{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:59:06Z","timestamp":1732035546019},"reference-count":101,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T00:00:00Z","timestamp":1426636800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"name":"Swiss insurance company"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,11]]},"abstract":"Abstract<\/jats:title>Existing research on information privacy has mostly relied on the privacy calculus model, which views privacy\u2010related decision\u2010making as a rational process where individuals weigh the anticipated risks of disclosing personal data against the potential benefits. In this research, we develop an extension to the privacy calculus model, arguing that the situation\u2010specific assessment of risks and benefits is bounded by (1) pre\u2010existing attitudes or dispositions, such as general privacy concerns or general institutional trust, and (2) limited cognitive resources and heuristic thinking. An experimental study, employing two samples from the USA and Switzerland, examined consumer responses to a new smartphone application that collects driving behavior data and provided converging support for these predictions. Specifically, the results revealed that a situation\u2010specific assessment of risks and benefits fully mediates the effect of dispositional factors on information disclosure. In addition, the results showed that privacy assessment is influenced by momentary affective states, indicating that consumers underestimate the risks of information disclosure when confronted with a user interface that elicits positive affect.<\/jats:p>","DOI":"10.1111\/isj.12062","type":"journal-article","created":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T16:23:00Z","timestamp":1426695780000},"page":"607-635","source":"Crossref","is-referenced-by-count":260,"title":["Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus"],"prefix":"10.1111","volume":"25","author":[{"given":"Flavius","family":"Kehr","sequence":"first","affiliation":[{"name":"Institute of Technology Management University of St. Gallen St. Gallen Switzerland"}]},{"given":"Tobias","family":"Kowatsch","sequence":"additional","affiliation":[{"name":"Institute of Technology Management University of St. Gallen St. Gallen Switzerland"}]},{"given":"Daniel","family":"Wentzel","sequence":"additional","affiliation":[{"name":"Chair of Marketing, TIME Research Area RWTH Aachen University Aachen Germany"}]},{"given":"Elgar","family":"Fleisch","sequence":"additional","affiliation":[{"name":"Institute of Technology Management University of St. Gallen St. Gallen Switzerland"},{"name":"Department of Management, Technology and Economics ETH Zurich Zurich Switzerland"}]}],"member":"311","published-online":{"date-parts":[[2015,3,18]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"crossref","unstructured":"Acquisti A.(2004)Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the 5th ACM conference on Electronic Commerce New York USA.","DOI":"10.1145\/988772.988777"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_2_10_5_1","unstructured":"Acquisti A. John L. &Loewenstein G.(2009)What is privacy worth?Paper presented at the Twenty First Workshop on Information Systems and Economics (WISE) Phoenix AZ."},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10024"},{"key":"e_1_2_10_7_1","volume-title":"From Intentions to Actions: A Theory of Planned Behavior","author":"Ajzen I.","year":"1985"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167204264079"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1994.tb00080.x"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0335"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148715"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.105.3.456"},{"key":"e_1_2_10_16_1","first-page":"65","volume-title":"Social Measurement: Current Issues","author":"Carmines E.G.","year":"1981"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/217278.217285"},{"key":"e_1_2_10_18_1","volume-title":"Handbook of Emotion Elicitation and Assessment","author":"Coan J.A.","year":"2007"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00402.x"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00067"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650322"},{"key":"e_1_2_10_23_1","volume-title":"Descartes' Error: Emotion, Rationality and the Human Brain","author":"Damasio A.R.","year":"1994"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0801_1"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"e_1_2_10_28_1","first-page":"61","article-title":"Information privacy and correlates: an empirical attempt to bridge and distinguish privacy\u2010related concepts","volume":"22","author":"Dinev T.","year":"2012","journal-title":"European Journal of Information Systems"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.49.8.709"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/13669870500166930"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0771(200001\/03)13:1<1::AID-BDM333>3.0.CO;2-S"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00143739"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-137-07946-6"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9798-7"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.00407"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044042"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-120709-145346"},{"key":"e_1_2_10_39_1","unstructured":"Grossklags J.&Acquisti A.C.(2007)When 25 cents is too much: an experiment on willingness\u2010to\u2010sell and willingness\u2010to\u2010protect personal information. Paper presented at the Workshop on the Economics of Information Security New York NY."},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4870(01)00065-4"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.133.1.23"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.10.004"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183467"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148779"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015044207315"},{"key":"e_1_2_10_46_1","unstructured":"Keith M. Thompson S. Hale J.&Greer C.(2012)Examining the rationality of location data disclosure through mobile devices.Proceedings of the 33rd International Conference on Information Systems(ICIS 2012) Orlando."},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224379603300306"},{"key":"e_1_2_10_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"e_1_2_10_50_1","unstructured":"Knijnenburg B.P. Kobsa A.&Jin H.(2013)Counteracting the negative effect of form auto\u2010completion on the privacy calculus.Proceedings of the 34th International Conference on Information Systems(ICIS 2013) Milan Italy."},{"key":"e_1_2_10_51_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1320040111"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-012-0216-6"},{"key":"e_1_2_10_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0956-7976.2004.00679.x"},{"key":"e_1_2_10_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.017"},{"key":"e_1_2_10_55_1","doi-asserted-by":"crossref","unstructured":"Li T. Pavlou P.A.&Dos Santos G.L.(2013)What drives users' website registration? A randomized field experiment.Proceedings of the 34th International Conference on Information Systems(ICIS 2013) Milan Italy.","DOI":"10.2139\/ssrn.2369444"},{"key":"e_1_2_10_56_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.127.2.267"},{"key":"e_1_2_10_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044045"},{"key":"e_1_2_10_58_1","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.7.1.83"},{"key":"e_1_2_10_59_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_10_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290108168"},{"key":"e_1_2_10_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094670511424924"},{"key":"e_1_2_10_62_1","unstructured":"Muth\u00e9n L.K.&Muth\u00e9n B.O.(2011) MPlus (Version 6.12)."},{"key":"e_1_2_10_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.007"},{"key":"e_1_2_10_64_1","doi-asserted-by":"publisher","DOI":"10.1097\/00005053-199408000-00008"},{"key":"e_1_2_10_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_2_10_66_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2051044"},{"key":"e_1_2_10_67_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0028279"},{"key":"e_1_2_10_68_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409969"},{"key":"e_1_2_10_69_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148720"},{"key":"e_1_2_10_70_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"e_1_2_10_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2012.735185"},{"key":"e_1_2_10_72_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_10_73_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0963-7214.2004.00275.x"},{"key":"e_1_2_10_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(02)00345-4"},{"key":"e_1_2_10_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02296192"},{"key":"e_1_2_10_76_1","first-page":"289","volume-title":"Handbook of Theories of Social Psychology","author":"Schwarz N.","year":"2011"},{"key":"e_1_2_10_77_1","doi-asserted-by":"publisher","DOI":"10.2307\/249590"},{"key":"e_1_2_10_78_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.203034"},{"key":"e_1_2_10_79_1","doi-asserted-by":"publisher","DOI":"10.2307\/1884852"},{"key":"e_1_2_10_80_1","first-page":"493","article-title":"Rational decision making in business organizations","volume":"69","author":"Simon H.A.","year":"1979","journal-title":"The American Economic Review"},{"key":"e_1_2_10_81_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0272-4332.2004.00433.x"},{"key":"e_1_2_10_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.04.006"},{"key":"e_1_2_10_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"e_1_2_10_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2009.09.002"},{"key":"e_1_2_10_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2012.672658"},{"key":"e_1_2_10_86_1","doi-asserted-by":"crossref","first-page":"636","DOI":"10.17705\/1jais.00304","article-title":"Morality, ethics, and reflection: a categorization of normative IS research","volume":"13","author":"Stahl B.C.","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_10_87_1","doi-asserted-by":"publisher","DOI":"10.1086\/209528"},{"key":"e_1_2_10_88_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2008.00088.x"},{"key":"e_1_2_10_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.05.017"},{"key":"e_1_2_10_90_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_2_10_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.686740"},{"key":"e_1_2_10_92_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00092"},{"key":"e_1_2_10_93_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6494.696173"},{"key":"e_1_2_10_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2013.01.003"},{"key":"e_1_2_10_95_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.1996.00105.x"},{"key":"e_1_2_10_96_1","unstructured":"Wilson D.&Valacich J.(2012)Unpacking the privacy paradox: irrational decision\u2010making within the privacy calculus.Proceedings of the 33rd International Conference on Information Systems(ICIS 2012) Orlando."},{"key":"e_1_2_10_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-006-4147-1"},{"key":"e_1_2_10_98_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"e_1_2_10_99_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"e_1_2_10_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.017"},{"key":"e_1_2_10_101_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.35.2.151"},{"key":"e_1_2_10_102_1","first-page":"45","volume-title":"Advances in Designing Information and Organizations with a Positive Lens (Advances in Appreciative Inquiry, Volume 2)","author":"Zhang P.","year":"2008"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:54:13Z","timestamp":1694501653000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,18]]},"references-count":101,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["10.1111\/isj.12062"],"URL":"https:\/\/doi.org\/10.1111\/isj.12062","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,18]]}}}