{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T16:32:21Z","timestamp":1773765141705,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,10,21]],"date-time":"2014-10-21T00:00:00Z","timestamp":1413849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s12599-014-0351-3","type":"journal-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T04:28:32Z","timestamp":1413952112000},"page":"339-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["The Economic Impact of Privacy Violations and Security Breaches"],"prefix":"10.1007","volume":"6","author":[{"given":"Michael","family":"Nofer","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Hinz","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Muntermann","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Ro\u00dfnagel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,21]]},"reference":[{"issue":"6","key":"351_CR1","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/s00779-004-0305-8","volume":"8","author":"M Ackerman","year":"2004","unstructured":"Ackerman M (2004) Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing 8(6):430\u2013439","journal-title":"Personal and Ubiquitous Computing"},{"key":"351_CR2","volume-title":"Proc 27th international conference on information systems, Milwaukee","author":"A Acquisti","year":"2006","unstructured":"Acquisti A, Friedman A, Telang R (2006) Is there a cost to privacy breaches? An event study. In: Proc 27th international conference on information systems, Milwaukee"},{"issue":"1","key":"351_CR3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSP.2010.37","volume":"8","author":"FK Andoh-Baidoo","year":"2010","unstructured":"Andoh-Baidoo FK, Amoako-Gyampah K, Osei-Bryson KM (2010) How Internet security breaches harm market value. IEEE Security and Privacy 8(1):36\u201342","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"351_CR4","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1162\/003355301556400","volume":"116","author":"BM Barber","year":"2001","unstructured":"Barber BM, Odean T (2001) Boys will be boys: gender, overconfidence, and common stock investment. Quarterly Journal of Economics 116(1):261\u2013292","journal-title":"Quarterly Journal of Economics"},{"issue":"3-4","key":"351_CR5","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","volume":"11","author":"F Belanger","year":"2002","unstructured":"Belanger F, Hiller JS, Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11(3-4):245\u2013270","journal-title":"Journal of Strategic Information Systems"},{"issue":"5","key":"351_CR6","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman S, Johnson EJ, Kobrin SJ, Lohse GL (2004) International differences in information privacy concerns: a global survey of consumers. Information Society 20(5):313\u2013324","journal-title":"Information Society"},{"issue":"4","key":"351_CR7","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt B, G\u00fcnther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM 48(4):101\u2013106","journal-title":"Communications of the ACM"},{"issue":"1","key":"351_CR8","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1006\/game.1995.1027","volume":"10","author":"J Berg","year":"1995","unstructured":"Berg J, Dickhaut J, McCabe K (1995) Trust, reciprocity, and social history. Games and Economic Behavior 10(1):122\u2013142","journal-title":"Games and Economic Behavior"},{"issue":"1","key":"351_CR9","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/07421222.2002.11045715","volume":"19","author":"A Bhattacherjee","year":"2002","unstructured":"Bhattacherjee A (2002) Individual trust in online firms: scale development and initial test. Journal of Management Information Systems 19(1):211\u2013241","journal-title":"Journal of Management Information Systems"},{"key":"351_CR10","unstructured":"Bilton N, Stelter B (2011) Sony says PlayStation hacker got personal data. http:\/\/www.nytimes.com\/2011\/04\/27\/technology\/27playstation.html?_r=0 . Accessed 2013-09-23"},{"issue":"1","key":"351_CR11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1023\/A:1004930101743","volume":"45","author":"F Bolle","year":"1998","unstructured":"Bolle F (1998) Rewarding trust: an experimental study. Theory and Decision 45(1):83\u201398","journal-title":"Theory and Decision"},{"key":"351_CR12","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/j.jebo.2007.10.006","volume":"68","author":"NR Buchan","year":"2008","unstructured":"Buchan NR, Croson RTA, Solnick S (2008) Trust and gender: an examination of behavior and beliefs in the investment game. Journal of Economic Behavior & Organization 68:466\u2013476","journal-title":"Journal of Economic Behavior & Organization"},{"key":"351_CR13","doi-asserted-by":"crossref","DOI":"10.1515\/9781400830213","volume-title":"The econometrics of financial markets","author":"JY Campbell","year":"1997","unstructured":"Campbell JY, Lo AW, MacKinlay AC (1997) The econometrics of financial markets. Princeton University Press, Princeton"},{"issue":"1","key":"351_CR14","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10864415.2004.11044320","volume":"9","author":"H Cavusoglu","year":"2004","unstructured":"Cavusoglu H, Mishra B, Raghunathan S (2004) The effect of Internet security breach announcements on market value: capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce 9(1):69\u2013104","journal-title":"International Journal of Electronic Commerce"},{"issue":"2","key":"351_CR15","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1086\/209001","volume":"11","author":"TL Childers","year":"1984","unstructured":"Childers TL, Houston MJ (1984) Conditions for a picture-superiority effect on consumer memory. Journal of Consumer Research 11(2):643\u2013654","journal-title":"Journal of Consumer Research"},{"issue":"3","key":"351_CR16","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1461444808101618","volume":"11","author":"H Cho","year":"2009","unstructured":"Cho H, Rivera-S\u00e1nchez M, Lim SS (2009) A multinational study on online privacy: global concerns and local responses. New Media & Society 11(3):395\u2013416","journal-title":"New Media & Society"},{"issue":"2","key":"351_CR17","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1111\/j.1540-6261.1975.tb01834.x","volume":"30","author":"RA Cohn","year":"1975","unstructured":"Cohn RA, Lewellen WG, Lease RC, Schlarbaum GG (1975) Individual investor risk aversion and investment portfolio composition. Journal of Finance 30(2):605\u2013620","journal-title":"Journal of Finance"},{"issue":"3","key":"351_CR18","doi-asserted-by":"crossref","first-page":"341","DOI":"10.2307\/249775","volume":"17","author":"MJ Culnan","year":"1993","unstructured":"Culnan MJ (1993) How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17(3):341\u2013364","journal-title":"MIS Quarterly"},{"issue":"1","key":"351_CR19","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 10(1):104\u2013115","journal-title":"Organization Science"},{"issue":"4","key":"351_CR20","doi-asserted-by":"crossref","first-page":"673","DOI":"10.2307\/20650322","volume":"33","author":"MJ Culnan","year":"2009","unstructured":"Culnan MJ, Williams CC (2009) How ethics can enhance organizational privacy: lessons from the choice point and TJX data breaches. MIS Quarterly 33(4):673\u2013687","journal-title":"MIS Quarterly"},{"issue":"3","key":"351_CR21","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1111\/j.1540-6261.1985.tb05004.x","volume":"40","author":"WFM Bondt De","year":"1985","unstructured":"De Bondt WFM, Thaler R (1985) Does the stock market overreact? Journal of Finance 40(3):793\u2013805","journal-title":"Journal of Finance"},{"key":"351_CR22","doi-asserted-by":"crossref","first-page":"57","DOI":"10.4018\/jgim.2006100103","volume":"14:4","author":"T Dinev","year":"2006","unstructured":"Dinev T, Bellotto M, Hart P, Russo V, Serra I, Colautti C (2006) Internet users\u2019 privacy concerns and beliefs about government surveillance: an exploratory study of differences between Italy and the United States. Journal of Global Information Management 14:4:57\u201393","journal-title":"Journal of Global Information Management"},{"issue":"2","key":"351_CR23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1002\/dir.10053","volume":"17","author":"CJ Dommeyer","year":"2003","unstructured":"Dommeyer CJ, Gross BL (2003) What consumers know and what they do: an investigation of consumer knowledge, awareness, and use of protection strategies. Journal of Interactive Marketing 17(2):34\u201351","journal-title":"Journal of Interactive Marketing"},{"issue":"8","key":"351_CR24","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","volume":"59","author":"MA Eastlick","year":"2006","unstructured":"Eastlick MA, Lotz SL, Warrington P (2006) Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59(8):877\u2013886","journal-title":"Journal of Business Research"},{"issue":"3","key":"351_CR25","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1006\/game.1994.1021","volume":"6","author":"R Forsythe","year":"1994","unstructured":"Forsythe R, Horowitz JL, Savin NE, Sefton M (1994) Fairness in simple bargaining experiments. Games and Economic Behavior 6(3):347\u2013369","journal-title":"Games and Economic Behavior"},{"issue":"1","key":"351_CR26","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1177\/074391569501200111","volume":"12","author":"ER Foxman","year":"1993","unstructured":"Foxman ER, Kilcoyne P (1993) Information technology, marketing practice, and consumer privacy: ethical issues. Journal of Public Policy & Marketing 12(1):106\u2013119","journal-title":"Journal of Public Policy & Marketing"},{"issue":"2","key":"351_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1252265","volume":"58","author":"S Ganesan","year":"1994","unstructured":"Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing 58(2):1\u201319","journal-title":"Journal of Marketing"},{"issue":"6","key":"351_CR28","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","volume":"28","author":"D Gefen","year":"2000","unstructured":"Gefen D (2000) E-commerce: the role of familiarity and trust. Omega 28(6):725\u2013737","journal-title":"Omega"},{"issue":"1","key":"351_CR29","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly 27(1):51\u201390","journal-title":"MIS Quarterly"},{"issue":"3","key":"351_CR30","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1177\/009102609802700303","volume":"27","author":"JA Gilbert","year":"1998","unstructured":"Gilbert JA, Tang TLP (1998) An examination of organizational trust antecedents. Public Personnel Management 27(3):321\u2013338","journal-title":"Public Personnel Management"},{"issue":"1","key":"351_CR31","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1177\/074391569101000111","volume":"10","author":"C Goodwin","year":"1991","unstructured":"Goodwin C (1991) Privacy: recognition of a consumer right. Journal of Public Policy & Marketing 10(1):149\u2013166","journal-title":"Journal of Public Policy & Marketing"},{"key":"351_CR32","doi-asserted-by":"crossref","first-page":"94","DOI":"10.2307\/1251163","volume":"46","author":"GJ Gorn","year":"1982","unstructured":"Gorn GJ (1982) The effects of music in advertising on choice behavior: a classical conditioning approach. Journal of Marketing 46:94\u2013101","journal-title":"Journal of Marketing"},{"issue":"3","key":"351_CR33","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1086\/228311","volume":"91","author":"M Granovetter","year":"1985","unstructured":"Granovetter M (1985) Economic action and social structure: a theory of embeddedness. American Journal of Sociology 91(3):481\u2013510","journal-title":"American Journal of Sociology"},{"issue":"6","key":"351_CR34","doi-asserted-by":"crossref","first-page":"171","DOI":"10.17705\/1jais.00068","volume":"6","author":"KE Greenaway","year":"2005","unstructured":"Greenaway KE, Chan YE (2005) Theoretical explanations for firms\u2019 information privacy behavior. Journal of the Association for Information Systems 6(6):171\u2013198","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"351_CR35","doi-asserted-by":"crossref","first-page":"81","DOI":"10.2307\/23043490","volume":"35","author":"O Hinz","year":"2011","unstructured":"Hinz O, Hann IH, Spann M (2011) Price discrimination in e-commerce? An examination of dynamic pricing in name-your-own-price markets. MIS Quarterly 35(1):81\u201398","journal-title":"MIS Quarterly"},{"issue":"2","key":"351_CR36","doi-asserted-by":"crossref","first-page":"379","DOI":"10.5465\/amr.1995.9507312923","volume":"20","author":"LT Hosmer","year":"1995","unstructured":"Hosmer LT (1995) Trust: the connecting link between organizational theory and philosophical ethics. Academy of Management Review 20(2):379\u2013403","journal-title":"Academy of Management Review"},{"issue":"5","key":"351_CR37","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1086\/656423","volume":"37","author":"LK John","year":"2011","unstructured":"John LK, Acquisti A, Loewenstein G (2011) Strangers on a plane: context-dependent willingness to divulge sensitive information. Journal of Consumer Research 37(5):858\u2013873","journal-title":"Journal of Consumer Research"},{"issue":"1","key":"351_CR38","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1037\/0022-3514.45.1.20","volume":"45","author":"EJ Johnson","year":"1983","unstructured":"Johnson EJ, Tversky A (1983) Affect, generalization, and the perception of risk. Journal of Personality and Social Psychology 45(1):20\u201331","journal-title":"Journal of Personality and Social Psychology"},{"key":"351_CR39","volume-title":"Frontiers of electronic commerce","author":"R Kalakota","year":"1996","unstructured":"Kalakota R, Whinston AB (1996) Frontiers of electronic commerce. Addison-Wesley, Reading"},{"issue":"3","key":"351_CR40","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1177\/002200277001400307","volume":"14","author":"HW Kee","year":"1970","unstructured":"Kee HW, Knox RE (1970) Conceptual and methodological considerations in the study of trust and suspicion. Journal of Conflict Resolution 14(3):357\u2013366","journal-title":"Journal of Conflict Resolution"},{"key":"351_CR41","unstructured":"Kelly H (2013) Twitter hacked; 250,000 accounts affected. http:\/\/edition.cnn.com\/2013\/02\/01\/tech\/social-media\/twitter-hacked\/index.html . Accessed 2013-09-23"},{"issue":"2","key":"351_CR42","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim DJ, Ferrin DL, Raghav Rao H (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44(2):544\u2013564","journal-title":"Decision Support Systems"},{"issue":"1","key":"351_CR43","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.im.2004.01.003","volume":"42","author":"C Liu","year":"2005","unstructured":"Liu C, Marchewka JT, Lu J, Yu C (2005) Beyond concern \u2013 a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42(1):289\u2013304","journal-title":"Information & Management"},{"issue":"2","key":"351_CR44","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.dss.2010.02.008","volume":"49","author":"X Luo","year":"2010","unstructured":"Luo X, Li H, Zhang J, Shim JP (2010) Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems 49(2):222\u2013234","journal-title":"Decision Support Systems"},{"issue":"1","key":"351_CR45","first-page":"13","volume":"35","author":"AC MacKinlay","year":"1997","unstructured":"MacKinlay AC (1997) Event studies in economics and finance. Journal of Economic Literature 35(1):13\u201339","journal-title":"Journal of Economic Literature"},{"issue":"3","key":"351_CR46","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20(3):709\u2013734","journal-title":"Academy of Management Review"},{"issue":"2","key":"351_CR47","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/10864415.2001.11044235","volume":"6","author":"DH McKnight","year":"2001\u20132002","unstructured":"McKnight DH, Chervany NL (2001\u20132002) What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. International Journal of Electronic Commerce 6(2):35\u201359","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"351_CR48","doi-asserted-by":"crossref","first-page":"473","DOI":"10.5465\/amr.1998.926622","volume":"23","author":"DH McKnight","year":"1998","unstructured":"McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new organizational relationships. Academy of Management Review 23(3):473\u2013490","journal-title":"Academy of Management Review"},{"issue":"3\u20134","key":"351_CR49","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/S0963-8687(02)00020-3","volume":"11","author":"DH McKnight","year":"2002","unstructured":"McKnight DH, Choudhury V, Kacmar C (2002) The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems 11(3\u20134):297\u2013323","journal-title":"Journal of Strategic Information Systems"},{"issue":"12","key":"351_CR50","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/219663.219683","volume":"38","author":"SJ Milberg","year":"1995","unstructured":"Milberg SJ, Burke SJ, Smith HJ, Kallman EA (1995) Values, personal information, privacy and regulatory approaches. Communications of the ACM 38(12):65\u201374","journal-title":"Communications of the ACM"},{"issue":"1","key":"351_CR51","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1287\/orsc.11.1.35.12567","volume":"11","author":"SJ Milberg","year":"2000","unstructured":"Milberg SJ, Smith HJ, Burke SJ (2000) Information privacy: corporate management and national regulation. Organization Science 11(1):35\u201357","journal-title":"Organization Science"},{"issue":"1","key":"351_CR52","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9","volume":"13","author":"GR Milne","year":"1999","unstructured":"Milne GR, Boza ME (1999) Trust and concern in consumers\u2019 perceptions of marketing information management practices. Journal of Interactive Marketing 13(1):5\u201324","journal-title":"Journal of Interactive Marketing"},{"key":"351_CR53","unstructured":"Morales L (2011) Google and Facebook users skew young, affluent, and educated. http:\/\/www.gallup.com\/poll\/146159\/facebook-google-users-skew-young-affluent-educated.aspx . Accessed 2013-09-23"},{"issue":"1","key":"351_CR54","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg PA, Horne DR, Horne AA (2007) The privacy paradox: personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs 41(1):100\u2013126","journal-title":"The Journal of Consumer Affairs"},{"issue":"1","key":"351_CR55","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"PA Pavlou","year":"2004","unstructured":"Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Information Systems Research 15(1):37\u201359","journal-title":"Information Systems Research"},{"issue":"1","key":"351_CR56","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J Phelps","year":"2000","unstructured":"Phelps J (2000) Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing 19(1):27\u201341","journal-title":"Journal of Public Policy & Marketing"},{"issue":"3","key":"351_CR57","doi-asserted-by":"crossref","first-page":"383","DOI":"10.2307\/3478805","volume":"48","author":"WL Prosser","year":"1960","unstructured":"Prosser WL (1960) Privacy. California Law Review 48(3):383\u2013423","journal-title":"California Law Review"},{"issue":"5","key":"351_CR58","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1037\/h0031464","volume":"26","author":"JB Rotter","year":"1971","unstructured":"Rotter JB (1971) Generalized expectancies for interpersonal trust. American Psychologist 26(5):443\u2013452","journal-title":"American Psychologist"},{"issue":"3","key":"351_CR59","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/AMR.1998.926617","volume":"23","author":"DM Rousseau","year":"1998","unstructured":"Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Academy of Management Review 23(3):393\u2013404","journal-title":"Academy of Management Review"},{"issue":"3","key":"351_CR60","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1037\/0022-3514.45.3.513","volume":"45","author":"N