<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v27i1e71951</article-id>
      <article-id pub-id-type="pmid">40367513</article-id>
      <article-id pub-id-type="doi">10.2196/71951</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Context-Contingent Privacy Concerns and Exploration of the Privacy Paradox in the Age of AI, Augmented Reality, Big Data, and the Internet of Things: Systematic Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Sarvestan</surname>
            <given-names> Javad</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Leung</surname>
            <given-names>Tiffany</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Mohanadas</surname>
            <given-names>Sadhasivam</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Mohamed Shaffi</surname>
            <given-names>Shamnad</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zhang</surname>
            <given-names>Lei</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Maheshwari</surname>
            <given-names>Harsh</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Ibikunle</surname>
            <given-names>Olumide</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Herriger</surname>
            <given-names>Christian</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0004-0780-9133</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Merlo</surname>
            <given-names>Omar</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Imperial Business School</institution>
            <institution>Imperial College London</institution>
            <addr-line>South Kensington Campus</addr-line>
            <addr-line>Exhibition Road</addr-line>
            <addr-line>London, SW7 2AZ</addr-line>
            <country>United Kingdom</country>
            <phone>44 7766227018</phone>
            <email>o.merlo@imperial.ac.uk</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4421-3679</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Eisingerich</surname>
            <given-names>Andreas B</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5531-4662</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Arigayota</surname>
            <given-names>Annisa Rizkia</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0004-4394-7170</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Imperial Business School</institution>
        <institution>Imperial College London</institution>
        <addr-line>London</addr-line>
        <country>United Kingdom</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Omar Merlo <email>o.merlo@imperial.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>14</day>
        <month>5</month>
        <year>2025</year>
      </pub-date>
      <volume>27</volume>
      <elocation-id>e71951</elocation-id>
      <history>
        <date date-type="received">
          <day>30</day>
          <month>1</month>
          <year>2025</year>
        </date>
        <date date-type="rev-request">
          <day>27</day>
          <month>2</month>
          <year>2025</year>
        </date>
        <date date-type="rev-recd">
          <day>12</day>
          <month>3</month>
          <year>2025</year>
        </date>
        <date date-type="accepted">
          <day>7</day>
          <month>4</month>
          <year>2025</year>
        </date>
      </history>
      <copyright-statement>©Christian Herriger, Omar Merlo, Andreas B Eisingerich, Annisa Rizkia Arigayota. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 14.05.2025.</copyright-statement>
      <copyright-year>2025</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2025/1/e71951" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Despite extensive research into technology users’ privacy concerns, a critical gap remains in understanding why individuals adopt different standards for data protection across contexts. The rise of advanced technologies such as the Internet of Things (IoT), artificial intelligence (AI), augmented reality (AR), and big data has created rapidly evolving and complex privacy landscapes. However, privacy is often treated as a static construct, failing to reflect the fluid, context-dependent nature of user concerns. This oversimplification has led to fragmented research, inconsistent findings, and limited capacity to address the nuanced challenges posed by these technologies. Understanding these dynamics is especially crucial in fields such as digital health and informatics, where sensitive data and user trust are central to adoption and ethical innovation.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study synthesized existing research on privacy behaviors in emerging technologies, focusing on IoT, AI, AR, and big data. Its primary objectives were to identify the psychological antecedents, outcomes, and theoretical frameworks explaining privacy behavior, and to assess whether insights from traditional online privacy literature, such as e-commerce and social networking, apply to these advanced technologies. It also advocates a context-dependent approach to understanding privacy.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A systematic review of 179 studies synthesized psychological antecedents, outcomes, and theoretical frameworks related to privacy behaviors in emerging technologies. Following established guidelines and using leading research databases such as ScienceDirect (Elsevier), SAGE, and EBSCO, studies were screened for relevance to privacy behaviors, focus on emerging technologies, and empirical grounding. Methodological details were analyzed to assess the applicability of traditional privacy findings from e-commerce and social networking to today’s advanced technologies.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The systematic review revealed key gaps in the privacy literature on emerging technologies, such as IoT, AI, AR, and big data. Contextual factors, such as data sensitivity, recipient transparency, and transmission principles, were often overlooked, despite their critical role in shaping privacy concerns and behaviors. The findings also showed that theories developed for traditional technologies often fall short in addressing the complexities of modern contexts. By synthesizing psychological antecedents, behavioral outcomes, and theoretical frameworks, this study underscores the need for a context-contingent approach to privacy research.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study advances understanding of user privacy by emphasizing the critical role of context in data sharing, particularly amid ubiquitous and emerging health technologies. The findings challenge static views of privacy and highlight the need for tailored frameworks that reflect dynamic, context-dependent behaviors. Practical implications include guiding health care providers, policy makers, and technology developers toward context-sensitive strategies that build trust, enhance data protection, and support ethical digital health innovation.</p>
        </sec>
        <sec sec-type="trial registration">
          <title>Trial Registration</title>
          <p>PROSPERO CRD420251037954; https://www.crd.york.ac.uk/PROSPERO/view/CRD420251037954</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy paradox</kwd>
        <kwd>systematic literature review</kwd>
        <kwd>contextual integrity</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>Internet of Things</kwd>
        <kwd>privacy concerns</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Technological Advances and the Evolving Privacy Landscape</title>
        <p>The context in which data are collected is crucial to individuals, as they are more likely to feel concerned about their privacy when their conversations are recorded without their knowledge or consent [<xref ref-type="bibr" rid="ref1">1</xref>]. Moreover, the latest technological advances, such as big data, augmented reality (AR), artificial intelligence (AI), and the Internet of Things (IoT), are changing the privacy context at an increasingly rapid pace [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]; devices such as Alexa collect rich data by continuously monitoring, tracking, and analyzing user behavior, which has resulted in increased concerns about their pervasiveness and user privacy [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. In the context of digital health technologies, inadequate privacy policies, such as unclear or inaccessible terms, have hindered user trust and adoption, as users question the transparency and commitment of developers to safeguarding their data [<xref ref-type="bibr" rid="ref9">9</xref>]. Broader concerns about data privacy and trust, as highlighted by incidents such as Cambridge Analytica’s exploitation of personal data and the NHS Royal Free Trust’s data sharing with DeepMind, underscore the critical need for stronger privacy governance frameworks [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>In this study, we focused on the privacy paradox [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. More specifically, although scholars have theorized that users engage in a risk-benefit assessment to weigh the benefits of sharing their data against the potential risks [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>], numerous questions remain about the privacy paradox. For example, why are users more concerned about privacy in some contexts than others? In today’s environment, where more cutting-edge technologies are available to users, are privacy concerns changing compared to before, when they had access to just a few connected technologies, such as e-commerce websites and social media platforms? In addition, research has tended to offer a fragmented view of this phenomenon, analyzing it from several different perspectives, which points to the need to bring together and synthesize a disparate body of literature.</p>
        <p>We posit that user privacy should be studied as a context-dependent and fluid concept rooted in the contextual integrity theory by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>], because context is a critical variable in data disclosure scenarios [<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref20">20</xref>]. Accordingly, this study aimed to make several important contributions to the field of privacy research in cutting-edge technologies.</p>
        <p>We conducted a systematic literature review that synthesizes the various contexts in which research on privacy behaviors in IoT, AI, AR, and big data has been undertaken. The purpose of the systematic literature review was to identify the psychological antecedents, outcomes, and theories that describe privacy behavior in these new scenarios. Critically, we explore whether the findings from this body of research on cutting-edge technologies differ from previous findings in the traditional online privacy literature, such as e-commerce and social networking sites (SNS). By doing so, the study makes a valuable contribution by providing insights into how technological advancements are changing the privacy landscape and whether established privacy theories are applicable in these new contexts.</p>
        <p>In addition, we offer a more context-contingent lens of privacy that positions context as the key variable in understanding different user behaviors in privacy scenarios. This addresses a substantial gap in the literature, as calls for the use of such a lens have so far been neglected [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. This study aimed to bridge the gap toward a more context-contingent privacy discussion by examining 179 research studies and offering several theoretical contributions. The findings confirmed that contextual factors have been largely overlooked in privacy research on cutting-edge technologies, with only a small number of studies explicitly defining items aligning with the 5 parameters of information flows by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>]. Our findings suggest that the perceived dichotomy between privacy concerns and behavioral intentions is not inherently paradoxical but instead reflects a lack of comprehensive understanding in a holistic and context-sensitive framework. Also, we find that past research findings in related domains (eg, e-commerce) do undergo alterations when study designs are transferred into the context of contemporary cutting-edge technologies.</p>
        <p>The study offers significant implications for businesses, regulators, policy makers, and researchers, underscoring the importance of adopting context-sensitive privacy practices and policies. By tailoring privacy measures to the specific contexts in which cutting-edge technologies such as IoT, AI, AR, and big data operate, stakeholders can better safeguard users’ privacy while fostering trust and responsible technology adoption. These insights are also particularly relevant for health care and technology domains, where privacy concerns are critical to user acceptance and the ethical deployment of emerging innovations [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
      </sec>
      <sec>
        <title>Background</title>
        <p>The rise of the internet has amplified concerns about privacy in interactions with online services. Paradoxically, however, individuals often display minimal effort or intent to safeguard their privacy [<xref ref-type="bibr" rid="ref24">24</xref>]. Over the years, scholars have sought to explain this apparent disconnect between privacy attitudes and behaviors, using various theoretical frameworks and conceptual approaches [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. However, to date, a widely accepted explanation of such user behavior in online disclosure situations, or the privacy paradox, has not been formulated, despite systematic efforts [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
        <p>Two key ideas have generated considerable interest in this field. First, prior work has argued that users perform a risk-benefit assessment before disclosing data [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. In this privacy calculus, perceived benefits typically outweigh perceived risks, elucidating why individuals continue to disclose information despite concerns [<xref ref-type="bibr" rid="ref26">26</xref>]. However, research has shown that the rationality of this calculus is frequently clouded or wholly abandoned. This is due to individuals’ limited mental processing ability, which is heavily influenced by cognitive biases, heuristics [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref30">30</xref>], habits [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>], knowledge deficiency [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref33">33</xref>], or personality traits [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. These factors may even contradict the rationalism of the privacy calculus theory as a whole [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>].</p>
        <p>In recent years, privacy researchers have attempted to clarify the relationship between privacy attitudes and behavior. However, the literature has produced ambiguous findings, prompting some scholars to shift their focus toward contextual explanations. One such approach suggests that privacy concerns should be contextualized by examining users’ privacy concerns, corresponding antecedents, and disclosure behavior in specific information-sharing environments [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. According to the theory of contextual integrity by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>], privacy should be evaluated based on whether the flow of information is appropriate in a given context [<xref ref-type="bibr" rid="ref39">39</xref>]. When informational norms are breached, privacy is violated [<xref ref-type="bibr" rid="ref40">40</xref>]. These norms are defined by 5 parameters, namely the type of information being shared (attribute), with which recipient (actor), regarding whose information (individual), using which device (sender), and under which specific condition (transmission principles) [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. Incomplete or ambiguous observations are expected if any of these parameters are missing [<xref ref-type="bibr" rid="ref40">40</xref>]. It could be argued that the contextualization of privacy also defines how risks and benefits are perceived in the privacy calculus and what heuristics and cognitive processes are evoked.</p>
        <p>Since privacy behavior is a highly context-dependent phenomenon, ambiguous results in the privacy literature may be explained by the context in which users experience information-sharing situations [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref41">41</xref>-<xref ref-type="bibr" rid="ref43">43</xref>]. In a study by Solove [<xref ref-type="bibr" rid="ref21">21</xref>], this argument was taken further, suggesting that the privacy paradox may not be a paradox after all because discrepancies between human behavior and attitudes do not necessarily contradict each other. Solove [<xref ref-type="bibr" rid="ref21">21</xref>] argued that “behavior involves choices about risk in specific contexts” and “attitudes involve people’s broader valuation of privacy, often across many contexts.” Consequently, findings attempting to predict context-dependent behavior from generalized privacy attitudes will often be ambiguous, since they fundamentally measure different things (ie, general attitudes vs specific risks and benefits in a given situation).</p>
        <p>Numerous studies have highlighted the significance of context in relation to privacy in information sharing [<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. Previous work has shown the importance of user engagement [<xref ref-type="bibr" rid="ref45">45</xref>-<xref ref-type="bibr" rid="ref47">47</xref>] and noted the role of transparency and open sharing of information with users [<xref ref-type="bibr" rid="ref48">48</xref>-<xref ref-type="bibr" rid="ref55">55</xref>]. However, despite calls within the literature to investigate the role of context in privacy in a comprehensive and theory-grounded manner [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>], such research has largely been ignored (the study by Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>] presents a notable exception). Developing an understanding of the phenomenon that incorporates context as a critical driver of privacy concerns is essential for researchers, policy makers, and practitioners. This approach not only helps achieve more broadly applicable and less ambiguous results in privacy research but also ensures that future research, policy making, and product design decisions are more user-centric and ethically grounded [<xref ref-type="bibr" rid="ref37">37</xref>]. For fields such as health care and digital health technologies, where privacy is a cornerstone of trust and adoption, a context-sensitive perspective is particularly crucial. By addressing privacy concerns within specific contexts, stakeholders can better design interventions, policies, and technologies that promote secure and responsible use while enhancing user engagement and compliance.</p>
        <p>To improve our understanding of context-contingent privacy concerns it is useful to synthesize existing research to identify overarching patterns [<xref ref-type="bibr" rid="ref37">37</xref>]. While there have been several review studies and one meta-study on the topic [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref58">58</xref>-<xref ref-type="bibr" rid="ref60">60</xref>], to our knowledge, no research has yet attempted to synthesize recent findings through a contextual lens. This study aimed to fill this gap by drawing on the theory of contextual integrity by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>]. In addition, context and associated challenges are constantly evolving due to technological advancements such as IoT, AI, and big data. For instance, machine learning and data aggregation techniques can now infer and predict sensitive behavior or classifications from data types that were not previously considered sensitive [<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref62">62</xref>]. These predictions can be made even if the individual being observed has not opted in to use a particular service or product [<xref ref-type="bibr" rid="ref63">63</xref>]. An example of this is how AI can predict sexual orientation with up to 91% accuracy from just 5 images of a person’s face [<xref ref-type="bibr" rid="ref64">64</xref>], which Nissenbaum [<xref ref-type="bibr" rid="ref40">40</xref>] refers to as the <italic>data food chain</italic> (ie, data of higher order are inferred from lower-order data).</p>
        <p>Recent review studies, such as the ones by Gerber et al [<xref ref-type="bibr" rid="ref14">14</xref>] and Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>], have not focused on IoT or AI technologies. In contrast, this study aimed to shed light on potential novel privacy concerns in the context of cutting-edge technologies. Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>] demonstrated that the literature on privacy has undergone significant changes in the past 2 decades, including increased focus on contextual factors. However, with the rise of IoT, AI, AR, and big data technologies, which have gained greater attention in academia due to higher adoption rates, there is a need for an up-to-date analysis. This study is also driven by recent calls for more systematic reviews to better understand the complex and ever-changing concept of “user privacy” [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</p>
        <p>To address this gap in the existing literature, we conducted a systematic literature review focusing on 3 key research questions: first, in what specific contexts related to information flows have privacy concerns been studied in the age of AI, IoT, big data, and AR? Second, what psychological antecedents, outcomes, and theories explain privacy behavior in these technologies? Finally, how does privacy-related behavior in cutting-edge technologies differ from prior findings in contexts, such as websites, mobile apps, SNS, or e-commerce? By addressing these questions, this study provides a synthesized overview and a crucial first step toward a context-contingent understanding of privacy, offering actionable insights for future research.</p>
        <p>This understanding is particularly relevant for the fields of digital health and medical informatics, where privacy concerns are often heightened due to the sensitive nature of personal data. It equips policy makers and practitioners with tools to better address privacy violations, empower users with greater control over their data (eg, privacy self-management), and promote safer technological ecosystems through design principles such as privacy by design [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref66">66</xref>-<xref ref-type="bibr" rid="ref68">68</xref>]. In doing so, this study can help advance our understanding and application of technology to improve user trust and system efficacy in health care and beyond.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>We conducted a systematic literature review to offer a transparent and comprehensive analysis of the existing literature and to develop a more context-contingent understanding of privacy concerns [<xref ref-type="bibr" rid="ref69">69</xref>-<xref ref-type="bibr" rid="ref71">71</xref>]. Compared to traditional reviews, systematic literature reviews are less biased, more accessible, and provide higher validity because they use rigorous, scientific, and transparent methods in line with strict guidelines, which allow for replicability of results [<xref ref-type="bibr" rid="ref72">72</xref>-<xref ref-type="bibr" rid="ref75">75</xref>]. Systematic literature reviews are particularly helpful to achieve knowledge synthesis and can enable a broader scope than traditional narrative reviews, which is essential when addressing the interdisciplinary research questions posed in this paper [<xref ref-type="bibr" rid="ref74">74</xref>]. Our systematic literature review adhered to the guidelines suggested in a study by Booth et al [<xref ref-type="bibr" rid="ref75">75</xref>] and Fisch and Block [<xref ref-type="bibr" rid="ref70">70</xref>]. A completed PRISMA 2020 checklist is provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. To ensure replicability, we provided a detailed and transparent account of our process, which we outline in the subsequent section.</p>
      </sec>
      <sec>
        <title>Motivation, Scope, and Systematic Literature Review</title>
        <p>A systematic literature search was conducted using electronic databases to minimize biases and selection errors associated with manual search queries [<xref ref-type="bibr" rid="ref76">76</xref>]. The chosen databases, ScienceDirect (Elsevier), SAGE, and EBSCO served as the primary sources for the search, given their advanced search capabilities and extensive collections of scientific articles in pertinent fields, such as business, psychology, and IT, spanning several decades.</p>
        <p>To further enrich the search results, Google Scholar and the reference lists of relevant articles were also used to identify potentially overlooked sources [<xref ref-type="bibr" rid="ref77">77</xref>]. Various keyword combinations, including “AI,” “IoT,” “Big Data,” “Augmented Reality,” and “Machine Learning,” were used in the search process, as these terms often encompass overlapping concepts and applications. For instance, IoT devices can operate on AI algorithms, generating ARs while collecting vast amounts of data classified as big data [<xref ref-type="bibr" rid="ref78">78</xref>-<xref ref-type="bibr" rid="ref81">81</xref>].</p>
        <p>Search queries were designed to include the selected keywords in the articles’ titles, abstracts, and listed keywords. A representative and simplified Boolean search sentence used for this purpose is presented in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>. For the complete search strategy used across databases, including all keyword categories and filters, see <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
        <p>Furthermore, advanced search functions, such as filtering for peer-reviewed articles only, were used to streamline the search process and enhance the quality of the results. Consequently, a total of 521 articles and conference papers were identified and retrieved from the initial search conducted on the 3 primary databases, in addition to the supplementary searches on Google Scholar and relevant reference lists.</p>
        <boxed-text id="box1" position="float">
          <title>A representative and simplified Boolean search sentence used for the systematic review.</title>
          <p>(TI privacy OR “privacy paradox” OR “privacy concern”) AND (“privacy concerns” OR “privacy paradox” OR personalization paradox OR perceived vulnerability OR disclosure OR perceived control OR risk OR willingness to disclose OR user OR user OR adoption) AND (internet of things OR iot OR “smart devices” OR “connected device” OR “artificial intelligence” OR ai OR big data OR machine learning OR augmented reality OR ar OR virtual reality)</p>
        </boxed-text>
      </sec>
      <sec>
        <title>Assessing the Existing Body of Literature</title>
