6,471
Views
95
CrossRef citations to date
0
Altmetric
Original Articles

Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization

References

  • Ackerman, M.S.; Cranor, L.F.; and Reagle, J. Privacy in e-commerce: Examining user scenarios and privacy preferences. In Proceedings of the First ACM Conference on Electronic Commerce. New York, NY: ACM Press, 1999, pp. 1–8.
  • Acquisti, A.; Adjerid, I.; and Brandimarte, L. Gone in 15 seconds: The limits of privacy transparency and control. IEEE Security Privacy, 11, 4 (July 2013), 72–74.
  • Acquisti, A.; Brandimarte, L.; and Loewenstein, G. Privacy and human behavior in the age of information. Science, 347, 6221 (January 2015), 509–514.
  • Acquisti, A., and Gross, R. Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106, 27 (July 2009), 10975–10980.
  • Adjerid, I.; Acquisti, A.; Brandimarte, L.; and Loewenstein, G. Sleights of privacy: Framing, isclosures, and the limits of transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security. New York, NY: ACM Press, 2013, Article Number 9.
  • Awad, N.F., and Krishnan, M.S. The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30, 1 (March 2006), 13–28.
  • Benlian, A. Web personalization cues and their differential effects on user assessments of website value. Journal of Management Information Systems, 32, 1 ( Spring 2015), 225–260.
  • Berendt, B.; Günther, O.; and Spiekermann, S. Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48, 4 (April 2005), 101–106.
  • Brambor, T.; Clark, W.R.; and Golder, M. Understanding interaction models: Improving empirical analyses. Political Analysis, 14, 1 ( Winter 2006), 63–82.
  • Brandimarte, L.; Acquisti, A.; and Loewenstein, G. Misplaced confidences privacy and the control paradox. Social Psychological and Personality Science, 4, 3 (May 2013), 340–347.
  • Chellappa, R.K. and Shivendu, S. An economic model of privacy: A property rights approach to regulatory choices for online personalization. Journal of Management Information Systems, 24, 3 (Winter 2007/2008), 193–225.
  • Chellappa, R.K., and Sin, R.G. Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6, 2–3 (April 2005), 181–202.
  • Child, J.T.; Pearson, J.C.; and Petronio, S. Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60, 10 (October 2009), 2079– 2094.
  • Clemons, E.K.; Gao, G.; and Hitt, L. When online reviews meet hyperdifferentiation: A study of the craft beer industry. Journal of Management Information Systems, 23, 2 (October 2006), 149–171.
  • Constine, J. Facebook lobbying spend up 196%, Google up 70% in 2012 to try to sway privacy, anti-trust legislation. 2013. Available at: http://social.techcrunch.com/2013/01/23/google-facebook-lobbying-spend/ (accessed on March 30, 2017).
  • Culnan, M.J., and Armstrong, P.K. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10, 1 (February 1999), 104–115.
  • Culnan, M.J., and Bies, R.J. Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59, 2 (July 2003), 323–342.
  • Dinev, T., and Hart, P. An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 1 (March 2006), 61–80.
  • Dinev, T.; Hart, P.; and Mullen, M.R. Internet privacy concerns and beliefs about government surveillance: An empirical investigation. Journal of Strategic Information Systems, 17, 3 (September 2008), 214–233.
  • European Parliament. Directive 95/46/EC of the European Parliament and of the Council.Official Journal L 281, 23/11/1995 P. 0031-0050; October 1995. Available at: http://eur- lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:31995L0046&from=DE (accessed on April 5, 2017)
  • European Parliament. Regulation (EU) 2016/679 of the European Parliament and of the Council. April 2016. Available at: http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EN (accessed on April 5, 2017)
  • Field, A. Discovering Statistics Using IBM SPSS Statistics. London, UK: Sage, 2013.
  • Field, A., and Hole, G. How to Design and Report Experiments. London, UK: Sage, 2002.
  • Fornell, C., and Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (February 1981), 39–50.
