{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T11:23:29Z","timestamp":1761218609415,"version":"3.40.5"},"reference-count":62,"publisher":"Informa UK Limited","issue":"3-4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1080\/10919392.2023.2253086","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T12:09:28Z","timestamp":1693570168000},"page":"117-132","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["\u2018DON\u2019T FOOL ME, AS IT IS YOUR LOSS\u2019 - IMPACT OF DECEPTION ON INFORMATION PRIVACY"],"prefix":"10.1080","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6478-7525","authenticated-orcid":false,"given":"Abhishek Kumar","family":"Jha","sequence":"first","affiliation":[{"name":"Information Systems, Indian Institute of Management Indore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8383-6019","authenticated-orcid":false,"given":"Saurabh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Information Systems, Indian Institute of Management Indore, India"}]}],"member":"301","published-online":{"date-parts":[[2023,9]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1","DOI":"10.17762\/pae.v58i1.1046"},{"doi-asserted-by":"publisher","key":"e_1_3_2_3_1","DOI":"10.1016\/J.ELERAP.2019.100868"},{"doi-asserted-by":"publisher","key":"e_1_3_2_4_1","DOI":"10.1016\/j.jretconser.2019.101947"},{"doi-asserted-by":"publisher","key":"e_1_3_2_5_1","DOI":"10.1016\/J.DSS.2010.01.010"},{"key":"e_1_3_2_6_1","volume-title":"ICIS 2008 Proceedings","author":"Bansal G.","year":"2008","unstructured":"Bansal, G., F. Zahedi, and D. Gefen. 2008 January. The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A Multiple-context investigation. ICIS 2008 Proceedings, https:\/\/aisel.aisnet.org\/icis2008\/7."},{"doi-asserted-by":"publisher","key":"e_1_3_2_7_1","DOI":"10.2307\/41409971"},{"doi-asserted-by":"publisher","key":"e_1_3_2_8_1","DOI":"10.1108\/JCM-04-2021-4611\/FULL\/PDF"},{"unstructured":"Brancaccio D. 2019. Does aging make us more susceptible to financial scams? - Marketplace. MarketPlace. Accessed May 16 2019. https:\/\/www.marketplace.org\/2019\/05\/16\/brains-losses-aging-fraud-financial-scams-seniors\/.","key":"e_1_3_2_9_1"},{"issue":"5","key":"e_1_3_2_10_1","first-page":"1041","article-title":"South Carolina bans partial-birth abortions","volume":"49","author":"Budnitz M. E.","year":"1998","unstructured":"Budnitz, M. E. 1998. South Carolina bans partial-birth abortions. South Carolina Law Review 49 (5):1041\u201357.","journal-title":"South Carolina Law Review"},{"doi-asserted-by":"publisher","key":"e_1_3_2_11_1","DOI":"10.1177\/0261927X94134002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_12_1","DOI":"10.1207\/S15506878JOBEM4604_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_13_1","DOI":"10.1080\/10864415.2002.11044243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_14_1","DOI":"10.1007\/978-94-017-3614-5"},{"unstructured":"Columbus L. 2020. How E-Commerce\u2019s explosive growth is attracting fraud. Forbes Accessed May 18 2020. https:\/\/www.forbes.com\/sites\/louiscolumbus\/2020\/05\/18\/how-e-commerces-explosive-growth-is-attracting-fraud\/?sh=59d344c76c4b.","key":"e_1_3_2_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_16_1","DOI":"10.1093\/OXFORDHB\/9780190681777.001.0001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_17_1","DOI":"10.1287\/ORSC.10.1.104"},{"doi-asserted-by":"publisher","key":"e_1_3_2_18_1","DOI":"10.2307\/30036519"},{"doi-asserted-by":"publisher","key":"e_1_3_2_19_1","DOI":"10.1287\/ISRE.1060.0080"},{"unstructured":"Forbes S. 2002. Web of deception: Misinformation on the Internet - Google Books. Information Today https:\/\/books.google.co.in\/books?hl=en&lr=&id=uS3p9iDooc8C&oi=fnd&pg=PR13&dq=Misinformation+and+deception&ots=tIqJmk4VFE&sig=sbnX4dgg6wBq_cx5OIM1lpdp-Gg&redir_esc=y#v=onepage&q=Misinformationanddeception&f=false.","key":"e_1_3_2_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_21_1","DOI":"10.1016\/J.IEDEEN.2016.04.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_22_1","DOI":"10.1016\/S0963-8687(02)00018-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_23_1","DOI":"10.4067\/S0718-18762019000300107"},{"key":"e_1_3_2_24_1","first-page":"3","article-title":"Web merchants\u2019 privacy and security statements: How reassuring are they for consumers? A two-sided approach","volume":"5","author":"Gauzente C.","year":"2004","unstructured":"Gauzente, C. 2004. Web merchants\u2019 privacy and security statements: How reassuring are they for consumers? A two-sided approach. Journal of Electronic Commerce Research 5:3. https:\/\/www.researchgate.net\/publication\/228777432.","journal-title":"Journal of Electronic Commerce Research"},{"unstructured":"Germain J. 2021. \u201cPrivacy concerns key reason buyers flee online retailers | E-Commerce Times.\u201d|\u201cPrivacy concerns key reason buyers flee online retailers | E-Commerce times.