1 |
A.L. Allen, "Dredging up the past: Lifelogging, memory, and surveillance", The University of Chicago Law Review, Vol.75. No.1, pp. 47-74, 2008.
|
2 |
C. Conley, "The Right to Delete", In AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.
|
3 |
V. Bush, "As we may think", The atlantic monthly, Vol.176. No.1, pp. 101-108, 1945.
|
4 |
R. Whitaker, "The end of privacy: How total surveillance is becoming a reality", The New Press, 1999.
|
5 |
F. Webster and K. Robbins, "Information Technology: A Luddite Analysis", Ablex, N.J. 1986.
|
6 |
C.G. Bell, and J. Gemmell, "Total recall: How the e-memory revolution will change everything", New York: Dutton, 2009.
|
7 |
E. Schmidt, and J. Cohen, "The new digital age, Reshaping the Future of People", Nations and Business Hodder And Stoughton Limited, 2013.
|
8 |
White house, "CONSUMER DATA PRIVACY IN A NETWORKED WORLD: A FRAMEWORK FOR PROTECTING PRIVACY AND PROMOTING INNOVATION IN THE GLOBAL DIGITAL ECONOMY", from http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, 2012
|
9 |
J. Gemmell, G. Bell, R. Lueder, S. Drucker, and C. Wong, "MyLifeBits: fulfilling the Memex vision", In Proceedings of the tenth ACM international conference on Multimedia, ACM, pp. 235-238, 2002.
|
10 |
A.J. Sellen, A. Fogg, M. Aitken, S. Hodges, C. Rother, and K. Wood, "Do life-logging technologies support memory for the past?: an experimental study using sensecam", In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, pp. 81-90, 2007.
|
11 |
D. Stuttard, and M. Pinto, "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws", John Wiley & Sons, 2011.
|
12 |
J.S. Huh, "A Study on the Problem of SNS's Infringement of Personal Information and its Countermeasures", Journal of Media Law, Ethics and Policy Research, Vol.9. No.2, pp. 75-103, 2010.
|
13 |
J. Jarvis, "Public parts: How sharing in the digital age improves the way we work and live", Simon and Schuster, 2011.
|
14 |
C.O. Ross, E. S. Sisic, M. Arseneault, J.M. M.G. Simmering, and R.R. Orr, "Personality and motivations associated with Facebook use", Computers in Human Behavior, Vol.25. No.2, pp. 578-586, 2009.
DOI
|
15 |
D.J. Solove, "The future of reputation: Gossip, rumor, and privacy on the Internet", Yale University Press, 2007.
|
16 |
V. Mayer-Schonberger, "Delete: the virtue of forgetting in the digital age", Princeton University Press, 2011.
|
17 |
J. Palfrey, and U. Gasser, "Born digital: Understanding the first generation of digital natives", Basic Books, 2013.
|
18 |
J. Bonneau, and S. Preibusch, "The privacy jungle: On the market for data protection in social networks", In Economics of information security and privacy, Springer US, pp. 121-167, 2010.
|
19 |
M. McLuhan, "Understanding media: The extensions of man", MIT press, 1994.
|
20 |
K.J. Song, "Feature: IT-based evolution of communication: SNS and smartphone that combines social media", Korea Local Information Research & Development Institute, Vol.64, pp. 4-9, 2010.
|
21 |
L. Winner, "Do artifacts have politics", Daedalus, Vol.109, No.1, pp. 121-136, 1980.
|
22 |
D.F. Noble, "Forces of Production: A Social History of Industrial Automation", Alfred. A. Knopf, New York, 1984.
|
23 |
S.W. Lee, B.M. Park, J.M. Kim, and S.W. Kim, "A case for flash memory ssd in enterprise database applications", In Proceedings of the 2008 ACM SIGMOD international conference on Management of data. ACM, pp. 1075-1086, 2008.
|
24 |
W.W. Chin, "The partial least squares approach to structural equation modeling", Modern methods for business research, Vol.295. No.2, pp. 295-336, 1998.
|
25 |
K.M. Park, J.Y. Hwang, and K.H. Kwon, "The Impact of Competitive Strategy, Decentralization, and the Application of IT on Performance", Journal of Strategic Management, Vol.8. No.1, pp. 113-135, 2005.
|
26 |
M.J. Kim, "Study on the Model for Information and Culture", KADO, 2009.
|
27 |
J. Greenberg, "Understanding metadata and metadata schemes", Cataloging & classification quarterly, Vol.40, No.3-4, pp. 17-36, 2005.
DOI
|
28 |
R. Anderson, "Security engineering", John Wiley & Sons. 2008.
|
29 |
D.J. Solove, "The digital person: Technology and privacy in the information age", NYU Press, 2004.
|
30 |
F.D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS quarterly, Vol.13. No.3, pp. 319-340, 1989.
DOI
|
31 |
M. Fishbein, and I. Ajzen, "Belief, attitude, intention, and behavior: An introduction to theory and research", Reading, MA: Addison-Wesley, 1975.
|
32 |
A.L. Lederer, J.M. Donna, P.S. Mark, and Z. Youlong, "The Technology Acceptance Model and the World Wide Web", Decision Support Systems, Vol.29. No.3, pp. 269-282, 2000.
DOI
|
33 |
R. Agarwal and J, Prasad, "The Role if Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technology," Decision science, Vol.28. No.3, pp. 557-582, 1997.
