The role of security notices and online consumer behaviour: An empirical study of social networking users
暂无分享,去创建一个
Jean-Noël Ezingeard | Vladlena Benson | George Saridakis | Hemamali Tennakoon | J. Ezingeard | G. Saridakis | Vladlena Benson | Hemamali Tennakoon
[1] K. Mitchell,et al. Online Harassment in Context: Trends From Three Youth Internet Safety Surveys (2000, 2005, 2010) , 2013 .
[2] Dale Goodhue,et al. Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers , 2012, Inf. Syst. Res..
[3] Xi Chen,et al. A Literature Review of Privacy Research on Social Network Sites , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[4] P. Schmidt,et al. Limited-Dependent and Qualitative Variables in Econometrics. , 1984 .
[5] Alexey N. Nikitkov. Information Assurance Seals: How They Impact Consumer Purchasing Behavior , 2006, J. Inf. Syst..
[6] Michael D. Smith,et al. Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2007, J. Manag. Inf. Syst..
[7] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[8] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[9] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[10] Mary E Duffy,et al. Methodological issues in Web-based research. , 2002, Journal of nursing scholarship : an official publication of Sigma Theta Tau International Honor Society of Nursing.
[11] Yoshihisa Kashima,et al. The acquisition of perceived descriptive norms as social category learning in social networks , 2013, Soc. Networks.
[12] F. A. Pettit. A comparison of World-Wide Web and paper-and-pencil personality questionnaires , 2002, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[13] Yong Tan,et al. Social Networks and the Diffusion of User-Generated Content: Evidence from YouTube , 2012, Inf. Syst. Res..
[14] Babu P. George,et al. Risk Perception and Buying Behavior: An Examination of Some Relationships in the Context of Cruise Tourism in Jamaica , 2013 .
[15] S. Livingstone,et al. Handbook of new media : social shaping and consequences of ICTs , 2002 .
[16] John Raacke,et al. MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites , 2008, Cyberpsychology Behav. Soc. Netw..
[17] S. Michael. Handbook in research and evaluation , 1971 .
[18] Lei Zhou,et al. The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..
[19] Bradford W Reyns,et al. Online Routines and Identity Theft Victimization , 2013 .
[20] D. Hoffman,et al. Can You Measure the ROI of Your Social Media Marketing , 2010 .
[21] John G. Lynch,et al. Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces , 1997 .
[22] Kai H. Lim,et al. Web strategies to promote internet shopping: is cultural-customization needed? , 2009 .
[23] Robert LaRose,et al. Internet Self-Efficacy and the Psychology of the Digital Divide , 2006, J. Comput. Mediat. Commun..
[24] A. Khatibi,et al. Understanding consumers internet purchase intention in Malaysia , 2011 .
[25] Mary J. Culnan,et al. How Large U.S. Companies Can Use Twitter and Other Social Media to Gain Business Value , 2010, MIS Q. Executive.
[26] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[27] Bruno S. Silvestre,et al. Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media , 2011 .
[28] Trevor T. Moores,et al. Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.
[29] P Jennette,et al. Debatin, Bernhard, Lovejoy, Horn, Ann-Kathrin, and Hughes, Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. , 2009 .
[30] Hsin Hsin Chang,et al. Consumer perception of interface quality, security, and loyalty in electronic commerce , 2009, Inf. Manag..
[31] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[32] Dan Jong Kim,et al. Revisiting the role of web assurance seals in business-to-consumer electronic commerce , 2008, Decis. Support Syst..
[33] P. Pavlou,et al. Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .
[34] S.M. Furnell. Considering the security challenges in consumer-oriented eCommerce , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[35] Alessandro Acquisti,et al. Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.
[36] R. LaRose,et al. Understanding Internet Usage , 2001 .
[37] Ellen Christiaanse,et al. Consumer Trust in Electronic Channels: The Impact of Electronic Commerce Assurance on Consumers' Purchasing Likelihood and Risk Perceptions , 2003 .
[38] Clement Guitton,et al. Cyber insecurity as a national threat: overreaction from Germany, France and the UK? , 2013 .
[39] J. Wolak,et al. Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[40] S. Sitkin,et al. Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity , 1995 .
