An empirical analysis of users' privacy disclosure behaviors on social network sites
暂无分享,去创建一个
Zhangxi Lin | Kai Li | Xiaowen Wang | Zhangxi Lin | Kai Li | Xiaowen Wang
[1] Yong Jin Park,et al. Digital Literacy and Privacy Behavior Online , 2013, Commun. Res..
[2] Mary Beth Rosson,et al. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..
[3] Joseph P. Stokes,et al. Self-disclosure, intimacy, and the depenetration process. , 1984 .
[4] J. Phelps,et al. Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .
[5] Eden Litt,et al. Understanding social network site users' privacy tool use , 2013, Comput. Hum. Behav..
[6] Yuan Li,et al. The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns , 2014, Decis. Support Syst..
[7] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[8] Jane M. Howell,et al. Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model , 1994, J. Manag. Inf. Syst..
[9] Weiguo Fan,et al. Vehicle defect discovery from social media , 2012, Decis. Support Syst..
[10] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[11] H. Bonfadelli. The Internet and Knowledge Gaps , 2002 .
[12] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[13] Varun Grover,et al. A model of consumers' perceptions of the invasion of information privacy , 2013, Inf. Manag..
[14] 김동훈. Customization , 2017, Encyclopedia of GIS.
[15] Desheng Dash Wu,et al. Using text mining and sentiment analysis for online forums hotspot detection and forecast , 2010, Decis. Support Syst..
[16] Sandra Petronio,et al. Translational Research Endeavors and the Practices of Communication Privacy Management , 2007 .
[17] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[18] Hsinchun Chen,et al. Social Media Analytics and Intelligence , 2010, IEEE Intell. Syst..
[19] Jeffrey T. Child,et al. Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency , 2010, Comput. Hum. Behav..
[20] Stefano Taddei,et al. Privacy, trust and control: Which relationships with online self-disclosure? , 2013, Comput. Hum. Behav..
[21] Nicholas Christakis,et al. The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..
[22] Gandy,et al. Exploring Identity and Identification in Cyberspace , 2014 .
[23] I. Altman,et al. Social penetration: The development of interpersonal relationships , 1973 .
[24] Gordon B. Davis,et al. Testing the Determinants of Microcomputer Usage via a Structural Equation Model , 1995, J. Manag. Inf. Syst..
[25] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[26] H. J. Smith,et al. Managing Privacy: Information Technology and Corporate America , 1994 .
[27] Eric R. Ziegel,et al. Generalized Linear Models , 2002, Technometrics.
[28] Weiguo Fan,et al. The power of social media analytics , 2014, CACM.
[29] Santa Clara,et al. Research Issues in Social Computing * , 2007 .
[30] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[31] Self Book. Self Disclosure An Experimental Analysis Of The Transparent Self , 2016 .
[32] Lawrence R. Wheeless,et al. Conceptualization and Measurement of Reported Self-Disclosure. , 1976 .
[33] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[34] L. Gor’kov. The ‘young people’ , 1989 .
[35] Leslie P. Willcocks,et al. An Empirical Investigation of Information Technology Sourcing Practices: Lessons From Experience , 1998, MIS Q..
[36] Ning Su,et al. Internationalization Strategies of Chinese IT Service Suppliers , 2013, MIS Q..
[37] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[38] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[39] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[40] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[41] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[42] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[43] M. Allen,et al. Sex differences in self-disclosure: a meta-analysis. , 1992, Psychological bulletin.
[44] Tao Zhou,et al. Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern , 2014, Comput. Hum. Behav..
[45] George R. Milne,et al. Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .
[46] K. Sheehan,et al. An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .
[47] S. Petronio. Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .
[48] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[49] Ruby Roy Dholakia,et al. Customization, information provision and choice: what are we willing to give up for personal service? , 2004, Telematics Informatics.
[50] Weiguo Fan,et al. Social Media Adoption and Corporate Disclosure , 2015, J. Inf. Syst..
[51] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[52] Weiguo Fan,et al. Determinants of users' continuance of social networking sites: A self-regulation perspective , 2014, Inf. Manag..
[53] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[54] Alfred Kobsa,et al. Privacy-enhanced personalization , 2006, FLAIRS.
[55] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[56] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[57] H. Raghav Rao,et al. Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..
[58] S. Jourard,et al. Self-Disclosure: An Experimental Analysis of the Transparent Self , 1971 .
[59] R. Mason. Four ethical issues of the information age , 1986 .
[60] George R. Milne. Consumer Participation in Mailing Lists: A Field Experiment , 1997 .
[61] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[62] Magid Igbaria,et al. A Motivational Model of Microcomputer Usage , 1996, J. Manag. Inf. Syst..
[63] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[64] Miriam J. Metzger. Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure , 2006, Commun. Res..
[65] Frederick Plotkin,et al. I. SELF-DISCLOSURE , 1971 .
[66] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[67] K. Sheehan,et al. Dimensions of Privacy Concern among Online Consumers , 2000 .
[68] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[69] S. Davies. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity , 1997 .
[70] Jo Bryce,et al. Young people, disclosure of personal information and online privacy: Control, choice and consequences , 2009, Inf. Secur. Tech. Rep..
[71] Weiguo Fan,et al. What's buzzing in the blizzard of buzz? Automotive component isolation in social media postings , 2013, Decis. Support Syst..
[72] Weiguo Fan,et al. ExpertRank: A topic-aware expert finding algorithm for online knowledge communities , 2013, Decis. Support Syst..
[73] Chuan-Hoo Tan,et al. Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..
[74] Paul H. Cheney,et al. Training End Users: An Exploratory Study , 1987, MIS Q..
[75] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[76] A. Joinson,et al. Self-disclosure, Privacy and the Internet , 2009 .
[77] William J. Kettinger,et al. The Use of Computer‐mediated Communication in an Interorganizational Context , 1997 .