You are here: Resources > FIDIS Deliverables > Mobility and Identity > D11.3: Economic aspects of mobility and identity > 

D11.3: Economic aspects of mobility and identity

Outlook  Title:
REFERENCES
 Hyperlinks

 

References

Bibliography

 

  1. Ajzen, I., Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood Cliffs, NJ, 1980.

  2. Akkermans, H. A. and Oorschot, K. E., A Case Study of Balanced Scorecard Development Using System Dynamics, Journal of the Operational Research Society, Vol. 56, No. 8, pp. 931–941, (2005).

  3. Akkermans, H. A. and van Oorschot, K. E., Developing a Balanced Scorecard with System Dynamics, Proceeding of 2002 International System Dynamics Conference, 2002.

  4. Article 29 – Data Protection Working Party, Working Document: Transfers of personal data to third countries: Applying Articles 25 and 26 of the EU data protection directive, adopted on 24 July 1998 (WP 12), available online at: http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/1998/wp12_en.pdf (accessed 25 June 2008).

  5. Article 29 – Data Protection Working Party, Privacy on the Internet - An integrated EU Approach to On-line Data Protection, adopted on 21 November 2000, 5063/00/EN/FINAL (WP 37), available at http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2000/wp37en.pdf (accessed 25 June 2008).

  6. Article 29 – Data Protection Working Paper, Working Document on Transfers of personal data to third countries: Applying Article 26 (2) of the EU Data Protection Directive to Binding Corporate Rules for International Data Transfers, adopted on 03 June 2003 (WP74), available online at: http://www.europa.eu.int/comm/ justice_home/fsj/privacy/docs/wpdocs/2003/wp74_en.pdf (accessed 25 June 2008).

  7. Article 29 – Data Protection Working Party, Opinion No 5/2004 on unsolicited communications for direct marketing purposes under Article 13 of Directive 2002/58/EC, adopted on 27 February 2004 (WP 90), available online at  http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2004/wp90_en.pdf (accessed on 25 June 2008).

  8. Article 29 – Data Protection Working Party, Opinion on the use of location data with a view to providing value-added services, adopted on 25 November 2005, 2130/05/EN (WP 115), p. 5, available online at http://www.europa.eu.int/comm/justice_home/fsj/privacy/docs/wpdocs/2005/wp115_en.pdf (accessed on 25 June 2008).

  9. Baecker, D., Organisation als System, Suhrkamp Verlag, Frankfurt am Main 1999.

  10. Barnes, S.J., Huff, S.L., Rising Sun: iMode and the Wireless Internet, Communications of the ACM, Vol. 46, No. 11, pp. 79-84, 2003.

  11. Baschin, A. and Steffen, A., IT-Controlling mit der Balanced Scorecard, Zeitschrift für Controlling u. Management, Vol. 45, No. 6, pp. 367-371, (2001).

  12. Bergmann, M., Rost, M., Pettersson, J. S., Exploring the Feasability of a Spatial User Interface Paradigm for Privacy-Enhancing Technology, in Nilsson, A. G. et al. (eds.), Advances in Information Systems Development: Bridging the Gap between Academia and Industry, Springer Verlag, Heidelberg, 2005.

  13. Blas, A.D., Policy paper on transfers of personal data to third countries in the framework of the new Dutch Data Protection Act, (WBP) Dutch Data Protection Authority, (February 2003), available online at: http://www.dutchdpa.nl/documenten/en_int_policy_paper.shtml?refer=true (accessed on 12 February 2006).

  14. Beyers, H., Het internet en de informatiesamenleving – criteria voor de adoptie van nieuwe technologie, tijdschrift voor sociologie, volume 23, nr. 3-4, p 545- 570, 2002.

  15. Boon, S., Holmes, J., The dynamics of interpersonal trust: Resolving uncertainty in the face of risk, in Hinde, R., Groebel, J. (Eds.): Cooperation and Prosocial Behaviour, Cambridge University Press, Cambridge, pp. 190–211, 1991.

