References
- Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks/Cole Publishing Company.
- Bandura, A. 1977. "Self-efficacy: Toward a Unifying Theory of Behavioral Change." Psychological Review 84(2):191-215. https://doi.org/10.1037/0033-295X.84.2.191
- Bauer, H. H., Grether, M., and Leach, M. 2002. "Building Customer Relations over the Internet." Industrial Marketing Management 31(2):155-163. https://doi.org/10.1016/S0019-8501(01)00186-9
- Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers." The Information Society 20(5):313-324. https://doi.org/10.1080/01972240490507956
- Besmer, A., and Lipford, H. R. 2010. "Moving beyond Untagging: Photo Privacy in a Tagged World." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems:1563-1572.
- Boyed, D. M., and Ellison, N. B. 2007. "Social Network Sites: Definition, History, and Scholarship." Journal of Computer‐Mediated Communication 13(1):210-230.
- Brod, C. 1982. "Managing technostress: Optimizing the Use of Computer Technology." Personnel Journal 61(10):753-757.
- Campbell, W. K., Rudich, E. A., and Sedikides, C. 2002. "Narcissism, Self-esteem, and the Positivity of Self-views: Two Portraits of Self-love." Personality and Social Psychology Bulletin 28(3):358-368. https://doi.org/10.1177/0146167202286007
- Chin, W. W. 1998. "The Partial Least Squares Approach to Structural Equation Modeling." Modern Methods for Business Research 295(2):295-336.
- Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences, 2nd ed. New York: Academic Press.
- Cozby, P. C. 1973. "Self-disclosure: A Literature Review." Psychological Bulletin 79(2):73-91. https://doi.org/10.1037/h0033950
- Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation." Organization Science 10(1):104-115. https://doi.org/10.1287/orsc.10.1.104
- Culnan, M. J., and Bies, R. J. 2003. "Consumer privacy: Balancing Economic and Justice Considerations." Journal of Social Issues 59(2):323-342. https://doi.org/10.1111/1540-4560.00067
- Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-commerce Transactions." Information Systems Research 17(1):61-80. https://doi.org/10.1287/isre.1060.0080
- Dowling, G. R. 1985. "The Effectiveness of Advertising Explicit Warranties." Journal of Public Policy & Marketing 4:142-152.
- Efron, B., and Tibshirani, R. 1997. "Improvements on Cross-validation: The 632+ Bootstrap Method." Journal of the American Statistical Association 92(438):548-560.
- Ellison, N., Heino, R., and Gibbs, J. 2006. "Managing Impressions Online: Self‐presentation Processes in the Online Dating Environment." Journal of Computer‐Mediated Communication 11(2):415-441.
- Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading. MA: Addison-Wesley.
- Fogel, J., and Nehmad, E. 2009. "Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns." Computers in Human Behavior 25(1):153-160. https://doi.org/10.1016/j.chb.2008.08.006
- Fusilier, M. R., and Hoyer, W. D. 1980. "Variables Affecting Perceptions of Invasion of Privacy in a Personnel Selection Situation." Journal of Applied Psychology 65(5):623-626. https://doi.org/10.1037/0021-9010.65.5.623
- Gardner, H. 1985. Frames of Mind: The Theory of Multiple Intelligences. New York: Basic Books.
- Gefen, D. 2000. "E-commerce: the Role of Familiarity and Trust." Omega 28(6):725-737. https://doi.org/10.1016/S0305-0483(00)00021-9
- Gilroy, F. D., and Desai, H. B. 1986. "Computer Anxiety: Sex, Race and Age." International Journal of Man-Machine Studies 25(6):711-719. https://doi.org/10.1016/S0020-7373(86)80084-0
- Goffman, E. 1959. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday.
- Grazioli, S., and Jarvenpaa, S. L. 2000. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers." IEEE Transactions on Systems, Man and Cybernetics 30(4):395-410. https://doi.org/10.1109/3468.852434
- Hair, J. F., Jr. Black, W. C., Bavin, B. J., and Anderson, R. E. 2010. Multivariate Data Analysis, 7th ed. Upper Saddle River, NJ: Prentice Hall.
- Harris Interactive. 2002. "Privacy On and Off the Internet: What Consumers Want." Privacy and American Business Study 15229:1-127.
- Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry." Electronic Commerce Research and Applications 9(1): 50-60. https://doi.org/10.1016/j.elerap.2009.05.001
- Homans, G. C. 1961. Social Behavior: Its Elementary Forms. Oxford, England: Harcourt Brace.
- Jarvenpaa, S., and Todd, P. 1998. "An Empirical Examination of the Determinants of Attitudes and Intention toward Shopping on the Internet." Working Paper, University of Texas-Austin.
- Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. 1999. "Consumer Trust in an Internet Store: A Cross‐cultural Validation." Journal of Computer‐Mediated Communication 5(2):1-35.
- Kim, B. 2012. "A Study of Antecedents of Continuance Intention in Mobile Social Network Service: The Role Trust and Privacy Concerns." Knowledge Management Research 13(4):83-100.
- Ko, Honseog, Kim, Chesoong, Jeong, Moonyoung, Oh, Youngjin, and Lee, Sungho. 2011. "The Effect of Social Network Service's Quality Factors on User Satisfaction and the Intention to Continued Use." Journal of the Korean Society for Quality Management 39(4): 543-555.
- Lampinen, A., Tamminen, S., and Oulasvirta, A. 2009. All My People Right Here, Right now: Management of Group Co-presence on a Social Networking Site. In Proceedings of the ACM 2009 International Conference on Supporting Group Work:281-290.
- Lapointe, L., and Rivard, S. 2005. "A Multilevel Model of Resistance to Information Technology Implementation." MIS Quarterly 29(3):461-491. https://doi.org/10.2307/25148692
- Laufer, R. S., Proshansky, H. M., and Wolfe, M. 1973. "Some Analytic Dimensions of Privacy." In Third International Architectural Psychology Conference, Lund, Sweden.
- Leary, M. R., and Kowalski, R. M. 1990. "Impression Management: A Literature Review and Two-component Model." Psychological Bulletin 107(1):34-47. https://doi.org/10.1037/0033-2909.107.1.34
- Lee, D., Bang, Y., and Bae, Y. 2010. "Privacy Calculus and the Role of Information Transparency in Personal Information Disclosure." Informatization Policy 17(2):68-85.
- Lee, D., and Lim, S. 2006. "The Motivations and Consequences of Voluntary Self-Disclosure by Blog Users." The Korean Journal of Advertising 17(5):227-240.
- Li, H., Sarathy, R., and Xu, H. 2011. "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors." Decision Support Systems 51(3):434-445. https://doi.org/10.1016/j.dss.2011.01.017
- Lwin, M., Wirtz, J., and Williams, J. D. 2007. "Consumer Online Privacy Concerns and Responses: A Power-responsibility Equilibrium Perspective." Journal of the Academy of Marketing Science 35(4):572-585. https://doi.org/10.1007/s11747-006-0003-3
- Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): the Construct, the Scale, and a Causal Model." Information Systems Research 15(4):336-355. https://doi.org/10.1287/isre.1040.0032
- Maher, P. M., and Rubenstein, A. H. 1974. "Factors Affecting Adoption of a Quantitative Method for R&D Project Selection." Management Science 21(2):119-129. https://doi.org/10.1287/mnsc.21.2.119
- Mayer, R. C., Davis, J. H., and Schoorman, F. D. 1995. "An Integrative Model of Organizational Trust." Academy of Management Review 20(3):709-734.
- Mitchell, V. W., Davies, F., Moutinho, L., and Vassos, V. 1999. "Using Neural Networks to Understand Service Risk in the Holiday Product." Journal of Business Research 46(2):167-180. https://doi.org/10.1016/S0148-2963(98)00020-4
- Milne, G. R., and Boza, M. E. 1999. "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices." Journal of Interactive Marketing 13(1):5-24. https://doi.org/10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
- Moon, H., Choi, B., and Nae, E. 2011. "Review of Trust Research Trends and Recommendations for Future Research Direction in Korea." Korean Management Review 40(1):139-186.
- Park, S. B., and Chung, N. 2011. "Mediating Roles of Self-presentation Desire in Online Game Community Commitment and Trust Behavior of Massive Multiplayer Online Role-playing Games." Computers in Human Behavior 27(6):2372-2379. https://doi.org/10.1016/j.chb.2011.07.016
- Pavlou, P. A. 2003. "Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model." International Journal of Electronic Commerce 7(3):101-134.
