1 |
Jung, E. J., McKnight, D. H., Jung, E., & Lankton, N. K. (2011). The surprising lack of effect of privacy concerns on intention to use online social networks. In AMCIS.
|
2 |
차훈상 (2012). 스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용. Asia Pacific Journal of Information Systems, 22(4), 7-29.
|
3 |
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
|
4 |
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003.
DOI
|
5 |
Dogruel, L., Joeckel, S., & Vitak, J. (2017). The valuation of privacy premium features for smartphone apps: The influence of defaults and expert recommendations. Computers in Human Behavior, 77, 230-239.
DOI
|
6 |
Egele, M., Kruegel, C., Kirda, E., & Vigna, G. (2011, February). PiOS: Detecting privacy leaks in iOS applications. In NDSS, 177-183.
|
7 |
Freitas, A. L., Liberman, N., & Higgins, E. T. (2002). Regulatory fit and resisting temptation during goal pursuit. Journal of Experimental Social Psychology, 38(3), 291-298.
DOI
|
8 |
Nagy, M. S. (2002). Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology, 75(1), 77-86.
DOI
|
9 |
Crowe, E., & Higgins, E. T. (1997). Regulatory focus and strategic inclinations: Promotion and prevention in decision-making. Organizational Behavior and Human Decision Processes, 69(2), 117-132.
DOI
|
10 |
Gutierrez, A., O'Leary, S., Rana, N. P., Dwivedi, Y. K., & Calle, T. (2019). Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor. Computers in Human Behavior, 95, 295-306.
DOI
|
11 |
Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing theory and Practice, 19(2), 139-152.
DOI
|
12 |
Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595.
DOI
|
13 |
Jozani, M., Ayaburi, E., Ko, M., & Choo, K. K. R. (2020). Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Computers in Human Behavior, 107, 106260.
DOI
|
14 |
Kline, P. (2000). Test construction: Factor analytic and item analytic methods. In Handbook of psychological testing (2nd ed., pp. 161-181). London: Routledge.
|
15 |
Oliver, R. L. (1980). A cognitive model of the antecedents and consequences of satisfaction decisions. Journal of Marketing Research, 17(4), 460-469.
DOI
|
16 |
Lee, A. Y., & Aaker, J. L. (2004). Bringing the frame into focus: the influence of regulatory fit on processing fluency and persuasion. Journal of Personality and Social Psychology, 86(2), 205-218.
DOI
|
17 |
Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
|
18 |
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
DOI
|
19 |
Pentina, I., Zhang, L., Bata, H., & Chen, Y. (2016). Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior, 65, 409-419.
DOI
|
20 |
Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174.
DOI
|
21 |
박지영, 곽기영 (2019). SNS 사용자의 자기노출 행동 동기요인. 경영학연구, 48(2), 561-587.
|
22 |
김기호, 이형용 (2017). 조절 초점에 따른 개인 특성이 스마트 결제시스템 수용에 미치는 영향. 지식경영연구, 18(4), 213-235.
DOI
|
23 |
김미량, 김재운, 황선환 (2010). 진지한 여가척도(SLIM)의 단일문항측정 적용검토. 한국여가레크리에이션학회지, 34(4), 147-156.
|
24 |
김은진, 박재진 (2016). 조절초점 이론과 TAM 모델의 결합을 통한 해외직구 소비자 행동 연구. 사회과학연구, 27(4), 47-66.
|
25 |
오선주 (2014). 사용자 유형에 따른 모바일 앱 구매요인에 관한 연구. Information Systems Review, 16(1), 73-88.
DOI
|
26 |
유재호, 이애리, 김경규 (2016). 페이스북에서의 프라이버시 패러독스 현상 연구: 듀얼팩터이론을 중심으로. 지식경영연구, 17(1), 17-47.
|
27 |
Wottrich, V. M., Van Reijmersdal, E. A., & Smit, E. G. (2018). The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns. Decision Support Systems, 106, 44-52.
DOI
|
28 |
Buck, C., Horbel, C., Kessler, T., & Christian, C. (2014). Mobile consumer apps: Big data brother is watching you. Marketing Review St. Gallen, 31(1), 26-35.
DOI
|
29 |
Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94.
