Access the full text.
Sign up today, get DeepDyve free for 14 days.
H. Willaby, Daniel Costa, B. Burns, C. MacCann, R. Roberts (2015)
Testing complex models with small sample sizes: A historical overview and empirical demonstration of what Partial Least Squares (PLS) can offer differential psychologyPersonality and Individual Differences, 84
M. Stone (1976)
Cross‐Validatory Choice and Assessment of Statistical PredictionsJournal of the royal statistical society series b-methodological, 36
V. Wottrich, E. Reijmersdal, E. Smit (2018)
The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concernsDecis. Support Syst., 106
Kathy Stewart, A. Segars (2002)
An Empirical Examination of the Concern for Information Privacy InstrumentInf. Syst. Res., 13
Jie Gu, Y. Xu, Heng Xu, Cheng Zhang, Hong Ling (2017)
Privacy concerns for mobile app download: An elaboration likelihood model perspectiveDecis. Support Syst., 94
Matina Tsavli, P. Efraimidis, Vasilios Katos, L. Mitrou (2015)
Reengineering the user: privacy concerns about personal data on smartphones
A. Chidlow, P. Ghauri, Sengun Yeniyurt, S. Cavusgil (2015)
Establishing rigor in mail-survey procedures in international business researchJournal of World Business, 50
N. Malhotra, Sung Kim, James Agarwal (2004)
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal ModelInf. Syst. Res., 15
G. Dowling, R. Staelin (1994)
A Model of Perceived Risk and Intended Risk-handling ActivityJournal of Consumer Research, 21
George Milne, M. Gordon (1993)
Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract FrameworkJournal of Public Policy & Marketing, 12
R. Casadesus-Masanell, A. Hervas-Drane (2015)
Competing with PrivacyManag. Sci., 61
Sheshadri Chatterjee, A. Kar (2020)
Why do small and medium enterprises use social media marketing and what is the impact: Empirical insights from IndiaInt. J. Inf. Manag., 53
Yichuan Wang, C. Herrando (2019)
Does privacy assurance on social commerce sites matter to millennials?Int. J. Inf. Manag., 44
Henry Pohs (1975)
Product Publications: Wrapping up the PaperworkIEEE Engineering Management Review, 3
Sheshadri Chatterjee (2020)
AI strategy of India: policy framework, adoption challenges and actions for governmentTransforming Government: People, Process and Policy, 14
S. Geisser (1975)
The Predictive Sample Reuse Method with ApplicationsJournal of the American Statistical Association, 70
Sheshadri Chatterjee, Ranjan Chaudhuri, D. Vrontis, Rossana Piccolo (2021)
Enterprise social network for knowledge sharing in MNCs: Examining the role of knowledge contributors and knowledge seekers for cross-country collaborationJournal of International Management, 27
G. Bansal, F. Zahedi, D. Gefen (2010)
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information onlineDecis. Support Syst., 49
Tyge-F. Kummer, J. Recker, M. Bick (2017)
Technology-induced anxiety: Manifestations, cultural influences, and its effect on the adoption of sensor-based technology in German and Australian hospitalsInf. Manag., 54
Sheshadri Chatterjee, Ranjan Chaudhuri, D. Vrontis, A. Thrassou, S. Ghosh, Sumana Chaudhuri (2020)
Social customer relationship management factors and business benefitsInternational Journal of Organizational Analysis
Baozhen Lee, Weiguo Fan, A. Squicciarini, S. Ge, Yun Huang (2014)
The relativity of privacy preservation based on social taggingInf. Sci., 288
J. Sutanto, Elia Palme, Chuan-Hoo Tan, C. Phang (2013)
Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone UsersMIS Q., 37
J. Henseler, C. Ringle, M. Sarstedt (2015)
A new criterion for assessing discriminant validity in variance-based structural equation modelingJournal of the Academy of Marketing Science, 43
Sheshadri Chatterjee, K. Bhattacharjee, Chia-Wen Tsai, A. Agrawal (2021)
Impact of peer influence and government support for successful adoption of technology for vocational education: A quantitative study using PLS-SEM techniqueQuality & Quantity, 55
Tien Wang, T. Duong, Charlie Chen (2016)
Intention to disclose personal information via mobile applications: A privacy calculus perspectiveInt. J. Inf. Manag., 36
Jessica Vitak, Yuting Liao, Priya Kumar, M. Zimmer, K. Kritikos (2018)
Privacy Attitudes and Data Valuation Among Fitness Tracker Users
Hanna Krasnova, S. Spiekermann, K. Koroleva, Thomas Hildebrand (2010)
Online social networks: why we discloseJournal of Information Technology, 25
Hichang Cho, Jae-Shin Lee, Siyoung Chung (2010)
Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experienceComput. Hum. Behav., 26
M. Hunecke, Anke Blöbaum, E. Matthies, R. Höger (2001)
Responsibility and EnvironmentEnvironment and Behavior, 33
Heng Xu, H. Teo, B. Tan, Ritu Agarwal (2009)
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based ServicesJournal of Management Information Systems, 26
Li-tze Hu, P. Bentler (1998)
Fit indices in covariance structure modeling : Sensitivity to underparameterized model misspecificationPsychological Methods, 3
Sue Conger, J. Pratt, K. Loch (2013)
Personal information privacy and emerging technologiesInformation Systems Journal, 23
R. Chellappa, S. Shivendu (2006)
An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online PersonalizationJournal of Management Information Systems, 24
Sheshadri Chatterjee, S. Ghosh, Ranjan Chaudhuri, Sumana Chaudhuri (2020)
Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspectiveInf. Comput. Secur., 29
Sheshadri Chatterjee (2020)
Dark side of online social games (OSG) using Facebook platform: effect of age, gender, and identity as moderatorsInf. Technol. People, 34
Sheshadri Chatterjee, A. Kar, S. Mustafa (2019)
Securing IoT devices in smart cities of India: from ethical and enterprise information system management perspectiveEnterprise Information Systems, 15
(2016)
Most mobile users will delete an app if concerned about security: users are asked to share different types of information when downloading apps
Michael Nofer, O. Hinz, Jan Muntermann, Heiko Rossnagel (2014)
The Economic Impact of Privacy Violations and Security BreachesBusiness & Information Systems Engineering, 6
Madhurima Deb, Ewuuk Lomo-David (2014)
An empirical examination of customers’ adoption of m-banking in IndiaMarketing Intelligence & Planning, 32
Sheshadri Chatterjee (2020)
The safety of IoT-enabled system in smart cities of India: do ethics matter?, 36
C. Kuner, F. Cate, C. Millard, D. Svantesson (2012)
The Challenge of "Big Data" for Data ProtectionInternational Data Privacy Law, 2
Tamara Dinev, A. McConnell, H. Smith (2015)
Research Commentary - Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the "APCO" BoxInf. Syst. Res., 26
Merima Činjarević, Emir Agić, A. Peštek (2018)
When Consumers are in Doubt, You Better Watch Out! The Moderating Role of Consumer Skepticism and Subjective Knowledge in the Context of Organic Food ConsumptionZagreb International Review of Economics and Business, 21
K. Hui, H. Teo, S. Lee (2007)
The Value of Privacy Assurance: An Exploratory Field ExperimentMIS Q., 31
Hyoungkoo Khang, Eyun‐Jung Ki, Inkon Park, Seon-Gi Baek (2012)
Exploring antecedents of attitude and intention toward Internet piracy among college students in South KoreaAsian Journal of Business Ethics, 1
Sheshadri Chatterjee, Dipasree Majumdar, S. Misra, R. Damaševičius (2020)
Adoption of mobile applications for teaching-learning process in rural girls’ schools in India: an empirical studyEducation and Information Technologies
A. Delistavrou, H. Katrandjiev, H. Sadeh, I. Tilikidou (2019)
Exploring ethical consumption in different geographical placesEuroMed Journal of Business
Stephen Du, M. Keil, L. Mathiassen, Yide Shen, A. Tiwana (2007)
Attention-shaping tools, expertise, and perceived control in IT project risk assessmentDecis. Support Syst., 43
Heng Xu (2007)
The Effects of Self-Construal and Perceived Control on Privacy Concerns
D. Vrontis, M. Christofi, E. Battisti, E. Graziano (2020)
Intellectual capital, knowledge sharing and equity crowdfundingJournal of Intellectual Capital
I. Hann, K. Hui, S. Lee, I. Png (2007)
Overcoming Online Information Privacy Concerns: An Information-Processing Theory ApproachJournal of Management Information Systems, 24
Dedy Gunawan, K. Huarng (2015)
Viral effects of social network and media on consumers’ purchase intentionJournal of Business Research, 68
Sheshadri Chatterjee, S. SreenivasuluN. (2019)
Personal Data Sharing and Legal Issues of Human Rights in the Era of Artificial Intelligence: Moderating Effect of Government RegulationInt. J. Electron. Gov. Res., 15
(2012)
Editor’s comments: a critical look at the use of PLSSEM in MIS quarterly
B. Borena, F. Belanger, D. Ejigu, S. Anteneh (2015)
Conceptualizing information privacy concern in low-income countries: an Ethiopian language instrument for social networks sitesPaper presented at the Americas Conference on Information Systems
S. Chatterjee, R. Chaudhuri, A. Vrontis (2020a)
