[
1. Abidin, M. Z., Rusli, R., and Shariff, A. M. Technique for Order Performance by Similarity to Ideal Solution (TOPSIS)-entropy Methodology for inherent Safety Design Decision Making tool. Procedia Engineering, 148, 2016, pp. 1043–1050. https://doi:10.1016/j.proeng.2016.06.58710.1016/j.proeng.2016.06.587
]Search in Google Scholar
[
2. Acquisti, A., Brandimarte, L., and Loewenstein, G. Privacy and Human Behavior in the age of Information. Science, 347, 2015, pp. 509–514. https://doi:10.1126/science.aaa146510.1126/science.aaa1465
]Search in Google Scholar
[
3. Acquisti, A., Sleeper, M., Wang, Y., Wilson, S., Adjerid, I., Balebako, R., and Schaub, F. Nudges for Privacy and Security. ACM Computing Surveys, 50(3), 2017, pp. 1–41. https://doi:10.1145/305492610.1145/3054926
]Search in Google Scholar
[
4. Adam J., Ulf-Dietrich R., Tom B., Carina B., and Paine S. Privacy, Trust, and Self-disclosure Online. Human-Computer Interaction, 25(1), 2010, pp. 1-24. https://doi:10.1080/0737002090356662.10.1080/07370020903586662
]Search in Google Scholar
[
5. Albahri, A. S., Hamid, R. A., Albahri, O.S, Albahri, A.S. and Zaidan, A.A. Detection-based prioritisation: Framework of Multi-laboratory Characteristics for Asymptomatic COVID-19 carriers based on integrated Entropy–TOPSIS methods. Artificial Intelligence in Medicine, 101983. 2021. https://doi:10.1016/j.artmed.2020.10198310.1016/j.artmed.2020.101983
]Search in Google Scholar
[
6. Alhakami, A. S., and Slovic, P. A Psychological Study of the Inverse Relationship between Perceived Risk and Perceived Benefit. Risk Analysis, 14(6), 1994, pp. 1085–1096.10.1111/j.1539-6924.1994.tb00080.x
]Search in Google Scholar
[
7. Alshurideh, M., Nicholson, M., and Xiao, S. The Effect of Previous Experience on Mobile Subscribers’ Repeat Purchase Behaviour. European Journal of Social Sciences, 30(3), 2012, pp. 366-376.
]Search in Google Scholar
[
8. Analytics Insight. Data protection vs. Cybersecurity: why you need both. 2020. [Blog post]. Retrieved from https://www.analyticsinsight.net/data-protection-vs-cyber-security-why-you-need-both/
]Search in Google Scholar
[
9. Awad, N. F., and Krishnan, M. S. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly, 2006, pp. 13-28. https://doi:10.2307/2514871510.2307/25148715
]Search in Google Scholar
[
10. Baker Hosetler, Is Your Organization Compromise Ready? Data Security Incident. 2016. Response Report. Retrieved September 3, 2021, from https://www.bakerlaw.com/files/uploads/Documents/Privacy/2016-Data-Security-Incident-ResponseReport.pdf
]Search in Google Scholar
[
11. Bansal, G. and Gefen, D. The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online. Decision support systems, 49(2), 2010, pp. 138-150. https://doi:10.1016/j.dss.2010.01.01010.1016/j.dss.2010.01.010
]Search in Google Scholar
[
12. Barari, M., Ross, M., and Surachartkumtonkun, J. Negative and Positive Customer Shopping Experience in an Online Context. Journal of Retailing and Consumer Services, 53, 2020. https://doi:10.1016/j.jretconser.2019.10110.1016/j.jretconser.2019.101985
]Search in Google Scholar
[
13. Bélanger, F., and Crossler, R. E. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 2011, pp.1017-1041. https://doi.org/10.2307/41409971
]Search in Google Scholar
[
14. Belanger, F. and Hiller, J. S. A Framework for E-Government: Privacy Implications. Business Process Management Journal, 12(1), 2006, pp. 48–60. https://doi:10.1108/1463715061064375110.1108/14637150610643751
]Search in Google Scholar
[
15. Belanger, F., Hiller, J. S., & Smith, W. J. Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes. The Journal of Strategic Information Systems, 11(3-4), 2002, pp. 245 – 270. https://doi:10.1016/s0963-8687(02)00018-510.1016/S0963-8687(02)00018-5
]Search in Google Scholar
[
16. Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society, 20(5), 2004, pp. 313 – 324.10.1080/01972240490507956
]Search in Google Scholar
[
17. Bleier, A., and Eisenbeiss, M. The Importance of Trust for Personalized Online Advertising. Journal of Retailing, 91(3), 2015, pp. 390–409. https://doi:10.1016/j.jretai.2015.04.00110.1016/j.jretai.2015.04.001
]Search in Google Scholar
[
18. Bornschein, R., Schmidt, L., and Maier, E. The Effect of Consumers’ Perceived Power and Risk in Digital Information Privacy: The Example of Cookie Notices. Journal of Public Policy & Marketing, 39(2), 2020, pp. 135–154. https://doi:10.1177/074391562090214310.1177/0743915620902143
]Search in Google Scholar
[
19. Bugeja, J., Jacobsson, A., and Davidsson, P. On privacy and Security Challenges in Smart Connected Homes. European Intelligence and Security Informatics Conference (EISIC). 2016. https://doi:10.1109/eisic.2016.04410.1109/EISIC.2016.044
]Search in Google Scholar
[
20. Conner, M. and Armitage, C. J. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research. Journal of Applied Social Psychology, 28(15), 1998, pp. 1429–1464. https://doi:10.1111/j.1559-1816.1998.tb01685.x10.1111/j.1559-1816.1998.tb01685.x
]Search in Google Scholar
[
21. Culnan, M. J. and Armstrong, P. K. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 1999, pp. 104–115. https://doi:10.1287/orsc.10.1.10410.1287/orsc.10.1.104
]Search in Google Scholar
[
22. Culnan, M. J., and Bies, R. J. Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 2003, pp. 323–342. https://doi:10.1111/1540-4560.0006710.1111/1540-4560.00067
]Search in Google Scholar
[
23. Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 1989, pp. 982–1003. https://doi:10.1287/mnsc.35.8.98210.1287/mnsc.35.8.982
]Search in Google Scholar
[
24. Deloitte. Enterprise@Risk: Privacy & Data Protection Survey. 2007, Retrieved from http://www.deloitte.com/dtt/cda/doc/content/us_risk_s%26P_2007%20Privacy10Dec2007final.pdf.
]Search in Google Scholar
[
25. Dinev, T. and Hart, P. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce, 10(2), 2005, pp. 7–29. https://doi:10.2753/jec1086-441510020110.2753/JEC1086-4415100201
]Search in Google Scholar
[
26. Dinev, T., and Hart, P. An Extended Privacy Calculus Model for E-commerce Transactions. Information Systems Research, 17(1), 2006, pp. 61–80. https://doi:10.1287/isre.1060.008010.1287/isre.1060.0080
]Search in Google Scholar
[
27. Dontov, T. Why Data Protection, and Cybersecurity can’t be Separate Functions. 2020, November 25, Retrieved from https://www.forbes.com/sites/theyec/2020/11/25/why-dataprotection-andcybersecurity-cant-be-separate-functions/?sh=7fad4b2517cc
]Search in Google Scholar
[
28. Federal Trade Commission. Data Brokers: A call for transparency and accountability. FTC. 2014. Retrieved from https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparencyaccountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf
]Search in Google Scholar
[
29. Fortes, N. and Rita, P. Privacy Concerns and Online Purchasing Behaviour: Towards an Integrated Model. European Research on Management and Business Economics, 22(3), 2016, pp. 167–176. http://doi:10.1016/j.iedeen.2016.04.00210.1016/j.iedeen.2016.04.002
]Search in Google Scholar
[
30. Gomez, J., Pinnick, T., and Soltani, A. Know Privacy: The Current State of Web Privacy, Data Collection, and Information Sharing, 2009. School of Information, University of California Berkeley (http://www.knowprivacy.org/).
