[1] Kietzmann J. H., Hermkens K., McCarthy I. P., et al. Social Media? Get Serious! Understanding The Functional Building Blocks of Social Media[J].Business Horizons, 2011,54(3):241-251
[2] Xu C., Ryan S., Prybutok V., et al. It Is Not For Fun: An Examination of Social Network Site Usage[J].Information & Management, 2012,49(5):210-217
[3] 孟欣.试论国内社会化媒体平台的用户隐私保护[D].浙江工业大学硕士学位论文, 2012
[4] Kantar. 2014中国社交媒体影响研究[EB/OL].http://cn.kantar.com, 2014
[5] Gratch J., Marsella S. A Domain-Independent Framework For Modeling Emotion[J].Cognitive Systems Research, 2004,5(4):269-306
[6] Beaudry A., Pinsonneault A. The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use[J].MIS Quarterly, 2010,34(4):689-710
[7] Junglas I. A., Johnson N. A., Spitzmüller C. Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services[J].European Journal of Information Systems, 2008,17(4):387-402
[8] Marett K., McNab A. L., Harris R. B. Social Networking Websites and Posting Personal Information: An Evaluation of Protection Motivation Theory[J].AIS Transactions on Human-Computer Interaction, 2011,3(3):170-188
[9] Brosnan M., Joiner R., Gavin J., et al. The Impact of Pathological Levels of Internet-Related Anxiety on Internet Usage[J].Journal of Educational Computing Research, 2012,46(4):341-356
[10] Bhattacherjee A. Understanding Information Systems Continuance: An Expectation-Confirmation Model[J].MIS Quarterly, 2001,25(3):351-370
[11] Dinev T., Hart P. Internet Privacy Concerns and Social Awareness As Determinants of Intention to Transact[J].International Journal of Electronic Commerce, 2006,10(2):7-29
[12] Crossler R. E., Johnston A. C., Lowry P. B., et al. Future Directions For Behavioral Information Security Research[J].Computers & Security, 2013,32:90-101
[13] 李凯,孙旭丽,严建援.移动支付系统使用意愿影响因素分析:基于交换理论的实证研究[J].管理评论, 2013,25(3):91-100
[14] 杨永清,张金隆,李楠,等.移动增值服务消费者感知风险前因的实证研究[J].管理评论, 2012,24(3):115-123
[15] 杨姝,王刊良.互联网环境中适合中国消费者的隐私关注量表研究[J].情报杂志, 2008,27(10):3-7
[16] Xu H., Gupta S., Rosson M. B., et al. Measuring Mobile Users' Concerns for Information Privacy[C].In proceedings of the the 33rd International Conference on Information Systems, Orlando, 2012
[17] Westbrook R. A., Oliver R. L. The Dimensionality of Consumption Emotion Patterns and Consumer Satisfaction[J].Journal of Consumer Research, 1991,18(1):84-91
[18] Li H., Sarathy R., Xu H. The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors[J].Decision Support Systems, 2011,51(3):434-445
[19] 赵占波,杜晓梦,陈凯.网络强迫性购买倾向的影响机制及应对措施研究[J].管理评论, 2014,26(4):130-141
[20] Bandura A. Social Foundations of Thought and Action[M].Englewood Cliffs: Prentice Hall, 1986
[21] Koufaris M. Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior[J].Information Systems Research, 2002,13(2):205-223
[22] 韩超群,杨水清,曹玉枝.移动服务用户采纳行为的整合模型—基于移动阅读的实证研究[J].软科学, 2012,26(3):134-139
[23] Lin H., Fan W., Chau P. Y. Determinants of Users' Continuance of Social Networking Sites: A Self-Regulation Perspective[J].Information & Management, 2014,51(5):595-603
[24] Venkatesh V., Morris M. G., Davis G. B., et al. User Acceptance of Information Technology: Toward a Unified View[J].MIS Quarterly, 2003,27(3):425-478
[25] Deng Z., Mo X., Liu S. Comparison of the Middle-Aged and Older Users' Adoption of Mobile Health Services in China[J].International journal of medical informatics, 2014,83(3):210-224
[26] Kathryn M. C., Jeffrey L., Kinshuk. Comparing the Role of ICT Literacy and Anxiety in the Adoption of Mobile Learning[J].Computers in Human Behavior, 2014,39:8-19
[27] Witte K. Fear As Motivator, Fear As Inhibitor: Using the Extended Parallel Process Model to Explain Fear Appeal Successes and Failures[M] //Andersen P.A., Guerrero L.K.(E.d.) Handbook of Communication and Emotion: Research, Theory, Applications, and Contexts. San Diego, CA, US; Academic Press, 1998
[28] Witte K. Fear Control and Danger Control: A Test of the Extended Parallel Process Model (EPPM)[J].Communications Monographs, 1994,61(2):113-134
[29] 刘勍勍,左美云,刘满成.基于期望确认理论的老年人互联网应用持续使用实证分析[J].管理评论, 2012,24(5):89-101
[30] Larsen T. J., Sšrebš A. M., Sšrebš Ø. The Role of Task-technology Fit As Users' Motivation to Continue Information System Use[J].Computers in Human Behavior, 2009,25(3):778-784
[31] Bulgurcu B. Antecedents and Outcomes of Information Privacy Concerns in Online Social Networking: A Theoretical Perspective[C].In Proceedings of JAIS Theory Development Workshop, 2010
[32] 袁金巧.基于隐私计算理论的移动医疗服务用户采纳意愿研究[D].哈尔滨工业大学硕士学位论文, 2013
[33] 张冕,鲁耀斌.隐私安全与强制信息对移动服务用户行为的影响机制研究[J].商业时代, 2014,(1):41-42
[34] Dillard J. P., Shen L. On the Nature of Reactance and Its Role in Persuasive Health Communication[J].Communication Monographs, 2005,72(2):144-168
[35] Edwards S. M., Li H., Lee J. H. Forced Exposure and Psychological Reactance: Antecedents and Consequences of the Perceived Intrusiveness of Pop-up Ads[J].Journal of Advertising, 2002,31(3):83-95
[36] Solove D. J. A Taxonomy of Privac [J].University of Pennsylvania Law Review, 2006,154(3):477-564
[37] Bélanger F., Crossler RE. Privacy in The Digital Age: A Review of Information Privacy Research in Information Systems[J].MIS Quarterly, 2011,35(4):1017-1042
[38] 刁塑.新兴电子商务消费者隐私关注与采纳行为研究[D].北京邮电大学博士学位论文, 2010
[39] 周涛,鲁耀斌.隐私关注对移动商务用户采纳行为影响的实证分析[J].管理学报, 2010,7(7):1046-1051
[40] 彭希羡,冯祝斌,孙霄凌.微博用户持续使用意向的理论模型及实证研究[J].现代图书情报技术, 2012,(11):78-85
[41] 张冕,鲁耀斌.移动服务持续使用过程中促进因素和抑制因素的平衡研究[J].图书情报工作, 2012,56(14):135-140
[42] Xu H., Teo H. H., Tan B. C., et al. The Role of Push-pull Technology in Privacy Calculus: The Case of Location-based Services[J].Journal of Management Information Systems, 2009,26(3):135-174
[43] Järnefelt P. An Empirical Study on the Adoption of Mobile Location-Based Advertising[D].Aalto University School of Business doctoral dissertation, 2013
[44] Wu I. L., Huang C. Y. Analysing Complaint Intentions in Online Shopping: The Antecedents of Justice and Technology Use and the Mediator of Customer Satisfaction[J].Behaviour & Information Technology, 2015,34(1):69-80
[45] 郑大庆,李俊超,黄丽华.“3Q”大战背景下的软件持续使用研究:基于修订的“期望-确认”模型[J].中国管理科学, 2014,22(9):123-132
[46] Lin C., Lin I. C., Roan J. Barriers to Physicians' Adoption of Healthcare Information Technology: An Empirical Study on Multiple Hospitals[J].Journal of Medical Systems, 2012,36(3):1965-1977
[47] Venkatesh V. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model[J].Information Systems Research, 2000,11(4):342-365
[48] Liang H., Xue Y. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective [J].Journal of the Association for Information Systems, 2010,11(7):394-413
[49] Snipes R. L., LaTour M. S., Bliss S. J. A Model of the Effects of Self-efficacy on the Perceived Ethicality and Performance of Fear Appeals in Advertising[J].Journal of Business Ethics, 1999,19(3):273-285
[50] Liang H., Xue Y. Avoidance of Information Technology Threats: A Theoretical Perspective[J].MIS Quarterly, 2009,33(1):71-90
[51] CNNIC.中国移动互联网调查研究报告[EB/OL].http://cnnic.com.cn/, 2014
[52] CNNIC.2014年中国社交类应用用户行为研究报告[EB/OL].http://cnnic.com.cn/, 2014
[53] Rhee H. S., Kim C., Ryu Y. U. Self-efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior[J].Computers & Security, 2009,28(8):816-826
[54] Cronin Jr J. J., Brady M. K., Hult G. T. M. Assessing the Effects of Quality, Value, and Customer Satisfaction on Consumer Behavioral Intentions in Service Environments[J].Journal of Retailing, 2000,76(2):193-218
[55] Aiken L. S., West S. G. Multiple Regression: Testing and Interpreting Interactions[M].Newbury Park, ZA: Sage, 1991
[56] 温忠麟,张雷,侯杰泰,等.中介效应检验程序及其应用[J].心理学报, 2004,36(5):614-620 |