2,842
Views
63
CrossRef citations to date
0
Altmetric
Empirical Research

Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study

, &
Pages 642-660 | Received 06 Jan 2016, Accepted 14 Jun 2017, Published online: 15 Feb 2018

References

  • Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, pp 21–29, ACM Press, New York, NY.
  • AcquistiABrandimarteLLoewensteinGPrivacy and human behavior in the age of informationScience2015347622150951410.1126/science.aaa1465
  • AcquistiAGrossklagsJPrivacy and rationality in individual decision makingIEEE Security & Privacy20053263310.1109/MSP.2005.22
  • AcquistiAJohnLLowensteinGThe impact of relative standards on the propensity to discloseJournal of Marketing Research201249216017410.1509/jmr.09.0215
  • AIS (2016) Senior scholars’ basket of journals. http://aisnet.org/?SeniorScholarBasket. Accessed on August 30, 2016.
  • AndersonCLAgarwalRThe digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health informationInformation Systems Research201122346949010.1287/isre.1100.0335
  • AngstCMAgarwalRAdoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasionMIS Quarterly200933233937010.2307/20650295
  • AwadNFKrishnanMSThe personlization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalizationMIS Quarterly2006301132810.2307/25148715
  • BansalGZahediFMGefenDThe impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information onlineDecision Support Systems201049213815010.1016/j.dss.2010.01.010
  • BansalGZahediFMGefenDThe role of privacy assurance mechanisms in building trust and the moderating role of privacy concernEuropean Journal of Information Systems201524662464410.1057/ejis.2014.41
  • BansalGZahediFMGefenDDo context and personality matter? Trust and privacy concerns in disclosing private information onlineInformation & Management201653112110.1016/j.im.2015.08.001
  • BélangerFCrosslerRPrivacy in the digital age: A review of information privacy research in information systemsMIS Quarterly20113541017104110.2307/41409971
  • BergJDickhautJMcCabeKTrust, reciprocity, and social historyGames and Economic Behavior199510112214210.1006/game.1995.1027
  • Blatt SJ (1990) Interpersonal relatedness and self-definition: Two personality configurations and their implications for psychopathology and psychotherapy. In Repression: Defense mechanisms and personality (Singer JL, Ed), pp 299–335, University of Chicago Press, Chicago, IL.
  • ChellappaRKShivenduSAn economic model of privacy: A property rights approach to regulatory choices for online personalizationJournal of Management Information Systems200724319322510.2753/MIS0742-1222240307
  • ChenJPingJWXuYTanBCYInformation privacy concerns about peer disclosure in online social networksIEEE Transactions on Engineering Management201562331132410.1109/TEM.2015.2432117
  • Chin WW and Newsted PR (1999) Structural equation modeling analysis with small samples using partial least squares. In Statistical strategies for small sample research (Hoyle R, Ed), pp 307–341, Sage Publications, Thousand Oaks, CA
  • ChoiBCFJiangJXiaoBKimSSEmbarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bondingInformation Systems Research201526467569410.1287/isre.2015.0602
  • CongerSPrattJHLochKDPersonal information privacy and emerging technologiesInformation Systems Journal201323540141710.1111/j.1365-2575.2012.00402.x
  • CulnanMJBiesRJConsumer privacy: Balancing economic and justice considerationsJournal of Social Issues200359232334210.1111/1540-4560.00067
  • DavisFDBagozziRPWarshawPRUser acceptance of computer technology: A comparison of two theoretical modelsManagement Science1989358982100310.1287/mnsc.35.8.982
  • DavisJJurgensonNContext collapse: Theorizing context collusions and collisionsInformation, Communication & Society201417447648510.1080/1369118X.2014.888458
  • DebatinBLovejoyJPHornAHugesBNFacebook and online privacy: Attitudes, behaviors, and unintended consequencesJournal of Computer-Mediated Communication2009158310810.1111/j.1083-6101.2009.01494.x
  • DinevTBellottoMHartPRussoVSerraIColautiCPrivacy calculus model in e-commerce - a study of Italy and the United StatesEuropean Journal of Information Systems20061538940210.1057/palgrave.ejis.3000590
