Overcoming Personal Barriers to Adoption When Technology Enables Information to Be Available to Others
暂无分享,去创建一个
[1] H. Simon,et al. Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .
[2] J. Cacioppo,et al. Personal involvement as a determinant of argument based persuasion , 1981 .
[3] Izak Benbasat,et al. Trust-Related Arguments in Internet Stores: A Framework for Evaluation , 2003, J. Electron. Commer. Res..
[4] J. Cacioppo,et al. Issue involvement can increase or decrease persuasion by enhancing message-relevant cognitive responses. , 1979 .
[5] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[6] S. Chaiken,et al. Audience response as a heuristic cue in persuasion. , 1987, Journal of personality and social psychology.
[7] Blair T. Johnson,et al. Effects of involvement on persuasion: a meta-analysis , 1989 .
[8] Francis J. Di Vesta,et al. A developmental study of the semantic structures of children , 1966 .
[9] Leandre R. Fabrigar,et al. Conceptual and Methodological Issues in the Elaboration Likelihood Model of Persuasion: A Reply to the Michigan State Critics , 1993 .
[10] K. Stamm,et al. The Relationship of Attitudinal Components to Trust in Media , 1994 .
[11] S. Chaiken,et al. Communication modality as a determinant of message persuasiveness and message comprehensibility. , 1976 .
[12] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[13] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[14] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[15] John T. Cacioppo,et al. Involvement and Persuasion: Tradition Versus Integration , 1990 .
[16] Laura J Gurak,et al. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace and the Clipper Chip , 1997 .
[17] J. Cacioppo,et al. Attitudes and Persuasion: Classic and Contemporary Approaches , 1981 .
[18] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[19] W. No,et al. Internet Privacy Research: Framework, Review and Opportunities , 2006 .
[20] Barbara Laslett,et al. Privacy and Secrecy: A Conceptual Comparison , 1977 .
[21] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[22] Amy Butros,et al. Research Paper: Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience , 2002, J. Am. Medical Informatics Assoc..
[23] H. Triandis. Attitude and attitude change , 1971 .
[24] George R. Milne,et al. Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .
[25] C. Jack Friedman,et al. Objective Measurement of Social Role Concepts via the Semantic Differential , 1964 .
[26] T. Bodenheimer,et al. Electronic technology: a spark to revitalize primary care? , 2003, JAMA.
[27] E. Berscheid,et al. Privacy: A hidden variable in experimental social psychology. , 1977 .
[28] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[29] Andrzej Zybertowicz,et al. Conceptual and Methodological Issues , 2000 .
[30] J D Cantor,et al. msJAMA. Privacy protections for cybercharts: an update on the law. , 2001, JAMA.
[31] T. Graeff,et al. Collecting and using personal data: consumers’ awareness and concerns , 2002 .
[32] John T. Cacioppo,et al. The Elaboration Likelihood Model of Persuasion , 1986, Advances in Experimental Social Psychology.
[33] T. Millon,et al. Personality and social psychology , 2003 .
[34] Stephanie Watts,et al. Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption , 2003, Inf. Syst. Res..
[35] W. Crano,et al. Attitudes and persuasion. , 2006, Annual review of psychology.
[36] J. N. Bassili. Meta-judgmental versus operative indexes of psychological attributes: The case of measures of attitude strength. , 1996 .
[37] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[38] J. Cacioppo,et al. Source factors and the elaboration likelihood model of persuasion , 1984 .
[39] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[40] Duane T. Wegener,et al. The elaboration likelihood model: Current status and controversies. , 1999 .
[41] K. Sheehan,et al. Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns , 1999 .
[42] R. Petty. Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .
[43] P. Corey,et al. Incidence of Adverse Drug Reactions in Hospitalized Patients , 2012 .
[44] J. W. DeCew,et al. Uneasy Access: Privacy for Women in a Free Society , 1988 .
[45] E. Rogers. Diffusion of Innovations , 1962 .
[46] Ronald M. Lee,et al. A logic programming framework for planning and simulation , 1986 .
[47] R. Apsler,et al. Warning, personal involvement, and attitude change. , 1968, Journal of personality and social psychology.
[48] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[49] S. Alpert,et al. Protecting Medical Privacy: Challenges in the Age of Genetic Information , 2003 .
[50] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[51] Anol Bhattacherjee,et al. Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..
[52] E H Shortliffe,et al. The evolution of electronic medical records. , 1999, Academic medicine : journal of the Association of American Medical Colleges.
[53] J. Krosnick,et al. The causes and consequences of attitude importance. , 1995 .
[54] John T. Cacioppo,et al. The effects of a salient self-schema on the evaluation of proattitudinal editorials: Top-down versus bottom-up message processing , 1982 .
[55] P. K. Kannan,et al. The customer economics of internet privacy , 2002 .
[56] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[57] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[58] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[59] J. Cacioppo,et al. Central and Peripheral Routes to Advertising Effectiveness: The Moderating Role of Involvement , 1983 .
[60] Franziska Marquart,et al. Communication and persuasion : central and peripheral routes to attitude change , 1988 .
[61] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[62] Martin Fishbein,et al. Acceptance yielding and impact: cognitive processes in persuasion. , 1981 .
[63] R. E. Burnkrant,et al. Effects of the use of introductory rhetorical questions versus statements on information processing. , 1984 .
[64] J. Cacioppo,et al. The Effects of Involvement on Responses to Argument Quantity and Quality: Central and Peripheral Routes to Persuasion , 1984 .
[65] Shuk Ying Ho,et al. Web Personalization as a Persuasion Strategy: An Elaboration Likelihood Model Perspective , 2005, Inf. Syst. Res..
[66] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[67] Barbara L. Gross,et al. What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies , 2003 .
[68] Paul L. Sauer,et al. The combined influence hypothesis: Central and peripheral antecedents of attitude toward the ad , 1995 .