參考文獻 |
英文文獻
1. Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In: J. Kuhl & J. Beckman (Eds.), Action Control: From cognition to behavior (pp 11-39). Heidelberg: Springer.
2. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
3. Ajzen, I. (2002). Constructing a TPB questionnaire: Conceptual and methodological considerations. 2019年3月13日,取自https://pdfs.semanticscholar.org/0574/b20bd58130dd5a961f1a2db10fd1fcbae95d.pdf?_ga=2.247588228.2047516183.1558772406-1737810901.1558772406
4. Ajzen, I. (2006). Constructing a Theory of Planned Behavior Questionnaire: Brief description of the theory of planned behavior. 2019年3月13日,取自https://people.umass.edu/aizen/pdf/tpb.measurement.pdf
5. Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
6. Allen, V. (1965). Situational factors in conformity. Advances in Experimental Social Psychology, 2, 133-170.
7. Ames, D. R., Rose, P., & Anderson, C. P. (2006). The NPI-16 as a short measure of narcissism. Journal of Research in Personality, 40, 440-450.
8. Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-Disclosure on the web: the impact of privacy policy, reward and company reputation. Advances in Consumer Research, 29 (1), 350–353.
9. Asch, S.E. (1951). Effects of group pressure on the modification and distortion of judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177–190). Pittsburgh, PA:Carnegie Press.
10. Babin B.J., Darden W.R., & Griffin M. (1994). Work and/or fun: measuring hedonic and utilitarian shopping value. Journal of consumer research, Vol. 20, No. 4 (Mar., 1994), pp. 644-656.
11. Bandura A. (1982). Self-Efficacy Mechanism in Human Agency. American psychologist, Vol. 37, No. 2, 122-147.
12. Bandura A. (1997). Self-efficacy: The exercise of control. Macmillan.
13. Banerjee, A. V. (1992). A Simple Model of Herd Behavior. The Quarterly Journal of Economics, Volume 107, Issue 3, August 1992, Pages 797–817.
14. Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107 (2), 238 246.
15. Bibby, P. A. (2008). Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research. International Conference on Intelligence and Security Informatics, 5075, pp. 392–400.
16. Błachnio, A., Przepiorka, A., Bałakier, E., & Boruch, W. (2016). Computers in Human Behavior, 55, 664–667.
17. Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K.A. Bollen and J.S. Long (Eds.), Testing structural equation models. Newbury Park, CA: Sage.
18. Campbell, W. K., & Foster, J. D. (2007). The narcissistic self: Background, an extended agency model and ongoing controversies. In C. Sedikides & S. J. Spencer (Eds.), The self (pp. 115-138). New York, NY: Psychology Press.
19. Cho, I., Kim, J. K., Park, H., & Lee, S. M. (2014). Motivations of Facebook Places and store atmosphere as moderator. Industrial Management & Data Systems, Vol. 114 No. 9, pp. 1360-1377.
20. Derlega, V. J., Metts, S., Sandra, P., & Margulis, S. T. (1993). Self-Disclosure. California: Sage Publications, Inc.
21. Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, Vol. 17, No. 1, pp. 61-80.
22. Ducoffe, R. H. (1996). Advertising value and advertising on the Web. Journal of Advertising Research, 36(5), 21-35.
23. Eling, N., Krasnova, H., Widjaja, T., & Buxmann, P. (2013). Will you accept an app? Empirical investigation of the decisional calculus behind the adoption of applications on Facebook. In Proceedings of the 34th International Conference on Information Systems, Milan, Italy.
24. Emmons, R. A. (1984). Factor analysis and construct validity of the Narcissistic Personality Inventory. Journal of Personality Assessment, 4S, 291-300.
25. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Addison-Wesley, Reading, MA.
26. Fomell, C. (1983). Issues in the application of covariance structure analysis: A comment. Journal of Consumer Research, 9, 443-448
27. Fornell, C. R., & Larcker, F. F. (1981). Structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39 51.
28. Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis (5th ed.). New York: Macmillan.
29. Henry, J. W., & Stone, R. W. (1994). A structural equation model of end user satisfaction with a computer based medical information system. Information Resources Management Journal, 7(3), 21 33.
30. Hsu, CL., & Lin, CC. (2015). What drives purchase intention for paid mobile apps? – An expectation confirmation model with perceived value. Electronic Commerce Research and Applications, Volume 14, Issue 1, Pages 46-57
31. Insu, C., Joseph, K. K., Heejun, P., & Sang, M. L., (2014). Motivations of Facebook Places and store atmosphere as moderator. Industrial Management and Data Systems, Vol. 114 Issue: 9, pp.1360-1377.
32. Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity. European Journal of Social Psychology, 31(2), 177-192.
33. Jourard, S. M. (1959). Healthy personality and self-disclosure. Mental Hygiene, New York.
34. Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17 (4), 387–402.
35. Kapidzic, S. (2013). Narcissism as a predictor of motivations behind Facebook profile picture selection. Cyberpsychology, Behavior, and Social Networking, 16, 14e19. http://dx.doi.org/10.1089/cyber.2012.0143.
