The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review

•This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect their data.•Risk-benefit evaluation or little risk assessment drives information disclosure.•Design solutions of mobile apps should be adapted t...

Full description

Saved in:
Bibliographic Details
Published in:Telematics and informatics Vol. 34; no. 7; pp. 1038 - 1058
Main Authors: Barth, Susanne, de Jong, Menno D.T.
Format: Journal Article
Language:English
Published: Oxford Elsevier Ltd 01.11.2017
Elsevier Science Ltd
Subjects:
ISSN:0736-5853, 1879-324X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract •This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect their data.•Risk-benefit evaluation or little risk assessment drives information disclosure.•Design solutions of mobile apps should be adapted to different cognitive styles.•Support users through automated user-centered systems and user-friendly interface. Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox. Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user’s decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed.
AbstractList •This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect their data.•Risk-benefit evaluation or little risk assessment drives information disclosure.•Design solutions of mobile apps should be adapted to different cognitive styles.•Support users through automated user-centered systems and user-friendly interface. Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox. Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user’s decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed.
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox. Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user's decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed.
Author de Jong, Menno D.T.
Barth, Susanne
Author_xml – sequence: 1
  givenname: Susanne
  surname: Barth
  fullname: Barth, Susanne
  email: s.barth@utwente.nl
  organization: University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science, Services, Cybersecurity and Safety Research Group, PO Box 217, 7500 AE Enschede, The Netherlands
– sequence: 2
  givenname: Menno D.T.
  surname: de Jong
  fullname: de Jong, Menno D.T.
  email: m.d.t.dejong@utwente.nl
  organization: University of Twente, Faculty of Behavioural, Management and Social Sciences, Department of Communication Science, PO Box 217, 7500 AE Enschede, The Netherlands
BookMark eNp9kL1OHDEUha0IpCyQF0hlKfVM7B17fqQ0COUHCSkNkeisO_Zd8GqwJ9fehe3yDskT8iR42ShFCqrbnO9cne-EHYUYkLH3UtRSyPbjus44Yb0UsquFqoVs3rCF7Luhapbq5ogtRNe0le5185adpLQWJSgHuWB_ru-Qz-S3YHd8BgIXH_nTr9_8MmwxZX8L2Ydb7nyyhDME6zHxEfMDYuD4OBOmhO5fg43BIoXEITgONm9g4jFMPmCB7mDrI720n_O0SxnvS7vlk89IkDeEnHDr8eGMHa9gSvju7z1lP758vr74Vl19_3p5cX5VWdXLXEllHShAOfSi7_XQ9aNqnR5BN4Ar0BoHZUcnrFLoltY52bhONu2IJdlp15yyD4femeLPTZlr1nFDobw0cmhb0Wk16JJaHlKWYkqEK1PW3gPtjBRmb9-szd6-2ds3Qpliv0D9f5D1uayNIRP46XX00wHFMr3oIJOK9eLVeUKbjYv-NfwZ2Leo5g
CitedBy_id crossref_primary_10_1016_j_jbusres_2022_04_034
crossref_primary_10_1007_s11301_021_00239_4
crossref_primary_10_1016_j_jretconser_2020_102127
crossref_primary_10_1080_1369118X_2025_2470227
crossref_primary_10_1186_s41239_024_00471_4
crossref_primary_10_1108_K_05_2021_0377
crossref_primary_10_3389_fdgth_2021_675754
crossref_primary_10_1108_GKMC_12_2021_0209
crossref_primary_10_33225_pec_21_79_162
crossref_primary_10_1016_j_jbusres_2024_114584
crossref_primary_10_2196_31633
crossref_primary_10_1016_j_jretai_2020_10_002
crossref_primary_10_17645_mac_v8i2_2855
crossref_primary_10_1016_j_ijinfomgt_2019_09_011
crossref_primary_10_4018_JGIM_325793
crossref_primary_10_1016_j_chb_2022_107638
crossref_primary_10_3233_IP_211500
crossref_primary_10_1177_10949968251320609
crossref_primary_10_15290_bsp_2021_26_05_04
crossref_primary_10_2196_46562
crossref_primary_10_1145_3440754
crossref_primary_10_1007_s10664_024_10544_7
crossref_primary_10_1016_j_tele_2019_03_003
crossref_primary_10_3390_bs15030324
crossref_primary_10_1080_00167428_2024_2422873
crossref_primary_10_1080_09585192_2024_2445135
crossref_primary_10_1108_AJIM_04_2021_0121
crossref_primary_10_1016_j_chb_2021_106941
crossref_primary_10_1108_INTR_09_2022_0745
crossref_primary_10_3982_TE4390
crossref_primary_10_1007_s12525_025_00805_8
crossref_primary_10_1016_j_jbusres_2019_12_006
crossref_primary_10_1002_cb_2029
crossref_primary_10_1093_cybsec_tyaa014
crossref_primary_10_5817_CP2022_3_1
crossref_primary_10_1016_j_chbah_2023_100039
crossref_primary_10_1016_j_heliyon_2023_e16182
crossref_primary_10_1108_IMDS_09_2023_0623
crossref_primary_10_1371_journal_pone_0253568
crossref_primary_10_15507_1991_9468_029_202501_114_131
crossref_primary_10_3917_dm_111_0011
crossref_primary_10_1177_2056305120978376
crossref_primary_10_1016_j_ribaf_2022_101826
crossref_primary_10_1017_bpp_2021_40
crossref_primary_10_1108_ITP_03_2018_0132
crossref_primary_10_1177_09636625251330575
crossref_primary_10_1016_j_techfore_2022_121592
crossref_primary_10_1080_01639625_2023_2254446
crossref_primary_10_3389_fpsyg_2022_996512
crossref_primary_10_1007_s12525_022_00541_3
crossref_primary_10_1016_j_jretconser_2023_103284
crossref_primary_10_1080_0144929X_2022_2106307
crossref_primary_10_1093_isq_sqae090
crossref_primary_10_2196_13306
crossref_primary_10_1108_YC_05_2024_2072
crossref_primary_10_1007_s00146_019_00916_9
crossref_primary_10_1080_0144929X_2022_2152366
crossref_primary_10_1016_j_tele_2022_101831
crossref_primary_10_1080_08874417_2025_2534545
crossref_primary_10_1177_1461444820924619
crossref_primary_10_1145_3611064
crossref_primary_10_1080_15265161_2023_2263286
crossref_primary_10_2478_bjes_2025_0008
crossref_primary_10_4018_IJCBPL_2019070103
crossref_primary_10_1007_s11257_023_09385_8
crossref_primary_10_1016_j_jretai_2020_05_007
crossref_primary_10_1177_14614448231164934
crossref_primary_10_1016_j_chb_2021_106806
crossref_primary_10_1080_10447318_2025_2498489
crossref_primary_10_17645_mac_v8i2_2875
crossref_primary_10_1080_21639159_2024_2341835
crossref_primary_10_1108_INTR_01_2023_0029
crossref_primary_10_1016_j_jretconser_2023_103272
crossref_primary_10_2196_25525
crossref_primary_10_1080_0144929X_2025_2469657
crossref_primary_10_1109_ACCESS_2018_2836184
crossref_primary_10_15201_hungeobull_69_2_1
crossref_primary_10_1080_07370024_2019_1685883
crossref_primary_10_2196_37720
crossref_primary_10_1016_j_copsyc_2019_06_021
crossref_primary_10_5817_CP2022_4_1
crossref_primary_10_1108_INTR_01_2021_0005
crossref_primary_10_1016_j_ijinfomgt_2025_102928
crossref_primary_10_1177_20539517211059480
crossref_primary_10_1108_JRF_07_2019_0129
crossref_primary_10_1002_cb_2481
crossref_primary_10_1016_j_elerap_2024_101374
crossref_primary_10_1007_s12525_024_00744_w
crossref_primary_10_1371_journal_pone_0251964
crossref_primary_10_1371_journal_pone_0294419
crossref_primary_10_1016_j_jisa_2024_103856
crossref_primary_10_1145_3558095
crossref_primary_10_1016_j_telpol_2024_102794
crossref_primary_10_1108_DPRG_07_2022_0076
crossref_primary_10_1016_j_ijhcs_2022_102917
crossref_primary_10_1108_OIR_03_2024_0135
crossref_primary_10_1108_OIR_11_2024_0708
crossref_primary_10_1080_10447318_2024_2316368
crossref_primary_10_1007_s12369_023_01093_y
crossref_primary_10_1016_j_envsci_2024_103688
crossref_primary_10_24136_oc_2956
crossref_primary_10_3390_jrfm13030053
crossref_primary_10_1007_s11042_023_15775_2
crossref_primary_10_1088_1742_6596_2090_1_012017
crossref_primary_10_63090_IJJSRS_3049_0618_0020
crossref_primary_10_1016_j_heliyon_2023_e21448
crossref_primary_10_1145_3725737
crossref_primary_10_4018_IJISP_2022010119
crossref_primary_10_1108_ITP_05_2022_0376
crossref_primary_10_1556_204_2022_00002
crossref_primary_10_1016_j_tele_2019_04_006
crossref_primary_10_1016_j_teler_2025_100248
crossref_primary_10_1108_IJM_03_2021_0125
crossref_primary_10_1111_tgis_12924
crossref_primary_10_1080_10696679_2021_2024441
crossref_primary_10_1515_commun_2020_0037
crossref_primary_10_4018_JECO_292470
crossref_primary_10_1093_ct_qtae011
crossref_primary_10_1016_j_tele_2020_101366
crossref_primary_10_1080_1369118X_2019_1629693
crossref_primary_10_1089_cyber_2017_0709
crossref_primary_10_1007_s10458_022_09579_1
crossref_primary_10_1080_0144929X_2018_1552717
crossref_primary_10_1016_j_ipm_2019_102108
crossref_primary_10_1111_jems_12481
