[1] Zhao X, Xue L. Competitive target advertising and consumer data sharing[J]. Journal of Management Information Systems, 2012, 29(3): 189-222. DOI:10.2753/mis0742-1222290306.
[2] Khayati L J, Orencik C, Savas E, et al. A practical privacy-preserving targeted advertising scheme for IPTV users[J]. International Journal of Information Security, 2015, 15(4): 335-360. DOI:10.1007/s10207-015-0296-7.
[3] Ha A Y, Tong S L, Zhang H T. Sharing demand information in competing supply chains with production diseconomies[J]. Management Science, 2011, 57(3): 566-581. DOI:10.1287/mnsc.1100.1295.
[4] Chen J Q, Stallaert J. An economic analysis of online advertising using behavioral targeting[J]. MIS Quarterly, 2014, 38(2): 429-450. DOI:10.25300/MISQ/2014/38.2.05.
[5] Casadesus-Masanell R, Hervas-Drane A. Competing with privacy[J]. Management Science, 2015, 61(1): 229-246. DOI:10.1287/mnsc.2014.2023.
[6] Montes R, Sand-Zantman W, Valletti T. The value of personal information in online markets with endogenous privacy[J]. Management Science, 2018, 65(3): 1342-1362. DOI:10.1287/mnsc.2017.2989.
[7] Chen K, Rea A. Protecting personal information online: A survey of user privacy concerns and control techniques [J]. Journal of Computer Information Systems, 2004, 44(4): 85-92. DOI:10.1080/08874417.2004.11647599.
[8] Chellappa R K, Shivendu S. An economic model of privacy: A property rights approach to regulatory choices for online personalization[J]. Journal of Management Information Systems, 2007, 24(3): 193-225. DOI:10.2753/mis0742-1222240307.
[9] Wang T E, Duong T D, Chen C C. Intention to disclose personal information via mobile applications: A privacy calculus perspective[J]. International Journal of Information Management, 2016, 36(4): 531-542. DOI:10.1016/j.ijinfomgt.2016.03.003.
[11] Korzaan M L, Boswell K T. The influence of personality traits and information privacy concerns on behavioral intentions [J]. The Journal of Computer Information Systems, 2008, 48(4): 15-24. DOI: 10.1080/08874417.2008.11646031.
[12] Dinev T, Hart P. Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use [J]. e-Service Journal, 2006, 4(3):25-59. DOI:10.2979/esj.2006.4.3.25.
[13] Bansal G, Zahedi F, Gefen D. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern[J]. European Journal of Information Systems, 2015, 24(6): 624-644. DOI:10.1057/ejis.2014.41.
[14] Smith H J, Milberg S J, Burke S J. Information privacy: Measuring individuals’ concerns about organizational practices [J]. MIS Quarterly, 1996, 20(2):167-196. DOI:10.2307/249477.
[15] Li L. Information sharing in a supply chain with horizontal competition[J]. Management Science, 2002, 48(9): 1196-1212. DOI:10.1287/mnsc.48.9.1196.177.
[16] Lin X L, Wang X Q. Examining gender differences in people’s information-sharing decisions on social networking sites[J]. International Journal of Information Management, 2020, 50: 45-56. DOI:10.1016/j.ijinfomgt.2019.05.004.
[17] Pei Z, Yan R L. Cooperative behavior and information sharing in the e-commerce age[J]. Industrial Marketing Management, 2018, 76: 12-22. DOI:10.1016/j.indmarman.2018.06.013.
[18] Zhang S G, Dan B, Zhou M S. After-sale service deployment and information sharing in a supply chain under demand uncertainty[J]. European Journal of Operational Research, 2019, 279(2): 351-363. DOI:10.1016/j.ejor.2019.05.014.
[19] Chen J Q, Fan M, Li M Z. Advertising versus brokerage model for online trading platforms[J]. MIS Quarterly, 2016, 40(3): 575-596. DOI:10.25300/misq/2016/40.3.03.
[20] Jiang Z J, Heng C S, Choi B C F. Research note: Privacy concerns and privacy-protective behavior in synchronous online social interactions[J]. Information Systems Research, 2013, 24(3): 579-595. DOI:10.1287/isre.1120.0441.
[21] Son J-Y, Kim S S. Internet users’ information privacy-protective responses: A taxonomy and a nomological model[J]. MIS Quarterly, 2008, 32(3): 503-529. DOI:10.2307/25148854.