$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로
Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory 원문보기

지식경영연구 = Knowledge Management Research, v.17 no.1, 2016년, pp.17 - 47  

유재호 (SK브로드밴드) ,  이애리 (연세대학교 바른ICT연구소) ,  김경규 (연세대학교 정보대학원)

Abstract AI-Helper 아이콘AI-Helper

People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privac...

주제어

질의응답

핵심어 질문 논문에서 추출한 답변
자기표현을 페이스북 지속 사용에 긍정적 영향을 미치는 촉진요인으로 선정한 배경은 무엇인가? , 2014), 많은 사용자들이 자기표현을 위해 페이스북을 특별하게 사용하고 있다 (Dwyer, 2007). 이와 같이 자신의 경험을 타인과 공유하고 자신의 느낌이나 아이디어를 표출하는 자기표현 과정을 통해 사회적 교류를 하는 것은 즐거움, 만족 등 SNS 사용의 내재적 동기들을 처리하는 데 있어 가장 중요한 요인이 될 수 있다 (Li, 2014; McCullagh,2008; Nadkarni and Hofmann, 2012; Nardi et al., 2004).
듀얼팩터이론은 무엇에 기반을 두는 이론인가? 듀얼팩터이론(Dual Factor Theory)은 Herzberg의 동기-위생 이론(Motivation-Hygiene Theory or Two Factor Theory)에 기반을 두고 있다. Herzberg(1966, 1986)는 기술자와 회계담당자들과 같은 전문직 종사자들을 대상으로 한 연구를 통해 근무 환경에서 직무 만족을 유도하는 동기요인(motivator)과 직무 불만족을 유도하는 위생요인(hygiene factor)이 독립적으로 존재한다는 점을 밝혀냈다.
페이스북이 나르시시스트들이 자기표현을 하는데 있어 최적의 공간이 될 수 있는 공간인 이유는 무엇인가? , 2011). 페이스북은 방대한 사용자들을 보유하며 이들 앞에서 행위자가 자신의 매력적인 사진을 올리고 자신을 돋보일수 있는 은유적인 표현 등을 구사할 수 있는 환경을 제공하기 때문에 나르시시스트들이 자기표현을 하는데 있어 최적의 공간이 될 수 있다. 사람들 간의 소통을 위해 페이스북이 제공하는 수단은 사용자들이 자신에 대해 더욱 홍보하며 나르시시즘을 강화토록 돕는다 (Buffardi and Campbell, 2008).
질의응답 정보가 도움이 되었나요?

참고문헌 (113)

  1. 고준, 신선진, 김희웅 (2008), 온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과, 경영정보학연구, 제 18권, 제 1호, 117-144. 

  2. 김유정 (2013), 소셜네트워크서비스 이용에 대한 비교 연구, 언론과학연구, 제 13권, 제 1호, 5-32. 

  3. 디임씨미디어(DMCMedia) (2015.12), 2015 디지털 소비자 및 한국인의 디지털 라이프 스타일 분석 보고서. 

  4. 마은정, 한상연, 배성주 (2013), SNS 상에서의 자기표현행위가 오프라인 대인관계 및 지속사용의도에 미치는 영향 분석 연구, 지식경영연구, 제 14권, 제 2호, 25-48. 

  5. 박경자, 유일, 이윤희 (2014), 소셜네트워크서비스(SNS) 사용의 부정적 감정과 사용중단의도에 관한 연구, 지식경영연구, 제 15권, 제 2호, 89-106. 

  6. 이서한, 이호, 김경규 (2014), 기업 내 SNS 가 지식 공유 행위에 미치는 영향에 대한 연구: 사회심리학적 관점을 중심으로, 지식경영연구, 제 15권, 제4호, 189-206. 

  7. Acquisti, A., and Grossklags, J. (2005), Privacy and rationality in individual decision making, IEEE Security & Privacy, 3(1), 26-33. 

  8. Ajzen, I. (1991), The theory of planned behavior, Organizational behavior and human decision processes, 50(2), 179-211. 

  9. Alam, M.M., and Wagner, C. (2013), "Facebook Distress": A Model to Investigate Discontinuation of Social Networking Site Use, In Proceedings of the PACIS 2013, 179. 

  10. Alashoor, T., and Baskerville, R. (2015), The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity, In Proceedings of the ICIS 2015. 

