Abelson, R.P. and Prentice, D.A. (1989). Beliefs as Possessions: A functional perspective, in A.R. Pratkanis, S.J. Breckler and A.G. Greenwald (eds.) Attitude Structure and Function, Hillsdale, NJ: Erlbaum, pp. 361–381.
Abraham, K.S. (1985). Efficiency and Fairness in Insurance Risk Classification, Virginia Law Review 71(3): 403–451.
Acquisti, A., John, L. and Loewenstein, G. (2013). What is Privacy Worth?, The Journal of Legal Studies 42(2): 249–274.
Anderson, C. (2009). Free – The Future of Radical Price, London: Random House Business Books.
Aperjis, C. and Huberman, B.A. (2012). A market for unbiased private data: Paying individuals according to their privacy attitudes, available at SSRN 2046861.
Avey, J.B., Avolio, B.J., Crossley, C.D. and Luthans, F. (2009). Psychological Ownership: Theoretical extensions, measurement, and relation to work outcomes, Journal of Organizational Behavior 30(2): 173–191.
Bauer, C., Korunovska, J. and Spiekermann, S. (2012). On the Value of Information – What Facebook Users are Willing to Pay. in Proceedings of 20th European Conference on Information Systems (ECIS 2012), Barcelona, Spain.
Becker, G.M., DeGroot, M.H. and Marschak, J. (1964). Measuring Utility by a Single-Response Sequential Method, Behavioral Science 9(3): 226–232.
Berendt, B., Guenther, O. and Spiekermann, S. (2005). Privacy in e-Commerce: Stated preferences vs. actual behavior, Communications of the ACM 48(4): 101–106.
Brandimarte, L., Acquisti, A. and Loewenstein, G. (2012). Misplaced Confidences: Privacy and the control paradox, Social Psychological and Personality Science 4(3): 340–347.
Camenisch, J., Shelat, A., Sommer, D., Fischer-Hübner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R. and Tseng, J. (2005). Privacy and Identity Management for Everyone, in Workshop On Digital Identity Management (DIM), Fairfax, VA: ACM Press, pp. 20–27.
Campell, M. (2012). This Means War, in NewScientist. San Francisco: RELX Group, pp. 42–45.
Casassa Mont, M., Pearson, S. and Bramhall, P. (2003). Towards Accountable Management of Identity and Privacy: Sticky policies and enforceable tracing services, Prague, Czech Republic: HP Laboratories Bristol.
Ciriacy-Wantrup, S.V. (1947). Capital Returns from Soil-Conservation Practices, Journal Farm Economics 29(4 Part II): 1181–1196.
Council of Europe (1950). European Convention on Human Rights, Rome.
Cvrcek, D., Vashek, M., Kumpost, M. and Danezis, G. (2006). A Study on the Value of Location Privacy, in Workshop on Privacy in Electronic Society (WPES’06), Alexandria, VA: ACM, pp. 109–118.
Dinev, T. and Hart, P. (2006). An Extended Privacy Calculus Model For e-Commerce Transactions, Information Systems Research 17(1): 61–80.
Dingledine, R., Mathewson, N. and Syverson, P. (2004). Tor: The second-generation onion router, in 12th USENIX Security Symposium, San Diego.
Dittmar, H. (1992). The Social Psychology of Material Possessions: To have is to be, New York: Hemel Hempstead and St Martin’s Press.
European Commission (ed.) (2012). Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), in 2012/0011 (COD), Brussels.
European Parliament and the Council of Europe (1995). Directive 95/46/ec of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and On the Free Movement of Such Data, in L 281/31, Brussels, Belgium: Official Journal of the European Communities.
Federal Republic of Germany (1949). Basic Law for the Federal Republic of Germany, Bonn.
Floridi, L. (2005). The Ontological Interpretation of Informational Privacy, Ethics and Information Technology 7(4): 185–200.
Freelon, D.G. (2010). Recal: Intercoder reliability calculation as a web service, International Journal of Internet Scienc 5(1): 20–33.
FTC, (ed.) (2000). Fair Information Practice Principles, Washington, DC.
Fujitsu (2010). Personal Data in the Cloud: A global survery of consumer attitudes, Tokyo, Japan: Fujitsu.