DOI
|
34 |
A.F. Westin, "Privacy and freedom", Washington and Lee Law Review, Vol.25. No.1, pp. 166-170, 1968.
|
35 |
D.A. Adams, R.R. Nelson, and P.A. Todd, "Perceived Usefulness, Ease of Use, and Usage of Information Technology : A Replication", MIS Quarterly, Vol.16. No.2, pp. 227-248, 1992.
DOI
|
36 |
A.L. Cavaye, "User participation in system development revisited", Information & Management, Vol.28. No.5, pp. 311-323, 1995.
DOI
|
37 |
S.D. Warren, and L.D. Brandeis, "The right to privacy", Harvard law review, Vol.4. No.5, pp. 193-220, 1890.
DOI
|
38 |
J. Kang, "Information privacy in cyber-space transactions", Stanford Law Review, Vol.50. No.4, pp. 1193-1294, 1998.
DOI
|
39 |
M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993.
DOI
|
40 |
M.N. Lee and J.W. Shim, "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy", Media, gender&culture, Vol.12, pp. 165-190, 2009.
|
41 |
J.Y. Shin, and H.D. Yang, "The Effects of Perceived Privacy Infringement and the Moderators on On-Line Community Activities in BLOG", Inspiring Insight in Business Society, Vol.35. No.1, pp. 81-108, 2006.
|
42 |
KISA, "A study on Internet users use SNS Survey", 2009.
|
43 |
F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, and G. Lai, "A study of the human flesh search engine: crowd-powered expansion of online knowledge", Computer, Vol.43. No.8, pp. 45-53, 2010.
DOI
|
44 |
P. Kotler, K.L. Keller, F. Ancarani, and M. Costabile, "Marketing management", 14/e. Pearson, 2014.
|
45 |
F.V Cespedes, and H.J. Smith, "Database marketing: new rules for policy and practice", Sloan Management Review, Vol.34. No.4, pp. 7-23, 1993.
|
46 |
J.N. Sheth, and A. Parvatiyar, "The evolution of relationship marketing", International Business Review, Vol.4. No.4, pp. 397-418, 1995.
DOI
|
47 |
C. Flavian, M. Guinaliu, and R. Gurrea, "The role played by perceived usability, satisfaction and consumer trust on website loyalty", Information & Management, Vol.43. No.1, pp. 1-14, 2006.
DOI
|
48 |
R.E. Anderson, and S.S. Srinivasan, "E-satisfaction and e-loyalty: a contingency framework", Psychology and Marketing, Vol.20. No.2, pp. 123-138, 2003.
DOI
|
49 |
D.H. Holtzman, "Privacy lost: how technology is endangering your privacy", John Wiley & Sons, 2006.
|
50 |
J.H. Park and S.H. Lee, "Path Analysis of User Attitudes and Behaviors Toward Information Privacy", Korea administrative argument, Vol.45. No.1, pp. 281-307, 2007.
|
51 |
G.R. Milne, L.I. Labrecque, and C. Cromer, "Toward an understanding of the online consumer's risky behavior and protection practices", Journal of Consumer Affairs, Vol.43. No.3, pp. 449-473, 2009.
DOI
|
52 |
M.Z. Yao, and D.G. Linz, "Predicting self-protections of online privacy", CyberPsychology & Behavior, Vol.11. No.5, pp. 615-617, 2008.
DOI
|
53 |
M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993.
DOI
|
54 |
C. Fornell, and F.L. Bookstein, "Two structural equation models: LISREL and PLS applied to consumer exit-voice theory", Journal of Marketing research, Vol.19. No.4, pp. 440-452, 1982.
DOI
|
55 |
B.H. Wixom, and H.J. Watson, "An empirical investigation of the factors affecting data warehousing success", MIS quarterly, Vol.25. No.1, pp. 17-41, 2001
DOI
|
56 |
A. Rai, R. Patnayakuni, and N. Seth, "Firm performance impacts of digitally enabled supply chain integration capabilities", MIS quarterly, Vol.30. No.2, pp. 225-246, 2006.
DOI
|
57 |
R. Agarwal and E. Karahanna, "Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage", MIS quarterly, Vol.24. No.4, pp. 665-694, 2000.
DOI
|
58 |
R.F. Falk and N.B. Miller, A Primer on Soft Modeling. The University of Akron Press, Akron, OH, 1992.
|
59 |
D.L. Schacter, and P. Graf, "Effects of elaborative processing on implicit and explicit memory for new associations", Journal of experimental psychology: learning, memory, and cognition, Vol.12. No.3, pp. 432, 1986.
DOI
|
60 |
F. Werro, "The right to inform v. the right to be forgotten: A transatlantic clash", Georgetown University Law Center. Public Law and Legal Theory Research Paper Series, Paper 2, 2009.
|
61 |
D. Lyon, "Surveillance as social sorting: Privacy, risk, and digital discrimination", Psychology Press, 2003.
|
62 |
M. Igbaria, and J. Iivari, "The effects of self-efficacy on computer usage", Omega: International Journal of Management Science, Vol.23. No.6, pp. 587-605, 1995.
DOI
|
63 |
S.C. Park, G.S. Jung, and J.R. Lee, "An Empirical Study on Factors Affecting the Acceptance of Internet", Korean Management Review, Vol.29. No.4, pp. 885-909, 2000.
|
64 |
KCC, "How will my information is exposed to Twitter??". from http://kcc.go.kr, 2011.
|
65 |
T. Buchanan, C. Paine, A.N. Joinson, and U.D. Reips, "Development of measures of online privacy concern and protection for use on the Internet", Journal of the American Society for Information Science and Technology, Vol.58. No.2, pp. 157-165, 2007.
DOI
|