Cathy S. Lin

Cathy S. Lin
  • PhD
  • Professor (Associate) at National University of Kaohsiung

About

34
Publications
17,600
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,387
Citations
Introduction
Cathy Hsing-Tzu Lin currently works at the Department of Information Management (IM), National University of Kaohsiung. Cathy does research in Quantitative Social Research and Social Psychology. Current research interests are Educational Data, Learning Analytics, Open Data, Data Literacy, Data Ethics, Information Ethics (information privacy, digital piracy), and Social Commerce.
Current institution
National University of Kaohsiung
Current position
  • Professor (Associate)
Additional affiliations
August 2003 - present
National University of Kaohsiung
Position
  • Professor (Associate)

Publications

Publications (34)
Article
Purpose This paper intends to examine the antecedents of perceived creativity and flow experience in order to understand how consumers' advertisement keywords browsing influences their searching intentions and/or behaviours regarding purchase. In addition, it aims to consider two kinds of intentions in the theory of planned behaviour (TPB) to facil...
Article
Full-text available
Worldwide losses due to the copyright infringement of intellectual property such as PC software, music recordings, and motion pictures continue at epidemic proportions in emerging countries. This article develops a research model for analyzing individual ethical decision making that is influenced simultaneously by two chief forces: regulative sanct...
Article
This paper investigated the value of including “playfulness” in expectation-confirmation theory (ECT) when studying continued use of a web site. Original models examined cognitive beliefs and effects that influence a person’s intention to continue to use an information system. Here, an extended ECT model (with an additional relationship between per...
Article
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization’s system...
Article
Full-text available
Abstract Affordances refer to how interface features of an IT artifact, perceived by its users in terms of their potentials for action, may predict the intensity of usage. This study investigates three social information affordances for expressive information control, privacy information control, and image information control in Facebook. The resul...
Article
Full-text available
As AI technology rapidly advances, ethical concerns have emerged as a global focus. This study introduces a second-order scale for analyzing AI ethics and proposes a model to examine the intention to use AI caregiving robots. The model incorporates elements from the Unified Theory of Acceptance and Use of Technology (UTAUT)—including social influen...
Article
This study explores the main and interaction effects of framing messages and cause-related marketing on backing intentions by manipulating frame types, frame valences, and cause-related marketing in the message narratives of crowdfunding projects. We conduct an online experiment for a crowdfunding campaign and analyze data using independent-samples...
Article
Full-text available
Social media has brought a new communication revolution allowing users to connect, share, and discuss public & social opinions with others. The new look at social media has shaped social movements, and provides a fair voice to anyone who can be heard online. This research explores individuals’ civic engagement concerning the environmental issue of...
Article
Full-text available
This study employs social cognitive theory as a theoretical foundation to empirically explore the influential antecedents of backing intention on crowdfunding platforms. We collected 221 valid samples via Facebook, and the data were analyzed using the partial least squares method. To more deeply understand the applicability of the proposed model ac...
Chapter
This study employs social cognitive theory as a theoretical foundation to empirically explore the influential antecedents of backing intention on crowdfunding platforms. We collected 221 valid samples from crowdfunding fan pages on Facebook in Taiwan, and the data were analyzed using the partial least squares (PLS) method. The results indicate that...
Conference Paper
Recommender systems have emergedrecently in many aspects due to enormous amount of information or items existed in e-commerce or social network services. Users find it convenient if the service can recommend interesting items to them automatically. Past systems adopted users' preference or social connections for such recommendation. In this work, w...
Conference Paper
Open election data is an emerged domain in open data for it reflects the maturity of governance and democracy. On this regard, a standardized approach for building open election data will significantly reduce the time and effort for publishing election data to the public for easy access. In this work, we will develop an initial step for building op...
Article
Full-text available
Increasingly sophisticated technologies nowadays have equipped powerful capabilities to obtain and exploit consumers' information privacy on the Internet. The contemporary privacy protection techniques seem fail to guard information privacy. Besides of the technological protections, information ethics education is described as the ideal way to incr...
Conference Paper
Internet has changed the way of learning, it has become an important part of the adolescents’ life, online social networking has become particularly popular with adolescents, yet it is relatively unclear what capabilities the teenagers have learned and developed from the social media. While the most teenagers have their digital life, many parents o...
Conference Paper
Governments worldwide have been releasing their owned data recently for public usage and arising lots of novel applications and services. Issues on open data were also intensively discussed from researchers and practitioners. One of the key issues in adopting open data is the accessibility of the data, which are generally collectively provided in o...
