871
Views
13
CrossRef citations to date
0
Altmetric
Commentaries

Consumer intentions to falsify personal information online: unethical or justifiable?

References

  • Al-Fedaghi, S. S. (2005). Lying about private information: An ethical justification. Communications of the IIMA, 5(3), 47–56.
  • Anthony, C. I., & Cowley, E. (2012). The labor of lies: How lying for material rewards polarizes consumers’ outcome satisfaction. Journal of Consumer Research, 39(3), 478–492. doi:10.1086/663824
  • Aron, R., Sundararajan, A., & Viswanathan, S. (2006). Intelligent agents in electronic markets for information goods: Customization, preference revelation and pricing. Decision Support Systems, 41(4), 764–786. doi:10.1016/j.dss.2004.10.007
  • Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123. doi:10.1016/j.dss.2004.10.007
  • Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217. doi:10.1007/978-1-349-62853-7_2
  • Boatright, M. (2000). Privacy. In Ethics and the conduct of business (3rd ed., pp. 159–183). Saddle River, NJ: Prentice-Hall.
  • Charters, D. (2002). Electronic monitoring and privacy issues in business-marketing: The ethics of the DoubleClick experience. Journal of Business Ethics, 35(4), 243–254. doi:10.1023/A:1013824909970
  • Chen, K., & Rea, J. A. I. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. The Journal of Computer Information Systems, 44(4), 85. doi:10.1080/08874417.2004.11647599
  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115. doi:10.1287/orsc.10.1.104
  • De Bock, T., & Van Kenhove, P. (2011). Double standards: The role of techniques of neutralization. Journal of Business Ethics, 99(2), 283–296. doi:10.1007/s10551-010-0654-3
  • Ferrell, O. C., & Gresham, L. G. (1985). A contingency framework for understanding ethical decision making in marketing. Journal of Marketing, 49, 87–96. doi:10.2307/1251618
  • Festinger, L. (1962). A theory of cognitive dissonance (Vol. 2). Palo Alto, CA: Stanford University Press.
  • Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy and Marketing, 12(1), 106–119.
  • FTC Report. (2012). Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers. Washington, DC: Federal Trade Commission.
  • Fukukawa, K., & Ennew, C. (2010). What we believe is not always what we do: An empirical investigation into ethically questionable behavior in consumption. Journal of Business Ethics, 91(1), 49–60. doi:10.1007/s10551-010-0567-1
  • Fukukawa, K., Ennew, C., & Diacon, S. (2007). An eye for an eye: Investigating the impact of consumer perception of corporate unfairness on aberrant consumer behavior. In Insurance ethics for a more ethical world (pp. 187–221). Bingley: Emerald Group Publishing.
  • Gefen, D., & Ridings, C. M. (2005). If you spoke as she does, sir, instead of the way you do: A sociolinguistics perspective of gender differences in virtual communities. ACM SIGMIS Database, 36(2), 78–92. doi:10.1145/1066149.1066156
  • Gruber, V., & Schlegelmilch, B. B. (2014). How techniques of neutralization legitimize norm-and attitude-inconsistent consumer behavior. Journal of Business Ethics, 121(1), 29–45. doi:10.1007/s10551-013-1667-5
  • Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web. The Information Society, 15(2), 129–139. doi:10.1080/019722499128583
  • Horne, D. R., Norberg, P. A., & Cemal Ekin, A. (2007). Exploring consumer lying in information-based exchanges. Journal of Consumer Marketing, 24(2), 90–99. doi:10.1108/07363760710737094
  • Kroft, S. (2014, March 9). The data brokers: Selling your personal information. CBS News 60 Minutes Broadcast.
  • Lanier, C. D., & Saini, A. (2008). Understanding consumer privacy: A review and future directions. Academy of Marketing Science Review, 12(2), 1–45.
  • LaRose, R., & Rifon, N. (2006). Your privacy is assured-of being disturbed: Websites with and without privacy seals. New Media and Society, 8(6), 1009–1029. doi:10.1177/1461444806069652
  • Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62. doi:10.1080/08874417.2010.11645450
  • Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481. doi:10.1016/j.dss.2012.06.010
  • Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: A power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572–585. doi:10.1007/s11747-006-0003-3
  • Lwin, M. O., & Williams, J. D. (2003). A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters, 14(4), 257–272. doi:10.1023/B:MARK.0000012471.31858.e5
  • Martin, K. (2015). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 1–19. doi:10.1007/s10551-015-2565-9
  • Maury, M. D., & Kleiner, D. S. (2002). E-commerce, ethical commerce? Journal of Business Ethics, 36(1–2), 21–31. doi:10.1023/A:1014274301815
