{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T16:18:39Z","timestamp":1764260319802},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10796-023-10420-7","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T11:02:12Z","timestamp":1689591732000},"page":"1435-1451","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Is Contact Tracing for Pandemic Relief or Privacy Menace?: a Lens of Dual-Calculus Decision"],"prefix":"10.1007","volume":"26","author":[{"given":"Eunji","family":"Lee","sequence":"first","affiliation":[]},{"given":"Chul Woo","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Jahyun","family":"Goo","sequence":"additional","affiliation":[]},{"given":"Kichan","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Chulmo","family":"Koo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"issue":"3","key":"10420_CR1","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1093\/her\/12.3.363","volume":"12","author":"H Aarts","year":"1997","unstructured":"Aarts, H., Paulussen, T., & Schaalma, H. (1997). Physical exercise habit: On the conceptualization and formation of habitual health behaviours. Health Education Research, 12(3), 363\u2013374.","journal-title":"Health Education Research"},{"key":"10420_CR2","doi-asserted-by":"crossref","first-page":"102473","DOI":"10.1016\/j.ijinfomgt.2022.102473","volume":"64","author":"O Abramova","year":"2022","unstructured":"Abramova, O., Wagner, A., Olt, C. M., & Buxmann, P. (2022). One for all, all for one: Social considerations in user acceptance of contact tracing apps using longitudinal evidence from Germany and Switzerland. International Journal of Information Management, 64, 102473.","journal-title":"International Journal of Information Management"},{"issue":"6221","key":"10420_CR3","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509\u2013514.","journal-title":"Science"},{"key":"10420_CR4","doi-asserted-by":"crossref","first-page":"171325","DOI":"10.1109\/ACCESS.2020.3025971","volume":"8","author":"NY Ahn","year":"2020","unstructured":"Ahn, N. Y., Park, J. E., Lee, D. H., & Hong, P. C. (2020). Balancing personal privacy and public safety during COVID-19: The case of South Korea. Ieee Access, 8, 171325\u2013171333.","journal-title":"Ieee Access"},{"issue":"12","key":"10420_CR5","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1016\/j.sapharm.2019.01.012","volume":"15","author":"KJ Aikin","year":"2019","unstructured":"Aikin, K. J., Betts, K. R., Ziemer, K. S., & Keisler, A. (2019). Consumer tradeoff of advertising claim versus efficacy information in direct-to-consumer prescription drug ads. Research in Social & Administrative Pharmacy, 15(12), 1484\u20131488.","journal-title":"Research in Social & Administrative Pharmacy"},{"issue":"1","key":"10420_CR6","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"NF Awad","year":"2006","unstructured":"Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13\u201328.","journal-title":"MIS Quarterly"},{"issue":"1","key":"10420_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.im.2015.08.001","volume":"53","author":"G Bansal","year":"2016","unstructured":"Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1\u201321.","journal-title":"Information & Management"},{"key":"10420_CR8","volume-title":"Dynamic Marketing for a Changing World","author":"RA Bauer","year":"1960","unstructured":"Bauer, R. A. (1960). Consumer behavior as risk taking. In R. L. Hancock (Ed.), Dynamic Marketing for a Changing World. American Marketing Association."},{"key":"10420_CR9","doi-asserted-by":"crossref","unstructured":"Bhatt, P., Vemprala, N., Valecha, R., Hariharan, G., & Rao, H. R. (2022). User privacy, surveillance and public health during COVID-19\u2013an examination of Twitterverse. Information Systems Frontiers, 1\u201316.","DOI":"10.1007\/s10796-022-10247-8"},{"key":"10420_CR10","doi-asserted-by":"crossref","first-page":"102766","DOI":"10.1016\/j.ijhm.2020.102766","volume":"93","author":"MG Brizek","year":"2021","unstructured":"Brizek, M. G., Frash, R. E., McLeod, B. M., & Patience, M. O. (2021). Independent restaurant operator perspectives in the wake of the COVID-19 pandemic. International Journal of Hospitality Management, 93, 102766.","journal-title":"International Journal of Hospitality Management"},{"issue":"1","key":"10420_CR11","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1177\/0743915620929999","volume":"40","author":"AR Brough","year":"2021","unstructured":"Brough, A. R., & Martin, K. D. (2021). Consumer privacy during (and after) the COVID-19 pandemic. Journal of Public Policy & Marketing, 40(1), 108\u2013110.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"3","key":"10420_CR12","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523\u2013548.","journal-title":"MIS Quarterly"},{"key":"10420_CR13","doi-asserted-by":"crossref","unstructured":"Carlsson Hauff, J., & Nilsson, J. (2021). Individual costs and societal benefits: The privacy calculus of contact-tracing apps. Journal of Consumer Marketing.","DOI":"10.1108\/JCM-03-2021-4559"},{"key":"10420_CR14","doi-asserted-by":"crossref","first-page":"106718","DOI":"10.1016\/j.chb.2021.106718","volume":"119","author":"EY Chan","year":"2021","unstructured":"Chan, E. Y., & Saqib, N. U. (2021). Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high. Comput Human Behav, 119, 106718.","journal-title":"Comput Human Behav"},{"key":"10420_CR15","first-page":"777","volume":"1","author":"L Chen","year":"2017","unstructured":"Chen, L., Zarifis, A., & Kroenung, J. (2017). The role of trust in personal information disclosure on health-related websites. Proceedings of the European Conference on Information Systems (ECIS), 1, 777\u2013786.","journal-title":"Proceedings of the European Conference on Information Systems (ECIS)"},{"key":"10420_CR16","volume-title":"Bootstrap cross-validation indices for PLS path model assessment. Handbook of partial least squares","author":"WW Chin","year":"2010","unstructured":"Chin, W. W. (2010). Bootstrap cross-validation indices for PLS path model assessment. Handbook of partial least squares. Springer Handbooks of Computational Statistics."},{"issue":"1","key":"10420_CR17","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1037\/0033-2909.112.1.155","volume":"112","author":"J Cohen","year":"1992","unstructured":"Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155\u2013159.","journal-title":"Psychological Bulletin"},{"issue":"1","key":"10420_CR18","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104\u2013115.","journal-title":"Organization Science"},{"issue":"2","key":"10420_CR19","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/1540-4560.00067","volume":"59","author":"MJ Culnan","year":"2003","unstructured":"Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323\u2013342.","journal-title":"Journal of Social Issues"},{"issue":"6","key":"10420_CR20","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1111\/risa.13457","volume":"40","author":"JIM de Groot","year":"2020","unstructured":"de Groot, J. I. M., Schweiger, E., & Schubert, I. (2020). Social influence, risk and benefit perceptions, and the acceptability of risky energy technologies: An explanatory model of nuclear power versus shale gas. Risk Analysis, 40(6), 1226\u20131243.","journal-title":"Risk Analysis"},{"issue":"1","key":"10420_CR21","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/s12529-008-9008-2","volume":"16","author":"O De Zwart","year":"2009","unstructured":"De Zwart, O., Veldhuijzen, I. K., Elam, G., Aro, A. R., Abraham, T., Bishop, G. D., Voeten, H. A., Richardus, J. H., & Brug, J. (2009). Perceived threat, risk perception, and efficacy beliefs related to SARS and other (emerging) infectious diseases: Results of an international survey. International Journal of Behavioral Medicine, 16(1), 30\u201340.","journal-title":"International Journal of Behavioral Medicine"},{"issue":"1","key":"10420_CR22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). An extended privacy Calculus model for E-commerce transactions. Information Systems Research, 17(1), 61\u201380.","journal-title":"Information Systems Research"},{"key":"10420_CR23","volume-title":"Advances in healthcare informatics and analytics. Annals of information systems, 19","author":"T Dinev","year":"2016","unstructured":"Dinev, T., Albano, V., Xu, H., D\u2019Atri, A., & Hart, P. (2016). Individuals\u2019 attitudes towards electronic health records: A privacy Calculus perspective. In A. Gupta, V. Patel, & R. Greenes (Eds.), Advances in healthcare informatics and analytics. Annals of information systems, 19. Springer."},{"key":"10420_CR24","doi-asserted-by":"crossref","first-page":"122217","DOI":"10.1016\/j.techfore.2022.122217","volume":"187","author":"MD Dzandu","year":"2023","unstructured":"Dzandu, M. D. (2023). Antecedent, behaviour, and consequence (abc) of deploying the contact tracing app in response to COVID-19: Evidence from Europe. Technological Forecasting and Social Change, 187, 122217.","journal-title":"Technological Forecasting and Social Change"},{"key":"10420_CR25","unstructured":"Evermann, J., & Tate, M. (2012). Comparing the predictive ability of PLS and covariance analysis. Proceedings of the 33rd international conference on information systems (Orlando, FL)."},{"key":"10420_CR26","doi-asserted-by":"crossref","first-page":"102181","DOI":"10.1016\/j.ijinfomgt.2020.102181","volume":"55","author":"RA Fahey","year":"2020","unstructured":"Fahey, R. A., & Hino, A. (2020). COVID-19, digital privacy, and the social limits on data-focused public health responses. International Journal of Information Management, 55, 102181.","journal-title":"International Journal of Information Management"},{"key":"10420_CR27","doi-asserted-by":"crossref","first-page":"101717","DOI":"10.1016\/j.tele.2021.101717","volume":"65","author":"T Fernandes","year":"2021","unstructured":"Fernandes, T., & Pereira, N. (2021). Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online? Telematics and Informatics, 65, 101717.","journal-title":"Telematics and Informatics"},{"issue":"7","key":"10420_CR28","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1002\/asi.24602","volume":"73","author":"G Fox","year":"2022","unstructured":"Fox, G., van der Werff, L., Rosati, P., Takako Endo, P., & Lynn, T. (2022). Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective. Journal of the Association for Information Science and Technology, 73(7), 944\u2013967.","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"6","key":"10420_CR29","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/0191-8869(94)90048-5","volume":"17","author":"MH Freeston","year":"1994","unstructured":"Freeston, M. H., Rh\u00e9aume, J., Letarte, H., Dugas, M. J., & Ladouceur, R. (1994). Why do people worry? Personality and Individual Differences, 17(6), 791\u2013802.","journal-title":"Personality and Individual Differences"},{"issue":"8","key":"10420_CR30","doi-asserted-by":"crossref","first-page":"e425","DOI":"10.1016\/S2589-7500(20)30137-0","volume":"2","author":"U Gasser","year":"2020","unstructured":"Gasser, U., Ienca, M., Scheibner, J., Sleigh, J., & Vayena, E. (2020). Digital tools against COVID-19: Taxonomy, ethical challenges, and navigation aid. The Lancet Digital Health, 2(8), e425\u2013e434.","journal-title":"The Lancet Digital Health"},{"key":"10420_CR31","doi-asserted-by":"crossref","unstructured":"Goldberg, I., Wagner, D., & Brewer, E. (1997). Privacy-enhancing technologies for the internet. Proceedings IEEE COMPCON 97. Digest of Papers, 103\u2013109.","DOI":"10.21236\/ADA385546"},{"key":"10420_CR32","doi-asserted-by":"crossref","DOI":"10.4159\/9780674037878","volume-title":"Risk vs. risk: Tradeoffs in protecting health and the environment","author":"JD Graham","year":"1995","unstructured":"Graham, J. D., Wiener, J. B., & Sunstein, C. R. (1995). Risk vs. risk: Tradeoffs in protecting health and the environment. Harvard university press."},{"issue":"2","key":"10420_CR33","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","volume":"26","author":"JF Hair Jr","year":"2014","unstructured":"Hair, J. F., Jr., Sarstedt, M., Hopkins, L., & Kuppelwieser, V. G. (2014). Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research. European Business Review, 26(2), 106\u2013121.","journal-title":"European Business Review"},{"issue":"4","key":"10420_CR34","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.jinf.2020.02.010","volume":"80","author":"Q Han","year":"2020","unstructured":"Han, Q., Lin, Q., Jin, S., & You, L. (2020). Coronavirus 2019-nCoV: A brief perspective from the front line. Journal of Infection, 80(4), 373\u2013377.","journal-title":"Journal of Infection"},{"issue":"4","key":"10420_CR35","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1080\/13669870802124413","volume":"11","author":"SF Hansen","year":"2008","unstructured":"Hansen, S. F., & Tickner, J. A. (2008). Putting risk-risk tradeoffs in perspective: A response to Graham and Wiener. Journal of Risk Research, 11(4), 475\u2013483.","journal-title":"Journal of Risk Research"},{"issue":"3","key":"10420_CR36","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1080\/14494035.2020.1783791","volume":"39","author":"K Hartley","year":"2020","unstructured":"Hartley, K., & Jarvis, D. S. (2020). Policymaking in a low-trust state: Legitimacy, state capacity, and responses to COVID-19 in Hong Kong. Policy and Society, 39(3), 403\u2013423.","journal-title":"Policy and Society"},{"issue":"3","key":"10420_CR37","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1093\/jamia\/ocaa240","volume":"28","author":"F Hassandoust","year":"2021","unstructured":"Hassandoust, F., Akhlaghpour, S., & Johnston, A. C. (2021). Individuals\u2019 privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective. Journal of the American Medical Informatics Association, 28(3), 463\u2013471.","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"8","key":"10420_CR38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/000276426100400802","volume":"4","author":"GC Homans","year":"1961","unstructured":"Homans, G. C. (1961). The humanities and the social sciences. American Behavioral Scientist, 4(8), 3\u20136.","journal-title":"American Behavioral Scientist"},{"issue":"3","key":"10420_CR39","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s10551-019-04237-1","volume":"168","author":"W Hong","year":"2019","unstructured":"Hong, W., Chan, F. K. Y., & Thong, J. Y. L. (2019). Drivers and inhibitors of internet privacy concern: A multidimensional development theory perspective. Journal of Business Ethics, 168(3), 539\u2013564.","journal-title":"Journal of Business Ethics"},{"issue":"6","key":"10420_CR40","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1037\/a0017423","volume":"97","author":"EJ Horberg","year":"2009","unstructured":"Horberg, E. J., Oveis, C., Keltner, D., & Cohen, A. B. (2009). Disgust and the moralization of purity. Journal of Personality and Social Psychology, 97(6), 963\u2013976.","journal-title":"Journal of Personality and Social Psychology"},{"key":"10420_CR41","first-page":"382","volume-title":"Proceedings of the third annual conference of the Association for Consumer Research","author":"J Jacoby","year":"1972","unstructured":"Jacoby, J., & Kaplan, L. B. (1972). The components of perceived risk. In M. Venkatesan (Ed.), Proceedings of the third annual conference of the Association for Consumer Research (pp. 382\u2013393). Association for Consumer Research."},{"key":"10420_CR42","doi-asserted-by":"crossref","first-page":"305","DOI":"10.3389\/fpubh.2020.00305","volume":"8","author":"G Jung","year":"2020","unstructured":"Jung, G., Lee, H., Kim, A., & Lee, U. (2020). Too much information: Assessing privacy risks of contact trace data disclosure on people with COVID-19 in South Korea. Frontiers in Public Health, 8, 305.","journal-title":"Frontiers in Public Health"},{"issue":"2","key":"10420_CR43","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1108\/IJCHM-12-2017-0783","volume":"31","author":"J-W Kang","year":"2019","unstructured":"Kang, J.-W., & Namkung, Y. (2019). The role of personalization on continuance intention in food service mobile apps: A privacy calculus perspective. International Journal of Contemporary Hospitality Management., 31(2), 734\u2013752.","journal-title":"International Journal of Contemporary Hospitality Management."},{"key":"10420_CR44","unstructured":"Kim, M. J., & Denyer, S., 2020. A \u2018travel log\u2019of the times in South Korea: Mapping the movements of coronavirus carriers. The Washington Post. March 13 Retrieved from: https:\/\/www.washingtonpost.com\/world\/asia_pacific\/coronavirus-south-korea-tracking-apps\/2020\/03\/13\/2bed568e-5fac-11ea-ac50-18701e14e06d_story.html"},{"key":"10420_CR45","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.chb.2018.11.022","volume":"92","author":"D Kim","year":"2019","unstructured":"Kim, D., Park, K., Park, Y., & Ahn, J.-H. (2019). Willingness to provide personal information: Perspective of privacy calculus in IoT services. Computers in Human Behavior, 92, 273\u2013281.","journal-title":"Computers in Human Behavior"},{"key":"10420_CR46","doi-asserted-by":"crossref","first-page":"102752","DOI":"10.1016\/j.ijhm.2020.102752","volume":"92","author":"J Kim","year":"2021","unstructured":"Kim, J., Kim, J., & Wang, Y. (2021). Uncertainty risks and strategic reaction of restaurant firms amid COVID-19: Evidence from China. International Journal of Hospitality Management, 92, 102752.","journal-title":"International Journal of Hospitality Management"},{"issue":"3","key":"10420_CR47","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"RS Laufer","year":"1977","unstructured":"Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22\u201342.","journal-title":"Journal of Social Issues"},{"issue":"1","key":"10420_CR48","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s12529-008-9002-8","volume":"16","author":"A Leppin","year":"2009","unstructured":"Leppin, A., & Aro, A. R. (2009). Risk perceptions related to SARS and avian influenza: Theoretical foundations of current empirical research. International Journal of Behavioral Medicine, 16(1), 7\u201329.","journal-title":"International Journal of Behavioral Medicine"},{"issue":"1","key":"10420_CR49","doi-asserted-by":"crossref","first-page":"102128","DOI":"10.1016\/j.ipm.2019.102128","volume":"57","author":"K Li","year":"2020","unstructured":"Li, K., Cheng, L., & Teng, C. I. (2020). Voluntary sharing and mandatory provision: Private information disclosure on social networking sites. Information Processing & Management, 57(1), 102128.","journal-title":"Information Processing & Management"},{"issue":"1","key":"10420_CR50","doi-asserted-by":"crossref","first-page":"01","DOI":"10.1093\/polsoc\/puab018","volume":"41","author":"VQ Li","year":"2022","unstructured":"Li, V. Q., Ma, L., & Wu, X. (2022). COVID-19, policy change, and post-pandemic data governance: A case analysis of contact tracing applications in East Asia. Policy and Society, 41(1), 01\u201314.","journal-title":"Policy and Society"},{"key":"10420_CR51","first-page":"1","volume":"1","author":"MF Luce","year":"2001","unstructured":"Luce, M. F., Bettman, J. R., & Payne, J. W. (2001). Emotional decisions: Tradeoff difficulty and coping in consumer choice. Monographs of the Journal of Consumer Research, 1, 1\u2013209.","journal-title":"Monographs of the Journal of Consumer Research"},{"key":"10420_CR52","doi-asserted-by":"crossref","first-page":"106928","DOI":"10.1016\/j.chb.2021.106928","volume":"124","author":"X Ma","year":"2021","unstructured":"Ma, X., Qin, Y., Chen, Z., & Cho, H. (2021). Perceived ephemerality, privacy calculus, and the privacy settings of an ephemeral social media site. Computers in Human Behavior, 124, 106928.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10420_CR53","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10865-021-00202-4","volume":"44","author":"RE Magnan","year":"2021","unstructured":"Magnan, R. E., Gibson, L. P., & Bryan, A. D. (2021). Cognitive and affective risk beliefs and their association with protective health behavior in response to the novel health threat of COVID-19. Journal of Behavioral Medicine, 44(3), 285\u2013295.","journal-title":"Journal of Behavioral Medicine"},{"issue":"4","key":"10420_CR54","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1177\/109019817400200404","volume":"2","author":"LA Maiman","year":"1974","unstructured":"Maiman, L. A., & Becker, M. H. (1974). The health belief model: Origins and correlates in psychological theory. Health Education Monographs, 2(4), 336\u2013353.","journal-title":"Health Education Monographs"},{"issue":"4","key":"10420_CR55","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"key":"10420_CR56","doi-asserted-by":"crossref","first-page":"120656","DOI":"10.1016\/j.techfore.2021.120656","volume":"166","author":"A Margherita","year":"2021","unstructured":"Margherita, A., Elia, G., & Klein, M. (2021). Managing the COVID-19 emergency: A coordination framework to enhance response practices and actions. Technological Forecasting and Social Change, 166, 120656.","journal-title":"Technological Forecasting and Social Change"},{"issue":"1","key":"10420_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jeco.2006010101","volume":"4","author":"DB Meinert","year":"2006","unstructured":"Meinert, D. B., Peterson, D. K., Criswell, J. R., & Crossland, M. D. (2006). Privacy policy statements and consumer willingness to provide personal information. Journal of Electronic Commerce in Organizations (JECO), 4(1), 1\u201317.","journal-title":"Journal of Electronic Commerce in Organizations (JECO)"},{"issue":"3","key":"10420_CR58","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1177\/0093650206287076","volume":"33","author":"MJ Metzger","year":"2006","unstructured":"Metzger, M. J. (2006). Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Communication Research, 33(3), 155\u2013179.","journal-title":"Communication Research"},{"key":"10420_CR59","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.ijhm.2015.03.008","volume":"47","author":"C Morosan","year":"2015","unstructured":"Morosan, C., & DeFranco, A. (2015). Disclosing personal information via hotel apps: A privacy calculus perspective. International Journal of Hospitality Management, 47, 120\u2013130.","journal-title":"International Journal of Hospitality Management"},{"issue":"2","key":"10420_CR60","doi-asserted-by":"crossref","first-page":"7","DOI":"10.18775\/ijmsba.1849-5664-5419.2014.62.1001","volume":"6","author":"AAN