|
Abrahams, S. L. (2008). Handmade online: The crafting of commerce, aesthetics and community on Etsy. com. THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL. Acquisti, A., & Grossklags, J. (2003). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. Paper presented at the 2nd Annual Workshop on Economics and Information Security-WEIS. Algesheimer, R., Dholakia, U. M., & Herrmann, A. (2005). The social influence of brand community: evidence from European car clubs. Journal of marketing, 69(3), 19-34. Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the web: the impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350-353. Ashforth, B. E., & Mael, F. (1989). Social identity theory and the organization. Academy of management review, 14(1), 20-39. Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94. Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological review, 84(2), 191. Bargh, J. A., McKenna, K. Y., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the “true self” on the Internet. Journal of social issues, 58(1), 33-48. Bergami, M., & Bagozzi, R. P. (2000). Self‐categorization, affective commitment and group self‐esteem as distinct aspects of social identity in the organization. British Journal of Social Psychology, 39(4), 555-577. Berry, L. L., Seiders, K., & Grewal, D. (2002). Understanding service convenience. Journal of marketing, 66(3), 1-17. Bhattacharya, C. B., & Sen, S. (2003). Consumer-company identification: a framework for understanding consumers’ relationships with companies. Journal of marketing, 67(2), 76-88. Brehm, J. W. (1966). A theory of psychological reactance. New York. Chen, G., Gully, S. M., & Eden, D. (2001). Validation of a new general self-efficacy scale. Organizational research methods, 4(1), 62-83. Chen, I. J., & Popovich, K. (2003). Understanding customer relationship management (CRM): People, process and technology. Business process management journal, 9(5), 672-688. Chiu, C.-M., Hsu, M.-H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42(3), 1872-1888. Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS quarterly, 189-211. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342. Cyr, D. (2008). Modeling web site design across cultures: relationships to trust, satisfaction, and e-loyalty. Journal of Management Information Systems, 24(4), 47-72. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003. Dholakia, U. M., Bagozzi, R. P., & Pearo, L. K. (2004). A social influence model of consumer participation in network-and small-group-based virtual communities. International journal of research in marketing, 21(3), 241-263. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. Florencio, D., & Herley, C. (2007). A large-scale study of web password habits. Paper presented at the Proceedings of the 16th international conference on World Wide Web. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50. Gabber, E., Gibbons, P. B., Matias, Y., & Mayer, A. (1997). How to make personalized web browsing simple, secure, and anonymous. Paper presented at the Financial Cryptography. Gabisch, J. A., & Milne, G. R. (2013). Self-disclosure on the web: Rewards, safety cues, and the moderating role of regulatory focus. Journal of Research in Interactive Marketing, 7(2), 140-158. Ganguly, B., Dash, S. B., Cyr, D., & Head, M. (2010). The effects of website design on purchase intention in online shopping: the mediating role of trust and the moderating role of culture. International Journal of Electronic Business, 8(4), 302-330. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS quarterly, 27(1), 51-90. Gilbert, D., Balestrini, P., & Littleboy, D. (2004). Barriers and benefits in the adoption of e-government. International Journal of Public Sector Management, 17(4), 286-301. Harrison McKnight, D., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The Journal of Strategic Information Systems, 11(3), 297-323. Ioinson, A. N., & Paine, C. B. (2007). Self-disclosure, privacy and the Internet. The Oxford handbook of Internet psychology, 2374252. Jiang, Z., Chan, J., Tan, B. C., & Chua, W. S. (2010). Effects of interactivity on website involvement and purchase intention. Journal of the Association for Information Systems, 11(1), 1. Johnson, D. S. (2007). Achieving customer value from electronic channels through identity commitment, calculative commitment, and trust in technology. Journal of interactive marketing, 21(4), 2-22. Joseph, J., Anderson, R., Tatham, R., & Black, W. (1992). Multivariate data analysis with readings: USA. Kiang, M. Y., Raghu, T., & Shang, K. H.-M. (2000). Marketing on the Internet—who can benefit from an online marketing approach? Decision Support Systems, 27(4), 383-393. Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: a longitudinal exploration. Information Systems Research, 20(2), 237-257. Kormann, D. P., & Rubin, A. D. (2000). Risks of the passport single signon protocol. Computer Networks, 33(1), 51-58. Lai, J.-Y., & Chang, C.-Y. (2011). User attitudes toward dedicated e-book readers for reading: The effects of convenience, compatibility and media richness. Online Information Review, 35(4), 558-580. Lin, K.-Y., & Lu, H.-P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, 27(3), 1152-1161. Liu, I.-F., Chen, M. C., Sun, Y. S., Wible, D., & Kuo, C.-H. (2010). Extending the TAM model to explore the factors that affect Intention to Use an Online Learning Community. Computers & Education, 54(2), 600-610. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. Maslow, A. H., Frager, R., Fadiman, J., McReynolds, C., & Cox, R. (1970). Motivation and personality (Vol. 2): Harper & Row New York. Mazaheri, E., Richard, M.-O., & Laroche, M. (2011). Online consumer behavior: Comparing Canadian and Chinese website visitors. Journal of Business Research, 64(9), 958-965. McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research, 13(3), 334-359. Mithas, S., Krishnan, M. S., & Fornell, C. (2005). Why do customer relationship management applications affect customer satisfaction? Journal of marketing, 69(4), 201-209. Montano, D. E., & Kasprzyk, D. (2008). Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior and health education: Theory, research, and practice, 4, 67-95. Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from consumers. Journal of consumer research, 26(4), 323-339. Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. the journal of marketing, 20-38. Nunally, J. C., & Bernstein, I. H. (1978). Psychometric theory: New York: McGraw-Hill. Nysveen, H., & Pedersen, P. (2003). Usefulness and self-expressiveness: extending TAM to explain the adoption of a mobile parking service. BLED 2003 Proceedings, 64. O'Reilly, C. A., & Chatman, J. (1986). Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior. Journal of applied psychology, 71(3), 492. Ong, E. Y., Ang, R. P., Ho, J., Lim, J. C., Goh, D. H., Lee, C. S., & Chua, A. Y. (2011). Narcissism, extraversion and adolescents’ self-presentation on Facebook. Personality and Individual Differences, 50(2), 180-185. Pentina, I., Prybutok, V. R., & Zhang, X. (2008). The role of virtual communities as shopping reference groups. Journal of Electronic Commerce Research, 9(2), 114-136. Pfitzmann, B., & Waidner, B. (2002). Token-based web single signon with enabled clients. IBMResearchReportRZ3458, 93844. Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41. Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412. Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. The Journal of Strategic Information Systems, 11(3), 271-295. Samar, V. (1999). Single sign-on using cookies for Web applications. Paper presented at the Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999.(WET ICE'99) Proceedings. IEEE 8th International Workshops on. Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006). Converting web site visitors into buyers: how web site investment increases consumer trusting beliefs and online purchase intentions. Journal of marketing, 70(2), 133-148. Scott, S. G., & Lane, V. R. (2000). A stakeholder approach to organizational identity. Academy of management review, 25(1), 43-62. Scullin, S. S., Fjermestad, J., & Romano Jr, N. C. (2004). E-relationship marketing: changes in traditional marketing as an outcome of electronic customer relationship management. Journal of Enterprise Information Management, 17(6), 410-415. Seiders, K., Voss, G. B., Godfrey, A. L., & Grewal, D. (2007). SERVCON: development and validation of a multidimensional service convenience scale. Journal of the Academy of Marketing Science, 35(1), 144-156. Shen, A. X., Cheung, C. M., Lee, M. K., & Chen, H. (2011). How social influence affects we-intention to use instant messaging: The moderating effect of usage experience. Information Systems Frontiers, 13(2), 157-169. Shih, D.-H., Hsu, S.-F., Yen, D. C., & Lin, C.-C. (2012). Exploring the Individual's Behavior on Self-Disclosure Online. International Journal of Human-Computer Interaction, 28(10), 627-645. Siau, K., & Shen, Z. (2003). Building customer trust in mobile commerce. Communications of the ACM, 46(4), 91-94. Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: a taxonomy and a nomological model. MIS quarterly, 503-529. Stets, J. E., & Burke, P. J. (2000). Identity theory and social identity theory. Social psychology quarterly, 224-237. Sun, S.-T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., & Beznosov, K. (2011). What makes users refuse web single sign-on?: an empirical investigation of OpenID. Paper presented at the Proceedings of the Seventh Symposium on Usable Privacy and Security. Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., & Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81-101. Taylor, D. G., Strutton, D., & Thompson, K. (2012). Self-enhancement as a motivation for sharing online advertising. Journal of Interactive Advertising, 12(2), 13-28. Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: a test of competing models. Information Systems Research, 6(2), 144-176. Van Boven, L., & Gilovich, T. (2003). To do or to have? That is the question. Journal of personality and social psychology, 85(6), 1193. Volchkov, A. (2001). Revisiting single sign-on: a pragmatic approach in a new context. IT Professional, 3(1), 39-45. Wang, R., Chen, S., & Wang, X. (2012). Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. Paper presented at the Security and Privacy (SP), 2012 IEEE Symposium on. Wang, S., Beatty, S. E., & Foxx, W. (2004). Signaling the trustworthiness of small online retailers. Journal of interactive marketing, 18(1), 53-69. Winer, R. S. (2001). A framework for customer relationship management. California management review, 43(4), 89-105. Zaichkowsky, J. L. (1994). The personal involvement inventory: Reduction, revision, and application to advertising. Journal of advertising, 23(4), 59-70. Zanoli, R., & Naspetti, S. (2002). Consumer motivations in the purchase of organic food: a means-end approach. British food journal, 104(8), 643-653. Zhou, T. (2011). Understanding online community user participation: a social influence perspective. Internet Research, 21(1), 67-81.
|