{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:42:16Z","timestamp":1770540136503,"version":"3.49.0"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tem.2022.3204285","type":"journal-article","created":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T19:36:07Z","timestamp":1663184167000},"page":"2986-3000","source":"Crossref","is-referenced-by-count":19,"title":["Does COVID-19 Pandemic Motivate Privacy Self-Disclosure in Mobile Fintech Transactions? A Privacy-Calculus-Based Dual-Stage SEM-ANN Analysis"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6589-5568","authenticated-orcid":false,"given":"Yun-Peng","family":"Yuan","sequence":"first","affiliation":[{"name":"UCSI Graduate Business School, UCSI University, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2974-2270","authenticated-orcid":false,"given":"Garry Wei-Han","family":"Tan","sequence":"additional","affiliation":[{"name":"UCSI Graduate Business School, UCSI University, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3384-1207","authenticated-orcid":false,"given":"Keng-Boon","family":"Ooi","sequence":"additional","affiliation":[{"name":"UCSI Graduate Business School, UCSI University, Kuala Lumpur, Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2021.104361"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2989136"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/s0969-4765(21)00083-7"},{"key":"ref4","article-title":"\u75ab\u60c5\u4e4b\u4e0b, \u79fb\u52a8\u652f\u4ed8\u7684\u793e\u4f1a\u4ef7\u503c\u6b63\u5728\u51f8\u663e [Under the pandemic, the social value of the mobile payment is becoming more prominent]","author":"Fu","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2893541"},{"key":"ref6","article-title":"\u4fe1\u606f\u6536\u96c6\u5212\u7ea2\u7ebf \u4e92\u8054\u7f51\u5e73\u53f0\u751f\u5b58\u6cd5\u5219\u751f\u53d8 [A red line of data collection: the universal law of surviving on the internet has changed]","volume-title":"China Daily","author":"Cao","year":"2021"},{"key":"ref7","article-title":"\u652f\u4ed8\u5b9d\u5e74\u5ea6\u8d26\u5355\u6cc4\u9732\u7528\u6237\u9690\u79c1 \u829d\u9ebb\u4fe1\u7528\u56de\u5e94\u79f0\u9519\u4e86 Alipays annual bill leaks user privacy? Sesame Credit responds by saying sorry","volume-title":"Sohu","author":"Cui","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.08.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2016.2638847"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102065"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/itp-03-2018-0132"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/k-12-2016-0354"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.11.056"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.05.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23500"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106928"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23376"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.10.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12264"},{"key":"ref23","volume-title":"Social Penetration: The Development of Interpersonal Relationships","author":"Altman","year":"1973"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.116.3.457"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.08.006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1858731"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1108\/imds-08-2014-0231"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/ijmc.2015.070961"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0441"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0680"},{"key":"ref34","first-page":"23","article-title":"Consumer behavior as risk taking","volume-title":"Risk Taking and Information Handling in Consumer Behavior","author":"Bauer","year":"1967"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2017.10.015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2015.02.016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2015.1062471"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9566.ep11347150"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2007.04.022"},{"key":"ref40","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation","volume-title":"Social Psychophysiology: A Sourcebook","author":"Rogers","year":"1983"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1108\/ijbm-10-2018-0272"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2020.104261"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1108\/imds-03-2015-0087"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1086\/504141"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1177\/0092070398261002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/10410230903473540"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.02.005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1108\/intr-02-2018-0066"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.02.044"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3201\/eid1002.030750"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.2307\/25148854"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2307\/259290"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2018.100823"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1108\/imds-01-2019-0011"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2017.2703121"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhtm.2022.03.009"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2020.102300"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1108\/intr-04-2020-0175"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.101413"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1111\/j.1537-2995.2010.02887.x"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1976.tb00503.x"},{"key":"ref72","article-title":"The 47th statistical report on Chinas internet development","year":"2021"},{"key":"ref73","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair","year":"2017"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1108\/S1474-7979(2009)0000020014"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.04.018"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.067"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.015"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1164497"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113477"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1108\/imds-04-2020-0239"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1108\/oir-05-2015-0152"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1688733"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1108\/ejm-02-2019-0189"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102047"},{"key":"ref87","volume-title":"Neural Network: A Comprehensive Foundation","author":"Haykin","year":"1994"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1108\/jbim-01-2019-0060"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.013"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2005.11.002"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2016.1266573"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1108\/ijbm-07-2021-0291"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2017.2711042"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.012"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICFIR.2019.8894794"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/10339242\/09889782.pdf?arnumber=9889782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:12:12Z","timestamp":1705021932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9889782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":96,"URL":"https:\/\/doi.org\/10.1109\/tem.2022.3204285","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}