{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:57:27Z","timestamp":1774353447687,"version":"3.50.1"},"reference-count":73,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2012,3,30]],"date-time":"2012-03-30T00:00:00Z","timestamp":1333065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3,30]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This study aims to understand the impact of users' privacy concerns on their acceptance of social networking web sites (SNWs).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This paper develops two research models, with privacy concern conceptualized either as an antecedent of acceptance intention, or as a moderator of the relationships in the technology acceptance model (TAM). Using a survey questionnaire, empirical data were collected from 428 undergraduate college students. Structured equation modeling was used to test the validity of the proposed research models.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The privacy concerns of the research respondents were found to be statistically significant. However, they did not directly affect users' acceptance of social networking web sites. Instead, privacy concerns did moderate the effects of perceived usefulness, and perceived ease of use, on users' intention to continue to use SNWs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The study identifies the theoretical foundations of privacy and privacy concerns in the context of SNWs. This empirical study, based on an established theoretical foundation, will help the research community to gain a deeper understanding of the impacts of privacy concern in the context of social networking.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The findings of this study can provide SNW operators with useful strategies and tactics to enhance users' acceptance depending on their level of privacy concern.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>With the worldwide rapid growth of SNWs, there have been ongoing concerns about how users' private information is viewed or used by others. This study provides much needed empirical evidence about the impact of privacy concerns on users' acceptance of SNWs.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662241211214575","type":"journal-article","created":{"date-parts":[[2012,3,24]],"date-time":"2012-03-24T09:04:06Z","timestamp":1332579846000},"page":"211-233","source":"Crossref","is-referenced-by-count":145,"title":["Impact of privacy concern in social networking web sites"],"prefix":"10.1108","volume":"22","author":[{"given":"Xin","family":"Tan","sequence":"first","affiliation":[]},{"given":"Li","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Yongbeom","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021620404771900_b1","doi-asserted-by":"crossref","unstructured":"Acquisti, A. and Gross, R. (2006), \u201cImagined communities: awareness, information sharing, and privacy on the Facebook\u201d, Lecture Notes in Computer Science, Springer, Heidelberg, pp. 36\u201058.","DOI":"10.1007\/11957454_3"},{"key":"key2022021620404771900_b2","unstructured":"Ajzen, I. and Fishbein, M. (1980), Understanding Attitudes and Predicting Behavior, Prentice Hall, Englewood Cliffs, NJ."},{"key":"key2022021620404771900_b3","unstructured":"Alexa (2010), \u201cTop 500 sites on the web\u201d, available at www.alexa.com\/topsites (accessed January 28, 2010)."