Ackerman M (2004) Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Computing 8, 430–439.
Article
Google Scholar
Agarwal R and Karahanna E (2000) Time flies when you're having fun: cognitive absorption and beliefs about information technology usage. MIS Quarterly 24 (4), 665–694.
Article
Google Scholar
Ajzen I (1988) Attitudes, Personality, and Behavior. Open University Press, Stony Startford.
Google Scholar
Alavi M and Joachimsthaler EA (1992) Revisiting dss implementation research: a meta analysis of the literature and suggestions for researchers. MIS Quarterly 16 (1), 95–116.
Article
Google Scholar
Armstrong MP and Ruggles AJ (2005) Geographic information technologies and personal privacy. Cartographica 40 (4), 63–73.
Article
Google Scholar
Barrick MR and Mount MK (1991) The big five personality dimensions and job performance: a meta-analysis. Personnel Psychology 44, 1–26.
Article
Google Scholar
Barrick MR, Mount MK and Judge TA (2001) Personality and performance at the beginning of the new millennium: what do we know and where do we go next?. International Journal of Selection and Assessment 9, 9–30.
Article
Google Scholar
Beinat E (2001) Privacy and location-based: stating the policies clearly. GeoInformatics 4 (September), 14–17.
Google Scholar
Benbasat I and Dexter AS (1982) Individual differences in the use of decision support aids. Journal of Accounting Research 20 (1), 1–11.
Article
Google Scholar
Bergeman CS, Chipuer HM, Plomin R, Pedersen NL, McClearn GE, Nesselroade JR, Costa PT and McCrae RR (1993) Genetic and environmental effects on openness to experience, agreeableness, and conscientiousness: an adoption/twin study. Journal of Personality 61 (2), 159–179.
Article
Google Scholar
Bermudez J (1999) Personality and health-protective behaviour. European Journal of Personality 13, 83–103.
Article
Google Scholar
Black P (2006) Thrust to wholeness: the nature of self-protection. Review of General Psychology 10 (3), 191–209.
Article
Google Scholar
Bohn J, Coroama V, Langheinrich M, Mattern F and Rohs M (2004) Living in a world of smart everyday objects – social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment 10 (5), 763–786.
Article
Google Scholar
Boost Mobile Media (2007) Boost mobile and loopt pioneer social mapping for young mobile phone users. Press Release, http://www.loopt.com/loopt/press/boostpressrelease.html (accessed 13 March 2008).
Brown I, Zaheeda C, Davies D and Stroebel S (2003) Cell phone banking: predictors of adoption in south africa – an exploratory study. International Journal of Information Management 23, 381–394.
Article
Google Scholar
Buss DM (Ed.) (2005) The Handbook of Evolutionary Psychology. John Wiley & Sons, Hoboken, NJ.
Google Scholar
Chin W (1998) Issues and opinions on structural equation modeling. MIS Quarterly 22 (1), vii–xvi.
Google Scholar
Chin W and Newsted PR (1999) Structural equation modeling analysis with small samples using partial least squares. In Statistical Strategies for Small Sample Research (HOYLE RH, Ed.), pp 307–322, Sage Publications, Thousand Oaks, CA.
Google Scholar
Costa Jr. PT and McCrae RR (1992) Revised Neo Personality Inventory (neo-pi-r) and Neo Five-Factor Inventory (neo-ffi) Professional Manual. Psychological Assessment Resources, Odessa, FL.
Google Scholar
Costa PT, McCrae RR and Dye DA (1991) Facet scales for agreeableness and conscientiousness: a revision of the neo personality inventory. Personal Individual Differences 12 (9), 887–898.
Article
Google Scholar
Costa PT, McCrae RR and Zonderman AB (1987) Environmental and dispositional influences on well-being: longitudinal follow-up of an american national sample. British Journal of Psychology 78, 299–306.
Article
Google Scholar
Culnan MJ (1993) ‘How did they get my name?’ An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 (2), 341–363.
Article
Google Scholar
Culnan MJ (2000) Protecting privacy online: is self-regulation working. Journal of Public Policy & Marketing 19 (1), 20–26.
Article
Google Scholar
Culnan MJ and Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 10 (1), 104–115.
Article
Google Scholar
Dinev T, Bellotto M, Hart P, Russo V, Serra I and Colautti C (2006) Privacy calculus model in e-commerce – a study of Italy and the United States. European Journal of Information Systems 15 (4), 389–402.
Article
Google Scholar
Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17 (1), 61–80.
