參考文獻 |
1.陳博, 金永生. 購物網站的個性化推薦對網路購物體驗影響的實證研究[J]. 北京郵電大學學報: 社會科學版, 2013 (6): 45-51.
2.陳昊, 李文立, 柯育龍. 社交媒體持續使用研究: 以情感回應為中介[J]. 管理評論, 2016,28(9): 61.
3.陳昊, 李文立. 基於情緒中介的資訊安全保護行為研究[J]. 科研管理, 2018, 39(6): 48-56.
4.崔劍峰. 感知風險對消費者網路衝動購買的影響[J]. 社會科學戰線, 2019, 4: 254-258.
5.戴德寶, 劉西洋, 範體軍. 「互聯網+」 時代網路個性化推薦採納意願影響因素研究[J]. 中國軟科學, 2015 (8): 163-172.
6.第51次《中國互聯網路發展狀況統計報告》,取自https://www.cnnic.cn/NMediaFile/2023/0322/MAIN16794576367190GBA2HA1KQ.pdf
7.董大海, 杨毅. 网络环境下消费者感知价值的理论剖析[J]. 管理学报, 2008, 5(6): 856-861.
8.馮超.電子商務個性化推薦的用戶資訊採納影響因素研究[D].華中師範大學, 2015
9.馮建英, 穆維松, 傅澤田. 消費者的購買意願研究綜述[J]. 現代管理科學, 2006 (11): 7-9.
10.鞏震. 網路消費者感知隱私的構面研究[D]. 北京: 北京郵電大學, 2010.
11.郭飛鵬、琚春華. 隱私關注對移動個性化服務採納的影響——基於使用者主觀認知視角的實證研究[J]. 浙江工商大學學報, 2018, 32(1): 85-96
12.何典, 梁英. 電子商務個性化推薦系統研究[J]. 湖南商學院學報, 2005, 12(4): 21-22.
13.胡昌平, 仇蓉蓉. 虛擬社區用戶隱私關注研究綜述[J]. 情報理論與實踐, 2018, 41(12): 149r154.
14.蔣驍, 季紹波. 網路隱私關注與行為意向影響因素的概念模型[J]. 科技與管理, 2009 (5): 71-74.
15.蔣驍, 仲秋雁, 季紹波. 網路隱私的概念, 研究進展及趨勢[J]. 情報科學, 2010 (2): 305-310.
16.康瑾, 郭倩倩. 消費者對互聯網行為定向廣告的感知價值研究[J]. 國際新聞界, 2015, 37(12): 140-153.
17.李凯, 王晓文. 隐私关注对旅游网站个性化服务的影响机制研究[J]. 旅游学刊, 2011, 26(6): 80-86.
18.梁偉萍. 淺談電子商務中的個性化推薦系統[J]. 網路與資訊, 2011, 25(8): 38-38.
19.劉好強. 調節定向與溝通策略對遊客購買意願的影響——感知價值的中介作用[J]. Tourism Tribune/Lvyou Xuekan, 2015, 30(12).
20.劉力, 刁宗廣, 吳慧, 等. 旅行社電子服務品質對旅遊者購買意願的影響研究——感知價值的中介作用[J]. 旅遊論壇, 2011, 4(4): 48-53.
21.龍賢義, 鄧新明, 楊賽凡. 企業社會責任, 購買意願與購買行為——主動性人格與自我效能有調節的中介作用[J]. 系統管理學報, 2020, 29(4): 646-656.
22.羅玉葵. 基於個性化推薦的消費者網路購買意願影響因素分析[J]. 商業經濟研究, 2020.
23.孟博, 劉茂, 李清水, 等. 風險感知理論模型及影響因數分析[J]. 中國安全科學學報, 2010, 20(10): 59-66.
24.孟欣. 試論國內社會化媒體平臺的用戶隱私保護[D]. 浙江工業大學碩士學位論文, 2012
25.彭希羨, 馮祝斌, 孫霄淩, 等. 微博使用者持續使用意向的理論模型及實證研究[J]. 現代圖書情報技術, 2012 (11): 78-85.
26.邱皓政. 社會與行為科學的量化研究與統計分析[J]. 臺北市: 五南, 2000.
27.全民電商時代來了九成消費者愛網購,取自https://ctee.com.tw/news/tech/642467.html
28.王麗閑. 基於社會信任的用戶網路隱私關注與保護行為探究[J]. 電子測試, 2013 (12X): 64-65.
29.肖海清. 电商个性化推荐采纳中用户隐私风险感知的影响因素分析[D]. 华中师范大学, 2015.
30.謝春花. 消費者淘寶網購生鮮水果的感知風險對購買意願的影響研究[D]. 華中農業大學, 2017.
31.楊一翁, 王毅, 孫國輝. 網路推薦系統對消費者的行銷效果——技術接受模型視角[J]. 中國流通經濟, 2016, 30(2): 98-107.
32.張紅. 基於用戶認知的電子商務網站知識推薦服務接受模型研究[D]. 南京理工大學, 2013.
33.張秀偉, 何克清, 王健, 等. Web 服務個性化推薦研究綜述[J]. 電腦工程與科學, 2013, 35(9): 132-140
34.張喆, 胡冰雁. 感知風險對創新產品資訊搜尋的影響——消費者創新性的調節作用[J]. 管理評論, 2014 (8): 145-157.
35.趙冬梅, 紀淑嫻. 信任和感知風險對消費者網路購買意願的實證研究[J]. 數理統計與管理, 2010 (2): 305-314.
36.趙天水. 基於感知風險的跨境電商平臺消費者信任對購買意願的影響[D]. 東華大學, 2016.
37.鄭明松, 王維明. 網際網路商業環境上降低消費者認知風險的研究: 以電腦遊戲軟體為例[J]. 產業論壇雜誌, 2002, 5(1): 21-22.
38.周濤, 魯耀斌. 隱私關注對移動商務用戶採納行為影響的實證分析[J]. 管理學報, 2010 (7): 1046-1051.
39.周濤,魯耀斌,張金隆.基於感知價值與信任的移動商務用戶接受行為研究[J].管理學報,2009,6(10):1407-1412.
40.朱侯, 张明鑫, 路永和. 社交媒体用户隐私政策阅读意愿实证研究[J]. 情报学报, 2018, 37(4): 362-371.
41.朱強, 王興元, 辛璐琦. 隱私關注對網路精准廣告點擊意願影響機制研究——消費者風險感知和自我效能的作用[J]. 軟科學, 2018, 32(4): 115-119.
42.朱智賢. 現代認知心理學評述[J]. 北京師範大學學報: 社會科學版, 1985 (1): 1-6.
43.Akaah I P. A conjoint investigation of the relative importance of risk relievers in direct marketing[J]. J Advertising Res., 1988: 38-44.
44.Aljukhadar M, Senecal S. Usage and success factors of commercial recommendation agents: A consumer qualitative study of MyProductAdvisor. com[J]. Journal of research in Interactive Marketing, 2011, 5(2/3): 130-152.
45.Arachchilage N A G, Love S. Security awareness of computer users: A phishing threat avoidance perspective[J]. Computers in Human Behavior, 2014, 38: 304-312.
46.Bandura A, Freeman W H, Lightsey R. Self-efficacy: The exercise of control[J]. 1999.
47.Bandura A. Social cognitive theory: An agentic perspective[J]. Annual review of psychology, 2001, 52(1): 1-26.
48.Bansal G, Zahedi F M, Gefen D. Do context and personality matter? Trust and privacy concerns in disclosing private information online[J]. Information & Management, 2016, 53(1): 1-21.
49.Bansal G, Zahedi F M, Gefen D. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern[J]. European Journal of Information Systems, 2015, 24: 624-644.
50.Baruh L, Secinti E, Cemalcilar Z. Online privacy concerns and privacy management: A meta-analytical review[J]. Journal of Communication, 2017, 67(1): 26-53.
51.Baskerville, R. (1991a) "Risk analysis as a source of professional knowledge," Computer & Security(10) 8, pp. 749-764.
52.Bauer R A. Consumer behavior as risk taking[C]//Proceedings of the 43rd National Conference of the American Marketing Assocation, June 15, 16, 17, Chicago, Illinois, 1960. American Marketing Association, 1960.
53.Bélanger F, Crossler R E. Privacy in the digital age: a review of information privacy research in information systems[J]. MIS quarterly, 2011: 1017-1041.
54.Bilton N. Price of Facebook privacy? Start clicking[J]. http://www. nytimes. com/2010/05/13/technology/personaltech/13basics. html, 2010
55.Bishop Jr W R. Competitive intelligence[J]. Progressive Grocer, 1984, 63(3): 19-20.
56.Brown M, Muchira R. Investigating the relationship between Internet privacy concerns and online purchase behavior[J]. Journal of Electronic Commerce Research, 2004, 5(1): 62-70.
57.Buchanan T, Paine C, Joinson A N, et al. Development of measures of online privacy concern and protection for use on the Internet[J]. Journal of the American society for information science and technology, 2007, 58(2): 157-165
58.Campbell J, Goldfarb A, Tucker C. Privacy regulation and market structure[J]. Journal of Economics & Management Strategy, 2015, 24(1): 47-73.
59.Chen D Q, Liang H. Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory[J]. IEEE Transactions on Engineering Management, 2019, 66(4): 552-567.
60.Chen H J, Wong S W, Bilgihan A, et al. Capsule hotels: Offering Experiential Value or perceived as risky by tourists? An optimum stimulation level model[J]. International Journal of Hospitality Management, 2020, 86: 102434.
61.Clarke R. Internet privacy concerns confirm the case for intervention[J]. Communications of the ACM, 1999, 42(2): 60-67.
62.Cleff, E. (2007). Privacy issues in mobile advertising. International Review of Law Computers and Technology, 21(3), 225e236.
63.Compeau D, Higgins C A, Huff S. Social cognitive theory and individual reactions to computing technology: A longitudinal study[J]. MIS quarterly, 1999: 145-158.
64.Cox D F, Rich S U. Perceived risk and consumer decision-making—the case of telephone shopping[J]. Journal of marketing research, 1964, 1(4): 32-39.
65.Cranor L F. ′I didn′t buy it for myself′privacy and ecommerce personalization[C]//Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. 2003: 111-117.
66.Dienlin T, Trepte S. Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors[J]. European journal of social psychology, 2015, 45(3): 285-297.
67.Dinev T, Hart P. Internet privacy concerns and social awareness as determinants of intention to transact[J]. International Journal of Electronic Commerce, 2005, 10(2): 7-29.
68.Dinev T, Hart P. Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use[J]. E-Service, 2006, 4(3): 25-60.
69.Dowling G R, Staelin R. A model of perceived risk and intended risk-handling activity[J]. Journal of consumer research, 1994, 21(1): 119-134.
70.Eastin M S, Brinson N H, Doorey A, et al. Living in a big data world: Predicting mobile commerce activity through privacy concerns[J]. Computers in Human Behavior, 2016, 58: 214-220.
71.Elizabeth Dwoskin,2015,EU Seeks to Tighten Data Privacy Laws
72.Emerson, R. M. Social exchange theory. Annual Review of Sociology, 1976, 2: 335-362
73.Faja S, Trimi S. Influence of the web vendor′s interventions on privacy-related behaviors in e-commerce[J]. Communications of the association for information Systems, 2006, 17(1): 27.
