簡易檢索 / 詳目顯示

研究生: 陳國安
Widjaja, Andree Emmanuel
論文名稱: Users' Willingness to Put Their Personal Information on the Personal Cloud-Based Storage Applications
Users' Willingness to Put Their Personal Information on the Personal Cloud-Based Storage Applications
指導教授: 陳正忠
Chen, Jeng Chung
學位類別: 博士
Doctor
系所名稱: 管理學院 - 國際經營管理研究所
Institute of International Management
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 194
外文關鍵詞: Privacy, Cloud Storage, Communication Privacy Management Theory, Privacy-Trust-Behavioral Intention Model, Information Sensitivity, Culture
相關次數: 點閱:92下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Despite prevalent privacy and security threats on the cloud, users have put tremendous amount of their personal information on the cloud storage. This dissertation proposes a comprehensive research framework to investigate cloud storage users’ willingness to put personal information on the personal cloud-based storage applications or in short, cloud storage. Our research framework is theoretically derived from an important privacy theory called, Communication Privacy Management Theory and a privacy research model, called Privacy-Trust-Behavioral Intention model. To empirically test our research framework, we had conducted an online survey to 786 active cloud storage users both in Indonesia and Taiwan. The findings suggest that cloud storage users’ willingness to put personal information is highly influenced by trust, perceived costs, perceived benefits, and also the sensitivity of the personal information. We also found some interesting findings with regard to cultural differences between the two countries. The key findings, implications, and limitations are discussed in this dissertation.

    ABSTRACT I ACKNOWLEDGEMENTS II TABLE OF CONTENTS III LIST OF TABLES VI LIST OF FIGURES IX CHAPTER ONE INTRODUCTION 1 1.1 Research Background. 1 1.2 Motivation. 2 1.3 Research Gaps. 7 1.4 Research Questions and Objectives. 11 1.5 Structure of this Dissertation. 12 CHAPTER TWO LITERATURE REVIEW 13 2.1 Privacy and Security Issues in Cloud Computing. 13 2.2 Personal Cloud-Based Applications and Cloud Storage. 14 2.3 Communication Privacy Management Theory. 16 2.4 Privacy-Trust-Behavioral Intention Model. 22 2.5 Privacy Paradox. 24 2.6 Research Variables and Hypothesis Development. 25 2.6.1 Willingness to Put Personal Information. 25 2.6.2 Trust. 30 2.6.3 Boundary Rule Formation – Cost Benefit Assessment. 32 2.6.4 Boundary Rule Formation – Privacy Control. 38 2.6.5 Boundary Rule Formation – Disposition to Privacy. 39 2.6.6 Boundary Coordination – Perceived Effectiveness of Privacy Policy. 40 2.6.7 Boundary Turbulence – Perceived Effectiveness of Industry Self Regulation. 42 2.6.8 Boundary Turbulence – Perceived Effectiveness of Government Regulation. 43 2.6.9 Boundary Rule Formation – The Influence of Culture. 44 2.6.10 Information Sensitivity. 49 2.6.11 Control Variables. 52 CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 53 3.1 Research Framework and Variable Definition. 53 3.2 Sample and Data Collection Procedure. 55 3.3 Measurement Items. 58 3.4 Partial Least Square Structural Equation Modeling (PLS SEM). 62 CHAPTER FOUR RESEARCH RESULTS 64 4.1 Demographics. 64 4.2 Exploratory Factor Analysis (EFA) for All Constructs. 66 4.3 EFA for Final Dependent Variable. 74 4.4 Descriptive Statistics, EFA per Construct, and PLS SEM Confirmatory Factor Analysis (CFA) Results. 76 4.5 Common Method Variance Results. 96 4.6 Comparisons of the Two Samples. 97 4.7 PLS SEM Path Coefficient Analysis Results. 99 4.8 Exploratory PLS SEM Multi Group Analysis (PLS-MGA). 106 CHAPTER FIVE CONCLUSION AND SUGGESTIONS 109 5.1 Findings and Discussion. 109 5.1.1 Combined Sample. 111 5.1.2 Indonesia Sample. 113 5.1.3 Taiwan Sample. 115 5.1.4 Comparing Indonesia and Taiwan Sample 118 5.1.5 General Discussions and the Role of Information Sensitivity. 120 5.2 Implications and Contributions. 126 5.2.1 Theoretical Implications. 126 5.2.2 Practical Implications. 129 5.3 Limitations and Future Research Suggestions. 132 5.4 Conclusion. 133 APPENDICES 149 Appendix 1: Correlation Table 149 Appendix 2: PLS CFA Cross Loading 152 Appendix 3: SmartPLS 3.0 Output 161 Appendix 4: Online Survey Screenshots 170

    Accenture. (2012). The 2012 accenture consumer electronics products and services usage report. USA: Accenture. Retrieved July 11, 2015 from http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_EHT_Research_2012_Consumer_Technology_Report.pdf.