Conference Paper
With the ever-increasing computer power and ever-cheaper data storages, incredible amount of data have been generated from government and other sources in the digital world. Governments around the world publish Open Data for public well-being, information disclosure, service innovation, and social implications. Open Data is currently an important t...
Article
Full-text available
Online group-buying has become a widespread shopping way in recent years. To complete online group-buying, certain factors influence the activity of group-buying for the initiator and the group buyer. This paper examines three exogenous factors of trust in the initiator, perceived benefits, and social interaction from social commerce perspective fo...
Conference Paper
Open data has emerged to be a hot topic recently and attracted lots of attention from both researchers and practitioners. Many governments around the world are publishing government open data for public well-being, information disclosure, service innovation, and so on. Enormous amount of data and applications have been released and built in recent...
Article
Piracy is always the issue that gains highly concerned by industries, academics and government. Many recent investigations have indicated that digital piracy is especially needed to pay attention to observation. In this paper, we focus on a situational prevention perspective with the strategy by increasing piracy risk. More specific, by rising indi...
Article
Today, information technology (IT) has permeated virtually every aspect of our society and the learning of software programming is becoming increasingly important to the creation and maintenance of the IT infrastructure critical to our daily life. In this article, we report the results of a study that demonstrates how the self-regulation paradigm m...
Chapter
In the online marketspace, social media has played an indispensably role in changing the way of online shopping and auctioning. Previous studies have found the interpersonal relationship is the key factor to a success social media business. This study aims at exploring group buying in social commerce environment from the Chinese “guanxi” perspectiv...
Chapter
The digital content industry is a remarkable market in the information era. Yet the various types of piracy such as software, music, e-book, comic, animation, and movie piracy always threaten the digital content industries and cause enormous losses in revenue. Especially the emerging social networks play a dramatic role in disseminating much unauth...
Article
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information....
Conference Paper
Full-text available
With the emergence of Web 2.0, people are able to share their thoughts and photos with their friends and strangers. Yet, they also risk invasion of their privacy. Information privacy has therefore become an important issue in the information age. In this research, we focus on the influence of anger on immoral judgment of privacy invasion in cybersp...
Article
With the prevalent of Internet, network security plays a very important role as an infrastructural foundation to establish a successful e-Commerce environment. Especially when the Internet transmission technique progresses, network attack becomes prevalent and threaten to Internet users than ever before. While many kinds of network intrusion techni...
Conference Paper
Full-text available
The concept of privacy in Chinese context is a fragile perception. Under such a culture environment, the awareness of right of privacy raises late; therefore, it is of necessary raising people the concept of information privacy. To reach this purpose, this study adopts the theory of self-efficacy to examine factors that influence decisions related...
Conference Paper
Full-text available
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information....
Article
This study explores the personality trait of self-monitoring in Web portal usage by employing the extended theory of planned behavior (TPB) model of Pavlou and Fygenson. A survey of 254 Internet Web portal users was conducted to test the hypothesized model. The results show that our data supported all five individual causal paths postulated in this...
Conference Paper
In the 21st century, e-Commerce and online shopping have come to a stage of steady growth. To encourage consumers to shop online, Internet advertising has become one of the most common strategies for online marketing. The combining traditional and online advertising become a popular marketing strategy and growingly prevalent in Taiwan. While consum...
Conference Paper
Full-text available
In the Knowledge Economics Age, knowledge is seen as a critical resource. To enhance the knowledge value, businesses have to promote knowledge sharing as the path to gaining competitive advantages. Further, with the rapid progress in network technology, new business models have emerged to adapt to the changing environment; the virtual team, a kind...
Article
Full-text available
Previous survey showed that the ihportal sitelt would be the place where Internet users visit most often. In this study, we employed the TAM in studying the portal site, and identified antecedents including information content, customization, reliability and response, and security to perceive ease of use and perceived usefulness on portal site usag...
Article
Full-text available
With the prosperity of the Internet and WWW, lots of web sites have been raised. The eBusinessWeekly 2000 reported that "web portal" was with highly proportion (46.1%) among all kind of the websites; this reveals that web portal would be the place where Internet users visit most often. Since the Internet is widely popular, user's perception to use...

Network

Cited By