Keywords:
- Adaptive Single Sign-On
- attribute-based SSO
- authentication security
- authorisation
- business model
- Context-Aware
- context-awareness
- control
- control over user personal data
- data privacy
- design science
- Ease of Use
- focus group
- Governance Risk and Compliance
- Information Systems
- location based services
- mobile radio
- mobile TAM
- mobile users
- Perceived enjoyment
- personal data disclosed
- personalization
- personalization available
- Privacy
- privacy calculus
- Privacy concerns
- Privacy Manager mobile application
- privacy-friendly value propositions
- Requirement Engineering
- service providers
- single sign-on solutions
- telecommunication security
- user's payoff
Publications of Yves Pigneur
2016
Privacy-Based Adaptive Context-Aware Authentication System for Personal Mobile Devices (2016), in: Journal of Mobile Multimedia, 12:1&2(159-180)
|
, and ,
[DOI] [URL] |
The Role of Personalized Services and Control: An Empirical Evaluation of Privacy Calculus and Technology Acceptance Model in the Mobile Context (2016), in: Journal of Information Privacy and Security, 12:3(123-144) | , and ,
[DOI] [URL] |
2015
The Hitchhiker's Guide to the Galaxy of Dynamic Ridesharing, in: Proceedings of the 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), Kauai, Hawaii, USA,, 2015 | and ,
[URL] |
2014
Privacy as a Tradeoff: Introducing the Notion of Privacy Calculus for Context-Aware Mobile Applications, in: Proceedings of the 47st Annual Hawaii International Conference on System Sciences (HICSS 2014), Waikoloa, Hawaii, USA, pages 1063-1072, IEEE Computer Society, 2014
|
, , and ,
[DOI] [URL] |
2012
Respecting the Deal: Economically Sustainable Management of Open Innovation Among Co-Opeting Companies (2012), in: International Journal of E-Services and Mobile Applications (IJESMA), 4:1(23--41) | , , and ,
[DOI] [URL] |
2011
A Dynamic Privacy Manager for Compliance in Pervasive Computing, chapter 12, pages 285-307, IGI Global, 2011 | , , and ,
[DOI] [URL] |
From "security for privacy" to "privacy for security", Berlin, pages 319 -324, Third International Workshop on Business Models for Mobile Platforms, IEEE, 2011 | , , and ,
[DOI] [URL] |
Privacy-Friendly Business Models for Location-Based Mobile Services (2011), in: Journal of Theoretical and Applied Electronic Commerce Research, 6:2(90--107)
|
, , and ,
[DOI] [URL] |
2010
Business model considerations for privacy protection in a mobile location based context, in: Intelligence in Next Generation Networks (ICIN), 2010 14th International Conference on, IEEE, pages 1--8, 2010 | , and ,
[DOI] [URL] |
Compliance management is becoming a major issue in IS design, in: Information Systems: People, Organizations, Institutions, and Technologies, pages 391--398, Springer, 2010 | , and ,
[DOI] [URL] |
Respecting the deal: how to manage co-opetitive actors in open innovation, in: Management of the Interconnected World, pages 421--428, Springer, 2010 | , , and ,
[DOI] [URL] |
2009
Compliance management in multi-actor contexts (2009), in: Governance, Risk and Compliance in Information Systems, 459(91--105) | and ,
[URL] |
2007
From Network Resource to Network Capability: a Case Study from Chinese Software IndustryGang, FANG, in: The Third International Symposium on Global Manufacturing and China [GMC'07], Zhejiang University, Hangzhou, P.R. China, 2007 | and ,
[URL] |
1996
The IT-enabled extended enterprise - Applications in the tourism industry, in: Proceedings of the ENTER conference, 1996 | , and ,