{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:11:01Z","timestamp":1775380261977,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1007\/s10660-009-9036-2","type":"journal-article","created":{"date-parts":[[2009,3,9]],"date-time":"2009-03-09T12:45:40Z","timestamp":1236602740000},"page":"203-223","source":"Crossref","is-referenced-by-count":131,"title":["Privacy concern and online personalization: The\u00a0moderating effects of information control and compensation"],"prefix":"10.1007","volume":"9","author":[{"given":"David G.","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Donna F.","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Jillapalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"issue":"1","key":"9036_CR1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26\u201333.","journal-title":"IEEE Security & Privacy"},{"key":"9036_CR2","volume-title":"The environment and social behavior: Privacy, personal space, territory, crowding","author":"I. Altman","year":"1975","unstructured":"Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, crowding. Monterey: Brooks\/Cole."},{"issue":"1","key":"9036_CR3","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","volume":"16","author":"R. P. Bagozzi","year":"1988","unstructured":"Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74.","journal-title":"Journal of the Academy of Marketing Science"},{"key":"9036_CR4","volume-title":"Attachment and loss: Vol. I. Attachment","author":"J. Bowlby","year":"1969","unstructured":"Bowlby, J. (1969). Attachment and loss: Vol. I. Attachment. New York: Basic Books."},{"issue":"2","key":"9036_CR5","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10660-007-9000-y","volume":"7","author":"J. Casta\u00f1eda","year":"2007","unstructured":"Casta\u00f1eda, J., & Montoro, F. (2007). The effect of internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117\u2013141.","journal-title":"Electronic Commerce Research"},{"issue":"2\u20133","key":"9036_CR6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"R. K. Chellappa","year":"2005","unstructured":"Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer\u2019s dilemma. Information Technology and Management, 6(2\u20133), 181\u2013202.","journal-title":"Information Technology and Management"},{"issue":"2","key":"9036_CR7","first-page":"498","volume":"2","author":"A. Coner","year":"2003","unstructured":"Coner, A. (2003). Personalization and customization in financial portals. Journal of American Academy of Business, Cambridge, 2(2), 498.","journal-title":"Journal of American Academy of Business, Cambridge"},{"issue":"4","key":"9036_CR8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1002\/dir.1020","volume":"15","author":"N. Coviello","year":"2001","unstructured":"Coviello, N., Milley, R., & Marcolin, B. (2001). Understanding it-enabled interactivity in contemporary marketing. Journal of Interactive Marketing, 15(4), 18\u201333.","journal-title":"Journal of Interactive Marketing"},{"key":"9036_CR9","volume-title":"Designing personalized user experiences in ecommerce","author":"L. F. Cranor","year":"2004","unstructured":"Cranor, L. F. (2004). \u2018I didn\u2019t buy it for myself\u2019: Privacy and ecommerce personalization. In C.-M. Karat, J. O. Blom, & J. Karat (Eds.), Designing personalized user experiences in ecommerce. Norwell: Kluwer Academic."},{"issue":"1","key":"9036_CR10","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"M. J. Culnan","year":"1999","unstructured":"Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104\u2013115.","journal-title":"Organization Science"},{"key":"9036_CR11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s10676-006-0002-6","volume":"7","author":"P. B. Laat De","year":"2005","unstructured":"De Laat, P. B. (2005). Trusting virtual trust. Ethics and Information Technology, 7, 167\u2013180.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9036_CR12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.2753\/JEC1086-4415100201","volume":"10","author":"T. Dinev","year":"2005","unstructured":"Dinev, T., & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7\u201329.","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"9036_CR13","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2979\/esj.2006.4.3.25","volume":"4","author":"T. Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use. E-Service Journal, 4(3), 25\u201357.","journal-title":"E-Service Journal"},{"issue":"2","key":"9036_CR14","first-page":"35","volume":"61","author":"P. M. Doney","year":"1997","unstructured":"Doney, P. M., & Cannon, J. P. (1997). An examination of the nature of trust in buyer-seller relationships. Journal of Marketing, 61(2), 35\u201351.","journal-title":"Journal of Marketing"},{"issue":"3","key":"9036_CR15","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1177\/002224299906300302","volume":"63","author":"T. W. Dunfee","year":"1999","unstructured":"Dunfee, T. W., Smith, N. C., & Ross Jr., W.T. (1999). Social contracts and marketing ethics. Journal of Marketing, 63(3), 14\u201332.","journal-title":"Journal of Marketing"},{"issue":"8","key":"9036_CR16","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","volume":"59","author":"M. A. Eastlick","year":"2006","unstructured":"Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online b-to-c relationships: An\u00a0integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877\u2013886.","journal-title":"Journal of Business Research"},{"key":"9036_CR17","volume-title":"Belief, attitude, intention, and behavior: An introduction to theory and research","author":"M. Fishbein","year":"1975","unstructured":"Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading: Addison-Wesley."},{"issue":"1","key":"9036_CR18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C. Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research (JMR), 18(1), 39\u201350.","journal-title":"Journal of Marketing Research (JMR)"},{"issue":"2","key":"9036_CR19","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1177\/002224299906300205","volume":"63","author":"E. Garbarino","year":"1999","unstructured":"Garbarino, E., & Johnson, M. S. (1999). The different roles of satisfaction, trust, and commitment in customer relationships. Journal of Marketing, 63(2), 70\u201387.","journal-title":"Journal of Marketing"},{"issue":"1","key":"9036_CR20","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1177\/074391569101000111","volume":"10","author":"C. Goodwin","year":"1991","unstructured":"Goodwin, C. (1991). Privacy: Recognition of a consumer right. Journal of Public Policy & Marketing, 10(1), 149\u2013166.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"4\/5","key":"9036_CR21","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1108\/07363760210433627","volume":"19","author":"T. R. Graeff","year":"2002","unstructured":"Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: Consumers\u2019 awareness and concerns. The Journal of Consumer Marketing, 19(4\/5), 302.","journal-title":"The Journal of Consumer Marketing"},{"key":"9036_CR22","unstructured":"Greenberg, P. A. (2000). E-shoppers choose personalization over privacy. e-Commerce Times, January 4 edition."},{"issue":"2","key":"9036_CR23","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1177\/0092070398262002","volume":"26","author":"K. P. Gwinner","year":"1998","unstructured":"Gwinner, K. P., Gremler, D. D., & Bitner, M. J. (1998). Relational benefits in services industries: The customer\u2019s perspective. Academy of Marketing Sciences Journal, 26(2), 101\u2013114.","journal-title":"Academy of Marketing Sciences Journal"},{"issue":"4\/5","key":"9036_CR24","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1108\/10610420410554412","volume":"13","author":"H.-Y. Ha","year":"2004","unstructured":"Ha, H.-Y. (2004). Factors influencing consumer perceptions of brand trust online. The Journal of Product and Brand Management, 13(4\/5), 329.","journal-title":"The Journal of Product and Brand Management"},{"issue":"4","key":"9036_CR25","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/299157.299175","volume":"42","author":"D. L. Hoffman","year":"1999","unstructured":"Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80\u201385.","journal-title":"Communications of the ACM"},{"key":"9036_CR26","unstructured":"Horrigan, J. (2008). Internet users like the convenience but worry about the security of their financial information. www.pewinternet.org . Accessed July 17, 2008."},{"key":"9036_CR27","unstructured":"Jacobs, R. S., Hyman, M. R., & Mcquitty, S. (2000). Exchange-specific self-disclosure, social self-disclosure, and personal selling. In American marketing association. Conference proceedings (Vol.\u00a011, p.\u00a0261)."},{"issue":"4","key":"9036_CR28","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/07421222.1998.11518185","volume":"14","author":"S. L. Jarvenpaa","year":"1998","unstructured":"Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there? Journal of Management Information Systems, 14(4), 29\u201364.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9036_CR29","first-page":"84","volume":"47","author":"M.-S. Kim","year":"2006","unstructured":"Kim, M.-S., & Ahn, J.-H. (2006). Comparison of trust sources of online market-maker in the e-marketplace: Buyer\u2019s and seller\u2019s perspectives. Journal of Computer Information Systems, 47(1), 84\u201394.","journal-title":"Journal of Computer Information Systems"},{"key":"9036_CR30","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1002\/tea.3660250605","volume":"25","author":"T. R. Koballa","year":"1988","unstructured":"Koballa, T. R. (1988). The determinants of female junior high school students\u2019 intentions to enroll in elective physical science courses in high school: Testing the applicability of the theory of reasoned action. Journal of Research in Science Teaching, 25, 479\u2013492.","journal-title":"Journal of Research in Science Teaching"},{"issue":"7","key":"9036_CR31","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1016\/S0148-2963(02)00359-4","volume":"57","author":"J. Langenderfer","year":"2004","unstructured":"Langenderfer, J., & Cook, D. L. (2004). Oh, what a tangled web we weave: The state of privacy protection in the information economy and recommendations for governance. Journal of Business Research, 57(7), 734.","journal-title":"Journal of Business Research"},{"issue":"9","key":"9036_CR32","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/234215.234476","volume":"39","author":"K. C. Laudon","year":"1996","unstructured":"Laudon, K. C. (1996). Markets and privacy. Communications of the ACM, 39(9), 92\u2013104.","journal-title":"Communications of the ACM"},{"key":"9036_CR33","doi-asserted-by":"crossref","unstructured":"Lewicki, R. J., & Bunker, B. B. (1996). Developing and maintaining trust in work relationships. In R.M. Kramer, T.R. Tyler (Eds.), Trust in organizations: Frontiers of theory and research (pp. 114\u2013139).","DOI":"10.4135\/9781452243610.n7"},{"issue":"1","key":"9036_CR34","doi-asserted-by":"crossref","first-page":"18","DOI":"10.4018\/jgim.2004010102","volume":"1","author":"C. Liu","year":"2004","unstructured":"Liu, C., Marchewka, J. T., & Ku, C. (2004). American and Taiwanese perceptions concerning privacy, trust, and behavioral intentions in electronic commerce. Journal of Global Information Management, 1(1), 18\u201340.","journal-title":"Journal of Global Information Management"},{"issue":"2","key":"9036_CR35","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.im.2004.01.003","volume":"42","author":"C. Liu","year":"2005","unstructured":"Liu, C., Marchewka, J. T., Lu, J., & Chun-Sheng, Y. (2005). Beyond concern a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289\u2013304.","journal-title":"Information & Management"},{"key":"9036_CR36","volume-title":"Latent variable models: An introduction to factor, path, and structural analysis","author":"J. C. Loehlin","year":"1992","unstructured":"Loehlin, J. C. (1992). Latent variable models: An introduction to factor, path, and structural analysis. Mahwah: Lawrence Erlbaum Associates."},{"key":"9036_CR37","first-page":"94","volume-title":"Trust: Making and breaking cooperative relations","author":"N. Luhmann","year":"2000","unstructured":"Luhmann, N. (2000). Familiarity, confidence, trust: Problems and alternatives. In D. Gambetta (Ed.), Trust: Making and breaking cooperative relations (pp. 94\u2013107). London: University of Oxford."},{"issue":"2","key":"9036_CR38","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/S0019-8501(01)00182-1","volume":"31","author":"X. Luo","year":"2002","unstructured":"Luo, X. (2002). Trust production and privacy concerns on the internet a framework based on relationship marketing and social exchange theory. Industrial Marketing Management, 31(2), 111.","journal-title":"Industrial Marketing Management"},{"issue":"4","key":"9036_CR39","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N. K. Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (iuipc): The construct, the scale and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"key":"9036_CR40","unstructured":"Mangalindan, M. (2003). Web ads on the rebound. Wall Street Journal, August 25 edition."},{"issue":"7","key":"9036_CR41","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1108\/07363760310506201","volume":"20","author":"O. A. J. Mascarenhas","year":"2003","unstructured":"Mascarenhas, O. A. J., Kesavan, R., & Bernacchi, M. D. (2003). Co-managing online privacy: A call for joint ownership. Journal of Consumer Marketing, 20(7), 686\u2013702.","journal-title":"Journal of Consumer Marketing"},{"issue":"1","key":"9036_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jeco.2006010101","volume":"4","author":"D. B. Meinert","year":"2006","unstructured":"Meinert, D. B., Peterson, D. K., Criswell, J. R., & Crossland, M. D. (2006). Privacy policy statements and consumer willingness to provide personal information. Journal of Electronic Commerce in Organizations, 4(1), 1\u201317.","journal-title":"Journal of Electronic Commerce in Organizations"},{"issue":"1","key":"9036_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1509\/jppm.19.1.1.16934","volume":"19","author":"G. R. Milne","year":"2000","unstructured":"Milne, G. R. (2000). Privacy and ethical issues in database\/interactive marketing and public policy: A\u00a0research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1\u20136.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"2","key":"9036_CR44","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1177\/074391569101200206","volume":"12","author":"G. R. Milne","year":"1993","unstructured":"Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206\u2013215.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"1","key":"9036_CR45","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9","volume":"13","author":"G. R. Milne","year":"1999","unstructured":"Milne, G. R., & Boza, M.-E. (1999). Trust and concern in consumers\u2019 perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5\u201324.","journal-title":"Journal of Interactive Marketing"},{"issue":"4","key":"9036_CR46","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1086\/209566","volume":"26","author":"Y. Moon","year":"2000","unstructured":"Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from consumers. Journal of Consumer Research, 26(4), 323\u2013339.","journal-title":"Journal of Consumer Research"},{"issue":"1","key":"9036_CR47","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1177\/002224299305700106","volume":"57","author":"C. Moorman","year":"1993","unstructured":"Moorman, C., Deshpande, R., & Zaltman, G. (1993). Factors affecting trust in market research relationships. Journal of Marketing, 57(1), 81\u2013101.","journal-title":"Journal of Marketing"},{"issue":"3","key":"9036_CR48","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1177\/002224299405800302","volume":"58","author":"R. M. Morgan","year":"1994","unstructured":"Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20\u201338.","journal-title":"Journal of Marketing"},{"issue":"3","key":"9036_CR49","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1002\/dir.4000090307","volume":"9","author":"G. J. Nowak","year":"1995","unstructured":"Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when \u201cprivacy\u201d matters. Journal of Direct Marketing, 9(3), 46\u201360.","journal-title":"Journal of Direct Marketing"},{"issue":"2","key":"9036_CR50","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1177\/002224378101800201","volume":"18","author":"J. P. Peter","year":"1981","unstructured":"Peter, J. P. (1981). Construct validity: A review of basic issues and marketing practices. Journal of Marketing Research (JMR), 18(2), 133\u2013145.","journal-title":"Journal of Marketing Research (JMR)"},{"issue":"3","key":"9036_CR51","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1086\/323732","volume":"28","author":"R. A. Peterson","year":"2001","unstructured":"Peterson, R. A. (2001). On the use of college students in social science research: Insights from a second-order meta-analysis. Journal of Consumer Research, 28(3), 450\u2013461.","journal-title":"Journal of Consumer Research"},{"issue":"4","key":"9036_CR52","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1002\/dir.1019","volume":"15","author":"J. E. Phelps","year":"2001","unstructured":"Phelps, J. E., D\u2019souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2\u201317.","journal-title":"Journal of Interactive Marketing"},{"issue":"2","key":"9036_CR53","first-page":"137","volume":"9","author":"O. J. Postma","year":"2002","unstructured":"Postma, O. J., & Brokke, M. (2002). Personalisation in practice: The proven effects of personalisation. Journal of Database Marketing, 9(2), 137.","journal-title":"Journal of Database Marketing"},{"issue":"9","key":"9036_CR54","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1151030.1151052","volume":"49","author":"S. Sackmann","year":"2006","unstructured":"Sackmann, S., Struker, J., & Accorsi, R. (2006). Personalization in privacy-aware highly dynamic systems. Communications of the ACM, 49(9), 32\u201338.","journal-title":"Communications of the ACM"},{"issue":"1","key":"9036_CR55","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/01972240252818207","volume":"18","author":"K. B. Sheehan","year":"2002","unstructured":"Sheehan, K. B. (2002). Toward a typology of internet users and online privacy concerns. Information Society, 18(1), 21\u201332.","journal-title":"Information Society"},{"issue":"1","key":"9036_CR56","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","volume":"19","author":"K. B. Sheehan","year":"2000","unstructured":"Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62\u201373.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"3","key":"9036_CR57","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1086\/209170","volume":"15","author":"B. H. Sheppard","year":"1988","unstructured":"Sheppard, B. H., Hartwick, J., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325\u2013343.","journal-title":"Journal of Consumer Research"},{"issue":"12","key":"9036_CR58","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/355112.355124","volume":"43","author":"B. Shneiderman","year":"2000","unstructured":"Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57\u201359.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9036_CR59","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10660-007-9002-9","volume":"7","author":"R. Smith","year":"2007","unstructured":"Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89\u2013116.","journal-title":"Electronic Commerce Research"},{"key":"9036_CR60","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.2307\/3481326","volume":"90","author":"D. J. Solove","year":"2002","unstructured":"Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90, 1087\u20131156.","journal-title":"California Law Review"},{"key":"9036_CR61","volume-title":"Digital privacy: Theory, technologies and practices","author":"S. Spiekermann","year":"2007","unstructured":"Spiekermann, S. (2007). Perceived control: Scales for privacy in ubiquitous computing environments. In A. Acquisti, S. di Vimercati, S. Gritzalis, & C. Lambrinoudakis (Eds.), Digital privacy: Theory, technologies and practices. New York: Taylor and Francis."},{"key":"9036_CR62","unstructured":"Student Monitor. (2004). Spring 2004 lifestyle & media report. Proprietary marketing study of college students\u2019 activities and interests."},{"issue":"1","key":"9036_CR63","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1080\/10196780601136997","volume":"17","author":"T. P. Dyke Van","year":"2007","unstructured":"Van Dyke, T. P., Vishal, M., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17(1), 68\u201381.","journal-title":"Electronic Markets"},{"issue":"6","key":"9036_CR64","doi-asserted-by":"crossref","first-page":"415","DOI":"10.17705\/1jais.00092","volume":"7","author":"C. Slyke Van","year":"2006","unstructured":"Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415\u2013443.","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"9036_CR65","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1177\/109442810031002","volume":"3","author":"R. J. Vandenberg","year":"2000","unstructured":"Vandenberg, R. J., & Lance, C. E. (2000). A review and synthesis of the measurement invariance literature: Suggestions, practices, and recommendations for organizational research. Organizational Research Methods, 3(1), 4\u201370.","journal-title":"Organizational Research Methods"},{"issue":"5","key":"9036_CR66","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S. V. Warren","year":"1890","unstructured":"Warren, S. V., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193\u2013220.","journal-title":"Harvard Law Review"},{"key":"9036_CR67","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/363566.363579","volume":"10","author":"A. F. Westin","year":"1997","unstructured":"Westin, A. F. (1997). Legal safeguards to insure privacy in a computer society. Communications of the ACM, 10, 533\u2013537.","journal-title":"Communications of the ACM"},{"key":"9036_CR68","first-page":"53","volume-title":"Research in organizational behavior","author":"L. G. Zucker","year":"1986","unstructured":"Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure: 1840\u20131920. In B. M. C. Staw & L. Larry (Eds.), Research in organizational behavior (pp. 53\u2013111). London: JAI Press."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-009-9036-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-009-9036-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-009-9036-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T16:52:51Z","timestamp":1559235171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-009-9036-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["9036"],"URL":"https:\/\/doi.org\/10.1007\/s10660-009-9036-2","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,10]]}}}