]Search in Google Scholar
[
31. Guhr, N., Werth, O., Blacha, P. P. H., and Breitner, M. H. Privacy Concerns in the Smart Home Context. SN Applied Sciences, 2(2), 2020, pp. 1-12. https://doi.org/10.1007/s42452-020-2025-8
]Search in Google Scholar
[
32. Hill, R. J., Fishbein, M. and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Contemporary Sociology, 6(2), 1977, pp. 244. http://doi:10.2307/206585310.2307/2065853
]Search in Google Scholar
[
33. Hoffmann, C. P., Lutz, C., and Meckel, M. (2014). Digital Natives or Digital Immigrants? The Impact of User Characteristics on Online Trust. Journal of Management Information Systems, 31(3), pp. 138-171. https://doi.org/10.1080/07421222.2014.995538
]Search in Google Scholar
[
34. Hwang, C. L. and Yoon, K. Multiple Attribute Decision Making: A State of the Art Survey. Lecture Notes in Economics and Mathematical Systems, 186(1), 1981.10.1007/978-3-642-48318-9_1
]Search in Google Scholar
[
35. Jeff Smith, H., Dinev, T. and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly: Management Information Systems, 35(4), 2011, pp. 989–1015.10.2307/41409970
]Search in Google Scholar
[
36. Jensen, C., Potts, C., and Jensen, C. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63(1-2), 2005, pp. 203–227.10.1016/j.ijhcs.2005.04.019
]Search in Google Scholar
[
37. Kehr, F., Kowatsch, T., Wentzel, D. and Fleisch, E. Blissfully Ignorant: The Effects of General Privacy Concerns, General Institutional Trust, and Affect in the Privacy Calculus. Information Systems Journal, 25(6), 2015, pp. 607–635. http://doi:10.1111/isj.1206210.1111/isj.12062
]Search in Google Scholar
[
38. Kim, D. J., Ferrin, D. L. and Rao, H. R. A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents. Decision Support Systems, 44(2), 2008, pp. 544–564. http://doi:10.1016/j.dss.2007.07.00110.1016/j.dss.2007.07.001
]Search in Google Scholar
[
39. Kim, K. [Blog post]. Retrieved from https://www.usatoday.com/story/tech/columnist/2019/12/19/your-smartphone-mobile-device-may-recording-everything-you-say/4403829002/ 2019, December, 19
]Search in Google Scholar
[
40. Kothari, C.R. Research methodology: Methods and techniques (2nd ed.). New Age International Publishers. 2004.
]Search in Google Scholar
[
41. Kuanchin Chen and Alan I. Rea Jr. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems, 44(4), 2004, pp. 85-92. http://dx.doi.org/10.1080/08874417.2004.11647599
]Search in Google Scholar
[
42. LaRose, R., and Rifon, N. Your Privacy is Assured of Being Disturbed: Websites with and without Privacy Seals. New Media & Society, 8(6), 2006, pp. 1009–1029.10.1177/1461444806069652
]Search in Google Scholar
[
43. Leidner, D. E., and Kayworth, T. A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict. MIS Quarterly, 2006, pp. 357-399. http://doi:10.2307/2514873510.2307/25148735
]Search in Google Scholar
[
44. Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 2004, pp. 336 – 355. http://doi:10.1287/isre.1040.003210.1287/isre.1040.0032
]Search in Google Scholar
[
45. Martin, K. The Penalty for Privacy Violations: How Privacy Violations Impact Trust Online. Journal of Business Research, 82, 2018, pp. 103–116. http://doi:10.1016/j.jbusres.2017.08.03410.1016/j.jbusres.2017.08.034
]Search in Google Scholar
[
46. Martin, K. D., Borah, A., and Palmatier, R. W. Data privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81(1), 2017, pp. 36–58. http://doi:10.1509/jm.15.049710.1509/jm.15.0497
]Search in Google Scholar
[
47. Martin, K., and Shilton, K. Why Experience Matters to Privacy: How Context-based Experience Moderate’s Consumer Privacy Expectations for Mobile Applications. Journal of the Association for Information Science and Technology, 67(8), 2015, pp. 1871–1882. http://doi:10.1002/asi.2350010.1002/asi.23500
