:::

詳目顯示

回上一頁
題名:個人線上自我揭露行為之研究
作者:徐聖飛 引用關係
作者(外文):Sheng-Fei Hsu
校院名稱:國立雲林科技大學
系所名稱:管理研究所博士班
指導教授:施東河
學位類別:博士
出版日期:2010
主題關鍵詞:隱私關注信任自我效能線上自我接露.認知行為控制電腦自我效能認知隱私隱私privacy concerntrustprivacyself-efficacyperceived behavioral controlcomputer self-efficacyself-disclosure online.perceived privacy
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:31
雖然科技讓生活的各個層面變得更為便捷,但也同時引發了人們對個人隱私權的關注。當隱私、自我揭露、與科技結合在一起時,對於其間的變化吾人依然不甚瞭解。網際網路的成長已激起許多不同領域的研究人員調查在這特殊的社會脈絡中各種議題。然而多數的研究都聚焦在與電子商務及電腦通訊相關連的隱私安全及相關的發展,對於從個人觀點的隱私認知卻被忽略掉了。
影響個人對線上自我揭露的行為與認知,除了一些心理因素影響之外,也包括了個人的電腦知識及技術。為了要瞭解科技與心理兩大因素如何影響人們對隱私的關注及控制自我揭露的行為,本研究除了利用隱私感知及隱私關注來評估人們的主觀態度之外,也引用電腦自我效能及感知行為控制來衡量科技的影響。本研究依據相關文獻提出假說且據以形成模型,並以結構方程式做為分析暨驗證假說之工具。
研究結果顯示除了感知行為控制對自我線上揭露形成反向效果,而與所提出之假說不符之外,其餘假說皆成立。也就是個人的隱私感知及隱私關注分別對信任及過去隱私行為等二個構面顯示正向關係,而後二者對線上自我揭露有正向關係。另外,電腦自我效能對感知行為控制及隱私關注亦顯示正向關係。
雖然科技讓生活的各個層面變得更為便捷,但也同時引發了人們對個人隱私權的關注。當隱私、自我揭露、與科技結合在一起時,對於其間的變化吾人依然不甚瞭解。網際網路的成長已激起許多不同領域的研究人員調查在這特殊的社會脈絡中各種議題。然而多數的研究都聚焦在與電子商務及電腦通訊相關連的隱私安全及相關的發展,對於從個人觀點的隱私認知卻被忽略掉了。
影響個人對線上自我揭露的行為與認知,除了一些心理因素影響之外,也包括了個人的電腦知識及技術。為了要瞭解科技與心理兩大因素如何影響人們對隱私的關注及控制自我揭露的行為,本研究除了利用隱私感知及隱私關注來評估人們的主觀態度之外,也引用電腦自我效能及感知行為控制來衡量科技的影響。本研究依據相關文獻提出假說且據以形成模型,並以結構方程式做為分析暨驗證假說之工具。
研究結果顯示除了感知行為控制對自我線上揭露形成反向效果,而與所提出之假說不符之外,其餘假說皆成立。也就是個人的隱私感知及隱私關注分別對信任及過去隱私行為等二個構面顯示正向關係,而後二者對線上自我揭露有正向關係。另外,電腦自我效能對感知行為控制及隱私關注亦顯示正向關係。
1.Adkinson, W.F., Eisenach, J.A., Lenard, T.M., (2002). Privacy online: a report on the information practices and policies of commercial web sites. Progress and Freedom Foundation, Washington DC.
2.Ajzen, I. (2002). Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32, 1–20.
3.Ajzen, I.(1991). The Theory of Planned Behaviour. Organizational Behaviour and Human Decision Processes, 50, 179-211.
4.Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behaviour. in Action Control: From Cognition to Behaviour Kuhland, J., and Beckman, J. (Eds), Springer, Heidelberg, pp.11-39.
5.Ajzen, I. and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, New Jersey: Prentice-Hall.
6.Altman, I., (1975), The Environment and Social Behaviour. Brooks/Cole, Monterey, CA.
7.Andrade, Eduardo B., Kaltcheva, V., and Weitz, B., (2002), "Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Company Reputation," Advances in Consumer Research, 29, 350-353.
