Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter ofte...
Saved in:
Published in | European journal of information systems Vol. 22; no. 3; pp. 295 - 316 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
London
Taylor & Francis
01.05.2013
Palgrave Macmillan UK Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. |
---|---|
AbstractList | Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. . Adapted from the source document. Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se . Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. [PUBLICATION ABSTRACT] |
Author | Smith, Jeff H Hart, Paul Xu, Heng Dinev, Tamara |
Author_xml | – sequence: 1 givenname: Tamara surname: Dinev fullname: Dinev, Tamara organization: Department of Information Technology & Operations ManagementCollege of Business, Florida Atlantic University – sequence: 2 givenname: Heng surname: Xu fullname: Xu, Heng organization: College of Information Sciences and Technology, Pennsylvania State University – sequence: 3 givenname: Jeff H surname: Smith fullname: Smith, Jeff H organization: Department of Decision Sciences and Management Information SystemsFarmer School of Business, Miami University – sequence: 4 givenname: Paul surname: Hart fullname: Hart, Paul organization: Department of Information Technology & Operations ManagementCollege of Business, Florida Atlantic University |
BookMark | eNp1kc1qGzEURkVwoHbSXR9goJsuMo7-RjPKrpi2CQSySSA7odHcceSOJUeSW_z21WQaCMFZiSvO93E5d4FmzjtA6AvBS4Kr-hI2Ni4pJnRJ2QmaE16LUjLOZ2iOpcAlbqrHT2gR4wZjiiUnc_T7xvU-bHWy3hW7YP9ocyi06wrjQ4BBJ4hXeS5gu7PBGj0UOqU8pCL5og22W8ML3tmYrFvvbXx6rSmn_FjlDOxSPEenvR4ifP7_nqGHnz_uV9fl7d2vm9X329Kwukll2wGDttN5qGQteCM4pbQhHKCRbf7FXQNVBcz0hletZI1shCbCSNEKJjU7Q9-m3l3wz3uISW1tNDAM2oHfR0XE2MeFqDL69R268fvg8naKMFrJbIzITNGJMsHHGKBXxqYXZSloOyiC1ehfjf7V6F9RlkMX70LZy1aHw0d4OeExY24N4c0mx_l64u10wL8-DJ1K-jD40AftTGbZ0eQ_tyKtGA |
CitedBy_id | crossref_primary_10_1080_13675567_2021_1957803 crossref_primary_10_1007_s10799_015_0246_0 crossref_primary_10_1080_1331677X_2019_1585272 crossref_primary_10_1007_s11301_021_00239_4 crossref_primary_10_1016_j_dss_2021_113717 crossref_primary_10_1108_INTR_01_2023_0056 crossref_primary_10_1016_j_dss_2021_113716 crossref_primary_10_1007_s10796_024_10531_9 crossref_primary_10_1016_j_jretai_2020_10_001 crossref_primary_10_1111_ddg_15454_g crossref_primary_10_1108_PROG_10_2014_0078 crossref_primary_10_1016_j_ijhcs_2021_102641 crossref_primary_10_1108_JCM_07_2023_6168 crossref_primary_10_1155_2023_4987364 crossref_primary_10_1108_BFJ_11_2023_0989 crossref_primary_10_2139_ssrn_3670533 crossref_primary_10_3390_informatics9020031 crossref_primary_10_1111_deci_12243 crossref_primary_10_3390_jpm13071048 crossref_primary_10_2139_ssrn_3891121 crossref_primary_10_1016_j_dss_2023_113961 crossref_primary_10_1007_s10796_020_10053_0 crossref_primary_10_1057_ejis_2013_33 crossref_primary_10_1108_ITP_03_2018_0132 crossref_primary_10_1016_j_ijresmar_2023_09_004 crossref_primary_10_1016_j_telpol_2021_102155 crossref_primary_10_2139_ssrn_4168335 crossref_primary_10_1007_s12525_019_00335_0 crossref_primary_10_1111_bjet_13234 crossref_primary_10_1007_s10796_020_09984_5 crossref_primary_10_1080_0960085X_2022_2110000 crossref_primary_10_1080_10447318_2024_2446502 crossref_primary_10_1007_s12263_015_0478_y crossref_primary_10_1016_j_telpol_2023_102703 crossref_primary_10_1016_j_elerap_2021_101046 crossref_primary_10_1016_j_ijinfomgt_2017_10_007 crossref_primary_10_1080_10447318_2023_2238974 crossref_primary_10_1016_j_chb_2015_06_006 crossref_primary_10_1016_j_im_2020_103314 crossref_primary_10_1108_ARLA_05_2024_0090 crossref_primary_10_1016_j_ipm_2019_102128 crossref_primary_10_1080_10447318_2017_1392079 crossref_primary_10_2196_65747 crossref_primary_10_1080_0144929X_2025_2469657 crossref_primary_10_1016_j_jjimei_2024_100270 crossref_primary_10_1111_isj_12243 crossref_primary_10_1007_s10796_017_9802_y crossref_primary_10_1016_j_ijhm_2015_03_008 crossref_primary_10_1057_s41303_017_0066_x crossref_primary_10_1016_j_elerap_2024_101374 crossref_primary_10_1080_0144929X_2022_2046162 crossref_primary_10_1007_s12525_024_00744_w crossref_primary_10_1177_1069031X241262728 crossref_primary_10_1016_j_chbah_2025_100137 crossref_primary_10_1108_OIR_03_2024_0135 crossref_primary_10_1016_j_dss_2022_113881 crossref_primary_10_1016_j_techfore_2020_120164 crossref_primary_10_1590_1982_7849rac2023220311_por crossref_primary_10_1080_13675567_2024_2341851 crossref_primary_10_2478_popets_2022_0036 crossref_primary_10_3389_frobt_2023_1236733 crossref_primary_10_1057_ejis_2013_17 crossref_primary_10_4018_IJISP_2022010119 crossref_primary_10_3390_digital3040018 crossref_primary_10_1016_j_tele_2019_04_006 crossref_primary_10_1016_j_tele_2017_12_002 crossref_primary_10_1016_j_ijresmar_2023_08_003 crossref_primary_10_3233_ISU_230180 crossref_primary_10_1016_j_dss_2019_02_007 crossref_primary_10_1108_IntR_11_2016_0340 crossref_primary_10_1177_14604582231152185 crossref_primary_10_1080_15332861_2021_1875764 crossref_primary_10_1109_ACCESS_2022_3167025 crossref_primary_10_1080_10919392_2020_1834810 crossref_primary_10_2478_jeb_2024_0015 crossref_primary_10_3389_fpubh_2022_847184 crossref_primary_10_1016_j_cose_2023_103375 crossref_primary_10_1080_10447318_2024_2430494 crossref_primary_10_1002_cpe_6680 crossref_primary_10_1016_j_cose_2024_103794 crossref_primary_10_4218_etrij_2017_0259 crossref_primary_10_2139_ssrn_3786245 crossref_primary_10_1016_j_jbusres_2023_114396 crossref_primary_10_1080_10447318_2024_2402126 crossref_primary_10_1108_IntR_03_2016_0070 crossref_primary_10_1111_1467_8551_12427 crossref_primary_10_1016_j_tele_2020_101377 crossref_primary_10_1080_10447318_2024_2375704 crossref_primary_10_4018_IJSEUS_2018100104 crossref_primary_10_1080_0144929X_2021_1901990 crossref_primary_10_1108_IMDS_08_2021_0485 crossref_primary_10_3389_fpsyg_2022_908309 crossref_primary_10_1145_3386160 crossref_primary_10_1057_s41303_017_0056_z crossref_primary_10_1108_ITP_09_2021_0706 crossref_primary_10_1016_j_chb_2020_106644 crossref_primary_10_1016_j_im_2018_11_004 crossref_primary_10_24857_rgsa_v18n9_065 crossref_primary_10_3390_su15021657 crossref_primary_10_1016_j_im_2022_103679 crossref_primary_10_1108_JEIM_12_2020_0481 crossref_primary_10_1108_IMDS_03_2015_0087 crossref_primary_10_1108_APJBA_04_2022_0166 crossref_primary_10_12985_ksaa_2024_32_4_73 crossref_primary_10_1016_j_chb_2022_107415 crossref_primary_10_1108_ITP_08_2019_0416 crossref_primary_10_1016_j_giq_2018_04_002 crossref_primary_10_1080_12460125_2021_1873493 crossref_primary_10_1177_20552076231219444 crossref_primary_10_20990_kilisiibfakademik_438456 crossref_primary_10_1093_jamia_ocaa240 crossref_primary_10_1016_j_procs_2015_08_574 crossref_primary_10_1016_j_telpol_2024_102759 crossref_primary_10_2139_ssrn_4061630 crossref_primary_10_1016_j_jairtraman_2016_05_005 crossref_primary_10_1057_s41599_025_04580_x crossref_primary_10_1145_3676525 crossref_primary_10_4018_IRMJ_349977 crossref_primary_10_1007_s12525_022_00522_6 crossref_primary_10_1177_1461444820979708 crossref_primary_10_1016_j_procs_2021_12_003 crossref_primary_10_3390_ijerph18189553 crossref_primary_10_1111_isj_12179 crossref_primary_10_1142_S0219877023500256 crossref_primary_10_1007_s10799_018_0295_2 crossref_primary_10_1093_heapro_daae103 crossref_primary_10_1016_j_ijmedinf_2015_12_010 crossref_primary_10_1057_s41303_016_0031_0 crossref_primary_10_2196_19594 crossref_primary_10_1016_j_jsis_2014_09_001 crossref_primary_10_1080_10447318_2021_1994211 crossref_primary_10_1177_00472875241268511 crossref_primary_10_1080_15332861_2020_1832817 crossref_primary_10_1080_12460125_2024_2428166 crossref_primary_10_3390_jpm12050657 crossref_primary_10_20965_jaciii_2020_p0509 crossref_primary_10_3390_su152215709 crossref_primary_10_1007_s10796_021_10158_0 crossref_primary_10_1108_JGOSS_10_2016_0030 crossref_primary_10_1007_s10796_022_10321_1 crossref_primary_10_1016_j_techfore_2019_01_018 crossref_primary_10_1080_15536548_2016_1206757 crossref_primary_10_1007_s10796_019_09964_4 crossref_primary_10_2139_ssrn_2510116 crossref_primary_10_1177_14614448221122734 crossref_primary_10_3390_su15053974 crossref_primary_10_1007_s10551_015_2586_4 crossref_primary_10_1016_j_chb_2018_09_015 crossref_primary_10_1016_j_tele_2023_101951 crossref_primary_10_3390_ijerph15102196 crossref_primary_10_1080_0267257X_2020_1715465 crossref_primary_10_1016_j_cose_2023_103646 crossref_primary_10_1016_j_procs_2018_10_081 crossref_primary_10_1016_j_jbi_2019_103302 crossref_primary_10_1016_j_im_2020_103284 crossref_primary_10_1016_j_techfore_2022_122039 crossref_primary_10_4018_IJITBAG_2019010105 crossref_primary_10_1016_j_jbusres_2023_114205 crossref_primary_10_1108_JFRA_12_2021_0476 crossref_primary_10_1108_ICS_02_2018_0024 crossref_primary_10_1080_15213269_2019_1598434 crossref_primary_10_1111_isj_12080 crossref_primary_10_1177_10946705241295849 crossref_primary_10_1111_isj_12082 crossref_primary_10_1057_s41264_023_00257_1 crossref_primary_10_1007_s10209_019_00663_0 crossref_primary_10_1016_j_elerap_2022_101176 crossref_primary_10_2132_personality_33_1_2 crossref_primary_10_1002_asi_24602 crossref_primary_10_1080_00224545_2018_1493676 crossref_primary_10_1108_IntR_04_2016_0088 crossref_primary_10_3390_su12125163 crossref_primary_10_1080_08874417_2016_1153913 crossref_primary_10_2139_ssrn_3980468 crossref_primary_10_1080_17489725_2023_2256701 crossref_primary_10_1186_s13690_024_01416_z crossref_primary_10_1111_ddg_15454 crossref_primary_10_1016_j_datak_2021_101888 crossref_primary_10_1016_j_heliyon_2020_e03298 crossref_primary_10_3917_mav_099_0015 crossref_primary_10_1108_ITP_10_2020_0694 crossref_primary_10_4102_sajim_v19i1_867 crossref_primary_10_1007_s12297_019_00431_2 crossref_primary_10_1080_17538157_2022_2049274 crossref_primary_10_2478_dim_2020_0038 crossref_primary_10_2196_48700 crossref_primary_10_5850_JKSCT_2023_47_3_442 crossref_primary_10_1080_23311983_2023_2184463 crossref_primary_10_1016_j_dss_2016_10_002 crossref_primary_10_1080_0144929X_2023_2178830 crossref_primary_10_1016_j_elerap_2017_02_002 crossref_primary_10_1007_s12599_018_0528_2 crossref_primary_10_1080_10864415_2018_1564553 crossref_primary_10_1109_TEM_2022_3204285 crossref_primary_10_1016_j_jretconser_2022_103028 crossref_primary_10_1080_08874417_2022_2150911 crossref_primary_10_1111_isj_12386 crossref_primary_10_1016_j_im_2015_07_010 crossref_primary_10_1016_j_soscij_2018_10_001 crossref_primary_10_1177_08944393231224539 crossref_primary_10_1177_2056305120915618 crossref_primary_10_1016_j_jnca_2022_103465 crossref_primary_10_1080_23299460_2022_2076985 crossref_primary_10_2139_ssrn_4107152 crossref_primary_10_3390_info12080311 crossref_primary_10_1057_s41299_024_00211_4 crossref_primary_10_1080_15536548_2017_1412114 crossref_primary_10_1016_j_im_2021_103507 crossref_primary_10_1016_j_ijhcs_2024_103320 crossref_primary_10_1080_10447318_2023_2254617 crossref_primary_10_1016_j_compedu_2016_06_004 crossref_primary_10_1080_08874417_2016_1232981 crossref_primary_10_1590_1982_7849rac2023220311_en crossref_primary_10_1080_15536548_2016_1163026 crossref_primary_10_1145_3508484_3508487 crossref_primary_10_1016_j_im_2017_01_001 crossref_primary_10_1080_0144929X_2015_1066444 crossref_primary_10_1080_08874417_2019_1579076 crossref_primary_10_1007_s12525_017_0274_1 crossref_primary_10_1016_j_im_2018_03_012 crossref_primary_10_1108_ITP_07_2022_0498 crossref_primary_10_1080_0144929X_2024_2304613 crossref_primary_10_1016_j_chb_2018_05_043 crossref_primary_10_1016_j_jksuci_2018_03_001 crossref_primary_10_1016_j_soscij_2014_07_002 crossref_primary_10_2139_ssrn_3946376 crossref_primary_10_1016_j_ijmedinf_2015_09_006 crossref_primary_10_1177_10949968221136555 crossref_primary_10_1016_j_dss_2018_08_012 crossref_primary_10_1002_poi3_419 crossref_primary_10_1016_j_ijinfomgt_2020_102266 crossref_primary_10_1016_j_intmar_2021_03_005 crossref_primary_10_1016_j_eswa_2016_08_042 crossref_primary_10_1080_10919392_2024_2398889 crossref_primary_10_1016_j_chb_2020_106260 crossref_primary_10_18775_ijmsba_1849_5664_5419_2014_62_1001 crossref_primary_10_1016_j_protcy_2014_10_020 crossref_primary_10_1057_s41303_017_0064_z crossref_primary_10_1186_s12911_022_01986_4 crossref_primary_10_1016_j_dss_2016_09_011 crossref_primary_10_1016_j_jretconser_2016_08_018 crossref_primary_10_3917_gmp_102_0033 crossref_primary_10_1016_j_ijinfomgt_2019_102063 crossref_primary_10_1016_j_tele_2022_101904 crossref_primary_10_1108_INTR_11_2022_0898 crossref_primary_10_1007_s10551_019_04237_1 crossref_primary_10_20867_thm_30_3_6 crossref_primary_10_1080_0144929X_2024_2431052 crossref_primary_10_1016_j_dss_2017_12_003 crossref_primary_10_1080_1369118X_2023_2285462 crossref_primary_10_1108_EJM_06_2019_0515 crossref_primary_10_1016_j_ijinfomgt_2019_102065 |
Cites_doi | 10.1037/0022-3514.51.6.1173 10.1287/isre.1060.0096 10.1111/1540-4560.00063 10.1207/s15327744joce1602_2 10.1016/j.elerap.2009.05.001 10.1007/11957454_3 10.1080/01972240490507956 10.1007/s10796-006-9013-4 10.1287/isre.1040.0032 10.2307/40041279 10.1145/257874.257896 10.1016/S0963-8687(02)00018-5 10.1016/j.dss.2010.02.008 10.2753/JEC1086-4415100201 10.1111/j.1540-4560.1977.tb01882.x 10.1287/isre.13.3.334.81 10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9 10.1086/209386 10.1145/219663.219683 10.2307/3250951 10.1207/s15327906mbr0903_1 10.2979/ESJ.2006.4.3.25 10.1145/988772.988777 10.2307/1321160 10.1287/orsc.11.1.35.12567 10.2753/MIS0742-1222260305 10.1509/jppm.19.1.62.16949 10.1057/palgrave.ejis.3000590 10.1145/767193.767196 10.1016/j.jsis.2007.09.002 10.1080/019722499128592 10.1037/0021-9010.65.5.623 10.1037/0021-9010.88.5.879 10.1080/019722499128538 10.2307/3150783 10.1111/1540-4560.00071 10.1016/j.dss.2011.01.017 10.1016/S0191-8869(98)00222-0 10.1080/01449290410001715723 10.1111/j.1540-4560.1977.tb01879.x 10.1016/S1071-5819(03)00111-3 10.1016/j.im.2004.01.003 10.1080/019722499128565 10.2307/248873 10.1177/0276146704263920 10.1287/mnsc.1060.0597 10.4018/irmj.2001100104 10.1111/1540-4560.00067 10.1016/j.chb.2010.03.016 10.1111/j.1083-6101.2007.00380.x 10.1111/j.1540-4560.1977.tb01880.x 10.1037/h0046016 10.1287/orsc.10.1.104 10.1057/jit.2010.6 10.1016/j.dss.2010.01.010 10.1145/903893.903897 10.1177/009207002236917 10.1080/019722499128411 10.2307/249775 10.2307/249477 10.1145/42411.42413 10.1017/CBO9780511625138 10.1037/0021-9010.66.3.308 10.1287/isre.1070.0124 10.1111/j.2044-8260.1973.tb00065.x 10.1111/j.1460-2466.1985.tb02236.x 10.1037/0021-9010.86.1.114 10.1080/019722498128719 10.2307/1250198 10.1016/S0963-8687(02)00017-3 10.2307/1252059 10.1509/jppm.19.1.27.16941 10.1037/0021-9010.68.3.459 10.1006/jevp.1997.0049 10.1287/isre.13.1.36.97 10.1287/isre.1060.0080 10.2307/25148760 10.17705/1jais.00077 10.1353/book4588 10.2307/25148715 10.2307/25148757 10.1177/074391569101000111 10.17705/1jais.00281 10.2307/41409970 10.2307/25148814 10.2307/25148745 10.2307/20650304 10.2307/25148744 10.5040/9798216001362 10.1515/9781503620766 10.1177/074391569101200206 10.2307/25148854 10.2307/25148804 10.2307/23044042 10.7591/9781501722134 10.2307/25148779 10.17705/1thci.00024 10.2307/25148821 |
ContentType | Journal Article |
Copyright | Copyright © 2012, Operational Research Society 2012 Operational Research Society 2012 Operational Research Society 2013 |
Copyright_xml | – notice: Copyright © 2012, Operational Research Society 2012 – notice: Operational Research Society 2012 – notice: Operational Research Society 2013 |
DBID | AAYXX CITATION 3V. 7WY 7WZ 7XB 87Z 8AL 8BF 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ALSLI ARAPS AXJJW AZQEC BENPR BEZIV BGLVJ CCPQU CNYFK DWQXO E3H F2A FREBS FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L.0 M0C M0N M0Q M1O M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRQQA Q9U 8BP |
DOI | 10.1057/ejis.2012.23 |
DatabaseName | CrossRef ProQuest Central (Corporate) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Global (Alumni Edition) Computing Database (Alumni Edition) European Business Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) Research Library (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Aerospace Collection Asian & European Business Collection (ProQuest) ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Library & Information Science Collection ProQuest Central Korea Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Asian & European Business Collection (Alumni) Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest Research Library SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard ABI/INFORM Global Computing Database European Business Database Library Science Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ProQuest Central Basic Library & Information Sciences Abstracts (LISA) - CILIP Edition |
DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) ProQuest European Business Research Library Prep Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Asian & European Business Collection SciTech Premium Collection ABI/INFORM Complete ProQuest One Applied & Life Sciences Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest Business Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College Research Library (Alumni Edition) Asian & European Business Collection (Alumni) ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest European Business (Alumni Edition) ABI/INFORM Professional Standard ProQuest Central Korea ProQuest Research Library ABI/INFORM Complete (Alumni Edition) ProQuest Computing ProQuest One Social Sciences ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) Library & Information Sciences Abstracts (LISA) - CILIP Edition |
DatabaseTitleList | Library & Information Sciences Abstracts (LISA) - CILIP Edition ProQuest Business Collection (Alumni Edition) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Library & Information Science |
EISSN | 1476-9344 |
EndPage | 316 |
ExternalDocumentID | 2942197111 10_1057_ejis_2012_23 11934267 |
Genre | Research Article Feature |
GroupedDBID | .DC 0BK 0R~ 29G 30N 3V. 4.4 5GY 77K 7WY 8FE 8FG 8FL 8FW 8G5 8R4 8R5 AAIAL AAJMT AALDU AAMIU AAPUL AAQRR ABJNI ABLIJ ABPAQ ABUWG ABXUL ABXYU ACGFO ACGFS ACHQT ACREN ACTIO ADFRT ADGTB ADINQ AECXW AEISY AENEX AEOZL AEPSL AEXYK AEYOC AFKRA AGAYW AGDLA AHBYD AHDZW AHSBF AJRNO AKBVH AKOOK ALMA_UNASSIGNED_HOLDINGS ALQZU ALSLI AMKLP AMTXH AQRUH ARAPS ASPBG AVWKF AWYRJ AXJJW AZQEC BENPR BEZIV BGLVJ BLEHA BPHCQ CCCUG CCPQU CNYFK CS3 CSNOR DWQXO EBS EJD FEFRA FRNLG GNUQQ GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GUQSH H13 HCIFZ K60 K6V K6~ K7- KYCEM L7B M0C M0N M1O M2O MS~ O9- P2P P62 PQBIZ PQBZA PQQKQ PROAC Q2X RNANH ROSJB RPC RSV RTWRZ SNX SOJ TBQAZ TDBHL TEN TFL TFT TFW TTHFI TUROJ U5U UCJ WH7 XSW ZGOLN ADYSH 3EH AAGDL AAHIA AARHV AAYLN AAYOK AAYXX ACTTO ADUMR ADXEU AEHZU AEZBV AFBWG AFRVT AGVKY AGWUF AIYEW AKHJE AKMBP ALRRR AMPGV BGSSV CAG CITATION COF CYRSC DAOYK DGEBU IFELN IPNFZ LJTGL M4Z N8N NUSFT PHGZM PHGZT RIG TAJZE UAP YR5 7XB 8AL 8BF 8FK E3H F2A JQ2 L.- L.0 M0Q MBDVC PKEHL PQEST PQGLB PQUKI PRQQA Q9U TASJS 8BP |
ID | FETCH-LOGICAL-c378t-bde3ebda37859764864222814ee89b3780d8e55e3cfc45b938986a16c96b639a3 |
IEDL.DBID | BENPR |
ISSN | 0960-085X |
IngestDate | Fri Jul 11 14:27:01 EDT 2025 Sat Aug 23 14:41:57 EDT 2025 Tue Jul 01 05:13:05 EDT 2025 Thu Apr 24 22:59:30 EDT 2025 Fri Feb 21 02:34:18 EST 2025 Wed Dec 25 09:00:57 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | privacy anonymity control risk secrecy confidentiality |
Language | English |
License | http://www.springer.com/tdm |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c378t-bde3ebda37859764864222814ee89b3780d8e55e3cfc45b938986a16c96b639a3 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
PQID | 1325908519 |
PQPubID | 30520 |
PageCount | 22 |
ParticipantIDs | crossref_citationtrail_10_1057_ejis_2012_23 proquest_miscellaneous_1622284665 proquest_journals_1325908519 springer_journals_10_1057_ejis_2012_23 crossref_primary_10_1057_ejis_2012_23 informaworld_taylorfrancis_310_1057_ejis_2012_23 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 5/1/2013 20130501 2013-05-00 |
PublicationDateYYYYMMDD | 2013-05-01 |
PublicationDate_xml | – month: 05 year: 2013 text: 5/1/2013 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | London |
PublicationPlace_xml | – name: London – name: Abingdon |
PublicationTitle | European journal of information systems |
PublicationTitleAbbrev | Eur J Inf Syst |
PublicationYear | 2013 |
Publisher | Taylor & Francis Palgrave Macmillan UK Taylor & Francis Ltd |
Publisher_xml | – name: Taylor & Francis – name: Palgrave Macmillan UK – name: Taylor & Francis Ltd |
References | Flaherty (CR48) 1979 Bansal, Zahedi, Gefen (CR9) 2008 Culnan, Bies (CR31) 2003; 59 Podsakoff, Mackenzie, Lee, Podsakoff (CR97) 2003; 88 Cote (CR27) 2002 Solove (CR112) 2006; 154 Krasnova, Spiekermann, Koroleva, Hildebrand (CR64) 2009; 25 Tam, Ho (CR122) 2006; 30 Taylor (CR123) 1974; 38 Li, Sarathy, Xu (CR66) 2011; 51 Dinev, Hart, Mullen (CR40) 2008; 17 Baron, Kenny (CR11) 1986; 51 Lindell, Whitney (CR67) 2001; 86 Smith, Dinev, Xu (CR109) 2011; 35 Etzioni (CR44) 1999 Zwick, Dholakia (CR138) 2004; 24 Milne, Gordon (CR87) 1993; 12 McKnight, Choudhury, Kacmar (CR81) 2002; 13 Milberg, Burke, Smith, Kallman (CR84) 1995; 38 Burton-Jones (CR17) 2009; 33 Turkle (CR128) 2011 Cate (CR21) 1997 CR43 Poindexter, Earp, Baumer (CR98) 2006; 8 Bellman, Johnson, Kobrin, Lohse (CR13) 2004; 20 McGrath (CR80) 1982 Margulis (CR74) 2003; 59 Spiekermann (CR114) 2005 Nissenbaum (CR89) 1999; 15 Dowling, Staelin (CR41) 1994; 21 Petronio (CR93) 2002 Dinev, Hart (CR35) 2004; 23 Solove (CR111) 2004 Gefen, Rigdon, Straub (CR51) 2011; 35 Rosen (CR104) 2000 Frye, Dornischa (CR49) 2010; 26 Chellappa (CR23) 2001 Xu (CR134) 2007 CR53 Gefen, Straub, Boudreau (CR52) 2000; 4 Xu, Dinev, Smith, Hart (CR135) 2011; 12 Komiak, Benbasat (CR63) 2006; 30 Di Pietro, Mancini (CR34) 2003; 46 Stewart, Segars (CR116) 2002; 13 Bansal, Zahedi, Gefen (CR10) 2010; 49 Malhotra, Kim, Agarwal (CR71) 2004; 15 Acquisti (CR1) 2004 Kelvin (CR60) 1973; 12 Dennis, Valacich (CR32) 2001; 7 Turkle (CR127) 1995 Acquisti, Gross (CR2) 2006 Vidmar, Flaherty (CR129) 1985; 35 Culnan (CR29) 1993; 17 Tefft (CR124) 1980 Margulis (CR75) 2003; 59 Mason (CR78) 1986; 10 Dinev, Hart (CR38) 2007; 4 Dinev, Bellotto, Hart, Russo, Serra, Colautti (CR39) 2006; 15 Klopfer, Rubenstein (CR61) 1977; 33 Smith, Milberg, Burke (CR110) 1996; 20 Moorman, Desphande, Zaltman (CR88) 1993; 57 Burton-Jones, Straub (CR18) 2006; 17 Metzger (CR83) 2004; 9 Marx (CR77) 1999; 15 Stone, Gueutal, Gardner, Mcclure S (CR118) 1983; 68 Margulis (CR73) 1977; 33 Smith (CR108) 1994 Laufer, WOLFE (CR65) 1977; 33 Westin (CR133) 1967 Cramer, Barry (CR28) 1999; 27 Pavlou (CR91) 2002; 11 Petter, Straub, Rai (CR94) 2007; 31 Dinev, Hart (CR36) 2005; 10 Gross, Acquisti (CR55) 2005 Culnan, Armstrong (CR30) 1999; 10 CR70 Rensel, Abbas, Rao (CR101) 2006; 7 Hoadley, Xu, Lee, Rosson (CR56) 2010; 9 Sheehan, Hoy (CR107) 2000; 19 Marshall (CR76) 1974; 9 Warren, Brandeis (CR131) 1890; 4 Clarke (CR26) 1988; 31 Nunnally (CR90) 1978 Dhillon, Moores (CR33) 2001; 14 Phelps, Nowak, Ferrell (CR96) 2000; 19 Stone, Stone (CR117) 1990; 8 Camp (CR19) 1999; 15 Featherman, Pavlou (CR46) 2003; 59 Hui, Teo, Lee (CR57) 2007; 31 Agarwal, Karahanna (CR3) 2000; 24 Malhotra, Kim, Patil (CR72) 2006; 52 Akers (CR4) 2001 Armstrong, Overton (CR7) 1977; 14 Rust, Kannan, Peng (CR105) 2002; 30 Raab, Bennett (CR100) 1998; 14 Jiang, Benbasat (CR58) 2007; 18 Teich, Frankel, Kling, Lee (CR125) 1999; 15 Bennett (CR14) 1992 Dinev, Hart (CR37) 2006; 17 Festinger (CR47) 1957 Son, Kim (CR113) 2008; 32 Altman (CR6) 1975 Bok (CR15) 1989 CR95 Tolchinsky, McCuddy, Adams, Ganster, Woodman, Fromkin (CR126) 1981; 66 Sternberg (CR115) 2003 Swire (CR121) 1997 Xu, Teo, Tan, Agarwal (CR136) 2010; 26 Chin (CR25) 1998 Featherman, Wright, Thatcher, Zimmer, Pak (CR45) 2011; 3 Goodwin (CR54) 1991; 10 Campbell, Fiske (CR20) 1959; 56 Rindfleisch (CR102) 1997; 40 Schoeman (CR106) 1984 Milne, Boza (CR86) 1999; 13 Webster, Ahuja (CR132) 2006; 30 Awad, Krishnan (CR8) 2006; 30 Earp, Payton (CR42) 2006; 16 Luo, Li, Zhang, Shim (CR69) 2010; 49 Brin (CR16) 1998 Young (CR137) 1978 Jiang, Benbasat (CR59) 2007; 31 McLean (CR82) 1995 CR24 Liu, Marchewka, Lu, Yu (CR68) 2005; 42 CR22 Milberg, Smith, Burke (CR85) 2000; 11 Kobsa, Schreck (CR62) 2003; 3 CR103 Straub, Boudreau, Gefen (CR119) 2004; 13 Belanger, Hiller, Smith (CR12) 2002; 11 Fusilier, Hoyer (CR50) 1980; 65 Waldo, Lin, Millett (CR130) 2007 Pedersen (CR92) 1997; 17 McElroy, Hendrickson, Townsend, Demarie (CR79) 2007; 31 Strite, Karahanna (CR120) 2006; 30 Qian, Scott (CR99) 2007; 12 Altman (CR5) 1974 CIT0072 Altman I (CIT0005) 1974 CIT0071 CIT0074 CIT0073 CIT0076 CIT0075 CIT0078 CIT0077 CIT0110 Jiang Z (CIT0059) 2007; 31 Acquisti A (CIT0002) 2006 Dennis A (CIT0032) 2001; 7 Smith HJ (CIT0108) 1994 CIT0112 CIT0116 CIT0118 Akers R (CIT0004) 2001 CIT0085 Waldo J (CIT0130) 2007 CIT0084 CIT0086 Flaherty DH (CIT0048) 1979 CIT0089 Gross R (CIT0055) 2005 CIT0088 Chellappa RK (CIT0023) 2001 CIT0081 Komiak XS (CIT0063) 2006; 30 CIT0003 CIT0123 CIT0126 CIT0125 CIT0007 Schoeman FD (CIT0106) 1984 CIT0129 CIT0096 