[1] 中国互联网络信息中心(CNNIC). 第38次《中国互联网络发展状况统计报告》[DB/OL.].[2016-08-03]. http://www.cnnic.net.cn/gywm/xwzx/rdxw/2016/201608/W020160803204144417902.pdf.
[2] Culnan M J, Armstrong P K. Information privacy concerns, procedural fairness and impersonal trust:An empirical investigation[J]. Organization Science,1999,10(1):104-115.
[3] Zhang Ruidong, Chen JQ, Lee C J. Mobile commerce and consumer privacy concerns[J]. Journal of Computer Information Systems, 2013,53(4):31-38.
[4] 中国互联网协会(ISC).2015中国网民权益保护调查报告[DB/OL].[2015-07-31]. http://www.miit.gov.cn/n11293472/n11295293/n11633884/n16766090.files/n16766089.pdf.
[5] Boyles, J.L., Smith, A. and Madden, M. Privacy and data management on mobile devices[DB/OL].[2012-09-05].http://www.pewinternet.org/2012/09/05/privacy-and-data-management-on-mobile-devices/.
[6] 王崇, 吴价宝, 王延青. 移动电子商务下交易成本影响消费者感知价值的实证研究[J]. 中国管理科学, 2016, 24(8):98-106.
[7] 陈昊, 李文立, 柯育龙. 社交媒体持续使用研究:以情感响应为中介[J]. 管理评论, 2016,28(9):61-71.
[8] Wang S C, Wu J H. Proactive privacy practices in transition:Toward ubiquitous services[J]. Information &Management, 2014, 51(1):93-103.
[9] Nunns J. Datasift CEO:Making social data consumable[EB/OL].[2015-11-27]. http://www.cbronline.com/news/big-data/analytics/datasift-ceo-making-social-data-consumable-4738572.
[10] Hui K L, Teo H H, Lee S Y T. The value of privacy assurance:An exploratory field experiment.[J] MIS Quarterly,2007,31(1):19-33.
[11] Xu Heng, Teo H H, Tan B C Y, et al. Research note-effects of individual self-protection, industryself-regulation, and government regulation on privacy concerns:A study of location-based services[J]. Information System Research, 2012,23(4):1342-1363.
[12] Xu Heng, Teo H H, Tan B C Y,et al. The role of push-pull technology in privacy calculus:The case of location-based services[J]. Journal of Management Information Systems, 2009,26(3):135-174.
[13] Xu Heng, Dinev T, Smith J, et al. Information privacy concerns:Linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems. 2011,12(12):798-824.
[14] 王洪伟,周曼,何绍义. 影响个人在线提供隐私信息意愿的实证研究[J]. 系统工程理论与实践,2012,32(10):2186-2197.
[15] Zhao Ling, Lu Yaobin, Gupta S. Disclosure intention of location-related information in location-based social network services[J] International Journal of Electronic Commerce, 2012,16(4):53-90.
[16] Wu K W, Huang S Y, Yen D C, et al. The effect of online privacy policy on consumer privacy concern and trust[J]. Computers in Human Behavior, 2012, 28(3):889-897.
[17] Chang Y H, Wong S F, Lee H. Understanding perceived privacy:A privacy boundary management model[C]//Proceeding of the 19th Pacific Asia Conference on Information Systems[C], Singapore, 5-9 July, 2015:78.
[18] 李睿, 张锐剑, 李文立, 等. 移动互联网环境下的隐私泄露容忍度测度方法[J]. 管理评论, 2016, 28(7):102-111.
[19] 吴娜, 李文立, 吕欣, 等. 泄露他人隐私行为意向的影响要素研究[J]. 科研管理, 2015, 36(11):139-147.
[20] King N J. Direct marketing, mobile phones, and consumer privacy:Ensuring adequate disclosure and consent mechanisms for emerging mobile advertising practices[J]. Federal Communications Law Journal, 2008, 60(2):239-247.
[21] Meinert D B, Peterson D K, Criswell J R, et al.Privacy policy statements and consumer willingness to provide personal information[J]. Journal of Electronic Commerce in Organizations, 2006,4(1):1-17.
[22] Liu Yue. User control of personal information concerning mobile-app:Notice and consent?[J]. Computer Law & Security Review, 2014,30(5):521-529.
