參考文獻 |
[1] Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and interpreting interactions. Sage Publications, Inc.
[2] Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
[3] Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior. Prentice-Hall.
[4] Ames, M., & Kidd, A. H. (1979). Machiavellianism and women′s grade point averages. Psychological Reports, 44(1), 223-238.
[5] Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-Disclosure on the web: the impact of privacy policy, reward and company reputation. Advances in Consumer Research, 29(1), 350-353.
[6] Bansal, G., Zahedi, F., & Gefen, D. (2010). The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online. Decision Support Systems, 49(2), 138-150.
[7] Baucer, R. A. (1960). Consumer behavior as risk taking. In B. J. Michael, Marketing: Critical Perspectives on Business and Management (pp. 13-21).
[8] Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International Differences in Information Privacy Concerns: A Global Survey of Consumers: A Global Survey of Consumers. The Information Society, 20(5), 313-324.
[9] Belschak, F. D., Den Hartog, D. N., & De Hoogh, A. H. (2018). Behaviors, Angels and Demons: The Effect of Ethical Leadership on Machiavellian Employees’ Work Behaviors. Frontiers in Psychology, 9, 1082.
[10] Berendt, B., Gunther, O., & Spiekermann, S. (2005). Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM, 48(4), 101-106.
[11] Bhattacherjee, A. (2002). Individual Trust in Online Firms: Scale Development and Initial Test. Journal of Management Information Systems, 19(1), 211-241.
[12] Cheung, C., & Lee, M. K. (2000). Trust in Internet Shopping: A Proposed Model and Measurement Instrument. AMCIS 2000 Proceedings, (pp. 681–689).
[13] Cheung, C., Lee, Z. W., & Chan, T. K. (2015). Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence. Internet Research, 25(2), 279-799.
[14] Christie, R., & Geis, F. L. (1970). Studies in Machiavellianism. New York: Academic Press.
[15] Cozby, P. C. (1973). Self-disclosure: a literature review. Psychological Bulletin, 79(2), 73-91.
[16] Culnan, M. J., & Armstrong, P. K. (1999). . Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115.
[17] Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems, 17(1), 61-80.
[18] Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts. European Journal of Information Systems, 22, 295–316.
[19] Drennan, J., & Mort, G. (2003). Examination of the influence of personal attributes on consumer use on m-services. In: ANZMAC 2003 Conference.
[20] Drory, A., & Gluskinos, U. M. (1980). Machiavellianism and leadership. Journal of Applied Psychology, 65(1), 81-86.
[21] Faja, S., & Trimi , S. (2006). Influence of the Web Vendor‘s Interventions on Privacy-Related Behaviors in ECommerce Commerce. Communications of the Association for Information Systems, 17, 593-634.
[22] Forsythe, S. M., Liu, C., Shannon, D., & Gardner, L. D. (2006). “Development of a scale to measure the perceived benefits and risks of online shopping. Journal of Interactive Marketing, 20(2), 55-75.
[23] Grabosky, P. (2001). The nature of trust in the online world. The Age, 1-12.
[24] Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & PNG, I. P. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. Journal of Management Information Systems, 24(2), 13-42.
[25] Hodder, M., Churchill, E., & Cobb, J. (2013). Lying and Hiding in the Name of Privacy. Retrieved from http://customercommons.org/2013/05/08/lying-and-hiding-in-the-name-of-privacy/
[26] Hoffman, D. L., Novak, T. P., & Peralta, M. (1990). Building Consumer Trust Online. Communications of the ACM, 42(4), 80-85.
[27] Hogue, M., Levashina, J., & Hang, H. (2013). Will I fake it? The interplay of gender, Machiavellianism, and self monitoring on strategies for honesty in job interviews. Journal of Business Ethics, 117(2), 399-411.
[28] Jacoby, J., & Kaplan, L. (1972). The Components Of Perceived Risk. in SV - Proceedings of the Third Annual Conference of the Association for Consumer Research, (pp. 383-393).
[29] Johnson-George, C., & Swap, W. C. (1982). Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. Journal of Personality, 43, 1306-1317.
[30] Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity. European Journal of Social Psychology, 31(2), 177-192.
[31] Jonason, P. K., & Webster, G. D. (2010). The Dirty Dozen: A Concise Measure of the Dark Triad. Psychological Assessment, 22(2), 420-432.
[32] Jones, D. N., & Paulhus, D. L. (2014). Introducing the Short Dark Triad (SD3): A Brief Measure of Dark Personality Traits. Assessment, 21, 28-41.
[33] Jones, M. G. (1991). Privacy: a significant marketing issue for the 1990s. Journal of Public Policy & Marketing, 10(1), 133-148.
[34] Jourard, S. M. (1959). Healthy personality and self-disclosure. New York: Mental Hygiene.
[35] Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Service. European Journal of Information Systems, 17(4), 387-402.
[36] KangJ. (1998). Information Privacy in Cyberspace Transactions. Stanford Law Review, 50, 1193-1294.
[37] Kankanhalli, A., Tan, B. C., & Wei, K.-K. (2005). Contributing knowledge to electronic knowledge repositories: an empirical investigation. MIS Quarterly, 29(1), 113-143.
[38] Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607-635.
[39] Keith, M. J., Thompson, S. C., Hale, J., Lowry, B., & Greer, G. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173.
[40] Kim, D. J., Ferrin, D. L., & Rao, R. (2008). A trust-based consumer decision-making model in electronic. Decision Support Systems, 544-564.
[41] Leary, M. R., Knight, P. D., & Barnes, B. D. (1986). Ethical Ideologies of the Machiavellian. Personality and Social Psychology Bulletin, 12(1), 75-80.
