{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T07:25:45Z","timestamp":1774596345219,"version":"3.50.1"},"reference-count":78,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2007,8,14]],"date-time":"2007-08-14T00:00:00Z","timestamp":1187049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8,14]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This study attempts to carry out an approximation both to the conceptual delimitation and to the measuring of customer concern for privacy on the electronic market.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>To complete the objective of this research, an overview of the literature is made in an attempt to summarise the main proposals as regards dimensions of the construct analysed. Furthermore, two studies were carried out with the aim of evaluating the instruments to measure concern for privacy on the internet and which support the conclusion concerning the construct's dimensionality, reached following the aforementioned literature overview.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>From the main results reached, we can highlight that the concern for privacy on the internet construct has a structure consisting of two dimensions, which are confirmed through the scales evaluated for different contexts of use of the internet. These dimensions are: concern for control over the collecting of personal information, and its use on the electronic market.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper's main contributions are threefold: a conceptual revision of the construct; a proposal of the dimensions for the construct; and an evaluation of two scales to measure the construct in different situations.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710780395","type":"journal-article","created":{"date-parts":[[2007,8,18]],"date-time":"2007-08-18T07:01:51Z","timestamp":1187420511000},"page":"420-439","source":"Crossref","is-referenced-by-count":32,"title":["The dimensionality of customer privacy concern on the internet"],"prefix":"10.1108","volume":"31","author":[{"given":"J. Alberto","family":"Casta\u00f1eda","sequence":"first","affiliation":[]},{"given":"Francisco J.","family":"Montoso","sequence":"additional","affiliation":[]},{"given":"Teodoro","family":"Luque","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020520185015000_b1","doi-asserted-by":"crossref","unstructured":"Anderson, J.C. and Gerbing, D.W. (1988), \u201cStructural equation modeling in practice: a review and recommended two\u2010step approach\u201d, Psychological Bulletin, Vol. 103, pp. 411\u201023.","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"key2022020520185015000_b2","unstructured":"Armstrong, J. (2004), \u201cPrivacy in Europe: the new agenda\u201d, Journal of Internet Law, November, pp. 3\u20107."},{"key":"key2022020520185015000_b3","doi-asserted-by":"crossref","unstructured":"Ashworth, L. and Free, C. (2006), \u201cMarketing dataveillance and digital privacy: using theories of justice to understand consumers' online privacy concerns\u201d, Journal of Business Ethics, Vol. 67, pp. 107\u201023.","DOI":"10.1007\/s10551-006-9007-7"},{"key":"key2022020520185015000_b4","doi-asserted-by":"crossref","unstructured":"Bearden, W.O., Hardesty, D.M. and Rose, R.L. (2001), \u201cConsumer self\u2010confidence: refinements in conceptualization and measurement\u201d, Journal of Consumer Research, Vol. 28, June, pp. 121\u201034.","DOI":"10.1086\/321951"},{"key":"key2022020520185015000_b5","doi-asserted-by":"crossref","unstructured":"Bellman, S., Johnson, E.J., Kobrin, S.J. and Lohse, G.L. (2004), \u201cInternational differences in information privacy concerns: a global survey