{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T09:45:31Z","timestamp":1773999931772,"version":"3.50.1"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T00:00:00Z","timestamp":1769385600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN 06273\\u20132017"],"award-info":[{"award-number":["RGPIN 06273\\u20132017"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council of Canada","doi-asserted-by":"publisher","award":["RNH01527"],"award-info":[{"award-number":["RNH01527"]}],"id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human-Computer Studies"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.ijhcs.2026.103752","type":"journal-article","created":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:22:52Z","timestamp":1769296972000},"page":"103752","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["The privacy triad: Understanding the influence of perceived social agency on privacy attitudes"],"prefix":"10.1016","volume":"210","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0887-7504","authenticated-orcid":false,"given":"Maxwell","family":"Keleher","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5167-5580","authenticated-orcid":false,"given":"Khadija","family":"Baig","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7314-2198","authenticated-orcid":false,"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijhcs.2026.103752_bib0005","series-title":"Analysis of Ordinal Categorical Data","author":"Agresti","year":"2010"},{"issue":"CSCW2","key":"10.1016\/j.ijhcs.2026.103752_bib0010","doi-asserted-by":"crossref","first-page":"116:1","DOI":"10.1145\/3415187","article-title":"Tangible privacy: towards User-Centric sensor designs for bystander privacy","volume":"4","author":"Ahmad","year":"2020","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"issue":"CSCW1","key":"10.1016\/j.ijhcs.2026.103752_bib0015","doi-asserted-by":"crossref","DOI":"10.1145\/3653693","article-title":"Computers as bad social actors: dark patterns and anti-patterns in interfaces that act socially","volume":"8","author":"Alberts","year":"2024","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0020","series-title":"Proceedings of the 2012 International Workshop on Self-Aware Internet of Things","first-page":"1","article-title":"Dynamic trust management for Internet of things applications","author":"Bao","year":"2012"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0025","series-title":"2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","first-page":"1","article-title":"Trust management for the internet of things and its application to service composition","author":"Bao","year":"2012"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0030","series-title":"Confirmatory Factor Analysis for Applied Research","author":"Brown","year":"2015"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0035","series-title":"Human-Computer Interaction. Interaction in Context","first-page":"500","article-title":"Are people polite to smartphones?","author":"Carolus","year":"2018"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0040","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.chb.2018.12.030","article-title":"Impertinent mobiles - effects of politeness and impoliteness in human-smartphone interaction","volume":"93","author":"Carolus","year":"2019","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"10.1016\/j.ijhcs.2026.103752_bib0045","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1177\/1461444818817074","article-title":"Smartphones as digital companions: characterizing the relationship between users and their phones","volume":"21","author":"Carolus","year":"2019","journal-title":"New Media Soc."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0050","series-title":"Privacy by design: the 7 foundational principles","author":"Cavoukian","year":"2010"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0055","series-title":"HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020","first-page":"305","article-title":"\u201calexa, are you spying on me?\u201d: exploring the effect of user experience on the security and privacy of smart speaker users","author":"Chalhoub","year":"2020"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0060","series-title":"Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis","author":"Charmaz","year":"2014"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0065","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"829","article-title":"Testing the media equation with children","author":"Chiasson","year":"2005"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0070","series-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","first-page":"331","article-title":"Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs","author":"Colnago","year":"2022"},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0075","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1080\/01926189708251054","article-title":"The measurement of privacy preferences within marital relationships: the relationship privacy preference scale","volume":"25","author":"Craddock","year":"1997","journal-title":"Am. J. Fam. Ther."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0080","series-title":"Communications Monitoring Report 2019","year":"2019"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0085","series-title":"Smart Speakers are Growing, but Not a Staple","author":"Dallaire","year":"2020"},{"issue":"3","key":"10.1016\/j.ijhcs.2026.103752_bib0090","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1080\/00401706.1964.10490181","article-title":"Multiple comparisons using rank sums","volume":"6","author":"Dunn","year":"1964","journal-title":"Technometrics"},{"issue":"2","key":"10.1016\/j.ijhcs.2026.103752_bib0095","first-page":"181","article-title":"Alexa, can i trust you? Exploring consumer paths to trust in smart Voice-Interaction technologies","volume":"5","author":"Foehr","year":"2020","journal-title":"J. Assoc. Consum. Res."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0100","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/764008.763957","article-title":"Persuasive technology: using computers to change what we think and do","volume":"2002","author":"Fogg","year":"2002","journal-title":"Ubiquity"},{"issue":"2000","key":"10.1016\/j.ijhcs.2026.103752_bib0105","first-page":"213","article-title":"Can we trust trust","volume":"13","author":"Gambetta","year":"2000","journal-title":"Trust: Making and breaking cooperative relations"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0110","doi-asserted-by":"crossref","first-page":"71","DOI":"10.30658\/hmc.1.5","article-title":"Building a stronger CASA: extending the computers are social actors paradigm","volume":"1","author":"Gambino","year":"2020","journal-title":"Hum.-Mach. Commun."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0115","series-title":"Modern Factor Analysis","author":"Harman","year":"1976"},{"issue":"2","key":"10.1016\/j.ijhcs.2026.103752_bib0120","first-page":"65","article-title":"A simple sequentially rejective multiple test procedure","volume":"6","author":"Holm","year":"1979","journal-title":"Scand. J. Stat."},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0125","doi-asserted-by":"crossref","first-page":"5:1","DOI":"10.1145\/3372296","article-title":"The dilemma of user engagement in privacy notices: effects of interaction modes and habituation on user attention","volume":"23","author":"Karegar","year":"2020","journal-title":"ACM Trans. Priv. Secur."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0130","series-title":"Rank Correlation Methods","author":"Kendall","year":"1955"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0135","article-title":"How should intelligent agents apologize to restore trust? Interaction effects between anthropomorphism and apology attribution on trust repair","volume":"61","author":"Kim","year":"2021","journal-title":"Telemat. Inf."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0140","series-title":"Principles and Practice of Structural Equation Modeling","author":"Kline","year":"2016"},{"issue":"260","key":"10.1016\/j.ijhcs.2026.103752_bib0145","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1080\/01621459.1952.10483441","article-title":"Use of ranks in one-criterion variance analysis","volume":"47","author":"Kruskal","year":"1952","journal-title":"J. Am. Stat. Assoc."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0150","series-title":"Data and Applications Security and Privacy XXXIII","first-page":"102","article-title":"Is my phone listening in? On the feasibility and detectability of mobile eavesdropping","author":"Kr\u00f6ger","year":"2019"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0155","series-title":"Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives","first-page":"1","article-title":"Trust in computers: the computers-are-social-actors (CASA) paradigm and trustworthiness perception in human-computer communication","author":"Lee","year":"2010"},{"issue":"4","key":"10.1016\/j.ijhcs.2026.103752_bib0160","first-page":"409","article-title":"Automation, journalism, and human\u2013machine communication: rethinking roles and relationships of humans and machines in news","volume":"7","author":"Lewis","year":"2019","journal-title":"Digit. Journal."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0165","series-title":"Information in Contemporary Society","first-page":"102","article-title":"Understanding the role of privacy and trust in intelligent personal assistant adoption","author":"Liao","year":"2019"},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0170","doi-asserted-by":"crossref","first-page":"29","DOI":"10.30658\/hmc.2.2","article-title":"Social responses to media technologies in the 21st century: the media are social actors paradigm","volume":"2","author":"Lombard","year":"2021","journal-title":"Hum.-Mach. Commun."},{"issue":"4","key":"10.1016\/j.ijhcs.2026.103752_bib0175","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"10.1016\/j.ijhcs.2026.103752_bib0180","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1207\/s15327906mbr0903_1","article-title":"DIMENSIONS OF PRIVACY PREFERENCES","volume":"9","author":"Marshall","year":"1974","journal-title":"Multivar. Behav. Res."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0185","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.chb.2019.05.009","article-title":"Hey Alexa \u2026 examine the variables influencing the use of artificial intelligent in-home voice assistants","volume":"99","author":"McLean","year":"2019","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0190","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1111\/0022-4537.00153","article-title":"Machines and mindlessness: social responses to computers","volume":"56","author":"Nass","year":"2000","journal-title":"J. Soc. Issues"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0195","series-title":"The Man Who Lied to His Laptop: What We Can Learn About Ourselves from Our Machines","author":"Nass","year":"2010"},{"key":"10.1016\/j.ijhcs.2026.103752_bib0200","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"72","article-title":"Computers are social actors","author":"Nass","year":"1994"},{"issue":"4","key":"10.1016\/j.ijhcs.2026.103752_bib0205","first-page":"21","article-title":"Privacy fatigue in the Internet of Things (IOT) environment","volume":"6","author":"Oh","year":"2019","journal-title":"IT CoNverg. PRAct."},{"issue":"3_suppl","key":"10.1016\/j.ijhcs.2026.103752_bib0210","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.2466\/pms.1979.48.3c.1291","article-title":"Dimensions of privacy","volume":"48","author":"Pedersen","year":"1979","journal-title":"Percept. Mot. Skills"},{"issue":"4","key":"10.1016\/j.ijhcs.2026.103752_bib0215","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1002\/mar.21457","article-title":"Alexa, she\u2019s not human but\u2026 unveiling the drivers of consumers\u2019 trust in voice-based artificial intelligence","volume":"38","author":"Pitardi","year":"2021","journal-title":"Psychol. & Mark."},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0220","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1146\/annurev-psych-120710-100452","article-title":"Sources of method bias in social science research and recommendations on how to control it","volume":"63","author":"Podsakoff","year":"2012","journal-title":"Annu. Rev. Psychol."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0225","series-title":"The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places","author":"Reeves","year":"1996"},{"issue":"CSCW2","key":"10.1016\/j.ijhcs.2026.103752_bib0230","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3479515","article-title":"Exploring interactions between trust, anthropomorphism, and relationship development in voice assistants","volume":"5","author":"Seymour","year":"2021","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0235","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in internet of things: the road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"issue":"2","key":"10.1016\/j.ijhcs.2026.103752_bib0240","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals\u2019 concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.ijhcs.2026.103752_bib0250","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1037\/gpr0000046","article-title":"Trust: an integrative review from a person\u2013situation perspective","volume":"19","author":"Thielmann","year":"2015","journal-title":"Rev. Gen. Psychol."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0255","author":"van den Berg"},{"issue":"2","key":"10.1016\/j.ijhcs.2026.103752_bib0260","doi-asserted-by":"crossref","first-page":"355","DOI":"10.25300\/MISQ\/2018\/14124","article-title":"Tuning out security warnings: a longitudinal examination of habituation through fMRI, eye tracking, and field experiments","volume":"42","author":"Vance","year":"2018","journal-title":"MIS Q."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0265","series-title":"Privacy as Trust: Information Privacy for an Information Age","author":"Waldman","year":"2018"},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0270","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin","year":"1968","journal-title":"Wash. Lee Law Rev."},{"key":"10.1016\/j.ijhcs.2026.103752_bib0275","series-title":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","first-page":"181","article-title":"Privacy is the boring bit: user perceptions and behaviour in the internet-of-things","author":"Williams","year":"2017"},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0280","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1111\/1467-839X.00030","article-title":"Trust, gullibility, and social intelligence","volume":"2","author":"Yamagishi","year":"1999","journal-title":"Asian J. Soc. Psychol."},{"issue":"1","key":"10.1016\/j.ijhcs.2026.103752_bib0285","first-page":"37","article-title":"Information privacy paradox and fatigue in IOT","volume":"1","author":"Ziar","year":"2019","journal-title":"Kardan J. Eng. Technol."}],"container-title":["International Journal of Human-Computer Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581926000273?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581926000273?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T06:22:59Z","timestamp":1773987779000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1071581926000273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":56,"alternative-id":["S1071581926000273"],"URL":"https:\/\/doi.org\/10.1016\/j.ijhcs.2026.103752","relation":{},"ISSN":["1071-5819"],"issn-type":[{"value":"1071-5819","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The privacy triad: Understanding the influence of perceived social agency on privacy attitudes","name":"articletitle","label":"Article Title"},{"value":"International Journal of Human-Computer Studies","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijhcs.2026.103752","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"103752"}}