    Adler, K. G. (2006). Web portals in primary care: An evaluation of patient readiness and willingness to pay for online services. Journal of Medical Internet Research, 8(4), 26.
    Ajzen, I., & Fishbein, M. (2005). The influence of attitudes on behavior. In D. Albarracín, B. Johnson & M. Zanna (Eds.), The handbook of attitudes (pp. 173-221). Mahwah, NJ: Lawrence Erlbaum.
    Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, crowding. Monterey: Brooks/Cole.
    Anderson, C. L., & Agarwal, R. (2011). The digization of healthcare: Boundary risk, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469-490.
    Annie Jin, S.-A. (2012). "To disclose or not to disclose, that is the question": A structural equation modelling approach to communication privacy management in e-health. Computers in Human Behavior, 28(1), 69-77.
    Archer, J., Boehme, A., Cullinane, D., Kurtz, P., Puhlmann, N., & Reavis, J. (2010). Top threats to cloud computing. Published Online: Cloud Security Alliance Research Report: H. Packard.
    Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled for personalization. MIS Quarterly, 30(1), 13-28.
    Bagozzi, R., Yi, Y., & Phillips, L. (1991). Assesing construct validity in organizational research. Administrative Science Quarterly, 36(3), 421-458.
    Bansal, G., Zahedi, F., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support System, 49(2), 138-150.
    Bansal, G., Zahedi, F. M., & Gefen, D. (2015). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information and Management, http://dx.doi.org/10.1016/j.im.2015.08.001.
    Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday 11(9), http://firstmonday.org/issues/issue11_19/barnes/index.html (June 16th, 2011).
    Bellman, S., Johnson, E. J., & Kobrin, S. J. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society: An International Journal, 20(5), 313-324.
    Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616.
    Cao, J., & Everard, A. (2007). Influence of culture on attitude towards instant messaging: Balance between awareness and privacy. In J. Jacko (Ed.), Human-computer interaction: Interaction platforms and techniques (Vol. 4551, pp. 236-240). Heidelberg: Springer Berlin.
    Cao, J., & Everard, A. (2008). User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy. Journal of Global Information Technology Management, 11(2), 27-45.
    Chen, H., & Chen, S. (2009). The empirical study of automotive telematics acceptance in Taiwan: Comparing three technology acceptance models. International Journal of Mobile Communications, 7(1), 50-65.
    Chen, J. V., & Pfleuger, P. (2008). RFID in retail: A framework for examining consumers' ethical perceptions. International Journal of Mobile Communications, 6(1), 53-66.
    Cheung, C. M. K., & Lee, M. K. O. (2001). Trust in internet shopping: Instrument development and validation through classical and modern approaches. Journal of Global Information Management, 9(3), 23-35.
    Chi, H., Yeh, H., & Hung, W. (2012). The moderating effect of subjective norm on cloud computing users perceived risk and usage intention. International Journal of Marketing Studies, 4(6), 95-102.
    Child, J., Haridakis, P. M., & Petronio, S. S. (2012). Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use. Computers in Human Behavior, 28(5), 1859-1872.
    Child, J. T., & Westermann, D. A. (2013). Let's be Facebook friends: Exploring parental Facebook friend requests from a communication privacy management (CPM) perspective. Journal of Family Communication, 13(00), 46-59.