of consumers\u201d, The Information Society, Vol. 20 No. 5, pp. 313\u201024.","DOI":"10.1080\/01972240490507956"},{"key":"key2022020520185015000_b6","doi-asserted-by":"crossref","unstructured":"Berry, D.M. (2004), \u201cInternet research: privacy, ethics and alienation: an open source approach\u201d, Internet Research, Vol. 14 No. 4, pp. 323\u201032.","DOI":"10.1108\/10662240410555333"},{"key":"key2022020520185015000_b7","doi-asserted-by":"crossref","unstructured":"Bowie, N.E. and Jamal, K. (2006), \u201cPrivacy rights on the internet: self\u2010regulation or government regulation?\u201d, Business Ethics Quarterly, Vol. 16 No. 3, pp. 323\u201042.","DOI":"10.5840\/beq200616340"},{"key":"key2022020520185015000_b8","unstructured":"Brown, M. and Muchira, R. (2004), \u201cInvestigating the relationship between internet privacy concerns and online purchase behavior\u201d, Journal of Electronic Commerce Research, Vol. 5 No. 1, pp. 62\u201070."},{"key":"key2022020520185015000_b9","doi-asserted-by":"crossref","unstructured":"Buchanan, T., Paine, C., Joinson, A.N. and Reips, U. (2007), \u201cDevelopment of measures of online privacy concern and protection for use on the internet\u201d, Journal of the American Society for Information Science and Technology, Vol. 58 No. 2, pp. 157\u201065.","DOI":"10.1002\/asi.20459"},{"key":"key2022020520185015000_b10","unstructured":"Casta\u00f1eda, J.A. and Montoro, F.J. (2005), \u201cLa preocupaci\u00f3n por la privacidad\/seguridad como barrera al desarrollo del comercio electr\u00f3nico: evaluaci\u00f3n, evoluci\u00f3n y propuestas de futuro\u201d, Informaci\u00f3n Comercial Espa\u00f1ola, Bolet\u00edn Econ\u00f3mico, No. 2835, pp. 25\u201040."},{"key":"key2022020520185015000_b11","doi-asserted-by":"crossref","unstructured":"Casta\u00f1eda, J.A. and Montoro, F.J. (2007), \u201cThe effect of internet general privacy concern on customer behavior\u201d, Electronic Commerce Research, Vol. 7 No. 2.","DOI":"10.1007\/s10660-007-9000-y"},{"key":"key2022020520185015000_b12","doi-asserted-by":"crossref","unstructured":"Caudill, E.M. and Murphy, P.E. (2000), \u201cConsumer online privacy: legal and ethical issues\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 7\u201019.","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"key2022020520185015000_b13","doi-asserted-by":"crossref","unstructured":"Chellappa, R. and Sin, R.G. (2005), \u201cPersonalization versus privacy: an empirical examination of the online consumer's dilemma\u201d, Information Technology and Management, Vol. 6, pp. 181\u2010202.","DOI":"10.1007\/s10799-005-5879-y"},{"key":"key2022020520185015000_b15","doi-asserted-by":"crossref","unstructured":"Christopherson, K.M. (2007), \u201cThe positive and negative implications of anonymity in Internet social interactions: \u2018on the internet, nobody knows you're a dog\u2019\u201d, Computers in Human Behavior, Vol. 23, pp. 3038\u201056.","DOI":"10.1016\/j.chb.2006.09.001"},{"key":"key2022020520185015000_b16","doi-asserted-by":"crossref","unstructured":"Churchill, G.A. (1979), \u201cA paradigm for developing better measures of marketing constructs\u201d, Journal of Marketing Research, Vol. 16, February, pp. 64\u201073.","DOI":"10.1177\/002224377901600110"},{"key":"key2022020520185015000_b17","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. (1993), \u201c\u2018How did they get my name\u2019: an exploratory investigation of consumer attitudes toward secondary information use\u201d, MIS Quarterly, September, pp. 341\u201061.","DOI":"10.2307\/249775"},{"key":"key2022020520185015000_b18","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. (1995), \u201cConsumer awareness of name removal