SNS에서 프라이버시 침해의도에 영향을 미치는 요인

논문상세정보
' SNS에서 프라이버시 침해의도에 영향을 미치는 요인' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 경영관리
  • motivation theory
  • privacy
  • social network services
  • social networking service(sns)
  • theory of planned behavior
  • 개인정보보호
  • 계획된 행동이론
  • 동기이론
  • 프라이버시 침해
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
10,704 5

0.0%

' SNS에서 프라이버시 침해의도에 영향을 미치는 요인' 의 참고문헌

  • 처벌과 윤리교육이 정보보안준수에 미치는 영향: 조직유형의 조절효과를 중심으로
    안중호 Information Systems Review 12 (1) : 23 ~ 42 [2010]
  • 인터넷 저작권 침해에 대한 처벌이 태도와 침해 의도에 미치는 영향에 관한 연구: 저작권 교육의 조절변수 효과를 중심으로
    박주연 Journal of Information Science Theory and Practice 43 (3) : 61 ~ 78 [2012]
  • 신용카드 3개사 영업정지 결정과관련한 당사 견해
    한국신용평가 보도자료, 2014. 2. 4 [2014]
  • 소셜미디어 부작용 유형 분석및 대응방향
  • 사이버 언어폭력 의도에 관한 연구 : 사이버 명예훼손/모욕행위인식, 연령, 계획행동이론 변인을 중심으로
    우형진 이정기 사이버커뮤니케이션학보 27 (1) : 215 ~ 253 [2012]
  • 비즈니스 컨설턴트의 비윤리적 컨설팅 행동에 미치는 요인에 관한 연구
    송갑호 서비스경영학회지 12 (1) : 71 ~ 108 [2011]
  • 방통융합 환경에서 정보의 자유와 개인의 프라이버시 보호방안 연구
    오태원 [2010]
  • 대학생들의 S/W 불법복제 의도에 영향을 미치는 요인에 관한 연구
    전진환 정보보호학회논문지 19 (2) : 127 ~ 140 [2009]
  • 국어교육과 매체 언어 이해 교육
    최숙기 청람어문교육 (42) : 69 ~ 106 [2010]
  • Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites, Trust and trustworkthy computing
    Wang, Y. Springer Berlin Heidelberg : 146 ~ 153 [2011]
  • What influences IT ethical behavior intentions-planned behavior, reasoned action, perceived importance, or individual characteristics?
    Leonard, L. N. K. Information and Management 42 (1) : 143 ~ 158 [2004]
  • Values, attitudes, and interpersonal behavior
    Triandis, H. C. Nebraska Symposium on Motivation [1980]
  • User acceptance of hedonic information systems
    Van der Heijden, H. MIS Quarterly : 695 ~ 704 [2004]
  • User Acceptance of Hedonic Digital Artifacts : A Theory of Consumption Values Perspective
    Turel, O. Information and Management, Information and Management 47 : 53 ~ 59 [2010]
  • Understanding Attitudes and Predicting Social Behavior
    Ajzen, I. Prentice Hall [1980]
  • Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage 1
    Agarwal, R MIS Quarterly 24 (4) : 665 ~ 694 [2000]
  • Theory of Planned Behavior and Ethics Theory in Digital Piracy:An Integrated Model
    Yoon, C Journal of Business Ethics 100 (3) : 405 ~ 417 [2011]
  • The theory of planned behavior
    Ajzen, I. Organizational Behavior and Human Decision Processes 50 (2) : 179 ~ 211 [1991]
  • The nature and measurement of sensory curiosity
    Litman, J. A. Personality and Individual Differences 19 : 1123 ~ 1133 [2005]
  • The interactional effects of atmospherics and perceptual curiosity on emotions and online shopping intention
    Koo, D. M. Computers in Human Behavior 26 : 377 ~ 388 [2010]
  • The influence of perceived convenience and curiosity on continuance intention in mobile English learning for high school students using PDAs
    Chang, C. C. Technology, Pedagogy and Education 22 (3) : 373 ~ 386 [2013]
  • The Taste for Privacy : An Analysis of Colledge Student Privacy Settings in an Online Social Network
    Lewis, K. Journal of Computer-Mediated Communication 14 (1) : 79 ~ 100 [2008]
  • Software Piracy in the Workplace :A Model and Empirical Test
    Peace, A. G. Journal of Management Information Systems 20 (1) : 153 ~ 178 [2003]
  • Seven privacy worries in ubiquitous social computing
    Motahari, S. ACM International Conference Proceeding Series [2007]
  • Predicting adolescent perpetration in cyberbullying : an application of the theory of planned behavior
    Heirman, W. Psicothema 24 (4) : 614 ~ 620 [2012]
  • Predicting Unethical Behavior : A Comparison of the Theory of Reasoned Action and The Theory of Planned Behavior
    Chang, M. K. Journal of Business Ethics 17 (16) : 1825 ~ 1834 [1998]
  • Nonlinearities between attitude and subjective norms in information technology acceptance : a negative synergy?
    Titah, R. MIS Quarterly 33 (4) : 827 ~ 844 [2009]
  • Multi-Variate Data Analysis
    Hair, J. F. Pearson Prentice Hall [1995]
  • Market value of voluntary disclosures concerning information security
    Gordon, L. MIS Quarterly 34 (3) : 567 ~ 594 [2010]
  • Market Share Analysis: Mobile Phones, Worldwide, 1Q
    Gartner
  • Intrinsic motivation in senior secondary school students
