ONLINE HEDONIC CONSUMERS’ PRIVACY AWATENESS AND PRIVACY PARADOX: A SYSTEMATIC LITERATURE REVIEW
DOI:
https://doi.org/10.51200/mjbe.v9i2.4359Keywords:
Literature Review, Hedonic-Motivation System (HMS), Hedonic Consumers, Privacy, Privacy Paradox, Privacy AwarenessAbstract
The purpose of this paper is to provide a comprehensive review of the literature on Online Hedonic Consumers’ Privacy Paradox and Privacy Awareness. Furthermore, the authors attempt to identify a gap that can be addressed in the future by developing a comprehensive and integrated model on Online Hedonic Consumer Behaviour that focuses on their Privacy Awareness. The authors conducted a systematic literature review of the extant literature. The discussion on “Privacy”, “Privacy Paradox” and “Privacy Awareness” elucidated the differences among them, thereby helping to remove any confusions held by the researchers and readers. This review offered insight into the current status of research in this field and recognized the factor “Privacy Awareness” as a gap in the existing model on Online Hedonic Consumer Behaviour that could properly be explored in further scholarly empirical research. Managers and E-Commerce vendors could utilize the findings of this review to address their Hedonic Consumer Privacy Awareness for the growth of their online businesses. This paper lays a groundwork to explore Online Hedonic Consumer Privacy Awareness in detail. A new integrated model is suggested, which will lead to the development of a theoretical framework for researchers to further examine the mediation effect of Privacy Awareness.
References
Acquisti, A., & Gross, R. (2006). Imagined
communities: Awareness, information
sharing, and privacy on the Facebook. Paper
presented at the International workshop on
privacy enhancing technologies.
Acquisti, A., & Grossklags, J. (2005). Privacy and
rationality in individual decision making.
IEEE security & privacy, 3(1), 26-33.
Awad, N. F., & Krishnan, M. S. (2006). The
personalization privacy paradox: an
empirical evaluation of information
transparency and the willingness to be
profiled online for personalization. MIS
quarterly, 13-28.
Aydoğan, R., Øzturk, P., & Razeghi, Y. (2017).
Negotiation for incentive driven privacypreserving
information sharing. Paper
presented at the International Conference
on Principles and Practice of Multi-Agent
Systems.
Baek, Y. M. (2014). Solving the privacy paradox: A
counter-argument experimental approach.
Computers in Human Behavior, 38, 33-42.
Bamossy, G. J., & Solomon, M. R. (2016). Consumer
behaviour: A European perspective: Pearson
Education.
Barnes, S. B. (2006). A privacy paradox: Social
networking in the United States. First
Monday, 11(9).
Barth, S., & De Jong, M. D. (2017). The privacy
paradox–Investigating discrepancies
between expressed privacy concerns
and actual online behavior–A systematic
literature review. Telematics and informatics,
(7), 1038-1058.
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online
privacy concerns and privacy management:
A meta-analytical review. Journal of
Communication, 67(1), 26-53.
Bélanger, F., & Crossler, R. E. (2011). Privacy in
the Digital Age: A Review of Information
Privacy Research in Information
Systems. MIS quarterly, 35(4), 1017-1041.
doi:10.2307/41409971
Beldad, A., de Jong, M., & Steehouder, M. (2011). A
Comprehensive Theoretical Framework for
Personal Information-Related Behaviors on
the Internet. The Information Society, 27(4),
-232. doi:10.1080/01972243.2011.583802
Beltramini, R. F. (1983). Student surrogates in
consumer research. Journal of the Academy
of Marketing Science, 11(4), 438-443.
Benndorf, V., & Normann, H.-T. (2018). The
Willingness to Sell Personal Data. The
Scandinavian Journal of Economics, 120(4),
-1278. doi:10.1111/sjoe.12247
Bhimani, H., Mention, A.-L., & Barlatier, P.-J. (2019).
Social media and innovation: A systematic
literature review and future research
directions. Technological Forecasting and
Social Change, 144, 251-269.
Bidler, M., Zimmerman, J., Schumann, J. H., &
Widjaja, T. (2020). Previewing a Meaningfully
Gamified Data Disclosure Process to Increase
Consumers’ Willingness to Engage in Data
Disclosure Processes. Journal of retailing,
(4), 507-532.
