참고문헌
- 고 준, 신선진, 김희웅, "온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과", 경영정보학연구, 제18권, 제1호(2008), pp.118-144.
- 글렌카로, 남수현, 강신철, 송희석, "Effects of Privacy Concern o Trust and Intention to Incremental Usage of Social Networking Systems", 디지털정책연구, 제6권, 제4호(2008), pp.123-135.
- 김교헌, 한덕웅, "자기노출의 목표, 자발성 및 분노억제경향이 생리적 각성, 정화 및 평가에 미치는 효과", 한국심리학회지:건강, 제1권 제1호(1996), pp.66-88.
- 김연정, "한국형 블로그 이용자의 가치체계에 관한 연구", 광고연구, 제68권(2005), pp.9-35.
- 김유정, "웹 개인미디어에서의 사이버 자기표현", 한국언론학보, 제52권, 제6호(2008), pp. 78-99.
- 메디컬투데이, "네티즌 54% SNS 이용시 개인정보노출우려", 2010.
- 사람인, "SNS 사용자 54%, 불안감 느껴", 2010.
- 손영란, 박은아, "자기노출 및 대인관계성향에 따른 인터넷 커뮤니티 활동의 차이", 미디어, 젠더와 문화, 제15권(2010), pp.157-284
- 신지영, 양희동, "온라인 커뮤니티기반 블로그 활동에 영향을 미치는 프라이버시 정보의 유형과 조절변수 연구, 경영학연구, 제35권, 제1호(2006), pp.81-108.
- 오이코랩 트위터통계 사이트(2011), http://twitter.com/oikolab.
- 이두희, 임승희, "블로그 이용자의 자발적 자기 정보공개의 동기요인과 결과요인에 관한 연구", 광고학연구, 제17권, 제5호(2006), pp.227-240.
- 이은미, 박현희, 전중옥, "인터넷 쇼핑몰의 이용자 특성이 상호작용성, 신뢰, 재이용의도에 미치는 영향", 마케팅논집, 제17권, 제3호(2009), pp.83-110.
- 이재신, 연보영, "미니홈페에서 나타나는 대학생들의 자기노출 및 이에 영향을 주는 요인들에 관한 연구", 한국언론학보, 제52권, 제3호 (2008), pp.99-121.
- 최혁라, 신정신, "온라인 거래에서 프라이버시 염려의 선행요인과 프라이버시 염려, 신뢰간의 관계에 관한 연구", 정보시스템연구, 제16권 제3호(2007), pp.21-44.
- 한국인터넷진흥원, "2010년 인터넷 이용실태 조사", 2010.
- Ajzen, I., "The Theory of Planned Behavior," Organ, Behavior Human Decision Processes, Vol.50(1991), pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Archer, R.L., Role of personality and social situation. In G.J. Chelune(Ed.), Jossey-Bass, San Francisco, 1979.
- Bagozzi, R.P. and Y. Yi, "On the Evaluation of Structural Equation Models," Journal of the Academy of Marketing Science, Vol.16, No.2(1988), pp.74-94. https://doi.org/10.1007/BF02723327
- Bauer, R.A., "Consumer Behavior as Risk Taking," 43rd Conference of American Marketing Association, Chicago, (1960), pp.389-398.
- Bauer, H.H., M. Grether, and M. Leach, "Building customer relations over the internet," Industrial Marketing Management, Vol.31 (2002), pp.155-163. https://doi.org/10.1016/S0019-8501(01)00186-9
- Boyd, D.M. and N.B. Ellison, "Social network sites:Definition, History, and Scholarship," Journal of Computer Mediated Communication, Vol.13, No.1(2007), pp.210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
- Brendan, M., J. Tam, P.G. Kelley, and L.F. Cranor, "RT@IWantPrivacy:Widespread Violation of Privacy Settings in the Twitter Social Network," In Web 2.0 Privacy and Security Workshop, IEEE Symposium on Security and Privacy, 2010.
