{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T02:30:47Z","timestamp":1773541847556,"version":"3.50.1"},"reference-count":86,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Faculty of Informatics and Statistics, Prague University of Economics and Business","award":["IGA\/A GC, OP RDE IGA\/A, CZ.02.2.69\/0.0\/0.0\/19_073\/0016936 and IGA F4\/5\/2021, ES409050 Social ties and interactions in online environment"],"award-info":[{"award-number":["IGA\/A GC, OP RDE IGA\/A, CZ.02.2.69\/0.0\/0.0\/19_073\/0016936 and IGA F4\/5\/2021, ES409050 Social ties and interactions in online environment"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The article deals with the topic of attention paid to online privacy policy statements by university students. Privacy policy statements were originally intended to mitigate the users\u2019 privacy con-cerns and support trust, but users disregard them. The article uses the theory of planned behav-iour combined with privacy calculus to find and verify determinants of reading privacy policy statements. We used the survey method and evaluated the results with partial least square struc-tural equation modelling. We concluded that the attitude towards reading privacy policy state-ments is influenced by privacy risks and privacy benefits. The intention to read privacy policy statements is influenced by social norms, understanding the privacy policy and mainly by the willingness to spend time and effort reading the statements. The effect of attitude was also signif-icant, but its size was smaller. Finally, wider conclusions are drawn, as the confusion around pri-vacy policy statements is a symptom of a wider social change in the information society.<\/jats:p>","DOI":"10.3390\/info12040144","type":"journal-article","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T16:01:57Z","timestamp":1617033717000},"page":"144","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Attention Paid to Privacy Policy Statements"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2514-1390","authenticated-orcid":false,"given":"Tom\u00e1\u0161","family":"Sigmund","sequence":"first","affiliation":[{"name":"Faculty of Informatics and Statistics, Prague University of Economics and Business, 130 67 Prague 3-\u017di\u017ekov, Czech Republic"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. (2019). Policy to avoid a privacy disaster. J. Assoc. Inf. Syst., 20.","DOI":"10.17705\/1jais.00554"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.jbusres.2016.08.007","article-title":"Factors influencing big data decision-making quality","volume":"70","author":"Janssen","year":"2017","journal-title":"J. Bus. Res."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1016\/j.jbusres.2015.07.001","article-title":"Big data consumer analytics and the transformation of marketing","volume":"69","author":"Erevelles","year":"2016","journal-title":"J. Bus. Res."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.giq.2015.11.007","article-title":"Big and open linked data (BOLD) in government: A challenge to transparency and privacy?","volume":"32","author":"Janssen","year":"2015","journal-title":"Gov. Inf. Q."},{"key":"ref_5","unstructured":"(2021, March 24). TRUSTe Smart Privacy for Smartphones: Understanding and Delivering the Protection Consumers Want. Available online: www.truste.com."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.giq.2016.08.011","article-title":"The challenges and limits of big data algorithms in technocratic governance","volume":"33","author":"Janssen","year":"2016","journal-title":"Gov. Inf. Q."},{"key":"ref_7","first-page":"96","article-title":"Customer data: Designing for transparency and trust","volume":"93","author":"Morey","year":"2015","journal-title":"Harv. Bus. Rev."},{"key":"ref_8","unstructured":"Drinkwater, D. (2021, March 24). Does a Data Breach Really affect Your Firm\u2019s Reputation. Available online: http:\/\/www.csoonline.com\/article\/3019283\/data-breach\/does-a-data-breach-reallyaffect-your-firm-s-reputation.html2016."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1057\/ejis.2014.41","article-title":"The Role of Privacy Assurance Mechanisms in Building Trust and the Moderating Role of Privacy Concern","volume":"24","author":"Bansal","year":"2015","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Inf. Syst. Res."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/07370020903586662","article-title":"Privacy, trust, and self-disclosure online","volume":"25","author":"Joinson","year":"2010","journal-title":"Hum.-Comput. Interact."},{"key":"ref_12","first-page":"798","article-title":"Information privacy concerns: Linking individual perceptions with institutional privacy assurances","volume":"12","author":"Xu","year":"2011","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.tele.2017.01.008","article-title":"Compliance to personal data protection principles: A study of how organizations frame privacy policy notices","volume":"34","author":"Chua","year":"2017","journal-title":"Telemat. Inform."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1108\/19355181200200001","article-title":"An examination of privacy policies in Fortune 500 Web sites","volume":"17","author":"Liu","year":"2002","journal-title":"Mid-Am. J. Bus."},{"key":"ref_15","unstructured":"Winn, J.K. (2006). The failure of fair information practice principles. Consumer Protection in the Age of the Information Economy, Ashgate Publishing."},{"key":"ref_16","first-page":"429","article-title":"The last best argument for eliminating reliance from express warranties: \u201cReal-world\u201d consumers don\u2019t read warranties","volume":"45","author":"Adler","year":"1994","journal-title":"South Carol. Law Rev."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","article-title":"The biggest lie on the Internet: Ignoring the privacy policies and terms of service policies of social networking services","volume":"23","author":"Obar","year":"2018","journal-title":"Inf. Commun. Soc."},{"key":"ref_18","unstructured":"Federal Trade Commission (2021, March 24). Protecting Consumer Privacy in an Era of Rapid Change. Federal Trade Commission Report. Available online: https:\/\/www.ftc.gov\/reports\/protecting-consumer-privacy-era-rapid-change-recommendations-businesses-policymakers."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1086\/674424","article-title":"Does anyone read the fine print? Consumer attention to standard-form contracts","volume":"43","author":"Bakos","year":"2014","journal-title":"J. Leg. Stud."},{"key":"ref_20","unstructured":"Barocas, S., and Nissenbaum, H.F. (2021, March 24). On Notice: The Trouble with Notice and Consent. Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information. Available online: https:\/\/ssrn.com\/abstract=2567409."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life, Bibliovault OAI Repository, the University of Chicago Press.","DOI":"10.1515\/9780804772891"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1093\/idpl\/ipt005","article-title":"Notice and consent in a world of Big Data","volume":"3","author":"Cate","year":"2013","journal-title":"Int. Data Priv. Law"},{"key":"ref_23","first-page":"1","article-title":"Privacy policy statements and consumer willingness to provide personal information","volume":"4","author":"Meinert","year":"2006","journal-title":"JECO"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","article-title":"Privacy Concerns and Consumer Willingness to Provide Personal Information","volume":"19","author":"Phelps","year":"2000","journal-title":"J. Public Policy Mark."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1287\/isre.1090.0260","article-title":"The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study","volume":"22","author":"Tsai","year":"2011","journal-title":"Inf. Syst. Res."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"153","DOI":"10.2753\/MIS0742-1222240406","article-title":"Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor","volume":"24","author":"Tang","year":"2008","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_27","first-page":"1027","article-title":"Against Notice Skepticism in Privacy (and Elsewhere)","volume":"87","author":"Calo","year":"2012","journal-title":"Notre Dame Law Rev."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Martin, K. (2013). Transaction Costs, Privacy, and Trust: The Laudable Goals and Ultimate Failure of Notice and Choice to Respect Privacy Online. First Monday, 18, Available online: http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/4838\/3802.","DOI":"10.5210\/fm.v18i12.4838"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1509\/jppm.2005.24.2.273","article-title":"In Poor Health: An Assessment of Privacy Policies at Direct-to-Consumer Web Sites","volume":"24","author":"Sheehan","year":"2005","journal-title":"J. Public Policy Mark."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1509\/jppm.25.2.238","article-title":"Longitudinal Assessment of Online Privacy Notice Readability","volume":"25","author":"Milner","year":"2006","journal-title":"J. Public Policy Mark."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"45","DOI":"10.4018\/jisp.2009010104","article-title":"Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce","volume":"3","author":"Nemati","year":"2009","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1509\/jppm.14.139","article-title":"Privacy Notices as Tabula Rasa: An Empirical Investigation into how Complying with a Privacy Notice is Related to Meeting Privacy Expectations Online","volume":"34","author":"Martin","year":"2015","journal-title":"J. Public Policy Mark."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1108\/MRR-04-2013-0085","article-title":"Information security awareness and behavior: A theory-based literature review","volume":"37","author":"Lebek","year":"2014","journal-title":"Manag. Res. Rev."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Processes."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1080\/08870446.2011.613995","article-title":"The theory of planned behavior: Reactions and reflections","volume":"26","author":"Ajzen","year":"2011","journal-title":"Psychol. Health"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Fishbein, M., and Ajzen, I. (2010). Predicting and Changing Behavior: The Reasoned Action, Taylor & Francis.","DOI":"10.4324\/9780203838020"},{"key":"ref_37","first-page":"733","article-title":"Mobile apps usage by Malaysian business undergraduates and postgraduates: Implications for consumer behaviour theory and marketing practice","volume":"26","author":"Carter","year":"2016","journal-title":"Int. Res."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.chb.2016.08.031","article-title":"Service co\u2013creation in social media: An extension of 649 the theory of planned behavior","volume":"65","author":"Cheung","year":"2016","journal-title":"Computers Hum. Behav."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1016\/j.chb.2016.07.046","article-title":"The effects of the self and social identity on the intention to microblog: An extension of the theory of planned behavior","volume":"64","author":"Jiang","year":"2016","journal-title":"Comput. Human Behav."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.chb.2016.03.078","article-title":"Predicting selfie-posting behavior on social networking sites: An extension of theory of planned behavior","volume":"62","author":"Kim","year":"2016","journal-title":"Comput. Human Behav."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1108\/10662241211214539","article-title":"Factors influencing consumption experience of mobile commerce: A study from experiential view","volume":"22","author":"Li","year":"2012","journal-title":"Internet Res."},{"key":"ref_42","unstructured":"Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Masur, P.K., and Scharkow, M. (2016). Disclosure management on social network sites: Individual privacy perceptions and user-directed privacy strategies. Soc. Media. Soc., 2.","DOI":"10.1177\/2056305116634368"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","volume":"1","author":"Culnan","year":"1999","journal-title":"Organ. Sci."},{"key":"ref_45","first-page":"1","article-title":"A Cross-Cultural Perspective on the Privacy Calculus","volume":"3","author":"Trepte","year":"2017","journal-title":"Soc. Media Soc."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1002\/dir.1019","article-title":"Antecedents and consequences of consumer privacy concerns: An empirical investigation","volume":"15","author":"Phelps","year":"2001","journal-title":"J. Interact. Mark."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.jbusres.2009.02.028","article-title":"Web site spill over to e-mail campaigns: The role of privacy, trust and shoppers attitudes","volume":"63","author":"Cases","year":"2010","journal-title":"J. Bus. Res.,"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","article-title":"Personalization versus privacy: An empirical examination of the online consumer\u2019s dilemma","volume":"6","author":"Chellappa","year":"2005","journal-title":"Inf. Technol. Manag."},{"key":"ref_49","unstructured":"Turow, J., and Nir, L. (2000). The Internet and the Family 2000: The View from Parents, the View from Kids, The Annenberg Public Policy Center."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1207\/s15506878jobem4901_6","article-title":"Teenagers\u2019 perception of online privacy and coping behaviors: A risk-benefit appraisal approach","volume":"1","author":"Youn","year":"2005","journal-title":"J. Broadcast. Electron. Media"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1023\/A:1022500626298","article-title":"The effect of organization-based self-esteem and deindividuation in protecting personal information privacy","volume":"4","author":"Hsu","year":"2003","journal-title":"J. Bus. Ethics"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1111\/j.1745-6606.2006.00071.x","article-title":"Promoting I-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behaviour","volume":"1","author":"LaRose","year":"2007","journal-title":"J. Consum. Aff."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1287\/isre.1100.0335","article-title":"The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information","volume":"22","author":"Anderson","year":"2011","journal-title":"Inf. Syst. Res."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","article-title":"The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online","volume":"49","author":"Bansal","year":"2010","journal-title":"Decis. Support Syst."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Inf. Syst. Res."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s12599-012-0216-6","article-title":"Self-disclosure and privacy calculus on social networking sites: The role of culture","volume":"4","author":"Krasnova","year":"2012","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2979\/esj.2006.4.3.25","article-title":"Privacy concerns and levels of information exchange: An empirical investigation of intended e-services","volume":"3","author":"Dinev","year":"2006","journal-title":"E\u2013Serv. J."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: A comparison of two theoretical models","volume":"8","author":"Davis","year":"1989","journal-title":"Manag. Sci."},{"key":"ref_59","first-page":"643","article-title":"Toward understanding and measuring the conditions of trust: Evolution of the conditions of trust inventory","volume":"17","author":"Butler","year":"1991","journal-title":"J. Manag."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","author":"Mayer","year":"1995","journal-title":"Acad. Manag. Rev."},{"key":"ref_61","first-page":"35","article-title":"An examination of the nature of trust in buyer-seller relationships","volume":"61","author":"Doney","year":"1997","journal-title":"J. Mark."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1108\/02635570610666403","article-title":"Consumer trust, perceived security, and privacy policy: Three basic elements of loyalty to a website","volume":"106","author":"Flavian","year":"2006","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_63","unstructured":"McKinsey Company (2021, March 08). TrueGen: Generation Z and Its Implications for Companies. Available online: https:\/\/www.mckinsey.de\/~\/media\/McKinsey\/Industries\/Consumer%20Packaged%20Goods\/Our%20Insights\/True%20Gen%20Generation%20Z%20and%20its%20implications%20for%20companies\/Generation-Z-and-its-implication-for-companies.pdf."},{"key":"ref_64","first-page":"210","article-title":"Adoption and usage of m-commerce: A cross-696 cultural comparison of Hong Kong and the United Kingdom","volume":"6","author":"Harris","year":"2005","journal-title":"J. Electron. Commer. Res."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic\u2013mail emotion\/adoption study","volume":"14","author":"Chin","year":"2003","journal-title":"Inf. Syst. Res."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"6058","DOI":"10.1016\/j.jbusres.2016.06.009","article-title":"The effect of apathetic motivation on employees\u2019 intentions to use social media for businesses","volume":"69","author":"Hansen","year":"2016","journal-title":"J. Bus. Res."},{"key":"ref_67","unstructured":"Wold, H.O., and J\u00f6reskog, K.G. (1982). Soft modeling: The basic design and some extensions. Systems under Indirect Observations, Part II, Elsevier Science Ltd."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Sinkovics, R.R., and Ghauri, P.N. (2009). The use of partial least squares path modelling in international marketing. Advances in International Marketing, Emerald.","DOI":"10.1108\/S1474-7979(2009)20"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0169-7439(01)00155-1","article-title":"PLS-regression: A basic tool of chemometrics","volume":"58","author":"Wold","year":"2001","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"ref_70","first-page":"407","article-title":"A Second Generation of Multivariate Analysis: Classification of Methods and Implications for Marketing Research","volume":"1","author":"Fornell","year":"1987","journal-title":"Rev. Mark."},{"key":"ref_71","first-page":"248","article-title":"The Assessment of Reliability","volume":"3","author":"Nunnally","year":"1994","journal-title":"Psychom. Theory"},{"key":"ref_72","unstructured":"Hair, J., Black, W., Babin, B., and Anderson, R. (2010). Multivariate Data Analysis: A Global Perspective. Pearson."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals\u2019 concerns about organizational practices","volume":"2","author":"Smith","year":"1996","journal-title":"MIS Q."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1037\/0021-9010.84.1.123","article-title":"The effect of the performance appraisal system on trust for management","volume":"1","author":"Mayer","year":"1999","journal-title":"J. Appl. Psychol."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1089\/cyber.2012.0041","article-title":"Ponnet Predicting Adolescents' Disclosure of Personal Information in Exchange for Commercial Incentives: An Application of an Extended Theory of Planned Behavior","volume":"16","author":"Heirman","year":"2013","journal-title":"Cyberpsychol. Beha. Soc. Netw."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1080\/00224545.2014.914881","article-title":"Predicting Facebook Users\u2019 Online Privacy Protection: Risk, Trust, Norm Focus Theory, and the Theory of Planned Behavior","volume":"154","author":"Saeri","year":"2014","journal-title":"J. Soc. Psychol."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1080\/10864415.2018.1564553","article-title":"Effects of Brand Awareness and Social Norms on User-Perceived Cyber Privacy Risk","volume":"23","author":"Wang","year":"2019","journal-title":"Int. J. Electron. Commer."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10551-014-2440-0","article-title":"Who Says There is an Intention\u2013Behaviour Gap? Assessing the Empirical Evidence of an Intention\u2013Behaviour Gap in Ethical Consumption","volume":"136","author":"Hassan","year":"2016","journal-title":"J. Bus. Ethics"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Katz, J.E., and Aakhus, M. (2002). Hyper-coordination via mobile phone in Norway. Perpetual Contact, Cambridge University Press.","DOI":"10.1017\/CBO9780511489471"},{"key":"ref_80","unstructured":"Postman, N. (1985). Amusing Ourselves to Death: Public Discourse in the Age of Show Business, Penguin."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Shrum (2012). The Psychology of Entertainment Media: Blurring the Lines between Entertainment and Persuasion, Routledge.","DOI":"10.4324\/9780203828588"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MIC.2017.75","article-title":"Designing effective privacy notices and controls","volume":"21","author":"Schaub","year":"2017","journal-title":"IEEE Int. Comput."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Turow, J., Hennessy, M., and Draper, N. (2015). The Tradeoff Fallacy: How Marketers Are Misrepresenting American Consumers and Opening Them Up to Exploitation, Tech. Rep.; Annenberg School for Communication, University of Pennsylvania.","DOI":"10.2139\/ssrn.2820060"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","author":"Acquisti","year":"2015","journal-title":"Science"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1111\/j.1083-6101.2007.00328.x","article-title":"Communication privacy management in electronic commerce","volume":"12","author":"Metzger","year":"2007","journal-title":"J. Comput.-Mediat. Commun."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1201\/1078\/43196.18.3.20010601\/31286.3","article-title":"Cookies and Web Bugs: What They are and How They Work Together","volume":"18","author":"Harding","year":"2001","journal-title":"Inf. Syst. Manag."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/4\/144\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:33:06Z","timestamp":1760362386000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/4\/144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,29]]},"references-count":86,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["info12040144"],"URL":"https:\/\/doi.org\/10.3390\/info12040144","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,29]]}}}