\u201d Ecommerce Times. Accessed October 13 2021. https:\/\/www.ecommercetimes.com\/story\/privacy-concerns-key-reason-buyers-flee-online-retailers-87301.html.","key":"e_1_3_2_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_26_1","DOI":"10.1016\/S0963-8687(02)00020-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_27_1","DOI":"10.1016\/J.NEULET.2019.134522"},{"doi-asserted-by":"publisher","key":"e_1_3_2_28_1","DOI":"10.1023\/A:1019104520776"},{"doi-asserted-by":"publisher","key":"e_1_3_2_29_1","DOI":"10.2307\/41409970"},{"unstructured":"Juniper Research. 2022 October. Global E-Commerce payment fraud losses 2023 | Statista.\u201d|\u201cGlobal E-Commerce payment fraud losses 2023 | Statista. Juniper Research https:\/\/www.statista.com\/statistics\/1273177\/ecommerce-payment-fraud-losses-globally\/.","key":"e_1_3_2_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_31_1","DOI":"10.1080\/0144929X.2018.1470671"},{"doi-asserted-by":"publisher","key":"e_1_3_2_32_1","DOI":"10.1080\/10864415.2001.11044227"},{"unstructured":"Leland J. and Z. Tom Jr. 2006. Technology and easy credit give identity thieves an edge - the New York Times. The New York Times May 30. https:\/\/www.nytimes.com\/2006\/05\/30\/us\/30identity.html.","key":"e_1_3_2_33_1"},{"unstructured":"Leonhardt M. 2021. Why online fraud attempts are up 25% in the U.S. https:\/\/www.cnbc.com\/2021\/06\/03\/why-online-fraud-attempts-are-up-25percent-in-the-us.html.","key":"e_1_3_2_34_1"},{"unstructured":"Lieber R. 2021. The young fall for scams more than seniors Do. Time for a Warning. - the New York Times. The New York Times June 25. https:\/\/www.nytimes.com\/2021\/06\/25\/your-money\/young-seniors-scams-warning.html.","key":"e_1_3_2_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_36_1","DOI":"10.1287\/ISRE.1040.0032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_37_1","DOI":"10.1016\/J.JBUSRES.2022.113346"},{"doi-asserted-by":"publisher","key":"e_1_3_2_38_1","DOI":"10.1080\/0144929X.2015.1066444"},{"doi-asserted-by":"publisher","key":"e_1_3_2_39_1","DOI":"10.2753\/JEC1086-4415150203"},{"doi-asserted-by":"publisher","key":"e_1_3_2_40_1","DOI":"10.1080\/03637759609376376"},{"unstructured":"Meehan M. 2019. Data privacy will be the most important issue in the next decade. Forbes Accessed November 26 2019. https:\/\/www.forbes.com\/sites\/marymeehan\/2019\/11\/26\/data-privacy-will-be-the-most-important-issue-in-the-next-decade\/?sh=3c25d6e01882.","key":"e_1_3_2_41_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_42_1","DOI":"10.2466\/PMS.1974.38.1.283"},{"doi-asserted-by":"publisher","key":"e_1_3_2_43_1","DOI":"10.1016\/J.JBUSRES.2022.113368"},{"doi-asserted-by":"publisher","key":"e_1_3_2_44_1","DOI":"10.1016\/J.IJRESMAR.2020.08.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_45_1","DOI":"10.1016\/J.GIQ.2019.101413"},{"doi-asserted-by":"publisher","key":"e_1_3_2_46_1","DOI":"10.1016\/S0167-4870(02)00172-1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_47_1","DOI":"10.1177\/088626000015010002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_48_1","DOI":"10.1080\/10864415.2003.11044275"},{"doi-asserted-by":"publisher","key":"e_1_3_2_49_1","DOI":"10.3758\/BF03206553"},{"doi-asserted-by":"publisher","key":"e_1_3_2_50_1","DOI":"10.1080\/10919392.2020.1739395"},{"unstructured":"Reichheld F. F. and P. Schefter. 2000 July. E-Loyalty: Your secret weapon on the web. Harvard Business Review https:\/\/hbr.org\/2000\/07\/e-loyalty-your-secret-weapon-on-the-web.","key":"e_1_3_2_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_52_1","DOI":"10.1007\/s10551-010-0365-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_53_1","DOI":"10.2139\/SSRN.4096565"},{"doi-asserted-by":"publisher","key":"e_1_3_2_54_1","DOI":"10.2307\/249477"},{"doi-asserted-by":"publisher","key":"e_1_3_2_55_1","DOI":"10.1108\/MD-03-2022-0369\/FULL\/PDF"},{"doi-asserted-by":"publisher","key":"e_1_3_2_56_1","DOI":"10.1287\/ISRE.2015.0600"},{"doi-asserted-by":"publisher","key":"e_1_3_2_57_1","DOI":"10.1080\/10919392.2020.1818521"},{"doi-asserted-by":"publisher","key":"e_1_3_2_58_1","DOI":"10.1016\/J.GIQ.2022.101800"},{"doi-asserted-by":"publisher","key":"e_1_3_2_59_1","DOI":"10.1016\/J.IJINFOMGT.2018.10.016"},{"doi-asserted-by":"publisher","key":"e_1_3_2_60_1","DOI":"10.2307\/1321160"},{"key":"e_1_3_2_61_1","volume-title":"Privacy and Freedom","author":"Westin A.","year":"1967","unstructured":"Westin, A. 1967. Privacy and Freedom. New York: Atheneum."},{"doi-asserted-by":"publisher","key":"e_1_3_2_63_1","DOI":"10.2307\/23043494"},{"doi-asserted-by":"publisher","key":"e_1_3_2_64_1","DOI":"10.1007\/s10551-020-04582-6"}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10919392.2023.2253086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T10:13:49Z","timestamp":1701857629000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10919392.2023.2253086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":62,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2023,10,2]]}},"alternative-id":["10.1080\/10919392.2023.2253086"],"URL":"https:\/\/doi.org\/10.1080\/10919392.2023.2253086","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"type":"print","value":"1091-9392"},{"type":"electronic","value":"1532-7744"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}