論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available
論文名稱 Title |
以雙路徑模式探討資訊隱私矛盾之神經科學研究 A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
158 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2018-07-20 |
繳交日期 Date of Submission |
2018-08-20 |
關鍵字 Keywords |
神經科學、腦電圖、腦波、隱私計算理論、隱私矛盾、雙路徑模式 Privacy paradox, privacy calculus, dual-process model, electroencephalographic (EEG), brain wave, neuroscience |
||
統計 Statistics |
本論文已被瀏覽 5961 次,被下載 1 次 The thesis/dissertation has been browsed 5961 times, has been downloaded 1 times. |
中文摘要 |
隨著資訊科技的大量使用,個人隱私資料的傳播日益氾濫,成為資訊時代大家關心的問題。過去許多研究都證實雖然人們都說很在意隱私資料的保護,但是實際上又會很輕易地揭露個人隱私資訊,這種現象叫做「隱私矛盾」(Privacy Paradox),也就是人們所陳述的自身資訊的分享意圖與他們實際上的資訊分享行為並不吻合。過去文獻針對隱私顧慮的信念意圖和實際行為間不一致,提出了這是因為人們在決策過程中理性的,並且會受到隱私計算理論的影響,進而改變原有的態度或行為。然而決策的制定並不全然是理性的,可能會受到心理限制或情境因素的影響。某些時候人們可能是憑直覺,並沒有經過邏輯思考來做決策。本研究從資訊處理之雙路徑模式的觀點來探討隱私矛盾的現象,推論人們在實際行為中所採用的決策方式與回答問卷時所採用的決策方式有所不同,是造成隱私矛盾的原因。過去關於隱私資訊的研究經常使用問卷調查來了解消費者的態度,及消費者對於隱私顧慮的程度及揭露意圖,但是卻很少衡量到實際的揭露行為。因此,本研究的主要目的在探討隱私矛盾的問題,藉由實驗法來分析隱私資訊揭露意圖與實際行為之間不一致的現象。 另外,為了要深入了解造成隱私矛盾的原因,本研究將採用認知神經科學的方法來探討過去用問卷調查法所無法探索的隱私矛盾現象。採取2(手機應用程式下載情境)x3(手機應用程式存取權限)的實驗設計,進行兩次的腦波實驗。實驗將利用腦電圖的測量技術來收集腦部運作資料,分析在意圖與行為之間隱私矛盾的神經科學反應差異,進而推理出造成隱私矛盾的前因以及相對應的機制。此外,本研究也希望從推敲可能性模型和正念的觀點來探討隱私矛盾的現象,了解個人正念狀態的差異和資訊處理路徑的不同是否會影響隱私決策的制定。本研究之研究結果希望可以提供隱私矛盾一個新的解釋,做為未來研究之參考依據。 |
Abstract |
Information technologies have raised enduring concerns about privacy. Most people report that they worry about disclosures of their private information, yet keep revealing it through their actual technology-usage behavior. This inconsistency between intended and actual information-sharing has been termed the “privacy paradox”, and prior research has sought to explain it through cost-benefit or other frameworks rooted in rationality: for example, privacy calculus. However, individuals are not purely rational decision-makers, but tend to be strongly affected by psychological limitations that are often unconscious; and in many cases, people self-report their choices in terms of rational information processing, even when their behavior indicates they are following their intuition instead. Accordingly, drawing on the dual-process model from the field of psychology, this study approaches the privacy paradox from a neuroscience perspective, arguing that such discrepancies between statement and behavior are inherent in natural instinct. Specifically, the present research investigates the privacy paradox via two electroencephalographic (EEG) experiments, designed to establish whether physiological evidence (brain wave) can enhance our understanding of this phenomenon. It will also test whether such an approach can effectively address the limitations of self-report data, by capturing individuals’ direct responses when they make privacy-related decisions. The primary causes of the privacy paradox and its corresponding brain activities will also be explored. |
目次 Table of Contents |
論文審定書 i Acknowledgements ii 摘要 iii Abstract iv Table of Content v List of Figures viii List of Tables x Chapter 1. Introduction 1 1.1 Research Background 1 1.2 Research Objective 3 1.3 Research Procedure 5 1.4 Thesis Organization 6 Chapter 2. Literature Review 7 2.1 Information Privacy 7 2.1.1 Value-based privacy 8 2.1.2 Cognate-based privacy 9 2.2 Privacy Concern 11 2.3 The Privacy Paradox 12 2.3.1 Privacy decision-making and rationality 15 2.4 The Dual-processing View of Decision-making Processes 17 2.5 Neuroscientific Evidence for the Dual-processing View 19 Chapter 3. Research Methodology 23 3.1 Participants 25 3.2 EEG Signal Acquisition and Processing 25 Chapter 4. Experiment 1 27 4.1 Design of Experiment 1 27 4.1.1 Materials 34 4.1.2 Statistical power 36 4.2 Experiment 1 Procedures 37 4.3 Experiment 1 Pilot 38 4.4 Experiment 1 Results 39 4.4.1 Manipulation check 41 4.4.2 Data analysis 43 4.5 