1 |
Youn, Seounmi. "Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents." Journal of Consumer Affairs 43, no. 3 (2009): 389-418.
DOI
ScienceOn
|
2 |
Gurung, Anil, Xin Luo, and Qinyu Liao. "Consumer motivations in taking action against spyware: an empirical investigation." Information Management & Computer Security 17, no. 3 (2009): 276-289.
DOI
ScienceOn
|
3 |
Milne, George R., Andrew J. Rohm, and Shalini Bahl. "Consumers' protection of online privacy and identity." Journal of Consumer Affairs 38, no. 2 (2004): 217-232.
DOI
|
4 |
Buchanan, Tom, Carina Paine, Adam N. Joinson, and Ulf-Dietrich Reips. "Development of measures of online privacy concern and protection for use on the Internet." Journal of the American Society for Information Science and Technology 58, no. 2 (2007): 157-165.
DOI
ScienceOn
|
5 |
LaRose, Robert, Nora Rifon, Sunny Liu, and Doohwang Lee. "Understanding online safety behavior: A multivariate model." In The 55th Annual Conference of the International Communication Association, New York City. 2005.
|
6 |
Bandura, Albert. "Self-efficacy: toward a unifying theory of behavioral change." Psychological review 84, no. 2 (1977): 191.
DOI
ScienceOn
|
7 |
Milne, George R., Lauren I. Labrecque, and Cory Cromer. "Toward an understanding of the online consumer's risky behavior and protection practices." Journal of Consumer Affairs 43, no. 3 (2009): 449-473.
DOI
ScienceOn
|
8 |
Yao, Mike Z., and Daniel G. Linz. "Predicting self-protections of online privacy." CyberPsychology & Behavior 11, no. 5 (2008): 615-617.
DOI
|
9 |
J. Hun Park and Suk Hyun Lee. "Privacy,User Behavior,User Attitude, Attitude-Behavior Inconsistency,Path Analysis." Korean Journal of Public Administration 45, no. 1 (2007): 281-307.
|
10 |
Jun Hong Kim. "The Effects of Victimization Experiences as Internal Cues to Action on Preventive Behavioral Intentions in Cyber Communication: Modifying Health Belief Model." Journal of Cybercommunication 27, no. 3 (2010): 5-46.
|
11 |
Lee, Doohwang, Robert Larose, and Nora Rifon. "Keeping our network safe: a model of online protection behaviour." Behaviour & Information Technology 27, no. 5 (2008): 445-454.
DOI
ScienceOn
|
12 |
Zhang, Lixuan, and William C. McDowell. "Am I really at risk? Determinants of online users' intentions to use strong passwords." Journal of Internet Commerce 8, no. 3-4 (2009): 180-197.
DOI
ScienceOn
|
13 |
Mattson, Marifran. "Toward a reconceptualization of communication cues to action in the health belief model: HIV test counseling." Communications Monographs 66, no. 3 (1999): 240-265.
DOI
|
14 |
Wonchang Jang, and Ilsoon Shin. "The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior*." Journal of The Korea Institute of Information Security and Cryptology 22, no. 6 (2012): 1419-1427.
과학기술학회마을
|
15 |
Min Sik Lee. "The Reactions to Cybercrime Victimization: Testing a Generic Model.." Jounal of Victimology 10, no. 2 (2002): 209-247
|
16 |
Jihye Kim. "Analysis of the consumer privacy protection behavior in online based on protection motivation theory." Doctoral Dissertation, Seoul National University (2010).
|
17 |
Hoffman, Donna L., Thomas P. Novak, and Patrali Chatterjee. "Commercial scenarios for the Web: opportunities and challenges." Journal of Computer-Mediated Communication 1, no. 3 (1995): 0-0.
|
18 |
McCole, Patrick, Elaine Ramsey, and John Williams. "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns." Journal of Business Research 63, no. 9 (2010): 1018-1024.
DOI
|
19 |
Song, J. J. "SPSS/AMOS statistical analytic method for thesis." Paju: 21C Book Company (2008).
|
20 |
Warren, Samuel D., and Louis D. Brandeis. "The right to privacy." Harvard law review 4, no. 5 (1890): 193-220.
