Why We Disclose Personal Information Despite Cybersecurity Risks and Vulnerabilities: Obligatory Passage Point Perspective
暂无分享,去创建一个
[1] H. B. Marri,et al. E-commerce and its impact on operations management , 2002 .
[2] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[3] M. Callon. Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .
[4] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[5] V. Derlega,et al. The Cambridge Handbook of Personal Relationships: Self-Disclosure in Personal Relationships , 2006 .
[6] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[7] Jac Fitz-enz,et al. Predicting people: From metrics to analytics , 2009 .
[8] B. Latour. Technology is Society Made Durable , 1990 .
[9] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[10] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[11] Patrick I. Offor. Examining Consumers’ Selective Information Privacy Disclosure Behaviors in an Organization’s Secure e-Commerce Systems , 2016 .
[12] David L. Mothersbaugh,et al. Disclosure Antecedents in an Online Service Context , 2012 .
[13] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[14] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[15] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[16] Celeste Chen,et al. Trust in Internet Privacy and Security and Online Activity , 2016 .
[17] Eri Koike,et al. Software Analysis of Internet Bots Using a Model Checker , 2013, 2013 International Conference on Information Science and Cloud Computing Companion.
[18] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[19] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[20] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[21] James Backhouse,et al. Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard , 2006, MIS Q..
[22] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[23] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[24] D. M. Pedersen. PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .
[25] Tzao-Lin Lee,et al. An integrated software processor with autofilling out web forms , 2008, 2008 13th Asia-Pacific Computer Systems Architecture Conference.
[26] Ivan Bekavac,et al. Web analytics tools and web metrics tools: An overview and comparative analysis , 2015 .
[27] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[28] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[29] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..