References
- Austermuehle, E. 2016. Monitory your employees through GPS: What is legal and what are best practices? Accessed December 5, 2021. https://www.greensfelder.com/business-risk-management-blog/monitoring-your-employees-through-gps-what-is-legal-and-what-are-best-practices
- Banerjee, S. 2019. Geosurveillance, location privacy, and personalization. Journal of Public Policy & Marketing 38 (4):484–99. doi: https://doi.org/10.1177/0743915619860137.
- Bélanger, F., and R. Crossler. 2011. Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly 35 (4):1017–42. doi: https://doi.org/10.2307/41409971.
- Beresford, A. R., and F. Stajano. 2003. Location privacy in pervasive computing. IEEE Pervasive Computing 2 (1):46–55. doi: https://doi.org/10.1109/MPRV.2003.1186725.
- Boshell, P. M. 2019. The power of place: Geolocation tracking and privacy. Accessed December 5, 2021. https://businesslawtoday.org/2019/03/power-place-geolocation-tracking-privacy/.
- Bridwell, S. A. 2007. The dimensions of locational privacy. In Societies and cities in the age of instant access, ed. H. J. Miller, 209–25. Dordrecht, Germany: Springer.
- Clarke, R. 1999. Internet privacy concerns confirm the case for intervention. Communications of the ACM 42 (2):60–7. doi: https://doi.org/10.1145/293411.293475.
- Clarke, R. 2001. Person, location, and person tracking: Technologies, risks, and policy implications. Information Technology & People 14 (2):206–30. doi: https://doi.org/10.1108/09593840110695767.
- Clavell, G. C. 2018. Exploring the ethical, organizational, and technological challenges of crime mapping: A critical approach to urban safety technologies. Ethics and Information Technology 20:265–77.
- Conger, S., H. H. Pratt, and K. D. Loch. 2013. Personal information privacy and emerging technologies. Information Systems Journal 23 (5):401–17. doi: https://doi.org/10.1111/j.1365-2575.2012.00402.x.
- Cottrill, C. D. 2011. Location privacy: Who protects? Journal of the Urban and Regional Information Systems Association 23 (2):49–59.
- Cottrill, C. D., and P. Thakuriah. 2015. Location privacy preferences: A survey-based analysis of consumer awareness, trade-off and decision-making. Transportation Research Part C: Emerging Technologies 56:132–48. doi: https://doi.org/10.1016/j.trc.2015.04.005.
- Covert, Q., M. Francis, D. Steinhagen, and K. Streff. 2020. Towards a triad for data privacy. In Proceedings of the 53rd Hawaii International Conference on System Sciences, 4370–4387. Atlanta, GA: Association for Information Systems. Accessed December 5, 2021. https://scholarspace.manoa.hawaii.edu/bitstream/10125/64277/1/0433.pdf.
- Creswell, J. W. 2012. Qualitative inquiry and research design: Choosing among five approaches. 3rd ed. Thousand Oaks, CA: Sage.
- Dinev, T. 2014. Why would we care about privacy? European Journal of Information Systems 23 (2):97–102. doi: https://doi.org/10.1057/ejis.2014.1.
- Doyle, T., and J. Veranas. 2014. Public anonymity and the connected world. Ethics and Information Technology 16 (3):207–18. doi: https://doi.org/10.1007/s10676-014-9346-5.
- Duckham, M. 2013. Location privacy. In Geographic information systems: Concepts, methods, tools, and applications, Vol. 1, 24–9. Hershey, PA: IGI Global.
- Eggers, J. P., and S. Kaplan. 2009. Cognition and renewal: Comparing CEO and organizational effects on incumbent adaptation to technical change. Organization Science 20 (2):461–77. doi: https://doi.org/10.1287/orsc.1080.0401.
- Eisenhardt, K. M. 1989. Building theories from case study research. The Academy of Management Review 14 (4):532–50. doi: https://doi.org/10.2307/258557.
- EU. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016. Official Journal of the European Union L119/:1–88.
- Gavetti, G., and D. Levinthal. 2000. Looking forward and looking backward: Cognitive and experiential search. Administrative Science Quarterly 45 (1):113–36. doi: https://doi.org/10.2307/2666981.
- Gellman, B., and A. Soltani. 2013. NSA tracking cellphone locations worldwide, Snowden documents show. Washington Post, December 4. Assessed December 12, 2021. https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
- Goel, S. 2015. Anonymity vs. security: The right balance for the smart grid. Communication of the Association for Information Systems 36 (2):23–32.
- Haque, A. 2003. Information technology, GIS, and democratic values: Ethical implications for IT professionals in public service. Ethics and Information Technology 5 (1):39–48. doi: https://doi.org/10.1023/A:1024986003350.