},{"key":"key2022021620404771900_b4","doi-asserted-by":"crossref","unstructured":"Amoako\u2010Gyampah, K. and Salam, A.F. (2004), \u201cAn extension of the technology acceptance model in an ERP implementation environment\u201d, Information & Management, Vol. 41 No. 6, pp. 731\u201045.","DOI":"10.1016\/j.im.2003.08.010"},{"key":"key2022021620404771900_b5","doi-asserted-by":"crossref","unstructured":"Barnes, S.B. (2006), \u201cA privacy paradox: social networking in the United States\u201d, First Monday, Vol. 11 No. 9.","DOI":"10.5210\/fm.v11i9.1394"},{"key":"key2022021620404771900_b6","doi-asserted-by":"crossref","unstructured":"Boyd, D.M. (2008), \u201cFacebook's privacy trainwreck: exposure, invasion, and social convergence\u201d, Convergence, Vol. 14 No. 1, pp. 13\u201020.","DOI":"10.1177\/1354856507084416"},{"key":"key2022021620404771900_b7","doi-asserted-by":"crossref","unstructured":"Boyd, D.M. and Ellison, N.B. (2007), \u201cSocial network sites: definition, history, and scholarship\u201d, Journal of Computer\u2010Mediated Communication, Vol. 13 Nos 1, article 11.","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"key2022021620404771900_b8","doi-asserted-by":"crossref","unstructured":"Cha, J. (2010), \u201cFactors affecting the frequency and amount of social networking site use: motivations, perceptions, and privacy concerns\u201d, First Monday, Vol. 15 No. 12, p. 12.","DOI":"10.5210\/fm.v15i12.2889"},{"key":"key2022021620404771900_b9","unstructured":"Chew, M., Balfanz, D. and Laurie, B. (2008), \u201c(under)Mining privacy in social networks\u201d, paper presented at Web 2.0 Security and Privacy 2008, Oakland, CA."},{"key":"key2022021620404771900_b10","unstructured":"Chin, W.W. (1998), \u201cIssues and opinion on structural equation modeling\u201d, MIS Quarterly, Vol. 22 No. 1, pp. vii\u2010xvi."},{"key":"key2022021620404771900_b11","doi-asserted-by":"crossref","unstructured":"Cortina, J.M., Chen, G. and Dunlap, W.P. (2001), \u201cTesting interaction effects in LISREL: examination and illustration of available procedures\u201d, Organizational Research Methods, Vol. 4 No. 4, pp. 324\u201060.","DOI":"10.1177\/109442810144002"},{"key":"key2022021620404771900_b12","doi-asserted-by":"crossref","unstructured":"Dabholkar, P.A. and Bagozzi, R. (2002), \u201cAn attitudinal model of technology\u2010based self\u2010service: moderating effects of consumer traits and situational factors\u201d, Journal of Academy of Marketing Science, Vol. 30 No. 3, pp. 184\u2010201.","DOI":"10.1177\/00970302030003001"},{"key":"key2022021620404771900_b13","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 318\u201040.","DOI":"10.2307\/249008"},{"key":"key2022021620404771900_b14","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022021620404771900_b15","unstructured":"Dwyer, C., Hiltz, S.R. and Passerini, K. (2007), \u201cTrust and privacy concern within social networking sites: a comparison of facebook and myspace\u201d, paper presented at the Thirteenth Americas Conference on Information Systems, Keystone, CO."},{"key":"key2022021620404771900_b16","unstructured":"Facebook (2007), \u201cLeading web sites offer Facebook beacon for social distribution\u201d, available at: www.facebook.com\/press\/releases.php?p=9166 (accessed January 28, 2010)."},{"key":"key2022021620404771900_b17","doi-asserted-by":"crossref","unstructured":"Featherman, M. and Fuller, M.A. (2003), \u201cApplying TAM to e\u2010services adoption: the moderating role of perceived risk\u201d, Proceedings of 36th Hawaii International Conference on System Sciences (ICSS 2003), Big Island, HI, January 6\u20109.","DOI":"10.1109\/HICSS.2003.1174433"},{"key":"key2022021620404771900_b18","unstructured":"Featherman, M.S. and Pavlou, P.A. (2002), \u201cPredicting e\u2010services adoption: a perceived risk facets perspective\u201d, Eighth Americas Conference on Information Systems, Dallas, TX."},{"key":"key2022021620404771900_b19","doi-asserted-by":"crossref","unstructured":"Fogel, J. and Nehmad, E. (2009), \u201cInternet social network communities: risk taking, trust, and privacy concerns\u201d, Computers in Human Behavior, Vol. 25, pp. 153\u201060.","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"key2022021620404771900_b20","unstructured":"Gallaugher, J. (2010), Information Systems: A Manager's Guide to Harnessing Technology, FlatWorld Knowledge, Irvington, NY."},{"key":"key2022021620404771900_b21","unstructured":"Galliers, R. (1992), Information Systems Research: Issues, Methods & Practical Guidelines, Blackwell Scientific, Boston, MA."},{"key":"key2022021620404771900_b22","doi-asserted-by":"crossref","unstructured":"Gefen, D. and Straub, D.W. (1997), \u201cGender differences in the perception and use of e\u2010mail: an extension to the technology acceptance model\u201d, MIS Quarterly, Vol. 21 No. 4, pp. 389\u2010400.","DOI":"10.2307\/249720"},{"key":"key2022021620404771900_b23","doi-asserted-by":"crossref","unstructured":"Gefen, D. and Straub, D.W. (2000), \u201cThe relative importance of perceived ease of use in is adoption: a study of ecommerce adoption\u201d, Journal of the Association for Information Systems, Vol. 1 No. 8, pp. 1\u201028.","DOI":"10.17705\/1jais.00008"},{"key":"key2022021620404771900_b24","doi-asserted-by":"crossref","unstructured":"Gefen, D., Straub, D.W. and Boudreau, M.\u2010C. (2000), \u201cStructural equation modeling and regression: guidelines for research practice\u201d, Communications of the Association for Information Systems, Vol. 4 No. 7, pp. 1\u201070.","DOI":"10.17705\/1CAIS.00407"},{"key":"key2022021620404771900_b25","doi-asserted-by":"crossref","unstructured":"George, J. (2002), \u201cInfluences on the intent to make internet purchases\u201d, Internet Research, Vol. 12 No. 2, pp. 165\u201080.","DOI":"10.1108\/10662240210422521"},{"key":"key2022021620404771900_b26","doi-asserted-by":"crossref","unstructured":"Gross, R. and Acquisti, A. (2005), \u201cInformation revelation and privacy in online social networks\u201d, Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, pp. 71\u201080.","DOI":"10.1145\/1102199.1102214"},{"key":"key2022021620404771900_b27","unstructured":"Hair, J.F. Jr, Anderson, R.E., Tatham, R.L. and Black, W.C. (1998), Multivariate Data Analysis with Readings, 5th ed., Prentice Hall, Englewood Cliffs, NJ."},{"key":"key2022021620404771900_b28","doi-asserted-by":"crossref","unstructured":"Hu, P.J., Chau, P., Sheung, O. and Tam, K. (1999), \u201cExamining the technology acceptance model using physician acceptance of telemedicine technology\u201d, Journal of Management Information Systems, Vol. 16 No. 2, pp. 91\u2010112.","DOI":"10.1080\/07421222.1999.11518247"},{"key":"key2022021620404771900_b29","doi-asserted-by":"crossref","unstructured":"Igbaria, M., Guimaraes, T. and Davis, G. (1995), \u201cTesting the determinants of microcomputer usage via a structural equation model\u201d, Journal of Management Information Systems, Vol. 11 No. 4, pp. 87\u2010114.","DOI":"10.1080\/07421222.1995.11518061"},{"key":"key2022021620404771900_b30","doi-asserted-by":"crossref","unstructured":"Im, I., Kim, Y. and Han, H.J. (2008), \u201cThe effects of perceived risk and technology type on users' acceptance of technologies\u201d, Information & Management, Vol. 45, pp. 1\u20109.","DOI":"10.1016\/j.im.2007.03.005"},{"key":"key2022021620404771900_b31","doi-asserted-by":"crossref","unstructured":"Introna, L.D. and Pouloudi, A. (1999), \u201cPrivacy in the information age: stakeholders, interests and values\u201d, Journal of Business Ethics, Vol. 22 No. 1, pp. 27\u201038.","DOI":"10.1023\/A:1006151900807"},{"key":"key2022021620404771900_b32","unstructured":"Jaroslovsky, R. (2010), \u201cFacebook founder has nothing to hide except privacy blind spot\u201d, Business Week, June 9."},{"key":"key2022021620404771900_b33","unstructured":"Johnson, B. (2010), \u201cPrivacy no longer a social norm, says Facebook founder\u201d, The Guardian, January 11."},{"key":"key2022021620404771900_b34","doi-asserted-by":"crossref","unstructured":"Johnson, J.L. (1989), \u201cPrivacy and the judgment of others\u201d, The Journal of Value Inquiry, Vol. 23 No. 2, pp. 157\u201068.","DOI":"10.1007\/BF00137284"},{"key":"key2022021620404771900_b35","doi-asserted-by":"crossref","unstructured":"Karyda, M., Gritzalis, S., Park, J.H. and Kokolakis, S. (2009), \u201cPrivacy and fair information practices in ubiquitous environments\u201d, Internet Research, Vol. 19 No. 2, pp. 194\u2010208.","DOI":"10.1108\/10662240910952346"},{"key":"key2022021620404771900_b36","doi-asserted-by":"crossref","unstructured":"King, W.R. and He, J. (2006), \u201cA meta\u2010analysis of the technology acceptance model\u201d, Information & Management, Vol. 43, pp. 740\u201055.","DOI":"10.1016\/j.im.2006.05.003"},{"key":"key2022021620404771900_b37","unstructured":"Lanier, C.D. and Saini, A. (2008), \u201cUnderstanding consumer privacy: a review and future directions\u201d, Academy of Marketing Science Review, Vol. 12 No. 2."},{"key":"key2022021620404771900_b38","doi-asserted-by":"crossref","unstructured":"Lee, Y., Kozar, K. and Larsen, K. (2003), \u201cThe technology acceptance model: past, present, and future\u201d, Communications of the Association for Information Systems, Vol. 12 No. 50, available at: http:\/\/aisel.aisnet.org\/cais\/vol12\/iss1\/50.","DOI":"10.17705\/1CAIS.01250"},{"key":"key2022021620404771900_b39","unstructured":"McCarthy, C. (2008), \u201cAOL buys social network Bebo for $850 million\u201d, available at: http:\/\/news.cnet.com\/8301\u201013577_3\u20109893014\u201036.html (accessed January 30, 2010)."},{"key":"key2022021620404771900_b40","doi-asserted-by":"crossref","unstructured":"McKnight, D.H., Lankton, N. and Tripp, J. (2011), \u201cSocial networking information disclosure and continuance intention: a disconnect\u201d, Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 44), Manoa, HI, January 4\u20107.","DOI":"10.1109\/HICSS.2011.379"},{"key":"key2022021620404771900_b41","unstructured":"McWhirter, D.A. and Bible, J.D. (1992), Privacy as a Constitutional Right, Quorum Books, New York, NY."},{"key":"key2022021620404771900_b42","doi-asserted-by":"crossref","unstructured":"Milne, G.R. and Gordon, M.E. (1993), \u201cDirect mail privacy\u2010efficiency trade\u2010offs within an implied social contract framework\u201d, Journal of Public Policy & Marketing, Vol. 12, Fall, pp. 206\u201015.","DOI":"10.1177\/074391569101200206"},{"key":"key2022021620404771900_b44","doi-asserted-by":"crossref","unstructured":"Nowak, G. and Phelps, J. (1992), \u201cUnderstanding privacy concerns\u201d, Journal of Direct Marketing, Vol. 6 No. 4, pp. 28\u201039.","DOI":"10.1002\/dir.4000060407"},{"key":"key2022021620404771900_b45","doi-asserted-by":"crossref","unstructured":"Nowak, G. and Phelps, J. (1995), \u201cDirect marketing and the use of individual\u2010level consumer infonnation: determining how and when \u2018privacy\u2019 matters\u201d, Journal of Direct Marketing, Vol. 9 No. 3, pp. 46\u201060.","DOI":"10.1002\/dir.4000090307"},{"key":"key2022021620404771900_b46","unstructured":"Nunnally, J.C. (1978), Psychometric Theory, 2nd ed., McGraw\u2010Hill, New York, NY."},{"key":"key2022021620404771900_b47","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A., Liang, H. and Xue, Y. (2007), \u201cUnderstanding and mitigating uncertainty in online exchange relationships: a principal\u2010agent perspective\u201d, MIS Quarterly, Vol. 31 No. 1, pp. 105\u201036.","DOI":"10.2307\/25148783"},{"key":"key2022021620404771900_b48","doi-asserted-by":"crossref","unstructured":"Phelps, J., Nowak, G. and Ferrell, E. (2000), \u201cPrivacy concerns and consumer willingness to provide personal information\u201d, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 