{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:34:27Z","timestamp":1742913267870,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393957"},{"type":"electronic","value":"9783319393964"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39396-4_34","type":"book-chapter","created":{"date-parts":[[2016,6,22]],"date-time":"2016-06-22T18:06:08Z","timestamp":1466618768000},"page":"377-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["\u201cTell Me Who You Are, and I Will Show You What You Get\u201d - the Use of Individuals\u2019 Identity for Information Technology Customization"],"prefix":"10.1007","author":[{"given":"Sonia","family":"Camacho","sequence":"first","affiliation":[]},{"given":"Andres","family":"Barrios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,22]]},"reference":[{"issue":"2","key":"34_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.tele.2013.09.001","volume":"31","author":"R Ling","year":"2014","unstructured":"Ling, R.: From Ubicomp to Ubiex (Pectations). Telematics Inf. 31(2), 173\u2013183 (2014)","journal-title":"Telematics Inf."},{"key":"34_CR2","volume-title":"Liquid Modernity","author":"Z Bauman","year":"2000","unstructured":"Bauman, Z.: Liquid Modernity. Polity Press, Cambridge (2000)"},{"issue":"4","key":"34_CR3","doi-asserted-by":"crossref","first-page":"931","DOI":"10.25300\/MISQ\/2015\/39.4.9","volume":"39","author":"M Carter","year":"2015","unstructured":"Carter, M., Grover, V.: Me, My Self, and I(T): conceptualizing information technology identity and its implications. MIS Quart. 39(4), 931\u2013957 (2015)","journal-title":"MIS Quart."},{"issue":"3","key":"34_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1057\/jit.2012.32","volume":"28","author":"M-K Stein","year":"2013","unstructured":"Stein, M.-K., Galliers, R.D., Markus, L.M.: Towards an understanding of identity and technology in the workplace. J. Inform. Technol. 28(3), 167\u2013182 (2013)","journal-title":"J. Inform. Technol."},{"issue":"5","key":"34_CR5","doi-asserted-by":"publisher","first-page":"2538","DOI":"10.1016\/j.chb.2006.05.002","volume":"23","author":"JB Walther","year":"2007","unstructured":"Walther, J.B.: Selective self-presentation in computer-mediated communication: hyper-personal dimensions of technology, language, and cognition. Comput. Hum. Behav. 23(5), 2538\u20132557 (2007)","journal-title":"Comput. Hum. Behav."},{"issue":"2\u20133","key":"34_CR6","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1161345.1161355","volume":"37","author":"Y Lee","year":"2006","unstructured":"Lee, Y., Lee, J., Lee, Z.: Social influence on technology acceptance behavior: self-identity theory perspective. Data Base Adv. Inf. Syst. 37(2\u20133), 60\u201375 (2006)","journal-title":"Data Base Adv. Inf. Syst."},{"issue":"10","key":"34_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1089107.1089109","volume":"48","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Personalization technologies: a process-oriented perspective. Commun. ACM 48(10), 83\u201390 (2005)","journal-title":"Commun. ACM"},{"issue":"6","key":"34_CR8","first-page":"344","volume":"9","author":"H Sheng","year":"2008","unstructured":"Sheng, H., Nah, F.F.H., Siau, K.: An experimental study on ubiquitous commerce adoption: impact of personalization and privacy concerns. J. Assoc. Inf. Syst. 9(6), 344\u2013376 (2008)","journal-title":"J. Assoc. Inf. Syst."},{"key":"34_CR9","doi-asserted-by":"publisher","DOI":"10.1037\/11059-000","volume-title":"Principles of Psychology","author":"W James","year":"1890","unstructured":"James, W.: Principles of Psychology. Holt, New York (1890)"},{"key":"34_CR10","volume-title":"Mind, Self and Society","author":"G Mead","year":"1934","unstructured":"Mead, G.: Mind, Self and Society. University of Chicago Press, Chicago (1934)"},{"key":"34_CR11","volume-title":"Symbolic interactionism: perspective and method","author":"H Blumer","year":"1969","unstructured":"Blumer, H.: Symbolic interactionism: perspective and method. Prentice Hall, Englewood Cliffs (1969)"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"284","DOI":"10.2307\/2695840","volume":"63","author":"S Stryker","year":"2000","unstructured":"Stryker, S., Burke, P.: Past, present, and future of an identity theory. Soc. Psychol. Q. 63, 284\u2013297 (2000)","journal-title":"Soc. Psychol. Q."},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1002\/mar.10011","volume":"19","author":"A Reed","year":"2002","unstructured":"Reed, A.: Social identity as a useful perspective for self-concept-based consumer research. Psychol. Market. 19, 235\u2013266 (2002)","journal-title":"Psychol. Market."