A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005.
DOI : 10.1109/MSP.2005.22

J. C. Anderson and D. W. Gerbing, Structural equation modeling in practice: A review and recommended two-step approach., Psychological Bulletin, vol.103, issue.3, pp.411-423, 1988.
DOI : 10.1037/0033-2909.103.3.411

J. S. Armstrong and T. S. Overton, Estimating Nonresponse Bias in Mail Surveys, Journal of Marketing Research, vol.14, issue.3, pp.396-402, 1977.
DOI : 10.2307/3150783

J. Backhouse and R. Halperin, A survey on EU citizens' trust in ID systems and authorities, Fidis Journal 1, 2007.

G. Bansal, F. M. Zahedi, and D. Gefen, The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online, Decision Support Systems 49, pp.138-150, 2010.

F. Bélanger and R. Crossler, Privacy in the digital age: A review of information privacy research in information systems, MIS Quarterly, vol.35, pp.1017-1041, 2011.

F. Bélanger, J. S. Hiller, and W. J. Smith, Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, The Journal of Strategic Information Systems, vol.11, issue.3-4, pp.245-270, 2002.
DOI : 10.1016/S0963-8687(02)00018-5

C. J. Bennett, Regulating privacy: Data proection and public policy in Europe and the United States, 1992.

T. Buchanan, C. Paine, A. N. Joinson, and U. Reips, Development of measures of online privacy concern and protection for use on the Internet, Journal of the American Society for Information Science and Technology, vol.4, issue.2, pp.157-165, 2007.
DOI : 10.1002/asi.20459

J. Carifio and R. J. Perla, Ten Common Misunderstandings, Misconceptions, Persistent Myths and Urban Legends about Likert Scales and Likert Response Formats and their Antidotes, Journal of Social Sciences, vol.3, issue.3, pp.106-116, 2007.
DOI : 10.3844/jssp.2007.106.116

URL : http://doi.org/10.3844/jssp.2007.106.116

L. Chang, A Psychometric Evaluation of 4-Point and 6-Point Likert-Type Scales in Relation to Reliability and Validity, Applied Psychological Measurement, vol.18, issue.3, pp.205-215, 1994.
DOI : 10.1177/014662169401800302

W. W. Chin, Issues and opinion on structural equation modeling, MIS Quarterly, vol.22, pp.vii-xvi, 1998.

W. W. Chin, The partial least squares approach to structural equation modeling in Marcoulides, G.A. ed. Modern methods for business research, pp.295-336, 1998.

W. W. Chin, B. L. Marcolin, P. R. Newsted, J. B. Thatcher, and R. T. Wright, A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study Assessing common method bias: Problems with the ULMC technique, Information Systems Research MIS Quarterly, vol.14, issue.36, pp.1003-1020, 2003.

P. Chwelos, I. Benbasat, A. S. Dexter, D. R. Compeau, C. A. Higgins et al., Research report: Empirical test of an EDI adoption model Information systems research 12 Social cognitive theory and individual reactions to computing technology: A longitudinal study Consumers-Union, Consumer reports poll: Americans extremely concerned about internet privacy Consumer awareness of name removal procedures: Implications for direct marketing, MIS Quarterly M.J. Culnan Journal of Direct Marketing, vol.17, issue.7, pp.304-321, 1995.

M. J. Culnan and P. K. Armstrong, Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation, Organization Science 10, pp.104-115, 1999.
DOI : 10.1287/orsc.10.1.104

URL : http://bear.warrington.ufl.edu/weitz/mar7786/articles/procedural fairness and privacy.pdf

J. Dawes, Do data characteristics change according to the number of scale points used? An experiment using 5-point, 7-point, and 10-point scales, International Journal of Market Research, vol.50, pp.61-77, 2008.

T. Dinev, M. Bellotto, P. Hart, V. Russo, I. Serra et al., Privacy calculus model in e-commerce ??? a study of Italy and the United States, European Journal of Information Systems, vol.12, issue.4, pp.389-402, 2006.
DOI : 10.1057/palgrave.ejis.3000475

T. Dinev and P. Hart, An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research, vol.17, issue.1, pp.61-80, 2006.
DOI : 10.1287/isre.1060.0080

S. Dolnicar and Y. Jordaan, Protecting consumer privacy in the company's best interest What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies, Australasian Marketing Journal C.J. Dommeyer, B.L. Gross Journal of Interactive Marketing, vol.14, issue.17, pp.39-61, 2003.