Nasser","year":"2020","unstructured":"Nasser, A. A. N., & Nasser, A. A. N. (2020). Impacts of Trust in Government and Privacy Risk Concern on willingness to provide personal information in Saudi Arabia. International Journal of Management Science and Business Administration, 6(2), 7\u201318.","journal-title":"International Journal of Management Science and Business Administration"},{"issue":"7","key":"10420_CR61","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1177\/0047287516675062","volume":"56","author":"S Park","year":"2017","unstructured":"Park, S., & Tussyadiah, I. P. (2017). Multidimensional facets of perceived risk in mobile travel booking. Journal of Travel Research, 56(7), 854\u2013867.","journal-title":"Journal of Travel Research"},{"issue":"7","key":"10420_CR62","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1136\/medethics-2020-106314","volume":"46","author":"MJ Parker","year":"2020","unstructured":"Parker, M. J., Fraser, C., Abeler-D\u00f6rner, L., & Bonsall, D. (2020). Ethics of instantaneous contact tracing using mobile phone apps in the control of the COVID-19 pandemic. Journal of Medical Ethics, 46(7), 427\u2013431.","journal-title":"Journal of Medical Ethics"},{"key":"10420_CR63","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.ijid.2020.07.074","volume":"99","author":"YT Prasetyo","year":"2020","unstructured":"Prasetyo, Y. T., Castillo, A. M., Salonga, L. J., Sia, J. A., & Seneta, J. A. (2020). Factors affecting perceived effectiveness of COVID-19 prevention measures among Filipinos during enhanced community quarantine in Luzon, Philippines: Integrating protection motivation theory and extended theory of planned behavior. International Journal of Infectious Diseases, 99, 312\u2013323.","journal-title":"International Journal of Infectious Diseases"},{"key":"10420_CR64","doi-asserted-by":"crossref","first-page":"120681","DOI":"10.1016\/j.techfore.2021.120681","volume":"167","author":"S Ribeiro-Navarrete","year":"2021","unstructured":"Ribeiro-Navarrete, S., Saura, J. R., & Palacios-Marqu\u00e9s, D. (2021). Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technological Forecasting and Social Change, 167, 120681.","journal-title":"Technological Forecasting and Social Change"},{"issue":"1","key":"10420_CR65","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93\u2013114.","journal-title":"The Journal of Psychology"},{"issue":"1","key":"10420_CR66","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1177\/002224297103500110","volume":"35","author":"T Roselius","year":"1971","unstructured":"Roselius, T. (1971). Consumer rankings of risk reduction methods. Journal of Marketing, 35(1), 56\u201361.","journal-title":"Journal of Marketing"},{"issue":"4","key":"10420_CR67","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1177\/009207002236917","volume":"30","author":"RT Rust","year":"2002","unstructured":"Rust, R. T., Kannan, P., & Peng, N. (2002). The customer economics of internet privacy. Journal of the Academy of Marketing Science, 30(4), 455\u2013464.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"5","key":"10420_CR68","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1016\/j.jhealeco.2010.05.001","volume":"29","author":"JP Shimshack","year":"2010","unstructured":"Shimshack, J. P., & Ward, M. B. (2010). Mercury advisories and household health trade-offs. Journal of Health Economics, 29(5), 674\u2013685.","journal-title":"Journal of Health Economics"},{"issue":"10","key":"10420_CR69","doi-asserted-by":"crossref","first-page":"4552","DOI":"10.1016\/j.jbusres.2016.03.049","volume":"69","author":"G Shmueli","year":"2016","unstructured":"Shmueli, G., Ray, S., Estrada, J. M. V., & Chatla, S. B. (2016). The elephant in the room: Predictive performance of PLS models. Journal of business Research, 69(10), 4552\u20134564.","journal-title":"Journal of business Research"},{"issue":"4","key":"10420_CR70","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989\u20131015.","journal-title":"MIS Quarterly"},{"key":"10420_CR71","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove, D. J. (2007). I've got nothing to hide and other misunderstandings of privacy. San Diego Law Review, 44, 745.","journal-title":"San Diego Law Review"},{"key":"10420_CR72","doi-asserted-by":"crossref","first-page":"102702","DOI":"10.1016\/j.ijhm.2020.102702","volume":"92","author":"HJ Song","year":"2021","unstructured":"Song, H. J., Yeon, J., & Lee, S. (2021). Impact of the COVID-19 pandemic: Evidence from the US restaurant industry. International Journal of Hospitality Management, 92, 102702.","journal-title":"International Journal of Hospitality Management"},{"key":"10420_CR73","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1108\/IJPCC-06-2020-0069","volume":"16","author":"CC Sreelakshmi","year":"2020","unstructured":"Sreelakshmi, C. C., & Prathap, S. K. (2020). Continuance adoption of mobile-based payments in Covid-19 context: An integrated framework of health belief model and expectation confirmation model. International Journal of Pervasive Computing and Communications., 16, 351\u2013369.","journal-title":"International Journal of Pervasive Computing and Communications."