References
- 김영택, 오종철, 홍상진, "개인형 커뮤니티 사이트 사용자의 후기수용모형에 관한 연구", 대한경영학회지, 제19권, 2006, pp. 2215-2235.
- 김용희, 임성은, 최정일, "조건부가치측정법을 이용한 스마트홈 서비스의 지불의사액 추정", J Korean Soc Qual Manag, 제44권, 제4호, 2016, pp. 833-843. https://doi.org/10.7469/JKSQM.2016.44.4.833
- 김태환, 이상용, "개인의 모바일 정보격차가 모바일 인터넷의 인지적 가치 차이에 미치는 영향 분석", Information Systems Review, 제19권, 제2호, 2017, pp. 159-183. https://doi.org/10.14329/isr.2017.19.2.159
- 송혜인, 배향은, 이응용, "CVM을 이용한 개인정보의 경제적 가치분석 연구", Internet & Security Focus, 2014, 한국인터넷진흥원.
- 유진호, 지상호, 임종인, "개인정보 유․노출 사고로 인한 기업의 손실비용 추정", 정보보호학회논문지, 제19권, 제4호, 2009, pp. 63-75. https://doi.org/10.13089/JKIISC.2009.19.4.63
- 이은희, 이영훈, 신종호, "국내항공사의 내부 마케팅과 직무만족, 조직신뢰 및 고객지향성의 구조관계 분석", 경영컨설팅리뷰, 제5권, 제2호, 2014, pp. 1-32.
- 이해춘, 안경애, "CVM을 이용한 개인정보 유출의 손실가치 분석", 생산성논집, 제22권, 제2호, 2008, pp. 1-24. https://doi.org/10.15843/KPAPR.22.2.200806.1
- 정상훈, 박병현, "장애인 취업지원프로그램의 비용-편익 분석", 장애와 고용, 제25권, 제2호, 2015, pp. 157-187. https://doi.org/10.15707/disem.2015.25.2.007
- 채승완, 민경식, 황성원, 원승재, "개인정보의 경제적 가치 분석에 관한 고찰", 정보보호 Issue 리포트, 제3권, 2007, pp. 1-23.
- Acquisti, A., "Privacy and security of personal information", Economics of Information Security, Vol.12, 2004, pp. 179-186. https://doi.org/10.1007/1-4020-8090-5_14
- Bock, G. W., R. W. Zmud, Y. G. Kim, and J. N. Lee, "Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and organizational climate", MIS Quarterly, Vol.29, No.1, 2005, pp. 87-111. https://doi.org/10.2307/25148669
- Carnevale, D. G. and B. Wechsler, "Trust in the public sector individual and organizational determinants", Administration & Society, Vol.23, No.4, 1992, pp. 471-494. https://doi.org/10.1177/009539979202300404
- Chen, Y. Y., H. L. Huang, Y. C. Hsu, H. C. Tseng, and Y. C. Lee, "Confirmation of expectations and satisfaction with the Internet shopping: The Role of Internet self-efficacy", Computer and Information Science, Vol.3, No.3, 2010.
- Cho, D., S. Kim, and A. Acquisti, "Empirical analysis of online anonymity and user behaviors: The impact of real name policy", In System Science (HICSS), 2012 45th Hawaii International Conference on, 2012, pp. 3041-3050.
- Evers, V. and D. Day, "The role of culture in interface acceptance", Human-Computer Interaction INTERACT'97, Springer US, 1997.
- Hoehn, J. P. and A. Randall, "A satisfactory benefit cost indicator from contingent valuation", Journal of Environmental Economics and Management, Vol.14, No.3, 1987, pp. 226-247. https://doi.org/10.1016/0095-0696(87)90018-0
- Hofstede, G., "Cultural constraints in management theories", The Academy of Management Executive, Vol.7, No.1, 1993, pp. 81-94. https://doi.org/10.5465/ame.1993.9409142061
- Horowitz, J. K. and K. E. McConnell, "A review of WTA/WTP studies", Journal of Environmental Economics and Management, Vol.44, No.3, 2002, pp. 426-447. https://doi.org/10.1006/jeem.2001.1215
- Hsu, C. C. and B. A. Sandford, "The delphi technique: Making sense of consensus", Practical Assessment, Research & Evaluation, Vol.12, No.10, 2007, pp. 1-8.