E. Inc, Equifax-Harris mid-decade consumer privacy survey Protecting privacy in surveillance societies, 1989.

C. Fornell and D. F. Larcker, Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research, vol.18, issue.1, pp.39-50, 1981.
DOI : 10.2307/3151312

J. F. Hair, C. M. Ringle, M. Sarstedt, and . Pls-sem, PLS-SEM: Indeed a Silver Bullet, The Journal of Marketing Theory and Practice, vol.20, issue.7, pp.139-151, 1982.
DOI : 10.2753/MTP1069-6679190202

G. H. Hofstede, Culture's consequences, international differences in work-related styles, Sage, 1980.

M. B. Holbrook and E. C. Hirschman, The Experiential Aspects of Consumption: Consumer Fantasies, Feelings, and Fun, Journal of Consumer Research, vol.9, issue.2, pp.132-140, 1982.
DOI : 10.1086/208906

J. Hsieh, A. Rai, and M. , Understanding digital inequallity: Comparing contnued user behavioral models of the socio-economically advantaged and disadvantaged, MIS Quarterly, vol.32, pp.97-126, 2008.

J. Jacoby and M. S. , Three-Point Likert Scales Are Good Enough, Journal of Marketing Research, vol.8, issue.4, pp.495-500, 1971.
DOI : 10.2307/3150242

J. Kanter, A nudge on digital privacy law from EU official. The New York Times ed, 2014.

B. Lee, Users' perspective on regulation to protect privacy on the web, International Information and Library Review, vol.32, pp.379-402, 2000.

Y. Li, Empirical studies on online information privacy concerns: Literature review and an integrative framework, Communications of the Association for, Information Systems, vol.28, pp.453-496, 2011.

H. Liang, N. Saraf, Q. Hu, and Y. Xue, Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management, MIS Quarterly, vol.31, pp.59-87, 2007.

J. B. Lohmoller, Latent variables path modeling with partial least squares, Physica, 1989. 44. S. Lohr, The privacy paradox, a challenge for business. The New York Times ed, 2014.

M. Lwin, J. Wirtz, and J. D. Williams, Consumer online privacy concerns and responses: a power???responsibility equilibrium perspective, Journal of the Academy of Marketing Science, vol.44, issue.1, pp.572-585, 2007.
DOI : 10.1007/s11747-006-0003-3

R. O. Mason, Four Ethical Issues of the Information Age, MIS Quarterly, vol.10, issue.1, pp.5-12, 1986.
DOI : 10.2307/248873

R. C. Mayer, J. H. Davis, and F. D. Schoorman, An integrative model of organizational trust, Academy of Management Review, vol.20, pp.709-734, 1995.

D. H. Mcknight, V. Choudhury, and C. Kacmar, Developing and Validating Trust Measures for e-Commerce: An Integrative Typology, Information Systems Research, vol.13, issue.3, pp.334-359, 2002.
DOI : 10.1287/isre.13.3.334.81

S. J. Milberg, H. J. Smith, and S. J. Burke, Information Privacy: Corporate Management and National Regulation, Organization Science, vol.11, issue.1, pp.35-57, 2000.
DOI : 10.1287/orsc.11.1.35.12567

G. R. Milne, A. J. Rohm, and S. Bahl, Consumers??? Protection of Online Privacy and Identity, Journal of Consumer Affairs, vol.20, issue.2, pp.217-232, 2004.
DOI : 10.1111/j.1745-6606.2004.tb00865.x

C. L. Miltgen and D. Peyrat-guillard, Cultural and generational influences on privacy concerns: a qualitative study in seven European countries, European Journal of Information Systems, vol.43, issue.3, pp.103-125, 2013.
DOI : 10.1057/ejis.2013.17

URL : https://hal.archives-ouvertes.fr/hal-01116067

A. N. Mishra and R. Agarwal, Technological Frames, Organizational Capabilities, and IT Use: An Empirical Investigation of Electronic Procurement, Information Systems Research, vol.21, issue.2, pp.249-270, 2010.
DOI : 10.1287/isre.1080.0220

R. Noonan and H. Wold, Evaluating school systems using partial least squares, Evaluation in Education, vol.7, issue.3, pp.219-364, 1983.
DOI : 10.1016/0191-765X(83)90003-4

P. A. Norberg, D. R. Horne, and D. A. Horne, The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors, Journal of Consumer Affairs, vol.14, issue.1 and 2, pp.100-126, 2007.
DOI : 10.1111/j.1745-6606.2006.00070.x

G. J. Nowak and J. Phelps, Direct marketing and the use of individual-level consumer information: Determining how and when ???privacy??? matters, Journal of Direct Marketing, vol.7, issue.3, pp.46-60, 1995.
DOI : 10.1002/dir.4000090307

G. J. Nowak and J. Phelps, Understanding privacy concerns.An assessment of consumers' information-related knowledge and beliefs, Journal of Direct Marketing, vol.4, issue.4, pp.28-39, 1992.
DOI : 10.1002/dir.4000060407

S. Okazaki, H. Li, and M. Hirose, Consumer Privacy Concerns and Preference for Degree of Regulatory Control, Journal of Advertising, vol.38, issue.6, pp.63-77, 2009.
DOI : 10.2753/JOA0091-3367380405

