簡易檢索 / 詳目顯示

研究生: 余愛佩
Idden, Jesslyn Edina
論文名稱: Understanding of Willingness to Disclosure and Intention to Register of Sharing Economy through Airbnb
Understanding of Willingness to Disclosure and Intention to Register of Sharing Economy through Airbnb
指導教授: 陳正忠
Chen, Jeng-Chung
學位類別: 碩士
Master
系所名稱: 管理學院 - 國際經營管理研究所
Institute of International Management
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 82
外文關鍵詞: Sharing economy, Airbnb, Information Sensitivity, Information Relevance, Information Type Collections, Information Security Awareness, Privacy Concern, Willingness to Disclose, Perceive Ease to Register, Intention to Register
相關次數: 點閱:176下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • As we know internet platform is daily use for everyone. Social media has rising and now the updating one is Sharing Economy. Sharing economy is using Information Technology (IT) to present individuals with information that provide resources optimization with mutualization of excess resources in services and goods. The purpose of this research focused on privacy concern that will impact user willingness to disclose and their personal information and intention to register at Airbnb as one of the sharing economy platform through ‘information sensitive’, ‘information relevance’ as informational cues and ‘information types collection’ as IT artifact. This research was distributed online. Furthermore, the experimental research of this study is using factorial design with three studies. First study and second study are using 2x2, the third one using 2x3 factorial design.
    The findings show that information sensitive, information relevance, information types collection has influence to privacy concern has influence intention to register but not in willingness to disclose in this study.

    TABLE OF CONTENTS ABSTRACT I ACKNOWLEDGEMENTS II TABLE OF CONTENTS IV LIST OF TABLES IX LIST OF FIGURES XIV CHAPTER ONE INTRODUCTION 1 1.1 Research Background. 1 1.2 Research Motivation. 6 1.3 Research Gap & Objectives. 8 1.4 Research Procedure. 10 1.5 Research Structure. 12 CHAPTER TWO LITERATURE REVIEW 13 2.1 Theory of Communication Privacy Management. 13 2.2 Technology Acceptance Model (TAM). 15 2.3 Information Sensitivity. 18 2.4 Information Relevance. 19 2.5 Information Types Collection. 20 2.6 Information Security Awareness. 21 2.7 Privacy Concern to Willingness to Disclosure. 22 2.8 Willingness to Disclose. 23 2.9 Perceive Ease to Register to Intention to Register. 25 CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 27 3.1 Conceptual Framework. 27 3.2 Definitions and Measurement of Variables. 29 3.2.1 Variables and Definition. 29 3.3 Manipulation Check. 29 3.3.1 Manipulation Check for Information Sensitivity. 30 3.3.2 Manipulation Check for Information Relevant. 30 3.4 Stimuli Development and Procedures. 30 3.5 Measurement of Independent Variables. 31 3.5.1 Information Security Awareness. 31 3.6 Measurement of Dependent Variables. 32 3.6.1 Privacy Concern. 32 3.6.2 Willingness to Disclose. 32 3.7 Control Variable. 34 3.7.1 Demographic control variable. 34 3.8 Sampling Plan. 34 3.9 Data Analysis Procedure. 34 3.9.1 Descriptive Statistical Analysis. 34 3.9.2 Factor Analysis. 35 3.9.3 Analysis of Variance (ANOVA).
