Document Type : Original Article
Authors
1 Professor, Department of Information Technology Management, Faculty of Management, University of Tehran, Tehran, Iran.
2 Assistant Professor, Department of Business Administration, Faculty of Management and Accounting, Farabi Campus, University of Tehran, Qom, Iran.
3 Professor, Department of Information Technology Management, Faculty of Management, University of Tehran, Tehran, Iran
4 PhD Student, Department of Information Technology Management, Faculty of Management ,University of Tehran, Tehran, Iran.
Abstract
Keywords
احمدلو، مونا (1392). حریم خصوصی در فقه و حقوق ایران. تهران: انتشارات مجد.
تقویفرد، محدتقی؛ جمشیدی، محمدجواد (1397). اصول و مبانی حریم خصوصی اطلاعاتی. تهران: انتشارات چراغ دانش.
سماواتیان، اکرم (1397). بررسی خودافشایی در شبکههای اجتماعی؛ مجازی مورد مطالعه: شهر همدان. فصلنامه مطالعات فرهنگی پلیس. 5 (1)، 1-28.
محمدیان, بهزاد, شعله, مهدی, بابائیان مهابادی, سمیه (1393). تأثیر خودافشایی در شبکههای اجتماعی بر توسعه سرمایه اجتماعی (بررسی نقش سرمایه معنوی). مدیریت سرمایه اجتماعی, 1(2), 225-245.
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies (pp. 36-58). Berlin, Heidelberg: Springer Berlin Heidelberg.
Alashoor, T., Han, S., & Joseph, R. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41(1), 4.
Barth, S., & De Jong, M. D. (2017). The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telematics and informatics, 34(7), 1038-1058.
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly, 1017-1041.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Understanding emergence and outcomes of information privacy concerns: a case of Facebook.
Burke, P. J., & Stets, J. E. (2022). Identity Theory: Revised and Expanded. Oxford University Press.
Burke, P. J., & Reitzes, D. C. (1991). An identity theory approach to commitment. Social psychology quarterly, 239-251.
Carter, M., and Grover, V. (2015). Me, myself, and it: Conceptualizing information technology identity and its implications. MIS Quarterly, 39(4), 931-958.
Carter, M., Petter, S., Grover, V., & Thatcher, J. B. (2020). IT identity: a measure and empirical investigation of its utility to IS research. Journal of the Association for Information Systems, 21(5), 2.
Chiu, C. M., Hsu, M. H., & Wang, E. T. (2006). Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision support systems, 42(3), 1872-1888.
Clayton, S., & Opotow, S. (2003). Identity and the natural environment: The psychological significance of nature. In Identity and the natural environment: The psychological significance of nature. Retrieved from https://psycnet.apa.org/record/2004-14744-000.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1), 61-80.
Dinev, T., McConnell, A. R., & Smith, H. J. (2015). Research commentary—informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box. Information Systems Research, 26(4), 639-655.
Esmaeilzadeh, P. (2021). How does IT identity affect individuals’ use behaviors associated with personal health devices (PHDs)? An empirical study. Information & Management, 58(1), 103313.
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in human behavior, 25(1), 153-160.
Gefen, D., Straub, D., & Boudreau, M. C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the association for information systems, 4(1), 7.
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers and Security, 77, 226–261.
Granberg, D., and Holmberg, S. (1990). The Intention-Behavior Relationship among Us and Swedish Voters. Social Psychology Quarterly, 44-54.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71–80.
Hogben, G. (2007). Security Issues and Recommendations for Online Social Networks. Retrieved March 1, 2021
Hsu, C.-L., & Lin, J. C.-C. (2008). Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45(1), 65–74.
Kokolakis, S. (2017). Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon. Computers and Security, 64, 122–134.
Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. (2010). Online Social Networks: Why We Disclose. Journal of information technology, 25(2), 109-125.
Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and privacy calculus on social networking sites: The role of culture. Business & Information Systems Engineering, 4(3), 127–135.
Li, Y. (2011). Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. Communications of the Association for Information Systems, 28(1), 28.
Li, Y., Yang, S., Zhang, S., and Zhang, W. (2019). Mobile Social Media Use Intention in Emergencies among Gen Y in China: An Integrative Framework of Gratifications, Task-Technology Fit, and Media Dependency. Telematics and Informatics, 42, 101244.
Lin, K.-Y., and Lu, H.-P. (2011). Why People Use Social Networking Sites: An Empirical Study Integrating Network Externalities and Motivation Theory. Computers in human behavior, 27(3), 1152-1161.
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information systems research, 15(4), 336-355.
McCall, G. J., & Simmons, J. L. (Jerry L. (1978). Identities and interactions: an examination of human associations in everyday life. Free Press.
Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information Privacy: Measuring Individuals' Concerns About Organizational Practices. MIS quarterly, 167-196.
Stets, J. E., and Biga, C. F. (2003). Bringing Identity Theory into Environmental Sociology. Sociological Theory, 21(4), 398-423.
Stets, J. E., & Burke, P. J. (2000). Identity Theory and Social Identity Theory. Social Psychology Quarterly, 63(3), 224. https://doi.org/10.2307/2695870.
Stryker, S. (1980). Symbolic Interactionism: A Social Structural Version. Blackburn Press.
Stryker, S., & Burke, P. J. (2000). The Past, Present, and Future of an Identity Theory. Social Psychology Quarterly, 63(4), 284. https://doi.org/10.2307/2695840.
Tajfel, H., & Turner, J. C. (2004). "The Social Identity Theory of Intergroup Behavior". in Political Psychology (pp. 276–293). https://doi.org/10.4324/9780203505984-16.
Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36.
Vignoles, V. L., Schwartz, S. J., & Luyckx, K. (2011). "Introduction: Toward an Integrative View of Identity". in Handbook of Identity Theory and Research (pp. 1–27). https://doi.org/10.1007/978-1-4419-7988-9_1.
Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self‐disclosure. Human Communication Research, 2(4), 338–346.