参考文献
|
-
Ringle, C. M., Wende, S., & Will, S. (2005), "SmartPLS 2.0 (M3) Beta", From:http://www.smartpls.de/.
-
Facebook. (2012), 'Facebook Terms and Policies", From: https://www.facebook.com/policies/.
-
Walker, H. M. (1940), "Degrees of Freedom", Journal of Educational Psychology, Vol.31(4), pp.253–269.
-
(1998).Modern Methods for Business Research.Mahwah, NJ:Lawrence Erlbaum Associates.
-
Ajzen, I.(1991).The Theory of Planned Behavior.Organizational Behaviour & Human Decision Processes,50(2),179-211.
-
Al-Debei, M. M.,Al-Lozi, E.,Papazafeiropoulou, A.(2013).Why People Keep Coming Back to Facebook: Explaining and Predicting Continuance Participation from an Extended Theory of Planned Behaviour Perspective.Decision Support Systems,55,43-54.
-
Bansal, G.,Zahedi, F. M.,Gefen, D.(2010).The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online.Decision Support Systems,49(2),138-150.
-
Barclay, D.,Higgins, C.,Thompson, R.(1995).The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration.Technology Studies,2(2),285-309.
-
Beldad, A.,Jong, M. D.,Steehouder, M.(2010).How Shall I Trust the Faceless and the Intangible? A Literature Review on the Antecedents of Online Trust.Computers in Human Behavior,26(5),857-869.
-
Benbasat, I.,Wang, W.(2005).Trust in and Adoption of Online Recommendation Agents.Journal of the Association for Information Systems,6(3),72-101.
-
Bhattacherjee, A.(2002).Individual Trust in Online Firms: Scale Development and Initial Trust.Journal of Management Information Systems,19(1),213-243.
-
Boyd, D. M. ,Ellison N. B.(2007).Social Network Sites: Definition, History, and Scholarship.Journal of Computer-Mediated Communication,13(1),210-230.
-
Braun, M. T.(2013).Obstacles to Social Networking Website Use among Older Adults.Computers in Human Behavior,29(3),673-680.
-
Bryman, A.(2004).Social Research Methods.Oxford:Oxford University Press.
-
Chang, C.-W.,Chen, G. M.(2014).College Students' Disclosure of Location-Related Information on Facebook.Computers in Human Behavior,35,33-38.
-
Chau, P.,Hu, P.(2001).Information Technology Acceptance by Individual Professionals: A Model Comparison Approach.Decision Sciences,32(4),699-719.
-
Chen, L.,Tsoi, H. K.(2011).Privacy Concern and Trust in Using Social Network Sites: A Comparison between French and Chinese Users.Lecture Notes in Computer Science,6948,234-241.
-
Chin, W. W.,Marcolin, B. L.,Newsted, P. R.(2003).A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic Mail Emotion/Adoption Study.Information System Research,14(2),189-217.
-
Compeau, D. R.,Higgins, C. A.,Huff, S.(1999).Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study.MIS Quarterly,23(2),145-158.
-
Crespo, A. H.,del Bosque, I. R.,Sánchez, M. M.(2009).The Influence of Perceived Risk on Internet Shopping Behavior: A Multidimensional Perspective.Journal of Risk Research,12(2),259-277.
-
Davis, F. D.(1989).Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.MIS Quarterly,13(3),319-339.
-
Davis, F. D.,Bagozzi, R. P.,Warshaw, P. R.(1992).Extrinsic and Intrinsic Motivation to Use Computers in the Workspace.Journal of Applied Social Psychology,22(14),1111-1132.
-
Davis, F. D.,Bagozzi, R. P.,Warshaw. P. R.(1989).User Acceptance of Computer Technology: A Comparison of Two Theoretical Models.Management Science,38(8),982-1002.
-
Davis, G. B.(ed.)(2005).The Blackwell Encyclopedia of Management.Malden, MA:Blackwell.
-
De Wolf, R.,Willaert, K.,Pierson, J.(2014).Managing Privacy Boundaries Together:Exploring Individual and Group Privacy Management Strategies in Facebook.Computers in Human Behavior,35,444-454.
-
Dowling, G.,Staelin, R.(1994).A Model of Perceived Risk and Intended Risk Handling Activity.Journal of Consumer Research,21(1),119-135.
-
Eastlick, M. A.,Lotz, S. L.,Warrington, P.(2006).Understanding online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment.Journal of Business Research,59(8),877-886.
-
Featherman, M. S.,Pavlou, P. A.(2003).Predicting e-Services Adoption: A Perceived Risk Facets Perspective.International Journal of Human-Computer Studies,59(4),451-474.
-
Fishbein, M.,Ajzen, I.(1975).Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research.MA:Addison-Wesley.
-
Fogel, J.,Nehmad, E.(2009).Internet Social Network Communities: Risk Taking, Trust, & Privacy Concerns.Computers in Human Behavior,25(1),153-160.
