{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:19:41Z","timestamp":1752549581499,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,19]]},"DOI":"10.1145\/3378539.3393856","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T00:52:21Z","timestamp":1591491141000},"page":"123-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Danger vs Fear"],"prefix":"10.1145","author":[{"given":"Krutheeka","family":"Baskaran","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saji K.","family":"Mathew","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accenture and Ponemon Institute. 2019. Ninth Annual Cost of Cybercrime Study Unlocking the Value of Improved Cybersecurity Protection. (2019) 18. Retrieved from https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50"},{"key":"e_1_3_2_1_2_1","first-page":"26","article-title":"Privacy and Rationality in Individual Decision Making. IEEE Secur. Priv.; Economics","volume":"3","author":"Acquisti Alessandro","year":"2005","unstructured":"Alessandro Acquisti and Jens Grossklags. 2005. Privacy and Rationality in Individual Decision Making. IEEE Secur. Priv.; Economics Inf. Secur. 3, 1 (2005), 26--33.","journal-title":"Inf. Secur."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1086\/671754"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.54.2.442"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467--8551.2006.00500.x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323994.3372137"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0335"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650295"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520--6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Andrew Bastawrous and Matthew J Armstrong. 2013. Mobile health use in low- and high-income countries: an overview of the peer-reviewed literature. J. R. Soc. Med. (2013) 130--142. DOI:https:\/\/doi.org\/10.1177\/0141076812472620","DOI":"10.1177\/0141076812472620"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.56.2.267"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2017.491"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0846"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_18_1","unstructured":"Melanie Evans. 2019. Google Amazon and Microsoft in Battle to Store Health Data in the Cloud. The Wall Street Journal. Retrieved from https:\/\/www.wsj.com\/articles\/google-amazon-and-microsoft-in-battle-to-store-health-data-in-the-cloud-11568122202"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022--3514.50.3.571"},{"key":"e_1_3_2_1_20_1","volume-title":"Forecast to","author":"Sullivan Frost","year":"2023","unstructured":"Frost & Sullivan. 2019. Assessment of the Wearables Market in India, Forecast to 2023. India. Retrieved from https:\/\/www.researchandmarkets.com\/reports\/4828814\/assessment-of-the-wearables-market-in-india?utm_source=BW&utm_medium=PressRelease&utm_code=mxp6xc&utm_campaign=1294633+-+India+Wearables+Market+Assessment+2018--2019+%26+2023&utm_exec=chdo54prd"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01605"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"David Gefen Detmar Straub and Marie-Claude Boudreau. 2000. Structural Equation Modeling and Regression: Guidelines for Research Practice. Commun. Assoc. Inf. Syst. 4 (2000). DOI:https:\/\/doi.org\/10.17705\/1CAIS.00407","DOI":"10.17705\/1CAIS.00407"},{"key":"e_1_3_2_1_23_1","volume-title":"Anderson","author":"Jr Hair Joseph F.","year":"2014","unstructured":"Joseph F. Jr Hair, William C Black, Barry J. Babin, and Rolph E. Anderson,. 2014. Multivariate data analysis (7th ed.). Harlow: Pearson Education Limited 2014.","edition":"7"},{"key":"e_1_3_2_1_24_1","volume-title":"Wearable Device Data and Privacy: A study of Perception and Behavior. 7, 1","author":"Hallam Cory","year":"2016","unstructured":"Cory Hallam and Gianluca Zanella. 2016. Wearable Device Data and Privacy: A study of Perception and Behavior. 7, 1 (2016), 82--91."},{"key":"e_1_3_2_1_25_1","volume-title":"Irving Lester Janis, and Harold H. Kelley","author":"Hovland Carl Iver","year":"1953","unstructured":"Carl Iver Hovland, Irving Lester Janis, and Harold H. Kelley. 1953. Communication and persuasion: psychological studies of opinion change. Yale University Press, New Haven, CT, US."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-015-0444-y"},{"key":"e_1_3_2_1_27_1","volume-title":"2017 Cost of data breach study. Ibm Secur. Reports June","author":"Security IBM","year":"2017","unstructured":"IBM Security. 2017. 2017 Cost of data breach study. Ibm Secur. Reports June (2017), 1--34. Retrieved from https:\/\/www.ibm.com\/downloads\/cas\/ZYKLN2E3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"Howard Leventhal. 1970. Findings and Theory in the Study of Fear Communications. In Advances in Experimental Social Psychology. 119--186. DOI:https:\/\/doi.org\/10.1016\/S0065--2601(08)60091-X","DOI":"10.1016\/S0065--2601(08)60091-X"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ"},{"key":"e_1_3_2_1_31_1","volume-title":"Impact of Privacy Awareness on Attitudes and Behaviors Online. Science (80-.). 2, 2","author":"Malandrino D","year":"2013","unstructured":"D Malandrino, V Scarano, and R Spinelli. 2013. Impact of Privacy Awareness on Attitudes and Behaviors Online. Science (80-.). 2, 2 (2013), 65--82."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_33_1","unstructured":"Kathryn C Montgomery Jeff Chester and Katharina Kopp. 2017. Health Wearable Devices in the Big Data Era: Ensuring Privacy Security and Consumer Protection. Retrieved from https:\/\/www.democraticmedia.org\/CDD-Wearable-Devices-Big-Data-Report."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659683"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021--9010.88.5.879"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1186\/2047-2501-2-3"},{"key":"e_1_3_2_1_37_1","volume-title":"Information Privacy Concerns in Electronic Healthcare Records?: A Systematic Literature Review","author":"Rahim Fiza Abdul","year":"2013","unstructured":"Fiza Abdul Rahim and A Primary Search. 2013. Information Privacy Concerns in Electronic Healthcare Records?: A Systematic Literature Review. 2013, (2013), 504--509."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-10933-3"},{"key":"e_1_3_2_1_39_1","volume-title":"A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1)","author":"Rogers RW","year":"1975","unstructured":"RW Rogers. 1975. A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1) (1975), 93--114."},{"volume-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation (Social psy ed.)","author":"Rogers RW","key":"e_1_3_2_1_40_1","unstructured":"RW Rogers. 1983. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation (Social psy ed.). Guilford Press, New York."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/ijop.12042"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Rebecca Schnall Tracy Higgins William Brown Alex Carballo-Dieguez and Suzanne Bakken. 2015. Trust Perceived Risk Perceived Ease of Use and Perceived Usefulness as Factors Related to mHealth Technology Use. Stud. Health Technol. Inform. 216 (2015) 467--471. DOI:https:\/\/doi.org\/10.3233\/978-1-61499-564-7-467","DOI":"10.3233\/978-1-61499-564-7-467"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"e_1_3_2_1_44_1","first-page":"167","article-title":"Information Privacy?","volume":"20","author":"Smith H Jeff","year":"1996","unstructured":"H Jeff Smith, Sandra J Milberg, and Sandra J Burke. 1996. Information Privacy?: Measuring Measuring Individuals' Concerns About Organizational. 20, 2 (1996), 167--196.","journal-title":"Measuring Measuring Individuals' Concerns About Organizational."},{"key":"e_1_3_2_1_45_1","unstructured":"Statistica. 2017. Wearables Market 2017--2023. Retrieved from https:\/\/www.statista.com\/outlook\/319\/119\/wearables\/india#market-users"},{"key":"e_1_3_2_1_46_1","unstructured":"Jonathan Stempel. 2018. Facebook loses facial recognition appeal must face privacy class action. The New York Times. Retrieved from https:\/\/www.reuters.com\/article\/us-facebook-privacy-lawsuit\/facebook-loses-facial-recognition-technology-appeal-must-face-class-action-idUSKCN1UY2BZ"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.17705\/1cais.01324"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0039729"},{"key":"e_1_3_2_1_50_1","first-page":"T4D","volume-title":"Data Protection and Privacy Legislation Worldwide","author":"United Nations. 2017.","unstructured":"United Nations. 2017. Data Protection and Privacy Legislation Worldwide. Geneva, Switzerland. Retrieved from https:\/\/unctad.org\/en\/Pages\/DTL\/STI_and_ICTs\/ICT4D-Legislation\/eCom-Data-Protection-Laws.aspx"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00424"},{"key":"e_1_3_2_1_52_1","volume-title":"PRIVACY-RELATED DECISION-MAKING IN THE CONTEXT OF WEARABLE USE. In PACIS 2016 Proceedings.","author":"Wieneke Alexander","year":"2016","unstructured":"Alexander Wieneke, Christiane Lehrer, Raphael Zeder, and Reinhard Jung. 2016. PRIVACY-RELATED DECISION-MAKING IN THE CONTEXT OF WEARABLE USE. In PACIS 2016 Proceedings."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759409376328"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/108107396127988"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025116923109"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/109019810002700506"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0240"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3277139.3277172"}],"event":{"name":"SIGMIS-CPR '20: 2020 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Nuremberg Germany","acronym":"SIGMIS-CPR '20"},"container-title":["Proceedings of the 2020 Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378539.3393856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378539.3393856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:18Z","timestamp":1750200078000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378539.3393856"}},"subtitle":["An Empirical Study on Wearable Users' Privacy Coping"],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":59,"alternative-id":["10.1145\/3378539.3393856","10.1145\/3378539"],"URL":"https:\/\/doi.org\/10.1145\/3378539.3393856","relation":{},"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"2020-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}