Open Access
Issue |
MATEC Web of Conferences
Volume 150, 2018
Malaysia Technical Universities Conference on Engineering and Technology (MUCET 2017)
|
|
---|---|---|
Article Number | 05014 | |
Number of page(s) | 5 | |
Section | Education, Social Science & Technology Management | |
DOI | https://doi.org/10.1051/matecconf/201815005014 | |
Published online | 23 February 2018 |
- Adhikari, K., & Panda, R. K. (2017). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks: Evidence from India. [Google Scholar]
- Ary, D., & Jacobs, L. C., Sorensen, C., & Razavieh, A.(2010). Introduction to research in education. [Google Scholar]
- Boyd, D. (2008). Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. Convergence: The International Journal of Research into New Media Technologies, 14(1):13–20. [CrossRef] [Google Scholar]
- Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291-302. [CrossRef] [Google Scholar]
- Compeau, D., Higgins, C. A., and Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2):145–159. [CrossRef] [Google Scholar]
- Grindley, E. J., Zizzi, S. J., and Nasypany, A. M. (2008). Use of protectiomotivation theory, affect, and barriers to understand and predict adherence to outpatient rehabilitation. Physical Therapy. Jounal of American Physical Theraphy Association, 88(12):1529–1540. [Google Scholar]
- Johnston, B. A. C. and Warkentin, M. (2010). Fear Appeals and Information security Behaviors: An Empirical Study. Ministry of Education Official Website, 34(3):549–566. [Google Scholar]
- Kim, A. Y., & Kim, T. S. (2016). Factors Influencing the Intention to Adopt Identity Theft Protection Services: severity vs Vulnerability. In PACIS (p. 68). [Google Scholar]
- Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. [CrossRef] [Google Scholar]
- MCMC (2014). Communications & Multimedia Pocket Book of Statistic. [Google Scholar]
- Marett, K., McNab, A. L., & Harris, R. B. (2011). Social networking websites and posting personal information: An evaluation of protection motivation theory. AIS Transactions on Human-Computer Interaction, 3(3), 170-188. [CrossRef] [Google Scholar]
- Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36-58. [CrossRef] [Google Scholar]
- Nemec Zlatolas, L., Welzer, T., Heriˇcko, M., and H¨olbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45:158–167. [CrossRef] [Google Scholar]
- Palladino, B. E., Menesini, E., Nocentini, A., Luik, P., Naruskov, K., Ucanok, Z., … & Scheithauer, H. (2017). Perceived Severity of Cyberbullying: Differences and Similarities across Four Countries. Frontiers in Psychology, 8, 1524. [CrossRef] [Google Scholar]
- Salleh, N., Hussein, R., Mohamed, N., Abdul, N. S., Ahlan, A. R., and Aditiawarman, U. (2012). Examining Information Disclosure Behavior on Social Network Sites Using Protection Motivation Theory, Trust and Risk. Journal of Internet Social Networking & Virtual Communities, 2012. [Google Scholar]
- Schoeman, F. (1984). Philosophical Dimensions of Privacy: An Anthology. [CrossRef] [Google Scholar]
- Sedek, M., Mahmud, R., Jalil, H. A., & Daud, S. M. (2012). Types and levels of ubiquitous technology use among ICT undergraduates. Procedia-Social and Behavioral Sciences, 64, 255-264. [CrossRef] [Google Scholar]
- Stern, T., & Kumar, N. (2017). Examining privacy settings on online social networks: a protection motivation perspective. International Journal of Electronic Business, 13(2-3), 244-272. [CrossRef] [Google Scholar]
- Vithessonthi, C. (2010). Knowledge sharing, social networks and organizational transformation. The Business Review, Cambridge, 15(2):99–109 [Google Scholar]
- Warren, S. D. and Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5):193–220. [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.