Information disclosure on social networking sites: An intrinsic–extrinsic motivation perspective
Tóm tắt
Từ khóa
Tài liệu tham khảo
Acquisti, A., John, L., & Loewenstein, G. (2009). What is privacy worth?. In Twenty first workshop on information systems and economics (Vol. December). Phoenix, AZ.
Acquisti, 2006, Imagined communities: Awareness, information sharing, and privacy on the Facebook
Ajzen, 1988
Ajzen, 2002, Residual effects of past on later behavior: Habituation and reasoned action perspectives, Personality and Social Psychology Review, 6, 107, 10.1207/S15327957PSPR0602_02
Altman, 1975
Anderson, 1998, Structural equation modeling in practice: A review and recommended two-step approach, Psychological Bulletin, 103, 411, 10.1037/0033-2909.103.3.411
Bagozzi, 2007, The legacy of the technology acceptance model and a proposal for a paradigm shift, Journal of the Association for Information Systems, 8, 244, 10.17705/1jais.00122
Bénabou, 2003, Intrinsic and extrinsic motivation, The Review of Economic Studies, 70, 489, 10.1111/1467-937X.00253
Berridge, 2001, Reward learning: Reinforcement, incentives, and expectations, The Psychology of Learning and Motivation, 40, 223, 10.1016/S0079-7421(00)80022-5
Bhattacherjee, 2000, Acceptance of E-Commerce services: The case of electronic brokerages, Vol. 30, 411
Boyd, 2008, Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, 13, 210, 10.1111/j.1083-6101.2007.00393.x
Charney, 2001, Uses and gratifications of the Internet, 383
Cheung, 2010, A theoretical model of intentional social action in online social networks, Decision Support Systems, 49, 24, 10.1016/j.dss.2009.12.006
Chin, 1998, Issues and opinion on structural equation modeling, MIS Quarterly, 22, vii
Culnan, 1999, Fairness, and impersonal trust: An empirical investigation, Organization Science, 10, 104, 10.1287/orsc.10.1.104
Culnan, 2003, Consumer privacy: Balancing economic and justice considerations, Journal of Social Issues, 59, 323, 10.1111/1540-4560.00067
Dattalo, 2013
Davis, 1989, Perceived usefulness, perceived ease of use and user acceptance of information technology, MIS Quarterly, 13, 319, 10.2307/249008
Debatin, 2009, Facebook and online privacy: Attitudes, behaviors, and unintended consequences, Journal of Computer-Mediated Communication, 15, 83, 10.1111/j.1083-6101.2009.01494.x
Deci, 1975
Dinev, 2006, Privacy calculus model in e-commerce – A study of Italy and the United States, European Journal of Information Systems, 15, 389, 10.1057/palgrave.ejis.3000590
Dinev, 2004, Internet privacy concerns and their antecedents – Measurement validity and a regression model, Behaviour & Information Technology, 23, 413, 10.1080/01449290410001715723
Fishbein, 1975
Fornell, 1981, Evaluating structural equation models with unobservable variables and measurement error, Journal of Marketing Research, 18, 39, 10.2307/3151312
Frey, 1997
Gefen, D., Pavlou, P. A., Rise, G. M., & Warkentin, M. (2002). E-government adoption. In Eighth Americas conference on information systems. Boston, MA.
Gefen, 2000, The relative importance of perceived ease-of-use in IS adoption: A Study of E-Commerce adoption, Journal of the Association for Information Systems, 1, 1, 10.17705/1jais.00008
Goodwin, 1991, Privacy: Recognition of a consumer right, Journal of Public Policy & Marketing, 10, 149, 10.1177/074391569101000111
Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. In.
Hair, 1998
Hann, I. H., Hui, K. L., Lee, T. S., & Png, I. P. L. (2002). Online information privacy: Measuring the costbenefit trade-Off. In Twenty-third annual international conference on information systems (pp. 1–10). Barcelona, Spain.
Horst, 2007, Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of E-Government services in the Netherlands, Computers in Human Behavior, 23, 1838, 10.1016/j.chb.2005.11.003
Hu, 1999, Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives, Structural Equation Modeling, 6, 1, 10.1080/10705519909540118
Hui, 2006, Online information disclosure: Motivators and measurements, ACM Transactions on Internet Technology, 6, 415, 10.1145/1183463.1183467
Hui, 2007, The value of privacy assurance: An exploratory field experiment, MIS Quarterly, 31, 19, 10.2307/25148779
IAR (2007). Survey question types. In (Vol. 2013). The University of Texas at Austin <http://www.utexas.edu/academic/ctl/assessment/iar/teaching/plan/method/survey/survey_tables_questiontypes.pdf>.