  16. Büllingen,F., Stamm, P., Mobile Multimedia-Dienste: Deutschlands Chance im globalen Wettbewerb, Bundesministerium für Wirtschaft und Arbeit, 2004.

  17. Cahill, V., Shand, B., Grey, E., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Bryce, C., di Marzo, G., Seigneur, J.M., Carbone, M., Krukow, K., Jensen, C., Chen, Y., Nielse, M., Using Trust for Secure Collaboration in Uncertain Environments, Pervasive Computing, July-September 2003, pp. 52-61, available at: http://www.cis.strath.ac.uk/research/publications/papers/strath_cis_publication_262.pdf (accessed on 25 June 2008).

  18. Clarke, Stauton, Innovation in technology and organization, Londen Routledge, 1994.

  19. Commission Staff Working Document, Annex to the: Proposal for a Directive of the European Parliament and of the Council on the retention of data processed in connection with the provision of public electronic communication services and amending Directive 2002/58/EC EXTENDED IMPACT ASSESSMENT, available at http://www.statewatch.org/news/2005/oct/com-dataret-reg-ass-05.pdf  (Accessed on 21 September 2005).

  20. Council of Europe, Statements, Council doc. 5777/06 ADD 1 (10 February 2006) available online at http://register.consilium.eu.int/pdf/en/06/st05/st05777-ad01.en06.pdf (accessed on 25 June 2008).

  21. Council of the European Union, Declaration by delegations pursuant to Article 15(3) of the proposal for a directive, Council doc. 5777/06 ADD2 (February 10, 2006), available online at http://register.consilium.eu.int/pdf/en/06/st05/st05777-ad02.en06.pdf (accessed on 25 June 2008).

  22. Danezis, G., Lewis, S., Anderson, Ρ., How Much is Location Privacy Worth?, 2006, available online at http://infosecon.net/workshop/pdf/location-privacy.pdf (accessed on 25 June 2008).

  23. Davis, F. D., Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly Vol. 13, No. 3, pp. 319-339, 1989.

  24. Deuker, A. (ed.), FIDIS Deliverable D11.2 “Location Based Services”, Frankfurt a. M. 2008.

  25. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, L 281, 23.11.1995, p. 0031-0050. 

  26. Directive 97/66/EC of the European Parliament and the Council of 15 December 1997 on the processing of personal data and the protection of privacy in the telecommunications sector, O.J. L 53, 14 January 1998. 

  27. Directive 2002/21/EC of the European Parliament and of the Council on a common regulatory framework for electronic communications networks and services (Framework Directive), Official Journal L 108 pp. 33- 50 (April 24, 2002). 

  28. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, O.J. L201,37, 31 July 2002. 

  29. Directive on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Final text of the directive (not yet published in the Official Journal) cf. Council doc. 3677/05
    (February 03, 2006) available online at http://register.consilium.eu.int/pdf/en/05/st03/st03677.en05.pdf (accessed on 25 June 2008).

  30. Dumortier, J., Goemans, C., Privacy Protection and Identity Management, in Blažič, B., Schneider, W., Klobučar, T. (eds.), Security and Privacy in Advanced Networking Technologies, Ios Press, 2004, pp. 191-212.

  31. Farrell, S., Seigneur, J.M., Jensen, C., Security in Exotic Wireless Networks, in Blažič-Jerman, B., Schneider, W, Klobučar, T., (eds.), Security and Privacy in Advanced Networking Technologies, IOS Press, 2004, pp. 101-114.

  32. Final Report: Economic Evaluation of the Data Protection Directive 95/46/EC (May 2005), Commissioned by the European Commission and prepared by RAMBOLL Management, available at: http://europa.eu.int/comm/justice_home/fsj/privacy/docs/studies/economic_evaluation_en.pdf (Accessed on 25 June 2008).

  33. Fishbein, M., Ajzen, I., Belief, attitude, intention, and behavior : An introduction to theory and research, Don Mills, Ontario: Addison-Wesley, Reading (Mass.) USA,  1975.

