References
- Acikgoz, Y., and Sumer, H. C. (2019). Implementation intentions as a predictor of applicant withdrawal. Military Psychology, 31(5), 347-354. https://doi.org/10.1080/08995605.2019.1637208
- Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce, EC'04, 21-29.
- Acquisti, A., and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In P. Golle and G. Danezis (eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies, 36-58.
- Adam, A. F., and Fayolle, A. (2016). Can implementation intention help to bridge the intention-behaviour gap in the entrepreneurial process? An experimental approach. The International Journal of Entrepreneurship and Innovation, 17(2), 80-88. https://doi.org/10.1177/1465750316648569
- Agarwal, R., and Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665-694. https://doi.org/10.2307/3250951
- Aivazpour, Z., and Rao, V. S. (2020). Information disclosure and privacy paradox: The role of impulsivity. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 51(1), 14-36. https://doi.org/10.1145/3380799.3380803
- Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Ajzen, I., and Fishbein, M. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs, NJ: Prentice-Hall.
- Armitage, C. J., and Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology, 40(4), 471-499. https://doi.org/10.1348/014466601164939
- Awad, N. F., and Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1) 13-28. https://doi.org/10.2307/25148715
- Bagozzi, R. P., Dholakia, U. M., and Basuroy, S. (2003). How effortful decisions get enacted: The motivating role of decision processes, desires, and anticipated emotions. Journal of Behavioral Decision Making, 16(4), 273-295. https://doi.org/10.1002/bdm.446
- Bart, Y., Shankar, V., Sultan, F., and Urban, G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69(4), 133-152. https://doi.org/10.1509/jmkg.2005.69.4.133
- Barth, S., and De Jong, M. D. (2017). The privacy paradox-Investigating discrepancies between expressed privacy concerns and actual online behavior-A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. https://doi.org/10.1016/j.tele.2017.04.013
- Barth, S., De Jong, M. D., Junger, M., Hartel, P. H., and Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55-69. https://doi.org/10.1016/j.tele.2019.03.003
- Belanger, F., Hiller, J. S., and Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3-4), 245-270. https://doi.org/10.1016/S0963-8687(02)00018-5
- Bieleke, M., Legrand, E., Mignon, A., and Gollwitzer, P. M. (2018). More than planned: Implementation intention effects in non-planned situations. Acta Psychologica, 184, 64-74. https://doi.org/10.1016/j.actpsy.2017.06.003
- Boyd, D., and Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8), 1.
- Brandtzaeg, P. B., Luders, M., and Skjetne, J. H. (2010). Too many Facebook "friends"? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human-Computer Interaction, 26(11-12), 1006-1030. https://doi.org/10.1080/10447318.2010.516719
- Cho, H., Lee, J. S., and Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995. https://doi.org/10.1016/j.chb.2010.02.012
- Choon, M. J. K. (2018). Revisiting the privacy paradox on social media: An analysis of privacy practices associated with Facebook and Twitter. Canadian Journal of Communication, 43(2). doi: 10.22230/cjc.2018v43n2a3267
- De Wolf, R., Willaert, K., and Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444-454. https://doi.org/10.1016/j.chb.2014.03.010
- Debatin, B., Lovejoy, J. P., Horn, A. K., and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
- Deuker, A. (2009). Addressing the privacy paradox by expanded privacy awareness-the example of context-aware services. In IFIP prime life international summer school on privacy and identity management for life (pp. 275-283). Springer, Berlin, Heidelberg.
- Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Dinev, T., and Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 23.
- Du, J., Jiang, C., Chen, K. C., Ren, Y., and Poor, H. V. (2018). Community-structured evolutionary game for privacy protection in social networks. IEEE Transactions on Information Forensics and Security, 13(3), 574-589. https://doi.org/10.1109/TIFS.2017.2758756
- Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 Proceedings, 339.
- Fishbein, M., and Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Massachusetts: Addison-Wiley Publishing Company.
- Flender, C., and Muller, G. (2012). Type indeterminacy in privacy decisions: The privacy paradox revisited. In International Symposium on Quantum Interaction (pp. 148-159). Springer, Berlin, Heidelberg.
- Frik, A., and Gaudeul, A. (2020). A measure of the implicit value of privacy under risk. Journal of Consumer Marketing, 37(4), 457-472. https://doi.org/10.1108/JCM-06-2019-3286
- Gerber, N., Gerber, P., and Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261. https://doi.org/10.1016/j.cose.2018.04.002
- Ginosar, A., and Ariel, Y. (2017). An analytical framework for online privacy research: What is missing? Information & Management, 54(7), 948-957. https://doi.org/10.1016/j.im.2017.02.004
- Gollwitzer, P. M. (1993). Goal achievement: The role of intentions. European Review of Social Psychology, 4(1), 141-185. https://doi.org/10.1080/14792779343000059
- Gollwitzer, P. M. (1999). Implementation intentions: Strong effects of simple plans. American Psychologist, 54(7), 493-503. https://doi.org/10.1037/0003-066X.54.7.493
- Gollwitzer, P. M. (2014). Weakness of the will: Is a quick fix possible? Motivation and Emotion, 38(3), 305-322. https://doi.org/10.1007/s11031-014-9416-3
- Gollwitzer, P. M., and Brandstatter, V. (1997). Implementation intentions and effective goal pursuit. Journal of Personality and Social Psychology, 73(1), 186-199. https://doi.org/10.1037/0022-3514.73.1.186
- Gollwitzer, P. M., and Schaal, B. (1998). Metacognition in action: The importance of implementation intentions. Personality and Social Psychology Review, 2(2), 124-136. https://doi.org/10.1207/s15327957pspr0202_5
- Gollwitzer, P. M., and Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in Experimental Social Psychology, 38, 69-119. https://doi.org/10.1016/S0065-2601(06)38002-1
- Grimmer, M., and Miles, M. P. (2017). With the best of intentions: A large sample test of the intention-behaviour gap in pro-environmental consumer behaviour. International Journal of Consumer Studies, 41(1), 2-10. https://doi.org/10.1111/ijcs.12290
- Gross, R., and Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71-80.
- Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227. https://doi.org/10.1016/j.chb.2016.11.033
- Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9(1), 50-60. https://doi.org/10.1016/j.elerap.2009.05.001
- Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85. https://doi.org/10.1145/299157.299175
- Hsieh, S. H., and Lee, C. T. (2020). Traces of mobility: Examining location disclosure on social networks with mobile location tagging. Telematics and Informatics, 49, 101366.
- Hsu, M. H., and Kuo, F. Y. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42(4), 305-320. https://doi.org/10.1023/A:1022500626298
- Hughes-Roberts, T. (2013). Privacy and social networks: Is concern a valid indicator of intention and behaviour? In Proceedings of the 2013 International Conference on Social Computing, 909-912.
- Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195-204. https://doi.org/10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7
- Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). doi: 10.1111/j.1083-6101.1999.tb00337.x
- Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173. https://doi.org/10.1016/j.ijhcs.2013.08.016
- Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. https://doi.org/10.1016/j.cose.2015.07.002
- Krishnamurthy, B., and Wills, C. E. (2008). Characterizing privacy in online social networks. In Proceedings of the First Workshop on Online Social Networks, 37-42.
- Lee, N., and Kwon, O. (2015). A privacy-aware feature selection method for solving the personalization-privacy paradox in mobile wellness healthcare services. Expert Systems with Applications, 42(5), 2764-2771. https://doi.org/10.1016/j.eswa.2014.11.031
- Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481. https://doi.org/10.1016/j.dss.2012.06.010
- Li, Y., Vishwamitra, N., Hu, H., and Caine, K. (2020). Towards A taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1-14.
- Lowry, P. B., Cao, J., and Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200. https://doi.org/10.2753/MIS0742-1222270406
- MacMillan, D., and McMillan, R. (2018, October 8). Google exposed user data, feared repercussions of disclosing to public. Wall Street Journal, https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194
- Madejski, M., Johnson, M., and Bellovin, S. M. (2011). The failure of online social network privacy settings. Columbia University, Technical Report CUCS-010-11. doi: 10.7916/D8NG4ZJ1
- Madejski, M., Johnson, M., and Bellovin, S. M. (2012). A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 340-345.
- McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359. https://doi.org/10.1287/isre.13.3.334.81
- Melicher, W., Sharif, M., Tan, J., Bauer, L., Christodorescu, M., and Leon, P. G. (2016). (Do Not) Track me sometimes: Users' contextual preferences for web tracking. Proceedings on Privacy Enhancing Technologies, 2016(2), 135-154. https://doi.org/10.1515/popets-2016-0009
- Millham, M. H., and Atkin, D. (2018). Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors. New Media & Society, 20(1), 50-67. https://doi.org/10.1177/1461444816654465
- Mosteller, J., and Poddar, A. (2017). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors. Journal of Interactive Marketing, 39, 27-38. https://doi.org/10.1016/j.intmar.2017.02.003
- Netter, M., Riesner, M., Weber, M., and Pernul, G. (2013). Privacy settings in online social networks-preferences, perception, and reality. In 2013 46th Hawaii International Conference on System Sciences, 3219-3228.
- Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
- Nunnally J. C. (1978). An overview of psychological measurement. In B. B. Wolman (ed.), Clinical diagnosis of mental disorders (pp. 97-146). Boston, MA: Springer.
- Oomen, I., and Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. In Policies and research in identity management (pp. 121-138). Boston, MA: Springer.
- Papies, E. K. (2017). Situating interventions to bridge the intention-behaviour gap: A framework for recruiting nonconscious processes for behaviour change. Social and Personality Psychology Compass, 11(7), e12323.
- Podsakoff, P. M., and Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-544. https://doi.org/10.1177/014920638601200408
- Prestwich, A., and Kellar, I. (2014). How can the impact of implementation intentions as a behaviour change intervention be improved? European Review of Applied Psychology, 64(1), 35-41. https://doi.org/10.1016/j.erap.2010.03.003
- Ramaswami, S. N., Srinivasan, S. S., and Gorton, S. A. (1997). Information asymmetry between salesperson and supervisor: Postulates from agency and social exchange theories. Journal of Personal Selling & Sales Management, 17(3), 29-50.
- Reynolds, B., Venkatanathan, J., Goncalves, J., and Kostakos, V. (2011). Sharing ephemeral information in online social networks: Privacy perceptions and behaviours. In IFIP Conference on Human-Computer Interaction, 204-215.
- Schoenbachler, D. D., and Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2-16. https://doi.org/10.1002/dir.10033
- Schwarzer, R., Richert, J., Kreausukon, P., Remme, L., Wiedemann, A. U., and Reuter, T. (2010). Translating intentions into nutrition behaviors via planning requires self-efficacy: Evidence from Thailand and Germany. International Journal of Psychology, 45(4), 260-268. https://doi.org/10.1080/00207591003674479
- Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. European Review of Social Psychology, 12(1), 1-36. https://doi.org/10.1080/14792772143000003
- Sheeran, P., and Orbell, S. (1999). Implementation intentions and repeated behaviour: Augmenting the predictive validity of the theory of planned behaviour. European Journal of Social Psychology, 29(2-3), 349-369. https://doi.org/10.1002/(SICI)1099-0992(199903/05)29:2/3<349::AID-EJSP931>3.0.CO;2-Y
- Sheeran, P., and Silverman, M. (2003). Evaluation of three interventions to promote workplace health and safety: Evidence for the utility of implementation intentions. Social Science & Medicine, 56(10), 2153-2163. https://doi.org/10.1016/S0277-9536(02)00220-4
- Sniehotta, F. F., Scholz, U., and Schwarzer, R. (2005). Bridging the intention-behaviour gap: Planning, self-efficacy, and action control in the adoption and maintenance of physical exercise. Psychology & Health, 20(2), 143-160. https://doi.org/10.1080/08870440512331317670
- Spottswood, E. L., and Hancock, J. T. (2017). Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication, 22(2), 55-70. https://doi.org/10.1111/jcc4.12182
- Strater, K., and Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity, Interaction, 22, 111-119. https://doi.org/10.14236/ewic/HCI2008.11
- Sun, Y., Wang, N., Shen, X. L., and Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278-292. https://doi.org/10.1016/j.chb.2015.06.006
- Taddicken, M. (2014). The 'privacy paradox'in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273. https://doi.org/10.1111/jcc4.12052
- Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. (2005). PLS path modeling. Computational Statistics & Data Analysis, 48(1), 159-205. https://doi.org/10.1016/j.csda.2004.03.005
- Thompson, R., Barclay, D. W., and Higgins, C. A. (1995). The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration. Technology Studies: Special Issue on Research Methodology, 2(2), 284-324.
- Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1-12. https://doi.org/10.1016/j.chb.2018.11.046
- Utz, S., and Kramer, N. C. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), 2.
- Van Gelderen, M., Kautonen, T., Wincent, J., and Biniari, M. (2018). Implementation intentions in the entrepreneurial process: Concept, empirical findings, and research agenda. Small Business Economics, 51(4), 923-941. https://doi.org/10.1007/s11187-017-9971-6
- Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480. https://doi.org/10.1016/j.giq.2016.06.004
- Wall, J. D., and Warkentin, M. (2019). Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Information & Management, 56(8), 103157.
- Webb, T. L., and Sheeran, P. (2007). How do implementation intentions promote goal attainment? A test of component processes. Journal of Experimental Social Psychology, 43(2), 295-302. https://doi.org/10.1016/j.jesp.2006.02.001
- Wisniewski, P. J., Knijnenburg, B. P., and Lipford, H. R. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95-108. https://doi.org/10.1016/j.ijhcs.2016.09.006
- Xie, W., and Kang, C. (2015). See you, see me: Teenagers' self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398-407. https://doi.org/10.1016/j.chb.2015.05.059
- Xu, H., Dinev, T., Smith, J., and Hart, P. (2011). Information privacy concerns: Linking perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1.
- Yang, Q., Gong, X., Zhang, K. Z., Liu, H., and Lee, M. K. (2020). Self-disclosure in mobile payment applications: Common and differential effects of personal and proxy control enhancing mechanisms. International Journal of Information Management, 52, 102065.
- Young, A. L., and Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479-500. https://doi.org/10.1080/1369118X.2013.777757
- Zafeiropoulou, A. M., Millard, D. E., Webber, C., and O'Hara, K. (2013). Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? In Proceedings of the 5th Annual ACM Web Science Conference, 463-472.
- Zhao, L., Lu, Y., and Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90. https://doi.org/10.2753/JEC1086-4415160403
- Ziegelmann, J. P., Luszczynska, A., Lippke, S., and Schwarzer, R. (2007). Are goal intentions or implementation intentions better predictors of health behavior? A longitudinal study in orthopedic rehabilitation. Rehabilitation Psychology, 52(1), 97-102. https://doi.org/10.1037/0090-5550.52.1.97
- Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., and Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123. https://doi.org/10.1016/j.im.2009.12.003