{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:04:49Z","timestamp":1775167489375,"version":"3.50.1"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T00:00:00Z","timestamp":1667606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T00:00:00Z","timestamp":1667606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72061147005"],"award-info":[{"award-number":["72061147005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fund for building world-class universities (disciplines) of Renmin University of China","award":["Grant No.KYGJA2022002"],"award-info":[{"award-number":["Grant No.KYGJA2022002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s10660-022-09588-y","type":"journal-article","created":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T07:04:51Z","timestamp":1667631891000},"page":"275-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Investigation on users\u2019 resistance intention to facial recognition payment: a perspective of privacy"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7614-6514","authenticated-orcid":false,"given":"Xusen","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Liyang","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8459-8390","authenticated-orcid":false,"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaoping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,5]]},"reference":[{"key":"9588_CR1","doi-asserted-by":"publisher","first-page":"101515","DOI":"10.1016\/j.techsoc.2020.101515","volume":"64","author":"Y Zhong","year":"2021","unstructured":"Zhong, Y., Oh, S., & Moon, H. C. (2021). Service transformation under industry 4.0: Investigating acceptance of facial recognition payment through an extended technology acceptance model. Technology in Society, 64, 101515. https:\/\/doi.org\/10.1016\/j.techsoc.2020.101515","journal-title":"Technology in Society"},{"issue":"5","key":"9588_CR2","doi-asserted-by":"publisher","first-page":"102115","DOI":"10.1016\/j.telpol.2021.102155","volume":"45","author":"YL Liu","year":"2021","unstructured":"Liu, Y. L., Yan, W., & Hu, B. (2021). Resistance to facial recognition payment in China: the influence of privacy-related factors. Telecommunications Policy, 45(5), 102115. https:\/\/doi.org\/10.1016\/j.telpol.2021.102155","journal-title":"Telecommunications Policy"},{"key":"9588_CR3","unstructured":"Iimedia (2019). Facial payment research report in China. https:\/\/www.iimedia.cn\/c400\/66866.html"},{"key":"9588_CR4","unstructured":"Allen, K. (2019). China facial recognition: Law professor sues wildlife park.BBC News. https:\/\/www.bbc.com\/news\/world-asia-china-50324342"},{"issue":"1","key":"9588_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3745\/JIPS.02.0129","volume":"16","author":"S Maity","year":"2020","unstructured":"Maity, S., Abdel-Mottaleb, M., & Asfour, S. S. (2020). Multimodal biometrics recognition from facial video with missing modalities using deep learning. Journal of Information Processing Systems, 16(1), 6\u201329. https:\/\/doi.org\/10.3745\/JIPS.02.0129","journal-title":"Journal of Information Processing Systems"},{"issue":"6","key":"9588_CR6","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TIP.2015.2412377","volume":"24","author":"H Dibeklioglu","year":"2015","unstructured":"Dibeklioglu, H., Alnajar, F., Salah, A. A., & Gevers, T. (2015). Combining facial dynamics with appearance for age estimation. IEEE Transactions on Image Processing, 24(6), 1928\u20131943. https:\/\/doi.org\/10.1109\/TIP.2015.2412377","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"9588_CR7","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/TIFS.2016.2632070","volume":"12","author":"A Dantcheva","year":"2016","unstructured":"Dantcheva, A., & Br\u00b4emond, F. (2016). Gender estimation based on smile-dynamics. IEEE Transactions on Information Forensics and Security, 12(3), 719\u2013729. https:\/\/doi.org\/10.1109\/TIFS.2016.2632070","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9588_CR8","doi-asserted-by":"publisher","first-page":"154360","DOI":"10.1109\/ACCESS.2019.2927705","volume":"7","author":"WK Zhang","year":"2019","unstructured":"Zhang, W. K., & Kang, M. J. (2019). Factors affecting the use of facial-recognition payment: An example of Chinese consumers. Ieee Access : Practical Innovations, Open Solutions, 7, 154360\u2013154374. https:\/\/doi.org\/10.1109\/ACCESS.2019.2927705","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"issue":"2","key":"9588_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quarterly, 20(2), 167\u2013196. https:\/\/doi.org\/10.2307\/249477","journal-title":"MIS Quarterly"},{"key":"9588_CR10","doi-asserted-by":"publisher","unstructured":"Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81(APR.), 42\u201351. https:\/\/doi.org\/10.1016\/j.chb.2017.12.001","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"9588_CR11","doi-asserted-by":"publisher","unstructured":"Cheng, X., Hou, T., & Mou, J. (2021). Investigating perceived risks and benefits of information privacy disclosure in it-enabled ride-sharing. Information & Management, (2), 103450. https:\/\/doi.org\/10.1016\/j.im.2021.103450","DOI":"10.1016\/j.im.2021.103450"},{"issue":"4","key":"9588_CR12","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989\u20131016. https:\/\/doi.org\/10.2307\/41409970","journal-title":"MIS Quarterly"},{"key":"9588_CR13","doi-asserted-by":"publisher","unstructured":"Li, L., Lee, K. Y., Chang, Y., Yang, S. B., & Park, P. (2021). IT-enabled sustainable development in electric scooter sharing platforms: focusing on the privacy concerns for traceable information. Information Technology for Development, (2), 1\u201324. https:\/\/doi.org\/10.1080\/02681102.2021.1882366","DOI":"10.1080\/02681102.2021.1882366"},{"issue":"4","key":"9588_CR14","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","volume":"15","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce \u2013 a study of Italy and the United States. European Journal of Information Systems, 15(4), 389\u2013402. https:\/\/doi.org\/10.1057\/palgrave.ejis.3000590","journal-title":"European Journal of Information Systems"},{"key":"9588_CR15","doi-asserted-by":"publisher","first-page":"101601","DOI":"10.1016\/j.tele.2021.101601","volume":"61","author":"M Zhu","year":"2021","unstructured":"Zhu, M., et al. (2021). Privacy paradox in mHealth applications: an integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. Telematics and Informatics, 61, 101601","journal-title":"Telematics and Informatics"},{"key":"9588_CR16","first-page":"3737","volume":"10","author":"E Hargittai","year":"2016","unstructured":"Hargittai, E., & Marwick, A. (2016). \u201cWhat can I really do?\u201c: explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737\u20133757","journal-title":"International Journal of Communication"},{"issue":"1","key":"9588_CR17","doi-asserted-by":"publisher","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","volume":"37","author":"V Venkatesh","year":"2013","unstructured":"Venkatesh, V., Brown, S. A., & Bala, H. (2013). Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Quarterly, 37(1), 21\u201354. https:\/\/www.jstor.org\/stable\/43825936","journal-title":"MIS Quarterly"},{"issue":"7","key":"9588_CR18","doi-asserted-by":"publisher","first-page":"435","DOI":"10.17705\/1jais.00433","volume":"17","author":"V Venkatesh","year":"2016","unstructured":"Venkatesh, V., Brown, S. A., &Sullivan, Y. W., et al. (2016). Guidelines for conducting mixed-methods research: an extension and illustration. Journal of the Association of Information Systems, 17(7), 435\u2013495. https:\/\/doi.org\/10.17705\/1jais.00433","journal-title":"Journal of the Association of Information Systems"},{"key":"9588_CR19","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1038\/040318a0","volume":"40","author":"F Galton","year":"1889","unstructured":"Galton, F. (1889). Head growth in students at the University of Cambridge. Nature, 40, 318. https:\/\/doi.org\/10.1038\/040318a0","journal-title":"Nature"},{"key":"9588_CR20","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1038\/083127a0","volume":"83","author":"F Galton","year":"1910","unstructured":"Galton, F. (1910). Numeralised profiles for classification and recognition. Nature, 83, 127\u2013130. https:\/\/doi.org\/10.1038\/083127a0","journal-title":"Nature"},{"issue":"1","key":"9588_CR21","first-page":"21","volume":"21","author":"C Morosan","year":"2020","unstructured":"Morosan, C. (2020). Hotel facial recognition systems: insight into guests\u2019 system perceptions, congruity with selfimage, and anticipated emotions. Journal of Electronic Commerce Research, 21(1), 21\u201338","journal-title":"Journal of Electronic Commerce Research"},{"key":"9588_CR22","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3668036","author":"J Gao","year":"2020","unstructured":"Gao, J., Rong, Y., Tian, X., & Yao, Y. O. (2020). Save time or save face? the stage fright effect in the adoption of facial recognition payment technology. Social Science Electronic Publishing. https:\/\/doi.org\/10.2139\/ssrn.3668036","journal-title":"Social Science Electronic Publishing"},{"key":"9588_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21495","author":"E Moriuchi","year":"2021","unstructured":"Moriuchi, E. (2021). An empirical study of consumers\u2019 intention to use biometric facial recognition as a payment method. Psychology & Marketing. https:\/\/doi.org\/10.1002\/mar.21495","journal-title":"Psychology & Marketing"},{"issue":"2","key":"9588_CR24","doi-asserted-by":"publisher","first-page":"102941","DOI":"10.1016\/j.ijhm.2021.102941","volume":"95","author":"O Ciftci","year":"2021","unstructured":"Ciftci, O., Choi, E., & Berezina, K. (2021). Let\u2019s face it: are customers ready for facial recognition technology at quick-service restaurants? International Journal of Hospitality Management, 95(2), 102941. https:\/\/doi.org\/10.1016\/j.ijhm.2021.102941","journal-title":"International Journal of Hospitality Management"},{"key":"9588_CR25","unstructured":"Xu, Z., Zhang, T., Zeng, Y., Wan, & Wu, W. (2015). March). A secure mobile payment framework based on face authentication. The International Multiconference of Engineers and Computer Scientists"},{"key":"9588_CR26","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F Belanger","year":"2011","unstructured":"Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017\u20131041. https:\/\/doi.org\/10.2307\/41409971","journal-title":"MIS Quarterly"},{"key":"9588_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.dss.2015.01.009","volume":"71(mar.)","author":"G Bansal","year":"2015","unstructured":"Bansal, G., & Zahedi, F. M. (2015). Trust violation and repair: the information privacy perspective. Decision Support Systems, 71(mar.), 62\u201377. https:\/\/doi.org\/10.1016\/j.dss.2015.01.009","journal-title":"Decision Support Systems"},{"issue":"6","key":"9588_CR28","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1016\/j.im.2015.06.006","volume":"52","author":"CL Miltgen","year":"2015","unstructured":"Miltgen, C. L., & Smith, H. J. (2015). Exploring information privacy regulation, risks, trust, and behavior. Information & Management, 52(6), 741\u2013759. https:\/\/doi.org\/10.1016\/j.im.2015.06.006","journal-title":"Information & Management"},{"key":"9588_CR29","doi-asserted-by":"publisher","unstructured":"Ursin, G., Malila, N., Chang-Claude, J., Gunter, M., & Knudsen, G. (2019). Sharing data safely while preserving privacy. The Lancet, 394(10212), 1902. https:\/\/doi.org\/10.1016\/S0140-6736(19)32603-0","DOI":"10.1016\/S0140-6736(19)32603-0"},{"key":"9588_CR30","doi-asserted-by":"publisher","first-page":"101601","DOI":"10.1016\/j.giq.2021.101601","volume":"1","author":"DQ Agozie","year":"2021","unstructured":"Agozie, D. Q., & Kaya, T. (2021). Discerning the effect of privacy information transparency on privacy fatigue in e-government. Government Information Quarterly, 1, 101601. https:\/\/doi.org\/10.1016\/j.giq.2021.101601","journal-title":"Government Information Quarterly"},{"issue":"7","key":"9588_CR31","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.im.2017.01.001","volume":"54","author":"TL James","year":"2017","unstructured":"James, T. L., Wallace, L., Warkentin, M., Kim, B. C., & Collignon, S. E. (2017). Exposing others\u2019 information on online social networks (OSNS): perceived shared risk, its determinants, and its influence on OSN privacy control use. Information & Management, 54(7), 851\u2013865. https:\/\/doi.org\/10.1016\/j.im.2017.01.001","journal-title":"Information & Management"},{"key":"9588_CR32","doi-asserted-by":"publisher","first-page":"102015","DOI":"10.1016\/j.ijinfomgt.2019.09.011","volume":"51","author":"L Yu","year":"2019","unstructured":"Yu, L., Li, H., He, W., Wang, F. K., & Jiao, S. (2019). A meta-analysis to explore privacy cognition and information disclosure of internet users. International Journal of Information Management, 51, 102015. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.09.011","journal-title":"International Journal of Information Management"},{"key":"9588_CR33","doi-asserted-by":"publisher","unstructured":"Cellary, W., & Rykowski, J. (2015). Challenges of smart industries \u2013 privacy and payment in visible versus unseen internet. Government Information Quarterly, 35(4), S17-S23. https:\/\/doi.org\/10.1016\/j.giq.2015.08.005","DOI":"10.1016\/j.giq.2015.08.005"},{"key":"9588_CR34","doi-asserted-by":"publisher","unstructured":"Krishen, A. S., Raschke, R. L., Close, A. G., & Kachroo, P. (2017). A power-responsibility equilibrium framework for fairness: understanding consumers\u2019 implicit privacy concerns for location-based services. Journal of Business Research, 73(APR.), 20\u201329. https:\/\/doi.org\/10.1016\/j.jbusres.2016.12.002","DOI":"10.1016\/j.jbusres.2016.12.002"},{"issue":"3","key":"9588_CR35","doi-asserted-by":"publisher","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","volume":"26","author":"H Xu","year":"2009","unstructured":"Xu, H., Teo, H. H., Tan, B., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus. Journal of Management Information Systems, 26(3), 135\u2013174. https:\/\/doi.org\/10.2753\/MIS0742-1222260305","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"9588_CR36","doi-asserted-by":"publisher","first-page":"503","DOI":"10.2307\/25148854","volume":"32","author":"JY Son","year":"2008","unstructured":"Son, J. Y., & Kim, S. S. (2008). Internet users\u2019 information privacy-protective responses: a taxonomy and a nomological model. MIS Quarterly, 32(3), 503\u2013529","journal-title":"MIS Quarterly"},{"issue":"5","key":"9588_CR37","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/0020-7489(96)00004-1","volume":"33","author":"E Ream","year":"1996","unstructured":"Ream, E., & Richardson, A. (1996). Fatigue: a concept analysis. International Journal of Nursing Studies, 33(5), 519\u2013529","journal-title":"International Journal of Nursing Studies"},{"issue":"3","key":"9588_CR38","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1111\/j.1468-2885.2006.00271.x","volume":"16","author":"SC D\u2019Urso","year":"2010","unstructured":"D\u2019Urso, S. C. (2010). Who\u2019s watching us at work? toward a structural\u2013perceptual model of electronic monitoring and surveillance in organizations. Communication Theory, 16(3), 281\u2013303. https:\/\/doi.org\/10.1111\/j.1468-2885.2006.00271.x","journal-title":"Communication Theory"},{"issue":"6","key":"9588_CR39","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1287\/orsc.10.6.791","volume":"10","author":"LJ Sirkka","year":"1999","unstructured":"Sirkka, L. J., & Dorothy, E. L. (1999). Communication and Trust in Global Virtual Teams. Organization Science, 10(6), 791\u2013815. https:\/\/www.jstor.org\/stable\/2640242","journal-title":"Organization Science"},{"issue":"1","key":"9588_CR40","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1111\/j.1745-6606.2002.tb00419.x","volume":"36","author":"DM Anthony","year":"2002","unstructured":"Anthony, D. M., & Krishnamurthy, S. (2002). Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions[J]. The Journal of Consumer Affairs, 36(1), 28\u201349. https:\/\/www.jstor.org\/stable\/23860158","journal-title":"The Journal of Consumer Affairs"},{"issue":"4","key":"9588_CR41","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1086\/209566","volume":"26","author":"Y Moon","year":"2000","unstructured":"Moon, Y. (2000). Intimate exchanges: using computers to elicit self-disclosure from consumers. Journal of Consumer Research, 26(4), 323\u2013339. https:\/\/doi.org\/10.1086\/209566","journal-title":"Journal of Consumer Research"},{"issue":"4","key":"9588_CR42","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2015.0600","volume":"26","author":"T Dinev","year":"2015","unstructured":"Dinev, T., Smith, H. J., McConnell, et al. (2015). Informing privacy research through information systems, psychology, and behavioral economics: thinking outside the \u201cAPCO\u201d box. Information Systems Research, 26(4), 639\u2013655. https:\/\/doi.org\/10.1287\/isre.2015.0600","journal-title":"Information Systems Research"},{"key":"9588_CR43","unstructured":"Lankton, N. K., & Tripp, J. F. (2013). A Quantitative and Qualitative Study of Facebook Privacy using the Antecedent-Privacy Concern-Outcome Macro Model. AMCIS 2013 Proceedings"},{"issue":"2","key":"9588_CR44","doi-asserted-by":"publisher","first-page":"809","DOI":"10.25300\/MISQ\/2020\/14818","volume":"44","author":"CB Califf","year":"2020","unstructured":"Califf, C. B., Sarker, S., & Sarker, S. (2020). The bright and dark sides of technostress: a mixed-methods study involving healthcare it. MIS Quarterly, 44(2), 809\u2013856. https:\/\/doi.org\/10.25300\/MISQ\/2020\/14818","journal-title":"MIS Quarterly"},{"issue":"1","key":"9588_CR45","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/07421222.2019.1705504","volume":"37","author":"T Cui","year":"2020","unstructured":"Cui, T., Tong, Y., Teo, H. H., & Li, J. (2020). Managing knowledge distance: it-enabled inter-firm knowledge capabilities in collaborative innovation. Journal of Management Information Systems, 37(1), 217\u2013250. https:\/\/doi.org\/10.1080\/07421222.2019.1705504","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"9588_CR46","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1287\/isre.12.3.240.9709","volume":"12","author":"Mingers","year":"2001","unstructured":"Mingers, & John. (2001). Combining IS research methods: towards a pluralist methodology. Information Systems Research, 12(3), 240\u2013259. https:\/\/www.jstor.org\/stable\/23011015","journal-title":"Information Systems Research"},{"key":"9588_CR47","doi-asserted-by":"publisher","DOI":"10.1590\/S1415-65552003000100015","volume-title":"Research Designs: Qualitative, Quantitative, and Mixed Methods Approaches","author":"JW Creswell","year":"2002","unstructured":"Creswell, J. W. (2002). Research Designs: Qualitative, Quantitative, and Mixed Methods Approaches (2nd ed.). London: Sage Publications. https:\/\/doi.org\/10.1590\/S1415-65552003000100015","edition":"2"},{"issue":"3","key":"9588_CR48","doi-asserted-by":"publisher","first-page":"515","DOI":"10.5465\/amj.2007.25525647","volume":"50","author":"DA Plowman","year":"2007","unstructured":"Plowman, D. A., Baker, L. T., Beck, T. E., Kulkarni, M., Solansky, S. T., & Travis, D. V. (2007). Radical change accidentally: the emergence and amplification of small change. The Academy of Management Journal, 50(3), 515\u2013543. https:\/\/doi.org\/10.5465\/amj.2007.25525647","journal-title":"The Academy of Management Journal"},{"issue":"3","key":"9588_CR49","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10726-013-9340-z","volume":"23","author":"X Cheng","year":"2014","unstructured":"Cheng, X., & Macaulay, L. (2014). Exploring individual trust factors in computer mediated group collaboration: a case study approach. Group Decision and Negotiation, 23(3), 533\u2013560. https:\/\/doi.org\/10.1007\/s10726-013-9340-z","journal-title":"Group Decision and Negotiation"},{"issue":"4","key":"9588_CR50","doi-asserted-by":"publisher","first-page":"532","DOI":"10.5465\/amr.1989.4308385","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532\u2013550. https:\/\/doi.org\/10.5465\/amr.1989.4308385","journal-title":"Academy of Management Review"},{"issue":"2","key":"9588_CR51","doi-asserted-by":"publisher","first-page":"673","DOI":"10.25300\/MISQ\/2019\/12112","volume":"42","author":"P Wunderlich","year":"2019","unstructured":"Wunderlich, P., Veit, D. J., & Sarker, S. (2019). Adoption of sustainable technologies: a mixed-methods study of german households. MIS Quarterly, 42(2), 