Social network migration and anonymity expectations: What anonymous social network apps offer
暂无分享,去创建一个
[1] Ronald E. Rice,et al. Attribution accuracy when using anonymity in group support systems , 1997, Int. J. Hum. Comput. Stud..
[2] F. Mishna,et al. Ongoing and Online: Children and youth's perceptions of cyber bullying , 2009 .
[3] David Davenport,et al. Anonymity on the Internet: why the price may be too high , 2002, CACM.
[4] John Hulland,et al. Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .
[5] Ben Y. Zhao,et al. Whispers in the dark: analysis of an anonymous social network , 2014, Internet Measurement Conference.
[6] R. MacCallum,et al. THE APPLICATION OF EXPLORATORY FACTOR ANALYSIS IN APPLIED PSYCHOLOGY: A CRITICAL REVIEW AND ANALYSIS , 1986 .
[7] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[8] Sarah Flicker,et al. Ethical Dilemmas in Research on Internet Communities , 2004, Qualitative health research.
[9] Pamela J. Wisniewski,et al. Making privacy personal: Profiling social network users to inform privacy education and nudging , 2017, Int. J. Hum. Comput. Stud..
[10] Azy Barak,et al. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition , 2012, Comput. Hum. Behav..
[11] R. Rosenthal. The file drawer problem and tolerance for null results , 1979 .
[12] Jung-Kuei Hsieh,et al. Post-adoption switching behavior for online service substitutes: A perspective of the push-pull-mooring framework , 2012, Comput. Hum. Behav..
[13] Matthew K. O. Lee,et al. Online social networks: Why do students use facebook? , 2011, Comput. Hum. Behav..
[14] Alain Pinsonneault,et al. Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework , 1997, J. Manag. Inf. Syst..
[15] D G Altman,et al. Statistics notes: Absence of evidence is not evidence of absence , 1995 .
[16] Rui Chen,et al. Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan , 2013, Inf. Manag..
[17] Sabina Misoch,et al. Stranger on the internet: Online self-disclosure and the role of visual anonymity , 2015, Comput. Hum. Behav..
[18] Mehrdad Koohikamali,et al. Location disclosure on LB-SNAs: The role of incentives on sharing behavior , 2015, Decis. Support Syst..
[19] Rui Chen,et al. An investigation of email processing from a risky decision making perspective , 2011, Decis. Support Syst..
[20] Leonard M. Jessup,et al. The Effects of Anonymity on GDSS Group Process with an Idea-Generating Task , 1990, MIS Q..
[21] John Lim,et al. Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites , 2009 .
[22] Anol Bhattacherjee,et al. Why end-users move to the cloud: a migration-theoretic analysis , 2014, Eur. J. Inf. Syst..
[23] Gayle Brewer,et al. Cyberbullying, self-esteem, empathy and loneliness , 2015, Comput. Hum. Behav..
[24] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[25] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[26] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[27] Paulo B. Góes,et al. Editor's comments: information systems research and behavioral economics , 2013 .
[28] Vitaly Shmatikov,et al. Information Hiding, Anonymity and Privacy: a Modular Approach , 2004, J. Comput. Secur..
[29] Alessandro Acquisti,et al. Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.
[30] Tatsuya Suda,et al. Anonymity and roles associated with aggressive posts in an online forum , 2012, Comput. Hum. Behav..
[31] Zhangxi Lin,et al. An empirical analysis of users' privacy disclosure behaviors on social network sites , 2015, Inf. Manag..
[32] Cynthia K. Riemenschneider,et al. An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site , 2010, AMCIS.
[33] E. Lee. A theory of migration , 1966, Demography.
[34] Nicola Petrocchi,et al. Differences Between People Who Use Only Facebook and Those Who Use Facebook Plus Twitter , 2015, Int. J. Hum. Comput. Interact..
[35] Kerk F. Kee,et al. Is There Social Capital in a Social Network Site?: Facebook Use and College Students’ Life Satisfaction, Trust, and Participation 1 , 2009 .
[36] D. Campbell,et al. Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.
[37] Matthew K. O. Lee,et al. How to keep members using the information in a computer-supported social network , 2009, Comput. Hum. Behav..