  • Frambach, R.T.; Roest, H.C.A.; and Krishnan, T.V. The impact of consumer Internet experience on channel preference and usage intentions across the different stages of the buying process. Journal of Interactive Marketing, 21, 2 (March 2007), 26–41.
  • Google. Transparency, choice and control—now complete with a Dashboard! Official Google Blog. November 5, 2009. Available at: https://googleblog.blogspot.com/2009/11/transparency- choice-and-control-now.html (accessed on April 5, 2017)
  • Google. Google Privacy |Why data protection matters. 2017. Available at: http://privacy.google.com/intl/en_ALL/your-data.html (accessed on April 5, 2017)
  • Granados, N.; Gupta, A.; and Kauffman, R.J. Research commentary—information transparency in business-to-consumer markets: Concepts, framework, and research agenda. Information Systems Research, 21, 2 (December 2009), 207–226.
  • Hair, J.F.; Black, W.C.; Babin, B.J.; and Anderson, R.E. Multivariate Data Analysis. Upper Saddle River, NJ: Pearson, 2009.
  • Hann, I.-H.; Hui, K.-L.; Lee, S.-Y.T.; and Png, I.P.L. Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24, 2 ( Fall 2007), 13–42.
  • Harris Interactive. Privacy on and off the internet: What consumers want. Rochester, NY, 2002. Available at: http://www.ijsselsteijn.nl/slides/Harris.pdf (accessed on June 8, 2016)
  • Ho, S.Y. Opportunities and challenges of mobile personalization: An exploratory study. In Proceedings of the Seventeenth European Conference on Information Systems. Verona, Italy. Atlanta, GA: Association for Information Systems, 2009, pp. 1211–1222.
  • Hong, S.-J., and Tam, K.Y. Understanding the adoption of multipurpose information appliances: The case of mobile data services. Information Systems Research, 17, 2 (June 2006), 162–179.
  • Hui, K.-L.; Teo, H.H.; and Lee, S.-Y.T. The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31, 1 (March 2007), 19–33.
  • John, L.K.; Acquisti, A.; and Loewenstein, G. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research, 37, 5 (February 2011), 858–873.
  • Jones, A. Identity and marketing: Capturing, unifying, and using customer data to drive revenue growth. San Francisco, 2015. Available at: http://insight.venturebeat.com/report/customer-identity-marketing-capturing-storing-and-enriching-right-data (accessed on June 8, 2016)
  • Li, T.; Kauffman, R.J.; Van Heck, E.; Vervest, P.; and Dellaert, B.G. Consumer informedness and firm information strategy. Information Systems Research, 25, 2 (May 2014), 345–363.
  • Li, T., and Unger, T. Willing to pay for quality personalization? Trade-off between quality and privacy. European Journal of Information Systems, 21, 6 (November 2012), 621–642.
  • Li, Y. Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54, 1 (December 2012), 471–481.
  • Li, Y. The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57 (January 2014), 343–354.
  • Liang, T.-P.; Lai, H.-J.; and Ku, Y.-C. Personalized content recommendation and user satisfaction: Theoretical synthesis and empirical findings. Journal of Management Information Systems, 23, 3 (Winter 2006/2007), 45–70.
  • Lowry, P.B.; Cao, J.; and Everard, A. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27, 4 ( Spring 2011), 163–200.
  • MacKenzie, S.B.; Podsakoff, P.M.; and Podsakoff, N.P. Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35, 2 (June 2011), 293–334.
  • Mai, B.; Menon, N.M.; and Sarkar, S. No free lunch: Price premium for privacy seal- bearing vendors. Journal of Management Information Systems, 27, 2 (December 2014), 189–212.
  • Malhotra, N. Completion time and response order effects in web surveys. Public Opinion Quarterly, 72, 5 (January 2008), 914–934.
  • Malhotra, N.K.; Kim, S.S.; and Agarwal, J. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (December 2004), 336–355.
  • Metzger, M.J. Communication privacy management in electronic commerce. Journal of 34 Computer-Mediated Communication, 12, 2 (January 2007), 335–361.
