Author Contributions
Conceptualization, J.T. and B.Z.; Data curation, J.T. and U.A.; Formal analysis, J.T. and B.Z.; Funding acquisition, B.Z. and U.A.; Methodology, J.T., B.Z. and U.A.; Project administration, B.Z. and U.A.; Resources, J.T.; Software, J.T.; Supervision, B.Z. and U.A.; Validation, J.T.; Visualization, J.T.; Writing – original draft, J.T.; Writing—review & editing, B.Z. and U.A. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Roesner, F.; Kohno, T.; Moshchuk, A.; Parno, B.; Wang, H.J.; Cowan, C. User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 224–238. [Google Scholar]
- Erevelles, S.; Fukawa, N.; Swayne, L. Big Data consumer analytics and the transformation of marketing. J. Bus. Res. 2016, 69, 897–904. [Google Scholar] [CrossRef]
- Harris, M.A.; Brookshire, R.; Chin, A.G. Identifying factors influencing consumers’ intent to install mobile applications. Int. J. Inf. Manag. 2016, 36, 441–450. [Google Scholar] [CrossRef]
- Shah, M.H.; Peikari, H.R.; Yasin, N.M. The determinants of individuals’ perceived e-security: Evidence from Malaysia. Int. J. Inf. Manag. 2014, 34, 48–57. [Google Scholar] [CrossRef]
- Shakhovska, N.; Fedushko, S.; Melnykova, N.; Shvorob, I.; Syerov, Y. Big Data analysis in development of personalized medical system. Procedia Comput. Sci. 2019, 160, 229–234. [Google Scholar] [CrossRef]
- Choi, B.C.; Land, L. The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage. Inf. Manag. 2016, 53, 868–877. [Google Scholar] [CrossRef] [Green Version]
- Petronio, S. Boundaries of Privacy; State University of New York: Albany, NY, USA, 2002. [Google Scholar]
- Pentina, I.; Zhang, L.; Bata, H.; Chen, Y. Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Comput. Hum. Behav. 2016, 65, 409–419. [Google Scholar] [CrossRef]
- Xu, R.; Frey, R.M.; Fleisch, E.; Ilic, A. Understanding the impact of personality traits on mobile app adoption–Insights from a large-scale field study. Comput. Hum. Behav. 2016, 62, 244–256. [Google Scholar] [CrossRef]
- Li, P.; Cho, H.; Goh, Z.H. Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus. Telemat. Inform. 2019, 41, 114–125. [Google Scholar] [CrossRef]
- Yeh, C.H.; Wang, Y.S.; Lin, S.J.; Tseng, T.H.; Lin, H.H.; Shih, Y.W.; Lai, Y.H. What drives internet users’ willingness to provide personal information? Online Inf. Rev. 2018, 42, 923–939. [Google Scholar] [CrossRef]
- Wottrich, V.M.; van Reijmersdal, E.A.; Smit, E.G. The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns. Decis. Support Syst. 2018, 106, 44–52. [Google Scholar] [CrossRef]
- Baruh, L.; Secinti, E.; Cemalcilar, Z. Online privacy concerns and privacy management: A meta-analytical review. J. Commun. 2017, 67, 26–53. [Google Scholar] [CrossRef]
- Sutanto, J.; Palme, E.; Tan, C.H.; Phang, C.W. Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Q. 2013, 37, 1141–1164. [Google Scholar] [CrossRef]
- Child, J.T.; Haridakis, P.M.; Petronio, S. Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use. Comput. Hum. Behav. 2012, 28, 1859–1872. [Google Scholar] [CrossRef]
- Chang, Y.; Wong, S.F.; Libaque-Saenz, C.F.; Lee, H. The role of privacy policy on consumers’ perceived privacy. Gov. Inf. Q. 2018, 35, 445–459. [Google Scholar] [CrossRef]
- Xu, H.; Dinev, T.; Smith, J.; Hart, P. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 2011, 12, 1. [Google Scholar] [CrossRef]
- Widjaja, A.E.; Chen, J.V.; Sukoco, B.M.; Ha, Q.A. Understanding Users’ Willingness to Put Their Personal Information on the Personal Cloud-Based Storage applications: An Empirical Study. Comput. Hum. Behav. 2019, 91, 167–185. [Google Scholar] [CrossRef]
- Xu, H.; Teo, H.H.; Tan, B.C.; Agarwal, R. Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Inf. Syst. Res. 2012, 23, 1342–1363. [Google Scholar] [CrossRef]
- Culnan, M.J.; Bies, R.J. Consumer privacy: Balancing economic and justice considerations. J. Soc. Issues 2003, 59, 323–342. [Google Scholar] [CrossRef]
- Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf. Syst. Res. 2004, 15, 336–355. [Google Scholar] [CrossRef] [Green Version]
- Li, H.; Sarathy, R.; Xu, H. The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decis. Support Syst. 2011, 51, 434–445. [Google Scholar] [CrossRef]
- Culnan, M.J.; Armstrong, P.K. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organ. Sci. 1999, 10, 104–115. [Google Scholar] [CrossRef]
- Solove, D.J. Taxonomy of privacy. Univ. Pa. Law Rev. 2006, 335, 335–409. [Google Scholar] [CrossRef]
- Tang, Z.; Hu, Y.J.; Smith, M.D. Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. J. Manag. Inf. Syst. 2008, 24, 153–173. [Google Scholar] [CrossRef] [Green Version]
- Mutimukwe, C.; Kolkowska, E.; Grönlund, Å. Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Gov. Inf. Q. 2020, 37, 101413. [Google Scholar] [CrossRef]
- King, N.J.; Raja, V.T. Protecting the privacy and security of sensitive customer data in the cloud. Comput. Law Secur. Rev. 2012, 28, 308–319. [Google Scholar] [CrossRef]
- Metzger, M.J. Communication privacy management in electronic commerce. J. Comput. Mediat. Commun. 2007, 12, 335–361. [Google Scholar] [CrossRef] [Green Version]
- Celsi, R.L.; Olson, J.C. The role of involvement in attention and comprehension processes. J. Consum. Res. 1988, 15, 210–224. [Google Scholar] [CrossRef]
- Xu, Y.; Chen, Z. Relevance judgment: What do information users consider beyond topicality? J. Am. Soc. Inf. Sci. Technol. 2006, 57, 961–973. [Google Scholar] [CrossRef]
- Stanton, J.M.; Stam, K. Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveill. Soc. 2003, 1, 152–190. [Google Scholar] [CrossRef]
- Zimmer, J.C.; Arsal, R.; Al-Marzouq, M.; Moore, D.; Grover, V. Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure. Decis. Support Syst. 2010, 48, 395–406. [Google Scholar] [CrossRef]
- Lyon, D.; Waldo, J.; Lin, H.S.; Millett, L.I. A Short History of Surveillance and Privacy in the United States. In Engaging Privacy and Information Technology in a Digital Age; National Academies Press: Washington, DC, USA, 2007. [Google Scholar]
- Milne, G.R.; Culnan, M.J. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. J. Interact. Mark. 2004, 18, 15–29. [Google Scholar] [CrossRef]
- Zhou, L.; Wang, W.; Xu, J.D.; Liu, T.; Gu, J. Perceived information transparency in B2C e-commerce: An empirical investigation. Inf. Manag. 2018, 55, 912–927. [Google Scholar] [CrossRef]
- Libaque-Sáenz, C.F.; Wong, S.F.; Chang, Y.; Bravo, E.R. The effect of Fair information practices and data collection methods on privacy-related behaviors: A study of Mobile apps. Inf. Manag. 2020, 58, 103284. [Google Scholar] [CrossRef]
- Xu, H.; Teo, H.H.; Tan, B.C.; Agarwal, R. The role of push-pull technology in privacy calculus: The case of location-based services. J. Manag. Inf. Syst. 2009, 26, 135–174. [Google Scholar] [CrossRef]
- Gibson, J.L.; Caldeira, G.A. The legal cultures of Europe. Law Soc. Rev. 1996, 30, 55–85. [Google Scholar] [CrossRef]
- Zucker, L.G. Production of trust: Institutional sources of economic structure, 1840–1920. In Research in Organizational Behavior; Staw, B.M., Cummings, L.L., Eds.; JAI Press: Greenwich, CT, USA, 1986; Volume 8, pp. 53–111. [Google Scholar]
- Spiro, W.G.; Houghteling, L.J. The Dynamics of Law, 2nd ed.; Harcourt Brace Jovanovich: New York, NY, USA, 1981. [Google Scholar]
- CTIA. Best Practices and Guidelines for Location Based Services. The Cellular Telecommunications and Internet Association (CTIA). 2008. Available online: http://www.ctia.org/content/index.cfm/AID/11300 (accessed on 30 July 2021).
- Kim, D.; Ferrin, D.; Rao, R. A trust-based consumer decision-making model in electronic commerce. Decis. Support Syst. 2008, 44, 544–564. [Google Scholar] [CrossRef]
- Petronio, S. Boundaries of Privacy: Dialectics of Disclosure; Suny Press: Albany, NY, USA, 2012. [Google Scholar]
- Petronio, S. Brief status report on communication privacy management theory. J. Fam. Commun. 2013, 13, 6–14. [Google Scholar] [CrossRef]
- Xu, H.; Teo, H.H. Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In Proceedings of the International Conference on Information Systems, ICIS 2004, Washington, DC, USA, 12–15 December 2004. [Google Scholar]
- Hajli, N.; Lin, X. Exploring the security of information sharing on social networking sites: The role of perceived control of information. J. Bus. Ethics 2016, 133, 111–123. [Google Scholar] [CrossRef]
- Taddei, S.; Contena, B. Privacy, trust and control: Which relationships with online self-disclosure? Comput. Hum. Behav. 2013, 29, 821–826. [Google Scholar] [CrossRef]
- Krasnova, H.; Spiekermann, S.; Koroleva, K.; Hildebrand, T. Online social networks: Why we disclose. J. Inf. Technol. 2010, 25, 109–125. [Google Scholar] [CrossRef]
- Havlena, W.J.; DeSarbo, W.S. On the measurement of perceived consumer risk. Decis. Sci. 1991, 22, 927–939. [Google Scholar] [CrossRef] [Green Version]
- Shaw, N.; Sergueeva, K. The non-monetary benefits of mobile commerce: Extending UTAUT2 with perceived value. Int. J. Inf. Manag. 2019, 45, 44–55. [Google Scholar] [CrossRef]
- Dowling, G.R.; Staelin, R. A model of perceived risk and intended risk-handling activity. J. Consum. Res. 1994, 21, 119–134. [Google Scholar] [CrossRef]
- Dinev, T.; Hart, P. An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 2006, 17, 61–80. [Google Scholar] [CrossRef]
- Liu, C.; Marchewka, J.T.; Lu, J.; Yu, C.S. Beyond concern—A privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 2005, 42, 289–304. [Google Scholar] [CrossRef]
- Kim, G.; Koo, H. The causal relationship between risk and trust in the online marketplace: A bidirectional perspective. Comput. Hum. Behav. 2016, 55, 1020–1029. [Google Scholar] [CrossRef]
- Flavián, C.; Guinalíu, M.; Gurrea, R. The role played by perceived usability, satisfaction and consumer trust on website loyalty. Inf. Manag. 2006, 43, 1–14. [Google Scholar] [CrossRef]
- Dinev, T.; Xu, H.; Smith, J.H.; Hart, P. Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. Eur. J. Inf. Syst. 2013, 22, 295–316. [Google Scholar] [CrossRef]
- Gashami, J.P.G.; Chang, Y.; Rho, J.J.; Park, M.C. Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach. Inf. Dev. 2016, 32, 837–852. [Google Scholar] [CrossRef]
- Anderson, C.L.; Agarwal, R. The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Inf. Syst. Res. 2011, 22, 469–490. [Google Scholar] [CrossRef]
- Jung, Y.; Park, J. An investigation of relationships among privacy concerns, affective responses, and coping behaviors in location-based services. Int. J. Inf. Manag. 2018, 43, 15–24. [Google Scholar] [CrossRef]
- Pavlou, P.A.; Liang, H.; Xue, Y. Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Q. 2007, 31, 105–136. [Google Scholar] [CrossRef] [Green Version]
- Balapour, A.; Nikkhah, H.R.; Sabherwal, R. Mobile application security: Role of perceived privacy as the predictor of security perceptions. Int. J. Inf. Manag. 2020, 52, 102063. [Google Scholar] [CrossRef]
- Junglas, I.A.; Johnson, N.A.; Spitzmüller, C. Personality traits and concern for privacy: An empirical study in the context of location-based services. Eur. J. Inf. Syst. 2008, 17, 387–402. [Google Scholar] [CrossRef]
- Bansal, G.; Zahedi, F.M.; Gefen, D. Do context and personality matter? Trust and privacy concerns in disclosing private information online. Inf. Manag. 2016, 53, 1–21. [Google Scholar] [CrossRef]
- Degirmenci, K. Mobile users’ information privacy concerns and the role of app permission requests. Int. J. Inf. Manag. 2020, 50, 261–272. [Google Scholar] [CrossRef]
- Van Dyke, T.P.; Midha, V.; Nemati, H. The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electron. Mark. 2007, 17, 68–81. [Google Scholar] [CrossRef]
- Baptista, G.; Oliveira, T. Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators. Comput. Hum. Behav. 2015, 50, 418–430. [Google Scholar] [CrossRef]
- Van Slyke, C.; Shim, J.T.; Johnson, R.; Jiang, J.J. Concern for information privacy and online consumer purchasing. J. Assoc. Inf. Syst. 2006, 7, 16. [Google Scholar]
- Schoenbachler, D.D.; Gordon, G.L. Trust and customer willingness to provide information in database-driven relationship marketing. J. Interact. Mark. 2002, 16, 2–16. [Google Scholar] [CrossRef]
- Wu, K.W.; Huang, S.Y.; Yen, D.C.; Popova, I. The effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 2012, 28, 889–897. [Google Scholar] [CrossRef]
- Rosenthal, R.; Rosnow, R.L. Applying Hamlet’s question to the ethical conduct of research: A conceptual addendum. Am. Psychol. 1984, 39, 561. [Google Scholar] [CrossRef]
- Awad, N.F.; Krishnan, M.S. The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 2006, 30, 13–28. [Google Scholar] [CrossRef] [Green Version]
- Fang, Y.; Qureshi, I.; Sun, H.; McCole, P.; Ramsey, E.; Lim, K.H. Trust, satisfaction, and online repurchase intention. MIS Q. 2014, 38, 407–428. [Google Scholar] [CrossRef] [Green Version]
- Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. J. Appl. Psychol. 2003, 88, 879. [Google Scholar] [CrossRef]
- Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Nunnally, J.C. Psychometric Theory; McGraw-Hill Book Company: New York, NY, USA, 1978; pp. 86–113. [Google Scholar]
- Barclay, D.; Thompson, R.; Higgins, C. The Partial Least Squares (PLS) approach to Causal Modeling: Personal Computer Adoption and Use an Illustration. Technol. Stud. 1995, 2, 285–309. [Google Scholar]
- Hui, K.L.; Teo, H.H.; Lee, S.Y.T. The value of privacy assurance: An exploratory field experiment. MIS Q. 2007, 31, 19–33. [Google Scholar] [CrossRef] [Green Version]
- Wang, T.; Duong, T.D.; Chen, C.C. Intention to disclose personal information via mobile applications: A privacy calculus perspective. Int. J. Inf. Manag. 2016, 36, 531–542. [Google Scholar] [CrossRef]
- Gong, X.; Zhang, K.Z.; Chen, C.; Cheung, C.M.; Lee, M.K. What drives self-disclosure in mobile payment ap-plications? The effect of privacy assurance approaches, network externality, and technology complementarity. Inf. Technol. People 2019, 33, 1174–1213. [Google Scholar] [CrossRef]
| Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).