يعرض 1 - 20 نتائج من 36 نتيجة بحث عن '"個人化服務"', وقت الاستعلام: 0.53s تنقيح النتائج
  1. 1
    Dissertation/ Thesis

    المؤلفون: 朱翊榕, Chu, I-Jung

    المساهمون: 林芝璇, Lin, Jhih-Syuan

    وصف الملف: 7301488 bytes; application/pdf

    Relation: Acquisti, A. (2004, May). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic commerce (pp. 21-29).\nAcquisti, A., & Gross, R. (2006, June). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies (pp. 36-58). Springer, Berlin, Heidelberg.\nAcquisti, A., & Grossklags, J. (2003, May). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In 2nd Annual Workshop on Economics and Information Security-WEIS (Vol. 3, pp. 1-27).\nAcquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., . & Wilson, S. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1-41.\nAcquisti, A., Gritzalis, S., Lambrinoudakis, C., & di Vimercati, S. (2007). What can behavioral economics teach us about privacy?. In Digital privacy (pp. 385-400). Auerbach Publications.\nAdjerid, I., Acquisti, A., Brandimarte, L., & Loewenstein, G. (2013, July). Sleights of privacy: Framing, disclosures, and the limits of transparency. In Proceedings of the ninth symposium on usable privacy and security (pp. 1-11).\nAguinis, H., & Bradley, K. J. (2014). Best practice recommendations for designing and implementing experimental vignette methodology studies. Organizational research methods, 17(4), 351-371.\nAguirre, E., Mahr, D., Grewal, D., De Ruyter, K., & Wetzels, M. (2015). Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness. Journal of retailing, 91(1), 34-49.\nAjzen, I. (1980). Understanding attitudes and predicting social behavior. Englewood cliffs.\nAlamdari, P. M., Navimipour, N. J., Hosseinzadeh, M., Safaei, A. A., & Darwesh, A. (2020). A systematic study on the recommender systems in the E-commerce. IEEE Access, 8, 115694-115716.\nAlbashrawi, M., & Motiwalla, L. (2019). Privacy and personalization in continued usage intention of mobile banking: An integrative perspective. Information Systems Frontiers, 21(5), 1031-1043.\nAlmada, S. J., Zonderman, A. B., Shekelle, R. B., Dyer, A. R., Daviglus, M. L., Costa, P. T., & Stamler, J. (1991). Neuroticism and cynicism and risk of death in middle-aged men: the Western Electric Study. Psychosomatic Medicine.\nAltman, I. (1975). The environment and social behavior: privacy, personal space, territory, and crowding.\nAtienza, M., Cantero, J. L., & Escera, C. (2001). Auditory information processing during human sleep as revealed by event-related brain potentials. Clinical neurophysiology, 112(11), 2031-2045.\nAwad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS quarterly, 13-28.\nBabula, E., Mrzygłód, U., & Poszewiecki, A. (2017). CONSUMERS’NEED OF PRIVACY PROTECTION–EXPERIMENTAL RESULTS. Economics & Sociology, 10(2), 74.\nBaker, W. E. (1999). When can affective conditioning and mere exposure directly influence brand choice?. Journal of advertising, 28(4), 31-46.\nBalebako, R. (2014). Mitigating the Risks of Smartphone Data Sharing: Identifying Opportunities and Evaluating Notice (Doctoral dissertation, Carnegie Mellon University).\nBandara, R., Fernando, M., & Akter, S. (2020). Explicating the privacy paradox: A qualitative inquiry of online shopping consumers. Journal of Retailing and Consumer Services, 52, 101947.\nBansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision support systems, 49(2), 138-150.\nBarnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday.\nBarth, S., & De Jong, M. D. (2017). The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telematics and informatics, 34(7), 1038-1058.\nBartosiak, M. (2022). Not So Digital After All? A Look at the Nature of Digital Nudging through the Prism of the Digital Object Concept. In Proceedings of the 55th Hawaii International Conference on System Sciences.\nBauer, C. (2020, March). Multi-Method Evaluation: Leveraging Multiple Methods to Answer What You Were Looking For. In Proceedings of the 2020 Conference on Human Information Interaction and Retrieval (pp. 472-474).\nBearden, W. O., & Rose, R. L. (1990). Attention to social comparison information: An individual difference factor affecting consumer conformity. Journal of Consumer Research, 16(4), 461-471.\nBecker, G. S., & Murphy, K. M. (1988). A theory of rational addiction. Journal of political Economy, 96(4), 675-700.\nBelanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The journal of strategic Information Systems, 11(3-4), 245-270.\nBennett, C. J., Grant, R. A., & Bennett, C. J. (Eds.). (1999). Visions of privacy: Policy choices for the digital age (Vol. 6). University of Toronto Press.\nBenson, V., Saridakis, G., & Tennakoon, H. (2015). Information disclosure of social media users: does control over personal information, user awareness and security notices matter?. Information Technology & People.\nBergram, K., Djokovic, M., Bezençon, V., & Holzer, A. (2022, April). The Digital Landscape of Nudging: A Systematic Literature Review of Empirical Research on Digital Nudges. In CHI Conference on Human Factors in Computing Systems (pp. 1-16).\nBetzing, J. H., Tietz, M., vom Brocke, J., & Becker, J. (2020). The impact of transparency on mobile privacy decision making. Electronic Markets, 30(3), 607-625.\nBeyari, H. (2021). RECENT E-COMMERCE TRENDS AND LEARNINGS FOR E-COMMERCE SYSTEM DEVELOPMENT FROM A QUALITY PERSPECTIVE. International Journal for Quality Research, 15(3).\nBlanca, M. J., Alarcón, R., Arnau, J., Bono, R., & Bendayan, R. (2018). Effect of variance ratio on ANOVA robustness: Might 1.5 be the limit?. Behavior Research Methods, 50, 937-962.\nBol, N., Dienlin, T., Kruikemeier, S., Sax, M., Boerman, S. C., Strycharz, J., . & De Vreese, C. H. (2018). Understanding the effects of personalization as a privacy calculus: Analyzing self-disclosure across health, news, and commerce contexts. Journal of Computer-Mediated Communication, 23(6), 370-388.\nBollen, D., Knijnenburg, B. P., Willemsen, M. C., & Graus, M. (2010, September). Understanding choice overload in recommender systems. In Proceedings of the fourth ACM conference on Recommender systems (pp. 63-70).\nBothos, E., Apostolou, D., & Mentzas, G. (2015). Recommender systems for nudging commuters towards eco-friendly decisions. Intelligent Decision Technologies, 9(3), 295-306.\nBovens, L. (2009). The ethics of nudge. In Preference change (pp. 207-219). Springer, Dordrecht.\nBuck, C., Horbel, C., Germelmann, C. C., & Eymann, T. (2014, June). The Unconscious App Consumer: Discovering and Comparing the Information-seeking Patterns among Mobile Application Consumers. In ECIS.\nBusemeyer, J. R., Wang, Z., & Townsend, J. T. (2006). Quantum dynamics of human decision-making. Journal of Mathematical Psychology, 50(3), 220-241.\nChang, D., Krupka, E. L., Adar, E., & Acquisti, A. (2016, May). Engineering information disclosure: Norm shaping designs. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 587-597).\nChellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information technology and management, 6(2), 181-202.\nChen, L., & Liu, H. W. (2015). A review of privacy protection in e-commerce. Journal of.\nChen, S., Wu, Y., Deng, F., & Zhi, K. (2023). How does ad relevance affect consumers` attitudes toward personalized advertisements and social media platforms? The role of information co-ownership, vulnerability, and privacy cynicism. Journal of Retailing and Consumer Services, 73, 103336.\nChoe, E. K., Jung, J., Lee, B., & Fisher, K. (2013, September). Nudging people away from privacy-invasive mobile apps through visual framing. In IFIP Conference on Human-Computer Interaction (pp. 74-91). Springer, Berlin, Heidelberg.\nChoi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51.\nCialdini, R. B., & Cialdini, R. B. (2007). Influence: The psychology of persuasion (Vol. 55, p. 339). New York: Collins.\nCialdini, R. B., & Garde, N. (1987). Influence (Vol. 3). Port Harcourt: A. Michel.\nCialdini, R. B., & Trost, M. R. (1998). Social influence: Social norms, conformity and compliance.\nCremonesi, P., Garzotto, F., & Turrin, R. (2012). Investigating the persuasion potential of recommender systems from a quality perspective: An empirical study. ACM Transactions on Interactive Intelligent Systems (TiiS), 2(2), 1-41.\nCremonesi, P., Garzotto, F., & Turrin, R. (2013). User-centric vs. system-centric evaluation of recommender systems. In Human-Computer Interaction–INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part III 14 (pp. 334-351). Springer Berlin Heidelberg.\nCulnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, 10(1), 104-115.\nCulnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of social issues, 59(2), 323-342.\nDanesi, M. (2011). What`s in a brand name? A note on the onomastics of brand naming. Names, 59(3), 175-185.\nDarley, W. K., & Lim, J. S. (1993). Assessing demand artifacts in consumer research: an alternative perspective. Journal of Consumer Research, 20(3), 489-495.\nDavies, S. G. (1997). Re-engineering the right to privacy: How privacy has been transformed from a right to a commodity. Technology and Privacy: The New Landscape, Ed. P. Agre, E. and M. Rotenberg.\nDe Mooij, M., & Hofstede, G. (2011). Cross-cultural consumer behavior: A review of research findings. Journal of international consumer marketing, 23(3-4), 181-192.\nDean Jr, J. W., Brandes, P., & Dharwadkar, R. (1998). Organizational cynicism. Academy of Management review, 23(2), 341-352.\nDemarque, C., Charalambides, L., Hilton, D. J., & Waroquier, L. (2015). Nudging sustainable consumption: The use of descriptive norms to promote a minority behavior in a realistic online shopping environment. Journal of Environmental Psychology, 43, 166-174.\nDennis, A. R., Yuan, L., Feng, X., Webb, E., & Hsieh, C. J. (2020). Digital nudging: Numeric and semantic priming in e-commerce. Journal of management information systems, 37(1), 39-65.\nDeuker, A. (2009, September). Addressing the privacy paradox by expanded privacy awareness–the example of context-aware services. In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life (pp. 275-283). Springer, Berlin, Heidelberg.\nDhingra, S., Gupta, S., & Bhatt, R. (2020). A study of relationship among service quality of E-commerce websites, customer satisfaction, and purchase intention. International Journal of E-Business Research (IJEBR), 16(3), 42-59.\nDinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80.\nDinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389-402.\nDolan, P., Hallsworth, M., Halpern, D., King, D., Metcalfe, R., & Vlaev, I. (2012). Influencing behaviour: The mindspace way. Journal of economic psychology, 33(1), 264-277.\nDowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of consumer research, 21(1), 119-134.\nDwivedi, Y. K., Ismagilova, E., Hughes, D. L., Carlson, J., Filieri, R., Jacobson, J., . & Wang, Y. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 59, 102168.\nEngelen, B. (2019). Nudging and rationality: What is there to worry?. Rationality and Society, 31(2), 204-232.\nErmakova, T., Fabian, B., & Zarnekow, R. (2014). Acceptance of health clouds-a privacy calculus perspective.\nEslami, M., Krishna Kumaran, S. R., Sandvig, C., & Karahalios, K. (2018, April). Communicating algorithmic process in online behavioral advertising. In Proceedings of the 2018 CHI conference on human factors in computing systems (pp. 1-13).\nFerketich, S. (1991). Focus on psychometrics. Aspects of item analysis. Research in nursing & health, 14(2), 165-168.\nField, A. (2013). Discovering statistics using IBM SPSS statistics. sage.\nFife, E., & Orjuela, J. (2012). The privacy calculus: Mobile apps and user perceptions of privacy and security. International Journal of Engineering Business Management, 4(Godište 2012), 4-11.\nFlender, C., & Müller, G. (2012, June). Type indeterminacy in privacy decisions: the privacy paradox revisited. In International Symposium on Quantum Interaction (pp. 148-159). Springer, Berlin, Heidelberg.\nFranzoi, S., & vom Brocke, J. (2022). Sustainability by Default? Nudging Carbon Offsetting Behavior in E-Commerce.\nFuredi, F. (2011). Defending moral autonomy against an army of nudgers. Spiked.[Online]. Retrieved on, 5(09), 2018.\nGe, Y., Xu, S., Liu, S., Fu, Z., Sun, F., & Zhang, Y. (2020, July). Learning personalized risk preferences for recommendation. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 409-418).\nGena, C., Grillo, P., Lieto, A., Mattutino, C., & Vernero, F. (2019). When personalization is not an option: An in-the-wild study on persuasive news recommendation. Information, 10(10), 300.\nGeorge, D., & Mallery, M. (2003). Using SPSS for Windows step by step: a simple guide and reference.\nGerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security, 77, 226-261.\nGibson, J. J. (1977). The theory of affordances. Hilldale, USA, 1(2), 67-82.\nGoldstein, D. G., Johnson, E. J., Herrmann, A., & Heitmann, M. (2008). Nudge your customers toward better choices. Harvard Business Review, 86(12), 99-105.\nGong, W. (2009). National culture and global diffusion of business‐to‐consumer e‐commerce. Cross cultural management: an international journal, 16(1), 83-101.\nGovani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Unpublished paper presented at the “Privacy poster fair” at the Carnegie Mellon university school of library and information science, 9, 1-17.\nGrazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395-410.\nGregor, S., & Lee‐Archer, B. (2016). The digital nudge in social security administration. International Social Security Review, 69(3-4), 63-83.\nGrossklags, J., & Acquisti, A. (2007, June). When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. In WEIS.\nGryz, J. (2013). Privacy as informational commodity.\nGuo, G., Zhang, J., Thalmann, D., & Yorke-Smith, N. (2014). Leveraging prior ratings for recommender systems in e-commerce. Electronic Commerce Research and Applications, 13(6), 440-455.\nGuo, X., Sun, Y., Yan, Z., & Wang, N. (2012). Privacy-personalization paradox in adoption of mobile health service: the mediating role of trust.\nGutierrez, A., & Calle, T. (2017). Acceptance of mobile location-based advertising: a privacy calculus model.\nGutierrez, A., O`Leary, S., Rana, N. P., Dwivedi, Y. K., & Calle, T. (2019). Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor. Computers in Human Behavior, 95, 295-306.\nHalpern, S. D., Ubel, P. A., & Asch, D. A. (2007). Harnessing the power of default options to improve health care. New England Journal of Medicine, 357(13), 1340-1344.\nHansen, P. G., & Jespersen, A. M. (2013). Nudge and the manipulation of choice: A framework for the responsible use of the nudge approach to behaviour change in public policy. European Journal of Risk Regulation, 4(1), 3-28.\nHauff, J. C., & Nilsson, J. (2021). Individual costs and societal benefits: the privacy calculus of contact-tracing apps. Journal of Consumer Marketing.\nHausman, D. M., & Welch, B. (2010). Debate: To nudge or not to nudge. Journal of Political Philosophy, 18(1), 123-136.\nHayes, A. F. (2017). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. Guilford publications.\nHenkel, C., Seidler, A. R., Kranz, J., & Fiedler, M. (2019). How to Nudge Pro-Environmental behaviour: an Experimental Study. In ECIS.\nHoffmann, C. P., Lutz, C., & Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4).\nHolbrook, M. B., & Hirschman, E. C. (1982). The experiential aspects of consumption: Consumer fantasies, feelings, and fun. Journal of consumer research, 9(2), 132-140.\nHrastović, D. (2022). PARADOX OR CYNICISM: THE QUESTION OF PRIVACY CONSIDERATION IN MOBILE APP USE (Doctoral dissertation, University of Zagreb. The Faculty of Political Science).\nHuang, Z., Yoon, S. Y., & Benyoucef, M. (2012). Adding social features to e-commerce. In Proceedings of the Conference on Information Systems Applied Research ISSN (Vol. 2167, p. 1508).\nHui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: An exploratory field experiment. Mis Quarterly, 19-33.\nHummel, D., & Maedche, A. (2019). How effective is nudging? A quantitative review on the effect sizes and limits of empirical nudging studies. Journal of Behavioral and Experimental Economics, 80, 47-58.\nHummel, D., Toreini, P., & Maedche, A. (2018). Improving digital nudging using attentive user interfaces: theory development and experiment design. In 13th International Conference on Design Science Research in Information Systems and Technology (DESRIST).\nInformation Commission’s Office (2012). Guidance on the rules on use of cookies and similar technologies. Retrieved from https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/\nInternational Trade Administration U.S. Department of Commerce (2022, November). Taiwan – eCommerce. Retrieved from https://www.trade.gov/knowledge-product/taiwan-ecommerce\nIyengar, S. S., & Lepper, M. R. (2000). When choice is demotivating: Can one desire too much of a good thing?. Journal of personality and social psychology, 79(6), 995.\nJeckmans, A. J., Beye, M., Erkin, Z., Hartel, P., Lagendijk, R. L., & Tang, Q. (2013). Privacy in recommender systems. In Social media retrieval (pp. 263-281). Springer, London.\nJesse, M., & Jannach, D. (2021). Digital nudging with recommender systems: Survey and future directions. Computers in Human Behavior Reports, 3, 100052.\nJia, H., Wisniewski, P. J., Xu, H., Rosson, M. B., & Carroll, J. M. (2015, February). Risk-taking as a learning process for shaping teen`s online information privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 583-599).\nJiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595.\nJohn, L. K., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of consumer research, 37(5), 858-873.\nJozani, M., Ayaburi, E., Ko, M., & Choo, K. K. R. (2020). Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Computers in Human Behavior, 107, 106260.\nKaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications, 171, 102807.\nKahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263-292.\nKang, H., & Oh, J. (2021). Communication privacy management for smart speaker use: Integrating the role of privacy self-efficacy and the multidimensional view. New Media & Society, 14614448211026611.\nKardes, F. R., Posavac, S. S., & Cronley, M. L. (2004). Consumer inference: A review of processes, bases, and judgment contexts. Journal of consumer psychology, 14(3), 230-256.\nKarwatzki, S., Dytynko, O., Trenz, M., & Veit, D. (2017). Beyond the personalization–privacy paradox: Privacy valuation, transparency features, and service personalization. Journal of Management Information Systems, 34(2), 369-400.\nKehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607-635.\nKeith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., & Abdullat, A. (2015). The role of mobile‐computing self‐efficacy in consumer information disclosure. Information Systems Journal, 25(6), 637-667.\nKeith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International journal of human-computer studies, 71(12), 1163-1173.\nKeller, K. L., Heckler, S. E., & Houston, M. J. (1998). The effects of brand name suggestiveness on advertising recall. Journal of marketing, 62(1), 48-57.\nKelley, P. G., Cesca, L., Bresee, J., & Cranor, L. F. (2010, April). Standardizing privacy notices: an online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human factors in Computing Systems (pp. 1573-1582).\nKezer, M., Dienlin, T., & Baruh, L. (2022). Getting the privacy calculus right: Analyzing the relations between privacy concerns, expected benefits, and self-disclosure using response surface analysis. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 16(4).