    Chin, W. W. (1998a). Issues and opinions on structural equation modeling. MIS Quarterly, 22(1), 7-10.
    Chin, W. W. (1998b). The partial least squares approach to structural equation modelling. In G. A. Marcoulides (Ed.), Modern methods for business research. Mahwah, New Jersey, United States of America: Lawrence Erlbaum.
    Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modelin approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Reseach, 14(2), 189-217.
    Chiou, A. Y., Chen, J.-C., & Bisset, C. (2007). Cross cultural perceptions on privacy in the United States, Vietnam, Indonesia, and Taiwan. In K. Chen & A. Fadlalla (Eds.), Online consumer protection: Theories of human relativism. Hershey, PA: Idea Group.
    Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. News Media & Society, 11(3), 395-416.
    Chou, T.-S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science and Information Technology, 5(3), 79-88.
    Chu, C.-K., Zhu, W.-T., Han, J., Liu, J. K., Xu, J., & Zhou, J. (2013). Security concerns in popular cloud storage services. Pervasive Computing, 12(4), 50-57.
    Cockcroft, S., & Rekker, S. (2015). The relationship between culture and information privacy policy. Electronic Markets, DOI 10.1007/s12525-015-0195-9.
    Craig, C. S., Greene, W. H., & Douglas, S. P. (2005). Culture matters: Consumer acceptance of U.S. films in foreign markets. Journal of International Marketing, 13(4), 80-103.
    Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999). Beyond concern: Understanding net users attitudes about online privacy. AT&T Labs-Research Technical Report TR 99.4.3.
    Culnan, M. J., & Amstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
    Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342.
    D'Souza, & Phelps, J. E. (2009). The privacy paradox: The case of secondary disclosure. Review of Marketing Science, 7(4), 1-29.
    Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Pscyhology, 45, 285-297.
    Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users' privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57-93.
    Dinev, T., & Hart, P. (2003). Privacy concerns and Internet Use - A model of trade-off factors. Paper presented at the Academy of Management Meeting, Seattle, USA.
    Dinev, T., & Hart, P. (2004). Internet privacy concern and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.
    Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
    Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance - an empirical investigation. Journal of Strategic Information Systems, 17(3), 214-233.
    DLA Piper. (2013). Data protection laws of the world. USA: DLA Piper. Retrieved July 11, 2015 from https://files.dlapiper.com/files/Uploads/Documents/Data_Protection_Laws_of_the_World_2013.pdf.
    Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. Journal of Marketing, 61(2), 35-51.
    Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. The Academy of Management Review, 23(3), 601-620.
    Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877-886.
    Edelman, B. (2001). Adverse selection in online "trust" certifications and search results. Electronic Commerce Research and Applications, 10(1), 17-25.
    Efron, B., & Tibshirani, R. J. (1993). An introduction to the bootstrap. New York, United States of America: Chapman and Hall.
    Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451-474.
    Fishbein, M. (2008). A reasoned action approach to health promotion. Medical Decision Making, 28(6), 834-844.
    Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
    Fornell, C., & Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(3), 39-50.
    Forrester. (2012). Personal cloud services emerge to orchestrate our mobile computing lives. Cambridge, MA: Forrester Research, Inc: Forrester.
    Frampton, B. D., & Child, J. T. (2013). Friend or not to friend: Coworker facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior, 29(6), 2257-2264.
    Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing, 58(2), 1-19.
    Gangadharbatla, H., Li, H., & Edwards, S. M. (2003). Incentive options for effective web-based data collection: A conjoint analysis. Paper presented at the Conference of the American Academy of Advertising, Clemson, SC.
    Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database, 33(3), 38-53.
    Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90.
    Gerlach, J., Widjaja, T., & Buxmann, P. (2015). Handle with care: How online social network providers' privacy policies impact users' information sharing behavior. Journal of Strategic Information Systems, 24, 33-43.
    Gerrard, M., Gibbons, F. X., Brody, G. H., Mury, V. M., Cleveland, M. J., & Wills, T. A. (2006). A theory-based dual focus alcohol intervention for preadolescents: The strong african american families program. Psychology of Addictive Behaviors, 20(2), 185-195.
