The Interplay Between Human and Machine Agency
暂无分享,去创建一个
[1] J. Lewis,et al. The Social Dynamics of Trust: Theoretical and Empirical Research, 1985–2012 , 2012 .
[2] Xiaolan Fu,et al. Effects of culture, social presence, and group composition on trust in technology‐supported decision‐making groups , 2010, Inf. Syst. J..
[3] Jeremy N. Bailenson,et al. The Unbearable Likeness of Being Digital: The Persistence of Nonverbal Social Norms in Online Virtual Environments , 2007, Cyberpsychology Behav. Soc. Netw..
[4] Jeremy Rose,et al. Machine Agency as Perceived Autonomy: An Action Perspective , 2000, Organizational and Social Perspectives on IT.
[5] Mun Y. Yi,et al. Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model , 2003, Int. J. Hum. Comput. Stud..
[6] Wouter Poortinga,et al. Exploring the Dimensionality of Trust in Risk Regulation , 2003, Risk analysis : an official publication of the Society for Risk Analysis.
[7] S. Shyam Sundar,et al. Balancing human agency and object agency: an end-user interview study of the internet of things , 2012, UbiComp.
[8] A. Bandura. Self-efficacy mechanism in human agency , 2024, Psihologìâ ì suspìlʹstvo.
[9] Ohbyung Kwon,et al. An empirical study of the factors affecting social network service use , 2010, Comput. Hum. Behav..
[10] Batya Friedman,et al. Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..
[11] Sushil Jajodia,et al. Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.
[12] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[13] Dan Jong Kim,et al. Exploring Online Transaction Self-Efficacy in Trust Building in B2C E-Commerce , 2009, J. Organ. End User Comput..
[14] Paul A. Pavlou,et al. Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..
[15] P. Haggard,et al. Automation Technology and Sense of Control: A Window on Human Agency , 2012, PloS one.
[16] Jeremy Rose,et al. Socio-Theoretic Accounts of IS: The Problem of Agency , 2005, Scand. J. Inf. Syst..
[17] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[18] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[19] Hsi-Peng Lu,et al. Why people use social networking sites: An empirical study integrating network externalities and motivation theory , 2011, Comput. Hum. Behav..
[20] Sally A. Applin,et al. Cooperation Between Humans and Robots: Applied Agency in Autonomous Processes , 2015 .
[21] Sue Bennett,et al. The 'digital natives' debate: A critical review of the evidence , 2008, Br. J. Educ. Technol..
[22] Dan J. Kim,et al. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2019 .
[23] Anthony D. Miyazaki,et al. Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility , 2010 .
[24] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[25] J. Rose,et al. The Double Dance of Agency : a socio-theoretic account of how machines and humans interact , 2005 .
[26] A. Bandura. Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.
[27] Mireille Hildebrandt,et al. Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology , 2013 .
[28] J. H. Davis,et al. An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .
[29] Mireille Hildebrandt,et al. Profile Transparency by Design? Re-enabling Double Contingency , 2013 .
[30] Vincent T. Covello,et al. Actual and Perceived Risk: A Review of the Literature , 1984 .
[31] Akbar Zaheer,et al. Trust as an Organizing Principle Bill McEvily , 2003 .
[32] E A Leventhal,et al. Population risk, actual risk, perceived risk, and cancer control: a discussion. , 1999, Journal of the National Cancer Institute. Monographs.
[33] Dong-Hee Shin,et al. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..
[34] Vegard Engen,et al. Machine Agency in Human-Machine Networks; Impacts and Trust Implications , 2016, HCI.
[35] Ahmet Akin,et al. Social self-efficacy, academic locus of control, and internet addiction , 2010, Comput. Educ..
[36] K. Stewart. Trust Transfer on the World Wide Web , 2002 .
[37] Jason Bennett Thatcher,et al. Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust's Influence on Individual Decision-Making , 2012, J. Organ. End User Comput..
