774
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Development and Validation of the Need for Privacy Scale (NFP-S)

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514. https://doi.org/10.1126/science.aaa1465
  • Adams, A. A., Murata, K., & Orito, Y. (2009). The Japanese sense of information privacy. AI & Society, 24(4), 327–341. https://doi.org/10.1007/s00146-009-0228-z
  • Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, crowding. Brooks/Cole Publishing Company.
  • Bartol, J., Vehovar, V., & Petrovčič, A. (2021). Should we be concerned about how information privacy concerns are measured in online contexts? A systematic review of survey scale development studies. Informatics, 8(2), 31. https://doi.org/10.3390/informatics8020031
  • Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67(1), 26–53. https://doi.org/10.1111/jcom.12276
  • Benjamin, G. (2017). Privacy as a cultural phenomenon. Journal of Media Critiques, 3(10), 55–74. https://doi.org/10.17349/Jmc117204
  • Bennett, L., & Pangestu, M. (2017). Regional reproductive quests: Cross-border reproductive travel among infertile Indonesian couples. Asia Pacific Viewpoint, 58(2), 162–174. https://doi.org/10.1111/apv.12160
  • Bernatchez, M.‑C., Poirier, C., Morales, E., & Maltais, D. (2017). Rethinking the bathroom for adolescents with cerebral palsy: An exploratory pilot study addressing privacy and independence. Journal of Accessibility & Design for All, 7(2). https://doi.org/10.17411/jacces.v7i2.119
  • Błachnio, A., Przepiorka, A., Boruch, W., & Bałakier, E. (2016). Self-presentation styles, privacy, and loneliness as predictors of Facebook use in young people. Personality and Individual Differences, 94, 26–31. https://doi.org/10.1016/j.paid.2015.12.051
  • Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2018). Exploring motivations for online privacy protection behavior: Insights from panel data. Communication Research, 25(7), 953–977. https://doi.org/10.1177/0093650218800915
  • Bolander, B., & Locher, M. A. (2020). Beyond the online offline distinction: Entry points to digital discourse. Discourse, Context & Media, 35, 100383. https://doi.org/10.1016/j.dcm.2020.100383
  • Bol, N., & Antheunis, M. L. (2022). Skype or skip? Causes and consequences of intimate self-disclosure in computer-mediated doctor-patient communication. Media Psychology, 25(5), 706–723. https://doi.org/10.1080/15213269.2022.2035769
  • Bowman, N. D., & Goodboy, A. K. (2020). Evolving considerations and empirical approaches to construct validity in communication science. Annals of the International Communication Association, 44(3), 219–234. https://doi.org/10.1080/23808985.2020.1792791
  • Brell, T., Biermann, H., Philipsen, R., & Ziefle, M. (2019, May 3–5). Conditional privacy: Users’ perception of data privacy in autonomous driving. In Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems (pp. 352–359). Science and Technology Publications. https://doi.org/10.5220/0007693803520359
  • Büchi, M., Festic, N., Just, N., & Latzer, M. (2021). Digital inequalities in online privacy protection: Effects of age, education and gender. In E. Hargittai (Ed.), Handbook of Digital Inequality (pp. 296–310). Edward Elgar Publishing. https://doi.org/10.4337/9781788116572.00029
  • Burgoon, J. K. (1982). Privacy and communication. Annals of the International Communication Association, 6(1), 206–249. https://doi.org/10.1080/23808985.1982.11678499
  • Buss, A. H. (2001). Psychological dimensions of the self. Sage.
  • Carpenter, S. (2018). Ten steps in scale development and reporting: A guide for researchers. Communication Methods and Measures, 12(1), 25–44. https://doi.org/10.1080/19312458.2017.1396583
  • Cattell, R. B. (1966). The scree test for the number of factors. Multivariate Behavioral Research, 1(2), 245–276. https://doi.org/10.1207/s15327906mbr0102_10
  • Chen, F. F., West, S. G., & Sousa, K. H. (2006). A comparison of bifactor and second-order models of quality of life. Multivariate Behavioral Research, 41(2), 189–225. https://doi.org/10.1207/s15327906mbr4102_5
  • Chernichky-Karcher, S., Venetis, M. K., & Gettings, P. E. (2022). Revealing mental health information in friendships: The role of disclosure strategy and perceived recipient response on disclosure outcomes. Health Communication, 37(7), 909–918. https://doi.org/10.1080/10410236.2021.1876325
  • Chin, W. (1998). Issues and opinion on structural equation modeling management. Information Systems Quaterly, 22(1), 19–24.