CIT0010 CIT0098 CIT0131 CIT0097 Xu H (CIT0135) 2011; 12 CIT0012 CIT0011 CIT0099 Cate FH (CIT0021) 1997 CIT0092 CIT0091 Spiekermann S (CIT0114) 2005 McGrath JE (CIT0080) 1982 Nunnally JC (CIT0090) 1978 CIT0013 Featherman M (CIT0045) 2011; 3 CIT0136 CIT0018 CIT0138 CIT0019 CIT0020 Burton-Jones A (CIT0017) 2009; 33 CIT0026 CIT0029 Acquisti A (CIT0001) 2004 Altman I (CIT0006) 1975 CIT0028 Petronio SS (CIT0093) 2002 Cote S (CIT0027) 2002 Goodwin C (CIT0054) 1991; 10 CIT0030 Petter S (CIT0094) 2007; 31 CIT0031 CIT0034 CIT0033 Awad NF (CIT0008) 2006; 30 Turkle S (CIT0127) 1995 Etzioni A (CIT0044) 1999 Chin WW (CIT0025) 1998 CIT0036 Gefen D (CIT0051) 2011; 35 CIT0035 CIT0038 CIT0037 Westin AF (CIT0133) 1967 CIT0039 Hui K-L (CIT0057) 2007; 31 Xu H (CIT0134) 2007 Son J-Y (CIT0113) 2008; 32 CIT0041 Festinger LA (CIT0047) 1957 CIT0040 Webster J (CIT0132) 2006; 30 CIT0042 Turkle S (CIT0128) 2011 Solove DJ (CIT0111) 2004 Tam KY (CIT0122) 2006; 30 Metzger MJ (CIT0083) 2004; 9 Bansal G (CIT0009) 2008 Bennett CJ (CIT0014) 1992 CIT0046 CIT0049 CIT0050 Swire PP (CIT0121) 1997 Bok S (CIT0015) 1989 CIT0056 Strite M (CIT0120) 2006; 30 Straub DW (CIT0119) 2004; 13 McLean D (CIT0082) 1995 Sternberg R (CIT0115) 2003 CIT0058 Tefft SK (CIT0124) 1980 CIT0061 CIT0060 Milne GR (CIT0087) 1993; 12 Brin D (CIT0016) 1998 CIT0062 CIT0065 CIT0064 CIT0067 CIT0100 CIT0066 Smith HJ (CIT0109) 2011; 35 Stone EF (CIT0117) 1990; 8 Rosen J (CIT0104) 2000 Young JB (CIT0137) 1978 Rensel AD (CIT0101) 2006; 7 CIT0069 CIT0102 CIT0068 CIT0105 Gefen D (CIT0052) 2000; 4 McElroy JC (CIT0079) 2007; 31 CIT0107 |
References_xml | – volume: 51 start-page: 1173 year: 1986 end-page: 1182 ident: CR11 article-title: The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.51.6.1173 – ident: CR22 – volume: 17 start-page: 220 issue: 3 year: 2006 end-page: 246 ident: CR18 article-title: Reconceptualizing system usage: An approach and empirical test publication-title: Information Systems Research doi: 10.1287/isre.1060.0096 – volume: 59 start-page: 243 issue: 2 year: 2003 end-page: 261 ident: CR75 article-title: Privacy as a social issue and behavioral concept publication-title: Journal of Social Issues doi: 10.1111/1540-4560.00063 – volume: 16 start-page: 105 issue: 2 year: 2006 end-page: 122 ident: CR42 article-title: Information privacy in the service sector: an exploratory study of health care and banking professionals publication-title: Journal of Organizational Computing and Electronic Commerce doi: 10.1207/s15327744joce1602_2 – volume: 9 start-page: 50 issue: 1 year: 2010 end-page: 60 ident: CR56 article-title: Privacy as information access and illusory control: the case of the facebook news feed privacy outcry publication-title: Electronic Commerce Research and Applications doi: 10.1016/j.elerap.2009.05.001 – year: 2002 ident: CR27 publication-title: Introduction in Criminological Theories – Bridging the Past to the Future – volume: 12 start-page: 798 issue: 12 year: 2011 end-page: 824 ident: CR135 article-title: Information privacy concerns: linking individual perceptions with institutional privacy assurances publication-title: Journal of the Association for Information Systems – start-page: 36 year: 2006 ident: CR2 article-title: Imagined communities: awareness information sharing and privacy on the facebook publication-title: Proceedings of the 6th Privacy Enhancing Technologies Symposium doi: 10.1007/11957454_3 – volume: 20 start-page: 313 issue: 5 year: 2004 end-page: 324 ident: CR13 article-title: International differences in information privacy concerns: a global survey of consumers publication-title: Information Society doi: 10.1080/01972240490507956 – volume: 8 start-page: 363 issue: 5 year: 2006 end-page: 374 ident: CR98 article-title: An experimental economics approach toward quantifying online privacy choices publication-title: Information Systems Frontiers doi: 10.1007/s10796-006-9013-4 – volume: 33 start-page: 445 issue: 3 year: 2009 end-page: 471 ident: CR17 article-title: Minimizing method bias through programmatic research publication-title: MIS Quarterly – volume: 15 start-page: 336 issue: 4 year: 2004 end-page: 355 ident: CR71 article-title: Internet users’ information privacy concerns (IUIPC): the construct the scale and a causal model publication-title: Information Systems Research doi: 10.1287/isre.1040.0032 – volume: 154 start-page: 477 issue: 3 year: 2006 end-page: 560 ident: CR112 article-title: Taxonomy of privacy publication-title: University of Pennsylvania Law Review doi: 10.2307/40041279 – volume: 40 start-page: 92 issue: 8 year: 1997 end-page: 100 ident: CR102 article-title: Privacy information technology and health care publication-title: Communications of the ACM doi: 10.1145/257874.257896 – volume: 11 start-page: 245 issue: 3–4 year: 2002 end-page: 270 ident: CR12 article-title: Trustworthiness in electronic commerce: the role of privacy security and site attributes publication-title: Journal of Strategic Information Systems doi: 10.1016/S0963-8687(02)00018-5 – volume: 35 start-page: 989 issue: 4 year: 2011 end-page: 1015 ident: CR109 article-title: Information privacy research: an interdisciplinary review publication-title: MIS Quarterly – volume: 8 start-page: 349 issue: 3 year: 1990 end-page: 411 ident: CR117 article-title: Privacy in organizations: theoretical issues research findings and protection mechanisms publication-title: Research in Personnel and Human Resources Management – year: 2007 ident: CR134 article-title: The effects of self-construal and perceived control on privacy concerns publication-title: Proceedings of the 28th Annual International Conference on Information Systems (ICIS) – volume: 49 start-page: 222 issue: 2 year: 2010 end-page: 234 ident: CR69 article-title: Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services publication-title: Decision Support Systems doi: 10.1016/j.dss.2010.02.008 – volume: 10 start-page: 7 issue: 2 year: 2005 end-page: 29 ident: CR36 article-title: Internet privacy concerns and social awareness as determinants of intention to transact publication-title: International Journal of Electronic Commerce doi: 10.2753/JEC1086-4415100201 – volume: 33 start-page: 52 issue: 3 year: 1977 end-page: 65 ident: CR61 article-title: The concept privacy and its biological basis publication-title: Journal of Social Issues doi: 10.1111/j.1540-4560.1977.tb01882.x – volume: 13 start-page: 334 issue: 3 year: 2002 end-page: 359 ident: CR81 article-title: Developing and validating trust measures for e-commerce: an integrative typology publication-title: Information Systems Research doi: 10.1287/isre.13.3.334.81 – start-page: 3 year: 1974 end-page: 28 ident: CR5 article-title: Privacy: a conceptual analysis publication-title: Man-Environment Interactions: Evaluations and Applications: Part 2 – volume: 13 start-page: 5 issue: 1 year: 1999 end-page: 24 ident: CR86 article-title: Trust and concern in consumers’ perceptions of marketing information management practices publication-title: Journal of Interactive Marketing doi: 10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9 – volume: 21 start-page: 119 issue: 1 year: 1994 end-page: 134 ident: CR41 article-title: Model of perceived risk and intended risk-handling activity publication-title: Journal of Consumer Research doi: 10.1086/209386 – volume: 38 start-page: 65 issue: 12 year: 1995 end-page: 74 ident: CR84 article-title: Values personal information privacy concerns and regulatory approaches publication-title: Communication of the ACM doi: 10.1145/219663.219683 – start-page: 69 year: 1982 end-page: 102 ident: CR80 article-title: Dilemmatics: the study of research choices and dilemmas publication-title: Judgment Calls in Research – volume: 24 start-page: 665 issue: 4 year: 2000 end-page: 694 ident: CR3 article-title: Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage publication-title: MIS Quarterly doi: 10.2307/3250951 – volume: 9 start-page: 255 issue: 3 year: 1974 end-page: 271 ident: CR76 article-title: Dimensions of privacy preferences publication-title: Multivariate Behavioral Research doi: 10.1207/s15327906mbr0903_1 – volume: 4 start-page: 25 issue: 3 year: 2007 end-page: 61 ident: CR38 article-title: Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use publication-title: E-Service Journal doi: 10.2979/ESJ.2006.4.3.25 – start-page: 21 year: 