  34. Fung, R., Lee, M., EC-Trust (Trust in electronic commerce): Exploring the antecedent factors. In Proceedings of America Conference of Information System, 1999.

  35. Garfinkel, S., Rosenberg, B. (eds.), RFID Application, Security, and Privacy, pp. 189-200, Addison-Wesley, New York 2005.

  36. Gasson, M., Meints, M., Warwick, K. (eds.), FIDIS Deliverable D3.2 “A Study on PKI and Biometrics”, pp. 41-47, Frankfurt a. M. 2005.

  37. Goemans C., Dumortier J., Enforcement Issues - Mandatory retention of traffic data in the EU: possible impact on privacy and on-line anonymity, in Nicoll, C., Prince, J.E.J., van Dellen, M.J.M (eds.), Digital Anonymity and the Law, Information Technologies & Law Series (2), T.M.C. Asser Press, 2003, pp. 161-183, available online at http://www.law.kuleuven.ac.be/icri/publications/440Retention_of_traffic_data_Dumortier_Goemans.pdf?where= (accessed on 17 October 2005).

  38. Gudauskaite, S., Peciura, L., Electronic Signature: E-Document Exchange in Lithuanias Public Sector, Baltic IT&T Review (34) 2004, pp. 15-17, Vilnius 2004.

  39. Hansen, M., Berlich, P., Identity Management Systems: Gateway and Guardian for Virtual Residences, EMTEL Conference: New Media, Technology and Everyday Life in Europe Conference, London 2003. Download see http://www.lse.ac.uk/collections/EMTEL/Conference/papers/hansen_berlich.pdf (Accessed on 25 June 2008).

  40. Holznagel, B., Sonntag, M.., A Case Study: The JANUS Project, in Nicoll, C., Prins J.E.J., van Dellen, M.J.M. (eds.), Digital Anonymity and the Law – Tensions and Dimensions, TMC Asser Press, The Hague, 2003, pp. 121-135.

  41. IPTS, Security and Privacy for the Citizen in the Post September 11 Digital Age: A Prospective Overview, 2003, available online at ftp://ftp.jrc.es/pub/EURdoc/eur20823en.pdf (Accessed on 25 June 2008).

  42. Jay, R., Hamilton, A., Data Protection Law and Practice, Sweet & Maxwell, London, 2003.

  43. Jonen, A. et al., Balanced IT-Decision-Card, Ein Instrument für das Investitionscontrolling von IT-Projekten, Wirtschaftsinformatik, Vol. 46, No. 3, pp. 196-203, (2004).

  44. Judgement of the European Court of Justice, Case C.I.L.F.I.T. v. Ministry of Health, Case 283/81 (1982) ECR 3415.

  45. Judgment of the European Court of Justice (6 November 2003), Case C-101/01 Bodil Lindqvist v Åklagarkammaren i Jönköping.

  46. Kaplan, R. S. and Norton, D. P., Strategy maps, Harvard Business School Press, 2004a.

  47. Kaplan, R. S. and Norton, D. P., The Balanced Scorecard. Translating Strategy into Action, Random House, 1996.

  48. Kieserling, A., Kommunikation unter Anwesenden – Studien über Interaktionssysteme, Suhrkamp Verlag, Frankfurt am Main, 2000.

  49. Kuner, C., European Data Privacy Law and Online Business, Oxford University Press, 2003.

  50. Luhmann, N., Organisation und Entscheidung, Westdeutscher Verlag, Opladen/Wiesbaden 2000.

  51. Martinsons, M., Davidson, R. and Tse, D., The balanced scorecard: a foundation for the strategic management of information systems, Decision Support Systems, Vol. 25, No. 1, pp. 71-88, (1999).

  52. Meints, M., Hansen, M. (eds.), FIDIS Deliverable D3.6 “A Study on ID Documents”, pp. 41-47, Frankfurt a. M. 2005.

  53. Mooraj, S. and Oyon, D. H. D., The Balanced Scorecard: a Necessary Good or an Unnecessary Evil?, European Management Journal, Vol. 17, No. 5, pp. 481-491, (1999).

