博碩士論文 110421603 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:74 、訪客IP:18.224.44.21
姓名 周晨潔(Chen-Jie-Zhou)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 探討感知價值在個性化推薦服影響購買意願過程的中介效果 ——以隱私自我效能為調節變數
相關論文
★ 從生態共生觀點發展組織合作模式★ 影響產業垂直分工因素之探討
★ 發展台籍專業管家的人力派遣模式★ 影響軍事機關審計品質之關鍵性因素及其相對效率衡量
★ 台灣光碟片設備供應商競爭策略分析★ 國防科技研發機構組織向心力之研究
★ 衡量半導體零組件通路商之相對經營績效★ 衡量半導體晶圓代工廠商生產單位之營運績效
★ 商業銀行營運型態與組織調整對分行營運效率的影響★ 發展行動條碼為基礎的隨傳隨用視訊平台之應用
★ 飛機引擎定子零件維修之訂價調整方式★ 國際化、創新活動與公司績效:台灣上市公司董事會結構論析
★ 探討網際網路事件達成關鍵多數之影響因素★ 生態循環農業產銷策略個案研究
★ 探討以政策規範高耗能產業參與再生能源開發之綜效-以太陽光電發電系統為例★ 適地性服務(LBS)之顧客體驗整合性設計—以中華電信行動導遊為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2026-6-12以後開放)
摘要(中) 近年來,隨著互聯網和大數據技術在商業中的廣泛應用,各種平臺為追求競爭優勢而將每年投資總行銷預算的一半以上用於個性化推薦,以期望給消費者提供更為優質的服務。然而,由此帶來的消費者對隱私問題的擔憂日益凸顯,隱私問題逐漸成為商業和社會生活中一個重要的議題,特別是在行銷領域,隨著企業個性化推薦的普及,如何在保護消費者隱私的前提下實現個性化推薦,已成為行銷研究領域的重要挑戰。
目前,國際學術界針對此主題進行了大量研究,累積了豐富的研究成果。然而在國內研究成果相對較少,因此,本研究試圖從社會交換理論和動機保護理論的角度出發,建立一個新的研究架構,探討隱私風險感知的前因及其對購買意願的影響。儘管先前的研究表明,隱私風險感知對購買意願造成了威脅,但本研究核心在於引入感知價值和隱私自我效能進行探討,以觀察結論是否會改變。
本研究採用線上填寫問卷的形式,透過問卷星和Google表單,共回收了246份大陸有效樣本和257份台灣有效樣本。研究結果表明,隱私關注和威脅評估會直接對購買意願產生負面影響,並增加對隱私風險的感知,但隱私風險感知與購買意願之間的關係不顯著,感知價值在其中扮演了完全中介的作用。此外,研究發現隱私自我效能在調節隱私關注和隱私風險感知、威脅評估和隱私風險感知、隱私風險感知和感知價值,以及感知價值和購買意願之間的關係中起著顯著作用。具體而言,當消費者的隱私自我效能感知程度提高時,可以有效地減輕隱私關注和隱私風險感知、威脅評估和隱私風險感知之間的負面影響,進而促進消費者對於個性化推薦的感知價值和購買意願。
摘要(英) In recent years, with the widespread application of the Internet and big data technology in business, various platforms have invested more than half of their total marketing budget in personalized recommendations each year in pursuit of competitive advantages, in order to provide better services. However, the resulting consumer concerns about privacy issues have become increasingly prominent, and consumer privacy issues have gradually become an important issue in business and social life, especially in the field of marketing. Realizing personalized recommendation under the premise of protecting consumer privacy has become an important challenge in the field of marketing research.
At present, the international academic community has conducted a lot of research on this topic and accumulated rich research results. However, there are relatively few research results in China. Therefore, this study attempts to establish a new research framework from the perspective of social exchange theory and motivation protection theory to explore the antecedents of perceived privacy risks and their impact on purchase intentions. Although previous studies have shown that perceived privacy risk poses a threat to purchase intentions, the core of this study is to introduce perceived value and privacy self-efficacy to explore to see if the conclusions will change.
