{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:35:14Z","timestamp":1773084914005,"version":"3.50.1"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Social Science of China","award":["17BGL196"],"award-info":[{"award-number":["17BGL196"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10660-021-09492-x","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T02:02:23Z","timestamp":1627351343000},"page":"807-841","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Managing consumer privacy risk: The effects of privacy breach insurance"],"prefix":"10.1007","volume":"23","author":[{"given":"Yan","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0526-1993","authenticated-orcid":false,"given":"Shue","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Weijun","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,27]]},"reference":[{"key":"9492_CR1","unstructured":"Acquisti, A., Friedman, A., & Telang, R. (2006). Is There a Cost to Privacy Breaches? An Event Study. ICIS 2006 Proceedings. 94. http:\/\/aisel.aisnet.org\/icis2006\/94."},{"issue":"3","key":"9492_CR2","doi-asserted-by":"publisher","first-page":"893","DOI":"10.25300\/MISQ\/2017\/41.3.10","volume":"41","author":"CM Angst","year":"2017","unstructured":"Angst, C. M., Block, E. S., D\u2019Arcy, J., & Kelley, K. (2017). When do it security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly, 41(3), 893-A8.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9492_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1509\/jmkr.40.2.131.19224","volume":"40","author":"A Ansari","year":"2003","unstructured":"Ansari, A., & Mela, C. F. (2003). E-customization. J Marketing Res, 40(2), 131\u2013145.","journal-title":"J Marketing Res"},{"issue":"3","key":"9492_CR4","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1108\/JRIM-11-2017-0100","volume":"12","author":"SK Ariffin","year":"2018","unstructured":"Ariffin, S. K., Mohan, T., & Goh, Y.-N. (2018). Influence of consumers\u2019 perceived risk on consumers\u2019 online purchase intention. Journal of Research in Interactive Marketing, 12(3), 309\u2013327.","journal-title":"Journal of Research in Interactive Marketing"},{"issue":"1","key":"9492_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"NF Awad","year":"2006","unstructured":"Awad, N. F., & Krishnan, M. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13\u201328.","journal-title":"MIS Quarterly"},{"issue":"5","key":"9492_CR6","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E., Kobrin, S., & Lohse, G. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313\u2013324.","journal-title":"The Information Society"},{"issue":"3","key":"9492_CR7","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","volume":"11","author":"F B\u00e9langer","year":"2002","unstructured":"B\u00e9langer, F., Hiller, J., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11(3), 245\u2013270.","journal-title":"Journal of Strategic Information Systems"},{"key":"9492_CR8","unstructured":"Cardenas, J., Coronado, A., Donald, A., Parra, F., & Mahmood, A. M. (2012). The Economic Impact of Security Breaches on Publicly Traded Corporations: An Empirical Investigation. AMCIS 2012 Proceedings. 7. http:\/\/aisel.aisnet.org\/amcis2012\/proceedings\/StrategicUseIT\/7."},{"issue":"1","key":"9492_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1287\/mnsc.2014.2023","volume":"61","author":"R Casadesus-Masanell","year":"2015","unstructured":"Casadesus-Masanell, R., & Hervas-Drane, A. (2015). Competing with privacy. Management Science, 61(1), 229\u2013246.","journal-title":"Management Science"},{"issue":"2","key":"9492_CR10","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"RK Chellappa","year":"2005","unstructured":"Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer\u2019s dilemma. Information Technology and Management, 6(2), 181\u2013202.","journal-title":"Information Technology and Management"},{"issue":"7","key":"9492_CR11","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1016\/j.im.2016.02.003","volume":"53","author":"BCF Choi","year":"2016","unstructured":"Choi, B. C. F., & Land, L. (2016). The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage. Information & Management, 53(7), 868\u2013877.","journal-title":"Information & Management"},{"issue":"6","key":"9492_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1080\/01449290410001715723","volume":"23","author":"T