{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:14:29Z","timestamp":1746591269573,"version":"3.40.5"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031874987"},{"type":"electronic","value":"9783031874994"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87499-4_4","type":"book-chapter","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:35:46Z","timestamp":1746192946000},"page":"42-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6722-4111","authenticated-orcid":false,"given":"Dane","family":"Vanderkooi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9448-9123","authenticated-orcid":false,"given":"Atefeh","family":"Mashatan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1578-5923","authenticated-orcid":false,"given":"Ozgur","family":"Turetken","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,1]]},"reference":[{"key":"4_CR1","unstructured":"Triton Digital: Share of individuals who own any smart speaker brand in selected countries in 2020 and 2022, by country [Graph].  Statista, 13 December 2022. https:\/\/www-statista-com.ezproxy.lib.torontomu.ca\/statistics\/1130208\/smart-speaker-ownership-worldwide-by-country\/. Accessed 28 June 2023"},{"key":"4_CR2","unstructured":"NPR: Reasons for not owning a smart speaker according to online users in the United States as of February 2020. Statista (2020). https:\/\/www-statista-com.ezproxy.lib.torontomu.ca\/statistics\/1059646\/us-reasons-for-not-owning-a-smart-speaker\/. Accessed 4 Sept 2024"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Bentley, F., Luvogt, C., Silverman, M., Wirasinghe, R., White, B., Lottridge, D.: Understanding the long-term use of smart speaker assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 1\u201324 (2018). https:\/\/doi.org\/10.1145\/3264901","DOI":"10.1145\/3264901"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274371","volume":"2","author":"J Lau","year":"2018","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Proc. ACM Hum. Comput. Interact. 2, 1\u201331 (2018). https:\/\/doi.org\/10.1145\/3274371","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Chung, H., Iorga, M., Voas, J., Lee, S.: Alexa, can i trust you? Computer 50, 100\u2013104 (2017). https:\/\/doi.org\/10.1109\/MC.2017.3571053","DOI":"10.1109\/MC.2017.3571053"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017). https:\/\/doi.org\/10.1016\/j.cose.2015.07.002","journal-title":"Comput. Secur."},{"key":"4_CR7","unstructured":"O\u2019Maonaigh, C., Saxena, D.: Investigating personalisation-privacy paradox among young Irish consumers: a case of smart speakers. In: Proceedings of the 1st Virtual Conference on Implications of Information and Digital Technologies for Development 2021, pp. 441\u2013451 (2021)"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/spy2.274","volume":"6","author":"G Maccario","year":"2023","unstructured":"Maccario, G., Naldi, M.: Privacy in smart speakers: a systematic literature review. Secur. Priv. 6, 1\u201316 (2023). https:\/\/doi.org\/10.1002\/spy2.274","journal-title":"Secur. Priv."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"2118","DOI":"10.1016\/j.tele.2018.07.013","volume":"35","author":"K Park","year":"2018","unstructured":"Park, K., Kwak, C., Lee, J., Ahn, J.H.: The effect of platform characteristics on the adoption of smart speakers: empirical evidence in South Korea. Telemat. Inform. 35, 2118\u20132132 (2018). https:\/\/doi.org\/10.1016\/j.tele.2018.07.013","journal-title":"Telemat. Inform."},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Kefi, H., Besson, E., Sokolova, K., Aouina-Mejri, C.: Privacy and intelligent virtual assistants usage across generations (2021). https:\/\/doi.org\/10.3917\/SIM.212.0043","DOI":"10.3917\/SIM.212.0043"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1080\/02642069.2021.2008913","volume":"43","author":"CL Hsu","year":"2021","unstructured":"Hsu, C.L., Lin, J.C.C.: Factors affecting customers\u2019 intention to voice shopping over smart speaker. Serv. Ind. J. 43, 785\u2013805 (2021). https:\/\/doi.org\/10.1080\/02642069.2021.2008913","journal-title":"Serv. Ind. J."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"162259","DOI":"10.1109\/ACCESS.2021.3132399","volume":"9","author":"D Pal","year":"2021","unstructured":"Pal, D., Babakerkhell, M.D., Zhang, X.: Exploring the determinants of users\u2019 continuance usage intention of smart voice assistants. IEEE Access 9, 162259\u2013162275 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3132399","journal-title":"IEEE Access"},{"key":"4_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2020.102331","volume":"59","author":"HC Ling","year":"2021","unstructured":"Ling, H.C., Chen, H.R., Ho, K.K.W., Hsiao, K.L.: Exploring the factors affecting customers\u2019 intention to purchase a smart speaker. J. Retail. Consum. Serv. 59, 102331 (2021). https:\/\/doi.org\/10.1016\/j.jretconser.2020.102331","journal-title":"J. Retail. Consum. Serv."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1108\/JRIM-01-2018-0022","volume":"12","author":"P Kowalczuk","year":"2018","unstructured":"Kowalczuk, P.: Consumer acceptance of smart speakers: a mixed methods approach. J. Res. Interact. Mark. 12, 418\u2013431 (2018). https:\/\/doi.org\/10.1108\/JRIM-01-2018-0022","journal-title":"J. Res. Interact. Mark."},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su13020602","volume":"13","author":"HS Cha","year":"2021","unstructured":"Cha, H.S., Wi, J.H., Park, C., Kim, T.: Sustainability calculus in adopting smart speakers\u2014personalized services and privacy risks. Sustainability 13, 1\u201318 (2021). https:\/\/doi.org\/10.3390\/su13020602","journal-title":"Sustainability"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ijmedinf.2015.12.010","volume":"88","author":"H Li","year":"2016","unstructured":"Li, H., Wu, J., Gao, Y., Shi, Y.: Examining individuals\u2019 adoption of healthcare wearable devices: an empirical study from privacy calculus perspective. Int. J. Med. Inform. 88, 8\u201317 (2016). https:\/\/doi.org\/10.1016\/j.ijmedinf.2015.12.010","journal-title":"Int. J. Med. Inform."},{"key":"4_CR17","unstructured":"Keith, M.J., Thompson, S.C., Hale, J.E., Greer, C.: Examining the rationality of information disclosure through mobile devices. In: Thirty Third International Conference on Information Systems, pp. 2\u201317 (2012)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An Extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17, 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"key":"4_CR19","doi-asserted-by":"publisher","DOI":"10.1177\/14614448211026611","author":"H Kang","year":"2021","unstructured":"Kang, H., Oh, J.: Communication privacy management for smart speaker use: integrating the role of privacy self-efficacy and the multidimensional view. New Media Soc. (2021). https:\/\/doi.org\/10.1177\/14614448211026611","journal-title":"New Media Soc."},{"key":"4_CR20","first-page":"88","volume":"8","author":"MJ Keith","year":"2016","unstructured":"Keith, M.J., Babb, J., Furner, C., Abdullat, A., Lowry, P.B.: Limited information and quick decisions: consumer privacy calculus for mobile applications. AIS Trans. Hum. Comput. Interact. 8, 88\u2013130 (2016)","journal-title":"AIS Trans. Hum. Comput. Interact."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1080\/15536548.2016.1206757","volume":"12","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Shan, J., Pigneur, Y.: The role of personalized services and control: an empirical evaluation of privacy calculus and technology acceptance model in the mobile context. J. Inf. Priv. Secur. 12, 123\u2013144 (2016). https:\/\/doi.org\/10.1080\/15536548.2016.1206757","journal-title":"J. Inf. Priv. Secur."},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10, 104\u2013115 (1999). https:\/\/doi.org\/10.1287\/orsc.10.1.104","journal-title":"Organ. Sci."