  • DinevTHartPAn extended privacy calculus model for e-commerce transactionsInformation Systems Research2006171618010.1287/isre.1060.0080
  • DinevTHartPMullenMRInternet privacy concerns and beliefs about government surveillance: An empirical investigationJournal of Strategic Information Systems200817321423310.1016/j.jsis.2007.09.002
  • DinevTMcConnellARSmithHJInforming privacy research through information systems, psychology, and behavioral economics: Thinking outside the ‘APCO’ boxInformation Systems Research201526463965510.1287/isre.2015.0600
  • DinevTXuHSmithHJHartPInformation privacy and correlates: An empirical attempt to bridge and distinguish privacy-related conceptsEuropean Journal of Information Systems201322329531610.1057/ejis.2012.23
  • EastlickMALotzSLWarringtonPUnderstanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitmentJournal of Business Research200659887788610.1016/j.jbusres.2006.02.006
  • FoddyMPlatowMJYamagishiTGroup-based trust in strangers: The role of stereotypes and expectationsPsychological Science200920441942210.1111/j.1467-9280.2009.02312.x
  • FornellCLarckerDFEvaluating structural equation models with unobservable variables and measurement errorJournal of Marketing Research1981181395010.2307/3151312
  • GefenDStraubDWA practical guide to factorial validity using PLS-Graph: Tutorial and annotated exampleCommunications of the Association for Information Systems20051653950
  • GerlachJWidjajaTBuxmannPHandle with care: How online network providers’ privacy policies impact users’ information sharing behaviorJournal of Strategic Information Systems2015241334310.1016/j.jsis.2014.09.001
  • GreenawayKEChanYECrosslerRCompany information privacy orientation: A conceptual frameworkInformation Systems Journal201525657960610.1111/isj.12080
  • HairJFHultGTMRingleCMSarstedtMA primer on partial least squares structural equation modeling (PLS-SEM)2017Thousand Oaks, CASage Publications Inc
  • HANNI-HHUIK-LLEES-YTPNGIPLOvercoming online information privacy concerns: An information-processing theory approachJournal of Management Information Systems2007242134210.2753/MIS0742-1222240202
  • HindeRAToward understanding relationships1979LondonAcademic Press
  • HongWThongJYLInternet privacy concerns: An integrated conceptualization and four empirical studiesMIS Quarterly201337127529810.25300/MISQ/2013/37.1.12
  • HuTKettingerWJPostonRSThe effect of online soical value on satisfaction and continued use of social mediaEuropean Journal of Information Systems201524439141010.1057/ejis.2014.22
  • HuiKLTeoHHLeeSYTThe value of privacy assurance: An exploratory field experimentMIS Quarterly2007311193310.2307/25148779
  • JarvenpaaSLTractinskyNSaarinenNVitaleMConsumer trust in an internet store: A cross-cultural validationJournal of Computer-Mediated Communication1999524471
  • JarvenpaaSLTractinskyNVitaleMConsumer trust in an internet storeInformation Technology Management20001457110.1023/A:1019104520776
  • JiangJHengCSChoiBCFPrivacy concerns and privacy-protective behavior in synchronous online social interactionsInformation Systems Research201324357959510.1287/isre.1120.0441
  • JunglasIAJohnsonNASpitzmuellerCPersonality traits and concern for privacy: An empirical study in the context of location-based servicesEuropean Journal of Information Systems200817438740210.1057/ejis.2008.29
  • KarahasanovicABrandtzægPBHeimJLüdersMVermeirLPiersonJet alCo-creation and user-generated content – elderly people’s user requirementsComputers in Human Behavior200925365567910.1016/j.chb.2008.08.012
  • KehrFKowatschTWentzelDFleischEBlissfully ignorant: The effects of general privacy concerns, general institutional trust, and affect in the privacy calculusInformation Systems Journal201525660763510.1111/isj.12062
  • KeithMJBabbJSLowryPBFurnerCPAbdullatAThe role of mobile-computing self-efficacy in consumer information disclosureInformation Systems Journal201525663766710.1111/isj.12082
  • KrasnovaHSpiekermannSKorolevaKHildebrandTOnline social networks: Why we discloseJournal of Information Technology20102510912510.1057/jit.2010.6
  • Krasnova H and Veltri NF (2010) Privacy calculus on social networking sites: explorative evidence from Germany and USA. In 43rd Hawaii International Conference on System Sciences, Hawaii.