673\u2013691. https:\/\/doi.org\/10.25300\/MISQ\/2019\/12112","journal-title":"MIS Quarterly"},{"key":"9588_CR52","volume-title":"Basics Of Qualitative Research: Techniques and procedures for developing grounded theory","author":"AL Strauss","year":"2008","unstructured":"Strauss, A. L., & Corbin, J. M. (2008). Basics Of Qualitative Research: Techniques and procedures for developing grounded theory (3rd ed.). Los Angeles: Sage Publications","edition":"3"},{"issue":"2","key":"9588_CR53","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","volume":"49","author":"G Bansal","year":"2010","unstructured":"Bansal, G., Zahedi, F., \u2018., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138\u2013150. https:\/\/doi.org\/10.1016\/j.dss.2010.01.010","journal-title":"Decision Support Systems"},{"key":"9588_CR54","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.dss.2013.09.018","volume":"57","author":"L Yuan","year":"2014","unstructured":"Yuan, L. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343\u2013354. https:\/\/doi.org\/10.1016\/j.dss.2013.09.018","journal-title":"Decision Support Systems"},{"issue":"1\u20132","key":"9588_CR55","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.physbeh.2007.09.016","volume":"93","author":"B Nathalie","year":"2008","unstructured":"Nathalie, B., Pattyn, A., et al. (2008). \u201cPsychophysiological investigation of vigilance decrement: Boredom or cognitive fatigue?\u201c. Physiology & Behavior, 93(1\u20132), 369\u2013378. https:\/\/doi.org\/10.1016\/j.physbeh.2007.09.016","journal-title":"Physiology & Behavior"},{"issue":"1","key":"9588_CR56","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J Phelps","year":"2000","unstructured":"Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27\u201341. https:\/\/doi.org\/10.1509\/jppm.19.1.27.16941","journal-title":"Journal of Public Policy & Marketing"},{"key":"9588_CR57","doi-asserted-by":"publisher","unstructured":"Ani\u0107, I. D., \u0160kare, V.; Kursan Milakovi\u0107, & Ivana (2019). The determinants and effects of online privacy concerns in the context of e-commerce. Electronic Commerce Research & Applications, 36, 100868. https:\/\/doi.org\/10.1016\/j.elerap.2019.100868","DOI":"10.1016\/j.elerap.2019.100868"},{"issue":"4","key":"9588_CR58","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1037\/0012-1649.41.4.625","volume":"41","author":"M Gardner","year":"2005","unstructured":"Gardner, M., & Steinberg, L. (2005). Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. Developmental Psychology, 41(4), 625\u2013635. https:\/\/doi.org\/10.1037\/0012-1649.41.4.625","journal-title":"Developmental Psychology"},{"issue":"4","key":"9588_CR59","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1111\/bjop.12292","volume":"109","author":"E Rubaltelli","year":"2018","unstructured":"Rubaltelli, E., Scrimin, S., Moscardino, U., Priolo, G., & Buodo, G. (2018). Media exposure to terrorism and people\u2019s risk perception: the role of environmental sensitivity and psychophysiological response to stress. British Journal of Psychology, 109(4), 656\u2013673. https:\/\/doi.org\/10.1111\/bjop.12292","journal-title":"British Journal of Psychology"},{"key":"9588_CR60","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.dss.2016.10.002","volume":"94","author":"J Gu","year":"2016","unstructured":"Gu, J., Xu, Y., Xu, H., Zhang, C., & Ling, H. (2016). Privacy concerns for mobile app download: an elaboration likelihood model perspective. Decision Support Systems, 94, 19\u201328. https:\/\/doi.org\/10.1016\/j.dss.2016.10.002","journal-title":"Decision Support Systems"},{"issue":"6221","key":"9588_CR61","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509\u2013514. https:\/\/doi.org\/10.1126\/science.aaa1465","journal-title":"Science"},{"issue":"3","key":"9588_CR62","doi-asserted-by":"publisher","first-page":"341","DOI":"10.2307\/249775","volume":"17","author":"MJ Culnan","year":"1993","unstructured":"Culnan, M. J. (1993). \u201cHow Did They Get My Name?\u201c: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. MIS Quarterly, 17(3), 341\u2013363. https:\/\/doi.org\/10.2307\/249775","journal-title":"MIS Quarterly"},{"issue":"2","key":"9588_CR63","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1002\/dir.4000090204","volume":"9","author":"MJ Culnan","year":"1995","unstructured":"Culnan, M. J. (1995). Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing, 9(2), 10\u201319. https:\/\/doi.org\/10.1002\/dir.4000090204","journal-title":"Journal of Direct Marketing"},{"issue":"4","key":"9588_CR64","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355. https:\/\/doi.org\/10.1287\/isre.1040.0032","journal-title":"Information Systems Research"},{"issue":"4","key":"9588_CR65","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/dir.1019","volume":"15","author":"JE Phelps","year":"2001","unstructured":"Phelps, J. E., D\u2019Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: an empirical investigation (p2-17). Journal of Interactive Marketing, 15(4), 2\u201317. https:\/\/doi.org\/10.1002\/dir.1019","journal-title":"Journal of Interactive Marketing"},{"key":"9588_CR66","doi-asserted-by":"crossref","unstructured":"Xu, H., et al. (2012). Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services.Information Systems Research, 23(4), 1342\u20131363,1378,1382\u20131383. https:\/\/www.jstor.org\/stable\/42004260","DOI":"10.1287\/isre.1120.0416"},{"issue":"1","key":"9588_CR67","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.dss.2006.10.002","volume":"43","author":"S Du","year":"2007","unstructured":"Du, S., Keil, M., Mathiassen, L., Shen, Y., & Tiwana, A. (2007). Attention-shaping tools, expertise, and perceived control in it project risk assessment. Decision Support Systems, 43(1), 269\u2013283. https:\/\/doi.org\/10.1016\/j.dss.2006.10.002","journal-title":"Decision Support Systems"},{"issue":"1","key":"9588_CR68","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104\u2013115. https:\/\/doi.org\/10.1287\/orsc.10.1.104","journal-title":"Organization Science"},{"key":"9588_CR69","doi-asserted-by":"publisher","unstructured":"Chang, Y., Wong, S. F., Libaque-Saenz, C. F., & Lee, H. (2018). The role of privacy policy on consumers\u2019 perceived privacy. Government Information Quarterly, 445\u2013459. https:\/\/doi.org\/10.1016\/j.giq.2018.04.002","DOI":"10.1016\/j.giq.2018.04.002"},{"issue":"2","key":"9588_CR70","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.im.2004.01.002","volume":"42","author":"C Liu","year":"2005","unstructured":"Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern\u2014a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(2), 289\u2013304. https:\/\/doi.org\/10.1016\/j.im.2004.01.002","journal-title":"Information & Management"},{"issue":"3","key":"9588_CR71","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.chb.2011.12.008","volume":"28","author":"SY Huang","year":"2012","unstructured":"Huang, S. Y., Yen, D. C., & Irina Popova. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889\u2013897. https:\/\/doi.org\/10.1016\/j.chb.2011.12.008","journal-title":"Computers in Human Behavior"},{"key":"9588_CR72","doi-asserted-by":"publisher","first-page":"102063","DOI":"10.1016\/j.ijinfomgt.2019.102063","volume":"52","author":"A Balapour","year":"2020","unstructured":"Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.102063","journal-title":"International Journal of Information Management"},{"issue":"2","key":"9588_CR73","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2007","unstructured":"Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2007). The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research, 22(2), 254\u2013268. https:\/\/www.jstor.org\/stable\/23015560","journal-title":"Information Systems Research"},{"key":"9588_CR74","volume-title":"Accounting for Corporate Reputation","author":"A Riahi-Belkaoui","year":"1992","unstructured":"Riahi-Belkaoui, A., & Pavlik, E. (1992). Accounting for Corporate Reputation. Westport, CT: Quorum Books"},{"issue":"2","key":"9588_CR75","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544\u2013564. https:\/\/doi.org\/10.1016\/j.dss.2007.07.001","journal-title":"Decision Support Systems"},{"issue":"2","key":"9588_CR76","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618\u2013644. https:\/\/doi.org\/10.1016\/j.dss.2005.05.019","journal-title":"Decision Support Systems"},{"issue":"2","key":"9588_CR77","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1111\/0022-1082.00118","volume":"54","author":"R Wermers","year":"1999","unstructured":"Wermers, R. (1999). Mutual fund herding and the impact on stock prices. The Journal of Finance, 54(2), 581\u2013622. https:\/\/doi.org\/10.1111\/0022-1082.00118","journal-title":"The Journal of Finance"},{"key":"9588_CR78","doi-asserted-by":"crossref","unstructured":"Brown, B. B., & Larson, J. (2009). Peer Relationships in Adolescence. In L. Steinberg & R. M. Lerner (Eds.), Handbook of Adolescent Psychology","DOI":"10.1002\/9780470479193.adlpsy002004"},{"issue":"may","key":"9588_CR79","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.chb.2018.01.016","volume":"82","author":"H Liang","year":"2018","unstructured":"Liang, H., & Shen, F. (2018). Birds of a schedule flock together: social networks, peer influence, and digital activity cycles. Computers in Human Behavior, 82(may), 167\u2013176. https:\/\/doi.org\/10.1016\/j.chb.2018.01.016","journal-title":"Computers in Human Behavior"},{"key":"9588_CR80","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1016\/j.chb.2016.05.037","volume":"63","author":"Z Zhu","year":"2016","unstructured":"Zhu, Z., Wang, J., Wang, X., & Wan, X. (2016). Exploring factors of user\u2019s peer-influence behavior in social media on purchase intention: evidence from qq. Computers in Human Behavior, 63, 980\u2013987. https:\/\/doi.org\/10.1016\/j.chb.2016.05.037","journal-title":"Computers in Human Behavior"},{"issue":"1\u20136","key":"9588_CR81","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.elerap.2009.05.001","volume":"9","author":"CM Hoadley","year":"2010","unstructured":"Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electronic Commerce Research & Applications, 9(1\u20136), 50\u201360. https:\/\/doi.org\/10.1016\/j.elerap.2009.05.001","journal-title":"Electronic Commerce Research & Applications"},{"issue":"12","key":"9588_CR82","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1108\/10662241111104893","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798\u2013824. https:\/\/doi.org\/10.1108\/10662241111104893","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"9588_CR83","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1037\/0021-9010.68.3.459","volume":"68","author":"EF Stone","year":"1983","unstructured":"Stone, E. F., Gueutal, H. G., Gardner, D. G., & Mcclure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68(3), 459\u2013468. https:\/\/doi.org\/10.1037\/0021-9010.68.3.459","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"9588_CR84","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","volume":"13","author":"KA Stewart","year":"2002","unstructured":"Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36\u201349. https:\/\/www.jstor.org\/stable\/23015822","journal-title":"Information Systems Research"},{"key":"9588_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2020.05.007","author":"S Okazaki","year":"2020","unstructured":"Okazaki, S., Eisend, M., Plangger, K., Ruyter, K. D., & Grewal, D. (2020). Understanding the strategic consequences of customer privacy concerns: a meta-analytic review. Journal of Retailing. https:\/\/doi.org\/10.1016\/j.jretai.2020.05.007","journal-title":"Journal of Retailing"},{"issue":"7","key":"9588_CR86","doi-asserted-by":"publisher","first-page":"103497","DOI":"10.1016\/j.im.2021.103497","volume":"58","author":"RJ Bandara","year":"2021","unstructured":"Bandara, R. J., Fernando, M., & Akter, S. (2021). Construing online consumers\u2019 information privacy decisions: the impact of psychological distance. Information & Management, 58(7), 103497. https:\/\/doi.org\/10.1016\/j.im.2021.103497","journal-title":"Information & Management"},{"issue":"7","key":"9588_CR87","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1016\/j.im.2016.02.003","volume":"53","author":"B Choi","year":"2016","unstructured":"Choi, B., & Land, L. (2016). The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage. Information & Management, 53(7), 868\u2013877. https:\/\/doi.org\/10.1016\/j.im.2016.02.003","journal-title":"Information & Management"},{"issue":"4","key":"9588_CR88","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.im.2017.11.003","volume":"55","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information & Management, 55(4), 482\u2013493. https:\/\/doi.org\/10.1016\/j.im.2017.11.003","journal-title":"Information & Management"},{"issue":"3","key":"9588_CR89","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.giq.2016.06.004","volume":"33","author":"LV Zoonen","year":"2016","unstructured":"Zoonen, L. V. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472\u2013480. https:\/\/doi.org\/10.1016\/j.giq.2016.06.004","journal-title":"Government Information Quarterly"},{"issue":"3","key":"9588_CR90","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1111\/psyp.12339","volume":"52","author":"JF Hopstaken","year":"2015","unstructured":"Hopstaken, J. F., Linden, D., Bakker, A. B., & Kompier, M. (2015). A multifaceted investigation of the link between mental fatigue and task disengagement. Psychophysiology, 52(3), 305\u2013315. https:\/\/doi.org\/10.1111\/psyp.12339","journal-title":"Psychophysiology"},{"issue":"6","key":"9588_CR91","doi-asserted-by":"publisher","first-page":"415","DOI":"10.17705\/1jais.00092","volume":"7","author":"C Slyke","year":"2006","unstructured":"Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415\u2013444. https:\/\/doi.org\/10.17705\/1jais.00092","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"9588_CR92","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S0272-7358(99)00031-8","volume":"21","author":"S Ax","year":"2001","unstructured":"Ax, S., & Gregg, V. H.,D Jones (2001). Coping and illness cognitions: chronic fatigue syndrome. Clinical Psychology Review, 21(2), 161\u2013182. https:\/\/doi.org\/10.1016\/S0272-7358(99)00031-8","journal-title":"Clinical Psychology Review"},{"issue":"1","key":"9588_CR93","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/0749-5978(85)90049-4","volume":"35","author":"HR Arkes","year":"1985","unstructured":"Arkes, H. R., & Blumer, C. (1985). The psychology of sunk cost. Organizational Behavior & Human Decision Processes, 35(1), 124\u2013140","journal-title":"Organizational Behavior & Human Decision Processes"},{"key":"9588_CR94","volume-title":"Research methods for business: A skill building approach","author":"U Sekaran","year":"2010","unstructured":"Sekaran, U., & Bougie, R. (2010). Research methods for business: A skill building approach (5th ed.). UK: Wiley & Sons Ltd","edition":"5"},{"issue":"2","key":"9588_CR95","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1086\/208655","volume":"3","author":"RA Mittelstaedt","year":"1976","unstructured":"Mittelstaedt, R. A., et al. (1976). Optimal Stimulation Level and the Adoption Decision Process. Journal of Consumer Research, 3(2), 84\u201394. https:\/\/www.jstor.org\/stable\/2489114","journal-title":"Journal of Consumer Research"},{"issue":"2","key":"9588_CR96","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1504\/IJMDA.2017.087624","volume":"1","author":"J Hair","year":"2017","unstructured":"Hair, J., Mathews, M. L., & Mathews, L. R. (2017). PLM-SEM or CB-SEM: Updated guidelines on which method to use. International Journal of Multivariate Data Analysis, 1(2), 107\u2013123","journal-title":"International Journal of Multivariate Data Analysis"},{"issue":"3","key":"9588_CR97","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","volume":"40","author":"J Hair","year":"2012","unstructured":"Hair, J., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414\u2013433. https:\/\/doi.org\/10.1007\/s11747-011-0261-6","journal-title":"Journal of the Academy of Marketing Science"},{"key":"9588_CR98","unstructured":"Kline, R. B. (2005). Principles and practice of structural equation modeling (2nd ed.). The Guilford Press"},{"key":"9588_CR99","doi-asserted-by":"publisher","unstructured":"Saprikis, V., & Avlogiaris, G. (2021). Modeling users\u2019 acceptance of mobile social commerce: the case of \u2018Instagram checkout\u2019. Electronic Commerce Research, 1\u201330. https:\/\/doi.org\/10.1007\/s10660-021-09499-4","DOI":"10.1007\/s10660-021-09499-4"},{"key":"9588_CR100","volume-title":"How to design and evaluate research in education","author":"JR Fraenkel","year":"2000","unstructured":"Fraenkel, J. R., & Wallen, N. E. (2000). How to design and evaluate research in education. New York: McGraw-Hill"},{"key":"9588_CR101","volume-title":"Psychological testing: Principles and applications","author":"KR Davidshofer","year":"2005","unstructured":"Davidshofer, K. R., & Murphy, C. O. (2005). Psychological testing: Principles and applications. New Jersey: Pearson\/Prentice-Upper Saddle River"},{"key":"9588_CR102","volume-title":"Multivariate data analysis","author":"JF Hair Jr.","year":"2013","unstructured":"Hair, J. F. Jr., Anderson, R. E., Tatham, R. L., & Black, W. C. (2013). Multivariate data analysis (7th ed.). Pearson New International: Pearson Education Limited","edition":"7"},{"issue":"3","key":"9588_CR103","doi-asserted-by":"publisher","first-page":"375","DOI":"10.2307\/3150979","volume":"18","author":"RP Bagozzi","year":"1981","unstructured":"Bagozzi, R. P. (1981). Evaluating structural equation models with unobservable variables and measurement error: a comment. Journal of Marketing Research, 18(3), 375\u2013381. https:\/\/doi.org\/10.2307\/3150979","journal-title":"Journal of Marketing Research"},{"issue":"7","key":"9588_CR104","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1CAIS.00407","volume":"4","author":"D Gefen","year":"2000","unstructured":"Gefen, D., Straub, D. W., & Boudreau, M. (2000). Structural equation modeling and regression: guidelines for research practice. Communication of the Association for Information System, 4(7), 1\u201377. https:\/\/doi.org\/10.17705\/1CAIS.00407","journal-title":"Communication of the Association for Information System"},{"issue":"1","key":"9588_CR105","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: algebra and statistics. Journal of Marketing Research, 18(1), 39\u201350. https:\/\/doi.org\/10.2307\/3151312","journal-title":"Journal of Marketing Research"},{"key":"9588_CR106","volume-title":"A primer for soft modeling","author":"RF Falk","year":"1992","unstructured":"Falk, R. F., & Miller, N. B. (1992). A primer for soft modeling. Akron, OH: University of Akron Press"},{"issue":"28","key":"9588_CR107","first-page":"453","volume":"28","author":"Y Li","year":"2011","unstructured":"Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28(28), 453\u2013496","journal-title":"Communications of the Association for Information Systems"},{"issue":"5","key":"9588_CR108","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1177\/0165551516653590","volume":"43","author":"JH Benamati","year":"2017","unstructured":"Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an Antecedents - Privacy Concerns -Outcomes model. Journal of Information Science, 43(5), 583\u2013600","journal-title":"Journal of Information Science"},{"key":"9588_CR109","doi-asserted-by":"publisher","first-page":"102122","DOI":"10.1016\/j.ijinfomgt.2020.102122","volume":"54","author":"A Ioannou","year":"2020","unstructured":"Ioannou, A., Tussyadiah, I., & Yang, L. (2020). Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54, 102122","journal-title":"International Journal of Information Management"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-022-09588-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10660-022-09588-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-022-09588-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:20:56Z","timestamp":1744208456000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10660-022-09588-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,5]]},"references-count":109,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["9588"],"URL":"https:\/\/doi.org\/10.1007\/s10660-022-09588-y","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,5]]},"assertion":[{"value":"5 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The data that support the findings of this study are available from the corresponding author upon request.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Datasets"}}]}}