Journal of Information Technology

, Volume 27, Issue 4, pp 319–320 | Cite as

Preserving opportunities in internet research: a commentary on ‘Studying Cyborgs’

  • Sam Ransbotham
Commentary

References

  1. Li, X.-B. and Sarkar, S. (2009). Against Classification Attacks: A decision tree pruning approach to privacy protection in data mining, Operations Research 57 (6): 1496–1509.CrossRefGoogle Scholar
  2. Ransbotham, S. and Mitra, S. (2009). Choice and Chance: A conceptual model of paths to information security compromise, Information Systems Research 20 (1): 121–139.CrossRefGoogle Scholar
  3. Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive, Indianapolis, IN: John Wiley & Sons.Google Scholar
  4. Xu, H., Teo, H.H., Tan, B.C.Y. and Agarwal, R. (forthcoming). Effects of Individual Self-Protection, Industry Self-regulation, and Government Regulation on Privacy Concerns: A study of location-based services, Information Systems Research, doi: 10.1287/isre.1120.0416 in press.Google Scholar

Copyright information

© Association for Information Technology Trust 2012

Authors and Affiliations

  • Sam Ransbotham
    • 1
  1. 1.Boston CollegeChestnut HillUSA

Personalised recommendations