|
中文部分 1.電腦處理個人資料保護法(民104修正)。 網路部分 1.Youtube (2017)。Youtube台灣。取自:https://www.youtube.com/?gl=TW&hl=zh-TW (2016/02/03)。 2.Youtube新聞中心(2014)。Youtube台灣。取自: https://www.youtube.com/yt/press/zh-TW/statistics.html (2017/02/01)。
英文部分 1.Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999, November). Privacy in e-commerce: examining user scenarios and privacy preferences, Electronic Commerce. Proceedings of the 1st ACM conference on Electronic commerce, Denver, CO. 2.Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26-33. 3.Adomavicius, G., & Tuzhilin, A. (2005a). Personalization technologies: a process-oriented perspective. Communications of the ACM, 48(10), 83-90. 4.Adomavicius, G., & Tuzhilin, A. (2005b). Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE transactions on knowledge and data engineering, 17(6), 734-749. 5.Allen, A. L. (1988). Uneasy access: Privacy for women in a free society. Totowa, NJ: Rowman and Littlefield. 6.Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA: Brooks/Cole. 7.Angst, C.M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370. 8.Baek, T. H., & Morimoto, M. (2012). Stay away from me. Journal of advertising, 41(1), 59-76. 9.Budnitz, M. E. (1997). Privacy protection for consumer transactions in electronic commerce: why self-regulation is inadequate. South Carolina Law Review, 49, 847-867. 10.Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2), 181-202. 11.Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. 12.Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334. 13.Culnan, M. J. (1993). " How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS quarterly, 341-363. 14.Culnan, M. J. (2000). Protecting privacy online: Is self-regulation working? Journal of Public Policy & Marketing, 19(1), 20-26. 15.Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115. 16.Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342. 17.Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673-687. 18.Culnan, M., Smith, H., & Bies, R. (1994). Law, privacy, and organizations: The corporate obsession to know v. the individual right not to be known. The Legalistic Organization, Thousand Oaks, CA, 199-211. 19.Day, R. L. (1980). Research perspectives on consumer complaining behavior. Theoretical developments in marketing, 211-215. 20.Day, R. L., & Landon, E. L. (1977). Toward a theory of consumer complaining behavior. Consumer and industrial buying behavior, 95, 425-437. 21.Deshpande, R., & Zaltman, G. (1982). Factors affecting the use of market research information: A path analysis. Journal of marketing research, 14-31. 22.Devellis, R. F., & Dancer, L. S. (1991). Scale development: theory and applications. Journal of Educational Measurement, 31(1), 79-82. 23.Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents- measurement validity and a regression model. Behavior & Information Technology, 23(6), 413-422. 24.Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. 25.Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance–An empirical investigation. The Journal of Strategic Information Systems, 17(3), 214-233. 26.Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316. 27.EU Commission. (2011). Attitudes on data protection and electronic identity in the European Union. Eurobarometer S. Surveys (359). Bruxelles, Belgium: European Commission. 28.Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International journal of human-computer studies, 59(4), 451-474. 29.Federal Trade Commission [FTC] (1998), Consumer privacy on the World Wide Web. Washington, DC: FTC. 30.Federal Trade Commission [FTC] (2000), Privacy online: Fair information practices in the electronic marketplace. Washington, DC: FTC. 31.Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50. 32.Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. The Journal of Marketing, 1-19. 33.Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9, 1-17. 34.Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4), 302-318. 35.Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks, Computer and Communications Security. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA. 36.Gunther, O., & Spiekermann, S. (2005). RFID and the perception of control: The consumer’s view, Communications of the ACM, 48(9), 73-76 37.Hughes, A. M. (1994). Strategic database marketing: the masterplan for starting and managing a profitable, Customer-based Marketing Program. NY: McGraw-Hill. 38.Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: an exploratory field experiment. Mis Quarterly, 19-33. 39.Jackson, R., & Wang, P. (1994). Strategic database marketing. Lincolnwood, IL: NTC Publishing. 40.Jeckmans, A. J., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R. L., & Tang, Q. (2013). Privacy in recommender systems. Social media retrieval, 11, 263-281. 41.Karimi, J., Somers, T. M., & Gupta, Y. P. (2001). Impact of information technology management practices on customer service. Journal of Management Information Systems, 17(4), 125-158. 42.Kobsa, A., & Teltzrow, M. (2005). Impacts of contextualized communication of privacy practices and personalization benefits on purchase behavior and perceived quality of recommendation. Beyond Personalization, 48-53. 43.Kohli, A. K., & Jaworski, B. J. (1990). Market orientation: the construct, research propositions, and managerial implications. The Journal of Marketing, 1-18. 44.Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42. 45.Laufer, R. S., Proshansky, H. M. & Wolfe, M. (1976). Some Analytic Dimensions of Privacy. NY: Holt, Rinehart & Winston. 46.Leppaniemi, M., & Karjaluoto, H. (2005). Factors influencing consumers' willingness to accept mobile advertising: a conceptual model. International Journal of Mobile Communications, 3(3), 197-213. 47.Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71. 48.Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumer’s decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51, 434-445. 49.Li, Y. (2011). Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453-496. 50.Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481. 51.Luo, X. (2002). Trust production and privacy concerns on the Internet: a framework based on relationship marketing and social exchange theory, Industrial Marketing Management, 31, 111-118. 52.Lwin, M. O., & Williams, J. D. (2003). A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters, 14(4), 257-272. 53.Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585. 54.Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355. 55.McCallister, E., Grance, T., & Scarfone, K. A. (2010). Guide to protecting the confidentiality of personally identifiable information (PII). Washington, DC: National Institute of Standards and Technology. 56.Milne, G. R., & Boza, M. E. (1999). Trust and concern in consumers’ perceptions of marketing information management practices. Journal of interactive Marketing, 13(1), 5-24. 57.Milne, G. R., Bahl, S., & Rohm, A. (2008). Toward a framework for assessing covert marketing practices. Journal of Public Policy & Marketing, 27(1), 57-62. 58.Mittal, B., & Lassar, W. M. (1996). The role of personalization in service encounters. Journal of retailing, 72(1), 95-109. 59.Mulvenna, M. D., Anand, S. S., & Büchner, A. G. (2000). Personalization on the Net using Web mining: introduction. Communications of the ACM, 43(8), 122-125. 60.Murthi, B. P. S., & Sarkar, S. (2003). The role of the management sciences in research on personalization. Management Science, 49(10), 1344-1362. 61.Nash, E. L. (1993). Database Marketing: The Ultimate Selling Tool. New York: McGraw-Hill. 62.Nelson, M. R. (1994). We have the information you want, but getting it will cost you!: held hostage by information overload. Crossroads, 1(1), 11-15. 63.Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. 64.Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Direct Marketing, 9(3), 46-60. 65.O’Brien, T. (2000). Officials worried over a sharp rise in identity theft. New York Times, (April 3), 1. 66.Ohkubo, M., Suzuki, K., & Kinoshita, S. (2005). RFID privacy issues and technical challenges. Communications of the ACM, 48(9), 66-71. 67.Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63-77. 68.Pavlou, P. A. (2011). State of the information privacy literature: where are we now and where should we go? MIS Quarterly, 35 (4) 977-988. 69.Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134. 70.Petronio, S. (2012). Boundaries of privacy: Dialectics of disclosure. NY: State University of New York Press. 71.Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41. 72.Pine, B. J. (1993). Mass customization: the new frontier in business competition. Boston: Harvard Business Press. 73.Resnick, P., & Varian, H. R. (1997). Recommender systems. Communications of the ACM, 40(3), 56-58. 74.Resnick, P., Kuwabara, K., Zeckhauser, R., & Friedman, E. (2000). Reputation systems. Communications of the ACM, 43(12), 45-48. 75.Ross, I. (1979). An information processing theory of consumer choice. Journal of Marketing (pre-1986), 43(000003), 124. 76.Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy & marketing, 19(1), 62-73. 77.Singh, J. (1988). Consumer complaint intentions and behavior: definitional and taxonomical issues. The journal of Marketing, 93-107. 78.Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 35(4), 989-1016. 79.Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly, 167-196. 80.Solove, D. J. (2004) The Digital Person: Technology and Privacy in the Information Age. NY: New York University Press. 81.Son, J. Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: a taxonomy and a nomological model. Mis Quarterly, 503-529. 82.Sultan, F., Rohm, A. J., & Gao, T. T. (2009). Factors influencing consumer acceptance of mobile marketing: a two-country study of youth markets. Journal of Interactive Marketing, 23(4), 308-320. 83.Sundar, S. S., & Marathe, S. S. (2010). Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research, 36(3), 298-322. 84.Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006), Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 415-444. 85.Wang, H., Lee, M. K., & Wang, C. (1998). Consumer privacy concerns about Internet marketing. Communications of the ACM, 41(3), 63-70. 86.Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy: A consumer survey. Journal of Direct Marketing, 7(1), 7-19. 87.Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 4(5), 193-220. 88.Westin, A. F. (1967). Privacy and freedom. New York: Athenaum. 89.Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453. 90.Wilson, D. W., & Valacich, J. S. (2012, December). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus, IS Security and Privacy. Proceedings of the 33rd International Conference on Information Systems, Orlando, FL. 91.Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798. 92.Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems, 51(1), 42-52. 93.Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 135-174. 94.Yates, J. F., & Stone, E. R. (1992). Risk appraisal. Risk-taking behavior, 9(2), 49-85. 95.Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009, August). Sharing private information online: The mediator effect of social exchange, Service Innovations for E-commerce. Proceedings of the 11th International Conference on Electronic Commerce, Taipei, Taiwan. 網路部分 1.Angwin, J. (2010). The web’s new gold mine: Your secrets. Wall Street Journal, 30(7). Available from: http://online.wsj.com/article/SB1000142 405274870394090475395073512989404.html (2017/01/23) 2.Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). Available from: http://firstmonday.org/issues/ %20issue11_9/ barnes/index.html (2017/02/01) 3.Brown, B. (2001). Studying the internet experience. HP Laboratories Technical Report. Available from: http://www.hpl.hp.com/techreports/2001/ HPL-2001-49. pdf (2017/02/05) 4.Finding the Right Balance Between Personalization and Privacy (2015). SAS. Available from: https://www.sas.com/content/dam/SAS/en_us/doc/resear-ch1/balance-between-personalization-privacy-107399.pdf (2017.01.21) 5.How many products are sold on Amazon.com-January 2017 Report (2017). Scrape Hero. Available from: https://www.scrapehero.com/how-many-products-are-sold-on-amazon-com-january-2017-report/ (2017.02.05) 6.Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer‐Mediated Communication, 9(4). Available from: http://www.jcmc.indiana.edu/vo19/issue4/metzger.html (2017/01/30) 7.Stevenson, D. M., & Pasek, J. (2015). Privacy Concern, Trust, and Desire for Content Personalization. The 43rd Research Conference on Communication, Information and Internet Policy Paper. Available from: https://ssrn.com/abstract=2587541 (2017/02/06) 8.Xu, H., & Teo, H. H. (2004). Alleviating consumers' privacy concerns in location-based services: a psychological control perspective. ICIS 2004 proceedings, 64. Available from: https://www.researchgate.net/profile/ Hock_Teo/publication/221598935_Alleviating_Consumers'_Privacy_Concerns_in_Location-Based_Services_A_Psychological_Control_Perspective/lin-ks/09e4150932525e6be3000000.pdf (2017/02/01)
|