{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:20:41Z","timestamp":1735582841733},"reference-count":127,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.2753\/mis0742-1222270406","type":"journal-article","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T01:08:33Z","timestamp":1303866513000},"page":"163-200","source":"Crossref","is-referenced-by-count":297,"title":["Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures"],"prefix":"10.1080","volume":"27","author":[{"given":"Paul Benjamin","family":"Lowry","sequence":"first","affiliation":[{"name":"a Marriott School of Management, Brigham Young University"}]},{"given":"Jinwei","family":"Cao","sequence":"additional","affiliation":[{"name":"b Lerner College of Business and Economics, University of Delaware"}]},{"given":"Andrea","family":"Everard","sequence":"additional","affiliation":[{"name":"b Lerner College of Business and Economics, University of Delaware"}]}],"member":"301","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"1","first-page":"489","volume-title":"Intellectual Teamwork: Social and Technological Foundations of Group Work","author":"M. Abel","year":"1990"},{"key":"2","first-page":"21","article-title":"Privacy in electronic commerce and the economics of immediate gratification","author":"A. Acquisti","year":"2004"},{"issue":"1","key":"3","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.22","article-title":"Privacy and rationality in individual decision making","volume":"3","author":"A. Acquisti","year":"2005","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1037\/h0034440","article-title":"Attitudinal and normative variables as predictors of specific behavior","volume":"27","author":"I. Ajzen","year":"1973","journal-title":"Journal of Personality and Social Psychology"},{"key":"5","volume-title":"Social Penetration: The Development of Interpersonal Relationships","author":"I. Altman","year":"1973"},{"key":"6","first-page":"107","volume-title":"Advances in Experimental Social Psychology","volume":"14","author":"I. Altman","year":"1981"},{"issue":"3","key":"7","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1089\/cpb.2006.9938","article-title":"Degree and reciprocity of self-disclosure in online forums","volume":"10","author":"A. Barak","year":"2007","journal-title":"CyberPsychology & Behavior"},{"issue":"7","key":"8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1070838.1070860","article-title":"Instant messaging and the future of language","volume":"48","author":"N. Baron","year":"2005","journal-title":"Communications of the ACM"},{"issue":"5","key":"9","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/01972240490507956","article-title":"International differences in information privacy concerns: A global survey of consumers","volume":"20","author":"S. Bellman","year":"2004","journal-title":"Information Society"},{"issue":"4","key":"10","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","article-title":"Privacy in e-commerce: Stated preferences vs. actual behavior","volume":"48","author":"B. Berendt","year":"2005","journal-title":"Communications of the ACM"},{"issue":"2","key":"11","first-page":"27","article-title":"User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy","volume":"11","author":"J. Cao","year":"2008","journal-title":"Journal of Global Information Technology Management"},{"key":"12","first-page":"3123","article-title":"International ethnographic observation of social networking sites","author":"C. Chapman","year":"2008"},{"issue":"1","key":"13","first-page":"387","article-title":"Media selection to meet communications contexts: Comparing e-mail and instant messaging in an undergraduate population","volume":"14","author":"K. Chen","year":"2004","journal-title":"Communications of the AIS"},{"key":"14","unstructured":"China instant messaging research report. iResearch Consulting Group, Beijing, August 2, 2006."},{"issue":"2","key":"15","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/1540-4560.00067","article-title":"Consumer privacy: Balancing economic and justice considerations","volume":"59","author":"M. Culnan","year":"2003","journal-title":"Journal of Social Issues"},{"issue":"2","key":"16","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1287\/isre.1080.0175","article-title":"Awareness displays and social motivation for coordinating communication","volume":"19","author":"L. Dabbish","year":"2008","journal-title":"Information Systems Research"},{"issue":"8","key":"17","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: A comparison of two theoretical models","volume":"35","author":"F. Davis","year":"1989","journal-title":"Management Science"},{"issue":"3","key":"18","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1111\/j.1540-4560.1977.tb01885.x","article-title":"Privacy and self-disclosure in social relationships","volume":"33","author":"V. Derlega","year":"1977","journal-title":"Journal of Social Issues"},{"key":"19","volume-title":"Self-Disclosure","author":"V. Derlega","year":"1993"},{"issue":"2","key":"20","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1089\/cpb.2005.8.114","article-title":"Formation of and adherence to a selfdisclosure norm in an online chat","volume":"8","author":"B. Dietz-Uhler","year":"2005","journal-title":"CyberPsychology & Behavior"},{"issue":"1","key":"21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"T. Dinev","year":"2006","journal-title":"Information Systems