36. Kim H.S. (2016). What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, Volume 54, January 2016, Pages 397-406.
37. Li, H., Sarathy, R., & Wu, H. (2011). The role of affect and cognition on online consumers’ decision to disclosure personal information to unfamiliar online vendors. Decision Support Systems, 51, 434-445.
38. Luarna, P., & Lin, H. (2005). Toward an understanding of thebehavioral intention to use mobile banking. Computers in Human Behavior, 21 873–891.
39. McIver, J. P., & Carmines, E. G. (1981). Unidimensional scaling. California: sage publication.
40. Mehdizadeh, S. (2010). Self-presentation 2.0: Narcissism and self-esteem on Facebook. Cyberpsychology, Behavior and Social Networking, 13(4), 357-364.
41. Morf, C. C., & Rhodewalt, F. (2001). Unraveling the Paradoxes of Narcissism: A Dynamic Self-Regulatory Processing Model. Psychological Inquiry, Vol. 12, No. 4, pp. 177-196.
42. Nunnally, J. C. (1967). Psychometric theory. New York: McGraw-Hill.
43. Omarzu, J. (2000). A Disclosure Decision Model: Determining How and When Individuals Will Self-Disclose. Personality and Social Psychology Review, Volume: 4 issue: 2, page(s): 174-185.
44. Raacke J., Bonds-Raacke J. (2008). MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites. CyberPsychology & Behavior, Vol. 11, No. 2
45. Raskin, R., & Hall, C. S. (1981). The Narcissistic Personality Inventory: Alternate form reliability and further evidence of construct validity. Journal of Personality Assessment, 45,159-162.
46. Raskin, R., & Terry, H. (1988). A Principal-Components Analysis of the Narcissistic Personality Inventory and Further Evidence of Its Construct Validity. Journal of Personality and Social Psychology, Vol. 54, No. 5,890-902.
47. Rheingold, H. (1993). The virtual community: Homesteading on the electronic frontier. Reading, MA: Addison-Wesley.
48. Rivis, A., & Sheeran, P. (2003). Descriptive norms as an additional predictor in the theory of planned behaviour: A meta-analysis. Current Psychology, 22(3), 218-233. DOI:10.1007/s12144-003-1018-2
49. Ryan, T., & Xenos, S. (2011). Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness and Facebook usage. Computers in Human Behavior, 27(5), 1658–1664.
50. Schumacker, R. E., & Lomax, R. G. (2004). A beginner’s guide to structural equation modeling (2nd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.
51. Statista. (2019). Active social network penetration in selected countries as of January 2019. 2019年3月13日,取自https://www.statista.com/statistics/282846/regular-social-networking-usage-penetration-worldwide-by-country/
52. Steiger, J. H., & Lind, J. M. (1980). Statistically based tests for the number of factors. Psychometric Society, Iowa City, IA.
53. Taylor, D. A., Wheeler, L., & Altman, I. (1973). Self-disclosure in isolated groups. Journal of Personality and Social Psychology, 26(1), 39-47.
54. To, P. L., Liao, C., & Lin T. H. (2007). Shopping motivations on Internet: A study based on utilitarian and hedonic value. Technovation, Volume 27, Issue 12, pp. 774-787.
55. Wu, H. L. (2009). Utilitarian and Hedonic Values of Social Network Services. Proceedings of the Fifteenth Americas Conference on Information Systems, Paper 289, San Francisco, CA, USA.
56. Zeithaml, V. A. (1988). Consumer perceptions of price, quality, and value: a means-end model and synthesis of evidence. The Journal of Marketing, 52, 2-22.
57. Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009). Sharing private information online: The mediator effect of social exchange. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce, Taipei, Taiwan.
中文文獻
1. 吳肇銘。(1999)。影響網站使用意向之因素研究─以入門網站為例。國立中央大學資訊管理研究所博士論文,桃園市。
2. 林建宏。(2014)。什麼樣的人離不開 Facebook – 自戀人格的調節效果。國立中央大學資訊管理研究所碩士論文,桃園市。
3. 曹亞璇。(2018)。為什麼願意在遊戲內知識分享?—探討MMORPG玩家遊戲內知識分享之意圖。國立中央大學資訊管理研究所碩士論文,桃園市。
4. 郭俊賦。(2015)。網路使用者的隱私顧慮與誘因對於 其自我揭露行為之影響。國立中央大學資訊管理研究所碩士論文,桃園市。
5. 陳曉莉 (2018)。中國最大資料外洩事件!? 傳駭客在黑市兜售華住酒店集團1.3億名客戶資訊。2019年3月13日,取自https://www.ithome.com.tw/news/125567
6. 陳曉莉 (2019)。資安研究:5個Collection #系列資料庫,總計彙整了22億組外洩的電子郵件與密碼。2019年3月13日,取自https://www.ithome.com.tw/news/128594
7. 創市際。(2018)。社群服務篇與社交媒體類別使用概況。創市際雙周刊,第一一七期。
8. 經濟日報 (2018)。萬豪酒店遭駭,5億個資外洩。2019年3月13日,取自https://money.udn.com/money/story/5599/3511894
|