User:Nankingaszz/Shadow Profile/Bibliography

From Wikipedia, the free encyclopedia

Bibliography[edit]

This is where you will compile the bibliography for your Wikipedia assignment. Please refer to the following resources for help:

Bibliography for Shadow Profile[edit]

  1. Papson, Scott and Ram. M. Narayanan. 2012. Classification via the Shadow Region in SAR Imagery. IEEE Transactions on Aerospace and Electronic Systems
  2. Hirano, Manabu, Natsuki Tsuzuki, Seishiro Ikeda and Ryotaro Kobayashi. 2018. LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments. J Cloud Comp.  
  3. Kobsa, Alfred. 2002. Personalized hypermedia and international privacy. Communications of the ACM 45(5):64-67.
  4. Patricia A., Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41(1):100-126.
  5. Shilton, Katie, Jeff Burke, Deborah Estrin, Ramesh Govindan, Mark Hansen, Jerry Kang, and Min Mun. 2009. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing. SSRN.
  6. Choi, J., Jeon, and Doh-Shin Jeon, and Byung-Cheol Kim. 2018. Privacy and Personal Data Collection with Information Externalities. SSRN Electronic Journal.
  7. Mendelson, Avi. 2019. Security and Privacy in the Age of Big Data and Machine Learning. IEEE 52(12):65-70.
  8. Li, Zhenjiang, and Li Mo, and Jiliang Wang and Zhichao Cao. 2011. Ubiquitous data collection for mobile users in wireless sensor networks. Proceedings IEEE INFOCOM.
  9. Chen, Hongliang, Christopher E Beaudoin, and Traci Hong. 2017. Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior 70:291-302.
  10. United States Internal Revenue Service. (n.d.). 2020. “Privacy and Confidentiality-a Public Trust.”
  11. Ranjbar, A., and Muthucumaru Maheswaran. 2014. “Confidentiality and Integrity in Crowdsourcing Systems.” Springer.
  12. Barth, Susanne, and Menno D.T. De Jong. 2017. The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics 34(7):1038-1058.
  13. Marreiros, Helia, Tonin, Mirco, Vlassopoulos, Michael, and Schraefel, M.C. 2017. “Now that you mention it”: A survey experiment on information, inattention and online privacy. Journal of Economic Behavior & Organization 140:1-17.
  14. Rădulescu, A. 2018. Users' social trust of sharing data with companies: online privacy protection behavior, customer perceived value, and continuous usage intention. Contemporary Readings in Law and Social Justice 10(1):137-143.
  15. Martin, K. 2015. Understanding Privacy Online: Development of a Social Contract Approach to Privacy. Journal of Business Ethics 137(3):551-569.
  16. Milne, George R, & Culnan, Mary J. 2004. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing 18(3):15-29.
  17. Debatin, Bernhard, Lovejoy, Jennette P, Horn, Ann-Kathrin, & Hughes, Brittany N. 2009. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-mediated Communication 15(1):83-108.
  18. Jiang, Zhenhui, Heng, Cheng Suang, and Choi, Ben C. F. 2013. Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions. Information Systems Research 24(3):579-595.
  19. Choi, Hanbyul, Park, Jonghwa, and Jung, Yoonhyuk. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81:42-51.
  20. Child, Jeffrey T, and Starcher, Shawn C. 2016. Fuzzy Facebook privacy boundaries: Exploring mediated lurking, vague-booking, and Facebook privacy management. Computers in Human Behavior 54:483-490.