Behavioral targeting refers to targeting ad messages to a persons clickstream behavior

References

Acquisti, A. [2004]. Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the Proceedings of the ACM Conference on Electronic Commerce [EC’04].

Acquisti, Adjerid, & Brandimarte, L. [2013]. Gone in 60 seconds: The limits of privacy, transparency, and control. IEEE, 13, 7274.Google Scholar

Acquisti, A., & Gross, R. [2009]. Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106[27], 1097510980.CrossRefGoogle ScholarPubMed

Acquisti, A., John, L. K., & Loewenstein, G. [2012]. The impact of relative standards on the propensity to disclose. Journal of Marketing Research, April, 160–174.

Acquisti, A., John, L. K., & Loewenstein, G. [2013]. What is privacy worth? Journal of Legal Studies, 42[2], 249274.CrossRefGoogle Scholar

Acquisti, A., & Varian, H. [2002]. Conditioning prices on purchase history. Marketing Science, 24[3], 367381.CrossRefGoogle Scholar

Adjerid, I., Acquisti, A., Brandimarte, L., & Loewenstein, G. [2013]. Sleights of Privacy: Framing, disclosures, and the limits of transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security, 9. New York: Association for Computing Machinery.Google Scholar

Alter, A. L., & Oppenheimer, D. M. [2009]. Suppressing secrecy through metacognitive ease: Cognitive fluency encourages self-disclosure. Psychological Science, 20[11], 14141420.CrossRefGoogle ScholarPubMed

Altman, I. [1975]. The Environment and Social Behavior. Monterey, CA: Brooks/Cole.Google Scholar

Angwin, J. [2014]. Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. New York: Henry Holt, Times Books.Google Scholar

Ariely, D., Loewenstein, G., & Prelec, D. [2003]. Coherent arbitrariness: Stable demand curves without stable preferences. Quarterly Journal of Economics, 118, 73106.CrossRefGoogle Scholar

Armor, D. A., & Taylor, C. R. [2002]. When predictions fail: The dilemma of unrealistic optimism. In Gilovich, T., Griffin, D., & Kahneman, D. [eds.], Heuristics and Biases: The Psychology of Intuitive Judgment. Cambridge: Cambridge University Press.Google Scholar

Asch, S. E. [1956]. Studies of independence and conformity: A minority of one against a unanimous majority. Psychological Monographs, 70[9], 118.CrossRefGoogle Scholar

Asch, S. E. [1959]. A perspective on social psychology. In Koch, S. [ed.], Psychology: A Study of Science [vol. 3, pp. 363383]. New York: McGraw-Hill.Google Scholar

Awad, N. F., & Krishnan, M. S. [2006]. The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30[1], 1828.Google Scholar

Berscheid, E. [1977]. Privacy: A hidden variable in experimental social psychology. Journal of Social Issues, 33[3], 85101.CrossRefGoogle Scholar

Bicchieri, C. [2006]. The Grammar of Society: The Nature and Dynamics of Social Norms. Cambridge: Cambridge University Press.Google Scholar

Brandimarte, L., Acquisti, A., & Gino, F. [n.d.]. Baring out with iron hands: Can disclosing make us harsher? Working Paper.

Brandimarte, L., Acquisti, A., & Loewenstein, G. [2012]. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science [August], 340–347.

Brandimarte, L., Vosgerau, J., & Acquisti, A. [n.d.]. Neither forgiven nor forgotten – moral acts depreciate over time, immoral acts do not. Working Paper.

Brickman, P., Coates, D., & Janoff-Bulman, R. [1978]. Lottery winners and accident victims: Is happiness relative? Journal of Personality and Social Psychology, 36[8], 917927.CrossRefGoogle ScholarPubMed

Brunk, B. D. [2002]. Understanding the privacy space. First Monday, 7.

