Full Length Research Paper
References
Ajzen I (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes 50(2):179-211. |
|
Anderson JC, Gerbing DW (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin 103(3):411-423. |
|
Apostolou B, Dorminey JW, Schaupp LC (2016). Trust in tax software as an antecedent to intention to e-File. Journal of Forensic and Investigative Accounting 8(2):241-256. |
|
Awad NF, Krishnan MS (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30(1):13-28. |
|
Bansal G, Zahedi FM, Gefen D (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems 49(2):138-150. |
|
Belanger F, Hiller JS, Smith WJ (2002). Trustworthiness in Electronic Commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11(3/4):245-270. |
|
Brink WD, Lee LS (2015). The effect of tax preparation software on tax compliance: a research note. Behavioral Research in Accounting 27(1):121-135. |
|
Byrne BM (1998). Structural Equation Modeling with Lisrel, Prelis, and Simplis: Basic Concepts, Applications and Programming, Lawrence Erlbaum Associates, Mahwah, New Jersey. |
|
Chellappa RK (2008). Consumers' trust in electronic commerce transactions: the role of perceived privacy and perceived security. Emory University, Atlanta, GA. Unpublished. |
|
Croson R, Gneezy U (2009). Gender differences in preferences. Journal of Economic Literature 47(2):448-474. |
|
Culnan MJ (1995). Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing 9(2):10-19. |
|
Culnan MJ, Bies RJ (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues 59(2):323-342. |
|
Dinev T, Hart P (2004). Internet privacy concerns and their antecedents - measurement validity and a regression model. Behavior and Information Technology 23(6):413-423. |
|
Dinev T, Hart P (2006). An extended privacy calculus model for E-Commerce transactions. Information Systems Research 17(1):61-80. |
|
Featherman MS, Pavlou PA (2003). Predicting E-service adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies 59(4):451-474. |
|
Gerbing DW, Anderson JC (1988). An updated paradigm for scale development incorporating unidimensionality and its assessment. Journal of Marketing Research 25(2):186-192. |
|
Hui KL, Teo HH, Lee SYT (2007). The value of privacy assurance: an exploratory field experiment. MIS Quarterly 31(1):19-33. |
|
Internal Revenue Service (2017). Filing Season Statistics for Week Ending September 1, 2017. Available at: |
|
Li X, Santhanam R (2008). Will it be disclosure or fabrication of personal information? An examination of persuasion strategies on prospective employees. International Journal of Information Security and Privacy 2(4):91-109. |
|
Liu C, Marchewka JT, Lu J, Yu CS (2005). Beyond concern - a privacy-trust-behavioral intention model of electronic commerce. Information and Management 42(2):289-304. |
|
Malhotra NK, Kim SS, Agarwal J (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale and a causal model. Information Systems Research 15(4):336-355. |
|
McKnight H, Choudhury V, Kacmar C (2002). Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research 13(3):334-359. |
|
McLeod A, Pippin S, Mason R (2008). Individual taxpayer intention to use tax preparation software: Examining experience, trust, and perceived risk. In Proceedings of ISOneWorld Conference. |
|
Metzger MJ (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication 9(4):JCMC942. |
|
Milberg SJ, Smith HJ, Burke SJ (2000). Information Privacy: Corporate Management and National Regulation. Organization Science 11(1): 35-57. |
|
Murray TD (2012). Many tax preparation software companies share your personal data. Available at: |
|
Nahm AY, Vonderembse MA, Koufteros XA (2003). The impact of organizational structure on time-based manufacturing and plant performance. Journal of Operations Management 21(3):281-306. |
|
National Cyber Security Alliance (NCSA) (2016). U.S. consumer privacy index 2016. Available at: |
|
Rencher AC (1995). Methods of multivariate analysis, John Wiley & Son. Inc. Publication, Canada. pp. 380-407. |
|
Rowan M, Dehlinger J (2014). Observed gender difference in privacy concerns and behaviors of mobile device end users. Procedia Computer Science 37:340-347. |
|
Schaupp LC, Carter L, McBride ME (2010). E-file adoption: A study of U.S. taxpayers' intentions. Computers in Human Behavior 26(4):636-644. |
|
Schwartz P (2008). The future of tax privacy. National Tax Journal 61(4):883-900. |
|
Sheehan KB (2009). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing 13(4):24-38. |
|
Smith HJ, Dinev T, Xu H (2011). Information privacy research: an interdisciplinary review. MIS Quarterly 35(4):989-1015. |
|
Smith HJ, Milberg SJ, Burke SJ (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly 20(2):167-196. |
|
Stewart KA, Segars AH (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research 13(1):36-49. |
|
Sutton SG (2010). The fundamental role of technology in accounting: Researching reality. Advances in Accounting Behavioral Research 13:1-11. |
|
Thibaut J, Walker L (1975). Procedural justice: A psychological analysis. L. Erlbaum Associates. |
|
Tyler TR (1994). Psychological models of the justice motive: antecedents of distributive and procedural justice. Journal of Personality and Social Psychology 67(5):850-863. |
|
Xu H, Teo HH, Tan BCY, Agarwal R (2010). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems 26(3):137-176. |
|
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0