{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T14:46:08Z","timestamp":1774277168641,"version":"3.50.1"},"reference-count":40,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,8,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured influences on behaviour may exist. This paper aims to demonstrate one such link \u2013 the effect of internet addiction on information disclosure.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Data from 216 Web users was collected regarding their perceptions on privacy and information disclosure intentions as well as avoidance behaviour, an element of internet addiction. Using a research model based on the Privacy Calculus theory, structural equation modelling was applied to quantify the determinants of online disclosure under various conditions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The authors show that not all aspects of privacy (a multi-dimensional construct) influence information disclosure. While concerns about data collection influence self-disclosure behaviour, the level of awareness about privacy does not. They next examine the impact of internet addiction on these relationships, finding that internet addiction weakens the influence of privacy concerns to the point of non-significance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The authors highlight some of the influences of self-disclosure behaviour, showing that some but not all aspects of privacy are influential. They also demonstrate that there are powerful influences on user behaviour that have not been accounted for in prior work; internet addiction is one of these factors. This provides some of the first evidence of the potentially deleterious effect of internet addiction on the privacy calculus.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ics-11-2020-0190","type":"journal-article","created":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T08:15:32Z","timestamp":1617696932000},"page":"558-569","source":"Crossref","is-referenced-by-count":5,"title":["Do privacy concerns determine online information disclosure? The case of internet addiction"],"prefix":"10.1108","volume":"29","author":[{"given":"Nik","family":"Thompson","sequence":"first","affiliation":[]},{"given":"Atif","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Maynard","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,4,5]]},"reference":[{"key":"key2021081408083762400_ref001","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1016\/j.chb.2016.02.098","article-title":"Understanding compulsive social media use: the premise of complementing self-conceptions mismatch with technology","volume":"60","year":"2016","journal-title":"Computers in Human Behaviour"},{"issue":"2","key":"key2021081408083762400_ref002","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1108\/ICS-01-2018-0012","article-title":"The willingness to disclose personal information: trade-off between privacy concerns and benefits","volume":"28","year":"2019","journal-title":"Information and Computer Security"},{"issue":"3","key":"key2021081408083762400_ref003","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021081408083762400_ref004","first-page":"4","article-title":"The internet of things and its impact on individual privacy: an Australian privacy principle perspective","volume":"21","year":"2016","journal-title":"Computer Law and Security Review"},{"issue":"4","key":"key2021081408083762400_ref005","doi-asserted-by":"crossref","first-page":"292","DOI":"10.2174\/157340012803520513","article-title":"Internet addiction: a brief summary of research and practice","volume":"8","year":"2012","journal-title":"Current Psychiatry Reviews"},{"issue":"1","key":"key2021081408083762400_ref006","first-page":"vii","article-title":"Commentary: issues and opinion on structural equation modeling","volume":"22","year":"1998","journal-title":"MIS Quarterly"},{"key":"key2021081408083762400_ref007","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.chb.2015.02.042","article-title":"Surfing on social network sites: a comprehensive instrument to evaluate online self-disclosure and related attitudes","volume":"49","year":"2015","journal-title":"Computers in Human Behaviour"},{"issue":"2","key":"key2021081408083762400_ref008","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0747-5632(00)00041-8","article-title":"A cognitive-behavioral model of pathological internet use","volume":"17","year":"2001","journal-title":"Computers in Human Behaviour"},{"issue":"4","key":"key2021081408083762400_ref009","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1089\/109493102760275581","article-title":"Validation of a new scale for measuring problematic internet use: implications for pre-employment screening","volume":"5","year":"2002","journal-title":"Cyberpsychology and Behaviour"},{"issue":"6","key":"key2021081408083762400_ref010","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/01449290410001715723","article-title":"Internet privacy concerns and their antecedents-measurement validity and a regression model","volume":"23","year":"2004","journal-title":"Behaviour and Information Technology"},{"issue":"1","key":"key2021081408083762400_ref011","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"3","key":"key2021081408083762400_ref012","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1177\/002224299906300302","article-title":"Social contracts and marketing ethics","volume":"63","year":"1999","journal-title":"Journal of Marketing"},{"issue":"2","key":"key2021081408083762400_ref013","doi-asserted-by":"crossref","first-page":"175","DOI":"10.3758\/BF03193146","article-title":"G* power 3: a flexible statistical power analysis program for the social, behavioral, and biomedical sciences","volume":"39","year":"2007","journal-title":"Behaviour Research Methods"},{"issue":"1","key":"key2021081408083762400_ref014","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"2","key":"key2021081408083762400_ref015","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s11469-007-9083-7","article-title":"Internet gambling: an online empirical study among student gamblers","volume":"6","year":"2008","journal-title":"International Journal of Mental Health and Addiction"},{"issue":"7","key":"key2021081408083762400_ref016","first-page":"2","article-title":"Human factors in