References
- Acikgoz, Y., and Sumer, H. C. (2019). Implementation intentions as a predictor of applicant withdrawal. Military Psychology, 31(5), 347-354.
- Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce, EC'04, 21-29.
- Acquisti, A., and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In P. Golle and G. Danezis (eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies, 36-58.
- Adam, A. F., and Fayolle, A. (2016). Can implementation intention help to bridge the intention-behaviour gap in the entrepreneurial process? An experimental approach. The International Journal of Entrepreneurship and Innovation, 17(2), 80-88.
- Agarwal, R., and Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665-694.
- Aivazpour, Z., and Rao, V. S. (2020). Information disclosure and privacy paradox: The role of impulsivity. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 51(1), 14-36.
- Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
- Ajzen, I., and Fishbein, M. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs, NJ: Prentice-Hall.
- Armitage, C. J., and Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology, 40(4), 471-499.
- Awad, N. F., and Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1) 13-28.
- Bagozzi, R. P., Dholakia, U. M., and Basuroy, S. (2003). How effortful decisions get enacted: The motivating role of decision processes, desires, and anticipated emotions. Journal of Behavioral Decision Making, 16(4), 273-295.
- Bart, Y., Shankar, V., Sultan, F., and Urban, G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69(4), 133-152.
- Barth, S., and De Jong, M. D. (2017). The privacy paradox-Investigating discrepancies between expressed privacy concerns and actual online behavior-A systematic literature review. Telematics and Informatics, 34(7), 1038-1058.
- Barth, S., De Jong, M. D., Junger, M., Hartel, P. H., and Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55-69.
- Belanger, F., Hiller, J. S., and Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3-4), 245-270.
- Bieleke, M., Legrand, E., Mignon, A., and Gollwitzer, P. M. (2018). More than planned: Implementation intention effects in non-planned situations. Acta Psychologica, 184, 64-74.
- Boyd, D., and Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8), 1.
- Brandtzaeg, P. B., Luders, M., and Skjetne, J. H. (2010). Too many Facebook "friends"? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human-Computer Interaction, 26(11-12), 1006-1030.
- Cho, H., Lee, J. S., and Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995.
- Choon, M. J. K. (2018). Revisiting the privacy paradox on social media: An analysis of privacy practices associated with Facebook and Twitter. Canadian Journal of Communication, 43(2). doi: 10.22230/cjc.2018v43n2a3267
- De Wolf, R., Willaert, K., and Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444-454.
- Debatin, B., Lovejoy, J. P., Horn, A. K., and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108.
- Deuker, A. (2009). Addressing the privacy paradox by expanded privacy awareness-the example of context-aware services. In IFIP prime life international summer school on privacy and identity management for life (pp. 275-283). Springer, Berlin, Heidelberg.
- Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
- Dinev, T., and Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 23.
- Du, J., Jiang, C., Chen, K. C., Ren, Y., and Poor, H. V. (2018). Community-structured evolutionary game for privacy protection in social networks. IEEE Transactions on Information Forensics and Security, 13(3), 574-589.
- Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 Proceedings, 339.
- Fishbein, M., and Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Massachusetts: Addison-Wiley Publishing Company.
- Flender, C., and Muller, G. (2012). Type indeterminacy in privacy decisions: The privacy paradox revisited. In International Symposium on Quantum Interaction (pp. 148-159). Springer, Berlin, Heidelberg.
- Frik, A., and Gaudeul, A. (2020). A measure of the implicit value of privacy under risk. Journal of Consumer Marketing, 37(4), 457-472.
- Gerber, N., Gerber, P., and Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261.
- Ginosar, A., and Ariel, Y. (2017). An analytical framework for online privacy research: What is missing? Information & Management, 54(7), 948-957.
- Gollwitzer, P. M. (1993). Goal achievement: The role of intentions. European Review of Social Psychology, 4(1), 141-185.
- Gollwitzer, P. M. (1999). Implementation intentions: Strong effects of simple plans. American Psychologist, 54(7), 493-503.
- Gollwitzer, P. M. (2014). Weakness of the will: Is a quick fix possible? Motivation and Emotion, 38(3), 305-322.
- Gollwitzer, P. M., and Brandstatter, V. (1997). Implementation intentions and effective goal pursuit. Journal of Personality and Social Psychology, 73(1), 186-199.
- Gollwitzer, P. M., and Schaal, B. (1998). Metacognition in action: The importance of implementation intentions. Personality and Social Psychology Review, 2(2), 124-136.
- Gollwitzer, P. M., and Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in Experimental Social Psychology, 38, 69-119.
- Grimmer, M., and Miles, M. P. (2017). With the best of intentions: A large sample test of the intention-behaviour gap in pro-environmental consumer behaviour. International Journal of Consumer Studies, 41(1), 2-10.
- Gross, R., and Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71-80.
- Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227.
- Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9(1), 50-60.
- Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85.
- Hsieh, S. H., and Lee, C. T. (2020). Traces of mobility: Examining location disclosure on social networks with mobile location tagging. Telematics and Informatics, 49, 101366.
- Hsu, M. H., and Kuo, F. Y. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42(4), 305-320.
- Hughes-Roberts, T. (2013). Privacy and social networks: Is concern a valid indicator of intention and behaviour? In Proceedings of the 2013 International Conference on Social Computing, 909-912.
- Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195-204.
- Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). doi: 10.1111/j.1083-6101.1999.tb00337.x
- Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173.
- Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.
- Krishnamurthy, B., and Wills, C. E. (2008). Characterizing privacy in online social networks. In Proceedings of the First Workshop on Online Social Networks, 37-42.
- Lee, N., and Kwon, O. (2015). A privacy-aware feature selection method for solving the personalization-privacy paradox in mobile wellness healthcare services. Expert Systems with Applications, 42(5), 2764-2771.
- Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.
- Li, Y., Vishwamitra, N., Hu, H., and Caine, K. (2020). Towards A taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1-14.
- Lowry, P. B., Cao, J., and Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.
- MacMillan, D., and McMillan, R. (2018, October 8). Google exposed user data, feared repercussions of disclosing to public. Wall Street Journal, https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194
- Madejski, M., Johnson, M., and Bellovin, S. M. (2011). The failure of online social network privacy settings. Columbia University, Technical Report CUCS-010-11. doi: 10.7916/D8NG4ZJ1
- Madejski, M., Johnson, M., and Bellovin, S. M. (2012). A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 340-345.
- McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
- Melicher, W., Sharif, M., Tan, J., Bauer, L., Christodorescu, M., and Leon, P. G. (2016). (Do Not) Track me sometimes: Users' contextual preferences for web tracking. Proceedings on Privacy Enhancing Technologies, 2016(2), 135-154.
- Millham, M. H., and Atkin, D. (2018). Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors. New Media & Society, 20(1), 50-67.
- Mosteller, J., and Poddar, A. (2017). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors. Journal of Interactive Marketing, 39, 27-38.
- Netter, M., Riesner, M., Weber, M., and Pernul, G. (2013). Privacy settings in online social networks-preferences, perception, and reality. In 2013 46th Hawaii International Conference on System Sciences, 3219-3228.
- Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.
- Nunnally J. C. (1978). An overview of psychological measurement. In B. B. Wolman (ed.), Clinical diagnosis of mental disorders (pp. 97-146). Boston, MA: Springer.
- Oomen, I., and Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. In Policies and research in identity management (pp. 121-138). Boston, MA: Springer.
- Papies, E. K. (2017). Situating interventions to bridge the intention-behaviour gap: A framework for recruiting nonconscious processes for behaviour change. Social and Personality Psychology Compass, 11(7), e12323.
- Podsakoff, P. M., and Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-544.
- Prestwich, A., and Kellar, I. (2014). How can the impact of implementation intentions as a behaviour change intervention be improved? European Review of Applied Psychology, 64(1), 35-41.
- Ramaswami, S. N., Srinivasan, S. S., and Gorton, S. A. (1997). Information asymmetry between salesperson and supervisor: Postulates from agency and social exchange theories. Journal of Personal Selling & Sales Management, 17(3), 29-50.
- Reynolds, B., Venkatanathan, J., Goncalves, J., and Kostakos, V. (2011). Sharing ephemeral information in online social networks: Privacy perceptions and behaviours. In IFIP Conference on Human-Computer Interaction, 204-215.
- Schoenbachler, D. D., and Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2-16.
- Schwarzer, R., Richert, J., Kreausukon, P., Remme, L., Wiedemann, A. U., and Reuter, T. (2010). Translating intentions into nutrition behaviors via planning requires self-efficacy: Evidence from Thailand and Germany. International Journal of Psychology, 45(4), 260-268.
- Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. European Review of Social Psychology, 12(1), 1-36.
- Sheeran, P., and Orbell, S. (1999). Implementation intentions and repeated behaviour: Augmenting the predictive validity of the theory of planned behaviour. European Journal of Social Psychology, 29(2-3), 349-369.
- Sheeran, P., and Silverman, M. (2003). Evaluation of three interventions to promote workplace health and safety: Evidence for the utility of implementation intentions. Social Science & Medicine, 56(10), 2153-2163.
- Sniehotta, F. F., Scholz, U., and Schwarzer, R. (2005). Bridging the intention-behaviour gap: Planning, self-efficacy, and action control in the adoption and maintenance of physical exercise. Psychology & Health, 20(2), 143-160.
- Spottswood, E. L., and Hancock, J. T. (2017). Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication, 22(2), 55-70.
- Strater, K., and Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity, Interaction, 22, 111-119.
- Sun, Y., Wang, N., Shen, X. L., and Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278-292.
- Taddicken, M. (2014). The 'privacy paradox'in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273.
- Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. (2005). PLS path modeling. Computational Statistics & Data Analysis, 48(1), 159-205.
- Thompson, R., Barclay, D. W., and Higgins, C. A. (1995). The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration. Technology Studies: Special Issue on Research Methodology, 2(2), 284-324.
- Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1-12.
- Utz, S., and Kramer, N. C. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), 2.
- Van Gelderen, M., Kautonen, T., Wincent, J., and Biniari, M. (2018). Implementation intentions in the entrepreneurial process: Concept, empirical findings, and research agenda. Small Business Economics, 51(4), 923-941.
- Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480.
- Wall, J. D., and Warkentin, M. (2019). Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Information & Management, 56(8), 103157.
- Webb, T. L., and Sheeran, P. (2007). How do implementation intentions promote goal attainment? A test of component processes. Journal of Experimental Social Psychology, 43(2), 295-302.
- Wisniewski, P. J., Knijnenburg, B. P., and Lipford, H. R. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95-108.
- Xie, W., and Kang, C. (2015). See you, see me: Teenagers' self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398-407.
- Xu, H., Dinev, T., Smith, J., and Hart, P. (2011). Information privacy concerns: Linking perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1.
- Yang, Q., Gong, X., Zhang, K. Z., Liu, H., and Lee, M. K. (2020). Self-disclosure in mobile payment applications: Common and differential effects of personal and proxy control enhancing mechanisms. International Journal of Information Management, 52, 102065.
- Young, A. L., and Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479-500.
- Zafeiropoulou, A. M., Millard, D. E., Webber, C., and O'Hara, K. (2013). Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? In Proceedings of the 5th Annual ACM Web Science Conference, 463-472.
- Zhao, L., Lu, Y., and Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90.
- Ziegelmann, J. P., Luszczynska, A., Lippke, S., and Schwarzer, R. (2007). Are goal intentions or implementation intentions better predictors of health behavior? A longitudinal study in orthopedic rehabilitation. Rehabilitation Psychology, 52(1), 97-102.
- Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., and Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123.