This study used the form of online questionnaire filling, and collected 246 valid samples from mainland China and 257 valid samples from Taiwan through Questionnaire Star and Google Form. The findings show that privacy concerns and threat assessments directly negatively affect purchase intention and increase perception of privacy risk, but the relationship between privacy risk perception and purchase intention is not significant, and perceived value plays a fully mediated role in it . In addition, the study found that privacy self-efficacy plays a significant role in mediating the relationship between privacy concern and privacy risk perception, threat assessment and privacy risk perception, privacy risk perception and perceived value, and perceived value and purchase intention. Specifically, when consumers′ perception of privacy self-efficacy increases, it can effectively alleviate the negative impact between privacy concerns and privacy risk perceptions, threat assessment and privacy risk perceptions, thereby promoting consumers′ perceived value of personalized recommendations. and purchase intention.
關鍵字(中) ★ 個性化推薦
★ 隱私關注
★ 隱私感知風險
★ 感知價值
★ 電商購買意願
★ 隱私自我效能
關鍵字(英)
論文目次 中文摘要 i
Abstract ii
誌謝 iii
目錄 iv
圖目錄 vi
表目錄 vii
一、 緒論 1
1-1 研究背景 1
1-2 研究動機 3
1-3 研究目的 4
二、 文獻探討 6
2-1 個性化推薦 6
2-1-1 定義 6
2-1-2 個性化推薦的優勢 6
2-2 社會交換理論 7
2-3 保護動機理論 11
2-4 隱私關注 14
2-5 購買意願 17
2-6 小結 18
三、研究方法 19
3-1 研究流程 19
3-2 研究架構與假設 21
3-2-1 隱私關注與隱私風險感知之關係 22
3-2-2 威脅評估與隱私風險感知之關係 23
3-2-3 隱私風險感知與購買意願之關係 23
3-2-4 感知價值在隱私風險感知與購買意願中的中介作用 24
3-2-5 隱私關注與購買意願之關係 26
3-2-6 威脅評估與購買意願之關係 27
3-2-7 自我效能的調節作用 27
3-3 研究設計 30
3-3-1 研究對象與資料搜集 30
3-3-4 問卷前測及校正 32
3-3-5 正式調查 32
四、研究結果 34
4-1 敘述性統計 34
4-1-1 人口統計相關敘述性分析 34
4-1-2 用戶電商平臺使用情況描述性統計 35
4-2 信效度分析 39
4-3 路徑分析 43
4-3-1 感知價值的中介效果 44
4-3-2 自我效能的調節效果 50
4-4 假設檢驗匯總 55
五、結論與建議 56
5-1 結論 56
5-2 管理意涵 57
5-3 研究限制 59
5-4 研究建议 59
參考文獻 61
附錄一 問卷 74
參考文獻 1.陳博, 金永生. 購物網站的個性化推薦對網路購物體驗影響的實證研究[J]. 北京郵電大學學報: 社會科學版, 2013 (6): 45-51.
2.陳昊, 李文立, 柯育龍. 社交媒體持續使用研究: 以情感回應為中介[J]. 管理評論, 2016,28(9): 61.
3.陳昊, 李文立. 基於情緒中介的資訊安全保護行為研究[J]. 科研管理, 2018, 39(6): 48-56.
4.崔劍峰. 感知風險對消費者網路衝動購買的影響[J]. 社會科學戰線, 2019, 4: 254-258.
5.戴德寶, 劉西洋, 範體軍. 「互聯網+」 時代網路個性化推薦採納意願影響因素研究[J]. 中國軟科學, 2015 (8): 163-172.
6.第51次《中國互聯網路發展狀況統計報告》,取自https://www.cnnic.cn/NMediaFile/2023/0322/MAIN16794576367190GBA2HA1KQ.pdf
7.董大海, 杨毅. 网络环境下消费者感知价值的理论剖析[J]. 管理学报, 2008, 5(6): 856-861.
8.馮超.電子商務個性化推薦的用戶資訊採納影響因素研究[D].華中師範大學, 2015
9.馮建英, 穆維松, 傅澤田. 消費者的購買意願研究綜述[J]. 現代管理科學, 2006 (11): 7-9.
10.鞏震. 網路消費者感知隱私的構面研究[D]. 北京: 北京郵電大學, 2010.
11.郭飛鵬、琚春華. 隱私關注對移動個性化服務採納的影響——基於使用者主觀認知視角的實證研究[J]. 浙江工商大學學報, 2018, 32(1): 85-96
12.何典, 梁英. 電子商務個性化推薦系統研究[J]. 湖南商學院學報, 2005, 12(4): 21-22.
