Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
16
Page No.
2992 - 2998
References
Ary, D., L.C. Jacobs, A. Razavieh and C.K. Sorensen, 2010. Introduction to Research in Education. 8th Edn., Cengage Learning, Belmont, CA., USA., ISBN-13: 978-0495601227, Pages: 696.
Awang, Z., 2012. A Handbook on SEM: Structural Equation Modeling. 4th Edn., Centre For Graduate Studies, Kuala Lumpur, Malaysia.
Baumgartner, H. and C. Homburg, 1996. Application of structural equation modeling in marketing and consumer research: A review. Int. J. Res. Market., 13: 139-161.
CrossRef | Burgoon, J.K., R. Parrott, B.A. Le Poire, D.L. Kelley, J.B. Walther and D. Perry, 1989. Maintaining and restoring privacy through communication in different types of relationships. J. Social Personal Relationships, 6: 131-158.
CrossRef | Direct Link | Byrne, B.M., 2013. Structural Equation Modelling with Lisrel, Prelis and Simplis: Basic Concepts, Applications and Programming. 3rd Edn., Lawrence Erlbaum Associates Inc, Mahwah, New Jersey, ISBN:0-8058-2924-5,.
Cohen, J., P. Cohen, S.G. West and L.S. Aiken, 2002. Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. 3rd Edn., Routledge, New York, ISBN: 9780203774441, Pages: 536.
Colquitt, J.A., 2001. On the dimensionality of organizational justice: A construct validation of a measure. J. Applied Psychol., 86: 386-400.
CrossRef | Direct Link | Dhawan, S. and S. Goel, 2014. Analysis of pattern of information revelation and site use behavior in social networking sites. Int. J. Comput. Applic. Technol. Res., 3: 42-44.
Direct Link | Dinev, T. and P. Hart, 2004. Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inform. Technol., 23: 413-422.
CrossRef | Direct Link | Doll, W.J., W. Xia and G. Torkzadeh, 1994. A confirmatory factor analysis of the end-user computing satisfaction instrument. MIS Q., 18: 453-461.
CrossRef | Direct Link | Feng, Y. and W. Xie, 2014. Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav., 33: 153-162.
CrossRef | Direct Link | Gibbs, J.L., N.B. Ellison and C.H. Lai, 2011. First comes love, then comes google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res., 38: 70-100.
CrossRef | Direct Link | Goodwin, C., 1992. A conceptualization of motives to seek privacy for nondeviant consumption. J. Consum. Psychol., 1: 261-284.
CrossRef | Direct Link | Jabar, J., 2011. An empirical study of strategic technology alliances and the performance of Malaysian manufactures. Msc Thesis, University of South Australia, Adelaide, South Australia.
Ji, P. and P.S. Lieber, 2010. Am I safe? Exploring relationships between primary territories and online privacy. J. Internet Commerce, 9: 3-22.
CrossRef | Direct Link | Jia, H., P.J. Wisniewski, H. Xu, M.B. Rosson and J.M. Carroll, 2015. Risk-taking as a learning process for shaping teen's online information privacy behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, February 14-15, 2015, ACM, Vancouver, British, ISBN:978-1-4503-2922-4, pp: 583-599.
Jiang, Z., C.S. Heng and B.C. Choi, 2013. Privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res., 24: 579-595.
CrossRef | Direct Link | Joreskog, K.G., 1993. Testing Structural Equation Models. In: Testing Structural Equation Models, Bollen, K.A. and J.S. Long (Eds.). Chapter 12, Sage Publication, Newbury Park, CA., USA., ISBN-13: 978-0803945074, pp: 294-316.
Korzaan, M.L. and K.T. Boswell, 2008. The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst., 48: 15-24.
Direct Link | Lwin, M.O., B. Li and R.P. Ang, 2011. Stop bugging me: An examination of adolescents protection behavior against online harassment. J. Adolescence, 35: 31-41.
Direct Link | Marett, K., A.L. McNab and R.B. Harris, 2011. Social networking websites and posting personal information: An evaluation of protection motivation theory. AIS Trans. Hum.-Comput. Interact., 3: 170-188.
Direct Link | McDonald, A.M. and L.F. Cranor, 2010. Americans attitudes about internet behavioral advertising practices. Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, October 4-8, 2008, ACM, Chicago, Illinois, ISBN:978-1-4503-0096-4, pp: 63-72.
Mohamed, N. and I.H. Ahmad, 2012. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Comput. Hum. Behav., 28: 2366-2375.
CrossRef | Direct Link | Petronio, S., 2002. Communication Privacy Management Theory. In: Boundaries of Privacy: Dialectics of Disclosure, Petronio, S. (Ed.). State University of New York Press, USA., ISBN-13: 9780791455159, pp: 168-180.
Pinsonneault, A. and N. Heppel, 1997. Anonymity in group support systems research: A new conceptualization, measure and contingency framework. J. Manage. Inform. Syst., 14: 89-108.
CrossRef | Direct Link | Rhee, H.S., C. Kim and Y.U. Ryu, 2009. Self-efficacy in information security: Its influence on end users information security practice behavior. Comput. Secur., 28: 816-826.
Direct Link | Rogers, R.W., 1983. Cognitive and Physiological Process in fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. In: Social Psychophysiology: A Sourcebook, Cacioppo, J.T. and R.E. Petty (Eds.). Guildford Press, London, UK., ISBN-13: 9780898626261, pp: 153-176.
Salleh, N., R. Hussein, N. Mohamed, N.S.A. Karim, A.R. Ahlan and U. Aditiawarman, 2012. Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. J. Internet Social Networking Virtual Commun. 10.5171/2012.281869
Sedek, M., R. Mahmud, H.A. Jalil and S.M. Daud, 2012. Types and levels of ubiquitous technology use among ICT undergraduates. Procedia-Social Behav. Sci., 64: 255-264.
CrossRef | Direct Link | Smit, E.G., V.G. Noort and H.A. Voorveld, 2014. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe. Comput. Hum. Behav., 32: 15-22.
Direct Link | Smith, H.J., S.J. Milberg and S. Burke, 1996. Information privacy: Measuring individual's concerns about organizational practices. MIS Quart., 20: 167-196.
CrossRef | Direct Link | Statista, 2016. Leading global social networks 2016. Statista Database company, http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
Vandebosch, H. and K. van Cleemput, 2009. Cyberbullying among youngsters: Profiles of bullies and victims. New Media Soc., 11: 1349-1371.
CrossRef | Direct Link | Viegas, F.B., 2005. Bloggers' expectations of privacy and accountability: An initial survey. J. Comput.-Mediated Commun., Vol. 10, No. 3. 10.1111/j.1083-6101.2005.tb00260.x
Walther, J.B., 1996. Computer-mediated communication: Impersonal, interpersonal and hyperpersonal interaction. Commun. Res., 23: 3-43.
CrossRef | Direct Link | Warren, S.D. and L.D. Brandeis, 1890. The right to privacy. Harvard Law Rev., 4: 193-220.
Direct Link | Xu, H., T. Dinev, J. Smith and P. Hart, 2011. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst., 12: 798-824.
Direct Link | Yao, M.Z. and A.J. Flanagin, 2006. A self-awareness approach to computer-mediated communication. Comput. Hum. Behav., 22: 518-544.
CrossRef | Direct Link | Youn, S., 2009. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J. Consum. Affairs, 43: 389-418.
CrossRef | Direct Link | Zheleva, E. and L. Getoor, 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. Proceedings of the 18th International Conference on World Wide Web, April 20-24, 2009, Madrid, Spain, pp: 531-540.
Zlatolas, L.N., T. Welzer, M. Hericko and M. Holbl, 2015. Privacy antecedents for SNS self-disclosure: The case of Facebook. Comput. Hum. Behav., 45: 158-167.
CrossRef | Direct Link | Zwick, D. and N. Dholakia, 2014. Whose identity is it anyway? Consumer representation in the age of database marketing. J. Macromarketing, 24: 31-43.