박사

정보 프라이버시 염려와 신뢰가 개인정보 제공에 미치는 영향

박천웅 2015년
논문상세정보
' 정보 프라이버시 염려와 신뢰가 개인정보 제공에 미치는 영향' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 개인정보 제공
  • 개인정보 활용
  • 데이터 분석
  • 정보 프라이버시
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
224 0

0.0%

' 정보 프라이버시 염려와 신뢰가 개인정보 제공에 미치는 영향' 의 참고문헌

  • 한국정보화진흥원
    OECD 프라이버시 프레임워크 [2013]
  • 한국인터넷진흥원
    2012년 정보보호 실태조사(개인편) [2013]
  • 한국인터넷진흥원
    대국민 정보프라이버시 성향 분석을 위한 도구개발 [2009]
  • 조직수준의 개인정보보호 염려: 개념화 및 타당성 검증,박사학위논문
    강문석 충남대학교 대학원 [2014]
  • 정보 프라이버시의 향후 연구방향 도출을 위한 선행연구분석-온라인상에서 정보프라이버시 염려를 중심으로
    이상훈 이호근 정보화정책, 16(2),pp.3-26 [2009]
  • 정보 프라이버시와 개인정보의 보호
    서계원 세계헌법연구, 11(1),pp.195-232 [2005]
  • 정보 프라이버시 염려가 SNS 사용자간의 상호작용성에 미치는영향. 박사학위논문
    심선희 부경대학교 대학원 [2013]
  • 전자상거래에서 정보 프라이버시 염려를 유발하는 원인과보호반응에 관한 연구, 박사학위논문
    김진성 부산대학교 대학원 [2014]
  • 자동화사회와 프라이버시 보호
    성낙인 법제연구, Vol.11, pp.8-36 [1996]
  • 인지된 위험과 신뢰가 Cloud Computing 사용의도에 미치는 영향: 모바일 Cloud Computing을 중심으로
    김용구 김준우 한국산업경영시스템학회, 35(3) pp. 70-76 [2011]
  • 온라인 프라이버시에 대한 철학적 배경과 산업적접근
    손상영 오태원 유지연 정보통신정책연구원 [2013]
  • 온라인 맞춤형 광고의 유용성, 편의성, 프라이버시 침해 위험성이 광고 수용의도에 미치는 영향: 소비자의 심리적 반응과 지각된 통제감을 중심으로
    김재휘 부수현 성보경 광고연구, 87호. pp.263-302 [2010]
  • 스마트폰 위치기반서비스의 정보제공의도 : 프라이버시계산 관점을 중심으로
    김상희 김종기 정보시스템연구, 21(4), pp55-79 [2012]
  • 소셜 네트워크서비스에서 지속사용의도와 관계채널확장의 영향요인에 관한 연구, 박사학위논문
    박선화 숭실대학교 대학원 [2011]
  • 성별에 따른 온라인 프라이버시 염려와 프라이버시 보호전략 사용의 차이에 관한 연구, 미디어
    심재웅 이미나 젠더&문화, Vol.12, pp.165-190 [2009]
  • 구조방정식 모형과 AMOS 6.0
    이학식 법문사 [2007]
  • 개인정보의 경제적 가치 분석에 관한 고찰
    민경식 채승완 한국정보보호진흥원 [2007]
  • 개인정보의 가치와 개인정보침해에 따른 사회적 비용 분석
    유병준 유승동 유진호 정상호 한창희 개인정보보호위원회 [2013]
  • 개인정보 제공행위에 대한 Privacy Paradox”, 박사학위 논문
    김연종 경상대학교 대학원 [2013]
  • 개인정보 보호제도에서의 규제에 관한 연구, 박사학위논문
    황인호 건국대학교 대학원 [2001]
  • 개인정보 보호 및 이용의 현황과 사례
    김범수 한국학술정보 [2008]
  • 개인의 사생활, 국가적 감시,그리고 규범, 미래사회연구포럼총서
    권건보 김일환 이인호 이창범 정태호 정보통신정책연구원 [2006]
  • http://nologout.blog.me/1900810922.
  • Xu, H., and Gupta, S. (2009), The Effects of Privacy Concerns and PersonalInnovativeness on Potential and Experienced Customers’ Adoption ofLocation-based Services, Electronic Markets, 19, pp.137-149.
  • Xu, H., Dinev, T., Smith, H. J., Hart, P. (2008), Examining the Formation ofIndividual's Privacy Concerns: Toward an Integrative View, In: Proceedings ofthe 29th International Conference on Information Systems, Paris, France,pp.1981-1996.
  • Wu, K. W., Huang, S. Y., David C. Yen, D. C., and Irina Popova. (2012), TheEffect of Online Privacy Policy on Consumer Privacy Concern and Trust,Computer in Human Behavior, Vol. 28, pp.889-897.
  • William J. Havlena, and Wayne S. De Sarbo. (1991), On the Measurement ofPerceived Consumer Risk, Decision Sciences, Vol. 22, Issue 4, pp.927?939.
  • Westin, Alan. F. (1967), Privacy and Freedom, New York : Atheneum.
  • U-코리아 추진시 프라이버시 염려 영향 요인 인과 지도 분석
    김헌식 이미숙 한국지방정부학회 학술대회자료집, pp.277-310 [2005]
  • Tsai, J. Y., Egelman, S., Cranor, L. and Acquisti, A. (2011), The Effect of OnlinePrivacy Information on Purchasing Behavior: An Experimental Study,Information System Research, 22(2), pp.254-268.
  • Tolchinsky, P.D. McCuddy, M.D. Adams, J. Ganster, D.C. Woodman, R.W. andFromkin, H.L. (1981), Employee Perceptions of Invasion of Privacy: A FieldSimulation Experiment, Journal of Applied Psychology, 66(3), pp.308-313.
  • Stone, E.F. and Stone, D.L. (1990), Privacy in Organizations: Theoretical Issues,Research Findings, and Protection Mechanism, Research in Personnel andHuman Resources Management, 8, pp.349-411.
  • Stone, E. F., Gardner, D. G., Gueutal, H. G. and McClure. (1983), A FieldExperiment Comparing Information-Privacy Values, Beliefs, and Attitudes AcrossSeveral Types of Organizations, Journal of Applied Psychology, 68(3),pp.459-468.
  • Stewart, K. A., Segars, A. H. (2002), An Empirical Examination of the Concern forInformation Privacy Instrument, Information Systems Research, Vol. 13,pp.36?49.
  • Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, Gerald L. Lohse. (2004),International Differences in Information Privacy Concerns: A Global Survey ofConsumers, The Information Society, 20, pp.313-324.
  • Spiekermann, S., Grossklags, J., Berendt, B. (2001), E-privacy in 2nd GenerationE-commerce: Privacy Preferences Versus Actual Behavior, In: Proceedings of the3rd ACM Conference on Electronic Commerce, Tampa, FL, pp.38?47.
  • Soumava Bandyopadhyay. (2009), Antecedents And Consequences Of ConsumersOnline Privacy Concerns, Journal of Business & Economics Research, Vol. 7,No. 3, pp.41-48.
  • Smith, H. J., Milberg, S. J., and Burke, S. J. (1996), Information Privacy:Measuring Individuals Concerns about Organizational Practices, MIS Quarterly,Vol. 20, No. 6, pp.167-196.
  • Smith, H. J., Dinev, T., and Xu, H. (2011), Information Privacy Research : AnInterdisciplinary Review, Mis Quarterly, Vol. 35, No. 4, pp.989-1015.
  • Slyke, C. V., Shim, J. T., Johnson, R., and Jiang, J. (2006), Concern forInformation Privacy and Online Consumer Purchasing, Journal of theAssociation for Information Systems, 7(6), pp.415-444.
  • Sledgianowski, D., and Kulviwat, S. (2009), Using Social Network Sites: TheEffects of Playfulness, Critical Mass and Trust in A Hedonic Context, Journalof Computer Information Systems, 49(4), pp.74-83.
  • Singh, J. and Sirdeshmukh, D. (2000), Agency and Trust Mechanisms in ConsumerSatisfaction and Loyalty Judgments, Journal of the Academy of MarketingScience, 28(1), pp.150-167.
  • Schneiderman, B. (2002), Designing Trust into Online Experience, Communicationsof the ACM, 44(12), pp57-59.
  • Schement, J. R. and Curtis, T. (1995), Tendencies and Tensions of the InformationAge-The Production and Distribution of Information in the United States,Transaction Publishers, New Brunswick, New Jersey.
  • SPSS/AMOS를 이용한 알기 쉬운 통계분석
    성태제 학지사 [2007]
  • S. D. Warren, L. D. Brandeis. (1890), The Right to Privacy, Harvard Law Review,Vol. 4, No. 5, pp.193-220.
  • Ruth Gavison. (1980), Privacy and the Limits of Law, Yale Law Journal, vol.89,No. 3, pp.421-471.
  • Rousseau, D, Sitkin, S. Burt R. and Camerer, C. (1998), Not So Different AfterAll: A Cross-Discipline View of Trust, Academy of Management Review, Vol.23, No. 3, pp.391-404.
  • Preset, S. (1990). The Adventure Experience Paradigm, In Adventure Recreation,edited by A. Mile sand S. Priest. state College, PA. Venture Publishing,pp.157-162.
  • Phelps, J., G. Nowak, and E. Ferrell. (2000), Privacy Concerns and ConsumerWillingness to Provide Personal Information, Journal of Public Policy &Marketing, Vol. 19, No. 1, pp.27-41.
  • Phelps, J. E., D’Souza, G., and Nowak, G. J. (2001), Antecedents and Consequencesof Consumer Privacy Concerns: An Empirical Investigation, Journal ofInteractive Marketing, Vol. 15, No. 4, pp.2-17.
  • Perleg, M., Beimel, D., Dori, D., and Denekamp, Y. (2008), Situation-based AccessControl: Privacy Management via Modeling of Patient Data Access Scenarios,Journal of Biomedical Informatics, 41(6), pp.1028-1040.
  • Pavlou, P.A. Liang, H. and Xue, Y. (2007), Understanding and MitigatingUncertainty in Online Exchange Relationships: A Principal-Agent Perspective,MIS Quarterly, 31(1), pp.105-136.
  • Pavlou, P. A., and Gefen, D. (2004), Building Effective Online Marketplaces withInstitution Based Trust, Information Systems Research, 15(1), pp.37-59.
  • Patil, S., Kobsa, A. (2009), Privacy Considerations in Awareness Systems: Designingwith Privacy in Mind, In: Markopoulos, P., de Ruyter, B., Mackay, W. (Eds.),Awareness Systems: Advances in Theory, Methodology and Design, SpringerVerlag, Berlin, Heidelberg, New York, pp.187?206.
  • OECD. (2013), Exploring the Economics of Personal Data: A Survey ofMethodologies for Monetary Value, OECD Digital Economy Papers, No. 220.
  • Nowak, G. J. and Phelps, J. (1995), Direct Marketing and the Use ofIndividual-Level Consumer Information: Determining How and When ‘Privacy’Matters, Journal of Direct Marketing, 9(3), pp.46-60.
  • Norberg, A. P., Horne, R. D., and Horne, A. D. (2007), The Privacy Paradox :Personal Information Disclosure Intentions versus Behaviors, The journal ofConsumer Affairs, Vol. 41, No. 1, pp.100-126.
  • Morris, J., Moberg, D. (1994), Work Organizations as Context for Trust andBetrayal, in Theodore R, Sarbin Ralph M, Carney and Carson Eoyang(eds),Citizen Espionage: Studies in Trust and Betrayal, Praeger Publisher,Murphy, Enis. (1986), Classifying Products Strategically, Journal of Marketing, Vol.50, pp.24-42.
  • Miyazaki, A.D. and Krishnamurthy, S. (2002), Internet Seals of Approval: Effects onOnline Privacy Policies and Consumer Perceptions, The Journal of ConsumerAffairs, 36, pp.28-49.
  • Milne, G. R. and Culnan, M. J. (2004), Strategies for Reducing Online PrivacyRisks: Why Consumers Read(or Don’t Read) Online Privacy Notices, Journal ofInteractive Marketing, 18(3), pp.15-29.
  • Miller, A. (1982), Computers and Privacy, In Ethics and the Management ofComputer Technology, W. M. Hoffman, & J. M. Moore(eds.), Oelgeschlager,MA: Gunn, and Ha in Publishers, Inc.
  • McKnight, D. H., Choundhury, V. and Karmer, C. (2002), Developing andValidating Trust Measures for E-commerce : An Integrative Typology,Information Systems Research, Vol. 13, No. 3, pp.334-359.
  • Mayer-Schonberger, V. (2003), Emergency Communications : The Quest forInteroperability in the United States and Europe, In A. M. Howitt, and R. L.Pangi (Eds.), Countering Terrorism?Imensions of preparedness : 299-42.Cambridge, MA: MIT Press.
  • Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995), An Integrative Model ofOrganizational Trust, Academy of Management Journal, 20(3), pp.709-734.