Research"},{"issue":"2","key":"22","doi-asserted-by":"crossref","first-page":"7","DOI":"10.2753\/JEC1086-4415100201","article-title":"Internet privacy concerns and social awareness as determinants of intention to transact","volume":"10","author":"T. Dinev","year":"2006","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"23","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2979\/ESJ.2006.4.3.25","article-title":"Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use","volume":"4","author":"T. Dinev","year":"2006","journal-title":"e-Service Journal"},{"issue":"3","key":"24","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jsis.2007.09.002","article-title":"Internet privacy concerns and beliefs about government surveillance: An empirical investigation","volume":"17","author":"T. Dinev","year":"2008","journal-title":"Journal of Strategic Information Systems"},{"issue":"4","key":"25","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","article-title":"Privacy calculus model in e-commerce\u2014A study of Italy and the United States","volume":"15","author":"T. Dinev","year":"2006","journal-title":"European Journal of Information Systems"},{"key":"26","first-page":"127","volume-title":"Advances in International Comparative Management","volume":"3","author":"P. Dorfman","year":"1988"},{"key":"27","first-page":"541","article-title":"Portholes: Supporting awareness in a distributed work group","author":"P. Dourish","year":"1992"},{"issue":"2","key":"28","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1207\/s15327744joce1602_2","article-title":"Information privacy in the service sector: An exploratory study of health care and banking professionals","volume":"16","author":"J. Earp","year":"2006","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"4","key":"29","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","article-title":"The benefits of Facebook \"friends\": Social capital and college students' use of online social network sites","volume":"12","author":"N. Ellison","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"30","first-page":"993","article-title":"Global privacy in flux: Illuminating privacy across cultures in China and the U. S","volume":"2","author":"K. Farrall","year":"2008","journal-title":"International Journal of Communication"},{"issue":"1","key":"31","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/151233.151237","article-title":"Evaluating video as a technology for informal communication","volume":"36","author":"R. Fish","year":"1993","journal-title":"Communications of the ACM"},{"key":"32","first-page":"477","volume-title":"Readings in Attitude Theory and Measurement","author":"M. Fishbein","year":"1967"},{"key":"33","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"M. Fishbein","year":"1975"},{"issue":"1","key":"34","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/07421222.2002.11045717","article-title":"Implementation team responsiveness and user evaluation of customer relationship management: A quasi-experimental design study of social exchange theory","volume":"19","author":"D. Gefen","year":"2002","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"35","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1037\/0022-3514.63.1.75","article-title":"Emotional disclosure about traumas and its relation to health: Effects of previous disclosure and trauma severity","volume":"63","author":"M. Greenberg","year":"1992","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"36","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1080\/10507050801978240","article-title":"Differences in consumer-generated media adoption and use: A cross-national perspective","volume":"17","author":"U. Gretzel","year":"2008","journal-title":"Journal of Hospitality Marketing & Management"},{"key":"37","first-page":"21","article-title":"Instant messaging in teen life","author":"R. Grinter","year":"2002"},{"issue":"4","key":"38","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/TPC.2008.2007869","article-title":"An exploratory investigation into instant messaging preferences in two distinct cultures","volume":"51","author":"Z. Guo","year":"2008","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"3-4","key":"39","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1023\/A:1021271517844","article-title":"A descriptive framework of workspace awareness for real-time groupware","volume":"11","author":"C. Gutwin","year":"2002","journal-title":"Computer Supported Cooperative Work"},{"issue":"2","key":"40","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240202","article-title":"Overcoming online information privacy concerns: An information-processing theory approach","volume":"24","author":"I.-H. Hann","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"41","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/1097198X.2004.10856382","article-title":"The influence of national culture on the level and outcome of IS development decisions","volume":"7","author":"J. Heales","year":"2004","journal-title":"Journal of Global Information Technology Management"},{"issue":"3","key":"42","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1177\/002194360304000302","article-title":"International advertising in Western Europe: Should differences in uncertainty avoidance be considered when advertising in Belgium, France, the Netherlands, and Spain?","volume":"40","author":"H. Hoeken","year":"2003","journal-title":"Journal of Business Communication"},{"key":"43","volume-title":"Culture's Consequences: International Differences in Work-Related Values","author":"G. Hofstede","year":"1980"},{"key":"44","volume-title":"Culture's Consequences: International Differences in Work-Related Values","author":"G. Hofstede","year":"1984"},{"key":"45","volume-title":"Cultures and Organizations: Software of the Mind","author":"G. Hofstede","year":"1991"},{"issue":"4","key":"46","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1086\/266350","article-title":"The influence of source credibility on communication effectiveness","volume":"15","author":"C. Hovland","year":"1951-52","journal-title":"Public Opinion Quarterly"},{"issue":"1","key":"47","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.im.2007.11.001","article-title":"Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation","volume":"45","author":"C.-L. Hsu","year":"2008","journal-title":"Information & Management"},{"key":"48","first-page":"248","article-title":"Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support","author":"S. Hudson","year":"1996"},{"key":"49","unstructured":"Instant messaging market, 2007-2011. Radicati Group, Palo Alto, CA, August 2007."},{"key":"50","doi-asserted-by":"crossref","DOI":"10.1145\/587078.587081","article-title":"The character, functions, and styles of instant messaging in the workplace","author":"E. Isaacs","year":"2002"},{"issue":"1","key":"51","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1080\/07421222.2001.11045673","article-title":"Exploring perceptions of organizational ownership of information and expertise","volume":"18","author":"S. Jarvenpaa","year":"2001","journal-title":"Journal of Management Information Systems"},{"key":"52","volume-title":"Self-Disclosure: An Experimental Analysis of the Transparent Self","author":"S. Jourard","year":"1971"},{"issue":"1","key":"53","doi-asserted-by":"crossref","first-page":"113","DOI":"10.2307\/25148670","article-title":"Contributing knowledge to electronic knowledge repositories: An empirical investigation","volume":"29","author":"A. Kankanhalli","year":"2005","journal-title":"MIS Quarterly"},{"key":"54","first-page":"525","article-title":"Cultural differences in the use of instant messaging in Asia and North America","author":"S. Kayan","year":"2006"},{"issue":"4","key":"55","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240401","article-title":"Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study","volume":"24","author":"D. Kim","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"38","key":"56","first-page":"657","article-title":"Global diffusion of the Internet XV: Web 2.0 technologies, principles, and applications: A conceptual framework from technology push and demand pull perspective","volume":"24","author":"D. Kim","year":"2009","journal-title":"Communications of the AIS"},{"issue":"1","key":"57","first-page":"85","article-title":"Group awareness and self-presentation in computer-supported information exchange","volume":"3","author":"J. Kimmerle","year":"2008","journal-title":"International Journal of Computer-Supported Information Exchange"},{"issue":"1","key":"58","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1089\/cpb.2008.016","article-title":"Can blogging enhance subjective well-being through self-disclosure?","volume":"12","author":"H.-C. Ko","year":"2009","journal-title":"CyberPsychology & Behavior"},{"issue":"5","key":"59","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/506218.506249","article-title":"Personalized hypermedia and international privacy","volume":"45","author":"A. Kobsa","year":"2002","journal-title":"Communications of the ACM"},{"issue":"6","key":"60","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/S0378-7206(02)00068-X","article-title":"Beliefs and attitudes affecting intentions to share information in an organizational setting","volume":"40","author":"K. Kolekofski","year":"2003","journal-title":"Information & Management"},{"issue":"5","key":"61","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0378-7206(00)00074-4","article-title":"The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success","volume":"38","author":"J. Lee","year":"2001","journal-title":"Information & Management"},{"issue":"3","key":"62","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0378-7206(01)00143-4","article-title":"Why do people use information technology? A critical review of the technology acceptance model","volume":"40","author":"P. Legris","year":"2003","journal-title":"Information & Management"},{"issue":"1","key":"63","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.im.2003.12.008","article-title":"What influences IT ethical behavior intentions\u2014Planned behavior, reasoned action, perceived importance, or individual characteristics?","volume":"42","author":"L. Leonard","year":"2004","journal-title":"Information & Management"},{"key":"64","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1111\/j.1467-6494.1936.tb02034.x","article-title":"Some social-psychological differences between the United States and Germany","volume":"4","author":"K. Lewin","year":"1936","journal-title":"Character and Personality"},{"issue":"4","key":"65","doi-asserted-by":"crossref","first-page":"102","DOI":"10.17705\/1jais.00066","article-title":"Understanding individual adoption of instant messaging: An empirical investigation","volume":"6","author":"D. Li","year":"2005","journal-title":"Journal of the Association for Information Systems"},{"issue":"6","key":"66","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1057\/palgrave.jibs.8400104","article-title":"Is