Idris Adjerid
Idris Adjerid
Associate Professor, Virginia Tech
Email verificata su
Citata da
Citata da
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
Sleights of privacy: Framing, disclosures, and the limits of transparency
I Adjerid, A Acquisti, L Brandimarte, G Loewenstein
Proceedings of the ninth symposium on usable privacy and security, 1-11, 2013
The impact of privacy regulation and technology incentives: The case of health information exchanges
I Adjerid, A Acquisti, R Telang, R Padman, J Adler-Milstein
Management Science 62 (4), 1042-1063, 2016
Beyond the privacy paradox: Objective versus relative risk in privacy decision making
I Adjerid, E Peer, A Acquisti
Available at SSRN 2765097, 2016
Gone in 15 seconds: The limits of privacy transparency and control
A Acquisti, I Adjerid, L Brandimarte
IEEE Security & Privacy 11 (4), 72-74, 2013
Big data in psychology: A framework for research advancement.
I Adjerid, K Kelley
American Psychologist 73 (7), 899, 2018
The impact of timing on the salience of smartphone app privacy notices
R Balebako, F Schaub, I Adjerid, A Acquisti, L Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Choice architecture, framing, and cascaded privacy choices
I Adjerid, A Acquisti, G Loewenstein
Management science 65 (5), 2267-2290, 2019
Reducing Medicare spending through electronic health information exchange: the role of incentives and exchange maturity
I Adjerid, J Adler-Milstein, C Angst
Information Systems Research 29 (2), 341-361, 2018
Improving vulnerability remediation through better exploit prediction
J Jacobs, S Romanosky, I Adjerid, W Baker
Journal of Cybersecurity 6 (1), tyaa015, 2020
Exploit prediction scoring system (EPSS)
J Jacobs, S Romanosky, B Edwards, M Roytman, I Adjerid
arXiv preprint arXiv:1908.04856, 2019
How unbecoming of you: Gender biases in perceptions of ridesharing performance
B Greenwood, I Adjerid, C Angst
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Consumer consent and firm targeting after GDPR: The case of a large telecom provider
M Godinho de Matos, I Adjerid
Management Science, 2021
& Wang, Y.(2017). Nudges for privacy and security: understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri
ACM Computing Surveys (CSUR) 50 (3), 44, 0
A Query-Theory Perspective of Privacy Decision Making
I Adjerid, S Samat, A Acquisti
The Journal of Legal Studies 45 (S2), S97-S121, 2016
Too good to be true: Firm social performance and the risk of data breach
J D’Arcy, I Adjerid, CM Angst, A Glavas
Information Systems Research 31 (4), 1200-1223, 2020
A tutorial on empirical ICT4D research in developing countries: Processes, challenges, and lessons
KD Wowak, I Adjerid, CM Angst, JC Guzman
Communications of the Association for Information Systems 38 (1), 21, 2016
The paradox of wanting privacy but behaving as if it didn't matter
I Adjerid, E Peer, A Acquisti
LSE Business Review, 2018
Can a Hospital’s Analytics Capabilities Impact Patient Satisfaction? A Multi-Year Panel Study
I Adjerid, C Angst, S Devaraj
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20