Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts

Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter ofte...

Full description

Saved in:
Bibliographic Details
Published inEuropean journal of information systems Vol. 22; no. 3; pp. 295 - 316
Main Authors Dinev, Tamara, Xu, Heng, Smith, Jeff H, Hart, Paul
Format Journal Article
LanguageEnglish
Published London Taylor & Francis 01.05.2013
Palgrave Macmillan UK
Taylor & Francis Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.
AbstractList Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. . Adapted from the source document.
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se . Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. [PUBLICATION ABSTRACT]
Author Smith, Jeff H
Hart, Paul
Xu, Heng
Dinev, Tamara
Author_xml – sequence: 1
  givenname: Tamara
  surname: Dinev
  fullname: Dinev, Tamara
  organization: Department of Information Technology & Operations ManagementCollege of Business, Florida Atlantic University
– sequence: 2
  givenname: Heng
  surname: Xu
  fullname: Xu, Heng
  organization: College of Information Sciences and Technology, Pennsylvania State University
– sequence: 3
  givenname: Jeff H
  surname: Smith
  fullname: Smith, Jeff H
  organization: Department of Decision Sciences and Management Information SystemsFarmer School of Business, Miami University
– sequence: 4
  givenname: Paul
  surname: Hart
  fullname: Hart, Paul
  organization: Department of Information Technology & Operations ManagementCollege of Business, Florida Atlantic University
BookMark eNp1kc1qGzEURkVwoHbSXR9goJsuMo7-RjPKrpi2CQSySSA7odHcceSOJUeSW_z21WQaCMFZiSvO93E5d4FmzjtA6AvBS4Kr-hI2Ni4pJnRJ2QmaE16LUjLOZ2iOpcAlbqrHT2gR4wZjiiUnc_T7xvU-bHWy3hW7YP9ocyi06wrjQ4BBJ4hXeS5gu7PBGj0UOqU8pCL5og22W8ML3tmYrFvvbXx6rSmn_FjlDOxSPEenvR4ifP7_nqGHnz_uV9fl7d2vm9X329Kwukll2wGDttN5qGQteCM4pbQhHKCRbf7FXQNVBcz0hletZI1shCbCSNEKJjU7Q9-m3l3wz3uISW1tNDAM2oHfR0XE2MeFqDL69R268fvg8naKMFrJbIzITNGJMsHHGKBXxqYXZSloOyiC1ehfjf7V6F9RlkMX70LZy1aHw0d4OeExY24N4c0mx_l64u10wL8-DJ1K-jD40AftTGbZ0eQ_tyKtGA
CitedBy_id crossref_primary_10_1080_13675567_2021_1957803
crossref_primary_10_1007_s10799_015_0246_0
crossref_primary_10_1080_1331677X_2019_1585272
crossref_primary_10_1007_s11301_021_00239_4
crossref_primary_10_1016_j_dss_2021_113717
crossref_primary_10_1108_INTR_01_2023_0056
crossref_primary_10_1016_j_dss_2021_113716
crossref_primary_10_1007_s10796_024_10531_9
crossref_primary_10_1016_j_jretai_2020_10_001
crossref_primary_10_1111_ddg_15454_g
crossref_primary_10_1108_PROG_10_2014_0078
crossref_primary_10_1016_j_ijhcs_2021_102641
crossref_primary_10_1108_JCM_07_2023_6168
crossref_primary_10_1155_2023_4987364
crossref_primary_10_1108_BFJ_11_2023_0989
crossref_primary_10_2139_ssrn_3670533
crossref_primary_10_3390_informatics9020031
crossref_primary_10_1111_deci_12243
crossref_primary_10_3390_jpm13071048
crossref_primary_10_2139_ssrn_3891121
crossref_primary_10_1016_j_dss_2023_113961
crossref_primary_10_1007_s10796_020_10053_0
crossref_primary_10_1057_ejis_2013_33
crossref_primary_10_1108_ITP_03_2018_0132
crossref_primary_10_1016_j_ijresmar_2023_09_004
crossref_primary_10_1016_j_telpol_2021_102155
crossref_primary_10_2139_ssrn_4168335
crossref_primary_10_1007_s12525_019_00335_0
crossref_primary_10_1111_bjet_13234
crossref_primary_10_1007_s10796_020_09984_5
crossref_primary_10_1080_0960085X_2022_2110000
crossref_primary_10_1080_10447318_2024_2446502
crossref_primary_10_1007_s12263_015_0478_y
crossref_primary_10_1016_j_telpol_2023_102703
crossref_primary_10_1016_j_elerap_2021_101046
crossref_primary_10_1016_j_ijinfomgt_2017_10_007
crossref_primary_10_1080_10447318_2023_2238974
crossref_primary_10_1016_j_chb_2015_06_006
crossref_primary_10_1016_j_im_2020_103314
crossref_primary_10_1108_ARLA_05_2024_0090
crossref_primary_10_1016_j_ipm_2019_102128
crossref_primary_10_1080_10447318_2017_1392079
crossref_primary_10_2196_65747
crossref_primary_10_1080_0144929X_2025_2469657
crossref_primary_10_1016_j_jjimei_2024_100270
crossref_primary_10_1111_isj_12243
crossref_primary_10_1007_s10796_017_9802_y
crossref_primary_10_1016_j_ijhm_2015_03_008
crossref_primary_10_1057_s41303_017_0066_x
crossref_primary_10_1016_j_elerap_2024_101374
crossref_primary_10_1080_0144929X_2022_2046162
crossref_primary_10_1007_s12525_024_00744_w
crossref_primary_10_1177_1069031X241262728
crossref_primary_10_1016_j_chbah_2025_100137
crossref_primary_10_1108_OIR_03_2024_0135
crossref_primary_10_1016_j_dss_2022_113881
crossref_primary_10_1016_j_techfore_2020_120164
crossref_primary_10_1590_1982_7849rac2023220311_por
crossref_primary_10_1080_13675567_2024_2341851
crossref_primary_10_2478_popets_2022_0036
crossref_primary_10_3389_frobt_2023_1236733
crossref_primary_10_1057_ejis_2013_17
crossref_primary_10_4018_IJISP_2022010119
crossref_primary_10_3390_digital3040018
crossref_primary_10_1016_j_tele_2019_04_006
crossref_primary_10_1016_j_tele_2017_12_002
crossref_primary_10_1016_j_ijresmar_2023_08_003
crossref_primary_10_3233_ISU_230180
crossref_primary_10_1016_j_dss_2019_02_007
crossref_primary_10_1108_IntR_11_2016_0340
crossref_primary_10_1177_14604582231152185
crossref_primary_10_1080_15332861_2021_1875764
crossref_primary_10_1109_ACCESS_2022_3167025
crossref_primary_10_1080_10919392_2020_1834810
crossref_primary_10_2478_jeb_2024_0015
crossref_primary_10_3389_fpubh_2022_847184
crossref_primary_10_1016_j_cose_2023_103375
crossref_primary_10_1080_10447318_2024_2430494
crossref_primary_10_1002_cpe_6680
crossref_primary_10_1016_j_cose_2024_103794
crossref_primary_10_4218_etrij_2017_0259
crossref_primary_10_2139_ssrn_3786245
crossref_primary_10_1016_j_jbusres_2023_114396
crossref_primary_10_1080_10447318_2024_2402126
crossref_primary_10_1108_IntR_03_2016_0070
crossref_primary_10_1111_1467_8551_12427
crossref_primary_10_1016_j_tele_2020_101377
crossref_primary_10_1080_10447318_2024_2375704
crossref_primary_10_4018_IJSEUS_2018100104
crossref_primary_10_1080_0144929X_2021_1901990
crossref_primary_10_1108_IMDS_08_2021_0485
crossref_primary_10_3389_fpsyg_2022_908309
crossref_primary_10_1145_3386160
crossref_primary_10_1057_s41303_017_0056_z
crossref_primary_10_1108_ITP_09_2021_0706
crossref_primary_10_1016_j_chb_2020_106644
crossref_primary_10_1016_j_im_2018_11_004
crossref_primary_10_24857_rgsa_v18n9_065
crossref_primary_10_3390_su15021657
crossref_primary_10_1016_j_im_2022_103679
crossref_primary_10_1108_JEIM_12_2020_0481
crossref_primary_10_1108_IMDS_03_2015_0087
crossref_primary_10_1108_APJBA_04_2022_0166
crossref_primary_10_12985_ksaa_2024_32_4_73
crossref_primary_10_1016_j_chb_2022_107415
crossref_primary_10_1108_ITP_08_2019_0416
crossref_primary_10_1016_j_giq_2018_04_002
crossref_primary_10_1080_12460125_2021_1873493
crossref_primary_10_1177_20552076231219444
crossref_primary_10_20990_kilisiibfakademik_438456
crossref_primary_10_1093_jamia_ocaa240
crossref_primary_10_1016_j_procs_2015_08_574
crossref_primary_10_1016_j_telpol_2024_102759
crossref_primary_10_2139_ssrn_4061630
crossref_primary_10_1016_j_jairtraman_2016_05_005
crossref_primary_10_1057_s41599_025_04580_x
crossref_primary_10_1145_3676525
crossref_primary_10_4018_IRMJ_349977
crossref_primary_10_1007_s12525_022_00522_6
crossref_primary_10_1177_1461444820979708
crossref_primary_10_1016_j_procs_2021_12_003
crossref_primary_10_3390_ijerph18189553
crossref_primary_10_1111_isj_12179
crossref_primary_10_1142_S0219877023500256
crossref_primary_10_1007_s10799_018_0295_2
crossref_primary_10_1093_heapro_daae103
crossref_primary_10_1016_j_ijmedinf_2015_12_010
crossref_primary_10_1057_s41303_016_0031_0
crossref_primary_10_2196_19594
crossref_primary_10_1016_j_jsis_2014_09_001
crossref_primary_10_1080_10447318_2021_1994211
crossref_primary_10_1177_00472875241268511
crossref_primary_10_1080_15332861_2020_1832817
crossref_primary_10_1080_12460125_2024_2428166
crossref_primary_10_3390_jpm12050657
crossref_primary_10_20965_jaciii_2020_p0509
crossref_primary_10_3390_su152215709
crossref_primary_10_1007_s10796_021_10158_0
crossref_primary_10_1108_JGOSS_10_2016_0030
crossref_primary_10_1007_s10796_022_10321_1
crossref_primary_10_1016_j_techfore_2019_01_018
crossref_primary_10_1080_15536548_2016_1206757
crossref_primary_10_1007_s10796_019_09964_4
crossref_primary_10_2139_ssrn_2510116
crossref_primary_10_1177_14614448221122734
crossref_primary_10_3390_su15053974
crossref_primary_10_1007_s10551_015_2586_4
crossref_primary_10_1016_j_chb_2018_09_015
crossref_primary_10_1016_j_tele_2023_101951
crossref_primary_10_3390_ijerph15102196
crossref_primary_10_1080_0267257X_2020_1715465
crossref_primary_10_1016_j_cose_2023_103646
crossref_primary_10_1016_j_procs_2018_10_081
crossref_primary_10_1016_j_jbi_2019_103302
crossref_primary_10_1016_j_im_2020_103284
crossref_primary_10_1016_j_techfore_2022_122039
crossref_primary_10_4018_IJITBAG_2019010105
crossref_primary_10_1016_j_jbusres_2023_114205
crossref_primary_10_1108_JFRA_12_2021_0476
crossref_primary_10_1108_ICS_02_2018_0024
crossref_primary_10_1080_15213269_2019_1598434
crossref_primary_10_1111_isj_12080
crossref_primary_10_1177_10946705241295849
crossref_primary_10_1111_isj_12082
crossref_primary_10_1057_s41264_023_00257_1
crossref_primary_10_1007_s10209_019_00663_0
crossref_primary_10_1016_j_elerap_2022_101176
crossref_primary_10_2132_personality_33_1_2
crossref_primary_10_1002_asi_24602
crossref_primary_10_1080_00224545_2018_1493676
crossref_primary_10_1108_IntR_04_2016_0088
crossref_primary_10_3390_su12125163
crossref_primary_10_1080_08874417_2016_1153913
crossref_primary_10_2139_ssrn_3980468
crossref_primary_10_1080_17489725_2023_2256701
crossref_primary_10_1186_s13690_024_01416_z
crossref_primary_10_1111_ddg_15454
crossref_primary_10_1016_j_datak_2021_101888
crossref_primary_10_1016_j_heliyon_2020_e03298
crossref_primary_10_3917_mav_099_0015
crossref_primary_10_1108_ITP_10_2020_0694
crossref_primary_10_4102_sajim_v19i1_867
crossref_primary_10_1007_s12297_019_00431_2
crossref_primary_10_1080_17538157_2022_2049274
crossref_primary_10_2478_dim_2020_0038
crossref_primary_10_2196_48700
crossref_primary_10_5850_JKSCT_2023_47_3_442
crossref_primary_10_1080_23311983_2023_2184463
crossref_primary_10_1016_j_dss_2016_10_002
crossref_primary_10_1080_0144929X_2023_2178830
crossref_primary_10_1016_j_elerap_2017_02_002
crossref_primary_10_1007_s12599_018_0528_2
crossref_primary_10_1080_10864415_2018_1564553
crossref_primary_10_1109_TEM_2022_3204285
crossref_primary_10_1016_j_jretconser_2022_103028
crossref_primary_10_1080_08874417_2022_2150911
crossref_primary_10_1111_isj_12386
crossref_primary_10_1016_j_im_2015_07_010
crossref_primary_10_1016_j_soscij_2018_10_001
crossref_primary_10_1177_08944393231224539
crossref_primary_10_1177_2056305120915618
crossref_primary_10_1016_j_jnca_2022_103465
crossref_primary_10_1080_23299460_2022_2076985
crossref_primary_10_2139_ssrn_4107152
crossref_primary_10_3390_info12080311
crossref_primary_10_1057_s41299_024_00211_4
crossref_primary_10_1080_15536548_2017_1412114
crossref_primary_10_1016_j_im_2021_103507
crossref_primary_10_1016_j_ijhcs_2024_103320
crossref_primary_10_1080_10447318_2023_2254617
crossref_primary_10_1016_j_compedu_2016_06_004
crossref_primary_10_1080_08874417_2016_1232981
crossref_primary_10_1590_1982_7849rac2023220311_en
crossref_primary_10_1080_15536548_2016_1163026
crossref_primary_10_1145_3508484_3508487
crossref_primary_10_1016_j_im_2017_01_001
crossref_primary_10_1080_0144929X_2015_1066444
crossref_primary_10_1080_08874417_2019_1579076
crossref_primary_10_1007_s12525_017_0274_1
crossref_primary_10_1016_j_im_2018_03_012
crossref_primary_10_1108_ITP_07_2022_0498
crossref_primary_10_1080_0144929X_2024_2304613
crossref_primary_10_1016_j_chb_2018_05_043
crossref_primary_10_1016_j_jksuci_2018_03_001
crossref_primary_10_1016_j_soscij_2014_07_002
crossref_primary_10_2139_ssrn_3946376
crossref_primary_10_1016_j_ijmedinf_2015_09_006
crossref_primary_10_1177_10949968221136555
crossref_primary_10_1016_j_dss_2018_08_012
crossref_primary_10_1002_poi3_419
crossref_primary_10_1016_j_ijinfomgt_2020_102266
crossref_primary_10_1016_j_intmar_2021_03_005
crossref_primary_10_1016_j_eswa_2016_08_042
crossref_primary_10_1080_10919392_2024_2398889
crossref_primary_10_1016_j_chb_2020_106260
crossref_primary_10_18775_ijmsba_1849_5664_5419_2014_62_1001
crossref_primary_10_1016_j_protcy_2014_10_020
crossref_primary_10_1057_s41303_017_0064_z
crossref_primary_10_1186_s12911_022_01986_4
crossref_primary_10_1016_j_dss_2016_09_011
crossref_primary_10_1016_j_jretconser_2016_08_018
crossref_primary_10_3917_gmp_102_0033
crossref_primary_10_1016_j_ijinfomgt_2019_102063
crossref_primary_10_1016_j_tele_2022_101904
crossref_primary_10_1108_INTR_11_2022_0898
crossref_primary_10_1007_s10551_019_04237_1
crossref_primary_10_20867_thm_30_3_6
crossref_primary_10_1080_0144929X_2024_2431052
crossref_primary_10_1016_j_dss_2017_12_003
crossref_primary_10_1080_1369118X_2023_2285462
crossref_primary_10_1108_EJM_06_2019_0515
crossref_primary_10_1016_j_ijinfomgt_2019_102065
Cites_doi 10.1037/0022-3514.51.6.1173
10.1287/isre.1060.0096
10.1111/1540-4560.00063
10.1207/s15327744joce1602_2
10.1016/j.elerap.2009.05.001
10.1007/11957454_3
10.1080/01972240490507956
10.1007/s10796-006-9013-4
10.1287/isre.1040.0032
10.2307/40041279
10.1145/257874.257896
10.1016/S0963-8687(02)00018-5
10.1016/j.dss.2010.02.008
10.2753/JEC1086-4415100201
10.1111/j.1540-4560.1977.tb01882.x
10.1287/isre.13.3.334.81
10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
10.1086/209386
10.1145/219663.219683
10.2307/3250951
10.1207/s15327906mbr0903_1
10.2979/ESJ.2006.4.3.25
10.1145/988772.988777
10.2307/1321160
10.1287/orsc.11.1.35.12567
10.2753/MIS0742-1222260305
10.1509/jppm.19.1.62.16949
10.1057/palgrave.ejis.3000590
10.1145/767193.767196
10.1016/j.jsis.2007.09.002
10.1080/019722499128592
10.1037/0021-9010.65.5.623
10.1037/0021-9010.88.5.879
10.1080/019722499128538
10.2307/3150783
10.1111/1540-4560.00071
10.1016/j.dss.2011.01.017
10.1016/S0191-8869(98)00222-0
10.1080/01449290410001715723
10.1111/j.1540-4560.1977.tb01879.x
10.1016/S1071-5819(03)00111-3
10.1016/j.im.2004.01.003
10.1080/019722499128565
10.2307/248873
10.1177/0276146704263920
10.1287/mnsc.1060.0597
10.4018/irmj.2001100104
10.1111/1540-4560.00067
10.1016/j.chb.2010.03.016
10.1111/j.1083-6101.2007.00380.x
10.1111/j.1540-4560.1977.tb01880.x
10.1037/h0046016
10.1287/orsc.10.1.104
10.1057/jit.2010.6
10.1016/j.dss.2010.01.010
10.1145/903893.903897
10.1177/009207002236917
10.1080/019722499128411
10.2307/249775
10.2307/249477
10.1145/42411.42413
10.1017/CBO9780511625138
10.1037/0021-9010.66.3.308
10.1287/isre.1070.0124
10.1111/j.2044-8260.1973.tb00065.x
10.1111/j.1460-2466.1985.tb02236.x
10.1037/0021-9010.86.1.114
10.1080/019722498128719
10.2307/1250198
10.1016/S0963-8687(02)00017-3
10.2307/1252059
10.1509/jppm.19.1.27.16941
10.1037/0021-9010.68.3.459
10.1006/jevp.1997.0049
10.1287/isre.13.1.36.97
10.1287/isre.1060.0080
10.2307/25148760
10.17705/1jais.00077
10.1353/book4588
10.2307/25148715
10.2307/25148757
10.1177/074391569101000111
10.17705/1jais.00281
10.2307/41409970
10.2307/25148814
10.2307/25148745
10.2307/20650304
10.2307/25148744
10.5040/9798216001362
10.1515/9781503620766
10.1177/074391569101200206
10.2307/25148854
10.2307/25148804
10.2307/23044042
10.7591/9781501722134
10.2307/25148779
10.17705/1thci.00024
10.2307/25148821
ContentType Journal Article
Copyright Copyright © 2012, Operational Research Society 2012
Operational Research Society 2012
Operational Research Society 2013
Copyright_xml – notice: Copyright © 2012, Operational Research Society 2012
– notice: Operational Research Society 2012
– notice: Operational Research Society 2013
DBID AAYXX
CITATION
3V.
