Understanding the Use of Location Sharing Services on Social Networking Platforms in China
暂无分享,去创建一个
[1] Henriette Cramer,et al. Performing a check-in: emerging practices, norms and 'conflicts' in location-sharing using foursquare , 2011, Mobile HCI.
[2] Vassilis Kostakos,et al. Who's your best friend?: targeted privacy attacks In location-sharing social networks , 2011, UbiComp '11.
[3] Sumeet Gupta,et al. The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..
[4] I. Ajzen. The theory of planned behavior , 1991 .
[5] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[6] John Krogstie,et al. Differences in the Adoption of Smartphones Between Middle Aged Adults and Older Adults in China , 2015, HCI.
[7] Keng Siau,et al. Adoption of mobile information services: An empirical study , 2014, Mob. Inf. Syst..
[8] Ephraim R. McLean,et al. Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..
[9] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[10] Michael Zimmer. Privacy on Planet Google: Using the Theory of "Contextual Integrity" to Clarify the Privacy Threats of Google's Quest for the Perfect Search Engine , 2008 .
[11] Herman T. Tavani,et al. Applying the “Contextual Integrity” Model of Privacy to Personal Blogs in the Blogoshere , 2010 .
[12] Haojin Zhu,et al. All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.
[13] Celine Latulipe,et al. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[14] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[15] Chris W. Clegg,et al. Explaining intranet use with the technology acceptance model , 2001, J. Inf. Technol..
[16] David Gefen,et al. TAM or Just Plain Habit: A Look at Experienced Online Shoppers , 2003, J. Organ. End User Comput..
[17] John Krogstie,et al. A mobile service using anonymous location-based data: finding reading rooms , 2015 .
[18] John Krogstie,et al. Understanding business models of mobile ecosystems in China: a case study , 2015, MEDES.
[19] Yunan Chen,et al. Using contextual integrity to examine interpersonal information boundary on social network sites , 2013, CHI.
[20] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[21] Kai Kwong Wat,et al. Privacy and Social Effects in Location Sharing Services , 2012, 2012 IEEE First International Conference on Services Economics.
[22] Tao Zhou,et al. Examining Location-Based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk , 2012 .
[23] Lorrie Faith Cranor,et al. Location-Sharing Technologies: Privacy Risks and Controls , 2009 .
[24] John Krogstie,et al. The adoption of mobile tourism services: an empirical study , 2012, MoMM '12.
[25] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[26] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[27] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[28] Norman M. Sadeh,et al. A comparative study of location-sharing privacy preferences in the United States and China , 2012, Personal and Ubiquitous Computing.
[29] E. Rogers,et al. Diffusion of Innovations , 1964 .
[30] John Zimmerman,et al. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.