 35 3.9.4 Two-Way ANOVA. 35 3.9.5 Regression Analysis. 35 CHAPTER FOUR RESEARCH RESULTS 37 4.1 Data Collection. 37 4.2 Characteristic of Respondents Study 1. 37 4.3 Descriptive Statistics study 1. 39 4.4 Factor Analysis and Reliability Test Study 1. 41 4.5 Manipulation Check Study1. 45 4.5.1 Manipulation Check Sensitive. 45 4.5.2 Manipulation Check Require. 45 4.6 Analysis of Variance (ANOVA) among Research Variable. 46 4.6.1 Information Sensitive toward Privacy Concern. 46 4.6.2 Information Sensitive toward Perceive Ease to Register. 47 4.6.3 Require toward Privacy Concern. 47 4.6.4 Information Require toward Perceive Ease to Register. 48 4.7 Regression Analysis Study 1. 49 4.7.1 Regression Analysis Information Security Awareness to Privacy Concern. 49 4.7.2 Regression Analysis Privacy Concern toward Willingness to Disclose. 49 4.7.3 Regression Analysis Privacy Concern toward Intention to Register. 50 4.7.4 Regression Analysis Willingness to Disclose to Register to Intention to Register. 51 4.7.5 Regression Analysis Perceive Ease to Register to Intention to Register. 52 4.7.6 Regression Analysis Perceive Ease to Register to Willingness to Disclose. 53 4.8 Empirical Study 2. 54 4.8.1 Regression Analysis Information Security Awareness to Privacy Concern. 54 4.9 Descriptive Statistics study 2. 55 4.10 Factor Analysis and Reliability Test Study 2. 58 4.11 Manipulation Check Study 2. 62 4.11.1 Manipulation Check Sensitive. 62 4.11.2 Manipulation Check Relevant. 62 4.12 Analysis of Variance (ANOVA) among Research Variable Study 2. 63 4.12.1 Information Sensitive toward Privacy Concern. 63 4.12.2 Information Sensitive toward Perceive Ease to Register. 64 4.12.3 Information Relevant toward Privacy Concern. 64 4.12.4 Information Relevant toward Perceive Ease to Register 65 4.13 Two Way ANOVA. 65 4.14 Regression Analysis for Study 2. 68 4.15 Empirical Study 3. 73 4.16 Descriptive Statistics study 3. 75 4.17 Factor Analysis and Reliability Test Study 3. 77 4.18 Manipulation Check Study 3. 81 4.18.1 Manipulation Check for Sensitivity in Information Types Collection (Video). 81 4.18.2 Manipulation Check Sensitivity in Information Types Collection (Pictures) 81 4.18.3 Manipulation Check Sensitivity in Information Types Collection (Text) 82 4.19 Analysis of Variance (ANOVA) among Research Variable Study 3. 82 4.19.1 Information Sensitive toward Privacy Concern. 83 4.19.2 Information Sensitive toward Perceive Ease to Register in Study 3. 83 4.19.3 Information Types Collection toward Privacy Concern in Study 3. 84 4.19.4 Information Types Collection toward Perceive Ease to Register in Study 3. 85 4.20 Regression Analysis. 85 4.20.1 Regression Analysis Information Security Awareness to Privacy Concern. 85 4.20.2 Regression Analysis Privacy Concern to Willingness to Disclose. 86 4.20.3 Regression Analysis Privacy Concern to Intention to Register. 87 4.20.4 Regression Analysis Willingness to Disclose to Intention to Register. 88 4.20.5 Regression Analysis Perceive Ease to Register to Intention to Register. 89 4.20.6 Regression Analysis Perceive Ease to Register to Willingness to Disclose. 89 CHAPTER FIVE CONCLUSION AND SUGGESTIONS 91 5.1 Research Discussion and Conclusion. 91 5.1.1 Study 1. 94 5.1.2 Study 2. 94 5.1.3 Study 3. 95 5.2 Research Theoretical and Managerial Implications. 95 5.2.1 Theoretical Implications. 95 5.2.2 Managerial Implications. 97 5.3 Research Limitations and Suggestion for Future Studies. 99 REFERENCE 101 APPENDICES 108

    REFERENCE
    Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26-33.
    Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS quarterly, 16(2), 227-247.
    Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. NJ, Englewood Cliffs: Prentice-Hall.
    Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2009). The antecedents of customer self-disclosure to online virtual advisors. Paper presented at the International Conference on Information Systems (ICIS).
    Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Cole, Monterey, CA: Brooks.
    Archer, J. (1980). The self in social psychology. Self-disclosure, Oxford University, London, 183-204.
    Bagozzi, R. P., Davis, F. D., & Warshaw, P. R. (1992). Development and test of a theory of technological learning and usage. Human Relations, 45(7), 659-686.
    Bagozzi, R. P., & Dholakia, U. M. (2002). Intentional social action in virtual communities. Journal of Interactive Marketing, 16(2), 2-21.
    Bal, G., Rannenberg, K., & Hong, J. I. (2015). Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns. Computers & Security, 53, 187-202.
    Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
    Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1-21.
    Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS quarterly, 35(4), 1017-1042.
    Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior, 53(0), 419-426.
    Botsman, R., & Rogers, R. (2011). What's mine is yours: How collaborative consumption is changing the way we live: Collins London.
    Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). Effects of individual and organization based belief and moderating role of work experiences on nsiders' good security behavior. Paper presented at the IEEE International Conference on Computational Science and Engineering.
    Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
    Chang, M. K., & Cheung, W. (2001). Determinants of the intention to use Internet/WWW at work: A confirmatory study. Journal Information and Management, 39(1), 1-14.
    Chau, P. Y. K. (1996). An empirical assessment of a modified technology acceptance model. Journal of Management Information Systems, 13(2), 185-204.
    Chen, H., & Chen, S. (2009). The empirical study of automotive telematics acceptance in Taiwan: Comparing three technology acceptance models. International Journal of Mobile Communications, 7(1), 50-65.
    Chen, R. (2013). Living a private life in public social networks: An exploration of member self-disclosure. Decision Support Systems, 55(3), 661-668.
    Child, J. T., Haridakis, P. M., & Petronio, S. (2012). Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use. Computers in Human Behavior, 28(5), 1859-1872.
    Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60(10), 2079-2094.
    Child, J. T., & Starcher, S. C. (2016). Fuzzy Facebook privacy boundaries: Exploring mediated lurking, vague-booking, and Facebook privacy management. Computers in Human Behavior, 54, 483-490.
    Choi, B. C., Lee, N. T., & Land, L. P. W. (2015). The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage. Paper presented at the Pacific Asia Conference on Information Systems.
    Cohen, B., & Kietzmann, J. (2014). Ride on! Mobility business models for the sharing economy. Organization & Environment, 27(3), 279-296.
    D'Souza, G., & Phelps, J. E. (2009). The privacy paradox: The case of secondary disclosure. Review of Marketing Science, 7(1), -. doi: 10.2202/1546-5616.1072
    Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 13(3), 319-340.
    Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003.
    Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: Comparison of two theoretical models. Management Science, 35(8), 982-1003.
    De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444-454.
    Development, O. f. E. C.-o. a. (2002). OECD guidelines on the protection of privacy and transborder flows of personal data: OECD Publishing.
    Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users' privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management (JGIM), 14(4), 57-93.
    Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
    Dineva, T., & Harta, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7-29.
    Eastin, M. S., Brinson, N. H., Doorey, A., & Wilcox, G. (2016). Living in a big data world: Predicting mobile commerce activity through privacy concerns. Computers in Human Behavior, 58(0), 214-220.
    Eikey, E. V., Murphy, A. R., Reddy, M. C., & Xu, H. (2015). Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff’s understandings. International journal of medical informatics, 84(12), 1065-1075.
    Ert, E., Fleischer, A., & Magen, N. (2015). Trust and reputation in the sharing economy: The role of personal photos on Airbnb. Tourism Management, 55(0), 62-73.
    Fishbein, M. (2008). A reasoned action approach to health promotion. Medical Decision Making, 28(6), 834-844.
    Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
    Forrester. (2012). Personal cloud services emerge to orchestrate our mobile computing lives [Press release]. Retrieved from https://www.sugarsync.com/media/sugarsync-forrester-report.pdf
    Frampton, B. D., & Child, J. T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior, 29(6), 2257-2264.
    Freed, N., & Borenstein, N. (1996). Multipurpose internet mail extensions (MIME) part two: Media types: RFC editor.
    Gefen, D., & Straub, D. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS quarterly, 21(4), 389-400.
    Gerrard, M., Gibbons, F. X., Brody, G. H., Mury, V. M., Cleveland, M. J., & Wills, T. A. (2006). A theory-based dual focus alcohol intervention for preadolescents: The strong african american families program. Psychology of Addictive Behaviors, 20(2), 185-195.
    Gibbons, F. X., & Gerrard, M. (1995). Predicting young adults' health risk behavior. Journal of Personality and Social Psychology, 69(3), 505-517.
    Gibbons, F. X., Gerrard, M., Blanton, H., & Russel, D. W. (1998). Reasoned action and social reaction: Willingness and intention as independent predictors of health risk. Journal of Personality and Social Psychology, 74(5), 1164-1180.
    Guriting, P., & Ndubisi, N. O. (2006). Borneo online banking: Evaluating customer perceptions and behavioural intention. Management Research News, 29(1/2), 6-15.
    Hackbartha, G., Groverb, V., & Yi, M. Y. (2003). Computer playfulness and anxiety: Positive and negative mediators of the system experience effect on perceived ease of use. Information & Management, 40(3), 221-232.
    Hair, J., Black, W., Babin, B., & Anderson, R. (2010). Multivariate Data Analysis Seventh Edition Prentice Hall.
    Hendrickson, A. R., & Collins, M. R. (1996). An assessment of structure and causation of IS usage. ACM SIGMIS Database, 27(2), 61-67.
    Hong, W., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2011). User acceptance of agile information systems: A model and empirical test. Journal of Management Information Systems, 28(0), 235-272.
    Igbaria, M., Guimaraes, T., & Davis, G. B. (1995). Testing the determinants of microcomputer usage via a Structural Equation Model. Journal of Management Information Systems, 11(4), 87-114.
    Jin, S.-A. A. (2012). “To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health. Computers in Human Behavior, 28(1), 69-77.
    Jones, M. G. (1991). Privacy: A significant marketing issue for the 1990s. Journal of Public Policy & Marketing, 10(1), 133-148.
    Kang, H., Shin, W., & Tam, L. (2016). Differential responses of loyal versus habitual consumers towards mobile site personalization on privacy management. Computers in Human Behavior, 56, 281-288.
    Karahanna, E., & Straub, D. W. (1999). The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35(4), 237-250.
    Khalifa, M., & Shen, K. N. (2008). Drivers for transactional B2C m-commerce adoption: Extended theory of planned behavior. Journal of Computer Information Systems, 48(3), 111-117.
    Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). " It won't happen to me!": Self-disclosure in online social networks. Paper presented at the Americas Conference on Information System 2009 Proceedings.
    Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). "It won't happen to me!": Self-disclosure in online social networks. Paper presented at the Americas Conference on Information System 2009 Proceedings.
    Landry, B. J. L., Griffeth, R., & Hartman, S. (2006). Measuring student perceptions of blackboard using the technology acceptance model. Decision Sciences Journal of Innovative Education, 4(1), 87-99.
    Lederer, A. L., Maupin, D. J., Sena, M. P., & Zhuang, Y. (2000). The technology acceptance model and the World Wide Web. Decision Support Systems, 29(3), 269-282.
    Lee, K., Yeuk, H., Kim, J., Park, H., & Yim, K. (2016). An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers. Computer Standards & Interfaces, 44, 137-143.
    Lia, H., Sarathyb, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445.
    Loiacono, E. T. (2015). Self-disclosure behavior on social networking web sites. International Journal of Electronic Commerce, 19(2), 66-94.
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model Information Systems Research, 15(4), 336-355.
    Martin, C. J. (2016). The sharing economy: A pathway to sustainability or a nightmarish form of neoliberal capitalism? Ecological Economics, 121(0), 149-159.
    Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer‐Mediated Communication, 12(2), 335-361.
    Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Web context. Information & Management, 38(1), 217-230.
    Mothersbaugh, D. L., Foxx, W. K., Beatty, S. E., & Wang, S. (2011). Disclosure antecedents in an online service context: the role of sensitivity of information. Journal of Service Research, 1094670511424924.
    Mullen, C., & Hamilton, N. F. (2016). Adolescents' response to parental Facebook friend requests: The comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Computers in Human Behavior, 60, 165-172.
    Ndubisi, N. O., Gupta, O. K., & Massoud, S. (2003). Organizational learning and vendor support quality by the usage of application software packages: A study of Asian entrepreneurs. Journal of Systems Science and Systems Engineering, 12(3), 314-331.
    Nowak, G. J., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Interactive Marketing, 11(4), 94-108.
    O'Connor, E. L., & White, K. M. (2009). Intentions and willingness to use complementary and alternative medicines: What potential patients believe about CAMs. Complementary Therapies in Clinical Practice, 15(0), 136-140.
