{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:39:27Z","timestamp":1775025567908,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s12525-019-00335-0","type":"journal-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T03:10:12Z","timestamp":1552533012000},"page":"359-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Perceived information sensitivity and interdependent privacy protection: a quantitative study"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9886-7950","authenticated-orcid":false,"given":"Jakob","family":"Wirth","sequence":"first","affiliation":[]},{"given":"Christian","family":"Maier","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Laumer","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Weitzel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"335_CR1","unstructured":"Ajzen, I. (2006). Constructing a theory of planned behavior questionnaire. http:\/\/people.umass.edu\/~aizen\/pdf\/tpb.measurement.pdf . Accessed 30 January 2017."},{"key":"335_CR2","unstructured":"Alashoor, T., Keil, M., Liu, L., & Smith, J. (2015). How values shape concerns about privacy for self and others. In D. Leidner & J. Ross (Eds.), Proceedings of the Thirty Sixth International Conference on Information Systems, Dallas, USA."},{"key":"335_CR3","unstructured":"Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2009). The antecedents of customer self-disclosure to online virtual advisors. In H. Chen & S. Slaugther (Eds.), Proceedings of the 30th International Conference on Information Systems, Phoenix, USA."},{"key":"335_CR4","unstructured":"Anderson, C. L., and Agarwal, R. (2009). \u201cGenetic information altruists: how far and to whom does their generosity extend?\u201d ICIS 2009 Proceedings."},{"issue":"3","key":"335_CR5","doi-asserted-by":"crossref","first-page":"789","DOI":"10.2307\/23042809","volume":"35","author":"A Animesh","year":"2011","unstructured":"Animesh, A., Pinsonneault, A., Yang, S.-B., & Oh, W. (2011). An Odyssey into virtual worlds: exploring the impacts of technological and spatial environments. MIS Quarterly, 35(3), 789\u2013810.","journal-title":"MIS Quarterly"},{"issue":"2","key":"335_CR6","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","volume":"49","author":"G Bansal","year":"2010","unstructured":"Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138\u2013150.","journal-title":"Decision Support Systems"},{"issue":"2","key":"335_CR7","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1037\/0022-3514.40.2.290","volume":"40","author":"CD Batson","year":"1981","unstructured":"Batson, C. D., Duncan, D. B., Ackerman, P., Buckley, T., & Birch, K. (1981). Is empathic emotion a source of altruistic motivation? Journal of Personality and Social Psychology, 40(2), 290\u2013302.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"335_CR8","doi-asserted-by":"crossref","first-page":"493","DOI":"10.2307\/25148693","volume":"29","author":"A Beaudry","year":"2005","unstructured":"Beaudry, A., & Pinsonneault, A. (2005). Understanding User Responses to Information Technology: A Coping Model of User Adaptation. MIS Quarterly, 29(3), 493\u2013524.","journal-title":"MIS Quarterly"},{"issue":"4","key":"335_CR9","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017\u20131042.","journal-title":"MIS Quarterly"},{"key":"335_CR10","doi-asserted-by":"crossref","unstructured":"Bellekens, X., Hamilton, A., Seeam, P., Nieradzinska, K., Franssen, Q., and Seeam, A. (2016). \u201cPervasive eHealth services a security and privacy risk awareness survey,\u201d in 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), London, United Kingdom, IEEE, pp. 1\u20134.","DOI":"10.1109\/CyberSA.2016.7503293"},{"issue":"1","key":"335_CR11","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1006\/game.1995.1027","volume":"10","author":"J Berg","year":"1995","unstructured":"Berg, J., Dickhaut, J., & McCabe, K. (1995). Trust, reciprocity, and social history. Games and Economic Behavior, 10(1), 122\u2013142.","journal-title":"Games and Economic Behavior"},{"key":"335_CR12","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-642-39884-1_29","volume-title":"Financial cryptography and data security","author":"G Bicz\u00f3k","year":"2013","unstructured":"Bicz\u00f3k, G., & Chia, P. H. (2013). Interdependent privacy: Let me share your data. In A.-R. Sadeghi (Ed.), Financial cryptography and data security (pp. 338\u2013353). Berlin: Springer."},{"issue":"1","key":"335_CR13","doi-asserted-by":"crossref","first-page":"87","DOI":"10.2307\/25148669","volume":"29","author":"G-W Bock","year":"2005","unstructured":"Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee, J.-N. (2005). Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 29(1), 87\u2013111.","journal-title":"MIS Quarterly"},{"issue":"1","key":"335_CR14","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D. M., & Ellison, N. B. (2007). Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210\u2013230.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"4","key":"335_CR15","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.25300\/MISQ\/2014\/38.4.13","volume":"38","author":"M Boyer O\u2019Leary","year":"2014","unstructured":"Boyer O\u2019Leary, M., Wilson, J. M., & Metiu, A. (2014). Beyond being there: the symbolic role of communication and identification in perceptions of proximity to geographically dispersed colleagues. MIS Quarterly, 38(4), 1219\u20131243.","journal-title":"MIS Quarterly"},{"key":"335_CR16","unstructured":"Buckel, T., & Thiesse, F. (2013). Predicting the disclosure of personal information on social networks: an empirical investigation. In R. Alt & B. Franczyk (Eds.), 11th International Conference on Wirtschaftsinformatik, Leipzig, Germany."},{"issue":"3","key":"335_CR17","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1287\/isre.2017.0744","volume":"29","author":"Z Cao","year":"2018","unstructured":"Cao, Z., Hui, K.-L., & Xu, H. (2018). An economic analysis of peer disclosure in online social communities. Information Systems Research, 29(3), 546\u2013566.","journal-title":"Information Systems Research"},{"key":"335_CR18","volume-title":"Reliability and validity assessment","author":"EG Carmines","year":"2008","unstructured":"Carmines, E. G., and Zeller, R. A. 2008. Reliability and validity assessment, Newbury Park: Sage Publications."},{"key":"335_CR19","unstructured":"Chen, J., Ping, W., Xu, Y., & Tan, B. C.Y. (2009). Am i afraid of my peers? Understanding the antecedents of information privacy concerns in the online social context. In H. Chen & S. Slaugther (Eds.), Proceedings of the 30th International Conference on Information Systems, Phoenix, USA, pp. 1\u201318."},{"key":"335_CR20","first-page":"295","volume-title":"Modern methods for Business Research","author":"WW Chin","year":"1998","unstructured":"Chin, W. W. (1998). The partial least squares approach to structural equation modeling. In Modern methods for Business Research (pp. 295\u2013336). Mahwah: Lawrence Erlbaum Associates."},{"issue":"6","key":"335_CR21","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1016\/0022-1031(73)90031-0","volume":"9","author":"RB Cialdini","year":"1973","unstructured":"Cialdini, R. B., Darby, B. L., & Vincent, J. E. (1973). Transgression and altruism: a case for hedonism. Journal of Experimental Social Psychology, 9(6), 502\u2013516.","journal-title":"Journal of Experimental Social Psychology"},{"issue":"3","key":"335_CR22","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1037\/h0036000","volume":"29","author":"RD Clark","year":"1974","unstructured":"Clark, R. D., & Word, L. E. (1974). Where is the apathetic bystander? Situational characteristics of the emergency. Journal of Personality and Social Psychology, 29(3), 279\u2013287.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"335_CR23","doi-asserted-by":"crossref","first-page":"341","DOI":"10.2307\/249775","volume":"17","author":"MJ Culnan","year":"1993","unstructured":"Culnan, M. J. (1993). \"How did they get my name?\": An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341\u2013363.","journal-title":"MIS Quarterly"},{"key":"335_CR24","doi-asserted-by":"crossref","DOI":"10.4135\/9781412986212","volume-title":"The logic of causal order","author":"JA Davis","year":"1985","unstructured":"Davis, J. A. (1985). The logic of causal order. Iowa City: Sage."},{"issue":"12","key":"335_CR25","doi-asserted-by":"crossref","first-page":"1625","DOI":"10.1177\/0146167204271183","volume":"30","author":"MH Davis","year":"2004","unstructured":"Davis, M. H., Soderlund, T., Cole, J., Gadol, E., Kute, M., Myers, M., & Weihing, J. (2004). Cognitions associated with attempts to empathize: how do we imagine the perspective of another? Personality & Social Psychology Bulletin, 30(12), 1625\u20131635.","journal-title":"Personality & Social Psychology Bulletin"},{"issue":"3","key":"335_CR26","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1207\/s15327965pli1703_2","volume":"17","author":"R Deutsch","year":"2006","unstructured":"Deutsch, R., & Strack, F. (2006). TARGET ARTICLE: Duality Models in Social Psychology: From Dual Processes to Interacting Systems. Psychological Inquiry, 17(3), 166\u2013172.","journal-title":"Psychological Inquiry"},{"issue":"1","key":"335_CR27","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61\u201380.","journal-title":"Information Systems Research"},{"issue":"3","key":"335_CR28","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1057\/ejis.2012.23","volume":"22","author":"T Dinev","year":"2013","unstructured":"Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295\u2013316.","journal-title":"European Journal of Information Systems"},{"key":"335_CR29","unstructured":"Eling, N., Krasnova, H., Widjaja, T., & Buxmann, P. (2015). Will you accept an app? Empirical investigation of the decisional calculus behind the adoption of applications on facebook. In D. Leidner & J. Ross (Eds.), Proceedings of the Thirty Sixth International Conference on Information Systems, Dallas, USA."