1,174
Views
1
CrossRef citations to date
0
Altmetric
Research Article

General data protection regulation: a study on attitude and emotional empowerment

, , &
Received 05 Jul 2022, Accepted 14 Nov 2023, Published online: 22 Nov 2023

References

  • Albrecht, J. P. 2016. “How the GDPR Will Change the World.” European Data Protection Law Review 2 (3): 287. https://doi.org/10.21552/EDPL/2016/3/4.
  • Amram, D. 2020. “Building up the “Accountable Ulysses” Model. The Impact of GDPR and National Implementations, Ethics, and Health-Data Research: Comparative Remarks.” Computer Law & Security Review 37: 105413. https://doi.org/10.1016/j.clsr.2020.105413
  • Asghar, M. N., N. Kanwal, B. Lee, M. Fleury, M. Herbst, and Y. Qiao. 2019. “Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective.” IEEE Access 7: 111709–111726. https://doi.org/10.1109/ACCESS.2019.2934226
  • Badii, C., P. Bellini, A. Difino, and P. Nesi. 2020. “Smart City IoT Platform Respecting GDPR Privacy and Security Aspects.” IEEE Access 8: 23601–23623. https://doi.org/10.1109/ACCESS.2020.2968741
  • Balapour, A., H. R. Nikkhah, and R. Sabherwal. 2020. “Mobile Application Security: Role of Perceived Privacy as the Predictor of Security Perceptions.” International Journal of Information Management 52: 102063. https://doi.org/10.1016/j.ijinfomgt.2019.102063
  • Bandura, A. 1977. “Self-efficacy: Toward a Unifying Theory of Behavioral Change.” Psychological Review 84 (2): 191–215. https://doi.org/10.1037/0033-295X.84.2.191.
  • Bandura, A. 1982. “Self-efficacy Mechanism in Human Agency.” American Psychologist 37 (2): 122. https://doi.org/10.1037/0003-066X.37.2.122.
  • Barth, S., and M. D. de Jong. 2017. “The Privacy Paradox–Investigating Discrepancies Between Expressed Privacy Concerns and Actual Online Behavior–A Systematic Literature Review.” Telematics and Informatics 34 (7): 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
  • Bassi, E., N. Bloise, J. Dirutigliano, G. P. Fici, U. Pagallo, S. Primatesta, and F. Quagliotti. 2019. “The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.” Minds and Machines 29 (4): 579–601. https://doi.org/10.1007/s11023-019-09511-9
  • Beckers, A. 2018. “Environmental Protection Meets Consumer Sales.” European Review of Contract Law 14 (2): 157–189. https://doi.org/10.1515/ercl-2018-1009.
  • Bell, G. B. 2011. “Digital Whistleblowing in Restricted Environments.” Journal of Digital Information 12 (3): 1–14.
  • Boshoff, C. 1997. “An Experimental Study of Service Recovery Options.” International Journal of Service Industry Management 8 (2): 110–130. https://doi.org/10.1108/09564239710166245.
  • Boshoff, C., and J. Leong. 1998. “Empowerment, Attribution and Apologising as Dimensions of Service Recovery: An Experimental Study.” International Journal of Service Industry Management 9 (1): 24–47. https://doi.org/10.1108/09564239810199932.
  • Boss, S. R., D. F. Galletta, P. B. Lowry, G. D. Moody, and P. Polak. 2015. “What do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors.” MIS Quarterly 39 (4): 837–864.
  • Byrd, K., A. Fan, E. Her, Y. Liu, S. Leitch, and B. Almanza. 2023. “Restaurant Patronage During the COVID-19 Pandemic and the Protection Motivation Theory: Influence of Consumers’ Socio-Demographic, Situational, and Psychographic Factors.” Journal of Foodservice Business Research 26 (2): 247–275. https://doi.org/10.1080/15378020.2021.2006036
  • Campanile, L., M. Iacono, F. Marulli, and M. Mastroianni. 2021. “Designing a GDPR Compliant Blockchain-Based IoV Distributed Information Tracking System.” Information Processing & Management 58 (3): 102511. https://doi.org/10.1016/j.ipm.2021.102511
  • Carrascal, J. P., C. Riederer, V. Erramilli, M. Cherubini, and R. De Oliveira. 2013. “Your Browsing Behavior for a Big Mac: Economics of Personal Information Online.” In Proceedings of the 22nd International Conference on World Wide Web, 189–200.
  • Carroll, N., and K. Conboy. 2020. “Normalising the “New Normal”: Changing Tech-Driven Work Practices Under Pandemic Time Pressure.” International Journal of Information Management 55: 102186. https://doi.org/10.1016/j.ijinfomgt.2020.102186
  • Chen, K.-Y., and C.-F. Yeh. 2017. “Factors Affecting Adoption of Smart Meters in the Post-Fukushima era in Taiwan: An Extended Protection Motivation Theory Perspective.” Behaviour & Information Technology 36 (9): 955–969. https://doi.org/10.1080/0144929X.2017.1317363
  • Chen, C., K. Z. Zhang, X. Gong, M. K. Lee, and Y. Wang. 2020. “Decreasing the Problematic use of an Information System: An Empirical Investigation of Smartphone Game Players.” Information Systems Journal 30 (3): 492–534. https://doi.org/10.1111/isj.12264
  • Chenoweth, T., R. Minch, and T. Gattiker. 2009. “Application of Protection Motivation Theory to Adoption of Protective Technologies.” In 2009 42nd Hawaii International Conference on System Sciences, 1–10. IEEE.
  • Christens, B. D., J. J. Collura, and F. Tahir. 2013. “Critical Hopefulness: A Person-Centered Analysis of the Intersection of Cognitive and Emotional Empowerment.” American Journal of Community Psychology 52 (1-2): 170–184. https://doi.org/10.1007/s10464-013-9586-2
  • Cram, W. A., J. G. Proudfoot, and J. D’arcy. 2017. “Organizational Information Security Policies: A Review and Research Framework.” European Journal of Information Systems 26 (6): 605–641. https://doi.org/10.1057/s41303-017-0059-9
  • Crossler, R. E. 2010. “Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data.” In 2010 43rd Hawaii International Conference on System Sciences, 1–10. IEEE.
  • Crossler, R., and F. Bélanger. 2014. “An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems 45 (4): 51–71. https://doi.org/10.1145/2691517.2691521
  • Crossler, R. E., J. H. Long, T. M. Loraas, and B. S. Trinkle. 2014. “Understanding Compliance with Bring Your own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior gap.” Journal of Information Systems 28 (1): 209–226. https://doi.org/10.2308/isys-50704
  • Culnan, M. J., and P. K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10 (1): 104–115. https://doi.org/10.1287/orsc.10.1.104
  • De Búrca, G. 2020. “Introduction to the Symposium on the GDPR and International Law.” American Journal of International Law 114 (1): 1–4. https://doi.org/10.1017/ajil.2019.70
  • De Carvalho, L. G., M. Fantinato, and M. M. Eler. 2020. “Security Requirements Identification and Prioritization for Smart Toys.” Electronic Commerce Research and Applications 41: 100972. https://doi.org/10.1016/j.elerap.2020.100972
  • De Hert, P., V. Papakonstantinou, G. Malgieri, L. Beslay, and I. Sanchez. 2018. “The Right to Data Portability in the GDPR: Towards User-Centric Interoperability of Digital Services.” Computer Law & Security Review 34 (2): 193–203. https://doi.org/10.1016/j.clsr.2017.10.003
  • De Kimpe, Lies, Michel Walrave, Pieter Verdegem, and Koen Ponnet. 2022. “What We Think We Know About Cybersecurity: An Investigation of the Relationship Between Perceived Knowledge, Internet Trust, and Protection Motivation in a Cybercrime Context.” Behaviour & Information Technology 41 (8): 1796–1808. http://dx.doi.org/10.1080/0144929X.2021.1905066.