  • Mauricio S. Featherman and Paul A. Pavlou. (2003), Predicting E-Services Adoption:a Perceived Risk Facets Perspective, International Journal of Human-ComputerStudies, Vol. 59, No. 4, pp.451-474.
  • Margulis, S. T. (2003), Privacy as a Social Issue and Behavioral Concept, Journalof Social, 59(2) pp.243-261.
  • Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004), Internet Users InformationPrivacy Concerns : The Construct, the Scale, and Causal Model, InformationSystem Research, Vol. 15, No. 4, pp.336-355.
  • Liu, C., Marchewka, J. T., Lu, J. and Yu, C. S. (2005), Beyond Concern: APrivacy-Trust-Behavioral Intention Model of Electronic Commerce, Informationand Management, 42(2), pp.289-304.
  • Linowes, D.F. (1989), Privacy in America: Is Your Private Life in the Public Eye?,University of Illinois Press, Urbana, IL.
  • Liao Chechen, Liu Chuang-Chun, Chen Kuanchin. (2011), Examining the Impact ofPrivacy, Trust and Risk Perceptions Beyond Monetary Transactions: AnIntegrated Model. Electronic Commerce Research and Applications, Vol. 10,pp.702?715.
  • Laudon, K.C. (1986), Dossier Society: Value Choices in the Design of NationalInformation Systems, New York: Columbia University Press.
  • Korzaan, M. L., and Boswell, K. T. (2008), The Influence of Personality Traits andInformation Privacy Concerns on Behavioral Intentions, Journal of ComputerInformation Systems, 48(4), pp.15-24.
  • Kobsa, A. (2007), Privacy-Enhanced Personalization, Communications of the ACM,Vol. 50, pp.24-33.
  • Knijnenburg, B. P., Kobsa, A. and Jin H. (2013), Dimensionality of InformationDisclosure Behavior, International Journal of Human-Computer Studies, Vol.71(12), pp.1144-1162.
  • Knijnenburg, B. P., Kobsa, A. (2013), Making Decisions about Privacy: InformationDisclosure in Context-Aware Recommender Systems, Institute for SoftwareResearch, No. UCI-ISR-12-1, University of California.
  • Kling, R. (1978), Value Conflicts and Social Choices In Electronic Funds TransferSystems Developments, Communications of the ACM, 28(8) pp.642-657.
  • Kinney, W. (2000), Information Quality Assurance and Internal Control forManagement Decision, McGraw-Hill Education.
  • Kim, M. S., and Ahn, J. H. (2006), Comparison of Trust Sources of An OnlineMarket-Maker in the E-marketplace: Buyer’s and Seller’s Perspectives, Journalof Computer Information Systems, 47(1), pp.84-94.
  • Keith, J. M., Thompson, C. S., Hale, J., Lowry B. P., and Greer. C. (2013),Information Disclosure on Mobile Devices: Re-examining Privacy Calculus withActual User Behavior, International Journal of Human-Computer Studies, Vol.71, No. 12, pp.1163-1173.
  • Joinson, A. N., Reips, U. D., Buchanan, T., Schofield, C. B. P. (2010), Privacy,Trust, and Self-Disclosure Online. Human-Computer Interaction, Vol. 25, No. 1.pp.1-24.
  • Joinson, A. N., Paine, C. B. (2007), Self-disclosure, Privacy, and the Internet, in:Joinson, A. N. (Ed.), The Oxford Handbook of Internet Psychology, OxfordUniversity Press.
  • Jiang, Z., Heng, C. S., and Choi, B. C. F. (2013), Research Note?Privacy Concernsand Privacy-Protective Behavior in Synchronous Online Social Interactions,Information Systems Research, Vol.24, No.3, pp.579-595.
  • Jarvenpaa, S. L., and Tractinsky, N. (1999), Consumer Trust in An Internet Store:A Crosscultural Validation, Journal of Computer Mediated Communication, 5(2),pp.1-5.
  • Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000), Consumer Trust in AnInternet store, Information Technology and Management, 1(2), pp.45-71.
  • Jarvenpaa, S. L., Knoll, K., and Leidner, D. E. (1998), Is Anybody out There?Antecedents of Trust in Global Virtual Teams, Journal of ManagementInformation Systems, 14(4), pp.29-64.
  • Iachello, G., Hong, J. (2007), End-user Privacy in Human-Computer Interaction,Foundations and Trends in Human-Computer Interaction, Vol. 1, pp.1-137.
