2,024
Views
43
CrossRef citations to date
0
Altmetric
Original Articles

Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior

References

  • Abrams, R. Target puts data breach costs at $148 million, and forecasts profit drop. New York Times, August 5, 2014. http://www.nytimes.com/2014/08/06/business/target-puts-data-breach-costs-at-148-million.html?_r=0.
  • Alge, B.J. Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86, 4 (2001), 797–804.
  • Bagozzi, R.P., and Yi, Y. On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16, 1 (1988), 74–94.
  • Bansal, G., and Zahedi, F.M. Trust violation and repair: The information privacy perspective. Decision Support Systems, 71 (2015), 62–77.
  • Barclay, L.J.; Skarlicki, D.P.; and Pugh, S.D. Exploring the role of emotions in injustice perceptions and retaliation. Journal of Applied Psychology, 90, 4 (2005), 629–643.
  • Bart, I.Y.; Shankar, V.; Sultan, F.; and Urban, G.L. Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69, 4 (2005), 133–153.
  • Bearden, W.O.; Netemeyer, R.G.; and Mobley, M.F. Handbook of Marketing Scales: Multi-item Measures for Marketing and Consumer Behavior Research. Newbury Park, CA: Sage, 1993.
  • Bendapudi, N., and Berry, L.L. Customers’ motivations for maintaining relationships with service providers. Journal of Retailing, 73, 1 (1997), 15–37.
  • Bies, R.J., and Moag, J.S. Interactional justice: Communication criteria of fairness. In R.J. Lewicki, B.H. Sheppard, and B.H. Baserman (eds.), Research on Negotiation in Organizations. Vol. 1. Greenwich, CT: JAI Press, 1986, pp. 43–55.
  • Brockner, J., and Wiesenfeld, B.M. An integrative framework for explaining reactions to decisions: interactive effects of outcomes and procedures. Psychological Bulletin, 120, 2 (1996), 189–208.
  • Center, Identity Theft Resource. Identity Theft Resource Center Breach Report Hits Record High in 2014. 2015. http://www.idtheftcenter.org/ITRC-Surveys-Studies/2014databreaches.html.
  • Chebat, J.C., and Slusarczyk, W. How emotions mediate the effects of perceived justice on loyalty in service recovery situations: An empirical study. Journal of Business Research, 58, 5 (2005), 664–673.
  • Chen, Y.; Ramamurthy, K.; and Wen, K. W. Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29, 3 (2012), 157–188.
  • Chin, W.W.; Gopal, A.; and Salisbury, W.D. Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation. Information Systems Research, 8, 4 (1997), 342–367.
  • Cho, Y.; Im, I.; Hiltz, S.; and Fjermestad, J. The effects of post-purchase evaluation factors on online vs. offline customer complaining behavior: Implications for customer loyalty. Advances in Consumer Research, 29, 1 (2001), 318–326.
  • Collier, J.E., and Bienstock, C.C. Measuring service quality in e-retailing. Journal of Service Research, 8, 3 (2006), 260–275.
  • Colquitt, J.A.; Conlon, D.E.; Wesson, M.J.; Porter, C.O.; and Ng, K.Y. Justice at the millennium: A meta-analytic review of 25 years of organizational justice research. Journal of Applied Psychology, 86, 3 (2001), 425–445.
  • Culnan, M.J. Consumer awareness of name removal procedures: Implications for direct marketing. Journal of Direct Marketing, 9, 2 (1995), 10–19.
  • Culnan, M.J., and Bies, R.J. Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59, 2 (2003), 323–342.
  • DeWitt, T.; Nguyen, D.T.; and Marshall, R. Exploring customer loyalty following service recovery: The mediating effects of trust and emotions. Journal of Service Research, 10, 3 (2008), 269–281.
  • Dick, A.S., and Basu, K. Customer loyalty: Toward an integrated conceptual framework. Journal of the Academy of Marketing Science, 22, 2 (1994), 99–113.
  • Dinev, T., and Hart, P. An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 1 (2006), 61–80.
  • Folger, R. Rethinking equity theory: A referent cognitions model. H.W. Bierhoff, L.R. Cohen, and J. Greenberg (eds.), Justice in Social Relations. New York: Plenum, 1986.
  • Fornell, C., and Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39–50.
  • Gefen, D.; Straub, D.; and Boudreau, M. Structural equation modeling and regression: Guidelines for research practice. Communications of AIS, 7 (2000), 1–78.
  • Gilliland, S.W. The perceived fairness of selection systems: An organizational justice perspective. Academy of Management Review, 18, 4 (1993), 694–734.
  • Goles, T.; Lee, S.; Rao, S.V.; and Warren, J. Trust violation in electronic commerce: Customer concerns and reactions. Journal of Computer Information Systems, 49, 1 (2009), 1–9.
