Options
Addressing the Privacy Paradox on the Organizational Level - Review and Future Directions
Journal
Management Review Quarterly
ISSN
2198-1620
Type
journal article
Date Issued
2021-09-09
Author(s)
Abstract
The discrepancy between informational privacy attitudes and actual behaviour of consumers is called the “privacy paradox”. Researchers across disciplines have formulated different theories on why consumers’ privacy concerns do not translate into increased protective behaviour. Over the past two decades multiple differing explanations for the paradox have been pub-lished. However, authors generally agree that companies are in a strong position to reduce consumers’ paradoxical behaviour by improving their customers’ informational privacy. Hence, this paper aims at answering the question: How can companies address the privacy paradox to improve their customers’ information privacy? Reviewing a sample of improve-ment recommendations from 138 papers that explore 41 theories in total, we determined that companies can generally align their privacy practices more closely with customers’ expectations across 4 interconnected managerial processes: (1) strategic initiatives, (2) structural improvements, (3) human resource management, and (4) service development. The findings of this systematic literature review detail how companies can address both the rational and irra-tional nature of the privacy decision-making process. Furthermore, we propose a dynamic model able to identify weaknesses and strengths in companies’ privacy orientation.
Language
English
Keywords
Privacy paradox
Information privacy
Privacy concern
Decision-making
Privacy strategy
Systematic literature review
HSG Classification
contribution to scientific community
HSG Profile Area
Global Center for Customer Insight
Refereed
Yes
Publisher
Springer Nature
Publisher place
Management Review Quarterly
Start page
1
End page
34
Pages
34
Division(s)
Contact Email Address
mauro.gotsch@unisg.ch
References
Acquisiti, A., & Grossklags, J. (2006). Privacy and Rationality: A Survey. In K. J. Strandburg & D. Stan Raicu (Eds.), Privacy and Technologies of Identity - A cross-disciplinary conversation (1st ed., pp. 15–30). New York: Springer.
Acquisti, A. (2004). Privacy in Electronic Commerce and the Economics of Immediate Gratification. Pre-Proceedings to EC’04, May 17-20, New York, 1–9.
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015, January 30). Privacy and human behavior in the age of information. Science, Vol. 347, pp. 509–514. https://doi.org/10.1126/science.aaa1465
Acquisti, A., Komanduri, S., Analytics, C., Leon, P. G., De Mexico, B., Schaub, F., … Sleeper, M. (2017). 44 Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online ACM Reference Format. ACM Computing Surveys, 50(3), 1–41. https://doi.org/10.1145/3054926
Acquisti, A., Taylor, C., & Wagman, L. (2016). The Economics of Privacy. Journal of Economic Literature, 54(2), 442–492. https://doi.org/10.1257/jel.54.2.442
Adjerid, I., Peer, E., & Acquisti, A. (2018). Beyond the privacy paradox: Objective versus relative risk in privacy decision making. MIS Quarterly: Management Information Systems, 42(2), 465–488. https://doi.org/10.25300/MISQ/2018/14316
Ahluwalia, R. (2008). How far can a brand stretch? Understanding the role of self-construal. Journal of Marketing Research, 45(3), 337–350. https://doi.org/10.1509/jmkr.45.3.337
Aivazpour, Z., Valecha, R., & Rao, R. H. (2017). Unpacking Privacy Paradox using Dual Process Theory Unpacking Privacy Paradox: A Dual Process Theory Approach. AMCIS 2017, 1–5. Boston.
Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50, 179–211. https://doi.org/10.1080/10410236.2018.1493416
Ajzen, I. (2011). Is Attitude Research Incompatible With the Compatibility Principle. In R. M. Arkin (Ed.), Most underappreciated: 50 prominent social psychologists describe their most unloved work (pp. 583–605). https://doi.org/10.1093/acprof:osobl/9780199778188.003.0029
Ajzen, I., & Fishbein, M. (1970). The prediction of behavior from attitudinal and normative variables. Journal of Experimental Social Psychology, 6(4), 466–487. https://doi.org/10.1016/0022-1031(70)90057-0
Ajzen, I., & Fishbein, M. (1977). Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research. Psychological Bulletin, 87(5), 888–918. https://doi.org/https://doi.org/10.1037/0033-2909.84.5.888
Alashoor, T., & Baskerville, R. (2015). The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity. Proceedings of the 22nd Americas Conference on Information Systems, 1–20. Fort Worth.
Alashoor, T., Han, S., & Joseph, R. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41, 62–96. https://doi.org/10.17705/1cais.04104
Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, California: Brooks/Cole Publishing Company.
Amiri, I., Wang, L., Levy, Y., & Hur, I. (2018). An Empirical Study on the Factors Contributing to Disclosing Personal Information Online: Insecurity in the Digital Age. Twenty-Fourth Americas Conference on Information Systems, 1–10. New Orleans.
Anhalt-Depies, C., Stenglein, J. L., Zuckerberg, B., Townsend, P. M., & Rissman, A. R. (2019). Tradeoffs and tools for data quality, privacy, transparency, and trust in citizen science. Biological Conservation, 238, 1–7. https://doi.org/10.1016/j.biocon.2019.108195
Argote, L., McEvily, B., & Reagans, R. (2003). Managing knowledge in organizations: An integrative framework and review of emerging themes. Management Science, 49(4), 571–582. https://doi.org/10.1287/mnsc.49.4.571.14424
Auxier, B. Y. B., Rainie, L., Anderson, M., Perrin, A., Kumar, M., & Turner, E. (2019). Americans and Privacy: Concerned, Confused, and Feeling a Lack of Control Over Their Personal Information. Pew Research Center, (November), 1–63.
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly: Management Information Systems, 30(1), 13–28. https://doi.org/10.2307/25148715
Bandara, R., Fernando, M., & Akter, S. (2017). The Privacy Paradox in the Data-Driven Marketplace: The Role of Knowledge Deficiency and Psychological Distance. In C. / P. / CENTERIS - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist - International Conference on Health and Social Care Information Systems and Technologies (Ed.), Procedia Computer Science (Vol. 121, pp. 562–567). https://doi.org/10.1016/j.procs.2017.11.074
Bandara, W., Furtmueller, E., Gorbacheva, E., Miskon, S., & Beekhuyzen, J. (2015). Achieving Rigor in Literature Reviews: Insights from Qualitative Data Analysis and Tool-Support. Communications of the Association for Information Systems, 34, 154–204. https://doi.org/https://doi.org/10.17705/1CAIS.03708
Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information and Management, 53(1), 1–21. https://doi.org/10.1016/j.im.2015.08.001
Baracaldo, N., López, C., Anwar, M., & Lewis, M. (2011). Simulating the effect of privacy concerns in online social networks. Proceedings of the 2011 IEEE International Conference on Information Reuse and Integration, IRI 2011, 519–524. https://doi.org/10.1109/IRI.2011.6009609
Barnes, S. B. (2006). A privacy paradox: Social Networking in the United States. First Monday, 11(9). https://doi.org/https://doi.org/10.5210/fm.v11i9.1394
Barocas, S., & Nissenbaum, H. (2009). On Notice: The Trouble with Notice and Consent. Engag. Data Forum First Int. Forum Appl. Manag. Pers. Electron. Inf., 1–6.
Barocas, S., & Nissenbaum, H. (2014). Computing Ethics: Big Data’s End Run Around Procedural Privacy Protections Recognizing the inherent limitations of consent and anonymity. Communications of the ACM, 57(11), 31–33. https://doi.org/10.1145/2668897
Barth, S., & de Jong, M. D. T. (2017). The Privacy Paradox - Investigating Discrepancies between Expressed Privacy Concerns and Actual Online Behavior - A Systematic Literature Review. Telematics and Informatics, 34, 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication, 67(1), 26–53. https://doi.org/10.1111/jcom.12276
Bauer, A., Reiner, G., & Schamschule, R. (2000). Organizational and quality systems development: An analysis via a dynamic simulation model. Total Quality Management, 11(4–6), 410–416. https://doi.org/10.1080/09544120050007715
Bauer, C., & Lasinger, P. (2014). Adaptation strategies to increase advertisement effectiveness in digital media. Management Review Quarterly, 64, 101–124. https://doi.org/10.1007/s11301-014-0101-0
Bauer, C., & Strauss, C. (2016). Location-based advertising on mobile devices A literature review and analysis. Management Review Quarterly, 66, 159–194. https://doi.org/10.1007/s11301-015-0118-z
Baxter, L., Braithwaite, D., Petronio, S., & Durham, W. T. (2014). Communication Privacy Management Theory: Significance for Interpersonal Communication. In Engaging Theories in Interpersonal Communication: Multiple Perspectives (pp. 309–322). https://doi.org/10.4135/9781483329529.n23
Becker, B., & Gerhart, B. (1996). The impact of human resource management on organizational performance: Progress and prospects. Academy of Management Journal, 39(4), 779–801. https://doi.org/10.2307/256712
Becker, M., Klausing, S., & Hess, T. (2019). Uncovering the privacy paradox: The influence of distraction on data disclosure decisions. ECIS 2019, 5–15. Retrieved from https://aisel.aisnet.org/ecis2019_rip/69
Beke, F. T., Eggers, F., & Verhoef, P. C. (2018). Consumer Informational Privacy: Current Knowledge and Research Directions. In Foundations and Trends in Marketing (Vol. 11). https://doi.org/10.1561/1700000057
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly: Management Information Systems, Vol. 35, pp. 1017–1041. https://doi.org/10.2307/41409971
Bickelmann, J. (2021, January 24). Sag mir, wo du schreibst. Der Tagesspiegel, p. 18.
Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2018). Exploring Motivations for Online Privacy Protection Behavior: Insights From Panel Data. Communication Research, 00(0), 1–25. https://doi.org/10.1177/0093650218800915
Brinberg, D., & Wood, R. (1983). A Resource Exchange Theory of Consumer Behavior. Journal of Consumer Research, 10(3), 330–339.
Brough, A. R., & Martin, K. D. (2020, February 1). Critical roles of knowledge and motivation in privacy research. Current Opinion in Psychology, Vol. 31, pp. 11–15. https://doi.org/10.1016/j.copsyc.2019.06.021
Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. M. (2020). Asymmetrical third-person effects on the perceptions of online risk and harm among adolescents and adults. Behaviour and Information Technology, 0(0), 1–11. https://doi.org/10.1080/0144929X.2020.1742380
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2017). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. In MIS Quarterly (Vol. 34). https://doi.org/10.2307/25750690
Campbell, J., Greenauer, N., Macaluso, K., & End, C. (2007). Unrealistic optimism in internet events. Computers in Human Behavior, 23(3), 1273–1284. https://doi.org/10.1016/j.chb.2004.12.005
Casadesus-Masanell, R., & Hervas-Drane, A. (2015). Competing with privacy. Management Science, 61(1), 229–246. https://doi.org/10.1287/mnsc.2014.2023
Cate, F. H., & Mayer-Schönberger, V. (2013). Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73.
Chang, C. W., & Heo, J. (2014). Visiting theories that predict college students’ self-disclosure on Facebook. Computers in Human Behavior, 30, 79–86. https://doi.org/10.1016/j.chb.2013.07.059
Chen, H., & Atkin, D. (2020). Understanding third-person perception about Internet privacy risks. New Media & Society, 0(0), 1–19. https://doi.org/10.1177/1461444820902103
Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/10.1016/j.chb.2017.01.003
Child, J. T., Haridakis, P. M., & Petronio, S. (2012). Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use. Computers in Human Behavior, 28(5), 1859–1872. https://doi.org/10.1016/j.chb.2012.05.004
Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure. Journal of the American Society for Information Science and Technology, 60(10), 2079–2094. https://doi.org/10.1002/asi.21122
Cho, H., Lee, J. S., & Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987–995. https://doi.org/10.1016/j.chb.2010.02.012
Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42–51. https://doi.org/10.1016/j.chb.2017.12.001
Citron, D. K. (2009). Cyber Civil Rights. Boston University Law Review, 89(1), 61–126.
