{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T02:16:14Z","timestamp":1777515374351,"version":"3.51.4"},"reference-count":133,"publisher":"MIS Quarterly","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,1]]},"abstract":"<jats:p>Data donations, where individuals are encouraged to donate their personal information, have the potential to advance medical research and help limit the spread of pandemics, among other benefits. The decision to donate data is fundamentally a privacy decision. In this research, we build on the privacy calculus, a model describing privacy risks and benefits, and examine the impact of privacy concerns on data donation decisions, highlighting the role of societal benefits in privacy decisions. Based on two randomized experiments using the general context of data donation for medical research (Experiment 1) and the specific context of data donation for COVID-19 research (Experiment 2), we find that individuals who are highly concerned about privacy tend to donate less data (Experiments 1 and 2). This effect holds under a variety of conditions and is consistent with prevailing research. However, this effect is contingent on the privacy calculus. When implicit or explicit societal benefits are perceived, particularly in the absence of privacy controls, the association between privacy concerns and data donation decisions is less salient, highlighting the significant role that societal benefits play in privacy decisions. We discuss the theoretical, practical, social, and ethical implications of these findings.<\/jats:p>","DOI":"10.25300\/misq\/2024\/16853","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T19:27:21Z","timestamp":1732044441000},"page":"429-464","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Concerns and Data Donations: Do Societal Benefits Matter?"],"prefix":"10.25300","volume":"49","author":[{"given":"Tawfiq","family":"Alashoor","sequence":"first","affiliation":[{"name":"Department of Operations, Information and Technology, IESE Business School, University of Navarra, Barcelona, Spain"}]},{"given":"Mark","family":"Keil","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, J. Mack Robinson College of Business, Georgia State University, GA, U.S.A."}]},{"given":"Zhenhui (Jack)","family":"Jiang","sequence":"additional","affiliation":[{"name":"Area of Innovation and Information Management, HKU Business School, The University of Hong Kong, Hong Kong"}]},{"given":"Kambiz","family":"Saffarizadeh","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Operations Management, College of Business, University of Texas at Arlington, TX, U.S.A"}]}],"member":"10933","published-online":{"date-parts":[[2025,6,1]]},"reference":[{"issue":"3","key":"2025090212072458300_b1-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3054926","article-title":"Nudges for privacy and security: Understanding and assisting users\u2019 choices online","volume":"50","author":"Acquisti","year":"2017","journal-title":"ACM Computing Surveys"},{"issue":"6221","key":"2025090212072458300_b2-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1017\/9781316831960.010","article-title":"Privacy and human behavior in the age of information","volume":"347","author":"Acquisti","year":"2015","journal-title":"Science"},{"issue":"4","key":"2025090212072458300_b3-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1002\/jcpy.1191","article-title":"Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age","volume":"30","author":"Acquisti","year":"2020","journal-title":"Journal of Consumer Psychology"},{"key":"2025090212072458300_b4-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","article-title":"Imagined communities: Awareness, information sharing, and privacy on the Facebook","volume-title":"Privacy enhancing technology: 6th international workshop","author":"Acquisti","year":"2006"},{"issue":"2","key":"2025090212072458300_b5-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1257\/jel.54.2.442","article-title":"The economics of privacy","volume":"52","author":"Acquisti","year":"2016","journal-title":"Journal of Economic Literature"},{"issue":"5","key":"2025090212072458300_b6-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1287\/mnsc.2018.3028","article-title":"Choice architecture, framing, and cascaded privacy choices","volume":"65","author":"Adjerid","year":"2019","journal-title":"Management Science"},{"issue":"2","key":"2025090212072458300_b7-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"465","DOI":"10.25300\/misq\/2018\/14316","article-title":"Beyond the privacy paradox: Objective versus relative risk in privacy decision making","volume":"42","author":"Adjerid","year":"2018","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025090212072458300_b8-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/0960085x.2020.1771968","article-title":"Information systems in the age of pandemics: COVID-19 and beyond","volume":"29","author":"\u00c5gerfalk","year":"2020","journal-title":"European Journal of Information Systems"},{"key":"2025090212072458300_b9-02_ra_10_25300_misq_2024_16853","article-title":"The general relativity of privacy","author":"Alashoor","year":"2024"},{"key":"2025090212072458300_b10-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.1109\/iccit58132.2023.10273938","article-title":"An online randomized field experiment on the importance of privacy education, training, and awareness (PETA)","author":"Alashoor","year":"2023"},{"issue":"4","key":"2025090212072458300_b11-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1287\/isre.2022.1182","article-title":"Too tired and in too good of a mood to worry about privacy: Explaining the privacy paradox through the lens of effort level in information processing","volume":"34","author":"Alashoor","year":"2023","journal-title":"Information Systems Research"},{"issue":"3","key":"2025090212072458300_b12-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1080\/07421222.2021.1962595","article-title":"Designing online virtual advisors to encourage customer self-disclosure: A theoretical model and an empirical test","volume":"38","author":"Al-Natour","year":"2021","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"2025090212072458300_b13-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1287\/isre.1100.0335","article-title":"The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information","volume":"22","author":"Anderson","year":"2011","journal-title":"Information Systems Research"},{"issue":"401","key":"2025090212072458300_b14-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"464","DOI":"10.2307\/2234133","article-title":"Impure altruism and donations to public goods: A theory of warm-glow giving","volume":"100","author":"Andreoni","year":"1990","journal-title":"The Economic Journal"},{"issue":"1","key":"2025090212072458300_b15-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2118508","article-title":"Warm-glow versus cold-prickle: The effects of positive and negative framing on cooperation in experiments","volume":"110","author":"Andreoni","year":"1995","journal-title":"The Quarterly Journal of Economics"},{"issue":"2","key":"2025090212072458300_b16-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10551-010-0385-5","article-title":"Protect my privacy or support the common-good? Ethical questions about electronic health information exchanges","volume":"90","author":"Angst","year":"2009","journal-title":"Journal of Business Ethics"},{"issue":"2","key":"2025090212072458300_b17-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"339","DOI":"10.2307\/20650295","article-title":"Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion","volume":"33","author":"Angst","year":"2009","journal-title":"MIS Quarterly"},{"key":"2025090212072458300_b18-02_ra_10_25300_misq_2024_16853","unstructured":"Ashford, W.\n           (2016). Google company\u2019s access to NHS records raises privacy concerns. Computer Weekly. https:\/\/www.computerweekly.com\/news\/450295503\/Google-companys-access-to-NHS-records-raises-privacy-concerns"},{"key":"2025090212072458300_b19-02_ra_10_25300_misq_2024_16853","unstructured":"Auxier, B.\n           (2020). How Americans see digital privacy issues amid the COVID-19 outbreak. The Pew Research Center. https:\/\/www.pewresearch.org\/fact-tank\/2020\/05\/04\/how-americans-see-digital-privacy-issues-amid-the-covid-19-outbreak\/"},{"key":"2025090212072458300_b20-02_ra_10_25300_misq_2024_16853","unstructured":"Auxier, B., Rainie, L., Anderson, M., Perrin, A., Kumar, M., & Turner, E. (2019). Americans and privacy: Concerned, confused and feeling lack of control over their personal information. The Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/"},{"issue":"1","key":"2025090212072458300_b21-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/25148715","article-title":"The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization","volume":"30","author":"Awad","year":"2006","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025090212072458300_b22-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2015.08.001","article-title":"Do context and personality matter? Trust and privacy concerns in disclosing private information online","volume":"53","author":"Bansal","year":"2016","journal-title":"Information & Management"},{"issue":"7","key":"2025090212072458300_b23-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","article-title":"The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior\u2014A systematic literature review","volume":"34","author":"Barth","year":"2017","journal-title":"Telematics and Informatics"},{"key":"2025090212072458300_b24-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2023.102063","article-title":"Systematic review of survey scales measuring information privacy concerns on social network sites","volume":"85","author":"Bartol","year":"2023","journal-title":"Telematics and Informatics"},{"issue":"1","key":"2025090212072458300_b25-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/jcom.12276","article-title":"Online privacy concerns and privacy management: A meta-analytical review","volume":"67","author":"Baruh","year":"2017","journal-title":"Journal of Communication"},{"key":"2025090212072458300_b26-02_ra_10_25300_misq_2024_16853","volume-title":"Altruism in humans","author":"Batson","year":"2011"},{"key":"2025090212072458300_b27-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1093\/oxfordhb\/9780195187243.013.0039","article-title":"Empathy and altruism","volume-title":"The Oxford handbook of positive psychology","author":"Batson","year":"2009"},{"issue":"4","key":"2025090212072458300_b28-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1037\/\/0022-3514.68.4.619","article-title":"Empathy and the collective good: Caring for one of the others in a social dilemma","volume":"68","author":"Batson","year":"1995","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"2025090212072458300_b29-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.tracli.2017.06.001","article-title":"Determinants of plasma donation: A review of the literature","volume":"24","author":"Beurel","year":"2017","journal-title":"Transfusion Clinique et Biologique"},{"issue":"1","key":"2025090212072458300_b30-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5334\/cstp.178","article-title":"Data donation as a model for citizen science health research","volume":"4","author":"Bietz","year":"2019","journal-title":"Citizen Science: Theory and Practice"},{"issue":"5","key":"2025090212072458300_b31-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","article-title":"The right to privacy","volume":"4","author":"Brandeis","year":"1890","journal-title":"Harvard Law Review"},{"issue":"3","key":"2025090212072458300_b31a-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1177\/1948550612455931","article-title":"Misplaced confidences: Privacy and the control paradox","volume":"4","author":"Brandimarte","year":"2013","journal-title":"Social Psychological and Personality Science"},{"issue":"4","key":"2025090212072458300_b32-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1287\/isre.2017.0706","article-title":"Understanding consumers\u2019 attitudes toward controversial information technologies: A contextualization approach","volume":"28","author":"Breward","year":"2017","journal-title":"Information Systems Research"},{"issue":"2","key":"2025090212072458300_b33-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1287\/isre.2018.0818","article-title":"Relative privacy valuations under varying disclosure characteristics","volume":"30","author":"Buckman","year":"2019","journal-title":"Information Systems Research"},{"issue":"4","key":"2025090212072458300_b34-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1177\/1094428116641191","article-title":"Boundary conditions: What they are, how to explore them, why we need them, and when to consider them","volume":"20","author":"Busse","year":"2017","journal-title":"Organizational Research Methods"},{"issue":"4","key":"2025090212072458300_b35-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1287\/isre.2016.0672","article-title":"Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook","volume":"27","author":"Cavusoglu","year":"2016","journal-title":"Information Systems Research"},{"key":"2025090212072458300_b36-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106718","article-title":"Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high","volume":"119","author":"Chan","year":"2021","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"2025090212072458300_b37-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1080\/0960085x.2020.1869508","article-title":"The good, the bad, and the ugly: Impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing","volume":"31","author":"Cheng","year":"2022","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025090212072458300_b38-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1287\/isre.2015.0602","article-title":"Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding","volume":"26","author":"Choi","year":"2015","journal-title":"Information Systems Research"},{"issue":"3","key":"2025090212072458300_b39-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"124","DOI":"10.17705\/1jais.00487","article-title":"Love at first sight: The interplay between privacy dispositions and privacy calculus in online social connectivity management","volume":"19","author":"Choi","year":"2018","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"2025090212072458300_b40-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.25300\/misq\/2021\/14165","article-title":"Privacy concerns and data sharing in the internet of things: Mixed methods evidence from connected cars","volume":"45","author":"Cichy","year":"2021","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025090212072458300_b41-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","volume":"10","author":"Culnan","year":"1999","journal-title":"Organization Science"},{"issue":"2","key":"2025090212072458300_b42-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1111\/1540-4560.00067","article-title":"Consumer privacy: Balancing economic and justice considerations","volume":"59","author":"Culnan","year":"2003","journal-title":"Journal of Social Issues"},{"issue":"4","key":"2025090212072458300_b43-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"673","DOI":"10.2307\/20650322","article-title":"How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches","volume":"33","author":"Culnan","year":"2009","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025090212072458300_b44-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1002\/bdm.697","article-title":"Affective motivations to help others: A two-stage model of donation decisions","volume":"24","author":"Dickert","year":"2011","journal-title":"Journal of Behavioral Decision Making"},{"issue":"1","key":"2025090212072458300_b45-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"issue":"4","key":"2025090212072458300_b46-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2015.0600","article-title":"Research commentary\u2014Informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the \u201cAPCO\u201d box","volume":"26","author":"Dinev","year":"2015","journal-title":"Information Systems Research"},{"issue":"3","key":"2025090212072458300_b47-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1057\/ejis.2012.23","article-title":"Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts","volume":"22","author":"Dinev","year":"2013","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025090212072458300_b48-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1177\/1094428110380467","article-title":"The presence of something or the absence of nothing: Increasing theoretical precision in management research","volume":"13","author":"Edwards","year":"2010","journal-title":"Organizational Research Methods"},{"issue":"1","key":"2025090212072458300_b49-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1037\/\/0033-2909.101.1.91","article-title":"The relation of empathy to prosocial and related behaviors","volume":"101","author":"Eisenberg","year":"1987","journal-title":"Psychological Bulletin"},{"key":"2025090212072458300_b50-02_ra_10_25300_misq_2024_16853","unstructured":"Fast, V., & Schnurr, D. (in press). Data donations for digital contact tracing: short-and long-term effects of monetary incentives. Information Systems Research. Available at https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3786245"},{"issue":"2","key":"2025090212072458300_b51-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/08934210903258852","article-title":"A meta-analytic review of communication campaigns to promote organ donation","volume":"22","author":"Feeley","year":"2009","journal-title":"Communication Reports"},{"issue":"2","key":"2025090212072458300_b52-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1111\/j.1537-2995.2011.03279.x","article-title":"Exploring the pattern of blood donor beliefs in first-time, novice, and experienced donors: Differentiating reluctant altruism, pure altruism, impure altruism, and warm glow","volume":"52","author":"Ferguson","year":"2012","journal-title":"Transfusion"},{"issue":"6","key":"2025090212072458300_b53-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1111\/isj.12179","article-title":"Mobile health technology adoption across generations: Narrowing the digital divide","volume":"28","author":"Fox","year":"2018","journal-title":"Information Systems Journal"},{"key":"2025090212072458300_b54-02_ra_10_25300_misq_2024_16853","unstructured":"Garber, C.\n           (2015). Donate your health data to medical science. Scientific American. https:\/\/www.scientificamerican.com\/podcast\/episode\/donate-your-health-data-to-medical-science"},{"issue":"5","key":"2025090212072458300_b55-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.1287\/mnsc.2021.4054","article-title":"Consumer consent and firm targeting after GDPR: The case of a large telecom provider","volume":"68","author":"Godinho de Matos","year":"2022","journal-title":"Management Science"},{"key":"2025090212072458300_b56-02_ra_10_25300_misq_2024_16853","first-page":"273","article-title":"Evaluating the usability of privacy choice mechanisms","author":"Habib","year":"2022"},{"issue":"2","key":"2025090212072458300_b57-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/s0047-2727(97)00062-5","article-title":"What do donations buy? A model of philanthropy based on prestige and warm glow","volume":"67","author":"Harbaugh","year":"1998","journal-title":"Journal of Public Economics"},{"key":"2025090212072458300_b58-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jenvp.2017.05.006","article-title":"Warm glow vs. altruistic values: How important is intrinsic emotional reward in proenvironmental behavior?","volume":"52","author":"Hartmann","year":"2017","journal-title":"Journal of Environmental Psychology"},{"issue":"1","key":"2025090212072458300_b59-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infoandorg.2023.100452","article-title":"The social dilemma of big data: Donating personal data to promote social welfare","volume":"33","author":"Hillebrand","year":"2023","journal-title":"Information and Organization"},{"issue":"1","key":"2025090212072458300_b60-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/misq\/2013\/37.1.12","article-title":"Internet privacy concerns: An integrated conceptualization and four empirical studies","volume":"37","author":"Hong","year":"2013","journal-title":"MIS Quarterly"},{"key":"2025090212072458300_b61-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-030-04363-6_3","article-title":"Data donations as exercises of sovereignty","volume-title":"The ethics of medical data donation","author":"Hummel","year":"2019"},{"key":"2025090212072458300_b62-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"crossref","unstructured":"Jarovsky, L.\n           (2022). Dark patterns in personal data collection: Definition, taxonomy and lawfulness. SSRN. https:\/\/ssrn.com\/abstract=4048582","DOI":"10.2139\/ssrn.4048582"},{"issue":"3","key":"2025090212072458300_b63-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1287\/isre.1120.0441","article-title":"Research note\u2014Privacy concerns and privacy-protective behavior in synchronous online social interactions","volume":"24","author":"Jiang","year":"2013","journal-title":"Information Systems Research"},{"issue":"2","key":"2025090212072458300_b64-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"386","DOI":"10.5465\/amr.2006.20208687","article-title":"The essential impact of context on organizational behavior","volume":"31","author":"Johns","year":"2006","journal-title":"Academy of Management Review"},{"issue":"2","key":"2025090212072458300_b65-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1080\/07421222.2017.1334467","article-title":"Beyond the personalization-privacy paradox: Privacy valuation, transparency features, and service personalization","volume":"34","author":"Karwatzki","year":"2017","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"2025090212072458300_b66-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1111\/isj.12386","article-title":"The multidimensional nature of privacy risks: Conceptualisation, measurement and implications for digital services","volume":"32","author":"Karwatzki","year":"2022","journal-title":"Information Systems Journal"},{"issue":"6","key":"2025090212072458300_b67-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1111\/isj.12062","article-title":"Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus","volume":"25","author":"Kehr","year":"2015","journal-title":"Information Systems Journal"},{"issue":"6","key":"2025090212072458300_b68-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1111\/isj.12082","article-title":"The role of mobile-computing self-efficacy in consumer information disclosure","volume":"25","author":"Keith","year":"2015","journal-title":"Information Systems Journal"},{"issue":"3","key":"2025090212072458300_b69-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1111\/j.1540-4560.1977.tb01882.x","article-title":"The concept privacy and its biological basis","volume":"33","author":"Klopfer","year":"1977","journal-title":"Journal of Social Issues"},{"key":"2025090212072458300_b70-02_ra_10_25300_misq_2024_16853","unstructured":"Knapton, S.\n           (2016). How the NHS got it so wrong with Care.data. The Telegraph. https:\/\/www.telegraph.co.uk\/science\/2016\/07\/07\/how-the-nhs-got-it-so-wrong-with-caredata\/"},{"issue":"1","key":"2025090212072458300_b71-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"45","DOI":"10.17705\/1jais.00446","article-title":"Communicating personal health information in virtual health communities: An integration of privacy calculus model and affective commitment","volume":"18","author":"Kordzadeh","year":"2017","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025090212072458300_b72-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"Journal of Information Technology"},{"key":"2025090212072458300_b73-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-04363-6","volume-title":"The ethics of medical data donation","author":"Krutzinna","year":"2019"},{"issue":"2","key":"2025090212072458300_b74-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1177\/183335831404300204","article-title":"How do patients respond to violation of their information privacy?","volume":"43","author":"Kuo","year":"2014","journal-title":"Health Information Management Journal"},{"issue":"3","key":"2025090212072458300_b75-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue: A multidimensional developmental theory","volume":"33","author":"Laufer","year":"1977","journal-title":"Journal of Social Issues"},{"issue":"1","key":"2025090212072458300_b76-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"343","DOI":"10.25300\/misq\/2021\/15941","article-title":"The CARE theory of dignity amid personal data digitalization","volume":"45","author":"Leidner","year":"2021","journal-title":"MIS Quarterly"},{"key":"2025090212072458300_b77-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.dss.2012.10.043","article-title":"Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract","volume":"57","author":"Li","year":"2014","journal-title":"Decision Support Systems"},{"issue":"8","key":"2025090212072458300_b78-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1002\/asi.23068","article-title":"The effects of information privacy concerns on digitizing personal health records","volume":"65","author":"Li","year":"2014","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"2025090212072458300_b79-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"453","DOI":"10.17705\/1cais.02828","article-title":"Empirical studies on online information privacy concerns: Literature review and an integrative framework","volume":"28","author":"Li","year":"2011","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"2025090212072458300_b80-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: A critical review and an integrated framework","volume":"54","author":"Li","year":"2012","journal-title":"Decision Support Systems"},{"issue":"1","key":"2025090212072458300_b81-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1287\/isre.2022.1130","article-title":"The hidden costs and benefits of monitoring in the gig economy","volume":"34","author":"Liang","year":"2023","journal-title":"Information Systems Research"},{"issue":"3","key":"2025090212072458300_b82-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/2658983","article-title":"Privacy implications of health information seeking on the web","volume":"58","author":"Libert","year":"2015","journal-title":"Communications of the ACM"},{"issue":"4","key":"2025090212072458300_b83-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1080\/0960085x.2021.1920857","article-title":"Privacy concerns and digital government: Exploring citizen willingness to adopt the COVIDSafe app","volume":"30","author":"Lin","year":"2021","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025090212072458300_b84-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"434","DOI":"10.17705\/1jais.00540","article-title":"Beyond information: The role of territory in privacy management behavior on social networking sites","volume":"20","author":"Lin","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"2025090212072458300_b85-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Information Systems Research"},{"issue":"1","key":"2025090212072458300_b86-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.cels.2015.05.001","article-title":"Driving innovation in health systems through an apps-based information economy","volume":"1","author":"Mandl","year":"2015","journal-title":"Cell Systems"},{"issue":"4","key":"2025090212072458300_b87-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1057\/s41303-016-0027-9","article-title":"It\u2019s complicated: Explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis","volume":"26","author":"Moody","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"2025090212072458300_b88-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1177\/1094670511424924","article-title":"Disclosure antecedents in an online service context: The role of sensitivity of information","volume":"15","author":"Mothersbaugh","year":"2012","journal-title":"Journal of Service Research"},{"key":"2025090212072458300_b89-02_ra_10_25300_misq_2024_16853","unstructured":"Noble, J.\n           (2021). New research initiative launches for all patients ever diagnosed with colorectal cancer. Broad Institute. https:\/\/www.broadinstitute.org\/news\/new-research-initiative-launches-all-patients-ever-diagnosed-colorectal-cancer"},{"issue":"2","key":"2025090212072458300_b90-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/s0095-0696(02)00051-7","article-title":"Identifying the warm glow effect in contingent valuation","volume":"45","author":"Nunes","year":"2003","journal-title":"Journal of Environmental Economics and Management"},{"key":"2025090212072458300_b91-02_ra_10_25300_misq_2024_16853","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm","year":"2010","journal-title":"UCLA Law Review"},{"issue":"6","key":"2025090212072458300_b92-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1057\/s41303-017-0056-z","article-title":"Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study","volume":"26","author":"Ozdemir","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"2025090212072458300_b93-02_ra_10_25300_misq_2024_16853","unstructured":"Payne, K.\n           (2017). Organ donors? Lawmaker wants data donors. WLRN. https:\/\/wlrn.org\/post\/organ-donors-lawmaker-wants-data-donors"},{"issue":"3","key":"2025090212072458300_b94-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1080\/19312458.2023.2176474","article-title":"Leveraging data donations for communication research: Exploring drivers behind the willingness to donate","volume":"17","author":"Pfiffner","year":"2023","journal-title":"Communication Methods and Measures"},{"issue":"2","key":"2025090212072458300_b95-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1057\/ejis.2010.15","article-title":"Proposing the online community self-disclosure model: The case of working professionals in France and the UK who use online communities","volume":"19","author":"Posey","year":"2010","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"2025090212072458300_b96-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1287\/isre.2021.550","article-title":"Uncovering the neural processes of privacy: A neurally informed behavioral intervention to protect information privacy","volume":"35","author":"Reeck","year":"2024","journal-title":"Information Systems Research"},{"key":"2025090212072458300_b97-02_ra_10_25300_misq_2024_16853","article-title":"The manipulation problem: Conversational AI as a threat to epistemic agency","author":"Rosenberg","year":"2023"},{"issue":"9991","key":"2025090212072458300_b98-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.1016\/s0140-6736(15)61410-6","article-title":"Data donation after death","volume":"386","author":"Shaw","year":"2015","journal-title":"The Lancet"},{"issue":"1","key":"2025090212072458300_b99-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"14","DOI":"10.15252\/embr.201541802","article-title":"Data donation after death","volume":"17","author":"Shaw","year":"2016","journal-title":"EMBO Reports: Science & Society"},{"issue":"1","key":"2025090212072458300_b100-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","article-title":"Dimensions of privacy concern among online consumers","volume":"19","author":"Sheehan","year":"2000","journal-title":"Journal of Public Policy & Marketing"},{"issue":"11","key":"2025090212072458300_b101-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0224240","article-title":"Psychology of personal data donation","volume":"14","author":"Skatova","year":"2019","journal-title":"PLOS One"},{"issue":"4","key":"2025090212072458300_b102-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: An interdisciplinary review","volume":"35","author":"Smith","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025090212072458300_b103-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals\u2019 concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025090212072458300_b104-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","article-title":"A taxonomy of privacy","volume":"154","author":"Solove","year":"2006","journal-title":"University of Pennsylvania Law Review"},{"issue":"1","key":"2025090212072458300_b105-02_ra_10_25300_misq_2024_16853","first-page":"1","article-title":"The myth of the privacy paradox","volume":"89","author":"Solove","year":"2021","journal-title":"George Washington Literature Review"},{"issue":"3","key":"2025090212072458300_b106-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users\u2019 information privacy-protective responses: A taxonomy and a nomological model","volume":"32","author":"Son","year":"2008","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025090212072458300_b107-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"20","DOI":"10.2139\/ssrn.410925","article-title":"Other-regarding preferences: Egalitarian warm glow, empathy, and group size","volume":"61","author":"Stahl","year":"2006","journal-title":"Journal of Economic Behavior & Organization"},{"issue":"12","key":"2025090212072458300_b108-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1959","DOI":"10.1080\/13501763.2022.2135757","article-title":"Manipulation as theft","volume":"29","author":"Sunstein","year":"2022","journal-title":"Journal of European Public Policy"},{"issue":"21","key":"2025090212072458300_b109-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"8038","DOI":"10.1073\/pnas.1202129109","article-title":"Disclosing information about the self is intrinsically rewarding","volume":"109","author":"Tamir","year":"2012","journal-title":"PNAS"},{"issue":"2","key":"2025090212072458300_b110-02_ra_10_25300_misq_2024_16853","first-page":"18","article-title":"Leaping the data chasm: Structuring donation of clinical data for healthcare innovation and modeling","volume":"14","author":"Taylor","year":"2015","journal-title":"Harvard Health Policy Review"},{"issue":"3","key":"2025090212072458300_b111-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"213","DOI":"10.17705\/1jais.00534","article-title":"Privacy in the sharing economy","volume":"20","author":"Teubner","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"key":"2025090212072458300_b112-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.obhdp.2020.04.003","article-title":"What\u2019s next for nudging and choice architecture?","volume":"163","author":"Thaler","year":"2021","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"2","key":"2025090212072458300_b113-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1037\/\/0022-3514.43.2.281","article-title":"More evidence that empathy is a source of altruistic motivation","volume":"43","author":"Toi","year":"1982","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025090212072458300_b114-02_ra_10_25300_misq_2024_16853","volume-title":"The patient will see you now: The future of medicine is in your hands","author":"Topol","year":"2015"},{"key":"2025090212072458300_b115-02_ra_10_25300_misq_2024_16853","unstructured":"Velasquez, L.\n           (2011). The influence of empathy priming and social value orientations on the motivation for prosocial behavior [Doctoral dissertation], University of South Carolina."},{"issue":"2","key":"2025090212072458300_b116-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jsis.2013.01.003","article-title":"The influence of user affect in online information disclosure","volume":"22","author":"Wakefield","year":"2013","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"2025090212072458300_b117-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1766","DOI":"10.1287\/isre.2021.0253","article-title":"Digital contact tracing for pandemic response: The roles of cultural worldviews and technology awareness","volume":"35","author":"Wang","year":"2023","journal-title":"Information Systems Research"},{"issue":"1","key":"2025090212072458300_b118-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1016\/j.ijinfomgt.2016.10.006","article-title":"Let the users tell the truth: Self-disclosure intention and self-disclosure honesty in mobile social networking","volume":"37","author":"Wang","year":"2017","journal-title":"International Journal of Information Management"},{"issue":"11","key":"2025090212072458300_b119-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"758","DOI":"10.17705\/1jais.00474","article-title":"Shared benefits and information privacy: What determines smart meter technology adoption?","volume":"18","author":"Warkentin","year":"2017","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025090212072458300_b120-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/1540-4560.00072","article-title":"Social and political dimensions of privacy","volume":"59","author":"Westin","year":"2003","journal-title":"Journal of Social Issues"},{"issue":"2","key":"2025090212072458300_b121-02_ra_10_25300_misq_2024_16853","first-page":"79","article-title":"American attitudes on health care and privacy","volume":"28","author":"Westin","year":"2005","journal-title":"I-WAYS, Digest of Electronic Commerce Policy and Regulation"},{"key":"2025090212072458300_b122-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2014.00425","article-title":"The influence of empathic concern on prosocial behavior in children","volume":"5","author":"Williams","year":"2014","journal-title":"Frontiers in Psychology"},{"issue":"2","key":"2025090212072458300_b123-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"673","DOI":"10.25300\/misq\/2019\/12112","article-title":"Adoption of sustainable technologies: A mixed-methods study of German households","volume":"43","author":"Wunderlich","year":"2019","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025090212072458300_b124-02_ra_10_25300_misq_2024_16853","first-page":"xx","article-title":"Why privacy still matters","volume":"46","author":"Xu","year":"2022","journal-title":"MIS Quarterly"},{"issue":"10","key":"2025090212072458300_b125-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"7383","DOI":"10.1287\/mnsc.2021.4249","article-title":"From contextualizing to context theorizing: Assessing context effects in privacy research","volume":"68","author":"Xu","year":"2022","journal-title":"Management Science"},{"issue":"12","key":"2025090212072458300_b126-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: Linking individual perceptions with institutional privacy assurances","volume":"12","author":"Xu","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"2025090212072458300_b127-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"135","DOI":"10.2753\/mis0742-1222260305","article-title":"The role of push-pull technology in privacy calculus: The case of location-based services","volume":"26","author":"Xu","year":"2009","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"2025090212072458300_b128-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/07421222.2015.1063305","article-title":"Role of affect in self-disclosure on social network websites: A test of two competing models","volume":"32","author":"Yu","year":"2015","journal-title":"Journal of Management Information Systems"},{"key":"2025090212072458300_b129-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.09.011","article-title":"A meta-analysis to explore privacy cognition and information disclosure of internet users","volume":"51","author":"Yu","year":"2020","journal-title":"International Journal of Information Management"},{"key":"2025090212072458300_b130-02_ra_10_25300_misq_2024_16853","article-title":"A meta-analytic review of empirical research on online information privacy concerns: Antecedents, outcomes, and moderators","author":"Yun","year":"2014"},{"issue":"4","key":"2025090212072458300_b131-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1016\/j.im.2018.10.001","article-title":"A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs","volume":"56","author":"Yun","year":"2019","journal-title":"Information & Management"},{"issue":"1","key":"2025090212072458300_b132-02_ra_10_25300_misq_2024_16853","doi-asserted-by":"publisher","first-page":"491","DOI":"10.25300\/misq\/2022\/14861","article-title":"Peer privacy concern: Conceptualization and measurement","volume":"46","author":"Zhang","year":"2022","journal-title":"MIS Quarterly"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/49\/2\/429\/14563\/02_ra_10.25300_misq_2024_16853.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/49\/2\/429\/14563\/02_ra_10.25300_misq_2024_16853.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T16:07:35Z","timestamp":1756829255000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/49\/2\/429\/3179\/Privacy-Concerns-and-Data-Donations-Do-Societal"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,1]]},"references-count":133,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6,1]]},"published-print":{"date-parts":[[2025,6,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2024\/16853","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,1]]}}}