1. Bansal, G.
,
Zahedi, F.M.
and
Gefen, D.
(2010), “The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online”, Decision Support Systems, Vol. 49 No. 2, pp. 138-150.
2. Chen, H.G.
,
Chen, C.C.
,
Lo, L.
and
Yang, S.C.
(2008), “Online privacy control via anonymity and pseudonym: cross-cultural implications”, Behaviour & Information Technology, Vol. 27 No. 3, pp. 229-242.
3. Cho, E.A.
,
Moon, C.J.
,
Park, D.H.
and
Baik, D.K.
(2008), “An approach to privacy enhancement for access control model in Web 3.0”, Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology, Busan, pp. 1046-1051, available at: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4682385&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4682385 (accessed April 7, 2013).
4. Counts, S.
,
Hofte, H.T.
and
Smith, I.
(2006), “Mobile social software: realizing potential, managing risks”, Proceedings of the 2006 Conference on Human Factors in Computing Systems, Montréal, pp. 1703-1706, available at: http://dl.acm.org/citation.cfm?id=1125767&dl=ACM&coll=DL&CFID=348793633&CFTOKEN=92521574 (accessed April 7, 2013).
5. Davis, F.D.
(1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology”, MIS Quarterly, Vol. 13 No. 3, pp. 319-340.