ecommerce boundary-less? Effects of individualism-collectivism and uncertainty avoidance on Internet shopping","volume":"35","author":"K. Lim","year":"2004","journal-title":"Journal of International Business Studies"},{"issue":"2","key":"67","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.im.2004.01.003","article-title":"Beyond concern\u2014A privacy-trust-behavioral intention model of electronic commerce","volume":"42","author":"C. Liu","year":"2005","journal-title":"Information & Management"},{"issue":"4","key":"68","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/TPC.2003.819640","article-title":"Using Internet-based, distributed collaborative writing tools to improve coordination and group awareness in writing teams","volume":"46","author":"P. Lowry","year":"2003","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"3","key":"69","doi-asserted-by":"crossref","first-page":"170","DOI":"10.17705\/1jais.00189","article-title":"Toward building self-sustaining groups in PCR-based tasks through implicit coordination: The case of heuristic evaluation","volume":"10","author":"P. Lowry","year":"2009","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"70","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1109\/TPC.2005.859728","article-title":"The impact of process structure on novice, Internet-based, asynchronous-distributed collaborative writing teams","volume":"48","author":"P. Lowry","year":"2005","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"3","key":"71","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1111\/j.1365-2575.2009.00334.x","article-title":"Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups","volume":"20","author":"P. Lowry","year":"2010","journal-title":"Information Systems Journal"},{"issue":"4","key":"72","doi-asserted-by":"crossref","first-page":"199","DOI":"10.2753\/MIS0742-1222240408","article-title":"Explaining and predicting the impact of branding alliances and Web site quality on initial consumer trust of e-commerce Web sites","volume":"24","author":"P. Lowry","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"73","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"N. Malhotra","year":"2004","journal-title":"Information Systems Research"},{"issue":"1","key":"74","doi-asserted-by":"crossref","first-page":"4","DOI":"10.2307\/248873","article-title":"Four ethical issues of the information age","volume":"10","author":"R. Mason","year":"1986","journal-title":"MIS Quarterly"},{"issue":"1","key":"75","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1002\/(SICI)1522-7138(199624)10:1<34::AID-DIR3>3.0.CO;2-0","article-title":"A comparative analysis of Japanese and U. S. attitudes toward direct marketing","volume":"10","author":"M. Maynard","year":"1996","journal-title":"Journal of Direct Marketing"},{"issue":"3","key":"76","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","article-title":"Developing and validating trust measures for e-commerce: An integrative typology","volume":"13","author":"D. McKnight","year":"2002","journal-title":"Information Systems Research"},{"issue":"1","key":"77","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1287\/orsc.11.1.35.12567","article-title":"Information privacy: Corporate management and national regulation","volume":"11","author":"S. Milberg","year":"2000","journal-title":"Organization Science"},{"issue":"12","key":"78","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/219663.219683","article-title":"Values, personal information privacy, and regulatory approaches","volume":"38","author":"S. Milberg","year":"1995","journal-title":"Communications of the ACM"},{"issue":"1","key":"79","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/25148722","article-title":"Ethical decision making in software piracy: Initial development and test of a four-component model","volume":"30","author":"T. Moores","year":"2006","journal-title":"MIS Quarterly"},{"key":"80","first-page":"50","article-title":"Introducing chat into business organizations: Toward an instant messaging maturity model","author":"M. Muller","year":"2003"},{"issue":"4","key":"81","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2753\/JOA0091-3367380405","article-title":"Consumer privacy concerns and preference for degree of regulatory control: A study of mobile advertising in Japan","volume":"38","author":"S. Okazaki","year":"2009","journal-title":"Journal of Advertising"},{"issue":"37","key":"82","first-page":"762","article-title":"Social computing: An overview","volume":"19","author":"M. Parameswaran","year":"2007","journal-title":"Communications of the AIS"},{"key":"83","unstructured":"Patil, S., and Kobsa, A. The challenges in preserving privacy in awareness systems. Technical report no. UCI-ISR-03-3, Institute of Software Research, University of California, Irvine, April 2003 (available at www.isr.uci.edu\/tech_reports\/UCI-ISR-03-3.pdf<\/a>"},{"key":"84","first-page":"1","article-title":"Privacy in collaboration: Managing impression","author":"S. Patil","year":"2005"},{"issue":"4","key":"85","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1111\/j.1460-2466.1973.tb00958.x","article-title":"Self-disclosing communication","volume":"23","author":"W. Pearce","year":"1973","journal-title":"Journal of Communication"},{"key":"86","first-page":"211","volume-title":"Advances in Experimental Social Psychology","volume":"22","author":"J. Pennebaker","year":"1989"},{"issue":"4","key":"87","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1111\/j.1468-2885.1991.tb00023.x","article-title":"Communication