- Chang, L.K. and S. Kwon, "A cognitive mapdriven avatar design recommendation DSS and its empirical validity," Decision Support Systems, Vol.45, No.3(2008), pp.461-472. https://doi.org/10.1016/j.dss.2007.06.008
- Chellappa, R.K. and R. Sin, "Personalization Versus Privacy:An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management, Vol.6, No.2(2005), pp.181-202. https://doi.org/10.1007/s10799-005-5879-y
- Cheung, C. and M.K.O. Lee, "Trust in internet shopping:a proposed model and measurement instrument," Proceedings of the 6th Americas Conference on Information Systems, (2000), pp.681-689.
- Chiu, C.M., M.H. Hsu, and E.T.G. Wang, "Understanding knowledge sharing in virtual communities:an integration of social capital and social cognitive theories," Decision Support Systems, Vol.42, No.3(2006), pp.1872-1888. https://doi.org/10.1016/j.dss.2006.04.001
- Cozby, P.C., "Self-disclosure:A literature review," Psychological Bulletin, Vol.79(1973), pp.73-91. https://doi.org/10.1037/h0033950
- Culnan, M.J., "How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, Vol.17, No.3(1993), pp.341-364. https://doi.org/10.2307/249775
- Davis, F.D., R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology :A Comparison of Two Theoretical Models," Management Science, Vol.35, No.8(1989), pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
- Dinev, T. and P. Hart, "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, Vol. 17, No.1(2006), pp.61-80. https://doi.org/10.1287/isre.1060.0080
- Dorminick, J.R., "Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web," Journalism and Mass Communication Quarterly, Vol.76, No.4(1999), pp.646-658. https://doi.org/10.1177/107769909907600403
- Donthu, N. and A. Garcia, "The Internet shopper," Journal of Advertising Research, Vol.39, No.3(1999), pp.52-68.
- Dowling, G.R., "The Effectiveness of Advertising Explicit Warranties," Journal of Public policy and Marketing, Vol.4(1985), pp.142-152.
- Dowlin, G.R. and R. Staelin, "A Model of Perceived Risk and Intended Risk-Handling Activity," Journal of Consumer Research, Vol.21, No.1(1994), pp.119-134. https://doi.org/10.1086/209386
- Eastlick, M.A., S.L. Lotz, and P. Warrington, "Understanding Online B-to-C Relationships :An Integrated Model of Privacy Concerns, Trust, and Commitment," Journal of Business Research, Vol.59(2006), pp.877-886. https://doi.org/10.1016/j.jbusres.2006.02.006
- Fishbein, M. and I. Ajzen, Belief, Attitude, Intention and Behavior:An Introduction to Theory and Research, Addison-Wesley, Reading, MA, 1975.
- Gefen, D., E. Karahanna, and D.W. Straub, "Trust and TAM in Online Shopping:An Integrated Model," MIS Quarterly, Vol.27, No.1(2003), pp.51-90. https://doi.org/10.2307/30036519
- Goffman, E., The Presentation of Self in Everyday Life, Doubleday, New York, 1959.
- Grazioli, S. and S.L. Jarvenpaa, "Perils of Internet Fraud:An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man, and Cybernetics, Part A:Systems Humans, Vol.30, No.4(2000), pp.395-410. https://doi.org/10.1109/3468.852434
- Harris, L., Associates, and A.F. Westin, Harris-Equifax Consumer Privacy Survey, Equifax, Inc., Atlanta, GA. 1991.
- Hollyman, F.M., The effect of personal control and instrumental value on the experience of invasion of privacy, Unpublished Doctoral Dissertation, Purdue University, 1977.
- Jansen, B.J., M. Zhang, K. Sobel, and A. Chowdury, "Twitter power:Tweets as electronic word of mouth," Journal of the American Society for Information Science and Technology, Vol.60, No.11(2009), pp.2169-2188. https://doi.org/10.1002/asi.21149
- Java, A., X. Song, T. Finin, and B. Tseng, Why we twitter:understanding microblogging usage and communities, Proceeding of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (2007), pp.56-65.
