:::

詳目顯示

回上一頁
題名:隱私控制的雙重性質:文獻綜述、概念框架、和兩項實證研究
作者:張諾海
作者(外文):Cano Bejar, Arturo Heyner
校院名稱:國立清華大學
系所名稱:服務科學研究所
指導教授:雷松亞
學位類別:博士
出版日期:2022
主題關鍵詞:二級隱私控制保護行為信息隱私問題一級隱私控制准實驗secondary privacy controlprotective behaviorsinformation privacy concernprimary privacy controlquasi-experiment
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:0
一些研究表示,那些對個人資訊進行加強控制的人不太關心他們的隱私,而其他研究也發現,加強隱私控制只會加劇人們的隱私問題。因此,本論文主要關注兩個問題:對隱私控制不同看法的本質及其解釋,以及隱私控制在多大程度上能減輕人們的擔憂並影響其意圖與行為。進一步針對核心問題做進一步的探討,即對控制這件事,在心理層面人們對控制的表現,並通過研究它是如何演變進而影響其他方面。於此,我們認為存在著兩種不同且平行的隱私控制,主要的和次要的,它們辨識及解釋,人們接受和適應隱私問題是另一種健康的反應,能為自己提供了另一種自我控制感。我們在社交網絡平台的背景下使用結構方程 (研究 1 - 橫斷面研究), 和邏輯回歸在行動設備版本的 Facebook 中 (研究 2 - 准實驗) 來深入理這兩種不同且平行的隱私控制。
在這兩項研究中,結果都表明,兩種類型的隱私控制分別對應於增加和減少的信息隱私問題並且它們來自文化所衍生出的個人價值觀。此外,二級隱私控制策略似乎是當前隱私控制概念化的主要部分。
While some research show that those experiencing enhanced control over their personal information are less concerned about their privacy, other studies are discovering contexts in which enhanced privacy control only worsens people’s privacy concern. Thus, this dissertation focuses on two major issues: The nature and antecedent explanations for varying perceptions of privacy control, and the degree in which privacy control goes beyond mitigating concern and affects intentions and behaviors. We specifically argue for the existence of two distinct and parallel types of privacy control–primary and secondary–that recognize the fertile assertion that accepting and adjusting to privacy issues is another healthy response that provides oneself with a feel for control. We use structural equation modelling in the context of social networking platforms (Study 1 – a cross-sectional study) and logistic regression in the context of Facebook in mobile devices to deeply understand privacy control.
In both studies, the results show that the two types of privacy control correspond separately to increased and decreased information privacy concern and that they arise from culturally derived personal values. Moreover, secondary privacy control strategies seem to be a dominant portion of the current conceptualization of privacy control.
Abramson, L. Y., Seligman, M. E., and Teasdale, J. D. 1978. “Learned Helplessness in Humans: Critique and Reformulation,” Journal of Abnormal Psychology (87:1), pp. 49.
Ajzen, I. 2002. “Perceived Behavioral Control, Self‐Efficacy, Locus of Control, and the Theory of Planned Behavior,” Journal of Applied Social Psychology (32:4), pp. 665-683.
Al-Natour, S., Cavusoglu, H., Benbasat, I., and Aleem, U. 2020. “An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps,” Information Systems Research (31:4), pp. 1037-1063.
Allison, P. D., Williams, R., and Moral-Benito, E. 2017. “Maximum Likelihood for Cross-Lagged Panel Models with Fixed Effects,” Socius: Sociological Research for a Dynamic World (3), pp. 1-17.
Apple 2022a. Privacy. Retrieved from https://www.apple.com/privacy/features/
Apple 2022b. App Privacy Details on the App Store. Retrieved from https://developer.apple.com/app-store/app-privacy-details/
Apple 2022c. Users Privacy and Data Use. Retrieved from https://developer.apple.com/app-store/user-privacy-and-data-use/
Specktor 2021. Impact of Apple Limit Ad Tracking on Attribution (before iOS 14). Retrieved from https://support.appsflyer.com/hc/en-us/articles/115003734626-Impact-of-Apple-iOS-Limit-Ad-Tracking-on-attribution
Armstrong, J. S., and Overton, T. S. 1977. “Estimating Nonresponse Bias in Mail Surveys,” Journal of Marketing Research (14:3), pp. 396-402.
Babrow, A. S., and Kline, K. N. 2000. “From “Reducing” to “Coping with” Uncertainty: Reconceptualizing the Central Challenge in Breast Self-Exams,” Social Science & Medicine (51:12), pp. 1805-1816.
Bagozzi, R. P., and Yi, Y. 1988. “On the Evaluation of Structural Equation Models,” Journal of the Academy of Marketing Science (16:1), pp. 74-94.
Balasubramanian, M. 2022. App Tracking Transparency Opt-In Rate - Monthly Updates. Retrieved from https://www.flurry.com/blog/att-opt-in-rate-monthly-updates/
Band, E. B., and Weisz, J. R. 1988. “How to Feel Better When It Feels Bad: Children's Perspectives on Coping with Everyday Stress,” Developmental Psychology (24:2), pp. 247-253.
Bandura, A. 1982. “Self-Efficacy Mechanism in Human Agency,” American Psychologist (37:2), pp. 122-147.
Bandura, A. 2001. “Social Cognitive Theory: An Agentic Perspective. Annual Review of Psychology (52:1), pp. 1-26.
Bandura, A. 2006. “Toward a Psychology of Human Agency,” Perspectives on Psychological Science (1:2), pp. 164-180.