  11. Back, M. D., Kufner, A. C., Dufner, M., Gerlach, T. M., Rauthmann, J. F., and Denissen, J. J. (2013), Narcissistic admiration a nd rivalry: Disentangling the bright and dark sides of narcissism, Journal of personality and social psychology, 105(6), 1013-1037. 

  12. Baek, Y. M. (2014), Solving the privacy paradox: A counter-argument experimental approach, Computersin Human Behavior, (38), 33-42. 

  13. Bagozzi, R. P., and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the academy of marketing science, 16(1), 74-94. 

  14. Bandura, A. (1977), Self-efficacy: toward a unifying theory of behavioral change, Psychological review, 84(2), 191. 

  15. Bandura, A. (1995), Exercise of personal and collective efficacy in changing societies, Selfefficacy in changing societies, 15, 334. 

  16. Barnes, S. (2006), A privacy paradox: Social networking in the United States, First Monday 11(9), Retrieved from http://firstmonday.org/article/view/1394/1312 

  17. BBC. (2015, October 6), Facebook data transfers threatened by Safe Harbour ruling, BBC, Retrived from http://www.bbc.com/news/technology-34442618 

  18. Belanger, F., and Crossler, R. E. (2011), Privacy in the digital age: a review of information privacy research in information systems, MIS quarterly, 35(4), 1017-1042. 

  19. Best, S. J., Krueger, B. S., and Ladewig, J. (2006), Privacy in the information age, Public Opinion Quarterly, 70(3), 375-401. 

  20. Bhattacherjee, A. (2001), Understanding in formation systems continuance: an expectation-confirmation model, MIS quarterly, 351-370. 

  21. Boyd, D. (2008), Facebook's Privacy Trainwreck, Convergence: The International Journal of Research into New Media Technologies, 14(1), 13-20. 

  22. Boyd, D. and Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication,13(1). 

  23. Buffardi, L. E., and Campbell, W. K. (2008), Narcissism and social networking web sites, Personality and social psychology bulletin, 34(10), 1303-1314. 

  24. Carpenter, C. J. (2012), Narcissism on Facebook: Self-promotional and antisocial behavior, Personality and individual differences, 52(4), 482-486. 

  25. Cenfetelli, R. T. (2004), Inhibitors and enablers as dual factor concepts in technology usage, Journal of the Association for Information Systems, 5(11), 16. 

  26. Cenfetelli, R. T., and Schwarz, A. (2011), Identifying and testing the inhibitors of technology usage intentions, Information Systems Research, 22(4), 808-823. 

  27. Chatterjee S., and Hadi , A. S. (1999), Regression analysis by example (3rd ed.), New York: John Wiley & Sons. 

  28. Chatterjee, S., and Hadi, A . S. (2006), Regression analysis by example (4th ed.), New York: John Wiley & Sons. 

  29. Chen, R. (2013), Living a private life in public social networks: An exploration of member self-disclosure, Decision support systems, 55(3), 661-668. 

  30. Cheng, T. E., Lam, D. Y., and Yeung, A. C. (2006), Adoption of internet banking: an empirical study in Hong Kong, Decision support systems, 42(3), 1558-1572. 

  31. Chin, W. W. (1998), Issues and opinion on structural equation modeling, MIS Quarterly, 22(1), 7-16. 

  32. Chiu, C. M., Hsu, M. H., and Wang, E. T. (2006), Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories, Decision support systems, 42(3), 1872-1888. 

  33. Choi, C. F., and Jiang, Z. (2013), Trading Friendship for Value: A n Investigation of Collective Privacy Concerns in Social Application Usage, In Proceedings of the ICIS 2013, 81. 

  34. Compeau, D. R., and Higgins, C. A. (1995), Computer self-efficacy: Development of a measure and initial test, MIS quarterly, 189-211. 

  35. Culnan, M. J. (1993), "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use, MIS quarterly, 341-363. 

  36. DeWall, C. N., Buffardi, L. E., Bonser, I., and Campbell, W. K. (2011), Narcissism and implicit attention seeking: Evidence from linguistic analyses of social networking and online presentation, Personality and Individual Differences, 51(1), 57-62. 

  37. Di Capua, I. (2012), A literature review of research on Facebook use, Open Communication Journal, 6, 37-42. 

  38. Dinev, T., and Hart, P. (2004), Internet privacy concerns and their antecedentsmeasurement validity and a regression model., Behaviour & Information Technology, 23(6), 413-422. 

  39. Dinev, T., and Hart, P. (2005), Internet privacy concerns and social awareness as determinants of intention to transact, International Journal of Electronic Commerce, 10(2), 7-29. 

  40. Dinev, T., and Hart, P. (2006), An extended privacy calculus model for e-commerce transactions, Information Systems Research, 17(1), 61-80. 

  41. Dinev, T., Xu, H., and Smith, H. J. (2009, January), Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy, In System Sciences, 2009. HICSS' 09. 42nd Hawaii International Conference on (pp. 1-10). IEEE. 

  42. Dwyer, C. (2007, January), Digital relationships in the" myspace" generation: Results from a qualitative study., In System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on (pp.19-19). IEEE. 

  43. Dwyer, C., Hiltz, S., and Passerini, K. (2007), Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, In Proceedings of t he AMCIS 2007, 339. 

  44. Eastlick, M. A., Lotz, S. L., and Warrington, P. (2006), Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment, Journal of Business Research, 59(8), 877-886. 

  45. Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, 13(1), 210-230. 

  46. Fornell, C ., and Larcker, D. F. (1981), Evaluating structural equation models with unobservable variables and measurement error, Journal of marketing research, 39-50. 

  47. Gefen, D., Straub, D., and Boudreau, M. C. (2000), Structural equation modeling and regression: Guidelines for research practice, Communications of the association for information systems, 4(1), 7. 

  48. Goffman, E. (1959), The presentation of self in everyday life, Garden City, NY: Anchor. 

  49. Govani, T., and Pashley, H. (2005), Student awareness of the privacy implications when using Facebook, Presented at the "Privacy Poster Fair" at the Carnegie Mellon University School of Library and Information Science, 9. 

  50. Gross, R., and Acquisti, A. (2005, November), Information revelation and privacy in online social networks, In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). ACM. 

  51. Haferkamp, N., Eimler, S. C., Papadakis, A. M., and Kruck, J. V. (2012), Men are from Mars, women are from Venus? Examining gender differences in self-presentation on social networking sites, Cyberpsychology, Behavior, and Social Networking, 15(2), 91-98. 

  52. Haines, R ., Street, M. D., and Haines, D. (2008), The inf luence of perceived importance of an ethical issue on moral judgment, moral obligation, and moral intent, Journal of Business Ethics, 81(2), 387-399. 

  53. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998), Multivariate Data Analysis with Readings, (5th ed.). NY: Macmillan. 

  54. Hair Jr, J. F., Sarstedt, M., Hopkins, L., and G. Kuppelwieser, V. (2014), Partial least squares structural equation modeling (PLS-SEM) An emerging tool in business research, European Business Review, 26(2), 106-121. 

  55. Herzberg. F. (1966), Work and the nature of man (Chapter 6. pp. 71-91), New York: World Publishing. 

  56. Herzberg, F. (1986), One more time: How do you motivate employees, New York: The Leader Manager, 433-448. 

  57. Hess, T. J., Fuller, M., and Campbell, D. E. (2009), Designing interfaces with social presence: Using vividness and extraversion to create social recommendation agents, Journal of the Association for Information Systems, 10(12), 1. 

  58. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010), Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry, Electronic commerce research and applications, 9(1), 50-60. 

  59. Hogan, M. (2013), Facebook Data Storage Centers as the Archive's Underbelly, Television & New Media, 1527476413509415. 

  60. Ives, B., and Olson, M. H. (1984), User involvement and MIS success: A review of research, Management science, 30(5), 586-603. 

  61. Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. (2007), Social phishing, Communications of the ACM, 50(10), 94-100. 

  62. Jung, E. J., McKnight, D. H., Jung, E., and Lankton, N. K. (2011), The Surprising Lack of Effect of Privacy Concerns on Intention to Use Online Social Networks, In AMCIS. 

  63. Kim, H. W., Chan, H. C., and Kankanhalli, A. (2012), What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation, Information systems research, 23(4), 1232-1245. 

  64. Kim, H. W., Zheng, J. R., and Gupta, S. (2011), Examining knowledge contribution from the perspective of an online identity in blogging communities, Computers in Human Behavior, 27(5), 1760-1770. 

  65. Kontaxic, G., Polychronakis, M., and Markatos, E. P. (2011), SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms, In Information Security (pp. 197-212). Springer Berlin Heidelberg. 

