Alessandro Acquisti

Orcid: 0000-0001-6582-6178

According to our database1, Alessandro Acquisti authored at least 96 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Learning to Live with Privacy-Preserving Analytics.
Commun. ACM, July, 2023

Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors.
Proc. Priv. Enhancing Technol., January, 2023

Trends in Privacy Dialog Design after the GDPR: The Impact of Industry and Government Actions.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

2022
Increasing Adoption of Tor Browser Using Informational and Planning Nudges.
Proc. Priv. Enhancing Technol., 2022

The Welfare Impact of Targeted Advertising Technologies.
Inf. Syst. Res., 2022

Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Privacy and Behavioral Economics.
Modern Socio-Technical Perspectives on Privacy, 2022

2021
Awareness, Adoption, and Misconceptions of Web Privacy Tools.
Proc. Priv. Enhancing Technol., 2021

Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
An Experiment in Hiring Discrimination via Online Social Networks.
Manag. Sci., 2020

Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers Willingness to Pay.
CoRR, 2020

The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment.
Proceedings of the 29th USENIX Security Symposium, 2020

From Intent to Action: Nudging Users Towards Secure Mobile Payments.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

"It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Informing the Design of a Personalized Privacy Assistant for the Internet of Things.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Choice Architecture, Framing, and Cascaded Privacy Choices.
Manag. Sci., 2019

Editorial: Special issue on cyber security, privacy and ethics of information systems.
Inf. Syst. Frontiers, 2019

Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking.
ACM Trans. Internet Techn., 2018

Beyond the Privacy Paradox: Objective Versus Relative Risk in Privacy Decision Making.
MIS Q., 2018

ICT Challenges and Opportunities in Building a "Bright Society".
J. Assoc. Inf. Syst., 2018

Can Digital Face-Morphs Influence Attitudes and Online Behaviors?
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
The Impact of Privacy Regulation and Technology Incentives: The Case of Health Information Exchanges.
Manag. Sci., 2016

Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Engineering Information Disclosure: Norm Shaping Designs.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Personal data markets.
Electron. Mark., 2015

The challenges of personal data markets and privacy.
Electron. Mark., 2015

Online Self-Disclosure and Offline Threat Detection.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

The Welfare and Allocative Impact of Targeted Advertising.
Proceedings of the International Conference on Information Systems, 2015

I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

The Impact of Timing on the Salience of Smartphone App Privacy Notices.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Face Recognition and Privacy in the Age of Augmented Reality.
J. Priv. Confidentiality, 2014

Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

A field trial of privacy nudges for facebook.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Silent Listeners: The Evolution of Privacy and Disclosure on Facebook.
J. Priv. Confidentiality, 2013

Gone in 15 Seconds: The Limits of Privacy Transparency and Control.
IEEE Secur. Priv., 2013

Complementary Perspectives on Privacy and Security: Economics.
IEEE Secur. Priv., 2013

'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312).
Dagstuhl Reports, 2013

Privacy nudges for social media: an exploratory Facebook study.
Proceedings of the 22nd International World Wide Web Conference, 2013

Sleights of privacy: framing, disclosures, and the limits of transparency.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

Privacy manipulation and acclimation in a location sharing application.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Tweets are forever: a large-scale quantitative analysis of deleted tweets.
Proceedings of the Computer Supported Cooperative Work, 2013

"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Privacy and Market Failures: Three Reasons for Concern, and Three Reasons for Hope.
J. Telecommun. High Technol. Law, 2012

Empirical Analysis of Data Breach Litigation.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Empirical Analysis of Online Anonymity and User Behaviors: The Impact of Real Name Policy.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study.
Inf. Syst. Res., 2011

Negative Information Looms Longer than Positive Information.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Health Disclosure Laws and Health Information Exchanges.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

"I regretted the minute I pressed share": a qualitative study of regrets on Facebook.
Proceedings of the Symposium On Usable Privacy and Security, 2011

2010
Teaching Johnny not to fall for phish.
ACM Trans. Internet Techn., 2010

Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal?
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Misplaced Confidences: Privacy and the Control Paradox.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Guns, Privacy, and Crime.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

From the Economics to the Behavioral Economics of Privacy: A Note.
Proceedings of the Ethics and Policy of Biometrics, 2010

2009
Nudging Privacy: The Behavioral Economics of Personal Information.
IEEE Secur. Priv., 2009

The Impact of Relative Standards on Concern About Privacy.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Social Insecurity: The Unintended Consequences of Identity Fraud Prevention Policies.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

The impact of privacy indicators on search engine browsing patterns.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

School of phish: a real-word evaluation of anti-phishing training.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Improving phishing countermeasures: An analysis of expert interviews.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Timing is everything?: the effects of timing and placement of online privacy indicators.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Identity Management, Privacy, and Price Discrimination.
IEEE Secur. Priv., 2008

Do Data Breaches Disclosure Laws Reduce Identity Theft?
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Countermeasures against Government-Scale Monetary Forgery.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Lessons from a real world evaluation of anti-phishing training.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Financial Privacy for Free? US Consumers' Response to FACTA.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Is There a Cost to Privacy Breaches? An Event Study.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Power strips, prophylactics, and privacy, oh my!
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006

Trust modelling for online transactions: a phishing scenario.
Proceedings of the 2006 International Conference on Privacy, 2006

Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2005
Privacy and Rationality in Individual Decision Making.
IEEE Secur. Priv., 2005

Information revelation and privacy in online social networks.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Uncertainty, Ambiguity and Privacy.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2004
Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting.
Proceedings of the Economics of Information Security, 2004

Privacy and Security of Personal Information - Economic Incentives and Technological Solutions.
Proceedings of the Economics of Information Security, 2004

Receipt-Free Homomorphic Elections and Write-in Ballots.
IACR Cryptol. ePrint Arch., 2004

Privacy in electronic commerce and the economics of immediate gratification.
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004

2003
On the Economics of Anonymity.
Proceedings of the Financial Cryptography, 2003

Representation and reasoning for DAML-based policy and domain services in KAoS and nomads.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003


  Loading...