},{"key":"335_CR30","volume-title":"Belief, attitude, intention, and behavior: An introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading: Addison-Wesley Pub. Co.."},{"issue":"1","key":"335_CR31","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39\u201350.","journal-title":"Journal of Marketing Research"},{"key":"335_CR32","volume-title":"The panoptic sort: A political economy of personal information","author":"OH Gandy","year":"1993","unstructured":"Gandy, O. H. (1993). The panoptic sort: A political economy of personal information. Boulder: Westview Press."},{"issue":"1","key":"335_CR33","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jsis.2014.09.001","volume":"24","author":"J Gerlach","year":"2015","unstructured":"Gerlach, J., Widjaja, T., & Buxmann, P. (2015). Handle with care: How online social network providers\u2019 privacy policies impact users\u2019 information sharing behavior. The Journal of Strategic Information Systems, 24(1), 33\u201343.","journal-title":"The Journal of Strategic Information Systems"},{"key":"335_CR34","unstructured":"Goel, V., and Perlroth, N. (2016). Yahoo says 1 billion user accounts were hacked. http:\/\/www.nytimes.com\/2016\/12\/14\/technology\/yahoo-hack.html . Accessed 15 December 2016."},{"key":"335_CR35","volume-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","author":"JF Hair","year":"2017","unstructured":"Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017). A primer on partial least squares structural equation modeling (PLS-SEM). Los Angeles, London, New Delhi, Singapore, Washington DC, Melbourne: Sage."},{"issue":"1","key":"335_CR36","first-page":"1","volume":"43","author":"J Henseler","year":"2014","unstructured":"Henseler, J., Ringle, C. M., & Sarstedt, M. (2014). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 1\u201321.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"1","key":"335_CR37","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/IMDS-09-2015-0382","volume":"116","author":"J Henseler","year":"2016","unstructured":"Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS path modeling in new technology research: Updated guidelines. Industrial Management & Data Systems, 116(1), 2\u201320.","journal-title":"Industrial Management & Data Systems"},{"issue":"4","key":"335_CR38","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s12599-014-0332-6","volume":"6","author":"T Hess","year":"2014","unstructured":"Hess, T., Legner, C., Esswein, W., Maa\u00df, W., Matt, C., \u00d6sterle, H., Schlieter, H., Richter, P., & Zarnekow, R. (2014). Digital life as a topic of business and information systems engineering? Business & Information Systems Engineering, 6(4), 247\u2013253.","journal-title":"Business & Information Systems Engineering"},{"issue":"1","key":"335_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","volume":"6","author":"L\u2010T Hu","year":"1999","unstructured":"Hu, L.\u2010. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1\u201355.","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"issue":"2","key":"335_CR40","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7","volume":"20","author":"J Hulland","year":"1999","unstructured":"Hulland, J. (1999). Use of Partial Least Squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195\u2013204.","journal-title":"Strategic Management Journal"},{"issue":"7","key":"335_CR41","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1016\/j.im.2017.01.001","volume":"54","author":"TL James","year":"2017","unstructured":"James, T. L., Wallace, L., Warkentin, M., Kim, B. C., & Collignon, S. E. (2017). Exposing others\u2019 information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Information Management, 54(7), 851\u2013865.","journal-title":"Information Management"},{"issue":"2","key":"335_CR42","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2753\/MIS0742-1222250205","volume":"25","author":"ME Johnson","year":"2008","unstructured":"Johnson, M. E. (2008). Information risk of inadvertent disclosure: an analysis of file-sharing risk in the financial supply chain. Journal of Management Information Systems, 25(2), 97\u2013123.","journal-title":"Journal of Management Information Systems"},{"issue":"10","key":"335_CR43","doi-asserted-by":"crossref","first-page":"585","DOI":"10.17705\/1jais.00344","volume":"14","author":"I Junglas","year":"2013","unstructured":"Junglas, I., Goel, L., Abraham, C., & Ives, B. (2013). The Social component of information systems\u2014How sociability contributes to technology acceptance. Journal of the Association for Information Systems, 14(10), 585\u2013616.","journal-title":"Journal