Do privacy concerns determine online information disclosure? The case of internet addiction
暂无分享,去创建一个
[1] Stephen Flowerday,et al. Why don't UK citizens protest against privacy-invading dragnet surveillance? , 2016, Information and Computer Security.
[2] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[3] M. Griffiths,et al. Internet Gambling: An Online Empirical Study Among Student Gamblers , 2008, International Journal of Mental Health and Addiction.
[4] Natasha F. Veltri,et al. AIS Electronic Library (AISeL) , 2022 .
[5] Cory R. A. Hallam,et al. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards , 2017, Comput. Hum. Behav..
[6] William T. Ross,et al. Social Contracts and Marketing Ethics , 1999 .
[7] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[8] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[9] T. McGill,et al. Privacy Concerns and Acceptance of Government Surveillance in Australia , 2018, ACIS.
[10] Nik Thompson,et al. Cultural factors and the role of privacy concerns in acceptance of government surveillance , 2020, J. Assoc. Inf. Sci. Technol..
[11] M AladwaniAdel,et al. Understanding compulsive social media use , 2016 .
[12] Bernard C. Y. Tan,et al. A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..
[13] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[14] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .
[15] R. A. Davis,et al. A cognitive-behavioral model of pathological Internet use , 2001, Comput. Hum. Behav..
[16] L. Hadlington. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours , 2017, Heliyon.
[17] Edgar Erdfelder,et al. G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.
[18] Richard A. Davis,et al. Validation of a New Scale for Measuring Problematic Internet Use: Implications for Pre-employment Screening , 2002, Cyberpsychology Behav. Soc. Netw..
[19] C. Holahan,et al. Stress generation, avoidance coping, and depressive symptoms: a 10-year model. , 2005, Journal of consulting and clinical psychology.
[20] Tanya J. McGill,et al. Old risks, new challenges: exploring differences in security between home computer and mobile device use , 2017, Behav. Inf. Technol..
[21] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[22] C. Fornell,et al. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error , 1981 .
[23] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[24] Monideepa Tarafdar,et al. The dark side of information technology , 2015 .
[25] Stefano Taddei,et al. Surfing on Social Network Sites: A comprehensive instrument to evaluate online self-disclosure and related attitudes , 2015, Comput. Hum. Behav..
[26] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[27] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[28] Charles J. Kacmar,et al. The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..
[29] Hans van der Heijden,et al. User Acceptance of Hedonic Information Systems , 2004, MIS Q..
[30] Kimberly Young,et al. Internet Addiction: The Emergence of a New Clinical Disorder , 1998, Cyberpsychology Behav. Soc. Netw..
[31] Adel M. Aladwani,et al. Understanding compulsive social media use: The premise of complementing self-conceptions mismatch with technology , 2016, Comput. Hum. Behav..
[32] Zhenhui Jiang,et al. Research Note - Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions , 2013, Inf. Syst. Res..
[33] Ibrahim M. Al-Jabri,et al. The willingness to disclose personal information , 2020, Inf. Comput. Secur..
[34] Rossouw von Solms,et al. Information security awareness: educating your users effectively , 1998, Inf. Manag. Comput. Secur..
[35] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[36] Spyros Kokolakis,et al. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..
[37] Alexander Winkler,et al. Send Orders of Reprints at Reprints@benthamscience.org Internet Addiction: a Brief Summary of Research and Practice , 2022 .