1,041
Views
30
CrossRef citations to date
0
Altmetric
Empirical Research

Adverse consequences of access to individuals’ information: an analysis of perceptions and the scope of organisational influence

, , &
Pages 688-715 | Received 23 Jan 2016, Accepted 27 Jun 2017, Published online: 15 Feb 2018

References

  • Abbasi A, Sarker S and Chiang RH (2016) Big data research in information systems: toward an inclusive research agenda. Journal of the Association for Information Systems17(2), i–xxxii.
  • AcquistiABrandimarteLLoewensteinGPrivacy and human behavior in the age of informationScience2015347622150951410.1126/science.aaa1465
  • AltmanIThe Environment and Social Behavior: Privacy, Personal Space, Territory1975CrowdingBrooks/Cole Publishing Company, Monterey, California
  • AndersonCLAgarwalRThe digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health informationInformation Systems Research201122346949010.1287/isre.1100.0335
  • BarbourRDoing Focus Groups2008LondonSage
  • Bauer R (1960) Consumer behavior as risk taking. In Dynamic Marketing for a Changing World, pp 389–398, American Marketing Association, Chicago, IL.
  • BCG (2013) The value of our digital identity. https://www.bcgperspectives.com/content/articles/digital_economy_consumer_insight_value_of_our_digital_identity/. Accessed June 29, 2013.
  • BélangerFTheorizing in information systems research using focus groupsAustralasian Journal of Information Systems201217210913510.3127/ajis.v17i2.695
  • BélangerFCrosslerREPrivacy in the digital age: a review of information privacy research in information systemsManagement Information Systems Quarterly20113541017104210.2307/41409971
  • BITKOM (2015) Internetnutzer gehen pragmatisch mit Datenschutz um. https://www.bitkom.org/Presse/Presseinformation/Internetnutzer-gehen-pragmatisch-mit-Datenschutz-um.html. Accessed January 22, 2016.
  • Chen J, Ping W, Xu Y and Tan B (2009) Am I afraid of my peers? Understanding the antecedents of information privacy concerns in the online social context. In Proceedings of the Thirtieth International Conference on Information Systems (Chen H and Slaugther S, Eds), Association for Information Systems, Phoenix, AZ.
  • ChiuC-MWangETGFangY-HHuangH-YUnderstanding customers’ repeat purchase intentions in b2c e-commerce: the roles of utilitarian value, hedonic value and perceived riskInformation Systems Journal20142418511410.1111/j.1365-2575.2012.00407.x
  • CongerSPrattJHLochKDPersonal information privacy and emerging technologiesInformation Systems Journal201323540141710.1111/j.1365-2575.2012.00402.x
  • CorbinJStraussABasics of Qualitative Research: Grounded Theory Procedures and Techniques2008Newbury ParkSage
  • CorbinJMStraussAGrounded theory research: procedures, canons, and evaluative criteriaQualitative Sociology199013132110.1007/BF00988593
  • CunninghamSMCoxDFThe major dimensions of perceived riskRisk Taking and Information Handling in Consumer Behavior1967Boston, MAHarvard University Press82108
  • DinevTWhy would we care about privacy?European Journal of Information Systems20142329710210.1057/ejis.2014.1
  • DinevTHartPAn extended privacy calculus model for e-commerce transactionsInformation Systems Research2006171618010.1287/isre.1060.0080
  • DinevTXuHSmithJHHartPInformation privacy and correlates: an empirical attempt to bridge and distinguish privacy-related conceptsEuropean Journal of Information Systems201322329531610.1057/ejis.2012.23
  • DowlingGRPerceived risk: the concept and its measurementPsychology & Marketing19863319321010.1002/mar.4220030307
  • EMC (2016) EMC privacy index. http://www.emc.com/campaign/privacy-index/index.htm?pid=home-emcprivacyindex-120614. Accessed September 29, 2016.
  • FajaSTrimiSInfluence of the web vendor’s interventions on privacy-related behaviors in e-commerceCommunications of the Association for Information Systems200617268
