{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T02:51:23Z","timestamp":1774925483122,"version":"3.50.1"},"reference-count":51,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1080\/08874417.2010.11645450","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T17:28:39Z","timestamp":1769707719000},"page":"62-71","source":"Crossref","is-referenced-by-count":11,"title":["Understanding Situational Online Information Disclosure as a Privacy Calculus"],"prefix":"10.1080","volume":"51","author":[{"given":"Han","family":"Li","sequence":"first","affiliation":[{"name":"Minnesota State University Moorhead, Moorhead, MN 56563"}]},{"given":"Rathindra","family":"Sarathy","sequence":"additional","affiliation":[{"name":"Oklahoma State University, Stillwater, OK 74075"}]},{"given":"Heng","family":"Xu","sequence":"additional","affiliation":[{"name":"Penn State University University, Park, PA 16802"}]}],"member":"301","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148715"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","DOI":"10.7591\/9781501722134","volume-title":"\u201cRegulating Privacy: data protection and public policy in Europe and the United States,\u201d","author":"Bennett C. J.","year":"1992","unstructured":"Bennett, C. J., \u201cRegulating Privacy: data protection and public policy in Europe and the United States,\u201d Cornell University Press, 1992."},{"key":"e_1_2_1_6_1","volume-title":"The Partial Least Squares Approach for Structural Equation Modeling","author":"Chin W. W.","year":"1998","unstructured":"Chin, W. W., The Partial Least Squares Approach for Structural Equation Modeling, Lawrence Erlbaum, Mahway, New Jersey, 1998."},{"key":"e_1_2_1_7_1","volume-title":"Statistical power analysis for the behavior sciences","author":"Cohen J.","year":"1988","unstructured":"Cohen, J., Statistical power analysis for the behavior sciences, Lawrence Erlbaum, Hillsdale, NJ, 1988."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00067"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"issue":"2","key":"e_1_2_1_13_1","doi-asserted-by":"crossref","first-page":"252","DOI":"10.2307\/258705","article-title":"\u201cToward a unified conception of business ethics: integrative social contracts theory,\u201d","volume":"19","author":"Donaldson T.","year":"1994","unstructured":"Donaldson, T. and Dunfee, T. W., \u201cToward a unified conception of business ethics: integrative social contracts theory,\u201d Academy of Management Review, 19(2), 1994, 252\u2013284.","journal-title":"Academy of Management Review"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1177\/002224299906300302","article-title":"\u201cSocial contracts and marketing ethics,\u201d","volume":"63","author":"Dunfee T. W.","year":"1999","unstructured":"Dunfee, T. W., Smith, N. C., and Ross, W. T., \u201cSocial contracts and marketing ethics,\u201d Journal of Marketing Research, 63(July), 1999, 14\u201332.","journal-title":"Journal of Marketing Research"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036519"},{"key":"e_1_2_1_17_1","unstructured":"Gefen D. Warkentin M. Pavlou P. and Rose G. \u201cEGoverment adoption \u201d AMCIS 2002 2002 83"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240202"},{"key":"e_1_2_1_19_1","first-page":"1","volume-title":"Proceedings of the Twenty-Third Annual International Conference on Information Systems","author":"Hann I. H.","year":"2002","unstructured":"Hann, I. H., Hui, K. L., Lee, T. S., and Png, I. P. L., \u201cOnline information privacy: measuring the cost-benefit trade-Off,\u201d Proceedings of the Twenty-Third Annual International Conference on Information Systems, Barcelona, Spain, 2002, 1\u201310."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128583"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183467"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148779"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0124"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/234215.234476"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"issue":"4","key":"e_1_2_1_27_1","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","article-title":"\u201cHow habit limits the predictive power of intention: The case of information systems continuance,\u201d","volume":"31","author":"Limayem M.","year":"2008","unstructured":"Limayem, M., Hirt, S. G., and Cheung, C. M. K., \u201cHow habit limits the predictive power of intention: The case of information systems continuance,\u201d MIS Quarterly, 31(4), 2008, 705\u2013737.","journal-title":"MIS Quarterly"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00071"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"issue":"4","key":"e_1_2_1_31_1","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.2004.tb00292.x","article-title":"\u201cPrivacy, trust, and disclosure: exploring barriers to electronic commerce,\u201d","volume":"9","author":"Metzger M. J.","year":"2004","unstructured":"Metzger, M. J., \u201cPrivacy, trust, and disclosure: exploring barriers to electronic commerce,\u201d Journal of Computer-Mediated Communication, 9(4), 2004.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.1.35.12567"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"issue":"3","key":"e_1_2_1_34_1","doi-asserted-by":"crossref","first-page":"501","DOI":"10.2307\/25148805","article-title":"\u201cA task-based model of perceived website complexity,\u201d","volume":"31","author":"Nadkarni S.","year":"2008","unstructured":"Nadkarni, S. and Gupta, R., \u201cA task-based model of perceived website complexity,\u201d MIS Quarterly, 31(3), 2008, 501\u2013524.","journal-title":"MIS Quarterly"},{"key":"e_1_2_1_35_1","unstructured":"Organization for Economic Cooperation and Development Guidelines on the protection of privacy and transborder flows of personal data 1980."},{"key":"e_1_2_1_36_1","volume-title":"The Role of Perceived Privacy and Perceived Security in the Development of Trust in Electronic Commerce Transactions","author":"Pavlou P. A.","year":"2001","unstructured":"Pavlou, P. A. and Chellappa, R. K., The Role of Perceived Privacy and Perceived Security in the Development of Trust in Electronic Commerce Transactions, Marshall School of Business, USC, Los Angeles., 2001."},{"key":"e_1_2_1_37_1","unstructured":"PEW-Internet Pew Internet & American Life Project: Demographics of Internet Users 2008."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_2_1_39_1","unstructured":"Preacher K. J. Curran P. J. and Bauer D. J. Probing interactions in multiple linear regression latent curve analysis and hierarchical linear modeling Interactive calculation tools for establishing simple intercepts simple slopes and regions of significance 2003."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148854"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"e_1_2_1_44_1","volume-title":"The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs and attitudes","author":"Stone D. L.","year":"1981","unstructured":"Stone, D. L., The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs and attitudes, Purdue University, 1981."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.68.3.459"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-2148-8_17"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327663JCP1204_08"},{"key":"e_1_2_1_48_1","volume-title":"Online World As Important to Internet Users as Real World?","author":"USC","year":"2007","unstructured":"USC, Online World As Important to Internet Users as Real World?, Center for the Digital Future, Annenberg School for Communication, University of Southern California, 2007."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00092"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1108\/09564230310500192"},{"key":"e_1_2_1_51_1","volume-title":"Privacy and Freedom","author":"Westin A. F.","year":"1967","unstructured":"Westin, A. F., Privacy and Freedom, Atheneum, New York, 1967."},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of 29th Annual International Conference on Information Systems","author":"Xu H.","year":"2008","unstructured":"Xu, H., Dinev, T., Smith, H. J., and Hart, P., \u201cExamining the formation of individual's privacy concerns: Toward an integrative view,\u201d Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France, 2008."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2010.11645450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T17:28:52Z","timestamp":1769707732000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2010.11645450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["10.1080\/08874417.2010.11645450"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2010.11645450","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,9]]}}}