  • Hui, K. L., H. Teo and S-Y. T. Lee. (2007), The Value of Privacy Assurance: AnExploratory Fiend Experiment, MIS Quarterly, 31(1). pp.19-33.
  • Hoffman, D. L., Novak, T. P., and Peralta, M. A. (1999), Information Privacy inthe Market space : Implications for the Commercial Uses of Anonymity on theWeb, Information Society, Vol. 15, No. 2, pp.129-140.
  • Hew. (1973), Recods, Computers, and the Rights of Citizens; Report of theSecretary’s Advisory Committee on Automated Personal Data Systems,http://epic.org/privacy/hew1973report. (Retrieved on May 6, 2008).
  • Hann, I.-H., Hui, K.-L., Lee, S. Y. T. and Png, I. P. L. (2007), Overcoming OnlineInformation Privacy Concerns: An Information-Processing Theory Approach,Journal of Management Information Systems, Vol. 24, No. 2, pp.13-42.
  • Hann, I., Hui, k., Lee, T. and Ping, I.P.L. (2002), Online Information Privacy:Measuring the Cost-Benefit Trade-off, Twenty - Third International Conferenceon Information Systems, Barcelona, Spain, 15(18), pp.1-8.
  • Gupta, S. and Kim, H. W. (2007), The Moderating Effect of Transaction Experienceon the Decision Calculus in On-line Repurchase, International Journal ofElectronic Commerce, Vol. 12, No. 1, pp.127-158.
  • Greenman, C. (1999), On the Net, Curiosity has a Price: Registration, New YorkTimes, December 23.
  • Greenfield Online. (1998), Online Marketing Research Conducted on Behalf ofBetter Business Bureau, Cyber shoppers Research Report #13197,http://greenfieldcentral.com.
  • Godin, S. (1999), Permission Marketing: Turning Strangers into Friends and Friendinto Customers, NY: Simon and Schuster Publishing.
  • Gilliland, S.W. (1993), The Perceived Fairness of Selection Systems: AnOrganizational Justice Perspective, Academy of Management Review, 18(4),pp.694-734.
  • Gilbert, J. (2001), Privacy? Who Needs Privacy?, Business 2.0. p.20.
  • Gefen, D., Karahanna, E., and Straub, D. W. (2003), Trust and TAM in OnlineShopping : An Integrated Model, MIS Quarterly, Vol. 27, No. 1, pp.51-90.
  • Gefen, D. and Straub, D. W. (2004), Consumer Trust in B2C E-commerce and theImportance of Social Presence : Experiments in E-Products and E-Services.Omega, Vol. 32, No. 6, pp.407-424.
  • Gefen, D. (2002), Customer loyalty in E-commerce, Journal of the Association forInformation Systems, 3, 2, pp.27-51.
  • Gefen, D. (2000), E-commerce: The Role of Familiarity and Trust, omega: TheInternational Journal of Management Science, Vol. 28, No. 5, pp.725-737.
  • Fusilier, M. R., and Hoyer, W. D. (1980), Variables Affecting Perceptions ofInvasion of Privacy in A Personnel Selection Situation, Journal of AppliedPsychology, 65(5), pp.623-626.
  • Etezadi, A, J. and A.F. Farhoomand. (1996), A Structural Model of End Usercomputing Satisfaction and User Performance, Information & Management, Vol.30, pp.65-73.
  • Edward J. Bloustine. (1964), Privacy as An Aspect of Human Dignity, New YorkUniv Law Review, Vol. 39, pp.962-1007.
  • Earp, Julia B., and David Baumer. (2001), Innovative Web Use to Learn aboutConsumer Behavior and Online Privacy. Study completed 27 August 2001; toappear in Communications of the ACM.
  • Dyke, T. P. V, Midha, V. and Nemati, H. (2007), The Effect of Consumer PrivacyEmpowerment on Trust and Privacy Concerns in E-commerce, ElectronicMarkets, 17(1), pp.68-81.
  • Dinev, T. and Hart, P. (2006c), Privacy Calculus Model in E-commerce?A Study ofItaly and the United States, European Journal of Information Systems, 15,pp.389?402.
  • Dinev, T. and Hart, P. (2006b), Internet Privacy Concerns and Social Awareness asDeterminants of Intention to Transact, International Journal of ElectronicCommerce, 10, 2, 7-31.