    Petronio, S. (2012). Boundaries of privacy: Dialectics of disclosure: Suny Press.
    Petronio, S., & Durham, W. T. (2008). Communication privacy management theory: Significance for interpersonal communication. In D. O. B. Leslie A. Baxter (Ed.), Engaging Theories in Interpersonal Communication: Multiple Perspectives (pp. 309-322): Sage Publications.
    Pizam, A. (2014). Peer-to-peer travel: Blessing or blight? International journal of hospitality management, 38(0), 118-119.
    Pomery, E. A., Gibbons, F. X., Reis-Bergan, M., & Gerrard, M. (2009). From willingness to intention: Experience moderates the shift from reactive to reasoned behavior. Personality Sociology Psychology Bulletin, 35(7), 894-908.
    Premazzi, K., Castaldo, S., Grosso, M., Raman, P., Brudvig, S., & Hofacker, C. F. (2010). Customer information sharing with e-vendors: The roles of incentives and trust. International Journal of Electronic Commerce, 14(3), 63–91.
    Putrevu, S., & Swimberghek, K. (2013). The influence of religiosity on consumer ethical judgments and responses toward sexual appeals. Journal of Business Ethics, 115(2), 351-365.
    Radner, R., & Rothschild, M. (1975). On the allocation of effort. Journal of Economic Theory, 10(0), 358-376.
    Schwaig, K. S., Segars, A. H., Grover, V., & Fiedler, K. D. (2013). A model of consumers’ perceptions of the invasion of information privacy. Information & Management, 50(1), 1-12.
    Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73.
    Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS quarterly, 20(2), 167–196.
    Straub, D. W. (1994). The Effect of Culture on IT Diffusion: E-Mail and FAX in Japan and the U.S. Information Systems Research, 5(1), 23-47.
    Szajna, B. (1996). Empirical evaluation of the revised Technology Acceptance Model. Management Science, 42(1), 85-92.
    Tarhini, A., Hone, K., & Liu, X. (2013). Extending the TAM model to empirically investigate the students’ behavioural intention to use e-learning in developing Countries. Paper presented at the Science and Information Conference 2013, London, UK.
    Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS quarterly, 19(4), 561-570.
    Teo, T. S. H., Lim, V. K. G., & Lai, R. Y. C. (1999). Intrinsic and extrinsic motivation in internet usage. Omega, 27(1), 25-37.
    Tussyadiah, I. P. (2015). An exploratory study on drivers and deterrents of collaborative consumption in travel Information and Communication Technologies in Tourism 2015 (pp. 817-830): Springer.
    Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365.
    Venkatesh, V., & Davis, F. D. (1996). A model of the antecedents of perceived ease of use: development and test. Decision Sciences, 27(3), 451-481.
    Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46(2), 186-204.
    Wang, N., Xu, H., & Grossklags, J. (2011). Third-party apps on facebook: Privacy and the illusion of control. Paper presented at the Proceedings of the 5th ACM symposium on computer human interaction for management of information technology.
    Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy. A consumer survey. Journal of Direct Marketing, 7(1), 7-19.
    Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of on‐line privacy concerns and willingness to provide personal and financial Information. Journal of Marketing Communications, 11(1), 21-40.
    Worthington, D., & Fitch-Hauser, M. (2015). Listening: Processes, functions and competency. New York: Routledge.
    Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897.
    Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798.
    Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-173.
    Xu, Y. (2007). Relevance judgment in epistemic and hedonic information searches. Journal of the American Society for Information Science and Technology, 58(2), 179-189.
    Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. ACM SIGMIS Database, 40(1), 38-51.
    Zervas, G., Proserpio, D., & Byers, J. (2015). The rise of the sharing economy: Estimating the impact of Airbnb on the hotel industry: Boston U. School of Management Research Paper No.
    Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-89.
    Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255-276.
    Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123.
    Zlatolas, L. N., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45(0), 158-167.
    Zohar, D., & Tenne-Gazit, O. (2008). Transformational leadership and group interaction as climate antecedents: A social network analysis. Journal of Applied Psychology, 93(4), 744.

    下載圖示
    2021-07-22公開
    QR CODE