{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:45:51Z","timestamp":1776879951250,"version":"3.51.2"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T00:00:00Z","timestamp":1364256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s10660-013-9111-6","type":"journal-article","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T16:07:17Z","timestamp":1364227637000},"page":"151-168","source":"Crossref","is-referenced-by-count":160,"title":["Factors affecting privacy disclosure on social network sites: an integrated model"],"prefix":"10.1007","volume":"13","author":[{"given":"Feng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Katina","family":"Michael","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,26]]},"reference":[{"key":"9111_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A., & Gross, R. (2006). Imagined communities: awareness, information sharing, and privacy on the Facebook. Paper read at 6th Workshop on Privacy Enhancing Technologies.","DOI":"10.1007\/11957454_3"},{"issue":"2","key":"9111_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior & Human Decision Processes, 50(2), 179\u2013211.","journal-title":"Organizational Behavior & Human Decision Processes"},{"issue":"1","key":"9111_CR3","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D. M. Boyd","year":"2007","unstructured":"Boyd, D. M., & Ellison, N. B. (2007). Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210\u2013230.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"9111_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"R. K. Chellappa","year":"2005","unstructured":"Chellappa, R. K., & Sin, R. (2005). Personalization versus privacy: an empirical examination of the online consumer\u2019s dilemma. Information Technology and Management, 6(2), 181\u2013202.","journal-title":"Information Technology and Management"},{"issue":"1","key":"9111_CR5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1509\/jppm.19.1.20.16944","volume":"19","author":"M. J. Culnan","year":"2000","unstructured":"Culnan, M. J. (2000). Protecting privacy online: is self-regulation working? Journal of Public Policy & Marketing, 19(1), 20\u201326.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"2","key":"9111_CR6","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/1540-4560.00067","volume":"59","author":"M. J. Culnan","year":"2003","unstructured":"Culnan, M. J., & Bies, J. R. (2003). Consumer privacy: balancing economic and justice considerations. Journal of social Issues, 59(2), 323\u2013342.","journal-title":"Journal of social Issues"},{"issue":"1","key":"9111_CR7","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"M. J. Culnan","year":"1999","unstructured":"Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104\u2013115.","journal-title":"Organization Science"},{"key":"9111_CR8","unstructured":"Dinev, T., & Hart, P. (2004). Privacy concerns and Internet use\u2014a model of trade-off factors. Paper read at Working Paper, Department of Information Technology and Operations Management at Florida Atlantic University."},{"issue":"4","key":"9111_CR9","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc","volume":"22","author":"J. Donath","year":"2004","unstructured":"Donath, J., & Boyd, B. (2004). Public displays of connection. BT Technology Journal, 22(4), 71\u201382.","journal-title":"BT Technology Journal"},{"key":"9111_CR10","unstructured":"Dwyer, C., Hiltz, S. R., & Passerini, K. (09\u201312 August 2007). Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. Paper read at the Thirteenth Americas Conference on Information Systems, at Keystone, Colorado."},{"key":"9111_CR11","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.chb.2008.08.006","volume":"25","author":"J. Fogel","year":"2009","unstructured":"Fogel, J., & Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153\u2013160.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"9111_CR12","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1287\/isre.1080.0193","volume":"19","author":"C. Forman","year":"2008","unstructured":"Forman, C., Ghose, A., & Wiesenfeld, B. (2008). Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research, 19(3), 291\u2013313.","journal-title":"Information Systems Research"},{"key":"9111_CR13","doi-asserted-by":"crossref","first-page":"201","DOI":"10.2307\/202051","volume":"1","author":"M. S. Granovetter","year":"1983","unstructured":"Granovetter, M. S. (1983). The strength of weak ties: a network theory revisited. Sociological Theory, 1, 201\u2013233.","journal-title":"Sociological Theory"},{"key":"9111_CR14","doi-asserted-by":"crossref","unstructured":"Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Paper read at the 2005 ACM Workshop on Privacy in the Electronic Society.","DOI":"10.1145\/1102199.1102214"},{"issue":"1","key":"9111_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","volume":"31","author":"K.-L. Hui","year":"2007","unstructured":"Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The value of privacy assurance: an exploratory field experiment. Management Information Systems Quarterly, 31(1), 19\u201333.","journal-title":"Management Information Systems Quarterly"},{"issue":"31","key":"9111_CR16","first-page":"862","volume":"2008","author":"J. I. Khan","year":"2007","unstructured":"Khan, J. I., & Shaikh, S. S. (2007). Computing in social networks with relationship algebra. Journal of Network and Computer Applications, 2008(31), 862\u2013878.","journal-title":"Journal of Network and Computer Applications"},{"key":"9111_CR17","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1111\/j.1540-4560.1977.tb01882.x","volume":"33","author":"P. H. Klopfer","year":"1977","unstructured":"Klopfer, P. H., & Rubenstein, D. L. (1977). The concept privacy and its biological basis. Journal of social Issues, 33, 52\u201365.","journal-title":"Journal of social Issues"},{"key":"9111_CR18","unstructured":"Lehikoinen, J. T., Olsson, T., & Toivola, H. (2008). Privacy regulation in online social interaction. Paper read at ICT, Society and Human Beings 2008."},{"key":"9111_CR19","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1111\/j.1083-6101.2008.01432.x","volume":"14","author":"K. Lewis","year":"2008","unstructured":"Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: an analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14, 79\u2013100.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"4","key":"9111_CR20","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N. K. Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"issue":"3","key":"9111_CR21","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"G. R. Milne","year":"2004","unstructured":"Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: why consumers read (or don\u2019t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15\u201329.","journal-title":"Journal of Interactive Marketing"},{"issue":"2","key":"9111_CR22","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1509\/jppm.19.2.238.17136","volume":"19","author":"G. R. Milne","year":"2000","unstructured":"Milne, G. R., & Rohm, A. (2000). Consumer privacy and name removal across direct marketing channels: exploring opt-in and opt-out alternatives. Journal of Public Policy and Marketing, 19(2), 238\u2013249.","journal-title":"Journal of Public Policy and Marketing"},{"issue":"1","key":"9111_CR23","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"P. A. Norberg","year":"2007","unstructured":"Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100\u2013126.","journal-title":"Journal of Consumer Affairs"},{"key":"9111_CR24","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1016\/j.ijhcs.2006.12.001","volume":"65","author":"C. Paine","year":"2007","unstructured":"Paine, C., Reips, U.-D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users\u2019 perceptions of \u2018privacy concerns\u2019 and \u2018privacy actions\u2019. International Journal of Human-Computer Studies, 65, 526\u2013536.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"1","key":"9111_CR25","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"P. A. Pavlou","year":"2004","unstructured":"Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37\u201359.","journal-title":"Information Systems Research"},{"issue":"3","key":"9111_CR26","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.chb.2008.08.015","volume":"25","author":"U. Pfeil","year":"2009","unstructured":"Pfeil, U., Arjan, R., & Zaphiris, P. (2009). Age differences in online social networking\u2014a study of user profiles and the social capital divide among teenagers and older users in MySpace. Computers in Human Behavior, 25(3), 643\u2013654.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"9111_CR27","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J. Phelps","year":"2000","unstructured":"Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27\u201341.","journal-title":"Journal of Public Policy and Marketing"},{"issue":"4","key":"9111_CR28","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1002\/dir.1019","volume":"15","author":"J. E. Phelps","year":"2001","unstructured":"Phelps, J. E., D\u2019Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing, 15(4), 2\u201317.","journal-title":"Journal of Interactive Marketing"},{"issue":"22","key":"9111_CR29","doi-asserted-by":"crossref","first-page":"427","DOI":"10.2307\/2392182","volume":"9","author":"G. R. Salancik","year":"1977","unstructured":"Salancik, G. R., & Pfeffer, J. (1977). An examination of need-satisfaction models of job attitudes. Administrative Science Quarterly, 9(22), 427\u2013456.","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"9111_CR30","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","volume":"19","author":"K. B. Sheehan","year":"2000","unstructured":"Sheehan, K. B., & Hoy, G. M. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy and Marketing, 19(1), 62\u201373.","journal-title":"Journal of Public Policy and Marketing"},{"issue":"3","key":"9111_CR31","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1080\/00913367.1999.10673588","volume":"28","author":"K. B. Sheehan","year":"1999","unstructured":"Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: how online users respond to privacy concerns. Journal of Advertising, 28(3), 37\u201351.","journal-title":"Journal of Advertising"},{"issue":"3","key":"9111_CR32","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V. Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M. G., Gordon, B. D., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. Management Information Systems Quarterly, 27(3), 425\u2013478.","journal-title":"Management Information Systems Quarterly"},{"issue":"2","key":"9111_CR33","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4018\/jebr.2009040102","volume":"5","author":"H. Xu","year":"2009","unstructured":"Xu, H. (2009). Consumer responses to the introduction of privacy protection measures: an exploratory research framework. International Journal of E-Business Research, 5(2), 21\u201347. Special issue on the Protection of Privacy in E-Business.","journal-title":"International Journal of E-Business Research"},{"key":"9111_CR34","unstructured":"Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual\u2019s information privacy concerns: toward an Integrative view. Paper read at 29th Annual International Conference on Information Systems (ICIS), at Paris, France."},{"issue":"3","key":"9111_CR35","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","volume":"24","author":"H. Xu","year":"2009","unstructured":"Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 24(3), 135\u2013174.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9111_CR36","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/1496930.1496937","volume":"40","author":"S. Yang","year":"2009","unstructured":"Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. The Data Base for Advances in Information Systems, 40(1), 38\u201351.","journal-title":"The Data Base for Advances in Information Systems"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9111-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9111-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9111-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T09:52:52Z","timestamp":1562838772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9111-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,26]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["9111"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9111-6","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,26]]}}}