{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:12Z","timestamp":1750220772144,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,19]]},"DOI":"10.1145\/3378539.3393854","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T00:52:21Z","timestamp":1591491141000},"page":"135-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Benefits in Privacy Research"],"prefix":"10.1145","author":[{"given":"Jakob","family":"Wirth","sequence":"first","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Christian","family":"Maier","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Sven","family":"Laumer","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Nuremberg, Germany"}]},{"given":"Caroline E.","family":"Oehlhorn","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Tim","family":"Weitzel","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"WEIS","author":"Acquisti A.","year":"2009","unstructured":"Acquisti, A., John, L., Loewenstein, G., What is privacy worth. WEIS, 2009."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 30th International Conference on Information Systems: Phoenix, USA","author":"Anderson C.L.","year":"2009","unstructured":"Anderson, C.L., Agarwal, R., Genetic Information Altruists: How Far and To Whom Does Their Generosity Extend?, In, Nunamaker, J., Currie, W.L. (eds.), Proceedings of the 30th International Conference on Information Systems: Phoenix, USA, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208951"},{"key":"e_1_3_2_1_4_1","volume-title":"11th International Conference on Wirtschaftsinformatik: Leipzig","author":"Buckel T.","year":"2013","unstructured":"Buckel, T., Thiesse, F., Predicting The Disclosure of Personal Information on Social Networks: An Empirical Investigation, In, Alt, R., Franczyk, B. (eds.), 11th International Conference on Wirtschaftsinformatik: Leipzig, Germany, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_3_2_1_6_1","first-page":"304","volume-title":"48th Hawaii International Conference on System Sciences (HICSS): HI, USA","author":"Choi B.C.F.","year":"2015","unstructured":"Choi, B.C.F., Jiang, Z., Ramesh, B., Dong, Y., Privacy Tradeoff and Social Application Usage, In,, 48th Hawaii International Conference on System Sciences (HICSS): HI, USA, pp. 304--313, 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"In","author":"Consumption","year":"1991","unstructured":"Consumption values and market choices, In,, 1991."},{"key":"e_1_3_2_1_8_1","volume-title":"Some limitations of \"Risk = Threat x Vulnerability x Consequence\" for risk analysis of terrorist attacks. Risk analysis : an official publication of the Society for Risk Analysis, 28, 6","author":"Cox L.A.T.","year":"2008","unstructured":"Cox, L.A.T., Some limitations of \"Risk = Threat x Vulnerability x Consequence\" for risk analysis of terrorist attacks. Risk analysis : an official publication of the Society for Risk Analysis, 28, 6, 2008, 1749--1761."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12163"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00020.x"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12082"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.009"},{"key":"e_1_3_2_1_16_1","volume-title":"Communicating Personal Health Information in Virtual Health Communities. An Integration of Privacy Calculus Model and Affective CommitmentJournal of the Association for Information Systems, 18, 1","author":"Kordzadeh N.","year":"2017","unstructured":"Kordzadeh, N., Warren, J., Communicating Personal Health Information in Virtual Health Communities. An Integration of Privacy Calculus Model and Affective CommitmentJournal of the Association for Information Systems, 18, 1, 2017, 45--81."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.307"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Disclosure as a Privacy Calculus","volume":"51","author":"Li H.","year":"2010","unstructured":"Li, H., Sarathy, R., Xu, H., Understanding Situational Online Information Disclosure as a Privacy Calculus. Journal of Computer Information Systems, 51, 1, 2010, 62--71.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2005.08.001"},{"key":"e_1_3_2_1_20_1","volume-title":"Willing to pay for quality personalization? Trade-off between quality and privacy European Journal of Information Systems, 21, 6","author":"Li T.","year":"2012","unstructured":"Li, T., Unger, T., Willing to pay for quality personalization? Trade-off between quality and privacy European Journal of Information Systems, 21, 6, 2012, 621--642."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02828"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.01"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2019.1614739"},{"key":"e_1_3_2_1_24_1","volume-title":"Making profitable decisions","author":"Monroe K.B.","year":"1990","unstructured":"Monroe, K.B., Pricing. Making profitable decisions. New York: McGraw-Hill Pub. Co, 1990."},{"key":"e_1_3_2_1_25_1","volume-title":"Privacy in context. Technology, policy, and the integrity of social life","author":"Nissenbaum H.F.","year":"2010","unstructured":"Nissenbaum, H.F., Privacy in context. Technology, policy, and the integrity of social life. Stanford, California: Stanford Law Books an imprit of Standford University Press, 2010."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.08.008"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-30048-6","volume-title":"Scientific research in information systems. A beginner's guide","author":"Recker J.","year":"2013","unstructured":"Recker, J., Scientific research in information systems. A beginner's guide. Berlin, Heidelberg: Springer, 2013."},{"key":"e_1_3_2_1_28_1","volume-title":"Twenty-Second Pacific Asia Conference on Information Systems: Japan","author":"Rockmann R.","year":"2018","unstructured":"Rockmann, R., Gewald, H., Activity Tracking Affordances: Identification and Instrument Development, In,, Twenty-Second Pacific Asia Conference on Information Systems: Japan, 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2004.11.007"},{"key":"e_1_3_2_1_30_1","volume-title":"On The Willingness To Pay For Privacy As A Freemium Model: First Empirical Evidence. ECIS 2013 Proceedings","author":"Schreiner M.","year":"2013","unstructured":"Schreiner, M., Hess, T., On The Willingness To Pay For Privacy As A Freemium Model: First Empirical Evidence. ECIS 2013 Proceedings, 2013."},{"key":"e_1_3_2_1_31_1","volume-title":"Twenty-Third European Conference on Information Systems (ECIS): M\u00fcnster","author":"Schreiner M.","year":"2015","unstructured":"Schreiner, M., Hess, T., Why Are Consumers Willing to Pay for Privacy? An Application of the Privacy-freemium Model to Media Companies, In, Becker, J., vom Brocke, J., de Marco, M. (eds.), Twenty-Third European Conference on Information Systems (ECIS): M\u00fcnster, Germany, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208950"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4359(01)00041-0"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 23rd International Conference on Information Systems: Barcelona","author":"Tam E.-C.","year":"2002","unstructured":"Tam, E.-C., Hui, K.-L., Tan, B., What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses, In,, Proceedings of the 23rd International Conference on Information Systems: Barcelona, Spain, 2002."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.10.005"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.81.5.575"},{"key":"e_1_3_2_1_37_1","unstructured":"vhb-jourqual Teilrating Wirtschaftsinformatik http:\/\/vhbonline.org\/en\/service\/jourqual\/vhb-jourqual-3\/teilrating-wi\/"},{"key":"e_1_3_2_1_38_1","volume-title":"Work and motivation","author":"Vroom V.H.","year":"1964","unstructured":"Vroom, V.H., Work and motivation. New York: Wiley, 1964."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2013.01.003"},{"key":"e_1_3_2_1_40_1","first-page":"2","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"Webster J.","year":"2002","unstructured":"Webster, J., Watson, R.T., Analyzing the past to prepare for the future: Writing a literature review. Management Information Systems Quarterly, 26, 2, 2002, xiii--xxiii.","journal-title":"Management Information Systems Quarterly"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.463"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 26th European Conference on Information Systems: Portsmouth, UK","author":"Wirth J.","year":"2018","unstructured":"Wirth, J., Maier, C., Laumer, S., The Influence of Resignation on the Privacy Calculus in the Context of Social Networking Sites: an Empirical Analysis, In, Bednar, P., Frank, U., Kautz, K. (eds.), Proceedings of the 26th European Conference on Information Systems: Portsmouth, UK, 2018."},{"key":"e_1_3_2_1_43_1","volume-title":"Perceived information sensitivity and interdependent privacy protection: a quantitative study. electronic markets, 29, 3","author":"Wirth J.","year":"2019","unstructured":"Wirth, J., Maier, C., Laumer, S., Weitzel, T., Perceived information sensitivity and interdependent privacy protection: a quantitative study. electronic markets, 29, 3, 2019, 359--378."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"e_1_3_2_1_45_1","volume-title":"Are Consumers More Willing to Pay for Digital Items in Mobile Applications? Consumer Attitudes toward Virtual Goods. Pacific Asia Journal of the Association for Information Systems, 9, 4","author":"Yang Y.-C.","year":"2017","unstructured":"Yang, Y.-C., Huang, L.-T., Su, Y.-T., Are Consumers More Willing to Pay for Digital Items in Mobile Applications? Consumer Attitudes toward Virtual Goods. Pacific Asia Journal of the Association for Information Systems, 9, 4, 2017."},{"key":"e_1_3_2_1_46_1","volume-title":"Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence. Journal of marketing, 52, 3","author":"Zeithaml V.A.","year":"1988","unstructured":"Zeithaml, V.A., Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence. Journal of marketing, 52, 3, 1988, 2."},{"key":"e_1_3_2_1_47_1","volume-title":"International Symposium on Electronic Commerce and Security, 2008. ISECS 2008;","author":"Zhou T.","year":"2008","unstructured":"Zhou, T., The Impact of Perceived Value on User Acceptance of Mobile Commerce, In, Yu, F. (ed.), International Symposium on Electronic Commerce and Security, 2008. ISECS 2008; 3-5 Aug. 2008, Guangzhou, China: Los Alamitos, Calif.: Guangzhou City, China, pp. 237--240: IEEE Computer Society, 2008."}],"event":{"name":"SIGMIS-CPR '20: 2020 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Nuremberg Germany","acronym":"SIGMIS-CPR '20"},"container-title":["Proceedings of the 2020 Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378539.3393854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378539.3393854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:18Z","timestamp":1750200078000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378539.3393854"}},"subtitle":["A Literature Review, Status Quo and Future Research Directions"],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":47,"alternative-id":["10.1145\/3378539.3393854","10.1145\/3378539"],"URL":"https:\/\/doi.org\/10.1145\/3378539.3393854","relation":{},"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"2020-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}