{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:51Z","timestamp":1777854531642,"version":"3.51.4"},"reference-count":84,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2017,10]]},"abstract":"<jats:p>This study extends privacy concerns research by providing a test of a model inspired by the \u2018Antecedents \u2013 Privacy Concerns \u2013 Outcomes\u2019 (APCO) framework. Focusing at the individual level of analysis, the study examines the influences of privacy awareness (PA) and demographic variables (age, gender) on concern for information privacy (CFIP). It also considers CFIP\u2019s relationship to privacy-protecting behaviours and incorporates trust and risk into the model. These relationships are tested in a specific, Facebook-related context. Results strongly support the overall model. PA and gender are important explanators for CFIP, which in turn explains privacy-protecting behaviours. We also find that perceived risk affects trust, which in turn affects behaviours in the studied context. The results yield several recommendations for future research as well as some implications for management.<\/jats:p>","DOI":"10.1177\/0165551516653590","type":"journal-article","created":{"date-parts":[[2016,6,22]],"date-time":"2016-06-22T23:24:14Z","timestamp":1466637854000},"page":"583-600","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":44,"title":["An empirical test of an Antecedents \u2013 Privacy Concerns \u2013 Outcomes model"],"prefix":"10.1177","volume":"43","author":[{"given":"John H.","family":"Benamati","sequence":"first","affiliation":[{"name":"Miami University, Ohio, USA"}]},{"given":"Zafer D.","family":"Ozdemir","sequence":"additional","affiliation":[{"name":"Miami University, Ohio, USA"}]},{"given":"H. Jeff","family":"Smith","sequence":"additional","affiliation":[{"name":"Miami University, Ohio, USA"}]}],"member":"179","published-online":{"date-parts":[[2016,6,1]]},"reference":[{"key":"bibr1-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506064902"},{"key":"bibr2-0165551516653590","volume-title":"Consumer Reports Poll: Americans Extremely Concerned About Internet Privacy","author":"Consumers Union","year":"2008"},{"key":"bibr3-0165551516653590","volume-title":"KnowPrivacy: The Current State of Web Privacy, Data Collection, and Information Sharing","author":"Gomez J","year":"2009"},{"key":"bibr4-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1177\/0165551505055400"},{"key":"bibr5-0165551516653590","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02828"},{"key":"bibr6-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"bibr7-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"bibr8-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/41409969"},{"key":"bibr9-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"bibr10-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1522-7138(199722)11:3<44::AID-DIR7>3.0.CO;2-X"},{"key":"bibr11-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808101618"},{"key":"bibr12-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/249775"},{"key":"bibr13-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"bibr14-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"bibr15-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9851-1"},{"key":"bibr16-0165551516653590","first-page":"272","volume-title":"ICIS 2004: Twenty-Fifth International Conference on Information Systems","author":"Lu Y","year":"2004"},{"key":"bibr17-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/dir.4000060407"},{"key":"bibr18-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"bibr19-0165551516653590","volume-title":"Proceedings of 28th Annual International Conference on Information Systems (ICIS 2007)","author":"Xu H.","year":"2007"},{"key":"bibr20-0165551516653590","volume-title":"29th International Conference on Information Systems","author":"Xu H","year":"2008"},{"key":"bibr21-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"},{"key":"bibr22-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0252"},{"key":"bibr23-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20530"},{"key":"bibr24-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0335"},{"key":"bibr25-0165551516653590","first-page":"115","volume":"12","author":"Cha J.","year":"2011","journal-title":"Journal of Electronic Commerce Research"},{"key":"bibr26-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"bibr27-0165551516653590","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2006100103"},{"key":"bibr28-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.09.002"},{"key":"bibr29-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2006.02.006"},{"key":"bibr30-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.016"},{"key":"bibr31-0165551516653590","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.12"},{"key":"bibr32-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"bibr33-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"bibr34-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"key":"bibr35-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9"},{"key":"bibr36-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1177\/1094670511424924"},{"key":"bibr37-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.1999.10673588"},{"key":"bibr38-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/25148854"},{"key":"bibr39-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.022"},{"key":"bibr40-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211214575"},{"key":"bibr41-0165551516653590","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00092"},{"key":"bibr42-0165551516653590","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1111\/j.1099-0860.2011.00423.x","volume":"27","author":"Walgrave