  • Cho, V. (2017). A study of negative emotional disclosure behavior in social network media: Will an unexpected negative event and personality matter? Computers in Human Behavior, 73, 172–180. https://doi.org/10.1016/j.chb.2017.03.026
  • Choi, S. (2022). Privacy literacy on social media: Its predictors and outcomes. International Journal of Human–Computer Interaction, 217–232. https://doi.org/10.1080/10447318.2022.2101685
  • Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159. https://doi.org/10.1037/0033-2909.112.1.155
  • Courtney Walton, S., & Rice, R. E. (2013). Mediated disclosure on Twitter: The roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Computers in Human Behavior, 29(4), 1465–1474. https://doi.org/10.1016/j.chb.2013.01.033
  • Craddock, A. E. (1997). The measurement of privacy preferences within marital relationships: The relationship privacy preference scale. The American Journal of Family Therapy, 25(1), 48–54. https://doi.org/10.1080/01926189708251054
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Mis Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  • Davis, K. (2012). Friendship 2.0: Adolescents’ experiences of belonging and self-disclosure online. Journal of Adolescence, 35(6), 1527–1536. https://doi.org/10.1016/j.adolescence.2012.02.013
  • Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297. https://doi.org/10.1002/ejsp.2049
  • Dobber, T. (2023). Microtargeting, privacy, and the need for regulating algorithms. In S. Trepte & P. Masur (Eds.), The Routledge Handbook of Privacy and Social Media (pp. 237–245). Routledge.
  • Dogruel, L. (2019). Privacy nudges as policy interventions: Comparing US and German media users’ evaluation of information privacy nudges. Information, Communication & Society, 22(8), 1080–1095. https://doi.org/10.1080/1369118X.2017.1403642
  • Dogruel, L., Masur, P. K., & Joeckel, S. (2021). Development and validation of an algorithm literacy scale for internet users. Communication Methods and Measures, 16(2), 115–133. https://doi.org/10.1080/19312458.2021.1968361
  • Doley, J. R., McLean, S. A., Griffiths, S., & Yager, Z. (2021). Designing body image and eating disorder prevention programs for boys and men: Theoretical, practical, and logistical considerations from boys, parents, teachers, and experts. Psychology of Men & Masculinities, 22(1), 124–134. https://doi.org/10.1037/men0000263
  • Doyal, L., & Gough, I. (1991). A theory of human need. Palgrave Macmillan. https://doi.org/10.1007/978-1-349-21500-3
  • Eagly, A. H., & Wood, W. (2012). Social role theory. In P. A. M. van Lange, A. W. Kruglanski, & E. T. Higgins (Eds.), Handbook of Theories of Social Psychology (pp. 458–476). Sage.
  • Epskamp, P., Stuber, S., Nak, J., Myrthe, V., & Jorgensen, T. D. (2020). R package “semPlot” (Version 1.1.2) [Computer Software]. https://github.com/SachaEpskamp/semPlot
  • Epstein, D., & Quinn, K. (2020). Markers of online privacy marginalization: Empirical examination of socioeconomic disparities in social media privacy attitudes, literacy, and behavior. Social Media + Society, 6(2). https://doi.org/10.1177/2056305120916853
  • Frener, R. (2023). Privacy and gender. In S. Trepte & P. K. Masur (Eds.), The Routledge Handbook of Privacy and Social Media (pp. 152–161). Routledge.
  • Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2018). Multivariate data analysis (8th ed.). Cengage.