8.Armitage CJ, & Conner M., (2001). Efficacy of the Theory of Planned Behaviour: a meta- analytic review. Br J Soc Psychol. 471–499.
9.Armitage, C.J. & Conner, M. (1999). Distinguishing perceptions of control from self-efficacy: Predicting consumption of a low fat diet using the Theory of Planned Behaviour. Journal of Applied Social Psychology, 29,72-90.
10.Bagozzi, R., & Yi, Y. (1988) “On the evaluation of structural equation models”, Journal of the Academic of Marketing Science, No 16, pp. 74-94.
11.Bagozzi, R., Yi, Y., and Phillips, L. (1991) “Assessing construct validity inorganizational research”. Administrative Science Quarterly, Vol. 36 No 3, pp. 421-458.
12.Bakker, A.B., Buunk, B.P., Siero, F.W., & Van den Eijnden, R.J.J.M. (1997). Application of a modified health belief model to HIV-preventive behavioral intentions among gay and bisexual men. Psychology and Health, 12, 481-492.
13.Bandura, A. (2001). Constructing self-efficacy scales. Acquired 7.6.01 in html-format from Available: www.emory.edu/EDUCATION/mfp/banduraguide.html.
14.Bandura, A. (1995). Self-Efficacy in Changing Societies. Cambridge University Press.
15.Bandura, A. (1994). Self-efficacy. In V. S. Ramachaudran (Ed.), Encyclopedia of human
behavior,4. New York: Academic Press, pp. 71-81.
16.Bandura, A. (1992) Exercise of personal agency through the self-efficacy mechanisms. In R.Schwarzer (Ed.), Self-efficacy: Thought control of action. Washington, DC: Hemisphere.
17.Bandura, A. (1982). Self-Efficacy Mechanism in Human Agency. American Pychologist, 37(2), pp.122-147.
18.Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W.H. Freeman and Company.
19.Bandura, A. (1977). Self-Efficacy: Toward a Unifying Theory of Behavioural Change. Pyschological Review, 84(2), 191-215.
20.Bargh, J., &McKenna, K. (2004). The Internet and social life. Annual Review of Psychology, 55(1), 573–590.
21.Belanger F., Hiller, J., and Smith, W., (2002). Trustworthiness in Electronic Commerce: The Role of Privacy, Security and Site Attributes, Journal of Strategic Information Systems, Vol. 11: 245-270.
22.Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness-of-fit in the analysis of covariance structures. Psychological Bulletin, 88, 588-606.
23.Bentler, P. M. (1995), EQS Structural wquations program manual, Encino, CA: Multivariate Software Inc.
24.Ben-Ze’ev, A. (2003). Privacy, emotional closeness, and openness in Cyberspace. Computers in Human Behavior, 19, p.451–467.
25.Bhattacherjee, A, (2002), Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19(1), 211-241.new window
26.Bos, N., Olson, J.S., Gergle, D., Olson, G.M., and Wright, Z. (2002). Rich Media Helps Trust Development. In Proceedings of CHI 2002, pp. 135-140. New York: ACM Press.
27.Bouffard-Bouchard, T. (1990). Influence of self-efficacy on performance in a cognitive
task. The Journal of Social Psychology, 130, 353-363.
28.Busch, T. (1995). Gender differences in self-efficacy & attitudes towards computers. Journal of Educational Computing Research, 12(2), 147-158.
29.Chang A., Kannan P., Whinston A., (1999) The economics of freebies in exchange for consumer information on the Internet: an exploratory study international. J Electron Commer 4:85–102.
30.Carmines, E. and McIver, J. (1981), Analyzing Models with Unobserved Variables: Analysis of Covariance Structures, In G. Bohmstedt and E. Borgatta (Eds.), Social measurement: Current Issues, Sage, Beverly Hills, Calif.
31.Chelune, G. (1987). A neuropsychological perspective of interpersonal communication. In V. J. Derlega & J. H. Berg (Eds.), Self-disclosure: Theory, research, and therapy (pp. 10-34). New York: Plenum.
32.Cheskin Research. (2000). Trust in the wired Americas. Retrieved 3-10-2009 from http://www.cheskin.com/think/studies/trust2.html.
33.Chieh, C., Kleiner, B., (2003). How Organisations manage the issue of Employee Privacy today. Management Research News. vol. 26, 82-88.
