526
Views
11
CrossRef citations to date
0
Altmetric
Articles

Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation

References

  • Anderson J, Gerbing D. Some methods for respecifying measurement models to obtain uni-dimensional construct measurement. J Marketing Res. 1982;19(4):453–460.
  • Bansal G, Zahedi F. Trading trust for discount: does frugality moderate the impact of privacy and security concerns? in the proceedings of Sixteenth Americas Conference on Information Systems; Lima, Peru. 2010.
  • Bansal G, Zahedi F. Trading trust for discount: the role of frugality in moderating the impact of privacy and security concerns in three contexts. J Comput Inf Syst. 2014;55(1): 13–29.
  • Bansal G, Zahedi FM, Gefen D. The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. in the proceedings of Twenty Ninth International Conference on Information Systems; Paris, France. 2008.
  • Bansal G, Zahedi FM, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst. 2010;49(2):138–150.
  • Bélanger F, Crossler RE. Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 2011;35(4):1017–1041.
  • Benson D. A field study of end user computing: findings and issues. MIS Q. 1983;7(4):35–45.
  • Brown TA. Confirmatory factor analysis for applied research. New York, NY: The Guilford Press; 2006.
  • Byrne BM. Structural equation modeling with mplus. New York, NY: Routledge, 2012.
  • Casaló LV, Carlos F, Miguel G. The role of security, privacy, usability and reputation in the development of online banking. Online Inf Rev. 2007;31(5): 583–603.
  • Chellappa RK, Pavlou PA. Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logist Inf Manage. 2002;15(5/6):358–368.
  • Chin W. Commentary: issues and opinion on structural equation modeling. MIS Q. 1988;22(1):vii–xvi.
  • Crittenden MR. A call to arms for banks; regulators intensify push for firms to better protect against cyber attacks. In Wall street journal; 2013.
  • Dinev T, Xu H, Smith JH, Hart P. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst. 2013;22(3):295–316.
  • Drennan J, Mort GS, Previte J. Privacy, risk perception, and expert online behavior: an exploratory study of household end users. J Organizational End User Comput. 2006;18(1):1–22.
  • Flavián C, Guinalíu M. Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind Manage Data Syst. 2006;106(5):601–620.
  • Fraj E, Martinez E. Influence of personality on ecological consumer behaviour. J Consum Behav. 2006;5(3):167–181.
  • Gefen D, Karahanna E, Straub DW. Trust and TAM in online shopping: an integrated model. MIS Q. 2003;27(1):51–90.
  • Goldberg LR. The development of markers for the big-five factor structure. Psychological Assess. 1992;4(1):26–42.
  • Goodhue DL, Straub DW. Security concern of system users: a study of the perceptions of the adequacy of security. Inf Manage. 1991;20(1):13–27.
  • Gorman S, Yadron D. Iran hacks energy firms, U.S. Says: oil-and-gas, power companies’ control systems believed to be infiltrated; fear of sabotage potential. In Wall Street Journal; 2013.
  • Greene T. Trust the cloud? Americans say no way. In PCWorldcom; 2009.
  • Hartford Steam Boiler (HSB). Study shows cyber attacks target small businesses [http://online.wsj.com/article/PR-CO-20130605-910391.html], 2013.
  • Junglas IA, Johnson NA, and Spitzmüller C. Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur J Inf Syst. 2008;17(4):387–402.
  • Kim DJ, Steinfield C, Lai Y-J. Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decis Support Syst. 2008;44(4):1000–1015.
  • Kim M-S, Ahn J-H. Comparison of trust sources of an online market-maker in the e-marketplace: buyer’s and seller’s perspectives. J Comput Inf Syst. 2006;47(1):84–94.
  • Korzaan ML, Boswell KT. The influence of personality traits and information privacy concerns on behavioral intentions. J Comput Inf Syst. 2008;48(4):15–24.
  • Krumay B, Oetzel MC. Security an privacy in companies: state-of-the-art and qualitative analysis. in the proceedings of Sixth International Conference on Availability, Reliability and Security. 2011.
  • Landau S. Privacy and security a multidimensional problem. Assoc Comput Mach Commun ACM. 2008;51(11):25–26.
  • Laufer RS, Wolfe M. Privacy as a concept and a social issue: a multidimensional development theory. J Social Issues 1977;33(3):22–42.
  • Loch KD, Carr HH, Warkentin ME. Threats to information systems: today’s reality, yesterday’s understanding. MIS Q. 1992;16(2):173–186.
