Disclosing too much? Situational factors affecting information disclosure in social commerce environment
暂无分享,去创建一个
[1] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[2] Nancy K. Lankton,et al. Social Networking Information Disclosure and Continuance Intention: A Disconnect , 2011, 2011 44th Hawaii International Conference on System Sciences.
[3] Scott A. Golder,et al. Security Issues and Recommendations for Online Social Networks. , 2007 .
[4] David S. Rosenblum,et al. What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.
[5] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[6] Jeffrey T. Child,et al. Unpacking the Paradoxes of Privacy in CMC Relationships: The Challenges of Blogging and Relational Communication on the Internet , 2010 .
[7] R. L. Archer,et al. The effects of timing of self-disclosure on attraction and reciprocity. , 1980 .
[8] Jan Noyes,et al. An assessment of the influence of perceived enjoyment and attitude on the intention to use technology among pre-service teachers: A structural equation modeling approach , 2011, Comput. Educ..
[9] Marian M. Morry,et al. Allocentrism and friendship satisfaction : The mediating roles of disclosure and closeness , 2005 .
[10] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[11] Sang-Hyun Kim,et al. Effects of Antecedents of Collectivism on Consumers' Intention to Use Social Commerce , 2012 .
[12] B. A. Stead,et al. Ethical Issues in Electronic Commerce , 2001 .
[13] Detmar W. Straub,et al. Inexperience and experience with online stores: the importance of TAM and trust , 2003, IEEE Trans. Engineering Management.
[14] Joanne E. Hale,et al. Examining the Rationality of Location Data Disclosure through Mobile Devices , 2012, ICIS.
[15] Shu-Sheng Liaw,et al. An investigation of user attitudes toward search engines as an information retrieval tool , 2003, Comput. Hum. Behav..
[16] Natasha F. Veltri,et al. Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[17] Detmar W. Straub,et al. Diffusing the Internet in the Arab world: the role of social norms and technological culturation , 2003, IEEE Trans. Engineering Management.
[18] Md. Moniruzzaman,et al. Redeem with privacy (RWP): privacy protecting framework for geo-social commerce , 2013, WPES.
[19] Mary Beth Rosson,et al. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..
[20] Judy Chuan-Chuan Lin,et al. Antecedents and consequences of trust in online product recommendation: An empirical study in social shopping , 2010, Online Inf. Rev..
[21] Oliver Günther,et al. Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture , 2012, WI 2012.
[22] Jorge Gonçalves,et al. Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours , 2011, INTERACT.
[23] Tao Zhou,et al. Exploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory , 2009, Comput. Hum. Behav..
[24] Rathindra Sarathy,et al. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..
[25] Pei-Lee Teh,et al. MOA and TRA in social commerce: An integrated model , 2011, 2011 IEEE International Conference on Industrial Engineering and Engineering Management.
[26] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[27] Mary Beth Rosson,et al. Measuring Mobile Users' Concerns for Information Privacy , 2012, ICIS.
[28] Youcef Baghdadi,et al. From E-commerce to Social Commerce: A Framework to Guide Enabling Cloud Computing , 2013, J. Theor. Appl. Electron. Commer. Res..
[29] Alessandro Acquisti,et al. Do data breach disclosure laws reduce identity theft?: Do Data Breach Disclosure Laws Reduce Identity Theft? , 2011 .
[30] L. Furby. Possession in humans: An exploratory study of its meaning and motivation. , 1978 .
[31] Helen Kelley,et al. Research Commentary - Generalizability of Information Systems Research Using Student Subjects - A Reflection on Our Practices and Recommendations for Future Research , 2012, Inf. Syst. Res..
[32] Mark R. Brown,et al. Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..
[33] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[34] Jaideep Srivastava,et al. Impact of social influence in e-commerce decision making , 2007, ICEC.
[35] J. L. Pierce,et al. Psychological ownership and feelings of possession: three field studies predicting employee attitudes and organizational citizenship behavior , 2004 .