Article
Google Scholar
Eddy ER, Stone DL and Stone-Romero EF (1999) The effects of information management policies on reactions to human resource information systems: an integration of privacy and procedural justice perspectives. Personnel Psychology 52, 335–358.
Article
Google Scholar
Electronic Frontier Foundation (2005) New Case Reveals Routine Abuse of Government Surveillance Powers. Press Release, http://www.eff.org/press/archives/2005/09/26 (accessed 13 March 2008).
Fischer K (2004) Consumers ready for wireless location-based services; 2005 will be a strong year for carrier deployment, InStat, http://www.instat.com/press.asp?ID=1175&sku=IN0401660MCD (accessed 10 October 2006).
Floyd DL, Prentice-Dunn S and Rogers RW (2000) A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology 30 (2), 407–429.
Article
Google Scholar
Fornell C and Larcker DF (1981) Evaluating structural equations models with unobservable variables and measurement error. Journal of Marketing Research 18 (1), 39–50.
Article
Google Scholar
Gaur A and Gaur S (2006) Statistical Methods for Practice and Research: A Guide to Data Analysis Using SPSS. Sage Publications, New Delhi.
Google Scholar
Gefen D, Straub DW and Boudreau M-C (2000) Structural equation modeling and regression: guidelines for research practice. Communications of the Association for Information Systems 4 (7), 1–80.
Google Scholar
Goldberg LR (1990) An alternative ‘description of personality’: the big-five factor structure. Journal of Personality and Social Psychology 59, 1216–1229.
Article
Google Scholar
Gonzalez JJ and Sawicka A (2002) A framework for human factors in information security. In Presented at the WSEAS International Conference on Information Security. Rio de Janeiro, http://ikt.hia.no/josejg/Papers/A%20Framework%20for%20Human%20Factors%20in%20Information%20Security.pdf (accessed 13 March 2008).
Google Scholar
Gosh AK and Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce. Communications of the ACM 44 (2), 51–57.
Article
Google Scholar
Gosling SD, Rentfrow PJ and William BS (2003) A very brief measure of the big-five personality domains. Journal of Research in Personality 37, 504–528.
Article
Google Scholar
Gullone E and Moore S (2000) Adolescent risk-taking and the five-factor model of personality. Journal of Adolescence 23, 393–407.
Article
Google Scholar
Heller D, Judge TA and Watson D (2002) The confounding role of personality and trait affectivity in the relationship between job and life satisfaction. Journal of Organizational Behavior 23, 815–835.
Article
Google Scholar
Herzberg PY and Braehler E (2006) Assessing the big-five personality domains via short forms. European Journal of Psychological Assessment 22 (3), 139–148.
Article
Google Scholar
Hoffman DL, Novak TP and Peralta MA (1999) Information privacy in the marketspace: implications for the commercial uses of anonymity on the web. The Information Society 15, 129–139.
Article
Google Scholar
Jahng JJ, Jain H and Ramamurthy K (2002) Personality traits and effectiveness of presentation of product information in e-business systems. European Journal of Information Systems 11, 181–195.
Article
Google Scholar
Judge TA, Heller D and Mount MK (2002) Five-factor model of personality and job satisfaction: a meta-analysis. Journal of Applied Psychology 87, 530–541.
Article
Google Scholar
Katz YJ (1992) Toward a personality profile of successful computer-using teacher. Educational Technology 32, 39–40.
Google Scholar
Kelvin P (1973) A social-psychological examination of privacy. British Journal of Social Clinical Psychology 12, 248–261.
Article
Google Scholar
Laufer RS and Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional development theory. Journal of Social Issues 33 (3), 22–42.
Article
Google Scholar
Lauriola M and Levin IP (2001) Personality traits and risky decision-making in a controlled experimental task: an exploratory study. Personality and Individual Differences 31, 215–226.
Article
Google Scholar
Lederer S, Hong JI, Dey AK and Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Computing 8, 440–454.
Article
Google Scholar
Levin HA and Askin F (1977) Privacy in the courts: law and social reality. Journal of Social Issues 33 (3), 138–153.
Article
Google Scholar
Lu HP, Yu HJ and Lu SSK (2001) The effects of cognitive style and model type on dss acceptance: an empirical study. European Journal of Operational Research 131 (3), 649–663.
Article
Google Scholar
Lucas HC (1978) Empirical evidence for a descriptive model of implementation. MIS Quarterly 2 (2), 27–41.