  • Greenberg, J. Organizational justice: Yesterday, today, and tomorrow. Journal of Management, 16, 2 (1990), 399–432.
  • Grégoire, Y., and Fisher, R.J. Customer betrayal and retaliation: When your best customers become your worst enemies. Journal of the Academy of Marketing Science, 36, 2 (2008), 247–261.
  • Hann, I.H.; Hui, K.L.; Lee, S.Y.; and Png, I.P. Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24, 2 (2007), 13–42.
  • Hartwig, R.P., and Wilkinson, C. Cyber risks: The growing threat. Insurance Information Institute (June 2014), 1–27.
  • Hoffman, K.D., and Kelley, S.W. Perceived justice needs and recovery evaluation: A contingency approach. European Journal of Marketing, 34, 34 (2000), 418–433.
  • Holloway, B.B., and Beatty, S.E. Service failure in online retailing: A recovery opportunity. Journal of Service Research, 6, 1 (2003), 92–105.
  • Hu, L., and Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6, 1 (1999), 1–55.
  • Hui, K.L.; Hui, W.; and Yue, W.T. Information security outsourcing with system interdependency and mandatory security requirement. Journal of Management Information Systems, 29, 3 (2012), 117–156.
  • Jöreskog, K. Interaction and nonlinear modeling: Issues and approaches. In R.E. Schumacker, and G.A. Marcoulides (eds.), Interaction and Nonlinear Effects in Structural Equation Modeling. Mahwah, NJ: Lawrence Erlbaum, 1998, pp. 239–250.
  • Jöreskog, K., and Sörbom, D. LISREL8: User’s Reference Guide. Chicago: Scientific Software International, 1996.
  • Kau, A.-K., and Loh, E.W.-Y. The effect of service recovery on consumer satisfaction: A comparison between complainants and non-complainants. Journal of Service Marketing, 20, 2 (2006), 101–111.
  • Kerber, R. TJX offers deal to end data breach suit, customers would get vouchers if court approves settlement. Boston Globe, September 22, 2007. http://www.boston.com/business/articles/2007/09/22/tjx_offers_deal_to_end_data_breach_suit/.
  • Kwon, J., and Johnson, M. E. Health-care security strategies for data protection and regulatory compliance. Journal of Management Information Systems, 30, 2 (2013), 41–66.
  • Lance, C.E. Residual centering, exploratory and confirmatory moderator analysis, and decomposition of effects in path models containing interactions. Applied Psychological Measurement, 12, 2 (1988), 163–175.
  • Lang, T.A., and Secic, M. How to Report Statistics in Medicine: Annotated Guidelines for Authors, Editors, and Reviewers, Philadelphia: American College of Physicians, 2006.
  • Lerner, J.S., and Keltner, D. Beyond valence: Toward a model of emotion-specific influences on judgment and choice. Cognition and Emotion, 14, 4 (2000), 473–493.
  • Li, H.; Sarathy, R.; and Xu, H. The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51, 3 (2011), 434–445.
  • Liao, H. Do it right this time: The role of employee service recovery performance in customer-perceived justice and customer loyalty after service failures. Journal of Applied Psychology, 92, 2 (2007), 475–489.
  • Lunden, I. Target says credit card data breach cost it $162M in 2013–2014. Tech Crunch, February 25, 2015. http://techcrunch.com/2015/02/25/target-says-credit-card-data-breach-cost-it-162m-in-2013-14/.
  • Luo, Y. The independent and interactive roles of procedural, distributive and interactional justice in strategic alliances. Academy of Management Journal, 50, 3 (2007), 644–664.
  • Malhotra, A., and Malhotra, C.K. Evaluating customer information breaches as service failures: An event study approach. Journal of Service Research, 14, 1 (2011), 44–59.
  • Malhotra, N.K. Marketing Research: An Applied Orientation. Upper Saddle River, NJ: Prentice Hall, 2004.
  • Malhotra, N.K.; Kim, S.S.; and Agarwal, J. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 335–355.
  • Martínez-Tur, V.; Peiró, J.M.; Ramos, J.; and Moliner, C. Justice perceptions as predictors of customer satisfaction: The impact of distributive, procedural and interactional justice. Journal of Applied Social Psychology, 36, 1 (2006), 100–119.
  • Maxham, J.G., III, and Netemeyer, R.G. Modeling customer perceptions of complaint handling over time: The effects of perceived justice on satisfaction and intent. Journal of Retailing, 78, 4 (2002), 239–252.
  • Meuter, M.L.; Ostrom, A.L.; Roundtree, R.I.; and Bitner, M.J. Self-service technologies: Understanding customer satisfaction with technology-based service encounters. Journal of Marketing, 64, 3 (2000), 50–65.
  • Montada, L. Injustice in harm and loss. Social Justice Research, 7 (1994), 5–28.
