{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T14:16:49Z","timestamp":1770214609635,"version":"3.49.0"},"reference-count":81,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Information Management"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.ijinfomgt.2025.103028","type":"journal-article","created":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T14:14:04Z","timestamp":1767449644000},"page":"103028","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Exploring information sharing intention of employees through privacy calculus perspective: A mixed-methods approach"],"prefix":"10.1016","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3655-8654","authenticated-orcid":false,"given":"Abdul","family":"Khader V","sequence":"first","affiliation":[]},{"given":"Sreejith","family":"S S","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib1","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1037\/0021-9010.91.1.221","article-title":"Information privacy in organizations: Empowering creative and extrarole performance","volume":"91","author":"Alge","year":"2006","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/1748-8583.12090","article-title":"HR and analytics: Why HR is set to fail the big data challenge","volume":"26","author":"Angrave","year":"2016","journal-title":"Human Resource Management Journal"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib4","first-page":"1","article-title":"Enhancing organizational performance through HR analytics capabilities: Mediating influence of innovative capability and moderating role of technological turbulence","author":"Arora","year":"2024","journal-title":"The International Journal of Human Resource Management"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib5","article-title":"Privacy or trust: Understanding the privacy paradox in users intentions towards e-pharmacy adoption through the lens of privacy-calculus model","author":"Ashrafi","year":"2024","journal-title":"Journal of Science and Technology Policy Management"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib6","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1108\/BIJ-06-2022-0401","article-title":"Human resources analytics: Where do we go from here?","volume":"31","author":"Bahuguna","year":"2024","journal-title":"Benchmarking: An International Journal"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib7","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","article-title":"The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online","volume":"49","author":"Bansal","year":"2010","journal-title":"Decision Support Systems"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1111\/jcom.12276","article-title":"Online privacy concerns and privacy management: A meta-analytical review","volume":"67","author":"Baruh","year":"2017","journal-title":"Journal of Communication"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib9","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1037\/pspi0000254","article-title":"Human \u201cresources\u201d? Objectification at work","volume":"120","author":"Belmi","year":"2021","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qualitative Research in Psychology"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib11","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1080\/2159676X.2019.1704846","article-title":"To saturate or not to saturate? Questioning data saturation as a useful concept for thematic analysis and sample-size rationales","volume":"13","author":"Braun","year":"2021","journal-title":"Qualitative Research in Sport, Exercise and Health"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib12","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s10796-016-9667-5","article-title":"Privacy and biometrics: An empirical examination of employee concerns","volume":"20","author":"Carpenter","year":"2018","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib13","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1108\/IMDS-07-2014-0197","article-title":"Exploring privacy and trust for employee monitoring","volume":"115","author":"Chang","year":"2015","journal-title":"Industrial Management Data Systems"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib14","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1108\/IJM-02-2021-0087","article-title":"Examining the dark side of human resource analytics: An empirical investigation using the privacy calculus approach","volume":"43","author":"Chatterjee","year":"2022","journal-title":"International Journal of Manpower"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib15","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1108\/OIR-03-2024-0135","article-title":"Weighing user\u2019s privacy calculus on personal information disclosure: The moderating effect of social media identification","volume":"49","author":"Chen","year":"2025","journal-title":"Online Information Review"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2025.103028_bib16","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1080\/14719037.2010.525033","article-title":"Exploring the relationships among trust, employee satisfaction, and organizational commitment","volume":"13","author":"Cho","year":"2011","journal-title":"Public Management Review"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib17","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10672-015-9267-4","article-title":"Organizational surveillance of computer-mediated workplace communication: Employee privacy concerns and responses","volume":"28","author":"Chory","year":"2016","journal-title":"Employee Responsibilities and Rights Journal"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib18","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1177\/0092070305284975","article-title":"The influence of corporate character on customers and employees: Exploring similarities and differences","volume":"34","author":"Chun","year":"2006","journal-title":"Journal of the Academy of Marketing Science"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib19","series-title":"Statistical power analysis for the behavioral sciences","author":"Cohen","year":"2013"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib20","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S1567-4223(03)00024-3","article-title":"Trust and e-commerce: A study of consumer perceptions","volume":"2","author":"Corbitt","year":"2003","journal-title":"Electronic Commerce Research and Applications"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib21","article-title":"Sage publications","author":"Creswell","year":"2017","journal-title":"Designing and Conducting Mixed Methods Research"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib22","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","volume":"10","author":"Culnan","year":"1999","journal-title":"Organization Science"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib23","doi-asserted-by":"crossref","DOI":"10.1016\/j.techfore.2021.121092","article-title":"CB-SEM vs PLS-SEM methods for research in social sciences and technology forecasting","volume":"173","author":"Dash","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2025.103028_bib24","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1080\/10919392.2024.2398889","article-title":"Fostering information sharing willingness: An organizational privacy calculus for industry 4.0 supply chains","volume":"34","author":"Dey","year":"2024","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib25","doi-asserted-by":"crossref","unstructured":"Dhankhar, K., & Singh, A. (2023). Employees\u2019 adoption of HR analytics\u2013a theoretical framework based on career construction theory. 11(3), 395\u2013411..","DOI":"10.1108\/EBHRM-02-2022-0053"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib26","article-title":"Disrupting human resource management with people analytics: A study of applications, value, enablers and barriers in Italy","author":"Di Lauro","year":"2024","journal-title":"Personnel Review"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib27","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib28","doi-asserted-by":"crossref","DOI":"10.1016\/j.tele.2021.101717","article-title":"Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online?","volume":"65","author":"Fernandes","year":"2021","journal-title":"Telematics and Informatics"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib29","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1108\/CR-12-2019-0163","article-title":"Tackling the HR digitalization challenge: Key factors and barriers to HR analytics adoption","volume":"31","author":"Fernandez","year":"2021","journal-title":"Competitiveness Review: An International Business Journal"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib30","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","article-title":"Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior","volume":"77","author":"Gerber","year":"2018","journal-title":"Computers Security"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib31","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1177\/014920639001600208","article-title":"Organizational justice: Yesterday, today, and tomorrow","volume":"16","author":"Greenberg","year":"1990","journal-title":"Journal of Management"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib32","doi-asserted-by":"crossref","unstructured":"Hair, J.F., Babin, B.J., Ringle, C.M., Sarstedt, M., & Becker, J.-M. (2025). Covariance-based structural equation modeling (CB-SEM): A SmartPLS 4 software tutorial: JF Hair et al.","DOI":"10.1057\/s41270-025-00414-6"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib33","article-title":"Exploratory factor analysis","volume":"7","author":"Hair","year":"2014","journal-title":"Multivariate Data Analysis"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib34","series-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair","year":"2021"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib35","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1080\/14649357.2011.545631","article-title":"Discipline, surveillance, control: A Foucaultian perspective on the enforcement of planning regulations","volume":"12","author":"Harris","year":"2011","journal-title":"Planning Theory Practice"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib36","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.ijinfomgt.2012.10.009","article-title":"The effects of individual motivations and social capital on employees\u2019 tacit and explicit knowledge sharing intentions","volume":"33","author":"Hau","year":"2013","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11135-018-0689-6","article-title":"Partial least squares path modeling: Quo vadis?","volume":"52","author":"Henseler","year":"2018","journal-title":"Quality Quantity"},{"issue":"5\u20136","key":"10.1016\/j.ijinfomgt.2025.103028_bib38","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1080\/02642069.2018.1437908","article-title":"Determinants of consumers\u2019 intentions to use smartphones apps for flight ticket bookings","volume":"39","author":"Jeon","year":"2019","journal-title":"The Service Industries Journal"},{"issue":"12","key":"10.1016\/j.ijinfomgt.2025.103028_bib39","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1016\/j.ijhcs.2013.08.016","article-title":"Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior","volume":"71","author":"Keith","year":"2013","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib40","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1177\/030630701704200205","article-title":"The paradox of human resource analytics: Being mindful of employees","volume":"42","author":"Khan","year":"2016","journal-title":"Journal of General Management"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib41","series-title":"Principles and practice of structural equation modeling","author":"Kline","year":"2023"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib42","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"Journal of Information Technology"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib43","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.ijinfomgt.2014.02.002","article-title":"Data quality management, data usage experience and acquisition intention of big data analytics","volume":"34","author":"Kwon","year":"2014","journal-title":"International Journal of Information Management"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib44","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.phrp.2014.04.006","article-title":"Factors affecting hospital employees\u2019 knowledge sharing intention and behavior, and innovation behavior","volume":"5","author":"Lee","year":"2014","journal-title":"Osong Public Health and Research Perspectives"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib45","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.ijmedinf.2015.12.010","article-title":"Examining individuals\u2019 adoption of healthcare wearable devices: An empirical study from privacy calculus perspective","volume":"88","author":"Li","year":"2016","journal-title":"International Journal of Medical Informatics"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib46","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","article-title":"Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior","volume":"45","author":"Li","year":"2019","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib47","first-page":"28","article-title":"Empirical studies on online information privacy concerns: Literature review and an integrative framework","volume":"28","author":"Li","year":"2011","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib48","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1177\/0266666913516884","article-title":"Understanding antecedents to perceived information risks: An empirical study of the Korean telecommunications market","volume":"32","author":"Libaque-S\u00e1enz","year":"2016","journal-title":"Information Development"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib49","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.ijinfomgt.2010.07.006","article-title":"An empirical investigation of mobile banking adoption: The effect of innovation attributes and knowledge-based trust","volume":"31","author":"Lin","year":"2011","journal-title":"International Journal of Information Management"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2025.103028_bib50","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1111\/j.1468-2958.2002.tb00826.x","article-title":"Content analysis in mass communication: Assessment and reporting of intercoder reliability","volume":"28","author":"Lombard","year":"2002","journal-title":"Human Communication Research"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib51","first-page":"48","article-title":"The impact of privacy calculus and trust on user information participation behavior in AI-based medical consultation-the moderating role of gender","volume":"24","author":"Luo","year":"2023","journal-title":"Journal of Electronic Commerce Research"},{"issue":"6","key":"10.1016\/j.ijinfomgt.2025.103028_bib52","doi-asserted-by":"crossref","first-page":"2416","DOI":"10.1108\/BFJ-11-2023-0989","article-title":"Consumers\u2019 intentions to utilize smartphone diet applications: An integration of the privacy calculus model with self-efficacy, trust and experience","volume":"126","author":"Mohammed","year":"2024","journal-title":"British Food Journal"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib53","doi-asserted-by":"crossref","DOI":"10.34218\/JOM.6.3.2019.007","article-title":"HR analytics: A modern tool in HR for predictive decision making","volume":"6","author":"Mohammed","year":"2019","journal-title":"Journal of Management"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib54","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum","year":"2004","journal-title":"Washington L Rev"},{"issue":"10","key":"10.1016\/j.ijinfomgt.2025.103028_bib55","doi-asserted-by":"crossref","first-page":"273","DOI":"10.3390\/socsci8100273","article-title":"Big data and human resources management: The rise of talent analytics","volume":"8","author":"Nocker","year":"2019","journal-title":"Social Sciences"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2025.103028_bib56","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/s10488-013-0528-y","article-title":"Purposeful sampling for qualitative data collection and analysis in mixed method implementation research","volume":"42","author":"Palinkas","year":"2015","journal-title":"Administration and Policy in Mental Health and Mental Health Services Research"},{"issue":"11","key":"10.1016\/j.ijinfomgt.2025.103028_bib57","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1080\/1369118X.2023.2285462","article-title":"A privacy calculus model perspective that explains why parents sharent","volume":"27","author":"Peng","year":"2024","journal-title":"Information, Communication Society"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib58","series-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio","year":"2002"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2025.103028_bib59","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: A critical review of the literature and recommended remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2025.103028_bib60","first-page":"1","article-title":"HR analytics and the data collection process: The role of attributions and perceived legitimacy in explaining employees\u2019 fear of datafication","volume":"12","author":"Rigamonti","year":"2024","journal-title":"Journal of Organizational Effectiveness: People and Performance"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib61","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change1","volume":"91","author":"Rogers","year":"1975","journal-title":"The Journal of Psychology"},{"issue":"7","key":"10.1016\/j.ijinfomgt.2025.103028_bib62","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1108\/01437731011079673","article-title":"Servant leadership as antecedent of trust in organizations","volume":"31","author":"Sendjaya","year":"2010","journal-title":"Leadership Organization Development Journal"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib63","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1080\/15378020.2022.2086420","article-title":"Application of Theory of Planned Behavior (TPB) on fast-food consumption preferences among generation Z in Dhaka City, Bangladesh: An empirical study","volume":"27","author":"Shetu","year":"2024","journal-title":"Journal of Foodservice Business Research"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2025.103028_bib64","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1504\/IJKMS.2023.133866","article-title":"Examining the role of organisational trust on information sharing intention and human resource analytics outcomes: An empirical study","volume":"14","author":"Singh","year":"2023","journal-title":"International Journal of Knowledge Management Studies"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib65","doi-asserted-by":"crossref","unstructured":"\u0160inik, T., Beerepoot, I., & Reijers, H.A. (2023). A peek into the working day: Comparing techniques for recording employee behaviour. 