<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2026.1605386</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Disclosure decisions: the combined effects of reciprocity, comparisons, and question sequences</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Themistocleous</surname>
<given-names>Christos</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3021586"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Pagiaslis</surname>
<given-names>Anastasios</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Smith</surname>
<given-names>Andrew</given-names>
</name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Hanoch</surname>
<given-names>Yaniv</given-names>
</name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/65350"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>Persuasive Tech Lab, Cyprus University of Technology</institution>, <city>Limassol</city>, <country country="cy">Cyprus</country></aff>
<aff id="aff2"><label>2</label><institution>Marketing, Tourism and Analytics, University of Nottingham</institution>, <city>Nottingham</city>, <country country="gb">United Kingdom</country></aff>
<aff id="aff3"><label>3</label><institution>N-Lab, University of Nottingham</institution>, <state>Nottingham</state>, <country country="gb">United Kingdom</country></aff>
<aff id="aff4"><label>4</label><institution>Wolverhampton Business School, University of Wolverhampton</institution>, <state>Wolverhampton</state>, <country country="gb">United Kingdom</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Christos Themistocleous, <email xlink:href="mailto:cthemistocleous@gmail.com">cthemistocleous@gmail.com</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-03-17">
<day>17</day>
<month>03</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>17</volume>
<elocation-id>1605386</elocation-id>
<history>
<date date-type="received">
<day>03</day>
<month>04</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>02</day>
<month>02</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>23</day>
<month>02</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Themistocleous, Pagiaslis, Smith and Hanoch.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Themistocleous, Pagiaslis, Smith and Hanoch</copyright-holder>
<license>
<ali:license_ref start_date="2026-03-17">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<sec>
<title>Premise</title>
<p>The study examines how different information-collection tools influence individuals&#x2019; voluntary disclosures of sensitive, private information. The individual and combined effects of dyadic relationships comparisons, and question sequences were tested.</p>
</sec>
<sec>
<title>Methods</title>
<p>A 3&#x202F;&#x00D7;&#x202F;3&#x202F;&#x00D7;&#x202F;3 between-subjects main experiment was utilized. Using 27 unique online data collection methods, 1,276 participants were randomly assigned to a condition to measure actual voluntary disclosure using a pre-tested set of 18 questions with varying levels of invasiveness, covering themes such as drug use, sexual preferences, medical conditions, and consumption choices.</p>
</sec>
<sec>
<title>Results</title>
<p>Findings show that invasive questions asked later in the questionnaire maximize divulgence. Using statements to justify the purpose of the information request enhances disclosure percentages. Participants would also mimic the disclosure behavior (or abstention from it) of a majority. Combinations of these factors indicate that disclosure reciprocity is best established by having easy questions asked first. The use of a triple combination was better than the use of these factors individually, except for comparison-inducing messages.</p>
</sec>
<sec>
<title>Discussion</title>
<p>Our findings expand our understanding of how reciprocity can be established in question-based settings (i.e., through chatbots, structured interviews, medical questionnaires, etc.). Implications emerge on aspects that elevate concerns, for example, by overwhelming individuals with information on comparisons and data use. We map interactions and propose future research to further isolate combinations of disclosure techniques as they are more reflective of real-life situations than their isolated examinations.</p>
</sec>
</abstract>
<kwd-group>
<kwd>decision making</kwd>
<kwd>dyadic relationships</kwd>
<kwd>experiment</kwd>
<kwd>privacy</kwd>
<kwd>reciprocity</kwd>
<kwd>sequence effects</kwd>
<kwd>social proof</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="1"/>
<table-count count="3"/>
<equation-count count="0"/>
<ref-count count="43"/>
<page-count count="12"/>
<word-count count="8977"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Personality and Social Psychology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>Modern digital technologies have enabled the collection, storage, and management of large amounts of personal data. From information about patients&#x2019; history to consumers&#x2019; online consumption choices, the advantages of data use range from enhanced organizational and diagnostic decision-making to informed communication types that enhance persuasion. Consumer insights can further inform service development processes (<xref ref-type="bibr" rid="ref6">Babina et al., 2025</xref>), produce psychographic profiles, and enhance personalized attention (<xref ref-type="bibr" rid="ref32">Stremersch et al., 2025</xref>).</p>
<p>Individuals, however, are asked daily to navigate privacy concerns and balance them with customization. The ongoing need to strike a balance between data protection and data sharing can lead consumers to clam-up, avoiding divulgence of information that is to their benefit. These attitudes are further exacerbated by an increasing number of data breach scandals, ranging from Ashley Madison in 2015 to Petco in late 2025. As careful disclosures are of benefit to individuals on occasions such as medical diagnosis, social support, improved financial decisions, and tailored recommendations, insights into their drivers are important points of reflection for psychologists, behavioral economists, and practitioners.</p>
<p>Disclosure research, founded on Social Exchange Theory, identified consumers to be performing cost&#x2013;benefit analyses prior to disclosure opportunities, with prominent models including <italic>privacy calculus</italic> (<xref ref-type="bibr" rid="ref15">Dinev and Hart, 2006</xref>; <xref ref-type="bibr" rid="ref24">Meier and Kr&#x00E4;mer, 2024</xref>). Privacy calculus posits that if the mental process generates a net plus result (benefits exceed costs), self-disclosure occurs. On the one hand, projected concerns from a disclosure include loss of privacy and embarrassment, and on the other hand, physical or psychological compensations such as relational depth, personalization, and monetary reward (<xref ref-type="bibr" rid="ref25">Mikhaeil and James, 2023</xref>; <xref ref-type="bibr" rid="ref35">Themistocleous et al., 2014</xref>).</p>
<p>Such cost&#x2013;benefit models advanced our understanding of disclosure decisions, yet findings from behavioral sciences demonstrate that this mental balancing is <italic>not</italic> always accurate. For example, information asymmetry exacerbates uncertainty in cost&#x2013;benefit analyses, thinning the line between careful and risky disclosures. Experimental findings from <xref ref-type="bibr" rid="ref18">John et al. (2011)</xref> identified a majority of participants to divulge sensitive (and even incriminating) information to unprofessional-looking sites that prompted them to test &#x201C;How bad they were,&#x201D; compared to professional-looking ones of well-known institutions. This clam-up to well-known sites, and over-disclosure to risky ones, can position consumers in vulnerable situations, susceptible to unsolicited data use aiming at misinformation (<xref ref-type="bibr" rid="ref14">D&#x2019;Errico et al., 2024</xref>) or fraudulent exploitation (<xref ref-type="bibr" rid="ref7">Balakrishnan et al., 2025</xref>). This challenges the systematic correctness of disclosure cost&#x2013;benefit models like privacy calculus (<xref ref-type="bibr" rid="ref15">Dinev and Hart, 2006</xref>), disclosure management (<xref ref-type="bibr" rid="ref41">White, 2004</xref>) and other conceptual applications of Social Exchange Theory. Contextual effects in a risky environment can lead to misplaced trust, thereby reducing concerns that would have otherwise weighed on the costs side of the mental scale.</p>
<p>More gaps remain in relative parameters that tip the mental scale of prescribed models toward divulgence, and which the individual might underestimate their effects. For example, the impact of social comparisons is found to affect disclosure patterns greatly. Respondents who were informed of how a majority of others have answered a question divulged more information in subsequent questions within a questionnaire (<xref ref-type="bibr" rid="ref2">Acquisti et al., 2012</xref>). Information that induces social comparisons appears to act as a push mechanism toward mimicking socially desirable behaviors. These examples can explain the privacy paradox where intentions to divulge are extensively mismatched with the actual disclosure decisions of individuals&#x2014;disclosing sensitive information when their stated intentions signal strong avoidance, and vice versa (<xref ref-type="bibr" rid="ref8">Barth and de Jong, 2017</xref>).</p>
<p>Another parameter that appears to covertly affect cost&#x2013;benefit analyses relates to the order in which privacy-related questions are structured. <xref ref-type="bibr" rid="ref26">Moon (2000)</xref> proposes that within a sequence of private questions, questions with low-invasiveness that precede invasive ones stimulate divulgence, albeit opposite results have also been recorded (<xref ref-type="bibr" rid="ref2">Acquisti et al., 2012</xref>).</p>
<p>Finally, an important parameter often overlooked by traditional cost&#x2013;benefit models is dyadic relationships (DRs). This relates to the requester offering a piece of information in return for some information from the participant, thus completing the reciprocity cycle. Research by <xref ref-type="bibr" rid="ref44">Zimmer et al. (2010)</xref> focused on dyadic relationships and established reciprocity by providing a piece of information to the user before asking for a sensitive disclosure (i.e., &#x201C;<italic>WebMD collects gender information since many medical issues are gender specific. What is your gender?</italic>&#x201D;). The reasoned dyadic (RD) relationship, which explained how the information would be used if acquired, facilitated more disclosures among respondents than the condition that offered unrelated statements, as well as when no reciprocity was established.</p>
<p>The literature systematically points to a gap in the examination of parameters often overlooked by traditional cost&#x2013;benefit models. Combinations of such parameters remain underexplored, and their investigations are encouraged (<xref ref-type="bibr" rid="ref26">Moon, 2000</xref>; <xref ref-type="bibr" rid="ref44">Zimmer et al., 2010</xref>). To our knowledge, no previous study has combined the three factors of question sequence (QS), Social Comparisons, and disclosure reciprocity through dyadic relationships (DRs) to assess synergistic effectiveness. Aiming to further our understanding of causal factors of voluntary disclosures, this study addresses the question: Do question sequence effects, social comparison messages, and dyadic relationships work well together, or are they better employed individually when facilitating voluntary disclosures? Through an empirical investigation, we seek to identify combinations of disclosure-facilitating factors that inform the design of information-collection systems, while theoretically bridging the three main streams of literature. We note that this research is interested in actual disclosures, not intentional disclosure, to increase ecological validity. Next, we review relevant research across the three literature streams of interest and establish the main hypotheses.</p>
</sec>
<sec id="sec2">
<label>2</label>
<title>Theoretical background</title>
<sec id="sec3">
<label>2.1</label>
<title>Question sequence effects on disclosures</title>