-
Fornell, C. ,Larcker, D. F.(1981).Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.Journal of Marketing Research,18(1),39-50.
-
Gefen, D.,Karahanna, E.,Straub, D. W.(2003).Trust and TAM in Online Shopping: An Integrated Model.MIS Quarterly,27(1),51-90.
-
Gefen, D.,Straub, D. W.,Boudreau, M.(2000).Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice.Communications of the Association for Information Systems,4(7),1-78.
-
Glover, S.,Benbasat, I.(2011).A Comprehensive Model of Perceived Risk of e-Commerce Transactions.International Journal of Electronic Commerce,15(2),47-78.
-
Goodhue, D. L.,Lewis, W.,Thompson, R.(2012).Does PLS Have Advantages for Small Sample Size or Non-Normal Data.MIS Quarterly,36(3),981-1001.
-
Grazioli, S. ,Jarvenpaa, S.(2000).Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers.IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans,30(4),395-410.
-
Gupta, B.,Iyer, L. S.,Weisskirch, R. S.(2010).Facilitating Global e-Commerce: A Comparison of Consumers' Willingness to Disclose Personal Information Online in the U.S and in India.Journal of Electronic Commerce Research,11(1),41-52.
-
Hair, J. F., Jr.,Black, W. C.,Babin, B. J.,Anderson, R. E.(2010).Multivariate Data Analysis: A Global Perspective.NJ:Pearson Prentice Hall.
-
Heidemann, J.,Klier, M.,Probst, F.(2012).Online Social Networks: A Survey of a Global Phenomenon.Computer Networks,56(18),3866-3878.
-
Hong, S. J.,Thong, J. Y. L.,Tam, K. Y.(2006).Understanding Continued Information Technology Usage Behavior: A Comparison of Three Models in the Context of Mobile Internet.Decision Support Systems,42(3),1819-1834.
-
Hsu, M.,Chiu, C.(2004).Predicting Electronic Service Continuance with a Decomposed Theory of Planned Behavior.Behaviour & Information Technology,23(5),359-373.
-
Im, I.,Kim Y.,Han, H.-J.(2008).The Effects of Perceived Risk and Technology Type on Users' Acceptance of Technologies.Information & Management,45(1),1-9.
-
Jang Y.-T.,Chang, S. E.,Chen, P.-A.(2015).Exploring Social Networking Sites for Facilitating Multi-Channel Retailing.Multimedia Tools and Applications,74(1),159-178.
-
Jarvenpaa, S. L.,Tractinsky, N.,Vitale, M.(2000).Consumer Trust in an Internet Store.Information Technology and Management,1(1-2),45-71.
-
Jarvenpaa, S.,Tractinsky, N.(1999).Consumer Trust in an Internet Store.Journal of Computer Mediated Communication,5(2),45-71.
-
Jin, C. H.(2013).The Perspective of a Revised TRAM on Social Capital Building: The Case of Facebook Usage.Information & Management,50(4),162-168.
-
Karyda, M.,Gritzalis, S.,Park, J.H.,Kokolakis, S.(2009).Privacy and Fair Information Practices in Ubiquitous Environments.Internet Research,19(2),194-208.
-
Komiak, S. Y. X.,Benbasat, I.(2006).The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents.MIS Quarterly,30(4),941-960.
-
Kwan, G. C. E.,Skoric, M. M.(2013).Facebook Bullying: An Extension of Battles in School.Computers in Human Behavior,29(1),16-25.
-
Kwon, S. J.,Park, E.,Kim, K. J.(2014).What Drives Successful Social Networking Services? A Comparative Analysis of User Acceptance of Facebook and Twitter.The Social Science Journal,51(4),534-544.
-
Lankton, N. K.,McKnight, D. H.(2011).What Does it Mean to Trust Facebook?: Examining Technology and Interpersonal Trust Beliefs.ACM SIGMIS Database,42(2),32-54.
-
Lawshe, C. H.(1975).A Quantitative Approach to Content Validity.Personnel Psychology,28(4),563-575.
-
Lee, M. R.,Yen, D. C.,Hsiao, C. Y.(2014).Understanding the Perceived Community Value of Facebook Users.Computers in Human Behavior,35,350-358.
-
Li, X.,Hess, T. J.,Valacich, J. S.(2006).Using Attitude and Social Influence to Develop an Extended Trust Model for Information Systems.ACM SIGMIS Database,37(2/3),108-124.
-
Li, Y.(2011).Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework.Communications of the Association for Information Systems,28,453-496.
-
Malhotra, N. K.,Kim, S. S.,Agarwal, J.(2004).Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.Information Systems Research,15(4),336-355.
-
Martins, C.,Oliveira, T.,Popovič, A.(2014).Understanding the Internet Banking Adoption:A Unified Theory of Acceptance and Use of Technology and Perceived Risk Application.International Journal of Information Management,34(1),1-13.
-
Mathieson, K.(1991).Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior.Information Systems Research,2(3),173-191.