  • Hair, J. F., Gabriel, M. L. D. S., Da Silva, D., & Braga Junior, S. (2019). Development and validation of attitudes measurement scales: Fundamental and practical aspects. RAUSP Management Journal, 54(4), 490–507. https://doi.org/10.1108/RAUSP-05-2019-0098
  • Harrell, F. E. (2020). R package “Hmisc” (Version 4.4-1) [Computer Software]. https://hbiostat.org/R/Hmisc/
  • Heise, D. R. (1969). Separating reliability and stability in test-retest correlation. American Sociological Review, 34(1), 93–101. https://doi.org/10.2307/2092790
  • Helm, P. (2018). Treating sensitive topics online: A privacy dilemma. Ethics and Information Technology, 20(4), 303–313. https://doi.org/10.1007/s10676-018-9482-4
  • Helm, P., & Eichenhofer, C. (2019). Reflexionen zu einem social turn in den privacy studies [Reflections on a social turn in privacy studies]. In Digitalität und Privatheit [Digitality and Privacy]. Eds. C. Aldenhoff, L. Edeler, M. Hennig, J. Kelsch, L. Raabe, & F. Sobala. transcript pp. 139–166. https://doi.org/10.1515/9783839446614-009
  • Henry, M. (2007). Gender, security and development. Conflict, Security & Development, 7(1), 61–84. https://doi.org/10.1080/14678800601176535
  • Hoendervanger, J. G., van Yperen, N. W., Mobach, M. P., & Albers, C. J. (2019). Perceived fit in activity-based work environments and its impact on satisfaction and performance. Journal of Environmental Psychology, 65, 101339. https://doi.org/10.1016/j.jenvp.2019.101339
  • Hong, F.‑J., & Chiu, S.‑L. (2016). Factors influencing Facebook usage and Facebook addictive tendency in university students: The role of online psychological privacy and Facebook usage motivation. Stress & Health, 32(2), 117–127. https://doi.org/10.1002/smi.2585
  • Hosman, L. A. (1991). The relationships among need for privacy, loneliness, conversational sensitivity, and interpersonal communication motives. Communication Reports, 4(2), 73–80. https://doi.org/10.1080/08934219109367527
  • Hosman, L. A., & Siltanen, S. A. (1995). Relationship intimacy, need for privacy, and privacy restoration behaviors. Communication Quarterly, 43(1), 64–74. https://doi.org/10.1080/01463379509369956
  • Hunter, M., Grinnell, R. M., & Blanchard, R. (1978). A test of a shorter privacy preference scale. The Journal of Psychology, 98(2), 207–210. https://doi.org/10.1080/00223980.1978.9915962
  • Hunter, G. L., & Taylor, S. A. The relationship between preference for privacy and social media usage. (2019). Journal of Consumer Marketing, 37(1), 43–54. Advance online publication. https://doi.org/10.1108/JCM-11-2018-2927
  • Im, H., Park, S. T., & Ko, M. H. (2016). A study of factors that affect the right to be forgotten and self-disclosure intent in SNS. Indian Journal of Science and Technology, 9(26). https://doi.org/10.17485/ijst/2016/v9i26/97398
  • International Labour Office. (1976). Employment, growth and basic needs: A one world problem: Report of the director-general of the international labour office and declaration of principles and program of action adopted by the Conference (2nd ed.).
  • Kalfa, S., Koelmeyer, L., Taksa, L., Winch, C., Viveros, H., Gollan, P. J., Mackie, H., & Boyages, J. (2019). Work experiences of Australian cancer survivors with lymphoedema: A qualitative study. Health & Social Care in the Community, 27(4), 848–855. https://doi.org/10.1111/hsc.12698
  • Lam, L. W. (2012). Impact of competitiveness on salespeople’s commitment and performance. Journal of Business Research, 65(9), 1328–1334. https://doi.org/10.1016/j.jbusres.2011.10.026
  • Larson, J. H., & Bell, N. J. (1988). Need for privacy and its effect upon interpersonal attraction and interaction. Journal of Social & Clinical Psychology, 6(1), 1–10. https://doi.org/10.1521/jscp.1988.6.1.1
  • Lassiter, P. S., Gutierrez, D., Dew, B. J., & Abrams, L. P. (2017). Gay and lesbian parents. The Family Journal, 25(4), 327–335. https://doi.org/10.1177/1066480717731204
  • Li, Y. (2011). Privacy disposition, website reputation, and familiarity: Their impacts on privacy concerns. https://pdfs.semanticscholar.org/6c7f/7ff743f512163006b100d505516b8afe46f3.pdf
  • Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343–354. https://doi.org/10.1016/j.dss.2013.09.018
  • Liang, H., Shen, F., & Fu, K. (2017). Privacy protection and self-disclosure across societies: A study of global Twitter users. New Media & Society, 19(9), 1476–1497. https://doi.org/10.1177/1461444816642210
  • Lin, T. (2021). Valuing intrinsic and instrumental preferences for privacy. Marketing Science, 41(4), 663–681. https://doi.org/10.1287/mksc.2022.1368
  • Lin, S., & Armstrong, D. (2019). Beyond information: The role of territory in privacy management behavior on social networking sites. Journal of the Association for Information Systems, 20(4), 434–475. https://doi.org/10.17705/1.jais.00540
  • Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62–71. https://www.tib.eu/de/suchen/id/BLSE%3ARN281839790
  • Lüdecke, D., Bartel, A., Schwemmer, C., Powell, C., Djalovski, A., & Titz, J. (2020). R package “sjPlot” (Version 2.8.6) [Computer Software]. https://strengejacke.github.io/sjPlot/
  • Lüdecke, D., Makowski, D., Waggoner, P., Patil, I., & Ben-Shachar, M. S. (2020). R package “performance” (Version 0.5.1) [Computer Software]. https://easystats.github.io/performance/
  • Lutz, C., & Ranzini, G. (2017). Where dating meets data: Investigating social and institutional privacy concerns on Tinder. Social Media + Society, 3(1), 1–12. https://doi.org/10.1177/2056305117697735
  • Lutz, C., Schöttler, M., & Hoffmann, C. P. (2019). The privacy implications of social robots: Scoping review and expert interviews. Mobile Media & Communication, 7(3), 412–434. https://doi.org/10.1177/2050157919843961
  • Margulis, S. T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59(2), 411–429. https://doi.org/10.1111/1540-4560.00071
  • Marshall, N. J. (1972). Privacy and environment. Human Ecology, 1(2), 93–110. https://doi.org/10.1007/BF01531349
  • Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271. https://doi.org/10.1207/s15327906mbr0903_1
  • Masur, P. K. (2018). Mehr als Bewusstsein für Privatheitsrisiken: Eine Rekonzeptualisierung der Online- Privatheitskompetenz als Kombination aus Wissen, Fähig- und Fertigkeiten [More than awareness of privacy risks: A reconceptualization of online privacy literacy as a combination of knowledge, skills and abilities]. Medien & Kommunikationswissenschaft, 66(4), 446–465. https://doi.org/10.5771/1615-634X-2018-4-446
  • Masur, P. K. (2020). How online privacy literacy supports self-data protection and self-determination in the age of information. Media and Communication, 8(2), 258–269. https://doi.org/10.17645/mac.v8i2.2855
  • Masur, P. K., Hagendorff, T., & Trepte, S. (2023). Challenges in studying social media privacy literacy. In S. Trepte & P. Masur (Eds.), The Routledge Handbook of Privacy and Social Media (pp. 110–123). Routledge.
  • Masur, P. K., Teutsch, D., & Trepte, S. Entwicklung und Validierung der Online-Privatheitskompetenzskala (OPLIS) [Development and validation of the Online Privacy Literacy Scale (OPLIS)]. (2017). Diagnostica, 63(4), 256–268. Advance online publication. https://doi.org/10.1026/0012-1924/a000179
  • McDonald, R. P. (1999). Test theory: A unified treatment. L. Erlbaum Associates.
  • McStay, A. (2020). Emotional AI, soft biometrics and the surveillance of emotional life: An unusual consensus on privacy. Big Data & Society, 7(1), 205395172090438. https://doi.org/10.1177/2053951720904386
  • Meier, Y., Schäwel, J., Kyewski, E., & Krämer, N. C. (2020). Applying protection motivation theory to predict Facebook users’ withdrawal and disclosure intentions. SMSociety’20: International Conference on Social Media and Society, 21–29. https://doi.org/10.1145/3400806.3400810
  • Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48. https://doi.org/10.1162/DAED_a_00113
  • Papacharissi, Z. (Ed.). (2011). A networked self: Identity, community, and culture on social network sites. Routledge.
  • Patil, S., & Kobsa, A. (2005). Uncovering privacy attitudes and practices in instant messaging. In M. Pendergast, K. Schmidt, G. Mark, & M. Ackerman (Eds.), Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work - GROUP ’05 (p. 109). ACM Press. https://doi.org/10.1145/1099203.1099220
  • Pedersen, D. M. (1979). Dimensions of privacy. Perceptual and Motor Skills, 48(3), 1291–1297. https://doi.org/10.2466/pms.1979.48.3c.1291
  • Pedersen, D. M. (1987). Relationship of personality to privacy preferences. Journal of Social Behavior & Personality, 2(2), 267–274.
  • Pedersen, D. M. (1987). Sex differences in privacy preferences. Perceptual and Motor Skills, 64(3), 1239–1242. https://doi.org/10.2466/pms.1987.64.3c.1239
  • Pedersen, D. M., & Frances, S. (1990). Regional differences in privacy preferences. Psychological Reports, 66(3), 731–736. https://doi.org/10.2466/pr0.1990.66.3.731
  • Petro, G., & Metzger, M. J. (2023). Group privacy. In S. Trepte & P. Masur (Eds.), The Routledge Handbook of Privacy and Social Media (pp. 45–53). Routledge.
  • Petronio, S. (2002). Boundaries of privacy. State University of New York Press.
  • Pöge, K., Rommel, A., Starker, A., Prütz, F., Tolksdorf, K., Öztürk, I., Strasser, S., Born, S., & Saß, A.‑C. (2022). Survey of sex/gender diversity in the GEDA 2019/2020-EHIS study - objectives, procedure and experiences. Journal of Health Monitoring, 7(2), 48–65. https://doi.org/10.25646/9957
  • Prince, V. (2005). Sex vs. gender. The International Journal of Transgenderism, 8(4), 29–32. https://doi.org/10.1300/J485v08n04_05
  • Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1). https://doi.org/10.5210/fm.v15i1.2775
  • Reise, S. P. (2012). Invited Paper: The rediscovery of bifactor measurement models. Multivariate Behavioral Research, 47(5), 667–696. https://doi.org/10.1080/00273171.2012.715555
  • Rensel, A., Abbas, J., & Rao, H. R. (2006). Private transactions in public places: An exploration of the impact of the computer environment on public transactional web site Use. Journal of the Association for Information Systems, 7(1), 19–51. https://doi.org/10.17705/1jais.00077
  • Revelle, W. (2021). R package “psych” (Version 2.0.9) [Computer Software]. https://personality-project.org/r/psych/
  • Rosseell, Y., Jorgensen, T. D., & Rockwood, N. (2021). R package “lavaan” (Version 0.6-9) [Computer Software]. https://cran.r-project.org/web/packages/lavaan/lavaan.pdf
  • Russel, D. W. (1996). UCLA loneliness scale (version 3): Reliability, validity, and factor structure. Journal of Personality Assessment, 66(1), 20–40. https://doi.org/10.1207/s15327752jpa6601_2
  • Russell, D. W. (1982). Loneliness: A sourcebook of current theory, research and therapy.
  • Russell, D. W., & Pang, Y. C. (2020). Loneliness. In V. Zeigler-Hill & T. K. Shackelford (Eds.), Encyclopedia of Personality and Individual Differences (pp. 2674–2677). Springer International Publishing. https://doi.org/10.1007/978-3-319-24612-3_1085
  • Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American Psychologist, 55(1), 68–78. https://doi.org/10.1037/0003-066X.55.1.68
  • Scharkow, M., & Bachl, M. (2019). Stable attitudes and behaviors as boundary conditions of reinforcing spirals models. In P. Müller, S. Geiß, C. Schemer, T. K. Naab, & C. Peter (Eds.), Methoden und Forschungslogik der Kommunikationswissenschaft: Vol. 15. Dynamische Prozesse der öffentlichen Kommunikation: Methodische Herausforderungen (pp. 286–300). Herbert von Halem Verlag.
