X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (42) 42
Conference Proceeding (8) 8
Reference (3) 3
Book Chapter (2) 2
Dissertation (1) 1
Magazine Article (1) 1
Publication (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
communication (11) 11
privacy (10) 10
analysis (9) 9
social networks (9) 9
internet (7) 7
facebook (6) 6
online (6) 6
technology (6) 6
avatars (5) 5
awareness (5) 5
information privacy (5) 5
model (5) 5
psychology, experimental (5) 5
psychology, multidisciplinary (5) 5
self-disclosure (5) 5
social media (5) 5
studies (5) 5
avatar (4) 4
computer-mediated communication (4) 4
on-line systems (4) 4
online privacy (4) 4
personality (4) 4
self-awareness (4) 4
self-efficacy (4) 4
similarity (4) 4
usage (4) 4
attitudes (3) 3
business (3) 3
collaboration (3) 3
computer science, information systems (3) 3
computer simulation (3) 3
education & educational research (3) 3
health behavior (3) 3
human behavior (3) 3
identification (3) 3
impact (3) 3
information management (3) 3
information science & library science (3) 3
information sharing (3) 3
media (3) 3
network analysis (3) 3
organizations (3) 3
paradox (3) 3
planned behavior (3) 3
risk (3) 3
social network analysis (3) 3
technology acceptance model (3) 3
trust (3) 3
user acceptance (3) 3
virtual environments (3) 3
3rd-person perception (2) 2
acceptance (2) 2
attitude (2) 2
attraction (2) 2
behavior (2) 2
behaviors (2) 2
belief & doubt (2) 2
bias (2) 2
buildings (2) 2
choice (2) 2
colleges & universities (2) 2
computer science, cybernetics (2) 2
conflict (2) 2
consciousness (2) 2
culture (2) 2
deception (2) 2
decision making (2) 2
decision-making (2) 2
digital media (2) 2
disclosure (2) 2
distance learning (2) 2
e-commerce (2) 2
educational environment (2) 2
events (2) 2
free and open source software (2) 2
full length articles (2) 2
geheimhaltung (2) 2
health beliefs (2) 2
individualism (2) 2
influence (2) 2
information (2) 2
information seeking (2) 2
information-seeking behavior (2) 2
information-technology (2) 2
injunctive norms (2) 2
interpersonal-attraction (2) 2
judgments (2) 2
knowledge (2) 2
learning (2) 2
low level (2) 2
management (2) 2
mathematical models (2) 2
metaanalysis (2) 2
motivations (2) 2
national culture (2) 2
networks (2) 2
norms (2) 2
participation (2) 2
peer-production (2) 2
perceptions (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Psychology & Marketing, ISSN 0742-6046, 04/2017, Volume 34, Issue 4, pp. 481 - 495
Journal Article
Telematics and Informatics, ISSN 0736-5853, 12/2017, Volume 34, Issue 8, p. 1454
Virtual worlds face stiff competition and the threat of a high user attrition rate. While considerable research has investigated factors for continued use of... 
Avatars | Decision theory | Virtual communities | Users | Autonomy | Attrition | Virtualization | Self-similarity
Journal Article
Psychology & Marketing, ISSN 0742-6046, 04/2017, Volume 34, Issue 4, pp. 481 - 495
ABSTRACT The purpose of this study was to explore the underlying mechanisms through which the use of social media affects endorser effectiveness. Based on... 
FRIENDSHIP QUALITY | SIGNALING THEORY | SOAP-OPERA | MATCH-UP HYPOTHESIS | PSYCHOLOGY, APPLIED | BRAND CREDIBILITY | LOCAL TELEVISION-NEWS | BUSINESS | ADVERTISING EFFECTIVENESS | SELF-DISCLOSURE | MODERATING ROLE | COMMUNICATION | Celebrities | Endorsement advertising | Analysis | Social media
Journal Article
Journal of communication, ISSN 0021-9916, 04/2011, Volume 61, Issue 2, pp. 283 - 306
ABSTRACT IN ENGLISH: This study examined the distinctiveness of two primary factors of social influence (perceived critical mass [PCM] and subjective norms... 
