'I Knew It Was Too Good to Be True"
暂无分享,去创建一个
Priya Kumar | Jessica Vitak | Mega Subramaniam | Yuting Liao | Mega M. Subramaniam | Jessica Vitak | Priya C. Kumar | Yuting Liao
[1] Richard J. Anderson,et al. Examining Security and Privacy Research in Developing Regions , 2018, COMPASS.
[2] Eszter Hargittai,et al. Survey Measures of Web-Oriented Digital Literacy , 2005 .
[3] M. Siegrist,et al. Perception of Hazards: The Role of Social Trust and Knowledge , 2000, Risk analysis : an official publication of the Society for Risk Analysis.
[4] Eszter Hargittai,et al. Second-Level Digital Divide: Mapping Differences in People's Online Skills , 2001, ArXiv.
[5] Laura Dianne Stanley,et al. Beyond Access: Psychosocial Barriers to Computer Literacy Special Issue: ICTs and Community Networking , 2003, Inf. Soc..
[6] Andreas Vårheim. Gracious space: Library programming strategies towards immigrants as tools in the creation of social capital , 2011 .
[7] Beth St. Jean,et al. As simple as that?: tween credibility assessment in a complex online world , 2015, J. Documentation.
[8] Shawn Glynn. Drawing Mental Models. , 1997 .
[9] Andrew Large,et al. “Bonded design”: A novel approach to intergenerational information technology design , 2006 .
[10] Emiliano Lorini,et al. Computer-Mediated Trust in Self-interested Expert Recommendations , 2017, Cognition Beyond the Brain.
[11] Rick Wash,et al. Stories as informal lessons about security , 2012, SOUPS.
[12] Eszter Hargittai,et al. Second-Level Digital Divide: Differences in People's Online Skills , 2002, First Monday.
[13] Sunny Consolvo,et al. "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices , 2015, SOUPS.
[14] Elissa M. Redmiles,et al. Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics , 2017, CHI.
[15] A. Baier. Trust and Antitrust , 1986, Ethics.
[16] Jiawen Chen,et al. Trust transfer in social media brand communities: The role of consumer engagement , 2018, Int. J. Inf. Manag..
[17] Patrick Traynor,et al. Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services , 2017, SOUPS.
[18] Rick Wash,et al. Identifying patterns in informal sources of security information , 2015, J. Cybersecur..
[19] Paul T. Jaeger,et al. The Intersection of Public Policy and Public Access: Digital Divides, Digital Literacy, Digital Inclusion, and Public Libraries , 2012, Public Libr. Q..
[20] Michael J. Muller,et al. Participatory design: the third space in HCI , 2002 .
[21] Aaron D. Shaw,et al. The Pipeline of Online Participation Inequalities: The Case of Wikipedia Editing , 2018 .
[22] Priya Kumar,et al. Librarians as Information Intermediaries: Navigating Tensions Between Being Helpful and Being Liable , 2018, iConference.
[23] Sandra Streukens,et al. Comfort your online customer: quality, trust and loyalty on the internet , 2004 .
[24] L. Jaycox,et al. Theoretical basis and program design of a school-based mental health intervention for traumatized immigrant children: A collaborative research partnership , 2002, The Journal of Behavioral Health Services & Research.
[25] Joseph W. Jerome. Buying and Selling Privacy: Big Data's Different Burdens and Benefits , 2013 .
[26] Ye Tian,et al. Exploring factors influencing Chinese user's perceived credibility of health and safety information on Weibo , 2015, Comput. Hum. Behav..
[27] Michael Mackert,et al. Designing e-health interventions for low-health-literate culturally diverse parents: addressing the obesity epidemic. , 2009, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[28] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[29] Miriam J. Metzger,et al. Digital Media and Youth: Unparalleled Opportunity and Unprecedented Responsibility , 2008 .
[30] Robert LaRose,et al. Internet Self-Efficacy and the Psychology of the Digital Divide , 2006, J. Comput. Mediat. Commun..