Bailis, D. S., Chipperfield, J. G., and Perry, R. P. 2005. “Optimistic Social Comparisons of Older Adults Low in Primary Control: A Prospective Analysis of Hospitalization and Mortality,” Health Psychology (24:4), pp. 393-401.
Baumer, E. P., Adams, P., Khovanskaya, V. D., Liao, T. C., Smith, M. E., Schwanda Sosik, V., and Williams, K. 2013. “Limiting, Leaving, and (Re) lapsing: An Exploration of Facebook Non-Use Practices and Experiences,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3257-3266.
Bechwati, N. N., and Xia, L. 2003. “Do Computers Sweat? The Impact of Perceived Effort of Online Decision Aids on Consumers’ Satisfaction with the Decision Process,” Journal of Consumer Psychology (13:1-2), pp. 139-148.
Bélanger, F., and Crossler, R. E. 2011. “Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems,” MIS Quarterly (35:4), pp. 1017-1042.
Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. 2004. “International Differences in Information Privacy Concerns: A Global Survey of Consumers,” The Information Society (20:5), pp. 313-324.
Benitez-Amado, J., Henseler, J., and Castillo, A. 2017. “Development and Update of Guidelines to Perform and Report Partial Least Squares Path Modeling in Information Systems Research. Development. In the proceedings of the Twenty First Pacific Asia Conference on Information Systems, Langkawi.
Bhatia, S. 2021. Apple Explains iOS 14.5’s App Tracking Transparency in a New Video. Retrieved from https://www.iphonehacks.com/2021/04/apple-explain-ios-14-5-app-tracking-transparency.html
Boiger, M. 2008. “Adaptation of International Students in Japan: The Cultural Fit of Control Orientation,” published dissertation, University of Konstanz, Germany.
Bolger, N. 1990. “Coping as a Personality Process: a Prospective Study,” Journal of Personality and Social Psychology (59:3), 525-537.
Bordia, P., Hunt, E., Paulsen, N., Tourish, D., and DiFonzo, N. 2004. “Uncertainty During Organizational Change: Is It All About Control?,” European Journal of Work and Organizational Psychology (13:3), pp. 345-365.
Boyd, D. M., and Ellison, N. B. 2007. “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication (13:1), pp. 210-230.
Brandtstädter, J., and Renner, G. 1990. “Tenacious Goal Pursuit and Flexible Goal Adjustment: Explication and Age-Related Analysis of Assimilative and Accommodative Strategies of Coping,” Psychology and Aging (5:1), pp. 58-67.
Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. 2007. “Development of Measures of Online Privacy Concern and Protection for Use on the Internet,” Journal of the American society for information science and technology (58:2), pp. 157-165.
Burns, A. J., Roberts, T. L., Posey, C., and Lowry, P. B. 2019. “The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking,” Information Systems Research (30:4), pp. 1228-1247.
Burton-Jones, A. 2009. “Minimizing Method Bias Through Programmatic Research,” MIS Quarterly (33:3), pp. 445-471.
Califf, C. B., Sarker, S., and Sarker, S. 2020. “The Bright and Dark Sides of Technostress: A Mixed-Methods Study Involving Healthcare IT,” MIS Quarterly (44:2), pp. 809-856.
Cannon, W. B. 1929. “Organization for Physiological Homeostasis,” Physiological Reviews (9:3), pp. 399-431.
Campbell 2021. Twitter Politely Asks You to Protect its Targeted Ad Dollars in New iOS 14.5 Prompt. Retrieved from https://www.theverge.com/2021/5/14/22436944/twitter-ad-tracking-ios-14-5-app-transparency
Cavazza, N., Guidetti, M., and Pagliaro, S. 2015. “Who Cares for Reputation? Individual Differences and Concern for Reputation,” Current Psychology (34:1), pp. 164-176.
Chen, G., Gully, S. M., and Eden, D. 2001. “Validation of a New General Self-Efficacy Scale,” Organizational Research Methods (4:1), pp. 62-83.
Chen, H. T. 2018. “Revisiting the privacy paradox on social media with an extended privacy calculus model: The effect of privacy concerns, privacy self-efficacy, and social capital on privacy management,” American Behavioral Scientist, (62:10), pp. 1392-1412.
Chen, L., Xu, P., and Liu, D. 2020. Effect of Crowd Voting on Participation in Crowdsourcing Contests,” Journal of Management Information Systems (37:2), pp. 510-535.
Chipperfield, J. G., Perry, R. P., and Menec, V. H. 1999. “Primary and Secondary Control-Enhancing Strategies: Implications for Health in Later Life,” Journal of Aging and Health (11:4), pp. 517-539.
Chipperfield, J. G., and Perry, R. P. 2006. “Primary and Secondary Control Strategies in Later Life: Predicting Hospital Outcomes in Men and Women,” Health Psychology (25:2), pp. 226-236.
Clover J. 2020. Apple Confirms Commitment to App Tracking Transparency in Letter Condemning Facebook's Data Collection [Updated]. Retrieved from https://www.macrumors.com/2020/11/19/apple-app-tracking-transparency-letter/
Compeau, D. R., and Higgins, C. A. 1995. “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly (19:2), pp. 189-211.
Confessore and Kang 2018. Facebook Data Scandals Stoke Criticism That a Privacy Watchdog Too Rarely Bites. Retrieved from https://www.nytimes.com/2018/12/30/technology/facebook-data-privacy-ftc.html
Confessore N. 2018. “Cambridge Analytica and Facebook: The Scandal and the Fallout So Far” Retrieved from: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html
Costello, A., and Osborne, J. 2005. “Best Practices in Exploratory Factor Analysis: Four Recommendations for Getting the Most From Your Analysis,” Practical Assessment Research and Evaluation (10:7), pp. 1–9.
