메뉴 건너뛰기




Volumn 25, Issue 6, 2015, Pages 637-667

The role of mobile-computing self-efficacy in consumer information disclosure

Author keywords

Location based services; Mobile apps; Mobile computing self efficacy; Perceived risk; Privacy calculus; Trust

Indexed keywords

CALCULATIONS; COMPUTATION THEORY; ECONOMIC AND SOCIAL EFFECTS; LOCATION; LOCATION BASED SERVICES; MOBILE COMPUTING; SMARTPHONES; TELECOMMUNICATION SERVICES;

EID: 84943580872     PISSN: 13501917     EISSN: 13652575     Source Type: Journal    
DOI: 10.1111/isj.12082     Document Type: Article
Times cited : (122)

References (124)
  • 1
    • 84883278260 scopus 로고    scopus 로고
    • App store metrics
    • date: October 4, 2012, URL:
    • 148apps (2012) App store metrics. Retrieved date: October 4, 2012, URL: http://148apps.biz/app-store-metrics/?mpage=appprice
    • (2012)
  • 2
    • 3242743529 scopus 로고    scopus 로고
    • Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior
    • UC Berkeley 2nd Annual Workshop on Economics and Information Security - Berkeley, CA.
    • Acquisti, A. & Grossklags, J. (2003) Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior. In: UC Berkeley 2nd Annual Workshop on Economics and Information Security, pp. 1-27. Berkeley, CA.
    • (2003) , pp. 1-27
    • Acquisti, A.1    Grossklags, J.2
  • 3
    • 44249114234 scopus 로고    scopus 로고
    • Privacy attitudes and privacy behavior
    • Camp, L. & Lewis, S. (eds.) - Springer: US.
    • Acquisti, A. & Grossklags, J. (2004) Privacy attitudes and privacy behavior. In: Economics of Information Security. Vol. 12, Camp, L. & Lewis, S. (eds.), pp. 165-178. Springer: US.
    • (2004) Economics of Information Security , vol.12 , pp. 165-178
    • Acquisti, A.1    Grossklags, J.2
  • 4
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • Acquisti, A. & Grossklags, J. (2005) Privacy and rationality in individual decision making. IEEE Security & Privacy, 3, 26-33.
    • (2005) IEEE Security & Privacy , vol.3 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 5
    • 0034557459 scopus 로고    scopus 로고
    • Research report: the evolving relationship between general and specific computer self-efficacy: an empirical assessment
    • Agarwal, R., Sambamurthy, V. & Stair, R.M. (2000) Research report: the evolving relationship between general and specific computer self-efficacy: an empirical assessment. Information Systems Research, 11, 418.
    • (2000) Information Systems Research , vol.11 , pp. 418
    • Agarwal, R.1    Sambamurthy, V.2    Stair, R.M.3
  • 7
    • 84874621102 scopus 로고    scopus 로고
    • Apple, Google collect user data
    • date: May 31, 2011, url:
    • Angwin, J. & Valentino-Devries, J. (2011) Apple, Google collect user data. Retrieved date: May 31, 2011, url: http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html
    • (2011)
    • Angwin, J.1    Valentino-Devries, J.2
  • 8
    • 33746855063 scopus 로고    scopus 로고
    • Expect the best and prepare for the worst: anticipatory coping and preparations for Y2K
    • Aspinwall, L., Sechrist, G. & Jones, P. (2005) Expect the best and prepare for the worst: anticipatory coping and preparations for Y2K. Motivation and Emotion, 29, 353-384.
    • (2005) Motivation and Emotion , vol.29 , pp. 353-384
    • Aspinwall, L.1    Sechrist, G.2    Jones, P.3
  • 9
    • 44249110999 scopus 로고    scopus 로고
    • Establishing trust in electronic commerce through online word of mouth: an examination across genders
    • Awad, N. & Ragowsky, A. (2008) Establishing trust in electronic commerce through online word of mouth: an examination across genders. Journal of Management Information Systems, 24, 101-121.
    • (2008) Journal of Management Information Systems , vol.24 , pp. 101-121
    • Awad, N.1    Ragowsky, A.2
  • 10
    • 0141816228 scopus 로고    scopus 로고
    • Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior
    • Ba, S.L. & Pavlou, P.A. (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly, 26, 243-268.
    • (2002) MIS Quarterly , vol.26 , pp. 243-268
    • Ba, S.L.1    Pavlou, P.A.2
  • 11
    • 0017472917 scopus 로고
    • Self-efficacy: toward a unifying theory of behavioral change
    • Bandura, A. (1977a) Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84, 191-215.
    • (1977) Psychological Review , vol.84 , pp. 191-215
    • Bandura, A.1
  • 12
    • 0003547941 scopus 로고
    • General Learning Press, New York, New York, USA.
    • Bandura, A. (1977b) Social Learning Theory. General Learning Press, New York, New York, USA.
