{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:57:38Z","timestamp":1762390658376},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,7,23]],"date-time":"2015-07-23T00:00:00Z","timestamp":1437609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10799-015-0246-0","type":"journal-article","created":{"date-parts":[[2015,7,22]],"date-time":"2015-07-22T03:28:18Z","timestamp":1437535698000},"page":"341-360","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["The interpersonal privacy identity (IPI): development of a privacy as control model"],"prefix":"10.1007","volume":"17","author":[{"given":"Tabitha L.","family":"James","sequence":"first","affiliation":[]},{"given":"Quinton","family":"Nottingham","sequence":"additional","affiliation":[]},{"given":"Stephane E.","family":"Collignon","sequence":"additional","affiliation":[]},{"given":"Merrill","family":"Warkentin","sequence":"additional","affiliation":[]},{"given":"Jennifer L.","family":"Ziegelmayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,23]]},"reference":[{"key":"246_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, pp 21\u201329. ACM","DOI":"10.1145\/988772.988777"},{"key":"246_CR2","doi-asserted-by":"crossref","unstructured":"Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Privacy enhancing technologies, lecture notes in computer science, vol 4258. Springer, Berlin, pp 36\u201358","DOI":"10.1007\/11957454_3"},{"key":"246_CR3","volume-title":"The environment and social behavior","author":"I Altman","year":"1975","unstructured":"Altman I (1975) The environment and social behavior. Brooks\/Cole, Monterey"},{"key":"246_CR4","volume-title":"Social penetration: the development of interpersonal relationships","author":"I Altman","year":"1973","unstructured":"Altman I, Taylor DA (1973) Social penetration: the development of interpersonal relationships. Holt, Rinehart & Winston, Oxford"},{"issue":"3","key":"246_CR5","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"JC Anderson","year":"1988","unstructured":"Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull 103(3):411\u2013423","journal-title":"Psychol Bull"},{"issue":"1","key":"246_CR6","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSP.2010.38","volume":"8","author":"AI Anton","year":"2010","unstructured":"Anton AI, Earp JB, Young JD (2010) How internet users\u2019 privacy concerns have evolved since 2002. IEEE Secur Priv 8(1):21\u201327","journal-title":"IEEE Secur Priv"},{"issue":"9","key":"246_CR7","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5210\/fm.v11i9.1394","volume":"11","author":"SB Barnes","year":"2006","unstructured":"Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11(9):11\u201315","journal-title":"First Monday"},{"issue":"4","key":"246_CR8","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer F, Crossler RE (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Q 35(4):1017\u20131042","journal-title":"MIS Q"},{"issue":"3","key":"246_CR9","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","volume":"11","author":"F B\u00e9langer","year":"2002","unstructured":"B\u00e9langer F, Hiller JS, Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. J Strateg Inf Syst 11(3):245\u2013270","journal-title":"J Strateg Inf Syst"},{"key":"246_CR10","volume-title":"The political economy of privacy: a review of the literature","author":"CJ Bennett","year":"1995","unstructured":"Bennett CJ (1995) The political economy of privacy: a review of the literature. Center for Social and Legal Research, Hackensack"},{"issue":"4","key":"246_CR11","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt B, Gunther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101\u2013106","journal-title":"Commun ACM"},{"key":"246_CR12","first-page":"189","volume-title":"Individualism and collectivism: theory, method, and applications. Cross-cultural research and methodology series","author":"G Bierbrauer","year":"1994","unstructured":"Bierbrauer G, Meyer H, Wolfradt U (1994) Measurement of normative and evaluative aspects in individualistic and collectivistic orientations: The Cultural Orientation Scale (COS). In: Kim U, Triandis HC, Cigdem K, Choi