  • Dinev, T., and P. Hart. 2006. “An Extended Privacy Calculus Model for e-Commerce Transactions.” Information Systems Research 17 (1): 61–80. https://doi.org/10.1287/isre.1060.0080
  • Egelman, S., A. P. Felt, and D. Wagner. 2013. “Choice Architecture and Smartphone Privacy: There’s a Price for That.” In The Economics of Information Security and Privacy, edited by R. Böhme, 211–236. Berlin: Springer.
  • Elliott, M. A., C. J. Armitage, and C. J. Baughan. 2007. “Using the Theory of Planned Behaviour to Predict Observed Driving Behaviour.” British Journal of Social Psychology 46 (1): 69–90. https://doi.org/10.1348/014466605X90801
  • Floyd, D. L., S. Prentice-Dunn, and R. W. Rogers. 2000. “A Meta-Analysis of Research on Protection Motivation Theory.” Journal of Applied Social Psychology 30 (2): 407–429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  • Forcier, M. B., H. Gallois, S. Mullan, and Y. Joly. 2019. “Integrating Artificial Intelligence Into Health Care Through Data Access: Can the GDPR act as a Beacon for Policymakers?” Journal of Law and the Biosciences 6 (1): 317. https://doi.org/10.1093/jlb/lsz013
  • Goddard, M. 2017. “The EU General Data Protection Regulation (GDPR): European Regulation That has a Global Impact.” International Journal of Market Research 59 (6): 703–705. https://doi.org/10.2501/IJMR-2017-050
  • Guchait, P., M. G. Kim, and K. Namasivayam. 2012. “Error Management at Different Organizational Levels–Frontline, Manager, and Company.” International Journal of Hospitality Management 31 (1): 12–22. https://doi.org/10.1016/j.ijhm.2011.04.007
  • Hagiu, A., and J. Wright. 2020. “When Data Creates Competitive Advantage.” Harvard Business Review 98: 94–101.
  • Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson. 2014. Multivariate Data Analysis: Pearson New International Edition. Essex: Pearson.
  • Hann, I.-H., K.-L. Hui, S.-Y. T. Lee, and I. P. Png. 2007. “Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach.” Journal of Management Information Systems 24 (2): 13–42. https://doi.org/10.2753/MIS0742-1222240202
  • Haque, A. B., A. N. Islam, S. Hyrynsalmi, B. Naqvi, and K. Smolander. 2021. “GDPR Compliant Blockchains–A Systematic Literature Review.” IEEE Access 9: 50593–50606. https://doi.org/10.1109/ACCESS.2021.3069877.
  • Hartman, T., H. Kennedy, R. Steedman, and R. Jones. 2020. “Public Perceptions of Good Data Management: Findings from a UK-Based Survey.” Big Data & Society 7 (1): 2053951720935616. https://doi.org/10.1177/2053951720935616
  • Hasan, R., R. Shams, and M. Rahman. 2021. “Consumer Trust and Perceived Risk for Voice-Controlled Artificial Intelligence: The Case of Siri.” Journal of Business Research 131: 591–597. https://doi.org/10.1016/j.jbusres.2020.12.012
  • Herath, T., R. Chen, J. Wang, K. Banjara, J. Wilbur, and H. R. Rao. 2014. “Security Services as Coping Mechanisms: An Investigation Into User Intention to Adopt an Email Authentication Service.” Information Systems Journal 24 (1): 61–84. https://doi.org/10.1111/j.1365-2575.2012.00420.x
  • Hsieh, P.-J., and H.-M. Lai. 2020. “Exploring Peoples Intentions to use the Health Passbook in Self-Management: An Extension of the Technology Acceptance and Health Behavior Theoretical Perspectives in Health Literacy.” Technological Forecasting and Social Change 161: 120328. https://doi.org/10.1016/j.techfore.2020.120328
  • Huberman, B. A., E. Adar, and L. R. Fine. 2005. “Valuating Privacy.” IEEE Security & Privacy 3 (5): 22–25. https://doi.org/10.1109/MSP.2005.137
  • Hustinx, P. 2021. “Data Protection and International Organizations: A Dialogue Between EU law and International law.” International Data Privacy Law 11 (2): 77–80. https://doi.org/10.1093/idpl/ipab015.
