References
- Armstrong, R. W., and Yee, S. M. (2001). Do Chinese trust Chinese? A study of Chinese buyers and sellers in Malaysia. Journal of International Marketing, 9(3), 63-86. https://doi.org/10.1509/jimk.9.3.63.19925
- Anderson, R. E., and Srinivasan, S. S. (2003). E-satisfaction and e-loyalty: a contingency framework. Psychology and Marketing, 20(2), 123-128. https://doi.org/10.1002/mar.10063
- Bhattacherjee, A. (2002). Individual trust in online firms: scale development and initial test. Journal of Management Information Systems, 19(1), 211-241. https://doi.org/10.1080/07421222.2002.11045715
- Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165. https://doi.org/10.1002/asi.20459
- Chang, H. H., and Chen, S. W. (2009). Consumer perception of interface quality, security, and loyalty in electronic commerce. Information and Management, 46(7), 411-417. https://doi.org/10.1016/j.im.2009.08.002
- Comer, J. M., Plank, R. E., Reid, D. A., and Pullins, E. B. (1999). Methods in Sales Research: Perceived Trust in Business-to-Business Sales: A New Measure. Journal of Personal Selling and Sales Management, 19(3), 61-71.
- Dinev, T., and Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Flaherty, K. E., and Pappas, J. M. (2000). The role of trust in sales person sales manager relationships. Journal of Personal Selling and Sales Management, 20(4), 271-278.
- Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50.
- Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725-737. https://doi.org/10.1016/S0305-0483(00)00021-9
- Hair, Jr. J. F., Hult, G. T. M., Ringle, C. M., and Sartedt, M. (2013). A primer on partial least squares structural equation modeling (PLS-SEM), SEGE Publications, Inc.
- Hilgard, E. R. (1990). The trilogy of mind: Cognition, affection, and conation. Journal of the History of the Behavioral Sciences, 16(2), 107-117. https://doi.org/10.1002/1520-6696(198004)16:2<107::AID-JHBS2300160202>3.0.CO;2-Y
- Hoy, M. G., and Milne, G. (2010). Gender differences in privacy-related measures for young adult facebook users. Journal of Interactive Advertising, 10(2), 28-45. https://doi.org/10.1080/15252019.2010.10722168
- Iachello, G., and Hong, J. (2007). End-user privacy in human computer interaction. Foundations and Trends in Human Computer Interaction, 1(1), 1-137. https://doi.org/10.1561/1100000004
- Im, H. W., Im, J. W., and Lee, H. S. (2007). Exploratory study on efficient operation of parcel delivery logistics networks following the growth of online shopping. ASIA Marketing Journal, 9(2), 97-129.
- Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS quarterly, 34(3), 549-566. https://doi.org/10.2307/25750691
- Jeong, G. S. (2014). A study on measures to prevent personal information leakage from financial institutions. Journal of Information and Security, 14(4), 109-116.
- Korea Internet and Security Agency (2012). A study on the level of knowledge of personal information protection, 98-99.
- Kim, B., Im, J. I., and Cho, Y. H. (2014). Present state of mobile app personal information infringement and responding measures (finance, centering on Android operating system). Journal of the Institute of Internet, Broadcasting and Communication, 14(6) 267-272. https://doi.org/10.7236/JIIBC.2014.14.6.267
- Kim, D. J., Ferrin, D. L., and Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, 44(2), 544-564. https://doi.org/10.1016/j.dss.2007.07.001
- Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45. https://doi.org/10.2753/MIS0742-1222240401
- Lazarus, R. S. (1991). Emotion and Adoption. New York: Oxford Univ. Press.
- Lim, S. H. (2016). An Investigation of the Psychology of Password Replacement by Email Users. Journal of The Korea Institute of Information Security and Cryptology, 26(5), 1251-1258. https://doi.org/10.13089/JKIISC.2016.26.5.1251
- Liu, A. H., and Leach, M. P. (2001). Developing loyal customers with a value-adding sales force: Examining customer satisfaction and the perceived credibility of consultative salespeople. Journal of Personal Selling and Sales Management, 21(2), 147-156.
- Louis Brandeis and Samuel Warren. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220. https://doi.org/10.2307/1321160
- Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
- McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information systems research, 13(3), 334-359. https://doi.org/10.1287/isre.13.3.334.81
- Nicolaou, A. I. and McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information systems research, 17(4), 332-351. https://doi.org/10.1287/isre.1060.0103
- Nunnally, J. C., and Bernstein, I. H. (1994). Psychometric Theory, (3rd ed). McGraw-Hill, New York.
- Mansfield, E. R., and Helms, B. P. (1982). Detecting multicollinearity. The American Statistician, 36(3a), 158-160.
- McGrath, J. (1982). "Dilemmatics: The Study of Research Choices and Dilemma", in J.McGrath, J.Martin and R.Kulla(eds.), Judgment Calls in Research, Beverly Hills, CA: Sage Publications, 69-103
- Mehrabian, A., and Russell, J. (1974). An Approach to Environmental Psychology. Cambrige, MA: MIT Press.
- Park, M. J., and Lee, S. E. (2009). The effects of VMD appropriateness on consumers' emotional, cognitive, and behavioral responses: model verification based on the cognitive emotion theory and the emotional cognition theory. The Research Journal of the Costume Culture, 17(3), 459-471. https://doi.org/10.29049/RJCC.2009.17.3.459
- Pavlou, P. A., and Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59. https://doi.org/10.1287/isre.1040.0015
- Petronio, S. S. (2002). Boundaries of privacy: Dialectics of disclosure (xix, 268). Albany, NY: State University of New York Press.
- Phelps, J., D'Souza, G., and Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing, 15(4), 2-17. https://doi.org/10.1002/dir.1019
- Phelps, J., Nowak, G. J., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27-41. https://doi.org/10.1509/jppm.19.1.27.16941
- Shin, E. M., and Kim, Y. E. (2011). Plan to study the utilization of risk management for sustainable growth of parcel delivery business. Journal of the Korea Logistics Research Association, 21(5), 201-222.
- Simcock, P., Sudbury, L., and Wright, G. (2006). Age, perceived risk and satisfaction in consumer decision making: A review and extension. Journal of Marketing Management, 22(3-4), 355-377. https://doi.org/10.1362/026725706776861163
- Smith, H. J., Milberg, J. S., and Burke, J. S. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. https://doi.org/10.2307/249477
- Song, S. H. (2011). Empirical analysis of parcel delivery industry's growth factors: centering on e-commerce growth. Journal of the Korea Research Academy of Distribution and Management, 14(2), 107-125.
- Tang, Z., Hu, Y. J., and Smith, M. D. (2008). Gaining trust through online privacy protection: self-regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24(4), 153-173. https://doi.org/10.2753/MIS0742-1222240406
- Tversky, A., and Kahneman, D. (1992). Advances in prospect theory: Cumulative representation of uncertainty. Journal of Risk and uncertainty, 5(4), 297-323. https://doi.org/10.1007/BF00122574
- Tversky, A., and Kahneman, D. (1981). The Framing of Decisions and the Psychology of Choice. Science, 211(4481), 453-458. https://doi.org/10.1126/science.7455683
- Xu, H., Dinev, T., Smith, J., and Hart, P. (2008). Examining the formation of individual's privacy concerns: toward an integrative view, International Conference on Information Systems (ICIS), 1-16.
- Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 135-174. https://doi.org/10.2753/MIS0742-1222260305
- Xu, H., Dinev, T., Smith, J., and Hart P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824. https://doi.org/10.17705/1jais.00281
- Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444. https://doi.org/10.17705/1jais.00092
- Walton, S. C., and Rice, R. E. (2013). Mediated disclosure on Twitter: the roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Computers in Human Behavior, 29, 1465-1474. https://doi.org/10.1016/j.chb.2013.01.033
- Zajonc R. B., and Marku, H. (1982). Affective and cognitive factors in preference. Journal of Consumer Research, 9(2), 121-131. https://doi.org/10.1086/208905
- Reisenzein, R. (2009). Emotional experience in the computational belief desire theory of emotion. Emotion Review, 1(3), 214-222. https://doi.org/10.1177/1754073909103589
- Verhagen, T., and van Dolen, W. (2011). The influence of online store beliefs on consumer online impulse buying: A model and empirical application. Information and Management, 48(8), 320-327. https://doi.org/10.1016/j.im.2011.08.001
- Yun, I. H., and Kwon, S. D. (2015). A study on the effects of information security compliance and responses to crises on trust in information security. Information Systems Review, 17(1), 141-169. https://doi.org/10.14329/isr.2014.17.1.141