The reliance on recognition and majority vote heuristics over privacy concerns when selecting smartphone apps among German and US consumers
暂无分享,去创建一个
[1] Nicholas David Bowman,et al. "The app market has been candy crushed": Observed and rationalized processes for selecting smartphone games , 2015, Entertain. Comput..
[2] Hyun-Hwa Lee,et al. Moderating effect of privacy self-efficacy on location-based mobile marketing , 2013, Int. J. Mob. Commun..
[3] K. Taylor,et al. Accessing Problem-Solving Strategy Knowledge: The Complementary Use of Concurrent Verbal Protocols and Retrospective Debriefing. , 2000 .
[4] Ming H. Hsieh,et al. Identifying Brand Image Dimensionality and Measuring the Degree of Brand Globalization: A Cross-National Study , 2002 .
[5] Marc Fischer,et al. How Important Are Brands? A Cross-Category, Cross-Country Study , 2010 .
[6] W. Wayne Fu,et al. Aggregate bandwagon effect on online videos' viewership: Value uncertainty, popularity cues, and heuristics , 2011, J. Assoc. Inf. Sci. Technol..
[7] Adam Arvidsson,et al. A critical perspective , 2005 .
[8] Jen-Hung Huang,et al. Herding in online product choice , 2006 .
[9] David A. Wagner,et al. Choice Architecture and Smartphone Privacy: There's a Price for That , 2012, WEIS.
[10] Kai H. Lim,et al. Effects of conflicting aggregated rating on eWOM review credibility and diagnosticity: The moderating role of review valence , 2012, Decis. Support Syst..
[11] Jaemin Jung,et al. Measuring usage concentration of smartphone applications: Selective repertoire in a marketplace of choices , 2014 .
[12] Werner Wirth,et al. Heuristic and Systematic Use of Search Engines , 2007, J. Comput. Mediat. Commun..
[13] Hichang Cho,et al. A multinational study on online privacy: global concerns and local responses , 2009, New Media Soc..
[14] Gianfranco Walsh,et al. Electronic Word-of-Mouth: Motives for and Consequences of Reading Customer Articulations on the Internet , 2003, Int. J. Electron. Commer..
[15] Gerd Gigerenzer,et al. The recognition heuristic: How ignorance makes us smart , 1999 .
[16] Miriam J. Metzger,et al. Social and Heuristic Approaches to Credibility Evaluation Online , 2010 .
[17] Xiaoming Hao,et al. An Information-Processing Model for Audiences' Selections of Movies , 2016, J. Media Psychol. Theor. Methods Appl..
[18] Henry H. Emurian,et al. An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..
[19] M.D.T. de Jong,et al. Exploring two methods of usability testing: concurrent versus retrospective think-aloud protocols , 2003 .
[20] S. Shyam Sundar,et al. News cues: Information scent and cognitive heuristics , 2007, J. Assoc. Inf. Sci. Technol..
[21] H. Simon,et al. American Association for Public Opinion Research Bandwagon and Underdog Effects and the Possibility of Election Predictions , 2009 .
[22] W. Wayne Fu,et al. The bandwagon effect on participation in and use of a social networking site , 2012, First Monday.
[23] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[24] K. A. Ericsson,et al. Protocol analysis: Verbal reports as data, Rev. ed. , 1993 .
[25] Glenn J. Browne,et al. Cognitive Stopping Rules for Terminating Information Search in Online Tasks , 2007, MIS Q..
[26] Saraswathi Bellur,et al. How Can We Tell When a Heuristic Has Been Used? Design and Analysis Strategies for Capturing the Operation of Heuristics , 2014 .
[27] Malcolm R. Parks,et al. Cues Filtered Out, Cues Filtered In: Computer-Mediated Communication and Relationships , 2002 .
[28] Gerd Gigerenzer,et al. Fast and frugal media choices , 2009 .
[29] M. Hill,et al. Consumer privacy and the Internet in Europe: a view from Germany , 2003 .
[30] Miriam J. Metzger,et al. Trusting expert- versus user-generated ratings online: The role of information volume, valence, and consumer characteristics , 2013, Comput. Hum. Behav..
[31] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[32] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[33] Cledwyn Fernandez,et al. The Paradox of Choice: Why More Is Less , 2017 .
[34] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[35] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[36] Nicholas David Bowman,et al. Choosing the right app: An exploratory perspective on heuristic decision processes for smartphone app selection , 2015 .
[37] Walid Maalej,et al. Us and them: a study of privacy requirements across north america, asia, and europe , 2014, Software Engineering & Management.
[38] Venkatesh Shankar,et al. Online trust: a stakeholder perspective, concepts, implications, and future directions , 2002, J. Strateg. Inf. Syst..
[39] Gerald L. Lohse,et al. International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..
[40] Lee Rainie,et al. Privacy and information sharing , 2016 .
[41] S. Sundar. The MAIN Model : A Heuristic Approach to Understanding Technology Effects on Credibility , 2007 .
[42] Gerd Gigerenzer,et al. Heuristic decision making. , 2011, Annual review of psychology.
[43] Jean-Paul Dionne,et al. Accessing Problem-Solving Strategy Knowledge: The Complementary Use of Concurrent Verbal Protocols and Retrospective Debriefing. , 2000 .
[44] Michelle Salmona,et al. Online Social Networking across Cultures: An Exploration of Divergent and Common Practices , 2013 .
[45] Glen L. Urban,et al. Online Trust: State of the Art, New Frontiers, and Research Potential , 2009 .
[46] Sophie Cockcroft,et al. The relationship between culture and information privacy policy , 2015, Electronic Markets.
[47] Alice H. Eagly,et al. Heuristic and systematic information processing within and beyond the persuasion context. , 1989 .
[48] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[49] S. Rosen. The Economics of Superstars , 1981 .