- Hsu, M., T. L. Ju, C. Yen, and C. Chang, "Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations", International Journal of Human-Computer Studies, Vol.65, No.2, 2007, pp. 153-169. https://doi.org/10.1016/j.ijhcs.2006.09.003
- Jacoby, J. and L. B. Kaplan, "The components of perceived risk", Association for Consumer Research, Special Volumes, 1972, pp. 382-393.
- Jang, S., Hong, K., Woo Bock, G., and Kim, I., "Knowledge management and process innovation: the knowledge transformation path in Samsung SDI", Journal of Knowledge Management, Vol.6, No.5, 2002, pp. 479-485. https://doi.org/10.1108/13673270210450582
- Jarvenpaa, S. L. and D. S. Staples, "The use of collaborative electronic media for information sharing: an exploratory study of determinants", The Journal of Strategic Information Systems, Vol.9, No.2, 2000, pp. 129-154. https://doi.org/10.1016/S0963-8687(00)00042-1
- Jarvenpaa, S. and P. Todd, "An empirical examination of the determinants of attitudes and intention toward shopping on the Internet", Working Paper, University of Texas, 1998.
- Kwok, S. H. and S. Gao, "Attitude towards knowledge sharing behavior", Journal of Computer Information Systems, Vol.46, No.2, 2005, pp. 45-51.
- Kwon, U., S. E. Beatty, and J. E. Lueg, "Organizational values, work norms, and relational role behaviours: An empirical retail assessment", The International Review of Retail, Distribution and Consumer Research, Vol.10, No.4, 2000, pp. 401-416. https://doi.org/10.1080/09593960050138958
- Lim, N., "Consumers' perceived risk: Sources versus consequences", Electronic Commerce Research and Applications, Vol.2, No.3, 2003, pp. 216-228. https://doi.org/10.1016/S1567-4223(03)00025-5
- McCauley, N. and M. Ala, "The use of expert systems in the healthcare industry", Information & Management, Vol.22, No.4, 1992, pp. 227-235. https://doi.org/10.1016/0378-7206(92)90025-B
- McKnight, D. H., L. L. Cummings, and N. L. Chervany, "Initial trust formation in new organizational relationships", Academy of Management Review, Vol.23, No.3, 1998, pp. 473-490. https://doi.org/10.2307/259290
- Meinert, D. B., D. K. Peterson, J. R. Criswell, and M. D. Crossland, "Privacy policy statements and consumer willingness to provide personal information", Journal of Electronic Commerce in Organizations, Vol.4, No.1, 2006, pp. 1-17. https://doi.org/10.4018/jeco.2006010101
- Simpson, L. and H. B. Lakner, "Perceived risk and mail order shopping for apparel", International Journal of Consumer Studies, Vol.17, No.4, pp. 377-389.
- Siovic, P., "Perceived risk, trust, and democracy", Risk Analysis, Vol.13, No.6, 1993, pp. 675-682. https://doi.org/10.1111/j.1539-6924.1993.tb01329.x
- Straub, D. W., "The effect of culture on IT diffusion: E-mail and FAX in Japan and the US", Information Systems Research, Vol.5, No.1, 1994, pp. 23-47. https://doi.org/10.1287/isre.5.1.23
- Tsai, J. Y., S. Egelman, L. Cranor, and A. Acquisti, "The effect of online privacy information on purchasing behavior: An experimental study", Information Systems Research, Vol.22, No.2, 2011, pp. 254-268. https://doi.org/10.1287/isre.1090.0260
- Wang, S. and R. A. Noe, "Knowledge sharing: A review and directions for future research", Human Resource Management Review, Vol.20, No.2, 2010, pp. 115-131. https://doi.org/10.1016/j.hrmr.2009.10.001
- Wang, Y., G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor, "I regretted the minute I pressed share: A qualitative study of regrets on Facebook", In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011, p. 10.
- Weinstein, N. D., "Optimistic biases about personal risks", Science, Vol.246, No.4935, 1989, pp. 1232-1234. https://doi.org/10.1126/science.2686031
- Xu, Y., K. Wang, B. Zhang, and Z. Chen, "Privacy-enhancing personalized web search", In Proceedings of the 16th International Conference on World Wide Web, 2007, pp. 591-600.
- Yu, M. M., S. C. Ting, and M. C. Chen, "Evaluating the cross-efficiency of information sharing in supply chains", Expert Systems with Applications, Vol.37, No.4, 2010, pp. 2891-2897. https://doi.org/10.1016/j.eswa.2009.09.048