<p>Question sequence effects refer to the presentation order of questions in a questionnaire and the effects that alternative question sequences might have on responses. Early investigations by the American Marketing Association identified that women&#x2019;s attitudes on advertising were more favorable when questions about dresses preceded them than vice versa (see <xref ref-type="bibr" rid="ref11">Bradburn and Mason, 1964</xref>). They explain that in the first example, initial questions about dresses provide the context for the answers, priming them for the advertising questions that follow. These implications prompted attempts to examine how question order can influence consumer satisfaction with public services, with <xref ref-type="bibr" rid="ref38">Van De Walle and Van Ryzin (2011)</xref> demonstrating significant differences across order sequences. Another study found that sequencing questions to first ask individuals to list positive aspects of their job favorably influences their responses to the more general questions that follow (<xref ref-type="bibr" rid="ref10">Bowling et al., 2009</xref>). The requirement to recall information on certain positive aspects in the first set of questions can serve as points of reference for individuals when addressing follow-up items, thereby creating directional effects (<xref ref-type="bibr" rid="ref19">Kaplan et al., 2013</xref>; <xref ref-type="bibr" rid="ref29">&#x015E;ahin, 2021</xref>).</p>
<p>In the domain of privacy, findings on question sequences also show significant effects on divulgence. <xref ref-type="bibr" rid="ref2">Acquisti et al. (2012)</xref> identified the descending (DES) question sequence (most intrusive questions asked first) to promote greater divulgence on sensitive and embarrassing questions than an ascending order. They propose that this sequence produces a foot-in-the-door effect, thus avoiding a clam-up. They explain that by asking the most invasive questions first, respondents feel less threatened by the lessening degree of privacy-invasiveness, while setting the tone for the survey&#x2019;s level of privacy sensitivity.</p>
<p>Counterintuitive arguments in the literature regarding the relationship between question sequencing and disclosure are also present. <xref ref-type="bibr" rid="ref26">Moon (2000)</xref>, focusing on human&#x2013;computer disclosures, argues that an ascending sequence (ASC) of privacy-invasive questions (easiest questions asked first, followed by difficult ones) facilitates information disclosure. The author explains that easy-to-answer questions early on warm up respondents, thus leading to greater information divulgence in subsequent questions. Subsequent research has adopted this view (<xref ref-type="bibr" rid="ref12">Chandra et al., 2022</xref>; <xref ref-type="bibr" rid="ref43">Zhang et al., 2024</xref>), in trying to increase perceived levels of humanness in discussions with chatbots to facilitate divulgence. Aligned with reciprocity, <xref ref-type="bibr" rid="ref44">Zimmer et al. (2010)</xref> demonstrate that a slow, progressive approach of privacy-invasiveness through question order can better accommodate reciprocity. This line of research makes a case for easy-to-answer questions presented first in questionnaires, as this mimics interpersonal interactions in which questions with a high risk of offending are typically asked later in the discussion. We note that this reasoning also aligns with Social Penetration Theory and the fact that sensitive information is disclosed at the mature stages of a relationship (<xref ref-type="bibr" rid="ref4">Altman and Dalmas, 1973</xref>).</p>
</sec>
<sec id="sec4">
<label>2.2</label>
<title>Comparative nature (CN) and divulgence</title>
<p>Comparisons originate from our basic instinct of imitation and are attributable to our need for social acceptance. In decision-making, following social cues and relying on choices considered to be social defaults are perceived as options that contain less risk and are thus more preferable (<xref ref-type="bibr" rid="ref13">Cialdini, 2021</xref>; <xref ref-type="bibr" rid="ref23">McDonald and Crandall, 2015</xref>; <xref ref-type="bibr" rid="ref42">Zalmanson et al., 2022</xref>). Frequent research applications demonstrate how social comparisons lead individuals toward behavioral adaptation that complies with those around them. Drawing on behavioral economic insights, social comparison nudges (<xref ref-type="bibr" rid="ref9">Baumeister and Leary, 2017</xref>; <xref ref-type="bibr" rid="ref31">Steffel et al., 2016</xref>) were employed, for example, in the United States for improving tax compliance rates. Individuals with outstanding tax balances received official letters informing them of the majority&#x2019;s tax compliance. Procedurally, the social comparison messages disclosed certain information to the non-compliant individuals regarding the compliant behaviors of others, thus inducing comparisons and aiming at a specific behavioral response, that of mimicking the conformed majority.</p>
<p>Although social comparison messages are used in different contexts to influence different behaviors, we also note that adverse behavioral effects are present. <xref ref-type="bibr" rid="ref30">Schultz et al. (2007)</xref> identify occasions where social comparisons can negatively impact energy consumption for consumers who consume significantly less energy than their neighbors. This comparative information created a negative spillover effect, leading individuals to adopt a more relaxed stance toward energy saving, attributable to moral licensing (<xref ref-type="bibr" rid="ref34">Themistocleous and Karapanos, 2025</xref>). Comparative information that positions individuals above others in terms of energy-saving performance can create a sense of achievement toward this moral cause, consequently &#x201C;licensing&#x201D; a more relaxed stance toward it.</p>
<p>Within disclosure settings, herding effects were recorded in security behaviors for privacy. By showing participants the most popular security practices, participants tended to accept and mimic these healthy behaviors (<xref ref-type="bibr" rid="ref39">Vedadi and Warkentin, 2020</xref>). <xref ref-type="bibr" rid="ref2">Acquisti et al. (2012)</xref> further capitalized on the innate human tendency of comparison. They examined how statements, presented as histograms, reflecting how others answered sensitive questions (admitted to have engaged/not admitted to have engaged) would influence participants&#x2019; admission, subjected to these comparisons. Admittance and thus disclosure were higher when the individual was given a histogram of a majority that admitted to the same fact. They argue that admissions by others can reduce one&#x2019;s perceived risks and, consequently, facilitate self-disclosure.</p>
</sec>
<sec id="sec5">
<label>2.3</label>
<title>Disclosure reciprocity through dyadic relationships</title>
<p>Early research describes reciprocity as the mutuality of offering something back to someone who has provided you with something of value (<xref ref-type="bibr" rid="ref16">Gouldner, 1960</xref>). Reciprocity serves as a major persuasion technique that can circumvent traditional cost&#x2013;benefit analyses as proposed by respective models, aiming to retain mutuality between actors in an act or transaction. In disclosure settings, reciprocity indicates that people will disclose information in response to information previously revealed by another party.</p>
<p><xref ref-type="bibr" rid="ref26">Moon (2000)</xref> applied reciprocity in the process of self-disclosure, monitoring how social cues can influence user responses and treat computers as social actors. She further experimented with providing information before each question, about the computers&#x2019; configuration and speed, in an attempt to facilitate reciprocity. By providing information before a request for disclosure was made, she aimed to facilitate disclosure reciprocity. An example of the exchange is the following: &#x201C;This computer has been configured to run at speeds up to 266&#x202F;MHz. But 90% of computer users don&#x2019;t use applications that require these speeds. So this computer rarely gets used to its full potential. What has been your biggest disappointment in life?&#x201D; (p. 326). Results show the latter reciprocity-facilitating condition led to more self-disclosures than its absence (being presented only with questions).</p>
<p>More recent evidence echoes these findings and shows that chatbots using reciprocity triggers, such as providing useful information to the user (email addresses that would be of value to them), resulted in an increased probability that they would reciprocate by disclosing their email addresses (<xref ref-type="bibr" rid="ref3">Adam and Benlian, 2024</xref>). This disclosure effect was significant compared to the absence of reciprocity. <xref ref-type="bibr" rid="ref44">Zimmer et al. (2010)</xref> expanded on <xref ref-type="bibr" rid="ref26">Moon&#x2019;s (2000)</xref> study by delving deeper into different conditions of reciprocity examined through the concept of dyadic relationships, which refers to one-for-one information exchanges. They define dyadic conditions as the ability to build relationships between two parties involved in a survey by having the survey conductor provide a piece of information with every question asked to the respondent and request a piece of information in return. The objective was to facilitate reciprocity and to test, specifically, the reasoned dyadic condition for enhancing data collection systems.</p>
<p>Their dyadic condition tested whether the information offered justified the reasons for the asked question and whether this could facilitate more disclosures than an unreasoned dyadic (UNREA) condition or its absence (non-dyadic [NONDR]). An example of a reasoned dyadic condition would be &#x201C;For optimal health, people should see a general practitioner at least once a year. How long has it been since you have seen a doctor?&#x201D; (p. 405). The first part related to the reasoned statement, the latter to the request. Zimmer et al.&#x2019;s results indicate that the reasoned condition has a stronger moderation of the relationship between disclosure intention and disclosure probability than the unreasoned and non-dyadic conditions. They explain that in the latter exchange, the information offered informs and prepares the respondent for the questions that follow by justifying the benefits and uses of disclosed data, alleviating concerns in the process. As such, a reasoned dyadic relationship not only establishes reciprocity but also aims at tackling information asymmetry by explaining to respondents how their data will be used.</p>
</sec>
<sec id="sec6">
<label>2.4</label>
<title>Hypotheses</title>
<p>This study is designed to examine how combinations of the three disclosure-facilitating factors (question sequence, comparative nature, and dyadic relationship) favor voluntary disclosures. This approach aligns well with contemporary perspectives on online interaction, where users are simultaneously exposed to normative cues, comparison-based information, and attempts to establish reciprocity.</p>
<p>The first hypothesis re-examines the high-level conditions of each examined factor deductively. By high-level, we refer to conditions that were previously studied and found to yield the most disclosed information compared to their alternative conditions. Specifically, for the question sequence, we hypothesize that the ascending sequence of invasiveness serves as the high-level condition. We base this on two main premises. First, we consider <xref ref-type="bibr" rid="ref26">Moon&#x2019;s (2000)</xref> and <xref ref-type="bibr" rid="ref44">Zimmer et al.&#x2019;s (2010)</xref> proposition on how warm-up questions preceding invasive ones can prepare individuals for the more difficult disclosures that follow. Second, following <xref ref-type="bibr" rid="ref19">Kaplan et al.&#x2019;s (2013)</xref> and <xref ref-type="bibr" rid="ref10">Bowling et al.&#x2019;s (2009)</xref> reasoning, we argue that initial negative perceptions toward a survey with very invasive questions at the start (thus a higher chance of disclosure avoidance) can have a directional effect on the responses toward less invasive questions that follow. This can lead to consumer clam-up as disclosure avoidance for the initial invasive questions can manifest in the subsequent easy-to-answer questions.</p>
<p>For comparative purposes, we base the high-level condition on <xref ref-type="bibr" rid="ref2">Acquisti et al.&#x2019;s (2012)</xref> work. Specifically, we consider here the high comparative nature (HIGHCN) condition, which leads individuals to believe that a majority disclosed the requested information.</p>
<p>For dyadic relationships, we adopt <xref ref-type="bibr" rid="ref44">Zimmer et al.&#x2019;s (2010)</xref> view on reasoned dyadic statements. Their findings supported the use of acquired data to facilitate more disclosures than the unreasoned condition (unstructured reciprocity) or the non-dyadic condition (absence of reciprocity). As the flow of the conversation requires both parties to disclose relevant information on the topic with matching quality and quantity for reciprocity establishment (<xref ref-type="bibr" rid="ref4">Altman and Dalmas, 1973</xref>), we note that the reasoned dyadic complies more fully with this principle. Formally, for the three high-level conditions, we hypothesize as follows:</p>
<disp-quote>
<p><italic>H1:</italic> The ascending sequence (ASC), high comparative nature (HIGHCN), and reasoned dyadic (REA) conditions will result in more actual disclosures than the alternative conditions of each concept, respectively.</p>
</disp-quote>
<p>Next, we combine these factors to assess their synergistic effect on divulgence. A previous study has examined each of the three factors in isolation. Research proposes the value of triangulations for disclosure-facilitating concepts, acknowledging that a gap remains for empirical investigation (<xref ref-type="bibr" rid="ref44">Zimmer et al., 2010</xref>; <xref ref-type="bibr" rid="ref26">Moon, 2000</xref>). H2 seeks to address this gap. We hypothesize that the synergy among the three high-level conditions of each factor will yield more disclosures than the individual use of each high-level condition. Formally:</p>
<disp-quote>
<p><italic>H2:</italic> Combining ascending sequence (ASC), high comparative nature (HIGHCN), and reasoned dyadic (REA) conditions, will result in more actual disclosures than their isolated use.</p>
</disp-quote>
</sec>
</sec>
<sec id="sec7">
<label>3</label>
<title>Research methods</title>
<p>To test our hypotheses, we conducted a 3&#x202F;&#x00D7;&#x202F;3&#x202F;&#x00D7;&#x202F;3 quasi-experiment. The three conditions for each of the three examined factors (question sequence, comparative nature, and dyadic relationship) served as the main points of interest, allowing us to identify how individual and combined effects favored against disclosures. The information items were presented in accordance with their respective conditions, resulting in 27 presentation techniques. Each was tested using a distinct online survey with the process explained below.</p>
<sec id="sec8">
<label>3.1</label>
<title>Development of privacy-related questions</title>
<p>To develop questions that capture respondents&#x2019; personal information, we drew on relevant literature (<xref ref-type="bibr" rid="ref2">Acquisti et al., 2012</xref>; <xref ref-type="bibr" rid="ref44">Zimmer et al., 2010</xref>) and sought input from three faculty members at a UK university to assess the diversity of themes. A list of 18 questions was drawn up with varying levels of sensitivity to create a more dynamic set of privacy-invasiveness. The themes ranged from consumption choices and minor embarrassing information for milder questions to sexual preferences and serious medical conditions for the more invasive ones. To ensure varying levels of invasiveness, we pre-tested the 18 items and measured the perceived level of privacy-invasiveness. This allowed us to structure question sequences by escalating or de-escalating invasiveness accordingly. A total of 122 UK-based participants served as our pre-test sample (<italic>N</italic>&#x202F;=&#x202F;122; <italic>m</italic><sub>age</sub>&#x202F;=&#x202F;32.68; <italic>&#x03C3;</italic><sub>age</sub>&#x202F;=&#x202F;10.81; 50% men and 50% women; and 75.41% Caucasian). A 10-point semantic differential scale (10 being very privacy-invasive) was used in alignment with the literature on optimum response categories (<xref ref-type="bibr" rid="ref28">Preston and Colman, 2000</xref>). Amazon vouchers were used as incentives. This process allowed us to rank the 18 questions based on perceived invasiveness. Results of the 18 privacy-related items are summarized in <xref rid="SM1" ref-type="supplementary-material">Appendix I</xref>.</p>
</sec>
<sec id="sec9">
<label>3.2</label>
<title>Conditions and questionnaire structure</title>
<p>Operationalization of the independent variables (question sequence, comparative nature, and dyadic relationship) involved the three conditions of each. <xref ref-type="fig" rid="fig1">Figure 1</xref> provides a visual representation of the design and synthesis of the 27 conditions. Specifically, the question sequence (QS) utilized three conditions: the ascending (ASC) order condition presented the least invasive question at the beginning of the questionnaire. The descending (DES) order condition presented the most privacy-invasive questions at the start of the questionnaire (order as seen in <xref rid="SM1" ref-type="supplementary-material">Appendix I</xref>), and a random (RAN) order, which did not resemble any of the other two orders, ensuring that no apparent privacy-invasiveness (de)escalation was recorded, and thus a truly random sequence was in place.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Synthesis of the 27 data collection designs.</p>
</caption>
<graphic xlink:href="fpsyg-17-1605386-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Diagram illustrating an experimental design with one dependent variable, Overall Actual Disclosure, and three independent variables: Question Sequence, Comparative Nature, and Disclosure Reciprocity; each has three conditions resulting in twenty-seven total data collection designs.</alt-text>
</graphic>
</fig>
<p>For the comparative nature (CN), three conditions were employed, and each question was accompanied by disclosure patterns from a fictional pool of participants. This was used to trigger comparisons and test whether knowing about the patterns of others facilitated mimicking behavior for disclosures (<xref ref-type="bibr" rid="ref2">Acquisti et al., 2012</xref>). In the high comparative nature condition (HIGHCN), participants were given messages informing them that the disclosure percentage of others was above the 90% disclosure mark (i.e., 96% of participants disclosed the following information; How many sexual partners have you had since you became sexually active?). The low comparative nature (LOWCN) condition offered disclosure percentages of others that were below the 45% mark (i.e., 38% disclosed the following information; How many sexual partners have you had since you became sexually active?). In the absence of a comparative nature [non-comparative nature (NONCN)], no information was provided regarding the response patterns of others. <xref rid="SM1" ref-type="supplementary-material">Appendix II</xref> summarizes the comparison-inducing percentages (how many people divulged and how many did not) in each respective condition.</p>
<p>Dyadic relationships (DRs) utilized three conditions. A total of 18 statements were presented to participants&#x2014;one before each of the 18 questions. The reasoned dyadic (REA) condition provided statements that explained the direct reasons for requiring the asked information. For example, &#x201C;The objective of this question is to assess how often you travel abroad and update you with offers and reduced travel prices. How many times a year you travel abroad either for holidays or business?&#x201D; For the unreasoned (UNREA) condition, statements preceded each question, providing participants with information that had no direct relevance to the asked question and were used to assess the effectiveness of the unreasoned reciprocity pattern as proposed by <xref ref-type="bibr" rid="ref44">Zimmer et al. (2010)</xref>. For example, &#x201C;Our company operates in 17 countries including the UK, Cyprus, Italy and Spain. How many times a year you travel abroad either for holidays or business?&#x201D; Finally, for the non-dyadic relationship (NONDR), no information regarding the use of information was provided and disclosure reciprocity was absent. <xref rid="SM1" ref-type="supplementary-material">Appendix III</xref> summarizes the reciprocity statements provided in each condition.</p>
</sec>
<sec id="sec10">
<label>3.3</label>
<title>Participants</title>
<p>UK participants were recruited via Prolific and compensated for their time at a rate of 8 pounds per hour. Controlling for demographic consistency between conditions and meeting respective quota requirements (i.e., age and gender), a total of 1,415 participants were recruited. Of the 1,415 participants, 139 responses were excluded due to incomplete or prolonged completion time. A final sample of 1,276 participants was used for our main analysis (<italic>N</italic>&#x202F;=&#x202F;1,276; <italic>m</italic><sub>age</sub>&#x202F;=&#x202F;26.73; <italic>&#x03C3;</italic><sub>age</sub>&#x202F;=&#x202F;8.85; 51.65% men and 48.35% women; and 86.71% Caucasian). Each respondent was randomly assigned to a single condition with an average of 47 participants per condition. Completion time was around 15&#x202F;min. We conducted demographic consistency checks for age and gender to ensure that samples across conditions were similar and thus conditions were comparable. Analysis of variance (ANOVA) results for age demonstrated no significant differences between conditions; <italic>F</italic>(2,1,273)&#x202F;=&#x202F;1.253, <italic>p</italic>&#x202F;=&#x202F;0.178. A chi-squared test demonstrated no significant differences between conditions for gender; <italic>&#x03C7;</italic><sup>2</sup>(26)&#x202F;=&#x202F;22.880, <italic>p</italic>&#x202F;=&#x202F;0.640. Participants&#x2019; demographics and distribution for each condition are summarized in <xref ref-type="table" rid="tab1">Table 1</xref>.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Participant demographics per condition.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Condition</th>
<th align="center" valign="top">Participants</th>
<th align="center" valign="top">Men (%)</th>
<th align="center" valign="top">Women (%)</th>
<th align="center" valign="top">Age mean</th>
<th align="left" valign="top">Code</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">1</td>
<td align="center" valign="top">53</td>
<td align="center" valign="top">51</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">27.11</td>
<td align="left" valign="top">DES-NONCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">2</td>
<td align="center" valign="top">43</td>
<td align="center" valign="top">56</td>
<td align="center" valign="top">44</td>
<td align="center" valign="top">26.98</td>
<td align="left" valign="top">DES-NONCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">3</td>
<td align="center" valign="top">46</td>
<td align="center" valign="top">43</td>
<td align="center" valign="top">57</td>
<td align="center" valign="top">27.78</td>
<td align="left" valign="top">DES-NONCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">4</td>
<td align="center" valign="top">65</td>
<td align="center" valign="top">45</td>
<td align="center" valign="top">55</td>
<td align="center" valign="top">25.20</td>
<td align="left" valign="top">DES-LOWCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">5</td>
<td align="center" valign="top">44</td>
<td align="center" valign="top">73</td>
<td align="center" valign="top">27</td>
<td align="center" valign="top">26.41</td>
<td align="left" valign="top">DES-LOWCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">6</td>
<td align="center" valign="top">54</td>
<td align="center" valign="top">57</td>
<td align="center" valign="top">43</td>
<td align="center" valign="top">26.15</td>
<td align="left" valign="top">DES-LOWCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">7</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">59</td>
<td align="center" valign="top">41</td>
<td align="center" valign="top">27.92</td>
<td align="left" valign="top">DES-HIGHCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">8</td>
<td align="center" valign="top">39</td>
<td align="center" valign="top">41</td>
<td align="center" valign="top">59</td>
<td align="center" valign="top">27.85</td>
<td align="left" valign="top">DES-HIGHCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">9</td>
<td align="center" valign="top">44</td>
<td align="center" valign="top">45</td>
<td align="center" valign="top">55</td>
<td align="center" valign="top">26.41</td>
<td align="left" valign="top">DES-HIGHCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">10</td>
<td align="center" valign="top">43</td>
<td align="center" valign="top">56</td>
<td align="center" valign="top">44</td>
<td align="center" valign="top">28.88</td>
<td align="left" valign="top">ASC-NONCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">11</td>
<td align="center" valign="top">45</td>
<td align="center" valign="top">53</td>
<td align="center" valign="top">47</td>
<td align="center" valign="top">24.67</td>
<td align="left" valign="top">ASC-NONCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">12</td>
<td align="center" valign="top">47</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">51</td>
<td align="center" valign="top">25.04</td>
<td align="left" valign="top">ASC-NONCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">13</td>
<td align="center" valign="top">48</td>
<td align="center" valign="top">50</td>
<td align="center" valign="top">50</td>
<td align="center" valign="top">26.33</td>
<td align="left" valign="top">ASC-LOWCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">14</td>
<td align="center" valign="top">48</td>
<td align="center" valign="top">54</td>
<td align="center" valign="top">46</td>
<td align="center" valign="top">24.83</td>
<td align="left" valign="top">ASC-LOWCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">15</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">53</td>
<td align="center" valign="top">47</td>
<td align="center" valign="top">26.94</td>
<td align="left" valign="top">ASC-LOWCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">16</td>
<td align="center" valign="top">45</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">51</td>
<td align="center" valign="top">27.09</td>
<td align="left" valign="top">ASC-HIGHCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">17</td>
<td align="center" valign="top">59</td>
<td align="center" valign="top">59</td>
<td align="center" valign="top">41</td>
<td align="center" valign="top">27.93</td>
<td align="left" valign="top">ASC-HIGHCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">18</td>
<td align="center" valign="top">47</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">51</td>
<td align="center" valign="top">24.23</td>
<td align="left" valign="top">ASC-HIGHCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">19</td>
<td align="center" valign="top">37</td>
<td align="center" valign="top">57</td>
<td align="center" valign="top">43</td>
<td align="center" valign="top">29.11</td>
<td align="left" valign="top">RAN-NONCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">20</td>
<td align="center" valign="top">54</td>
<td align="center" valign="top">56</td>
<td align="center" valign="top">44</td>
<td align="center" valign="top">28.22</td>
<td align="left" valign="top">RAN-NONCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">21</td>
<td align="center" valign="top">41</td>
<td align="center" valign="top">51</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">25.34</td>
<td align="left" valign="top">RAN-NONCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">22</td>
<td align="center" valign="top">40</td>
<td align="center" valign="top">38</td>
<td align="center" valign="top">62</td>
<td align="center" valign="top">24.78</td>
<td align="left" valign="top">RAN-LOWCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">23</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">45</td>
<td align="center" valign="top">55</td>
<td align="center" valign="top">27.98</td>
<td align="left" valign="top">RAN-LOWCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">24</td>
<td align="center" valign="top">47</td>
<td align="center" valign="top">51</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">27.91</td>
<td align="left" valign="top">RAN-LOWCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">25</td>
<td align="center" valign="top">49</td>
<td align="center" valign="top">47</td>
<td align="center" valign="top">53</td>
<td align="center" valign="top">25.18</td>
<td align="left" valign="top">RAN-HIGHCN-NONDR</td>
</tr>
<tr>
<td align="left" valign="top">26</td>
<td align="center" valign="top">46</td>
<td align="center" valign="top">50</td>
<td align="center" valign="top">50</td>
<td align="center" valign="top">26.89</td>
<td align="left" valign="top">RAN-HIGHCN-UNREA</td>
</tr>
<tr>
<td align="left" valign="top">27</td>
<td align="center" valign="top">45</td>
<td align="center" valign="top">56</td>
<td align="center" valign="top">44</td>
<td align="center" valign="top">29.16</td>
<td align="left" valign="top">RAN-HIGHCN-REA</td>
</tr>
<tr>
<td align="left" valign="top">Total</td>
<td align="center" valign="top">1,276</td>
<td align="center" valign="top">51.6</td>
<td align="center" valign="top">48.4</td>
<td align="center" valign="top">26.73</td>
<td/>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>DES, descending order of privacy-invasiveness; ASC, ascending order of privacy-invasiveness; RAN, random order of privacy-invasiveness; HIGHCN, high comparative nature; LOWCN, low comparative nature; NONCN, non-comparative nature; REA, reasoned dyadic; UNREA, unreasoned dyadic; NONDR, non-dyadic.</p>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec11">
<label>3.4</label>
<title>Dependent variable</title>
<p>Once assigned to a condition, participants were asked to answer the 18 information items. A non-disclosure option was provided throughout the questionnaire to allow preference of avoidance and facilitate voluntary disclosures. We coded all responses as &#x201C;1&#x201D; for disclosure and &#x201C;0&#x201D; for non-disclosure, thus generating a percentage for each condition based on how many of the 18 questions were answered. This percentage [called overall actual disclosure (OAD)] was treated as the dependent variable in our study. To help mitigate inaccurate responses, we explicitly mentioned during the briefing the importance of truthful answers, reminding participants of making use of the &#x201C;prefer not to disclose&#x201D; option when feeling uneasy about a question, instead of falsifying information. Respondent anonymity was emphasized in the brief to mitigate social desirability bias. Although the intrusive and embarrassing questions are less frequent in organizational settings, the causal factors examined here influence decision-making about other, more general, and expectedly easier-to-answer privacy-related questions. We note that the use of sensitive questions to assess the impact of situational factors on divulgence is a widely used methodology in disclosure research settings (<xref ref-type="bibr" rid="ref2">Acquisti et al., 2012</xref>; <xref ref-type="bibr" rid="ref18">John et al., 2011</xref>; <xref ref-type="bibr" rid="ref26">Moon, 2000</xref>; <xref ref-type="bibr" rid="ref27">Norberg et al., 2007</xref>; <xref ref-type="bibr" rid="ref44">Zimmer et al., 2010</xref>).</p>
</sec>
<sec id="sec12">
<label>3.5</label>
<title>Procedure</title>
<p>To provide a clear context for recording answers, a scenario about a fictional data-capturing company was included in the study. The scenario indicated &#x201C;<italic>DataACC, an organization whose main activities revolve around the acquisition of personal information, asks you the following 18 questions.</italic>&#x201D; This was to mitigate an issue identified in the pilot study about the context and the entity that required their data. To enhance the study&#x2019;s realistic nature, the scenario simulated a business setting, thus avoiding purposeful reduction of caution by respondents when addressing data-capturing questions (i.e., disclosures toward the organization of the principal investigator summarized in the first page). The questionnaire was designed in Qualtrics for online administration, enabling the randomization of items and making the administration of the 27 different conditions convenient. Both the pre-test and main study were granted approval by the Research Ethics Committee of a UK University [University of Nottingham].</p>
</sec>
</sec>
<sec id="sec13">
<label>4</label>
<title>Analyses</title>
<sec id="sec14">
<label>4.1</label>
<title>Hypothesis testing</title>
<p>For testing <italic>H1</italic>, we employed three one-way ANOVA test results where OAD served as the dependent variable, and each factor (QS, CN, and DR) served as the independent variable, respectively. <italic>Post hoc</italic> tests were accommodated each analysis, with results summarized in <xref ref-type="table" rid="tab2">Table 2</xref>. For <italic>H1</italic> and question sequence, results were significant with <italic>F</italic>(2, 1,273)&#x202F;=&#x202F;9.259, <italic>p</italic>&#x202F;=&#x202F;0.000. <italic>Post hoc</italic> examinations identified the ascending order of privacy-invasiveness (easy-first-difficult-later) to be generating significantly higher OAD than the other two conditions of descending (difficult-first-easy-later) and random order, with the Tukey statistic being <italic>p</italic>&#x202F;&#x003C;&#x202F;0.001 and <italic>p</italic>&#x202F;&#x003C;&#x202F;0.05, respectively. No significant differences were found between the DES and RAN orders (<italic>p</italic>&#x202F;=&#x202F;0.205). The latter indicates that a structured descending order, compared to an unstructured random order, generated statistically identical disclosures.</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>ANOVA results.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="top" colspan="8">Individual interactions</th>
</tr>
<tr>
<th align="left" valign="top">Independent</th>
<th align="center" valign="top">Dependent</th>
<th align="center" valign="top">
<italic>F</italic>
</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
<th align="left" valign="top">Condition</th>
<th align="center" valign="top">Mean (%)</th>
<th align="left" valign="top">Between groups</th>
<th align="center" valign="top"><italic>Post-hoc</italic> significance (Tukey HSD)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" rowspan="3">OAD</td>
<td align="center" valign="top" rowspan="3">QS</td>
<td align="char" valign="top" char="." rowspan="3">9.259</td>
<td align="char" valign="top" char="." rowspan="3">&#x003C;0.000<xref ref-type="table-fn" rid="tfn1"><sup>a</sup></xref></td>
<td align="left" valign="top">ASC<xref ref-type="table-fn" rid="tfn4"><sup>d</sup></xref></td>
<td align="char" valign="top" char=".">93.89</td>
<td align="left" valign="top">ASC&#x202F;&#x00D7;&#x202F;DES</td>
<td align="char" valign="top" char=".">0.000<xref ref-type="table-fn" rid="tfn1"><sup>a</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top">DES</td>
<td align="char" valign="top" char=".">89.75</td>
<td align="left" valign="top">ASC&#x202F;&#x00D7;&#x202F;RAN</td>
<td align="char" valign="top" char=".">0.033<xref ref-type="table-fn" rid="tfn2"><sup>b</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top">RAN</td>
<td align="char" valign="top" char=".">91.42</td>
<td align="left" valign="top">DES&#x202F;&#x00D7;&#x202F;RAN</td>
<td align="char" valign="top" char=".">0.205</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="3">OAD</td>
<td align="center" valign="top" rowspan="3">CN</td>
<td align="char" valign="top" char="." rowspan="3">11.074</td>
<td align="char" valign="top" char="." rowspan="3">&#x003C;0.000<xref ref-type="table-fn" rid="tfn1"><sup>a</sup></xref></td>
<td align="left" valign="top">HIGHCN<xref ref-type="table-fn" rid="tfn4"><sup>d</sup></xref></td>
<td align="char" valign="top" char=".">93.97</td>
<td align="left" valign="top">HIGHCN &#x00D7; LOWCN</td>
<td align="char" valign="top" char=".">0.000<xref ref-type="table-fn" rid="tfn1"><sup>a</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top">LOWCN</td>
<td align="char" valign="top" char=".">89.43</td>
<td align="left" valign="top">HIGHCN &#x00D7; NONCN</td>
<td align="char" valign="top" char=".">0.066<xref ref-type="table-fn" rid="tfn3"><sup>c</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top">NONCN</td>
<td align="char" valign="top" char=".">91.77</td>
<td align="left" valign="top">LOWCN &#x00D7; NONCN</td>
<td align="char" valign="top" char=".">0.043<xref ref-type="table-fn" rid="tfn2"><sup>b</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top" rowspan="3">OAD</td>
<td align="center" valign="top" rowspan="3">DR</td>
<td align="char" valign="top" char="." rowspan="3">3.775</td>
<td align="char" valign="top" char="." rowspan="3">&#x003C;0.023<xref ref-type="table-fn" rid="tfn2"><sup>b</sup></xref></td>
<td align="left" valign="top">REA<xref ref-type="table-fn" rid="tfn4"><sup>d</sup></xref></td>
<td align="char" valign="top" char=".">93.25</td>
<td align="left" valign="top">REA&#x202F;&#x00D7;&#x202F;UNREA</td>
<td align="char" valign="top" char=".">0.042<xref ref-type="table-fn" rid="tfn2"><sup>b</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top">UNREA</td>
<td align="char" valign="top" char=".">90.88</td>
<td align="left" valign="top">REA&#x202F;&#x00D7;&#x202F;NON</td>
<td align="char" valign="top" char=".">0.050<xref ref-type="table-fn" rid="tfn3"><sup>c</sup></xref></td>
</tr>
<tr>
<td align="left" valign="top">NONDR</td>
<td align="char" valign="top" char=".">91.95</td>
<td align="left" valign="top">UNREA &#x00D7; NON</td>
<td align="char" valign="top" char=".">0.997</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="tfn1">
<label>a</label>
<p>Significant at <italic>p</italic>&#x202F;&#x003C;&#x202F;0.001.</p>
</fn>
<fn id="tfn2">
<label>b</label>
<p>Significant at <italic>p</italic>&#x202F;&#x003C;&#x202F;0.05.</p>
</fn>
<fn id="tfn3">
<label>c</label>
<p>Significant at <italic>p</italic>&#x202F;&#x003C;&#x202F;0.10.</p>
</fn>
<fn id="tfn4">
<label>d</label>
<p>Hypothesized high-level condition.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>For comparative messages (CN), the ANOVA results were also significant [<italic>F</italic>(2, 1,273)&#x202F;=&#x202F;11.074, <italic>p</italic>&#x202F;=&#x202F;0.000]. The HIGHCN, which told participants that others disclosed at a high rate (i.e., 96% of others disclosed the following question) resulted in the highest OAD, demonstrating that statements that triggered comparisons led to significantly greater mimicking of others&#x2019; disclosure patterns. Here, comparative information offered <italic>a priori</italic> to each question behaves consistently with the patterns of ones offered <italic>posteriori</italic> as reported in <xref ref-type="bibr" rid="ref2">Acquisti et al.&#x2019;s (2012)</xref> experiments and expands the application of social comparison messages. Actual disclosure in the HIGHCN was significantly higher than the LOWCN (Tukey: <italic>p</italic>&#x202F;=&#x202F;0.000) and the NONCN (Tukey: <italic>p</italic>&#x202F;=&#x202F;&#x2212;0.066). Interestingly, LOWCN generated the lowest OAD even when compared to the NONCN (Tukey: <italic>p</italic>&#x202F;=&#x202F;0.043), where comparative messages were absent, and no comparative information was provided. The latter denotes that participants mimicked the majority&#x2019;s disclosure avoidance, demonstrating a two-way effect of comparisons in disclosure settings.</p>
<p>Dyadic relationships significantly influenced OAD [<italic>F</italic>(2, 1,273)&#x202F;=&#x202F;3.775, <italic>p</italic>&#x202F;=&#x202F;0.023]. <italic>Post hoc</italic> findings for the dyadic relationships examination showed that the Reasoned Dyadic, which provided information to the respondent on how the acquired data would be used, significantly increased disclosures compared to the Non-Dyadic (Tukey: <italic>p</italic>&#x202F;=&#x202F;0.05) and the unreasoned dyadic (Tukey: <italic>p</italic>&#x202F;=&#x202F;0.04) conditions. The unreasoned dyadic condition, which provided irrelevant pieces of information to participants, had no differences between the Non-Dyadic (Tukey: <italic>p</italic>&#x202F;=&#x202F;0.997), indicating that irrelevant information to the asked question creates statistically similar disclosure effects as their complete absence. Findings here provide support for <italic>H1</italic>, identifying the ascending order, high comparative nature, and reasoned dyadic conditions as the high-level conditions for each of the examined factors, respectively (QS, CN, and DR).</p>
<p>For testing <italic>H2</italic>, we isolated the condition that combined all three high-levels, namely, ASC-HIGHCN-REA, and compared its overall actual disclosure with those generated by the three isolated conditions, namely, ASC, HIGHCN, and REA. The objective here was to examine whether a combination of the three high-level conditions worked better than <italic>individually</italic> applying them.</p>
<p>We conducted multiple comparisons using unpaired <italic>t</italic>-tests. Results are summarized in <xref ref-type="table" rid="tab3">Table 3</xref> under triple interactions. The high-level triple combination (ASC-HIGHCN-REA) generated significantly higher OAD than the isolated employment of ASC (<italic>p</italic>&#x202F;=&#x202F;0.000; Cohen&#x2019;s <italic>d</italic>&#x202F;=&#x202F;0.456) and REA (<italic>p</italic>&#x202F;=&#x202F;0.02; Cohen&#x2019;s <italic>d</italic>&#x202F;=&#x202F;0.472), respectively, but not with HIGHCN (<italic>p</italic>&#x202F;=&#x202F;0.598; Cohen&#x2019;s <italic>d</italic>&#x202F;=&#x202F;0.109). This suggests that the triple combination should be preferred over the individual use of the ascending order and reasoned dyadic conditions. Nevertheless, the triple combination did not significantly outperform the isolated condition of high comparative nature. This means that combining social comparison messages with a question sequence and dyadic relationship improved actual disclosures only partially compared to when using them in isolation, thus providing only partial support for <italic>H2</italic>.</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>Comparing triple and dual combinations.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="top" colspan="11">Triple interactions</th>
</tr>
<tr>
<th align="left" valign="top">Dependent</th>
<th align="left" valign="top">Condition</th>
<th align="center" valign="top">Mean (%)</th>
<th align="center" valign="top">SD</th>
<th align="center" valign="top">mean difference(<italic>m</italic>dif)</th>
<th align="center" valign="top">
<italic>t</italic>
</th>
<th align="center" valign="top">df</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
<th align="center" valign="top">Cohen&#x2019;s <italic>d</italic></th>
<th align="center" valign="top">SE</th>
<th align="center" valign="top">95% CI</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" rowspan="2">OAD</td>
<td align="left" valign="top">ASC&#x2013;HIGHCN-REA<xref ref-type="table-fn" rid="tfn8"><sup>d</sup></xref></td>
<td align="center" valign="top">96.34</td>
<td align="center" valign="top">5.59</td>
<td align="center" valign="top" rowspan="2">4.22</td>
<td align="center" valign="top" rowspan="2">2.192</td>
<td align="center" valign="top" rowspan="2">88</td>
<td align="center" valign="top" rowspan="2">0.000<xref ref-type="table-fn" rid="tfn5"><sup>a</sup></xref></td>
<td align="center" valign="top" rowspan="2">0.456</td>
<td align="center" valign="top" rowspan="2">1.924</td>
<td align="center" valign="top" rowspan="2">[0.397, 8.044]</td>
</tr>
<tr>
<td align="left" valign="top">ASC<xref ref-type="table-fn" rid="tfn9"><sup>e</sup></xref></td>
<td align="center" valign="top">92.12</td>
<td align="center" valign="top">11.83</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">OAD</td>
<td align="left" valign="top">ASC&#x2013;HIGHCN&#x2013;REA</td>
<td align="center" valign="top">96.34</td>
<td align="center" valign="top">5.59</td>
<td align="center" valign="top" rowspan="2">1.10</td>
<td align="center" valign="top" rowspan="2">0.529</td>
<td align="center" valign="top" rowspan="2">94</td>
<td align="center" valign="top" rowspan="2">0.598</td>
<td align="center" valign="top" rowspan="2">0.109</td>
<td align="center" valign="top" rowspan="2">2.081</td>
<td align="center" valign="top" rowspan="2">[&#x2212;3.035, 5.230]</td>
</tr>
<tr>
<td align="left" valign="top">HIGHCN<xref ref-type="table-fn" rid="tfn10"><sup>f</sup></xref></td>
<td align="center" valign="top">95.24</td>
<td align="center" valign="top">13.18</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">OAD</td>
<td align="left" valign="top">ASC&#x2013;HIGHCN&#x2013;REA</td>
<td align="center" valign="top">96.34</td>
<td align="center" valign="top">5.59</td>
<td align="center" valign="top" rowspan="2">6.09</td>
<td align="center" valign="top" rowspan="2">2.277</td>
<td align="center" valign="top" rowspan="2">86</td>
<td align="center" valign="top" rowspan="2">0.023<xref ref-type="table-fn" rid="tfn6"><sup>b</sup></xref></td>
<td align="center" valign="top" rowspan="2">0.472</td>
<td align="center" valign="top" rowspan="2">2.679</td>
<td align="center" valign="top" rowspan="2">[0.774, 11.426]</td>
</tr>
<tr>
<td align="left" valign="top">REA<xref ref-type="table-fn" rid="tfn11"><sup>g</sup></xref></td>
<td align="center" valign="top">90.24</td>
<td align="center" valign="top">17.38</td>
</tr>
</tbody>
</table>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="top" colspan="11">Dual interactions</th>
</tr>
<tr>
<th align="left" valign="top">Dependent</th>
<th align="left" valign="top">Condition</th>
<th align="center" valign="top">Mean (%)</th>
<th align="center" valign="top">SD</th>
<th align="center" valign="top"><italic>m</italic>dif</th>
<th align="center" valign="top">
<italic>t</italic>
</th>
<th align="center" valign="top">df</th>
<th align="center" valign="top">
<italic>p</italic>
</th>
<th align="center" valign="top">Cohen&#x2019;s <italic>d</italic><xref ref-type="table-fn" rid="tfn12"><sup>h</sup></xref></th>
<th align="center" valign="top">SE</th>
<th align="center" valign="top">95% CI<xref ref-type="table-fn" rid="tfn13"><sup>i</sup></xref></th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" rowspan="2">OAD</td>
<td align="left" valign="top">ASC&#x2013;REA</td>
<td align="center" valign="top">95.15</td>
<td align="center" valign="top">7.01</td>
<td align="center" valign="top" rowspan="2">3.366</td>
<td align="center" valign="top" rowspan="2">1.607</td>
<td align="center" valign="top" rowspan="2">91</td>
<td align="center" valign="top" rowspan="2">0.006<xref ref-type="table-fn" rid="tfn6"><sup>b</sup></xref></td>
<td align="center" valign="top" rowspan="2">0.332</td>
<td align="center" valign="top" rowspan="2">2.095</td>
<td align="center" valign="top" rowspan="2">[&#x2212;0.794, 7.527]</td>
</tr>
<tr>
<td align="left" valign="top">DES&#x2013;REA</td>
<td align="center" valign="top">91.79</td>
<td align="center" valign="top">12.49</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">OAD</td>
<td align="left" valign="top">ASC&#x2013;REA</td>
<td align="center" valign="top">95.15</td>
<td align="center" valign="top">7.01</td>
<td align="center" valign="top" rowspan="2">4.91</td>
<td align="center" valign="top" rowspan="2">1.779</td>
<td align="center" valign="top" rowspan="2">86</td>
<td align="center" valign="top" rowspan="2">0.053<xref ref-type="table-fn" rid="tfn7"><sup>c</sup></xref></td>
<td align="center" valign="top" rowspan="2">0.371</td>
<td align="center" valign="top" rowspan="2">2.760</td>
<td align="center" valign="top" rowspan="2">[&#x2212;0.577, 10.396]</td>
</tr>
<tr>
<td align="left" valign="top">RAN&#x2013;REA</td>
<td align="center" valign="top">90.24</td>
<td align="center" valign="top">17.38</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="tfn5">
<label>a</label>
<p>Significant at <italic>p</italic>&#x202F;&#x003C;&#x202F;0.001.</p>
</fn>
<fn id="tfn6">
<label>b</label>
<p>Significant at <italic>p</italic>&#x202F;&#x003C;&#x202F;0.05.</p>
</fn>
<fn id="tfn7">
<label>c</label>
<p>Significant at <italic>p</italic> &#x003C;&#x202F;0.10.</p>
</fn>
<fn id="tfn8">
<label>d</label>
<p>All three high-level conditions combined.</p>
</fn>
<fn id="tfn9">
<label>e</label>
<p>Isolated ASC condition&#x2014;CN absent and DR absent.</p>
</fn>
<fn id="tfn10">
<label>f</label>
<p>Isolated HIGHCN condition&#x2014;structured QS absent and DR absent.</p>
</fn>
<fn id="tfn11">
<label>g</label>
<p>Isolated REA condition&#x2014;structured QS absent and CN absent.</p>
</fn>
<fn id="tfn12">
<label>h</label>
<p>Cohen&#x2019;s <italic>d</italic> calculated using Hedge&#x2019;s <italic>g</italic> modification as Cohen&#x2019;s <italic>d</italic>&#x202F;=&#x202F;(<italic>M</italic>&#x202F;&#x2212;&#x202F;<italic>M</italic>)/SDpooled, where SDpooled&#x202F;=&#x202F;(SD<sup>2</sup>&#x202F;+&#x202F;SD<sup>2</sup>)/2. Cohen&#x2019;s <italic>d</italic> was calculated using G&#x002A;Power version 3.1.9.2.</p>
</fn>
<fn id="tfn13">
<label>i</label>
<p>Bootstrapped results are based on 1,000 samples.</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="sec15">
<label>4.2</label>
<title>Additional analyses</title>
<p>Juxtaposed views by <xref ref-type="bibr" rid="ref44">Zimmer et al. (2010)</xref> and <xref ref-type="bibr" rid="ref26">Moon (2000)</xref> mention that disclosure reciprocity is best accommodated with an ascending question sequence. Our research design allowed us to test this claim. Using the condition that isolated the reasoned dyadic and ascending order (ASC-REA), we facilitated comparisons with the two conditions that used the reasoned dyadic but followed different question orders: descending order (DES-REA) and random order (RAN-REA). Our objective was to test certain configurations between different orders of questions and disclosure reciprocity. As listed in <xref ref-type="table" rid="tab3">Table 3</xref> (see dual interactions section), the results indicate that the ASC-REA generated more actual disclosures than the DES-REA (<italic>p</italic>&#x202F;=&#x202F;0.006; Cohen&#x2019;s <italic>d</italic>&#x202F;=&#x202F;0.332) and RAN-REA condition (<italic>p</italic>&#x202F;=&#x202F;0.05; Cohen&#x2019;s <italic>d</italic>&#x202F;=&#x202F;0.371). Specifically, the reasoned dyadic condition, which provides contextually relevant reciprocity, was better accommodated by a question sequence with slow escalation of invasiveness. This indicates that an ascending escalation of invasiveness allows disclosure reciprocity to take effect, most likely in parallel with the development of trust.</p>
</sec>
</sec>
<sec id="sec16">
<label>5</label>
<title>Discussion and implications</title>
<sec id="sec17">
<label>5.1</label>
<title>General discussion</title>
<p>The paper focused on certain contextual disclosure factors that are often overlooked by traditional cost&#x2013;benefit models. We aimed to bridge attitude&#x2013;behavior gaps of previous research by focusing on actual disclosures, as opposed to intended ones. We inform the conceptualization of future disclosure cost&#x2013;benefit models and the design of information-collection processes that promote data-use transparency. Our examinations were comprised of two parts: Individual effect and combined effect examinations.</p>
