{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:05:11Z","timestamp":1769843111029,"version":"3.49.0"},"publisher-location":"Cham","reference-count":80,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030827854","type":"print"},{"value":"9783030827861","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006498","name":"Clemson University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006498","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Imagine that you are a product manager at a software company. When users disclose some information to your product, they can use all the great features you and your team have integrated into the software. Utilizing these features is essential for the success of your product: it makes users satisfied and encourages others to use the software as well. Furthermore, the user and usage data can be used to improve the product and help implementing new features over time. However, since your product collects users\u2019 data, you are worried about privacy-related issues. What causes users\u2019 privacy concerns, and what are the potential consequences of those concerns? The APCO (<jats:bold>A<\/jats:bold>ntecedents \u2192 <jats:bold>P<\/jats:bold>rivacy <jats:bold>C<\/jats:bold>oncerns \u2192 <jats:bold>O<\/jats:bold>utcomes) and enhanced APCO models provide a summary of the current scientific findings related to these questions and present them in a conceptual model. The APCO framework will help practitioners and scholars to bring different privacy-related aspects of a product to their attention and suggests how these aspects can interrelate. Throughout this chapter, we will consider a use case scenario of a fitness tracker application and discuss how APCO applies to this scenario.<\/jats:p>","DOI":"10.1007\/978-3-030-82786-1_3","type":"book-chapter","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T14:02:49Z","timestamp":1644415369000},"page":"43-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Revisiting APCO"],"prefix":"10.1007","author":[{"given":"Christoph","family":"Buck","sequence":"first","affiliation":[]},{"given":"Tamara","family":"Dinev","sequence":"additional","affiliation":[]},{"given":"Reza Ghaiumy","family":"Anaraky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,9]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Li, Y. (2011) Empirical studies on online information privacy concerns: Literature review and an integrative framework. CAIS 28. https:\/\/doi.org\/10.17705\/1CAIS.02828","DOI":"10.17705\/1CAIS.02828"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., and R.E. Crossler. 2011. Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly 35: 1017\u20131A36.","journal-title":"MIS Quarterly"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H.J., T. Dinev, and H. Xu. 2011. Information privacy research: An interdisciplinary review. MIS Quarterly 35: 989\u20131015.","journal-title":"MIS Quarterly"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1057\/s41303-017-0056-z","volume":"26","author":"ZD Ozdemir","year":"2017","unstructured":"Ozdemir, Z.D., H. Jeff Smith, and J.H. Benamati. 2017. Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems 26: 642\u2013660. https:\/\/doi.org\/10.1057\/s41303-017-0056-z.","journal-title":"European Journal of Information Systems"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2015.0600","volume":"26","author":"T Dinev","year":"2015","unstructured":"Dinev, T., A.R. McConnell, and H.J. Smith. 2015. Research Commentary\u2014Informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the \u201cAPCO\u201d box. Information Systems Research 26: 639\u2013655. https:\/\/doi.org\/10.1287\/isre.2015.0600.","journal-title":"Information Systems Research"},{"key":"3_CR6","volume-title":"A privacy paradox: Social networking in the United States","author":"SB Barnes","year":"2006","unstructured":"Barnes, S.B. 2006. A privacy paradox: Social networking in the United States. First Monday."},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., D.R. Horne, and D.A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41: 100\u2013126.","journal-title":"Journal of Consumer Affairs"},{"key":"3_CR8","unstructured":"Xu, H., T. Dinev, H.J. Smith, and P. Hart. 2008. Examining the formation of individual\u2019s privacy concerns: Toward an integrative view. In ICIS 2008 Proceedings."