J. Bateson, E. G. Hui, and M. K. , The Ecological Validity of Photographic Slides and Videotapes in Simulating the Service Setting, Journal of Consumer Research, vol.19, issue.2, pp.271-281, 1992.
DOI : 10.1086/209301

F. Bélanger and L. Carter, Trust and risk in e-government adoption, The Journal of Strategic Information Systems, vol.17, issue.2, pp.165-176, 2008.
DOI : 10.1016/j.jsis.2007.12.002

A. Beldad, M. De-jong, and M. Steehouder, A Comprehensive Theoretical Framework for Personal Information-Related Behaviors on the Internet, The Information Society, vol.47, issue.4, pp.220-232, 2011.
DOI : 10.1080/01972243.2011.583802

L. Brandimarte, A. Acquisti, and G. Loewenstein, Misplaced Confidences, Social Psychological and Personality Science, vol.14, issue.1, pp.340-347, 2013.
DOI : 10.2307/249477

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.3056

J. Cohen, The earth is round (p???<???.05)., American Psychologist, vol.49, issue.12, pp.997-1003, 1994.
DOI : 10.1037/0003-066X.49.12.997

B. Cooper and J. Glaesser, Exploring the robustness of set theoretic findings from a large n fsQCA: an illustration from the sociology of education, International Journal of Social Research Methodology, vol.12, issue.4, 2015.
DOI : 10.1007/978-1-4614-4584-5

T. K. Dijkstra and J. Henseler, Consistent and asymptotically normal PLS estimators for linear structural equations, Computational Statistics & Data Analysis, vol.81, 2015.
DOI : 10.1016/j.csda.2014.07.008

URL : http://doi.org/10.1016/j.csda.2014.07.008

T. K. Dijkstra and J. Henseler, Consistent Partial Least Squares Path Modeling, MIS Quarterly, vol.39, issue.2, pp.297-316, 2015.

P. C. Fiss, Building Better Causal Theories: A Fuzzy Set Approach to Typologies in Organization Research, Academy of Management Journal, vol.54, issue.2, pp.393-420, 2011.
DOI : 10.5465/AMJ.2011.60263120

J. Fogel and E. Nehmad, Internet social network communities: Risk taking, trust, and privacy concerns, Computers in Human Behavior, vol.25, issue.1, pp.153-160, 2009.
DOI : 10.1016/j.chb.2008.08.006

C. Fornell and D. F. Larcker, Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research, vol.18, issue.1, pp.39-50, 1981.
DOI : 10.2307/3151312

E. R. Foxman and P. Kilcoyne, Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues, Journal of Public Policy & Marketing, vol.12, issue.1, pp.106-119, 1993.

A. Goldfarb and C. Tucker, Why Managing Consumer Privacy Can Be an Opportunity, 2013.

J. Henseler, On the convergence of the partial least squares path modeling algorithm, Computational Statistics, vol.5, issue.1, pp.107-120, 2010.
DOI : 10.1007/s00180-009-0164-x

J. Henseler, T. K. Dijkstra, M. Sarstedt, C. M. Ringle, A. Diamantopoulos et al., Common Beliefs and Reality About PLS, Common Beliefs and Reality About PLS: Comments on Rönkkö and Evermann, pp.182-20910, 1177.
DOI : 10.1016/B978-0-12-416550-2.50007-8

J. Henseler, G. Hubona, and P. A. Ray, Using PLS path modeling in new technology research: updated guidelines, Industrial Management & Data Systems, vol.116, issue.1, 2016.
DOI : 10.1086/651257

J. Henseler, C. M. Ringle, and M. Sarstedt, A new criterion for assessing discriminant validity in variance-based structural equation modeling, Journal of the Academy of Marketing Science, vol.27, issue.3, pp.115-13510, 2015.
DOI : 10.1007/s11747-014-0403-8

H. Hotelling, RELATIONS BETWEEN TWO SETS OF VARIATES, Biometrika, vol.28, issue.3-4, pp.321-377, 1936.
DOI : 10.1093/biomet/28.3-4.321

L. T. Hu and P. M. Bentler, Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, pp.1-55, 1999.
DOI : 10.1080/10705519909540118

S. Im, B. L. Bayus, and C. H. Mason, An Empirical Study of Innate Consumer Innovativeness, Personal Characteristics, and New-Product Adoption Behavior, Journal of the Academy of Marketing Science, vol.31, issue.1, pp.61-73100092070302238602, 1177.
DOI : 10.1177/0092070302238602

A. Leischnig and K. Kasper-brauer, Employee Adaptive Behavior in Service Enactments, Journal of Business Research, vol.68, issue.2, 2015.
DOI : 10.1016/j.jbusres.2014.07.008

N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research, vol.15, issue.4, pp.336-355, 2004.
DOI : 10.1287/isre.1040.0032

L. Mccreary, What Was Privacy?, Harvard Business Review, vol.86, issue.10, pp.123-131, 2008.

G. R. Milne, Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue, Journal of Public Policy & Marketing, vol.19, issue.1, 2000.
DOI : 10.1509/jppm.19.1.1.16934

C. Nitzl, J. L. Roldán, and G. Cepeda, Mediation Analyses in Partial Least Squares Structural Equation Modeling, Helping Researchers Discuss More Sophisticated Models: An Abstract, 2016.
DOI : 10.1007/978-3-319-47331-4_130

