Note — Effects of Individual Self-Protection , Industry Self-Regulation , and Government Regulation on Privacy Concerns : A Study of Location-Based Services

Full terms and conditions of use:

[1]  Simone Wannemaker Security And Usability Designing Secure Systems That People Can Use , 2016 .

[2]  Miguel A. Vadillo,et al.  Illusion of Control , 2013, Experimental psychology.

[3]  Jens Grossklags,et al.  Third-party apps on Facebook: privacy and the illusion of control , 2011, CHIMIT '11.

[4]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[5]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[6]  Heng Xu,et al.  CoPE: Enabling collaborative privacy management in online social networks , 2011, J. Assoc. Inf. Sci. Technol..

[7]  Benjamin Edelman,et al.  Adverse selection in online "trust" certifications and search results , 2011, Electron. Commer. Res. Appl..

[8]  Benjamin Gerber,et al.  Conceptualizing privacy , 2010, CSOC.

[9]  S. Sundar,et al.  Personalization versus Customization: The Importance of Agency, Privacy, and Power Usage , 2010 .

[10]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[11]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[12]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[13]  G. Loewenstein,et al.  Misplaced Confidences: Privacy and the Control Paradox. , 2010 .

[14]  Mary J. Culnan,et al.  How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..

[15]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[16]  Izak Benbasat,et al.  Interactive Decision Aids for Consumer Decision Making in E-Commerce: The Influence of Perceived Strategy Restrictiveness , 2009, MIS Q..

[17]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[18]  Oded Nov,et al.  Social computing privacy concerns: antecedents and effects , 2009, CHI.

[19]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[20]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[21]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[22]  Jenny Fry,et al.  Engaging Privacy and Information Technology in a Digital Age , 2008 .

[23]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[24]  Arun Rai,et al.  Knowledge Sharing Ambidexterity in Long-Term Interorganizational Relationships , 2008, Manag. Sci..

[25]  Matthew Chalmers,et al.  From awareness to repartee: sharing location within social groups , 2008, CHI.

[26]  Michael D. Smith,et al.  Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor , 2007, J. Manag. Inf. Syst..

[27]  David Gefen,et al.  The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.

[28]  Scott D. Mainwaring,et al.  1 Privacy Issues and Human-Computer Interaction , 2008 .

[29]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[30]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[31]  Adam N. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[32]  A. Conceptualization and Operationalization o f Perceive d Control , 2007 .

[33]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[34]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[35]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[36]  D. Harrison McKnight,et al.  Perceived Information Quality in Data Exchanges: Effects on Risk, Trust, and Intention to Use , 2006, Inf. Syst. Res..

[37]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[38]  Miriam J. Metzger Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure , 2006, Commun. Res..

[39]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[40]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[41]  Richard T. Watson,et al.  The U-Constructs: Four Information Drives , 2006, Commun. Assoc. Inf. Syst..

[42]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[43]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[44]  Trevor T. Moores,et al.  Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.

[45]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[46]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[47]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[48]  Gerald L. Lohse,et al.  International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..

[49]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[50]  H. Jeff Smith Information Privacy and its Management , 2004, MIS Q. Executive.

[51]  Gurpreet Dhillon,et al.  Do privacy seals in e-commerce really work? , 2003, CACM.

[52]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[53]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[54]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[55]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[56]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[57]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[58]  H. Uslucan,et al.  The Handbook of Culture and Psychology. , 2003 .

[59]  Subhasish Dasgupta,et al.  Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals , 2003, Inf. Syst. Manag..

[60]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[61]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[62]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[63]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[64]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[65]  A. Bandura Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.

[66]  Gurpreet Dhillon,et al.  Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..

[67]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[68]  S. Yamaguchi,et al.  Culture and Control Orientations. , 2001 .

[69]  I. Ajzen Nature and operation of attitudes. , 2001, Annual review of psychology.

[70]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[71]  Andrew J. Rohm,et al.  Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .

[72]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[73]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[74]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[75]  P. Schwartz Privacy and Democracy in Cyberspace , 2000 .

[76]  Donna L. Hoffman,et al.  Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web , 1999, Inf. Soc..

[77]  K. Sheehan,et al.  An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .

[78]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[79]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[80]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[81]  Peter P. Swire Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .

[82]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[83]  Hal Berghel,et al.  Cyberspace 2000: dealing with information overload , 1997, CACM.

[84]  E. Skinner A guide to constructs of control. , 1996, Journal of personality and social psychology.

[85]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[86]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[87]  D. Laskin Dealing with information overload. , 1994, Journal of oral and maxillofacial surgery : official journal of the American Association of Oral and Maxillofacial Surgeons.

[88]  R. Goldsmith,et al.  Social values and female fashion leadership: A cross‐cultural study , 1993 .

[89]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[90]  R. I. Sutton,et al.  Organizational behavior: linking individuals and groups to organizational contexts. , 1993, Annual review of psychology.

[91]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[92]  P. Lachenbruch Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .

[93]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[94]  F. Schoeman Philosophical Dimensions of Privacy: An Anthology , 1984 .

[95]  John R. Weisz,et al.  Standing out and standing in: The psychology of control in America and Japan. , 1984 .

[96]  Michael S. Hamilton,et al.  The Dynamics of Law , 1981 .

[97]  P. Shrout Quasi-experimentation: Design and analysis issues for field settings: by Thomas D. Cook and Donald T. Campbell. Chicago: Rand McNally, 1979 , 1980 .

[98]  R. Sitgreaves Psychometric theory (2nd ed.). , 1979 .

[99]  Terry S. Overton,et al.  Estimating Nonresponse Bias in Mail Surveys , 1977 .

[100]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[101]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[102]  D. Campbell,et al.  Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.

[103]  Claudia van Oppen,et al.  USING PLS PATH MODELING FOR ASSESSING HIERARCHICAL CONSTRUCT MODELS : GUIDELINES AND EMPIRICAL , 2022 .