{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T23:42:21Z","timestamp":1775173341014,"version":"3.50.1"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T00:00:00Z","timestamp":1486080000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s10796-017-9736-4","type":"journal-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T14:20:09Z","timestamp":1486131609000},"page":"753-767","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":103,"title":["Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework"],"prefix":"10.1007","volume":"19","author":[{"given":"Ahmet Bulent","family":"Ozturk","sequence":"first","affiliation":[]},{"given":"Khaldoon","family":"Nusair","sequence":"additional","affiliation":[]},{"given":"Fevzi","family":"Okumus","sequence":"additional","affiliation":[]},{"given":"Dipendra","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,3]]},"reference":[{"issue":"6","key":"9736_CR1","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., & Tuzhilin, A. (2005). Toward the next generation of recommender systems: a survey of the state-of-heart and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 17(6), 734\u2013749.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9736_CR2","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"JC Anderson","year":"1988","unstructured":"Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: a review, recommended two-step approach. Psychological Bulletin, 103, 411\u2013423.","journal-title":"Psychological Bulletin"},{"issue":"3","key":"9736_CR3","doi-asserted-by":"crossref","first-page":"396","DOI":"10.2307\/3150783","volume":"14","author":"JS Armstrong","year":"1977","unstructured":"Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14(3), 396\u2013402.","journal-title":"Journal of Marketing Research"},{"key":"9736_CR4","unstructured":"Ary, D., Jacobs, L., Razavieh, A. (1996). Introduction to research in education, 5th ed. Rinehart and Winston, Ft Worth."},{"key":"9736_CR5","volume-title":"Risk taking and information handling in consumer behavior","author":"RA Bauer","year":"1967","unstructured":"Bauer, R. A. (1967). Consumer behavior as risk taking. In D. Cox (Ed.), Risk taking and information handling in consumer behavior. Cambridge: Harvard University Press."},{"issue":"12","key":"9736_CR6","doi-asserted-by":"crossref","first-page":"1352","DOI":"10.1016\/S0148-2963(03)00067-5","volume":"57","author":"A Bhatnagar","year":"2004","unstructured":"Bhatnagar, A., & Ghose, S. (2004). Segmenting consumers based on the benefits and risks of internet shopping. Journal of Business Research, 57(12), 1352\u20131360.","journal-title":"Journal of Business Research"},{"key":"9736_CR7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1509\/jmkg.65.2.81.18255","volume":"65","author":"A Chaudhuri","year":"2001","unstructured":"Chaudhuri, A., & Holbrook, M. B. (2001). The chain of effects from brand trust and brand affect to brand performance: the role of brand loyalty. Journal of Marketing, 65, 81\u201393.","journal-title":"Journal of Marketing"},{"issue":"4","key":"9736_CR8","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1080\/15332861.2013.865388","volume":"12","author":"JQ Chen","year":"2013","unstructured":"Chen, J. Q., Zhang, R., & Lee, J. (2013). A cross-culture empirical study of M-commerce privacy concerns. Journal of Internet Commerce, 12(4), 348\u2013364.","journal-title":"Journal of Internet Commerce"},{"key":"9736_CR9","doi-asserted-by":"crossref","unstructured":"Chiu, C-M., Wang, E.T.G., Fang, Y-H., Huang H-Y. (2014). Understanding customers\u2019 repeat purchase intentions in B2C e-commerce: the roles of utilitarian value, hedonic value and perceived risk. Information Systems Journal, 24(1), 85\u2013114.","DOI":"10.1111\/j.1365-2575.2012.00407.x"},{"issue":"1","key":"9736_CR10","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1037\/0033-2909.112.1.155","volume":"112","author":"J Cohen","year":"1992","unstructured":"Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155\u2013159.","journal-title":"Psychological Bulletin"},{"issue":"2","key":"9736_CR11","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/1540-4560.00067","volume":"59","author":"MJ Culnan","year":"2003","unstructured":"Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: balancing economic and justice considerations. Journal of Social Issues, 59(2), 323\u2013342.","journal-title":"Journal of Social Issues"},{"issue":"8","key":"9736_CR12","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1016\/j.im.2006.08.009","volume":"43","author":"D Cyr","year":"2006","unstructured":"Cyr, D., Head, M., & Ivanov, A. (2006). Design aesthetics leading to m-loyalty in mobile commerce. Information & Management, 43(8), 950\u2013963.","journal-title":"Information & Management"},{"issue":"1","key":"9736_CR13","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1504\/IJEB.2012.048749","volume":"10","author":"H Dai","year":"2012","unstructured":"Dai, H., Wen, K.-W., Singh, R., & Iyer, L. S. (2012). An integrative framework of mobile commerce consumers\u2019 privacy concerns and willingness to use: an empirical study. International Journal of Electronic Business, 10(1), 79\u2013100.","journal-title":"International Journal of Electronic Business"},{"issue":"1","key":"9736_CR14","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61\u201380.","journal-title":"Information Systems Research"},{"key":"9736_CR15","first-page":"34","volume-title":"Dynamic & mobile GIS: Investigating change in space and time","author":"M Duckham","year":"2006","unstructured":"Duckham, M., & Kulik, L. (2006). Location privacy and location aware computing. In J. Drummond (Ed.), Dynamic & mobile GIS: Investigating change in space and time (pp. 34\u201351). Boca Raton: CRC Press."},{"issue":"3&4","key":"9736_CR16","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/10919392.2006.9681199","volume":"16","author":"H Fan","year":"2006","unstructured":"Fan, H., & Poole, M. S. (2006). What is personalization? Perspectives on the design and implementation of personalization in information systems. Journal of Organizational Computing and Electronic Commerce, 16(3&4), 179\u2013202.","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"3","key":"9736_CR17","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1108\/08876041011040622","volume":"24","author":"MS Featherman","year":"2010","unstructured":"Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219\u2013229.","journal-title":"Journal of Services Marketing"},{"issue":"1","key":"9736_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.im.2005.01.002","volume":"43","author":"C Flavian","year":"2006","unstructured":"Flavian, C., Guinaliu, M., & Gurrea, R. (2006). The role played by perceived usability, satisfaction and consumer trust on website loyalty. Information & Management, 43(1), 1\u201314.","journal-title":"Information & Management"},{"issue":"3","key":"9736_CR19","doi-asserted-by":"crossref","first-page":"382","DOI":"10.2307\/3150980","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: algebra and statistics. Journal of Marketing Research, 18(3), 382\u2013388.","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"9736_CR20","first-page":"35","volume":"2","author":"J Frank","year":"2014","unstructured":"Frank, J., & Harnisch, M. J. (2014). Review on benefits and risks of personalization and solutions for privacy concerns. Computer Communication & Collaboration, 2(1), 35\u201346.","journal-title":"Computer Communication & Collaboration"},{"key":"9736_CR21","doi-asserted-by":"crossref","unstructured":"Freudiger J., Shokri R., Hubaux JP. (2012). Evaluating the privacy risk of location-based services. In: Danezis G. (eds) Financial Cryptography and Data Security. FC 2011. Lecture Notes in Computer Science, vol 7035. Springer, Berlin, Heidelberg.","DOI":"10.1007\/978-3-642-27576-0_3"},{"issue":"1","key":"9736_CR22","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51\u201390.","journal-title":"MIS Quarterly"},{"key":"9736_CR23","unstructured":"George, D., Mallery, M. (2010). SPSS for Windows Step by Step: A Simple Guide and Reference, 17.0 update (10a ed.) Boston: Pearson."},{"key":"9736_CR24","unstructured":"Georgiadis, C. K., & Manitsaris, A. (2005). Personalized recommendations in mobile commerce. In 7th Hellenic European Conference on Computer Mathematics & its Applications, HERCMA, Athens, Greece, September 2005."},{"issue":"1","key":"9736_CR25","first-page":"1","volume":"8","author":"H-Y Ha","year":"2002","unstructured":"Ha, H.-Y. (2002). The effects of consumer risk perception on pre-purchase information in online auctions: brand, word-of-mouth, and customized information. Journal of Computer-Mediated Communication, 8(1), 1\u201323.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9736_CR26","volume-title":"Multivariate Data Analysis","author":"JF Hair","year":"2006","unstructured":"Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2006). Multivariate Data Analysis. Upper Saddle River: Prentice Hall."},{"key":"9736_CR27","volume-title":"Principles of internet marketing","author":"W Hanson","year":"2000","unstructured":"Hanson, W. (2000). Principles of internet marketing. Cincinnati: South-Western."},{"issue":"7","key":"9736_CR28","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1108\/02634500610711897","volume":"24","author":"S Harridge","year":"2006","unstructured":"Harridge, S. (2006). Can the building of trust overcome consumer perceived risk online? Marketing Intelligence & Planning, 24(7), 746\u2013761.","journal-title":"Marketing Intelligence & Planning"},{"key":"9736_CR29","volume-title":"The service profit chain. How leading companies link profit and growth to loyalty, satisfaction, and value","author":"JL Heskett","year":"1997","unstructured":"Heskett, J. L., Sasser Jr., W. E., & Schlesinger, L. A. (1997). The service profit chain. How leading companies link profit and growth to loyalty, satisfaction, and value. New York: The Free Press."},{"issue":"8","key":"9736_CR30","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1145\/345124.345159","volume":"43","author":"H Hirsh","year":"2000","unstructured":"Hirsh, H., Basu, C., & Davison, B. (2000). Learning to personalize. Comm. of the ACM, 43(8), 102\u2013106.","journal-title":"Comm. of the ACM"},{"issue":"5","key":"9736_CR31","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.ijinfomgt.2011.02.001","volume":"32","author":"IB Hong","year":"2011","unstructured":"Hong, I. B., & Cho, H. (2011). The impact of customer trust on attitudinal loyalty and purchase intentions in B2C e-marketplace: intermediary trust vs. seller trust. International Journal of Information Management, 32(5), 469\u2013479.","journal-title":"International Journal of Information Management"},{"key":"9736_CR32","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1016\/j.dss.2006.03.009","volume":"42","author":"SJ Hong","year":"2006","unstructured":"Hong, S. J., Thong, J., & Tam, K. Y. (2006). Understanding continued information technology usage behavior: a comparison of three models in the context of mobile internet. Decision Support Systems, 42, 1819\u20131834.","journal-title":"Decision Support Systems"},{"key":"9736_CR33","unstructured":"Hotel News Now (2014). Retrieved from: http:\/\/www.hotelnewsnow.com\/article\/13064\/5-things-to-know-3-February-2014 09.12.2014."},{"issue":"1","key":"9736_CR34","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2307\/25148830","volume":"32","author":"J Hsieh","year":"2008","unstructured":"Hsieh, J., Rai, A., & Keil, M. (2008). Understanding digital inequality: comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS Quarterly, 32(1), 97\u2013126.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9736_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.im.2007.03.005","volume":"45","author":"I Im","year":"2008","unstructured":"Im, I., Kim, Y., & Han, H.-J. (2008). The effects of perceived risk and technology type on users\u2019 acceptance of technologies. Information and Management, 45(1), 1\u20139.","journal-title":"Information and Management"},{"issue":"4","key":"9736_CR36","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1108\/09596111111130029","volume":"23","author":"C Ip","year":"2011","unstructured":"Ip, C., Leung, R., & Law, R. (2011). Progress and development of information and communication technologies in hospitality. International Journal of Contemporary Hospitality Management, 23(4), 533\u2013551.","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"1","key":"9736_CR37","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1057\/palgrave.dbm.3250065","volume":"15","author":"TW Jackson","year":"2007","unstructured":"Jackson, T. W. (2007). Personalization and CRM. Journal of Database Marketing and Customer Strategy Management, 15(1), 24\u201336.","journal-title":"Journal of Database Marketing and Customer Strategy Management"},{"issue":"1\/2","key":"9736_CR38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1300\/J150v10n01_02","volume":"10","author":"J Kandampully","year":"2003","unstructured":"Kandampully, J., & Suhartanto, D. (2003). The role of customer satisfaction and image in gaining customer loyalty in the hotel industry. Journal of Hospitality and Leisure Marketing, 10(1\/2), 3\u201325.","journal-title":"Journal of Hospitality and Leisure Marketing"},{"issue":"3","key":"9736_CR39","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1108\/IJCHM-03-2014-0151","volume":"27","author":"J Kandampully","year":"2015","unstructured":"Kandampully, J., Zhang, T., & Bilgihan, A. (2015). Customer loyalty: a review and future directions with a special focus on the hospitality industry. International Journal of Contemporary Hospitality Management, 27(3), 379\u2013414.","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"1","key":"9736_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1252054","volume":"57","author":"K Keller","year":"1993","unstructured":"Keller, K. (1993). Conceptualizing, measuring, and managing customer based equity. Journal of Marketing, 57(1), 1\u201322.","journal-title":"Journal of Marketing"},{"issue":"8","key":"9736_CR41","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1108\/IJCHM-06-2015-0289","volume":"28","author":"J Kim","year":"2016","unstructured":"Kim, J. (2016). An extended technology acceptance model in behavioral intention toward hotel tablet apps with moderating effects of gender and age. International Journal of Contemporary Hospitality Management, 28(8), 1535\u20131553.","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"2","key":"9736_CR42","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1108\/IJCHM-09-2012-0165","volume":"26","author":"M Kim","year":"2014","unstructured":"Kim, M., & Qu, H. (2014). Travelers' behavioral intention toward hotel self-service kiosks usage. International Journal of Contemporary Hospitality Management, 26(2), 225\u2013245.","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"2","key":"9736_CR43","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim, D. J., Ferrin, D. L., & Rao, R. H. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544\u2013564.","journal-title":"Decision Support Systems"},{"issue":"2","key":"9736_CR44","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.tourman.2010.01.011","volume":"32","author":"M-J Kim","year":"2011","unstructured":"Kim, M.-J., Chung, N., & Lee, C.-K. (2011). The effect of perceived trust on electronic commerce: shopping online for tourism products and services in South Korea. Tourism Management, 32(2), 256\u2013265.","journal-title":"Tourism Management"},{"issue":"4","key":"9736_CR45","doi-asserted-by":"crossref","first-page":"941","DOI":"10.2307\/25148760","volume":"30","author":"SYX Komiak","year":"2006","unstructured":"Komiak, S. Y. X., & Benbasat, I. (2006). The effect of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941\u2013960.","journal-title":"MIS Quarterly"},{"issue":"8","key":"9736_CR46","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/345124.345139","volume":"43","author":"J Kramer","year":"2000","unstructured":"Kramer, J., Noronha, S., & Vergo, J. (2000). A user-centered design approach to personalization. Communications of the ACM, 43(8), 45\u201348.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9736_CR47","first-page":"23","volume":"6","author":"S Krishnamurthy","year":"2001","unstructured":"Krishnamurthy, S. (2001). A comprehensive analysis of permission marketing. Journal of Computer-Mediated Communication, 6(2), 23\u201332.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"5","key":"9736_CR48","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1108\/IJCHM-08-2013-0367","volume":"26","author":"R Law","year":"2014","unstructured":"Law, R., Buhalis, D., & Cobanoglu, C. (2014). Progress on information and communication technologies in hospitality and tourism. International Journal of Contemporary Hospitality Management, 26(5), 727\u2013750.","journal-title":"International Journal of Contemporary Hospitality Management"},{"key":"9736_CR49","unstructured":"Levi, J. (2013). Why is WiFi so much worse on smartphones than on laptops and computers? Retrieved from: http:\/\/pocketnow.com\/2013\/06\/28\/smartphone-wifi-performance (04.15.2016)."},{"issue":"4","key":"9736_CR50","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.chb.2010.01.004","volume":"26","author":"Y-M Li","year":"2010","unstructured":"Li, Y.-M., & Yeh, Y.-S. (2010). Increasing trust in mobile commerce through design aesthetics. Computers in Human Behavior, 26(4), 673\u2013684.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"9736_CR51","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.im.2005.08.001","volume":"43","author":"H-H Lin","year":"2006","unstructured":"Lin, H.-H., & Wang, Y.-S. (2006). An examination of the determinants of customer loyalty in mobile commerce contexts. Information and Management, 43(3), 271\u2013282.","journal-title":"Information and Management"},{"issue":"4","key":"9736_CR52","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N Malhotra","year":"2004","unstructured":"Malhotra, N., Kim, S. K., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"key":"9736_CR53","unstructured":"Maxymiser (2013). New Maxymiser Study Uncovers Benefits of Online Testing and Personalization for Travel Marketers. Retrieved from: https:\/\/www.maxymiser.com\/aboutus\/news\/new-maxymiser-study-uncovers-benefits-online-testing-and-personalization-travel 02.01.2015."},{"issue":"3","key":"9736_CR54","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Acad Management Rev, 20(3), 709\u2013734.","journal-title":"Acad Management Rev"},{"issue":"9\u201310","key":"9736_CR55","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1016\/j.jbusres.2009.02.025","volume":"63","author":"P McCole","year":"2010","unstructured":"McCole, P., Ramsey, E., & Williams, J. (2010). Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. Journal of Business Research, 63(9\u201310), 1018\u20131024.","journal-title":"Journal of Business Research"},{"issue":"3","key":"9736_CR56","doi-asserted-by":"crossref","first-page":"473","DOI":"10.5465\/amr.1998.926622","volume":"23","author":"D McKnight","year":"1998","unstructured":"McKnight, D., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Acad Management Rev, 23(3), 473\u2013490.","journal-title":"Acad Management Rev"},{"issue":"3","key":"9736_CR57","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"H McKnight","year":"2002","unstructured":"McKnight, H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for E-commerce: an integrative typology. Information Systems Research, 13(3), 334\u2013359.","journal-title":"Information Systems Research"},{"key":"9736_CR58","first-page":"45","volume":"21","author":"LE Miller","year":"1983","unstructured":"Miller, L. E., & Smith, K. L. (1983). Handling nonresponse issues. Journal of Extension, 21, 45\u201350.","journal-title":"Journal of Extension"},{"key":"9736_CR59","unstructured":"Mobile Privacy Disclosures: Building Trust Thorough Transparency (2013). FTC Staff Report. Retrieved from https:\/\/www.ftc.gov\/os\/2013\/02\/130201mobileprivacyreport.pdf . (01.01.2015)."},{"key":"9736_CR60","unstructured":"Moore, M. (2015). Mobile Shopping Comes of Age\u2026Are you Ready?. TechWeek Europa. Retrieved from http:\/\/www.techweekeurope.co.uk\/e-marketing\/klarna-mobile-shopping-uk-164658 . (04.02.2015)."},{"key":"9736_CR61","volume-title":"Introduction to psychological measurement","author":"JC Nunnally","year":"1970","unstructured":"Nunnally, J. C. (1970). Introduction to psychological measurement. New York: McGraw-Hill."},{"issue":"4","key":"9736_CR62","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2753\/JOA0091-3367380405","volume":"38","author":"S Okazaki","year":"2009","unstructured":"Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63\u201377.","journal-title":"Journal of Advertising"},{"issue":"4","key":"9736_CR63","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1108\/IJCHM-02-2015-0073","volume":"28","author":"AB Ozturk","year":"2016","unstructured":"Ozturk, A. B. (2016). Customer acceptance of cashless payment systems in the hospitality industry. International Journal of Contemporary Hospitality Management, 28(4), 801\u2013817.","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"3","key":"9736_CR64","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101\u2013134.","journal-title":"International Journal of Electronic Commerce"},{"key":"9736_CR65","unstructured":"PhoCusWright Survey (2014). PhoCusWright survey highlights the online research and booking tendencies of travelers. Retrieved from https:\/\/www.webtrends.com\/about-us\/press-room\/press-release\/webtrends-recommends-best-practices-help-travel-sites-increase-bookings-2\/ 04.17.2016."},{"issue":"5","key":"9736_CR66","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879\u2013903.","journal-title":"Journal of Applied Psychology"},{"key":"9736_CR67","doi-asserted-by":"crossref","unstructured":"Preacher, K.J., Hayes, A.F. (2008). Asymptotic and resampling strategies for assessing and comparing indsirect effects in multiple mediator models. Behavior Research Methods, 40, 879\u2013891.","DOI":"10.3758\/BRM.40.3.879"},{"issue":"4","key":"9736_CR68","first-page":"105","volume":"78","author":"FF Reichheld","year":"2000","unstructured":"Reichheld, F. F., & Schetter, P. (2000). E-loyalty: your secret weapon on the web. Harvard Business Review, 78(4), 105\u2013113.","journal-title":"Harvard Business Review"},{"issue":"8","key":"9736_CR69","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/345124.345133","volume":"43","author":"D Riecken","year":"2000","unstructured":"Riecken, D. (2000). Personalized views of personalization. Communications of the ACM, 43(8), 26\u201328.","journal-title":"Communications of the ACM"},{"issue":"6","key":"9736_CR70","doi-asserted-by":"crossref","first-page":"344","DOI":"10.17705\/1jais.00161","volume":"9","author":"H Sheng","year":"2008","unstructured":"Sheng, H., Nah, F., & Siau, K. (2008). An experimental study on U-commerce adoption: the impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 344\u2013376.","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"9736_CR71","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"J Smith","year":"1996","unstructured":"Smith, J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quarterly, 20(2), 167\u2013197.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9736_CR72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/joeuc.2009010101","volume":"21","author":"C Stoecklin-Serino","year":"2009","unstructured":"Stoecklin-Serino, C., & Paradice, D. (2009). An examination of the impacts of brand equity, security, and personalization on trust processes in an e commerce environment. Journal of Organizational and End User Computing, 21(1), 1\u201336.","journal-title":"Journal of Organizational and End User Computing"},{"key":"9736_CR73","unstructured":"Technology Pulse: A Roundup of Digital News (2013). Retrieved from: http:\/\/www.hotelnewsnow.com\/Article\/12617\/Technology-Pulse-A-roundup-of-digital-news 09.01.2014."},{"issue":"1","key":"9736_CR74","first-page":"3","volume":"52","author":"N Thongpapanl","year":"2011","unstructured":"Thongpapanl, N., & Ashraf, A. R. (2011). Enhancing online performance through website content and personalization. Journal of Computer Information Systems, 52(1), 3\u201313.","journal-title":"Journal of Computer Information Systems"},{"key":"9736_CR75","unstructured":"Top Hotel Trends to Watch (2015). Retrieved from: http:\/\/travel.usnews.com\/features\/Top-Hotel-Trends-to-Watch-in-2015\/ 09.01.2015."},{"issue":"1","key":"9736_CR76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/dir.20052","volume":"20","author":"J Vesanen","year":"2006","unstructured":"Vesanen, J., & Raulas, M. (2006). Building bridges for personalization \u2013 a process model for marketing. Journal of Interactive Marketing, 20(1), 1\u201316.","journal-title":"Journal of Interactive Marketing"},{"issue":"4","key":"9736_CR77","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/j.ijhm.2009.11.001","volume":"29","author":"HY Wang","year":"2010","unstructured":"Wang, H. Y., & Wang, S. H. (2010). Predicting mobile hotel reservation adoption: insight from a perceived value standpoint. International Journal of Hospitality Management, 29(4), 598\u2013608.","journal-title":"International Journal of Hospitality Management"},{"issue":"5","key":"9736_CR78","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","volume":"42","author":"J-H Wu","year":"2005","unstructured":"Wu, J.-H., & Wang, S.-C. (2005). What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information and Management, 42(5), 719\u2013729.","journal-title":"Information and Management"},{"issue":"3","key":"9736_CR79","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1016\/j.chb.2011.12.008","volume":"28","author":"KW Wu","year":"2012","unstructured":"Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889\u2013897.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"9736_CR80","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s12525-009-0012-4","volume":"19","author":"H Xu","year":"2009","unstructured":"Xu, H., & Gupta, S. (2009). The effects of privacy concern and personal innovativeness on potential and experienced customers' adoption of location-based services. Electronic Markets--The International Journal on Networked Business, 19(2), 137\u2013140.","journal-title":"Electronic Markets--The International Journal on Networked Business"},{"issue":"1","key":"9736_CR81","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","volume":"51","author":"H Xu","year":"2011","unstructured":"Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42\u201352.","journal-title":"Decision Support Systems"},{"issue":"7","key":"9736_CR82","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1108\/IJCHM-06-2014-0275","volume":"27","author":"FX Yang","year":"2015","unstructured":"Yang, F. X., & Lau, M. C. V. (2015). \u201cLuXurY\u201d hotel loyalty \u2013 a comparison of Chinese gen X and Y tourists to Macau. International Journal of Contemporary Hospitality Management, 27(7), 1685\u20131706.","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"3","key":"9736_CR83","first-page":"215","volume":"14","author":"H Yun","year":"2013","unstructured":"Yun, H., Han, D. F., & Lee, C. C. (2013). Understanding the use of location-based service applications: do privacy concerns matter? Journal of Electronic Commerce, 14(3), 215\u2013230.","journal-title":"Journal of Electronic Commerce"},{"issue":"4","key":"9736_CR84","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/08874417.2013.11645648","volume":"53","author":"R Zhang","year":"2013","unstructured":"Zhang, R., Chen, J., & Lee, C. J. (2013). Mobile commerce and consumer privacy concerns. Journal of Computer Information Systems, 53(4), 31\u201338.","journal-title":"Journal of Computer Information Systems"},{"issue":"2","key":"9736_CR85","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1108\/02635571111115146","volume":"111","author":"T Zhou","year":"2011","unstructured":"Zhou, T. (2011). The impact of privacy concern on user adoption on location based services. Industrial Management and Data Systems, 111(2), 212\u2013226.","journal-title":"Industrial Management and Data Systems"},{"issue":"1","key":"9736_CR86","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10799-011-0111-8","volume":"13","author":"T Zhou","year":"2012","unstructured":"Zhou, T. (2012). Examining mobile banking user adoption from the perspectives of trust and flow experience. Information Technology and Management, 13(1), 27\u201337.","journal-title":"Information Technology and Management"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9736-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9736-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9736-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T07:01:28Z","timestamp":1568790088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9736-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,3]]},"references-count":86,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["9736"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9736-4","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,3]]}}}