[14]Cozby,P.C.(1973).Self‐disclosure:A literature review.Psychological Bulletin,79(2),73‐91.
[15]Daft,R.L.,&Lengel,R.H.(1984).Information richness:Anew approach to managerial information processing and organized design.In B.M.Straw&L.L.Cummings(Eds.),Researchinorganizational behavior(pp.191‐233).Greenwich,CT:JAI Press.
[16]Derlega,V.J.,&Grzelak,J.(1979).Appropriateness of self‐disclosure.In G.J.,Chelune,&Associates(Eds.),Self‐disclosure(pp.151‐176).San Francisco:Jossey‐Bass.
[17]Dindia,K.,&Allen,M.(1992).Sex differences in self‐disclosure:A me‐ta‐analysis.Psychological Bulletin,112(1),106‐124.
[18]Dwyer,C.,Hiltz,S.R.,&Passerini,K.(2007).Trus t and privacy con-cern within social networking sites:A comparison of Facebook and Myspace.Proceedings of the Thirteenth Americas Conference on Information System,09‐12 August 2007.Keys tone,Colorado.
[19]Facebook.(September,2009).Retrieved August13,2009 from http://www.*****.com/?2009/Facebook‐usage‐s tatis tics‐sep‐09‐huge.html
[20]Friedman,B.,Kahn,P.H.,&Howe.,D.C.(2000).Trust online.communication of ACM,43(12),34‐40.
[21]Fogel,J.,&Nehmad,E.(2009).Internet social network communities:Risk taking,trust,and privacy concerns.computers in Human Behavior,25(1),153‐160
[22]Gross,R.,&Acquis ti,A.(2005).Information revelation and privacy in online social networks.Proceedings of WPES'05(pp.71‐80).Alexandria,VA:ACM.
[23]Higgins,E.T.(1998).Promotion and prevention:Regulatory focus as a motivational principle.In M.P.Zanna(Ed.),Advances in ex perimental so-cial psychology,Vol.30,pp.1‐46.New York,Academic Press.
[24]Hoffman,D.L.,Novak,T.P.,&Peralta,M.(1999).Building consumer trust online.communications of the ACM,42(4),80‐85.
[25]Huffaker,D.A.,&Calvert,S.L.(2005).Gender,identity,and language use in teenage blogs.Journal of computer‐Mediated communication,10(2).Retrieved Augus t13,2009 from http://www.*****.com/?vol10/is-sue2/huffaker.html.
[26]Infocomm Development Authority of Singapore(IDA).(2008).Retrieved 2010 Jan from http://www.*****.com/?doc/Publications/Publications_Lev-el3/20090218183328/HH2008 ES.pdf.
[27]Jarvenpaa,S.L.,&Tractinsky,N.(1999).Consumer trust in an Internet s tore:A cross‐cultural validation.Journal of computer Mediated communication,5(2),1‐35.
[28]Joinson,A.(2001).Self‐disclosure in computer‐mediated communication:The role of self‐awareness and visual anonymity.European Journal of So-cial Psychology,31,177‐192.
[29]Kelly,A.E.,&McKillop,K.J.(1996).Consequences of revealing personal secrets.Psychological Bulletin,120,450‐465.
[30]Kim,K‐H.,&Yun,H.(2008).Cying for me,cying for us:relational dialectics in a Korean social network site.Journal of computer‐Mediated communication,13,298‐318.
[31]Lane,J.D.,&Wegner,D.M.(1995).The cognitive consequences of secrecy.Journal of Personality and Social Psychology,69,237‐253.
[32]Larson,C.E.,&LaFasto,F.M.J.(1989).Teamwork:What Must Go Right/What Can Go Wrong.Sage:New bury Park,CA.
[33]Larzelere,R.E.,&Hus ton,T.L.(1980).The dyadic trust scale:toward understanding interpersonal trust in close relationships.Journalof Marria ge and the Family,42,595‐604.
[34]Lea,M.,&Spears,R.(1995).Love at first byte?Building personal relationships over computer networks.In J.T.Wood&S.Duck(Eds.),Understudied relationshi ps:Off the beaten track(pp.197‐233).Thousand Oaks,CA:Sage.
[35]Levinger,G.,&Senn,D.J.(1967).Disclosure of feelings in marriage.Merril‐Palmer Quarterly,13(3),237‐249.
[36]Malhotra,N.K.,Kim,S.S.,&Agarwal,J.(2004).Internet users'in-formation privacy concerns(IUIPC):The cons truct,the scale and a casual model.Information S ystems Research,15(4),336‐355.
[37]Manago,A.M.,Graham,M.B.,Greenfield,P.M.,&Salimkhan,G.(2008).Self‐presentation and gender on Myspace.Journal of Applied Developmental Psychology,29(6),446‐458.
[38]Marray,S.L.,Holmes,J.G.,&Collins,N.L.(2006).Optimizing assurance:The risk regulation system in relationships.Psychological Bulletin,132,641‐666.
[39]Mayer,R.C.,Davis,J.H.,&Schoorman,F.D.(1995).An integrative model of organizational trust.Academy of Management Review,20(3),709‐734.
[40]McKnight,D.H.,Choudhury,V.,&Kacmar,C.(2002).Developing and validating trust measures for e‐commerce:An integrative typology.In-formation Systems Research,13(3),334‐359.
[41]Metts,S.(1989).An exploratory investigation of deception in close relationships.Journal of Social and Personal Relationships,6,159‐179.