13.胡昌平, 仇蓉蓉. 虛擬社區用戶隱私關注研究綜述[J]. 情報理論與實踐, 2018, 41(12): 149r154.
14.蔣驍, 季紹波. 網路隱私關注與行為意向影響因素的概念模型[J]. 科技與管理, 2009 (5): 71-74.
15.蔣驍, 仲秋雁, 季紹波. 網路隱私的概念, 研究進展及趨勢[J]. 情報科學, 2010 (2): 305-310.
16.康瑾, 郭倩倩. 消費者對互聯網行為定向廣告的感知價值研究[J]. 國際新聞界, 2015, 37(12): 140-153.
17.李凯, 王晓文. 隐私关注对旅游网站个性化服务的影响机制研究[J]. 旅游学刊, 2011, 26(6): 80-86.
18.梁偉萍. 淺談電子商務中的個性化推薦系統[J]. 網路與資訊, 2011, 25(8): 38-38.
19.劉好強. 調節定向與溝通策略對遊客購買意願的影響——感知價值的中介作用[J]. Tourism Tribune/Lvyou Xuekan, 2015, 30(12).
20.劉力, 刁宗廣, 吳慧, 等. 旅行社電子服務品質對旅遊者購買意願的影響研究——感知價值的中介作用[J]. 旅遊論壇, 2011, 4(4): 48-53.
21.龍賢義, 鄧新明, 楊賽凡. 企業社會責任, 購買意願與購買行為——主動性人格與自我效能有調節的中介作用[J]. 系統管理學報, 2020, 29(4): 646-656.
22.羅玉葵. 基於個性化推薦的消費者網路購買意願影響因素分析[J]. 商業經濟研究, 2020.
23.孟博, 劉茂, 李清水, 等. 風險感知理論模型及影響因數分析[J]. 中國安全科學學報, 2010, 20(10): 59-66.
24.孟欣. 試論國內社會化媒體平臺的用戶隱私保護[D]. 浙江工業大學碩士學位論文, 2012
25.彭希羨, 馮祝斌, 孫霄淩, 等. 微博使用者持續使用意向的理論模型及實證研究[J]. 現代圖書情報技術, 2012 (11): 78-85.
26.邱皓政. 社會與行為科學的量化研究與統計分析[J]. 臺北市: 五南, 2000.
27.全民電商時代來了九成消費者愛網購,取自https://ctee.com.tw/news/tech/642467.html
28.王麗閑. 基於社會信任的用戶網路隱私關注與保護行為探究[J]. 電子測試, 2013 (12X): 64-65.
29.肖海清. 电商个性化推荐采纳中用户隐私风险感知的影响因素分析[D]. 华中师范大学, 2015.
30.謝春花. 消費者淘寶網購生鮮水果的感知風險對購買意願的影響研究[D]. 華中農業大學, 2017.
31.楊一翁, 王毅, 孫國輝. 網路推薦系統對消費者的行銷效果——技術接受模型視角[J]. 中國流通經濟, 2016, 30(2): 98-107.
32.張紅. 基於用戶認知的電子商務網站知識推薦服務接受模型研究[D]. 南京理工大學, 2013.
33.張秀偉, 何克清, 王健, 等. Web 服務個性化推薦研究綜述[J]. 電腦工程與科學, 2013, 35(9): 132-140
34.張喆, 胡冰雁. 感知風險對創新產品資訊搜尋的影響——消費者創新性的調節作用[J]. 管理評論, 2014 (8): 145-157.
35.趙冬梅, 紀淑嫻. 信任和感知風險對消費者網路購買意願的實證研究[J]. 數理統計與管理, 2010 (2): 305-314.
36.趙天水. 基於感知風險的跨境電商平臺消費者信任對購買意願的影響[D]. 東華大學, 2016.
37.鄭明松, 王維明. 網際網路商業環境上降低消費者認知風險的研究: 以電腦遊戲軟體為例[J]. 產業論壇雜誌, 2002, 5(1): 21-22.
38.周濤, 魯耀斌. 隱私關注對移動商務用戶採納行為影響的實證分析[J]. 管理學報, 2010 (7): 1046-1051.
39.周濤,魯耀斌,張金隆.基於感知價值與信任的移動商務用戶接受行為研究[J].管理學報,2009,6(10):1407-1412.