Boyd, D. (2008). Facebook’s privacy trainwreck:
Exposure, invasion, and social convergence.
Convergence, 14(1), 13-20.
Boyd, D. M., & Ellison, N. B. (2007). Social
network sites: Definition, history, and
scholarship. Journal of computer‐mediated
Communication, 13(1), 210-230.
Brough, A. R., & Martin, K. D. (2021). Consumer
privacy during (and after) the COVID-19
pandemic. Journal of Public Policy &
Marketing, 40(1), 108-110.
Brown, B. (2001). Studying the Internet experience.
HP LABORATORIES TECHNICAL REPORT HPL, 49.
Brown, S. A., & Venkatesh, V. (2005). Model of
adoption of technology in households:
A baseline model test and extension
incorporating household life cycle. MIS
quarterly, 29(3).
Brunk, B. (2002). Understanding the privacy space.
First Monday, 7(10).
Buchanan, T., Paine, C., Joinson, A. N., & Reips, U.-D.
(2007). Development of measures of online
privacy concern and protection for use on
the Internet. Journal of the American Society
for Information Science and Technology, 58(2),
-165. doi:10.1002/asi.20459
Campbell, J. E., & Carlson, M. (2002). Panopticon.
com: Online Surveillance and the
Commodification of Privacy. Journal of
Broadcasting & Electronic Media, 46(4), 586-
doi:10.1207/s15506878jobem4604_6
Carrascal, J. P., Riederer, C., Erramilli, V., Cherubini,
M., & Oliveira, R. d. (2013). Your browsing
behavior for a big mac: economics of personal
information online. Rio de Janeiro, Brazil:
Association for Computing Machinery.
Chellappa, R. K., & Sin, R. G. (2005). Personalization
versus privacy: An empirical examination of
the online consumer’s dilemma. Information
technology and management, 6(2-3), 181-202.
Christofides, E., Muise, A., & Desmarais, S. (2012). Hey
mom, what’s on your Facebook? Comparing
Facebook disclosure and privacy in
adolescents and adults. Social Psychological
and Personality Science, 3(1), 48-54.
Csikszentmihalyi, M. (1991). Flow: The psychology
of optimal experience In: New York:
HarperPerennial (Vol. 41).
Culnan, M. J., & Armstrong, P. K. (1999). Information
privacy concerns, procedural fairness, and
impersonal trust: An empirical investigation.
Organization science, 10(1), 104-115.
Cunningham, W. H., Anderson, W. T., & Murphy, J. H.
(1974). Are students real people? The Journal
of Business, 47(3), 399-409.
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes,
B. N. (2009). Facebook and online privacy:
Attitudes, behaviors, and unintended
consequences. Journal of computermediated
communication, 15(1), 83-108.
Dhar, R., & Wertenbroch, K. (2000). Consumer choice
between hedonic and utilitarian goods.
Journal of Marketing Research, 37(1), 60-71.
Dictionary, C. B. E. (2019). Definition of Privacy.
Retrieved from https://dictionary.
cambridge.org/dictionary/english/privacy
Dienlin, T., & Trepte, S. (2015). Is the privacy paradox
a relic of the past? An in-depth analysis of
privacy attitudes and privacy behaviors.
European Journal of Social Psychology, 45(3),
-297. doi:10.1002/ejsp.2049
Dinev, T. (2014). Why would we care about privacy?
In: Springer.
Duhigg, C. (2012). How companies learn your
secrets. The New York Times, 16, 2012.
Ellison, N., Steinfield, C., & Lampe, C. (2007). The
benefit of Facebook ‘friends’: Exploring
the relationship between college students’
use of online social networks and social
capital. Journal of Computer–Mediated
Communication, 12(4).
Ellison, N. B., Vitak, J., Steinfield, C., Gray, R., & Lampe,
C. (2011). Negotiating Privacy Concerns
and Social Capital Needs in a Social Media
Environment. In S. Trepte & L. Reinecke
(Eds.), Privacy Online: Perspectives on Privacy
and Self-Disclosure in the Social Web (pp.
-32). Berlin, Heidelberg: Springer Berlin
Heidelberg.
