Acock, A. C. (2016). A gentle introduction to Stata. 5th ed. College Station, TX: Stata Press.
Adhikari, K., & Panda, R. K. (2018). Users' information privacy concerns and privacy protection behaviors in social networks. Journal of Global Marketing, 31(2), 96-110. doi:10.1080/08911762.2017.1412552
Ahituv, N., Bach, N., Birnhack, M., Soffer, T., & Luoto, L. (2014). New challenges to privacy due to emerging technologies and different privacy perceptions of younger generations: The EU PRACTIS project. Paper presented at Proceedings of Informing Science & IT Education Conference (InSITE), Wollongong, NSW, Australia.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intensions. MIS Quarterly, 34(3), 613-615. doi:10.2307/25750694
Andrade N. N. G. (2010) Data protection, privacy and identity: Distinguishing concepts and articulating rights. Paper presented at PrimeLife International Summer School, Helsingborg, Sweden.
Baker, C. K., & Carreño, P. K. (2016). Understanding the role of technology in adolescent dating and dating violence. Journal of Child and Family Studies, 25(1), 308-320. doi:10.1007/s10826-015-0196-5![new window](/gs32/images/newin.png)
Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84(2), 191. doi: 10.1037/0033-295X.84.2.191
Bandura, A. (2006). Guide for constructing self-efficacy scales. In F. Pajares & T. Urdan (Eds.), Self-efficacy beliefs of adolescents (pp. 307–337). Greenwich, CT: Information Age.
Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2010). Assessing causality in the relationship between adolescents’ risky sexual online behavior and their perceptions of this behavior. Journal of Youth and Adolescence, 39(10), 1226-1239. doi:10.1007/s10964-010-9512-y
Beldad, A. D., & Hegner, S. M. (2017). More photos from me to thee: Factors influencing the intention to continue sharing personal photos on an nnline social networking (OSN) site among young adults in the netherlands. International Journal of Human–Computer Interaction, 33(5), 410-422. doi:10.1080/10447318.2016.1254890
Beycioglu, K. (2009). A cyberphilosophical issue in education: Unethical computer using behavior – The case of prospective teachers. Computers & Education, 53(2), 201-208. doi:10.1016/j.compedu.2009.01.009
Birnholtz, J., Burke, M., & Steele, A. (2017). Untagging on social media: Who untags, what do they untag, and why? Computers in Human Behavior, 69, 166-173. doi:10.1016/j.chb.2016.12.008
Blin, F., & Munro, M. (2008). Why hasn’t technology disrupted academics’ teaching practices? Understanding resistance to change through the lens of activity theory. Computers & Education, 50(2), 475-490. doi:10.1016/j.compedu.2007.09.017
Boehmer, J., LaRose, R., Rifon, N., Alhabash, S., & Cotten, S. (2015). Determinants of online safety behaviour: Towards an intervention strategy for college students. Behaviour & Information Technology, 34(10), 1022-1035. doi:10.1080/0144929X.2015.1028448
Boillat, P., & Kjaerum, M. (2014). Handbook on European data protection law. Luxembourg: Publications Office of the European Union.
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864. doi:10.25300/MISQ/2015/39.4.5
Brown, T. A. (2014). Confirmatory factor analysis for applied research. 2nd ed. New York, NY: Guilford Press.
Byrne, B. M., Shavelson, R. J., & Muthén, B. (1989). Testing for the equivalence of factor covariance and mean structures: The issue of partial measurement invariance. Psychological Bulletin, 105(3), 456. doi:10.1037/0033-2909.105.3.456
Central News Agency. (2017). Taiwanese love to use social networking sites. Retrieved from https://technews.tw/2017/05/01/facebook-is-most-popular-social-network-in-taiwan/
Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167-182. doi:10.1109/TPC.2009.2017985
Chang, C.-H. (2014). Eyes on the road program in Taiwan-information privacy issues under the Taiwan Personal Data Protection Act. J. Marshall J. Info. Tech. & Privacy L., 31, 145.
Chang, C.-H. (2016). Controversy over Information Privacy arising from the Taiwan national health insurance database examining the Taiwan Taipei High Administrative Court Judgment No. 102-Su-36 (TSAI v. NHIA). Pace Int'l L. Rev., 28, 29.