40.朱侯, 张明鑫, 路永和. 社交媒体用户隐私政策阅读意愿实证研究[J]. 情报学报, 2018, 37(4): 362-371.
41.朱強, 王興元, 辛璐琦. 隱私關注對網路精准廣告點擊意願影響機制研究——消費者風險感知和自我效能的作用[J]. 軟科學, 2018, 32(4): 115-119.
42.朱智賢. 現代認知心理學評述[J]. 北京師範大學學報: 社會科學版, 1985 (1): 1-6.
43.Akaah I P. A conjoint investigation of the relative importance of risk relievers in direct marketing[J]. J Advertising Res., 1988: 38-44.
44.Aljukhadar M, Senecal S. Usage and success factors of commercial recommendation agents: A consumer qualitative study of MyProductAdvisor. com[J]. Journal of research in Interactive Marketing, 2011, 5(2/3): 130-152.
45.Arachchilage N A G, Love S. Security awareness of computer users: A phishing threat avoidance perspective[J]. Computers in Human Behavior, 2014, 38: 304-312.
46.Bandura A, Freeman W H, Lightsey R. Self-efficacy: The exercise of control[J]. 1999.
47.Bandura A. Social cognitive theory: An agentic perspective[J]. Annual review of psychology, 2001, 52(1): 1-26.
48.Bansal G, Zahedi F M, Gefen D. Do context and personality matter? Trust and privacy concerns in disclosing private information online[J]. Information & Management, 2016, 53(1): 1-21.
49.Bansal G, Zahedi F M, Gefen D. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern[J]. European Journal of Information Systems, 2015, 24: 624-644.
50.Baruh L, Secinti E, Cemalcilar Z. Online privacy concerns and privacy management: A meta-analytical review[J]. Journal of Communication, 2017, 67(1): 26-53.
51.Baskerville, R. (1991a) "Risk analysis as a source of professional knowledge," Computer & Security(10) 8, pp. 749-764.
52.Bauer R A. Consumer behavior as risk taking[C]//Proceedings of the 43rd National Conference of the American Marketing Assocation, June 15, 16, 17, Chicago, Illinois, 1960. American Marketing Association, 1960.
53.Bélanger F, Crossler R E. Privacy in the digital age: a review of information privacy research in information systems[J]. MIS quarterly, 2011: 1017-1041.
54.Bilton N. Price of Facebook privacy? Start clicking[J]. http://www. nytimes. com/2010/05/13/technology/personaltech/13basics. html, 2010
55.Bishop Jr W R. Competitive intelligence[J]. Progressive Grocer, 1984, 63(3): 19-20.
56.Brown M, Muchira R. Investigating the relationship between Internet privacy concerns and online purchase behavior[J]. Journal of Electronic Commerce Research, 2004, 5(1): 62-70.
57.Buchanan T, Paine C, Joinson A N, et al. Development of measures of online privacy concern and protection for use on the Internet[J]. Journal of the American society for information science and technology, 2007, 58(2): 157-165
58.Campbell J, Goldfarb A, Tucker C. Privacy regulation and market structure[J]. Journal of Economics & Management Strategy, 2015, 24(1): 47-73.
59.Chen D Q, Liang H. Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory[J]. IEEE Transactions on Engineering Management, 2019, 66(4): 552-567.
60.Chen H J, Wong S W, Bilgihan A, et al. Capsule hotels: Offering Experiential Value or perceived as risky by tourists? An optimum stimulation level model[J]. International Journal of Hospitality Management, 2020, 86: 102434.
61.Clarke R. Internet privacy concerns confirm the case for intervention[J]. Communications of the ACM, 1999, 42(2): 60-67.
62.Cleff, E. (2007). Privacy issues in mobile advertising. International Review of Law Computers and Technology, 21(3), 225e236.
63.Compeau D, Higgins C A, Huff S. Social cognitive theory and individual reactions to computing technology: A longitudinal study[J]. MIS quarterly, 1999: 145-158.
64.Cox D F, Rich S U. Perceived risk and consumer decision-making—the case of telephone shopping[J]. Journal of marketing research, 1964, 1(4): 32-39.
65.Cranor L F. ′I didn′t buy it for myself′privacy and ecommerce personalization[C]//Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. 2003: 111-117.
66.Dienlin T, Trepte S. Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors[J]. European journal of social psychology, 2015, 45(3): 285-297.
