يعرض 1 - 13 نتائج من 13 نتيجة بحث عن '"Peng, Lin-Yi"', وقت الاستعلام: 0.50s تنقيح النتائج
  1. 1
    Academic Journal

    المساهمون: Sanming Project of Medicine in Shenzhen, Chinese Academy of Medical Sciences Initiative for Innovative Medicine, National Natural Science Foundation of China, National Key Research and Development Program of China, Science, Technology and Innovation Commission of Shenzhen Municipality

    المصدر: Journal of Clinical Laboratory Analysis ; volume 35, issue 12 ; ISSN 0887-8013 1098-2825

  2. 2
    Academic Journal
  3. 3
    Academic Journal

    المساهمون: National Natural Science Foundation of China, Key Technology Research and Development Program of Shandong, CAMS Initiative for Innovative Medicine, Youth Research Foundation of Peking Union Medical College

    المصدر: Medicine ; volume 99, issue 50, page e23433 ; ISSN 0025-7974 1536-5964

  4. 4
    Academic Journal
  5. 5
  6. 6
    Academic Journal
  7. 7
    Academic Journal
  8. 8
    Conference
  9. 9
    Conference
  10. 10
    Dissertation/ Thesis

    المؤلفون: 張佳賢, Chang, Chia-Hsien

    المساهمون: 梁定澎 林怡伶, Liang, Ting-Peng Lin, Yi-Ling

    وصف الملف: 5234789 bytes; application/pdf

    Relation: 一、 中文部分\n[1] 王紹蓉,梁定澎,賴誼禎(2016)。揭露與隱藏之拉鋸:人氣需求與隱 私顧慮對臉書隱私管理行為之影響。中華民國資訊管理學報,23(4),445-472。\n[2] 侯雅晴(2019)。 隱私悖論的功能性磁振造影研究。 國立政治大學資訊管理學系碩士學位論文,1-127。\n[3] 徐亦礽(2016)。複合與簡單風險決策之神經差異。國立成功大學經濟學系碩士學位論文,1-69。\n[4] 楊亨利,邱顯貴(2003)。 線上購物網站值得消費者信任的因素之研究。 資訊社會研究,(5),139-174。\n[5] 劉家宏(2018)。以社群網路分析探討雙系統大腦決策機制。國立政治大學資訊管理學系碩士學位論文,1-72。\n[6] 賴立芸(2019)。資訊隱私悖論因素探討。國立政治大學資訊管理學系碩士學位論文,1-94。\n\n二、 英文部分\n[1] Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. EC `04: Proceedings of the 5th ACM Conference on Electronic Commerce, USA. 21-29.\n[2] Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.\n[3] Acquisti, A., Cranor, L., Fong, C., & Tsai, J. (2006). What’s it for you? A survey of online privacy concerns and risk. NET Institute Working Paper. 06-29, 1-20.\n[4] Baddeley, A. (2000). The episodic buffer: a new component of working memory? Trends in Cognitive Sciences, 4(11), 417-423.\n[5] Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).\n[6] Barth, S., & De Jong, M. D. T. (2017). The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review. Telematics and Informatics, 34(7), 1038-1058.\n[7] Bata, H., Chen, Y., Pentina, I., & Zhang, L. (2016). Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior, 65, 409-419.\n[8] Bian, H., Duan, J., Gao, L., Wei, Q., & Yuan, C. (2013). The Neural Basis of Social Status Recognition and Its Influencing Factors. Advances in Psychology, 3, 262-268.\n[9] Buchanan, T., Joinson, A. N., Reips, U.-D., & Schofield, C. B. P. (2010). Privacy, Trust, and Self-Disclosure Online. Taylor & Francis, 25(1), 1-24.\n[10] Courvoisier, D., Joinson, A. N., & Vasalou, A. (2010). Cultural differences, experience with social networks and the nature of “true commitment” in Facebook. International Journal of Human-Computer Studies, 68(10), 719-728.\n[11] Code, C., Cowell, S. F., Egan, G. F., Harasty, J., & Watson, J. D. (2000). The functional neuroanatomy of simple calculation and number repetition, a parametric PET activation study. NeuroImage, 12, 565-573.\n[12] Den Ouden, H., Frith, U., Frith, C., & Blakemore S.-J. (2005). Thinking about intentions. Neuroimage, 28, 787-96.\n[13] Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61-80.\n[14] Dinev, T., Smith, H. J., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS quarterly, 35(4), 989-1015.\n[15] Evans, J. S. B. T. (2002). Logic and human reasoning: An assessment of the deduction paradigm. Psychological Bulletin, 128(6), 978-996.\n[16] Evans, J. S. B. T. (2003). In two minds: dual-process accounts of reasoning. Trends in Cognitive Sciences, 7(10), 454-459.\n[17] Evans, J. S. B. T., Handley, S. J., Over, D. E., & Perham, N. (2002). Background beliefs in Bayesian inference. Memory & Cognition volume, 30, 179-190.\n[18] Fiddick, L., Cosmides, L., & Tooby, J. (2000). No interpretation without representation: the role of domain-specific representations and inferences in the Wason selection task. Cognition, 77(1), 1-79.