Crossler, R. E., and Bélanger, F. 2019. “Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge–Belief Gap,” Information Systems Research (30:3), pp. 995-1006.
Culnan, M. J. 1993. “‘How Did They Get my Name?’: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use,” MIS Quarterly (17:3), pp. 341-363.
Culnan, M. J., and Armstrong, P. K. (1999). “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation,” Organization Science (10:1), pp. 104-115.
De Hert, P. 2008. “Identity Management of e-ID, Privacy and Security in Europe. A Human Rights View,” Information Security Technical Report (13:2), pp. 71-75.
DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M., and Epstein, J. A. 1996. “Lying in Everyday Life,” Journal of Personality and Social Psychology (70:5), pp. 979-995.
Diamantopoulos, A. 2011. “Incorporating Formative Measures into Covariance-Based Structural Equation Models,” MIS Quarterly (35:2), pp. 335-358.
Dinev, T., and Hart, P. 2004. “Internet Privacy Concerns and their Antecedents Measurement Validity and a Regression Model,” Behaviour and Information Technology (23:6), pp. 413-422.
Dinev, T., and Hart, P. 2005. “Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact,” International Journal of Electronic Commerce (10:2), pp. 7-29.
Dinev, T., and Hart, P. 2006. “An Extended Privacy Calculus Model for E-Commerce Transactions,” Information Systems Research (17:1), pp. 61-80.
Dinev, T., McConnell, A. R., and Smith, H. J. 2015. “Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box,” Information Systems Research (26:4), pp. 639-655.
Dinev, T., Xu, H., Smith, J. H., and Hart, P. 2013. “Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts,” European Journal of Information Systems (22:3), pp. 295-316.
Duncan, O. D. 1969. “Some Linear Models for Two-Wave, Two-Variable Panel Analysis,” Psychological Bulletin (72:3), pp. 177-182.
Edison Research, 2019. The Infinite Dial 2019. Retrieved from https://www.edisonresearch.com/the-social-habit-2019/
Edison Research, 2022. The Infinite Dial 2022. Retrieved from https://www.edisonresearch.com/the-infinite-dial-2022/
Ejova, A., Delfabbro, P. H., and Navarro, D. J. 2010. “The Illusion of Control: Structure, Measurement and Dependence on Reinforcement Frequency in the Context of a Laboratory Gambling Task.” In ASCS09: Proceedings of the 9th Conference of the Australasian Society for Cognitive Science.
Endler, N. S., Speer, R. L., Johnson, J. M., and Flett, G. L. 2001. “General Self-Efficacy and Control in Relation to Anxiety and Cognitive Performance,” Current Psychology (20:1), pp. 36-52.
Essau, C. A., and Trommsdorff, G. 1996. “Coping with University-Related Problems: A Cross-Cultural Comparison,” Journal of Cross-Cultural Psychology (27:3), pp. 315-328.
Facebook 2020a. How do I Control Who Can See What's on my Facebook Profile and Timeline?
Retrieved from https://www.facebook.com/help/167941163265974
Facebook 2020b. What names are allowed on Facebook?,
Retrieved from https://www.facebook.com/help/112146705538576
Fadler, M., and Legner, C. 2021. “Data Ownership Revisited: Clarifying Data Accountabilities in Times of Big Data and Analytics,” Journal of Business Analytics, pp. 1-17.
Folkman, S., Lazarus, R. S., Dunkel-Schetter, C., DeLongis, A., and Gruen, R. J. 1986. “Dynamics of a Stressful Encounter: Cognitive Appraisal, Coping, and Encounter Outcomes,” Journal of Personality and Social Psychology (50:5), pp. 992-1003.
Fornell, C., and Larcker, D. F. 1981. “Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics,” Journal of Marketing Research (18:3), pp. 382-388.
Fowler 2022. There is no Scape from Facebook even if You do not Use It. Retrieved from: https://www.washingtonpost.com/technology/2021/08/29/facebook-privacy-monopoly/
Frankl, V. E. 1984. Man's Search for Meaning. New York, US: Simon and Schuster.
Freeman, E. H. 2012. “The Telegraph and Personal Privacy: A Historical and Legal Perspective,” EDPACS (46:6), pp. 9-20.
Fromm, E. 1968. The Revolution of Hope, Toward a Humanized Technology, Vol. 38.
Gefen, D., and Pavlou, P. 2006. “The Moderating Role of Perceived Regulatory Effectiveness of Online Marketplaces on the Role of Trust and Risk on Transaction Intentions,” Paper 81 in ICIS 2006 Proceedings. Milwaukee, WI, USA.
Gefen, D., and Straub, D. W. 2004. “Consumer Trust in B2C e-Commerce and the Importance of Social Presence: Experiments in e-Products and e-Services,” Omega (32:6), pp. 407-424.
Gefen, D., Rigdon, E. E., and Straub, D. 2011. “Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research,” MIS Quarterly (35:2), pp. iii-xiv.
Gould, S. J. 1999. “A Critique of Heckhausen and Schulz's (1995) Life-Span Theory of Control from a Cross-Cultural Perspective,” Psychological Review (103:6), pp. 597-604.
Grootenhuis, M. A., and Last, B. F. 2001. “Children with Cancer with Different Survival Perspectives: Defensiveness, Control Strategies, and Psychological Adjustment,” Psycho‐Oncology: Journal of the Psychological, Social and Behavioral Dimensions of Cancer (10:4), pp 305-314.
Grootenhuis, M. A., Last, B. F., De Graaf‐Nijkerk, J. H., and Van Der Wel, M. 1996. “Secondary Control Strategies Used by Parents of Children with Cancer,” Psycho‐Oncology: Journal of the Psychological, Social and Behavioral Dimensions of Cancer (5:2), pp. 91-102.
Ha A. 2021. Apple’s App Tracking Transparency Feature Has Arrived — Here’s What You Need to Know. Retrieved from https://techcrunch.com/2021/04/26/apples-app-tracking-transparency-feature-has-arrived-heres-what-you-need-to-know/
Hair, J. F., Risher, J. J., Sarstedt, M., and Ringle, C. M. 2019. “When to Use and How to Report the Results of PLS-SEM,” European Business Review (31:1), pp. 2-24.
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., and Tatham, R. L. 1998. “Multivariate Data Analysis Upper Saddle River, NJ: Prentice hall.
Hair, J. F., Ringle, C. M., and Sarstedt, M. 2011. “PLS-SEM: Indeed a Silver Bullet,” Journal of Marketing Theory and Practice (19:2), pp. 139-152.
Hall, N. C., Chipperfield, J. G., Perry, R. P., Ruthig, J. C., and Goetz, T. 2006a. “Primary and Secondary Control in Academic Development: Gender-Specific Implications for Stress and Health in College Students,” Anxiety, Stress, and Coping (19:2), pp. 189-210.
Hall, N. C., Perry, R. P., Ruthig, J. C., Hladkyj, S., and Chipperfield, J. G. 2006b. “Primary and Secondary Control in Achievement Settings: A Longitudinal Field Study of Academic Motivation, Emotions, and Performance,” Journal of Applied Social Psychology (36:6), pp. 1430-1470.
Harter J. and Arora R. 2008. Social Time Crucial to Daily Emotional Well-Being in U.S.. Retrieved from https://news.gallup.com/poll/107692/social-time-crucial-daily-emotional-wellbeing.aspx#:~:text=Certainly%2C%20the%20additional%20time%20spent,on%20weekends%20and%20public%20holidays.
Haynes, T. L., Heckhausen, J., Chipperfield, J. G., Perry, R. P., and Newall, N. E. 2009. “Primary and Secondary Control Strategies: Implications for Health and Well-Being Among Older Adults,” Journal of Social and Clinical Psychology (28:2), pp. 165-197.
Heckhausen, J., and Schulz, R. 1995. “A Life-Span Theory of Control,” Psychological Review (102:2), pp. 284-304.
Heiligenstein 2022. Facebook Data Breacher: Full Timeline through 2022. Retrieved from: https://firewalltimes.com/facebook-data-breach-timeline/
Henseler, J., Hubona, G., and Ray, P. A. 2016. “Using PLS Path Modeling in New Technology Research: Updated Guidelines,” Industrial Management and Data Systems (116:1), pp. 2-20.
Henseler, J., Ringle, C. M., and Sarstedt, M. 2015. “A New Criterion for Assessing Discriminant Validity in Variance-Based Structural Equation Modeling,” Journal of the Academy of Marketing Science (43:1), pp. 115-135.
Hirschman, A.O. 1970. Exit, Voice, and Loyalty Responses to Decline in Firms, Organizations, and States. Cambridge, US: Harvard University Press.
Hitlin, P., Rainie, L., and Olmstead, K. 2018. Americans are changing their relationship with Facebook. Retrieved from https://www.pewresearch.org/fact-tank/2018/09/05/americans-are-changing-their-relationship-with-facebook/
Hitlin, P., Rainie, L., and Olmstead, K. 2019. Facebook Algorithms and Personal Data. Retrieved from https://www.pewinternet.org/2019/01/16/facebook-algorithms-and-personal-data/
Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. “Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry,” Electronic Commerce Research and Applications, (9:1), pp. 50-60.
Hogg, M. A. 2009. “Managing Self-Uncertainty Through Group Identification,” Psychological Inquiry (20:4), pp. 221-224.
Hofstede, G. 1980. “Motivation, Leadership, and Organization: Do American Theories Apply Abroad?,” Organizational Dynamics (9:1), pp. 42-63.
Hofstede, G. 1984. Culture's consequences: International differences in work-related values, New Delhi, India: Sage Publications.
Holmes A. 2021. 533 Million Facebook Users' Phone Numbers and Personal Data Have Been Leaked Online, Retrieved from https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4
Hong, W., Chan, F. K., and Thong, J. Y. 2019. “Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective,” Journal of Business Ethics (June), pp. 1-26.
Hong, W., and Thong, J. Y. 2013. “Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies,” MIS Quarterly (37:1), pp. 275-298.
Hooper, D., Coughlan, J.P., and Mullen, M.R. 2008. “Structural Equation Modelling: Guidelines for Determining Model Fit,” Electronic Journal of Business Research Methods (6:1), pp. 53-60.
Hwang, Y. 2005. “Investigating Enterprise Systems Adoption: Uncertainty Avoidance, Intrinsic Motivation, and the Technology Acceptance Model,” European Journal of Information Systems (14:2), pp. 150-161.
Huang, N., Yan, Z., and Yin, H. 2021. “Effects of Online–Offline Service Integration on e‐Healthcare Providers: A Quasi‐Natural Experiment,” Production and Operations Management (30:8), pp. 2359-2378.
Jepsen, T. 2018. “‘A New Business in the World’: The Telegraph, Privacy, and the US Constitution in the Nineteenth Century,” Technology and Culture (59:1), pp. 95-125.
Ji, L. J., Peng, K., and Nisbett, R. E. 2000. “Culture, Control, and Perception of Relationships in the Environment,” Journal of Personality and Social Psychology (78:5), pp. 943-955.
Jiang, Z., Heng, C. S., and Choi, B. C. 2013. “Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions,” Information Systems Research (24:3), pp. 579-595.
Jung, J., Bapna, R., Ramaprasad, J., and Umyarov, A. 2019. “Love Unshackled: Identifying the Effect of Mobile App Adoption in Online Dating,” MIS Quarterly (43:1), pp. 47-72.
Jung, J. M., and Kellaris, J. J. 2004. “Cross‐National Differences in Proneness to Scarcity Effects: The Moderating Roles of Familiarity, Uncertainty Avoidance, and Need for Cognitive Closure,” Psychology & Marketing (21:9), pp. 739-753.
Karahanna, E., Xu, S. X., Xu, Y., and Zhang, N. A. 2018. “The Needs–Affordances–Features Perspective for the Use of Social Media,” MIS Quarterly (42:3), pp. 737-756.
Kim, H. W., Chan, H. C., and Kankanhalli, A. 2012. “What Motivates People to Purchase Digital Items on Virtual Community Websites? The Desire for Online Self-Presentation,” Information Systems Research (23:4), pp. 1232-1245.
Kelly, G. 2020. The psychology of personal constructs. London, UK: Routledge.
Kuem, J., Khansa, L., and Kim, S. S. 2020. “Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online Communities,” Journal of Management Information Systems (37:1), pp. 162-190.
Langer, E. J. 1977. “The Psychology of Chance,” Journal for the Theory of Social Behaviour (7:2), pp. 185-207.
Langer, D. A., Chen, E., and Luhmann, J. D. 2005. “Attributions and Coping in Children’s Pain Experiences,” Journal of Pediatric Psychology (30:7), pp. 615-622.
Lazarus, R. S., and Folkman, S. 1984. Stress, Appraisal, and Coping. New York, NY: Springer Publishing Company.
Leary, M. R., and Kowalski, R. M. 1990. “Impression Management: A Literature Review and Two-Component Model,” Psychological Bulletin (107:1), pp. 34-47.
Leetaru, K. 2018. Facebook As The Ultimate Government Surveillance Tool? Retrieved from https://www.forbes.com/sites/kalevleetaru/2018/07/20/facebook-as-the-ultimate-government-surveillance-tool/#4b9932522909
Lewis, C. 1930. “Review,” The Journal of Philosophy (27:1), pp. 14-25.
Liang, H., Xue, Y., Pinsonneault, A., and Wu, Y. A. 2019. “What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective,” MIS Quarterly (43:2), pp. 373-394.
Lim, K. H., Leung, K., Sia, C. L., and Lee, M. K. 2004. “Is eCommerce Boundary-Less? Effects of Individualism–Collectivism and Uncertainty Avoidance on Internet Shopping,” Journal of International Business Studies (35:6), pp. 545-559.
Lindell, M. K., and Whitney, D. J. 2001. “Accounting for Common Method Variance in Cross-Sectional Research Designs,” Journal of Applied Psychology (86:1), pp. 114-121.
Liu, Q. B., Liu, X., and Guo, X. 2020. “The Effects of Participating in a Physician-Driven Online Health Community in Managing Chronic Disease: Evidence from Two Natural Experiments,” MIS Quarterly (44:1), pp. 391-419.
Lowry, P. B., Cao, J., and Everard, A. 2011. “Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures,” Journal of Management Information Systems (27:4), pp. 163-200.
Ma, M., and Agarwal, R. 2007. “Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities,” Information Systems Research (18:1), pp. 42-67.
McCrae, R. R. 1984. “Situational Determinants of Coping Responses: Loss, Threat, and Challenge,” Journal of Personality and Social Psychology (46:4), pp. 919-928.
Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. “Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model,” Information Systems Research (15:4), pp. 336-355.
Malhotra, N. K., Kim, S. S., and Patil, A. 2006. “Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research,” Management Science (52:12), pp. 1865-1883.
Manstead, A. S., and Van Eekelen, S. A. 1998. “Distinguishing Between Perceived Behavioral Control and Self‐Efficacy in the Domain of Academic Achievement Intentions and Behaviors,” Journal of Applied Social Psychology (28:15), pp. 1375-1392.
Marakas, G., Johnson, R., and Clay, P. F. 2007. “The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time,” Journal of the Association for Information Systems, (8:1), pp. 16-46.
Mason, R. O. 1986. “Four Ethical Issues of the Information Age,” MIS Quarterly, (10:1), pp. 5-12.
Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. 1995. “Values, Personal Information Privacy, and Regulatory Approaches,” Communications of the ACM (38:12), pp. 65-74.
Miller, C. 2021. Apple Debuts Humorous New ‘Tracked’ Ad Promoting iPhone Privacy [Video]. Retrieved from https://9to5mac.com/2021/05/20/apple-debuts-humorous-new-tracked-ad-promoting-iphone-privacy-video/
Miller, L. E., and Smith, K. L. 1983. “Handling Nonresponse Issues,” Journal of Extension (21:5), pp. 45-50.
Miltgen, C. L., and Peyrat-Guillard, D. 2014. “Cultural and Generational Influences on Privacy Concerns: A Qualitative Study in Seven European Countries,” European Journal of Information Systems (23:2), pp. 103-125.
Mittal, C., and Griskevicius, V. 2014. “Sense of Control Under Uncertainty Depends on People’s Childhood Environment: A Life History Theory Approach,” Journal of Personality and Social Psychology (107:4), pp. 621-637.
Morling, B. 2000. “‘Taking’ an Aerobics Class in the US and ‘entering’ an Aerobics Class in Japan: Primary and Secondary Control in a Fitness Context” Asian Journal of Social Psychology (3:1), pp. 73-85.
Morling, B., and Evered, S. 2006. “Secondary Control Reviewed and Defined,” Psychological Bulletin (132:2), pp. 269-296.
Morwitz, V. G., and Fitzsimons, G. J. 2004. “The Mere-Measurement Effect: Why Does Measuring Intentions Change Actual Behavior?” Journal of Consumer Psychology (14:1-2), pp. 64-74.
Mulder, J. D., and Hamaker, E. L. 2020. “Three Extensions of the Random Intercept Cross-Lagged Panel Model,” Structural Equation Modeling: A Multidisciplinary Journal (28:4), pp. 638-648.
Newcomb, A. 2018. “A Timeline of Facebook's Privacy Issues — and its Responses,” Retrieved from https://www.nbcnews.com/tech/social-media/timeline-facebook-s-privacy-issues-its-responses-n859651
Nikas and Isaac 2021. Facebook Takes the Gloves Off in Feud With Apple. Retrieved from https://www.nytimes.com/2020/12/16/technology/facebook-takes-the-gloves-off-in-feud-with-apple.html
O’brien, R. M. 2007. “A Caution Regarding Rules of Thumb for Variance Inflation Factors,” Quality and Quantity (41:5), pp. 673-690.
O’Dea S. 2022. Smartphone Adoption Rate Worldwide in 2021 and 2025, by Region. Retrieved from: https://www.statista.com/statistics/1258906/worldwide-smartphone-adoption-rate-telecommunication-by-region/
Oerter, R., Oerter, R., Agostiani, H., Kim, H. O., and Wibowo, S. 1996. “The Concept of Human Nature in East Asia: Etic and Emic Characteristics,” Culture and Psychology (2:1), pp. 9-51.
Orben, A. C., and Dunbar, R. I. 2017. “Social Media and Relationship Development: The Effect of Valence and Intimacy of Posts,” Computers in Human Behavior (73), pp. 489-498.
Origgi, G. 2018. Reputation: What It Is and Why It Matters. New Jersey, US: Princeton University Press.
Paulhus, D. L., Robins, R. W., Trzesniewski, K. H., and Tracy, J. L. 2004. “Two Replicable Suppressor Situations in Personality Research,” Multivariate Behavioral Research (39:2), pp. 303-328.
Pavlou, P. A. 2011. “State of the Information Privacy Literature: Where are We Now and Where Should We Go?,” MIS Quarterly (35:4), pp. 977-988.
Pavlou, P. A., and Gefen, D. 2004. “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research (15:1), pp. 37-59.
Piaget, J. 1970. Piaget's Theory. In P. H. Mussen (Ed.), Carmichael's manual of child psychology (3rd ed., Vol. 2). New York, US: Wiley.
Pinsonneault, A., and Kraemer, K. 1993. “Survey Research Methodology in Management Information Systems: An Assessment,” Journal of Management Information Systems (10:2), pp. 75-105.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies,” Journal of Applied Psychology (88:5), pp. 879-903.
Pouget, A., Drugowitsch, J., and Kepecs, A. 2016. “Confidence and Certainty: Distinct Probabilistic Quantities for Different Goals,” Nature Neuroscience (19:3), pp. 366-374.
R Core Team 2017. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. URL https://www.R-project.org/.
Raento, M., Oulasvirta, A., and Eagle, N. 2009. “Smartphones: An Emerging Tool for Social Scientists,” Sociological Methods & Research (37:3), pp. 426-454.
Ray, S., Danks, N.P., Velasquez Estrada, J.M. 2020. “seminr: Domain-Specific Language for Building PLS Structural Equation Models,” R package version 0.7.0.
Ray, S., Kim, S. S., and Morris, J. G. 2014. “The Central Role of Engagement in Online Communities,” Information Systems Research, (25:3), pp. 528-546.
Rothbaum, F., Weisz, J. R., and Snyder, S. S. 1982. “Changing the World and Changing the Self: A Two-Process Model of Perceived Control,” Journal of Personality and Social Psychology (42:1), pp. 5-37.
Rothermund, K., and Brandstädter, J. 2003. “Coping with Deficits and Losses in Later Life: from Compensatory Action to Accommodation,” Psychology and Aging (18:4), pp. 896-905.
Rosseel Y. 2012. “lavaan: An R Package for Structural Equation Modeling.” Journal of Statistical Software (48:2), pp. 1–36. http://www.jstatsoft.org/v48/i02/.
Sasaki, J. Y., and Kim, H. S. 2011. “At the Intersection of Culture and Religion: A Cultural Analysis of Religion's Implications for Secondary Control and Social Affiliation,” Journal of Personality and Social Psychology (101:2), pp. 401.
Schwartz, S. H., Cieciuch, J., Vecchione, M., Davidov, E., Fischer, R., Beierlein, C., V., Markku., L, Jan-Erik, and Konty, M. 2012. “Refining the Theory of Basic Individual Values,” Journal of Personality and Social Psychology (103:4), pp. 663.