34.Chellappa, R., (2001). Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security, retrieved 4-10-2009 from http://asura.usc.edu/~ram/rcf-papers /sec-priv.pdf.
35.Chellappa, R. (2001), The Role of Perceived Privacy and Perceived Security in the Development of Trust in Electronic Commerce Transactions, Working Paper, ebizlab (Marshall School of Business, USC), Los Angeles.
36.Clarke, R., (2007), Introduction to Dataveillance and Information Privacy, and Definitions of Terms. Xamax Consultancy Pty Ltd.
37.Clarke R., (1999) Internet privacy concerns confirm the case for intervention. Commun ACM, 42:61–7
38.Campbell, D. T., and Fiske, D. W. (1959) “Convergent and discriminant validation by
the multitrait-multimethod matrix”, Psychological Bulletin, Vol. 56 No 2, pp. 81-105.
39..Cole D. A. (1987). “Utility of confir- matory factor analysis in validation research”. Journal of Counseling and Clinical Psychology, 55, 584-594.
40.Compeau, D., & Higgins, C.. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19, 189-211.new window
41.Conner, M. and Sparks, P. (2005). Theory of planned behaviour and health behaviour. In M. Conner, and P. Norman, (Eds.), Predicting Health Behavior,170-222.
42.Cranor, L., (2003). I Didn''t Buy it for Myself: Privacy and Ecommerce Personalization, in 2003 ACM Workshop on Privacy in the Electronic Society, ACM Press.
43.Culnan, M.J., Milne, G.R., (2001). The Culnan-Milne survey on consumers & online privacy notices: summary of responses. Proceedings of Get Noticed: Effective Financial Privacy Notices. A Federal Trade Commission Workshop. Washington, DC.
44.Culnan, M. J. (1999). Georgetown Internet Privacy Policy Study: Privacy Online in 1999: A report to the Federal Trade Commission. Washington DC: Georgetown University.
45.Culnan, M., & Armstrong, P.,(1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
46.Conner, M., Sherlock, K., & Orbell, S. (1998). Psychosocial determinants of ecstasy use in young people in the UK. British Journal of Health Psychology, 3, 295–317.
47.Dinev, T., & Hart, P. (2006). Internet privacy concerns and social awareness as determinants of intentional to transact. International Journal of Electronic Commerce, 10(2), 7-29.
48.Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: Measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.
49.Eastin, M.S., & LaRose, R. (2000). Internet self-efficacy and the psychology of the digital divide. Journal of Computer Mediated Communication, 6(1).
50.Eastlick, M.A. et al., (2006), Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment, Journal of Business Research 59, 877– 886.
51.Estabrooks, P. and Carron, A.V.(1998). The conceptualization and effect of control beliefs on exercise in the elderly, Journal ofAging and Health, 10, 441-457.
52.Everett, A.,Wong, M., Paynter, J., (2005). Balancing Employee and Employer Rights: An International Comparison of E-mail Privacy in the Workplace, Journal of Individual Employment Rights, vol. 11, 291-310.
53.Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory of research. Reading, MA: Addison-Wesley.
54.Fornell, C., and Larcker, D.F., (1981) Evaluating structural equation models with unobservables and measurement error, Journal of Marketing Research, Vol. 18 No1, pp. 39-50.
55.Friedman, B., Reed, L., (2007). Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-mail Use, Employee Responsibilities and Rights Journal, vol. 19, 75-83.
56.Fusilier, M.R., & Hoyer, W.D. (1980). Variables affecting perceptions of invasion of privacy in a personnel selection situation. Journal of Applied Psychology, 65(5), 623.
57.Galegher, J. Sproull, L. and Kiesler, S. (1998) Legitimacy, authority and community in electronic support groups. Written Communication, 15, .493-530.
58.Garfinkel, S. (2000) Database Nation: the death of privacy in the 21st century. Sebastopol, CA: O''Reilly and Associates, Inc.
59.Gauzente, C., (2004), Web merchants’ privacy and security statements: How reassurint are they for consumers? A two –sided approach, Journal of Electronic Commerce Research, VOL. 5, NO.3.