\nKim, J., Gambino, A., Sundar, S. S., Rosson, M. B., Aritajati, C., Ge, J., & Fanning, C. (2018). Interface cues to promote disclosure and build community: An experimental test of crowd and connectivity cues in an online sexual health forum. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1-18.\nKlumpe, J., Koch, O. F., & Benlian, A. (2020). How pull vs. push information delivery and social proof affect information disclosure in location based services. Electronic Markets, 30(3), 569-586.\nKnijnenburg, B. P., & Kobsa, A. (2014). Increasing Sharing Tendency Without Reducing Satisfaction: Finding the Best Privacy-Settings User Interface for Social Networks. In ICIS.\nKnijnenburg, B., Raybourn, E., Cherry, D., Wilkinson, D., Sivakumar, S., & Sloan, H. (2017). Death to the privacy calculus?. Available at SSRN 2923806.\nKokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, 64, 122-134.\nKomiak, S. Y., & Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS quarterly, 941-960.\nKordzadeh, N. (2014). Communicating personal health information in virtual health communities: An integration of privacy calculus model and affective commitment. The University of Texas at San Antonio.\nKordzadeh, N., Warren, J., & Seifi, A. (2016). Antecedents of privacy calculus components in virtual health communities. International Journal of Information Management, 36(5), 724-734.\nKrasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of information technology, 25(2), 109-125.\nKrasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and privacy calculus on social networking sites: the role of culture. Business & Information Systems Engineering, 4(3), 127-135.\nLance, C. E., Butts, M. M., & Michels, L. C. (2006). The sources of four commonly reported cutoff criteria: What did they really say?. Organizational research methods, 9(2), 202-220.\nLaufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3), 22-42.\nLee, H., Lim, D., Kim, H., Zo, H., & Ciganek, A. P. (2015). Compensation paradox: the influence of monetary rewards on user behaviour. Behaviour & Information Technology, 34(1), 45-56.\nLembcke, T. B., Engelbrecht, N., Brendel, A. B., Herrenkind, B., & Kolbe, L. M. (2019). Towards a unified understanding of digital nudging by addressing its analog roots.\nLex, E., Kowald, D., Seitlinger, P., Tran, T. N. T., Felfernig, A., & Schedl, M. (2021). Psychology-informed recommender systems. Foundations and Trends® in Information Retrieval, 15(2), 134-242.\nLi, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.\nLi, Y. M., Wu, C. T., & Lai, C. Y. (2013). A social recommender mechanism for e-commerce: Combining similarity, trust, and relationship. Decision Support Systems, 55(3), 740-752.\nLiao, M., & Sundar, S. S. (2022). When e-commerce personalization systems show and tell: Investigating the relative persuasive appeal of content-based versus collaborative filtering. Journal of Advertising, 51(2), 256-267.\nLiebermann, Y., & Stashevsky, S. (2002). Perceived risks as barriers to Internet and e‐commerce usage. Qualitative Market Research: An International Journal.\nLo, J. (2010). Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites.\nLowry, P. B., Moody, G. D., & Chatterjee, S. (2017). Using IT design to prevent cyberbullying. Journal of management information systems, 34(3), 863-901.\nLu, S., Chen, G. G., & Wang, K. (2020). Overt or covert? Effect of different digital nudging on consumers’ customization choices. Nankai Business Review International.\nLutz, C., & Tamó-Larrieux, A. (2020). The robot privacy paradox: Understanding how privacy concerns shape intentions to use social robots. Human-Machine Communication, 1, 87-111.\nLutz, C., Hoffmann, C. P., & Ranzini, G. (2020). Data capitalism and the user: An exploration of privacy cynicism in Germany. new media & society, 22(7), 1168-1187.\nMa Y. (2022). Coronavirus impact on online purchases in Taiwan 2020. Statista. Retrieved from https://www.statista.com/statistics/1127293/taiwan-coronavirus-impact-on-online-purchases/\nMa, X., Qin, Y., Chen, Z., & Cho, H. (2021). Perceived ephemerality, privacy calculus, and the privacy settings of an ephemeral social media site. Computers in Human Behavior, 124, 106928.\nMalhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users` information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 15(4), 336-355.\nMarreiros, H., Tonin, M., Vlassopoulos, M., & Schraefel, M. C. (2017). “Now that you mention it”: A survey experiment on information, inattention and online privacy. Journal of Economic Behavior & Organization, 140, 1-17.\nMartin, K. (2020). Breaking the privacy paradox: the value of privacy and associated duty of firms. Business Ethics Quarterly, 30(1), 65-96.\nMarwick, A., & Hargittai, E. (2019). Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online. Information, Communication & Society, 22(12), 1697-1713.\nMasur, P. K. (2018). Situational privacy and self-disclosure: Communication processes in online environments. Springer.\nMeng, F., Guo, X., Lai, K. H., & Zhao, X. (2018). A Personalization-Privacy Paradox in Usage of Mobile Health Services: A Game Theoretic Perspective. In Wuhan International Conference on E-Business. Association For Information Systems.\nMeske, C., Amojo, I., & Mohr, P. (2020). Digital Nudging to Increase Usage of Charity Features on E-Commerce Platforms. In Wirtschaftsinformatik (Zentrale Tracks) (pp. 1203-1218).\nMeske, C., Amojo, I., Poncette, A. S., & Balzer, F. (2019, July). The potential role of digital nudging in the digital transformation of the healthcare industry. In International Conference on Human-Computer Interaction (pp. 323-336). Springer, Cham.\nMetzger, M. J. (2006). Effects of site, vendor, and consumer characteristics on web site trust and disclosure. communication research, 33(3), 155-179.\nMetzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361.\nMetzger, M. J., & Flanagin, A. J. (2013). Credibility and trust of information in online environments: The use of cognitive heuristics. Journal of pragmatics, 59, 210-220.\nMiller, S. (2005). Experimental design and statistics. Routledge.\nMilne, G. R., & Culnan, M. J. (2002). Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998-2001 US Web surveys. The Information Society, 18(5), 345-359.\nMilne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don`t read) online privacy notices. Journal of interactive marketing, 18(3), 15-29.\nMirsch, T., Lehrer, C., & Jung, R. (2017). Digital nudging: Altering user behavior in digital environments. Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), 634-648.\nMiyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer affairs, 35(1), 27-44.\nMoloney, M., & Potì, V. (2013). A behavioral perspective on the privacy calculus model. SSRN Electronic Journal.\nMoney101 (2022, September). 2022消費者網購支付行為調查. Retrieved from https://money101.events/content/202209sv-268\nMontgomery, A. L., & Smith, M. D. (2009). Prospects for Personalization on the Internet. Journal of Interactive Marketing, 23(2), 130-137.\nMukherjee, S., Manjaly, J. A., & Nargundkar, M. (2013). Money makes you reveal more: Consequences of monetary cues on preferential disclosure of personal information. Frontiers in psychology, 4, 839.\nMutimukwe, C., Kolkowska, E., & Grönlund, Å. (2020). Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Government Information Quarterly, 37(1), 101413.\nNorberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of consumer affairs, 41(1), 100-126.\nNosko, A., Wood, E., Kenney, M., Archer, K., De Pasquale, D., Molema, S., & Zivcakova, L. (2012). Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when personal profiles are constructed?. Computers in Human Behavior, 28(6), 2067-2074.\nOsterwalder, A., & Pigneur, Y. (2002). An eBusiness model ontology for modeling eBusiness.\nOzdemir, Z. D., Jeff Smith, H., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642-660.\nPavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS quarterly, 105-136.\nPeter, J. P., & Tarpey Sr, L. X. (1975). A comparative analysis of three consumer decision strategies. Journal of consumer research, 2(1), 29-37.\nPosey, C., Lowry, P. B., Roberts, T. L., & Ellis, T. S. (2010). Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities. European journal of information systems, 19(2), 181-195.\nPutra, A. A., Mahendra, R., Budi, I., & Munajat, Q. (2017, November). Two-steps graph-based collaborative filtering using user and item similarities: Case study of E-commerce recommender systems. In 2017 International Conference on Data and Software Engineering (ICoDSE) (pp. 1-6). IEEE.\nRahman, M. S. (2019, June). Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior. In 2019 10th International Conference on Information and Communication Systems (ICICS) (pp. 41-46). IEEE.\nReips, U. D. (2006). Web-Based Methods.\nResearch and Markets. (2022, July). Taiwan B2C Ecommerce Market Opportunities Databook - 100+ KPIs on Ecommerce Verticals (Shopping, Travel, Food Service, Media & Entertainment, Technology), Market Share by Key Players, Sales Channel Analysis, Payment Instrument, Consumer Demographics - Q2 2022 Update. Retrieved from https://www.researchandmarkets.com/reports/5648290/taiwan-b2c-ecommerce-market-opportunities\nRizzo, M. J., & Whitman, D. G. (2008). Little brother is watching you: New paternalism on the slippery slopes. NYU Law School, Public Law Research Paper, (08-12), 08-15.\nRöthlisberger, M. (2020). Digital Nudging Decoy Effect and Social Norms Nudge in E-commerce.\nSah, Y. J., & Peng, W. (2015). Effects of visual and linguistic anthropomorphic cues on social perception, self-awareness, and information disclosure in a health website. Computers in Human Behavior, 45, 392-401.\nSchafer, J. B., Frankowski, D., Herlocker, J., & Sen, S. (2007). Collaborative filtering recommender systems. In The adaptive web (pp. 291-324). Springer, Berlin, Heidelberg.