Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
暂无分享,去创建一个
Kai Lung Hui | Ivan P. L. Png | Il-Horn Hann | Sang-Yong Tom Lee | K. Hui | I. Png | S. Lee | I. Hann
[1] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[2] G. C. Homans,et al. Social Behavior: Its Elementary Forms. , 1975 .
[3] K. Moorthy. Market Segmentation, Self-Selection, and Product Line Design , 1984 .
[4] P. Green,et al. Conjoint Analysis in Consumer Research: Issues and Outlook , 1978 .
[5] Lee Rainie,et al. Getting Serious Online. , 2002 .
[6] C. Goodwin. Privacy: Recognition of a Consumer Right , 1991 .
[7] A. Tversky,et al. Conjoint-measurement analysis of composition rules in psychology. , 1971 .
[8] Philippe Cattin,et al. Commercial Use of Conjoint Analysis: An Update , 1989 .
[9] N. Anderson. An exchange on functional and conjoint measurement: Comment. , 1971 .
[10] Michael A. Turner. The Impact of Data Restrictions On Consumer Distance Shopping , 2001 .
[11] Daniel Robey,et al. User Attitudes and Management Information System Use , 1979 .
[12] Paul D. Tolchinsky,et al. A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .
[13] S. Jourard. Some Psychological Aspects of Privacy , 1966 .
[14] M. Lynn. Hawaii International Conference on System Sciences , 1996 .
[15] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[16] Geoffry S. Howard,et al. Discretionary Use of Computers: An Empirically Derived Explanatory Model* , 1991 .
[17] V. Vroom. Work and motivation , 1964 .
[18] Stuart L. Esrock,et al. A Dichotomy of Privacy: Personal and Professional Attitudes of Marketers , 1999 .
[19] 김정년,et al. Managerial Economics 『관리경제학』 , 1976 .
[20] M. Wedel,et al. Metric Conjoint Segmentation Methods: A Monte Carlo Comparison , 1996 .
[21] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[22] JULIA A. ERICKSEN,et al. Kiss and Tell , 2001 .
[23] N. Melone. A theoretical assessment of the user-satisfaction construct in information systems research , 1990 .
[24] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[25] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[26] David Jones. Kiss and tell , 1993, Nature.
[27] R. Staelin,et al. A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .
[28] J CulnanMary,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust , 1999 .
[29] A. M. Harrell,et al. An Application of Expectancy Theory to Explain a Manager's Intention to Use a Decision Support System , 1994 .
[30] M. E. Gordon,et al. Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .
[31] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[32] G. Debreu. Topological Methods in Cardinal Utility Theory , 1959 .
[33] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[34] D. D. Simmons,et al. Invasion of privacy and judged benefit of personality-test inquiry. , 1968, The Journal of general psychology.
[35] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[36] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[37] R. Luce,et al. Simultaneous conjoint measurement: A new type of fundamental measurement , 1964 .
[38] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[39] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[40] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[41] Varun Grover,et al. An Application of Expectancy Theory for Assessing User Motivation to Utilize an Expert System , 1992, J. Manag. Inf. Syst..
[42] Uriel G. Foa,et al. Effect of resource class on retaliation to injustice in interpersonal exchange. , 1974 .
[43] Thomas Hill,et al. Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers. , 1987 .
[44] I. Altman. Privacy: A Conceptual Analysis. , 1976 .
[45] Amos Tversky,et al. A general theory of polynomial conjoint measurement , 1967 .
[46] Michael R. Ward. The economics of online retail markets , 2003 .
[47] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[48] E. Clemons,et al. Poaching and the Misappropriation of Information: Transaction Risks of Information Exchange , 2004 .
[49] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[50] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[51] L. J. Savage,et al. The Utility Analysis of Choices Involving Risk , 1948, Journal of Political Economy.
[52] D. Wittink. Market Measurement and Analysis: The First Marketing Science Conference* , 2001 .
[53] Paul E. Green,et al. Segmenting Markets with Conjoint Analysis , 1991 .
[54] Lisa Farrell,et al. Can Expected Utility Theory Explain Gambling , 2002 .
[55] Uriel G. Foa,et al. Interpersonal and Economic Resources , 1971, Science.
[56] P E Green,et al. NEW WAYS TO MEASURE CONSUMER JUDGMENTS , 1975 .
[57] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[58] Michael J. Stahl,et al. Modeling effort decisions with behavioral decision theory: Toward an individual differences model of expectancy theory , 1981 .
[59] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[60] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[61] C. Goodwin. A Conceptualization of Motives to Seek Privacy for Nondeviant Consumption , 1992 .
[62] Jasmine Schwartz. Giving the Web a Memory Cost Its Users Privacy , 2001 .
[63] M. Kaplan,et al. Human judgment and decision processes in applied settings , 1977 .
[64] D. Brinberg,et al. A Resource Exchange Theory Analysis of Consumer Behavior , 1983 .
[65] Paul E. Green,et al. Conjoint Analysis in Marketing: New Developments with Implications for Research and Practice , 1990 .
[66] H. Varian. Economic Aspects of Personal Privacy , 2009 .
[67] Donald F. Cox,et al. Perceived Risk and Consumer Decision-Making—The Case of Telephone Shopping , 1964 .
[68] Ramnath K. Chellappa,et al. Personalization versus Privacy: New Exchange Relationships on the Web , 2006 .
[69] R. b Hahn,et al. An Assessment of the Costs of Proposed Online Privacy Legislation , 2001 .
[70] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[71] L. Beach,et al. Expectancy Theory, Decision Theory and Occupational Preference and Choice. Organizational Research. Technical Report 75-75. , 1975 .
[72] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[73] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[74] Dale Goodhue,et al. Supporting users of corporate data : the effect of I/S policy choices , 1988 .
[75] Gerardine De Sanctis,et al. Expectancy Theory as an Explanation of Voluntary Use of a Decision-Support System: , 1983 .
[76] Jordan J. Louviere,et al. Analyzing Decision Making: Metric Conjoint Analysis , 1988 .
[77] Elizabeth C. Hirschman,et al. People as Products: Analysis of a Complex Marketing Exchange , 1987 .
[78] S. Addelman. Orthogonal Main-Effect Plans for Asymmetrical Factorial Experiments , 1962 .
[79] Christian Terwiesch,et al. Measuring the Frictional Costs of Online Transactions: The Case of a Name-Your-Own-Price Channel , 2003, Manag. Sci..