[38] Rui Chen,et al. Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..
[39] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[40] Caitlin Byrne. Anonymous Social Media and Qualitative Inquiry: Methodological Considerations and Implications for Using Yik Yak as a Qualitative Data Source , 2017 .
[41] Azy Barak,et al. Degree and Reciprocity of Self-Disclosure in Online Forums , 2007, Cyberpsychology Behav. Soc. Netw..
[42] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[43] Hassan A. Karimi,et al. SoNavNet: a framework for social navigation networks , 2009, LBSN '09.
[44] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[45] Chen-Nee Chuah,et al. Unveiling facebook: a measurement study of social network based applications , 2008, IMC '08.
[46] John Lim,et al. Retaining and attracting users in social networking services: An empirical investigation of cyber migration , 2014, J. Strateg. Inf. Syst..
[47] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[48] Zhenhui Jiang,et al. Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..
[49] Judy K. Frels,et al. Consumer switching costs: A typology, antecedents, and consequences , 2003 .
[50] Yaman Akdeniz. Anonymity, Democracy, and Cyberspace , 2015 .
[51] E. Ravenstein. The Laws of Migration , 1885, Encyclopedia of Gerontology and Population Aging.
[52] Mehrdad Koohikamali,et al. Yaks versus Tweets: Sentiment Discrepancy During a Social Crisis , 2018, HICSS.
[53] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[54] J. Mirsky,et al. Return migration of Americans: Personal narratives and psychological perspectives , 2014 .
[55] Rudolf R. Sinkovics,et al. The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .
[56] Viswanath Venkatesh,et al. Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead , 2016, J. Assoc. Inf. Syst..
[57] Weiguo Fan,et al. Determinants of users' continuance of social networking sites: A self-regulation perspective , 2014, Inf. Manag..
[58] Fred D. Davis,et al. Dead Or Alive? The Development, Trajectory And Future Of Technology Adoption Research , 2007, J. Assoc. Inf. Syst..
[59] Varun Grover,et al. Technostress: Technological Antecedents and Implications , 2011, MIS Q..
[60] Tao Hu,et al. Nonadopters of Online Social Network Services: Is It Easy to Have Fun Yet? , 2011, Commun. Assoc. Inf. Syst..
[61] John R. Venable,et al. Understanding information disclosure behaviour in Australian Facebook users , 2010, J. Inf. Technol..
[62] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[63] H. Bansal,et al. “Migrating” to new service providers: Toward a unifying framework of consumers’ switching behaviors , 2005 .
[64] Erik W. Black,et al. Anonymous social media - Understanding the content and context of Yik Yak , 2016, Comput. Hum. Behav..
[65] Roger Dingledine,et al. On the Economics of Anonymity , 2003, Financial Cryptography.
[66] Corien Prins,et al. New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity , 2001, Journal of Information, Law and Technology.
[67] Carmela Troncoso,et al. On the Impact of Social Network Profiling on Anonymity , 2008, Privacy Enhancing Technologies.
[68] Kimberly M. Christopherson. The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..
[69] Elena Karahanna,et al. Shackled to the Status Quo: The Inhibiting Effects of Incumbent System Habit, Switching Costs, and Inertia on New System Acceptance , 2012, MIS Q..
[70] Anna Sidorova,et al. The Effect of Network Characteristics on Online Identity Management Practices , 2017, J. Comput. Inf. Syst..
[71] Sara B. Kiesler,et al. Why do people seek anonymity on the internet?: informing policy and design , 2013, CHI.
[72] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[73] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[74] Axel Küpper,et al. Anonymous User Tracking for Location-Based Community Services , 2006, LoCA.
[75] C. Scott. Benefits and Drawbacks of Anonymous Online Communication: Legal Challenges and Communicative Recommendations , 2004 .
[76] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[77] Chiao-Chen Chang,et al. Examining users′ intention to continue using social network games: A flow experience perspective , 2013, Telematics Informatics.
[78] Nathan W. Twyman,et al. Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM) , 2012, J. Assoc. Inf. Syst..
[79] John Dimmick,et al. The Theory of the Niche: Quantifying Competition Among Media Industries , 1984 .
[80] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..