  • KuYWhy do users continue using social networking sites? An exploratory study of members in the United States and TaiwanInformation & Management201350757158110.1016/j.im.2013.07.011
  • LEED-JAHNJ-HBANGYManaging consumer privacy concerns in personalization: A strategic analysis of privacy protectionMIS Quarterly201135242344410.2307/23044050
  • LiHSarathyRXuHThe role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendorsDecision Support Systems201151343444510.1016/j.dss.2011.01.017
  • LiHSarathyRZhangJThe role of emotions in shaping consumers’ privacy beliefs about unfamiliar online vendorsJournal of Information Privacy & Security200843366210.1080/2333696X.2008.10855845
  • LiTUngerTWillng to pay for quality personalization? Trade-off between quality and privacyEuropean Journal of Information Systems201221662164210.1057/ejis.2012.13
  • LiYEmpirical studies on online information privacy concerns: Literature review and an integrative frameworkCommunications of the Association for Information Systems2011281453496
  • LindellMKWhitneyDJAccounting for common method variance in cross-sectional research designsJournal of Applied Psychology200186111412110.1037/0021-9010.86.1.114
  • Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression New Media Society10(3), 393–411.
  • LowryPBCaoJEverardAPrivacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two culturesJournal of Management Information Systems201127416320010.2753/MIS0742-1222270406
  • LowryPBGaskinJPartial least squares (pls) structural equation modelling (sem) for building and testing behavioral causal theory: When to choose it and how to use itIEEE Transactions on Professional Communication201457212314610.1109/TPC.2014.2312452
  • LowryPBWilsonDWHaigWLA picture is worth a thousand words: Source credibility theory applied ot logo and website design for heightened credibility and consumer trustInternational Journal of Human-Computer Interaction2014301639310.1080/10447318.2013.839899
  • LuHPHsiaoKLThe influence of extro/introversion on the intention to pay for social networking sitesInformation & Management201047315015710.1016/j.im.2010.01.003
  • MalhotraNKKimSSAgarwalJInternet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal modelInformation Systems Research200415433635510.1287/isre.1040.0032
  • MangelsdorfMEBeyond enterprise 2.0MIT Sloan Management Review20074835055
  • MarwickAEllisonNThere isn’t wifi in heaven! Negotiating visibility on Facebook memorial pagesJournal of Broadcasting & Electronic Media201256337840010.1080/08838151.2012.705197
  • MatookSBrownSARolfJForming an intention to act on recommendations given via online social networksEuropean Journal of Information Systems2015241769210.1057/ejis.2013.28
  • MayerRCDavisJHSchoormanFDAn integrative model of organizational trustAcademy of Management Review1995203709734
  • McAllisterDJAffect- and cognition-based trust as foundations for interpersonal cooperation in organizationsAcademy of Management Journal1995381245910.2307/256727
  • McKnightDHChoudhuryHKacmarCDeveloping and validating trust measures for e-commerce: An integrative typologyInformation Systems Research200213333435910.1287/isre.13.3.334.81
  • MelloJASocial media, employee privacy and concerted activity: Brave new world or big brother?Labor Law Journal2012633165173
  • Metzger MJ (2004) Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication9(4).
  • MilbergSJSmithHJBurkeSJInformation privacy: Corporate management and national regulationOrganization Science2000111355710.1287/orsc.11.1.35.12567
  • MiltgenCLPeyrat-GuillardDCultural and generational influences on privacy concerns: A qualitative study in seven European countriesEuropean Journal of Information Systems201423210312510.1057/ejis.2013.17
  • MoodyGDGallettaDFLowryPBWhen trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behaviorElectronic Commerce Research & Applications201413426628210.1016/j.elerap.2014.05.001
  • MorelandRLAre dyads really groups?Small Group Research201041225126710.1177/1046496409358618
  • Morris JB (2016) First look: internet use in 2015. http://www.ntia.doc.gov/blog/2016/first-look-internet-use-2015. Accessed on September 7, 2016.