Chang, C.-M., & Chou, C. (2015). An exploratory study of young students’ core virtues of e-character education: The Taiwanese teachers’ perspective. Journal of Moral Education, 44(4), 516-530. doi:10.1080/03057240.2015.1048791
Chen, F. F. (2007). Sensitivity of goodness of fit indexes to lack of measurement invariance. Structural Equation Modeling, 14, 464 –504.
Chen, H., Beaudoin, C. E., & Hong, T. (2016). Teen online information disclosure: Empirical testing of a protection motivation and social capital model. Journal of the Association for Information Science and Technology, 67(12), 2871-2881. doi:10.1002/asi.23567
Chen, J., Ping, J. W., Xu, Y. C., & Tan, B. C. (2015). Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management, 62(3), 311-324. doi:10.1109/TEM.2015.2432117
Cheung, G. W., & Rensvold, R. B. (2002). Evaluating goodness-of-fit indexes for testing measurement invariance. Structural Equation Modeling, 9(2), 233-255. doi: 10.1207/S15328007SEM0902_5
Cho, H. (2010). Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies. Journal of Information Privacy and Security, 6(1), 3-27. doi:10.1080/15536548.2010.10855879![new window](/gs32/images/newin.png)
Chou, H.-L., & Chen, C.-H. (2016). Beyond identifying privacy issues in e-learning settings – Implications for instructional designers. Computers & Education, 103, 124-133. doi:10.1016/j.compedu.2016.10.002
Chou, H.-L., & Chou, C. (2016). An analysis of multiple factors relating to teachers' problematic information security behavior. Computers in Human Behavior, 65, 334-345. doi:10.1016/j.chb.2016.08.034
Chou, H.-L., & Sun, J. C.-Y. (2017). The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers. Computers & Education, 112, 83-96. doi:10.1016/j.compedu.2017.05.003
Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? CyberPsychology & Behavior, 12(3), 341-345. doi:10.1089/cpb.2008.0226
Christofides, E., Muise, A., & Desmarais, S. (2012). Hey mom, what’s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Social Psychological and Personality Science, 3(1), 48-54. doi:10.1177/1948550611408619![new window](/gs32/images/newin.png)
Cuijpers, C. (2007). A private law approach to privacy; mandatory law obliged. SCRIPTed, 4, 304. doi:10.2966/scrip.040407.304
Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 48, 281-297. doi:10.1016/j.cose.2014.11.002.
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. doi:10.1111/j.1083-6101.2009.01494.x![new window](/gs32/images/newin.png)
DeGroot, J. M., & Vik, T. A. (2017). “We were not prepared to tell people yet”: Confidentiality breaches and boundary turbulence on Facebook. Computers in Human Behavior, 70, 351-359. doi:10.1016/j.chb.2017.01.016
Dhir, A. (2016). Why do young people avoid photo tagging? A new service avoidance scale. Social Science Computer Review, 35(4), 480-497. doi:10.1177/0894439316653636
Dhir, A., Kaur, P., Lonka, K., & Nieminen, M. (2016). Why do adolescents untag photos on Facebook? Computers in Human Behavior, 55(Part B), 1106-1115. doi:10.1016/j.chb.2015.11.017
Erdur-Baker, Ö. (2010). Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools. New Media & Society, 12(1), 109-125.![new window](/gs32/images/newin.png)
European Commission. (2017). Commission decisions on the adequacy of the protection of personal data in third countries. Retrieved from http://ec.europa.eu/justice/data-protection/international-transfers/adequacy/index_en.htm
Feng, Y., & Xie, W. (2014). Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153-162. doi:10.1016/j.chb.2014.01.009
Floyd, D. L., Prentice‐Dunn, S., & Rogers, R. W. (2000). A meta‐analysis of research on Protection Motivation Theory. Journal of Applied Social Psychology, 30(2), 407-429. doi:10.1111/j.1559-1816.2000.tb02323.x
Foulger, T. S., Ewbank, A. D., Kay, A., Popp, S. O., & Carter, H. L. (2009). Moral spaces in MySpace: Preservice teachers’ perspectives about ethical issues in social networking. Journal of Research on Technology in Education, 42(1), 1-28. doi:10.1080/15391523.2009.10782539![new window](/gs32/images/newin.png)
Greenleaf, G. (2012). Global data privacy laws: 89 countries, and accelerating. Queen Mary University of London, School of Law Legal Studies Research Paper No. 98/2012.
