메뉴 건너뛰기




Volumn 28, Issue 6, 2012, Pages 2366-2375

Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia

Author keywords

Information privacy; Protection Motivation Theory; Self efficacy; Social Cognitive Theory; Social networking

Indexed keywords

CLUSTER SAMPLING; GAINING INSIGHTS; INFORMATION PRIVACY; MALAYSIA; MALAYSIANS; PROTECTION MOTIVATION THEORY; RESEARCH MODELS; SELF EFFICACY; SOCIAL COGNITIVE THEORY; SOCIAL NETWORKING SITES; STRUCTURAL EQUATION MODELING TECHNIQUES; SURVEY DESIGN; THEORETICAL BASIS;

EID: 84865622191     PISSN: 07475632     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.chb.2012.07.008     Document Type: Article
Times cited : (224)

References (69)
  • 4
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multi method empirical examination of home computer user security behavioral intentions
    • C.L. Anderson, and R. Agarwal Practicing safe computing: A multi method empirical examination of home computer user security behavioral intentions MIS Quarterly 34 3 2010 613 643
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 8
    • 0000106003 scopus 로고
    • Regulation of cognitive processes through perceived self-efficacy
    • A. Bandura Regulation of cognitive processes through perceived self-efficacy Development Psychology 25 1989 729 735
    • (1989) Development Psychology , vol.25 , pp. 729-735
    • Bandura, A.1
  • 10
    • 38149139788 scopus 로고    scopus 로고
    • Affective benefits in communication: The development and field-testing of a new questionnaire measure
    • Aalborg, Denmark
    • Baren, J. v.; IJsselsteijn, W.; Romero, N.; Markopoulos, P. & de Ruyter, B. (2003). Affective benefits in communication: the development and field-testing of a new questionnaire measure. In Proceedings of PRESENCE, Aalborg, Denmark.
    • (2003) Proceedings of PRESENCE
    • Baren, J.V.1    Ijsselsteijn, W.2    Romero, N.3    Markopoulos, P.4    De Ruyter, B.5
  • 13
    • 33745168965 scopus 로고    scopus 로고
    • The language of privacy: Learning from video media space analysis and design
    • DOI 10.1145/1067860.1067868
    • M. Boyle, and S. Greenberg The language of privacy: Learning from video media space analysis and design ACM Transactions on Computer-Human Interaction 12 2 2005 328 370 (Pubitemid 43891477)
    • (2005) ACM Transactions on Computer-Human Interaction , vol.12 , Issue.2 , pp. 328-370
    • Boyle, M.1    Greenberg, S.2
  • 14
    • 84870971309 scopus 로고    scopus 로고
    • Understanding emergence and outcomes of information privacy concerns: A case of Facebook
    • Accessed05.11.11
    • Burcu, B.; Cavusoglu, H. & Benbasat, I. (2010). Understanding emergence and outcomes of information privacy concerns: a case of Facebook. In Proceedings of the 31st international conference of information systems. < http://people.commerce.ubc.ca/phd/bulgurcu/docs/2010-ICIS-Bulgurcu.pdf > Accessed 05.11.11.
    • (2010) Proceedings of the 31st International Conference of Information Systems
    • Burcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 15
    • 1042292348 scopus 로고    scopus 로고
    • Business Week Accessed05.11.11
    • Business Week (2000). Business Week/Harris Poll: A Growing Threat. < http://www.businessweek.com/2000/00-12/b3673010.htm > Accessed 05.11.11.
    • (2000) Business Week/Harris Poll: A Growing Threat
  • 17
    • 0010621237 scopus 로고    scopus 로고
    • California Healthcare Foundation Accessed20.10.10
    • California Healthcare Foundation (2000). Ethics survey of consumer attitudes about health web sites. < http://www.chcf.org/press/viewpress.cfm? itemID=1015 > Accessed 20.10.10.
    • (2000) Ethics Survey of Consumer Attitudes about Health Web Sites
  • 20
    • 84865641601 scopus 로고    scopus 로고
    • CNET News Accessed26.08.10
    • CNET News (2004). Privacy in the age of transparency. < http://news.com.com/2030-1069-20335172731.html > Accessed 26.08.10.
    • (2004) Privacy in the Age of Transparency
  • 22
    • 0000004470 scopus 로고    scopus 로고
    • Social cognitive theory and individual reactions to computing technology: A longitudinal study
    • D. Compeau, L.A. Higgins, and S. Huff Social cognitive theory and individual reactions to computing technology: A longitudinal study MIS Quarterly 23 2 1999 145 159
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 145-159
    • Compeau, D.1    Higgins, L.A.2    Huff, S.3
  • 24
    • 84865659181 scopus 로고    scopus 로고
