Why should I tell you? Applying a culturally attuned privacy theory to understand global customers' online disclosure behaviours in e-commerce transactions
暂无分享,去创建一个
Shafiz Affendi Mohd Yusof | Norhayati Zakaria | Nasriah Zakaria | S. Yusof | N. Zakaria | Nasriah Zakaria
[1] A. Bandura. Social learning theory , 1977 .
[2] Steven A. Mccornack. Information manipulation theory , 1992 .
[3] H. Triandis. Individualism And Collectivism , 1995 .
[4] Lorrie Faith Cranor,et al. 'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.
[5] Lee Sproull,et al. Reducing social context cues: electronic mail in organizational communication , 1986 .
[6] Alessandro Acquisti,et al. Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.
[7] H. Raghav Rao,et al. On risk, convenience, and Internet shopping behavior , 2000, CACM.
[8] Richard West,et al. Introducing Communication Theory , 2010 .
[9] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[10] William B. Gudykunst. Cultural Variability in Communication , 1997 .
[11] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[12] H. Triandis. Culture and Social Behavior , 2019, Cross-Cultural Explorations.
[13] Richard West,et al. Introducing Communication Theory: Analysis and Application , 2000 .
[14] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[15] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[16] Dean C. Barnlund,et al. Public and Private Self in Japan and the United States: Communicative Styles of Two Cultures , 1989 .
[17] Anthony L. Amadeo. Cultural Dimensions of International Business , 1991 .
[18] Miriam J. Metzger. Communication Privacy Management in Electronic Commerce , 2007, J. Comput. Mediat. Commun..
[19] Norhayati Zakaria,et al. Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East , 2003, Inf. Technol. People.
[20] William B. Gudykunst,et al. The Influence of Individualism Collectivism, Self-Monitoring, and Predicted-Outcome Value on Communication in Ingroup and Outgroup Relationships , 1992 .
[21] Robert Greenberg,et al. Culture and Consumer Trust in Online Businesses , 2008, J. Glob. Inf. Manag..
[22] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[23] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[24] Stella Ting-Toomey. Communicating Across Cultures , 1999 .
[25] Kai Lung Hui,et al. Disclosure : Motivators and Measurements , 2006 .
[26] Anthony D. Miyazaki,et al. Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .
[27] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[28] Corey A Ciocchetti. E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors , 2007 .
[29] Guo-ming Chen,et al. Differences in Self-Disclosure Patterns among Americans Versus Chinese , 1995 .
[30] T. White,et al. Consumer Disclosure and Disclosure Avoidance: A Motivational Framework , 2004 .
[31] William B. Gudykunst. Cross-Cultural and Intercultural Communication , 2003 .
[32] Benjamin Gerber,et al. Conceptualizing privacy , 2010, CSOC.
[33] Gerald L. Lohse,et al. International differences in information privacy concern: Implications for the globalization of electronic commerce , 2004 .
[34] J. Stanton,et al. Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. , 2002 .
[35] Guo-Ming Chen,et al. Foundations of Intercultural Communication , 1997 .
[36] M. Hogg,et al. Social Identity and Self-Categorization Processes in Organizational Contexts , 2000 .
[37] Intercultural Communication Theories , 1999 .
[38] Xiaodong Deng,et al. Building online trust through privacy practices , 2007, International Journal of Information Security.
[39] S. Petronio. Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .
[40] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .