757
Views
10
CrossRef citations to date
0
Altmetric
Netlife and cyber-humans

Expectations of privacy and trust: examining the views of IT professionals

, &
Pages 500-510 | Received 09 Nov 2014, Accepted 22 Jun 2015, Published online: 31 Jul 2015

References

  • Ackerman, M., L. Cranor, and J. Reagle. 1999. “Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences.” In EC '99 Proceedings of the 1st ACM Conference on Electronic Commerce, 1–8. New York: ACM.
  • Acquisti, A., and R. Gross. 2006. “Imagined Communities: Awareness, Information Sharing and Privacy on the Facebook.” In Privacy Enhancing Technologies: 6th International Workship, PET 2006, Cambridge, UK, June 2006, edited by George Danezis and Philippe Golle, 36–58. Berlin: Springer.
  • Amazon. 2012. Internet Based Ads – Third Parties. Accessed November 14, 2012. http://www.amazon.com/b/?&node=5160028011.
  • Anton, A. I., E. Bertino, N. Li, and T. Yu. 2007. “A Roadmap for Comprehensive Online Privacy Policy Management.” Communications of the ACM 50 (7): 109–116. doi: 10.1145/1272516.1272522
  • AT Kearney. 2013. AT Kearney's 2013 e-Commerce Index. November 25, 2013. Accessed December 10, 2013. http://www.atkearney.com/documents/10192/3609951/Online+Retail+Is+Front+and+Center+in+the+Quest+for+Growth.pdf/f6693929-b2d6-459e-afaa-3a892adbf33e.
  • Bagüés, S., A. Zeidler, C. Klein, C. Valdivielso, and I. Matias. 2010. “Enabling Personal Privacy for Pervasive Computing Environments.” Journal of Universal Computer Science 16 (3): 341–371.
  • Bélanger, F., J. S. Hiller, and W. J. Smith. 2002. “Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes.” Journal of Strategic Information Systems 11 (3/4): 245–270. doi: 10.1016/S0963-8687(02)00018-5
  • Beldad, A., T. Van Der Geest, M. De Jong, and M. Steehouder. 2012. “A Cue or Two and I'll Trust You: Determinants of Trust in Government Organizations in terms of Their Processing and Usage of Citizens' Personal Information Disclosed Online.” Government Information Quarterly 29 (1): 41–49. doi: 10.1016/j.giq.2011.05.003
  • Bellman, S., E. J. Johnson, S. J. Kobrin, and G. L. Lohse. 2004. “International Differences in Information Privacy Concerns: A Global Survey of Consumers.” Information Society 20 (5): 313–324. doi: 10.1080/01972240490507956
  • Bibas, S. 1994. “A Contractual Approach to Data Privacy.” Harvard Journal of Law & Public Policy 17 (2): 591–605.
  • Carter, L., and F. Bélanger. 2005. “The Utilization of E-government Services: Citizen Trust, Innovation and Acceptance Factors.” Information Systems Journal 15: 5–25. doi: 10.1111/j.1365-2575.2005.00183.x
  • Caudill, E. M., and P. E. Murphy. 2000. “Consumer Online Privacy: Legal and Ethical Issues.” Journal of Public Policy & Marketing 19 (1): 7–19. doi: 10.1509/jppm.19.1.7.16951
  • Chen, H.-G., C. C. Chen, L. Lo, and S. C. Yang. 2008. “Online Privacy Control via Anonymity and Pseudonym: Cross-cultural Implications.” Behaviour & Information Technology 27 (3): 229–242. doi: 10.1080/01449290601156817
  • Clarke, R. 1999. “Internet Privacy Concerns Confirm the Case for Intervention.” Communications of the ACM 42 (2): 60–67. doi: 10.1145/293411.293475
  • Commonwealth of Australia. 2010. The Adequacy of Protections for Privacy of Australians Online. June 24, 2010. Accessed September 30, 2010. http://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Environment_and_Communications/Completed_inquiries/2010-13/onlineprivacy/index.
  • Commonwealth of Australia. 2014. Privacy Act 1988. March 2014. Accessed March 21, 2014. http://www.comlaw.gov.au/Details/C2014C00076/Html/Text.
  • Cranor, L. 1999. “Internet Privacy.” Communications of the ACM 42 (2): 28–38. doi: 10.1145/293411.293440
  • Creswell, J. 2007. Qualitative Inquiry and Research Design. 2nd ed. Thousand Oaks, CA: Sage.
  • Culnan, M. J. 1993. “How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use.” MIS Quarterly 17 (3): 341–363. doi: 10.2307/249775
  • Debatin, B., J. P. Lovejoy, A.-K. Horn, and B. N. Hughes. 2009. “Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences.” Journal of Computer-Mediated Communication 15 (1): 83–108. doi: 10.1111/j.1083-6101.2009.01494.x
  • Denzin, N., and Y. Lincoln. 2011. The Handbook of Qualitative Research. 4th ed. Thousand Oaks, CA: Sage.
  • Dinev, T., P. Hart, and M. R. Mullen. 2008. “Internet Privacy Concerns and Beliefs about Government Surveillance – An Empirical Investigation.” Journal of Strategic Information Systems 17 (3): 214–233. doi: 10.1016/j.jsis.2007.09.002
  • Dinev, T., H. Xu, J. Smith, and P. Hart. 2013. “Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-related Concepts.” European Journal of Information Systems 12: 295–316. doi: 10.1057/ejis.2012.23
  • Dommeyer, C. J., and B. L. Gross. 2003. “What Consumers Know and What They Do: An Investigation of Consumer Knowledge, Awareness, and Use of Privacy Protection Strategies.” Journal of Interactive Marketing 17: 34–51. doi: 10.1002/dir.10053
  • Dwyer, C., and S. Hiltz. 2008. “Designing Privacy Into Online Communities.” In Proceedings of Internet Research 9.0, Copenhagen, Denmark, 15–18. October 1–8 2008.
  • eBay. 2012. eBay Privacy Policy. Accessed November 14, 2012. http://pages.ebay.com.au/help/policies/privacy-policy.html#internal_sps.
  • Facebook. 2012. One Billion People on Facebook. Accessed October 14, 2012. http://newsroom.fb.com/News/One-Billion-People-on-Facebook-1c9.aspx.
  • Feng, J., J. Lazar, and J. Preece. 2004. “Empathy and Online Interpersonal Trust: A Fragile Relationship.” Behaviour & Information Technology 23 (2): 97–106. doi: 10.1080/01449290310001659240
  • Gefen, D., E. Karahanna, and D. Straub. 2003. “Trust and TAM in Online Shopping: An Integrated Model.” MIS Quarterly 27 (1): 51–90.
  • Gragido, W., and J. Pirc. 2011. Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Rockland, MA: Syngress Media.
  • Hemphill, T. 2002. “Electronic Commerce and Consumer Privacy: Establishing Online Trust in the US Digital Economy.” Business and Society Review 107 (2): 221–239. doi: 10.1111/1467-8594.00134
  • Hoffman, D. L., T. P. Novak, and M. Peralta. 1999. “Building Consumer Trust Online.” Communications of the ACM 42 (4): 80–85. doi: 10.1145/299157.299175
  • Jarvenpaa, S. L., N. Tractinsky, and M. Vitale. 2000. “Consumer Trust in an Internet Store.” Information Technology and Management 1: 45–71. doi: 10.1023/A:1019104520776
  • Jin, B., J. Y. Park, and H.-S. Kim. 2010. “What Makes Online Community Members Commit? A Social Exchange Perspective.” Behaviour & Information Technology 29 (6): 587–599. doi: 10.1080/0144929X.2010.497563
  • Jutla, D. N., and P. Bodorik. 2005. “Sociotechnical Architecture for Online Privacy.” IEEE Security and Privacy 3 (2): 29–39. doi: 10.1109/MSP.2005.50
  • Karat, J., C.-M. Karat, C. Brodie, and J. Feng. 2005. “Privacy in Information Technology: Designing to Enable Privacy Policy Management in Organizations.” International Journal of Human-Computer Studies 63 (1/2): 153–174. doi: 10.1016/j.ijhcs.2005.04.011
  • Lee, D., R. Larose, and N. Rifon. 2008. “Keeping Our Network Safe: A Model of Online Protection Behaviour.” Behaviour & Information Technology 27 (5): 445–454. doi: 10.1080/01449290600879344
  • Leximancer. 2005. Version 2.25 Manual. Accessed November 21, 2006. http://www.leximancer.com/documents/Leximancer2_Manual.pdf.
  • Li, Y.-M., and Y.-S. Yeh. 2010. “Increasing Trust in Mobile Commerce through Design Aesthetics.” Computers in Human Behavior 26 (4): 673–684. doi: 10.1016/j.chb.2010.01.004
  • Liu, C., J. T. Marchewka, J. Lu, and C.-S. Yu. 2005. “Beyond Concern – A Privacy-Trust-Behavioral Intention Model of Electronic Commerce.” Information & Management 42 (2): 289–304. doi: 10.1016/j.im.2004.01.003
  • Lwin, M., J. Wirtz, and J. D. Williams. 2007. “Consumer Online Privacy Concerns and Responses: A Power-Responsibility Equilibrium Perspective.” Journal of the Academy of Marketing Science 35 (4): 572–585. doi: 10.1007/s11747-006-0003-3
  • Lytras, M., and P. Ordóñez de Pablos. 2011. “Software Technologies in Knowledge Society.” Journal of Universal Computer Science 17 (9): 1219–1221.
  • Lytras, M., and P. Ordóñez de Pablos. 2013. “Advanced Human–computer Interaction.” Computers in Human Behavior 29: 305–306. doi: 10.1016/j.chb.2012.11.018
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15 (4): 336–355. doi: 10.1287/isre.1040.0032
  • Martin, N. J., and J. L. Rice. 2010. “Building Better Government IT: Understanding Community Beliefs and Attitudes Toward Smart Card Technologies.” Behaviour & Information Technology 29 (4): 433–444. doi: 10.1080/01449291003767938
  • Martin, D., H. Wu, and A. Alsaid. 2003. “Hidden Surveillance by Websites: Web Bugs in Contemporary Use.” Communications of the ACM 46 (12): 258–264. doi: 10.1145/953460.953509
  • Milberg, S. J., H. J. Smith, and S. J. Burke. 2000. “Information Privacy: Corporate Management and National Regulation.” Organization Science 11 (1): 35–57. doi: 10.1287/orsc.11.1.35.12567
  • Miles, M., A. Huberman, and J. Saldana. 2014. Qualitative Data Analysis. 3rd ed. Thousand Oaks, CA: Sage.
  • Milne, G. R., and S. Bahl. 2010. “Are There Differences Between Consumers' and Marketers' Privacy Expectations? A Segment- and Technology-Level Analysis.” Journal of Public Policy & Marketing 29 (1): 138–149. doi: 10.1509/jppm.29.1.138
  • Milne, G., and Culnan, M. 2004. “Strategies for Reducing Online Privacy Risks: Why Consumers Read (Or Don't Read) Online Privacy Notices.” Journal of Interactive Marketing 18 (3): 15–29. doi: 10.1002/dir.20009
  • Milne, G. R., A. J. Rohm, and S. Bahl. 2004. “Consumers' Protection of Online Privacy and Identity.” Journal of Consumer Affairs 38 (2): 217–232. doi: 10.1111/j.1745-6606.2004.tb00865.x
  • Miyazaki, A. 2008. “Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage.” Journal of Public Policy & Marketing 27 (1): 19–33. doi: 10.1509/jppm.27.1.19
  • Moll, R., S. Pieschl, and R. Bromme. 2014. “Competent or Clueless? Users' Knowledge and Misperceptions about their Online Privacy Management.” Computers in Human Behavior 41: 212–219. doi: 10.1016/j.chb.2014.09.033
  • Mouratidis, H., C. Kalloniatis, S. Islam, M.-P. Huget, and S. Gritzalis. 2012. “Aligning Security and Privacy to Support the Development of Secure Information Systems.” Journal of Universal Computer Science 18 (12): 1608–1627.
  • Nowak, G. J., and J. Phelps. 1995. “Direct Marketing and the Use of Individual-level Consumer Information: Determining how and when Privacy Matters.” Journal of Direct Marketing 9: 46–60. doi: 10.1002/dir.4000090307
  • Pan, Y., and G. M. Zinkhan. 2006. “Exploring the Impact of Online Privacy Disclosures on Consumer Trust.” Journal of Retailing 82 (4): 331–338. doi: 10.1016/j.jretai.2006.08.006
  • Phelps, J., G. Nowak, and E. Ferrell. 2000. “Privacy Concerns and Consumer Willingness to Provide Personal Information.” Journal of Public Policy and Marketing 19 (1): 27–41. doi: 10.1509/jppm.19.1.27.16941
  • Pollach, I. 2007. “What's Wrong with Online Privacy Policies?” Communications of the ACM 50 (9): 103–108. doi: 10.1145/1284621.1284627
  • Privacy International. 2007. Surveillance Monitor 2007. International Country Rankings. London: Privacy International.
