{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T22:16:34Z","timestamp":1771884994741,"version":"3.50.1"},"reference-count":84,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2024,4,8]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Based on the cognition\u2013affect\u2013conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-10-2021-0817","type":"journal-article","created":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T06:57:17Z","timestamp":1678949837000},"page":"1025-1051","source":"Crossref","is-referenced-by-count":41,"title":["Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism"],"prefix":"10.1108","volume":"37","author":[{"given":"Tu","family":"Lyu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7921-3831","authenticated-orcid":false,"given":"Yulin","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0615-9261","authenticated-orcid":false,"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,3,17]]},"reference":[{"issue":"12","key":"key2024040602164830000_ref001","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.1080\/10447318.2021.1987677","article-title":"The role of privacy cynicism in consumer habits with voice assistants: a technology acceptance model perspective","volume":"38","year":"2022","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"key2024040602164830000_ref002","volume-title":"Multiple Regression: Testing and Interpreting Interactions","year":"1991"},{"key":"key2024040602164830000_ref003","unstructured":"Beijing News (2019), \u201cMinistry of Industry and Information Technology interviewed face changing the application of ZAO, and ZAO modified user agreement\u201d, available at: https:\/\/baijiahao.baidu.com\/s?id=1643749471060570619&wfr=spider&for=pc"},{"issue":"6","key":"key2024040602164830000_ref004","first-page":"725","article-title":"Physicians' resistance toward healthcare information technology: a theoretical model and empirical test","volume":"16","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"11","key":"key2024040602164830000_ref005","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1108\/IJCHM-12-2021-1471","article-title":"An integrative model of facial recognition check-in technology adoption intention: the perspective of hotel guests in Singapore","volume":"34","year":"2022","journal-title":"International Journal of Contemporary Hospitality Management"},{"key":"key2024040602164830000_ref006","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102358","article-title":"Motivating information system engineers' acceptance of Privacy by Design in China: an extended UTAUT model","volume":"60","year":"2021","journal-title":"International Journal of Information Management"},{"key":"key2024040602164830000_ref007","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.chb.2016.12.013","article-title":"User trust in social networking services: a comparison of Facebook and LinkedIn","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2024040602164830000_ref008","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1108\/INTR-07-2019-0304","article-title":"A decision paradox: benefit vs risk and trust vs distrust for online dating adoption vs non-adoption","volume":"31","year":"2020","journal-title":"Internet Research"},{"issue":"3","key":"key2024040602164830000_ref009","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1108\/JEIM-10-2019-0318","article-title":"Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue","volume":"34","year":"2021","journal-title":"Journal of Enterprise Information Management"},{"key":"key2024040602164830000_ref010","article-title":"Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model","year":"2021","journal-title":"Information Systems Research"},{"issue":"2","key":"key2024040602164830000_ref011","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study","volume":"14","year":"2003","journal-title":"Information Systems Research"},{"issue":"3","key":"key2024040602164830000_ref012","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.ijinfomgt.2013.01.007","article-title":"Exploring individuals' subjective well-being and loyalty towards social network sites from the perspective of network externalities: the Facebook case","volume":"33","year":"2013","journal-title":"International Journal of Information Management"},{"key":"key2024040602164830000_ref013","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","article-title":"The role of privacy fatigue in online privacy behavior","volume":"81","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2024040602164830000_ref014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2021.102941","article-title":"Let's face it: are customers ready for facial recognition technology at quick-service restaurants?","volume":"95","year":"2021","journal-title":"International Journal of Hospitality Management"},{"issue":"5","key":"key2024040602164830000_ref015","doi-asserted-by":"crossref","first-page":"1455","DOI":"10.1108\/INTR-06-2019-0225","article-title":"Exploring information avoidance intention of social media users: a cognition\u2013affect\u2013conation perspective","volume":"30","year":"2020","journal-title":"Internet Research"},{"issue":"8","key":"key2024040602164830000_ref016","doi-asserted-by":"crossref","first-page":"1824","DOI":"10.1177\/1461444819833331","article-title":"The corporate cultivation of digital resignation","volume":"21","year":"2019","journal-title":"New Media and Society"},{"issue":"1","key":"key2024040602164830000_ref017","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1177\/002224299205600103","article-title":"A national customer satisfaction barometer: the Swedish experience","volume":"56","year":"1992","journal-title":"Journal of Marketing"},{"issue":"1","key":"key2024040602164830000_ref018","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2024040602164830000_ref019","unstructured":"Gen Market Insights (2018), \u201cGlobal face recognition device market research report 2018\u201d, available at: http:\/\/genmarketinsights.com\/report\/global-face-recognition-device-market-research-report-2018\/41637\/"},{"issue":"4","key":"key2024040602164830000_ref020","first-page":"1174","article-title":"What drives self-disclosure in mobile payment applications? The effect of privacy assurance approaches, network externality, and technology complementarity","volume":"33","year":"2020","journal-title":"Information Technology and People"},{"issue":"1","key":"key2024040602164830000_ref021","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1111\/j.1540-5915.1998.tb01346.x","article-title":"Development and measurement validity of a task-technology fit instrument for user evaluations of information systems","volume":"29","year":"1998","journal-title":"Decision Sciences"},{"issue":"6","key":"key2024040602164830000_ref022","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1016\/j.im.2016.02.009","article-title":"Multi-homing on SNSs: the role of optimum stimulation level and perceived complementarity in need gratification","volume":"53","year":"2016","journal-title":"Information and Management"},{"key":"key2024040602164830000_ref023","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10271-8","article-title":"The future is yesterday: use of AI-driven facial recognition to enhance value in the travel and tourism industry","year":"2022","journal-title":"Information Systems Frontiers"},{"key":"key2024040602164830000_ref024","volume-title":"A Primer on Partial Least Squares Structural Equation\u00a0Modeling (PLS-SEM)","year":"2016","edition":"2nd ed."},{"issue":"1","key":"key2024040602164830000_ref025","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","article-title":"When to use and how to report the results of PLS-SEM","volume":"31","year":"2019","journal-title":"European Business Review"},{"issue":"4","key":"key2024040602164830000_ref026","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-4-7","article-title":"Privacy cynicism: a new approach to the privacy paradox","volume":"10","year":"2016","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"key2024040602164830000_ref027","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.dss.2013.11.003","article-title":"Understanding the role of satisfaction in the formation of perceived switching value","volume":"59","year":"2014","journal-title":"Decision Support Systems"},{"key":"key2024040602164830000_ref028","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.chb.2016.04.023","article-title":"An empirical examination of consumer adoption of Internet of Things services: network externalities and concern for information privacy perspectives","volume":"62","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"key2024040602164830000_ref029","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1037\/h0020278","article-title":"Triadic consistency: a statement of affective-cognitive-conative consistency","volume":"74","year":"1967","journal-title":"Psychological Review"},{"issue":"4","key":"key2024040602164830000_ref030","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.ijinfomgt.2016.04.011","article-title":"Effects of user experience on user resistance to change to the voice user interface of an in-vehicle infotainment system: implications for platform and standards competition","volume":"36","year":"2016","journal-title":"International Journal of Information Management"},{"key":"key2024040602164830000_ref031","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.chb.2018.11.022","article-title":"Willingness to provide personal information: perspective of privacy calculus in IoT services","volume":"92","year":"2019","journal-title":"Computers in Human Behavior"},{"key":"key2024040602164830000_ref032","volume-title":"Principles and Practice of Structural Equation\u00a0Modeling","year":"2011","edition":"3rd ed."},{"issue":"4","key":"key2024040602164830000_ref033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijec.2015100101","article-title":"Common Method Bias in PLS-SEM: a full collinearity assessment approach","volume":"11","year":"2015","journal-title":"International Journal of e-Collaboration"},{"issue":"7","key":"key2024040602164830000_ref034","doi-asserted-by":"crossref","first-page":"546","DOI":"10.17705\/1jais.00302","article-title":"Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations","volume":"13","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"key":"key2024040602164830000_ref035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jaging.2018.08.001","article-title":"Smart eldercare in Singapore: negotiating agency and apathy at the margins","volume":"47","year":"2018","journal-title":"Journal of Aging Studies"},{"key":"key2024040602164830000_ref036","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.tranpol.2018.11.013","article-title":"Resistance to change: car use and routines","volume":"74","year":"2019","journal-title":"Transport Policy"},{"issue":"1","key":"key2024040602164830000_ref037","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1057\/jit.2015.17","article-title":"User personality and resistance to mandatory information systems in organizations: a theoretical model and empirical test of dispositional resistance to change","volume":"31","year":"2016","journal-title":"Journal of Information Technology"},{"issue":"3","key":"key2024040602164830000_ref038","first-page":"392","article-title":"Resistance of facial recognition payment service: a mixed method approach","volume":"37","year":"2022","journal-title":"Journal of Services Marketing"},{"key":"key2024040602164830000_ref039","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.jretconser.2019.01.007","article-title":"A study on the reciprocal relationship between user perception and retailer perception on platform-based mobile payment service","volume":"48","year":"2019","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"3","key":"key2024040602164830000_ref040","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1080\/00963402.2019.1604886","article-title":"Facial recognition and the future of privacy: I always feel like \u2026 somebody's watching me","volume":"75","year":"2019","journal-title":"Bulletin of the Atomic Scientists"},{"key":"key2024040602164830000_ref041","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102434","article-title":"The more we get together, the more we can save? A transaction cost perspective","volume":"62","year":"2022","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2024040602164830000_ref042","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: a theoretical perspective","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2024040602164830000_ref043","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2024040602164830000_ref044","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.im.2016.12.005","article-title":"Factors influencing online shoppers' repurchase intentions: the roles of satisfaction and regret","volume":"54","year":"2017","journal-title":"Information and Management"},{"issue":"3","key":"key2024040602164830000_ref045","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1016\/j.chb.2010.12.009","article-title":"Why people use social networking sites: an empirical study integrating network externalities and motivation theory","volume":"27","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"key2024040602164830000_ref046","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2021.102155","article-title":"Resistance to facial recognition payment in China: the influence of privacy-related factors","volume":"45","year":"2021","journal-title":"Telecommunications Policy"},{"key":"key2024040602164830000_ref047","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.102041","article-title":"How technology paradoxes and self-efficacy affect the resistance of facial recognition technology in online microfinance platforms: evidence from China","volume":"70","year":"2022","journal-title":"Technology in Society"},{"key":"key2024040602164830000_ref048","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2022.103024","article-title":"Perceived values, platform attachment and repurchase intention in on-demand service platforms: a cognition-affection-conation perspective","volume":"67","year":"2022","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"7","key":"key2024040602164830000_ref049","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1177\/1461444820912544","article-title":"Data capitalism and the user: an exploration of privacy cynicism in Germany","volume":"22","year":"2020","journal-title":"New Media and Society"},{"issue":"1","key":"key2024040602164830000_ref083","doi-asserted-by":"publisher","DOI":"10.3390\/systems11010010","article-title":"Research on the relationship between network insight, supply chain integration and enterprise performance","volume":"11","year":"2023","journal-title":"Systems"},{"key":"key2024040602164830000_ref084","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.1101543","article-title":"Research on paths of opportunistic behavior avoidance and performance improvement in food supply chain from the perspective of social control","volume":"13","year":"2023","journal-title":"Frontiers in Psychology"},{"issue":"10-11","key":"key2024040602164830000_ref050","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/S0308-5961(99)00052-X","article-title":"The diffusion of interactive communication innovations and the critical mass: the adoption of telecommunications services by German banks","volume":"23","year":"1999","journal-title":"Telecommunications Policy"},{"key":"key2024040602164830000_ref051","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.chb.2019.05.009","article-title":"Hey Alexa \u2026 examine the variables influencing the use of artificial intelligent in-home voice assistants","volume":"99","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"key2024040602164830000_ref052","first-page":"3149","article-title":"Disclosing facial images to create a consumer's profile","volume":"31","year":"2019","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"4","key":"key2024040602164830000_ref053","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1108\/IMDS-02-2018-0060","article-title":"Examining factors that influence information disclosure on social network sites from the perspective of network externalities","volume":"119","year":"2019","journal-title":"Industrial Management and Data Systems"},{"key":"key2024040602164830000_ref054","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.chb.2016.03.030","article-title":"Mobile payment: understanding the determinants of customer adoption and intention to recommend the technology","volume":"61","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2024040602164830000_ref055","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2307\/258610","article-title":"Strategic responses to institutional processes","volume":"16","year":"1991","journal-title":"Academy of Management Review"},{"issue":"4","key":"key2024040602164830000_ref056","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1037\/0021-9010.88.4.680","article-title":"Resistance to change: developing an individual differences measure","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"key2024040602164830000_ref057","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.techsoc.2018.03.006","article-title":"Examining the effects of technology anxiety and resistance to change on the acceptance of breast tumor registry system: evidence from Turkey","volume":"54","year":"2018","journal-title":"Technology in Society"},{"issue":"4","key":"key2024040602164830000_ref058","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1108\/IMDS-04-2021-0230","article-title":"Positive and negative valences, personal innovativeness and intention to use facial recognition for payments","volume":"122","year":"2022","journal-title":"Industrial Management and Data Systems"},{"issue":"8","key":"key2024040602164830000_ref059","doi-asserted-by":"crossref","first-page":"2118","DOI":"10.1016\/j.tele.2018.07.013","article-title":"The effect of platform characteristics on the adoption of smart speakers: empirical evidence in South Korea","volume":"35","year":"2018","journal-title":"Telematics and Informatics"},{"issue":"1","key":"key2024040602164830000_ref060","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"key":"key2024040602164830000_ref061","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1146\/annurev-psych-120710-100452","article-title":"Sources of method bias in social science research and recommendations on how to control it","volume":"63","year":"2012","journal-title":"Annual Review of Psychology"},{"issue":"4","key":"key2024040602164830000_ref062","doi-asserted-by":"crossref","first-page":"717","DOI":"10.3758\/BF03206553","article-title":"SPSS and SAS procedures for estimating indirect effects in simple mediation models","volume":"36","year":"2004","journal-title":"Behavior Research Methods, Instruments, and Computers"},{"issue":"3","key":"key2024040602164830000_ref063","doi-asserted-by":"crossref","first-page":"879","DOI":"10.3758\/BRM.40.3.879","article-title":"Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models","volume":"40","year":"2008","journal-title":"Behavior Research Methods"},{"issue":"5","key":"key2024040602164830000_ref064","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1007\/s10796-015-9598-6","article-title":"Drivers of mobile payment acceptance: the impact of network externalities","volume":"18","year":"2016","journal-title":"Information Systems Frontiers"},{"issue":"10","key":"key2024040602164830000_ref065","doi-asserted-by":"crossref","first-page":"3998","DOI":"10.1016\/j.jbusres.2016.06.007","article-title":"Estimation issues with PLS and CBSEM: where the bias lies","volume":"69","year":"2016","journal-title":"Journal of Business Research"},{"key":"key2024040602164830000_ref066","doi-asserted-by":"crossref","unstructured":"Scherer, K.R. (1999), \u201cAppraisal theory\u201d, in Dalgleish, T. and Power, M.J. (Eds), Handbook of Cognition and Emotion, John Wiley & Sons, pp.\u00a0637-663, doi: 10.1002\/0470013494.ch30.","DOI":"10.1002\/0470013494.ch30"},{"issue":"4","key":"key2024040602164830000_ref067","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1080\/14680777.2020.1750790","article-title":"Normalizing resistance: saying no to facial recognition technology","volume":"20","year":"2020","journal-title":"Feminist Media Studies"},{"issue":"6","key":"key2024040602164830000_ref068","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1016\/j.im.2017.04.003","article-title":"Likes\u2014the key to my happiness: the moderating effect of social influence on travel experience","volume":"54","year":"2017","journal-title":"Information and Management"},{"key":"key2024040602164830000_ref069","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2022.101815","article-title":"Talking about facial recognition technology: how framing and context influence privacy concerns and support for prohibitive policy","volume":"70","year":"2022","journal-title":"Telematics and Informatics"},{"key":"key2024040602164830000_ref070","article-title":"Artificial intelligence and the privacy paradox of opportunity, big data and the digital universe","year":"2019"},{"issue":"4","key":"key2024040602164830000_ref071","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1016\/j.jesp.2009.03.007","article-title":"Alone and without purpose: life loses meaning following social exclusion","volume":"45","year":"2009","journal-title":"Journal of Experimental Social Psychology"},{"issue":"8","key":"key2024040602164830000_ref072","article-title":"Calculus interdependency, personality contingency, and causal asymmetry: toward a configurational privacy calculus model of information disclosure","volume":"58","year":"2021","journal-title":"Information and Management"},{"issue":"4","key":"key2024040602164830000_ref073","first-page":"458","article-title":"Digital technology and COVID-19","volume":"26","year":"2020","journal-title":"Nature Medicine"},{"issue":"6","key":"key2024040602164830000_ref074","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1111\/isj.12304","article-title":"An intertwined perspective on technology and digitised individuals: linkages, needs and outcomes","volume":"30","year":"2020","journal-title":"Information Systems Journal"},{"issue":"3","key":"key2024040602164830000_ref075","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1016\/j.dss.2012.12.015","article-title":"Transition of electronic word-of-mouth services from web to mobile context: a trust transfer perspective","volume":"54","year":"2013","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2024040602164830000_ref076","first-page":"69","article-title":"Analysing complaint intentions in online shopping: the antecedents of justice and technology use and the mediator of customer satisfaction","volume":"34","year":"2014","journal-title":"Behaviour and Information Technology"},{"issue":"9","key":"key2024040602164830000_ref077","doi-asserted-by":"crossref","first-page":"3735","DOI":"10.1007\/s00500-015-1759-5","article-title":"Privacy-preserving face recognition with outsourced computation","volume":"20","year":"2016","journal-title":"Soft Computing"},{"key":"key2024040602164830000_ref078","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.dss.2015.08.008","article-title":"A customer value, satisfaction, and loyalty perspective of mobile application recommendations","volume":"79","year":"2015","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2024040602164830000_ref079","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1080\/19368623.2020.1813670","article-title":"Facial recognition check-in services at hotels","volume":"30","year":"2021","journal-title":"Journal of Hospitality Marketing and Management"},{"issue":"4","key":"key2024040602164830000_ref080","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1016\/j.dss.2012.05.019","article-title":"Enhancing perceived interactivity through network externalities: an empirical study on micro-blogging service satisfaction and continuance intention","volume":"53","year":"2012","journal-title":"Decision Support Systems"},{"key":"key2024040602164830000_ref081","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101515","article-title":"Service transformation under Industry 4.0: investigating acceptance of facial recognition payment through an extended technology acceptance model","volume":"64","year":"2021","journal-title":"Technology in Society"},{"issue":"2","key":"key2024040602164830000_ref082","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1016\/j.chb.2010.11.013","article-title":"Examining mobile instant messaging user loyalty from the perspectives of network externalities and flow experience","volume":"27","year":"2011","journal-title":"Computers in Human Behavior"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-10-2021-0817\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-10-2021-0817\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:55:51Z","timestamp":1753394151000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/37\/3\/1025-1051\/1236870"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,17]]},"references-count":84,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3,17]]},"published-print":{"date-parts":[[2024,4,8]]}},"alternative-id":["10.1108\/ITP-10-2021-0817"],"URL":"https:\/\/doi.org\/10.1108\/itp-10-2021-0817","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2023,3,17]]}}}