Behaviors, adverse events, and dispositions: An empirical study of online discretion and information control
暂无分享,去创建一个
[1] K. Cook,et al. Cooperation Without Trust , 2005 .
[2] J. Speake,et al. The Oxford dictionary of proverbs , 2004 .
[3] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[4] Kallol Kumar Bagchi,et al. An Analysis of the Growth of Computer and Internet Security Breaches , 2003, Commun. Assoc. Inf. Syst..
[5] Toshio Yamagishi,et al. Trust as a form of social intelligence. , 2001 .
[6] Mark R. Brown,et al. Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..
[7] K. Cook,et al. Trust Building via Risk Taking: A Cross-Societal Experiment , 2005 .
[8] Detmar W. Straub,et al. Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..
[9] Lee S. Strickland,et al. Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..
[10] Brock Read,et al. Think before You Share. , 2006 .
[11] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[12] S. Gordon. Interpersonal trust, vigilance and social networks roles in the process of entrepreneurial opportunity recognition , 2007 .
[13] K. Witte. Putting the fear back into fear appeals: The extended parallel process model , 1992 .
[14] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[15] R. Hardin. Trust and Trustworthiness , 2002 .
[16] T. Yamagishi,et al. Trust and commitment in the United States and Japan , 1994 .
[17] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[18] S. Turkle. Life on the Screen , 1995 .
[19] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[20] B. J. Fogg,et al. Prominence-interpretation theory: explaining how people assess credibility online , 2003, CHI Extended Abstracts.
[21] Katelyn Y. A. McKenna,et al. The internet and social life. , 2004, Annual review of psychology.
[22] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[23] William A. Wallace,et al. Trust in digital information , 2008, J. Assoc. Inf. Sci. Technol..
[24] John M. Collins,et al. Military Strategy: Principles, Practices, and Historical Perspectives , 2001 .
[25] Han Yi,et al. Trust and e-commerce: a study of consumer perceptions , 2003, Electron. Commer. Res. Appl..
[26] Batya Friedman,et al. Trust online , 2000, CACM.
[27] L. Toledo-Pereyra. Trust , 2006, Mediation Behaviour.
[28] M. Gilly,et al. Shopping Online for Freedom, Control, and Fun , 2001 .
[29] Dhruv Grewal,et al. Internet retailing: enablers, limiters and market consequences , 2004 .
[30] Jennifer Preece,et al. Etiquette online: from nice to necessary , 2004, CACM.
[31] Coye Cheshire,et al. The Role of Trust in Online Relationship Formation , 2010 .
[32] Raymond R. Burke. Technology and the customer interface: What consumers want in the physical and virtual store , 2002 .
[33] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[34] Z. Sardar. alt.civilizations.faq cyberspace as the darker side of the West , 1995 .
[35] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[36] Christy M. K. Cheung,et al. Understanding consumer trust in Internet shopping: A multidisciplinary approach , 2006 .
[37] C. Pollard,et al. Center for the Study of Language and Information , 2022 .
[38] Kuanchin Chen,et al. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..
[39] Matthew K. O. Lee,et al. A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..
[40] H. Jolly. The role of the media. , 1978, Postgraduate medical journal.
[41] Motoko Kosugi,et al. Trust, Gullibility, and Social Intelligence , 1999 .
[42] Ellen Garbarino,et al. GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .
[43] M. Birnbaum. Human research and data collection via the internet. , 2004, Annual review of psychology.
[44] Gill Valentine,et al. On-line Dangers?: Geographies of Parents’ Fears for Children's Safety in Cyberspace , 2001 .
[45] Alexandra Gerbasi,et al. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives , 2010 .
[46] Robert LaRose,et al. Promoting personal responsibility for internet safety , 2008, CACM.
[47] A. Stinchcombe. Cooperation Without Trust , 2006 .
[48] John P. Robinson,et al. Social Implications of the Internet , 2001 .
[49] J. Horrigan,et al. Trust and privacy online: Why Americans want to rewrite the rules , 2000 .
[50] Coye Cheshire,et al. The Emergence of Trust Networks under Uncertainty – Implications for Internet Interactions , 2004 .
[51] Byoungsoo Kim,et al. The role of trust belief and its antecedents in a community-driven knowledge environment , 2009 .
[52] D. Hindman. The Virtual Community: Homesteading on the Electronic Frontier , 1996 .
[53] Henry H. Emurian,et al. An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..
[54] S. Kiesler,et al. “Social” human-computer interaction , 1997 .
[55] P. Lunt,et al. Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control , 2004 .
[56] Helen Nissenbaum,et al. Will Security Enhance Trust Online, or Supplant It? , 2004 .