  • MorrisonEWRobinsonSLWhen employees feel betrayed: a model of how psychological contract violation developsAcademy of Management Review1997222226256
  • NorbergPAHorneDRHorneDAThe privacy paradox: Personal information disclosure intentions versus behaviorsJournal of Consumer Affairs200741110012610.1111/j.1745-6606.2006.00070.x
  • OetzelMCSpiekermannSA systematic methodology for privacy impact assessments: A design science approachEuropean Journal of Information Systems201423212615010.1057/ejis.2013.18
  • ParkSChungNMediating roles of self-presentation desire in online game community commitment and trust behavior of massive multiplayer online role-playing gamesComputers in Human Behavior20112762372237910.1016/j.chb.2011.07.016
  • PateJMaloneCEnduring perceptions of violationHuman Resource Management Journal2000862831
  • PavlouPAConsumer acceptance of electronic commerce – Integrating trust and risk, with the technology acceptance modelInternational Journal of Electronic Commerce200373101134
  • PavlouPAGefenDPsychological contract violation in online marketplaces: Antecedents, consequences, and moderating roleInformation Systems Research200516437243410.1287/isre.1050.0065
  • Pettersen L and Brandtzaeg PB (2012) Privacy Challenges in Enterprise 2.0. Association of Internet Researchers Salford, UK.
  • PettyRCacioppoJCommunication and Persuasion: Central and Peripheral Routes to Attitude Change1986New YorkSpringer
  • PettyRWegenerDGilbertDFiskeSLindzeyGAttitude change: multiple roles for persuasion variablesHandbook of Social Psychology1998New YorkMcGraw-Hill323390
  • Pew Research (2016) The state of privacy in America: what we learned. http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/. Accessed on August 30, 2016.
  • PoseyCLowryPBRobertsTLProposing the online community self-disclosure model: The case of working professionals in France and the UK who use online communitiesEuropean Journal of Information Systems201019218119510.1057/ejis.2010.15
  • RAUP-LPGAOQDINGYRelationship between the level of intimacy and lurking in online social network servicesComputers in Human Behavior20082462757277010.1016/j.chb.2008.04.001
  • Raynes-Goldie K (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook. First Monday15(1–4), article 32.
  • RidingsCMGefenDArinzeBSome antecedents and effects of trust in virtual communitiesJournal of Strategic Information Systems2002113–427129510.1016/S0963-8687(02)00021-5
  • Ringle CM, Wende S and Becker JM (2015) SmartPLS 3. SmartPLS GmbH, Boenningstedt. http://www.smartpls.com.
  • RobinsonSLTrust and breach of the psychological contractAdministrative Science Quarterly199641457459910.2307/2393868
  • RoseEAn examination of the concern for information privacy in the New Zealand regulatory contextInformation & Management200643332233510.1016/j.im.2005.08.002
  • RousseauDMPsychological and implied contracts in organizationsEmployee Responsibilities Rights Journal19892112113910.1007/BF01384942
  • SchoenbachlerDDGordonGLTrust and customer willingness to provide information in database-driven relationship marketingJournal of Interactive Marketing200216321610.1002/dir.10033
  • SheehanKBAn investigation of gender differences in on-line privacy concerns and resultant behaviorsJournal of Interactive Marketing1999134243810.1002/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O
  • ShengHNahFFSiauKAn experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concernsJournal of the Association for Information Systems200896344377
  • SmithHJManaging privacy : Information technology and corporate America1994Chapel Hill, NCUniversity of North Carolina Press
  • SmithHJDinevTXuHInformation privacy research: An interdisciplinary reviewMIS Quarterly2011354989101510.2307/41409970
  • SmithHJMilbergJSBurkeJSInformation privacy: Measuring individuals’ concerns about organizational practicesMIS Quarterly199620216719610.2307/249477
  • SONJ-YKIMSSInternet users’ information privacy-protective responses: A taxonomy and a nomological modelMIS Quarterly200832350352910.2307/25148854
  • StraubDWValidating instruments in MIS researchMIS Quarterly198913214716910.2307/248922
  • StraubDWBOUDREAUM-CGEFENDValidation guidelines for is positivist researchCommunications of the Association for Information Systems20041324380427
  • SutantoJPalmeETANC-HPHANGCWAddressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone usersMIS Quarterly20133741141116410.25300/MISQ/2013/37.4.07
  • TangZHuYSmithMDGaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptorJournal of Management Information Systems200824415317310.2753/MIS0742-1222240406
  • TowWn-FhDellPVenableJUnderstanding information disclosure behaviour in Australian facebook usersJournal of Information Technology201025212613610.1057/jit.2010.18
  • TRUSTe (2016) U.S. consumer privacy index 2016. https://www.truste.com/resources/privacy-research/ncsa-consumer-privacy-index-us/. Accessed on August 30, 2016.
  • TsaiJYEgelmanSCranorLAcquistiAThe effect of online privacy information on purchasing behavior: An experimental studyInformation Systems Research201122225426810.1287/isre.1090.0260
  • EerdeWThierryHVroom’s expectancy models and work-related criteria: A meta-analysisJournal of Applied Psychology199681557558610.1037/0021-9010.81.5.575
  • SlykeCShimJTJohnsonRJiangJJConcern for information privacy and online consumer purchasingJournal of the Association for Information Systems200676415444
  • VenkateshVDAVISFDA theoretical extension of the technology acceptance model: Four longitudinal field studiesManagement Science200046218620410.1287/mnsc.46.2.186.11926
  • VitakJThe impact of context collapse and privacy on social network site disclosuresJournal of Broadcasting & Electronic Media201256445147010.1080/08838151.2012.732140
  • VroomVHWork and Motivation1964New YorkWiley
  • WakefieldRThe influence of user affect in online information disclosureJournal of Strategic Information Systems201322215717410.1016/j.jsis.2013.01.003
  • WallJDLowryPBBarlowJBOrganizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditoins of strain and excessJournal of the Association for Information Systems20161713976
  • WaltherJHeideBHamelLShulmanHSelf-generated versus other-generated statements and impressions in computer-mediated communicationCommunication Research200936222925310.1177/0093650208330251
  • WarkentinMJohnstonACShropshireJThe influence of the informal social learning environment on information privacy policy compliance efficacy and intentionEuropean Journal of Information Systems201120326728410.1057/ejis.2010.72
  • WeaverACMorrisonBBSocial networkingComputer20084129710010.1109/MC.2008.61
  • WitteEHWitteEHDavisJHSmall-group research and the crisis of social psychology: an introductionUnderstanding Group Behavior: Small Group Processes and Interpersonal Relations2013New YorkPsychology Press18
  • Xu H (2007) The effects of self-construal and perceived control on privacy concerns. In Proceedings of 28th Annual International Conference on Information Systems (ICIS), Montreal.
  • XuHDinevTSmithHJHartPInformation privacy concerns: Linking individual perceptions with institutional privacy assurancesJournal of the Association for Information Systems20111212798824
  • XuHTEOH-HTANBCYAGARWALRThe role of push-pull technology in privacy calculus: The case of location-based servicesJournal of Management Information Systems200926313517310.2753/MIS0742-1222260305
  • Xu H, Teo HH and Tan BCY (2005) Predicting the adoption of location-based services: the roles of trust and privacy risk. In Proceedings of 26th Annual International Conference on Information Systems (ICIS), pp 897–910, Las Vegas, NV.
  • XuHTeoHHTanBCYAgarwalREffects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based servicesInformation Systems Research20122341342136310.1287/isre.1120.0416
  • YuJHUPJ-HTSANG-HSIANGCRole of affect in self-disclosure on social network websites: A test of two competing modelsJournal of Management Information Systems201532223927710.1080/07421222.2015.1063305
  • ZhaoLLuYGuptaSDisclosure intention of location-related information in location-based social network servicesInternational Journal of Electronic Commerce2012164538910.2753/JEC1086-4415160403

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.