\n[19] Fodor, J. (1983). The Modularity of Mind. The Massachusetts Institute of Technology.\n[20] Glover, G. H., Menon, V., Reiss, A. L., Rivera, S. M., & White, C. D. (2000). Dissociating prefrontal and parietal cortex activation during arithmetic processing. NeuroImage, 12, 357-365.\n[21] Grafman, J., Levin, H. S., Martinkowski, K., Mirvis, S., Rickard, T., Scheller, J., & Winslow M. (1996). Dyscalculia and Dyslexia after right hemisphere injury in infancy. Archives of Neurology, 53, 88-96.\n[22] Grafman, J., & Rickard, T. (2000). Acalculia. Issues in clinical and cognitive neuropsychology. Patient-based approaches to cognitive neuroscience, 345-351.\n[23] Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19-28.\n[24] Hughes-Roberts, T. (2013). 2013 International Conference on Social Computing. ISBN 978-0-7695-5137-1.\n[25] Kahneman, D. (2003). A perspective on judgment and choice: Mapping bounded rationality. American Psychologist, 58(9), 697-720.\n[26] Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.\n[27] Lai, C. Y., Liang, T. P., & Hui, K. L. (2018). Information Privacy Paradox: A Neural Science Study. PACIS 2018 Proceedings, 247.\n[28] Lieberman, M. D. (2007). Social Cognitive Neuroscience: A Review of Core Processes. Annual Review of Psychology, 58, 259-289.\n[29] Magedanz, T., & Simoes, J. (2009). What happens when you mix social networks, contexts and mobile advertising in the same glass? International Journal of Mobile Marketing, 4(2), 52-60.\n[30] Mak, A. K. Y., Hu, Z.-G., Zhang, J. X., Xiao, Z.-W., & Lee, T. M. C. (2009). Neural correlates of regulation of positive and negative emotions: An fMRI study. Neuroscience Letters, 457(2), 101-106.\n[31] Martinez-Selva, J. M., Sanchez-Navarro, J.P., Bechara, A., & Roman, F. Brain mechanisms involved in decision making. REVIEW IN NEUROSCIENCE, 42(7), 411.\n[32] McLeod, P., Plunkett, K., & Rolls, E. T. (1998). Introduction to connectionist modelling of cognitive processes. Oxford University Press.\n[33] Metzger, M. J. (2007). Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research. Journal of the American Society for Information Science and Technology.\n[34] Mithen, S. (2002). Human evolution and the cognitive basis of science. The Cognitive Basis of Science. Cambridge University Press, 23-24.\n[35] Oaksford, M., & Chater N. (2001). The probabilistic approach to human reasoning. Trends in Cognitive Sciences, 5(8), 349-357.\n[36] Ochsner, K. N., Knierim, K., Ludloow, D. H., Hanelin, J., Ramachandran, T., & Glover, G. (2004). Reflecting upon feelings: an MRI study of neural systems supporting the attribution of emotion to self and other. J Cogn Neurosci, 16, 1746-72.\n[37] Oomen, I., & Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. Policies and Research in Identity Management, Springer Verlag, Boston, 121-138.\n[38] Potzsch, S. (2008). Privacy Awareness: A Means to Solve the Privacy Paradox? I The Future of Identity in the Information Society, Springer-Verlag, Berlin Heidelberg, 226-236.\n[39] Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals` concerns about organizational practices. MIS quarterly, 20(2), 167-196.\n[40] Stanovich, K. E., & West, R. F. (1998). Individual differences in framing and conjunction effects. Thinking & Reasoning, 4, 289-317.\n[41] Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27, 590-598.\n[42] Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52.\n[43] Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyberpsychology & Behavior, 11(6), 763-765.\n[44] Zhang, S., Wang, G., Liu, Q., & Abawajy, J. H. (2018). A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Computing, 22, 6121-6133.\n[45] Zysset, S., Wendt, C. S., Volz, K. G., Neumann, J., Huber, O., & Von Cramon, D. Y. (2006). The neural implementation of multi-attribute decision making: a parametric fMRI study with human subjects. Neuroimage, 31(3), 1380-1388.; G0107356020; https://nccur.lib.nccu.edu.tw//handle/140.119/131495; https://nccur.lib.nccu.edu.tw/bitstream/140.119/131495/1/602001.pdf

  11. 11
    Dissertation/ Thesis
  12. 12
    Dissertation/ Thesis
  13. 13
    Dissertation/ Thesis