|
中文參考文獻 【1】張家維、蔡玉青(2012)。台灣消費者之智慧聯網-智慧生活服務需求分析。財團法人資訊工業策進會。存取網址:https://mic.iii.org.tw/AISP/FreeS.aspx?id=2984。 【2】陳寬裕、王正華(2010)。結構方程模型分析實務AMOS的運用台北市:五南。 【3】財團法人台灣網路資訊中心(2019)。2019台灣網路報告。存取網址:https://report.twnic.tw/2019/。 英文參考文獻 【1】Adhikari, K., & Panda, R. K. (2018). Users' Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96-110. doi:10.1080/08911762.2017.1412552 【2】Aizenkot, D. (2020). Social networking and online self-disclosure as predictors of cyberbullying victimization among children and youth. Children and Youth Services Review, 119, 105695. doi:https://doi.org/10.1016/j.childyouth.2020.105695 【3】Alam, M. R., Reaz, M. B. I., & Mohd Ali, M. (2012). A Review of Smart Homes – Past, Present, and Future. IEEE Transactions on Systems, Man, and Cybernetics -Part C: Applications and Reviews, 42, 1190-1203. doi:10.1109/TSMCC.2012.2189204 【4】Aldrich, F. (2003). Smart Homes: Past, Present and Future. In (pp. 17-39). 【5】Alraja, M. N., Barhamgi, H., Rattrout, A., & Barhamgi, M. (2021). An integrated framework for privacy protection in IoT — Applied to smart healthcare. Computers & Electrical Engineering, 91, 107060. doi:https://doi.org/10.1016/j.compeleceng.2021.107060 【6】Anderson, C., & Agarwal, R. (2010). Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly, 34, 613-643. doi:10.2307/25750694 【7】Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423. doi:10.1037/0033-2909.103.3.411 【8】Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94. doi:10.1007/BF02723327 【9】Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063. doi:10.1016/j.ijinfomgt.2019.102063 【10】Balta-Ozkan, N., Amerighi, O., & Boteler, B. (2014). A comparison of consumer perceptions towards smart homes in the UK, Germany and Italy: reflections for policy and future research. Technology Analysis and Strategic Management, 26. doi:10.1080/09537325.2014.975788 【11】Balta-Ozkan, N., Boteler, B., & Amerighi, O. (2014). European smart home market development: Public views on technical and economic aspects across the United Kingdom, Germany and Italy. Energy Research & Social Science, 3, 65-77. doi:https://doi.org/10.1016/j.erss.2014.07.007 【12】Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1-21. doi:https://doi.org/10.1016/j.im.2015.08.001 【13】Baron, R., & Kenny, D. (1986). The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51, 1173-1182. doi:10.1037//0022-3514.51.6.1173 【14】Bockarjova, M., & Steg, L. (2014). Can Protection Motivation Theory predict pro-environmental behavior? Explaining the adoption of electric vehicles in the Netherlands. Global Environmental Change, 28, 276–288. doi:10.1016/j.gloenvcha.2014.06.010 【15】Bollen, K. A., & Long, J. S. (1993). Testing structural equation models (Vol. 154): Sage. 【16】Cannizzaro, S., Procter, R., Ma, S., & Maple, C. (2020). Trust in the smart home: Findings from a nationally representative survey in the UK. PLOS ONE, 15(5), e0231615. doi:10.1371/journal.pone.0231615 【17】Chen, K.-Y., & Yeh, C.-F. (2017). Factors affecting adoption of smart meters in the post-Fukushima era in Taiwan: an extended protection motivation theory perspective. Behaviour & Information Technology, 36(9), 955-969. doi:10.1080/0144929X.2017.1317363 【18】Chen, Y., & Zahedi, F. (2016). Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China. MIS Quarterly, 40, 205-222. doi:10.25300/MISQ/2016/40.1.09 【19】Churchill, G. A. (1979). A Paradigm for Developing Better Measures of Marketing Constructs. Journal of Marketing Research, 16(1), 64-73. doi:10.2307/3150876 【20】Creswell, J., & Clark, V. (2011). Designing and Conducting Mixed Method Research. 【21】Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334. doi:10.1007/BF02310555 【22】Crossler, R., Andoh-Baidoo, F., & Menard, P. (2018). Espoused Cultural Values as Antecedents of Individuals’ Threat and Coping Appraisal toward Protective Information Technologies: Study of U.S. and Ghana. Information & Management, 56. doi:10.1016/j.im.2018.11.009 【23】Culnan, M., & Bies, R. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59, 323-342. doi:10.1111/1540-4560.00067 【24】Culnan, M. J. (1995). Consumer awareness of name removal procedures: Implications for direct marketing. Journal of direct marketing, 9(2), 10-19. 【25】Culnan, M. J., & Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104-115. doi:10.1287/orsc.10.1.104 【26】Culnan, M. J., & Bies, R. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 323-342. doi:https://doi.org/10.1111/1540-4560.00067 【27】Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 48, 281–297. doi:10.1016/j.cose.2014.11.002 【28】Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. doi:10.1080/01449290410001715723 【29】Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17, 61-80. doi:10.1287/isre.1060.0080 【30】Feng, Y., & Xie, W. (2014). Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153-162. doi:https://doi.org/10.1016/j.chb.2014.01.009 【31】Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), 39-50. doi:10.2307/3151312 【32】Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 12(1), 106-119. 【33】Gilliland, S. (1993). The Perceived Fairness of Selection Systems: An Organizational Justice Perspective. The Academy of Management Review, 18. doi:10.5465/AMR.1993.9402210155 【34】Hanus, B., & Wu, Y. (2015). Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management, 33. doi:10.1080/10580530.2015.1117842 【35】Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., & Rao, H. R. (2014). Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61-84. doi:https://doi.org/10.1111/j.1365-2575.2012.00420.x 【36】Herath, T., & Rao, R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. EJIS, 18, 106-125. doi:10.1057/ejis.2009.6 【37】Hoffman, D., Novak, T., & Peralta, M. (1999). Building Consumer Trust Online. Commun. ACM, 42, 80-85. doi:10.1145/299157.299175 【38】Hong, W., & Thong, J. (2013). Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies. MIS Quarterly, 37, 275-298. doi:10.25300/MISQ/2013/37.1.12 【39】Hsu, C.-L., & Lin, J. C.-C. (2016). An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62, 516-527. doi:https://doi.org/10.1016/j.chb.2016.04.023 【40】Huang, H.-Y. (2016). Examining the beneficial effects of individual's self-disclosure on the social network site. Computers in Human Behavior, 57, 122-132. doi:10.1016/j.chb.2015.12.030 【41】Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, 83-95. doi:10.1016/j.cose.2011.10.007 【42】International Data Corporation, I. (2018). New IDC Smart Home Device Tracker Forecasts Solid Growth for Connected Devices in Key Smart Home Categories. 【43】James, T. L., Wallace, L., Warkentin, M., Kim, B. C., & Collignon, S. E. (2017). Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Information & Management, 54(7), 851-865. doi:https://doi.org/10.1016/j.im.2017.01.001 【44】Johnston, A., Warkentin, M., & Siponen, M. (2015). An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Quarterly, 39, 113-134. doi:10.25300/MISQ/2015/39.1.06 【45】Jutla, D., & Bodorik, P. (2005). Sociotechnical Architecture for Online Privacy. Security & Privacy, IEEE, 3, 29-39. doi:10.1109/MSP.2005.50 【46】Kechiche, S. (2019). Iot Connections Forecast: The Rise of Enterprise. Retrieved from https://data.gsmaintelligence.com/research/research/research-2019/iot-connections-forecast-the-rise-of-enterprise 【47】Kim, D., Park, K., Park, Y., & Ahn, J.-H. (2019). Willingness to provide personal information: Perspective of privacy calculus in IoT services. Computers in Human Behavior, 92, 273-281. doi:https://doi.org/10.1016/j.chb.2018.11.022 【48】Kolotylo-Kulkarni, M., Xia, W., & Dhillon, G. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research, 126, 221-238. doi:https://doi.org/10.1016/j.jbusres.2020.12.006 【49】Lee, H. (2020). Home IoT resistance: Extended privacy and vulnerability perspective. Telematics and Informatics, 49, 101377. doi:10.1016/j.tele.2020.101377 【50】Lee, Y. (2011). Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decision Support Systems, 50(2), 361-369. doi:https://doi.org/10.1016/j.dss.2010.07.009 【51】Liu, S. (2015). Effects of control on the performance of information systems projects: The moderating role of complexity risk. Journal of Operations Management, 36. doi:10.1016/j.jom.2015.03.003 【52】Liu, S., Wang, L., & Huang, W. (2017). Effects of process and outcome controls on business process outsourcing performance: Moderating roles of vendor and client capability risks. European Journal of Operational Research, 260(3), 1115-1128. doi:https://doi.org/10.1016/j.ejor.2017.01.020 【53】Luor, T., Lu, H.-P., Yu, H., & Lu, Y. (2015). Exploring the Critical Quality Attributes and Models of Smart Homes. Maturitas, 82. doi:10.1016/j.maturitas.2015.07.025 【54】Lwin, M. O., Li, B., & Ang, R. P. (2012). Stop bugging me: An examination of adolescents’ protection behavior against online harassment. Journal of Adolescence, 35(1), 31-41. doi:https://doi.org/10.1016/j.adolescence.2011.06.007 【55】Lynn, M. R. (1986). Determination and quantification of content validity. Nursing Research, 35(6), 382-385. doi:10.1097/00006199-198611000-00017 【56】Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469-479. doi:https://doi.org/10.1016/0022-1031(83)90023-9 【57】Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336-355. doi:10.1287/isre.1040.0032 【58】Maltseva, K., & Lutz, C. (2017). A Quantum of Self: A Study of Self-Quantification and Self-Disclosure. Computers in Human Behavior, In press. doi:10.1016/j.chb.2017.12.006 【59】Mamonov, S., & Benbunan-Fich, R. (2018). The Impact of Information Security Threat Awareness on Privacy-Protective Behaviors. Computers in Human Behavior, 83. doi:10.1016/j.chb.2018.01.028 【60】McKinsey. (2015). The Internet of Things: Mapping the Value beyond the Hype. 【61】Menard, P., Bott, G., & Crossler, R. (2017). User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. Journal of Management Information Systems, 34, 1203-1230. doi:10.1080/07421222.2017.1394083 【62】Miller, W., & Crabtree, B. (1992). Primary care research: A multimethod typology and qualitative road map. Doing Qualitative Research: Research methods for primary care, 3. 【63】Milne, S., Sheeran, P., & Orbell, S. (2006). Prediction and Intervention in Health‐Related Behavior: A Meta‐Analytic Review of Protection Motivation Theory. Journal of Applied Social Psychology, 30, 106-143. doi:10.1111/j.1559-1816.2000.tb02308.x 【64】Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375. doi:https://doi.org/10.1016/j.chb.2012.07.008 【65】Nemec Zlatolas, L., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158-167. doi:https://doi.org/10.1016/j.chb.2014.12.012 【66】Nikou, S. (2019). Factors Driving the Adoption of Smart Home Technology: An Empirical Assessment. Telematics and Informatics, 45, 101283. doi:10.1016/j.tele.2019.101283 【67】Nunnally, J. C. (1978). Psychometric theory. New York: McGraw-Hill. 【68】Papagiannidis, S., & Alamanos, E. (2018). A Systematic Review of the Smart Home Literature: A user perspective. Technological Forecasting and Social Change, 138. doi:10.1016/j.techfore.2018.08.015 【69】Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing - J PUBLIC POLICY MARKETING, 19, 27-41. doi:10.1509/jppm.19.1.27.16941 【70】Polit, D., & Beck, C. (2006). The Content Validity Index: Are you sure you know what's being reported? Critique and recommendations. Research in nursing & health, 29, 489-497. doi:10.1002/nur.20147 【71】Prentice-Dunn, S., & Rogers, R. (1986). Protection Motivation Theory and Preventive Health: Beyond the Health Belief Model. Health Education Research - HEALTH EDUC RES, 1, 153-161. doi:10.1093/her/1.3.153 【72】Rendleman, J. (2001). Customer data means money. Informationweek, 20, 49-50. 【73】Rhee, H.-S., Kim, C., & Ryu, Y. (2009). Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & Security, 28, 816-826. doi:10.1016/j.cose.2009.05.008 【74】Robles, R., & Kim, T.-h. (2010). Applications, Systems and Methods in Smart Home Technology: A Review. 15. 