Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acquisti, Alessandro (2002a). Privacy and security of personal information: Economic incentives and technological solutions. In 1st SIMS Workshop on Economics and Information Security.
Acquisti, Alessandro (2002b). Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments. In Workshop on Socially-informed Design of Privacyenhancing Solutions, 4th International Conference on Ubiquitous Computing-UBICOMP’ 02.
Acquisti, Alessandro and Varian, Hal R. (2002). Conditioning prices on purchase history. Technical report, University of California, Berkeley. First draft: 2001. Presented at the European Economic Association Conference, Venice, IT, August 2002.
Ainslie, George W. (1975). Specious reward: A behavioral theory of impulsiveness and impulsive control. Psychological Bulletin, 82:463–496.
Ajzen, Icek (1988). Attitudes, personality, and behavior, chapter 6. Open University Press, Milton-Keynes, England.
Akerlof, George A. (1970). The market for “lemons”: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84:488–500.
Aronson, Elliot and Mills, Judson (1959). The effect of severity of initiation on the devaluation of forbidden behavior. Journal of Abnormal and Social Psychology, 59:177–181.
Berger, Peter L. (1982). Models of bounded rationality, Vol. I–III. The MIT Press, Cambridge, MA.
Brunk, Benjamin D. (2002). Understanding the privacy space. First Monday, 7. “http://firstmonday.org/issues/issue7_10/brunk/index.html.
Chellappa, Ramnath K. and Sin, Raymong (2002). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. In 2002 Informs Meeting.
Coate, Stephen (1995). Altruism, the samaritan’s dilemna, and government transfer policy. American Economic Review, 85(1):46–57.
Commission, Federal Trade (2000). Privacy online: Fair information practices in the electronic marketplace. http://www.ftc.gov/reports/privacy2000/privacy2000.pdf.
Corey, S.M. (1937). Professional attitudes and actual behavior. Journal of educational psychology, 28(1):271–280.
Eagly, Alice H. and Chaiken, Shelly (1993). The Psychology of Attitudes, chapter 4. Harcourt Brace Jovanovich College Publishers, Fort Worth, TX.
Fazio, Russell H. (1990). Multiple processes by which attitudes guide behavior: The mode model as an integrative framework. Advances in experimental social psychology, 23:75–109.
Festinger, Leon (1957). A theory of cognitive dissonance. Row Peterson, Evanston, IL.
Festinger, Leon and Carlsmith, James M. (1959). Cognitive consequences of forced compliance. Journal of Abnormal and Social Psychology, 58:203–210.
Goffman, Erving (1963). Stigma: Notes on the Management of Spoiled Identity. Prentice-Hall, Englewood Cliffs, NJ.
Harn, Il-Horn, Hui, Kai-Lung, Lee, Tom S., and Png, Ivan P. L. (2002). Online information privacy: Measuring the cost-benefit trade-off. In 23rd International Conference on Information Systems.
Harris Interactive (2002). First major post-9-11 privacy survey finds consumers demanding companies do more to protect privacy; public wants company privacy policies to be independently verified. http://www.harrisinteractive.com/news/allnewsbydate.asp?NewsID=429.
Jupiter Research (2002). Seventy percent of US consumers worry about online privacy, but few take protective action. http://www.jmm.com/xp/jmm/press/2002/pr_060302.xml.
Laibson, David (1997). Golden eggs and hyperbolic discounting. Quarterly Journal of Economics, 62(2):443–477.
LaPiere, Robert (1934). Attitudes versus actions. Social Forces, 13:230–237.
Lemley, Mark (2000). Rational ignorance at the patent office. Technical report, Berkeley Olin Program in Law and Economics, Working Paper Series.
McIntosh, Donald (1969). The Foundations of Human Society. The University of Chicago Press, Chicago, IL.
O’Donoghue, Ted and Rabin, Matthew (2001). Choice and procrastination. Quarterly Journal of Economics, 116(1):121–160.
Rabin, Matthew and O’Donoghue, Ted (2000). The economics of immediate gratification. Journal of Behavioral Decision Making, 13(2):233–250.
Spiekermann, Sarah, Grossklags, Jens, and Berendt, Bettina (2002). Eprivacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In 3rd ACM Conference on Electronic Commerce-EC’ 01, pages 38–47.
Thaler, Richard and Shefrin, Hersh M. (1981). An economic theory of self-control. The Journal of Political Economy, 89:392–406.
Varian, Hal R. (1996). Economic aspects of personal privacy. In Privacy and Self-Regulation in the Information Age. National Telecommunications and Information Administration.
Whitten, Alma and Tygar, J. D. (1999). Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium. http://citeseer.nj.nec.com/whitten99why.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Acquisti, A., Grossklags, J. (2004). Privacy Attitudes and Privacy Behavior. In: Camp, L.J., Lewis, S. (eds) Economics of Information Security. Advances in Information Security, vol 12. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8090-5_13
Download citation
DOI: https://doi.org/10.1007/1-4020-8090-5_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8089-0
Online ISBN: 978-1-4020-8090-6
eBook Packages: Springer Book Archive