},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H.J., S.J. Milberg, and S.J. Burke. 1996. Information privacy: Measuring individuals\u2019 concerns about organizational practices. MIS Quarterly 20: 167. https:\/\/doi.org\/10.2307\/249477.","journal-title":"MIS Quarterly"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., S.S. Kim, and J. Agarwal. 2004. Internet Users\u2019 Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15: 336\u2013355. https:\/\/doi.org\/10.1287\/isre.1040.0032.","journal-title":"Information Systems Research"},{"key":"3_CR11","unstructured":"Cespedes, F.V., and H. Jeff Smith. 1993. Database marketing: New rules for policy and practice. Sloan Management Review 34. https:\/\/www.proquest.com\/openview\/8ce0a3e960946f7a684c13badd19eb89\/1?pq-origsite=gscholar&cbl=26142."},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1002\/dir.4000090307","volume":"9","author":"GJ Nowak","year":"1995","unstructured":"Nowak, G.J., and J. Phelps. 1995. Direct marketing and the use of individual-level consumer information: Determining how and when \u201cprivacy\u201d matters. Journal of Direct Marketing 9 (3): 46\u201360. https:\/\/doi.org\/10.1002\/dir.4000090307.","journal-title":"Journal of Direct Marketing"},{"issue":"5","key":"3_CR13","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1111\/1467-6494.7105001","volume":"71","author":"A Terracciano","year":"2003","unstructured":"Terracciano, A., R.R. McCrae, D. Hagemann, and P.T. Costa Jr. 2003. Individual difference variables, affective differentiation, and the structures of affect. Journal of Personality 71 (5): 669\u2013704. https:\/\/doi.org\/10.1111\/1467-6494.7105001.","journal-title":"Journal of Personality"},{"issue":"4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/08874417.2008.11646031","volume":"48","author":"ML Korzaan","year":"2008","unstructured":"Korzaan, M.L., and K.T. Boswell. 2008. The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems 48 (4): 15\u201324. https:\/\/doi.org\/10.1080\/08874417.2008.11646031.","journal-title":"Journal of Computer Information Systems"},{"key":"3_CR15","first-page":"125","volume-title":"ICIS 2007 Proceedings","author":"H Xu","year":"2007","unstructured":"Xu, H. 2007. The effects of self-construal and perceived control on privacy concerns. In ICIS 2007 Proceedings, 125. http:\/\/aisel.aisnet.org\/icis2007\/125."},{"issue":"6","key":"3_CR16","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1057\/ejis.2014.41","volume":"24","author":"G Bansal","year":"2015","unstructured":"Bansal, G., and D. Gefen. 2015. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems 24 (6): 624\u2013644. https:\/\/doi.org\/10.1057\/ejis.2014.41.","journal-title":"European Journal of Information Systems"},{"key":"3_CR17","first-page":"45","volume-title":"ICIS 2004 Proceedings","author":"Y Lu","year":"2004","unstructured":"Lu, Y., B. Tan, and K.-L. Hui. 2004. Inducing customers to disclose personal information to internet businesses with social adjustment benefits. In ICIS 2004 Proceedings, 45. https:\/\/aisel.aisnet.org\/icis2004\/45."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M.J., and P.K. Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science 10: 104\u2013115. https:\/\/doi.org\/10.1287\/orsc.10.1.104.","journal-title":"Organization Science"},{"issue":"4","key":"3_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1080\/08874417.2004.11647599","volume":"44","author":"K Chen","year":"2004","unstructured":"Chen, K., and A.I. Rea Jr. 2004. Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems 44 (4): 85\u201392. https:\/\/doi.org\/10.1080\/08874417.2004.11647599.","journal-title":"Journal of Computer Information Systems"},{"issue":"6","key":"3_CR20","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1089\/cpb.2007.0240","volume":"11","author":"S Youn","year":"2008","unstructured":"Youn, S., and K. Hall. 2008. Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyberpsychology and Behavior 11 (6): 763\u2013765. https:\/\/doi.org\/10.1089\/cpb.2007.0240.","journal-title":"Cyberpsychology and Behavior"},{"issue":"2","key":"3_CR21","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/15252019.2010.10722168","volume":"10","author":"MG Hoy","year":"2010","unstructured":"Hoy, M.G., and G. Milne. 