Furby, L. (1978). Possessions in Humans: An exploratory study of its meaning and motivation, Social Behavior and Personality 6(1): 49–65.
Google (2013). Google trends. [WWW document] http://google.com/trends (accessed 16 September 2014).
Grossklags, J. and Acquisti, A. (2007). When 25 Cents is Too Much: An experiment on willingness-to-sell and willingness-to-protect personal information. in 6th Workshop on the Economics of Information Security. Pittsburg, PA.
Hann, I.-H., Hui, K.-L., Lee, S.-Y. and Png, V.P.L. (2007). Overcoming Online Information Privacy Concerns: An information-processing theory approach, Journal of Management Information Systems 24(2): 13–42.
Hansen, M., Schartz, A. and Cooper, A. (2008). Privacy and Identity Management, IEEE Privacy & Security 6(2): 38–45.
Hayes, A.F. and Cai, L. (2007). Using Heteroskedasticity-Consistent Standard Error Estimators in OLS Regression: An introduction and software implementation, Behavior Research Methods 39(4): 709–722.
Holzinger, K. (2008). Transnational Common Goods – Strategic Constellations, Collective Action-Problems, and Multi-Level Provision, New York: Palgrave Macmillan.
Horowitz, J.K. and McConnell, K.E. (2002). A Review of wta/wtp Studies, Journal of Environmental Economics and Management 44(3): 426–447.
Hubert, M. and Van der Veeken, S. (2008). Outlier detection for skewed data, Journal of Chemometrics 22(3–4): 235–246.
Huberman, B., Adar, E. and Fine, L. (2005). Valuating Privacy, IEEE Privacy and Security 3(5): 22–25.
Internet.org (2013). A Focus on Efficiency: A whitepaper from facebook, Erricsson and Qualcomm.
Isaacs, S. (1933). Social Development in Young Children, London: Routledge & Kegan Paul Limited.
Jentzsch, N., Preibusch, S.P. and Harasser, H.A. (2012). Monetising Privacy – An Economic Model for Pricing Personal Information, Crete, Greece.
Kahneman, D., Wakker, P. and Sarin, R. (1997). Back to Bentham? Explorations of Experienced Utility, Quarterly Journal of Economics 112(2): 375–406.
Krasnova, H., Günther, O., Spiekermann, S. and Koroleva, K. (2009). Privacy Concerns and Identity in Online Social Networks, Identity in the Information Society 2(1): 39–63.
Krasnova, H., Hildebrand, T. and Günther, O. (2009). Investigating the Value of Privacy in Online Social Networks: Conjoint analysis. in International Conference on Information Systems (ICIS 2009). Association for Information Systems, AIS Electronic Library (AISeL), Phoenix.
Laudon, K.C. (1996). Markets and privacy, Communications of the ACM 39(9): 92–104.
Levine, L.E. (1983). Mine: Self-definition in 2 year-old boys, Development Psychology 19(4): 544–549.
Locke, J. (1690). Two Treatises of Government, London: Awnsham Churchill.
Mayer-Schönberger, V. (2009). Delete: The virtue of forgetting in the digital age, Princeton, New Jersey: Princton University Press.
Mayhew, M.G., Ashkanasy, N.M., Bramble, T. and Gardner, J. (2007). A Study of the Antecedents and Consequences of Psychological Ownership in Organizational Settings, Journal of Social Psychology 147(5): 477–500.
Neap, H.S. and Celik, T. (1999). Value of a Product: A definition, International Journal of Value-Based Management 12(2): 181–191.
Nguyen, C., Haynes, P., Maguire, S. and Friedberg, J. (2013). A User-Centred Approach to the Data Dilemma: Context, architecture, and policy, in M. Hilebrandt (ed.) The Digital Englightment Yearbook 2013, Brussels: IOS Press.
Nissenbaum, H. (2004). Privacy as Contextual Integrity, Washington Law Review 79(1): 119–158.
OECD (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris, France.
OECD (2012). Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris, France.
OECD (2013). Exploring the Economics of Personal Data: A survey of methodologies for measuring monetary value’. in OECD Digital Economy Papers. Paris, France.