  • Dinev, T. and Hart, P. (2006a), An Extended Privacy Calculus Model forE-commerce, Information System Transactions Research, Vol. 17, No. 1,pp.61-80.
  • Dinev, T. and Hart, P. (2004), Internet Privacy Concerns and Their AntecedentsMeasurement Validity and A Regression Model, Behavior & InformationTechnology, Vol.23, No. 6, pp.413-422.
  • Derlega, V. J. and Chaikin, A. L. (1977), Privacy and Self-disclosure in SocialRelationships, Journal of Social Issues, Vol. 33, No. 3, pp.102?115.
  • Cyert, R. M. and March, J.G. (1963), A Behavioral Theory of the Firm, New York:Prentice Hall.
  • Culnan, M. J. and Armstrong, P. K. (1999), Information Privacy Concerns,Procedural Fairness, and Impersonal Trust: An Empirical Investigation,Organization Science, Vol. 10, No. 1, pp.104-115.
  • Culnan, M. J. (1993), How Did They Get My Name? : An ExploratoryInvestigations of Consumer Attitudes toward Secondary Information Use, MISQuarterly, Vol. 17, No. 3, pp.341-363.
  • Cox, D. F. (1967). Risk Handling in Consumer Behavior. An Intensive Study of TwoCases, in Risking and Information Handling in Consumer Behavior. Boston:Harvard University Press.
  • Corbitt, B. J., Thanasankit, T., and Yi, H. (2003), Trust and E-commerce: A Studyof Consumer Perceptions, Electronic Commerce Research and Applications, 2(3),pp.203-215.
  • Clarke, G. L. (1988), Structural Constraints on the Proterozoic Reworking ofArchaean Crust in the Rayner Complex, MacRobertson and East Kemp Land,East Antarctica, Precambrian Research, Vol. 4(41), pp.137-156.
  • Chow, W. S., and Angie, N. K. O. (2006), A Study of Trust in E-shopping Beforeand After Firsthand Experience is Gained, Journal of Computer InformationSystems, 46(4), pp.125-130.
  • Chen, K., and Rea, A. Jr. (2004), Protecting Personal Information Online: A Surveyof User Privacy Concerns and Control Techniques, Journal of ComputerInformation Systems, 44(4), pp.85-92.
  • Cespedes F. V. and K. H. Smith. (1993), Database Marketing: New Rules forPolicy and Practice, Slone Management Review, 34(4), pp.7-12.
  • Caudill, E. M., Murphy, P. E. (2000), Consumer Online Privacy: Legal and EthicalIssues, Journal of Public Policy & Marketing, Vol. 19, pp.7-19.
  • Budnitz, M. E. (1998), Privacy Protection for Consumer Transactions in ElectronicCommerce: Why Self-regulation is Inadequate, South Carolina Law Review, Vol.49, pp.847-886.
  • Buchanan, T., Paine, C., Joinson, A. N., Reips, U. D. (2007), Development ofMeasures of Online Privacy Concern and Protection for Use on the Internet,Journal of the American Society for Information Sciences and Technology, Vol.58, pp.157-165.
  • Brooker, G. (1984), An Assessment of an Expanded Measure of Perceived Risk,Advances in Consumer Research, Vol. 11, pp.439-441.
  • Belanger, F., Hiller, J. and Smith, W. J. (2002), Trustworthiness in ElectronicCommerce: The Role of Privacy, Security, and Site Attributes, Journal ofStrategic Information Systems, 11(3/4), pp.245-270.
  • Bauer, R. (1967), Consumer Behavior as Risk Taking, In Risk Taking andInformation Handling in Consumer Behavior, edited by Cox, Cambridge, MA:Harvard University Press, pp.23-33.
  • Bansal, G., Zahedi, F. M. and Gefen, D. (2010), The Impact of PersonalDispositions on Information Sensitivity, Privacy Concern and Trust in DisclosingHealth Information Online, Decision Support Systems, 49(2), pp.138-150.
  • B?langer, F., Crossler, R. E. (2011), Privacy in the Digital Age: A Review ofInformation Privacy Research in Information Systems, MIS Quarterly, Vol. 35,pp.1017-1045.
  • B2C 서비스 제공자의 프라이버시 염려 요인과 신뢰에 관한 연구,박사학위논문, 고려대학교 대학원함께하는 시민행동(2005)
    한필구 5차 빅브라더 보고서 [2010]
  • AMOS 18.0 구조방정식모형 분석
    김계수 한나래아카데미 [2011]