2010. Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising 10 (2): 28\u201345. https:\/\/doi.org\/10.1080\/15252019.2010.10722168.","journal-title":"Journal of Interactive Advertising"},{"issue":"5","key":"3_CR22","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., E.J. Johnson, S.J. Kobrin, and G.L. Lohse. 2004. International differences in information privacy concerns: A global survey of consumers. The Information Society 20 (5): 313\u2013324. https:\/\/doi.org\/10.1080\/01972240490507956.","journal-title":"The Information Society"},{"key":"3_CR23","unstructured":"Fishbein, M, and I. Ajzen. 1975. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research."},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security 64: 122\u2013134. https:\/\/doi.org\/10.1016\/j.cose.2015.07.002.","journal-title":"Computers & Security"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/b104899_7","volume-title":"Internet Policy and Economics","author":"HR Varian","year":"2009","unstructured":"Varian, H.R. 2009. Economic aspects of personal privacy. In Internet Policy and Economics, ed. L.M. Pupillo and W.H. Lehr, 2nd ed., 101\u2013109. Dordrecht: Springer.","edition":"2"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy Magazine 3: 26\u201333. https:\/\/doi.org\/10.1109\/MSP.2005.22.","journal-title":"IEEE Security & Privacy Magazine"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","volume":"37","author":"W Hong","year":"2013","unstructured":"Hong, W., and J.Y.L. Thong. 2013. Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly 37: 275\u2013298.","journal-title":"MIS Quarterly"},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., and P. Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information systems research 17: 61\u201380. https:\/\/doi.org\/10.1287\/isre.1060.0080.","journal-title":"Information systems research"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","volume":"13","author":"KA Stewart","year":"2002","unstructured":"Stewart, K.A., and A.H. Segars. 2002. An empirical examination of the concern for information privacy instrument. Information systems research 13: 36\u201349. https:\/\/doi.org\/10.1287\/isre.13.1.36.97.","journal-title":"Information systems research"},{"issue":"4","key":"3_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/299157.299175","volume":"42","author":"DL Hoffman","year":"1999","unstructured":"Hoffman, D.L., T.P. Novak, and M. Peralta. 1999. Building consumer trust online. Communications of the ACM 42 (4): 80\u201385. https:\/\/doi.org\/10.1145\/299157.299175.","journal-title":"Communications of the ACM"},{"key":"3_CR31","unstructured":"Xu, H., S. Gupta, M. Rosson, and J. Carroll. 2012. Measuring mobile users\u2019 concerns for information privacy. In ICIS 2012 Proceedings."},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"RS Laufer","year":"1977","unstructured":"Laufer, R.S., and M. Wolfe. 1977. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues 33: 22\u201342. https:\/\/doi.org\/10.1111\/j.1540-4560.1977.tb01880.x.","journal-title":"J Social Issues"},{"issue":"1","key":"3_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2307\/1884852","volume":"69","author":"HA Simon","year":"1955","unstructured":"Simon, H.A. 1955. A behavioral model of rational choice. The Quarterly Journal of Economics 69 (1): 99\u2013118. https:\/\/doi.org\/10.2307\/1884852.","journal-title":"The Quarterly Journal of Economics"},{"key":"3_CR34","volume-title":"WEIS","author":"J Grossklags","year":"2007","unstructured":"Grossklags, J., and A. Acquisti. 2007. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In WEIS. https:\/\/econinfosec.org\/archive\/weis2007\/papers\/66.pdf."},{"issue":"1","key":"3_CR35","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1015044207315","volume":"13","author":"EJ Johnson","year":"2002","unstructured":"Johnson, E.J., S. Bellman, and G.L. Lohse. 2002. Defaults, framing and privacy: Why opting in-opting out 1. Marketing Letters 13 (1): 5\u201315. https:\/\/doi.org\/10.1023\/A:1015044207315.","journal-title":"Marketing Letters"},{"key":"3_CR36","first-page":"1","volume-title":"Proceedings of the 23rd International Conference on Intelligent User Interfaces Companion","author":"P Bahirat","year":"2018","unstructured":"Bahirat, P., Q. Sun, and B.P. Knijnenburg. 