References
- Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1), 26–33. https://doi.org/10.1109/MSP.2005.22
- Aggarwal, P., & McGill, A. L. (2007). Is that car smiling at me? Schema congruity as a basis for evaluating anthropomorphized products. Journal of Consumer Research, 34(4), 468–479. https://doi.org/10.1086/518544
- Aggarwal, P., & McGill, A. L. (2011). When brands seem human, do humans act like brands? Automatic behavioral priming effects of brand anthropomorphism. Journal of Consumer Research, 39(2), 307–323. https://doi.org/10.1086/662614
- Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2009). The antecedents of customer self-disclosure to online virtual advisors [Paper presentation]. International Conference on Information Systems (ICIS). Phoenix, Arizona.
- Bal, G., Rannenberg, K., & Hong, J. (2015). Styx: Privacy risk communication for the Android smartphone platform based on apps’ data-access behavior patterns. Computers & Security, 53(1), 187–202. https://doi.org/10.1016/j.cose.2015.04.004
- Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. https://doi.org/10.1016/j.dss.2010.01.010
- Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21. https://doi.org/10.1016/j.im.2015.08.001
- Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1042. https://doi.org/10.2307/41409971
- Burgoon, J. K., Bonito, J. A., Bengtsson, B., Cederberg, C., Lundeberg, M., & Allspach, L. (2000). Interactivity in human–computer interaction: A study of credibility, understanding, and influence. Computers in Human Behavior, 16(6), 553–574. https://doi.org/10.1016/S0747-5632(00)00029-7
- Chandler, J., & Schwarz, N. (2010). Use does not wear ragged the fabric of friendship: Thinking of objects as alive makes people less willing to replace them. Journal of Consumer Psychology, 20(2), 138–145. https://doi.org/10.1016/j.jcps.2009.12.008
- Chen, R. (2013). Living a private life in public social networks: An exploration of member self-disclosure. Decision Support Systems, 55(3), 661–668. https://doi.org/10.1016/j.dss.2012.12.003
- Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. In K. B. Wright & L. M. Webb (Eds.), Computer-mediated communication in personal relationships (pp. 21–40). Peter Lang Inc., International Academic Publishers.
- Child, J. T., & Starcher, S. C. (2016). Fuzzy Facebook privacy boundaries: Exploring mediated lurking, vague-booking, and Facebook privacy management. Computers in Human Behavior, 54(1), 483–490. https://doi.org/10.1016/j.chb.2015.08.035
- Chung, H., Iorga, M., Voas, J., & Lee, S. (2017). Alexa, can I trust you? Computer, 50(9), 100–104. https://doi.org/10.1109/MC.2017.3571053
- Chung, H., & Lee, S. (2018). Intelligent virtual assistant knows your life. Cornell University.
- Cooper, R. S., McElroy, J. F., Rolandi, W., Sanders, D., Ulmer, R. M., & Peebles, E. (2008). Personal virtual assistant: Google Patents.
- D’Souza, G., & Phelps, J. E. (2009). The privacy paradox: The case of secondary disclosure. Review of Marketing Science, 7(4), 1–29. https://doi.org/10.2202/1546-5616.1072
- Dautenhahn, K., Woods, S., Kaouri, C., Walters, M. L., Koay, K. L., & Werry, I. (2005). What is a robot companion-friend, assistant or butler? [Paper presentation]. 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005 (IROS 2005). Edmonton, Alberta.
- Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users’ privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57–93. https://doi.org/10.4018/jgim.2006100103
- Dinev, T., & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29. https://doi.org/10.2753/JEC1086-4415100201
- Eastin, M. S., Brinson, N. H., Doorey, A., & Wilcox, G. (2016). Living in a big data world: Predicting mobile commerce activity through privacy concerns. Computers in Human Behavior, 58(1), 214–220. https://doi.org/10.1016/j.chb.2015.12.050
- Epley, N., Waytz, A., & Cacioppo, J. T. (2007). On seeing human: A three-factor theory of anthropomorphism. [Article]. Psychological Review, 114(4), 864–886. https://doi.org/10.1037/0033-295X.114.4.864
- Frampton, B. D., & Child, J. T. (2013). Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Computers in Human Behavior, 29(6), 2257–2264. https://doi.org/10.1016/j.chb.2013.05.006
- Gao, S., Wang, H., Xu, D., & Wang, Y. (2007). An intelligent agent-assisted decision support system for family financial planning. Decision Support Systems, 44(1), 60–78. https://doi.org/10.1016/j.dss.2007.03.001
- Goetz, J., & Kiesler, S. (2002). Cooperation with a robotic assistant [Paper presentation]. CHI02: Human Factors in Computing Systems. Minneapolis, Minnesota.
