|
Ackerman, M.S. & Mainwaring S.D. (2005) Privacy issues and human-computer interaction. Garfinkel S, Cranor L, eds. Security and Usability: Designing Secure Systems That People Can Use (O’Reilly, Sebastopol, CA), 381–400. Agarwal, R., Sambamurthy, V., and Stair, R. M. (2000) The Evolving Relationship between General and Specific Computer Self-Efficacy – an Empirical Assessment, Information Systems Research 11(4), 418-430. Ajzen, I. (2002). Perceived behavioral control, self‐efficacy, locus of control, and the theory of planned behavior 1. Journal of applied social psychology, 32(4), 665-683. Altman, I. (1976). A conceptual analysis. Environment and behavior, 8(1), 7-29. Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84(2), 191. Barling, J., & Beattie, R. (1983). Self-efficacy beliefs and sales performance. Journal of Organizational Behavior Management, 5(1), 41-51. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 35(4), 1017-1042. Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313-324. Bunker, M., & Ball, A. D. (2009). Consequences of customer powerlessness: Secondary control. Journal of Consumer Behaviour: An International Research Review, 8(5), 268-283. Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44-57. Campbell, J. E., & Carlson, M. (2002). Panopticon. com: Online surveillance and the commodification of privacy. Journal of Broadcasting & Electronic Media, 46(4), 586-606. Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81. Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7-19. Chen, G., Gully, S. M., & Eden, D. (2001). Validation of a new general self-efficacy scale. Organizational research methods, 4(1), 62-83. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336. Chin, W. W., Gopal, A., & Salisbury, W. D. (1997). Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation. Information systems research, 8(4), 342-367. Culnan, M. J. (1993). "How Did They Get My Name?" An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS quarterly, 341-363. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342. DeCew, J. W. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press. Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80. Dinev, T., McConnell, A. R., & Smith, H. J. (2015). Research commentary—informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box. Information Systems Research, 26(4), 639-655. Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389-402. Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of consumer research, 21(1), 119-134. Edison Research. (2019, March 6). The Infinite Dial 2019. Retrieved from https://www.edisonresearch.com/infinite-dial-2019/ Engel, J. F., Blackwell, R. D., & Miniard, P. W. (1995). Consumer behavior, 8th. New York: Dryder. Essau, C. A. (l992). Primary-secondary control and coping. A cross-cultural comparison. Regensburg: Roderer. Facebook Investor Relations. (2019, April 24). Facebook Q1 2019 Earnings. Retrieved from https://investor.fb.com/investor-events/event-details/2019/Facebook-Q1-2019-Earnings/default.aspx Facebook comes under fresh attack for its data-privacy practices. (2019, January). The Economist. Retrieved from https://www.economist.com/business/2019/01/31/facebook-comes-under-fresh-attack-for-its-data-privacy-practices Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century. O'Reilly Media, Inc. Gefen, D., & Pavlou, P. (2006). The moderating role of perceived regulatory effectiveness of online marketplaces on the role of trust and risk on transaction intentions. ICIS 2006 proceedings, 81. Goodwin, C. (1991). Privacy: Recognition of a consumer right. Journal of Public Policy & Marketing, 10(1), 149-166. Hall, N. C., Perry, R. P., Ruthig, J. C., Hladkyj, S., & Chipperfield, J. G. (2006). Primary and Secondary Control in Achievement Settings: A Longitudinal Field Study of Academic Motivation, Emotions, and Performance 1. Journal of Applied Social Psychology, 36(6), 1430-1470. Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13-42. Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management science, 40(4), 440-465. Hirschman, A. O. (1970). Exit, voice, and loyalty: Responses to decline in firms, organizations, and states (Vol. 25). Harvard university press. Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electronic commerce research and applications, 9(1), 50-60. Hofstede, G. (1984). Culture's consequences: International differences in work-related values (Vol. 5). sage. Hofstede, G. (1991). Cultures and organizations. Intercultural cooperation and its importance for survival. Software of the mind. London: Mc Iraw-Hill. Johnson, C. A. (1974). Privacy as personal control. Man-Environment Interactions: Evaluations and Applications: Part, 2, 83-100. Karahanna E, (2018) The Needs–Affordances–Features Perspective for the Use of Social Media. MIS Quarterly. 42(3), 737-756 Kay, A. C., Gaucher, D., Napier, J. L., Callan, M. J., & Laurin, K. (2008). God and the government: testing a compensatory control mechanism for the support of external systems. Journal of personality and social psychology, 95(1), 18. Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109-125. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42. Lester, T. (2001). The reinvention of privacy. The Atlantic Monthly, 287(3), 27-39. Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200. Margulis, S. T. (2003). Privacy as a social issue and behavioral concept. Journal of social issues, 59(2), 243-261. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355. Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of interactive marketing, 18(3), 15-29. Milne, G. R., & Rohm, A. J. (2000). Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives. Journal of Public Policy & Marketing, 19(2), 238-249. Miltgen, C.L., Peyrat-Guillard, D. (2014) Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Europe Journal of Information Systems, 23(2), 103-125. Osatuyi, B. (2015). Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms. Computers in Human Behavior, 49, 324-332. Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International journal of electronic commerce, 7(3), 101-134. Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS quarterly, 977-988. Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41. Rothbaum, F., Weisz, J. R., & Snyder, S. S. (1982). Changing the world and changing the self: A two-process model of perceived control. Journal of Personality and Social Psychology, 42(1), 5-37. Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428-438. doi:10.1016/j.intcom.2010.05.001 Schoeman, F. D. (Ed.). (1984). Philosophical dimensions of privacy: An anthology. Cambridge University Press. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals Concerns about Organizational Practices. MIS Quarterly. 20(2), 167-196. Smith, Dinev, & Xu. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989-1016 Son, J. Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS quarterly, 503-529. Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information systems research, 13(1), 36-49. Tangsrud Jr, R., & Smith, M. C. (2000). Control-related motivations, capabilities, and preferences among patients: The roles of primary and secondary control in older adulthood. Journal of Business Research, 48(3), 259-266. Tyler, T. R., & Cook, F. L. (1984). The mass media and judgments of risk: Distinguishing impact on personal and societal level judgments. Journal of Personality and Social Psychology, 47(4), 693. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, 425-478. Warren, S. D., & Brandeis, L. D. (1890). Right to privacy. Harvard. Law Review, 4, 193-220 Whitley, E. A. (2009). Informational privacy, consent and the “control” of personal data. Information security technical report, 14(3), 154-159. Wisniewski, P., Knijnenburg, B. P., & Lipford, H. R. (2014, July). Profiling facebook users privacy behaviors. In SOUPS2014 Workshop on Privacy Personas and Segmentation. Xu, H., Teo, H., Tan, B. C., & Agarwal, R. (2009). The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.” Journal of Management Information Systems, 26(3), 137-176. Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2012). Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research, 23(4), 1342-1363. Yoo, B., Donthu, N., & Lenartowicz, T. (2011). Measuring Hofstede's five dimensions of cultural values at the individual level: Development and validation of CVSCALE. Journal of International Consumer Marketing, 23(3-4), 193-210. Zweig, D., & Webster, J. (2002). Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 23(5), 605-633.
|