M","year":"2013","journal-title":"Children & Society"},{"key":"bibr43-0165551516653590","first-page":"538","volume-title":"Proceedings of the Twenty-Fourth Annual International Conference on Information Systems (ICIS)","author":"Xu Y","year":"2003"},{"key":"bibr44-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9106-3"},{"key":"bibr45-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"bibr46-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2011.07.003"},{"key":"bibr47-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415100201"},{"key":"bibr48-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.008"},{"key":"bibr49-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367380405"},{"key":"bibr50-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"bibr51-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0423"},{"key":"bibr52-0165551516653590","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"bibr53-0165551516653590","volume-title":"29th Annual International Conference on Information Systems (ICIS 2008)","author":"Bansal G","year":"2008"},{"key":"bibr54-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/dir.10033"},{"key":"bibr55-0165551516653590","first-page":"897","volume-title":"Proceedings of 26th Annual International Conference on Information Systems (ICIS 2005)","author":"Xu H","year":"2005"},{"key":"bibr56-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818207"},{"key":"bibr57-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/25148720"},{"key":"bibr58-0165551516653590","volume-title":"Consumer Privacy Issues in the Nineties","author":"Westin AF.","year":"1990"},{"key":"bibr59-0165551516653590","first-page":"349","volume":"8","author":"Stone EF","year":"1990","journal-title":"Research in Personnel and Human Resources Management"},{"key":"bibr60-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"bibr61-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/dir.4000090204"},{"key":"bibr62-0165551516653590","doi-asserted-by":"crossref","unstructured":"Hoofnagle C, King J, Li S, Turow J. How different are young adults from older Americans when it comes to information privacy attitudes and policies?2010. Available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1589864","DOI":"10.2139\/ssrn.1589864"},{"key":"bibr63-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00328.x"},{"key":"bibr64-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O"},{"key":"bibr65-0165551516653590","volume-title":"Equifax-Harris Consumer Privacy Survey 1994","author":"Equifax Inc","year":"1994"},{"key":"bibr66-0165551516653590","volume-title":"Equifax-Harris Mid-Decade Consumer Privacy Survey 1995","author":"Equifax Inc","year":"1995"},{"key":"bibr67-0165551516653590","volume-title":"Harris-Equifax Health Information Privacy Survey 1993","author":"Equifax Inc","year":"1993"},{"key":"bibr68-0165551516653590","volume-title":"The Equifax Report on Consumers in the Information Age","author":"Equifax Inc","year":"1990"},{"key":"bibr69-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1080\/13511610.2013.747650"},{"key":"bibr70-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"bibr71-0165551516653590","first-page":"1","volume-title":"Risk-Taking Behavior","author":"Yates JF","year":"1992"},{"key":"bibr72-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"bibr73-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2007.00174.x"},{"key":"bibr74-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"bibr75-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1177\/0165551513509564"},{"key":"bibr76-0165551516653590","unstructured":"Ringle CM, Wende S, Will A. SmartPLS 2.0.M3 2005. Hamburg: SmartPLS. Available at: http:\/\/www.smartpls.com"},{"key":"bibr77-0165551516653590","first-page":"307","volume-title":"Statistical Strategies for Small Sample Research","author":"Chin WW","year":"1999"},{"key":"bibr78-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"bibr79-0165551516653590","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"bibr80-0165551516653590","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"bibr81-0165551516653590","volume-title":"The Guardian","author":"Garside J.","year":"2013"},{"key":"bibr82-0165551516653590","author":"Munson L.","year":"2013","journal-title":"NakedSecurity"},{"key":"bibr83-0165551516653590","unstructured":"CBS News. NSA surveillance exposed. New York: CBS News, 2013."},{"key":"bibr84-0165551516653590","volume-title":"Washington Post","author":"Kang C","year":"2013"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551516653590","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551516653590","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551516653590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:28Z","timestamp":1777504168000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551516653590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,1]]},"references-count":84,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["10.1177\/0165551516653590"],"URL":"https:\/\/doi.org\/10.1177\/0165551516653590","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,1]]}}}