Seginer, R., Trommsdorff, G., and Essau, C. 1993. “Adolescent Control Beliefs: Cross-Cultural Variations of Primary and Secondary Orientations,” International Journal of Behavioral Development (16:2), pp. 243-260.
Sheeran, P. 2002. “Intention—Behavior Relations: A Conceptual and Empirical Review,” European Review of Social Psychology (12:1), pp. 1-36.
Shipman, F. M., and Marshall, C. C. 2020. “Ownership, Privacy, and Control in the Wake of Cambridge Analytica: The Relationship Between Attitudes and Awareness,” In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-12.
Shuper, P. A., Sorrentino, R. M., Otsubo, Y., Hodson, G., and Walker, A. M. 2004. “A Theory of Uncertainty Orientation: Implications for the Study of Individual Differences Within and Across Cultures,” Journal of Cross-Cultural Psychology (35:4), pp. 460-480.
Sivo, S. A., Saunders, C., Chang, Q., and Jiang, J. J. 2006. “How Low Should You Go? Low Response Rates and the Validity of Inference in IS Questionnaire Research,” Journal of the Association for Information Systems (7:6), pp. 352-414.
Smart, B. 1994. Michael Foucault: critical assessments. London, UK: Routledge.
Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. “Information Privacy: Measuring Individuals Concerns about Organizational Practices,” MIS Quarterly (20:2), pp. 167-196.
Smith, H. J., Dinev, T., and Xu, H. 2011. “Information Privacy Research: An Interdisciplinary Review,” MIS Quarterly (35:4), pp. 989-1016
Solove, D. J. 2008. Understanding privacy, Cambridge, MA: Harvard University Press.
Son, J. Y., and Kim, S. S. 2008. “Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model,” MIS Quarterly (32:3), pp. 503-529.
Sreenivasan S. 2022. How to Use Social Media in your Career. Retrieved from: https://www.nytimes.com/guides/business/social-media-for-career-and-business
Srite, M., and Karahanna, E. 2006. “The Role of Espoused National Cultural Values in Technology Acceptance,” MIS Quarterly (30:3), pp. 679-704.
Statista, 2019a. Facebook Distribution of Users in the United States as of August 2019, by Age Group. Retrieved from https://www.statista.com/statistics/187549/facebook-distribution-of-users-age-group-usa/
Statista, 2019b. Facebook Distribution of Users in the United States as of August 2019, by Gender. Retrieved from https://www.statista.com/statistics/266879/facebook-users-in-the-us-by-gender/
Statista 2021. Share of Smartphone Unit Sales to end Users by Vendor from the First Quarter of 2016 to Second Quarter of 2021. Retrieved from https://www.statista.com/statistics/266220/global-smartphone-market-share-by-vendor-in-2007-and-2008/
Statista 2022a. Daily Time Spend on Social Networking by Internet Users Worldwide from 2012 to 2022. Retrieved from https://www.statista.com/statistics/433871/daily-social-media-usage-worldwide/
Statista 2022b. Device Usage of Facebook Users Worldwide as of January 2022. Retrieved from https://www.statista.com/statistics/377808/distribution-of-facebook-users-by-device/
Steinhauser, S., Doblinger, C., and Hüsig, S. 2020. The Relative Role of Digital Complementary Assets and Regulation in Discontinuous Telemedicine Innovation in European Hospitals,” Journal of Management Information Systems (37:4), pp. 1155-1183.
Stets, J. E., and Burke, P. J. 2000. “Identity Theory and Social Identity Theory,” Social Psychology Quarterly (63:3), pp. 224-237.
Straub, D., Loch, K., Evaristo, R., Karahanna, E., and Srite, M. 2002. “Toward a Theory-Based Measurement of Culture,” Journal of Global Information Management (10:1), pp. 13-23.
Swain, S. D., Weathers, D., and Niedrich, R. W. 2008. “Assessing Three Sources of Misresponse to Reversed Likert Items,” Journal of Marketing Research (45:1), pp. 116-131.
Technavio 2022. Mobile Apps Market by Platform, Application, Revenue Model, and Geography - Forecast and Analysis 2021-2025. Retrieved from: https://www.technavio.com/report/mobile-apps-market-industry-analysis
Thatcher, J. B., and Perrewe, P. L. 2002. “An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-Efficacy,” MIS Quarterly (26:4), pp. 381-396.
The Economist, 2019. Facebook Comes Under Fresh Attack for its Data-Privacy Practices. Retrieved from https://www.economist.com/business/2019/01/31/facebook-comes-under-fresh-attack-for-its-data-privacy-practices
Thompson, D. V., Hamilton, R. W., and Banerji, I. 2020. “The Effect of Childhood Socioeconomic Status on Patience,” Organizational Behavior and Human Decision Processes (157), pp. 85-102.
Thompson, F. T., and Levine, D. U. 1997. “Examples of Easily Explainable Suppressor Variables in Multiple Regression Research,” Multiple Linear Regression Viewpoints (24:1), pp. 11-13.
Thompson, S. C., Thomas, C., Rickabaugh, C. A., Tantamjarik, P., Otsuki, T., Pan, D., Garcia, B., and Sinar, E. 1998. “Primary and Secondary Control Over Age‐Related Changes in Physical Appearance,” Journal of Personality (66:4), pp. 583-605.
Trieu, V. H., Burton-Jones, A., Green, P., and Cockcroft, S. 2022. “Applying and Extending the Theory of Effective Use in a Business Intelligence Context,” MIS Quarterly (46:1), pp. 645-678.
