-
1Academic Journal
المؤلفون: Chen, Yu‐Lan, Hu, Chao‐Jun, Peng, Lin‐Yi, Wang, Chu‐Han, Zhao, Yan, Zhang, Wen, Liu, Dong‐Zhou
المساهمون: Sanming Project of Medicine in Shenzhen, Chinese Academy of Medical Sciences Initiative for Innovative Medicine, National Natural Science Foundation of China, National Key Research and Development Program of China, Science, Technology and Innovation Commission of Shenzhen Municipality
المصدر: Journal of Clinical Laboratory Analysis ; volume 35, issue 12 ; ISSN 0887-8013 1098-2825
-
2Academic Journal
المؤلفون: Luo, Xuan, Peng, Yu, Chen, Ying-Ying, Wang, An-Qi, Deng, Chui-Wen, Peng, Lin-Yi, Wu, Qing-Jun, Zhao, Yan, Fei, Yun-Yun, Zhang, Wen
المصدر: Chinese Medical Journal ; volume 134, issue 11, page 1310-1316 ; ISSN 0366-6999 2542-5641
-
3Academic Journal
المؤلفون: Hu, Chao-Jun, Li, Meng-Tao, Li, Xi, Peng, Lin-Yi, Zhang, Shang-Zhu, Leng, Xiao-Mei, Su, Jin-Mei, Zeng, Xiao-Feng
المساهمون: National Natural Science Foundation of China, Key Technology Research and Development Program of Shandong, CAMS Initiative for Innovative Medicine, Youth Research Foundation of Peking Union Medical College
المصدر: Medicine ; volume 99, issue 50, page e23433 ; ISSN 0025-7974 1536-5964
-
4Academic Journal
المؤلفون: Sun, Jin-lei, Lyu, Tai-biao, Chen, Zhi-lei, Lian, Chao-feng, Liu, Su-ying, Shao, Ti-hong, Zhang, Shuo, Zhao, Li-ling, Liu, Jin-jing, Peng, Lin-yi, Zhang, Li, Yang, Yun-jiao, Zhang, Feng-chun, Chen, Hua
المساهمون: Fundamental Research Funds for the Central Universities, National Natural Science Foundation of China, Chinese Academy of Meteorological Sciences, National Key Research and Development Program of China
المصدر: Clinical Immunology ; volume 241, page 109079 ; ISSN 1521-6616
-
5Academic Journal
المؤلفون: Zhou, Chen, Zhao, Hui, Xiao, Xin-yue, Chen, Bei-di, Guo, Rui-jin, Wang, Qi, Chen, Hua, Zhao, Li-dan, Zhang, Chen-chen, Jiao, Yu-hao, Ju, Yan-mei, Yang, Hua-xia, Fei, Yun-yun, Wang, Li, Shen, Min, Li, Hui, Wang, Xiao-han, Lu, Xin, Yang, Bo, Liu, Jin-jing, Li, Jing, Peng, Lin-yi, Zheng, Wen-jie, Zhang, Chun-yan, Zhou, Jia-Xin, Wu, Qing-jun, Yang, Yun-jiao, Su, Jin-mei, Shi, Qun, Wu, Di, Zhang, Wen
مصطلحات موضوعية: Ankylosing spondylitis, Diagnostic marker, Gut microbiota, Inflammatory arthritis, Molecular mimicry, 2403 Immunology, 2723 Immunology and Allergy
Relation: 2017PT31035
-
6Academic Journal
المؤلفون: Chao-Jun Hu, Meng-Tao Li, Xi Li, Lin-Yi Peng, Shang-Zhu Zhang, Xiao-Mei Leng, Jin-Mei Su, Xiao-Feng Zeng, Hu, Chao-Jun, Li, Meng-Tao, Li, Xi, Peng, Lin-Yi, Zhang, Shang-Zhu, Leng, Xiao-Mei, Su, Jin-Mei, Zeng, Xiao-Feng
المصدر: Medicine; 12/11/2020, Vol. 99 Issue 50, p1-7, 7p
-
7Academic Journal
المؤلفون: Deng, Chui-Wen, Wang, Li, Fei, Yun-Yun, Hu, Chao-Jun, Yang, Yun-Jiao, Peng, Lin-Yi, Zeng, Xiao-Feng, Zhang, Feng-Chun, Li, Yong-Zhe
مصطلحات موضوعية: Anti-mitochondrial antibody, Bioinformatics, Pathogenesis, Primary biliary cholangitis, Proteomics, 2715 Gastroenterology
Relation: orcid:0000-0002-6043-1756
-
8Conference
المؤلفون: Wang, Kenvi, Chiang, Tong-Tai, Peng, Lin-Yi, Merabti, M.
