{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T01:18:35Z","timestamp":1768267115411,"version":"3.49.0"},"reference-count":125,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T00:00:00Z","timestamp":1674604800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T00:00:00Z","timestamp":1674604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Social Science Foundation of Fujian Province, China","award":["FJ2021B166"],"award-info":[{"award-number":["FJ2021B166"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The theory of privacy calculus in terms of the trade-offs between benefits and risks is believed to explain people\u2019s willingness to disclose private information online. However, the phenomenon of<jats:italic>privacy paradox<\/jats:italic>, referring to the preference-behavior inconsistency, misfits the risk\u2013benefit analysis. The phenomenon of privacy paradox matters because it reflects an illusion of personal control over privacy choices. The anomaly of privacy paradox is perhaps attributed to cognitive heuristics and biases in making privacy decisions. We consider the stability-instability of privacy choices is better used to explain the underlying mechanisms of paradoxical relationship. A rebalanced trade-off, referring to the embeddedness of \u201cbridging\u201d and \u201cbonding\u201d social support in privacy calculus, is derived to develop the risk\u2013benefit paradigms to explain the underlying mechanisms. In this study we address the underlying mechanisms of privacy choices in terms of self-disclosure and user resistance. To test the hypotheses (or mechanisms) of the research model, we developed the instrument by modifying previous scales. A general sample of 311 experienced Facebook users was collected via online questionnaire survey. From the empirical results, perceived benefits based on information support rather than emotion support can motivate self-disclosure willingness. In contrast, privacy risks rather than privacy concerns inhibit the willingness to disclose private information. The risk\u2013benefit paradigms instead of the imbalanced trade-offs help to explain the instability of privacy choices where privacy calculus sticks with the stability view. Implications for the theory and practice of privacy choices are discussed accordingly.<\/jats:p>","DOI":"10.1007\/s10257-023-00622-6","type":"journal-article","created":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T14:03:13Z","timestamp":1674655393000},"page":"353-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Beyond the trade-offs on Facebook: the underlying mechanisms of privacy choices"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9844-8134","authenticated-orcid":false,"given":"Hung-Pin","family":"Shih","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0886-1158","authenticated-orcid":false,"given":"Wuqiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,25]]},"reference":[{"issue":"6","key":"622_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2009.163","volume":"7","author":"A Acquisti","year":"2009","unstructured":"Acquisti A (2009) Nudging privacy: the behavioral economics of personal information. IEEE Secur Priv 7(6):82\u201385. https:\/\/doi.org\/10.1109\/MSP.2009.163","journal-title":"IEEE Secur Priv"},{"key":"622_CR2","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/1-4020-8090-5_13","volume-title":"Economics of information security. Advances in information security","author":"A Acquisti","year":"2004","unstructured":"Acquisti A, Grossklags J (2004) Privacy attitudes and privacy behavior. In: Camp LJ, Lewis S (eds) Economics of information security. Advances in information security, vol 12. Spring, Boston, pp 165\u2013178. https:\/\/doi.org\/10.1007\/1-4020-8090-5_13"},{"issue":"1","key":"622_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti A, Grossklags J (2005) Privacy and rationality in individual decision making. IEEE Secur Priv 3(1):24\u201330. https:\/\/doi.org\/10.1109\/MSP.2005.22","journal-title":"IEEE Secur Priv"},{"issue":"6221","key":"622_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti A, Brandimarte L, Loewenstein G (2015) Privacy and human behavior in the age of information. Science 347(6221):509\u2013514. https:\/\/doi.org\/10.1126\/science.aaa1465","journal-title":"Science"},{"issue":"6578","key":"622_CR5","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1126\/science.abj0826","volume":"375","author":"A Acquisti","year":"2022","unstructured":"Acquisti A, Brandimarte L, Hancock J (2022) How privacy\u2019s past may shape its future. Science 375(6578):270\u2013272. https:\/\/doi.org\/10.1126\/science.abj0826","journal-title":"Science"},{"issue":"2","key":"622_CR6","doi-asserted-by":"publisher","first-page":"465","DOI":"10.25300\/MISQ\/2018\/14316","volume":"42","author":"I Adjerid","year":"2018","unstructured":"Adjerid I, Peer E, Acquisti A (2018) Beyond the privacy paradox: objective versus relative risk in privacy decision making. MIS Q 42(2):465\u2013488. https:\/\/doi.org\/10.25300\/MISQ\/2018\/14316","journal-title":"MIS Q"},{"issue":"1","key":"622_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5465\/amr.2002.5922314","volume":"27","author":"PS Adler","year":"2002","unstructured":"Adler PS, Kwon S-W (2002) Social capital: prospects for a new concept. Acad Manag Rev 27(1):17\u201340. https:\/\/doi.org\/10.5465\/amr.2002.5922314","journal-title":"Acad Manag Rev"},{"key":"622_CR8","doi-asserted-by":"crossref","unstructured":"Ainslie G (2002) The effect of hyperbolic discounting on personal choices. Keynote speech to the thematic session, \u201cPersonal choice and change\u201d. Annual convention of the American Psychological Association, Chicago. http:\/\/picoeconomics.org\/Articles\/APA.pdf","DOI":"10.1037\/e317002004-001"},{"issue":"1","key":"622_CR9","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"NF Awad","year":"2006","unstructured":"Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 30(1):13\u201328. https:\/\/doi.org\/10.2307\/25148715","journal-title":"MIS Q"},{"issue":"1","key":"622_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/BF02723327","volume":"16","author":"RP Bagozzi","year":"1988","unstructured":"Bagozzi RP, Yi Y (1988) On the evaluation of structural equation models. J Acad Mark Sci 16(1):74\u201394","journal-title":"J Acad Mark Sci"},{"issue":"3","key":"622_CR11","doi-asserted-by":"publisher","first-page":"421","DOI":"10.2307\/2393203","volume":"36","author":"RP Bagozzi","year":"1991","unstructured":"Bagozzi RP, Yi Y, Phillips L (1991) Assessing construct validity in organizational research. Adm Sci Q 36(3):421\u2013458. https:\/\/doi.org\/10.2307\/2393203","journal-title":"Adm Sci Q"},{"issue":"7","key":"622_CR12","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth S, de Jong M (2017) The privacy paradox\u2014Investigating discrepancies between expressed privacy concerns and actual online behavior: a systematic literature review. Telematics Inform 34(7):1038\u20131058. https:\/\/doi.org\/10.1016\/j.tele.2017.04.013","journal-title":"Telematics Inform"},{"issue":"C","key":"622_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2019.03.003","volume":"41","author":"S Barth","year":"2019","unstructured":"Barth S, de Jong M, Junger M, Hartel PH, Roppelt JC (2019) Putting the privacy paradox to the test: online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics Inform 41(C):55\u201369. https:\/\/doi.org\/10.1016\/j.tele.2019.03.003","journal-title":"Telematics Inform"},{"issue":"1","key":"622_CR14","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1108\/09593841111109431","volume":"24","author":"PJ Bateman","year":"2011","unstructured":"Bateman PJ, Pike JC, Butler BS (2011) To disclose or not: publicness in social networking sites. Inf Technol People 24(1):78\u2013100. https:\/\/doi.org\/10.1108\/09593841111109431","journal-title":"Inf Technol People"},{"issue":"4","key":"622_CR15","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer F, Crossler RE (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Q 35(4):1017\u20131041. https:\/\/doi.org\/10.2307\/41409971","journal-title":"MIS Q"},{"issue":"3\/4","key":"622_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","volume":"11","author":"F B\u00e9langer","year":"2002","unstructured":"B\u00e9langer F, Hiller JS, Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. J Strat Inf Syst 11(3\/4):245\u2013270. https:\/\/doi.org\/10.1016\/S0963-8687(02)00018-5","journal-title":"J Strat Inf Syst"},{"issue":"6","key":"622_CR17","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1057\/palgrave.ejis.3000717","volume":"16","author":"A Bhattacherjee","year":"2007","unstructured":"Bhattacherjee A, Hikmet N (2007) Physicians\u2019 resistance toward healthcare information technology: a theoretical model and empirical test. Eur J Inf Syst 16(6):725\u2013737. https:\/\/doi.org\/10.1057\/palgrave.ejis.3000717","journal-title":"Eur J Inf Syst"},{"issue":"7","key":"622_CR18","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1108\/EUM0000000006166","volume":"16","author":"WH Bovey","year":"2001","unstructured":"Bovey WH, Hede A (2001) Resistance to organizational change: the role of defense mechanisms. J Manag Psychol 16(7):534\u2013548. https:\/\/doi.org\/10.1108\/EUM0000000006166","journal-title":"J Manag Psychol"},{"key":"622_CR19","volume-title":"Handbook of the digital economy","author":"L Brandimarte","year":"2012","unstructured":"Brandimarte L, Acquisti A (2012) The economics of privacy. In: Peitz M, Waldfogel J (eds) Handbook of the digital economy. Oxford University Press, New York"},{"issue":"3","key":"622_CR20","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1177\/1948550612455931","volume":"4","author":"L Brandimarte","year":"2013","unstructured":"Brandimarte L, Auquisti A, Loewenstein G (2013) Misplaced confidences privacy and the control paradox. Soc Psychol Personal Sci 4(3):340\u2013347. https:\/\/doi.org\/10.1177\/1948550612455931","journal-title":"Soc Psychol Personal Sci"},{"key":"622_CR21","volume-title":"Psychological reactance: a theory of freedom and control","author":"JW Brehm","year":"1981","unstructured":"Brehm JW, Brehm SS (1981) Psychological reactance: a theory of freedom and control. Academic Press, San Diego"},{"key":"622_CR22","unstructured":"Bresnahan TF (2001) Network effects and Microsoft. Stanford University, Working paper"},{"issue":"11","key":"622_CR23","doi-asserted-by":"publisher","first-page":"472","DOI":"10.17705\/1jais.00059","volume":"5","author":"RT Cenfetelli","year":"2004","unstructured":"Cenfetelli RT (2004) Inhibitors and enablers as dual factor concepts in technology usage. J Assoc Inf Syst 5(11):472\u2013492. https:\/\/doi.org\/10.17705\/1jais.00059","journal-title":"J Assoc Inf Syst"},{"key":"622_CR24","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.chb.2013.07.059","volume":"30","author":"C-W Chang","year":"2014","unstructured":"Chang C-W, Heo J (2014) Visiting theories that predict college students\u2019 self-disclosure on Facebook. Comput Hum Behav 30:79\u201386. https:\/\/doi.org\/10.1016\/j.chb.2013.07.059","journal-title":"Comput Hum Behav"},{"issue":"4","key":"622_CR25","first-page":"85","volume":"44","author":"K Chen","year":"2004","unstructured":"Chen K, Rea AI (2004) Protecting personal information online: a survey of user privacy concerns and control techniques. J Comput Inf Syst 44(4):85\u201392","journal-title":"J Comput Inf Syst"},{"issue":"6","key":"622_CR26","doi-asserted-by":"publisher","first-page":"103450","DOI":"10.1016\/j.im.2021.103450","volume":"58","author":"X Cheng","year":"2021","unstructured":"Cheng X, Hou T, Mou J (2021) Investigating perceived risks and benefits of information privacy disclosure in IT-enabled ride-sharing. Inf Manag 58(6):103450. https:\/\/doi.org\/10.1016\/j.im.2021.103450","journal-title":"Inf Manag"},{"key":"622_CR27","unstructured":"Claridge T (2018) Functions of social capital\u2013bonding, bridging, linking"},{"issue":"2","key":"622_CR28","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/293411.293475","volume":"42","author":"R Clarke","year":"1999","unstructured":"Clarke R (1999) Internet privacy concerns confirm the case for intervention. Commun ACM 42(2):60\u201367. https:\/\/doi.org\/10.1145\/293411.293475","journal-title":"Commun ACM"},{"key":"622_CR29","doi-asserted-by":"publisher","first-page":"S95","DOI":"10.1086\/228943","volume":"94","author":"JS Coleman","year":"1988","unstructured":"Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:S95-120. https:\/\/doi.org\/10.1086\/228943","journal-title":"Am J Sociol"},{"issue":"1\u20133","key":"622_CR30","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/S0165-4101(01)00036-2","volume":"31","author":"JE Core","year":"2001","unstructured":"Core JE (2001) A review of the empirical disclosure literature: discussion. J Account Econ 31(1\u20133):441\u2013456. https:\/\/doi.org\/10.1016\/S0165-4101(01)00036-2","journal-title":"J Account Econ"},{"issue":"1","key":"622_CR31","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, impersonal trust: an empirical investigation. Org Sci 10(1):104\u2013115. https:\/\/doi.org\/10.1287\/orsc.10.1.104","journal-title":"Org Sci"},{"key":"622_CR32","first-page":"143","volume-title":"Technology and privacy: the new landscape","author":"SG Davies","year":"1997","unstructured":"Davies SG (1997) Rethinking the right to privacy: how privacy has been transformed from a right to a commodity. In: Agre PE, Rotenberg M (eds) Technology and privacy: the new landscape. MIT Press, Cambridge, pp 143\u2013165"},{"issue":"1","key":"622_CR33","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin B, Lovejoy JP, Horn A-K, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput Mediat Commun 15(1):83\u2013108. https:\/\/doi.org\/10.1111\/j.1083-6101.2009.01494.x","journal-title":"J Comput Mediat Commun"},{"issue":"4","key":"622_CR34","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1080\/10511482.2001.9521429","volume":"12","author":"J DeFilippis","year":"2001","unstructured":"DeFilippis J (2001) The myth of social capital in community development. Hous Policy Debate 12(4):781\u2013806. https:\/\/doi.org\/10.1080\/10511482.2001.9521429","journal-title":"Hous Policy Debate"},{"issue":"5","key":"622_CR35","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/jcc4.12163","volume":"21","author":"T Dienlin","year":"2016","unstructured":"Dienlin T, Metzger MJ (2016) An extended privacy calculus model for SNSs: analyzing self-disclosure and self-withdrawal in a representative U.S. sample. J Comput Mediat Commun 21(5):368\u2013383. https:\/\/doi.org\/10.1111\/jcc4.12163","journal-title":"J Comput Mediat Commun"},{"issue":"1","key":"622_CR36","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev T, Hart P (2006) An extended privacy calculus model for e-commerce transactions. Inf Syst Res 17(1):61\u201380. https:\/\/doi.org\/10.1287\/isre.1060.0080","journal-title":"Inf Syst Res"},{"issue":"3","key":"622_CR37","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jsis.2007.09.002","volume":"17","author":"T Dinev","year":"2008","unstructured":"Dinev T, Hart P, Mullen MR (2008) Internet privacy concerns and beliefs about government surveillance: an empirical investigation. J Strat Inf Syst 17(3):214\u2013233. https:\/\/doi.org\/10.1016\/j.jsis.2007.09.002","journal-title":"J Strat Inf Syst"},{"issue":"4","key":"622_CR38","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"NB Ellison","year":"2007","unstructured":"Ellison NB, Steinfield C, Lampe C (2007) The benefits of Facebook \u201cFriends:\u201d social capital and college students\u2019 use of online social network sites. J Comput Mediat Commun 12(4):1143\u20131168. https:\/\/doi.org\/10.1111\/j.1083-6101.2007.00367.x","journal-title":"J Comput Mediat Commun"},{"issue":"6","key":"622_CR39","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1177\/1461444810385389","volume":"13","author":"NB Ellison","year":"2010","unstructured":"Ellison NB, Steinfield C, Lampe C (2010) Connection strategies: social capital implications of Facebook-enabled communication practices. New Media Soc 13(6):873\u2013892","journal-title":"New Media Soc"},{"issue":"2","key":"622_CR40","doi-asserted-by":"publisher","first-page":"202","DOI":"10.5465\/amr.35.2.zok202","volume":"35","author":"M Farjoun","year":"2010","unstructured":"Farjoun M (2010) Beyond dualism: stability and change as a duality. Acad Manag Rev 35(2):202\u2013225. https:\/\/doi.org\/10.5465\/amr.35.2.zok202","journal-title":"Acad Manag Rev"},{"issue":"2","key":"622_CR41","doi-asserted-by":"publisher","first-page":"101717","DOI":"10.1016\/j.tele.2021.101717","volume":"65","author":"T Fernandes","year":"2021","unstructured":"Fernandes T, Pereira N (2021) Revisiting the privacy calculus: why are consumers (really) willing to disclose personal data online. Telematics Inform 65(2):101717. https:\/\/doi.org\/10.1016\/j.tele.2021.101717","journal-title":"Telematics Inform"},{"key":"622_CR42","doi-asserted-by":"crossref","unstructured":"Flender C, M\u00fcller G (2012) Type indeterminacy in privacy decisions: the privacy paradox revisited. In: International symposium on quantum interaction Q1, pp 148\u2013159","DOI":"10.1007\/978-3-642-35659-9_14"},{"issue":"1","key":"622_CR43","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39\u201350","journal-title":"J Mark Res"},{"key":"622_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-16161-4","volume-title":"Central problems in social theory: action, structure and contradiction in social analysis","author":"A Giddens","year":"1979","unstructured":"Giddens A (1979) Central problems in social theory: action, structure and contradiction in social analysis. University of California Press, Berkeley"},{"issue":"3","key":"622_CR45","first-page":"iii","volume":"37","author":"PB Goes","year":"2013","unstructured":"Goes PB (2013) Editor\u2019s comments: information systems research and behavioral economics. MIS Q 37(3):iii\u2013viii","journal-title":"MIS Q"},{"key":"622_CR46","volume-title":"Multivariate data analysis","author":"JF Hair","year":"2010","unstructured":"Hair JF, Black WC, Babin BJ, Anderson RE (2010) Multivariate data analysis, 7th edn. Prentice Hall, Upper Saddle River","edition":"7"},{"issue":"2","key":"622_CR47","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1080\/24701475.2019.1593667","volume":"3","author":"A Helmond","year":"2019","unstructured":"Helmond A, Nieborg DB, van der Vlist FN (2019) Facebook\u2019s evolution: development of a platform-as-infrastructure. Internet Hist 3(2):123\u2013146. https:\/\/doi.org\/10.1080\/24701475.2019.1593667","journal-title":"Internet Hist"},{"issue":"5","key":"622_CR48","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1093\/comjnl\/31.5.398","volume":"31","author":"R Hirschheim","year":"1988","unstructured":"Hirschheim R, Newman M (1988) Information systems and user resistance: theory and practice. Comput J 31(5):398\u2013408. https:\/\/doi.org\/10.1093\/comjnl\/31.5.398","journal-title":"Comput J"},{"issue":"2","key":"622_CR49","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/019722499128583","volume":"15","author":"DL Hoffman","year":"1999","unstructured":"Hoffman DL, Novak TP, Peralta MA (1999) Information privacy in the marketplace: implications for the commercial uses of anonymity on the Web. Inf Soc 15(2):129\u2013139. https:\/\/doi.org\/10.1080\/019722499128583","journal-title":"Inf Soc"},{"issue":"4","key":"622_CR50","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1145\/1183463.1183467","volume":"6","author":"K-L Hui","year":"2006","unstructured":"Hui K-L, Tan BCY, Goh C-Y (2006) Online information disclosure: motivators and measurements. ACM Trans Internet Technol 6(4):415\u2013441. https:\/\/doi.org\/10.1145\/1183463.1183467","journal-title":"ACM Trans Internet Technol"},{"key":"622_CR51","unstructured":"Hutchinson A (2020) Facebook closes in on new milestone of 3 billions total users across its platform. Social Media Today. https:\/\/www.socialmediatoday.com\/news\/facebook-closes-in-on-new-milestone-of-3-billion-total-users-across-its-pla\/577048\/. Accessed Feb 2021"},{"issue":"1","key":"622_CR52","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1177\/0093650211405313","volume":"40","author":"LC Jiang","year":"2013","unstructured":"Jiang LC, Bazarova NN, Hancock JT (2013a) From perception to behavior: disclosure reciprocity and the intensification of intimacy in computer-mediated communication. Commun Res 40(1):125\u2013143","journal-title":"Commun Res"},{"issue":"3","key":"622_CR53","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1287\/isre.1120.0441","volume":"24","author":"Z Jiang","year":"2013","unstructured":"Jiang Z, Heng CS, Choi BCF (2013b) Privacy concerns and privacy-protective behavior in synchronous online social interactions. Inf Syst Res 24(3):579\u2013595. https:\/\/doi.org\/10.1287\/isre.1120.0441","journal-title":"Inf Syst Res"},{"issue":"5","key":"622_CR54","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1086\/656423","volume":"37","author":"LK John","year":"2011","unstructured":"John LK, Acquisti A, Loewenstein G (2011) Strangers on a plane: context-dependent willingness to divulge sensitive information. J Consum Res 37(5):858\u2013873. https:\/\/doi.org\/10.1086\/656423","journal-title":"J Consum Res"},{"issue":"6","key":"622_CR55","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1111\/isj.12386","volume":"32","author":"S Karwatzki","year":"2022","unstructured":"Karwatzki S, Trenz M, Veit D (2022) The multidimensional nature of privacy risks: conceptualisation, measurement and implications for digital services. Inf Syst J 32(6):1126\u20131157. https:\/\/doi.org\/10.1111\/isj.12386","journal-title":"Inf Syst J"},{"issue":"6","key":"622_CR56","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1111\/isj.12062","volume":"25","author":"F Kehr","year":"2015","unstructured":"Kehr F, Kowatsch T, Wentzel D, Fleisch E (2015) Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Inf Syst J 25(6):607\u2013635. https:\/\/doi.org\/10.1111\/isj.12062","journal-title":"Inf Syst J"},{"issue":"12","key":"622_CR57","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1016\/j.ijhcs.2013.08.016","volume":"71","author":"MJ Keith","year":"2013","unstructured":"Keith MJ, Thompson SC, Hale J, Lowry PB, Greer C (2013) Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. Int J Hum Comput Stud 71(12):1163\u20131173. https:\/\/doi.org\/10.1016\/j.ijhcs.2013.08.016","journal-title":"Int J Hum Comput Stud"},{"issue":"3","key":"622_CR58","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/TEM.2010.2089630","volume":"58","author":"H-W Kim","year":"2011","unstructured":"Kim H-W (2011) The effects of switching costs on user resistance to enterprise systems implementation. IEEE Trans Eng Manag 58(3):471\u2013482","journal-title":"IEEE Trans Eng Manag"},{"issue":"10","key":"622_CR59","doi-asserted-by":"publisher","first-page":"355","DOI":"10.3390\/bs12100355","volume":"12","author":"CY Kingsley Westerman","year":"2022","unstructured":"Kingsley Westerman CY, Haverkamp EM, Zeng C (2022) Understanding disclosure of health information to workplace friends. Behav Sci 12(10):355. https:\/\/doi.org\/10.3390\/bs12100355","journal-title":"Behav Sci"},{"issue":"6","key":"622_CR60","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1057\/ejis.2010.39","volume":"19","author":"T Klaus","year":"2010","unstructured":"Klaus T, Blanton JE (2010) User resistance determinants and the psychological contract in enterprise system implementations. Eur J Inf Syst 19(6):625\u2013636. https:\/\/doi.org\/10.1057\/ejis.2010.39","journal-title":"Eur J Inf Syst"},{"issue":"3","key":"622_CR61","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1111\/j.1540-4560.1977.tb01882.x","volume":"33","author":"PH Klopfer","year":"1977","unstructured":"Klopfer PH, Rubenstein DI (1977) The concept privacy and its biological basis. J Soc Issues 33(3):52\u201365. https:\/\/doi.org\/10.1111\/j.1540-4560.1977.tb01882.x","journal-title":"J Soc Issues"},{"key":"622_CR62","unstructured":"Knight FH (1921) Risk, uncertainty, and profit. University of Chicago Press, Chicago. https:\/\/ssrn.com\/abstract=1496192"},{"issue":"1","key":"622_CR63","doi-asserted-by":"publisher","first-page":"45","DOI":"10.17705\/1jais.00446","volume":"18","author":"N Kordzadeh","year":"2017","unstructured":"Kordzadeh N, Warren J (2017) Communicating personal health information in virtual health communities: an integration of privacy calculus and affective commitment. J Assoc Inf Syst 18(1):45\u201381. https:\/\/doi.org\/10.17705\/1jais.00446","journal-title":"J Assoc Inf Syst"},{"issue":"2","key":"622_CR64","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","volume":"25","author":"H Krasnova","year":"2010","unstructured":"Krasnova H, Spiekermann S, Koroleva K (2010) Online social network: why we disclose. J Inf Technol 25(2):109\u2013125","journal-title":"J Inf Technol"},{"issue":"3","key":"622_CR65","doi-asserted-by":"publisher","first-page":"461","DOI":"10.2307\/25148692","volume":"29","author":"L Lapointe","year":"2005","unstructured":"Lapointe L, Rivard S (2005) A multilevel model of resistance to information technology implementation. MIS Q 29(3):461\u2013491. https:\/\/doi.org\/10.2307\/25148692","journal-title":"MIS Q"},{"issue":"3","key":"622_CR66","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"RS Laufer","year":"1977","unstructured":"Laufer RS, Wolfe M (1977) Privacy as a concept and s social issue: a multidimensional development theory. J Soc Issues 33(3):22\u201342. https:\/\/doi.org\/10.1111\/j.1540-4560.1977.tb01880.x","journal-title":"J Soc Issues"},{"key":"622_CR67","doi-asserted-by":"crossref","unstructured":"Laughlin Jr. SK (1968) Westin: privacy and freedom. Michigan Law Rev 66(5): 1064. https:\/\/repository.law.umich.edu\/mlr\/vol66\/iss5\/12","DOI":"10.2307\/1287193"},{"issue":"6","key":"622_CR68","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1080\/0960085X.2020.1820912","volume":"29","author":"A Leclercq-Vandelannoitte","year":"2020","unstructured":"Leclercq-Vandelannoitte A, Aroles J (2020) Does the end justify the means? Information systems and control society in the age of pandemics. Eur J Inf Syst 29(6):746\u2013761. https:\/\/doi.org\/10.1080\/0960085X.2020.1820912","journal-title":"Eur J Inf Syst"},{"issue":"3","key":"622_CR69","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.dss.2011.01.017","volume":"51","author":"H Li","year":"2011","unstructured":"Li H, Sarathy R, Xu H (2011) The role of affect and cognition on online consumers\u2019 decision to disclose personal information to unfamiliar online vendors. Decis Support Syst 51(3):434\u2013445. https:\/\/doi.org\/10.1016\/j.dss.2011.01.017","journal-title":"Decis Support Syst"},{"issue":"2","key":"622_CR70","doi-asserted-by":"publisher","first-page":"69","DOI":"10.2753\/JEC1086-4415160204","volume":"16","author":"T-P Liang","year":"2011","unstructured":"Liang T-P, Ho Y-T, Li Y-W, Turban E (2011) What drives social commerce: the role of social support and relationship quality. Int J Electron Commer 16(2):69\u201390. https:\/\/doi.org\/10.2753\/JEC1086-4415160204","journal-title":"Int J Electron Commer"},{"issue":"1","key":"622_CR71","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","volume":"86","author":"MK Lindell","year":"2001","unstructured":"Lindell MK, Whitney DJ (2001) Accounting for common method variance in cross-sectional research design. J Appl Psychol 86(1):114\u2013121. https:\/\/doi.org\/10.1037\/0021-9010.86.1.114","journal-title":"J Appl Psychol"},{"issue":"1","key":"622_CR72","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1287\/isre.2021.1045","volume":"33","author":"B Liu","year":"2021","unstructured":"Liu B, Pavlou PA, Cheng X (2021) Achieving a balance between privacy protection and data collection: a field experimental examination of a theory-driven information technology solution. Inf Syst Res 33(1):203\u2013223. https:\/\/doi.org\/10.1287\/isre.2021.1045","journal-title":"Inf Syst Res"},{"issue":"7","key":"622_CR73","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1057\/s41303-017-0066-x","volume":"26","author":"PB Lowry","year":"2017","unstructured":"Lowry PB, Dinev T, Willison R (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. Eur J Inf Syst 26(7):546\u2013563. https:\/\/doi.org\/10.1057\/s41303-017-0066-x","journal-title":"Eur J Inf Syst"},{"issue":"4","key":"622_CR74","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra NK, Kim SS, Agarwal J (2004) Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf Syst Res 15(4):336\u2013355. https:\/\/doi.org\/10.1287\/isre.1040.0032","journal-title":"Inf Syst Res"},{"issue":"1\u20132","key":"622_CR75","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1080\/0267257X.2016.1245212","volume":"33","author":"Z Mani","year":"2017","unstructured":"Mani Z, Chouk I (2017) Drivers of consumers\u2019 resistance to smart products. J Mark Manag 33(1\u20132):76\u201397. https:\/\/doi.org\/10.1080\/0267257X.2016.1245212","journal-title":"J Mark Manag"},{"issue":"3","key":"622_CR76","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1057\/ejis.1996.26","volume":"5","author":"GM Marakas","year":"1996","unstructured":"Marakas GM, Hornik S (1996) Passive resistance misuse: overt support and covert recalcitrance in IS implementation. Eur J Inf Syst 5(3):208\u2013219. https:\/\/doi.org\/10.1057\/ejis.1996.26","journal-title":"Eur J Inf Syst"},{"key":"622_CR77","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s11747-016-0495-4","volume":"45","author":"KD Martin","year":"2017","unstructured":"Martin KD, Murphy PE (2017) The role of data privacy in marketing. J Acad Mark Sci 45:135\u2013155. https:\/\/doi.org\/10.1007\/s11747-016-0495-4","journal-title":"J Acad Mark Sci"},{"issue":"5","key":"622_CR78","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/014492996120085a","volume":"15","author":"MJ Martinko","year":"1996","unstructured":"Martinko MJ, Henry JW, Zmud RW (1996) An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behav Inf Technol 15(5):313\u2013330. https:\/\/doi.org\/10.1080\/014492996120085a","journal-title":"Behav Inf Technol"},{"issue":"2","key":"622_CR79","doi-asserted-by":"publisher","first-page":"242","DOI":"10.5465\/amr.1998.533225","volume":"23","author":"J Nahapiet","year":"1998","unstructured":"Nahapiet J, Ghoshal S (1998) Social capital, intellectual capital, and the organizational advantage. Acad Manag Rev 23(2):242\u2013266. https:\/\/doi.org\/10.5465\/amr.1998.533225","journal-title":"Acad Manag Rev"},{"issue":"S1","key":"622_CR80","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1111\/j.1467-8551.2004.00399.x","volume":"15","author":"S Newell","year":"2004","unstructured":"Newell S, Tansley C, Huang J (2004) Social capital and knowledge integration in an ERP project team: the importance of bridging and bonding. Br J Manag 15(S1):43\u201357. https:\/\/doi.org\/10.1111\/j.1467-8551.2004.00399.x","journal-title":"Br J Manag"},{"issue":"1","key":"622_CR81","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behavior. J Consum Affairs 41(1):100\u2013126. https:\/\/doi.org\/10.1111\/j.1745-6606.2006.00070.x","journal-title":"J Consum Affairs"},{"key":"622_CR82","volume-title":"Psychometric theory","author":"J Nunnally","year":"1978","unstructured":"Nunnally J (1978) Psychometric theory, 2nd edn. McGraw-Hill, New York","edition":"2"},{"issue":"3","key":"622_CR83","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1287\/orsc.3.3.398","volume":"3","author":"WJ Orlikowski","year":"1992","unstructured":"Orlikowski WJ (1992) The duality of technology: rethinking the concept of technology in organizations. Org Sci 3(3):398\u2013427. https:\/\/doi.org\/10.1287\/orsc.3.3.398","journal-title":"Org Sci"},{"issue":"6","key":"622_CR84","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1057\/s41303-017-0056-z","volume":"26","author":"ZD Ozdemir","year":"2017","unstructured":"Ozdemir ZD, Smith HJ, Benamati JH (2017) Antecedents and outcomes of information privacy concerns in a peer context: an exploratory study. Eur J Inf Syst 26(6):642\u2013660. https:\/\/doi.org\/10.1057\/s41303-017-0056-z","journal-title":"Eur J Inf Syst"},{"issue":"4","key":"622_CR85","doi-asserted-by":"publisher","first-page":"977","DOI":"10.2307\/41409969","volume":"35","author":"PA Pavlou","year":"2011","unstructured":"Pavlou PA (2011) State of the information privacy literature: where are we now and where should we go? MIS Q 35(4):977\u2013988. https:\/\/doi.org\/10.2307\/41409969","journal-title":"MIS Q"},{"issue":"1","key":"622_CR86","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1086\/210268","volume":"105","author":"P Paxton","year":"1999","unstructured":"Paxton P (1999) Is social capital declining in the United States? A multiple indicator assessment. Am J Sociol 105(1):88\u2013127","journal-title":"Am J Sociol"},{"key":"622_CR87","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of privacy: dialectics of disclosure","author":"S Petronio","year":"2002","unstructured":"Petronio S (2002) Boundaries of privacy: dialectics of disclosure. SUNY Press, New York"},{"issue":"4","key":"622_CR88","first-page":"531","volume":"12","author":"PM Podsakoff","year":"1986","unstructured":"Podsakoff PM, Organ DW (1986) Self-reports in organizational research: problems and prospects. J Manag 12(4):531\u2013544","journal-title":"J Manag"},{"key":"622_CR89","volume-title":"The great transformation: the political and economic origins of our time","author":"K Polanyi","year":"1957","unstructured":"Polanyi K (1957) The great transformation: the political and economic origins of our time. Beacon Press, Boston"},{"issue":"1","key":"622_CR90","doi-asserted-by":"publisher","first-page":"221","DOI":"10.25300\/MISQ\/2013\/37.1.10","volume":"37","author":"GL Polites","year":"2013","unstructured":"Polites GL, Karahanna E (2013) The embeddedness of information systems habits in organizational and individual level routines: development and disruption. MIS Q 37(1):221\u2013246. https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.1.10","journal-title":"MIS Q"},{"issue":"3","key":"622_CR91","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10799-018-0295-2","volume":"20","author":"GN Punj","year":"2019","unstructured":"Punj GN (2019) Understanding individuals\u2019 intentions to limit online personal information disclosure to protect their privacy: implications for organizations and public policy. Inf Technol Manag 20(3):139\u2013151. https:\/\/doi.org\/10.1007\/s10799-018-0295-2","journal-title":"Inf Technol Manag"},{"key":"622_CR92","volume-title":"Bowling alone: the collapse and revival of American community","author":"RD Putnam","year":"2000","unstructured":"Putnam RD (2000) Bowling alone: the collapse