]Search in Google Scholar
[
48. Mathieson, K. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior. Information Systems Research, 2(3), 1991, pp. 173–191. http://doi:10.1287/isre.2.3.17310.1287/isre.2.3.173
]Search in Google Scholar
[
49. Meinert, D. B., Peterson, D. K., Criswell, J. R., and Crossland, M. D. Privacy Policy Statements and Consumer Willingness to Provide Personal Information. Journal of Electronic Commerce in Organizations, 4(1), 2006, pp. 1–17. http://doi:10.4018/jeco.200601010110.4018/jeco.2006010101
]Search in Google Scholar
[
50. Metzger, M. J. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of computer-mediated communication, 9(4), 2004, JCMC942.10.1111/j.1083-6101.2004.tb00292.x
]Search in Google Scholar
[
51. Miltgen, C. L., Henseler, J., Gelhard, C. and Popovič, A. Introducing New Products that affect Consumer Privacy: A Mediation Model. Journal of Business Research, 69(10), 2016, pp. 4659–4666. http://doi:10.1016/j.jbusres.2016.04.01510.1016/j.jbusres.2016.04.015
]Search in Google Scholar
[
52. Miyazaki, A. D., and Fernandez, A. Consumer Perceptions of Privacy and Security Risks for Online Shopping. Journal of Consumer Affairs, 35(1), 2001, pp. 27–44.10.1111/j.1745-6606.2001.tb00101.x
]Search in Google Scholar
[
53. Moradian, M., Modanloo, V., & Aghaiee, S. Comparative Analysis of Multi-Criteria Decision-Making Techniques for Material Selection of Brake Booster Valve Body. Journal of Traffic and Transportation Engineering (English Edition), 6(5), 2019, pp. 526-534. http://doi:10.1016/j.jtte.2018.02.00110.1016/j.jtte.2018.02.001
]Search in Google Scholar
[
54. Nigeria Data Protection Regulation. Retrieved from https://ndpr.nitda.gov.ng/Content/Doc/NigeriaDataProtectionRegulation.pdf 2019.
]Search in Google Scholar
[
55. Norberg, P. A., and Horne, D. R. Privacy Attitudes and Privacy-related Behavior. Psychology and Marketing, 24(10), 2019, pp. 829–847. http://doi:10.1002/mar.2018610.1002/mar.20186
]Search in Google Scholar
[
56. Nowak, G. J., & Phelps, J. Direct Marketing and the Use of Individual-level Consumer Information: Determining How and When “Privacy” Matters. Journal of Direct Marketing, 9(3), 1995, pp. 46–60. http://doi:10.1002/dir.400009030710.1002/dir.4000090307
]Search in Google Scholar
[
57. Pavlou, P. A., and Gefen, D. Building Effective Online Marketplaces with Institution-based Trust. Information Systems Research, 15(1), 2004, pp. 37–59. http://doi:10.1287/isre.1040.001510.1287/isre.1040.0015
]Search in Google Scholar
[
58. Peter, J. P., and Tarpey Sr, L. X. A Comparative Analysis of Three Consumer Decision Strategies. Journal of consumer research, 2(1), 1975, pp. 29-37. http://doi:10.1086/20861310.1086/208613
]Search in Google Scholar
[
59. Phelps, J., Nowak, G., and Ferrell, E. Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 2000, pp. 27–41. http://doi:10.1509/jppm.19.1.27.16941.10.1509/jppm.19.1.27.16941
]Search in Google Scholar
[
60. Privacy and Data Security Update. Federal Trade Commission. Retrieved October 3, 2021, from https://www.ftc.gov/reports/privacy-data-security-update-2014 2014.
]Search in Google Scholar
[
61. Protection of Personal Information Act. Retrieved November 23, 2021, from https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013protectionofpersonalinforcorrect.pdf 2021
]Search in Google Scholar
[
62. Roszkowska, E. Multi-Criteria Decision-Making Models by applying the TOPSIS Method to Crisp and Interval Data, Multiple Criteria Decision Making (6), 2011, pp. 200-230.
