References
- Albrecht, J. P. 2016. “How the GDPR Will Change the World.” European Data Protection Law Review 2 (3): 287. https://doi.org/10.21552/EDPL/2016/3/4.
- Amram, D. 2020. “Building up the “Accountable Ulysses” Model. The Impact of GDPR and National Implementations, Ethics, and Health-Data Research: Comparative Remarks.” Computer Law & Security Review 37: 105413. https://doi.org/10.1016/j.clsr.2020.105413
- Asghar, M. N., N. Kanwal, B. Lee, M. Fleury, M. Herbst, and Y. Qiao. 2019. “Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective.” IEEE Access 7: 111709–111726. https://doi.org/10.1109/ACCESS.2019.2934226
- Badii, C., P. Bellini, A. Difino, and P. Nesi. 2020. “Smart City IoT Platform Respecting GDPR Privacy and Security Aspects.” IEEE Access 8: 23601–23623. https://doi.org/10.1109/ACCESS.2020.2968741
- Balapour, A., H. R. Nikkhah, and R. Sabherwal. 2020. “Mobile Application Security: Role of Perceived Privacy as the Predictor of Security Perceptions.” International Journal of Information Management 52: 102063. https://doi.org/10.1016/j.ijinfomgt.2019.102063
- Bandura, A. 1977. “Self-efficacy: Toward a Unifying Theory of Behavioral Change.” Psychological Review 84 (2): 191–215. https://doi.org/10.1037/0033-295X.84.2.191.
- Bandura, A. 1982. “Self-efficacy Mechanism in Human Agency.” American Psychologist 37 (2): 122. https://doi.org/10.1037/0003-066X.37.2.122.
- Barth, S., and M. D. de Jong. 2017. “The Privacy Paradox–Investigating Discrepancies Between Expressed Privacy Concerns and Actual Online Behavior–A Systematic Literature Review.” Telematics and Informatics 34 (7): 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
- Bassi, E., N. Bloise, J. Dirutigliano, G. P. Fici, U. Pagallo, S. Primatesta, and F. Quagliotti. 2019. “The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.” Minds and Machines 29 (4): 579–601. https://doi.org/10.1007/s11023-019-09511-9
- Beckers, A. 2018. “Environmental Protection Meets Consumer Sales.” European Review of Contract Law 14 (2): 157–189. https://doi.org/10.1515/ercl-2018-1009.
- Bell, G. B. 2011. “Digital Whistleblowing in Restricted Environments.” Journal of Digital Information 12 (3): 1–14.
- Boshoff, C. 1997. “An Experimental Study of Service Recovery Options.” International Journal of Service Industry Management 8 (2): 110–130. https://doi.org/10.1108/09564239710166245.
- Boshoff, C., and J. Leong. 1998. “Empowerment, Attribution and Apologising as Dimensions of Service Recovery: An Experimental Study.” International Journal of Service Industry Management 9 (1): 24–47. https://doi.org/10.1108/09564239810199932.
- Boss, S. R., D. F. Galletta, P. B. Lowry, G. D. Moody, and P. Polak. 2015. “What do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors.” MIS Quarterly 39 (4): 837–864.
- Byrd, K., A. Fan, E. Her, Y. Liu, S. Leitch, and B. Almanza. 2023. “Restaurant Patronage During the COVID-19 Pandemic and the Protection Motivation Theory: Influence of Consumers’ Socio-Demographic, Situational, and Psychographic Factors.” Journal of Foodservice Business Research 26 (2): 247–275. https://doi.org/10.1080/15378020.2021.2006036
- Campanile, L., M. Iacono, F. Marulli, and M. Mastroianni. 2021. “Designing a GDPR Compliant Blockchain-Based IoV Distributed Information Tracking System.” Information Processing & Management 58 (3): 102511. https://doi.org/10.1016/j.ipm.2021.102511
- Carrascal, J. P., C. Riederer, V. Erramilli, M. Cherubini, and R. De Oliveira. 2013. “Your Browsing Behavior for a Big Mac: Economics of Personal Information Online.” In Proceedings of the 22nd International Conference on World Wide Web, 189–200.
- Carroll, N., and K. Conboy. 2020. “Normalising the “New Normal”: Changing Tech-Driven Work Practices Under Pandemic Time Pressure.” International Journal of Information Management 55: 102186. https://doi.org/10.1016/j.ijinfomgt.2020.102186
- Chen, K.-Y., and C.-F. Yeh. 2017. “Factors Affecting Adoption of Smart Meters in the Post-Fukushima era in Taiwan: An Extended Protection Motivation Theory Perspective.” Behaviour & Information Technology 36 (9): 955–969. https://doi.org/10.1080/0144929X.2017.1317363
- Chen, C., K. Z. Zhang, X. Gong, M. K. Lee, and Y. Wang. 2020. “Decreasing the Problematic use of an Information System: An Empirical Investigation of Smartphone Game Players.” Information Systems Journal 30 (3): 492–534. https://doi.org/10.1111/isj.12264
- Chenoweth, T., R. Minch, and T. Gattiker. 2009. “Application of Protection Motivation Theory to Adoption of Protective Technologies.” In 2009 42nd Hawaii International Conference on System Sciences, 1–10. IEEE.
- Christens, B. D., J. J. Collura, and F. Tahir. 2013. “Critical Hopefulness: A Person-Centered Analysis of the Intersection of Cognitive and Emotional Empowerment.” American Journal of Community Psychology 52 (1-2): 170–184. https://doi.org/10.1007/s10464-013-9586-2
- Cram, W. A., J. G. Proudfoot, and J. D’arcy. 2017. “Organizational Information Security Policies: A Review and Research Framework.” European Journal of Information Systems 26 (6): 605–641. https://doi.org/10.1057/s41303-017-0059-9
- Crossler, R. E. 2010. “Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data.” In 2010 43rd Hawaii International Conference on System Sciences, 1–10. IEEE.
- Crossler, R., and F. Bélanger. 2014. “An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems 45 (4): 51–71. https://doi.org/10.1145/2691517.2691521
- Crossler, R. E., J. H. Long, T. M. Loraas, and B. S. Trinkle. 2014. “Understanding Compliance with Bring Your own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior gap.” Journal of Information Systems 28 (1): 209–226. https://doi.org/10.2308/isys-50704
- Culnan, M. J., and P. K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10 (1): 104–115. https://doi.org/10.1287/orsc.10.1.104
- De Búrca, G. 2020. “Introduction to the Symposium on the GDPR and International Law.” American Journal of International Law 114 (1): 1–4. https://doi.org/10.1017/ajil.2019.70
- De Carvalho, L. G., M. Fantinato, and M. M. Eler. 2020. “Security Requirements Identification and Prioritization for Smart Toys.” Electronic Commerce Research and Applications 41: 100972. https://doi.org/10.1016/j.elerap.2020.100972
- De Hert, P., V. Papakonstantinou, G. Malgieri, L. Beslay, and I. Sanchez. 2018. “The Right to Data Portability in the GDPR: Towards User-Centric Interoperability of Digital Services.” Computer Law & Security Review 34 (2): 193–203. https://doi.org/10.1016/j.clsr.2017.10.003
- De Kimpe, Lies, Michel Walrave, Pieter Verdegem, and Koen Ponnet. 2022. “What We Think We Know About Cybersecurity: An Investigation of the Relationship Between Perceived Knowledge, Internet Trust, and Protection Motivation in a Cybercrime Context.” Behaviour & Information Technology 41 (8): 1796–1808. http://dx.doi.org/10.1080/0144929X.2021.1905066.
- Dinev, T., and P. Hart. 2006. “An Extended Privacy Calculus Model for e-Commerce Transactions.” Information Systems Research 17 (1): 61–80. https://doi.org/10.1287/isre.1060.0080
- Egelman, S., A. P. Felt, and D. Wagner. 2013. “Choice Architecture and Smartphone Privacy: There’s a Price for That.” In The Economics of Information Security and Privacy, edited by R. Böhme, 211–236. Berlin: Springer.
- Elliott, M. A., C. J. Armitage, and C. J. Baughan. 2007. “Using the Theory of Planned Behaviour to Predict Observed Driving Behaviour.” British Journal of Social Psychology 46 (1): 69–90. https://doi.org/10.1348/014466605X90801
- Floyd, D. L., S. Prentice-Dunn, and R. W. Rogers. 2000. “A Meta-Analysis of Research on Protection Motivation Theory.” Journal of Applied Social Psychology 30 (2): 407–429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Forcier, M. B., H. Gallois, S. Mullan, and Y. Joly. 2019. “Integrating Artificial Intelligence Into Health Care Through Data Access: Can the GDPR act as a Beacon for Policymakers?” Journal of Law and the Biosciences 6 (1): 317. https://doi.org/10.1093/jlb/lsz013
- Goddard, M. 2017. “The EU General Data Protection Regulation (GDPR): European Regulation That has a Global Impact.” International Journal of Market Research 59 (6): 703–705. https://doi.org/10.2501/IJMR-2017-050
- Guchait, P., M. G. Kim, and K. Namasivayam. 2012. “Error Management at Different Organizational Levels–Frontline, Manager, and Company.” International Journal of Hospitality Management 31 (1): 12–22. https://doi.org/10.1016/j.ijhm.2011.04.007
- Hagiu, A., and J. Wright. 2020. “When Data Creates Competitive Advantage.” Harvard Business Review 98: 94–101.
- Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson. 2014. Multivariate Data Analysis: Pearson New International Edition. Essex: Pearson.
- Hann, I.-H., K.-L. Hui, S.-Y. T. Lee, and I. P. Png. 2007. “Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach.” Journal of Management Information Systems 24 (2): 13–42. https://doi.org/10.2753/MIS0742-1222240202
- Haque, A. B., A. N. Islam, S. Hyrynsalmi, B. Naqvi, and K. Smolander. 2021. “GDPR Compliant Blockchains–A Systematic Literature Review.” IEEE Access 9: 50593–50606. https://doi.org/10.1109/ACCESS.2021.3069877.
- Hartman, T., H. Kennedy, R. Steedman, and R. Jones. 2020. “Public Perceptions of Good Data Management: Findings from a UK-Based Survey.” Big Data & Society 7 (1): 2053951720935616. https://doi.org/10.1177/2053951720935616
- Hasan, R., R. Shams, and M. Rahman. 2021. “Consumer Trust and Perceived Risk for Voice-Controlled Artificial Intelligence: The Case of Siri.” Journal of Business Research 131: 591–597. https://doi.org/10.1016/j.jbusres.2020.12.012
- Herath, T., R. Chen, J. Wang, K. Banjara, J. Wilbur, and H. R. Rao. 2014. “Security Services as Coping Mechanisms: An Investigation Into User Intention to Adopt an Email Authentication Service.” Information Systems Journal 24 (1): 61–84. https://doi.org/10.1111/j.1365-2575.2012.00420.x
- Hsieh, P.-J., and H.-M. Lai. 2020. “Exploring Peoples Intentions to use the Health Passbook in Self-Management: An Extension of the Technology Acceptance and Health Behavior Theoretical Perspectives in Health Literacy.” Technological Forecasting and Social Change 161: 120328. https://doi.org/10.1016/j.techfore.2020.120328
- Huberman, B. A., E. Adar, and L. R. Fine. 2005. “Valuating Privacy.” IEEE Security & Privacy 3 (5): 22–25. https://doi.org/10.1109/MSP.2005.137
- Hustinx, P. 2021. “Data Protection and International Organizations: A Dialogue Between EU law and International law.” International Data Privacy Law 11 (2): 77–80. https://doi.org/10.1093/idpl/ipab015.
