Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective
暂无分享,去创建一个
Xin Luo | Merrill Warkentin | Jie Zhang | Han Li | X. Luo | Han Li | Jie Zhang | Merrill Warkentin
[1] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[2] Paul A. Pavlou,et al. From IT Leveraging Competence to Competitive Advantage in Turbulent Environments: The Case of New Product Development , 2006, Inf. Syst. Res..
[3] Shirley Ou Yang,et al. Achieving Online Relationship Marketing via Tourism Blogs: A Social Network Perspective , 2014, Pac. Asia J. Assoc. Inf. Syst..
[4] J. A. Wall,et al. Conflict and Its Management , 1995 .
[5] Robert P. Bostrom,et al. The Impact of Group Support Systems on Group Conflict and Conflict Management , 1993, J. Manag. Inf. Syst..
[6] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[7] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[8] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[9] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[10] M. Afzalur Rahim,et al. Supervisory Power Bases, Styles of Handling Conflict with Subordinates, and Subordinate Compliance and Satisfaction , 1989 .
[11] Tung Lai Lai,et al. Service Quality and Perceived Value's Impact on Satisfaction, Intention and Usage of Short Message Service (SMS) , 2004 .
[12] Varun Grover,et al. A model of consumers' perceptions of the invasion of information privacy , 2013, Inf. Manag..
[13] Hock-Hai Teo,et al. AIS Electronic , 2013 .
[14] M. Lindell,et al. Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.
[15] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[16] Leslie A. DeChurch,et al. MAXIMIZING THE BENEFITS OF TASK CONFLICT: THE ROLE OF CONFLICT MANAGEMENT , 2001 .
[17] Kwai-Sang Chin,et al. Identifying and prioritizing critical success factors for conflict management in collaborative new product development , 2005 .
[18] M. Sobel. Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .
[19] Shu-Sheng Liaw,et al. Computers and the Internet as a job assisted tool: based on the three-tier use model approach , 2007, Comput. Hum. Behav..
[20] Yuan Li,et al. Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework , 2011, Commun. Assoc. Inf. Syst..
[21] D. G. Pruitt. Strategic Choice in Negotiation , 1983 .
[22] van de Evert Vliert,et al. Agreeableness and activeness as components of conflict behaviors. , 1994, Journal of personality and social psychology.
[23] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[24] Rathindra Sarathy,et al. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..
[25] van de Evert Vliert,et al. A theoretical position of compromising among other styles of conflict management , 1989 .
[26] Sarah Spiekermann,et al. Online social networks: why we disclose , 2010, J. Inf. Technol..
[27] Stephen Swailes,et al. TEAM ROLE PREFERENCE AND CONFLICT MANAGEMENT STYLES , 2005 .
[28] Gloria J. Galanes,et al. The SYMLOG dimensions and small group conflict , 1986 .
[29] Gerardine DeSanctis,et al. Using a GDSS to Facilitate Group Consensus: Some Intended and Unintended Consequences , 1988, MIS Q..
[30] Robert LaRose,et al. Your privacy is assured - of being disturbed: websites with and without privacy seals , 2006, New Media Soc..
[31] Leslie A. DeChurch,et al. Effects of conflict management strategies on perceptions of intragroup conflict. , 2007 .
[32] Peter Mykytyn,et al. Impact of heterogeneity and collaborative conflict management style on the performance of synchronous global virtual teams , 2004, Inf. Manag..
[33] Lawrence R. Wheeless,et al. Conceptualization and Measurement of Reported Self-Disclosure. , 1976 .
[34] Alfred Kobsa,et al. Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems , 2013, TIIS.
[35] I. Ajzen. The theory of planned behavior , 1991 .
[36] M. Afzalur Rahim,et al. Referent Role and Styles of Handling Interpersonal Conflict , 1986 .
[37] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[38] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[39] Heng Xu,et al. Information Systems Journal Special Issue on: Reframing Privacy in a Networked World , 2013 .
[40] Rui Chen,et al. Living a private life in public social networks: An exploration of member self-disclosure , 2013, Decis. Support Syst..
[41] P. Shrout,et al. Mediation in experimental and nonexperimental studies: new procedures and recommendations. , 2002, Psychological methods.
[42] Burcu Bulgurcu,et al. Understanding Users’ Coping with Information Privacy Threats in Online Social Networks , 2011 .
[43] Anne P. Massey,et al. Getting It Together: Temporal Coordination and Conflict Management in Global Virtual Teams , 2001 .
[44] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[45] Adam N. Joinson,et al. Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..
[46] David Antonioni,et al. Relationship between the Big Five personality factors and conflict management styles. , 1998 .
[47] Timothy Kuhn,et al. Do Conflict Management Styles Affect Group Decision Making? Evidence From a Longitudinal Field Study , 2000 .
[48] Madeline E. Smith,et al. Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences , 2013, CHI.
