-
1
-
-
41649112685
-
Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach
-
Anderson, J.C., and Gerbing, D.W. 1988. "Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach, " Psychological Bulletin (103:3 (Fall), pp 411-423.
-
(1988)
Psychological Bulletin
, vol.103
, Issue.3 FALL
, pp. 411-423
-
-
Anderson, J.C.1
Gerbing, D.W.2
-
2
-
-
66449136652
-
Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion
-
Angst, C.M., and Agarwal, R. 2009. "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion, " MIS Quarterly (33:2), pp 339-370.
-
(2009)
MIS Quarterly
, vol.33
, Issue.2
, pp. 339-370
-
-
Angst, C.M.1
Agarwal, R.2
-
5
-
-
84870963426
-
The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation
-
Paris, France
-
Bansal, G., Zahedi, F., and Gefen, D. 2008. "The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation, " Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France.
-
(2008)
Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008)
-
-
Bansal, G.1
Zahedi, F.2
Gefen, D.3
-
6
-
-
2342484676
-
Location-Based Services for Mobile Telephony: A Study of User's Privacy Concerns
-
Zurich, Switzerland
-
Barkhuus, L., and Dey, A. 2003. "Location-Based Services for Mobile Telephony: A Study of User's Privacy Concerns, " Proceedings of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT), Zurich, Switzerland, pp. 709-712.
-
(2003)
Proceedings of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT)
, pp. 709-712
-
-
Barkhuus, L.1
Dey, A.2
-
7
-
-
81355150547
-
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
-
Bélanger, F., and Crossler, R.E. 2011. "Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems, " MIS Quarterly (35:4), pp 1017-1041.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 1017-1041
-
-
Bélanger, F.1
Crossler, R.E.2
-
8
-
-
4243159210
-
Significance Tests and Goodness of Fit in the Analysis of Covariance Structures
-
Bentler, P.M., and Bonett, D.G. 1980. "Significance Tests and Goodness of Fit in the Analysis of Covariance Structures, " Psychological Bulletin (88:3), pp 588-606.
-
(1980)
Psychological Bulletin
, vol.88
, Issue.3
, pp. 588-606
-
-
Bentler, P.M.1
Bonett, D.G.2
-
9
-
-
70349312528
-
Blogging, Communication, and Privacy Management: Development of the Blogging Privacy Management Measure
-
Child, J.T., Pearson, J.C., and Petronio, S. 2009. "Blogging, Communication, and Privacy Management: Development of the Blogging Privacy Management Measure, " Journal of the American Society for Information Science and Technology (60:10), pp 2079-2094.
-
(2009)
Journal of the American Society for Information Science and Technology
, vol.60
, Issue.10
, pp. 2079-2094
-
-
Child, J.T.1
Pearson, J.C.2
Petronio, S.3
-
10
-
-
0002042337
-
Issues and Opinion on Structural Equation Modeling
-
Chin, W.W. 1998. "Issues and Opinion on Structural Equation Modeling, " MIS Quarterly (22:1), pp VIIXVI.
-
(1998)
MIS Quarterly
, vol.22
, Issue.1
-
-
Chin, W.W.1
-
11
-
-
0001501223
-
'How Did They Get My Name'? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use
-
Culnan, M.J. 1993. "'How Did They Get My Name'? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use, " MIS Quarterly (17:3), pp 341-363.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.J.1
-
12
-
-
72049116025
-
How Ethics Can Enhance Organizational Privacy: Lessons from the Choicepoint and Tjx Data Breaches
-
Culnan, M.J., and Williams, C.C. 2009. "How Ethics Can Enhance Organizational Privacy: Lessons from the Choicepoint and Tjx Data Breaches, " MIS Quarterly (33:4), pp 673-687.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 673-687
-
-
Culnan, M.J.1
Williams, C.C.2
-
13
-
-
84886515128
-
Google's Android Wears Big Bullseye for Mobile Malware
-
from
-
Dignan, L. 2011. "Google's Android Wears Big Bullseye for Mobile Malware. " ZDNet, from http://www.zdnet.com/blog/btl/googles-android-wears-big-bullseye-for-mobile-malware/45733
-
(2011)
ZDNet
-
-
Dignan, L.1
-
14
-
-
33645133251
-
An Extended Privacy Calculus Model for E-Commerce Transactions
-
Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions, " Information Systems Research (17:1), pp 61-80.
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
15
-
-
0000009769
-
Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
-
Fornell, C., and Larcker, D. 1981. "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, " Journal of Marketing Research (18), pp 39-50.
-
(1981)
Journal of Marketing Research
, Issue.18
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.2
-
19
-
-
80255122693
-
To Disclose or Not to Disclose, That Is the Question": A Structural Equation Modeling Approach to Communication Privacy Management in E-Health
-
Jin, S.A.A. 2012. ""To Disclose or Not to Disclose, That Is the Question": A Structural Equation Modeling Approach to Communication Privacy Management in E-Health, " Computers in Human Behavior (28:1), pp 69-77.
-
(2012)
Computers in Human Behavior
, vol.28
, Issue.1
, pp. 69-77
-
-
Jin, S.A.A.1
-
21
-
-
54449093990
-
Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services
-
Junglas, I.A., Johnson, N.A., and Spitzmüller, C. 2008. "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services, " European Journal of Information Systems (17:4), pp 387-402.