    • (1977) Social Learning Theory
    • Bandura, A.1
  • 13
    • 0017472917 scopus 로고
    • Toward a unifying theory of behavior change
    • Bandura, A. (1977c) Toward a unifying theory of behavior change. Psychological Review, 84, 191-215.
    • (1977) Psychological Review , vol.84 , pp. 191-215
    • Bandura, A.1
  • 14
    • 33746878674 scopus 로고
    • Self-efficacy mechanism in human agency
    • Bandura, A. (1982) Self-efficacy mechanism in human agency. American Psychologist, 37, 122-147.
    • (1982) American Psychologist , vol.37 , pp. 122-147
    • Bandura, A.1
  • 17
    • 0036555167 scopus 로고    scopus 로고
    • Social cognitive theory in cultural context
    • Bandura, A. (2002) Social cognitive theory in cultural context. Applied Psychology, 51, 269-290.
    • (2002) Applied Psychology , vol.51 , pp. 269-290
    • Bandura, A.1
  • 18
    • 81355150547 scopus 로고    scopus 로고
    • Privacy in the digital age: a review of information privacy research in information systems
    • Belanger, F. & Crossler, R.E. (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017-1041.
    • (2011) MIS Quarterly , vol.35 , pp. 1017-1041
    • Belanger, F.1    Crossler, R.E.2
  • 19
    • 84867973432 scopus 로고    scopus 로고
    • Trustworthiness in electronic commerce: the role of privacy, security, and site attributes
    • Bélanger, F., Hiller, J.S. & Smith, W.J. (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11, 245-270.
    • (2002) Journal of Strategic Information Systems , vol.11 , pp. 245-270
    • Bélanger, F.1    Hiller, J.S.2    Smith, W.J.3
  • 22
    • 84862971110 scopus 로고    scopus 로고
    • Privacy concerns and information disclosure: an illusion of control hypothesis
    • Brandimarte, L., Acquisti, A., Loewenstein, G. & Babcock, L. (2009) Privacy concerns and information disclosure: an illusion of control hypothesis.
    • (2009)
    • Brandimarte, L.1    Acquisti, A.2    Loewenstein, G.3    Babcock, L.4
  • 24
    • 2442482731 scopus 로고    scopus 로고
    • Do size and structure matter to mobile users? An empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones
    • Chae, M. & Kim, J. (2004) Do size and structure matter to mobile users? An empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones. Behaviour and Information Technology, 23, 165-181.
    • (2004) Behaviour and Information Technology , vol.23 , pp. 165-181
    • Chae, M.1    Kim, J.2
  • 25
    • 0042242856 scopus 로고    scopus 로고
    • A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study
    • Chin, W.W., Marcolin, B.L. & Newsted, P.R. (2003) A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14, 189-217.
    • (2003) Information Systems Research , vol.14 , pp. 189-217
    • Chin, W.W.1    Marcolin, B.L.2    Newsted, P.R.3
  • 26
    • 0000004470 scopus 로고    scopus 로고
    • Social cognitive theory and individual reactions to computing technology: a longitudinal study
    • Compeau, D., Higgins, C.A. & Huff, S. (1999) Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Quarterly, 23, 145-158.
    • (1999) MIS Quarterly , vol.23 , pp. 145-158
    • Compeau, D.1    Higgins, C.A.2    Huff, S.3
  • 27
    • 21344456569 scopus 로고
    • Application of social cognitive theory to training for computer skills
    • Compeau, D.R. & Higgins, C.A. (1995a) Application of social cognitive theory to training for computer skills. Information Systems Research, 6, 118-143.
    • (1995) Information Systems Research , vol.6 , pp. 118-143
    • Compeau, D.R.1    Higgins, C.A.2
  • 28
    • 49149116092 scopus 로고
    • Computer self-efficacy: development of a measure and initial test
    • Compeau, D.R. & Higgins, C.A. (1995b) Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19, 189-211.
    • (1995) MIS Quarterly , vol.19 , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 30
    • 0001501223 scopus 로고
    • How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use
    • Culnan, M.J. (1993) How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17, 341-361.
    • (1993) MIS Quarterly , vol.17 , pp. 341-361
    • Culnan, M.J.1
  • 31
    • 84943584132 scopus 로고    scopus 로고
    • Late late majority
    • date: July 8, 2014, URL:
    • Dediu, H. (2014) Late late majority. Retrieved date: July 8, 2014, URL: http://www.asymco.com/2014/07/08/late-late-majority/
    • (2014)
    • Dediu, H.1
  • 33
    • 33645133251 scopus 로고    scopus 로고
    • An extended privacy calculus model for e-commerce transactions
    • Dinev, T. & Hart, P. (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61-80.
    • (2006) Information Systems Research , vol.17 , pp. 61-80
    • Dinev, T.1    Hart, P.2
  • 34
    • 84876384441 scopus 로고    scopus 로고
    • Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
    • Dinev, T., Xu, H., Smith, J.H. & Hart, P. (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22, 295-316.