},{"key":"34_CR14","volume-title":"The Social Psychology of Clothing","author":"S Kaiser","year":"1990","unstructured":"Kaiser, S.: The Social Psychology of Clothing. Macmillan Publishing Company, New York (1990)"},{"key":"34_CR15","volume-title":"Symbolic Interactionism: A Social Structural Version","author":"S Stryker","year":"1980","unstructured":"Stryker, S.: Symbolic Interactionism: A Social Structural Version. Benjamin\/Cummings, Menlo Park (1980)"},{"issue":"3","key":"34_CR16","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1080\/10864415.2001.11044215","volume":"5","author":"JW Kim","year":"2001","unstructured":"Kim, J.W., Lee, B.H., Shaw, M.J., Chang, H.L., Nelson, M.: Application of decision-tree induction techniques to personalized advertisements on internet storefronts. Int. J. Electron. Commun. 5(3), 45\u201362 (2001)","journal-title":"Int. J. Electron. Commun."},{"issue":"6","key":"34_CR17","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.pmcj.2013.07.009","volume":"9","author":"E Zhong","year":"2013","unstructured":"Zhong, E., Tan, B., Mo, K., Yang, Q.: User demographics prediction based on mobile data. Pervasive Mob. Comput. 9(6), 823\u2013837 (2013)","journal-title":"Pervasive Mob. Comput."},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/0-306-47548-0_12","volume-title":"E-Business Management","author":"CP Wei","year":"2002","unstructured":"Wei, C.P., Easley, R.F., Shaw, M.J.: Web-based recommendation systems for personalized e-commerce shopping. In: Shaw, M.J. (ed.) E-Business Management, pp. 249\u2013276. Springer, Los Angeles (2002)"},{"key":"34_CR19","volume-title":"Market Segmentation","author":"M Wedel","year":"1999","unstructured":"Wedel, M., Kamakura, W.A.: Market Segmentation. Methodological and Conceptual Foundations. Springer, Norwell (1999)"},{"key":"34_CR20","volume-title":"Principles of Marketing","author":"P Kotler","year":"1999","unstructured":"Kotler, P., Armstrong, G.: Principles of Marketing, 8th edn. Prentice-Hall International, Englewood Cliffs (1999)","edition":"8"},{"issue":"2","key":"34_CR21","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1086\/676125","volume":"41","author":"A Bhattacharjee","year":"2014","unstructured":"Bhattacharjee, A., Berger, J., Menon, G.: When identity marketing backfires: consumer agency in identity expression. J. Consum. Res. 41(2), 294\u2013309 (2014)","journal-title":"J. Consum. Res."},{"issue":"3","key":"34_CR22","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.jcps.2009.05.008","volume":"19","author":"D Oyserman","year":"2009","unstructured":"Oyserman, D.: Identity-Based motivation: implications for action-readiness, procedural readiness, and consumer behavior. J. Consum. Psychol. 19(3), 250\u2013260 (2009)","journal-title":"J. Consum. Psychol."},{"issue":"2","key":"34_CR23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1086\/519142","volume":"34","author":"J Berger","year":"2007","unstructured":"Berger, J., Heath, C.: Where consumers diverge from others: identity signaling and product domains. J. Consum. Res. 34(2), 121\u2013134 (2007)","journal-title":"J. Consum. Res."},{"issue":"3","key":"34_CR24","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1086\/497549","volume":"32","author":"J Escalas","year":"2005","unstructured":"Escalas, J., Bettman, J.R.: Self-Construal, reference groups, and brand meaning. J. Consum. Res. 32(3), 378\u2013389 (2005)","journal-title":"J. Consum. Res."},{"issue":"3","key":"34_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1509\/jmkg.75.3.66","volume":"75","author":"A Chernev","year":"2011","unstructured":"Chernev, A., Hamilton, R., Gal, D.: Competing for consumer identity: limits to self-expression and the perils of lifestyle branding. J. Mark. 75(3), 66\u201382 (2011)","journal-title":"J. Mark."},{"issue":"4","key":"34_CR26","first-page":"310","volume":"29","author":"A Reed","year":"2012","unstructured":"Reed, A., Forehand, M.R., Puntoni, S., Warlop, L.: Identity-Based consumer behavior. IJRM 29(4), 310\u2013321 (2012)","journal-title":"Identity-Based consumer behavior. IJRM"},{"key":"34_CR27","first-page":"367","volume-title":"Handbook of Self and Identity","author":"WB Swann Jr.","year":"2005","unstructured":"Swann Jr., W.B., Rentfrow, P.J., Guinn, J.S.: Self-verification: the search for coherence. In: Leary, M.R., Tangney, J.P. (eds.) Handbook of Self and Identity, pp. 367\u2013383. Guilford, New York (2005)"},{"key":"34_CR28","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"},{"issue":"1","key":"34_CR29","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","volume":"51","author":"H Xu","year":"2011","unstructured":"Xu, H., Luo, X.R., Carroll, J.M., Rosson, M.B.: The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decis. Support Syst. 51(1), 42\u201352 (2011)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"34_CR30","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users\u2019 Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inform. Syst. Res."},{"issue":"1","key":"34_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inform. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inform. Syst. Res."},{"issue":"4","key":"34_CR32","first-page":"15","volume":"48","author":"ML Korzaan","year":"2008","unstructured":"Korzaan, M.L., Boswell, K.T.