- 요약
- Ⅰ. 서론
- 1.1 연구배경
- 1.2 연구의 필요성 및 연구 목적
- Ⅱ. 이론적 배경
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A101941431
2016
Korean
325
KCI등재
학술저널
199-223(25쪽)
3
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 민진영, "프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로" 한국경영정보학회 15 (15): 105-122, 2013
2 박소영, "페북끼고 사는 당신 행복하나요…‘절교선언’는다"
3 박정환, "청년층 뒤덮 은상대적 박탈감…‘흙수저’들의 슬픈 자화상" 동아일보
4 한덕웅, "집단행동 이론" 시그마프레스 2011
5 구자룡, "온라인 페르소나 형성하기" 41 (41): 50-53, 2007
6 고준, "온라인 커뮤니티에서 자기표현 욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과" 한국경영정보학회 18 (18): 117-144, 2008
7 윤민정, "기업 내에서 비윤리적 행동에 대한 인식과 행동의도" 한국인적자원개발전략연구소 7 (7): 97-120, 2012
8 최보미, "개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구" 한국경영정보학회 17 (17): 77-94, 2015
9 조성호, "‘아프리카 금광 상속녀다’ 속여…SNS 로 거액 사기" YTN
10 송인광, "[경제카페] 가짜 SNS 주의보!…의심하는 습관이 최선" 동아일보
1 민진영, "프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로" 한국경영정보학회 15 (15): 105-122, 2013
2 박소영, "페북끼고 사는 당신 행복하나요…‘절교선언’는다"
3 박정환, "청년층 뒤덮 은상대적 박탈감…‘흙수저’들의 슬픈 자화상" 동아일보
4 한덕웅, "집단행동 이론" 시그마프레스 2011
5 구자룡, "온라인 페르소나 형성하기" 41 (41): 50-53, 2007
6 고준, "온라인 커뮤니티에서 자기표현 욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과" 한국경영정보학회 18 (18): 117-144, 2008
7 윤민정, "기업 내에서 비윤리적 행동에 대한 인식과 행동의도" 한국인적자원개발전략연구소 7 (7): 97-120, 2012
8 최보미, "개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구" 한국경영정보학회 17 (17): 77-94, 2015
9 조성호, "‘아프리카 금광 상속녀다’ 속여…SNS 로 거액 사기" YTN
10 송인광, "[경제카페] 가짜 SNS 주의보!…의심하는 습관이 최선" 동아일보
11 Correa, T., "Who interacts on the Web? : The intersection of users’personality and social media use" 26 (26): 247-253, 2010
12 Dominick, J. R., "Who do you think you are? Personal home pages and self-presentation on the world wide web" 76 (76): 646-658, 1999
13 Prager, K., "What Is Intimacy? The Psychology of Intimacy" Guilford 1995
14 Ridings, C. M., "Virtual community attraction : Why people hang out online" 10 (10): 2004
15 Jones, S., "Virtual Culture: Identity and Communication in Cybersociety" Sage 1997
16 Tout, H., "Towards an offloading approach that augments multi-persona performance and viability" 2015
17 Aimeur, E., "Towards a privacy-enhanced social networking site" 172-179, 2010
18 Short, J., "Theoretical Approaches to Differences between Media"
19 Rheingold, H., "The virtual community : Homesteading on the electronic frontier" MIT press 2000
20 Ellemers, N., "The influence of socio-structural variables on identity management strategies" 4 (4): 27-57, 1993
21 Hinz, O., "The impact of information diffusion on bidding behavior in secret reserve price auctions" 19 (19): 351-368, 2008
22 Ahn, J., "The effect of social network sites on adolescents’social and academic development : Current theories and controversies" 62 (62): 1435-1445, 2011
23 Weinstein, E., "The development of adolescent sexual intimacy: Implications for counseling" 26 (26): 331-, 1991
24 Marett, K., "The decision to share information and rumors: Examining the role of motivation in an online discussion forum" 24 (24): 4-, 2009
25 Ellison, N. B., "The benefits of facebook “friends”: Social capital and college students’use of online social network sites" 12 (12): 1143-1168, 2007
26 Barr, K., "The VMware mobile virtualization platform : Is that a hypervisor in your pocket?" 44 (44): 124-135, 2010
27 Tajfel, H., "The Social Identity Theory of Intergroup Behavior"
28 Roberts, L. D., "The Social Geography of Gender-Switching in Virtual Environments on the Internet" 2 (2): 521-540, 1999
29 OECD, "The Protection of Children Online"
