{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:01:14Z","timestamp":1743012074331},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Commerce Research and Applications"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1016\/j.elerap.2018.11.003","type":"journal-article","created":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T07:21:37Z","timestamp":1543044097000},"page":"57-68","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":47,"special_numbering":"C","title":["Antecedents and outcomes of information privacy concerns: Role of subjective norm and social presence"],"prefix":"10.1016","volume":"32","author":[{"given":"Kapil","family":"Kaushik","sequence":"first","affiliation":[]},{"given":"Nikunj","family":"Kumar Jain","sequence":"additional","affiliation":[]},{"given":"Alok","family":"Kumar Singh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.elerap.2018.11.003_b0005","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organiz. Behav. Human Decis. Process."},{"issue":"5","key":"10.1016\/j.elerap.2018.11.003_b0010","first-page":"707","article-title":"Consumer attitudes towards online shopping: the effects of trust, perceived benefits, and perceived web quality","volume":"25","author":"Al-Debei","year":"2015","journal-title":"Int. Res."},{"key":"10.1016\/j.elerap.2018.11.003_b0015","doi-asserted-by":"crossref","DOI":"10.2307\/41409971","article-title":"Privacy in the digital age: a review of information privacy research in information systems","author":"B\u00e9langer","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.elerap.2018.11.003_b0020","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/293411.293461","article-title":"TRUSTe: an online privacy seal program","volume":"42","author":"Benassi","year":"1999","journal-title":"Commun. ACM"},{"key":"10.1016\/j.elerap.2018.11.003_b0025","doi-asserted-by":"crossref","DOI":"10.2307\/25148669","article-title":"Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate","author":"Bock","year":"2005","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.elerap.2018.11.003_b0030","doi-asserted-by":"crossref","DOI":"10.1023\/A:1005721401993","article-title":"Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior","author":"Chang","year":"1998","journal-title":"J. Busin. Ethics"},{"key":"10.1016\/j.elerap.2018.11.003_b0035","doi-asserted-by":"crossref","unstructured":"Chin, W., 2010. How to write up and report PLS analyses.","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"10.1016\/j.elerap.2018.11.003_b0040","doi-asserted-by":"crossref","DOI":"10.1002\/dir.4000090204","article-title":"Consumer awareness of name removal procedures: implications for direct marketing","author":"Culnan","year":"1995","journal-title":"J. Direct Market."},{"key":"10.1016\/j.elerap.2018.11.003_b0045","doi-asserted-by":"crossref","DOI":"10.1080\/00224545.1985.9712029","article-title":"Intimacy of self-disclosure and response processes as factors affecting the development of interpersonal relationships","author":"Falk","year":"1985","journal-title":"J. Soc. Psychol."},{"issue":"3","key":"10.1016\/j.elerap.2018.11.003_b0050","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1177\/002224378101800313","article-title":"Structural equation models with unobservable variables and measurement error: algebra and statistics","volume":"18","author":"Fornell","year":"1981","journal-title":"J. Market. Res."},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0055","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1093\/biomet\/61.1.101","article-title":"A predictive approach to the random effect model","volume":"61","author":"Geisser","year":"1974","journal-title":"Biometrika"},{"key":"10.1016\/j.elerap.2018.11.003_b0060","unstructured":"George, J., 2004. The theory of planned behavior and Internet purchasing. Internet Research. Retrieved from http:\/\/www.emeraldinsight.com\/journals.htm?articleid=1455229&show=abstract."},{"key":"10.1016\/j.elerap.2018.11.003_b0065","doi-asserted-by":"crossref","unstructured":"George, J. F., 2011. The theory of planned behavior and Internet purchasing. http:\/\/doi.org\/10.1108\/10662240410542634.","DOI":"10.1108\/10662240410542634"},{"key":"10.1016\/j.elerap.2018.11.003_b0070","series-title":"Multivariate data analysis","author":"Hair","year":"2006"},{"key":"10.1016\/j.elerap.2018.11.003_b0075","unstructured":"Hair, J., Hult, G., Ringle, C., Sarstedt, M., 2013. A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications. Retrieved from https:\/\/books.google.co.in\/books?hl=en&lr=&id=TjzABAAAQBAJ&oi=fnd&pg=PR1&dq=A+Primer+on+Partial+Least+Squares+Structural+Equation+Modeling&ots=hy0q4QOhlM&sig=wEpsnG0pym9VJ7q1wselLLMg5RA."},{"key":"10.1016\/j.elerap.2018.11.003_b0080","unstructured":"IAMAI (Internet and Mobile Association of India), 2015, \u201cIndia on the Go: Mobile Internet Vision 2017 \u2013 A Study by KPMG - IAMAI\u201d, Available at: https:\/\/ultra.news\/wp-content\/uploads\/2015\/07\/Report.pdf (accessed on July 7.07.17.)."},{"key":"10.1016\/j.elerap.2018.11.003_b0085","doi-asserted-by":"crossref","DOI":"10.2979\/esj.2002.1.3.5","article-title":"Para-social presence and communication capabilities of a web site: a theoretical perspective","author":"Kumar","year":"2002","journal-title":"E-Serv. J."},{"key":"10.1016\/j.elerap.2018.11.003_b0090","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.elerap.2016.10.005","article-title":"An extended online purchase intention model for middle-aged online users","volume":"20","author":"Law","year":"2016","journal-title":"Electron. Comm. Res. Appl."},{"key":"10.1016\/j.elerap.2018.11.003_b0095","doi-asserted-by":"crossref","DOI":"10.1057\/palgrave.jibs.8490304","article-title":"Cross-cultural examination of the Fishbein behavioral intentions model","author":"Lee","year":"1991","journal-title":"J. Int. Busin. Stud."},{"key":"10.1016\/j.elerap.2018.11.003_b0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.elerap.2010.11.005","article-title":"Intimacy, familiarity and continuance intention: an extended expectation\u2013confirmation model in web-based services","author":"Lee","year":"2011","journal-title":"Electron. Comm. Res. Appl."},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0105","first-page":"453","article-title":"Empirical studies on online information privacy concerns: literature review and an integrative framework","volume":"28","author":"Li","year":"2011","journal-title":"Commun. Assoc. Inform. Syst."},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0110","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: a critical review and an integrated framework","volume":"54","author":"Li","year":"2012","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.elerap.2018.11.003_b0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.elerap.2013.08.002","article-title":"A multi-level model of individual information privacy beliefs","author":"Li","year":"2014","journal-title":"Electron. Comm. Res. Appl."},{"key":"10.1016\/j.elerap.2018.11.003_b0120","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.dss.2013.09.018","article-title":"The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns","volume":"57","author":"Li","year":"2014","journal-title":"Decis. Support Syst."},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0125","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management","volume":"31","author":"Liang","year":"2007","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.elerap.2018.11.003_b0130","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.giq.2010.09.004","article-title":"Assessing citizen adoption of e-Government initiatives in Gambia: A validation of the technology acceptance model in information systems success","volume":"28","author":"Lin","year":"2011","journal-title":"Govern. Inform. Quarterly"},{"issue":"2","key":"10.1016\/j.elerap.2018.11.003_b9000","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.ijinfomgt.2013.12.010","article-title":"Digital natives in social virtual worlds: a multi-method study of gratifications and social influences in Habbo Hotel","volume":"34","author":"M\u00e4ntym\u00e4ki","year":"2014","journal-title":"Int. J. Inform. Manage."},{"key":"10.1016\/j.elerap.2018.11.003_b0140","doi-asserted-by":"crossref","DOI":"10.1287\/isre.2.3.173","article-title":"Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior","author":"Mathieson","year":"1991","journal-title":"Inform. Syst. Res."},{"issue":"7","key":"10.1016\/j.elerap.2018.11.003_b0145","doi-asserted-by":"crossref","first-page":"1539","DOI":"10.1016\/j.paid.2008.01.010","article-title":"Are acquiescent and extreme response styles related to low intelligence and education?","volume":"44","author":"Meisenberg","year":"2008","journal-title":"Person. Individ. Differ."},{"issue":"3","key":"10.1016\/j.elerap.2018.11.003_b0150","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1002\/ejsp.2420150303","article-title":"Methods of coping with social desirability bias: a review","volume":"15","author":"Nederhof","year":"1985","journal-title":"Eur. J. Soc. Psychol."},{"key":"10.1016\/j.elerap.2018.11.003_b0155","doi-asserted-by":"crossref","DOI":"10.1016\/S0378-7206(02)00101-5","article-title":"Quality and effectiveness in web-based customer support systems","author":"Negash","year":"2003","journal-title":"Inform. Manage."},{"key":"10.1016\/j.elerap.2018.11.003_b0160","series-title":"Psychometric Theory","author":"Nunnally","year":"1978"},{"issue":"4","key":"10.1016\/j.elerap.2018.11.003_b0165","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.giq.2010.10.007","article-title":"e-Government adoption model based on theory of planned behavior: empirical validation","volume":"28","author":"Ozkan","year":"2011","journal-title":"Govern. Inform. Quarterly"},{"issue":"4","key":"10.1016\/j.elerap.2018.11.003_b0170","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.jretconser.2014.03.011","article-title":"The role of social network websites in the consumer\u2013brand relationship","volume":"21","author":"Park","year":"2014","journal-title":"J. Retail. Consum. Serv."},{"issue":"4","key":"10.1016\/j.elerap.2018.11.003_b0175","doi-asserted-by":"crossref","first-page":"977","DOI":"10.2307\/41409969","article-title":"State of the information privacy literature: where are we now and where should we go","volume":"35","author":"Pavlou","year":"2011","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.elerap.2018.11.003_b0180","doi-asserted-by":"crossref","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective","author":"Pavlou","year":"2007","journal-title":"MIS Quarterly"},{"issue":"5","key":"10.1016\/j.elerap.2018.11.003_b0185","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"J. Appl. Psychol."},{"issue":"4","key":"10.1016\/j.elerap.2018.11.003_b0190","first-page":"531","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","author":"Podsakoff","year":"1986","journal-title":"J. Manage."},{"issue":"2","key":"10.1016\/j.elerap.2018.11.003_b0195","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1108\/17465660810890126","article-title":"A review of recent approaches for capturing heterogeneity in partial least squares path modelling","volume":"3","author":"Sarstedt","year":"2008","journal-title":"J. Modell. Manage."},{"key":"10.1016\/j.elerap.2018.11.003_b0200","unstructured":"Short, J., Williams, E., Christie, B., 1976. The Social Psychology of Telecommunications Wiley. New York. Retrieved from http:\/\/scholar.google.co.in\/scholar?q=The+Social+Psychology+of+Telecommunications%252C+Wiley&btnG=&hl=en&as_sdt=0%252C5#0."},{"issue":"4","key":"10.1016\/j.elerap.2018.11.003_b0205","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","author":"Smith","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.elerap.2018.11.003_b0210","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","article-title":"Cross-validatory choice and assessment of statistical predictions","volume":"36","author":"Stone","year":"1974","journal-title":"J. R. Statist. Soc."},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0215","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1006\/jnca.1999.0099","article-title":"On-line learning migration: from social learning theory to social presence theory in a CMC environment","volume":"23","author":"Tu","year":"2000","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"10.1016\/j.elerap.2018.11.003_b0220","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1096-7516(02)00134-3","article-title":"The relationship between social presence and online privacy","volume":"5","author":"Tu","year":"2002","journal-title":"Int. Higher Educ."},{"key":"10.1016\/j.elerap.2018.11.003_b0225","series-title":"Handbook of partial least squares: concepts, methods and applications","author":"Vinzi","year":"2010"},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0230","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.chb.2003.11.008","article-title":"An overview of online trust: Concepts, elements, and implications","volume":"21","author":"Wang","year":"2005","journal-title":"Comput. Human Behav."},{"issue":"1","key":"10.1016\/j.elerap.2018.11.003_b0135","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.ijinfomgt.2014.10.004","article-title":"Why do teens spend real money in virtual worlds? A consumption values and developmental psychology perspective on virtual consumption","volume":"35","author":"M\u00e4ntym\u00e4ki","year":"2015","journal-title":"Int. J. Inform. Manage."}],"container-title":["Electronic Commerce Research and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1567422318300814?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1567422318300814?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T18:44:22Z","timestamp":1720809862000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1567422318300814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":47,"alternative-id":["S1567422318300814"],"URL":"https:\/\/doi.org\/10.1016\/j.elerap.2018.11.003","relation":{},"ISSN":["1567-4223"],"issn-type":[{"value":"1567-4223","type":"print"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Antecedents and outcomes of information privacy concerns: Role of subjective norm and social presence","name":"articletitle","label":"Article Title"},{"value":"Electronic Commerce Research and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.elerap.2018.11.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}