        <p>The body of literature retrieved was subsequently assessed using the Covidence (Veritas Health Innovation Ltd) tool, with explicit exclusion and inclusion criteria established to systematically evaluate the existing evidence [<xref ref-type="bibr" rid="ref70">70</xref>]. The primary objective of this initial assessment was to refine the dataset to include only the most pertinent articles that would address the research questions. To this end, duplicates (n=53) and nonrelevant papers (n=128) were removed from the total pool of 521 abstracts. Articles were deemed nonrelevant if they were not written in English or focused on different aspects of privacy research, such as technical privacy-enhancing software or ethics, rather than examining the psychological or behavioral interrelationships. Following this initial screening, 340 studies remained and underwent a full-text review for eligibility. An additional 161 articles were excluded at this stage for various reasons: they were not peer-reviewed; not empirical (including review studies); unrelated to the research objectives; of low quality (ie, lacking clarity or transparency); previously overlooked duplicates; or their full texts were unattainable [<xref ref-type="bibr" rid="ref75">75</xref>]. As a result, the final dataset for analysis comprised 179 studies, which served as the basis for the subsequent synthesis and evaluation.</p>
      </sec>
      <sec>
        <title>Analyzing and Synthesizing Findings</title>
        <p>In the final stage of analysis, the 179 selected studies were systematically synthesized and categorized, based on the established screening process. Following the guidelines proposed by Booth et al [<xref ref-type="bibr" rid="ref75">75</xref>], key characteristics of each study, such as authors, title, abstract, year of publication, and the type and name of the publication, were organized in a table. Methodological factors, including study design, sample size, used theories, data collection procedures, and measures, were also documented. To address the first research question (ie, in what contexts related to information flows have privacy concerns been studied?), the analysis of the final dataset involved coding the studies according to the domains and contexts in which they were conducted. The theory of contextual integrity by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>] was used, with studies coded based on the 5 parameters of information flows: data subject, sender, recipient, information type, and transmission principle. In addition, the 5-party personal information privacy model by Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>], building on the study by Conger et al [<xref ref-type="bibr" rid="ref82">82</xref>], was adopted to gain a more nuanced understanding of the recipients of personal information (<xref rid="figure1" ref-type="fig">Figure 1</xref> [<xref ref-type="bibr" rid="ref24">24</xref>]). The model facilitated the identification of numerous, often concealed parties potentially engaged in data sharing scenarios, highlighting the complexity of privacy in advanced technologies that extend beyond a traditional sender-recipient model. Finally, the findings of each study, including graphical conceptualizations of research models if given, were incorporated into the analysis. This comprehensive approach facilitated a deeper examination of antecedents, mediators, moderators, control variables, and outcomes related to privacy attitudes and behaviors, which in turn allowed for the exploration of the second and third research objectives (ie, identifying key psychological antecedents, outcomes, and theories and comparing privacy-related behavior in cutting-edge technologies vs older technologies).</p>
        <p>It is important to note that the codes used during this process were not predetermined; rather, they emerged inductively from the analysis of the articles [<xref ref-type="bibr" rid="ref73">73</xref>]. Whenever a context, domain, or psychological factor (ie, antecedents or outcomes) was mentioned, a code was annotated in the full text and subsequently transferred to the table.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Five-party model of personal information privacy. AI: artificial intelligence; AR: augmented reality; IoT: Internet of Things; SNS: social networking sites.</p>
          </caption>
          <graphic xlink:href="jmir_v27i1e71951_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview of Dataset</title>
        <p>The analysis of the final dataset comprising 179 studies aimed to provide an overview of common characteristics among the selected studies. These studies were identified through a structured screening process, as illustrated in <xref rid="figure2" ref-type="fig">Figure 2</xref>. The volume of relevant studies has experienced a considerable increase in recent years. The earliest article in this dataset was published in 1999, and since the early 2010s, academic interest in privacy-related topics has gained significant momentum. Notably, the number of publications doubled between 2020 and 2021, and 2022 (when this literature review was carried out) witnessed a new peak in output, as at the time of the analysis, the publication count was only 8 fewer than that in 2021. This increase aligns with the expectations, as the focus of this study is on privacy within the context of emerging technologies (ie, AI, big data, and IoT). These technologies have seen a rise in relevance and adoption rates during the same period, as can be seen in a study by Transforma Insights [<xref ref-type="bibr" rid="ref5">5</xref>]. Moreover, the growing prominence of privacy research can be attributed to the unfolding of the information age, which has placed privacy at the forefront of academic discourse. Many scholars consider privacy to be “the issue of our times” [<xref ref-type="bibr" rid="ref83">83</xref>], further highlighting its importance in contemporary research.</p>
        <p>The thematic composition of journals publishing articles on privacy merits particular attention. To evaluate the quality and core focus of these journals, we used the journal quality list devised by Harzing [<xref ref-type="bibr" rid="ref84">84</xref>], as well as the methodology outlined by Mustak et al [<xref ref-type="bibr" rid="ref73">73</xref>]. Our analysis included 157 journal articles, 19 conference papers, and 3 book chapters. In the infrequent instances where a journal was absent from the list by Harzing [<xref ref-type="bibr" rid="ref84">84</xref>], the authors determined the appropriate categorization by aligning the journal’s website description with a suitable classification. As there was no uniform and reliable method for categorizing conference papers and book chapters, these were grouped under “others” following the classifications proposed by Harzing [<xref ref-type="bibr" rid="ref84">84</xref>]. Upon closer examination, it became evident that a multitude of journals from diverse knowledge areas had explored privacy as a research subject, thereby highlighting the interdisciplinary nature and relevance of the topic. However, as outlined in <xref ref-type="table" rid="table1">Table 1</xref>, journals within the information systems and knowledge management domains accounted for the largest portion of the literature, comprising 44.7% (80/179) of the total body. In addition, marketing journals made a substantial contribution (40/179, 22.4%), with nearly a quarter of the articles appearing in publications from this field.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flowchart.</p>
          </caption>
          <graphic xlink:href="jmir_v27i1e71951_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Number of publications in the various knowledge areas of journals based on the list by Harzing [<xref ref-type="bibr" rid="ref84">84</xref>] (N=179).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Knowledge area</td>
                <td>Publications, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Management information systems and knowledge management</td>
                <td>80 (44.7)</td>
              </tr>
              <tr valign="top">
                <td>Marketing</td>
                <td>40 (22.4)</td>
              </tr>
              <tr valign="top">
                <td>Communication</td>
                <td>16 (8.9)</td>
              </tr>
              <tr valign="top">
                <td>Psychology</td>
                <td>5 (2.8)</td>
              </tr>
              <tr valign="top">
                <td>Public sector management</td>
                <td>4 (2.2)</td>
              </tr>
              <tr valign="top">
                <td>Operations research, management science, and production and operations management</td>
                <td>3 (1.7)</td>
              </tr>
              <tr valign="top">
                <td>Tourism</td>
                <td>3 (1.7)</td>
              </tr>
              <tr valign="top">
                <td>Organization behavior or studies, human resource management, and industrial relations</td>
                <td>1 (0.6)</td>
              </tr>
              <tr valign="top">
                <td>Innovation</td>
                <td>1 (0.6)</td>
              </tr>
              <tr valign="top">
                <td>Economics</td>
                <td>1 (0.6)</td>
              </tr>
              <tr valign="top">
                <td>Others (conference paper, book chapter, or not matching the category in the list by Harzing)</td>
                <td>25 (14)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>During the analysis, each paper was assigned a code corresponding to a primary theme. This theme was predominantly determined by the device used in study designs (ie, the sender parameter) of an article. For instance, if a study examined privacy concerns among mobile app users, the “mobile” code was assigned. In cases where chatbot recommendations elicited privacy concerns, the “AI” code was used. When a specific sender was not identified, the thematic topic was recorded, and the “other” code was applied. This coding system aimed to offer a concise overview of the research focus in contemporary literature, facilitating our analysis in subsequent stages. However, it is important to acknowledge that these codes can be considered subjective and potentially ambiguous due to the often closely related or synonymous terminologies in the field. For example, a voice assistant (ie, IoT) could also be classified as AI. Despite this, the results presented in <xref ref-type="table" rid="table2">Table 2</xref> reveal that the primary research focus areas thus far have been related to IoT, SNS, mobile, and AI. Finally, upon excluding nonempirical findings, it was observed that most studies (146/179, 81.6%) exhibited a quantitative methodological orientation, with only a small number of studies (17/179, 9.5%) adopting purely qualitative methods or implementing a mixed methods approach (16/179, 8.9%).</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Number of predominant themes that emerged from the analyzed studies (N=179).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="770"/>
            <col width="0"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Predominant theme</td>
                <td>Publications, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">Internet of Things</td>
                <td>48 (26.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Social networking sites (including social media and instant messengers on mobile or websites)</td>
                <td>29 (16.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Mobile (including apps, location-based services, and mobile e-commerce)</td>
                <td>20 (11.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Artificial intelligence</td>
                <td>20 (11.2)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Big data</td>
                <td>9 (5)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Website (including e-commerce)</td>
                <td>9 (5)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Augmented reality</td>
                <td>7 (3.9)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Other (unspecified)</bold>
                </td>
                <td>37 (20.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>In e-commerce</td>
                <td colspan="2">7 (3.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>General online privacy concerns</td>
                <td colspan="2">30 (16.8)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Analysis of Context</title>
        <sec>
          <title>Overview</title>
          <p><xref ref-type="table" rid="table3">Table 3</xref> shows the results of the analysis of contexts (ie, information flows) used to study privacy concerns in the age of cutting-edge technologies (ie, AI, IoT, big data, and AR). Results for each contextual dimension are discussed subsequently.</p>
          <table-wrap position="float" id="table3">
            <label>Table 3</label>
            <caption>
              <p>Number of contextual dimensions (ie, information flow parameters) of analyzed studies.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="770"/>
              <col width="0"/>
              <col width="200"/>
              <thead>
                <tr valign="top">
                  <td colspan="3">Contextual dimension and code</td>
                  <td>Publications, n (%)</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Subject</bold>
                    <bold>(n=179)</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (IoT<sup>a</sup>)</td>
                  <td colspan="2">50 (27.9)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (online)</td>
                  <td colspan="2">37 (20.7)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (SNS<sup>b</sup>)</td>
                  <td colspan="2">30 (16.8)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (AI<sup>c</sup>)</td>
                  <td colspan="2">18 (10.1)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (mobile)</td>
                  <td colspan="2">18 (10.1)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Shopper (e-commerce)</td>
                  <td colspan="2">13 (7.3)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (AR<sup>d</sup>)</td>
                  <td colspan="2">7 (3.9)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Citizen</td>
                  <td colspan="2">2 (1.1)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>User (big data)</td>
                  <td colspan="2">2 (1.1)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Employee</td>
                  <td colspan="2">2 (1.1)</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Sender</bold>
                    <bold>(n=179)</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>IoT</td>
                  <td colspan="2">51 (27.9)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>SNS</td>
                  <td colspan="2">28 (15.6)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Website</td>
                  <td colspan="2">26 (14.5)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Mobile</td>
                  <td colspan="2">24 (13.4)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>AI</td>
                  <td colspan="2">18 (10.1)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Online or offline general total</td>
                  <td colspan="2">23 (12.8)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Multiple sender</td>
                  <td colspan="2">5 (2.8)</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Recipient (actor;</bold>
                    <bold>n=179)</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Analyzed with varying sensitivity</td>
                  <td colspan="2">26 (14.5)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Not analyzed for sensitivity</td>
                  <td colspan="2">123 (68.7)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Not specified</td>
                  <td colspan="2">30 (16.8)</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Type of information (attribute; n=184)<sup>e</sup></bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>General and unspecified personal information</td>
                  <td colspan="2">74 (41.3)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Specified personal information total</td>
                  <td colspan="2"><italic>97</italic> (54.2)<sup>e</sup></td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Not specified (ie, not mentioned)</td>
                  <td colspan="2">13 (7.3)</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Transmission principle (n=192)<sup>e</sup></bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Specified</td>
                  <td colspan="2">50 (<italic>28.4</italic>)<sup>e</sup></td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Not specified</td>
                  <td colspan="2">142 (79.3)</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table3fn1">
                <p><sup>a</sup>IoT: Internet of Things.</p>
              </fn>
              <fn id="table3fn2">
                <p><sup>b</sup>SNS: social networking sites.</p>
              </fn>
              <fn id="table3fn3">
                <p><sup>c</sup>AI: artificial intelligence.</p>
              </fn>
              <fn id="table3fn4">
                <p><sup>d</sup>AR: augmented reality.</p>
              </fn>
              <fn id="table3fn5">
                <p><sup>e</sup>Number and percentage in the table indicate how often a parameter was found in a paper. The same paper may belong to multiple categories in a given dimension. The percentage was calculated with a base value of 179. For example, in 79.3% of papers, no transmission principle was specified.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Individuals (Subjects) Whose Data Are Being Collected</title>
          <p>Data collection subjects were categorized into 10 groups based on how articles delineated their respondents within study designs. For instance, a user could be perceived as a generic online user [<xref ref-type="bibr" rid="ref85">85</xref>], an IoT device user [<xref ref-type="bibr" rid="ref61">61</xref>], or a citizen interacting with an e-government platform [<xref ref-type="bibr" rid="ref86">86</xref>,<xref ref-type="bibr" rid="ref87">87</xref>]. A substantial majority of studies closely adhere to the device used in study designs (ie, the sender) and implicitly or explicitly define users accordingly. Exceptions included extracted codes for designs specifically focusing on employees (2/179, 1.1%), e-commerce shoppers (13/179, 7.3%), and citizens (2/179, 1.1%). The 3 most prominent types were IoT users (50/179, 27.9%), generic online users (37/179, 20.7%), and SNS users (30/179, 16.8%). These results largely align with our expectations.</p>
          <p>However, the low counts for AR users were unexpected, given that the terms “augmented” and “virtual reality” were part of the initial search query. The impressive market growth rates and relevance across multiple sectors also suggested higher academic significance [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref88">88</xref>]. Moreover, it is worth noting that, despite our up-to-date dataset, SNS continue to attract considerable attention, even though they were not included in our initial search query [<xref ref-type="bibr" rid="ref89">89</xref>-<xref ref-type="bibr" rid="ref92">92</xref>]. To maintain manageable results, we opted against coding with even greater granularity. For example, a few studies concentrated on specific demographic groups such as children [<xref ref-type="bibr" rid="ref93">93</xref>,<xref ref-type="bibr" rid="ref94">94</xref>], teenagers [<xref ref-type="bibr" rid="ref95">95</xref>], or individuals with low socioeconomic status [<xref ref-type="bibr" rid="ref96">96</xref>]. Most studies in our dataset controlled for demographics and incorporated corresponding variables, such as age or gender.</p>
        </sec>
        <sec>
          <title>Devices (Sender) Used to Transmit Personal Information</title>
          <p>The sender parameter results offer a detailed perspective on the specific technologies examined by studies in our dataset. In accordance with findings in the user category, we observe that IoT senders represent the most substantial share in this dimension (51/179, 27.9%). However, when using a more intricate coding, we notice differences in the particular device types. For example, the most prominent single sender type is not an IoT device but rather SNS (28/179, 15.6%), followed by websites (26/179, 14.5%) and mobile devices (24/179, 13.4%). IoT smart assistants ranked as the fourth most prevalent device type within the dataset (21/179, 11.7%). The high occurrence of SNS senders in the sender parameter was unexpected, prompting further investigation. Most of the analyzed SNS studies in our contemporary sample focused on Facebook users [<xref ref-type="bibr" rid="ref89">89</xref>-<xref ref-type="bibr" rid="ref92">92</xref>]. Despite their popularity and growth rates, Instagram and TikTok played no role in the SNS studies within our dataset.</p>
          <p>Notably, only 2.8% (5/179) of studies investigated 2 different sender types concurrently, and merely one of them incorporated 4 distinct devices in its study design. This is despite recent evidence suggesting that user devices can impact privacy concerns, such as smartphones increasing privacy disclosure intentions compared to PCs [<xref ref-type="bibr" rid="ref97">97</xref>,<xref ref-type="bibr" rid="ref98">98</xref>]. In addition, 12.8% (23/179) papers did not explicitly define a sender and offered a more general level of analysis. Upon closer examination, we found that the absence of a sender type definition was frequently associated with a relatively early publication year [<xref ref-type="bibr" rid="ref99">99</xref>-<xref ref-type="bibr" rid="ref101">101</xref>]. Another reason was the investigation of another contextual dimension, necessitating control for other dimensions such as information sensitivity [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref102">102</xref>,<xref ref-type="bibr" rid="ref103">103</xref>]. Over recent years, the privacy literature has arguably developed a more nuanced understanding concerning the definition of the sender dimension in studies [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
        </sec>
        <sec>
          <title>Recipient of Personal Information</title>
          <p>A particularly intriguing contextual dimension concerning cutting-edge technologies pertains to the recipient of personal information, as the methods of data collection and sharing with second, third, fourth, or even fifth parties are rapidly evolving (<xref rid="figure1" ref-type="fig">Figure 1</xref>) [<xref ref-type="bibr" rid="ref24">24</xref>]. The concept previously referred to as the “data food chain” [<xref ref-type="bibr" rid="ref40">40</xref>] highlights the significance and complexity of incorporating this dimension into study designs. Through big data mining, data aggregation, and data analytics, organizations can now predict online and offline behavior using vast, seemingly unrelated data points [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref104">104</xref>].</p>
          <p>However, only Hermes et al [<xref ref-type="bibr" rid="ref105">105</xref>] and Xie and Karan [<xref ref-type="bibr" rid="ref92">92</xref>] have explicitly examined the so-called hidden fifth party (2/179, 1.1%). Most articles (146/179, 81.6%) primarily focus on the direct transaction between a user (first party) and the manufacturer or provider of a device or service (second party). Contrary to findings in Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>], the intended or unintended sharing with third parties was not as prevalently studied in our dataset as anticipated (22/179, 12.2%). Nevertheless, we observed a similar trend to the cited study, with more recent articles beginning to investigate illegal, unauthorized secondary access by fourth-party entities (9/179, 5%). Moreover, a mere 14.5% (26/179) papers in the sample considered varying the sensitivity of the data recipient while examining privacy concerns, such as altering the sharing of personal information with device manufacturers or third-party advertisers. Some notable examples include studies by Abdi et al [<xref ref-type="bibr" rid="ref61">61</xref>], Lee and Kobsa [<xref ref-type="bibr" rid="ref106">106</xref>], Leom et al [<xref ref-type="bibr" rid="ref39">39</xref>], Lutz and Newlands [<xref ref-type="bibr" rid="ref107">107</xref>], Marmion et al [<xref ref-type="bibr" rid="ref108">108</xref>], and Martin and Nissenbaum [<xref ref-type="bibr" rid="ref19">19</xref>]. However, almost 70% (123/179) of the analyzed articles did not investigate users’ varying perceived sensitivity toward recipients of their personal information, despite the increasing importance of this dimension, particularly in the IoT, AI, AR, and big data era [<xref ref-type="bibr" rid="ref24">24</xref>]. The implications of this will be discussed later in the paper.</p>
        </sec>
        <sec>
          <title>Type of Information Being Shared</title>
          <p>The idea that variations in privacy behavior may also depend on the type of information shared with an entity was introduced relatively early in the literature [<xref ref-type="bibr" rid="ref109">109</xref>,<xref ref-type="bibr" rid="ref110">110</xref>]. Our analysis revealed that more than half of the studies (97/179, 54%) mention a specific type of information being collected in their experiments or designs. Several studies in this set either focus on a particular information type exclusively (37/179, 20.7%) or investigate multiple information types without further categorization (ie, examining credit card details and purchase history, among other things, without classifying them as “financial” or “transactional” information; 22/179, 12.3%). Although a significant number of articles do not specify the type of personal information collected (74/179, 41.3%), we observed a trend indicating that an increasing number of researchers are varying the sensitivity of information types to obtain more meaningful and comprehensive results (38/179, 21.2%). In fact, 24 (13%) out of the 38 studies that experiment with variation in this parameter were published within the last 5 years. Notable examples among these include studies by Abdi et al [<xref ref-type="bibr" rid="ref61">61</xref>], Apthorpe et al [<xref ref-type="bibr" rid="ref17">17</xref>], Carignani and Gemmo [<xref ref-type="bibr" rid="ref111">111</xref>], Cichy et al [<xref ref-type="bibr" rid="ref112">112</xref>], Leom et al [<xref ref-type="bibr" rid="ref39">39</xref>], Markos et al [<xref ref-type="bibr" rid="ref18">18</xref>], Markos et al [<xref ref-type="bibr" rid="ref113">113</xref>], and Marmion et al [<xref ref-type="bibr" rid="ref108">108</xref>].</p>
        </sec>
        <sec>
          <title>Transmission Principles in Data Sharing Situations</title>
          <p>The principles governing data transmission relate to the why and under what conditions personal information is being shared with recipients. For instance, Abdi et al [<xref ref-type="bibr" rid="ref61">61</xref>] discovered that the acceptability of data sharing scenarios is contingent upon factors, such as the retention duration, user notification regarding data usage, and assurances of anonymity and confidentiality. Lee and Kobsa [<xref ref-type="bibr" rid="ref106">106</xref>,<xref ref-type="bibr" rid="ref114">114</xref>] corroborate these findings, highlighting the significance of the rationale behind personal data collection in shaping users’ judgments. For instance, users may perceive data collection for safety-related purposes as less acceptable than for health-related purposes [<xref ref-type="bibr" rid="ref114">114</xref>]. Moreover, IoT devices, such as smart home assistants, are constantly monitoring for voice commands (eg, “Hey Google,” “Siri”), prompting a limited number of studies (4/179, 2.2%) to explore potential differences in user reactions to continuous versus onetime monitoring [<xref ref-type="bibr" rid="ref115">115</xref>]. The context in which data are transferred, specifically public versus private settings, also influences privacy concern assessments [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref98">98</xref>,<xref ref-type="bibr" rid="ref116">116</xref>]. A significant aspect of data transmission principles, particularly in the context of advanced technologies, pertains to the mode of data collection—whether it occurs covertly or overtly. This distinction hinges on whether users are aware of or can observe the data collection process [<xref ref-type="bibr" rid="ref89">89</xref>,<xref ref-type="bibr" rid="ref117">117</xref>-<xref ref-type="bibr" rid="ref119">119</xref>].</p>
