1 |
Beaudoin, C. E., "Explaining the relationship between Internet use and interpersonal trust : Taking into account motivation and information overload", Journal of Computer- Mediated Communication, Vol.13, No.3(2008), 550-568.
DOI
|
2 |
Dinev, T. and P. Hart, "An extended privacy calculus model for e-commerce transactions", Information Systems Research, Vol. 17, No.1(2006), 61-80.
DOI
ScienceOn
|
3 |
Furneaux, B. and M. Wade, "The end of the information system life : a model of is discontinuance", SIGMIS Database, Vol.41, No2(2010), 45-69.
DOI
|
4 |
Featherman, M. S. and P. A. Pavlou, "Predic ting e-services adoption : a perceived risk facets perspective", International Journal of Human-Computer Studies, Vol.59, No.4 (2003), 451-474.
DOI
ScienceOn
|
5 |
Fogel, J. and E. Nehmad, "Internet social network communities : Risk taking, trust, and privacy concerns", Computers in Human Behavior , Vol.25, No.1(2009), 153-160.
DOI
ScienceOn
|
6 |
Havlena, W. J. and W. S. DeSarbo, DeSarbo, On the Measurement of Perceived Consumer Risk", Decision Sciences, Vol.22, No.4 (1991), 927-939.
DOI
|
7 |
Jo, D. H., J. W. Park, and H. J. Chun, "The relationships among perceived value, usediffusion, loyalty of mobile instant messaging service", Journal of Intelligence and Information Systems, Vol.17, No.4(2011), 193-212.
|
8 |
Kim, H., I. Son, and D. Lee, "The Viral Effect of Online Social Network on New Products Promotion : Investigating Information Diffusion on Twitter", Journal of Intelligence and Information Systems, Vol.18, No.2(2012), 107-130.
|
9 |
Kim, M. S., H. J. Kim, M. O. Kim, and H. J. Kim, "A Study on the User Resistance to IPTV", The Journal of Society for e-Business Studies, Vol.15, No.2(2010), 205-217.
|
10 |
Kim, S. S. and N. K. Malhotra,, "A Longitudinal Model of Continued Is Use : An Integrative View of Four Mechanisms Underlying Postadoption Phenomena", Management Science, Vol.51, No.5(2005), 741-755.
DOI
ScienceOn
|
11 |
Ku, G. T. and H. J. Choi, "A Study of the impact of information overload on emotional and physical health", Korean Political Communication Association, Vol.16, No.1(2010), 5-32.
|
12 |
Lapointe, L. and S. Rivard, "A multilevel model of resistance to information technology implementation", MIS Quarterly, Vol.29, No.3(2005), 461-491.
DOI
|
13 |
Mason, R. O., "Four ethical issues of the information age", MIS Quarterly, Vol.10, No.1 (1986), 5-12.
DOI
ScienceOn
|
14 |
Ahn, C. W. and S. G. Hwang, "Big Data technologies and main issues", J ournal of Korean Institute of Information Scientist and Engineers, Vol.30, No.6(2012), 10-17.
과학기술학회마을
|
15 |
Bhattacherjee, A., "Understanding Information Systems Continuance : An Expectation- Confirmation Model", MIS Quarterly, Vol. 25, No.3(2001), 351-370.
DOI
ScienceOn
|
16 |
Norberg, P. A., D. R. Horne, and D. A. Horne, "The privacy paradox : Personal information disclosure intentions versus behaviors", Journal of Consumer Affairs, Vol.41, No.1 (2007), 100-126.
DOI
ScienceOn
|
17 |
Pavlou, P. A. and D. Gefen, "Building Effective Online Marketplaces with Institution- Based Trust", Information Systems Research, Vol.15, No.1(2004), 37-59.
DOI
ScienceOn
|
18 |
Ryu, I., K. Y. Nah, and H. R. Choi, "A Study on the Factor of User Resistance to Electronic Commerce", The Journal of Information Technology, Vol.2, No.1(1999), 108-130.
|
19 |
Peslak, A. R., "PAPA revisited : A current empirical study of the Mason framework", Journal of Computer Information Systems, Vol.46, No.3(2006), 117-123.
|
20 |
Ram, S., "A Model of Innovation Resistance", Advances in Consumer Research, Vol.14, No.1(1987), 208-212.
|
21 |
Sanford, C. and H. Oh, "The role of user resistance in the adoption of a mobile data service", Cyber psychology, Behavior, and Social Networking, Vol.13, No.6(2012), 663-672.
|
22 |
Schultz, U. and Vandenbosch, B., "Information overload in a groupware environment: Now you see it, now you don't", Journal of Organizational Computing and Electronic Commerce, Vol.8, No.2(1998), 127-148.
DOI
ScienceOn
|
23 |
Watters, A., "The age of exabytes : Tools and approaches for managing big data", 2012.
|
24 |
Lee, Y. and O. Kwon, "Model based approach to estimating privacy concerns for context- aware services", Journal of Intelligence and Information Systems, Vol.16, No.2(2009), 97-111.
|
25 |
Korea Communication Commision National Internet Development Agency of Korea, "Survey on Internet users' SNS use", 2009.
|
26 |
McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", 2011.
|