Schwartz","year":"1983","unstructured":"Schwartz N, Clore GL (1983) Mood, misattribution, and judgments of well-being: informative and directive functions of affective states. Journal of Personality and Social Psychology 45(3):513\u2013523","journal-title":"Journal of Personality and Social Psychology"},{"key":"351_CR61","unstructured":"Silveira V (2012) Taking steps to protect our members. http:\/\/blog.linkedin.com\/2012\/06\/07\/taking-steps-to-protect-our-members\/ . Accessed: 2013-09-23"},{"issue":"7","key":"351_CR62","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1108\/07363760310506175","volume":"20","author":"T Singh","year":"2003","unstructured":"Singh T, Hill ME (2003) Consumer privacy and the Internet in Europe: a view from Germany. Journal of Consumer Marketing 20(7):634\u2013651","journal-title":"Journal of Consumer Marketing"},{"issue":"2","key":"351_CR63","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith HJ, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quarterly 20(2):167\u2013196","journal-title":"MIS Quarterly"},{"issue":"4","key":"351_CR64","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35(4):989\u20131015","journal-title":"MIS Quarterly"},{"issue":"3","key":"351_CR65","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review 154(3):477\u2013560","journal-title":"University of Pennsylvania Law Review"},{"key":"351_CR66","volume-title":"Proc 3rd ACM conference on electronic commerce, New York","author":"S Spiekermann","year":"2001","unstructured":"Spiekermann S, Grossklags J, Berendt B (2001) E-privacy in second generation e-commerce: privacy preferences versus actual behavior. In: Proc 3rd ACM conference on electronic commerce, New York"},{"issue":"6","key":"351_CR67","doi-asserted-by":"crossref","first-page":"18","DOI":"10.2469\/faj.v55.n6.2311","volume":"55","author":"M Statman","year":"1999","unstructured":"Statman M (1999) Behavioral finance: past battle and future engagements. Financial Analysts Journal 55(6):18\u201327","journal-title":"Financial Analysts Journal"},{"issue":"2","key":"351_CR68","doi-asserted-by":"crossref","first-page":"143","DOI":"10.2307\/248772","volume":"14","author":"DW Straub","year":"1990","unstructured":"Straub DW, Collins RW (1990) Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly 14(2):143\u2013156","journal-title":"MIS Quarterly"},{"issue":"3","key":"351_CR69","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1080\/10864415.2003.11044270","volume":"7","author":"B Suh","year":"2003","unstructured":"Suh B, Han I (2003) The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce 7(3):135\u2013161","journal-title":"International Journal of Electronic Commerce"},{"issue":"2","key":"351_CR70","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"J Tsai","year":"2011","unstructured":"Tsai J, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research 22(2):254\u2013268","journal-title":"Information Systems Research"},{"key":"351_CR71","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin A (1967) Privacy and freedom. Atheneum Books, New York"},{"issue":"3","key":"351_CR72","doi-asserted-by":"crossref","first-page":"647","DOI":"10.2307\/256087","volume":"25","author":"RW Woodman","year":"1982","unstructured":"Woodman RW, Ganster DC, Adams J, McCuddy MK, Tolchinsky PD, Fromkin H (1982) A survey of employee perceptions of information privacy in organizations. Academy of Management Journal 25(3):647\u2013663","journal-title":"Academy of Management Journal"},{"issue":"3","key":"351_CR73","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0148-2963(93)90027-M","volume":"27","author":"E Yoon","year":"1993","unstructured":"Yoon E, Guffey HJ, Kijewski V (1993) The effects of information and company reputation on intentions to buy a business service. Journal of Business Research 27(3):215\u2013228","journal-title":"Journal of Business Research"},{"issue":"298","key":"351_CR74","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1080\/01621459.1962.10480664","volume":"57","author":"A Zellner","year":"1962","unstructured":"Zellner A (1962) An efficient method of estimating seemingly unrelated regressions and tests for aggregation bias. Journal of the American Statistical Association 57(298):348\u2013368","journal-title":"Journal of the American Statistical Association"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-014-0351-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12599-014-0351-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-014-0351-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T01:36:25Z","timestamp":1598405785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12599-014-0351-3"}},"subtitle":["A Laboratory Experiment"],"short-title":[],"issued":{"date-parts":[[2014,10,21]]},"references-count":74,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["351"],"URL":"https:\/\/doi.org\/10.1007\/s12599-014-0351-3","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,21]]}}}