  • Ifinedo, P. 2012. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers & Security 31 (1): 83–95. https://doi.org/10.1016/j.cose.2011.10.007
  • Johnston, A. C., and M. Warkentin. 2010. “Fear Appeals and Information Security Behaviors: An Empirical Study.” MIS Quarterly 34 (3): 549–566. https://doi.org/10.2307/25750691.
  • Kaapu, T., and T. Tiainen. 2009. “Consumers’ Views on Privacy in E-Commerce.” Scandinavian Journal of Information Systems 21: 1.
  • Karahanna, E., D. W. Straub, and N. L. Chervany. 1999. “Information Technology Adoption Across Time: A Cross-Sectional Comparison of pre-Adoption and Post-Adoption Beliefs.” MIS Quarterly 23 (2): 183–213. https://doi.org/10.2307/249751.
  • Karampela, M., S. Ouhbi, and M. Isomursu. 2019. “Exploring Users’ Willingness to Share Their Health and Personal Data Under the Prism of the New GDPR: Implications in Healthcare.” In 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 6509–6512. IEEE.
  • Kokolakis, S. 2017. “Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon.” Computers & Security 64: 122–134. https://doi.org/10.1016/j.cose.2015.07.002
  • Kounoudes, A. D., and G. M. Kapitsaki. 2020. “A Mapping of IoT User-Centric Privacy Preserving Approaches to the GDPR.” Internet of Things 11: 100179. https://doi.org/10.1016/j.iot.2020.100179
  • Kuner, C. 2020. “The GDPR and International Organizations.” American Journal of International Law 114: 15–19.
  • Larrucea, X., M. Moffie, S. Asaf, and I. Santamaria. 2020. “Towards a GDPR Compliant way to Secure European Cross Border Healthcare Industry 4.0.” Computer Standards & Interfaces 69: 103408. https://doi.org/10.1016/j.csi.2019.103408
  • Lee, Y. 2011. “Understanding Anti-Plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective.” Decision Support Systems 50 (2): 361–369. https://doi.org/10.1016/j.dss.2010.07.009
  • Lee, Y., and K. R. Larsen. 2009. “Threat or Coping Appraisal: Determinants of SMB Executives’ Decision to Adopt Anti-Malware Software.” European Journal of Information Systems 18 (2): 177–187. https://doi.org/10.1057/ejis.2009.11
  • Leiser, M. 2019. “Regulating Computational Propaganda: Lessons from International law.” Cambridge International Law Journal 8 (2): 218–240. https://doi.org/10.4337/cilj.2019.02.03
  • Leite, L., D. R. Dos Santos, and F. Almeida. 2022. “The Impact of General Data Protection Regulation on Software Engineering Practices.” Information & Computer Security 30 (1): 79–96. https://doi.org/10.1108/ICS-03-2020-0043.
  • Lumor, T., M. Pulkkinen, A. Hirvonen, and P. Neittaanmäki. 2021. “Creating the Socio-Technical Context Needed to Derive Benefits from Big Data Initiatives in Healthcare.” Scandinavian Journal of Information Systems 33: 1.
  • Mak, V., and E. Terryn. 2020. “Circular Economy and Consumer Protection: The Consumer as a Citizen and the Limits of Empowerment Through Consumer law.” Journal of Consumer Policy 43 (1): 227–248. https://doi.org/10.1007/s10603-019-09435-y
  • Mangini, V., I. Tal, and A.-N. Moldovan. 2020. “An Empirical Study on the Impact of GDPR and Right to Be Forgotten-Organisations and Users Perspective.” In Proceedings of the 15th International Conference on Availability, Reliability and Security, 1–9.
  • Manika, D., D. Gregory-Smith, and S. Papagiannidis. 2018. “The Influence of Prior Knowledge Structures on Website Attitudes and Behavioral Intentions.” Computers in Human Behavior 78: 44–58. https://doi.org/10.1016/j.chb.2017.09.024
  • Marabelli, M., E. Vaast, and J. L. Li. 2021. “Preventing the Digital Scars of COVID-19.” European Journal of Information Systems 30 (2): 176–192. https://doi.org/10.1080/0960085X.2020.1863752
  • Marikyan, D., S. Papagiannidis, O. F. Rana, and R. Ranjan. 2022. “Blockchain Adoption: A Study of Cognitive Factors Underpinning Decision Making.” Computers in Human Behavior 131: 107207. https://doi.org/10.1016/j.chb.2022.107207.
