. Narayanan. 2012. Classification via the Shadow Region in SAR Imagery. IEEE Transactions on Aerospace and Electronic Systems
 * 2) Hirano, Manabu, Natsuki Tsuzuki, Seishiro Ikeda and Ryotaro Kobayashi. 2018. LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments. J Cloud Comp.
 * 3) Kobsa, Alfred. 2002. Personalized hypermedia and international privacy. Communications of the ACM 45(5):64-67.
 * 4) Patricia A., Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41(1):100-126.
 * 5) Shilton, Katie, Jeff Burke, Deborah Estrin, Ramesh Govindan, Mark Hansen, Jerry Kang, and Min Mun. 2009. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing. SSRN.
 * 6) Choi, J., Jeon, and Doh-Shin Jeon, and Byung-Cheol Kim. 2018. Privacy and Personal Data Collection with Information Externalities. SSRN Electronic Journal.
 * 7) Mendelson, Avi. 2019. Security and Privacy in the Age of Big Data and Machine Learning. IEEE 52(12):65-70.
 * Li, Zhenjiang, and Li Mo, and Jiliang Wang and Zhichao Cao. 2011. Ubiquitous data collection for mobile users in wireless sensor networks. Proceedings IEEE INFOCOM.
 * 1) Chen, Hongliang, Christopher E Beaudoin, and Traci Hong. 2017. Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior 70:291-302.
 * 2) United States Internal Revenue Service. (n.d.). 2020. “Privacy and Confidentiality-a Public Trust.”
 * 3) Ranjbar, A., and Muthucumaru Maheswaran. 2014. “Confidentiality and Integrity in Crowdsourcing Systems.” Springer.
 * 4) Barth, Susanne, and Menno D.T. De Jong. 2017. The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics 34(7):1038-1058.
 * 5) Marreiros, Helia, Tonin, Mirco, Vlassopoulos, Michael, and Schraefel, M.C. 2017. “Now that you mention it”: A survey experiment on information, inattention and online privacy. Journal of Economic Behavior & Organization 140:1-17.
 * 6) Rădulescu, A. 2018. Users' social trust of sharing data with companies: online privacy protection behavior, customer perceived value, and continuous usage intention. Contemporary Readings in Law and Social Justice 10(1):137-143.
 * 7) Martin, K. 2015. Understanding Privacy Online: Development of a Social Contract Approach to Privacy. Journal of Business Ethics 137(3):551-569.
 * 8) Milne, George R, & Culnan, Mary J. 2004. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing 18(3):15-29.
 * 9) Debatin, Bernhard, Lovejoy, Jennette P, Horn, Ann-Kathrin, & Hughes, Brittany N. 2009. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-mediated Communication 15(1):83-108.
 * 10) Jiang, Zhenhui, Heng, Cheng Suang, and Choi, Ben C. F. 2013. Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions. Information Systems Research 24(3):579-595.
 * 11) Choi, Hanbyul, Park, Jonghwa, and Jung, Yoonhyuk. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81:42-51.
 * 12) Child, Jeffrey T, and Starcher, Shawn C. 2016. Fuzzy Facebook privacy boundaries: Exploring mediated lurking, vague-booking, and Facebook privacy management. Computers in Human Behavior 54:483-490.