27\u201041.","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"key2022021620404771900_b49","doi-asserted-by":"crossref","unstructured":"Pinsonneault, A. and Kraemer, K. (1993), \u201cSurvey research methodology in management information systems: an assessment\u201d, Journal of Management Information Systems, Vol. 10 No. 1, pp. 75\u2010106.","DOI":"10.1080\/07421222.1993.11518001"},{"key":"key2022021620404771900_b50","unstructured":"Preibusch, S., Hoser, B., G\u00fcrses, S. and Berendt, B. (2007), \u201cUbiquitous social networks \u2013 opportunities and challenges for privacy\u2010aware user modelling\u201d, Proceedings of the Data Mining for User Modelling Workshop (DM.UM '07), Corfu, pp. 50\u201062."},{"key":"key2022021620404771900_b51","doi-asserted-by":"crossref","unstructured":"Prosser, W. (1960), \u201cThe torts of privacy\u201d, California Law Review, Vol. 48 No. 3, pp. 383\u2010423.","DOI":"10.2307\/3478805"},{"key":"key2022021620404771900_b52","doi-asserted-by":"crossref","unstructured":"Rimenschneider, C. and Hardgrave, B. (2001), \u201cExplaining software development tool use with the technology acceptance model\u201d, Journal of Computer Information Systems, Vol. 41 No. 4, pp. 1\u20108.","DOI":"10.1080\/08874417.2001.11647015"},{"key":"key2022021620404771900_b53","doi-asserted-by":"crossref","unstructured":"Rose, G., Khoo, H. and Straub, D. (1999), \u201cCurrent technological impediments to business\u2010to\u2010consumer electronic commerce\u201d, Communications of the AIS, Vol. 1 No. 16, pp. 1\u201073.","DOI":"10.17705\/1CAIS.00116"},{"key":"key2022021620404771900_b54","doi-asserted-by":"crossref","unstructured":"Rosenblum, D. (2007), \u201cWhat anyone can know: the privacy risks of social networking sites\u201d, IEEE Security and Privacy, Vol. 5 No. 3, pp. 40\u20109.","DOI":"10.1109\/MSP.2007.75"},{"key":"key2022021620404771900_b55","doi-asserted-by":"crossref","unstructured":"Schepers, J. and Wetzels, M. (2007), \u201cA meta\u2010analysis of the technology acceptance model: Investigating subjective norm and moderation effects\u201d, Information & Management, Vol. 44 No. 1, pp. 90\u2010103.","DOI":"10.1016\/j.im.2006.10.007"},{"key":"key2022021620404771900_b56","unstructured":"Schmidt, T.S. (2006), \u201cInside the backlash against Facebook\u201d, Time, September 6."},{"key":"key2022021620404771900_b57","doi-asserted-by":"crossref","unstructured":"Shin, D.H. (2010), \u201cThe effects of trust, security and privacy in social networking: a security\u2010based approach to understand the pattern of adoption\u201d, Interacting with Computers, Vol. 22 No. 5, pp. 428\u201038.","DOI":"10.1016\/j.intcom.2010.05.001"},{"key":"key2022021620404771900_b58","doi-asserted-by":"crossref","unstructured":"Shin, D.H. and Kim, W.Y. (2008), \u201cApplying the Technology Acceptance Model and flow theory to cyworld user behavior: implication of the Web 2.0 user acceptance\u201d, CyberPsychology & Behavior, Vol. 11 No. 3, pp. 378\u201082.","DOI":"10.1089\/cpb.2007.0117"},{"key":"key2022021620404771900_b59","unstructured":"Siklos, R. (2005), \u201cNews Corp. to acquire owner of Myspace.com\u201d, New York Times, July 18."},{"key":"key2022021620404771900_b60","unstructured":"Sloane, J. (2007), \u201cFacebook got its $15 billion valuation \u2013 now what?\u201d, Wired Magazine."},{"key":"key2022021620404771900_b61","unstructured":"Story, L. and Stone, B. (2007), \u201cFacebook retreats on online tracking\u201d, New York Times, November 30."