]Search in Google Scholar
[
63. Salehi, V., Zarei, H., Shirali, G. A., and Hajizadeh, K. An Entropy-based TOPSIS Approach for Analyzing and Assessing Crisis Management Systems in Petrochemical Industries. Journal of Loss Prevention in the Process Industries, 104241. 2020. http://doi:10.1016/j.jlp.2020.10424110.1016/j.jlp.2020.104241
]Search in Google Scholar
[
64. Schoenbachler, D. D. and Gordon, G. L. Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing. Journal of Interactive Marketing, 16(3), 2002, pp. 2–16. http://doi:10.1002/dir.1003310.1002/dir.10033
]Search in Google Scholar
[
65. Sekaran, U. and Bougie, R. Research Methods for Business: A Skill Building Approach. John Wiley & Sons. 2013.
]Search in Google Scholar
[
66. Sheehan, K. B. and Hoy, M. G. Dimensions of Privacy Concern Among Online Consumers. Journal of Public Policy & Marketing, 19(1), 2000, pp.62–73. http://doi:10.1509/jppm.19.1.62.1694910.1509/jppm.19.1.62.16949
]Search in Google Scholar
[
67. Smith, H. J. Information Privacy and Marketing: What the U.S. Should (and Shouldn’t) Learn from Europe. California Management Review, 43(2), 2001, 8–33.10.2307/41166073
]Search in Google Scholar
[
68. Smith, H. J., Milberg, S. J. and Burke, S. J. Information Privacy: Measuring Individuals’ Concerns About Organizational Practices. MIS Quarterly, 20(2), 1996, pp. 167.10.2307/249477
]Search in Google Scholar
[
69. Taber, K. S. The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education. Research in Science Education. 2017.10.1007/s11165-016-9602-2
]Search in Google Scholar
[
70. Tang, Z., Hu, Y. U. and Smith, M. D. Gaining Trust Through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor. Journal of Management Information Systems, 24(4), 2008, pp. 153-173.10.2753/MIS0742-1222240406
]Search in Google Scholar
[
71. Tatum, H. Your Data and Privacy. Ask Help Desk: No, Your Phone Isn’t Listening to Your Conversations. (2021, November 12). Seriously [Blog post]. Retrieved from https://www.washingtonpost.com/technology/2021/11/12/phone-audio-targeting-privacy/
]Search in Google Scholar
[
72. Tavakol, M. and Dennick, R. Making Sense of Cronbach’s Alpha. International Journal of Medical Education, 2, 2011, pp. 53–55. http://doi:10.5116/ijme.4dfb.8dfd10.5116/ijme.4dfb.8dfd
]Search in Google Scholar
[
73. Tsai, J. Y., Egelman, S., Cranor, L., and Acquisti, A. The Effect of Online Privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 2011, 254–268. http://doi:10.1287/isre.1090.026010.1287/isre.1090.0260
]Search in Google Scholar
[
74. Wakefield, R. The Influence of User Affects in Online Information Disclosure. The Journal of Strategic Information Systems, 22(2), 2013, pp.157–174. http://doi:10.1016/j.jsis.2013.01.00310.1016/j.jsis.2013.01.003
]Search in Google Scholar
[
75. World Economic Forum. The Global Information Technology Report Retrieved from http://www3.weforum.org/docs/GITR2016/WEF_GITR_Full_Report.pdf 2016.
]Search in Google Scholar
[
76. Xu, H., Dinev, T., Smith, H. J., and Hart, P. Examining the Formation of Individual’s Information Privacy Concerns: Toward an Integrative View, in Proceedings of 29th International Conference on Information Systems, Paris, France, 14-17, 2008. Retrieved from https://faculty.ist.psu.edu/xu/papers/conference/icis08a.pdf
]Search in Google Scholar
[
77. Xu, H., Teo, H.-H., Tan, B. C. Y., and Agarwal, R. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-based Services. Journal of Management Information Systems, 26(3), 2009, pp. 135–174. http://doi:10.2753/mis0742-122226030510.2753/MIS0742-1222260305
]Search in Google Scholar
[
78. Zou, Z., Yun, Y., and Sun, J. Entropy Method for Determination of Weight of Evaluating Indicators in Fuzzy Synthetic Evaluation for Water Quality Assessment. Journal of Environmental Sciences, 18(5), 2006, pp. 1020–1023. http://doi:10.1016/s1001-0742(06)60032-610.1016/S1001-0742(06)60032-6
]Search in Google Scholar