Do context and personality matter? Trust and privacy concerns in disclosing private information online
暂无分享,去创建一个
[1] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[2] Paul A. Pavlou,et al. Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa , 2005, J. Glob. Inf. Manag..
[3] 이훈,et al. 지각된 유용성(Perceived Usefulness)의 영향분석 , 2004 .
[4] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[5] P. Costa,et al. Facet Scales for Agreeableness and Conscientiousness: A Revision of the NEO Personality Inventory☆ , 1991 .
[6] Robert F. Easley,et al. Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..
[7] R. I. Sutton,et al. Organizational behavior: linking individuals and groups to organizational contexts. , 1993, Annual review of psychology.
[8] Daria Knoch,et al. Personality, risky health behaviour, and perceived susceptibility to health risks , 1999 .
[9] Straub,et al. Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .
[10] David Gefen,et al. Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.
[11] Fatemeh Zahedi,et al. Trust violation and repair: The information privacy perspective , 2015, Decis. Support Syst..
[12] Albert H. Segars,et al. Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .
[13] J. Nunnally. Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .
[14] K. Sheehan,et al. Dimensions of Privacy Concern among Online Consumers , 2000 .
[15] G. Āllport,et al. Trait-names: A psycho-lexical study. , 1936 .
[16] M. Deutsch. Trust and suspicion , 1958 .
[17] A. Tversky,et al. The framing of decisions and the psychology of choice. , 1981, Science.
[18] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[19] Bingjia Shao,et al. The Impact of Psychological Factors on Consumers Trust in Adoption of M-Commerce , 2014 .
[20] Risto Rajala,et al. oes a contextualized theory of planned behavior explain why eenagers stay in virtual worlds ? , 2014 .
[21] S. Briggs,et al. Assessing the five-factor model of personality description. , 1992, Journal of personality.
[22] J. Efrim Boritz,et al. E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery , 2011, J. Inf. Syst..
[23] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[24] David L. Mothersbaugh,et al. Disclosure Antecedents in an Online Service Context , 2012 .
[25] L. Wrightsman,et al. Personality and attitudinal correlates of trusting and trustworthy behaviors in a two-person game. , 1966, Journal of personality and social psychology.
[26] Gordon W. Cheung,et al. Evaluating Goodness-of-Fit Indexes for Testing Measurement Invariance , 2002 .
[27] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[28] E. Fraj,et al. Influence of personality on ecological consumer behaviour , 2006 .
[29] C. L. Rose,et al. The role of the Big Five personality factors in vigilance performance and workload , 2002 .
[30] L. R. Goldberg. THE DEVELOPMENT OF MARKERS FOR THE BIG-FIVE FACTOR STRUCTURE , 1992 .
[31] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[32] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[33] Laura A. Rosenbury. Friends with Benefits? , 2007 .
[34] Paul A. Pavlou,et al. Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..
[35] Athanasios Krystallis,et al. Public trust in institutions and information sources regarding risk management and communication: towards integrating extant knowledge , 2009 .
[36] Ralph L. Keeney,et al. Decisions with multiple objectives: preferences and value tradeoffs , 1976 .
[37] Y. Fried,et al. Location, location, location: contextualizing organizational research* , 2001 .
[38] D. Kahneman. Thinking, Fast and Slow , 2011 .
[39] Heng Xu,et al. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.
[40] Samer Faraj,et al. The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements , 2006, J. Comput. Mediat. Commun..
[41] Lawrence A. Pervin,et al. Persons, Situations, Interactions: The History of a Controversy and a Discussion of Theoretical Models , 1989 .
[42] Sirkka L. Jarvenpaa,et al. Consumer trust in an Internet store , 2000, Inf. Technol. Manag..
[43] Athman Bouguettaya,et al. Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..
[44] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[45] Michael J. Zickar,et al. Linking the Big Five personality constructs to organizational commitment , 2006 .
[46] Dennis W. Organ,et al. Personality, satisfaction, and organizational citizenship behavior. , 1995 .
