skip to main content
article

Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus

Published: 01 November 2015 Publication History

Abstract

Existing research on information privacy has mostly relied on the privacy calculus model, which views privacy-related decision-making as a rational process where individuals weigh the anticipated risks of disclosing personal data against the potential benefits. In this research, we develop an extension to the privacy calculus model, arguing that the situation-specific assessment of risks and benefits is bounded by 1 pre-existing attitudes or dispositions, such as general privacy concerns or general institutional trust, and 2 limited cognitive resources and heuristic thinking. An experimental study, employing two samples from the USA and Switzerland, examined consumer responses to a new smartphone application that collects driving behavior data and provided converging support for these predictions. Specifically, the results revealed that a situation-specific assessment of risks and benefits fully mediates the effect of dispositional factors on information disclosure. In addition, the results showed that privacy assessment is influenced by momentary affective states, indicating that consumers underestimate the risks of information disclosure when confronted with a user interface that elicits positive affect.

References

[1]
Acquisti, A. 2004 Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the 5th ACM conference on Electronic Commerce, New York, USA.
[2]
Acquisti, A. 2009 Nudging privacy: the behavioral economics of personal information. IEEE Security and Privacy, Volume 7, pp.82-85.
[3]
Acquisti, A., &Grossklags, J. 2005 Privacy and rationality in individual decision-making. IEEE Security and Privacy, Volume 3, pp.26-33.
[4]
Acquisti, A., John, L., &Loewenstein, G. 2009 What is privacy worth? Paper presented at the Twenty First Workshop on Information Systems and Economics WISE, Phoenix, AZ.
[5]
Agosto, D.E. 2002 Bounded rationality and satisficing in young people's Web-based decision making. Journal of the American Society for Information Science and Technology, Volume 53, pp.16-27.
[6]
Ajzen, I. 1985 From Intentions to Actions: A Theory of Planned Behavior. Springer, Berlin.
[7]
Ajzen, I., Brown, T.C. &Carvajal, F. 2004 Explaining the discrepancy between intentions and actions: the case of hypothetical bias in contingent valuation. Personality and Social Psychology Bulletin, Volume 30, pp.1108-1121.
[8]
Alhakami, A.S., &Slovic, P. 1994 A psychological study of the inverse relationship between perceived risk and perceived benefit. Risk Analysis, Volume 14, pp.1085-1096.
[9]
Anderson, C.L. &Agarwal, R. 2011 The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, Volume 22, pp.469-490.
[10]
Awad, N.F. &Krishnan, M.S. 2006 The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, Volume 30, pp.13-28.
[11]
Bansal, G., Zahedi, F.M. &Gefen, D. 2010 The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, Volume 49, pp.138-150.
[12]
Bélanger, F. &Crossler, R.E. 2011 Privacy in the digital Age: a review of information privacy research in information systems. MIS Quarterly, Volume 35, pp.1017-1042.
[13]
Brandimarte, L., Acquisti, A. &Loewenstein, G. 2012 Misplaced confidences: privacy and the control paradox. Social Psychological and Personality Science, Volume 4, pp.340-347.
[14]
Byrne, B.M., Shavelson, R.J. &Muthén, B. 1989 Testing for the equivalence of factor covariance and mean structures: the issue of partial measurement invariance. Psychological Bulletin, Volume 105, pp.456-466.
[15]
Carmines, E.G. &Mciver, J.P. 1981 Analyzing models with unobserved variables: analysis of covariance structures. In: Social Measurement: Current Issues, Bohmstedt, G.W. &Borgatta, E.F. Eds., pp. pp.65-115. Sage, Newberry Park, CA.
[16]
Chin, W.W., &Gopal, A. 1995 Adoption intention in GSS: relative importance of beliefs. ACM SigMIS Database, Volume 26, pp.42-64.
[17]
Coan, J.A. &Allen, J.J.B. 2007 Handbook of Emotion Elicitation and Assessment. Oxford University Press, Oxford.
[18]
Conger, S., Pratt, J.H. &Loch, K.D. 2013 Personal information privacy and emerging technologies. Information Systems Journal, Volume 23, pp.401-417.
[19]
Culnan, M.J. &Armstrong, P.K. 1999 Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, Volume 10, pp.104-115.
[20]
Culnan, M.J. &Bies, R.J. 2003 Consumer privacy: balancing economic and justice considerations. Journal of Social Issues, Volume 59, pp.323-342.
[21]