2018. Scenario context V\/s framing and defaults in managing privacy in household IoT. In Proceedings of the 23rd International Conference on Intelligent User Interfaces Companion, 1\u20132."},{"key":"3_CR37","first-page":"iii","volume":"37","author":"PB Goes","year":"2013","unstructured":"Goes, P.B. 2013. Editor\u2019s Comments: Information systems research and behavioral economics. MIS Quarterly 37: iii\u2013viii.","journal-title":"MIS Quarterly"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Adjerid, I., E. Peer, A. Acquisti. 2016. Beyond the Privacy Paradox: Objective Versus Relative Risk in Privacy Decision Making.","DOI":"10.2139\/ssrn.2765097"},{"key":"3_CR39","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1111\/isj.12062","volume":"25","author":"F Kehr","year":"2015","unstructured":"Kehr, F., T. Kowatsch, D. Wentzel, and E. Fleisch. 2015. Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal 25: 607\u2013635. https:\/\/doi.org\/10.1111\/isj.12062.","journal-title":"Information Systems Journal"},{"key":"3_CR40","first-page":"636","volume-title":"IEEE 8th International Symposium on Service-Oriented System Engineering (SOSE), Oxford, United Kingdom, 7\u201311 April 2014 [including workshop\/symposium papers]","author":"N Kordzadeh","year":"2014","unstructured":"Kordzadeh, N., and J. Warren. 2014. Communicating personal health information in virtual health communities: A theoretical framework. In IEEE 8th International Symposium on Service-Oriented System Engineering (SOSE), Oxford, United Kingdom, 7\u201311 April 2014 [including workshop\/symposium papers], 636\u2013645. Piscataway, NJ: IEEE."},{"key":"3_CR41","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/07421222.2015.1063305","volume":"32","author":"J Yu","year":"2015","unstructured":"Yu, J., P.J.-H. Hu, and T.-H. Cheng. 2015. Role of affect in self-disclosure on social network websites: A test of two competing models. Journal of Management Information Systems 32: 239\u2013277. https:\/\/doi.org\/10.1080\/07421222.2015.1063305.","journal-title":"Journal of Management Information Systems"},{"key":"3_CR42","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jsis.2013.01.003","volume":"22","author":"R Wakefield","year":"2013","unstructured":"Wakefield, R. 2013. The influence of user affect in online information disclosure. The Journal of Strategic Information Systems 22: 157\u2013174. https:\/\/doi.org\/10.1016\/j.jsis.2013.01.003.","journal-title":"The Journal of Strategic Information Systems"},{"key":"3_CR43","doi-asserted-by":"publisher","first-page":"247","DOI":"10.17705\/1jais.00491","volume":"19","author":"J Gerlach","year":"2018","unstructured":"Gerlach, J., P. Buxmann, and T. Dinev. 2018. \u2018They\u2019re All the Same!\u2019 Stereotypical thinking and systematic errors in users\u2019 privacy-related judgments about online services. Journal of the Association for Information Systems 19: 247\u2013265.","journal-title":"Journal of the Association for Information Systems"},{"key":"3_CR44","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1111\/isj.12082","volume":"25","author":"MJ Keith","year":"2015","unstructured":"Keith, M.J., J.S. Babb, P.B. Lowry, C.P. Furner, and A. Abdullat. 2015. The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal 25: 637\u2013667. https:\/\/doi.org\/10.1111\/isj.12082.","journal-title":"Information Systems Journal"},{"key":"3_CR45","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.25300\/MISQ\/2013\/37.4.07","volume":"37","author":"J Sutanto","year":"2013","unstructured":"Sutanto, J., E. Palme, C.-H. Tan, and C.W. Phang. 2013. Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly 37: 1141\u20131164.","journal-title":"MIS Quarterly"},{"key":"3_CR46","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1080\/07421222.2017.1334467","volume":"34","author":"S Karwatzki","year":"2017","unstructured":"Karwatzki, S., O. Dytynko, M. Trenz, and D. Veit. 2017. Beyond the personalization\u2013privacy paradox: Privacy valuation, transparency features, and service personalization. Journal of Management Information Systems 34: 369\u2013400. https:\/\/doi.org\/10.1080\/07421222.2017.1334467.","journal-title":"Journal of Management Information Systems"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Choi, B., Y. Wu, J. Yu, and L. Land. 2018. Love at First Sight: The Interplay Between Privacy Dispositions and Privacy Calculus in Online Social Connectivity Management. 