Calo, R. [2010]. People can be so fake: A new dimension to privacy and technology scholarship. Penn State Law Review, 114[3], 809855.Google Scholar

Chellappa, R., & Sin, R. [2002]. Personalization versus Privacy: New Exchange Relationships on the Web. Los Angeles: Marshall School of Business, University of Southern California.Google Scholar

Cialdini, R. B., Vincent, J. E., Lewis, S. K., Catalan, J., Wheeler, D., & Darby, B. L. [1975]. Reciprocal concessions procedure for inducing compliance: The door-in the face technique. Journal of Personality and Social Psychology, 31, 206215.CrossRefGoogle Scholar

Collins, N. L., & Miller, L. C. [1994]. Self-disclosure and liking: A meta-analytic review. Psychological Bulletin, 116[3], 457475.CrossRefGoogle ScholarPubMed

Cozby, P. C. [1972]. Self-disclosure, reciprocity, and liking. Sociometry, 35[1], 151160.CrossRefGoogle Scholar

Cranor, L. [2002]. Web Privacy with P3P. Sebastopol, CA: O’Reilly & Associates.

Cryder, C. E., Loewenstein, G., & Scheines, R. The donor is in the details. Organizational Behavior and Human Decision Processes, 120[1], 1523.CrossRef

Culnan, M. J., Armstrong, P. K. [1999]. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10[1], 104115.CrossRefGoogle Scholar

DellaVigna, S., & Malmendier, U. [2006]. Paying not to go to the gym. American Economic Review, 96[3], 694719.CrossRefGoogle Scholar

Denham, E. [2009]. Report of Findings into the Complaint Filed by the Canadian Internet Policy and Public Interest Clinic [CIPPIC] against Facebook Inc. under the Personal Information Protection and Electronic Documents Act. Ottawa: Privacy Commissioner of Canada.Google Scholar

Devenow, A., & Welch, I. [1996]. Rational herding in financial economics. European Economic Review, 40, 603615.CrossRefGoogle Scholar

Duval, S., & Wicklund, R. A. [1972]. A Theory of Objective Self-Awareness. New York: Academic Press.Google Scholar

Epley, N., & Dunning, D. [2000]. Feeling “holier than thou”: Are self-serving assessments produced by errors in self- or social prediction? Journal of Personality and Social Psychology, 79[6], 861875.CrossRefGoogle ScholarPubMed

Federal Trade Commission [2000]. Privacy Online: Fair Information Practices in the Electronic Marketplace. Washington, DC: Federal Trade Commission.

Federal Trade Commission [2006]. The Identity Theft Report. Washington, DC: Federal Trade Commission.PubMed

Fischhoff, B. [1982]. Debiasing. In Kahneman, D., Slovic, P. & Tversky, A. [eds.], Judgment under Uncertainty: Heuristics and Biases [pp. 422444]. Cambridge: Cambridge University Press.CrossRefGoogle Scholar

Fox, C. R., & Tversky, A. [1995]. Ambiguity aversion and comparative ignorance. Quarterly Journal of Economics, 110[3], 585603.CrossRefGoogle Scholar

Frederick, S., & Loewenstein, G. [1999]. Hedonic adaptation. In Kahneman, D. & Diener, E. [eds.], Well-being: The Foundations of Hedonic Psychology [pp. 302329]. New York: Russell Sage Foundation.Google Scholar

Frederick, S., O’Donoghue, T., & Loewenstein, G. [2002]. Time discounting and time preference: A critical review. Journal of Economic Literature, 40[2], 351.CrossRefGoogle Scholar

Freedman, Jonathan L., & Fraser, Scott C. [1966]. Compliance without pressure: The foot-in the door technique. Journal of Personality and Social Psychology, 4[2], 195202.CrossRefGoogle ScholarPubMed

Frey, J. H. [1986]. An experiment with a confidentiality reminder in a telephone survey. Public Opinion Quarterly, 50, 267269.CrossRefGoogle Scholar

Gilbert, F. [2008]. Beacons, bugs, and pixel tags: Do you comply with the FTC behavioral marketing principles and foreign law requirements? Journal of Internet Law, 11[11], 310.Google Scholar

Goldfarb, A., & Tucker, C. [2011b]. Privacy regulation and online advertising. Management Science, 57[1], 5771.CrossRefGoogle Scholar