2004 ident: CR1 article-title: Privacy in electronic commerce and the economics of immediate gratification publication-title: Proceedings of the 5th ACM Electronic Commerce Conference doi: 10.1145/988772.988777 – volume: 4 start-page: 193 issue: 5 year: 1890 end-page: 220 ident: CR131 article-title: The right to privacy publication-title: Harvard Law Review doi: 10.2307/1321160 – volume: 31 start-page: 623 issue: 4 year: 2007 end-page: 656 ident: CR94 article-title: Specifying formative constructs in information systems research publication-title: MIS Quarterly – year: 1957 ident: CR47 publication-title: Theory of Cognitive Dissonance – year: 1979 ident: CR48 publication-title: Privacy and Government Data Banks: An International Perspective – volume: 11 start-page: 35 issue: 1 year: 2000 end-page: 57 ident: CR85 article-title: Information privacy: corporate management and national regulation publication-title: Organization Science doi: 10.1287/orsc.11.1.35.12567 – volume: 26 start-page: 135 issue: 3 year: 2010 end-page: 174 ident: CR136 article-title: The role of push-pull technology in privacy calculus: the case of location-based services publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222260305 – volume: 19 start-page: 62 issue: 1 year: 2000 end-page: 73 ident: CR107 article-title: Dimensions of privacy concern among online consumers publication-title: Journal of Public Policy and Marketing doi: 10.1509/jppm.19.1.62.16949 – volume: 15 start-page: 389 issue: 4 year: 2006 end-page: 402 ident: CR39 article-title: Privacy calculus model in e-commerce – a study of Italy and the United States publication-title: European Journal of Information Systems doi: 10.1057/palgrave.ejis.3000590 – volume: 3 start-page: 149 issue: 2 year: 2003 end-page: 183 ident: CR62 article-title: Privacy through pseudonymity in user-adaptive systems publication-title: ACM Transactions on Internet Technology doi: 10.1145/767193.767196 – volume: 17 start-page: 214 issue: 3 year: 2008 end-page: 233 ident: CR40 article-title: Internet privacy concerns and beliefs about government surveillance – an empirical investigation publication-title: Journal of Strategic Information Systems doi: 10.1016/j.jsis.2007.09.002 – volume: 30 start-page: 679 issue: 3 year: 2006 end-page: 704 ident: CR120 article-title: The role of espoused national cultural values in technology acceptance publication-title: MIS Quarterly – start-page: 147 year: 2001 ident: CR23 article-title: Contrasting expert assessment of privacy with perceived privacy: implications for public policy publication-title: Proceedings of the National Conference on Digital Government Research – volume: 13 start-page: 380 issue: 1 year: 2004 end-page: 427 ident: CR119 article-title: Validation guidelines for IS positivist research publication-title: Communications of AIS – volume: 31 start-page: 19 issue: 1 year: 2007 end-page: 33 ident: CR57 article-title: The value of privacy assurance: an exploratory field experiment publication-title: MIS Quarterly – volume: 15 start-page: 141 issue: 2 year: 1999 end-page: 144 ident: CR89 article-title: The meaning of anonymity in an information age publication-title: The Information Society doi: 10.1080/019722499128592 – year: 2005 ident: CR114 article-title: Perceived control: scales for privacy in ubiquitous computing environments publication-title: Proceedings of the 10th International Conference on User Modeling – year: 1989 ident: CR15 publication-title: Secrets: On the Ethics of Concealment and Revelation – volume: 10 start-page: 149 issue: 1 year: 1991 end-page: 166 ident: CR54 article-title: Privacy: recognition of a consumer right publication-title: Journal of Public Policy and Marketing – year: 2008 ident: CR9 article-title: The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation publication-title: Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008) – volume: 65 start-page: 623 issue: 5 year: 1980 end-page: 626 ident: CR50 article-title: Variables affecting perceptions of invasion of privacy in a personnel selection situation publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.65.5.623 – ident: CR103 – year: 2004 ident: CR111 publication-title: The Digital Person: Technology and Privacy in the Information Age – volume: 88 start-page: 879 issue: 5 year: 2003 end-page: 903 ident: CR97 article-title: Common method biases in behavioral research: a critical review of the literature and recommended remedies publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.88.5.879 – volume: 32 start-page: 503 issue: 3 year: 2008 end-page: 529 ident: CR113 article-title: Internet users’ information privacy-protective responses: a taxonomy and a nomological model publication-title: MIS Quarterly – volume: 15 start-page: 71 issue: 2 year: 1999 end-page: 77 ident: CR125 article-title: Anonymous communication policies for the Internet: results and recommendations of the AAAS conference publication-title: Information Society doi: 10.1080/019722499128538 – volume: 14 start-page: 396 issue: 3 year: 1977 end-page: 402 ident: CR7 article-title: Estimating non-response bias in mail surveys publication-title: Journal of Marketing Research doi: 10.2307/3150783 – year: 2011 ident: CR128 publication-title: Alone Together: Why We Expect More from Technology and Less from Each Other – volume: 59 start-page: 411 issue: 2 year: 2003 end-page: 429 ident: CR74 article-title: On the status and contribution of Westin's and Altman's theories of privacy publication-title: Journal of Social Issues doi: 10.1111/1540-4560.00071 – volume: 51 start-page: 434 issue: 3 year: 2011 end-page: 445 ident: CR66 article-title: The role of affect and cognition on online consumers’ willingness to disclose personal information publication-title: Decision Support Systems doi: 10.1016/j.dss.2011.01.017 – volume: 27 start-page: 629 issue: 4 year: 1999 end-page: 637 ident: CR28 article-title: Psychometric properties and confirmatory factor analysis of the self-concealment scale publication-title: Personality and Individual Differences doi: 10.1016/S0191-8869(98)00222-0 – volume: 23 start-page: 413 issue: 6 year: 2004 end-page: 423 ident: CR35 article-title: Internet privacy concerns and their antecedents – measurement validity and a regression model publication-title: Behavior and Information Technology doi: 10.1080/01449290410001715723 – year: 2001 ident: CR4 publication-title: Criminological Theories: Introduction, Evaluations, and Application – ident: CR24 – year: 2000 ident: CR104 publication-title: The Unwanted Gaze: The Destruction of Privacy in America – volume: 33 start-page: 5 issue: 3 year: 1977 end-page: 21 ident: CR73 article-title: Conceptions of privacy: current status and next steps publication-title: Journal of Social Issues doi: 10.1111/j.1540-4560.1977.tb01879.x – start-page: 295 year: 1998 end-page: 336 ident: CR25 article-title: The partial least squares approach to structural equation modeling publication-title: Modern Methods for Business Research – volume: 59 start-page: 451 issue: 4 year: 2003 end-page: 474 ident: CR46 article-title: Predicting e-services adoption: a perceived risk facets perspective publication-title: International Journal of Human-Computer Studies doi: 10.1016/S1071-5819(03)00111-3 – ident: CR70 – volume: 42 start-page: 289 issue: 2 year: 2005 end-page: 304 ident: CR68 article-title: Beyond concern – a privacy-trust-behavioral intention model of electronic commerce publication-title: Information & Management doi: 10.1016/j.im.2004.01.003 – year: 2002 ident: CR93 publication-title: Boundaries of Privacy: Dialectics of Disclosure – volume: 31 start-page: 809 issue: 4 year: 2007 end-page: 820 ident: CR79 article-title: Dispositional factors in internet use: personality versus cognitive style publication-title: MIS Quarterly – volume: 15 start-page: 99 issue: 2 year: 1999 end-page: 112 ident: CR77 article-title: What's in a name? Some reflections on the sociology of anonymity publication-title: Information Society doi: 10.1080/019722499128565 – year: 2003 ident: CR115 publication-title: Cognitive Psychology – year: 1994 ident: CR108 publication-title: Managing Privacy: Information Technology and Corporate America – volume: 10 start-page: 4 issue: 1 year: 1986 end-page: 12 ident: CR78 article-title: Four ethical issues of the information age publication-title: MIS Quarterly doi: 10.2307/248873 – year: 1998 ident: CR16 publication-title: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? – volume: 24 start-page: 31 issue: 1 year: 2004 end-page: 43 ident: CR138 article-title: Whose identity is it anyway? Consumer representation in the age of database marketing publication-title: Journal of Macromarketing doi: 10.1177/0276146704263920 – volume: 52 start-page: 1865 issue: 12 year: 2006 end-page: 1883 ident: CR72 article-title: Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research publication-title: Management Science doi: 10.1287/mnsc.1060.0597 – volume: 14 start-page: 33 issue: 4 year: 2001 ident: CR33 article-title: Internet privacy: interpreting key issues publication-title: Information Resources Management Journal doi: 10.4018/irmj.2001100104 – volume: 59 start-page: 323 issue: 2 year: 2003 end-page: 342 ident: CR31 article-title: Consumer privacy: balancing economic and justice considerations publication-title: Journal of Social Issues doi: 10.1111/1540-4560.00067 – year: 1978 ident: CR90 publication-title: Psychometric Theory – year: 1999 ident: CR44 publication-title: The Limits of Privacy – year: 2005 ident: CR55 article-title: Information revelation and privacy in online social networks publication-title: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society – volume: 26 start-page: 1120 issue: 5 year: 2010 end-page: 1127 ident: CR49 article-title: When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2010.03.016 – volume: 12 start-page: 1428 issue: 4 year: 2007 end-page: 1451 ident: CR99 article-title: Anonymity and self-disclosure on weblogs publication-title: Journal of Computer-Mediated Communication doi: 10.1111/j.1083-6101.2007.00380.x – volume: 33 start-page: 22 issue: 3 year: 1977 end-page: 42 ident: CR65 article-title: Privacy as a concept and a social issue – multidimensional developmental theory publication-title: Journal of Social Issues doi: 10.1111/j.1540-4560.1977.tb01880.x – volume: 56 start-page: 81 issue: 2 year: 1959 end-page: 105 ident: CR20 article-title: Convergent and discriminant validation by the multitrait-multimethod matrix publication-title: Psychological Bulletin doi: 10.1037/h0046016 – volume: 10 start-page: 104 issue: 1 year: 1999 end-page: 115 ident: CR30 article-title: Information privacy concerns procedural fairness and impersonal trust: an empirical investigation publication-title: Organization Science doi: 10.1287/orsc.10.1.104 – volume: 25 start-page: 109 issue: 2 year: 2009 end-page: 125 ident: CR64 article-title: Online social networks: why we disclose publication-title: Journal of Information Technology doi: 10.1057/jit.2010.6 – volume: 30 start-page: 941 issue: 4 year: 2006 end-page: 960 ident: CR63 article-title: The effects of personalization and familiarity on trust in and adoption of recommendation agents publication-title: MIS Quarterly – volume: 7 start-page: 19 issue: 1 year: 2006 end-page: 50 ident: CR101 article-title: Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use publication-title: Journal of the Association for Information Systems – volume: 49 start-page: 138 issue: 2 year: 2010 end-page: 150 ident: CR10 article-title: The impact of personal dispositions on information sensitivity privacy concern and trust in disclosing health information online publication-title: Decision Support Systems doi: 10.1016/j.dss.2010.01.010 – volume: 46 start-page: 74 issue: 9 year: 2003 end-page: 79 ident: CR34 article-title: Security and privacy issues of handheld and wearable wireless devices publication-title: Communications of the ACM doi: 10.1145/903893.903897 – volume: 12 start-page: 206 issue: 2 year: 1993 end-page: 215 ident: CR87 article-title: Direct mail privacy-efficiency trade-offs within an implied social contract framework publication-title: Journal of Public Policy and Marketing – volume: 3 start-page: 1 issue: 1 year: 2011 end-page: 25 ident: CR45 article-title: The Influence of interactivity on e-service offerings: an empirical examination of benefits and risks publication-title: AIS Transactions on Human-Computer Interaction – volume: 30 start-page: 455 issue: 4 year: 2002 end-page: 464 ident: CR105 article-title: The customer economics of internet privacy publication-title: Journal of the Academy of Marketing Science doi: 10.1177/009207002236917 – volume: 30 start-page: 661 issue: 3 year: 2006 end-page: 678 ident: CR132 article-title: Enhancing the design of Web navigation systems: the influence of user disorientation on engagement and performance publication-title: MIS Quarterly – start-page: 3 year: 1997 end-page: 19 ident: CR121 article-title: Markets self-regulation and government enforcement in the protection of personal information publication-title: Privacy and Self-Regulation in the Information Age – volume: 15 start-page: 249 issue: 4 year: 1999 end-page: 256 ident: CR19 article-title: Web security and privacy: an American perspective publication-title: Information Society doi: 10.1080/019722499128411 – volume: 17 start-page: 341 issue: 3 year: 1993 end-page: 363 ident: CR29 article-title: ‘How did they get my name’? An exploratory investigation of consumer attitudes toward secondary information use publication-title: MIS Quarterly doi: 10.2307/249775 – year: 1997 ident: CR21 publication-title: Privacy in the Information Age – volume: 35 start-page: iii issue: 2 year: 2011 end-page: xiv ident: CR51 article-title: An update and extension to SEM guidelines for administrative and social science research publication-title: MIS Quarterly – ident: CR95 – volume: 20 start-page: 167 issue: 2 year: 1996 end-page: 196 ident: CR110 article-title: Information privacy: measuring individuals’ concerns about organizational practices publication-title: MIS Quarterly doi: 10.2307/249477 – ident: CR43 – year: 2007 ident: CR130 publication-title: Engaging Privacy and Information Technology in a Digital Age – volume: 31 start-page: 498 issue: 5 year: 1988 end-page: 512 ident: CR26 article-title: Information technology and dataveillance publication-title: Communications of the ACM doi: 10.1145/42411.42413 – ident: CR53 – year: 1984 ident: CR106 publication-title: Philosophical Dimensions of Privacy: An Anthology doi: 10.1017/CBO9780511625138 – volume: 66 start-page: 308 issue: 3 year: 1981 end-page: 313 ident: CR126 article-title: Employee perceptions of invasion of privacy: a field simulation experiment publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.66.3.308 – year: 1978 ident: CR137 publication-title: Privacy – volume: 18 start-page: 454 issue: 4 year: 2007 end-page: 470 ident: CR58 article-title: Investigating the influence of the functional mechanisms of online product presentations publication-title: Information Systems Research doi: 10.1287/isre.1070.0124 – volume: 12 start-page: 248 issue: 2 year: 1973 end-page: 261 ident: CR60 article-title: A social-psychological examination of privacy publication-title: British Journal of Social Clinical Psychology doi: 10.1111/j.2044-8260.1973.tb00065.x – year: 1995 ident: CR82 publication-title: Privacy and Its Invasion – volume: 9 start-page: 114 issue: 4 year: 2004 end-page: 121 ident: CR83 article-title: Privacy, trust, and disclosure: Exploring barriers to electronic commerce publication-title: Journal of Computer-Mediated Communication – volume: 35 start-page: 91 issue: 1 year: 1985 end-page: 103 ident: CR129 article-title: Concern for personal privacy in an electronic age publication-title: Journal of Communication doi: 10.1111/j.1460-2466.1985.tb02236.x – volume: 86 start-page: 114 issue: 1 year: 2001 end-page: 121 ident: CR67 article-title: Accounting for common method variance in cross-sectional research designs publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.86.1.114 – volume: 14 start-page: 263 issue: 4 year: 1998 end-page: 274 ident: CR100 article-title: The distribution of privacy risks: who needs protection? publication-title: Information Society doi: 10.1080/019722498128719 – year: 1995 ident: CR127 publication-title: Life on the Screen: Identity in the Age of the Internet – volume: 30 start-page: 13 issue: 1 year: 2006 end-page: 28 ident: CR8 article-title: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization publication-title: MIS Quarterly – volume: 38 start-page: 54 issue: 2 year: 1974 end-page: 60 ident: CR123 