Tamara Dinev

According to our database1, Tamara Dinev authored at least 34 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Low Effort and Privacy - How Textual Priming Affects Privacy Concerns of Email Service Users.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
"They're All the Same!" Stereotypical Thinking and Systematic Errors in Users' Privacy-Related Judgments About Online Services.
J. Assoc. Inf. Syst., 2019

Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith.
Inf. Syst. Frontiers, 2019

Editorial: Special issue on cyber security, privacy and ethics of information systems.
Inf. Syst. Frontiers, 2019

2017
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.
Eur. J. Inf. Syst., 2017

2015
Research Commentary - Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the "APCO" Box.
Inf. Syst. Res., 2015

2014
Why would we care about privacy?
Eur. J. Inf. Syst., 2014

2013
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts.
Eur. J. Inf. Syst., 2013

2012
The security-liberty balance: individuals' attitudes towards internet government surveillance.
Electron. Gov. an Int. J., 2012

Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture.
Decis. Sci., 2012

2011
Trust in social computing. The case of peer-to-peer file sharing networks.
EAI Endorsed Trans. Security Safety, 2011

Information Privacy Research: An Interdisciplinary Review.
MIS Q., 2011

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances.
J. Assoc. Inf. Syst., 2011

Does deterrence work in reducing information security policy abuse by employees?
Commun. ACM, 2011

2010
Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and Deterrence.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

2009
User behaviour towards protective information technologies: the role of national cultural differences.
Inf. Syst. J., 2009

Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Trust in the Social Computing: The Case of Peer-to-Peer (P2P) File Sharing Networks.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Internet privacy concerns and beliefs about government surveillance - An empirical investigation.
J. Strateg. Inf. Syst., 2008

Is There an On-line Advertisers' Dilemma? A Study of Click Fraud in the Pay-Per-Click Model.
Int. J. Electron. Commer., 2008

Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View.
Proceedings of the International Conference on Information Systems, 2008

Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Top Management Championship and Individual Behaviour Towards Information Security: An Integrative Model.
Proceedings of the 16th European Conference on Information Systems, 2008

2007
The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies.
J. Assoc. Inf. Syst., 2007

2006
Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States.
J. Glob. Inf. Manag., 2006

An Extended Privacy Calculus Model for E-Commerce Transactions.
Inf. Syst. Res., 2006

Privacy calculus model in e-commerce - a study of Italy and the United States.
Eur. J. Inf. Syst., 2006

Why spoofing is serious internet fraud.
Commun. ACM, 2006

User behavior toward preventive technologies - cultural differences between the United States and South Korea.
Proceedings of the Fourteenth European Conference on Information Systems, 2006

2005
Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact.
Int. J. Electron. Commer., 2005

Is spyware an Internet nuisance or public menace?
Commun. ACM, 2005

Internet Users, Privacy Concerns and Attitudes towards Government Surveillance - An Exploratory Study of Cross-Cultural Differences between Italy and the United States.
Proceedings of the 18th Bled eConference: eIntegration in Action, 2005

2004
Internet privacy concerns and their antecedents - measurement validity and a regression model.
Behav. Inf. Technol., 2004

Internet Privacy, Social Awareness, And Internet Technical Literacy . An Exploratory Investigation.
Proceedings of the 17th Bled eConference: eGlobal, 2004


  Loading...