  • Luftman J, Derksen B, Dwivedi R, Santana M, Zadeh HS. Influential IT management trends: an international study. J Inf Technol. 2015;30(3):293–305.
  • Malhotra NK, Kim SS, Agarwal J. Internet users’ Internet information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf Syst Res. 2004;15(4):336–355.
  • McCole P, Ramsey E, Williams J. Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J Bus. Res. 2010;63(9–10):1018–1024.
  • Microsoft Corporation. Privacy and Security [http://msdn.microsoft.com/en-us/library/ms976532.aspx], 2003.
  • Miles I. Be here now. Info J Policy, Regulation Strategy Telecommun Inf. Media 2005;7(2):49–71.
  • Muthén BO. Allowing for correlation among error terms in manifest variables [http://www.statmodel.com/discussion/messages/9/351.html?1354409423], 2012.
  • Muthén LK. MLR Acronym? [http://www.statmodel.com/discussion/messages/11/2156.html?1317086403], 2007.
  • Muthén LK, Muthén BO. Mplus user’s guide, 7th ed. Los Angeles, CA: Muthén & Muthén; 1998–2012.
  • Nakanishi L. The difference between security and privacy and why we must better communicate about both [http://datasecurity.edelman.com/the-difference-between-security-and-privacy-and-why-we-must-better-communicate-about-both/], 2011.
  • Oetzel MC, Krumay B. Differentiating privacy and security: a content analysis of B2C websites. in the proceedings of 17th Americas Conference on Information Systems (AMCIS), Detroit. 2011.
  • Pavlou P, Liang H, Xue Y. Understanding and mitigating uncertainty in online exchange relationships: a principal–agent perspective. MIS Q. 2007;31(1):105–136.
  • Perlroth N. Wall Street Journal announces that it, too, was hacked by China hackers [http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html?_r=0], 2013.
  • Petter S, Straub DW, Rai A. Specifying formative constructs in information systems research. MIS Q. 2007;31(4):623–656.
  • Pew Research Center’s Internet & American Life Project. Internet User Demographics [http://www.pewinternet.org/data-trend/internet-use/latest-stats/], 2014.
  • Pilcher J. Growing use of Twitter raises customer security concerns. Am Bankers Assoc Banking J. 2010;102(1):27–28.
  • Ratnasingam P, Gefen D, Pavlou PA. The role of facilitating conditions and institutional trust in electronic marketplaces. J Electron Commerce Organ. 2005;3(3):69–82.
  • Ray S, Ow T, Kim SS. Security assurance: how online service providers can influence security control perceptions and gain trust. Decis Sci. 2011;42(2):391–412.
  • Salisbury WD, Pearson RA, Pearson AW, Miller DW. Perceived security and world wide web purchase intention. Ind Manage Data Syst. 2001;101(3/4):165–176.
  • Sanger DE, Perlroth N. Cyberattacks against US corporations are on the rise. In NY Times; 2013.
  • Shapiro SS. Privacy by design: moving from art to practice. Commun. ACM. 2010;53(6):27–29.
  • Sharma S, Mukherjee S, Kumar A, Dillon WR. A simulation study to investigate the use of cutoff values for assessing model fit in covariance structure models. J Bus Res. 2005;58:935–943.
  • Smith HJ, Dinev T, Xu H. Information privacy research: an interdisciplinary review. MIS Q. 2011;35(4):992–1015.
  • Smith HJ, Milberg SJ, Burke SJ. Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 1996;20(2):167–196.
  • Song J, Zahedi FM. A theoretical approach to web design in e-commerce: a belief reinforcement model. Manage Sci. 2005;51(8):1219–1235.
  • Stewart KA, Segars AH. An empirical examination of the concern for information privacy instrument. Inf Syst Res. 2002;13(1):36–49.
  • Straub DW. Validating instruments in MIS research. MIS Q. 1989;13(2):147.
  • The Center for the Digital Future. Highlights: The 2011 digital future project – year ten [http://annenberg.usc.edu/News%20and%20Events/News/110603CDF/110603hilites.aspx], 2011.
  • Udo GJ. Privacy and security concerns as major barriers for e-commerce: a survey study. Inf Manage Comput Secur.2001;9(4):165–174.
  • White CE, Jr Christy DP. The information center concept: a normative model and a study of six installations. MIS Q. 1987;11(4):451–460.
  • Xu H, Teo H-H, Tan BCY, Agarwal R. Research note: effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Inf Syst Res. 2012;23(4):1342–1363.
  • Yang M-H, Chandlrees N, Lin B, Chao H-Y. The effect of perceived ethical performance of shopping websites on consumer trust. J Comput Inf Syst. 2009;50(1):15–24.
  • Zahedi FM, Song J. Dynamics of trust revision: using health infomediaries. J Manage Inf Syst. 2008;24(4):225–248.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.