},{"key":"key2022021620404771900_b62","doi-asserted-by":"crossref","unstructured":"Straub, D., Keil, M. and Brenner, W. (1997), \u201cTesting the technology acceptance model across cultures: a three country study\u201d, Information & Management, Vol. 33 No. 1, pp. 1\u201011.","DOI":"10.1016\/S0378-7206(97)00026-8"},{"key":"key2022021620404771900_b63","doi-asserted-by":"crossref","unstructured":"Sun, H. and Zhang, P. (2006), \u201cThe role of moderating factors in user technology acceptance\u201d, International Journal of Human\u2010Computer Studies, Vol. 64 No. 2, pp. 53\u201078.","DOI":"10.1016\/j.ijhcs.2005.04.013"},{"key":"key2022021620404771900_b64","unstructured":"Sweney, M. (2010), \u201cMark Zuckerberg: Facebook \u2018almost guaranteed\u2019 to reach 1 billion users\u201d, The Guardian."},{"key":"key2022021620404771900_b65","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. (2000), \u201cDeterminants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model\u201d, Information Systems Research, Vol. 11 No. 4, pp. 342\u201065.","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"key2022021620404771900_b66","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Davis, F.D. (2000), \u201cA theoretical extension of the technology acceptance model: four longitudinal field studies\u201d, Management Science, Vol. 46 No. 2, pp. 186\u2010204.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"key2022021620404771900_b67","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Davis, F. and Morris, M. (2007), \u201cDead or alive? The development, trajectory and future of technology adoption research\u201d, Journal of the Association for Information Systems, Vol. 8 No. 4, available at: http:\/\/aisel.aisnet.org\/jais\/vol8\/iss4\/10.","DOI":"10.17705\/1jais.00120"},{"key":"key2022021620404771900_b68","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G., Davis, F.D. and Davis, G.B. (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425\u201078.","DOI":"10.2307\/30036540"},{"key":"key2022021620404771900_b69","unstructured":"von Stetten, A., Wild, U. and Chrennikow, W. (2011), \u201cAdopting social network sites \u2010 the role of individual IT culture and privacy concerns\u201d, Proceedings of the Americas Conference on Information Systems (AMCIS 2011), Detroit, MI, 4\u20107 August."},{"key":"key2022021620404771900_b70","doi-asserted-by":"crossref","unstructured":"Warren, S.D. and Brandeis, L. (1890), \u201cThe right of privacy\u201d, Harvard Law Review, Vol. 4 No. 5, pp. 193\u2010220.","DOI":"10.2307\/1321160"},{"key":"key2022021620404771900_b71","unstructured":"Westin, A. (1967), Privacy and Freedom, Atheneum, New York, NY."},{"key":"key2022021620404771900_b72","unstructured":"Willis, T. (2008), \u201cAn evaluation of the technology acceptance model as a means of understanding online social networking behavior\u201d, Theses and Dissertations, Paper 568, available at http:\/\/scholarcommons.usf.edu\/etd\/568."},{"key":"key2022021620404771900_b73","doi-asserted-by":"crossref","unstructured":"Zhou, T. (2011), \u201cUnderstanding online community user participation: a social influence perspective\u201d, Internet Research, Vol. 21 No. 1, pp. 67\u201081.","DOI":"10.1108\/10662241111104884"},{"key":"key2022021620404771900_frg1","doi-asserted-by":"crossref","unstructured":"Nicolaou, A.I. and Harrison, M.D. (2006), \u201cPerceived information quality in data exchanges\u201d, Information Systems Research, Vol. 17 No. 4, pp. 332\u201051.","DOI":"10.1287\/isre.1060.0103"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662241211214575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662241211214575\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662241211214575\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:33Z","timestamp":1753400433000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/22\/2\/211-233\/179999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,30]]},"references-count":73,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3,30]]}},"alternative-id":["10.1108\/10662241211214575"],"URL":"https:\/\/doi.org\/10.1108\/10662241211214575","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2012,3,30]]}}}