{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T06:35:01Z","timestamp":1770705301535,"version":"3.49.0"},"reference-count":114,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010198","name":"Ministerio de Econom\u00eda, Industria y Competitividad, Gobierno de Espa\u00f1a","doi-asserted-by":"publisher","award":["ECO2014-54760"],"award-info":[{"award-number":["ECO2014-54760"]}],"id":[{"id":"10.13039\/501100010198","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010198","name":"Ministerio de Econom\u00eda, Industria y Competitividad, Gobierno de Espa\u00f1a","doi-asserted-by":"publisher","award":["ECO2017-83993-P"],"award-info":[{"award-number":["ECO2017-83993-P"]}],"id":[{"id":"10.13039\/501100010198","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Gobierno de Arag\u00f3n (ES) & European Social Fund","award":["GENERES Group S-54_17R"],"award-info":[{"award-number":["GENERES Group S-54_17R"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s10257-020-00462-8","type":"journal-article","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T18:03:13Z","timestamp":1580320993000},"page":"35-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services"],"prefix":"10.1007","volume":"18","author":[{"given":"M\u00aa Victoria","family":"Bordonaba-Juste","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8798-3294","authenticated-orcid":false,"given":"Laura","family":"Lucia-Palacios","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"P\u00e9rez-L\u00f3pez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"462_CR1","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.chb.2015.12.067","volume":"58","author":"I Arpaci","year":"2016","unstructured":"Arpaci I (2016) Understanding and predicting students\u2019 intention to use mobile cloud storage services. Comput Hum Behav 58:150\u2013157. https:\/\/doi.org\/10.1016\/j.chb.2015.12.067","journal-title":"Comput Hum Behav"},{"key":"462_CR3","unstructured":"Bernstein R (2015) Move over Millennials\u2013Here comes Gen Z. Ad Age. http:\/\/adage.com\/article\/cmo-strategy\/move-millennials-gen-z\/296577\/. Accessed 5 Feb 2019"},{"issue":"3","key":"462_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1057\/ejis.2013.1","volume":"23","author":"A Bhattacherjee","year":"2014","unstructured":"Bhattacherjee A, Park SC (2014) Why end-users move to the cloud: a migration-theoretic analysis. Eur J Inform Syst 23(3):357\u2013372. https:\/\/doi.org\/10.1057\/ejis.2013.1","journal-title":"Eur J Inform Syst"},{"issue":"3","key":"462_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1108\/09564231311326987","volume":"24","author":"RN Bolton","year":"2013","unstructured":"Bolton RN, Parasuraman A, Hoefnagels A, Migchels N, Kabadayi S, Gruber T, Solnet D (2013) Understanding generation Y and their use of social media: a review and research agenda. J Serv Manag 24(3):245\u2013267. https:\/\/doi.org\/10.1108\/09564231311326987","journal-title":"J Serv Manag"},{"issue":"4","key":"462_CR6","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1080\/08838151.2012.732139","volume":"56","author":"BA Bondad-Brown","year":"2012","unstructured":"Bondad-Brown BA, Rice RE, Pearce KE (2012) Influences on TV viewing and online user-shared video use: demographics, generations, contextual age, media use, motivations, and audience activity. J Broadcast Electron Media 56(4):471\u2013493. https:\/\/doi.org\/10.1080\/08838151.2012.732139","journal-title":"J Broadcast Electron Media"},{"issue":"4","key":"462_CR7","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1080\/10580530.2015.1079998","volume":"32","author":"D Burda","year":"2015","unstructured":"Burda D, Teuteberg F (2015) understanding service quality and system quality success factors in cloud archiving from an end-user perspective. Inf Syst Manag 32(4):266\u2013284. https:\/\/doi.org\/10.1080\/10580530.2015.1079998","journal-title":"Inf Syst Manag"},{"issue":"2","key":"462_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1080\/0144929X.2015.1012650","volume":"35","author":"D Burda","year":"2016","unstructured":"Burda D, Teuteberg F (2016) Exploring consumer preferences in cloud archiving \u2013 a student\u2019s perspective. Behav Inform Technol 35(2):89\u2013105. https:\/\/doi.org\/10.1080\/0144929X.2015.1012650","journal-title":"Behav Inform Technol"},{"issue":"4","key":"462_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1111\/ajag.12566","volume":"37","author":"L Cannon","year":"2018","unstructured":"Cannon L, Kendig H (2018) \u2018Millennials\u2019: perceived generational opportunities and intergenerational conflict in Australia. Australas Ageing 37(4):127\u2013132. https:\/\/doi.org\/10.1111\/ajag.12566","journal-title":"Australas Ageing"},{"key":"462_CR10","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.jnca.2014.09.021","volume":"59","author":"A Celesti","year":"2016","unstructured":"Celesti A, Fazio M, Villari M, Puliafito A (2016) Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J Netw Comput Appl 59:208\u2013218. https:\/\/doi.org\/10.1016\/j.jnca.2014.09.021","journal-title":"J Netw Comput Appl"},{"key":"462_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.dss.2015.12.007","volume":"83","author":"R Chakraborty","year":"2016","unstructured":"Chakraborty R, Lee J, Bagchi-Sen S, Upadhyaya S, Rao HR (2016) Online shopping intention in the context of data breach in online retail stores: an examination of older and younger adults. Decis Support Syst 83:47\u201356. https:\/\/doi.org\/10.1016\/j.dss.2015.12.007","journal-title":"Decis Support Syst"},{"issue":"2","key":"462_CR12","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1177\/1077699016640224","volume":"93","author":"H Chen","year":"2016","unstructured":"Chen H, Beaudoin CE, Hong T (2016) Protecting oneself online: the effects of negative privacy experiences on privacy protective behaviors. J Mass Commun Q 93(2):409\u2013429. https:\/\/doi.org\/10.1177\/1077699016640224","journal-title":"J Mass Commun Q"},{"key":"462_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.chb.2017.01.003","volume":"70","author":"H Chen","year":"2017","unstructured":"Chen H, Beaudoin CE, Hong T (2017) Securing online privacy: an empirical test on internet scam victimization, online privacy concerns, and privacy protection behaviors. Comput Hum Behav 70:291\u2013302. https:\/\/doi.org\/10.1016\/j.chb.2017.01.003","journal-title":"Comput Hum Behav"},{"key":"462_CR14","volume-title":"Privacy and disclosure on Facebook: youth and adult\u2019s information disclosure and perceptions of privacy risks","author":"E Christofides","year":"2011","unstructured":"Christofides E, Muise A, Desmarais S (2011) Privacy and disclosure on Facebook: youth and adult\u2019s information disclosure and perceptions of privacy risks. University of Guelph, Guelph"},{"issue":"2","key":"462_CR15","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1108\/10662240710737004","volume":"17","author":"CW Chu","year":"2007","unstructured":"Chu CW, Lu HP (2007) Factors influencing online music purchase intention in Taiwan: an empirical study based on the value-intention framework. Internet Res 17(2):139\u2013155. https:\/\/doi.org\/10.1108\/10662240710737004","journal-title":"Internet Res"},{"issue":"3","key":"462_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1080\/14241277.2012.657284","volume":"14","author":"HI Chyi","year":"2012","unstructured":"Chyi HI (2012) Paying for what? How much? And why (not)? Predictors of paying intent for multiplatform newspapers. Int J Media Manag 14(3):227\u2013250. https:\/\/doi.org\/10.1080\/14241277.2012.657284","journal-title":"Int J Media Manag"},{"key":"462_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"5","author":"B Debatin","year":"2009","unstructured":"Debatin B, Lovejoy JP, Horn A-K, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. Jmput Mediate Commun 5:83\u2013108. https:\/\/doi.org\/10.1111\/j.1083-6101.2009.01494.x","journal-title":"Jmput Mediate Commun"},{"issue":"1","key":"462_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1002\/cb.1400","volume":"12","author":"K Debevec","year":"2013","unstructured":"Debevec K, Schewe CD, Madden TJ, Diamond WD (2013) Are today\u2019s Millennials splintering into a new generational cohort? Maybe! J Consum Behav 12(1):20\u201331. https:\/\/doi.org\/10.1002\/cb.1400","journal-title":"J Consum Behav"},{"key":"462_CR19","unstructured":"Dimock M (2019) Defining generations: where millennials end and generation Z begins. Pew Research Center, 17. http:\/\/www.pewresearch.org\/fact-tank\/2018\/03\/01\/defining-generations-where-millennials-end-and-post-millennials-begin\/. Accessed 10 October"},{"issue":"6","key":"462_CR20","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1080\/01449290410001715723","volume":"23","author":"T Dinev","year":"2004","unstructured":"Dinev T, Hart P (2004) Internet privacy concerns and their antecedents\u2014measurement validity and a regression model. Behav Inf Technol 23(6):413\u2013423. https:\/\/doi.org\/10.1080\/01449290410001715723","journal-title":"Behav Inf Technol"},{"issue":"4","key":"462_CR21","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1017\/S0021849904040358","volume":"44","author":"W Dou","year":"2004","unstructured":"Dou W (2004) Will internet users pay for online content? J Advert Res 44(4):349\u2013359. https:\/\/doi.org\/10.1017\/S0021849904040358","journal-title":"J Advert Res"},{"issue":"4","key":"462_CR22","doi-asserted-by":"publisher","first-page":"455","DOI":"10.2753\/MTP1069-6679220407","volume":"22","author":"JK Eastman","year":"2014","unstructured":"Eastman JK, Iyer R, Liao-Troth S, Williams DF, Griffin M (2014) The role of involvement on millennials\u2019 mobile technology behaviors: the moderating impact of status consumption, innovation, and opinion leadership. J Mark Theory Pract 22(4):455\u2013470. https:\/\/doi.org\/10.2753\/MTP1069-6679220407","journal-title":"J Mark Theory Pract"},{"issue":"3","key":"462_CR23","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1108\/IntR-03-2016-0070","volume":"27","author":"JD Elhai","year":"2017","unstructured":"Elhai JD, Levine JC, Hall BJ (2017) Anxiety about electronic data hacking: predictors and relations with digital privacy protection behavior. Internet Res 27(3):631\u2013649. https:\/\/doi.org\/10.1108\/IntR-03-2016-0070","journal-title":"Internet Res"},{"key":"462_CR24","unstructured":"Eurostat (European Statistic) (2014) Internet and cloud services - statistics on the use by individuals. Available online http:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php\/Internet_and_cloud_services_-_statistics_on_the_use_by_individuals"},{"key":"462_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.chb.2014.01.009","volume":"33","author":"Y Feng","year":"2014","unstructured":"Feng Y, Xie W (2014) Teens\u2019 concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput Hum Behav 33:53\u2013162. https:\/\/doi.org\/10.1016\/j.chb.2014.01.009","journal-title":"Comput Hum Behav"},{"issue":"5","key":"462_CR26","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1080\/01441647.2016.1197337","volume":"36","author":"VM Garikapati","year":"2016","unstructured":"Garikapati