메뉴 건너뛰기




Volumn 3, Issue , 2012, Pages 2278-2293

Measuring mobile users' concerns for information privacy

Author keywords

Information privacy; Instrument development; Mobile users; Privacy concerns; Survey

Indexed keywords

CONFIRMATORY FACTOR ANALYSIS; EXPLORATORY FACTOR ANALYSIS; INFORMATION PRIVACY; INFORMATION PRIVACY CONCERNS; INSTRUMENT DEVELOPMENT; MOBILE NETWORK TECHNOLOGY; MOBILE USERS; PRIVACY CONCERNS;

EID: 84886512155     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (132)

References (38)
  • 1
    • 41649112685 scopus 로고
    • Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach
    • Anderson, J.C., and Gerbing, D.W. 1988. "Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach, " Psychological Bulletin (103:3 (Fall), pp 411-423.
    • (1988) Psychological Bulletin , vol.103 , Issue.3 FALL , pp. 411-423
    • Anderson, J.C.1    Gerbing, D.W.2
  • 2
    • 66449136652 scopus 로고    scopus 로고
    • Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
    • Angst, C.M., and Agarwal, R. 2009. "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion, " MIS Quarterly (33:2), pp 339-370.
    • (2009) MIS Quarterly , vol.33 , Issue.2 , pp. 339-370
    • Angst, C.M.1    Agarwal, R.2
  • 5
    • 84870963426 scopus 로고    scopus 로고
    • The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation
    • Paris, France
    • Bansal, G., Zahedi, F., and Gefen, D. 2008. "The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation, " Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France.
    • (2008) Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008)
    • Bansal, G.1    Zahedi, F.2    Gefen, D.3
  • 7
    • 81355150547 scopus 로고    scopus 로고
    • Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
    • Bélanger, F., and Crossler, R.E. 2011. "Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, " MIS Quarterly (35:4), pp 1017-1041.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 1017-1041
    • Bélanger, F.1    Crossler, R.E.2
  • 8
    • 4243159210 scopus 로고
    • Significance Tests and Goodness of Fit in the Analysis of Covariance Structures
    • Bentler, P.M., and Bonett, D.G. 1980. "Significance Tests and Goodness of Fit in the Analysis of Covariance Structures, " Psychological Bulletin (88:3), pp 588-606.
    • (1980) Psychological Bulletin , vol.88 , Issue.3 , pp. 588-606
    • Bentler, P.M.1    Bonett, D.G.2
  • 10
    • 0002042337 scopus 로고    scopus 로고
    • Issues and Opinion on Structural Equation Modeling
    • Chin, W.W. 1998. "Issues and Opinion on Structural Equation Modeling, " MIS Quarterly (22:1), pp VIIXVI.
    • (1998) MIS Quarterly , vol.22 , Issue.1
    • Chin, W.W.1
  • 11
    • 0001501223 scopus 로고
    • 'How Did They Get My Name'? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use
    • Culnan, M.J. 1993. "'How Did They Get My Name'? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use, " MIS Quarterly (17:3), pp 341-363.
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 341-363
    • Culnan, M.J.1
  • 12
    • 72049116025 scopus 로고    scopus 로고
    • How Ethics Can Enhance Organizational Privacy: Lessons from the Choicepoint and Tjx Data Breaches
    • Culnan, M.J., and Williams, C.C. 2009. "How Ethics Can Enhance Organizational Privacy: Lessons from the Choicepoint and Tjx Data Breaches, " MIS Quarterly (33:4), pp 673-687.
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 673-687
    • Culnan, M.J.1    Williams, C.C.2
  • 13
    • 84886515128 scopus 로고    scopus 로고
    • Google's Android Wears Big Bullseye for Mobile Malware
    • from
    • Dignan, L. 2011. "Google's Android Wears Big Bullseye for Mobile Malware. " ZDNet, from http://www.zdnet.com/blog/btl/googles-android-wears-big-bullseye-for-mobile-malware/45733
    • (2011) ZDNet
    • Dignan, L.1
  • 14
    • 33645133251 scopus 로고    scopus 로고
    • An Extended Privacy Calculus Model for E-Commerce Transactions
    • Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions, " Information Systems Research (17:1), pp 61-80.
    • (2006) Information Systems Research , vol.17 , Issue.1 , pp. 61-80
    • Dinev, T.1    Hart, P.2
  • 15
    • 0000009769 scopus 로고
    • Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
    • Fornell, C., and Larcker, D. 1981. "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, " Journal of Marketing Research (18), pp 39-50.
    • (1981) Journal of Marketing Research , Issue.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.2
  • 19
    • 80255122693 scopus 로고    scopus 로고
    • To Disclose or Not to Disclose, That Is the Question": A Structural Equation Modeling Approach to Communication Privacy Management in E-Health