crossref_primary_10_1177_1529100620946707
crossref_primary_10_3389_fpsyg_2020_543388
crossref_primary_10_3389_fpubh_2022_847184
crossref_primary_10_2139_ssrn_3777417
crossref_primary_10_1080_09669582_2024_2309202
crossref_primary_10_1145_3555086
crossref_primary_10_1177_1071181322661484
crossref_primary_10_1007_s11031_025_10155_9
crossref_primary_10_1145_3589958
crossref_primary_10_1287_isre_2023_0318
crossref_primary_10_1080_0144929X_2024_2443523
crossref_primary_10_1177_00936502211060984
crossref_primary_10_1145_3449076
crossref_primary_10_1016_j_cose_2023_103258
crossref_primary_10_1109_TPC_2021_3110617
crossref_primary_10_1177_10946705221120232
crossref_primary_10_1007_s10515_024_00415_2
crossref_primary_10_1108_INTR_01_2024_0033
crossref_primary_10_1016_j_tele_2020_101377
crossref_primary_10_1016_j_jbusres_2021_07_031
crossref_primary_10_5817_CP2021_3_3
crossref_primary_10_1080_15332861_2021_1947741
crossref_primary_10_1080_07370024_2023_2281928
crossref_primary_10_1108_IMDS_08_2021_0485
crossref_primary_10_1016_j_jbusres_2018_07_037
crossref_primary_10_3390_app14177874
crossref_primary_10_1016_j_chb_2023_107700
crossref_primary_10_1016_j_jretconser_2021_102500
crossref_primary_10_1016_j_giq_2019_01_002
crossref_primary_10_3390_jcp3010005
crossref_primary_10_2196_31411
crossref_primary_10_1080_15213269_2025_2463392
crossref_primary_10_1051_shsconf_202418704001
crossref_primary_10_3390_su15021657
crossref_primary_10_1016_j_dsm_2024_12_005
crossref_primary_10_3390_jtaer20030152
crossref_primary_10_1080_01900692_2025_2488149
crossref_primary_10_1177_2455328X231206919
crossref_primary_10_1177_17480485231206358
crossref_primary_10_3390_psycholint7030079
crossref_primary_10_1080_14241277_2021_1960532
crossref_primary_10_36128_PRIW_VI50_907
crossref_primary_10_1016_j_chb_2023_107855
crossref_primary_10_3390_socsci11100442
crossref_primary_10_55643_fcaptp_3_62_2025_4734
crossref_primary_10_1177_14614448211016316
crossref_primary_10_1007_s40319_021_01090_6
crossref_primary_10_1016_j_jretconser_2019_101947
crossref_primary_10_1080_0144929X_2025_2520594
crossref_primary_10_1080_19368623_2025_2465634
crossref_primary_10_1111_jftr_12566
crossref_primary_10_3390_electronics9091382
crossref_primary_10_1016_j_im_2021_103497
crossref_primary_10_1080_10447318_2025_2552866
crossref_primary_10_1145_3616024
crossref_primary_10_2478_nor_2020_0022
crossref_primary_10_3389_fpsyg_2022_880261
crossref_primary_10_1093_jssam_smac018
crossref_primary_10_1002_asi_24369
crossref_primary_10_1108_ITP_04_2023_0334
crossref_primary_10_3390_computers9020034
crossref_primary_10_1016_j_tele_2018_03_017
crossref_primary_10_2196_28025
crossref_primary_10_1016_j_tele_2025_102263
crossref_primary_10_1080_08923647_2021_1978784
crossref_primary_10_18559_ebr_2023_1_5
crossref_primary_10_1145_3555214
crossref_primary_10_5604_01_3001_0016_1459
crossref_primary_10_1080_0144929X_2025_2485395
crossref_primary_10_1177_2053951720942543
crossref_primary_10_1177_1461444820979708
crossref_primary_10_1016_j_copsyc_2019_08_009
crossref_primary_10_1177_08944393221117500
crossref_primary_10_17645_mac_v10i1_4858
crossref_primary_10_1016_j_copsyc_2019_08_003
crossref_primary_10_1016_j_techsoc_2024_102616
crossref_primary_10_3390_systems11040205
crossref_primary_10_1108_IJBM_03_2024_0138
crossref_primary_10_1016_j_jss_2025_112443
crossref_primary_10_4018_IJeC_296429
crossref_primary_10_1016_j_midw_2025_104375
crossref_primary_10_1108_JCM_04_2021_4577
crossref_primary_10_1093_oodh_oqaf011
crossref_primary_10_1007_s00729_023_00239_7
crossref_primary_10_1080_23294515_2018_1550123
crossref_primary_10_3917_dm_112_0027
crossref_primary_10_1016_j_chb_2019_04_026
crossref_primary_10_1371_journal_pone_0263097
crossref_primary_10_1016_j_entcom_2025_100950
crossref_primary_10_1177_2056305118824199
crossref_primary_10_1016_j_elerap_2019_100868
crossref_primary_10_4102_sajim_v21i1_1034
crossref_primary_10_1016_j_socscimed_2021_114146
crossref_primary_10_1080_21515581_2024_2445505
crossref_primary_10_1016_j_techfore_2021_121256
crossref_primary_10_3846_jbem_2022_16119
crossref_primary_10_3390_economies10120307
crossref_primary_10_1016_j_tele_2021_101748
crossref_primary_10_1109_ACCESS_2022_3207274
crossref_primary_10_1016_j_hlpt_2023_100761
crossref_primary_10_1007_s40300_023_00243_6
crossref_primary_10_4467_23540214ZM_21_017_13412
crossref_primary_10_1080_1369118X_2021_1963460
crossref_primary_10_1080_0144929X_2018_1544275
crossref_primary_10_2196_47705
crossref_primary_10_1017_beq_2019_24
crossref_primary_10_1365_s40702_022_00913_5
crossref_primary_10_2196_27753
crossref_primary_10_3389_fpsyg_2022_954964
crossref_primary_10_1002_cb_2199
crossref_primary_10_1016_j_jbusres_2021_12_052
crossref_primary_10_1016_j_chb_2018_09_015
crossref_primary_10_1007_s12525_022_00604_5
crossref_primary_10_1080_23812346_2024_2378395
crossref_primary_10_1016_j_chb_2018_11_022
crossref_primary_10_5817_CP2024_4_8
crossref_primary_10_3390_electronics10151811
crossref_primary_10_1145_3715903
crossref_primary_10_25300_MISQ_2024_16853
crossref_primary_10_1016_j_jbusres_2023_114205
crossref_primary_10_1080_15265161_2017_1409840
crossref_primary_10_1007_s10257_023_00622_6
crossref_primary_10_3390_informatics6010008
crossref_primary_10_1287_isre_2021_0633
crossref_primary_10_3390_bs15030386
crossref_primary_10_1177_14673584241287502
crossref_primary_10_1016_j_jbusres_2021_12_043
crossref_primary_10_1016_j_tele_2022_101782
crossref_primary_10_1146_annurev_financial_071020_012008
crossref_primary_10_1371_journal_pone_0245740
crossref_primary_10_2196_53592
crossref_primary_10_1007_s12599_022_00742_2
crossref_primary_10_1111_poms_13591
crossref_primary_10_1145_3637309
crossref_primary_10_4018_JGIM_352857
crossref_primary_10_1016_j_im_2021_103450
crossref_primary_10_1016_j_bushor_2019_07_008
crossref_primary_10_1287_mnsc_2021_4054
crossref_primary_10_3389_fcomp_2022_986138
crossref_primary_10_1016_j_clsr_2019_105367
crossref_primary_10_1177_14707853231222810
crossref_primary_10_3389_fpubh_2023_1109093
crossref_primary_10_1108_OIR_09_2023_0447
crossref_primary_10_1038_s41598_024_70718_7
crossref_primary_10_1080_0144929X_2023_2285341
crossref_primary_10_1177_00187208211004288
crossref_primary_10_3390_su12125163
crossref_primary_10_1145_3494067
crossref_primary_10_1108_DPRG_03_2025_0066
crossref_primary_10_1111_1758_5899_13337
crossref_primary_10_2478_fiqf_2024_0025
crossref_primary_10_1177_1461444820924632
crossref_primary_10_1108_JEIM_03_2023_0119
crossref_primary_10_1177_14614448241310901
crossref_primary_10_1108_INTR_05_2023_0339
crossref_primary_10_2196_54034
crossref_primary_10_1080_20421338_2021_1958987
crossref_primary_10_1093_cje_beac052
crossref_primary_10_1016_j_cose_2021_102453
crossref_primary_10_1016_j_tele_2019_02_001
crossref_primary_10_1016_j_ijedudev_2021_102351
crossref_primary_10_1080_0144929X_2019_1697899
crossref_primary_10_2478_eoik_2024_0025
crossref_primary_10_1080_08838151_2020_1844886
crossref_primary_10_1177_08944393221108820
crossref_primary_10_1007_s11036_020_01529_z
crossref_primary_10_1080_0144929X_2023_2178830
crossref_primary_10_1108_SJME_10_2022_0213
crossref_primary_10_2139_ssrn_5361607
crossref_primary_10_2196_41635
crossref_primary_10_1093_joc_jqaf007
crossref_primary_10_1016_j_jbusres_2021_09_066
crossref_primary_10_1080_08961530_2022_2059798
crossref_primary_10_1287_moor_2023_0022
crossref_primary_10_1080_1369118X_2023_2205484
crossref_primary_10_1515_icom_2022_0041
crossref_primary_10_1016_j_procs_2024_03_137
crossref_primary_10_1016_j_jretconser_2022_103028
crossref_primary_10_1287_isre_2022_1182
crossref_primary_10_1080_1097198X_2021_1954416
crossref_primary_10_1093_jamia_ocab073
crossref_primary_10_1016_j_soscij_2018_10_001
crossref_primary_10_1016_j_techfore_2023_122789
crossref_primary_10_1016_j_techsoc_2021_101840
crossref_primary_10_1080_23270012_2019_1671243
crossref_primary_10_2196_71951
crossref_primary_10_1080_07370024_2024_2325347
crossref_primary_10_1016_j_cose_2020_101924
crossref_primary_10_2196_18296
crossref_primary_10_3389_fpsyg_2023_1052782
crossref_primary_10_4018_JGIM_322778
crossref_primary_10_1177_21695067231192286
crossref_primary_10_1109_TEM_2020_3019033
crossref_primary_10_1177_09760911251371299
crossref_primary_10_1016_j_fpsl_2023_101168
crossref_primary_10_1086_730709