60.Gefen, D., D. Straub, M. Boudreau. (2000). Structural equation modeling and regression: Guidelines for research practice. Comm. Assoc. Inform. Systems 7(August) 1–78.
61.Gilbert, S. J. (1976). Empirical and theoretical extensions of self-disclosure. In G. R. Miller (Ed.), Explorations in interpersonal communication ,197-216.
62.Gist, M.E., & Mitchell, T.R. (1992). Self-efficacy: A theoretical analysis of its determinants and malleability. The Academy of Management Review, 17(2), 183-211.
63.Grabner-Kr?黷ter, S. and Kaluscha, E., (2003). Empirical Research in On-line Trust: A Review and Critical Assessment, International Journal of Human-Computer Studies, Vol. 58: 783-812.
64.Hagger, M., Chatzisarantis, N., and Biddle, S., (2001), The influence of self-efficacy and past behaviour on the physical activity intentions of young people, Journal of Sports Sciences, 19, 711-725.
65.Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998), Multivariate Data Analysis. Prentice-Hall International, Inc., 5th Edition, Chapter 11.
66.Hair, J. F., Black, B., Babin, B., Anderson, R. E., and Tatham, R. L. (2005) , Multivariate Data Analysis (6th ed.), Prentice Hall.
67.Hale, M., and Chan, E., (2007). Concerns for Information Privacy: A Literature Review, CollECTeR, 9-11, Melbourne Australia.
68.Hayduk, L.A., (1987), Structural Equation Modeling with LISREL: Essentials and Advances, Johns Hopkins University Press. Baltimore, MD.
69.Hoelter, J. W. (1983). The analysis of covariance structures: Goodmess-of-fit indices. Sociological Methods and Research, 11, 325-344.
70.Hoffman, D., Novak, T., Peralta, M., (1999), Information Privacy in the Marketspace: implications for the commercial uses of anonymity on the web, The Information Society, Vol.15, n.2.
71.Holmes, J. G., & Rempel, J. K. (1989). Trust in close relationships. In C. Hendrick (Ed.), Close relationships (pp.187-220). Newbury Park, CA: Sage.
72.Hu, L. T., & Bentler, P. M. (1995), Evaluation model fit. In R. H. Hoyle (ed.), Structural equation modeling: Concepts, issues, and applications (pp.76-99). Thousand Oaks, CS: Sage.
73.Hu, L. & Bentler, P. M. (1999), “Cutoff Criteria for fit Indexes in Covariance Structural Analysis: Conventional Criteria Versus New Alternatives,” Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55.
74.Joinson, A.N., Reips, U-D., Buchanan, T.B., & Paine Schofield, C.B., (2008). Privacy, Trust and Self-Disclosure Online. In press, Human-Computer Interaction.
75.Joinson, A.N. & Paine, C.B. (2007). Self-Disclosure, Privacy and the Internet. In A.N Joinson, K.Y.A McKenna, T. Postmes and U-D. Reips (Eds). Oxford Handbook of Internet Psychology 237-252.
76.Joinson, A., Paine, C., Buchanan, T., & Reips, U. (2007). Privacy, Trust and Self- Disclosure to Web-based Surveys. Proceedings of the Association of Survey Computing International Conference, Southampton September 11-12.
77.Joinson, A., (2007). Privacy and Self-Disclosure Online: Full Research Report. ESRC End of Award Report, RES-341-25-0011. Swindon: ESRC
78.Joinson, A.N., Paine, C.B., Reips, U-D. & Buchanan, T. (2006). Privacy and Trust: The role of situational and dispositional variables in online disclosure. Workshop proceedings of Pervasive 2006, Lecture notes in Computer Science, Dublin.
79.Kinzie, M., Delcourt, M, & Powers, S. (1994). Computer technologies: Attitudes and self-efficacy across undergraduate disciplines. Research in Higher Education, 35, 745-768.
80.Kovach, K., Jordan, J., Tansey, K., Framinan, E., (2000), The Balance Between Employee Privacy and Employer Interests, Business and Society Review, 289-298.
81.Kobsa, A., (2007). Privacy-Enhanced Personalization, communication of the ACM, 50(8), 24-33.
82.Langford, M., & Reeves, T.E. (1998). The relationships between computer self-efficacy and personal characteristics of the beginning information systems student. Journal of Computer Information Systems, 38(4), 41-45.