1536\u20139323","DOI":"10.17705\/1jais.00487"},{"key":"3_CR48","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1057\/s41303-016-0031-0","volume":"26","author":"H-P Shih","year":"2017","unstructured":"Shih, H.-P., K.-h. Lai, and T.C.E. Cheng. 2017. Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters? European Journal of Information Systems 26: 432\u2013450. https:\/\/doi.org\/10.1057\/s41303-016-0031-0.","journal-title":"European Journal of Information Systems"},{"key":"3_CR49","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1057\/jit.2016.4","volume":"32","author":"S Spiekermann","year":"2017","unstructured":"Spiekermann, S., and J. Korunovska. 2017. Towards a value theory for personal data. Journal of Information Technology 32: 62\u201384. https:\/\/doi.org\/10.1057\/jit.2016.4.","journal-title":"Journal of Information Technology"},{"key":"3_CR50","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1057\/s41303-017-0066-x","volume":"26","author":"PB Lowry","year":"2017","unstructured":"Lowry, P.B., T. Dinev, and R. Willison. 2017. Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems 26: 546\u2013563. https:\/\/doi.org\/10.1057\/s41303-017-0066-x.","journal-title":"European Journal of Information Systems"},{"key":"3_CR51","unstructured":"Sullivan, J., R. Scheepers, and C. Middleton. 2009. Conceptualizing user satisfaction in the ubiquitous computing era. In ICIS 2009 Proceedings."},{"key":"3_CR52","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-88-470-2838-8_5","volume-title":"New Business Models and Value Creation: A Service Science Perspective","author":"G Merli","year":"2013","unstructured":"Merli, G. 2013. The transformation of the business model: Business modelling. In New Business Models and Value Creation: A Service Science Perspective, ed. L. Cinquini, A. Di Minin, and R. Varaldo, 67\u201386. Milan: Springer."},{"key":"3_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11747-007-0069-6","volume":"36","author":"SL Vargo","year":"2008","unstructured":"Vargo, S.L., and R.F. Lusch. 2008. Service-dominant logic: Continuing the evolution. Journal of the Academy of Marketing Science 36: 1\u201310. https:\/\/doi.org\/10.1007\/s11747-007-0069-6.","journal-title":"Journal of the Academy of Marketing Science"},{"key":"3_CR54","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1057\/ejis.2012.23","volume":"22","author":"T Dinev","year":"2013","unstructured":"Dinev, T., H. Xu, J.H. Smith, and P. Hart. 2013. Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems 22: 295\u2013316. https:\/\/doi.org\/10.1057\/ejis.2012.23.","journal-title":"European Journal of Information Systems"},{"key":"3_CR55","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jsis.2014.09.001","volume":"24","author":"J Gerlach","year":"2015","unstructured":"Gerlach, J., T. Widjaja, and P. Buxmann. 2015. Handle with care: How online social network providers\u2019 privacy policies impact users\u2019 information sharing behavior. The Journal of Strategic Information Systems 24: 33\u201343. https:\/\/doi.org\/10.1016\/j.jsis.2014.09.001.","journal-title":"The Journal of Strategic Information Systems"},{"key":"3_CR56","doi-asserted-by":"publisher","unstructured":"Kim, J., R.L. Baskerville, and Y. Ding. 2018. Breaking the privacy kill chain: Protecting individual and group privacy online. Information Systems Frontiers.\nhttps:\/\/doi.org\/10.1007\/s10796-018-9856-5.","DOI":"10.1007\/s10796-018-9856-5"},{"key":"3_CR57","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1287\/isre.2015.0602","volume":"26","author":"BCF Choi","year":"2015","unstructured":"Choi, B.C.F., Z. Jiang, B. Xiao, and S.S. Kim. 2015. Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding. Information Systems Research 26: 675\u2013694. https:\/\/doi.org\/10.1287\/isre.2015.0602.","journal-title":"Information Systems Research"},{"key":"3_CR58","doi-asserted-by":"publisher","unstructured":"Teubner, T., and C. Flath. 