{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T17:11:47Z","timestamp":1726333907909},"reference-count":20,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T00:00:00Z","timestamp":1444348800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"name":"US National Science Foundation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1111\/isj.12092","type":"journal-article","created":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T12:11:20Z","timestamp":1444392680000},"page":"573-578","source":"Crossref","is-referenced-by-count":40,"title":["The role of information systems research in shaping the future of information privacy"],"prefix":"10.1111","volume":"25","author":[{"given":"France","family":"Belanger","sequence":"first","affiliation":[{"name":"Department of Accounting and Information Systems, Pamplin College of Business Virginia Tech University 880 West Campus Dr., Suite 3007 Blacksburg VA 24061\u20100101 USA"}]},{"given":"Heng","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology The Pennsylvania State University University Park PA 16803 USA"}]}],"member":"311","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00371"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_2_6_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00402.x"},{"key":"e_1_2_6_6_1","doi-asserted-by":"crossref","DOI":"10.2307\/41703475","article-title":"On the Use of neuropyhsiological tools in IS research: developing a research agenda for neuroIS","volume":"36","author":"Dimoka A.","year":"2012","journal-title":"MIS Quarterly"},{"key":"e_1_2_6_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0284"},{"key":"e_1_2_6_8_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.1"},{"key":"e_1_2_6_9_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.347.6221.490"},{"key":"e_1_2_6_10_1","unstructured":"European_Commission. (2015)Protection of personal data.http:\/\/ec.europa.eu\/justice\/data\u2010protection\/(accessed on Sept 29 2015)."},{"key":"e_1_2_6_11_1","article-title":"Company information privacy orientation: a conceptual framework","volume":"26","author":"Greenaway K.E.","year":"2015","journal-title":"Information Systems Journal"},{"key":"e_1_2_6_12_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300402"},{"key":"e_1_2_6_13_1","article-title":"Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus","volume":"26","author":"Kehr F.","year":"2015","journal-title":"Information Systems Journal"},{"key":"e_1_2_6_14_1","article-title":"The role of mobile\u2010computing self\u2010efficacy in consumer information disclosure","volume":"26","author":"Keith M.","year":"2015","journal-title":"Information Systems Journal"},{"key":"e_1_2_6_15_1","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum H.","year":"2010"},{"key":"e_1_2_6_16_1","doi-asserted-by":"crossref","first-page":"i","DOI":"10.17705\/1jais.00377","article-title":"Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement","volume":"15","author":"Riedl R.","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"e_1_2_6_18_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00374"},{"key":"e_1_2_6_19_1","unstructured":"White House. (2014a)Big Data: seizing opportunities preserving values. Available at:http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/big_data_privacy_report_may_1_2014.pdf(accessed on Sept 29 2015)."},{"key":"e_1_2_6_20_1","unstructured":"White House. (2014b)Big Data and privacy: a technological perspective. Available at:http:\/\/www.whitehouse.gov\/sites\/default\/files\/microsites\/ostp\/PCAST\/pcast_big_data_and_privacy_\u2010_may_2014.pdf(accessed on Sept 29 2015)."},{"key":"e_1_2_6_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:54:56Z","timestamp":1694501696000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,9]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["10.1111\/isj.12092"],"URL":"https:\/\/doi.org\/10.1111\/isj.12092","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,9]]}}}