DOI
ScienceOn
|
21 |
Mayer-Schonberger, Viktor. "The Internet and Privacy Legislation: Cookies for a Treat?." Computer Law & Security Review 14, no. 3 (1998): 166-174.
DOI
|
22 |
DeCew, Judith W. In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, 1997.
|
23 |
McCullagh, Karen. "Blogging: self presentation and privacy." Information & communications technology law 17, no. 1 (2008): 3-23.
DOI
|
24 |
Lee, Mi-Na, and Shim, Jae-Woong. "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy." Media, gender&culture 12 (2009): 166-190
|
25 |
Ki, Sojin, and Lee, Sooyoung. "Exploring Categories of SNS User on the Basis of Privacy Concern and Self-Efficacy." Korean Journal of Journalism & Communication Studies 57, no. 1 (2013): 81-110.
|
26 |
Culnan, Mary J. "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use." Mis Quarterly 17, no. 3 (1993): 341-363.
DOI
ScienceOn
|
27 |
Choi, Hyuk-ra, and Shin, Jeoung-shin. "Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users." Journal of information technology applications & m 16, no. 3 (2007): 21-44.
|
28 |
Rogers, Ronald W. "A Protection Motivation Theory of Fear Appeals and Attitude Change1." The Journal of Psychology 91, no. 1 (1975): 93-114.
DOI
ScienceOn
|
29 |
Rogers, Ronald W. "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation." Social psychophysiology (1983): 153-176.
|
30 |
Ifinedo, Princely. "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory." Computers & Security 31, no. 1 (2012): 83-95.
DOI
|
31 |
Kim, Jongki, and Kim, Sanghee. "Privacy Protection Behavior of Online User : Based on Privacy Paradox Perspective" The Journal of internet electronic commerce research 13, no. 1 (2013): 41-64.
DOI
|
32 |
Maddux, James E., and Ronald W. Rogers. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19, no. 5 (1983): 469-479.
DOI
|
33 |
Woon, Irene, Gek-Woo Tan, and R. Low. "A protection motivation theory approach to home wireless security." (2005).
|
34 |
Chenoweth, Tim, Robert Minch, and Tom Gattiker. "Application of protection motivation theory to adoption of protective technologies." In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, pp. 1-10. IEEE, 2009.
|
35 |
Lee, Younghwa. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50, no. 2 (2011): 361-369.
DOI
ScienceOn
|
36 |
Workman, Michael, William H. Bommer, and Detmar Straub. "The amplification effects of procedural justice on a threat control model of information systems security behaviours." Behaviour & Information Technology 28, no. 6 (2009): 563-575.
DOI
|
37 |
Liang, Huigang, and Yajiong Xue. "Understanding security behaviors in personal computer usage: A threat avoidance perspective." Journal of the Association for Information Systems 11, no. 7 (2010): 394-413.
DOI
|
38 |
Johnston, Allen C., and Merrill Warkentin. "Fear appeals and information security behaviors: an empirical study." MIS quarterly 34, no. 3 (2010): 549-566.
DOI
|
39 |
Bum-suk Jee, Liu Fan, Sang-Chul Lee, Yung-Ho Suh. "Personal information Protection behavior for Information quality: Health psychology Therory perspectives" Journal of the Korean Society for Quality Management 39, no. 3 (2011): 432-443.
과학기술학회마을
|
40 |
Heider, Fritz. "Attitudes and cognitive organization." The Journal of psychology 21, no. 1 (1946): 107-112.
DOI
ScienceOn
|
41 |
HyungJinWoo. "Exploring the Relationship between Television News Viewing and Audiences' Intention to the Health Promotion." Korean Journal of Journalism & Communication Studies 51, no. 2 (2007): 308-333.
|
42 |
Chan, Ricky YK. "Determinants of Chinese consumers' green purchase behavior." Psychology & Marketing 18, no. 4 (2001): 389-413.
DOI
|
43 |
Youn, Seounmi. "Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach." Journal of Broadcasting & Electronic Media 49, no. 1 (2005): 86-110.
DOI
ScienceOn
|