236
Views
51
CrossRef citations to date
0
Altmetric
Editorials

Why would we care about privacy?

Pages 97-102 | Published online: 28 Jan 2019

References

  • Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In Proc. ACM Electronic Commerce Conference, pp 21–29, ACM, New York.
  • Acquisti A and Grossklags J (2005) Privacy and rationality in individual decision making. IEEE Security and Privacy 3(1), 26–33.
  • Acquisti A, John L and Loewenstein G (2012) The impact of relative standards on the propensity to disclose. Journal of Marketing Research 49(2), 160–174.
  • Baskerville R (2012) Reviving the IT in the IS. European Journal Information Systems 21(6), 587–591.
  • Bélanger F and Crossler RE (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly 35(4), 1017–1041.
  • Cate FH (1997) Privacy in the Information Age. Brookings Institution Press, Washington, D.C.
  • Cranston M (1973) What Are Human Rights? Taplinger Pub Co., New York, NY.
  • Culnan MJ and Armstrong PK (1999) Information privacy concerns, procedural fairness and impersonal trust: an empirical investigation. Organization Science 10(1), 104–115.
  • de Corbière F and Rowe F (2013) From ideal data synchronization to hybrid forms of interconnections: architectures, processes, and data. Journal of the Association for Information Systems 14(10), 550–584.
  • Dhillon G, Backhouse J and Ray A (2007) Editorial: JSIS security and privacy special issue. Journal of Strategic Information Systems 16(2), 127–129.
  • Dinev T, Bellotto M, Hart P, Russo V, Serra I and Colautti C (2006) Privacy calculus model in e-commerce — a study of Italy and the United States. European Journal of Information Systems 15(4), 389–402.
  • Dinev T, Hart P and Mullen M (2008) Internet privacy concerns and beliefs about government surveillance — an empirical investigation. Journal of Strategic Information Systems 17(3), 214–233.
  • Dinev T, Smith HJ and McConnel A (2013) Privacy macromodels: are we really rational? Work in progress.
  • Goes P (2013) Information systems research and behavioral economics. Editor's comments. MIS Quarterly 37(3), iii–viii.
  • Grossklags J and Acquisti A (2007) When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. Proceedings of the 6th Workshop Economics of Information Security, WEIS, Pittsburgh, PA.
  • Hickson RF (1987) Privacy in a Public Society: Human Rights in Conflict. Oxford University Press, New York, NY.
  • Jaeger WW (1986) Paideia: The Ideals of Creek Culture. Oxford University Press, New York, NY.
  • Kahneman D, Knetsch KL and Thaler RH (1991) Anomalies: the endowment effect, loss aversion, and status quo bias. Journal of Economics Perspectives 5(1), 193–206.
  • Kahneman D, Slovic P and Tversky A (1982) Judgment under Uncertainty: Heuristics and Biases. Cambridge University Press, New York, NY.
  • Keith M, Thompson SC, Hale J, Lowry PJ and Greer C (2013) Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies 71(12), 1163–1173.
  • Kling R (1996) Information technologies and the shifting balance between privacy and social control. Computerization and Controversy: Value Conflicts and Social Control. (Kling R, Ed), 2nd edn, pp 614–633, Academic Press Inc, San Diego, CA.
  • Li T and Unger T (2012) Willing to pay for quality personalization? Tradeoff between quality and privacy. European Journal of Information Systems 21(6), 621–642.
  • Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems 28(1), Available at: http://aisel.aisnet.org/cais/vol28/iss1/28/.
  • Li H, Sarathy R and Xu H (2011) The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51(3), 434–445.
  • Loewenstein G (1996) Out of control: visceral influences on behavior. Organizational Behavior and Human Decision Processes 65(3), 272–292.
  • Lowry PJ, Moody GD, Vance A, Jensen M, Jenkins JL and Wells T (2012) Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. Journal of the American Society for Information Science and Technology 63(4), 755–766.
  • Lyon D (2001) Surveillance Society: Monitoring Everyday Life. Open University Press, Buckingham, PA.
  • Mason RO (1986) Four ethical issues of the information age. MIS Quarterly 10(1), 4–12.
  • McLean D (1995) Privacy and Its Invasion. Praeger, Westport, CT.
  • Miltgen CL and Peyrat-Guillard D (2014) Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. European Journal of Information Systems 23(2), 97–102.
  • Oetzel MC and Spiekermann S (2014) A systematic methodology for privacy impact assessments: a design science approach. European Journal of Information Systems 23(2), 97–102.
  • Pavlou Pa (2011) State of the information privacy literature: where are we now and where should we go? MIS Quarterly 35(4), 977–988.
  • Petty RE and Cacioppo JT (1986) Communication and Persuasion: Central and Peripheral Routes to Attitude Change. Springer-Verlag, New York, NY.
  • Petty RE and Wegener DT (1998) Attitude change: multiple roles for persuasion variables. In Handbook of Social Psychology (Gilbert DT, Fiske ST and Lindzey G, Eds) Vol. 1, 4th edn, pp 323–390, McGraw-Hill, New York, NY.
  • Rowe F (2011) Towards a greater diversity in writing styles, argumentative strategies and genre of manuscripts. European Journal of Information Systems 20(5), 491–195.
  • Rowe F (2012) Toward a richer diversity of genres in information systems research: new categorization and guidelines. European Journal of Information Systems 21(5), 469–478.
  • Smith HJ, Dinev T and Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35(4), 989–1015.
  • Te'eni D (2012) What's communication got to do with IT? European Journal of Information Systems 21(4), 341–344.
  • Tsai JY, Egelman S, Cranor L and Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research 22(2), 254–268.
  • Velecky L (1978) The concept of privacy. In Privacy (Young J, Ed), pp 13–34, John Wiley and Sons, Chichester, New York, NY.
  • Westin AF (1967) Privacy and Freedom. Atheneum, New York, NY.
  • Westin AF (2003) Social and political dimensions of privacy. Journal of Social Issues 59(2), 431–453.
  • Zhang P (2013) The affective response model: a theoretical framework of affective concepts and their relationships in the ICT context. MIS Quarterly 37(1), 247–274.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.