74.Featherman M S, Miyazaki A D, Sprott D E. Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility[J]. Journal of services marketing, 2010, 24(3): 219-229
75.Featherman M, Fuller M. Applying TAM to e-services adoption: the moderating role of perceived risk[C]//36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the. IEEE, 2003: 11 pp.
76.Festinger L. A theory of cognitive dissonance[M]. Stanford university press, 1962.
77.Foa E B, Foa U G. Resource theory: Interpersonal behavior as exchange[J]. Social exchange: Advances in theory and research, 1980: 77-94.
78.Forsythe S M, Shi B. Consumer patronage and risk perceptions in Internet shopping[J]. Journal of Business research, 2003, 56(11): 867-875.
79.Fuel R. Quantified self digital tools: A CPG marketing opportunity[J]. Retrieved October, 2014, 6: 2020.
80.Gallarza M G, Gil‐Saura I, Holbrook M B. The value of value: Further excursions on the meaning and role of customer value[J]. Journal of consumer behaviour, 2011, 10(4): 179-191.
81.Hanus B, Wu Y A. Impact of users’ security awareness on desktop security behavior: A protection motivation theory perspective[J]. Information Systems Management, 2016, 33(1): 2-16.
82.Häubl G, Murray K B. Double agents: assessing the role of electronic product recommendation systems[J]. Sloan Management Review, 2006, 47(3): 8-12.
83.Hisrich R D, Dornoff R J, Kernan J B. Perceived risk in store selection[J]. Journal of Marketing Research, 1972, 9(4): 435-439.
84.Hoffman D L, Kalsbeek W D, Novak T P. Internet and Web use in the US[J]. Communications of the ACM, 1996, 39(12): 36-46.
85.Holbrook M B. TheNatureofCustomerValue: AnAxiologyofServicesin theConsumptionExperience[J]. inR. RustandR. L. Oliver (eds) ServiceQuality: New DirectionsinTheoryandPractice, 1994: 21-71.
86.Hur W M, Kim Y, Park K. Assessing the effects of perceived value and satisfaction on customer loyalty: A ‘Green’perspective[J]. Corporate social responsibility and environmental management, 2013, 20(3): 146-156.
87.Igbaria M, Iivari J. The effects of self-efficacy on computer usage[J]. Omega, 1995, 23(6): 587-605.
88.Jacoby J, Kaplan L B. The components of perceived risk[J]. ACR special volumes, 1972.
89.Janz N K, Becker M H. The health belief model: A decade later[J]. Health education quarterly, 1984, 11(1): 1-47.
90.Jin N, Lee S, Lee H. The effect of experience quality on perceived value, satisfaction, image and behavioral intention of water park patrons: New versus repeat visitors[J]. International journal of tourism research, 2015, 17(1): 82-95.
91.Knijnenburg, B.P., Willemsen, M.C., Gantner, Z., Soncu, H., Newell, C.: Explaining the user experience of recommender systems. User Model. User Adapt. Interact. 22 (2012). doi:10.1007/s11257-011-9118-4
92.LaRose R, Rifon N J. Promoting i‐safety: effects of privacy warnings and privacy seals on risk assessment and online privacy behavior[J]. Journal of Consumer Affairs, 2007, 41(1): 127-149.
93.Lazarus R S, Folkman S. Stress, coping and adaptation[J]. 1984.
94.Li H, Kuo C, Rusell M G. The impact of perceived channel utilities, shopping orientations, and demographics on the consumer′s online buying behavior[J]. Journal of computer-mediated communication, 1999, 5(2): JCMC521.
95.Li M L, Lin S P, Chan Y H, et al. Customer Involvement Facets Stimulating Customers′ Intention to Use Internet-Only Bank Services in China: The Extension of Perceived Risk-Value Model[J]. Journal of Organizational and End User Computing (JOEUC), 2021, 33(5): 74-97.
96.Li Y. Empirical studies on online information privacy concerns: Literature review and an integrative framework[J]. Communications of the Association for Information Systems, 2011, 28(1): 28.
