The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approach
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-024-10549-z
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Ayomikun Idowu & Amany Elbanna, 2022. "Digital Platforms of Work and the Crafting of Career Path: The Crowdworkers’ Perspective," Information Systems Frontiers, Springer, vol. 24(2), pages 441-457, April.
- Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
- Peter B. Seddon, 1997. "A Respecification and Extension of the DeLone and McLean Model of IS Success," Information Systems Research, INFORMS, vol. 8(3), pages 240-253, September.
- Paul Benjamin Lowry & Tamara Dinev & Robert Willison, 2017. "Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda," European Journal of Information Systems, Taylor & Francis Journals, vol. 26(6), pages 546-563, November.
- Dwivedi, Yogesh K. & Kapoor, Kawaljeet Kaur & Williams, Michael D. & Williams, Janet, 2013. "RFID systems in libraries: An empirical examination of factors affecting system use and user satisfaction," International Journal of Information Management, Elsevier, vol. 33(2), pages 367-377.
- Gefen, David, 2000. "E-commerce: the role of familiarity and trust," Omega, Elsevier, vol. 28(6), pages 725-737, December.
- Arun Rai & Sandra S. Lang & Robert B. Welker, 2002. "Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis," Information Systems Research, INFORMS, vol. 13(1), pages 50-69, March.
- Andrew Burton-Jones & Olga Volkoff, 2017. "How Can We Develop Contextualized Theories of Effective Use? A Demonstration in the Context of Community-Care Electronic Health Records," Information Systems Research, INFORMS, vol. 28(3), pages 468-489, September.
- Mary J. Culnan & Pamela K. Armstrong, 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, INFORMS, vol. 10(1), pages 104-115, February.
- Wanda J. Orlikowski, 2000. "Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations," Organization Science, INFORMS, vol. 11(4), pages 404-428, August.
- Merrill Warkentin & Robert Willison, 2009. "Behavioral and policy issues in information systems security: the insider threat," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 101-105, April.
- Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Jeewon Cho & Insu Park, 2022. "Does Information Systems Support for Creativity Enhance Effective Information Systems Use and Job Satisfaction in Virtual Work?," Information Systems Frontiers, Springer, vol. 24(6), pages 1865-1886, December.
- Nils Koester & Patrick Cichy & David Antons & Torsten Oliver Salge, 2022. "Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2333-2355, December.
- Michael Breward & Khaled Hassanein & Milena Head, 2017. "Understanding Consumers’ Attitudes Toward Controversial Information Technologies: A Contextualization Approach," Information Systems Research, INFORMS, vol. 28(4), pages 760-774, December.
- Lu, Baozhou & Yi, Xiaoyang, 2023. "Institutional trust and repurchase intention in the sharing economy: The moderating roles of information privacy concerns and security concerns," Journal of Retailing and Consumer Services, Elsevier, vol. 73(C).
- Chin, Amita Goyal & Harris, Mark A. & Brookshire, Robert, 2018. "A bidirectional perspective of trust and risk in determining factors that influence mobile app installation," International Journal of Information Management, Elsevier, vol. 39(C), pages 49-59.
- Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
- Hung-Pin Shih & Wuqiang Liu, 2023. "Beyond the trade-offs on Facebook: the underlying mechanisms of privacy choices," Information Systems and e-Business Management, Springer, vol. 21(2), pages 353-387, June.
- Bonsón Ponte, Enrique & Carvajal-Trujillo, Elena & Escobar-Rodríguez, Tomás, 2015. "Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents," Tourism Management, Elsevier, vol. 47(C), pages 286-302.
- repec:dau:papers:123456789/8263 is not listed on IDEAS
- Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
- Bailing Liu & Paul A. Pavlou & Xiufeng Cheng, 2022. "Achieving a Balance Between Privacy Protection and Data Collection: A Field Experimental Examination of a Theory-Driven Information Technology Solution," Information Systems Research, INFORMS, vol. 33(1), pages 203-223, March.
- Amita Goyal Chin & Mark A. Harris & Robert Brookshire, 2022. "An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework," Information Systems Frontiers, Springer, vol. 24(1), pages 329-347, February.
- J. J. Po-An Hsieh & Arun Rai & Sean Xin Xu, 2011. "Extracting Business Value from IT: A Sensemaking Perspective of Post-Adoptive Use," Management Science, INFORMS, vol. 57(11), pages 2018-2039, November.
- Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
- Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
- Sembada, Agung Y. & Koay, Kian Yeik, 2021. "How perceived behavioral control affects trust to purchase in social media stores," Journal of Business Research, Elsevier, vol. 130(C), pages 574-582.
- Liu, Yu-li & Wu, Yanfei & Li, Changyan & Song, Chuling & Hsu, Wen-yi, 2024. "Does displaying one's IP location influence users' privacy behavior on social media? Evidence from China's Weibo," Telecommunications Policy, Elsevier, vol. 48(5).
- Yuan Sun & Shuyue Fang & Yujong Hwang, 2019. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce," Sustainability, MDPI, vol. 11(12), pages 1-27, June.
- Jabbar, Abdul & Geebren, Ahmed & Hussain, Zahid & Dani, Samir & Ul-Durar, Shajara, 2023. "Investigating individual privacy within CBDC: A privacy calculus perspective," Research in International Business and Finance, Elsevier, vol. 64(C).
- Jung-Yu Lai & Juite Wang, 2018. "Exploring the impacts of perceived e-collaboration service convenience on new product development in Taiwanese IC design companies," Information Technology and Management, Springer, vol. 19(2), pages 107-120, June.
- Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
More about this item
Keywords
Information privacy concerns; Information systems use behaviors; Effective information systems use; Shadow information technology use; Electronic surveillance and monitoring in non-volitional contexts; Cognitive/psychological processes; Situational uncertainty;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:26:y:2024:i:6:d:10.1007_s10796-024-10549-z. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.