{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:38:31Z","timestamp":1725431911066},"reference-count":78,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T00:00:00Z","timestamp":1664323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72064027"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"Interaction is the main feature of social media, while in recent years, frequent privacy disclosure events of the social media user affect users\u2019 privacy disclosure behavior. In this paper, we explore the mechanism of interaction characteristics by social media apps on users\u2019 privacy disclosure behavior. Using SOR theoretical models and the privacy calculus theory, the effects of privacy disclosures on TikTok are examined. Structural equation modeling is used to analyze the data from 326 questionnaires. We concluded that human\u2013computer interaction (perceived personalization, perceived control) and interpersonal interaction (perceived similarity) positively and negatively affected perceived benefits and perceived risks, respectively, and had positive effects on intention to disclose privacy through perceived benefits and perceived risks, respectively, except that perceived personalization had no effect on perceived risk and intention to disclose privacy. In addition, perceived benefits and perceived risks played an intermediary role in interactivity and privacy disclosure intention. Finally, we provided countermeasures and suggestions for social media operators and policy makers.<\/jats:p>","DOI":"10.3390\/info13100461","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T02:53:19Z","timestamp":1664419999000},"page":"461","source":"Crossref","is-referenced-by-count":4,"title":["Mechanism of Platform Interaction on Social Media Users\u2019 Intention to Disclose Privacy: A Case Study of Tiktok APP"],"prefix":"10.3390","volume":"13","author":[{"given":"Xiaogang","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Public Policy and Administration, Nanchang University, Nanchang 330031, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6755-4372","authenticated-orcid":false,"given":"Qianqian","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Public Policy and Administration, Nanchang University, Nanchang 330031, China"}]},{"given":"Chunnian","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Public Policy and Administration, Nanchang University, Nanchang 330031, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1108\/QMR-06-2013-0041","article-title":"Why people use social media: A uses and gratifications approach","volume":"16","author":"Whiting","year":"2013","journal-title":"Qual. Mark. Res. Int. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1093\/her\/cyab010","article-title":"Communicating COVID-19 information on TikTok: A content analysis of TikTok videos from official accounts featured in the COVID-19 information hub","volume":"36","author":"Li","year":"2021","journal-title":"Heal. Educ. Res."},{"key":"ref_3","unstructured":"Revell, T. (2018, May 31). How Facebook let a friend pass my data to Cambridge Analytica. The New Scientist. Available online: https:\/\/www.newscientist.com\/article\/2166435-how-facebook-let-a-friend-pass-my-data-to-cambridge-analytica\/."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Meral, K.Z. (2021). Social media short video-sharing TikTok application and ethics: Data privacy and addiction issues. Multidisciplinary Approaches to Ethics in the Digital Era, IGI Global.","DOI":"10.4018\/978-1-7998-4117-3.ch010"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","article-title":"Privacy Concerns and Consumer Willingness to Provide Personal Information","volume":"19","author":"Phelps","year":"2000","journal-title":"J. Public Policy Mark."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1080\/07421222.2016.1243947","article-title":"From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It","volume":"33","author":"Anderson","year":"2016","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue: A multidimensional developmental theory","volume":"33","author":"Laufer","year":"1977","journal-title":"J. Soc. Issues"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1392","DOI":"10.1177\/0002764218792691","article-title":"Revisiting the privacy paradox on social media with an extended privacy calculus model: The effect of privacy concerns, privacy self-efficacy, and social capital on privacy management","volume":"62","author":"Chen","year":"2018","journal-title":"Am. Behav. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.chb.2015.06.006","article-title":"Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences","volume":"52","author":"Sun","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1111\/jcc4.12163","article-title":"An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative US sample","volume":"21","author":"Dienlin","year":"2016","journal-title":"J. Comput.-Mediat. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1287\/isre.1120.0441","article-title":"Research note\u2014Privacy concerns and privacy-protective behavior in synchronous online social interactions","volume":"24","author":"Jiang","year":"2013","journal-title":"Inf. Syst. Res."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.im.2014.12.001","article-title":"Antecedents and consequences of mobile phone usability: Linking simplicity and interactivity to satisfaction, trust, and brand loyalty","volume":"52","author":"Lee","year":"2015","journal-title":"Inf. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102251","DOI":"10.1016\/j.ijinfomgt.2020.102251","article-title":"The dynamic effect of interactivity on customer engagement behavior through tie strength: Evidence from live streaming commerce platforms","volume":"56","author":"Kang","year":"2021","journal-title":"Int. J. Inf. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1108\/IJCHM-12-2017-0783","article-title":"The role of personalization on continuance intention in food service mobile apps: A privacy calculus perspective","volume":"31","author":"Kang","year":"2019","journal-title":"Int. J. Contemp. Hosp. Manag."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"582054","DOI":"10.3389\/fpsyg.2020.582054","article-title":"Out of control\u2013privacy calculus and the effect of perceived control and moral considerations on the usage of IoT healthcare devices","volume":"11","author":"Princi","year":"2020","journal-title":"Front. Psychol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.chb.2016.01.012","article-title":"Enhancing the flow experience of consumers in China through interpersonal interaction in social commerce","volume":"58","author":"Liu","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"106115","DOI":"10.1016\/j.chb.2019.08.022","article-title":"The privacy calculus contextualized: The influence of affordances","volume":"104","author":"Trepte","year":"2020","journal-title":"Comput. Hum. Behav."},{"key":"ref_18","unstructured":"Mehrabian, A., and Russell, J.A. (1974). An Approach to Environmental Psychology, The MIT Press."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1016\/j.chb.2012.12.021","article-title":"The effect of behavioral tracking practices on consumers\u2019 shopping evaluations and repurchase intention toward trusted online retailers","volume":"29","author":"Jai","year":"2013","journal-title":"Comput. Hum. Behav."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1016\/j.im.2014.07.005","article-title":"What motivates customers to participate in social commerce? The impact of technological environments and virtual customer experiences","volume":"51","author":"Zhang","year":"2014","journal-title":"Inf. Manag."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Tremayne, M. (2005). Lessons learned from experiments with interactivity on the web. J. Interact. Advert., 5.","DOI":"10.1080\/15252019.2005.10722100"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.indmarman.2008.11.006","article-title":"Customer interactivity and new product performance: Moderating effects of product newness and product embeddedness","volume":"39","author":"Bonner","year":"2010","journal-title":"Ind. Mark. Manag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1thci.00036","article-title":"Effects of web atmospheric cues on users\u2019 emotional responses in e-commerce","volume":"4","author":"Sheng","year":"2012","journal-title":"AIS Trans. Hum. -Comput. Interact."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1177\/002224299606000304","article-title":"Marketing in hypermedia computer-mediated environments: Conceptual foundations","volume":"60","author":"Hoffman","year":"1996","journal-title":"J. Mark."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/00913367.2002.10673674","article-title":"Measures of perceived interactivity: An exploration of the role of direction of communication, user control, and time in shaping perceptions of interactivity","volume":"31","author":"McMillan","year":"2002","journal-title":"J. Advert."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1543","DOI":"10.1016\/j.jbusres.2011.02.038","article-title":"Experience effects on interactivity: Functions, processes, and perceptions","volume":"65","author":"Kim","year":"2012","journal-title":"J. Bus. Res."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/10641734.2006.10505193","article-title":"Conceptualizing and measuring the perceived interactivity of websites","volume":"28","author":"Wu","year":"2006","journal-title":"J. Curr. Issues Res. Advert."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Sun, J., Yang, C., and Gu, C. (2021). The Impact of Perceived Interactivity and Intrinsic Value on Users\u2019 Continuance Intention in Using Mobile Augmented Reality Virtual Shoe-Try-On Function. Systems, 10.","DOI":"10.3390\/systems10010003"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"49","DOI":"10.2753\/JEC1086-4415150102","article-title":"Virtual community loyalty: An interpersonal-interaction perspective","volume":"15","author":"Shen","year":"2010","journal-title":"Int. J. Electron. Commer."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/1540-4560.00067","article-title":"Consumer privacy: Balancing economic and justice considerations","volume":"59","author":"Culnan","year":"2003","journal-title":"J. Soc. Issues"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Inf. Syst. Res."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.dss.2010.11.017","article-title":"The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing","volume":"51","author":"Xu","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.ijhcs.2013.01.005","article-title":"Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users\u2019 behavior of balancing perceived benefit and risk","volume":"71","author":"Lee","year":"2013","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1108\/13555851311314031","article-title":"Perceived benefits, perceived risk, and trust: Influences on consumers\u2019 group buying behaviour","volume":"25","author":"Liu","year":"2013","journal-title":"Asia Pac. J. Mark. Logist."