- Pavlou, P. A., and Gefen, D. 2004. "Building Effective Online Marketplaces with Institution-based Trust." Information Systems Research 15(1):37-59. https://doi.org/10.1287/isre.1040.0015
- Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-agent Perspective." MIS Quarterly 31(1):105-136. https://doi.org/10.2307/25148783
- Phelps, J., Nowak, G., and Ferrell, E. 2000. "Privacy Concerns and Consumer Willingness to Provide Personal Information." Journal of Public Policy & Marketing 19(1):27-41. https://doi.org/10.1509/jppm.19.1.27.16941
- Ram, S. 1987."A Model of Innovation Resistance."Advances in Consumer Research 14:208-212.
- Rice, R. E., and Love, G. 1987. "Electronic Emotion Socioemotional Content in a Computer-mediated Communication Network." Communication Research 14(1):85-108. https://doi.org/10.1177/009365087014001005
- Roth, D. L., Harris, R. N., and Snyder, C. R. 1988. "An Individual Differences Measure of Attributive and Repudiative Tactics of Favorable Self-presentation." Journal of Social and Clinical Psychology 6(2):159-170. https://doi.org/10.1521/jscp.1988.6.2.159
- Short, J., Williams, E., and Christie, B. 1976. The Social Psychology of Telecommunications. London: John Wiley & Sons.
- Sim, Sun Hee, and Moon, Jae Youn. 2012. "A Study on Mobile SNS Attributes Effects on Information Share, Relationship Formation, and User Satisfaction." Journal of the Korean Society for Quality Management 40(1): 60-72. https://doi.org/10.7469/JKSQM.2012.40.1.060
- Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices." MIS Quarterly 20(2):167-196. https://doi.org/10.2307/249477
- Suh, B., and Han, I. 2003. "Effect of Trust on Customer Acceptance of Internet Banking." Electronic Commerce Research and Applications 1(3):247-263.
- Tan, Y. H., and Thoen, W. 2000. "An Outline of a Trust Moodel for Electronic Commerce." Applied Artificial Intelligence 14(8):849-862. https://doi.org/10.1080/08839510050127588
- Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. 2005. "PLS Path Modeling." Computational Statistics & Data Analysis 48(1):159-205. https://doi.org/10.1016/j.csda.2004.03.005
- Trammell, K. D., and Keshelashvili, A. 2005. "Examining the New Influencers: A Self-presentation Study of A-list Blogs." Journalism & Mass Communication Quarterly 82(4):968-982. https://doi.org/10.1177/107769900508200413
- Trumbo, C. W. 1999. "Heuristic‐Systematic Information Processing and Risk Judgment." Risk Analysis 19(3):391-400.
- Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. 2006. "Concern for Information Privacy and Online Consumer Purchasing." Journal of the Association for Information Systems 7(6):415-444.
- Vroom, V. H. 1964. Work and Motivation. New York: John Wiley & Sons.
- Walther, J. B., and Burgoon, J. K. 1992. "Relational communication in computer‐mediated interaction." Human Communication Research 19(1):50-88. https://doi.org/10.1111/j.1468-2958.1992.tb00295.x
- Wan, L., Zhang, C., and Min, D. 2013. "Antecendents to privacy concern over ubiquitous service in china." Journal of International & Commerce 9(2):171-194. https://doi.org/10.16980/jitc.9.2.201305.171
- Warren, S. D., and Brandeis, L. D. 1890. "The Right to Privacy." Harvard Law Review 4(5):193-220. https://doi.org/10.2307/1321160
- Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.
- Xu, H., Dinev, T., Smith, H. J., and Hart, P. 2008. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. Proceedings of the International Conference on Information Systems, ICIS 2008, Paris, France.
- Yao, M. Z., and Linz, D. G. 2008. "Predicting Self-protections of Online Privacy." CyberPsychology & Behavior 11(5):615-617. https://doi.org/10.1089/cpb.2007.0208
- Zaltman, G., and Wallendorf, M. 1979. Consumer Behavior: Basic Findings and Management Implications. New York: John Wiley & Sons.