of the Association for Information Systems"},{"issue":"6","key":"335_CR44","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1057\/s41303-017-0064-z","volume":"26","author":"S Karwatzki","year":"2017","unstructured":"Karwatzki, S., Trenz, M., Tuunainen, V. K., & Veit, D. (2017). Adverse consequences of access to individuals\u2019 information: An analysis of perceptions and the scope of organisational influence. European Journal of Information Systems, 26(6), 688\u2013715.","journal-title":"European Journal of Information Systems"},{"key":"335_CR45","unstructured":"Kehr, F., Wentzel, D., & Mayer, P. (2013). Rethinking the privacy calculus: on the role of dispositional factors and affect. In R. Baskerville & M. Chau (Eds.), Proceedings of the 34th International Conference on Information Systems, Milan, Italy, pp. 1\u201310."},{"key":"335_CR46","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.chb.2016.12.012","volume":"69)","author":"M Koohikamali","year":"2017","unstructured":"Koohikamali, M., Peak, D. A., & Prybutok, V. R. (2017). Beyond self-disclosure: disclosure of information about others in social network sites. Computers in Human Behavior, 69), 29\u201342.","journal-title":"Computers in Human Behavior"},{"key":"335_CR47","unstructured":"Krasnova, H., & Veltri, N. F. (2010). Privacy calculus on social networking sites: explorative evidence from Germany and USA. In R. Sprague & S. Laney (Eds.), 43rd Hawaii International Conference on System Sciences (2010), Koloa, Kauai, Hawaii, pp. 1\u201310."},{"issue":"4","key":"335_CR48","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1162\/qjec.2009.124.4.1815","volume":"124","author":"S Leider","year":"2009","unstructured":"Leider, S., M\u00f6bius, M. M., Rosenblat, T., & Do, Q.-A. (2009). Directed altruism and enforced reciprocity in social networks *. Quarterly Journal of Economics, 124(4), 1815\u20131851.","journal-title":"Quarterly Journal of Economics"},{"issue":"3","key":"335_CR49","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.dss.2011.01.017","volume":"51","author":"H Li","year":"2011","unstructured":"Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434\u2013445.","journal-title":"Decision Support Systems"},{"key":"335_CR50","unstructured":"Li, T., Pavlou, P., & dos Santos, G. L. (2013). What drives users\u2019 website registration? A randomized field experiment. In R. Baskerville & M. Chau (Eds.), Proceedings of the 34th International Conference on Information Systems, Milan, Italy."},{"issue":"3","key":"335_CR51","first-page":"232","volume":"25","author":"PB Lowry","year":"2016","unstructured":"Lowry, P. B., D\u2019Arcy, J., Hammer, B., & Moody, G. D. (2016). \u201cCargo cult\u201d science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. JSIS, 25(3), 232\u2013240.","journal-title":"JSIS"},{"issue":"4","key":"335_CR52","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1007\/s11747-006-0003-3","volume":"35","author":"M Lwin","year":"2007","unstructured":"Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: a power\u2013responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572\u2013585.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"4","key":"335_CR53","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model: information systems research. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"issue":"2","key":"335_CR54","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1111\/j.1083-6101.2007.00328.x","volume":"12","author":"MJ Metzger","year":"2007","unstructured":"Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335\u2013361.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"335_CR55","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1177\/074391569701600210","volume":"16","author":"GR Milne","year":"1997","unstructured":"Milne, G. R. (1997). Consumer participation in mailing lists: a field experiment. Journal of Public Policy & Marketing, 16(2), 298\u2013309.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"2","key":"335_CR56","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1177\/074391569101200206","volume":"12","author":"GR Milne","year":"1993","unstructured":"Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206\u2013215.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"4","key":"335_CR57","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1086\/209566","volume":"26","author":"Y Moon","year":"2000","unstructured":"Moon, Y. (2000). Intimate Exchanges: Using Computers to Elicit Self\u2010Disclosure From Consumers. Journal of consumer research, 26(4), 323\u2013339.","journal-title":"Journal of consumer research"},{"key":"335_CR58","unstructured":"Morlok, T. (2016). Sharing is (not) caring - the role of external privacy in users\u2019 information disclosure behaviors on social network sites. In T.-P. Liang & S.-Y. Hung (eds.), Proceedings of the 20th Pacific Asia Conference on Information Systems, Chiayi, Taiwan."