{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T02:43:40Z","timestamp":1768617820511,"version":"3.49.0"},"reference-count":39,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2018,6,3]]},"DOI":"10.1080\/0144929x.2018.1470671","type":"journal-article","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T19:12:33Z","timestamp":1525893153000},"page":"622-633","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":38,"title":["Interplay between trust, information privacy concerns and behavioural intention of users on online social networks"],"prefix":"10.1080","volume":"37","author":[{"given":"Saurabh","family":"Kumar","sequence":"first","affiliation":[{"name":"Decision Sciences & Information Systems Area, Indian Institute of Management Nagpur, Nagpur, India"}]},{"given":"Pradeep","family":"Kumar","sequence":"additional","affiliation":[{"name":"Information Technology and Systems Area, Indian Institute of Management Lucknow, Lucknow, India"}]},{"given":"Bharat","family":"Bhasker","sequence":"additional","affiliation":[{"name":"Decision Sciences and Systems Area, Indian Institute of Management Raipur, Raipur, India"}]}],"member":"301","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"CIT0002","unstructured":"Bansal, Gaurav, Fatemeh Zahedi, and David Gefen. 2008. \u201cThe Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation.\u201d ICIS 2008 Proceedings, January. http:\/\/aisel.aisnet.org\/icis2008\/7."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.08.001"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00018-5"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23765-2_16"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1002\/dir.4000090204"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2014.07.008"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"CIT0015","unstructured":"Dwyer, Catherine, Starr Hiltz, and Katia Passerini. 2007. \u201cTrust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace.\u201d AMCIS 2007 Proceedings, 339."},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"issue":"1","key":"CIT0018","first-page":"7","volume":"4","author":"Gefen David","year":"2000","journal-title":"Communications of the Association for Information Systems"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"CIT0020","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair Joseph F.","year":"2016"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.3.4.424"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.07.010"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.29"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1007\/s11628-012-0158-6"},{"key":"CIT0025a","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-52512-4"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645782"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0065"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.15"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"CIT0034a","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"CIT0034b","volume-title":"Privacy and Freedom","author":"Westin Alan F.","year":"2015"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1593"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240409"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1470671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T09:59:20Z","timestamp":1598695160000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1470671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,9]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,6,3]]}},"alternative-id":["10.1080\/0144929X.2018.1470671"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1470671","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2016-12-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}