[31] Michael Zimmer,et al. Privacy Attitudes and Data Valuation Among Fitness Tracker Users , 2018, iConference.
[32] Kyung Kyu Kim,et al. Initial trust and the adoption of B2C e-commerce: The case of internet banking , 2004, DATB.
[33] Zinta S. Byrne,et al. The Psychology of Security for the Home Computer User , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Andreas Vårheim. Trust in Libraries and Trust in Most People: Social Capital Creation in the Public Library , 2014, The Library Quarterly.
[35] Wei Chen,et al. Social network collaborative filtering framework and online trust factors: A case study on Facebook , 2010, 2010 Fifth International Conference on Digital Information Management (ICDIM).
[36] J. V. Dijk,et al. The Deepening Divide: Inequality in the Information Society , 2005 .
[37] Mary Madden,et al. Privacy, security, and digital inequality , 2017 .
[38] Rick Wash,et al. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users , 2015, SOUPS.
[39] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[40] Emiliano Lorini,et al. Computer-mediated trust in self-interested expert recommendations , 2010, AI & SOCIETY.
[41] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[42] J. Klayman,et al. Hypothesis testing in rule discovery: Strategy, structure, and content. , 1989 .
[43] Jay Chen,et al. Exploring Internet Security Perceptions and Practices in Urban Ghana , 2014, SOUPS.
[44] K. Glanz,et al. The role of behavioral science theory in development and implementation of public health interventions. , 2010, Annual review of public health.
[45] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[46] R. Rice,et al. Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts , 2003 .
[47] David Greathead,et al. When mental models go wrong: co-occurrences in dynamic, critical systems , 2004, Int. J. Hum. Comput. Stud..
[48] Eszter Hargittai,et al. Succinct Survey Measures of Web-Use Skills , 2012 .
[49] Yong Jin Park,et al. Digital Literacy and Privacy Behavior Online , 2013, Commun. Res..
[50] Kenneth. A . . Smith. Americans and Cybersecurity , 2016 .
[51] Ellen Helsper,et al. The Compoundness and Sequentiality of Digital Inequality , 2017 .
[52] Rick Wash,et al. Influencing mental models of security: a research agenda , 2011, NSPW '11.
[53] Ricardo Gomez,et al. The "cool factor" of public access to ICT: Users' perceptions of trust in libraries, telecentres and cybercafés in developing countries , 2010, Inf. Technol. People.
[54] E. Hargittai. The Digital Divide and What to Do About It , 2003 .
[55] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[56] Jørn Braa,et al. Distributed Development to Enable User Participation: Multilevel design in the HISP network , 2009, Scand. J. Inf. Syst..
[57] J. Klayman,et al. Confirmation, Disconfirmation, and Informa-tion in Hypothesis Testing , 1987 .
[58] Helen Dunford. Digital literacy and digital inclusion: Information policy and the public library , 2015 .
[59] Soo Young Rieh. Credibility and Cognitive Authority of Information , 2010 .
[60] Jan van Dijk,et al. The Digital Divide as a Complex and Dynamic Phenomenon , 2000, Inf. Soc..
[61] Alice E. Marwick,et al. Privacy, Poverty and Big Data: A Matrix of Vulnerabilities for Poor Americans , 2017 .
[62] N. Luhmann. Vertrauen : ein Mechanismus der Reduktion sozialer Komplexität , 1973 .
[63] I. Rosenstock,et al. Social Learning Theory and the Health Belief Model , 1988, Health education quarterly.
[64] Craig W. Trumbo,et al. The Function of Credibility in Information Processing for Risk Perception , 2003, Risk analysis : an official publication of the Society for Risk Analysis.
[65] Nancy Nyland. Digital Literacy and Digital Inclusion: Information Policy and the Public Library , 2015 .
[66] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[67] 유창조. Naturalistic Inquiry , 2022, The SAGE Encyclopedia of Research Design.
[68] John B. Horrigan,et al. Digital Readiness Gaps. , 2016 .