\nSchafer, J. B., Konstan, J., & Riedl, J. (1999, November). Recommender systems in e-commerce. In Proceedings of the 1st ACM conference on Electronic commerce (pp. 158-166).\nSchär, A., & Stanoevska-Slabeva, K. (2019). Application of digital nudging in customer journeys–A systematic literature review.\nSchaub, F., Balebako, R., Durity, A. L., & Cranor, L. F. (2015). A design space for effective privacy notices. In Eleventh symposium on usable privacy and security (SOUPS 2015) (pp. 1-17).\nSchneider, D., Klumpe, J., Adam, M., & Benlian, A. (2020). Nudging users into digital service solutions. Electronic Markets, 30(4), 863-881.\nSchneider, D., Lins, S., Grupp, T., Benlian, A., & Sunyaev, A. (2017). Nudging users into online verification: The case of carsharing platforms.\nSelinger, E., & Whyte, K. P. (2010). Competence and trust in choice architecture. Knowledge, Technology & Policy, 23(3), 461-482.\nSen, A. (1988). Freedom of choice: concept and content. European economic review, 32(2-3), 269-294.\nSheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of advertising, 28(3), 37-51.\nSimon, H. A. (1955). A behavioral model of rational choice. The quarterly journal of economics, 69(1), 99-118.\nSivapalan, S., Sadeghian, A., Rahnama, H., & Madni, A. M. (2014, August). Recommender systems in e-commerce. In 2014 World Automation Congress (WAC) (pp. 179-184). IEEE.\nSmith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS quarterly, 989-1015.\nSolove, D. J. (2015). The meaning and value of privacy. Social dimensions of privacy: Interdisciplinary perspectives, 71-81.\nSpottswood, E. L., & Hancock, J. T. (2017). Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication, 22(2), 55-70.\nSumner, C., Byers, A., & Shearing, M. (2011). Determining personality traits & privacy concerns from facebook activity. Black Hat Briefings, 11(7), 197-221.\nSun, Y., Drivas, M., Liao, M., & Sundar, S. S. (2023, April). When Recommender Systems Snoop into Social Media, Users Trust them Less for Health Advice. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (pp. 1-14).\nSun, Y., Fang, S., & Hwang, Y. (2019). Investigating privacy and information disclosure behavior in social electronic commerce. Sustainability, 11(12), 3311.\nSun, Y., Wang, N., Shen, X. L., & Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278-292.\nSundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility (pp. 73-100). Cambridge, MA: MacArthur Foundation Digital Media and Learning Initiative.\nSundar, S. S., Jia, H., Waddell, T. F., & Huang, Y. (2015). Toward a theory of interactive media effects (TIME) four models for explaining how interface features affect user psychology. The handbook of the psychology of communication technology, 47-86.\nSundar, S. S., Kim, J., & Gambino, A. (2017). Using theory of interactive media effects (TIME) to analyze digital advertising. In Digital advertising (pp. 86-109). Routledge.\nSundar, S. S., Kim, J., Rosson, M. B., & Molina, M. D. (2020, April). Online privacy heuristics that predict information disclosure. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-12).\nSunstein, C. R. (2014). Nudging: a very short guide. Journal of Consumer Policy, 37(4), 583-588.\nSwaminathan, V., Lepkowska-White, E., & Rao, B. P. (1999). Browsers or buyers in cyberspace? An investigation of factors influencing electronic exchange. Journal of computer-mediated communication, 5(2), JCMC523.\nThaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven & London: Yale University Press.\nThaler, R. H., Sunstein, C. R., & Balz, J. P. (2013). Choice architecture (Vol. 2013). Princeton, NJ: Princeton University Press.\nTsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information systems research, 22(2), 254-268.\nTufekci, Z. (2008). Grooming, gossip, Facebook and MySpace: What can we learn about these sites from those who won`t assimilate?. Information, Communication & Society, 11(4), 544-564.\nTversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124-1131.\nTversky, A., & Kahneman, D. (1985). The framing of decisions and the psychology of choice. In Behavioral decision making (pp. 25-41). Springer, Boston, MA.\nUNCTAD. (2022). COVID-19 has changed online shopping forever, survey shows. Retrieved from https://unctad.org/news/covid-19-has-changed-online-shopping-forever-survey-shows.\nVan Eerde, W., & Thierry, H. (1996). Vroom`s expectancy models and work-related criteria: A meta-analysis. Journal of applied psychology, 81(5), 575.\nVan Herpen, E., Pieters, R., & Zeelenberg, M. (2009). When demand accelerates demand: Trailing the bandwagon. Journal of Consumer Psychology, 19(3), 302-312.\nvan Ooijen, I., Segijn, C. M., & Opree, S. J. (2022). Privacy Cynicism and its Role in Privacy Decision-Making. Communication Research, 00936502211060984.\nVan Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 1.\nWakil, K., Alyari, F., Ghasvari, M., Lesani, Z., & Rajabion, L. (2019). A new model for assessing the role of customer behavior history, product classification, and prices on the success of the recommender systems in e-commerce. Kybernetes.\nWang, L., Hu, H. H., Yan, J., & Mei, M. Q. (2019). Privacy calculus or heuristic cues? The dual process of privacy decision making on Chinese social media. Journal of Enterprise Information Management.\nWang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International journal of information management, 36(4), 531-542.\nWang, Y. Y., Luse, A., Townsend, A. M., & Mennecke, B. E. (2015). Understanding the moderating roles of types of recommender systems and products on customer behavioral intention to use recommender systems. Information Systems and e-Business Management, 13(4), 769-799.\nWarren, S. D., & Louis, D. (1890). Brandeis, The Right to Privacy, 4 Harv. L. rev, 193(10.2307), 1321160.\nWason, P. C., & Evans, J. S. B. (1974). Dual processes in reasoning?. Cognition, 3(2), 141-154.\nWeinmann, M., Schneider, C., & Brocke, J. V. (2016). Digital nudging. Business & Information Systems Engineering, 58(6), 433-436.\nWestin, A. F. (1967). Privacy and freedom Atheneum. New York, 7, 431-453.\nWilkinson, N., & Klaes, M. (2017). An introduction to behavioral economics. Bloomsbury Publishing.\nWilkinson, T. M. (2013). Nudging and manipulation. Political Studies, 61(2), 341-355.\nWilson, D., & Valacich, J. S. (2012). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus.\nWu, J., Ping, L., Wang, H., Lin, Z., & Zhang, Q. (2008, December). Research on improved collaborative filtering-based mobile e-commerce personalized recommender system. In 2008 International Conference on MultiMedia and Information Technology (pp. 143-146). IEEE.\nXhafa, F. (2019). Lecture Notes on Data Engineering and Communications Technologies.\nXiao, B., & Benbasat, I. (2007). E-commerce product recommendation agents: Use, characteristics, and impact. MIS quarterly, 137-209.\nXie, E., Teo, H. H., & Wan, W. (2006). Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing letters, 17(1), 61-74.\nXie, W., Chen, C., & Sithipolvanichgul, J. (2022). Understanding e-commerce customer behaviors to use drone delivery services: A privacy calculus view. Cogent Business & Management, 9(1), 2102791.\nXu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151-168.\nXu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual`s privacy concerns: Toward an integrative view.\nXu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1.\nXu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems, 51(1), 42-52.\nXu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of management information systems, 26(3), 135-174.\nYoun, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs, 43(3), 389-418.\nYu, L., Li, H., He, W., Wang, F. K., & Jiao, S. (2020). A meta-analysis to explore privacy cognition and information disclosure of internet users. International Journal of Information Management, 51, 102015.\nZafeiropoulou, A. M., Millard, D. E., Webber, C., & O`Hara, K. (2013, May). Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?. In Proceedings of the 5th Annual ACM Web Science Conference (pp. 463-472).\nZaichkowsky, J. L. (1985). Measuring the involvement construct. Journal of consumer research, 12(3), 341-352.\nZaichkowsky, J. L. (1994). The personal involvement inventory: Reduction, revision, and application to advertising. Journal of advertising, 23(4), 59-70.\nZangerle, E., & Bauer, C. (2022). Evaluating Recommender Systems: Survey and Framework. ACM Computing Surveys (CSUR).\nZeithaml, V. A. (2002). Service excellence in electronic channels. Managing Service Quality: An International Journal.\nZhang, B., & Xu, H. (2016, February). Privacy nudges for mobile applications: effects on the creepiness emotion and privacy attitudes. In Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing (pp. 1676-1690).\nZhang, B., Wang, N., & Jin, H. (2014). Privacy concerns in online recommender systems: influences of control and user data input. In 10th Symposium On Usable Privacy and Security (SOUPS 2014) (pp. 159-173).\nZhang, S., Yao, L., Sun, A., & Tay, Y. (2019). Deep learning based recommender system: A survey and new perspectives. ACM Computing Surveys (CSUR), 52(1), 1-38.\nZhang, Y., & Chen, X. (2020). Explainable recommendation: A survey and new perspectives. Foundations and Trends® in Information Retrieval, 14(1), 1-101.\nZhu, H., Ou, C. X., van den Heuvel, W. J. A., & Liu, H. (2017). Privacy calculus and its utility for personalization services in e-commerce: An analysis of consumer decision-making. Information & Management, 54(4), 427-437.\nZhu, M., Wu, C., Huang, S., Zheng, K., Young, S. D., Yan, X., & Yuan, Q. (2021). Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. Telematics and Informatics, 61, 101601.; G0109461001; https://nccur.lib.nccu.edu.tw//handle/140.119/145904; https://nccur.lib.nccu.edu.tw/bitstream/140.119/145904/1/100101.pdf