2019. Privacy in the sharing economy. Journal of the Association for Information Systems 20. https:\/\/doi.org\/10.17705\/1jais.00534.","DOI":"10.17705\/1jais.00534"},{"key":"3_CR59","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1111\/isj.12080","volume":"25","author":"KE Greenaway","year":"2015","unstructured":"Greenaway, K.E., Y.E. Chan, and R.E. Crossler. 2015. Company information privacy orientation: A conceptual framework. Information Systems Journal 25: 579\u2013606. https:\/\/doi.org\/10.1111\/isj.12080.","journal-title":"Information Systems Journal"},{"key":"3_CR60","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1057\/ejis.2013.18","volume":"23","author":"MC Oetzel","year":"2014","unstructured":"Oetzel, M.C., and S. Spiekermann. 2014. A systematic methodology for privacy impact assessments: A design science approach. European Journal of Information Systems 23: 126\u2013150. https:\/\/doi.org\/10.1057\/ejis.2013.18.","journal-title":"European Journal of Information Systems"},{"key":"3_CR61","doi-asserted-by":"publisher","unstructured":"Gutwirth, S., R. Leenes, P. De Hert, and (Eds.). 2015. Reforming European Data Protection Law. Vol. 20. Dordrecht: Springer. https:\/\/doi.org\/10.1016\/B978-0-12-802122-4.00002-X.","DOI":"10.1016\/B978-0-12-802122-4.00002-X"},{"key":"3_CR62","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1287\/isre.1120.0416","volume":"23","author":"H Xu","year":"2012","unstructured":"Xu, H., H.-H. Teo, B.C.Y. Tan, and R. Agarwal. 2012b. Research Note \u2014Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research 23: 1342\u20131363. https:\/\/doi.org\/10.1287\/isre.1120.0416.","journal-title":"Information Systems Research"},{"key":"3_CR63","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1057\/ejis.2013.17","volume":"23","author":"CL Miltgen","year":"2014","unstructured":"Miltgen, C.L., and D. Peyrat-Guillard. 2014. Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems 23: 103\u2013125. https:\/\/doi.org\/10.1057\/ejis.2013.17.","journal-title":"European Journal of Information Systems"},{"key":"3_CR64","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1057\/ejis.2014.41","volume":"24","author":"G Bansal","year":"2015","unstructured":"Bansal, G., F.M. Zahedi, and D. Gefen. 2015. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems 24: 624\u2013644. https:\/\/doi.org\/10.1057\/ejis.2014.41.","journal-title":"European Journal of Information Systems"},{"key":"3_CR65","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10796-017-9806-7","volume":"20","author":"M Richey","year":"2018","unstructured":"Richey, M., A. Gonibeed, and M.N. Ravishankar. 2018. The perils and promises of self-disclosure on social media. Information Systems Frontiers 20: 425\u2013437. https:\/\/doi.org\/10.1007\/s10796-017-9806-7.","journal-title":"Information Systems Frontiers"},{"key":"3_CR66","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1057\/ejis.2012.13","volume":"21","author":"T Li","year":"2012","unstructured":"Li, T., and T. Unger. 2012. Willing to pay for quality personalization? Trade-off between quality and privacy. European Journal of Information Systems 21: 621\u2013642. https:\/\/doi.org\/10.1057\/ejis.2012.13.","journal-title":"European Journal of Information Systems"},{"key":"3_CR67","doi-asserted-by":"publisher","unstructured":"Albashrawi, M., and L. Motiwalla. 2017. Privacy and personalization in continued usage intention of mobile banking: An integrative perspective. Information Systems Frontiers.\nhttps:\/\/doi.org\/10.1007\/s10796-017-9814-7.","DOI":"10.1007\/s10796-017-9814-7"},{"key":"3_CR68","doi-asserted-by":"crossref","unstructured":"Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 83\u2013108.","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"3_CR69","doi-asserted-by":"publisher","first-page":"213","DOI":"10.2307\/20721425","volume":"34","author":"Yoo","year":"2010","unstructured":"Yoo. 2010. Computing in everyday life: A call for research on experiential computing. MIS Quarterly 34: 213. https:\/\/doi.org\/10.2307\/20721425.","journal-title":"MIS Quarterly"},{"key":"3_CR70","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1098\/rsta.2008.0128","volume":"366","author":"G Borriello","year":"2008","unstructured":"Borriello, G. 2008. Invisible computing: Automatically using the many bits of data we create. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366: 3669\u20133683. https:\/\/doi.org\/10.1098\/rsta.2008.0128.","journal-title":"Philos Trans A Math Phys Eng Sci"},{"key":"3_CR71","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/s11192-010-0283-8","volume":"86","author":"R Zhao","year":"2011","unstructured":"Zhao, R., and J. Wang. 2011. Visualizing the research on pervasive and ubiquitous computing. Scientometrics 86: 593\u2013612. https:\/\/doi.org\/10.1007\/s11192-010-0283-8.","journal-title":"Scientometrics"},{"key":"3_CR72","doi-asserted-by":"publisher","first-page":"197","DOI":"10.2307\/30036529","volume":"27","author":"R Lamb","year":"2003","unstructured":"Lamb, R., and R. Kling. 2003. Reconceptualizing users as social actors in information systems research. MIS Quarterly 27: 197. https:\/\/doi.org\/10.2307\/30036529.","journal-title":"MIS Quarterly"},{"key":"3_CR73","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., L. Brandimarte, and G. Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347: 509\u2013514. https:\/\/doi.org\/10.1126\/science.aaa1465.","journal-title":"Science"},{"key":"3_CR74","first-page":"78","volume":"87","author":"D Ariely","year":"2009","unstructured":"Ariely, D. 2009. The end of rational econonmics. Harvard Business Review 87: 78\u201384.","journal-title":"Harvard Business Review"},{"key":"3_CR75","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1006\/jevp.1999.0156","volume":"20","author":"H Aarts","year":"2000","unstructured":"Aarts, H., and A.P. Dijksterhuis. 2000. The automatic activation of goal-directed behaviour: The case of travel habit. Journal of Environmental Psychology 20: 75\u201382.","journal-title":"Journal of Environmental Psychology"},{"key":"3_CR76","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1365\/s11621-014-0318-2","volume":"31","author":"C Buck","year":"2014","unstructured":"Buck, C., C. Horbel, T. Kessler, and C. Christian. 2014. Mobile consumer apps: Big data brother is watching you. Marketing Review St. Gallen 31: 26\u201335. https:\/\/doi.org\/10.1365\/s11621-014-0318-2.","journal-title":"Marketing Review St. Gallen"},{"key":"3_CR77","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1207\/s15327663jcp1503_3","volume":"15","author":"A Dijksterhuis","year":"2005","unstructured":"Dijksterhuis, A., P.K. Smith, R.B. van Baaren, and D.H.J. Wigboldus. 2005. The unconscious consumer: Effects of environment on consumer behavior. Journal of Consumer Psychology 15: 193\u2013202. https:\/\/doi.org\/10.1207\/s15327663jcp1503_3.","journal-title":"Journal of Consumer Psychology"},{"key":"3_CR78","doi-asserted-by":"crossref","unstructured":"Anaraky, R., B.P. Knijnenburg, and M. Risius. 2020. Exacerbating mindless compliance: The danger of justifications during privacy decision making in the context of Facebook applications. AIS Transactions on Human-Computer Interaction: 70\u201395.","DOI":"10.17705\/1thci.00129"},{"key":"3_CR79","unstructured":"Buck, C., S. Burster, and T. Eymann. 2018. An experiment series on app information privacy concerns. In 26th European Conference on Information Systems (ECIS)."},{"key":"3_CR80","volume-title":"Verifying effects and findings of behavioral economics and social psychology in information systems and digital decision-making environments using experimental research approaches","author":"C Buck","year":"2019","unstructured":"Buck, C., and T. Dinev. 2019. Verifying effects and findings of behavioral economics and social psychology in information systems and digital decision-making environments using experimental research approaches. Research in Progress."}],"container-title":["Modern Socio-Technical Perspectives on Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82786-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T10:10:04Z","timestamp":1650363004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82786-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030827854","9783030827861"],"references-count":80,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82786-1_3","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}