416
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Situational Privacy Concerns and Antecedent Factors

&

REFERENCES

  • Ackerman MS, Cranor LF, Reagle J, 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. Proceedings of the 1st ACM conference on Electronic commerce, ACM, 1–8.
  • Averill JR, 1983. Studies on anger and aggression: Implications for theories of emotion. Am Psychol. 38:1145–1160.
  • Bansal G, Zahedi F, Gefen D, 2010. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems. 49:138–150.
  • Bélanger F, Crossler R, 2011. Privacy in the Digital Age: A Review of Information Privacy in IS Literature. MIS Q. 35:1017–1041.
  • Belanger F, Hiller JS, Smith WJ, 2002. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. J Strategic Inf. Syst. 11:245–270.
  • Campbell AJ. 1999. Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. J Direct Marketing. 11:44–57.
  • Campbell JE, Carlson M. 2002. Panopticon.com: Online surveillance and the commodification of privacy. J Broadcast. Electron Media. 46:586–606.
  • Cespedes FV, Smith HJ. 1993. Database marketing: New rules for policy and practice. Sloan Managet Rev. 34:7–22.
  • Chen G, Gully SM, Whiteman J.-A, Kilcullen RN. 2000. Examination of relationships among trait-like individual differences, state-like individual differences, and learning performance. J App Psychol. 85:835–847.
  • Chen K, Rea AI. 2004. Protecting personal information online: A survey of user privacy concerns and control techniques. J Comp Inf Syst. 44:85–92.
  • Cohen J. 1992. A power primer. Psychol Bull. 112:155–159.
  • Culnan MJ, Armstrong PK. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organiz Sci. 10:104–115.
  • Derlega VJ, Chaikin AL. 1977. Privacy and self‐disclosure in social relationships. J Social Issues. 33:102–115.
  • Dinev T, Bellotto M, Hart P, Russo V, Serra I. 2006. Internet users’ privacy concerns and beliefs about government surveillance: an exploratory study of differences between Italy and the United States. J Global Inf Manage. 14:57–93.
  • Dinev T, Bellotto M, Hart P, Russo V, Serra I, Colautti C. 2006. Privacy calculus model in e-commerce–a study of Italy and the United States. Eur J Inf Syst. 15:389–402.
  • Dinev T, Hart P. 2006. An extended privacy calculus model for e-commerce transactions. Inf Syst Res. 17:61–80.
  • Dinev T, Xu H, Smith JH, Hart P. 2013. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst. 22:295–316.
  • Donaldson T, Dunfee TW.1994. Toward a Unified Conception of Business Ethics: Integrative Social Contracts Theory. Acad Manage Rev. 19:252–284.
  • Faja S, Trimi S. 2006. Influence of the web vendor’s interventions on privacy-related behaviors in e-commerce. Commun Assoc Inf Syst. 17:593–634.
  • Fornell C, Larcker DF. 1981. Evaluating Structural Equations with Unobservable Variables and Measurement Error. J Marketing Res. 18:39–50.
  • Gefen D. 2000. E-commerce: the role of familiarity and trust. Omega. 28:725–737.
  • Graham S, Weiner B, Zucker GS. 1997. An attributional analysis of punishment goals and public reactions to OJ Simpson. Pers Social Psychol Bull. 23:331–346.
  • Heider F. 1958. The psychology of interpersonal relations, New York, NY: John Wiley and Sons.
  • Hoofnagle CJ, King J, Li S, Turow J. “How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies?,” 2010, Retrieved on June 25, 2014, from SSRN: http://ssrn.com/abstract=1589864
  • Johnston WJ, Kim K. 1994. Performance, attribution, and expectancy linkages in personal selling. J Marketing. 58:68–81.
  • Li Y. 2011. Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun Assoc Inf Syst. 28:453–496.
  • Malhotra NK, Kim SS, Agarwal J. 2004. Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf Syst Res. 15:336–355.
  • Margulis ST. 2003. On the status and contribution of Westin’s and Altman’s theories of privacy. J Social Issues. 59:411–429.
  • McAuley E, Duncan TE, Russell DW. 1992. Measuring causal attributions: The revised causal dimension scale (CDSII). Pers Social Psychol Bull. 18:566–573.
  • McKnight DH, Cummings LL, Chervany NL. 1998. Initial trust formation in new organizational relationships. Acad Manage Rev. 23:473–490.
  • Nosko A, Wood E, Molema S. 2010. All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Comp Hum Behav. 26:406–418.
  • Pavlou PA, Liang H, Xue Y. 2007. Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Q. 31:105–136.
  • Phelps J, Nowak G, Ferrell E. 2000. Privacy concerns and consumer willingness to provide personal information. J Public Pol Marketing. 19:27–41.
  • Ringle CM, Wende S, Will S. 2005. SmartPLS 2.0 (M3) Beta in, Hamburg, Germany.
  • Sheehan KB. 2000. An investigation of gender differences in on‐line privacy concerns and resultant behaviors. J Interact Marketing. 13:24–38.
  • Smith HJ, Dinev T, Xu H. 2011. Information privacy research: An interdisciplinary review. MIS Q. 35:989–1015.
  • Smith HJ, Milberg SJ, Burke SJ. 1996. Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20:167–196.
  • Solove D. 2006. A taxonomy of privacy. University of Pennsylvania Law Review. 154:477–560.
  • Stone EF, Gueutal HG, Gardner DG, McClure S. 1983. A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J Appl Psychol. 68:459–468.
  • Tugend A. 2012. Preventing Identity Theft Without Paying Monthly Fees. Retrieved on June 22, 2012, from http://www.nytimes.com/2012/02/11/your-money/identity-theft/identity-theft-prevention-can-be-cheap-and-easy.html?pagewanted=all.
  • Wacks R. 1989. Personal information: Privacy and the law, Oxford: Oxford University Press.
  • Warren SD, Brandeis LD. 1890. The right to privacy. Harv law rev. 4:193–220.
  • Weiner B. 1974. Achievement motivation and attribution theory, Morristown, NJ: General Learning Press.
  • Weiner B. 1979. A theory of motivation for some classroom experiences. J Educ Psychol. 71:3–25.
  • Weiner B. 1985. An attributional theory of achievement motivation and emotion. Psychol Rev. 92:548–573.
  • Weiner B. 1986. An attributional theory of motivation and emotion, New York: Springer.
  • Weiner B. 2006. Social motivation, justice, and the moral emotions: An attributional approach. New Jersey: Lawrence Erlbaum.
  • Weiner B, Perry RP, Magnusson J. 1988. An attributional analysis of reactions to stigmas. J PersSocial psychol. 55:738–748.
  • Weinstein WL. 1971. The private and the free: A conceptual inquiry In JR Pennock, JW Chapman, (Eds). Privacy: Nomos XIII, (pp. 624–692). New York: Atherton Press,
  • Wickens CM, Wiesenthal DL, Flora DB, Flett GL. 2011. Understanding driver anger and aggression: Attributional theory in the driving environment. J Exp Psychol Appl. 17:354–370.
  • Xu H. 2007. The effects of self-construal and perceived control on privacy concerns. In: Proceedings of the 28th Annual International Conference on Information Systems, Montreal, Canada.
  • Xu H, Dinev T, Smith HJ, Hart P. 2011. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances. J Assoc Inf Syst. 12:798–824.
  • Xu H, Teo H.-H, Tan BC, Agarwal R. 2012. Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Inf Syst Res. 23:1342–1363.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.