{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T06:45:49Z","timestamp":1776408349444,"version":"3.51.2"},"reference-count":51,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2019,8,26]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder a customer\u2019s willingness to disclose personal information (WTD) to online firms on e-commerce websites.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Based on an extensive literature review, three sets of factors have been identified. These sets of factors are privacy concern, perceived disclosure benefits and privacy assurances. It is hypothesized that privacy concerns negatively affect the disclosure of personal information, while the perceived benefits of disclosure have positive effects. Privacy assurances would positively affect information disclosure and attenuate the negative effect of privacy concerns on the disclosure of personal information. The authors gathered data from 253 online customers in Saudi Arabia.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The results indicate that perceived disclosure benefits and privacy concerns have a significant positive and negative relationship, respectively, with WTD online. Privacy assurances had neither a direct nor a moderating effect on information disclosure.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The findings will inform online firms about the factors that prevent or motivate customers to disclose personal information.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The effect of privacy concerns and benefits on personal information disclosure are not fully understood in Saudi Arabia. This study reveals more insights into the specific factors that make online customers reluctant or motivated to disclose their personal information.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-01-2018-0012","type":"journal-article","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T09:58:20Z","timestamp":1567591100000},"page":"161-181","source":"Crossref","is-referenced-by-count":25,"title":["The willingness to disclose personal information"],"prefix":"10.1108","volume":"28","author":[{"given":"Ibrahim M.","family":"Al-Jabri","sequence":"first","affiliation":[]},{"given":"Mustafa I.","family":"Eid","sequence":"additional","affiliation":[]},{"given":"Amer","family":"Abed","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022100513442125900_ref001","volume-title":"Multiple Regression: Testing and Interpreting Interactions","year":"1991"},{"issue":"4","key":"key2022100513442125900_ref002","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1111\/j.1559-1816.2002.tb00236.x","article-title":"Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior","volume":"32","year":"2002","journal-title":"Journal of Applied Social Psychology"},{"issue":"1","key":"key2022100513442125900_ref003","first-page":"83","article-title":"Factors influencing E-Commerce adoption by retailers in Saudi Arabia: a qualitative analysis","volume":"3","year":"2012","journal-title":"The Electronic Journal of Information Systems in Developing Countries"},{"issue":"5","key":"key2022100513442125900_ref004","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1108\/ICS-01-2018-0006","article-title":"Information security practice in Saudi Arabia: case study on Saudi organizations","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"issue":"6","key":"key2022100513442125900_ref005","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1057\/ejis.2014.41","article-title":"The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern","volume":"24","year":"2015","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2022100513442125900_ref006","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/004912418101000205","article-title":"Snowball sampling: problems and techniques of chain referral sampling","volume":"10","year":"1981","journal-title":"Sociological Methods and Research"},{"issue":"2\/3","key":"key2022100513442125900_ref007","first-page":"181","article-title":"Personalization versus privacy: an empirical examination of the online consumer\u2019s dilemma","volume":"6","year":"2005","journal-title":"Information Technology and Management"},{"key":"key2022100513442125900_ref008","unstructured":"Chen, J., Ping, W., Xu, Y. and Tan, B.C.Y. (2009), \u201cAm I afraid of my peers? Understanding the antecedents of information privacy concerns in the online social context\u201d, paper presented at the 30th International Conference on Information Systems, 15-18 December, Phoenix, AZ, available at: http:\/\/aisel.aisnet.org\/icis2009\/174 (accessed 22 March 2017)."},{"issue":"1","key":"key2022100513442125900_ref009","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1111\/j.1365-2575.2012.00407.x","article-title":"Understanding customers\u2019 repeat purchase intentions in B2C e-commerce: the roles of utilitarian value, hedonic value and perceived risk","volume":"24","year":"2014","journal-title":"Information Systems Journal"},{"issue":"1","key":"key2022100513442125900_ref010","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation","volume":"10","year":"1999","journal-title":"Organization Science"},{"issue":"3","key":"key2022100513442125900_ref011","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1108\/09685221211247325","article-title":"E-commerce policies and customer privacy: a longitudinal study (2000-2010)","volume":"20","year":"2012","journal-title":"Information Management and Computer Security"},{"key":"key2022100513442125900_ref012","doi-asserted-by":"crossref","unstructured":"Dinev, T. and Hart, P. (2003), \u201cPrivacy concerns and internet use \u2013 a model of Trade-Off factors\u201d, paper presented at the Academy of Management, 1-6 August, Seattle, Washington, DC, available at: http:\/\/proceedings.aom.org\/content\/2003\/1\/D1.6.full.pdf (accessed 16 Jun 2017).","DOI":"10.5465\/ambpp.2003.13792464"},{"issue":"1","key":"key2022100513442125900_ref013","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"1","key":"key2022100513442125900_ref014","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2022100513442125900_ref015","first-page":"71","article-title":"Information revelation and privacy in online social networks","year":"2005"},{"issue":"4","key":"key2022100513442125900_ref016","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1108\/ICS-05-2015-0020","article-title":"Online privacy and security concerns of consumers","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"key":"key2022100513442125900_ref01a","volume-title":"Multivariate Data Analysis","year":"1998","edition":"5th ed."},{"issue":"2","key":"key2022100513442125900_ref017","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240202","article-title":"Overcoming online information privacy concerns: an Information-Processing theory approach","volume":"24","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2022100513442125900_ref018","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1111\/j.1467-9531.2011.01244.x","article-title":"Comment: snowball versus respondent-driven sampling","volume":"41","year":"2011","journal-title":"Sociological Methodology"},{"issue":"1","key":"key2022100513442125900_ref019","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","article-title":"Internet privacy concerns: an integrated conceptualization and four empirical studies","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2022100513442125900_ref020","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1108\/09564231311323962","article-title":"Measuring consumer perceptions of online shopping convenience","volume":"24","year":"2013","journal-title":"Journal of Service Management"},{"issue":"2","key":"key2022100513442125900_ref021","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1080\/07421222.2017.1334467","article-title":"Beyond the personalization\u2013privacy paradox: privacy valuation, transparency features, and service personalization","volume":"34","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"key2022100513442125900_ref022","unstructured":"Keith, M.J., Babb, J.S.J., Furner, C.P. and Abdullat, A. (2010), \u201cPrivacy assurance and network effects in the adoption of location-based services: an iPhone experiment\u201d, paper presented at the 31st International Conference on Information Systems, 12-15 December 2010, St. Louis, MO, available at: http:\/\/aisel.aisnet.org\/icis2010_submissions\/237 (accessed 26 March 2017)."},{"issue":"3","key":"key2022100513442125900_ref023","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue: a multidimensional developmental theory","volume":"33","year":"1977","journal-title":"Journal of Social Issues"},{"issue":"5","key":"key2022100513442125900_ref024","first-page":"987","article-title":"Personalisation-privacy paradox: the effects of personalisation and privacy assurance on customer responses to travel web sites","volume":"32","year":"2014","journal-title":"Tourism Management"},{"key":"key2022100513442125900_ref025","first-page":"453","article-title":"Empirical studies on online information privacy concerns: literature review and an integrative framework","volume":"28","year":"2011","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"key2022100513442125900_ref026","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: a critical review and an integrated framework","volume":"54","year":"2012","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2022100513442125900_ref027","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1002\/asi.21705","article-title":"Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers","volume":"63","year":"2012","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"4","key":"key2022100513442125900_ref028","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"issue":"1","key":"key2022100513442125900_ref029","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1177\/1094670511424924","article-title":"Disclosure antecedents in an online service context: the role","volume":"15","year":"2012","journal-title":"Journal of Service Research"},{"key":"key2022100513442125900_ref030","volume-title":"Psychometric Theory","year":"1994"},{"issue":"4","key":"key2022100513442125900_ref031","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1111\/j.1468-2885.1991.tb00023.x","article-title":"Communication boundary management: a theoretical model of managing disclosure of private information between marital couples","volume":"1","year":"1991","journal-title":"Communication Theory"},{"issue":"3","key":"key2022100513442125900_ref032","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2753\/JEC1086-4415140304","article-title":"Customer information sharing with E-vendors: the roles of incentives and trust","volume":"14","year":"2010","journal-title":"International Journal of Electronic Commerce"},{"issue":"1","key":"key2022100513442125900_ref033","doi-asserted-by":"crossref","first-page":"227","DOI":"10.2308\/isys-50696","article-title":"Understanding the components of information privacy threats for Location-Based services","volume":"28","year":"2014","journal-title":"Journal of Information Systems"},{"issue":"1","key":"key2022100513442125900_ref034","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","year":"1975","journal-title":"The Journal of Psychology"},{"key":"key2022100513442125900_ref035","unstructured":"Sacha Orloff Group (2014), \u201cBeyond the digital divide: evolving digital commerce in the kingdom of Saudi Arabia 2014\u201d, available at: http:\/\/media.wix.com\/ugd\/17fd63_f7f73aaa041b46fc8de638b8544402ab.pdf (accessed 27 August 2017)."