{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T00:10:45Z","timestamp":1776298245720,"version":"3.50.1"},"reference-count":91,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,5,4]]},"DOI":"10.1080\/0144929x.2018.1541254","type":"journal-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T05:40:18Z","timestamp":1541655618000},"page":"503-518","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Trust trumps concern: findings from a seven-country study on consumer consent to \u2018digital native\u2019 vs. \u2018digital immigrant\u2019 service providers"],"prefix":"10.1080","volume":"38","author":[{"given":"Bente","family":"Evjemo","sequence":"first","affiliation":[{"name":"Telenor Research, Norway"}]},{"given":"Humberto","family":"Castej\u00f3n-Mart\u00ednez","sequence":"additional","affiliation":[{"name":"Telenor Research, Norway"}]},{"given":"Sigmund","family":"Akselsen","sequence":"additional","affiliation":[{"name":"Telenor Research, Norway"}]}],"member":"301","published-online":{"date-parts":[[2018,11,8]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2008.34421995"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Alsaif, T.\u00a0M.\u00a0I., and A. Ghoneim. 2015. \u201cTrust Transference from Brick to Click Retailers: A Conceptual Model for Impersonal Trust\u201d. In Proceedings of HICSS 2015.","DOI":"10.1109\/HICSS.2015.402"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.2307\/20650295"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Anton, A. L., J. B. Earp, and J. D. Young. 2010. \u201cHow Internet users\u2019 privacy concerns have evolved since 2002\u201d. Computer Science Technical Report TR-2009-16, North Carolina State University.","DOI":"10.1109\/MSP.2010.38"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"CIT0007","unstructured":"Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. \u201cUnderstanding Emergence and Outcomes of Information Privacy Concerns: A Case of Facebook.\u201d In Proc. of ICIS 2010."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1522-7138(199722)11:3<44::AID-DIR7>3.0.CO;2-X"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-007-9000-y"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"CIT0011","first-page":"295","volume-title":"Modern Methods for Business Research","author":"Chin W. W.","year":"1998"},{"key":"CIT0012","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J. E.","year":"1988"},{"key":"CIT0013","unstructured":"Deloitte Insights. 2017. \u201cTo share or not to share. What consumers really think about sharing their personal information.\u201d https:\/\/www2.deloitte.com\/insights\/us\/en\/industry\/retail-distribution\/sharing-personal-information-consumer-privacy-concerns.html."},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12163"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2049"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1108\/02651330710741785"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2307\/1251829"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926629"},{"key":"CIT0021","first-page":"124","volume-title":"The Networked Self: Identity, Community, and Culture on Social Network Sites","author":"Ellison N.","year":"2010"},{"key":"CIT0022","unstructured":"European Commission. 2015. \u201cEurobarometer 83.1 (2015)\u201d. TNS opinion [producer]. GESIS Data Archive, Cologne. ZA5964 Data file Version 1.0.0."},{"key":"CIT0023","unstructured":"Facebook Inc. 2007. \u201cLeading Websites Offer Facebook Beacon for Social Distribution.\u201d\n                      Facebook newsroom\n                      , November 6.\u00a0https:\/\/newsroom.fb.com\/news\/2007\/11\/leading-websites-offer-facebook-beacon-for-social-distribution\/."},{"key":"CIT0024","unstructured":"Facebook Inc. 2018. \u201cWhat kinds of posts will I see in News Feed?\u201d\n                      Facebook Help Centre\n                      . Accessed September 14, 2018. https:\/\/www.facebook.com\/help\/166738576721085."},{"key":"CIT0025","unstructured":"Farley, A., and N. Murched. 2016. \u201cHow culture moderates the effect of trust on online shopping frequency.\u201d Master thesis, Malardalen University, Sweden."},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"CIT0027","unstructured":"Forrester. 2015. \u201cThe Contextual Marketing Imperative. The Evolution of Personalization From Push Messaging To One-To-One Personal Customer Experiences.\u201d\n                      Forrester Consulting\u2019s Thought Leadership Paper\n                      , October."},{"issue":"2","key":"CIT0028","first-page":"195","volume":"69","author":"Fuchs C.","year":"2009","journal-title":"Die Betriebswirtschaft"},{"key":"CIT0029","unstructured":"Furner, C. P., R. Pradeep, and Z. Zhu. 2013. \u201cCultural and Review Characteristics in the Formation of Trust in Online Product Reviews: A Multinational Investigation.\u201d Proceedings of Wuhan International Conference on e-Business, (paper 90), 423\u2013433."},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1504\/IJEB.2010.035289"},{"key":"CIT0031","unstructured":"GDPR. 2017. ICO GDPR guidance:Consent."},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2006100101"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2003.817277"},{"key":"CIT0034","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair J. F.","year":"2016","edition":"2"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"CIT0036","unstructured":"HBR Harvard Business Review. 2016. \u201cThe Industries That Are Being Disrupted the Most by Digital\u201d, March 21. https:\/\/hbr.org\/2016\/03\/the-industries-that-are-being-disrupted-the-most-by-digital."},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2015-0382"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"CIT0039","doi-asserted-by":"crossref","unstructured":"Henseler, J., C. M. Ringle, and M. Sarstedt. 2016. \u201cTesting Measurement Invariance of Composites Using Partial Least Squares.\u201d In R.\u00a0R.\u00a0Sinkovics, Ruey-Jer \u201cBryan\u201d Jean, ed.\n                      International Marketing Review, 33 (3): 405\u2013431.","DOI":"10.1108\/IMR-09-2014-0304"},{"key":"CIT0040","unstructured":"Henseler, J., C. M. Ringle, and R. R. Sinkovics. 2009. \u201cThe use of partial least squares path modeling in international marketing.\u201d In R.\u00a0R.\u00a0Sinkovics, and P.\u00a0N.\u00a0Ghauri, eds.\n                      Advances in International Marketing\n                      , 20, 277-319."},{"key":"CIT0041","volume-title":"Cultures and Organizations: Software of the Mind","author":"Hofstede G.","year":"1991"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.1999.tb00337.x"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019104520776"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1177\/0022022104272905"},{"key":"CIT0047","unstructured":"Khan, N., and G. Lunawat. 2018. \u201cDigital reinvention: Unlocking the \u2018how\u2019.\u201d\n                      Digital McKinsey Report\n                      , January."},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_21"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23629"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-012-0216-6"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.12.002"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"CIT0053","doi-asserted-by":"crossref","unstructured":"Laukkanen, T. 2015. \u201cHow Uncertainty Avoidance Affects Innovation Resistance in Mobile Banking? The Moderating role of Age and Gender.\u201d In Proceedings of Hawaii International Conference on System Sciences, 3601\u20133610. HICSS.","DOI":"10.1109\/HICSS.2015.433"},{"issue":"1","key":"CIT0054","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1080\/08874417.2010.11645450","volume":"51","author":"Li H.","year":"2010","journal-title":"Journal of Computer Information Systems"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.003"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-8501(01)00182-1"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"CIT0058","unstructured":"Marsan, C. 2012. \u201c15 Worst Internet Privacy Scandals of All Time.\u201d https:\/\/www.networkworld.com\/article\/2185187\/security\/15-worst-internet-privacy-scandals-of-all-time.html."},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"CIT0060","unstructured":"McKinsey. 2015. \u201cLessons from digital telcos: Five initiatives to improve business performance.\u201d https:\/\/www.mckinsey.com\/industries\/telecommunications\/our-insights\/lessons-from-digital-telcos-five-initiatives-to-improve-business-performance."},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2001.11044235"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.04.015"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2001.tb00101.x"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v048.i03"},{"key":"CIT0068","volume-title":"Consumer Behavior and Culture: Consequences for Global Marketing and Advertising","author":"Mooij M.","year":"2011"},{"key":"CIT0069","unstructured":"NCC Norwegian Consumer Council. 2018. \u201cDeceived by design. How tech companies use dark patterns to discourage us from exercising our rights to privacy.\u201d\n                      Norwegian Consumer Council Report\n                      , June 27, 2018."},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"CIT0071","volume-title":"Psychometric Theory","author":"Nunnally J. C.","year":"1994"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.09.005"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2775"},{"key":"CIT0074","volume-title":"R: a Language and Environment for Statistical Computing","author":"R Core Team","year":"2014"},{"key":"CIT0075","first-page":"419","volume-title":"Handbook of Industrial and Organization Psychology","author":"Sackett P. R.","year":"1990","edition":"2"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1108\/S1474-7979(2011)0000022012"},{"issue":"2016","key":"CIT0077","first-page":"5626","volume":"10","author":"Schroeder R.","year":"2016","journal-title":"International Journal of Communication"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1145\/641205.641211"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.66.1.15.18449"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.72"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2016.06.003"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.022"},{"key":"CIT0084","doi-asserted-by":"crossref","unstructured":"Turow, J., M. Hennessy, and N. Draper. 2015. \u201cThe Tradeoff Fallacy. How Marketers are Misrepresenting American Consumers and Opening them up to Exploitation.\u201d Report from the Annenberg School for Communication, University of Pennsylvania.","DOI":"10.2139\/ssrn.2820060"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-015-0455-4"},{"key":"CIT0086","unstructured":"Wang, E. S-T., and R-L. Lin. 2016. \u201cPerceived Quality Factors of Location-Based Apps on Trust, Perceived Privacy Risk, and Continuous Usage Intention.\u201d\n                      Behaviour & Information Technology\n                      , publ online 15 February 2016."},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.82.2.247"},{"key":"CIT0088","volume-title":"Privacy and Freedom","author":"Westin A. F.","year":"1967"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.12.008"},{"key":"CIT0090","unstructured":"Yan, L., and N. Abdou. 2017. \u201cThe Impact of Trust on the Mobile Commerce Adoption in Tourism Industry\u201d. Master thesis, University of Linne, Kalmar V\u0201xj\u00f6, Sweden."},{"key":"CIT0091","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1541254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:24:52Z","timestamp":1775262292000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1541254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,8]]},"references-count":91,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5,4]]}},"alternative-id":["10.1080\/0144929X.2018.1541254"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1541254","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2017-07-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}