References
- Ajzen (1991), "The theory of planned behavior," Organizational Behavior and Human Decision Processes, 50, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Aiken, K. D. and Boush D. M. (2006), "Trustmarks, objective-source ratings, and implied investments in advertising: investigating online trust and the contextspecific nature of Internet signals," Journal of the academy of marketing science, 34(3), pp. 308-323. https://doi.org/10.1177/0092070304271004
- Ashworth, L. and Free C. (2006), "Marketing dataveillance and digital privacy: Using theories of justice to understand to consumers' online privacy concerns," Journal of business ethics, 67, pp. 107-123. https://doi.org/10.1007/s10551-006-9007-7
- Babin, B. J., Darden W. R. and Griffin M. (1994), "Work and/or fun: Measuring hedonic and utilitarian shopping value," Journal of consumer research, 20, March, pp. 644-656. https://doi.org/10.1086/209376
- Bilton, N. (2012a), Disruptions: And the privacy gaps just keep on coming, NYTIMES, February 19.
- Bilton, N. (2012 b), F.T.C. Finds Privacy Problems with Apps for Children, NYTIMES, February 16.
- Bloch, P. H. and Richins M. L. (1983), "Shopping without purchase: An investigation of consumer browsing behavior," Advances in consumer research, 10, pp. 389-393.
- Buchanan, T., Paine C, Joinson A. N. and Reips U. (2007), "Development of measure of online privacy concern and protection for user on the internet," Journal of the American society for information science and technology, 58(2), pp. 157-165. https://doi.org/10.1002/asi.20459
- DeCew, J. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press
- Deci, E. L., Betley G., Kahle J., Abraham L. Porac J. (1981), "When trying to win: Competition and intrinsic motivation," Personality and Social psychology bulletin, 7(March), pp. 79-83. https://doi.org/10.1177/014616728171012
- Emarketer (2008), College students' social networking, September 22, available at http://www. emarketer. com
- Fisher, R. J. and Price L. L. (1992), "An investigation into social context of early adoption behavior," Journal of Consumer Research, 19(3), pp. 477-486. https://doi.org/10.1086/209317
- Fogel, J. and NehmadE. (2009), "Internet Social Network Communities: Risk Taking, Trust and Privacy Concerns," Computers in Human Behavior, 25, pp.153-160. https://doi.org/10.1016/j.chb.2008.08.006
- FPF (2010), "Future of Privacy Forum Releases Behavioral Notices Study," available at http://www. futureofprivacy.org /2010/01/27/(accessed January 29, 2010).
- FTC (2012), "Mobile apps for kids: Current privacy disclosure are disappointing," Staff Report, Http://www. ftc.goc/os/2012/02/120216mobile_apps_kids.pdf.
- Gefen, D., Karahana E., and Straub D. W. (2003), "Trust and TAM in online shopping: An integrated model," MIS quarterly, 27(1), pp. 51-90. https://doi.org/10.2307/30036519
- Hirshman, E. C. (1980), "Innovativeness, Novelty seeking and consumer creativity," Journal of consumer research, 7, December, pp. 283-295. https://doi.org/10.1086/208816
- Hoy, M. and Milne G. (2010), "Gender differences in privacy-related measure for young adult Facebook users," Journal of interactive advertising, 10(2), pp. 28-45. https://doi.org/10.1080/15252019.2010.10722168
- Hung C., Chou J. C. and Dong T. (2011), "Innovation and communication through innovative users: An exploratory mechanism of social networking website," International journal of information management, 31, pp. 317-326. https://doi.org/10.1016/j.ijinfomgt.2010.12.003
- Javelin strategy and Research (2009), "Latest Jave line research shows identity fraud increased 22 percent," May, 1, available at http://javelinestrategy.com
- John L. K., Acquisti A. and Lowenstein G. (2011), "Strangers on a plane: Context-dependent willingness to divulge sensitive information," Journal of consumer research, 37, February, pp. 858-873. https://doi.org/10.1086/656423
- Manning, M. (2009), "The effects of subjective norms on behavior in the theory of planned behavior: A metaanalysis," British journal of social psychology, 48, pp. 649-705. https://doi.org/10.1348/014466608X393136
- Midgley, D. F. and Dowling G. R. (1978), "Innovativeness: The concept and its measurement," Journal of consumer research, 4, March, pp. 229-242. https://doi.org/10.1086/208701
- Milne, G. R. and Culnan M. J. (2004), "Strategy for reducing online privacy risks: Why consumers read (or don't read) online privacy notices," Journal of interactive marketing, 18(3), pp. 15-29. https://doi.org/10.1002/dir.20009
- Miyazaki, D. and Krishnamurthy S (2002), Internet seals of approval: Effects on online privacies and consumer perceptions," Journal of consumer affairs, 36, summer, pp.28-49. https://doi.org/10.1111/j.1745-6606.2002.tb00419.x
- Nonaka, I. (1994), "A dynamic theory of organizational knowledge creation," Organization Science, 5(1), pp. 14-37. https://doi.org/10.1287/orsc.5.1.14
- Okazaki S., Li H. and Hirose M. (2009), "Consumer privacy concerns and reference for degree of regulation control," Journal of advertising, 38(4), pp.63-77.