67.Dinev T, Hart P. Internet privacy concerns and social awareness as determinants of intention to transact[J]. International Journal of Electronic Commerce, 2005, 10(2): 7-29.
68.Dinev T, Hart P. Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use[J]. E-Service, 2006, 4(3): 25-60.
69.Dowling G R, Staelin R. A model of perceived risk and intended risk-handling activity[J]. Journal of consumer research, 1994, 21(1): 119-134.
70.Eastin M S, Brinson N H, Doorey A, et al. Living in a big data world: Predicting mobile commerce activity through privacy concerns[J]. Computers in Human Behavior, 2016, 58: 214-220.
71.Elizabeth Dwoskin,2015,EU Seeks to Tighten Data Privacy Laws
72.Emerson, R. M. Social exchange theory. Annual Review of Sociology, 1976, 2: 335-362
73.Faja S, Trimi S. Influence of the web vendor′s interventions on privacy-related behaviors in e-commerce[J]. Communications of the association for information Systems, 2006, 17(1): 27.
74.Featherman M S, Miyazaki A D, Sprott D E. Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility[J]. Journal of services marketing, 2010, 24(3): 219-229
75.Featherman M, Fuller M. Applying TAM to e-services adoption: the moderating role of perceived risk[C]//36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the. IEEE, 2003: 11 pp.
76.Festinger L. A theory of cognitive dissonance[M]. Stanford university press, 1962.
77.Foa E B, Foa U G. Resource theory: Interpersonal behavior as exchange[J]. Social exchange: Advances in theory and research, 1980: 77-94.
78.Forsythe S M, Shi B. Consumer patronage and risk perceptions in Internet shopping[J]. Journal of Business research, 2003, 56(11): 867-875.
79.Fuel R. Quantified self digital tools: A CPG marketing opportunity[J]. Retrieved October, 2014, 6: 2020.
80.Gallarza M G, Gil‐Saura I, Holbrook M B. The value of value: Further excursions on the meaning and role of customer value[J]. Journal of consumer behaviour, 2011, 10(4): 179-191.
81.Hanus B, Wu Y A. Impact of users’ security awareness on desktop security behavior: A protection motivation theory perspective[J]. Information Systems Management, 2016, 33(1): 2-16.
82.Häubl G, Murray K B. Double agents: assessing the role of electronic product recommendation systems[J]. Sloan Management Review, 2006, 47(3): 8-12.
83.Hisrich R D, Dornoff R J, Kernan J B. Perceived risk in store selection[J]. Journal of Marketing Research, 1972, 9(4): 435-439.
84.Hoffman D L, Kalsbeek W D, Novak T P. Internet and Web use in the US[J]. Communications of the ACM, 1996, 39(12): 36-46.
85.Holbrook M B. TheNatureofCustomerValue: AnAxiologyofServicesin theConsumptionExperience[J]. inR. RustandR. L. Oliver (eds) ServiceQuality: New DirectionsinTheoryandPractice, 1994: 21-71.
86.Hur W M, Kim Y, Park K. Assessing the effects of perceived value and satisfaction on customer loyalty: A ‘Green’perspective[J]. Corporate social responsibility and environmental management, 2013, 20(3): 146-156.
87.Igbaria M, Iivari J. The effects of self-efficacy on computer usage[J]. Omega, 1995, 23(6): 587-605.
88.Jacoby J, Kaplan L B. The components of perceived risk[J]. ACR special volumes, 1972.
89.Janz N K, Becker M H. The health belief model: A decade later[J]. Health education quarterly, 1984, 11(1): 1-47.
90.Jin N, Lee S, Lee H. The effect of experience quality on perceived value, satisfaction, image and behavioral intention of water park patrons: New versus repeat visitors[J]. International journal of tourism research, 2015, 17(1): 82-95.
91.Knijnenburg, B.P., Willemsen, M.C., Gantner, Z., Soncu, H., Newell, C.: Explaining the user experience of recommender systems. User Model. User Adapt. Interact. 22 (2012). doi:10.1007/s11257-011-9118-4
92.LaRose R, Rifon N J. Promoting i‐safety: effects of privacy warnings and privacy seals on risk assessment and online privacy behavior[J]. Journal of Consumer Affairs, 2007, 41(1): 127-149.
