The interpersonal privacy identity (IPI): development of a privacy as control model
暂无分享,去创建一个
Merrill Warkentin | Tabitha L. James | Stéphane E. Collignon | Jennifer L. Ziegelmayer | Quinton Nottingham | T. James | Q. Nottingham | S. Collignon | Merrill Warkentin
[1] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[2] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[3] Darhl M. Pedersen,et al. A factorial comparison of privacy questionnaires , 1996 .
[4] Robert Boguslaw,et al. Privacy and Freedom , 1968 .
[5] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[6] M. Lwin,et al. A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online , 2003 .
[7] Reza Barkhi,et al. An Empirical Investigation of an Individual's Perceived Need for Privacy and Security , 2008, Int. J. Inf. Secur. Priv..
[8] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[9] Alan R. Dennis,et al. Media, Tasks, and Communication Processes: A Theory of Media Synchronicity , 2008, MIS Q..
[10] G. Simmel. The sociology of Georg Simmel , 1950 .
[11] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[12] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[13] I. Altman,et al. Social penetration: The development of interpersonal relationships , 1973 .
[14] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[15] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[16] W. Pearce,et al. Self-disclosing communication. , 1973, The Journal of communication.
[17] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[18] Annie I. Antón,et al. How internet users' privacy concerns have evolved since 2002 , 2010, IEEE Security & Privacy.
[19] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[20] V. Derlega,et al. Privacy and self-disclosure in social relationships. , 1977 .
[21] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[22] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[23] R. F. Murphy,et al. Social Distance and the Veil1 , 1964 .
[24] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[25] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[26] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[27] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[28] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[29] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[30] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[31] Herman T. Tavani,et al. PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .
[32] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[33] Rolph E. Anderson,et al. Multivariate Data Analysis (7th ed. , 2009 .
[34] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[35] Daniel M. Oppenheimer,et al. Instructional Manipulation Checks: Detecting Satisficing to Increase Statistical Power , 2009 .
[36] A. Nosko. To Tell or Not to Tell: Predictors of Disclosure and Privacy Settings Usage in an Online Social Networking Site (Facebook) , 2011 .
[37] P Suedfeld,et al. The Ascription of Responsibility Questionnaire: development and empirical extensions. , 1986, Journal of personality assessment.
[38] Jordan Shropshire,et al. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention , 2011, Eur. J. Inf. Syst..
[39] Andrew J. Rohm,et al. Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .
[40] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[41] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[42] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[43] H. Raghav Rao,et al. Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use , 2006, J. Assoc. Inf. Syst..
[44] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[45] Kelly G. Shaver,et al. THE ENVIRONMENT AND SOCIAL BEHAVIOR , 2015 .
[46] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[47] 詹志禹. Response order effects in Likert-type scales , 1991 .
[48] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[49] G. Bierbrauer,et al. Measurement of normative and evaluative aspects in individualistic and collectivistic orientations: The Cultural Orientation Scale (COS). , 1994 .
[50] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[51] Robert E. Kraut,et al. Internet paradox. A social technology that reduces social involvement and psychological well-being? , 1998, The American psychologist.
[52] Richard L. Daft,et al. Message Equivocality, Media Selection, and Manager Performance: Implications for Information Systems , 1987, MIS Q..
[53] Jeffrey T. Child,et al. Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure , 2009, J. Assoc. Inf. Sci. Technol..
[54] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[55] J. Rule. Private Lives and Public Surveillance; Social Control in the Computer Age , 1974 .
[56] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[57] Joan Welkowitz,et al. The personal style inventory: Preliminary validation studies of new measures of sociotropy and autonomy , 1994 .
[58] Xin Luo,et al. The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance , 2009, AMCIS.
[59] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[60] S. Margulis. Conceptions of Privacy: Current Status and Next Steps , 1977 .
[61] John B. Lansing,et al. FAMILY LIFE CYCLE AS AN INDEPENDENT VARIABLE , 1957 .
[62] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[63] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[64] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[65] H. Leino‐Kilpi,et al. Privacy: a review of the literature. , 2001, International journal of nursing studies.
[66] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..