- OECD (2003), Privacy online: OECD guidance on policy and practice, at http://www.1.oecd.org/publications/ebook/ 9303051E.pdf
- Pagani, M. and Hofacker C. F. and Goldsmith R. E. (2011), "The influence of personality on active and passive user of social networking sites," Psychology and marketing, 28(4), pp. 441- 456. https://doi.org/10.1002/mar.20395
- Palmer, D. (2005), "Pop-ups, Cookies, and Spam: Toward a deeper analysis of the ethical significance of Internet marketing practices," Journal of business ethics, 58(1), pp. 271-280. https://doi.org/10.1007/s10551-005-1421-8
- Perlroth, N. and Bilton N. (2012), Mobile apps tale data without permission. NYTIMES, February 1.
- Pollach, I. (2005), "A typology of communicative strategies in online privacy policies: Ethics, Power and informed consent," Journal business ethics, 62, pp. 221- 235. https://doi.org/10.1007/s10551-005-7898-3
- Pool, G. J. and Schwegler A. F. (2007), "Differentiating among motives for norm conformity," Basic and Applied Social Psychology, 29(1), pp. 47-60. https://doi.org/10.1080/01973530701330983
- Rogers E. M. and Shoemaker F. F. (1971), Communication of innovation. New York: The Free Press.
- Rapp, J., Hill R. P., Gaines J. and Wilson R. M. (2009), "Advertising and consumer privacy," Journal of advertising, 38(4), pp. 51-61.
- Shaw, D. and Shiu E. (2003), "Ethics in consumer choice: a multivariable modeling approach," European journal of marketing, 37(10), pp. 1485-1498. https://doi.org/10.1108/03090560310487202
- Sheehan, K. B. (1999), "An investigation of gender difference in online privacy concerns and resultant behaviors," Journal of interactive marketing, 13(4), pp. 24-38. https://doi.org/10.1002/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O
- Sparks, P., Shepherd R. and Frewer L. J. (1995), "Assessing and structuring attitudes toward the use of gene technology in food production: the role of perceived ethical obligation," Basic an applied social psychology, 16(3), pp. 267-285. https://doi.org/10.1207/s15324834basp1603_1
- Stanaland, A. J. W., Lwin M. O. and Miyazaki A. D., "Online privacy trust-marks," Journal of advertising research, September, pp. 511- 523.
- Taylor, D. G., Lewin J. and Strutton D. (2011), "Friends, Fans and followers: Do ads work on social networks?: How gender and age shape receptivity," Journal of advertising research, March, pp. 258-275.
- TRUSTe (2011), Mobile privacy: A user's perspective. Harris Interactive, April.
- Turban E., King, D. and Land, J. (2009), Introduction to electronic commerce, Prentice Hall.
- Turow, J. (2004), American and Online privacy: The system in broken, A report from the Annenberg public policy center of the university of Pennsylvania.
- Warren, S. and Brandeis L. (1890), "The right of privacy," Harvard law review, 4( 5), pp. 193-220. https://doi.org/10.2307/1321160
- Weiser, R. (2000), "Gender Differences in Internet Use Patterns and Internet Application Preferences: A Two- Sample Comparison," Cyber Psychology and Behavior, 3( 2), pp. 167-178. https://doi.org/10.1089/109493100316012
- Westin, A. F. (1967), Privacy and Freedom. Atheneum, New York.
- WHOA (2009), "Comparison statistics 2000-2009," available at http://haltabuse.org/resources/stats/cumulative 2000-2007.pdf
- Wolin, L.and Korgaonkar P. (2003), "Web Advertising: Gender Differences in Beliefs, Attitudes and Behavior," Internet Research, 13(5), pp.375-385. https://doi.org/10.1108/10662240310501658
- Weiss S. (2009), "Privacy threat model for data portability in social network applications," International journal of information management, 29, pp. 249-254. https://doi.org/10.1016/j.ijinfomgt.2009.03.007
Cited by
- Assessment criteria for parents to determine the trustworthiness of maternal and child health apps: a pilot study vol.8, pp.1-2, 2018, https://doi.org/10.1007/s12553-018-0216-8