The Impact of Privacy Concerns on the Use of Information Technologies: A Preliminary Conceptual Model
暂无分享,去创建一个
Marvin D. Troutt | Robert H. Faley | Alan A. Brandyberry | Sharen Bakke | M. Troutt | R. Faley | Sharen Bakke
[1] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[2] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[3] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[4] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[5] J CulnanMary. How did they get my name , 1993 .
[6] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[7] D. H. Carson. Man-environment interactions : evaluations and applications , 1974 .
[8] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[9] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[10] Steven C. Wheelwright,et al. Strategic Management of Technology and Innovation , 1992 .
[11] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[12] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[13] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[14] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[15] F. Schoeman,et al. Philosophical Dimensions of Privacy , 1984 .
[16] E. Shils,et al. Privacy: Its Constitution and Vicissitudes , 1966 .
[17] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[18] P. Kelvin. A Social‐Psychological Examination of Privacy , 1973 .
[19] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[20] Timothy Grance,et al. Guide to Selecting Information Technology Security Products , 2003 .
[21] V. Derlega,et al. Privacy and self-disclosure in social relationships. , 1977 .
[22] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[23] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[24] Ritu Agarwal,et al. A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..
[25] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .