... (Wolfowicz , 2021;Muratbekova-Touron, & Leon, 2021;DeMoya & Pallud, 2020;Stark et al., 2020;Stiff, 2019;Crossler & Posey, 2017;Elhai & Hall, 2016). Based on the Table Matrix 2, although obtrusive surveillance is used for beneficial purpose at an individual level, such as contact tracing through disease-control ehealth monitoring technology (Ehrari et al., 2020) or COVID-19 application (Wnuk etal., 2021;Urbaczewski & Lee, 2020), social networking monitoring through social media (Mullen, & Fox, 2016), e-commerce through identity eco-systems (Crossler & Posey, 2017), online impression management (Marder et al., 2016) or peer-to-peer monitoring (Tokunaga, 2011) or online sharing of personal data using social media/online blogs (Park et al., 2012) etc., there is still a risk of data being disclosed if not handled carefully or used for commercial purposes (Bhatt et al., 2022;Martin, 2016;Park et al., 2012;Wills, & Zeljkovic, 2011). Similarly, non-obtrusive surveillance, at an individual level, may be used either for beneficial purpose such as using GPS or smartphones sensors for location tracking (Park & Jang, 2014), self-monitoring one's health using smart wearable devices (DeMoya & Pallud, 2020) or for the purpose of marketing or advertising such as collecting unauthorized data for interpreting one's behavioral or purchasing patterns using data analytics (Mai, 2016;Zuboff, 2015), collecting personally identifiable information (Bansal & Nah, 2022;kauffman et al., 2011) etc. Further, non-obtrusive surveillance may also be used for cyberattacks through web-tracking (Samarasinghe & Mannan, 2019), adware, malware, phishing, DoS etc. (Kim et al., 2011) and cyber bullying by collecting others' personal information from Facebook profiles and posts (Stiff, 2019). ...