Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Oecd, 2011. "Digital Identity Management for Natural Persons: Enabling Innovation and Trust in the Internet Economy - Guidance for Government Policy Makers," OECD Digital Economy Papers 186, OECD Publishing.
- Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Cheng, Junjun & Chen, Bo & Huang, Zihang, 2023. "Collective-based ad transparency in targeted hotel advertising: Consumers’ regulatory focus underlying the crowd safety effect," Journal of Retailing and Consumer Services, Elsevier, vol. 72(C).
- Potoglou, Dimitris & Palacios, Juan & Feijoo, Claudio & Gómez Barroso, Jose-Luis, 2015. "The supply of personal information: A study on the determinants of information provision in e-commerce scenarios," 26th European Regional ITS Conference, Madrid 2015 127174, International Telecommunications Society (ITS).
- Morosan, Cristian, 2016. "An empirical examination of U.S. travelers’ intentions to use biometric e-gates in airports," Journal of Air Transport Management, Elsevier, vol. 55(C), pages 120-128.
- Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
- Pieper, Nadine & Woisetschläger, David M., 2024. "Customer misbehavior in access-based mobility services: An examination of prevention strategies," Journal of Business Research, Elsevier, vol. 171(C).
- Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
- Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
- Angeliki Kitsiou & Charikleia Despotidi & Christos Kalloniatis & Stefanos Gritzalis, 2022. "The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study," Future Internet, MDPI, vol. 14(11), pages 1-31, November.
- Meents, S. & Verhagen, T. & Vlaar, P.W.L., 2011. "How sellers can stimulate purchasing in electronic marketplaces: Using information as a risk reduction signal," Serie Research Memoranda 0014, VU University Amsterdam, Faculty of Economics, Business Administration and Econometrics.
- Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
- Erdem Özkan, 2018. "Why Do Consumers Behave Differently in Personal Information Disclosure and Self-Disclosure? The Role of Personality Traits and Privacy Concern," Alphanumeric Journal, Bahadir Fatih Yildirim, vol. 6(2), pages 257-276, December.
- David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
- Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
- Chetan A. Jhaveri & Jitendra M. Nenavani, 2020. "Evaluation of eTail Services Quality: AHP Approach," Vision, , vol. 24(3), pages 310-319, September.
- Saridakis, George & Benson, Vladlena & Ezingeard, Jean-Noel & Tennakoon, Hemamali, 2016. "Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users," Technological Forecasting and Social Change, Elsevier, vol. 102(C), pages 320-330.
- Raouf Jaziri & Mohammad Miralam, 2019.
"Modelling the crowdfunding technology adoption among novice entrepreneurs: an extended tam model,"
Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 6(4), pages 2159-2179, June.
- Raouf Jaziri & Mohammad Miralam, 2019. "Modelling the crowdfunding technology adoption among novice entrepreneurs: an extended TAM model," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 7(1), pages 353-374, September.
- Faqih, Khaled M.S., 2016. "An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter?," Journal of Retailing and Consumer Services, Elsevier, vol. 30(C), pages 140-164.
- Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
- Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
- Boukis, Achilleas & Christodoulides, George & Semaan, Rania W. & Stathopoulou, Anastasia, 2024. "What drives consumers towards shared luxury services? A comparison of sequential versus simultaneous sharing," Journal of Business Research, Elsevier, vol. 177(C).
More about this item
Keywords
identity; identity management; personal information; secondary use; trust; privacy.;All these keywords.
JEL classification:
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:idt:journl:cs8804. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: BLAVIER Thomas (email available below). General contact details of provider: https://edirc.repec.org/data/idatefr.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.