【75】Roe-Berning, S., & Straker, G. (1997). The Association Between Illusions of Invulnerability and Exposure to Trauma. Journal of traumatic stress, 10, 319-327. doi:10.1023/A:1024890415279 【76】Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(1), 93-114. doi:10.1080/00223980.1975.9915803 【77】Salleh, N., Hussein, R., Mohamed, N., Abdul Karim, N., Ahlan, A. R., & Aditiawarman, U. (2012). Examining Information Disclosure Behavior on Social Network Sites Using Protection Motivation Theory, Trust and Risk. Journal of Internet Social Networking & Virtual Communities, 2012. doi:10.5171/2012.281869 【78】Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22, 428-438. doi:10.1016/j.intcom.2010.05.001 【79】Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989-1015. 【80】Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 167-196. 【81】Souza, Z., & Dick, G. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I’ll show you mine”. International Journal of Information Management, 29, 255-261. doi:10.1016/j.ijinfomgt.2009.03.006 【82】Statista. (2021). Smart Home Report 2021 - Smart Appliances. 【83】Stephen Hilt, N. H., Martin Rösler, Akira Urano. (2019). Cybersecurity Risks in Complex IoT Environments. Retrieved from 【84】Tang, Z., hu, Y., & smith, M. D. (2008). Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor. Journal of Management Information Systems, 24(4), 153-173. doi:10.2753/MIS0742-1222240406 【85】Thibaut, J., & Walker, L. (1975). Procedural Justice: A Psychological Analysis. Duke Law Journal, 1977. doi:10.2307/1371953 【86】Trang, S., & Weiger, W. H. (2021). The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information? Computers in Human Behavior, 116, 106644. doi:https://doi.org/10.1016/j.chb.2020.106644 【87】Trendmicro Research and Analysis(2019). Trend Micro Security Predictions for 2020。Retrieved from https://www.trendmicro.com/vinfo/us/security/research-and-analysis/predictions/2020 【88】Tsai, H.-y., Jiang, M., Alhabash, S., Larose, R., Rifon, N., & Cotten, S. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59. doi:10.1016/j.cose.2016.02.009 【89】Tu, Z., Yuan, Y., & Archer, N. (2014). Understanding user behaviour in coping with security threats of mobile device loss and theft. International Journal of Mobile Communications, 12, 603. doi:10.1504/IJMC.2014.064915 【90】Turow, J., & Nir, L. (2000). The Internet and the Family, 2000: The View from Parents, the View from Kids. Report Series No. 33. 【91】Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49, 190–198. doi:10.1016/j.im.2012.04.002 【92】Verkijika, S. (2018). Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret. Computers & Security, 77. doi:10.1016/j.cose.2018.03.008 【93】Waltz, C. F. (1981). Nursing research : design, statistics, and computer analysis / Carolyn Feher Waltz, R. Barker Bausell. Philadelphia: F.A. Davis Co. 【94】Wang, Z., & Liu, Y. (2014). Identifying Key Factors Affecting Information Disclosure Intention in Online Shopping. International Journal of Smart Home, 8, 47-58. doi:10.14257/ijsh.2014.8.4.05 【95】Warren, S. D., & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220. doi:10.2307/1321160 【96】Westin, A. (1968). Privacy and Freedom. Michigan Law Review, 66. doi:10.2307/1287193 【97】Workman, M., Bommer, W., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24, 2799-2816. doi:10.1016/j.chb.2008.04.005 【98】Wu, D. (2019). Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior. Computers in Human Behavior, 105, 106229. doi:10.1016/j.chb.2019.106229 【99】Youn, S. (2009). Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. Journal of Consumer Affairs, 43(3), 389-418. doi:https://doi.org/10.1111/j.1745-6606.2009.01146.x 【100】Zhang, L., & McDowell, W. (2009). Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords. Journal of Internet Commerce, 8, 180-197. doi:10.1080/15332860903467508 【101】Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management, 55(4), 482-493. doi:https://doi.org/10.1016/j.im.2017.11.003 【102】Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), 2728-2742. doi:https://doi.org/10.1002/sec.795
|