How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor
暂无分享,去创建一个
[1] Steffen Kunz,et al. Are you willing to wait longer for internet privacy? , 2011, ECIS.
[2] Nancy K. Lankton,et al. Technology, Humanness, and Trust: Rethinking Trust in Technology , 2015, J. Assoc. Inf. Syst..
[3] Jason Bennett Thatcher,et al. Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.
[4] Blair H. Sheppard,et al. The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .
[5] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[6] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[7] Larry D. Rosen,et al. The Media and Technology Usage and Attitudes Scale: An empirical investigation , 2013, Comput. Hum. Behav..
[8] M. Sarstedt,et al. A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .
[9] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[10] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[11] Ioannis Krontiris,et al. User Acceptance Factors for Anonymous Credentials: An Empirical Investigation , 2015, WEIS.
[12] M. Hill,et al. Consumer privacy and the Internet in Europe: a view from Germany , 2003 .
[13] Jon Heales,et al. The Influence of Privacy, Trust, and National Culture on Internet Transactions , 2017, HCI.
[14] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[15] Constantin Blome,et al. Ethical Climate and Purchasing Social Responsibility: A Benevolence Focus , 2013 .
[16] Ganesh Iyer,et al. A Usability Evaluation of Tor Launcher , 2017, Proc. Priv. Enhancing Technol..
[17] Antonio Krüger,et al. Towards Understanding the Influence of Personality on Mobile App Permission Settings , 2017, INTERACT.
[18] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[19] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[20] Lujo Bauer,et al. Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.
[21] R. M. Fano,et al. Some thoughts about the social implications of accessible computing , 1899, AFIPS '65 (Fall, part I).
[22] Charles D. Raab,et al. Laws, PETs and Other Technologies for Privacy Protection , 2001, J. Inf. Law Technol..
[23] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .
[24] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[25] Naresh K. Malhotra,et al. Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..
[26] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .