Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences
暂无分享,去创建一个
Yongqiang Sun | Nan Wang | Xiao-Liang Shen | Jacky Xi Zhang | Yongqiang Sun | Xiao-Liang Shen | J. Zhang | Nan Wang
[1] Varun Grover,et al. Investigating online information disclosure: Effects of information relevance, trust and risk , 2010, Inf. Manag..
[2] Varun Grover,et al. Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure , 2010, Decis. Support Syst..
[3] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[4] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[5] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[6] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[7] Robin L. Wakefield. The influence of user affect in online information disclosure , 2013, J. Strateg. Inf. Syst..
[8] Yulin Fang,et al. Understanding Sustained Participation in Open Source Software Projects , 2009, J. Manag. Inf. Syst..
[9] Edward L. Deci,et al. Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.
[10] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[11] R. Helmreich,et al. Masculinity & femininity: Their psychological dimensions, correlates, and antecedents , 1978 .
[12] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[13] William D. Schafer,et al. Gender differences in risk taking: A meta-analysis. , 1999 .
[14] Sumeet Gupta,et al. Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..
[15] Thompson S. H. Teo,et al. Intrinsic and extrinsic motivation in Internet usage , 1999 .
[16] Rathindra Sarathy,et al. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..
[17] Matthew K. O. Lee,et al. Examining the moderating effect of inconsistent reviews and its gender differences on consumers' online shopping decision , 2014, Int. J. Inf. Manag..
[18] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[19] Ritu Agarwal,et al. The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information , 2011, Inf. Syst. Res..
[20] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[21] Rui Chen,et al. Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan , 2013, Inf. Manag..
[22] Chang Liu,et al. Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..
[23] Dan J. Kim,et al. Self-Perception-Based Versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study , 2008, J. Manag. Inf. Syst..
[24] Hamid Reza Peikari,et al. The determinants of individuals' perceived e-security: Evidence from Malaysia , 2014, Int. J. Inf. Manag..
[25] Chao-Min Chiu,et al. Exploring individuals' subjective well-being and loyalty towards social network sites from the perspective of network externalities: The Facebook case , 2013, Int. J. Inf. Manag..
[26] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[27] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[28] Jing Ma,et al. Information privacy, gender differences, and intrinsic motivation in the workplace , 2013, Int. J. Inf. Manag..
[29] Xueming Luo,et al. Contextual Marketing and Customer-Orientation Strategy for E-Commerce: An Empirical Analysis , 2003, Int. J. Electron. Commer..
[30] Per E. Pedersen,et al. Explaining intention to use mobile chat services: moderating effects of gender , 2005 .
[31] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[32] Y. Aharoni. Cultures and Organizations: Software of the Mind , 1992 .
[33] Christy M. K. Cheung,et al. Understanding consumer trust in Internet shopping: A multidisciplinary approach , 2006 .
[34] A. Eagly. Sex differences in social behavior : a social-role interpretation , 1987 .
[35] Rui Chen,et al. Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..
[36] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[37] Adams Js. Towards an understanding of inequity , 1963 .
[38] Shuk Ying Ho,et al. The Effects of Location Personalization on Integrity Trust and Integrity Distrust in Mobile Merchants , 2013, Int. J. Electron. Commer..
[39] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[40] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[41] Rui Chen,et al. Member use of social networking sites - an empirical examination , 2013, Decis. Support Syst..
[42] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[43] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[44] Heng Xu,et al. CoPE: Enabling collaborative privacy management in online social networks , 2011, J. Assoc. Inf. Sci. Technol..
[45] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[46] H. Raghav Rao,et al. Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender , 2011, J. Manag. Inf. Syst..
[47] Rathindra Sarathy,et al. Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract , 2014, Decis. Support Syst..
[48] Daniel D. Mittleman,et al. Twitter, Google, iPhone/iPad, and Facebook (TGIF) and Smart Technology Environments: How Well Do Educators Communicate with Students via TGIF? , 2011, Commun. Assoc. Inf. Syst..
[49] Hans van der Heijden,et al. User Acceptance of Hedonic Information Systems , 2004, MIS Q..