7WY
7WZ
7XB
87Z
8AL
8BF
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ALSLI
ARAPS
AXJJW
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
CNYFK
DWQXO
E3H
F2A
FREBS
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L.0
M0C
M0N
M0Q
M1O
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRQQA
Q9U
8BP
DOI 10.1057/ejis.2012.23
DatabaseName CrossRef
ProQuest Central (Corporate)
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Global (Alumni Edition)
Computing Database (Alumni Edition)
European Business Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
Research Library (Alumni)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
Asian & European Business Collection (ProQuest)
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One
Library & Information Science Collection
ProQuest Central Korea
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Asian & European Business Collection (Alumni)
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
ProQuest Research Library
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
ABI/INFORM Global
Computing Database
European Business Database
Library Science Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Social Sciences
ProQuest Central Basic
Library & Information Sciences Abstracts (LISA) - CILIP Edition
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
ProQuest European Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Asian & European Business Collection
SciTech Premium Collection
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest Business Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
Research Library (Alumni Edition)
Asian & European Business Collection (Alumni)
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest European Business (Alumni Edition)
ABI/INFORM Professional Standard
ProQuest Central Korea
ProQuest Research Library
ABI/INFORM Complete (Alumni Edition)
ProQuest Computing
ProQuest One Social Sciences
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
Library & Information Sciences Abstracts (LISA) - CILIP Edition
DatabaseTitleList
Library & Information Sciences Abstracts (LISA) - CILIP Edition

ProQuest Business Collection (Alumni Edition)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Library & Information Science
EISSN 1476-9344
EndPage 316
ExternalDocumentID 2942197111
10_1057_ejis_2012_23
11934267
Genre Research Article
Feature
GroupedDBID .DC
0BK
0R~
29G
30N
3V.
4.4
5GY
77K
7WY
8FE
8FG
8FL
8FW
8G5
8R4
8R5
AAIAL
AAJMT
AALDU
AAMIU
AAPUL
AAQRR
ABJNI
ABLIJ
ABPAQ
ABUWG
ABXUL
ABXYU
ACGFO
ACGFS
ACHQT
ACREN
ACTIO
ADFRT
ADGTB
ADINQ
AECXW
AEISY
AENEX
AEOZL
AEPSL
AEXYK
AEYOC
AFKRA
AGAYW
AGDLA
AHBYD
AHDZW
AHSBF
AJRNO
AKBVH
AKOOK
ALMA_UNASSIGNED_HOLDINGS
ALQZU
ALSLI
AMKLP
AMTXH
AQRUH
ARAPS
ASPBG
AVWKF
AWYRJ
AXJJW
AZQEC
BENPR
BEZIV
BGLVJ
BLEHA
BPHCQ
CCCUG
CCPQU
CNYFK
CS3
CSNOR
DWQXO
EBS
EJD
FEFRA
FRNLG
GNUQQ
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
GUQSH
H13
HCIFZ
K60
K6V
K6~
K7-
KYCEM
L7B
M0C
M0N
M1O
M2O
MS~
O9-
P2P
P62
PQBIZ
PQBZA
PQQKQ
PROAC
Q2X
RNANH
ROSJB
RPC
RSV
RTWRZ
SNX
SOJ
TBQAZ
TDBHL
TEN
TFL
TFT
TFW
TTHFI
TUROJ
U5U
UCJ
WH7
XSW
ZGOLN
ADYSH
3EH
AAGDL
AAHIA
AARHV
AAYLN
AAYOK
AAYXX
ACTTO
ADUMR
ADXEU
AEHZU
AEZBV
AFBWG
AFRVT
AGVKY
AGWUF
AIYEW
AKHJE
AKMBP
ALRRR
AMPGV
BGSSV
CAG
CITATION
COF
CYRSC
DAOYK
DGEBU
IFELN
IPNFZ
LJTGL
M4Z
N8N
NUSFT
PHGZM
PHGZT
RIG
TAJZE
UAP
YR5
7XB
8AL
8BF
8FK
E3H
F2A
JQ2
L.-
L.0
M0Q
MBDVC
PKEHL
PQEST
PQGLB
PQUKI
PRQQA
Q9U
TASJS
8BP
ID FETCH-LOGICAL-c378t-bde3ebda37859764864222814ee89b3780d8e55e3cfc45b938986a16c96b639a3
IEDL.DBID BENPR
ISSN 0960-085X
IngestDate Fri Jul 11 14:27:01 EDT 2025
Sat Aug 23 14:41:57 EDT 2025
Tue Jul 01 05:13:05 EDT 2025
Thu Apr 24 22:59:30 EDT 2025
Fri Feb 21 02:34:18 EST 2025
Wed Dec 25 09:00:57 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords privacy
anonymity
control
risk
secrecy
confidentiality
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c378t-bde3ebda37859764864222814ee89b3780d8e55e3cfc45b938986a16c96b639a3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
PQID 1325908519
PQPubID 30520
PageCount 22
ParticipantIDs crossref_citationtrail_10_1057_ejis_2012_23
proquest_miscellaneous_1622284665
proquest_journals_1325908519
springer_journals_10_1057_ejis_2012_23
crossref_primary_10_1057_ejis_2012_23
informaworld_taylorfrancis_310_1057_ejis_2012_23
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 5/1/2013
20130501
2013-05-00
PublicationDateYYYYMMDD 2013-05-01
PublicationDate_xml – month: 05
  year: 2013
  text: 5/1/2013
  day: 01
PublicationDecade 2010
PublicationPlace London
PublicationPlace_xml – name: London
– name: Abingdon
PublicationTitle European journal of information systems
PublicationTitleAbbrev Eur J Inf Syst
PublicationYear 2013
Publisher Taylor & Francis
Palgrave Macmillan UK
Taylor & Francis Ltd
Publisher_xml – name: Taylor & Francis
– name: Palgrave Macmillan UK
– name: Taylor & Francis Ltd
References Flaherty (CR48) 1979
Bansal, Zahedi, Gefen (CR9) 2008
Culnan, Bies (CR31) 2003; 59
Podsakoff, Mackenzie, Lee, Podsakoff (CR97) 2003; 88
Cote (CR27) 2002
Solove (CR112) 2006; 154
Krasnova, Spiekermann, Koroleva, Hildebrand (CR64) 2009; 25
Tam, Ho (CR122) 2006; 30
Taylor (CR123) 1974; 38
Li, Sarathy, Xu (CR66) 2011; 51
Dinev, Hart, Mullen (CR40) 2008; 17
Baron, Kenny (CR11) 1986; 51
Lindell, Whitney (CR67) 2001; 86
Smith, Dinev, Xu (CR109) 2011; 35
Etzioni (CR44) 1999
Zwick, Dholakia (CR138) 2004; 24
Milne, Gordon (CR87) 1993; 12
McKnight, Choudhury, Kacmar (CR81) 2002; 13
Milberg, Burke, Smith, Kallman (CR84) 1995; 38
Burton-Jones (CR17) 2009; 33
Turkle (CR128) 2011
Cate (CR21) 1997
CR43
Poindexter, Earp, Baumer (CR98) 2006; 8
Bellman, Johnson, Kobrin, Lohse (CR13) 2004; 20
McGrath (CR80) 1982
Margulis (CR74) 2003; 59
Spiekermann (CR114) 2005
Nissenbaum (CR89) 1999; 15
Dowling, Staelin (CR41) 1994; 21
Petronio (CR93) 2002
Dinev, Hart (CR35) 2004; 23
Solove (CR111) 2004
Gefen, Rigdon, Straub (CR51) 2011; 35
Rosen (CR104) 2000
Frye, Dornischa (CR49) 2010; 26
Chellappa (CR23) 2001
Xu (CR134) 2007
CR53
Gefen, Straub, Boudreau (CR52) 2000; 4
Xu, Dinev, Smith, Hart (CR135) 2011; 12
Komiak, Benbasat (CR63) 2006; 30
Di Pietro, Mancini (CR34) 2003; 46
Stewart, Segars (CR116) 2002; 13
Bansal, Zahedi, Gefen (CR10) 2010; 49
Malhotra, Kim, Agarwal (CR71) 2004; 15
Acquisti (CR1) 2004
Kelvin (CR60) 1973; 12
Dennis, Valacich (CR32) 2001; 7
Turkle (CR127) 1995
Acquisti, Gross (CR2) 2006
Vidmar, Flaherty (CR129) 1985; 35
Culnan (CR29) 1993; 17
Tefft (CR124) 1980
Margulis (CR75) 2003; 59
Mason (CR78) 1986; 10
Dinev, Hart (CR38) 2007; 4
Dinev, Bellotto, Hart, Russo, Serra, Colautti (CR39) 2006; 15
Klopfer, Rubenstein (CR61) 1977; 33
Smith, Milberg, Burke (CR110) 1996; 20
Moorman, Desphande, Zaltman (CR88) 1993; 57
Burton-Jones, Straub (CR18) 2006; 17
Metzger (CR83) 2004; 9
Marx (CR77) 1999; 15
Stone, Gueutal, Gardner, Mcclure S (CR118) 1983; 68
Margulis (CR73) 1977; 33
Smith (CR108) 1994
Laufer, WOLFE (CR65) 1977; 33
Westin (CR133) 1967
Cramer, Barry (CR28) 1999; 27
Pavlou (CR91) 2002; 11
Petter, Straub, Rai (CR94) 2007; 31
Dinev, Hart (CR36) 2005; 10
Gross, Acquisti (CR55) 2005
Culnan, Armstrong (CR30) 1999; 10
CR70
Rensel, Abbas, Rao (CR101) 2006; 7
Hoadley, Xu, Lee, Rosson (CR56) 2010; 9
Sheehan, Hoy (CR107) 2000; 19
Marshall (CR76) 1974; 9
Warren, Brandeis (CR131) 1890; 4
Clarke (CR26) 1988; 31
Nunnally (CR90) 1978
Dhillon, Moores (CR33) 2001; 14
Phelps, Nowak, Ferrell (CR96) 2000; 19
Stone, Stone (CR117) 1990; 8
Camp (CR19) 1999; 15
Featherman, Pavlou (CR46) 2003; 59
Hui, Teo, Lee (CR57) 2007; 31
Agarwal, Karahanna (CR3) 2000; 24
Malhotra, Kim, Patil (CR72) 2006; 52
Akers (CR4) 2001
Armstrong, Overton (CR7) 1977; 14
Rust, Kannan, Peng (CR105) 2002; 30
Raab, Bennett (CR100) 1998; 14
Jiang, Benbasat (CR58) 2007; 18
Teich, Frankel, Kling, Lee (CR125) 1999; 15
Bennett (CR14) 1992
Dinev, Hart (CR37) 2006; 17
Festinger (CR47) 1957
Son, Kim (CR113) 2008; 32
Altman (CR6) 1975
Bok (CR15) 1989
CR95
Tolchinsky, McCuddy, Adams, Ganster, Woodman, Fromkin (CR126) 1981; 66
Sternberg (CR115) 2003
Swire (CR121) 1997
Xu, Teo, Tan, Agarwal (CR136) 2010; 26
Chin (CR25) 1998
Featherman, Wright, Thatcher, Zimmer, Pak (CR45) 2011; 3
Goodwin (CR54) 1991; 10
Campbell, Fiske (CR20) 1959; 56
Rindfleisch (CR102) 1997; 40
Schoeman (CR106) 1984
Milne, Boza (CR86) 1999; 13
Webster, Ahuja (CR132) 2006; 30
Awad, Krishnan (CR8) 2006; 30
Earp, Payton (CR42) 2006; 16
Luo, Li, Zhang, Shim (CR69) 2010; 49
Brin (CR16) 1998
Young (CR137) 1978
Jiang, Benbasat (CR59) 2007; 31
McLean (CR82) 1995
CR24
Liu, Marchewka, Lu, Yu (CR68) 2005; 42
CR22
Milberg, Smith, Burke (CR85) 2000; 11
Kobsa, Schreck (CR62) 2003; 3
CR103
Straub, Boudreau, Gefen (CR119) 2004; 13
Belanger, Hiller, Smith (CR12) 2002; 11
Fusilier, Hoyer (CR50) 1980; 65
Waldo, Lin, Millett (CR130) 2007
Pedersen (CR92) 1997; 17
McElroy, Hendrickson, Townsend, Demarie (CR79) 2007; 31
Strite, Karahanna (CR120) 2006; 30
Qian, Scott (CR99) 2007; 12
Altman (CR5) 1974
CIT0072
Altman I (CIT0005) 1974
CIT0071
CIT0074
CIT0073
CIT0076
CIT0075
CIT0078
CIT0077
CIT0110
Jiang Z (CIT0059) 2007; 31
Acquisti A (CIT0002) 2006
Dennis A (CIT0032) 2001; 7
Smith HJ (CIT0108) 1994
CIT0112
CIT0116
CIT0118
Akers R (CIT0004) 2001
CIT0085
Waldo J (CIT0130) 2007
CIT0084
CIT0086
Flaherty DH (CIT0048) 1979
CIT0089
Gross R (CIT0055) 2005
CIT0088
Chellappa RK (CIT0023) 2001
CIT0081
Komiak XS (CIT0063) 2006; 30
CIT0003
CIT0123
CIT0126
CIT0125
CIT0007
Schoeman FD (CIT0106) 1984
CIT0129
CIT0096
CIT0010
CIT0098
CIT0131
CIT0097
Xu H (CIT0135) 2011; 12
CIT0012
CIT0011
CIT0099
Cate FH (CIT0021) 1997
CIT0092
CIT0091
Spiekermann S (CIT0114) 2005
McGrath JE (CIT0080) 1982
Nunnally JC (CIT0090) 1978
CIT0013
Featherman M (CIT0045) 2011; 3
CIT0136
CIT0018
CIT0138
CIT0019
CIT0020
Burton-Jones A (CIT0017) 2009; 33
CIT0026
CIT0029
Acquisti A (CIT0001) 2004
Altman I (CIT0006) 1975
CIT0028
Petronio SS (CIT0093) 2002
Cote S (CIT0027) 2002
Goodwin C (CIT0054) 1991; 10
CIT0030
Petter S (CIT0094) 2007; 31
CIT0031
CIT0034
CIT0033
Awad NF (CIT0008) 2006; 30
Turkle S (CIT0127) 1995
Etzioni A (CIT0044) 1999
Chin WW (CIT0025) 1998
CIT0036
Gefen D (CIT0051) 2011; 35
CIT0035
CIT0038
CIT0037
Westin AF (CIT0133) 1967
CIT0039
Hui K-L (CIT0057) 2007; 31
Xu H (CIT0134) 2007
Son J-Y (CIT0113) 2008; 32
CIT0041
Festinger LA (CIT0047) 1957
CIT0040
Webster J (CIT0132) 2006; 30
CIT0042
Turkle S (CIT0128) 2011
Solove DJ (CIT0111) 2004
Tam KY (CIT0122) 2006; 30
Metzger MJ (CIT0083) 2004; 9
Bansal G (CIT0009) 2008
Bennett CJ (CIT0014) 1992
CIT0046
CIT0049
CIT0050
Swire PP (CIT0121) 1997
Bok S (CIT0015) 1989
CIT0056
Strite M (CIT0120) 2006; 30
Straub DW (CIT0119) 2004; 13
McLean D (CIT0082) 1995
Sternberg R (CIT0115) 2003
CIT0058
Tefft SK (CIT0124) 1980
CIT0061
CIT0060
Milne GR (CIT0087) 1993; 12
Brin D (CIT0016) 1998
CIT0062
CIT0065
CIT0064
CIT0067
CIT0100
CIT0066
Smith HJ (CIT0109) 2011; 35
Stone EF (CIT0117) 1990; 8
Rosen J (CIT0104) 2000
Young JB (CIT0137) 1978
Rensel AD (CIT0101) 2006; 7
CIT0069
CIT0102
CIT0068
CIT0105
Gefen D (CIT0052) 2000; 4
McElroy JC (CIT0079) 2007; 31
CIT0107
References_xml – volume: 51
  start-page: 1173
  year: 1986
  end-page: 1182
  ident: CR11
  article-title: The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.51.6.1173
– ident: CR22
– volume: 17
  start-page: 220
  issue: 3
  year: 2006
  end-page: 246
  ident: CR18
  article-title: Reconceptualizing system usage: An approach and empirical test
  publication-title: Information Systems Research
  doi: 10.1287/isre.1060.0096
– volume: 59
  start-page: 243
  issue: 2
  year: 2003
  end-page: 261
  ident: CR75
  article-title: Privacy as a social issue and behavioral concept
  publication-title: Journal of Social Issues
  doi: 10.1111/1540-4560.00063
– volume: 16
  start-page: 105
  issue: 2
  year: 2006
  end-page: 122
  ident: CR42
  article-title: Information privacy in the service sector: an exploratory study of health care and banking professionals
  publication-title: Journal of Organizational Computing and Electronic Commerce
  doi: 10.1207/s15327744joce1602_2
– volume: 9
  start-page: 50
  issue: 1
  year: 2010
  end-page: 60
  ident: CR56
  article-title: Privacy as information access and illusory control: the case of the facebook news feed privacy outcry
  publication-title: Electronic Commerce Research and Applications
  doi: 10.1016/j.elerap.2009.05.001
– year: 2002
  ident: CR27
  publication-title: Introduction in Criminological Theories – Bridging the Past to the Future
– volume: 12
  start-page: 798
  issue: 12
  year: 2011
  end-page: 824
  ident: CR135
  article-title: Information privacy concerns: linking individual perceptions with institutional privacy assurances
  publication-title: Journal of the Association for Information Systems
– start-page: 36
  year: 2006
  ident: CR2
  article-title: Imagined communities: awareness information sharing and privacy on the facebook
  publication-title: Proceedings of the 6th Privacy Enhancing Technologies Symposium
  doi: 10.1007/11957454_3
– volume: 20
  start-page: 313
  issue: 5
  year: 2004
  end-page: 324
  ident: CR13
  article-title: International differences in information privacy concerns: a global survey of consumers
  publication-title: Information Society
  doi: 10.1080/01972240490507956
– volume: 8
  start-page: 363
  issue: 5
  year: 2006
  end-page: 374
  ident: CR98
  article-title: An experimental economics approach toward quantifying online privacy choices
  publication-title: Information Systems Frontiers
  doi: 10.1007/s10796-006-9013-4
– volume: 33
  start-page: 445
  issue: 3
  year: 2009
  end-page: 471
  ident: CR17
  article-title: Minimizing method bias through programmatic research
  publication-title: MIS Quarterly
– volume: 15
  start-page: 336
  issue: 4
  year: 2004
  end-page: 355
  ident: CR71
  article-title: Internet users’ information privacy concerns (IUIPC): the construct the scale and a causal model
  publication-title: Information Systems Research
  doi: 10.1287/isre.1040.0032
– volume: 154
  start-page: 477
  issue: 3
  year: 2006
  end-page: 560
  ident: CR112
  article-title: Taxonomy of privacy
  publication-title: University of Pennsylvania Law Review
  doi: 10.2307/40041279
– volume: 40
  start-page: 92
  issue: 8
  year: 1997
  end-page: 100
  ident: CR102
  article-title: Privacy information technology and health care
  publication-title: Communications of the ACM
  doi: 10.1145/257874.257896
– volume: 11
  start-page: 245
  issue: 3–4
  year: 2002
  end-page: 270
  ident: CR12
  article-title: Trustworthiness in electronic commerce: the role of privacy security and site attributes
  publication-title: Journal of Strategic Information Systems
  doi: 10.1016/S0963-8687(02)00018-5
– volume: 35
  start-page: 989
  issue: 4
  year: 2011
  end-page: 1015
  ident: CR109
  article-title: Information privacy research: an interdisciplinary review
  publication-title: MIS Quarterly
– volume: 8
  start-page: 349
  issue: 3
  year: 1990
  end-page: 411
  ident: CR117
  article-title: Privacy in organizations: theoretical issues research findings and protection mechanisms
  publication-title: Research in Personnel and Human Resources Management
– year: 2007
  ident: CR134
  article-title: The effects of self-construal and perceived control on privacy concerns
  publication-title: Proceedings of the 28th Annual International Conference on Information Systems (ICIS)
– volume: 49
  start-page: 222
  issue: 2
  year: 2010
  end-page: 234
  ident: CR69
  article-title: Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2010.02.008
– volume: 10
  start-page: 7
  issue: 2
  year: 2005
  end-page: 29
  ident: CR36
  article-title: Internet privacy concerns and social awareness as determinants of intention to transact
  publication-title: International Journal of Electronic Commerce
  doi: 10.2753/JEC1086-4415100201
– volume: 33
  start-page: 52
  issue: 3
  year: 1977
  end-page: 65
  ident: CR61
  article-title: The concept privacy and its biological basis
  publication-title: Journal of Social Issues
  doi: 10.1111/j.1540-4560.1977.tb01882.x
– volume: 13
  start-page: 334
  issue: 3
  year: 2002
  end-page: 359
  ident: CR81
  article-title: Developing and validating trust measures for e-commerce: an integrative typology
  publication-title: Information Systems Research
  doi: 10.1287/isre.13.3.334.81
– start-page: 3
  year: 1974
  end-page: 28
  ident: CR5
  article-title: Privacy: a conceptual analysis
  publication-title: Man-Environment Interactions: Evaluations and Applications: Part 2
– volume: 13
  start-page: 5
  issue: 1
  year: 1999
  end-page: 24
  ident: CR86
  article-title: Trust and concern in consumers’ perceptions of marketing information management practices
  publication-title: Journal of Interactive Marketing
  doi: 10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
– volume: 21
  start-page: 119
  issue: 1
  year: 1994
  end-page: 134
  ident: CR41
  article-title: Model of perceived risk and intended risk-handling activity
  publication-title: Journal of Consumer Research
  doi: 10.1086/209386
– volume: 38
  start-page: 65
  issue: 12
  year: 1995
  end-page: 74
  ident: CR84
  article-title: Values personal information privacy concerns and regulatory approaches
  publication-title: Communication of the ACM
  doi: 10.1145/219663.219683
– start-page: 69
  year: 1982
  end-page: 102
  ident: CR80
  article-title: Dilemmatics: the study of research choices and dilemmas
  publication-title: Judgment Calls in Research
– volume: 24
  start-page: 665
  issue: 4
  year: 2000
  end-page: 694
  ident: CR3
  article-title: Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage
  publication-title: MIS Quarterly
  doi: 10.2307/3250951
– volume: 9
  start-page: 255
  issue: 3
  year: 1974
  end-page: 271
  ident: CR76
  article-title: Dimensions of privacy preferences
  publication-title: Multivariate Behavioral Research
  doi: 10.1207/s15327906mbr0903_1
– volume: 4
  start-page: 25
  issue: 3
  year: 2007
  end-page: 61
  ident: CR38
  article-title: Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use
  publication-title: E-Service Journal