Clemons, E. K., Wilson, J., & Jin, F. (2014). Investigations into Consumers Preferences Concerning Privacy: An Initial Step Towards the Development of Modern and Consistent Privacy Protections Around the Globe. In IEEE (Ed.), 47th Hawaii International Conference on System Science (pp. 4083–4092). https://doi.org/10.1109/HICSS.2014.504
Conners, J. L. (2005). Understanding the Third-Person Effect . Communication Research Trends, 24(2–3), 3–22. Retrieved from http://cscc.scu.edu
Coopamootoo, K. P. L., & Groß, T. (2014). Mental models for usable privacy: A position paper. Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, 8533, 410–421. https://doi.org/10.1007/978-3-319-07620-1_36
Culnan, M. J. (1993). “How Did They Get My Name?”: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. In MIS Quarterly (Vol. 17).
Davison, W. P. (1983). The Third-Person Effect in Communication. The Public Opinion Quarterly, 47(1), 1–15.
De Wolf, R., & Pierson, J. (2014). Who’s my audience again? Understanding audience management strategies for designing privacy management technologies. Telematics and Informatics, 31(4), 607–616. https://doi.org/10.1016/j.tele.2013.11.004
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication, 15(1), 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
Dehghanpouri, H., Soltani, Z., & Rostamzadeh, R. (2020). The impact of trust, privacy and quality of service on the success of E-CRM: the mediating role of customer satisfaction. Journal of Business & Industrial Marketing, 1–17. https://doi.org/10.1108/JBIM-07-2019-0325
Demmers, J., van Dolen, W. M., Weltevreden, J. W., & van Dolen, M. (2018). Handling Consumer Messages on Social Networking Sites: Customer Service or Privacy Infringement? International Journal of Electronic Commerce, 22(1), 8–35. https://doi.org/10.1080/10864415.2018.1396110
DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121–147. https://doi.org/10.1287/orsc.5.2.121
Dienlin, T., & Metzger, M. J. (2016). An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample. Journal of Computer-Mediated Communication, 21(5), 368–383. https://doi.org/10.1111/jcc4.12163
Dienlin, T., & Trepte, S. (2015). Putting the Social (Psychology) into Social Media: Is the Privacy Paradox a Relic of the Past? An In-depth Analysis of Privacy Attitudes and Privacy Behaviors. European Journal of Social Psychology, 45(3), 285–297. https://doi.org/10.1002/ejsp.2038
Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
Dinev, T., Mcconnell, A. R., & Smith, H. J. (2015). Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box. Information Systems Research, 26(4), 639–655. https://doi.org/10.1287/isre.2015.0600
Dinev, T., Xu, H., & Smith, H. J. (2009). Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy. Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 1–10. https://doi.org/10.1109/HICSS.2009.255
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2012). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22, 295–316. https://doi.org/10.1057/ejis.2012.23
Dunbar, R. I. M. (2004). Gossip in evolutionary perspective. Review of General Psychology, 8(2), 100–110. https://doi.org/10.1037/1089-2680.8.2.100
Dwyer, C., Hiltz, S. R., Poole, M. S., Gußner, J., Hennig, F., Osswald, S., … Warth, B. (2010). Developing reliable measures of privacy management within social networking sites. Proceedings of the Annual Hawaii International Conference on System Sciences, 1–10. https://doi.org/10.1109/HICSS.2010.146
Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886. https://doi.org/10.1016/j.jbusres.2006.02.006
Egelman, S., Felt, A. P., & Wagner, D. (2013). Choice Architecture and Smartphone Privacy: There’s A Price for That. In R. Böhme (Ed.), The Economics of Information Security and Privacy (pp. 211–236). Berlin: Springer.
Emler, N. (1994). Gossip, reputation, and social adaptation. In R. F. Goodman & A. Ben-Ze’ev (Eds.), Good Gossip (pp. 215–237).
Fazzini, K. (2019). Apple’s big bet on privacy has risks. Retrieved June 3, 2020, from CNBC website: https://www.cnbc.com/2019/01/10/apple-privacy-big-bet-risks.html
Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: The influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219–229. https://doi.org/10.1108/08876041011040622
Feinberg, M., Willer, R., Stellar, J., & Keltner, D. (2012). The virtues of gossip: Reputational information sharing as prosocial behavior. Journal of Personality and Social Psychology, 102(5), 1015–1030. https://doi.org/10.1037/a0026650
Feng, Y., & Xie, Q. (2019). Privacy Concerns, Perceived Intrusiveness, and Privacy Controls: An Analysis of Virtual Try-On Apps. Journal of Interactive Advertising, 19(1), 43–57. https://doi.org/10.1080/15252019.2018.1521317
Flender, C., & Müller, G. (2012). Type indeterminacy in privacy decisions: The privacy paradox revisited. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7620 LNCS, 148–159. https://doi.org/10.1007/978-3-642-35659-9_14
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A Meta-Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology, 30(2), 407–429.
Forrester, J. W. (1968). Industrial Dynamics—After the First Decade. Management Science, 14(7), 398–415. https://doi.org/10.1287/mnsc.14.7.398
Foster, E. K. (2004). Research on Gossip: Taxonomy, Methods, and Future Directions. Review of General Psychology, 8(2), 78–99. https://doi.org/10.1037/1089-2680.8.2.78
Freudiger, J., Rane, S., Brito, A. E., & Uzun, E. (2014). Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing. WISCS ’14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 21–29. https://doi.org/10.1145/2663876.2663885
Gambino, A., Kim, J., Sundar, S. S., Ge, J., & Rosson, M. B. (2016). User disbelief in privacy paradox: Heuristics that determine disclosure. Conference on Human Factors in Computing Systems - Proceedings, 07-12-May, 2837–2843. https://doi.org/10.1145/2851581.2892413
George, J. F. (2004). The theory of planned behavior and Internet purchasing. Internet Research, 14(3), 198–212. https://doi.org/10.1108/10662240410542634
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers and Security, 77, 226–261. https://doi.org/10.1016/j.cose.2018.04.002
Giddens, A. (1984). The Constitution of Society: Outline of the Theory of Structuration. Oakland: University of California Press.
Ginosar, A., & Ariel, Y. (2017). An analytical framework for online privacy research: What is missing? Information & Management, 54(7), 948–957. https://doi.org/10.1016/j.im.2017.02.004
Gioia, D. A., Corley, K. G., & Hamilton, A. L. (2013). Seeking Qualitative Rigor in Inductive Research: Notes on the Gioia Methodology. Organizational Research Methods, 16(1), 15–31. https://doi.org/10.1177/1094428112452151
Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge Management: An Organizational Capabilities Perspective. Journal of Management Information Systems, 18(1), 185–214. https://doi.org/10.1080/07421222.2001.11045669
Greenaway, K. E., & Chan, Y. E. (2005). Theoretical Explanations for Firms’ Information Privacy Behaviors. Journal of the Association for Information Systems, 6(6), 171–198. https://doi.org/10.17705/1jais.00068
Gunther, R. E. (2009). Peter Drucker-the grandfather of marketing: an interview with Dr. Philip Kotler. Journal of the Academy of Marketing Science, 37, 17–19. https://doi.org/10.1007/s11747-008-0105-1
Guo, X., Zhang, X., & Sun, Y. (2016). The privacy–personalization paradox in mHealth services acceptance of different age groups. Electronic Commerce Research and Applications, 16, 55–65. https://doi.org/10.1016/j.elerap.2015.11.001
Hallam, C., & Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217–227. https://doi.org/10.1016/j.chb.2016.11.033
Ham, C. D., & Nelson, M. R. (2016). The role of persuasion knowledge, assessment of benefit and harm, and third-person perception in coping with online behavioral advertising. Computers in Human Behavior, 62, 689–702. https://doi.org/10.1016/j.chb.2016.03.076
Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. L. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. Journal of Management Information Systems, 24(2), 13–42. https://doi.org/10.2753/MIS0742-1222240202
Harsanyi, J. C. (1967). Games with Incomplete Information Played by “Bayesian” Players, I–III Part I. The Basic Model. Management Science, 14(3), 159–182. https://doi.org/10.1287/mnsc.14.3.159
Heravi, A., Mubarak, S., & Raymond Choo, K. K. (2018). Information privacy in online social networks: Uses and gratification perspective. Computers in Human Behavior, 84, 441–459. https://doi.org/10.1016/j.chb.2018.03.016
Hermalin, B. E., & Katz, M. L. (2006). Privacy, property rights and efficiency: The economics of privacy as secrecy. Quant Market Econ, 4, 209–239. https://doi.org/10.1007/s11129-005-9004-7
Hruschka, D. J., Schwartz, D., St.john, D. C., Picone-Decaro, E., Jenkins, R. A., & Carey, J. W. (2004). Reliability in Coding Open-Ended Data: Lessons Learned from HIV Behavioral Research. Field Methods, 16(3), 307–331. https://doi.org/10.1177/1525822X04266540
Hsu, M.-H., & Kuo, F.-Y. (2003). The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy. Journal of Business Ethics, 42(4), 305–320.
Hu, Q., & Ma, S. (2010). Does Privacy Still Matter in the Era of Web 2.0? A Qualitative Study of User Behavior towards Online Social Networking Activities. PACIS 2010, 591–602.
Huang, H. Y., & Bashir, M. (2020). “Seeking Privacy Makes Me Feel Bad?”: An Exploratory Study Examining Emotional Impact on Use of Privacy-Enhancing Features. Advances in Intelligent Systems and Computing, 1129 AISC, 600–617. https://doi.org/10.1007/978-3-030-39445-5_44
Hui, K., Teo, H. H., & Lee, S.-Y. T. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly, 31(1), 19–33.
Hull, G. (2015). Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data. Ethics and Information Technology, 17, 89–101. https://doi.org/10.1007/s10676-015-9363-z
Inman, J. J., & Nikolova, H. (2017). Shopper-Facing Retail Technology: A Retailer Adoption Decision Framework Incorporating Shopper Attitudes and Privacy Concerns. Journal of Retailing, 93(1), 7–28. https://doi.org/10.1016/j.jretai.2016.12.006
James, T. L., Nottingham, Q., Collignon, S. E., Warkentin, M., & Ziegelmayer, J. L. (2015). The interpersonal privacy identity (IPI): development of a privacy as control model. Information Technology and Management, 17, 341–360. https://doi.org/10.1007/s10799-015-0246-0
Jiang, Z., Suang Heng, C., & F Choi, B. C. (2013). Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions. Information Systems Research, 24(3), 579–595. https://doi.org/10.1287/isre.1120.0441
Kahneman, D. (2003). A Perspective on Judgment and Choice: Mapping Bounded Rationality. American Psychologist, 58(9), 697–720. https://doi.org/10.1037/0003-066X.58.9.697
Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263–292.
Karwatzki, S., Dytynko, O., Trenz, M., & Veit, D. (2017). Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization. Journal of Management Information Systems, 34(2), 369–400. https://doi.org/10.1080/07421222.2017.1334467
Katz, E., Blumler, J. G., & Gurevitch, M. (1973). Uses and Gratifications Research. The Public Opinion Quarterly, 37(4), 509–523.
Kayhan, V. O., & Davis, C. J. (2016). Situational privacy concerns and antecedent factors. Journal of Computer Information Systems, 56(3), 228–237. https://doi.org/10.1080/08874417.2016.1153913
Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607–635. https://doi.org/10.1111/isj.12062
Keith, M. J., Babb, J. S., & Lowry, P. B. (2014). A longitudinal study of information privacy on mobile devices. Proceedings of the Annual Hawaii International Conference on System Sciences, 3149–3158. https://doi.org/10.1109/HICSS.2014.391
Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., & Abdullat, A. (2015). The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal, 25(6), 637–667. https://doi.org/10.1111/isj.12082
Keith, M. J., Thompson, S. C., Hale, J. E., & Greer, C. (2012). Examining the Rationality of Information Disclosure throught Mobile Devices. Proceedings of the 33rd International Conference on Information Systems, 1–17. Orlando.
