{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T05:12:59Z","timestamp":1764220379912,"version":"3.46.0"},"reference-count":90,"publisher":"Informa UK Limited","issue":"16","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390621612"],"award-info":[{"award-number":["390621612"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,8,18]]},"DOI":"10.1080\/10447318.2024.2430494","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T04:58:07Z","timestamp":1734584287000},"page":"10024-10044","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Will You Be Watching Me? A Conjoint-Based Study on Employee Attitudes Toward Personal Data Usage in Smart Factories"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9810-9488","authenticated-orcid":false,"given":"Maike","family":"Keil","sequence":"first","affiliation":[{"name":"Junior Professorship for Risk Perception and Communication, RWTH Aachen University","place":["Aachen, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9030-6999","authenticated-orcid":false,"given":"Luisa","family":"Vervier","sequence":"additional","affiliation":[{"name":"Chair for Communication Science, RWTH Aachen University","place":["Aachen, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2837-5181","authenticated-orcid":false,"given":"Philipp","family":"Brauner","sequence":"additional","affiliation":[{"name":"Chair for Communication Science, RWTH Aachen University","place":["Aachen, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6105-4729","authenticated-orcid":false,"given":"Martina","family":"Ziefle","sequence":"additional","affiliation":[{"name":"Chair for Communication Science, RWTH Aachen University","place":["Aachen, Germany"]}]}],"member":"301","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"key":"e_1_3_3_2_1","volume-title":"The environment and social behavior: Privacy, personal space, territory, crowding","author":"Altman I.","year":"1975","unstructured":"Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, crowding. Brooks\/Cole Publishing Company."},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118901731.iecrm0040"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.110873"},{"key":"e_1_3_3_5_1","unstructured":"Associated Press. (2024). France fines Amazon $35 million for \u2018excessively intrusive\u2019 monitoring of warehouse staff. https:\/\/apnews.com\/article\/amazon-fine-monitoring-workers-privacy-france-d503314234ccacb366e2afaa49d097b1"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.6102\/zis37"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_3_3_8_1","volume-title":"Panopticon, or, the inspection-house","author":"Bentham J.","year":"1791","unstructured":"Bentham, J. (1791). Panopticon, or, the inspection-house (M. Bo\u017eovi\u0107, Ed.). Verso."},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206319878254"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502265"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10389-021-01524-y"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018726718818721"},{"key":"e_1_3_3_13_1","volume-title":"Industrial Internet \u2013 The machines are talking","author":"Bruner J.","year":"2013","unstructured":"Bruner, J. (2013). Industrial Internet \u2013 The machines are talking. Reilly Media."},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.05.004"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.04.003"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-07-2014-0197"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102453"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2007.0572"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_3_20_1","volume-title":"Akzeptanz und Nicht-Akzeptanz von technischen Produktinnovationen","author":"Dethloff C.","year":"2004","unstructured":"Dethloff, C. (2004). Akzeptanz und Nicht-Akzeptanz von technischen Produktinnovationen [Acceptance and non-acceptance of technical product innovations]. Pabst Science Publ."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/002200275800200401"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2014.2312079"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/pspi0000401"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jt.5740104"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0024833"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10926-020-09901-2"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/1251756"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20534-8_13"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.488"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.4102\/sajip.v41i1.1263"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1589864"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183467"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2019.03.003"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogr.2021.06.001"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPICON56577.2022.10180471"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-05014-6_2"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.10.043"},{"key":"e_1_3_3_42_1","first-page":"2010","article-title":"A critical review of technology acceptance literature","volume":"4","author":"Li L.","year":"2010","unstructured":"Li, L. (2010). A critical review of technology acceptance literature. Referred Research Paper, 4, 2010.","journal-title":"Referred Research Paper,"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(64)90015-X"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-267-8_23"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-190521"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.15.159"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-286-2.ch008"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.2478\/bsrj-2020-0008"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI52170.2021.9538729"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12205"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/joca.12111"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094670511424924"},{"key":"e_1_3_3_56_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum H.","year":"2020","unstructured":"Nissenbaum, H. (2020). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18093152"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ElConRus51938.2021.9396278"},{"key":"e_1_3_3_60_1","first-page":"1","article-title":"Formulating attributes and levels in conjoint analysis","author":"Orme B.","year":"2002","unstructured":"Orme, B. (2002). Formulating attributes and levels in conjoint analysis. Sawtooth Software Research Paper, 1\u20134. https:\/\/sawtoothsoftware.com\/resources\/technical-papers\/formulating-attributes-and-levels-in-conjoint-analysis","journal-title":"Sawtooth Software Research Paper,"},{"key":"e_1_3_3_61_1","unstructured":"Orme B. (2010). Getting started with conjoint analysis: Strategies for product design and pricing research (2nd ed.). Research Publishers LLC."},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2019.8780186"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2022.103739"},{"issue":"5","key":"e_1_3_3_64_1","first-page":"490","article-title":"Why traditional technology acceptance models won\u2019t work for future information technologies?","volume":"4","author":"R\u00f6cker C.","year":"2010","unstructured":"R\u00f6cker, C. (2010). Why traditional technology acceptance models won\u2019t work for future information technologies? International Journal of Information and Communication Engineering, 4(5), 490\u2013496.","journal-title":"International Journal of Information and Communication Engineering,"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v11i5.7072"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.37868\/dss.v1.id149"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13042156"},{"key":"e_1_3_3_68_1","unstructured":"Sawtooth Software. (2017). The CBC system for choice-based conjoint analysis. https:\/\/www.semanticscholar.org\/paper\/The-CBC-System-for-Choice-Based-Conjoint-Analysis\/c98a88e5a43ee6118c9a5d1411a2bb23a4a52674"},{"key":"e_1_3_3_69_1","unstructured":"Sawtooth Software (2022). Testing the CBC design. https:\/\/sawtoothsoftware.com\/help\/lighthouse-studio\/manual\/hid_web_cbc_designs_6.html"},{"key":"e_1_3_3_70_1","unstructured":"Sawtooth Software. (2021). The latent class technical paper version 4.8. Sawtooth Software Inc."},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720817753907"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1037\/apl0000321"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006774301530163"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09500-3"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-020-00404-9"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1994211"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-021-00529-0"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230107"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760310506175"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0036"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.216"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115616149"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148853"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006301000800091"},{"key":"e_1_3_3_85_1","volume-title":"Privacy and freedom","author":"Westin A. F.","year":"1967","unstructured":"Westin, A. F. (1967). Privacy and freedom. Atheneum."},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00072"},{"key":"e_1_3_3_87_1","unstructured":"Xu H. Gupta S. Rosson M. & Carroll J. M. (2012). Measuring mobile users\u2019 concerns for information privacy. ICIS."},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2018.1555383"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58536-9_16"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2017.05.015"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1292491.1292514"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2430494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T04:33:12Z","timestamp":1764217992000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2430494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":90,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2025,8,18]]}},"alternative-id":["10.1080\/10447318.2024.2430494"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2430494","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-02-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-31","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}