Goldfarb, A., & Tucker, C. [2011c]. Online display advertising: Targeting and obtrusiveness. Marketing Science, 30, 389404.CrossRefGoogle Scholar

Grice, Paul [1975]. Logic and conversation. In Cole, P. & Morgan, J. [eds.], Syntax and Semantics [vol. 3: Speech Acts, pp. 41–58]. New York: Academic Press.Google Scholar

Grimmelmann, J. [2009]. Saving Facebook. Iowa Law Review, 94, 11371206.Google Scholar

Hann, I.-H., Hui, K.-L., Lee, T. S., & Png, I. P. L. [2002a]. The value of online privacy: Evidence from the USA and Singapore. Paper presented at the Twenty-Third International Conference on Information Systems, Barcelona.

Hann, I.-H., Hui, K.-L., Lee, T. S., & Png, I. P. L. [2002b]. Online information privacy: Measuring the cost-benefit trade-off. Paper presented at the Twenty-Third International Conference on Information Systems, Barcelona.

Herrnstein, R. J., & Prelec, D. [1991]. Melioration: A theory of distributed choice. Journal of Economic Perspectives, 5[3], 137156.CrossRefGoogle Scholar

Hsee, C., Loewenstein, G., Blount, S., & Bazerman, M. [1999]. Preference reversals between joint and separate evaluations: A review and theoretical analysis. Psychological Bulletin, 125[5], 576590.CrossRefGoogle Scholar

Ivory, M. Y., & Hearst, M. A. [2002a]. Improving web site design. IEEE Internet Computing, 6[2, Special Issue on Usability and the Web], 5663.CrossRefGoogle Scholar

Ivory, M. Y., & Hearst, M. A. [2002b]. Statistical profiles of highly rated web sites. Paper presented at the Conference on Human Factors in Computing Systems, Minneapolis.

Ivory, M. Y., Sinha, R. R., & Hearst, M. A. [2001]. Empirically validated web page design metrics. Paper presented at the Conference on Human Factors in Computing Systems, Seattle.

Jenni, K. E., & Loewenstein, G. [1997]. Explaining the “identifiable victim effect.” Journal of Risk and Uncertainty, 14, 235257.CrossRefGoogle Scholar

Jesdanun, A. [2006]. Facebook offers new privacy options. Associated Press.

John, L. K., Acquisti, A., & Loewenstein, G. [2008]. Inconsistent preferences for privacy. Paper presented at Behavioral Decision Research in Management Conference, Rady School of Management, University of California, San Diego.

John, L. K., Acquisti, A., & Loewenstein, G. [2011]. Strangers on a plane: Context-dependent willingness to divulge sensitive information, Journal of Consumer Research, 37, 858873.CrossRefGoogle Scholar

John, L. K., Loewenstein, G., Acquisti, A., & Vosgerau, J. [n.d.]. The Psychology of randomized response techniques and why they backfire. Working Paper.

John, L. K., Loewenstein, G., & Rick, S. [2014]. Cheating more for less: Upward social comparisons motivate the poorly compensated to cheat. Organizational Behavior and Human Decision Processes, 123, 101109.CrossRefGoogle Scholar

Jourard, S. N. [1959]. Self-disclosure and other-cathexis. Journal of Abnormal and Social Psychology, 59, 428431.CrossRefGoogle ScholarPubMed

Jourard, S. N. [1966]. Some psychological aspects of privacy. Law and Contemporary Problems, 31[2], 307318.CrossRefGoogle Scholar

Kahneman, D., Knetsch, J., & Thaler, R. [1986]. Fairness as a constraint on profit seeking: Entitlements in the market. American Economic Review, 76[4], 728741.Google Scholar

Kahneman, D., Knetsch, J., & Thaler, R. [1990]. Experimental test of the endowment effect and the Coase Theorem. Journal of Political Economy, 98[6], 13251348.CrossRefGoogle Scholar