  2. 2
    Dissertation/ Thesis
  3. 3
  4. 4
    Academic Journal
  5. 5
    Academic Journal
  6. 6
    Dissertation/ Thesis

    المؤلفون: 趙蘊慈, Care Chao, Chao, Care

    المساهمون: 羅明琇, Sonia Lo

    وصف الملف: 1864944 bytes; application/pdf

    Relation: 壹、中文部分\n林悠閔 (2011),窯烤Pizza業之經營策略探討,政治大學經營管理碩士學程EMBA論文。\n\n洪清怡 (譯) (2013),食物的全球經濟學:從一片披薩講起。衛城出版。(原作者:Paul Trummer,原著出版年:2010)\n\n黃亭睿 (譯) (2012),披薩:吃的全球史。衛城出版。(原作者:Carol Helstosky,原著出版年:2008)\n\n貳、英文部份\nEconomist Intelligence Unit (2020). Global Outlook Summary\n\nFranchise Chatter (2014). Franchise Costs: Detailed Estimates of Pieology Franchise Costs (2019 FDD), Retrieved from\nhttps://www.franchisechatter.com/2014/03/20/franchise-costs-detailed-estimates-of-pieology-franchise-costs-2013-fdd/ on March 10, 2021\n\nIHS Markit (2021). World Overview\n\nInternational Monetary Fund (2021). World Economic Outlook Update, 2-4.\n\nLi Shan (2016). Panda Express buys a minority stake in Pieology Pizzeria, Retrieved from\nhttps://www.latimes.com/business/la-fi-pieology-panda-express-20160120-story.html on March 10, 2021\n\nLi Shan (2016). Pieology acquires rival Project Pie, Retrieved from\nhttps://www.latimes.com/business/la-fi-pieology-20160622-snap-story.html on March 10, 2021\n\nLuna Nancy (2014). Pizza gets personal: Build-it-yourself pie shops explode on food scene, Retrieved from\nhttps://www.ocregister.com/2014/07/17/pizza-gets-personal-build-it-yourself-pie-shops-explode-on-food-scene/ on March 10, 2021\n\nPieology Pizzeria (2016). Fast Casual Pizza Concept Opens First of Three Locations in New Territory, Retrieved from\nPieology Pizzeria Opens First Guam Location (franchising.com) on March 10, 2021\n\nPieology Pizzeria (2016). Pieology Pizzeria Announces Strategic Investment From Founders of Panda Restaurant Group, Retrieved from\nhttps://www.globenewswire.com/news-release/2016/01/19/1210966/0/en/Pieology-Pizzeria-Announces-Strategic-Investment-From-Founders-of-Panda-Restaurant-Group.html on March 10, 2021\n\nQSR (2016). Pieology Opens First of 20 Hawaii Locations, Retrieved from\nhttps://www.qsrmagazine.com/news/pieology-opens-first-20-hawaii-locations on March 10, 2021\n\nQSR (2018). Pieology Pizzeria to Expand Into Spain, Accelerate Franchise Growth, Retrieved from\nhttps://www.qsrmagazine.com/news/pieology-pizzeria-expand-spain-accelerate-franchise-growth on March 10, 2021\n\nSchlossberg Mallory (2015). The fastest-growing restaurant in America should terrify traditional pizza chains, Retrieved from\nhttps://www.businessinsider.com/pieology-pizza-business-story-and-expansion-2015-6 on March 10, 2021\n\nThe World Bank (2021). Global Economics Prospects, 39-41.\n\nUnited Nations (2021). World Economic Situation and Prospects 2020, 175-188.; G0107932426; https://nccur.lib.nccu.edu.tw//handle/140.119/136404; https://nccur.lib.nccu.edu.tw/bitstream/140.119/136404/1/242601.pdf