Entertainment Software Association. (2007). Top 10
industry facts. Retrieved from http://www.
theesa.com/facts/index.asp
Entertainment Software Association. (2019). 2019
Essential facts about the computer and
video game industry. Retrieved from https://
www.theesa.com/esa-research/2019-
essential-facts-about-the-computer-andvideo-
game-industry/
Frenkel, S., Rosenberg, M., & Confessore, N. (2018).
Facebook data collected by quiz app
included private messages. The New York
Times, 10.
Gopalakrishnan, S., & Ganeshkumar, P. (2013).
Systematic reviews and meta-analysis:
understanding the best evidence in primary
healthcare. Journal of family medicine and
primary care, 2(1), 9.
Gross, R., & Acquisti, A. (2005). Information revelation
and privacy in online social networks. Paper
presented at the Proceedings of the 2005
ACM workshop on Privacy in the electronic
society.
Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. (2007).
Overcoming online information privacy
concerns: An information-processing
theory approach. Journal of management
information systems, 24(2), 13-42.
Heirman, W., Walrave, M., & Ponnet, K. (2013).
Predicting adolescents’ disclosure of
personal information in exchange for
commercial incentives: An application of
an extended theory of planned behavior.
Cyberpsychology, Behavior, and Social
Networking, 16(2), 81-87.
Hirschman, E. C., & Holbrook, M. B. (1982). Hedonic
Consumption: Emerging Concepts, Methods
and Propositions. Journal of Marketing, 46(3),
-101. doi:10.1177/002224298204600314
Hoffman, D. L., Novak, T. P., & Peralta, M.
(1999). Building consumer trust online.
Communications of the ACM, 42(4), 80-85.
Hsieh, T.-S., Noyes, D., Liu, H., & Fiondella, L. (2015).
Quantifying the impact of data loss incidents
on publicly-traded organizations. Paper
presented at the 2015 IEEE International
Symposium on Technologies for Homeland
Security (HST).
Hsu, C.-L., & Lu, H.-P. (2007). Consumer behavior in
online game communities: A motivational
factor perspective. Computers in Human
Behavior, 23(3), 1642-1659.
Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The Value
of Privacy Assurance: An Exploratory Field
Experiment. MIS quarterly, 31(1), 19-33.
doi:10.2307/25148779
Jagatic, T. N., Johnson, N. A., Jakobsson, M.,
& Menczer, F. (2007). Social phishing.
Communications of the ACM, 50(10), 94-100.
Jegers, K. (2007). Pervasive game flow:
understanding player enjoyment
in pervasive gaming. Computers in
Entertainment (CIE), 5(1), 9.
Jenkins, A. (2018, MARCH 28, 2018). These
Companies Have Cut Their Ties With
Facebook Amid the Cambridge Analytica
Data Scandal. Retrieved from https://
time.com/5216291/facebook-cambridgeanalytica-
companies-advertising/
Katawetawaraks, C., & Wang, C. (2011). Online
shopper behavior: Influences of online
shopping decision. Asian Journal of Business
Research, 1(2).
Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015).
Blissfully ignorant: the effects of general
privacy concerns, general institutional
trust, and affect in the privacy calculus.
Information Systems Journal, 25(6), 607-635.
Kim, T., Barasz, K., & John, L. K. (2019). Why am I
seeing this ad? The effect of ad transparency
on ad effectiveness. Journal of consumer
research, 45(5), 906-932.
Kivetz, R., & Simonson, I. (2002a). Earning the
right to indulge: Effort as a determinant of
customer preferences toward frequency
program rewards. Journal of Marketing
Research, 39(2), 155-170.
Kivetz, R., & Simonson, I. (2002b). Self-control
for the righteous: Toward a theory of
precommitment to indulgence. Journal of
consumer research, 29(2), 199-217.
Kokolakis, S. (2017). Privacy attitudes and privacy
behaviour: A review of current research
on the privacy paradox phenomenon.
Computers & security, 64, 122-134.
Krishnamurthy, B., Naryshkin, K., & Wills, C. (2011).
Privacy leakage vs. protection measures: the
growing disconnect. Paper presented at the
Proceedings of the Web.
Lampe, C. A., Ellison, N., & Steinfield, C. (2007). A
familiar face (book): profile elements as signals
in an online social network. Paper presented
at the Proceedings of the SIGCHI conference
on Human factors in computing systems.
Lanier Jr, C. D., & Saini, A. (2008). Understanding
consumer privacy: A review and future
directions. Academy of Marketing Science
Review, 2008, 1.
Lee, H., Park, H., & Kim, J. (2013). Why do people
share their context information on Social
Network Services? A qualitative study and
an experimental study on users’ behavior
of balancing perceived benefit and risk.
International Journal of Human-Computer
Studies, 71(9), 862-877.
Lewis, K., Kaufman, J., & Christakis, N. (2008). The
Taste for Privacy: An Analysis of College
Student Privacy Settings in an Online Social
Network. Journal of computer-mediated
communication, 14(1), 79-100. doi:10.1111/
j.1083-6101.2008.01432.x
Li, H., Sarathy, R., & Xu, H. (2010). Understanding
situational online information disclosure
as a privacy calculus. Journal of Computer
Information Systems, 51(1), 62-71.
Li, H., Sarathy, R., & Xu, H. (2011). The role of
affect and cognition on online consumers’
decision to disclose personal information to
unfamiliar online vendors. Decision support
systems, 51(3), 434-445.
Li, Y. (2011). Empirical studies on online information
privacy concerns: Literature review and an
integrative framework. CAIS, 28, 28.
Liu, X., He, M., Gao, F., & Xie, P. (2008). An empirical
study of online shopping customer
satisfaction in China: a holistic perspective.
International Journal of Retail & Distribution
Management, 36(11), 919-940.
Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy
concerns versus desire for interpersonal
awareness in driving the use of selfdisclosure
technologies: The case of instant
messaging in two cultures. Journal of
management information systems, 27(4),
-200.
Lowry, P. B., Gaskin, J., Twyman, N., Hammer, B., &
Roberts, T. (2012). Taking ‘fun and games’
seriously: Proposing the hedonic-motivation
system adoption model (HMSAM). Journal
of the Association for Information Systems,
(11), 617-671.
Lu, J., Liu, Z., & Fang, Z. (2016). Hedonic products for
you, utilitarian products for me. Judgment &
Decision Making, 11(4).
Lutz, C., & Strathoff, P. (2014). Privacy concerns and
online behavior–Not so paradoxical after
all? Viewing the privacy paradox through
different theoretical lenses. Viewing the
Privacy Paradox Through Different Theoretical
Lenses (April 15, 2014).
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004).
Internet users’ information privacy concerns
(IUIPC): The construct, the scale, and a causal
model. Information systems research, 15(4),
-355.
Mallett, R., Hagen-Zanker, J., Slater, R., &
Duvendack, M. (2012). The benefits and
challenges of using systematic reviews in
international development research. Journal
of development effectiveness, 4(3), 445-455.
Manion, J. (2016). Data Security And Privacy:
Marketing’s Top Conundrum In 2016.
Retrieved from https://martech.org/
data-security-privacy-marketings-topconundrum-
/
MarketWatch, I. (2020). “Videogames are a
bigger industry than movies and North
American sports combined, thanks to the
pandemic”. Retrieved from https://www.
marketwatch.com/story/videogamesare-
a-bigger-industry-than-spor t s -
and-movies-combined-thanks-to-thepandemic-
Martin, K. D., Borah, A., & Palmatier, R. W. (2017).
Data privacy: Effects on customer and firm
performance. Journal of Marketing, 81(1), 36-
Martin, K. D., Borah, A., & Palmatier, R. W. (2018). A
strong privacy policy can save your company
millions. Harvard business review.
Martin, K. D., Kim, J. J., Palmatier, R. W., Steinhoff,
L., Stewart, D. W., Walker, B. A., . . . Weaven,
S. K. (2020). Data privacy in retail. Journal of
retailing, 96(4), 474-489.
Martin, K. D., & Murphy, P. E. (2017). The role of data
privacy in marketing. Journal of the Academy
of Marketing Science, 45(2), 135-155.
Martin, K. D., & Palmatier, R. W. (2020). Data privacy
in retail: Navigating tensions and directing
future research. In (Vol. 96, pp. 449-457):
Elsevier.
Migone, A. (2007). Hedonistic consumerism:
patterns of consumption in contemporary
capitalism. Review of Radical Political
Economics, 39(2), 173-200.
Milne, G. R., & Gordon, M. E. (1993). Direct mail
privacy-efficiency trade-offs within an
implied social contract framework. Journal
of Public Policy & Marketing, 12(2), 206-215.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer
perceptions of privacy and security risks for
online shopping. Journal of Consumer Affairs,
(1), 27-44.
Mothersbaugh, D. L., Foxx, W. K., Beatty, S. E., & Wang,
S. (2012). Disclosure Antecedents in an Online
Service Context:The Role of Sensitivity of
Information. Journal of service research, 15(1),
-98. doi:10.1177/1094670511424924
Newzoo B.V. (2017, April 20). The global games
market will reach $108.9 billion in 2017 with
mobile taking 42%. Retrieved from https://
newzoo.com/insights/articles/the-globalgames-
market-will-reach-108-9-billion-in-
-with-mobile-taking-42/
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007).
The privacy paradox: Personal information
disclosure intentions versus behaviors.
Journal of Consumer Affairs, 41(1), 100-126.
Novak, T. P., Hoffman, D. L., & Yung, Y.-F. (2000).
Measuring the customer experience in
online environments: A structural modeling
approach. Marketing science, 19(1), 22-42.
Oakes, W. (1972). External validity and the use of real
people as subjects. American Psychologist,
(10), 959.
Okazaki, S., Eisend, M., Plangger, K., de Ruyter, K.,
& Grewal, D. (2020). Understanding the
strategic consequences of customer privacy
concerns: A meta-analytic review. Journal of
retailing, 96(4), 458-473.
Olmstead, K., & Smith, A. (2017). What the public
knows about cybersecurity. Pew Research
Center, 22.
Palmatier, R. W., & Martin, K. D. (2019). Customer
Data Privacy: Why Every Marketer Should
Care. In The Intelligent Marketer’s Guide to
Data Privacy (pp. 3-20): Springer.
Palmer, D. (2019). What is GDPR? Everything you
need to know about the new general data
protection regulations. ZDNet. ZDNet, ZDNet.
Papacharissi, Z. (2010). A private sphere: Democracy
in a digital age: Polity.
Parboteeah, D. V., Valacich, J. S., & Wells, J. D. (2009).
The influence of website characteristics
on a consumer’s urge to buy impulsively.
Information systems research, 20(1), 60-78.
Paul, K. (2018). Everything you wanted to know
about data breaches, privacy violations
and hacks. Retrieved from https://www.
marketwatch.com/story/at-what-pointshould-
you-be-concerned-about-a-databreach-
-04-03
Pavlou, P. A. (2011). State of the Information Privacy
Literature: Where are We Now And Where
Should We Go? MIS quarterly, 35(4), 977-988.
doi:10.2307/41409969
Polatin-Reuben, D., & Wright, J. (2014). An Internet
with {BRICS} Characteristics: Data Sovereignty
and the Balkanisation of the Internet. Paper
presented at the 4th {USENIX} Workshop
on Free and Open Communications on the
Internet ({FOCI} 14).
PWC, C. I. S. (2018). Prepare for the Voice Revolution.
White Paper.
Qiu, L., & Benbasat, I. (2009). Evaluating
anthropomorphic product recommendation
agents: A social relationship perspective to
designing information systems. Journal of
management information systems, 25(4),
-182.
Rosenbush, S. (2018). The Morning Download:
Companies Should Beware Public’s Rising
Anxiety Over Data. Wall Street Journal.
Rosenthal, R. (1995). Writing meta-analytic reviews.
Psychological bulletin, 118(2), 183.
Saadé, R. G., Nebebe, F., & Mak, T. (2009). The role
of intrinsic motivation in system adoption:
A cross-cultural perspective. Journal of
Information, Information Technology, and
Organizations, 4, 107-127.
Sayre, S., & Horne, D. (2000). Trading secrets for
savings: how concerned are consumers
about club cards as a privacy threat? ACR
North American Advances.
Sen, R., & Borle, S. (2015). Estimating the contextual
risk of data breach: An empirical approach.
Journal of management information systems,
(2), 314-341.
Sherry, J. L. (2004). Flow and media enjoyment.
Communication theory, 14(4), 328-347.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information
privacy research: an interdisciplinary review.
MIS quarterly, 35(4), 989-1016.
Soghoian, C. (2008). Exclusive: The next Facebook
privacy scandal. CNet News. Com.
Soghoian, C. (2008). Flaws emerge in Facebook’s
new privacy controls. CNet News. Com.
Spiekermann, S., Grossklags, J., & Berendt, B. (2001).
E-privacy in 2nd generation E-commerce:
privacy preferences versus actual behavior.
Paper presented at the Proceedings of
the 3rd ACM conference on Electronic
Commerce.
Stewart, D. W. (2017). A comment on privacy.
Journal of the Academy of Marketing Science,
(2), 156-159.
Stone, E. F., Gueutal, H. G., Gardner, D. G., &
McClure, S. (1983). A field experiment
comparing information-privacy values,
beliefs, and attitudes across several types of
organizations. Journal of Applied Psychology,
(3), 459.
Strahilevitz, M., & Myers, J. G. (1998). Donations to
charity as purchase incentives: How well
they work may depend on what you are
trying to sell. Journal of consumer research,
(4), 434-446.
Straub, D. B., & Boudreau, M.-C. MC, & Gefen,
D.(2004).“Validation Guidelines for IS
Positivist Research”. Communications of the
Association for information systems, 13(24),
-427.
Straub, D. W. (1989). Validating instruments in MIS
research. MIS quarterly, 147-169.
Stutzman, F. (2006). An evaluation of identity-sharing
behavior in social network communities.
Journal of the International Digital Media and
Arts Association, 3(1), 10-18.
Sweetser, P., & Wyeth, P. (2005). GameFlow: a model
for evaluating player enjoyment in games.
Computers in Entertainment (CIE), 3(3), 3-3.
Taddicken, M. (2014). The ‘privacy paradox’in the
social web: The impact of privacy concerns,
individual characteristics, and the perceived
social relevance on different forms of selfdisclosure.
Journal of computer-mediated
communication, 19(2), 248-273.
Thesaurus, C. A. L. s. D. (2019). Definition of
Privacy. Retrieved from https://dictionary.
cambridge.org/dictionary/english/privacy
Thomas, K. W., & Velthouse, B. A. (1990). Cognitive
elements of empowerment: An “interpretive”
model of intrinsic task motivation. Academy
of management review, 15(4), 666-681.
Trevinal, A. M., & Stenger, T. (2014). Toward a
conceptualization of the online shopping
experience. Journal of Retailing and
Consumer Services, 21(3), 314-326.
Tufekci, Z. (2008). Can you see me now? Audience
and disclosure regulation in online social
network sites. Bulletin of Science, Technology
& Society, 28(1), 20-36.
Utz, S., & Krämer, N. C. (2009). The privacy paradox
on social network sites revisited: The role of
individual characteristics and group norms.
Cyberpsychology: Journal of Psychosocial
Research on Cyberspace, 3(2).
Valentino-Devries, J., & Singer-Vine, J. (2012). They
know what you’re shopping for. Wall Street
Journal.
Van der Heijden, H. (2004). User acceptance of
hedonic information systems. MIS quarterly,
-704.
Venkatesh, V. (2000). Determinants of perceived
ease of use: Integrating control, intrinsic
motivation, and emotion into the
technology acceptance model. Information
systems research, 11(4), 342-365.
Venkatesh, V., & Bala, H. (2008). Technology
acceptance model 3 and a research agenda
on interventions. Decision sciences, 39(2),
-315.
Venkatesh, V., Davis, F., & Morris, M. G. (2007). Dead
or alive? The development, trajectory and
future of technology adoption research.
Journal of the Association for Information
Systems, 8(4), 1.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F.
D. (2003). User acceptance of information
technology: Toward a unified view. MIS
quarterly, 425-478.
Voss, K. E., Spangenberg, E. R., & Grohmann, B.
(2003). Measuring the hedonic and utilitarian
dimensions of consumer attitude. Journal of
Marketing Research, 40(3), 310-320.
Walker, K. L. (2016). Surrendering information
through the looking glass: Transparency,
trust, and protection. Journal of Public Policy
& Marketing, 35(1), 144-158.
Warren, S. D., & Brandeis, L. D. (1890). The Right to
Privacy. Harvard Law Review, 4(5), 193-220.
Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B.
(2011). The personalization privacy paradox:
An exploratory study of decision making
process for location-aware marketing.
Decision support systems, 51(1), 42-52.
Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009).
The role of push-pull technology in privacy
calculus: the case of location-based services.
Journal of management information systems,
(3), 135-174.