폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구 : 밴드 사용자를 중심으로

논문상세정보
' 폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구 : 밴드 사용자를 중심으로' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • closed-typesns
  • information privacy
  • privacy calculus model
  • psychologicalprivacy
  • 심리적프라이버시
  • 정보 프라이버시
  • 폐쇄형 sns
  • 프라이버시계산모형
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
101 6

0.0%

' 폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구 : 밴드 사용자를 중심으로' 의 참고문헌

  • 프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로
    민진영 Information Systems Review 15 (1) : 105 ~ 122 [2013]
  • 폐쇄형 소셜 네트워크 서비스 애플리케이션 사용성 평가 연구- ‘네이버 밴드(Naver Band)와 카카오그룹(Kakao Group)’을 중심으로 -
    장성희 디지털디자인학연구 14 (1) : 377 ~ 386 [2014]
  • 정보 프라이버시 관련 연구 특성 및 향후 연구 방향 도출을 위한 선행연구 분석 - 온라인 상에서 정보 프라이버시 염려를 중심으로-
    이호근 정보화정책 16 (2) : 3 ~ 26 [2009]
  • 우종필교수의 구조방정식모델 개념과 이해
    우종필 한나래 아카데미 [2012]
  • 스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용
    차훈상 Asia Pacific Journal of Information Systems 22 (4) : 7 ~ 29 [2012]
  • 사회적 관계망에 따른 온라인SNS 사용행태 : 끈적끈적하게 관계 맺어진 사람들과의 소통
    홍성민 한국HCI학회 학술대회 : 759 ~ 762 [2013]
  • 관계혜택이 고객과 종업원의 식음료업장에 대한 만족, 그리고 고객충성도에 미치는 영향
    이용기 경영학연구 31 (2) : 373 ~ 404 [2002]
  • Understanding e-Leaning Continuance Intention: An Extension of the Technology Acceptance Model
    Roca, J. International Journal of Human-Computer Studies 64 (8) : 683 ~ 696 [2006]
  • Understanding Information Systems Continuance:An Expectation-Confirmation Model
    Bhattacherjee, A. MIS Quarterly 25 (3) : 351 ~ 370 [2001]
  • Trust and ecommerce:a study of consumer perceptions
    Corbitt, B. Electronic commerce research and applications 2 (3) : 203 ~ 215 [2003]
  • Trust and TAM in online shopping : An integrated model
    Gefen, D. MIS quarterly 27 (1) : 51 ~ 90 [2003]
  • Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and My-Space
    Dwyer, C AMCIS [2007]
  • The role of perceived social capital and flow experience in building users’continuance intention to social networking sites in China
    Chang, Y. Computers in Human Behavior 28 (3) : 995 ~ 1001 [2012]
  • The rold of pleasure in web site success
    Wulf, K. Information and Management 43 (4) : 434 ~ 446 [2006]
  • The effects of trust, security and privacy in social networking : A securitybased approach to understand the pattern of adoption
    Shin, D. Interacting with Computers 22 (5) : 428 ~ 438 [2010]
  • The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce
    Suh, B. International Journal of Electronic Commerce 7 (3) : 135 ~ 161 [2003]
  • The Effect of Flow Experience on Mobile SNS Users’ Loyalty
    Zhou, T. Industrial Management and Data Systems 110 (6) : 930 ~ 946 [2010]
  • Relationship between Perceived Benefits and Social Influence towards Self-Disclosure and Behavioral Intention in Web 2. 0
    Tanakinjal, G. European Journal of Business and Social Sciences 1 (4) : 63 ~ 75 [2012]
  • Psychological Functions of Privacy
    Pedersen, D. Journal of Environmental Psychology 17 : 147 ~ 156 [1997]
  • Privacy regulation : Culturally universal or culturally specific
    Altman, I. Journal of Social Issues 33 : 66 ~ 84 [1977]
  • Privacy and security concerns as major barriers for e-commerce : a survey study
    Udo, G. Information Management and Computer Security 9 (4) : 165 ~ 174 [2001]
  • Privacy and Freedom
    Westin, A. New York City, Athenaeum [1976]
  • Privacy and Environment
    Mashall, N. Human Ecology 1 (2) : 93 ~ 110 [1972]
  • Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
    Chellappa, P. Information Technology and Management 6 (2) : 181 ~ 202 [2005]
  • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    Davis, F. MIS Quarterly 13 (3) : 319 ~ 340 [1989]
  • Perceived Security Determinants in e-Commerce among Turkish University Students
    Yenisey, M. Behaviour and Information Technology 24 (4) : 259 ~ 274 [2005]
  • Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions
    Rammath, K. Logistics Information Management 15 (5) : 358 ~ 368 [2002]
  • Online privacy control via anonymity and pseudonym:Cross-cultural implications
    Chen, H. Behaviour and Information Technology 27 (3) : 229 ~ 242 [2008]
  • Online Information Privacy: Measuring the Cost-Benefit Trade-off
    Hann, I. Twenty-Third International Conference on Information Systems 15 (18) : 1 ~ 8 [2002]
  • Internet Users’ Information Privacy Concerns(IUIPC):the Construct, the Scale, and a Causal Model
    Malhotra, N. Information Systems Research 15 (4) : 336 ~ 355 [2004]
  • Internet Social Network Communities:Risk Taking, Trust, and Privacy Concerns
    Fogel, J Computers in Human Behavior 25 (1) : 153 ~ 160 [2009]
  • Information privacy : measuring individual’ sconcerns about organizational practices
    Smith, H. MIS Quarterly 20 (2) : 167 ~ 196 [1996]
  • Information Security Risk Analysis
    Peltier, T. CRC press [2005]
  • How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use
    Culnan, M. MIS Quarterly 17 (3) : 341 ~ 363 [1993]
  • Enhancing perceived interactivity through network externalities : An empirical study on micro-bloging service satisfaction and continuance intention
    Zhao, L. Decision Support Systems 53 (4) : 825 ~ 834 [2012]
  • Dimensions of privacy
    Pedersen, D. Perceptual and Motor Skills 48 (3) : 1291 ~ 1297 [1979]
  • Consumer privacy : Balancing economic and justice considerations
    Culnan, M. Journal of Social Issues 59 (2) : 323 ~ 342 [2003]
  • Browsers or buyers in Cyberspace? An investigation of factors influencing electronic exchange
    Swaminathan, V. Journal of Computer-Mediated Communication 5 (2) [1999]
  • An Extended Privacy Calculus Model for E-commerce Transactions
    Dinev, T. Information Systems Research 17 (1) : 214 ~ 233 [2006]
  • A Privacy Paradox : Social Networking in the United States
    Barnes, S. First Monday 11 (9) [2006]
  • A (My)Space of One's Own: On Privacy and Online Social Networks
    Abril, P. Northwestern Journal of Technology and Intellectual Property 6 (1) : 73 ~ 88 [2007]