  doi: 10.2979/ESJ.2006.4.3.25
– start-page: 21
  year: 2004
  ident: CR1
  article-title: Privacy in electronic commerce and the economics of immediate gratification
  publication-title: Proceedings of the 5th ACM Electronic Commerce Conference
  doi: 10.1145/988772.988777
– volume: 4
  start-page: 193
  issue: 5
  year: 1890
  end-page: 220
  ident: CR131
  article-title: The right to privacy
  publication-title: Harvard Law Review
  doi: 10.2307/1321160
– volume: 31
  start-page: 623
  issue: 4
  year: 2007
  end-page: 656
  ident: CR94
  article-title: Specifying formative constructs in information systems research
  publication-title: MIS Quarterly
– year: 1957
  ident: CR47
  publication-title: Theory of Cognitive Dissonance
– year: 1979
  ident: CR48
  publication-title: Privacy and Government Data Banks: An International Perspective
– volume: 11
  start-page: 35
  issue: 1
  year: 2000
  end-page: 57
  ident: CR85
  article-title: Information privacy: corporate management and national regulation
  publication-title: Organization Science
  doi: 10.1287/orsc.11.1.35.12567
– volume: 26
  start-page: 135
  issue: 3
  year: 2010
  end-page: 174
  ident: CR136
  article-title: The role of push-pull technology in privacy calculus: the case of location-based services
  publication-title: Journal of Management Information Systems
  doi: 10.2753/MIS0742-1222260305
– volume: 19
  start-page: 62
  issue: 1
  year: 2000
  end-page: 73
  ident: CR107
  article-title: Dimensions of privacy concern among online consumers
  publication-title: Journal of Public Policy and Marketing
  doi: 10.1509/jppm.19.1.62.16949
– volume: 15
  start-page: 389
  issue: 4
  year: 2006
  end-page: 402
  ident: CR39
  article-title: Privacy calculus model in e-commerce – a study of Italy and the United States
  publication-title: European Journal of Information Systems
  doi: 10.1057/palgrave.ejis.3000590
– volume: 3
  start-page: 149
  issue: 2
  year: 2003
  end-page: 183
  ident: CR62
  article-title: Privacy through pseudonymity in user-adaptive systems
  publication-title: ACM Transactions on Internet Technology
  doi: 10.1145/767193.767196
– volume: 17
  start-page: 214
  issue: 3
  year: 2008
  end-page: 233
  ident: CR40
  article-title: Internet privacy concerns and beliefs about government surveillance – an empirical investigation
  publication-title: Journal of Strategic Information Systems
  doi: 10.1016/j.jsis.2007.09.002
– volume: 30
  start-page: 679
  issue: 3
  year: 2006
  end-page: 704
  ident: CR120
  article-title: The role of espoused national cultural values in technology acceptance
  publication-title: MIS Quarterly
– start-page: 147
  year: 2001
  ident: CR23
  article-title: Contrasting expert assessment of privacy with perceived privacy: implications for public policy
  publication-title: Proceedings of the National Conference on Digital Government Research
– volume: 13
  start-page: 380
  issue: 1
  year: 2004
  end-page: 427
  ident: CR119
  article-title: Validation guidelines for IS positivist research
  publication-title: Communications of AIS
– volume: 31
  start-page: 19
  issue: 1
  year: 2007
  end-page: 33
  ident: CR57
  article-title: The value of privacy assurance: an exploratory field experiment
  publication-title: MIS Quarterly
– volume: 15
  start-page: 141
  issue: 2
  year: 1999
  end-page: 144
  ident: CR89
  article-title: The meaning of anonymity in an information age
  publication-title: The Information Society
  doi: 10.1080/019722499128592
– year: 2005
  ident: CR114
  article-title: Perceived control: scales for privacy in ubiquitous computing environments
  publication-title: Proceedings of the 10th International Conference on User Modeling
– year: 1989
  ident: CR15
  publication-title: Secrets: On the Ethics of Concealment and Revelation
– volume: 10
  start-page: 149
  issue: 1
  year: 1991
  end-page: 166
  ident: CR54
  article-title: Privacy: recognition of a consumer right
  publication-title: Journal of Public Policy and Marketing
– year: 2008
  ident: CR9
  article-title: The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation
  publication-title: Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008)
– volume: 65
  start-page: 623
  issue: 5
  year: 1980
  end-page: 626
  ident: CR50
  article-title: Variables affecting perceptions of invasion of privacy in a personnel selection situation
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.65.5.623
– ident: CR103
– year: 2004
  ident: CR111
  publication-title: The Digital Person: Technology and Privacy in the Information Age
– volume: 88
  start-page: 879
  issue: 5
  year: 2003
  end-page: 903
  ident: CR97
  article-title: Common method biases in behavioral research: a critical review of the literature and recommended remedies
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.88.5.879
– volume: 32
  start-page: 503
  issue: 3
  year: 2008
  end-page: 529
  ident: CR113
  article-title: Internet users’ information privacy-protective responses: a taxonomy and a nomological model
  publication-title: MIS Quarterly
– volume: 15
  start-page: 71
  issue: 2
  year: 1999
  end-page: 77
  ident: CR125
  article-title: Anonymous communication policies for the Internet: results and recommendations of the AAAS conference
  publication-title: Information Society
  doi: 10.1080/019722499128538
– volume: 14
  start-page: 396
  issue: 3
  year: 1977
  end-page: 402
  ident: CR7
  article-title: Estimating non-response bias in mail surveys
  publication-title: Journal of Marketing Research
  doi: 10.2307/3150783
– year: 2011
  ident: CR128
  publication-title: Alone Together: Why We Expect More from Technology and Less from Each Other
– volume: 59
  start-page: 411
  issue: 2
  year: 2003
  end-page: 429
  ident: CR74
  article-title: On the status and contribution of Westin's and Altman's theories of privacy
  publication-title: Journal of Social Issues
  doi: 10.1111/1540-4560.00071
– volume: 51
  start-page: 434
  issue: 3
  year: 2011
  end-page: 445
  ident: CR66
  article-title: The role of affect and cognition on online consumers’ willingness to disclose personal information
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2011.01.017
– volume: 27
  start-page: 629
  issue: 4
  year: 1999
  end-page: 637
  ident: CR28
  article-title: Psychometric properties and confirmatory factor analysis of the self-concealment scale
  publication-title: Personality and Individual Differences
  doi: 10.1016/S0191-8869(98)00222-0
– volume: 23
  start-page: 413
  issue: 6
  year: 2004
  end-page: 423
  ident: CR35
  article-title: Internet privacy concerns and their antecedents – measurement validity and a regression model
  publication-title: Behavior and Information Technology
  doi: 10.1080/01449290410001715723
– year: 2001
  ident: CR4
  publication-title: Criminological Theories: Introduction, Evaluations, and Application
– ident: CR24
– year: 2000
  ident: CR104
  publication-title: The Unwanted Gaze: The Destruction of Privacy in America
– volume: 33
  start-page: 5
  issue: 3
  year: 1977
  end-page: 21
  ident: CR73
  article-title: Conceptions of privacy: current status and next steps
  publication-title: Journal of Social Issues
  doi: 10.1111/j.1540-4560.1977.tb01879.x
– start-page: 295
  year: 1998
  end-page: 336
  ident: CR25
  article-title: The partial least squares approach to structural equation modeling
  publication-title: Modern Methods for Business Research
– volume: 59
  start-page: 451
  issue: 4
  year: 2003
  end-page: 474
  ident: CR46
  article-title: Predicting e-services adoption: a perceived risk facets perspective
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/S1071-5819(03)00111-3
– ident: CR70
– volume: 42
  start-page: 289
  issue: 2
  year: 2005
  end-page: 304
  ident: CR68
  article-title: Beyond concern – a privacy-trust-behavioral intention model of electronic commerce
  publication-title: Information & Management
  doi: 10.1016/j.im.2004.01.003
– year: 2002
  ident: CR93
  publication-title: Boundaries of Privacy: Dialectics of Disclosure
– volume: 31
  start-page: 809
  issue: 4
  year: 2007
  end-page: 820
  ident: CR79
  article-title: Dispositional factors in internet use: personality versus cognitive style
  publication-title: MIS Quarterly
– volume: 15
  start-page: 99
  issue: 2
  year: 1999
  end-page: 112
  ident: CR77
  article-title: What's in a name? Some reflections on the sociology of anonymity
  publication-title: Information Society
  doi: 10.1080/019722499128565
– year: 2003
  ident: CR115
  publication-title: Cognitive Psychology
– year: 1994
  ident: CR108
  publication-title: Managing Privacy: Information Technology and Corporate America
– volume: 10
  start-page: 4
  issue: 1
  year: 1986
  end-page: 12
  ident: CR78
  article-title: Four ethical issues of the information age
  publication-title: MIS Quarterly
  doi: 10.2307/248873
– year: 1998
  ident: CR16
  publication-title: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?