- Ifinedo, P. 2012. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers & Security 31 (1): 83–95. https://doi.org/10.1016/j.cose.2011.10.007
- Johnston, A. C., and M. Warkentin. 2010. “Fear Appeals and Information Security Behaviors: An Empirical Study.” MIS Quarterly 34 (3): 549–566. https://doi.org/10.2307/25750691.
- Kaapu, T., and T. Tiainen. 2009. “Consumers’ Views on Privacy in E-Commerce.” Scandinavian Journal of Information Systems 21: 1.
- Karahanna, E., D. W. Straub, and N. L. Chervany. 1999. “Information Technology Adoption Across Time: A Cross-Sectional Comparison of pre-Adoption and Post-Adoption Beliefs.” MIS Quarterly 23 (2): 183–213. https://doi.org/10.2307/249751.
- Karampela, M., S. Ouhbi, and M. Isomursu. 2019. “Exploring Users’ Willingness to Share Their Health and Personal Data Under the Prism of the New GDPR: Implications in Healthcare.” In 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 6509–6512. IEEE.
- Kokolakis, S. 2017. “Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon.” Computers & Security 64: 122–134. https://doi.org/10.1016/j.cose.2015.07.002
- Kounoudes, A. D., and G. M. Kapitsaki. 2020. “A Mapping of IoT User-Centric Privacy Preserving Approaches to the GDPR.” Internet of Things 11: 100179. https://doi.org/10.1016/j.iot.2020.100179
- Kuner, C. 2020. “The GDPR and International Organizations.” American Journal of International Law 114: 15–19.
- Larrucea, X., M. Moffie, S. Asaf, and I. Santamaria. 2020. “Towards a GDPR Compliant way to Secure European Cross Border Healthcare Industry 4.0.” Computer Standards & Interfaces 69: 103408. https://doi.org/10.1016/j.csi.2019.103408
- Lee, Y. 2011. “Understanding Anti-Plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective.” Decision Support Systems 50 (2): 361–369. https://doi.org/10.1016/j.dss.2010.07.009
- Lee, Y., and K. R. Larsen. 2009. “Threat or Coping Appraisal: Determinants of SMB Executives’ Decision to Adopt Anti-Malware Software.” European Journal of Information Systems 18 (2): 177–187. https://doi.org/10.1057/ejis.2009.11
- Leiser, M. 2019. “Regulating Computational Propaganda: Lessons from International law.” Cambridge International Law Journal 8 (2): 218–240. https://doi.org/10.4337/cilj.2019.02.03
- Leite, L., D. R. Dos Santos, and F. Almeida. 2022. “The Impact of General Data Protection Regulation on Software Engineering Practices.” Information & Computer Security 30 (1): 79–96. https://doi.org/10.1108/ICS-03-2020-0043.
- Lumor, T., M. Pulkkinen, A. Hirvonen, and P. Neittaanmäki. 2021. “Creating the Socio-Technical Context Needed to Derive Benefits from Big Data Initiatives in Healthcare.” Scandinavian Journal of Information Systems 33: 1.
- Mak, V., and E. Terryn. 2020. “Circular Economy and Consumer Protection: The Consumer as a Citizen and the Limits of Empowerment Through Consumer law.” Journal of Consumer Policy 43 (1): 227–248. https://doi.org/10.1007/s10603-019-09435-y
- Mangini, V., I. Tal, and A.-N. Moldovan. 2020. “An Empirical Study on the Impact of GDPR and Right to Be Forgotten-Organisations and Users Perspective.” In Proceedings of the 15th International Conference on Availability, Reliability and Security, 1–9.
- Manika, D., D. Gregory-Smith, and S. Papagiannidis. 2018. “The Influence of Prior Knowledge Structures on Website Attitudes and Behavioral Intentions.” Computers in Human Behavior 78: 44–58. https://doi.org/10.1016/j.chb.2017.09.024
- Marabelli, M., E. Vaast, and J. L. Li. 2021. “Preventing the Digital Scars of COVID-19.” European Journal of Information Systems 30 (2): 176–192. https://doi.org/10.1080/0960085X.2020.1863752
- Marikyan, D., S. Papagiannidis, O. F. Rana, and R. Ranjan. 2022. “Blockchain Adoption: A Study of Cognitive Factors Underpinning Decision Making.” Computers in Human Behavior 131: 107207. https://doi.org/10.1016/j.chb.2022.107207.
- Maton, K. I. 2008. “Empowering Community Settings: Agents of Individual Development, Community Betterment, and Positive Social Change.” American Journal of Community Psychology 41 (1–2): 4–21. https://doi.org/10.1007/s10464-007-9148-6
- Menard, P., G. J. Bott, and R. E. Crossler. 2017. “User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.” Journal of Management Information Systems 34 (4): 1203–1230. https://doi.org/10.1080/07421222.2017.1394083
- Mora, H., J. C. Mendoza-Tello, E. G. Varela-Guzmán, and J. Szymanski. 2021. “Blockchain Technologies to Address Smart City and Society Challenges.” Computers in Human Behavior 122: 106854. https://doi.org/10.1016/j.chb.2021.106854
- Mougiakou, E., and M. Virvou. 2017. “Based on GDPR Privacy in UML: Case of e-Learning Program.” In 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA), 1–8. IEEE.
- Mousavi, R., R. Chen, D. J. Kim, and K. Chen. 2020. “Effectiveness of Privacy Assurance Mechanisms in Users’ Privacy Protection on Social Networking Sites from the Perspective of Protection Motivation Theory.” Decision Support Systems 135: 113323. https://doi.org/10.1016/j.dss.2020.113323
- Nienaber, A.-M., S. Spundflasch, A. Soares, and A. Woodcock. 2021. “Distrust as a Hazard for Future Sustainable Mobility Planning. Rethinking Employees’ Vulnerability When Introducing New Information and Communication Technologies in Local Authorities.” International Journal of Human–Computer Interaction 37 (4): 390–401. https://doi.org/10.1080/10447318.2020.1860547
- Oghazi, P., R. Schultheiss, K. Chirumalla, N. P. Kalmer, and F. F. Rad. 2020. “User Self-Disclosure on Social Network Sites: A Cross-Cultural Study on Facebook’s Privacy Concepts.” Journal of Business Research 112: 531–540. https://doi.org/10.1016/j.jbusres.2019.12.006
- Orazi, D. C., and A. C. Johnston. 2020. “Running Field Experiments Using Facebook Split Test.” Journal of Business Research 118: 189–198. https://doi.org/10.1016/j.jbusres.2020.06.053
- Pandey, N., and A. Pal. 2020. “Impact of Digital Surge During Covid-19 Pandemic: A Viewpoint on Research and Practice.” International Journal of Information Management 55: 102171. https://doi.org/10.1016/j.ijinfomgt.2020.102171
- Papagiannidis, S., J. Harris, and D. Morton. 2020. “WHO led the Digital Transformation of Your Company? A Reflection of IT Related Challenges During the Pandemic.” International Journal of Information Management 55: 102166. https://doi.org/10.1016/j.ijinfomgt.2020.102166
- Paul, C., K. Scheibe, and S. Nilakanta. 2020. “Privacy Concerns Regarding Wearable IoT Devices: How It Is Influenced by GDPR?” Proceedings of the 53rd Hawaii International Conference on System Sciences.
- Perera, H., W. Hussain, D. Mougouei, R. A. Shams, A. Nurwidyantoro, and J. Whittle. 2019. “Towards Integrating Human Values into Software: Mapping Principles and Rights of GDPR to Values.” In 2019 IEEE 27th International Requirements Engineering Conference (RE), 404–409. IEEE.
- Peterson, N. A. 2014. “Empowerment Theory: Clarifying the Nature of Higher-Order Multidimensional Constructs.” American Journal of Community Psychology 53 (1-2): 96–108. https://doi.org/10.1007/s10464-013-9624-0
- Peterson, N. A., D. T. Lardier, K. G. Powell, E. Mankopf, M. Rashid, C. M. Morton, and S. Borys. 2021. “Psychometric Properties of a Recovery Empowerment Scale: Testing Emotional, Cognitive, Behavioral, and Relational Domains.” Journal of Community Psychology 49 (7): 2874–2891. https://doi.org/10.1002/jcop.22592.