},{"issue":"1","key":"335_CR59","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1177\/1094670511424924","volume":"15","author":"DL Mothersbaugh","year":"2011","unstructured":"Mothersbaugh, D. L., Foxx, W. K., Beatty, S. E., & Wang, S. (2011). Disclosure antecedents in an online service context: the role of sensitivity of information. Journal of Service Research, 15(1), 76\u201398.","journal-title":"Journal of Service Research"},{"key":"335_CR60","volume-title":"Social psychology","author":"DG Myers","year":"2009","unstructured":"Myers, D. G. (2009). Social psychology. New York: McGraw-Hill."},{"key":"335_CR61","volume-title":"Privacy in context: technology, policy, and the integrity of social life","author":"HF Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. F. (2010). Privacy in context: technology, policy, and the integrity of social life. Stanford: Stanford Law Books an imprit of Standford University Press."},{"issue":"1","key":"335_CR62","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","volume":"31","author":"PA Pavlou","year":"2007","unstructured":"Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: a principal -- agent perspective. MIS Quarterly, 31(1), 105\u2013136.","journal-title":"MIS Quarterly"},{"key":"335_CR63","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"SS Petronio","year":"2002","unstructured":"Petronio, S. S., & Altman, I. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press."},{"issue":"1","key":"335_CR64","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J Phelps","year":"2000","unstructured":"Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27\u201341.","journal-title":"Journal of Public Policy & Marketing"},{"key":"335_CR65","unstructured":"Poremba, S. M. (2012). How friends spoil your social-media privacy. http:\/\/www.nbcnews.com\/id\/47711709\/ns\/technology_and_science-security\/t\/how-friends-spoil-your-socialmedia-privacy\/#.WdTU28hJa70 . Accessed 9 October 2017."},{"key":"335_CR66","unstructured":"Posey, C., & Ellis, S. (2007). Understanding self-disclosure in electronic communities: an exploratory model of privacy risk beliefs, reciprocity, and trust. In J. Hoxmeier & S. Hayne (Eds.), Proceedings of the 13th American Conference on Information Systems, Keystone, Colorado, pp. 1\u201311."},{"key":"335_CR67","doi-asserted-by":"crossref","unstructured":"Pu, Y., & Grossklags, J. (2014). An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. International Conference on Decision and Game Theory for Security, 246\u2013265.","DOI":"10.1007\/978-3-319-12601-2_14"},{"key":"335_CR68","unstructured":"Pu, Y., & Grossklags, J. (2015). Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. In D. Leidner & J. Ross (Eds.), Proceedings of the thirty sixth international conference on information systems, Dallas."},{"key":"335_CR69","unstructured":"Ringle, C. M., Wende, S., and Becker, J.-M. (2014). SmartPLS 3. http:\/\/www.smartpls.com . Accessed 21 February 2017."},{"key":"335_CR70","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199586073.001.0001","volume-title":"Applied evolutionary psychology","author":"SC Roberts","year":"2011","unstructured":"Roberts, S. C. (2011). Applied evolutionary psychology. Oxford: Oxford University Press."},{"key":"335_CR71","volume-title":"A topical approach to life-span development","author":"JW Santrock","year":"2014","unstructured":"Santrock, J. W. (2014). A topical approach to life-span development. New York: McGraw-Hill Education."},{"key":"335_CR72","unstructured":"Schreiner, M., & Hess, T. (2015). Why are consumers willing to pay for privacy? An application of the privacy-freemium model to media companies. In J. Becker, J. vom Brocke & M. de Marco (Eds.), Twenty-Third European Conference on Information Systems (ECIS), M\u00fcnster, Germany."},{"issue":"1","key":"335_CR73","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/3051473.3051479","volume":"48","author":"A Schwarz","year":"2017","unstructured":"Schwarz, A., Rizzuto, T., Carraher-Wolverton, C., Roldan, J. L., & Barrera-Barrera, R. (2017). Examining the Impact and Detection of the \"Urban Legend\" of Common Method Bias. ACM Sigmis Database, 48(1), 93\u2013119.","journal-title":"ACM Sigmis Database"},{"issue":"1","key":"335_CR74","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","volume":"19","author":"KB Sheehan","year":"2000","unstructured":"Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of Privacy Concern among Online Consumers. Journal of Public Policy & Marketing, 19(1), 62\u201373.