Greenleaf, G. (2014). Sheherezade and the 101 data privacy laws: Origins, significance and global trajectories. JL Inf. & Sci., 23, 4.
Gregorich, S. E. (2006). Do self-report instruments allow meaningful comparisons across diverse population groups? Testing measurement invariance using the confirmatory factor analysis framework. Medical Care, 44, S78-S94. doi:10.1097/01.mlr.0000245454.12228.8f
Griswold, E. N. (1960). Right to be let alone. Nw. UL Rev., 55, 216.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Paper presented at the Proceedings of ACM workshop on privacy in the electronic society, Alexandria, VA, USA.
Hanus, B., & Wu, Y. A. (2016). Impact of users’ security awareness on desktop security behavior: A Protection Motivation Theory perspective. Information Systems Management, 33(1), 2-16. doi:10.1080/10580530.2015.1117842![new window](/gs32/images/newin.png)
Heck, R. H., & Thomas, S. L. (2015). An introduction to multilevel modeling techniques: MLM and SEM approaches using Mplus. 3rd ed. New York, NY: Routledge.
Heirman, W., Walrave, M., Vermeulen, A., Ponnet, K., Vandebosch, H., Van Ouytsel, J., & Van Gool, E. (2016). An open book on Facebook? Examining the interdependence of adolescents’ privacy regulation strategies. Behaviour & Information Technology, 35(9), 706-719. doi:10.1080/0144929X.2016.1181210
Hofstra, B., Corten, R., & van Tubergen, F. (2016). Understanding the privacy behavior of adolescents on Facebook: The role of peers, popularity and trust. Computers in Human Behavior, 60, 611-621. doi:10.1016/j.chb.2016.02.091
Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies, 23(1), 33-50. doi:10.1080/14786011003634415![new window](/gs32/images/newin.png)
Hsu, C.-W., Wang, C.-C., & Tai, Y.-T. (2011). The closer the relationship, the more the interaction on Facebook? Investigating the case of Taiwan users. Cyberpsychology, Behavior, and Social Networking, 14(7/8), 473-476. doi:10.1089/cyber.2010.0267
Huffaker, D. A., & Calvert, S. L. (2005). Gender, identity, and language use in teenage blogs. Journal of Computer‐Mediated Communication, 10(2). doi:10.1111/j.1083-6101.2005.tb00238.x
Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1 - 55.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. doi:10.1016/j.cose.2011.10.007![new window](/gs32/images/newin.png)
James, T. L., Wallace, L., Warkentin, M., Kim, B. C., & Collignon, S. E. (2017). Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Information & management, 54(7), 851-865. doi:10.1016/j.im.2017.01.001
Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, 20(2), 196-213. doi:10.1080/02681102.2013.814040
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566. doi:10.2307/25750691
Jones, H., & Soltren, J. H. (2005). Facebook: Threats to privacy. Project MAC: MIT Project on Mathematics and Computing, 1, 1-76.![new window](/gs32/images/newin.png)
Kalis, S. M. (2014). Google Spain SL, Google Inc. v. Agencia Espanola de Proteccion de Datos, Mario Costeja Gonzalez: An entitlement to erasure and its endlenss effects. Tul. J. Int'l & Comp. L., 23, 589.
Kalven, H. (1966). Privacy in tort law: Were Warren and Brandeis wrong? Law and Contemporary Problems, 31(2), 326-341. doi:10.2307/1190675
Kim, S., Jeong, S.-H., & Hwang, Y. (2013). Predictors of pro-environmental behaviors of American and Korean students: The application of the theory of reasoned action and protection motivation theory. Science Communication, 35(2), 168-188.
Kline, R. B. (2015). Principles and practice of structural equation modeling. 4th ed. New York, NY: Guilford press.
Kolek, E. A., & Saunders, D. (2008). Online disclosure: An empirical examination of undergraduate Facebook profiles. NASPA Journal (National Association of Student Personnel Administrators, Inc.), 45(1), 1-25. doi:10.2202/0027-6014.1905![new window](/gs32/images/newin.png)
Koohikamali, M., & Gerhart, N. (2016). Concern for Privacy of Self and Others: Sharing Behavior, and Engagement. Paper presented at Americas Conference on Information Systems, San Diego.