  7. 7
  8. 8
    Academic Journal

    المؤلفون: 楊伶琪, Yang, Lin-Chi

    المساهمون: 曹承礎, 臺灣大學:資訊管理學研究所

    وصف الملف: 38441675 bytes; application/pdf

    Relation: [1] A.I. Schein, A. Popescul, L.H. Ungar, and D.M. Pennock, “Methods and Metrics for Cold-Start Recommendations,” Proc. 25th Ann. Int’l ACM SIGIR Conf., 2002. [2] Abbattista, F., Degemmis, M., Fanizzi, N., Licchelli, O., Lops, P., Semeraro, G., and Zambetta, F., “Learning User Profiles for Content-Based Filtering in e-Commerce,” in Proceedings AI*AI Workshop su Apprendimento Automatico: Metodi e Application. Sienna, Italy, 2002. [3] Adomavicius, G., Tuzhilin, A., “Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, No.6, 2005. [4] Apte’, C., Damerau, F., Weiss, S. M., “Automated Learning of Decision Rules for Text Categorization,” ACM Transaction on Information Systems, vol.12, No.3, pp.233-251, 1994. [5] Balabanovic, M., Shoham, Y., “Fab: Content-based, Collaborative Recommendation,” Comm. ACM, vol. 40, no.3, pp.66-72, 1997. [6] Berkovsky, S., “Ubiquitous User Modeling in Recommender Systems,” in Proc. of the UM Conference, Edinbirgh, UK, 2005. [7] Claypool, M., Gokhale, A., Miranda, T., Murnikov, P., Netes, D., and Sartin, M., “Combining Content-Based and Collaborative Filters in an Online Newspaper,” Proc. ACM SIGIR ’99 Workshop Recommender Systems: Algorithms and Evaluation, Aug. 1999. [8] Dumais, S., Platt, J., Heckerman, D., and Sahami, M., “Inductive Learning Algorithms and Representations for Text Categorization,” Proceedings of the 1998 ACM 17th International Conference on Information and Knowledge Management(CIKM’98), pp.148-155, 1998. [9] Grorge Karypis, “Evaluation of Item-based Top-N Recommendation Algorithms,” Technical Report #00-046, Department of Computer Science, University of Minnesota/Army HPC Research Center. [10] Hanani, U., Shapira, B., Shoval, P., “Information Filtering: Overview of Issues, Research and Systems,” in User Modeling and User Adapted Interactions, vol.11(3), pp.203-259, 2001. [11] J. Fink, A. Kobsa, “A Review and Analysis of Commerical User Modeling Servers for Personalization on the World Wide Web,” User Modeling and User-Adapted Interaction, 2000. [12] J.J. Rocchio, “Relevance Feedback in Information Retrieval,” SMART Retrieval System-Experiments in Automatic Document Processing, G. Salton, ed., ch.14, Prentice Hall, 1971. [13] JB Schafer, “Recommender Systems in E-Commerce,” E-Commerce of the ACM, 1999. [14] JB Schafer, JA Konstan, J Riedl, “E-Commerce Recommendation Applications,” Data Mining and Knowledge Discovery, 5, p115-p153, 2001. [15] Joachims, T., Freitag, D. and Mitchell, T., “WebWatcher: A tour guide for the World Wide Web,” Proceedings of 15th International Joint Conference on Artificial Intelligence, IJCAI’97, pp. 770-775, 1997. [16] Lang, K., “NewsWeeder: Learning to filter netnews,” In Proceedings of the 12th International Conference on Maching(Tahoe City, Calif), 1995. [17] Mitchell T., “Machine Learning,” McGraw-Hill, New York, 1997. [18] Paul Resnick and Hal R. Varian., “Recommender Systems,” Commnuication of ACM, 40(3):56-58, 1997 [19] Pazzani, M. and Billsus, D., “Learning and Revising User Profiles: The Identification of Interesting Web Sites,” Mechine Learning, vol. 27, pp. 313-331, 1997 [20] Porter, Martin, “An Algorithm for Suffix Stripping,” in Progam, vol. 14, no. 3, 1980. [21] R. J. Mooney and L. Roy, “Content-Based Book Recommending Using Learning for Text Categorization,” Proceedings of the Fifth ACM Conference on Digital Libraries, San Antonio, TX, pp. 195-204, June 2000. [22] R. Kohavi, B. Becker, and D. Sommerfield, “Improving simple Bayes,” Proceedings of the European Conference on Machine Learning, 1997. [23] Resnick, P., Iacovou, N., Suchak, M., Bergstorm, P. and Riedl, J., “Grouplens: An Open Architecture for Collaborative Filtering of Netnews.” In Proceedings of ACM CSCW’94, 1994. [24] Soboroff, I., and Nicholas, C., “Combining Content and Collaboration in Text Filtering,” Proc. Int’l Joint Conf. Artificial Intelligence Workshop: Machine Learning for Information Filtering, Aug. 1999. [25] T. Anderson and J. D. Finn, “The New Statistical Analysis of Data,” Springer Verlag, New York, 1996. [26] T.W. Malone, K.R. Grant, F.A.Turbak, S.A.Brobst, and M.D.Cohen, “Intelligent Information Sharing System,” Communications of the ACM, 30, 5, 1987. [27] Terveen, L. and Hill, W., “Beyond Recommender System: Helping People Help Each Other,” in HCI in the New Millennium, Jack Carroll, ed., Addison-Wesley, 2001. [28] 劉先烜, “協同合作式社會網絡篩選:結合網頁結構探勘與協同合作式篩選的個人化機制,” 台大資管所碩士論文, 民國九十一年六月。 [29] Amazon. http://www.amazon.com/ [30] CDNow. http://www.cdnow.com. [31] eBay. http://www.ebay.com/ [32] MovieFinder. http://www.moviefinderonline.com/ [33] MovieLen. http://www.movielen.com [34] Reel. http://www.reel.com [35] 文件自動分類. http://www.lins.fju.edu.tw/~tseng/ResearchResults/categorization.htm; zh-TW; http://ntur.lib.ntu.edu.tw/handle/246246/54331; http://ntur.lib.ntu.edu.tw/bitstream/246246/54331/1/ntu-95-R93725030-1.pdf

  9. 9
    Academic Journal
  10. 10
    Academic Journal
  11. 11
    Academic Journal

    المؤلفون: 黃錫煙, Huang, Shi-Yen

    المساهمون: 曹承礎, 臺灣大學:資訊管理學研究所

    وصف الملف: 676619 bytes; application/pdf

    Relation: 參考文獻 【1】 巫和懋、夏珍(2002): "賽局高手--全方位策略與應用",時報出 版社,巫和懋教授"訊息與策略經濟學"手稿 【2】 Moore, Geoffrey A.著 陳正平 譯,Inside the tornado,龍捲風暴,麥田出版社,民國八十五年,原著1995年出版。 【3】 Moore, Geoffrey A.著 陳正平譯,Living on the Fault Line,斷層線上,臉譜出版社,民國九十年,原著2000年出版。 【4】 Rober S. Pindy / Daniel L. Rubinfeld(2001) 個體經濟學五版 ,華泰文事業公司出版 【5】 Donald N. Sull(2003) 成功部墜-- 最適者在生-李田樹、李芳齡 譯 ,天下雜誌出版 【6】 Bernard H. Boar (1996 )Strategic Thinking for Information Technology 【7】 Bernard Boar (2001 )The Art of Strategic Planning for Information Technology (Second Edition) 【8】 Boar B.(2001):"The Art of Strategic Planning for Information Technology",2nd Edition, Wiley Computer Publishing, .John Wiley & Sons, Inc 【9】 R. Preston McAfee(2002) competitive solutions the strategist’s toolkit 【10】 George Coulouris / Jean Dollimore / Tim Kindberg(2001) Distributed Systems Concepts and Design third edition 【11】 Frank J. Fabozzi (2000) Bond Markets, Analysis and Strategies fourth edition 【12】 Eduardo S. Schwartz & Zozaya-Gorostiza C. (2000), "Evaluating Investments in Disruptive Technologies", UCLA, Working pape 【13】 Porter, M.(1980), Competitive Advantage : Techniques for Analyzing Industries and Competitors, Free Press; zh-TW; http://ntur.lib.ntu.edu.tw/handle/246246/54419; http://ntur.lib.ntu.edu.tw/bitstream/246246/54419/1/ntu-93-R90725004-1.pdf

