The effect of perceived justice on LBS users’ privacy concern
暂无分享,去创建一个
[1] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .
[2] Richard T. Watson,et al. Location-based services , 2008, CACM.
[3] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[4] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[5] Maryam Masoudi,et al. The effect of web interface features on consumer online purchase intentions , 2015 .
[6] D. Hoffman,et al. Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations , 1996 .
[7] Sumeet Gupta,et al. Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..
[8] Michael F. Goodchild,et al. Location-Based Services , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[9] Hangjung Zo,et al. User acceptance of location-based social networking services: An extended perspective of perceived value , 2013, Online Inf. Rev..
[10] F. Reichheld,et al. E-LOYALTY: YOUR SECRET WEAPON ON THE WEB , 2003 .
[11] Hsin-Hui Lin,et al. The relationship of service failure severity, service recovery justice and perceived switching costs with customer loyalty in the context of e-tailing , 2011, Int. J. Inf. Manag..
[12] Murugan Anandarajan,et al. Experiencing flow with instant messaging and its facilitating role on creative behaviors , 2010, Comput. Hum. Behav..
[13] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[14] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[15] H. Teo,et al. Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012 .
[16] Tao Zhou,et al. Examining Location-Based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk , 2012 .
[17] Yuan Li,et al. Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..
[18] Xin Li,et al. Understanding the adoption of location-based recommendation agents among active users of social networking sites , 2014, Inf. Process. Manag..
[19] Tsung-Hsien Kuo,et al. How can one amplify the effect of e-learning? An examination of high-tech employees' computer attitude and flow experience , 2010, Comput. Hum. Behav..
[20] Heng Xu,et al. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..
[21] Alexander Brem,et al. Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany , 2015, Comput. Hum. Behav..
[22] H. Raghav Rao,et al. Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender , 2011, J. Manag. Inf. Syst..
[23] Lakshmi Goel,et al. Predicting users' return to virtual worlds: a social perspective , 2013, Inf. Syst. J..
[24] Catherine E. Connelly,et al. In Justice We Trust: Predicting User Acceptance of E-Customer Services , 2008, J. Manag. Inf. Syst..
[25] Jamie Carlson,et al. Examining the effects of website-induced flow in professional sporting team websites , 2010, Internet Res..
[26] Marshall Scott Poole,et al. Antecedents of flow in online shopping: a test of alternative models , 2009, Inf. Syst. J..
[27] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[28] G. I. Kustova,et al. From the author , 2019, Automatic Documentation and Mathematical Linguistics.
[29] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[30] Imsook Ha,et al. Determinants of adoption of mobile games under mobile broadband wireless access environment , 2007, Inf. Manag..
[31] Naresh K. Malhotra,et al. Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..
[32] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[33] Alexander Hars,et al. Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..
[34] M. Csíkszentmihályi,et al. Optimal experience: Psychological studies of flow in consciousness. , 1988 .
[35] Sonja Wiley-Patton,et al. Consumer adoption of mobile TV: Examining psychological flow and media content , 2009, Comput. Hum. Behav..
[36] Kun Chang Lee,et al. Transfer From Offline Trust to Key Online Perceptions: An Empirical Study , 2007, IEEE Transactions on Engineering Management.
[37] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[38] Choong-C. Lee,et al. Understanding the Use of Location-Based Service Applications: Do Privacy Concerns Matter? , 2013 .
[39] Hock-Hai Teo,et al. Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..
[40] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[41] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[42] Marios Koufaris,et al. Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior , 2002, Inf. Syst. Res..
[43] Deborah J. Armstrong,et al. Exploring neuroticism and extraversion in flow and user generated content consumption , 2014, Inf. Manag..
[44] Sumeet Gupta,et al. The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..
[45] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[46] Pin Luarn,et al. Why People Check In to Social Network Sites , 2015, Int. J. Electron. Commer..
[47] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[48] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[49] Donald E. Conlon,et al. Justice at the millennium: a meta-analytic review of 25 years of organizational justice research. , 2001, The Journal of applied psychology.
[50] Xi Chen,et al. Factors affecting privacy disclosure on social network sites: an integrated model , 2010, Electronic Commerce Research.
[51] Richard D. Holowczak,et al. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls , 2008, Decis. Support Syst..
[52] Hsi-Peng Lu,et al. Continuance intention of Facebook check-in service users: An integrated model , 2014 .
[53] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..