Koohikamali, M., Peak, D. A., & Prybutok, V. R. (2017). Beyond self-disclosure: Disclosure of information about others in social network sites. Computers in Human Behavior, 69, 29-42. doi:10.1016/j.chb.2016.12.012
Korzaan, M. L., & Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4), 15-24. doi:10.1080/08874417.2008.11646031
Kramer, I. R. (1989). The birth of privacy law: A century since Warren and Brandeis. Cath. UL Rev., 39, 703.
Lampinen, A., Tamminen, S., & Oulasvirta, A. (2009). All my people right here, right now: management of group co-presence on a social networking site. Paper presented at the Proceedings of ACM international conference on supporting group work.
Lang, C., & Barton, H. (2015). Just untag it: Exploring the management of undesirable Facebook photos. Computers in Human Behavior, 43, 147-155. doi:10.1016/j.chb.2014.10.051
Lankton, N. K., McKnight, D. H., & Tripp, J. F. (2017). Facebook privacy management strategies: A cluster analysis of user privacy behaviors. Computers in Human Behavior, 76, 149-163. doi:10.1016/j.chb.2017.07.015
LaRose, R., & Rifon, N. J. (2007). Promoting i-safety:Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs, 41(1), 127-149. doi:10.1111/j.1745-6606.2006.00071.x![new window](/gs32/images/newin.png)
LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for Internet safety. Communications of the ACM, 51(3), 71-76. doi:10.1145/1325555.1325569
Lee, D., LaRose, R., & Rifon, N. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445-454. doi:10.1080/01449290600879344
Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1), 79-100. doi:10.1111/j.1083-6101.2008.01432.x
Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481. doi:10.1016/j.dss.2012.06.010![new window](/gs32/images/newin.png)
Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394-413.
Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29(4), 1649-1656. doi:10.1016/j.chb.2013.01.049
Little, T. D. (2013). Longitudinal structural equation modeling. 1st ed. New York, NY: Guilford Press.
Livingstone, S., Ólafsson, K., & Staksrud, E. (2013). Risky social networking practices among “underage” users: Lessons for evidence-based policy. Journal of Computer-Mediated Communication, 18(3), 303-320. doi:10.1111/jcc4.12012
Lusky, L. (1972). Invasion of privacy: A clarification of concepts. Political Science Quarterly, 87(2), 192-209. doi:10.2307/2147825
Lwin, M. O., Li, B., & Ang, R. P. (2012). Stop bugging me: An examination of adolescents’ protection behavior against online harassment. Journal of Adolescence, 35(1), 31-41. doi:10.1016/j.adolescence.2011.06.007![new window](/gs32/images/newin.png)
Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469-479. doi:10.1016/0022-1031(83)90023-9
Maksl, A., & Young, R. (2013). Affording to exchange: Social capital and online information sharing. CyberPsychology, Behavior & Social Networking, 16(8), 588-592. doi:10.1089/cyber.2012.0430
Malhotra, N. K., Sung, S. K., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. doi:10.1287/isre.1040.0032
Marett, K., McNab, A. L., & Harris, R. B. (2011). Social networking websites and posting personal information: An evaluation of protection motivation theory. AIS Transactions on Human-Computer Interaction, 3(3), 170-188. doi:10.17705/1thci.00032
Meade, A. W., Johnson, E. C., & Braddy, P. W. (2008). Power and sensitivity of alternative fit indices in tests of measurement invariance. Journal of Applied Psychology, 93(3), 568-592. doi:10.1037/0021-9010.93.3.568
Meredith, S. (2018). Facebook-Cambridge Analytica: A timeline of the data hijacking scandal. Retrieved from https://www.cnbc.com/2018/04/10/facebook-cambridge-analytica-a-timeline-of-the-data-hijacking-scandal.html
Meso, P., Ding, Y., & Xu, S. (2013). Applying protection motivation theory to information security training for college students. Journal of Information Privacy and Security, 9(1), 47-67. doi:10.1080/15536548.2013.10845672
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health‐related behavior: A meta‐analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143. doi:10.1111/j.1559-1816.2000.tb02308.x
