Instrumental Incentives

Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13

References

I. Lilova. Investigating the Factors Influencing Managerial Decisions to Adopt Privacy-Enhancing Technologies.
L. Wang, J. P. Near, N. Somani, P. Gao, A. Low, D. Dao, and D. Song. “Data cap- sule: A new paradigm for automatic compliance with data privacy regulations”. In: Heterogeneous Data Management, Polystores, and Analytics for Healthcare. Springer, 2019, pp. 3–23.
O. Klymenko, O. Kosenkov, S. Meisenbacher, P. Elahidoost, D. Mendez, and F. Matthes. “Understanding the Implementation of Technical Measures in the Process of Data Privacy Compliance: A Qualitative Study”. In: arXiv preprint arXiv:2208.08671 (2022).
A. Acquisti, L. Brandimarte, and G. Loewenstein. “Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age”. In: Journal of Consumer Psychology 30.4 (2020), pp. 736–758.
N. Smart. CSM Podcast: Privacy Enhancing Technologies with Nigel Smart. Youtube. 2022.
R. V. Aguilera, D. E. Rupp, C. A. Williams, and J. Ganapathi. “Putting the S back in corporate social responsibility: A multilevel theory of social change in organizations”. In: Academy of management review 32.3 (2007), pp. 836–863.
D. C. Hambrick and P. A. Mason. “Upper echelons: The organization as a reflection of its top managers”. In: Academy of management review 9.2 (1984), pp. 193–206.

References

I. Pollach. “Online privacy as a corporate social responsibility: an empirical study”. In: Business Ethics: A European Review 20.1 (2011), pp. 88–102.
A. M. Allen and J. Peloza. “Someone to watch over me: The integration of privacy and corporate social responsibility”. In: Business Horizons 58.6 (2015), pp. 635–642.
V. Steele. “Corporate Social Responsibility, Data Protection and the Right to Privacy”. In: LJMU Student Law Journal 2 (2022).
M. J. Culnan and C. C. Williams. “How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches”. In: MIS quarterly (2009), pp. 673– 687.
A. Fairchild and P. Ribbers. “Privacy-enhancing identity management in business”. In: Digital Privacy: PRIME-Privacy and Identity Management for Europe (2011), pp. 107–129.
M. G. Jaatun, I. A. Tøndel, K. Bernsmed, and Å. A. Nyre. “Privacy enhancing technolo- gies for information control”. In: Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global, 2012, pp. 1–31.
A. Fairchild and P. Ribbers. “Privacy-enhancing identity management in business”. In: Digital Privacy: PRIME-Privacy and Identity Management for Europe (2011), pp. 107–129.

Congratulations, you've completed all chapters!

You've completed all chapters. You can review the course or start a new one.