  12. 12
    Academic Journal

    المؤلفون: 黃翊展, Huang, Yi-Jhan

    المساهمون: 莊裕澤, 臺灣大學:資訊管理學研究所

    وصف الملف: 15148219 bytes; application/pdf

    Relation: [1] Daml.org, http://www.daml.org/. [2] Snomed international: The systematized nomenclature of medicine, http://www.snomed.org/. [3] Unspsc homepage, http://www.unspsc.org/. [4] Virtualhelsinki, http://www.virtualhelsinki.net/. [5] Warfarin, http://www.kroger.com/HN Drug/Warfarin.htm. [6] Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle, Privacy in e- commerce: examining user scenarios and privacy preferences, Proceedings of the 1st ACM conference on Electronic commerce, ACM Press, 1999, pp. 1{8. [7] Macoto Bank, Macoto bank loan center, http://macoto123.myweb.hinet.net/index.htm. [8] Tim Berners-Lee, James Hendler, and Ora Lassila, Scienti‾c american: The semantic web, http://www.sciam.com/print version.cfm?articleID=00048144- 10D2-1C70-84A9809EC588EF21, 17 May 2001. [9] Dan Brickley and R.V. Guha, Rdf vocabulary description language 1.0: Rdf schema, http://www.w3.org/TR/rdf-schema/, December 2003. [10] Dan Brickley and Libby Miller, FOAF Vocabulary Speci‾cation , http://xmlns.com/foaf/0.1/, May 2004. [11] Shi-Cho Cha and Yuh-Jzer Joung, On derived data service in the cyberspace, Posters of the Twelfth World Wide Web Conference (WWW2003), 2003. [12] Shic-Cho Cha, The realization of a universal pro‾le system in the cyberspace, Ph.D. thesis, National Taiwan University, Taipei, Taiwan, 2003. [13] U.S. Department OF Commerce, Safe harbor privacy principles, http://www.export.gov/safeharbor/SHPRINCIPLESFINAL.htm, July 2000. [14] Karen Coyle, P3p:pretty poor privacy?a social analysis of the platform for privacy preferences (p3p), http://www.kcoyle.net/p3p.html, June 1999. [15] Mary J. Culnan, How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use, Management Information System Quarterly 17 (1993), no. 3, 341{363. [16] Catalina M. Danis, Extending the concept of awareness to include static and dynamic person information, ACM Special Interest Group on Supporting Group Work(SIGGROUP) Bulletin 21 (2000), no. 3, 59{62. [17] David Karger David Huynh and Dennis Quan, Haystack: a platform for creating, organizing and visualizing information using rdf, Semantic Web Workshop, The Eleventh World Wide Web Conference 2002 (WWW2002) (Hawaii, America), May 7, 2002. [18] Canada Government, The personal information protection and electronic docu- ments act, http://www.privcom.gc.ca/legislation/02 06 01 e.asp, April 2000. [19] German Government, Federal data protection act, http://www.datenschutz- berlin.de/gesetze/bdsg/bdsgeng.htm, September 1994. [20] UK Government, Data protection act 1998, http://www.hmso.gov.uk/acts/acts1998/19980029.htm#aofs, 1998. [21] Thomas R. Gruber, A translation approach to portable ontology speci‾cation, Knowledge Acquisition, An International Journal of Knowledge Acquisition for Knowledge-Based Systems 5 (1993), no. 2, 199{220. [22] Norman Haas, Ruud Bolle, Nevenka Dimitrova, Angel Janevski, and John Zim- merman, Personalized news through content augmentation and pro‾ling, Pro- ceedings of International Conference on Image Processing ICIP2002, IEEE Press, 22-25 September 2002, pp. 9{12. [23] Chun-Tang Huang, On personal data license design, Master's thesis, National Taiwan University, Taipei, Taiwan, July 2004. [24] Wen-Shan Lin and Nathalie Cassaigne, Ishopping agent: a knowledge base as- sisting online shoppers through ontologies, Proceedings of the 2003 IEEE Inter- national Engineering Management Conference (IEMC-2003) on Managing Tech- nologically Driven Organizations, 2003, pp. 522{526. [25] Richard O. Mason, Four ethical issues of the information age, Management In- formation System Quarterly 10 (1986), no. 1, 5{12. [26] Deborah L. McGuinness and Frank van Harmelen, Owl web ontology language overview, http://www.w3.org/TR/owl-features/, April 2004. [27] Microsoft, Microsoft .net passport, http://www.microsoft.com/net/services/passport/. [28] Sandra J. Milberg, H. Je® Smith Sandra J. Burke, and Ernest A. Kallman, Val- ues, personal information privacy, and regulatory approaches, CACM 38 (1995), no. 12, 65{74. [29] Arthur Miller, Ethics and the management of computer technology, w. michael ho®man and jen- nifer m. moore ed., ch. Computers and privacy, pp. 93{108, Cambridge, MA: Oelgeschlager, Gunn and Hain, 1982. [30] Maurice D. Mulvenna, Sarabjot S. Anand, and Alex G. BÄuchner, Personalization on the net using web mining, Commun. ACM 43 (2000), no. 8, 122{125. [31] Mark Neighbors, Ontology http://www.davincinetbook.com:8080/daml/rdf/personal- info.daml, http://www.daml.org/ontologies/2, October 2000. [32] Natalya Fridman Noy and Deborah L. McGuinness, Ontology development 101: A guide to creating your ‾rst ontology, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report, 2001. [33] The Taiwan Ministry of Justice, The taiwan ministry of justice, http://gina.nat.gov.tw/rdec1/agent/C/c00000117-thb- laws/output/d1 3 detail.aspx, 2004. [34] THE EUROPEAN PARLIAMENT and THE COUNCIL, Data protection: Eu directive 95/46/ec, http://www.dataprivacy.ie/6aii.htm, October 1995. [35] Birgit P‾tzmann and Michael Waidner, Privacy in browser-based attribute ex- change, Proceeding of the ACM workshop on Privacy in the Electronic Society- WPES2002, ACM Press, 2002, pp. 52{62. [36] H.Je® Smith, Managing privacy: Information technology and corporate america, University of North Carolina Press, June 1994, Chapel Hill, NC. [37] H.Je® Smith, Sandra J. Milberg, and Sandra J. Burke, Information privacy: Measuring individuals' concerns about corporate practices, Management Infor- mation System Quarterly 20 (1996), no. 2, 167{196. [38] John F. Sowa, Knowledge Representation - Logical, Philosophical, and Compu- tational Foundations, ch. Ontology, p. 51, Brooks/cole, 2000. [39] Eugene F. Stone, Donald G. Gardner, Hal G. Gueutal, and Stephen McClure, A ‾eld experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations, Applied Psychol 68 (1983), no. 3, 459{468. [40] World Wide Web Consortium (W3C), The platform for privacy preferences 1.0 (p3p1.0) speci‾cation, http://www.w3.org/TR/P3P/, 2002. [41] Cheng Yen, On the design and implementation in the negotiation model for on- line personal data licensing, Master's thesis, National Taiwan University, Taipei, Taiwan, July 2004.; en-US; http://ntur.lib.ntu.edu.tw/handle/246246/54371; http://ntur.lib.ntu.edu.tw/bitstream/246246/54371/1/ntu-93-R91725036-1.pdf