},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Jernejcic, T., El-Gayar, O.: The role of the privacy calculus and the privacy paradox in the acceptance of wearables for health and wellbeing. AIS Trans. Hum. Comput. Interact. 14, 490\u2013522 (2022). https:\/\/doi.org\/10.17705\/1thci.00177","DOI":"10.17705\/1thci.00177"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. Manag. Inf. Syst. 13, 319\u2013339 (1989). https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Q. Manag. Inf. Syst."},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.infsof.2009.11.005","volume":"52","author":"M Turner","year":"2010","unstructured":"Turner, M., Kitchenham, B., Brereton, P., Charters, S., Budgen, D.: Does the technology acceptance model predict actual use? A systematic literature review. Inf. Softw. Technol. 52, 463\u2013479 (2010). https:\/\/doi.org\/10.1016\/j.infsof.2009.11.005","journal-title":"Inf. Softw. Technol."},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39, 273\u2013315 (2008). https:\/\/doi.org\/10.1111\/j.1540-5915.2008.00192.x","journal-title":"Decis. Sci."},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Ren, M., Ma, Y., Fan, W., Li, M., Feng, Y.: An empirical study on the behavioral intention of college students\u2019 online ideological and political learning. Int. J. Digit. Multimed. Broadcast. 2022 (2022). https:\/\/doi.org\/10.1155\/2022\/6349343","DOI":"10.1155\/2022\/6349343"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.tele.2015.08.007","volume":"33","author":"H Yang","year":"2016","unstructured":"Yang, H., Yu, J., Zo, H., Choi, M.: User acceptance of wearable devices: an extended perspective of perceived value. Telemat. Inform. 33, 256\u2013269 (2016). https:\/\/doi.org\/10.1016\/j.tele.2015.08.007","journal-title":"Telemat. Inform."},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Pridmore, J., Mols, A.: Personal choices and situated data: privacy negotiations and the acceptance of household intelligent personal assistants. Big Data Soc. 7 (2020). https:\/\/doi.org\/10.1177\/2053951719891748","DOI":"10.1177\/2053951719891748"},{"key":"4_CR30","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1057\/palgrave.ejis.3000358","volume":"9","author":"H Lou","year":"2000","unstructured":"Lou, H., Luo, W., Strong, D.: Perceived critical mass effect on groupware acceptance. Eur. J. Inf. Syst. 9, 91\u2013103 (2000). https:\/\/doi.org\/10.1057\/palgrave.ejis.3000358","journal-title":"Eur. J. Inf. Syst."},{"key":"4_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101430","volume":"63","author":"S Lew","year":"2020","unstructured":"Lew, S., Tan, G.W.H., Loh, X.M., Hew, J.J., Ooi, K.B.: The disruptive mobile wallet in the hospitality industry: an extended mobile technology acceptance model. Technol. Soc. 63, 101430 (2020). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101430","journal-title":"Technol. Soc."},{"key":"4_CR32","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1057\/palgrave.ejis.3000680","volume":"16","author":"C Van Slyke","year":"2007","unstructured":"Van Slyke, C., Ilie, V., Lou, H., Stafford, T.: Perceived critical mass and the adoption of a communication technology. Eur. J. Inf. Syst. 16, 270\u2013283 (2007). https:\/\/doi.org\/10.1057\/palgrave.ejis.3000680","journal-title":"Eur. J. Inf. Syst."},{"key":"4_CR33","unstructured":"Kotler, P.: Marketing Management. Pearson Education, London (2009)"},{"key":"4_CR34","unstructured":"Cocosila, M., Igonor, A.: Perceived value of social media: an empirical investigation. In: CONF-IRM 2012 Proceedings (2012)"},{"key":"4_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106763","volume":"120","author":"M Vimalkumar","year":"2021","unstructured":"Vimalkumar, M., Sharma, S.K., Singh, J.B., Dwivedi, Y.K.: \u2018Okay google, what about my privacy?