93.Lazarus R S, Folkman S. Stress, coping and adaptation[J]. 1984.
94.Li H, Kuo C, Rusell M G. The impact of perceived channel utilities, shopping orientations, and demographics on the consumer′s online buying behavior[J]. Journal of computer-mediated communication, 1999, 5(2): JCMC521.
95.Li M L, Lin S P, Chan Y H, et al. Customer Involvement Facets Stimulating Customers′ Intention to Use Internet-Only Bank Services in China: The Extension of Perceived Risk-Value Model[J]. Journal of Organizational and End User Computing (JOEUC), 2021, 33(5): 74-97.
96.Li Y. Empirical studies on online information privacy concerns: Literature review and an integrative framework[J]. Communications of the Association for Information Systems, 2011, 28(1): 28.
97.Liang H, Xue Y L. Understanding security behaviors in personal computer usage: A threat avoidance perspective[J]. Journal of the association for information systems, 2010, 11(7): 1.
98.Liang H, Xue Y. Avoidance of information technology threats: A theoretical perspective[J]. MIS quarterly, 2009: 71-90.
99.Maignan I, Lukas B A. The nature and social uses of the Internet: A qualitative investigation[J]. Journal of Consumer Affairs, 1997, 31(2): 346-371.
100.Malhotra N K, Kim S S, Agarwal J. Internet users′ information privacy concerns (IUIPC): The construct, the scale, and a causal model[J]. Information systems research, 2004, 15(4): 336-355.
101.McDonald A M, Cranor L F. Americans′ attitudes about internet behavioral advertising practices[C]//Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. 2010: 63-72.
102.Metzger, M. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12, 335e361.
103.Miltgen C L, Peyrat-Guillard D. Cultural and generational influences on privacy concerns: a qualitative study in seven European countries[J]. European journal of information systems, 2014, 23(2): 103-125.
104.Miyazaki A D. Online privacy and the disclosure of cookie use: Effects on consumer trust and anticipated patronage[J]. Journal of Public Policy & Marketing, 2008, 27(1): 19-33.
105.Molm L D, Takahashi N, Peterson G. Risk and trust in social exchange: An experimental test of a classical proposition[J]. American journal of sociology, 2000, 105(5): 1396-1427.
106.Nill A, Aalberts R J. Legal and ethical challenges of online behavioral targeting in advertising[J]. Journal of current issues & research in advertising, 2014, 35(2): 126-146.
107.Norberg P A, Horne D R, Horne D A. The privacy paradox: Personal information disclosure intentions versus behaviors[J]. Journal of consumer affairs, 2007, 41(1): 100-126.
108.Pang S M, Tan B C, Lau T C. Antecedents of consumers’ purchase intention towards organic food: Integration of theory of planned behavior and protection motivation theory[J]. Sustainability, 2021, 13(9): 5218.
109.Parker B. Globalization and business practice: Managing across boundaries[M]. SAGE Publications Limited, 1998.
110.Petronio S. Boundaries of privacy: Dialectics of disclosure[M]. Suny Press, 2002.
111.Phelps J E, D′Souza G, Nowak G J. Antecedents and consequences of consumer privacy concerns: An empirical investigation[J]. Journal of Interactive Marketing, 2001, 15(4): 2-17.
112.Rosen R J. Armed with facebook “likes” alone, researchers can tell your race, gender, and sexual orientation[J], 2013.
113.Resnick P, Varian H R. Recommender systems[J]. Communications of the ACM, 1997, 40(3): 56-58.
114.Ricci F, Rokach L, Shapira B. Introduction to Systems of Recommendation Handbook[J]. Recommender Systems Handbook, F. Ricci, L. Rokach, B. Shapira, and PB Kantor, Eds. Springer US, 2011: 1-35.
115.Rifon N J, LaRose R, Choi S M. Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures[J]. Journal of consumer affairs, 2005, 39(2): 339-362.
116.Rogers R W. A protection motivation theory of fear appeals and attitude change1[J]. The journal of psychology, 1975, 91(1): 93-114.
117.Roselius T. Consumer rankings of risk reduction methods[J]. Journal of marketing, 1971, 35(1): 56-61.
118.Rotter J B. Generalized expectancies for internal versus external control of reinforcement[J]. Psychological monographs: General and applied, 1966, 80(1): 1.
