About
34
Publications
17,600
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,387
Citations
Introduction
Cathy Hsing-Tzu Lin currently works at the Department of Information Management (IM), National University of Kaohsiung. Cathy does research in Quantitative Social Research and Social Psychology. Current research interests are Educational Data, Learning Analytics, Open Data, Data Literacy, Data Ethics, Information Ethics (information privacy, digital piracy), and Social Commerce.
Current institution
Additional affiliations
August 2003 - present
Publications
Publications (34)
Purpose
This paper intends to examine the antecedents of perceived creativity and flow experience in order to understand how consumers' advertisement keywords browsing influences their searching intentions and/or behaviours regarding purchase. In addition, it aims to consider two kinds of intentions in the theory of planned behaviour (TPB) to facil...
Worldwide losses due to the copyright infringement of intellectual property such as PC software, music recordings, and motion pictures continue at epidemic proportions in emerging countries. This article develops a research model for analyzing individual ethical decision making that is influenced simultaneously by two chief forces: regulative sanct...
This paper investigated the value of including “playfulness” in expectation-confirmation theory (ECT) when studying continued use of a web site. Original models examined cognitive beliefs and effects that influence a person’s intention to continue to use an information system. Here, an extended ECT model (with an additional relationship between per...
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical
to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility
for information privacy because they have the most extensive knowledge of their organization’s system...
Abstract Affordances refer to how interface features of an IT artifact, perceived by its users in terms of their potentials for action, may predict the intensity of usage. This study investigates three social information affordances for expressive information control, privacy information control, and image information control in Facebook. The resul...
As AI technology rapidly advances, ethical concerns have emerged as a global focus. This study introduces a second-order scale for analyzing AI ethics and proposes a model to examine the intention to use AI caregiving robots. The model incorporates elements from the Unified Theory of Acceptance and Use of Technology (UTAUT)—including social influen...
This study explores the main and interaction effects of framing messages and cause-related marketing on backing intentions by manipulating frame types, frame valences, and cause-related marketing in the message narratives of crowdfunding projects. We conduct an online experiment for a crowdfunding campaign and analyze data using independent-samples...
Social media has brought a new communication revolution allowing users to connect, share, and discuss public & social opinions with others. The new look at social media has shaped social movements, and provides a fair voice to anyone who can be heard online. This research explores individuals’ civic engagement concerning the environmental issue of...
This study employs social cognitive theory as a theoretical foundation to empirically explore the influential antecedents of backing intention on crowdfunding platforms. We collected 221 valid samples via Facebook, and the data were analyzed using the partial least squares method. To more deeply understand the applicability of the proposed model ac...
This study employs social cognitive theory as a theoretical foundation to empirically explore the influential antecedents of backing intention on crowdfunding platforms. We collected 221 valid samples from crowdfunding fan pages on Facebook in Taiwan, and the data were analyzed using the partial least squares (PLS) method. The results indicate that...
Recommender systems have emergedrecently in many aspects due to enormous amount of information or items existed in e-commerce or social network services. Users find it convenient if the service can recommend interesting items to them automatically. Past systems adopted users' preference or social connections for such recommendation. In this work, w...
Open election data is an emerged domain in open data for it reflects the maturity of governance and democracy. On this regard, a standardized approach for building open election data will significantly reduce the time and effort for publishing election data to the public for easy access. In this work, we will develop an initial step for building op...
Increasingly sophisticated technologies nowadays have equipped powerful capabilities to obtain and exploit consumers' information privacy on the Internet. The contemporary privacy protection techniques seem fail to guard information privacy. Besides of the technological protections, information ethics education is described as the ideal way to incr...
Internet has changed the way of learning, it has become an important part of the adolescents’ life, online social networking has become particularly popular with adolescents, yet it is relatively unclear what capabilities the teenagers have learned and developed from the social media. While the most teenagers have their digital life, many parents o...
