References
- Anderson J, Gerbing D. Some methods for respecifying measurement models to obtain uni-dimensional construct measurement. J Marketing Res. 1982;19(4):453–460.
- Bansal G, Zahedi F. Trading trust for discount: does frugality moderate the impact of privacy and security concerns? in the proceedings of Sixteenth Americas Conference on Information Systems; Lima, Peru. 2010.
- Bansal G, Zahedi F. Trading trust for discount: the role of frugality in moderating the impact of privacy and security concerns in three contexts. J Comput Inf Syst. 2014;55(1): 13–29.
- Bansal G, Zahedi FM, Gefen D. The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. in the proceedings of Twenty Ninth International Conference on Information Systems; Paris, France. 2008.
- Bansal G, Zahedi FM, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst. 2010;49(2):138–150.
- Bélanger F, Crossler RE. Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 2011;35(4):1017–1041.
- Benson D. A field study of end user computing: findings and issues. MIS Q. 1983;7(4):35–45.
- Brown TA. Confirmatory factor analysis for applied research. New York, NY: The Guilford Press; 2006.
- Byrne BM. Structural equation modeling with mplus. New York, NY: Routledge, 2012.
- Casaló LV, Carlos F, Miguel G. The role of security, privacy, usability and reputation in the development of online banking. Online Inf Rev. 2007;31(5): 583–603.
- Chellappa RK, Pavlou PA. Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logist Inf Manage. 2002;15(5/6):358–368.
- Chin W. Commentary: issues and opinion on structural equation modeling. MIS Q. 1988;22(1):vii–xvi.
- Crittenden MR. A call to arms for banks; regulators intensify push for firms to better protect against cyber attacks. In Wall street journal; 2013.
- Dinev T, Xu H, Smith JH, Hart P. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst. 2013;22(3):295–316.
- Drennan J, Mort GS, Previte J. Privacy, risk perception, and expert online behavior: an exploratory study of household end users. J Organizational End User Comput. 2006;18(1):1–22.
- Flavián C, Guinalíu M. Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind Manage Data Syst. 2006;106(5):601–620.
- Fraj E, Martinez E. Influence of personality on ecological consumer behaviour. J Consum Behav. 2006;5(3):167–181.
- Gefen D, Karahanna E, Straub DW. Trust and TAM in online shopping: an integrated model. MIS Q. 2003;27(1):51–90.
- Goldberg LR. The development of markers for the big-five factor structure. Psychological Assess. 1992;4(1):26–42.
- Goodhue DL, Straub DW. Security concern of system users: a study of the perceptions of the adequacy of security. Inf Manage. 1991;20(1):13–27.
- Gorman S, Yadron D. Iran hacks energy firms, U.S. Says: oil-and-gas, power companies’ control systems believed to be infiltrated; fear of sabotage potential. In Wall Street Journal; 2013.
- Greene T. Trust the cloud? Americans say no way. In PCWorldcom; 2009.
- Hartford Steam Boiler (HSB). Study shows cyber attacks target small businesses [http://online.wsj.com/article/PR-CO-20130605-910391.html], 2013.
- Junglas IA, Johnson NA, and Spitzmüller C. Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur J Inf Syst. 2008;17(4):387–402.
- Kim DJ, Steinfield C, Lai Y-J. Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decis Support Syst. 2008;44(4):1000–1015.
- Kim M-S, Ahn J-H. Comparison of trust sources of an online market-maker in the e-marketplace: buyer’s and seller’s perspectives. J Comput Inf Syst. 2006;47(1):84–94.
- Korzaan ML, Boswell KT. The influence of personality traits and information privacy concerns on behavioral intentions. J Comput Inf Syst. 2008;48(4):15–24.
- Krumay B, Oetzel MC. Security an privacy in companies: state-of-the-art and qualitative analysis. in the proceedings of Sixth International Conference on Availability, Reliability and Security. 2011.
- Landau S. Privacy and security a multidimensional problem. Assoc Comput Mach Commun ACM. 2008;51(11):25–26.
- Laufer RS, Wolfe M. Privacy as a concept and a social issue: a multidimensional development theory. J Social Issues 1977;33(3):22–42.
- Loch KD, Carr HH, Warkentin ME. Threats to information systems: today’s reality, yesterday’s understanding. MIS Q. 1992;16(2):173–186.
- Luftman J, Derksen B, Dwivedi R, Santana M, Zadeh HS. Influential IT management trends: an international study. J Inf Technol. 2015;30(3):293–305.