[36] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[37] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[38] Chin-Lung Hsu,et al. Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation , 2008, Inf. Manag..
[39] B. Kamleitner,et al. Mental Ownership As Important Imagery Content , 2009 .
[40] Hans van der Heijden,et al. Factors influencing the usage of websites: the case of a generic portal in The Netherlands , 2003, Inf. Manag..
[41] H. Raghav Rao,et al. An Exploration of the Impact of Information Privacy Invasion , 2012, ICIS.
[42] H. Becker,et al. The Use of Vignettes in Survey Research , 1978 .
[43] Ping Zhang,et al. The Evolution of Social Commerce: The People, Management, Technology, and Information Dimensions , 2012, Commun. Assoc. Inf. Syst..
[44] Efraim Turban,et al. Introduction to the Special Issue Social Commerce: A Research Framework for Social Commerce , 2011, Int. J. Electron. Commer..
[45] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[46] David Meyer,et al. The role of perceived enjoyment and social norm in the adoption of technology with network externalities , 2008, Eur. J. Inf. Syst..
[47] Hyunsun Park,et al. Effects of various characteristics of social commerce (s-commerce) on consumers' trust and trust performance , 2013, Int. J. Inf. Manag..
[48] Ernest Beaglehole,et al. Property: A Study in Social Psychology , 2015 .
[49] Elena Kolesnikova,et al. "It Won't Happen To Me!": Self-Disclosure in Online Social Networks , 2009, AMCIS.
[50] J. L. Pierce,et al. The State of Psychological Ownership: Integrating and Extending a Century of Research , 2003 .
[51] David Kirkpatrick,et al. The Facebook Effect: The Inside Story of the Company That Is Connecting the World , 2010 .
[52] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[53] Aaron Smith,et al. Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. , 2010 .
[54] Zhao Huang,et al. From e-commerce to social commerce: A close look at design features , 2013, Electron. Commer. Res. Appl..
[55] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[56] Leonard Reinecke,et al. Avatar Creation and Video Game Enjoyment , 2010, J. Media Psychol. Theor. Methods Appl..
[57] Jeffrey T. Child,et al. Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure , 2009, J. Assoc. Inf. Sci. Technol..
[58] D. Eichel. Beyond Boredom And Anxiety Experiencing Flow In Work And Play , 2016 .
[59] 中井 駿二. The Christian Science Monitor , 1959 .
[60] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[61] Woojin Lee,et al. The Role of Social Media in Promoting Special Events: Acceptance of Facebook ‘Events' , 2010, ENTER.
[62] Sandra Petronio,et al. Translational Research Endeavors and the Practices of Communication Privacy Management , 2007 .
[63] L. Miller,et al. Self-disclosure and liking: a meta-analytic review. , 1994, Psychological bulletin.
[64] Christine Hine,et al. Privacy in the Marketplace , 1998, Inf. Soc..
[65] James Weber,et al. Scenarios in Business Ethics Research: Review, Critical Assessment, and Recommendations , 1992, Business Ethics Quarterly.
[66] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[67] Rui Chen,et al. Self-disclosure at social networking sites: An exploration through relational capitals , 2011, Information Systems Frontiers.
[68] Paul A. Pavlou,et al. Government of the People, By the People: A Look at Trust in eGovernment , 2012, AMCIS.
[69] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[70] Peter A. Rosen,et al. Hedonic Information Systems: Acceptance of Social Networking Websites , 2006, AMCIS.
[71] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[72] Renata Gonçalves Curty,et al. Social commerce: Looking back and forward , 2011, ASIST.
[73] Dohoon Kim,et al. Under what conditions will social commerce business models survive? , 2013, Electron. Commer. Res. Appl..
[74] Mahmood Hajli. Social Commerce: the Role of Trust , 2012, AMCIS.
[75] David J. Faulds,et al. Social media: The new hybrid element of the promotion mix , 2009 .