Summary 54 Chapter 5. Experiment 2 55 5.1 The Design of Experiment 2 55 5.1.1 Statistical Power 57 5.1.2 Measurement of the elaborated likelihood model 57 5.1.3 Measurement of mindfulness 59 5.2 Experiment 2 Procedures 61 5.3 Experiment 2 Pilot 62 5.4 Experiment 2 Results 65 5.4.1 Manipulation check 66 5.4.2 Data analysis 68 5.5 Summary 94 Chapter 6. Discussion and Contribution 95 6.1 Discussion 95 6.1.1 Physiological evidence 97 6.1.2 ELM 99 6.1.3 State mindfulness 100 6.1.4 Final download decision 102 6.2 Contributions 105 6.3 Limitations and Directions for Future Research 108 References 111 Appendix A -Questionnaire item 124 Appendix B – Questionnaire items for Experiment 2 138 Appendix C Experiment Schedule 140 |
參考文獻 References |
Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in e-commerce: examining user scenarios and privacy preferences. Paper presented at the Proceedings of the 1st ACM conference on Electronic commerce. Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the Proceedings of the 5th ACM conference on Electronic commerce. Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 2(2005), 24-30. Acquisti, A., & Grossklags, J. (2007). What can behavioral economics teach us about privacy. Digital Privacy: Theory, Technologies and Practices, 18, 363-377. Adam, M. T., Krämer, J., Jähnig, C., Seifert, S., & Weinhardt, C. (2011). Understanding auction fever: A framework for emotional bidding. Electronic Markets, 21(3), 197. Alderman, E., & Kennedy, C. (1997). The right to privacy: Vintage. Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Anand, P. (2015). Billions of Android apps vulnerable to hackers. Retrieved from https://www.marketwatch.com/story/billions-of-android-apps-vulnerable-to-hackers-2015-02-27/ Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211. Awad, N. F., & Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS quarterly, 30(1), 13-28. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 35(4), 1017-1042. Baer, R. A., Smith, G. T., & Allen, K. B. (2004). Assessment of mindfulness by self-report: The Kentucky Inventory of Mindfulness Skills. Assessment, 11(3), 191-206. Baer, R. A., Smith, G. T., Hopkins, J., Krietemeyer, J., & Toney, L. (2006). Using self-report assessment methods to explore facets of mindfulness. Assessment, 13(1), 27-45. Bansal, G., & Zahedi, F. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. ICIS 2008 Proceedings, 7. Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150. Barth, S., & de Jong, M. D. T. (2017). The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3), 245-270. Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101-106. Bimber, B., Flanagin, A. J., & Stohl, C. (2005). Reconceptualizing collective action in the contemporary media environment. Communication Theory, 15(4), 365-388. Bishop, S. R., Lau, M., Shapiro, S., Carlson, L., Anderson, N. D., Carmody, J., Velting, D. (2004). Mindfulness: A proposed operational definition. Clinical psychology: Science and practice, 11(3), 230-241. Breckenridge, A. C. (1970). The right to privacy: U of Nebraska Press. Brouwer, Anne-Marie et al. (2015). Using Neurophysiological Signals That Reflect Cognitive or Affective State: Six Recommendations to Avoid Common Pitfalls.” Frontiers in Neuroscience, 9, Article 136. Brown, K. W., & Ryan, R. M. (2003). The benefits of being present: mindfulness and its role in psychological well-being. Journal of Personality and Social psychology, 84(4), 822-848. Brown, M., & Muchira, R. (2004). Investigating the relationship between Internet privacy concerns and online purchase behavior. Journal of Electronic Commerce Research, 5(1), 62-70. Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS quarterly, 399-426. Campbell, A., & Whitehead, J. (2010). How to test your decision-making instincts. McKinsey Quarterly, 1-4. Chadwick, P., Hember, M., Symes, J., Peters, E., Kuipers, E., & Dagnan, D. (2008). Responding mindfully to unpleasant thoughts and images: reliability and validity of the Southampton mindfulness questionnaire (SMQ). British Journal of Clinical Psychology, 47(4), 451-455. Chang, C. (2017). Effects of Online Advertising Appeal and Cognitive Need on Consumer’s Purchase Decision. (Master), National Chengchi University. Chatzisarantis, N. L., & Hagger, M. S. (2007). Mindfulness and the intention-behavior relationship within the theory of planned behavior. Personality and Social Psychology Bulletin, 33(5), 663-676. Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. Corsi-Cabrera, M., Galindo-Vilchis, L., del-Río-Portilla, Y., Arce, C., & Ramos-Loyo, J. (2007). Within-subject reliability and inter-session stability of EEG power and coherent activity in women evaluated monthly over nine months. Clinical neurophysiology, 118(1), 9-21. Crowley, K., Sliney, A., Pitt, I., & Murphy, D. (2010). Evaluating a brain-computer interface to categorise human emotional response. Paper presented at the Advanced Learning Technologies (ICALT), 2010 IEEE 10th International Conference on. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social Issues, 59(2), 323-342. Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches. MIS quarterly, 673-687. Dale, A. M., & Sereno, M. I. (1993). Improved localizadon of cortical activity by combining EEG and MEG with MRI cortical surface reconstruction: a linear approach. Journal of cognitive neuroscience, 5(2), 162-176. Dane, E. (2011). Paying attention to mindfulness and its effects on task performance in the workplace. Journal of management, 37(4), 997-1018. Davidson, R. J., & Kaszniak, A. W. (2015). Conceptual and methodological issues in research on mindfulness and meditation. American psychologist, 70(7), 581-592. Davis, F. D. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of man-machine studies, 38(3), 475-487. de Guinea, A. O., Titah, R., & Léger, P.-M. (2014). Explicit and implicit antecedents of users' behavioral beliefs in information systems: A neuropsychological investigation. Journal of management information systems, 30(4), 179-210. Deci, E. L., & Ryan, R. M. (1980). Self-determination theory: When mind mediates behavior. The Journal of Mind and Behavior, 33-43. Dehaene, S., Changeux, J.-P., Naccache, L., Sackur, J., & Sergent, C. (2006). Conscious, preconscious, and subliminal processing: a testable taxonomy. Trends in cognitive sciences, 10(5), 204-211. Dhar, R., & Gorlin, M. (2013). A dual‐system framework to understand preference construction processes in choice. Journal of Consumer Psychology, 23(4), 528-542. Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS quarterly, 373-396. Dimoka, A., Pavlou, P. A., & Davis, F. D. (2011). Research commentary-NeuroIS: the potential of cognitive neuroscience for information systems research. Information Systems Research, 22(4), 687-702. Dimoka, A., Davis, F. D., Gupta, A., Pavlou, P. A., Banker, R. D., Dennis, A. R., Ischebeck, A., Müller-Putz, G., Benbasat, I., Gefen, D., Kenning, P. H., Riedl, R., vom Brocke, J., Weber, B. (2012). On the use of neurophysiological tools in IS research: Developing a research agenda for NeuroIS. MIS quarterly, 36(3), 679-702. Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. Dinev, T., McConnell, A. R., & Smith, H. J. (2015). Research commentary—informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box. Information Systems Research, 26(4), 639-655. Dinev, T., Xu, H., & Smith, H. J. (2009). Information privacy values, beliefs and attitudes: An empirical analysis of Web 2.0 privacy. Paper presented at the System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316. Epstein, S. (1994). Integration of the cognitive and the psychodynamic unconscious. American psychologist, 49(8), 709-724. Epstein, S., Pacini, R., Denes-Raj, V., & Heier, H. (1996). Individual differences in intuitive–experiential and analytical–rational thinking styles. Journal of Personality and Social psychology, 71(2), 390-405. Er, M. (1988). Decision support systems: a summary, problems, and future trends. Decision Support Systems, 4(3), 355-363. Erdfelder, E., Faul, F., & Buchner, A. (1996). GPOWER: A general power analysis program. Behavior research methods, instruments, & computers, 28(1), 1-11. Etzioni, A. (1999). The Limits of Privacy. Journal of Law, Medicine & Ethics, 27(3), 288-288. Evans, J. S. B. T. (2003). In two minds: dual-process accounts of reasoning. Trends in cognitive sciences, 7(10), 454-459. Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., & Lim, K. H. (2014). Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms. MIS quarterly, 38(2), 407-427. Farinosi, M., & Taipale, S. (2018). Who Can See My Stuff?: Online Self-Disclosure and Gender Differences on Facebook. Observatorio (OBS*), 12, 53-71. Faul, F., Erdfelder, E., Lang, A. G., & Buchner, A. (2007). G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods, 39(2), 175-191. Feldman, G., Hayes, A., Kumar, S., Greeson, J., & Laurenceau, J.-P. (2007). Mindfulness and emotion regulation: The development and initial validation of the Cognitive and Affective Mindfulness Scale-Revised (CAMS-R). Journal of Psychopathology and Behavioral Assessment, 29(3), 177. Felt, A. P., Egelman, S., Finifter, M., Akhawe, D., & Wagner, D. (2012). How to Ask for Permission. Paper presented at the HotSec. Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160. Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research, 57(7), 768-775. Gartner. (2013). Mobile app stores will see annual downloads reach 102 billion in 2013. Retrieved from http://www.gartner.com/newsroom/id/2592315 Goel, V., Buchel, C., Frith, C., & Dolan, R. J. (2000). Dissociation of mechanisms underlying syllogistic reasoning. Neuroimage, 12(5), 504-514. Goel, V., & Dolan, R. J. (2003). Explaining modulation of reasoning by belief. Cognition, 87(1), B11-B22. Graimann, B., Allison, B., & Pfurtscheller, G. (2009). Brain–computer interfaces: A gentle introduction Brain-Computer Interfaces (pp. 1-27): Springer. Gu, J., Xu, Y., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28. Hall, J. E. (2015). Pocket Companion to Guyton & Hall Textbook of Medical Physiology E-Book: Elsevier Health Sciences. Hann, I.-H., Hui, K.-L., Lee, T., & Png, I. (2002). Online information privacy: Measuring the cost-benefit trade-off. ICIS 2002 proceedings, 1. Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electronic Commerce Research and Applications, 9(1), 50-60. Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS quarterly, 37(1), 275-298. Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28-45. Hsu, W.-Y. (2017). A wireless brainwave-driven system for daily-life analyses and applications. Telematics and Informatics, 34(8), 1793-1801. Hui, K.-L., Tan, B. C., & Goh, C.-Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology (TOIT), 6(4), 415-441. Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The value of privacy assurance: an exploratory field experiment. MIS quarterly, 19-33. Isen, A. M. (2001). An influence of positive affect on decision making in complex situations: Theoretical issues with practical implications. Journal of Consumer Psychology, 11(2), 75-85. Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. Kabat-Zinn, J. (2011). Some reflections on the origins of MBSR, skillful means, and the trouble with maps. Contemporary Buddhism, 12(01), 281-306. Kabat-Zinn, J. (2015). Why paying attention is so supremely important. Mindfulness, 6(6), 1484-1486. Kahneman, D. (2003). A perspective on judgment and choice: mapping bounded rationality. American psychologist, 58(9), 697-720. Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607-635. Keith, M., Thompson, S., Hale, J., & Greer, C. (2012). Examining the rationality of location data disclosure through mobile devices. Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173. Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. Paper presented at the International Conference on Financial Cryptography and Data Security. Kharpal, A. (2015). 5 billion Android apps open to hack. Retrieved from https://www.cnbc.com/2015/02/27/5-billion-android-apps-open-to-hack.html Knijnenburg, B. P. (2015). A user-tailored approach to privacy decision support. UC Irvine. Knyazev, G. G., & Slobodskaya, H. R. (2003). Personality trait of behavioral inhibition is associated with oscillatory systems reciprocal relationships. International journal of psychophysiology, 48(3), 247-261. Krajbich, I., Armel, C., & Rangel, A. (2010). Visual fixations and the computation and comparison of value in simple choice. Nature neuroscience, 13(10), 1292-1298. Kuan, K. K., Zhong, Y., & Chau, P. Y. (2014). Informational and normative social influence in group-buying: Evidence from self-reported and EEG data. Journal of management information systems, 30(4), 151-178. Langer, E. J. (1989). Mindfulness: Addison-Wesley/Addison Wesley Longman. Lau, M. A., Bishop, S. R., Segal, Z. V., Buis, T., Anderson, N. D., Carlson, L., Devins, G. (2006). The Toronto mindfulness scale: Development and validation. Journal of clinical psychology, 62(12), 1445-1467. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42. Ledbury, C., Woolhead, L., Thomas, F., Carpenter, R., & Stott, H. (2017). Something for everyone: why the growth of mobile apps isgood news for brands. Retrieved from https://www.ipsos.com/sites/default/files/2017-08/Google-mobile-apps-report-2017.pdf Li, H., Luo, X. R., Zhang, J., & Xu, H. (2017). Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Information & Management, 54(8), 1012-1022. Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. Lowry, P. B., Moody, G., Vance, A., Jensen, M., Jenkins, J., & Wells, T. (2012). Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the Association for Information Science and Technology, 63(4), 755-776. Müller-Putz, G. R., Riedl, R., & Wriessnegger, S. C. (2015). Electroencephalography (EEG) as a Research Tool in the Information Systems Discipline: Foundations, Measurement, and Applications. CAIS, 37, 46. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of social Issues, 33(3), 5-21. Margulis, S. T. (2003). On the status and contribution of Westin's and Altman's theories of privacy. Journal of social Issues, 59(2), 411-429. Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization science, 11(1), 35-57. Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15-29. Morando, F., Iemma, R., & Raiteri, E. (2014). Privacy evaluation: what empirical research on users’ valuation of personal data tells us. Internet Policy Review. Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. Norris, P., & Epstein, S. (2011). An experiential thinking style: Its facets and relations with objective and subjective criterion measures. Journal of personality, 79(5), 1043-1080. Nunez, M. D., Vandekerckhove, J., & Srinivasan, R. (2017). How attention influences perceptual decision making: Single-trial EEG correlates of drift-diffusion model parameters. Journal of Mathematical Psychology, 76, Part B, 117-130. Nyaniponika, T. (1973). The heart of Buddhist meditation: New York: Weiser Books. O’Leary, P. N., Miller, M. M., Olive, M. L., & Kelly, A. N. (2017). Blurred Lines: Ethical Implications of Social Media for Behavior Analysts. Behavior Analysis in Practice, 10(1), 45–51. Paulus, M. P., Frank, L., Brown, G. G., & Braff, D. L. (2003). Schizophrenia subjects show intact success-related neural activation but impaired uncertainty processing during decision-making. Neuropsychopharmacology, 28(4), 795-806. Pavlou, P. A. (2011). State of the information privacy literature: where are we now and where should we go? MIS quarterly, 35(4), 977-988. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: a principal-agent perspective. MIS quarterly, 31(1), 105-136. Pedersen, D. M. (1982). Personality correlates of privacy. The Journal of Psychology, 112(1), 11-14. Pentina, I., Zhang, L., & Basmanova, O. (2013). Antecedents and consequences of trust in a social media brand: A cross-cultural study of Twitter. Computers in Human Behavior, 29(4), 1546-1555. Petty, R. E., & Cacioppo, J. T. (1979). Issue involvement can increase or decrease persuasion by enhancing message-relevant cognitive responses. Journal of Personality and Social psychology, 37(10), 1915. Petty, R. E., Cacioppo, J. T., & Schumann, D. (1983). Central and peripheral routes to advertising effectiveness: The moderating role of involvement. Journal of Consumer Research, 10(2), 135-146. Pfurtscheller, G., & Da Silva, F. L. (1999). Event-related EEG/MEG synchronization and desynchronization: basic principles. Clinical neurophysiology, 110(11), 1842-1857. Pham, M. T. (1996). Cue representation and selection effects of arousal on persuasion. Journal of Consumer Research, 22(4), 373-387. Pham, T. M., Hung, I. W., & Gorn, G. J. (2011). Relaxation increases monetary valuations. Journal of Marketing Research, 48(5), 814-826. Phelan, C., Lampe, C., & Resnick, P. (2016). It's Creepy, But it Doesn't Bother Me. Paper presented at the Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA. Rainie, L. (2016). The state of privacy in post-Snowden America. Retrieved from http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/ Rebolledo-Mendez, G., Dunwell, I., Martínez-Mirón, E. A., Vargas-Cerdán, M. D., De Freitas, S., Liarokapis, F., & García-Gaona, A. R. (2009). Assessing neurosky’s usability to detect attention levels in an assessment exercise. Paper presented at the International Conference on Human-Computer Interaction. Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy: Univ of North Carolina Press. Reyna, V. F. (2004). How people make decisions that involve risk: A dual-processes approach. Current directions in psychological science, 13(2), 60-66. Reynolds, L. M., Lin, Y. S., Zhou, E., & Consedine, N. S. (2015). Does a brief state mindfulness induction moderate disgust-driven social avoidance and decision-making? An experimental investigation. Journal of behavioral medicine, 38(1), 98-109. Riedl, R., Banker, R. D., Benbasat, I., Davis, F. D., Dennis, A. R., Dimoka, A., Kenning, P. (2010). On the foundations of NeuroIS: reflections on the Gmunden Retreat 2009. Communications of the Association for Information Systems, 27 , Article 15. Riedl, R., Davis, F. D., & Hevner, A. R. (2014). Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement. Journal of the Association for Information Systems, 15(10), I. Robertson, J. (2012). Android apps collect too much user data. Retrieved from https://www.smh.com.au/technology/android-apps-collect-too-much-user-data-researcher-says-20121102-28oie.html Robey, D., & Taggart, W. (1981). Measuring managers' minds: The assessment of style in human information processing. Academy of management review, 6(3), 375-383. Schoeman, F. D. (1984). Philosophical dimensions of privacy: An anthology: Cambridge University Press. Sensor Tower (2018). Global App Revenue Grew 35% in 2017 to nearly $60 Billion. Retrieved from https://sensortower.com/blog/app-revenue-and-downloads-2017 Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach: John Wiley & Sons. Sheehan, K. B., & Hoy, M. G. (1999). Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns. Journal of advertising, 28(3), 37-51. Simon, H. A. (1987). Making management decisions: The role of intuition and emotion. The Academy of Management Executive (1987-1989), 57-64. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 35(4), 989-1016. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly, 167-196. Stanovich, K. E., & West, R. F. (2000). Individual differences in reasoning: Implications for the rationality debate? Behavioral and brain sciences, 23(5), 645-665. Statista. (2018). Most popular Google Play app store categories from 1st quarter to 3rd quarter 2016 and 2017, by number of downloads (in millions). Retrieved from https://www.statista.com/statistics/256772/most-popular-app-categories-in-the-google-play-store/ Stewart, D. W., & Pavlou, P. A. (2002). From consumer response to active consumer: Measuring the effectiveness of interactive media. Journal of the Academy of Marketing Science, 30(4), 376-396. Stone, D. L., Lukaszewski, K. M., Stone-Romero, E. F., & Johnson, T. L. (2013). Factors affecting the effectiveness and acceptance of electronic selection systems. Human Resource Management Review, 23(1), 50-70. Sur, S., & Sinha, V. (2009). Event-related potential: An overview. Industrial psychiatry journal, 18(1), 70. Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users. MIS quarterly, 37(4), 1141-1164. Sydow, L. (2018). Global App Store Records Shattered Yet Again in Q1 2018. Retrieved from https://www.appannie.com/en/insights/market-data/q1-2018-apps-record-downloads-spend/ Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254-268. Turner, B. M., Forstmann, B. U., Love, B. C., Palmeri, T. J., & Van Maanen, L. (2017). Approaches to analysis in model-based cognitive neuroscience. Journal of Mathematical Psychology, 76, Part B, 65-79. Tversky, A., & Kahneman, D. (1983). Extensional versus intuitive reasoning: The conjunction fallacy in probability judgment. Psychological review, 90(4), 293. Urban, G. L., Hauser, J. R., Liberali, G., Braun, M., & Sultan, F. (2009). Morph the web to build empathy, trust and sales. MIT sloan management review, 50(4), 53. Van Slyke, C., Shim, J., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Vance, A., Anderson, B. B., Kirwan, C. B., & Eargle, D. (2014). Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG). Journal of the Association for Information Systems, 15(10), 679. Walach, H., Buchheld, N., Buttenmüller, V., Kleinknecht, N., & Schmidt, S. (2006). Measuring mindfulness—the Freiburg Mindfulness Inventory (FMI). Personality and Individual Differences, 40(8), 1543-1555. Wang, S. S.-J., Liang, T.-P., & Lai, Y.-J. (2016). Conceal or disclose: exploring factors affecting Facebook users’ privacy management behavior. Journal of Information Management, 23(4), 445-472. Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531-542. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193-220. Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166. Westin, A. F., & Ruebhausen, O. M. (2015). Privacy and freedom: Ig Publishing. Wilson, D., & Valacich, J. S. (2012). Unpacking the privacy paradox: irrational decision-making within the privacy calculus. Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151-168. Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52. Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of management information systems, 26(3), 135-174. Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of management information systems, 26(3), 135-174. Xu, H., Wang, N., & Grossklags, J. (2012). Privacy by redesign: Alleviating privacy concerns for third-party apps. Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:自定論文開放時間 user define 開放時間 Available: 校內 Campus: 已公開 available 校外 Off-campus: 已公開 available |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 已公開 available |
QR Code |