  • Maton, K. I. 2008. “Empowering Community Settings: Agents of Individual Development, Community Betterment, and Positive Social Change.” American Journal of Community Psychology 41 (1–2): 4–21. https://doi.org/10.1007/s10464-007-9148-6
  • Menard, P., G. J. Bott, and R. E. Crossler. 2017. “User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.” Journal of Management Information Systems 34 (4): 1203–1230. https://doi.org/10.1080/07421222.2017.1394083
  • Mora, H., J. C. Mendoza-Tello, E. G. Varela-Guzmán, and J. Szymanski. 2021. “Blockchain Technologies to Address Smart City and Society Challenges.” Computers in Human Behavior 122: 106854. https://doi.org/10.1016/j.chb.2021.106854
  • Mougiakou, E., and M. Virvou. 2017. “Based on GDPR Privacy in UML: Case of e-Learning Program.” In 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA), 1–8. IEEE.
  • Mousavi, R., R. Chen, D. J. Kim, and K. Chen. 2020. “Effectiveness of Privacy Assurance Mechanisms in Users’ Privacy Protection on Social Networking Sites from the Perspective of Protection Motivation Theory.” Decision Support Systems 135: 113323. https://doi.org/10.1016/j.dss.2020.113323
  • Nienaber, A.-M., S. Spundflasch, A. Soares, and A. Woodcock. 2021. “Distrust as a Hazard for Future Sustainable Mobility Planning. Rethinking Employees’ Vulnerability When Introducing New Information and Communication Technologies in Local Authorities.” International Journal of Human–Computer Interaction 37 (4): 390–401. https://doi.org/10.1080/10447318.2020.1860547
  • Oghazi, P., R. Schultheiss, K. Chirumalla, N. P. Kalmer, and F. F. Rad. 2020. “User Self-Disclosure on Social Network Sites: A Cross-Cultural Study on Facebook’s Privacy Concepts.” Journal of Business Research 112: 531–540. https://doi.org/10.1016/j.jbusres.2019.12.006
  • Orazi, D. C., and A. C. Johnston. 2020. “Running Field Experiments Using Facebook Split Test.” Journal of Business Research 118: 189–198. https://doi.org/10.1016/j.jbusres.2020.06.053
  • Pandey, N., and A. Pal. 2020. “Impact of Digital Surge During Covid-19 Pandemic: A Viewpoint on Research and Practice.” International Journal of Information Management 55: 102171. https://doi.org/10.1016/j.ijinfomgt.2020.102171
  • Papagiannidis, S., J. Harris, and D. Morton. 2020. “WHO led the Digital Transformation of Your Company? A Reflection of IT Related Challenges During the Pandemic.” International Journal of Information Management 55: 102166. https://doi.org/10.1016/j.ijinfomgt.2020.102166
  • Paul, C., K. Scheibe, and S. Nilakanta. 2020. “Privacy Concerns Regarding Wearable IoT Devices: How It Is Influenced by GDPR?” Proceedings of the 53rd Hawaii International Conference on System Sciences.
  • Perera, H., W. Hussain, D. Mougouei, R. A. Shams, A. Nurwidyantoro, and J. Whittle. 2019. “Towards Integrating Human Values into Software: Mapping Principles and Rights of GDPR to Values.” In 2019 IEEE 27th International Requirements Engineering Conference (RE), 404–409. IEEE.
