{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T23:16:40Z","timestamp":1778541400277,"version":"3.51.4"},"reference-count":104,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1109\/tem.2021.3092702","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T20:29:33Z","timestamp":1629145773000},"page":"3553-3570","source":"Crossref","is-referenced-by-count":49,"title":["Are We Living in Surveillance Societies and Is Privacy an Illusion? An Empirical Study on Privacy Literacy and Privacy Concerns"],"prefix":"10.1109","volume":"70","author":[{"given":"Christine","family":"Prince","sequence":"first","affiliation":[{"name":"Department of Entrepreneurship, Innovation and New Consumption Models, Institut Superieur de Gestion ISG International Business School, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4257-9500","authenticated-orcid":false,"given":"Nessrine","family":"Omrani","sequence":"additional","affiliation":[{"name":"Management and Strategy, Paris School of Business, Paris, France"}]},{"given":"Adnane","family":"Maalaoui","sequence":"additional","affiliation":[{"name":"IPAG Business School, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8374-9719","authenticated-orcid":false,"given":"Marina","family":"Dabic","sequence":"additional","affiliation":[{"name":"Faculty of Economics and Business, University of Zagreb, Zagreb, Croatia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4886-7482","authenticated-orcid":false,"given":"Sascha","family":"Kraus","sequence":"additional","affiliation":[{"name":"Faculty of Economics and Managment, Free University of Bozen-Bolzano, Bolzano, Italy"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.17"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1002\/sec.78"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1177\/0743915620909832"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415100201"},{"key":"ref52","author":"givens","year":"2015","journal-title":"Information Privacy Fundamentals for Librarians and Information Professionals"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.29302\/oeconomica.2012.14.2.36"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.15760\/comminfolit.2017.11.2.9"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.01.004"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i2.2855"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.041"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.022"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2014.06.042"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.922634"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2005.844927"},{"key":"ref49","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.09.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2020.e03298"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.07.064"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.01.014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101856"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101216"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.020"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.03.003"},{"key":"ref34","first-page":"256","article-title":"Entwicklung und validierung der online-privatheits-kompetenzskala, (OPLIS) [Development and validation of the online privacy literacy scale, (OPLIS)]","author":"masur","year":"2017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.29.1.138"},{"key":"ref36","article-title":"American&#x2019;s privacy strategies post-Snowden, pew research center's Internet and american life project","author":"shelton","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-1-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-9385-8_14"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.486"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-05-2016-0127"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.049"},{"key":"ref38","first-page":"97","article-title":"User's perspectives on privacy in web-based applications","volume":"48","author":"zviran","year":"2008","journal-title":"J Comput Inf Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2017.10.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211418338"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2017.03.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2018.1564553"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/2056305119897321"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2009.2017985"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/1094670511424924"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4000\/rei.9706"},{"key":"ref29","article-title":"Survey on privacy in media and information literacy with youth perspectives","author":"culver","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2019.1655210"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"ref15","article-title":"Our personal data are precious&#x2014;We must take back control","author":"gordon","year":"2017","journal-title":"Power and Big Tech"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/0743915620902143"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29877-1_136"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240406"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2018.1485084"},{"key":"ref99","first-page":"3737","article-title":"What can I really do? Explaining the privacy paradox with online apathy","volume":"10","author":"hargittai","year":"2016","journal-title":"Int J Commun"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2017.02.003"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00018.x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2018.1396110"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/joca.12313"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.2501\/JAR-43-3-322-329"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(200024)14:1<15::AID-DIR2>3.0.CO;2-C"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O"},{"key":"ref94","article-title":"Facebook says 14m accounts had personal data stolen in recent breach","author":"guardian","year":"2018"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(01)00273-9"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1177\/089443930101900103"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.025"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1461444808101618","article-title":"A multinational study on online privacy: Global concerns and local responses","volume":"11","author":"cho","year":"2009","journal-title":"New Media Soc"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2015.01.021"},{"key":"ref82","article-title":"The Culnan-Milne survey on consumers and online privacy notices: Summary of responses","author":"culnan","year":"2001","journal-title":"The Politics of Science"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218800915"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12052"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2479938"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1080\/15252019.2010.10722168","article-title":"Gender differences in privacy-related measures for young adult facebook users","volume":"10","author":"grubbs hoy","year":"2010","journal-title":"J Interactive Advertising"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1086\/504140"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807072219"},{"key":"ref104","article-title":"Anonymity, privacy, and security online, pew research center's Internet and american life project","author":"rainie","year":"2013"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.12.001"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1080\/10864415.2003.11044270","article-title":"The impact of customer trust and perception of security control on the acceptance of electronic commerce","volume":"7","author":"suh","year":"2003","journal-title":"Int J Electron Commerce"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2015.07.019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01148.x"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1108\/09564230710778128"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.04.015"},{"key":"ref67","first-page":"101","article-title":"Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model","volume":"7","author":"pavlou","year":"2013","journal-title":"Int J Electron Commerce"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6_1"},{"key":"ref64","year":"2021"},{"key":"ref63","article-title":"Les comptes de 9 millions de clients easyjet pirat&#x00E9;s","year":"2020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1080\/10641734.1994.10505012"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1177\/0743915620929999"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2011.06.002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.12.006"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2020.3026584"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/10189360\/09513653.pdf?arnumber=9513653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T17:59:10Z","timestamp":1691431150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9513653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":104,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tem.2021.3092702","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10]]}}}