crossref_primary_10_1140_epjds_s13688_022_00324_y
crossref_primary_10_1016_j_ijinfomgt_2025_102951
crossref_primary_10_1108_DTS_05_2022_0015
crossref_primary_10_1016_j_ijhm_2024_103965
crossref_primary_10_1177_20563051241298446
crossref_primary_10_1108_OIR_03_2020_0082
crossref_primary_10_1016_j_tele_2021_101715
crossref_primary_10_1177_20563051251313610
crossref_primary_10_1108_ICS_03_2018_0034
crossref_primary_10_1016_j_tele_2021_101717
crossref_primary_10_1016_j_jbusres_2020_12_006
crossref_primary_10_1080_10447318_2025_2560513
crossref_primary_10_1080_10447318_2025_2499656
crossref_primary_10_1177_14614448231193093
crossref_primary_10_1111_cge_13686
crossref_primary_10_5817_CP2021_3_11
crossref_primary_10_4018_JOEUC_353910
crossref_primary_10_1515_ijdlg_2025_0001
crossref_primary_10_1186_s40537_024_00888_8
crossref_primary_10_1177_21582440231192951
crossref_primary_10_18267_j_aip_141
crossref_primary_10_1177_20563051231155111
crossref_primary_10_32604_cmc_2024_054007
crossref_primary_10_3390_systems13040275
crossref_primary_10_1002_isd2_12179
crossref_primary_10_24136_oc_2916
crossref_primary_10_1080_10447318_2022_2041894
crossref_primary_10_1016_j_chb_2020_106382
crossref_primary_10_1016_j_chb_2020_106260
crossref_primary_10_1177_20563051221126085
crossref_primary_10_1057_s41599_021_00787_w
crossref_primary_10_1108_AJIM_12_2023_0526
crossref_primary_10_1016_j_tele_2021_101602
crossref_primary_10_1016_j_joitmc_2025_100491
crossref_primary_10_1145_3698133
crossref_primary_10_1080_0144929X_2018_1465997
crossref_primary_10_1007_s12525_023_00657_0
crossref_primary_10_1029_2020WR027917
crossref_primary_10_1002_mar_21529
crossref_primary_10_1016_j_tranpol_2022_12_013
crossref_primary_10_1016_j_jet_2023_105699
crossref_primary_10_1089_big_2024_0036
crossref_primary_10_1371_journal_pone_0288109
crossref_primary_10_1080_10447318_2024_2375686
crossref_primary_10_1371_journal_pone_0314472
crossref_primary_10_1002_mar_21524
crossref_primary_10_1108_IMDS_07_2023_0462
Cites_doi 10.1162/003355397555253
10.1080/1369118X.2013.777757
10.1111/j.1467-6494.1953.tb01775.x
10.1145/2556288.2557421
10.1016/j.jmp.2006.01.003
10.1089/cyber.2014.0456
10.1080/08838151.2015.1127245
10.1080/07370020903586662
10.1287/mnsc.32.11.1492
10.1145/2468356.2468501
10.1057/gpp.1984.12
10.1080/19393555.2015.1085113
10.1037/h0036201
10.1002/mar.20238
10.1111/j.1745-6606.2006.00070.x
10.1016/j.dss.2012.06.010
10.2307/3250951
10.1016/j.chb.2014.05.006
10.1016/j.jsis.2013.01.003
10.1145/2800835.2804402
10.5210/fm.v11i9.1394
10.2307/1884852
10.1287/mnsc.14.3.159
10.2139/ssrn.941708
10.1145/2851581.2892413
10.2307/1914185
10.1145/1053291.1053295
10.1111/j.1083-6101.2009.01494.x
10.1145/1979742.1979887
10.1145/2675133.2675287
10.1002/ejsp.2049
10.1109/SocialCom.2013.140
10.1086/268763
10.1086/257897
10.1145/1868914.1868957
10.1287/orsc.10.1.104
10.1037/0033-2909.107.1.34
10.1145/988772.988777
10.1257/000282803322655392
10.1111/j.1467-6435.1999.tb00221.x
10.2307/41409970
10.1109/MSP.2005.22
10.1126/science.171.3969.345
10.1086/268109
10.1162/003355301556365
10.1145/2858036.2858381
10.2753/MIS0742-1222260305
10.1145/2464464.2464503
10.1016/j.chb.2016.09.005
10.1080/01900690902732632
10.1016/j.cose.2015.07.002
10.1111/j.1460-2466.1984.tb02174.x
10.1037/h0040237
10.1016/j.ijhcs.2013.08.016
10.1111/j.1468-2885.1991.tb00023.x
10.1111/isj.12062
ContentType Journal Article
Copyright 2017
Copyright Elsevier Science Ltd. Nov 2017
Copyright_xml – notice: 2017
– notice: Copyright Elsevier Science Ltd. Nov 2017
DBID 6I.
AAFTH
AAYXX
CITATION
7SC
7SP
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.tele.2017.04.013
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Economics
Engineering
EISSN 1879-324X
EndPage 1058
ExternalDocumentID 10_1016_j_tele_2017_04_013
S0736585317302022
GroupedDBID --K
--M
-~X
.~1
0R~
123
1B1
1~.
1~5
29Q
4.4
457
4G.
5VS
6I.
7-5
71M
77K
8P~
9JN
9JO
AACTN
AAEDT
AAEDW
AAFJI
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABJNI
ABMAC
ABMMH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACHQT
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADIYS
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PRBVW
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
TN5
UHS
WUQ
XPP
YNT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
7SP
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c481t-14cda4ae1980885978b46d5ba53aefa55e94cbd0c44ed2cdd13d7136be78b75d3
ISICitedReferencesCount 485
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000413384600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0736-5853
IngestDate Fri Nov 14 19:17:41 EST 2025
Tue Nov 18 22:25:56 EST 2025
Sat Nov 29 07:13:51 EST 2025
Fri Feb 23 02:15:31 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords Privacy paradox
Decision-making
Risk
Information privacy
Benefit
Privacy concerns
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c481t-14cda4ae1980885978b46d5ba53aefa55e94cbd0c44ed2cdd13d7136be78b75d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Literature Review-2
ObjectType-Feature-3
OpenAccessLink https://dx.doi.org/10.1016/j.tele.2017.04.013
PQID 1966075495
PQPubID 2035449
PageCount 21
ParticipantIDs proquest_journals_1966075495
crossref_primary_10_1016_j_tele_2017_04_013
crossref_citationtrail_10_1016_j_tele_2017_04_013
elsevier_sciencedirect_doi_10_1016_j_tele_2017_04_013
PublicationCentury 2000
PublicationDate 2017-11-01
PublicationDateYYYYMMDD 2017-11-01
PublicationDate_xml – month: 11
  year: 2017
  text: 2017-11-01
  day: 01
PublicationDecade 2010
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle Telematics and informatics
PublicationYear 2017
Publisher Elsevier Ltd
Elsevier Science Ltd
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Science Ltd
References Gambino, A., Kim., J., Sundar, S.S., Ge, J., Rosson, M.B., 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. CHI 2016. San Jose, CA, USA, 2837-2842.
O’Donoghue, Rabin (b0315) 2001; 116
Kahneman (b0195) 2003; 93
Baek (b9000) 2014; 38
Kim, Park, Oh (b0230) 2008; 25
Blumer (b0065) 1986
Blumler, Katz (b0070) 1974
Pentina, Zhang, Bata, Chen (b0335) 2016; 65
Wilson, D.W., Valacich, J.S., 2012. Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. In: Thirty Third International Conference on Information Systems, Orlando, Florida, 1-11.
Smith, Kollars (b0395) 2015; 24
Hughes-Roberts, T., 2012. A cross-disciplined approach to exploring the privacy paradox: explaining disclosure behaviour using the theory of planned behavior. In: UK Academy for Information Systems Conference Proceedings, Paper 7.
Schwarz (b0380) 2011
Hughes-Roberts, T., 2013. Privacy and social networks: Is concern a valid indicator of intention and behaviour?. In: International Conference on Social Computing, Washington, D.C., USA, 909–912.
Kehr, F., Wentzel, D., Kowatsch, T., 2014. Privacy paradox revised: Pre-existing attitudes, psychological ownership, and actual disclosure. In: Thirty Fifth International Conference on Information Systems, Auckland, New Zealand, 1–12.
Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H., 2014. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. CHI 2014, Toronto, ON, Canada, 2347-2356.
Tönnies (b0425) 2012
Petronio (b0340) 1991; 1
Meynhardt (b0285) 2009; 32
Ajzen (b0035) 1985
Leary, Kowalski (b0255) 1990; 107
Sundar, S.S., Kang, H., Wu, M., Go, E., Zhang, B., 2013. Unlocking the privacy paradox: Do cognitive heuristics hold the key?. In: Proceedings of CHI’13 Extended Abstracts on Human Factors in Computing Systems, France, 811–816.
Dienlin, Trepte (b9005) 2015; 45
Debatin, Lovejoy, Horn, Hughes (b0110) 2009; 15
Phelan, C., Lampe, C., Resnick, P., 2016. It’s creepy, but it doesn’t bother me. CHI 2016, San Jose, CA, USA, 5240-5251.
Tversky, Kahneman (b0435) 1975
Wakefield (b0445) 2013; 22
Li (b0265) 2012; 54
Donnenwerth, Foa (b0125) 1974; 29
Agarwal, Karahanna (b0030) 2000; 24
Keith, Thompson, Hale, Lowry, Greer (b0220) 2013; 71
Rubin (b0375) 1984; 34
Kehr, Kowatsch, Wentzel, Fleisch (b0215) 2015; 25
Laibson (b0250) 1997; 62
Alashoor, T., Baskerville, R., 2015. The privacy paradox: The role of cognitive absorption in the social networking activity. In: Thirty Sixth International Conference on Information Systems, Fort Worth, Texas, USA, 1–20.
Zhang, Wu, Kang, Go, Sundar (b0475) 2014
.
Loewenstein (b0260) 1999; 52
Smith, Dinev, Xu (b0390) 2011; 35
Crutchfield (b0100) 1955; 10
Harsanyi (b0160) 1967; 14
Giddens (b0155) 1984
Jia, H., Wisniewski, P., Xu, H., Rosson, M.B., Carroll, J.M., 2015. Risk-taking as a learning process for shaping teen’s online information privacy behaviors. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, Vancouver, BC, Canada, 583-599.
Busemeyer, Wang, Townsend (b0085) 2006; 50
Brehm (b0075) 1966
Flender, Müller (b0140) 2012
Kunreuther (b0245) 1984; 9
Petronio (b0345) 2002
Xu, Teo, Tan, Agarwal (b0455) 2010; 26
Quinn (b0370) 2016; 60
Zafeiropoulou, A.M., Millard, D.E., Webber, C., O’Hara, K., 2013. Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions?. In: WebSci '13 Proceedings of the 5th Annual ACM Web Science Conference, New York, USA, 463–472.
Sproull, Kiesler (b0410) 1986; 32
Nagy, Pecho (b0300) 2009
Acquisti, Grossklags (b0020) 2005; 3
Oetzel, M.C., Gonja, T., 2011. The online privacy paradox: A social representations perspective. In: Paper presented at the Proceedings of the 2011 Annual Conference Extended Abstracts on Human factors in Computing Systems, Vancouver, BC, Canada.
Downs (b0130) 1957; 65
Buck, C., Horbel, C., Germelmann, C.C., Eymann, T., 2014. The unconscious app consumer: Discovering and comparing the information-seeking patterns among mobile application consumers. In: Twenty Second European Conference on Information Systems, Tel Aviv, Israel, 1–14.
Motiwalla, L.F., Li, X., Liu, X., 2014. Privacy paradox: Does stated privacy concerns translate into the valuation of personal information?. In: Proceeding of the 19th Pacific Asia Conference on Information Systems (PACIS 2014), Paper 281.
Joinson, Reips, Buchanan, Paine Schofield (b0190) 2010; 25
Vroom (b0440) 1964
Li, Sarathy, Xu (b0270) 2010; 51
Oomen, Leenes (b0325) 2008
Kelley, Cranor, Sadeh (b0225) 2013; 2013
Sproull, Kiesler (b0415) 1991
Lutz, Strathoff (b0275) 2011
Simon (b0405) 1982
Young, Quan-Haase (b0465) 2013; 16
Krämer, Haferkamp (b0240) 2011
Chen, Chen (b0090) 2015; 18
Norberg, Horne, Horne (b0305) 2007; 41
Kahneman, Tversky (b0200) 1979; 47
Yoo, C.W., Ahn, H.J., Rao, H.R., 2012. An exploration of the impact of information privacy invasion. In: Proceeding of Thirty Third International Conference on Information Systems, Orlando, Florida, 1–18.
Abric (b0005) 1996; 5
Barnes, S.B., 2006. A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from
Irwin (b0180) 1953; 21
Hu, Q., Ma, S., 2010. Does privacy still matter in the era of Web 2.0? A qualitative study of user behavior towards online social networking activities. In: Proceedings of Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan, 2, pp. 591–602.
Manier, O’Brien Louch (b0280) 2010; XI
Poikela, M., Schmidt, R., Wechsung, I., Mueller, S., 2015. FlashPolling privacy: The discrepancy of intention and action in location-based poll participation. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, Osaka, Japan, 813–818.
Dinev, Hart (b0120) 2006; 17
Tsai, J., Cranor, L., Acquisti, A., Fong, C., 2006. What’s it for you? A survey of online privacy concerns and risk. NET Institute Working Paper, No. 06–29, 1–20.
Park, Y., Ju, J., Ahn, J-H., 2015. Are people really concerned about their privacy?: Privacy paradox in mobile environment. In: The Fifteenth International Conference on Electronic Business, Hong Kong, 123–128.
Berendt, Günther, Spiekermann (b0060) 2005; 48
Pötzsch, S., Wolkerstorfer, P., Graf, C., 2010. Privacy-awareness information for web forums: Results from an empirical study. In: Proceedings: NordiCHI 2010, Reykjavik, Iceland, 363–372.
Deuker (b0115) 2010
Pötzsch (b0360) 2009
Ajzen, Fishbein (b0040) 1980
Culnan, Armstrong (b0095) 1999; 10
Simon (b0400) 1955; 69
Novak, Hoffman (b0310) 2008; 36
Altman (b0050) 1975
Davison (b0105) 1983; 47
Katz, Blumler, Gurevitch (b0205) 1974; 37
Agarwal, Sambamurthy, Stair (b0025) 1997
Foa (b0145) 1971; 171
Kokolakis (b0235) 2017; 64
Acquisti, A., 2004. Privacy in electronic commerce and the economics of immediate gratification. In: EC '04 Proceedings of the 5th ACM Conference on Electronic Commerce, USA, 21-29.
Moscovici (b0290) 1984
Deuker (10.1016/j.tele.2017.04.013_b0115) 2010
Petronio (10.1016/j.tele.2017.04.013_b0345) 2002
Tönnies (10.1016/j.tele.2017.04.013_b0425) 2012
10.1016/j.tele.2017.04.013_b0080
Giddens (10.1016/j.tele.2017.04.013_b0155) 1984
Kokolakis (10.1016/j.tele.2017.04.013_b0235) 2017; 64
Blumler (10.1016/j.tele.2017.04.013_b0070) 1974
Kahneman (10.1016/j.tele.2017.04.013_b0195) 2003; 93
Altman (10.1016/j.tele.2017.04.013_b0050) 1975
Culnan (10.1016/j.tele.2017.04.013_b0095) 1999; 10
10.1016/j.tele.2017.04.013_b0165
Foa (10.1016/j.tele.2017.04.013_b0145) 1971; 171
Young (10.1016/j.tele.2017.04.013_b0465) 2013; 16
10.1016/j.tele.2017.04.013_b0365
10.1016/j.tele.2017.04.013_b0045
10.1016/j.tele.2017.04.013_b0320
Tversky (10.1016/j.tele.2017.04.013_b0435) 1975
Moscovici (10.1016/j.tele.2017.04.013_b0290) 1984
Dinev (10.1016/j.tele.2017.04.013_b0120) 2006; 17
Novak (10.1016/j.tele.2017.04.013_b0310) 2008; 36
Berendt (10.1016/j.tele.2017.04.013_b0060) 2005; 48
Li (10.1016/j.tele.2017.04.013_b0270) 2010; 51
Norberg (10.1016/j.tele.2017.04.013_b0305) 2007; 41
Sproull (10.1016/j.tele.2017.04.013_b0410) 1986; 32
Kehr (10.1016/j.tele.2017.04.013_b0215) 2015; 25
Krämer (10.1016/j.tele.2017.04.013_b0240) 2011
10.1016/j.tele.2017.04.013_b0150
10.1016/j.tele.2017.04.013_b0350
10.1016/j.tele.2017.04.013_b0470
Smith (10.1016/j.tele.2017.04.013_b0395) 2015; 24
Irwin (10.1016/j.tele.2017.04.013_b0180) 1953; 21
10.1016/j.tele.2017.04.013_b0355
Pötzsch (10.1016/j.tele.2017.04.013_b0360) 2009
10.1016/j.tele.2017.04.013_b0430
Debatin (10.1016/j.tele.2017.04.013_b0110) 2009; 15
Agarwal (10.1016/j.tele.2017.04.013_b0025) 1997
Petronio (10.1016/j.tele.2017.04.013_b0340) 1991; 1
Dienlin (10.1016/j.tele.2017.04.013_b9005) 2015; 45
Crutchfield (10.1016/j.tele.2017.04.013_b0100) 1955; 10
Pentina (10.1016/j.tele.2017.04.013_b0335) 2016; 65
Ajzen (10.1016/j.tele.2017.04.013_b0040) 1980
O’Donoghue (10.1016/j.tele.2017.04.013_b0315) 2001; 116
10.1016/j.tele.2017.04.013_b0185
10.1016/j.tele.2017.04.013_b0460
Baek (10.1016/j.tele.2017.04.013_b9000) 2014; 38
Downs (10.1016/j.tele.2017.04.013_b0130) 1957; 65
Lutz (10.1016/j.tele.2017.04.013_b0275) 2011
Kunreuther (10.1016/j.tele.2017.04.013_b0245) 1984; 9
Wakefield (10.1016/j.tele.2017.04.013_b0445) 2013; 22
10.1016/j.tele.2017.04.013_b0385
Xu (10.1016/j.tele.2017.04.013_b0455) 2010; 26
10.1016/j.tele.2017.04.013_b0420
Busemeyer (10.1016/j.tele.2017.04.013_b0085) 2006; 50
Nagy (10.1016/j.tele.2017.04.013_b0300) 2009
Kim (10.1016/j.tele.2017.04.013_b0230) 2008; 25
Rubin (10.1016/j.tele.2017.04.013_b0375) 1984; 34
Simon (10.1016/j.tele.2017.04.013_b0405) 1982
Chen (10.1016/j.tele.2017.04.013_b0090) 2015; 18
Kelley (10.1016/j.tele.2017.04.013_b0225) 2013; 2013
Leary (10.1016/j.tele.2017.04.013_b0255) 1990; 107
Simon (10.1016/j.tele.2017.04.013_b0400) 1955; 69
Donnenwerth (10.1016/j.tele.2017.04.013_b0125) 1974; 29
Flender (10.1016/j.tele.2017.04.013_b0140) 2012
Harsanyi (10.1016/j.tele.2017.04.013_b0160) 1967; 14
Sproull (10.1016/j.tele.2017.04.013_b0415) 1991
Zhang (10.1016/j.tele.2017.04.013_b0475) 2014
Loewenstein (10.1016/j.tele.2017.04.013_b0260) 1999; 52
Blumer (10.1016/j.tele.2017.04.013_b0065) 1986
Brehm (10.1016/j.tele.2017.04.013_b0075) 1966
10.1016/j.tele.2017.04.013_b0295
Laibson (10.1016/j.tele.2017.04.013_b0250) 1997; 62
Agarwal (10.1016/j.tele.2017.04.013_b0030) 2000; 24
Vroom (10.1016/j.tele.2017.04.013_b0440) 1964
Ajzen (10.1016/j.tele.2017.04.013_b0035) 1985
10.1016/j.tele.2017.04.013_b0170
Kahneman (10.1016/j.tele.2017.04.013_b0200) 1979; 47
Katz (10.1016/j.tele.2017.04.013_b0205) 1974; 37
Davison (10.1016/j.tele.2017.04.013_b0105) 1983; 47
Keith (10.1016/j.tele.2017.04.013_b0220) 2013; 71
Acquisti (10.1016/j.tele.2017.04.013_b0020) 2005; 3
Oomen (10.1016/j.tele.2017.04.013_b0325) 2008
Quinn (10.1016/j.tele.2017.04.013_b0370) 2016; 60
10.1016/j.tele.2017.04.013_b0055
10.1016/j.tele.2017.04.013_b0330
10.1016/j.tele.2017.04.013_b0010
10.1016/j.tele.2017.04.013_b0175
10.1016/j.tele.2017.04.013_b0450
Li (10.1016/j.tele.2017.04.013_b0265) 2012; 54
Smith (10.1016/j.tele.2017.04.013_b0390) 2011; 35
10.1016/j.tele.2017.04.013_b0210
Manier (10.1016/j.tele.2017.04.013_b0280) 2010; XI
Schwarz (10.1016/j.tele.2017.04.013_b0380) 2011
Abric (10.1016/j.tele.2017.04.013_b0005) 1996; 5
Joinson (10.1016/j.tele.2017.04.013_b0190) 2010; 25
Meynhardt (10.1016/j.tele.2017.04.013_b0285) 2009; 32
References_xml – volume: 48
  start-page: 101
  year: 2005
  end-page: 106
  ident: b0060
  article-title: Privacy in e-commerce: stated preferences vs. actual behavior
  publication-title: Commun. ACM
– start-page: 81
  year: 2011
  end-page: 99
  ident: b0275
  article-title: Privacy concerns and online behavior – not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses
  publication-title: Multinationale Unternehmen Und Institutionen Im Wandel – Herausforderungen Für Wirtschaft, Recht Und Gesellschaft
– volume: 21
  start-page: 329
  year: 1953
  end-page: 335
  ident: b0180
  article-title: Stated expectations as functions of probability and desirability of outcomes
  publication-title: J. Pers.
– reference: Hughes-Roberts, T., 2013. Privacy and social networks: Is concern a valid indicator of intention and behaviour?. In: International Conference on Social Computing, Washington, D.C., USA, 909–912.
– start-page: 293
  year: 1997
  end-page: 297
  ident: b0025
  article-title: Cognitive absorption and the adoption of new information technologies
  publication-title: Academy of Management Best Paper Proceedings
– volume: 15
  start-page: 83
  year: 2009
  end-page: 108
  ident: b0110
  article-title: Facebook and online privacy: attitudes, behaviors, and unintended consequences
  publication-title: J. Comput.-Mediated Commun.
– volume: 9
  start-page: 206
  year: 1984
  end-page: 220
  ident: b0245
  article-title: Causes of underinsurance against natural disasters
  publication-title: Geneva Pap. Risk Insurance
– volume: 10
  start-page: 340
  year: 1999
  end-page: 347
  ident: b0095
  article-title: Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
  publication-title: Organ. Sci.
– reference: Sundar, S.S., Kang, H., Wu, M., Go, E., Zhang, B., 2013. Unlocking the privacy paradox: Do cognitive heuristics hold the key?. In: Proceedings of CHI’13 Extended Abstracts on Human Factors in Computing Systems, France, 811–816.
– reference: Kehr, F., Wentzel, D., Kowatsch, T., 2014. Privacy paradox revised: Pre-existing attitudes, psychological ownership, and actual disclosure. In: Thirty Fifth International Conference on Information Systems, Auckland, New Zealand, 1–12.
– volume: 24
  start-page: 157
  year: 2015
  end-page: 163
  ident: b0395
  article-title: QR panopticism: user behavior triangulation and barcode-scanning applications
  publication-title: Inf. Secur. J. Global Perspect.
– volume: 71
  start-page: 1163
  year: 2013
  end-page: 1173
  ident: b0220
  article-title: Information disclosure on mobile devices: R-examining privacy calculus with actual user behavior
  publication-title: Int. J. Hum Comput Stud.
– reference: Acquisti, A., 2004. Privacy in electronic commerce and the economics of immediate gratification. In: EC '04 Proceedings of the 5th ACM Conference on Electronic Commerce, USA, 21-29.
– volume: 65
  start-page: 135
  year: 1957
  end-page: 150
  ident: b0130
  article-title: An economic theory of political action in a democracy
  publication-title: J. Political Economy
– volume: 41
  start-page: 100
  year: 2007
  end-page: 126
  ident: b0305
  article-title: The privacy paradox: personal information disclosure intentions versus behaviors
  publication-title: J. Consum. Affairs
– volume: 38
  start-page: 33
  year: 2014
  end-page: 42
  ident: b9000
  article-title: Solving the privacy paradox: A counter-argument experimental approach
  publication-title: Comput. Hum. Behav.
– reference: Buck, C., Horbel, C., Germelmann, C.C., Eymann, T., 2014. The unconscious app consumer: Discovering and comparing the information-seeking patterns among mobile application consumers. In: Twenty Second European Conference on Information Systems, Tel Aviv, Israel, 1–14.
– volume: 10
  start-page: 191
  year: 1955
  end-page: 198
  ident: b0100
  article-title: Conformity and character
  publication-title: Am. Psychol.
– start-page: 3
  year: 1984
  end-page: 69
  ident: b0290
  article-title: The phenomenon of social representations
  publication-title: Social Representations
– reference: Jia, H., Wisniewski, P., Xu, H., Rosson, M.B., Carroll, J.M., 2015. Risk-taking as a learning process for shaping teen’s online information privacy behaviors. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, Vancouver, BC, Canada, 583-599.
– start-page: 121
  year: 2008
  end-page: 138
  ident: b0325
  article-title: Privacy risk perceptions and privacy protection strategies
  publication-title: Policies and Research in Identity Management
– volume: 26
  start-page: 135
  year: 2010
  end-page: 173
  ident: b0455
  article-title: The role of push-pull technology in privacy calculus: the case of location-based services
  publication-title: J. Manage. Inf. Syst.
– reference: Oetzel, M.C., Gonja, T., 2011. The online privacy paradox: A social representations perspective. In: Paper presented at the Proceedings of the 2011 Annual Conference Extended Abstracts on Human factors in Computing Systems, Vancouver, BC, Canada.
– reference: Pötzsch, S., Wolkerstorfer, P., Graf, C., 2010. Privacy-awareness information for web forums: Results from an empirical study. In: Proceedings: NordiCHI 2010, Reykjavik, Iceland, 363–372.
– reference: Hughes-Roberts, T., 2012. A cross-disciplined approach to exploring the privacy paradox: explaining disclosure behaviour using the theory of planned behavior. In: UK Academy for Information Systems Conference Proceedings, Paper 7.
– volume: 107
  start-page: 34
  year: 1990
  end-page: 47
  ident: b0255
  article-title: Impression management: a literature review and two-component model
  publication-title: Psychol. Bull.
– year: 1964
  ident: b0440
  article-title: Work and Motivation
– year: 1974
  ident: b0070
  article-title: The Uses of Mass Communications: Current Perspectives on Gratifications Research
– volume: 32
  start-page: 192
  year: 2009
  end-page: 219
  ident: b0285
  article-title: Public value inside: what is public value creation?
  publication-title: Int. J. Public Administration
– year: 1986
  ident: b0065
  article-title: Symbolic Interactionism: Perspectives and Method
– volume: 1
  start-page: 311
  year: 1991
  end-page: 335
  ident: b0340
  article-title: Communication boundary management: a theoretical model of managing disclosure of private information between married couples
  publication-title: Commun. Theory
– year: 1975
  ident: b0435
  article-title: Judgment under uncertainty: Heuristics and biases. Utility, Probability, and Human Decision Making
– reference: Tsai, J., Cranor, L., Acquisti, A., Fong, C., 2006. What’s it for you? A survey of online privacy concerns and risk. NET Institute Working Paper, No. 06–29, 1–20.
– reference: Zafeiropoulou, A.M., Millard, D.E., Webber, C., O’Hara, K., 2013. Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions?. In: WebSci '13 Proceedings of the 5th Annual ACM Web Science Conference, New York, USA, 463–472.
– volume: 18
  start-page: 13
  year: 2015
  end-page: 19
  ident: b0090
  article-title: Couldn’t or wouldn’t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection
  publication-title: Cyberpsychol. Behav. Social Networking
– volume: 2013
  start-page: 1
  year: 2013
  end-page: 11
  ident: b0225
  article-title: Privacy as part of the app decision-making process
  publication-title: CHI
– volume: 25
  start-page: 607
  year: 2015
  end-page: 635
  ident: b0215
  article-title: Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus
  publication-title: Inf. Syst. J.
– start-page: 148
  year: 2012
  end-page: 159
  ident: b0140
  article-title: Type indeterminacy in privacy decisions: the privacy paradox revisited
  publication-title: Quantum interaction. Lecture notes in Computer Science
– volume: 25
  start-page: 769
  year: 2008
  end-page: 786
  ident: b0230
  article-title: An examination of factors influencing consumer adoption of short message service (SMS)
  publication-title: Psychol. Market.
– volume: 35
  start-page: 989
  year: 2011
  end-page: 1015
  ident: b0390
  article-title: Information privacy research: an interdisciplinary review
  publication-title: MIS Quarterly
– reference: Phelan, C., Lampe, C., Resnick, P., 2016. It’s creepy, but it doesn’t bother me. CHI 2016, San Jose, CA, USA, 5240-5251.
– reference: Barnes, S.B., 2006. A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from
– volume: 50
  start-page: 220
  year: 2006
  end-page: 241
  ident: b0085
  article-title: Quantum dynamics of human decision making
  publication-title: J. Math. Psychol.
– volume: 36
  start-page: 56
  year: 2008
  end-page: 72
  ident: b0310
  article-title: The fit of thinking style and situation: new measures of situation-specific experiential and rational cognition
  publication-title: J. Consum. Res.
– start-page: 226
  year: 2009
  end-page: 236
  ident: b0360
  article-title: Privacy awareness: a means to solve the privacy paradox?
  publication-title: The Future of Identity in the Information Society
– volume: 62
  start-page: 443
  year: 1997
  end-page: 477
  ident: b0250
  article-title: Golden eggs and hyperbolic discounting
  publication-title: Quart. J. Econ.
– reference: Park, Y., Ju, J., Ahn, J-H., 2015. Are people really concerned about their privacy?: Privacy paradox in mobile environment. In: The Fifteenth International Conference on Electronic Business, Hong Kong, 123–128.
– year: 1984
  ident: b0155
  article-title: The Constitution of Society: Outline of the Theory of Structuration
– volume: 65
  start-page: 409
  year: 2016
  end-page: 419
  ident: b0335
  article-title: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison
  publication-title: Comput. Hum. Behav.
– reference: Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H., 2014. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. CHI 2014, Toronto, ON, Canada, 2347-2356.
– start-page: 11
  year: 1985
  end-page: 39
  ident: b0035
  article-title: From intentions to actions: a theory of planned behavior
  publication-title: Action-Control: From Cognition to Behavior
– year: 1980
  ident: b0040
  article-title: Understanding Attitudes and Predicting Social Behavior
– volume: 171
  start-page: 345
  year: 1971
  end-page: 351
  ident: b0145
  article-title: Interpersonal and economic resources
  publication-title: Science
– volume: 69
  start-page: 99
  year: 1955
  end-page: 118
  ident: b0400
  article-title: A behavioural model of rational choice
  publication-title: Q. J. Econ.
– reference: Yoo, C.W., Ahn, H.J., Rao, H.R., 2012. An exploration of the impact of information privacy invasion. In: Proceeding of Thirty Third International Conference on Information Systems, Orlando, Florida, 1–18.
– start-page: 275
  year: 2010
  end-page: 283
  ident: b0115
  article-title: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services
  publication-title: Privacy and Identity Management for Life
– volume: 25
  start-page: 1
  year: 2010
  end-page: 24
  ident: b0190
  article-title: Privacy, trust, and self-disclosure online
  publication-title: Hum.-Comput. Interact.
– volume: 93
  start-page: 1449
  year: 2003
  end-page: 1475
  ident: b0195
  article-title: Maps of bounded rationality: Psychology for behavioral economics
  publication-title: Am. Econ. Rev.
– volume: XI
  start-page: 513
  year: 2010
  end-page: 517
  ident: b0280
  article-title: Online social networks and the privacy paradox: a research framework
  publication-title: Issues Inf. Syst.
– start-page: 127
  year: 2011
  end-page: 141
  ident: b0240
  article-title: Online self-presentation: balancing privacy concerns and impression construction on social networking sites
  publication-title: Privacy Online
– volume: 51
  start-page: 62
  year: 2010
  end-page: 71
  ident: b0270
  article-title: Understanding situational online information disclosure as a privacy calculus
  publication-title: J. Comput. Inf. Syst.
– start-page: 111
  year: 2014
  end-page: 114
  ident: b0475
  article-title: Effects of security warnings and instant gratification cues on attitudes toward mobile websites
  publication-title: CHI 2014
– volume: 17
  start-page: 61
  year: 2006
  end-page: 80
  ident: b0120
  article-title: An extended privacy calculus model for e-commerce transactions
  publication-title: Inf. Syst. J.
– reference: Gambino, A., Kim., J., Sundar, S.S., Ge, J., Rosson, M.B., 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. CHI 2016. San Jose, CA, USA, 2837-2842.
– volume: 116
  start-page: 121
  year: 2001
  end-page: 160
  ident: b0315
  article-title: Choice and procrastination
  publication-title: Quart. J. Econ.
– volume: 34
  start-page: 67
  year: 1984
  end-page: 77
  ident: b0375
  article-title: Ritualized and instrumental television viewing
  publication-title: J. Commun.
– volume: 5
  start-page: 77
  year: 1996
  end-page: 80
  ident: b0005
  article-title: Specific processes of social representations
  publication-title: Pap. Social Representations
– volume: 3
  start-page: 26
  year: 2005
  end-page: 33
  ident: b0020
  article-title: Privacy and rationality in individual decision making
  publication-title: IEEE Secur. Priv.
– reference: Motiwalla, L.F., Li, X., Liu, X., 2014. Privacy paradox: Does stated privacy concerns translate into the valuation of personal information?. In: Proceeding of the 19th Pacific Asia Conference on Information Systems (PACIS 2014), Paper 281.
– year: 1966
  ident: b0075
  article-title: A Theory of Psychological Reactance
– reference: Hu, Q., Ma, S., 2010. Does privacy still matter in the era of Web 2.0? A qualitative study of user behavior towards online social networking activities. In: Proceedings of Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan, 2, pp. 591–602.
– start-page: 289
  year: 2011
  end-page: 308
  ident: b0380
  article-title: Feelings-as-information theory
  publication-title: Handbook of Theories of Social Psychology
– reference: Wilson, D.W., Valacich, J.S., 2012. Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. In: Thirty Third International Conference on Information Systems, Orlando, Florida, 1-11.
– year: 1975
  ident: b0050
  article-title: The Environment and Social Behavior
– volume: 47
  start-page: 1
  year: 1983
  end-page: 15
  ident: b0105
  article-title: The third-person effect in communication
  publication-title: Public Opin. Q.
– reference: Poikela, M., Schmidt, R., Wechsung, I., Mueller, S., 2015. FlashPolling privacy: The discrepancy of intention and action in location-based poll participation. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, Osaka, Japan, 813–818.
– year: 1982
  ident: b0405
  article-title: Models of Bounded Rationality
– volume: 32
  start-page: 1492
  year: 1986
  end-page: 1512
  ident: b0410
  article-title: Reducing social context cues: electronic mail in organizational communication
  publication-title: Manage. Sci.
– year: 1991
  ident: b0415
  article-title: Connections: New Ways of Working in the Networked Organization
– reference: Alashoor, T., Baskerville, R., 2015. The privacy paradox: The role of cognitive absorption in the social networking activity. In: Thirty Sixth International Conference on Information Systems, Fort Worth, Texas, USA, 1–20.
– start-page: 740
  year: 2009
  end-page: 746
  ident: b0300
  article-title: Social networks security
  publication-title: Third International Conference on Emerging Security Information, Systems and Technologies
– volume: 37
  start-page: 509
  year: 1974
  end-page: 523
  ident: b0205
  article-title: Uses and gratifications research
  publication-title: Public Opin. Q.
– volume: 29
  start-page: 785
  year: 1974
  end-page: 793
  ident: b0125
  article-title: Effect of resource class on retaliation to injustice in interpersonal exchange
  publication-title: J. Pers. Soc. Psychol.
– volume: 14
  start-page: 159
  year: 1967
  end-page: 182
  ident: b0160
  article-title: Games with incomplete information played by “Bayesian” players, I-III Part I. The basic model
  publication-title: Manage. Sci.
– volume: 54
  start-page: 471
  year: 2012
  end-page: 481
  ident: b0265
  article-title: Theories in online information privacy research: a critical review and an integrated framework
  publication-title: Decis. Support Syst.
– year: 2012
  ident: b0425
  article-title: Studien Zu Gemeinschaft Und Gesellschaft
– reference: .
– volume: 52
  start-page: 315
  year: 1999
  end-page: 344
  ident: b0260
  article-title: Because it is there: The challenge of mountaineeringEllipsisfor utility theory
  publication-title: Kyklos
– volume: 47
  start-page: 263
  year: 1979
  end-page: 291
  ident: b0200
  article-title: Prospect theory: an analysis of decision under risk
  publication-title: Econometrica
– volume: 60
  start-page: 61
  year: 2016
  end-page: 86
  ident: b0370
  article-title: Why we share: a uses and gratifications approach to privacy regulation in social media use
  publication-title: J. Broadcast. Electron. Media
– volume: 16
  start-page: 479
  year: 2013
  end-page: 500
  ident: b0465
  article-title: Privacy protection strategies on Facebook
  publication-title: Inf. Commun. Soc.
– volume: 45
  start-page: 285
  year: 2015
  end-page: 297
  ident: b9005
  article-title: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors
  publication-title: Eur. J. Soc. Psychol.
– volume: 22
  start-page: 157
  year: 2013
  end-page: 174
  ident: b0445
  article-title: The influence of user affect in online information disclosure
  publication-title: J. Strategic Inf. Syst.
– year: 2002
  ident: b0345
  article-title: Boundaries of Privacy: Dialectics of Disclosure
– volume: 64
  start-page: 122
  year: 2017
  end-page: 134
  ident: b0235
  article-title: Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
  publication-title: Comput. Secur.
– volume: 24
  start-page: 665
  year: 2000
  end-page: 694
  ident: b0030
  article-title: Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage
  publication-title: MIS Quarterly
– start-page: 11
  year: 1985
  ident: 10.1016/j.tele.2017.04.013_b0035
  article-title: From intentions to actions: a theory of planned behavior
– ident: 10.1016/j.tele.2017.04.013_b0080
– volume: 62
  start-page: 443
  issue: 2
  year: 1997
  ident: 10.1016/j.tele.2017.04.013_b0250
  article-title: Golden eggs and hyperbolic discounting
  publication-title: Quart. J. Econ.
  doi: 10.1162/003355397555253
– ident: 10.1016/j.tele.2017.04.013_b0330
– volume: 16
  start-page: 479
  issue: 4
  year: 2013
  ident: 10.1016/j.tele.2017.04.013_b0465
  article-title: Privacy protection strategies on Facebook
  publication-title: Inf. Commun. Soc.
  doi: 10.1080/1369118X.2013.777757
– ident: 10.1016/j.tele.2017.04.013_b0045
– year: 1984
  ident: 10.1016/j.tele.2017.04.013_b0155
– volume: 21
  start-page: 329
  issue: 3
  year: 1953
  ident: 10.1016/j.tele.2017.04.013_b0180
  article-title: Stated expectations as functions of probability and desirability of outcomes
  publication-title: J. Pers.
  doi: 10.1111/j.1467-6494.1953.tb01775.x
– ident: 10.1016/j.tele.2017.04.013_b0385
  doi: 10.1145/2556288.2557421
– start-page: 148
  year: 2012
  ident: 10.1016/j.tele.2017.04.013_b0140
  article-title: Type indeterminacy in privacy decisions: the privacy paradox revisited
– ident: 10.1016/j.tele.2017.04.013_b0170
– volume: 50
  start-page: 220
  year: 2006
  ident: 10.1016/j.tele.2017.04.013_b0085
  article-title: Quantum dynamics of human decision making
  publication-title: J. Math. Psychol.
  doi: 10.1016/j.jmp.2006.01.003
– volume: 18
  start-page: 13
  issue: 1
  year: 2015
  ident: 10.1016/j.tele.2017.04.013_b0090
  article-title: Couldn’t or wouldn’t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection
  publication-title: Cyberpsychol. Behav. Social Networking
  doi: 10.1089/cyber.2014.0456
– volume: 60
  start-page: 61
  issue: 1
  year: 2016
  ident: 10.1016/j.tele.2017.04.013_b0370
  article-title: Why we share: a uses and gratifications approach to privacy regulation in social media use
  publication-title: J. Broadcast. Electron. Media
  doi: 10.1080/08838151.2015.1127245
– volume: 25
  start-page: 1
  year: 2010
  ident: 10.1016/j.tele.2017.04.013_b0190
  article-title: Privacy, trust, and self-disclosure online
  publication-title: Hum.-Comput. Interact.
  doi: 10.1080/07370020903586662
– year: 2012
  ident: 10.1016/j.tele.2017.04.013_b0425
– volume: 32
  start-page: 1492
  issue: 11
  year: 1986
  ident: 10.1016/j.tele.2017.04.013_b0410
  article-title: Reducing social context cues: electronic mail in organizational communication
  publication-title: Manage. Sci.
  doi: 10.1287/mnsc.32.11.1492
– ident: 10.1016/j.tele.2017.04.013_b0420
  doi: 10.1145/2468356.2468501
– volume: 9
  start-page: 206
  year: 1984
  ident: 10.1016/j.tele.2017.04.013_b0245
  article-title: Causes of underinsurance against natural disasters
  publication-title: Geneva Pap. Risk Insurance
  doi: 10.1057/gpp.1984.12
– ident: 10.1016/j.tele.2017.04.013_b0295
– year: 1966
  ident: 10.1016/j.tele.2017.04.013_b0075
– volume: 24
  start-page: 157
  issue: 4–6
  year: 2015
  ident: 10.1016/j.tele.2017.04.013_b0395
  article-title: QR panopticism: user behavior triangulation and barcode-scanning applications
  publication-title: Inf. Secur. J. Global Perspect.
  doi: 10.1080/19393555.2015.1085113
– volume: 17
  start-page: 61
  issue: 1
  year: 2006
  ident: 10.1016/j.tele.2017.04.013_b0120
  article-title: An extended privacy calculus model for e-commerce transactions
  publication-title: Inf. Syst. J.
– start-page: 226
  year: 2009
  ident: 10.1016/j.tele.2017.04.013_b0360
  article-title: Privacy awareness: a means to solve the privacy paradox?
– volume: 29
  start-page: 785
  issue: 6
  year: 1974
  ident: 10.1016/j.tele.2017.04.013_b0125
  article-title: Effect of resource class on retaliation to injustice in interpersonal exchange
  publication-title: J. Pers. Soc. Psychol.
  doi: 10.1037/h0036201
– volume: 25
  start-page: 769
  issue: 8
  year: 2008
  ident: 10.1016/j.tele.2017.04.013_b0230
  article-title: An examination of factors influencing consumer adoption of short message service (SMS)
  publication-title: Psychol. Market.
  doi: 10.1002/mar.20238
– year: 1964
  ident: 10.1016/j.tele.2017.04.013_b0440
– volume: 41
  start-page: 100
  issue: 1
  year: 2007
  ident: 10.1016/j.tele.2017.04.013_b0305
  article-title: The privacy paradox: personal information disclosure intentions versus behaviors
  publication-title: J. Consum. Affairs
  doi: 10.1111/j.1745-6606.2006.00070.x
– year: 1986
  ident: 10.1016/j.tele.2017.04.013_b0065
– volume: 54
  start-page: 471
  year: 2012
  ident: 10.1016/j.tele.2017.04.013_b0265
  article-title: Theories in online information privacy research: a critical review and an integrated framework
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2012.06.010
– year: 2002
  ident: 10.1016/j.tele.2017.04.013_b0345
– volume: 24
  start-page: 665
  issue: 4
  year: 2000
  ident: 10.1016/j.tele.2017.04.013_b0030
  article-title: Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage
  publication-title: MIS Quarterly
  doi: 10.2307/3250951
– volume: 38
  start-page: 33
  year: 2014
  ident: 10.1016/j.tele.2017.04.013_b9000
  article-title: Solving the privacy paradox: A counter-argument experimental approach
  publication-title: Comput. Hum. Behav.
  doi: 10.1016/j.chb.2014.05.006
– volume: 22
  start-page: 157
  year: 2013
  ident: 10.1016/j.tele.2017.04.013_b0445
  article-title: The influence of user affect in online information disclosure
  publication-title: J. Strategic Inf. Syst.
  doi: 10.1016/j.jsis.2013.01.003
– ident: 10.1016/j.tele.2017.04.013_b0355
  doi: 10.1145/2800835.2804402
– ident: 10.1016/j.tele.2017.04.013_b0055
  doi: 10.5210/fm.v11i9.1394
– year: 1975
  ident: 10.1016/j.tele.2017.04.013_b0435
– volume: 36
  start-page: 56
  issue: 6
  year: 2008
  ident: 10.1016/j.tele.2017.04.013_b0310
  article-title: The fit of thinking style and situation: new measures of situation-specific experiential and rational cognition
  publication-title: J. Consum. Res.
– volume: 69
  start-page: 99
  issue: 1
  year: 1955
  ident: 10.1016/j.tele.2017.04.013_b0400
  article-title: A behavioural model of rational choice
  publication-title: Q. J. Econ.
  doi: 10.2307/1884852
– year: 1982
  ident: 10.1016/j.tele.2017.04.013_b0405
– start-page: 293
  year: 1997
  ident: 10.1016/j.tele.2017.04.013_b0025
  article-title: Cognitive absorption and the adoption of new information technologies
– year: 1980
  ident: 10.1016/j.tele.2017.04.013_b0040
– year: 1974
  ident: 10.1016/j.tele.2017.04.013_b0070
– volume: 14
  start-page: 159
  issue: 3
  year: 1967
  ident: 10.1016/j.tele.2017.04.013_b0160
  article-title: Games with incomplete information played by “Bayesian” players, I-III Part I. The basic model
  publication-title: Manage. Sci.
  doi: 10.1287/mnsc.14.3.159
– ident: 10.1016/j.tele.2017.04.013_b0430
  doi: 10.2139/ssrn.941708
– start-page: 81
  year: 2011
  ident: 10.1016/j.tele.2017.04.013_b0275
  article-title: Privacy concerns and online behavior – not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses
– ident: 10.1016/j.tele.2017.04.013_b0150
  doi: 10.1145/2851581.2892413
– volume: 47
  start-page: 263
  issue: 2
  year: 1979
  ident: 10.1016/j.tele.2017.04.013_b0200
  article-title: Prospect theory: an analysis of decision under risk
  publication-title: Econometrica
  doi: 10.2307/1914185
– volume: 48
  start-page: 101
  issue: 4
  year: 2005
  ident: 10.1016/j.tele.2017.04.013_b0060
  article-title: Privacy in e-commerce: stated preferences vs. actual behavior
  publication-title: Commun. ACM
  doi: 10.1145/1053291.1053295
– volume: 15
  start-page: 83
  year: 2009
  ident: 10.1016/j.tele.2017.04.013_b0110
  article-title: Facebook and online privacy: attitudes, behaviors, and unintended consequences
  publication-title: J. Comput.-Mediated Commun.
  doi: 10.1111/j.1083-6101.2009.01494.x
– ident: 10.1016/j.tele.2017.04.013_b0320
  doi: 10.1145/1979742.1979887
– start-page: 121
  year: 2008
  ident: 10.1016/j.tele.2017.04.013_b0325
  article-title: Privacy risk perceptions and privacy protection strategies
– volume: 51
  start-page: 62
  issue: 1
  year: 2010
  ident: 10.1016/j.tele.2017.04.013_b0270
  article-title: Understanding situational online information disclosure as a privacy calculus
  publication-title: J. Comput. Inf. Syst.
– ident: 10.1016/j.tele.2017.04.013_b0460
– ident: 10.1016/j.tele.2017.04.013_b0185
  doi: 10.1145/2675133.2675287
– volume: 45
  start-page: 285
  issue: 3
  year: 2015
  ident: 10.1016/j.tele.2017.04.013_b9005
  article-title: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors
  publication-title: Eur. J. Soc. Psychol.
  doi: 10.1002/ejsp.2049
– ident: 10.1016/j.tele.2017.04.013_b0175
  doi: 10.1109/SocialCom.2013.140
– volume: 47
  start-page: 1
  issue: 1
  year: 1983
  ident: 10.1016/j.tele.2017.04.013_b0105
  article-title: The third-person effect in communication
  publication-title: Public Opin. Q.
  doi: 10.1086/268763
– volume: 65
  start-page: 135
  issue: 2
  year: 1957
  ident: 10.1016/j.tele.2017.04.013_b0130
  article-title: An economic theory of political action in a democracy
  publication-title: J. Political Economy
  doi: 10.1086/257897
– volume: XI
  start-page: 513
  issue: 1
  year: 2010
  ident: 10.1016/j.tele.2017.04.013_b0280
  article-title: Online social networks and the privacy paradox: a research framework
  publication-title: Issues Inf. Syst.
– ident: 10.1016/j.tele.2017.04.013_b0365
  doi: 10.1145/1868914.1868957
– volume: 10
  start-page: 340
  issue: 1
  year: 1999
  ident: 10.1016/j.tele.2017.04.013_b0095
  article-title: Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
  publication-title: Organ. Sci.
  doi: 10.1287/orsc.10.1.104
– ident: 10.1016/j.tele.2017.04.013_b0450
– volume: 107
  start-page: 34
  year: 1990
  ident: 10.1016/j.tele.2017.04.013_b0255
  article-title: Impression management: a literature review and two-component model
  publication-title: Psychol. Bull.
  doi: 10.1037/0033-2909.107.1.34
– year: 1975
  ident: 10.1016/j.tele.2017.04.013_b0050
– start-page: 275
  year: 2010
  ident: 10.1016/j.tele.2017.04.013_b0115
  article-title: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services
– ident: 10.1016/j.tele.2017.04.013_b0010
  doi: 10.1145/988772.988777
– start-page: 740
  year: 2009
  ident: 10.1016/j.tele.2017.04.013_b0300
  article-title: Social networks security
– ident: 10.1016/j.tele.2017.04.013_b0165
– volume: 93
  start-page: 1449
  issue: 5
  year: 2003
  ident: 10.1016/j.tele.2017.04.013_b0195
  article-title: Maps of bounded rationality: Psychology for behavioral economics
  publication-title: Am. Econ. Rev.
  doi: 10.1257/000282803322655392
– volume: 52
  start-page: 315
  issue: 3
  year: 1999
  ident: 10.1016/j.tele.2017.04.013_b0260
  article-title: Because it is there: The challenge of mountaineeringEllipsisfor utility theory
  publication-title: Kyklos
  doi: 10.1111/j.1467-6435.1999.tb00221.x
– volume: 35
  start-page: 989
  issue: 4
  year: 2011
  ident: 10.1016/j.tele.2017.04.013_b0390
  article-title: Information privacy research: an interdisciplinary review
  publication-title: MIS Quarterly
  doi: 10.2307/41409970
– volume: 3
  start-page: 26
  issue: 1
  year: 2005
  ident: 10.1016/j.tele.2017.04.013_b0020
  article-title: Privacy and rationality in individual decision making
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSP.2005.22
– start-page: 3
  year: 1984
  ident: 10.1016/j.tele.2017.04.013_b0290
  article-title: The phenomenon of social representations
– volume: 5
  start-page: 77
  issue: 1
  year: 1996
  ident: 10.1016/j.tele.2017.04.013_b0005
  article-title: Specific processes of social representations
  publication-title: Pap. Social Representations
– volume: 171
  start-page: 345
  issue: 3969
  year: 1971
  ident: 10.1016/j.tele.2017.04.013_b0145
  article-title: Interpersonal and economic resources
  publication-title: Science
  doi: 10.1126/science.171.3969.345
– start-page: 111
  year: 2014
  ident: 10.1016/j.tele.2017.04.013_b0475
  article-title: Effects of security warnings and instant gratification cues on attitudes toward mobile websites
– volume: 37
  start-page: 509
  issue: 4
  year: 1974
  ident: 10.1016/j.tele.2017.04.013_b0205
  article-title: Uses and gratifications research
  publication-title: Public Opin. Q.
  doi: 10.1086/268109
– start-page: 127
  year: 2011
  ident: 10.1016/j.tele.2017.04.013_b0240
  article-title: Online self-presentation: balancing privacy concerns and impression construction on social networking sites
– volume: 116
  start-page: 121
  issue: 1
  year: 2001
  ident: 10.1016/j.tele.2017.04.013_b0315
  article-title: Choice and procrastination
  publication-title: Quart. J. Econ.
  doi: 10.1162/003355301556365
– ident: 10.1016/j.tele.2017.04.013_b0350
  doi: 10.1145/2858036.2858381
– volume: 26
  start-page: 135
  issue: 3
  year: 2010
  ident: 10.1016/j.tele.2017.04.013_b0455
  article-title: The role of push-pull technology in privacy calculus: the case of location-based services
  publication-title: J. Manage. Inf. Syst.
  doi: 10.2753/MIS0742-1222260305
– ident: 10.1016/j.tele.2017.04.013_b0470
  doi: 10.1145/2464464.2464503
– volume: 2013
  start-page: 1
  year: 2013
  ident: 10.1016/j.tele.2017.04.013_b0225
  article-title: Privacy as part of the app decision-making process
  publication-title: CHI
– volume: 65
  start-page: 409
  year: 2016
  ident: 10.1016/j.tele.2017.04.013_b0335
  article-title: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison
  publication-title: Comput. Hum. Behav.
  doi: 10.1016/j.chb.2016.09.005
– volume: 32
  start-page: 192
  issue: 3–4
  year: 2009
  ident: 10.1016/j.tele.2017.04.013_b0285
  article-title: Public value inside: what is public value creation?
  publication-title: Int. J. Public Administration
  doi: 10.1080/01900690902732632
– ident: 10.1016/j.tele.2017.04.013_b0210
– volume: 64
  start-page: 122
  year: 2017
  ident: 10.1016/j.tele.2017.04.013_b0235
  article-title: Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2015.07.002
– volume: 34
  start-page: 67
  year: 1984
  ident: 10.1016/j.tele.2017.04.013_b0375
  article-title: Ritualized and instrumental television viewing
  publication-title: J. Commun.
  doi: 10.1111/j.1460-2466.1984.tb02174.x
– volume: 10
  start-page: 191
  issue: 5
  year: 1955
  ident: 10.1016/j.tele.2017.04.013_b0100
  article-title: Conformity and character
  publication-title: Am. Psychol.
  doi: 10.1037/h0040237
– volume: 71
  start-page: 1163
  year: 2013
  ident: 10.1016/j.tele.2017.04.013_b0220
  article-title: Information disclosure on mobile devices: R-examining privacy calculus with actual user behavior
  publication-title: Int. J. Hum Comput Stud.
  doi: 10.1016/j.ijhcs.2013.08.016
– volume: 1
  start-page: 311
  issue: 4
  year: 1991
  ident: 10.1016/j.tele.2017.04.013_b0340
  article-title: Communication boundary management: a theoretical model of managing disclosure of private information between married couples
  publication-title: Commun. Theory
  doi: 10.1111/j.1468-2885.1991.tb00023.x
– volume: 25
  start-page: 607
  issue: 6
  year: 2015
  ident: 10.1016/j.tele.2017.04.013_b0215
  article-title: Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus
  publication-title: Inf. Syst. J.
  doi: 10.1111/isj.12062
– year: 1991
  ident: 10.1016/j.tele.2017.04.013_b0415
– start-page: 289
  year: 2011
  ident: 10.1016/j.tele.2017.04.013_b0380
  article-title: Feelings-as-information theory
SSID ssj0017191
Score 2.629029
SecondaryResourceType review_article
Snippet •This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect...
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1038
SubjectTerms Attitudes
Behavior
Benefit
Decision making
Decision theory
Discrepancies
Information privacy
Literature reviews
Mobile computing
On-line systems
Privacy
Privacy concerns
Privacy paradox
Risk
Risk assessment
Systematic review
User behavior
Title The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review
URI https://dx.doi.org/10.1016/j.tele.2017.04.013
https://www.proquest.com/docview/1966075495
Volume 34
WOSCitedRecordID wos000413384600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1879-324X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0017191
  issn: 0736-5853
  databaseCode: AIEXJ
  dateStart: 19951201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3BjtMwELWqLhJwQLCA2GVBPnCrUsVru3aOBRYBghWHIvUWObaLdlWlVVOqHvmH5T_4J76Ecew4acWu2AOXqIqcadJ59YydN28QeiU0lzrTsyQrDE2YkFmiLNMJVQUjRjFpvWT-J3F-LqfT7Euv96uphdnMRVnK7TZb_ldXwzlwtiudvYW7o1E4AZ_B6XAEt8Pxnx2_XF1sXB93J-xtFttBQ2mgXV2N8pt7PQNZ47Lu0FtFzpbd1uxYa6Id7YobV6XXc1a-5sRrbMQ6_853jLv60POo2xzKZLrp8ASCXj2sCipQIYVuGfivVaAw1vShlgNgXEWbn6c-Q6xYDN4OJ8PuFgaERRK3MPxMJ-gogXUL7U7LYY_Tw0905lgn6d6J15Agyr_GAr8tcTlcw6M4Dp-oNW195euu8PZeQIw0xYYBd5k7G7mzkacsT12X5INTwTPZRwfjD2fTj_HFlSC-SWPzRKFOy1MK9-_kulxoLyuoU53JQ_QgrFHw2GPrEerZ8hDdbUrYq0N0v6Ni-Rj9BMThgBQcEId__7jCO1jDO1jDAWs4Yi1aaLCGARHYYw17rOEGa7X1MW5RhluUYY-yJ-jru7PJm_dJaPaRaCbJOiFMw9SgLMkkBD5Y5sqCjQwvFKfKzhTnNmO6MKlmzJpTbQyhRhA6KiyMFNzQp6hfLkr7DOG0yGaw8DdEzygriJLcQhCfcWX4iIpUHyHS_Oy5Dkr4riHLPL_e4UdoEK9Zeh2YG0fzxpt5yGR9hpoDOG-87qRxfR6mlConTkBXcJbx41vdxHN0r_2znaD-evXdvkB39GZ9Ua1eBuD-AUlT0gk
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+privacy+paradox+%E2%80%93+Investigating+discrepancies+between+expressed+privacy+concerns+and+actual+online+behavior+%E2%80%93+A+systematic+literature+review&rft.jtitle=Telematics+and+informatics&rft.au=Barth%2C+Susanne&rft.au=de+Jong%2C+Menno+D.T.&rft.date=2017-11-01&rft.issn=0736-5853&rft.volume=34&rft.issue=7&rft.spage=1038&rft.epage=1058&rft_id=info:doi/10.1016%2Fj.tele.2017.04.013&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_tele_2017_04_013
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0736-5853&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0736-5853&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0736-5853&client=summon