- Hasanzadeh, K. I., A. Kajosaari, D. Haggman, and M. Kytta. 2020. A context sensitive approach to anonymizing public participation data: From development to the assessment of anonymization effects on data quality. Computers, Environment and Urban Systems 83:101513–12. doi: https://doi.org/10.1016/jcompenvurb.2020.101513.
- Hermann, M., M. Hildebrandt, L. Tielemans, and C. Diaz. 2016. Privacy in location-based services: An interdisciplinary approach. ScriptEd 13 (2):144–70.
- Junglas, I., and R. Watson. 2008. Location-based services. Communications of the ACM 51 (3):65–9. doi: https://doi.org/10.1145/1325555.1325568.
- Kar, B., R. C. Crowsey, and J. J. Zale. 2013. The myth of location privacy in the United States: Surveyed attitude versus current practices. The Professional Geographer 65 (1):47–64. doi: https://doi.org/10.1080/00330124.2012.658725.
- Keith, M. J., J. S. Babb, P. B. Lowry, C. P. Furner, and A. Abdullat. 2015. The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal 25 (6):637–67. doi: https://doi.org/10.1111/isj.12082.
- Kim, G.-H., S. Trimi, and J.-H. Chung. 2014. Big-data applications in the government sector. Communications of the ACM 57 (3):78–85. doi: https://doi.org/10.1145/2500873.
- Meyer, S. 2018. Location privacy is more important than you think. CPO Magazine, November 2. Accessed January 6, 2022. https://www.cpomagazine.com/data-privacy/location-privacy-is-more-important-than-you-think/
- Moore, A. 2000. Employee monitoring and computer technology: Evaluative surveillance vs. privacy. Business Ethics Quarterly 10 (3):697–709. doi: https://doi.org/10.2307/3857899.
- Morgan, M. G., and E. Newton. 2004. Protecting public anonymity. Issues in Science and Technology 21 (1):83–90.
- Nadkarni, S., and P. A. Barr. 2008. Environmental context, managerial cognition, and strategic action: An integrated view. Strategic Management Journal 29 (13):1395–427. doi: https://doi.org/10.1002/smj.717.
- Nissenbaum, H. 2009. Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press.
- NIST. 2020. NIST privacy framework: A tool for improving privacy through enterprise risk management. (Report version 1.0. January 16). Washington, DC: National Institute of Standards and Technology.
- OMB. 2016. Circular A-130: Managing information as a strategic resource. Washington, DC: Office of Management and Budget.
- Parliament of EU. 2018. The EU General Data Protection Regulation (GDPR). Brussels, Belgium: European Union.
- Pavlou, P. A. 2011. State of the information privacy literature: Where are we now and where should we go? MIS Quarterly 35 (4):977–88. doi: https://doi.org/10.2307/41409969.
- State of California. 2020. Title 1.81.5: California Consumer Privacy Act of 2018. Accessed December 12, 2021. https://casetext.com/statute/california-codes/california-civil-code/division-3-obligations/part-4-obligations-arising-from-particular-transactions/title-1815-california-consumer-privacy-act-of-2018
- Stebbins, R. A. 2001. Exploratory research in the social sciences. Thousand Oaks, CA: Sage.
- Theisen, G., and H. Manheimer. 2014. Georgia law enforcement and the open records act: A law enforcement officer’s guide to open records in Georgia. Accessed January 6, 2022. https://pacga.org/wp-content/uploads/2019/06/Georgia-Law-Enforcement-and-the-Open-Records-Act-A-Law-Enforcement-Officers-Guide-to-Open-Records-in-Georgia.pdf
- Tikkanen, H., J.-A. Lamberg, P. Parvinen, and J.-P. Kallunki. 2005. Managerial cognition, action, and the business model of the firm. Management Decision 43 (6):789–809. doi: https://doi.org/10.1108/00251740510603565.
- Turner, D. W. 2010. Qualitative interview design: A practical guide for novice investigators. The Qualitative Report 15 (3):754–60.
- Westin, A. F. 2003. Social and political dimensions of privacy. Journal of Social Issues 59 (2):431–53. doi: https://doi.org/10.1111/1540-4560.00072.
- Xu, H., H.-H. Teo, B. C. Y. Tan, and R. Agarwal. 2009. The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems 26 (3):135–73. doi: https://doi.org/10.2753/MIS0742-1222260305.
- Xu, H., H.-H. Teo, B. C. Y. Tan, and R. Agarwal. 2012. Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research 23 (4):1342–63. doi: https://doi.org/10.1287/isre.1120.0416.
- Yin, R. 2018. Case study research and applications: Design and methods. 6th ed. Thousand Oaks, CA: Sage.
- Zhou, T. 2017. Understanding location-based services users’ privacy concern: An elaboration likelihood model perspective. Internet Research 27 (3):506–19. doi: https://doi.org/10.1108/IntR-04-2016-0088.