Kahneman, D., & Lovallo, D. [1999]. Timid choices and bold forecasts: A cognitive perspective on risk taking. Management Science, 39[1], 1731.CrossRefGoogle Scholar

Kahneman, D., & Miller, D. T. [1986]. Norm theory: Comparing reality to its alternatives. Psychological Review, 93, 136153.CrossRefGoogle Scholar

Kahneman, D., & Tversky, A. [1979]. Prospect theory: An analysis of decision making under risk. Econometrica, 47, 263291.CrossRefGoogle Scholar

Laibson, D. [1997]. Golden eggs and hyperbolic discounting. Quarterly Journal of Economics, 112[2], 443478.CrossRefGoogle Scholar

Lambrecht, A., & Tucker, C. [2013]. When does retargeting work? Information specificity in online advertising. Journal of Marketing Research, 50[5], 561576.CrossRefGoogle Scholar

Langer, E. [1975]. The illusion of control. Journal of Personality and Social Psychology, 32[2], 328.CrossRefGoogle Scholar

Laufer, R. S., & Wolfe, M. [1977]. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33[3], 2224.CrossRefGoogle Scholar

Lerner, J. S., Kassam, K., Li, Y., & Valdesolo, P. [2015]. Emotion and decision making. Annual Review of Psychology, 66, 799823.CrossRefGoogle ScholarPubMed

Liberman, N., & Trope, Y. [2003]. Temporal construal theory of intertemporal judgment and decision. In Loewenstein, G., Read, D., & Baumeister, R. [eds.], Time and Choice: Economic and Psychological Perspectives on Intertemporal Choice. New York: Sage.Google Scholar

Lichtenstein, S., & Slovic, P. [2006]. The Construction of Preference. New York: Cambridge University Press.CrossRefGoogle Scholar

Loewenstein, G., & Elster, J. [eds.]. [1992]. Choice over Time. New York: Russell Sage Foundation.Google Scholar

Loewenstein, G., John, L. K., & Volpp, K. [2013]. Protecting people from themselves: Using decision errors to help people help themselves [and others]. In Shafir, E. [ed.], The Behavioral Foundations of Public Policy [pp. 361379]. Princeton, NJ, and Oxford: Princeton University Press.Google Scholar

Loewenstein, G., & O’Donoghue, T. [2005]. Animal Spirits: Affective and Deliberative Processes in Economic Behavior. Pittsburgh, PA: Carnegie Mellon University.Google Scholar

Loewenstein, G., O’Donoghue, T., & Rabin, M. [2003]. Projection bias in predicting future utility. Quarterly Journal of Economics, 118[4], 12091248.CrossRefGoogle Scholar

Loewenstein, G., & Prelec, D. [1993]. Preferences for sequences of outcomes. Psychological Review, 100[1], 91108.CrossRefGoogle Scholar

Loewenstein, G., Thompson, L., & Bazerman, M. H. [1989]. Social utility and decision making in interpersonal contexts. Journal of Personality and Social Psychology, 57, 426441.CrossRefGoogle Scholar

Lohr, S. [2010]. Library of Congress will save tweets. New York Times, April 15, B2.

Margulis, S. T. [2003]. On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59[2], 411429.CrossRefGoogle Scholar

Mayer-Schoenberger, V. [2011]. Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press.Google Scholar

McDonald, A. D., & Cranor, L. F. [2008]. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4[22], 543568.Google Scholar

Mikulincer, M., & Nachson, O. [1991]. Attachment styles and patterns of self-disclosure. Journal of Personality and Social Psychology, 61[2], 321331.CrossRefGoogle Scholar

Nisbett, R. E., & Ross, L. [1980]. Human Inference: Strategies and Shortcomings of Social Judgment. New Jersey: Prentice Hall.Google Scholar

Nissenbaum, H. [2004]. Privacy as contextual integrity. Washington Law Review, 79[1], 119157.Google Scholar

Norberg, P. A., Horne, D. R., & Horne, D. A. [2007]. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41[1], 100126.CrossRefGoogle Scholar

O’Donoghue, T., & Rabin, M. [1999]. Doing it now or later. American Economic Review, 89[1], 103124.CrossRefGoogle Scholar

O’Donoghue, T., & Rabin, M. [2001]. Choice and Procrastination. Quarterly Journal of Economics, 116[1], 121160.CrossRefGoogle Scholar

Peer, E., Acquisti, A., & Loewenstein, G. [n.d.]. The impact of reversibility on the decision to disclose personal information. Working Paper.