[41] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[42] Vladimir Zwass,et al. Co-Creation: Toward a Taxonomy and an Integrated Research Perspective , 2010, Int. J. Electron. Commer..
[43] Sebastiaan H. von Solms,et al. Information Security - A Multidimensional Discipline , 2001, Comput. Secur..
[44] M. Haenlein,et al. Managing Customer Relationships in the Social Media Era: Introducing the Social CRM House , 2013 .
[45] Anand Kumar,et al. Web Assurance Seals: How and Why They Influence Consumers' Decisions , 2002, J. Inf. Syst..
[46] P. Berthon,et al. E‐readiness and trust: macro and micro dualities for e‐commerce in a global environment , 2008 .
[47] Ingoo Han,et al. The Effect of On-Line Consumer Reviews on Consumer Purchasing Intention: The Moderating Role of Involvement , 2007, Int. J. Electron. Commer..
[48] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[49] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[50] Jeffrey M. Wooldridge,et al. Solutions Manual and Supplementary Materials for Econometric Analysis of Cross Section and Panel Data , 2003 .
[51] R. Al-Dwairi. E-Commerce Web Sites Trust Factors: An Empirical Approach , 2013 .
[52] Colin Potts,et al. Privacy policies as decision-making tools: an evaluation of online privacy notices , 2004, CHI.
[53] David J. Faulds,et al. Social media: The new hybrid element of the promotion mix , 2009 .
[54] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[55] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[56] Alice Hutchings,et al. Hacking and Fraud: Qualitative Analysis of Online Offending and Victimization , 2013 .
[57] Irene Pollach,et al. What's wrong with online privacy policies? , 2007, CACM.
[58] Eric F. Shaver,et al. On Trust in the Internet: Belief Cues from Domain Suffixes and Seals of Approval , 2003 .
[59] Wang Tao,et al. An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..
[60] Kacper Gradon. Crime Science and the Internet Battlefield: Securing the Analog World from Digital Crime , 2013, IEEE Security & Privacy.
[61] U. Gretzel,et al. Role of social media in online travel information search , 2010 .
[62] Amanda Lenhart,et al. Adults and social network websites , 2009 .
[63] Carl A. Kallgren,et al. A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. , 1990 .
[64] Oliver Schilke,et al. Strategic development of business models: Implications of the web 2.0 for creating value on the internet , 2010 .
[65] Kimberly J. Mitchell,et al. Patterns of Internet Use and Risk of Online Victimization for Youth With and Without Disabilities , 2014 .
[66] Brian R. Kovar,et al. Consumer Responses to the CPA WEBTRUST™ Assurance , 2000, J. Inf. Syst..
[67] Marlien Herselman,et al. Implementation of regulation-based e-procurement in the Eastern Cape provincial administration , 2010 .
[68] R. Petty. Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .
[69] Tanya S. Benford,et al. Retraction: The Impact of Electronic Commerce Assurance on Financial Analysts' Earnings Forecasts and Stock Price Estimates , 2000 .
[70] Eric Beauregard,et al. Routine Activities and Time Use , 2014, Sexual abuse : a journal of research and treatment.
[71] T. Makana Chock,et al. Facebook, the Third-Person Effect, and the Differential Impact Hypothesis , 2014, J. Comput. Mediat. Commun..
[72] B. Paul,et al. The Third-Person Effect: A Meta-Analysis of the Perceptual Hypothesis , 2000 .
[73] Sejung Marina Choi,et al. Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .
[74] William Sims Bainbridge. Cyberspace: Sociology's Natural Domain , 1999 .
[75] Stuart J. Barnes,et al. Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..
[76] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[77] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[78] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[79] Kathryn M. Kimery,et al. Signals of Trustworthiness in E-Commerce: Consumer Understanding of Third-Party Assurance Seals , 2006, J. Electron. Commer. Organ..
[80] Guohua Wu,et al. The effects of Web assurance seals on consumers' initial trust in an online vendor: A functional perspective , 2010, Decis. Support Syst..
[81] Kin Fai Ellick Wong. The role of risk in making decisions under escalation situations , 2005 .
[82] Elaine G. Mauldin,et al. An Experimental Examination of Alternative Forms of Web Assurance for Business-to-Consumer e-Commerce , 2002, J. Inf. Syst..