-
(2008)
European Journal of Information Systems
, vol.17
, Issue.4
, pp. 387-402
-
-
Junglas, I.A.1
Johnson, N.A.2
Spitzmüller, C.3
-
22
-
-
13244298307
-
Internet Users' Information Privacy Concerns (Iuipc): The Construct, the Scale, and a Causal Model
-
December
-
Malhotra, N.K., Kim, S.S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (Iuipc): The Construct, the Scale, and a Causal Model, " Information Systems Research (15:4), December, pp 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
23
-
-
0000922312
-
A New, More Powerful Approach to Multitrait-Multimethod Analyses: Application of Second-Order Confirmatory Factor Analysis
-
Marsh, H.W., and Hocevar, D. 1988. "A New, More Powerful Approach to Multitrait-Multimethod Analyses: Application of Second-Order Confirmatory Factor Analysis, " Journal of Applied Psychology (73:1 (February), pp 107-117.
-
(1988)
Journal of Applied Psychology
, vol.73
, Issue.1 FEBRUARY
, pp. 107-117
-
-
Marsh, H.W.1
Hocevar, D.2
-
26
-
-
79960211692
-
Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?
-
Petronio, S. 2010. "Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation?, " Journal of Family Theory & Review (2:3), pp 175-196.
-
(2010)
Journal of Family Theory & Review
, vol.2
, Issue.3
, pp. 175-196
-
-
Petronio, S.1
-
28
-
-
81355150537
-
Information Privacy Research: An Interdisciplinary Review
-
Smith, H.J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review, " MIS Quarterly (35:4), pp 989-1015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
29
-
-
0000981743
-
Information Privacy: Measuring Individuals' Concerns About Organizational Practices
-
June
-
Smith, H.J., Milberg, J.S., and Burke, J.S. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices, " MIS Quarterly (20:2), June, pp 167-196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, J.S.2
Burke, J.S.3
-
31
-
-
0036004583
-
An Empirical Examination of the Concern for Information Privacy Instrument
-
Stewart, K.A., and Segars, A.H. 2002. "An Empirical Examination of the Concern for Information Privacy Instrument, " Information Systems Research (13:1), pp 36-49.
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
32
-
-
80755173803
-
Your Apps Are Watching You: A Wsj Investigation Finds That Iphone and Android Apps Are Breaching the Privacy of Smartphone Users
-
Thurm, S., and Kane, Y.I. 2010. "Your Apps Are Watching You: A Wsj Investigation Finds That Iphone and Android Apps Are Breaching the Privacy of Smartphone Users, " in: The Wall Street Journal.
-
(2010)
The Wall Street Journal.
-
-
Thurm, S.1
Kane, Y.I.2
-
34
-
-
40749111254
-
Concern for Information Privacy and Online Consumer Purchasing
-
Van Slyke, C., Shim, J.T., Johnson, R., and Jiang, J.J. 2006. "Concern for Information Privacy and Online Consumer Purchasing, " Journal of the Association for Information Systems (7:6), pp 415-444.
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.6
, pp. 415-444
-
-
van Slyke, C.1
Shim, J.T.2
Johnson, R.3
Jiang, J.J.4
-
35
-
-
84870972411
-
Examining the Formation of Individual's Information Privacy Concerns: Toward an Integrative View
-
Paris, France
-
Xu, H., Dinev, T., Smith, H.J., and Hart, P. 2008. "Examining the Formation of Individual's Information Privacy Concerns: Toward an Integrative View, " Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France.
-
(2008)
Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008)
-
-
Xu, H.1
Dinev, T.2
Smith, H.J.3
Hart, P.4
-
36
-
-
84862293695
-
Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
-
Xu, H., Dinev, T., Smith, H.J., and Hart, P. 2011. "Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances, " Journal of the Association for Information Systems (12:12), pp 798-824.
-
(2011)
Journal of the Association for Information Systems
, vol.12
, Issue.12
, pp. 798-824
-
-
Xu, H.1
Dinev, T.2
Smith, H.J.3
Hart, P.4
-
37
-
-
85138703933
-
Alleviating Consumer's Privacy Concern in Location-Based Services: A Psychological Control Perspective
-
Washington, D. C., United States
-
Xu, H., and Teo, H.H. 2004. "Alleviating Consumer's Privacy Concern in Location-Based Services: A Psychological Control Perspective, " Proceedings of the Twenty-Fifth Annual International Conference on Information Systems (ICIS 2004), Washington, D. C., United States, pp. 793-806.
-
(2004)
Proceedings of the Twenty-Fifth Annual International Conference on Information Systems (ICIS 2004)
, pp. 793-806
-
-
Xu, H.1
Teo, H.H.2
-
38
-
-
77749333391
-
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
-
Xu, H., Teo, H.H., Tan, B.C.Y., and Agarwal, R. 2010. "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services, " Journal of Management Information Systems (26:3), pp 135-174.
-
(2010)
Journal of Management Information Systems
, vol.26
, Issue.3
, pp. 135-174
-
-
Xu, H.1
Teo, H.H.2
Tan, B.C.Y.3
Agarwal, R.4
|