<p>For the individual effects in question sequences, we identify that having mildly invasive questions asked first results in more disclosures than asking them at the end of the data collection process. <xref ref-type="bibr" rid="ref26">Moon (2000)</xref> and <xref ref-type="bibr" rid="ref44">Zimmer et al.&#x2019;s (2010)</xref> propositions were verified through this examination, and the fact that the ascending invasiveness sequence can &#x201C;loosen up&#x201D; and prepare participants for the more difficult, privacy-invasive questions that are to follow. <xref ref-type="bibr" rid="ref2">Acquisti et al.'s (2012)</xref> view, which favors the presentation of the most invasive questions at the start of the questionnaire, was not supported by our results. Findings here demonstrate that this descending approach leads to insignificant effects compared to a purely random order, making a case for a sequence that favors slow escalation of invasiveness. Results here can be linked to directional effects (<xref ref-type="bibr" rid="ref19">Kaplan et al., 2013</xref>) and their impact on responses. We argue that difficult, negatively fused questions in terms of invasiveness can have negative directional effects on easier questions that succeed them. Avoidance of disclosure for the very invasive questions at the very beginning can manifest in the easier-to-answer questions that follow, ultimately increasing the chance for consumer clam-up for both invasive and non-invasive questions.</p>
<p>The second factor of interest was the comparative nature. Examinations confirm that participants respond to comparative stimuli when engaging in disclosures. Participants who were informed of how the majority behaved in terms of divulgence mimicked this behavior. A two-way, linear effect was recorded. If the majority disclosed the asked information, then the individual significantly favored disclosure; if the majority abstained from disclosure, then the individual would significantly refrain from divulgence. Our findings align with <xref ref-type="bibr" rid="ref22">Loewenstein et al.&#x2019;s (2014)</xref> claim on the effectiveness of social comparison messages, expanding them to show that disclosure abstention occurs when the majority refrains from disclosures.</p>
<p>The third point of focus was on dyadic relationships. Based on disclosure reciprocity (one-for-one; <xref ref-type="bibr" rid="ref13">Cialdini, 2021</xref>), we identify that when providing a statement explaining the use of the requested information, it facilitates divulgence. Reciprocity that was established with unreasoned statements did not perform as well. This means that statements clarifying the use of data should be the go-to method for establishing reciprocity and thus divulgence. We attribute this to the alleviation of concerns due to transparency with how data will be used for an underlying personal or societal benefit. This works in conjunction with the principle of reciprocity (<xref ref-type="bibr" rid="ref44">Zimmer et al., 2010</xref>). The unreasoned dyadic, which provided interesting but irrelevant information to the user, scored lower than the respective condition where it was absent. These statements might have been perceived as attempts to capture data by shifting the participant&#x2019;s point of focus toward irrelevant information, thus intensifying their concerns. We link this finding to studies that provided compensation to reciprocate divulgence. They found that monetary returns for private information have been perceived as decoys, which elevated privacy concerns and led to abstention (<xref ref-type="bibr" rid="ref5">Andrade et al., 2002</xref>).</p>
<p>For the combined effects, we examined dual and triple interactions. In dual combinations specifically, we combined the reasoned dyadic condition with each of the three question sequence types (ascending, descending, and random). The rationale was to examine which sequence best accommodated reciprocity and thus disclosures. Results find reciprocity to be working better when combined with the ascending order, empirically verifying <xref ref-type="bibr" rid="ref26">Moon&#x2019;s (2000)</xref> claim. We argue that easy questions asked first provide space for reciprocity to take its effect, as intimate questions asked too early could break down the reciprocity principle and result to clam-up. Structuring questions from easy to more difficult based on their invasiveness and complementing each question with explanations of how data will be used before asking for it, facilitates more disclosures compared to having the same explanations per question presented randomly or from most to least invasive questions.</p>
<p>For the triple interaction, we examined the combined effects of the three high-level conditions of reasoned dyadic, ascending sequence and high comparative nature. We constructed and compared this condition with how it favored against the individual employment of the conditions that comprised it. Our findings show a favorable synergistic behavior of the three conditions (ASC-HIGHCN-REA), resulting in more disclosures in the latter format than the individual one (REA). We argue that the ascending invasiveness sequence here accommodates better the reasoned disclosure reciprocity, allowing it to take its effect while comparative information appears to complement this interaction, ultimately generating more divulgence than the reasoned dyadic condition employed on its own.</p>
<p>When comparing the combined high-level condition (ASC-HIGHCN-REA) with the ascending sequence employed individually (ASC), results again favor the combination of the three for producing more divulgence. Both comparative messages and disclosure reciprocity reinforce the application of question sequences, thus demonstrating synergy toward disclosure maximization. Finally, comparing the three high-level conditions (ASC-HIGHCN-REA) with high comparative messages employed in isolation (HIGHCN), although the first generated more divulgence, the results were not significant (<italic>p</italic>&#x202F;=&#x202F;0.598). Essentially, social comparison messages worked equally well on their own than when combined with disclosure reciprocity and question sequences. This highlights the effectiveness of social comparisons on divulgence, demonstrating strong effects that are not significantly improved by question order or reciprocity, although we note small effects in favor of the combined condition (<italic>m</italic>dif&#x202F;=&#x202F;1.10).</p>
</sec>
<sec id="sec18">
<label>5.2</label>
<title>Implications</title>
<p>Privacy discussions highlight consented data use and transparency of data-capturing processes as the main pillars of corporate digital responsibility (<xref ref-type="bibr" rid="ref21">Lobschat et al., 2021</xref>) and sustainable marketing practices (<xref ref-type="bibr" rid="ref33">Themistocleous, 2023</xref>). It is thus not surprising that disclosure behavior research shows particular interest in data collection methods that inform individuals and alleviate risks during disclosure deliberation. Our findings have direct implications for consumer research and organizational information accumulation.</p>
<p>First, for medical organizations where sensitive disclosures are essential to the precision of medical assessments, encouraging messages can help individuals engage in intimate disclosures that might otherwise evoke embarrassment or fear of stigma. Presenting them with how truthful disclosures benefited others can alleviate patients&#x2019; concerns. Our findings also point toward messages that inform respondents of a vast majority abstaining from disclosures, facilitating mimicking, and can reduce divulgence in a linear fashion. As such, search engines can provide tailored messages that promote disclosure avoidance of sensitive data to suspicious sites by displaying the number of visitors who declined disclosure requests. This is most prevalent on scam sites that target sensitive data such as credit card details and phone numbers.</p>
<p>Second, organizations can further utilize short, reasoned statements to establish reciprocity and explain the exact use and need for this data. This alleviates concerns and sets a reciprocal relationship for information exchange. Short, quick-to-read statements before each question are to complement more extended and complicated documents of organizational privacy policies. These points are amplified by <xref ref-type="bibr" rid="ref17">Jensen et al.&#x2019;s (2005)</xref> findings indicating that very few consumers read privacy statements (3%), while <xref ref-type="bibr" rid="ref37">Turow et al. (2007)</xref>, report that consumers believe that privacy policies in online settings imply data protection, while in reality, the opposite is true.</p>
<p>Third, in terms of questionnaire structure, a smooth sequential approach in terms of privacy-invasiveness (ascending sequence) needs to be prioritized. This sequence prepares individuals for the more difficult disclosures that are to follow. It also avoids negative directional effects and thus clam-up. Regarding information collection and data management, companies are advised to assess the invasiveness of questions before presenting them to respondents and accordingly structure them in an escalating order of invasiveness.</p>
<p>Fourth, when statements explaining data use are presented prior to each question, the sequence of the data collection process needs to be structured to present the easiest questions first and then progress to the more difficult ones. We identified the latter sequence to accommodate the establishment of reciprocity more effectively and thus provide more space for its development. This reduces the possibility for disclosure clam-up. Adding in the previous combination a third dimension through comparison-inducing messages can enhance divulgence further. Our triple combination examination, appears to maximize divulgence except when compared to high comparative nature which is only marginally lower. Directly informing individuals, as well as nudging them, through short explanations of data use can help with mitigating information asymmetries which can improve decisions at the time of the request (<xref ref-type="bibr" rid="ref1">Acquisti et al., 2015</xref>).</p>
</sec>
<sec id="sec19">
<label>5.3</label>
<title>Future research and conclusion</title>
<p>This research represents an expeditionary attempt to examine combined drivers of consumer disclosure behavior. The present design allowed for a partially inductive examination of combinations between the three factors of interest, opening new pathways for future research. Our investigation provides a map of factor interactions, yet further research can enhance the resolution of results by focusing on certain combinations. Follow-up examinations can focus on isolated synergies. Albeit more complex, synergies can help us map covert factors of divulgence for inclusion in future cost&#x2013;benefit models. Context, for example, serves as an important parameter (<xref ref-type="bibr" rid="ref18">John et al., 2011</xref>) and as such, dyadic relationships can be employed to explain data usage in both formal and informal settings and, respectively, assess their effects. Likewise, comparison-inducing messages can be employed in settings resembling scam sites and assess whether their effectiveness enhances disclosure decisions as it does in organizational settings.</p>
<p>Past experiences also serve as important proxies for future divulgence behavior. It is documented that privacy violations by organizations can have detrimental multi-level implications on trust and thus limit future disclosures (<xref ref-type="bibr" rid="ref36">Tripathi and Mukhopadhyay, 2022</xref>). Examining how the presentation effects of data-capturing procedures can re-instill trust, especially when previous disclosure experiences of respondents have been negative, can further reinforce our understanding of the effectiveness of voluntary data-capturing processes as a trust-facilitating tool.</p>
<p>Finally, <xref ref-type="bibr" rid="ref40">Westin&#x2019;s (2003)</xref> consumer categorization in the sampling process could enhance findings relating to the effectiveness of data-capturing processes per group. Identifying respondents as either <italic>fundamentalists</italic>, <italic>pragmatists</italic> or <italic>unconcerned</italic> based on their intentions to disclose information can generate insightful findings. The examined techniques&#x2019; effectiveness will likely differ when targeting different types of consumers. For example, techniques that are effective on unconcerned individuals might not be as effective on fundamentalists. Although our research was interested in overall disclosure behavior and not the examination of specific polar views, we would expect that an individual&#x2019;s predisposed propensity to disclose private information to an organization influences his/hers disclosure behavior. For example, a pragmatist is more likely to respond to social comparison messages when in deliberation, while fundamentalists (who have a strong predisposition toward avoidance) might not. Adding this categorization in future examinations can fuel further investigations into groups of consumers based on their propensity to voluntarily divulge information and the amount of influence exerted to them by each synergy during disclosure decisions.</p>