- Goudey, A., & Bonnin, G. (2016). Must smart objects look human? Study of the impact of anthropomorphism on the acceptance of companion robots. Recherche Et Applications En Marketing (English Edition), 31(2), 2–20. https://doi.org/10.1177/2051570716643961
- Guthrie, S. E. (1997). Anthropomorphism: A definition and a theory. In R. W. Mitchell, N. S. Thompson, & H. L. Miles (Eds.), SUNY series in philosophy and biology. Anthropomorphism, anecdotes, and animals (pp. 50–58). State University of New York Press.
- Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis. Pearson Education.
- Hosek, A. M., & Thompson, J. (2009). Communication privacy management and college instruction: Exploring the rules and boundaries that frame instructor private disclosures. Communication Education, 58(3), 327–349. https://doi.org/10.1080/03634520902777585
- Hsu, C.-L., & Lin, J.-C.-C. (2018). Exploring factors affecting the adoption of Internet of Things services. Journal of Computer Information Systems, 58(1), 49–57. https://doi.org/10.1080/08874417.2016.1186524
- Jones, M. G. (1991). Privacy: A significant marketing issue for the 1990s. Journal of Public Policy & Marketing, 10(1), 133–148. https://doi.org/10.1177/074391569101000110
- Kim, H. C., & Kramer, T. (2015). Do materialists prefer the “brand-as-servant”? The interactive effect of anthropomorphized brand roles and materialism on consumer responses. Journal of Consumer Research, 42(2), 284–299. https://doi.org/10.1093/jcr/ucv015
- Kim, S., & McGill, A. L. (2011). Gaming with Mr. Slot or gaming the slot machine? Power, anthropomorphism, and risk perception. Journal of Consumer Research, 38(1), 94–107. https://doi.org/10.1086/658148
- Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). “It won’t happen to me!”: Self-disclosure in online social networks [Paper presentation]. 15th Americas Conference on Information System (AMCIS 2009). Atlanta, Georgia.
- Landwehr, J. R., McGill, A. L., & Herrmann, A. (2011). It’s got the look: The effect of friendly and aggressive “facial” expressions on product liking and sales. Journal of Marketing, 75(3), 132–146. https://doi.org/10.1509/jmkg.75.3.132
- Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62–71. https://doi.org/10.1080/08874417.2010.11645450
- Liang, T.-P., & Huang, J.-S. (2000). A framework for applying intelligent agents to support electronic trading. Decision Support Systems, 28(4), 305–317. https://doi.org/10.1016/S0167-9236(99)00098-6
- Liao, Y., Vitak, J., Kumar, P., Zimmer, M., & Kritikos, K. (2019). Understanding the role of privacy and trust in intelligent personal assistant adoption [Paper presentation]. 14th International Conference, iConference 2019. Washington, DC.
- Loiacono, E. T. (2015). Self-disclosure behavior on social networking web sites. International Journal of Electronic Commerce, 19(2), 66–94. https://doi.org/10.1080/10864415.2015.979479
- Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
- Metzger, M. J. (2007). Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research. Journal of the American Society for Information Science and Technology, 58(13), 2078–2091. https://doi.org/10.1002/asi.20672
- Moreale, E., & Watt, S. (2004). An agent-based approach to mailing list knowledge management. In L. van Elst, V. Dignum, & A. Abecker (Eds.), Agent-mediated knowledge management. AMKM 2003. Lecture notes in computer science (Vol. 2926, pp. 118–129). Springer Berlin, Heidelberg.
- Mothersbaugh, D. L., Foxx, W. K., Beatty, S. E., & Wang, S. (2011). Disclosure antecedents in an online service context: The role of sensitivity of information. Journal of Service Research, 15(1), 76–98. https://doi.org/10.1177/1094670511424924
- Naone, E. (2009). TR10: Intelligent software assistant technology review. Massachussetts Institute of Technology.
- Nass, C., Moon, Y., & Green, N. (1997). Are machines gender neutral? Gender-stereotypic responses to computers with voices. Journal of Applied Social Psychology, 27(10), 864–876. https://doi.org/10.1111/j.1559-1816.1997.tb00275.x
- Newman, J. (2014). To Siri, with love: How one boy with autism became BFF with Apple’s Siri. The New York Times. https://www.nytimes.com/2014/10/19/fashion/how-apples-siri-became-one-autistic-boys-bff.html
- Nowak, G. J., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Interactive Marketing, 11(4), 94–108. https://doi.org/10.1002/(SICI)1522-7138(199723)11:4<94::AID-DIR11>3.0.CO;2-F
- Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1(4), 311–335. https://doi.org/10.1111/j.1468-2885.1991.tb00023.x
- Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. State University of New York Press.
- Petronio, S., & Durham, W. T. (2008). Communication privacy management theory. Engaging theories in interpersonal communication: Multiple perspectives. Sage.
- Petronio, S., & Gaff, C. (2010). Managing privacy ownership and disclosure. In C. L. Gaff & C. L. Bylund (Eds.), Family communication about genetics: Theory and practice (pp. 120–135). Oxford University Press.
- Puzakova, M., Kwak, H., & Rocereto, J. F. (2013). When humanizing brands goes wrong: The detrimental effect of brand anthropomorphization amid product wrongdoings. Journal of Marketing, 77(3), 81–100. https://doi.org/10.1509/jm.11.0510
- Research and Markets. (2017). Intelligent virtual assistant market by product, user interface, industry & geography - Global forecast to 2023.
- Saeb, S., Zhang, M., Karr, C. J., Schueller, S. M., Corden, M. E., Kording, K. P., & Mohr, D. C. (2015). Mobile phone sensor correlates of depressive symptom severity in daily-life behavior: An exploratory study. Journal of Medical Internet Research, 17(7), e175. https://doi.org/10.2196/jmir.4273
- Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73. https://doi.org/10.1509/jppm.19.1.62.16949
- Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196. https://doi.org/10.2307/249477
- Turkle, S. (2000). When toys are us. Forbes. https://www.forbes.com/asap/2000/1002/213.html
- Wang, P., & Petrison, L. A. (1993). Direct marketing activities and personal privacy. A consumer survey. Journal of Direct Marketing, 7(1), 7–19. https://doi.org/10.1002/dir.4000070104
- Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of online privacy concerns and willingness to provide personal and financial information. Journal of Marketing Communications, 11(1), 21–40. https://doi.org/10.1080/1352726042000263575
- Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101–115. https://doi.org/10.1111/j.1083-6101.2011.01559.x
- Wottrich, V. M., van Reijmersdal, E. A., & Smit, E. G. (2018). The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns. Decision Support Systems, 106(1), 44–52. https://doi.org/10.1016/j.dss.2017.12.003
- Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889–897. https://doi.org/10.1016/j.chb.2011.12.008
- Xu, D., & Wang, H. (2006). Intelligent agent supported personalization for virtual learning environments. Decision Support Systems, 42(2), 825–843. https://doi.org/10.1016/j.dss.2005.05.033
- Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798. https://doi.org/10.17705/1jais.00281
- Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. ACM SIGMIS Database, 40(1), 38–51. https://doi.org/10.1145/1496930.1496937
- Zlatolas, L. N., Welzer, T., Heričko, M., & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45(1), 158–167. https://doi.org/10.1016/j.chb.2014.12.012
- Zohar, D., & Tenne-Gazit, O. (2008). Transformational leadership and group interaction as climate antecedents: A social network analysis. Journal of Applied Psychology, 93(4), 744–757. https://doi.org/10.1037/0021-9010.93.4.744