and revival of American community. Simon and Schuster, New York"},{"issue":"2","key":"622_CR93","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/EUM0000000002542","volume":"6","author":"S Ram","year":"1989","unstructured":"Ram S, Sheth JN (1989) Consumer resistance to innovations: the marketing problem and its solution. J Consum Mark 6(2):5\u201314. https:\/\/doi.org\/10.1108\/EUM0000000002542","journal-title":"J Consum Mark"},{"key":"622_CR94","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2775","author":"K Raynes-Goldie","year":"2010","unstructured":"Raynes-Goldie K (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook. First Money. https:\/\/doi.org\/10.5210\/fm.v15i1.2775","journal-title":"First Money"},{"issue":"1","key":"622_CR95","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. J Psychol 91(1):93\u2013114. https:\/\/doi.org\/10.1080\/00223980.1975.9915803","journal-title":"J Psychol"},{"issue":"4","key":"622_CR96","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1177\/009207002236917","volume":"30","author":"RT Rust","year":"2002","unstructured":"Rust RT, Kannan PK, Peng N (2002) The customer economics of Internet privacy. J Acad Mark Sci 30(4):455\u2013464","journal-title":"J Acad Mark Sci"},{"issue":"1","key":"622_CR97","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF00055564","volume":"1","author":"W Samuelson","year":"1988","unstructured":"Samuelson W, Zeckhauser R (1988) Status quo bias in decision making. J Risk Uncertain 1(1):7\u201359. https:\/\/doi.org\/10.1007\/BF00055564","journal-title":"J Risk Uncertain"},{"issue":"3","key":"622_CR98","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/dir.10033","volume":"16","author":"DD Schoenbachler","year":"2002","unstructured":"Schoenbachler DD, Gordon GL (2002) Trust and consumer willingness to provide information in database-driven relationship marketing. J Interact Mark 16(3):2\u201316. https:\/\/doi.org\/10.1002\/dir.10033","journal-title":"J Interact Mark"},{"issue":"4","key":"622_CR99","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35(4):989\u20131015. https:\/\/doi.org\/10.2307\/41409970","journal-title":"MIS Q"},{"issue":"2","key":"622_CR100","first-page":"578","volume":"13","author":"SM Smyth","year":"2019","unstructured":"Smyth SM (2019) The Facebook conundrum: is it time to usher in a new era of regulation for big tech? Int J Cyber Criminol 13(2):578\u2013595","journal-title":"Int J Cyber Criminol"},{"key":"622_CR102","unstructured":"Sraders A (2020) History of Facebook: facts and what\u2019s happening. The Street-Technology. https:\/\/www.thestreet.com\/technology\/history-of-facebook-14740346"},{"issue":"4","key":"622_CR103","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.25300\/MISQ\/2013\/37.4.07","volume":"37","author":"J Sutanto","year":"2013","unstructured":"Sutanto J, Palme E, Tan C-H, Phang CW (2013) Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Q 37(4):1141\u20131164. https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.4.07","journal-title":"MIS Q"},{"key":"622_CR104","unstructured":"Sweat J (2000) Privacy paradox: customer want control and coupons. Information week, 781, April, 52"},{"issue":"6\/7","key":"622_CR105","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/S0166-4972(98)00030-3","volume":"18","author":"I Szmigin","year":"1998","unstructured":"Szmigin I, Foxall G (1998) Three forms of innovation resistance: the case of retail payment methods. Technovation 18(6\/7):459\u2013468. https:\/\/doi.org\/10.1016\/S0166-4972(98)00030-3","journal-title":"Technovation"},{"issue":"3","key":"622_CR106","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1037\/0022-3514.87.3.354","volume":"87","author":"SE Taylor","year":"2004","unstructured":"Taylor SE, Sherman DK, Kim HS, Jarcho J, Takagi K, Dunagan MS (2004) Culture and social support: who seeks it and why? J Personal Soc Psychol 87(3):354\u2013362. https:\/\/doi.org\/10.1037\/0022-3514.87.3.354","journal-title":"J Personal Soc Psychol"},{"key":"622_CR107","volume-title":"Nudge: improving decisions about health, wealth, and happiness","author":"RH Thaler","year":"2008","unstructured":"Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, London"},{"key":"622_CR108","unstructured":"Treacy S, Feller J, O\u2019Flaherty B, Nagle T (2017) Competitive market innovation contests and social capital: diametrically opposed, or inherently linked? In: Proceedings of the 25th European conference on information systems (ECIS), Guimar\u00e3es, Portugal, pp 1695\u20131712. http:\/\/aisel.aisnet.org\/ecis2017_rp\/109"},{"issue":"2","key":"622_CR109","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai JY, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Inf Syst Res 22(2):254\u2013268. https:\/\/doi.org\/10.1287\/isre.1090.0260","journal-title":"Inf Syst Res"},{"issue":"1","key":"622_CR110","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1177\/1461444816660731","volume":"20","author":"M Tsay-Vogel","year":"2018","unstructured":"Tsay-Vogel M, Shanahan J, Signorielli N (2018) Social media cultivating perceptions of privacy: a 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media Soc 20(1):141\u2013161","journal-title":"New Media Soc"},{"issue":"2","key":"622_CR111","first-page":"72","volume":"32","author":"C Tucker","year":"2018","unstructured":"Tucker C (2018) Network effects and market power: what have we learned in the last decade? Antitrust 32(2):72\u201379","journal-title":"Antitrust"},{"issue":"2","key":"622_CR112","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/2393808","volume":"42","author":"B Uzzi","year":"1997","unstructured":"Uzzi B (1997) Social structure and competition in interfirm networks: the paradox of embeddedness. Adm Sci Q 42(2):35\u201367. https:\/\/doi.org\/10.2307\/2393808","journal-title":"Adm Sci Q"},{"key":"622_CR113","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1111\/j.1083-6101.2009.01474.x","volume":"14","author":"S Valenzuela","year":"2009","unstructured":"Valenzuela S, Park N, Kee KF (2009) Is there social capital in a social network site? Facebook use and college students\u2019 life satisfaction, trust, and participation. J Comput Mediat Commun 14:875\u2013901. https:\/\/doi.org\/10.1111\/j.1083-6101.2009.01474.x","journal-title":"J Comput Mediat Commun"},{"issue":"4","key":"622_CR114","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.ijinfomgt.2016.03.003","volume":"36","author":"T Wang","year":"2016","unstructured":"Wang T, Duong TD, Chen CC (2016) Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int J Inf Manag 36(4):531\u2013542. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.03.003","journal-title":"Int J Inf Manag"},{"issue":"5","key":"622_CR115","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193\u2013220","journal-title":"Harvard Law Rev"},{"issue":"1","key":"622_CR116","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/25148667","volume":"29","author":"MM Wasko","year":"2005","unstructured":"Wasko MM, Faraj S (2005) Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Q 29(1):35\u201357. https:\/\/doi.org\/10.2307\/25148667","journal-title":"MIS Q"},{"issue":"1","key":"622_CR117","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1111\/j.1083-6101.2011.01559.x","volume":"17","author":"S Waters","year":"2011","unstructured":"Waters S, Ackerman J (2011) Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure. J Comput Mediat Commun 17(1):101\u2013115. https:\/\/doi.org\/10.1111\/j.1083-6101.2011.01559.x","journal-title":"J Comput Mediat Commun"},{"key":"622_CR118","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin A (1967) Privacy and freedom. Atheneum, New York"},{"key":"622_CR119","first-page":"265","volume-title":"Review of personality and social personality. Prosocial behavior","author":"TA Wills","year":"1991","unstructured":"Wills TA (1991) Social support and interpersonal relationships. In: Clark MS (ed) Review of personality and social personality. Prosocial behavior, vol 12. Sage Publication, Thousand Oaks, pp 265\u2013289"},{"issue":"4","key":"622_CR120","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/03637759209376276","volume":"59","author":"K Witte","year":"1992","unstructured":"Witte K (1992) Putting the fear back into fear appeals: the extended parallel process model. Commun Monogr 59(4):329\u2013349. https:\/\/doi.org\/10.1080\/03637759209376276","journal-title":"Commun Monogr"},{"issue":"2","key":"622_CR121","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1093\/wbro\/15.2.225","volume":"15","author":"M Woolcock","year":"2000","unstructured":"Woolcock M, Narayan D (2000) Social capital: implications for development theory, research, and policy. World Bank Res Obs 15(2):225\u2013249","journal-title":"World Bank Res Obs"},{"issue":"3","key":"622_CR122","doi-asserted-by":"publisher","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","volume":"26","author":"H Xu","year":"2009","unstructured":"Xu H, Teo H-H, Tan BCY, Agarwal R (2009) The role of push-pull technology in privacy calculus: the case of location-based services. J Manag Inf Syst 26(3):135\u2013173. https:\/\/doi.org\/10.2753\/MIS0742-1222260305","journal-title":"J Manag Inf Syst"},{"issue":"12","key":"622_CR123","doi-asserted-by":"publisher","first-page":"798","DOI":"10.17705\/1jais.00281","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu H, Dinev T, Smith J, Hart P (2011a) Information privacy concerns: linking individual perceptions with institutional privacy assurances. J Assoc Inf Syst 12(12):798\u2013824. https:\/\/doi.org\/10.17705\/1jais.00281","journal-title":"J Assoc Inf Syst"},{"issue":"1","key":"622_CR124","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","volume":"51","author":"H Xu","year":"2011","unstructured":"Xu H, Luo X, Carroll JM, Rosson MB (2011b) The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decis Support Syst 51(1):42\u201352. https:\/\/doi.org\/10.1016\/j.dss.2010.11.017","journal-title":"Decis Support Syst"},{"key":"622_CR125","doi-asserted-by":"publisher","first-page":"102015","DOI":"10.1016\/j.ijinfomgt.2019.09.011","volume":"51","author":"L Yu","year":"2020","unstructured":"Yu L, Li H, He W, Wang F-K, Jiao S (2020) A meta-analysis to explore privacy cognition and information disclosure of internet users. Int J Inf Manag 51:102015. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.09.011","journal-title":"Int J Inf Manag"},{"issue":"C","key":"622_CR126","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"LN Zlatolas","year":"2015","unstructured":"Zlatolas LN, Welzer T, Heri\u010dko M, H\u00f6lbl M (2015) Privacy antecedents for SNS self-disclosure: the case of Facebook. Comput Hum Behav 45(C):158\u2013167. https:\/\/doi.org\/10.1016\/j.chb.2014.12.012","journal-title":"Comput Hum Behav"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-023-00622-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10257-023-00622-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-023-00622-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T16:32:09Z","timestamp":1701793929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10257-023-00622-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,25]]},"references-count":125,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["622"],"URL":"https:\/\/doi.org\/10.1007\/s10257-023-00622-6","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,25]]},"assertion":[{"value":"7 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known conflicts of interest or personal relationships that could influence the work reported in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}