Pennebaker, J. [1984]. Confiding in others and illness rate among spouses of suicide and accidental-death victims. Journal of Abnormal Psychology, 93[4], 473476.CrossRefGoogle ScholarPubMed

Pennebaker, J. W., Kiecolt-Glaser, J. K., & Glaser, R. [1988]. Disclosure of traumas and immune function: Health implications for psychotherapy. Journal of Consulting and Clinical Psychology, 56[2], 239245.CrossRefGoogle ScholarPubMed

Png, I. P. L. [2007]. On the Value of Privacy from Telemarketing: Evidence from the “Do Not Call” Registry. Singapore: National University of Singapore.Google Scholar

Rabin, M., & O’Donoghue, T. [2000]. The economics of immediate gratification. Journal of Behavioral Decision Making, 13, 233250.Google Scholar

Read, D., Loewenstein, G., & Rabin, M. [1999]. Choice bracketing. Journal of Risk and Uncertainty, 19[1–3], 171197.CrossRefGoogle Scholar

Reis, H. T., & Shaver, P. [1988]. Intimacy as an interpersonal process. In Duck, S. [ed.], Handbook of Personal Relationships [pp. 367389]. Chichester, England: Wiley.Google Scholar

Riis, J., Loewenstein, G., Baron, J., Jepson, C., Fagerlin, A., & Ubel, P. [2005]. Ignorance of hedonic adaptation to hemodialysis: A study using ecological momentary assessment. Journal of Experimental Psychology: General, 134[1], 39.CrossRefGoogle ScholarPubMed

Romanosky, S., & Acquisti, A. [2009]. Privacy costs and personal data protection: Economic and legal perspectives. Berkeley Technology Law Journal, 24[3], 10611101.Google Scholar

Romanosky, S., Sharp, R., & Acquisti, A. [2010]. Data breaches and identity theft: When is mandatory disclosure optimal? Presentation for the Ninth Workshop on the Economics of Information Security [WEIS], June 7, Arlington, VA.

Schelling, T. C. [1968]. The life you save may be your own. In Chase, S. [ed.], Problems in Public Expenditure Analysis [pp. 113146]. Washington, DC: Brookings Institute.Google Scholar

Sedikides, C., Campbell, W. K., Reeder, G. D., & Elliot, A. J. [1999]. The relationship closeness induction task. Representative Research in Social Psychology, 23, 14.Google Scholar

Singer, E., Hippler, H.-J., & Schwarz, N. [1992]. Confidentiality assurances in surveys: Reassurance or threat? International Journal of Public Opinion Research, 4, 256268.CrossRefGoogle Scholar

Singer, E., von Thurn, D. R., & Miller, E. R. [1995]. Confidentiality assurances and response: A quantitative review of the experimental literature. Public Opinion Quarterly, 59, 6677.CrossRefGoogle Scholar

Slovic, P. [1995]. The construction of preference. American Psychologist, 50[5], 364371.CrossRefGoogle Scholar

Smith, H. J., Milberg, S. J., & Burke, S. J. [1996]. Information privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20[2], 167196.CrossRefGoogle Scholar

Smyth, J. M. [1998]. Written emotional expression: Effect sizes, outcome types, and moderating variables. Journal of Consulting and Clinical Psychology, 66, 174184.CrossRefGoogle ScholarPubMed

Solove, D. [2007]. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. New Haven, CT: Yale University Press.Google Scholar

Spera, S. P., Buhrfeind, E. D., & Pennebaker, J. W. [1994]. Expressive writing and coping with job loss. Academy of Management Journal, 37, 722733.CrossRefGoogle Scholar

Spiekermann, S., Grossklags, J., & Berendt, B. [2001]. E-privacy in 2nd generation E commerce: Privacy preferences versus actual behavior. Paper presented at the Conference on Electronic Commerce, Association for Computing Machinery, Tampa, FL.