– volume: 24
  start-page: 31
  issue: 1
  year: 2004
  end-page: 43
  ident: CR138
  article-title: Whose identity is it anyway? Consumer representation in the age of database marketing
  publication-title: Journal of Macromarketing
  doi: 10.1177/0276146704263920
– volume: 52
  start-page: 1865
  issue: 12
  year: 2006
  end-page: 1883
  ident: CR72
  article-title: Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research
  publication-title: Management Science
  doi: 10.1287/mnsc.1060.0597
– volume: 14
  start-page: 33
  issue: 4
  year: 2001
  ident: CR33
  article-title: Internet privacy: interpreting key issues
  publication-title: Information Resources Management Journal
  doi: 10.4018/irmj.2001100104
– volume: 59
  start-page: 323
  issue: 2
  year: 2003
  end-page: 342
  ident: CR31
  article-title: Consumer privacy: balancing economic and justice considerations
  publication-title: Journal of Social Issues
  doi: 10.1111/1540-4560.00067
– year: 1978
  ident: CR90
  publication-title: Psychometric Theory
– year: 1999
  ident: CR44
  publication-title: The Limits of Privacy
– year: 2005
  ident: CR55
  article-title: Information revelation and privacy in online social networks
  publication-title: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
– volume: 26
  start-page: 1120
  issue: 5
  year: 2010
  end-page: 1127
  ident: CR49
  article-title: When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2010.03.016
– volume: 12
  start-page: 1428
  issue: 4
  year: 2007
  end-page: 1451
  ident: CR99
  article-title: Anonymity and self-disclosure on weblogs
  publication-title: Journal of Computer-Mediated Communication
  doi: 10.1111/j.1083-6101.2007.00380.x
– volume: 33
  start-page: 22
  issue: 3
  year: 1977
  end-page: 42
  ident: CR65
  article-title: Privacy as a concept and a social issue – multidimensional developmental theory
  publication-title: Journal of Social Issues
  doi: 10.1111/j.1540-4560.1977.tb01880.x
– volume: 56
  start-page: 81
  issue: 2
  year: 1959
  end-page: 105
  ident: CR20
  article-title: Convergent and discriminant validation by the multitrait-multimethod matrix
  publication-title: Psychological Bulletin
  doi: 10.1037/h0046016
– volume: 10
  start-page: 104
  issue: 1
  year: 1999
  end-page: 115
  ident: CR30
  article-title: Information privacy concerns procedural fairness and impersonal trust: an empirical investigation
  publication-title: Organization Science
  doi: 10.1287/orsc.10.1.104
– volume: 25
  start-page: 109
  issue: 2
  year: 2009
  end-page: 125
  ident: CR64
  article-title: Online social networks: why we disclose
  publication-title: Journal of Information Technology
  doi: 10.1057/jit.2010.6
– volume: 30
  start-page: 941
  issue: 4
  year: 2006
  end-page: 960
  ident: CR63
  article-title: The effects of personalization and familiarity on trust in and adoption of recommendation agents
  publication-title: MIS Quarterly
– volume: 7
  start-page: 19
  issue: 1
  year: 2006
  end-page: 50
  ident: CR101
  article-title: Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use
  publication-title: Journal of the Association for Information Systems
– volume: 49
  start-page: 138
  issue: 2
  year: 2010
  end-page: 150
  ident: CR10
  article-title: The impact of personal dispositions on information sensitivity privacy concern and trust in disclosing health information online
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2010.01.010
– volume: 46
  start-page: 74
  issue: 9
  year: 2003
  end-page: 79
  ident: CR34
  article-title: Security and privacy issues of handheld and wearable wireless devices
  publication-title: Communications of the ACM
  doi: 10.1145/903893.903897
– volume: 12
  start-page: 206
  issue: 2
  year: 1993
  end-page: 215
  ident: CR87
  article-title: Direct mail privacy-efficiency trade-offs within an implied social contract framework
  publication-title: Journal of Public Policy and Marketing
– volume: 3
  start-page: 1
  issue: 1
  year: 2011
  end-page: 25
  ident: CR45
  article-title: The Influence of interactivity on e-service offerings: an empirical examination of benefits and risks
  publication-title: AIS Transactions on Human-Computer Interaction
– volume: 30
  start-page: 455
  issue: 4
  year: 2002
  end-page: 464
  ident: CR105
  article-title: The customer economics of internet privacy
  publication-title: Journal of the Academy of Marketing Science
  doi: 10.1177/009207002236917
– volume: 30
  start-page: 661
  issue: 3
  year: 2006
  end-page: 678
  ident: CR132
  article-title: Enhancing the design of Web navigation systems: the influence of user disorientation on engagement and performance
  publication-title: MIS Quarterly
– start-page: 3
  year: 1997
  end-page: 19
  ident: CR121
  article-title: Markets self-regulation and government enforcement in the protection of personal information
  publication-title: Privacy and Self-Regulation in the Information Age
– volume: 15
  start-page: 249
  issue: 4
  year: 1999
  end-page: 256
  ident: CR19
  article-title: Web security and privacy: an American perspective
  publication-title: Information Society
  doi: 10.1080/019722499128411
– volume: 17
  start-page: 341
  issue: 3
  year: 1993
  end-page: 363
  ident: CR29
  article-title: ‘How did they get my name’? An exploratory investigation of consumer attitudes toward secondary information use
  publication-title: MIS Quarterly
  doi: 10.2307/249775
– year: 1997
  ident: CR21
  publication-title: Privacy in the Information Age
– volume: 35
  start-page: iii
  issue: 2
  year: 2011
  end-page: xiv
  ident: CR51
  article-title: An update and extension to SEM guidelines for administrative and social science research
  publication-title: MIS Quarterly
– ident: CR95
– volume: 20
  start-page: 167
  issue: 2
  year: 1996
  end-page: 196
  ident: CR110
  article-title: Information privacy: measuring individuals’ concerns about organizational practices
  publication-title: MIS Quarterly
  doi: 10.2307/249477
– ident: CR43
– year: 2007
  ident: CR130
  publication-title: Engaging Privacy and Information Technology in a Digital Age
– volume: 31
  start-page: 498
  issue: 5
  year: 1988
  end-page: 512
  ident: CR26
  article-title: Information technology and dataveillance
  publication-title: Communications of the ACM
  doi: 10.1145/42411.42413
– ident: CR53
– year: 1984
  ident: CR106
  publication-title: Philosophical Dimensions of Privacy: An Anthology
  doi: 10.1017/CBO9780511625138
– volume: 66
  start-page: 308
  issue: 3
  year: 1981
  end-page: 313
  ident: CR126
  article-title: Employee perceptions of invasion of privacy: a field simulation experiment
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.66.3.308
– year: 1978
  ident: CR137
  publication-title: Privacy
– volume: 18
  start-page: 454
  issue: 4
  year: 2007
  end-page: 470
  ident: CR58
  article-title: Investigating the influence of the functional mechanisms of online product presentations
  publication-title: Information Systems Research
  doi: 10.1287/isre.1070.0124
– volume: 12
  start-page: 248
  issue: 2
  year: 1973
  end-page: 261
  ident: CR60
  article-title: A social-psychological examination of privacy
  publication-title: British Journal of Social Clinical Psychology
  doi: 10.1111/j.2044-8260.1973.tb00065.x
– year: 1995
  ident: CR82
  publication-title: Privacy and Its Invasion
– volume: 9
  start-page: 114
  issue: 4
  year: 2004
  end-page: 121
  ident: CR83
  article-title: Privacy, trust, and disclosure: Exploring barriers to electronic commerce
  publication-title: Journal of Computer-Mediated Communication
– volume: 35
  start-page: 91
  issue: 1
  year: 1985
  end-page: 103
  ident: CR129
  article-title: Concern for personal privacy in an electronic age
  publication-title: Journal of Communication
  doi: 10.1111/j.1460-2466.1985.tb02236.x
– volume: 86
  start-page: 114
  issue: 1
  year: 2001
  end-page: 121
  ident: CR67
  article-title: Accounting for common method variance in cross-sectional research designs
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.86.1.114
– volume: 14
  start-page: 263
  issue: 4
  year: 1998
  end-page: 274
  ident: CR100
  article-title: The distribution of privacy risks: who needs protection?