    • Managing social networking in Web-based society: A need-based approach of present generation online users
    • Accessed23.08.10
    • Das, S. K.; Karkee, P. & Majumder, K. (2009). Managing social networking in Web-based society: A need-based approach of present generation online users. In Proceedings of the 7th international CALIBER conference, 2009. < http://shodhganga.inflibnet.ac.in/dxml/bitstream/handle/1944/1042/39.pdf? sequence=1 > Accessed 23.08.10.
    • (2009) Proceedings of the 7th International CALIBER Conference, 2009
    • Das, S.K.1    Karkee Majumder P, K.2
  • 25
    • 8344248697 scopus 로고    scopus 로고
    • Internet privacy concerns and their antecedents - Measurement validity and a regression model
    • T. Dinev, and P. Hart Internet privacy concerns and their antecedents - Measurement validity and a regression model Behavior and Information Technology 23 6 2004 413 422
    • (2004) Behavior and Information Technology , vol.23 , Issue.6 , pp. 413-422
    • Dinev, T.1    Hart, P.2
  • 26
    • 84870214771 scopus 로고    scopus 로고
    • Task technology fit, the social technical gap, and social networking sites
    • Accessed02.12.10
    • Dwyer, C. (2007). Task technology fit, the social technical gap, and social networking sites. In Proceedings of the 13th Americas conference on information systems. < http://aisel.aisnet.org/amcis2007/374 > Accessed 02.12.10.
    • (2007) Proceedings of the 13th Americas Conference on Information Systems
    • Dwyer, C.1
  • 28
    • 54849439913 scopus 로고    scopus 로고
    • Internet social network communities: Risk taking, trust, and privacy concerns
    • J. Fogel, and E. Nehmad Internet social network communities: Risk taking, trust, and privacy concerns Computers in Human Behavior 25 1 2009 153 160
    • (2009) Computers in Human Behavior , vol.25 , Issue.1 , pp. 153-160
    • Fogel, J.1    Nehmad, E.2
  • 29
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobserved variables and measurement error
    • C.R. Fornell, and D.F. Larcker Evaluating structural equation models with unobserved variables and measurement error Journal of Marketing Research XVIII 1981 39 50
    • (1981) Journal of Marketing Research , vol.18 , pp. 39-50
    • Fornell, C.R.1    Larcker, D.F.2
  • 31
    • 57149109577 scopus 로고    scopus 로고
    • Use of protection motivation theory, affect, and barriers to understand and predict adherence to outpatient rehabilitation
    • E.J. Grindley, S.J. Zizzi, and A.M. Nasypany Use of protection motivation theory, affect, and barriers to understand and predict adherence to outpatient rehabilitation Physical Therapy 88 2 2008 1529 1540
    • (2008) Physical Therapy , vol.88 , Issue.2 , pp. 1529-1540
    • Grindley, E.J.1    Zizzi, S.J.2    Nasypany, A.M.3
  • 32
    • 79957972012 scopus 로고    scopus 로고
    • Gender differences in privacy-related measures for young adult Facebook users
    • M.G. Hoy, and G. Milne Gender differences in privacy-related measures for young adult Facebook users Journal of Interactive Advertising 10 2 2010 28 45
    • (2010) Journal of Interactive Advertising , vol.10 , Issue.2 , pp. 28-45
    • Hoy, M.G.1    Milne, G.2
  • 33
    • 78649968042 scopus 로고    scopus 로고
    • Measuring affective benefits and costs of mediated awareness: Development and validation of the ABC-Questionnaire
    • IJsselsteijn, W.; Baren, J. v.; Markopoulos, P.; Romero, N. & Ruyter, B. d. (2009). Measuring affective benefits and costs of mediated awareness: development and validation of the ABC-Questionnaire. Human-Computer Interaction Series, pp. 473-488.
    • (2009) Human-Computer Interaction Series , pp. 473-488
    • Ijsselsteijn, W.1    Baren, J.V.2    Markopoulos, P.3    Romero, N.4    Ruyter, B.D.5
  • 36
    • 51249101713 scopus 로고    scopus 로고
    • The influence of personality traits and information privacy concerns on behavioral intentions
    • M.L. Korzaan, and K.T. Boswell The influence of personality traits and information privacy concerns on behavioral intentions Journal of Computer Information Systems 48 2008 15 24
    • (2008) Journal of Computer Information Systems , vol.48 , pp. 15-24
    • Korzaan, M.L.1    Boswell, K.T.2
  • 37
    • 68349125675 scopus 로고    scopus 로고
    • Consumer concerns for healthcare information privacy: A comparison of US and Canadian perspectives
    • M.V. Laric, D.A. Pitta, and L.P. Katsanis Consumer concerns for healthcare information privacy: A comparison of US and Canadian perspectives Research in Healthcare Financial Management 12 1 2009 93 111