    Beswick, D. G. Education Research and Perspectives 1 (2) : 15 ~ 25 [1974]
  • Intrinsic motivation in a new light
    Lindenberg, S. Kyklos 54 (2) : 317 ~ 342 [2001]
  • Intrinsic motivation
    Deci, E. L. Plenum Press [1975]
  • Intrinsic and extrinsic motivations : Classic definitions and new directions
    Ryan, R. M. Contemporary educational psychology 25 (1) : 54 ~ 67 [2000]
  • Internet users' information privacy concerns (IUIPC):the construct, the scale, and a causal model
    Malhotra, N. K. Information Systems Research 15 (4) : 336 ~ 355 [2004]
  • Internet Users’Information Privacy-Protective Responses:A Taxonomy and a Nomological Model
    Son, J. Y. MIS Quarterly 32 (3) : 503 ~ 529 [2008]
  • Internet Privacy Concerns and Their Antecedents—Measurement Validity and a Regression Model
    Dinev, T. Behavior and Information Technology 23 (6) : 413 ~ 422 [2004]
  • Interest and deprivation factors of epistemic curiosity
    Litman, J. A. Personality and Individual Differences 44 (7) : 1585 ~ 1595 [2008]
  • Information Revelation and Privacy in On-line Social Networks
    Acquisti, A. Gross, R. Processings of the 2005 ACM workshop on Privacy in the electronic society [2005]
  • Hedonic and Utilitarian Motivations for Online Retail Shopping Behavior
    Childers, T. L. Journal of Retailing and Consumer Services 77 (4) : 511 ~ 535 [2001]
  • Fear Appeals and Information Security Behaviors: An Empirical Study
    Johnston, A. C. MIS Quarterly 34 (3) : 549 ~ 566 [2010]
  • Extrinsic and intrinsic motivation to use computers in the work place1
    Davis, F. D. Journal of Applied Social Psychology 22 (14) : 1111 ~ 1132 [1992]
  • Examining the Relative Influence of Risk and Control on Intention to Adopt Risky Technologies
    Gupta, S Journal of Technology Management and Innovation 5 (4) : 22 ~ 37 [2010]
  • Evaluating Structural Equation Models with Unobserv-able Variables and Measurement Errors
    Fornell, C. Journal of Marketing Research 18 (1) : 39 ~ 50 [1981]
  • Ethics, privacy, and self-restraint in social networking
    Debatin, B. Privacy Online : 47 ~ 60 [2011]
  • Ethical decision making in the medical profession : An application of the theory of planned behavior
    Randall, D. M Journal of Business Ethics 10 (2) : 111 ~ 122 [1991]
  • Efficacy of the theory of planned behaviour : A meta-analytic review
    Armitage, C. J British Journal of Social Psychology 40 (4) : 471 ~ 499 [2001]
  • Effects of Externally Mediated Rewards on Intrinsic Motivation
    Deci, E. L. Journal of Personality and Social Psychology 18 (1) : 105 ~ 115 [1971]
  • Effective IS security : An empirical study
    Straub, D. W. Information Systems Research 1 (3) : 255 ~ 276 [1990]
  • Constructing a TPB questionnaire: Conceptual and methodological considerations
  • Computer ethics
    Johnson, D. G. The Philosophy of Computing and Information (65) [1985]
  • Attitude structure and behavior
    Ajzen, I. Attitude Structure and Function : 241 ~ 274 [1989]
  • An intention model-based study of software piracy, System Sciences, HICSS-32
    Lin, T. C. Proceedings of the 32nd Annual Hawaii International Conferenceon [1999]
  • An empirical study of the factors affecting social network service use
    Kwon, O Computers in Human Behavior 26 (2) : 254 ~ 263 [2010]
  • An Extended Privacy Calculus Model for E-commerce Transactions
    Dinev, T. Information Systems Research 17 (1) : 61 ~ 80 [2006]
  • Acceptance of Blog Usage: the Roles of Technology Acceptance, Social influence and Knowledge Sharing Motivation
    Hsu, C. L Information and Management 45 (1) : 65 ~ 74 [2008]
  • A study of the Perceptions of Students on Privacy and Security on Social Networking Sites(SNS) on the Internet
    Lawler, J. P. Journal of Information Systems Applied Research 3 (12) : 3 ~ 18 [2010]
  • A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects : Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion Adoption Study
    Chin, W. W. Information Systems Research 14 (2) : 189 ~ 217 [2003]
  • A Conceptual model of hacker development and motivations
    Beveren, J. V. Journal of E-Business 1 (2) : 1 ~ 9 [2001]
  • 2013년 한국인터넷백서
  • 2012 Internet Trends
    KPCB [2012]
  • 2011년 인터넷이용 실태조사