Kim, S.-Y. (2018). Intercoder Reliability Techniques: Cohen’s Kappa. In M. Allen (Ed.), The SAGE Encyclopedia of Communication Research Methods (pp. 736–738). https://doi.org/10.4135/9781483381411
Kim, T., Barasz, K., & John, L. K. (2019). Why am i seeing this ad? The effect of ad transparency on ad effectiveness. Journal of Consumer Research, 45(5), 906–932. https://doi.org/10.1093/jcr/ucy039
Kitchenham, B., & Charters, S. (2007). Guidelines for performing Systematic Literature Reviews in Software Engineering. Keele University and Durham University Joint Report, 1–65.
Kitkowska, A., Shulman, Y., Martucci, L. A., & Wästlund, E. (2020). Psychological Effects and Their Role in Online Privacy Interactions: A Review. IEEE Access, 8, 21236–21260. https://doi.org/10.1109/ACCESS.2020.2969562
Kitkowska, A., Wästlund, E., Martucci, L. A., Warner, M., & Shulman, Y. (2020). Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. Sixteenth Symposium on Usable Privacy and Security, 437–456. USENIX Association.
Klopfer, P. H., & Rubenstein, D. I. (1977). The Concept Privacy and Its Biological Basis. Journal of Social Issues, 33(3), 52–65. https://doi.org/10.1111/j.1540-4560.1977.tb01882.x
Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers and Security, 64(November), 122–134. https://doi.org/10.1016/j.cose.2015.07.002
Krafft, M., Arden, C. M., & Verhoef, P. C. (2017). Permission Marketing and Privacy Concerns — Why Do Customers (Not) Grant Permissions? Journal of Interactive Marketing, 39, 39–54. https://doi.org/10.1016/j.intmar.2017.03.001
Krämer, N. C., & Haferkamp, N. (2011). Online Self-Presentation: Balancing Privacy Concerns and Impression Construction on Social Networking Sites. In Privacy Online (pp. 127–141). https://doi.org/10.1007/978-3-642-21521-6_10
Kuckertz, A., & Block, J. (2021). Reviewing systematic literature reviews: ten key questions and criteria for reviewers. Management Review Quarterly 2021, 1–6. https://doi.org/10.1007/S11301-021-00228-7
Lai, C.-Y., Liang, T.-P., & Hui, K.-L. (2018). Information Privacy Paradox: A Neural Science Study. PACIS 2018, 247–255. Retrieved from https://aisel.aisnet.org/pacis2018/247
Lanier, C. D., & Saini, A. (2008). Understanding Consumer Privacy: A Review and Future Directions. Academy of Marketing Science Review, 12(1), 1–48.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a Social Issue and Behavioural Concept. Journal of Social Issues, 33(3), 22–41.
Lee, S.-B., Fan, L., Lee, S.-C., & Suh, Y.-H. (2012). Effects of Self-Presentation and Privacy Concern on an Individual’s Self-Disclosure : An Empirical Study on Twitter. Korean Management Science Review, 29(2), 1–20. https://doi.org/10.7737/kmsr.2012.29.2.001
Lemon, K. N., & Verhoef, P. C. (2016). Understanding Customer Experience Throughout the Customer Journey. Journal of Marketing, 80, 69–96. https://doi.org/10.1509/jm.15.0420
Leonard, D., & McAdam, R. (2004). Total quality management in strategy and operations: Dynamic grounded models. Journal of Manufacturing Technology Management, 15(3), 254–266. https://doi.org/10.1108/17410380410523489
Lutz, C., & Strathoff, P. (2014). Privacy Concerns and Online Behavior Not so Paradoxical after All? Viewing the Privacy Paradox Through Different Theoretical Lenses. In S. Brändli (Ed.), Multinationale Unternehmen und Institutionen im Wandel - Herausforderungen für Wirtschaft, Recht und Gesellschaft (pp. 81–99). https://doi.org/10.2139/ssrn.2425132
Lwin, M. O., & Williams, J. D. (2003). A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online. Marketing Letters, 14(4), 257–272.
Malhotra, A., & Malhotra, C. K. (2011). Evaluating Customer Information Breaches as Service Failures: An Event Study Approach. Journal of Service Research, 14(1), 44–59. https://doi.org/10.1177/1094670510383409
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
Mao, Y. (2018). Intercoder Reliability Techniques: Holsti Method . In M. Allen (Ed.), The SAGE Encyclopedia of Communication Research Methods (1st ed., pp. 741–743). https://doi.org/10.4135/9781483381411
Marmion, V., Bishop, F., Millard, D. E., & Stevenage, S. V. (2017). The cognitive heuristics behind disclosure decisions. International Conference on Social Informatics, 10539 LNCS, 591–607. https://doi.org/10.1007/978-3-319-67217-5_35
Martin, K. (2020). Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms. Business Ethics Quarterly, 30(1), 65–96. https://doi.org/10.1017/beq.2019.24
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data Privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81(1), 36–58. https://doi.org/10.1509/jm.15.0497
Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45(2), 135–155. https://doi.org/10.1007/s11747-016-0495-4
Matz, S. C., Appel, R. E., & Kosinski, M. (2020). Privacy in the age of psychological targeting. Current Opinion in Psychology, 31(2), 116–121. https://doi.org/10.1016/j.copsyc.2019.08.010
Mcneely, C. L., & Hahm, J. on. (2014). The big (data) bang: Policy, prospects, and challenges. Review of Policy Research, 31(4), 304–310. https://doi.org/10.1111/ropr.12082
Metzger, M. J., & Suh, J. J. (2017). Comparative Optimism About Privacy Risks on Facebook. Journal of Communication, 67(2), 203–232. https://doi.org/10.1111/jcom.12290
Meynhardt, T. (2009). Public Value Inside: What is Public Value Creation? International Journal of Public Administration, 32(3–4), 192–219. https://doi.org/10.1080/01900690902732632
Michler, O., Decker, R., & Stummer, C. (2020). To trust or not to trust smart consumer products: a literature review of trust-building factors. Management Review Quarterly, 70, 391–420. https://doi.org/10.1007/s11301-019-00171-8
Milne, G. R., & Bahl, S. (2010). Are There Differences Between Consumers’ and Marketers’ Privacy Expectations? A Segment- and Technology-Level Analysis. In Journal of Public Policy & Marketing (Vol. 29).
Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an Understanding of the Online Consumer’s Risky Behavior and Protection Practices. Journal of Consumer Affairs, 43(3), 449–473. https://doi.org/10.1111/j.1745-6606.2009.01148.x
Mohassel, P., & Zhang, Y. (2017). SecureML: A System for Scalable Privacy-Preserving Machine Learning. 2017 IEEE Symposium on Security and Privacy, 19–38. https://doi.org/10.1109/SP.2017.12
Morey, T., & Krajecki, K. (2016). Personalisation, data and trust: The role of brand in a data-driven, personalised, experience economy. Journal of Brand Strategy, 5(2), 178–185.
Morgan, R. M., & Hunt, S. D. (1994). The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing, 58(3), 20–38.
Morlok, T. (2016). Sharing is (not) caring - The role of external privacy in users’ information disclosure behaviors on social network sites. PACIS, 75–92. Retrieved from http://aisel.aisnet.org/pacis2016/75
Mosteller, J., & Poddar, A. (2017). To Share and Protect: Using Regulatory Focus Theory to Examine the Privacy Paradox of Consumers’ Social Media Engagement and Online Privacy Protection Behaviors. Journal of Interactive Marketing. https://doi.org/10.1016/j.intmar.2017.02.003
Mothersbaugh, D. L., Foxx Ii, W. K., Beatty, S. E., & Wang, S. (2012). Disclosure Antecedents in an Online Service Context: The Role of Sensitivity of Information Background Disclosure and Disclosure Antecedents. Journal of Service Research, 15(1), 76–98. https://doi.org/10.1177/1094670511424924
Mourey, J. A., & Waldman, A. E. (2020). Past the Privacy Paradox: The Importance of Privacy Changes as a Function of Control & Complexity. Journal of the Association for Consumer Research, 5(2), 1–38. https://doi.org/https://doi.org/10.1086/708034
Mukherjee, A., & Nath, P. (2007). Role of electronic trust in online retailing A re-examination of the commitment-trust theory. European Journal of Marketing, 41(9/10), 1173–1202. https://doi.org/10.1108/03090560710773390
Mullen, C., & Fox Hamilton, N. (2016). Adolescents’ response to parental Facebook friend requests: The comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Computers in Human Behavior, 60, 165–172. https://doi.org/10.1016/j.chb.2016.02.026
Nissenbaum, H. (2010). Privacy in Context Technology, Policy, and the Integrity of Social Life. In Privacy in Context. Stanford: Stanford University Press.
Norberg, P. A., & Horne, D. R. (2007). Privacy attitudes and privacy-related behavior. Psychology & Marketing, 24(10), 829–847. https://doi.org/10.1002/mar.20186
Nouh, M., Almaatouq, A., Alabdulkareem, A., Singh, V. K., Shmueli, E., Alsaleh, M., … Pentland, A. (2014). Social information leakage: Effects of awareness and peer pressure on user behavior. Proceedings of the 16th International Conference on Human-Computer Interaction, 8533, 352–360. https://doi.org/10.1007/978-3-319-07620-1_31
Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Direct Marketing, 9(3), 46–60. https://doi.org/10.1002/(SICI)1522-7138(199723)11:43.0.CO;2-F
Oetzel, M. C., & Gonja, T. (2011). The online privacy paradox: A social representations perspective. Conference on Human Factors in Computing Systems - Proceedings, 2107–2112. https://doi.org/10.1145/1979742.1979887
Okoli, C. (2015). A Guide to Conducting a Standalone Systematic Literature Review. Communications of the Association for Information Systems, 37(43), 879–910.
Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, (6), 642–660. https://doi.org/10.1057/s41303-017-0056-z
Palmatier, R. W., & Martin, K. D. (2019). The Intelligent Marketer’s Guide to Data Privacy. Basingstoke: palgrave macmillan.
Paradise, A., & Sullivan, M. (2012). (In)Visible Threats? The third-person effect in perceptions of the influence of facebook. Cyberpsychology, Behavior, and Social Networking, 15(1), 55–60. https://doi.org/10.1089/cyber.2011.0054
Park, Y. J., Chung, J. E., & Shin, D. H. (2018). The Structuration of Digital Ecosystem, Privacy, and Big Data Intelligence. American Behavioral Scientist, 62(10), 1319–1337. https://doi.org/10.1177/0002764218787863
Pavlou, P. A. (2011). State of the information privacy literature: where are we now and where should we go? MIS Quarterly, 35(4), 977–988.
Petronio, S. (2010). Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation? Journal of Family Theory & Review, 2(3), 175–196. https://doi.org/10.1111/j.1756-2589.2010.00052.x
Petronio, S. (2013). Brief Status Report on Communication Privacy Management Theory. Journal of Family Communication, 13(1), 6–14. https://doi.org/10.1080/15267431.2013.743426
Petronio, S., & Child, J. T. (2020). Conceptualization and operationalization: utility of communication privacy management theory. Current Opinion in Psychology, 31(2), 76–82. https://doi.org/10.1016/j.copsyc.2019.08.009
Plangger, K., & Montecchi, M. (2020). Thinking Beyond Privacy Calculus: Investigating Reactions to Customer Surveillance. Journal of Interactive Marketing, 50, 32–44. https://doi.org/10.1016/j.intmar.2019.10.004
Posner, R. A. (1981). The Economics of Privacy. The Amrican Economic Review, 71(2), 405–409.
Pötzsch, S., Wolkerstorfer, P., & Graf, C. (2010). Privacy-Awareness Information for Web Forums: Results from an Empirical Study. In ACM (Ed.), NordiCHI (pp. 363–372). Reykjavik: ACM.