S-C, Yoon G (eds) Individualism and collectivism: theory, method, and applications. Cross-cultural research and methodology series, vol 18. Sage Publications Inc, Thousand Oaks, pp 189\u2013199"},{"key":"246_CR13","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/0013164491513002","volume":"51","author":"JC Chan","year":"1991","unstructured":"Chan JC (1991) Response-order effects in Likert-type scales. Educ Psychol Meas 51:531\u2013540","journal-title":"Educ Psychol Meas"},{"issue":"2","key":"246_CR14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"RK Chellappa","year":"2005","unstructured":"Chellappa RK, Sin R (2005) Personalization versus privacy: an empirical examination of the online consumer\u2019s dilemma. Inf Technol Manag 6(2):181\u2013202","journal-title":"Inf Technol Manag"},{"issue":"10","key":"246_CR15","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1002\/asi.21122","volume":"60","author":"JT Child","year":"2009","unstructured":"Child JT, Pearson JC, Petronio S (2009) Blogging, communication, and privacy management: development of the blogging privacy management measure. J Am Soc Inform Sci Technol 60(10):2079\u20132094","journal-title":"J Am Soc Inform Sci Technol"},{"issue":"1","key":"246_CR16","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"M Culnan","year":"1999","unstructured":"Culnan M, Armstrong P (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104\u2013115","journal-title":"Organ Sci"},{"key":"246_CR17","doi-asserted-by":"crossref","unstructured":"Daft RL, Lengel RH, Trevino LK (1987) Message equivocality, media selection, and manager performance: implications for information systems. MIS Q 11(3):355\u2013366","DOI":"10.2307\/248682"},{"issue":"3","key":"246_CR18","doi-asserted-by":"crossref","first-page":"575","DOI":"10.2307\/25148857","volume":"32","author":"AR Dennis","year":"2008","unstructured":"Dennis AR, Fuller RM, Valacich JS (2008) Media, tasks, and communication processes: a theory of media synchronicity. MIS Q 32(3):575\u2013600","journal-title":"MIS Q"},{"issue":"3","key":"246_CR19","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1111\/j.1540-4560.1977.tb01885.x","volume":"33","author":"VJ Derlega","year":"1977","unstructured":"Derlega VJ, Chaikin AL (1977) Privacy and self-disclosure in social relationships. J Soc Issues 33(3):102\u2013115","journal-title":"J Soc Issues"},{"key":"246_CR20","volume-title":"Self-disclosure","author":"VJ Derlega","year":"1993","unstructured":"Derlega VJ, Metts S, Petronio S, Margulis ST (1993) Self-disclosure. Sage Publications Inc, Newbury Park"},{"issue":"6","key":"246_CR21","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/01449290410001715723","volume":"23","author":"T Dinev","year":"2004","unstructured":"Dinev T, Hart P (2004) Internet privacy concerns and their antecedents\u2014measurement validity and a regression model. Behav Inf Technol 23(6):413\u2013422","journal-title":"Behav Inf Technol"},{"issue":"1","key":"246_CR22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev T, Hart P (2006) An extended privacy calculus model for e-commerce transactions. Inf Syst Res 17(1):61\u201380","journal-title":"Inf Syst Res"},{"issue":"4","key":"246_CR23","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","volume":"15","author":"T Dinev","year":"2006","unstructured":"Dinev T, Bellotto M, Hart P, Russo V, Serra I, Colautti C (2006) Privacy calculus model in e-commerce\u2014a study of Italy and the United States. Eur J Inf Syst 15(4):389\u2013402","journal-title":"Eur J Inf Syst"},{"issue":"3","key":"246_CR24","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1057\/ejis.2012.23","volume":"22","author":"T Dinev","year":"2013","unstructured":"Dinev T, Xu H, Smith JH, Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst 22(3):295\u2013316","journal-title":"Eur J Inf Syst"},{"key":"246_CR25","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18:39\u201350","journal-title":"J Mark Res"},{"issue":"7","key":"246_CR26","first-page":"1","volume":"1","author":"D Gefen","year":"2000","unstructured":"Gefen D, Straub DW, Boudreau M-C (2000) Structural equation modeling and regression: guidelines for research practice. Commun Assoc Inf Syst 1(7):1\u201378","journal-title":"Commun Assoc Inf Syst"},{"key":"246_CR27","doi-asserted-by":"crossref","unstructured":"Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society, pp. 71\u201380. ACM","DOI":"10.1145\/1102199.1102214"},{"key":"246_CR28","volume-title":"Multivariate data analysis","author":"JF Hair","year":"2006","unstructured":"Hair JF, Black WC, Babin BJ, Anderson RE, Tatham RL (2006) Multivariate data analysis. Pearson Prentice Hall, Upper Saddle River"},{"issue":"2","key":"246_CR29","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1207\/s15327752jpa5002_10","volume":"50","author":"A Hakstian","year":"1986","unstructured":"Hakstian A, Suedfeld P, Ballard E, Rank D (1986) The ascription of responsibility questionnaire: development and empirical extensions. J Pers Assess 50(2):229\u2013247","journal-title":"J Pers Assess"},{"issue":"2","key":"246_CR30","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240202","volume":"24","author":"I-H Hann","year":"2008","unstructured":"Hann I-H, Hui K-L, Lee SYT, Png IPL (2008) Overcoming online information privacy concerns: an information-processing theory approach. J Manag Inf Syst 24(2):13\u201342","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"246_CR31","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","volume":"31","author":"KL Hui","year":"2007","unstructured":"Hui KL, Teo HH, Lee SYT (2007) The value of privacy assurance: an exploratory field experiment. MIS Q 31(1):19\u201333","journal-title":"MIS Q"},{"issue":"4","key":"246_CR32","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1057\/ejis.2008.29","volume":"17","author":"IA Junglas","year":"2008","unstructured":"Junglas IA, Johnson NA, Spitzm\u00fcller C (2008) Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur J Inf Syst 17(4):387\u2013402","journal-title":"Eur J Inf Syst"},{"issue":"9","key":"246_CR33","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1037\/0003-066X.53.9.1017","volume":"53","author":"R Kraut","year":"1998","unstructured":"Kraut R, Patterson M, Lundmark V, Kiesler S, Mukophadhyay T, Scherlis W (1998) Internet paradox: a social technology that reduces social involvement and psychological well-being? Am Psychol 53(9):1017\u20131031","journal-title":"Am Psychol"},{"issue":"5","key":"246_CR34","doi-asserted-by":"crossref","first-page":"512","DOI":"10.2307\/2089474","volume":"22","author":"J Lansing","year":"1957","unstructured":"Lansing J, Kish L (1957) Family life cycle as an independent variable. Am Sociol Rev 22(5):512\u2013519","journal-title":"Am Sociol Rev"},{"issue":"3","key":"246_CR35","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"R Laufer","year":"1977","unstructured":"Laufer R, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional developmental theory. J Soc Issues 33(3):22\u201342","journal-title":"J Soc Issues"},{"key":"246_CR36","unstructured":"Luo X, Warkentin M, Johnston AC (2009) The impact of national culture on workplace privacy expectations in the context of information security assurance. In: AMCIS 2009 Proceedings"},{"issue":"4","key":"246_CR37","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1023\/B:MARK.0000012471.31858.e5","volume":"14","author":"M Lwin","year":"2003","unstructured":"Lwin M, Williams J (2003) A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Mark Lett 14(4):257\u2013272","journal-title":"Mark Lett"},{"issue":"4","key":"246_CR38","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra NK, Kim SS, Agarwal J (2004) Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf Syst Res 15(4):336\u2013355","journal-title":"Inf Syst Res"},{"issue":"3","key":"246_CR39","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1111\/j.1540-4560.1977.tb01879.x","volume":"33","author":"ST Margulis","year":"1977","unstructured":"Margulis ST (1977) Conceptions of privacy: current status and next steps. J Soc Issues 33(3):5\u201321","journal-title":"J Soc Issues"},{"issue":"3","key":"246_CR40","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1207\/s15327906mbr0903_1","volume":"9","author":"N Marshall","year":"1974","unstructured":"Marshall