{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:07:10Z","timestamp":1703117230498},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16DII116","16DII131"],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004238","name":"Universit\u00e4t Potsdam","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004238","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2023,12]]},"abstract":"Abstract<\/jats:title>Online businesses are increasingly relying on targeted advertisements as a revenue stream, which might lead to privacy concerns and hinder product adoption. Therefore, it is crucial for online companies to understand which types of targeted advertisements consumers will accept. In recent years, users have been increasingly targeted by political advertisements, which has caused adverse reactions in media and society. Nonetheless, few studies experimentally investigate user privacy concerns and their role in acceptance decisions in response to targeted political advertisements. To fill this gap, we explore the magnitude of privacy concerns towards targeted political ads compared to \u201ctraditional\u201d targeting in the product context. Surprisingly, we find no notable differences in privacy concerns between these data use purposes. In the next step, user preferences over ad types are elicited with the help of a discrete choice experiment in the mobile app adoption context. Our findings suggest that while targeted political advertising is somewhat less desirable than targeted product advertising, the odds of choosing an app are statistically insignificant between two data use purposes. Together, these results contribute to a better understanding of users\u2019 privacy concerns and preferences in the context of targeted political advertising online.\n<\/jats:p>","DOI":"10.1007\/s12525-023-00656-1","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T03:31:22Z","timestamp":1693539082000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The effects of targeted political advertising on user privacy concerns and digital product acceptance: A preference-based approach"],"prefix":"10.1007","volume":"33","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0378-2936","authenticated-orcid":false,"given":"Katharina","family":"Baum","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5481-9036","authenticated-orcid":false,"given":"Olga","family":"Abramova","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Mei\u00dfner","sequence":"additional","affiliation":[]},{"given":"Hanna","family":"Krasnova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"issue":"3","key":"656_CR1","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s12525-021-00505-z","volume":"32","author":"O Abramova","year":"2022","unstructured":"Abramova, O. (2022). No matter what the name, we\u2019re all the same? Examining ethnic online discrimination in ridesharing market places. Electronic Markets, 32(3), 1419\u20131446. https:\/\/doi.org\/10.1007\/s12525-021-00505-z","journal-title":"Electronic Markets"},{"issue":"2","key":"656_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1086\/671754","volume":"42","author":"A Acquisti","year":"2013","unstructured":"Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249\u2013274. https:\/\/doi.org\/10.1086\/671754","journal-title":"The Journal of Legal Studies"},{"issue":"6221","key":"656_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509\u2013514. https:\/\/doi.org\/10.1126\/science.aaa1465","journal-title":"Science"},{"issue":"2","key":"656_CR4","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"54","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., Taylor, C., & Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442\u2013492. https:\/\/doi.org\/10.1257\/jel.54.2.442","journal-title":"Journal of Economic Literature"},{"issue":"1","key":"656_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.jretai.2014.09.005","volume":"91","author":"E Aguirre","year":"2015","unstructured":"Aguirre, E., Mahr, D., Grewal, D., De Ruyter, K., & Wetzels, M. (2015). Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness. Journal of Retailing, 91(1), 34\u201349. https:\/\/doi.org\/10.1016\/j.jretai.2014.09.005","journal-title":"Journal of Retailing"},{"key":"656_CR6","doi-asserted-by":"publisher","unstructured":"Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration ikelihood model and individual persuasion. MIS Quarterly, 339\u2013370. https:\/\/doi.org\/10.2307\/20650295","DOI":"10.2307\/20650295"},{"issue":"1","key":"656_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/msp.2010.38","volume":"8","author":"AI Ant\u00f3n","year":"2010","unstructured":"Ant\u00f3n, A. I., Earp, J. B., & Young, J. D. (2010). How internet users\u2019 privacy concerns have evolved since 2002. IEEE Security & Privacy, 8(1), 21\u201327. https:\/\/doi.org\/10.1109\/msp.2010.38","journal-title":"IEEE Security & Privacy"},{"key":"656_CR8","volume-title":"54% of Americans say social media companies shouldn't allow any political ads","author":"B Auxier","year":"2020","unstructured":"Auxier, B. (2020). 54% of Americans say social media companies shouldn't allow any political ads. Pew Research Center. Retrieved January 19, 2023, from https:\/\/www.pewresearch.org\/fact-tank\/2020\/09\/24\/54-of-americans-say-social-media-companies-shouldnt-allow-any-political-a"},{"issue":"1","key":"656_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.17705\/1thci.00162","volume":"14","author":"M Balan","year":"2022","unstructured":"Balan, M., & Mathew, S. K. (2022). The persuasive nature of web personalization on online users\u2019 product perception: a mental accounting perspective. AIS Transactions on Human-Computer Interaction, 14(1), 78\u2013106. https:\/\/doi.org\/10.17705\/1thci.00162","journal-title":"AIS Transactions on Human-Computer Interaction"},{"issue":"3","key":"656_CR10","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s12525-019-00375-6","volume":"30","author":"R Bandara","year":"2019","unstructured":"Bandara, R., Fernando, M., & Akter, S. (2019). Privacy concerns in E-commerce: A taxonomy and a future research agenda. Electronic Markets, 30(3), 629\u2013647. https:\/\/doi.org\/10.1007\/s12525-019-00375-6","journal-title":"Electronic Markets"},{"issue":"1","key":"656_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/jcom.12276","volume":"67","author":"L Baruh","year":"2017","unstructured":"Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67(1), 26\u201353. https:\/\/doi.org\/10.1111\/jcom.12276","journal-title":"Journal of Communication"},{"issue":"4","key":"656_CR12","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017\u20131041. https:\/\/doi.org\/10.2307\/41409971","journal-title":"MIS Quarterly"},{"issue":"3","key":"656_CR13","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s12525-019-00332-3","volume":"30","author":"JH Betzing","year":"2020","unstructured":"Betzing, J. H., Tietz, M., vom Brocke, J., & Becker, J. (2020). The impact of transparency on mobile privacy decision making. Electronic Markets, 30(3), 607\u2013625. https:\/\/doi.org\/10.1007\/s12525-019-00332-3","journal-title":"Electronic Markets"},{"issue":"3","key":"656_CR14","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.jretai.2015.04.001","volume":"91","author":"A Bleier","year":"2015","unstructured":"Bleier, A., & Eisenbeiss, M. (2015). The importance of trust for personalized online advertising. Journal of Retailing, 91(3), 390\u2013409. https:\/\/doi.org\/10.1016\/j.jretai.2015.04.001","journal-title":"Journal of Retailing"},{"issue":"3","key":"656_CR15","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1002\/poi3.174","volume":"10","author":"L Bode","year":"2018","unstructured":"Bode, L., & Jones, M. L. (2018). Do Americans want a right to be forgotten? Estimating public support for digital erasure legislation. Policy & Internet, 10(3), 244\u2013263. https:\/\/doi.org\/10.1002\/poi3.174","journal-title":"Policy & Internet"},{"issue":"3","key":"656_CR16","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1080\/00913367.2017.1339368","volume":"46","author":"SC Boerman","year":"2017","unstructured":"Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2017). Online behavioral advertising: A literature review and research agenda. Journal of Advertising, 46(3), 363\u2013376. https:\/\/doi.org\/10.1080\/00913367.2017.1339368","journal-title":"Journal of Advertising"},{"key":"656_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/1745691610393980","volume":"6","author":"M Buhrmester","year":"2011","unstructured":"Buhrmester, M., Kwang, T., & Gosline, S. D. (2011). Amazon\u2019s mechanical Turk: A new source of inexpensive, yet high quality, data? Perspectives on Psychological Science, 6, 3\u20135. https:\/\/doi.org\/10.1177\/1745691610393980","journal-title":"Perspectives on Psychological Science"},{"key":"656_CR18","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.3758\/s13428-019-01273-7","volume":"51","author":"J Chandler","year":"2019","unstructured":"Chandler, J., Rosenzweig, C., Moss, A. J., Robinson, J., & Litman, L. (2019). Online panels in social science research: Expanding sampling methods beyond Mechanical Turk. Behavior Research Methods, 51, 2022\u20132038. https:\/\/doi.org\/10.3758\/s13428-019-01273-7","journal-title":"Behavior Research Methods"},{"issue":"1","key":"656_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jebo.2011.08.009","volume":"81","author":"G Charness","year":"2012","unstructured":"Charness, G., Gneezy, U., & Kuhn, M. A. (2012). Experimental methods: between-subject and within-subject design. Journal of Economic Behavior & Organization, 81(1), 1\u20138. https:\/\/doi.org\/10.1016\/j.jebo.2011.08.009","journal-title":"Journal of Economic Behavior & Organization"},{"key":"656_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ijinfomgt.2018.09.001","volume":"44","author":"Q Chen","year":"2019","unstructured":"Chen, Q., Feng, Y., Liu, L., & Tian, X. (2019). Understanding consumers\u2019 reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects. International Journal of Information Management, 44, 53\u201364. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.09.001","journal-title":"International Journal of Information Management"},{"issue":"2","key":"656_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MIC2017.3301625","volume":"22","author":"S Chiasson","year":"2018","unstructured":"Chiasson, S., Abdelaziz, Y., & Chanchary, F. (2018). Privacy concerns amidst OBA and the need for alternative models. IEEE Internet Computing, 22(2), 52\u201361. https:\/\/doi.org\/10.1109\/MIC2017.3301625","journal-title":"IEEE Internet Computing"},{"issue":"49","key":"656_CR22","doi-asserted-by":"publisher","first-page":"12441","DOI":"10.1073\/pnas.1808083115","volume":"115","author":"A Coppock","year":"2018","unstructured":"Coppock, A., Leeper, T. J., & Mullinix, K. J. (2018). Generalizability of heterogeneous treatment effect estimates across samples. Proceedings of the National Academy of Sciences, 115(49), 12441\u201312446. https:\/\/doi.org\/10.1073\/pnas.1808083115","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"656_CR23","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1080\/15252019.2015.1082450","volume":"15","author":"F De Keyzer","year":"2015","unstructured":"De Keyzer, F., Dens, N., & De Pelsmacker, P. (2015). Is this for me? How consumers respond to personalized advertising on social network sites. Journal of Interactive Advertising, 15(2), 124\u2013134. https:\/\/doi.org\/10.1080\/15252019.2015.1082450","journal-title":"Journal of Interactive Advertising"},{"issue":"2","key":"656_CR24","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1287\/isre.1110.0364","volume":"23","author":"AR Dennis","year":"2012","unstructured":"Dennis, A. R., Robert, L. P., Curtis, A. M., Kowalczyk, S. T., & Hasty, B. K. (2012). Research note Trust is in the eye of the beholder: A vignette study of post event behavioral controls\u2019 effects on individual trust in virtual teams. Information Systems Research, 23(2), 546\u2013558. https:\/\/doi.org\/10.1287\/isre.1110.0364","journal-title":"Information Systems Research"},{"issue":"1","key":"656_CR25","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s12525-015-0211-0","volume":"26","author":"S Derikx","year":"2016","unstructured":"Derikx, S., De Reuver, M., & Kroesen, M. (2016). Can privacy concerns for Internet-of-things enabled connected car services be compensated? A discrete choice experiment on mobile insurance services. Electronic Markets, 26(1), 73\u201381. https:\/\/doi.org\/10.1007\/s12525-015-0211-0","journal-title":"Electronic Markets"},{"issue":"4","key":"656_CR26","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2015.0600","volume":"26","author":"T Dinev","year":"2015","unstructured":"Dinev, T., McConnell, A. R., & Smith, H. J. (2015). Research commentary\u2014informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the \u201cAPCO\u201d box. Information Systems Research, 26(4), 639\u2013655. https:\/\/doi.org\/10.1287\/isre.2015.0600","journal-title":"Information Systems Research"},{"key":"656_CR27","doi-asserted-by":"publisher","unstructured":"Dolin, C., Weinshel, B., Shan, S., Hahn, C. M., Choi, E., Mazurek, M. L., & Ur, B. (2018). Unpacking perceptions of data-driven inferences underlying online targeting and personalization. In Proceedings of the 2018 CHI conference on human factors in computing systems (pp. 1\u201312). https:\/\/doi.org\/10.1145\/3173574.3174067","DOI":"10.1145\/3173574.3174067"},{"issue":"2","key":"656_CR28","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s12525-020-00447-y","volume":"31","author":"F Ebbers","year":"2021","unstructured":"Ebbers, F., Zibuschka, J., Zimmermann, C., & Hinz, O. (2021). User preferences for privacy features in digital assistants. Electron Markets, 31(2), 411\u2013426. https:\/\/doi.org\/10.1007\/s12525-020-00447-y","journal-title":"Electron Markets"},{"key":"656_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/2187836.2187852","volume-title":"Proceedings of the 21st international conference on World Wide Web","author":"A Farahat","year":"2012","unstructured":"Farahat, A., & Bailey, M. C. (2012). How effective is targeted advertising? In Proceedings of the 21st international conference on World Wide Web (pp. 111\u2013120). https:\/\/doi.org\/10.1145\/2187836.2187852"},{"key":"656_CR30","volume-title":"How politicians target you: 3,000 data points on every voter, including your phone number","author":"GA Fowler","year":"2020","unstructured":"Fowler, G. A. (2020). How politicians target you: 3,000 data points on every voter, including your phone number. The Washington Post. Retrieved January 19, 2023, from https:\/\/www.washingtonpost.com\/. technology\/2020\/10\/27\/political-campaign-data-targeting\/"},{"key":"656_CR31","unstructured":"Galaski, J. (2022). How targeted political advertisement must be regulated in the EU: Policy brief. Liberties. Retrieved January 19, 2023, from https:\/\/www.liberties.eu\/en\/stories\/political-ads-paper-june\/44324"},{"key":"656_CR32","unstructured":"GDPR. (2016). Retrieved March 28, 2019, from https:\/\/eur-lex.europa. eu\/eli\/reg\/2016\/679\/oj"},{"key":"656_CR33","unstructured":"Graham-Harrison, E., Cadwalladr, C., & Osborne, H. (2018). Cambridge Analytica boasts of dirty tricks to swing elections. The Guardian. Retrieved November 27, 2018, from https:\/\/www.theguardian.com\/uk-news\/2018\/mar\/19\/cambridge-analytica-execs-boast-dirty-tricks-honey-traps-elections"},{"issue":"4","key":"656_CR34","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.jval.2016.04.004","volume":"19","author":"AB Hauber","year":"2016","unstructured":"Hauber, A. B., Gonz\u00e1lez, J. M., Groothuis-Oudshoorn, C. G., Prior, T., Marshall, D. A., Cunningham, C., IJzerman, M. J., & Bridges, J. F. (2016). Statistical methods for the analysis of discrete choice experiments: A report of the ISPOR conjoint analysis good research practices task force. Value in Health, 19(4), 300\u2013315. https:\/\/doi.org\/10.1016\/j.jval.2016.04.004","journal-title":"Value in Health"},{"key":"656_CR35","unstructured":"Hern, A. (2018). Social networks may have to reveal how they target users with ads. The Guardian. Retrieved March 19, 2019, from https:\/\/www.theguardian.com\/technology\/2018\/mar\/06\/social. networks-reveal-how-they-target-users-with-political-ads"},{"issue":"6","key":"656_CR36","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1177\/0956797611436349","volume":"23","author":"JB Hirsh","year":"2012","unstructured":"Hirsh, J. B., Kang, S. K., & Bodenhausen, G. V. (2012). Personalized persuasion: Tailoring persuasive appeals to recipients\u2019 personality traits. Psychological Science, 23(6), 578\u2013581. https:\/\/doi.org\/10.1177\/0956797611436349","journal-title":"Psychological Science"},{"issue":"2","key":"656_CR37","doi-asserted-by":"publisher","first-page":"497","DOI":"10.25300\/misq\/2014\/38.2.08","volume":"38","author":"SY Ho","year":"2014","unstructured":"Ho, S. Y., & Bodoff, D. (2014). The effects of web personalization on user attitude and behavior. MIS Quarterly, 38(2), 497\u2013A10. https:\/\/doi.org\/10.25300\/misq\/2014\/38.2.08","journal-title":"MIS Quarterly"},{"issue":"1","key":"656_CR38","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/misq\/2013\/37.1.12","volume":"37","author":"W Hong","year":"2013","unstructured":"Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275\u2013298. https:\/\/doi.org\/10.25300\/misq\/2013\/37.1.12","journal-title":"MIS Quarterly"},{"issue":"5","key":"656_CR39","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1086\/656423","volume":"37","author":"LK John","year":"2011","unstructured":"John, L. K., Acquisti, A., & Loewenstein, G. (2011). Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37(5), 858\u2013873. https:\/\/doi.org\/10.1086\/656423","journal-title":"Journal of Consumer Research"},{"key":"656_CR40","first-page":"62","volume-title":"Ads that don\u2019t overstep","author":"LK John","year":"2018","unstructured":"John, L. K., Kim, T., & Barasz, K. (2018). Ads that don\u2019t overstep. Harvard Business Review, 96(1), 62\u201369, from https:\/\/hbr.org\/2018\/01\/ads-that-dont-overstep"},{"key":"656_CR41","first-page":"37","volume-title":"Tenth Symposium on Usable Privacy and Security","author":"R Kang","year":"2014","unstructured":"Kang, R., Brown, S., Dabbish, L., & Kiesler, S. (2014). Privacy attitudes of mechanical Turk workers and the US. public. In Tenth Symposium on Usable Privacy and Security (pp. 37\u201349) from https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/kang"},{"issue":"6","key":"656_CR42","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.ijinfomgt.2017.05.004","volume":"37","author":"C Kim","year":"2017","unstructured":"Kim, C., & Kim, D. J. (2017). Uncovering the value stream of digital content business from users\u2019 viewpoint. International Journal of Information Management, 37(6), 553\u2013565. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2017.05.004","journal-title":"International Journal of Information Management"},{"key":"656_CR43","volume-title":"A review of the discrete choice experiment-with emphasis on its application in health care","author":"T Kjaer","year":"2005","unstructured":"Kjaer, T. (2005). A review of the discrete choice experiment-with emphasis on its application in health care. Syddansk Universitet. Health Economics Papers No. 1."},{"issue":"11","key":"656_CR44","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1002\/asi.23629","volume":"67","author":"A Kobsa","year":"2016","unstructured":"Kobsa, A., Cho, H., & Knijnenburg, B. P. (2016). The effect of personalization provider characteristics on privacy attitudes and behaviors: An elaboration likelihood model approach. Journal of the Association for Information Science and Technology, 67(11), 2587\u20132606. https:\/\/doi.org\/10.1002\/asi.23629","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"656_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41599-021-00787-w","volume":"8","author":"A Kozyreva","year":"2021","unstructured":"Kozyreva, A., Lorenz-Spreen, P., Hertwig, R., Lewandowsky, S., & Herzog, S. M. (2021). Public attitudes towards algorithmic personalization and use of personal data online: Evidence from Germany, Great Britain, and the United States. Humanities and Social Sciences Communications, 8(1), 1\u201311. https:\/\/doi.org\/10.1057\/s41599-021-00787-w","journal-title":"Humanities and Social Sciences Communications"},{"issue":"1","key":"656_CR46","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s12394-009-0019-1","volume":"2","author":"H Krasnova","year":"2009","unstructured":"Krasnova, H., G\u00fcnther, O., Spiekermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2(1), 39\u201363. https:\/\/doi.org\/10.1007\/s12394-009-0019-1","journal-title":"Identity in the Information Society"},{"key":"656_CR47","volume-title":"The role of privacy perceptions in user behavior towards Facebook applications and permission dialogs","author":"H Krasnova","year":"2013","unstructured":"Krasnova, H., Eling, N., Schneider, O., Wenninger, H., Widjaja, T., & Buxmann, P. (2013). Does this app ask for too much data? In The role of privacy perceptions in user behavior towards Facebook applications and permission dialogs. Information Systems (ECIS). https:\/\/www.researchgate.net\/publication\/258611117_Does_This_App_Ask_for_Too_Much_Data_The_Role_of_Privacy_Perceptions_in_User_Behavior_Towards_Facebook_Applications_and_Permission_Dialogs"},{"key":"656_CR48","volume-title":"Proceedings of the International Conference on Information Systems (ICIS)","author":"H Krasnova","year":"2014","unstructured":"Krasnova, H., Eling, N., Abramova, O., & Buxmann, P. (2014). Dangers of \u2018Facebook Login\u2019 for mobile apps: Is there a price tag for social information? In Proceedings of the International Conference on Information Systems (ICIS). https:\/\/aisel.aisnet.org\/icis2014\/proceedings\/ISSecurity\/25"},{"issue":"4","key":"656_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2017.4.780","volume":"6","author":"S Kruschinski","year":"2017","unstructured":"Kruschinski, S., & Haller, A. (2017). Restrictions on data-driven political micro-targeting in Germany. Internet Policy Review, 6(4), 1\u201323. https:\/\/doi.org\/10.14763\/2017.4.780","journal-title":"Internet Policy Review"},{"issue":"2","key":"656_CR50","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1086\/259131","volume":"74","author":"KJ Lancaster","year":"1966","unstructured":"Lancaster, K. J. (1966). A new approach to consumer theory. Journal of Political Economy, 74(2), 132\u2013157. https:\/\/doi.org\/10.1086\/259131","journal-title":"Journal of Political Economy"},{"key":"656_CR51","unstructured":"Lapowsky, I. (2018). Get ready for a privacy law showdown in 2019. Wired. Retrieved March 20, 2019, from https:\/\/www.wired.com\/story\/privacy-law-showdown-congress-2019\/"},{"key":"656_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2501604.2501611","volume-title":"Ninth Symposium on Usable Privacy and Security","author":"PG Leon","year":"2013","unstructured":"Leon, P. G., Ur, B., Wang, Y., Sleeper, M., Balebako, R., Shay, R., Baur, L., Christodorescu, M., & Cranor, L. F. (2013). What matters to users? Factors that affect users\u2019 willingness to share information with online advertisers. In Ninth Symposium on Usable Privacy and Security (pp. 1\u201312). https:\/\/doi.org\/10.1145\/2501604.2501611"},{"issue":"3","key":"656_CR53","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/s1755-5345(13)70014-9","volume":"3","author":"JJ Louviere","year":"2010","unstructured":"Louviere, J. J., Flynn, T. N., & Carson, R. T. (2010). Discrete choice experiments are not conjoint analysis. Journal of Choice Modelling, 3(3), 57\u201372. https:\/\/doi.org\/10.1016\/s1755-5345(13)70014-9","journal-title":"Journal of Choice Modelling"},{"issue":"3","key":"656_CR54","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/bf00133443","volume":"8","author":"CF Manski","year":"1977","unstructured":"Manski, C. F. (1977). The structure of random utility models. Theory and Decision, 8(3), 229. https:\/\/doi.org\/10.1007\/bf00133443","journal-title":"Theory and Decision"},{"key":"656_CR55","first-page":"105","volume-title":"Frontiers in econometrics","author":"D McFadden","year":"1973","unstructured":"McFadden, D. (1973). Conditional logit analysis of qualitative choice behavior. In Frontiers in econometrics (pp. 105\u2013142). Academic Press."},{"issue":"2","key":"656_CR56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1515\/popets-2016-0009","volume":"2016","author":"W Melicher","year":"2016","unstructured":"Melicher, W., Sharif, M., Tan, J., Bauer, L., Christodorescu, M., & Leon, P. G. (2016). Preferences for web tracking. Proceedings on Privacy Enhancing Technologies, 2016(2), 1\u201320 https:\/\/petsymposium.org\/popets\/2016\/popets-2016-0009.pdf","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"1","key":"656_CR57","first-page":"42","volume":"25","author":"RS Moore","year":"2015","unstructured":"Moore, R. S., Moore, M. L., Shanahan, K. J., & Mack, B. (2015). Creepy marketing: Three dimensions of perceived excessive online privacy violation. Marketing Management, 25(1), 42\u201353 from https:\/\/www.researchgate.net\/publication\/282329651_Creepy_Marketing_Three_Dimensions_of_Perceived_Excessive_Online_Privacy_Violation","journal-title":"Marketing Management"},{"key":"656_CR58","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, H. (2009). Privacy in context. Stanford University Press."},{"key":"656_CR59","volume-title":"Getting started with conjoint analysis: Strategies for product design and pricing research","author":"BK Orme","year":"2006","unstructured":"Orme, B. K. (2006). Getting started with conjoint analysis: Strategies for product design and pricing research. Research Publishers."},{"key":"656_CR60","doi-asserted-by":"publisher","unstructured":"Peer, E., Paolacci, G., Chandler, J., & Mueller, P. (2012). Screening participants from previous studies on Amazon Mechanical Turk and Qualtrics. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.2100631","DOI":"10.2139\/ssrn.2100631"},{"issue":"2","key":"656_CR61","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1353\/jod.2017.0025","volume":"28","author":"N Persily","year":"2017","unstructured":"Persily, N. (2017). The 2016 US Election: Can democracy survive the internet? Journal of Democracy, 28(2), 63\u201376. https:\/\/doi.org\/10.1353\/jod.2017.0025","journal-title":"Journal of Democracy"},{"key":"656_CR62","unstructured":"Potoglou, D., Patil, S., Gij\u00f3n, C., Palacios, J., & Feij\u00f3o, C. (2013). The value of personal information online: Results from three stated preference discrete choice experiments in the UK, from https:\/\/www.researchgate.net\/publication\/260220060_THE_VALUE_OF_PERSONAL_INFORMATION_ONLINE_RESULTS_FROM_THREE_STATED_PREFERENCE_DISCRETE_CHOICE_EXPERIMENTS_IN_THE_UK"},{"key":"656_CR63","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/2381966.2381983","volume-title":"Proceedings of the 2012 ACM orkshop on Privacy in the electronic society","author":"A Prasad","year":"2012","unstructured":"Prasad, A., Sorber, J., Stablein, T., Anthony, D., & Kotz, D. (2012). Understanding sharing preferences and behavior for mHealth devices. In Proceedings of the 2012 ACM orkshop on Privacy in the electronic society (pp. 117\u2013128). https:\/\/doi.org\/10.1145\/2381966.2381983"},{"issue":"05","key":"656_CR64","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/msp.2015.109","volume":"13","author":"S Preibusch","year":"2015","unstructured":"Preibusch, S. (2015). The value of web search privacy. IEEE Security & Privacy, 13(05), 24\u201332. https:\/\/doi.org\/10.1109\/msp.2015.109","journal-title":"IEEE Security & Privacy"},{"key":"656_CR65","doi-asserted-by":"publisher","DOI":"10.1108\/9780857245670-008","volume-title":"Stated preference experimental design strategies","author":"JM Rose","year":"2007","unstructured":"Rose, J. M., & Bliemer, M. C. (2007). Stated preference experimental design strategies. Emerald Group Publishing Limited from https:\/\/www.researchgate.net\/publication\/267383290_Stated_preference_experimental_design_strategies"},{"key":"656_CR66","volume-title":"Using discrete choice experiments to value health and health care","author":"M Ryan","year":"2007","unstructured":"Ryan, M., Gerard, K., & Amaya-Amaya, M. (2007). Using discrete choice experiments to value health and health care (Vol. 11). Springer Science & Business."},{"issue":"3","key":"656_CR67","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s12525-020-00404-9","volume":"30","author":"EM Schomakers","year":"2020","unstructured":"Schomakers, E. M., Lidynia, C., & Ziefle, M. (2020). All of me? Users\u2019 preferences for privacy-preserving data markets and the importance of anonymity. Electronic Markets, 30(3), 649\u2013665. https:\/\/doi.org\/10.1007\/s12525-020-00404-9","journal-title":"Electronic Markets"},{"issue":"6","key":"656_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1jais.00161","volume":"9","author":"H Sheng","year":"2008","unstructured":"Sheng, H., Nah, F. F. H., & Siau, K. (2008). An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 1. https:\/\/doi.org\/10.17705\/1jais.00161","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"656_CR69","doi-asserted-by":"publisher","first-page":"487","DOI":"10.2307\/25750688","volume":"34","author":"M Siponen","year":"2010","unstructured":"Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487\u2013502. https:\/\/doi.org\/10.2307\/25750688","journal-title":"MIS Quarterly"},{"issue":"5","key":"656_CR70","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1037\/0003-066x.50.5.364","volume":"50","author":"P Slovic","year":"1995","unstructured":"Slovic, P. (1995). The construction of preference. American Psychologist, 50(5), 364. https:\/\/doi.org\/10.1037\/0003-066x.50.5.364","journal-title":"American Psychologist"},{"key":"656_CR71","unstructured":"Smith, A. (2018). 2. Algorithms in action: The content people see on social media. Pew Research Center. Retrieved March 20, 2019, from https:\/\/www.pewresearch.org\/internet\/2018\/11\/16\/algorithms-in-action-the-content-people-see-on-social-media\/"},{"issue":"4","key":"656_CR72","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1093\/qje\/qjy010","volume":"133","author":"JL Spenkuch","year":"2018","unstructured":"Spenkuch, J. L., & Toniatti, D. (2018). Political advertising and election results. The Quarterly Journal of Economics, 133(4), 1981\u20132036.","journal-title":"The Quarterly Journal of Economics"},{"key":"656_CR73","unstructured":"Statista. (2023). Political advertising spending in the United States election cycles from 2014 to 2022, by medium. Statista. Retrieved January 19, 2023, from https:\/\/www.statista.com\/statistics\/1182087\/political-advertising-spending-election-cycle-by-medium-united-states\/"},{"key":"656_CR74","doi-asserted-by":"publisher","DOI":"10.1002\/9780470148563","volume-title":"The construction of optimal stated choice experiments: Theory and methods","author":"DJ Street","year":"2007","unstructured":"Street, D. J., & Burgess, L. (2007). The construction of optimal stated choice experiments: Theory and methods. John Wiley & Sons."},{"issue":"2","key":"656_CR75","doi-asserted-by":"publisher","first-page":"2","DOI":"10.29012\/jpc.v4i2.620","volume":"4","author":"FD Stutzman","year":"2013","unstructured":"Stutzman, F. D., Gross, R., & Acquisti, A. (2013). Silent listeners: the evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality, 4(2), 2. https:\/\/doi.org\/10.29012\/jpc.v4i2.620","journal-title":"Journal of Privacy and Confidentiality"},{"key":"656_CR76","doi-asserted-by":"publisher","DOI":"10.1515\/9781400890521","volume-title":"# Republic: Divided democracy in the age of social media","author":"CR Sunstein","year":"2018","unstructured":"Sunstein, C. R. (2018). # Republic: Divided democracy in the age of social media. Princeton University Press."},{"key":"656_CR77","doi-asserted-by":"publisher","unstructured":"Sutanto, J., Palme, E., Tan, C. H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 1141\u20131164. https:\/\/doi.org\/10.25300\/misq\/2013\/37.4.07","DOI":"10.25300\/misq\/2013\/37.4.07"},{"key":"656_CR78","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/3267323.3268961","volume-title":"Proceedings of the 2018 Workshop on Privacy in the Electronic Society","author":"J Tan","year":"2018","unstructured":"Tan, J., Sharif, M., Bhagavatula, S., Beckerle, M., Mazurek, M. L., & Bauer, L. (2018). Comparing hypothetical and realistic privacy valuations. In Proceedings of the 2018 Workshop on Privacy in the Electronic Society (pp. 168\u2013182). https:\/\/doi.org\/10.1145\/3267323.3268961"},{"key":"656_CR79","unstructured":"Tsekouras, D., Frick, T. W., & Li, T. (2016). Don\u2019t take it personally: The effect of explicit targeting in advertising personalization. In Thirty Seventh International Conference on Information Systems (ICIS), from https:\/\/core.ac.uk\/download\/pdf\/301370325.pdf"},{"issue":"3","key":"656_CR80","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.ijindorg.2011.11.004","volume":"30","author":"CE Tucker","year":"2012","unstructured":"Tucker, C. E. (2012). The economics of advertising and privacy. International Journal of Industrial Organization, 30(3), 326\u2013329. https:\/\/doi.org\/10.1016\/j.ijindorg.2011.11.004","journal-title":"International Journal of Industrial Organization"},{"issue":"5","key":"656_CR81","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1509\/jmr.10.0355","volume":"51","author":"CE Tucker","year":"2014","unstructured":"Tucker, C. E. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5), 546\u2013562. https:\/\/doi.org\/10.1509\/jmr.10.0355","journal-title":"Journal of Marketing Research"},{"key":"656_CR82","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3144139","volume-title":"Political polarization, and political disinformation: a review of the scientific literature","author":"JA Tucker","year":"2018","unstructured":"Tucker, J. A., Guess, A., Barber\u00e1, P., Vaccari, C., Siegel, A., Sanovich, S., Stukal, D., & Nyhan, B. (2018). Social media, political polarization, and political disinformation: A review of the scientific literature. In Political polarization, and political disinformation: A review of the scientific literature. https:\/\/doi.org\/10.2139\/ssrn.3144139"},{"key":"656_CR83","unstructured":"US Census Bureau. (2021). Census Bureau estimates show average one-way travel time to work rises to all-time high. Census.gov. Retrieved January 16, 2023, from https:\/\/www.census.gov\/newsroom\/press-releases\/2021\/one-way-travel-time-to-work-rises.html"},{"issue":"4","key":"656_CR84","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s11002-012-9222-1","volume":"24","author":"J van Doorn","year":"2013","unstructured":"van Doorn, J., & Hoekstra, J. C. (2013). Intrusiveness. Marketing Letters, 24(4), 339\u2013351.","journal-title":"Marketing Letters"},{"key":"656_CR85","unstructured":"Vidler, M. (2018). Cambridge Analytica: Immoral vs. illegal data capture. Marketing Tech News. Retrieved November 27, 2019, from https:\/\/www.marketingtechnews.net\/news\/2018\/mar\/23\/cambridge-analytica-immoral-vs-illegal-data-capture\/"},{"issue":"4","key":"656_CR86","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1586\/14737167.2.4.319","volume":"2","author":"R Viney","year":"2002","unstructured":"Viney, R., Lancsar, E., & Louviere, J. (2002). Discrete choice experiments to measure consumer preferences for health and healthcare. Expert Review of Pharmacoeconomics & Outcomes Research, 2(4), 319\u2013326. https:\/\/doi.org\/10.1586\/14737167.2.4.319","journal-title":"Expert Review of Pharmacoeconomics & Outcomes Research"},{"issue":"6","key":"656_CR87","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1080\/13527266.2016.1182938","volume":"24","author":"M Walrave","year":"2018","unstructured":"Walrave, M., Poels, K., Antheunis, M. L., Van den Broeck, E., & van Noort, G. (2018). Like or dislike? Adolescents\u2019 responses to personalized social network site advertising. Journal of Marketing Communications, 24(6), 599\u2013616. https:\/\/doi.org\/10.1080\/13527266.2016.1182938","journal-title":"Journal of Marketing Communications"},{"issue":"3","key":"656_CR88","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s12525-022-00576-6","volume":"32","author":"D Werner","year":"2022","unstructured":"Werner, D., Adam, M., & Benlian, A. (2022). Empowering users to control ads and its effects on website stickiness. Electronic Markets, 32(3), 1373\u20131397. https:\/\/doi.org\/10.1007\/s12525-022-00576-6","journal-title":"Electronic Markets"},{"key":"656_CR89","unstructured":"Wong, J. C. (2018). \u2018It might work too well\u2019: The dark art of political advertising online. The Guardian. Retrieved March 19, 2019, from https:\/\/www.theguardian.com\/technology\/2018\/mar\/19\/facebook-political-ads-social-media-history-online-democracy"},{"key":"656_CR90","first-page":"1","volume-title":"The Westin categories, behavioral intentions, and consequences. Tenth Symposium on Usable Privacy and Security","author":"A Woodruff","year":"2014","unstructured":"Woodruff, A., Pihur, V., Consolvo, S., Brandimarte, L., & Acquisti, A. (2014). Would a privacy fundamentalist sell their DNA for $1000. If nothing bad happened as a result? In The Westin categories, behavioral intentions, and consequences. Tenth Symposium on Usable Privacy and Security (pp. 1\u201318) from https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/woodruff"},{"issue":"10","key":"656_CR91","doi-asserted-by":"publisher","first-page":"7383","DOI":"10.1287\/mnsc.2021.4249","volume":"68","author":"H Xu","year":"2022","unstructured":"Xu, H., & Zhang, N. (2022). From contextualizing to context theorizing: assessing context effects in privacy research. Management Science, 68(10), 7383\u20137401. https:\/\/doi.org\/10.1287\/mnsc.2021.4249","journal-title":"Management Science"},{"issue":"1","key":"656_CR92","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","volume":"51","author":"H Xu","year":"2011","unstructured":"Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42\u201352. https:\/\/doi.org\/10.1016\/j.dss.2010.11.017","journal-title":"Decision Support Systems"},{"issue":"4","key":"656_CR93","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1287\/isre.1120.0416","volume":"23","author":"H Xu","year":"2012","unstructured":"Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2012). Research note\u2014 effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342\u20131363. https:\/\/doi.org\/10.1287\/isre.1120.0416","journal-title":"Information Systems Research"},{"key":"656_CR94","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.09.011","volume":"51","author":"L Yu","year":"2020","unstructured":"Yu, L., Li, H., He, W., Wang, F. K., & Jiao, S. (2020). A meta-analysis to explore privacy cognition and information disclosure of internet users. International Journal of Information Management, 51, 102015. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.09.011","journal-title":"International Journal of Information Management"},{"issue":"2","key":"656_CR95","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.25300\/misq\/2022\/16288","volume":"46","author":"L Zalmanson","year":"2022","unstructured":"Zalmanson, L., Oestreicher-Singer, G., & Ecker, Y. (2022). The role of social cues and trust in users\u2019 private information disclosure. Management Information Systems Quarterly, 46(2), 1109\u20131134. https:\/\/doi.org\/10.25300\/misq\/2022\/16288","journal-title":"Management Information Systems Quarterly"},{"issue":"1","key":"656_CR96","doi-asserted-by":"publisher","first-page":"107","DOI":"10.5465\/amj.2010.48037118","volume":"53","author":"X Zhang","year":"2010","unstructured":"Zhang, X., & Bartol, K. M. (2010). Linking empowering leadership and employee creativity: The influence of psychological empowerment, intrinsic motivation, and creative process engagement. Academy of Management Journal, 53(1), 107\u2013128. https:\/\/doi.org\/10.5465\/amj.2010.48037118","journal-title":"Academy of Management Journal"},{"issue":"2","key":"656_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103314","volume":"58","author":"YQ Zhu","year":"2021","unstructured":"Zhu, Y. Q., & Kanjanamekanant, K. (2021). No trespassing: exploring privacy boundaries in personalized advertisement and its effects on ad attitude and purchase intentions on social media. Information & Management, 58(2), 103314. https:\/\/doi.org\/10.1016\/j.im.2020.103314","journal-title":"Information & Management"},{"issue":"1","key":"656_CR98","doi-asserted-by":"publisher","first-page":"294","DOI":"10.17705\/1jais.00775","volume":"24","author":"Y-Q Zhu","year":"2023","unstructured":"Zhu, Y.-Q., Kanjanamekanant, K., & Chiu, Y.-T. (2023). Reconciling the personalization-privacy paradox: Exploring privacy boundaries in online personalized advertising. Journal of the Association for Information Systems, 24(1), 294\u2013316. https:\/\/doi.org\/10.17705\/1jais.00775","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"656_CR99","doi-asserted-by":"publisher","first-page":"82","DOI":"10.18352\/ulr.420","volume":"14","author":"F Zuiderveen Borgesius","year":"2018","unstructured":"Zuiderveen Borgesius, F., M\u00f6ller, J., Kruikemeier, S. Q., Fathaigh, R., Irion, K., Dobber, T., Bodo, B., & de Vreese, C. H. (2018). Online political microtargeting: Promises and threats for democracy. Utrecht Law Review, 14(1), 82\u201396. https:\/\/doi.org\/10.18352\/ulr.420","journal-title":"Utrecht Law Review"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-023-00656-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12525-023-00656-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-023-00656-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T08:28:39Z","timestamp":1703060919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12525-023-00656-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":99,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["656"],"URL":"https:\/\/doi.org\/10.1007\/s12525-023-00656-1","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]},"assertion":[{"value":"30 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"46"}}