820
Views
20
CrossRef citations to date
0
Altmetric
E-business

The role of perceived information practices on consumers’ intention to authorise secondary use of personal data

, , , &
Pages 339-356 | Received 06 Aug 2014, Accepted 30 Nov 2015, Published online: 15 Feb 2016

References

  • Agarwal, R., V. Sambamurthy, and R. M. Stair. 2000. “Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy – An Empirical Assesment.” Information Systems Research 11 (4): 418–430.
  • Ajzen, I. 1985. “From Intentions to Actions: A Theory of Planned Behavior.” In Action-Control: From Cognition to Behavior, edited by J. Kuhl and J. Bechmann, 11–39. Heidelberg: Springer.
  • Ajzen, I. 1991. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50 (2): 179–211.
  • Ajzen, I. 2002. “Constructing a TPB Questionnaire: Conceptual and Methodological Considerations.” http://chuang.epage.au.edu.tw/ezfiles/168/1168/attach/20/pta_41176_7688352_57138.pdf.
  • Ajzen, I., and M. Fishbein. 1980. Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, NJ: Prentice-Hall.
  • Bali, S. 2013. Telcos: Leveraging Trust Through Privacy Management. OVUM Research.
  • Bansal, G., F. Zahedi, and D. Gefen. 2010. “The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online.” Decision Support Systems 49 (2): 138–150.
  • Barclay, D., C. Higgins, and R. Thompson. 1995. “The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration.” Technology Studies 2 (2): 285–309.
  • Baron, R. M., and D. A. Kenny. 1986. “The Moderator–Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations.” Journal of Personality and Social Psychology 51 (6): 1173–1182.
  • Brandimarte, L., A. Acquisti, and G. Loewenstein. 2013. “Misplaced Confidences: Privacy and the Control Paradox.” Social Psychological and Personality Science 4 (3): 340–347.
  • Brown, B., M. Chui, and J. Manyika. 2011. “Are You Ready for the Era of ‘Big Data’?” McKinsey Quarterly 4: 24–35.
  • Brown, S. A., R. M. Fuller, and C. Vician. 2004. “Who's Afraid of the Virtual World? Anxiety and Computer-Mediated Communication.” Journal of the Association for Information Systems 5 (2): 79–107.
  • Chellappa, R. K., and R. G. Sin. 2005. “Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma.” Information Technology and Management 6 (2–3): 181–202.
  • Chen, H.-G., C. C. Chen, L. Lo, and S. C. Yang. 2008. “Online Privacy Control via Anonymity and Pseudonym: Cross-Cultural Implications.” Behaviour & Information Technology 27 (3): 229–242. doi:10.1080/01449290601156817
  • Chen, H., R. H. Chiang, and V. C. Storey. 2012. “Business Intelligence and Analytics: From Big Data to Big Impact.” MIS Quarterly 36 (4): 1165–1188.
  • Chin, W. W. 1998. “The Partial Least Squares Approach for Structural Equation Modeling.” In Modern Methods for Business Research, edited by G. A. Marcoulides, 295–336. Mahwah, NJ: Lawrence Erlbaum Associates.
  • Chin, W. W. 2010. “How to Write Up and Report PLS Analyses.” In Handbook of Partial Least Sqaures, edited by V. Esposito Vinzi, W. W. Chin, J. Henseler, and H. Wang, 655–690. Heidelberg: Springer.
  • Choi, H.-S. 2014. “Hackers Steal 12 m KT Users’ Information.” The Korea Herald. Accessed March 6. http://www.koreaherald.com/view.php?ud=20140306001442.
  • Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciencies. Hillsdale, NJ: Lawrence Erlbaum Associates.
  • Cohen, J. 1992. “A Power Premier.” Psychological Bulletin 112: 155–159.
  • Culnan, M. J., and P. K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10 (1): 104–115.
  • Davis, F. D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.” MIS Quarterly 13 (3): 319–340.
  • Dinev, T., and P. Hart. 2006. “An Extended Privacy Calculus Model for E-Commerce Transactions.” Information Systems Research 17 (1): 61–80.
  • Dinev, T., P. Hart, and M. R. Mullen. 2008. “Internet Privacy Concerns and Beliefs About Government Surveillance – An Empirical Investigation.” Journal of Strategic Information Systems 17 (3): 214–233.
  • Directive 95/46/ec of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals With Regard to the Processing of Personal Data and on the Free Movement of Such Data, No L 281 C.F.R. 1995.
  • Economist Intelligence Unit. 2012. Big Data and the Democratisation of Decisions. London: The Economist.
  • Edelenbos, J., and J. Eshuis. 2011. “The Interplay Between Trust and Control in Governance Processes: A Conceptual and Empirical Investigation.” Administration & Society 44 (6): 647–674.
  • Festinger, L. 1957. A Theory of Cognitive Dissonance. Stanford, CA: Standford University Press.
  • Fornell, C., and J. Cha. 1994. “Partial Least Squares.” In Advanced Methods of Marketing Research, edited by R. P. Bagozzi, 52–78. Cambridge, MA: Blackwell.
  • Gefen, D., and I. Reychav. 2014. “Why Trustworthiness in an IT Vendor is Important Even After the Vendor Left: IT is Accepting the Message and Not Just the Messenger that is Important.” Omega 44: 111–125.
  • Gefen, D., D. W. Straub, and M.-C. Boudreau. 2000. “Structural Equation Modeling and Regression: Guidelines for Research Practice.” Communications of the Association for Information Systems 4: 1–78.
  • Glazer, R. 1991. “Marketing in an Information-Intensive Environment: Strategic Implications of Knowledge as an Asset.” Journal of Marketing 55 (4): 1–19.
  • Götz, O., K. Liehr-Gobbers, and M. Krafft. 2010. “Evaluation of Structural Equation Models Using the Partial Least Squares (PLS) Approach.” In Handbook of Partial Least Squares: Concepts, Methods and Applications, edited by V. Esposito, W. W. Chin, J. Henseler, and H. Wang, 691–711. Heidelberg: Springer.
  • Green Consumer. 2013. “Mobile Tariff Rate Cuts Enabled Through Initiating New Competition Policy Measures.” [In Korean.] Accessed February 10, 2015. http://www.gcn.or.kr/common/news_download.gcn?seq=5118.
  • Hair, J. F., C. M. Ringle, and M. Sarstedt. 2011. “PLS-SEM: Indeed a Silver Bullet.” The Journal of Marketing Theory and Practice 19 (2): 139–152.
  • Hair, J. F., C. B. William, J. B. Barry, and E. A. Rolph. 2010. Multivariate Data Analysis. Englewood Cliffs: Prentice Hall.
  • Hann, I.-H., K.-L. Hui, T. S. Lee, and I. P. L. Png. 2002. “Online Information Privacy: Measuring the Cost-Benefit Trade-Off.” Proceedings of the 23rd International Conference on Information Systems (ICIS 2002), Paper 1, Barcelona.
  • Harris, P. 1996. “Sufficient Grounds for Optimism? The Relationship between Perceived Controllability and Optimistic Bias.” Journal of Social and Clinical Psychology 15 (1): 9–52.
  • Hazen, B. T., C. Cegielski, and J. B. Hanna. 2011. “Diffusion of Green Supply Chain Management: Examining Perceived Quality of Green Reverse Logistics.” International Journal of Logistics Management 22 (3): 373–389.
  • Hoffman, D. L., T. P. Novak, and M. Peralta. 1999. “Building Consumer Trust Online.” Communications of the ACM 42 (4): 80–85.
  • Hu, X., Z. Lin, A. B. Whinston, and H. Zhang. 2004. “Hope or Hype: On the Viability of Escrow Services as Trusted Third Parties in Online Auction Environments.” Information Systems Research 15 (3): 236–249.
  • Hui, K.-L., B. C. Tan, and C.-Y. Goh. 2006. “Online Information Disclosure: Motivators and Measurements.” ACM Transactions on Internet Technology (TOIT) 6 (4): 415–441.
  • Hultén, B. 2007. “Customer Segmentation: The Concepts of Trust, Commitment and Relationships.” Journal of Targeting, Measurement and Analysis for Marketing 15 (4): 256–269.
  • Hwang, T. H. 2013. “SKT Invest 1,200 Billion KRW in ICT Convergence Business.” [In Korean.] ET News. Accessed May 9. http://ciobiz.etnews.com/news/news/inovation/2763933_1822.html.
  • Jarvenpaa, S. L., N. Tractinsky, and M. Vitale. 2000. “Consumer Trust in an Internet Store.” Information Technology and Management 1 (1–2): 45–71.
  • Joinson, A. N., U.-D. Reips, T. Buchanan, and C. B. P. Schofield. 2010. “Privacy, Trust, and Self-Disclosure Online.” Human–Computer Interaction 25 (1): 1–24.
  • Kanzler, S. 2010. “Research Section: Knowledge Sharing in Heterogeneous Collaborations – A Longitudinal Investigation of a Cross-Cultural Research Collaboration in Nanoscience.” Journal of Business Chemistry 7 (1): 31–45.
  • KCC (Korea Communications Commission). 2013. “ICT Statistics.” [In Korean.] Accessed June 20, 2013. http://kcc.go.kr/user.do?boardId=1030&page=A02060400&dc=K02060400.
  • Kim, D. J., D. L. Ferrin, and H. R. Rao. 2008. “A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents.” Decision Support Systems 44 (2): 544–564.
  • Kline, R. B. 2011. Principles and Practice of Structural Equation Modeling. New York: Guilford Press.
  • Kobsa, A., S. Patil, and B. Meyer. 2010. “Privacy in Instant Messaging: An Impression Management Model.” Behaviour & Information Technology 31 (4): 355–370. doi: 10.1080/01449291003611326.
  • Komiak, S. Y. X., and I. Benbasat. 2006. “The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents.” MIS Quarterly 30 (4): 941–960.
  • Kwon, G. H. 2012. “Why KT invest 100 Billion KRW in Contents Fund.” [In Korean.] ET News. Accessed September 17. http://www.etnews.com/news/telecom/telecom/2648115_1435.html.
  • Lee, M.-C. 2009. “Factors Influencing the Adoption of Internet Banking: An Integration of TAM and TPB with Perceived Risk and Perceived Benefit.” Electronic Commerce Research and Applications 8 (3): 130–141.
  • Li, Y. 2011. “Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework.” Communications of the Association for Information Systems 28 (28): 453–496.
  • Li, Y. 2012. “Theories in Online Information Privacy Research: A Critical Review and an Integrated Framework.” Decision Support Systems 54 (1): 471–481.
  • Li, H., R. Sarathy, and H. Xu. 2010. “Understanding Situational Online Information Disclosure as a Privacy Calculus.” Journal of Computer Information Systems 51 (1): 62–71.
  • Li, H., R. Sarathy, and H. Xu. 2011. “The Role of Affect and Cognition on Online Consumers’ Decision to Disclose Personal Information to Unfamiliar Online Vendors.” Decision Support Systems 51 (3): 434–445.
  • Libaque-Sáenz, C. F., S. F. Wong, Y. Chang, Y. W. Ha, and M.-C. Park. 2014. “Understanding Antecedents to Perceived Information Risks: An Empirical Study of the Korean Telecommunications Market.” Information Development. doi: 10.1177/0266666913516884.
  • Lin, H. F. 2011. “An Empirical Investigation of Mobile Banking Adoption: The Effect of Innovation Attributes and Knowledge-Based Trust.” International Journal of Information Management 31 (3): 252–260.
  • Liu, C., J. T. Marchewka, J. Lu, and C.-S. Yu. 2004. “Beyond Concern: A Privacy–Trust–Behavioral Intention Model of Electronic Commerce.” Information & Management 42 (1): 127–142.
  • Lowry, P. B., J. Cao, and A. Everard. 2011. “Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures.” Journal of Management Information Systems 27 (4): 163–200.
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15 (4): 336–355.
  • McKnight, D. H., V. Choudhury, and C. Kacmar. 2002. “Developing and Validating Trust Measures for E-Commerce: An Integrative Typology.” Information Systems Research 13 (3): 334–359.
  • Nunnally, J. C. 1978. Psychometric Theory. New York: McGraw-Hill.
  • Park, N. 2011. A Study on Mobile Data Protection. [In Korean.] Seoul: Korea Communications Commission.
  • Pavlou, P. A. 2003. “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model.” International Journal of Electronic Commerce 7 (3): 101–134.
  • Pavlou, P. A., and L. Chai. 2002. “What Drives Electronic Commerce Across Cultures? A Cross-Cultural Empirical Investigation of the Theory of Planned Behavior.” Journal of Electronic Commerce Research 3 (4): 240–253.
  • Pavlou, P. A., and M. Fygenson. 2006. “Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior.” MIS Quarterly 30 (1): 115–143.
  • Petronio, S. S. 2002. Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: Suny Press.
  • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology 88 (5): 879–903.
  • Powell, D. A., L. J. Harris, and W. Leiss. 1997. “Hamburger Hell: Better Risk Communication for Better Health.” In Mad Cows and Mother's Milk, edited by D. A. Powell and W. Leiss, 77–98. Montreal: McGill-Queen's University Press.
  • Raghunathan, R., M. T. Pham, and K. P. Corfman. 2006. “Informational Properties of Anxiety and Sadness, and Displaced Coping.” Journal of Consumer Research 32 (4): 596–601.
  • Ringle, C. M., S. Wende, and A. Will. 2005. “ SmartPLS 2.0 (M3) Beta, Hamburg.” http://www.smartpls.de.
  • Schwaig, K. S., G. C. Kane, and V. C. Storey. 2006. “Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?” Information & Management 43 (7): 805–820.
  • Spence, M. T., and M. Brucks. 1997. “The Moderating Effects of Problem Characteristics on Experts’ and Novices’ Judgments.” Journal of Marketing Research 34 (2): 233–247.
  • Stevens, C. J., G. Gibert, Y. Leung, and Z. Zhang. 2013. “Evaluating a Synthetic Talking Head Using a Dual Task: Modality Effects on Speech Understanding and Cognitive Load.” International Journal of Human-Computer Studies 71 (4): 440–454.
  • Straub, D., M.-C. Boudreau, and D. Gefen. 2004. “Validation Guidelines for IS Positivist Research.” Communications of the Association for Information Systems 13: 380–427.
  • Summers, D. F. 2013. Forming Entrepreneurial Intentions: An Empirical Investigation of Personal and Situational Factors. New York: Routledge.
  • Tan, X., L. Qin, Y. Kim, and J. Hsu. 2012. “Impact of Privacy Concern in Social Networking Web Sites.” Internet Research 22 (2): 211–233.
  • TRUSTe. 2011. “Smart Privacy for Smartphones. Understanding and Delivering the Protection Consumers Want.” Accessed July 20, 2014. http://www.truste.com/why_TRUSTe_privacy_services/harris-mobile-survey/.
  • Tsai, J. Y., S. Egelman, L. Cranor, and A. Acquisti. 2011. “The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study.” Information Systems Research 22 (2): 254–268.
  • United Nations Global Pulse. 2012. Big Data for Development: Challenges and Opportunities. New York: Global Pulse Press.
  • Van Slyke, C., J. Shim, R. Johnson, and J. Jiang. 2006. “Concern for Information Privacy and Online Consumer Purchasing.” Journal of the Association for Information Systems 7 (6): 415–444.
  • Vroom, V. H. 1964. Work and Motivation. New York: Wiley.
  • Ward, S., K. Bridges, and B. Chitty. 2005. “Do Incentives Matter? An Examination of On-Line Privacy Concerns and Willingness to Provide Personal and Financial Information.” Journal of Marketing Communications 11 (1): 21–40.
  • Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.
  • Wu, K. W., S. Y. Huang, D. C. Yen, and I. Popova. 2012. “The Effect of Online Privacy Policy on Consumer Privacy Concern and Trust.” Computers in Human Behavior 28 (3): 889–897.
  • Xu, H., T. Dinev, J. Smith, and P. Hart. 2011a. “Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances.” Journal of the Association for Information Systems 12 (12): 798–824.
  • Xu, H., X. Luo, J. M. Carroll, and M. B. Rosson. 2011b. “The Personalization Privacy Paradox: An Exploratory Study of Decision Making Process for Location-Aware Marketing.” Decision Support Systems 51 (1): 42–52.
  • Xu, H., H.-H. Teo, B. C. Y. Tan, and R. Agarwal. 2012. “Research Note – Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services.” Information Systems Research 23 (4): 1342–1363.
  • Yamaguchi, S. 2001. “Culture and Control Orientations.” In The Handbook of Culture and Psychology, edited by D. Matsumoto, 223–243. New York: Oxford University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.