cybersecurity; examining the link between internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours","volume":"3","year":"2017","journal-title":"Heliyon"},{"key":"key2021081408083762400_ref017","volume-title":"Multivariate Data Analysis","year":"1998"},{"key":"key2021081408083762400_ref018","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.chb.2016.11.033","article-title":"Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards","volume":"68","year":"2017","journal-title":"Computers in Human Behaviour"},{"issue":"4","key":"key2021081408083762400_ref019","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1037\/0022-006X.73.4.658","article-title":"Stress generation, avoidance coping, and depressive symptoms: a 10-year model","volume":"73","year":"2005","journal-title":"Journal of Consulting and Clinical Psychology"},{"issue":"3","key":"key2021081408083762400_ref020","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1287\/isre.1120.0441","article-title":"Research note \u2013 privacy concerns and privacy-protective behaviour in synchronous online social interactions","volume":"24","year":"2013","journal-title":"Information Systems Research"},{"issue":"2","key":"key2021081408083762400_ref021","doi-asserted-by":"crossref","first-page":"299","DOI":"10.2307\/3250940","article-title":"A cross-cultural study on escalation of commitment behaviour in software projects","volume":"24","year":"2000","journal-title":"MIS Quarterly"},{"key":"key2021081408083762400_ref022","doi-asserted-by":"crossref","unstructured":"Kininmonth, J., Thompson, N., McGill, T. and Bunn, A. (2018), \u201cPrivacy concerns and acceptance of government surveillance in Australia\u201d, Paper presented to Proceedings of the 29th Australasian Conference on Information Systems (ACIS 2018), 3-5 Dec, Sydney.","DOI":"10.5130\/acis2018.cn"},{"key":"key2021081408083762400_ref023","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","article-title":"Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon","volume":"64","year":"2017","journal-title":"Computers and Security"},{"key":"key2021081408083762400_ref024","first-page":"891","article-title":"Behind the curtains of privacy calculus on social networking sites: the study of Germany and the USA","volume-title":"Proceedings of the 10th International Conference on Wirtschaftsinformatik","year":"2011"},{"issue":"3","key":"key2021081408083762400_ref025","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue: a multidimensional developmental theory","volume":"33","year":"1977","journal-title":"Journal of Social Issues"},{"issue":"11","key":"key2021081408083762400_ref026","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1080\/0144929X.2017.1352028","article-title":"Old risks, new challenges: exploring differences in security between home computer and mobile device use","volume":"36","year":"2017","journal-title":"Behaviour and Information Technology"},{"issue":"3\/4","key":"key2021081408083762400_ref027","first-page":"297","article-title":"The impact of initial consumer trust on intentions to transact with a web site: a trust building model","volume":"11","year":"2002","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"key2021081408083762400_ref028","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"issue":"4","key":"key2021081408083762400_ref029","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","year":"1986","journal-title":"Journal of Management"},{"issue":"4","key":"key2021081408083762400_ref030","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1108\/ICS-06-2015-0024","article-title":"Why don\u2019t UK citizens protest against privacy-invading dragnet surveillance?","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"key":"key2021081408083762400_ref031","volume-title":"Secrets and Lies: digital Security in a Networked World","year":"2011"},{"issue":"2","key":"key2021081408083762400_ref032","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individual's concerns about organizational practices","volume":"20","year":"1996","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021081408083762400_ref033","first-page":"61","article-title":"The dark side of information technology","volume":"56","year":"2015","journal-title":"MIT Sloan Management Review"},{"issue":"4","key":"key2021081408083762400_ref034","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1108\/09685229810227649","article-title":"Information security awareness: educating your users effectively","volume":"6","year":"1998","journal-title":"Information Management and Computer Security"},{"issue":"9","key":"key2021081408083762400_ref035","article-title":"Cultural factors and the role of privacy concerns in acceptance of government surveillance","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"4","key":"key2021081408083762400_ref036","doi-asserted-by":"crossref","first-page":"695","DOI":"10.2307\/25148660","article-title":"User acceptance of hedonic information systems","volume":"28","year":"2004","journal-title":"MIS Quarterly"},{"key":"key2021081408083762400_ref037","first-page":"157","article-title":"Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology","year":"2012","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021081408083762400_ref038","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","article-title":"The right to privacy","volume":"4","year":"1890","journal-title":"Harvard Law Review"},{"key":"key2021081408083762400_ref039","volume-title":"Privacy and Freedom","year":"1967"},{"issue":"3","key":"key2021081408083762400_ref040","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1089\/cpb.1998.1.237","article-title":"Internet addiction: the emergence of a new clinical disorder","volume":"1","year":"1998","journal-title":"Cyberpsychology and Behaviour"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-11-2020-0190\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-11-2020-0190\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:21Z","timestamp":1753406601000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/3\/558-569\/225421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,4,5]]},"published-print":{"date-parts":[[2021,8,17]]}},"alternative-id":["10.1108\/ICS-11-2020-0190"],"URL":"https:\/\/doi.org\/10.1108\/ics-11-2020-0190","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4,5]]}}}