|
一、中文部份 1. 吳仁和資訊管理-企業創新與價值創新(七版)ISBN 987-986-457-042-3 2. 陳耕硯(2015)。以隱私計算理論探討影響LBS App下載意圖的因素。國立中山大學資訊管理學系研究所碩士論文,高雄市。 3. 王紹蓉、梁定澎、賴誼禎(2016),『揭露與隱藏之拉鋸:人氣需求與隱私顧慮對臉書隱私管理行為之影響』,資訊管理學報,第二十三卷,第四期,445-472頁 二、英文部份 1. Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in e-commerce: examining user scenarios and privacy preferences. Paper presented at the Proceedings of the 1st ACM conference on Electronic commerce, Technology & Society, 20–36. 2. Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 2(2005), 24-30. 3. Acquisti, A., & Gross, R. (2006). Awareness, information sharing, and privacy on the Facebook. Paper presented at the 6th “Privacy Enhancing Technologies”, workshop Cambridge, England. 4. Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS quarterly, 33(2), 339-370. 5. Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS quarterly, 30(1), 13-28. 6. Barnes, S.B., 2006. A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from http://firstmonday.org/article/view/1394/1312. 7. Barth, S., & De Jong, M. D. (2017). The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. 8. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 35(4), 1017-1042. 9. Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245-270. 10. Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101-106. 11. Bettina, B., Oliver, G., and Sarah, S. (2005). “Privacy in E-Commerce: Stated Preferences vs. Actual Behavior.” Communications of the ACM, Vol. 48, No. 4: pp. 101-106. 12. Boyd, D. (2008). Taken out of context. American teen sociality in networked publics. Ph.D. Dissertation, University of California, Berkeley. http://www.danah.org/papers/TakenOutOfContext.pdf (June 6th, 2011). 13. Boyd, D., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3086/2589 (June 6th, 2011). 14. Berendt, B., Gunther, O., and Spiekermann, S. (2005). “Privacy in E-Commerce: Stated Preferences vs. Actual Behavior.” Communication of the ACM, Vol. 48, No. 4: pp. 101-106. 15. Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. 16. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115. 17. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social Issues, 59(2), 323-342. 18. DeCew, Judith, "Privacy", The Stanford Encyclopedia of Philosophy (Spring 2018 Edition), Edward N. Zalta (ed.), 19. Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83–108.
20. Dimoka, A., Pavlou, P. A., & Davis, F. D. (2011). Research commentary-NeuroIS: the potential of cognitive neuroscience for information systems research. Information Systems Research, 22(4), 687-702. 21. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. 22. Dinev, T., Xu, H., & Smith, H. J. (2009). Information privacy values, beliefs and attitudes: An empirical analysis of Web 2.0 privacy. Paper presented at the System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. 23. Equifax. (1996). “Harris-Equifax Consumer Privacy Survey” Equifax, Inc., Atlanta, GA. 24. Harris, L. and Westin, A.F. (1998). “E-commerce and Privacy: What Net Users Want.” Privacy and American Business, Hackensack, NJ. 25. Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The value of privacy assurance: an exploratory field experiment. MIS quarterly, 19-33. 26. Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. 27. Lai, C. Y., Liang, T. P., & Hui, K. L. (2018). Information Privacy Paradox: A Neural Science Study. PACIS 2018 Proceedings, No. 247. 28. Laufer, R. S., Proshansky, H. M., & Wolfe, M. (1973). Some analytic dimensions of privacy. Paper presented at the Third International Architectural Psychology Conference. 29. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42. 30. Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. 31. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. 32. Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization science, 11(1), 35-57. 33. Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. 34. Papacharissi, Z., & Gibson, P. L. (2011). 15 minutes of privacy: Privacy, sociality, and publicity on social network sites. In S. Trepte, & L. Reinecke (Eds.): Privacy online: Perspectives on privacy and self-disclosure in the social web (pp. 75–89). Heidelberg and New York: Springer. 35. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: a principal-agent perspective. MIS quarterly, 31(1), 105-136. 36. Sheehan, K. B., & Hoy, M. G. (1999). Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns. Journal of advertising, 28(3), 37-51. 37. Shin, J., Cho, D., & Sim, J. (2017). Concerns make your decision better: Privacy perception, increased awareness, and the decision of mobile app installation. 38. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 35(4), 989-1016. 39. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly, 167-196. 40. Stone, D. L., Lukaszewski, K. M., Stone-Romero, E. F., & Johnson, T. L. (2013). Factors affecting the effectiveness and acceptance of electronic selection systems. Human Resource Management Review, 23(1), 50-70. 41. Sperber, D. & Wilson, D. (1986), Relevance: Communication and Cognition. Oxford: Blackwell.(Second edition 1995.) 42. Teltzrow, M. and Kobsa, A. (2004). Impacts of User Privacy Preferences on Personalized Systems: A Comparative Study. Kluwer Academic Publishers, Dordrecht, Netherlands: pp. 315-332. 43. Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 20–36. 44. Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 16. 45. Weible, R.J. (1993). Privacy and Data: An Empirical Study of the Influence and Types and Data and Situational Context upon Privacy Perceptions in Department of Business Administration. Mississippi State University. p. 10. 46. William L. Prosser, Privacy, 48 Calif. L. Rev. 383 (1960). (California Law Review) 47. Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151-168. 48. Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710–722.
49. Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. CyberPsychology & Behavior, 11(6), 763–765. 50. Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90. 51. Zhang, B., & Xu, H. (2016, February). Privacy nudges for mobile applications: Effects on the creepiness emotion and privacy attitudes. In Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing (pp. 1676-1690). ACM.
|