    • (2009) Research in Healthcare Financial Management , vol.12 , Issue.1 , pp. 93-111
    • Laric, M.V.1    Pitta, D.A.2    Katsanis, L.P.3
  • 39
    • 33847386764 scopus 로고    scopus 로고
    • Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior
    • R. Larose, and N.J. Rifon Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior The Journal of Consumer Affairs 41 1 2007 217 249
    • (2007) The Journal of Consumer Affairs , vol.41 , Issue.1 , pp. 217-249
    • Larose, R.1    Rifon, N.J.2
  • 41
    • 34249803828 scopus 로고    scopus 로고
    • The development of an arm activity survey for breast cancer survivors using the protection motivation theory
    • Accessed20.10.10
    • Lee, T. S.; Kilbreath, S. L.; Sullivan, G. & Refshauge, K. M. (2007).The development of an arm activity survey for breast cancer survivors using the protection motivation theory. BMC Cancer. < http://www. biomedcentral.com/1471-2407/7/75 > Accessed 20.10.10.
    • (2007) BMC Cancer
    • Lee, T.S.1    Kilbreath, S.L.2    Sullivan, G.3    Refshauge, K.M.4
  • 42
    • 51749090174 scopus 로고    scopus 로고
    • Keeping our network safe: A model of online protection behavior
    • D. Lee, R. Larose, and N. Rifon Keeping our network safe: A model of online protection behavior Behaviour and Information Technology 27 5 2008 445 454
    • (2008) Behaviour and Information Technology , vol.27 , Issue.5 , pp. 445-454
    • Lee, D.1    Larose, R.2    Rifon, N.3
  • 43
    • 0000242433 scopus 로고
    • Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
    • J.E. Maddux, and R.W. Rogers Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change Journal of Experimental Social Psychology 19 5 1983 469 479
    • (1983) Journal of Experimental Social Psychology , vol.19 , Issue.5 , pp. 469-479
    • Maddux, J.E.1    Rogers, R.W.2
  • 44
    • 71649090601 scopus 로고    scopus 로고
    • Effects of computer self-efficacy and system reliability on user interaction with decision support systems
    • P. Madhavan, and R.R. Phillips Effects of computer self-efficacy and system reliability on user interaction with decision support systems Computers in Human Behavior 26 2010 199 204
    • (2010) Computers in Human Behavior , vol.26 , pp. 199-204
    • Madhavan, P.1    Phillips, R.R.2
  • 45
    • 13244298307 scopus 로고    scopus 로고
    • Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
    • DOI 10.1287/isre.1040.0032
    • N.K. Malhorta, S.S. Kim, and J. Agarwal Internet users' information privacy concerns (IUIPC): The construct, the scale and a causal model Information Systems Research 15 4 2004 336 355 (Pubitemid 40192456)
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 46
    • 70349321521 scopus 로고    scopus 로고
    • Toward an understanding of the online consumer's risky behavior and protection practices
    • G.R. Milne, L.I. Labrecque, and C. Cromer Toward an understanding of the online consumer's risky behavior and protection practices The Journal of Consumer Affairs 43 3 2009 449 473
    • (2009) The Journal of Consumer Affairs , vol.43 , Issue.3 , pp. 449-473
    • Milne, G.R.1    Labrecque, L.I.2    Cromer, C.3
  • 47
    • 0036106081 scopus 로고    scopus 로고
    • Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions
    • DOI 10.1348/135910702169420
    • S. Milne, S. Orbell, and P. Sheeran Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions British Journal of Health Psychology 7 2002 163 184 (Pubitemid 34555864)
    • (2002) British Journal of Health Psychology , vol.7 , Issue.2 , pp. 163-184
    • Milne, S.1    Orbell, S.2    Sheeran, P.3
  • 48
    • 10844290435 scopus 로고    scopus 로고
    • Consumers' protection of online privacy and identity
    • G.R. Milne, A.J. Rohm, and S. Bahl Consumers' protection of online privacy and identity The Journal of Consumer Affairs 38 2 2004 217 232 (Pubitemid 39666076)
    • (2004) Journal of Consumer Affairs , vol.38 , Issue.2 , pp. 217-232
    • Milne, G.R.1    Rohm, A.J.2    Bahl, S.3
  • 50
    • 80053473856 scopus 로고    scopus 로고
    • Which factors explain employees' adherence to information security policies? An empirical study
    • Auckland, New Zealand Accessed28.11.10
    • Pahnila, S.; Siponen, M. & Mahmood, A. (2007). Which factors explain employees' adherence to information security policies? An empirical study. In Proceedings of the Pacific Asia conference of the information systems, Auckland, New Zealand. < http://aisel.aisnet.org/pacis2007/73 > Accessed 28.11.10.