[23] 李晖,李凤华,曹进,等. 移动互联服务与隐私保护的研究进展[J].通信学报,2014, 35(11):1-11.
[24] 中华人民共和国中央人民政府.《国务院关于深化制造业与互联网融合发展的指导意见》[EB/OL].[2016-05-13].http://www.gov.cn/zhengce/content/2016-05/20/content_5075099.htm.
[25] Tsai J Y, Kelley P, Drielsma P, et al. Who's viewed you?:The impact of feedback in a mobile location-sharing application[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,Boston,MA, USA,April 4-9, 2009:2003-2012.
[26] Hsieh G, Tang K P, Low W Y, et al. Field deployment of IMBuddy:A study of privacy control and feedback mechanisms for contextual IM[C]//International Conference on Ubiquitous Computing. Innsbruck, Austria, September 16-19, 2007:91-108.
[27] Patil S, Schlegel R, Kapadia A, et al. Reflection or action?:How feedback and control affect location sharing decisions[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, Ontario, Canada, April 26-May 01,2014:101-110.
[28] Patil S, Hoyle R, Schlegel R, et al. Interrupt now or inform later?:Comparing immediate and delayed privacy feedback[C]//Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Korea, April 18-23, 2015:1415-1418.
[29] Ajezn I. The theory of planned behavior[J]. Research in Nursing & Health, 1991, 14(2):137-144.
[30] Al-Debei MM, Al-Lozi E, Papazafeiropoulou A. Why people keep coming back to Facebook:Explaining and predicting continuance partici pation from an extended theory of planned behavior perspective[J]. Decision Support Systems, 2013,55(1):43-54.
[31] Ajzen I, Fishbein M. Understanding attitudes and social behavior[M]. Englewood, NJ:Prentice Hall,1980.
[32] Bansal H S, Taylor S F. Investigating interactive effects in the theory of planned behavior in a service-provided switching context[J]. Psychology & Marketing, 2002, 19(5):407-425.
[33] Sutton S. Predicting and explaining intentions and behavior:how well are we doing[J]. Journal of Applied Social Psychology, 1998,28(15):1317-1338.
[34] Colquitt J A, Conlon D E, Wesson M J, et al. Justice at the millennium:A meta-analytic review of 25 years of organiza-tional justice research[J]. Journal of Applied Psychology, 2001,86(3):425-445.
[35] Culnan M J. Consumer awareness of name removal procedures:Implications for direct marketing[J]. Journal of Direct Marketing, 1995,9(2):10-19.
[36] Martinez-Tur V, Peiro J M, Ramos J, et al. Justice perceptions as sredictors of customer satisfaction:The impact of distributive, procedural, and interactional justice[J]. Journal of Applied Social Psychology, 2006,36(1):100-119.
[37] Ashworth L, Free C. Marketing dataveillance and digital privacy:Using theories of justice to understand consumers' online privacy concerns[J]. Journal of Business Ethics, 2006,67(2):107-123.
[38] Culnan M J, Bies J R. Consumer privacy:Balancing economic and justice considerations[J]. Journal of Social Issues, 2003,59(2):323-342.
[39] Sarathy R, Robertson C J. Strategic and ethical considerations in managing digital privacy[J]. Journal of Business Ethics, 2003,46(2):111-126.
[40] Eddy E R, Stone D L, Stone-Romero E E. The effects of information management policies on reactions to human resource information systems:An integration of privacy and procedural justice perspectives[J]. Personnel Psychology, 1999,52(2):335-358.
[41] Thibaut J, Walker L. Procedural justice:A psychological analysis[J]. Duke Law Journal,1975,(6):142-145.
[42] Bies R J. The predicament of injustice:The management of moral outrage[J]. Research in Organizational Behavior, 1987,9(4):289-319.
[43] Kraft P, Rise J, Sutton S, et al. Perceived difficulty in the theory of planned behavior, perceived behavioral control or affective attitude[J]. British Journal of Social Psychology, 2005, 44(3):479-496.
[44] Armitage C J, Conner M. Efficacy of theory of planned behavior:A meta-analytic review[J]. British Journal of Social Psychology, 2001,40(4):471-499.
[45] 张星,陈星,侯德林. 在线健康信息披露意愿的影响因素研究:一个集成计划行为理论与隐私计算的模型[J]. 情报资料工作,2016,37(1):48-53.