Journal Article
Journal of the Association for Information Science and Technology, ISSN 2330-1635, 11/2016, Volume 67, Issue 11, pp. 2587 - 2606
Many computer users today value personalization but perceive it in conflict with their desire for privacy. They therefore tend not to disclose data that would... 
judgment | privacy | reasoning | PERIPHERAL ROUTES | RISKS | PARADOX | E-COMMERCE | INITIAL TRUST | DISCLOSURE | WILLINGNESS | TRANSPARENCY | INFORMATION SCIENCE & LIBRARY SCIENCE | COMPUTER SCIENCE, INFORMATION SYSTEMS | INFORMATION PRIVACY | ONLINE | Usage | Likelihood functions | Attitude (Psychology) | Analysis | Privacy | Public relations | Level (quantity) | Clouds | Computer simulation | Links | Mathematical models | Low level
Journal Article
Computers in Human Behavior, ISSN 0747-5632, 12/2019, Volume 101, pp. 1 - 13
Journal Article
European Journal of Marketing, ISSN 0309-0566, 2019, Volume 53, Issue 9, pp. 1962 - 1987
Purpose This paper aims to examine the psychological consequences of a customer engagement initiative through referral reward programs (RRPs) in online versus... 
Tie-strength | Metaperception | Referral reward programs | Online and offline | Customer engagement | ATTITUDE-CHANGE | ENGAGEMENT BEHAVIOR | SELF | NETWORKS | BUSINESS | MEDIATION ANALYSIS | INTENTIONS | SOCIAL-INFLUENCE | INTERPERSONAL PERCEPTION | WORD-OF-MOUTH | IMPRESSION-FORMATION
Journal Article
Journal of Communication, ISSN 0021-9916, 04/2011, Volume 61, Issue 2, pp. 283 - 306
This study examined the distinctiveness of two primary factors of social influence (perceived critical mass [PCM] and subjective norms [SN]) and their... 
PLANNED BEHAVIOR | USER ACCEPTANCE | COMMUNICATION TECHNOLOGY | INFORMATION-TECHNOLOGY | NETWORK EXTERNALITIES | INTERNET | INJUNCTIVE NORMS | ADOPTION | COMMUNICATION | TECHNOLOGY ACCEPTANCE MODEL | CONDUCT | Services | Analysis | Wireless communication systems | Studies | Discriminant analysis | Cognition & reasoning | Belief & doubt | Technological change
Journal Article
Computers in Human Behavior, ISSN 0747-5632, 01/2013, Volume 29, Issue 1, pp. 276 - 284
This study explored the effects of avatars on deception a how perceived avatar likeness to self can affect the truthfulness and accuracy of interactions... 
Attraction | Avatars | Similarity | Deception | Virtual environments | On-line systems | Human behavior | Online
Journal Article
Computers in Human Behavior, ISSN 0747-5632, 01/2013, Volume 29, Issue 1, pp. 276 - 284
This study explored the effects of avatars on deception -- how perceived avatar likeness to self can affect the truthfulness and accuracy of interactions... 
Journal Article
Journal of the Association for Information Science and Technology, ISSN 2330-1635, 11/2016, Volume 67, Issue 11, p. 2587
Many computer users today value personalization but perceive it in conflict with their desire for privacy. They therefore tend not to disclose data that would... 
Studies | Privacy | Public relations | Computer modeling and simulation | Customization | Attitudes | Disclosure | Low level | User behavior
Journal Article
Information Communication and Society, ISSN 1369-118X, 2019, pp. 1 - 21
Journal Article
New Media & Society, ISSN 1461-4448, 05/2009, Volume 11, Issue 3, pp. 395 - 416
This study surveyed 1261 internet users from five cities (Bangalore, Seoul, Singapore, Sydney and New York) to examine multinational internet users'... 
Privacy concern | Online privacy | Privacy protection behaviour | National culture | SELF-EFFICACY | MANAGEMENT | KNOWLEDGE | national culture | RISK | INFORMATION PRIVACY | CULTURE | online privacy | privacy concern | privacy protection behaviour | FEAR APPEALS | TECHNOLOGY | BEHAVIORS | COMMUNICATION | PERCEPTIONS
Journal Article
ACM Transactions on Computer-Human Interaction (TOCHI), ISSN 1073-0516, 06/2018, Volume 25, Issue 3, pp. 1 - 33
Journal Article