N (1974) Dimensions of privacy preferences. Multivar Behav Res 9(3):255\u2013272","journal-title":"Multivar Behav Res"},{"issue":"2","key":"246_CR41","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1509\/jppm.19.2.238.17136","volume":"19","author":"GR Milne","year":"2000","unstructured":"Milne GR, Rohm A (2000) Consumer privacy and name removal across direct marketing channels: exploring opt-in and opt-out alternatives. J Pub Policy Mark 19(2):238\u2013249","journal-title":"J Pub Policy Mark"},{"issue":"3","key":"246_CR42","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"JH Moor","year":"1997","unstructured":"Moor JH (1997) Towards a theory of privacy in the information age. Comput Soc 27(3):27\u201332","journal-title":"Comput Soc"},{"issue":"6","key":"246_CR43","doi-asserted-by":"crossref","first-page":"1257","DOI":"10.1525\/aa.1964.66.6.02a00020","volume":"66","author":"RF Murphy","year":"1964","unstructured":"Murphy RF (1964) Social distance and the veil. Am Anthropol 66(6):1257\u20131274","journal-title":"Am Anthropol"},{"key":"246_CR44","unstructured":"Nosko A (2011) To tell or not to tell: predictors of disclosure and privacy settings usage in an online social networking site (facebook). Theses and Dissertations (Comprehensive). Paper 1116"},{"issue":"1","key":"246_CR45","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff 41(1):100\u2013126","journal-title":"J Consum Aff"},{"issue":"4","key":"246_CR46","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1016\/j.jesp.2009.03.009","volume":"45","author":"DM Oppenheimer","year":"2009","unstructured":"Oppenheimer DM, Meyvis T, Davidenko N (2009) Instructional manipulation checks: detecting satisficing to increase statistical power. J Exp Soc Psychol 45(4):867\u2013872","journal-title":"J Exp Soc Psychol"},{"issue":"4","key":"246_CR47","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1111\/j.1460-2466.1973.tb00958.x","volume":"23","author":"WB Pearce","year":"1973","unstructured":"Pearce WB, Sharp SM (1973) Self-disclosing communication. J Commun 23(4):409\u2013425","journal-title":"J Commun"},{"issue":"3","key":"246_CR48","doi-asserted-by":"crossref","first-page":"249","DOI":"10.2224\/sbp.1996.24.3.249","volume":"24","author":"D Pedersen","year":"1996","unstructured":"Pedersen D (1996) A factorial comparison of privacy questionnaires. Soc Behav Personal 24(3):249\u2013262","journal-title":"Soc Behav Personal"},{"key":"246_CR49","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of privacy: dialectics of disclosure","author":"SS Petronio","year":"2002","unstructured":"Petronio SS (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany"},{"issue":"1","key":"246_CR50","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J Phelps","year":"2000","unstructured":"Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Pub Policy Mark 19(1):27\u201341","journal-title":"J Pub Policy Mark"},{"issue":"1","key":"246_CR51","doi-asserted-by":"crossref","first-page":"42","DOI":"10.4018\/jisp.2008010103","volume":"2","author":"T Pirim","year":"2008","unstructured":"Pirim T, James TL, Boswell K, Reithel B, Barkhi R (2008) An empirical investigation of an individual\u2019s perceived need for privacy and security. Int J Inf Secur Priv 2(1):42\u201353","journal-title":"Int J Inf Secur Priv"},{"issue":"5","key":"246_CR52","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff PM, MacKensie SB, Lee J-Y, Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Psychol 88(5):879\u2013903","journal-title":"J Appl Psychol"},{"issue":"2","key":"246_CR53","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1057\/ejis.2010.15","volume":"19","author":"C Posey","year":"2010","unstructured":"Posey C, Lowry PB, Roberts TL, Ellis TS (2010) Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities. Eur J Inf Syst 19(2):181\u2013195","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"246_CR54","first-page":"19","volume":"7","author":"AD Rensel","year":"2006","unstructured":"Rensel AD, Abbas JM, Rao HR (2006) Private transactions in public places: an exploration of the impact of the computer environment on public