206
Views
23
CrossRef citations to date
0
Altmetric
Original Articles

Trust-Discount Tradeoff in Three Contexts: Frugality Moderating Privacy and Security Concerns

&

References

  • Acquisti, A. “Privacy and Rationality in Individual Decision Making,” IEEE Security & Privacy: Jan/Feb), 2005, 26–33.
  • Acquisti, A., John, L. and Loewenstein, G. “What Is Privacy Worth?,” In Proceedings of Twenty First Workshop on Information Systems and Economics (WISE).
  • Ba, S. and Pavlou, P. A. “Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior,” MIS Quarterly (26:3), 2002, 243–268.
  • Balasubramanian, S., Konana, P. and Menon, N. M. “Customer Satisfaction in Virtual Environments: A Study of Online Investing,” Management Science (49:7), 2003, 871–889.
  • Bansal, G., Zahedi, F. M. and Gefen, D. “The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation,” In Proceedings of Twenty Ninth International Conference on Information Systems, Paris, France.
  • Bansal, G., Zahedi, F. M. and Gefen, D. “The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online,” Decision Support Systems (49:2), 2010, 138–150.
  • Bhattacherjee, A. “Individual Trust in Online Firms: Scale Development and Initial Test,” Journal of Management Information Systems (19:1), 2002, 211–241.
  • Bowie, N. E. and Karim, J. “Privacy Rights on the Internet: Self-Regulation or Government Regulation?,” Business Ethics Quarterly (16:3), 2006, 323–342.
  • Brynjolfsson, E., Hu, Y. and Michael, D. S. “Consumer Surplus in the Digital Economy: Estimating the Value of Increased Product Variety at Online Booksellers,” Management Science (49:11), 2003, 1580–1596.
  • Campbell, J. E. and Carlson, M. “Panopticon.Com: Online Surveillance and the Commodification of Privacy,” Journal of Broadcasting & Electronic Media (46:4), 2002, 586–606.
  • Casaló, L. V., Carlos, F and Miguel, G. “The Role of Security, Privacy, Usability and Reputation in the Development of Online Banking,” Online Information Review (31:5), 2007, 583–603.
  • Census. Gov. Quarterly Retail E-Commerce Sales: 4th Quarter 2012 [Online]. Available: http://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf [Accessed 2/18/2013], 2013.
  • Cheung, C. M.-Y., Sia, C.-L. and Kuan, K. K. Y. “Is This Review Believable? A Study of Factors Affecting the Credibility of Online Consumer Reviews from an ELM Perspective,” Journal of the Association for Information Systems (13:8), 2012, 618–635.
  • Choe, Y. C., Park, J., Chung, M. and Moon, J. “Effect of the Food Traceability System for Building Trust: Price Premium and Buying Behavior,” Information Systems Frontiers (11:2), 2009, 167–179.
  • Compeau, D., Marcolin, B., Kelley, H. and Higgins, C. “Research Commentary: Generalizability of Information Systems Research Using Student Subjects — a Reflection on Our Practices and Recommendations for Future Research” Information Systems Research (23:4), 2012, 1093–1109.
  • De Young, R. “Encouraging Environmentally Appropriate Behavior: The Role of Intrinsic Motivation,” Journal of Environmental Systems (15:4), 1986, 281–292.
  • Dimoka, A., Hong, Y and Pavlou, P. A. “On Product Uncertainty in Online Markets: Theory and Evidence,” MIS Quarterly (36:2), 2012, 395–426.
  • Drozdenko, R. and Jensen, M. “Risk and Maximum Acceptable Discount Levels,” The Journal of Product and Brand Management (14:4/5), 2005, 264–270.
  • Faja, S. and Trimi, S. “Privacy Concerns in E-Commerce: An Empirical Investigation of Gender Differences,” International Journal of Electronic Business (6:4), 2008, 386–404.
  • Finance.Yahoo.Com. Americans Have No Choice but to Get More Frugal [Online]. Available: http://finance.yahoo.com/blogs/daily-ticker/americans-no-choice-more-frugal-135559129.html [Accessed 2/15/2013], 2011.
  • Flavián, C. and Guinalíu, M. “Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site,” Industrial Management & Data Systems (106:5), 2006, 601–620.
  • Forbes. Investing in the Age of the Frugal American [Online]. Available: http://www.forbes.com/sites/moneybuilder/2012/03/13/investing-in-the-age-of-the-frugal-american/print/ [Accessed 2/14/2013], 2012.
  • Gatersleben, B., Steg, L. and Vlek, C. “Measurement and Determinants of Environmentally Significant Consumer Behavior,” Environment and Behavior (34), 2002, 335–362.
