{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:35:59Z","timestamp":1758810959568,"version":"3.44.0"},"reference-count":69,"publisher":"Emerald","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,15]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>This study aims to empirically examine the impact of privacy-related factors, including privacy concerns, privacy experiences, privacy literacy and privacy fatigue, on social media users\u2019 privacy protection behavioral intention (PPBI).<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>Using the antecedents, privacy fatigue and outcome (APFO) as a framework, a research model incorporating privacy concerns, privacy experiences and privacy literacy as independent variables, privacy fatigue as a mediator and PPBI as the dependent variable was proposed and tested with data from 1,074 social media users in China.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>The results show that privacy experiences, privacy literacy and privacy fatigue are positively associated with PPBI. Furthermore, privacy concerns and privacy experiences exhibit a positive relationship with privacy fatigue, while privacy literacy is negatively related to privacy fatigue. Notably, privacy fatigue fully mediates the relationship between privacy concerns and PPBI, while partially mediating the effects of privacy experiences and privacy literacy on PPBI.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This study introduces the APFO framework, providing a comprehensive integration of antecedents and outcomes related to PPBI. These findings contribute to digital privacy by shedding light on the factors that shape user behavior in an increasingly complex online privacy environment.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/oir-08-2024-0530","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:53:48Z","timestamp":1743029628000},"page":"991-1006","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-related factors on social media users\u2019 privacy protection behaviors: an APFO model perspective"],"prefix":"10.1108","volume":"49","author":[{"given":"Xiaofeng","family":"Yu","sequence":"first","affiliation":[{"name":"School of Media and Communication, Shenzhen University , ,","place":["Shenzhen, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9222-9091","authenticated-orcid":true,"given":"Jiaqian","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Media and Communication, Shenzhen University , ,","place":["Shenzhen, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8098-2002","authenticated-orcid":true,"given":"Xiaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Journalism and Communication, Shanxi University , ,","place":["Taiyuan, China"]}]}],"member":"140","published-online":{"date-parts":[[2025,3,27]]},"reference":[{"issue":"1","key":"2025091120570074700_ref001","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1177\/13567667221118651","article-title":"Exploring tourism-generated social media communication, brand equity, satisfaction, and loyalty: a PLS-SEM-based multi-sequential approach","volume":"30","author":"Abbasi","year":"2024","journal-title":"Journal of Vacation Marketing"},{"issue":"4","key":"2025091120570074700_ref002","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1002\/jcpy.1191","article-title":"Secrets and likes: the drive for privacy and the difficulty of achieving it in the digital age","volume":"30","author":"Acquisti","year":"2020","journal-title":"Journal of Consumer Psychology"},{"issue":"1","key":"2025091120570074700_ref003","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1108\/jsm-10-2018-0287","article-title":"Triggers and motivators of privacy protection behavior on Facebook","volume":"33","author":"Alkire","year":"2019","journal-title":"Journal of Services Marketing"},{"issue":"8","key":"2025091120570074700_ref004","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1108\/ITP-03-2022-0207","article-title":"Antecedents and outcomes of social media fatigue","volume":"36","author":"Baj-Rogowska","year":"2023","journal-title":"Information Technology and People"},{"key":"2025091120570074700_ref005","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2019.03.003","article-title":"Putting the privacy paradox to the test: online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources","volume":"41","author":"Barth","year":"2019","journal-title":"Telematics and Informatics"},{"key":"2025091120570074700_ref006","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2015.11.022","article-title":"Control your Facebook: an analysis of online privacy literacy","volume":"56","author":"Bartsch","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"2025091120570074700_ref007","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218800915","article-title":"Exploring motivations for online privacy protection behavior: insights from panel data","volume":"48","author":"Boerman","year":"2018","journal-title":"Communication Research"},{"issue":"2","key":"2025091120570074700_ref008","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/15252019.2022.2051097","article-title":"Social media fatigue and privacy: an exploration of antecedents to consumers' concerns regarding the security of their personal information on social media platforms","volume":"22","author":"Bright","year":"2022","journal-title":"Journal of Interactive Advertising"},{"issue":"8","key":"2025091120570074700_ref009","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1080\/1369118x.2016.1229001","article-title":"Caring is not enough: the importance of Internet skills for online privacy protection","volume":"20","author":"B\u00fcchi","year":"2017","journal-title":"Information, Communication and Society"},{"issue":"1","key":"2025091120570074700_ref010","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1089\/cyber.2014.0456","article-title":"Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection","volume":"18","author":"Chen","year":"2015","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"2","key":"2025091120570074700_ref011","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1177\/1077699016640224","article-title":"Protecting