  66. Korolova, A., Motwani, R., Nabar, S. U., and Xu, Y. (2008, October), Link privacy in social networks, In Proceedings of the 17th ACM conference on Information and knowledge management (pp. 289-298). ACM. 

  67. Kramer, N. C., and Haferkamp, N. (2011), Online self-presentation: Balancing privacy concerns and impression construction on social networking sites, In Privacy Online (pp. 127-141). Springer Berlin Heidelberg. 

  68. Kramer, N. C ., and Winter, S. (2008), Impression management 2.0: The relationship of self-esteem, extraversion, self-efficacy, and self-presentation within social networking sites, Journal of Media Psychology, 20(3), 106-116. 

  69. Krasnova, H., Gunther, O., Spiekermann, S., and Koroleva, K. (2009), Privacy concerns and identity in online social networks, Identity in the Information Society, 2(1), 39-63. 

  70. Krasnova, H., Hildebrand, T., Gunther, O., Kovrigin, A., and Nowobilska, A. (2008), Why Participate in an Online Social Network? An Empirical Analysis, In ECIS (pp. 2124-2135). 

  71. Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. (2010), Online social networks: why we disclose, Journal of Information Technology, 25(2), 109-125. 

  72. Lang, C., and Barton, H. (2015), Just untag it: Exploring the management of undesirable Facebook photos, Computers in Human Behavior, 43, 147-155. 

  73. Leary, M. R., and Kowalski, R. M. (1990), Impression management: A literature review and two-component model, Psychological bulletin, 107(1), 34. 

  74. Lee, A. R., Son, S. M., and Kim, K. K. (2016), Information and communication technology overload and social networking service fatigue: A stress perspective, Computers in Human Behavior, 55, 51-61. 

  75. Li, Y. (2004), Bolgging and Identity Construction: A Study on Blogging Continuance Intentions, In Twentieht Americas Conference on Information Systems. 

  76. Lit t , E ., Spot tswood, E ., Bir n holt z , J., Hancock, J. T., Smith, M. E., and Reynolds, L. (2014, February), Awkward encounters of an other kind: collective self-presentation and face threat on facebook, In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (pp. 449-460). ACM. 

  77. Lowry, P.B., Cao, J., and Everard, A. (2011), Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures, Journal of Management Information Systems, 27(4), 163-200. 

  78. Madden, T. J., Ellen, P. S., and Ajzen, I. (1992), A comparison of the theory of planned behavior and the theory of reasoned action, Personality and social psychology Bulletin, 18(1), 3-9. 

  79. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004), Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, 15(4), 336-355. 

  80. McCullagh, K. (2008), Blogging: self presentation and privacy, Information & communications technology law, 17(1), 3-23. 

  81. Mehdizadeh, S. (2010), Self-presentation 2.0: Narcissism and self-esteem on Facebook, Cyberpsychology, Behavior, and Social Networking, 13(4), 357-364. 

  82. Nadkarni, A., and Hofmann, S. G. (2012), Why do people use Facebook?, Personality and individual differences, 52(3), 243-249. 

  83. Nardi, B. A., Schiano, D. J., Gumbrecht, M., and Swartz, L. (2004), Why we blog, Communications of the ACM, 47(12), 41-46. 

  84. Nunnally, J., (1978), Psychometric Theory, MacGraw-Hill: New York. 

  85. Ong, E. Y., Ang, R. P., Ho, J. C., Lim, J. C., Goh, D. H., Lee, C. S., and Chua, A. Y. (2011), Narcissism, extraversion and adolescents' self-presentation on Facebook, Personality and Individual Differences, 50(2), 180-185. 

  86. Park, N., and Lee, S. (2014), College Students' Motivations for Facebook Use and Psychological Outcomes, Journal of Broadcasting & Electronic Media, 58(4), 601-620. 

  87. Pavlou, P. A. (2011), State of the information privacy literature: where are we now and where should we go?, MIS quarterly, 35(4), 977-988. 

  88. Rader, E. (2014, July), Awareness of behavioral tracking and information privacy concern in facebook and google, In Proc. of Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA. 

  89. Ringle, C . M., Wende, S., a nd Becker, J.-M. (2015), SmartPLS 3., Boenningstedt: SmartPLS GmbH, http://www.smartpls.com. 

  90. Schlenker, B. R., and Leary, M. R. (1982), Social anxiety and self-presentation: A conceptualization model, Psychological bulletin, 92(3), 641. 

  91. Smith, H. J., Diney, T., and Xu, H. (2011), Information privacy research: an interdisciplinary review, MIS quarterly, 35(4), 989-1016. 

