References
- 고형석 (2003), "가상공간과 개인정보보",. 인터넷전자상거래연구, 3(2), 37-64.
- 김경규.류성렬.김문오.김효진 (2009), "모바일 웹 브라우징 서비스의 사용 의도에 영향을 미치는 요인: 자기효능감과 사회적 영향", Journal of Information Technology Applications and Management, 16(1), 149-168.
- 김상현.박현선 (2013), "프라이버시 보호인식 및 보호행동의도에 미치는 영향 요인과 프라이버시 침해경험의 조절효과에 관한 연구", 인터넷전자상거래연구, 13(4), 79-105.
- 김용복 (2013), "일본 우경화, 한일관계 그리고 동아시아: 과거사 갈등과 영토분쟁", 경제와 사회, 99, 36-62.
- 김종기.김상희 (2013), "온라인 사용자의 프라이버시 보호행동에 대한 연구: 프라이버시 역설 관점에서", 인터넷전자상거래연구, 13(1), 41-64.
- 나윤규 (2010), "확장된 기술수용모형(ETAM)을 이용한 인터넷 쇼핑몰 패션상품 구매행동 연구: 지각된 가치와 위험 및 신뢰의 영향을 중심으로", 인터넷전자상거래연구, 10(3), 27-49.
- 박용완.김희영 (2016), "스마트폰 분실 위험과 경쟁 제품에 대한 점화(priming)가 모바일 결제서비스에 대한 소비자 태도에 미치는 영향", 경영학연구, 45(3), 849-868.
- 반현.최원석.신성혜 (2004), "유권자의 투표 선택과 뉴스 미디어의 점화효과: 17 대 총선의 선거 이슈를 중심으로", 한국방송학보, 18(4), 398-443.
- 손승혜.최윤정.황하성 (2011), "기술수용모델을 이용한 초기 이용자들의 스마트폰 채택 행동 연구", 한국언론학보, 55(2), 227-251.
- 양승호.황윤성.박재기 (2016), "통합기술수용이론(UTAUT)에 의한 핀테크 결제서비스 사용의도에 관한 연구", 경영경제연구, 38(1), 183-209.
- 이선민.전승우 (2022), "진보와 보수, 소비자 불매운동을 향한 서로 다른 시선: 노재팬 불매운동에 관한 신문기사 프레임 분석", 소비문화연구, 25(3), 37-56. https://doi.org/10.17053/JCC.2022.25.3.003
- 이원덕 (2005), "한일 과거사 갈등의 구조와 해법 모색", 세계지역연구논총, 23(2), 197-220.
- 이응규 (2003), "보안에 대한 우려와 거래 파트너가 인터넷 뱅킹 사용에 미치는 영향: 확장되고 수정된 기술수용모형", 대한산업공학회 춘계공동학술대회 논문집, 2003(5), 44-52.
- 이정기.최믿음.박성복 (2012), "대학생들의 신문 이용동기와 기술수용모델 변인이 유료 모바일 뉴스 콘텐츠 수용의도에 미치는 영향", 미디어 경제와 문화, 10(3), 129-172.
- 장기영 (2017), "안보위협이 과거사 인식에 미치는 영향: 한일 일본군 위안부 협상 타결에 관한 국내여론 분석", 국제정치논총, 57(4), 45-73.
- 장두영.이충기 (2020), "COVID-19 위험인식과 건강의식이 보호동기와 행동의도에 미치는 영향", 호텔경영학연구, 29(7), 191-208.
- 장영일.정유수 (2018), "기술수용모형(TAM)을 통한 암호화 화폐 투자요인 분석", e-비즈니스연구, 19(2), 139-158.
- 정보희.김한구 (2016), "소비자의 지위추구동기가 자국 브랜드 제품선호에 미치는 영향: 애국심 점화의 조절효과를 중심으로", 마케팅논집, 24(1), 125-144.