[49] Steve Sawyer,et al. Effects of intra‐group conflict on packaged software development team performance , 2001, Inf. Syst. J..
[50] Xu Huang,et al. Managers’ conflict management styles and employee attitudinal outcomes: The mediating role of trust , 2008 .
[51] James J. Jiang,et al. Conflict Resolution Satisfaction and IS Program Effectiveness: Constructive Controversy Theory , 2013 .
[52] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[53] Catherine Dwyer. Privacy in the Age of Google and Facebook , 2011, IEEE Technology and Society Magazine.
[54] T. Bonoma,et al. Managing Organizational Conflict: A Model for Diagnosis and Intervention , 1979 .
[55] Dennis F. Galletta,et al. Some Cautions on the Measurement of User Information Satisfaction , 1989 .
[56] Venkata K Yanamandram,et al. The impact of pre-existing attitude and conflict management style on customer satisfaction with service recovery , 2011 .
[57] George R. Milne,et al. Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .
[58] M. Rahim,et al. A measure of styles of handling interpersonal conflict. , 1983, Academy of Management journal. Academy of Management.
[59] Mahadzirah Mohamad,et al. EXAMINING THE STRUCTURAL RELATIONSHIPS OF SERVICE RECOVERY, DESTINATION IMAGE AND BEHAVIOURAL INTENTIONS OF FOREIGN TOURISTS: A PROPOSAL , 2011 .
[60] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[61] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[62] Merrill Warkentin,et al. A dual privacy decision model for online social networks , 2015, Inf. Manag..
[63] Paul Benjamin Lowry,et al. Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..
[64] Jun Heo,et al. Visiting theories that predict college students' self-disclosure on Facebook , 2014, Comput. Hum. Behav..
[65] Barton A. Weitz,et al. Managing conflict to improve the effectiveness of retail networks , 2004 .
[66] Tejaswini Herath,et al. Understanding continuance intentions of physicians with electronic medical records (EMR): An expectancy-confirmation perspective , 2015, Decis. Support Syst..
[67] Steven C. Currall,et al. What Goes Around Comes Around: the Impact of Personal Conflict Style on Work Conflict and Stress , 2006 .
[68] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[69] Dean Tjosvold,et al. Conflict Management and Team Effectiveness in China: The Mediating Role of Justice , 2002 .
[70] Piet Kommers,et al. Guest Editors' Introduction-Special Issue on Digital Society and E-Technologies , 2013, Pac. Asia J. Assoc. Inf. Syst..
[71] Merrill Warkentin,et al. The interpersonal privacy identity (IPI): development of a privacy as control model , 2016, Inf. Technol. Manag..
[72] Marko Hölbl,et al. Privacy antecedents for SNS self-disclosure: The case of Facebook , 2015, Comput. Hum. Behav..
[73] Henri Barki,et al. Interpersonal Conflict and Its Management in Information System Development , 2001, MIS Q..
[74] Ronald J. Fisher,et al. Third party consultation: a method for the study and resolution of conflict , 1972 .
[75] Paul Benjamin Lowry,et al. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.
[76] K. Thomas. Conflict and conflict management: Reflections and update , 1992 .
[77] Nick Hajli,et al. Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information , 2014, Journal of Business Ethics.
[78] Laura K. Guerrero,et al. MANAGING CONFLICT APPROPRIATELY AND EFFECTIVELY: AN APPLICATION OF THE COMPETENCE MODEL TO RAHIM'S ORGANIZATIONAL CONFLICT STYLES , 2000 .
[79] R. W. Rogers,et al. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.
[80] R. Oliver. Whence Consumer Loyalty? , 1999 .
[81] Nicholas Christakis,et al. The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..
[82] B. Beersma,et al. NEGOTIATION PROCESSES AND OUTCOMES IN PROSOCIALLY AND EGOISTICALLY MOTIVATED GROUPS , 1999 .
[83] E. Mannix,et al. The critical role of conflict resolution in teams: a close look at the links between conflict type, conflict management strategies, and team outcomes. , 2008, The Journal of applied psychology.
[84] Patrick Y. K. Chau,et al. Cross-cultural IS research: perspectives from Eastern and Western traditions , 2015, Eur. J. Inf. Syst..
[85] Jae-Shin Lee,et al. Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience , 2010, Comput. Hum. Behav..
[86] Jalan Menara Gading,et al. An Examination between the Relationships of Conflict Management Styles and Employees' Satisfaction , 2008 .
[87] Frank Tutzauer,et al. Communication Processes Leading to Integrative Agreements , 1988 .
[88] B. Beersma,et al. A theory-based measure of conflict management strategies in the workplace , 2001 .
[89] Marie Helweg-Larsen,et al. Do Moderators of the Optimistic Bias Affect Personal or Target Risk Estimates? A Review of the Literature , 2001 .