119.Schaefers K G, Epperson D L, Nauta M M. Women′s career development: Can theoretically derived variables predict persistence in engineering majors?[J]. Journal of Counseling Psychology, 1997, 44(2): 173.
120.Schiffman L G, Kanuk L L. Comportamiento del consumidor[M]. Pearson educación, 2005.
121.Schmidt S, Benke C, Pané-Farré C A. Purchasing under threat: Changes in shopping patterns during the COVID-19 pandemic[J]. PLoS one, 2021, 16(6): e0253231.
122.Scridon M A, Achim S A, Pintea M O, et al. Risk and perceived value: antecedents of customer satisfaction and loyalty in a sustainable business model[J]. Economic research-Ekonomska istraživanja, 2019, 32(1): 909-924.
123.Shankar G, Devanarayan V, Amaravadi L, et al. Recommendations for the validation of immunoassays used for detection of host antibodies against biotechnology products[J]. Journal of pharmaceutical and biomedical analysis, 2008, 48(5): 1267-1281.
124.Shaw N, Sergueeva K. The non-monetary benefits of mobile commerce: Extending UTAUT2 with perceived value[J]. International journal of information management, 2019, 45: 44-55.
125.Sheth J N, Newman B I, Gross B L. Why we buy what we buy: A theory of consumption values[J]. Journal of business research, 1991, 22(2): 159-170.
126.Smith H J, Dinev T, Xu H. Information privacy research: an interdisciplinary review[J]. MIS quarterly, 2011: 989-1015.
127.Strahilevitz M A, Loewenstein G. The effect of ownership history on the valuation of objects[J]. Journal of consumer research, 1998, 25(3): 276-289.
128.Tan S J. Strategies for reducing consumers’ risk aversion in Internet shopping[J]. Journal of consumer marketing, 1999.
129.Tanskanen K. Who wins in a complex buyer-supplier relationship? A social exchange theory based dyadic study[J]. International Journal of Operations & Production Management, 2015, 35(4): 577-603.
130.Taylor S E. Hospital patient behavior: reactance, helplessness, or control?[J]. Journal of Social Issues, 1979, 35(1): 156-184.
131.Toch E, Wang Y, Cranor L F. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems[J]. User Modeling and User-Adapted Interaction, 2012, 22(1): 203-220.
132.Tucker C E. Social networks, personalized advertising, and privacy controls[J]. Journal of marketing research, 2014, 51(5): 546-562.
133.Turow J, King J, Hoofnagle C J, et al. Americans reject tailored advertising and three activities that enable it[J]. Available at SSRN 1478214, 2009.
134.Vellido A, Lisboa P J G, Meehan K. Quantitative characterization and prediction of on-line purchasing behavior: A latent variable approach[J]. International journal of electronic commerce, 2000, 4(4): 83-104.
135.Wang H, Lee M K O, Wang C. Consumer privacy concerns about Internet marketing[J]. Communications of the ACM, 1998, 41(3): 63-70.
136.White T B, Zahay D L, Thorbjørnsen H, et al. Getting too personal: Reactance to highly personalized email solicitations[J]. Marketing Letters, 2008, 19: 39-50.
137.Wirtz J, Lwin M O, Williams J D. Causes and consequences of consumer online privacy concern[J]. International Journal of service industry management, 2007, 18(4): 326-348.
138.Xie J, Ye L, Huang W, et al. Understanding FinTech platform adoption: impacts of perceived value and perceived risk[J]. Journal of Theoretical and Applied Electronic Commerce Research, 2021, 16(5): 1893-1911.
139.Xiong J, Wu J. Construction of information network vulnerability threat assessment model for CPS risk assessment[J]. Computer communications, 2020, 155: 197-204.
140.Xu H, Dinev T, Smith J, et al. Information privacy concerns: Linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems, 2011, 12(12): 1.
141.Yan J, Liu N, Wang G, et al. How much can behavioral targeting help online advertising?[C]//Proceedings of the 18th international conference on World wide web. 2009: 261-270.
142.Youn S. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents[J]. Journal of Consumer affairs, 2009, 43(3): 389-418.
143.Zhang T C, Gu H, Jahromi M F. What makes the sharing economy successful? An empirical examination of competitive customer value propositions[J]. Computers in Human Behavior, 2019, 95: 275-283.
指導教授 張東生(Dong-Shang-Chang) 審核日期 2023-6-13
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明