-
McKnight, D. H.,Choudhury, V.,Kacmar, C.(2002).The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: A Trust Building Model.Journal of Strategic Information Systems,11(3),297-323.
-
McKnight, D. H.,Choudhury, V.,Kacmar, C.(2002).Developing & Validating Trust Measures for e‑Commerce: An Integrative Typology.Information Systems Research,13(3),334-359.
-
Moore, G. C.,Benbasat, I.(1991).Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation.Information Systems Research,2(3),192-222.
-
Moore, G. C.,Benbasat, I.(1996).Integrating Diffusion of Innovations and Theory of Reasoned Action Models to Predict Utilization of Information Technology by End-Users.Diffusion and Adoption of Information Technology,New York:
-
Park, J.,Lee, D.,Ahn, J.(2004).Risk-Focused e-Commerce Adoption Model: A Cross-Country Study.Journal of Global Information Technology Management,7(2),6-30.
-
Pavlou, P. A.,Fygenson, M.(2006).Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior.MIS Quarterly,30(1),115-143.
-
Pavlou, P.,Gefen, D.(2004).Building Effective Online Marketplaces with Institution-Based Trust.Information Systems Research,15(1),37-59.
-
Pavlou, P.,Liang, H.,Xue, Y.(2007).Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective.MIS Quarterly,31(1),105-136.
-
Petter, S.,Straub, D.,Rai, A.(2007).Specifying Formative Constructs in Information Systems Research.MIS Quarterly,31(4),623-656.
-
Podsakoff, P. M.,Organ, D. W.(1986).Self-Reports in Organizational Research: Problems and Prospects.Journal of Management,12(4),531-544.
-
Rauniar, R.,Rawski, G.,Yang, J.,Johnson, B.(2014).Technology Acceptance Model (TAM) and Social Media Usage: An Empirical Study on Facebook.Journal of Enterprise Information Management,27(1),6-30.
-
Riemenschneider, C. K.,Harrison, D. A,Mykytyn, P. P., Jr.(2003).Understanding IT Adoption Decisions in Small Business: Integrating Current Theories.Information & Management,40(4),269-285.
-
Shin, D.-H.(2010).The Effects of Trust, Security and Privacy in Social Networking: A Security-Based Approach to Understand the Pattern of Adoption.Interacting with Computers,22(5),428-438.
-
Simon, J. L.,Burstein, P.(1985).Basic Research Methods in Social Science.New York:Random House.
-
Smith, H. J.,Milberg, S. J.,Burke S. J.(1996).Information Privacy: Measuring Individuals'Concerns about Organizational Practices.MIS Quarterly,20(2),167-196.
-
Son, J.-Y.,Kim, S. S.(2008).Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological model.MIS Quarterly,32(3),503-529.
-
Taddei, S.,Contena, B.(2013).Privacy, Trust and Control: Which Relationships with Online Self-Disclosure?.Computers in Human Behavior,29(3),821-826.
-
Tan, X.,Qin L.,Kim, Y.,Hsu, J.(2012).Impact of Privacy Concern in Social Networking Web Sites.Internet Research,22(2),211-233.
-
Taylor, S.,Todd, P.(1995).Assessing IT Usage: The Role of Prior Experience.MIS Quarterly,19(4),561-570.
-
Tenenhaus, M.,Vinzi, V. E.,Chatelin, Y.-M.,Lauro, C.(2005).PLS Path Modeling.Computational Statistics & Data Analysis,48(1),159-205.
-
Thompson, R. L.,Higgins, C. A.,Howell, J. M.(1991).Personal Computing: Toward a Conceptual Model of Utilization.MIS Quarterly,15(1),124-143.
-
Turban, E.,Bolloju N.,Liang, T.-P.(2011).Enterprise Social Networking: Opportunities, Adoption, and Risk Mitigation.Journal of Organizational Computing and Electronic Commerce,21(3),202-220.
-
Venkatesh, V.,Brown, S. A.(2001).A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges.MIS Quarterly,25(1),71-102.
-
Venkatesh, V.,Morris, M. G.(2000).Why Don't Men Ever Stop to Ask For Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior.MIS Quarterly,24(1),115-139.
-
Venkatesh, V.,Morris, M. G.,Davis G. B.,Davis, F. D.(2003).User Acceptance of Information Technology: Toward a Unified View.MIS quarterly,27(3),425-478.
-
Vinzi, V. E.(ed.)(2010).Handbook of Partial Least Squares: Concepts, Methods and Applications.Heidelberg:Springer.
-
Young, A. L.,Quan-Haase, A.(2013).Privacy Protection Strategies on Facebook.Information, Communication & Society,16(4),479-500.
-
Zhou, T.(2012).Examining Location-Based Services Usage From the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk.Journal of Electronic Commerce Research,13(2),135-144.
-
Zhou, T.,Li, H.(2014).Understanding Mobile SNS Continuance Usage in China from the Perspectives of Social Influence and Privacy Concern.Computers in Human Behavior,37,283-289.
|