Note — Effects of Individual Self-Protection , Industry Self-Regulation , and Government Regulation on Privacy Concerns : A Study of Location-Based Services
暂无分享,去创建一个
H. Teo | Ritu Agarwal | B. Tan | Heng Xu
[1] Simone Wannemaker. Security And Usability Designing Secure Systems That People Can Use , 2016 .
[2] Miguel A. Vadillo,et al. Illusion of Control , 2013, Experimental psychology.
[3] Jens Grossklags,et al. Third-party apps on Facebook: privacy and the illusion of control , 2011, CHIMIT '11.
[4] Heng Xu,et al. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..
[5] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[6] Heng Xu,et al. CoPE: Enabling collaborative privacy management in online social networks , 2011, J. Assoc. Inf. Sci. Technol..
[7] Benjamin Edelman,et al. Adverse selection in online "trust" certifications and search results , 2011, Electron. Commer. Res. Appl..
[8] Benjamin Gerber,et al. Conceptualizing privacy , 2010, CSOC.
[9] S. Sundar,et al. Personalization versus Customization: The Importance of Agency, Privacy, and Power Usage , 2010 .
[10] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[11] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[12] Mary Beth Rosson,et al. journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .
[13] G. Loewenstein,et al. Misplaced Confidences: Privacy and the Control Paradox. , 2010 .
[14] Mary J. Culnan,et al. How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..
[15] Lorrie Faith Cranor,et al. Location-Sharing Technologies: Privacy Risks and Controls , 2009 .
[16] Izak Benbasat,et al. Interactive Decision Aids for Consumer Decision Making in E-Commerce: The Influence of Perceived Strategy Restrictiveness , 2009, MIS Q..
[17] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[18] Oded Nov,et al. Social computing privacy concerns: antecedents and effects , 2009, CHI.
[19] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[20] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[21] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[22] Jenny Fry,et al. Engaging Privacy and Information Technology in a Digital Age , 2008 .
[23] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[24] Arun Rai,et al. Knowledge Sharing Ambidexterity in Long-Term Interorganizational Relationships , 2008, Manag. Sci..
[25] Matthew Chalmers,et al. From awareness to repartee: sharing location within social groups , 2008, CHI.
[26] Michael D. Smith,et al. Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2007, J. Manag. Inf. Syst..
[27] David Gefen,et al. The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.
[28] Scott D. Mainwaring,et al. 1 Privacy Issues and Human-Computer Interaction , 2008 .
[29] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[30] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[31] Adam N. Joinson,et al. Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..
[32] A.. Conceptualization and Operationalization o f Perceive d Control , 2007 .
[33] Daniel J. Solove,et al. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .
[34] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[35] Naresh K. Malhotra,et al. Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..
[36] D. Harrison McKnight,et al. Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use , 2006, Inf. Syst. Res..
[37] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[38] Miriam J. Metzger. Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure , 2006, Commun. Res..
[39] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[40] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[41] Richard T. Watson,et al. The U-Constructs: Four Information Drives , 2006, Commun. Assoc. Inf. Syst..
[42] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[43] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[44] Trevor T. Moores,et al. Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.
[45] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[46] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[47] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[48] Gerald L. Lohse,et al. International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..
[49] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[50] H. Jeff Smith. Information Privacy and its Management , 2004, MIS Q. Executive.
[51] Gurpreet Dhillon,et al. Do privacy seals in e-commerce really work? , 2003, CACM.
[52] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[53] Traci Carte,et al. In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..
[54] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[55] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[56] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[57] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[58] H. Uslucan,et al. The Handbook of Culture and Psychology. , 2003 .
[59] Subhasish Dasgupta,et al. Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals , 2003, Inf. Syst. Manag..
[60] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[61] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[62] J. Webster,et al. Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .
[63] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[64] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[65] A. Bandura. Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.
[66] Gurpreet Dhillon,et al. Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..
[67] M. Lindell,et al. Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.
[68] S. Yamaguchi,et al. Culture and Control Orientations. , 2001 .
[69] I. Ajzen. Nature and operation of attitudes. , 2001, Annual review of psychology.
[70] Elena Karahanna,et al. Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..
[71] Andrew J. Rohm,et al. Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .
[72] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[73] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[74] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[75] P. Schwartz. Privacy and Democracy in Cyberspace , 2000 .
[76] Donna L. Hoffman,et al. Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web , 1999, Inf. Soc..
[77] K. Sheehan,et al. An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .
[78] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[79] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[80] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[81] Peter P. Swire. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .
[82] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[83] Hal Berghel,et al. Cyberspace 2000: dealing with information overload , 1997, CACM.
[84] E. Skinner. A guide to constructs of control. , 1996, Journal of personality and social psychology.
[85] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[86] M. Culnan. Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .
[87] D. Laskin. Dealing with information overload. , 1994, Journal of oral and maxillofacial surgery : official journal of the American Association of Oral and Maxillofacial Surgeons.
[88] R. Goldsmith,et al. Social values and female fashion leadership: A cross‐cultural study , 1993 .
[89] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[90] R. I. Sutton,et al. Organizational behavior: linking individuals and groups to organizational contexts. , 1993, Annual review of psychology.
[91] C. Goodwin. Privacy: Recognition of a Consumer Right , 1991 .
[92] P. Lachenbruch. Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .
[93] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[94] F. Schoeman. Philosophical Dimensions of Privacy: An Anthology , 1984 .
[95] John R. Weisz,et al. Standing out and standing in: The psychology of control in America and Japan. , 1984 .
[96] Michael S. Hamilton,et al. The Dynamics of Law , 1981 .
[97] P. Shrout. Quasi-experimentation: Design and analysis issues for field settings: by Thomas D. Cook and Donald T. Campbell. Chicago: Rand McNally, 1979 , 1980 .
[98] R. Sitgreaves. Psychometric theory (2nd ed.). , 1979 .
[99] Terry S. Overton,et al. Estimating Nonresponse Bias in Mail Surveys , 1977 .
[100] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[101] I. Altman. Privacy: A Conceptual Analysis. , 1976 .
[102] D. Campbell,et al. Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.
[103] Claudia van Oppen,et al. USING PLS PATH MODELING FOR ASSESSING HIERARCHICAL CONSTRUCT MODELS : GUIDELINES AND EMPIRICAL , 2022 .