procedures: implications for direct marketing\u201d, Journal of Direct Marketing, Vol. 9, Spring, pp. 10\u201019.","DOI":"10.1002\/dir.4000090204"},{"key":"key2022020520185015000_b19","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. and Armstrong, P.K. (1999), \u201cInformation privacy concerns, procedural fairness, and impersonal trust: an empirical investigation\u201d, Organization Science, Vol. 10 No. 1, pp. 104\u201016.","DOI":"10.1287\/orsc.10.1.104"},{"key":"key2022020520185015000_b20","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. and Milberg, S.J. (1998), \u201cThe second exchange: managing customer information in marketing relationships\u201d, available at: www.gsb.georgetown.edu\/dept\/facserv\/faculty\/culnanm\/research\/jm0798.pdf.","DOI":"10.2139\/ssrn.2621796"},{"key":"key2022020520185015000_b21","unstructured":"Culnan, M.J. and Milberg, S.J. (1999), \u201cConsumer privacy\u201d, available at: www.gsb.georgetown.edu\/dept\/facserv\/faculty\/culnanm\/research\/conspriv.pdf."},{"key":"key2022020520185015000_b22","doi-asserted-by":"crossref","unstructured":"Day, G. and Montgomery, D. (1999), \u201cCharting new directions for marketing\u201d, Journal of Marketing, Vol. 63, pp. 3\u201013.","DOI":"10.2307\/1252096"},{"key":"key2022020520185015000_b23","unstructured":"DeVellis, R.F. (2003), Scale Development: Theory and Applications, 2nd ed., Sage Publications, Thousand Oaks, CA."},{"key":"key2022020520185015000_b24","doi-asserted-by":"crossref","unstructured":"Dinev, T. and Hart, P. (2004), \u201cInternet privacy concerns and their antecedents \u2013 measurement validity and a regression model\u201d, Behavior and Information Technology, Vol. 23 No. 6, pp. 413\u201022.","DOI":"10.1080\/01449290410001715723"},{"key":"key2022020520185015000_b25","doi-asserted-by":"crossref","unstructured":"Dinev, T. and Hart, P. (2006), \u201cInternet privacy concerns and social awareness as determinants of intentions to transact\u201d, International Journal of Electronic Commerce, Vol. 10 No. 2, pp. 7\u201029.","DOI":"10.2753\/JEC1086-4415100201"},{"key":"key2022020520185015000_b26","doi-asserted-by":"crossref","unstructured":"Dinev, T., Bellotto, M., Hart, P., Russo, V. and Serra, I. (2006), \u201cInternet users' privacy concerns and beliefs about government surveillance: an exploratory study of differences between Italy and the United States\u201d, Journal of Global Information Management, Vol. 14 No. 4, pp. 57\u201093.","DOI":"10.4018\/jgim.2006100103"},{"key":"key2022020520185015000_b27","unstructured":"Eurostat (2006a), Information Society Statistics: Perceived Barriers to Buying\/Ordering over the Internet, Science and Technology Data, European Commission, Brussels."},{"key":"key2022020520185015000_b28","unstructured":"Eurostat (2006b), Information Society Statistics: Individuals Internet Use, Science and Technology Data, European Commission, Brussels."},{"key":"key2022020520185015000_b29","doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D.F. (1981), \u201cEvaluating structural equation models with unobservable variables and measurement error\u201d, Journal of Marketing Research, Vol. 18, February, pp. 39\u201050.","DOI":"10.1177\/002224378101800104"},{"key":"key2022020520185015000_b30","doi-asserted-by":"crossref","unstructured":"Foxman, E.R. and Kilcoyne, P. (1993), \u201cInformation technology, marketing practice, and consumer privacy: ethical issues\u201d, Journal of Public Policy and Marketing, Vol. 12, Spring, pp. 106\u201019.","DOI":"10.1177\/074391569501200111"},{"key":"key2022020520185015000_b31","doi-asserted-by":"crossref","unstructured":"George, J.F. (2002), \u201cInfluences on the intent to make internet purchases\u201d, Internet Research, Vol. 12 No. 2, pp. 165\u201080.","DOI":"10.1108\/10662240210422521"},{"key":"key2022020520185015000_b32","doi-asserted-by":"crossref","unstructured":"George, J.F. (2004), \u201cThe theory of planned behavior and internet purchasing\u201d, Internet Research, Vol. 14 No. 3, pp. 198\u2010212.","DOI":"10.1108\/10662240410542634"},{"key":"key2022020520185015000_b33","doi-asserted-by":"crossref","unstructured":"Goodwin, C. (1991), \u201cPrivacy: recognition of a consumer right\u201d, Journal of Public Policy and Marketing, Vol. 10 No. 1, pp. 149\u201066.","DOI":"10.1177\/074391569101000111"},{"key":"key2022020520185015000_b34","doi-asserted-by":"crossref","unstructured":"Graeff, T.R. and Harmon, S. (2002), \u201cCollecting and using personal data: consumers' awareness and concerns\u201d, The Journal of Consumer Marketing, Vol. 19 Nos 4\/5, pp. 302\u201018.","DOI":"10.1108\/07363760210433627"},{"key":"key2022020520185015000_b35","unstructured":"Hair, J.F., Anderson, R.E., Tathan, R.L. and Black, W.C. (1998), Multivariate Data Analysis, Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022020520185015000_b36","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L. and Novak, T.P. (1996), \u201cMarketing in hypermedia computer\u2010mediated environments: conceptual foundations\u201d, Journal of Marketing, Vol. 60 No. 3, pp. 50\u201068.","DOI":"10.1177\/002224299606000304"},{"key":"key2022020520185015000_b37","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L., Novak, T.P. and Peralta, M.A. (1999a), \u201cInformation privacy in the marketspace: implications for the commercial uses of anonymity on the web\u201d, The Information Society, Vol. 15, pp. 129\u201039.","DOI":"10.1080\/019722499128583"},{"key":"key2022020520185015000_b38","doi-asserted-by":"crossref","unstructured":"Hoffman, D.L., Novak, T.P. and Peralta, M.A. (1999b), \u201cBuilding consumer trust in online environments: the case for information privacy\u201d, Communications of the ACM, Vol. 42 No. 4, pp. 80\u20105.","DOI":"10.1145\/299157.299175"},{"key":"key2022020520185015000_b39","doi-asserted-by":"crossref","unstructured":"Hsu, C. (2006), \u201cPrivacy concerns, privacy practices and web site categories: toward a situational paradigm\u201d, Online Information Review, Vol. 30 No. 5, pp. 569\u201086.","DOI":"10.1108\/14684520610706433"},{"key":"key2022020520185015000_b40","doi-asserted-by":"crossref","unstructured":"Hulin, C., Cudeck, R., Netemeyer, R., Dillon, W.R., McDonald, R. and Bearden, W. (2001), \u201cMeasurement\u201d, Journal of Consumer Psychology, Vol. 10 Nos 1\/2, pp. 55\u201069.","DOI":"10.1207\/S15327663JCP1001&2_05"},{"key":"key2022020520185015000_b41","doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C. and Jensen, C. (2005), \u201cPrivacy practices of internet users: self\u2010reports versus observed behaviour\u201d, International Journal of Human\u2010Computer Studies, Vol. 63, pp. 203\u201027.","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"key2022020520185015000_b42","doi-asserted-by":"crossref","unstructured":"Kelly, E.P. and Rowland, H.C. (2000), \u201cEthical and online privacy issues in electronic commerce\u201d, Business Horizons, Vol. 43, pp. 3\u201012.","DOI":"10.1016\/S0007-6813(00)89195-8"},{"key":"key2022020520185015000_b43","unstructured":"Kerlinger, F. (1984), Foundations of Behavioral Research, Holt, Rinehart and Winston, New York, NY."