VM, Pendyala RM, Morris EA, Mokhtarian PL, McDonald N (2016) Activity patterns, time use, and travel of millennials: A generation in transition? Transp Rev 36(5):558\u2013584. https:\/\/doi.org\/10.1080\/01441647.2016.1197337","journal-title":"Transp Rev"},{"issue":"3","key":"462_CR27","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1080\/0144929X.2018.1435722","volume":"37","author":"K Ghaffari","year":"2018","unstructured":"Ghaffari K, Lagzian M (2018) Exploring users\u2019 experiences of using personal cloud storage services: a phenomenological study. Behav Inf Technol 37(3):295\u2013309. https:\/\/doi.org\/10.1080\/0144929X.2018.1435722","journal-title":"Behav Inf Technol"},{"issue":"6","key":"462_CR28","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1080\/17512786.2014.882056","volume":"8","author":"M Goyanes","year":"2014","unstructured":"Goyanes M (2014) An empirical study of factors that influence the willingness to pay for online news. J Pract 8(6):742\u2013757. https:\/\/doi.org\/10.1080\/17512786.2014.882056","journal-title":"J Pract"},{"issue":"3","key":"462_CR29","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1080\/03601270903183065","volume":"36","author":"GA Grimes","year":"2010","unstructured":"Grimes GA, Hough MG, Mazur E, Signorella ML (2010) Older adults\u2019 knowledge of internet hazards. Educ Gerontol 36(3):173\u2013192. https:\/\/doi.org\/10.1080\/03601270903183065","journal-title":"Educ Gerontol"},{"issue":"5","key":"462_CR30","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","volume":"33","author":"P Gupta","year":"2013","unstructured":"Gupta P, Seetharaman A, Raj JR (2013) The usage and adoption of cloud computing by small and medium businesses. Int J Inf Manag 33(5):861\u2013874. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2013.07.001","journal-title":"Int J Inf Manag"},{"issue":"4","key":"462_CR31","first-page":"166","volume":"12","author":"R Halperin","year":"2016","unstructured":"Halperin R, Dror Y (2016) Information privacy and the digital generation gap: an exploratory study. J Inf Priv Secur 12(4):166\u2013180","journal-title":"J Inf Priv Secur"},{"key":"462_CR32","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2018.01.020","volume":"84","author":"N Hauk","year":"2018","unstructured":"Hauk N, H\u00fcffmeier J, Krumm S (2018) Ready to be a silver surfer? A meta-analysis on the relationship between chronological age and technology acceptance. Comput Hum Behav 84:304\u2013319. https:\/\/doi.org\/10.1016\/j.chb.2018.01.020","journal-title":"Comput Hum Behav"},{"key":"462_CR33","doi-asserted-by":"publisher","first-page":"153","DOI":"10.2307\/1912352","volume":"42","author":"JJ Heckman","year":"1979","unstructured":"Heckman JJ (1979) Sample selection as a specification error. Econometrica 42:153\u2013161","journal-title":"Econometrica"},{"issue":"4","key":"462_CR34","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s10639-011-9169-5","volume":"17","author":"S Hrastinski","year":"2012","unstructured":"Hrastinski S, Aghaee NM (2012) How are campus students using social media to support their studies? An explorative interview study. Educ Inf Technol 17(4):451\u2013464","journal-title":"Educ Inf Technol"},{"issue":"5","key":"462_CR35","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1108\/14684521111176499","volume":"35","author":"KL Hsiao","year":"2011","unstructured":"Hsiao KL (2011) Why internet users are willing to pay for social networking services. Online Inform Rev 35(5):770\u2013788. https:\/\/doi.org\/10.1108\/14684521111176499","journal-title":"Online Inform Rev"},{"issue":"2","key":"462_CR36","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1108\/07378831311329022","volume":"31","author":"KL Hsiao","year":"2013","unstructured":"Hsiao KL (2013) Android smartphone adoption and intention to pay for mobile internet: perspectives from software, hardware, design, and value. Libr Hi Tech 31(2):216\u2013235. https:\/\/doi.org\/10.1108\/07378831311329022","journal-title":"Libr Hi Tech"},{"key":"462_CR37","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.elerap.2016.01.001","volume":"16","author":"KL Hsiao","year":"2016","unstructured":"Hsiao KL, Chen CC (2016) What drives in-app purchase intention for mobile games? An examination of perceived values and loyalty. Electron Commer R A 16:18\u201329. https:\/\/doi.org\/10.1016\/j.elerap.2016.01.001","journal-title":"Electron Commer R A"},{"issue":"1","key":"462_CR38","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.elerap.2014.11.003","volume":"14","author":"CL Hsu","year":"2015","unstructured":"Hsu CL, Lin JCC (2015) What drives purchase intention for paid mobile apps?\u2013An expectation confirmation model with perceived value. Electron Commer R A 14(1):46\u201357. https:\/\/doi.org\/10.1016\/j.elerap.2014.11.003","journal-title":"Electron Commer R A"},{"key":"462_CR39","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s10257-015-0300-9","volume":"14","author":"CL Hsu","year":"2016","unstructured":"Hsu CL, Lin JCC (2016) Factors affecting the adoption of cloud services in enterprises. Inf Syst E Bus Manag 14:791\u2013822. https:\/\/doi.org\/10.1007\/s10257-015-0300-9","journal-title":"Inf Syst E Bus Manag"},{"issue":"2","key":"462_CR40","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11628-017-0351-8","volume":"12","author":"TL Huang","year":"2018","unstructured":"Huang TL (2018) Creating a commercially compelling smart service encounter. Serv Bus 12(2):357\u2013377. https:\/\/doi.org\/10.1007\/s11628-017-0351-8","journal-title":"Serv