- 조은희.조성겸 (2013), "사회조사에서 사진자료의 점화효과 분석", 한국콘텐츠학회논문지, 13(5), 126-134. https://doi.org/10.5392/JKCA.2013.13.05.126
- 조재희 (2014), "건강관련 앱의 지속적 이용에 대한 인지적.사회적 요인: 사회적 영향을 포함한 확장된 기술수용모델(TAM II)을 중심으로", 홍보학 연구, 18(1), 212-241.
- 최성원 (2021), "동일방법편의 확인 및 대응을 위한 CFA 마커 테크닉의 고찰과 용례", 경영교육연구, 36(2), 245-265.
- 허수동 (2015), "일본 과거사 문제와 한중의 대응", 일본문화연구, 53, 431-447.
- 황상현.이진영 (2022), "패널자료를 활용한 대학생 중도탈락 결정요인 분석", 아태비즈니스연구, 13(3), 361-373.
- Abbas, F. A. M. and B. Al-Shargabi (2020), "Secure and lightweight encryption model for IoT surveillance camera", International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 1840-1847. https://doi.org/10.30534/ijatcse/2020/143922020
- Bansal, G., F. M. Zahedi and D. Gefen (2015), "The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern", European Journal of Information Systems, 24(4), 624-644. https://doi.org/10.1057/ejis.2014.41
- Bargh, J. A., M. Chen and L. Burrows (1996), "Automaticity of social behavior: Direct effects of trait construct and stereotype activation on action", Journal of Personality and Social Psychology, 71(2), 230-244. https://doi.org/10.1037/0022-3514.71.2.230
- Bryan, C. J., C. S. Dweck, L. Ross, A. C. Kay and N. O. Mislavsky (2009), "Political mindset: Effects of schema priming on liberal-conservative political positions", Journal of Experimental Social Psychology, 45(4), 890-895. https://doi.org/10.1016/j.jesp.2009.04.007
- Dhagarra, D., M. Goswami and G. Kumar (2020), "Impact of trust and privacy concerns on technology acceptance in healthcare: An Indian perspective", International Journal of Medical Informatics, 141, 104164.
- Dinev, T. and P. Hart (2006), "An extended privacy calculus model for e-commerce transactions", Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Doberstein, C., E. Charbonneau, G. Morin and S. Despatie (2022), "Measuring the acceptability of facial recognition-enabled work surveillance cameras in the public and private sector", Public Performance and Management Review, 45(1), 198-227. https://doi.org/10.1080/15309576.2021.1931374
- Floyd, D. L., S. Prentice-Dunn and R. W. Rogers (2000), "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, 30(2), 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Glidden-Tracey, C. and A. K. Greenwood (1997), "A validation study of the Spanish Self-Directed Search using back-translation procedures", Journal of Career Assessment, 5(1), 105-113. https://doi.org/10.1177/106907279700500107
- Gonzalez-Bailon, S., D. Lazer, P. Barbera, M. Zhang, H. Allcott, T. Brown and J. A. Tucker (2023), "Asymmetric ideological segregation in exposure to political news on Facebook", Science, 381(6656), 392-398. https://doi.org/10.1126/science.ade7138
- Granic, A. and N. Marangunic (2019), "Technology acceptance model in educational context: A systematic literature review", British Journal of Educational Technology, 50(5), 2572-2593. https://doi.org/10.1111/bjet.12864
- Herath, T. and H. R. Rao (2009), "Protection motivation and deterrence: A framework for security policy compliance in organisations", European Journal of Information Systems, 18(3), 106-125. https://doi.org/10.1057/ejis.2009.6
- Hermans, D., J. De Houwer and P. Eelen (2001), "A time course analysis of the affective priming effect", Cognition and Emotion, 15(2), 143-165. https://doi.org/10.1080/02699930125768
- Hou, Y. and C. W. Poliquin (2023), "The effects of CEO activism: Partisan consumer behavior and its duration", Strategic Management Journal, 44(3), 672-703. https://doi.org/10.1002/smj.3451
- Hwang, Y., H. Shin, K. Kim and S. H. Jeong (2023), "The effect of augmented reality and privacy priming in a fashion-related app: An application of technology acceptance model", Cyberpsychology Behavior and Social Networking, 26(3), 214-220. https://doi.org/10.1089/cyber.2022.0071
- Hyun, K. D., J. Kim and S. Sun (2014), "News use, nationalism, and Internet use motivations as predictors of anti-Japanese political actions in China", Asian Journal of Communication, 24(6), 589-604. https://doi.org/10.1080/01292986.2014.944922
- Ifinedo, P. (2012), "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory", Computers and Security, 31(1), 83-95. https://doi.org/10.1016/j.cose.2011.10.007
- Josiassen, A., F. Kock, A. G. Assaf and A. Berbekova (2023), "The role of affinity and animosity on solidarity with Ukraine and hospitality outcomes", Tourism Management, 96, 104712.