    • (2007) Proceedings of the Pacific Asia Conference of the Information Systems
    • Pahnila, S.1    Siponen Mahmood M, A.2
  • 52
    • 0034394385 scopus 로고    scopus 로고
    • Privacy concerns and consumer willingness to provide personal information
    • J. Phelps, G. Nowak, and E. Ferrell Privacy concerns and consumer willingness to provide personal information Journal of Public Policy and Marketing 19 1 2000 27 41
    • (2000) Journal of Public Policy and Marketing , vol.19 , Issue.1 , pp. 27-41
    • Phelps, J.1    Nowak, G.2    Ferrell, E.3
  • 55
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • R.W. Rogers A protection motivation theory of fear appeals and attitude change Journal of Psychology 91 1975 93 114
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 56
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • R.W. Rogers Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation B.L. Cacioppo, L.L. Petty, Social psychophysiology: A source book 1983 Guildford Press London 153 176
    • (1983) Social Psychophysiology: A Source Book , pp. 153-176
    • Rogers, R.W.1
  • 57
    • 0035984875 scopus 로고    scopus 로고
    • Psychosocial and clinical determinants of compliance with occlusion therapy for amblyopic children
    • DOI 10.1038/sj.EYE.6700086
    • A. Searle, P. Norman, R. Harrad, and K. Vedhara Psychosocial and clinical determinants of compliance with occlusion therapy for amblyopic children Eye 16 2002 150 155 (Pubitemid 34537692)
    • (2002) Eye , vol.16 , Issue.2 , pp. 150-155
    • Searle, A.1    Norman, P.2    Harrad, R.3    Vedhara, K.4
  • 59
    • 77955428343 scopus 로고    scopus 로고
    • The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption
    • D.-H. Shin The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption Interacting with Computers 22 2010 428 438
    • (2010) Interacting with Computers , vol.22 , pp. 428-438
    • Shin, D.-H.1
  • 60
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • H.J. Smith, S.J. Milberg, and S.J. Burke Information privacy: Measuring individuals' concerns about organizational practices MIS Quarterly 20 2 1996 167 196
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 167-196
    • Smith, H.J.1    Milberg, S.J.2    Burke, S.J.3
  • 62
    • 50249151484 scopus 로고    scopus 로고
    • Internet users' information privacy-protective responses: A taxonomy and a nomological model
    • J.Y. Son, and S.S. Kim Internet users' information privacy-protective responses: A taxonomy and a nomological model MIS Quarterly 32 2 2008 503 529
    • (2008) MIS Quarterly , vol.32 , Issue.2 , pp. 503-529
    • Son, J.Y.1    Kim, S.S.2
  • 65
    • 33745046332 scopus 로고    scopus 로고
    • Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach
    • DOI 10.1207/s15506878jobem4901-6
    • S. Youn Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach Journal of Broadcasting and Electronic Media 49 1 2005 86 110 (Pubitemid 43875995)
    • (2005) Journal of Broadcasting and Electronic Media , vol.49 , Issue.1 , pp. 86-110
    • Youn, S.1
  • 66
    • 70349313384 scopus 로고    scopus 로고
    • Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents
    • S. Youn Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents Journal of Consumer Affairs 43 3 2009 389 418
    • (2009) Journal of Consumer Affairs , vol.43 , Issue.3 , pp. 389-418
    • Youn, S.1
  • 67
    • 77951655145 scopus 로고    scopus 로고
    • Am i really at risk? Determinants of online users' intentions to use strong passwords
    • L. Zhang, and W.C. McDowell Am I really at risk? Determinants of online users' intentions to use strong passwords Journal of Internet Commerce 8 2009 180 197
    • (2009) Journal of Internet Commerce , vol.8 , pp. 180-197
    • Zhang, L.1    McDowell, W.C.2
  • 68
    • 78649377647 scopus 로고    scopus 로고
    • Accessed02.12.10
    • Zuckerberg, M. (2010). 500 million stories. < http://www.facebook.com/ blog.php?post=409753352130 > Accessed 02.12.10.
    • (2010) 500 Million Stories
    • Zuckerberg, M.1
  • 69
    • 51249120715 scopus 로고    scopus 로고
    • User's perspectives on privacy in web-based applications
    • M. Zviran User's perspectives on privacy in web-based applications Journal of Computer Information Systems 48 4 2008 97 105
    • (2008) Journal of Computer Information Systems , vol.48 , Issue.4 , pp. 97-105
    • Zviran, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.