83.Laurenceau, J. P., Barrett, L. F. and Pietromonaco, P. R. (1998) Intimacy as an interpersonal process: The importance of self-disclosure, partner disclosure, and perceived partner responsiveness in interpersonal exchanges. Journal of Personality and Social Psychology, 74, 1238-1251.
84.Luo, X., (2002), Trust production and privacy concerns on the Internet A framework based on relationship marketing and social exchange theory, Industrial Marketing Management 31 111 – 118.
85.Manstead, A.S.R. and Van Eekelen, S.A.M. (1998). Distinguishing between perceived behavioral control and self-efficacy in the domain of academic achievement intentions and behaviors. Journal of Applied Social psychology, 28.
86.Mayer, R, Davis J., and Schoorman F. (1995) An Integrative Model of Organizational Trust, The Academy of Management Review (20) 3, 709-734.
87.McEvoy, S., (2000). E-mail and Internet Monitoring and the Workplace: Do Employees Have a Right to Privacy?, in Communications and the Law. 69-83.
88.McKnight, D. H., Choudhury, V., Kacmar, C.(2002) Developing and Validating Trust Measures for e-Commerce: An Integrative Typology. Information Systems Research (13:3), September . 34-59.
89.McKnight, D. H., L. L., Cummings, and N. L., Chervany (1998), “Initial trust formation in new organizational relationships,” Academy of Management Review (23:3), 1998, pp. 473-490.
90.Metzger, M. J., (2006). Effects of site, vendor, and consumer characteristics on website trust and disclosure. Communication Research, 33, 155–179.
91.Metzger M., (2004), Privacy, trust, and disclosure_ exploring barriers to exectronic commerce, JCMC 9 (4).
92.Miura, I. T. (1987). The relationship of computer self-efficacy expectations to computer interest and course enrollment in college. Sex Roles, 16, 303-311.
93.Moon, Youngme, (2000).Intimate exchanges: Using computers to elicit self-disclosure from consumers”, Jouranl of Consumer ResearchVol.26. 323-339.
94.Mulaik, S. A., James, L. R., Van Altine, J., Bennett, N., Lind, S. and Stilwell, C. D., (1989), “Evaluation of Goodness-of-Fit Indices for Structural Equation Models”, Psychological Bulletin, 105, 430-445.
95.Paine, C., Reips, U., Stieger, S., Joinson, A., Buchanan, T., (2007). Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions, Int. J. Human-Computer Studies 65,526–536.
96.Paine Schofield, C.., & Joinson, A, (2008). Privacy, trust, and disclosure online. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications13-31.. Cambridge, UK: Cambridge University Press.
97.Parent, W., 1983. Privacy, morality and the law. Philosophy and Public Affairs 12, 269–288.
98.Pavlou, P.A. and Chellappa R., (2001), The Role of Perceived Privacy and Perceived Security in the Development of Trust in Electronic Commerce Transaction, Ebizlab Working paper, 39.
99.Rifon, N.J., LaRose, R., & Choi, S.M. (2005). Your privacy is sealed: Effects of Web privacy seals on trust and personal disclosures. The Journal of Consumer Affairs, 39(2), 339-364.
100.Sheppard, B.H., Hartwick, J., and Warshaw, P.R. (1988). The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research. Journal of Consumer Research, 15,325-343.
101.Stewart, K.A., & Segars, A.H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-50.
102.Tidwell, L. C., and Walther, J. B. (2002). Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human Communication Research, 28, p.317-348.
103.Terry, D.J. and O’Leary, J.E. (1995). The Theory of Planned Behaviour: The effects of perceived behavioral control and self-efficacy. British Journal of SocialPsychology, 34, 403-4 15. 18,89-94. Psychology, 5, 249-261. 199-220.
104.Liu, C., Marchewka, J., Lu, J., and Yu, C., (2005). Beyond concern—a privacy-trust- behavioral intention model of electronic commerce, Information & Management, Volume 42, Issue 2, 289-304.
105.Heijden, H. V. D., & Verhagen, T. (2002). Measuring and assessing online store image: a study of two online bookshops in the Benelux. Proceedings of the 35th Annual Hawali International Conference on System Sciences, Honolulu, Hawali.