Culnan, M.J. &Williams, C.C. 2009 How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches. MIS Quarterly, Volume 33, pp.673-687.
[22]
Damasio, A.R. 1994 Descartes' Error: Emotion, Rationality and the Human Brain. Putnam, New York, NY.
[23]
Decoster, J. &Claypool, H.M. 2004 A meta-analysis of priming effects on impression formation supporting a general model of informational biases. Personality and Social Psychology Review, Volume 8, pp.2-27.
[24]
Dinev, T. &Hart, P. 2006 An extended privacy calculus model for e-commerce transactions. Information Systems Research, Volume 17, pp.61-80.
[25]
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I. &Colautti, C. 2006 Privacy calculus model in e-commerce - a study of Italy and the United States. European Journal of Information Systems, Volume 15, pp.389-402.
[26]
Dinev, T., Goo, J., Hu, Q. &Nam, K. 2009 User behaviour towards protective information technologies: the role of national cultural differences. Information Systems Journal, Volume 19, pp.391-412.
[27]
Dinev, T., Xu, H., Smith, J.H. &Hart, P. 2012 Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, Volume 22, pp.61-80.
[28]
Epstein, S. 1994 Integration of the cognitive and the psychodynamic unconscious. American Psychologist, Volume 49, pp.709-724.
[29]
Finucane, M.L. &Holup, J.L. 2006 Risk as value: combining affect and analysis in risk judgments. Journal of Risk Research, Volume 9, pp.141-164.
[30]
Finucane, M.L., Alhakami, A., Slovic, P. &Johnson, S.M. 2000 The affect heuristic in judgments of risks and benefits. Journal of Behavioral Decision Making, Volume 13, pp.1-17.
[31]
Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S. &Combs, B. 1978 How safe is safe enough? a psychometric study of attitudes towards technological risks and benefits. Policy Sciences, Volume 9, pp.127-152.
[32]
Fornell, C. &Larcker, D.F. 1981 Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, Volume 18, pp.39-50.
[33]
Fox, E. 2008 Emotion Science: Cognitive and Neuroscientific Approaches to Understanding Human Emotions. Palgrave, Basingstoke.
[34]
Franko, O.I. &Tirrell, T.F. 2012 Smartphone app use among medical providers in ACGME training programs. Journal of Medical Systems, Volume 36, pp.3135-3139.
[35]
Gefen, D., Straub, D.W. &Boudreau, M.C. 2000 Structural equation modeling and regression: guidelines for research practice. Communications of the Association for Information Systems, Volume 4, pp.2-76.
[36]
Gefen, D., Straub, D.W. &Rigdon, E.E. 2011 An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly, Volume 35, pp.iii-xiv.
[37]
Gigerenzer, G. &Gaissmaier, W. 2011 Heuristic decision making. Annual Review of Psychology, Volume 62, pp.451-482.
[38]
Grossklags, J. &Acquisti, A.C. 2007 When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. Paper presented at the Workshop on the Economics of Information Security, New York, NY.
[39]
Hanoch, Y. 2002 " Neither an angel nor an ant": emotion as an aid to bounded rationality. Journal of Economic Psychology, Volume 23, pp.1-25.
[40]
Hsee, C.K. &Rottenstreich, Y. 2004 Music, pandas, and muggers: on the affective psychology of value. Journal of Experimental Psychology: General, Volume 133, pp.23-30.
[41]
Hu, X.R., Wu, G.H., Wu, Y.H. &Zhang, H. 2010 The effects of Web assurance seals on consumers' initial trust in an online vendor: a functional perspective. Decision Support Systems, Volume 48, pp.407-418.
[42]
Hui, K.L., Tan, B.C.Y. &Goh, C.Y. 2006 Online information disclosure: motivators and measurements. ACM Transactions on Internet Technology TOIT, Volume 6, pp.415-441.
[43]
Hui, K.L., Teo, H.H. &Lee, S.Y.T. 2007 The value of privacy assurance: an exploratory field experiment. MIS Quarterly, Volume 31, pp.19-33.
[44]
Johnson, E.J., Bellmann, S. &Lohse, G.L. 2002 Defaults, framing and privacy: Why opting in-opting Out. Marketing Letters, Volume 13, pp.5-15.
[45]
Keith, M., Thompson, S., Hale, J. &Greer, C. 2012 Examining the rationality of location data disclosure through mobile devices. Proceedings of the 33rd International Conference on Information SystemsICIS 2012, Orlando.
[46]
Keith, M.J., Thompson, S.C., Hale, J., Lowry, P.B. &Greer, C. 2013 Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, Volume 71, pp.1163-1173.
[47]
Kim, J., Allen, C.T. &Kardes, F.R. 1996 An investigation of the mediational mechanisms underlying attitudinal conditioning. Journal of Marketing Research, Volume 33, pp.318-328.
[48]
Kim, D.J., Ferrin, D.L. &Rao, H.R. 2008 A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems, Volume 44, pp.544-564.