  54. Morisson, Foerster, Data retention – Implications for Business, February 2006, available online at http://www.mofo.com/mofo_dev/news/updates/files/update02138.html (accessed on 13 February 2006).

  55. Nabeth, T., Hildebrandt, M. (eds.), FIDIS Deliverable D2.1 “Inventory of Topics and Clusters”, Frankfurt a. M. 2004.

  56. Ngai, E. W. T. and Gunasekaran, A., A review for mobile commerce research and applications, Decision Support Systems, Vol. 43, No. 1, pp. 3-15, (2007). 

  57. Ng-Kruelle, G., P. Swatman, D. Rebne and F. Hampe, The Price of Convenience: Privacy and Mobile Commerce, Quarterly Journal of Electronic Commerce, Vol. 3, No. 3, pp 273-385, 2002.

  58. Nohria, N., Leestma, M., A moving Target: The Mobile-Commerce Customer, MIT Sloan Management Reviews, Spring 2001.

  59. Picot and Neuburger, Mobile Business – Erfolgsfaktoren und Voraussetzungen, in:  Mobile Kommunikation, Reichwaldt (Hrsg.), Gabler, Wiesbaden, 2002, pp. 55-69.

  60. Raab C., The Governance of Data Protection, in Kooiman, L. (ed.), Modern Governance, Sage Publications, London 1993, pp.89-103.

  61. Rebne, D., G. Ng-Kruelle, P. Swatman and F. Hampe, Weberian Socioeconomic Behavioral Analysis and Price-of-convenience Sensitivity: Implications for MCommerce and Location-based Applications, 2002 CollECTeR (Europe) Conference on Electronic Commerce, Centre de Congres, Toulouse, France, 2002.

  62. Ristola, A., Koivumaki, T., Kesti, M.: The Effect on Familiar Mobile Device and Usage Time on Creating Perceptions Towards Mobile Services, International Conference on Mobile Business (ICMB’05), pp. 384-391, 2005. 

  63. Rogers, E. M., The Diffusion of Innovations, 5th Edition, Free Press, New York, London, Toronto, Sidney, 2003.

  64. Roussos, P.D., Peterson, D., Patel, U., Identity Management; an Enacted View, International Journal of E - Commerce, vol. 8, number 1, M.E. Sharpe Armonk NY, 2003, pp.81–100.

  65. Rowland, D., Macdonald, E., Information Technology Law, 3rd edition, Cavendish Publishing, London 2005.

  66. Royer, D. (ed.), FIDIS Deliverable D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity’, Frankfurt, 2006

  67. Schneberger, S., Wade, M. (eds.), Theories Used in IS Research Wiki, http://www.fsc.yorku.ca/york/istheory/wiki/index.php/Main_Page, York (Canada), 2008 (Accessed on 30 June 2008).

  68. Sheppard, B. H., Hartwick, J., & Warshaw, P.R., The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research, Journal of Consumer Research, Vol. 15, pp. 325-343, 1988.

  69. Siau, K., Shen, Z., Building Customer Trust in Mobile Commerce, Communications of the ACM, Vol. 46, No. 4, 2003, pp. 91-94.

  70. Siougle, E.S., Zorkadis, V.C., A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls, in Davida, G., Frankel Y., Rees O., (eds.) Infrastructure Security, Proceedings of InfraSec International Conference (2002, Bristol, UK), Springer, 2002, pp. 104-114.

  71. UK Information commissioner, Guidance to the privacy and electronic communications (EC Directive) Regulations – Part 1: marketing by electronic means, v3.0 (May 2004), available online at http://www.ico.gov.uk/documentUploads/Electronic%20Communications%20Part%201%20Version%203.pdf (accessed on 17 November 2005).

  72. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D., User acceptance of information technology: Toward a unified view, MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003.

 

Outlook  fidis-wp11-del11.3.economic_aspects.sxw  Hyperlinks
36 / 37