Article
Google Scholar
Lyytinen K, Yoo Y, Varshney U, Ackerman MS, Davis G, Avital M, Robey D, Sawyer S and Sørensen C (2004) Surfing the next wave: design and implementation challenges of ubiquitous computing environments. Communications of the AIS 13, 697–716.
Google Scholar
Maddux JE and Rogers RW (1983) Protection motivation theory and self-efficacy: a revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19, 242–253.
Article
Google Scholar
Malhotra NK, Kim SS and Agarwal J (2004) Internet users' information privacy concerns (iuipc): the construct, the scale, and a causal model. Information Systems Research 15 (4), 336–355.
Article
Google Scholar
Mason RO and Mitroff II (1973) A program for research on management information systems. Management Science 19 (5), 475–487.
Article
Google Scholar
McCrae RR and Costa P (1999) A five factor theory of personality. In Handbook of Personality: Theory and Research (PERVIN L, Ed), pp 139–153, Guilford, New York.
Google Scholar
McCrae RR and Costa PT (1987) Validation of the five-factor model of personality across instruments and observers. Journal of Personality & Social Psychology 52, 81–90.
Article
Google Scholar
McCrae RR and Costa PT (1991) Adding liebe and arbeit: the full five-factor model and well-being. Personality and Social Psychology Bulletin 17 (2), 227–232.
Article
Google Scholar
McCrae RR, Costa PT, Hrebickova M, Urbanek T, Martin TA, Oryol VE, Rukavishnikov AA and Senin IG (2004) Age differences in personality traits across cultures: self-report and observer perspectives. European Journal of Personality 18, 143–157.
Article
Google Scholar
Milne S, Sheeran P and Orbell S (2000) Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 (1), 106–143.
Article
Google Scholar
Mount MK, Barrick MR, Scullen SM and Rounds J (2005) Higher-order dimensions of the big five personality traits and the big six vocational interest types. Personnel Psychology 58, 447–478.
Article
Google Scholar
Mount MK, Barrick MR and Stewart GL (1998) Five-factor model of personality and performance in jobs involving interpersonal interactions. Human Performance 11 (2/2), 145–165.
Article
Google Scholar
Muck PM, Hell B and Gosling SD (2007) Construct validation of a short five-factor model instrument: a self-peer study on german adaptation of the ten-item personality inventory (tipi-g). European Journal of Psychological Assessment 23 (3), 166–175.
Article
Google Scholar
Myers MD and Miller L (1996) Ethical dilemmas in the use of information technology: an aristotelian perspective. Ethics & Behavior 6 (2), 153–160.
Article
Google Scholar
Nagy MS (2002) Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology 75, 77–86.
Article
Google Scholar
Nunnally J (1978) Psychometric Theory. McGraw-Hill, New York.
Google Scholar
Okazaki S (2006) What do we know about mobile internet adopters? A cluster analysis. Information & Management 43, 127–141.
Article
Google Scholar
Pechmann C, Zhao G, Goldberg ME and Reibling ET (1993) What to convey in antismoking advertisements for adolescents: the use of protection motivation theory to identify effective message themes. Journal of Marketing 67 (April), 1–18.
Google Scholar
Pedersen DM (1987) Relationship of personality to privacy preferences. Journal of Social Behavior and Personality 2 (2), 267–274.
Google Scholar
Pedersen DM (1996) A factorial comparison of privacy questionnaires. Social Behavior and Personality 24 (3), 249–262.
Article
Google Scholar
Porus J and Ellis M (2007) Location-based services and presence technology: the future of telecommunications is closer than you think. Harris Interactive, The Harris Report, http://www.harrisinteractive.com/news/newsletters/HarrisReport/HI_TheHarrisReport_2007_v02_i01.pdf (accessed 13 March 2008).
Rammstedt B (2007) The 10-item big five inventory: norm values and investigation of sociodemographic effects based in a German population representative sample. European Journal of Psychological Assessment 23 (3), 193–201.
Article
Google Scholar
Redknee (2006) Redknee protects wireless subscribers' privacy concerns with industry first solution: personalization allows users to decide which wireless services, applications and users can access their personal data. Redknee. http://www.redknee.com/news_events/news_releases/archive_2006/156/?PHPSESSID=d99270ce1b41ea4c39b1ec7eab2e6f95 (accessed 10 October 2006).
Rodden T, Friday A, Muller H and Dix A (2002) A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol.
Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91, 93–114.
Article
Google Scholar
Rogers RW (Ed.) (1983) Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. Plenum, New York, NY.