\u2019: user\u2019s privacy perceptions and acceptance of voice based digital assistants. Comput. Hum. Behav. 120, 106763 (2021). https:\/\/doi.org\/10.1016\/j.chb.2021.106763","journal-title":"Comput. Hum. Behav."},{"key":"4_CR36","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1504\/IJMC.2016.075019","volume":"14","author":"TTC Lin","year":"2016","unstructured":"Lin, T.T.C., Paragas, F., Bautista, J.R.: Determinants of mobile consumers\u2019 perceived value of location-based advertising and user responses. Int. J. Mob. Commun. 14, 99\u2013117 (2016). https:\/\/doi.org\/10.1504\/IJMC.2016.075019","journal-title":"Int. J. Mob. Commun."},{"key":"4_CR37","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.ijinfomgt.2018.10.024","volume":"45","author":"N Shaw","year":"2019","unstructured":"Shaw, N., Sergueeva, K.: The non-monetary benefits of mobile commerce: extending UTAUT2 with perceived value. Int. J. Inf. Manag. 45, 44\u201355 (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.10.024","journal-title":"Int. J. Inf. Manag."},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Hu, B., Liu, Y. li, Yan, W.: Should I scan my face? The influence of perceived value and trust on Chinese users\u2019 intention to use facial recognition payment. Telemat. Inform. 78 (2023). https:\/\/doi.org\/10.1016\/j.tele.2023.101951","DOI":"10.1016\/j.tele.2023.101951"},{"key":"4_CR39","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","volume":"77","author":"N Gerber","year":"2018","unstructured":"Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226\u2013261 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.04.002","journal-title":"Comput. Secur."},{"key":"4_CR40","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","volume":"59","author":"MA Eastlick","year":"2006","unstructured":"Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877\u2013886 (2006). https:\/\/doi.org\/10.1016\/j.jbusres.2006.02.006","journal-title":"J. Bus. Res."},{"key":"4_CR41","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1016\/j.ijhm.2009.11.001","volume":"29","author":"HY Wang","year":"2010","unstructured":"Wang, H.Y., Wang, S.H.: Predicting mobile hotel reservation adoption: Insight from a perceived value standpoint. Int. J. Hosp. Manag. 29, 598\u2013608 (2010). https:\/\/doi.org\/10.1016\/j.ijhm.2009.11.001","journal-title":"Int. J. Hosp. Manag."},{"key":"4_CR42","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.energy.2018.06.064","volume":"159","author":"MK Kim","year":"2018","unstructured":"Kim, M.K., Oh, J., Park, J.H., Joo, C.: Perceived value and adoption intention for electric vehicles in Korea: moderating effects of environmental traits and government supports. Energy 159, 799\u2013809 (2018). https:\/\/doi.org\/10.1016\/j.energy.2018.06.064","journal-title":"Energy"},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.chb.2018.02.029","volume":"84","author":"P Esmaeilzadeh","year":"2018","unstructured":"Esmaeilzadeh, P.: Healthcare consumers\u2019 opt-in intentions to health information exchanges (HIEs): an empirical study. Comput. Hum. Behav. 84, 114\u2013129 (2018). https:\/\/doi.org\/10.1016\/j.chb.2018.02.029","journal-title":"Comput. Hum. Behav."},{"key":"4_CR44","doi-asserted-by":"publisher","first-page":"69441","DOI":"10.1109\/ACCESS.2022.3186786","volume":"10","author":"A Mashatan","year":"2022","unstructured":"Mashatan, A., Sangari, M.S., Dehghani, M.: How perceptions of information privacy and security impact consumer trust in crypto-payment: an empirical study. IEEE Access 10, 69441\u201369454 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3186786","journal-title":"IEEE Access"},{"key":"4_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101255","volume":"61","author":"MZ Alam","year":"2020","unstructured":"Alam, M.Z., Hu, W., Kaium, M.A., Hoque, M.R., Alam, M.M.D.: Understanding the determinants of mHealth apps adoption in Bangladesh: a SEM-neural network approach. Technol. Soc. 61, 101255 (2020). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101255","journal-title":"Technol. Soc."},{"key":"4_CR46","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/08874417.2016.1186524","volume":"58","author":"CL Hsu","year":"2018","unstructured":"Hsu, C.L., Lin, J.C.C.: Exploring factors affecting the adoption of internet of things services. J. Comput. Inf. Syst. 58, 49\u201357 (2018). https:\/\/doi.org\/10.1080\/08874417.2016.1186524","journal-title":"J. Comput. Inf. Syst."},{"key":"4_CR47","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.chb.2018.11.022","volume":"92","author":"D Kim","year":"2019","unstructured":"Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273\u2013281 (2019). https:\/\/doi.org\/10.1016\/j.chb.2018.11.022","journal-title":"Comput. Hum. Behav."},{"key":"4_CR48","unstructured":"Risius, M., Baumann, A., Krasnova, H.: Developing a new paradigm: introducing the intention-behaviour gap to the privacy paradox phenomenon. In: Proceedings of the 28th European Conference on Information Systems, pp. 1\u201315 (2020)"},{"key":"4_CR49","first-page":"531","volume":"12","author":"PM Podsakoff","year":"1986","unstructured":"Podsakoff, P.M., Organ, D.W.: Self reports in organizational research: problems and prospects. J. Manag. 12, 531\u2013544 (1986)","journal-title":"J. Manag."},{"key":"4_CR50","doi-asserted-by":"publisher","first-page":"623","DOI":"10.2307\/25148814","volume":"31","author":"S Petter","year":"2007","unstructured":"Petter, S., Straub, D., Rai, A.: Specifying formative constructs in information systems research. MIS Q. 31, 623\u2013656 (2007)","journal-title":"MIS Q."},{"key":"4_CR51","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","volume":"19","author":"JF Hair","year":"2011","unstructured":"Hair, J.F., Ringle, C.M., Sarstedt, M.: PLS-SEM: indeed a silver bullet. J. Mark. Theory Pract. 19, 139\u2013152 (2011). https:\/\/doi.org\/10.2753\/MTP1069-6679190202","journal-title":"J. Mark. Theory Pract."},{"key":"4_CR52","doi-asserted-by":"publisher","first-page":"56","DOI":"10.5585\/remark.v13i2.2717","volume":"13","author":"CM Ringle","year":"2014","unstructured":"Ringle, C.M., Da Silva, D., Bido, D.D.S.: Structural equation Modeling with the SmartPLS. Brazilian J. Mark. 13, 56\u201373 (2014). https:\/\/doi.org\/10.5585\/remark.v13i2.2717","journal-title":"Brazilian J. Mark."},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences. Routledge (2013)","DOI":"10.4324\/9780203771587"},{"key":"4_CR54","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1108\/IMDS-08-2014-0243","volume":"115","author":"Y Yang","year":"2015","unstructured":"Yang, Y., Liu, Y., Li, H., Yu, B.: Understanding perceived risks in mobile payment acceptance. Ind. Manag. Data Syst. 115, 253\u2013269 (2015). https:\/\/doi.org\/10.1108\/IMDS-08-2014-0243","journal-title":"Ind. Manag. Data Syst."},{"key":"4_CR55","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1108\/IMDS-08-2021-0485","volume":"122","author":"G Cao","year":"2022","unstructured":"Cao, G., Wang, P.: Revealing or concealing: privacy information disclosure in intelligent voice assistant usage- a configurational approach. Ind. Manag. Data Syst. 122, 1215\u20131245 (2022). https:\/\/doi.org\/10.1108\/IMDS-08-2021-0485","journal-title":"Ind. Manag. Data Syst."}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87499-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T08:32:19Z","timestamp":1746520339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87499-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031874987","9783031874994"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87499-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montr\u00e9al, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fps-2024.hec.ca\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}