跳到主要內容

臺灣博碩士論文加值系統

(44.192.95.161) 您好!臺灣時間:2024/10/16 03:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李宜霖
研究生(外文):LEE, YI-LIN
論文名稱:既期待又怕受傷害:個人化服務與隱私矛盾之研究
論文名稱(外文):Are You Worried about Personalized Service? An Empirical Study of the Personalization-Privacy Paradox
指導教授:顧宜錚顧宜錚引用關係
指導教授(外文):KU, YI-CHEN
口試委員:楊錦生林耀南
口試日期:2017-06-15
學位類別:碩士
校院名稱:輔仁大學
系所名稱:企業管理學系管理學碩士班
學門:商業及管理學門
學類:企業管理學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:90
中文關鍵詞:個人化服務隱私顧慮推薦系統個人化隱私矛盾
外文關鍵詞:Personalized ServicePrivacy ConcernRecommendation SystemPersonalization-Privacy Paradox
相關次數:
  • 被引用被引用:0
  • 點閱點閱:312
  • 評分評分:
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:1
近年來企業紛紛透過個人化推薦系統(Personalized Recommender Systems)為用戶提供更好的服務,個人化服務提供的好處使用戶喜歡有這些系統的網站,企業為了提高競爭力和顧客忠誠度,期望蒐集更詳細的個人資料來提升服務品質,但隨著大眾對隱私關注的增加,擔心個人資料被盜用、濫用或販售給不知情第三方,進而產生了「個人化與隱私的矛盾」(Personalization-privacy Paradox)。本研究透過隱私計算理論(Privacy Calculus Theory)來了解個人化服務與隱私的關係。用戶對個人資料的隱私擔憂(感知風險)與個人化服務提供的好處(感知利益)對其感知個人化服務的價值為何,以及此價值如何影響他們願意提供的資料類型。為驗證研究之理論架構,本研究透過網路問卷調查及PLS進行模型檢定後發現,個人化服務正向影響消費者的感知利益,資料敏感度與隱私顧慮正向影響消費者的感知風險。然而,消費者並非在所有情況下皆會進行成本效益分析,當被要求提供資料敏感度及隱私顧慮較低程度的資料時,較不會去評估其風險。此外,消費者的感知價值會同時受到感知利益與感知風險的動態交互影響,進而影響他們的個人資料提供意願。本研究結果可作為個人化推薦系統相關研究及廠商建立個人化推薦系統時之參考。
Many websites today use personalized recommender systems to provide more attractive service to their customers. The conveniences provided by personalized services are often able to make the website more attractive to its users. In order to increase their competitiveness and customer loyalty, websites are prompted to collect more and more detailed information from its users. On the other hand, users today are also paying more and more attention on their privacy and personal information. They are worried that the website could steal, misuse or sell their information to a third party while expecting more benefit from personalization services, creating the problem of “The personalization-privacy paradox”. This research utilizes the privacy calculus theory to understand the relationship between personalization and privacy, how the users react when they run into the dilemma between privacy concern (perceived risk) and the benefit of personalization (perceived benefit), and how they perceive the value of personalization and influence their willingness to provide personal information. We use online survey to collect empirical data. The result of PLS analysis indicates that personalized service is positively affects perceived benefit. Information sensitivity and privacy concern both positively affects perceived risk. However, when customers are asked for data with low information sensitivity and low privacy concern, they are less likely to evaluate associated risks by performing a cost-benefit analysis. Perceived value is both influenced by perceived benefit and perceived risk and in term, affects customers’ willingness to provide personal information. We expect the findings from this study to provide some new findings for both researchers and developers of personalized recommender systems.
目 錄
第壹章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 4
第三節 研究流程 5

第貳章 文獻探討 7
第一節 個人化推薦系統 7
第二節 個人資料的類型 10
第三節 隱私 14
第四節 隱私矛盾 17
第五節 隱私計算理論 20

第參章 研究方法 22
第一節 研究架構 22
第二節 假說推論 23
第三節 研究變數操作型定義與衡量 27
第四節 研究設計 32

第肆章 分析與結果 41
第一節 樣本結構分析 41
第二節 實驗操弄分析 41
第三節 敘述性統計分析 47
第四節 衡量模型 52
頁次
第五節 假說與模型檢定 55
第伍章 結論與建議 64
第一節 研究結論 64
第二節 研究貢獻 66
第三節 研究限制與未來發展 68