- Malhotra NK, Kim SS, Agarwal J. Internet users’ Internet information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf Syst Res. 2004;15(4):336–355.
- McCole P, Ramsey E, Williams J. Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J Bus. Res. 2010;63(9–10):1018–1024.
- Microsoft Corporation. Privacy and Security [http://msdn.microsoft.com/en-us/library/ms976532.aspx], 2003.
- Miles I. Be here now. Info J Policy, Regulation Strategy Telecommun Inf. Media 2005;7(2):49–71.
- Muthén BO. Allowing for correlation among error terms in manifest variables [http://www.statmodel.com/discussion/messages/9/351.html?1354409423], 2012.
- Muthén LK. MLR Acronym? [http://www.statmodel.com/discussion/messages/11/2156.html?1317086403], 2007.
- Muthén LK, Muthén BO. Mplus user’s guide, 7th ed. Los Angeles, CA: Muthén & Muthén; 1998–2012.
- Nakanishi L. The difference between security and privacy and why we must better communicate about both [http://datasecurity.edelman.com/the-difference-between-security-and-privacy-and-why-we-must-better-communicate-about-both/], 2011.
- Oetzel MC, Krumay B. Differentiating privacy and security: a content analysis of B2C websites. in the proceedings of 17th Americas Conference on Information Systems (AMCIS), Detroit. 2011.
- Pavlou P, Liang H, Xue Y. Understanding and mitigating uncertainty in online exchange relationships: a principal–agent perspective. MIS Q. 2007;31(1):105–136.
- Perlroth N. Wall Street Journal announces that it, too, was hacked by China hackers [http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html?_r=0], 2013.
- Petter S, Straub DW, Rai A. Specifying formative constructs in information systems research. MIS Q. 2007;31(4):623–656.
- Pew Research Center’s Internet & American Life Project. Internet User Demographics [http://www.pewinternet.org/data-trend/internet-use/latest-stats/], 2014.
- Pilcher J. Growing use of Twitter raises customer security concerns. Am Bankers Assoc Banking J. 2010;102(1):27–28.
- Ratnasingam P, Gefen D, Pavlou PA. The role of facilitating conditions and institutional trust in electronic marketplaces. J Electron Commerce Organ. 2005;3(3):69–82.
- Ray S, Ow T, Kim SS. Security assurance: how online service providers can influence security control perceptions and gain trust. Decis Sci. 2011;42(2):391–412.
- Salisbury WD, Pearson RA, Pearson AW, Miller DW. Perceived security and world wide web purchase intention. Ind Manage Data Syst. 2001;101(3/4):165–176.
- Sanger DE, Perlroth N. Cyberattacks against US corporations are on the rise. In NY Times; 2013.
- Shapiro SS. Privacy by design: moving from art to practice. Commun. ACM. 2010;53(6):27–29.
- Sharma S, Mukherjee S, Kumar A, Dillon WR. A simulation study to investigate the use of cutoff values for assessing model fit in covariance structure models. J Bus Res. 2005;58:935–943.
- Smith HJ, Dinev T, Xu H. Information privacy research: an interdisciplinary review. MIS Q. 2011;35(4):992–1015.
- Smith HJ, Milberg SJ, Burke SJ. Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 1996;20(2):167–196.
- Song J, Zahedi FM. A theoretical approach to web design in e-commerce: a belief reinforcement model. Manage Sci. 2005;51(8):1219–1235.
- Stewart KA, Segars AH. An empirical examination of the concern for information privacy instrument. Inf Syst Res. 2002;13(1):36–49.
- Straub DW. Validating instruments in MIS research. MIS Q. 1989;13(2):147.
- The Center for the Digital Future. Highlights: The 2011 digital future project – year ten [http://annenberg.usc.edu/News%20and%20Events/News/110603CDF/110603hilites.aspx], 2011.
- Udo GJ. Privacy and security concerns as major barriers for e-commerce: a survey study. Inf Manage Comput Secur.2001;9(4):165–174.
- White CE, Jr Christy DP. The information center concept: a normative model and a study of six installations. MIS Q. 1987;11(4):451–460.
- Xu H, Teo H-H, Tan BCY, Agarwal R. Research note: effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Inf Syst Res. 2012;23(4):1342–1363.
- Yang M-H, Chandlrees N, Lin B, Chao H-Y. The effect of perceived ethical performance of shopping websites on consumer trust. J Comput Inf Syst. 2009;50(1):15–24.
- Zahedi FM, Song J. Dynamics of trust revision: using health infomediaries. J Manage Inf Syst. 2008;24(4):225–248.