[46] 何伟,石永东,俞路平. 团购点评行为意愿影响因素的实证分析[J]. 中国管理科学,2014, 22(SI):8-14.
[47] Rahim M A, Magner N R, Shapiro D L. Do justice perceptions influence styles of handling conflict with supervisors? What justice perceptions, precisely?[J]. International Journal of Conflict Management, 2000,11(1):9-31.
[48] Greenberg J, Folger R. Procedural justice, participation, and the fair process effect in groups and organizations[M]. New York:Springer-Verlag,1983:235-256.
[49] Silva A D S E, Frith J. Locational privacy in public spaces:Media discourses on location-aware mobile technologies[J]. Communication Culture & Critique, 2010,3(4):503-525.
[50] Colquitt J A. On the dimensionality of organizational justice:A construct validation of a measure[J]. Journal of Applied Psychology,2001,86(3):386-400.
[51] Dholakia U M,Bagozzi R P,Pearo L K. A social influence model of consumer participation in network-and small-group-based virtual communities[J]. International Journal of Research in Marketing, 2004,21(3):241-263.
[52] Awad N F, Krishnan M S. The personalization privacy paradox:An empirical evaluation of information transparency and the willingness to be profiled online for personalization[J]. MIS Quarterly, 2006, 30(1):13-28.
[53] Schein E H, Bennis W G. Personal and organizational change through group methods:The laboratory approach[M]. New York:Wiley, 1965.
[54] Barkhuus L, Dey A. Location-based services for mobile telephony:A study of user's privacy concerns[C]//Proceedings ofthe 9th IFIP TC13 International Conference on Human-Computer Interaction, Zurich, Switzerland, 1-5 September, 2003:709-712.
[55] Xu Heng, Dinev T, Smith H J, et al. Examining the formation of individual's information privacy concerns:Toward an integrative view[C]//Proceedings of 29th Annual International Conference on Information Systems, Paris, France, 14-17 December, 2008:1-16.
[56] Eppler M J, Mengis J. The concept of information overload:A review of literature from organization science, marketing, accounting, MIS, and related disciplines[J]. The Information Society, 2004, 20(5):325-344.
[57] Ganesan S, Brown S P, Mariadoss B J, et al. Buffering and amplifying effects of relationship commitment in business-to-business relation-ships[J]. Journal of Marketing Research, 2010,47(2):361-373.
[58] Sharma S, Crossler R E. Disclosing too much? Situational factors affecting information disclosure in social commerce environment[J]. Electronic Commerce Research and Applications, 2014,13(5):305-319.
[59] Li Yuan. A multi-level model of individual information privacy beliefs[J]. Electronic Commerce Research and Applications, 2014,13(1):32-44.
[60] Nunally J C. Psychometric Theory[M]. New York:McGraw-Hill Book Company, 1978.
[61] Bagozzi R P, Yi Y. On the evaluation of structural equation models[J]. Journal of the Academy of Marketing Science, 1998,16(1):74-94.
[62] Fornell C, Larcker D F. Evaluating structural equation models with unobservable variables and measurement error[J]. Journal of Marketing Research, 1981, 18(2):39-50.
[63] Chin W W. Issues and opinion on structural equation modeling[J]. MIS Quarterly,1998, 22(1):7-16.
[64] Ringle C M, Sarstedt M, Straub D W. A critical look at the use of PLS-SEM in MIS Quarterly[J]. MIS Quarterly,2012, 36(1):3-14.
[65] Im G, Rai A. Knowledge sharing ambidexterity in long-term interorganizational relationships[J].Management Science, 2008,54(7):1281-1296.
[66] Carte A T, Russell J C. In pursuit of moderation:Nine common errors and their solutions[J]. MIS Quarterly, 2003, 27(3):479-501.
[67] Chin W W, Marcolin B L, Newsted P R.A partial least squares latent variable modeling approach for measuring interaction effects:Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study[J]. Information Systems Research, 2003,14(2):189-217.
[68] Chomsky N, Foucault M. Human nature:Justice versus power[M]. Ayer A J, Elders F. Rlexive Water:The Basic Concerns of Mankind, London:Souvenir Press, 1974, 133-197.
[69] Belanger F, Crossler R E. Privacy in the digital age:A review of information privacy research in information systems[J]. MIS Quarterly, 2011, 35(4):1017-1041.