  • Schäwel, J. (2019). How to raise users’ awareness of online privacy. University of Duisburg-Essen.
  • Schäwel, J., Frener, R., Masur, P. K., & Trepte, S. (2021). Learning by doing oder doing by learning? Die Wechselwirkung zwischen Online-Privatheitskompetenz und Datenschutzverhalten [The interdependency between online privacy literacy and data protection behavior]. Medien- & Kommunikationswissenschaft, 69(2), 221–246. https://doi.org/10.5771/1615-634X-2021-2-1
  • Sheehan, K. B. (1999). An investigation of gender differences in online privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38. https://doi.org/10.1002/(SICI)1520-6653(199923)13:4<24:AID-DIR3>3.0.CO;2-O
  • Škrinjarić, B., Budak, J., & Žokalj, M. (2018). The effect of personality traits on online privacy concern. Ekonomski Pregled, 69(2), 106–130. https://doi.org/10.32910/ep.69.2.2
  • Taylor, L., Floridi, L., & van der Sloot, B. (2017). Introduction: A new perspective on privacy. In L. Taylor, L. Floridi, & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). Springer.
  • Teutsch, D., Masur, P. K., & Trepte, S. (2018). Privacy in mediated and nonmediated interpersonal communication: How subjective concepts and situational perceptions influence behaviors. Social Media + Society, 4(2), 1–14. https://doi.org/10.1177/2056305118767134
  • Thelwall, M. (2011). Privacy and gender in the social web. In S. Trepte & L. Reinecke (Eds.), Privacy Online. Perspectives on Privacy and Self-disclosure in the Social Web (pp. 251–266). Springer.
  • Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1–12. https://doi.org/10.1016/j.chb.2018.11.046
  • Trepte, S. (2021). The Social Media Privacy Model: Privacy and communication in the light of social media affordances. Communication Theory, 31(4), 549–570. https://doi.org/10.1093/ct/qtz035
  • Trepte, S. (2023). Privacy theory - social, networked, relational, collective. In S. Trepte & P. Masur (Eds.), The Routledge Handbook of Privacy and Social Media (pp. 25–36). Routledge.
  • Trepte, S., & Masur, P. K. (2016). Cultural differences in social media use, privacy, and self-disclosure: Research report of a multicultural survey study. University of Hohenheim.
  • Trepte, S., & Masur, P. K. (2017). Need for privacy. In V. Zeigler-Hill & T. K. Shackelford (Eds.), Encyclopedia of personality and individual differences (pp. 1–4). Springer.
  • Trepte, S., Masur, P. K., & Dienlin, T. (2021). The Privacy Longitudinal Study [Data and Measures]. https://doi.org/10.7802/2117
  • Trepte, S., Masur, P. K., Scharkow, M., & Dienlin, T. (2015). Privatheitsbedürfnisse verschiedener Kommunikationstypen on- und offline: Ergebnisse einer repräsentativen Studie zum Umgang mit persönlichen Inhalten [Privacy needs for different communication profiles online and offline]. Media Perspektiven, 5, 250–257.
  • Trepte, S., & Reinecke, L. (2011). The social web as shelter for privacy and authentic living. In S. Trepte & L. Reinecke (Eds.), Privacy Online. Perspectives on Privacy and Self-disclosure in the Social Web (pp. 61–74). Springer.
