{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:57:27Z","timestamp":1774353447756,"version":"3.50.1"},"reference-count":53,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T00:00:00Z","timestamp":1496620800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Internet Research"],"published-print":{"date-parts":[[2017,6,5]]},"DOI":"10.1108\/intr-04-2016-0088","type":"journal-article","created":{"date-parts":[[2017,4,19]],"date-time":"2017-04-19T19:13:02Z","timestamp":1492629182000},"page":"506-519","source":"Crossref","is-referenced-by-count":50,"title":["Understanding location-based services users\u2019 privacy concern"],"prefix":"10.1108","volume":"27","author":[{"given":"Tao","family":"Zhou","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"issue":"2","key":"ref002","doi-asserted-by":"crossref","first-page":"339","DOI":"10.2307\/20650295","volume":"33","author":"Angst C.M.","year":"2009","journal-title":"MIS Quarterly"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"issue":"4","key":"ref004","doi-asserted-by":"crossref","first-page":"805","DOI":"10.2307\/25148755","volume":"30","author":"Bhattacherjee A.","year":"2006","journal-title":"MIS Quarterly"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2014-0006"},{"key":"ref006","unstructured":"CNNIC (2016), \u201c38th statistical survey report on the internet development in China\u201d, China Internet Network Information Center, Beijing."},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.3.425"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941515"},{"key":"ref009","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.1"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-10-2014-0244"},{"issue":"7","key":"ref013","first-page":"1","volume":"4","author":"Gefen D.","year":"2000","journal-title":"Communications of the Association for Information Systems"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415150204"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-08-2014-0201"},{"issue":"2","key":"ref016","doi-asserted-by":"crossref","first-page":"497","DOI":"10.25300\/MISQ\/2014\/38.2.08","volume":"38","author":"Ho S.Y.","year":"2014","journal-title":"MIS Quarterly"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415170402"},{"issue":"1","key":"ref018","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","volume":"37","author":"Hong W.","year":"2013","journal-title":"MIS Quarterly"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0441"},{"key":"ref020","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325568"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.29"},{"issue":"10","key":"ref022","doi-asserted-by":"crossref","first-page":"392","DOI":"10.17705\/1jais.00056","volume":"5","author":"Kim H.W.","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.07.011"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.09.003"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.09.018"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.08.002"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-02-2014-0053"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21705"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2014-0134"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"ref032","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0597"},{"key":"ref033","volume-title":"Psychometric Theory","author":"Nunnally J.C.","year":"1978"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-06-2014-0166"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1145\/2488968.2488971"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.11.002"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"issue":"1","key":"ref042","first-page":"380","volume":"13","author":"Straub D.","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240405"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9111-6"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-009-0012-4"},{"issue":"12","key":"ref047","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","volume":"12","author":"Xu H.","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"},{"key":"ref049","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20120"},{"key":"ref050","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-01-2015-0010"},{"issue":"3","key":"ref051","first-page":"215","volume":"14","author":"Yun H.","year":"2013","journal-title":"Journal of Electronic Commerce Research"},{"key":"ref052","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.05.003"},{"key":"ref053","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415160403"},{"key":"ref054","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9106-3"},{"key":"ref055","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.04.010"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-04-2016-0088","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/IntR-04-2016-0088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:35:40Z","timestamp":1753392940000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/27\/3\/506-519\/185684"}},"subtitle":["An elaboration likelihood model perspective"],"short-title":[],"issued":{"date-parts":[[2017,6,5]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6,5]]}},"alternative-id":["10.1108\/IntR-04-2016-0088"],"URL":"https:\/\/doi.org\/10.1108\/intr-04-2016-0088","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2017,6,5]]}}}