</sec>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec20">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="ethics-statement" id="sec21">
<title>Ethics statement</title>
<p>The studies involving humans were approved by University of Nottingham, Nottingham University Business School, Committee of Research Ethics. The studies were conducted in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study. Written informed consent was obtained from the individual(s) for the publication of any potentially identifiable images or data included in this article.</p>
</sec>
<sec sec-type="author-contributions" id="sec22">
<title>Author contributions</title>
<p>CT: Writing &#x2013; original draft, Formal analysis, Visualization, Data curation, Methodology, Writing &#x2013; review &#x0026; editing, Conceptualization, Software, Investigation. AP: Software, Formal analysis, Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Methodology, Conceptualization, Data curation. AS: Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Supervision, Project administration, Methodology, Visualization, Conceptualization. YH: Resources, Validation, Project administration, Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Supervision.</p>
</sec>
<sec sec-type="COI-statement" id="sec23">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec24">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec25">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<sec sec-type="supplementary-material" id="sec26">
<title>Supplementary material</title>
<p>The Supplementary material for this article can be found online at: <ext-link xlink:href="https://www.frontiersin.org/articles/10.3389/fpsyg.2026.1605386/full#supplementary-material" ext-link-type="uri">https://www.frontiersin.org/articles/10.3389/fpsyg.2026.1605386/full#supplementary-material</ext-link></p>
<supplementary-material xlink:href="Supplementary_file_1.docx" id="SM1" mimetype="application/vnd.openxmlformats-officedocument.wordprocessingml.document" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Acquisti</surname><given-names>A.</given-names></name> <name><surname>Brandimarte</surname><given-names>L.</given-names></name> <name><surname>Loewenstein</surname><given-names>G.</given-names></name></person-group> (<year>2015</year>). <article-title>Privacy and human behavior in the age of information</article-title>. <source>Science</source> <volume>347</volume>, <fpage>509</fpage>&#x2013;<lpage>514</lpage>. doi: <pub-id pub-id-type="doi">10.1126/science.aaa1465</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Acquisti</surname><given-names>A.</given-names></name> <name><surname>John</surname><given-names>L. K.</given-names></name> <name><surname>Loewenstein</surname><given-names>G.</given-names></name></person-group> (<year>2012</year>). <article-title>The impact of relative standards on the propensity to disclose</article-title>. <source>J. Mark. Res.</source> <volume>49</volume>, <fpage>160</fpage>&#x2013;<lpage>174</lpage>. doi: <pub-id pub-id-type="doi">10.1509/jmr.09.0215</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Adam</surname><given-names>M.</given-names></name> <name><surname>Benlian</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <article-title>From web forms to chatbots: the roles of consistency and reciprocity for user information disclosure</article-title>. <source>Inf. Syst. J.</source> <volume>34</volume>, <fpage>1175</fpage>&#x2013;<lpage>1216</lpage>.</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Altman</surname><given-names>I.</given-names></name> <name><surname>Dalmas</surname><given-names>T.</given-names></name></person-group> (<year>1973</year>). <source>Social Penetration: The Development of Interpersonal Relationships</source>. <publisher-name>New York: Holt, Rinehart &#x0026; Winston</publisher-name>.</mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Andrade</surname><given-names>E. B.</given-names></name> <name><surname>Kaltcheva</surname><given-names>V. D.</given-names></name> <name><surname>Weitz</surname><given-names>B. A.</given-names></name></person-group> (<year>2002</year>). <article-title>Self-disclosure on the web: the impact of privacy policy, reward, and company reputation</article-title>. <source>Adv. Consum. Res.</source> <volume>29</volume>, <fpage>350</fpage>&#x2013;<lpage>353</lpage>.</mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Babina</surname><given-names>T.</given-names></name> <name><surname>Saleem</surname><given-names>B.</given-names></name> <name><surname>Greg</surname><given-names>B.</given-names></name> <name><surname>Filippo</surname><given-names>D. M.</given-names></name> <name><surname>Angus</surname><given-names>F.</given-names></name> <name><surname>Will</surname><given-names>G.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>Customer data access and fintech entry: early evidence from open banking</article-title>. <source>J. Financ. Econ.</source> <volume>169</volume>:<fpage>103950</fpage>.</mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Balakrishnan</surname><given-names>V.</given-names></name> <name><surname>Ahhmed</surname><given-names>U.</given-names></name> <name><surname>Basheer</surname><given-names>F.</given-names></name></person-group> (<year>2025</year>). <article-title>Personal, environmental and behavioral predictors associated with online fraud victimization among adults</article-title>. <source>PLoS One</source> <volume>20</volume>:<fpage>e0317232</fpage>. doi: <pub-id pub-id-type="doi">10.1371/journal.pone.0317232</pub-id>, <pub-id pub-id-type="pmid">39879178</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Barth</surname><given-names>S.</given-names></name> <name><surname>de Jong</surname><given-names>M. D. T.</given-names></name></person-group> (<year>2017</year>). <article-title>The privacy paradox&#x2014;investigating discrepancies between expressed privacy concerns and actual online behavior&#x2014;a systematic literature review</article-title>. <source>Telemat. Inform.</source> <volume>34</volume>, <fpage>1038</fpage>&#x2013;<lpage>1058</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.tele.2017.04.013</pub-id></mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Baumeister</surname><given-names>R. F.</given-names></name> <name><surname>Leary</surname><given-names>M. R.</given-names></name></person-group> (<year>2017</year>). <article-title>The need to belong: desire for interpersonal attachments as a fundamental human motivation</article-title>. <source>Interpers. Dev.</source>, <fpage>57</fpage>&#x2013;<lpage>89</lpage>.</mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bowling</surname><given-names>N. A.</given-names></name> <name><surname>Boss</surname><given-names>J.</given-names></name> <name><surname>Hammond</surname><given-names>G. D.</given-names></name> <name><surname>Dorsey</surname><given-names>B.</given-names></name></person-group> (<year>2009</year>). <article-title>Susceptibility of job attitudes to context effects</article-title>. <source>J. Career Assess.</source> <volume>17</volume>, <fpage>298</fpage>&#x2013;<lpage>311</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1069072708330507</pub-id></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bradburn</surname><given-names>N. M.</given-names></name> <name><surname>Mason</surname><given-names>W. M.</given-names></name></person-group> (<year>1964</year>). <article-title>The effect of question order on responses</article-title>. <source>J. Mark. Res.</source> <volume>1</volume>, <fpage>57</fpage>&#x2013;<lpage>61</lpage>. doi: <pub-id pub-id-type="doi">10.1177/002224376400100410</pub-id></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chandra</surname><given-names>S.</given-names></name> <name><surname>Sanjeev</surname><given-names>V.</given-names></name> <name><surname>Weng Marc</surname><given-names>L.</given-names></name> <name><surname>Satish</surname><given-names>K.</given-names></name> <name><surname>Naveen</surname><given-names>D.</given-names></name></person-group> (<year>2022</year>). <article-title>Personalization in personalized marketing: trends and ways forward</article-title>. <source>Psychol. Mark.</source> <volume>39</volume>, <fpage>1529</fpage>&#x2013;<lpage>1562</lpage>.</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Cialdini</surname><given-names>R. B.</given-names></name></person-group> (<year>2021</year>). <source>Influence: The Psychology of Persuasion</source>. <publisher-loc>Dublin</publisher-loc>: <publisher-name>HarperCollins</publisher-name>.</mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>D&#x2019;Errico</surname><given-names>F.</given-names></name> <name><surname>Cicirelli</surname><given-names>P. G.</given-names></name> <name><surname>Corbelli</surname><given-names>G.</given-names></name> <name><surname>Pacielo</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>Rolling minds: a conversational media to promote intergroup contact by countering racial misinformation through socioanalytic processing in adolescence</article-title>. <source>Psychol. Pop. Media</source>. <volume>14</volume>, <fpage>378</fpage>&#x2013;<lpage>388</lpage>.</mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dinev</surname><given-names>T.</given-names></name> <name><surname>Hart</surname><given-names>P.</given-names></name></person-group> (<year>2006</year>). <article-title>Linked references are available on JSTOR for this article</article-title>. <source>Inf. Syst. Res.</source> <volume>17</volume>, <fpage>66</fpage>&#x2013;<lpage>80</lpage>. doi: <pub-id pub-id-type="doi">10.1287/isre.l060.0080</pub-id></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gouldner</surname><given-names>A. W.</given-names></name></person-group> (<year>1960</year>). <article-title>The norm of reciprocity: a preliminary statement</article-title>. <source>Am. Sociol. Assoc.</source> <volume>25</volume>, <fpage>161</fpage>&#x2013;<lpage>178</lpage>.</mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jensen</surname><given-names>C.</given-names></name> <name><surname>Potts</surname><given-names>C.</given-names></name> <name><surname>Jensen</surname><given-names>C.</given-names></name></person-group> (<year>2005</year>). <article-title>Privacy practices of internet users: self-reports versus observed behavior</article-title>. <source>Int. J. Hum. Comput. Stud.</source> <volume>63</volume>, <fpage>203</fpage>&#x2013;<lpage>227</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhcs.2005.04.019</pub-id></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>John</surname><given-names>L. K.</given-names></name> <name><surname>Acquisti</surname><given-names>A.</given-names></name> <name><surname>Loewenstein</surname><given-names>G.</given-names></name></person-group> (<year>2011</year>). <article-title>Strangers on a plane: context-dependent willingness to divulge sensitive information</article-title>. <source>J. Consum. Res.</source> <volume>37</volume>, <fpage>858</fpage>&#x2013;<lpage>873</lpage>. doi: <pub-id pub-id-type="doi">10.1086/656423</pub-id></mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kaplan</surname><given-names>S. A.</given-names></name> <name><surname>Luchman</surname><given-names>J. N.</given-names></name> <name><surname>Mock</surname><given-names>L.</given-names></name></person-group> (<year>2013</year>). <article-title>General and specific question sequence effects in satisfaction surveys: integrating directional and correlational effects</article-title>. <source>J. Happiness Stud.</source> <volume>14</volume>, <fpage>1443</fpage>&#x2013;<lpage>1458</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10902-012-9388-5</pub-id></mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lobschat</surname><given-names>L.</given-names></name> <name><surname>Mueller</surname><given-names>B.</given-names></name> <name><surname>Eggers</surname><given-names>F.</given-names></name> <name><surname>Brandimarte</surname><given-names>L.</given-names></name> <name><surname>Diefenbach</surname><given-names>S.</given-names></name> <name><surname>Kroschke</surname><given-names>M.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>Corporate digital responsibility</article-title>. <source>J. Bus. Res.</source> <volume>122</volume>, <fpage>875</fpage>&#x2013;<lpage>888</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jbusres.2019.10.006</pub-id></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Loewenstein</surname><given-names>G.