C. Park, M. Keil, and J. W. Kim, The Effect of IT Failure Impact and Personal Morality on IT Project Reporting Behavior, IEEE Transactions on Engineering Management, vol.56, issue.1, pp.45-60, 2009.
DOI : 10.1109/TEM.2008.2009794

Y. J. Park, S. W. Campbell, and N. Kwak, Affect, cognition and reward: Predictors of privacy protection online, Computers in Human Behavior, vol.28, issue.3, pp.2012-1019
DOI : 10.1016/j.chb.2012.01.004

P. Pavlou, State of the information privacy literature: Where we are now and where should we go?, MIS Quarterly, vol.35, pp.977-988, 2011.

P. Podsakoff, S. Mackenzie, J. Lee, and N. Podsakoff, Common method biases in behavioral research: A critical review of the literature and recommended remedies., Journal of Applied Psychology, vol.88, issue.5, pp.879-903, 2003.
DOI : 10.1037/0021-9010.88.5.879

C. Posey, P. B. Lowry, L. P. Robert, and T. S. Ellis, Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities, European Journal of Information Systems, vol.23, issue.4, pp.181-195, 2010.
DOI : 10.1057/ejis.2010.15

J. L. Rasmussen-65, S. Ringle, A. Wende, . F. Will, S. Robinson et al., Analysis of Likert-scale data: A reinterpretation of Gregoire and Driver., Psychological Bulletin, vol.105, issue.1, pp.167-170, 1989.
DOI : 10.1037/0033-2909.105.1.167

N. Singer, Data protection laws, an ocean apart. The New York Times ed, 2013.

H. J. Smith, Information Privacy and Marketing: What the U.S. Should (and Shouldn't) Learn from Europe, California Management Review, vol.19, issue.2, pp.8-33, 1994.
DOI : 10.2307/41166073

H. J. Smith, H. Dinev, and . Xu, Information privacy research: An interdisciplinary review, MIS Quarterly, vol.35, pp.989-1015, 2011.

H. J. Smith, S. J. Milberg, and S. J. Burke, Information Privacy: Measuring Individuals' Concerns about Organizational Practices, MIS Quarterly, vol.20, issue.2, pp.167-196, 1996.
DOI : 10.2307/249477

J. Smith, Privacy policies and practices: inside the organizational maze, Communications of the ACM, vol.36, issue.12, pp.105-122, 1993.
DOI : 10.1145/163298.163349

M. Sobel, Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models, Sociological Methodology, vol.13, pp.290-312, 1982.
DOI : 10.2307/270723

D. W. Straub, Validating Instruments in MIS Research, MIS Quarterly, vol.13, issue.2, pp.147-169, 1989.
DOI : 10.2307/248922

M. Tenenhaus, V. E. Vinzi, Y. Chatelin, and C. Lauro, PLS path modeling, PLS path modeling, pp.159-205, 2005.
DOI : 10.1016/j.csda.2004.03.005

URL : https://hal.archives-ouvertes.fr/hal-00869374

J. Turow, M. Hennessy, and A. Bleakley, Consumers??? Understanding of Privacy Rules in the Marketplace, Journal of Consumer Affairs, vol.59, issue.3, pp.411-424, 2008.
DOI : 10.1111/j.1745-6606.2008.00116.x

H. Van-der-heijden, User acceptance of hedonic information systems, MIS Quarterly, vol.28, pp.695-704, 2004.

A. Vance, C. Elie-dit-cosaque, and D. W. Straub, Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture, Journal of Management Information Systems, vol.24, issue.4, pp.73-100, 2008.
DOI : 10.2753/MIS0742-1222240403

URL : https://hal.archives-ouvertes.fr/halshs-00641137

J. Wirtz, M. Lwin, and J. D. Williams, Causes and consequences of consumer online privacy concern, International Journal of Service Industry Management, vol.18, issue.4, pp.326-348, 2007.
DOI : 10.1108/09564230710778128

H. Wold, Soft modeling: The basic design and some extensions in, Systems under indirect obseration: Part i, pp.1-54, 1982.

H. Xu, T. Dinev, H. J. Smith, and . Hart, Information privacy concerns: Linking individual perceptions with institutional privacy assurances, Journal of the Association of Information Systems, vol.12, pp.798-824, 2011.

H. Xu, H. H. Teo, B. C. Tan, and J. Agarwal, ???Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services, Information Systems Research, vol.23, issue.4, pp.1342-1363, 2009.
DOI : 10.1287/isre.1120.0416

S. Youn, Parental Influence and Teens??? Attitude toward Online Privacy Protection, Journal of Consumer Affairs, vol.49, issue.1, pp.362-388, 2008.
DOI : 10.1111/j.1745-6606.2008.00113.x