  publication-title: Information Society
  doi: 10.1080/019722498128719
– year: 1995
  ident: CR127
  publication-title: Life on the Screen: Identity in the Age of the Internet
– volume: 30
  start-page: 13
  issue: 1
  year: 2006
  end-page: 28
  ident: CR8
  article-title: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization
  publication-title: MIS Quarterly
– volume: 38
  start-page: 54
  issue: 2
  year: 1974
  end-page: 60
  ident: CR123
  article-title: The role of risk in consumer behavior
  publication-title: Journal of Marketing
  doi: 10.2307/1250198
– volume: 11
  start-page: 215
  issue: 3–4
  year: 2002
  end-page: 243
  ident: CR91
  article-title: Institution-based trust in inter organizational exchange relationships: the role of online B2B marketplaces on trust formation
  publication-title: Journal of Strategic Information Systems
  doi: 10.1016/S0963-8687(02)00017-3
– volume: 57
  start-page: 81
  issue: 1
  year: 1993
  end-page: 101
  ident: CR88
  article-title: Factors affecting trust in market research relationships
  publication-title: Journal of Marketing
  doi: 10.2307/1252059
– volume: 19
  start-page: 27
  issue: 1
  year: 2000
  end-page: 41
  ident: CR96
  article-title: Privacy concerns and consumer willingness to provide personal information
  publication-title: Journal of Public Policy and Marketing
  doi: 10.1509/jppm.19.1.27.16941
– year: 1975
  ident: CR6
  publication-title: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding
– volume: 68
  start-page: 459
  issue: 3
  year: 1983
  end-page: 468
  ident: CR118
  article-title: Field experiment comparing information-privacy values beliefs and attitudes across several types of organizations
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.68.3.459
– year: 1980
  ident: CR124
  publication-title: Secrecy a Cross-Cultural Perspective
– year: 1967
  ident: CR133
  publication-title: Privacy and Freedom
– volume: 7
  start-page: 1
  issue: 5
  year: 2001
  end-page: 41
  ident: CR32
  article-title: Conducting research in information systems
  publication-title: Communications of the AIS
– volume: 17
  start-page: 147
  issue: 2
  year: 1997
  end-page: 156
  ident: CR92
  article-title: Psychological Functions of Privacy
  publication-title: Journal of Environmental Psychology
  doi: 10.1006/jevp.1997.0049
– volume: 13
  start-page: 36
  issue: 1
  year: 2002
  end-page: 49
  ident: CR116
  article-title: An empirical examination of the concern for information privacy instrument
  publication-title: Information Systems Research
  doi: 10.1287/isre.13.1.36.97
– volume: 17
  start-page: 61
  issue: 1
  year: 2006
  end-page: 80
  ident: CR37
  article-title: An extended privacy calculus model for e-commerce transactions
  publication-title: Information Systems Research
  doi: 10.1287/isre.1060.0080
– volume: 4
  start-page: 1
  issue: 1
  year: 2000
  end-page: 78
  ident: CR52
  article-title: Structural equation modeling and regression: guidelines for research practice
  publication-title: Communications of AIS
– volume: 31
  start-page: 475
  issue: 3
  year: 2007
  end-page: 500
  ident: CR59
  article-title: The effects of presentation methods and task complexity on online consumers’ product understanding
  publication-title: MIS Quarterly
– volume: 30
  start-page: 865
  issue: 4
  year: 2006
  end-page: 890
  ident: CR122
  article-title: Understanding the impact of web personalization on user information processing behavior and judgment
  publication-title: MIS Quarterly
– year: 1992
  ident: CR14
  publication-title: Regulating Privacy: Data Protection and Public Policy in Europe and the United States
– volume: 30
  start-page: 941
  issue: 4
  year: 2006
  ident: CIT0063
  publication-title: MIS Quarterly
  doi: 10.2307/25148760
– volume: 8
  start-page: 349
  issue: 3
  year: 1990
  ident: CIT0117
  publication-title: Research in Personnel and Human Resources Management
– ident: CIT0118
  doi: 10.1037/0021-9010.68.3.459
– volume: 7
  start-page: 19
  issue: 1
  year: 2006
  ident: CIT0101
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00077
– ident: CIT0084
  doi: 10.1145/219663.219683
– ident: CIT0073
  doi: 10.1111/j.1540-4560.1977.tb01879.x
– ident: CIT0100
  doi: 10.1080/019722498128719
– ident: CIT0013
  doi: 10.1080/01972240490507956
– ident: CIT0036
  doi: 10.2753/JEC1086-4415100201
– volume-title: Boundaries of Privacy: Dialectics of Disclosure
  year: 2002
  ident: CIT0093
  doi: 10.1353/book4588
– volume-title: Privacy and Freedom
  year: 1967
  ident: CIT0133
– ident: CIT0112
  doi: 10.2307/40041279
– volume: 30
  start-page: 13
  issue: 1
  year: 2006
  ident: CIT0008
  publication-title: MIS Quarterly
  doi: 10.2307/25148715
– volume-title: Cognitive Psychology
  year: 2003
  ident: CIT0115
– ident: CIT0081
  doi: 10.1287/isre.13.3.334.81
– ident: CIT0028
  doi: 10.1016/S0191-8869(98)00222-0
– volume: 30
  start-page: 865
  issue: 4
  year: 2006
  ident: CIT0122
  publication-title: MIS Quarterly
  doi: 10.2307/25148757
– ident: CIT0046
  doi: 10.1016/S1071-5819(03)00111-3
– volume: 10
  start-page: 149
  issue: 1
  year: 1991
  ident: CIT0054
  publication-title: Journal of Public Policy and Marketing
  doi: 10.1177/074391569101000111
– volume: 12
  start-page: 798
  issue: 12
  year: 2011
  ident: CIT0135
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00281
– volume-title: Introduction in Criminological Theories – Bridging the Past to the Future
  year: 2002
  ident: CIT0027
– ident: CIT0034
  doi: 10.1145/903893.903897
– ident: CIT0078
  doi: 10.2307/248873
– ident: CIT0050
  doi: 10.1037/0021-9010.65.5.623
– start-page: 3
  volume-title: Privacy and Self-Regulation in the Information Age
  year: 1997
  ident: CIT0121
– volume: 35
  start-page: 989
  issue: 4
  year: 2011
  ident: CIT0109
  publication-title: MIS Quarterly
  doi: 10.2307/41409970
– start-page: 36
  volume-title: Proceedings of the 6th Privacy Enhancing Technologies Symposium
  year: 2006
  ident: CIT0002
  doi: 10.1007/11957454_3
– ident: CIT0033
  doi: 10.4018/irmj.2001100104
– ident: CIT0138
  doi: 10.1177/0276146704263920
– volume-title: Secrecy a Cross-Cultural Perspective
  year: 1980
  ident: CIT0124
– ident: CIT0060
  doi: 10.1111/j.2044-8260.1973.tb00065.x
– ident: CIT0131
  doi: 10.2307/1321160
– ident: CIT0077
  doi: 10.1080/019722499128565
– ident: CIT0042
  doi: 10.1207/s15327744joce1602_2
– ident: CIT0067
  doi: 10.1037/0021-9010.86.1.114
– ident: CIT0107
  doi: 10.1509/jppm.19.1.62.16949
– start-page: 295
  volume-title: Modern Methods for Business Research
  year: 1998
  ident: CIT0025
– volume-title: Privacy and Government Data Banks: An International Perspective
  year: 1979
  ident: CIT0048
– ident: CIT0062
  doi: 10.1145/767193.767196
– ident: CIT0092
  doi: 10.1006/jevp.1997.0049
– ident: CIT0020
  doi: 10.1037/h0046016
– ident: CIT0088
  doi: 10.2307/1252059
– volume-title: Proceedings of the 10th International Conference on User Modeling
  year: 2005
  ident: CIT0114
– ident: CIT0098
  doi: 10.1007/s10796-006-9013-4
– ident: CIT0041
  doi: 10.1086/209386
– ident: CIT0072
  doi: 10.1287/mnsc.1060.0597
– ident: CIT0049
  doi: 10.1016/j.chb.2010.03.016
– ident: CIT0089
  doi: 10.1080/019722499128592
– volume-title: Managing Privacy: Information Technology and Corporate America
  year: 1994
  ident: CIT0108
– ident: CIT0105
  doi: 10.1177/009207002236917
– ident: CIT0086
  doi: 10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
– volume-title: Alone Together: Why We Expect More from Technology and Less from Each Other
  year: 2011
  ident: CIT0128
– ident: CIT0010
  doi: 10.1016/j.dss.2010.01.010
– volume-title: Philosophical Dimensions of Privacy: An Anthology
  year: 1984
  ident: CIT0106
  doi: 10.1017/CBO9780511625138
– ident: CIT0068
  doi: 10.1016/j.im.2004.01.003
– ident: CIT0003
  doi: 10.2307/3250951
– ident: CIT0136
  doi: 10.2753/MIS0742-1222260305
– volume-title: Privacy
  year: 1978
  ident: CIT0137
– ident: CIT0012
  doi: 10.1016/S0963-8687(02)00018-5
– ident: CIT0085
  doi: 10.1287/orsc.11.1.35.12567
– ident: CIT0091
  doi: 10.1016/S0963-8687(02)00017-3
– ident: CIT0030
  doi: 10.1287/orsc.10.1.104
– ident: CIT0040
  doi: 10.1016/j.jsis.2007.09.002
– volume: 31
  start-page: 623
  issue: 4
  year: 2007
  ident: CIT0094
  publication-title: MIS Quarterly
  doi: 10.2307/25148814
– ident: CIT0058
  doi: 10.1287/isre.1070.0124
– volume-title: Criminological Theories: Introduction, Evaluations, and Application
  year: 2001
  ident: CIT0004
– volume-title: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding
  year: 1975
  ident: CIT0006
– volume-title: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
  year: 2005
  ident: CIT0055
– ident: CIT0018
  doi: 10.1287/isre.1060.0096
– ident: CIT0035
  doi: 10.1080/01449290410001715723
– ident: CIT0031
  doi: 10.1111/1540-4560.00067
– ident: CIT0071
  doi: 10.1287/isre.1040.0032
– ident: CIT0096
  doi: 10.1509/jppm.19.1.27.16941
– ident: CIT0097
  doi: 10.1037/0021-9010.88.5.879
– start-page: 3
  volume-title: Man-Environment Interactions: Evaluations and Applications: Part 2
  year: 1974
  ident: CIT0005
– ident: CIT0102
  doi: 10.1145/257874.257896
– volume: 9
  start-page: 114
  issue: 4
  year: 2004
  ident: CIT0083
  publication-title: Journal of Computer-Mediated Communication
– ident: CIT0126
  doi: 10.1037/0021-9010.66.3.308
– volume: 30
  start-page: 679
  issue: 3
  year: 2006
  ident: CIT0120
  publication-title: MIS Quarterly
  doi: 10.2307/25148745
– ident: CIT0123
  doi: 10.2307/1250198
– volume: 33
  start-page: 445
  issue: 3
  year: 2009
  ident: CIT0017
  publication-title: MIS Quarterly
  doi: 10.2307/20650304
– volume: 30
  start-page: 661
  issue: 3
  year: 2006
  ident: CIT0132
  publication-title: MIS Quarterly
  doi: 10.2307/25148744
– volume-title: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?