Dinev","year":"2004","unstructured":"Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413\u2013422.","journal-title":"Behaviour & Information Technology"},{"issue":"1","key":"9492_CR13","doi-asserted-by":"publisher","first-page":"000010220215465","DOI":"10.2202\/1546-5616.1072","volume":"7","author":"G D'Souza","year":"2009","unstructured":"D\u2019Souza, G., & Phelps, J. E. (2009). The privacy paradox: The case of secondary disclosure. Review of Marketing Science, 7(1), 0000102202154656161072.","journal-title":"Review of Marketing Science"},{"issue":"2","key":"9492_CR14","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1207\/s15327744joce1602_2","volume":"16","author":"JB Earp","year":"2006","unstructured":"Earp, J. B., & Payton, F. C. (2006). Information privacy in the service sector: An exploratory study of health care and banking professionals. Journal of Organizational Computing and Electronic Commerce, 16(2), 105\u2013122.","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"5","key":"9492_CR15","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1108\/02635570610666403","volume":"106","author":"C Flavia \u2018n","year":"2006","unstructured":"Flavia \u2018n, C., & Guinal\u0131 \u2018u, M. (2006). Consumer trust, perceived security and privacy policy. Industrial Management & Data Systems, 106(5), 601\u2013620.","journal-title":"Industrial Management & Data Systems"},{"issue":"11","key":"9492_CR16","doi-asserted-by":"publisher","first-page":"1682","DOI":"10.1057\/jors.2013.133","volume":"65","author":"X Gao","year":"2014","unstructured":"Gao, X., Zhong, W., & Mei, S. (2014). A game-theoretic analysis of information sharing and security investment for complementary firms. Journal of the Operational Research Society, 65(11), 1682\u20131691.","journal-title":"Journal of the Operational Research Society"},{"issue":"7","key":"9492_CR17","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1089\/cyber.2017.0709","volume":"21","author":"A Gruzd","year":"2018","unstructured":"Gruzd, A., & Hern\u00e1ndez-Garc\u00ed\u00e1, A. (2018). Privacy concerns and self-disclosure in private and public uses of social media. Cyberpsychology, Behavior, and Social Networking, 21(7), 418\u2013428.","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"2","key":"9492_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2753\/MIS0742-1222240202","volume":"24","author":"I-H Hann","year":"2007","unstructured":"Hann, I.-H., Hui, K.-L., Lee, S.-Y.T., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13\u201342.","journal-title":"Journal of Management Information Systems"},{"key":"9492_CR19","first-page":"2554","volume":"3","author":"B Hauer","year":"2015","unstructured":"Hauer, B. (2015). Data and information leakage prevention. Within the Scope of Information Security, 3, 2554\u20132565.","journal-title":"Within the Scope of Information Security"},{"key":"9492_CR20","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.im.2014.12.006","volume":"52","author":"O Hinz","year":"2015","unstructured":"Hinz, O., Nofer, M., Schiereck, D., & Trillig, J. (2015). The influence of data theft on the share prices and systematic risk of consumer electronics companies. Information & Management, 52, 337\u2013347.","journal-title":"Information & Management"},{"key":"9492_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.elerap.2009.05.001","volume":"9","author":"CM Hoadley","year":"2010","unstructured":"Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50\u201360.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"1","key":"9492_CR22","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","volume":"37","author":"W Hong","year":"2013","unstructured":"Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275\u2013298.","journal-title":"MIS Quarterly"},{"key":"9492_CR23","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.elerap.2012.12.003","volume":"12","author":"Z Huang","year":"2013","unstructured":"Huang, Z., & Benyoucef, M. (2013). From e-commerce to social commerce: A close look at design features. Electronic Commerce Research and Applications, 12, 246\u2013259.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"1","key":"9492_CR24","doi-asserted-by":"publisher","first-page":"19","DOI":"10.2307\/25148779","volume":"31","author":"K-L Hui","year":"2007","unstructured":"Hui, K.-L., Teo, H. H., & Lee, S.-Y.T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19\u201333.