},{"key":"key2022020520185015000_b44","doi-asserted-by":"crossref","unstructured":"Lohse, G.L., Bellman, S. and Johnson, E.J. (2000), \u201cConsumer buying behavior on the internet: findings from panel data\u201d, Journal of Interactive Marketing, Vol. 14 No. 1, pp. 15\u201029.","DOI":"10.1002\/(SICI)1520-6653(200024)14:1<15::AID-DIR2>3.0.CO;2-C"},{"key":"key2022020520185015000_b48","doi-asserted-by":"crossref","unstructured":"McKnight, D.H. and Chervany, N.L. (2002), \u201cWhat trust means in e\u2010commerce customer relationships: an interdisciplinary conceptual typology\u201d, International Journal of Electronic Commerce, Vol. 6 No. 2, pp. 35\u201059.","DOI":"10.1080\/10864415.2001.11044235"},{"key":"key2022020520185015000_b45","unstructured":"Malhotra, N.K. and Birks, D.F. (2003), Marketing Research: An Applied Approach, 2nd European ed., Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022020520185015000_b46","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004), \u201cInternet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model\u201d, Information Systems Research, Vol. 15 No. 4, pp. 336\u201055.","DOI":"10.1287\/isre.1040.0032"},{"key":"key2022020520185015000_b47","doi-asserted-by":"crossref","unstructured":"May, B.E., Chen, J.V. and Wen, K. (2004), \u201cThe differences of regulatory models and internet regulation in the European Union and the United States\u201d, Information and Communications Technology Law, Vol. 13 No. 3, pp. 259\u201072.","DOI":"10.1080\/1360083042000289077"},{"key":"key2022020520185015000_b49","doi-asserted-by":"crossref","unstructured":"Milne, G.R. (2000), \u201cPrivacy and ethical issues in database\/interactive marketing and public policy: a research framework and overview of the special issue\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 1\u20106.","DOI":"10.1509\/jppm.19.1.1.16934"},{"key":"key2022020520185015000_b50","doi-asserted-by":"crossref","unstructured":"Milne, G.R. and Boza, M.E. (1999), \u201cTrust and concern in consumers' perceptions of marketing information management practices\u201d, Journal of Interactive Marketing, Vol. 13 No. 1, pp. 5\u201024.","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9"},{"key":"key2022020520185015000_b51","doi-asserted-by":"crossref","unstructured":"Milne, G.R. and Rohm, A.J. (2000), \u201cConsumer privacy and name removal across direct marketing channels: exploring opt\u2010in and opt\u2010out alternatives\u201d, Journal of Public and Marketing, Vol. 19 No. 2, pp. 238\u201049.","DOI":"10.1509\/jppm.19.2.238.17136"},{"key":"key2022020520185015000_b52","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.D. and Fernandez, A. (2000), \u201cInternet privacy and security: an examination of online retailer disclosures\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 54\u201061.","DOI":"10.1509\/jppm.19.1.54.16942"},{"key":"key2022020520185015000_b53","doi-asserted-by":"crossref","unstructured":"Nowak, G.J. and Phelps, J. (1995), \u201cDirect marketing and the use of individual\u2010level consumer information: determining how and when \u2018privacy\u2019 matters\u201d, Journal of Direct Marketing, Vol. 9, pp. 46\u201060.","DOI":"10.1002\/dir.4000090307"},{"key":"key2022020520185015000_b54","doi-asserted-by":"crossref","unstructured":"Olivero, N. and Lunt, P. (2004), \u201cPrivacy versus willingness to disclose in e\u2010commerce exchanges: the effect of risk awareness on the relative role of trust and control\u201d, Journal of Economic Psychology, Vol. 25 No. 2, pp. 243\u201062.","DOI":"10.1016\/S0167-4870(02)00172-1"},{"key":"key2022020520185015000_b55","doi-asserted-by":"crossref","unstructured":"Palmer, D.E. (2005), \u201cPop\u2010ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices\u201d, Journal of Business Ethics, Vol. 58, pp. 271\u201080.","DOI":"10.1007\/s10551-005-1421-8"},{"key":"key2022020520185015000_b56","doi-asserted-by":"crossref","unstructured":"Peck, J. and Childers, T.L. (2003), \u201cIndividual differences in haptic information processing: the \u2018need for touch\u2019 scale\u201d, Journal of Consumer Research, Vol. 30, December, pp. 430\u201042.","DOI":"10.1086\/378619"},{"key":"key2022020520185015000_b57","doi-asserted-by":"crossref","unstructured":"Peter, J.P. and Churchill, G.A. (1986), \u201cRelationships among research design choices and psychometric properties of rating scales\u201d, Journal of Marketing Research, Vol. 23, pp. 1\u201010.","DOI":"10.1177\/002224378602300101"},{"key":"key2022020520185015000_b58","doi-asserted-by":"crossref","unstructured":"Phelps, J., Nowak, G. and Ferrell, E. (2000), \u201cPrivacy concerns and consumer willingness to provide personal information\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 27\u201041.","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"key2022020520185015000_b59","doi-asserted-by":"crossref","unstructured":"Phelps, J.E., D'Souza, G. and Nowak, G.J. (2001), \u201cAntecedents and consequences of consumer privacy concerns: an empirical investigation\u201d, Journal of Interactive Marketing, Vol. 15 No. 4, pp. 2\u201017.","DOI":"10.1002\/dir.1019"},{"key":"key2022020520185015000_b60","doi-asserted-by":"crossref","unstructured":"Pollach, I. (2005), \u201cA typology of communicative strategies in online privacy policies: ethics, power and informed consent\u201d, Journal of Business Ethics, Vol. 62, pp. 221\u201035.","DOI":"10.1007\/s10551-005-7898-3"},{"key":"key2022020520185015000_b61","unstructured":"Rachels, J. (1975), \u201cWhy privacy is important\u201d, Philosophy and Public Affairs, Vol. 4, pp. 323\u201033."},{"key":"key2022020520185015000_b62","doi-asserted-by":"crossref","unstructured":"Rindskopf, D. and Rose, T. (1988), \u201cSome theory and applications of confirmatory second\u2010order analysis\u201d, Multivariate Behavioural Research, Vol. 23, January, pp. 51\u201067.","DOI":"10.1207\/s15327906mbr2301_3"},{"key":"key2022020520185015000_b63","doi-asserted-by":"crossref","unstructured":"Sheehan, K.B. (2002), \u201cToward a typology of internet users and online privacy concern\u201d, The Information Society, Vol. 18, pp. 21\u201032.","DOI":"10.1080\/01972240252818207"},{"key":"key2022020520185015000_b64","doi-asserted-by":"crossref","unstructured":"Sheehan, K.B. and Hoy, M.G. (1999), \u201cFlaming, complaining, abstaining: how online users respond to privacy concerns\u201d, Journal of Advertising, Vol. 28 No. 3, pp. 37\u201051.","DOI":"10.1080\/00913367.1999.10673588"},{"key":"key2022020520185015000_b65","doi-asserted-by":"crossref","unstructured":"Sheehan, K.B. and Hoy, M.G. (2000), \u201cDimensions of privacy concern among online consumers\u201d, Journal of Public Policy and Marketing, Vol. 19 No. 1, pp. 62\u201073.","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"key2022020520185015000_b66","doi-asserted-by":"crossref","unstructured":"Smith, A.D. (2004), \u201cCybercriminals impacts on online business and consumer confidence\u201d, Online Information Review, Vol. 28 No. 3, pp. 224\u201034.","DOI":"10.1108\/14684520410543670"},{"key":"key2022020520185015000_b67","doi-asserted-by":"crossref","unstructured":"Smith, A.D. (2005), \u201cExploring online dating and customer relationship management\u201d, Online Information Review, Vol. 29 No. 1, pp. 18\u201033.","DOI":"10.1108\/14684520510583927"},{"key":"key2022020520185015000_b68","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Manna, D.R. (2004), \u201cExploring the trust factor in e\u2010medicine\u201d, Online Information Review, Vol. 28 No. 5, pp. 