Tsay-Vogel, M., Shanahan, J., & Signorielli, N. (2016). Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media & Society, 20(1), 141-161. doi:10.1177/1461444816660731![new window](/gs32/images/newin.png)
Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375. doi:10.1016/j.chb.2012.07.008
Moll, R., Pieschl, S., & Bromme, R. (2014). Competent or clueless? Users’ knowledge and misconceptions about their online privacy management. Computers in Human Behavior, 41(Supplement C), 212-219. doi:10.1016/j.chb.2014.09.033
Nemec Zlatolas, L., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158-167. doi:10.1016/j.chb.2014.12.012
Pempek, T. A., Yermolayeva, Y. A., & Calvert, S. L. (2009). College students' social networking experiences on Facebook. Journal of Applied Developmental Psychology, 30(3), 227-238. doi:10.1016/j.appdev.2008.12.010
Peters, A. N., Winschiers-Theophilus, H., & Mennecke, B. E. (2015). Cultural influences on Facebook practices: A comparative study of college students in Namibia and the United States. Computers in Human Behavior, 49, 259-271. doi:10.1016/j.chb.2015.02.065
Phua, J., Jin, S. V., & Kim, J. (2017). Uses and gratifications of social networking sites for bridging and bonding social capital: A comparison of Facebook, Twitter, Instagram, and Snapchat. Computers in Human Behavior, 72(Supplement C), 115-122. doi:10.1016/j.chb.2017.02.041
Plesch, C., Kaendler, C., Rummel, N., Wiedmann, M., & Spada, H. (2013). Identifying areas of tension in the field of technology-enhanced learning: Results of an international Delphi study. Computers & Education, 65, 92-105. doi:10.1016/j.compedu.2013.01.018
Prentice-Dunn, S., & Rogers, R. W. (1986). Protection Motivation Theory and preventive health: Beyond the health belief model. Health Education Research, 1(3), 153-161. doi:10.1093/her/1.3.153![new window](/gs32/images/newin.png)
Prosser, W. L. (1960). Privacy. Cal. L. Rev., 48, 383.
Rabe-Hesketh, S., & Skrondal, A. (2012). Multilevel and longitudinal modeling using Stata. 3rd ed. College Station, TX: Stata Press.
Rippetoe, P. A., & Rogers, R. W. (1987). Effects of components of protection motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personality and Social Psychology, 52(3), 596-604. doi:10.1037/0022-3514.52.3.596
Rogers, R. W. (1975). A protenion motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93-114. doi:10.1080/00223980.1975.9915803![new window](/gs32/images/newin.png)
Rogers, R. W., Cacioppo, J. T., & Petty, R. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology: A Sourcebook , 153-176.
Rogers, R. W., & Mewborn, C. R. (1976). Fear appeals and attitude change: Effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. Journal of Personality and Social Psychology, 34(1), 54-61. doi:10.1037/0022-3514.34.1.54
Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R., & Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking & Virtual Communities, 2012, 1. doi:10.5171/2012.281869![new window](/gs32/images/newin.png)
Schunk, D. H., Meece, J. R., & Pintrich, P. R. (2012). Motivation in education: Theory, research, and applications. 4th ed. Upper Saddle River, NJ: Pearson Higher Ed.
Sheeran, P., & Taylor, S. (1999). Predicting intentions to use condoms: A meta‐analysis and comparison of the theories of reasoned action and planned behavior. Journal of Applied Social Psychology, 29(8), 1624-1675. doi:10.1111/j.1559-1816.1999.tb02045.x
Shelton, M. L., & Rogers, R. W. (1981). Fear‐Arousing and Empathy‐Arousing Appeals to Help: The Pathos of Persuasion. Journal of Applied Social Psychology, 11(4), 366-378. doi:10.1111/j.1559-1816.1981.tb00829.x
Shin, W., & Kang, H. (2016). Adolescents' privacy concerns and information disclosure online: The role of parents and the Internet. Computers in Human Behavior, 54, 114-123. doi:10.1016/j.chb.2015.07.062
Siemens, L., Althaus, C., & Stange, C. (2013). Balancing students’ privacy concerns while increasing student engagement in e-learning environments. Cutting-edge Technologies in Higher Education, 6, 339-357. doi:10.1108/S2044-9968(2013)000006G014
Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., & Cranor, L. F. (2013). The post that wasn't: Exploring self-censorship on facebook. Paper presented at the Proceedings of the 2013 conference on Computer supported cooperative work.
