Acceptance of Smart Electronic Monitoring at Work as a Result of a Privacy Calculus Decision
暂无分享,去创建一个
[1] Elgar Fleisch,et al. Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..
[2] Robert J. Vandenberg,et al. Introduction: Statistical and Methodological Myths and Urban Legends , 2006 .
[3] Yongqiang Sun,et al. Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences , 2015, Comput. Hum. Behav..
[4] Choong-C. Lee,et al. Understanding the Use of Location-Based Service Applications: Do Privacy Concerns Matter? , 2013 .
[5] Joy L. Hart,et al. Workplace Surveillance and Managing Privacy Boundaries , 2007 .
[6] Albert Y. Zomaya,et al. Big Data Privacy in the Internet of Things Era , 2014, IT Professional.
[7] A. W. Roscoe,et al. User interactive Internet of things privacy preserved access control , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[8] Sandra Petronio,et al. Communication Privacy Management Theory , 2015, Engaging Theories in Interpersonal Communication.
[9] Benedict Bender,et al. Web Tracking - A Literature Review on the State of Research , 2018, HICSS.
[10] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[11] Oliver Günther,et al. Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis , 2009, ICIS.
[12] M. Browne,et al. Alternative Ways of Assessing Model Fit , 1992 .
[13] Heng Xu,et al. Individuals’ Attitudes Towards Electronic Health Records: A Privacy Calculus Perspective , 2016 .
[14] Chelsea Hicks,et al. Privacy and biometrics: An empirical examination of employee concerns , 2016, Information Systems Frontiers.
[15] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[16] Almudena Alcaide,et al. Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..
[17] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[18] Kian-Lee Tan,et al. CASTLE: Continuously Anonymizing Data Streams , 2011, IEEE Transactions on Dependable and Secure Computing.
[19] Miriam A. Cherry,et al. The Law and Policy of People Analytics , 2016 .
[20] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[21] Li Qin,et al. Impact of Privacy Concern in Social Networking Websites , 2012, Internet Res..
[22] Heng Xu,et al. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..
[23] Yingshu Li,et al. Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.
[24] Hüseyin Yildirim,et al. A model for predicting user intention to use wearable IoT devices at the workplace , 2019, J. King Saud Univ. Comput. Inf. Sci..
[25] Anna Romanou,et al. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..
[26] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[27] Melanie Swan,et al. Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.
[28] Scott C. D'Urso,et al. Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .
[29] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[30] S. Petronio,et al. Communication Privacy Management Theory and Health and Risk Messaging , 2017 .
[31] Nadine Bol,et al. Understanding the Effects of Personalization as a Privacy Calculus: Analyzing Self-Disclosure Across Health, News, and Commerce Contexts† , 2018, J. Comput. Mediat. Commun..
[32] Shuchih Ernest Chang,et al. Exploring trust and information monitoring for information security management , 2017, 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI).
[33] K. Ball. Workplace surveillance: an overview , 2010 .
[34] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[35] Sarah Spiekermann,et al. SOCIAL NETWORKS : WHY WE DISCLOSE , 2012 .
[36] Chuan-Hoo Tan,et al. Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..
[37] Sabine Trepte,et al. Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors , 2015 .
[38] Richard Fletcher,et al. The Impact of Trust in the News Media on Online News Consumption and Participation , 2017 .
[39] Marek Korczynski,et al. The Political Economy of Trust , 2002 .
[40] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[41] Martin Upchurch,et al. Humans and Machines at Work: Monitoring, Surveillance and Automation in Contemporary Capitalism , 2017 .
[42] A. Hayes. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach , 2013 .
[43] Miriam J. Metzger,et al. An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample , 2016, J. Comput. Mediat. Commun..
[44] E. Ramsey,et al. Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns , 2010 .
[45] R. Zolin,et al. The Central Role of Communication in Developing Trust and Its Effect On Employee Involvement , 2009 .
[46] Paul E. Ketelaar,et al. The smartphone as your follower: The role of smartphone literacy in the relation between privacy concerns, attitude and behaviour towards phone-embedded tracking , 2018, Comput. Hum. Behav..
[47] H. Marsh,et al. Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .
[48] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[49] Mark Rowan,et al. A Privacy Policy Comparison of Health and Fitness Related Mobile Applications , 2014, EUSPN/ICTH.
[50] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[51] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[52] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[53] J. Atkinson. Workplace Monitoring and the Right to Private Life at Work , 2018, The Modern Law Review.
[54] Athanasios V. Vasilakos,et al. The Quest for Privacy in the Internet of Things , 2016, IEEE Cloud Computing.
[55] Peter Buxmann,et al. Der „Preis des Kostenlosen“ , 2012, Wirtschaftsinformatik Manag..
[56] L. Cranor,et al. Are They Worth Reading? An In-Depth Analysis of Online Advertising Companies’ Privacy Policies , 2014 .
[57] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[58] Sven Laumer,et al. THE INFLUENCE OF RESIGNATION ON THE PRIVACY CALCULUS IN THE CONTEXT OF SOCIAL NETWORKING SITES: AN EMPIRICAL ANALYSIS , 2018 .
[59] Hock-Hai Teo,et al. AIS Electronic , 2013 .
[60] D. Mahr,et al. Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness , 2015 .