Kang, 2010, Understanding the role of an IT artifact in online service continuance: An extended perspective of user satisfaction, Computers in Human Behavior, 26, 353, 10.1016/j.chb.2009.11.006
Katz, 1974, Utilization of mass communication by the individual, 19
Kelman, 1974, Social influence and linkages between the individual and the social system: Further thoughts on the processes of compliance, identification, and internalization, 125
Kenny, D.A. (2012). Multiple latent variable models: Confirmatory factor analysis. In <http://davidakenny.net/cm/mfactor.htm>.
Kim, 2007, Value-based adoption of mobile internet: An empirical investigation, Decision Support Systems, 43, 111, 10.1016/j.dss.2005.05.009
Kim, 2011, Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students, Computers in Human Behavior, 27, 365, 10.1016/j.chb.2010.08.015
Kline, 1998
Korgaonkar, 1999, A multivariate analysis of Web usage, Journal of Advertising Research, 39, 53
Laufer, 1977, Privacy as a concept and a social issue: A multidimensional developmental theory, Journal of Social Issues, 33, 22, 10.1111/j.1540-4560.1977.tb01880.x
Lee, 2009, Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit, Electronic Commerce Research and Applications, 8, 130, 10.1016/j.elerap.2008.11.006
Li, 2010, Understanding situational online information disclosure as a privacy calculus, Journal of Computer Information Systems, 51, 62
Lu, 2005, Personal innovativeness, social influences and adoption of wireless internet services via mobile technology, Journal of Strategic Information Systems, 14, 245, 10.1016/j.jsis.2005.07.003
Milne, 1993, Direct mail privacy-efficiency trade-offs within an implied social contract framework, Journal of Public Policy & Marketing, 12, 206, 10.1177/074391569101200206
Mueller, 1996
Nevitt, 2001, Performance of bootstrapping approaches to model test statistics and parameter standard error estimation in structural equation modeling, Structural Equation Modeling, 8, 353, 10.1207/S15328007SEM0803_2
Nunnaly, 1978
Papacharissi, 2000, Predictors of Internet usage, Journal of Broadcasting and Electronic Media, 44, 175, 10.1207/s15506878jobem4402_2
Park, 2009, Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes, CyberPsychology & Behavior, 12, 729, 10.1089/cpb.2009.0003
Park, 2013, Intensity of social network use by involvement: A study of young Chinese users, International Journal of Business and Management, 8, 22, 10.5539/ijbm.v8n6p22
Pavlou, 2006, Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior, MIS Quarterly, 30, 115, 10.2307/25148720
PewResearch (2013). Teens, social media, and privacy. In (Vol. 2014) <http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/>.
Phelps, 2000, Privacy concerns and consumer willingness to provide personal information, Journal of Public Policy & Marketing, 27, 10.1509/jppm.19.1.27.16941
Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. In IEEE Security and Privacy (pp. 40–49).
Sheehan, 2000, Dimensions of privacy concern among online consumers, Journal of Public Policy & Marketing, 19, 62, 10.1509/jppm.19.1.62.16949
Smith, 1996, Information privacy: Measuring individuals’ concerns about organizational practices, MIS Quarterly, 167, 10.2307/249477
SoJump (2014). Professional survey site. In <http://www.sojump.com/>.
Stone, 1983, A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations, Journal of Applied Psychology, 68, 459, 10.1037/0021-9010.68.3.459
Stutzman, 2011, Factors mediating disclosure in social network sites, Computers in Human Behavior, 27, 590, 10.1016/j.chb.2010.10.017
Šumak, 2011, A meta-analysis of e-learning technology acceptance: The role of user types and E-learning technology types, Computers in Human Behavior, 27, 2067, 10.1016/j.chb.2011.08.005
Torkzadeh, 2003, Confirmatory analysis of computer self-efficacy, Structural Equation Modeling, 10, 263, 10.1207/S15328007SEM1002_6
Tufekci, 2008, Can you see me now? Audience and disclosure regulation in online social network sites, Bulletin of Science, Technology & Society, 28, 20, 10.1177/0270467607311484
Venkatesh, 2000, A theoretical extension of the technology acceptance model: Four longitudinal field studies, Management Science, 46, 186, 10.1287/mnsc.46.2.186.11926
Vroom, 1964
Wright, 2006, Researching Internet-based populations: Advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services, Journal of Computer Mediated Communication, 10, 00, 10.1111/j.1083-6101.2005.tb00259.x
Zhang, 2000, Consumers’ responses to web-based data collection efforts and factors influencing the responses, Journal of International Marketing and Market Research, 25, 115