المصدر: 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008) ; page 1444-1449
-
9Conference
المؤلفون: Wang, Kenvi, Peng, Lin-Yi, Chen, Tsung-Mao, Chen, Szu-Yu
المصدر: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) ; volume 2, page 894-899
-
10Dissertation/ Thesis
المؤلفون: 張佳賢, Chang, Chia-Hsien
المساهمون: 梁定澎 林怡伶, Liang, Ting-Peng Lin, Yi-Ling
مصطلحات موضوعية: 隱私悖論, 隱私矛盾, 認知神經科學, 雙邊系統理論, Privacy Paradox, Privacy Concern, Cognitive Neuroscience, Dual Process Theory, Decision Mechanism
وصف الملف: 5234789 bytes; application/pdf
Relation: 一、 中文部分\n[1] 王紹蓉,梁定澎,賴誼禎(2016)。揭露與隱藏之拉鋸:人氣需求與隱 私顧慮對臉書隱私管理行為之影響。中華民國資訊管理學報,23(4),445-472。\n[2] 侯雅晴(2019)。 隱私悖論的功能性磁振造影研究。 國立政治大學資訊管理學系碩士學位論文,1-127。\n[3] 徐亦礽(2016)。複合與簡單風險決策之神經差異。國立成功大學經濟學系碩士學位論文,1-69。\n[4] 楊亨利,邱顯貴(2003)。 線上購物網站值得消費者信任的因素之研究。 資訊社會研究,(5),139-174。\n[5] 劉家宏(2018)。以社群網路分析探討雙系統大腦決策機制。國立政治大學資訊管理學系碩士學位論文,1-72。\n[6] 賴立芸(2019)。資訊隱私悖論因素探討。國立政治大學資訊管理學系碩士學位論文,1-94。\n\n二、 英文部分\n[1] Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. EC `04: Proceedings of the 5th ACM Conference on Electronic Commerce, USA. 21-29.\n[2] Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.\n[3] Acquisti, A., Cranor, L., Fong, C., & Tsai, J. (2006). What’s it for you? A survey of online privacy concerns and risk. NET Institute Working Paper. 06-29, 1-20.\n[4] Baddeley, A. (2000). The episodic buffer: a new component of working memory? Trends in Cognitive Sciences, 4(11), 417-423.\n[5] Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).\n[6] Barth, S., & De Jong, M. D. T. (2017). The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review. Telematics and Informatics, 34(7), 1038-1058.\n[7] Bata, H., Chen, Y., Pentina, I., & Zhang, L. (2016). Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior, 65, 409-419.\n[8] Bian, H., Duan, J., Gao, L., Wei, Q., & Yuan, C. (2013). The Neural Basis of Social Status Recognition and Its Influencing Factors. Advances in Psychology, 3, 262-268.\n[9] Buchanan, T., Joinson, A. N., Reips, U.-D., & Schofield, C. B. P. (2010). Privacy, Trust, and Self-Disclosure Online. Taylor & Francis, 25(1), 1-24.\n[10] Courvoisier, D., Joinson, A. N., & Vasalou, A. (2010). Cultural differences, experience with social networks and the nature of “true commitment” in Facebook. International Journal of Human-Computer Studies, 68(10), 719-728.\n[11] Code, C., Cowell, S. F., Egan, G. F., Harasty, J., & Watson, J. D. (2000). The functional neuroanatomy of simple calculation and number repetition, a parametric PET activation study. NeuroImage, 12, 565-573.\n[12] Den Ouden, H., Frith, U., Frith, C., & Blakemore S.-J. (2005). Thinking about intentions. Neuroimage, 28, 787-96.\n[13] Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61-80.\n[14] Dinev, T., Smith, H. J., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS quarterly, 35(4), 989-1015.\n[15] Evans, J. S. B. T. (2002). Logic and human reasoning: An assessment of the deduction paradigm. Psychological Bulletin, 128(6), 978-996.\n[16] Evans, J. S. B. T. (2003). In two minds: dual-process accounts of reasoning. Trends in Cognitive Sciences, 7(10), 454-459.\n[17] Evans, J. S. B. T., Handley, S. J., Over, D. E., & Perham, N. (2002). Background beliefs in Bayesian inference. Memory & Cognition volume, 30, 179-190.\n[18] Fiddick, L., Cosmides, L., & Tooby, J. (2000). No interpretation without representation: the role of domain-specific representations and inferences in the Wason selection task. Cognition, 77(1), 1-79.\n[19] Fodor, J. (1983). The Modularity of Mind. The Massachusetts Institute of Technology.\n[20] Glover, G. H., Menon, V., Reiss, A. L., Rivera, S. M., & White, C. D. (2000). Dissociating prefrontal and parietal cortex activation during arithmetic processing. NeuroImage, 12, 357-365.\n[21] Grafman, J., Levin, H. S., Martinkowski, K., Mirvis, S., Rickard, T., Scheller, J., & Winslow M. (1996). Dyscalculia and Dyslexia after right hemisphere injury in infancy. Archives of Neurology, 53, 88-96.\n[22] Grafman, J., & Rickard, T. (2000). Acalculia. Issues in clinical and cognitive neuropsychology. Patient-based approaches to cognitive neuroscience, 345-351.\n[23] Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28.\n[24] Hughes-Roberts, T. (2013). 2013 International Conference on Social Computing. ISBN 978-0-7695-5137-1.