Google Scholar
Saldago JF (2002) The big five personality dimensions and counterproductive behaviors. International Journal of Selection and Assessment 10 (1/2), 117–125.
Google Scholar
Saldago JF, Moscoso S and Lado M (2003) Evidence of cross-cultural invariance of the big five personality dimensions in work settings. European Journal of Personality 17, 67–76.
Article
Google Scholar
Senecal D (2008) Demographics matter to mobile banking strategies. CreditUnions.com.
Sheehan K (2002) Toward a typology of internet users and online privacy concerns. The Information Society 18, 21–32.
Article
Google Scholar
Siau K and Shen Z (2003) Building customer trust in mobile commerce. Communications of the ACM 46 (4), 91–94.
Article
Google Scholar
Smith HJ, Milberg SJ and Burke SJ (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 20 (2), 167–196.
Article
Google Scholar
Soldz S and Vaillant GE (1999) The big five personality traits and the life course: a 45-year longitudinal study. Journal of Research in Personality 33, 208–232.
Article
Google Scholar
Spector PE, Zapf D, Chen PY and Frese M (2000) Why negative affectivity should not be controlled in job stress research: don't throw out the baby with the bath water. Journal of Organizational Behavior 21, 79–95.
Article
Google Scholar
Stewart KA and Segars AH (2002) An empirical examination of the concern for information privacy instrument. Information Systems Research 13 (1), 36–49.
Article
Google Scholar
Stone DL (1986) Relationship between introversion/extraversion, values regarding control over information, and perceptions of invasion of privacy. Perceptual and Motor Skills 62, 371–376.
Article
Google Scholar
Taylor WA (2004) Computer-mediated knowledge sharing and individual user differences: an exploratory study. European Journal of Information Systems 13, 52–64.
Article
Google Scholar
Tett RP and Burnett DD (2003) A personality trait-based interactionist model of job performance. Journal of Applied Psychology 88 (3), 500–517.
Article
Google Scholar
Valacich JS (2003) Case Western Workshop on Ubiquitous Computing Environments, October 24–26, 2003, Weatherhead School of Management, Case Western Reserve University, Cleveland, OH, USA, http://weatherhead.case.edu/pervasive/Paper/UBE%202003%20-%20Valacich.pdf (accessed 13 March 2008).
Van Slyke C, Shim JT, Johnson R and Jiang J (2006) Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems 7 (6), 415–444.
Google Scholar
Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research 11 (4), 342–365.
Article
Google Scholar
Venkatesh V, Morris MG and Ackerman PL (2000) A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organizational Behavior and Human Decision Processes 83 (1), 33–60.
Article
Google Scholar
Wallace B (2006) 30 countries passed 100% mobile phone penetration in q1. Telecommunications Online, http://www.telecommagazine.com/newsglobe/article.asp?HH_ID=AR_2148 (accessed 20 March 2007).
Warren S and Brandeis L (1890) The right to privacy. Harvard Law Review 4 (5), 193.
Article
Google Scholar
Waxer C (2006) Satellite Plumbing. Fortune Small Business, http://money.cnn.com/magazines/fsb/fsb_archive/2006/02/01/8368208/index.htm (accessed 13 March 2008).
Weinstein N (1993) Testing four competing theories of health-protective behavior. Health Psychology 12 (4), 324–333.
Article
Google Scholar
Westin A (2003) Social and political dimensions of privacy. Journal of Social Issues 59 (2), 431–453.
Article
Google Scholar
Woods SA and Hampson SE (2005) Measuring the big five with single item using a bipolar response scale. European Journal of Personality 19, 373–390.
Article
Google Scholar
Xu H and Teo H-H (2004) Alleviating consumers' privacy concerns in location-based services: a psychological control perspective. In Proceedings of the 25th International Conference on Information Systems. Washington, DC, http://www.ais.bepress.com/icis2004/64 (accessed 13 March 2008).
Google Scholar
Xu H, Teo H-H and Tan BCY (2005) Predicting the adoption of location-based services: the role of trust and perceived privacy risk. In Proceedings of the 26th International Conference on Information Systems. Las Vegas, NV, http://www.ais.bepress.com/icis2005/71 (accessed 13 March 2008).
Google Scholar
Zhao G and Pechmann C (2007) The impact of regulatory focus on adolescents' response to antismoking advertising campaigns. Journal of Marketing Research 44 (November), 671–687.
Article
Google Scholar
Zmud RW (1979) Individual differences and MIS success: a review of the empirical literature. Management Science 25 (10), 966–979.
Article
Google Scholar