boundary management: A theoretical model of managing disclosure of private information between marital couples","volume":"1","author":"S. Petronio","year":"1991","journal-title":"Communication Theory"},{"key":"88","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"S. Petronio","year":"2002"},{"issue":"3","key":"89","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1002\/1097-4679(198605)42:3<499::AID-JCLP2270420317>3.0.CO;2-I","article-title":"Ramifications of revealing private information: A gender gap","volume":"42","author":"S. Petronio","year":"1986","journal-title":"Journal of Clinical Psychology"},{"issue":"3","key":"90","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1080\/03637758409390200","article-title":"Prerequisite conditions for self-disclosing: A gender issue","volume":"51","author":"S. Petronio","year":"1984","journal-title":"Communication Monographs"},{"issue":"6","key":"91","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1177\/009365098025006001","article-title":"(Mis)communicating across boundaries: Interpersonal and intergroup considerations","volume":"25","author":"S. Petronio","year":"1998","journal-title":"Communication Research"},{"issue":"3","key":"92","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/00909889609365450","article-title":"Disclosure of sexual abuse by children and adolescents","volume":"24","author":"S. Petronio","year":"1996","journal-title":"Journal of Applied Communication"},{"issue":"4","key":"93","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","article-title":"Specifying formative constructs in information systems research","volume":"31","author":"S. Petter","year":"2007","journal-title":"MIS Quarterly"},{"issue":"2","key":"94","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1057\/ejis.2010.15","article-title":"The culture-influenced online community self-disclosure model: The case of working professionals in France and the UK who use online communities","volume":"19","author":"C. Posey","year":"2010","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"95","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.im.2005.08.002","article-title":"An examination of the concern for information privacy in the New Zealand regulatory context","volume":"43","author":"E. Rose","year":"2006","journal-title":"Information & Management"},{"key":"96","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/BFb0027107","volume-title":"Lecture Notes on Computer Science: Coordination Technology for Collaborative Applications","volume":"1364","author":"J. Schlichter","year":"1997"},{"key":"97","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-49247-X_6","volume-title":"Lecture Notes on Computer Science: Community Computing and Support Systems","volume":"1519","author":"J. Schlichter","year":"1998"},{"issue":"3","key":"98","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1080\/00107530.2005.10747261","article-title":"Self-disclosure: Seeking connection and protection","volume":"41","author":"L. Sherby","year":"2005","journal-title":"Contemporary Psychoanalysis"},{"issue":"1","key":"99","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1162\/pres.1992.1.1.120","article-title":"Musings on telepresence and virtual presence","volume":"1","author":"T. Sheridan","year":"1992","journal-title":"Presence: Teleoperators and Virtual Environments"},{"issue":"1","key":"100","first-page":"241","article-title":"Further musings on the psychophysics of presence","volume":"5","author":"T. Sheridan","year":"1994","journal-title":"Presence: Teleoperators and Virtual Environments"},{"issue":"3","key":"101","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0378-7206(03)00079-X","article-title":"An empirical study on predicting user acceptance of e-shopping on the Web","volume":"41","author":"H.-P. Shih","year":"2004","journal-title":"Information & Management"},{"issue":"2","key":"102","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.im.2006.11.004","article-title":"An empirical investigation of socio-cultural factors of information sharing in China","volume":"44","author":"S. Shin","year":"2007","journal-title":"Information & Management"},{"issue":"1","key":"103","first-page":"409","article-title":"Developments in practice XXXI: Social computing: How should it be managed?","volume":"23","author":"H. Smith","year":"2008","journal-title":"Communications of the AIS"},{"issue":"2","key":"104","doi-asserted-by":"crossref","first-page":"8","DOI":"10.2307\/41166073","article-title":"Information privacy and marketing: What the U. S. should (and shouldn't) learn from Europe","volume":"43","author":"H. Smith","year":"2001","journal-title":"California Management Review"},{"issue":"2","key":"105","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals' concerns about organizational practices","volume":"20","author":"H. Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"106","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users' information privacy-protective responses: A taxonomy and a nomological model","volume":"32","author":"J.-Y. Son","year":"2008","journal-title":"MIS Quarterly"},{"issue":"1","key":"107","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1080\/07421222.2003.11045839","article-title":"Effects of relational factors and channel climate on EDI usage in the customer-supplier relationship","volume":"22","author":"J.-Y. Son","year":"2005","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"108","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1111\/j.1365-2575.2007.00244.x","article-title":"Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams","volume":"18","author":"D. Staples","year":"2008","journal-title":"Information Systems Journal"},{"issue":"1","key":"109","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","author":"K. Stewart","year":"2002","journal-title":"Information Systems Research"},{"issue":"5","key":"110","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1089\/cpb.2006.9.552","article-title":"Using instant messaging for Internet-based interviews","volume":"9","author":"S. Stieger","year":"2006","journal-title":"CyberPsychology and Behavior"},{"key":"111","first-page":"23","article-title":"Supporting distributed groups with a montage of lightweight interactions","author":"J. Tang","year":"1994"},{"issue":"4","key":"112","doi-asserted-by":"crossref","first-page":"153","DOI":"10.2753\/MIS0742-1222240406","article-title":"Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor","volume":"24","author":"Z. Tang","year":"2008","journal-title":"Journal of Management Information Systems"},{"key":"113","volume-title":"The Social Psychology of Groups","author":"J. Thibaut","year":"1959"},{"issue":"1","key":"114","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/0147-1767(91)90072-O","article-title":"Intimacy expressions in three cultures: France, Japan, and the United States","volume":"15","author":"S. Ting-Toomey","year":"1991","journal-title":"International Journal of Intercultural Relations"},{"issue":"4","key":"115","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1108\/EUM0000000005808","article-title":"Privacy and security concerns as major barriers for e-commerce: A survey study","volume":"9","author":"G. Udo","year":"2001","journal-title":"Information Management and Computer Security"},{"issue":"3","key":"116","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1057\/palgrave.ejis.3000680","article-title":"Perceived critical mass and the adoption of a communication technology","volume":"16","author":"C. Van Slyke","year":"2007","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"117","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: Four longitudinal field studies","volume":"46","author":"V. Venkatesh","year":"2000","journal-title":"Management Science"},{"issue":"6","key":"118","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1016\/j.im.2003.08.011","article-title":"Predicting consumer intentions to use on-line shopping: The case for an augmented technology acceptance model","volume":"41","author":"L. Vijayasarathy","year":"2004","journal-title":"Information & Management"},{"issue":"1","key":"119","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/25148667","article-title":"Why should I share? Examining social capital and knowledge contribution in electronic networks of practice","volume":"29","author":"M. Wasko","year":"2005","journal-title":"MIS Quarterly"},{"key":"120","doi-asserted-by":"crossref","first-page":"311","DOI":"10.7551\/mitpress\/2464.003.0020","volume-title":"Distributed Work","author":"S. Weisband","year":"2002"},{"key":"121","volume-title":"Privacy and Freedom","author":"A. Westin","year":"1967"},{"key":"122","unstructured":"Xu, H.; Dinev, T.; Smith, H. J.; and Hart, P. Examining the formation of individual's information privacy concerns: Toward an integrative view. In Proceedings of the 29th Annual International Conference on Information Systems.<\/i> Atlanta: Association for Information Systems, 2008 (available at http:\/\/aisel.aisnet.org\/icis2008\/6\/<\/a>"},{"issue":"3","key":"123","first-page":"137","article-title":"The role of push-pull technology in privacy calculus: The case of location-based services","volume":"26","author":"H. Xu","year":"2009-10","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"124","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1002\/asi.20530","article-title":"Predicting user concerns about online privacy","volume":"58","author":"M. Yao","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"125","doi-asserted-by":"crossref","first-page":"61","DOI":"10.4018\/jgim.2008010103","article-title":"Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems","volume":"16","author":"D. Zhang","year":"2008","journal-title":"Journal of Global Information Management"},{"issue":"4","key":"126","doi-asserted-by":"crossref","first-page":"53","DOI":"10.2753\/MIS0742-1222230404","article-title":"The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence","volume":"23","author":"D. Zhang","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"127","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/TPC.2005.849652","article-title":"An empirical investigation of deception behavior and instant messaging","volume":"48","author":"L. Zhou","year":"2005","journal-title":"IEEE Transactions on Professional Communication"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.2753\/MIS0742-1222270406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T11:13:14Z","timestamp":1712401994000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.2753\/MIS0742-1222270406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":127,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,12,8]]},"published-print":{"date-parts":[[2011,4]]}},"alternative-id":["10.2753\/MIS0742-1222270406"],"URL":"https:\/\/doi.org\/10.2753\/mis0742-1222270406","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4]]}}}