},{"key":"10420_CR74","doi-asserted-by":"crossref","first-page":"101755","DOI":"10.1016\/j.techsoc.2021.101755","volume":"67","author":"CD Tran","year":"2021","unstructured":"Tran, C. D., & Nguyen, T. T. (2021). Health vs. privacy? The risk-risk tradeoff in using COVID-19 contact-tracing apps. Technology in Society, 67, 101755.","journal-title":"Technology in Society"},{"key":"10420_CR75","doi-asserted-by":"crossref","first-page":"106115","DOI":"10.1016\/j.chb.2019.08.022","volume":"104","author":"S Trepte","year":"2020","unstructured":"Trepte, S., Scharkow, M., & Dienlin, T. (2020). The privacy calculus contextualized: The influence of affordances. Computers in Human Behavior, 104, 106115.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10420_CR76","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/0095-0696(91)90003-2","volume":"21","author":"WK Viscusi","year":"1991","unstructured":"Viscusi, W. K., Magat, W. A., & Huber, J. (1991). Pricing environmental health risks: Survey assessments of risk-risk and risk-dollar trade-offs for chronic bronchitis. Journal of Environmental Economics and Management, 21(1), 32\u201351.","journal-title":"Journal of Environmental Economics and Management"},{"issue":"2","key":"10420_CR77","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s11077-020-09381-4","volume":"53","author":"CM Weible","year":"2020","unstructured":"Weible, C. M., Nohrstedt, D., Cairney, P., Carter, D. P., Crow, D. A., Durnov\u00e1, A. P., Heikkila, T., Ingold, K., McConnell, A., & Stone, D. (2020). COVID-19 and the policy sciences: Initial reactions and perspectives. Policy Sciences, 53(2), 225\u2013241.","journal-title":"Policy Sciences"},{"issue":"12","key":"10420_CR78","first-page":"1","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1.","journal-title":"Journal of the Association for Information Systems"},{"issue":"1\u20132","key":"10420_CR79","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1080\/02185385.2020.1819396","volume":"31","author":"K Yeong-Tsyr Wang","year":"2021","unstructured":"Yeong-Tsyr Wang, K., Wen-Hui, T., Chuang, T.-Y., & Lee, H.-J. (2021). Rethinking four social issues of the COVID-19 pandemic from social work perspectives. Asia Pacific Journal of Social Work and Development, 31(1\u20132), 45\u201351.","journal-title":"Asia Pacific Journal of Social Work and Development"},{"issue":"6\u20137","key":"10420_CR80","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1177\/0275074020943708","volume":"50","author":"J You","year":"2020","unstructured":"You, J. (2020). Lessons from South Korea\u2019s Covid-19 policy response. The American Review of Public Administration, 50(6\u20137), 801\u2013808.","journal-title":"The American Review of Public Administration"},{"key":"10420_CR81","doi-asserted-by":"crossref","first-page":"101601","DOI":"10.1016\/j.tele.2021.101601","volume":"61","author":"M Zhu","year":"2021","unstructured":"Zhu, M., Wu, C., Huang, S., Zheng, K., Young, S. D., Yan, X., & Yuan, Q. (2021). Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. Telematics and Informatics, 61, 101601.","journal-title":"Telematics and Informatics"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10420-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-023-10420-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10420-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T08:06:15Z","timestamp":1725350775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-023-10420-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":81,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["10420"],"URL":"https:\/\/doi.org\/10.1007\/s10796-023-10420-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"25 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The Author(s) declare(s) that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicting Interests"}}]}}