- Klein, A. and H. Moosbrugger (2000), "Maximum likelihood estimation of latent interaction effects with the LMS method", Psychometrika, 65(4), 457-474. https://doi.org/10.1007/BF02296338
- Kyroglou, G. and M. Henn (2022), "Pulled in and pushed out of politics: The impact of neoliberalism on young people's differing political consumerist motivations in the UK and Greece", International Political Science Review, 43(2), 279-294. https://doi.org/10.1177/0192512120935521
- Lai, P. C. (2017), "Security as an extension to TAM model: Consumers' intention to use a single platform E-Payment", Asia-Pacific Journal of Management Research and Innovation, 13(3), 110-119. https://doi.org/10.1177/2319510X18776405
- Lee, Y. (2011), "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective", Decision Support Systems, 50(2), 361-369. https://doi.org/10.1016/j.dss.2010.07.009
- Le, T. and J. Zhang (2022, August 10). "From a History Problem to a History of Problems", Tokyo Review.
- Little, T. D., J. A. Bovaird and K. F. Widaman (2006), "On the merits of orthogonalizing powered and product terms: Implications for modeling interactions among latent variables", Structural Equation Modeling, 13(4), 497-519. https://doi.org/10.1207/s15328007sem1304_1
- Martin, K. and R. E. Freeman (2003), "Some problems with employee monitoring", Journal of Business Ethics, 43(4), 353-361. https://doi.org/10.1023/A:1023014112461
- Maslowsky, J., J. Jager and D. Hemken (2015), "Estimating and interpreting latent variable interactions: A tutorial for applying the latent moderated structural equations method", International Journal of Behavioral Development, 39(1), 87-96. https://doi.org/10.1177/0165025414552301
- McCaughey, J. W., I. Mundir, P. Daly, S. Mahdi and A. Patt (2017), "Trust and distrust of tsunami vertical evacuation buildings: Extending protection motivation theory to examine choices under social influence", International Journal of Disaster Risk Reduction, 24(4), 462-473. https://doi.org/10.1016/j.ijdrr.2017.06.016
- Minton, E. A., T. B. Cornwell and L. R. Kahle (2017), "A theoretical review of consumer priming: Prospective theory, retrospective theory, and the affective-behavioral-cognitive model", Journal of Consumer Behaviour, 16(4), 309-321. https://doi.org/10.1002/cb.1624
- Neilson, L. A. (2010), "Boycott or buycott? Understanding political consumerism", Journal of Consumer Behaviour, 9(3), 214-227. https://doi.org/10.1002/cb.313
- Patel, K. J. and H. J. Patel (2018), "Adoption of internet banking services in Gujarat: An extension of TAM with perceived security and social influence", International Journal of Bank Marketing, 36(1), 147-169. https://doi.org/10.1108/IJBM-08-2016-0104
- Ping, R. A. (1996), "Latent variable interaction and quadratic effect estimation: A two-step technique using structural equation analysis", Psychological Bulletin, 119(1), 166-175. https://doi.org/10.1037/0033-2909.119.1.166
- Polatoglu, V. N. and S. Ekin (2001), "An empirical investigation of the Turkish consumers' acceptance of Internet banking services", International Journal of Bank Marketing, 19(4), 156-165. https://doi.org/10.1108/02652320110392527
- Radel, R., P. Sarrazin, P. Legrain and L. Gobance (2009), "Subliminal priming of motivational orientation in educational settings: Effect on academic performance moderated by mindfulness", Journal of Research in Personality, 43(4), 695-698. https://doi.org/10.1016/j.jrp.2009.02.011
- Ratten, V. (2015), "A cross-cultural comparison of online behavioural advertising knowledge, online privacy concerns and social networking using the technology acceptance model and social cognitive theory", Journal of Science and Technology Policy Management, 6(1), 25-36. https://doi.org/10.1108/JSTPM-06-2014-0029
- Ravid, D. M., J. C. White, D. L. Tomczak, A. F. Miles and T. S. Behrend (2023), "A meta-analysis of the effects of electronic performance monitoring on work outcomes", Personnel Psychology, 76(1), 5-40. https://doi.org/10.1111/peps.12514
- Reynolds, I. and S. Kang (2023, August 18). "Why South Korea-Japan Ties Are Plagued by History", Bloomberg.