97.Liang H, Xue Y L. Understanding security behaviors in personal computer usage: A threat avoidance perspective[J]. Journal of the association for information systems, 2010, 11(7): 1.
98.Liang H, Xue Y. Avoidance of information technology threats: A theoretical perspective[J]. MIS quarterly, 2009: 71-90.
99.Maignan I, Lukas B A. The nature and social uses of the Internet: A qualitative investigation[J]. Journal of Consumer Affairs, 1997, 31(2): 346-371.
100.Malhotra N K, Kim S S, Agarwal J. Internet users′ information privacy concerns (IUIPC): The construct, the scale, and a causal model[J]. Information systems research, 2004, 15(4): 336-355.
101.McDonald A M, Cranor L F. Americans′ attitudes about internet behavioral advertising practices[C]//Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. 2010: 63-72.
102.Metzger, M. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12, 335e361.
103.Miltgen C L, Peyrat-Guillard D. Cultural and generational influences on privacy concerns: a qualitative study in seven European countries[J]. European journal of information systems, 2014, 23(2): 103-125.
104.Miyazaki A D. Online privacy and the disclosure of cookie use: Effects on consumer trust and anticipated patronage[J]. Journal of Public Policy & Marketing, 2008, 27(1): 19-33.
105.Molm L D, Takahashi N, Peterson G. Risk and trust in social exchange: An experimental test of a classical proposition[J]. American journal of sociology, 2000, 105(5): 1396-1427.
106.Nill A, Aalberts R J. Legal and ethical challenges of online behavioral targeting in advertising[J]. Journal of current issues & research in advertising, 2014, 35(2): 126-146.
107.Norberg P A, Horne D R, Horne D A. The privacy paradox: Personal information disclosure intentions versus behaviors[J]. Journal of consumer affairs, 2007, 41(1): 100-126.
108.Pang S M, Tan B C, Lau T C. Antecedents of consumers’ purchase intention towards organic food: Integration of theory of planned behavior and protection motivation theory[J]. Sustainability, 2021, 13(9): 5218.
109.Parker B. Globalization and business practice: Managing across boundaries[M]. SAGE Publications Limited, 1998.
110.Petronio S. Boundaries of privacy: Dialectics of disclosure[M]. Suny Press, 2002.
111.Phelps J E, D′Souza G, Nowak G J. Antecedents and consequences of consumer privacy concerns: An empirical investigation[J]. Journal of Interactive Marketing, 2001, 15(4): 2-17.
112.Rosen R J. Armed with facebook “likes” alone, researchers can tell your race, gender, and sexual orientation[J], 2013.
113.Resnick P, Varian H R. Recommender systems[J]. Communications of the ACM, 1997, 40(3): 56-58.
114.Ricci F, Rokach L, Shapira B. Introduction to Systems of Recommendation Handbook[J]. Recommender Systems Handbook, F. Ricci, L. Rokach, B. Shapira, and PB Kantor, Eds. Springer US, 2011: 1-35.
115.Rifon N J, LaRose R, Choi S M. Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures[J]. Journal of consumer affairs, 2005, 39(2): 339-362.
116.Rogers R W. A protection motivation theory of fear appeals and attitude change1[J]. The journal of psychology, 1975, 91(1): 93-114.
117.Roselius T. Consumer rankings of risk reduction methods[J]. Journal of marketing, 1971, 35(1): 56-61.
118.Rotter J B. Generalized expectancies for internal versus external control of reinforcement[J]. Psychological monographs: General and applied, 1966, 80(1): 1.
119.Schaefers K G, Epperson D L, Nauta M M. Women′s career development: Can theoretically derived variables predict persistence in engineering majors?[J]. Journal of Counseling Psychology, 1997, 44(2): 173.
120.Schiffman L G, Kanuk L L. Comportamiento del consumidor[M]. Pearson educación, 2005.