  • Murray, K.B., and Schlacter, J.L. The impact of services versus goods on consumers’ assessment of perceived risk and variability. Journal of the Academy of Marketing Science, 18, 1 (Winter 1990), 51–65.
  • Norberg, P.A.; Horne, D.R.; and Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41, 1 (June 2007), 100– 126.
  • Petronio, S. Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1, 4 (November 1991), 311–335.
  • Petronio, S. Boundaries of Privacy. Albany, NY: State University of New York Press, 2002.
  • Rogers, M., and Myerson, T. Windows 10 privacy journey continues: More transparency and controls for you. Windows Experience Blog. April 5, 2017. Available at: https://blogs.windows.com/windowsexperience/2017/04/05/windows-10-privacy-journey-continues-more-transparency-and-controls-for-you/ (accessed on April 6, 2017)
  • Sheehan, K.B. Toward a typology of Internet users and online privacy concerns. Information Society, 18, 1 (January 2002), 21–32.
  • Sheng, H.; Nah, F.F.-H.; and Siau, K. An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9, 6 (June 2008), 344–376.
  • Smith, C. Google Ad Preferences thinks it knows who you are, what you search. Huffington Post. January 27, 2012. Available at: http://www.huffingtonpost.com/2012/01/27/google-ap-35preference_n_1237054.html (accessed on March 30, 2017)
  • Smith, H.J.; Dinev, T.; and Xu, H. Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 4 (December 2011), 989–1016.
  • Sutanto, J.; Palme, E.; Tan, C.-H.; and Phang, C.W. Addressing the personalization–privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37, 4 (December 2013), 1141–1164.
  • Thirumalai, S., and Sinha, K.K. To personalize or not to personalize online purchase interactions: Implications of self-selection by retailers. Information Systems Research, 24, 3 (March 2013), 683–708.
  • Treiblmaier, H., and Pollach, I. Users’ perceptions of benefits and costs of personalization. In Proceedings of the Twenty-Eightth International Conference on Information Systems, Montreal, Canada. Atlanta, GA: Association for Information Systems, 2007, Article Number 141.
  • TRUSTe. TRUSTe/National Cyber-Security Alliance: U.S. consumer privacy index, 2016. San Francisco, 2016. Available at: https://www.truste.com/resources/privacy-research/ncsa-consumer-privacy-index-us/ (accessed on June 12, 2016)
  • Tsai, J.Y.; Egelman, S.; Cranor, L.; and Acquisti, A. The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22, 2 (June 2011), 254–268.
  • Wattal, S.; Telang, R.; and Mukhopadhyay, T. Information personalization in a two- dimensional product differentiation model. Journal of Management Information Systems, 26, 2 ( Fall 2009), 69–95.
  • Wattal, S.; Telang, R.; Mukhopadhyay, T.; and Boatwright, P. What’s in a “Name”? Impact of use of customer information in e-mail advertisements. Information Systems Research, 23, 3–1 (November 2011), 679–697.
  • Westin, A.F. Privacy and Freedom. New York, NY: Atheneum, 1967.
  • Xu, H.; Dinev, T.; Smith, H.; and Hart, P. Examining the formation of individual’s privacy concerns: Toward an integrative view. In Proceedings of the Twenty-Ninth International Conference on Information Systems, Paris. Atlanta, GA: Association for Information Systems, 2008, Article Number 6.
  • Xu, H.; Dinev, T.; Smith, J.; and Hart, P. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12, 12 (December 2011), 798–824.
  • Xu, H.; Luo, X.; Carroll, J.M.; and Rosson, M.B. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51, 1 (April 2011), 42–52.
  • Xu, H.; Teo, H.-H.; Tan, B.C.Y.; and Agarwal, R. The role of push–pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26, 3 ( Winter 2009), 135–173.
  • Zhu, K. Information transparency of business-to-business electronic markets: A game- theoretic analysis. Management Science, 50, 5 (May 2004), 670–685.
  • Zimmer, J.C.; Arsal, R.; Al-Marzouq, M.; Moore, D.; and Grover, V. Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure. Decision Support Systems, 48, 2 (January 2010), 395–406.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.