{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T11:23:28Z","timestamp":1761218608354,"version":"3.40.5"},"reference-count":87,"publisher":"Informa UK Limited","issue":"3-4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1080\/10919392.2023.2251328","type":"journal-article","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T20:17:20Z","timestamp":1693513040000},"page":"97-116","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["UNDERSTANDING PRIVACY PARADOX: AN EXPERIMENTAL APPROACH TO STUDY PRIVACY CONCERNS AND ACTUAL DISCLOSURE AMONG APP USERS"],"prefix":"10.1080","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0705-0030","authenticated-orcid":false,"given":"Sakhhi","family":"Chhabra","sequence":"first","affiliation":[{"name":"Marketing, XLRI Delhi-NCR Campus Aurangpur Village, Untloda, Haryana India"}]},{"given":"Jaydeep","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"Marketing, Management Development Institute, Gurugram, India"}]},{"given":"Madhushree","family":"N Agarwal","sequence":"additional","affiliation":[{"name":"Marketing, Management Development Institute, Gurugram, India"}]}],"member":"301","published-online":{"date-parts":[[2023,8,31]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988777"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_3_2_4_1","first-page":"193","article-title":"Nudging privacy: The behavioral economics of personal information","volume":"2012","author":"Acquisti A.","year":"2012","unstructured":"Acquisti, A. 2012. Nudging privacy: The behavioral economics of personal information. Digital Enlightenment Yearbook 2012:193\u201397.","journal-title":"Digital Enlightenment Yearbook"},{"key":"e_1_3_2_5_1","first-page":"1","volume-title":"2nd Annual Workshop on Economics and Information Security-WEIS","author":"Acquisti A.","year":"2003","unstructured":"Acquisti, A., and J. Grossklags. 2003, May. Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In 2nd Annual Workshop on Economics and Information Security-WEIS, Vol. 3, 1\u201327."},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_13"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_8_1","first-page":"787","volume-title":"In Proceedings of the 33rd annual ACM conference on human factors in computing systems","author":"Almuhimedi H.","year":"2015","unstructured":"Almuhimedi, H., F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. F. Cranor, and Y. Agarwal, 2015, April. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the 33rd annual ACM conference on human factors in computing systems, 787\u201396."},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-019-00375-6"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.08.001"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2012.04.077"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.5840\/beq200616340"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/JCM-03-2021-4526"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.4018\/JECO.292470"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0846"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14282-6_23"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448211016316"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_2_24_1","first-page":"33","volume-title":"In Proceedings of the second ACM workshop on security and privacy in smartphones and mobile devices","author":"Felt A. P.","year":"2012","unstructured":"Felt, A. P., S. Egelman, and D. Wagner 2012, October. I\u2019ve got 99 problems, but vibration ain\u2019t one: A survey of smartphone users\u2019 concerns. In Proceedings of the second ACM workshop on security and privacy in smartphones and mobile devices, 33\u201344. ACM."},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35659-9_14"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2014.09.026"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01529-z"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240202"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.14.3.159"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0535-4"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370020903586662"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2004.10.012"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1153913"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20238"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.01.005"},{"issue":"1","key":"e_1_3_2_41_1","first-page":"1","article-title":"Nudges for privacy and security: Understanding and assisting users\u2019 choices online","volume":"1","author":"Leon P. G.","year":"2015","unstructured":"Leon, P. G., I. Adjerid, R. Balebako, L. Brandimarte, S. Komanduri, F. Schaub, M. Sleeper, Y. Wang, S. Wilson, A. Acquisti, et al. September 2015. Nudges for privacy and security: Understanding and assisting users\u2019 choices online. ACM Computing Surveys 1(1):1\u201340.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.010"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.017"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.53106\/160792642022012301006"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2425132"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-006-0003-3"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1108\/S1548-6435(2007)0000003004"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1086\/257177"},{"key":"e_1_3_2_50_1","unstructured":"McKinsey 2019 Nov 7. Consumer-data privacy and personalization at scale: How leading retailers and consumer brands can strategize for both. Retrieved from https:\/\/www.mckinsey.com\/capabilities\/growth-marketing-and-sales\/our-insights\/consumer-data-privacy-and-personalization-at-scale"},{"issue":"3","key":"e_1_3_2_51_1","first-page":"43","article-title":"Building stronger brands through online communities","volume":"41","author":"McWilliam G.","year":"2000","unstructured":"McWilliam, G. 2000. Building stronger brands through online communities. MIT Sloan Management Review 41 (3):43.","journal-title":"MIT Sloan Management Review"},{"key":"e_1_3_2_52_1","first-page":"66","article-title":"Basics of Test Theory","volume":"1","author":"Mets\u00e4muuronen J.","year":"2017","unstructured":"Mets\u00e4muuronen, J. 2017. Basics of Test Theory. Journal Mets\u00e4muuronen, Essentials of Research Methods in Human Sciences 1:66\u2013183.","journal-title":"Journal Mets\u00e4muuronen, Essentials of Research Methods in Human Sciences"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/0267257X.2014.884368"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20186"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_56_1","volume-title":"Marketing research","author":"Parasuraman A.","year":"2007","unstructured":"Parasuraman, A., D. Grewal, and R. Krishnan. 2007. Marketing research. 2nd ed ed. Boston: Houghton Mifflin Co.","edition":"2"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148720"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.09.005"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03315-5_17"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.37.7.770"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23765-2_14"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.10033"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1994211"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.04.012"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_67_1","volume-title":"Models of man; social and rational","author":"Simon H. A.","year":"1957","unstructured":"Simon, H. A. 1957. Models of man; social and rational. New York, NY, USA: Wiley."},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/4711.001.0001"},{"key":"e_1_3_2_69_1","volume-title":"Doing social work research","author":"Smith R. S.","year":"2009","unstructured":"Smith, R. S. 2009. Doing social work research. McGraw-Hill Education (UK)."},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3536265"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1108\/17505931111121507"},{"key":"e_1_3_2_73_1","unstructured":"Statista 2022. Retrieved from https:\/\/www.statista.com\/topics\/1002\/mobile-app-usage\/"},{"issue":"3","key":"e_1_3_2_74_1","first-page":"349","article-title":"Privacy in organizations: Theoretical issues, research findings, and protection mechanisms","volume":"8","author":"Stone E. F.","year":"1990","unstructured":"Stone, E. F., and D. L. Stone. 1990. Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management 8 (3):349\u2013411.","journal-title":"Research in Personnel and Human Resources Management"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.08.034"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12052"},{"key":"e_1_3_2_77_1","unstructured":"Times of India Feb 16 2023. Data privacy in India: Current outlook and the future. Retrieved from https:\/\/timesofindia.indiatimes.com\/blogs\/voices\/data-privacy-in-india-current-outlook-and-the-future\/"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.08.022"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_2_80_1","unstructured":"Valet V. 2019 March 7. The world\u2019s most reputable companies 2019. Retrieved from https:\/\/www.forbes.com\/sites\/vickyvalet\/2019\/03\/07\/the-worlds-most-reputable-companies-2019\/#7447045213b6"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106270"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2013.01.003"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2019.08.025"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-05-2019-0121"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2014.8.4.05"},{"key":"e_1_3_2_86_1","first-page":"3","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems","author":"Weisband S.","year":"1996","unstructured":"Weisband, S., and S. Kiesler. 1996, April. Self disclosure on computer forms: Meta-analysis and implications. In Proceedings of the SIGCHI conference on human factors in computing systems, 3\u201310."},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464503"}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10919392.2023.2251328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T10:13:41Z","timestamp":1701857621000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10919392.2023.2251328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,31]]},"references-count":87,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2023,10,2]]}},"alternative-id":["10.1080\/10919392.2023.2251328"],"URL":"https:\/\/doi.org\/10.1080\/10919392.2023.2251328","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"type":"print","value":"1091-9392"},{"type":"electronic","value":"1532-7744"}],"subject":[],"published":{"date-parts":[[2023,8,31]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-08-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}