[42] Lewicki, R. J., & Bunker, B. B. (1995). Trust in relationships: A model of development and decline. In Conflict, cooperation, and justice: Essays inspired by the work of Morton Deutsch. (pp. 133-173). San Francisco, CA, US: Jossey-Bass.
[43] Li, H., Sarathy, R., & Xu, H. (2010). Understanding Situational Online Information. Journal of Computer Information Systems, 51(1), 62-71.
[44] Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.
[45] Li, Y. (2011). Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. Communications of the Association for Information Systems, 28, 453-496.
[46] Lim, N. (2003). onsumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216-228.
[47] Luo, X. (2002). Uses and Gratifications Theory and E-Consumer Behaviors. Journal of Interactive Advertising, 2(2), 34-41.
[48] Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer Online Privacy Concerns and Responses: A Power-Responsibility Equilibrium Perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.
[49] Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users′ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 311-416.
[50] Markus, H. R., & Kitayama, S. (1991). Culture and the self: Implications for cognition, emotion, and motivation. Psychological Review, 98(2), 224-253.
[51] Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.
[52] McCallister, G. E., & Scarfone, K. A. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology (NIST), Special Publication 800-122.
[53] McLeod, B. A., & Genereux, R. L. (2008). Predicting the acceptability and likelihood of lying: The interaction of personality with type of lie. Personality and Individual Differences, 45(7), 591-596.
[54] Metzger, M. J. (2004). Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of Computer-Mediated Communication, 9(4), JCMC942.
[55] Metzger, M. J. (2007). Communication Privacy Management in Electronic Commerce. Journal of Computer-Mediated Communication, 12, 335–361.
[56] Miltgen, C. L., & Smith, H. J. (2019). Falsifying and withholding: exploring individuals’ contextual privacy related decision-making. Information & Management, 56(5), 696-717.
[57] Muris, P., Merckelbach, H., Otgaar, H., & Meijer, E. (2017). The Malevolent Side of Human Nature: A Meta-Analysis and Critical Review of the Literature on the Dark Triad. Perspectives on Psychological Science, 12(2), 183-204.
[58] Nowak, G. J., & Phelps, J. (1992). Understanding Privacy Concerns: An Assessment of Consumers’ Information Related Knowledge and Beliefs. Journal of Direct Marketing, 28-39.
[59] Palomaki, J., Yan, J., & Laakasuo, M. (2016). Machiavelli as a poker mate: A naturalistic behavioural study on strategic deception. Personality and Individual Differences, 98, 266-271.
[60] Paulhus, D. L., & Williams, K. M. (2002). The Dark Triad of personality: Narcissism, Machiavellianism and psychopathy. Journal of Research in Personality, 36(6), 556-563.
[61] Pavlou, P. A. (2003). Consumer acceptance of electronic commerce-Integrating trust and risk, with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 69-103.
[62] Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principle–Agent Perspective. MIS Quarterly, 31(1), 105-136.
[63] Peter, J. P., & Tarpey, L. X. (1975). A Comparative Analysis of Three Consumer Decision Strategies. Journal of Consumer Research, 29-37.
[64] Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 27-41.
[65] Rohm, A. J., & Milne, G. R. (2004). Just What the Doctor Ordered - The Role of Information Sensitivity and Trust in Reducing Medical Information Privacy Concern. Journal of Business Research, 57(9), 1000-1011.
[66] Schade, M., Piehler, R., Warwitz, C., & Burmann, C. (2018). Increasing consumers’ intention to use location-based advertising. Journal of Product & Brand Management, 27(6), 661-669.
[67] Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989-1015.
[68] Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals′ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167-196.
[69] Stanton, J. M., & Stam, K. R. (2003). Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. Surveillance & Society, 1(2), 152-190.
[70] Stewart, K. J. (1999). Transference as a means of building trust in Market. 35 (1971) 56–61. Proceedings of the 20th International Conference on Information Systems, (pp. 459–464).
[71] Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
[72] Stutzman, F. (2006). An Evaluation of Identity-Sharing Behavior. Journal of the International Digital Media and Arts Association, 3(1), 10-18.
[73] Vidmar, N., & Flaherty, D. N. (1985). Concern for Personal Privacy in an Electronic Age. Journal of Communication, 35, 91-103.
[74] Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy: A consumer survey. Journal of Direct Marketing, 7(1), 7-19.
[75] Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.
[76] Xie, E., Teo, H.-H., & Wan, W. (2006). Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Market Lett, 17, 61-74.
[77] Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the Formation of Individual‘s Privacy Concerns: Toward an Integrative View. ICIS 2008 Proceedings, Paper 6, pp. 1-16.
[78] Yang, H., Lee, H., & Zo, H. (2017). User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems, 117(1), 68-89.
[79] Zeng, S.-Y., Wu, L.-L., & Chen, H.-G. (2009). Sharing private information online: The mediator effect of social exchange. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce.
[80] Zhang, Y., Wang, C. L., & Chen, J. (2000). Consumers’ responses to web-based data collection efforts and factors influencing the responses. Journal of International Marketing and Market Research, 115-123.
[81] Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123.
[82] 吳芷凡. (2013). 網路社群使用者的隱私關注與個人資料揭露行為之研究. 桃園市: 國立中央大學資訊管理研究所碩士論文.
[83] 經濟日報. (2019). 保護個資加州消費者隱私法2020年元旦上路. 2020年5月31日 擷取自 https://money.udn.com/money/story/5599/4259279
[84] 郭俊賦. (2015). 網路使用者的隱私顧慮與誘因對於其自我揭露行為之影響. 桃園市: 國立中央大學資訊管理研究所碩士論文. |