參考文獻 70

附錄一 83


表 目 錄
表3-3-1 個人化服務的價值衡量題項表 27
表3-3-2 感知利益衡量題項表 28
表3-3-3 資料敏感度衡量題項表 29
表3-3-4 隱私顧慮衡量題項表 29
表3-3-5 感知風險衡量題項表 30
表3-3-6 感知價值衡量題項表 31
表3-3-7 提供個人資料的意願衡量題項表 32
表3-4-1 情境設計表 34
表3-4-2 個人化程度敘述性統計資料表 35
表3-4-3 個人化程度變異數分析表 36
表3-4-4 個人化程度事後比較表 36
表3-4-5 資料敏感度敘述性統計資料表 37
表3-4-6 資料敏感度變異數分析表 37
表3-4-7 資料敏感度事後比較表 38
表3-4-8 隱私顧慮敘述性統計資料表 38
表3-4-9 隱私顧慮變異數分析表 39
表3-4-10 隱私顧慮事後比較表 39
表4-2-1個人化程度單因子變異數分析表 44
表4-2-2 個人化程度多重比較表 44
表4-2-3 資料敏感度單因子變異數分析表 45
表4-2-4 資料敏感度多重比較表 45
表4-2-5 隱私顧慮單因子變異數分析表 46
表4-2-6 隱私顧慮多重比較表 46
表4-3-1 問項代碼表 47
表4-3-2 樣本敘述性統計表 49
表4-3-3 情境敘述性統計比較表 51
表4-4-1 研究變數之信度 52
表4-4-2 各構面之AVE值表 53
表4-4-3 各構面之AVE平方根相關矩陣 54
表4-5-1 結構模型分析結果表 56
表4-5-2 全部資料假說檢定結果整理表 57
表4-5-3 情境一結構模型分析結果表 58
表4-5-4 情境一假說檢定結果整理表 59
表4-5-5 情境二結構模型分析結果表 60
表4-5-6 情境二假說檢定結果整理表 61
表4-5-7 情境三結構模型分析結果表 62
表4-5-8 情境三假說檢定結果整理表 63

圖 目 錄
圖1-3-1 研究流程圖 6
圖2-1-1 Youtube推薦影片 9
圖3-1-1 研究架構圖 22
圖4-3-1 敘述性統計比較圖 50
圖4-5-1 研究架構檢測結果圖 55
圖4-5-2 情境一研究架構檢測結果圖 57
圖4-5-3 情境二研究架構檢測結果圖 59
圖4-5-4 情境三研究架構檢測結果圖 61


中文部分
1.電腦處理個人資料保護法(民104修正)。
網路部分
1.Youtube (2017)。Youtube台灣。取自:https://www.youtube.com/?gl=TW&hl=zh-TW (2016/02/03)。
2.Youtube新聞中心(2014)。Youtube台灣。取自: https://www.youtube.com/yt/press/zh-TW/statistics.html (2017/02/01)。


英文部分
1.Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999, November). Privacy in e-commerce: examining user scenarios and privacy preferences, Electronic Commerce. Proceedings of the 1st ACM conference on Electronic commerce, Denver, CO.
2.Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26-33.
3.Adomavicius, G., & Tuzhilin, A. (2005a). Personalization technologies: a process-oriented perspective. Communications of the ACM, 48(10), 83-90.
4.Adomavicius, G., & Tuzhilin, A. (2005b). Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE transactions on knowledge and data engineering, 17(6), 734-749.
5.Allen, A. L. (1988). Uneasy access: Privacy for women in a free society. Totowa, NJ: Rowman and Littlefield.
6.Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA: Brooks/Cole.
7.Angst, C.M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370.
8.Baek, T. H., & Morimoto, M. (2012). Stay away from me. Journal of advertising, 41(1), 59-76.
9.Budnitz, M. E. (1997). Privacy protection for consumer transactions in electronic commerce: why self-regulation is inadequate. South Carolina Law Review, 49, 847-867.
10.Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2), 181-202.
11.Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.
12.Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334.
13.Culnan, M. J. (1993). " How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS quarterly, 341-363.
14.Culnan, M. J. (2000). Protecting privacy online: Is self-regulation working? Journal of Public Policy & Marketing, 19(1), 20-26.
15.Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115.
16.Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342.
17.Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673-687.
18.Culnan, M., Smith, H., & Bies, R. (1994). Law, privacy, and organizations: The corporate obsession to know v. the individual right not to be known. The Legalistic Organization, Thousand Oaks, CA, 199-211.
19.Day, R. L. (1980). Research perspectives on consumer complaining behavior. Theoretical developments in marketing, 211-215.
20.Day, R. L., & Landon, E. L. (1977). Toward a theory of consumer complaining behavior. Consumer and industrial buying behavior, 95, 425-437.
21.Deshpande, R., & Zaltman, G. (1982). Factors affecting the use of market research information: A path analysis. Journal of marketing research, 14-31.
22.Devellis, R. F., & Dancer, L. S. (1991). Scale development: theory and applications. Journal of Educational Measurement, 31(1), 79-82.
23.Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents- measurement validity and a regression model. Behavior & Information Technology, 23(6), 413-422.
24.Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
25.Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance–An empirical investigation. The Journal of Strategic Information Systems, 17(3), 214-233.
26.Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316.
27.EU Commission. (2011). Attitudes on data protection and electronic identity in the European Union. Eurobarometer S. Surveys (359). Bruxelles, Belgium: European Commission.
28.Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: a perceived risk facets perspective. International journal of human-computer studies, 59(4), 451-474.
29.Federal Trade Commission [FTC] (1998), Consumer privacy on the World Wide Web. Washington, DC: FTC.
30.Federal Trade Commission [FTC] (2000), Privacy online: Fair information practices in the electronic marketplace. Washington, DC: FTC.
31.Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50.
32.Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. The Journal of Marketing, 1-19.
33.Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science, 9, 1-17.
34.Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4), 302-318.
35.Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks, Computer and Communications Security. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA.
36.Gunther, O., & Spiekermann, S. (2005). RFID and the perception of control: The consumer’s view, Communications of the ACM, 48(9), 73-76
37.Hughes, A. M. (1994). Strategic database marketing: the masterplan for starting and managing a profitable, Customer-based Marketing Program. NY: McGraw-Hill.
38.Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: an exploratory field experiment. Mis Quarterly, 19-33.
39.Jackson, R., & Wang, P. (1994). Strategic database marketing. Lincolnwood, IL: NTC Publishing.
40.Jeckmans, A. J., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R. L., & Tang, Q. (2013). Privacy in recommender systems. Social media retrieval, 11, 263-281.
41.Karimi, J., Somers, T. M., & Gupta, Y. P. (2001). Impact of information technology management practices on customer service. Journal of Management Information Systems, 17(4), 125-158.
42.Kobsa, A., & Teltzrow, M. (2005). Impacts of contextualized communication of privacy practices and personalization benefits on purchase behavior and perceived quality of recommendation. Beyond Personalization, 48-53.
43.Kohli, A. K., & Jaworski, B. J. (1990). Market orientation: the construct, research propositions, and managerial implications. The Journal of Marketing, 1-18.
44.Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42.
45.Laufer, R. S., Proshansky, H. M. & Wolfe, M. (1976). Some Analytic Dimensions of Privacy. NY: Holt, Rinehart & Winston.
46.Leppaniemi, M., & Karjaluoto, H. (2005). Factors influencing consumers' willingness to accept mobile advertising: a conceptual model. International Journal of Mobile Communications, 3(3), 197-213.
47.Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
48.Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumer’s decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51, 434-445.
49.Li, Y. (2011). Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453-496.
50.Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.
51.Luo, X. (2002). Trust production and privacy concerns on the Internet: a framework based on relationship marketing and social exchange theory, Industrial Marketing Management, 31, 111-118.
52.Lwin, M. O., & Williams, J. D. (2003). A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters, 14(4), 257-272.
53.Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.
54.Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.
55.McCallister, E., Grance, T., & Scarfone, K. A. (2010). Guide to protecting the confidentiality of personally identifiable information (PII). Washington, DC: National Institute of Standards and Technology.