- Pins, D., T. Jakobi, G. Stevens, F. Alizadeh, and J. Krüger. 2022. “Finding, Getting and Understanding: The User Journey for the GDPR’S Right to Access.” Behaviour & Information Technology 41 (10): 2174–2200. https://doi.org/10.1080/0144929X.2022.2074894.
- Podsakoff, P. M., S. B. Mackenzie, J.-Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology 88 (5): 879–903. https://doi.org/10.1037/0021-9010.88.5.879.
- Porter, C. E., and N. Donthu. 2006. “Using the Technology Acceptance Model to Explain how Attitudes Determine Internet Usage: The Role of Perceived Access Barriers and Demographics.” Journal of Business Research 59 (9): 999–1007. https://doi.org/10.1016/j.jbusres.2006.06.003
- Presthus, W., and K. F. Sønslien. 2021. “An analysis of violations and sanctions following the GDPR.” International Journal of Information Systems and Project Management 9 (1): 38–53. https://doi.org/10.12821/ijispm090102.
- Ratchford, M., and B. T. Ratchford. 2021. “A Cross-Category Analysis of Dispositional Drivers of Technology Adoption.” Journal of Business Research 127: 300–311. https://doi.org/10.1016/j.jbusres.2021.01.037
- Renwick, R., and R. Gleasure. 2021. “Those who Control the Code Control the Rules: How Different Perspectives of Privacy are Being Written Into the Code of Blockchain Systems.” Journal of Information Technology 36 (1): 16–38. https://doi.org/10.1177/0268396220944406
- Rippetoe, P. A., and R. W. Rogers. 1987. “Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat.” Journal of Personality and Social Psychology 52 (3): 596–604. https://doi.org/10.1037/0022-3514.52.3.596.
- Rochel, J. 2021. “Ethics in the GDPR: A Blueprint for Applied Legal Theory.” International Data Privacy Law 11 (2): 209–223. https://doi.org/10.1093/idpl/ipab007.
- Rodrigues, M., I. Menezes, and P. D. Ferreira. 2018. “Validating the Formative Nature of Psychological Empowerment Construct: Testing Cognitive, Emotional, Behavioral, and Relational Empowerment Components.” Journal of Community Psychology 46 (1): 58–78. https://doi.org/10.1002/jcop.21916
- Rogers, R. W. 1983. “Cognitive and Psychological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation.” In Social Psychophysiology: A Sourcebook, edited by J. T. Cacioppo and R. Petty, 153–176. New York: Guilford Press.
- Rohunen, A., and J. Markkula. 2019. “On the Road–Listening to Data Subjects’ Personal Mobility Data Privacy Concerns.” Behaviour & Information Technology 38 (5): 486–502. https://doi.org/10.1080/0144929X.2018.1540658
- Sanchez-Rola, I., M. Dell'amico, P. Kotzias, D. Balzarotti, L. Bilge, P.-A. Vervier, and I. Santos. 2019. “Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control.” In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 340–351.
- Schwarz, N. 2007. “Attitude Construction: Evaluation in Context.” Social Cognition 25 (5): 638–656. https://doi.org/10.1521/soco.2007.25.5.638
- Sørensen, C. 2016. “The Curse of the Smart Machine? Digitalisation and the Children of the Mainframe.” Scandinavian Journal of Information Systems 28: 3.
- Strycharz, J., J. Ausloos, and N. Helberger. 2020. “Data Protection or Data Frustration? Individual Perceptions and Attitudes Towards the GDPR.” European Data Protection Law Review 6: 407–421. https://doi.org/10.21552/edpl/2020/3/10.
- Strycharz, J., E. Smit, N. Helberger, and G. Van Noort. 2021. “No to Cookies: Empowering Impact of Technical and Legal Knowledge on Rejecting Tracking Cookies.” Computers in Human Behavior 120: 106750. https://doi.org/10.1016/j.chb.2021.106750
- Strycharz, J., G. Van Noort, E. Smit, and N. Helberger. 2019. “Protective Behavior Against Personalized Ads: Motivation to Turn Personalization off.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 13 (2). https://doi.org/10.5817/CP2019-2-1.
- Sturgeon, T. J. 2021. “Upgrading Strategies for the Digital Economy.” Global Strategy Journal 11 (1): 34–57. https://doi.org/10.1002/gsj.1364
- Tabachnick, B. G., L. S. Fidell, and J. B. Ullman. 2007. Using Multivariate Statistics. Boston, MA: Pearson.
- Tamilmani, K., N. P. Rana, and Y. K. Dwivedi. 2020a. “Consumer Acceptance and use of Information Technology: A Meta-Analytic Evaluation of UTAUT2.” Information Systems Frontiers 23: 987–1005. https://doi.org/10.1007/s10796-020-10007-6.
- Tamilmani, K., N. P. Rana, R. Nunkoo, V. Raghavan, and Y. K. Dwivedi. 2020b. “Indian Travellers’ Adoption of Airbnb Platform.” Information Systems Frontiers 24: 77–96. https://doi.org/10.1007/s10796-020-10060-1.
- Tankard, C. 2016. “What the GDPR Means for Businesses.” Network Security 2016 (6): 5–8. https://doi.org/10.1016/S1353-4858(16)30056-3
- Tatar, U., Y. Gokce, and B. Nussbaum. 2020. “Law Versus Technology: Blockchain, GDPR, and Tough Tradeoffs.” . Computer Law & Security Review 38: 105454. https://doi.org/10.1016/j.clsr.2020.105454
- Thomas, K. W., and B. A. Velthouse. 1990. “Cognitive Elements of Empowerment: An “Interpretive” Model of Intrinsic Task Motivation.” Academy of Management Review 15: 666–681.
- Thompson, C. G., R. S. Kim, A. M. Aloe, and B. J. Becker. 2017. “Extracting the Variance Inflation Factor and Other Multicollinearity Diagnostics from Typical Regression Results.” Basic and Applied Social Psychology 39 (2): 81–90. https://doi.org/10.1080/01973533.2016.1277529
- Tikkinen-Piri, C., A. Rohunen, and J. Markkula. 2018. “EU General Data Protection Regulation: Changes and Implications for Personal Data Collecting Companies.” Computer Law & Security Review 34 (1): 134–153. https://doi.org/10.1016/j.clsr.2017.05.015
- Tolsdorf, J., F. Dehling, and L. Lo Iacono. 2022. “Data Cart – Designing a Tool for the GDPR-Compliant Handling of Personal Data by Employees.” Behaviour & Information Technology 41 (10): 2084–2119. https://doi.org/10.1080/0144929X.2022.2069596.
- Truong, N. B., K. Sun, G. M. Lee, and Y. Guo. 2019. “Gdpr-compliant Personal Data Management: A Blockchain-Based Solution.” IEEE Transactions on Information Forensics and Security 15: 1746–1761. https://doi.org/10.1109/TIFS.2019.2948287.
- Tsai, H.-Y. S., M. Jiang, S. Alhabash, R. Larose, N. J. Rifon, and S. R. Cotten. 2016. “Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective.” Computers & Security 59: 138–150. https://doi.org/10.1016/j.cose.2016.02.009
- Urbaczewski, A., and Y. J. Lee. 2020. “Information Technology and the Pandemic: A Preliminary Multinational Analysis of the Impact of Mobile Tracking Technology on the COVID-19 Contagion Control.” European Journal of Information Systems 29 (4): 405–414. https://doi.org/10.1080/0960085X.2020.1802358
- Urbonavicius, S., M. Degutis, I. Zimaitis, V. Kaduskeviciute, and V. Skare. 2021. “From Social Networking to Willingness to Disclose Personal Data When Shopping Online: Modelling in the Context of Social Exchange Theory.” Journal of Business Research 136: 76–85. https://doi.org/10.1016/j.jbusres.2021.07.031
- Vance, A., M. Siponen, and S. Pahnila. 2012. “Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory.” Information & Management 49 (3-4): 190–198. https://doi.org/10.1016/j.im.2012.04.002
- Van Ooijen, I., and H. U. Vrabec. 2019. “Does the GDPR Enhance Consumers’ Control over Personal Data? An Analysis from a Behavioural Perspective.” Journal of Consumer Policy 42 (1): 91–107. https://doi.org/10.1007/s10603-018-9399-7
- Venkatesh, V. 2020. “Impacts of COVID-19: A Research Agenda to Support People in Their Fight.” International Journal of Information Management 55: 102197. https://doi.org/10.1016/j.ijinfomgt.2020.102197
- Vlahou, A., D. Hallinan, R. Apweiler, A. Argiles, J. Beige, A. Benigni, R. Bischoff, P. C. Black, F. Boehm, and J. Céraline. 2021. “Data Sharing Under the General Data Protection Regulation: Time to Harmonize Law and Research Ethics?” Hypertension 77 (4): 1029–1035. https://doi.org/10.1161/HYPERTENSIONAHA.120.16340
- Voss, W. G., and K. A. Houser. 2019. “Personal Data and the GDPR: Providing a Competitive Advantage for US Companies.” American Business Law Journal 56 (2): 287–344. https://doi.org/10.1111/ablj.12139
- Wachter, S., B. Mittelstadt, and C. Russell. 2017. “Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR.” Harvard Journal of Law & Technology 31: 841.
- Wieringa, J., P. Kannan, X. Ma, T. Reutterer, H. Risselada, and B. Skiera. 2021. “Data Analytics in a Privacy-Concerned World.” Journal of Business Research 122: 915–925. https://doi.org/10.1016/j.jbusres.2019.05.005
- Wilke, L. A., and P. W. Speer. 2011. “The Mediating Influence of Organizational Characteristics in the Relationship Between Organizational Type and Relational Power: An Extension of Psychological Empowerment Research.” Journal of Community Psychology 39 (8): 972–986. https://doi.org/10.1002/jcop.20484
- Woon, I., G.-W. Tan, and R. Low. 2005. “A Protection Motivation Theory Approach to Home Wireless Security.” In ICIS 2005 Proceedings, 31.
- Wu, D. 2020. “Empirical Study of Knowledge Withholding in Cyberspace: Integrating Protection Motivation Theory and Theory of Reasoned Behavior.” Computers in Human Behavior 105: 106229. https://doi.org/10.1016/j.chb.2019.106229
- Wu, K.-W., S. Y. Huang, D. C. Yen, and I. Popova. 2012. “The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust.” Computers in Human Behavior 28 (3): 889–897. https://doi.org/10.1016/j.chb.2011.12.008
- Zaeem, R. N., and K. S. Barber. 2020. “The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise.” ACM Transactions on Management Information Systems (TMIS) 12: 1–20.
- Zarsky, T. Z. 2016. “Incompatible: The GDPR in the Age of Big Data.” Seton Hall Law Review 47: 995.
- Zhang, Y., T. Wang, and C. Hsu. 2020. “The Effects of Voluntary GDPR Adoption and the Readability of Privacy Statements on Customers’ Information Disclosure Intention and Trust.” Journal of Intellectual Capital 21 (2): 145–163. https://doi.org/10.1108/JIC-05-2019-0113.
- Ziegler, S., E. Evequoz, and A. M. P. Huamani. 2019. “The Impact of the European General Data Protection Regulation (GDPR) on Future Data Business Models: Toward a New Paradigm and Business Opportunities.” In Digital Business Models, edited by A. Aagaard. London Borough of Camden: Springer.
- Zimmerman, M. A. 1995. “Psychological Empowerment: Issues and Illustrations.” American Journal of Community Psychology 23 (5): 581–599. https://doi.org/10.1007/BF02506983