121.Schmidt S, Benke C, Pané-Farré C A. Purchasing under threat: Changes in shopping patterns during the COVID-19 pandemic[J]. PLoS one, 2021, 16(6): e0253231.
122.Scridon M A, Achim S A, Pintea M O, et al. Risk and perceived value: antecedents of customer satisfaction and loyalty in a sustainable business model[J]. Economic research-Ekonomska istraživanja, 2019, 32(1): 909-924.
123.Shankar G, Devanarayan V, Amaravadi L, et al. Recommendations for the validation of immunoassays used for detection of host antibodies against biotechnology products[J]. Journal of pharmaceutical and biomedical analysis, 2008, 48(5): 1267-1281.
124.Shaw N, Sergueeva K. The non-monetary benefits of mobile commerce: Extending UTAUT2 with perceived value[J]. International journal of information management, 2019, 45: 44-55.
125.Sheth J N, Newman B I, Gross B L. Why we buy what we buy: A theory of consumption values[J]. Journal of business research, 1991, 22(2): 159-170.
126.Smith H J, Dinev T, Xu H. Information privacy research: an interdisciplinary review[J]. MIS quarterly, 2011: 989-1015.
127.Strahilevitz M A, Loewenstein G. The effect of ownership history on the valuation of objects[J]. Journal of consumer research, 1998, 25(3): 276-289.
128.Tan S J. Strategies for reducing consumers’ risk aversion in Internet shopping[J]. Journal of consumer marketing, 1999.
129.Tanskanen K. Who wins in a complex buyer-supplier relationship? A social exchange theory based dyadic study[J]. International Journal of Operations & Production Management, 2015, 35(4): 577-603.
130.Taylor S E. Hospital patient behavior: reactance, helplessness, or control?[J]. Journal of Social Issues, 1979, 35(1): 156-184.
131.Toch E, Wang Y, Cranor L F. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems[J]. User Modeling and User-Adapted Interaction, 2012, 22(1): 203-220.
132.Tucker C E. Social networks, personalized advertising, and privacy controls[J]. Journal of marketing research, 2014, 51(5): 546-562.
133.Turow J, King J, Hoofnagle C J, et al. Americans reject tailored advertising and three activities that enable it[J]. Available at SSRN 1478214, 2009.
134.Vellido A, Lisboa P J G, Meehan K. Quantitative characterization and prediction of on-line purchasing behavior: A latent variable approach[J]. International journal of electronic commerce, 2000, 4(4): 83-104.
135.Wang H, Lee M K O, Wang C. Consumer privacy concerns about Internet marketing[J]. Communications of the ACM, 1998, 41(3): 63-70.
136.White T B, Zahay D L, Thorbjørnsen H, et al. Getting too personal: Reactance to highly personalized email solicitations[J]. Marketing Letters, 2008, 19: 39-50.
137.Wirtz J, Lwin M O, Williams J D. Causes and consequences of consumer online privacy concern[J]. International Journal of service industry management, 2007, 18(4): 326-348.
138.Xie J, Ye L, Huang W, et al. Understanding FinTech platform adoption: impacts of perceived value and perceived risk[J]. Journal of Theoretical and Applied Electronic Commerce Research, 2021, 16(5): 1893-1911.
139.Xiong J, Wu J. Construction of information network vulnerability threat assessment model for CPS risk assessment[J]. Computer communications, 2020, 155: 197-204.
140.Xu H, Dinev T, Smith J, et al. Information privacy concerns: Linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems, 2011, 12(12): 1.
141.Yan J, Liu N, Wang G, et al. How much can behavioral targeting help online advertising?[C]//Proceedings of the 18th international conference on World wide web. 2009: 261-270.
142.Youn S. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents[J]. Journal of Consumer affairs, 2009, 43(3): 389-418.
143.Zhang T C, Gu H, Jahromi M F. What makes the sharing economy successful? An empirical examination of competitive customer value propositions[J]. Computers in Human Behavior, 2019, 95: 275-283. |