  • FeathermanMSPavlouPAPredicting e-services adoption: a perceived risk facets perspectiveInternational Journal of Human-Computer Studies200359445147410.1016/S1071-5819(03)00111-3
  • FernEFAdvanced Focus Group Research2001LondonSage publications
  • GloverSBenbasatIA comprehensive model of perceived risk of e-commerce transactionsInternational Journal of Electronic Commerce2010152477810.2753/JEC1086-4415150202
  • GreenawayKEChanYEDesigning a customer information privacy program aligned with organizational prioritiesManagement Information Systems Quarterly Executive2013123137150
  • HannI-HHuiK-LLeeS-YTPngIPLOvercoming online information privacy concerns: an information-processing theory approachJournal of Management Information Systems2007242134210.2753/MIS0742-1222240202
  • HongWThongJYLInternet privacy concerns: an integrated conceptualization and four empirical studiesMIS Quarterly201337127529810.25300/MISQ/2013/37.1.12
  • HuiK-LTeoHHLeeS-YTThe value of privacy assurance: an exploratory field experimentMIS Quarterly2007311193310.2307/25148779
  • Jacoby J and Kaplan LB (1972) The components of perceived risk. In Proceedings of the Third Annual Conference of the Association for Consumer Research (Venkatesan M, Ed), pp 382–393, Association for Consumer Research, Chicago, IL.
  • JeongB-KZhaoKKhoujaMConsumer piracy risk: conceptualization and measurement in music sharingInternational Journal of Electronic Commerce20121638911810.2753/JEC1086-4415160304
  • JiangZHengCSChoiBCPrivacy concerns and privacy-protective behavior in synchronous online social interactionsInformation Systems Research201324357959510.1287/isre.1120.0441
  • JunglasIAJohnsonNASpitzmüllerCPersonality traits and concern for privacy: an empirical study in the context of location-based servicesEuropean Journal of Information Systems200817438740210.1057/ejis.2008.29
  • KimDJYimMSugumaranVRaoHRWeb assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nationsEuropean Journal of Information Systems201625325227310.1057/ejis.2015.16
  • KimKKimJThird-party privacy certification as an online advertising strategy: an investigation of the factors affecting the relationship between third-party certification and initial trustJournal of Interactive Marketing201125314515810.1016/j.intmar.2010.09.003
  • KitzingerJQualitative research. introducing focus groupsBMJ. British Medical Journal1995311700029930210.1136/bmj.311.7000.299
  • KrasnovaHGüntherOSpiekermannSKorolevaKPrivacy concerns and identity in online social networksIdentity in the Information Society200921396310.1007/s12394-009-0019-1
  • KrasnovaHSpiekermannSKorolevaKHildebrandTOnline social networks: why we discloseJournal of Information Technology201025210912510.1057/jit.2010.6
  • LazarusRSFolkmanSStress, Appraisal, and Coping1984New York, New YorkSpringer Publishing Company LLC
  • LincolnYSGubaEGNaturalistic Inquiry1985Newbury Park, CaliforniaSage
  • LuoXLiHZhangJShimJPExamining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking servicesDecision Support Systems201049222223410.1016/j.dss.2010.02.008
  • MalhotraNKKimSSAgarwalJInternet users’ information privacy concerns (iuipc): the construct, the scale, and a causal modelInformation Systems Research200415433635510.1287/isre.1040.0032
  • McKinsey & Company (2013) Perspectives on retail and consumer goods. http://www.mckinsey.com/client_service/retail/latest_thinking/perspectives_spring_2013. Accessed January 22, 2016.
  • MeichenbaumDCognitive-Behaviour Modification: An Integrative Approach1977New York, New YorkSpringer Science + Business Media
  • MiltgenCLPeyrat-GuillardDCultural and generational influences on privacy concerns: a qualitative study in seven European countriesEuropean Journal of Information Systems201423210312510.1057/ejis.2013.17
  • MitchellV-WConsumer perceived risk: conceptualisations and modelsEuropean Journal of Marketing1999331/216319510.1108/03090569910249229
  • MitchellV-WGreatorexMRisk perception and reduction in the purchase of consumer servicesService Industries Journal199313417920010.1080/02642069300000068
  • MothersbaughDLFoxxWKBeattySEWangSDisclosure antecedents in an online service context the role of sensitivity of informationJournal of Service Research2012151769810.1177/1094670511424924
  • OetzelMCSpiekermannSA systematic methodology for privacy impact assessments: a design science approachEuropean Journal of Information Systems201423212615010.1057/ejis.2013.18
  • ParksRXuHChuC-HLowryPBExamining the intended and unintended consequences of organisational privacy safeguardsEuropean Journal of Information Systems2016261376510.1057/s41303-016-0001-6
  • PetronioSBoundaries of Privacy: Dialectics of Disclosure2002Albany, New YorkState University of New York Press
  • PoseyCLowryPBRobertsTLEllisTSProposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communitiesEuropean Journal of Information Systems201019218119510.1057/ejis.2010.15
  • PreibuschSGuide to measuring privacy concern: review of survey and observational instrumentsInternational Journal of Human-Computer Studies201371121133114310.1016/j.ijhcs.2013.09.002
  • Sánchez AbrilPLevinARiegoABlurred boundaries: social media privacy and the twenty-first-century employeeAmerican Business Law Journal20124916312410.1111/j.1744-1714.2011.01127.x
  • SarkerSSarkerSExploring agility in distributed information systems development teams: an interpretive study in an offshoring contextInformation Systems Research200920344046110.1287/isre.1090.0241
  • SlykeCShimJTJohnsonRJiangJConcern for information privacy and online consumer purchasingJournal of the Association for Information Systems200676415444
  • SmithHJDinevTXuHInformation privacy research: an interdisciplinary reviewManagement Information Systems Quarterly2011354989101610.2307/41409970
  • SmithHJMilbergSJBurkeSJInformation privacy: measuring individuals’ concerns about organizational practicesManagement Information Systems Quarterly199620216719610.2307/249477
  • StewartDWShamdasaniPNRookDWFocus Groups: Theory and Practice2007Newbury Park, CaliforniaSage
  • StrongDMVolkoffOUnderstanding organization – enterprise system fit: a path to theorizing the information technology artifactManagement Information Systems Quarterly201034473175610.2307/25750703
  • Symantec (2015) State of privacy report 2015. http://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf. Accessed January 22, 2016.
  • TRUSTe (2013) 2013 TRUSTe US consumer confidence index. http://www.truste.com/us-consumer-confidence-index-2013/. Accessed August 7, 2013.
  • TsaiJYEgelmanSCranorLAcquistiAThe effect of online privacy information on purchasing behavior: an experimental studyInformation Systems Research201122225426810.1287/isre.1090.0260
  • WallJDLowryPBBarlowJBOrganizational violations of externally governed privacy and security rules: explaining and predicting selective violations under conditions of strain and excessJournal of the Association for Information Systems20161713976
  • WalshamGInterpretive case studies in is research: nature and methodEuropean Journal of Information Systems199542748110.1057/ejis.1995.9
  • WestinAFPrivacy and Freedom1967New York, New YorkAtheneum Press
  • Wu Y, Ryan S and Windsor J (2009) Influence of social context and affect on individuals’ implementation of information security safeguards. In Proceedings of the Thirtieth International Conference on Information Systems (Chen H and Slaugther S, Eds), Association for Information Systems, Phoenix, AZ.
  • XuHDinevTSmithJHartPInformation privacy concerns: linking individual perceptions with institutional privacy assurancesJournal of the Association for Information Systems20111212798824
  • XuHTeoH-HTanBCAgarwalRThe role of push-pull technology in privacy calculus: the case of location-based servicesJournal of Management Information Systems200926313517410.2753/MIS0742-1222260305

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.