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9492_CR25","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1287\/mksc.1050.0117","volume":"24","author":"G Iyer","year":"2005","unstructured":"Iyer, G., & Soberman, D. (2005). The targeting of advsertising. Marketing Science, 24(3), 461\u2013476.","journal-title":"Marketing Science"},{"issue":"5","key":"9492_CR26","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.im.2018.11.003","volume":"56","author":"CY Jeong","year":"2019","unstructured":"Jeong, C. Y., Lee, S.-Y.T., & Lim, J.-H. (2019). Information security breaches and IT security investments: Impacts on competitors. Information & Management, 56(5), 681\u2013695.","journal-title":"Information & Management"},{"issue":"3","key":"9492_CR27","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1287\/isre.1120.0441","volume":"24","author":"Z Jiang","year":"2013","unstructured":"Jiang, Z., Heng, C. H., & Choi, B. C. F. (2013). Privacy concerns and privacy-protective behavior. Information Systems Research, 24(3), 579\u2013595.","journal-title":"Information Systems Research"},{"issue":"5","key":"9492_CR28","first-page":"67","volume":"6","author":"R Kaul","year":"2019","unstructured":"Kaul, R. (2019). A contemporary analysis of online privacy & data protection in the context of parallel privacy policies. Scholedge International Journal of Management & Development, 6(5), 67\u201370.","journal-title":"Scholedge International Journal of Management & Development"},{"issue":"4","key":"9492_CR29","first-page":"15","volume":"48","author":"ML Korzaan","year":"2008","unstructured":"Korzaan, M. L., & Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. The Journal of Computer Information Systems, 48(4), 15\u201324.","journal-title":"The Journal of Computer Information Systems"},{"issue":"2","key":"9492_CR30","doi-asserted-by":"publisher","first-page":"451","DOI":"10.25300\/MISQ\/2014\/38.2.06","volume":"38","author":"J Kwon","year":"2014","unstructured":"Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. MIS Quarterly, 38(2), 451-A3.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9492_CR31","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10551-006-9179-1","volume":"73","author":"FY Kuo","year":"2007","unstructured":"Kuo, F. Y., Lin, C. S., & Hsu, M. H. (2007). Assessing gender differences in computer professionals\u2019 self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics, 73(2), 145\u2013160.","journal-title":"Journal of Business Ethics"},{"key":"9492_CR32","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.elerap.2016.10.005","volume":"20","author":"M Law","year":"2016","unstructured":"Law, M., Kwok, R., & Ng, M. (2016). An extended online purchase intention model for middle-aged online users. Electronic Commerce Research and Applications, 20, 132\u2013146.","journal-title":"Electronic Commerce Research and Applications"},{"key":"9492_CR33","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.tourman.2010.08.011","volume":"32","author":"CH Lee","year":"2011","unstructured":"Lee, C. H., & Cranage, D. A. (2011). Personalization privacy paradox: The effects of personalized and privacy assurance on customer responses to travel Web sites. Tourism Management, 32, 987\u2013994.","journal-title":"Tourism Management"},{"issue":"2","key":"9492_CR34","doi-asserted-by":"publisher","first-page":"423","DOI":"10.2307\/23044050","volume":"35","author":"D-J Lee","year":"2011","unstructured":"Lee, D.-J., Ahn, J.-H., & Bang, Y. (2011). Managing consumer privacy concerns in personalization: A strategic analysis of privacy protection. MIS Quarterly, 35(2), 423\u2013444.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9492_CR35","first-page":"79","volume":"4","author":"Y Lin","year":"2008","unstructured":"Lin, Y., & Wu, H. Y. (2008). Information privacy concerns, government involvement, and corporate policies in the customer relationship management context. Journal of Global Business and Technology, 4(1), 79\u201391.","journal-title":"Journal of Global Business and Technology"},{"issue":"4","key":"9492_CR36","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (iuipc): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"issue":"1","key":"9492_CR37","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1177\/1094670510383409","volume":"14","author":"A Malhotra","year":"2011","unstructured":"Malhotra, A., & Malhotra, C. K. (2011). Evaluating customer information breaches as service failures: An event study approach. Journal of Service Research, 14(1), 44\u201359.","journal-title":"Journal of Service Research"},{"key":"9492_CR38","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.dss.2016.09.011","volume":"92","author":"M Mousavizadeh","year":"2016","unstructured":"Mousavizadeh, M., Kim, D. J., & Chen, R. (2016). Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study. Decision Support Systems, 92, 79\u201390.","journal-title":"Decision Support Systems"},{"issue":"3","key":"9492_CR39","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1080\/13600834.2019.1644068","volume":"28","author":"T Mulder","year":"2019","unstructured":"Mulder, T., & Tudorica, M. (2019). Privacy policies, cross-border health data and the GDPR. Information & Communications Technology Law, 28(3), 261\u2013274.","journal-title":"Information & Communications Technology Law"},{"key":"9492_CR40","doi-asserted-by":"crossref","unstructured":"Nov O. & Wattal S. (2009). Social Computing Privacy Concerns: Antecedents and Effects [C]. in Proceedings of the 27th International Conference on Human Factors in Computing Systems, Boston, MA, April 4\u20139: 333\u2013336.","DOI":"10.1145\/1518701.1518754"},{"issue":"2","key":"9492_CR41","first-page":"137","volume":"9","author":"OJ Postma","year":"2001","unstructured":"Postma, O. J., & Brokke, M. (2001). Personalized in practice: The proven effects of personalized. Journal of Database Marketing, 9(2), 137\u2013142.","journal-title":"Journal of Database Marketing"},{"key":"9492_CR42","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.tourman.2014.10.009","volume":"47","author":"EB Ponte","year":"2015","unstructured":"Ponte, E. B., Carvajal-Trujillo, E., & Escobar-Rodr\u00edguez, T. (2015). Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents. Tourism Management, 47, 286\u2013302.","journal-title":"Tourism Management"},{"key":"9492_CR43","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.compeleceng.2015.01.016","volume":"45","author":"M Prakash","year":"2015","unstructured":"Prakash, M., & Singaravel, G. (2015). An approach for prevention of privacy breach and information leakage in sensitive data mining. Computers and Electrical Engineering, 45, 134\u2013140.","journal-title":"Computers and Electrical Engineering"},{"issue":"4","key":"9492_CR44","first-page":"805","volume":"19","author":"M Rehman","year":"2020","unstructured":"Rehman, M., & Maseeh, H. I. (2020). Impact of YouTube advertising on purchase intention: A Pitch. Accounting and Management Information Systems, 19(4), 805\u2013811.","journal-title":"Accounting and Management Information Systems"},{"issue":"3","key":"9492_CR45","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.im.2005.08.002","volume":"43","author":"EA Rose","year":"2006","unstructured":"Rose, E. A. (2006). An examination of the concern for information privacy in the new zealand regulatory context. Information & Management, 43(3), 322\u2013335.","journal-title":"Information & Management"},{"issue":"1","key":"9492_CR46","first-page":"269","volume":"24","author":"C Schreiber","year":"2014","unstructured":"Schreiber, C. (2014). Google\u2019s targeted advertising: an analysis of privacy protections in an internet age. Transnational Law & Contemporary Problems , 24(1), 269\u2013291.","journal-title":"Transnational Law & Contemporary Problems"},{"issue":"2","key":"9492_CR47","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","volume":"32","author":"R Sen","year":"2015","unstructured":"Sen, R., & Borle, S. (2015). Estimating the contextual risk of data breach: An empirical approach. Journal of Management Information Systems, 32(2), 314\u2013341.","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"9492_CR48","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1111\/lsi.12303","volume":"43","author":"A Shauhin","year":"2018","unstructured":"Shauhin, A., & Talesh. . (2018). Data breach, privacy, and cyber insurance: How insurance companies act as \u201ccompliance managers\u201d for businesses. Law & Social Inquiry, 43(2), 417\u2013440.","journal-title":"Law & Social Inquiry"},{"issue":"2","key":"9492_CR49","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1300\/J396v27n02_06","volume":"27","author":"AD Smith","year":"2005","unstructured":"Smith, A. D. (2005). Exploring service marketing aspects of e-personalized and its impact on online consumer behavior. Services Marketing Quarterly, 27(2), 89\u2013102.","journal-title":"Services Marketing Quarterly"},{"issue":"2","key":"9492_CR50","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quarterly, 20(2), 167\u2013196.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9492_CR51","doi-asserted-by":"publisher","first-page":"503","DOI":"10.2307\/25148854","volume":"32","author":"J-Y Son","year":"2008","unstructured":"Son, J.-Y., & Kim, S. S. (2008). Internet users\u2019 information privacy-protective responses: A taxonomy and a nomological model. MIS Quart., 32(3), 503\u2013529.","journal-title":"MIS Quart."},{"issue":"4","key":"9492_CR52","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.25300\/MISQ\/2013\/37.4.07","volume":"37","author":"J Sutanto","year":"2013","unstructured":"Sutanto, J., Palme, E., Tan, C.-H., & Phang, C.-W. (2013). Addressing the personalized-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37(4), 1141\u20131164.","journal-title":"MIS Quarterly"},{"key":"9492_CR53","unstructured":"The Wall Street Journal. 2010. Facebook in Privacy Breach. <http:\/\/terriau.org\/blog\/postings\/20101018%20Facebook%20in%20Online%20Privacy%20Breach%3B%20Applications%20Transmitting%20Identifying%20Information%20-%20WSJ.pdf>"},{"key":"9492_CR54","unstructured":"TRUSTe. Consumer opinion and business impact. TRUSTe Research Report. <http:\/\/info.truste.com\/lp\/truste\/Web-Resource-HarrisConsumer Research US-Report Q12014 _LP.html>; 2014 [accessed 10.02.15]."},{"issue":"6","key":"9492_CR55","doi-asserted-by":"publisher","first-page":"415","DOI":"10.17705\/1jais.00092","volume":"7","author":"C Van Slyke","year":"2006","unstructured":"Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415\u2013443.","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"9492_CR56","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1080\/02650487.2016.1186951","volume":"36","author":"M Verena","year":"2017","unstructured":"Verena, M., Wottrich, P., Verlegh, W. J., & Smit, E. G. (2017). The role of customization, brand trust, and privacy concerns in advergaming. International Journal of Advertising, 36(1), 60\u201381.","journal-title":"International Journal of Advertising"},{"key":"9492_CR57","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s12927-014-0008-2","volume":"6","author":"L Wan","year":"2014","unstructured":"Wan, L., & Zhang, C. (2014). Responses to trust repair after privacy breach incidents. Journal of Service Science Research, 6, 193\u2013224.","journal-title":"Journal of Service Science Research"},{"issue":"9\/10","key":"9492_CR58","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1108\/03090560710773336","volume":"41","author":"S Wang","year":"2007","unstructured":"Wang, S., & Huff, L. C. (2007). Explaining buyers\u2019 responses to sellers\u2019 violation of trust. European Journal of Marketing, 41(9\/10), 1033\u20131052.","journal-title":"European Journal of Marketing"},{"key":"9492_CR59","first-page":"280","volume":"25","author":"Z Wang","year":"2016","unstructured":"Wang, Z., Wang, N., Su, X., & Ge, S. (2016). Differentiated management strategies on cloud computing data security driven by data value. Information Security Journal: A Global Perspective, 25, 280\u2013294.","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"4","key":"9492_CR60","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1287\/isre.1120.0416","volume":"23","author":"H Xu","year":"2012","unstructured":"Xu, H., Teo, H.-H., Bernard, C. Y., & Tan, R. A. (2012). Research note\u2014effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342\u20131363.","journal-title":"Information Systems Research"},{"key":"9492_CR61","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","volume":"51","author":"H Xu","year":"2011","unstructured":"Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision-making process for location-aware marketing. Decision Support Systems, 51, 42\u201352.","journal-title":"Decision Support Systems"},{"key":"9492_CR62","doi-asserted-by":"crossref","unstructured":"Yang, H.L., & Miao, X.M. (2008). Concern for Information Privacy and Intention to Transact Online. In Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October 12\u201314, 1\u20134.","DOI":"10.1109\/WiCom.2008.2127"},{"key":"9492_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.peva.2013.10.003","volume":"74","author":"Z Yang","year":"2014","unstructured":"Yang, Z., & Lui, J. C. S. (2014). Security adoption and influence of cyber-insurance markets in heterogeneous networks. Performance Evaluation, 74, 1\u201317.","journal-title":"Performance Evaluation"},{"key":"9492_CR64","volume-title":"Computer Security - ESORICS 2008. Lecture Notes in Computer Science","author":"AN Yannacopoulos","year":"2008","unstructured":"Yannacopoulos, A. N., Lambrinoudakis, C., Gritzalis, S., Xanthopoulos, S. Z., & Katsikas, S. N. (2008). Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. In S. Jajodia & J. Lopez (Eds.), Computer Security - ESORICS 2008. Lecture Notes in Computer Science.  (Vol. 5283). Berlin: Springer."},{"issue":"2","key":"9492_CR65","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/15332861.2019.1585724","volume":"18","author":"G Zarei","year":"2019","unstructured":"Zarei, G., Nuri, B. A., & Noroozi, N. (2019). The effect of Internet service quality on consumers\u2019 purchase behavior: The role of satisfaction, attitude, and purchase intention. Journal of Internet Commerce, 18(2), 197\u2013220.","journal-title":"Journal of Internet Commerce"},{"key":"9492_CR66","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.chb.2016.11.050","volume":"69","author":"B Zarouali","year":"2017","unstructured":"Zarouali, B., Ponnet, K., Walrave, M., & Poels, K. (2017). Do you like cookies? Adolescents\u2019 skeptical processing of retargeted Facebook-ads and the moderating role of privacy concern and a textual debriefing. Computers in Human Behavior, 69, 157\u2013165.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"9492_CR67","doi-asserted-by":"publisher","first-page":"71","DOI":"10.4018\/jeco.2012100106","volume":"10","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Zhong, W., & Mei, S. (2012). Competitive effects of purchase-based targeted advertising. Journal of Electronic Commerce in Organizations, 10(4), 71\u201384.","journal-title":"Journal of Electronic Commerce in Organizations"},{"key":"9492_CR68","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.omega.2018.10.007","volume":"89","author":"J Zhang","year":"2019","unstructured":"Zhang, J., & He, X. (2019). Targeted advertising by asymmetric firms. Omega, 89, 136\u2013150.","journal-title":"Omega"},{"key":"9492_CR69","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2020.3745","author":"J Zhang","year":"2020","unstructured":"Zhang, J., & Li, K. J. (2020). Quality disclosure under consumer loss aversion. Management Science. https:\/\/doi.org\/10.1287\/mnsc.2020.3745","journal-title":"Management Science"},{"issue":"4","key":"9492_CR70","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.im.2017.11.003","volume":"55","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management, 55(4), 482\u2013493.","journal-title":"Information & Management"},{"issue":"3","key":"9492_CR71","first-page":"189","volume":"29","author":"X Zhao","year":"2012","unstructured":"Zhao, X., & Xue, L. (2012). Competitive target advertising and consumer data sharing. Journal of Management Information, 29(3), 189\u2013221.","journal-title":"Journal of Management Information"},{"key":"9492_CR72","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"LN Zlatolas","year":"2015","unstructured":"Zlatolas, L. N., Welzer, T., Hericko, M., & H\u00f6lbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158\u2013167.","journal-title":"Computers in Human Behavior"},{"key":"9492_CR73","doi-asserted-by":"crossref","unstructured":"Zukowski, T., &Brown, I. (2007). Examining the influence of demographic factors on internet users\u2019 information privacy concerns. In: Proceedings of the 2007 Annual research conference of the south african institute of computer scientists and information technologists on it research in developing countries, Port Elizabeth, South Africa, October 2\u20133:197\u2013204.","DOI":"10.1145\/1292491.1292514"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-021-09492-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10660-021-09492-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-021-09492-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T04:16:57Z","timestamp":1682569017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10660-021-09492-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,27]]},"references-count":73,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["9492"],"URL":"https:\/\/doi.org\/10.1007\/s10660-021-09492-x","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,27]]},"assertion":[{"value":"4 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}