References
- Culnan, M. J. (2000). Protecting Privacy Online: Is Self-Regulation Working? Journal of Public Policy and Marketing, 19(1), 20-26. https://doi.org/10.1509/jppm.19.1.20.16944
- 박남수, 이현주, 천혜선 (2014), 소셜네트워크 서비스 프라이버시 위험이 사용자저항에 미치는 영향, e-비즈니스 연구, 15(3), 323-338.
- 장성호, 이기동 (2014), 소셜네트워크서비스 프라이버시 위험이 사용자저항에 미치는 영향, e-비즈니스 연구, 15(3), 85-105.
- 정철호, 남수현 (2011), SNS 이용자의 프라이버시 염려도와 수용후 행동 간의 구조적 관계에 관한 연구, 경영정보연구, 30(3), 78-114.
- Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
- Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. https://doi.org/10.2307/249477
- Campbell, A.J. (1997). Relationship Marketing in Consumer Markets: A Comparison of Managerial and Consumer Attitudes about Information Privacy. Journal of Direct Marketing, 11(3), 44-57. https://doi.org/10.1002/(SICI)1522-7138(199724)11:1<44::AID-DIR5>3.3.CO;2-C
- Westin, A. F. (1967). Privacy and Freedom. Athenaum, New York.
- Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342. https://doi.org/10.1111/1540-4560.00067
- Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-49. https://doi.org/10.1287/isre.13.1.36.97
- Bandura. A. (1997). Self-Efficacy: Toward a Unifving Theory of Behavioral Change, Psychological Review, 84(2), 191-215. https://doi.org/10.1037//0033-295X.84.2.191
- Bandura. A. (1994). Self-efficacy, Encyclopedia of. Human Behavior, Vol 4, V.S. Rama-chaudran, ed., New York: Academic Press, 17-81.
- Salomon, G. (1984). Television is "easy" and print is "tough": The differential investment of mental effort in learning as a function of perceptions and attributions. Journal of Educational Psychology, 76(4), 647-658. https://doi.org/10.1037/0022-0663.76.4.647
- Vealey, R. S. (1986). Conceptualization of sport-confidence and competitive orientation: Preliminary investigation and instrumentation development. Journal of Sport Psychology, 8(3), 221-246. https://doi.org/10.1123/jsp.8.3.221
- 장익진, 최병구 (2014), 위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석, 한국전자거래학회지, 19(3), 65-89. https://doi.org/10.7838/JSEBS.2014.19.3.065
- Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://doi.org/10.2307/249008
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, 46(2), 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- TTA (2014). 정보통신기술협회,정보통신용어사전, http://word.tta.or.kr/
- 김성태 (2010). 신정보정책론: 이론과 전략. 법문사.
- Phillip, H. B. (2005). Prevention strategies for the next wave of cyber crime. Network Security, 10. 12-15.
- Chin, W. W. (1998). The partial least squares approach for structural equation modeling. in G.A. Marcoulides (Ed.), Modern methods for business research (pp. 295-236). London: Lawrence Erlbaum Associates.
- Fornell, C., & Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.2307/3151312
- Hair, J., Anderson, R., Tatham, R., & Black, W. (1998) Multivariate Data Analysis, 5th ed., California: Prentice-Hall International Inc.
- Meyers-Levy, J., & Sternthal, B. (1991). Gender differences in the use of message cues and judgments. Journal of Marketing Research, 28(1), 84-96. https://doi.org/10.2307/3172728
- Ong, C. S., & Lai, J. Y. (2006). Gender difference in perceptions and relationship among dominants of e-learning acceptance. Computers in Human Behavior, 22(5), 816-829. https://doi.org/10.1016/j.chb.2004.03.006