    • Jin, S.A.A. 2012. ""To Disclose or Not to Disclose, That Is the Question": A Structural Equation Modeling Approach to Communication Privacy Management in E-Health, " Computers in Human Behavior (28:1), pp 69-77.
    • (2012) Computers in Human Behavior , vol.28 , Issue.1 , pp. 69-77
    • Jin, S.A.A.1
  • 21
    • 54449093990 scopus 로고    scopus 로고
    • Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services
    • Junglas, I.A., Johnson, N.A., and Spitzmüller, C. 2008. "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services, " European Journal of Information Systems (17:4), pp 387-402.
    • (2008) European Journal of Information Systems , vol.17 , Issue.4 , pp. 387-402
    • Junglas, I.A.1    Johnson, N.A.2    Spitzmüller, C.3
  • 22
    • 13244298307 scopus 로고    scopus 로고
    • Internet Users' Information Privacy Concerns (Iuipc): The Construct, the Scale, and a Causal Model
    • December
    • Malhotra, N.K., Kim, S.S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (Iuipc): The Construct, the Scale, and a Causal Model, " Information Systems Research (15:4), December, pp 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 23
    • 0000922312 scopus 로고
    • A New, More Powerful Approach to Multitrait-Multimethod Analyses: Application of Second-Order Confirmatory Factor Analysis
    • Marsh, H.W., and Hocevar, D. 1988. "A New, More Powerful Approach to Multitrait-Multimethod Analyses: Application of Second-Order Confirmatory Factor Analysis, " Journal of Applied Psychology (73:1 (February), pp 107-117.
    • (1988) Journal of Applied Psychology , vol.73 , Issue.1 FEBRUARY , pp. 107-117
    • Marsh, H.W.1    Hocevar, D.2
  • 26
    • 79960211692 scopus 로고    scopus 로고
    • Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?
    • Petronio, S. 2010. "Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?, " Journal of Family Theory & Review (2:3), pp 175-196.
    • (2010) Journal of Family Theory & Review , vol.2 , Issue.3 , pp. 175-196
    • Petronio, S.1
  • 28
    • 81355150537 scopus 로고    scopus 로고
    • Information Privacy Research: An Interdisciplinary Review
    • Smith, H.J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review, " MIS Quarterly (35:4), pp 989-1015.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1015
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 29
    • 0000981743 scopus 로고    scopus 로고
    • Information Privacy: Measuring Individuals' Concerns About Organizational Practices
    • June
    • Smith, H.J., Milberg, J.S., and Burke, J.S. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices, " MIS Quarterly (20:2), June, pp 167-196.
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 167-196
    • Smith, H.J.1    Milberg, J.S.2    Burke, J.S.3
  • 31
    • 0036004583 scopus 로고    scopus 로고
    • An Empirical Examination of the Concern for Information Privacy Instrument
    • Stewart, K.A., and Segars, A.H. 2002. "An Empirical Examination of the Concern for Information Privacy Instrument, " Information Systems Research (13:1), pp 36-49.
    • (2002) Information Systems Research , vol.13 , Issue.1 , pp. 36-49
    • Stewart, K.A.1    Segars, A.H.2
  • 32
    • 80755173803 scopus 로고    scopus 로고
    • Your Apps Are Watching You: A Wsj Investigation Finds That Iphone and Android Apps Are Breaching the Privacy of Smartphone Users
    • Thurm, S., and Kane, Y.I. 2010. "Your Apps Are Watching You: A Wsj Investigation Finds That Iphone and Android Apps Are Breaching the Privacy of Smartphone Users, " in: The Wall Street Journal.
    • (2010) The Wall Street Journal.
    • Thurm, S.1    Kane, Y.I.2
  • 36
    • 84862293695 scopus 로고    scopus 로고
    • Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
    • Xu, H., Dinev, T., Smith, H.J., and Hart, P. 2011. "Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances, " Journal of the Association for Information Systems (12:12), pp 798-824.
    • (2011) Journal of the Association for Information Systems , vol.12 , Issue.12 , pp. 798-824
    • Xu, H.1    Dinev, T.2    Smith, H.J.3    Hart, P.4
  • 38
    • 77749333391 scopus 로고    scopus 로고
    • The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
    • Xu, H., Teo, H.H., Tan, B.C.Y., and Agarwal, R. 2010. "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services, " Journal of Management Information Systems (26:3), pp 135-174.
    • (2010) Journal of Management Information Systems , vol.26 , Issue.3 , pp. 135-174
    • Xu, H.1    Teo, H.H.2    Tan, B.C.Y.3    Agarwal, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.