- Java, A., X. Song, T. Finin, and B. Tseng, "Why we twitter:An analysis of a microblogging community," Advances in Web Mining and Web Usage Analysis, Vol.54, No.39 (2009), pp.118-138.
- Jarvenpaa, S.L., N. Tractinsky, and M. Vitale, "Consumer Trust in an Internet Store," Information Technology and Management, Vol.1, No.12(2000), pp.45-71. https://doi.org/10.1023/A:1019104520776
- Jourard, S.M. and P. Lasakow, "Some factors in self-disclosure," Journal of Abnormal and Psychology, Vol.10(1958), pp.91-98.
- Jourard, S.M., Self-disclosure:An experimental analysis of the transparent self, Wiley, New York, 1971.
- Kim, H.S. and D.K. Sherman, "Express Yourself: culture and the effect of self-expression on choice," Journal of personality and Social psychology, Vol.92, No.1(2007), pp.1-11. https://doi.org/10.1037/0022-3514.92.1.1
- Krishnamurthy, B. and C.E. Wills, "Characterizing privacy in online social networks," Proceedings of the first workshop on Online social networks, (2008), pp.37-42.
- Leary, M.R. and R.M. Kowalski, "Impression Management:A Literature Review and Two-Component Model," Psychological Bulletin, Vol.107, No.1(1990), pp.34-47. https://doi.org/10.1037/0033-2909.107.1.34
- Leary, M.R., Self-Presentation:Impression Management and Interpersonal Behavior, Westview Press, Boulder, 1995.
- Lee, H., G. Phillipa, and K. Balachander, "How much is too much? Privacy issues on Twitter," Conference of International Communication Association, Singapore, 2010.
- Liu, C., J.T. Marchewka, J. Lu, C.S. Yu, "Beyond concern-a privacy-trust-behavioral intention model of electronic commerce," Information and Management, Vol.42(2005), pp.289-304. https://doi.org/10.1016/j.im.2004.01.003
- Macneil, I.R., The new social contract:An inquiry into modern contractual relations, New Haven, CT:Yale University Press, 1980.
- Malhotra, N.K., S.S. Kim, and J. Agarwal, "Internet users' information Privacy Concerns (IUIPC):The Construct, The Scale, and a Causal Model," Information Systems Research, Vol.15, No.4(2004), pp.336-355. https://doi.org/10.1287/isre.1040.0032
- Metzger, M.J., "Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce," Journal of Computer-Mediated Communication, Vol.9, No.4(2004).
- McKenna, K.Y.A. and J.A. Bargh, "Coming out in the age of the Internet:identity demarginalization through virtual group participation," Journal of Personality and Social Psychology, Vol.75, No.68(1998), pp.1-94.
- McKnight, D.H., L.L. Cummings, N.L. Chervany, "Initial trust formation in new organizational relationships," Academy of Management Review, Vol.23, No.3(1998), pp.472-490.
- Milne, G.R. and M.-E. Boza, "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices," Journal of Interactive Marketing, Vol.13, No.1(1999), pp.5-24. https://doi.org/10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
- Mitchell, V.W., F. Davies, L. Moutinho, and V. Vassos, "Using neural networks to understand service risk in the holiday product," Journal of Business Research, Vol.46 (1999), pp.167-80. https://doi.org/10.1016/S0148-2963(98)00020-4
- Nardi, B.A., D.J. Schiano, M. Gumbrecht, and L. Swartz, "Why we blog," Commun. ACM, Vol.47, No.12(2004), pp.41-46. https://doi.org/10.1145/1035134.1035163
- Park, S.-B. and N. Chung, "Mediating roles of self-presentation desire in online game community commitment and trust behavior of Massive Multiplayer Online Role-Playing Games," Computers in Human Behavior, Vol.27, No.6(2011), pp.2372-2379. https://doi.org/10.1016/j.chb.2011.07.016
- Pavlou, P.A., "Consumer Acceptance of Electronic Commerce:Integrating Trust and Risk with the Technology Acceptance Model," International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.101-134.