  • Gefen, D., Karahanna, E. and Straub, D. W. “Trust and TAM in Online Shopping: An Integrated Model,” MIS Quarterly (27:1), 2003, 51–90.
  • Gefen, D. and Straub, D. W. “Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model,” MIS Quarterly (21:4), 1997, 389–400.
  • Gonsalves, A. Facebook CEO: Less Privacy Is Social Norm [Online]. Available: http://www.informationweek.com/security/privacy/facebook-ceo-less-privacy-is-social-norm/222300441 2010.
  • Gregg, D. G. and Walczak, S. “The Relationshp between Website Quality, Trust and Price Premiums at Online Auctions,” Electronic Commerce Research (10), 2010, 1–25.
  • Haentjens, J. “What Future for Frugality? The Example of Cities,” Futuribles (384), 2012, 35–43.
  • Johns, G. “In the Praise of Context,” Journal of Organizational Behavior (22), 2001, 31–42.
  • Johnson, W. and Krueger, R. F. “How Money Buys Happiness: Genetic and Environmental Processes Linking Finances and Life Satisfaction,” Journal of Personality and Social Psychology (90:4), 2006, 680–691.
  • Kahneman, D. and Tversky, A. “Prospect Theory: An Analysis of Latitude of Price Acceptance in Consumer Package Goods,” Econometrica (47:23), 1979, 263–291.
  • Kalyanaram, G. and Little, J. D. C. “An Empirical Analysis of Latitude of Price Acceptance in Consumer Package Goods,” Journal of Consumer Research (21:3), 1994, 408–418.
  • Karimov, F. P., Brengman, M. and Van Hove, L. “The Effect of Website Design Dimensions on Initial Trust: A Synthesis of the Empirical Literature,” Journal of Electronic Commerce Research (12:4), 2011, 272–301.
  • Keh, H. T. and Xie, Y. “Corporate Reputation and Customer Behavioral Intentions: The Roles of Trust, Identification and Commitment,” Industrial Marketing Management (38:7), 2009, 732.
  • Kim, D. J., Ferrin, D. L. and Rao, H. R. “A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents,” Decision Support Systems (44), 2008, 544–564.
  • Kim, M.-S. and Ahn, J.-H. “Comparison of Trust Sources of an Online Market-Maker in the E-Marketplace: Buyer's and Seller's Perspectives,” The Journal of Computer Information Systems (47:1), 2006, 84–94.
  • Lachut, S. U. S. Report: Internet Usage by Age [Online]. Available: http://www.psfk.com/2009/02/us-report-internet-usage-by-age.html [Accessed 5/14/2013], 2009.
  • Landau, S. “Privacy and Security a Multidimensional Problem,” Association for Computing Machinery. Communications of the ACM (51:11), 2008, 25–26.
  • Lastovicka, J. L., Bettencourt, L. A., Renee Shaw, H. and Kuntze, R. J. “Lifestyle of the Tight and Frugal: Theory and Measurement,” Journal of Consumer Research (26:1), 1999, 85–98.
  • Lee, D. “Have US Households Returned to Frugality? Recent Developments in Household Debt and Credit in the US,” SERI Quarterly (4:2), 2011, 65–74, 67.
  • Lee, S. M. and Lee, S. J. “Consumers' Initial Trust toward Second-Hand Products in the Electronic Market,” The Journal of Computer Information Systems (46:2), 2005/2006, 85–98.
  • Li, H., Sarathy, R. and Xu, H. “Understanding Situational Online Information Disclosure as a Privacy Calculus,” The Journal of Computer Information Systems (51:1), 2010, 62–71.
  • Lowry, P. B., Cao, J. and Everard, A. “Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures” Journal of Management Information Systems (27:4), 2011, 163–200.
  • Luce, R. D. Individual Choice Behavior: A Theoretical Analysis. Wiley, New York, 1959.
  • Mai, B., Menon, N. M. and Sarkar, S. “No Free Lunch: Price Premium for Privacy-Seal Bearing Vendors,” Journal of Management Information Systems (27:2), 2010, 189–212.
  • Malhotra, N. K., Kim, S. S. and Agarwal, J. “Internet Users' Internet Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model,” Information Systems Research (15:4), 2004, 336–355.
  • Margulis, S. T. “Privacy as a Behavioral Phenomenon: Introduction,” Journal of Social Issues (33:3), 1977, 1–4.
  • Mayer, R. C., Davis, J. H. and Schoorman, F. D. “An Integrative Model of Organizational Trust,” Academy of Management Review (20:3), 1995, 709–734.