Peck, J. and Shu, S.B. (2009). The Effect of Mere Touch on Perceived Ownership, Journal of Consumer Research 36(3): 434–447.
Pierce, J.L., Kostova, T. and Dirks, K.T. (2003). The State of Psychological Ownership: Integrating and extending a century of research, Review of General Psychology 7(1): 84–107.
Porteous, J.D. (1976). Home: The territorial core, Geographical Review 66(4): 383–390.
Powdthavee, N. (2008). Putting a Price Tag on Friends, Relatives, and Neighbours: Using surveys of life satisfaction to value social relationships, The Journal of Socio-Economics 37(4): 1459–1480.
Preibusch, S.ö., Krol, K. and Beresford, A.R. (2012). The Privacy Economics of Voluntary Over-Disclosure in Web Forms, in Workshop in the Economics of Information Security (WEIS), Berlin.
Purtova, N. (2012). Property Rights in Personal Data: A European perspective, Alphen aan den Rijn, Holand: Kluwer Law International.
Reilly, Jr. R. and Schweihs, R. (1999). Valuing Intangible Assets, New York: McGraw Hill.
Richter, D., Riemer, K. and vom Brocke, J. (2011). Internet Social Networking: Research state of the art and implications for enterprise 2.0, Business & Information Systems Engineering 3(2): 89–101.
Rindfleisch, A. and Heide, J.B. (1997). Transaction Cost Analysis: Past, present, and future applications, The Journal of Marketing 61(4): 30–54.
Rittenberg, L. and Tregarthen, T. (2011). Principles of Macroeconomics, in Chapter 6, Measuring Total Output and Income, Washington DC: Flat World Knowledge.
Rochberg-Halton, E. (1984). Object relations, role models, and cultivation of the self, Environment and Behavior 16(3): 335–368.
Rose, J., Röber, B. and Rehse, O. (2012). The Value of Our Digital Identity, in L. Global (ed.) Liberty Global Policy Series, London, UK: Liberty Global Policy Series.
Rudmin, F. (1991). To Have Possessions: A handbook on ownership and property, Corte Madera, CA: Select Press.
Schwartz, P.M. (2004). Property, Privacy, and Personal Data, Harvard Law Review 117(7): 2056–2128.
Smith, J.H., Milberg, S.J. and Burke, S.J. (1996). Information Privacy: Measuring individuals’ concerns about organizational practices, MIS Quarterly 20(2): 167–196.
Smith, V.L. and Walker, J.M. (1993). Monetary Rewards and Decision Cost in Experimental Economics, Economic Inquiry 31(2): 245–261.
Smithers, R. (2011). Terms and Conditions: Not reading the small print can mean big problems. [WWW document], http://www.theguardian.com/money/2011/may/11/terms-conditions-small-print-big-problems (accessed 8 April 2016).
Solove, D.J. (2006). A Taxonomy of Privacy, University of Pennsylvania Law Review 154(3): 477–560.
Thaler, R. (1980). Toward a Positive Theory of Consumer Choice, Journal of Economic Behavior & Organization 1(1): 39–60.
The Radicati Group (2013). Email statistics report, 2013–2017, in S. Radicati (ed.). Palo Alto.
The White House (2013). Consumer Data Privacy in a Networked World: A framework for protecting privacy and promoting innovation in the global digital economy, Washington DC: US Government.
Tsai, J., Egelman, S., Cranor, L. and Acquisti, A. (2007). The Effect of Online Privacy Information on Purchasing Behavior: An experimental study, in The 6th Workshop on the Economics of Information Security (WEIS), Pittsburgh.
Varian, H. (1992). Microeconomic Analysis, New York: Norton & Company.
Weil, S. (1952). The Need for Roots: Prelude to a declaration of duties towards mankind, London: Routledge and Kegan Paul.
Wilpert, B. (1991). Property, Ownership, and Participation: On the growing contradictions between legal and psychological concepts, in R. Russell and V. Rus (eds.) International Handbook of Participation in Organizations: For the study of organizational democracy, coo-operation, and self-management, New York: Oxford University Press, pp. 149–164.
World Economic Forum (in collaboration with Bain & Company (ed.)) (2011). Personal Data: The emergence of a new asset class. I, Davos, Switzerland.