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inform. Syst. 48(4), 15\u201324 (2008)","journal-title":"J. Comput. Inform. Syst."},{"issue":"4","key":"34_CR33","first-page":"165","volume":"9","author":"GJ Udo","year":"2001","unstructured":"Udo, G.J.: Privacy and security concerns as major barriers for e-commerce: a survey study. ICS 9(4), 165\u2013174 (2001)","journal-title":"ICS"},{"issue":"2\u20133","key":"34_CR34","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"RK Chellappa","year":"2005","unstructured":"Chellappa, R.K., Sin, R.G.: Personalization versus privacy: an empirical examination of the online consumer\u2019s dilemma. Inf. Technol. Manage. 6(2\u20133), 181\u2013202 (2005)","journal-title":"Inf. Technol. Manage."},{"issue":"1","key":"34_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/10196780500491162","volume":"16","author":"SY Ho","year":"2006","unstructured":"Ho, S.Y.: The attraction of internet personalization to web users. Electron. Mark. 16(1), 41\u201350 (2006)","journal-title":"Electron. Mark."},{"key":"34_CR36","doi-asserted-by":"crossref","unstructured":"Skeels, M.M., Grudin, J.: When social networks cross boundaries. In: GROUP 2009 Proceedings of the ACM 2009 International Conference on Supporting Group Work. ACM, New York (2009)","DOI":"10.1145\/1531674.1531689"},{"key":"34_CR37","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-642-16199-5_15","volume-title":"Creating Balance?","author":"L Duxbury","year":"2011","unstructured":"Duxbury, L., Smart, R.: The \u201cMyth of Separate Worlds:\u201d an exploration of how mobile technology has redefined work-life balance. In: Kaiser, S., Ringlstetter, M.J., Eikhof, D.R., Cunha, M.P.E. (eds.) Creating Balance?, pp. 269\u2013284. Springer, Berlin (2011)"},{"issue":"4","key":"34_CR38","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1108\/10610420210435443","volume":"11","author":"CF Lin","year":"2002","unstructured":"Lin, C.F.: Segmenting customer brand preference: demographic or psychographic. JPBM 11(4), 249\u2013268 (2002)","journal-title":"JPBM"},{"issue":"3","key":"34_CR39","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/3033681","volume":"48","author":"PL Callero","year":"1985","unstructured":"Callero, P.L.: Role-Identity salience. Soc. Psychol. Q. 48(3), 203\u2013215 (1985)","journal-title":"Soc. Psychol. Q."},{"issue":"4","key":"34_CR40","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1046\/j.1467-9558.2003.00196.x","volume":"21","author":"JE Stets","year":"2003","unstructured":"Stets, J.E., Biga, C.F.: Bringing identity theory into environmental sociology. Sociol. Theory 21(4), 398\u2013423 (2003)","journal-title":"Sociol. Theory"},{"key":"34_CR41","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1509\/jmkr.48.3.413","volume":"48","author":"S Puntoni","year":"2011","unstructured":"Puntoni, S., Sweldens, S., Tavassoli, N.: Gender identity salience and perceived vulnerability to breast cancer. J. Mark. Res. 48, 413\u2013424 (2011)","journal-title":"J. Mark. Res."},{"issue":"2","key":"34_CR42","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quart. 20(2), 167\u2013196 (1996)","journal-title":"MIS Quart."},{"issue":"2","key":"34_CR43","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/20650293","volume":"33","author":"W Wang","year":"2009","unstructured":"Wang, W., Benbasat, I.: Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness. MIS Quart. 33(2), 293\u2013320 (2009)","journal-title":"MIS Quart."},{"issue":"2","key":"34_CR44","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1287\/isre.1060.0088","volume":"17","author":"SJ Hong","year":"2006","unstructured":"Hong, S.J., Tam, K.Y.: Understanding the adoption of multipurpose information appliances: the case of mobile data services. Inform. Syst. Res. 17(2), 162\u2013179 (2006)","journal-title":"Inform. Syst. Res."},{"issue":"2","key":"34_CR45","doi-asserted-by":"publisher","first-page":"175","DOI":"10.3758\/BF03193146","volume":"39","author":"F Faul","year":"2007","unstructured":"Faul, F., Erdfelder, E., Lang, A.-G., Buchner, A.: G* power 3: a flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behav. Res. Methods. 39(2), 175\u2013191 (2007)","journal-title":"Behav. Res. Methods."}],"container-title":["Lecture Notes in Computer Science","HCI in Business, Government, and Organizations: eCommerce and Innovation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39396-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T14:58:26Z","timestamp":1596121106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39396-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393957","9783319393964"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39396-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCIBGO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on HCI in Business, Government, and Organizations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcib2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}