Xu, H., and Gupta, S. (2009), The Effects of Privacy Concerns and PersonalInnovativeness on Potential and Experienced Customers’ Adoption ofLocation-based Services, Electronic Markets, 19, pp.137-149.
Xu, H., Dinev, T., Smith, H. J., Hart, P. (2008), Examining the Formation ofIndividual's Privacy Concerns: Toward an Integrative View, In: Proceedings ofthe 29th International Conference on Information Systems, Paris, France,pp.1981-1996.
Wu, K. W., Huang, S. Y., David C. Yen, D. C., and Irina Popova. (2012), TheEffect of Online Privacy Policy on Consumer Privacy Concern and Trust,Computer in Human Behavior, Vol. 28, pp.889-897.
William J. Havlena, and Wayne S. De Sarbo. (1991), On the Measurement ofPerceived Consumer Risk, Decision Sciences, Vol. 22, Issue 4, pp.927?939.
Westin, Alan. F. (1967), Privacy and Freedom, New York : Atheneum.
Tsai, J. Y., Egelman, S., Cranor, L. and Acquisti, A. (2011), The Effect of OnlinePrivacy Information on Purchasing Behavior: An Experimental Study,Information System Research, 22(2), pp.254-268.
Tolchinsky, P.D. McCuddy, M.D. Adams, J. Ganster, D.C. Woodman, R.W. andFromkin, H.L. (1981), Employee Perceptions of Invasion of Privacy: A FieldSimulation Experiment, Journal of Applied Psychology, 66(3), pp.308-313.
Stone, E.F. and Stone, D.L. (1990), Privacy in Organizations: Theoretical Issues,Research Findings, and Protection Mechanism, Research in Personnel andHuman Resources Management, 8, pp.349-411.
Stone, E. F., Gardner, D. G., Gueutal, H. G. and McClure. (1983), A FieldExperiment Comparing Information-Privacy Values, Beliefs, and Attitudes AcrossSeveral Types of Organizations, Journal of Applied Psychology, 68(3),pp.459-468.
Stewart, K. A., Segars, A. H. (2002), An Empirical Examination of the Concern forInformation Privacy Instrument, Information Systems Research, Vol. 13,pp.36?49.
Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, Gerald L. Lohse. (2004),International Differences in Information Privacy Concerns: A Global Survey ofConsumers, The Information Society, 20, pp.313-324.
Spiekermann, S., Grossklags, J., Berendt, B. (2001), E-privacy in 2nd GenerationE-commerce: Privacy Preferences Versus Actual Behavior, In: Proceedings of the3rd ACM Conference on Electronic Commerce, Tampa, FL, pp.38?47.
Soumava Bandyopadhyay. (2009), Antecedents And Consequences Of ConsumersOnline Privacy Concerns, Journal of Business & Economics Research, Vol. 7,No. 3, pp.41-48.
Smith, H. J., Milberg, S. J., and Burke, S. J. (1996), Information Privacy:Measuring Individuals Concerns about Organizational Practices, MIS Quarterly,Vol. 20, No. 6, pp.167-196.
Smith, H. J., Dinev, T., and Xu, H. (2011), Information Privacy Research : AnInterdisciplinary Review, Mis Quarterly, Vol. 35, No. 4, pp.989-1015.
Slyke, C. V., Shim, J. T., Johnson, R., and Jiang, J. (2006), Concern forInformation Privacy and Online Consumer Purchasing, Journal of theAssociation for Information Systems, 7(6), pp.415-444.
Sledgianowski, D., and Kulviwat, S. (2009), Using Social Network Sites: TheEffects of Playfulness, Critical Mass and Trust in A Hedonic Context, Journalof Computer Information Systems, 49(4), pp.74-83.
Singh, J. and Sirdeshmukh, D. (2000), Agency and Trust Mechanisms in ConsumerSatisfaction and Loyalty Judgments, Journal of the Academy of MarketingScience, 28(1), pp.150-167.
Schneiderman, B. (2002), Designing Trust into Online Experience, Communicationsof the ACM, 44(12), pp57-59.
Schement, J. R. and Curtis, T. (1995), Tendencies and Tensions of the InformationAge-The Production and Distribution of Information in the United States,Transaction Publishers, New Brunswick, New Jersey.
S. D. Warren, L. D. Brandeis. (1890), The Right to Privacy, Harvard Law Review,Vol. 4, No. 5, pp.193-220.
Ruth Gavison. (1980), Privacy and the Limits of Law, Yale Law Journal, vol.89,No. 3, pp.421-471.
Rousseau, D, Sitkin, S. Burt R. and Camerer, C. (1998), Not So Different AfterAll: A Cross-Discipline View of Trust, Academy of Management Review, Vol.23, No. 3, pp.391-404.
Preset, S. (1990). The Adventure Experience Paradigm, In Adventure Recreation,edited by A. Mile sand S. Priest. state College, PA. Venture Publishing,pp.157-162.
Phelps, J., G. Nowak, and E. Ferrell. (2000), Privacy Concerns and ConsumerWillingness to Provide Personal Information, Journal of Public Policy &Marketing, Vol. 19, No. 1, pp.27-41.
Phelps, J. E., D’Souza, G., and Nowak, G. J. (2001), Antecedents and Consequencesof Consumer Privacy Concerns: An Empirical Investigation, Journal ofInteractive Marketing, Vol. 15, No. 4, pp.2-17.
Perleg, M., Beimel, D., Dori, D., and Denekamp, Y. (2008), Situation-based AccessControl: Privacy Management via Modeling of Patient Data Access Scenarios,Journal of Biomedical Informatics, 41(6), pp.1028-1040.
Pavlou, P.A. Liang, H. and Xue, Y. (2007), Understanding and MitigatingUncertainty in Online Exchange Relationships: A Principal-Agent Perspective,MIS Quarterly, 31(1), pp.105-136.
Pavlou, P. A., and Gefen, D. (2004), Building Effective Online Marketplaces withInstitution Based Trust, Information Systems Research, 15(1), pp.37-59.
Patil, S., Kobsa, A. (2009), Privacy Considerations in Awareness Systems: Designingwith Privacy in Mind, In: Markopoulos, P., de Ruyter, B., Mackay, W. (Eds.),Awareness Systems: Advances in Theory, Methodology and Design, SpringerVerlag, Berlin, Heidelberg, New York, pp.187?206.
OECD. (2013), Exploring the Economics of Personal Data: A Survey ofMethodologies for Monetary Value, OECD Digital Economy Papers, No. 220.
Nowak, G. J. and Phelps, J. (1995), Direct Marketing and the Use ofIndividual-Level Consumer Information: Determining How and When ‘Privacy’Matters, Journal of Direct Marketing, 9(3), pp.46-60.
Norberg, A. P., Horne, R. D., and Horne, A. D. (2007), The Privacy Paradox :Personal Information Disclosure Intentions versus Behaviors, The journal ofConsumer Affairs, Vol. 41, No. 1, pp.100-126.
Morris, J., Moberg, D. (1994), Work Organizations as Context for Trust andBetrayal, in Theodore R, Sarbin Ralph M, Carney and Carson Eoyang(eds),Citizen Espionage: Studies in Trust and Betrayal, Praeger Publisher,Murphy, Enis. (1986), Classifying Products Strategically, Journal of Marketing, Vol.50, pp.24-42.
Miyazaki, A.D. and Krishnamurthy, S. (2002), Internet Seals of Approval: Effects onOnline Privacy Policies and Consumer Perceptions, The Journal of ConsumerAffairs, 36, pp.28-49.
Milne, G. R. and Culnan, M. J. (2004), Strategies for Reducing Online PrivacyRisks: Why Consumers Read(or Don’t Read) Online Privacy Notices, Journal ofInteractive Marketing, 18(3), pp.15-29.
Miller, A. (1982), Computers and Privacy, In Ethics and the Management ofComputer Technology, W. M. Hoffman, & J. M. Moore(eds.), Oelgeschlager,MA: Gunn, and Ha in Publishers, Inc.
McKnight, D. H., Choundhury, V. and Karmer, C. (2002), Developing andValidating Trust Measures for E-commerce : An Integrative Typology,Information Systems Research, Vol. 13, No. 3, pp.334-359.
Mayer-Schonberger, V. (2003), Emergency Communications : The Quest forInteroperability in the United States and Europe, In A. M. Howitt, and R. L.Pangi (Eds.), Countering Terrorism?Imensions of preparedness : 299-42.Cambridge, MA: MIT Press.
Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995), An Integrative Model ofOrganizational Trust, Academy of Management Journal, 20(3), pp.709-734.
Mauricio S. Featherman and Paul A. Pavlou. (2003), Predicting E-Services Adoption:a Perceived Risk Facets Perspective, International Journal of Human-ComputerStudies, Vol. 59, No. 4, pp.451-474.
Margulis, S. T. (2003), Privacy as a Social Issue and Behavioral Concept, Journalof Social, 59(2) pp.243-261.
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004), Internet Users InformationPrivacy Concerns : The Construct, the Scale, and Causal Model, InformationSystem Research, Vol. 15, No. 4, pp.336-355.
Liu, C., Marchewka, J. T., Lu, J. and Yu, C. S. (2005), Beyond Concern: APrivacy-Trust-Behavioral Intention Model of Electronic Commerce, Informationand Management, 42(2), pp.289-304.
Linowes, D.F. (1989), Privacy in America: Is Your Private Life in the Public Eye?,University of Illinois Press, Urbana, IL.
Liao Chechen, Liu Chuang-Chun, Chen Kuanchin. (2011), Examining the Impact ofPrivacy, Trust and Risk Perceptions Beyond Monetary Transactions: AnIntegrated Model. Electronic Commerce Research and Applications, Vol. 10,pp.702?715.
Laudon, K.C. (1986), Dossier Society: Value Choices in the Design of NationalInformation Systems, New York: Columbia University Press.
Korzaan, M. L., and Boswell, K. T. (2008), The Influence of Personality Traits andInformation Privacy Concerns on Behavioral Intentions, Journal of ComputerInformation Systems, 48(4), pp.15-24.
Kobsa, A. (2007), Privacy-Enhanced Personalization, Communications of the ACM,Vol. 50, pp.24-33.
Knijnenburg, B. P., Kobsa, A. and Jin H. (2013), Dimensionality of InformationDisclosure Behavior, International Journal of Human-Computer Studies, Vol.71(12), pp.1144-1162.
Knijnenburg, B. P., Kobsa, A. (2013), Making Decisions about Privacy: InformationDisclosure in Context-Aware Recommender Systems, Institute for SoftwareResearch, No. UCI-ISR-12-1, University of California.
Kling, R. (1978), Value Conflicts and Social Choices In Electronic Funds TransferSystems Developments, Communications of the ACM, 28(8) pp.642-657.
Kinney, W. (2000), Information Quality Assurance and Internal Control forManagement Decision, McGraw-Hill Education.
Kim, M. S., and Ahn, J. H. (2006), Comparison of Trust Sources of An OnlineMarket-Maker in the E-marketplace: Buyer’s and Seller’s Perspectives, Journalof Computer Information Systems, 47(1), pp.84-94.
Keith, J. M., Thompson, C. S., Hale, J., Lowry B. P., and Greer. C. (2013),Information Disclosure on Mobile Devices: Re-examining Privacy Calculus withActual User Behavior, International Journal of Human-Computer Studies, Vol.71, No. 12, pp.1163-1173.
Joinson, A. N., Reips, U. D., Buchanan, T., Schofield, C. B. P. (2010), Privacy,Trust, and Self-Disclosure Online. Human-Computer Interaction, Vol. 25, No. 1.pp.1-24.
Joinson, A. N., Paine, C. B. (2007), Self-disclosure, Privacy, and the Internet, in:Joinson, A. N. (Ed.), The Oxford Handbook of Internet Psychology, OxfordUniversity Press.
Jiang, Z., Heng, C. S., and Choi, B. C. F. (2013), Research Note?Privacy Concernsand Privacy-Protective Behavior in Synchronous Online Social Interactions,Information Systems Research, Vol.24, No.3, pp.579-595.
Jarvenpaa, S. L., and Tractinsky, N. (1999), Consumer Trust in An Internet Store:A Crosscultural Validation, Journal of Computer Mediated Communication, 5(2),pp.1-5.
Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000), Consumer Trust in AnInternet store, Information Technology and Management, 1(2), pp.45-71.
Jarvenpaa, S. L., Knoll, K., and Leidner, D. E. (1998), Is Anybody out There?Antecedents of Trust in Global Virtual Teams, Journal of ManagementInformation Systems, 14(4), pp.29-64.