  13. 13
  14. 14
    Academic Journal
  15. 15
    Dissertation/ Thesis

    المؤلفون: 徐愛茹, Hsu, Ai-Ju

    المساهمون: 梁定澎 彭志宏, Liang, Ting-Peng Peng, Chih-Hung

    وصف الملف: 4052177 bytes; application/pdf

    Relation: 一、 中文文獻:\n[1] 何自然,冉永平(2000)。《關聯性:溝通與認知》導讀。外語教學與研究出版社。取自https://doi.org/10.1191/026765800673158592\n[2] 賴立芸(2019)。資訊隱私悖論因素探討。國立政治大學資訊管理學系碩士論文,台北市。取自https://hdl.handle.net/11296/uzx2qt\n[3] 林承穎(2017)。從調節焦點和隱私計算探討社群網站使用者隱私揭露之研究。淡江大學資訊管理學系碩士班碩士論文,新北市。取自https://hdl.handle.net/11296/xaf922\n[4] 趙庭瑋(2009)。調節焦點對尋求多樣之影響。國立臺灣大學商學研究所碩士論文,台北市。取自http://ntur.lib.ntu.edu.tw//handle/246246/184558\n[5] 馬慶玲(2010)。調節焦點影響廣告效果之研究。國立政治大學心理學研究所碩士論文,台北市。 取自https://hdl.handle.net/11296/uemup5\n\n二、 英文文獻:\n[1] Anderson, C. L., &Agarwal, R. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. In Information Systems Research (Vol. 22, Issue 3, pp. 469–490). https://doi.org/10.1287/isre.1100.0335\n[2] Bansal, G., Zahedi, F. M., &Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. https://doi.org/10.1016/j.dss.2010.01.010\n[3] Basyuk, D., Prymak, T., &Pohuda, N. (2018). The role of informational technologies in creating a personalized customer experience: a case study of tourism branch in Ukraine. Centre for European Studies (CES) Working Papers, 10(3),406–422. http://search.ebscohost.com/login.aspx?direct=true&db=asx&AN=133272521&lang=de&site=eds-live\n[4] Brown, J. O., Broderick, A. J., &Lee, N. (2007). Online Communities : Conceptualizing the Online Social Network. Journal of Interactive Marketing, 21(3), 2–20. https://doi.org/10.1002/dir\n[5] Celsi, R. L., &Olson, J. C. (1988). The Role of Involvement in Attention and Comprehension Processes. Journal of Consumer Research, 15(2), 210. https://doi.org/10.1086/209158\n[6] Chellappa, R. K., &Raymond G. Sin. (2005). Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma. Information Technology and Management, 6(2–3), 181–202. https://doi.org/10.3138/cras.42.1.7\n[7] Chellappa, R. K., &Shivendu, S. (2007). An economic model of privacy: A property rights approach to regulatory choices for online personalization. Journal of Management Information Systems, 24(3), 193–225. https://doi.org/10.2753/MIS0742-1222240307\n[8] Craciun, G. (2018). Choice defaults and social consensus effects on online information sharing: The moderating role of regulatory focus. Computers in Human Behavior, 88(June), 89–102. https://doi.org/10.1016/j.chb.2018.06.019\n[9] Culnan, M. J., Armstrong, P. K., Science, S. O., Feb, N. J., Culnan, M. J., &Armstrong, P. K. (1999). Information Privacy Concerns , Procedural Fairness , and Impersonal Trust : An Empirical Investigation. 10(1), 104–115.\n[10] Culnan, M. J., &Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. https://doi.org/10.1111/1540-4560.00067\n[11] Dienlin, T., &Metzger, M. J. (2016). An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample. Journal of Computer-Mediated Communication, 21(5), 368–383. https://doi.org/10.1111/jcc4.12163\n[12] Dinev, T., &Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080\n[13] Dinev, T., Xu, H., Smith, J. H., &Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacyrelated concepts. European Journal of Information Systems, 22(3), 295–316. https://doi.org/10.1057/ejis.2012.23\n[14] Gauzente, C. (2004). Web Merchants’ Privacy and Security Statements : How Reassuring Are They for Consumers ? a Two-Sided Approach. Journal of Electronic Commerce Research, 5(3), 181–198.\n[15] Gerber, N., Gerber, P., &Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers and Security, 77, 226–261. https://doi.org/10.1016/j.cose.2018.04.002\n[16] Gupta, Ashish; Patel, Vimla L.; Greenes, R. A. (2016). Advances in Healthcare Informatics an Analytics. https://doi.org/10.1007/978-3-319-23294-2\n[17] Higgins, E. T. (1998). Promotion and Prevention: Regulatory Focus as A Motivational Principle. Advances in Experimental Social Psychology, 30(C), 1–46. https://doi.org/10.1016/S0065-2601(08)60381-0\n[18] Hsiao, C. H., Tsai, C. F., &Hsu, Y. H. (2012). The influences of self-construal and regulatory focus on impulsive buying behavior. NTU Management Review, 23(1), 119–150. https://doi.org/10.6226/NTURM2012.AUG.M5\n[19] Jung, A. R. (2017). The influence of perceived ad relevance on social media advertising: An empirical examination of a mediating role of privacy concern. Computers in Human Behavior, 70, 303–309. https://doi.org/10.1016/j.chb.2017.01.008\n[20] Kehr, F., Kowatsch, T., Wentzel, D., &Fleisch, E. (2015). Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607–635. https://doi.org/10.1111/isj.12062\n[21] Krasnova, H., Spiekermann, S., Koroleva, K., &Hildebrand, T. (2010). Online Social Networks: Why We Disclose Author Version. Journal of Information Technology, 25(2), 109–125.\n[22] Krishnan, M. S., &Awad, N. F. (2006). The Personalization Privacy Paradox : An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. 30(1), 13–28.\n[23] Laufer, R. S., &Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.\n[24] Li, H., &Sarathy, R. (2007). Understanding online information disclosure as a privacy calculus adjusted by exchange fairness. In ICIS 2007 Proceedings - Twenty Eighth International Conference on Information Systems.\n[25] Li, H., Sarathy, R., &Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62–71. https://doi.org/10.1080/08874417.2010.11645450\n[26] Li, H., Sarathy, R., &Xu, H. (2011). The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434–445. https://doi.org/10.1016/j.dss.2011.01.017\n[27] Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481. https://doi.org/10.1016/j.dss.2012.06.010\n[28] Liberman, N., Idson, L. C., Camacho, C. J., &Higgins, E. T. (1999). Promotion and prevention choices between stability and change. Journal of Personality and Social Psychology, 77(6), 1135–1145. https://doi.org/10.1037/0022-3514.77.6.1135\n[29] Liu, X. (2013). How Are People Enticed to Disclose Personal Information Despite Privacy Concerns in Social Network Sites? The Calculus Between Benefit and Cost. Journal of the American Society for Information Science and Technology, 64(July), 1852–1863. https://doi.org/10.1002/asi\n[30] Lockwood, P., Jordan, C. H., &Kunda, Z. (2002). Motivation by positive or negative role models: Regulatory focus determines who will best inspire us. Journal of Personality and Social Psychology, 83(4), 854–864. https://doi.org/10.1037/0022-3514.83.4.854\n[31] Malhotra, N. K., Kim, S. S., &Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032\n[32] Milne, G. R. (1997). Consumer participation in mailing lists: A field experiment. Journal of Public Policy and Marketing, 16(2), 298–309. https://doi.org/10.1177/074391569701600210\n[33] Milne, G. R., &Gordon, M. E. (1993). Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework. Journal of Public Policy & Marketing, 12(2), 206–215. https://doi.org/10.1177/074391569101200206\n[34] Milne, G. R., Pettinico, G., Hajjat, F. M., &Markos, E. (2017). Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing. Journal of Consumer Affairs, 51(1), 133–161. https://doi.org/10.1111/joca.12111\n[35] Mingwei Hsu, Kharlamov, A., &Glenn Parry. (2019). Managing personalization-privacy paradox of digital services: A systematic literature review. Data for Policy.\n[36] Norberg, P. A., Horne, D. R., &Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126. https://doi.org/10.1111/j.1745-6606.2006.00070.x\n[37] Nowak, G. J., &Phelps, J. (1992). Understanding privacy concerns.An assessment of consumers’ information-related knowledge and beliefs. Journal of Direct Marketing, 6(4), 28–39. https://doi.org/10.1002/dir.4000060407\n[38] Odel, L. I. M., Ersuasion, I. N. P., &Angst, B. C. M. (2009). Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion.pdf. Management Information Systems Quarterly, 33(2), 339–370.\n[39] Pavlou, P. A., &Stewart, D. W. (2000). Measuring the Effects and Effectiveness of Interactive Advertising. Journal of Interactive Advertising, 1(1), 61–77. https://doi.org/10.1080/15252019.2000.10722044\n[40] Pham, M. T., &Avnet, T. (2004). Ideals and Oughts and the Reliance on Affect versus Substance in Persuasion. Journal of Consumer Research, 30(4), 503–518. https://doi.org/10.1086/380285\n[41] Phelps, J., Nowak, G., &Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27–41. https://doi.org/10.1509/jppm.19.1.27.16941\n[42] Pötzsch, S. (2009). Privacy awareness: A means to solve the privacy paradox? IFIP Advances in Information and Communication Technology, 298(216483), 226–236. https://doi.org/10.1007/978-3-642-03315-5_17\n[43] Rohm, A. J., &Milne, G. R. (2004). Just what the doctor ordered. The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000–1011. https://doi.org/10.1016/S0148-2963(02)00345-4\n[44] Sassenberg, K., Landkammer, F., &Jacoby, J. (2014). The influence of regulatory focus and group vs. individual goals on the evaluation bias in the context of group decision making. Journal of Experimental Social Psychology, 54, 153–164. https://doi.org/10.1016/j.jesp.2014.05.009\n[45] Schoenbachler, D. D., &Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2–16. https://doi.org/10.1002/dir.10033\n[46] Sharma, S., &Crossler, R. E. (2014). Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electronic Commerce Research and Applications, 13(5), 305–319. https://doi.org/10.1016/j.elerap.2014.06.007\n[47] Sheehan, K. B., &Hoy, M. G. (2000). Dimensions of Privacy Concern Among Online Consumers. Journal of Public Policy & Marketing, 19(1), 62–73.\n[48] Sheng, H., Nah, F. F. H., &Siau, K. (2008). An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 344–376.\n[49] Siegrist, M., Cvetkovich, G., &Roth, C. (2000). Salient value similarity, social trust, and risk/benefit perception. Risk Analysis, 20(3), 353–362. https://doi.org/10.1111/0272-4332.203034\n[50] Sitkin, S. B., &Pablo, A. L. (1992). Reconceptualizing the Determinants of Risk Behavior Author ( s ): Sim B . Sitkin and Amy L . Pablo Source : The Academy of Management Review , Vol . 17 , No . 1 ( Jan ., 1992 ), pp . 9-38 Published by : Academy of Management Stable URL : http://www.jstor. Academy of Management, 17(1), 9–38.\n[51] Sperber, D., &Wilson, D. (1986). Relevance: Communication and Cognition. In Cambridge, MA: Harvard University Press. (Vol. 142). https://doi.org/10.1111/j.1468-0017.1989.tb00246.x\n[52] Spiekermann, S., Grossklags, J., &Berendt, B. (2001). E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. Proceedings of the ACM Conference on Electronic Commerce, 38–47.\n[53] Stone, D. L. (1981). The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes.\n[54] Sutanto, J., Palme, E., Tan, C.-H., &Phang, C. W. (2013). Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Quarter, 37(4), 1141–1164.\n[55] Wang, T., Duong, T. D., &Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531–542. https://doi.org/10.1016/j.ijinfomgt.2016.03.003\n[56] Xu, H., Luo, X., Carroll, J. M., &Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42–52. https://doi.org/10.1016/j.dss.2010.11.017\n[57] Xu, H., Teo, H. H., Tan, B. C. Y., &Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135–174. https://doi.org/10.2753/MIS0742-1222260305\n[58] Zhang, B., &Xu, H. (2016). Privacy nudges for mobile applications: Effects on the creepiness emotion and privacy attitudes. Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, 27, 1676–1690. https://doi.org/10.1145/2818048.2820073\n[59] Zhang, E. M. (2010). Beauty as a tool: The effect of model attractiveness, product relevance, and elaboration likelihood on advertising effectiveness. Psychology & Marketing, 30(6), 461–469. https://doi.org/10.1002/mar\n[60] Zhou, T. (2011). The impact of privacy concern on user adoption of location-based services. In Industrial Management and Data Systems (Vol. 111, Issue 2, pp. 212–226). https://doi.org/10.1108/02635571111115146\n[61] Zhu, Y. Q., &Chang, J. H. (2016). The key role of relevance in personalized advertisement: Examining its impact on perceptions of privacy invasion, self-awareness, and continuous use intentions. Computers in Human Behavior, 65, 442–447. https://doi.org/10.1016/j.chb.2016.08.048\n[62] Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., &Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information and Management, 47(2), 115–123. https://doi.org/10.1016/j.im.2009.12.003; G0107356029; https://nccur.lib.nccu.edu.tw//handle/140.119/131499; https://nccur.lib.nccu.edu.tw/bitstream/140.119/131499/1/602901.pdf

  16. 16
  17. 17
  18. 18
  19. 19
  20. 20