},{"key":"key2022100513442125900_ref036","unstructured":"Saeed, M.A. and Saleem, M.A. (2015), \u201cCyber security and data privacy law in Saudi Arabia\u201d, available at: www.financierworldwide.com\/cyber-security-and-data-privacy-law-in-saudi-arabia\/ (accessed 30 Jun 2018)."},{"key":"key2022100513442125900_ref037","first-page":"2222","article-title":"B2C e-Commerce consumer decision-making model based on perceived benefit and perceived risk","volume-title":"2010 International Conference on E-Business and E-Government, 7-9 May","year":"2010"},{"issue":"5","key":"key2022100513442125900_ref038","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.elerap.2014.06.007","article-title":"Disclosing too much? Situational factors affecting information disclosure in social commerce environment","volume":"13","year":"2014","journal-title":"Electronic Commerce Research and Applications"},{"issue":"4","key":"key2022100513442125900_ref039","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1002\/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O","article-title":"An investigation of gender differences in on-line privacy concerns and resultant behaviors","volume":"13","year":"1999","journal-title":"Journal of Interactive Marketing"},{"issue":"4","key":"key2022100513442125900_ref040","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2022100513442125900_ref041","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals\u2019 concerns about organizational practices","volume":"20","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2022100513442125900_ref042","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users\u2019 information Privacy-protective responses: a taxonomy and a nomological model","volume":"32","year":"2008","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2022100513442125900_ref043","doi-asserted-by":"crossref","first-page":"153","DOI":"10.2753\/MIS0742-1222240406","article-title":"Gaining trust through online privacy protection: Self-Regulation, mandatory standards, or caveat emptor","volume":"24","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2022100513442125900_ref044","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/1097198X.2010.10856520","article-title":"Locus of control and location privacy: an empirical study in Singapore","volume":"13","year":"2010","journal-title":"Journal of Global Information Technology Management"},{"issue":"12","key":"key2022100513442125900_ref045","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: linking individual perceptions with institutional privacy assurances","volume":"12","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"key2022100513442125900_ref046","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10660-013-9111-6","article-title":"Factors affecting privacy disclosure on social network sites: an integrated model","volume":"13","year":"2013","journal-title":"Electronic Commerce Research"},{"issue":"4","key":"key2022100513442125900_ref047","doi-asserted-by":"crossref","first-page":"1342","DOI":"10.1287\/isre.1120.0416","article-title":"Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services","volume":"23","year":"2012","journal-title":"Information Systems Research"},{"issue":"3","key":"key2022100513442125900_ref048","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","article-title":"The role of push-pull technology in privacy calculus: the case of location-based services","volume":"26","year":"2009","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"key2022100513442125900_ref049","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1108\/OIR-09-2016-0264","article-title":"What drives internet users\u2019 willingness to provide personal information","volume":"42","year":"2018","journal-title":"Online Information Review"},{"issue":"2","key":"key2022100513442125900_ref050","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1108\/17505930910964795","article-title":"Users\u2019 perceptions on privacy and their intention to transact online: a study on greek internet users","volume":"3","year":"2009","journal-title":"Direct Marketing: An International Journal"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2018-0012\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2018-0012\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:35Z","timestamp":1753406555000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/2\/161-181\/104972"}},"subtitle":["Trade-off between privacy concerns and benefits"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,8,26]]}},"alternative-id":["10.1108\/ICS-01-2018-0012"],"URL":"https:\/\/doi.org\/10.1108\/ics-01-2018-0012","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,26]]}}}