  • Privacy International. 2011. Surveillance Monitor 2011. Assessment of Surveillance across Europe. London: Privacy International.
  • Qi, M., and D. Edgar-Nevill. 2011. “Social Networking Searching and Privacy Issues.” Information Security Technical Report 16: 74–78.
  • Raab, C., and B. Goold. 2011. Protecting Information Privacy, Equality and Human Rights Commission Research Report 69. Manchester: Equality and Human Rights Commission.
  • Reay, I., P. Beatty, S. Dick, and J. Miller. 2011. “Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies.” International Journal of Information Security and Privacy 3 (4): 68–69. doi: 10.4018/jisp.2009100105
  • Salam, A. F., L. Iyer, P. Palvia, and R. Singh. 2005. “Trust in e-Commerce.” Communications of the ACM 48 (2): 72–77. doi: 10.1145/1042091.1042093
  • Satchell, C., G. Shanks, S. Howard, and J. Murphy. 2011. “Identity Crisis: User Perspectives on Multiplicity and Control in Federated Identity Management.” Behaviour & Information Technology 30 (1): 51–62. doi: 10.1080/01449290801987292
  • Schwaig, K. S., G. C. Kane, and V. C. Storey. 2006. “Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?” Information and Management 43: 805–820. doi: 10.1016/j.im.2006.07.003
  • Shaikh, A. A., and H. Karjaluoto. 2015. “Making the Most of Information Technology & Systems Usage: A Literature Review, Framework and Future Research Agenda.” Computers in Human Behavior 49: 541–566. doi: 10.1016/j.chb.2015.03.059
  • Sipior, J. C., B. T. Ward, and R. A. Mendoza. 2011. “Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons.” Journal of Internet Commerce 10 (1): 1–16. doi: 10.1080/15332861.2011.558454
  • Smith, H., T. Dinev, and H. Xu. 2011. “Information Privacy Research: An Interdisciplinary Review.” MIS Quarterly 35 (4): 989–1015.
  • Smith, A. E., and M. S. Humphreys. 2006. “Evaluation of Unsupervised Semantic Mapping of Natural Language with Leximancer Concept Mapping.” Behaviour Research Methods 38 (2): 262–279. doi: 10.3758/BF03192778
  • Son, J., and S. Kim. 2008. “Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model.” MIS Quarterly 32 (3): 503–529.
  • Stallman, R. 2005. “To Defend Privacy, Don't Collect Personal Data.” Communications of the ACM 48 (5): 11. doi: 10.1145/1060710.1060724
  • Stibel, J. 2005. “Mental Models and Online Consumer Behaviour.” Behaviour & Information Technology 24 (2): 147–150. doi: 10.1080/01449290512331321901
  • Svendsen, G., J-A. Johnsen, L. Almås-Sørensen, and J. Vittersø. 2013. “Personality and Technology Acceptance: The Influence of Personality Factors on the Core Constructs of the Technology Acceptance Model.” Behaviour & Information Technology 32 (4): 323–334. doi: 10.1080/0144929X.2011.553740
  • Symantec. 2014. Internet Security Threat Report, Volume 19, April 2014. Mountain View, CA: Symantec.
  • Tang, Z., Y. Hu, and M. Smith. 2008. “Gaining Trust through Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor.” Journal of Management Information Systems 24 (4): 153–173. doi: 10.2753/MIS0742-1222240406
  • Tsai, J., S. Egelma, L. Cranor, and A. Acquisti. 2011. “The Effect of Online Privacy Information on Purchasing Behavior.” Information Systems Research 22 (2): 254–268. doi: 10.1287/isre.1090.0260
  • Wu, K.-W., S. Y. Huang, D. C. Yen, and I. Popova. 2012. “The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust.” Computers in Human Behavior 28: 889–8970. doi: 10.1016/j.chb.2011.12.008
  • Wu, J.-J., and A. S. L. Tsang. 2008. “Factors Affecting Members' Trust Belief and Behaviour Intention in Virtual Communities.” Behaviour & Information Technology 27 (2): 115–125. doi: 10.1080/01449290600961910
  • Xie, E., H.-H. Teo, and W. Wan. 2006. “Volunteering Personal Information on the Internet: Effects of Reputation, Privacy Notices, and Rewards on Online Consumer Behavior.” Marketing Letters 17 (1): 61–74. doi: 10.1007/s11002-006-4147-1

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.