{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:36:24Z","timestamp":1777397784524,"version":"3.51.4"},"reference-count":56,"publisher":"Informa UK Limited","issue":"8","funder":[{"DOI":"10.13039\/501100002347","name":"Federal Ministry of Education and Research","doi-asserted-by":"publisher","award":["13N13221"],"award-info":[{"award-number":["13N13221"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2021,6,11]]},"DOI":"10.1080\/0144929x.2020.1723703","type":"journal-article","created":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T07:19:09Z","timestamp":1580973549000},"page":"759-775","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["The Influence of privacy control options on the evaluation and user acceptance of mobile applications for volunteers in crisis situations"],"prefix":"10.1080","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4339-501X","authenticated-orcid":false,"given":"Leonie","family":"Schaewitz","sequence":"first","affiliation":[{"name":"Social Psychology: Media and Communication, University of Duisburg-Essen, Duisburg, Germany"},{"name":"Educational Psychology, Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8339-1937","authenticated-orcid":false,"given":"Stephan","family":"Winter","sequence":"additional","affiliation":[{"name":"Institute for Communication Psychology and Media Education, University of Koblenz-Landau, Landau, Germany"}]},{"given":"Nicole C.","family":"Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"Social Psychology: Media and Communication, University of Duisburg-Essen, Duisburg, Germany"}]}],"member":"301","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2013.12.001"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.1982.11678499"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.00037"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.6.1516"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12163"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"CIT0013","unstructured":"Grossklags, J., and A. Acquisti. 2007. \u201cWhen 25 Cents is Too Much: An Experiment on Willingness-to-sell and Willingness-to-protect Personal Information.\u201d Paper presented at the Sixth Workshop on the Economics of Information Security, Pittsburgh, June 7\u22128."},{"key":"CIT0014","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach","author":"Hayes A. F.","year":"2013"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1111\/bmsp.12028"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12174"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1207\/s15324834basp2704_6"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2009.031564"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2006.00006.x"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1128973"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.003"},{"key":"CIT0023","first-page":"1063","volume-title":"Proceedings of the 47th Hawaii International Conference on System Sciences","author":"Liu Z.","year":"2014"},{"key":"CIT0024","doi-asserted-by":"crossref","unstructured":"Ludwig, T., C. Reuter, T. Siebigteroth, and V. Pipek. 2015. \u201cCrowdmonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens During Emergencies.\u201d In Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, 4083\u22124092. New York, NY: ACM","DOI":"10.1145\/2702123.2702265"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"CIT0026","first-page":"781","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Marathe S.","year":"2011"},{"key":"CIT0027","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum H.","year":"2010"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2012.6320453"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1026\/0012-1924\/a000098"},{"key":"CIT0030","volume-title":"Boundaries of Privacy","author":"Petronio S.","year":"2002"},{"key":"CIT0031","first-page":"780","volume-title":"Proceedings of the 10th International Conference on Information Systems for Crisis Response and Management","author":"Reuter C.","year":"2013"},{"key":"CIT0032","doi-asserted-by":"crossref","unstructured":"Reuter, C., T. Ludwig, M. A. Kaufhold, and V. Pipek. 2015. \u201cXHELP: Design of a Cross-platform Social-media Application to Support Volunteer Moderators in Disasters.\u201d In Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, 4093\u22124102. New York: ACM. doi:10.1145\/2702123.2702171.","DOI":"10.1145\/2702123.2702171"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.1.68"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1002\/9781118516812.ch42"},{"key":"CIT0035","doi-asserted-by":"crossref","unstructured":"Shih, F., I. Liccardi, and D. Weitzner. 2015. \u201cPrivacy Tipping Points in Smartphones Privacy Preferences.\u201d In Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, 807\u2212816. New York: ACM. doi:10.1145\/2702123.2702404.","DOI":"10.1145\/2702123.2702404"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.02.006"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.05.013"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.019"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"CIT0040","first-page":"73","volume-title":"Digital Media, Youth, and Credibility","author":"Sundar S. S.","year":"2008"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1002\/9781118426456.ch3"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01377.x"},{"key":"CIT0043","unstructured":"Taylor, K., and L. Silver. 2019. \u201cSmartphone Ownership is Growing Rapidly Around the World, but not Always Equally.\u201d Pew Research Center, February 5, 2019. Accessed 1 December 2019. https:\/\/www.pewresearch.org\/global\/2019\/02\/05\/smartphone-ownership-is-growing-rapidly-around-the-world-but-not-always-equally\/."},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.04.003"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1136\/emermed-2011-200990"},{"key":"CIT0046","unstructured":"Trepte, S., and P. K. Masur. 2015. \u201cPrivatheit im Wandel. Eine Repr\u00e4sentative Umfrage zur Wahrnehmung und Beurteilung von Privatheit [Privacy Through the Ages. A Representative Survey About the Perception and Appraisal of Privacy].\u201d Universit\u00e4t Hohenheim, June 18. Accessed 17 September 2016. https:\/\/www.uni-hohenheim.de\/fileadmin\/einrichtungen\/psych\/Team_MP\/Berichte\/Bericht_-_Privatheit_im_Wandel_2014-06-18.pdf."},{"key":"CIT0047","unstructured":"Tsai, J. Y., P. G. Kelley, L. F. Cranor, and N. Sadeh. 2009. \u201cLocation-sharing Technologies: Privacy Risks and Controls.\u201d TPRC 2009, August 15. Accessed 3 November 2016. https:\/\/ssrn.com\/abstract=1997782."},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"CIT0049","doi-asserted-by":"crossref","unstructured":"Wang, N., B. Zhang, B. Liu, and H. Jin. 2015. \u201cInvestigating Effects of Control and Ads Awareness on Android Users\u2019 Privacy Behaviors and Perceptions.\u201d In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 373\u2212382. New York: ACM. doi:10.1145\/2785830.2785845.","DOI":"10.1145\/2785830.2785845"},{"key":"CIT0050","volume-title":"Privacy and Freedom","author":"Westin A. F.","year":"1967"},{"key":"CIT0051","doi-asserted-by":"crossref","unstructured":"Wilson, S., J. Cranshaw, N. Sadeh, A. Acquisti, L. F. Cranor, J. Springfield, S. Y. Jeong, and A. Balasubramanian. 2013. \u201cPrivacy Manipulation and Acclimation in a Location Sharing Application.\u201d In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 549\u2212558. New York: ACM. doi:10.1145\/2493432.2493436.","DOI":"10.1145\/2493432.2493436"},{"key":"CIT0052","unstructured":"Xu, H. 2007. \u201cThe Effects of Self-construal and Perceived Control on Privacy Concerns.\u201d In Proceedings of the 28th International Conference on Information Systems, paper 125. Montr\u00e9al: AIS."},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"CIT0054","unstructured":"Xu, H., S. Gupta, M. B. Rosson, and J. M. Carroll. 2012. \u201cMeasuring Mobile Users\u2019 Concerns for Information Privacy.\u201d In Proceedings of the 33rd International Conference on Information Systems, 2278\u22122293, Orlando: AIS."},{"key":"CIT0055","unstructured":"Xu, H., and H. H. Teo. 2004. \u201cAlleviating Consumers\u2019 Privacy Concerns in Location-based Services: A Psychological Control Perspective.\u201d In Proceedings of the 25th International Conference on Information Systems, 793\u2212806. Singapore: AIS."},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2020.1723703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T00:51:30Z","timestamp":1622940690000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2020.1723703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,5]]},"references-count":56,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,6,11]]}},"alternative-id":["10.1080\/0144929X.2020.1723703"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2020.1723703","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2016-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}