    Gibbons, F. X., & Gerrard, M. (1995). Predicting young adults' health risk behavior. Journal of Personality and Social Psychology, 69(3), 505-517.
    Gibbons, F. X., Gerrard, M., Blanton, H., & Russel, D. W. (1998). Reasoned action and social reaction: Willingness and intention as independent predictors of health risk. Journal of Personality and Social Psychology, 74(5), 1164-1180.
    Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. (1995). Multivariate Data Analysis (3rd ed.). New York: Macmillan.
    Hair, J. F., Black, W., Babin, B., & Anderson, R. (2010). Multivariate data analysis. Upper Saddle River, NJ: Prentice-Hall, Inc.
    Hair, J. F., Ringle, C. M., & Marko, S. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139-151.
    Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academic Marketing Science, 40(3), 414-433.
    Hann, I.-H., Hui, K. L., Lee, S. Y. T., & Png, I. P. L. (2008). Consumer privacy and marketing avoidance: A static model. Management Science, 54(6), 1094-1103.
    Harman, H. H. (1960). Modern factor analysis. Chicago, IL: University of Chicago Press.
    Hart, P., & Saunders, C. (1997). Power and trust: Critical factors in the adoption and use of electronic data interchange. Organization Science, 8(1), 23-42.
    Havlena, W. J., & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927-939.
    Heirman, W., Walrave, M., Ponnet, K., & Van Gool, E. (2013). Predicting adolescents' willingness to disclose personal information to a commercial websites: Testing the applicability of a trust-based model. Cyberpsychology: Journal of psychosocial research on cyberspace, 7(3), 0.
    Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least square modelling in international marketing. Advances in International Marketing, 20(0), 277-320.
    Hew, K. F. (2011). Students' teachers' use of facebook. Computers in Human Behavior, 27(2), 662-676.
    Hoeken, H., van-den-Brandt, C., Crijns, R., Dominguez, N., Hendriks, B., Planken, B., et al. (2003). International advertising in western europe: Should differences in uncertainty avoidance be considered when advertising in Belgium, France, the Netherlands, and Spain? Journal of Business Communication, 40(3), 195-218.
    Hofstede, G. (1980). Culture's consequences: International differences in work-related values. Beverly Hills, CA: Sage.
    Hofstede, G. (1984). Culture's consequences: International differences in work-related values. London: Sage.
    Hofstede, G. (1991). Culture and organizations: Software of the mind. London: McGraw-Hill.
    Hofstede, G. (2001). Culture's consequences: Comparing values, behaviors, instutions, and organizations accross nations. Thousand Oaks, CA: Sage.
    Hofstede, G. (2011). Dimensionalizing cultures: The hofstede model in context. Online Readings in Psychology and Culture, 2(1), http://dx.doi.org/10.9707/2307-0919.1014.
    Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275-298.
    Hsu, M.-H., Chuang, L.-W., & Hsu, C.-S. (2014). Understanding online shopping intention: The roles of four types of trust and their antecedents. Internet Research, 24(3), 332-352.
    Hui, K. L., Teo, H.-H., & Lee, S. Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19-33.
    Hwang, Y., & Lee, K. C. (2012). Investigating the moderating role of uncertainty avoidance cultural values on multidimensional online trust. Information and Management, 49, 171-176.
    Jarvenpaa, S., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an internet store: A cross‐cultural validation. Journal of Computer‐Mediated Communication, 5(2), 1-29.
    Jiang, Z. J., Heng, C. S., & Choi, B. C. F. (2013). Privacy concerns and privacy-protective in synchronous online social interactions. Information Systems Reseach, 24(3), 579-595.
    Joinson, A. N., Reips, U., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human Computer Interaction, 25(1), 1-24.
    Jones, M. G. (1991). Privacy: A significant marketing issue for the 1990s. Journal of Public Policy & Marketing, 10(1), 133-148.
    Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards and Interfaces, 36(4), 759-775.