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.chb.2016.09.005","article-title":"Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison","volume":"65","author":"Pentina","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S0148-2963(99)00087-9","article-title":"Atmospheric qualities of online retailing: A conceptual model and implications","volume":"54","author":"Eroglu","year":"2001","journal-title":"J. Bus. Res."},{"key":"ref_37","unstructured":"Sun, H., and Zhang, P. (2015). The role of affect in information systems research. Human-Computer Interaction and Management Information Systems: Foundations, Routledge."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Processes"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Inf. Syst. Res."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s10551-014-2346-x","article-title":"Exploring the security of information sharing on social networking sites: The role of perceived control of information","volume":"133","author":"Hajli","year":"2016","journal-title":"J. Bus. Ethics"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.dss.2011.01.017","article-title":"The role of affect and cognition on online consumers\u2019 decision to disclose personal information to unfamiliar online vendors","volume":"51","author":"Li","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_42","unstructured":"Shao, H., Li, X., and Wang, G. (May, January 29). Are You Tired? I am: Trying to Understand Privacy Fatigue of Social Media Users. Proceedings of the CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.chb.2015.07.049","article-title":"When does web-based personalization really work? The distinction between actual personalization and perceived personalization","volume":"54","author":"Li","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_44","first-page":"145","article-title":"Predictors of avoidance towards personalization of restaurant smartphone advertising: A study from the Millennials\u2019 perspective","volume":"6","author":"Nyheim","year":"2015","journal-title":"J. Hosp. Tour. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.ipm.2014.02.002","article-title":"The effects of personalization on user continuance in social networking sites","volume":"50","author":"Park","year":"2014","journal-title":"Inf. Processing Manag."},{"key":"ref_46","first-page":"86","article-title":"Benefits, risks and social factors in consumer acceptance of social commerce: A meta-analytic approach","volume":"125","author":"Mou","year":"2020","journal-title":"Sage"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1016\/j.dss.2012.05.012","article-title":"The effects of location personalization on individuals\u2019 intention to use mobile services","volume":"53","author":"Ho","year":"2012","journal-title":"Decis. Support Syst."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s11002-007-9027-9","article-title":"Getting too personal: Reactance to highly personalized email solicitations","volume":"19","author":"White","year":"2008","journal-title":"Mark. Lett."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s11002-012-9222-1","article-title":"Customization of online advertising: The role of intrusiveness","volume":"24","author":"Hoekstra","year":"2013","journal-title":"Mark. Lett."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.ijinfomgt.2016.03.003","article-title":"Intention to disclose personal information via mobile applications: A privacy calculus perspective","volume":"36","author":"Wang","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1111\/isj.12195","article-title":"The effect of role conflict on self-disclosure in social network sites: An integrated perspective of boundary regulation and dual process model","volume":"29","author":"Liu","year":"2019","journal-title":"Inf. Syst. J."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1287\/isre.2016.0672","article-title":"Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook","volume":"27","author":"Cavusoglu","year":"2016","journal-title":"Inf. Syst. Res."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1016\/j.chb.2011.12.003","article-title":"The social side of gaming: How playing online computer games creates online and offline social support","volume":"28","author":"Trepte","year":"2012","journal-title":"Comput. Hum. Behav."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1177\/0265407597143008","article-title":"An overview (and underview) of research and theory within the attraction paradigm","volume":"14","author":"Byrne","year":"1997","journal-title":"J. Soc. Pers. Relatsh."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Al-Natour, S., Benbasat, I., and Cenfetelli, R.T. (2005, January 2\u20137). The role of similarity in e-commerce interactions: The case of online shopping assistants. Proceedings of the Special Interest Group on Human-Computer Interaction Conference, Portland, OR, USA.","DOI":"10.17705\/1jais.00110"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1111\/jcc4.12049","article-title":"Extending the similarity-attraction effect: The effects of when-similarity in computer-mediated communication","volume":"19","author":"Kaptein","year":"2014","journal-title":"J. Comput. -Mediat. Commun."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1080\/08941920701816336","article-title":"Hunter perceptions of similarity and trust in wildlife agencies and personal risk associated with chronic wasting disease","volume":"21","author":"Needham","year":"2008","journal-title":"Soc. Nat. Resour."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.chb.2009.11.012","article-title":"All about me: Disclosure in online social networking profiles: The case of FACEBOOK","volume":"26","author":"Nosko","year":"2010","journal-title":"Comput. Hum. Behav."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1108\/IntR-01-2014-0018","article-title":"Predicting mobile social network acceptance based on mobile value and social influence","volume":"25","author":"Lin","year":"2015","journal-title":"Internet Res."},{"key":"ref_60","first-page":"2","article-title":"Privacy in the sharing economy","volume":"20","author":"Teubner","year":"2019","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Xu, H., Dinev, T., Smith, H.J., and Hart, P. (2008, January 14\u201317). Examining the formation of individual\u2019s privacy concerns: Toward an integrative view. Proceedings of the International Conference on Information Systems, ICIS 2008, Paris, France.","DOI":"10.1016\/j.jsis.2007.09.002"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"102015","DOI":"10.1016\/j.ijinfomgt.2019.09.011","article-title":"A meta-analysis to explore privacy cognition and information disclosure of internet users","volume":"51","author":"Yu","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1111\/isj.12062","article-title":"Blissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculus","volume":"25","author":"Kehr","year":"2015","journal-title":"Inf. Syst. J."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.chb.2014.03.038","article-title":"Exploring influential social cognitive determinants of social media use","volume":"36","author":"Khang","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Nemec Zlatolas, L., Welzer, T., H\u00f6lbl, M., Heri\u010dko, M., and Kami\u0161ali\u0107, A. (2019). A model of perception of privacy, trust, and self-disclosure on online social networks. Entropy, 21.","DOI":"10.3390\/e21080772"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"53","DOI":"10.2753\/JEC1086-4415160403","article-title":"Disclosure intention of location-related information in location-based social network services","volume":"16","author":"Zhao","year":"2012","journal-title":"Int. J. Electron. Commer."},{"key":"ref_67","unstructured":"Kemp, S. (2022, June 24). Digital 2020: Global digital overview. Datareportal. Available online: https:\/\/datareportal.com\/reports\/digital-2020-global-digital-overview."},{"key":"ref_68","unstructured":"Iqbal, M. (2022, June 24). TikTok Revenue and Usage Statistics (2020). Business of Apps. Available online: https:\/\/www.businessofapps.com\/data\/tik-tok-statistics\/."},{"key":"ref_69","unstructured":"Demeulenaere, A., Boudry, E., Vanwynsberghe, H., and De Bonte, W. (2020). Onderzoeksrapport: De Digitale Leefwereld Van Kinderen, MEdiaraven."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"2332858421995537","DOI":"10.1177\/2332858421995537","article-title":"\u201cTeachers act like we\u2019re robots\u201d TikTok as a window into youth experiences of online learning during COVID-19","volume":"7","author":"Literat","year":"2021","journal-title":"AERA Open"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1093\/ije\/dyn357","article-title":"Ecological correlations and the behavior of individuals","volume":"38","author":"Robinson","year":"2009","journal-title":"Int. J. Epidemiol."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1016\/j.jbusres.2008.01.009","article-title":"Advancing formative measurement models","volume":"61","author":"Diamantopoulos","year":"2008","journal-title":"J. Bus. Res."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1177\/002224378902600302","article-title":"On the use of structural equation models in experimental designs","volume":"26","author":"Bagozzi","year":"1989","journal-title":"J. Mark. Res."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1177\/002224378101800313","article-title":"Structural equation models with unobservable variables and measurement error: Algebra and statistics","volume":"18","author":"Fornell","year":"1981","journal-title":"J. Mark. Res."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1111\/j.1540-5915.2001.tb00978.x","article-title":"Information technology acceptance by individual professionals: A model comparison approach","volume":"32","author":"Chau","year":"2001","journal-title":"Decis. Sci."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","article-title":"The role of push-pull technology in privacy calculus: The case of location-based services","volume":"26","author":"Xu","year":"2009","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"102128","DOI":"10.1016\/j.ipm.2019.102128","article-title":"Voluntary sharing and mandatory provision: Private information disclosure on social networking sites","volume":"57","author":"Li","year":"2020","journal-title":"Inf. Processing Manag."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information Privacy: Measuring Individuals\u2019 Concerns about Organizational Practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Q."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/10\/461\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T16:06:46Z","timestamp":1722960406000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/10\/461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,28]]},"references-count":78,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["info13100461"],"URL":"https:\/\/doi.org\/10.3390\/info13100461","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2022,9,28]]}}}