Tamir, D. I., & Mitchell, J. P. [2012]. Disclosing information about the self is intrinsically rewarding. Proceedings of the National Academy of Sciences, 109[21], 80388043.CrossRefGoogle ScholarPubMed

Tanner, A., [2014]. What Stays in Vegas: The World of Personal Data – Lifeblood of Big Business – and the End of Privacy as We Know It. New York: PublicAffairs.Google Scholar

Thaler, R., & Benartzi, S. [2004]. Save more tomorrow: Using behavioral economics to increase employee saving. Journal of Political Economy, 112[1], S164S187.CrossRefGoogle Scholar

Tsai, J. Y., Engelman, S., Cranor, L., & Acquisti, A. [2011]. The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22[2], 254268.CrossRefGoogle Scholar

Tucker, C. [2014]. Social networks, personalized advertising, and privacy controls. NET Institute Working Paper No. 10–07; MIT Sloan Research Paper No. 4851–10. Available at SSRN: //ssrn.com/abstract=1694319.

Tufecki, Z. [2008]. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology, & Society, 28[1], 2036.Google Scholar

Tversky, A., & Kahneman, D. [1974]. The framing of decisions and the psychology of choice. Science, 211[4481], 453458.CrossRefGoogle Scholar

Tversky, A., & Kahneman, D. [1991]. Loss aversion in riskless choice: A reference dependent model. Quarterly Journal of Economics, 106[4], 10391061.CrossRefGoogle Scholar

Tversky, A., Slovic, P., & Kahneman, D. [1990]. The causes of preference reversal. American Economic Review, 80[1], 204217.Google Scholar

Tybout, Alice M., Sternthal, Brian, & Calder, Bobby J. [1983]. Information availability as a determinant of multiple request effectiveness. Journal of Marketing Research, 20[August], 280290.CrossRefGoogle Scholar

Van Baaren, R., Horgan, T., Chartrand, T. L., & Dijkmans, M. [2004]. The forest, the trees, and the chameleon: Context dependency and nonconscious mimicry. Journal of Personality and Social Psychology, 86, 453459.CrossRefGoogle Scholar

Volpp, K., John, L., Troxel, A. B., Norton, L., Fassbender, J., & Loewenstein, G. [2008]. Financial incentive-based approaches for weight loss: A randomized trial. Journal of the American Medical Association, 300[22], 26312637.CrossRefGoogle ScholarPubMed

Warren, S. D., & Brandeis, L. D. [1890]. The right to privacy. Harvard Law Review, 4[5], 193220.CrossRefGoogle Scholar

Wathieu, L., & Friedman, A. 2009. An empirical approach to understanding privacy concerns. ESMT Working Paper 09–001, ESMT European School of Management and Technology, Berlin.

Weinstein, N. [1980]. Unrealistic optimism about future life events. Journal of Personality and Social Psychology, 39[5], 806820.CrossRefGoogle Scholar

Westin, A. F. [1991]. Harris-Equifax Consumer Privacy Survey 1991. Atlanta, GA: Equifax, Inc.Google Scholar

White, T. B., Zahay, D. L., Thorbjorsen, H., & Shavitt, S. [2008]. Getting too personal: Reactance to highly personalized email solicitations. Marketing Letters, 19, 3950.CrossRefGoogle Scholar

Whitten, A., & Tygar, J. D. [2005]. Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In Cranor, L. & Simson, G. [eds.], Security and Usability: Designing Secure Systems that People Can Use [pp. 679702]. Sebastopol, CA: O’Reilly and Associates.Google Scholar

Whitty, M. T., & Joinson, A. N. [2009]. Truth, Lies, and Trust on the Internet. New York: Routledge.Google Scholar

Chủ Đề