Privacy concerns for mobile app download: An elaboration likelihood model perspective
暂无分享,去创建一个
Jie Gu | Yunjie Calvin Xu | Cheng Zhang | Heng Xu | Hong Ling | Heng Xu | Y. Xu | Hong Ling | Jie Gu | Cheng Zhang
[1] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[2] Tao Zhou,et al. Understanding users' initial trust in mobile banking: An elaboration likelihood perspective , 2012, Comput. Hum. Behav..
[3] Yunjie Calvin Xu,et al. Relevance judgments of mobile commercial information , 2014, J. Assoc. Inf. Sci. Technol..
[4] Matthew L. Jensen,et al. Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers , 2012, J. Assoc. Inf. Sci. Technol..
[5] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[6] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[7] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[8] Jeremy Clark,et al. Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.
[9] Anol Bhattacherjee,et al. Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..
[10] C. Farn,et al. Investigating Initial Trust Toward E-tailers from the Elaboration Likelihood Model Perspective , 2006 .
[11] James B. Wilcox,et al. The persuasive impact of reported group opinions on individuals low vs. high in need for cognition: Rationalization vs. biased elaboration? , 2000 .
[12] Hock-Hai Teo,et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..
[13] Rebeca San José-Cabezudo,et al. The Combined Influence of Central and Peripheral Routes in the Online Persuasion Process , 2009, Cyberpsychology Behav. Soc. Netw..
[14] Deborah J. MacInnis,et al. Focal and emotional integration: Constructs, measures, and preliminary evidence , 1993 .
[15] Rathindra Sarathy,et al. Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..
[16] Andrew J. Rohm,et al. Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .
[17] J. Cacioppo,et al. Central and Peripheral Routes to Advertising Effectiveness: The Moderating Role of Involvement , 1983 .
[18] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[19] Kai Lung Hui,et al. Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits , 2004, ICIS.
[20] Rathindra Sarathy,et al. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..
[21] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[22] Bin Gu,et al. Informational Cascades and Software Adoption on the Internet: An Empirical Investigation , 2008, MIS Q..
[23] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[24] Jörg Henseler,et al. Testing Moderating Effects in PLS Path Models. An Illustration of Available Procedures , 2005 .
[25] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[26] Ingoo Han,et al. The Effect of On-Line Consumer Reviews on Consumer Purchasing Intention: The Moderating Role of Involvement , 2007, Int. J. Electron. Commer..
[27] David Gefen,et al. The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.
[28] David A. Wagner,et al. How to Ask for Permission , 2012, HotSec.
[29] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[30] Peter Buxmann,et al. Will You Accept an App? Empirical Investigation of the Decisional Calculus Behind the Adoption of Applications on Facebook , 2013, ICIS.
[31] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[32] David J. Ketchen,et al. AN ASSESSMENT OF THE USE OF STRUCTURAL EQUATION MODELING IN STRATEGIC MANAGEMENT RESEARCH , 2004 .
[33] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[34] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[35] Heng Xu,et al. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..
[36] J. Cacioppo,et al. Personal involvement as a determinant of argument based persuasion , 1981 .
[37] Vishal Midha,et al. Impact of consumer empowerment on online trust: An examination across genders , 2012, Decis. Support Syst..
[38] S. Chaiken,et al. Promoting systematic processing in low-motivation settings: effect of incongruent information on processing and judgment. , 1991, Journal of personality and social psychology.
[39] Richard E. Petty,et al. Increasing the Effectiveness of Communications to Consumers: Recommendations Based on Elaboration Likelihood and Attitude Certainty Perspectives , 2006 .
[40] Elena Kolesnikova,et al. "It Won't Happen To Me!": Self-Disclosure in Online Social Networks , 2009, AMCIS.
[41] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[42] Janine L. Spears. The Effects of Notice versus Awareness: An Empirical Examination of an Online Consumer's Privacy Risk Treatment , 2013, 2013 46th Hawaii International Conference on System Sciences.
[43] Paul L. Sauer,et al. The combined influence hypothesis: Central and peripheral antecedents of attitude toward the ad , 1995 .
[44] Hock-Hai Teo,et al. Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..
[45] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[46] John Zimmerman,et al. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.
[47] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[48] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[49] David Gefen,et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..
[50] Traci Carte,et al. In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..
[51] J. Cacioppo,et al. Issue involvement can increase or decrease persuasion by enhancing message-relevant cognitive responses. , 1979 .
[52] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[53] H. Becker,et al. The Use of Vignettes in Survey Research , 1978 .