Iachello, G., Hong, J. (2007), End-user Privacy in Human-Computer Interaction,Foundations and Trends in Human-Computer Interaction, Vol. 1, pp.1-137.
Hui, K. L., H. Teo and S-Y. T. Lee. (2007), The Value of Privacy Assurance: AnExploratory Fiend Experiment, MIS Quarterly, 31(1). pp.19-33.
Hoffman, D. L., Novak, T. P., and Peralta, M. A. (1999), Information Privacy inthe Market space : Implications for the Commercial Uses of Anonymity on theWeb, Information Society, Vol. 15, No. 2, pp.129-140.
Hew. (1973), Recods, Computers, and the Rights of Citizens; Report of theSecretary’s Advisory Committee on Automated Personal Data Systems,http://epic.org/privacy/hew1973report. (Retrieved on May 6, 2008).
Hann, I.-H., Hui, K.-L., Lee, S. Y. T. and Png, I. P. L. (2007), Overcoming OnlineInformation Privacy Concerns: An Information-Processing Theory Approach,Journal of Management Information Systems, Vol. 24, No. 2, pp.13-42.
Hann, I., Hui, k., Lee, T. and Ping, I.P.L. (2002), Online Information Privacy:Measuring the Cost-Benefit Trade-off, Twenty - Third International Conferenceon Information Systems, Barcelona, Spain, 15(18), pp.1-8.
Gupta, S. and Kim, H. W. (2007), The Moderating Effect of Transaction Experienceon the Decision Calculus in On-line Repurchase, International Journal ofElectronic Commerce, Vol. 12, No. 1, pp.127-158.
Greenman, C. (1999), On the Net, Curiosity has a Price: Registration, New YorkTimes, December 23.
Greenfield Online. (1998), Online Marketing Research Conducted on Behalf ofBetter Business Bureau, Cyber shoppers Research Report #13197,http://greenfieldcentral.com.
Godin, S. (1999), Permission Marketing: Turning Strangers into Friends and Friendinto Customers, NY: Simon and Schuster Publishing.
Gilliland, S.W. (1993), The Perceived Fairness of Selection Systems: AnOrganizational Justice Perspective, Academy of Management Review, 18(4),pp.694-734.
Gilbert, J. (2001), Privacy? Who Needs Privacy?, Business 2.0. p.20.
Gefen, D., Karahanna, E., and Straub, D. W. (2003), Trust and TAM in OnlineShopping : An Integrated Model, MIS Quarterly, Vol. 27, No. 1, pp.51-90.
Gefen, D. and Straub, D. W. (2004), Consumer Trust in B2C E-commerce and theImportance of Social Presence : Experiments in E-Products and E-Services.Omega, Vol. 32, No. 6, pp.407-424.
Gefen, D. (2002), Customer loyalty in E-commerce, Journal of the Association forInformation Systems, 3, 2, pp.27-51.
Gefen, D. (2000), E-commerce: The Role of Familiarity and Trust, omega: TheInternational Journal of Management Science, Vol. 28, No. 5, pp.725-737.
Fusilier, M. R., and Hoyer, W. D. (1980), Variables Affecting Perceptions ofInvasion of Privacy in A Personnel Selection Situation, Journal of AppliedPsychology, 65(5), pp.623-626.
Etezadi, A, J. and A.F. Farhoomand. (1996), A Structural Model of End Usercomputing Satisfaction and User Performance, Information & Management, Vol.30, pp.65-73.
Edward J. Bloustine. (1964), Privacy as An Aspect of Human Dignity, New YorkUniv Law Review, Vol. 39, pp.962-1007.
Earp, Julia B., and David Baumer. (2001), Innovative Web Use to Learn aboutConsumer Behavior and Online Privacy. Study completed 27 August 2001; toappear in Communications of the ACM.
Dyke, T. P. V, Midha, V. and Nemati, H. (2007), The Effect of Consumer PrivacyEmpowerment on Trust and Privacy Concerns in E-commerce, ElectronicMarkets, 17(1), pp.68-81.
Dinev, T. and Hart, P. (2006c), Privacy Calculus Model in E-commerce?A Study ofItaly and the United States, European Journal of Information Systems, 15,pp.389?402.
Dinev, T. and Hart, P. (2006b), Internet Privacy Concerns and Social Awareness asDeterminants of Intention to Transact, International Journal of ElectronicCommerce, 10, 2, 7-31.