[47] Jaeki Song,et al. Trust in health infomediaries , 2007, Decis. Support Syst..
[48] Tao Zhou,et al. The Effects of Personality Traits on User Acceptance of Mobile Commerce , 2011, Int. J. Hum. Comput. Interact..
[49] Mitsutoshi Okazaki,et al. Revised NEO Personality Inventory(NEO-PI-R)を用いたてんかん患者におけるパーソナリティ傾向に関する検討 , 2018 .
[50] M. E. Gordon,et al. Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .
[51] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[52] Dale Goodhue,et al. Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers , 2012, Inf. Syst. Res..
[53] Magid Igbaria,et al. Work Experiences, Job Involvement, and Quality of Work Life Among Information Systems Personnel , 1994, MIS Q..
[54] F. Schoeman,et al. Philosophical Dimensions of Privacy , 1984 .
[55] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[56] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[57] D. Rousseau. Psychological and implied contracts in organizations , 1989 .
[58] Hsiang-Yi Wu,et al. Information Privacy Concerns, Government Involvement, and Corporate Policies in the Customer Relationship Management Context , 2008 .
[59] Paul Slovic,et al. Perceived risk, trust, and democracy , 1993 .
[60] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[61] W. Galston. Trust: The Social Virtues and the Creation of Prosperity , 1996 .
[62] J. Phelps,et al. Understanding privacy concerns , 1992 .
[63] D. M. Pedersen. Personality Correlates of Privacy , 1982 .
[64] Dan Jong Kim,et al. Revisiting the role of web assurance seals in business-to-consumer electronic commerce , 2008, Decis. Support Syst..
[65] Svenn Torgersen,et al. Who takes health risks? A probe into eight personality types , 2002 .
[66] David Gefen,et al. The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.
[67] Paul Wang,et al. Direct marketing activities and personal privacy , 1993 .
[68] Erving Goffman,et al. The Neglected Situation , 1964 .
[69] Shankar Ganesan. Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .
[70] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[71] David Gefen,et al. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern , 2015, Eur. J. Inf. Syst..
[72] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[73] Edoardo M. Airoldi,et al. An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..
[74] G. Johns. In praise of context , 2001 .
[75] Rathindra Sarathy,et al. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..
[76] Bernard L. Rosenbaum,et al. Attitude toward invasion of privacy in the personnel selection process and job applicant demographic and personality correlates. , 1973 .
[77] Lawrence A. Crosby,et al. Relationship Quality in Services Selling: An Interpersonal Influence Perspective: , 1990 .
[78] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[79] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[80] Dianna L. Stone,et al. Personnel Selection Procedures and Invasion of Privacy , 2003 .
[81] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[82] Bengt Muthén,et al. Mplus Short Courses Topic 1 Exploratory Factor Analysis, Confirmatory Factor Analysis, And Structural Equation Modeling For Continuous Outcomes , 2009 .
[83] Ryan T. Wright,et al. Understanding online customers’ ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty , 2014, Eur. J. Inf. Syst..
[84] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .
[85] Jaeki Song,et al. A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model , 2005, Manag. Sci..
[86] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[87] D. Whetten. What Constitutes a Theoretical Contribution , 1989 .
[88] J. M. Digman. PERSONALITY STRUCTURE: EMERGENCE OF THE FIVE-FACTOR MODEL , 1990 .
[89] Jeremy Rose,et al. Trust dynamics in a large system implementation: six theoretical propositions , 2013, Eur. J. Inf. Syst..
[90] Mark R. Brown,et al. Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..
[91] Radhika Santhanam,et al. Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees , 2008, Int. J. Inf. Secur. Priv..
[92] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[93] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[94] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[95] Ritu Agarwal,et al. Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective , 2012, Inf. Syst. Res..
[96] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[97] Daniel Heller,et al. Five-factor model of personality and job satisfaction: a meta-analysis. , 2002, The Journal of applied psychology.