P. A. Norberg, D. R. Horne, and D. A. Horne, The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors, Journal of Consumer Affairs, vol.14, issue.1 and 2, 2007.
DOI : 10.1111/j.1745-6606.2006.00070.x

J. Nunnally, Psychometric theory, 1978.

A. Ordanini, A. Parasuraman, and G. Rubera, When the Recipe Is More Important Than the Ingredients, Journal of Service Research, vol.36, issue.1, pp.134-149, 2014.
DOI : 10.1177/1094670509351960

P. A. Pavlou, Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, vol.7, issue.3, pp.101-13410, 2003.

J. E. Phelps, G. Souza, and G. J. Nowak, Antecedents and consequences of consumer privacy concerns: An empirical investigation, Journal of Interactive Marketing, vol.15, issue.4, pp.2-17, 2001.
DOI : 10.1002/dir.1019

J. E. Phelps, G. J. Nowak, and E. Ferrell, Privacy Concerns and Consumer Willingness to Provide Personal Information, Journal of Public Policy & Marketing, vol.19, issue.1, pp.27-41, 2000.
DOI : 10.1509/jppm.19.1.27.16941

A. P. Pons and P. Polak, Understanding user perspectives on biometric technology, Communications of the ACM, vol.51, issue.9, pp.115-118, 2008.
DOI : 10.1145/1378727.1389971

S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric recognition: security and privacy concerns, IEEE Security & Privacy Magazine, vol.1, issue.2, pp.33-42, 2003.
DOI : 10.1109/MSECP.2003.1193209

C. C. Ragin, Fuzzy-set social science, 2000.

C. C. Ragin, Set Relations in Social Research: Evaluating Their Consistency and Coverage, Political Analysis, vol.2, issue.03, 2006.
DOI : 10.1017/S0003055402004203

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.548.1019

C. C. Ragin, Redesigning Social inquiry: Fuzzy sets and beyond, 2008.
DOI : 10.7208/chicago/9780226702797.001.0001

URL : http://eprints.ncrm.ac.uk/1849/1/Resdisgning_social_inquiry.pdf

K. K. Seawright and S. E. Sampson, A video method for empirically studying wait-perception bias, Journal of Operations Management, vol.25, issue.5, pp.1055-1066, 2007.
DOI : 10.1016/j.jom.2006.10.006

K. B. Sheehan and M. G. Hoy, Dimensions of Privacy Concern Among Online Consumers, Journal of Public Policy & Marketing, vol.19, issue.1, 2000.
DOI : 10.1509/jppm.19.1.62.16949

S. Spiekermann, J. Grossklags, and B. Berendt, E-privacy in 2nd generation E-commerce, Proceedings of the 3rd ACM conference on Electronic Commerce , EC '01, 2001.
DOI : 10.1145/501158.501163

Q. Tang, J. Bringer, H. Chabanne, and D. Pointcheval, A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, 2008.
DOI : 10.1007/978-3-540-79104-1_5

URL : https://hal.archives-ouvertes.fr/inria-00419156

. Susilo, Information Security Practice and Experience, pp.56-70

L. R. Vijayasarathy, Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model, Information & Management, vol.41, issue.6, 2004.
DOI : 10.1016/j.im.2003.08.011

C. M. Voorhees, M. K. Brady, R. Calantone, and E. Ramirez, Discriminant validity testing in marketing: an analysis, causes for concern, and proposed remedies, Journal of the Academy of Marketing Science, vol.30, issue.3, pp.119-134, 2016.
DOI : 10.1007/s11747-015-0455-4

B. Wang and E. R. Manning, Computer Simulation Modeling for Recreation Management: A Study on Carriage Road Use in Acadia National Park, Maine, USA, Environmental Management, vol.23, issue.2, pp.193-20310, 1999.
DOI : 10.1007/s002679900179

H. Wang, M. K. Lee, and C. Wang, Consumer privacy concerns about Internet marketing, Communications of the ACM, vol.41, issue.3, pp.63-70, 1998.
DOI : 10.1145/272287.272299

S. D. Warren and L. D. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890.
DOI : 10.2307/1321160

A. F. Westin, Privacy and freedom, Washington and Lee Law Review, vol.25, issue.1, p.166, 1968.

J. Wirtz, M. O. Lwin, and J. D. Williams, Causes and consequences of consumer online privacy concern, International Journal of Service Industry Management, vol.18, issue.4, pp.326-348, 2007.
DOI : 10.1037/0022-3514.51.6.1173

A. G. Woodside, Moving beyond multiple regression analysis to algorithms: Calling for adoption of a paradigm shift from symmetric to asymmetric thinking in data analysis and crafting theory, Journal of Business Research, vol.66, issue.4, pp.463-472, 2013.
DOI : 10.1016/j.jbusres.2012.12.021

A. G. Woodside, S. Hsu, and R. Marshall, General theory of cultures' consequences on international tourism behavior, Journal of Business Research, vol.64, issue.8, pp.785-799, 2011.
DOI : 10.1016/j.jbusres.2010.10.008

A. G. Woodside, E. Ko, and T. C. Huan, The new logic in building isomorphic theory of management decision realities, Management Decision, vol.50, issue.5, pp.765-777, 2012.
DOI : 10.1016/0019-8501(81)90015-8