  92. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996), Information privacy: measuring individuals' concerns about organizational practices, MIS quarterly, 167-196. 

  93. Son, J. Y., and Kim, S. S. (2008), Internet users' information privacy-protective responses: A taxonomy and a nomological model, Mis Quarterly, 503-529. 

  94. Statista. (2015), Number of monthly active Facebook users worldwide as of 3rd quarter 2015, Statista, Retrived from http://www.statista.com/statistics/264810/number-ofmonthly-active-facebook-users-worldwide/ 

  95. Steers, R. M., and Braunstein, D. N. (1976), A behaviorally-based measure of manifest needs in work settings, Journal of Vocational Behavior, 9(2), 251-266. 

  96. Taddicken, M. (2014), The 'Privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of Self-Disclosure1, Journal of Computer-Mediated Communication, 19(2), 248-273. 

  97. Techcrunch, (2015, Dec 3), With No European Safe Harbor, Facebook Faces Privacy Complaints On Multiple Fronts, Techcrunch, Retrived from http://techcrunch.com/2015/12/03/schrems-steps-up-mass-surveillance-fight-against-facebook/ 

  98. Tran, X., and Ralston, L. (2006), Tourist preferences influence of unconscious needs, Annals of Tourism Research, 33(2), 424-441. 

  99. Tschersich, M., and Botha, R. (2014), EXPLORING THE IMPACT OF RESTRICTIVE DEFAULT PRIVACY SETTINGS ON THE PRIVACY CALCULUS ON SOCIAL NETWORK SITES, In Proceedings of ECIS 2014. 

  100. Tufekci, Z. (2008), Can you see me now? Audience and disclosure regulation in online social network sites, Bulletin of Science, Technology & Society 28(1), 20-36. 

  101. van Rompay, T. J., Krooshoop, J., Verhoeven, J. W., and Pruyn, A. T. (2012), With or without you: Interactive effects of retail density and need for affiliation on shopping pleasure and spending, Journal of business research, 65(8), 1126-1131. 

  102. Venkatesh, V., Brown, S. A., Maruping, L. M., and Bala, H. (2008), Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation, Mis Quarterly, 483-502. 

  103. Walther, J. B. (1996), Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction, Communication research, 23(1), 3-43. 

  104. Wang, D., Xu, L., and Chan, H. C. (2008), Understanding users' continua nce of Facebook: The role of general and specific computer self-efficacy. In Proceedings of the ICIS 2008, 168. 

  105. Wang, N., Xu, H., and Grossklags, J. (2011a, December), Third-party apps on Facebook: privacy and the illusion of control, In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (p. 4). ACM. 

  106. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., and Cranor, L. F. (2011b, July), I regretted the minute I pressed share: A qualitative study of regrets on Facebook, In Proceedings of the Seventh Symposium on Usable Privacy and Security (p. 10). ACM. 

  107. Wilson, R. E., Gosling, S. D., a nd Graham, L. T. (2012), A review of Facebook research in the social sciences, Perspectives on psychological science, 7(3), 203-220. 

  108. Wu, K. W., Huang, S. Y., Yen, D. C., and Popova, I. (2012), The effect of online privacy policy on consumer privacy concern and trust, Computers in human behavior, 28(3), 889-897. 

  109. Xu, H ., Dinev, T., Smith, H. J., and Hart, P. (2008), Examining the formation of individual's privacy concerns: toward an integrative view, In Proceedings of the ICIS 2008, 6. 

  110. Yoo, Y. J. and Alavi, M. (2001), Media and Group Cohesion: Relative Inf luences on Social Presence, Task Participation, and Group Consensus, MIS Quarterly, 25(3), 371-390. 

  111. Zhang, P., and Von Dran, G. M. (2000), Satisfiers and dissatisfiers: A two-factor model for website design and evaluation, Journal of the American society for information science, 51(14), 1253-1268. 

  112. Zhou, T., and Li, H. (2014), Understanding mobile SNS continuance usage in China from the perspectives of social inf luence and privacy concern, Computers in Human Behavior, 37, 283-289. 

  113. Z latolas, L . N., Welzer, T., Hericko, M., and Holbl, M. (2015), Privacy antecedents for SNS self-disclosure: The case of Facebook, Computers in Human Behavior, 45, 158-167. 

저자의 다른 논문 :

LOADING...
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로