\n[25] Kahneman, D. (2003). A perspective on judgment and choice: Mapping bounded rationality. American Psychologist, 58(9), 697-720.\n[26] Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.\n[27] Lai, C. Y., Liang, T. P., & Hui, K. L. (2018). Information Privacy Paradox: A Neural Science Study. PACIS 2018 Proceedings, 247.\n[28] Lieberman, M. D. (2007). Social Cognitive Neuroscience: A Review of Core Processes. Annual Review of Psychology, 58, 259-289.\n[29] Magedanz, T., & Simoes, J. (2009). What happens when you mix social networks, contexts and mobile advertising in the same glass? International Journal of Mobile Marketing, 4(2), 52-60.\n[30] Mak, A. K. Y., Hu, Z.-G., Zhang, J. X., Xiao, Z.-W., & Lee, T. M. C. (2009). Neural correlates of regulation of positive and negative emotions: An fMRI study. Neuroscience Letters, 457(2), 101-106.\n[31] Martinez-Selva, J. M., Sanchez-Navarro, J.P., Bechara, A., & Roman, F. Brain mechanisms involved in decision making. REVIEW IN NEUROSCIENCE, 42(7), 411.\n[32] McLeod, P., Plunkett, K., & Rolls, E. T. (1998). Introduction to connectionist modelling of cognitive processes. Oxford University Press.\n[33] Metzger, M. J. (2007). Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research. Journal of the American Society for Information Science and Technology.\n[34] Mithen, S. (2002). Human evolution and the cognitive basis of science. The Cognitive Basis of Science. Cambridge University Press, 23-24.\n[35] Oaksford, M., & Chater N. (2001). The probabilistic approach to human reasoning. Trends in Cognitive Sciences, 5(8), 349-357.\n[36] Ochsner, K. N., Knierim, K., Ludloow, D. H., Hanelin, J., Ramachandran, T., & Glover, G. (2004). Reflecting upon feelings: an MRI study of neural systems supporting the attribution of emotion to self and other. J Cogn Neurosci, 16, 1746-72.\n[37] Oomen, I., & Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. Policies and Research in Identity Management, Springer Verlag, Boston, 121-138.\n[38] Potzsch, S. (2008). Privacy Awareness: A Means to Solve the Privacy Paradox? I The Future of Identity in the Information Society, Springer-Verlag, Berlin Heidelberg, 226-236.\n[39] Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals` concerns about organizational practices. MIS quarterly, 20(2), 167-196.\n[40] Stanovich, K. E., & West, R. F. (1998). Individual differences in framing and conjunction effects. Thinking & Reasoning, 4, 289-317.\n[41] Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27, 590-598.\n[42] Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52.\n[43] Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyberpsychology & Behavior, 11(6), 763-765.\n[44] Zhang, S., Wang, G., Liu, Q., & Abawajy, J. H. (2018). A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Computing, 22, 6121-6133.\n[45] Zysset, S., Wendt, C. S., Volz, K. G., Neumann, J., Huber, O., & Von Cramon, D. Y. (2006). The neural implementation of multi-attribute decision making: a parametric fMRI study with human subjects. Neuroimage, 31(3), 1380-1388.; G0107356020; https://nccur.lib.nccu.edu.tw//handle/140.119/131495; https://nccur.lib.nccu.edu.tw/bitstream/140.119/131495/1/602001.pdf
-
11Dissertation/ Thesis
المؤلفون: 侯雅晴, Hou, Ya-Ching
المساهمون: 梁定澎 林怡伶, Liang, Ting-Peng Lin, Yi-Ling
مصطلحات موضوعية: 隱私矛盾, 隱私悖論, 雙邊系統理論, 功能性磁振造影, Privacy Concern, Privacy Paradox, Dual Process Theory, Functional Magnetic Resonance Imaging
وصف الملف: 19139289 bytes; application/pdf
Relation: G1063560201; http://nccur.lib.nccu.edu.tw//handle/140.119/125536; http://nccur.lib.nccu.edu.tw/bitstream/140.119/125536/1/020101.pdf
-
12Dissertation/ Thesis
المؤلفون: 賴立芸, Lai, Li-Yun
المساهمون: 梁定澎 林怡伶, Liang, Ting-Peng Lin, Yi-Lin
مصطلحات موضوعية: 資訊隱私, 隱私計算理論, 隱私悖論, 關聯理論, Information privacy, Privacy paradox, Privacy calculus, Relevance theory
وصف الملف: 16835654 bytes; application/pdf
Relation: G0106356010; http://nccur.lib.nccu.edu.tw//handle/140.119/125526; http://nccur.lib.nccu.edu.tw/bitstream/140.119/125526/1/601001.pdf
-
13Dissertation/ Thesis
المؤلفون: 侯曉琪, Hou, Hsiao Chi
المساهمون: 梁定澎 林怡伶, Liang, Ting Peng Lin, Yi Ling
مصطلحات موضوعية: 共享經濟, 價值接受模式, 交易成本, 認知價值, 參與意圖, Sharing economy, Value-based model, Perceived value, Transaction cost, Intention, manag, eco
Relation: http://nccur.lib.nccu.edu.tw/bitstream/140.119/112273/1/603101.pdf; http://nccur.lib.nccu.edu.tw//handle/140.119/112273