  • Mazar, N., Amir, O., & Ariely, D. (2008). The dishonesty of honest people: A theory of self-concept maintenance. Journal of Marketing Research, 45(6), 633–644. doi:10.1509/jmkr.45.6.633
  • McCloskey, H. J. (1980). Privacy and the right to privacy. Philosophy, 55(211), 17–38. doi:10.1017/S0031819100063725
  • Milne, G. R., & Boza, M. E. (1999). Trust and concern in consumers’ perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5–24. doi:10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
  • Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an understanding of the online consumer’s risky behavior and protection practices. Journal of Consumer Affairs, 43(3), 449–473. doi:10.1111/j.1745-6606.2009.01148.x
  • Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217–232. doi:10.1111/j.1745-6606.2004.tb00865.x
  • Muncy, J. A., & Vitell, S. J. (1992). Consumer ethics: An investigation of the ethical beliefs of the final consumer. Journal of Business Research, 24(4), 297–311. doi:10.1016/0148-2963(92)90036-B
  • Norberg, P. A., Horne, D. A., & Horne, D. R. (2009). Standing in the footprint: Including the self in the privacy debate and policy development. Journal of Consumer Affairs, 43(3), 495–515. doi:10.1111/j.1745-6606.2009.01150.x
  • Palmer, D. E. (2005). Pop-ups, cookies, and spam: Toward a deeper analysis of the ethical significance of Internet marketing practices. Journal of Business Ethics, 58(1–3), 271–280. doi:10.1007/s10551-005-1421-8
  • Poddar, A., Mosteller, J., & Ellen, P. S. (2009). Consumers’ rules of engagement in online information exchanges. Journal of Consumer Affairs, 43(3), 419–448. doi:10.1111/j.1745-6606.2009.01147.x
  • Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013). Anonymity, privacy, and security online. Washington, DC: Pew Research Center’s Internet & American Life Project.
  • Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising, 28(3), 37–51. doi:10.1080/00913367.1999.10673588
  • Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy and Marketing, 19(1), 62–73. doi:10.1509/jppm.19.1.62.16949
  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.
  • Sparks, J. R., & Hunt, S. D. (1998). Marketing researcher ethical sensitivity: Conceptualization, measurement, and exploratory investigation. Journal of Marketing, 62, 92–109. doi:10.2307/1252163
  • Stead, B. A., & Gilbert, J. (2001). Ethical issues in electronic commerce. Journal of Business Ethics, 34(2), 75–85. doi:10.1023/A:1012266020988
  • Strutton, D., Vitell, S. J., & Pelton, L. E. (1994). How consumers may justify inappropriate behavior in market settings: An application on the techniques of neutralization. Journal of Business Research, 30(3), 253–260. doi:10.1016/0148-2963(94)90055-8
  • Sutanto, J., Palme, E., Tan, C. H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37(4), 1141–1164.
  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. doi:10.2307/2089195
  • Valentino-Devries, J., & Singer-Vine, J. (2012, 7 December). They know what you are shopping for. Wall Street Journal. Retrieved from: http://online.wsj.com/article/SB10001424127887324784404578143144132736214.html
  • Van Slyke, C., Comunale, C. L., & Belanger, F. (2002). Gender differences in perceptions of web-based shopping. Communications of the ACM, 45(8), 82–86. doi:10.1145/545151.545155
  • Vitell, S. J. (2003). Consumer ethics research: Review, synthesis and suggestions for the future. Journal of Business Ethics, 43(1–2), 33–47. doi:10.1023/A:1022907014295
  • Vitell, S. J. (2014). A case for consumer social responsibility (CnSR): Including a selected review of consumer ethics/social responsibility research. Journal of Business Ethics, 1–8. doi:10.1007/s10551-014-2110-2
  • Vitell, S. J., & Muncy, J. (1992). Consumer ethics: An empirical investigation of factors influencing ethical judgments of the final consumer. Journal of Business Ethics, 11(8), 585–597. doi:10.1007/BF00872270
  • Wasserstrom, R. A. (1978). Privacy: Some arguments and assumptions. In Richard Bronotport (Ed.), Philosophical law. Westport, CT: Greenwood Press.
  • Wirtz, J., & Lwin, M. O. (2009). Regulatory focus theory, trust, and privacy concern. Journal of Service Research, 12(2), 190–207. doi:10.1177/1094670509335772
  • Wirtz, J., Lwin, M. O., & Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326–348. doi:10.1108/09564230710778128
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418. doi:10.1111/j.1745-6606.2009.01146.x
  • Zwick, D., & Dholakia, N. (2004). Whose identity is it anyway? Consumer representation in the age of database marketing. Journal of Macromarketing, 24(1), 31–43. doi:10.1177/0276146704263920

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.