Governments worldwide have been releasing their owned data recently for public usage and arising lots of novel applications and services. Issues on open data were also intensively discussed from researchers and practitioners. One of the key issues in adopting open data is the accessibility of the data, which are generally collectively provided in o...
With the ever-increasing computer power and ever-cheaper data storages, incredible amount of data have been generated from government and other sources in the digital world. Governments around the world publish Open Data for public well-being, information disclosure, service innovation, and social implications. Open Data is currently an important t...
Online group-buying has become a widespread shopping way in recent years. To complete online group-buying, certain factors influence the activity of group-buying for the initiator and the group buyer. This paper examines three exogenous factors of trust in the initiator, perceived benefits, and social interaction from social commerce perspective fo...
Open data has emerged to be a hot topic recently and attracted lots of attention from both researchers and practitioners. Many governments around the world are publishing government open data for public well-being, information disclosure, service innovation, and so on. Enormous amount of data and applications have been released and built in recent...
Piracy is always the issue that gains highly concerned by industries, academics and government. Many recent investigations have indicated that digital piracy is especially needed to pay attention to observation. In this paper, we focus on a situational prevention perspective with the strategy by increasing piracy risk. More specific, by rising indi...
Today, information technology (IT) has permeated virtually every aspect of our society and the learning of software programming is becoming increasingly important to the creation and maintenance of the IT infrastructure critical to our daily life. In this article, we report the results of a study that demonstrates how the self-regulation paradigm m...
In the online marketspace, social media has played an indispensably role in changing the way of online shopping and auctioning. Previous studies have found the interpersonal relationship is the key factor to a success social media business. This study aims at exploring group buying in social commerce environment from the Chinese “guanxi” perspectiv...
The digital content industry is a remarkable market in the information era. Yet the various types of piracy such as software, music, e-book, comic, animation, and movie piracy always threaten the digital content industries and cause enormous losses in revenue. Especially the emerging social networks play a dramatic role in disseminating much unauth...
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information....
With the emergence of Web 2.0, people are able to share their thoughts and photos with their friends and strangers. Yet, they also risk invasion of their privacy. Information privacy has therefore become an important issue in the information age. In this research, we focus on the influence of anger on immoral judgment of privacy invasion in cybersp...
With the prevalent of Internet, network security plays a very important role as an infrastructural foundation to establish a successful e-Commerce environment. Especially when the Internet transmission technique progresses, network attack becomes prevalent and threaten to Internet users than ever before. While many kinds of network intrusion techni...
The concept of privacy in Chinese context is a fragile perception. Under such a culture environment, the awareness of right of privacy raises late; therefore, it is of necessary raising people the concept of information privacy. To reach this purpose, this study adopts the theory of self-efficacy to examine factors that influence decisions related...
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information....
This study explores the personality trait of self-monitoring in Web portal usage by employing the extended theory of planned behavior (TPB) model of Pavlou and Fygenson. A survey of 254 Internet Web portal users was conducted to test the hypothesized model. The results show that our data supported all five individual causal paths postulated in this...
In the 21st century, e-Commerce and online shopping have come to a stage of steady growth. To encourage consumers to shop online, Internet advertising has become one of the most common strategies for online marketing. The combining traditional and online advertising become a popular marketing strategy and growingly prevalent in Taiwan. While consum...
In the Knowledge Economics Age, knowledge is seen as a critical resource. To enhance the knowledge value, businesses have to promote knowledge sharing as the path to gaining competitive advantages. Further, with the rapid progress in network technology, new business models have emerged to adapt to the changing environment; the virtual team, a kind...
Previous survey showed that the ihportal sitelt would be the place where Internet users visit most often. In this study, we employed the TAM in studying the portal site, and identified antecedents including information content, customization, reliability and response, and security to perceive ease of use and perceived usefulness on portal site usag...
With the prosperity of the Internet and WWW, lots of web sites have been raised. The eBusinessWeekly 2000 reported that "web portal" was with highly proportion (46.1%) among all kind of the websites; this reveals that web portal would be the place where Internet users visit most often. Since the Internet is widely popular, user's perception to use...