|
Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in e-commerce: examining user scenarios and privacy preferences. Paper presented at the Proceedings of the 1st ACM conference on Electronic commerce. Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the Proceedings of the 5th ACM conference on Electronic commerce. Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 2(2005), 24-30. Acquisti, A., & Grossklags, J. (2007). What can behavioral economics teach us about privacy. Digital Privacy: Theory, Technologies and Practices, 18, 363-377. Adam, M. T., Krämer, J., Jähnig, C., Seifert, S., & Weinhardt, C. (2011). Understanding auction fever: A framework for emotional bidding. Electronic Markets, 21(3), 197. Alderman, E., & Kennedy, C. (1997). The right to privacy: Vintage. Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Anand, P. (2015). Billions of Android apps vulnerable to hackers. Retrieved from https://www.marketwatch.com/story/billions-of-android-apps-vulnerable-to-hackers-2015-02-27/ Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211. Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS quarterly, 30(1), 13-28. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 35(4), 1017-1042. Baer, R. A., Smith, G. T., & Allen, K. B. (2004). Assessment of mindfulness by self-report: The Kentucky Inventory of Mindfulness Skills. Assessment, 11(3), 191-206. Baer, R. A., Smith, G. T., Hopkins, J., Krietemeyer, J., & Toney, L. (2006). Using self-report assessment methods to explore facets of mindfulness. Assessment, 13(1), 27-45. Bansal, G., & Zahedi, F. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. ICIS 2008 Proceedings, 7. Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150. Barth, S., & de Jong, M. D. T. (2017). The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245-270. Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101-106. Bimber, B., Flanagin, A. J., & Stohl, C. (2005). Reconceptualizing collective action in the contemporary media environment. Communication Theory, 15(4), 365-388. Bishop, S. R., Lau, M., Shapiro, S., Carlson, L., Anderson, N. D., Carmody, J., Velting, D. (2004). Mindfulness: A proposed operational definition. Clinical psychology: Science and practice, 11(3), 230-241. Breckenridge, A. C. (1970). The right to privacy: U of Nebraska Press. Brouwer, Anne-Marie et al. (2015). Using Neurophysiological Signals That Reflect Cognitive or Affective State: Six Recommendations to Avoid Common Pitfalls.” Frontiers in Neuroscience, 9, Article 136. Brown, K. W., & Ryan, R. M. (2003). The benefits of being present: mindfulness and its role in psychological well-being. Journal of Personality and Social psychology, 84(4), 822-848. Brown, M., & Muchira, R. (2004). Investigating the relationship between Internet privacy concerns and online purchase behavior. Journal of Electronic Commerce Research, 5(1), 62-70. Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS quarterly, 399-426. Campbell, A., & Whitehead, J. (2010). How to test your decision-making instincts. McKinsey Quarterly, 1-4. Chadwick, P., Hember, M., Symes, J., Peters, E., Kuipers, E., & Dagnan, D. (2008). Responding mindfully to unpleasant thoughts and images: reliability and validity of the Southampton mindfulness questionnaire (SMQ). British Journal of Clinical Psychology, 47(4), 451-455. Chang, C. (2017). Effects of Online Advertising Appeal and Cognitive Need on Consumer’s Purchase Decision. (Master), National Chengchi University. Chatzisarantis, N. L., & Hagger, M. S. (2007). Mindfulness and the intention-behavior relationship within the theory of planned behavior. Personality and Social Psychology Bulletin, 33(5), 663-676. Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. Corsi-Cabrera, M., Galindo-Vilchis, L., del-Río-Portilla, Y., Arce, C., & Ramos-Loyo, J. (2007). Within-subject reliability and inter-session stability of EEG power and coherent activity in women evaluated monthly over nine months. Clinical neurophysiology, 118(1), 9-21. Crowley, K., Sliney, A., Pitt, I., & Murphy, D. (2010). Evaluating a brain-computer interface to categorise human emotional response. Paper presented at the Advanced Learning Technologies (ICALT), 2010 IEEE 10th International Conference on. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social Issues, 59(2), 323-342. Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches. MIS quarterly, 673-687. Dale, A. M., & Sereno, M. I. (1993). Improved localizadon of cortical activity by combining EEG and MEG with MRI cortical surface reconstruction: a linear approach. Journal of cognitive neuroscience, 5(2), 162-176. Dane, E. (2011). Paying attention to mindfulness and its effects on task performance in the workplace. Journal of management, 37(4), 997-1018. Davidson, R. J., & Kaszniak, A. W. (2015). Conceptual and methodological issues in research on mindfulness and meditation. American psychologist, 70(7), 581-592. Davis, F. D. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of man-machine studies, 38(3), 475-487. de Guinea, A. O., Titah, R., & Léger, P.-M. (2014). Explicit and implicit antecedents of users'' behavioral beliefs in information systems: A neuropsychological investigation. Journal of management information systems, 30(4), 179-210. Deci, E. L., & Ryan, R. M. (1980). Self-determination theory: When mind mediates behavior. The Journal of Mind and Behavior, 33-43. Dehaene, S., Changeux, J.-P., Naccache, L., Sackur, J., & Sergent, C. (2006). Conscious, preconscious, and subliminal processing: a testable taxonomy. Trends in cognitive sciences, 10(5), 204-211. Dhar, R., & Gorlin, M. (2013). A dual‐system framework to understand preference construction processes in choice. Journal of Consumer Psychology, 23(4), 528-542. Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS quarterly, 373-396. Dimoka, A., Pavlou, P. A., & Davis, F. D. (2011). Research commentary-NeuroIS: the potential of cognitive neuroscience for information systems research. Information Systems Research, 22(4), 687-702. Dimoka, A., Davis, F. D., Gupta, A., Pavlou, P. A., Banker, R. D., Dennis, A. R., Ischebeck, A., Müller-Putz, G., Benbasat, I., Gefen, D., Kenning, P. H., Riedl, R., vom Brocke, J., Weber, B. (2012). On the use of neurophysiological tools in IS research: Developing a research agenda for NeuroIS. MIS quarterly, 36(3), 679-702. Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. Dinev, T., McConnell, A. R., & Smith, H. J. (2015). Research commentary—informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box. Information Systems Research, 26(4), 639-655. Dinev, T., Xu, H., & Smith, H. J. (2009). Information privacy values, beliefs and attitudes: An empirical analysis of Web 2.0 privacy. Paper presented at the System Sciences, 2009. HICSS''09. 42nd Hawaii International Conference on. Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316. Epstein, S. (1994). Integration of the cognitive and the psychodynamic unconscious. American psychologist, 49(8), 709-724. Epstein, S., Pacini, R., Denes-Raj, V., & Heier, H. (1996). Individual differences in intuitive–experiential and analytical–rational thinking styles. Journal of Personality and Social psychology, 71(2), 390-405. Er, M. (1988). Decision support systems: a summary, problems, and future trends. Decision Support Systems, 4(3), 355-363. Erdfelder, E., Faul, F., & Buchner, A. (1996). GPOWER: A general power analysis program. Behavior research methods, instruments, & computers, 28(1), 1-11. Etzioni, A. (1999). The Limits of Privacy. Journal of Law, Medicine & Ethics, 27(3), 288-288. Evans, J. S. B. T. (2003). In two minds: dual-process accounts of reasoning. Trends in cognitive sciences, 7(10), 454-459. Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., & Lim, K. H. (2014). Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms. MIS quarterly, 38(2), 407-427. Farinosi, M., & Taipale, S. (2018). Who Can See My Stuff?: Online Self-Disclosure and Gender Differences on Facebook. Observatorio (OBS*), 12, 53-71. Faul, F., Erdfelder, E., Lang, A. G., & Buchner, A. (2007). G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods, 39(2), 175-191. Feldman, G., Hayes, A., Kumar, S., Greeson, J., & Laurenceau, J.-P. (2007). Mindfulness and emotion regulation: The development and initial validation of the Cognitive and Affective Mindfulness Scale-Revised (CAMS-R). Journal of Psychopathology and Behavioral Assessment, 29(3), 177. Felt, A. P., Egelman, S., Finifter, M., Akhawe, D., & Wagner, D. (2012). How to Ask for Permission. Paper presented at the HotSec. Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160. Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57(7), 768-775. Gartner. (2013). Mobile app stores will see annual downloads reach 102 billion in 2013. Retrieved from http://www.gartner.com/newsroom/id/2592315 Goel, V., Buchel, C., Frith, C., & Dolan, R. J. (2000). Dissociation of mechanisms underlying syllogistic reasoning. Neuroimage, 12(5), 504-514. Goel, V., & Dolan, R. J. (2003). Explaining modulation of reasoning by belief. Cognition, 87(1), B11-B22. Graimann, B., Allison, B., & Pfurtscheller, G. (2009). Brain–computer interfaces: A gentle introduction Brain-Computer Interfaces (pp. 1-27): Springer. Gu, J., Xu, Y., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28. Hall, J. E. (2015). Pocket Companion to Guyton & Hall Textbook of Medical Physiology E-Book: Elsevier Health Sciences. Hann, I.-H., Hui, K.-L., Lee, T., & Png, I. (2002). Online information privacy: Measuring the cost-benefit trade-off. ICIS 2002 proceedings, 1. Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electronic Commerce Research and Applications, 9(1), 50-60. Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS quarterly, 37(1), 275-298. Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28-45. Hsu, W.-Y. (2017). A wireless brainwave-driven system for daily-life analyses and applications. Telematics and Informatics, 34(8), 1793-1801. Hui, K.-L., Tan, B. C., & Goh, C.-Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology (TOIT), 6(4), 415-441. Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The value of privacy assurance: an exploratory field experiment. MIS quarterly, 19-33. Isen, A. M. (2001). An influence of positive affect on decision making in complex situations: Theoretical issues with practical implications. Journal of Consumer Psychology, 11(2), 75-85. Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. Kabat-Zinn, J. (2011). Some reflections on the origins of MBSR, skillful means, and the trouble with maps. Contemporary Buddhism, 12(01), 281-306. Kabat-Zinn, J. (2015). Why paying attention is so supremely important. Mindfulness, 6(6), 1484-1486. Kahneman, D. (2003). A perspective on judgment and choice: mapping bounded rationality. American psychologist, 58(9), 697-720. Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607-635. Keith, M., Thompson, S., Hale, J., & Greer, C. (2012). Examining the rationality of location data disclosure through mobile devices. Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173. Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. Paper presented at the International Conference on Financial Cryptography and Data Security. Kharpal, A. (2015). 5 billion Android apps open to hack. Retrieved from https://www.cnbc.com/2015/02/27/5-billion-android-apps-open-to-hack.html Knijnenburg, B. P. (2015). A user-tailored approach to privacy decision support. UC Irvine. Knyazev, G. G., & Slobodskaya, H. R. (2003). Personality trait of behavioral inhibition is associated with oscillatory systems reciprocal relationships. International journal of psychophysiology, 48(3), 247-261. Krajbich, I., Armel, C., & Rangel, A. (2010). Visual fixations and the computation and comparison of value in simple choice. Nature neuroscience, 13(10), 1292-1298. Kuan, K. K., Zhong, Y., & Chau, P. Y. (2014). Informational and normative social influence in group-buying: Evidence from self-reported and EEG data. Journal of management information systems, 30(4), 151-178. Langer, E. J. (1989). Mindfulness: Addison-Wesley/Addison Wesley Longman. Lau, M. A., Bishop, S. R., Segal, Z. V., Buis, T., Anderson, N. D., Carlson, L., Devins, G. (2006). The Toronto mindfulness scale: Development and validation. Journal of clinical psychology, 62(12), 1445-1467. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42. Ledbury, C., Woolhead, L., Thomas, F., Carpenter, R., & Stott, H. (2017). Something for everyone: why the growth of mobile apps isgood news for brands. Retrieved from https://www.ipsos.com/sites/default/files/2017-08/Google-mobile-apps-report-2017.pdf Li, H., Luo, X. R., Zhang, J., & Xu, H. (2017). Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Information & Management, 54(8), 1012-1022. Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers'' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. Lowry, P. B., Moody, G., Vance, A., Jensen, M., Jenkins, J., & Wells, T. (2012). Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the Association for Information Science and Technology, 63(4), 755-776. Müller-Putz, G. R., Riedl, R., & Wriessnegger, S. C. (2015). Electroencephalography (EEG) as a Research Tool in the Information Systems Discipline: Foundations, Measurement, and Applications. CAIS, 37, 46. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users'' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of social Issues, 33(3), 5-21. Margulis, S. T. (2003). On the status and contribution of Westin''s and Altman''s theories of privacy. Journal of social Issues, 59(2), 411-429. Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization science, 11(1), 35-57. Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15-29. Morando, F., Iemma, R., & Raiteri, E. (2014). Privacy evaluation: what empirical research on users’ valuation of personal data tells us. Internet Policy Review. Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. Norris, P., & Epstein, S. (2011). An experiential thinking style: Its facets and relations with objective and subjective criterion measures. Journal of personality, 79(5), 1043-1080. Nunez, M. D., Vandekerckhove, J., & Srinivasan, R. (2017). How attention influences perceptual decision making: Single-trial EEG correlates of drift-diffusion model parameters. Journal of Mathematical Psychology, 76, Part B, 117-130. Nyaniponika, T. (1973). The heart of Buddhist meditation: New York: Weiser Books. O’Leary, P. N., Miller, M. M., Olive, M. L., & Kelly, A. N. (2017). Blurred Lines: Ethical Implications of Social Media for Behavior Analysts. Behavior Analysis in Practice, 10(1), 45–51. Paulus, M. P., Frank, L., Brown, G. G., & Braff, D. L. (2003). Schizophrenia subjects show intact success-related neural activation but impaired uncertainty processing during decision-making. Neuropsychopharmacology, 28(4), 795-806. Pavlou, P. A. (2011). State of the information privacy literature: where are we now and where should we go? MIS quarterly, 35(4), 977-988. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: a principal-agent perspective. MIS quarterly, 31(1), 105-136. Pedersen, D. M. (1982). Personality correlates of privacy. The Journal of Psychology, 112(1), 11-14. Pentina, I., Zhang, L., & Basmanova, O. (2013). Antecedents and consequences of trust in a social media brand: A cross-cultural study of Twitter. Computers in Human Behavior, 29(4), 1546-1555. Petty, R. E., & Cacioppo, J. T. (1979). Issue involvement can increase or decrease persuasion by enhancing message-relevant cognitive responses. Journal of Personality and Social psychology, 37(10), 1915. Petty, R. E., Cacioppo, J. T., & Schumann, D. (1983). Central and peripheral routes to advertising effectiveness: The moderating role of involvement. Journal of Consumer Research, 10(2), 135-146. Pfurtscheller, G., & Da Silva, F. L. (1999). Event-related EEG/MEG synchronization and desynchronization: basic principles. Clinical neurophysiology, 110(11), 1842-1857. Pham, M. T. (1996). Cue representation and selection effects of arousal on persuasion. Journal of Consumer Research, 22(4), 373-387. Pham, T. M., Hung, I. W., & Gorn, G. J. (2011). Relaxation increases monetary valuations. Journal of Marketing Research, 48(5), 814-826. Phelan, C., Lampe, C., & Resnick, P. (2016). It''s Creepy, But it Doesn''t Bother Me. Paper presented at the Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA. Rainie, L. (2016). The state of privacy in post-Snowden America. Retrieved from http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/ Rebolledo-Mendez, G., Dunwell, I., Martínez-Mirón, E. A., Vargas-Cerdán, M. D., De Freitas, S., Liarokapis, F., & García-Gaona, A. R. (2009). Assessing neurosky’s usability to detect attention levels in an assessment exercise. Paper presented at the International Conference on Human-Computer Interaction. Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy: Univ of North Carolina Press. Reyna, V. F. (2004). How people make decisions that involve risk: A dual-processes approach. Current directions in psychological science, 13(2), 60-66. Reynolds, L. M., Lin, Y. S., Zhou, E., & Consedine, N. S. (2015). Does a brief state mindfulness induction moderate disgust-driven social avoidance and decision-making? An experimental investigation. Journal of behavioral medicine, 38(1), 98-109. Riedl, R., Banker, R. D., Benbasat, I., Davis, F. D., Dennis, A. R., Dimoka, A., Kenning, P. (2010). On the foundations of NeuroIS: reflections on the Gmunden Retreat 2009. Communications of the Association for Information Systems, 27 , Article 15. Riedl, R., Davis, F. D., & Hevner, A. R. (2014). Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement. Journal of the Association for Information Systems, 15(10), I. Robertson, J. (2012). Android apps collect too much user data. Retrieved from https://www.smh.com.au/technology/android-apps-collect-too-much-user-data-researcher-says-20121102-28oie.html Robey, D., & Taggart, W. (1981). Measuring managers'' minds: The assessment of style in human information processing. Academy of management review, 6(3), 375-383. Schoeman, F. D. (1984). Philosophical dimensions of privacy: An anthology: Cambridge University Press. Sensor Tower (2018). Global App Revenue Grew 35% in 2017 to nearly $60 Billion. Retrieved from https://sensortower.com/blog/app-revenue-and-downloads-2017 Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach: John Wiley & Sons. Sheehan, K. B., & Hoy, M. G. (1999). Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns. Journal of advertising, 28(3), 37-51. Simon, H. A. (1987). Making management decisions: The role of intuition and emotion. The Academy of Management Executive (1987-1989), 57-64. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 35(4), 989-1016. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals'' concerns about organizational practices. MIS quarterly, 167-196. Stanovich, K. E., & West, R. F. (2000). Individual differences in reasoning: Implications for the rationality debate? Behavioral and brain sciences, 23(5), 645-665. Statista. (2018). Most popular Google Play app store categories from 1st quarter to 3rd quarter 2016 and 2017, by number of downloads (in millions). Retrieved from https://www.statista.com/statistics/256772/most-popular-app-categories-in-the-google-play-store/ Stewart, D. W., & Pavlou, P. A. (2002). From consumer response to active consumer: Measuring the effectiveness of interactive media. Journal of the Academy of Marketing Science, 30(4), 376-396. Stone, D. L., Lukaszewski, K. M., Stone-Romero, E. F., & Johnson, T. L. (2013). Factors affecting the effectiveness and acceptance of electronic selection systems. Human Resource Management Review, 23(1), 50-70. Sur, S., & Sinha, V. (2009). Event-related potential: An overview. Industrial psychiatry journal, 18(1), 70. Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users. MIS quarterly, 37(4), 1141-1164. Sydow, L. (2018). Global App Store Records Shattered Yet Again in Q1 2018. Retrieved from https://www.appannie.com/en/insights/market-data/q1-2018-apps-record-downloads-spend/ Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254-268. Turner, B. M., Forstmann, B. U., Love, B. C., Palmeri, T. J., & Van Maanen, L. (2017). Approaches to analysis in model-based cognitive neuroscience. Journal of Mathematical Psychology, 76, Part B, 65-79. Tversky, A., & Kahneman, D. (1983). Extensional versus intuitive reasoning: The conjunction fallacy in probability judgment. Psychological review, 90(4), 293. Urban, G. L., Hauser, J. R., Liberali, G., Braun, M., & Sultan, F. (2009). Morph the web to build empathy, trust and sales. MIT sloan management review, 50(4), 53. Van Slyke, C., Shim, J., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Vance, A., Anderson, B. B., Kirwan, C. B., & Eargle, D. (2014). Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG). Journal of the Association for Information Systems, 15(10), 679. Walach, H., Buchheld, N., Buttenmüller, V., Kleinknecht, N., & Schmidt, S. (2006). Measuring mindfulness—the Freiburg Mindfulness Inventory (FMI). Personality and Individual Differences, 40(8), 1543-1555. Wang, S. S.-J., Liang, T.-P., & Lai, Y.-J. (2016). Conceal or disclose: exploring factors affecting Facebook users’ privacy management behavior. Journal of Information Management, 23(4), 445-472. Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531-542. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193-220. Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166. Westin, A. F., & Ruebhausen, O. M. (2015). Privacy and freedom: Ig Publishing. Wilson, D., & Valacich, J. S. (2012). Unpacking the privacy paradox: irrational decision-making within the privacy calculus. Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151-168. Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52. Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of management information systems, 26(3), 135-174. Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of management information systems, 26(3), 135-174. Xu, H., Wang, N., & Grossklags, J. (2012). Privacy by redesign: Alleviating privacy concerns for third-party apps. Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90.
|