56.Milne, G. R., & Boza, M. E. (1999). Trust and concern in consumers’ perceptions of marketing information management practices. Journal of interactive Marketing, 13(1), 5-24.
57.Milne, G. R., Bahl, S., & Rohm, A. (2008). Toward a framework for assessing covert marketing practices. Journal of Public Policy & Marketing, 27(1), 57-62.
58.Mittal, B., & Lassar, W. M. (1996). The role of personalization in service encounters. Journal of retailing, 72(1), 95-109.
59.Mulvenna, M. D., Anand, S. S., & Büchner, A. G. (2000). Personalization on the Net using Web mining: introduction. Communications of the ACM, 43(8), 122-125.
60.Murthi, B. P. S., & Sarkar, S. (2003). The role of the management sciences in research on personalization. Management Science, 49(10), 1344-1362.
61.Nash, E. L. (1993). Database Marketing: The Ultimate Selling Tool. New York: McGraw-Hill.
62.Nelson, M. R. (1994). We have the information you want, but getting it will cost you!: held hostage by information overload. Crossroads, 1(1), 11-15.
63.Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.
64.Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Direct Marketing, 9(3), 46-60.
65.O’Brien, T. (2000). Officials worried over a sharp rise in identity theft. New York Times, (April 3), 1.
66.Ohkubo, M., Suzuki, K., & Kinoshita, S. (2005). RFID privacy issues and technical challenges. Communications of the ACM, 48(9), 66-71.
67.Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63-77.
68.Pavlou, P. A. (2011). State of the information privacy literature: where are we now and where should we go? MIS Quarterly, 35 (4) 977-988.
69.Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101-134.
70.Petronio, S. (2012). Boundaries of privacy: Dialectics of disclosure. NY: State University of New York Press.
71.Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.
72.Pine, B. J. (1993). Mass customization: the new frontier in business competition. Boston: Harvard Business Press.
73.Resnick, P., & Varian, H. R. (1997). Recommender systems. Communications of the ACM, 40(3), 56-58.
74.Resnick, P., Kuwabara, K., Zeckhauser, R., & Friedman, E. (2000). Reputation systems. Communications of the ACM, 43(12), 45-48.
75.Ross, I. (1979). An information processing theory of consumer choice. Journal of Marketing (pre-1986), 43(000003), 124.
76.Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy & marketing, 19(1), 62-73.
77.Singh, J. (1988). Consumer complaint intentions and behavior: definitional and taxonomical issues. The journal of Marketing, 93-107.
78.Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 35(4), 989-1016.
79.Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly, 167-196.
80.Solove, D. J. (2004) The Digital Person: Technology and Privacy in the Information Age. NY: New York University Press.
81.Son, J. Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: a taxonomy and a nomological model. Mis Quarterly, 503-529.
82.Sultan, F., Rohm, A. J., & Gao, T. T. (2009). Factors influencing consumer acceptance of mobile marketing: a two-country study of youth markets. Journal of Interactive Marketing, 23(4), 308-320.
83.Sundar, S. S., & Marathe, S. S. (2010). Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research, 36(3), 298-322.
84.Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006), Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 415-444.
85.Wang, H., Lee, M. K., & Wang, C. (1998). Consumer privacy concerns about Internet marketing. Communications of the ACM, 41(3), 63-70.
86.Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy: A consumer survey. Journal of Direct Marketing, 7(1), 7-19.
87.Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 4(5), 193-220.
88.Westin, A. F. (1967). Privacy and freedom. New York: Athenaum.
89.Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.
90.Wilson, D. W., & Valacich, J. S. (2012, December). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus, IS Security and Privacy. Proceedings of the 33rd International Conference on Information Systems, Orlando, FL.
91.Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798.
92.Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems, 51(1), 42-52.
93.Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 135-174.
94.Yates, J. F., & Stone, E. R. (1992). Risk appraisal. Risk-taking behavior, 9(2), 49-85.
95.Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009, August). Sharing private information online: The mediator effect of social exchange, Service Innovations for E-commerce. Proceedings of the 11th International Conference on Electronic Commerce, Taipei, Taiwan.
網路部分
1.Angwin, J. (2010). The web’s new gold mine: Your secrets. Wall Street Journal, 30(7). Available from: http://online.wsj.com/article/SB1000142 405274870394090475395073512989404.html (2017/01/23)
2.Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). Available from: http://firstmonday.org/issues/ %20issue11_9/ barnes/index.html (2017/02/01)
3.Brown, B. (2001). Studying the internet experience. HP Laboratories Technical Report. Available from: http://www.hpl.hp.com/techreports/2001/ HPL-2001-49. pdf (2017/02/05)
4.Finding the Right Balance Between Personalization and Privacy (2015). SAS. Available from: https://www.sas.com/content/dam/SAS/en_us/doc/resear-ch1/balance-between-personalization-privacy-107399.pdf (2017.01.21)
5.How many products are sold on Amazon.com-January 2017 Report (2017). Scrape Hero. Available from: https://www.scrapehero.com/how-many-products-are-sold-on-amazon-com-january-2017-report/ (2017.02.05)
6.Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer‐Mediated Communication, 9(4). Available from: http://www.jcmc.indiana.edu/vo19/issue4/metzger.html (2017/01/30)
7.Stevenson, D. M., & Pasek, J. (2015). Privacy Concern, Trust, and Desire for Content Personalization. The 43rd Research Conference on Communication, Information and Internet Policy Paper. Available from: https://ssrn.com/abstract=2587541 (2017/02/06)
8.Xu, H., & Teo, H. H. (2004). Alleviating consumers' privacy concerns in location-based services: a psychological control perspective. ICIS 2004 proceedings, 64. Available from: https://www.researchgate.net/profile/ Hock_Teo/publication/221598935_Alleviating_Consumers'_Privacy_Concerns_in_Location-Based_Services_A_Psychological_Control_Perspective/lin-ks/09e4150932525e6be3000000.pdf (2017/02/01)

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