[98] Etienne Mullet,et al. Risk Perception and Personality Facets , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[99] M. Ashton,et al. Big five factors and facets and the prediction of behavior. , 2001, Journal of personality and social psychology.
[100] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[101] Kristina Irion. Privacy and securityInternational communications surveillance , 2009, CACM.
[102] J. Phelps,et al. Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .
[103] Xueming Luo. Trust production and privacy concerns on the Internet , 2002 .
[104] D. Ellsberg. Decision, probability, and utility: Risk, ambiguity, and the Savage axioms , 1961 .
[105] Nirmalya Kumar,et al. The power of trust in manufacturer-retailer relationships , 1996 .
[106] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[107] Jens Grossklags,et al. What Can Behavioral Economics Teach Us about Privacy , 2008 .
[108] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[109] Detmar W. Straub,et al. Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..
[110] Jaeki Song,et al. Dynamics of Trust Revision: Using Health Infomediaries , 2008, J. Manag. Inf. Syst..
[111] H. Cooper,et al. The happy personality: a meta-analysis of 137 personality traits and subjective well-being. , 1998, Psychological bulletin.
[112] Ed Diener,et al. Choice of situations and congruence models of interactionism , 1985 .
[113] George R. Milne. Consumer Participation in Mailing Lists: A Field Experiment , 1997 .
[114] A. Tversky,et al. Context-dependent preferences , 1993 .
[115] David Gefen,et al. On the Need to Include National Culture as a Central Issue in E-Commerce Trust Beliefs , 2006, J. Glob. Inf. Manag..
[116] Murray R. Barrick,et al. THE BIG FIVE PERSONALITY DIMENSIONS AND JOB PERFORMANCE: A META-ANALYSIS , 1991 .
[117] Gurpreet Dhillon,et al. A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..
[118] Rathindra Sarathy,et al. Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..
[119] I. Ajzen. The theory of planned behavior , 1991 .
[120] C. A. Higgins,et al. THE BIG FIVE PERSONALITY TRAITS, GENERAL MENTAL ABILITY, AND CAREER SUCCESS ACROSS THE LIFE SPAN , 1999 .
[121] K. Gergen. Toward Transformation In Social Knowledge , 1982 .
[122] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .
[123] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[124] 杨文秀,et al. 此处“personality”译法探析 , 2000 .
[125] Angelika Dimoka,et al. The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums, and Seller Differentiation , 2006, Inf. Syst. Res..
[126] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[127] Jason Bennett Thatcher,et al. The Diffusion of Second-Generation Statistical Techniques in Information Systems Research from 1990-2008 , 2010 .
[128] A. Tversky,et al. Rational choice and the framing of decisions , 1990 .
[129] N. Luhmann. Trust and Power , 1979 .
[130] P. Costa,et al. NEO inventories for the NEO Personality Inventory-3 (NEO-PI-3), NEO Five-Factor Inventory-3 (NEO-FFI-3), NEO Personality Inventory-Revised (NEO PI-R) : professional manual , 2010 .
[131] G. Johnson. The essential impact of context on organizational behavior , 2006 .
[132] Sirkka L. Jarvenpaa,et al. Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..
[133] R. Rosenfeld. Belief , 2012, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[134] H. Eysenck. THINKING , 1958 .
[135] Joseph P. Cannon,et al. An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .
[136] B. Byrne,et al. Testing for the equivalence of factor covariance and mean structures: The issue of partial measurement invariance. , 1989 .
[137] P. Costa,et al. Adding Liebe und Arbeit: The Full Five-Factor Model and Well-Being , 1991 .
[138] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[139] Detmar W. Straub,et al. An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .
[140] Naresh K. Malhotra,et al. Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..
[141] Carl Zimmer,et al. Friends with benefits. , 2012, Time.
[142] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[143] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[144] A. Tversky,et al. A Belief-Based Account of Decision Under Uncertainty , 1998 .