article-title: The role of risk in consumer behavior publication-title: Journal of Marketing doi: 10.2307/1250198 – volume: 11 start-page: 215 issue: 3–4 year: 2002 end-page: 243 ident: CR91 article-title: Institution-based trust in inter organizational exchange relationships: the role of online B2B marketplaces on trust formation publication-title: Journal of Strategic Information Systems doi: 10.1016/S0963-8687(02)00017-3 – volume: 57 start-page: 81 issue: 1 year: 1993 end-page: 101 ident: CR88 article-title: Factors affecting trust in market research relationships publication-title: Journal of Marketing doi: 10.2307/1252059 – volume: 19 start-page: 27 issue: 1 year: 2000 end-page: 41 ident: CR96 article-title: Privacy concerns and consumer willingness to provide personal information publication-title: Journal of Public Policy and Marketing doi: 10.1509/jppm.19.1.27.16941 – year: 1975 ident: CR6 publication-title: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding – volume: 68 start-page: 459 issue: 3 year: 1983 end-page: 468 ident: CR118 article-title: Field experiment comparing information-privacy values beliefs and attitudes across several types of organizations publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.68.3.459 – year: 1980 ident: CR124 publication-title: Secrecy a Cross-Cultural Perspective – year: 1967 ident: CR133 publication-title: Privacy and Freedom – volume: 7 start-page: 1 issue: 5 year: 2001 end-page: 41 ident: CR32 article-title: Conducting research in information systems publication-title: Communications of the AIS – volume: 17 start-page: 147 issue: 2 year: 1997 end-page: 156 ident: CR92 article-title: Psychological Functions of Privacy publication-title: Journal of Environmental Psychology doi: 10.1006/jevp.1997.0049 – volume: 13 start-page: 36 issue: 1 year: 2002 end-page: 49 ident: CR116 article-title: An empirical examination of the concern for information privacy instrument publication-title: Information Systems Research doi: 10.1287/isre.13.1.36.97 – volume: 17 start-page: 61 issue: 1 year: 2006 end-page: 80 ident: CR37 article-title: An extended privacy calculus model for e-commerce transactions publication-title: Information Systems Research doi: 10.1287/isre.1060.0080 – volume: 4 start-page: 1 issue: 1 year: 2000 end-page: 78 ident: CR52 article-title: Structural equation modeling and regression: guidelines for research practice publication-title: Communications of AIS – volume: 31 start-page: 475 issue: 3 year: 2007 end-page: 500 ident: CR59 article-title: The effects of presentation methods and task complexity on online consumers’ product understanding publication-title: MIS Quarterly – volume: 30 start-page: 865 issue: 4 year: 2006 end-page: 890 ident: CR122 article-title: Understanding the impact of web personalization on user information processing behavior and judgment publication-title: MIS Quarterly – year: 1992 ident: CR14 publication-title: Regulating Privacy: Data Protection and Public Policy in Europe and the United States – volume: 30 start-page: 941 issue: 4 year: 2006 ident: CIT0063 publication-title: MIS Quarterly doi: 10.2307/25148760 – volume: 8 start-page: 349 issue: 3 year: 1990 ident: CIT0117 publication-title: Research in Personnel and Human Resources Management – ident: CIT0118 doi: 10.1037/0021-9010.68.3.459 – volume: 7 start-page: 19 issue: 1 year: 2006 ident: CIT0101 publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00077 – ident: CIT0084 doi: 10.1145/219663.219683 – ident: CIT0073 doi: 10.1111/j.1540-4560.1977.tb01879.x – ident: CIT0100 doi: 10.1080/019722498128719 – ident: CIT0013 doi: 10.1080/01972240490507956 – ident: CIT0036 doi: 10.2753/JEC1086-4415100201 – volume-title: Boundaries of Privacy: Dialectics of Disclosure year: 2002 ident: CIT0093 doi: 10.1353/book4588 – volume-title: Privacy and Freedom year: 1967 ident: CIT0133 – ident: CIT0112 doi: 10.2307/40041279 – volume: 30 start-page: 13 issue: 1 year: 2006 ident: CIT0008 publication-title: MIS Quarterly doi: 10.2307/25148715 – volume-title: Cognitive Psychology year: 2003 ident: CIT0115 – ident: CIT0081 doi: 10.1287/isre.13.3.334.81 – ident: CIT0028 doi: 10.1016/S0191-8869(98)00222-0 – volume: 30 start-page: 865 issue: 4 year: 2006 ident: CIT0122 publication-title: MIS Quarterly doi: 10.2307/25148757 – ident: CIT0046 doi: 10.1016/S1071-5819(03)00111-3 – volume: 10 start-page: 149 issue: 1 year: 1991 ident: CIT0054 publication-title: Journal of Public Policy and Marketing doi: 10.1177/074391569101000111 – volume: 12 start-page: 798 issue: 12 year: 2011 ident: CIT0135 publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00281 – volume-title: Introduction in Criminological Theories – Bridging the Past to the Future year: 2002 ident: CIT0027 – ident: CIT0034 doi: 10.1145/903893.903897 – ident: CIT0078 doi: 10.2307/248873 – ident: CIT0050 doi: 10.1037/0021-9010.65.5.623 – start-page: 3 volume-title: Privacy and Self-Regulation in the Information Age year: 1997 ident: CIT0121 – volume: 35 start-page: 989 issue: 4 year: 2011 ident: CIT0109 publication-title: MIS Quarterly doi: 10.2307/41409970 – start-page: 36 volume-title: Proceedings of the 6th Privacy Enhancing Technologies Symposium year: 2006 ident: CIT0002 doi: 10.1007/11957454_3 – ident: CIT0033 doi: 10.4018/irmj.2001100104 – ident: CIT0138 doi: 10.1177/0276146704263920 – volume-title: Secrecy a Cross-Cultural Perspective year: 1980 ident: CIT0124 – ident: CIT0060 doi: 10.1111/j.2044-8260.1973.tb00065.x – ident: CIT0131 doi: 10.2307/1321160 – ident: CIT0077 doi: 10.1080/019722499128565 – ident: CIT0042 doi: 10.1207/s15327744joce1602_2 – ident: CIT0067 doi: 10.1037/0021-9010.86.1.114 – ident: CIT0107 doi: 10.1509/jppm.19.1.62.16949 – start-page: 295 volume-title: Modern Methods for Business Research year: 1998 ident: CIT0025 – volume-title: Privacy and Government Data Banks: An International Perspective year: 1979 ident: CIT0048 – ident: CIT0062 doi: 10.1145/767193.767196 – ident: CIT0092 doi: 10.1006/jevp.1997.0049 – ident: CIT0020 doi: 10.1037/h0046016 – ident: CIT0088 doi: 10.2307/1252059 – volume-title: Proceedings of the 10th International Conference on User Modeling year: 2005 ident: CIT0114 – ident: CIT0098 doi: 10.1007/s10796-006-9013-4 – ident: CIT0041 doi: 10.1086/209386 – ident: CIT0072 doi: 10.1287/mnsc.1060.0597 – ident: CIT0049 doi: 10.1016/j.chb.2010.03.016 – ident: CIT0089 doi: 10.1080/019722499128592 – volume-title: Managing Privacy: Information Technology and Corporate America year: 1994 ident: CIT0108 – ident: CIT0105 doi: 10.1177/009207002236917 – ident: CIT0086 doi: 10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9 – volume-title: Alone Together: Why We Expect More from Technology and Less from Each Other year: 2011 ident: CIT0128 – ident: CIT0010 doi: 10.1016/j.dss.2010.01.010 – volume-title: Philosophical Dimensions of Privacy: An Anthology year: 1984 ident: CIT0106 doi: 10.1017/CBO9780511625138 – ident: CIT0068 doi: 10.1016/j.im.2004.01.003 – ident: CIT0003 doi: 10.2307/3250951 – ident: CIT0136 doi: 10.2753/MIS0742-1222260305 – volume-title: Privacy year: 1978 ident: CIT0137 – ident: CIT0012 doi: 10.1016/S0963-8687(02)00018-5 – ident: CIT0085 doi: 10.1287/orsc.11.1.35.12567 – ident: CIT0091 doi: 10.1016/S0963-8687(02)00017-3 – ident: CIT0030 doi: 10.1287/orsc.10.1.104 – ident: CIT0040 doi: 10.1016/j.jsis.2007.09.002 – volume: 31 start-page: 623 issue: 4 year: 2007 ident: CIT0094 publication-title: MIS Quarterly doi: 10.2307/25148814 – ident: CIT0058 doi: 10.1287/isre.1070.0124 – volume-title: Criminological Theories: Introduction, Evaluations, and Application year: 2001 ident: CIT0004 – volume-title: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding year: 1975 ident: CIT0006 – volume-title: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society year: 2005 ident: CIT0055 – ident: CIT0018 doi: 10.1287/isre.1060.0096 – ident: CIT0035 doi: 10.1080/01449290410001715723 – ident: CIT0031 doi: 10.1111/1540-4560.00067 – ident: CIT0071 doi: 10.1287/isre.1040.0032 – ident: CIT0096 doi: 10.1509/jppm.19.1.27.16941 – ident: CIT0097 doi: 10.1037/0021-9010.88.5.879 – start-page: 3 volume-title: Man-Environment Interactions: Evaluations and Applications: Part 2 year: 1974 ident: CIT0005 – ident: CIT0102 doi: 10.1145/257874.257896 – volume: 9 start-page: 114 issue: 4 year: 2004 ident: CIT0083 publication-title: Journal of Computer-Mediated Communication – ident: CIT0126 doi: 10.1037/0021-9010.66.3.308 – volume: 30 start-page: 679 issue: 3 year: 2006 ident: CIT0120 publication-title: MIS Quarterly doi: 10.2307/25148745 – ident: CIT0123 doi: 10.2307/1250198 – volume: 33 start-page: 445 issue: 3 year: 2009 ident: CIT0017 publication-title: MIS Quarterly doi: 10.2307/20650304 – volume: 30 start-page: 661 issue: 3 year: 2006 ident: CIT0132 publication-title: MIS Quarterly doi: 10.2307/25148744 – volume-title: The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? year: 1998 ident: CIT0016 – ident: CIT0076 doi: 10.1207/s15327906mbr0903_1 – volume-title: Privacy and Its Invasion year: 1995 ident: CIT0082 doi: 10.5040/9798216001362 – ident: CIT0129 doi: 10.1111/j.1460-2466.1985.tb02236.x – volume-title: Engaging Privacy and Information Technology in a Digital Age year: 2007 ident: CIT0130 – volume-title: Proceedings of the 28th Annual International Conference on Information Systems (ICIS) year: 2007 ident: CIT0134 – volume-title: Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008) year: 2008 ident: CIT0009 – volume-title: Theory of Cognitive Dissonance year: 1957 ident: CIT0047 doi: 10.1515/9781503620766 – volume-title: Privacy in the Information Age year: 1997 ident: CIT0021 – volume: 12 start-page: 206 issue: 2 year: 1993 ident: CIT0087 publication-title: Journal of Public Policy and Marketing doi: 10.1177/074391569101200206 – ident: CIT0075 doi: 10.1111/1540-4560.00063 – volume: 32 start-page: 503 issue: 3 year: 2008 ident: CIT0113 publication-title: MIS Quarterly doi: 10.2307/25148854 – ident: CIT0125 doi: 10.1080/019722499128538 – ident: CIT0099 doi: 10.1111/j.1083-6101.2007.00380.x – ident: CIT0037 doi: 10.1287/isre.1060.0080 – volume: 4 start-page: 1 issue: 1 year: 2000 ident: CIT0052 publication-title: Communications of AIS – ident: CIT0110 doi: 10.2307/249477 – volume: 31 start-page: 475 issue: 3 year: 2007 ident: CIT0059 publication-title: MIS Quarterly doi: 10.2307/25148804 – ident: CIT0074 doi: 10.1111/1540-4560.00071 – ident: CIT0038 doi: 10.2979/ESJ.2006.4.3.25 – volume: 35 start-page: iii issue: 2 year: 2011 ident: CIT0051 publication-title: MIS Quarterly doi: 10.2307/23044042 – volume-title: Regulating Privacy: Data Protection and Public Policy in Europe and the United States year: 1992 ident: CIT0014 doi: 10.7591/9781501722134 – volume-title: The Unwanted Gaze: The Destruction of Privacy in America year: 2000 ident: CIT0104 – ident: CIT0007 doi: 10.2307/3150783 – ident: CIT0065 doi: 10.1111/j.1540-4560.1977.tb01880.x – start-page: 69 volume-title: Judgment Calls in Research year: 1982 ident: CIT0080 – ident: CIT0026 doi: 10.1145/42411.42413 – ident: CIT0029 doi: 10.2307/249775 – ident: CIT0069 doi: 10.1016/j.dss.2010.02.008 – ident: CIT0066 doi: 10.1016/j.dss.2011.01.017 – ident: CIT0116 doi: 10.1287/isre.13.1.36.97 – volume: 13 start-page: 380 issue: 1 year: 2004 ident: CIT0119 publication-title: Communications of AIS – start-page: 147 volume-title: Proceedings of the National Conference on Digital Government Research year: 2001 ident: CIT0023 – volume-title: The Digital Person: Technology and Privacy in the Information Age year: 2004 ident: CIT0111 – ident: CIT0011 doi: 10.1037/0022-3514.51.6.1173 – volume: 7 start-page: 1 issue: 5 year: 2001 ident: CIT0032 publication-title: Communications of the AIS – ident: CIT0064 doi: 10.1057/jit.2010.6 – volume-title: Secrets: On the Ethics of Concealment and Revelation year: 1989 ident: CIT0015 – volume-title: Life on the Screen: Identity in the Age of the Internet year: 1995 ident: CIT0127 – ident: CIT0061 doi: 10.1111/j.1540-4560.1977.tb01882.x – volume: 31 start-page: 19 issue: 1 year: 2007 ident: CIT0057 publication-title: MIS Quarterly doi: 10.2307/25148779 – volume: 3 start-page: 1 issue: 1 year: 2011 ident: CIT0045 publication-title: AIS Transactions on Human-Computer Interaction doi: 10.17705/1thci.00024 – ident: CIT0019 doi: 10.1080/019722499128411 – volume: 31 start-page: 809 issue: 4 year: 2007 ident: CIT0079 publication-title: MIS Quarterly doi: 10.2307/25148821 – volume-title: Psychometric Theory year: 1978 ident: CIT0090 – volume-title: The Limits of Privacy year: 1999 ident: CIT0044 – ident: CIT0056 doi: 10.1016/j.elerap.2009.05.001 – start-page: 21 volume-title: Proceedings of the 5th ACM Electronic Commerce Conference year: 2004 ident: CIT0001 doi: 10.1145/988772.988777 – ident: CIT0039 doi: 10.1057/palgrave.ejis.3000590 |
SSID | ssj0020941 |
Score | 2.518145 |
Snippet | Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is... |
SourceID | proquest crossref springer informaworld |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 295 |
SubjectTerms | Anonymity Business and Management Business Information Systems confidentiality control Efficient markets Information control Information systems Information Systems and Communication Service Information theory Innovation/Technology Management Literature reviews Management information systems Marketing Operations Research/Decision Theory Politics Privacy Research Article risk secrecy Studies Subject fields |
Title | Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts |
URI | https://www.tandfonline.com/doi/abs/10.1057/ejis.2012.23 https://link.springer.com/article/10.1057/ejis.2012.23 https://www.proquest.com/docview/1325908519 https://www.proquest.com/docview/1622284665 |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bT9swFD4a8DIeJmCbKAPkSRsvk0caJ26ylwkQHZoEm6Yh9c2KL2EdkHZrisS_5xzHKS0CHp34IvnYx9_x5fsAPuhc40LuBCciFp6g_-N55DQXssD1OzU29mQ6p2fy5Dz5PkgHYcNtEq5Vtj7RO2o7MrRHvo9RE8lzI-D4Ov7HSTWKTleDhMYSrKALzjD4Wjk8Pvv5axZyYfDiNfMQp3MsPAhX3xGk7Lu_Q6Lr7safY7GwKC1Qli4AzwdnpX4J6q_Bq4Ad2UFj7HV44aoNWJ1jFNyAnfAOge2x8NCIOp6FGfwaLue_YjM3hbllRWWZIZWOKwKeXzDN3PV46MlDGPFvXo9rVo9Y87jLZ7fkGqqL6XDyp62GN-WpKv8ScvIGzvvHv49OeNBb4Eb0sppr64TTtsAEhhkyyaTfH-omzmW5xq-RzVyKhjWlSVKdI9bJZNGVJpcagU4h3sJyNarcJrDIJkb3jBBWl4nEAaFtVqa6VzihS2GiDnxqO1yZQEZOmhhXyh-Kpz1F5lFkHhWLDnyc5R43JBxP5Ivmbadqv-lRNgolSjxeZLu1rwqzd6Lux1oH3s9-47yjw5SicqMp5pHUN4mUaQf22nExV8UjbW0939Y7eBl7rQ26TbkNy_X_qdtBxFPrXVjK-t92w-DG1Gn3xx1_UATL |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcoAeUCkgFlowEu0FmWZjx5sgIYSAZUsfp1bam4kfoQttdmGzoP6p_kZmnGTZRYVbj0kcO8qM52F7vg_guckMOnIvOAGxcIn2j2eRN1yoHP13Yl0cwHQOj9TgRH4aJsMVuGxrYehYZWsTg6F2Y0tr5LuYNRE9NwYcbybfObFG0e5qS6FRq8W-v_iFKdv09d57lO92HPc_HL8b8IZVgFvRSytunBfeuBwvMJhWMlVhFaQrvU8zg3cjl_oEP98WViYmQ4-eqryrbKYMuvNcYL834KYUIqMZlfY_zhM8TJUCQx9mBRw_ddgctMeQaNd_HRE4eDd-GYslF7gEkLoU5v61MxscXn8d7jSRKntbq9ZdWPHlBqwt4BduwFZT9cB2WFPWRGJmjb24B98W7-IwP3N7wfLSMUucIGcU5r7Ca-bPJ6MAVcII7fN8UrFqzOpSstDckSEqv8xG09O2G16_T12FusvpfTi5Fjk8gNVyXPqHwCInrelZIZwppEL1My4tEtPLvTCFsFEHXrQ_XNsG-pwYOM502IJPeprEo0k8OhYd2J63ntSQH_9oFy3KTldhiaWo-VC0uPqVzVa-urEVU_1HszvwbP4YZzlt3eSlH8-wjaJ_I5VKOrDT6sVCF1eM9ej_Yz2FW4PjwwN9sHe0_xhux4Hlg85xbsJq9WPmtzDWqsyToOAMPl_3jPoNXrU9hQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VIiE48CggAi0sEu0FbeJ47Y2NhBCiRC2lhQOVctt6H6bpwwnEAZWfxl_hzzCztkNSFW49cLSzXieTb-exO_MNwDOdajTkTnAiYuER6j-eBk5zITO037GxoSfT2d2TW_vRu0E8WIKfTS0MpVU2OtErajsytEfewaiJ2nOjw9HJ67SIj5v9V-MvnDpI0Ulr006jgsiOO_uO4dvk5fYm_tfrYdh_--nNFq87DHAjeknJtXXCaZvhBTrWMkqk3xHpRs4lqca7gU1cjD_F5CaKdYrWPZFZV5pUajTtmcB5r8DVXiQTSifc7X6YBXsYNvlufRghcPzagzrpHt2jjjsaElF4N2yHYsEcLpClLri8505pvfHr34JfjdiqnJfj9rTUbfPjHKPk_ynX23Cz9snZ62oR3YElV6zAjTmmxhVYq-s72AarC7gI0KzWjHfheP4uCvFbZs5YVlhmqPvJCTn0L_CaudPx0JOyMOI1PR2XrByxqmjOD7ekcovP0-HksJmGV8_TVL7CdHIP9i9FGvdhuRgV7gGwwEZG94wQVueRxIWmbZLHupc5oXNhghY8b-CkTE3yTr1GTpRPNoh7isCnCHwqFC1Yn40eV-QmfxkXzCNTlX4zKa86vyhx8SOrDdxUrRUn6g_WWvB09jHqMzqkygo3muIYSbKJpIxbsNGgfm6KC9718N_vegLXENHq_fbeziO4Hvp2JpSwugrL5depW0OnstSP_eplcHDZsP4Ng5KI0w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Information+privacy+and+correlates%3A+an+empirical+attempt+to+bridge+and+distinguish+privacy-related+concepts&rft.jtitle=European+journal+of+information+systems&rft.au=Dinev%2C+Tamara&rft.au=Xu%2C+Heng&rft.au=Smith%2C+Jeff+H&rft.au=Hart%2C+Paul&rft.date=2013-05-01&rft.pub=Palgrave+Macmillan+UK&rft.issn=0960-085X&rft.eissn=1476-9344&rft.volume=22&rft.issue=3&rft.spage=295&rft.epage=316&rft_id=info:doi/10.1057%2Fejis.2012.23&rft.externalDocID=10_1057_ejis_2012_23 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-085X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-085X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-085X&client=summon |