343\u2013359.","DOI":"10.1007\/978-3-031-33080-3_21"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib66","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: An interdisciplinary review","author":"Smith","year":"2011","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib67","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals\u2019 concerns about organizational practices","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2025.103028_bib68","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1037\/0021-9010.88.3.518","article-title":"Recovery, work engagement, and proactive behavior: A new look at the interface between nonwork and work","volume":"88","author":"Sonnentag","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib69","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1080\/00273170802620238","article-title":"Estimating an effect size in one-way multivariate analysis of variance (MANOVA)","volume":"44","author":"Steyn","year":"2009","journal-title":"Multivariate Behavioral Research"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib70","series-title":"Sage handbook of mixed methods in social & behavioral research","author":"Tashakkori","year":"2010"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib71","article-title":"Trends and challenges towards an effective data-driven decision making in UK SMEs: Case studies and lessons learnt from the analysis of 85 SMEs","author":"Tawil","year":"2023","journal-title":"arXiv Preprint arXiv:2305 15454"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib72","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ijinfomgt.2018.08.002","article-title":"People analytics\u2014A scoping review of conceptual boundaries and value propositions","volume":"43","author":"Tursunbayeva","year":"2018","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib73","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1037\/0022-3514.62.1.98","article-title":"Ajzen and Fishbein\u2019s theory of reasoned action as applied to moral behavior: A confirmatory analysis","volume":"62","author":"Vallerand","year":"1992","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib74","doi-asserted-by":"crossref","DOI":"10.1016\/j.actpsy.2024.104399","article-title":"Actual uptake pursuance analysis of certification examination among industrial engineers in the Philippines: A TPB-PVT approach","volume":"248","author":"Veroya","year":"2024","journal-title":"Acta Psychologica"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib75","doi-asserted-by":"crossref","DOI":"10.1016\/j.jbusres.2023.114312","article-title":"Determinants of effective HR analytics Implementation: An In-Depth review and a dynamic framework for future research","volume":"170","author":"Wang","year":"2024","journal-title":"Journal of Business Research"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2025.103028_bib76","first-page":"1","article-title":"Affective events theory","volume":"18","author":"Weiss","year":"1996","journal-title":"Research in Organizational Behavior"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib77","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijinfomgt.2019.102065","article-title":"Self-disclosure in mobile payment applications: Common and differential effects of personal and proxy control enhancing mechanisms","volume":"52","author":"Yang","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"1\/2","key":"10.1016\/j.ijinfomgt.2025.103028_bib78","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/GKMC-02-2022-0034","article-title":"Revisiting the determinants of knowledge-sharing behavior in organizations: A meta-analytic structural equation model application","volume":"74","author":"Zaremohzzabieh","year":"2025","journal-title":"Global Knowledge, Memory and Communication"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2025.103028_bib79","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1111\/1467-8551.12415","article-title":"Evaluating the use of covariance-based structural equation modelling with reflective measurement in organizational and management research: A review and recommendations for best practice","volume":"32","author":"Zhang","year":"2021","journal-title":"British Journal of Management"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib80","article-title":"An empirical study on the driving mechanisms of proactive hazard identification behavior among frontline coal miners: Insights from the TPB-SOR model","author":"Zhang","year":"2025","journal-title":"Engineering, Construction and Architectural Management"},{"key":"10.1016\/j.ijinfomgt.2025.103028_bib81","article-title":"Production of trust: Institutional sources of economic structure, 1840\u20131920","author":"Zucker","year":"1986","journal-title":"Research in Organizational Behavior"}],"container-title":["International Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0268401225001604?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0268401225001604?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T03:57:26Z","timestamp":1770177446000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0268401225001604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":81,"alternative-id":["S0268401225001604"],"URL":"https:\/\/doi.org\/10.1016\/j.ijinfomgt.2025.103028","relation":{},"ISSN":["0268-4012"],"issn-type":[{"value":"0268-4012","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Exploring information sharing intention of employees through privacy calculus perspective: A mixed-methods approach","name":"articletitle","label":"Article Title"},{"value":"International Journal of Information Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijinfomgt.2025.103028","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103028"}}