Article title: does data-driven culture impact innovation and performance of a firm? An empirical examinationAnnals of Operational Research
Kaman Lee (2008)
Opportunities for green marketing: young consumersMarketing Intelligence & Planning, 26
Josh Wiener, Tabitha Doescher (2008)
A Framework for Promoting Retirement SavingsJournal of Consumer Affairs, 42
Sheshadri Chatterjee, B. Nguyen (2021)
Value co-creation and social media at bottom of pyramid (BOP)The Bottom Line: Managing Library Finances
A. Acquisti, Jens Grossklags (2005)
Privacy and rationality in individual decision makingIEEE Security & Privacy, 3
Martina Hutton, T. Heath (2020)
Researching on the edge: emancipatory praxis for social justiceEuropean Journal of Marketing, 54
A. Acquisti, R. Gross (2006)
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
F. Bélanger, Robert Crossler (2019)
Dealing with digital traces: Understanding protective behaviors on mobile devicesJ. Strateg. Inf. Syst., 28
H. Kuchler (2018)
Software bug made millions of Facebook users’ private posts public: as many as 14m users were affected by the error, which was not caught for 10 days, financial times
M. Lang, Manuel Wiesche, H. Krcmar (2018)
Perceived Control and Privacy in a Professional Cloud Environment
Nader Safa, R. Solms, S. Furnell (2016)
Information security policy compliance model in organizationsComput. Secur., 56
Sheshadri Chatterjee, Ranjan Chaudhuri, A. Thrassou, D. Vrontis (2021)
Antecedents and consequences of knowledge hiding: The moderating role of knowledge hiders and knowledge seekers in organizationsJournal of Business Research, 128
Heng Xu, H. Teo, B. Tan, Ritu Agarwal (2012)
Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based ServicesInf. Syst. Res., 23
Haejung Yun, Gwanhoo Lee, D. Kim (2019)
A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructsInf. Manag., 56
J. Thatcher, P. Perrewé (2002)
An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-EfficacyMIS Q., 26
Sheshadri Chatterjee, S. Ghosh, Ranjan Chaudhuri (2020)
Knowledge management in improving business process: an interpretative framework for successful implementation of AI-CRM-KM system in organizationsBus. Process. Manag. J., 26
Dezhi Yin, Samuel Bond, Han Zhang (2014)
Anxious or Angry? Effects of Discrete Emotions on the Perceived Helpfulness of Online ReviewsMIS Q., 38
Z. Belyaeva, S. Shams, Gabriele Santoro, Balakrishna Grandhi (2020)
Unpacking stakeholder relationship management in the public and private sectors: the comparative insightsEuromed Journal of Business, 15
Babajide Osatuyi (2015)
Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platformsComput. Hum. Behav., 49
P. Podsakoff, Scott MacKenzie, Jeong-Yeon Lee, Nathan Podsakoff (2003)
Common method biases in behavioral research: a critical review of the literature and recommended remedies.The Journal of applied psychology, 88 5
Journal of Quality and Quantity
Y. Lew, R. Sinkovics, M. Yamin, Zaheer Khan (2016)
Trans-specialization understanding in international technology alliances: The influence of cultural distanceJournal of International Business Studies, 47
M. Al-Debei, Enas Al-Lozi, A. Papazafeiropoulou (2013)
Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspectiveDecis. Support Syst., 55
Yongqiang Sun, Nan Wang, Xiao-Liang Shen (2014)
Perceived Benefits, Privacy Risks, and Perceived Justice in Location Information Disclosure: a Moderated Mediation Analysis
M. Turner, B. Kitchenham, P. Brereton, S. Charters, D. Budgen (2010)
Does the technology acceptance model predict actual use? A systematic literature reviewInf. Softw. Technol., 52
(2018)
Data privacy and intellectual property rights in cyberspace
C. Fornell, D. Larcker (1981)
Evaluating Structural Equation Models with Unobservable Variables and Measurement ErrorJournal of Marketing Research, 18
I. Berkovich (2017)
Reflections on leadership preparation programs and social justice: Are the power and the responsibility of the faculty all in the design?Journal of Educational Administration, 55
Sheshadri Chatterjee, Ranjan Chaudhuri, D. Vrontis, A. Thrassou, S. Ghosh (2020)
ICT-enabled CRM system adoption: a dual Indian qualitative case study and conceptual framework developmentJournal of Asia Business Studies
E. Turban, David King, Jae Lee, Ting-Peng Liang, Deborrah Turban (2015)
Social Commerce: Foundations, Social Marketing, and Advertising
Sheshadri Chatterjee, A. Kar (2017)
Effects of successful adoption of information technology enabled services in proposed smart cities of India, 9
G. Festa, S. Shams, Gerardino Metallo, M. Cuomo (2019)
Enhancing stakeholder networks in wine tourism – evidence from Italian small municipalitiesEuroMed Journal of Business
Sheshadri Chatterjee, Ranjan Chaudhuri, D. Vrontis (2021)
Does data-driven culture impact innovation and performance of a firm? An empirical examinationAnnals of Operations Research
H. Smith, Tamara Dinev, Heng Xu (2011)
Information Privacy Research: An Interdisciplinary ReviewMIS Q., 35
Tamara Dinev, Paul Hart (2006)
An Extended Privacy Calculus Model for E-Commerce TransactionsInf. Syst. Res., 17
R. Laufer, Maxine Wolfe (1977)
Privacy as a Concept and a Social Issue: A Multidimensional Developmental TheoryJournal of Social Issues, 33
C. Klöckner, Silvia Ohms (2009)
The importance of personal norms for purchasing organic milkBritish Food Journal, 111
M. Keith, S. Thompson, J. Hale, Chapman Greer (2012)
Examining the Rationality of Location Data Disclosure through Mobile Devices
Pintu Shah, A. Agarwal (2020)
Cybersecurity behaviour of smartphone users in India: an empirical analysisInf. Comput. Secur., 28
A. Thrassou, D. Vrontis, M. Crescimanno, Marcella Giacomarra, A. Galati (2020)
The requisite match between internal resources and network ties to cope with knowledge scarcityJ. Knowl. Manag., 24
Sheshadri Chatterjee (2019)
Is data privacy a fundamental right in India?International Journal of Law and Management
Yoonhyuk Jung, Jonghwa Park (2018)
An investigation of relationships among privacy concerns, affective responses, and coping behaviors in location-based servicesInt. J. Inf. Manag., 43
L. Pitt, M. Parent, I. Junglas, Anthony Chan, S. Spyropoulou (2011)
Integrating the smartphone into a sound environmental information systems strategy: Principles, practices and a research agendaJ. Strateg. Inf. Syst., 20
A. Brough, Kelly Martin (2020)
Consumer Privacy During (and After) the COVID-19 PandemicJournal of Public Policy & Marketing, 40
Van Dang, T. Pham (2018)
An empirical investigation of consumer perceptions of online shopping in an emerging economyAsia Pacific Journal of Marketing and Logistics
Sheshadri Chatterjee, B. Nguyen, S. Ghosh, K. Bhattacharjee, Sumana Chaudhuri (2020)
Adoption of artificial intelligence integrated CRM system: an empirical study of Indian organizationsThe Bottom Line: Managing Library Finances, 33
C. Sabbagh, Manfred Schmitt (2016)
Past, Present, and Future of Social Justice Theory and Research
Journal of Computer-Mediated Communication, 13
Min Kim, J. James (2016)
The theory of planned behaviour and intention of purchase sport team licensed merchandiseSport, Business and Management: An International Journal, 6
H. Smith, Sandra Milberg, Sandra Burke (1996)
Information Privacy: Measuring Individuals' Concerns About Organizational PracticesMIS Q., 20
This study aims to empirically examine how consumer privacy concerns (CPC) impact smartphone usage for financial transactions. The study also investigates the moderating impact of regulations on this action.Design/methodology/approachWith the inputs from literature and related privacy theories, a theoretical model was developed. The model was later empirically validated using the partial least squares structural equation modeling technique with 367 respondents from India.FindingsThe study finds that CPC significantly impacts on consumer behavior in using smartphones for financial transactions. The study also highlights that regulation has a moderating impact on consumer usage of smartphones for financial transactions.Research limitations/implicationsThis study provides valuable inputs to smartphone service providers, practitioners, regulatory authorities and policymakers on appropriate and secure usage of smartphones by consumers, ensuring privacy protection while making financial transactions.Originality/valueThis study provides a unique model showing the antecedents of CPC to impact the behavioral reaction of smartphone users mediated through the ingredients of privacy calculus theory. Besides, this study analyzes the moderating effects of regulation on the use of smartphones for financial transactions. This is also a novel approach of this study.
Journal of Consumer Marketing – Emerald Publishing
Published: Feb 7, 2023
Keywords: Smartphone usage; Privacy calculus; Consumer privacy; Financial transactions; Privacy control
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.