Dinev, T. and Hart, P. (2006a), An Extended Privacy Calculus Model forE-commerce, Information System Transactions Research, Vol. 17, No. 1,pp.61-80.
Dinev, T. and Hart, P. (2004), Internet Privacy Concerns and Their AntecedentsMeasurement Validity and A Regression Model, Behavior & InformationTechnology, Vol.23, No. 6, pp.413-422.
Derlega, V. J. and Chaikin, A. L. (1977), Privacy and Self-disclosure in SocialRelationships, Journal of Social Issues, Vol. 33, No. 3, pp.102?115.
Cyert, R. M. and March, J.G. (1963), A Behavioral Theory of the Firm, New York:Prentice Hall.
Culnan, M. J. and Armstrong, P. K. (1999), Information Privacy Concerns,Procedural Fairness, and Impersonal Trust: An Empirical Investigation,Organization Science, Vol. 10, No. 1, pp.104-115.
Culnan, M. J. (1993), How Did They Get My Name? : An ExploratoryInvestigations of Consumer Attitudes toward Secondary Information Use, MISQuarterly, Vol. 17, No. 3, pp.341-363.
Cox, D. F. (1967). Risk Handling in Consumer Behavior. An Intensive Study of TwoCases, in Risking and Information Handling in Consumer Behavior. Boston:Harvard University Press.
Corbitt, B. J., Thanasankit, T., and Yi, H. (2003), Trust and E-commerce: A Studyof Consumer Perceptions, Electronic Commerce Research and Applications, 2(3),pp.203-215.
Clarke, G. L. (1988), Structural Constraints on the Proterozoic Reworking ofArchaean Crust in the Rayner Complex, MacRobertson and East Kemp Land,East Antarctica, Precambrian Research, Vol. 4(41), pp.137-156.
Chow, W. S., and Angie, N. K. O. (2006), A Study of Trust in E-shopping Beforeand After Firsthand Experience is Gained, Journal of Computer InformationSystems, 46(4), pp.125-130.
Chen, K., and Rea, A. Jr. (2004), Protecting Personal Information Online: A Surveyof User Privacy Concerns and Control Techniques, Journal of ComputerInformation Systems, 44(4), pp.85-92.
Cespedes F. V. and K. H. Smith. (1993), Database Marketing: New Rules forPolicy and Practice, Slone Management Review, 34(4), pp.7-12.
Caudill, E. M., Murphy, P. E. (2000), Consumer Online Privacy: Legal and EthicalIssues, Journal of Public Policy & Marketing, Vol. 19, pp.7-19.
Budnitz, M. E. (1998), Privacy Protection for Consumer Transactions in ElectronicCommerce: Why Self-regulation is Inadequate, South Carolina Law Review, Vol.49, pp.847-886.
Buchanan, T., Paine, C., Joinson, A. N., Reips, U. D. (2007), Development ofMeasures of Online Privacy Concern and Protection for Use on the Internet,Journal of the American Society for Information Sciences and Technology, Vol.58, pp.157-165.
Brooker, G. (1984), An Assessment of an Expanded Measure of Perceived Risk,Advances in Consumer Research, Vol. 11, pp.439-441.
Belanger, F., Hiller, J. and Smith, W. J. (2002), Trustworthiness in ElectronicCommerce: The Role of Privacy, Security, and Site Attributes, Journal ofStrategic Information Systems, 11(3/4), pp.245-270.
Bauer, R. (1967), Consumer Behavior as Risk Taking, In Risk Taking andInformation Handling in Consumer Behavior, edited by Cox, Cambridge, MA:Harvard University Press, pp.23-33.
Bansal, G., Zahedi, F. M. and Gefen, D. (2010), The Impact of PersonalDispositions on Information Sensitivity, Privacy Concern and Trust in DisclosingHealth Information Online, Decision Support Systems, 49(2), pp.138-150.
B?langer, F., Crossler, R. E. (2011), Privacy in the Digital Age: A Review ofInformation Privacy Research in Information Systems, MIS Quarterly, Vol. 35,pp.1017-1045.
B2C 서비스 제공자의 프라이버시 염려 요인과 신뢰에 관한 연구,박사학위논문, 고려대학교 대학원함께하는 시민행동(2005)