[38] David Meyer,et al. The role of perceived enjoyment and social norm in the adoption of technology with network externalities , 2008, Eur. J. Inf. Syst..
[39] Marshall Scott Poole,et al. Interpersonal Traits, Complementarity, and Trust in Virtual Collaboration , 2004, J. Manag. Inf. Syst..
[40] C. Arun,et al. Survey on interoperability, security, trust, privacy standardization of cloud computing , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[41] Harsha Gangadharbatla. Facebook Me , 2008 .
[42] Jason Bennett Thatcher,et al. Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.
[43] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[44] Sally A. Applin,et al. Watching Me, Watching You. (Process surveillance and agency in the workplace) , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.
[45] Christopher R. Jones,et al. Net generation students: agency and choice and the new technologies , 2010, J. Comput. Assist. Learn..
[46] Batya Friedman,et al. Trust online , 2000, CACM.
[47] Saonee Sarker,et al. The Role of Communication and Trust in Global Virtual Teams: A Social Network Perspective , 2011, J. Manag. Inf. Syst..
[48] Nicole C. Krämer,et al. Impression Management 2.0 , 2008, J. Media Psychol. Theor. Methods Appl..
[49] N Moray,et al. Trust, control strategies and allocation of function in human-machine systems. , 1992, Ergonomics.
[50] K. Strater,et al. Strategies and struggles with privacy in an online social networking community , 2008 .
[51] Jeremy Rose,et al. The Problem of Agency; How Humans Act, How Machines Act , 2003 .
[52] George Bravos,et al. Online Appendix to : Understanding Human-Machine Networks : A Cross-Disciplinary Survey , 2017 .
[53] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.
[54] Chun-Ming Chang,et al. Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..
[55] Albert Bandura,et al. On the Functional Properties of Perceived Self-Efficacy Revisited , 2012 .
[56] Paul M. Leonardi,et al. When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies , 2011, MIS Q..
[57] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[58] H. J. Smith,et al. Exploring information privacy regulation, risks, trust, and behavior , 2015, Inf. Manag..
[59] Donald A. Norman,et al. Living with complexity , 2011 .
[60] Nizar Souiden,et al. The interplay of counter-conformity motivation, social influence, and trust in customers' intention to adopt Internet banking services: The case of an emerging country , 2016 .
[61] Asbjørn Følstad,et al. Automation in Human-Machine Networks: How Increasing Machine Agency Affects Human Agency , 2017, ICMMI.
[62] Matthew K. O. Lee,et al. A theoretical model of intentional social action in online social networks , 2010, Decis. Support Syst..
[63] Jason Bennett Thatcher,et al. The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems , 2011, IEEE Transactions on Engineering Management.
[64] Ali Şimşek. The Relationship between Computer Anxiety and Computer Self-Efficacy , 2011 .
[65] Ardion Beldad,et al. How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..
[66] Mireille Hildebrandt,et al. Smart Technologies and the End(s) of Law. Novel Entanglements of Law and Technology , 2015 .
[67] Ellen Garbarino,et al. GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .
[68] Richard D. Johnson,et al. The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time , 2007, J. Assoc. Inf. Syst..
[69] W. S. Chow,et al. Social network, social trust and shared goals in organizational knowledge sharing , 2008, Inf. Manag..
[70] Jason Bennett Thatcher,et al. Internal and External Dimensions of Computer Self-Efficacy: An Empirical Examination , 2008, IEEE Transactions on Engineering Management.
[71] A. Kellerman,et al. The Constitution of Society : Outline of the Theory of Structuration , 2015 .
[72] B. J. Fogg,et al. Persuasive computers: perspectives and research directions , 1998, CHI.
[73] Marilyn E. Gist,et al. Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability , 1992 .
[74] Qiang Tu,et al. The Impact of Computer Self-Efficacy and Technology Dependence on Computer-Related Technostress: A Social Cognitive Theory Perspective , 2011, Int. J. Hum. Comput. Interact..