          <p>Despite existing evidence that these data transmission principles influence participants’ judgments in data sharing situations, the literature on this subject remains limited. A review of empirical studies in the field reveals that 79.3% (142/179) do not explicitly address this contextual dimension. Most of these studies tend to implicitly explore certain principles by examining a specific service, such as Facebook, whose privacy policy articulates some transmission principles. However, only a handful of studies incorporate reading privacy policies or cookie notifications into their research design [<xref ref-type="bibr" rid="ref120">120</xref>]. Consequently, future research should more explicitly incorporate and investigate data transmission principles as a parameter [<xref ref-type="bibr" rid="ref98">98</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Antecedents and Outcomes</title>
        <sec>
          <title>Overview</title>
          <p>We analyzed a subset of our sample more closely to investigate which antecedents, outcomes, and theories were considered in the literature on cutting-edge technologies, thus addressing our second main research objective. We extracted studies coded with a predominant theme of IoT, AI, AR, or big data (<xref ref-type="table" rid="table2">Table 2</xref>). Our subset of 68 studies is mainly composed of articles that were published no later than 2017. We synthesized findings and subsequently categorized study results into antecedents, privacy concerns, and outcomes (<xref rid="figure3" ref-type="fig">Figure 3</xref>). Some constructs such as trust, perceived risks, or perceived benefits were found to act as antecedents or outcomes.</p>
          <p>Building upon and extending the work of Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>], we categorized antecedents into 6 distinct classifications: individual factors; privacy calculus-related elements (ie, the perceived risks and benefits users evaluate in their risk-benefit analysis before data disclosure); additional privacy-related aspects; organizational and task-related factors; macroenvironmental influences; and contextual variables [<xref ref-type="bibr" rid="ref121">121</xref>]. Our integrative and succinct model uncovers previously unexplored findings from privacy research in the context of emerging technologies. For example, we observe the emergence of novel antecedents such as perceived physical risks (eg, users’ apprehensions regarding physical harm or intrusion into their personal space), which have been largely overlooked in past research [<xref ref-type="bibr" rid="ref121">121</xref>]. As technological advancements progress, so do the contexts and human behaviors in which they are embedded. The notion of physical risk exemplifies this interrelationship, as it is intimately connected to the unique features of IoT, AR, and AI devices [<xref ref-type="bibr" rid="ref122">122</xref>]. In this regard, Cichy et al [<xref ref-type="bibr" rid="ref112">112</xref>] demonstrated that drivers of connected and autonomously driven vehicles are increasingly anxious about their physical well-being, as concerns about the safety of autonomous driving are evoked. Similarly, Pal et al [<xref ref-type="bibr" rid="ref121">121</xref>] underscore the significance of physical risks for users of smart home devices. The integration of these novel IoT technologies within a user’s personal space generates apprehension about surveillance and fosters fear of losing control over one’s private environment [<xref ref-type="bibr" rid="ref121">121</xref>].</p>
          <p>In examining the outcomes of privacy disclosure within the realm of emerging technologies, our analysis categorizes findings into 2 groups: behavioral intentions and other outcomes [<xref ref-type="bibr" rid="ref24">24</xref>]. Several novel constructs have surfaced in recent years that were previously unaddressed [<xref ref-type="bibr" rid="ref24">24</xref>], and these are intrinsically connected to the unique attributes of cutting-edge technologies. For instance, Rajaobelina et al [<xref ref-type="bibr" rid="ref123">123</xref>] demonstrated how privacy concerns can heighten users’ sense of unease or “creepiness” during interactions with AI-based chatbots. Marakhimov and Joo [<xref ref-type="bibr" rid="ref124">124</xref>] presented empirical evidence indicating that user privacy concerns related to wearable health devices prompt coping mechanisms (ie, attempts to reinterpret or alleviate negative emotions), potentially explaining the abandonment of wearables by users within months of acquisition [<xref ref-type="bibr" rid="ref125">125</xref>]. Moreover, our analysis revealed an increasing number of studies that explore a wider array of outcome variables, extending beyond direct links to use intentions. For example, Cheng and Jiang [<xref ref-type="bibr" rid="ref126">126</xref>] discovered that perceived privacy risks associated with chatbots can lead to diminished satisfaction, while Rajaobelina et al [<xref ref-type="bibr" rid="ref123">123</xref>] highlighted the influence of privacy concerns on customer loyalty, mediated by factors such as creepiness, trust, and negative emotions.</p>
          <p>Taken together, we discern several notable patterns within our subset of recent articles focusing on emerging technologies. First, a significant number of studies investigated personality traits as antecedents [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref127">127</xref>]. The examination of personality factors as antecedents of privacy concerns is a relatively nascent area of focus, initially identified by Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>], which has since proliferated throughout the broader literature.</p>
          <p>Second, numerous contextual factors have been incorporated into examinations of privacy concerns as they relate to IoT, AI, AR, or big data technologies. Notably, sensitivity of information emerged as a frequently incorporated antecedent within our 68-study subset. This finding aligns with previous results in the overall sample (<xref ref-type="table" rid="table3">Table 3</xref>). Contextual dimensions have gained prominence in contemporary empirical inquiries of privacy concerns in the context of cutting-edge technologies.</p>
          <p>Third, it is noteworthy that none of the papers in our subset explicitly explore cultural values. While sample recruitment spanned countries such as Jordan [<xref ref-type="bibr" rid="ref128">128</xref>], Saudi Arabia [<xref ref-type="bibr" rid="ref129">129</xref>], Turkey [<xref ref-type="bibr" rid="ref130">130</xref>], India [<xref ref-type="bibr" rid="ref131">131</xref>], and China [<xref ref-type="bibr" rid="ref132">132</xref>], no article in our subset examined privacy concerns in the context of IoT, AR, AI, or big data across national boundaries. However, such studies are present in our complete dataset of 179 articles when the focus on cutting-edge technology is removed. For instance, Pentina et al [<xref ref-type="bibr" rid="ref133">133</xref>] conducted a cross-cultural comparison in the context of mobile app adoption, while Markos et al [<xref ref-type="bibr" rid="ref113">113</xref>] explored differences in perceived sensitivity and willingness to disclose between US and Brazilian online users. Finally, we observe that trust as an antecedent and the outcome construct of behavioral intention are the most prevalent themes within the analyzed subset, yielding most results. This propensity has persisted in the privacy literature, as demonstrated by the chronological review of Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>] encompassing a sample of studies from 1996 to 2017.</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>Count of antecedents and outcomes of privacy concerns in the context of Internet of Things (IoT), artificial intelligence (AI), augmented reality (AR), and big data. CFIP: concerns for information privacy; IUIPC: internet users’ information privacy concerns; WoM: word of mouth.</p>
            </caption>
            <graphic xlink:href="jmir_v27i1e71951_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Theories in the Context of IoT, AI, AR, and Big Data</title>
          <p>In our investigation, we also examined the frameworks and theories used to study IoT, AI, AR, and big data technologies. Drawing on the study by Barth and de Jong [<xref ref-type="bibr" rid="ref13">13</xref>], we classified theories into 3 categories. The first category encompassed theories predicated on the assumption that users’ underlying risk-benefit evaluations are primarily rational. The second category comprised theories positing that rational privacy valuations are occasionally influenced by irrational biases (eg, heuristics, immediate gratifications, and habits). Finally, the third category, labeled “other” was designated for theories adopting alternative approaches to explain behavior in information-sharing situations. <xref ref-type="table" rid="table4">Table 4</xref> provides a summary of the theories identified in our 68-study subsample.</p>
          <table-wrap position="float" id="table4">
            <label>Table 4</label>
            <caption>
              <p>Overview and categorization of theories in analyzed subset (IoT, AI, AR and big data).</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="270"/>
              <col width="200"/>
              <col width="500"/>
              <thead>
                <tr valign="top">
                  <td colspan="2">Category and theory</td>
                  <td>Studies</td>
                  <td>Exemplary studies</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Risk-benefit calculation guided by rationality</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Justice theory</td>
                  <td>Deutsch [<xref ref-type="bibr" rid="ref134">134</xref>]</td>
                  <td>Pizzi and Scarpi [<xref ref-type="bibr" rid="ref135">135</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Multidimensional development theory</td>
                  <td>Laufer and Wolfe [<xref ref-type="bibr" rid="ref136">136</xref>]</td>
                  <td>Pal et al [<xref ref-type="bibr" rid="ref121">121</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Privacy calculus</td>
                  <td>Culnan and Armstrong [<xref ref-type="bibr" rid="ref100">100</xref>]</td>
                  <td>Cheng et al [<xref ref-type="bibr" rid="ref2">2</xref>]; Hermes et al [<xref ref-type="bibr" rid="ref105">105</xref>]; Liu et al [<xref ref-type="bibr" rid="ref132">132</xref>]; Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]; Gao et al [<xref ref-type="bibr" rid="ref138">138</xref>]; Kang and Jung [<xref ref-type="bibr" rid="ref139">139</xref>]; Kim et al [<xref ref-type="bibr" rid="ref140">140</xref>]; Lavado-Nalvaiz et al [<xref ref-type="bibr" rid="ref141">141</xref>]; Willems et al [<xref ref-type="bibr" rid="ref142">142</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Protection motivation theory</td>
                  <td>Rogers [<xref ref-type="bibr" rid="ref143">143</xref>]</td>
                  <td>Gao et al [<xref ref-type="bibr" rid="ref138">138</xref>]; Alashoor et al [<xref ref-type="bibr" rid="ref144">144</xref>]; Thongmak [<xref ref-type="bibr" rid="ref145">145</xref>]; Williams et al [<xref ref-type="bibr" rid="ref146">146</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Social exchange theory</td>
                  <td>Blau [<xref ref-type="bibr" rid="ref147">147</xref>]; Homans [<xref ref-type="bibr" rid="ref148">148</xref>]</td>
                  <td>Uysal et al [<xref ref-type="bibr" rid="ref149">149</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Technology acceptance model</td>
                  <td>Davis [<xref ref-type="bibr" rid="ref150">150</xref>]</td>
                  <td>Yavuz et al [<xref ref-type="bibr" rid="ref130">130</xref>]; Pizzi and Scarpi [<xref ref-type="bibr" rid="ref135">135</xref>]; Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]; Liu and Tao [<xref ref-type="bibr" rid="ref151">151</xref>]; Park et al [<xref ref-type="bibr" rid="ref152">152</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Theory of planned behavior</td>
                  <td>Ajzen [<xref ref-type="bibr" rid="ref153">153</xref>]</td>
                  <td>Hermes et al [<xref ref-type="bibr" rid="ref105">105</xref>]; Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]; Alashoor et al [<xref ref-type="bibr" rid="ref144">144</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Theory of reasoned action</td>
                  <td>Ajzen and Fishbein [<xref ref-type="bibr" rid="ref154">154</xref>]; Fishbein and Ajzen [<xref ref-type="bibr" rid="ref155">155</xref>]</td>
                  <td>Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]; Bawack et al [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Unified theory of acceptance and use of technology</td>
                  <td>Venkatesh et al [<xref ref-type="bibr" rid="ref156">156</xref>]</td>
                  <td>Easwara Moorthy and Vu [<xref ref-type="bibr" rid="ref116">116</xref>]; Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]; Gao et al [<xref ref-type="bibr" rid="ref138">138</xref>]; Vimalkumar et al [<xref ref-type="bibr" rid="ref157">157</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Communication privacy management or information boundary theory</td>
                  <td>Petronio [<xref ref-type="bibr" rid="ref158">158</xref>,<xref ref-type="bibr" rid="ref159">159</xref>]</td>
                  <td>Kang and Jung [<xref ref-type="bibr" rid="ref139">139</xref>]; Cao and Wang [<xref ref-type="bibr" rid="ref160">160</xref>]; Kathuria and Kathuria [<xref ref-type="bibr" rid="ref161">161</xref>]</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Biased risk assessment within the risk-benefit calculation</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Contextual integrity</td>
                  <td>Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>]</td>
                  <td>Apthorpe et al [<xref ref-type="bibr" rid="ref17">17</xref>]; Abdi et al [<xref ref-type="bibr" rid="ref61">61</xref>]; Agesilaou and Kyza [<xref ref-type="bibr" rid="ref93">93</xref>]; Lutz and Newlands [<xref ref-type="bibr" rid="ref107">107</xref>]; Harborth and Pape [<xref ref-type="bibr" rid="ref162">162</xref>];</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Coping theory</td>
                  <td>Lazarus and Folkman [<xref ref-type="bibr" rid="ref163">163</xref>]</td>
                  <td>Cheng et al [<xref ref-type="bibr" rid="ref2">2</xref>]; Marakhimov and Joo [<xref ref-type="bibr" rid="ref124">124</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Heuristic-systematic model of information processing</td>
                  <td>Chaiken [<xref ref-type="bibr" rid="ref164">164</xref>]</td>
                  <td>Shin [<xref ref-type="bibr" rid="ref165">165</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Innovation resistance theory</td>
                  <td>Ram [<xref ref-type="bibr" rid="ref166">166</xref>,<xref ref-type="bibr" rid="ref167">167</xref>]</td>
                  <td>Pal et al [<xref ref-type="bibr" rid="ref121">121</xref>]; Liu et al [<xref ref-type="bibr" rid="ref132">132</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Prospect theory</td>
                  <td>Kahneman and Tversky [<xref ref-type="bibr" rid="ref168">168</xref>,<xref ref-type="bibr" rid="ref169">169</xref>]</td>
                  <td>Jain et al [<xref ref-type="bibr" rid="ref170">170</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Signaling theory</td>
                  <td>Spence [<xref ref-type="bibr" rid="ref171">171</xref>]</td>
                  <td>Jain et al [<xref ref-type="bibr" rid="ref170">170</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Social cognition theory</td>
                  <td>Bandura [<xref ref-type="bibr" rid="ref172">172</xref>]</td>
                  <td>Cao and Wang [<xref ref-type="bibr" rid="ref160">160</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Uncanny valley theory</td>
                  <td>Mori [<xref ref-type="bibr" rid="ref173">173</xref>]; Mori et al [<xref ref-type="bibr" rid="ref174">174</xref>]</td>
                  <td>Lavado-Nalvaiz et al [<xref ref-type="bibr" rid="ref141">141</xref>]; Willems et al [<xref ref-type="bibr" rid="ref142">142</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Uses and gratification theory</td>
                  <td>Katz and Blumler [<xref ref-type="bibr" rid="ref175">175</xref>]; Katz et al [<xref ref-type="bibr" rid="ref176">176</xref>]</td>
                  <td>Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]; Jain et al [<xref ref-type="bibr" rid="ref170">170</xref>]; McLean and Osei-Frimpong [<xref ref-type="bibr" rid="ref177">177</xref>]; Rauschnabel et al [<xref ref-type="bibr" rid="ref178">178</xref>]</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Others</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Mind perception theory</td>
                  <td>Gray et al [<xref ref-type="bibr" rid="ref179">179</xref>]</td>
                  <td>Uysal et al [<xref ref-type="bibr" rid="ref149">149</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Query theory</td>
                  <td>Johnson et al [<xref ref-type="bibr" rid="ref180">180</xref>]</td>
                  <td>Sun et al [<xref ref-type="bibr" rid="ref181">181</xref>]</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Theory of diffusion of innovation</td>
                  <td>Rogers [<xref ref-type="bibr" rid="ref182">182</xref>]; Rogers et al [<xref ref-type="bibr" rid="ref183">183</xref>]</td>
                  <td>Attié and Meyer-Waarden [<xref ref-type="bibr" rid="ref137">137</xref>]</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p>Our findings indicated that most theories in our subsample were also recognized by Barth and de Jong [<xref ref-type="bibr" rid="ref13">13</xref>]. However, formerly prominent theories such as the theory of incomplete information [<xref ref-type="bibr" rid="ref184">184</xref>] and the theory of bounded rationality [<xref ref-type="bibr" rid="ref185">185</xref>] were not detected in our analysis, despite using a broader search scope than Barth and de Jong [<xref ref-type="bibr" rid="ref13">13</xref>]. Conversely, new theories have emerged, including the uncanny valley theory [<xref ref-type="bibr" rid="ref173">173</xref>,<xref ref-type="bibr" rid="ref174">174</xref>] and the theory of contextual integrity [<xref ref-type="bibr" rid="ref15">15</xref>]. The former is explicitly connected to the perceived anthropomorphism of robots (ie, the degree of human-likeness) and thus aligns with our emphasis on cutting-edge technologies. This theory appeared to be the most prevalent framework in studies investigating the context-dependency of privacy disclosure, a research focus that has gained traction in recent years [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref107">107</xref>,<xref ref-type="bibr" rid="ref162">162</xref>].</p>
          <p>In sum, we observed an equitable distribution between theories focused on rational risk-benefit calculations and those addressing biased evaluations due to human cognitive limitations and exploited heuristics (<xref ref-type="table" rid="table4">Table 4</xref>). Within the rationality-based school of thought, the privacy calculus theory [<xref ref-type="bibr" rid="ref100">100</xref>] and technology acceptance models, such as the Technology Acceptance Model by Davis [<xref ref-type="bibr" rid="ref150">150</xref>] or Unified Theory of Acceptance and Use of Technology by Venkatesh et al [<xref ref-type="bibr" rid="ref156">156</xref>], were most frequently used as the theoretical frameworks in our subsample. Regarding the second group, we found that Petronio’s [<xref ref-type="bibr" rid="ref158">158</xref>] Communication Privacy Management and the previously mentioned theory of contextual integrity [<xref ref-type="bibr" rid="ref15">15</xref>] emerge as the most prominent within their category.</p>
        </sec>
        <sec>
          <title>Privacy Behavior in the Context of IoT, AI, AR, and Big Data</title>
          <p>In the final stage of our investigation, we wanted to elucidate whether privacy-oriented behaviors, such as the privacy paradox, in emergent technologies tend to diverge from previous findings in other technological domains, including websites, mobile apps, SNS, and e-commerce. Most extant studies corroborated the existence of the privacy paradox. For example, Lavado-Nalvaiz et al [<xref ref-type="bibr" rid="ref141">141</xref>] and Lutz and Tamó-Larrieux [<xref ref-type="bibr" rid="ref186">186</xref>] highlighted the pervasiveness of the paradox within the realm of social robots. Similarly, Willems et al [<xref ref-type="bibr" rid="ref142">142</xref>] substantiated its presence in the context of citizens’ adoption intentions concerning AI-based public service applications. Furthermore, Chaparro Osman et al [<xref ref-type="bibr" rid="ref187">187</xref>], Aleisa et al [<xref ref-type="bibr" rid="ref129">129</xref>], Jaspers and Pearson [<xref ref-type="bibr" rid="ref188">188</xref>], and Pal et al [<xref ref-type="bibr" rid="ref189">189</xref>] provided support for the privacy paradox among users of domestic IoT devices. Thus, the literature affirms the persistence of the privacy paradox across various technological contexts.</p>
          <p>However, a more comprehensive examination of our analysis unveils intriguing findings in the literature on state-of-the-art technologies. For instance, Menard and Bott [<xref ref-type="bibr" rid="ref190">190</xref>] discovered that privacy concerns for IoT users are addressed differently compared to those in e-commerce settings. In the latter, users typically react to heightened awareness of data collection with increased privacy concerns and consequently, protective behavior. In contrast, the authors revealed an inverse relationship in an IoT context, where awareness of data collection by the IoT device leads to greater disclosure intentions [<xref ref-type="bibr" rid="ref190">190</xref>]. They postulate that this relationship may arise because a user’s information disclosure is intrinsically linked to the utility of IoT devices, which provide optimized and automated recommendations [<xref ref-type="bibr" rid="ref190">190</xref>]. IoT devices possess minimal functionality unless users supply the requisite personal information, an assertion corroborated by Pal et al [<xref ref-type="bibr" rid="ref189">189</xref>].</p>
          <p>In a similar vein, Sun et al [<xref ref-type="bibr" rid="ref181">181</xref>] demonstrated in an IoT experiment—comparing participants’ actual behavior with stated intentions—that participants disclosed less personal information than they initially claimed they would. The privacy paradox typically implies an intention-behavior gap in the opposite direction (ie, individuals divulging more information in behavioral conditions than intention conditions). The authors proposed that the reversed intention-behavior gap they observed could be attributed to the abstract nature of IoT devices, rendering the concept of IoT less salient than, for example, commerce [<xref ref-type="bibr" rid="ref181">181</xref>]. Another plausible explanation for the reversed intention-behavior gap lies in users’ unfamiliarity with novel IoT technologies, leading to inaccurate risk and benefit assessments due to a lack of knowledge [<xref ref-type="bibr" rid="ref181">181</xref>,<xref ref-type="bibr" rid="ref191">191</xref>]. Comparable effects were demonstrated by Chaparro Osman et al [<xref ref-type="bibr" rid="ref187">187</xref>], Hermes et al [<xref ref-type="bibr" rid="ref105">105</xref>], and Alashoor et al [<xref ref-type="bibr" rid="ref144">144</xref>] in IoT and big data contexts, respectively. Therefore, further research to examine the aforementioned claims is highly deserving.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Contributions to Theory and Directions for Future Research</title>
        <p>Privacy has emerged as one of the most pressing concerns of our era and will require heightened attention with the mainstream adoption of cutting-edge technologies, including IoT, AI, AR, and big data. Despite more than 2 decades of scholarly research on privacy, a comprehensive and context-dependent theory remains elusive. Consequently, a research gap persists regarding the differing standards individuals apply to data protection across various contexts [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref79">79</xref>]. The present systematic literature review, encompassing 179 research studies, offers several theoretical contributions in response.</p>
        <p>By examining state-of-the-art technologies, we present a timely and distinctive perspective on how constructs and theories have evolved and been contextualized within existing privacy research. Our synthesis of findings contributes to the literature by unveiling gaps and unanticipated relationships between privacy concerns and behaviors in the era of ubiquitous computing, which could potentially guide future research. This study substantiates the notion that contextual factors have been largely overlooked in privacy research on cutting-edge technologies (our first main research question). Merely 5 studies in our dataset explicitly defined items aligning with most of the 5 parameters of information flows described in a study by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>]. An analysis of perceived information sensitivity degrees was most prevalent in studies using contextualization (97/179, 54.2%). These results may support the assertions made in studies by Solove [<xref ref-type="bibr" rid="ref21">21</xref>] and Kokolakis [<xref ref-type="bibr" rid="ref22">22</xref>] that the dichotomy between privacy concerns and behavioral intentions is not paradoxical but, rather, has not been comprehensively understood in a holistic and context-contingent manner, which could provide logical explanations for this seemingly inconsistent behavior, also described in studies by Martin and Murphy [<xref ref-type="bibr" rid="ref59">59</xref>]. Following Xu and Zhang [<xref ref-type="bibr" rid="ref37">37</xref>], our findings, therefore, also suggest that if no context-contingent theory is provided and widely accepted, future researchers must use careful theory-driven contextualization to achieve more generalizability and interpretability of findings.</p>
        <p>Future research may thus focus on examining additional information-sharing situations with emerging technologies to delineate context-dependency in privacy behavior. Specifically, additional research is needed to explore the role of institutional trust in shaping privacy concerns, as patient perceptions of trusted organizations such as national health institutions versus commercial entities significantly influence their willingness to share sensitive data [<xref ref-type="bibr" rid="ref23">23</xref>]. This is particularly important because these technologies often operate ubiquitously without an individual’s awareness, becoming increasingly pertinent in numerous aspects of daily life, such as health care and e-government.</p>
        <p>As recommended in the study by Yun et al [<xref ref-type="bibr" rid="ref24">24</xref>], future studies on privacy concerns could also concentrate on these underexplored fields of application or investigate how the ubiquity and unique attributes of novel technologies alter user privacy behaviors. Our analysis demonstrated that results are frequently connected to users who are not yet familiar with emerging technologies. We encourage future research to examine how these findings evolve as new technologies become more widely adopted and users inevitably become more accustomed to these devices in their daily lives. In addition, we advocate for more studies to incorporate a broader array of specified principles in research designs, as well as examine actual behavior rather than intentions. Both aspects have been largely neglected in the literature, yet they significantly influence study outcomes [<xref ref-type="bibr" rid="ref192">192</xref>].</p>
        <p>Our findings further indicate that most antecedent and outcome constructs, along with underlying theories, have been transferred from research on websites, social media, or e-commerce to the context of cutting-edge technologies (our second key research question). We observe that the literature continues to develop or use novel constructs and theories frequently associated with unique characteristics of IoT, AR, or AI devices (eg, physical risks). While the ongoing expansion of constructs may be necessary to comprehend new technologies, it simultaneously introduces further divergence in a field already replete with theoretical approaches [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
        <p>Our study supports the call for developing context-contingent insights specific to emerging technologies and work that enhances user engagement and well-being [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref193">193</xref>-<xref ref-type="bibr" rid="ref202">202</xref>], as well as converging toward more generalizable, robust, and underlying theories that systematically operate across diverse contexts [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. The limited privacy literature on cutting-edge technologies reveals that previously identified results in other domains, such as e-commerce, do undergo alterations when study designs are recontextualized into IoT, AR, AI, or big data (our third key research question). More context-specific studies on privacy concerns in cutting-edge technology scenarios are needed to reach a critical mass to allow a theoretical synthesis of findings [<xref ref-type="bibr" rid="ref37">37</xref>]. As previously mentioned, these studies must be theory-grounded to allow generalizability. We argue that using the 5 parameters of the contextual integrity theory described in a study by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>] in future research will allow a synthesis toward a context-contingent understanding of privacy. We posit that individuals’ privacy concerns and behaviors are dependent upon a complex interplay of contextual dimensions inherent to IoT, AI, AR, and big data technologies rather than a rational risk-benefit analysis. Specifically, these dimensions include the individuals whose data are being collected, the devices transmitting personal information, the recipient of the information, the type of information shared, and the principles governing data transmission. We thus suggest that the dynamics within contextual dimensions of emerging technologies contribute to shaping individuals’ privacy attitudes, intentions, and behaviors, leading to unique patterns that may differ from traditional contexts.</p>
      </sec>
      <sec>
        <title>Implications</title>
        <p>First, the results underscore the critical role of contextual dimensions in shaping user privacy concerns, emphasizing the need for companies and device manufacturers to investigate these dimensions thoroughly. Context-aware privacy considerations can inform the design and marketing of new digital health technologies, enabling products that align with user preferences and ethical standards. For example, the development of transparent and accessible privacy policies tailored to user needs can address significant user concerns, as demonstrated in previous studies on the impact of clear privacy policies on user trust and adoption [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. In addition, the use of conversational AI in health care has been shown to mitigate privacy concerns by streamlining user engagement while ensuring data security, as evidenced by recent implementations [<xref ref-type="bibr" rid="ref203">203</xref>].</p>
        <p>Adopting a “privacy by design” approach might ensure that products, such as wearable health devices or telehealth platforms, offer granular control over sensitive data without overwhelming users with excessive opt-in choices [<xref ref-type="bibr" rid="ref98">98</xref>]. Overloading users with consent requests may lead to decision fatigue, reducing their sense of control and trust in the system [<xref ref-type="bibr" rid="ref204">204</xref>]. Instead, default privacy-preserving options can effectively guide user behavior while minimizing intrusiveness, particularly for less sensitive data streams [<xref ref-type="bibr" rid="ref205">205</xref>]. Health care–focused applications of IoT and AI, such as remote monitoring devices, could integrate these insights to enhance usability and compliance while safeguarding patient data. For example, enabling users to manage privacy settings for specific contexts, such as sharing data with health care providers but not with third-party advertisers, can improve trust and engagement with these technologies.</p>
        <p>Marketing and customer service teams in the digital health space can benefit from a deeper understanding of user privacy concerns in specific scenarios. By acknowledging the perceived risks associated with IoT devices, especially in health care (eg, fears of data breaches or misuse of sensitive health data), companies can develop targeted educational campaigns to address these concerns. Clear, transparent communication about data use, security protocols, and user controls can alleviate anxiety, fostering higher levels of trust, satisfaction, and loyalty. Enhanced trust in digital health platforms can translate into increased adoption rates and long-term engagement, ultimately benefiting both users and organizations [<xref ref-type="bibr" rid="ref206">206</xref>,<xref ref-type="bibr" rid="ref207">207</xref>].</p>
        <p>From a policy-making perspective, our findings highlight the need to revise and refine privacy regulations to address the contextual nuances of privacy behavior. Policy makers should mandate that privacy policies explicitly outline all 5 contextual parameters proposed by Nissenbaum [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref38">38</xref>], ensuring that users understand how their data are collected, shared, and used in specific contexts. This is particularly important for digital health technologies, where sensitive health information often flows through complex data ecosystems, involving multiple parties. Transparent policies that restrict information sharing to essential second- or third-party recipients can reduce unauthorized data flows and prevent misuse [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>Moreover, regulators should establish standards for “privacy by design” in the development of new health technologies, requiring restrictive default settings and clear consent mechanisms. For example, IoT-enabled medical devices could be required to limit data sharing to approved health care providers, reducing the risk of exposure to unintended parties. In addition, ethical guidelines for predictive analytics, such as algorithms that infer health conditions from user behavior, should ensure that these insights are used responsibly and transparently, avoiding harm to users or erosion of trust.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This study underscores the critical importance of adopting a context-sensitive lens to understand privacy concerns in the rapidly evolving landscape of emerging. By synthesizing existing studies, this work uncovers significant research gaps and emphasizes the need for more holistic, context-sensitive approaches that consider the dynamic interaction between psychological antecedents, behavioral outcomes, and technological attributes. Our findings have important implications for researchers, practitioners, and policy makers alike. For researchers, they provide a foundation for advancing theories that are adaptable to diverse and complex privacy scenarios. For practitioners and technology developers, the insights offer a pathway to designing user-centric technologies that integrate privacy as a core feature rather than an afterthought. For policy makers, this work emphasizes the necessity of revising privacy frameworks to address the contextual dimensions of data sharing and ensure ethical and transparent practices. In domains such as digital health, where the stakes are particularly high, such an approach can build trust, enhance user engagement, and support the ethical deployment of technologies that improve health outcomes and empower individuals. By bridging gaps in the literature and paving the way for context-driven solutions, this study contributes to the broader goal of fostering a digital ecosystem that balances innovation with user privacy and trust.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) checklist.</p>
        <media xlink:href="jmir_v27i1e71951_app1.docx" xlink:title="DOCX File , 32 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Outline of Search Strategy.</p>
        <media xlink:href="jmir_v27i1e71951_app2.docx" xlink:title="DOCX File , 18 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">AR</term>
          <def>
            <p>augmented reality</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IoT</term>
          <def>
            <p>Internet of Things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">SNS</term>
          <def>
            <p>social networking sites</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <notes>
      <title>Data Availability</title>
      <p>The datasets generated or analyzed during this study are available from the corresponding author on reasonable request.</p>
    </notes>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Metz</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Yes, Alexa is recording mundane details of your life, and it's creepy as hell</article-title>
          <source>MIT Technology Review</source>
          <access-date>2022-08-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.technologyreview.com/2018/05/25/142713/yes-alexa-is-recording-mundane-details-of-your-life-and-its-creepy-as-hell/">https://www.technologyreview.com/2018/05/25/142713/yes-alexa-is-recording-mundane-details-of-your-life-and-its-creepy-as-hell/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Su</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Benitez</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cai</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The good, the bad, and the ugly: impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing</article-title>
          <source>Eur J Inf Syst</source>
          <year>2021</year>
          <month>01</month>
          <day>11</day>
          <volume>31</volume>
          <issue>3</issue>
          <fpage>339</fpage>
          <lpage>63</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2020.1869508</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grewal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Guha</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Satornino</surname>
              <given-names>CB</given-names>
            </name>
            <name name-style="western">
              <surname>Schweiger</surname>
              <given-names>EB</given-names>
            </name>
          </person-group>
          <article-title>Artificial intelligence: the light and the darkness</article-title>
          <source>J Bus Res</source>
          <year>2021</year>
          <month>11</month>
          <volume>136</volume>
          <fpage>229</fpage>
          <lpage>36</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2021.07.043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Yigitcanlar</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Erol</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Motivations, barriers and risks of smart home adoption: from systematic literature review to conceptual framework</article-title>
          <source>Energy Res Soc Sci</source>
          <year>2021</year>
          <month>10</month>
          <volume>80</volume>
          <fpage>102211</fpage>
          <pub-id pub-id-type="doi">10.1016/j.erss.2021.102211</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <article-title>Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030, by vertical (in millions)</article-title>
          <source>Statista</source>
          <access-date>2022-08-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www-statista-com.iclibezp1.cc.ic.ac.uk/statistics/1194682/iot-connected-devices-vertically/">https://www-statista-com.iclibezp1.cc.ic.ac.uk/statistics/1194682/iot-connected-devices-vertically/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <article-title>Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2025 (in zettabytes)</article-title>
          <source>Statista</source>
          <access-date>2022-08-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www-statista-com.iclibezp1.cc.ic.ac.uk/statistics/871513/worldwide-data-created/">https://www-statista-com.iclibezp1.cc.ic.ac.uk/statistics/871513/worldwide-data-created/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ziegeldorf</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Morchon</surname>
              <given-names>OG</given-names>
            </name>
            <name name-style="western">
              <surname>Wehrle</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the internet of things: threats and challenges</article-title>
          <source>Secur Commun Netw</source>
          <year>2013</year>
          <month>06</month>
          <day>10</day>
          <volume>7</volume>
          <issue>12</issue>
          <fpage>2728</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1002/sec.795</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Braud</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tarkoma</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hui</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Trustworthy AI in the age of pervasive computing and big data</article-title>
          <source>Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops</source>
          <year>2020</year>
          <conf-name>PerCom '20</conf-name>
          <conf-date>March 23-27, 2020</conf-date>
          <conf-loc>Austin, TX</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/9156127"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/percomworkshops48775.2020.9156127</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bardus</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Al Daccache</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Maalouf</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Al Sarih</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Elhajj</surname>
              <given-names>IH</given-names>
            </name>
          </person-group>
          <article-title>Data management and privacy policy of COVID-19 contact-tracing apps: systematic review and content analysis</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2022</year>
          <month>07</month>
          <day>12</day>
          <volume>10</volume>
          <issue>7</issue>
          <fpage>e35195</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2022/7/e35195/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/35195</pub-id>
          <pub-id pub-id-type="medline">35709334</pub-id>
          <pub-id pub-id-type="pii">v10i7e35195</pub-id>
          <pub-id pub-id-type="pmcid">PMC9278406</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alhammad</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Alajlani</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Abd-Alrazaq</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Epiphaniou</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Arvanitis</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Patients' perspectives on the data confidentiality, privacy, and security of mHealth apps: systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2024</year>
          <month>05</month>
          <day>31</day>
          <volume>26</volume>
          <fpage>e50715</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2024//e50715/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/50715</pub-id>
          <pub-id pub-id-type="medline">38820572</pub-id>
          <pub-id pub-id-type="pii">v26i1e50715</pub-id>
          <pub-id pub-id-type="pmcid">PMC11179037</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baruh</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Popescu</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Big data analytics and the limits of privacy self-management</article-title>
          <source>New Media Soc</source>
          <year>2015</year>
          <month>11</month>
          <day>02</day>
          <volume>19</volume>
          <issue>4</issue>
          <fpage>579</fpage>
          <lpage>96</lpage>
          <pub-id pub-id-type="doi">10.1177/1461444815614001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lehtiniemi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kortesniemi</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach</article-title>
          <source>Big Data Soc</source>
          <year>2017</year>
          <month>07</month>
          <day>26</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>205395171772193</fpage>
          <pub-id pub-id-type="doi">10.1177/2053951717721935</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barth</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>MD</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox – investigating discrepancies between expressed privacy concerns and actual online behavior – a systematic literature review</article-title>
          <source>Telemat Inform</source>
          <year>2017</year>
          <month>11</month>
          <volume>34</volume>
          <issue>7</issue>
          <fpage>1038</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2017.04.013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gerber</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Gerber</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Volkamer</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior</article-title>
          <source>Comput Secur</source>
          <year>2018</year>
          <month>08</month>
          <volume>77</volume>
          <fpage>226</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2018.04.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nissenbaum</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Privacy as contextual integrity</article-title>
          <source>Wash L Rev</source>
          <year>2004</year>
          <volume>79</volume>
          <fpage>119</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digitalcommons.law.uw.edu/wlr/vol79/iss1/10/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abaquita</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bahirat</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Badillo-Urquiola</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Wisniewski</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Privacy norms within the internet of things using contextual integrity</article-title>
          <source>Proceedings of the 2020 ACM International Conference on Supporting Group Work</source>
          <year>2020</year>
          <conf-name>GROUP '20</conf-name>
          <conf-date>January 6-8, 2020</conf-date>
          <conf-loc>Sanibel Island, FL</conf-loc>
          <fpage>131</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/3323994.3369891"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3323994.3369891</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Apthorpe</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Shvartzshnaider</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Mathur</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Reisman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Feamster</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Discovering smart home internet of things privacy norms using contextual integrity</article-title>
          <source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source>
          <year>2018</year>
          <month>07</month>
          <day>05</day>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1145/3214262</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Markos</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Labrecque</surname>
              <given-names>LI</given-names>
            </name>
            <name name-style="western">
              <surname>Milne</surname>
              <given-names>GR</given-names>
            </name>
          </person-group>
          <article-title>A new information lens: the self-concept and exchange context as a means to understand information sensitivity of anonymous and personal identifying information</article-title>
          <source>J Interact Mark</source>
          <year>2022</year>
          <month>01</month>
          <day>31</day>
          <volume>42</volume>
          <issue>1</issue>
          <fpage>46</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1016/j.intmar.2018.01.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nissenbaum</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Measuring privacy: an empirical test using context to expose confounding variables</article-title>
          <source>Colum Sci Tech L Rev (Forthcoming)</source>
          <year>2016</year>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nicholas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Shilton</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Schueller</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Gray</surname>
              <given-names>EL</given-names>
            </name>
            <name name-style="western">
              <surname>Kwasny</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Mohr</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>The role of data type and recipient in individuals' perspectives on sharing passively collected smartphone data for mental health: cross-sectional questionnaire study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>04</month>
          <day>05</day>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>e12578</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/4/e12578/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12578</pub-id>
          <pub-id pub-id-type="medline">30950799</pub-id>
          <pub-id pub-id-type="pii">v7i4e12578</pub-id>
          <pub-id pub-id-type="pmcid">PMC6473465</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Solove</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>The myth of the privacy paradox</article-title>
          <source>Geo Wash L Rev</source>
          <year>2020</year>
          <fpage>5</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarship.law.gwu.edu/faculty_publications/1482/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2139/ssrn.3536265</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kokolakis</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon</article-title>
          <source>Comput Secur</source>
          <year>2017</year>
          <month>01</month>
          <volume>64</volume>
          <fpage>122</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2015.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aggarwal</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Farag</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ashrafian</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Darzi</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Patient perceptions on data sharing and applying artificial intelligence to health care data: cross-sectional survey</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>08</month>
          <day>26</day>
          <volume>23</volume>
          <issue>8</issue>
          <fpage>e26162</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/8/e26162/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/26162</pub-id>
          <pub-id pub-id-type="medline">34236994</pub-id>
          <pub-id pub-id-type="pii">v23i8e26162</pub-id>
          <pub-id pub-id-type="pmcid">PMC8430862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yun</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>A chronological review of empirical research on personal information privacy concerns: an analysis of contexts and research constructs</article-title>
          <source>Inf Manag</source>
          <year>2019</year>
          <month>06</month>
          <volume>56</volume>
          <issue>4</issue>
          <fpage>570</fpage>
          <lpage>601</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2018.10.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dienlin</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Trepte</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors</article-title>
          <source>Euro J Social Psych</source>
          <year>2014</year>
          <month>07</month>
          <day>31</day>
          <volume>45</volume>
          <issue>3</issue>
          <fpage>285</fpage>
          <lpage>97</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/5lAFB1/o3724"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/ejsp.2049</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tomasz</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Śliwiński</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Puślecki</surname>
              <given-names>Ł</given-names>
            </name>
          </person-group>
          <article-title>Consumer resistance to the internet of things: a privacy perspective</article-title>
          <source>Competition, Strategy, and Innovation</source>
          <year>2021</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Routledge</publisher-name>
          <fpage>133</fpage>
          <lpage>50</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gambino</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sundar</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Ge</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rosson</surname>
              <given-names>MB</given-names>
            </name>
          </person-group>
          <article-title>User disbelief in privacy paradox: heuristics that determine disclosure</article-title>
          <source>Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems</source>
          <year>2016</year>
          <conf-name>CHI EA '16</conf-name>
          <conf-date>May 7-12, 2016</conf-date>
          <conf-loc>San Jose, CA</conf-loc>
          <fpage>2837</fpage>
          <lpage>43</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/2851581.2892413"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2851581.2892413</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sundar</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Go</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Unlocking the privacy paradox: do cognitive heuristics hold the key?</article-title>
          <source>Proceedings of the 2013 Conference on Extended Abstracts on Human Factors in Computing Systems</source>
          <year>2013</year>
          <conf-name>CHI EA '13</conf-name>
          <conf-date>April 27-May 2, 2013</conf-date>
          <conf-loc>Paris, France</conf-loc>
          <fpage>811</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/2468356.2468501"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2468356.2468501</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sundar</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Machine heuristic: when we trust computers more than humans with our personal information</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Scotland, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/abs/10.1145/3290605.3300768"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300768</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wagman</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The economics of privacy</article-title>
          <source>J Econ Lit</source>
          <year>2016</year>
          <month>06</month>
          <day>01</day>
          <volume>54</volume>
          <issue>2</issue>
          <fpage>442</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1257/jel.54.2.442</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fernandes</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Pereira</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Revisiting the privacy calculus: why are consumers (really) willing to disclose personal data online?</article-title>
          <source>Telemat Inform</source>
          <year>2021</year>
          <month>12</month>
          <volume>65</volume>
          <fpage>101717</fpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2021.101717</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lasarov</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hoffmann</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Paradoxes Datenschutzverhalten</article-title>
          <source>HMD Prax Wirtsch Inform</source>
          <year>2021</year>
          <month>02</month>
          <day>18</day>
          <volume>58</volume>
          <issue>6</issue>
          <fpage>1535</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1365/S40702-021-00706-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Grossklags</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Privacy and rationality in individual decision making</article-title>
          <source>IEEE Secur Privacy Mag</source>
          <year>2005</year>
          <month>01</month>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>26</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1109/MSP.2005.22</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bawack</surname>
              <given-names>RE</given-names>
            </name>
            <name name-style="western">
              <surname>Wamba</surname>
              <given-names>SF</given-names>
            </name>
            <name name-style="western">
              <surname>Carillo</surname>
              <given-names>KD</given-names>
            </name>
          </person-group>
          <article-title>Exploring the role of personality, trust, and privacy in customer experience performance during voice shopping: evidence from SEM and fuzzy set qualitative comparative analysis</article-title>
          <source>Int J Inf Manage</source>
          <year>2021</year>
          <month>06</month>
          <volume>58</volume>
          <fpage>102309</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2021.102309</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pomfret</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Previte</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Coote</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Beyond concern: socio-demographic and attitudinal influences on privacy and disclosure choices</article-title>
          <source>J Mark Manag</source>
          <year>2020</year>
          <month>01</month>
          <day>29</day>
          <volume>36</volume>
          <issue>5-6</issue>
          <fpage>519</fpage>
          <lpage>49</lpage>
          <pub-id pub-id-type="doi">10.1080/0267257x.2020.1715465</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Buck</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Horbel</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Germelmann</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Eymann</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>The unconscious app consumer: discovering and comparing the information-seeking patterns among mobile application consumers</article-title>
          <source>Proceedings of the 22nd European Conference on Information Systems</source>
          <year>2014</year>
          <conf-name>ECIS '14</conf-name>
          <conf-date>June 9-11, 2014</conf-date>
          <conf-loc>Tel Aviv, Israel</conf-loc>
          <fpage>11</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aisel.aisnet.org/ecis2014/proceedings/track14/8/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>From contextualizing to context theorizing: assessing context effects in privacy research</article-title>
          <source>Manag Sci</source>
          <year>2022</year>
          <month>10</month>
          <volume>68</volume>
          <issue>10</issue>
          <fpage>7383</fpage>
          <lpage>401</lpage>
          <pub-id pub-id-type="doi">10.1287/mnsc.2021.4249</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nissenbaum</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <source>Privacy in Context: Technology, Policy, and the Integrity of Social Life</source>
          <year>2009</year>
          <publisher-loc>Stockholm, Sweden</publisher-loc>
          <publisher-name>Stanford University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leom</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Deegan</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Martini</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Boland</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Information disclosure in mobile device: examining the influence of information relevance and recipient</article-title>
          <source>Proceedings of the 54th Hawaii International Conference on System Sciences</source>
          <year>2021</year>
          <conf-name>HICSS '21</conf-name>
          <conf-date>January 5-8, 2021</conf-date>
          <conf-loc>Kauai, HI</conf-loc>
          <fpage>4632</fpage>
          <lpage>40</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/19f1ed51-079e-42ba-bf6a-1b5fd292efb8/content"/>
          </comment>
          <pub-id pub-id-type="doi">10.24251/hicss.2021.562</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nissenbaum</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Contextual integrity up and down the data food chain</article-title>
          <source>Theo Inq L</source>
          <year>2019</year>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>256</fpage>
          <pub-id pub-id-type="doi">10.1515/til-2019-0008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>John</surname>
              <given-names>LK</given-names>
            </name>
            <name name-style="western">
              <surname>Loewenstein</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>What is privacy worth?</article-title>
          <source>J Leg Stud</source>
          <year>2013</year>
          <month>06</month>
          <volume>42</volume>
          <issue>2</issue>
          <fpage>249</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.1086/671754</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>John</surname>
              <given-names>LK</given-names>
            </name>
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Loewenstein</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Strangers on a plane: context-dependent willingness to divulge sensitive information</article-title>
          <source>J Consum Res</source>
          <year>2011</year>
          <month>02</month>
          <day>01</day>
          <volume>37</volume>
          <issue>5</issue>
          <fpage>858</fpage>
          <lpage>73</lpage>
          <pub-id pub-id-type="doi">10.1086/656423</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naeini</surname>
              <given-names>PE</given-names>
            </name>
            <name name-style="western">
              <surname>Bhagavatula</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Habib</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Degeling</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bauer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Cranor</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Sadeh</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Privacy expectations and preferences in an IoT world</article-title>
          <source>Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security</source>
          <year>2017</year>
          <conf-name>SOUPS '17</conf-name>
          <conf-date>July 12-14, 2017</conf-date>
          <conf-loc>Santa Clara, CA</conf-loc>
          <fpage>399</fpage>
          <lpage>412</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.5555/3235924.3235956"/>
          </comment>
          <pub-id pub-id-type="doi">10.5555/3235924.3235956</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Chun</surname>
              <given-names>HH</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Why recommend a brand face‐to‐face but not on Facebook? How word‐of‐mouth on online social sites differs from traditional word‐of‐mouth</article-title>
          <source>J Consum Psychol</source>
          <year>2014</year>
          <month>05</month>
          <day>29</day>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>120</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jcps.2014.05.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Merlo</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Hoyer</surname>
              <given-names>WD</given-names>
            </name>
          </person-group>
          <article-title>Immunizing customers against negative brand-related information</article-title>
          <source>J Acad Mark Sci</source>
          <year>2023</year>
          <month>03</month>
          <day>11</day>
          <volume>52</volume>
          <issue>1</issue>
          <fpage>140</fpage>
          <lpage>63</lpage>
          <pub-id pub-id-type="doi">10.1007/s11747-023-00929-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Merlo</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Gillingwater</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>JJ</given-names>
            </name>
          </person-group>
          <article-title>Exploring the changing role of brand archetypes in customer-brand relationships: why try to be a hero when your brand can be more?</article-title>
          <source>Bus Horiz</source>
          <year>2023</year>
          <month>09</month>
          <volume>66</volume>
          <issue>5</issue>
          <fpage>615</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1016/j.bushor.2022.11.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>CW</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>JW</given-names>
            </name>
          </person-group>
          <article-title>Attachment–aversion (AA) model of customer–brand relationships</article-title>
          <source>J Consum Psychol</source>
          <year>2013</year>
          <month>01</month>
          <day>17</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>229</fpage>
          <lpage>48</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jcps.2013.01.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>The paradox of customer education: customer expertise and loyalty in the financial services industry</article-title>
          <source>Eur J Mark</source>
          <year>2007</year>
          <fpage>466</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1108/03090560710737561</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Auh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Unraveling the customer education paradox: when, and how, should firms educate their customers?</article-title>
          <source>J Serv Res</source>
          <year>2017</year>
          <month>02</month>
          <day>15</day>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>306</fpage>
          <lpage>21</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1756283X10363751?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1094670517691847</pub-id>
          <pub-id pub-id-type="pii">10.1177_1756283X10363751</pub-id>
          <pub-id pub-id-type="pmcid">PMC3437532</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Perceived service quality and customer trust: does enhancing customers' service knowledge matter?</article-title>
          <source>J Serv Res</source>
          <year>2008</year>
          <month>02</month>
          <day>01</day>
          <volume>10</volume>
          <issue>3</issue>
          <fpage>256</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1756283X10363751?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1094670507310769</pub-id>
          <pub-id pub-id-type="pii">10.1177_1756283X10363751</pub-id>
          <pub-id pub-id-type="pmcid">PMC3437532</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wittes</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox: The privacy benefits of privacy threats</article-title>
          <source>Center for Technology Innovation at Brookings</source>
          <year>2015</year>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.brookings.edu/wp-content/uploads/2016/06/Wittes-and-Liu_Privacy-paradox_v10.pdf">https://www.brookings.edu/wp-content/uploads/2016/06/Wittes-and-Liu_Privacy-paradox_v10.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Merlo</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Auh</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Why customer participation matters</article-title>
          <source>MIT Sloan Manag Rev</source>
          <year>2013</year>
          <volume>54</volume>
          <fpage>37</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://sloanreview.mit.edu/article/why-customer-participation-matters/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Merlo</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Auh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Levstek</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The benefits and implementation of performance transparency: the why and how of letting your customers ‘see through’ your business</article-title>
          <source>Bus Horiz</source>
          <year>2018</year>
          <month>01</month>
          <volume>61</volume>
          <issue>1</issue>
          <fpage>73</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1016/j.bushor.2017.09.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sung</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Artificial intelligence is safer for my privacy: interplay between types of personal information and agents on perceived privacy risk and concerns</article-title>
          <source>Cyberpsychol Behav Soc Netw</source>
          <year>2022</year>
          <month>02</month>
          <day>01</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>118</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1089/cyber.2021.0076</pub-id>
          <pub-id pub-id-type="medline">34883024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parmar</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Dong</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Connecting with your dentist on Facebook: patients' and dentists' attitudes towards social media usage in dentistry</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>06</month>
          <day>29</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>e10109</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/6/e10109/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10109</pub-id>
          <pub-id pub-id-type="medline">29959108</pub-id>
          <pub-id pub-id-type="pii">v20i6e10109</pub-id>
          <pub-id pub-id-type="pmcid">PMC6045786</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bélanger</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Crossler</surname>
              <given-names>RE</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the digital age: a review of information privacy research in information systems</article-title>
          <source>MIS Q</source>
          <year>2011</year>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>1017</fpage>
          <pub-id pub-id-type="doi">10.2307/41409971</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information privacy research: an interdisciplinary review</article-title>
          <source>MIS Q</source>
          <year>2011</year>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>989</fpage>
          <lpage>1015</lpage>
          <pub-id pub-id-type="doi">10.2307/41409970</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saura</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Ribeiro-Soriano</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Palacios-Marqués</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Setting privacy “by default” in social IoT: theorizing the challenges and directions in big data research</article-title>
          <source>Big Data Res</source>
          <year>2021</year>
          <month>07</month>
          <volume>25</volume>
          <fpage>100245</fpage>
          <pub-id pub-id-type="doi">10.1016/j.bdr.2021.100245</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>KD</given-names>
            </name>
            <name name-style="western">
              <surname>Murphy</surname>
              <given-names>PE</given-names>
            </name>
          </person-group>
          <article-title>The role of data privacy in marketing</article-title>
          <source>J Acad Mark Sci</source>
          <year>2016</year>
          <month>9</month>
          <day>22</day>
          <volume>45</volume>
          <issue>2</issue>
          <fpage>135</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1007/s11747-016-0495-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beke</surname>
              <given-names>FT</given-names>
            </name>
            <name name-style="western">
              <surname>Eggers</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Verhoef</surname>
              <given-names>PC</given-names>
            </name>
          </person-group>
          <article-title>Consumer informational privacy: current knowledge and research directions</article-title>
          <source>Found Trends Mark</source>
          <year>2016</year>
          <volume>11</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>71</lpage>
          <pub-id pub-id-type="doi">10.1561/1700000057</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdi</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Zhan</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ramokapane</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Such</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Privacy norms for smart home personal assistants</article-title>
          <source>Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems</source>
          <year>2021</year>
          <conf-name>CHI '21</conf-name>
          <conf-date>May 8-13, 2021</conf-date>
          <conf-loc>Yokohama, Japan</conf-loc>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/3411764.3445122"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3411764.3445122</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Winter</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Davidson</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Big data governance of personal health information and challenges to contextual integrity</article-title>
          <source>Inf Soc</source>
          <year>2018</year>
          <month>12</month>
          <day>28</day>
          <volume>35</volume>
          <issue>1</issue>
          <fpage>36</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1080/01972243.2018.1542648</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Matzner</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”</article-title>
          <source>J Inf Commun Ethics Soc</source>
          <year>2014</year>
          <volume>12</volume>
          <issue>2</issue>
          <fpage>106</fpage>
          <pub-id pub-id-type="doi">10.1108/jices-08-2013-0030</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kosinski</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Deep neural networks are more accurate than humans at detecting sexual orientation from facial images</article-title>
          <source>J Pers Soc Psychol</source>
          <year>2018</year>
          <month>02</month>
          <volume>114</volume>
          <issue>2</issue>
          <fpage>246</fpage>
          <lpage>57</lpage>
          <pub-id pub-id-type="doi">10.1037/pspa0000098</pub-id>
          <pub-id pub-id-type="medline">29389215</pub-id>
          <pub-id pub-id-type="pii">2018-03783-002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vassallo</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox in the big data era? No thanks, we are the e-people: the e-people in the big data era</article-title>
          <source>Int J Cyber Behav Psychol Learn</source>
          <year>2019</year>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>32</fpage>
          <lpage>47</lpage>
          <pub-id pub-id-type="doi">10.4018/IJCBPL.2019070103</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Solove</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Introduction: privacy self-management and the consent dilemma</article-title>
          <source>Harv Law Rev</source>
          <year>2013</year>
          <volume>126</volume>
          <issue>7</issue>
          <fpage>1880</fpage>
          <lpage>903</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://harvardlawreview.org/print/vol-126/introduction-privacy-self-management-and-the-consent-dilemma/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aljeraisy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Barati</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rana</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Perera</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Privacy laws and privacy by design schemes for the internet of things</article-title>
          <source>ACM Comput Surv</source>
          <year>2021</year>
          <month>05</month>
          <day>25</day>
          <volume>54</volume>
          <issue>5</issue>
          <fpage>1</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1145/3450965</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jacobs</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Popma</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Medical research, big data and the need for privacy by design</article-title>
          <source>Big Data Soc</source>
          <year>2019</year>
          <month>01</month>
          <day>18</day>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>2053951718824352</fpage>
          <pub-id pub-id-type="doi">10.1177/2053951718824352</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Frank</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hatak</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Fayolle</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Doing a research literature review</article-title>
          <source>How to Get Published in the Best Entrepreneurship Journals</source>
          <year>2012</year>
          <publisher-loc>Oxford, UK</publisher-loc>
          <publisher-name>Edward Elgar Publishing Ltd</publisher-name>
          <fpage>1608</fpage>
          <lpage>16</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fisch</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Block</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Six tips for your (systematic) literature review in business and management research</article-title>
          <source>Manag Rev Q</source>
          <year>2018</year>
          <month>5</month>
          <day>3</day>
          <volume>68</volume>
          <issue>2</issue>
          <fpage>103</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1007/s11301-018-0142-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Watson</surname>
              <given-names>RT</given-names>
            </name>
          </person-group>
          <article-title>Beyond being systematic in literature reviews in IS</article-title>
          <source>J Inf Technol</source>
          <year>2015</year>
          <month>06</month>
          <day>01</day>
          <volume>30</volume>
          <issue>2</issue>
          <fpage>185</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1057/jit.2015.12</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Greengold</surname>
              <given-names>NL</given-names>
            </name>
            <name name-style="western">
              <surname>Ellrodt</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Weingarten</surname>
              <given-names>SR</given-names>
            </name>
          </person-group>
          <article-title>The relation between systematic reviews and practice guidelines</article-title>
          <source>Ann Intern Med</source>
          <year>1997</year>
          <month>08</month>
          <day>01</day>
          <volume>127</volume>
          <issue>3</issue>
          <fpage>210</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.7326/0003-4819-127-3-199708010-00006</pub-id>
          <pub-id pub-id-type="medline">9245227</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mustak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jaakkola</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Halinen</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kaartemo</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Customer participation management: developing a comprehensive framework and a research agenda</article-title>
          <source>J Serv Manag</source>
          <year>2016</year>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>250</fpage>
          <lpage>75</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.emerald.com/insight/content/doi/10.1108/josm-01-2015-0014/full/html"/>
          </comment>
          <pub-id pub-id-type="doi">10.1108/JOSM-01-2015-0014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rowley</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Keegan</surname>
              <given-names>BJ</given-names>
            </name>
          </person-group>
          <article-title>An overview of systematic literature reviews in social media marketing</article-title>
          <source>J Inf Sci</source>
          <year>2019</year>
          <month>08</month>
          <day>12</day>
          <volume>46</volume>
          <issue>6</issue>
          <fpage>725</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1177/0165551519866544</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Booth</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sutton</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Clowes</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Martyn-St</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <source>Systematic Approaches to a Successful Literature Review. 3rd edition</source>
          <year>2022</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sampson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fergusson</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Cogo</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Horsley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Few systematic reviews exist documenting the extent of bias: a systematic review</article-title>
          <source>J Clin Epidemiol</source>
          <year>2008</year>
          <month>05</month>
          <volume>61</volume>
          <issue>5</issue>
          <fpage>422</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jclinepi.2007.10.017</pub-id>
          <pub-id pub-id-type="medline">18394534</pub-id>
          <pub-id pub-id-type="pii">S0895-4356(07)00405-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Horsley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Dingwall</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Sampson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Checking reference lists to find additional studies for systematic reviews</article-title>
          <source>Cochrane Database Syst Rev</source>
          <year>2011</year>
          <month>08</month>
          <day>10</day>
          <volume>2011</volume>
          <issue>8</issue>
          <fpage>MR000026</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/21833989"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/14651858.MR000026.pub2</pub-id>
          <pub-id pub-id-type="medline">21833989</pub-id>
          <pub-id pub-id-type="pmcid">PMC7388740</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bilal</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Rise of technomoral virtues for artificial intelligence-based emerging technologies’ users and producers: threats to personal information privacy, the privacy paradox, trust in emerging technologies, and virtue ethics</article-title>
          <source>University of Melbourne</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/359769116_Rise_of_Technomoral_Virtues_for_Artificial_Intelligence-based_Emerging_Technologies'_Users_and_Producers_Threats_to_Personal_Information_Privacy_the_Privacy_Paradox_Trust_in_Emerging_Technologies_and_">https://tinyurl.com/5n8knf9w</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mariani</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Perez‐Vega</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wirtz</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>AI in marketing, consumer research and psychology: a systematic literature review and research agenda</article-title>
          <source>Psychol Mark</source>
          <year>2021</year>
          <month>12</month>
          <day>09</day>
          <volume>39</volume>
          <issue>4</issue>
          <fpage>755</fpage>
          <lpage>76</lpage>
          <pub-id pub-id-type="doi">10.1002/mar.21619</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Artificial Intelligence and the privacy paradox of opportunity, big data and the digital universe</article-title>
          <source>Proceedings of the 2019 International Conference on Computational Intelligence and Knowledge Economy</source>
          <year>2019</year>
          <conf-name>ICCIKE '19</conf-name>
          <conf-date>December 11-12, 2019</conf-date>
          <conf-loc>Dubai, United Arab Emirates</conf-loc>
          <fpage>150</fpage>
          <lpage>3</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/9004264"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/iccike47802.2019.9004264</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Privacy-preserving fusion of IoT and big data for e-health</article-title>
          <source>Future Gener Comput Syst</source>
          <year>2018</year>
          <month>09</month>
          <volume>86</volume>
          <fpage>1437</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1016/j.future.2018.01.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Conger</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Pratt</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Loch</surname>
              <given-names>KD</given-names>
            </name>
          </person-group>
          <article-title>Personal information privacy and emerging technologies</article-title>
          <source>Inf Syst J</source>
          <year>2012</year>
          <month>06</month>
          <volume>23</volume>
          <issue>5</issue>
          <fpage>401</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1365-2575.2012.00402.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Brandimarte</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Loewenstein</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Privacy and human behavior in the age of information</article-title>
          <source>Science</source>
          <year>2015</year>
          <month>01</month>
          <day>30</day>
          <volume>347</volume>
          <issue>6221</issue>
          <fpage>509</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1126/science.aaa1465</pub-id>
          <pub-id pub-id-type="medline">25635091</pub-id>
          <pub-id pub-id-type="pii">347/6221/509</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harzing</surname>
              <given-names>AW</given-names>
            </name>
          </person-group>
          <article-title>Journal quality list</article-title>
          <source>Harzing.com</source>
          <access-date>2022-08-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://harzing.com/resources/journal-quality-list">https://harzing.com/resources/journal-quality-list</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mothersbaugh</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Foxx</surname>
              <given-names>WK</given-names>
            </name>
            <name name-style="western">
              <surname>Beatty</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Disclosure antecedents in an online service context: the role of sensitivity of information</article-title>
          <source>J Serv Res</source>
          <year>2011</year>
          <month>12</month>
          <day>20</day>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>76</fpage>
          <lpage>98</lpage>
          <pub-id pub-id-type="doi">10.1177/1094670511424924</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beldad</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Steehouder</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions</article-title>
          <source>Comput Human Behav</source>
          <year>2011</year>
          <month>11</month>
          <volume>27</volume>
          <issue>6</issue>
          <fpage>2233</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2011.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Zoonen</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns in smart cities</article-title>
          <source>Gov Inf Q</source>
          <year>2016</year>
          <month>07</month>
          <volume>33</volume>
          <issue>3</issue>
          <fpage>472</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1016/j.giq.2016.06.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="web">
          <article-title>Augmented reality and virtual reality market size &#38; share report 2028</article-title>
          <source>The Insight Partners</source>
          <access-date>2022-08-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.theinsightpartners.com/reports/augmented-reality-and-virtual-reality-market">https://www.theinsightpartners.com/reports/augmented-reality-and-virtual-reality-market</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Brinson</surname>
              <given-names>NH</given-names>
            </name>
            <name name-style="western">
              <surname>Bott</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Moeller</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>The influence of consumer–brand relationship on the personalized advertising privacy calculus in social media</article-title>
          <source>J Interact Mark</source>
          <year>2022</year>
          <month>01</month>
          <day>31</day>
          <volume>55</volume>
          <issue>1</issue>
          <fpage>16</fpage>
          <lpage>30</lpage>
          <pub-id pub-id-type="doi">10.1016/j.intmar.2021.01.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rychwalska</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Roszczy'ska-Kurasi'ska</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Domaradzka</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Right to privacy in the context of the privacy paradox and data collection patterns: exploratory study of polish Facebook users</article-title>
          <source>Proceedings of the 55th Hawaii International Conference on System Sciences</source>
          <year>2022</year>
          <conf-name>HICSS '22</conf-name>
          <conf-date>January 4-7, 2022</conf-date>
          <conf-loc>Virtual Event</conf-loc>
          <fpage>2722</fpage>
          <lpage>31</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/3smfznxy"/>
          </comment>
          <pub-id pub-id-type="doi">10.24251/hicss.2022.338</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wirth</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Maier</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Laumer</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Weitzel</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Laziness as an explanation for the privacy paradox: a longitudinal empirical investigation</article-title>
          <source>Int Res</source>
          <year>2021</year>
          <month>05</month>
          <day>25</day>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>24</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1108/intr-10-2019-0439</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Karan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Consumers’ privacy concern and privacy protection on social network sites in the era of big data: empirical evidence from college students</article-title>
          <source>J Interact Advert</source>
          <year>2019</year>
          <month>09</month>
          <day>04</day>
          <volume>19</volume>
          <issue>3</issue>
          <fpage>187</fpage>
          <lpage>201</lpage>
          <pub-id pub-id-type="doi">10.1080/15252019.2019.1651681</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agesilaou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kyza</surname>
              <given-names>EA</given-names>
            </name>
          </person-group>
          <article-title>Whose data are they? Elementary school students’ conceptualization of data ownership and privacy of personal digital data</article-title>
          <source>Int J Child Comput Interact</source>
          <year>2022</year>
          <month>09</month>
          <volume>33</volume>
          <fpage>100462</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ijcci.2022.100462</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Keen</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Apathy, convenience or irrelevance? Identifying conceptual barriers to safeguarding children’s data privacy</article-title>
          <source>New Media Soc</source>
          <year>2020</year>
          <month>09</month>
          <day>24</day>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>50</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1177/1461444820960068</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>See you, see me: teenagers’ self-disclosure and regret of posting on social network site</article-title>
          <source>Comput Human Behav</source>
          <year>2015</year>
          <month>11</month>
          <volume>52</volume>
          <fpage>398</fpage>
          <lpage>407</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.05.059</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marwick</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fontaine</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>boyd</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>“Nobody sees it, nobody gets mad”: social media, privacy, and personal responsibility among low-SES youth</article-title>
          <source>Soc Media Soc</source>
          <year>2017</year>
          <month>05</month>
          <day>30</day>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>2056305117710455</fpage>
          <pub-id pub-id-type="doi">10.1177/2056305117710455</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Melumad</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Full disclosure: how smartphones enhance consumer self-disclosure</article-title>
          <source>J Mark</source>
          <year>2020</year>
          <month>03</month>
          <day>17</day>
          <volume>84</volume>
          <issue>3</issue>
          <fpage>28</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1177/0022242920912732</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Puntoni</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Reczek</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Giesler</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Botti</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Consumers and artificial intelligence: an experiential perspective</article-title>
          <source>J Mark</source>
          <year>2020</year>
          <month>10</month>
          <day>16</day>
          <volume>85</volume>
          <issue>1</issue>
          <fpage>131</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1177/0022242920953847</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bartel Sheehan</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>An investigation of gender differences in on-line privacy concerns and resultant behaviors</article-title>
          <source>J Interact Mark</source>
          <year>1999</year>
          <month>1</month>
          <volume>13</volume>
          <issue>4</issue>
          <fpage>24</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1002/(sici)1520-6653(199923)13:4&#60;24::aid-dir3&#62;3.0.co;2-o</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Culnan</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>PK</given-names>
            </name>
          </person-group>
          <article-title>Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation</article-title>
          <source>Organ Sci</source>
          <year>1999</year>
          <month>02</month>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>104</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1287/orsc.10.1.104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Internet privacy concerns and their antecedents - measurement validity and a regression model</article-title>
          <source>Behav Inform Technol</source>
          <year>2004</year>
          <month>11</month>
          <volume>23</volume>
          <issue>6</issue>
          <fpage>413</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.1080/01449290410001715723</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Milne</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Pettinico</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hajjat</surname>
              <given-names>FM</given-names>
            </name>
            <name name-style="western">
              <surname>Markos</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing</article-title>
          <source>J Consum Aff</source>
          <year>2016</year>
          <month>06</month>
          <day>16</day>
          <volume>51</volume>
          <issue>1</issue>
          <fpage>133</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1111/JOCA.12111</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Swani</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Milne</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Slepchuk</surname>
              <given-names>AN</given-names>
            </name>
          </person-group>
          <article-title>Revisiting trust and privacy concern in consumers’ perceptions of marketing information management practices: replication and extension</article-title>
          <source>J Interact Mark</source>
          <year>2022</year>
          <month>01</month>
          <day>31</day>
          <volume>56</volume>
          <issue>1</issue>
          <fpage>137</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1016/j.intmar.2021.03.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wieringa</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kannan</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Reutterer</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Risselada</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Skiera</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Data analytics in a privacy-concerned world</article-title>
          <source>J Bus Res</source>
          <year>2021</year>
          <month>01</month>
          <volume>122</volume>
          <fpage>915</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2019.05.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hermes</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sutanrikulu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schreieck</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Krcmar</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Who quits privacy-invasive online platform operators? A segmentation study with implications for the privacy paradox</article-title>
          <source>Proceedings of the 54th Hawaii International Conference on Systems Sciences</source>
          <year>2021</year>
          <conf-name>HICSS '21</conf-name>
          <conf-date>January 4-8, 2021</conf-date>
          <conf-loc>Virtual Event</conf-loc>
          <fpage>4651</fpage>
          <lpage>60</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/ab333348-dc98-4c5e-b20e-cf00be4291a4/content"/>
          </comment>
          <pub-id pub-id-type="doi">10.24251/hicss.2021.564</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref106">
        <label>106</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kobsa</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Understanding user privacy in internet of things environments</article-title>
          <source>Proceedings of the 3rd World Forum on Internet of Things</source>
          <year>2016</year>
          <conf-name>WF-IoT '16</conf-name>
          <conf-date>December 12-14, 2016</conf-date>
          <conf-loc>Reston, VA</conf-loc>
          <fpage>407</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/7845392"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/wf-iot.2016.7845392</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref107">
        <label>107</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Newlands</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Privacy and smart speakers: a multi-dimensional approach</article-title>
          <source>Inf Soc</source>
          <year>2021</year>
          <month>03</month>
          <day>27</day>
          <volume>37</volume>
          <issue>3</issue>
          <fpage>147</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1080/01972243.2021.1897914</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref108">
        <label>108</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marmion</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Millard</surname>
              <given-names>DE</given-names>
            </name>
            <name name-style="western">
              <surname>Gerding</surname>
              <given-names>EH</given-names>
            </name>
            <name name-style="western">
              <surname>Stevenage</surname>
              <given-names>SV</given-names>
            </name>
          </person-group>
          <article-title>The willingness of crowds: cohort disclosure preferences for personally identifying information</article-title>
          <source>Proc Int AAAI Conf Weblogs Soc Media</source>
          <year>2019</year>
          <month>07</month>
          <day>06</day>
          <volume>13</volume>
          <fpage>358</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1609/icwsm.v13i01.3236</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref109">
        <label>109</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malhotra</surname>
              <given-names>NK</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Internet Users' Information Privacy Concerns (IUIPC): the construct, the scale, and a causal model</article-title>
          <source>Inf Syst Res</source>
          <year>2004</year>
          <month>12</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>336</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref110">
        <label>110</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Phelps</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nowak</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrell</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns and consumer willingness to provide personal information</article-title>
          <source>J Public Policy Mark</source>
          <year>2000</year>
          <month>04</month>
          <day>01</day>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>27</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.1509/jppm.19.1.27.16941</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref111">
        <label>111</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carignani</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gemmo</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>New media and privacy the privacy paradox in the digital world: I will not disclose my data. actually, I will ... it depends</article-title>
          <source>Int J Comput</source>
          <year>2018</year>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>201</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/1135/475"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref112">
        <label>112</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cichy</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Salge</surname>
              <given-names>TO</given-names>
            </name>
            <name name-style="western">
              <surname>Kohli</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns and data sharing in the internet of things: mixed methods evidence from connected cars</article-title>
          <source>MIS Q</source>
          <year>2021</year>
          <month>10</month>
          <day>14</day>
          <volume>45</volume>
          <issue>4</issue>
          <fpage>1863</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2021/14165</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref113">
        <label>113</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Markos</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Milne</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Peltier</surname>
              <given-names>JW</given-names>
            </name>
          </person-group>
          <article-title>Information sensitivity and willingness to provide continua: a comparative privacy study of the United States and Brazil</article-title>
          <source>J Public Policy Mark</source>
          <year>2017</year>
          <month>04</month>
          <day>01</day>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>79</fpage>
          <lpage>96</lpage>
          <pub-id pub-id-type="doi">10.1509/jppm.15.159</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref114">
        <label>114</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kobsa</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy preference modeling and prediction in a simulated campuswide IoT environment</article-title>
          <source>Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications</source>
          <year>2017</year>
          <conf-name>PerCom '17</conf-name>
          <conf-date>March 13-17, 2017</conf-date>
          <conf-loc>Kona, HI</conf-loc>
          <fpage>276</fpage>
          <lpage>85</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/7917874"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/percom.2017.7917874</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref115">
        <label>115</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brough</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Norton</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Sciarappa</surname>
              <given-names>SL</given-names>
            </name>
            <name name-style="western">
              <surname>John</surname>
              <given-names>LK</given-names>
            </name>
          </person-group>
          <article-title>The bulletproof glass effect: unintended consequences of privacy notices</article-title>
          <source>J Mark Res</source>
          <year>2022</year>
          <month>02</month>
          <day>18</day>
          <volume>59</volume>
          <issue>4</issue>
          <fpage>739</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1177/00222437211069093</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref116">
        <label>116</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Easwara Moorthy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Vu</surname>
              <given-names>KP</given-names>
            </name>
          </person-group>
          <article-title>Privacy concerns for use of voice activated personal assistant in the public space</article-title>
          <source>Int J Hum Comput Interact</source>
          <year>2014</year>
          <month>12</month>
          <day>15</day>
          <volume>31</volume>
          <issue>4</issue>
          <fpage>307</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1080/10447318.2014.986642</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref117">
        <label>117</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aguirre</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Mahr</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Grewal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>de Ruyter</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Wetzels</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Unraveling the personalization paradox: the effect of information collection and trust-building strategies on online advertisement effectiveness</article-title>
          <source>J Retail</source>
          <year>2015</year>
          <month>03</month>
          <volume>91</volume>
          <issue>1</issue>
          <fpage>34</fpage>
          <lpage>49</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jretai.2014.09.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref118">
        <label>118</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Carroll</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Rosson</surname>
              <given-names>MB</given-names>
            </name>
          </person-group>
          <article-title>The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing</article-title>
          <source>Decis Support Syst</source>
          <year>2011</year>
          <month>4</month>
          <volume>51</volume>
          <issue>1</issue>
          <fpage>42</fpage>
          <lpage>52</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2010.11.017</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref119">
        <label>119</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zarifis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kawalek</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Azadegan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluating if trust and personal information privacy concerns are barriers to using health insurance that explicitly utilizes AI</article-title>
          <source>J Internet Commer</source>
          <year>2020</year>
          <month>10</month>
          <day>19</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>66</fpage>
          <lpage>83</lpage>
          <pub-id pub-id-type="doi">10.1080/15332861.2020.1832817</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref120">
        <label>120</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bornschein</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Maier</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The effect of consumers’ perceived power and risk in digital information privacy: the example of cookie notices</article-title>
          <source>J Public Policy Mark</source>
          <year>2020</year>
          <month>02</month>
          <day>21</day>
          <volume>39</volume>
          <issue>2</issue>
          <fpage>135</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1177/0743915620902143</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref121">
        <label>121</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Siyal</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Prohibitive factors to the acceptance of Internet of Things (IoT) technology in society: a smart-home context using a resistive modelling approach</article-title>
          <source>Technol Soc</source>
          <year>2021</year>
          <month>08</month>
          <volume>66</volume>
          <fpage>101683</fpage>
          <pub-id pub-id-type="doi">10.1016/j.techsoc.2021.101683</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref122">
        <label>122</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jeon</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Internet of things technology: balancing privacy concerns with convenience</article-title>
          <source>Telemat Inform</source>
          <year>2022</year>
          <month>05</month>
          <volume>70</volume>
          <fpage>101816</fpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2022.101816</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref123">
        <label>123</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rajaobelina</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Prom Tep</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Arcand</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ricard</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Creepiness: its antecedents and impact on loyalty when interacting with a chatbot</article-title>
          <source>Psychol Mark</source>
          <year>2021</year>
          <month>07</month>
          <day>20</day>
          <volume>38</volume>
          <issue>12</issue>
          <fpage>2339</fpage>
          <lpage>56</lpage>
          <pub-id pub-id-type="doi">10.1002/mar.21548</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref124">
        <label>124</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marakhimov</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Joo</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Consumer adaptation and infusion of wearable devices for healthcare</article-title>
          <source>Comput Human Behav</source>
          <year>2017</year>
          <month>11</month>
          <volume>76</volume>
          <fpage>135</fpage>
          <lpage>48</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.07.016</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref125">
        <label>125</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Casselman</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Onopa</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Khansa</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Wearable healthcare: lessons from the past and a peek into the future</article-title>
          <source>Telemat Inform</source>
          <year>2017</year>
          <month>11</month>
          <volume>34</volume>
          <issue>7</issue>
          <fpage>1011</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2017.04.011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref126">
        <label>126</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>How do AI-driven chatbots impact user experience? Examining gratifications, perceived privacy risk, satisfaction, loyalty, and continued use</article-title>
          <source>J Broadcast Electron Media</source>
          <year>2020</year>
          <month>12</month>
          <day>07</day>
          <volume>64</volume>
          <issue>4</issue>
          <fpage>592</fpage>
          <lpage>614</lpage>
          <pub-id pub-id-type="doi">10.1080/08838151.2020.1834296</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref127">
        <label>127</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maltseva</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A quantum of self: a study of self-quantification and self-disclosure</article-title>
          <source>Comput Human Behav</source>
          <year>2018</year>
          <month>04</month>
          <volume>81</volume>
          <fpage>102</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.12.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref128">
        <label>128</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Faqih</surname>
              <given-names>KM</given-names>
            </name>
          </person-group>
          <article-title>Factors influencing the behavioral intention to adopt a technological innovation from a developing country context: the case of mobile augmented reality games</article-title>
          <source>Technol Soc</source>
          <year>2022</year>
          <month>05</month>
          <volume>69</volume>
          <fpage>101958</fpage>
          <pub-id pub-id-type="doi">10.1016/j.techsoc.2022.101958</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref129">
        <label>129</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aleisa</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Renaud</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Bongiovanni</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox applies to IoT devices too: a Saudi Arabian study</article-title>
          <source>Comput Secur</source>
          <year>2020</year>
          <month>09</month>
          <volume>96</volume>
          <fpage>101897</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2020.101897</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref130">
        <label>130</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yavuz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Çorbacıoğlu</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Başoğlu</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Daim</surname>
              <given-names>TU</given-names>
            </name>
            <name name-style="western">
              <surname>Shaygan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Augmented reality technology adoption: case of a mobile application in Turkey</article-title>
          <source>Technol Soc</source>
          <year>2021</year>
          <month>08</month>
          <volume>66</volume>
          <fpage>101598</fpage>
          <pub-id pub-id-type="doi">10.1016/j.techsoc.2021.101598</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref131">
        <label>131</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kamboj</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bag</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Role of risks in the development of responsible artificial intelligence in the digital healthcare domain</article-title>
          <source>Inf Syst Front</source>
          <year>2021</year>
          <month>08</month>
          <day>09</day>
          <volume>25</volume>
          <issue>6</issue>
          <fpage>2257</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.1007/s10796-021-10174-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref132">
        <label>132</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Resistance to facial recognition payment in China: the influence of privacy-related factors</article-title>
          <source>Telecommun Policy</source>
          <year>2021</year>
          <month>06</month>
          <volume>45</volume>
          <issue>5</issue>
          <fpage>102155</fpage>
          <pub-id pub-id-type="doi">10.1016/j.telpol.2021.102155</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref133">
        <label>133</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pentina</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bata</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Exploring privacy paradox in information-sensitive mobile app adoption: a cross-cultural comparison</article-title>
          <source>Comput Human Behav</source>
          <year>2016</year>
          <month>12</month>
          <volume>65</volume>
          <fpage>409</fpage>
          <lpage>19</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.09.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref134">
        <label>134</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Deutsch</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Distributive Justice: A Social-psychological Perspective</source>
          <year>1985</year>
          <publisher-loc>New Haven, CT</publisher-loc>
          <publisher-name>Yale University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref135">
        <label>135</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pizzi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Scarpi</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Privacy threats with retail technologies: a consumer perspective</article-title>
          <source>J Retail Consum Serv</source>
          <year>2020</year>
          <month>09</month>
          <volume>56</volume>
          <fpage>102160</fpage>
          <pub-id pub-id-type="doi">10.1016/j.jretconser.2020.102160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref136">
        <label>136</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laufer</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Wolfe</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy as a concept and a social issue: a multidimensional developmental theory</article-title>
          <source>J Soc Iss</source>
          <year>2010</year>
          <month>04</month>
          <day>14</day>
          <volume>33</volume>
          <issue>3</issue>
          <fpage>22</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1540-4560.1977.tb01880.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref137">
        <label>137</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Attié</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer-Waarden</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The acceptance and usage of smart connected objects according to adoption stages: an enhanced technology acceptance model integrating the diffusion of innovation, uses and gratification and privacy calculus theories</article-title>
          <source>Technol Forecast Soc Change</source>
          <year>2022</year>
          <month>03</month>
          <volume>176</volume>
          <fpage>121485</fpage>
          <pub-id pub-id-type="doi">10.1016/j.techfore.2022.121485</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref138">
        <label>138</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>An empirical study of wearable technology acceptance in healthcare</article-title>
          <source>Ind Manag Data Syst</source>
          <year>2015</year>
          <month>10</month>
          <day>19</day>
          <volume>115</volume>
          <issue>9</issue>
          <fpage>1704</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1108/IMDS-03-2015-0087</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref139">
        <label>139</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>EH</given-names>
            </name>
          </person-group>
          <article-title>The smart wearables-privacy paradox: a cluster analysis of smartwatch users</article-title>
          <source>Behav Inf Technol</source>
          <year>2020</year>
          <month>06</month>
          <day>12</day>
          <volume>40</volume>
          <issue>16</issue>
          <fpage>1755</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/j2NexF/E2Ab3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/0144929X.2020.1778787</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref140">
        <label>140</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ahn</surname>
              <given-names>JH</given-names>
            </name>
          </person-group>
          <article-title>Willingness to provide personal information: perspective of privacy calculus in IoT services</article-title>
          <source>Comput Human Behav</source>
          <year>2019</year>
          <month>03</month>
          <volume>92</volume>
          <fpage>273</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.11.022</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref141">
        <label>141</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lavado-Nalvaiz</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lucia-Palacios</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Pérez-López</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The role of the humanisation of smart home speakers in the personalisation–privacy paradox</article-title>
          <source>Electron Commer Res Appl</source>
          <year>2022</year>
          <month>05</month>
          <volume>53</volume>
          <fpage>101146</fpage>
          <pub-id pub-id-type="doi">10.1016/j.elerap.2022.101146</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref142">
        <label>142</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Willems</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Schmid</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Vanderelst</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Vogel</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ebinger</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>AI-driven public services and the privacy paradox: do citizens really care about their privacy?</article-title>
          <source>Public Manag Rev</source>
          <year>2022</year>
          <month>04</month>
          <day>13</day>
          <volume>25</volume>
          <issue>11</issue>
          <fpage>2116</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1080/14719037.2022.2063934</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref143">
        <label>143</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>A protection motivation theory of fear appeals and attitude change1</article-title>
          <source>J Psychol</source>
          <year>1975</year>
          <month>09</month>
          <day>02</day>
          <volume>91</volume>
          <issue>1</issue>
          <fpage>93</fpage>
          <lpage>114</lpage>
          <pub-id pub-id-type="doi">10.1080/00223980.1975.9915803</pub-id>
          <pub-id pub-id-type="medline">28136248</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref144">
        <label>144</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alashoor</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Joseph</surname>
              <given-names>RC</given-names>
            </name>
          </person-group>
          <article-title>Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: an APCO model</article-title>
          <source>Commun Assoc Inf Syst</source>
          <year>2017</year>
          <volume>41</volume>
          <fpage>62</fpage>
          <lpage>96</lpage>
          <pub-id pub-id-type="doi">10.17705/1CAIS.04104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref145">
        <label>145</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thongmak</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Protecting privacy in Pokémon Go: a multigroup analysis</article-title>
          <source>Technol Soc</source>
          <year>2022</year>
          <month>08</month>
          <volume>70</volume>
          <fpage>101999</fpage>
          <pub-id pub-id-type="doi">10.1016/j.techsoc.2022.101999</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref146">
        <label>146</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nurse</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Creese</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>(Smart)Watch Out! encouraging privacy-protective behavior through interactive games</article-title>
          <source>Int J Hum Comput Stud</source>
          <year>2019</year>
          <month>12</month>
          <volume>132</volume>
          <fpage>121</fpage>
          <lpage>37</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijhcs.2019.07.012</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref147">
        <label>147</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blau</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <source>Exchange and Power in Social Life. 2nd edition</source>
          <year>1986</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref148">
        <label>148</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Homans</surname>
              <given-names>GC</given-names>
            </name>
          </person-group>
          <source>Social Behavior and Its Elementary Forms</source>
          <year>1961</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Harcourt, Brace and World</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref149">
        <label>149</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Uysal</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alavi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bezençon</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Trojan horse or useful helper? A relationship perspective on artificial intelligence assistants with humanlike features</article-title>
          <source>J Acad Mark Sci</source>
          <year>2022</year>
          <month>03</month>
          <day>22</day>
          <volume>50</volume>
          <issue>6</issue>
          <fpage>1153</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1007/S11747-022-00856-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref150">
        <label>150</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>A technology acceptance model for empirically testing new end-user information systems: theory and results</article-title>
          <source>Massachusetts Institute of Technology</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dspace.mit.edu/handle/1721.1/15192">https://dspace.mit.edu/handle/1721.1/15192</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref151">
        <label>151</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Tao</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The roles of trust, personalization, loss of privacy, and anthropomorphism in public acceptance of smart healthcare services</article-title>
          <source>Comput Human Behav</source>
          <year>2022</year>
          <month>02</month>
          <volume>127</volume>
          <fpage>107026</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.107026</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref152">
        <label>152</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Tung</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>The adoption of AI service robots: a comparison between credence and experience service settings</article-title>
          <source>Psychol Mark</source>
          <year>2021</year>
          <month>02</month>
          <day>27</day>
          <volume>38</volume>
          <issue>4</issue>
          <fpage>691</fpage>
          <lpage>703</lpage>
          <pub-id pub-id-type="doi">10.1002/mar.21468</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref153">
        <label>153</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kuhl</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Beckmann</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>From intentions to actions: a theory of planned behavior</article-title>
          <source>Action Control: From Cognition to Behavior</source>
          <year>1985</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>11</fpage>
          <lpage>39</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref154">
        <label>154</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fishbein</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Understanding attitudes and predicting social behavior</article-title>
          <source>ScienceOpen</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scienceopen.com/book?vid=c20c4174-d8dc-428d-b352-280b05eacdf7">https://www.scienceopen.com/book?vid=c20c4174-d8dc-428d-b352-280b05eacdf7</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref155">
        <label>155</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fishbein</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <source>Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research</source>
          <year>1977</year>
          <month>03</month>
          <publisher-loc>Harlow, UK</publisher-loc>
          <publisher-name>Longman Higher Education</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref156">
        <label>156</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>GB</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>User acceptance of information technology: toward a unified view</article-title>
          <source>MIS Q</source>
          <year>2003</year>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>425</fpage>
          <pub-id pub-id-type="doi">10.2307/30036540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref157">
        <label>157</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vimalkumar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Dwivedi</surname>
              <given-names>YK</given-names>
            </name>
          </person-group>
          <article-title>‘Okay google, what about my privacy?’: user's privacy perceptions and acceptance of voice based digital assistants</article-title>
          <source>Comput Human Behav</source>
          <year>2021</year>
          <month>07</month>
          <volume>120</volume>
          <fpage>106763</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.106763</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref158">
        <label>158</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petronio</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Communication boundary management: a theoretical model of managing disclosure of private information between marital couples</article-title>
          <source>Commun Theory</source>
          <year>1991</year>
          <month>11</month>
          <volume>1</volume>
          <issue>4</issue>
          <fpage>311</fpage>
          <lpage>35</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1468-2885.1991.tb00023.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref159">
        <label>159</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petronio</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Boundaries of Privacy: Dialectics of Disclosure</source>
          <year>2002</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Suny Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref160">
        <label>160</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Revealing or concealing: privacy information disclosure in intelligent voice assistant usage- a configurational approach</article-title>
          <source>Ind Manag Data Syst</source>
          <year>2022</year>
          <month>04</month>
          <day>21</day>
          <volume>122</volume>
          <issue>5</issue>
          <fpage>1215</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1108/imds-08-2021-0485</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref161">
        <label>161</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kathuria</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kathuria</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Role of privacy management and human-centered artificial intelligence in driving customer engagement with smart speakers</article-title>
          <source>Proceedings of the 24th International Conference on Human-Computer Interaction</source>
          <year>2022</year>
          <conf-name>HCII '22</conf-name>
          <conf-date>June 26-July 1, 2022</conf-date>
          <conf-loc>Virtual Event</conf-loc>
          <fpage>412</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://link.springer.com/chapter/10.1007/978-3-031-06417-3_55"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-031-06417-3_55</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref162">
        <label>162</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harborth</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pape</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Investigating privacy concerns related to mobile augmented reality apps – a vignette based online experiment</article-title>
          <source>Comput Human Behav</source>
          <year>2021</year>
          <month>09</month>
          <volume>122</volume>
          <fpage>106833</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.106833</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref163">
        <label>163</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lazarus</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Folkman</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Gellman</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Turner</surname>
              <given-names>JR</given-names>
            </name>
          </person-group>
          <article-title>Stress: appraisal and coping</article-title>
          <source>Encyclopedia of Behavioral Medicine</source>
          <year>1984</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>1913</fpage>
          <lpage>5</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref164">
        <label>164</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chaiken</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Heuristic versus systematic information processing and the use of source versus message cues in persuasion</article-title>
          <source>J Pers Soc Psychol</source>
          <year>1980</year>
          <month>11</month>
          <volume>39</volume>
          <issue>5</issue>
          <fpage>752</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.1037/0022-3514.39.5.752</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref165">
        <label>165</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shin</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>User perceptions of algorithmic decisions in the personalized ai system: perceptual evaluation of fairness, accountability, transparency, and explainability</article-title>
          <source>J Broadcast Electron Media</source>
          <year>2020</year>
          <month>12</month>
          <day>14</day>
          <volume>64</volume>
          <issue>4</issue>
          <fpage>541</fpage>
          <lpage>65</lpage>
          <pub-id pub-id-type="doi">10.1080/08838151.2020.1843357</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref166">
        <label>166</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ram</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A model of innovation resistance</article-title>
          <source>ACR North Am Advance</source>
          <year>1987</year>
          <volume>16</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://acrwebsite.org/volumes/6688/volumes/v14/NA-14"/>
          </comment>
          <pub-id pub-id-type="doi">10.5130/AJCEB.v16i3.5164</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref167">
        <label>167</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ram</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Successful innovation using strategies to reduce consumer resistance an empirical test</article-title>
          <source>J Prod Innov Manage</source>
          <year>2003</year>
          <month>09</month>
          <day>23</day>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>20</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1111/1540-5885.610020</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref168">
        <label>168</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kahneman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Tversky</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Prospect theory: an analysis of decision under risk</article-title>
          <source>Econometrica</source>
          <year>1979</year>
          <month>03</month>
          <volume>47</volume>
          <issue>2</issue>
          <fpage>263</fpage>
          <pub-id pub-id-type="doi">10.2307/1914185</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref169">
        <label>169</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kahneman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Tversky</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>MacLean</surname>
              <given-names>LC</given-names>
            </name>
            <name name-style="western">
              <surname>Ziemba</surname>
              <given-names>WT</given-names>
            </name>
          </person-group>
          <article-title>Prospect theory: an analysis of decision under risk</article-title>
          <source>Handbook of the Fundamentals of Financial Decision Making</source>
          <year>1979</year>
          <month>03</month>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>World Scientific</publisher-name>
          <fpage>263</fpage>
          <lpage>92</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref170">
        <label>170</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Basu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dwivedi</surname>
              <given-names>YK</given-names>
            </name>
            <name name-style="western">
              <surname>Kaur</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Interactive voice assistants – does brand credibility assuage privacy risks?</article-title>
          <source>J Bus Res</source>
          <year>2022</year>
          <month>02</month>
          <volume>139</volume>
          <fpage>701</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2021.10.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref171">
        <label>171</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spence</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Market Signaling: Informational Transfer in Hiring and Related Screening Processes</source>
          <year>1974</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Harvard University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref172">
        <label>172</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bandura</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Social Foundations of Thought and Action: A Social Cognitive Theory</source>
          <year>1986</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Pearson</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref173">
        <label>173</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mori</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The uncanny valley: the original essay by Masahiro Mori</article-title>
          <source>IEEE Spectrum</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://spectrum.ieee.org/lely-dairy-robots">https://spectrum.ieee.org/lely-dairy-robots</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref174">
        <label>174</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mori</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>MacDorman</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kageki</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>The Uncanny Valley [From the Field]</article-title>
          <source>IEEE Robot Automat Mag</source>
          <year>2012</year>
          <month>06</month>
          <volume>19</volume>
          <issue>2</issue>
          <fpage>98</fpage>
          <lpage>100</lpage>
          <pub-id pub-id-type="doi">10.1109/mra.2012.2192811</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref175">
        <label>175</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Katz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Blumler</surname>
              <given-names>JG</given-names>
            </name>
          </person-group>
          <source>The Uses of Mass Communications: Current Perspectives on Gratifications Research</source>
          <year>1974</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref176">
        <label>176</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Katz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Blumler</surname>
              <given-names>JG</given-names>
            </name>
            <name name-style="western">
              <surname>Gurevitch</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Uses and gratifications research</article-title>
          <source>Public Opin Q</source>
          <year>1973</year>
          <volume>37</volume>
          <issue>4</issue>
          <fpage>509</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1086/268109</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref177">
        <label>177</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McLean</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Osei-Frimpong</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Hey Alexa … examine the variables influencing the use of artificial intelligent in-home voice assistants</article-title>
          <source>Comput Human Behav</source>
          <year>2019</year>
          <month>10</month>
          <volume>99</volume>
          <fpage>28</fpage>
          <lpage>37</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2019.05.009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref178">
        <label>178</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rauschnabel</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ro</surname>
              <given-names>YK</given-names>
            </name>
          </person-group>
          <article-title>Antecedents to the adoption of augmented reality smart glasses: a closer look at privacy risks</article-title>
          <source>J Bus Res</source>
          <year>2018</year>
          <month>11</month>
          <volume>92</volume>
          <fpage>374</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2018.08.008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref179">
        <label>179</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gray</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Gray</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Wegner</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Dimensions of mind perception</article-title>
          <source>Science</source>
          <year>2007</year>
          <month>02</month>
          <day>02</day>
          <volume>315</volume>
          <issue>5812</issue>
          <fpage>619</fpage>
          <pub-id pub-id-type="doi">10.1126/science.1134475</pub-id>
          <pub-id pub-id-type="medline">17272713</pub-id>
          <pub-id pub-id-type="pii">315/5812/619</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref180">
        <label>180</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Häubl</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Keinan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Aspects of endowment: a query theory of value construction</article-title>
          <source>J Exp Psychol Learn Mem Cogn</source>
          <year>2007</year>
          <month>05</month>
          <volume>33</volume>
          <issue>3</issue>
          <fpage>461</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.1037/0278-7393.33.3.461</pub-id>
          <pub-id pub-id-type="medline">17470000</pub-id>
          <pub-id pub-id-type="pii">2007-06096-001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref181">
        <label>181</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Willemsen</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Knijnenburg</surname>
              <given-names>BP</given-names>
            </name>
          </person-group>
          <article-title>Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing</article-title>
          <source>Comput Secur</source>
          <year>2020</year>
          <month>10</month>
          <volume>97</volume>
          <fpage>101924</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2020.101924</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref182">
        <label>182</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>EM</given-names>
            </name>
          </person-group>
          <source>Diffusion of Innovations. 5th Edition</source>
          <year>1962</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Free Press of Glencoe</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref183">
        <label>183</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Singhal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Quinlan</surname>
              <given-names>MM</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Stacks</surname>
              <given-names>DW</given-names>
            </name>
            <name name-style="western">
              <surname>Salwen</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Eichhorn</surname>
              <given-names>KC</given-names>
            </name>
          </person-group>
          <article-title>Diffusion of innovations</article-title>
          <source>An Integrated Approach to Communication Theory and Research</source>
          <year>2014</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Routledge</publisher-name>
          <fpage>432</fpage>
          <lpage>48</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref184">
        <label>184</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harsanyi</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>Games with incomplete information played by “Bayesian” players, I–III part I: the basic model</article-title>
          <source>Manag Sci</source>
          <year>1967</year>
          <month>11</month>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>159</fpage>
          <lpage>82</lpage>
          <pub-id pub-id-type="doi">10.1287/mnsc.14.3.159</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref185">
        <label>185</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Simon</surname>
              <given-names>HA</given-names>
            </name>
          </person-group>
          <source>Models of Bounded Rationality: Empirically Grounded Economic Reason</source>
          <year>1982</year>
          <publisher-loc>Boston, MA</publisher-loc>
          <publisher-name>MIT Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref186">
        <label>186</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tamó-Larrieux</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The robot privacy paradox: understanding how privacy concerns shape intentions to use social robots</article-title>
          <source>Hum Mach Commun</source>
          <year>2020</year>
          <month>2</month>
          <day>1</day>
          <volume>1</volume>
          <fpage>87</fpage>
          <lpage>111</lpage>
          <pub-id pub-id-type="doi">10.30658/hmc.1.6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref187">
        <label>187</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chaparro Osman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nakushian</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rebensky</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Prior</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Carroll</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>User experience, knowledge, perceptions, and behaviors associated with internet of things (IoT) device information privacy</article-title>
          <source>Proceedings of the HCI for Cybersecurity, Privacy and Trust: 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference</source>
          <year>2022</year>
          <conf-name>HCII '22</conf-name>
          <conf-date>June 26-July 1, 2022</conf-date>
          <conf-loc>Virtual Event</conf-loc>
          <fpage>107</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1007/978-3-031-05563-8_8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-031-05563-8_8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref188">
        <label>188</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jaspers</surname>
              <given-names>ED</given-names>
            </name>
            <name name-style="western">
              <surname>Pearson</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Consumers’ acceptance of domestic internet-of-things: the role of trust and privacy concerns</article-title>
          <source>J Bus Res</source>
          <year>2022</year>
          <month>03</month>
          <volume>142</volume>
          <fpage>255</fpage>
          <lpage>65</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2021.12.043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref189">
        <label>189</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Arpnikanondt</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Razzaque</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Personal information disclosure via voice assistants: the personalization–privacy paradox</article-title>
          <source>SN Comput Sci</source>
          <year>2020</year>
          <month>08</month>
          <day>25</day>
          <volume>1</volume>
          <issue>5</issue>
          <fpage>280</fpage>
          <pub-id pub-id-type="doi">10.1007/S42979-020-00287-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref190">
        <label>190</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Menard</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bott</surname>
              <given-names>GJ</given-names>
            </name>
          </person-group>
          <article-title>Analyzing IOT users’ mobile device privacy concerns: extracting privacy permissions using a disclosure experiment</article-title>
          <source>Compute Soc</source>
          <year>2020</year>
          <month>08</month>
          <volume>95</volume>
          <fpage>101856</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2020.101856</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref191">
        <label>191</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bandara</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Fernando</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Akter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox in the data-driven marketplace: the role of knowledge deficiency and psychological distance</article-title>
          <source>Procedia Comput Sci</source>
          <year>2017</year>
          <volume>121</volume>
          <fpage>562</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2017.11.074</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref192">
        <label>192</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barth</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Junger</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hartel</surname>
              <given-names>PH</given-names>
            </name>
            <name name-style="western">
              <surname>Roppelt</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>Putting the privacy paradox to the test: online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources</article-title>
          <source>Telemat Inform</source>
          <year>2019</year>
          <month>08</month>
          <volume>41</volume>
          <fpage>55</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2019.03.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref193">
        <label>193</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Anto</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Basu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Selim</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Foscht</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Open-world games' affordance of cognitive escapism, relaxation, and mental well-being among postgraduate students: mixed methods study</article-title>
          <source>J Med Internet Res</source>
          <year>2024</year>
          <month>12</month>
          <day>17</day>
          <volume>26</volume>
          <fpage>e63760</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2024//e63760/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/63760</pub-id>
          <pub-id pub-id-type="medline">39689301</pub-id>
          <pub-id pub-id-type="pii">v26i1e63760</pub-id>
          <pub-id pub-id-type="pmcid">PMC11688598</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref194">
        <label>194</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Duffek</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Merlo</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Why so toxic? A framework for exploring customer toxicity</article-title>
          <source>AMS Rev</source>
          <year>2023</year>
          <month>06</month>
          <day>01</day>
          <volume>13</volume>
          <issue>1-2</issue>
          <fpage>122</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1007/S13162-023-00257-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref195">
        <label>195</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hartnup</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Dong</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>How an environment of stress and social risk shapes student engagement with social media as potential digital learning platforms: qualitative study</article-title>
          <source>JMIR Med Educ</source>
          <year>2018</year>
          <month>07</month>
          <day>13</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>e10069</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mededu.jmir.org/2018/2/e10069/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10069</pub-id>
          <pub-id pub-id-type="medline">30006324</pub-id>
          <pub-id pub-id-type="pii">v4i2e10069</pub-id>
          <pub-id pub-id-type="pmcid">PMC6064037</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref196">
        <label>196</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heinberg</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>A bad job of doing good: does corporate transparency on a country and company level moderate corporate social responsibility effectiveness?</article-title>
          <source>J Int Mark</source>
          <year>2021</year>
          <month>03</month>
          <day>08</day>
          <volume>29</volume>
          <issue>2</issue>
          <fpage>45</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1177/1069031X20981870</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref197">
        <label>197</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>LR</given-names>
            </name>
          </person-group>
          <article-title>Data ownership in the AI-powered integrative health care landscape</article-title>
          <source>JMIR Med Inform</source>
          <year>2024</year>
          <month>11</month>
          <day>19</day>
          <volume>12</volume>
          <fpage>e57754</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2024//e57754/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/57754</pub-id>
          <pub-id pub-id-type="medline">39560980</pub-id>
          <pub-id pub-id-type="pii">v12i1e57754</pub-id>
          <pub-id pub-id-type="pmcid">PMC11615554</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref198">
        <label>198</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Merlo</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Shin</surname>
              <given-names>HK</given-names>
            </name>
            <name name-style="western">
              <surname>Britton</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Avoiding the pitfalls of customer participation</article-title>
          <source>MIT Sloan Manag Rev</source>
          <year>2019</year>
          <volume>1</volume>
          <fpage>61</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://sloanreview.mit.edu/article/avoiding-the-pitfalls-of-customer-participation/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref199">
        <label>199</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Selim</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Basu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anto</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Foscht</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Effects of large language model-based offerings on the well-being of students: qualitative study</article-title>
          <source>JMIR Form Res</source>
          <year>2024</year>
          <month>12</month>
          <day>27</day>
          <volume>8</volume>
          <fpage>e64081</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://formative.jmir.org/2024//e64081/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/64081</pub-id>
          <pub-id pub-id-type="medline">39729617</pub-id>
          <pub-id pub-id-type="pii">v8i1e64081</pub-id>
          <pub-id pub-id-type="pmcid">PMC11724218</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref200">
        <label>200</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Foscht</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kerschbaumer</surname>
              <given-names>RH</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>“Pulling back the curtain”: company tours as a customer education tool and effects on pro‐brand behaviors</article-title>
          <source>J Consum Behav</source>
          <year>2022</year>
          <month>07</month>
          <day>17</day>
          <volume>21</volume>
          <issue>6</issue>
          <fpage>1307</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1002/cb.2088</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref201">
        <label>201</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Foscht</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Cui</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Schloffer</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Why do customers want to learn? Antecedents and outcomes of customer learning</article-title>
          <source>Eur J Mark</source>
          <year>2022</year>
          <month>03</month>
          <day>14</day>
          <volume>56</volume>
          <issue>3</issue>
          <fpage>677</fpage>
          <lpage>703</lpage>
          <pub-id pub-id-type="doi">10.1108/ejm-04-2020-0302</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref202">
        <label>202</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tudor-Sfetea</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Rabee</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Najim</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Amin</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chadha</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Karia</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kothari</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Suseeharan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sherwani</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Siddiqui</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Eisingerich</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of two mobile health apps in the context of smoking cessation: qualitative study of cognitive behavioral therapy (CBT) versus non-CBT-based digital solutions</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>04</month>
          <day>18</day>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>e98</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/4/e98/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9405</pub-id>
          <pub-id pub-id-type="medline">29669708</pub-id>
          <pub-id pub-id-type="pii">v6i4e98</pub-id>
          <pub-id pub-id-type="pmcid">PMC5932330</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref203">
        <label>203</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rollwage</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Habicht</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Juechems</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Carrington</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Viswanathan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Stylianou</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hauser</surname>
              <given-names>TU</given-names>
            </name>
            <name name-style="western">
              <surname>Harper</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Using conversational AI to facilitate mental health assessments and improve clinical efficiency within psychotherapy services: real-world observational study</article-title>
          <source>JMIR AI</source>
          <year>2023</year>
          <month>12</month>
          <day>13</day>
          <volume>2</volume>
          <fpage>e44358</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ai.jmir.org/2023//e44358/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/44358</pub-id>
          <pub-id pub-id-type="medline">38875569</pub-id>
          <pub-id pub-id-type="pii">v2i1e44358</pub-id>
          <pub-id pub-id-type="pmcid">PMC11041479</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref204">
        <label>204</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Iyengar</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Lepper</surname>
              <given-names>MR</given-names>
            </name>
          </person-group>
          <article-title>When choice is demotivating: can one desire too much of a good thing?</article-title>
          <source>J Pers Soc Psychol</source>
          <year>2000</year>
          <month>12</month>
          <volume>79</volume>
          <issue>6</issue>
          <fpage>995</fpage>
          <lpage>1006</lpage>
          <pub-id pub-id-type="doi">10.1037//0022-3514.79.6.995</pub-id>
          <pub-id pub-id-type="medline">11138768</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref205">
        <label>205</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>RH</given-names>
            </name>
            <name name-style="western">
              <surname>Benartzi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Save More Tomorrow™: using behavioral economics to increase employee saving</article-title>
          <source>J Posit Econ</source>
          <year>2004</year>
          <month>02</month>
          <volume>112</volume>
          <issue>S1</issue>
          <fpage>S164</fpage>
          <lpage>87</lpage>
          <pub-id pub-id-type="doi">10.1086/380085</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref206">
        <label>206</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lobschat</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Mueller</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Eggers</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Brandimarte</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Diefenbach</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kroschke</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wirtz</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Corporate digital responsibility</article-title>
          <source>J Bus Res</source>
          <year>2021</year>
          <month>01</month>
          <volume>122</volume>
          <fpage>875</fpage>
          <lpage>88</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2019.10.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref207">
        <label>207</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saeidi</surname>
              <given-names>SP</given-names>
            </name>
            <name name-style="western">
              <surname>Sofian</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Saeidi</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Saeidi</surname>
              <given-names>SP</given-names>
            </name>
            <name name-style="western">
              <surname>Saaeidi</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>How does corporate social responsibility contribute to firm financial performance? The mediating role of competitive advantage, reputation, and customer satisfaction</article-title>
          <source>J Bus Res</source>
          <year>2015</year>
          <month>02</month>
          <volume>68</volume>
          <issue>2</issue>
          <fpage>341</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2014.06.024</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