  • McCrohan, K. F. “Facing the Threats to Electronic Commerce,” The Journal of Business & Industrial Marketing (18:2/3), 2003, 133–143.
  • McFadden, D. L. “Economic Choices,” American Economic Review (91:3), 2001, 351–378.
  • Mishra, A. N., Anderson, C., Corey, M. A. and Agarwal, R. “Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective,” Information Systems Research (23:3), 2012, 738–760.
  • Muthén, L. K. and Muthén, B. O. Mplus User's Guide: Fifth Edition. Muthén & Muthén, Los Angeles, CA, 1998-2007.
  • Pavlou, P., Liang, H. and Xue, Y. “Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective,” MIS Quarterly (31:1), 2007, 105–136.
  • Pavlou, P. A. and Dimoka, A. “The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums, and Seller Differentiation,” Information Systems Research (17:4), 2006, 392–414.
  • Pepper, M., Jackson, T. and Uzzell, D. “An Examination of the Values That Motivate Socially Conscious and Frugal Consumer Behaviours,” International Journal of Consumer Studies (33:2), 2009, 126–136.
  • Pew Internet & American Life Project. Share of Internet Users in the United States in 2012, by Age Group [Online]. Available: http://www.statista.com/statistics/77403/percentage-of-internet-users-by-age-groups-in-the-us/ [Accessed 5/14/2013], 2012.
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y. and Podsakoff, N. P. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies,” Journal of Applied Psychology (88:5), 2003, 879–903.
  • Rao, A. R. and Monroe, K. B. “Causes and Consequences of Price Premiums,” The Journal of Business (69:4), 1996, 511–511.
  • Ratnasingam, P., Gefen, D. and Pavlou, P. A. “The Role of Facilitating Conditions and Institutional Trust in Electronic Marketplaces,” Journal of Electronic Commerce in Organizations (3:3), 2005, 69–82.
  • Salisbury, W. D., Pearson, R. A., Pearson, A. W. and Miller, D. W. “Perceived Security and World Wide Web Purchase Intention,” Industrial Management + Data Systems (101:3/4), 2001, 165–176.
  • Singh, T., And Hill, M. E. “Consumer Privacy and the Internet in Europe: A View from Germany,” The Journal of Consumer Marketing (20:7), 2003, 634–651.
  • Smith, H. J., Dinev, T. and Xu, H. “Information Privacy Research: An Interdisciplinary Review,” MIS Quarterly (35:4), 2011, 992–1015.
  • Smith, H. J., Milberg, S. J. and Burke, S. J. “Information Privacy: Measuring Individuals' Concerns About Organizational Practices,” MIS Quarterly (20:2), 1996, 167–196.
  • Song, J. and Zahedi, F. M. “A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model,” Management Science (51:8), 2005, 1219–1235.
  • Stewart, K. A. and Segars, A. H. “An Empirical Examination of the Concern for Information Privacy Instrument,” Information Systems Research (13:1), 2002, 36–49.
  • Trueman, B., Franco Wong, M. H. and Xiao-Jun, Z. “The Eyeballs Have It: Searching for the Value in Internet Stocks,” Journal of Accounting Research (38), 2000, 137–162.
  • Tsai, J. Y., Egelman, S., Cranor, L. and Acquisti, A. “The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study,” Information Systems Research (22:2), 2011, 254–268.
  • Udo, G. J. “Privacy and Security Concerns as Major Barriers for E-Commerce: A Survey Study,” Information Management & Computer Security (9:4), 2001, 165–174.
  • WSJ. Broad New Hacking Attack Detected [Online]. Available: http://online.wsj.com/article/SB10001424052748704398804575071103834150536.html [Accessed 2/18/2013], 2010.
  • WSJ. Google Warns of China Exit over Hacking [Online]. Available: http://online.wsj.com/article/SB126333757451026659.html [Accessed 2/18/2013], 2010.
  • WSJ. Private Sector Keeps Mum on Cyber Attacks [Online]. Available: http://online.wsj.com/article/SB10001424052748704541004575011113352790040.html [Accessed 2/18/2013], 2010.
  • WSJ. CEOs Fly Coach? Business Travel Turns Frugal [Online]. Available: http://online.wsj.com/article/SB10001424127887323511804578300181289786570.html [Accessed 2/14/2013], 2013.
  • Xie, E., Hock-Hai, T. and Wan, W. “Volunteering Personal Information on the Internet: Effects of Reputation, Privacy Notices, and Rewards on Online Consumer Behavior,” Marketing Letters (17:1), 2006, 61–74.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.