1,369
Views
26
CrossRef citations to date
0
Altmetric
Original Articles

Understanding Situational Online Information Disclosure as a Privacy Calculus

, &
Pages 62-71 | Received 24 Oct 2009, Accepted 28 Jan 2010, Published online: 11 Dec 2015

References

  • Awad, N. F. and Krishnan, M. S., “The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization,” MIS Quarterly, 30(1), 2006, 13–28.
  • Bagozzi, R. P. and Yi, Y., “On the evaluation of structural equation models,” Journal of the Academy of Marketing Science, 16(1), 1988, 74–94.
  • Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L., “International differences in information privacy concerns: A global survey of consumers,” Information Society, 20(5), 2004, 313–324.
  • Bennett, C. J., “Regulating Privacy: data protection and public policy in Europe and the United States,” Cornell University Press, 1992.
  • Chin, W. W., The Partial Least Squares Approach for Structural Equation Modeling, Lawrence Erlbaum, Mahway, New Jersey, 1998.
  • Cohen, J., Statistical power analysis for the behavior sciences, Lawrence Erlbaum, Hillsdale, NJ, 1988.
  • Culnan, M. J. and Armstrong, P. K., “Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation,” Organization Science, 10(1), 1999, 104–115.
  • Culnan, M. J. and Bies, R. J., “Consumer privacy: Balancing economic and justice consideration,” Journal of Social Issues, 59(2), 2003, 323–342.
  • Davis, F. D., “Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology,” MIS Quarterly, 13(3 (September)), 1989, 319–340.
  • Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C., “Privacy Calculus Model in E-commerce — a Study of Italy and the United States,” European Journal of Information Systems, 15(4), 2006, 389–402.
  • Dinev, T. and Hart, P., “An extended privacy calculus model for e-commerce transactions,” Information Systems Research, 17(1), 2006, 61–80.
  • Donaldson, T. and Dunfee, T. W., “Toward a unified conception of business ethics: integrative social contracts theory,” Academy of Management Review, 19(2), 1994, 252–284.
  • Dunfee, T. W., Smith, N. C., and Ross, W. T., “Social contracts and marketing ethics,” Journal of Marketing Research, 63(July), 1999, 14–32.
  • Fornell, C. and Larcker, D., “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, 18(1), 1981, 39–50.
  • Gefen, D., Karahanna, E., and Straub, D., “Trust and TAM in online shopping: an integrated model,” MIS Quarterly, 27(1), 2003, 51–90.
  • Gefen, D., Warkentin, M., Pavlou, P., and Rose, G., “EGoverment adoption,” AMCIS 2002, 2002, 83
  • Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., and Png, I. P. L., “Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach,” Journal of Management Information Systems, 24(2), 2007, 13–42.
  • Hann, I. H., Hui, K. L., Lee, T. S., and Png, I. P. L., “Online information privacy: measuring the cost-benefit trade-Off,” Proceedings of the Twenty-Third Annual International Conference on Information Systems, Barcelona, Spain, 2002, 1–10.
  • Hoffman, D. L., Novak, T. P., and Peralta, M. A., “Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web,” Information Society, 15(2), 1999, 129–139.
  • Hui, K. L., Tan, B. C. Y., and Goh, C. Y., “Online information disclosure: motivators and measurements,” ACM Transactions on Internet Technology, 6(4), 2006, 415–441.
  • Hui, K. L., Teo, H. H., and Lee, S. Y. T., “The value of privacy assurance: An exploratory field experiment,” MIS Quarterly, 31(1), 2007, 19–33.
  • Jiang, Z. and Benbasat, I., “Research note investigating the influence of the functional mechanisms of online product presentations,” Information Systems Research, 18(4), 2007, 454–470.
  • Kim, D. J., Ferrin, D. L., and Rao, H. R., “A trust-based consumer decision model in electronic commerce: The role of trust, perceived risk, and their antecedents,” Decision Support Systems, 44(2), 2008, 544–564.
  • Laudon, K. C., “Markets and privacy,” Communications of the ACM, 39(9), 1996, 92–104.
  • Laufer, R. S. and Wolfe, M., “Privacy as a concept and a social issue: A multidimensional development theory,” Journal of Social Issues, 33(3), 1977, 22–42.
  • Limayem, M., Hirt, S. G., and Cheung, C. M. K., “How habit limits the predictive power of intention: The case of information systems continuance,” MIS Quarterly, 31(4), 2008, 705–737.
  • Malhotra, N. K., Kim, S. S., and Agarwal, J., “Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model,” Information Systems Research, 15(4), 2004, 336–355.
  • Margulis, S. T., “On the status and contribution of Westin's and Altman's theories of privacy,” Journal of Social Issues, 59(2), 2003, 411–429.
  • McKnight, D. H., Choudhury, V., and Kacmar, C., “Developing and validating trust measures for e-commerce: an integrative typology,” Information Systems Research, 13(3), 2002, 334–359.
  • Metzger, M. J., “Privacy, trust, and disclosure: exploring barriers to electronic commerce,” Journal of Computer-Mediated Communication, 9(4), 2004.
  • Milberg, S. J., Smith, H. J., and Burke, S. J., “Information privacy: Corporate management and national regulation,” Organization Science, 11(1), 2000, 35–57.
  • Milberg, S. J. B. J. S., Smith, H. J., and Kallman, A. E., “Values, Personal Information Privacy Concerns, and Regulatory Approaches,” Communication of the ACM, 38(12), 1995, 65–74.
  • Nadkarni, S. and Gupta, R., “A task-based model of perceived website complexity,” MIS Quarterly, 31(3), 2008, 501–524.
  • Organization for Economic Cooperation and Development, Guidelines on the protection of privacy and transborder flows of personal data, 1980.
  • Pavlou, P. A. and Chellappa, R. K., The Role of Perceived Privacy and Perceived Security in the Development of Trust in Electronic Commerce Transactions, Marshall School of Business, USC, Los Angeles., 2001.
  • PEW-Internet, Pew Internet & American Life Project: Demographics of Internet Users, 2008.
  • Phelps, J., Nowak, G., and Ferrell, E., “Privacy concerns and consumer willingness to provide personal information,” Journal of Public Policy Marketing, 19(1), 2000, 27–41.
  • Preacher, K. J., Curran, P. J., and Bauer, D. J., Probing interactions in multiple linear regression, latent curve analysis, and hierarchical linear modeling Interactive calculation tools for establishing simple intercepts, simple slopes, and regions of significance, 2003.
  • Smith, H. J., Milberg, S. J., and Burke, S. J., “Information Privacy measuring individuals' concerns about organizational practices,” MIS Quarterly, 20(2), 1996, 167–196.
  • Solove, D. J., “A Taxonomy of Privacy,” University of Pennsylvania Law Review, 154(3), 2006, 477–560.
  • Son, J.-Y. and Kim, S. S., “Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model,” MIS Quarterly, 32(3), 2008, 503–529.
  • Stewart, K. A. and Segars, A. H., “An Empirical Examination of the Concern for Information Privacy Instrument,” Information Systems Research, 13(1), 2002, 36–49.
  • Stone, D. L., The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs and attitudes, Purdue University, 1981.
  • Stone, E. F., Gueutal, H. G., Gardner, D. G., and McClure, S., “A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations,” Journal of Applied Psychology, 68(3), 1983, 459–468.
  • Teltzrow, M. and Kobsa, A., Impacts of user privacy preferences on personalized systems: A comparative study. Kluwer Academic Publishers, Dordrecht, Netherland, 2004.
  • Tietje, B. C., “When do rewards have enhancement effects? An availability valence approach,” Journal of Consumer Psychology, 12(4), 2002, 363–373.
  • USC, Online World As Important to Internet Users as Real World?, Center for the Digital Future, Annenberg School for Communication, University of Southern California, 2007.
  • Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J., “Concern for information privacy and online consumer purchasing,” Journal of the Association for Information Systems, 7(6), 2006, 415–444.
  • Wang, Y.-S., Wang, Y.-M., Lin, H.-H., and Tang, T.-I., “Determinants of user acceptance of Internet banking: an empirical study,” Journal: International Journal of Service Industry Management, 14(5), 2003, 501–519.
  • Westin, A. F., Privacy and Freedom, Atheneum, New York, 1967.
  • Xu, H., Dinev, T., Smith, H. J., and Hart, P., “Examining the formation of individual's privacy concerns: Toward an integrative view,” Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008), Paris, France, 2008.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.