How people protect their privacy on facebook: A cost‐benefit view
暂无分享,去创建一个
Arun Vishwanath | Weiai Xu | Zed Ngoh | A. Vishwanath | W. Xu | Zed Ngoh
[1] Andrew Howes,et al. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites , 2009, CHI.
[2] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[3] Michael A. Stefanone,et al. Strategic self-presentation online: A cross-cultural study , 2013, Comput. Hum. Behav..
[4] Robert P. Minch,et al. Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[5] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[6] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[7] Dahui Li,et al. Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..
[8] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[9] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[10] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[11] S. Wok,et al. Religious motives for using facebook among university muslim students , 2011 .
[12] Arun Vishwanath,et al. From Belief-Importance to Intention: The Impact of Framing on Technology Adoption , 2009 .
[13] Xiaoming Li,et al. Protection motivation theory and adolescent drug trafficking: relationship between health motivation and longitudinal risk involvement. , 2005, Journal of pediatric psychology.
[14] Shuting Xu,et al. Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .
[15] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[16] Adam N. Joinson,et al. Looking at, looking up or keeping up with people?: motives and use of facebook , 2008, CHI.
[17] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[18] Arun Vishwanath,et al. The 360° News Experience: Audience Connections with the Ubiquitous News Organization , 2008 .
[19] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[20] George Dvorak. Collective education , 2001, UBIQ.
[21] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[22] Monika Taddicken,et al. The Uses of Privacy Online: Trading a Loss of Privacy for Social Web Gratifications? , 2011, Privacy Online.
[23] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[24] Asimina Vasalou,et al. Digital Crowding: Privacy, Self-Disclosure, and Technology , 2011, Privacy Online.
[25] Yasmin Ibrahim,et al. The new risk communities: Social networking sites and risk , 2008 .
[26] John Raacke,et al. MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites , 2008, Cyberpsychology Behav. Soc. Netw..
[27] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[28] Stephanie Moser,et al. How People Perceive and Will Cope with Risks from the Diffusion of Ubiquitous Information and Communication Technologies , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[29] J. Doll,et al. Motives of Adolescents to Use the Internet as a Function of Personality Traits, Personal and Social Factors , 2001 .
[30] Lauren I. Labrecque,et al. Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices , 2009 .
[31] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[32] S. Upadhyaya,et al. Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens , 2009, IEEE Transactions on Professional Communication.
[33] David M'Raïhi,et al. Designing a Trade-Off Between Usability and Security: A Metrics Based-Model , 2007, INTERACT.
[34] Arun Vishwanath,et al. Diffusion of deception in social media: Social contagion effects and its antecedents , 2014, Information Systems Frontiers.
[35] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[36] Anthony M. Limperos,et al. Uses and Grats 2.0: New Gratifications for New Media , 2013 .
[37] I. Altman,et al. Social penetration: The development of interpersonal relationships , 1973 .
[38] Walter G. Stephan,et al. Protection Motivation Theory: Prediction of Intentions to Engage in Anti‐Nuclear War Behaviors1 , 1986 .
[39] Namkee Park,et al. Effects of self-disclosure on relational intimacy in Facebook , 2011, Comput. Hum. Behav..
[40] K. Witte. Putting the fear back into fear appeals: The extended parallel process model , 1992 .