Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory

[1]  김병수,et al.  프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로 , 2013 .

[2]  K. N. Kline Cultural Sensitivity and Health Promotion: Assessing Breast Cancer Education Pamphlets Designed for African American Women , 2007, Health communication.

[3]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[4]  Neil D. Weinstein,et al.  Unrealistic optimism about susceptibility to health problems , 1982, Journal of Behavioral Medicine.

[5]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[6]  Younghwa Lee,et al.  Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..

[7]  Barbara Wixom,et al.  An Empirical Investigation of the Factors Affecting Data Warehousing Success , 2001, MIS Q..

[8]  Lauren I. Labrecque,et al.  Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices , 2009 .

[9]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[10]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[11]  Detmar W. Straub,et al.  The amplification effects of procedural justice on a threat control model of information systems security behaviours , 2009, Behav. Inf. Technol..

[12]  Norshidah Mohamed,et al.  Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia , 2012, Comput. Hum. Behav..

[13]  K. Witte Fear control and danger control: A test of the extended parallel process model (EPPM) , 1994 .

[14]  Seounmi Youn Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk–Benefit Appraisal Approach , 2005 .

[15]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[16]  Robert LaRose,et al.  Keeping our network safe: a model of online protection behaviour , 2008, Behav. Inf. Technol..

[17]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[18]  I. Rosenstock The Health Belief Model and Preventive Health Behavior , 1974 .

[19]  Xin Luo,et al.  Consumer motivations in taking action against spyware: an empirical investigation , 2009, Inf. Manag. Comput. Secur..