- Pedersen, P.E. and H. Nysveen, "Usefulness and Self-Expressiveness:Extending TAM to Explain the Adoption of a Mobile Parking Service," 16th Bled eCommerce Conference e-Transformation, Bled, Slovenia, 2003.
- Posey, C., P.B Lowry, T.L. Roberts, and T.S. Ellis, "Proposing the online community self-disclosure model:the case of working professionals in France and the U.K. who use online communities," European Journal of Information Systems, Vol.19(2010), pp.181-195. https://doi.org/10.1057/ejis.2010.15
- Rice, R.E. and G. Love, "Electronic Emotion," Communication Research, Vol.14, No.1(1987), pp.85-108. https://doi.org/10.1177/009365087014001005
- Schoenbachler, D.D. and G.L. Gordon, "Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing," Journal of Interactive Marketing, Vol.16, No.3(2002), pp.2-16. https://doi.org/10.1002/dir.10033
- Sheehan, K.B. and M.G. Hoy, "Dimensions of Privacy Concern Among Online Consumers," Journal of Public Policy and Marketing, Vol.19, No.1(2000), pp.62-73. https://doi.org/10.1509/jppm.19.1.62.16949
- Slyke, C.V., J.T. Shim, R. Johnson, and J. Jiang, "Concern for Information Privacy and Online Consumer Purchasing," Journal of the Association for Information Systems, Vol.7, No.6(2006), pp.415-444.
- Smith, H.J., S.J. Milberg, and S.J. Burke, "Information Privacy:Measuring Indiiduals' Concerns about Organizational Practices," MIS Quarterly, Vol.20, No.2(1996), pp.167- 196. https://doi.org/10.2307/249477
- Stern, S.R., "Virtually speaking:Girls' Self- Disclosure on the WWW," Women's Studies in Communication, Vol.25(2002), pp.223-253. https://doi.org/10.1080/07491409.2002.10162447
- Stewart, KJ., "Transference as a means of building trust in world wide web sites," Proceeding of the 20th International Conference on Information Systems, (1999), pp.459-464.
- Stewart, K.J. and H. Segars, "An empirical examination of the concern for information privacy instrument," Information Systems Research, Vol.13, No.1(2002), pp.36-49. https://doi.org/10.1287/isre.13.1.36.97
- Trumbo, C.W., "Heuristic-systematic information processing and risk judgment," Risk Analysis, Vol.19, No.3(1999), pp.391-400.
- Venkatesh, V. and F.D. Davis, "A Model of the Antecedents of Perceived Ease of Use: Development and Test," Decision Sciences, Vol.27, No3(1996), pp.451-481. https://doi.org/10.1111/j.1540-5915.1996.tb01822.x
- Venkatesh, V. and F.D. Davis, "A theoretical extension of the technology acceptance model: four longitudinal field studies," Management Science, Vol.46(2000), pp.186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- Wallace, P. The psychology of the internet, Cambridge Univ. Press, 1999.
- Walther, J.B. and J.K. Burgoon, "Relational Communication in Computer-Mediated Interaction," Human Communication Research, Vol.19, No.1(1992), pp.52-88. https://doi.org/10.1177/009365092019001003
- Westin, A., Privacy and Freedom, Atheneum, New York, 1967.
- Xu, H., H.H. Teo, and B.C.Y. Tan, "Predicting the Adoption of Location-Based Services: The Roles of Trust and Privacy Risk," in Proceedings of 26th International Conference on Information Systems, D. Avison, D.F. Galletta, and J.I. DeGross (eds.), Las Vegas, NV, (2005), pp.897-910.
- Yehoshua, L. and S. Shmuel, "Perceived risks as barriers to internet and e-commerce usage," Qualitative Market Research:An International Journal, Vol.5(2002), pp.291-300. https://doi.org/10.1108/13522750210443245