oneself online","volume":"93","author":"Chen","year":"2016","journal-title":"Journalism and Mass Communication Quarterly"},{"issue":"2","key":"2025091120570074700_ref012","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1108\/oir-03-2024-0135","article-title":"Weighing user's privacy calculus on personal information disclosure: the moderating effect of social media identification","volume":"49","author":"Chen","year":"2024","journal-title":"Online Information Review"},{"issue":"1","key":"2025091120570074700_ref013","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1108\/intr-05-2020-0269","article-title":"Privacy helplessness on social media: its constituents, antecedents and consequences","volume":"32","author":"Cho","year":"2022","journal-title":"Internet Research"},{"issue":"6","key":"2025091120570074700_ref014","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3412367","article-title":"Privacy risks, emotions, and social media","volume":"27","author":"Cho","year":"2020","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"2025091120570074700_ref015","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","article-title":"The role of privacy fatigue in online privacy behavior","volume":"81","author":"Choi","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"2025091120570074700_ref016","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106382","article-title":"Knowledge as a strategy for privacy protection: how a privacy literacy training affects children's online disclosure behavior","volume":"110","author":"Desimpelaere","year":"2020","journal-title":"Computers in Human Behavior"},{"key":"2025091120570074700_ref017","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.ijinfomgt.2019.05.021","article-title":"Antecedents and consequences of social media fatigue","volume":"48","author":"Dhir","year":"2019","journal-title":"International Journal of Information Management"},{"issue":"6","key":"2025091120570074700_ref018","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1080\/01449290410001715723","article-title":"Internet privacy concerns and their antecedents - measurement validity and a regression model","volume":"23","author":"Dinev","year":"2004","journal-title":"Behaviour and Information Technology"},{"issue":"3","key":"2025091120570074700_ref019","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1108\/intr-03-2016-0070","article-title":"Anxiety about electronic data hacking","volume":"27","author":"Elhai","year":"2017","journal-title":"Internet Research"},{"issue":"2","key":"2025091120570074700_ref020","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120916853","article-title":"Markers of online privacy marginalization: empirical examination of socioeconomic disparities in social media privacy attitudes, literacy, and behavior","volume":"6","author":"Epstein","year":"2020","journal-title":"Social Media + Society"},{"issue":"3","key":"2025091120570074700_ref021","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1108\/itp-08-2019-0416","article-title":"Does role conflict influence discontinuous usage intentions? Privacy concerns, social media fatigue and self-esteem","volume":"34","author":"Fan","year":"2020","journal-title":"Information Technology and People"},{"issue":"3","key":"2025091120570074700_ref022","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.25300\/misq\/2021\/14349","article-title":"How trust leads to commitment on microsourcing platforms: unraveling the effects of governance and third-party mechanisms on triadic microsourcing relationships","volume":"45","author":"Guo","year":"2021","journal-title":"MIS Quarterly"},{"key":"2025091120570074700_ref023","volume-title":"A Primer on Partial Least Squares Structural Equation\u00a0Modeling (PLS - SEM)","author":"Hair","year":"2022","edition":"3rd ed."},{"key":"2025091120570074700_ref024","volume-title":"Advanced Issues in Partial Least Squares Structural Equation\u00a0Modeling","author":"Hair","year":"2024","edition":"2nd ed."},{"key":"2025091120570074700_ref025","first-page":"21","article-title":"What can I really do?\u2019: explaining online apathy and the privacy paradox","volume":"10","author":"Hargittai","year":"2016","journal-title":"International Journal of Communication"},{"key":"2025091120570074700_ref026","doi-asserted-by":"publisher","DOI":"10.1108\/oir-04-2024-0237","article-title":"Exploring the nexus between social media marketing and patients\u2019 participation in value co-creation: a pathway toward patient well-being","author":"Hasan","year":"2025","journal-title":"Online Information Review"},{"issue":"4","key":"2025091120570074700_ref027","doi-asserted-by":"publisher","DOI":"10.5817\/cp2016-4-7","article-title":"Privacy cynicism: a new approach to the privacy paradox","volume":"10","author":"Hoffmann","year":"2016","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"2025091120570074700_ref028","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.771278","article-title":"Privacy concerns and information sharing: the perspective of the u-shaped curve","volume":"13","author":"Hsu","year":"2022","journal-title":"Frontiers in Psychology"},{"key":"2025091120570074700_ref029","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10639-025-13353-7","article-title":"Factors influencing Chinese pre-service teachers\u2019 adoption of generative AI in teaching: an empirical study based on UTAUT2 and PLS-SEM","author":"Hu","year":"2025","journal-title":"Education and Information Technologies"},{"key":"2025091120570074700_ref030","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102122","article-title":"Privacy concerns and disclosure of biometric and behavioral data for