[76] Qinghua Zhu,et al. Understanding the niche strategies adopted by social commerce websites , 2012, 2012 International Conference on Information Management, Innovation Management and Industrial Engineering.
[77] Sarah Spiekermann,et al. E-Privacy: Evaluating a New Search Cost in Online Environments , 2001, Bled eConference.
[78] T. Cook,et al. Quasi-experimentation: Design & analysis issues for field settings , 1979 .
[79] Bernard J. Jansen,et al. Classifying ecommerce information sharing behaviour by youths on social networking sites , 2011, J. Inf. Sci..
[80] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[81] Dianna Lynn Stone. The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes , 1981 .
[82] Hans-Dieter Zimmermann,et al. Social commerce research: An integrated view , 2013, Electron. Commer. Res. Appl..
[83] Hock-Hai Teo,et al. Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.
[84] Bo Han,et al. User's Willingness to Pay on Social Network Sites , 2011, J. Comput. Inf. Syst..
[85] Debra Lauterbach,et al. It's not that i don't have problems, i'm just not putting them on facebook: challenges and opportunities in using online social networks for health , 2011, CSCW.
[86] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[87] Trevor T. Moores,et al. Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..
[88] Celeste See Pui Ng. Intention to purchase on social commerce websites across cultures: A cross-regional study , 2013, Inf. Manag..
[89] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[90] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[91] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[92] Sandra Petronio,et al. Communication Privacy Management Theory: Significance for Interpersonal Communication , 2008 .
[93] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[94] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[95] Kai Lung Hui,et al. Disclosure : Motivators and Measurements , 2006 .
[96] Hock-Hai Teo,et al. The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..
[97] Kelly J. Murphy,et al. Differentiation of states and causes of apathy. , 2000 .
[98] Alexandra J. Campbell. Relationship marketing in consumer markets , 1997 .
[99] Rex B. Kline,et al. Principles and Practice of Structural Equation Modeling , 1998 .
[100] Burcu Bulgurcu. Understanding the information privacy-related perceptions and behaviors of an online social network user , 2012 .
[101] Viswanath Venkatesh,et al. User Acceptance Enablers in Individual Decision Making About Technology: Toward an Integrated Model , 2002, Decis. Sci..
[102] Detmar W. Straub,et al. Validating Instruments in MIS Research , 1989, MIS Q..
[103] Rathindra Sarathy,et al. Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..
[104] Yong Liu,et al. Exploring the impact of use context on mobile hedonic services adoption: An empirical study on mobile gaming in China , 2011, Comput. Hum. Behav..
[105] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[106] Deb Sledgianowski,et al. Social Network Sites: Antecedents of User Adoption and Usage , 2008, AMCIS.
[107] M. Angela Sasse,et al. Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application , 2012, WEIS.
[108] Yunjin Cho,et al. The Effect of Characteristics in Fashion Social Commerce Sites and SNS Subjective Norm on Consumer Attitudes towards Social Commerce and Purchase Intention of Fashion Products , 2012 .
[109] Min-Sook Park,et al. Social networking atmosphere and online retailing , 2014 .
[110] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[111] Young-Gul Kim,et al. Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..
[112] H. Dittmar. The social psychology of material possessions: To have is to be , 1992 .
[113] R. Frank Falk,et al. A Primer for Soft Modeling , 1992 .
[114] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[115] M. Griffiths,et al. Online Social Networking and Addiction—A Review of the Psychological Literature , 2011, International journal of environmental research and public health.
[116] G. DeSanctis,et al. The Impact of a Structured-Argument Approach on Group Problem Formulation* , 1995 .
[117] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[118] Huatong Sun,et al. Designing for Social Commerce Experience as Cultural Consumption , 2011, HCI.
[119] R. Hyman. Quasi-Experimentation: Design and Analysis Issues for Field Settings (Book) , 1982 .
[120] Wynne W. Chin,et al. Adoption intention in GSS: relative importance of beliefs , 1995, DATB.