[83] Tran Khanh Dang,et al. A survey on security visualization techniques for web information systems , 2013, Int. J. Web Inf. Syst..
[84] A. Rubin. Ritualized and Instrumental Television Viewing , 1984 .
[85] Framarz Byramjee,et al. A REVIEW OF THE ROLE OF CONSUMERS TRANSACTION COSTS IN THE TRADITIONAL AND ONLINE SHOPPING ENVIRONMENTS , 2013 .
[86] O. A. Sawy,et al. Digital business strategy: toward a next generation of insights , 2013 .
[87] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[88] David R. Brake,et al. ON THE RAPID RISE OF SOCIAL NETWORKING SITES: NEW FINDINGS AND POLICY IMPLICATIONS , 2010 .
[89] Nick Couldry,et al. Media Rituals: A Critical Approach , 2003 .
[90] Z. Pan,et al. Understanding the Third‐Person Perception: Evidence From a Meta‐Analysis , 2008 .
[91] Chun-Ming Chang,et al. Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..
[92] Yohko Orito,et al. Do online privacy policies and seals affect corporate trustworthiness and reputation , 2013 .
[93] Johan van Wilsem,et al. ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization , 2013 .
[94] Dhavan V. Shah,et al. FOR THE GOOD OF OTHERS: CENSORSHIP AND THE THIRD-PERSON EFFECT , 1996 .
[95] Douglas E. Hughes. This ad’s for you: the indirect effect of advertising perceptions on salesperson effort and performance , 2013 .
[96] Huaping Chen,et al. Credibility of Electronic Word-of-Mouth: Informational and Normative Determinants of On-line Consumer Recommendations , 2009, Int. J. Electron. Commer..
[97] Tom W. Smith,et al. Survey-Research Paradigms Old and New , 2013 .
[98] S. Kiesler,et al. SELF-SELECTED AND RANDOMLY SELECTED RESPONDENTS IN A COMPUTER NETWORK SURVEY , 1992 .
[99] Chang Liu,et al. Beyond concern - a privacy-trust-behavioral intention model of electronic commerce , 2004, Inf. Manag..
[100] Hamid Reza Peikari,et al. Does Nationality Matter in the B2C Environment? Results from a Two Nation Study , 2010, ICGS3.
[101] Robert E. Kraut,et al. Editorial Overview - The Interplay Between Digital and Social Networks , 2008, Inf. Syst. Res..
[102] Hans-Bernd Brosius,et al. THE CAUSES OF THIRD-PERSON EFFECTS: UNREALISTIC OPTIMISM, IMPERSONAL IMPACT, OR GENERALIZED NEGATIVE ATTITUDES TOWARDS MEDIA INFLUENCE? , 1996 .
[103] James E. Rauch. Business and Social Networks in International Trade , 2001 .
[104] Koen Pauwels,et al. Social Media Metrics — A Framework and Guidelines for Managing Social Media , 2013 .
[105] R. V. Krejcie,et al. Determining Sample Size for Research Activities , 1970 .
[106] A. Bandura. Social learning theory , 1977 .
[107] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[108] D. Hoffman,et al. Toward a Deeper Understanding of Social Media , 2012 .
[109] Dong-Hee Shin,et al. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..
[110] R. Kozinets. E-tribalized Marketing?: The Strategic Implications of Virtual Communities of Consumption , 1999 .
[111] Debi Ashenden,et al. Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour? , 2010, PrimeLife.
[112] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[113] Dhruv Grewal,et al. Understanding social media effects across seller, retailer, and consumer interactions , 2013, Journal of the Academy of Marketing Science.
[114] S. Gosling,et al. Should we trust web-based studies? A comparative analysis of six preconceptions about internet questionnaires. , 2004, The American psychologist.
[115] Anthony D. Miyazaki,et al. Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .
[116] C. B. Bhutta. Not by the Book Facebook as a Sampling Frame , 2012 .
[117] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[118] M. Couper. A REVIEW OF ISSUES AND APPROACHES , 2000 .
[119] David Godes,et al. Introduction to the Special Issue - Social Media and Business Transformation: A Framework for Research , 2013, Inf. Syst. Res..