30 Goffman, E., "The Presentation of Everyday Life" Anchor Books 1959
31 Weiss, S., "The Future of Identity in the Information Society" Springer US 161-171, 2007
32 Van Dijck, J., "The Culture of Connectivity : A Critical History of Social Media" Oxford University Press 2013
33 Project, P. I. A. L., "Teens and Sexting. How and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging"
34 Kircher, M. M., "Teens Are Hiding Their Real Lives from Nosey Parents with ’Fake’Instagram Accounts, TECH inside"
35 Pew Research Center, "Technology and Friendships"
36 Livingstone, S., "Taking risky opportunities in youthful content creation : Teenagers’use of social networking sites for intimacy, privacy and self-expression" 10 (10): 393-411, 2008
37 Schneider, D. J., "Tactical self-presentations:Toward a broader conception" 23 : 40-, 1981
38 Meeus, W., "Studies on identity development in adolescence: An overview of research and some new data" 25 (25): 569-598, 1996
39 Mummendey, A., "Strategies to cope with negative social identity: Predictions by social identity theory and relative deprivation theory" 76 (76): 229-, 1999
40 Cohen, J., "Statistical Power Analysis for the Behavioral Sciences" Erlbaum 1988
41 Stewart, D., "Social status in an open-source community" 70 (70): 823-842, 2005
42 Basu, K., "Social norms and the law" Cornell University
43 Lenhart, A., "Social networking websites and teens: An overview" Pew/Internet 1995
44 Murray, K. E., "Social networking goes abroad" 16 (16): 56-, 2007
45 Boyd, D., "Social network sites : Definition, history, and scholarship" 38 (38): 16-31, 2010
46 Utz, S., "Social information processing in muds:The development of friendships in virtual worlds" 2000
47 Ashforth, B. E., "Social identity theory and the organization" 14 (14): 20-39, 1989
48 Susarla, A., "Social Networks and the Diffusion of User-Generated Content : Evidence from Youtube" 23 (23): 23-41, 2012
49 Tajfel, H., "Social Categorization, Social Identity and Social Comparison" Differentiation between Social Groups: Studies in the Social Psychology of Intergroup Relations 61-76, 1978
50 Schlenker, B. R., "Self-presentation : managing the impression of consistency when reality interferes with self-enhancement" 32 (32): 1030-, 1975
51 Leary, M. R., "Self-Presentation: Impression Management and Interpersonal Behavior" Brown &Benchmark Publishers 1995
52 Dooley, J. J., "Review of existing Australian and international cyber-safety research" Edith Cowan University 2009
53 Fox, J., "Relational dialectics and social networking sites : The role of facebook in romantic relationship escalation, maintenance, conflict, and dissolution" 35 : 527-534, 2014
54 Turner, J. C., "Psychology of group influence" 233-275, 1989
55 Sempsey, J., "Psyber psychology : A literature review pertaining to the psycho/social aspects of multi-user dimensions in cyberspace" 2 (2): 1997
56 Hansen, M., "Privacy and identity management" 6 (6): 38-45, 2008
57 Greene, K., "Privacy and Disclosure of Hiv in Interpersonal Relationships: A Sourcebook for Researchers and Practitioners" Routledge 2003
58 Papacharissi, Z., "Predictors of internet use" 44 (44): 175-196, 2000
59 Schatzle, R., "Photographer Reveals the Truth Behind Those ‘Perfect’Instagram Photos"
60 Baden, R., "Persona : An online social network with user-defined privacy" ACM 135-146, 2009
61 Subrahmanyam, K., "Online and Offline Social Networks: Use of Social Networking Sites by Emerging Adults" 29 (29): 420-433, 2008