    Keillor, B. D., Hult, G. T. M., Erffmeyer, R. C., & Babakus, E. (1996). NATID: The development and application of a national identity measure for use in international marketing. Journal of International Marketing, 4(2), 57-73.
    Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173.
    Kim, D. J. (2008). Self perception-based versus transference-based trust determinants in computer-mediated transaction: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45.
    King, N. J., & Raja, V. T. (2012). Protecting privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28(3), 308-319.
    Kokolakis, S. (2015). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, doi: 10.1016/j.cose.2015.07.002.
    Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and privacy calculus on social networking sites: The role of culture. Business and Information Systems Engineering, 4(3), 127-135.
    Lee, H., Park, H., & Kim, J. (2013). Why do people share their context information on social network services? A qualitative study and an experimental study on users' behavior of balancing perceived benefit and risk. International Journal of Human-Computer Studies, 71(9), 862-877.
    Leidner, D., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. Management Information Systems Quarterly, 30(2), 357-399.
    Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1), 79-100.
    Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
    Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57(00), 343-354.
    Lim, K. H., Leung, K., Sia, C. I., & Lee, M. K. O. (2004). Is e-commerce boundary-less? Effects of individualism-collectivism and uncertainty avoidance on internet shopping. Journal of International Business Studies, 35(6), 545-559.
    Limayen, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.
    Lin, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.
    Liu, C., Marchewka, J. T., Lu, J., & Yu, C.-S. (2005). Beyond concern - a privacy-trust-behavioral intention model of electronic commerce. Information and Management, 42(2), 289-304.
    Loureiro, S. M. C. (2013). The effect of perceived benefits, trust, quality, brand awareness/associations and brand loyalty on Internet banking brand equity. International Journal of Electronic Commerce Studies, 4(2), 139-158.
    Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
    Lowry, P. B., & Gaskin, J. (2014). Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57(2), 123-146.
    Lutz, C., & Strathoff, P. (2014). Privacy concerns and online behavior not so paradoxical after all? Viewing the privacy paradox through different theoretical lens. SSRN Electronic Journal, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2425132.
    Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: A power responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.
    Malhotra, N. K., & Dash, S. (2011). Marketing research: An applied orientation. New Delhi: Pearson Inc.
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). 'Internet users' information privacy concerns (IUIPC): The construct, the scale and causal model. Information Systems Research, 15(4), 336-355.
    Margulis, S. T. (2011). Three theories of privacy: An overview. In S. Trepte & L. Reinecke (Eds.), Privacy online: Perspectives on privacy and self-disclosure in the social web (pp. 9-17). Berlin: Springer-Verlag.
    Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.
    McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
    Menard, P., Gatlin, R., & Warkentin, M. (2014). Threat protection and convenience: Antecedents of cloud-based data backup. Journal of Computer Information Systems, 55(1), 83-91.
    Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer‐Mediated Communication, 9(4), 00-00.
    Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361.
    Millberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communication of ACM, 38(12), 65-74.
    Milne, G. R., & Boza, M.-E. (1999). Trust and concern in consumers' perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5-24.
    Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing, 18(3), 15-29.
    Milne, G. R., Rohm, A. J., & Boza, M.-E. (1998). Trust has to be earned: An exploration in the antecedents of trust in database marketing. In J. Phelps (Ed.), Frontiers in direct marketing research vol. 1 (pp. 31-41). New York: John Wiley and Sons, Inc.
    Miltgen, C. L. (2009). Online consumer privacy concerns and willingness to provide personal data on the Internet. International Journal of Networking and Virtual Organizations, 6(6), 574-603.
    Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375.
    Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from consumers. Journal of Consumer Research, 26, 323-339.
    Morosan, C., & DeFranco, A. (2015). Disclosing personal information via hotel apps: A privacy calculus perspective. International Journal of Hospitality Management, 47, 120-130.
    Mothersbaugh, D. L., Foxx, W. K., Beatty, S. E., & Wang, S. (2012). Disclosure antecedents in an online service context: The role of sensitivity of information. Journal of Service Research, 15(1), 76-98.
