Acknowledgement
This work was supported by Institute for Information and communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No: 2018-0-00261, GDPR Compliant Personally Identifiable Information Management Technology for IoT Environment) and the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2018S1A5A2A01039413).
References
- An, B. K., Lee, D. S., Lee, J. S., Park, Y. S., Song, H. S., and Park, S. Y. (2004). Strongly fluorescent organogel system comprising fibrillar self-assembly of a trifluoromethyl-based cyanostilbene derivative. Journal of the American Chemical Society, 126(33), 10232-10233. https://doi.org/10.1021/ja046215g
- Angst, C. M., and Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370. https://doi.org/10.2307/20650295
- Bandura, A. (1986). Fearful expectations and avoidant actions as coeffects of perceived self-inefficacy. American Psychologist, 41(12), 1389-1391. https://doi.org/10.1037/0003-066X.41.12.1389
- Borgelt, K. B., and Mayer, G. N. (1995). U.S. Patent No. 5,398,285. Washington, DC: U.S. Patent and Trademark Office.
- Carino, N. J., and Malhotra, V. M. (eds.). (2004). Handbook on nondestructive testing of concrete. CRC Press.
- Cheung, M. Y., Luo, C., Sia, C. L., and Chen, H. (2009). Credibility of electronic word-of-mouth: Informational and normative determinants of on-line consumer recommendations. International Journal of Electronic Commerce, 13(4), 9-38. https://doi.org/10.2753/JEC1086-4415130402
- Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
- Choi, Y., Choi, M., Kim, M., Ha, J. W., Kim, S., and Choo, J. (2018). Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8789-8797.
- Corbitt, B. J., Thanasankit, T., and Yi, H. (2003). Trust and e-commerce: A study of consumer perceptions. Electronic Commerce Research and Applications, 2(3), 203-215. https://doi.org/10.1016/S1567-4223(03)00024-3
- Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334. https://doi.org/10.1007/BF02310555
- Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Dwyer, C., Guthold, M., Falvo, M., Washburn, S., Superfine, R., and Erie, D. (2002). DNA-functionalized single-walled carbon nanotubes. Nanotechnology, 13(5), 601-604. https://doi.org/10.1088/0957-4484/13/5/311
- Falk, R. F., and Miller, N. B. (1992). A primer for soft modeling. University of Akron Press.
- Ajzen,I., and Fishbein, M. (1977). Attitude-behavior relations: A theoreticalanalysis and review of empirical research. Psychological bulletin, 84(5),888.
- Fornell, C., and Cha, J. (1994). Advanced methods of marketing research, ed. RP Bagozzi.
- Fornell, C., and Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388. https://doi.org/10.1177/002224378101800313
- Fortin, D. R., Westin, S., and Mundorf, N. (1997). On the predispositions toward information technology: A three-way cross-cultural study. Telematics and Informatics, 14(2), 145-157. https://doi.org/10.1016/S0736-5853(96)00030-5
- Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 33(3), 38-53. https://doi.org/10.1145/569905.569910
- Gefen, D., and Straub, D. W. (2000). The relative importance of perceived ease of use in IS adoption: A study of e-commerce adoption. Journal of the Association for Information Systems, 1(1), 8.
- Gong, X., Zhang, K. Z., Zhao, S. J., and Lee, M. K. (2016). The effects of cognitive and emotional trust on mobile payment adoption: A trust transfer perspective. PACIS 2016 Proceedings, p. 350.
- Hair, A. (1998). Tatham, and black. Multivariate Analysis.
- Harris, M. B., and Miller, K. C. (2000). Gender and perceptions of danger. Sex Roles, 43(11-12), 843-863. https://doi.org/10.1023/A:1011036905770
- Herbig, J., Kraemer, T., Mark, M., Weber, T., Chin, C., Nagerl, H. C., and Grimm, R. (2003). Preparation of a pure molecular quantum gas. Science, 301(5639), 1510-1513. https://doi.org/10.1126/science.1088876
- Hietz, P., and Briones, O. (1998). Correlation between water relations and within-canopy distribution of epiphytic ferns in a Mexican cloud forest. Oecologia, 114(3), 305-316. https://doi.org/10.1007/s004420050452
- Hoy, M. G., and Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28-45. https://doi.org/10.1080/15252019.2010.10722168
- Hsu, L. C. (2017). Investigating community members' purchase intention on Facebook fan page. Industrial Management & Data Systems, 117(5), 766-800. https://doi.org/10.1108/IMDS-05-2016-0180
- Huang, N. E. (2014). Hilbert-Huang transform and its applications (Vol. 16). World Scientific.
- Kalina, E., and Laufer, H. (1974). Aos pais de adolescentes. Cobra Norato.
- Kehoe, C., and Guzdial, M. (1997). What we know about technological support for project-based learning. 1997 ASEE/IEEE Frontiers in Education Conference Proceedings.
- Keil, M., Tan, B. C., Wei, K. K., Saarinen, T., Tuunainen, V., and Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24(2), 299-325. https://doi.org/10.2307/3250940
- Kharpal, A. (2017, January 19). Google co-founder Sergey Brin says he's 'surprised' by pace of A.I. and uses a story of a cat to explain it. CNBC. Retrieved from https://www.cnbc.com/2017/01/19/google-co-founder-sergey-brin-said-he-is-surprised-by-pace-of-ai.html
- Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45. https://doi.org/10.2753/MIS0742-1222240401
- Komiak, S. X., and Benbasat, I. (2004). Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Information Technology and Management, 5(1-2), 181-207. https://doi.org/10.1023/B:ITEM.0000008081.55563.d4
- Komiak, S. Y., and Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941-960. https://doi.org/10.2307/25148760
- Kramarae, C., and Taylor, H. J. (1993). Women and men on electronic networks: A conversation or a monologue. Women, Information Technology, and Scholarship, 52-61.
- Lee, E. J. (2005). Creating value for online shoppers: Implications for satisfaction and loyalty. ACR Asia-Pacific Advances, 6, 370.
- Lewis, K., Kaufman, J., and Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-mediated Communication, 14(1), 79-100. https://doi.org/10.1111/j.1083-6101.2008.01432.x
- Li, H., Sarathy, R., and Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. https://doi.org/10.1016/j.dss.2011.01.017
- Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. CAIS, 28, 28.
- Luhmann, N. (1979). 1979 Trust and power. Chichester: Wiley.
- McKnight, R., and Anderson, G. (2002). System andmethod for providing distributed computing services. U.S. PatentApplication No. 09/847,828.
- Metzger, C. H., and Karrai, K. (2004). Cavity cooling of a microlever. Nature, 432(7020), 1002-1005. https://doi.org/10.1038/nature03118
- Mikulincer, M., and Nachshon, O. (1991). Attachment styles and patterns of self-disclosure. Journal of Personality and Social Psychology, 61(2), 321.
- Miller, J. D., Few, L. R., Wilson, L., Gentile, B., Widiger, T. A., MacKillop, J., and Keith, C. W. (2013). The Five-Factor Narcissism Inventory (FFNI): A test of the convergent, discriminant, and incremental validity of FFNI scores in clinical and community samples. Psychological Assessment, 25(3), 748.
- Milne, G. R., and Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206-215. https://doi.org/10.1177/074391569101200206
- Moschis, G. P., and Churchill Jr, G. A. (1978). Consumer socialization: A theoretical and empirical analysis. Journal of Marketing Research, 15(4), 599-609. https://doi.org/10.1177/002224377801500409
- Nowak, G. J., and Phelps, J. E. (1992). Understanding privacy concerns: An assessment of consumers' information-related knowledge and beliefs. Journal of Direct Marketing, 6(4), 28-39. https://doi.org/10.1002/dir.4000060407
- Nunnally, J. C., and Bernstein, I. H. (1967). McGraw-Hill series in psychology. Psychometric theory. New York, NY, US: McGraw-Hill.
- Page, X., Kobsa, A., and Knijnenburg, B. P. (201). Don't disturb my circles! Boundary preservation is at the center of location-sharing concerns. In Sixth International AAAI Conference on Weblogs and Social Media.
- Park, K., Kwak, C., Lee, J., and Ahn, J. H. (2018). The effect of platform characteristics on the adoption of smart speakers: Empirical evidence in South Korea. Telematics and Informatics, 35(8), 2118-2132. https://doi.org/10.1016/j.tele.2018.07.013
- Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134. https://doi.org/10.1080/10864415.2003.11044275
- Novas, F. P., Garcia, J. S. M., Ortiz, J. C., and Jimenez, P. M. (2011). Inteligencia emocional, celos, tendencia al abuso y estrategias de resolucion de conflicto en la pareja. Escritos de Psicologia (Internet), 4(1), 34-43. https://doi.org/10.24310/espsiescpsi.v4i1.13312
- Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Suny Press.
- Ringle, C. M., Wende, S., and Will, A. (2005). SmartPLS 2.0 M3 Beta. Hamburg.
- Rousseau, D. M. (1998). The 'problem' of the psychological contract considered. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 19(S1), 665-671. https://doi.org/10.1002/(SICI)1099-1379(1998)19:1+<665::AID-JOB972>3.0.CO;2-X
- Sanchez-Franco, M. J. (2006). Exploring the influence of gender on the web usage via partial least squares. Behavior & Information Technology, 25(1), 19-36. https://doi.org/10.1080/01449290500124536
- Schmidt, S. R., and Bohannon, J. N. (1988). In defense of the flashbulb-memory hypothesis: A comment on McCloskey, Wible, and Cohen.
- Seyal, A. H., and Pijpers, G. G. (2004). Senior government executives' use of the internet: A Bruneian scenario. Behavior & Information Technology, 23(3), 197-210. https://doi.org/10.1080/01449290410001669978
- Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73. https://doi.org/10.1509/jppm.19.1.62.16949
- Shin, D. H. (2015). Effect of the customer experience on satisfaction with smartphones: Assessing smart satisfaction index with partial least squares. Telecommunications Policy, 39(8), 627-641. https://doi.org/10.1016/j.telpol.2014.10.001
- Shin, D. H. (2017). Conceptualizing and measuring quality of experience of the internet of things: Exploring how quality is perceived by users. Information & Management, 54(8), 998-1011. https://doi.org/10.1016/j.im.2017.02.006
- Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. https://doi.org/10.2307/249477
- Stewart (2003). The 2007 survey on teaching writing: American public opinion on the importance of writing in schools.
- Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., and Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81-101. https://doi.org/10.1386/macp.6.1.81/1
- Taylor, S. L., Moneret-Vautrin, D. A., Crevel, R. W., Sheffield, D., Morisset, M., Dumont, P., ... and Baumert, J. L. (2010). Threshold dose for peanut: Risk characterization based upon diagnostic oral challenge of a series of 286 peanut-allergic individuals. Food and Chemical Toxicology, 48(3), 814-819. https://doi.org/10.1016/j.fct.2009.12.013
- Teo, T. S., and Liu, J. (2007). Consumer trust in e-commerce in the United States, Singapore and China. Omega, 35(1), 22-38. https://doi.org/10.1016/j.omega.2005.02.001
- Thakur, R. (2016). Understanding customer engagement and loyalty: A case of mobile devices for shopping. Journal of Retailing and Consumer Services, 32, 151-163. https://doi.org/10.1016/j.jretconser.2016.06.004
- Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704. https://doi.org/10.2307/25148660
- Venkatesh, V., and Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS quarterly, 115-139.
- Venkatesh, V., Thong, J. Y., and Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178. https://doi.org/10.2307/41410412
- Walton, J. C., Larson, J. A., Roberts, R. K., Lambert, D. M., English, B. C., Larkin, S. L., ... and Reeves, J. M. (2010). Factors influencing farmer adoption of portable computers for site-specific management: A case study for cotton production. Journal of Agricultural and Applied Economics, 42(2), 193-209. https://doi.org/10.1017/S1074070800003400
- Wan, S., Dras, M., Dale, R., and Paris, C. (2006). Using dependency-based features to take the 'para-farce' out of paraphrase. In Proceedings of the Australasian Language Technology Workshop 2006, 131-138.
- Wei, F. (2014). Sankardas Roy, Xinming Ou, and Robby. 2014. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS'14), 13, ACM, New York, NY, USA.
- Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453. https://doi.org/10.1111/1540-4560.00072
- Wetzels, M., Odekerken-Schroder, G., and Van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177-195. https://doi.org/10.2307/20650284
- Wilson, D., and Valacich, J. S. (2012). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. 33rd International Conference on Information Systems, Orlando.
- Wood, E., Zivcakova, L., Gentile, P., Archer, K., De Pasquale, D., and Nosko, A. (2012). Examining the impact of off-task multi-tasking with technology on real-time classroom learning. Computers & Education, 58(1), 365-374. https://doi.org/10.1016/j.compedu.2011.08.029
- Xu, D. J., Benbasat, I., and Cenfetelli, R. T. (2009). The effect of perceived service quality, perceived sacrifice and perceived service outcome on online customer loyalty. ICIS 2009 Proceedings, 175.
- Yang, X., Schiller, S., Teo, H. H., and Wang, Q. (2017). Decision confidence and purchase intention in software trials: A cognitive stopping rule perspective. AIS Transactions on Human-Computer Interaction, 9(2), 123-148. https://doi.org/10.17705/1thci.00092
- Yang, Z., Cai, S., Zhou, Z., and Zhou, N. (2005). Development and validation of an instrument to measure user perceived service quality of information presenting web portals. Information & Management, 42(4), 575-589. https://doi.org/10.1016/S0378-7206(04)00073-4
- Zhang, G., Liu, H., Qu, J., and Li, J. (2016). Two-dimensional layered MoS 2: Rational design, properties and electrochemical applications. Energy & Environmental Science, 9(4), 1190-1209. https://doi.org/10.1039/C5EE03761A
- Zhang, T., and Lin, W. (2014). Metal-organic frameworks for artificial photosynthesis and photocatalysis. Chemical Society Reviews, 43(16), 5982-5993. https://doi.org/10.1039/C4CS00103F
- Zhou, J. (2014). Multicatalyst system in asymmetric catalysis. John Wiley & Sons.
- Zhou, T. (2011). An empirical examination of initial trust in mobile banking. Internet Research, 21(5), 527-540. https://doi.org/10.1108/10662241111176353
- Zhou, T. (2013). An empirical examination of user adoption of location-based services. Electronic Commerce Research, 13(1), 25-39. https://doi.org/10.1007/s10660-013-9106-3