DOI
|
30 |
Beinat, E. (2001). Privacy and location-based services: Stating the policies clearly. GeoInformatics, 4, 14-17.
|
31 |
이애리, 안효영 (2016). 핀테크 사용에 대한 정보프라이버시 염려와 이용자 저항에 대한 연구: 조절초점성향과의 상호작용 효과 고찰. 정보보호학회논문지, 26(1), 209-226.
DOI
|
32 |
Robins, R. W., Hendin, H. M., & Trzesniewski, K. H. (2001). Measuring global self-esteem: Construct validation of a single-item measure and the Rosenberg Self-Esteem Scale. Personality and Social Psychology Bulletin, 27(2), 151-161.
DOI
|
33 |
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196.
DOI
|
34 |
Wang, E. S. T., & Lin, R. L. (2017). Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behaviour & Information Technology, 36(1), 2-10.
|
35 |
Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users' concerns for information privacy. 33rd International Conference on Information Systems, 1-16.
|
36 |
Wang, J., & Lee, A. Y. (2006). The role of regulatory focus in preference construction. Journal of Marketing Research, 43(1), 28-38.
DOI
|
37 |
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.
DOI
|
38 |
Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's privacy concerns: Toward an integrative view. ICIS 2008 Proceedings, 6.
|
39 |
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
DOI
|
40 |
Clarke, R. (2001). Person location and person tracking-Technologies, risks and policy implications. Information Technology & People, 14(2), 206-231.
DOI
|
41 |
Higgins, E. T. (1997). Beyond pleasure and pain. American Psychologist, 52(12), 1280-1300.
DOI
|
42 |
김병수 (2012). 모바일 소셜네트워크서비스 환경에서 지속사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할. 지식경영연구, 13(4), 83-100.
DOI
|
43 |
서봉군, 박도형 (2020). 온라인 메신저 서비스에서의 이모티콘 사용 동기: 조절초점 성향을 중심으로. 지식경영연구, 21(2), 101-118.
DOI
|
44 |
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
DOI
|
45 |
이승호, 김창식, 곽기영 (2016). 인스타그램 고객의 지속적 사용의도 결정요인: 성별의 조절효과를 중심으로. 디지털산업정보학회지, 12(2), 61-72.
|
46 |
Androulidakis, I., & Kandus, G. (2011, April). Mobile phone security awareness and practices of students in budapest. In Proceedings of the 6th International Conference on Digital Telecommunications, 17-22.
|
47 |
Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly, 25(3), 351-370.
DOI
|
48 |
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... & Sheth, A. N. (2014). TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems(TOCS), 32(2), 1-29.
|
49 |
George, D., & Mallery, M. (2003). Using SPSS for Windows step by step: A simple guide and reference. Pearson Education India.
|
50 |
Higgins, E. T., Idson, L. C., Freitas, A. L., Spiegel, S., & Molden, D. C. (2003). Transfer of value from fit. Journal of Personality and Social Psychology, 84(6), 1140-1153.
DOI
|
51 |
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1(1-2), 45-71.
DOI
|
52 |
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42.
DOI
|
53 |
Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52.
DOI
|
54 |
Lockwood, P., Jordan, C. H., & Kunda, Z. (2002). Motivation by positive or negative role models: Regulatory focus determines who will best inspire us. Journal of Personality and Social Psychology, 83(4), 854-864.
DOI
|
55 |
Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.
DOI
|
56 |
Mosteller, J., & Poddar, A. (2017). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors. Journal of Interactive Marketing, 39, 27-38.
DOI
|
57 |
PWC (2014). Wearable technology future is ripe for growth-most notably among millennials. Available at: http://www.pwc.com/us/en/press-releases/2014/wearable-technology-future.html
|
58 |
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204.
DOI
|
59 |
Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531-542.
DOI
|
60 |
Xu, H., & Teo, H. H. (2004). Alleviating consumers' privacy concerns in location-based services: A psychological control perspective. ICIS 2004 Proceedings, 64.
|
61 |
Krasnova, H., & Veltri, N. F. (2010, January). Privacy calculus on social networking sites: Explorative evidence from Germany and USA. In 2010 43rd Hawaii International Conference on System Sciences, IEEE, 1-10.
|