Trommsdorff, G. 1994. “Future Time Perspective and Control Orientation: Social Conditions and Consequences,” In Psychology of Future Orientation / Z. Zalenski (ed.). Lublin. Towarzystwo Naukowe KUL, pp. 39–62.
Trommsdorff, G., and Essau, C. A. 1998. “Japanese and German Adolescents' Control Orientation: A Cross-Cultural Study,” in Trommsdorff, Gisela, ed. and others. Japan in Transition: Sociological and Psychological Aspects. Lengerich:Pabst Science, pp. 198-211.
Tyler, T. R., and Cook, F. L. 1984. “The Mass Media and Judgments of Risk: Distinguishing Impact on Personal and Societal Level Judgments,” Journal of Personality and Social Psychology (47:4), pp. 693-708.
van den Hoven, Jeroen, Blaauw, Martijn, Pieters, Wolter and Warnier, Martijn, "Privacy and Information Technology". The Stanford Encyclopedia of Philosophy (Winter 2019 Edition), Edward N. Zalta (ed.), Retrieved from https://plato.stanford.edu/archives/win2019/entries/it-privacy/>.
Vasalou, A., Joinson, A. N., and Courvoisier, D. 2010. “Cultural Differences, Experience with Social Networks and the Nature of “True Commitment” in Facebook,” International Journal of Human-Computer Studies (68:10), pp. 719-728.
Venkatesh, V. 2000. “Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion Into the Technology Acceptance Model,” Information Systems Research (11:4), pp. 342-365.
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly (27:3), pp. 425-478.
Wang, X., Abdelhamid, M., and Sanders, G. L. 2021. “Exploring the Effects of Psychological Ownership, Gaming Motivations, and Primary/Secondary Control on Online Game Addiction,” Decision Support Systems (14:4), pp. 113-512.
Wang, T., Duong, T. D., and Chen, C. C. 2016. “Intention to Disclose Personal Information Via Mobile Applications: A Privacy Calculus Perspective,” International Journal of Information Management (36:4), pp. 531-542.
Wasserstein, R. L., and Lazar, N. A. 2016. “The ASA Statement on p-values: Context, Process, and Purpose,” The American Statistician (70:2), pp. 129-133.
Weisz, J. R., Rothbaum, F. M., and Blackburn, T. C. 1984. “Standing Out and Standing In: The Psychology of Control in America and Japan,” American Psychologist (39:9), pp. 955-969.
Weisz, J. R., McCabe, M. A., and Dennig, M. D. 1994. “Primary and Secondary Control Among Children Undergoing Medical Procedures: Adjustment as a Function of Coping Style,” Journal of Consulting and Clinical Psychology (62:2), pp. 324-332.
Westin A. 1967. Privacy and Freedom. New York, US: Ig Publishing.
White, R. W. 1959. “Motivation Reconsidered: The Concept of Competence,” Psychological Review (66:5), pp. 297.
Whitley, E. A. 2009. “Informational Privacy, Consent and the “Control” of Personal Data,” Information Security Technical Report (14:3), pp. 154-159.
Whitman, J. Q. 2004. The Two Western Cultures of Privacy: Dignity Versus Liberty. 113 Yale LJ.
Wisniewski, P., Knijnenburg, B. P., and Lipford, H. R. 2014. “Profiling Facebook Users Privacy Behaviors,” In SOUPS2014 Workshop on Privacy Personas and Segmentation.
Wrosch, C., Schulz, R., and Heckhausen, J. 2002. “Health Stresses and Depressive Symptomatology in the Elderly: The Importance of Health Engagement Control Strategies,” Health Psychology (21:4), pp. 340-348.
Xu, H., Dinev, T., Smith, J., and Hart, P. 2011. “Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances,” Journal of the Association for Information Systems (12:12), pp. 798-824.
Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. 2012. “Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services,” Information Systems Research (23:4), pp. 1342-1363.
Yoo, B., Donthu, N., and Lenartowicz, T. 2011. “Measuring Hofstede's Five Dimensions of Cultural Values at the Individual Level: Development and Validation of CVSCALE,” Journal of International Consumer Marketing (23:3-4), pp. 193-210.
Yu, T. F. L. 2001. “Entrepreneurial Alertness and Discovery,” The Review of Austrian Economics (14:1), pp. 47-63.
Zablah, A. R., Carlson, B. D., Donavan, D. T., Maxham III, J. G., and Brown, T. J. 2016. “A Cross-Lagged Test of the Association between Customer Satisfaction and Employee Job Satisfaction in a Relational Context,” Journal of Applied Psychology (101:5), pp. 1-13.
Zemba, Y., Young, M. J., and Morris, M. W. 2006. “Blaming Leaders for Organizational Accidents: Proxy Logic in Collective-Versus Individual-Agency Cultures,” Organizational Behavior and Human Decision Processes (101:1), pp. 36-51.
Zhang, N. A., Wang, C. A., Karahanna, E., and Xu, Y. 2022. “Peer Privacy Concern: Conceptualization and Measurement,” MIS Quarterly (46:1). pp. 491-530.
Zhou, X., He, L., Yang, Q., Lao, J., and Baumeister, R. F. 2012. “Control Deprivation and Styles of Thinking,” Journal of Personality and Social Psychology (102:3), pp. 460-478.
Zuckerberg M. 2020. “Starting the Decade by Giving You More Control Over Your Privacy”. Retrieved from: https://about.fb.com/news/2020/01/data-privacy-day-2020/
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top