  • Moorman, R.H. Relationship between organizational justice and organizational citizenship behaviors: Do fairness perceptions influence employee citizenship? Journal of Applied Psychology, 76, 6 (1991), 845–855.
  • Morgan, R.M., and Hunt, S.D. The commitment-trust theory of relationship marketing. Journal of Marketing, 58, 3 (1994), 20–38.
  • Moriarty, C. One year later: Reflecting on the great PSN outage. IGN US, April 21, 2012. http://www.ign.com/articles/2012/04/21/one-year-later-reflecting-on-the-great-psn-outage.
  • Morrison, E.W., and Robinson, S.L. When employees feel betrayed: A model of how psychological contract violation develops. Academy of Management Review, 22, 1 (1997), 226–256.
  • Pavlou, P.A., and Gefen, D. Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Information Systems Research, 16, 4 (2005), 272–299.
  • Poddar, A.; Mosteller, J.; and Ellen, P.S. Consumers’ rules of engagement in online information exchanges. Journal of Consumer Affairs, 43, 3 (2009), 419–448.
  • Quinn, B., and Arthur, C. PlayStation network hackers access data of 77 million users. Guardian, April 26, 2011. http://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data.
  • Reichheld, F.F. The one number you need to grow. Harvard Business Review, 81, 12 (2003), 46–54.
  • Reichheld, F.F., and Schefter, P. E-loyalty: Your secret weapon on the web. Harvard Business Review, 78, 4 (2000), 105–113.
  • Rindfleisch, T.C. Privacy, information technology, and health care. Communications of the ACM, 40, 8 (1997), 92–100.
  • Robinson, S.L., and Morrison, E.W. The development of psychological contract breach and violation: A longitudinal study. Journal of Organizational Behavior, 21 (2000), 525–546.
  • Ruth, J.A.; Brunel, F.F.; and Otnes, C.C. Linking thoughts to feelings: Investigating cognitive appraisals and consumption emotions in a mixed-emotions context. Academy of Marketing Science, 30, 1 (2002), 44–58.
  • Schoefer, K., and Ennew, C. The impact of perceived justice on consumers’ emotional responses to service complaint experiences. Journal of Service Marketing, 19, 5 (2005), 261–270.
  • Sen, R., and Borle, S. Estimating the contextual risk of data breach: an empirical approach. Journal of Management Information Systems, 32, 2 (2015), 314–341.
  • Smith, A.K., and Bolton, R.N. The effect of customers’ emotional responses to service failures on their recovery effort evaluations and satisfaction judgments. Journal of the Academy of Marketing Science, 30, 1 (2002), 5–23.
  • Son, J., and Kim, S.S. Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32, 3 (2008), 503–529.
  • Srinivasan, S.S.; Anderson, R.; and Ponnavolu, K. Customer loyalty in e-commerce: An exploration of its antecedents and consequences. Journal of Retailing, 78 (2002), 41–50.
  • Tax, S.S.; Brown, S.W.; and Chandrashekaran, M. Customer evaluations of service complaint experiences: Implications for relationship marketing. Journal of Marketing, 62, 2 (1998), 60–76.
  • Taylor, D.G.; Davis, D.F.; and Jillapalli, R. Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9, 3 (2009), 203–223.
  • Thibaut, J., and Walker, L. Procedural Justice: A Psychological Analysis. Hillsdale, NJ: Erlbaum, 1975.
  • Thier, D. You may be eligible for a free game through Sony’s PlayStation network class action settlement. Forbes, January 23, 2015. http://www.forbes.com/sites/davidthier/2015/01/23/you-may-be-eligible-for-a-free-game-through-sonys-playstation-network-class-action-settlement/.
  • Wang, S., and Huff, L. Explaining a buyer’s response to a seller’s violation of trust. European Journal of Marketing, 41, 9–10 (2007), 1033–1052.
  • Weiss, H.M., and Cropanzano, R. An affective events approach to job satisfaction. In B.M. Staw and L.L. Cummings (eds.). Research in Organizational Behavior. Greenwich, CT: JAI Press, 1996, pp. 1–74.
  • Whitman, M.E., and Mattord, H.J. Principles of Information Security. 3rd ed. Boston: Thomson Course Technology, 2008.
  • Woodyard, C. Target offers 10% off as credit fraud apology. USA Today, December 22, 2013. http://www.usatoday.com/story/money/business/2013/12/21/target-ceo-credit-breach-discount/4157103/.
  • Wright, R.T., and Marett, K. The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems, 27, 1 (2010), 273–303.
  • Xu, H.; Teo, H.H.; Tan, B.C.; and Agarwal, R. The role of push–pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 29, 3 (2009), 135–174.
  • Youn, S. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43, 3 (2009), 389–418.
  • Zeithaml, V.A.; Berry, L.L.; and Parasuraman, A. The behavioral consequences of service quality. Journal of Marketing, 60, 2 (1996), 31–46.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.