[50] Ingoo Han,et al. The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..
[51] Mary Beth Rosson,et al. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..
[52] Katina Michael,et al. Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature , 2010, 2010 IEEE International Symposium on Technology and Society.
[53] Matthew L. Jensen,et al. Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers , 2012, J. Assoc. Inf. Sci. Technol..
[54] E. Deci,et al. Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. , 2000, The American psychologist.
[55] Chin-Lung Hsu,et al. Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation , 2008, Inf. Manag..
[56] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[57] Hsiu-Fen Lin,et al. Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions , 2007, J. Inf. Sci..
[58] Zhenhui Jiang,et al. Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..
[59] Tao Zhou,et al. Examining continuous usage of location-based services from the perspective of perceived justice , 2013, Inf. Syst. Frontiers.
[60] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[61] Qian Huang,et al. The impact of trust, guanxi orientation and face on the intention of Chinese employees and managers to engage in peer‐to‐peer tacit and explicit knowledge sharing , 2011, Inf. Syst. J..
[62] S. Bem. The BSRI and gender schema theory: A reply to Spence and Helmreich. , 1981 .
[63] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[64] Margo Wilson,et al. Sex differences in valuations of the environment? , 1996 .
[65] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[66] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[67] Detmar W. Straub,et al. Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..
[68] T. C. Edwin Cheng,et al. Extending the Understanding of End User Information Systems Satisfaction Formation: An Equitable Needs Fulfillment Model Approach , 2008, MIS Q..
[69] Charles F. Hofacker,et al. Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust , 2010, Int. J. Electron. Commer..
[70] Donald E. Conlon,et al. Justice at the millennium: a meta-analytic review of 25 years of organizational justice research. , 2001, The Journal of applied psychology.
[71] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[72] B. Thurston,et al. The duality of human existence , 1966 .
[73] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[74] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[75] Tamara Dinev,et al. Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..
[76] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[77] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[78] Yu-Chen Chen,et al. Extrinsic versus intrinsic motivations for consumers to shop on-line , 2005, Inf. Manag..
[79] Terry L. Childers,et al. HEDONIC AND UTILITARIAN MOTIVATIONS FOR ONLINE RETAIL SHOPPING BEHAVIOR , 2001 .
[80] R. Carlson,et al. Sex differences in ego functioning: exploratory studies of agency and communion. , 1970, Journal of consulting and clinical psychology.
[81] Hock-Hai Teo,et al. Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..
[82] Heng Xu,et al. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..
[83] Vishal Midha,et al. Impact of consumer empowerment on online trust: An examination across genders , 2012, Decis. Support Syst..
[84] Jiming Wu,et al. Effects of Extrinsic and Intrinsic Motivators on Using Utilitarian, Hedonic, and Dual-Purposed Information Systems: A Meta-Analysis , 2013, J. Assoc. Inf. Syst..
[85] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .
[86] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[87] Judith A. Hall,et al. Psychological androgyny: Theories, methods, and conclusions. , 1982 .
[88] K. Deaux. From individual differences to social categories: analysis of a decade's research on gender , 1984 .
[89] Sarah Spiekermann,et al. Online social networks: why we disclose , 2010, J. Inf. Technol..
[90] Tamara Dinev,et al. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..
[91] Kaan Varnali,et al. obile marketing research : The-state-ofthe-art , 2009 .
[92] Fred D. Davis,et al. Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .
[93] Hsi-Peng Lu,et al. Why people use social networking sites: An empirical study integrating network externalities and motivation theory , 2011, Comput. Hum. Behav..
[94] Mike Z. Yao,et al. Predicting user concerns about online privacy , 2007 .
[95] Sumeet Gupta,et al. The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..
[96] Robert W. Zmud,et al. Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Factors, and Organizational Climate , 2005, MIS Q..
[97] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[98] Keng Siau,et al. An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns , 2008, J. Assoc. Inf. Syst..
[99] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[100] H. Raghav Rao,et al. Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..
[101] Eric W. T. Ngai,et al. Social media research: Theories, constructs, and conceptual frameworks , 2015, Int. J. Inf. Manag..
[102] Bernard C. Y. Tan,et al. A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..