Privacy, Trust, and Manipulation in Online Relationships
暂无分享,去创建一个
[1] Sulin Ba,et al. Establishing Online Trust Through a Community Responsibility System , 2001, Decis. Support Syst..
[2] I. Altman,et al. Social penetration: The development of interpersonal relationships , 1973 .
[3] Sonja Utz,et al. Self-disclosure on SNS: Do disclosure intimacy and narrativity influence interpersonal closeness and social attraction? , 2017, Comput. Hum. Behav..
[4] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[5] Daniel J. Solove,et al. Risk and Anxiety: A Theory of Data Breach Harms , 2016 .
[6] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[7] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[8] Youngme Moon. Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .
[9] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[10] Esma Aïmeur,et al. A Privacy Awareness System for Facebook Users , 2012 .
[11] Herbert C. Kelman,et al. Manipulation of Human Behavior: An Ethical Dilemma for the Social Scientist* , 1965 .
[12] Pauline Ratnasingam,et al. Trust in inter-organizational exchanges: a case study in business to business electronic commerce , 2005, Decis. Support Syst..
[13] Jan H. P. Eloff,et al. Cyber-security: Identity deception detection on social media platforms , 2018, Comput. Secur..
[14] Relationship Formation , 2014, Encyclopedia of Social Network Analysis and Mining.
[15] Sol Levine,et al. Exchange as a Conceptual Framework for the Study of Interorganizational Relationships , 1961 .
[16] Armin Falk,et al. A Theory of Reciprocity , 2001, Games Econ. Behav..
[17] Gilles Brassard,et al. CLiKC: A Privacy-Mindful Approach When Sharing Data , 2016, CRiSIS.
[18] Mehrdad Koohikamali,et al. Beyond self-disclosure: Disclosure of information about others in social network sites , 2017, Comput. Hum. Behav..
[19] Eric T. G. Wang,et al. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..
[20] Jeffrey T. Hancock,et al. From Perception to Behavior , 2013, Commun. Res..
[21] Peter M. Bentler,et al. Structural Equation Modeling , 2003 .
[22] Esma Aïmeur,et al. Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[23] G. Hancock,et al. EDUCATIONAL AND PSYCHOLOGICAL MEASUREMENT HANCOCK AND FREEMAN POWER AND SAMPLE SIZE FOR THE ROOT MEAN SQUARE ERROR OF APPROXIMATION TEST OF NOT CLOSE FIT IN STRUCTURAL EQUATION MODELING , 2001 .
[24] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[25] A. Satorra,et al. A scaled difference chi-square test statistic for moment structure analysis , 1999 .
[26] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[27] Jacob Cohen,et al. Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .
[28] P. Cozby. Self-disclosure: a literature review. , 1973, Psychological bulletin.
[29] Natalie C. Ebner,et al. Uncovering Susceptibility Risk to Online Deception in Aging. , 2020, The journals of gerontology. Series B, Psychological sciences and social sciences.
[30] John P. Caughlin,et al. Deception in online dating: Significance and implications for the first offline date , 2018, New Media Soc..
[31] Rob Grace,et al. Challenges in the use of social media data for the next generation analyst , 2015, Commercial + Scientific Sensing and Imaging.
[32] B. Cornwell,et al. Love on the Internet: involvement and misrepresentation in romantic relationships in cyberspace vs. realspace , 2001, Comput. Hum. Behav..
[33] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[34] Chun-Ming Chang,et al. Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..
[35] Laura Stein,et al. New Global Media and Communication Policy: The Role of the State in the Twenty-First Century , 2002 .
[36] Rachel A. Elphinston,et al. Time to Face It! Facebook Intrusion and the Implications for Romantic Jealousy and Relationship Satisfaction , 2011, Cyberpsychology Behav. Soc. Netw..
[37] Jesse Fox,et al. Relational dialectics and social networking sites: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution , 2014, Comput. Hum. Behav..
[38] I. Altman,et al. Interpersonal exchange as a function of rewards and costs and situational factors: Expectancy confirmation-disconfirmation. , 1969 .
[39] Aniket Kittur,et al. Crowdsourcing user studies with Mechanical Turk , 2008, CHI.
[41] M. Clyne,et al. The kids are alright , 2013, Nature Reviews Urology.
[42] Christian Coons,et al. Manipulation: Theory and Practice , 2014 .
[43] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[44] I. Altman,et al. Intimacy-Scaled Stimuli for Use in Studies of Interpersonal Relations , 1966, Psychological reports.
[45] Esma Aïmeur,et al. Data privacy: An end-user perspective , 2013 .
[46] A. Maslow. A Theory of Human Motivation , 1943 .
[47] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[48] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[49] B. Sockman,et al. An Exploratory Study of Cyberbullying with Undergraduate University Students. , 2011 .
[50] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[51] Russell L. Purvis,et al. Trust-building mechanisms utilized in outsourced IS development projects: a case study , 2004, Inf. Manag..
[52] Esma Aïmeur,et al. When changing the look of privacy policies affects user trust: An experimental study , 2016, Comput. Hum. Behav..
[54] Soo Yun Shin,et al. Self-disclosure and liking in computer-mediated communication , 2017, Comput. Hum. Behav..
[55] E. Zurbriggen,et al. Negotiating privacy and intimacy on social media: Review and recommendations. , 2016 .
[56] Sherali Zeadally,et al. Online deception in social media , 2014, Commun. ACM.
[57] S. Jourard,et al. Some factors in self-disclosure. , 1958, Journal of abnormal psychology.
[58] Chris Fullwood,et al. Up-Dating: Ratings of Perceived Dating Success Are Better Online than Offline , 2018, Cyberpsychology Behav. Soc. Netw..
[59] Tanupriya Choudhury,et al. Detection of Fake Profile in Online Social Networks Using Machine Learning , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).
[60] Beth Rajan Sockman and Steven Koehn Carol M. Walker. An Exploratory Study of Cyberbullying with Undergraduate University Students , 2011 .
[61] Richard W. Bloom,et al. Foundations of Psychological Profiling: Terrorism, Espionage, and Deception , 2013 .
[62] P. Bentler,et al. Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .
[63] Xiao Ma,et al. Anonymity, Intimacy and Self-Disclosure in Social Media , 2016, CHI.
[64] Katelyn Y. A. McKenna,et al. Relationship formation on the Internet: What's the big attraction? , 2002 .
[65] Emily Christofides,et al. Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..
[66] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..