  • Trepte, S., Reinecke, L., Ellison, N. B., Quiring, O., Yao, M. Z., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media + Society, 3(1), 1–13. https://doi.org/10.1177/2056305116688035
  • Trepte, S., Teutsch, D., Masur, P. K., Eicher, C., Fischer, M., Hennhöfer, A., & Lind, F. (2015). Do people know about privacy and data protection strategies? Towards the “online privacy literacy scale” (OPLIS). In S. Gutwirth, R. Leenes, & P. D. Hert (Eds.), Law, governance and technology series: Vol. 20. Reforming European data protection law (pp. 333–365). Springer Netherlands.
  • Turland, M., & Slade, P. (2020). Farmers’ willingness to participate in a big data platform. Agribusiness, 36(1), 20–36. https://doi.org/10.1002/agr.21627
  • Valkenburg, P. M., & Peter, J. (2007). Online communication and adolescent well-being. Testing the stimulation versus the displacement hypothesis. Journal of Computer-Mediated Communication, 12(4), 1169–1182. https://doi.org/10.1111/j.1083-6101.2007.00368.x
  • Vaskooi-Eshkevari, K., Mirbazegh, F., Soltani-Kermanshahi, M., Sabzali-Poursarab-Saeedi, M., & Alipour, S. (2019). Customized patient clothing and patient satisfaction. International Journal of Health Care Quality Assurance, 32(3), 635–644. https://doi.org/10.1108/IJHCQA-02-2018-0047
  • Verbeij, T., Pouwels, J. L., Beyens, I., & Valkenburg, P. M. (2021). The accuracy and validity of self-reported social media use measures among adolescents. Computers in Human Behavior Reports, 3, 100090. https://doi.org/10.1016/j.chbr.2021.100090
  • Vinsel, A., Brown, B. B., Altman, I., & Foss, C. (1980). Privacy regulation, territorial displays, and effectiveness of individual functioning. Journal of Personality and Social Psychology, 39(6), 1104–1115. https://doi.org/10.1037/h0077718
  • Visinescu, L. L., Azogu, O., Ryan, S. D., Wu, Y. A., and Kim, D. J. (2016). Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as a cloud computing cervice. International Journal of Human–Computer Interaction, 32(11), 885–900. https://doi.org/10.1080/10447318.2016.1204838
  • Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220. https://doi.org/10.2307/1321160
  • Westin, A. F. (1967). Privacy and freedom. Atheneum.
  • Westin, A. F. (1970). Privacy and freedom (2nd ed.). Bodley Head.
  • WHO (2005). Multi-country study on women’s health and domestic violence against women: Summary report of initial results on prevalence, health outcomes and women’s responses.
  • Wickham, H., Chang, W., Henry, L., Pedersen, T. L., Kohske, T., Wilke, C., Woo, K., Yutani, H., & Dunnington, D. (2020). R package “ggPlot2” (Version 3.3.2) [Computer Software]. http://ggplot2.tidyverse.org/
  • Windisch, M., & Kniel, A. (1988). Zur Messung von Einsamkeit und sozialer Abhängigkeit behinderter Menschen [Measuring loneliness and social dependence of disabled people]. Zeitschrift für Soziologie, 17(5), 382–389. https://doi.org/10.1515/zfsoz-1988-0506
  • Witteborn, S. (2022). Privacy in collapsed contexts of displacement. Feminist Media Studies, 22(4), 883–897. https://doi.org/10.1080/14680777.2020.1841814
  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view. ICIS 2008 Proceedings. 6. http://aisel.aisnet.org/icis2008/6
  • Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798–824. https://doi.org/10.17705/1jais.00281
  • Yao, M. Z., & Linz, D. G. (2008). Predicting self-protections of online privacy. CyberPsychology & Behavior, 11(5), 615–617. https://doi.org/10.1089/cpb.2007.0208
  • Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710–722. https://doi.org/10.1002/asi.20530
  • Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. CyberPsychology & Behavior, 11(6), 763–765. https://doi.org/10.1089/cpb.2007.0240
  • Zhang, N., Wang, C., & Xu, Y. (2011). Privacy in online social networks. International Conference on Interaction Sciences.
  • Zukowski, T., & Brown, I. (2007). Examining the influence of demographic factors on internet users’ information privacy concerns. In Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries (pp. 197–204). https://doi.org/10.1145/1292491.1292514

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.