</given-names></name> <name><surname>Sunstein</surname><given-names>C. R.</given-names></name> <name><surname>Golman</surname><given-names>R.</given-names></name></person-group> (<year>2014</year>). <article-title>Disclosure: psychology changes everything</article-title>. <source>Annu. Rev. Econ.</source> <volume>6</volume>, <fpage>391</fpage>&#x2013;<lpage>419</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev-economics-080213-041341</pub-id></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McDonald</surname><given-names>R. I.</given-names></name> <name><surname>Crandall</surname><given-names>C. S.</given-names></name></person-group> (<year>2015</year>). <article-title>Social norms and social influence</article-title>. <source>Curr. Opin. Behav. Sci.</source> <volume>3</volume>, <fpage>147</fpage>&#x2013;<lpage>151</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cobeha.2015.04.006</pub-id></mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Meier</surname><given-names>Y.</given-names></name> <name><surname>Kr&#x00E4;mer</surname><given-names>N. C.</given-names></name></person-group> (<year>2024</year>). <article-title>The privacy calculus revisited: an empirical investigation of online privacy decisions on between-and within-person levels</article-title>. <source>Commun. Res.</source> <volume>51</volume>, <fpage>178</fpage>&#x2013;<lpage>202</lpage>.</mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mikhaeil</surname><given-names>C. A.</given-names></name> <name><surname>James</surname><given-names>T. L.</given-names></name></person-group> (<year>2023</year>). <article-title>Examining the case of French hesitancy toward IDaaS solutions: technical and social contextual factors of the organizational IDaaS privacy calculus</article-title>. <source>Inf. Manag.</source> <volume>60</volume>:<fpage>103779</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.im.2023.103779</pub-id></mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Moon</surname><given-names>Y.</given-names></name></person-group> (<year>2000</year>). <article-title>Intimate exchanges: using computers to elicit self-disclosure from consumers</article-title>. <source>J. Consum. Res.</source> <volume>26</volume>, <fpage>323</fpage>&#x2013;<lpage>339</lpage>. doi: <pub-id pub-id-type="doi">10.1086/209566</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Norberg</surname><given-names>P. A.</given-names></name> <name><surname>Horne</surname><given-names>D. R.</given-names></name> <name><surname>Horne</surname><given-names>D. A.</given-names></name></person-group> (<year>2007</year>). <article-title>The privacy paradox: personal information disclosure intentions versus behaviors</article-title>. <source>J. Consum. Aff.</source> <volume>41</volume>, <fpage>100</fpage>&#x2013;<lpage>126</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1745-6606.2006.00070.x</pub-id></mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Preston</surname><given-names>C. C.</given-names></name> <name><surname>Colman</surname><given-names>A. M.</given-names></name></person-group> (<year>2000</year>). <article-title>Optimal number of response categories in rating scales: reliability, validity, discriminating power, and respondent preferences</article-title>. <source>Acta Psychol.</source> <volume>104</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.1016/S0001-6918(99)00050-5</pub-id>, <pub-id pub-id-type="pmid">10769936</pub-id></mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>&#x015E;ahin</surname><given-names>M. D.</given-names></name></person-group> (<year>2021</year>). <article-title>Effect of item order on certain psychometric properties: a demonstration on a cyberloafing scale</article-title>. <source>Front. Psychol.</source> <volume>12</volume>:<fpage>590545</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2021.590545</pub-id>, <pub-id pub-id-type="pmid">33551942</pub-id></mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Schultz</surname><given-names>P. W.</given-names></name> <name><surname>Nolan</surname><given-names>J. M.</given-names></name> <name><surname>Cialdini</surname><given-names>R. B.</given-names></name> <name><surname>Goldstein</surname><given-names>N. J.</given-names></name> <name><surname>Griskevicius</surname><given-names>V.</given-names></name></person-group> (<year>2007</year>). <article-title>The constructive, destructive, and reconstructive power of social norms</article-title>. <source>Psychol. Sci.</source> <volume>18</volume>, <fpage>429</fpage>&#x2013;<lpage>434</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1467-9280.2007.01917.x</pub-id>, <pub-id pub-id-type="pmid">17576283</pub-id></mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Steffel</surname><given-names>M.</given-names></name> <name><surname>Williams</surname><given-names>E. F.</given-names></name> <name><surname>Pogacar</surname><given-names>R.</given-names></name></person-group> (<year>2016</year>). <article-title>Ethically deployed defaults: transparency and consumer protection through disclosure and preference articulation</article-title>. <source>J. Mark. Res.</source> <volume>53</volume>, <fpage>865</fpage>&#x2013;<lpage>880</lpage>. doi: <pub-id pub-id-type="doi">10.1509/jmr.14.0421</pub-id></mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Stremersch</surname><given-names>S.</given-names></name> <name><surname>Cabooter</surname><given-names>E.</given-names></name> <name><surname>Guitart</surname><given-names>I. A.</given-names></name> <name><surname>Nuno</surname><given-names>C.</given-names></name></person-group> (<year>2025</year>). <article-title>Customer insights for innovation: a framework and research agenda for marketing</article-title>. <source>Acad. Market. Sci.</source> <volume>53</volume>, <fpage>29</fpage>&#x2013;<lpage>51</lpage>.</mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Themistocleous</surname><given-names>C.</given-names></name></person-group> (<year>2023</year>). &#x201C;<article-title>Sustainable marketing</article-title>,&#x201D; in <source>Concise Encyclopedia of Corporate Social Responsibility</source>, eds. <person-group person-group-type="editor"><name><surname>Matthews</surname><given-names>L.</given-names></name> <name><surname>Biachi</surname><given-names>L.</given-names></name> <name><surname>Ingram</surname><given-names>C.</given-names></name></person-group> (<publisher-loc>Cheltenham</publisher-loc>: <publisher-name>Edward Elgar</publisher-name>).</mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Themistocleous</surname><given-names>C.</given-names></name> <name><surname>Karapanos</surname><given-names>E.</given-names></name></person-group> (<year>2025</year>). &#x201C;<article-title>When nudges backfire: a distinction between spillovers and misfires</article-title>,&#x201D; in <source>International Conference on Persuasive Technology</source>, ed. I. Wiafe et al. (<publisher-loc>Switzerland, Cham</publisher-loc>: <publisher-name>Springer Nature</publisher-name>), <fpage>59</fpage>&#x2013;<lpage>70</lpage>.</mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Themistocleous</surname><given-names>C.</given-names></name> <name><surname>Smith</surname><given-names>A.</given-names></name> <name><surname>Wagner</surname><given-names>C.</given-names></name></person-group> (<year>2014</year>), &#x201C;<article-title>The ethical dilemma of implicit vs explicit data collection: examining the factors that influence the voluntary disclosure of information by consumers to commercial organizations</article-title>&#x201D;, <conf-name>IEEE international symposium on ethics in science, technology and engineering</conf-name>.</mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tripathi</surname><given-names>M.</given-names></name> <name><surname>Mukhopadhyay</surname><given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering</article-title>. <source>Inf. Manag.</source> <volume>59</volume>:<fpage>103707</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.im.2022.103707</pub-id></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Turow</surname><given-names>J.</given-names></name> <name><surname>Hoofnagle</surname><given-names>C. J.</given-names></name> <name><surname>Mulligan</surname><given-names>D. K.</given-names></name> <name><surname>Good</surname><given-names>N.</given-names></name> <name><surname>Grossklags</surname><given-names>J.</given-names></name></person-group> (<year>2007</year>). <article-title>The Federal Trade Commission and consumer privacy in the coming decade</article-title>. <source>J. Law Policy Inf. Soc.</source> <volume>3</volume>, <fpage>723</fpage>&#x2013;<lpage>749</lpage>.</mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Van De Walle</surname><given-names>S.</given-names></name> <name><surname>Van Ryzin</surname><given-names>G. G.</given-names></name></person-group> (<year>2011</year>). <article-title>The order of questions in a survey on citizen satisfaction with public services: lessons from a split-ballot experiment</article-title>. <source>Public Adm.</source> <volume>89</volume>, <fpage>1436</fpage>&#x2013;<lpage>1450</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1467-9299.2011.01922.x</pub-id></mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Vedadi</surname><given-names>A.</given-names></name> <name><surname>Warkentin</surname><given-names>M.</given-names></name></person-group> (<year>2020</year>). <article-title>Can secure behaviors be contagious? A two-stage investigation of the influence of herd behavior on security decisions</article-title>. <source>J. Assoc. Inf. Syst.</source> <volume>21</volume>:<fpage>3</fpage>.</mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Westin</surname><given-names>A. F.</given-names></name></person-group> (<year>2003</year>). <article-title>Social and political dimensions of privacy</article-title>. <source>J. Soc. Issues</source> <volume>59</volume>, <fpage>431</fpage>&#x2013;<lpage>453</lpage>. doi: <pub-id pub-id-type="doi">10.1111/1540-4560.00072</pub-id></mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>White</surname><given-names>T. B.</given-names></name></person-group> (<year>2004</year>). <article-title>Consumer disclosure and disclosure avoidance: a motivational framework</article-title>. <source>J. Consum. Psychol.</source> <volume>14</volume>, <fpage>41</fpage>&#x2013;<lpage>51</lpage>. doi: <pub-id pub-id-type="doi">10.1207/s15327663jcp1401&#x0026;2_6</pub-id></mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zalmanson</surname><given-names>L.</given-names></name> <name><surname>Oestreicher-Singer</surname><given-names>G.</given-names></name> <name><surname>Ecker</surname><given-names>Y.</given-names></name></person-group> (<year>2022</year>). <article-title>The role of social cues and trust in users&#x2019; private information disclosure</article-title>. <source>MIS Q.</source> <volume>46</volume>, <fpage>1109</fpage>&#x2013;<lpage>1134</lpage>. doi: <pub-id pub-id-type="doi">10.25300/misq/2022/16288</pub-id></mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname><given-names>J.</given-names></name> <name><surname>Wang</surname><given-names>X.</given-names></name> <name><surname>Lu</surname><given-names>J.</given-names></name> <name><surname>Liu</surname><given-names>L.</given-names></name> <name><surname>Feng</surname><given-names>Y.</given-names></name></person-group> (<year>2024</year>). <article-title>The impact of emotional expression by artificial intelligence recommendation chatbots on perceived humanness and social interactivity</article-title>. <source>Decis. Support. Syst.</source> <volume>187</volume>:<fpage>114347</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.dss.2024.114347</pub-id></mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zimmer</surname><given-names>J. C.</given-names></name> <name><surname>Arsal</surname><given-names>R.</given-names></name> <name><surname>Al-Marzouq</surname><given-names>M.</given-names></name> <name><surname>Moore</surname><given-names>D.</given-names></name> <name><surname>Grover</surname><given-names>V.</given-names></name></person-group> (<year>2010</year>). <article-title>Knowing your customers: using a reciprocal relationship to enhance voluntary information disclosure</article-title>. <source>Decis. Support. Syst.</source> <volume>48</volume>, <fpage>395</fpage>&#x2013;<lpage>406</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.dss.2009.10.003</pub-id></mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/30267/overview">Petko Kusev</ext-link>, London South Bank University, United Kingdom</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/246558/overview">Francesca D'Errico</ext-link>, University of Bari Aldo Moro, Italy</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3127756/overview">Sayeh Khamoushi</ext-link>, Maharishi University of Management, United States</p>
</fn>
</fn-group>
</back>
</article>