390
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Exploring the predictors and the role of trust and concern in the context of data disclosure to governmental institutions

&
Pages 321-331 | Received 17 Mar 2016, Accepted 05 Sep 2016, Published online: 01 Oct 2016

References

  • Beldad, A., T. van der Geest, M. de Jong, and M. Steehouder. 2012. “Shall I Tell You Where I Live and Who I Am? Factors Influencing the Behavioral Intention to Disclose Personal Data for Online Government Transactions.” International Journal of Human-Computer Interaction 28: 163–177. doi: 10.1080/10447318.2011.572331
  • Beldad, A., M. de Jong, and M. Steehouder. 2011. “I Trust Not Therefore it Must Be Risky: Determinants of the Perceived Risks of Disclosing Personal Data for E-Government Transactions.” Computers in Human Behavior 27: 2233–2242. doi: 10.1016/j.chb.2011.07.002
  • Bryce, J., and J. Fraser. 2014. “The Role of Disclosure of Personal Information in the Evaluation of Risk and Trust in Young People’s Online Interactions.” Computers in Human Behavior 30: 299–306. doi: 10.1016/j.chb.2013.09.012
  • Castro, P. 2012. “Legal Innovation for Social Change: Exploring Change and Resistance to Different Types of Sustainability Laws.” Political Psychology 33: 105–121. doi: 10.1111/j.1467-9221.2011.00863.x
  • Dinev, T., and P. Hart. 2004. “Internet Privacy Concerns and Their Antecedents - Measurement Validity and a Regression Model.” Behaviour & Information Technology 23: 413–422. doi: 10.1080/01449290410001715723
  • Feygina, I., J. T. Jost, and R. E. Goldsmith. 2010. “System Justification, the Denial of Global Warming, and the Possibility of ‘System-Sanctioned Change’.” Personality and Social Psychology Bulletin 36: 326–338. doi: 10.1177/0146167209351435
  • Fogel, J., and E. Nehmad. 2009. “Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns.” Computers in Human Behavior 25: 153–160. doi: 10.1016/j.chb.2008.08.006
  • Gonçalves, M. E., and I. A. Jesus. 2013. “Security Policies and the Weakening of Personal Data Protection in the European Union.” Computer Law & Security Review 29: 255–263. doi: 10.1016/j.clsr.2013.03.008
  • Gutwirth, S., Y. Poullet, P. de Hert, C. de Terwangne, and S. Nouwt. 2009. Reinventing Data Protection? Dordrecht: Springer.
  • Hallinan, D., M. Friedwald, and P. McCarthy. 2012. “Citizens’ Perceptions of Data Protection and Privacy in Europe.” Computer Law & Security Review 28: 263–272. doi: 10.1016/j.clsr.2012.03.005
  • Howarth, C. 2006. “A Social Representation Is Not a Quiet Thing: Exploring the Critical Potential of Social Representations Theory.” British Journal of Social Psychology 45: 65–86. doi: 10.1348/014466605X43777
  • Inglehart, R. 1981. “Post-materialism in an Environment of Insecurity.” American Political Science Review 75: 880–900. doi: 10.2307/1962290
  • Jost, J. T., and M. R. Banaji. 1994. “The Role of Stereotyping in System-Justification and the Production of False Consciousness.” British Journal of Social Psychology 33: 1–27. doi: 10.1111/j.2044-8309.1994.tb01008.x
  • Jost, T. J., M. R. Banaji, and B. A. Nosek. 2004. “A Decade of System Justification Theory: Accumulated Evidence of Conscious and Unconscious Bolstering of the Status Quo.” Political Psychology 25: 881–919. doi: 10.1111/j.1467-9221.2004.00402.x
  • Kay, A. C., and J. T. Jost. 2003. “Complementary Justice: Effects of ‘Poor but Happy’ and ‘Poor but Honest’ Stereotype Exemplars on System Justification and Implicit Activation of the Justice Motive.” Journal of Personality and Social Psychology 85: 823–837. doi: 10.1037/0022-3514.85.5.823
  • Kelman, H. C. 2006. “Interests, Relationships, Identities: Three Central Issues for Individuals and Groups in Negotiating Their Social Environment.” Annual Review of Psychology 57: 1–26. doi: 10.1146/annurev.psych.57.102904.190156
  • Levin-Rozalis, M. 2007. “Playing by the Rules. Social Representations of ‘Law’ as the Socio-Cognitive Mediating Mechanism Between Law and Society.” Theory and Psychology 17: 5–31. doi: 10.1177/0959354307073149
  • Libaque-Saenz, C. F., Y. Chang, J. Kim, M-C. Park, and J. J. Rho. 2016. “The Role of Perceived Information Practices on Consumers” Intention to Authorise Secondary Use of Personal Data.” Behaviour & Information Technology. doi: 1080/0144929X.2015.1128973.
  • Lusoli, W., M. Bacigalupo, F. Lupiañez, N. Andrade, S. Monteleone, and I. Maghiros. 2012. Pan-European Survey of Practices, Attitudes and Policy Preferences as Regards Personal Identity Data Management. Luxembourg: Publications Office of the European Union.
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15: 336–355. doi: 10.1287/isre.1040.0032
  • Martin, N., J. Rice, and R. Martin. 2015. “Expectations of Privacy and Trust: Examining the Views of IT Professionals.” Behaviour & Information Technology doi:10.1080/0144929X.2015.1066444.
  • Moscovici, S. 1988. “Notes Towards a Description of Social Representations.” European Journal of Social Psychology 18: 211–250. doi: 10.1002/ejsp.2420180303
  • Shih, D., S. Hsu, D. C. Yen, and C. Lin. 2012. “Exploring the Individual’s Behavior on Self-Disclosure Online.” International Journal of Human-Computer Interaction 28: 627–645. doi: 10.1080/10447318.2011.654198
  • Staerklé, C. 2015. “Social Order and Political Legitimacy.” In The Cambridge Handbook of Social Representations, edited by G. Sammut, E. Andreouli, G. Gaskell, and J. Valsiner, 281–294. Cambridge: University Press.
  • The Gallup Organization. 2008. “Data Protection in the European Union: Data Controllers’ Perceptions.” Flash Eurobarometer 225. European Commission website: http://ec.europa.eu/public_opinion/flash/fl_225_en.pdf.
  • TNSOS (TNS Opinion & Social). 2011. “Attitudes on Data Protection and Electronic Identity in the European Union.” Special Eurobarometer 359. European Commission website: http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf.
  • Toorn, J., T. R. Tyler, and J. T. Jost. 2011. “More Than Fair: Outcome Dependence, System Justification, and the Perceived Legitimacy of Authority Figures.” Journal of Experimental Social Psychology 47: 127–138. doi: 10.1016/j.jesp.2010.09.003
  • Wu, K., S. Y. Huang, D. C. Yen, and I. Popova. 2012. “The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust.” Computers in Human Behavior 28: 889–897. doi: 10.1016/j.chb.2011.12.008
  • Zhao, J., K. Abrahamson, J. G. Anderson, S. Ha, and R. Widdows. 2013. “Trust, Empathy, Social Identity, and Contribution of Knowledge Within Patient Online Communities.” Behaviour & Information Technology 32: 1041–1048. doi: 10.1080/0144929X.2013.819529

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.