Prince, C. (2018). Do consumers want to control their personal data? Empirical evidence. International Journal of Human Computer Studies, 110(March 2016), 21–32. https://doi.org/10.1016/j.ijhcs.2017.10.003
Puaschunder, J. (2020). Towards a Utility Theory of Privacy and Information Sharing and the Introduction of Hyper-Hyperbolic Discounting in the Digital Big Data Age. In Handbook of Research on Social and Organizational Dynamics in the Digital Era (pp. 4–46). https://doi.org/10.4018/978-1-5225-8933-4.ch008
Raento, M., & Oulasvirta, A. (2008). Designing for privacy and self-presentation in social awareness. Personal and Ubiquitous Computing, 12(7), 527–542. https://doi.org/10.1007/s00779-008-0200-9
Reidenberg, J. R., Russell, C. N., Callen, A. J., Qasir, S., & Norton, T. (2014). Privacy Harms and the Effectiveness of the Notice and Choice Framework. Journal of Law and Policy for the Information Society, 11(2), 485–524.
Richards, N. M. (2008). Intellectual privacy. Texas Law Review, 87(2), 387–445.
Richards, N. M., & Hartzog, W. (2019). The Pathologies of Digital Consent. Washington University Law Review, 1461–1503. Retrieved from https://papers.ssrn.com/abstract=3370433
Rodriguez, S. (2021, February 1). Facebook strikes back against Apple privacy change, prompts users to accept tracking to get ‘better ads experience.’ CNBC. Retrieved from https://www.cnbc.com/2021/02/01/facebook-strikes-back-against-apple-ios-14-idfa-privacy-change.html
Rubin, A. M. (1984). Ritualized and Instrumental Television Viewing. Journal of Communication, 34(3), 67–77. https://doi.org/https://doi.org/10.1111/j.1460-2466.1984.tb02174.x
Saeri, A. K., Ogilvie, C., La Macchia, S. T., Smith, J. R., & Louis, W. R. (2014). Predicting Facebook Users’ Online Privacy Protection: Risk, Trust, Norm Focus Theory, and the Theory of Planned Behavior. The Journal of Social Psychology, 154(4), 352–369. https://doi.org/10.1080/00224545.2014.914881
Sanchez-Rola, I., Dell’amico, M., Kotzias, P., Eurecom, D. B., Bilge, L., Vervier, P.-A., … Balzarotti, D. (2019). Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control. AsiaCCS, 12, 340–351. https://doi.org/10.1145/3321705.3329806
Sarathy, R., & Robertson, C. J. (2003). Strategic and Ethical Considerations in Managing Digital Privacy. In Source: Journal of Business Ethics (Vol. 46).
Schade, M., Piehler, R., Warwitz, C., & Burmann, C. (2018). Increasing consumers’ intention to use location-based advertising. Journal of Product and Brand Management, 27(6), 661–669. https://doi.org/10.1108/JPBM-06-2017-1498
Schaub, F., Könings, B., & Weber, M. (2015). Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1), 34–43. https://doi.org/10.1109/MPRV.2015.5
Schmidt, L., Bornschein, R., & Maier, E. (2020). The effect of privacy choice in cookie notices on consumers’ perceived fairness of frequent price changes. Psychology & Marketing, 1–14. https://doi.org/10.1002/mar.21356
Simon, H. A. (1982). Models of Bounded Rationality. Cambridge: MIT Press.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1015.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196.
Solove, D. J. (2013). Privacy Self-Management and the Consent Dilemma. Harvard Law Review, 126, 1880–1903.
Solove, D. J. (2021). The Myth of the Privacy Paradox. George Washington Law Review, 89(1), 1–51. Retrieved from https://heinonline.org/HOL/Page?handle=hein.journals/gwlr89&id=15&div=4&collection=journals
Son, B. J.-Y., & Kim, S. S. (2008). Internet User’s Information Privacy-Protective Responses: A Taxonomy and Nomological Model. MIS Quarterly, 32(3), 503–529.
Sproull, L., & Kiesler, S. (1986). Reducing Social Context Cues : Electronic Mail in Organizational Communications Author ( s ): Lee Sproull and Sara Kiesler Published by : INFORMS Stable URL : http://www.jstor.org/stable/2631506 Accessed : 01-03-2016 17 : 01 UTC Your use of the JSTOR arch. Management Science, 32(11), 1492–1512. https://doi.org/10.1007/BF02904649
Steiner, P. H., & Maas, P. (2018). When customers are willing to disclose information in the insurance industry: A multi-group analysis comparing ten countries. International Journal of Bank Marketing, 36(6), 1015–1033. https://doi.org/10.1108/IJBM-12-2016-0183
Sun, S. (2008, December). Organizational Culture and Its Themes. International Journal of Business and Management, 137–141.
Sundar, S., & Kim, J. (2019). Machine heuristic: When we trust computers more than humans with our personal information. Conference on Human Factors in Computing Systems - Proceedings, 1–9. https://doi.org/10.1145/3290605.3300768
Sundar, S. S., Kang, H., Zhang, B., Go, E., & Wu, M. (2013). Unlocking the Privacy Paradox: Do Cognitive Heuristics Hold the Key? Conference on Human Factors in Computing Systems - Proceedings, April, 811–816. https://doi.org/10.1145/2468356.2468501
Sundar, S. S., Kim, J., Rosson, M. B., & Molina, M. D. (2020). Online Privacy Heuristics that Predict Information Disclosure. Conference on Human Factors in Computing Systems - Proceedings, 1–12. https://doi.org/10.1145/3313831.3376854
Taneja, A., Vitrano, J., & Gengo, N. J. (2014). Rationality-based beliefs affecting individual’s attitude and intention to use privacy controls on Facebook: An empirical investigation. Computers in Human Behavior, 38, 159–173. https://doi.org/10.1016/j.chb.2014.05.027
Tang, Z., Hu, Y., & Smith, M. D. (2008). Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor. Journal of Management Information Systems, 24(4), 153–173. https://doi.org/10.2753/MIS0742-1222240406
Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533. https://doi.org/10.1002/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z
Teixeira, G. A., da Silva, M. M., & Pereira, R. (2020). The Critical Success Factors of GDPR Implementation : a Systematic Literature Review. Digital Policy, Regulation and Governance, 21(4), 402–418. https://doi.org/https://dx.doi.org/10.1108/DPRG-01-2019-0007
Teng, P. K., Heng, B. L. J., & Wong Abdullah, S. I. N. (2019). Distinctive Comparison of Consumers’ Mobile Payment Adoption between China and Malaysia. Asia Proceedings of Social Sciences, 2(3), 57–61. https://doi.org/10.31580/apss.v2i3.258
Van Eerde, W., & Thierry, H. (1996). Vroom’s Expectancy Models and Work-Related Criteria : Journal of Applied Psychology, 81(5), 575–586.
Vergara-Laurens, I. J., Jaimes, L. G., & Labrador, M. A. (2017, August 1). Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges. IEEE Internet of Things Journal, Vol. 4, pp. 855–869. https://doi.org/10.1109/JIOT.2016.2594205
Völckner, F., & Sattler, H. (2006). Drivers of brand extension success. Journal of Marketing, 70(2), 18–34. https://doi.org/10.1509/jmkg.70.2.18
Vroom, V. H. (1964). Work and motivation. Retrieved from http://garfield.library.upenn.edu/classics1985/A1985AKX9100001.pdf
Waldman, A. E. (2020). Cognitive biases, dark patterns, and the “privacy paradox.” Current Opinion in Psychology, 31(2), 105–109. https://doi.org/10.1016/j.copsyc.2019.08.025
Walther, J. B., & Parks, M. R. (2002). Cues Filtered Out, Cues Filtered In: Computer-Mediated Communication and Relationships. In M. L. Knapp & J. A. Daly (Eds.), Handbook of interpersonal communication (Vol. 3, pp. 529–563). Retrieved from https://www.researchgate.net/publication/239489124
Wang, H., Lee, M. K. O., & Wang, C. (1998). Consumer Privacy Concerns about Internet Marketing. Communications of the ACM, 41(3), 63–70. https://doi.org/10.1145/272287.272299
Wang, L., Hu, H. H., Yan, J., & Mei, M. Q. (2019). Privacy calculus or heuristic cues? The dual process of privacy decision making on Chinese social media. Journal of Enterprise Information Management, 33(2), 353–380. https://doi.org/10.1108/JEIM-05-2019-0121
Wang, N., Sun, Y., Shen, X. L., Liu, D., & Zhang, X. (2019). Just being there matters: Investigating the role of sense of presence in Like behaviors from the perspective of symbolic interactionism. Internet Research, 29(1), 60–81. https://doi.org/10.1108/IntR-08-2017-0299
Wang, Y., & Lo, H.-P. (2003). Customer-focused performance and the dynamic model for competence building and leveraging A resource-based view. Journal of Management Development, 486–526. https://doi.org/10.1108/02621710310478486
Waters, S., & Ackerman, J. (2011). Exploring Privacy Management on Facebook: Motivations and Perceived Consequences of Voluntary Disclosure. Journal of Computer-Mediated Communication, 17(1), 101–115. https://doi.org/10.1111/j.1083-6101.2011.01559.x
Westin, A. F. (2003). Social and Political Dimensions of Privacy. Journal of Social Issues, 59(2), 431–453. https://doi.org/10.1111/1540-4560.00072
Whitman, J. Q. (2004). The Two Western Cultures of Privacy: Dignity versus Liberty. In Source: The Yale Law Journal (Vol. 113). The Yale Law Journal Company, Inc.
Wilkie, W. L., & Moore, E. S. (2011). Expanding our understanding of marketing in society. Journal of the Academy of Marketing Science, 40, 53–73. https://doi.org/10.1007/s11747-011-0277-y
Williams, M., Nurse, J. R. C., & Creese, S. (2016). The perfect storm: The privacy paradox and the Internet-of-things. Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, 644–652. https://doi.org/10.1109/ARES.2016.25
Wilson, D. W., & Valacich, J. S. (2012). Unpacking the Privacy Paradox: Irrational Decision-Making within the Privacy Calculus. ICIS 2012, 1–28. https://doi.org/10.1.1.690.1819
Wirth, J., Maier, C., Laumer, S., & Weitzel, T. (2019). Perceived information sensitivity and interdependent privacy protection: a quantitative study. Electronic Markets, 29, 359–378. https://doi.org/10.1007/s12525-019-00335-0
Wirtz, J., & Lwin, M. O. (2009). Regulatory Focus Theory, Trust, and Privacy Concern. Journal of Service Research, 12(2), 190–207. https://doi.org/10.1177/1094670509335772
Wright, P. M., & McMahan, G. C. (1992). Theoretical Perspectives for Strategic Human Resource Management. Journal of Management, 18(2), 295–320. https://doi.org/10.1177/014920639201800205
Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889–897. https://doi.org/10.1016/j.chb.2011.12.008
Xu, H., Luo, X. (Robert), Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42–52. https://doi.org/10.1016/j.dss.2010.11.017
Youn, S. (2009). Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. In The Journal of Consumer Affairs (Vol. 43).
