References
- D. Boyd and N. Ellison, "Social Network Sites: Definition, History and Scholarship," J. Comput. Mediated. Commun., vol. 13, no. 1, Oct. 2007, pp. 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
- M. Thelwall, "Social Network Sites: Users and Uses," Adv. Comput., vol. 76, 2009, pp. 19-73.
- S. Livingstone, K. Olafsson, and E. Staksrud, Social Networking, Age and Privacy, LSE, London, EU Kids Online, 2011.
- Y. Al-Saggaf and S. Nielsen, "Self-Disclosure on Facebook Among Female Users and its Relationship to Feelings of Loneliness," Comput. Human Behavior, vol. 36, July 2014, pp. 460-468. https://doi.org/10.1016/j.chb.2014.04.014
- F.D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, no. 3, Sept. 1989, pp. 318-339.
- M. Fishbein and I. Ajzen, Beliefs, Attitude, Intention and Behaviour: An Introduction to Theory and Research, Reading, MA, USA: Addison-Wesley, 1975.
- F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology," Manage. Sci., vol. 35, no. 8, Aug. 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
-
J. Shah and E.T. Higgins, "Expectancy
$\times$ Value Effects: Regulatory Focus as Determinant of Magnitude and Direction," J. Personality Soc. Psychol., vol. 73, no. 3, Sept. 1997, pp. 447-458. https://doi.org/10.1037/0022-3514.73.3.447 - N. Park, K.M. Lee, and P.H. Cheong. "University Instructors' Acceptance of Electronic Course Ware: An Application of the Technology Acceptance Model," J. Comput. Medicated Commun., vol. 13, no. 1, Oct. 2007, pp. 163-186. https://doi.org/10.1111/j.1083-6101.2007.00391.x
- D. Gefen and D.W. Straub, "Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model," MIS Quarterly, vol. 21, no. 4, Dec. 1997, pp. 389-400. https://doi.org/10.2307/249720
- G. Choi and H. Chung, "Applying the Technology Acceptance Model to Social Networking Sites (SNS): Impact of Subjective Norm and Social Capital on the Acceptance of SNS," Int. J. Human Comput. Interaction, vol. 29, no. 10, Jan. 2013, pp. 619-628. https://doi.org/10.1080/10447318.2012.756333
- I. Ajzen, "The Theory of Planned Behavior," Organizational Behavior Human Decision Process., vol. 50, no. 2, Dec. 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- P. Ifinedo, "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Comput. Security, vol. 31, no. 1, 2012, pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
- B. Bulgurcu, H. Cavusoglu, and I. Banbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, vol. 34, no. 3, 2010, pp. 523-548. https://doi.org/10.2307/25750690
- Y. Lu, T. Zhou, and B. Wang, "Exploring Chinese Users' Acceptance of Instant Messaging Using the Theory of Planned Behavior, the Technology Acceptance Model, and the Flow Theory," Comput. Human Behavior, vol. 25, no. 1, Jan. 2009, pp. 29-39. https://doi.org/10.1016/j.chb.2008.06.002
- M.C. Lee, "Factors Influencing the Adoption of Internet Banking: An Integration of TAM and TPB with Perceived Risk and Perceived Benefit," Electron. Commerce Res. Appl., vol. 8, no. 3, 2009, pp. 130-141. https://doi.org/10.1016/j.elerap.2008.11.006
- R. Rogers, "Cognitive and Psychological Processes in Fear-Based Attitude Change: A Revised Theory of Protection Motivation. In Social Psychophysiology: A Sourcebook, New York, USA: Guilford Press, 1983, pp. 153-176.
- C.L. Anderson and R. Agarwal, "Practicing Safe Computing: A Multi-Method Empirical Examination of Home Computer User Security Behavioral Intention," MIS Quarterly, vol. 34, no. 3, 2010, pp. 613-643. https://doi.org/10.2307/25750694
- K.H. Beck and A. Frankel, "The Effects of Health Threat Seriousness and Personal Efficacy Upon Intentions and Behavior," J. Appl. Social Psychol., vol. 11, 1981, pp. 401-415. https://doi.org/10.1111/j.1559-1816.1981.tb00832.x
- Y.H. Lee, "Understanding Anti-Plagiarism Software Adaption: An Extended Protection Motivation Theory," Decision Support Syst., vol. 50, no. 2, 2011, pp. 361-369. https://doi.org/10.1016/j.dss.2010.07.009
- Y.H. Lee and K.R. Larsen, "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," Eur. J. Inform. Syst., vol. 18, 2009, pp. 177-187. https://doi.org/10.1057/ejis.2009.11
- N. Mohamed and J.H. Ahmad, "Information Privacy Concerns, Antecedents and Privacy Measure Use in Social Networking Sites: Evidence from Malaysia," Comput. Human Behavior, vol. 28, no. 6, 2012, pp. 2366-2375. https://doi.org/10.1016/j.chb.2012.07.008
- V. Venkatesh and F.D. Davis, "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Manage. Sci., vol. 46, no. 2, 2000, pp. 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- I. Ajzen, "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior," J. Appl. Soc. Psychol., vol. 32, 2002, pp. 665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
- X. Wang and S.R. McClung, "Toward a Detailed Understanding of Illegal Digital Downloading Intentions: An Extended Theory of Planned Behavior Approach," New Media Soc., vol. 13, no. 4, 2011, pp. 663-677. https://doi.org/10.1177/1461444810378225
- M. Hajli, "An Integrated Model for E-Commerce Adoption at the Customer Level with the Impact of Social Commerce," Int. J. Inform. Sci. Manage., Special Issue, 2012, pp. 77-97.
- D. Gefen and D.W. Straub, "Consumer Trust in B2C E-Commerce and the Importance of Social Presence: Experiments in E-Products and E-Services," Omega, vol. 32, no. 6, 2004, pp. 407-424. https://doi.org/10.1016/j.omega.2004.01.006
- I.A. Junglas, N.A. Johnson, and C. Spitzmuller, "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services," Eur. J. Inform. Syst., vol. 17, no. 4, 2008, pp. 387-402. https://doi.org/10.1057/ejis.2008.29
Cited by
- Nowhere to hide: Anonymous User Recognition Based on Multidimensional Trajectory Set vol.1550, pp.None, 2018, https://doi.org/10.1088/1742-6596/1550/3/032100
- Examining the roles of students' beliefs and security concerns for using smartwatches in higher education vol.34, pp.4, 2018, https://doi.org/10.1108/jeim-02-2020-0052
- Understanding the disclosure of personal data online vol.29, pp.3, 2018, https://doi.org/10.1108/ics-10-2020-0168