Bus"},{"key":"462_CR41","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.chb.2017.03.051","volume":"73","author":"HJ Hur","year":"2017","unstructured":"Hur HJ, Lee HK, Choo HJ (2017) Understanding usage intention in innovative mobile app service: comparison between millennial and mature consumers. Comput Hum Behav 73:353\u2013361. https:\/\/doi.org\/10.1016\/j.chb.2017.03.051","journal-title":"Comput Hum Behav"},{"issue":"1","key":"462_CR42","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83\u201395. https:\/\/doi.org\/10.1016\/j.cose.2011.10.007","journal-title":"Comput Secur"},{"key":"462_CR43","doi-asserted-by":"crossref","unstructured":"Ion I, Sachdeva N, Kumaraguru P, \u010capkun S (2011) Home is safer than the cloud!: privacy concerns for consumer cloud storage. In: Proceedings of the seventh symposium on usable privacy and security. ACM, p 13","DOI":"10.1145\/2078827.2078845"},{"key":"462_CR44","volume-title":"Thinking, fast and slow","author":"D Kahneman","year":"2011","unstructured":"Kahneman D (2011) Thinking, fast and slow. Penguin, London"},{"issue":"1","key":"462_CR45","doi-asserted-by":"publisher","first-page":"100","DOI":"10.5817\/CP2016-1-2","volume":"10","author":"M Kezer","year":"2016","unstructured":"Kezer M, Sevi B, Cemalcilar Z, Baruh L (2016) Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychol J Psychosoc Res Cyberspace 10(1):100. https:\/\/doi.org\/10.5817\/CP2016-1-2","journal-title":"Cyberpsychol J Psychosoc Res Cyberspace"},{"issue":"4","key":"462_CR46","doi-asserted-by":"publisher","first-page":"31","DOI":"10.17053\/jcc.2007.10.4.002","volume":"10","author":"WS Kim","year":"2007","unstructured":"Kim WS, Huh WW (2007) Comparing consumption-related values and lifestyles of baby boomers, generation X, and generation Y. Consum Cult Stud 10(4):31\u201353","journal-title":"Consum Cult Stud"},{"issue":"6","key":"462_CR47","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.im.2011.05.004","volume":"48","author":"HW Kim","year":"2011","unstructured":"Kim HW, Gupta S, Koh J (2011) Investigating the intention to purchase digital items in social networking communities: a customer value perspective. Inf Manag 48(6):228\u2013234. https:\/\/doi.org\/10.1016\/j.im.2011.05.004","journal-title":"Inf Manag"},{"issue":"6","key":"462_CR48","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.im.2016.02.011","volume":"53","author":"HW Kim","year":"2016","unstructured":"Kim HW, Kankanhalli A, Lee HL (2016) Investigating decision factors in mobile application purchase: a mixed methods approach. Inf Manag 53(6):727\u2013739. https:\/\/doi.org\/10.1016\/j.im.2016.02.011","journal-title":"Inf Manag"},{"issue":"9","key":"462_CR49","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1080\/13504851.2016.1217301","volume":"24","author":"AS King","year":"2017","unstructured":"King AS, King JT (2017) Depth versus breadth in video rental kiosks. Appl Econ Lett 24(9):623\u2013626. https:\/\/doi.org\/10.1080\/13504851.2016.1217301","journal-title":"Appl Econ Lett"},{"key":"462_CR50","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2016.06.008","volume":"89","author":"C Ko\u00e7a\u015f","year":"2016","unstructured":"Ko\u00e7a\u015f C, Akkan C (2016) A system for pricing the sales distribution from blockbusters to the long tail. Decis Support Syst 89:56\u201365. https:\/\/doi.org\/10.1016\/j.dss.2016.06.008","journal-title":"Decis Support Syst"},{"key":"462_CR51","unstructured":"Koehler P, Anandasivam A, Dan MA (2010) Cloud services from a consumer perspective. In: Americas conference on information systems. AMCIS Proceedings"},{"issue":"6","key":"462_CR52","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1108\/PR-01-2014-0024","volume":"44","author":"LK Kuron","year":"2015","unstructured":"Kuron LK, Lyons ST, Schweitzer L, Ng ES (2015) Millennials\u2019 work values: differences across the school to work transition. Pers Rev 44(6):991\u20131009","journal-title":"Pers Rev"},{"key":"462_CR53","unstructured":"Kvavik RB, Caruso JB (2005) ECAR study of students and information technology, 2005: convenience, control, and learning. Boulder, CO: EDUCAUSE Center for Applied Research. http:\/\/net.educause.edu\/ir\/library\/pdf\/ERS0506\/ekf0506.pdf. Accessed 16 Jan 2019"},{"issue":"5","key":"462_CR54","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1080\/10447310902865008","volume":"25","author":"S Lee","year":"2009","unstructured":"Lee S (2009) Mobile internet services from consumers\u2019 perspectives. Int J Hum Comput Int 25(5):390\u2013413. https:\/\/doi.org\/10.1080\/10447310902865008","journal-title":"Int J Hum Comput Int"},{"issue":"1","key":"462_CR55","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1177\/0539018415609174","volume":"55","author":"YC Lee","year":"2016","unstructured":"Lee YC (2016) Why do people adopt cloud services? Gender differences. Soc Sci Inf 55(1):78\u201393. https:\/\/doi.org\/10.1177\/0539018415609174","journal-title":"Soc Sci Inf"},{"issue":"5","key":"462_CR56","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1080\/01449290600879344","volume":"27","author":"D Lee","year":"2008","unstructured":"Lee D, Larose R, Rifon N (2008) Keeping our network safe: a model of online protection behaviour. Behav Inf Technol 27(5):445\u2013454. https:\/\/doi.org\/10.1080\/01449290600879344","journal-title":"Behav Inf Technol"},{"issue":"5","key":"462_CR57","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.1002\/asi.23754","volume":"68","author":"JH Lee","year":"2017","unstructured":"Lee JH, Wishkoski R, Aase L, Meas P, Hubbles C (2017) Understanding users of cloud music services: selection factors, management and access behavior, and perceptions. J Assoc Inf Sci Technol 68(5):1186\u20131200. https:\/\/doi.org\/10.1002\/asi.23754","journal-title":"J Assoc Inf Sci Technol"},{"issue":"3","key":"462_CR58","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1111\/j.1460-2466.2008.00400.x","volume":"58","author":"X Li","year":"2008","unstructured":"Li X (2008) Third-person effect, optimistic bias, and sufficiency resource in Internet use. J Commun 58(3):568\u2013587","journal-title":"J Commun"},{"key":"462_CR59","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10257-015-0279-2","volume":"14","author":"DK Liou","year":"2016","unstructured":"Liou DK, Chih WH, Hsu LC, Huang CY (2016) Investigating information sharing behavior: the mediating roles of the desire to share information to virtual communities. Inf Sys E Bus Manag 14:187\u2013192. https:\/\/doi.org\/10.1007\/s10257-015-0279-2","journal-title":"Inf Sys E Bus Manag"},{"key":"462_CR60","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.jretconser.2016.04.015","volume":"31","author":"S Lissitsa","year":"2016","unstructured":"Lissitsa S, Kol O (2016) Generation X vs. Generation Y-A decade of online shopping. J Retail Consum Serv 31:304\u2013312. https:\/\/doi.org\/10.1016\/j.jretconser.2016.04.015","journal-title":"J Retail Consum Serv"},{"issue":"5","key":"462_CR61","doi-asserted-by":"publisher","first-page":"101581","DOI":"10.1016\/j.ibusrev.2019.05.001","volume":"28","author":"J Liu","year":"2019","unstructured":"Liu J, Zhu Y, Serapio M, Cavusgil ST (2019) The new generation of millennial entrepreneurs: a review and call for research. Int Bus Rev 28(5):101581. https:\/\/doi.org\/10.1016\/j.ibusrev.2019.05.001","journal-title":"Int Bus Rev"},{"issue":"3","key":"462_CR62","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/1461444808089415","volume":"10","author":"S Livingstone","year":"2008","unstructured":"Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers\u2019 use of social networking sites for intimacy, privacy and self-expression. New Media Soc 10(3):393\u2013411. https:\/\/doi.org\/10.1177\/1461444808089415","journal-title":"New Media Soc"},{"issue":"3","key":"462_CR63","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.im.2010.01.003","volume":"47","author":"HP Lu","year":"2010","unstructured":"Lu HP, Hsiao KL (2010) The influence of extro\/introversion on the intention to pay for social networking sites. Inf Manag 47(3):150\u2013157. https:\/\/doi.org\/10.1016\/j.im.2010.01.003","journal-title":"Inf Manag"},{"issue":"2","key":"462_CR64","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11628-015-0277-y","volume":"10","author":"L Lucia-Palacios","year":"2016","unstructured":"Lucia-Palacios L, P\u00e9rez-L\u00f3pez R, Polo-Redondo Y (2016) Enemies of cloud services usage: inertia and switching costs. Serv Bus 10(2):447\u2013467. https:\/\/doi.org\/10.1007\/s11628-015-0277-y","journal-title":"Serv Bus"},{"key":"462_CR65","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.chb.2015.03.019","volume":"49","author":"S Mamonov","year":"2015","unstructured":"Mamonov S, Benbunan-Fich R (2015) An empirical investigation of privacy breach perceptions among smartphone application users. Comput Hum Behav 49:427\u2013436. https:\/\/doi.org\/10.1016\/j.chb.2015.03.019","journal-title":"Comput Hum Behav"},{"issue":"1","key":"462_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/0003122416681031","volume":"82","author":"R Milkman","year":"2017","unstructured":"Milkman R (2017) A new political generation: millennials and the post-2008 wave of protest. Am Sociol Rev 82(1):1\u201331","journal-title":"Am Sociol Rev"},{"issue":"2","key":"462_CR67","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1057\/ejis.2013.17","volume":"23","author":"CL Miltgen","year":"2014","unstructured":"Miltgen CL, Peyrat-Guillard D (2014) Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Eur J Inf Syst 23(2):103\u2013125. https:\/\/doi.org\/10.1057\/ejis.2013.17","journal-title":"Eur J Inf Syst"},{"key":"462_CR68","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","volume":"28","author":"N Mohamed","year":"2012","unstructured":"Mohamed N, Ahmad IH (2012) Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput Hum Behav 28:2366\u20132375. https:\/\/doi.org\/10.1016\/j.chb.2012.07.008","journal-title":"Comput Hum Behav"},{"issue":"6","key":"462_CR69","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1108\/07363761211259241","volume":"29","author":"M Moore","year":"2012","unstructured":"Moore M (2012) Interactive media usage among millennial consumers. J Consum Mark 29(6):436\u2013444. https:\/\/doi.org\/10.1108\/07363761211259241","journal-title":"J Consum Mark"},{"issue":"1","key":"462_CR70","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/15536548.2016.1243854","volume":"13","author":"M Moqbel","year":"2017","unstructured":"Moqbel M, Bartelt V, Al-Suqri M, Al-Maskari A (2017) Does privacy matter to millennials? The case for personal cloud. J Inf Priv Secur 13(1):17\u201333. https:\/\/doi.org\/10.1080\/15536548.2016.1243854","journal-title":"J Inf Priv Secur"},{"key":"462_CR71","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1177\/1077727X0629662","volume":"35","author":"DM Moscardelli","year":"2007","unstructured":"Moscardelli DM, Divine R (2007) Adolescents\u2019 concern for privacy when using the Internet: an empirical analysis of predictors and relationships with privacy-protecting behaviors. Fam Consum Sci Res J 35:232\u2013252. https:\/\/doi.org\/10.1177\/1077727X0629662","journal-title":"Fam Consum Sci Res J"},{"key":"462_CR72","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1057356","volume":"2018","author":"A Mosquera","year":"2018","unstructured":"Mosquera A, Juaneda-Ayensa E, Olarte-Pascual C, Pelegr\u00edn-Borondo J (2018) Key factors for in-store smartphone use in an omnichannel experience: millennials vs. nonmillennials. Complexity 2018:1057356. https:\/\/doi.org\/10.1155\/2018\/1057356","journal-title":"Complexity"},{"issue":"3","key":"462_CR73","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/j.compedu.2012.04.016","volume":"59","author":"W Ng","year":"2012","unstructured":"Ng W (2012) Can we teach digital natives digital literacy? Comput Educ 59(3):1065\u20131078. https:\/\/doi.org\/10.1016\/j.compedu.2012.04.016","journal-title":"Comput Educ"},{"key":"462_CR74","first-page":"2.1","volume-title":"Educating the net generation","author":"D Oblinger","year":"2005","unstructured":"Oblinger D, Oblinger J (2005) Is it age or IT: first steps towards understanding the net generation. In: Oblinger D, Oblinger J (eds) Educating the net generation. EDUCAUSE, Boulder, pp 2.1\u20132.20"},{"issue":"4","key":"462_CR75","doi-asserted-by":"publisher","first-page":"63","DOI":"10.2753\/JOA0091-3367380405","volume":"38","author":"S Okazaki","year":"2009","unstructured":"Okazaki S, Li H, Hirose M (2009) Consumer privacy concerns and preference for degree of regulatory control. J Advert 38(4):63\u201377. https:\/\/doi.org\/10.2753\/JOA0091-3367380405","journal-title":"J Advert"},{"issue":"3","key":"462_CR76","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.tele.2013.11.008","volume":"31","author":"E Park","year":"2014","unstructured":"Park E, Kim KJ (2014) An integrated adoption model of mobile cloud services: exploration of key determinants and extension of technology acceptance model. Telemat Inform 31(3):376\u2013385. https:\/\/doi.org\/10.1016\/j.tele.2013.11.008","journal-title":"Telemat Inform"},{"key":"462_CR77","unstructured":"Pew Center Reports (2010) Social and demographic trends. http:\/\/pewsocialtrends.org\/2010\/02\/24\/Millennials-confident-connected-open-to-change\/. Accessed Sept 2019"},{"issue":"1","key":"462_CR78","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J Phelps","year":"2000","unstructured":"Phelps J, Nowak G, Ferrel E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Mark 19(1):27\u201341. https:\/\/doi.org\/10.1509\/jppm.19.1.27.16941","journal-title":"J Public Policy Mark"},{"issue":"8","key":"462_CR79","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1002\/mar.20236","volume":"25","author":"M Pihlstr\u00f6m","year":"2008","unstructured":"Pihlstr\u00f6m M, Brush GJ (2008) Comparing the perceived value of information and entertainment mobile services. Psychol Mark 25(8):732\u2013755. https:\/\/doi.org\/10.1002\/mar.20236","journal-title":"Psychol Mark"},{"key":"462_CR80","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jretconser.2019.02.006","volume":"48","author":"K Purani","year":"2019","unstructured":"Purani K, Kumar DS, Sahadev S (2019) e-Loyalty among millennials: personal characteristics and social influences. J Retail Consum Serv 48:215\u2013223. https:\/\/doi.org\/10.1016\/j.jretconser.2019.02.006","journal-title":"J Retail Consum Serv"},{"key":"462_CR81","doi-asserted-by":"crossref","unstructured":"Rahumed A, Chen HC, Tang Y, Lee PP, Lui JC (2011) A secure cloud backup system with assured deletion and version control. In: 40th international conference on parallel processing workshops (ICPPW). IEEE, pp 160\u2013167","DOI":"10.1109\/ICPPW.2011.17"},{"issue":"2","key":"462_CR82","first-page":"91","volume":"19","author":"TH Reisenwitz","year":"2009","unstructured":"Reisenwitz TH, Iyer R (2009) Differences in Generation X and Generation Y: implications For the organization and marketers. Mark Manag J 19(2):91\u2013103","journal-title":"Mark Manag J"},{"key":"462_CR83","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.chb.2014.03.002","volume":"35","author":"S Rezaei","year":"2014","unstructured":"Rezaei S, Ghodsi SS (2014) Does value matters in playing online game? An empirical study among massively multiplayer online role-playing games (MMORPGs). Comput Hum Behav 35:252\u2013266. https:\/\/doi.org\/10.1016\/j.chb.2014.03.002","journal-title":"Comput Hum Behav"},{"issue":"2","key":"462_CR84","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1111\/j.1745-6606.2005.00018.x","volume":"39","author":"NJ Rifon","year":"2005","unstructured":"Rifon NJ, LaRose R, Choi SM (2005) Your privacy is sealed: effects of web privacy seals on trust and personal disclosures. J Consum Aff 39(2):339\u2013362. https:\/\/doi.org\/10.1111\/j.1745-6606.2005.00018.x","journal-title":"J Consum Aff"},{"key":"462_CR85","first-page":"153","volume-title":"Social psychophysiology: a sourcebook","author":"R Rogers","year":"1983","unstructured":"Rogers R (1983) Cognitive and physiological processes in fear-based attitude change: a revised theory of protection motivation. In: Cacioppo J, Petty R (eds) Social psychophysiology: a sourcebook. Guilford Press, New York, pp 153\u2013176"},{"key":"462_CR86","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.entcom.2017.04.006","volume":"21","author":"JP Salmon","year":"2017","unstructured":"Salmon JP, Dolan SM, Drake RS, Wilson GC, Klein RM, Eskes GA (2017) A survey of video game preferences in adults: building better games for older adults. Entertain Comput 21:45\u201364. https:\/\/doi.org\/10.1016\/j.entcom.2017.04.006","journal-title":"Entertain Comput"},{"issue":"1","key":"462_CR87","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/08961530.2013.751791","volume":"25","author":"CD Schewe","year":"2013","unstructured":"Schewe CD, Debevec K, Madden TJ, Diamond WD, Parment A, Murphy A (2013) \u201cIf you\u2019ve seen one, you\u2019ve seen them all!\u201d are young millennials the same worldwide? J Int Consum Mark 25(1):3\u201315. https:\/\/doi.org\/10.1080\/08961530.2013.751791","journal-title":"J Int Consum Mark"},{"key":"462_CR88","unstructured":"Schreiner M, Hess T (2015) Why are consumers willing to pay for privacy? An application of the privacy-freemium model to media companies. In: ECIS 2015 completed research papers. Paper 164. https:\/\/aisel.aisnet.org\/ecis2015_cr\/164 (ISBN 978-3-00-050284-2)"},{"key":"462_CR89","unstructured":"Schreiner M, Hess T, Fathianpour F (2013) On the Willingness to Pay for Privacy as a Freemium Model: First Empirical Evidence. In Proceedings of the 21st European conference on information systems (ECIS), Paper 30. Utrecht, Netherlands"},{"key":"462_CR90","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.childyouth.2010.09.011","volume":"33","author":"A Sengupta","year":"2011","unstructured":"Sengupta A, Chaudhuri A (2011) Are social networking sites a source of online harassment for teens? Evidence from survey data. Child Youth Serv Rev 33:284\u2013290","journal-title":"Child Youth Serv Rev"},{"issue":"5","key":"462_CR91","first-page":"249","volume":"2","author":"SK Sharma","year":"2012","unstructured":"Sharma SK, Singh KR (2012) Online data back-up and disaster recovery techniques in cloud computing: a review. Int J Eng Innov Technol 2(5):249\u2013254","journal-title":"Int J Eng Innov Technol"},{"key":"462_CR92","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.chb.2016.03.073","volume":"62","author":"SK Sharma","year":"2016","unstructured":"Sharma SK, Al-Badi AH, Govindaluri SM, Al-Kharusi MH (2016) Predicting motivators of cloud computing adoption: a developing country perspective. Comput Hum Behav 62:61\u201369. https:\/\/doi.org\/10.1016\/j.chb.2016.03.073","journal-title":"Comput Hum Behav"},{"issue":"3","key":"462_CR93","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.im.2015.10.004","volume":"53","author":"WL Shiau","year":"2016","unstructured":"Shiau WL, Chau PY (2016) Understanding behavioral intention to use a cloud computing classroom: a multiple model comparison approach. Inf Manag 53(3):355\u2013365. https:\/\/doi.org\/10.1016\/j.im.2015.10.004","journal-title":"Inf Manag"},{"issue":"3","key":"462_CR94","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1080\/15332861.2017.1317150","volume":"16","author":"A SivaKumar","year":"2017","unstructured":"SivaKumar A, Gunasekaran A (2017) An empirical study on the factors affecting online shopping behavior of millennial consumers. J Internet Commer 16(3):219\u2013230. https:\/\/doi.org\/10.1080\/15332861.2017.1317150","journal-title":"J Internet Commer"},{"key":"462_CR95","volume-title":"Generations: the history of America\u2019s future 1584 to 2069","author":"W Strauss","year":"1991","unstructured":"Strauss W, Howe N (1991) Generations: the history of America\u2019s future 1584 to 2069. William Morrow and Company, New York"},{"issue":"3","key":"462_CR96","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1108\/JHTT-03-2017-0024","volume":"8","author":"E Suh","year":"2017","unstructured":"Suh E, Alhaery M, Abarbanel B, McKenna A (2017) Examining millennials\u2019 online gambling behavior: a comparison of generational differences. J Hosp Tour Technol 8(3):314\u2013336. https:\/\/doi.org\/10.1108\/JHTT-03-2017-0024","journal-title":"J Hosp Tour Technol"},{"issue":"2","key":"462_CR97","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai JY, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Inf Syst Res 22(2):254\u2013268","journal-title":"Inf Syst Res"},{"key":"462_CR98","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.chb.2017.05.038","volume":"75","author":"P Van Schaik","year":"2017","unstructured":"Van Schaik P, Jeske D, Onibokun J, Coventry L, Jansen J, Kusev P (2017) Risk perceptions of cyber-security and precautionary behaviour. Comput Hum Behav 75:547\u2013559. https:\/\/doi.org\/10.1016\/j.chb.2017.05.038","journal-title":"Comput Hum Behav"},{"issue":"4","key":"462_CR99","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s12525-014-0168-4","volume":"24","author":"TM Wagner","year":"2014","unstructured":"Wagner TM, Hess A, Benlian T (2014) Converting freemium customers from free to premium \u2013 the role of the perceived premium fit in the case of music as a service. Electron Mark 24(4):259\u2013268. https:\/\/doi.org\/10.1007\/s12525-014-0168-4","journal-title":"Electron Mark"},{"key":"462_CR100","doi-asserted-by":"crossref","unstructured":"Wang CS, Lin SL (2016) Why are people willing to pay for cloud storage service? In: 2016 IEEE\/ACIS 15th international conference computer and information science (ICIS), pp 1\u20136","DOI":"10.1109\/ICIS.2016.7550806"},{"issue":"4","key":"462_CR101","first-page":"304","volume":"6","author":"CL Wang","year":"2005","unstructured":"Wang CL, Zhang Y, Ye LR, Nguyen DD (2005) Subscription to fee-based online services: What makes consumer pay for online content? J Electron Commer Res 6(4):304\u2013311","journal-title":"J Electron Commer Res"},{"issue":"3","key":"462_CR102","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s11002-015-9349-y","volume":"27","author":"B Weijters","year":"2016","unstructured":"Weijters B, Goedertier F (2016) Understanding today\u2019s music acquisition mix: a latent class analysis of consumers\u2019 combined use of music platforms. Mark Lett 27(3):603\u2013610. https:\/\/doi.org\/10.1007\/s11002-015-9349-y","journal-title":"Mark Lett"},{"issue":"4","key":"462_CR103","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1108\/QMR-06-2013-0041","volume":"16","author":"A Whiting","year":"2013","unstructured":"Whiting A, Williams D (2013) Why people use social media: a uses and gratifications approach. Qual Mark Res Int J 16(4):362\u2013369. https:\/\/doi.org\/10.1108\/QMR-06-2013-0041","journal-title":"Qual Mark Res Int J"},{"key":"462_CR104","first-page":"1","volume-title":"Generation Z as consumers: trends and innovation","author":"S Wood","year":"2013","unstructured":"Wood S (2013) Generation Z as consumers: trends and innovation. NC State University, Institute for Emerging Issues, pp 1\u20133"},{"issue":"1","key":"462_CR105","first-page":"47","volume":"29","author":"JK Yan","year":"2018","unstructured":"Yan JK, Wakefield R (2018) The freemium (two-tiered) model for individual cloud services: factors bridging the free tier and the paying tier. J Inf Technol Manag 29(1):47\u201361","journal-title":"J Inf Technol Manag"},{"key":"462_CR106","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.chb.2015.05.057","volume":"52","author":"HL Yang","year":"2015","unstructured":"Yang HL, Lin SL (2015) User continuance intention to use cloud storage service. Comput Hum Behav 52:219\u2013232. https:\/\/doi.org\/10.1016\/j.chb.2015.05.057","journal-title":"Comput Hum Behav"},{"issue":"4","key":"462_CR107","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1080\/14241277.2015.1107567","volume":"17","author":"L Yang","year":"2015","unstructured":"Yang L, Ha L, Wang F, Abuljadail M (2015) Who pays for online content? A media dependency perspective comparing young and older people. Int J Media Manag 17(4):277\u2013294. https:\/\/doi.org\/10.1080\/14241277.2015.1107567","journal-title":"Int J Media Manag"},{"key":"462_CR108","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1542\/peds.2007-0693","volume":"121","author":"M Ybarra","year":"2008","unstructured":"Ybarra M, Mitchell K (2008) How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics 121:350\u2013357. https:\/\/doi.org\/10.1542\/peds.2007-0693","journal-title":"Pediatrics"},{"issue":"1","key":"462_CR109","first-page":"12","volume":"13","author":"LR Ye","year":"2004","unstructured":"Ye LR, Zhang Y, Nguyen DD, Chiu J (2004) Fee-based online services: exploring consumers\u2019 willingness to pay. J Int Technol Inf Manag 13(1):12","journal-title":"J Int Technol Inf Manag"},{"issue":"1","key":"462_CR110","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.elerap.2006.06.009","volume":"6","author":"C Yoon","year":"2007","unstructured":"Yoon C, Kim S (2007) Convenience and TAM in a ubiquitous computing environment: the case of wireless LAN. Electron Commer R A 6(1):102\u2013112. https:\/\/doi.org\/10.1016\/j.elerap.2006.06.009","journal-title":"Electron Commer R A"},{"issue":"3","key":"462_CR111","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1111\/j.1745-6606.2009.01146.x","volume":"43","author":"S Youn","year":"2009","unstructured":"Youn S (2009) Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J Consum Aff 43(3):389\u2013418. https:\/\/doi.org\/10.1111\/j.1745-6606.2009.01146.x","journal-title":"J Consum Aff"},{"issue":"5","key":"462_CR112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/02650487.2019.1575109","volume":"38","author":"S Youn","year":"2019","unstructured":"Youn S, Kim S (2019) Newsfeed native advertising on Facebook: young millennials\u2019 knowledge, pet peeves, reactance and ad avoidance. Int J Advert 38(5):1\u201333. https:\/\/doi.org\/10.1080\/02650487.2019.1575109","journal-title":"Int J Advert"},{"issue":"1","key":"462_CR113","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1108\/01437730510575570","volume":"26","author":"HC Yu","year":"2005","unstructured":"Yu HC, Miller P (2005) Leadership style: the X generation and baby boomers compared in different cultural contexts. Leadersh Organ Dev J 26(1):35\u201350. https:\/\/doi.org\/10.1108\/01437730510575570","journal-title":"Leadersh Organ Dev J"},{"key":"462_CR114","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.cose.2016.10.006","volume":"65","author":"F Zafar","year":"2017","unstructured":"Zafar F, Khan A, Malik SUR, Ahmed M, Anjum A, Khan MI, Jamil F (2017) A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput Secur 65:29\u201349. https:\/\/doi.org\/10.1016\/j.cose.2016.10.006","journal-title":"Comput Secur"},{"key":"462_CR115","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1016\/j.chb.2016.07.061","volume":"64","author":"M Zhitomirsky-Geffet","year":"2016","unstructured":"Zhitomirsky-Geffet M, Blau M (2016) Cross-generational analysis of predictive factors of addictive behavior in smartphone usage. Comput Hum Behav 64:682\u2013693. https:\/\/doi.org\/10.1016\/j.chb.2016.07.061","journal-title":"Comput Hum Behav"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-020-00462-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-020-00462-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-020-00462-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:09:47Z","timestamp":1611792587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-020-00462-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,29]]},"references-count":114,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["462"],"URL":"https:\/\/doi.org\/10.1007\/s10257-020-00462-8","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,29]]},"assertion":[{"value":"26 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}