Determinants of the Intention to Protect Personal Information among Facebook Users |
Chon, Bum Soo
(Department of Journalism & Communication, Hanyang University)
Lee, Jeong-Ki (Center for Teaching & Learning, Hanyang University) Jeong, HyeonJu (Department of Advertising and Public Relations, Catholic Kwandong University) Park, Jowon (Department of Journalism & Communication, Hanyang University) Park, Jonghwa (School of Management Engineering, Ulsan National Institute of Science and Technology) |
1 | M. Fishbein and I. Ajzen, Beliefs, Attitude, Intention and Behaviour: An Introduction to Theory and Research, Reading, MA, USA: Addison-Wesley, 1975. |
2 | F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology," Manage. Sci., vol. 35, no. 8, Aug. 1989, pp. 982-1003. DOI |
3 | D. Boyd and N. Ellison, "Social Network Sites: Definition, History and Scholarship," J. Comput. Mediated. Commun., vol. 13, no. 1, Oct. 2007, pp. 210-230. DOI |
4 | M. Thelwall, "Social Network Sites: Users and Uses," Adv. Comput., vol. 76, 2009, pp. 19-73. |
5 | J. Shah and E.T. Higgins, "Expectancy Value Effects: Regulatory Focus as Determinant of Magnitude and Direction," J. Personality Soc. Psychol., vol. 73, no. 3, Sept. 1997, pp. 447-458. DOI |
6 | N. Park, K.M. Lee, and P.H. Cheong. "University Instructors' Acceptance of Electronic Course Ware: An Application of the Technology Acceptance Model," J. Comput. Medicated Commun., vol. 13, no. 1, Oct. 2007, pp. 163-186. DOI |
7 | D. Gefen and D.W. Straub, "Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model," MIS Quarterly, vol. 21, no. 4, Dec. 1997, pp. 389-400. DOI |
8 | G. Choi and H. Chung, "Applying the Technology Acceptance Model to Social Networking Sites (SNS): Impact of Subjective Norm and Social Capital on the Acceptance of SNS," Int. J. Human Comput. Interaction, vol. 29, no. 10, Jan. 2013, pp. 619-628. DOI |
9 | I. Ajzen, "The Theory of Planned Behavior," Organizational Behavior Human Decision Process., vol. 50, no. 2, Dec. 1991, pp. 179-211. DOI |
10 | R. Rogers, "Cognitive and Psychological Processes in Fear-Based Attitude Change: A Revised Theory of Protection Motivation. In Social Psychophysiology: A Sourcebook, New York, USA: Guilford Press, 1983, pp. 153-176. |
11 | C.L. Anderson and R. Agarwal, "Practicing Safe Computing: A Multi-Method Empirical Examination of Home Computer User Security Behavioral Intention," MIS Quarterly, vol. 34, no. 3, 2010, pp. 613-643. DOI |
12 | K.H. Beck and A. Frankel, "The Effects of Health Threat Seriousness and Personal Efficacy Upon Intentions and Behavior," J. Appl. Social Psychol., vol. 11, 1981, pp. 401-415. DOI |
13 | Y.H. Lee, "Understanding Anti-Plagiarism Software Adaption: An Extended Protection Motivation Theory," Decision Support Syst., vol. 50, no. 2, 2011, pp. 361-369. DOI |
14 | Y.H. Lee and K.R. Larsen, "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," Eur. J. Inform. Syst., vol. 18, 2009, pp. 177-187. DOI |
15 | N. Mohamed and J.H. Ahmad, "Information Privacy Concerns, Antecedents and Privacy Measure Use in Social Networking Sites: Evidence from Malaysia," Comput. Human Behavior, vol. 28, no. 6, 2012, pp. 2366-2375. DOI |
16 | V. Venkatesh and F.D. Davis, "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Manage. Sci., vol. 46, no. 2, 2000, pp. 186-204. DOI |
17 | I. Ajzen, "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior," J. Appl. Soc. Psychol., vol. 32, 2002, pp. 665-683. DOI |
18 | X. Wang and S.R. McClung, "Toward a Detailed Understanding of Illegal Digital Downloading Intentions: An Extended Theory of Planned Behavior Approach," New Media Soc., vol. 13, no. 4, 2011, pp. 663-677. DOI |
19 | B. Bulgurcu, H. Cavusoglu, and I. Banbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, vol. 34, no. 3, 2010, pp. 523-548. DOI |
20 | P. Ifinedo, "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Comput. Security, vol. 31, no. 1, 2012, pp. 83-95. DOI |
21 | Y. Lu, T. Zhou, and B. Wang, "Exploring Chinese Users' Acceptance of Instant Messaging Using the Theory of Planned Behavior, the Technology Acceptance Model, and the Flow Theory," Comput. Human Behavior, vol. 25, no. 1, Jan. 2009, pp. 29-39. DOI |
22 | M.C. Lee, "Factors Influencing the Adoption of Internet Banking: An Integration of TAM and TPB with Perceived Risk and Perceived Benefit," Electron. Commerce Res. Appl., vol. 8, no. 3, 2009, pp. 130-141. DOI |
23 | F.D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, no. 3, Sept. 1989, pp. 318-339. |
24 | M. Hajli, "An Integrated Model for E-Commerce Adoption at the Customer Level with the Impact of Social Commerce," Int. J. Inform. Sci. Manage., Special Issue, 2012, pp. 77-97. |
25 | D. Gefen and D.W. Straub, "Consumer Trust in B2C E-Commerce and the Importance of Social Presence: Experiments in E-Products and E-Services," Omega, vol. 32, no. 6, 2004, pp. 407-424. DOI |
26 | I.A. Junglas, N.A. Johnson, and C. Spitzmuller, "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services," Eur. J. Inform. Syst., vol. 17, no. 4, 2008, pp. 387-402. DOI |
27 | S. Livingstone, K. Olafsson, and E. Staksrud, Social Networking, Age and Privacy, LSE, London, EU Kids Online, 2011. |
28 | Y. Al-Saggaf and S. Nielsen, "Self-Disclosure on Facebook Among Female Users and its Relationship to Feelings of Loneliness," Comput. Human Behavior, vol. 36, July 2014, pp. 460-468. DOI |