1 |
Yusun Park, "Who Controls the User's Privacy on Social Networking Sites?," Journal of Industrial Property, 37, pp.337-375, 2012.
|
2 |
Mina Lee, Seungah Leek, Inhye Choi, "Analysis of the Facebook Profiles for Korean Users: Description and Determinants," Journal of Internet Computing and Services, 15(2), pp.73-85, 2014.
DOI
|
3 |
R. A. Ward, "Discovering Facebook: Social Network Subpoenas and the Stored Communications Act," Harvard Journal of Law & Technology, (24)2, pp.585, 2011.
|
4 |
KISA, 2010 Survey on the Internet Usage, 2010.
|
5 |
Hyun-Sun Park, Sanghyun Kim, "An Empirical Study on SNS users' Privacy Protection Behaviors," Business Management Review, 46(2), pp.69-91, 2013.
|
6 |
Mi-Na Lee, Jae-Woong Shim,"The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy," Media, Gender & Culture, 12, pp.165-190, 2009.
|
7 |
B. Johnson, "Facebook information should be regulated," The Guardian Thu 5 June, 2008.
|
8 |
Jaewan Moon, "The Korean Way of Balancing Two Fundamental Rights, the Right to Be Forgotten and the Right to Know," Journal of Media Law Ethics and Policy Research, 10(2), pp.1-37, 2011.
|
9 |
Mina Lee, Seungah Lee, Inhye Choi, "Analysis of the Facebook Profiles for Korean Users: Description and Determinants," Journal of Internet Computing and Services, 15(2), pp.73-85, 2014.
DOI
|
10 |
Hong-Je Lee, Hyeong-Seog Kho, Eun-Hee Roh, Kyeong-Seok Han, "A Study on the Factors of Experience and Habit on Information Security Behavior of New Services," Journal of Digital Contents Society, 19(1), pp.93-102, 2018.
DOI
|
11 |
Kyeong-Eun Min, Sung-Jun Kim, Du-Soon Kwon, "The Effects on Privacy Protection Behavior through Mobile Messenger Security Awareness and Security intention," Daehan Academy of Management Information Systems, 35(1), pp.207-233, 2016.
|
12 |
J. Cave, C. Marsden, and S. Simmons, Options for and Effectiveness of Internet Self and Co-regulation, RAND, 2008.
|
13 |
Minkyung Kim, Sooyoung Cho, "How Korean Government Agencies use SNS and How Visitors Respond? - A Content Analysis of 18 Korean Government Agencies' Facebook and Visitors' Comments," Journal of Public Relations, 19(3), pp.1-37, 2015.
|
14 |
Jeong Won Jeong, "The Posting and Retransmission of SNS Posts, and Defamation on the Internet," Journal of Law and Politics Research, 12(3), pp.839-862, 2012.
|
15 |
Yong-Suk Hwang, "The Analysis of Content Regulation on Social Network Service(SNS): Focusing on the Problem of Legal and Administrative Regulation," Korean Journal of Communication & Information, 58, pp.106-129, 2012.
|
16 |
I Kant, Kritik der Urteilskraft, Berlin und Libau, 1790.
|
17 |
H. Liang and Y. Xue, "Understanding security behaviors in personal computer usage: a threat avoidance perspective," Journal of the Association for Information Systems, 7(2), pp.393-413, 2010.
|
18 |
Min Jung Baek, Seyung Hee Sohn, "A Study on the Effect of Information Security Awareness and Behavior on the Information Security Performance in Small and Medium Sized Organization," Asia Pacific Journal of Small Business, 33(2), pp.113-132, 2011.
|
19 |
Il-han Yoon, Sun-dong Kwon, "Effects of Life-log Experience on Technology Satisfaction and Perception of Right to be Forgotten," Journal of The Korea Institute of Information Security & Cryptology, 26(3), pp.837-852, 2016.
DOI
|
20 |
R. W. Rogers, "A protection motivation theory of fear appeals and attitude change," Journal of Psychology, 91(1), pp.93-114, 1975.
DOI
|
21 |
A. Ellis, Reason and Emotion in Psychotherapy, Birch Lane Press Book, 1994.
|
22 |
R. L. Oliver, "Whence Consumer Loyalty?" Journal of Marketing, 63(4), pp.33-44, 1999.
|
23 |
T. J. Holt, "Examining the Role of Technology in the Formation of Deviant Subcultures." Social Science Computer Review, 28(4), pp. 466-481, 2010.
DOI
|
24 |
Sae-Bom Lee, Liu Fan, Sang-Chul Lee, Yung-Ho Suh, "Effects of Self Presentation and Privacy Concern on an Individual's Self Disclosure : An Empirical Study on Twitter," Korean Management Science Review, 29(2), pp.1-20, 2012.
DOI
|
25 |
S. Youn, "Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach," Journal of Broadcasting & Electronic Media, 49(1), pp.86-110, 2005.
DOI
|
26 |
Dongwon Jo, "Hacking and leakage of personal information in the information culture based on its value production and user labour," Culture Research, 1(1), pp.84-116, 2012.
|
27 |
E. Goffman, The presentation of self in everyday life, New York:Doubleday, 1959.
|
28 |
Eun-mee Kim, June-Woong Rhee, Hyun-Mi Jang, "The Effects of Blog Motivations and the Perception Toward the Size of Audience on Blogging and the Intention to Continue Blogging Focusing on Bloggers as Interactive Media Users," Korean Journal of Broadcasting and Telecommunication Studies, 25(6), pp.162-203, 2011.
|
29 |
Cholong Wi, Sundong Kwon, "The Effect of Cognition of Personal Information Leakage Controllability on Affection and Conation: Focused on Comparing between External Hacking and Internal Leakage," Korea Business Review, 46(6), pp.1555-1576, 2017.
|
30 |
Wonchang Jang, Ilsoon Shin, "The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior," Journal of The Korea Institute of Information Security & Cryptology, 22(6), pp.1419-1427, 2012.
|
31 |
Kyo-Heon Kim, Doug-Woong Hahn, "Effects of Goal and Spontaneity of High Self-Disclosure and Anger Tendency on Physiological Arousal, Catharsis, and Self-Evaluation," Korean Journal of Health Psychology, 1(1), pp.66-88, 1996.
|