[49]
Knijnenburg, B.P., Kobsa, A. &Jin, H. 2013 Counteracting the negative effect of form auto-completion on the privacy calculus. Proceedings of the 34th International Conference on Information SystemsICIS 2013, Milan, Italy.
[50]
Kramer, A.D.I., Guillory, J.E. &Hancock, J.T. 2014 Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 10.1073/pnas.1320040111.
[51]
Krasnova, H., Veltri, N.F. &Gunther, O. 2012 Self-disclosure and privacy calculus on social networking sites: the role of culture. Business and Information Systems Engineering, Volume 4, pp.127-135.
[52]
Lerner, J.S., Small, D.A. &Loewenstein, G. 2004 Heart strings and purse strings: carryover effects of emotions on economic decisions. Psychological Science, Volume 15, pp.337-341.
[53]
Li, H., Sarathy, R. &Xu, H. 2011 The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, Volume 51, pp.434-445.
[54]
Li, T., Pavlou, P.A. &Dos Santos, G.L. 2013 What drives users' website registration? A randomized field experiment. Proceedings of the 34th International Conference on Information SystemsICIS 2013, Milan, Italy.
[55]
Loewenstein, G.F., Weber, E.U., Hsee, C.K. &Welch, N. 2001 Risk as feelings. Psychological Bulletin, Volume 127, pp.267-286.
[56]
Mackenzie, S.B., Podsakoff, P.M. &Podsakoff, N.P. 2011 Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques. MIS Quarterly, Volume 35, pp.293-334.
[57]
MacKinnon, D.P., Lockwood, C.M., Hoffman, J.M., West, S.G. &Sheets, V. 2002 A comparison of methods to test mediation and other intervening variable effects. Psychological Methods, Volume 7, pp.83-104.
[58]
Malhotra, N.K., Kim, S.S. &Agarwal, J. 2004 Internet users' information privacy concerns IUIPC: tthe construct, the scale, and a causal model. Information Systems Research, Volume 15, pp.336-355.
[59]
Milne, G.R. &Culnan, M.J. 2002 Using the content of online privacy notices to inform public policy: a longitudinal analysis of the 1998-2001 US web surveys. The Information Society, Volume 18, pp.345-359.
[60]
Mothersbaugh, D.L., Foxx, W.K., Beatty, S.E. &Wang, S.J. 2012 Disclosure antecedents in an online service context: the role of sensitivity of information. Journal of Service Research, Volume 15, pp.76-98.
[61]
Muthén, L.K. &Muthén, B.O. 2011 MPlus Version 6.12.
[62]
Mylonas, A., Meletiadis, V., Mitrou, L. &Gritzalis, D. 2013 Smartphone sensor data as digital evidence. Computers and Security, Volume 38, pp.51-75.
[63]
Nesse, R.M. &Klaas, R. 1994 Risk perception by patients with anxiety disorders. The Journal of Nervous and Mental Disease, Volume 182, pp.465-470.
[64]
Norberg, P.A., Horne, D.R. &Horne, D.A. 2007 The privacy paradox: personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, Volume 41, pp.100-126.
[65]
Nyshadham, E.A. &Castano, D. 2012 Affect and online privacy concerns. SSRN Electronic Journal. available from: "http://ssrn.com/abstract=2051044".
[66]
Pachur, T., Hertwig, R. &Steinmann, F. 2012 How do people judge risks: availability heuristic, affect heuristic, or both? Journal of Experimental Psychology: Applied, Volume 18, pp.314-330.
[67]
Pavlou, P.A. 2011 State of the information privacy literature: where are we now and where should we go? MIS Quarterly, Volume 35, pp.977-988.
[68]
Pavlou, P.A. &Fygenson, M. 2006 Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior. MIS Quarterly, Volume 30, pp.115-143.
[69]
Pavlou, P.A. &Gefen, D. 2004 Building effective online marketplaces with institution-based trust. Information Systems Research, Volume 15, pp.37-59.
[70]
Pengnate, S. &Antonenko, P. 2013 A multimethod evaluation of online trust and its interaction with metacognitive awareness: an emotional design perspective. International Journal of Human-Computer Interaction, Volume 29, pp.582-593.
[71]
Podsakoff, P.M., Mackenzie, S.B., Lee, J.Y. &Podsakoff, N.P. 2003 Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, Volume 88, pp.879-903.
[72]
Reyna, V.F. 2004 How people make decisions that involve risk - a dual-processes approach. Current Directions in Psychological Science, Volume 13, pp.60-66.
[73]
Rohm, A.J. &Milne, G.R. 2004 Just what the doctor ordered: the role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, Volume 57, pp.1000-1011.
[74]
Satorra, A. &Bentler, P.M. 2001 A scaled difference Chi-square test statistic for moment structure analysis. Psychometrika, Volume 66, pp.507-514.
[75]
Schwarz, N. 2011 Feelings-as-information theory. In: Handbook of Theories of Social Psychology, Van Lange, P., Kruglanski, A.W. &Higgins, E.T. Eds., pp. pp.289-308. Sage Publications Ltd., London.
[76]
Segars, A.H., &Grover, V. 1993 Re-examining perceived ease of use and usefulness. MIS Quarterly, Volume 17, pp.517-525.
[77]
Siegrist, M., Cvetkovich, G., &Roth, C. 2000 Salient value similarity, social trust, and risk/benefit perception. Risk Analysis, Volume 20, pp.353-362.
[78]
Simon, H.A. 1955 A behavioral model of rational choice. The Quarterly Journal of Economics, Volume 69, pp.99-118.
[79]
Simon, H.A. 1979 Rational decision making in business organizations. The American Economic Review, Volume 69, pp.493-513.
[80]
Slovic, P., Finucane, M.L., Peters, E. &Macgregor, D.G. 2004 Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality. Risk Analysis, Volume 24, pp.311-322.
[81]
Slovic, P., Finucane, M.L., Peters, E. &Macgregor, D.G. 2007 The affect heuristic. European Journal of Operational Research, Volume 177, pp.1333-1352.
[82]
Smith, H.J., Dinev, T. &Xu, H. 2011 Information privacy research: an interdisciplinary review. MIS Quarterly, Volume 35, pp.989-1015.
[83]
Sonderegger, A. &Sauer, J. 2010 The influence of design aesthetics in usability testing: effects on user performance and perceived usability. Applied Ergonomics, Volume 41, pp.403-410.
[84]
Sonderegger, A., Zbinden, G., Uebelbacher, A. &Sauer, J. 2012 The influence of product aesthetics and usability over the course of time: a longitudinal field experiment. Ergonomics, Volume 55, pp.713-730.
[85]
Stahl, B.C. 2012 Morality, ethics, and reflection: a categorization of normative IS research. Journal of the Association for Information Systems, Volume 13, pp.636-656.
[86]
Steenkamp, J.-B.E. M., &Baumgartner, H. 1998 Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research, Volume 25, pp.78-107.
[87]
Stone, J. &Fernandez, N.C. 2008 To practice what we preach: the use of hypocrisy and cognitive dissonance to motivate behavior change. Social and Personality Psychology Compass, Volume 2, pp.1024-1051.
[88]
Teo, T., Lee, C.B., Chai, C.S. &Wong, S.L. 2009 Assessing the intention to use technology among pre-service teachers in Singapore and Malaysia: a multigroup invariance analysis of the technology acceptance model TAM. Computers & Education, Volume 53, pp.1000-1009.
[89]
Tsai, J.Y., Egelman, S., Cranor, L. &Acquisti, A. 2011 The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research, Volume 22, pp.254-268.
[90]
Van De Schoot, R., Lugtig, P. &Hox, J. 2012 A checklist for testing measurement invariance. European Journal of Developmental Psychology, Volume 9, pp.486-492.
[91]
Van Slyke, C., Shim, J.T., Johnson, R. &Jiang, J. 2006 Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, Volume 7, pp.415-444.
[92]
Vandenberg, R.J. &Lance, C.E. 2000 A review and synthesis of the measurement invariance literature: suggestions, practices, and recommendations for organizational research. Organizational Research Methods, Volume 3, pp.4-70.
[93]
Wakefield, R. 2013 The influence of user affect in online information disclosure. Journal of Strategic Information Systems, Volume 22, pp.157-174.
[94]
Walsham, G. 1996 Ethical theory, codes of ethics and IS practice. Information Systems Journal, Volume 6, pp.69-81.
[95]
Wilson, D. &Valacich, J. 2012 Unpacking the privacy paradox: irrational decision-making within the privacy calculus. Proceedings of the 33rd International Conference on Information SystemsICIS 2012, Orlando.
[96]
Xie, E., Teo, H.-H. &Wan, W. 2006 Volunteering personal information on the Internet: effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, Volume 17, pp.61-74.
[97]
Xu, H., Teo, H.H., Tan, B.C.Y. &Agarwal, R. 2009 The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, Volume 26, pp.135-173.
[98]
Xu, H., Dinev, T., Smith, J.H. &Hart, P. 2011a Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, Volume 12, pp.798-824.
[99]
Xu, H., Luo, X., Carroll, J.M. &Rosson, M.B. 2011b The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decision Support Systems, Volume 51, pp.42-52.
[100]
Zajonc, R.B. 1980 Feeling and thinking - preferences need no inferences. American Psychologist, Volume 35, pp.151-175.
[101]
Zhang, P. 2008. Toward a positive design theory: Principles for designing motivating information and communication technology. In: Advances in Designing Information and Organizations with a Positive Lens Advances in Appreciative Inquiry, Volume 2, Avital, M., Boland, R.J. &Cooperrider, D.L. Eds., pp. pp.45-74. JAI Press, Greenwich, CT.

Cited By

View all
  • (2024)In the context of e-commerce, the influence mechanism of short video algorithm perception on users' purchase intention is studied based on PSL-SEM methodProceedings of the 2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence10.1145/3675417.3675515(593-598)Online publication date: 19-Jan-2024
  • (2024)Inside Out or Not: Privacy Implications of Emotional DisclosureCompanion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/3675094.3677598(121-125)Online publication date: 5-Oct-2024
  • (2024)Personal Data-Less Personalized Software ApplicationsCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663781(477-481)Online publication date: 10-Jul-2024
  • Show More Cited By
  1. Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Information Systems Journal
      Information Systems Journal  Volume 25, Issue 6
      November 2015
      94 pages
      ISSN:1350-1917
      EISSN:1365-2575
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 01 November 2015

      Author Tags

      1. affect heuristic
      2. privacy calculus
      3. privacy paradox
      4. privacy/information privacy
      5. rational/irrational behavior

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)In the context of e-commerce, the influence mechanism of short video algorithm perception on users' purchase intention is studied based on PSL-SEM methodProceedings of the 2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence10.1145/3675417.3675515(593-598)Online publication date: 19-Jan-2024
      • (2024)Inside Out or Not: Privacy Implications of Emotional DisclosureCompanion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/3675094.3677598(121-125)Online publication date: 5-Oct-2024
      • (2024)Personal Data-Less Personalized Software ApplicationsCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663781(477-481)Online publication date: 10-Jul-2024
      • (2024)Better Living Through Creepy Technology? Exploring Tensions Between a Novel Class of Well-Being Apps and Affective Discomfort in App CultureProceedings of the ACM on Human-Computer Interaction10.1145/36372998:CSCW1(1-39)Online publication date: 26-Apr-2024
      • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
      • (2024)Is pay-or-consent for privacy justifiable? Evidence from different users' privacy attitudes toward behavioral data collection in South KoreaTelecommunications Policy10.1016/j.telpol.2024.10279448:7Online publication date: 1-Aug-2024
      • (2024)Predicting individuals’ privacy protection and self-tracking behaviors in the context of smart healthTelematics and Informatics10.1016/j.tele.2023.10206986:COnline publication date: 14-Mar-2024
      • (2024)The moderating role of e-lifestyle on disclosure intention in mobile bankingElectronic Commerce Research and Applications10.1016/j.elerap.2024.10137464:COnline publication date: 1-Mar-2024
      • (2024)Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce servicesComputers and Security10.1016/j.cose.2023.103646138:COnline publication date: 1-Mar-2024
      • (2024)How do people make decisions in disclosing personal information in tourism group recommendations in competitive versus cooperative conditions?User Modeling and User-Adapted Interaction10.1007/s11257-023-09375-w34:3(549-581)Online publication date: 1-Jul-2024
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media