Acknowledgement
This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2018S1A5A2A01039335)
References
- Abraham, R. (2000). Organizational cynicism: Bases and consequences. Genetic, Social, and General Psychology Monographs, 126(3), 269-292.
- Anderson, C. L., and Agarwal, R. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469-490. https://doi.org/10.1287/isre.1100.0335
- Anderson, J. C., and Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423. https://doi.org/10.1037/0033-2909.103.3.411
- Andersson, L. M. (1996). Employee cynicism: An examination using a contract violation framework. Human Relations, 49(11), 1395-1418. https://doi.org/10.1177/001872679604901102
- Ansari, S., and Gupta, S. (2018). To reveal or conceal? Understanding the notion of privacy among individuals. Asia Pacific Journal of Information Systems, 28(4), 258-273. https://doi.org/10.14329/apjis.2018.28.4.258
- Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150. https://doi.org/10.1016/j.dss.2010.01.010
- Bateman, T. S., Sakano, T., and Fujita, M. (1992). Roger, me, and my attitude: Film propaganda and cynicism toward corporate leadership. Journal of Applied Psychology, 77(5), 768-771. https://doi.org/10.1037/0021-9010.77.5.768
- Belanger, F., and Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1042. https://doi.org/10.2307/41409971
- Bhavnani, K. K. (1991). Talking politics: A psychological framing of views from youth in Britain. Cambridge: Cambridge University Press.
- Byrne, B. M. (2010). Structural equation modeling with AMOS. Basic concepts, applications, and programming. New York: Routledge.
- Chen, H. T., and Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13-19. https://doi.org/10.1089/cyber.2014.0456
- Chiaburu, D. S., Peng, A. C., Oh, I. S., Banks, G. C., and Lomeli, L. C. (2013). Antecedents and consequences of employee organizational cynicism: A meta-analysis. Journal of Vocational Behavior, 83(2), 181-197. https://doi.org/10.1016/j.jvb.2013.03.007
- Choi, H., Park, J., and Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51. https://doi.org/10.1016/j.chb.2017.12.001
- Chylinski, M., and Chu, A. (2010). Consumer cynicism: Antecedents and consequences. European Journal of Marketing, 44(6), 796-837. https://doi.org/10.1108/03090561011032720
- Clarke, R. (2014). Persona missing, feared drowned: The digital persona concept, two decades later. Information Technology & People, 27(2), 182-207. https://doi.org/10.1108/ITP-04-2013-0073
- Cohen, J., Cohen, P., West, S. G., and Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioral sciences (3rd ed.). Mahwah: Lawrence Erlbaum & Associates.
- Computerweekly (2016). 412 million user accounts exposed in friendfinder networks hack. Retrieved from http://www.computerweekly.com/news/450402859/412-million-user-accounts-exposed-in-FriendFinder-Networks-hack
- Culnan, M. J., and Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115. https://doi.org/10.1287/orsc.10.1.104
- Dean Jr, J. W., Brandes, P., and Dharwadkar, R. (1998). Organizational cynicism. Academy of Management Review, 23(2), 341-352. https://doi.org/10.2307/259378
- Dinev, T., and Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. https://doi.org/10.1080/01449290410001715723
- Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104
- Garbarino, E., and Johnson, M. S. (2001). Effects of consumer goals on attribute weighting, overall satisfaction, and product usage. Psychology & Marketing, 18(9), 929-949. https://doi.org/10.1002/mar.1036
- Goodhue, D., Lewis, W., and Thompson, R. (2007). Research note-Statistical power in analyzing interaction effects: Questioning the advantage of PLS with product indicators. Information Systems Research, 18(2), 211-227. https://doi.org/10.1287/isre.1070.0123
- Haans, R. F., Pieters, C., and He, Z. L. (2016). Thinking about U: Theorizing and testing U and inverted U shaped relationships in strategy research. Strategic Management Journal, 37(7), 1177-1195. https://doi.org/10.1002/smj.2399
- Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs: Printice Hall.
- Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227. https://doi.org/10.1016/j.chb.2016.11.033
- Hanisch, K. A., and Hulin, C. L. (1991). General attitudes and organizational withdrawal: An evaluation of a causal model. Journal of Vocational Behavior, 39(1), 110-128. https://doi.org/10.1016/0001-8791(91)90006-8
- Hanson, G., Haridakis, P. M., Cunningham, A. W., Sharma, R., and Ponder, J. D. (2010). The 2008 presidential campaign: Political cynicism in the age of Facebook, MySpace, and YouTube. Mass Communication and Society, 13(5), 584-607. https://doi.org/10.1080/15205436.2010.513470
- Hargittai, E., and Marwick, A. (2016). "What can I really do?" Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737-3757.
- Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago press.
- Hoffmann, C. P., Lutz, C., and Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), 7.
- Hooper, D., Coughlan, J., and Mullen, M. (2008). Structural equation modelling: Guidelines for determining model fit. Electronic Journal of Business Research Methods, 4(1), 53-60.
- Hu, L. T., and Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55. https://doi.org/10.1080/10705519909540118
- James, M. S. (2005). Antecedents and consequences of cynicism in organizations: An examination of the potential positive and negative effects on school systems. The Florida State University.
- Jiang, Z., Heng, C. S., and Choi, B. C. (2013). Research note-Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. https://doi.org/10.1287/isre.1120.0441
- Johnson, J. L., and O'Leary-Kelly, A. M. (2003). The effects of psychological contract breach and organizational cynicism: Not all social exchange violations are created equal. Journal of Organizational Behavior, 24(5), 627-647. https://doi.org/10.1002/job.207
- Jung, W. J., and Lee, S. Y. T. (2015). What affects the value of information privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305. https://doi.org/10.14329/apjis.2015.25.2.289
- Kang, H., Shin, W., and Tam, L. (2016). Differential responses of loyal versus habitual consumers towards mobile site personalization on privacy management. Computers in Human Behavior, 56, 281-288. https://doi.org/10.1016/j.chb.2015.11.013
- Kanter, D. L., and Mirvis, P. H. (1989). The cynical Americans: Living and working in an age of discontent and disillusion. San Francisco: Jossey-Bass.
- Krathwohl, D. R. (2009). Methods of educational and social science research: The logic of methods. Long Grove: Waveland Press.
- Lee, R. T., and Ashforth, B. E. (1993). A longitudinal study of burnout among supervisors and managers: Comparisons between the Leiter and Maslach (1988) and Golembiewski et al. (1986) models. Organizational Behavior and Human Decision Processes, 54(3), 369-398. https://doi.org/10.1006/obhd.1993.1016
- Li, H., Luo, X. R., Zhang, J., and Xu, H. (2017). Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Information & Management, 54(8), 1012-1022. https://doi.org/10.1016/j.im.2017.02.005
- Li, H., Sarathy, R., and Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
- Lin, G. C., Wen, Z., Marsh, H. W., and Lin, H. S. (2010). Structural equation models of latent interactions: Clarification of orthogonalizing and double-mean-centering strategies. Structural Equation Modeling, 17(3), 374-391. https://doi.org/10.1080/10705511.2010.488999
- Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. ACM SIGCOMM Conference on Internet Measurement Conference (ACM) Proceedings, 61-70.
- Liu, Z., Wang, X., and Liu, J. (2019). How digital natives make their self-disclosure decisions: A cross-cultural comparison. Information Technology & People, 32(3), 538-558. https://doi.org/10.1108/ITP-10-2017-0339
- Lwin, M., Wirtz, J., and Williams, J. D. (2007). Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585. https://doi.org/10.1007/s11747-006-0003-3
- Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
- Marsh, H. W., Wen, Z., Hau, K., and Nagengast, B. (2013). Structural equation models of latent interaction and quadratic effects. In G. R. Hancock and R. O. Mueller (eds.), A second course in structural equation modeling (pp. 267-308). Greenwich: Information Age.
- Maslach, C., Schaufeli, W. B., and Leiter, M. P. (2001). Job burnout. Annual Review of Psychology, 52(1), 397-422. https://doi.org/10.1146/annurev.psych.52.1.397
- Morin, A. J., Vandenberghe, C., Turmel, M. J., Madore, I., and Maiano, C. (2013). Probing into commitment's nonlinear relationships to work outcomes. Journal of Managerial Psychology, 28(2), 202-223. https://doi.org/10.1108/02683941311300739
- Naus, F., Van Iterson, A., and Roe, R. (2007). Organizational cynicism: Extending the exit, voice, loyalty, and neglect model of employees' responses to adverse conditions in the workplace. Human Relations, 60(5), 683-718. https://doi.org/10.1177/0018726707079198
- Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
- Nunnany, J. (1978). Psychometric theory. New York: McGraw Hill.
- Peterman, M. L. (1997). The effects of concrete and abstract consumer goals on information processing. Psychology & Marketing, 14(6), 561-583. https://doi.org/10.1002/(SICI)1520-6793(199709)14:6<561::AID-MAR3>3.0.CO;2-5
- Ping Jr, R. A. (1995). A parsimonious estimating technique for interaction and quadratic latent variables. Journal of Marketing Research, 32(3), 336-347. https://doi.org/10.1177/002224379503200308
- Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903. https://doi.org/10.1037/0021-9010.88.5.879
- Reichers, A. E., Wanous, J. P., and Austin, J. T. (1997). Understanding and managing cynicism about organizational change. Academy of Management Perspectives, 11(1), 48-59. https://doi.org/10.5465/ame.1997.9707100659
- Rubino, C., Luksyte, A., Perry, S. J., and Volpone, S. D. (2009). How do stressors lead to burnout? The mediating role of motivation. Journal of Occupational Health Psychology, 14(3), 289-304. https://doi.org/10.1037/a0015284
- Schaufeli, W. B., Leiter, M. P., Maslach, C., and Jackson, S. E. (1996). The Maslach burnout inventory-general survey. In C. Maslach, S. E. Jackson and M. P. Leiter (eds.), MBI manual (pp. 191-218). Palo Alto: Consulting Psychologists Press.
- Schaufeli, W. B., and Taris, T. W. (2005). The conceptualization and measurement of burnout: Common ground and worlds apart. Work & Stress, 19(3), 256-262. https://doi.org/10.1080/02678370500385913
- Sharma, S., and Crossler, R. E. (2014). Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electronic Commerce Research and Applications, 13(5), 305-319. https://doi.org/10.1016/j.elerap.2014.06.007
- Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1016. https://doi.org/10.2307/41409970
- Son, J. Y., and Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529. https://doi.org/10.2307/25148854
- Stivers, R. (1994). The culture of cynicism: American morality in decline. Cambridge: Blackwell Publishers.
- Taddicken, M. (2014). The 'privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self disclosure. Journal of Computer Mediated Communication, 19(2), 248-273. https://doi.org/10.1111/jcc4.12052
- Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444. https://doi.org/10.17705/1jais.00092
- Verizon (2018). 2018 data breach investigations report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir
- Wanous, J. P., Reichers, A. E., and Austin, J. T. (1994). Organizational cynicism: An initial study. Academy of Management Best Papers Proceedings, 269-273.
- Wanous, J. P., Reichers, A. E., and Austin, J. T. (2000). Cynicism about organizational change: Measurement, antecedents, and correlates. Group & Organization Management, 25(2), 132-153. https://doi.org/10.1177/1059601100252003
- Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.
- Xie, E., Teo, H. H., and Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61-74. https://doi.org/10.1007/s11002-006-4147-1
- Xu, H., Luo, X. R., Carroll, J. M., and Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52. https://doi.org/10.1016/j.dss.2010.11.017
- Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174. https://doi.org/10.2753/MIS0742-1222260305
- Yoo, C. W., Ahn, H. J., and Rao, H. R. (2012). An exploration of the impact of information privacy invasion. International Conference on Information Systems (ICIS) Proceedings, 1-18.