The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review
•This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect their data.•Risk-benefit evaluation or little risk assessment drives information disclosure.•Design solutions of mobile apps should be adapted t...
Saved in:
| Published in: | Telematics and informatics Vol. 34; no. 7; pp. 1038 - 1058 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Oxford
Elsevier Ltd
01.11.2017
Elsevier Science Ltd |
| Subjects: | |
| ISSN: | 0736-5853, 1879-324X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | •This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect their data.•Risk-benefit evaluation or little risk assessment drives information disclosure.•Design solutions of mobile apps should be adapted to different cognitive styles.•Support users through automated user-centered systems and user-friendly interface.
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox.
Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user’s decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed. |
|---|---|
| AbstractList | •This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect their data.•Risk-benefit evaluation or little risk assessment drives information disclosure.•Design solutions of mobile apps should be adapted to different cognitive styles.•Support users through automated user-centered systems and user-friendly interface.
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox.
Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user’s decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed. Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox. Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user's decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed. |
| Author | de Jong, Menno D.T. Barth, Susanne |
| Author_xml | – sequence: 1 givenname: Susanne surname: Barth fullname: Barth, Susanne email: s.barth@utwente.nl organization: University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science, Services, Cybersecurity and Safety Research Group, PO Box 217, 7500 AE Enschede, The Netherlands – sequence: 2 givenname: Menno D.T. surname: de Jong fullname: de Jong, Menno D.T. email: m.d.t.dejong@utwente.nl organization: University of Twente, Faculty of Behavioural, Management and Social Sciences, Department of Communication Science, PO Box 217, 7500 AE Enschede, The Netherlands |
| BookMark | eNp9kL1OHDEUha0IpCyQF0hlKfVM7B17fqQ0COUHCSkNkeisO_Zd8GqwJ9fehe3yDskT8iR42ShFCqrbnO9cne-EHYUYkLH3UtRSyPbjus44Yb0UsquFqoVs3rCF7Luhapbq5ogtRNe0le5185adpLQWJSgHuWB_ru-Qz-S3YHd8BgIXH_nTr9_8MmwxZX8L2Ydb7nyyhDME6zHxEfMDYuD4OBOmhO5fg43BIoXEITgONm9g4jFMPmCB7mDrI720n_O0SxnvS7vlk89IkDeEnHDr8eGMHa9gSvju7z1lP758vr74Vl19_3p5cX5VWdXLXEllHShAOfSi7_XQ9aNqnR5BN4Ar0BoHZUcnrFLoltY52bhONu2IJdlp15yyD4femeLPTZlr1nFDobw0cmhb0Wk16JJaHlKWYkqEK1PW3gPtjBRmb9-szd6-2ds3Qpliv0D9f5D1uayNIRP46XX00wHFMr3oIJOK9eLVeUKbjYv-NfwZ2Leo5g |
| CitedBy_id | crossref_primary_10_1016_j_jbusres_2022_04_034 crossref_primary_10_1007_s11301_021_00239_4 crossref_primary_10_1016_j_jretconser_2020_102127 crossref_primary_10_1080_1369118X_2025_2470227 crossref_primary_10_1186_s41239_024_00471_4 crossref_primary_10_1108_K_05_2021_0377 crossref_primary_10_3389_fdgth_2021_675754 crossref_primary_10_1108_GKMC_12_2021_0209 crossref_primary_10_33225_pec_21_79_162 crossref_primary_10_1016_j_jbusres_2024_114584 crossref_primary_10_2196_31633 crossref_primary_10_1016_j_jretai_2020_10_002 crossref_primary_10_17645_mac_v8i2_2855 crossref_primary_10_1016_j_ijinfomgt_2019_09_011 crossref_primary_10_4018_JGIM_325793 crossref_primary_10_1016_j_chb_2022_107638 crossref_primary_10_3233_IP_211500 crossref_primary_10_1177_10949968251320609 crossref_primary_10_15290_bsp_2021_26_05_04 crossref_primary_10_2196_46562 crossref_primary_10_1145_3440754 crossref_primary_10_1007_s10664_024_10544_7 crossref_primary_10_1016_j_tele_2019_03_003 crossref_primary_10_3390_bs15030324 crossref_primary_10_1080_00167428_2024_2422873 crossref_primary_10_1080_09585192_2024_2445135 crossref_primary_10_1108_AJIM_04_2021_0121 crossref_primary_10_1016_j_chb_2021_106941 crossref_primary_10_1108_INTR_09_2022_0745 crossref_primary_10_3982_TE4390 crossref_primary_10_1007_s12525_025_00805_8 crossref_primary_10_1016_j_jbusres_2019_12_006 crossref_primary_10_1002_cb_2029 crossref_primary_10_1093_cybsec_tyaa014 crossref_primary_10_5817_CP2022_3_1 crossref_primary_10_1016_j_chbah_2023_100039 crossref_primary_10_1016_j_heliyon_2023_e16182 crossref_primary_10_1108_IMDS_09_2023_0623 crossref_primary_10_1371_journal_pone_0253568 crossref_primary_10_15507_1991_9468_029_202501_114_131 crossref_primary_10_3917_dm_111_0011 crossref_primary_10_1177_2056305120978376 crossref_primary_10_1016_j_ribaf_2022_101826 crossref_primary_10_1017_bpp_2021_40 crossref_primary_10_1108_ITP_03_2018_0132 crossref_primary_10_1177_09636625251330575 crossref_primary_10_1016_j_techfore_2022_121592 crossref_primary_10_1080_01639625_2023_2254446 crossref_primary_10_3389_fpsyg_2022_996512 crossref_primary_10_1007_s12525_022_00541_3 crossref_primary_10_1016_j_jretconser_2023_103284 crossref_primary_10_1080_0144929X_2022_2106307 crossref_primary_10_1093_isq_sqae090 crossref_primary_10_2196_13306 crossref_primary_10_1108_YC_05_2024_2072 crossref_primary_10_1007_s00146_019_00916_9 crossref_primary_10_1080_0144929X_2022_2152366 crossref_primary_10_1016_j_tele_2022_101831 crossref_primary_10_1080_08874417_2025_2534545 crossref_primary_10_1177_1461444820924619 crossref_primary_10_1145_3611064 crossref_primary_10_1080_15265161_2023_2263286 crossref_primary_10_2478_bjes_2025_0008 crossref_primary_10_4018_IJCBPL_2019070103 crossref_primary_10_1007_s11257_023_09385_8 crossref_primary_10_1016_j_jretai_2020_05_007 crossref_primary_10_1177_14614448231164934 crossref_primary_10_1016_j_chb_2021_106806 crossref_primary_10_1080_10447318_2025_2498489 crossref_primary_10_17645_mac_v8i2_2875 crossref_primary_10_1080_21639159_2024_2341835 crossref_primary_10_1108_INTR_01_2023_0029 crossref_primary_10_1016_j_jretconser_2023_103272 crossref_primary_10_2196_25525 crossref_primary_10_1080_0144929X_2025_2469657 crossref_primary_10_1109_ACCESS_2018_2836184 crossref_primary_10_15201_hungeobull_69_2_1 crossref_primary_10_1080_07370024_2019_1685883 crossref_primary_10_2196_37720 crossref_primary_10_1016_j_copsyc_2019_06_021 crossref_primary_10_5817_CP2022_4_1 crossref_primary_10_1108_INTR_01_2021_0005 crossref_primary_10_1016_j_ijinfomgt_2025_102928 crossref_primary_10_1177_20539517211059480 crossref_primary_10_1108_JRF_07_2019_0129 crossref_primary_10_1002_cb_2481 crossref_primary_10_1016_j_elerap_2024_101374 crossref_primary_10_1007_s12525_024_00744_w crossref_primary_10_1371_journal_pone_0251964 crossref_primary_10_1371_journal_pone_0294419 crossref_primary_10_1016_j_jisa_2024_103856 crossref_primary_10_1145_3558095 crossref_primary_10_1016_j_telpol_2024_102794 crossref_primary_10_1108_DPRG_07_2022_0076 crossref_primary_10_1016_j_ijhcs_2022_102917 crossref_primary_10_1108_OIR_03_2024_0135 crossref_primary_10_1108_OIR_11_2024_0708 crossref_primary_10_1080_10447318_2024_2316368 crossref_primary_10_1007_s12369_023_01093_y crossref_primary_10_1016_j_envsci_2024_103688 crossref_primary_10_24136_oc_2956 crossref_primary_10_3390_jrfm13030053 crossref_primary_10_1007_s11042_023_15775_2 crossref_primary_10_1088_1742_6596_2090_1_012017 crossref_primary_10_63090_IJJSRS_3049_0618_0020 crossref_primary_10_1016_j_heliyon_2023_e21448 crossref_primary_10_1145_3725737 crossref_primary_10_4018_IJISP_2022010119 crossref_primary_10_1108_ITP_05_2022_0376 crossref_primary_10_1556_204_2022_00002 crossref_primary_10_1016_j_tele_2019_04_006 crossref_primary_10_1016_j_teler_2025_100248 crossref_primary_10_1108_IJM_03_2021_0125 crossref_primary_10_1111_tgis_12924 crossref_primary_10_1080_10696679_2021_2024441 crossref_primary_10_1515_commun_2020_0037 crossref_primary_10_4018_JECO_292470 crossref_primary_10_1093_ct_qtae011 crossref_primary_10_1016_j_tele_2020_101366 crossref_primary_10_1080_1369118X_2019_1629693 crossref_primary_10_1089_cyber_2017_0709 crossref_primary_10_1007_s10458_022_09579_1 crossref_primary_10_1080_0144929X_2018_1552717 crossref_primary_10_1016_j_ipm_2019_102108 crossref_primary_10_1111_jems_12481 crossref_primary_10_1177_1529100620946707 crossref_primary_10_3389_fpsyg_2020_543388 crossref_primary_10_3389_fpubh_2022_847184 crossref_primary_10_2139_ssrn_3777417 crossref_primary_10_1080_09669582_2024_2309202 crossref_primary_10_1145_3555086 crossref_primary_10_1177_1071181322661484 crossref_primary_10_1007_s11031_025_10155_9 crossref_primary_10_1145_3589958 crossref_primary_10_1287_isre_2023_0318 crossref_primary_10_1080_0144929X_2024_2443523 crossref_primary_10_1177_00936502211060984 crossref_primary_10_1145_3449076 crossref_primary_10_1016_j_cose_2023_103258 crossref_primary_10_1109_TPC_2021_3110617 crossref_primary_10_1177_10946705221120232 crossref_primary_10_1007_s10515_024_00415_2 crossref_primary_10_1108_INTR_01_2024_0033 crossref_primary_10_1016_j_tele_2020_101377 crossref_primary_10_1016_j_jbusres_2021_07_031 crossref_primary_10_5817_CP2021_3_3 crossref_primary_10_1080_15332861_2021_1947741 crossref_primary_10_1080_07370024_2023_2281928 crossref_primary_10_1108_IMDS_08_2021_0485 crossref_primary_10_1016_j_jbusres_2018_07_037 crossref_primary_10_3390_app14177874 crossref_primary_10_1016_j_chb_2023_107700 crossref_primary_10_1016_j_jretconser_2021_102500 crossref_primary_10_1016_j_giq_2019_01_002 crossref_primary_10_3390_jcp3010005 crossref_primary_10_2196_31411 crossref_primary_10_1080_15213269_2025_2463392 crossref_primary_10_1051_shsconf_202418704001 crossref_primary_10_3390_su15021657 crossref_primary_10_1016_j_dsm_2024_12_005 crossref_primary_10_3390_jtaer20030152 crossref_primary_10_1080_01900692_2025_2488149 crossref_primary_10_1177_2455328X231206919 crossref_primary_10_1177_17480485231206358 crossref_primary_10_3390_psycholint7030079 crossref_primary_10_1080_14241277_2021_1960532 crossref_primary_10_36128_PRIW_VI50_907 crossref_primary_10_1016_j_chb_2023_107855 crossref_primary_10_3390_socsci11100442 crossref_primary_10_55643_fcaptp_3_62_2025_4734 crossref_primary_10_1177_14614448211016316 crossref_primary_10_1007_s40319_021_01090_6 crossref_primary_10_1016_j_jretconser_2019_101947 crossref_primary_10_1080_0144929X_2025_2520594 crossref_primary_10_1080_19368623_2025_2465634 crossref_primary_10_1111_jftr_12566 crossref_primary_10_3390_electronics9091382 crossref_primary_10_1016_j_im_2021_103497 crossref_primary_10_1080_10447318_2025_2552866 crossref_primary_10_1145_3616024 crossref_primary_10_2478_nor_2020_0022 crossref_primary_10_3389_fpsyg_2022_880261 crossref_primary_10_1093_jssam_smac018 crossref_primary_10_1002_asi_24369 crossref_primary_10_1108_ITP_04_2023_0334 crossref_primary_10_3390_computers9020034 crossref_primary_10_1016_j_tele_2018_03_017 crossref_primary_10_2196_28025 crossref_primary_10_1016_j_tele_2025_102263 crossref_primary_10_1080_08923647_2021_1978784 crossref_primary_10_18559_ebr_2023_1_5 crossref_primary_10_1145_3555214 crossref_primary_10_5604_01_3001_0016_1459 crossref_primary_10_1080_0144929X_2025_2485395 crossref_primary_10_1177_2053951720942543 crossref_primary_10_1177_1461444820979708 crossref_primary_10_1016_j_copsyc_2019_08_009 crossref_primary_10_1177_08944393221117500 crossref_primary_10_17645_mac_v10i1_4858 crossref_primary_10_1016_j_copsyc_2019_08_003 crossref_primary_10_1016_j_techsoc_2024_102616 crossref_primary_10_3390_systems11040205 crossref_primary_10_1108_IJBM_03_2024_0138 crossref_primary_10_1016_j_jss_2025_112443 crossref_primary_10_4018_IJeC_296429 crossref_primary_10_1016_j_midw_2025_104375 crossref_primary_10_1108_JCM_04_2021_4577 crossref_primary_10_1093_oodh_oqaf011 crossref_primary_10_1007_s00729_023_00239_7 crossref_primary_10_1080_23294515_2018_1550123 crossref_primary_10_3917_dm_112_0027 crossref_primary_10_1016_j_chb_2019_04_026 crossref_primary_10_1371_journal_pone_0263097 crossref_primary_10_1016_j_entcom_2025_100950 crossref_primary_10_1177_2056305118824199 crossref_primary_10_1016_j_elerap_2019_100868 crossref_primary_10_4102_sajim_v21i1_1034 crossref_primary_10_1016_j_socscimed_2021_114146 crossref_primary_10_1080_21515581_2024_2445505 crossref_primary_10_1016_j_techfore_2021_121256 crossref_primary_10_3846_jbem_2022_16119 crossref_primary_10_3390_economies10120307 crossref_primary_10_1016_j_tele_2021_101748 crossref_primary_10_1109_ACCESS_2022_3207274 crossref_primary_10_1016_j_hlpt_2023_100761 crossref_primary_10_1007_s40300_023_00243_6 crossref_primary_10_4467_23540214ZM_21_017_13412 crossref_primary_10_1080_1369118X_2021_1963460 crossref_primary_10_1080_0144929X_2018_1544275 crossref_primary_10_2196_47705 crossref_primary_10_1017_beq_2019_24 crossref_primary_10_1365_s40702_022_00913_5 crossref_primary_10_2196_27753 crossref_primary_10_3389_fpsyg_2022_954964 crossref_primary_10_1002_cb_2199 crossref_primary_10_1016_j_jbusres_2021_12_052 crossref_primary_10_1016_j_chb_2018_09_015 crossref_primary_10_1007_s12525_022_00604_5 crossref_primary_10_1080_23812346_2024_2378395 crossref_primary_10_1016_j_chb_2018_11_022 crossref_primary_10_5817_CP2024_4_8 crossref_primary_10_3390_electronics10151811 crossref_primary_10_1145_3715903 crossref_primary_10_25300_MISQ_2024_16853 crossref_primary_10_1016_j_jbusres_2023_114205 crossref_primary_10_1080_15265161_2017_1409840 crossref_primary_10_1007_s10257_023_00622_6 crossref_primary_10_3390_informatics6010008 crossref_primary_10_1287_isre_2021_0633 crossref_primary_10_3390_bs15030386 crossref_primary_10_1177_14673584241287502 crossref_primary_10_1016_j_jbusres_2021_12_043 crossref_primary_10_1016_j_tele_2022_101782 crossref_primary_10_1146_annurev_financial_071020_012008 crossref_primary_10_1371_journal_pone_0245740 crossref_primary_10_2196_53592 crossref_primary_10_1007_s12599_022_00742_2 crossref_primary_10_1111_poms_13591 crossref_primary_10_1145_3637309 crossref_primary_10_4018_JGIM_352857 crossref_primary_10_1016_j_im_2021_103450 crossref_primary_10_1016_j_bushor_2019_07_008 crossref_primary_10_1287_mnsc_2021_4054 crossref_primary_10_3389_fcomp_2022_986138 crossref_primary_10_1016_j_clsr_2019_105367 crossref_primary_10_1177_14707853231222810 crossref_primary_10_3389_fpubh_2023_1109093 crossref_primary_10_1108_OIR_09_2023_0447 crossref_primary_10_1038_s41598_024_70718_7 crossref_primary_10_1080_0144929X_2023_2285341 crossref_primary_10_1177_00187208211004288 crossref_primary_10_3390_su12125163 crossref_primary_10_1145_3494067 crossref_primary_10_1108_DPRG_03_2025_0066 crossref_primary_10_1111_1758_5899_13337 crossref_primary_10_2478_fiqf_2024_0025 crossref_primary_10_1177_1461444820924632 crossref_primary_10_1108_JEIM_03_2023_0119 crossref_primary_10_1177_14614448241310901 crossref_primary_10_1108_INTR_05_2023_0339 crossref_primary_10_2196_54034 crossref_primary_10_1080_20421338_2021_1958987 crossref_primary_10_1093_cje_beac052 crossref_primary_10_1016_j_cose_2021_102453 crossref_primary_10_1016_j_tele_2019_02_001 crossref_primary_10_1016_j_ijedudev_2021_102351 crossref_primary_10_1080_0144929X_2019_1697899 crossref_primary_10_2478_eoik_2024_0025 crossref_primary_10_1080_08838151_2020_1844886 crossref_primary_10_1177_08944393221108820 crossref_primary_10_1007_s11036_020_01529_z crossref_primary_10_1080_0144929X_2023_2178830 crossref_primary_10_1108_SJME_10_2022_0213 crossref_primary_10_2139_ssrn_5361607 crossref_primary_10_2196_41635 crossref_primary_10_1093_joc_jqaf007 crossref_primary_10_1016_j_jbusres_2021_09_066 crossref_primary_10_1080_08961530_2022_2059798 crossref_primary_10_1287_moor_2023_0022 crossref_primary_10_1080_1369118X_2023_2205484 crossref_primary_10_1515_icom_2022_0041 crossref_primary_10_1016_j_procs_2024_03_137 crossref_primary_10_1016_j_jretconser_2022_103028 crossref_primary_10_1287_isre_2022_1182 crossref_primary_10_1080_1097198X_2021_1954416 crossref_primary_10_1093_jamia_ocab073 crossref_primary_10_1016_j_soscij_2018_10_001 crossref_primary_10_1016_j_techfore_2023_122789 crossref_primary_10_1016_j_techsoc_2021_101840 crossref_primary_10_1080_23270012_2019_1671243 crossref_primary_10_2196_71951 crossref_primary_10_1080_07370024_2024_2325347 crossref_primary_10_1016_j_cose_2020_101924 crossref_primary_10_2196_18296 crossref_primary_10_3389_fpsyg_2023_1052782 crossref_primary_10_4018_JGIM_322778 crossref_primary_10_1177_21695067231192286 crossref_primary_10_1109_TEM_2020_3019033 crossref_primary_10_1177_09760911251371299 crossref_primary_10_1016_j_fpsl_2023_101168 crossref_primary_10_1086_730709 crossref_primary_10_1140_epjds_s13688_022_00324_y crossref_primary_10_1016_j_ijinfomgt_2025_102951 crossref_primary_10_1108_DTS_05_2022_0015 crossref_primary_10_1016_j_ijhm_2024_103965 crossref_primary_10_1177_20563051241298446 crossref_primary_10_1108_OIR_03_2020_0082 crossref_primary_10_1016_j_tele_2021_101715 crossref_primary_10_1177_20563051251313610 crossref_primary_10_1108_ICS_03_2018_0034 crossref_primary_10_1016_j_tele_2021_101717 crossref_primary_10_1016_j_jbusres_2020_12_006 crossref_primary_10_1080_10447318_2025_2560513 crossref_primary_10_1080_10447318_2025_2499656 crossref_primary_10_1177_14614448231193093 crossref_primary_10_1111_cge_13686 crossref_primary_10_5817_CP2021_3_11 crossref_primary_10_4018_JOEUC_353910 crossref_primary_10_1515_ijdlg_2025_0001 crossref_primary_10_1186_s40537_024_00888_8 crossref_primary_10_1177_21582440231192951 crossref_primary_10_18267_j_aip_141 crossref_primary_10_1177_20563051231155111 crossref_primary_10_32604_cmc_2024_054007 crossref_primary_10_3390_systems13040275 crossref_primary_10_1002_isd2_12179 crossref_primary_10_24136_oc_2916 crossref_primary_10_1080_10447318_2022_2041894 crossref_primary_10_1016_j_chb_2020_106382 crossref_primary_10_1016_j_chb_2020_106260 crossref_primary_10_1177_20563051221126085 crossref_primary_10_1057_s41599_021_00787_w crossref_primary_10_1108_AJIM_12_2023_0526 crossref_primary_10_1016_j_tele_2021_101602 crossref_primary_10_1016_j_joitmc_2025_100491 crossref_primary_10_1145_3698133 crossref_primary_10_1080_0144929X_2018_1465997 crossref_primary_10_1007_s12525_023_00657_0 crossref_primary_10_1029_2020WR027917 crossref_primary_10_1002_mar_21529 crossref_primary_10_1016_j_tranpol_2022_12_013 crossref_primary_10_1016_j_jet_2023_105699 crossref_primary_10_1089_big_2024_0036 crossref_primary_10_1371_journal_pone_0288109 crossref_primary_10_1080_10447318_2024_2375686 crossref_primary_10_1371_journal_pone_0314472 crossref_primary_10_1002_mar_21524 crossref_primary_10_1108_IMDS_07_2023_0462 |
| Cites_doi | 10.1162/003355397555253 10.1080/1369118X.2013.777757 10.1111/j.1467-6494.1953.tb01775.x 10.1145/2556288.2557421 10.1016/j.jmp.2006.01.003 10.1089/cyber.2014.0456 10.1080/08838151.2015.1127245 10.1080/07370020903586662 10.1287/mnsc.32.11.1492 10.1145/2468356.2468501 10.1057/gpp.1984.12 10.1080/19393555.2015.1085113 10.1037/h0036201 10.1002/mar.20238 10.1111/j.1745-6606.2006.00070.x 10.1016/j.dss.2012.06.010 10.2307/3250951 10.1016/j.chb.2014.05.006 10.1016/j.jsis.2013.01.003 10.1145/2800835.2804402 10.5210/fm.v11i9.1394 10.2307/1884852 10.1287/mnsc.14.3.159 10.2139/ssrn.941708 10.1145/2851581.2892413 10.2307/1914185 10.1145/1053291.1053295 10.1111/j.1083-6101.2009.01494.x 10.1145/1979742.1979887 10.1145/2675133.2675287 10.1002/ejsp.2049 10.1109/SocialCom.2013.140 10.1086/268763 10.1086/257897 10.1145/1868914.1868957 10.1287/orsc.10.1.104 10.1037/0033-2909.107.1.34 10.1145/988772.988777 10.1257/000282803322655392 10.1111/j.1467-6435.1999.tb00221.x 10.2307/41409970 10.1109/MSP.2005.22 10.1126/science.171.3969.345 10.1086/268109 10.1162/003355301556365 10.1145/2858036.2858381 10.2753/MIS0742-1222260305 10.1145/2464464.2464503 10.1016/j.chb.2016.09.005 10.1080/01900690902732632 10.1016/j.cose.2015.07.002 10.1111/j.1460-2466.1984.tb02174.x 10.1037/h0040237 10.1016/j.ijhcs.2013.08.016 10.1111/j.1468-2885.1991.tb00023.x 10.1111/isj.12062 |
| ContentType | Journal Article |
| Copyright | 2017 Copyright Elsevier Science Ltd. Nov 2017 |
| Copyright_xml | – notice: 2017 – notice: Copyright Elsevier Science Ltd. Nov 2017 |
| DBID | 6I. AAFTH AAYXX CITATION 7SC 7SP 8FD E3H F2A JQ2 L7M L~C L~D |
| DOI | 10.1016/j.tele.2017.04.013 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Economics Engineering |
| EISSN | 1879-324X |
| EndPage | 1058 |
| ExternalDocumentID | 10_1016_j_tele_2017_04_013 S0736585317302022 |
| GroupedDBID | --K --M -~X .~1 0R~ 123 1B1 1~. 1~5 29Q 4.4 457 4G. 5VS 6I. 7-5 71M 77K 8P~ 9JN 9JO AACTN AAEDT AAEDW AAFJI AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABJNI ABMAC ABMMH ABXDB ABYKQ ACDAQ ACGFS ACHQT ACNNM ACRLP ACZNC ADBBV ADEZE ADIYS ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PRBVW Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SSB SSO SSV SSZ T5K TN5 UHS WUQ XPP YNT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 7SP 8FD E3H F2A JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c481t-14cda4ae1980885978b46d5ba53aefa55e94cbd0c44ed2cdd13d7136be78b75d3 |
| ISICitedReferencesCount | 485 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000413384600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0736-5853 |
| IngestDate | Fri Nov 14 19:17:41 EST 2025 Tue Nov 18 22:25:56 EST 2025 Sat Nov 29 07:13:51 EST 2025 Fri Feb 23 02:15:31 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | Privacy paradox Decision-making Risk Information privacy Benefit Privacy concerns |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c481t-14cda4ae1980885978b46d5ba53aefa55e94cbd0c44ed2cdd13d7136be78b75d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 content type line 14 ObjectType-Literature Review-2 ObjectType-Feature-3 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.tele.2017.04.013 |
| PQID | 1966075495 |
| PQPubID | 2035449 |
| PageCount | 21 |
| ParticipantIDs | proquest_journals_1966075495 crossref_primary_10_1016_j_tele_2017_04_013 crossref_citationtrail_10_1016_j_tele_2017_04_013 elsevier_sciencedirect_doi_10_1016_j_tele_2017_04_013 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-11-01 |
| PublicationDateYYYYMMDD | 2017-11-01 |
| PublicationDate_xml | – month: 11 year: 2017 text: 2017-11-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Oxford |
| PublicationPlace_xml | – name: Oxford |
| PublicationTitle | Telematics and informatics |
| PublicationYear | 2017 |
| Publisher | Elsevier Ltd Elsevier Science Ltd |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Science Ltd |
| References | Gambino, A., Kim., J., Sundar, S.S., Ge, J., Rosson, M.B., 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. CHI 2016. San Jose, CA, USA, 2837-2842. O’Donoghue, Rabin (b0315) 2001; 116 Kahneman (b0195) 2003; 93 Baek (b9000) 2014; 38 Kim, Park, Oh (b0230) 2008; 25 Blumer (b0065) 1986 Blumler, Katz (b0070) 1974 Pentina, Zhang, Bata, Chen (b0335) 2016; 65 Wilson, D.W., Valacich, J.S., 2012. Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. In: Thirty Third International Conference on Information Systems, Orlando, Florida, 1-11. Smith, Kollars (b0395) 2015; 24 Hughes-Roberts, T., 2012. A cross-disciplined approach to exploring the privacy paradox: explaining disclosure behaviour using the theory of planned behavior. In: UK Academy for Information Systems Conference Proceedings, Paper 7. Schwarz (b0380) 2011 Hughes-Roberts, T., 2013. Privacy and social networks: Is concern a valid indicator of intention and behaviour?. In: International Conference on Social Computing, Washington, D.C., USA, 909–912. Kehr, F., Wentzel, D., Kowatsch, T., 2014. Privacy paradox revised: Pre-existing attitudes, psychological ownership, and actual disclosure. In: Thirty Fifth International Conference on Information Systems, Auckland, New Zealand, 1–12. Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H., 2014. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. CHI 2014, Toronto, ON, Canada, 2347-2356. Tönnies (b0425) 2012 Petronio (b0340) 1991; 1 Meynhardt (b0285) 2009; 32 Ajzen (b0035) 1985 Leary, Kowalski (b0255) 1990; 107 Sundar, S.S., Kang, H., Wu, M., Go, E., Zhang, B., 2013. Unlocking the privacy paradox: Do cognitive heuristics hold the key?. In: Proceedings of CHI’13 Extended Abstracts on Human Factors in Computing Systems, France, 811–816. Dienlin, Trepte (b9005) 2015; 45 Debatin, Lovejoy, Horn, Hughes (b0110) 2009; 15 Phelan, C., Lampe, C., Resnick, P., 2016. It’s creepy, but it doesn’t bother me. CHI 2016, San Jose, CA, USA, 5240-5251. Tversky, Kahneman (b0435) 1975 Wakefield (b0445) 2013; 22 Li (b0265) 2012; 54 Donnenwerth, Foa (b0125) 1974; 29 Agarwal, Karahanna (b0030) 2000; 24 Keith, Thompson, Hale, Lowry, Greer (b0220) 2013; 71 Rubin (b0375) 1984; 34 Kehr, Kowatsch, Wentzel, Fleisch (b0215) 2015; 25 Laibson (b0250) 1997; 62 Alashoor, T., Baskerville, R., 2015. The privacy paradox: The role of cognitive absorption in the social networking activity. In: Thirty Sixth International Conference on Information Systems, Fort Worth, Texas, USA, 1–20. Zhang, Wu, Kang, Go, Sundar (b0475) 2014 . Loewenstein (b0260) 1999; 52 Smith, Dinev, Xu (b0390) 2011; 35 Crutchfield (b0100) 1955; 10 Harsanyi (b0160) 1967; 14 Giddens (b0155) 1984 Jia, H., Wisniewski, P., Xu, H., Rosson, M.B., Carroll, J.M., 2015. Risk-taking as a learning process for shaping teen’s online information privacy behaviors. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, Vancouver, BC, Canada, 583-599. Busemeyer, Wang, Townsend (b0085) 2006; 50 Brehm (b0075) 1966 Flender, Müller (b0140) 2012 Kunreuther (b0245) 1984; 9 Petronio (b0345) 2002 Xu, Teo, Tan, Agarwal (b0455) 2010; 26 Quinn (b0370) 2016; 60 Zafeiropoulou, A.M., Millard, D.E., Webber, C., O’Hara, K., 2013. Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions?. In: WebSci '13 Proceedings of the 5th Annual ACM Web Science Conference, New York, USA, 463–472. Sproull, Kiesler (b0410) 1986; 32 Nagy, Pecho (b0300) 2009 Acquisti, Grossklags (b0020) 2005; 3 Oetzel, M.C., Gonja, T., 2011. The online privacy paradox: A social representations perspective. In: Paper presented at the Proceedings of the 2011 Annual Conference Extended Abstracts on Human factors in Computing Systems, Vancouver, BC, Canada. Downs (b0130) 1957; 65 Buck, C., Horbel, C., Germelmann, C.C., Eymann, T., 2014. The unconscious app consumer: Discovering and comparing the information-seeking patterns among mobile application consumers. In: Twenty Second European Conference on Information Systems, Tel Aviv, Israel, 1–14. Motiwalla, L.F., Li, X., Liu, X., 2014. Privacy paradox: Does stated privacy concerns translate into the valuation of personal information?. In: Proceeding of the 19th Pacific Asia Conference on Information Systems (PACIS 2014), Paper 281. Joinson, Reips, Buchanan, Paine Schofield (b0190) 2010; 25 Vroom (b0440) 1964 Li, Sarathy, Xu (b0270) 2010; 51 Oomen, Leenes (b0325) 2008 Kelley, Cranor, Sadeh (b0225) 2013; 2013 Sproull, Kiesler (b0415) 1991 Lutz, Strathoff (b0275) 2011 Simon (b0405) 1982 Young, Quan-Haase (b0465) 2013; 16 Krämer, Haferkamp (b0240) 2011 Chen, Chen (b0090) 2015; 18 Norberg, Horne, Horne (b0305) 2007; 41 Kahneman, Tversky (b0200) 1979; 47 Yoo, C.W., Ahn, H.J., Rao, H.R., 2012. An exploration of the impact of information privacy invasion. In: Proceeding of Thirty Third International Conference on Information Systems, Orlando, Florida, 1–18. Abric (b0005) 1996; 5 Barnes, S.B., 2006. A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from Irwin (b0180) 1953; 21 Hu, Q., Ma, S., 2010. Does privacy still matter in the era of Web 2.0? A qualitative study of user behavior towards online social networking activities. In: Proceedings of Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan, 2, pp. 591–602. Manier, O’Brien Louch (b0280) 2010; XI Poikela, M., Schmidt, R., Wechsung, I., Mueller, S., 2015. FlashPolling privacy: The discrepancy of intention and action in location-based poll participation. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, Osaka, Japan, 813–818. Dinev, Hart (b0120) 2006; 17 Tsai, J., Cranor, L., Acquisti, A., Fong, C., 2006. What’s it for you? A survey of online privacy concerns and risk. NET Institute Working Paper, No. 06–29, 1–20. Park, Y., Ju, J., Ahn, J-H., 2015. Are people really concerned about their privacy?: Privacy paradox in mobile environment. In: The Fifteenth International Conference on Electronic Business, Hong Kong, 123–128. Berendt, Günther, Spiekermann (b0060) 2005; 48 Pötzsch, S., Wolkerstorfer, P., Graf, C., 2010. Privacy-awareness information for web forums: Results from an empirical study. In: Proceedings: NordiCHI 2010, Reykjavik, Iceland, 363–372. Deuker (b0115) 2010 Pötzsch (b0360) 2009 Ajzen, Fishbein (b0040) 1980 Culnan, Armstrong (b0095) 1999; 10 Simon (b0400) 1955; 69 Novak, Hoffman (b0310) 2008; 36 Altman (b0050) 1975 Davison (b0105) 1983; 47 Katz, Blumler, Gurevitch (b0205) 1974; 37 Agarwal, Sambamurthy, Stair (b0025) 1997 Foa (b0145) 1971; 171 Kokolakis (b0235) 2017; 64 Acquisti, A., 2004. Privacy in electronic commerce and the economics of immediate gratification. In: EC '04 Proceedings of the 5th ACM Conference on Electronic Commerce, USA, 21-29. Moscovici (b0290) 1984 Deuker (10.1016/j.tele.2017.04.013_b0115) 2010 Petronio (10.1016/j.tele.2017.04.013_b0345) 2002 Tönnies (10.1016/j.tele.2017.04.013_b0425) 2012 10.1016/j.tele.2017.04.013_b0080 Giddens (10.1016/j.tele.2017.04.013_b0155) 1984 Kokolakis (10.1016/j.tele.2017.04.013_b0235) 2017; 64 Blumler (10.1016/j.tele.2017.04.013_b0070) 1974 Kahneman (10.1016/j.tele.2017.04.013_b0195) 2003; 93 Altman (10.1016/j.tele.2017.04.013_b0050) 1975 Culnan (10.1016/j.tele.2017.04.013_b0095) 1999; 10 10.1016/j.tele.2017.04.013_b0165 Foa (10.1016/j.tele.2017.04.013_b0145) 1971; 171 Young (10.1016/j.tele.2017.04.013_b0465) 2013; 16 10.1016/j.tele.2017.04.013_b0365 10.1016/j.tele.2017.04.013_b0045 10.1016/j.tele.2017.04.013_b0320 Tversky (10.1016/j.tele.2017.04.013_b0435) 1975 Moscovici (10.1016/j.tele.2017.04.013_b0290) 1984 Dinev (10.1016/j.tele.2017.04.013_b0120) 2006; 17 Novak (10.1016/j.tele.2017.04.013_b0310) 2008; 36 Berendt (10.1016/j.tele.2017.04.013_b0060) 2005; 48 Li (10.1016/j.tele.2017.04.013_b0270) 2010; 51 Norberg (10.1016/j.tele.2017.04.013_b0305) 2007; 41 Sproull (10.1016/j.tele.2017.04.013_b0410) 1986; 32 Kehr (10.1016/j.tele.2017.04.013_b0215) 2015; 25 Krämer (10.1016/j.tele.2017.04.013_b0240) 2011 10.1016/j.tele.2017.04.013_b0150 10.1016/j.tele.2017.04.013_b0350 10.1016/j.tele.2017.04.013_b0470 Smith (10.1016/j.tele.2017.04.013_b0395) 2015; 24 Irwin (10.1016/j.tele.2017.04.013_b0180) 1953; 21 10.1016/j.tele.2017.04.013_b0355 Pötzsch (10.1016/j.tele.2017.04.013_b0360) 2009 10.1016/j.tele.2017.04.013_b0430 Debatin (10.1016/j.tele.2017.04.013_b0110) 2009; 15 Agarwal (10.1016/j.tele.2017.04.013_b0025) 1997 Petronio (10.1016/j.tele.2017.04.013_b0340) 1991; 1 Dienlin (10.1016/j.tele.2017.04.013_b9005) 2015; 45 Crutchfield (10.1016/j.tele.2017.04.013_b0100) 1955; 10 Pentina (10.1016/j.tele.2017.04.013_b0335) 2016; 65 Ajzen (10.1016/j.tele.2017.04.013_b0040) 1980 O’Donoghue (10.1016/j.tele.2017.04.013_b0315) 2001; 116 10.1016/j.tele.2017.04.013_b0185 10.1016/j.tele.2017.04.013_b0460 Baek (10.1016/j.tele.2017.04.013_b9000) 2014; 38 Downs (10.1016/j.tele.2017.04.013_b0130) 1957; 65 Lutz (10.1016/j.tele.2017.04.013_b0275) 2011 Kunreuther (10.1016/j.tele.2017.04.013_b0245) 1984; 9 Wakefield (10.1016/j.tele.2017.04.013_b0445) 2013; 22 10.1016/j.tele.2017.04.013_b0385 Xu (10.1016/j.tele.2017.04.013_b0455) 2010; 26 10.1016/j.tele.2017.04.013_b0420 Busemeyer (10.1016/j.tele.2017.04.013_b0085) 2006; 50 Nagy (10.1016/j.tele.2017.04.013_b0300) 2009 Kim (10.1016/j.tele.2017.04.013_b0230) 2008; 25 Rubin (10.1016/j.tele.2017.04.013_b0375) 1984; 34 Simon (10.1016/j.tele.2017.04.013_b0405) 1982 Chen (10.1016/j.tele.2017.04.013_b0090) 2015; 18 Kelley (10.1016/j.tele.2017.04.013_b0225) 2013; 2013 Leary (10.1016/j.tele.2017.04.013_b0255) 1990; 107 Simon (10.1016/j.tele.2017.04.013_b0400) 1955; 69 Donnenwerth (10.1016/j.tele.2017.04.013_b0125) 1974; 29 Flender (10.1016/j.tele.2017.04.013_b0140) 2012 Harsanyi (10.1016/j.tele.2017.04.013_b0160) 1967; 14 Sproull (10.1016/j.tele.2017.04.013_b0415) 1991 Zhang (10.1016/j.tele.2017.04.013_b0475) 2014 Loewenstein (10.1016/j.tele.2017.04.013_b0260) 1999; 52 Blumer (10.1016/j.tele.2017.04.013_b0065) 1986 Brehm (10.1016/j.tele.2017.04.013_b0075) 1966 10.1016/j.tele.2017.04.013_b0295 Laibson (10.1016/j.tele.2017.04.013_b0250) 1997; 62 Agarwal (10.1016/j.tele.2017.04.013_b0030) 2000; 24 Vroom (10.1016/j.tele.2017.04.013_b0440) 1964 Ajzen (10.1016/j.tele.2017.04.013_b0035) 1985 10.1016/j.tele.2017.04.013_b0170 Kahneman (10.1016/j.tele.2017.04.013_b0200) 1979; 47 Katz (10.1016/j.tele.2017.04.013_b0205) 1974; 37 Davison (10.1016/j.tele.2017.04.013_b0105) 1983; 47 Keith (10.1016/j.tele.2017.04.013_b0220) 2013; 71 Acquisti (10.1016/j.tele.2017.04.013_b0020) 2005; 3 Oomen (10.1016/j.tele.2017.04.013_b0325) 2008 Quinn (10.1016/j.tele.2017.04.013_b0370) 2016; 60 10.1016/j.tele.2017.04.013_b0055 10.1016/j.tele.2017.04.013_b0330 10.1016/j.tele.2017.04.013_b0010 10.1016/j.tele.2017.04.013_b0175 10.1016/j.tele.2017.04.013_b0450 Li (10.1016/j.tele.2017.04.013_b0265) 2012; 54 Smith (10.1016/j.tele.2017.04.013_b0390) 2011; 35 10.1016/j.tele.2017.04.013_b0210 Manier (10.1016/j.tele.2017.04.013_b0280) 2010; XI Schwarz (10.1016/j.tele.2017.04.013_b0380) 2011 Abric (10.1016/j.tele.2017.04.013_b0005) 1996; 5 Joinson (10.1016/j.tele.2017.04.013_b0190) 2010; 25 Meynhardt (10.1016/j.tele.2017.04.013_b0285) 2009; 32 |
| References_xml | – volume: 48 start-page: 101 year: 2005 end-page: 106 ident: b0060 article-title: Privacy in e-commerce: stated preferences vs. actual behavior publication-title: Commun. ACM – start-page: 81 year: 2011 end-page: 99 ident: b0275 article-title: Privacy concerns and online behavior – not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses publication-title: Multinationale Unternehmen Und Institutionen Im Wandel – Herausforderungen Für Wirtschaft, Recht Und Gesellschaft – volume: 21 start-page: 329 year: 1953 end-page: 335 ident: b0180 article-title: Stated expectations as functions of probability and desirability of outcomes publication-title: J. Pers. – reference: Hughes-Roberts, T., 2013. Privacy and social networks: Is concern a valid indicator of intention and behaviour?. In: International Conference on Social Computing, Washington, D.C., USA, 909–912. – start-page: 293 year: 1997 end-page: 297 ident: b0025 article-title: Cognitive absorption and the adoption of new information technologies publication-title: Academy of Management Best Paper Proceedings – volume: 15 start-page: 83 year: 2009 end-page: 108 ident: b0110 article-title: Facebook and online privacy: attitudes, behaviors, and unintended consequences publication-title: J. Comput.-Mediated Commun. – volume: 9 start-page: 206 year: 1984 end-page: 220 ident: b0245 article-title: Causes of underinsurance against natural disasters publication-title: Geneva Pap. Risk Insurance – volume: 10 start-page: 340 year: 1999 end-page: 347 ident: b0095 article-title: Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation publication-title: Organ. Sci. – reference: Sundar, S.S., Kang, H., Wu, M., Go, E., Zhang, B., 2013. Unlocking the privacy paradox: Do cognitive heuristics hold the key?. In: Proceedings of CHI’13 Extended Abstracts on Human Factors in Computing Systems, France, 811–816. – reference: Kehr, F., Wentzel, D., Kowatsch, T., 2014. Privacy paradox revised: Pre-existing attitudes, psychological ownership, and actual disclosure. In: Thirty Fifth International Conference on Information Systems, Auckland, New Zealand, 1–12. – volume: 24 start-page: 157 year: 2015 end-page: 163 ident: b0395 article-title: QR panopticism: user behavior triangulation and barcode-scanning applications publication-title: Inf. Secur. J. Global Perspect. – volume: 71 start-page: 1163 year: 2013 end-page: 1173 ident: b0220 article-title: Information disclosure on mobile devices: R-examining privacy calculus with actual user behavior publication-title: Int. J. Hum Comput Stud. – reference: Acquisti, A., 2004. Privacy in electronic commerce and the economics of immediate gratification. In: EC '04 Proceedings of the 5th ACM Conference on Electronic Commerce, USA, 21-29. – volume: 65 start-page: 135 year: 1957 end-page: 150 ident: b0130 article-title: An economic theory of political action in a democracy publication-title: J. Political Economy – volume: 41 start-page: 100 year: 2007 end-page: 126 ident: b0305 article-title: The privacy paradox: personal information disclosure intentions versus behaviors publication-title: J. Consum. Affairs – volume: 38 start-page: 33 year: 2014 end-page: 42 ident: b9000 article-title: Solving the privacy paradox: A counter-argument experimental approach publication-title: Comput. Hum. Behav. – reference: Buck, C., Horbel, C., Germelmann, C.C., Eymann, T., 2014. The unconscious app consumer: Discovering and comparing the information-seeking patterns among mobile application consumers. In: Twenty Second European Conference on Information Systems, Tel Aviv, Israel, 1–14. – volume: 10 start-page: 191 year: 1955 end-page: 198 ident: b0100 article-title: Conformity and character publication-title: Am. Psychol. – start-page: 3 year: 1984 end-page: 69 ident: b0290 article-title: The phenomenon of social representations publication-title: Social Representations – reference: Jia, H., Wisniewski, P., Xu, H., Rosson, M.B., Carroll, J.M., 2015. Risk-taking as a learning process for shaping teen’s online information privacy behaviors. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, Vancouver, BC, Canada, 583-599. – start-page: 121 year: 2008 end-page: 138 ident: b0325 article-title: Privacy risk perceptions and privacy protection strategies publication-title: Policies and Research in Identity Management – volume: 26 start-page: 135 year: 2010 end-page: 173 ident: b0455 article-title: The role of push-pull technology in privacy calculus: the case of location-based services publication-title: J. Manage. Inf. Syst. – reference: Oetzel, M.C., Gonja, T., 2011. The online privacy paradox: A social representations perspective. In: Paper presented at the Proceedings of the 2011 Annual Conference Extended Abstracts on Human factors in Computing Systems, Vancouver, BC, Canada. – reference: Pötzsch, S., Wolkerstorfer, P., Graf, C., 2010. Privacy-awareness information for web forums: Results from an empirical study. In: Proceedings: NordiCHI 2010, Reykjavik, Iceland, 363–372. – reference: Hughes-Roberts, T., 2012. A cross-disciplined approach to exploring the privacy paradox: explaining disclosure behaviour using the theory of planned behavior. In: UK Academy for Information Systems Conference Proceedings, Paper 7. – volume: 107 start-page: 34 year: 1990 end-page: 47 ident: b0255 article-title: Impression management: a literature review and two-component model publication-title: Psychol. Bull. – year: 1964 ident: b0440 article-title: Work and Motivation – year: 1974 ident: b0070 article-title: The Uses of Mass Communications: Current Perspectives on Gratifications Research – volume: 32 start-page: 192 year: 2009 end-page: 219 ident: b0285 article-title: Public value inside: what is public value creation? publication-title: Int. J. Public Administration – year: 1986 ident: b0065 article-title: Symbolic Interactionism: Perspectives and Method – volume: 1 start-page: 311 year: 1991 end-page: 335 ident: b0340 article-title: Communication boundary management: a theoretical model of managing disclosure of private information between married couples publication-title: Commun. Theory – year: 1975 ident: b0435 article-title: Judgment under uncertainty: Heuristics and biases. Utility, Probability, and Human Decision Making – reference: Tsai, J., Cranor, L., Acquisti, A., Fong, C., 2006. What’s it for you? A survey of online privacy concerns and risk. NET Institute Working Paper, No. 06–29, 1–20. – reference: Zafeiropoulou, A.M., Millard, D.E., Webber, C., O’Hara, K., 2013. Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions?. In: WebSci '13 Proceedings of the 5th Annual ACM Web Science Conference, New York, USA, 463–472. – volume: 18 start-page: 13 year: 2015 end-page: 19 ident: b0090 article-title: Couldn’t or wouldn’t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection publication-title: Cyberpsychol. Behav. Social Networking – volume: 2013 start-page: 1 year: 2013 end-page: 11 ident: b0225 article-title: Privacy as part of the app decision-making process publication-title: CHI – volume: 25 start-page: 607 year: 2015 end-page: 635 ident: b0215 article-title: Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus publication-title: Inf. Syst. J. – start-page: 148 year: 2012 end-page: 159 ident: b0140 article-title: Type indeterminacy in privacy decisions: the privacy paradox revisited publication-title: Quantum interaction. Lecture notes in Computer Science – volume: 25 start-page: 769 year: 2008 end-page: 786 ident: b0230 article-title: An examination of factors influencing consumer adoption of short message service (SMS) publication-title: Psychol. Market. – volume: 35 start-page: 989 year: 2011 end-page: 1015 ident: b0390 article-title: Information privacy research: an interdisciplinary review publication-title: MIS Quarterly – reference: Phelan, C., Lampe, C., Resnick, P., 2016. It’s creepy, but it doesn’t bother me. CHI 2016, San Jose, CA, USA, 5240-5251. – reference: Barnes, S.B., 2006. A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from – volume: 50 start-page: 220 year: 2006 end-page: 241 ident: b0085 article-title: Quantum dynamics of human decision making publication-title: J. Math. Psychol. – volume: 36 start-page: 56 year: 2008 end-page: 72 ident: b0310 article-title: The fit of thinking style and situation: new measures of situation-specific experiential and rational cognition publication-title: J. Consum. Res. – start-page: 226 year: 2009 end-page: 236 ident: b0360 article-title: Privacy awareness: a means to solve the privacy paradox? publication-title: The Future of Identity in the Information Society – volume: 62 start-page: 443 year: 1997 end-page: 477 ident: b0250 article-title: Golden eggs and hyperbolic discounting publication-title: Quart. J. Econ. – reference: Park, Y., Ju, J., Ahn, J-H., 2015. Are people really concerned about their privacy?: Privacy paradox in mobile environment. In: The Fifteenth International Conference on Electronic Business, Hong Kong, 123–128. – year: 1984 ident: b0155 article-title: The Constitution of Society: Outline of the Theory of Structuration – volume: 65 start-page: 409 year: 2016 end-page: 419 ident: b0335 article-title: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison publication-title: Comput. Hum. Behav. – reference: Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H., 2014. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. CHI 2014, Toronto, ON, Canada, 2347-2356. – start-page: 11 year: 1985 end-page: 39 ident: b0035 article-title: From intentions to actions: a theory of planned behavior publication-title: Action-Control: From Cognition to Behavior – year: 1980 ident: b0040 article-title: Understanding Attitudes and Predicting Social Behavior – volume: 171 start-page: 345 year: 1971 end-page: 351 ident: b0145 article-title: Interpersonal and economic resources publication-title: Science – volume: 69 start-page: 99 year: 1955 end-page: 118 ident: b0400 article-title: A behavioural model of rational choice publication-title: Q. J. Econ. – reference: Yoo, C.W., Ahn, H.J., Rao, H.R., 2012. An exploration of the impact of information privacy invasion. In: Proceeding of Thirty Third International Conference on Information Systems, Orlando, Florida, 1–18. – start-page: 275 year: 2010 end-page: 283 ident: b0115 article-title: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services publication-title: Privacy and Identity Management for Life – volume: 25 start-page: 1 year: 2010 end-page: 24 ident: b0190 article-title: Privacy, trust, and self-disclosure online publication-title: Hum.-Comput. Interact. – volume: 93 start-page: 1449 year: 2003 end-page: 1475 ident: b0195 article-title: Maps of bounded rationality: Psychology for behavioral economics publication-title: Am. Econ. Rev. – volume: XI start-page: 513 year: 2010 end-page: 517 ident: b0280 article-title: Online social networks and the privacy paradox: a research framework publication-title: Issues Inf. Syst. – start-page: 127 year: 2011 end-page: 141 ident: b0240 article-title: Online self-presentation: balancing privacy concerns and impression construction on social networking sites publication-title: Privacy Online – volume: 51 start-page: 62 year: 2010 end-page: 71 ident: b0270 article-title: Understanding situational online information disclosure as a privacy calculus publication-title: J. Comput. Inf. Syst. – start-page: 111 year: 2014 end-page: 114 ident: b0475 article-title: Effects of security warnings and instant gratification cues on attitudes toward mobile websites publication-title: CHI 2014 – volume: 17 start-page: 61 year: 2006 end-page: 80 ident: b0120 article-title: An extended privacy calculus model for e-commerce transactions publication-title: Inf. Syst. J. – reference: Gambino, A., Kim., J., Sundar, S.S., Ge, J., Rosson, M.B., 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. CHI 2016. San Jose, CA, USA, 2837-2842. – volume: 116 start-page: 121 year: 2001 end-page: 160 ident: b0315 article-title: Choice and procrastination publication-title: Quart. J. Econ. – volume: 34 start-page: 67 year: 1984 end-page: 77 ident: b0375 article-title: Ritualized and instrumental television viewing publication-title: J. Commun. – volume: 5 start-page: 77 year: 1996 end-page: 80 ident: b0005 article-title: Specific processes of social representations publication-title: Pap. Social Representations – volume: 3 start-page: 26 year: 2005 end-page: 33 ident: b0020 article-title: Privacy and rationality in individual decision making publication-title: IEEE Secur. Priv. – reference: Motiwalla, L.F., Li, X., Liu, X., 2014. Privacy paradox: Does stated privacy concerns translate into the valuation of personal information?. In: Proceeding of the 19th Pacific Asia Conference on Information Systems (PACIS 2014), Paper 281. – year: 1966 ident: b0075 article-title: A Theory of Psychological Reactance – reference: Hu, Q., Ma, S., 2010. Does privacy still matter in the era of Web 2.0? A qualitative study of user behavior towards online social networking activities. In: Proceedings of Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan, 2, pp. 591–602. – start-page: 289 year: 2011 end-page: 308 ident: b0380 article-title: Feelings-as-information theory publication-title: Handbook of Theories of Social Psychology – reference: Wilson, D.W., Valacich, J.S., 2012. Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. In: Thirty Third International Conference on Information Systems, Orlando, Florida, 1-11. – year: 1975 ident: b0050 article-title: The Environment and Social Behavior – volume: 47 start-page: 1 year: 1983 end-page: 15 ident: b0105 article-title: The third-person effect in communication publication-title: Public Opin. Q. – reference: Poikela, M., Schmidt, R., Wechsung, I., Mueller, S., 2015. FlashPolling privacy: The discrepancy of intention and action in location-based poll participation. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, Osaka, Japan, 813–818. – year: 1982 ident: b0405 article-title: Models of Bounded Rationality – volume: 32 start-page: 1492 year: 1986 end-page: 1512 ident: b0410 article-title: Reducing social context cues: electronic mail in organizational communication publication-title: Manage. Sci. – year: 1991 ident: b0415 article-title: Connections: New Ways of Working in the Networked Organization – reference: Alashoor, T., Baskerville, R., 2015. The privacy paradox: The role of cognitive absorption in the social networking activity. In: Thirty Sixth International Conference on Information Systems, Fort Worth, Texas, USA, 1–20. – start-page: 740 year: 2009 end-page: 746 ident: b0300 article-title: Social networks security publication-title: Third International Conference on Emerging Security Information, Systems and Technologies – volume: 37 start-page: 509 year: 1974 end-page: 523 ident: b0205 article-title: Uses and gratifications research publication-title: Public Opin. Q. – volume: 29 start-page: 785 year: 1974 end-page: 793 ident: b0125 article-title: Effect of resource class on retaliation to injustice in interpersonal exchange publication-title: J. Pers. Soc. Psychol. – volume: 14 start-page: 159 year: 1967 end-page: 182 ident: b0160 article-title: Games with incomplete information played by “Bayesian” players, I-III Part I. The basic model publication-title: Manage. Sci. – volume: 54 start-page: 471 year: 2012 end-page: 481 ident: b0265 article-title: Theories in online information privacy research: a critical review and an integrated framework publication-title: Decis. Support Syst. – year: 2012 ident: b0425 article-title: Studien Zu Gemeinschaft Und Gesellschaft – reference: . – volume: 52 start-page: 315 year: 1999 end-page: 344 ident: b0260 article-title: Because it is there: The challenge of mountaineeringEllipsisfor utility theory publication-title: Kyklos – volume: 47 start-page: 263 year: 1979 end-page: 291 ident: b0200 article-title: Prospect theory: an analysis of decision under risk publication-title: Econometrica – volume: 60 start-page: 61 year: 2016 end-page: 86 ident: b0370 article-title: Why we share: a uses and gratifications approach to privacy regulation in social media use publication-title: J. Broadcast. Electron. Media – volume: 16 start-page: 479 year: 2013 end-page: 500 ident: b0465 article-title: Privacy protection strategies on Facebook publication-title: Inf. Commun. Soc. – volume: 45 start-page: 285 year: 2015 end-page: 297 ident: b9005 article-title: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors publication-title: Eur. J. Soc. Psychol. – volume: 22 start-page: 157 year: 2013 end-page: 174 ident: b0445 article-title: The influence of user affect in online information disclosure publication-title: J. Strategic Inf. Syst. – year: 2002 ident: b0345 article-title: Boundaries of Privacy: Dialectics of Disclosure – volume: 64 start-page: 122 year: 2017 end-page: 134 ident: b0235 article-title: Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon publication-title: Comput. Secur. – volume: 24 start-page: 665 year: 2000 end-page: 694 ident: b0030 article-title: Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage publication-title: MIS Quarterly – start-page: 11 year: 1985 ident: 10.1016/j.tele.2017.04.013_b0035 article-title: From intentions to actions: a theory of planned behavior – ident: 10.1016/j.tele.2017.04.013_b0080 – volume: 62 start-page: 443 issue: 2 year: 1997 ident: 10.1016/j.tele.2017.04.013_b0250 article-title: Golden eggs and hyperbolic discounting publication-title: Quart. J. Econ. doi: 10.1162/003355397555253 – ident: 10.1016/j.tele.2017.04.013_b0330 – volume: 16 start-page: 479 issue: 4 year: 2013 ident: 10.1016/j.tele.2017.04.013_b0465 article-title: Privacy protection strategies on Facebook publication-title: Inf. Commun. Soc. doi: 10.1080/1369118X.2013.777757 – ident: 10.1016/j.tele.2017.04.013_b0045 – year: 1984 ident: 10.1016/j.tele.2017.04.013_b0155 – volume: 21 start-page: 329 issue: 3 year: 1953 ident: 10.1016/j.tele.2017.04.013_b0180 article-title: Stated expectations as functions of probability and desirability of outcomes publication-title: J. Pers. doi: 10.1111/j.1467-6494.1953.tb01775.x – ident: 10.1016/j.tele.2017.04.013_b0385 doi: 10.1145/2556288.2557421 – start-page: 148 year: 2012 ident: 10.1016/j.tele.2017.04.013_b0140 article-title: Type indeterminacy in privacy decisions: the privacy paradox revisited – ident: 10.1016/j.tele.2017.04.013_b0170 – volume: 50 start-page: 220 year: 2006 ident: 10.1016/j.tele.2017.04.013_b0085 article-title: Quantum dynamics of human decision making publication-title: J. Math. Psychol. doi: 10.1016/j.jmp.2006.01.003 – volume: 18 start-page: 13 issue: 1 year: 2015 ident: 10.1016/j.tele.2017.04.013_b0090 article-title: Couldn’t or wouldn’t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection publication-title: Cyberpsychol. Behav. Social Networking doi: 10.1089/cyber.2014.0456 – volume: 60 start-page: 61 issue: 1 year: 2016 ident: 10.1016/j.tele.2017.04.013_b0370 article-title: Why we share: a uses and gratifications approach to privacy regulation in social media use publication-title: J. Broadcast. Electron. Media doi: 10.1080/08838151.2015.1127245 – volume: 25 start-page: 1 year: 2010 ident: 10.1016/j.tele.2017.04.013_b0190 article-title: Privacy, trust, and self-disclosure online publication-title: Hum.-Comput. Interact. doi: 10.1080/07370020903586662 – year: 2012 ident: 10.1016/j.tele.2017.04.013_b0425 – volume: 32 start-page: 1492 issue: 11 year: 1986 ident: 10.1016/j.tele.2017.04.013_b0410 article-title: Reducing social context cues: electronic mail in organizational communication publication-title: Manage. Sci. doi: 10.1287/mnsc.32.11.1492 – ident: 10.1016/j.tele.2017.04.013_b0420 doi: 10.1145/2468356.2468501 – volume: 9 start-page: 206 year: 1984 ident: 10.1016/j.tele.2017.04.013_b0245 article-title: Causes of underinsurance against natural disasters publication-title: Geneva Pap. Risk Insurance doi: 10.1057/gpp.1984.12 – ident: 10.1016/j.tele.2017.04.013_b0295 – year: 1966 ident: 10.1016/j.tele.2017.04.013_b0075 – volume: 24 start-page: 157 issue: 4–6 year: 2015 ident: 10.1016/j.tele.2017.04.013_b0395 article-title: QR panopticism: user behavior triangulation and barcode-scanning applications publication-title: Inf. Secur. J. Global Perspect. doi: 10.1080/19393555.2015.1085113 – volume: 17 start-page: 61 issue: 1 year: 2006 ident: 10.1016/j.tele.2017.04.013_b0120 article-title: An extended privacy calculus model for e-commerce transactions publication-title: Inf. Syst. J. – start-page: 226 year: 2009 ident: 10.1016/j.tele.2017.04.013_b0360 article-title: Privacy awareness: a means to solve the privacy paradox? – volume: 29 start-page: 785 issue: 6 year: 1974 ident: 10.1016/j.tele.2017.04.013_b0125 article-title: Effect of resource class on retaliation to injustice in interpersonal exchange publication-title: J. Pers. Soc. Psychol. doi: 10.1037/h0036201 – volume: 25 start-page: 769 issue: 8 year: 2008 ident: 10.1016/j.tele.2017.04.013_b0230 article-title: An examination of factors influencing consumer adoption of short message service (SMS) publication-title: Psychol. Market. doi: 10.1002/mar.20238 – year: 1964 ident: 10.1016/j.tele.2017.04.013_b0440 – volume: 41 start-page: 100 issue: 1 year: 2007 ident: 10.1016/j.tele.2017.04.013_b0305 article-title: The privacy paradox: personal information disclosure intentions versus behaviors publication-title: J. Consum. Affairs doi: 10.1111/j.1745-6606.2006.00070.x – year: 1986 ident: 10.1016/j.tele.2017.04.013_b0065 – volume: 54 start-page: 471 year: 2012 ident: 10.1016/j.tele.2017.04.013_b0265 article-title: Theories in online information privacy research: a critical review and an integrated framework publication-title: Decis. Support Syst. doi: 10.1016/j.dss.2012.06.010 – year: 2002 ident: 10.1016/j.tele.2017.04.013_b0345 – volume: 24 start-page: 665 issue: 4 year: 2000 ident: 10.1016/j.tele.2017.04.013_b0030 article-title: Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage publication-title: MIS Quarterly doi: 10.2307/3250951 – volume: 38 start-page: 33 year: 2014 ident: 10.1016/j.tele.2017.04.013_b9000 article-title: Solving the privacy paradox: A counter-argument experimental approach publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2014.05.006 – volume: 22 start-page: 157 year: 2013 ident: 10.1016/j.tele.2017.04.013_b0445 article-title: The influence of user affect in online information disclosure publication-title: J. Strategic Inf. Syst. doi: 10.1016/j.jsis.2013.01.003 – ident: 10.1016/j.tele.2017.04.013_b0355 doi: 10.1145/2800835.2804402 – ident: 10.1016/j.tele.2017.04.013_b0055 doi: 10.5210/fm.v11i9.1394 – year: 1975 ident: 10.1016/j.tele.2017.04.013_b0435 – volume: 36 start-page: 56 issue: 6 year: 2008 ident: 10.1016/j.tele.2017.04.013_b0310 article-title: The fit of thinking style and situation: new measures of situation-specific experiential and rational cognition publication-title: J. Consum. Res. – volume: 69 start-page: 99 issue: 1 year: 1955 ident: 10.1016/j.tele.2017.04.013_b0400 article-title: A behavioural model of rational choice publication-title: Q. J. Econ. doi: 10.2307/1884852 – year: 1982 ident: 10.1016/j.tele.2017.04.013_b0405 – start-page: 293 year: 1997 ident: 10.1016/j.tele.2017.04.013_b0025 article-title: Cognitive absorption and the adoption of new information technologies – year: 1980 ident: 10.1016/j.tele.2017.04.013_b0040 – year: 1974 ident: 10.1016/j.tele.2017.04.013_b0070 – volume: 14 start-page: 159 issue: 3 year: 1967 ident: 10.1016/j.tele.2017.04.013_b0160 article-title: Games with incomplete information played by “Bayesian” players, I-III Part I. The basic model publication-title: Manage. Sci. doi: 10.1287/mnsc.14.3.159 – ident: 10.1016/j.tele.2017.04.013_b0430 doi: 10.2139/ssrn.941708 – start-page: 81 year: 2011 ident: 10.1016/j.tele.2017.04.013_b0275 article-title: Privacy concerns and online behavior – not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses – ident: 10.1016/j.tele.2017.04.013_b0150 doi: 10.1145/2851581.2892413 – volume: 47 start-page: 263 issue: 2 year: 1979 ident: 10.1016/j.tele.2017.04.013_b0200 article-title: Prospect theory: an analysis of decision under risk publication-title: Econometrica doi: 10.2307/1914185 – volume: 48 start-page: 101 issue: 4 year: 2005 ident: 10.1016/j.tele.2017.04.013_b0060 article-title: Privacy in e-commerce: stated preferences vs. actual behavior publication-title: Commun. ACM doi: 10.1145/1053291.1053295 – volume: 15 start-page: 83 year: 2009 ident: 10.1016/j.tele.2017.04.013_b0110 article-title: Facebook and online privacy: attitudes, behaviors, and unintended consequences publication-title: J. Comput.-Mediated Commun. doi: 10.1111/j.1083-6101.2009.01494.x – ident: 10.1016/j.tele.2017.04.013_b0320 doi: 10.1145/1979742.1979887 – start-page: 121 year: 2008 ident: 10.1016/j.tele.2017.04.013_b0325 article-title: Privacy risk perceptions and privacy protection strategies – volume: 51 start-page: 62 issue: 1 year: 2010 ident: 10.1016/j.tele.2017.04.013_b0270 article-title: Understanding situational online information disclosure as a privacy calculus publication-title: J. Comput. Inf. Syst. – ident: 10.1016/j.tele.2017.04.013_b0460 – ident: 10.1016/j.tele.2017.04.013_b0185 doi: 10.1145/2675133.2675287 – volume: 45 start-page: 285 issue: 3 year: 2015 ident: 10.1016/j.tele.2017.04.013_b9005 article-title: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors publication-title: Eur. J. Soc. Psychol. doi: 10.1002/ejsp.2049 – ident: 10.1016/j.tele.2017.04.013_b0175 doi: 10.1109/SocialCom.2013.140 – volume: 47 start-page: 1 issue: 1 year: 1983 ident: 10.1016/j.tele.2017.04.013_b0105 article-title: The third-person effect in communication publication-title: Public Opin. Q. doi: 10.1086/268763 – volume: 65 start-page: 135 issue: 2 year: 1957 ident: 10.1016/j.tele.2017.04.013_b0130 article-title: An economic theory of political action in a democracy publication-title: J. Political Economy doi: 10.1086/257897 – volume: XI start-page: 513 issue: 1 year: 2010 ident: 10.1016/j.tele.2017.04.013_b0280 article-title: Online social networks and the privacy paradox: a research framework publication-title: Issues Inf. Syst. – ident: 10.1016/j.tele.2017.04.013_b0365 doi: 10.1145/1868914.1868957 – volume: 10 start-page: 340 issue: 1 year: 1999 ident: 10.1016/j.tele.2017.04.013_b0095 article-title: Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation publication-title: Organ. Sci. doi: 10.1287/orsc.10.1.104 – ident: 10.1016/j.tele.2017.04.013_b0450 – volume: 107 start-page: 34 year: 1990 ident: 10.1016/j.tele.2017.04.013_b0255 article-title: Impression management: a literature review and two-component model publication-title: Psychol. Bull. doi: 10.1037/0033-2909.107.1.34 – year: 1975 ident: 10.1016/j.tele.2017.04.013_b0050 – start-page: 275 year: 2010 ident: 10.1016/j.tele.2017.04.013_b0115 article-title: Addressing the privacy paradox by expanded privacy awareness – the example of context-aware services – ident: 10.1016/j.tele.2017.04.013_b0010 doi: 10.1145/988772.988777 – start-page: 740 year: 2009 ident: 10.1016/j.tele.2017.04.013_b0300 article-title: Social networks security – ident: 10.1016/j.tele.2017.04.013_b0165 – volume: 93 start-page: 1449 issue: 5 year: 2003 ident: 10.1016/j.tele.2017.04.013_b0195 article-title: Maps of bounded rationality: Psychology for behavioral economics publication-title: Am. Econ. Rev. doi: 10.1257/000282803322655392 – volume: 52 start-page: 315 issue: 3 year: 1999 ident: 10.1016/j.tele.2017.04.013_b0260 article-title: Because it is there: The challenge of mountaineeringEllipsisfor utility theory publication-title: Kyklos doi: 10.1111/j.1467-6435.1999.tb00221.x – volume: 35 start-page: 989 issue: 4 year: 2011 ident: 10.1016/j.tele.2017.04.013_b0390 article-title: Information privacy research: an interdisciplinary review publication-title: MIS Quarterly doi: 10.2307/41409970 – volume: 3 start-page: 26 issue: 1 year: 2005 ident: 10.1016/j.tele.2017.04.013_b0020 article-title: Privacy and rationality in individual decision making publication-title: IEEE Secur. Priv. doi: 10.1109/MSP.2005.22 – start-page: 3 year: 1984 ident: 10.1016/j.tele.2017.04.013_b0290 article-title: The phenomenon of social representations – volume: 5 start-page: 77 issue: 1 year: 1996 ident: 10.1016/j.tele.2017.04.013_b0005 article-title: Specific processes of social representations publication-title: Pap. Social Representations – volume: 171 start-page: 345 issue: 3969 year: 1971 ident: 10.1016/j.tele.2017.04.013_b0145 article-title: Interpersonal and economic resources publication-title: Science doi: 10.1126/science.171.3969.345 – start-page: 111 year: 2014 ident: 10.1016/j.tele.2017.04.013_b0475 article-title: Effects of security warnings and instant gratification cues on attitudes toward mobile websites – volume: 37 start-page: 509 issue: 4 year: 1974 ident: 10.1016/j.tele.2017.04.013_b0205 article-title: Uses and gratifications research publication-title: Public Opin. Q. doi: 10.1086/268109 – start-page: 127 year: 2011 ident: 10.1016/j.tele.2017.04.013_b0240 article-title: Online self-presentation: balancing privacy concerns and impression construction on social networking sites – volume: 116 start-page: 121 issue: 1 year: 2001 ident: 10.1016/j.tele.2017.04.013_b0315 article-title: Choice and procrastination publication-title: Quart. J. Econ. doi: 10.1162/003355301556365 – ident: 10.1016/j.tele.2017.04.013_b0350 doi: 10.1145/2858036.2858381 – volume: 26 start-page: 135 issue: 3 year: 2010 ident: 10.1016/j.tele.2017.04.013_b0455 article-title: The role of push-pull technology in privacy calculus: the case of location-based services publication-title: J. Manage. Inf. Syst. doi: 10.2753/MIS0742-1222260305 – ident: 10.1016/j.tele.2017.04.013_b0470 doi: 10.1145/2464464.2464503 – volume: 2013 start-page: 1 year: 2013 ident: 10.1016/j.tele.2017.04.013_b0225 article-title: Privacy as part of the app decision-making process publication-title: CHI – volume: 65 start-page: 409 year: 2016 ident: 10.1016/j.tele.2017.04.013_b0335 article-title: Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2016.09.005 – volume: 32 start-page: 192 issue: 3–4 year: 2009 ident: 10.1016/j.tele.2017.04.013_b0285 article-title: Public value inside: what is public value creation? publication-title: Int. J. Public Administration doi: 10.1080/01900690902732632 – ident: 10.1016/j.tele.2017.04.013_b0210 – volume: 64 start-page: 122 year: 2017 ident: 10.1016/j.tele.2017.04.013_b0235 article-title: Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon publication-title: Comput. Secur. doi: 10.1016/j.cose.2015.07.002 – volume: 34 start-page: 67 year: 1984 ident: 10.1016/j.tele.2017.04.013_b0375 article-title: Ritualized and instrumental television viewing publication-title: J. Commun. doi: 10.1111/j.1460-2466.1984.tb02174.x – volume: 10 start-page: 191 issue: 5 year: 1955 ident: 10.1016/j.tele.2017.04.013_b0100 article-title: Conformity and character publication-title: Am. Psychol. doi: 10.1037/h0040237 – volume: 71 start-page: 1163 year: 2013 ident: 10.1016/j.tele.2017.04.013_b0220 article-title: Information disclosure on mobile devices: R-examining privacy calculus with actual user behavior publication-title: Int. J. Hum Comput Stud. doi: 10.1016/j.ijhcs.2013.08.016 – volume: 1 start-page: 311 issue: 4 year: 1991 ident: 10.1016/j.tele.2017.04.013_b0340 article-title: Communication boundary management: a theoretical model of managing disclosure of private information between married couples publication-title: Commun. Theory doi: 10.1111/j.1468-2885.1991.tb00023.x – volume: 25 start-page: 607 issue: 6 year: 2015 ident: 10.1016/j.tele.2017.04.013_b0215 article-title: Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus publication-title: Inf. Syst. J. doi: 10.1111/isj.12062 – year: 1991 ident: 10.1016/j.tele.2017.04.013_b0415 – start-page: 289 year: 2011 ident: 10.1016/j.tele.2017.04.013_b0380 article-title: Feelings-as-information theory |
| SSID | ssj0017191 |
| Score | 2.629029 |
| SecondaryResourceType | review_article |
| Snippet | •This paper presents a systematic literature review discussing the privacy paradox.•Users are concerned about their privacy but undertake little to protect... Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1038 |
| SubjectTerms | Attitudes Behavior Benefit Decision making Decision theory Discrepancies Information privacy Literature reviews Mobile computing On-line systems Privacy Privacy concerns Privacy paradox Risk Risk assessment Systematic review User behavior |
| Title | The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review |
| URI | https://dx.doi.org/10.1016/j.tele.2017.04.013 https://www.proquest.com/docview/1966075495 |
| Volume | 34 |
| WOSCitedRecordID | wos000413384600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1879-324X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017191 issn: 0736-5853 databaseCode: AIEXJ dateStart: 19951201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3BjtMwELWqLhJwQLCA2GVBPnCrUsVru3aOBRYBghWHIvUWObaLdlWlVVOqHvmH5T_4J76Ecew4acWu2AOXqIqcadJ59YydN28QeiU0lzrTsyQrDE2YkFmiLNMJVQUjRjFpvWT-J3F-LqfT7Euv96uphdnMRVnK7TZb_ldXwzlwtiudvYW7o1E4AZ_B6XAEt8Pxnx2_XF1sXB93J-xtFttBQ2mgXV2N8pt7PQNZ47Lu0FtFzpbd1uxYa6Id7YobV6XXc1a-5sRrbMQ6_853jLv60POo2xzKZLrp8ASCXj2sCipQIYVuGfivVaAw1vShlgNgXEWbn6c-Q6xYDN4OJ8PuFgaERRK3MPxMJ-gogXUL7U7LYY_Tw0905lgn6d6J15Agyr_GAr8tcTlcw6M4Dp-oNW195euu8PZeQIw0xYYBd5k7G7mzkacsT12X5INTwTPZRwfjD2fTj_HFlSC-SWPzRKFOy1MK9-_kulxoLyuoU53JQ_QgrFHw2GPrEerZ8hDdbUrYq0N0v6Ni-Rj9BMThgBQcEId__7jCO1jDO1jDAWs4Yi1aaLCGARHYYw17rOEGa7X1MW5RhluUYY-yJ-jru7PJm_dJaPaRaCbJOiFMw9SgLMkkBD5Y5sqCjQwvFKfKzhTnNmO6MKlmzJpTbQyhRhA6KiyMFNzQp6hfLkr7DOG0yGaw8DdEzygriJLcQhCfcWX4iIpUHyHS_Oy5Dkr4riHLPL_e4UdoEK9Zeh2YG0fzxpt5yGR9hpoDOG-87qRxfR6mlConTkBXcJbx41vdxHN0r_2znaD-evXdvkB39GZ9Ua1eBuD-AUlT0gk |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+privacy+paradox+%E2%80%93+Investigating+discrepancies+between+expressed+privacy+concerns+and+actual+online+behavior+%E2%80%93+A+systematic+literature+review&rft.jtitle=Telematics+and+informatics&rft.au=Barth%2C+Susanne&rft.au=de+Jong%2C+Menno+D.T.&rft.date=2017-11-01&rft.issn=0736-5853&rft.volume=34&rft.issue=7&rft.spage=1038&rft.epage=1058&rft_id=info:doi/10.1016%2Fj.tele.2017.04.013&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_tele_2017_04_013 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0736-5853&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0736-5853&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0736-5853&client=summon |