{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:55Z","timestamp":1777854535453,"version":"3.51.4"},"reference-count":35,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000287","name":"Royal Academy of Engineering","doi-asserted-by":"publisher","award":["ICRF1718\\1\\54"],"award-info":[{"award-number":["ICRF1718\\1\\54"]}],"id":[{"id":"10.13039\/501100000287","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:p>A two-round Delphi study was conducted to explore priorities for addressing online risk to individuals. A corpus of literature was created based on 69 peer-reviewed articles about privacy risk and the privacy calculus published between 2014 and 2019. A cluster analysis of the resulting text-base using Pearson\u2019s correlation coefficient resulted in seven broad topics. After two rounds of the Delphi survey with experts in information security and information literacy, the following topics were identified as priorities for further investigation: personalisation versus privacy, responsibility for privacy on social networks, measuring privacy risk, and perceptions of powerlessness and the resulting apathy. The Delphi approach provided clear conclusions about research topics and has potential as a tool for prioritising future research areas.<\/jats:p>","DOI":"10.1177\/0165551521992756","type":"journal-article","created":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T23:47:31Z","timestamp":1613432851000},"page":"93-106","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Delphi study of risk to individuals who disclose personal information online"],"prefix":"10.1177","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9191-9247","authenticated-orcid":false,"given":"David","family":"Haynes","sequence":"first","affiliation":[{"name":"School of Computing at Edinburgh Napier University, Edinburgh, UK; City, University of London, London, UK"}]},{"given":"Lyn","family":"Robinson","sequence":"additional","affiliation":[{"name":"City, University of London, London, UK"}]}],"member":"179","published-online":{"date-parts":[[2021,2,15]]},"reference":[{"key":"bibr1-0165551521992756","doi-asserted-by":"publisher","DOI":"10.5771\/9783956505508-166"},{"key":"bibr2-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"bibr3-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"bibr4-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1215-8"},{"key":"bibr5-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"bibr6-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1080\/13669870802488883"},{"key":"bibr7-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1002\/jcpy.1191"},{"key":"bibr8-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1007\/BF00146924"},{"key":"bibr9-0165551521992756","volume-title":"Management of Risk: guidance for practitioners","author":"Murray-Webster R","year":"2010","edition":"3"},{"key":"bibr10-0165551521992756","unstructured":"ISO\/IEC 27005:2011. Information technology \u2013 Security techniques \u2013 Information security risk management."},{"key":"bibr11-0165551521992756","volume-title":"Estimating Risk?: a management approach","author":"Garlick AR","year":"2007"},{"key":"bibr12-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-016-9714-2"},{"key":"bibr13-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.005"},{"key":"bibr14-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221852"},{"key":"bibr15-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20317"},{"key":"bibr16-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.ypmed.2014.07.007"},{"key":"bibr17-0165551521992756","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983648"},{"key":"bibr18-0165551521992756","volume-title":"The Delphi Method: techniques and applications","author":"Linstone HA","year":"1975"},{"key":"bibr19-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.04.013"},{"key":"bibr20-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1108\/JD-09-2019-0178"},{"key":"bibr21-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.116"},{"key":"bibr22-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334467"},{"key":"bibr23-0165551521992756","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-1-7"},{"key":"bibr24-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"bibr25-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.09.015"},{"key":"bibr26-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.056"},{"key":"bibr27-0165551521992756","first-page":"3737","volume":"10","author":"Hargittai E","year":"2016","journal-title":"Int J Commun"},{"key":"bibr28-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.05.012"},{"key":"bibr29-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1177\/0002764218792691"},{"key":"bibr30-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.030"},{"key":"bibr31-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0558-x"},{"key":"bibr32-0165551521992756","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-4-7"},{"key":"bibr33-0165551521992756","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1552717"},{"key":"bibr34-0165551521992756","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"bibr35-0165551521992756","unstructured":"Lessig L. Code. 2nd ed. New York; London: Basic Books, http:\/\/codev2.cc\/download+remix\/Lessig-Codev2.pdf (2006, accessed 2 June 2015)."}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551521992756","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551521992756","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551521992756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:32Z","timestamp":1777504172000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551521992756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,15]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["10.1177\/0165551521992756"],"URL":"https:\/\/doi.org\/10.1177\/0165551521992756","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,15]]}}}