  year: 1998
  ident: CIT0016
– ident: CIT0076
  doi: 10.1207/s15327906mbr0903_1
– volume-title: Privacy and Its Invasion
  year: 1995
  ident: CIT0082
  doi: 10.5040/9798216001362
– ident: CIT0129
  doi: 10.1111/j.1460-2466.1985.tb02236.x
– volume-title: Engaging Privacy and Information Technology in a Digital Age
  year: 2007
  ident: CIT0130
– volume-title: Proceedings of the 28th Annual International Conference on Information Systems (ICIS)
  year: 2007
  ident: CIT0134
– volume-title: Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008)
  year: 2008
  ident: CIT0009
– volume-title: Theory of Cognitive Dissonance
  year: 1957
  ident: CIT0047
  doi: 10.1515/9781503620766
– volume-title: Privacy in the Information Age
  year: 1997
  ident: CIT0021
– volume: 12
  start-page: 206
  issue: 2
  year: 1993
  ident: CIT0087
  publication-title: Journal of Public Policy and Marketing
  doi: 10.1177/074391569101200206
– ident: CIT0075
  doi: 10.1111/1540-4560.00063
– volume: 32
  start-page: 503
  issue: 3
  year: 2008
  ident: CIT0113
  publication-title: MIS Quarterly
  doi: 10.2307/25148854
– ident: CIT0125
  doi: 10.1080/019722499128538
– ident: CIT0099
  doi: 10.1111/j.1083-6101.2007.00380.x
– ident: CIT0037
  doi: 10.1287/isre.1060.0080
– volume: 4
  start-page: 1
  issue: 1
  year: 2000
  ident: CIT0052
  publication-title: Communications of AIS
– ident: CIT0110
  doi: 10.2307/249477
– volume: 31
  start-page: 475
  issue: 3
  year: 2007
  ident: CIT0059
  publication-title: MIS Quarterly
  doi: 10.2307/25148804
– ident: CIT0074
  doi: 10.1111/1540-4560.00071
– ident: CIT0038
  doi: 10.2979/ESJ.2006.4.3.25
– volume: 35
  start-page: iii
  issue: 2
  year: 2011
  ident: CIT0051
  publication-title: MIS Quarterly
  doi: 10.2307/23044042
– volume-title: Regulating Privacy: Data Protection and Public Policy in Europe and the United States
  year: 1992
  ident: CIT0014
  doi: 10.7591/9781501722134
– volume-title: The Unwanted Gaze: The Destruction of Privacy in America
  year: 2000
  ident: CIT0104
– ident: CIT0007
  doi: 10.2307/3150783
– ident: CIT0065
  doi: 10.1111/j.1540-4560.1977.tb01880.x
– start-page: 69
  volume-title: Judgment Calls in Research
  year: 1982
  ident: CIT0080
– ident: CIT0026
  doi: 10.1145/42411.42413
– ident: CIT0029
  doi: 10.2307/249775
– ident: CIT0069
  doi: 10.1016/j.dss.2010.02.008
– ident: CIT0066
  doi: 10.1016/j.dss.2011.01.017
– ident: CIT0116
  doi: 10.1287/isre.13.1.36.97
– volume: 13
  start-page: 380
  issue: 1
  year: 2004
  ident: CIT0119
  publication-title: Communications of AIS
– start-page: 147
  volume-title: Proceedings of the National Conference on Digital Government Research
  year: 2001
  ident: CIT0023
– volume-title: The Digital Person: Technology and Privacy in the Information Age
  year: 2004
  ident: CIT0111
– ident: CIT0011
  doi: 10.1037/0022-3514.51.6.1173
– volume: 7
  start-page: 1
  issue: 5
  year: 2001
  ident: CIT0032
  publication-title: Communications of the AIS
– ident: CIT0064
  doi: 10.1057/jit.2010.6
– volume-title: Secrets: On the Ethics of Concealment and Revelation
  year: 1989
  ident: CIT0015
– volume-title: Life on the Screen: Identity in the Age of the Internet
  year: 1995
  ident: CIT0127
– ident: CIT0061
  doi: 10.1111/j.1540-4560.1977.tb01882.x
– volume: 31
  start-page: 19
  issue: 1
  year: 2007
  ident: CIT0057
  publication-title: MIS Quarterly
  doi: 10.2307/25148779
– volume: 3
  start-page: 1
  issue: 1
  year: 2011
  ident: CIT0045
  publication-title: AIS Transactions on Human-Computer Interaction
  doi: 10.17705/1thci.00024
– ident: CIT0019
  doi: 10.1080/019722499128411
– volume: 31
  start-page: 809
  issue: 4
  year: 2007
  ident: CIT0079
  publication-title: MIS Quarterly
  doi: 10.2307/25148821
– volume-title: Psychometric Theory
  year: 1978
  ident: CIT0090
– volume-title: The Limits of Privacy
  year: 1999
  ident: CIT0044
– ident: CIT0056
  doi: 10.1016/j.elerap.2009.05.001
– start-page: 21
  volume-title: Proceedings of the 5th ACM Electronic Commerce Conference
  year: 2004
  ident: CIT0001
  doi: 10.1145/988772.988777
– ident: CIT0039
  doi: 10.1057/palgrave.ejis.3000590
SSID ssj0020941
Score 2.518145
Snippet Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is...
SourceID proquest
crossref
springer
informaworld
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 295
SubjectTerms Anonymity
Business and Management
Business Information Systems
confidentiality
control
Efficient markets
Information control
Information systems
Information Systems and Communication Service
Information theory
Innovation/Technology Management
Literature reviews
Management information systems
Marketing
Operations Research/Decision Theory
Politics
Privacy
Research Article
risk
secrecy
Studies
Subject fields
Title Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
URI https://www.tandfonline.com/doi/abs/10.1057/ejis.2012.23
https://link.springer.com/article/10.1057/ejis.2012.23
https://www.proquest.com/docview/1325908519
https://www.proquest.com/docview/1622284665
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bT9swFD4a8DIeJmCbKAPkSRsvk0caJ26ylwkQHZoEm6Yh9c2KL2EdkHZrisS_5xzHKS0CHp34IvnYx9_x5fsAPuhc40LuBCciFp6g_-N55DQXssD1OzU29mQ6p2fy5Dz5PkgHYcNtEq5Vtj7RO2o7MrRHvo9RE8lzI-D4Ov7HSTWKTleDhMYSrKALzjD4Wjk8Pvv5axZyYfDiNfMQp3MsPAhX3xGk7Lu_Q6Lr7safY7GwKC1Qli4AzwdnpX4J6q_Bq4Ad2UFj7HV44aoNWJ1jFNyAnfAOge2x8NCIOp6FGfwaLue_YjM3hbllRWWZIZWOKwKeXzDN3PV46MlDGPFvXo9rVo9Y87jLZ7fkGqqL6XDyp62GN-WpKv8ScvIGzvvHv49OeNBb4Eb0sppr64TTtsAEhhkyyaTfH-omzmW5xq-RzVyKhjWlSVKdI9bJZNGVJpcagU4h3sJyNarcJrDIJkb3jBBWl4nEAaFtVqa6VzihS2GiDnxqO1yZQEZOmhhXyh-Kpz1F5lFkHhWLDnyc5R43JBxP5Ivmbadqv-lRNgolSjxeZLu1rwqzd6Lux1oH3s9-47yjw5SicqMp5pHUN4mUaQf22nExV8UjbW0939Y7eBl7rQ26TbkNy_X_qdtBxFPrXVjK-t92w-DG1Gn3xx1_UATL
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcoAeUCkgFlowEu0FmWZjx5sgIYSAZUsfp1bam4kfoQttdmGzoP6p_kZmnGTZRYVbj0kcO8qM52F7vg_guckMOnIvOAGxcIn2j2eRN1yoHP13Yl0cwHQOj9TgRH4aJsMVuGxrYehYZWsTg6F2Y0tr5LuYNRE9NwYcbybfObFG0e5qS6FRq8W-v_iFKdv09d57lO92HPc_HL8b8IZVgFvRSytunBfeuBwvMJhWMlVhFaQrvU8zg3cjl_oEP98WViYmQ4-eqryrbKYMuvNcYL834KYUIqMZlfY_zhM8TJUCQx9mBRw_ddgctMeQaNd_HRE4eDd-GYslF7gEkLoU5v61MxscXn8d7jSRKntbq9ZdWPHlBqwt4BduwFZT9cB2WFPWRGJmjb24B98W7-IwP3N7wfLSMUucIGcU5r7Ca-bPJ6MAVcII7fN8UrFqzOpSstDckSEqv8xG09O2G16_T12FusvpfTi5Fjk8gNVyXPqHwCInrelZIZwppEL1My4tEtPLvTCFsFEHXrQ_XNsG-pwYOM502IJPeprEo0k8OhYd2J63ntSQH_9oFy3KTldhiaWo-VC0uPqVzVa-urEVU_1HszvwbP4YZzlt3eSlH8-wjaJ_I5VKOrDT6sVCF1eM9ej_Yz2FW4PjwwN9sHe0_xhux4Hlg85xbsJq9WPmtzDWqsyToOAMPl_3jPoNXrU9hQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VIiE48CggAi0sEu0FbeJ47Y2NhBCiRC2lhQOVctt6H6bpwwnEAZWfxl_hzzCztkNSFW49cLSzXieTb-exO_MNwDOdajTkTnAiYuER6j-eBk5zITO037GxoSfT2d2TW_vRu0E8WIKfTS0MpVU2OtErajsytEfewaiJ2nOjw9HJ67SIj5v9V-MvnDpI0Ulr006jgsiOO_uO4dvk5fYm_tfrYdh_--nNFq87DHAjeknJtXXCaZvhBTrWMkqk3xHpRs4lqca7gU1cjD_F5CaKdYrWPZFZV5pUajTtmcB5r8DVXiQTSifc7X6YBXsYNvlufRghcPzagzrpHt2jjjsaElF4N2yHYsEcLpClLri8505pvfHr34JfjdiqnJfj9rTUbfPjHKPk_ynX23Cz9snZ62oR3YElV6zAjTmmxhVYq-s72AarC7gI0KzWjHfheP4uCvFbZs5YVlhmqPvJCTn0L_CaudPx0JOyMOI1PR2XrByxqmjOD7ekcovP0-HksJmGV8_TVL7CdHIP9i9FGvdhuRgV7gGwwEZG94wQVueRxIWmbZLHupc5oXNhghY8b-CkTE3yTr1GTpRPNoh7isCnCHwqFC1Yn40eV-QmfxkXzCNTlX4zKa86vyhx8SOrDdxUrRUn6g_WWvB09jHqMzqkygo3muIYSbKJpIxbsNGgfm6KC9718N_vegLXENHq_fbeziO4Hvp2JpSwugrL5depW0OnstSP_eplcHDZsP4Ng5KI0w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Information+privacy+and+correlates%3A+an+empirical+attempt+to+bridge+and+distinguish+privacy-related+concepts&rft.jtitle=European+journal+of+information+systems&rft.au=Dinev%2C+Tamara&rft.au=Xu%2C+Heng&rft.au=Smith%2C+Jeff+H&rft.au=Hart%2C+Paul&rft.date=2013-05-01&rft.pub=Palgrave+Macmillan+UK&rft.issn=0960-085X&rft.eissn=1476-9344&rft.volume=22&rft.issue=3&rft.spage=295&rft.epage=316&rft_id=info:doi/10.1057%2Fejis.2012.23&rft.externalDocID=10_1057_ejis_2012_23
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-085X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-085X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-085X&client=summon