Snijders, T., & Bosker, R. (2012). Multilevel analysis: An introduction to basic and applied multilevel analysis. 2nd ed. London, UK: Sage.
Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 477-564.
Spottswood, E. L., & Hancock, J. T. (2017). Should I Share That? Prompting Social Norms That Influence Privacy Behaviors on a Social Networking Site. Journal of Computer-Mediated Communication, 22(2), 55-70. doi:10.1111/jcc4.12182
Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590-598. doi:10.1016/j.chb.2010.10.017![new window](/gs32/images/newin.png)
Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: examining a privacy-enhancing behavior in facebook. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA.
Tanner Jr, J. F., Hunt, J. B., & Eppright, D. R. (1991). The Protection Motivation model: A normative model of fear appeals. Journal of Marketing, 55(3), 36-45. doi:10.2307/1252146
Tiggemann, M., & Slater, A. (2013). NetGirls: The Internet, Facebook, and body image concern in adolescent girls. International Journal of Eating Disorders, 46(6), 630-633. doi:10.1002/eat.22141
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 193-220.
Westin, A. F. (1967). Privacy and freedom. New York, NY: Atheneum.
Wheeler, S., Yeomans, P., & Wheeler, D. (2008). The good, the bad and the wiki: Evaluating student-generated content for collaborative learning. British Journal of Educational Technology, 39(6), 987-995. doi:10.1111/j.1467-8535.2007.00799.x
Williams, K. C. (2012). Fear appeal theory. Research in Business and Economics Journal, 5, 1.
Wills, C. E., & Zeljkovic, M. (2011). A personalized approach to web privacy: awareness, attitudes and actions. Information Management & Computer Security, 19(1), 53-73. doi:10.1108/09685221111115863![new window](/gs32/images/newin.png)
Wisniewski, P., Knijnenburg, B., & Lipford, H. R. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95-108. doi:10.1016/j.ijhcs.2016.09.006
Wisniewski, P., Xu, H., Lipford, H., & Bello-Ogunu, E. (2015). Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. Journal of the Association for Information Science & Technology, 66(9), 1883-1896. doi:10.1002/asi.23299
Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education & Behavior, 27(5), 591-615. doi:10.1177/109019810002700506
Woon, I., Tan, G.-W., & Low, R. (2005). A protection motivation theory approach to home wireless security. Paper presented at International Conference on Information Systems, Las Vegas, USA.
Wu, A. D., Li, Z., & Zumbo, B. D. (2007). Decoding the meaning of factorial invariance and updating the practice of multi-group confirmatory factor analysis: A demonstration with TIMSS data. Practical Assessment, Research & Evaluation, 12(3), 1-26.
Wu, J.-Y., & Hughes, J. N. (2015). Teacher network of relationships inventory: measurement invariance of academically at-risk students across ages 6 to 15. School Psychology Quarterly, 30(1), 23. doi:10.1037/spq0000063![new window](/gs32/images/newin.png)
Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897. doi:10.1016/j.chb.2011.12.008
Wurtele, S. K., & Maddux, J. E. (1987). Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. Health Psychology, 6(5), 453. doi:10.1037//0278-6133.6.5.453
Xie, W., & Kang, C. (2015). See you, see me: Teenagers’ self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398-407. doi:10.1016/j.chb.2015.05.059
Yoon, C., Hwang, J.-W., & Kim, R. (2012). Exploring factors that influence students' behaviors in information security. Journal of Information Systems Education, 23(4), 407.
Youn, S. (2005). Teenagers' perceptions of online privacy and coping behaviors: A risk–benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86-110. doi:10.1207/s15506878jobem4901_6![new window](/gs32/images/newin.png)
Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389-418. doi:10.1111/j.1745-6606.2009.01146.x
Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook. Information, Communication & Society, 16(4), 479-500. doi:10.1080/1369118X.2013.777757
Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., & Chiasson, S. (2016). From nosy little brothers to stranger-danger: Children and parents' perception of mobile threats. Paper presented at the Proceedings of the 15th International Conference on Interaction Design and Children, Manchester, United Kingdom.
Zhang, L., & McDowell, W. C. (2009). Am I really at risk? Determinants of online users' intentions to use strong passwords. Journal of Internet Commerce, 8(3-4), 180-197. doi:10.1080/15332860903467508