{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T11:04:37Z","timestamp":1742641477473,"version":"3.37.3"},"reference-count":51,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001866","name":"National Research Fund","doi-asserted-by":"crossref","award":["PRIDE15\/10621687"],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1016\/j.chb.2019.106227","type":"journal-article","created":{"date-parts":[[2019,12,26]],"date-time":"2019-12-26T23:24:59Z","timestamp":1577402699000},"page":"106227","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":37,"special_numbering":"C","title":["How Acceptable Is This? How User Experience Factors Can Broaden our Understanding of The Acceptance of Privacy Trade-offs"],"prefix":"10.1016","volume":"106","author":[{"given":"Verena","family":"Distler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2048-7947","authenticated-orcid":false,"given":"Carine","family":"Lallemand","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.22","article-title":"Privacy and rationality in individual decision making","volume":"3","author":"Acquisti","year":"2005","journal-title":"IEEE Security and Privacy Magazine"},{"issue":"9","key":"10.1016\/j.chb.2019.106227_bib2","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1080\/08870446.2011.613995","article-title":"The theory of planned behaviour: Reactions and reflections","volume":"26","author":"Ajzen","year":"2011","journal-title":"Psychology and Health"},{"issue":"3","key":"10.1016\/j.chb.2019.106227_bib3","first-page":"545","article-title":"The effect of security and privacy perceptions on customers' trust to accept internet banking services: An extension of TAM","volume":"11","author":"Al-Sharafi","year":"2016","journal-title":"Journal of Engineering and Applied Sciences"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib4","doi-asserted-by":"crossref","first-page":"339","DOI":"10.2307\/20650295","article-title":"Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion","volume":"33","author":"Angst","year":"2009","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00706ED1V01Y201602HCI034","article-title":"Qualitative HCI research: Going behind the scenes","volume":"9","author":"Blandford","year":"2016","journal-title":"Synthesis Lectures on Human-Centered Informatics"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib6","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qualitative Research in Psychology"},{"issue":"7","key":"10.1016\/j.chb.2019.106227_bib7","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1016\/j.im.2016.02.003","article-title":"The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage","volume":"53","author":"Choi","year":"2016","journal-title":"Information & Management"},{"key":"10.1016\/j.chb.2019.106227_bib8","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","article-title":"The role of privacy fatigue in online privacy behavior","volume":"81","author":"Choi","year":"2018","journal-title":"Computers in Human Behavior"},{"year":"1985","series-title":"A technology acceptance model for empirically testing new end-user information systems: Theory and results (PhD thesis)","author":"Davis","key":"10.1016\/j.chb.2019.106227_bib9"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib10","article-title":"Framework of product experience","volume":"1","author":"Desmet","year":"2007","journal-title":"International Journal of Design"},{"issue":"5","key":"10.1016\/j.chb.2019.106227_bib11","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.intcom.2011.07.002","article-title":"The dilemma of the hedonic \u2013 appreciated, but hard to justify","volume":"23","author":"Diefenbach","year":"2011","journal-title":"Interacting with Computers"},{"issue":"5","key":"10.1016\/j.chb.2019.106227_bib12","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1111\/jcc4.12163","article-title":"An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. Sample","volume":"21","author":"Dienlin","year":"2016","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib13","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for E-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2019.106227_bib14","series-title":"Proceedings of the 2019 CHI conference on human factors in computing systems","first-page":"1","article-title":"Security\u2014visible, yet unseen?","author":"Distler","year":"2019"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib15","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.chb.2010.08.010","article-title":"Explaining physicians' acceptance of EHCR systems: An extension of TAM with trust and risk factors","volume":"27","author":"Egea","year":"2011","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2019.106227_bib16","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.chb.2016.11.033","article-title":"Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards","volume":"68","author":"Hallam","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2019.106227_bib17","series-title":"Proceedings of the 20th conference on l'Interaction homme-machine","first-page":"11","article-title":"User experience (UX): Towards an experiential perspective on product quality","author":"Hassenzahl","year":"2008"},{"issue":"5","key":"10.1016\/j.chb.2019.106227_bib18","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.intcom.2010.04.002","article-title":"Needs, affect, and interactive products \u2013 facets of user experience","volume":"22","author":"Hassenzahl","year":"2010","journal-title":"Interacting with Computers"},{"issue":"3","key":"10.1016\/j.chb.2019.106227_bib19","article-title":"Designing moments of meaning and pleasure. Experience design and happiness","volume":"7","author":"Hassenzahl","year":"2013","journal-title":"International Journal of Design"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib20","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1080\/01449290500330331","article-title":"User experience\u2014a research agenda","volume":"25","author":"Hassenzahl","year":"2006","journal-title":"Behaviour & Information Technology"},{"year":"2016","series-title":"Contextual design: Design for life","author":"Holtzblatt","key":"10.1016\/j.chb.2019.106227_bib21"},{"issue":"5","key":"10.1016\/j.chb.2019.106227_bib22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3127358","article-title":"Technology acceptance and user experience: A review of the experiential component in HCI","volume":"24","author":"Hornb\u00e6k","year":"2017","journal-title":"ACM Transactions on Computer-Human Interaction"},{"year":"2016","series-title":"Mapping experiences: A complete guide to creating value through journeys, blueprints, and diagrams","author":"Kalbach","key":"10.1016\/j.chb.2019.106227_bib23"},{"issue":"12","key":"10.1016\/j.chb.2019.106227_bib24","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1016\/j.ijhcs.2013.08.016","article-title":"Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior","volume":"71","author":"Keith","year":"2013","journal-title":"International Journal of Human-Computer Studies"},{"issue":"3","key":"10.1016\/j.chb.2019.106227_bib25","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s12599-012-0216-6","article-title":"Self-disclosure and privacy calculus on social networking sites: The role of culture: Intercultural dynamics of privacy calculus","volume":"4","author":"Krasnova","year":"2012","journal-title":"Business & Information Systems Engineering"},{"author":"Kraus","key":"10.1016\/j.chb.2019.106227_bib26"},{"key":"10.1016\/j.chb.2019.106227_bib27","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jisa.2016.10.002","article-title":"Psychological needs as motivators for security and privacy actions on smartphones","volume":"34","author":"Kraus","year":"2017","journal-title":"Journal of Information Security and Applications"},{"year":"2014","series-title":"Focus groups: A practical guide for applied research","author":"Krueger","key":"10.1016\/j.chb.2019.106227_bib28"},{"key":"10.1016\/j.chb.2019.106227_bib29","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.ijhcs.2016.09.011","article-title":"The role of expectations in service evaluation: A longitudinal study of a proximity mobile payment service","volume":"98","author":"Kujala","year":"2017","journal-title":"International Journal of Human-Computer Studies"},{"year":"2015","series-title":"Towards consolidated methods for the design and evaluation of user experience","author":"Lallemand","key":"10.1016\/j.chb.2019.106227_bib30"},{"issue":"3","key":"10.1016\/j.chb.2019.106227_bib31","doi-asserted-by":"crossref","first-page":"324","DOI":"10.4103\/2249-4863.161306","article-title":"Validity, reliability, and generalizability in qualitative research","volume":"4","author":"Leung","year":"2015","journal-title":"Journal of Family Medicine and Primary Care"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib32","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.dss.2010.02.008","article-title":"Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services","volume":"49","author":"Luo","year":"2010","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.chb.2019.106227_bib33","doi-asserted-by":"crossref","DOI":"10.7554\/eLife.33334","article-title":"Post-decision biases reveal a self-consistency principle in perceptual inference","volume":"7","author":"Luu","year":"2018","journal-title":"ELife"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib34","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/248873","article-title":"Four ethical issues of the information age","volume":"10","author":"Mason","year":"1986","journal-title":"MIS Quarterly"},{"author":"Miles","key":"10.1016\/j.chb.2019.106227_bib35"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib36","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox: Personal information disclosure intentions versus behaviors","volume":"41","author":"Norberg","year":"2007","journal-title":"Journal of Consumer Affairs"},{"key":"10.1016\/j.chb.2019.106227_bib37","series-title":"Proceedings of the 4th international conference on automotive user interfaces and interactive vehicular applications","article-title":"Predicting information technology usage in the car: Towards a car technology acceptance model","volume":"Vols. 51\u201358","author":"Osswald","year":"2012"},{"year":"2011","series-title":"Shifting electricity demand with smart home technologies\u2014an experimental study on user acceptance","author":"Paetz","key":"10.1016\/j.chb.2019.106227_bib38"},{"year":"2015","series-title":"Privacy and information sharing","author":"Rainie","key":"10.1016\/j.chb.2019.106227_bib39"},{"issue":"5","key":"10.1016\/j.chb.2019.106227_bib40","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1016\/j.jretconser.2014.02.011","article-title":"Technology acceptance modeling of augmented reality at the point of sale: Can surveys be replaced by an analysis of online reviews?","volume":"21","author":"Rese","year":"2014","journal-title":"Journal of Retailing and Consumer Services"},{"year":"2003","series-title":"Acceptability of transport pricing strategies: An introduction","key":"10.1016\/j.chb.2019.106227_bib41"},{"year":"1991","series-title":"Human factors for informatics usability","author":"Shackel","key":"10.1016\/j.chb.2019.106227_bib42"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib43","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1037\/0022-3514.80.2.325","article-title":"What is satisfying about satisfying events? Testing 10 candidate psychological needs","volume":"80","author":"Sheldon","year":"2001","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"10.1016\/j.chb.2019.106227_bib44","doi-asserted-by":"crossref","first-page":"e49","DOI":"10.2196\/jmir.5069","article-title":"Electronic health record patient portal adoption by health care consumers: An acceptance model and survey","volume":"18","author":"Tavares","year":"2016","journal-title":"Journal of Medical Internet Research"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib45","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1287\/isre.1090.0260","article-title":"The effect of online privacy information on purchasing behavior: An experimental study","volume":"22","author":"Tsai","year":"2011","journal-title":"Information Systems Research"},{"issue":"2","key":"10.1016\/j.chb.2019.106227_bib46","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","article-title":"Technology acceptance model 3 and a research agenda on interventions","volume":"39","author":"Venkatesh","year":"2008","journal-title":"Decision Sciences"},{"issue":"3","key":"10.1016\/j.chb.2019.106227_bib47","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib48","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology","volume":"36","author":"Venkatesh","year":"2012","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.chb.2019.106227_bib49","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin","year":"1968","journal-title":"Washington and Lee Law Review"},{"key":"10.1016\/j.chb.2019.106227_bib50","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.dss.2017.12.003","article-title":"The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns","volume":"106","author":"Wottrich","year":"2018","journal-title":"Decision Support Systems"},{"issue":"6","key":"10.1016\/j.chb.2019.106227_bib51","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1016\/j.ijhcs.2005.03.003","article-title":"An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study","volume":"62","author":"Wu","year":"2005","journal-title":"International Journal of Human-Computer Studies"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563219304467?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563219304467?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T10:29:34Z","timestamp":1581330574000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563219304467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":51,"alternative-id":["S0747563219304467"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2019.106227","relation":{},"ISSN":["0747-5632"],"issn-type":[{"type":"print","value":"0747-5632"}],"subject":[],"published":{"date-parts":[[2020,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"How Acceptable Is This? How User Experience Factors Can Broaden our Understanding of The Acceptance of Privacy Trade-offs","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2019.106227","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"106227"}}