연구논문 : 사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로

논문상세정보
' 연구논문 : 사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • activity tracker
  • internet of things
  • iot
  • privacy
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,981 0

0.0%

' 연구논문 : 사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로' 의 참고문헌

  • 웨어러블 디바이스 기반의 창조경제 활성화 전략
  • 상황인식 기술을 이용한 운전자 선호도 기반 교통상세정보 추천 시스템
    심재문 지식경영연구 11 (2) : 75 ~ 93 [2010]
  • 모바일 소셜네트워크서비스 환경에서 지속 사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할
    김병수 지식경영연구 13 (4) : 83 ~ 100 [2012]
  • ‘Statistical Power analysis for the behavioral sciences
    Cohen, J. Academic Press [1988]
  • Using PLS path modeling for assessing hierarchical construct models:Guidelines and empirical illustration
    Wetzels, M. MIS Quarterly 33 (1) : 177 ~ 195 [2009]
  • Understanding th Wearability of Head- Mounted Devices from a Human-Centered Perspective
    Genaro, V. ISWC2014 [2014]
  • Understanding customers’ repeat purchase intentions in B2C e-commerce : the roles of utilitarian value, hedonic value and perceived risk
    Chiu, C-M Information Syste Journal 24 (1) : 85 ~ 114 [2012]
  • U-commerce : Expanding the Universe of Marketing
    Watson, R. T. Journal of the Academy of Marketing Science 30 (4) : 333 ~ 347 [2002]
  • The value of privacy assurance : An exploratory field experiment
    Hui, K. L. MIS Quarterly 31 (1) : 19 ~ 33 [2007]
  • The U-Constructs:Four Information Drives
    Junglas, I. Communications of the Association for Information syste 17 (1) : 26 ~ [2006]
  • The Role of Push-Pull Technology in Privacy Calculus : The Case of Location-Based Services
    Xu, H. Journal of Management Information Syste 26 (3) : 135 ~ 174 [2010]
  • The Role of Espoused National Cultural Values in Technology Acceptance
    Srite, M. MIS quarterly 30 (3) : 679 ~ 704 [2006]
  • The Right to Privacy
    Warren, S. D. Harvard law review 4 (1) : 193 ~ 220 [1890]
  • The Internet of Things: A survey
    Atzori, L. Computer Networks 54 : 2787 ~ 2805 [2010]
  • The Internet of Things and Wearable Technology
    Thierer, A. Mercatus Working Paper
  • Technology and Privacy: The new landscape
    Mayer-Schönberger, V. MIT Press [1997]
  • Security Concerns of System Users : A Study of Perceptions of the Adequacy of Security
    Goodhue, D. L. Information & Management 20 (1) : 13 ~ 27 [1991]
  • RFID and the Perception of Control : the Consumer’s View
    Günther, O. Communications of the ACM 48 (9) : 73 ~ 76 [2005]
  • RFID : Applications, Security, and Privacy
    Garnkel, S. Addison- Wesley [2006]
  • Privacy in Organizations : Theoretical Issues, Research Findings, and Protection Mechanisms
    Stone, E. F. Research in Personnel and Human Resources Management 8 (3) : 349 ~ 411 [1990]
  • Privacy as a Social Issue and Behavioral Concept
    Margulis, S. T. Journal of Social Issues 59 (2) : 243 ~ 261 [2003]
  • Privacy Issues in Location-Aware Mobile Devices
    Minch, R. P. Proceedings of the 37th Annual Hawaii International Conference on System Sciences : 1 ~ 10 [2004]
  • Predicting intention to adopt interorganizational linkages : An institutional perspective
    Teo, H. H. MIS Quarterly 27 (1) : 19 ~ 49 [2003]
  • Predicting E-Services Adoption : A Perceived Risk Facets Perspective
    Featherman, M. S. International Journal of Human-Computer Studies 59 (4) : 451 ~ 474 [2003]
  • Personalization Technologies : A Processoriented Perspective
    Adomavicius, G. Communications of the ACM 48 (10) : 83 ~ 90 [2005]
  • PLS path modeling
    Tenenhaus, M. Computational Pstatistics & Data analysis 48 (1) : 159 ~ 205 [2005]
  • Online In formation Privacy: Measuring the Cost-Benefit Trade- Off
    Hann, I. H. In Proceedings of the Twenty-Third International Conference on Information Syste : 1 ~ 10 [2002]
  • Mobile Identity Management : An Enacted View
    Roussos, G. International Journal of Electronic Commerce 8 (1) : 81 ~ 100 [2003]
  • Internet users' information privacy concerns (IUIPC):the construct, the scale, and a causal model
    Malhotra, N. K. Information Syste Research 15 (4) : 336 ~ 355 [2004]
  • Internet of Things–New Security and Privacy Challenges
    Weber, R. H. Computer Law & Security Review 26 (1) : 23 ~ 30 [2010]
  • Integrating the Supply Chain wit h R F ID : A Technica l a nd Business Analysis
    Asif, Z. Communications of the Association for Information Syste 15 (24) : 393 ~ 426 [2005]
  • Information privacy concerns, procedural fairness, and impersonal trust : An empirical investigation
    Culnan, M. J. Organization Science 10 (1) : 104 ~ 115 [1998]
  • Information privacy concerns : Linking individual perceptions with institutional privacy assurances
    Xu, H. Journal of the Association for Information Syste 12 (12) : 798 ~ 824 [2011]
  • Ideas or Interests : Privacy in Electronic Communications
    Regan, P. M. Policy Studies Journal 21 (3) : 450 ~ 469 [1993]
  • How did they get my name?An exploratory investigation of consumer attitudes toward secondary information use
    Culnan, M. J. MIS Quarterly 17 (3) : 341 ~ 363 [1993]
  • Evaluating structural equation models with unobservable variables and measurement error
    Fornell, C. Journal of Marketing Research 18 (1) : 39 ~ 50 [1981]
  • Database Marketing : New Rules for Policy and Practice
    Cespedes, F. V. Slone Management Review 34 : 7 ~ 23 [1993]
  • Consumer privacy : Balancing economic and justice considerations
    Culnan, M. J. Journal of Social Issues 59 (2) : 323 ~ 342 [2003]
  • Commentary Issues and Opinion on Structural Equation Modeling
    Chin, W. W. MIS Quarterly 22 (1) : 7 ~ 16 [1998]
  • Building Consumer Trust Online
    Ho!man, D. L. Communications of the ACM 42 (4) : 80 ~ 85 [1999]
  • An Overview of Privacy and Security Issues in the Internet of Things
    Medaglia, C. M. Springer [2010]
  • An Experimental Study on Ubiquitous Commerce Adoption : Impact of Personalization and Privacy Concerns
    Sheng, H. Journal of the Association for Information Syste 9 (6) : 344 ~ 376 [2006]
  • A primer for soft modeling
    Falk, R. F. University of Akron Press [1992]
  • A lleviating Consumers’ Privacy Concerns in Location- Based Services: A Psychological Control Perspective
    Xu, H. Proceedings of the Twenty-Fifth International Conference on Information Syste : 793 ~ 806 [2004]
  • A Practical Guide to Factorial Validity Using PLS Graph : Tutorial and Annotated Example
    Gefen, D. Communications of the AIS 16 (25) : 91 ~ 109 [2005]