    • (2013) European Journal of Information Systems , vol.22 , pp. 295-316
    • Dinev, T.1    Xu, H.2    Smith, J.H.3    Hart, P.4
  • 35
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
    • Vancouver, BC, Canada.
    • Enck, W., Gilbert, P., Chun, B.-G., Cox, L., Jung, J., McDaniel, P. & Sheth, A. (2010a) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of OSDI 2010, pp., Vancouver, BC, Canada.
    • (2010) Proceedings of OSDI 2010
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 36
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
    • Vancouver, BC, Canada.
    • Enck, W., Gilbert, P., Chun, B.-G., Cox, L., Jung, J., McDaniel, P. & Sheth, A. (2010b) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of OSDI 2010, pp. 1-15. Vancouver, BC, Canada.
    • (2010) Proceedings of OSDI 2010 , pp. 1-15
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 37
    • 84943587988 scopus 로고    scopus 로고
    • China now leads the world in new iOS and Android device activations
    • (ed. Flurry) Flurry.
    • Farago, P. (2012) China now leads the world in new iOS and Android device activations. In: China Now Leads the World in New iOS and Android Device Activations, Vol. 2012 (ed. Flurry), pp. Flurry.
    • (2012) China Now Leads the World in New iOS and Android Device Activations , vol.2012
    • Farago, P.1
  • 39
    • 48449101733 scopus 로고    scopus 로고
    • Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets
    • Forman, C., Ghose, A. & Wiesenfeld, B. (2008) Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research, 19, 291-313.
    • (2008) Information Systems Research , vol.19 , pp. 291-313
    • Forman, C.1    Ghose, A.2    Wiesenfeld, B.3
  • 40
    • 0000356178 scopus 로고
    • Two structural equation models: LISREL and PLS applied to consumer exit-voice theory
    • Fornell, C. & Bookstein, F.L. (1982) Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19, 440-452.
    • (1982) Journal of Marketing Research , vol.19 , pp. 440-452
    • Fornell, C.1    Bookstein, F.L.2
  • 42
    • 0032380339 scopus 로고    scopus 로고
    • Coping with consumer fraud: the need for a paradigm shift
    • Friedman, M. (1998) Coping with consumer fraud: the need for a paradigm shift. Journal of Consumer Affairs, 32, 1-12.
    • (1998) Journal of Consumer Affairs , vol.32 , pp. 1-12
    • Friedman, M.1
  • 43
    • 0344096683 scopus 로고    scopus 로고
    • Trust and TAM in online shopping: an integrated model
    • Gefen, D., Karahanna, E. & Straub, D.W. (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27, 51-90.
    • (2003) MIS Quarterly , vol.27 , pp. 51-90
    • Gefen, D.1    Karahanna, E.2    Straub, D.W.3
  • 44
    • 0001178032 scopus 로고    scopus 로고
    • Structural equation modeling and regression: guidelines for research practice
    • Gefen, D., Straub, D. & Boudreau, M.-C. (2000) Structural equation modeling and regression: guidelines for research practice. Communications of the AIS, 4, 1-78.
    • (2000) Communications of the AIS , vol.4 , pp. 1-78
    • Gefen, D.1    Straub, D.2    Boudreau, M.-C.3
  • 45
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-graph: tutorial and annotated example
    • Gefen, D. & Straub, D.W. (2005) A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Communications of the AIS, 16, 91-109.
    • (2005) Communications of the AIS , vol.16 , pp. 91-109
    • Gefen, D.1    Straub, D.W.2
  • 46
    • 84868132018 scopus 로고    scopus 로고
    • The mother of all Android malware has arrived: stolen apps released to the market that root your phone, steal your data, open backdoor
    • date: May 20, 2011, URL:
    • Gingrich, A. (2011) The mother of all Android malware has arrived: stolen apps released to the market that root your phone, steal your data, open backdoor. Retrieved date: May 20, 2011, URL: http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/
    • (2011)
    • Gingrich, A.1
  • 47
  • 48
    • 0141647251 scopus 로고
    • Social support and coping style differences in subjects high and low in interpersonal trust
    • Grace, G.D. & Schill, T. (1986) Social support and coping style differences in subjects high and low in interpersonal trust. Psychological Reports, 59, 584-586.
    • (1986) Psychological Reports , vol.59 , pp. 584-586
    • Grace, G.D.1    Schill, T.2
  • 49
    • 3142664237 scopus 로고    scopus 로고
    • Consumer and business deception on the Internet: content analysis of documentary evidence
    • Grazioli, S. & Jarvenpaa, S.L. (2003) Consumer and business deception on the Internet: content analysis of documentary evidence. International Journal of Electronic Commerce, 7, 93-118.
    • (2003) International Journal of Electronic Commerce , vol.7 , pp. 93-118
    • Grazioli, S.1    Jarvenpaa, S.L.2
  • 51
    • 57049166499 scopus 로고    scopus 로고
    • Formative vs. reflective measurement: comment on Marakas, Johnson, and Clay
    • (2007). Journal of the Association for
    • Hardin, A. M., Chang, J. C.-J. & Fuller, M. A. (2008) Formative vs. reflective measurement: comment on Marakas, Johnson, and Clay (2007). Journal of the Association for Information Systems, 9, 519-534.
    • (2008) Information Systems , vol.9 , pp. 519-534
    • Hardin, A.M.1    Chang, J.C.-J.2    Fuller, M.A.3
  • 53
    • 0038880247 scopus 로고
    • Preference and belief: ambiguity and competence in choice under uncertainty
    • Heath, C. & Tversky, A. (1991) Preference and belief: ambiguity and competence in choice under uncertainty. Journal of Risk and Uncertainty, 4, 5-28.
    • (1991) Journal of Risk and Uncertainty , vol.4 , pp. 5-28
    • Heath, C.1    Tversky, A.2
  • 54
    • 84889663520 scopus 로고    scopus 로고
    • Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
    • Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J. & Rao, H.R. (2014) Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Information Systems Journal, 24, 61-84.
    • (2014) Information Systems Journal , vol.24 , pp. 61-84
    • Herath, T.1    Chen, R.2    Wang, J.3    Banjara, K.4    Wilbur, J.5    Rao, H.R.6
  • 55
    • 33645827800 scopus 로고    scopus 로고
    • Does past success lead analysts to become overconfident?
    • Hilary, G. & Menzly, L. (2006) Does past success lead analysts to become overconfident? Management Science, 52, 489-500.
    • (2006) Management Science , vol.52 , pp. 489-500
    • Hilary, G.1    Menzly, L.2
  • 56
    • 4544246468 scopus 로고    scopus 로고
    • Internet self-efficacy and electronic service acceptance
    • Hsu, M.-H. & Chiu, C.-m. (2004) Internet self-efficacy and electronic service acceptance. Decision Support Systems, 38, 369-381.
    • (2004) Decision Support Systems , vol.38 , pp. 369-381
    • Hsu, M.-H.1    Chiu, C.-m.2
  • 57
    • 33751347629 scopus 로고    scopus 로고
    • Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations
    • Hsu, M.H., Ju, T.L., Yen, C.H. & Chang, C.M. (2007) Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 153-169.
    • (2007) International Journal of Human-Computer Studies , vol.65 , pp. 153-169
    • Hsu, M.H.1    Ju, T.L.2    Yen, C.H.3    Chang, C.M.4
  • 58
    • 33847712553 scopus 로고    scopus 로고
    • The value of privacy assurance: an exploratory field experiment
    • Hui, K.L., Teo, H.H. & Lee, S.Y.T. (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly, 31, 19-33.
    • (2007) MIS Quarterly , vol.31 , pp. 19-33
    • Hui, K.L.1    Teo, H.H.2    Lee, S.Y.T.3
  • 59
    • 84943581248 scopus 로고    scopus 로고
    • Worldwide and U.S. mobile applications, storefronts, and developer 2010-2014 forecasts and year-end 2010 vendor market shares: the 'appification' of everything
    • IDG (2010) Worldwide and U.S. mobile applications, storefronts, and developer 2010-2014 forecasts and year-end 2010 vendor market shares: the 'appification' of everything. Retrieved date: URL: http://www.idg.com/www/pr.nsf/0/1280307E4BE966E8852577F8004FA500
    • (2010)
  • 60
    • 54449093990 scopus 로고    scopus 로고
    • Personality traits and concern for privacy: an empirical study in the context of location-based services
    • Junglas, I.A., Johnson, N.A. & Spitzmuller, C. (2008) Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17, 387-402.
    • (2008) European Journal of Information Systems , vol.17 , pp. 387-402
    • Junglas, I.A.1    Johnson, N.A.2    Spitzmuller, C.3
  • 61
    • 0345280712 scopus 로고    scopus 로고
    • Self-efficacy and disclosure of HIV-positive serostatus to sex partners
    • Kalichman, S.C. & Nachimson, D. (1999) Self-efficacy and disclosure of HIV-positive serostatus to sex partners. Health Psychology, 18, 281.
    • (1999) Health Psychology , vol.18 , pp. 281
    • Kalichman, S.C.1    Nachimson, D.2
  • 64
    • 44249119885 scopus 로고    scopus 로고
    • Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study
    • Kim, D. (2008) Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems, 24, 13-45.
    • (2008) Journal of Management Information Systems , vol.24 , pp. 13-45
    • Kim, D.1
  • 65
    • 36249020892 scopus 로고    scopus 로고
    • A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents
    • Kim, D.J., Ferrin, D.L. & Rao, H.R. (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544-564.
    • (2008) Decision Support Systems , vol.44 , pp. 544-564
    • Kim, D.J.1    Ferrin, D.L.2    Rao, H.R.3
  • 67
    • 33846006255 scopus 로고    scopus 로고
    • The effects of personalization and familiarity on trust and adoption of recommendation agents
    • Komiak, S.Y.X. & Benbasat, I. (2006) The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30, 941-960.
    • (2006) MIS Quarterly , vol.30 , pp. 941-960
    • Komiak, S.Y.X.1    Benbasat, I.2
  • 69
    • 0024788327 scopus 로고
    • The concept of coping modes: relating cognitive person variables to actual coping behavior
    • Krohne, H.W. (1989) The concept of coping modes: relating cognitive person variables to actual coping behavior. Advances in Behaviour Research and Therapy, 11, 235-248.
    • (1989) Advances in Behaviour Research and Therapy , vol.11 , pp. 235-248
    • Krohne, H.W.1
  • 70
    • 84990586591 scopus 로고
    • How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition
    • Krueger, N. & Dickson, P.R. (1994) How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition. Decision Sciences, 25, 385-400.
    • (1994) Decision Sciences , vol.25 , pp. 385-400
    • Krueger, N.1    Dickson, P.R.2
  • 71
    • 84993660913 scopus 로고
    • Privacy as a concept and a social issue: a multidimensional developmental theory
    • Laufer, R.S. & Wolfe, M. (1977) Privacy as a concept and a social issue: a multidimensional developmental theory. Journal of Social Issues, 33, 22-42.
    • (1977) Journal of Social Issues , vol.33 , pp. 22-42
    • Laufer, R.S.1    Wolfe, M.2
  • 73
    • 42649109355 scopus 로고    scopus 로고
    • Why do we trust new technology? A study of initial trust formation with organizational information systems
    • Li, X., Hess, T.J. & Valacich, J.S. (2008) Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17, 39-71.
    • (2008) The Journal of Strategic Information Systems , vol.17 , pp. 39-71
    • Li, X.1    Hess, T.J.2    Valacich, J.S.3
  • 74
    • 84868633960 scopus 로고    scopus 로고
    • Theories in online information privacy research: a critical review and an integrated framework
    • Li, Y. (2012) Theories in online information privacy research: a critical review and an integrated framework. Decision Support Systems, 54, 471-481.
    • (2012) Decision Support Systems , vol.54 , pp. 471-481
    • Li, Y.1
  • 75
    • 79955636557 scopus 로고    scopus 로고
    • Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures
    • Lowry, P.B., Cao, J. & Everard, A. (2011) Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. Journal of Management Information Systems, 27, 165-204.
    • (2011) Journal of Management Information Systems , vol.27 , pp. 165-204
    • Lowry, P.B.1    Cao, J.2    Everard, A.3
  • 76
    • 84901483810 scopus 로고    scopus 로고
    • Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it
    • Lowry, P.B. & Gaskin, J. (2014) Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it. IEEE Transactions on Professional Communication, 57, 123-146.
    • (2014) IEEE Transactions on Professional Communication , vol.57 , pp. 123-146
    • Lowry, P.B.1    Gaskin, J.2
  • 78
    • 69249098534 scopus 로고    scopus 로고
    • The CMC interactivity model: how interactivity enhances communication quality and process satisfaction in lean-media groups
    • Lowry, P.B., Romano, N.C., Jenkins, J.L. & Guthrie, R.W. (2009) The CMC interactivity model: how interactivity enhances communication quality and process satisfaction in lean-media groups. Journal of Management Information Systems, 26, 159-200.
    • (2009) Journal of Management Information Systems , vol.26 , pp. 159-200
    • Lowry, P.B.1    Romano, N.C.2    Jenkins, J.L.3    Guthrie, R.W.4
  • 79
    • 44249091185 scopus 로고    scopus 로고
    • Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites
    • Lowry, P.B., Vance, A., Moody, G., Beckman, B. & Read, A. (2008) Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24, 201-227.
    • (2008) Journal of Management Information Systems , vol.24 , pp. 201-227
    • Lowry, P.B.1    Vance, A.2    Moody, G.3    Beckman, B.4    Read, A.5
  • 80
    • 84889561169 scopus 로고    scopus 로고
    • A picture is worth a thousand words: source credibility theory applied to logo and website design for heightened credibility and consumer trust
    • Lowry, P.B., Wilson, D.W. & Haig, W.L. (2014) A picture is worth a thousand words: source credibility theory applied to logo and website design for heightened credibility and consumer trust. International Journal of Human-Computer Interaction, 30, 63-93.
    • (2014) International Journal of Human-Computer Interaction , vol.30 , pp. 63-93
    • Lowry, P.B.1    Wilson, D.W.2    Haig, W.L.3
  • 81
    • 77951126522 scopus 로고    scopus 로고
    • Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services
    • Luo, X., Li, H., Zhang, J. & Shim, J.P. (2010) Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 49, 222-234.
    • (2010) Decision Support Systems , vol.49 , pp. 222-234
    • Luo, X.1    Li, H.2    Zhang, J.3    Shim, J.P.4
  • 82
    • 71649090601 scopus 로고    scopus 로고
    • Effects of computer self-efficacy and system reliability on user interaction with decision support systems
    • Madhavan, P. & Phillips, R.R. (2010) Effects of computer self-efficacy and system reliability on user interaction with decision support systems. Computers in Human Behavior, 26, 199-204.
    • (2010) Computers in Human Behavior , vol.26 , pp. 199-204
    • Madhavan, P.1    Phillips, R.R.2
  • 83
    • 55349132521 scopus 로고    scopus 로고
    • The evolving nature of the computer self-efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time
    • Marakas, G.M., Johnson, R.D. & Clay, P.F. (2007) The evolving nature of the computer self-efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8, 15-46.
    • (2007) Journal of the Association for Information Systems , vol.8 , pp. 15-46
    • Marakas, G.M.1    Johnson, R.D.2    Clay, P.F.3
  • 84
    • 0032341068 scopus 로고    scopus 로고
    • The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research
    • Marakas, G.M., Yi, M.Y. & Johnson, R.D. (1998) The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research. Information Systems Research, 9, 126-163.
    • (1998) Information Systems Research , vol.9 , pp. 126-163
    • Marakas, G.M.1    Yi, M.Y.2    Johnson, R.D.3
  • 85
    • 73549114871 scopus 로고
    • Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior
    • Mathieson, K. (1991) Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173-191.
    • (1991) Information Systems Research , vol.2 , pp. 173-191
    • Mathieson, K.1
  • 86
    • 0036737236 scopus 로고    scopus 로고
    • Developing and validating trust measures for e-commerce: an integrative typology
    • McKnight, D.H., Choudhury, V. & Kacmar, C. (2002) Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research, 13, 334-359.
    • (2002) Information Systems Research , vol.13 , pp. 334-359
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 87
    • 70349321521 scopus 로고    scopus 로고
    • Toward an understanding of the online consumer's risky behavior and protection practices
    • Milne, G.R., Labrecque, L.I. & Cromer, C. (2009) Toward an understanding of the online consumer's risky behavior and protection practices. Journal of Consumer Affairs, 43, 449-473.
    • (2009) Journal of Consumer Affairs , vol.43 , pp. 449-473
    • Milne, G.R.1    Labrecque, L.I.2    Cromer, C.3
  • 88
    • 41949136902 scopus 로고    scopus 로고
    • Effects of threat cues on attentional shifting, disengagement and response slowing in anxious individuals
    • Mogg, K., Holmes, A., Garner, M. & Bradley, B.P. (2008) Effects of threat cues on attentional shifting, disengagement and response slowing in anxious individuals. Behaviour Research and Therapy, 46, 656-667.
    • (2008) Behaviour Research and Therapy , vol.46 , pp. 656-667
    • Mogg, K.1    Holmes, A.2    Garner, M.3    Bradley, B.P.4
  • 89
    • 84905907007 scopus 로고    scopus 로고
    • When trust and distrust collide: the engendering and role of ambivalence in online consumer behavior
    • Moody, G.D., Galletta, D.F. & Lowry, P.B. (2014) When trust and distrust collide: the engendering and role of ambivalence in online consumer behavior. Electronic Commerce Research and Applications, 13, 266-282.
    • (2014) Electronic Commerce Research and Applications , vol.13 , pp. 266-282
    • Moody, G.D.1    Galletta, D.F.2    Lowry, P.B.3
  • 90
    • 63749116991 scopus 로고    scopus 로고
    • Self-efficacy, overconfidence, and the negative effect on subsequent performance: a field study
    • Moores, T.T. & Chang, J.C.-J. (2009) Self-efficacy, overconfidence, and the negative effect on subsequent performance: a field study. Information & Management, 46, 69-76.
    • (2009) Information & Management , vol.46 , pp. 69-76
    • Moores, T.T.1    Chang, J.-J.2
  • 91
    • 0343468534 scopus 로고
    • Telling more than we can know: verbal reports on mental processes
    • Nisbett, R.E. & Wilson, T.D. (1977) Telling more than we can know: verbal reports on mental processes. Psychological Review, 84, 231-258.
    • (1977) Psychological Review , vol.84 , pp. 231-258
    • Nisbett, R.E.1    Wilson, T.D.2
  • 92
    • 33646032387 scopus 로고    scopus 로고
    • Self-accountability emotions and fear appeals: motivating behavior
    • Passyn, K. & Sujan, M. (2006) Self-accountability emotions and fear appeals: motivating behavior. Journal of Consumer Research, 32, 583-589.
    • (2006) Journal of Consumer Research , vol.32 , pp. 583-589
    • Passyn, K.1    Sujan, M.2
  • 93
    • 84867928512 scopus 로고    scopus 로고
    • Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation
    • Pavlou, P.A. (2002) Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. The Journal of Strategic Information Systems, 11, 215-243.
    • (2002) The Journal of Strategic Information Systems , vol.11 , pp. 215-243
    • Pavlou, P.A.1
  • 94
    • 33749347189 scopus 로고    scopus 로고
    • Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior
    • Pavlou, P.A. & Fygenson, M. (2006) Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior. MIS Quarterly, 30, 115-143.
    • (2006) MIS Quarterly , vol.30 , pp. 115-143
    • Pavlou, P.A.1    Fygenson, M.2
  • 95
    • 2442676514 scopus 로고    scopus 로고
    • Building effective online marketplaces with institution-based trust
    • Pavlou, P.A. & Gefen, D. (2004) Building effective online marketplaces with institution-based trust. Information Systems Research, 15, 37-59.
    • (2004) Information Systems Research , vol.15 , pp. 37-59
    • Pavlou, P.A.1    Gefen, D.2
  • 96
    • 27644441621 scopus 로고    scopus 로고
    • Adoption of mobile internet services: an exploratory study of mobile commerce early adopters
    • Pedersen, E.P. (2005) Adoption of mobile internet services: an exploratory study of mobile commerce early adopters. Journal of Organizational Computing and Electronic Commerce, 15, 203-222.
    • (2005) Journal of Organizational Computing and Electronic Commerce , vol.15 , pp. 203-222
    • Pedersen, E.P.1
  • 97
    • 79952618367 scopus 로고    scopus 로고
    • Integrating the smartphone into a sound environmental information systems strategy: principles, practices and a research agenda
    • Pitt, L.F., Parent, M., Junglas, I., Chan, A. & Spyropoulou, S. (2011) Integrating the smartphone into a sound environmental information systems strategy: principles, practices and a research agenda. The Journal of Strategic Information Systems, 20, 27-37.
    • (2011) The Journal of Strategic Information Systems , vol.20 , pp. 27-37
    • Pitt, L.F.1    Parent, M.2    Junglas, I.3    Chan, A.4    Spyropoulou, S.5
  • 99
    • 84943588173 scopus 로고    scopus 로고
    • The surprise behind the mobile app numbers
    • Huffington Post, date: July 15, 2011, URL:
    • Reed, M. (2011) The surprise behind the mobile app numbers. Huffington Post, Retrieved date: July 15, 2011, URL: http://www.huffingtonpost.com/morgan-reed/the-surprise-behind-the-m_b_895397.html
    • (2011)
    • Reed, M.1
  • 100
    • 56749152239 scopus 로고    scopus 로고
    • SmartPLS 2.0 (M3) Beta
    • date: October 30, 2010, url:.
    • Ringle, C. M., Wende, S. & Will, S. (2005) SmartPLS 2.0 (M3) Beta. Retrieved date: October 30, 2010, url: http://www.smartpls.de.
    • (2005)
    • Ringle, C.M.1    Wende, S.2    Will, S.3
  • 102
    • 33845898497 scopus 로고    scopus 로고
    • The economic consequences of accounting fraud in product markets: theory and a case from the U.S. telecommunications industry (WorldCom)
    • Sadka, G. (2006) The economic consequences of accounting fraud in product markets: theory and a case from the U.S. telecommunications industry (WorldCom). American Law and Economics Review, 8, 439-475.
    • (2006) American Law and Economics Review , vol.8 , pp. 439-475
    • Sadka, G.1
  • 104
    • 84943581980 scopus 로고    scopus 로고
    • App genome report
    • App Genome Report - February 2011, Lookout Mobile Security.
    • Security, L. M. (2011) App genome report. In: App Genome Report - February 2011, Vol. 2011, pp. Lookout Mobile Security.
    • (2011) , vol.2011
    • Security, L.M.1
  • 106
    • 78650596113 scopus 로고    scopus 로고
    • iPhone privacy
    • Black Hat DC 2010 30. Black Hat, January 3, Arlington, VA, USA.
    • Seriot, N. (2010) iPhone privacy. Black Hat DC 2010, pp. 30. Black Hat, January 3, Arlington, VA, USA.
    • (2010)
    • Seriot, N.1
  • 107
    • 84876992358 scopus 로고    scopus 로고
    • Nearly half of American adults are smartphone owners
    • Pew Research, date
    • Smith, A. (2012) Nearly half of American adults are smartphone owners. Pew Research, Retrieved date: url:
    • (2012)
    • Smith, A.1
  • 108
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: measuring individual's concerns about organizational practices
    • Smith, H.J., Milberg, S.J. & Burke, S.J. (1996) Information privacy: measuring individual's concerns about organizational practices. MIS Quarterly, 20, 167-196.
    • (1996) MIS Quarterly , vol.20 , pp. 167-196
    • Smith, H.J.1    Milberg, S.J.2    Burke, S.J.3
  • 110
    • 54249132563 scopus 로고    scopus 로고
    • Information needs and risk perception as predictors of risk information seeking
    • Ter Huurne, E. & Gutteling, J. (2008) Information needs and risk perception as predictors of risk information seeking. Journal of Risk Research, 11, 847-862.
    • (2008) Journal of Risk Research , vol.11 , pp. 847-862
    • Ter Huurne, E.1    Gutteling, J.2
  • 111
    • 70449591802 scopus 로고    scopus 로고
    • How to trust? The importance of self-efficacy and social trust in public responses to industrial risks
    • ter Huurne, E.F.J. & Gutteling, J.M. (2009) How to trust? The importance of self-efficacy and social trust in public responses to industrial risks. Journal of Risk Research, 12, 809-824.
