Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach
暂无分享,去创建一个
Kai Lung Hui | Ivan P. L. Png | Il-Horn Hann | Sang-Yong Tom Lee | K. Hui | I. Png | S. Lee | I. Hann
[1] Uriel G. Foa,et al. Interpersonal and Economic Resources , 1971, Science.
[2] A. Tversky,et al. Conjoint-measurement analysis of composition rules in psychology. , 1971 .
[3] D. D. Simmons,et al. Invasion of privacy and judged benefit of personality-test inquiry. , 1968, The Journal of general psychology.
[4] Stuart L. Esrock,et al. A Dichotomy of Privacy: Personal and Professional Attitudes of Marketers , 1999 .
[5] M. Wedel,et al. Metric Conjoint Segmentation Methods: A Monte Carlo Comparison , 1996 .
[6] P E Green,et al. NEW WAYS TO MEASURE CONSUMER JUDGMENTS , 1975 .
[7] Lisa Farrell,et al. Can Expected Utility Theory Explain Gambling , 2002 .
[8] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[9] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[10] Amos Tversky,et al. A general theory of polynomial conjoint measurement , 1967 .
[11] G. C. Homans,et al. Social Behavior: Its Elementary Forms. , 1975 .
[12] Uriel G. Foa,et al. Effect of resource class on retaliation to injustice in interpersonal exchange. , 1974 .
[13] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[14] Donald F. Cox,et al. Perceived Risk and Consumer Decision-Making—The Case of Telephone Shopping , 1964 .
[15] Jasmine Schwartz. Giving the Web a Memory Cost Its Users Privacy , 2001 .
[16] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[17] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[18] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[19] Ramnath K. Chellappa,et al. Personalization versus Privacy: New Exchange Relationships on the Web , 2006 .
[20] R. Staelin,et al. A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .
[21] K. Moorthy. Market Segmentation, Self-Selection, and Product Line Design , 1984 .
[22] A. M. Harrell,et al. An Application of Expectancy Theory to Explain a Manager's Intention to Use a Decision Support System , 1994 .
[23] M. E. Gordon,et al. Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .
[24] Geoffry S. Howard,et al. Discretionary Use of Computers: An Empirically Derived Explanatory Model* , 1991 .
[25] G. Debreu. Topological Methods in Cardinal Utility Theory , 1959 .
[26] Jordan J. Louviere,et al. Analyzing Decision Making , 1988 .
[27] V. Vroom. Work and motivation , 1964 .
[28] C. Goodwin. Privacy: Recognition of a Consumer Right , 1991 .
[29] P. Green,et al. Conjoint Analysis in Consumer Research: Issues and Outlook , 1978 .
[30] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[31] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[32] Thomas Hill,et al. Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers. , 1987 .
[33] Christian Terwiesch,et al. Measuring the Frictional Costs of Online Transactions: The Case of a Name-Your-Own-Price Channel , 2003, Manag. Sci..
[34] S. Jourard. Some Psychological Aspects of Privacy , 1966 .
[35] Daniel Robey,et al. User Attitudes and Management Information System Use , 1979 .
[36] L. Beach,et al. Expectancy Theory, Decision Theory and Occupational Preference and Choice. Organizational Research. Technical Report 75-75. , 1975 .
[37] Paul D. Tolchinsky,et al. A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .
[38] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[39] R. Luce,et al. Simultaneous conjoint measurement: A new type of fundamental measurement , 1964 .
[40] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[41] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[42] Dale Goodhue,et al. Supporting users of corporate data : the effect of I/S policy choices , 1988 .
[43] Gerardine De Sanctis,et al. Expectancy Theory as an Explanation of Voluntary Use of a Decision-Support System: , 1983 .
[44] Jordan J. Louviere,et al. Analyzing Decision Making: Metric Conjoint Analysis , 1988 .
[45] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[46] L. J. Savage,et al. The Utility Analysis of Choices Involving Risk , 1948, Journal of Political Economy.
[47] Paul E. Green,et al. Conjoint Analysis in Marketing: New Developments with Implications for Research and Practice , 1990 .
[48] Eric K. Clemons,et al. Poaching and the misappropriation of information: transaction risks of information exchange , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[49] N. Melone. A theoretical assessment of the user-satisfaction construct in information systems research , 1990 .
[50] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[51] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[52] Paul E. Green,et al. Segmenting Markets with Conjoint Analysis , 1991 .
[53] Organisation for Economic Cooperation and Development,et al. Organisation for economic cooperation and development , 1998 .
[54] Michael J. Stahl,et al. Modeling effort decisions with behavioral decision theory: Toward an individual differences model of expectancy theory , 1981 .
[55] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[56] Elizabeth C. Hirschman,et al. People as Products: Analysis of a Complex Marketing Exchange , 1987 .
[57] S. Addelman. Orthogonal Main-Effect Plans for Asymmetrical Factorial Experiments , 1962 .
[58] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .