{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:16:13Z","timestamp":1775153773528,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["WA 1568\/9-1 - AOBJ: 568047"],"award-info":[{"award-number":["WA 1568\/9-1 - AOBJ: 568047"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10796-019-09958-2","type":"journal-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T10:54:37Z","timestamp":1572605677000},"page":"1251-1264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development"],"prefix":"10.1007","volume":"21","author":[{"given":"Gianfranco","family":"Walsh","sequence":"first","affiliation":[]},{"given":"Edward","family":"Shiu","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Hille","sequence":"additional","affiliation":[]},{"given":"Ikuo","family":"Takahashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,1]]},"reference":[{"issue":"5","key":"9958_CR1","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1007\/s10796-017-9814-7","volume":"21","author":"M Albashrawi","year":"2019","unstructured":"Albashrawi, M., & Motiwalla, L. (2019). Privacy and personalization in continued usage intention of mobile banking: An integrative perspective. Information Systems Frontiers, 21(5), 1031\u20131043.","journal-title":"Information Systems Frontiers"},{"key":"9958_CR2","unstructured":"Avasthy, D. (2014). German police uncover data theft involving 18 million emails and passwords. International Business Times. http:\/\/www.ibtimes.co.uk\/german-police-uncover-data-theft-involving-18-million-emails-passwords-1443336 . Accessed 28 January 2019."},{"issue":"5","key":"9958_CR3","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society: An International Journal, 20(5), 313\u2013324.","journal-title":"The Information Society: An International Journal"},{"issue":"4","key":"9958_CR4","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101\u2013106.","journal-title":"Communications of the ACM"},{"issue":"4","key":"9958_CR5","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1287\/isre.13.4.416.71","volume":"13","author":"P Berthon","year":"2002","unstructured":"Berthon, P., Pitt, L., Ewing, M., & Carr, C. L. (2002). Potential research space in MIS: A framework for envisioning and evaluating research replication, extension, and generation. Information Systems Research, 13(4), 416\u2013427.","journal-title":"Information Systems Research"},{"issue":"6","key":"9958_CR6","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1177\/0963721412459512","volume":"21","author":"DG Bonett","year":"2012","unstructured":"Bonett, D. G. (2012). Replication-extension studies. Current Directions in Psychological Science, 21(6), 409\u2013412.","journal-title":"Current Directions in Psychological Science"},{"issue":"2","key":"9958_CR7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0021-9010.79.2.191","volume":"79","author":"JA Breaugh","year":"1994","unstructured":"Breaugh, J. A., & Colihan, J. P. (1994). Measuring facets of job ambiguity: Construct validity evidence. Journal of Applied Psychology, 79(2), 191\u2013202.","journal-title":"Journal of Applied Psychology"},{"issue":"6","key":"9958_CR8","doi-asserted-by":"crossref","first-page":"2156","DOI":"10.1016\/j.chb.2013.05.009","volume":"29","author":"K Casler","year":"2013","unstructured":"Casler, K., Bickel, L., & Hackett, E. E. (2013). Separate but equal? A comparison of participants and data gathered via Amazon\u2019s MTurk, social media, and face-to-face behavioral testing. Computers in Human Behavior, 29(6), 2156\u20132160.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"9958_CR9","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s10796-017-9755-1","volume":"21","author":"RE Crossler","year":"2019","unstructured":"Crossler, R. E., B\u00e9langer, F., & Ormond, D. (2019). The quest for complete security: An empirical analysis of users\u2019 multi-layered protection from security threats. Information Systems Frontiers, 21(2), 343\u2013357.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9958_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/jit.2013.25","volume":"29","author":"D Cyr","year":"2014","unstructured":"Cyr, D. (2014). Return visits: A review of how web site design can engender visitor loyalty. Journal of Information Technology, 29(1), 1\u201326.","journal-title":"Journal of Information Technology"},{"issue":"1","key":"9958_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ijhcs.2009.08.005","volume":"68","author":"D Cyr","year":"2010","unstructured":"Cyr, D., Head, M., & Larios, H. (2010). Colour appeal in website design within and across cultures: A multi-method evaluation. International Journal of Human-Computer Studies, 68(1), 1\u201321.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"8","key":"9958_CR12","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1016\/j.jbusres.2007.08.005","volume":"61","author":"L Davis","year":"2008","unstructured":"Davis, L., Wang, S., & Lindridge, A. (2008). Culture influences on emotional responses to on-line store atmospheric cues. Journal of Business Research, 61(8), 806\u2013812.","journal-title":"Journal of Business Research"},{"issue":"1","key":"9958_CR13","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.cct.2003.08.013","volume":"25","author":"P Edwards","year":"2004","unstructured":"Edwards, P., Roberts, I., Sandercock, P., & Frost, C. (2004). Follow-up by mail in clinical trials: Does questionnaire length matter? Controlled Clinical Trials, 25(1), 31\u201352.","journal-title":"Controlled Clinical Trials"},{"key":"9958_CR14","unstructured":"ENISA (2014). 16 million e-identities and passwords theft. News Flash, January 22, 2014. European Union Agency for Network and Information Security. https:\/\/www.enisa.europa.eu\/media\/news-items\/news-flash-statement-re-16-million-e-identities-passwords-theft . Accessed 27 January 2019."},{"key":"9958_CR15","unstructured":"European Commission (2018). European Commission \u2013 Statement. http:\/\/europa.eu\/rapid\/press-release_STATEMENT-18-4548_en.htm . Accessed 1 November 2018."},{"key":"9958_CR16","unstructured":"Federal Office for Information Security (2018). The State of IT Security in Germany 2018. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Securitysituation\/IT-Security-Situation-in-Germany-2018.pdf?__blob=publicationFile&v=3 . Accessed 12 February 2019."},{"key":"9958_CR17","unstructured":"Fico (2017). FICO Survey: US Consumers Fear Bank Fraud and ID Theft More than Terrorist Attack. https:\/\/www.fico.com\/en\/newsroom\/fico-survey-us-consumers-fear-bank-fraud-and-id-theft-more-than-terrorist-attack-07-27-2017 . Accessed 18 January 2019."},{"issue":"1","key":"9958_CR18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39\u201350.","journal-title":"Journal of Marketing Research"},{"key":"9958_CR19","unstructured":"FTC (Federal Trade Commission) (2018). FTC Releases Annual Summary of Consumer Complaints, https:\/\/www.ftc.gov\/news-events\/press-releases\/2018\/03\/ftc-releases-annual-summary-complaints-reported-consumers . Accessed 4 January 2019."},{"key":"9958_CR20","unstructured":"Green, D., & Hanbury, M. (2018). If you shopped at these 16 stores in the last year, your data might have been stolen. Business Insider, Aug 22, 2018. https:\/\/www.businessinsider.com\/data-breaches-2018-4?r=US&IR=T . Accessed 10 December 2018."},{"issue":"1","key":"9958_CR21","first-page":"41","volume":"11","author":"B Gupta","year":"2010","unstructured":"Gupta, B., Iyer, L. S., & Weisskirch, R. S. (2010). Facilitating global e-commerce: A comparison of consumers\u2019 willingness to disclose personal information online in the US and in India. Journal of Electronic Commerce Research, 11(1), 41\u201352.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"4","key":"9958_CR22","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/0191-8869(95)00192-1","volume":"20","author":"JP Henningham","year":"1996","unstructured":"Henningham, J. P. (1996). A 12-item scale of social conservatism. Personality and Individual Differences, 20(4), 517\u2013519.","journal-title":"Personality and Individual Differences"},{"issue":"1","key":"9958_CR23","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115\u2013135.","journal-title":"Journal of the Academy of Marketing Science"},{"key":"9958_CR24","unstructured":"Herpin, T. (2018). The top 10 E-Commerce markets you should target in the world. Aug 7, 2018. E-commerce Nation (ECN). https:\/\/www.ecommerce-nation.com\/the-top-10-e-commerce-markets-you-should-target-in-the-world\/ . Accessed 5 December 2018."},{"issue":"May","key":"9958_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.intmar.2014.10.001","volume":"30","author":"P Hille","year":"2015","unstructured":"Hille, P., Walsh, G., & Cleveland, M. (2015). Consumer fear of online identity theft: Scale development and validation. Journal of Interactive Marketing, 30(May), 1\u201319.","journal-title":"Journal of Interactive Marketing"},{"issue":"5","key":"9958_CR26","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1177\/014920639502100509","volume":"21","author":"TR Hinkin","year":"1995","unstructured":"Hinkin, T. R. (1995). A review of scale development practices in the study of organizations. Journal of Management, 21(5), 967\u2013988.","journal-title":"Journal of Management"},{"issue":"3","key":"9958_CR27","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.im.2014.12.006","volume":"52","author":"O Hinz","year":"2015","unstructured":"Hinz, O., Nofer, M., Schiereck, D., & Trillig, J. (2015). The influence of data theft on the share prices and systematic risk of consumer electronics companies. Information & Management, 52(3), 337\u2013347.","journal-title":"Information & Management"},{"issue":"2","key":"9958_CR28","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s10796-015-9599-5","volume":"19","author":"SM Ho","year":"2017","unstructured":"Ho, S. M., & Warkentin, M. (2017). Leader\u2019s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19(2), 377\u2013396.","journal-title":"Information Systems Frontiers"},{"key":"9958_CR29","volume-title":"Culture\u2019s consequences: Comparing values, behaviors, institutions, and organization across nations","author":"G Hofstede","year":"2001","unstructured":"Hofstede, G. (2001). Culture\u2019s consequences: Comparing values, behaviors, institutions, and organization across nations. Thousand Oaks: Sage."},{"key":"9958_CR30","unstructured":"Hofstede, G. (2019). Hofstede Insights. https:\/\/www.hofstede-insights.com\/product\/compare-countries\/ . Accessed 1 February 2019."},{"key":"9958_CR31","unstructured":"Jevtic, A. (2015). 11 countries with the highest rates of identity theft in the world. http:\/\/www.insidermonkey.com\/blog\/11-countries-with-the-highest-rates-of-identity-theft-in-the-world-351940\/ . Accessed 26 December 2018."},{"key":"9958_CR32","unstructured":"Kulach, K. (2019). What turned ASOS online store into a global ecommerce giant? https:\/\/www.webinterpret.com\/us\/blog\/asos-online-store-global-ecommerce-success\/ . Accessed 22 September 2019."},{"issue":"2","key":"9958_CR33","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s10796-010-9253-1","volume":"14","author":"M Lee","year":"2012","unstructured":"Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375\u2013393.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9958_CR34","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1108\/09590550510581485","volume":"33","author":"G-G Lee","year":"2005","unstructured":"Lee, G.-G., & Lin, H.-F. (2005). Customer perceptions of e-service quality in online shopping. International Journal of Retail & Distribution Management, 33(2), 161\u2013176.","journal-title":"International Journal of Retail & Distribution Management"},{"key":"9958_CR35","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.elerap.2016.01.005","volume":"18","author":"WH Lin","year":"2016","unstructured":"Lin, W. H., Wang, P., & Tsai, C. F. (2016). Face recognition using support vector model classifier for user authentication. Electronic Commerce Research and Applications, 18, 71\u201382.","journal-title":"Electronic Commerce Research and Applications"},{"key":"9958_CR36","unstructured":"Littleton, C. (2017). HBO Invests Big in Europe, Asia and Latin American Channels. https:\/\/variety.com\/2017\/tv\/news\/hbo-networks-europe-asia-latin-america-1202590526\/ . Accessed 18 December 2018."},{"key":"9958_CR37","unstructured":"Macy\u2019s (2016). International Shipping, https:\/\/www.customerservice-macys.com\/app\/answers\/detail\/a_id\/5361\/~\/how-can-i-get-more-information-about-international-orders%3F . Accessed 9 February 2019."},{"key":"9958_CR38","unstructured":"Madden, M. (2014). More online Americans say they\u2019ve experienced a personal data breach. PewReseachCenter, http:\/\/www.pewresearch.org\/fact-tank\/2014\/04\/14\/more-online-americans-say-theyve-experienced-a-personal-data-breach\/ . Accessed 4 January 2019."},{"issue":"4","key":"9958_CR39","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"key":"9958_CR40","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11747-016-0495-4","volume":"45","author":"KD Martin","year":"2017","unstructured":"Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45, 135\u2013155.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"1","key":"9958_CR41","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1509\/jm.15.0497","volume":"81","author":"KD Martin","year":"2017","unstructured":"Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36\u201358.","journal-title":"Journal of Marketing"},{"issue":"4","key":"9958_CR42","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/BF00992972","volume":"16","author":"D Matsumoto","year":"1992","unstructured":"Matsumoto, D. (1992). More evidence for the universality of a contempt expression. Motivation & Emotion, 16(4), 363\u2013368.","journal-title":"Motivation & Emotion"},{"issue":"3","key":"9958_CR43","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.jbusres.2013.05.011","volume":"67","author":"E Mazaheri","year":"2014","unstructured":"Mazaheri, E., Richard, M. O., Laroche, M., & Ueltschy, L. C. (2014). The influence of culture, emotions, intangibility, and atmospheric cues on online behavior. Journal of Business Research, 67(3), 253\u2013259.","journal-title":"Journal of Business Research"},{"issue":"5","key":"9958_CR44","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1017\/S1930297500000395","volume":"3","author":"GY Nenkov","year":"2008","unstructured":"Nenkov, G. Y., Morrin, M., Schwartz, B., Ward, A., & Hulland, J. (2008). A short form of the maximization scale: Factor structure, reliability and validity studies. Judgment and Decision making, 3(5), 371\u2013388.","journal-title":"Judgment and Decision making"},{"key":"9958_CR45","unstructured":"Pascual, A., Marchini, K., & Miller, S. (2018). 2018 Identity Fraud: Fraud Enters a New Era of Complexity, https:\/\/www.javelinstrategy.com\/coverage-area\/2018-identity-fraud-fraud-enters-new-era-complexity . Accessed 12 February 2019."},{"issue":"4","key":"9958_CR46","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1111\/bjso.12006","volume":"52","author":"T Postmes","year":"2013","unstructured":"Postmes, T., Haslam, S. A., & Jans, L. (2013). A single-item measure of social identification: Reliability, validity, and utility. British Journal of Social Psychology, 52(4), 597\u2013617.","journal-title":"British Journal of Social Psychology"},{"key":"9958_CR47","unstructured":"Rigby, C. (2019). Gear4Music to improve its distribution processes as it looks to deal with its fast growth. Internet Retailing, https:\/\/internetretailing.net\/strategy-and-innovation\/strategy-and-innovation\/gear4music-to-improve-its-distribution-processes-as-it-looks-to-deal-with-its-fast-growth-19384 . Accessed 8 September 2019."},{"issue":"2","key":"9958_CR48","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s12525-013-0145-3","volume":"24","author":"IP Riquelme","year":"2014","unstructured":"Riquelme, I. P., & Rom\u00e1n, S. (2014). Is the influence of privacy and security on online trust the same for all type of consumers? Electronic Markets, 24(2), 135\u2013149.","journal-title":"Electronic Markets"},{"issue":"3","key":"9958_CR49","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1080\/13218719.2012.672275","volume":"20","author":"LD Roberts","year":"2013","unstructured":"Roberts, L. D., Indermaur, D., & Spiranovic, C. (2013). Fear of cyber-identity theft and related fraudulent activity. Psychiatry, Psychology and Law, 20(3), 315\u2013328.","journal-title":"Psychiatry, Psychology and Law"},{"issue":"1","key":"9958_CR50","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1108\/02651330810851872","volume":"25","author":"A Ruvio","year":"2008","unstructured":"Ruvio, A., Shoham, A., & Makovec Brencic, M. (2008). Consumers\u2019 need for uniqueness: Short-form scale development and cross-cultural validation. International Marketing Review, 25(1), 33\u201353.","journal-title":"International Marketing Review"},{"issue":"1","key":"9958_CR51","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1037\/1040-3590.12.1.102","volume":"12","author":"GT Smith","year":"2000","unstructured":"Smith, G. T., McCarthy, D. M., & Anderson, K. G. (2000). On the sins of short-form development. Psychological Assessment, 12(1), 102\u2013111.","journal-title":"Psychological Assessment"},{"issue":"3","key":"9958_CR52","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.jbusres.2011.08.013","volume":"66","author":"R Smith","year":"2013","unstructured":"Smith, R., Deitz, G., Royne, M. B., Hansen, J. D., Gr\u00fcnhagen, M., & Witte, C. (2013). Cross-cultural examination of online shopping behavior: A comparison of Norway, Germany, and the United States. Journal of Business Research, 66(3), 328\u2013335.","journal-title":"Journal of Business Research"},{"issue":"4","key":"9958_CR53","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1037\/0021-9010.90.4.603","volume":"90","author":"GK Stahl","year":"2005","unstructured":"Stahl, G. K., & Caligiuri, P. (2005). The effectiveness of expatriate coping strategies: The moderating role of cultural distance, position level, and time on the international assignment. Journal of Applied Psychology, 90(4), 603\u2013615.","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"9958_CR54","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1086\/209528","volume":"25","author":"JBE Steenkamp","year":"1998","unstructured":"Steenkamp, J. B. E., & Baumgartner, H. (1998). Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research, 25(1), 78\u2013107.","journal-title":"Journal of Consumer Research"},{"issue":"3","key":"9958_CR55","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1111\/j.1470-6431.2010.00938.x","volume":"35","author":"T Sun","year":"2011","unstructured":"Sun, T. (2011). The roles of trust and experience in consumer confidence in conducting e-commerce: A cross-cultural comparison between France and Germany. International Journal of Consumer Studies, 35(3), 330\u2013337.","journal-title":"International Journal of Consumer Studies"},{"key":"9958_CR56","unstructured":"Targett, E. (2018). 6 Months, 945 Data Breaches, 4.5 Billion Records, Computer Business Review, https:\/\/www.cbronline.com\/news\/global-data-breaches-2018. Accessed 16 September 2019 ."},{"key":"9958_CR57","unstructured":"The Japan Times (2013). Yahoo Japan suspects vast ID theft, May 18, http:\/\/www.japantimes.co.jp\/news\/2013\/05\/18\/national\/crime-legal\/yahoo-japan-suspects-vast-id-theft\/ . Accessed 22 January 2016."},{"key":"9958_CR58","unstructured":"The Japan Times (2016). At least 2 million sets of personal data feared stolen in 2015 cyberattacks. January 4, http:\/\/www.japantimes.co.jp\/news\/2016\/01\/04\/national\/least-2-million-sets-personal-data-feared-leaked-cyberattacks-2015\/ . Accessed 22 November 2018."},{"key":"9958_CR59","unstructured":"The Japan Times (2018). 320,000 pieces of customer data stolen from 400 lodging providers in Japan. June 28, https:\/\/www.japantimes.co.jp\/news\/2018\/06\/28\/national\/crime-legal\/320000-bits-customer-info-lodging-providers-japan-stolen\/#.XGK8pHd2t2M . Accessed 12 February 2019."},{"issue":"2","key":"9958_CR60","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254\u2013268.","journal-title":"Information Systems Research"},{"issue":"3","key":"9958_CR61","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1177\/0092070304270996","volume":"34","author":"S Van Auken","year":"2006","unstructured":"Van Auken, S., Barry, T. E., & Bagozzi, R. P. (2006). A cross-country construct validation of cognitive age. Journal of the Academy of Marketing Science, 34(3), 439\u2013455.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"7","key":"9958_CR62","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1108\/JPBM-12-2014-0772","volume":"24","author":"M Vernuccio","year":"2015","unstructured":"Vernuccio, M., Pagani, M., Barbarossa, C., & Pastore, A. (2015). Antecedents of brand love in online network-based communities. A social identity perspective. Journal of Product & Brand Management, 24(7), 706\u2013719.","journal-title":"Journal of Product & Brand Management"},{"issue":"10","key":"9958_CR63","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1016\/j.jbusres.2007.11.018","volume":"62","author":"G Walsh","year":"2009","unstructured":"Walsh, G., Beatty, S. E., & Shiu, E. M. (2009). The customer-based corporate reputation scale: Replication and short form. Journal of Business Research, 62(10), 924\u2013930.","journal-title":"Journal of Business Research"},{"issue":"3","key":"9958_CR64","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1016\/j.jbusres.2014.09.013","volume":"68","author":"G