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"3","key":"335_CR75","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","volume":"32","author":"J-Y Son","year":"2008","unstructured":"Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: a taxonomy and a nomological model. MIS Quarterly, 32(3), 503\u2013529.","journal-title":"MIS Quarterly"},{"issue":"1","key":"335_CR76","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1057\/jit.2016.4","volume":"32","author":"S Spiekermann","year":"2017","unstructured":"Spiekermann, S., & Korunovska, J. (2017). Towards a value theory for personal data. Journal of Information Technology, 32(1), 62\u201384.","journal-title":"Journal of Information Technology"},{"key":"335_CR77","unstructured":"statista.com (2016). Share of internet users in the United States who have shared passwords to online accounts with friends or family as of May 2016, by age group. https:\/\/www.statista.com\/statistics\/676114\/us-sharingof-online-passwords-with-family\/ . Accessed 8 September 2017."},{"key":"335_CR78","unstructured":"statista.com (2018). Most famous social network sites worldwide as of January 2018, ranked by number of active users (in millions). https:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-ofusers\/ . Accessed 20 March 2018."},{"issue":"2","key":"335_CR79","doi-asserted-by":"crossref","first-page":"355","DOI":"10.25300\/MISQ\/2014\/38.2.02","volume":"38","author":"ZR Steelman","year":"2014","unstructured":"Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355\u2013378.","journal-title":"MIS Quarterly"},{"issue":"2","key":"335_CR80","doi-asserted-by":"crossref","first-page":"367","DOI":"10.25300\/MISQ\/2015\/39.2.05","volume":"39","author":"M-K Stein","year":"2015","unstructured":"Stein, M.-K., Newell, S., Wagner, E. L., & Galliers, R. D. (2015). Coping with information technology: Mixed emotions, vacillation and non-conforming use patterns. MIS Quarterly, 39(2), 367\u2013392.","journal-title":"MIS Quarterly"},{"key":"335_CR81","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.chb.2015.06.006","volume":"52)","author":"Y Sun","year":"2015","unstructured":"Sun, Y., Wang, N., Shen, X.-L., & Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52), 278\u2013292.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"335_CR82","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.25300\/MISQ\/2013\/37.4.07","volume":"37","author":"J Sutanto","year":"2013","unstructured":"Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37(4), 1141.","journal-title":"MIS Quarterly"},{"issue":"5","key":"335_CR83","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1037\/0021-9010.81.5.575","volume":"81","author":"W Eerde van","year":"1996","unstructured":"van Eerde, W., & Thierry, H. (1996). Vroom's expectancy models and work-related criteria: A meta-analysis. Journal of Applied Psychology, 81(5), 575\u2013586.","journal-title":"Journal of Applied Psychology"},{"key":"335_CR84","volume-title":"Work and motivation","author":"VH Vroom","year":"1964","unstructured":"Vroom, V. H. (1964). Work and motivation. New York: Wiley."},{"key":"335_CR85","volume-title":"Personal Information: Privacy and the Law","author":"R Wacks","year":"1989","unstructured":"Wacks, R. (1989). Personal Information: Privacy and the Law. Oxford: Clarendon Press."},{"key":"335_CR86","unstructured":"Weible, R. J. (1993). Privacy and data: An empirical study of the influence of types of data and situational context upon privacy perceptions. Doctoral Dissertation."},{"key":"335_CR87","doi-asserted-by":"crossref","unstructured":"Wirth, J. (2018). Dependent variables in the privacy-related field: a descriptive literature review. In T. Bui (Ed.), Proceedings of the 51st Hawaii International Conference on System Sciences, Waikoloa Village, Hawaii, pp. 3658\u20133667.","DOI":"10.24251\/HICSS.2018.463"},{"issue":"1","key":"335_CR88","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11002-006-4147-1","volume":"17","author":"E Xie","year":"2006","unstructured":"Xie, E., Teo, H.-H., & Wan, W. (2006). Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61\u201374.","journal-title":"Marketing Letters"},{"issue":"3","key":"335_CR89","doi-asserted-by":"crossref","first-page":"9942","DOI":"10.1007\/s10916-013-9942-7","volume":"37","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., He, D., & Sang, Y. (2013). Facebook as a platform for health information and communication: a case study of a diabetes group. Journal of Medical Systems, 37(3), 9942.","journal-title":"Journal of Medical Systems"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-019-00335-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12525-019-00335-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-019-00335-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T13:29:14Z","timestamp":1694698154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12525-019-00335-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":89,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["335"],"URL":"https:\/\/doi.org\/10.1007\/s12525-019-00335-0","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"13 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}