Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory
暂无分享,去创建一个
[1] 김병수,et al. 프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로 , 2013 .
[2] K. N. Kline. Cultural Sensitivity and Health Promotion: Assessing Breast Cancer Education Pamphlets Designed for African American Women , 2007, Health communication.
[3] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[4] Neil D. Weinstein,et al. Unrealistic optimism about susceptibility to health problems , 1982, Journal of Behavioral Medicine.
[5] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[6] Younghwa Lee,et al. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..
[7] Barbara Wixom,et al. An Empirical Investigation of the Factors Affecting Data Warehousing Success , 2001, MIS Q..
[8] Lauren I. Labrecque,et al. Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices , 2009 .
[9] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.
[10] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[11] Detmar W. Straub,et al. The amplification effects of procedural justice on a threat control model of information systems security behaviours , 2009, Behav. Inf. Technol..
[12] Norshidah Mohamed,et al. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia , 2012, Comput. Hum. Behav..
[13] K. Witte. Fear control and danger control: A test of the extended parallel process model (EPPM) , 1994 .
[14] Seounmi Youn. Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk–Benefit Appraisal Approach , 2005 .
[15] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[16] Robert LaRose,et al. Keeping our network safe: a model of online protection behaviour , 2008, Behav. Inf. Technol..
[17] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[18] I. Rosenstock. The Health Belief Model and Preventive Health Behavior , 1974 .
[19] Xin Luo,et al. Consumer motivations in taking action against spyware: an empirical investigation , 2009, Inf. Manag. Comput. Secur..