[1] |
Yong Jin Park,Scott W. Campbell,Nojin Kwak. Affect, cognition and reward: predictors of privacy protection online [J]. Computers in Human Behavior, 2012, 28:1019-1027.
|
[2] |
Jeng-Jung Victor Chen, Albert H. Huang, Aaron Muzzerall. Privacy concerns and expectation of control[J]. Human System Management, 2012, 31:123-131.
|
[3] |
Wannes Heirman, Michel Walrave, Koen Ponnet. Predicting adolescents’ disclosure of personal information in exchange for commercial incentive: An application of an extended theory of planned behavior[J]. Cyberpsychology Behavior and Social Networking, 2013, 16:81-87.
|
[4] |
Kathy S. Schwaig, Albert H. Segars, Varun Grover, Kirk D. Fiedler. A model of consumers’ perception of the invasion of information privacy[J]. Information & Management, 2013, 50:1-12.
|
[5] |
Princely Ifinedo. Understanding information systems security policy compliance: A integration of the theory of planned behavior and the protection motivation theory[J]. Computers & Security, 2012, 31:83-95.
|
[6] |
Gramm-Leach-Bliley Act V,Sec6801-6809.
|
[7] |
Privacy of Consumer Financial Information, 16 CFR part 313.
|
[8] |
Standards for Safeguarding Customer Information, 16 CFR part 314.
|
[9] |
Disposal of Consumer Report Information and Records, 16 CFR part 682.
|
[10] |
Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy,White House, February 2012.
|
[11] |
Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers,Federal trade commission, March 2012.
|
[12] |
王利明. 隐私权概念的再界定[J]. 法学家, 2012(1):108-121.
|
[13] |
毛剑,李坤,徐先栋. 云计算环境下隐私保护方案[J]. 清华大学学报(自然科学版),2011(10):1357-1362.
|