    Navakata, C., & Siyakumar, K. (2001). Instituting the markeing concept in a multinational setting: The role of national culture. Journal of the Academy of Marketing Science, 29(3), 255-275.
    Nepomuceno, M. V., Laroche, M., & Richard, M.-O. (2014). How to reduce perceived risk when buying online: The interactions between intangibility, product knowledge, brand familiarity, privacy and security concerns. Journal of Retailing and Consumer Services, 21(4), 619-629.
    Ng, C. S.-P. (2013). Intention to purchase on social commerce websites accross cultures: A cross-regional study. Information and Management, 50, 609-620.
    Nowak, G. J., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when 'privacy' matters. Journal of Direct Marketing, 11(4), 94-108.
    Nunally, J. C. (1978). Psychometric Theory. New York, United States of America: McGraw-Hill.
    O'Connor, E. L., & White, K. M. (2009). Intentions and willingness to use complementary and alternative medicines: What potential patients believe about CAMs. Complementary Therapies in Clinical Practice, 15, 136-140.
    Otjaques, B., Hitzelberger, P., & Feltz, F. (2007). Interoperability of e-government information systems: Issues of identification and data sharing. Journal of Management Information Systems, 23(4), 29-51.
    Owens, D. (2010). Securing elasticity in the cloud. Communication of ACM, 53(6), 46-51.
    Park, Y. J. (2008). Privacy regime, culture and user practices in the cybermarketplace. Info, 10(2), 57-74.
    Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1), 6-14.
    Petronio, S., & Durham, W. T. (2008). Communication privacy management theory: Significance for interpersonal communication. In L. A. Baxter & D. O. Braithwaite (Eds.), Engaging theories in interpersonal communication multiple perspectives (pp. 309-322). Thousand Oaks, CA: SAGE Publications, Inc.
    Petronio, S., & Gaff, C. (2010). Managing privacy ownership and disclosure. In C. Gaff & C. Bylund (Eds.), Family communication about genetics: Theory and practices. London, England: Oxford Press.
    Petronio, S. S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany, NY: State University of New York Press.
    Phelps, J., Nowak, G., & Ferrel, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.
    Podsakoff, P. M., Mackenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 839-903.
    Pomery, E. A., Gibbons, F. X., Reis-Bergan, M., & Gerrard, M. (2009). From willingness to intention: Experience moderates the shift from reactive to reasoned behavior. Personality Sociology Psychology Bulletin, 35(7), 894-908.
    Raghu, T. S., Sinha, R., Vinze, A., & Burton, O. (2009). Willingness to pay in an open source software environment. Information Systems Research, 20(2), 218-236.
    Ray, S., Ow, T., & Kim, S. S. (2012). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-411.
    Raykov, T. (2001). On the use and utility of the reliability coefficient in social and behavioral research. Quality and Quantity, 35(3), 253-263.
    Reese, G. (2009). Cloud application of architectures: Building applications and infrastructure in the cloud. Sebastopol, CA: O'Reilly Media.
    Rindfleish, T. C. (1997). Privacy, information technology, and health care. Communications of the ACM, 40(8), 92-100.
    Rohm, A. J., & Milne, G. R. (2004). Just what the doctor ordered: The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57, 1000-1011.
    Rose, E. A. (2006). An examination of the concern for information privacy in the New Zealand regulatory context Information and Management, 43(3), 322-335.
    Ryan, M. D. (2011). Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54(1), 36-38.
    SafeMonk. (2013). Cloud app usage vs data privacy survey: Despite privacy concerns over data security, cloud-based apps use prevalent. USA: SafeNet, Inc. Retrieved July 11, 2015 from http://www2.safenet-inc.com/survey/SafeMonk-Survey-Results-v6.pdf.
    Sarstedt, M., Henseler, J., & Ringle, C. M. (2011). Multi-group analysis in partial least squares (PLS) path modelling: Alternative methods and empirical results. Advances in International Marketing, 22(1), 195-218.
    Schwaig, K. S., Segards, A. H., Grover, V., & Fiedler. (2013). A model of consumers' perceptions of the invasion of information privacy. Information and Management, 50(1), 1-12.
    Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-63.
    Shin, D.-H. (2010). Ubiquitous computing acceptance model: End user concern about security, privacy and risk. International Journal of Mobile Communications, 8(2), 169-186.
    Slyke, C. V., Shim, J. T., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444.
    Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisplinary review. MIS Quarterly, 35(4), 989-1015.
    Stone, E. F., Gardner, D. G., Guetal, H. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459-468.
    Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanism. Research in Personnel and Human Resources Management, 8(3), 349-411.
    Stutzman, F., Vitak, J., Ellison, N. B., Gray, R., & Lampe, C. (2012). Privacy in interactions: Exploring disclosure and social capital in Facebook. Paper presented at the 8th International AAAI Conference on Weblogs and Social Media, Palo Alto, CA.
    Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.
    Suh, B., & Han, I. (2003). The impact of costumer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce, 7(3), 135-161.
    Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109-116.
    Sultan, N. A. (2011). Reaching for the "cloud": How SMEs can manage. International Journal of Information Management, 31(3), 272-278.
    Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing. Computer Law & Security Review, 26(4), 391-397.
    Taddei, S., & Contena, B. (2013). Privacy, trust, and control: Which relationships with online self-disclosure. Computers in Human Behavior, 29(3), 821-826.
    TechSoup Global Network. (2012). 2012 global cloud computing survey results. USA: TechSoup Global Network. Retrieved from http://www.techsoupglobal.org/sites/default/files/TechSoup_Global_Cloud_Report_Executive_Summary.pdf.
    Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20-36.
    Twak, K. T., Choi, K. S., & Lee, B. G. (2014). SNS flow, SNS self-disclosure and post hoc interpersonal relations change: Focused on korean facebook user. Computers in Human Behavior, 31(2014), 294-305.
    Urban, G., Sultan, F., & WJ, Q. (2000). Placing trust at the center of your internet strategy. Sloan Management Review, 42(00), 39-48.
    Vaquero, L., Rodero-Merino, L., & Moran, D. (2011). Locking the sky: A survey on IaaS cloud security. Computing, 91(1), 93-118.
    Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy: A consumer survey. Journal of Direct Marketing, 7(1), 7-19.
    Wang, S.-C., & Wu, J.-H. (2014). Proactive privacy practices in transition: Toward ubiquitous services. Information and Management, 51(1), 93-103.
    Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of online privacy concerns and willingness to provide personal and financial information Journal of Marketing Communications, 11(1), 21-40.
    Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101-115.
    Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., & Chen, Y. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258(2014), 371-386.
    Weible, R. J. (1993). Privacy and data: An empirical study of the influence and types and data and situational context upon privacy perceptions in department of business administration: Mississippi State University.
    Wilson, B. (2010). Using PLS to investigate interaction effects between higher order branding constructs. In V. Esposito Vinzi, W. W. Chin, J. Henseler & H. Wang (Eds.), Handbook of partial least squares, concepts, methods, and applications. Berlin, Heidelberg: Springer Handbooks.
    Worthington, D. L., & Fitch-Hauser, M. (2015). Communication privacy management and mobile phone use In Z. Yan (Ed.), Encyclopedia of mobile phone behavior. Hershey, PA: IGI Global.
    Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897.
    Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: An integrated model. Electronic Commerce Research, 13(2), 151-168.
    Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances Journal of the Association for Information Systems, 12(12), 798-824.
    Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-173.
    Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location based service. Journal of Management Information Systems, 26(3), 135-174.
    Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location -based services. Information Systems Research, 23(4), 1342-1363.
    Yang, H.-L., & Lin, S.-L. (2015). User continuance intention to use cloud storage service. Computers in Human Behavior, 52(2015), 219-232.
    Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. The DATA BASE for Advances in Information Systems, 40(1), 38-51.
    Yoon, C. (2009). The effects of national culture values on consumer acceptance of e-commerce: Online shoppers in China. Information and Management, 46, 294-301.
    Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-89.
    Zissis, D., & Lekkas, D. (2010). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.

    無法下載圖示 校內:2026-12-31公開
    校外:2026-12-31公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE