{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:50:06Z","timestamp":1768287006255,"version":"3.49.0"},"reference-count":62,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T00:00:00Z","timestamp":1568073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Evonik","award":["41012000350004"],"award-info":[{"award-number":["41012000350004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>Smart technology in the area of the Internet of Things (IoT) that extensively gathers user data in order to provide full functioning has become ubiquitous in our everyday life. At the workplace, individual\u2019s privacy is especially threatened by the deployment of smart monitoring technology due to unbalanced power relations. In this work we argue that employees\u2019 acceptance of smart monitoring systems can be predicted based on privacy calculus considerations and trust. Therefore, in an online experiment (N = 661) we examined employees\u2019 acceptance of a smart emergency detection system, depending on the rescue value of the system and whether the system\u2019s tracking is privacy-invading or privacy-preserving. We hypothesized that trust in the employer, perceived benefits and risks serve as predictors of system acceptance. Moreover, the moderating effect of privacy concerns is analyzed.<\/jats:p>","DOI":"10.3390\/informatics6030040","type":"journal-article","created":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T10:52:26Z","timestamp":1568112746000},"page":"40","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Acceptance of Smart Electronic Monitoring at Work as a Result of a Privacy Calculus Decision"],"prefix":"10.3390","volume":"6","author":[{"given":"Evgenia","family":"Princi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Applied Cognitive Science, Social Psychology: Media &amp; Communication, University of Duisburg-Essen, 47057 Duisburg, Germany"}]},{"given":"Nicole C.","family":"Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Applied Cognitive Science, Social Psychology: Media &amp; Communication, University of Duisburg-Essen, 47057 Duisburg, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2019,9,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"217","DOI":"10.3390\/jsan1030217","article-title":"Sensor mania! The internet of things, wearable computing, objective metrics, and the quantified self 2.0","volume":"1","author":"Swan","year":"2012","journal-title":"J. Sens. Actuator Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Dinev, T., Albano, V., Xu, H., D\u2019Atri, A., and Hart, P. (2016). Individuals\u2019 attitudes towards electronic health records: A privacy calculus perspective. Advances in Healthcare Informatics and Analytics, Springer.","DOI":"10.1007\/978-3-319-23294-2_2"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ermakova, T., Fabian, B., Bender, B., and Klimek, K. (2018, January 3\u20136). Web tracking\u2014A literature review on the state of research. Proceedings of the 51st Hawaii International Conference on System Sciences, Waikoloa Village, HI, USA.","DOI":"10.24251\/HICSS.2018.596"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1177\/0893318907306033","article-title":"Workplace surveillance and managing privacy boundaries","volume":"21","author":"Coopman","year":"2007","journal-title":"Manag. Commun. Q."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","volume":"10","author":"Culnan","year":"1999","journal-title":"Organ. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure, Suny Press.","DOI":"10.1353\/book4588"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/00236561003654776","article-title":"Workplace surveillance: An overview","volume":"51","author":"Ball","year":"2010","journal-title":"Labor Hist."},{"key":"ref_8","first-page":"1","article-title":"The political economy of trust","volume":"37","author":"Korczynski","year":"2002","journal-title":"J. Manag. Stud."},{"key":"ref_9","first-page":"1281","article-title":"The impact of trust in the news media on online news consumption and participation","volume":"5","author":"Fletcher","year":"2017","journal-title":"Digit. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1093\/jcmc\/zmy020","article-title":"Understanding the effects of personalization as a privacy calculus: Analyzing self-disclosure across health, news, and commerce contextst","volume":"23","author":"Bol","year":"2018","journal-title":"J. Comput. Mediat. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","article-title":"A survey of trust and reputation systems for online service provision","volume":"43","author":"Ismail","year":"2007","journal-title":"Decis. Support Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chang, S.E., Liu, A.Y., and Jang, Y.J. (2017, January 14\u201316). Exploring trust and information monitoring for information security management. Proceedings of the 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Shanghai, China.","DOI":"10.1109\/CISP-BMEI.2017.8302319"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Yildirim, H., and Ali-Eldin, A.M. (2018). A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci.","DOI":"10.1016\/j.jksuci.2018.03.001"},{"key":"ref_14","first-page":"897","article-title":"Predicting the adoption of location-based services: The role of trust and perceived privacy risk","volume":"71","author":"Xu","year":"2005","journal-title":"ICIS 2005 Proc."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/10864415.2001.11044235","article-title":"What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology","volume":"6","author":"McKnight","year":"2001","journal-title":"Int. J. Electron. Commer."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1111\/isj.12062","article-title":"Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus","volume":"25","author":"Kehr","year":"2015","journal-title":"Inf. Syst. J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1111\/jcc4.12163","article-title":"An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. sample","volume":"21","author":"Dienlin","year":"2016","journal-title":"J. Comput. Mediat. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MITP.2015.34","article-title":"Big data privacy in the internet of things era","volume":"17","author":"Perera","year":"2015","journal-title":"IT Prof."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Q."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Q."},{"key":"ref_21","unstructured":"Everet, M.R. (2003). Diffusion of Innovations, Free Press. [5th ed.]."},{"key":"ref_22","unstructured":"Huang, X., Fu, R., Chen, B., Zhang, T., and Roscoe, A. (2012, January 10\u201312). In User interactive internet of things privacy preserved access control. Proceedings of the 2012 International Conference for Internet Technology and Secured Transactions, IEEE, London, UK."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.cose.2013.05.007","article-title":"Anonymous authentication for privacy-preserving IoT target-driven applications","volume":"37","author":"Alcaide","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2009.47","article-title":"Castle: Continuously anonymizing data streams","volume":"8","author":"Cao","year":"2011","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Moore, P.V., Upchurch, M., and Whittaker, X. (2018). Humans and machines at work: Monitoring, surveillance and automation in contemporary capitalism. Humans and Machines at Work, Springer.","DOI":"10.1007\/978-3-319-58232-0"},{"key":"ref_26","first-page":"961","article-title":"The law and policy of people analytics","volume":"88","author":"Bodie","year":"2017","journal-title":"U. Colo. L. Rev."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Hoke, C., Leon, P.G., and Au, A. (2014). Are they worth reading? An in-depth analysis of online advertising companies\u2019 privacy policies. TPRC Conf. Pap., Available online: http:\/\/dx.doi.org\/10.2139\/ssrn.2418590.","DOI":"10.2139\/ssrn.2418590"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.procs.2014.08.051","article-title":"A Privacy policy comparison of health and fitness related mobile applications","volume":"37","author":"Rowan","year":"2014","journal-title":"Procedia Comput. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1111\/1468-2230.12357","article-title":"Workplace monitoring and the right to private life at work","volume":"81","author":"Atkinson","year":"2018","journal-title":"Mod. Law Rev."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Petronio, S. (2015). Communication privacy management theory. The International Encyclopedia of Interpersonal Communication, Oxford University Press.","DOI":"10.1002\/9781118540190.wbeic132"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sutanto, J., Palme, E., Tan, C.H., and Phang, C.W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. Mis Q., 1141\u20131164.","DOI":"10.25300\/MISQ\/2013\/37.4.07"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.clsr.2017.05.021","article-title":"The necessity of the implementation of privacy by design in sectors where data protection concerns arise","volume":"34","author":"Romanou","year":"2018","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCC.2016.28","article-title":"The quest for privacy in the internet of things","volume":"3","author":"Porambage","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1111\/j.1468-2885.2006.00271.x","article-title":"Who\u2019s watching us at work? Toward a structural? Perceptual model of electronic monitoring and surveillance in organizations","volume":"16","year":"2006","journal-title":"Commun. Theory"},{"key":"ref_35","first-page":"12","article-title":"Der \u201ePreis des Kostenlosen\u201d","volume":"4","author":"Wenninger","year":"2012","journal-title":"Wirtsch. Manag."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"J. Inf. Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","article-title":"Data linkage in smart internet of things systems: A consideration from a privacy perspective","volume":"56","author":"Zheng","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s10796-016-9667-5","article-title":"Privacy and biometrics: An empirical examination of employee concerns","volume":"20","author":"Carpenter","year":"2018","journal-title":"Inf. Syst. Front."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jretai.2014.09.005","article-title":"Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness","volume":"91","author":"Aguirre","year":"2015","journal-title":"J. Retail."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.chb.2017.09.034","article-title":"The smartphone as your follower: The role of smartphone literacy in the relation between privacy concerns, attitude and behaviour towards phone-embedded tracking","volume":"78","author":"Ketelaar","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1002\/ejsp.2049","article-title":"Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors","volume":"45","author":"Dienlin","year":"2015","journal-title":"Eur. J. Soc. Psychol."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Xu, H., Dinev, T., Smith, J., and Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst., 12, Available online: https:\/\/aisel.aisnet.org\/jais\/vol12\/iss12\/1\/.","DOI":"10.17705\/1jais.00281"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Inf. Syst. Res."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1207\/s15327906mbr0903_1","article-title":"Dimensions of privacy preferences","volume":"9","author":"Marshall","year":"1974","journal-title":"Multivar. Behav. Res."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1111\/j.1540-4560.1977.tb01883.x","article-title":"Privacy regulation: Culturally universal or culturally specific?","volume":"33","author":"Altman","year":"1977","journal-title":"J. Soc. Issues"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for E-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Inf. Syst. Res."},{"key":"ref_47","unstructured":"Trepte, S., and Masur, P.K. (2018, December 18). Privatheit im Wandel. Available online: https:\/\/www.uni-hohenheim.de\/fileadmin\/einrichtungen\/ psych\/Team_MP\/Berichte\/Bericht_-_Privatheit_im_Wandel_2014-06-18.pdf."},{"key":"ref_48","unstructured":"Krasnova, H., Hildebrand, T., and Guenther, O. (2009, January 15\u201318). Investigating the value of privacy on online social networks: Conjoint analysis. Proceedings of the Thirtieth International Conference on Information Systems, Phoenix, AZ, USA."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1016\/j.jbusres.2009.02.025","article-title":"Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns","volume":"63","author":"McCole","year":"2010","journal-title":"J. Bus. Res."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1108\/10662241211214575","article-title":"Impact of privacy concern in social networking web sites","volume":"22","author":"Tan","year":"2012","journal-title":"Internet Res."},{"key":"ref_51","first-page":"215","article-title":"Understanding the use of location-based service applications: Do privacy concerns matter?","volume":"14","author":"Yun","year":"2013","journal-title":"J. Electron. Commer. Res."},{"key":"ref_52","first-page":"9","article-title":"Guidelines for measuring trust in organizations","volume":"2003","author":"Paine","year":"2003","journal-title":"Inst. Public Relat."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals\u2019 concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Q."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1177\/1094428105285506","article-title":"Statistical and methodological myths and urban legends: Where, pray tell, did they get this idea?","volume":"9","author":"Vandenberg","year":"2006","journal-title":"Organ. Res. Methods"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1037\/0033-2909.97.3.562","article-title":"Application of confirmatory factor analysis to the study of self-concept: First and higher order factor models and their invariance across groups","volume":"97","author":"Marsh","year":"1985","journal-title":"Psychol. Bull."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives","volume":"6","author":"Hu","year":"1999","journal-title":"Struct. Equ. Model. Multidiscip. J."},{"key":"ref_57","first-page":"136","article-title":"Alternative ways of assessing model fit","volume":"154","author":"Browne","year":"1993","journal-title":"Sage Focus Ed."},{"key":"ref_58","unstructured":"Byrne, B. (2010). Structural Equation Modeling With AMOS: Basic Concepts, Applications, and Programming, Routledge\/Taylor & Francis Group. [2nd ed.]."},{"key":"ref_59","unstructured":"Hayes, A. (2013). Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach, Guilford Press."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1177\/0021943609333522","article-title":"The central role of communication in developing trust and its effect on employee involvement","volume":"46","author":"Thomas","year":"2009","journal-title":"J. Bus. Commun. (1973)"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.chb.2015.06.006","article-title":"Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences","volume":"52","author":"Sun","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_62","unstructured":"Wirth, J., Maier, C., and Laumer, S. (2018, January 23\u201328). The influence of resignation on the privacy calculus in the context of social networking sites: An empirical analysis. Proceedings of the European Conference on Information Systems 2018, Portsmouth, UK."}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/6\/3\/40\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:18:27Z","timestamp":1760188707000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/6\/3\/40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,10]]},"references-count":62,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["informatics6030040"],"URL":"https:\/\/doi.org\/10.3390\/informatics6030040","relation":{},"ISSN":["2227-9709"],"issn-type":[{"value":"2227-9709","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,10]]}}}