LiX.-B., and SarkarS. (2009). Against Classification Attacks: A decision tree pruning approach to privacy protection in data mining, Operations Research57(6): 1496–1509.
2.
RansbothamS., and MitraS. (2009). Choice and Chance: A conceptual model of paths to information security compromise, Information Systems Research20(1): 121–139.
3.
SchneierB. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive, Indianapolis, IN: John Wiley & Sons.
4.
XuH., TeoH.H., TanB.C.Y., and AgarwalR. (forthcoming). Effects of Individual Self-Protection, Industry Self-regulation, and Government Regulation on Privacy Concerns: A study of location-based services, Information Systems Research, doi: 10.1287/isre.1120.0416 in press.