  • Peterson, N. A. 2014. “Empowerment Theory: Clarifying the Nature of Higher-Order Multidimensional Constructs.” American Journal of Community Psychology 53 (1-2): 96–108. https://doi.org/10.1007/s10464-013-9624-0
  • Peterson, N. A., D. T. Lardier, K. G. Powell, E. Mankopf, M. Rashid, C. M. Morton, and S. Borys. 2021. “Psychometric Properties of a Recovery Empowerment Scale: Testing Emotional, Cognitive, Behavioral, and Relational Domains.” Journal of Community Psychology 49 (7): 2874–2891. https://doi.org/10.1002/jcop.22592.
  • Pins, D., T. Jakobi, G. Stevens, F. Alizadeh, and J. Krüger. 2022. “Finding, Getting and Understanding: The User Journey for the GDPR’S Right to Access.” Behaviour & Information Technology 41 (10): 2174–2200. https://doi.org/10.1080/0144929X.2022.2074894.
  • Podsakoff, P. M., S. B. Mackenzie, J.-Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology 88 (5): 879–903. https://doi.org/10.1037/0021-9010.88.5.879.
  • Porter, C. E., and N. Donthu. 2006. “Using the Technology Acceptance Model to Explain how Attitudes Determine Internet Usage: The Role of Perceived Access Barriers and Demographics.” Journal of Business Research 59 (9): 999–1007. https://doi.org/10.1016/j.jbusres.2006.06.003
  • Presthus, W., and K. F. Sønslien. 2021. “An analysis of violations and sanctions following the GDPR.” International Journal of Information Systems and Project Management 9 (1): 38–53. https://doi.org/10.12821/ijispm090102.
  • Ratchford, M., and B. T. Ratchford. 2021. “A Cross-Category Analysis of Dispositional Drivers of Technology Adoption.” Journal of Business Research 127: 300–311. https://doi.org/10.1016/j.jbusres.2021.01.037
  • Renwick, R., and R. Gleasure. 2021. “Those who Control the Code Control the Rules: How Different Perspectives of Privacy are Being Written Into the Code of Blockchain Systems.” Journal of Information Technology 36 (1): 16–38. https://doi.org/10.1177/0268396220944406
  • Rippetoe, P. A., and R. W. Rogers. 1987. “Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat.” Journal of Personality and Social Psychology 52 (3): 596–604. https://doi.org/10.1037/0022-3514.52.3.596.
  • Rochel, J. 2021. “Ethics in the GDPR: A Blueprint for Applied Legal Theory.” International Data Privacy Law 11 (2): 209–223. https://doi.org/10.1093/idpl/ipab007.
  • Rodrigues, M., I. Menezes, and P. D. Ferreira. 2018. “Validating the Formative Nature of Psychological Empowerment Construct: Testing Cognitive, Emotional, Behavioral, and Relational Empowerment Components.” Journal of Community Psychology 46 (1): 58–78. https://doi.org/10.1002/jcop.21916
  • Rogers, R. W. 1983. “Cognitive and Psychological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation.” In Social Psychophysiology: A Sourcebook, edited by J. T. Cacioppo and R. Petty, 153–176. New York: Guilford Press.
  • Rohunen, A., and J. Markkula. 2019. “On the Road–Listening to Data Subjects’ Personal Mobility Data Privacy Concerns.” Behaviour & Information Technology 38 (5): 486–502. https://doi.org/10.1080/0144929X.2018.1540658
  • Sanchez-Rola, I., M. Dell'amico, P. Kotzias, D. Balzarotti, L. Bilge, P.-A. Vervier, and I. Santos. 2019. “Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control.” In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 340–351.
  • Schwarz, N. 2007. “Attitude Construction: Evaluation in Context.” Social Cognition 25 (5): 638–656. https://doi.org/10.1521/soco.2007.25.5.638
  • Sørensen, C. 2016. “The Curse of the Smart Machine? Digitalisation and the Children of the Mainframe.” Scandinavian Journal of Information Systems 28: 3.
  • Strycharz, J., J. Ausloos, and N. Helberger. 2020. “Data Protection or Data Frustration? Individual Perceptions and Attitudes Towards the GDPR.” European Data Protection Law Review 6: 407–421. https://doi.org/10.21552/edpl/2020/3/10.
  • Strycharz, J., E. Smit, N. Helberger, and G. Van Noort. 2021. “No to Cookies: Empowering Impact of Technical and Legal Knowledge on Rejecting Tracking Cookies.” Computers in Human Behavior 120: 106750. https://doi.org/10.1016/j.chb.2021.106750
  • Strycharz, J., G. Van Noort, E. Smit, and N. Helberger. 2019. “Protective Behavior Against Personalized Ads: Motivation to Turn Personalization off.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 13 (2). https://doi.org/10.5817/CP2019-2-1.
  • Sturgeon, T. J. 2021. “Upgrading Strategies for the Digital Economy.” Global Strategy Journal 11 (1): 34–57. https://doi.org/10.1002/gsj.1364
  • Tabachnick, B. G., L. S. Fidell, and J. B. Ullman. 2007. Using Multivariate Statistics. Boston, MA: Pearson.
  • Tamilmani, K., N. P. Rana, and Y. K. Dwivedi. 2020a. “Consumer Acceptance and use of Information Technology: A Meta-Analytic Evaluation of UTAUT2.” Information Systems Frontiers 23: 987–1005. https://doi.org/10.1007/s10796-020-10007-6.
  • Tamilmani, K., N. P. Rana, R. Nunkoo, V. Raghavan, and Y. K. Dwivedi. 2020b. “Indian Travellers’ Adoption of Airbnb Platform.” Information Systems Frontiers 24: 77–96. https://doi.org/10.1007/s10796-020-10060-1.
  • Tankard, C. 2016. “What the GDPR Means for Businesses.” Network Security 2016 (6): 5–8. https://doi.org/10.1016/S1353-4858(16)30056-3
  • Tatar, U., Y. Gokce, and B. Nussbaum. 2020. “Law Versus Technology: Blockchain, GDPR, and Tough Tradeoffs.” . Computer Law & Security Review 38: 105454. https://doi.org/10.1016/j.clsr.2020.105454
  • Thomas, K. W., and B. A. Velthouse. 1990. “Cognitive Elements of Empowerment: An “Interpretive” Model of Intrinsic Task Motivation.” Academy of Management Review 15: 666–681.
  • Thompson, C. G., R. S. Kim, A. M. Aloe, and B. J. Becker. 2017. “Extracting the Variance Inflation Factor and Other Multicollinearity Diagnostics from Typical Regression Results.” Basic and Applied Social Psychology 39 (2): 81–90. https://doi.org/10.1080/01973533.2016.1277529
  • Tikkinen-Piri, C., A. Rohunen, and J. Markkula. 2018. “EU General Data Protection Regulation: Changes and Implications for Personal Data Collecting Companies.” Computer Law & Security Review 34 (1): 134–153. https://doi.org/10.1016/j.clsr.2017.05.015
  • Tolsdorf, J., F. Dehling, and L. Lo Iacono. 2022. “Data Cart – Designing a Tool for the GDPR-Compliant Handling of Personal Data by Employees.” Behaviour & Information Technology 41 (10): 2084–2119. https://doi.org/10.1080/0144929X.2022.2069596.
  • Truong, N. B., K. Sun, G. M. Lee, and Y. Guo. 2019. “Gdpr-compliant Personal Data Management: A Blockchain-Based Solution.” IEEE Transactions on Information Forensics and Security 15: 1746–1761. https://doi.org/10.1109/TIFS.2019.2948287.
  • Tsai, H.-Y. S., M. Jiang, S. Alhabash, R. Larose, N. J. Rifon, and S. R. Cotten. 2016. “Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective.” Computers & Security 59: 138–150. https://doi.org/10.1016/j.cose.2016.02.009
  • Urbaczewski, A., and Y. J. Lee. 2020. “Information Technology and the Pandemic: A Preliminary Multinational Analysis of the Impact of Mobile Tracking Technology on the COVID-19 Contagion Control.” European Journal of Information Systems 29 (4): 405–414. https://doi.org/10.1080/0960085X.2020.1802358
  • Urbonavicius, S., M. Degutis, I. Zimaitis, V. Kaduskeviciute, and V. Skare. 2021. “From Social Networking to Willingness to Disclose Personal Data When Shopping Online: Modelling in the Context of Social Exchange Theory.” Journal of Business Research 136: 76–85. https://doi.org/10.1016/j.jbusres.2021.07.031
  • Vance, A., M. Siponen, and S. Pahnila. 2012. “Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory.” Information & Management 49 (3-4): 190–198. https://doi.org/10.1016/j.im.2012.04.002
  • Van Ooijen, I., and H. U. Vrabec. 2019. “Does the GDPR Enhance Consumers’ Control over Personal Data? An Analysis from a Behavioural Perspective.” Journal of Consumer Policy 42 (1): 91–107. https://doi.org/10.1007/s10603-018-9399-7
  • Venkatesh, V. 2020. “Impacts of COVID-19: A Research Agenda to Support People in Their Fight.” International Journal of Information Management 55: 102197. https://doi.org/10.1016/j.ijinfomgt.2020.102197
  • Vlahou, A., D. Hallinan, R. Apweiler, A. Argiles, J. Beige, A. Benigni, R. Bischoff, P. C. Black, F. Boehm, and J. Céraline. 2021. “Data Sharing Under the General Data Protection Regulation: Time to Harmonize Law and Research Ethics?” Hypertension 77 (4): 1029–1035. https://doi.org/10.1161/HYPERTENSIONAHA.120.16340
  • Voss, W. G., and K. A. Houser. 2019. “Personal Data and the GDPR: Providing a Competitive Advantage for US Companies.” American Business Law Journal 56 (2): 287–344. https://doi.org/10.1111/ablj.12139
  • Wachter, S., B. Mittelstadt, and C. Russell. 2017. “Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR.” Harvard Journal of Law & Technology 31: 841.
  • Wieringa, J., P. Kannan, X. Ma, T. Reutterer, H. Risselada, and B. Skiera. 2021. “Data Analytics in a Privacy-Concerned World.” Journal of Business Research 122: 915–925. https://doi.org/10.1016/j.jbusres.2019.05.005
  • Wilke, L. A., and P. W. Speer. 2011. “The Mediating Influence of Organizational Characteristics in the Relationship Between Organizational Type and Relational Power: An Extension of Psychological Empowerment Research.” Journal of Community Psychology 39 (8): 972–986. https://doi.org/10.1002/jcop.20484
  • Woon, I., G.-W. Tan, and R. Low. 2005. “A Protection Motivation Theory Approach to Home Wireless Security.” In ICIS 2005 Proceedings, 31.
  • Wu, D. 2020. “Empirical Study of Knowledge Withholding in Cyberspace: Integrating Protection Motivation Theory and Theory of Reasoned Behavior.” Computers in Human Behavior 105: 106229. https://doi.org/10.1016/j.chb.2019.106229
  • Wu, K.-W., S. Y. Huang, D. C. Yen, and I. Popova. 2012. “The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust.” Computers in Human Behavior 28 (3): 889–897. https://doi.org/10.1016/j.chb.2011.12.008
  • Zaeem, R. N., and K. S. Barber. 2020. “The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise.” ACM Transactions on Management Information Systems (TMIS) 12: 1–20.
  • Zarsky, T. Z. 2016. “Incompatible: The GDPR in the Age of Big Data.” Seton Hall Law Review 47: 995.
  • Zhang, Y., T. Wang, and C. Hsu. 2020. “The Effects of Voluntary GDPR Adoption and the Readability of Privacy Statements on Customers’ Information Disclosure Intention and Trust.” Journal of Intellectual Capital 21 (2): 145–163. https://doi.org/10.1108/JIC-05-2019-0113.
  • Ziegler, S., E. Evequoz, and A. M. P. Huamani. 2019. “The Impact of the European General Data Protection Regulation (GDPR) on Future Data Business Models: Toward a New Paradigm and Business Opportunities.” In Digital Business Models, edited by A. Aagaard. London Borough of Camden: Springer.
  • Zimmerman, M. A. 1995. “Psychological Empowerment: Issues and Illustrations.” American Journal of Community Psychology 23 (5): 581–599. https://doi.org/10.1007/BF02506983