Alessandro Acquisti
Orcid: 0000-0001-6582-6178
According to our database1,
Alessandro Acquisti
authored at least 97 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors.
Proc. Priv. Enhancing Technol., January, 2023
Trends in Privacy Dialog Design after the GDPR: The Impact of Industry and Government Actions.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Modern Socio-Technical Perspectives on Privacy, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers Willingness to Pay.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Editorial: Special issue on cyber security, privacy and ethics of information systems.
Inf. Syst. Frontiers, 2019
Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
2018
Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking.
ACM Trans. Internet Techn., 2018
Beyond the Privacy Paradox: Objective Versus Relative Risk in Privacy Decision Making.
MIS Q., 2018
J. Assoc. Inf. Syst., 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
ACM Comput. Surv., 2017
Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
2016
The Impact of Privacy Regulation and Technology Incentives: The Case of Health Information Exchanges.
Manag. Sci., 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the International Conference on Information Systems, 2015
I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
J. Priv. Confidentiality, 2014
Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
J. Priv. Confidentiality, 2013
IEEE Secur. Priv., 2013
IEEE Secur. Priv., 2013
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312).
Dagstuhl Reports, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Symposium On Usable Privacy and Security, 2013
Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
J. Telecommun. High Technol. Law, 2012
Empirical Analysis of Online Anonymity and User Behaviors: The Impact of Real Name Policy.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study.
Inf. Syst. Res., 2011
Negative Information Looms Longer than Positive Information.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the International Conference on Information Systems, 2011
2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the Ethics and Policy of Biometrics, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Social Insecurity: The Unintended Consequences of Identity Fraud Prevention Policies.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
Timing is everything?: the effects of timing and placement of online privacy indicators.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 eCrime Researchers Summit, 2008
2007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the International Conference on Information Systems, 2006
2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
2004
Proceedings of the Economics of Information Security, 2004
Privacy and Security of Personal Information - Economic Incentives and Technological Solutions.
Proceedings of the Economics of Information Security, 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004
2003
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003