62 Brandtzæg, P. B., "Online Communities and Social Computing" Springer 143-152, 2009
63 Neha Alawadhi, "Nasscom to work with West Bengal police to prevent cyber crime and data frauds" The Economic Times
64 Statista, "Most popular social networks and apps according to U.S. high school graduates as of June 2015, based on daily active users"
65 Harvey, J. H., "Minding the close relationship" 1 (1): 224-240, 1997
66 Kendall, L., "Meaning and identity in “cyberspace ”: The performance of gender, class, and race online" 21 (21): 129-153, 1998
67 Adler, R., "Looking out, Looking In" Nelson Education 2015
68 Joinson, A. N., "Looking at, looking up or keeping up with people?: motives and use of facebook" 2008
69 Irani, D., "Large online social footprints: An emerging threat" 271-276, 2009
70 Subramani, M. R., "Knowledge-Sharing and Influence in Online Social Networks Via Viral Marketing" 46 (46): 300-307, 2003
71 Ordonez de Pablos, P., "Knowledge management and organizational learning : Typologies of knowledge strategies in the Spanish manufacturing industry from 1995 to 1999" 6 (6): 52-62, 2002
72 Rodriguez Perez, J., "Knowledge management and organizational competitiveness : A framework for human capital analysis" 7 (7): 82-91, 2003
73 Reis, H. T., "Intimacy as an interpersonal process" 24 (24): 367-389, 1988
74 Ko, H., "Internet uses and gratifications: A structural equation model of interactive advertising" 34 (34): 57-70, 2005
75 Sussman, S. W., "Informational influence in organizations : An integrated approach to knowledge adoption" 14 (14): 47-65, 2003
76 Burnkrant, R. E., "Informational and normative social influence in buyer behavior" 206-215, 1975
77 NCHS, "Increase in suicide in the United States, 1999-2014"
78 Leary, M. R., "Impression management : A literature review and two-component model" 107 (107): 34-47, 1990
79 Taylor, S. E., "Illusion and well-being: a social psychological perspective on mental health" 103 (103): 193-, 1988
80 Bruckman, A., "Identity workshop: Emergent social and psychological phenomena in text-based virtual reality" MIT Media Laboratory
81 Erikson, E. H., "Identity and the life cycle" WW Norton & Company 1994
82 DiMicco, J. M., "Identity Management: Multiple Presentations of Self in Facebook" 2007
83 Verma, R., "How to transform consumers into fans of your brand" 23 (23): 344-361, 2012
84 "Hillsdale, NJ, England: Lawrence Erlbaum Associates, Inc"
85 Curtis, P., "High noon on the Electronic Frontier: Conceptual Issues in Cyberspace"
86 Schlenker, B. R., "Handbook of Motivation and Cognition, Vol.3" The Guilford Press 118-147, 1996
87 ITU, "Guidelines for Policy Makers of Child Online Protection"
88 Krombholz, K., "Fake identities in social media : A case study on the sustainability of the facebook business model" 4 (4): 175-212, 2012
89 Chai, S. M., "Factors affecting bloggers’knowledge sharing : An investigation across gender" 28 (28): 309-342, 2011
90 Sirivianos, M., "Facetrust:Assessing the Credibility of Online Personas Via Social Networks" IACR Cryptology ePrint Archive 152-, 2009
91 Farnham, S. D., "Faceted Identity, Faceted Lives : Social and technical issues with being yourself online" ACM 359-368, 2011
92 Ybarra, M. L., "Examining characteristics and associated distress related to Internet harassment : findings from the Second Youth Internet Safety Survey" 118 (118): e1169-e1177, 2006