travel","volume":"54","author":"Ioannou","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"4","key":"2025091120570074700_ref031","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1057\/ejis.2008.29","article-title":"Personality traits and concern for privacy: an empirical study in the context of location-based services","volume":"17","author":"Junglas","year":"2008","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"2025091120570074700_ref032","doi-asserted-by":"publisher","DOI":"10.5817\/cp2016-1-2","article-title":"Age differences in privacy attitudes, literacy and privacy management on Facebook","volume":"10","author":"Kezer","year":"2016","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"2025091120570074700_ref033","article-title":"The market effect of healthcare security: do patients care about data breaches?","author":"Kwon","year":"2015","journal-title":"Paper Presented at the Workshop on the Economics of Information Security (WEIS)"},{"issue":"5","key":"2025091120570074700_ref034","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/j.im.2014.03.010","article-title":"Determinants of users' continuance of social networking sites: a self-regulation perspective","volume":"51","author":"Lin","year":"2014","journal-title":"Information and Management"},{"issue":"7","key":"2025091120570074700_ref035","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1177\/1461444820912544","article-title":"Data capitalism and the user: an exploration of privacy cynicism in Germany","volume":"22","author":"Lutz","year":"2020","journal-title":"New Media and Society"},{"key":"2025091120570074700_ref036","doi-asserted-by":"publisher","DOI":"10.1145\/3543758.3547540","article-title":"Links between online privacy fatigue, technology attitudes and sociodemographic factors in a German population sample","author":"Luzsa","year":"2022"},{"issue":"10","key":"2025091120570074700_ref037","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0144929x.2023.2237603","article-title":"Understanding the privacy protection disengagement behaviour of contactless digital service users: the roles of privacy fatigue and privacy literacy","volume":"43","author":"Lyu","year":"2023","journal-title":"Behaviour and Information Technology"},{"issue":"4","key":"2025091120570074700_ref038","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Information Systems Research"},{"issue":"6","key":"2025091120570074700_ref039","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","article-title":"Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia","volume":"28","author":"Mohamed","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"2025091120570074700_ref040","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1016\/j.telpol.2011.06.003","article-title":"Provision of Internet privacy and market conditions: an empirical analysis","volume":"35","author":"Park","year":"2011","journal-title":"Telecommunications Policy"},{"issue":"2","key":"2025091120570074700_ref041","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1177\/0093650211418338","article-title":"Digital literacy and privacy behavior online","volume":"40","author":"Park","year":"2013","journal-title":"Communication Research"},{"issue":"4","key":"2025091120570074700_ref042","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/07421222.2015.1138374","article-title":"The impact of organizational commitment on insiders' motivation to protect organizational information assets","volume":"32","author":"Posey","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"8","key":"2025091120570074700_ref043","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/ITP-05-2023-0467","article-title":"Online privacy literacy and users' information privacy empowerment: the case of GDPR in Europe","volume":"37","author":"Prince","year":"2024","journal-title":"Information Technology and People"},{"issue":"1","key":"2025091120570074700_ref044","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4278\/0890-1171-12.1.38","article-title":"The transtheoretical model of health behavior change","volume":"12","author":"Prochaska","year":"1997","journal-title":"American Journal of Health Promotion"},{"issue":"11","key":"2025091120570074700_ref045","doi-asserted-by":"publisher","first-page":"2306","DOI":"10.1002\/asi.23122","article-title":"Antecedents and effects of social network fatigue","volume":"65","author":"Ravindran","year":"2014","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"5","key":"2025091120570074700_ref046","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/0020-7489(96)00004-1","article-title":"Fatigue: a concept analysis","volume":"33","author":"Ream","year":"1996","journal-title":"International Journal of Nursing Studies"},{"volume-title":"SmartPLS 4","year":"2024","author":"Ringle","key":"2025091120570074700_ref047"},{"issue":"1","key":"2025091120570074700_ref048","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"The Journal of Psychology"},{"issue":"6","key":"2025091120570074700_ref049","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/15213269.2019.1648218","article-title":"A tripartite model of trust in Facebook: acceptance of information personalization, privacy concern, and privacy literacy","volume":"23","author":"Rosenthal","year":"2019","journal-title":"Media Psychology"},{"issue":"3","key":"2025091120570074700_ref050","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1080\/02678379608256802","article-title":"Burnout and reciprocity: towards a dual-level social exchange model","volume":"10","author":"Schaufeli","year":"1996","journal-title":"Work and Stress"},{"issue":"11","key":"2025091120570074700_ref051","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1108\/ejm-02-2019-0189","article-title":"Predictive model assessment in PLS-SEM: guidelines for using PLSpredict","volume":"53","author":"Shmueli","year":"2019","journal-title":"European Journal of Marketing"},{"issue":"15","key":"2025091120570074700_ref052","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1080\/10447318.2021.1894799","article-title":"Online privacy literacy and online privacy behavior \u2013 the role of crystallized intelligence and personality","volume":"37","author":"Sindermann","year":"2021","journal-title":"International Journal of Human-Computer Interaction"},{"issue":"2","key":"2025091120570074700_ref053","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals' concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025091120570074700_ref054","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","author":"Smith","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025091120570074700_ref055","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1080\/09537325.2017.1297788","article-title":"How users' Internet experience affects the adoption of mobile payment: a mediation model","volume":"30","author":"Su","year":"2018","journal-title":"Technology Analysis and Strategic Management"},{"issue":"4","key":"2025091120570074700_ref056","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1108\/JEIM-03-2020-0088","article-title":"Why people need privacy? The role of privacy fatigue in app users' intention to disclose privacy: based on personality traits","volume":"34","author":"Tang","year":"2021","journal-title":"Journal of Enterprise Information Management"},{"issue":"19","key":"2025091120570074700_ref057","doi-asserted-by":"publisher","first-page":"9702","DOI":"10.3390\/app12199702","article-title":"The role of privacy fatigue in privacy paradox: a PSM and heterogeneity analysis","volume":"12","author":"Tian","year":"2022","journal-title":"Applied Sciences"},{"key":"2025091120570074700_ref058","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-94-017-9385-8_14","article-title":"Do people know about privacy and data protection strategies? Towards the \u2018online privacy literacy scale\u2019 (OPLIS)","volume":"20","author":"Trepte","year":"2015","journal-title":"Law, Governance and Technology Series"},{"issue":"1","key":"2025091120570074700_ref059","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin","year":"1968","journal-title":"Washington and Lee Law Review"},{"issue":"6","key":"2025091120570074700_ref060","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1108\/oir-09-2016-0264","article-title":"What drives internet users' willingness to provide personal information?","volume":"42","author":"Yeh","year":"2018","journal-title":"Online Information Review"},{"issue":"3","key":"2025091120570074700_ref061","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1111\/j.1745-6606.2009.01146.x","article-title":"Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents","volume":"43","author":"Youn","year":"2009","journal-title":"Journal of Consumer Affairs"},{"issue":"4","key":"2025091120570074700_ref062","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118x.2013.777757","article-title":"Privacy protection strategies on Facebook","volume":"16","author":"Young","year":"2013","journal-title":"Information, Communication and Society"},{"issue":"3","key":"2025091120570074700_ref063","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2023.102703","article-title":"Leaking my face via payment: unveiling the influence of technology anxiety, vulnerabilities, and privacy concerns on user resistance to facial recognition payment","volume":"48","author":"Zhang","year":"2024","journal-title":"Telecommunications Policy"},{"key":"2025091120570074700_ref064","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101696","article-title":"Drivers of social media fatigue: a systematic review","volume":"64","author":"Zheng","year":"2021","journal-title":"Telematics and Informatics"},{"issue":"2","key":"2025091120570074700_ref065","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1108\/ajim-12-2017-0270","article-title":"Why people use social networking sites passively","volume":"70","author":"Zhu","year":"2018","journal-title":"Aslib Journal of Information Management"},{"key":"2025091120570074700_ref066","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101601","article-title":"Privacy paradox in mHealth applications: an integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue","volume":"61","author":"Zhu","year":"2021","journal-title":"Telematics and Informatics"},{"issue":"4","key":"2025091120570074700_ref067","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1177\/1461444815614001","article-title":"Big data analytics and the limits of privacy self-management","volume":"19","author":"Baruh","year":"2015","journal-title":"New Media and Society"},{"issue":"1","key":"2025091120570074700_ref068","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260","article-title":"Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective","volume":"107","author":"Jozani","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025091120570074700_ref069","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","article-title":"Estimating the contextual risk of data breach: an empirical approach","volume":"32","author":"Sen","year":"2015","journal-title":"Journal of Management Information Systems"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-08-2024-0530\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/oir\/article-pdf\/49\/5\/991\/10280293\/oir-08-2024-0530en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/oir\/article-pdf\/49\/5\/991\/10280293\/oir-08-2024-0530en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:57:12Z","timestamp":1757638632000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/oir\/article\/49\/5\/991\/1255535\/Privacy-related-factors-on-social-media-users"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,27]]},"references-count":69,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,15]]}},"URL":"https:\/\/doi.org\/10.1108\/oir-08-2024-0530","relation":{},"ISSN":["1468-4527","1468-4535"],"issn-type":[{"type":"print","value":"1468-4527"},{"type":"electronic","value":"1468-4535"}],"subject":[],"published":{"date-parts":[[2025,3,27]]}}}