Two faces of narcissism on SNS: The distinct effects of vulnerable and grandiose narcissism on SNS privacy control
暂无分享,去创建一个
[1] J. Stevens. Applied Multivariate Statistics for the Social Sciences , 1986 .
[2] Tracii Ryan,et al. Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage , 2011, Comput. Hum. Behav..
[3] Brittany Gentile,et al. Grandiose and vulnerable narcissism: a nomological network analysis. , 2011, Journal of personality.
[4] Shawn M. Bergman,et al. Twitter versus Facebook: Exploring the role of narcissism in the motives and usage of different social media platforms , 2014, Comput. Hum. Behav..
[5] O. Kernberg. Borderline conditions and pathological Narcism, New York (Jason Aronson) 1975. , 1975 .
[6] Chang Liu,et al. Raising a Red Flag on Global WWW Privacy Policies , 2002, J. Comput. Inf. Syst..
[7] R. Gonzalez. Applied Multivariate Statistics for the Social Sciences , 2003 .
[8] John P. Robinson,et al. Measures Of Personality And Social Psychological Attitudes , 1991 .
[9] P. Valkenburg,et al. An experimental test of processes underlying self-disclosure in computer-mediated communication , 2009 .
[10] Melinda Korzaan,et al. The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions , 2008, J. Comput. Inf. Syst..
[11] Eileen Wood,et al. All about me: Disclosure in online social networking profiles: The case of FACEBOOK , 2010, Comput. Hum. Behav..
[12] Adam N. Joinson,et al. Looking at, looking up or keeping up with people?: motives and use of facebook , 2008, CHI.
[13] J. Cheek,et al. Assessing hypersensitive narcissism: A reexamination of Murray's Narcism Scale. , 1997 .
[14] J. Stevens,et al. Applied multivariate statistics for the social sciences, 4th ed. , 2002 .
[15] Else Ronningstam,et al. Narcissistic personality disorder: Facing DSM-V. , 2009 .
[16] Christopher J. Carpenter,et al. Narcissism on Facebook: Self-promotional and anti-social behavior , 2012 .
[17] Nicholas David Bowman,et al. How demanding is social media: Understanding social media diets as a function of perceived costs and benefits - A rational actor perspective , 2012, Comput. Hum. Behav..
[18] Aakash Taneja,et al. Rationality-based beliefs affecting individual's attitude and intention to use privacy controls on Facebook: An empirical investigation , 2014, Comput. Hum. Behav..
[19] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[20] N Rathvon,et al. An MMPI-2 portrait of narcissism. , 1996, Journal of personality assessment.
[21] Soraya Mehdizadeh,et al. Self-Presentation 2.0: Narcissism and Self-Esteem on Facebook , 2010, Cyberpsychology Behav. Soc. Netw..
[22] A. Pincus,et al. Interpersonal analysis of grandiose and vulnerable narcissism. , 2003, Journal of personality disorders.
[23] M. Rosenberg. Society and the adolescent self-image , 1966 .
[24] A. Czarna,et al. The effects of vulnerable and grandiose narcissism on liking-based and disliking-based centrality in social networks , 2014 .
[25] W. K. Campbell,et al. Narcissism and romantic attraction: Evidence from a collectivistic culture ☆ , 2007 .
[26] Satyanarayana Parayitam,et al. Computer attitude as a moderator in the relationship between computer anxiety, satisfaction, and stress , 2010, Comput. Hum. Behav..
[27] Lisa Singh,et al. Can Friends Be Trusted? Exploring Privacy in Online Social Networks , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[28] Feng-Yang Kuo,et al. The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy , 2003 .
[29] D. Boyd. Facebook's Privacy Trainwreck , 2008 .
[30] S. Utz,et al. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms , 2009 .
[31] Charlie C. Chen,et al. Online privacy control via anonymity and pseudonym: Cross-cultural implications , 2008, Behav. Inf. Technol..
[32] B. Priel,et al. grAndiose nArcissism versus vulnerAble nArcissism in threAtening situAtions: emotionAl reActions to Achievement FAilure And interPersonAl rejection , 2010 .
[33] D. J. Lee. Society and the Adolescent Self-Image , 1969 .
[34] Otto F. Kernberg,et al. Borderline Conditions and Pathological Narcissism , 1975 .
[35] Ann M. Torres,et al. Social networking and online privacy: Facebook users' perceptions , 2012 .
[36] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[37] Magid Igbaria,et al. An Examination of Gender Differences in the Determinants of Computer Anxiety and Attitudes Toward Microcomputers Among Managers , 1990, Int. J. Man Mach. Stud..
[38] K. Pauwels,et al. Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .
[39] D. Goh,et al. Narcissism, extraversion and adolescents' self-presentation on Facebook. , 2011 .
[40] Shawn M. Bergman,et al. Millennials, narcissism, and social networking: What narcissists do on social networking sites and why , 2011 .
[41] P. Wink,et al. Two faces of narcissism. , 1991, Journal of personality and social psychology.
[42] Laura E. Buffardi,et al. Narcissism and Social Networking Web Sites , 2008, Personality & social psychology bulletin.
[43] Emily Christofides,et al. Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..
[44] W. K. Campbell,et al. Comparing clinical and social-personality conceptualizations of narcissism. , 2008, Journal of personality.
[45] L. Sebastian. The Emerging Self: A Developmental, Self and Object Relations Approach to the Treatment of the Closet Narcissistic Disorder of the Self , 1994 .
[46] Laura E. Buffardi,et al. Narcissism and implicit attention seeking: Evidence from linguistic analyses of social networking and online presentation , 2011 .
[47] Henk G. Schmidt,et al. Computer experience and computer anxiety , 2003, Comput. Hum. Behav..
[48] J. Tomaka,et al. Measures of self-esteem. , 1991 .
[49] D. Whitten,et al. The Chief Information Security Officer: An Analysis of the Skills Required for Success , 2008, J. Comput. Inf. Syst..
[50] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[52] Louis Leung,et al. Generational differences in content generation in social media: The roles of the gratifications sought and of narcissism , 2013, Comput. Hum. Behav..
[53] D. Ames,et al. The NPI-16 as a short measure of narcissism , 2006 .