106.Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Management and Technology, 1, 45–71.
107.Joinson, A.N., Paine (Schofield), C.B., Buchanan, T. & Reips, U-R. (2007), Privacy, Trust and Self-Disclosure to Web-Based Surveys Privacy, Proceedings of the Association of Survey Computing International Conference, Southampton, September.
108.Jupiter Research, (2002). Security and privacy data. Presentation to the Federal Trade Commission Consumer Information Security Workshop.
109.Paine Schofield, C. B., & Joinson, A. N. (2008). Privacy, trust, and disclosure online. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications, 13-31.
110.Rust, R. , Kannan, P., & Peng, N., (2002). The customer economics of Internet privacy. Journal of the Academy of Marketing Science, 30, 455–464.
111.Schoeman, F., 1984. Privacy and intimate information. In: Schoeman, F.(Ed.), Philosophical Dimensions of Privacy. Cambridge University Prss, Cambridge, 403–417.
112.Shayo, C., Olfman, L., Iriberri, A., & Magid, I. (2007). The virtual society: Its driving forces, arrangements, practices, implications. In J. Gackenbach (Ed.). Psychology and the internet: Intrapersonal, interpersonal, and transpersonal implications, 2nd ed., 187-219. Boston: Academic Press.
113.Solove, D.J., (2004). The Digital Person. Technology and Privacy in the Information Age. NYU Press, New York.
114. Tsarenko, Y., and Stewart, D., (2007) Relationship between comfort and trust in the context of disclosing information to financial services providers, AMA Public Policy, 25-28.
115.Westin, A., (1998) E-commerce and privacy: What net users want. Privacy and American Business and Pricewaterhouse Coopers LLP.
116.Wagner, K., (2009). What is self-efficacy? Retrivevd 5-2-2009 from http://psychology.about. com/od/theoriesofpersonality /a/self_efficacy.htm May. 2009
117.White, G., Shah, J., Cook, J., Mendez, M., (2008), Texas State University “relationship between Information Privacy Concerns and Computer Self-Efficacy ”, International Journal of Technology and Human Interaction, Volume 4, Issue 2.
118.Wood, R., & Bandura, A. (1989). Impact of conceptions of ability on self-regulatory mechanism and complex decision making. Journal of Personality and Social Psychology, 56 (3), 407-415.
119.Wei, M., Russell, D., and Zakalik, R.,(2005). Adult Attachment, Social Self-Efficacy, Self-Disclosure, Loneliness, and Subsequent Depression for Freshman College Students: A Longitudinal Study, Journal of Counseling Psychology, Vol. 52, No. 4, 602–614.
120.Van Ryn, M., Lytle, L.A. and Kirscht, J.P. (1996). A test of the Theory of Planned Behavior for two health related practices. Journal of Applied Social Psychology, 26.new window
121.Wang H, Lee MK, Wang C., (1998) Consumer privacy concerns about Internet marketing. Commun ACM ;41:63–70.
122.Warren, S., Brandeis, L.D., (1890). The right to privacy. Harvard Law Review, 5. Available online at /http://www.lawrence.edu/fast/boardmaw/Privacy_brand_warr2.htmlS, accessed on 1 Oct. 2009.
123.Westin, A., (1967). Privacy and Freedom. Atheneum, New York.
124.Wheaton B, Muthen BO, Alwin D, Summers G (1977), Assessing reliability and stability in panel models. In: Sociological Methodology, Heise DR, ed. San Francisco: Jossey-Bass, pp 84Y136.
125.Westin, A., (2001).Opinion Surveys: What Consumers Have To Say About Information Privacy,. Testimony before U.S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade, and Consumer Protection.
126.Yang F, Schmidt P, Davidov E, Bamberg S., (2004), Is there any interaction effect between intention and perceived behavioral control? Methods of Psychological Research Online. 127–157.
127.Yoon, S., (2002). The Antecedents and Consequences of Trust in Online-Purchase Decisions, Journal of Interactive Marketing, Vol.16, N° 2: 47-63, 2002.
128.Zimmerman, B. J. (2000). Self-efficacy: An essential motive to learn. Contemporary Educational Psychology, 25, 82–91.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE