Ackerman M (2004) Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Computing 8, 430–439.
Agarwal R and Karahanna E (2000) Time flies when you're having fun: cognitive absorption and beliefs about information technology usage. MIS Quarterly 24 (4), 665–694.
Ajzen I (1988) Attitudes, Personality, and Behavior. Open University Press, Stony Startford.
Alavi M and Joachimsthaler EA (1992) Revisiting dss implementation research: a meta analysis of the literature and suggestions for researchers. MIS Quarterly 16 (1), 95–116.
Armstrong MP and Ruggles AJ (2005) Geographic information technologies and personal privacy. Cartographica 40 (4), 63–73.
Barrick MR and Mount MK (1991) The big five personality dimensions and job performance: a meta-analysis. Personnel Psychology 44, 1–26.
Barrick MR, Mount MK and Judge TA (2001) Personality and performance at the beginning of the new millennium: what do we know and where do we go next?. International Journal of Selection and Assessment 9, 9–30.
Beinat E (2001) Privacy and location-based: stating the policies clearly. GeoInformatics 4 (September), 14–17.
Benbasat I and Dexter AS (1982) Individual differences in the use of decision support aids. Journal of Accounting Research 20 (1), 1–11.
Bergeman CS, Chipuer HM, Plomin R, Pedersen NL, McClearn GE, Nesselroade JR, Costa PT and McCrae RR (1993) Genetic and environmental effects on openness to experience, agreeableness, and conscientiousness: an adoption/twin study. Journal of Personality 61 (2), 159–179.
Bermudez J (1999) Personality and health-protective behaviour. European Journal of Personality 13, 83–103.
Black P (2006) Thrust to wholeness: the nature of self-protection. Review of General Psychology 10 (3), 191–209.
Bohn J, Coroama V, Langheinrich M, Mattern F and Rohs M (2004) Living in a world of smart everyday objects – social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment 10 (5), 763–786.
Boost Mobile Media (2007) Boost mobile and loopt pioneer social mapping for young mobile phone users. Press Release, http://www.loopt.com/loopt/press/boostpressrelease.html (accessed 13 March 2008).
Brown I, Zaheeda C, Davies D and Stroebel S (2003) Cell phone banking: predictors of adoption in south africa – an exploratory study. International Journal of Information Management 23, 381–394.
Buss DM (Ed.) (2005) The Handbook of Evolutionary Psychology. John Wiley & Sons, Hoboken, NJ.
Chin W (1998) Issues and opinions on structural equation modeling. MIS Quarterly 22 (1), vii–xvi.
Chin W and Newsted PR (1999) Structural equation modeling analysis with small samples using partial least squares. In Statistical Strategies for Small Sample Research (HOYLE RH, Ed.), pp 307–322, Sage Publications, Thousand Oaks, CA.
Costa Jr. PT and McCrae RR (1992) Revised Neo Personality Inventory (neo-pi-r) and Neo Five-Factor Inventory (neo-ffi) Professional Manual. Psychological Assessment Resources, Odessa, FL.
Costa PT, McCrae RR and Dye DA (1991) Facet scales for agreeableness and conscientiousness: a revision of the neo personality inventory. Personal Individual Differences 12 (9), 887–898.
Costa PT, McCrae RR and Zonderman AB (1987) Environmental and dispositional influences on well-being: longitudinal follow-up of an american national sample. British Journal of Psychology 78, 299–306.
Culnan MJ (1993) ‘How did they get my name?’ An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 (2), 341–363.
Culnan MJ (2000) Protecting privacy online: is self-regulation working. Journal of Public Policy & Marketing 19 (1), 20–26.
Culnan MJ and Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 10 (1), 104–115.
Dinev T, Bellotto M, Hart P, Russo V, Serra I and Colautti C (2006) Privacy calculus model in e-commerce – a study of Italy and the United States. European Journal of Information Systems 15 (4), 389–402.
Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17 (1), 61–80.
Eddy ER, Stone DL and Stone-Romero EF (1999) The effects of information management policies on reactions to human resource information systems: an integration of privacy and procedural justice perspectives. Personnel Psychology 52, 335–358.
Electronic Frontier Foundation (2005) New Case Reveals Routine Abuse of Government Surveillance Powers. Press Release, http://www.eff.org/press/archives/2005/09/26 (accessed 13 March 2008).
Fischer K (2004) Consumers ready for wireless location-based services; 2005 will be a strong year for carrier deployment, InStat, http://www.instat.com/press.asp?ID=1175&sku=IN0401660MCD (accessed 10 October 2006).
Floyd DL, Prentice-Dunn S and Rogers RW (2000) A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology 30 (2), 407–429.
Fornell C and Larcker DF (1981) Evaluating structural equations models with unobservable variables and measurement error. Journal of Marketing Research 18 (1), 39–50.
Gaur A and Gaur S (2006) Statistical Methods for Practice and Research: A Guide to Data Analysis Using SPSS. Sage Publications, New Delhi.
Gefen D, Straub DW and Boudreau M-C (2000) Structural equation modeling and regression: guidelines for research practice. Communications of the Association for Information Systems 4 (7), 1–80.
Goldberg LR (1990) An alternative ‘description of personality’: the big-five factor structure. Journal of Personality and Social Psychology 59, 1216–1229.
Gonzalez JJ and Sawicka A (2002) A framework for human factors in information security. In Presented at the WSEAS International Conference on Information Security. Rio de Janeiro, http://ikt.hia.no/josejg/Papers/A%20Framework%20for%20Human%20Factors%20in%20Information%20Security.pdf (accessed 13 March 2008).
Gosh AK and Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce. Communications of the ACM 44 (2), 51–57.
Gosling SD, Rentfrow PJ and William BS (2003) A very brief measure of the big-five personality domains. Journal of Research in Personality 37, 504–528.
Gullone E and Moore S (2000) Adolescent risk-taking and the five-factor model of personality. Journal of Adolescence 23, 393–407.
Heller D, Judge TA and Watson D (2002) The confounding role of personality and trait affectivity in the relationship between job and life satisfaction. Journal of Organizational Behavior 23, 815–835.
Herzberg PY and Braehler E (2006) Assessing the big-five personality domains via short forms. European Journal of Psychological Assessment 22 (3), 139–148.
Hoffman DL, Novak TP and Peralta MA (1999) Information privacy in the marketspace: implications for the commercial uses of anonymity on the web. The Information Society 15, 129–139.
Jahng JJ, Jain H and Ramamurthy K (2002) Personality traits and effectiveness of presentation of product information in e-business systems. European Journal of Information Systems 11, 181–195.
Judge TA, Heller D and Mount MK (2002) Five-factor model of personality and job satisfaction: a meta-analysis. Journal of Applied Psychology 87, 530–541.
Katz YJ (1992) Toward a personality profile of successful computer-using teacher. Educational Technology 32, 39–40.
Kelvin P (1973) A social-psychological examination of privacy. British Journal of Social Clinical Psychology 12, 248–261.
Laufer RS and Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional development theory. Journal of Social Issues 33 (3), 22–42.
Lauriola M and Levin IP (2001) Personality traits and risky decision-making in a controlled experimental task: an exploratory study. Personality and Individual Differences 31, 215–226.
Lederer S, Hong JI, Dey AK and Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Computing 8, 440–454.
Levin HA and Askin F (1977) Privacy in the courts: law and social reality. Journal of Social Issues 33 (3), 138–153.
Lu HP, Yu HJ and Lu SSK (2001) The effects of cognitive style and model type on dss acceptance: an empirical study. European Journal of Operational Research 131 (3), 649–663.
Lucas HC (1978) Empirical evidence for a descriptive model of implementation. MIS Quarterly 2 (2), 27–41.
Lyytinen K, Yoo Y, Varshney U, Ackerman MS, Davis G, Avital M, Robey D, Sawyer S and Sørensen C (2004) Surfing the next wave: design and implementation challenges of ubiquitous computing environments. Communications of the AIS 13, 697–716.
Maddux JE and Rogers RW (1983) Protection motivation theory and self-efficacy: a revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19, 242–253.
Malhotra NK, Kim SS and Agarwal J (2004) Internet users' information privacy concerns (iuipc): the construct, the scale, and a causal model. Information Systems Research 15 (4), 336–355.
Mason RO and Mitroff II (1973) A program for research on management information systems. Management Science 19 (5), 475–487.
McCrae RR and Costa P (1999) A five factor theory of personality. In Handbook of Personality: Theory and Research (PERVIN L, Ed), pp 139–153, Guilford, New York.
McCrae RR and Costa PT (1987) Validation of the five-factor model of personality across instruments and observers. Journal of Personality & Social Psychology 52, 81–90.
McCrae RR and Costa PT (1991) Adding liebe and arbeit: the full five-factor model and well-being. Personality and Social Psychology Bulletin 17 (2), 227–232.
McCrae RR, Costa PT, Hrebickova M, Urbanek T, Martin TA, Oryol VE, Rukavishnikov AA and Senin IG (2004) Age differences in personality traits across cultures: self-report and observer perspectives. European Journal of Personality 18, 143–157.
Milne S, Sheeran P and Orbell S (2000) Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 (1), 106–143.
Mount MK, Barrick MR, Scullen SM and Rounds J (2005) Higher-order dimensions of the big five personality traits and the big six vocational interest types. Personnel Psychology 58, 447–478.
Mount MK, Barrick MR and Stewart GL (1998) Five-factor model of personality and performance in jobs involving interpersonal interactions. Human Performance 11 (2/2), 145–165.
Muck PM, Hell B and Gosling SD (2007) Construct validation of a short five-factor model instrument: a self-peer study on german adaptation of the ten-item personality inventory (tipi-g). European Journal of Psychological Assessment 23 (3), 166–175.
Myers MD and Miller L (1996) Ethical dilemmas in the use of information technology: an aristotelian perspective. Ethics & Behavior 6 (2), 153–160.
Nagy MS (2002) Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology 75, 77–86.
Nunnally J (1978) Psychometric Theory. McGraw-Hill, New York.
Okazaki S (2006) What do we know about mobile internet adopters? A cluster analysis. Information & Management 43, 127–141.
Pechmann C, Zhao G, Goldberg ME and Reibling ET (1993) What to convey in antismoking advertisements for adolescents: the use of protection motivation theory to identify effective message themes. Journal of Marketing 67 (April), 1–18.
Pedersen DM (1987) Relationship of personality to privacy preferences. Journal of Social Behavior and Personality 2 (2), 267–274.
Pedersen DM (1996) A factorial comparison of privacy questionnaires. Social Behavior and Personality 24 (3), 249–262.
Porus J and Ellis M (2007) Location-based services and presence technology: the future of telecommunications is closer than you think. Harris Interactive, The Harris Report, http://www.harrisinteractive.com/news/newsletters/HarrisReport/HI_TheHarrisReport_2007_v02_i01.pdf (accessed 13 March 2008).
Rammstedt B (2007) The 10-item big five inventory: norm values and investigation of sociodemographic effects based in a German population representative sample. European Journal of Psychological Assessment 23 (3), 193–201.
Redknee (2006) Redknee protects wireless subscribers' privacy concerns with industry first solution: personalization allows users to decide which wireless services, applications and users can access their personal data. Redknee. http://www.redknee.com/news_events/news_releases/archive_2006/156/?PHPSESSID=d99270ce1b41ea4c39b1ec7eab2e6f95 (accessed 10 October 2006).
Rodden T, Friday A, Muller H and Dix A (2002) A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol.
Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91, 93–114.
Rogers RW (Ed.) (1983) Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. Plenum, New York, NY.
Saldago JF (2002) The big five personality dimensions and counterproductive behaviors. International Journal of Selection and Assessment 10 (1/2), 117–125.
Saldago JF, Moscoso S and Lado M (2003) Evidence of cross-cultural invariance of the big five personality dimensions in work settings. European Journal of Personality 17, 67–76.
Senecal D (2008) Demographics matter to mobile banking strategies. CreditUnions.com.
Sheehan K (2002) Toward a typology of internet users and online privacy concerns. The Information Society 18, 21–32.
Siau K and Shen Z (2003) Building customer trust in mobile commerce. Communications of the ACM 46 (4), 91–94.
Smith HJ, Milberg SJ and Burke SJ (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 20 (2), 167–196.
Soldz S and Vaillant GE (1999) The big five personality traits and the life course: a 45-year longitudinal study. Journal of Research in Personality 33, 208–232.
Spector PE, Zapf D, Chen PY and Frese M (2000) Why negative affectivity should not be controlled in job stress research: don't throw out the baby with the bath water. Journal of Organizational Behavior 21, 79–95.
Stewart KA and Segars AH (2002) An empirical examination of the concern for information privacy instrument. Information Systems Research 13 (1), 36–49.
Stone DL (1986) Relationship between introversion/extraversion, values regarding control over information, and perceptions of invasion of privacy. Perceptual and Motor Skills 62, 371–376.
Taylor WA (2004) Computer-mediated knowledge sharing and individual user differences: an exploratory study. European Journal of Information Systems 13, 52–64.
Tett RP and Burnett DD (2003) A personality trait-based interactionist model of job performance. Journal of Applied Psychology 88 (3), 500–517.
Valacich JS (2003) Case Western Workshop on Ubiquitous Computing Environments, October 24–26, 2003, Weatherhead School of Management, Case Western Reserve University, Cleveland, OH, USA, http://weatherhead.case.edu/pervasive/Paper/UBE%202003%20-%20Valacich.pdf (accessed 13 March 2008).
Van Slyke C, Shim JT, Johnson R and Jiang J (2006) Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems 7 (6), 415–444.
Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research 11 (4), 342–365.
Venkatesh V, Morris MG and Ackerman PL (2000) A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organizational Behavior and Human Decision Processes 83 (1), 33–60.
Wallace B (2006) 30 countries passed 100% mobile phone penetration in q1. Telecommunications Online, http://www.telecommagazine.com/newsglobe/article.asp?HH_ID=AR_2148 (accessed 20 March 2007).
Warren S and Brandeis L (1890) The right to privacy. Harvard Law Review 4 (5), 193.
Waxer C (2006) Satellite Plumbing. Fortune Small Business, http://money.cnn.com/magazines/fsb/fsb_archive/2006/02/01/8368208/index.htm (accessed 13 March 2008).
Weinstein N (1993) Testing four competing theories of health-protective behavior. Health Psychology 12 (4), 324–333.
Westin A (2003) Social and political dimensions of privacy. Journal of Social Issues 59 (2), 431–453.
Woods SA and Hampson SE (2005) Measuring the big five with single item using a bipolar response scale. European Journal of Personality 19, 373–390.
Xu H and Teo H-H (2004) Alleviating consumers' privacy concerns in location-based services: a psychological control perspective. In Proceedings of the 25th International Conference on Information Systems. Washington, DC, http://www.ais.bepress.com/icis2004/64 (accessed 13 March 2008).
Xu H, Teo H-H and Tan BCY (2005) Predicting the adoption of location-based services: the role of trust and perceived privacy risk. In Proceedings of the 26th International Conference on Information Systems. Las Vegas, NV, http://www.ais.bepress.com/icis2005/71 (accessed 13 March 2008).
Zhao G and Pechmann C (2007) The impact of regulatory focus on adolescents' response to antismoking advertising campaigns. Journal of Marketing Research 44 (November), 671–687.
Zmud RW (1979) Individual differences and MIS success: a review of the empirical literature. Management Science 25 (10), 966–979.