參考文獻 |
英文部份
Altman, I., & Taylor, D. A. (1973). Social penetration: The development of interpersonal relationships, Oxford, England: Holt, Rinehart & Winston.
Attractiveness, P. (1997). Romance in cyberspace: Understanding online attraction. Journal of Sex Education and Therapy, 22(1), 7-14.
Awad, N. F., & Krishnan, M. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13-28.
Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215.
Barak, A., & Gluck-Ofri, O. (2007). Degree and reciprocity of self-disclosure in online forums. CyberPsychology & Behavior, 10(3), 407-417.
Bargh, J. A., & McKenna, K. Y. A. (2004). The internet and social life. Annual Review Psychology, 55, 573-590.
Bartel Sheehan, K. (1999). An investigation of gender differences in on‐line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24-38.
Bonebrake, K. (2002). College students’’ internet use, relationship formation, and personality correlate. CyberPsychology & Behavior, 5(6), 551-557.
Bourdieu, P. (1986). The forms of capital, Oxford, UK: Wiley Online Library.
Buss, A. (2001). Psychological dimensions of the self. Thousand Oaks, CA: Sage.
Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44-57.
Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2), 181-202.
Chelune, J. G. (1979). Measuring Openness in Interpersonal Communication. In J. G. Chelune (Ed.), Self Disclosure: Origins, patterns and implications of openness in interpersonal relationship (pp. 14-30). San Francisco, CA: Jossy- Bass.
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189-211.
Cozby, P. (1973). Self-disclosure: A literature review. Psychological Bulletin, 79(2), 73-91.
Debatin, B., Lovejoy, J. P., Horn, A.-K. and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Donaldson, T., & Dunfee, T. W. (1994). Toward a unified conception of business ethics: Integrative social contracts theory. The Academy of Management Review, 19(2), 252-284.
Donath, J., & Boyd, D. (2004). Public displays of connection. BT Technology Journal, 22(4), 71-82.
Ellison, N., Heino, R., & Gibbs, J. (2006). Managing impressions online: Self‐presentation processes in the online dating environment. Journal of Computer‐Mediated Communication, 11(2), 415-441.
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of facebook “friends:” social capital and college students’ use of online social network sites. Journal of Computer‐Mediated Communication, 12(4), 1143-1168.
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 39-50.
Fried, C. (1968). Privacy. Yale Law Journal, 77, 475-493
Hair, J. F., Anderson, R. E., Tatham, R. L., Babin, B. J., & Black, W. C. (2006). Multivariate Data Analysis Prentice. New Jersey: Hall Englewood Cliffs.
Helliwell, J. F., & Putnam, R. D. (2004). The social context of well-being. Philosophical Transactions of the Royal society, 359(1449), 1435-1446.
Halmos, P. (1953). Solitude and privacy: A study of social isolation, its causes and therapy. New York: Philosophical Library.
Hogben, G. (2007). Security issues and recommendations for online social networks. Position paper European Network and Information Aecurity Agency, 80211(1), 36-56.
Homans, G. C. (1958). Social behavior as exchange. American Journal of Sociology, 63(6), 597-606.
Introna, L. D. (1997). Privacy and the computer: Why we need privacy in the information society. Metaphilosophy, 28(3), 259-275.
Ittelson, W. H., Proshansky, H. M., Rivlin, L. G., & Winkel, G. H. (1974). An introduction to environmental psychology, Oxford, England: Holt, Rinehart & Winston.
Jourard, S. M. (1971). Self-disclosure: An experimental analysis of the transparent self. New York: Wiley Online Library.
Jerusalem, M., & Schwarzer, R. (1992). Self-efficacy as a resource factor in stress appraisal processes. In R. Schwarzer (Ed.), Self-efficacy: Thought control of action (pp. 195-213). Washington, DC: Hemisphere.
Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.
Klopfer, P. H., & Rubenstein, D. I. (1977). The concept privacy and its biological basis. Journal of Social Issues, 33(3), 52-65.
Ko, H. C., & Kuo, F. Y. (2009). Can blogging enhance subjective well-being through self-disclosure? CyberPsychology & Behavior, 12(1), 75-79.
Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). It won’’t happen to me: Self-disclosure in online social networks. Proceedings of the Americas Conference on Information Systems 2009, Paper 343.
LaRose, R., Mastro, D. A., & Eastin, M. S. (2001). Understanding internet usage: A social cognitive approach to uses and gratifications. Social Science Computer Review, 19(4), 395-413.
LaRose, R., & Rifon, N. J. (2007). Promoting i‐safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs, 41(1), 127-149.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42.
Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232.
Moscardelli, D. M., & Divine, R. (2007). Adolescents’’ concern for privacy when using the internet: an empirical analysis of predictors and relationships with privacy‐protecting behaviors. Family and Consumer Sciences Research Journal, 35(3), 232-252.
Nie, N. H. (2001). Sociability, interpersonal relations, and the Internet. American Behavioral Scientist, 45(3), 420-435.
Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: the case of facebook. Computers in Human Behavior, 26(3), 406-418.
Parker, R. B. (1973). Definition of privacy. Rutgers L. Rev., 27, 275-300.
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1(4), 311-335.
Pike, J. C., Bateman, P. J., & Butler, B. S. (2009). I didn’’t know you could see that: The effect of social networking environment characteristics on publicness and self-disclosure. Proceedings of the Americas Conference on Information Systems 2009, Paper 421.
Putnam, R. D. (2001). Bowling alone: The collapse and revival of American community. New York: Simon and Schuster.
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology, 153-176.
Sherif, M. (1988). The robbers cave experiment: Intergroup conflict and cooperation. Scranton,PA: Wesleyan University Press.
Schunk, D. H. (1996). Self-evaluation and self-regulated learning. Retrieved from ERIC database.(ED403233)
Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590-598.
Subrahmanyam, K., Reich, S. M., Waechter, N., & Espinoza, G. (2008). Online and offline social networks: use of social networking sites by emerging adults. Journal of Applied Developmental Psychology, 29(6), 420-433.
Taylor, D. A., & Altman, I. (1987). Communication in interpersonal relationships: Social penetration processes. In M. E. Roloff & G. R. Miller (Eds.), Interpersonal Processes: New Directions in Communication Research (pp. 257-277). Thousand Oaks, CA: Sage.
Torkzadeh, G., & Van Dyke, T. P. (2001). Development and validation of an Internet self-efficacy scale. Behaviour & Information Technology, 20(4), 275-280.
Tsai, M. J., & Tsai, C. C. (2003). Information searching strategies in web-based science learning: the role of Internet self-efficacy. Innovations in Education and Teaching International, 40(1), 43-50.
Wallace, P. M. (1999). The psychology of the internet. Canadian Journal of Communication, 26(2). Retrieved Feb 15 2012, from http://www.cjc-online.ca/index.php/journal/article/view/1230/1204
Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166-171.
Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self‐disclosure. Human Communication Research, 2(4), 338-346.
Williams, D. (2006). On and off the’net: Scales for social capital in an online era. Journal of Computer‐Mediated Communication, 11(2), 593-628.
Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710-722.
網路文獻
Alexa (2012), Retrieved May 23, 2012, from http://www.alexa.com/
Boase, J., Horrigan, J. B., Wellman, B., & Rainie, L. (2006). The strength of Internet ties. Pew Internet and American Life Project. Retrieved May 20, 2012 from http://www.pewinternet.org/pdfs/PIP_Internet_ties.pdf
Checkfacebook (2012), Retrieved May 23, 2012, form http://www.checkfacebook.com/
Facebook. (2012), Retrieved May 23, 2012, form Http://www.facebook.com.tw/
Socialbakers (2012), Retrieved May 23, 2012, from http://www.socialbakers.com/
Website-monitoring (2012), Retrieved May 23, 2012, from http://www.website-monitoring.com/
創市際市場研究顧問(2010年7月)。ARO觀察-社群服務發展概況。線上檢索日期:2012年2月20日,取自:http://www.iama.org.tw/upload/ResourceReport/20110830105124836.pdf
創市際市場研究顧問(2012年2月),創市際月刊報告書。線上檢索日期:2012年3月20日,取自http://news.ixresearch.com/?p=5212
|