- Rogers, R. W. (1975), "A protection motivation theory of fear appeals and attitude change", Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Schoorman, F. D., R. C. Mayer and J. H. Davis (2007), "An integrative model of organizational trust: Past, present, and future", Academy of Management review, 32(2), 344-354. https://doi.org/10.5465/amr.2007.24348410
- Sengupta, A. (2022), "Perception and purchase behavior of young Indian consumers towards Chinese products under the backdrop of their economic and political rivalry", Journal of Public Affairs, 22(1), e2388.
- Stockmann, D. (2010), "Who believes propaganda? Media effects during the anti-Japanese protests in Beijing", China Quarterly, 2010(202), 269-289. https://doi.org/10.1017/S0305741010000238
- Thiel, C. E., J. Bonner, J. T. Bush, D. T. Welsh and N. Garud (2023), "Stripped of agency: The paradoxical effect of employee monitoring on deviance", Journal of Management, 49(2), 709-740. https://doi.org/10.1177/01492063211053224
- Venkatesh, V. and F. D. Davis (2000), "A theoretical extension of the technology acceptance model: Four longitudinal field studies", Management Science, 46(2), 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- Wallace, J. L. and J. C. Weiss (2015), "The political geography of nationalist protest in China: Cities and the 2012 anti-Japanese protests", China Quarterly, 2015(222), 403-429. https://doi.org/10.1017/S0305741015000417
- Wang, E. S. (2022), "Contested fandom and nationalism: How K-Pop fans perform political consumerism in China", Global Media and China, 7(2), 202-218. https://doi.org/10.1177/20594364221093768
- Warnick, B. (2007), "Surveillance cameras in schools: An ethical analysis", Harvard Educational Review, 77(3), 317-343. https://doi.org/10.17763/haer.77.3.r2k76507rrjw8238
- Wong, W. H. and W. Y. Mo (2019), "A study of consumer intention of mobile payment in Hong Kong, based on perceived risk, perceived trust, perceived security and Technological Acceptance Model", Journal of Advanced Management Science, 7(2), 33-38. https://doi.org/10.18178/joams.7.2.33-38
- Yang, Q., Q. Mei, C. Fan, M. Ma and X. Li (2023), "Environment-aware worker trajectory prediction using surveillance camera in modular construction facilities", Buildings, 13(6), 1502.
- Yi, Y. (1990), "Cognitive and affective priming effects of the context for print advertisements", Journal of Advertising, 19(2), 40-48. https://doi.org/10.1080/00913367.1990.10673186
- Yoo, J. J. and W. N. Lee (2016), "Calling it out: The impact of national identity on consumer response to ads with a patriotic theme", Journal of Advertising, 45(2), 244-255. https://doi.org/10.1080/00913367.2015.1065778
- Zhao, L. and H. Xiaoyi (2021), "An analysis of the anti-Japanese national united front and its formation process from the perspective of game theory", International Journal of English and Cultural Studies, 4(1), 59-61. https://doi.org/10.11114/ijecs.v4i1.5225
- Zhou, H., X. Xing and Z. Lu (2022), "A study on the effect of user experience of fitness APP on product trust and purchase intention", Asia Pacific Journal of Business, 13(3), 1-18. https://doi.org/10.32599/apjb.13.3.202209.1