    • (2009) Journal of Risk Research , vol.12 , pp. 809-824
    • ter Huurne, E.F.J.1    Gutteling, J.M.2
  • 113
    • 44249124273 scopus 로고    scopus 로고
    • Examining trust in information technology artifacts: the effects of system quality and culture
    • Vance, A., Elie-Dit-Cosaque, C. & Straub, D.W. (2008) Examining trust in information technology artifacts: the effects of system quality and culture. Journal of Management Information Systems, 24, 73-100.
    • (2008) Journal of Management Information Systems , vol.24 , pp. 73-100
    • Vance, A.1    Elie-Dit-Cosaque, C.2    Straub, D.W.3
  • 114
    • 43649087245 scopus 로고    scopus 로고
    • Technology acceptance model 3 and a research agenda on interventions
    • Venkatesh, V. & Bala, H. (2008) Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39, 273-315.
    • (2008) Decision Sciences , vol.39 , pp. 273-315
    • Venkatesh, V.1    Bala, H.2
  • 115
    • 0033872521 scopus 로고    scopus 로고
    • A theoretical extension of the technology acceptance model: four longitudinal field studies
    • Venkatesh, V. & Davis, F.D. (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46, 186-204.
    • (2000) Management Science , vol.46 , pp. 186-204
    • Venkatesh, V.1    Davis, F.D.2
  • 116
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Venkatesh, V., Morris, M.G., Davis, G.B. & Davis, F.D. (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425-478.
    • (2003) MIS Quarterly , vol.27 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 117
    • 57349183755 scopus 로고    scopus 로고
    • Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa
    • Viosca, R.C. Jr., Bergiel, B.J. & Balsmeier, P. (2004) Effects of the electronic Nigerian money fraud on the brand equity of Nigeria and Africa. Management Research News, 27, 11-20.
    • (2004) Management Research News , vol.27 , pp. 11-20
    • Viosca, R.C.1    Bergiel, B.J.2    Balsmeier, P.3
  • 118
    • 52149116017 scopus 로고    scopus 로고
    • The effects of change control and management review on software flexibility and project performance
    • 438-433
    • Wang, E.T.G., Ju, P.-H., Jiang, J.J. & Klein, G. (2008) The effects of change control and management review on software flexibility and project performance. Information & Management, 45, 438-433.
    • (2008) Information & Management , vol.45
    • Wang, E.T.G.1    Ju, P.-H.2    Jiang, J.J.3    Klein, G.4
  • 120
    • 38349112609 scopus 로고    scopus 로고
    • Recommendation agents for electronic commerce: effects of explanation facilities on trusting beliefs
    • Wang, W.Q. & Benbasat, I. (2007) Recommendation agents for electronic commerce: effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23, 217-246.
    • (2007) Journal of Management Information Systems , vol.23 , pp. 217-246
    • Wang, W.Q.1    Benbasat, I.2
  • 121
    • 33644786234 scopus 로고    scopus 로고
    • Predicting consumer intention to use mobile service
    • Wang, Y.-S., Lin, H.-H. & Luarn, P. (2006) Predicting consumer intention to use mobile service. Information Systems Journal, 16, 157-179.
    • (2006) Information Systems Journal , vol.16 , pp. 157-179
    • Wang, Y.-S.1    Lin, H.-H.2    Luarn, P.3
  • 122
    • 27744445678 scopus 로고    scopus 로고
    • Adult attachment, social self-efficacy, self-disclosure, loneliness, and subsequent depression for freshman college students: a longitudinal study
    • Wei, M., Russell, D.W. & Zakalik, R.A. (2005) Adult attachment, social self-efficacy, self-disclosure, loneliness, and subsequent depression for freshman college students: a longitudinal study. Journal of Counseling Psychology, 52, 602.
    • (2005) Journal of Counseling Psychology , vol.52 , pp. 602
    • Wei, M.1    Russell, D.W.2    Zakalik, R.A.3
  • 123
    • 80053127414 scopus 로고    scopus 로고
    • Locus of control and location privacy: an empirical study in Singapore
    • Xu, H. (2010) Locus of control and location privacy: an empirical study in Singapore. Journal of Global Information Technology Management, 13, 63-87.
    • (2010) Journal of Global Information Technology Management , vol.13 , pp. 63-87
    • Xu, H.1
  • 124
    • 77749333391 scopus 로고    scopus 로고
    • The role of push-pull technology in privacy calculus: the case of location-based services
    • Xu, H., Teo, H.H., Tan, B.C.Y. & Agarwal, R. (2010) The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26, 135-173.
    • (2010) Journal of Management Information Systems , vol.26 , pp. 135-173
    • Xu, H.1    Teo, H.H.2    Tan, B.C.Y.3    Agarwal, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.