transactional Web site use. J Assoc Inf Syst 7(1):19\u201350","journal-title":"J Assoc Inf Syst"},{"issue":"4","key":"246_CR55","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/BF02239408","volume":"16","author":"C Robins","year":"1994","unstructured":"Robins C, Ladd J, Welkowitz J, Blaney P, Diaz R, Kutcher G (1994) The personal style inventory: preliminary validation studies of new measures of sociotropy and autonomy. J Psychopathol Behav Assess 16(4):277\u2013300","journal-title":"J Psychopathol Behav Assess"},{"key":"246_CR56","first-page":"382","volume-title":"Private lives and public surveillance: social control in the computer age","author":"JB Rule","year":"1974","unstructured":"Rule JB (1974) Private lives and public surveillance: social control in the computer age. Schocken Books, New York, p 382"},{"key":"246_CR57","volume-title":"The sociology of Georg Simmel: translated, edited and with an introduction by Kurt H. Wolff","author":"G Simmel","year":"1950","unstructured":"Simmel G (1950) The sociology of Georg Simmel: translated, edited and with an introduction by Kurt H. Wolff. The Free Press, New York"},{"issue":"4","key":"246_CR58","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35(4):989\u20131016","journal-title":"MIS Q"},{"issue":"2","key":"246_CR59","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"H Smith","year":"1996","unstructured":"Smith H, Milberg S, Burke S (1996) Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q 20(2):167\u2013196","journal-title":"MIS Q"},{"issue":"3","key":"246_CR60","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","volume":"32","author":"JY Son","year":"2008","unstructured":"Son JY, Kim SS (2008) Internet users\u2019 information privacy-protective responses: a taxonomy and a nomological model. MIS Q 32(3):503\u2013529","journal-title":"MIS Q"},{"issue":"1","key":"246_CR61","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","volume":"13","author":"K Stewart","year":"2002","unstructured":"Stewart K, Segars A (2002) An empirical examination of the concern for information privacy instrument. Inf Syst Res 13(1):36\u201349","journal-title":"Inf Syst Res"},{"issue":"1","key":"246_CR62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1467-9973.2006.00474.x","volume":"38","author":"HT Tavani","year":"2007","unstructured":"Tavani HT (2007) Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy 38(1):1\u201322","journal-title":"Metaphilosophy"},{"issue":"6","key":"246_CR63","first-page":"415","volume":"7","author":"C Slyke Van","year":"2006","unstructured":"Van Slyke C, Shim JT, Johnson R, Jiang J (2006) Concern for information privacy and online consumer purchasing. J Assoc Inf Syst 7(6):415\u2013444","journal-title":"J Assoc Inf Syst"},{"issue":"3","key":"246_CR64","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1057\/ejis.2010.72","volume":"20","author":"M Warkentin","year":"2011","unstructured":"Warkentin M, Johnston AC, Shropshire J (2011) The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur J Inf Syst 20(3):267\u2013284","journal-title":"Eur J Inf Syst"},{"key":"246_CR65","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin A (1967) Privacy and freedom. Atheneum Publishers, New York"},{"issue":"3","key":"246_CR66","first-page":"137","volume":"26","author":"H Xu","year":"2010","unstructured":"Xu H, Teo HH, Tan BCY, Agarwal R (2010) The role of push-pull technology in privacy calculus: the case of location-based services. J Manag Inf Syst 26(3):137\u2013176","journal-title":"J Manag Inf Syst"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0246-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-015-0246-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0246-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0246-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T11:28:51Z","timestamp":1691839731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-015-0246-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,23]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["246"],"URL":"https:\/\/doi.org\/10.1007\/s10799-015-0246-0","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,23]]}}}