346\u201055.","DOI":"10.1108\/14684520410564271"},{"key":"key2022020520185015000_b69","doi-asserted-by":"crossref","unstructured":"Smith, S.J., Milberg, S.J. and Burke, S. (1996), \u201cInformation privacy: measuring individuals' concerns about organizational practices\u201d, MIS Quarterly, Vol. 20 No. 2, pp. 167\u201096.","DOI":"10.2307\/249477"},{"key":"key2022020520185015000_b70","doi-asserted-by":"crossref","unstructured":"Steenkamp, J.B. and Van Trijp, H.C.M. (1991), \u201cThe use of LISREL in validating marketing construct\u201d, International Journal of Research in Marketing, Vol. 8, pp. 283\u201099.","DOI":"10.1016\/0167-8116(91)90027-5"},{"key":"key2022020520185015000_b71","doi-asserted-by":"crossref","unstructured":"Steinke, G. (2002), \u201cData privacy approaches from US and EU perspectives\u201d, Telematics and Informatics, Vol. 19, pp. 193\u2010200.","DOI":"10.1016\/S0736-5853(01)00013-2"},{"key":"key2022020520185015000_b72","doi-asserted-by":"crossref","unstructured":"Stewart, K.A. and Sagars, A.H. (2002), \u201cAn empirical examination of the concern for information privacy instrument\u201d, Information Systems Research, Vol. 13 No. 1, pp. 36\u201049.","DOI":"10.1287\/isre.13.1.36.97"},{"key":"key2022020520185015000_b73","doi-asserted-by":"crossref","unstructured":"Tepper, K., Bearden, W.O. and Hunter, G.L. (2001), \u201cConsumers' need for uniqueness: scale development and validation\u201d, Journal of Consumer Research, Vol. 28, June, pp. 50\u201066.","DOI":"10.1086\/321947"},{"key":"key2022020520185015000_b74","unstructured":"Urban, G.L., Sultan, F. and Qualls, W.J. (2000), \u201cPlacing trust at the center of your internet strategy\u201d, Sloan Management Review, Vol. 42 No. 1, pp. 39\u201048."},{"key":"key2022020520185015000_b75","doi-asserted-by":"crossref","unstructured":"Wang, H., Lee, M.K.O. and Wang, C. (1998), \u201cConsumer privacy concerns about internet marketing\u201d, Communications of the ACM, Vol. 41 No. 3, pp. 63\u201070.","DOI":"10.1145\/272287.272299"},{"key":"key2022020520185015000_b76","doi-asserted-by":"crossref","unstructured":"Warren, S. and Brandeis, L. (1984), \u201cThe right to privacy\u201d, in Schoeman, F. (Ed.), Philosophical Dimensions of Privacy, Cambridge University Press, Cambridge, pp. 75\u2010103.","DOI":"10.1017\/CBO9780511625138.005"},{"key":"key2022020520185015000_b77","doi-asserted-by":"crossref","unstructured":"Weiber, R. and Kollmann, T. (1998), \u201cCompetitive advantages in virtual markets\u2010perspectives of 'information\u2010based marketing' in cyberspace\u201d, European Journal of Marketing, Vol. 32 Nos 7\/8, pp. 603\u201015.","DOI":"10.1108\/03090569810224010"},{"key":"key2022020520185015000_b78","unstructured":"Westin, A. (1967), Privacy and Freedom, Athenaeum, New York, NY."},{"key":"key2022020520185015000_b79","doi-asserted-by":"crossref","unstructured":"Zhang, X. (2005), \u201cWhat do consumers really know about spyware?\u201d, Communications of the ACM, Vol. 48 No. 8, pp. 44\u20108.","DOI":"10.1145\/1076211.1076238"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710780395","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710780395\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710780395\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:49Z","timestamp":1753404049000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/4\/420-439\/315494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,14]]},"references-count":78,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,8,14]]}},"alternative-id":["10.1108\/14684520710780395"],"URL":"https:\/\/doi.org\/10.1108\/14684520710780395","relation":{},"ISSN":["1468-4527"],"issn-type":[{"value":"1468-4527","type":"print"}],"subject":[],"published":{"date-parts":[[2007,8,14]]}}}