93 Poston, R. S., "Effective use of knowledge management systems : A process model of content ratings and credibility indicators" 29 (29): 221-244, 2005
94 Marcia, J. E., "Development and validation of ego-identity status" 3 (3): 551-, 1966
95 Reid, E. M., "Cultural formations in text-based virtual realities" University of Melbourne 1994
96 Ellison, N. B., "Cultivating social resources on social network sites : Facebook relationship maintenance behaviors and their role in social capital processes" 19 (19): 855-870, 2014
97 Gefen, D., "Consumer trust in B2C e-commerce and the importance of social presence : Experiments in e-products and e-services" 32 (32): 407-424, 2004
98 Kelman, H. C., "Compliance, identification, and internalization: Three processes of attitude change" 51-60, 1958
99 Smith, A., "Cognitive empathy and emotional empathy in human behavior and evolution" 56 : 3-21, 2006
100 Zhao, J., "Chinese firms’outward direct investment : Technological innovation mechanisms, organizational modes, and improving strategies" 20 (20): 149-160, 2010
101 Bargh, J. A., "Can you see the real me? Activation and expression of the"True Self"on the Internet" 58 (58): 33-48, 2002
102 Van Den Berg, B., "Audience segregation in social network sites" 2010
103 Netter, M., "Assisted Social Identity Management-Enhancing Privacy in the Social Web"
104 Smahel, D., "Any girls want to chat press 911 : Partner selection in monitored and unmonitored teen chat rooms" 10 (10): 346-353, 2007
105 Zhao, J., "Analysis of cooperative mechanism of industry-academy R&D alliance lab and case study" 20 (20): 123-134, 2010
106 Tajfel, H., "An integrative theory of intergroup conflict" 33 (33): 74-, 1979
107 Rose, R. L., "An attributional analysis of resistance to group pressure regarding illicit drug and alcohol consumption" 1-13, 1992
108 Tuttle, B., "Amazon lawsuit shows that fake online reviews are a big problem" Time
109 Brown, B. B., "Adolescents’relationships with peers" 2 : 363-394, 2004
110 Cheung, C. M., "A theoretical model of intentional social action in online social networks" 49 (49): 24-30, 2010
111 Venkatesh, V., "A theoretical extension of the technology acceptance model : Four longitudinal field studies" 46 (46): 186-204, 2000
112 Deutsch, M., "A study of normative and informational social influences upon individual judgment" 51 (51): 629-, 1955
113 Dholakia, U. M., "A social influence model of consumer participation in network-and small-group-based virtual communities" 21 (21): 241-263, 2004
114 Crosby, F., "A model of egoistical relative deprivation" 83 (83): 85-, 1976
115 Jones, C., "A general theory of network governance:Exchange conditions and social mechanisms" 22 (22): 911-945, 1997
116 양대근, "2016 매너 대한민국② 익명의 칼 악플 “착한 댓글이 答”" 헤럴드경제
삼성과 샤오미의 기업생태계 비교 연구 : IoT 산업의 CPND 가치사슬을 중심으로
빅데이터 성공에 최고경영층 리더십이 미치는 영향 : 실증연구
추천기법별 고객 선호도 및 영향요인에 대한 분석 : 전자제품과 의류군에 대한 비교연구
서비스 혁신의 선행요인에 관한 연구 : 서비스 지배적 논리와 자원 우위 이론을 중심으로
학술지 이력
연월일 | 이력구분 | 이력상세 | 등재구분 |
---|---|---|---|
2026 | 평가예정 | 재인증평가 신청대상 (재인증) | |
2020-01-01 | 평가 | 등재학술지 유지 (재인증) | |
2017-01-01 | 평가 | 등재학술지 유지 (계속평가) | |
2013-01-01 | 평가 | 등재 1차 FAIL (등재유지) | |
2010-01-01 | 평가 | 등재학술지 유지 (등재유지) | |
2008-01-01 | 평가 | 등재학술지 유지 (등재유지) | |
2005-01-01 | 평가 | 등재학술지 선정 (등재후보2차) | |
2004-01-01 | 평가 | 등재후보 1차 PASS (등재후보1차) | |
2003-01-01 | 평가 | 등재후보학술지 선정 (신규평가) |
학술지 인용정보
기준연도 | WOS-KCI 통합IF(2년) | KCIF(2년) | KCIF(3년) |
---|---|---|---|
2016 | 1.25 | 1.25 | 1.21 |
KCIF(4년) | KCIF(5년) | 중심성지수(3년) | 즉시성지수 |
1.13 | 0.99 | 1.346 | 0.4 |