Young, A. L., & Quan-Haase, A. (2013). Privacy Protection Strategies on Facebook - The Internet Privacy Paradox Revisited. Information, Communication & Society, 16(4), 479–500. https://doi.org/10.1080/1369118X.2013.777757
Yun, H., Lee, G., & Kim, D. J. (2019). A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information and Management, 56(4), 570–601. https://doi.org/10.1016/j.im.2018.10.001
Zafeiropoulou, A. M., Millard, D. E., Webber, C., & O’Hara, K. (2013). Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? Proceedings of the 5th Annual ACM Web Science Conference, WebSci’13, 463–472. https://doi.org/10.1145/2464464.2464503
Zhang, Y., Wang, T., & Hsu, C. (2019). The effects of voluntary GDPR adoption and the readability of privacy statements on customers’ information disclosure intention and trust. Journal of Intellectual Capital, 21(2), 145–163. https://doi.org/10.1108/JIC-05-2019-0113
Zhou, K. Z., & Li, C. B. (2010). How strategic orientations influence the building of dynamic capability in emerging economies. Journal of Business Research, 63(3), 224–231. https://doi.org/10.1016/j.jbusres.2009.03.003
Zhu, H., Ou, C. X. J., van den Heuvel, W. J. A. M., & Liu, H. (2017). Privacy calculus and its utility for personalization services in e-commerce: An analysis of consumer decision-making. Information & Management, 54(4), 427–437. https://doi.org/10.1016/j.im.2016.10.001
Acquisti, A. (2004). Privacy in Electronic Commerce and the Economics of Immediate Gratification. Pre-Proceedings to EC’04, May 17-20, New York, 1–9.
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015, January 30). Privacy and human behavior in the age of information. Science, Vol. 347, pp. 509–514. https://doi.org/10.1126/science.aaa1465
Acquisti, A., Komanduri, S., Analytics, C., Leon, P. G., De Mexico, B., Schaub, F., … Sleeper, M. (2017). 44 Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online ACM Reference Format. ACM Computing Surveys, 50(3), 1–41. https://doi.org/10.1145/3054926
Acquisti, A., Taylor, C., & Wagman, L. (2016). The Economics of Privacy. Journal of Economic Literature, 54(2), 442–492. https://doi.org/10.1257/jel.54.2.442
Adjerid, I., Peer, E., & Acquisti, A. (2018). Beyond the privacy paradox: Objective versus relative risk in privacy decision making. MIS Quarterly: Management Information Systems, 42(2), 465–488. https://doi.org/10.25300/MISQ/2018/14316
Ahluwalia, R. (2008). How far can a brand stretch? Understanding the role of self-construal. Journal of Marketing Research, 45(3), 337–350. https://doi.org/10.1509/jmkr.45.3.337
Aivazpour, Z., Valecha, R., & Rao, R. H. (2017). Unpacking Privacy Paradox using Dual Process Theory Unpacking Privacy Paradox: A Dual Process Theory Approach. AMCIS 2017, 1–5. Boston.
Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50, 179–211. https://doi.org/10.1080/10410236.2018.1493416
Ajzen, I. (2011). Is Attitude Research Incompatible With the Compatibility Principle. In R. M. Arkin (Ed.), Most underappreciated: 50 prominent social psychologists describe their most unloved work (pp. 583–605). https://doi.org/10.1093/acprof:osobl/9780199778188.003.0029
Ajzen, I., & Fishbein, M. (1970). The prediction of behavior from attitudinal and normative variables. Journal of Experimental Social Psychology, 6(4), 466–487. https://doi.org/10.1016/0022-1031(70)90057-0
Ajzen, I., & Fishbein, M. (1977). Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research. Psychological Bulletin, 87(5), 888–918. https://doi.org/https://doi.org/10.1037/0033-2909.84.5.888
Alashoor, T., & Baskerville, R. (2015). The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity. Proceedings of the 22nd Americas Conference on Information Systems, 1–20. Fort Worth.
Alashoor, T., Han, S., & Joseph, R. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41, 62–96. https://doi.org/10.17705/1cais.04104
Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, California: Brooks/Cole Publishing Company.
Amiri, I., Wang, L., Levy, Y., & Hur, I. (2018). An Empirical Study on the Factors Contributing to Disclosing Personal Information Online: Insecurity in the Digital Age. Twenty-Fourth Americas Conference on Information Systems, 1–10. New Orleans.
Anhalt-Depies, C., Stenglein, J. L., Zuckerberg, B., Townsend, P. M., & Rissman, A. R. (2019). Tradeoffs and tools for data quality, privacy, transparency, and trust in citizen science. Biological Conservation, 238, 1–7. https://doi.org/10.1016/j.biocon.2019.108195
Argote, L., McEvily, B., & Reagans, R. (2003). Managing knowledge in organizations: An integrative framework and review of emerging themes. Management Science, 49(4), 571–582. https://doi.org/10.1287/mnsc.49.4.571.14424
Auxier, B. Y. B., Rainie, L., Anderson, M., Perrin, A., Kumar, M., & Turner, E. (2019). Americans and Privacy: Concerned, Confused, and Feeling a Lack of Control Over Their Personal Information. Pew Research Center, (November), 1–63.
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly: Management Information Systems, 30(1), 13–28. https://doi.org/10.2307/25148715
Bandara, R., Fernando, M., & Akter, S. (2017). The Privacy Paradox in the Data-Driven Marketplace: The Role of Knowledge Deficiency and Psychological Distance. In C. / P. / CENTERIS - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist - International Conference on Health and Social Care Information Systems and Technologies (Ed.), Procedia Computer Science (Vol. 121, pp. 562–567). https://doi.org/10.1016/j.procs.2017.11.074
Bandara, W., Furtmueller, E., Gorbacheva, E., Miskon, S., & Beekhuyzen, J. (2015). Achieving Rigor in Literature Reviews: Insights from Qualitative Data Analysis and Tool-Support. Communications of the Association for Information Systems, 34, 154–204. https://doi.org/https://doi.org/10.17705/1CAIS.03708
Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information and Management, 53(1), 1–21. https://doi.org/10.1016/j.im.2015.08.001
Baracaldo, N., López, C., Anwar, M., & Lewis, M. (2011). Simulating the effect of privacy concerns in online social networks. Proceedings of the 2011 IEEE International Conference on Information Reuse and Integration, IRI 2011, 519–524. https://doi.org/10.1109/IRI.2011.6009609
Barnes, S. B. (2006). A privacy paradox: Social Networking in the United States. First Monday, 11(9). https://doi.org/https://doi.org/10.5210/fm.v11i9.1394
Barocas, S., & Nissenbaum, H. (2009). On Notice: The Trouble with Notice and Consent. Engag. Data Forum First Int. Forum Appl. Manag. Pers. Electron. Inf., 1–6.
Barocas, S., & Nissenbaum, H. (2014). Computing Ethics: Big Data’s End Run Around Procedural Privacy Protections Recognizing the inherent limitations of consent and anonymity. Communications of the ACM, 57(11), 31–33. https://doi.org/10.1145/2668897
Barth, S., & de Jong, M. D. T. (2017). The Privacy Paradox - Investigating Discrepancies between Expressed Privacy Concerns and Actual Online Behavior - A Systematic Literature Review. Telematics and Informatics, 34, 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication, 67(1), 26–53. https://doi.org/10.1111/jcom.12276
Bauer, A., Reiner, G., & Schamschule, R. (2000). Organizational and quality systems development: An analysis via a dynamic simulation model. Total Quality Management, 11(4–6), 410–416. https://doi.org/10.1080/09544120050007715
Bauer, C., & Lasinger, P. (2014). Adaptation strategies to increase advertisement effectiveness in digital media. Management Review Quarterly, 64, 101–124. https://doi.org/10.1007/s11301-014-0101-0
Bauer, C., & Strauss, C. (2016). Location-based advertising on mobile devices A literature review and analysis. Management Review Quarterly, 66, 159–194. https://doi.org/10.1007/s11301-015-0118-z
Baxter, L., Braithwaite, D., Petronio, S., & Durham, W. T. (2014). Communication Privacy Management Theory: Significance for Interpersonal Communication. In Engaging Theories in Interpersonal Communication: Multiple Perspectives (pp. 309–322). https://doi.org/10.4135/9781483329529.n23
Becker, B., & Gerhart, B. (1996). The impact of human resource management on organizational performance: Progress and prospects. Academy of Management Journal, 39(4), 779–801. https://doi.org/10.2307/256712
Becker, M., Klausing, S., & Hess, T. (2019). Uncovering the privacy paradox: The influence of distraction on data disclosure decisions. ECIS 2019, 5–15. Retrieved from https://aisel.aisnet.org/ecis2019_rip/69
Beke, F. T., Eggers, F., & Verhoef, P. C. (2018). Consumer Informational Privacy: Current Knowledge and Research Directions. In Foundations and Trends in Marketing (Vol. 11). https://doi.org/10.1561/1700000057
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly: Management Information Systems, Vol. 35, pp. 1017–1041. https://doi.org/10.2307/41409971
Bickelmann, J. (2021, January 24). Sag mir, wo du schreibst. Der Tagesspiegel, p. 18.
Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2018). Exploring Motivations for Online Privacy Protection Behavior: Insights From Panel Data. Communication Research, 00(0), 1–25. https://doi.org/10.1177/0093650218800915
Brinberg, D., & Wood, R. (1983). A Resource Exchange Theory of Consumer Behavior. Journal of Consumer Research, 10(3), 330–339.
Brough, A. R., & Martin, K. D. (2020, February 1). Critical roles of knowledge and motivation in privacy research. Current Opinion in Psychology, Vol. 31, pp. 11–15. https://doi.org/10.1016/j.copsyc.2019.06.021
Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. M. (2020). Asymmetrical third-person effects on the perceptions of online risk and harm among adolescents and adults. Behaviour and Information Technology, 0(0), 1–11. https://doi.org/10.1080/0144929X.2020.1742380
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2017). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. In MIS Quarterly (Vol. 34). https://doi.org/10.2307/25750690
Campbell, J., Greenauer, N., Macaluso, K., & End, C. (2007). Unrealistic optimism in internet events. Computers in Human Behavior, 23(3), 1273–1284. https://doi.org/10.1016/j.chb.2004.12.005
Casadesus-Masanell, R., & Hervas-Drane, A. (2015). Competing with privacy. Management Science, 61(1), 229–246. https://doi.org/10.1287/mnsc.2014.2023
Cate, F. H., & Mayer-Schönberger, V. (2013). Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73.
Chang, C. W., & Heo, J. (2014). Visiting theories that predict college students’ self-disclosure on Facebook. Computers in Human Behavior, 30, 79–86. https://doi.org/10.1016/j.chb.2013.07.059
Chen, H., & Atkin, D. (2020). Understanding third-person perception about Internet privacy risks. New Media & Society, 0(0), 1–19. https://doi.org/10.1177/1461444820902103
Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/10.1016/j.chb.2017.01.003
Child, J. T., Haridakis, P. M., & Petronio, S. (2012). Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use. Computers in Human Behavior, 28(5), 1859–1872. https://doi.org/10.1016/j.chb.2012.05.004
Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure. Journal of the American Society for Information Science and Technology, 60(10), 2079–2094. https://doi.org/10.1002/asi.21122
Cho, H., Lee, J. S., & Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987–995. https://doi.org/10.1016/j.chb.2010.02.012
Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42–51. https://doi.org/10.1016/j.chb.2017.12.001
Citron, D. K. (2009). Cyber Civil Rights. Boston University Law Review, 89(1), 61–126.
Clemons, E. K., Wilson, J., & Jin, F. (2014). Investigations into Consumers Preferences Concerning Privacy: An Initial Step Towards the Development of Modern and Consistent Privacy Protections Around the Globe. In IEEE (Ed.), 47th Hawaii International Conference on System Science (pp. 4083–4092). https://doi.org/10.1109/HICSS.2014.504
Conners, J. L. (2005). Understanding the Third-Person Effect . Communication Research Trends, 24(2–3), 3–22. Retrieved from http://cscc.scu.edu
Coopamootoo, K. P. L., & Groß, T. (2014). Mental models for usable privacy: A position paper. Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, 8533, 410–421. https://doi.org/10.1007/978-3-319-07620-1_36
Culnan, M. J. (1993). “How Did They Get My Name?”: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use. In MIS Quarterly (Vol. 17).
Davison, W. P. (1983). The Third-Person Effect in Communication. The Public Opinion Quarterly, 47(1), 1–15.
De Wolf, R., & Pierson, J. (2014). Who’s my audience again? Understanding audience management strategies for designing privacy management technologies. Telematics and Informatics, 31(4), 607–616. https://doi.org/10.1016/j.tele.2013.11.004
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication, 15(1), 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
Dehghanpouri, H., Soltani, Z., & Rostamzadeh, R. (2020). The impact of trust, privacy and quality of service on the success of E-CRM: the mediating role of customer satisfaction. Journal of Business & Industrial Marketing, 1–17. https://doi.org/10.1108/JBIM-07-2019-0325
Demmers, J., van Dolen, W. M., Weltevreden, J. W., & van Dolen, M. (2018). Handling Consumer Messages on Social Networking Sites: Customer Service or Privacy Infringement? International Journal of Electronic Commerce, 22(1), 8–35. https://doi.org/10.1080/10864415.2018.1396110
DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121–147. https://doi.org/10.1287/orsc.5.2.121
Dienlin, T., & Metzger, M. J. (2016). An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample. Journal of Computer-Mediated Communication, 21(5), 368–383. https://doi.org/10.1111/jcc4.12163
Dienlin, T., & Trepte, S. (2015). Putting the Social (Psychology) into Social Media: Is the Privacy Paradox a Relic of the Past? An In-depth Analysis of Privacy Attitudes and Privacy Behaviors. European Journal of Social Psychology, 45(3), 285–297. https://doi.org/10.1002/ejsp.2038
Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
Dinev, T., Mcconnell, A. R., & Smith, H. J. (2015). Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box. Information Systems Research, 26(4), 639–655. https://doi.org/10.1287/isre.2015.0600
Dinev, T., Xu, H., & Smith, H. J. (2009). Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy. Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 1–10. https://doi.org/10.1109/HICSS.2009.255
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2012). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22, 295–316. https://doi.org/10.1057/ejis.2012.23
Dunbar, R. I. M. (2004). Gossip in evolutionary perspective. Review of General Psychology, 8(2), 100–110. https://doi.org/10.1037/1089-2680.8.2.100
Dwyer, C., Hiltz, S. R., Poole, M. S., Gußner, J., Hennig, F., Osswald, S., … Warth, B. (2010). Developing reliable measures of privacy management within social networking sites. Proceedings of the Annual Hawaii International Conference on System Sciences, 1–10. https://doi.org/10.1109/HICSS.2010.146
Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886. https://doi.org/10.1016/j.jbusres.2006.02.006
Egelman, S., Felt, A. P., & Wagner, D. (2013). Choice Architecture and Smartphone Privacy: There’s A Price for That. In R. Böhme (Ed.), The Economics of Information Security and Privacy (pp. 211–236). Berlin: Springer.
Emler, N. (1994). Gossip, reputation, and social adaptation. In R. F. Goodman & A. Ben-Ze’ev (Eds.), Good Gossip (pp. 215–237).
Fazzini, K. (2019). Apple’s big bet on privacy has risks. Retrieved June 3, 2020, from CNBC website: https://www.cnbc.com/2019/01/10/apple-privacy-big-bet-risks.html
Featherman, M. S., Miyazaki, A. D., & Sprott, D. E. (2010). Reducing online privacy risk to facilitate e-service adoption: The influence of perceived ease of use and corporate credibility. Journal of Services Marketing, 24(3), 219–229. https://doi.org/10.1108/08876041011040622
Feinberg, M., Willer, R., Stellar, J., & Keltner, D. (2012). The virtues of gossip: Reputational information sharing as prosocial behavior. Journal of Personality and Social Psychology, 102(5), 1015–1030. https://doi.org/10.1037/a0026650
Feng, Y., & Xie, Q. (2019). Privacy Concerns, Perceived Intrusiveness, and Privacy Controls: An Analysis of Virtual Try-On Apps. Journal of Interactive Advertising, 19(1), 43–57. https://doi.org/10.1080/15252019.2018.1521317
Flender, C., & Müller, G. (2012). Type indeterminacy in privacy decisions: The privacy paradox revisited. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7620 LNCS, 148–159. https://doi.org/10.1007/978-3-642-35659-9_14
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A Meta-Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology, 30(2), 407–429.
Forrester, J. W. (1968). Industrial Dynamics—After the First Decade. Management Science, 14(7), 398–415. https://doi.org/10.1287/mnsc.14.7.398
Foster, E. K. (2004). Research on Gossip: Taxonomy, Methods, and Future Directions. Review of General Psychology, 8(2), 78–99. https://doi.org/10.1037/1089-2680.8.2.78
Freudiger, J., Rane, S., Brito, A. E., & Uzun, E. (2014). Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing. WISCS ’14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 21–29. https://doi.org/10.1145/2663876.2663885
Gambino, A., Kim, J., Sundar, S. S., Ge, J., & Rosson, M. B. (2016). User disbelief in privacy paradox: Heuristics that determine disclosure. Conference on Human Factors in Computing Systems - Proceedings, 07-12-May, 2837–2843. https://doi.org/10.1145/2851581.2892413
George, J. F. (2004). The theory of planned behavior and Internet purchasing. Internet Research, 14(3), 198–212. https://doi.org/10.1108/10662240410542634
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers and Security, 77, 226–261. https://doi.org/10.1016/j.cose.2018.04.002
Giddens, A. (1984). The Constitution of Society: Outline of the Theory of Structuration. Oakland: University of California Press.
Ginosar, A., & Ariel, Y. (2017). An analytical framework for online privacy research: What is missing? Information & Management, 54(7), 948–957. https://doi.org/10.1016/j.im.2017.02.004
Gioia, D. A., Corley, K. G., & Hamilton, A. L. (2013). Seeking Qualitative Rigor in Inductive Research: Notes on the Gioia Methodology. Organizational Research Methods, 16(1), 15–31. https://doi.org/10.1177/1094428112452151
Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge Management: An Organizational Capabilities Perspective. Journal of Management Information Systems, 18(1), 185–214. https://doi.org/10.1080/07421222.2001.11045669
Greenaway, K. E., & Chan, Y. E. (2005). Theoretical Explanations for Firms’ Information Privacy Behaviors. Journal of the Association for Information Systems, 6(6), 171–198. https://doi.org/10.17705/1jais.00068
Gunther, R. E. (2009). Peter Drucker-the grandfather of marketing: an interview with Dr. Philip Kotler. Journal of the Academy of Marketing Science, 37, 17–19. https://doi.org/10.1007/s11747-008-0105-1
Guo, X., Zhang, X., & Sun, Y. (2016). The privacy–personalization paradox in mHealth services acceptance of different age groups. Electronic Commerce Research and Applications, 16, 55–65. https://doi.org/10.1016/j.elerap.2015.11.001
Hallam, C., & Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217–227. https://doi.org/10.1016/j.chb.2016.11.033
Ham, C. D., & Nelson, M. R. (2016). The role of persuasion knowledge, assessment of benefit and harm, and third-person perception in coping with online behavioral advertising. Computers in Human Behavior, 62, 689–702. https://doi.org/10.1016/j.chb.2016.03.076
Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. L. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. Journal of Management Information Systems, 24(2), 13–42. https://doi.org/10.2753/MIS0742-1222240202
Harsanyi, J. C. (1967). Games with Incomplete Information Played by “Bayesian” Players, I–III Part I. The Basic Model. Management Science, 14(3), 159–182. https://doi.org/10.1287/mnsc.14.3.159
Heravi, A., Mubarak, S., & Raymond Choo, K. K. (2018). Information privacy in online social networks: Uses and gratification perspective. Computers in Human Behavior, 84, 441–459. https://doi.org/10.1016/j.chb.2018.03.016
Hermalin, B. E., & Katz, M. L. (2006). Privacy, property rights and efficiency: The economics of privacy as secrecy. Quant Market Econ, 4, 209–239. https://doi.org/10.1007/s11129-005-9004-7
Hruschka, D. J., Schwartz, D., St.john, D. C., Picone-Decaro, E., Jenkins, R. A., & Carey, J. W. (2004). Reliability in Coding Open-Ended Data: Lessons Learned from HIV Behavioral Research. Field Methods, 16(3), 307–331. https://doi.org/10.1177/1525822X04266540
Hsu, M.-H., & Kuo, F.-Y. (2003). The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy. Journal of Business Ethics, 42(4), 305–320.
Hu, Q., & Ma, S. (2010). Does Privacy Still Matter in the Era of Web 2.0? A Qualitative Study of User Behavior towards Online Social Networking Activities. PACIS 2010, 591–602.
Huang, H. Y., & Bashir, M. (2020). “Seeking Privacy Makes Me Feel Bad?”: An Exploratory Study Examining Emotional Impact on Use of Privacy-Enhancing Features. Advances in Intelligent Systems and Computing, 1129 AISC, 600–617. https://doi.org/10.1007/978-3-030-39445-5_44
Hui, K., Teo, H. H., & Lee, S.-Y. T. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly, 31(1), 19–33.
Hull, G. (2015). Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data. Ethics and Information Technology, 17, 89–101. https://doi.org/10.1007/s10676-015-9363-z
Inman, J. J., & Nikolova, H. (2017). Shopper-Facing Retail Technology: A Retailer Adoption Decision Framework Incorporating Shopper Attitudes and Privacy Concerns. Journal of Retailing, 93(1), 7–28. https://doi.org/10.1016/j.jretai.2016.12.006
James, T. L., Nottingham, Q., Collignon, S. E., Warkentin, M., & Ziegelmayer, J. L. (2015). The interpersonal privacy identity (IPI): development of a privacy as control model. Information Technology and Management, 17, 341–360. https://doi.org/10.1007/s10799-015-0246-0
Jiang, Z., Suang Heng, C., & F Choi, B. C. (2013). Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions. Information Systems Research, 24(3), 579–595. https://doi.org/10.1287/isre.1120.0441
Kahneman, D. (2003). A Perspective on Judgment and Choice: Mapping Bounded Rationality. American Psychologist, 58(9), 697–720. https://doi.org/10.1037/0003-066X.58.9.697
Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263–292.
Karwatzki, S., Dytynko, O., Trenz, M., & Veit, D. (2017). Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization. Journal of Management Information Systems, 34(2), 369–400. https://doi.org/10.1080/07421222.2017.1334467
Katz, E., Blumler, J. G., & Gurevitch, M. (1973). Uses and Gratifications Research. The Public Opinion Quarterly, 37(4), 509–523.
Kayhan, V. O., & Davis, C. J. (2016). Situational privacy concerns and antecedent factors. Journal of Computer Information Systems, 56(3), 228–237. https://doi.org/10.1080/08874417.2016.1153913
Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015). Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Information Systems Journal, 25(6), 607–635. https://doi.org/10.1111/isj.12062
Keith, M. J., Babb, J. S., & Lowry, P. B. (2014). A longitudinal study of information privacy on mobile devices. Proceedings of the Annual Hawaii International Conference on System Sciences, 3149–3158. https://doi.org/10.1109/HICSS.2014.391
Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., & Abdullat, A. (2015). The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal, 25(6), 637–667. https://doi.org/10.1111/isj.12082
Keith, M. J., Thompson, S. C., Hale, J. E., & Greer, C. (2012). Examining the Rationality of Information Disclosure throught Mobile Devices. Proceedings of the 33rd International Conference on Information Systems, 1–17. Orlando.
Kim, S.-Y. (2018). Intercoder Reliability Techniques: Cohen’s Kappa. In M. Allen (Ed.), The SAGE Encyclopedia of Communication Research Methods (pp. 736–738). https://doi.org/10.4135/9781483381411
Kim, T., Barasz, K., & John, L. K. (2019). Why am i seeing this ad? The effect of ad transparency on ad effectiveness. Journal of Consumer Research, 45(5), 906–932. https://doi.org/10.1093/jcr/ucy039
Kitchenham, B., & Charters, S. (2007). Guidelines for performing Systematic Literature Reviews in Software Engineering. Keele University and Durham University Joint Report, 1–65.
Kitkowska, A., Shulman, Y., Martucci, L. A., & Wästlund, E. (2020). Psychological Effects and Their Role in Online Privacy Interactions: A Review. IEEE Access, 8, 21236–21260. https://doi.org/10.1109/ACCESS.2020.2969562
Kitkowska, A., Wästlund, E., Martucci, L. A., Warner, M., & Shulman, Y. (2020). Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. Sixteenth Symposium on Usable Privacy and Security, 437–456. USENIX Association.
Klopfer, P. H., & Rubenstein, D. I. (1977). The Concept Privacy and Its Biological Basis. Journal of Social Issues, 33(3), 52–65. https://doi.org/10.1111/j.1540-4560.1977.tb01882.x
Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers and Security, 64(November), 122–134. https://doi.org/10.1016/j.cose.2015.07.002
Krafft, M., Arden, C. M., & Verhoef, P. C. (2017). Permission Marketing and Privacy Concerns — Why Do Customers (Not) Grant Permissions? Journal of Interactive Marketing, 39, 39–54. https://doi.org/10.1016/j.intmar.2017.03.001
Krämer, N. C., & Haferkamp, N. (2011). Online Self-Presentation: Balancing Privacy Concerns and Impression Construction on Social Networking Sites. In Privacy Online (pp. 127–141). https://doi.org/10.1007/978-3-642-21521-6_10
Kuckertz, A., & Block, J. (2021). Reviewing systematic literature reviews: ten key questions and criteria for reviewers. Management Review Quarterly 2021, 1–6. https://doi.org/10.1007/S11301-021-00228-7
Lai, C.-Y., Liang, T.-P., & Hui, K.-L. (2018). Information Privacy Paradox: A Neural Science Study. PACIS 2018, 247–255. Retrieved from https://aisel.aisnet.org/pacis2018/247
Lanier, C. D., & Saini, A. (2008). Understanding Consumer Privacy: A Review and Future Directions. Academy of Marketing Science Review, 12(1), 1–48.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a Social Issue and Behavioural Concept. Journal of Social Issues, 33(3), 22–41.
Lee, S.-B., Fan, L., Lee, S.-C., & Suh, Y.-H. (2012). Effects of Self-Presentation and Privacy Concern on an Individual’s Self-Disclosure : An Empirical Study on Twitter. Korean Management Science Review, 29(2), 1–20. https://doi.org/10.7737/kmsr.2012.29.2.001
Lemon, K. N., & Verhoef, P. C. (2016). Understanding Customer Experience Throughout the Customer Journey. Journal of Marketing, 80, 69–96. https://doi.org/10.1509/jm.15.0420
Leonard, D., & McAdam, R. (2004). Total quality management in strategy and operations: Dynamic grounded models. Journal of Manufacturing Technology Management, 15(3), 254–266. https://doi.org/10.1108/17410380410523489
Lutz, C., & Strathoff, P. (2014). Privacy Concerns and Online Behavior Not so Paradoxical after All? Viewing the Privacy Paradox Through Different Theoretical Lenses. In S. Brändli (Ed.), Multinationale Unternehmen und Institutionen im Wandel - Herausforderungen für Wirtschaft, Recht und Gesellschaft (pp. 81–99). https://doi.org/10.2139/ssrn.2425132
Lwin, M. O., & Williams, J. D. (2003). A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online. Marketing Letters, 14(4), 257–272.
Malhotra, A., & Malhotra, C. K. (2011). Evaluating Customer Information Breaches as Service Failures: An Event Study Approach. Journal of Service Research, 14(1), 44–59. https://doi.org/10.1177/1094670510383409
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
Mao, Y. (2018). Intercoder Reliability Techniques: Holsti Method . In M. Allen (Ed.), The SAGE Encyclopedia of Communication Research Methods (1st ed., pp. 741–743). https://doi.org/10.4135/9781483381411
Marmion, V., Bishop, F., Millard, D. E., & Stevenage, S. V. (2017). The cognitive heuristics behind disclosure decisions. International Conference on Social Informatics, 10539 LNCS, 591–607. https://doi.org/10.1007/978-3-319-67217-5_35
Martin, K. (2020). Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms. Business Ethics Quarterly, 30(1), 65–96. https://doi.org/10.1017/beq.2019.24
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data Privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81(1), 36–58. https://doi.org/10.1509/jm.15.0497
Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45(2), 135–155. https://doi.org/10.1007/s11747-016-0495-4
Matz, S. C., Appel, R. E., & Kosinski, M. (2020). Privacy in the age of psychological targeting. Current Opinion in Psychology, 31(2), 116–121. https://doi.org/10.1016/j.copsyc.2019.08.010
Mcneely, C. L., & Hahm, J. on. (2014). The big (data) bang: Policy, prospects, and challenges. Review of Policy Research, 31(4), 304–310. https://doi.org/10.1111/ropr.12082
Metzger, M. J., & Suh, J. J. (2017). Comparative Optimism About Privacy Risks on Facebook. Journal of Communication, 67(2), 203–232. https://doi.org/10.1111/jcom.12290
Meynhardt, T. (2009). Public Value Inside: What is Public Value Creation? International Journal of Public Administration, 32(3–4), 192–219. https://doi.org/10.1080/01900690902732632
Michler, O., Decker, R., & Stummer, C. (2020). To trust or not to trust smart consumer products: a literature review of trust-building factors. Management Review Quarterly, 70, 391–420. https://doi.org/10.1007/s11301-019-00171-8
Milne, G. R., & Bahl, S. (2010). Are There Differences Between Consumers’ and Marketers’ Privacy Expectations? A Segment- and Technology-Level Analysis. In Journal of Public Policy & Marketing (Vol. 29).
Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an Understanding of the Online Consumer’s Risky Behavior and Protection Practices. Journal of Consumer Affairs, 43(3), 449–473. https://doi.org/10.1111/j.1745-6606.2009.01148.x
Mohassel, P., & Zhang, Y. (2017). SecureML: A System for Scalable Privacy-Preserving Machine Learning. 2017 IEEE Symposium on Security and Privacy, 19–38. https://doi.org/10.1109/SP.2017.12
Morey, T., & Krajecki, K. (2016). Personalisation, data and trust: The role of brand in a data-driven, personalised, experience economy. Journal of Brand Strategy, 5(2), 178–185.
Morgan, R. M., & Hunt, S. D. (1994). The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing, 58(3), 20–38.
Morlok, T. (2016). Sharing is (not) caring - The role of external privacy in users’ information disclosure behaviors on social network sites. PACIS, 75–92. Retrieved from http://aisel.aisnet.org/pacis2016/75
Mosteller, J., & Poddar, A. (2017). To Share and Protect: Using Regulatory Focus Theory to Examine the Privacy Paradox of Consumers’ Social Media Engagement and Online Privacy Protection Behaviors. Journal of Interactive Marketing. https://doi.org/10.1016/j.intmar.2017.02.003
Mothersbaugh, D. L., Foxx Ii, W. K., Beatty, S. E., & Wang, S. (2012). Disclosure Antecedents in an Online Service Context: The Role of Sensitivity of Information Background Disclosure and Disclosure Antecedents. Journal of Service Research, 15(1), 76–98. https://doi.org/10.1177/1094670511424924
Mourey, J. A., & Waldman, A. E. (2020). Past the Privacy Paradox: The Importance of Privacy Changes as a Function of Control & Complexity. Journal of the Association for Consumer Research, 5(2), 1–38. https://doi.org/https://doi.org/10.1086/708034
Mukherjee, A., & Nath, P. (2007). Role of electronic trust in online retailing A re-examination of the commitment-trust theory. European Journal of Marketing, 41(9/10), 1173–1202. https://doi.org/10.1108/03090560710773390
Mullen, C., & Fox Hamilton, N. (2016). Adolescents’ response to parental Facebook friend requests: The comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Computers in Human Behavior, 60, 165–172. https://doi.org/10.1016/j.chb.2016.02.026
Nissenbaum, H. (2010). Privacy in Context Technology, Policy, and the Integrity of Social Life. In Privacy in Context. Stanford: Stanford University Press.
Norberg, P. A., & Horne, D. R. (2007). Privacy attitudes and privacy-related behavior. Psychology & Marketing, 24(10), 829–847. https://doi.org/10.1002/mar.20186
Nouh, M., Almaatouq, A., Alabdulkareem, A., Singh, V. K., Shmueli, E., Alsaleh, M., … Pentland, A. (2014). Social information leakage: Effects of awareness and peer pressure on user behavior. Proceedings of the 16th International Conference on Human-Computer Interaction, 8533, 352–360. https://doi.org/10.1007/978-3-319-07620-1_31
Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Direct Marketing, 9(3), 46–60. https://doi.org/10.1002/(SICI)1522-7138(199723)11:43.0.CO;2-F
Oetzel, M. C., & Gonja, T. (2011). The online privacy paradox: A social representations perspective. Conference on Human Factors in Computing Systems - Proceedings, 2107–2112. https://doi.org/10.1145/1979742.1979887
Okoli, C. (2015). A Guide to Conducting a Standalone Systematic Literature Review. Communications of the Association for Information Systems, 37(43), 879–910.
Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, (6), 642–660. https://doi.org/10.1057/s41303-017-0056-z
Palmatier, R. W., & Martin, K. D. (2019). The Intelligent Marketer’s Guide to Data Privacy. Basingstoke: palgrave macmillan.
Paradise, A., & Sullivan, M. (2012). (In)Visible Threats? The third-person effect in perceptions of the influence of facebook. Cyberpsychology, Behavior, and Social Networking, 15(1), 55–60. https://doi.org/10.1089/cyber.2011.0054
Park, Y. J., Chung, J. E., & Shin, D. H. (2018). The Structuration of Digital Ecosystem, Privacy, and Big Data Intelligence. American Behavioral Scientist, 62(10), 1319–1337. https://doi.org/10.1177/0002764218787863
Pavlou, P. A. (2011). State of the information privacy literature: where are we now and where should we go? MIS Quarterly, 35(4), 977–988.
Petronio, S. (2010). Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation? Journal of Family Theory & Review, 2(3), 175–196. https://doi.org/10.1111/j.1756-2589.2010.00052.x
Petronio, S. (2013). Brief Status Report on Communication Privacy Management Theory. Journal of Family Communication, 13(1), 6–14. https://doi.org/10.1080/15267431.2013.743426
Petronio, S., & Child, J. T. (2020). Conceptualization and operationalization: utility of communication privacy management theory. Current Opinion in Psychology, 31(2), 76–82. https://doi.org/10.1016/j.copsyc.2019.08.009
Plangger, K., & Montecchi, M. (2020). Thinking Beyond Privacy Calculus: Investigating Reactions to Customer Surveillance. Journal of Interactive Marketing, 50, 32–44. https://doi.org/10.1016/j.intmar.2019.10.004
Posner, R. A. (1981). The Economics of Privacy. The Amrican Economic Review, 71(2), 405–409.
Pötzsch, S., Wolkerstorfer, P., & Graf, C. (2010). Privacy-Awareness Information for Web Forums: Results from an Empirical Study. In ACM (Ed.), NordiCHI (pp. 363–372). Reykjavik: ACM.
Prince, C. (2018). Do consumers want to control their personal data? Empirical evidence. International Journal of Human Computer Studies, 110(March 2016), 21–32. https://doi.org/10.1016/j.ijhcs.2017.10.003
Puaschunder, J. (2020). Towards a Utility Theory of Privacy and Information Sharing and the Introduction of Hyper-Hyperbolic Discounting in the Digital Big Data Age. In Handbook of Research on Social and Organizational Dynamics in the Digital Era (pp. 4–46). https://doi.org/10.4018/978-1-5225-8933-4.ch008
Raento, M., & Oulasvirta, A. (2008). Designing for privacy and self-presentation in social awareness. Personal and Ubiquitous Computing, 12(7), 527–542. https://doi.org/10.1007/s00779-008-0200-9
Reidenberg, J. R., Russell, C. N., Callen, A. J., Qasir, S., & Norton, T. (2014). Privacy Harms and the Effectiveness of the Notice and Choice Framework. Journal of Law and Policy for the Information Society, 11(2), 485–524.
Richards, N. M. (2008). Intellectual privacy. Texas Law Review, 87(2), 387–445.
Richards, N. M., & Hartzog, W. (2019). The Pathologies of Digital Consent. Washington University Law Review, 1461–1503. Retrieved from https://papers.ssrn.com/abstract=3370433
Rodriguez, S. (2021, February 1). Facebook strikes back against Apple privacy change, prompts users to accept tracking to get ‘better ads experience.’ CNBC. Retrieved from https://www.cnbc.com/2021/02/01/facebook-strikes-back-against-apple-ios-14-idfa-privacy-change.html
Rubin, A. M. (1984). Ritualized and Instrumental Television Viewing. Journal of Communication, 34(3), 67–77. https://doi.org/https://doi.org/10.1111/j.1460-2466.1984.tb02174.x
Saeri, A. K., Ogilvie, C., La Macchia, S. T., Smith, J. R., & Louis, W. R. (2014). Predicting Facebook Users’ Online Privacy Protection: Risk, Trust, Norm Focus Theory, and the Theory of Planned Behavior. The Journal of Social Psychology, 154(4), 352–369. https://doi.org/10.1080/00224545.2014.914881
Sanchez-Rola, I., Dell’amico, M., Kotzias, P., Eurecom, D. B., Bilge, L., Vervier, P.-A., … Balzarotti, D. (2019). Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control. AsiaCCS, 12, 340–351. https://doi.org/10.1145/3321705.3329806
Sarathy, R., & Robertson, C. J. (2003). Strategic and Ethical Considerations in Managing Digital Privacy. In Source: Journal of Business Ethics (Vol. 46).
Schade, M., Piehler, R., Warwitz, C., & Burmann, C. (2018). Increasing consumers’ intention to use location-based advertising. Journal of Product and Brand Management, 27(6), 661–669. https://doi.org/10.1108/JPBM-06-2017-1498
Schaub, F., Könings, B., & Weber, M. (2015). Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1), 34–43. https://doi.org/10.1109/MPRV.2015.5
Schmidt, L., Bornschein, R., & Maier, E. (2020). The effect of privacy choice in cookie notices on consumers’ perceived fairness of frequent price changes. Psychology & Marketing, 1–14. https://doi.org/10.1002/mar.21356
Simon, H. A. (1982). Models of Bounded Rationality. Cambridge: MIT Press.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1015.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196.
Solove, D. J. (2013). Privacy Self-Management and the Consent Dilemma. Harvard Law Review, 126, 1880–1903.
Solove, D. J. (2021). The Myth of the Privacy Paradox. George Washington Law Review, 89(1), 1–51. Retrieved from https://heinonline.org/HOL/Page?handle=hein.journals/gwlr89&id=15&div=4&collection=journals
Son, B. J.-Y., & Kim, S. S. (2008). Internet User’s Information Privacy-Protective Responses: A Taxonomy and Nomological Model. MIS Quarterly, 32(3), 503–529.
Sproull, L., & Kiesler, S. (1986). Reducing Social Context Cues : Electronic Mail in Organizational Communications Author ( s ): Lee Sproull and Sara Kiesler Published by : INFORMS Stable URL : http://www.jstor.org/stable/2631506 Accessed : 01-03-2016 17 : 01 UTC Your use of the JSTOR arch. Management Science, 32(11), 1492–1512. https://doi.org/10.1007/BF02904649
Steiner, P. H., & Maas, P. (2018). When customers are willing to disclose information in the insurance industry: A multi-group analysis comparing ten countries. International Journal of Bank Marketing, 36(6), 1015–1033. https://doi.org/10.1108/IJBM-12-2016-0183
Sun, S. (2008, December). Organizational Culture and Its Themes. International Journal of Business and Management, 137–141.
Sundar, S., & Kim, J. (2019). Machine heuristic: When we trust computers more than humans with our personal information. Conference on Human Factors in Computing Systems - Proceedings, 1–9. https://doi.org/10.1145/3290605.3300768
Sundar, S. S., Kang, H., Zhang, B., Go, E., & Wu, M. (2013). Unlocking the Privacy Paradox: Do Cognitive Heuristics Hold the Key? Conference on Human Factors in Computing Systems - Proceedings, April, 811–816. https://doi.org/10.1145/2468356.2468501
Sundar, S. S., Kim, J., Rosson, M. B., & Molina, M. D. (2020). Online Privacy Heuristics that Predict Information Disclosure. Conference on Human Factors in Computing Systems - Proceedings, 1–12. https://doi.org/10.1145/3313831.3376854
Taneja, A., Vitrano, J., & Gengo, N. J. (2014). Rationality-based beliefs affecting individual’s attitude and intention to use privacy controls on Facebook: An empirical investigation. Computers in Human Behavior, 38, 159–173. https://doi.org/10.1016/j.chb.2014.05.027
Tang, Z., Hu, Y., & Smith, M. D. (2008). Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor. Journal of Management Information Systems, 24(4), 153–173. https://doi.org/10.2753/MIS0742-1222240406
Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533. https://doi.org/10.1002/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z
Teixeira, G. A., da Silva, M. M., & Pereira, R. (2020). The Critical Success Factors of GDPR Implementation : a Systematic Literature Review. Digital Policy, Regulation and Governance, 21(4), 402–418. https://doi.org/https://dx.doi.org/10.1108/DPRG-01-2019-0007
Teng, P. K., Heng, B. L. J., & Wong Abdullah, S. I. N. (2019). Distinctive Comparison of Consumers’ Mobile Payment Adoption between China and Malaysia. Asia Proceedings of Social Sciences, 2(3), 57–61. https://doi.org/10.31580/apss.v2i3.258
Van Eerde, W., & Thierry, H. (1996). Vroom’s Expectancy Models and Work-Related Criteria : Journal of Applied Psychology, 81(5), 575–586.
Vergara-Laurens, I. J., Jaimes, L. G., & Labrador, M. A. (2017, August 1). Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges. IEEE Internet of Things Journal, Vol. 4, pp. 855–869. https://doi.org/10.1109/JIOT.2016.2594205
Völckner, F., & Sattler, H. (2006). Drivers of brand extension success. Journal of Marketing, 70(2), 18–34. https://doi.org/10.1509/jmkg.70.2.18
Vroom, V. H. (1964). Work and motivation. Retrieved from http://garfield.library.upenn.edu/classics1985/A1985AKX9100001.pdf
Waldman, A. E. (2020). Cognitive biases, dark patterns, and the “privacy paradox.” Current Opinion in Psychology, 31(2), 105–109. https://doi.org/10.1016/j.copsyc.2019.08.025
Walther, J. B., & Parks, M. R. (2002). Cues Filtered Out, Cues Filtered In: Computer-Mediated Communication and Relationships. In M. L. Knapp & J. A. Daly (Eds.), Handbook of interpersonal communication (Vol. 3, pp. 529–563). Retrieved from https://www.researchgate.net/publication/239489124
Wang, H., Lee, M. K. O., & Wang, C. (1998). Consumer Privacy Concerns about Internet Marketing. Communications of the ACM, 41(3), 63–70. https://doi.org/10.1145/272287.272299
Wang, L., Hu, H. H., Yan, J., & Mei, M. Q. (2019). Privacy calculus or heuristic cues? The dual process of privacy decision making on Chinese social media. Journal of Enterprise Information Management, 33(2), 353–380. https://doi.org/10.1108/JEIM-05-2019-0121
Wang, N., Sun, Y., Shen, X. L., Liu, D., & Zhang, X. (2019). Just being there matters: Investigating the role of sense of presence in Like behaviors from the perspective of symbolic interactionism. Internet Research, 29(1), 60–81. https://doi.org/10.1108/IntR-08-2017-0299
Wang, Y., & Lo, H.-P. (2003). Customer-focused performance and the dynamic model for competence building and leveraging A resource-based view. Journal of Management Development, 486–526. https://doi.org/10.1108/02621710310478486
Waters, S., & Ackerman, J. (2011). Exploring Privacy Management on Facebook: Motivations and Perceived Consequences of Voluntary Disclosure. Journal of Computer-Mediated Communication, 17(1), 101–115. https://doi.org/10.1111/j.1083-6101.2011.01559.x
Westin, A. F. (2003). Social and Political Dimensions of Privacy. Journal of Social Issues, 59(2), 431–453. https://doi.org/10.1111/1540-4560.00072
Whitman, J. Q. (2004). The Two Western Cultures of Privacy: Dignity versus Liberty. In Source: The Yale Law Journal (Vol. 113). The Yale Law Journal Company, Inc.
Wilkie, W. L., & Moore, E. S. (2011). Expanding our understanding of marketing in society. Journal of the Academy of Marketing Science, 40, 53–73. https://doi.org/10.1007/s11747-011-0277-y
Williams, M., Nurse, J. R. C., & Creese, S. (2016). The perfect storm: The privacy paradox and the Internet-of-things. Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, 644–652. https://doi.org/10.1109/ARES.2016.25
Wilson, D. W., & Valacich, J. S. (2012). Unpacking the Privacy Paradox: Irrational Decision-Making within the Privacy Calculus. ICIS 2012, 1–28. https://doi.org/10.1.1.690.1819
Wirth, J., Maier, C., Laumer, S., & Weitzel, T. (2019). Perceived information sensitivity and interdependent privacy protection: a quantitative study. Electronic Markets, 29, 359–378. https://doi.org/10.1007/s12525-019-00335-0
Wirtz, J., & Lwin, M. O. (2009). Regulatory Focus Theory, Trust, and Privacy Concern. Journal of Service Research, 12(2), 190–207. https://doi.org/10.1177/1094670509335772
Wright, P. M., & McMahan, G. C. (1992). Theoretical Perspectives for Strategic Human Resource Management. Journal of Management, 18(2), 295–320. https://doi.org/10.1177/014920639201800205
Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889–897. https://doi.org/10.1016/j.chb.2011.12.008
Xu, H., Luo, X. (Robert), Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42–52. https://doi.org/10.1016/j.dss.2010.11.017
Youn, S. (2009). Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. In The Journal of Consumer Affairs (Vol. 43).
Young, A. L., & Quan-Haase, A. (2013). Privacy Protection Strategies on Facebook - The Internet Privacy Paradox Revisited. Information, Communication & Society, 16(4), 479–500. https://doi.org/10.1080/1369118X.2013.777757
Yun, H., Lee, G., & Kim, D. J. (2019). A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs. Information and Management, 56(4), 570–601. https://doi.org/10.1016/j.im.2018.10.001
Zafeiropoulou, A. M., Millard, D. E., Webber, C., & O’Hara, K. (2013). Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? Proceedings of the 5th Annual ACM Web Science Conference, WebSci’13, 463–472. https://doi.org/10.1145/2464464.2464503
Zhang, Y., Wang, T., & Hsu, C. (2019). The effects of voluntary GDPR adoption and the readability of privacy statements on customers’ information disclosure intention and trust. Journal of Intellectual Capital, 21(2), 145–163. https://doi.org/10.1108/JIC-05-2019-0113
Zhou, K. Z., & Li, C. B. (2010). How strategic orientations influence the building of dynamic capability in emerging economies. Journal of Business Research, 63(3), 224–231. https://doi.org/10.1016/j.jbusres.2009.03.003
Zhu, H., Ou, C. X. J., van den Heuvel, W. J. A. M., & Liu, H. (2017). Privacy calculus and its utility for personalization services in e-commerce: An analysis of consumer decision-making. Information & Management, 54(4), 427–437. https://doi.org/10.1016/j.im.2016.10.001
Additional Information
Online Version
Eprints ID
262939
File(s)
Loading...
open access
Name
Gotsch-Schögel2021_Article_AddressingThePrivacyParadoxOnT.pdf
Size
3.1 MB
Format
Adobe PDF
Checksum (MD5)
7243cc49e66efbf96acf611fba5fa07b