Walsh","year":"2015","unstructured":"Walsh, G., Northington, W. M., Hille, P., & Dose, D. (2015). Service employees\u2019 willingness to report complaints scale: Cross-country application and replication. Journal of Business Research, 68(3), 500\u2013506.","journal-title":"Journal of Business Research"},{"key":"9958_CR65","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.intmar.2016.05.001","volume":"36","author":"G Walsh","year":"2016","unstructured":"Walsh, G., Schaarschmidt, M., & Von Kortzfleisch, H. (2016). Employees\u2019 company reputation-related social media competence: Scale development and validation. Journal of Interactive Marketing, 36, 46\u201359.","journal-title":"Journal of Interactive Marketing"},{"issue":"1","key":"9958_CR66","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.ijresmar.2008.09.003","volume":"26","author":"B Weijters","year":"2009","unstructured":"Weijters, B., Geuens, M., & Schillewaert, N. (2009). The proximity effect: The role of inter-item distance on reverse-item bias. International Journal of Research in Marketing, 26(1), 2\u201312.","journal-title":"International Journal of Research in Marketing"},{"issue":"2","key":"9958_CR67","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1177\/1094670509335772","volume":"12","author":"J Wirtz","year":"2009","unstructured":"Wirtz, J., & Lwin, M. O. (2009). Regulatory focus theory, trust, and privacy concern. Journal of Service Research, 12(2), 190\u2013207.","journal-title":"Journal of Service Research"},{"issue":"2\u20133","key":"9958_CR68","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s12525-009-0012-4","volume":"19","author":"H Xu","year":"2009","unstructured":"Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential and experienced customers\u2019 adoption of location-based services. Electronic Markets, 19(2\u20133), 137\u2013149.","journal-title":"Electronic Markets"},{"issue":"5","key":"9958_CR69","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1007\/s10796-017-9807-6","volume":"21","author":"F Xu","year":"2019","unstructured":"Xu, F., Luo, X. R., Zhang, H., Liu, S., & Huang, W. W. (2019). Do strategy and timing in IT security investments matter? An empirical investigation of the alignment effect. Information Systems Frontiers, 21(5), 1069\u20131083.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9958_CR70","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4018\/irmj.2012010102","volume":"25","author":"H Zafar","year":"2012","unstructured":"Zafar, H., Ko, M., & Osei-Bryson, K. (2012). Financial impact of information security breaches on breached firms and their non-breached competitors. Information Resources Management Journal, 25(1), 21\u201337.","journal-title":"Information Resources Management Journal"},{"issue":"6","key":"9958_CR71","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1007\/s10796-015-9562-5","volume":"18","author":"H Zafar","year":"2016","unstructured":"Zafar, H., Ko, M. S., & Osei-Bryson, K. M. (2016). The value of the CIO in the top management team on performance in the case of information security breaches. Information Systems Frontiers, 18(6), 1205\u20131215.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"9958_CR72","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1027\/1614-0001\/a000148","volume":"35","author":"M Ziegler","year":"2014","unstructured":"Ziegler, M., Kemper, C. J., & Kruyen, P. (2014). Short scales \u2013 Five misunderstandings and ways to overcome them. Journal of Individual Differences, 35(4), 185\u2013189.","journal-title":"Journal of Individual Differences"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-019-09958-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-019-09958-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-019-09958-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T10:48:40Z","timestamp":1695379720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-019-09958-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,1]]},"references-count":72,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9958"],"URL":"https:\/\/doi.org\/10.1007\/s10796-019-09958-2","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,1]]},"assertion":[{"value":"1 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}