4,674
Views
89
CrossRef citations to date
0
Altmetric
Articles

The role of privacy concerns in the sharing economy

ORCID Icon, , &
Pages 1472-1492 | Received 26 Nov 2016, Accepted 24 May 2017, Published online: 16 Jun 2017

References

  • Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. Proceedings of the 5th ACM conference on electronic commerce (pp. 21–29), ACM, New York, NY.
  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies (pp. 36–58). Berlin: Springer Verlag.
  • Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123. doi: 10.1007/s10551-006-9007-7
  • Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9), Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/1394/1312 doi: 10.5210/fm.v11i9.1394
  • Belk, R. (1985). Materialism: Trait aspects of living in the material world. Journal of Consumer Research, 12(3), 265–280. doi: 10.1086/208515
  • Belk, R. (1988). Possessions and self. Hoboken, NJ: John Wiley & Sons.
  • Belk, R. (2007). Why not share rather than own? The Annals of the American Academy of Political and Social Science, 611(1), 126–140. doi: 10.1177/0002716206298483
  • Belk, R. (2010). Sharing. Journal of Consumer Research, 36(5), 715–734. doi: 10.1086/612649
  • Belk, R. (2014). You are what you can access: Sharing and collaborative consumption online. Journal of Business Research, 67(8), 1595–1600. doi: 10.1016/j.jbusres.2013.10.001
  • Benkler, Y. (2004). Sharing nicely: On shareable goods and the emergence of sharing as a modality of economic production. The Yale Law Journal, 114(2), 273–358. doi: 10.2307/4135731
  • Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19(1), 211–241. doi: 10.1080/07421222.2002.11045715
  • Bollen, K. A. (1989). Structural equations with latent variables. Hoboken, NJ: Wiley Interscience.
  • Botsman, R., & Rogers, R. (2010). What’s mine is yours. New York, NY: Harper Business.
  • boyd, D., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). Retrieved from http://firstmonday.org/article/view/3086/2589 doi: 10.5210/fm.v15i8.3086
  • Bucher, E., Fieseler, C., & Lutz, C. (2016). What's mine is yours (for a nominal fee) – exploring the spectrum of utilitarian to altruistic motives for Internet-mediated sharing. Computers in Human Behavior, 62, 316–326. doi: 10.1016/j.chb.2016.04.002
  • Byrne, B. M. (2012). Structural equation modeling with Mplus: Basic concepts, applications, and programming. New York, NY: Routledge.
  • Chen, K., & Rea, A. I. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems, 44(4), 85–92.
  • Compeau, D. R., & Higgins, C. A. (1995). Application of social cognitive theory to training for computer skills. Information Systems Research, 6(2), 118–143. doi: 10.1287/isre.6.2.118
  • Constable, K. (2014). Think twice before giving AirBnB your ID. Huffpost British Columbia, 3 March. Retrieved from http://www.huffingtonpost.ca/kris-constable/airbnb-privacy-security-id-jumio_b_4887509.html
  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115. doi: 10.1287/orsc.10.1.104
  • Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297. doi: 10.1002/ejsp.2049
  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – measurement validity and a regression model. Behavior and Information Technology, 23(6), 413–422. doi: 10.1080/01449290410001715723
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80. doi: 10.1287/isre.1060.0080
  • Dodds, P. S., & Watts, D. J. (2005). A generalized model of social and biological contagion. Journal of Theoretical Biology, 232(4), 587–604. doi: 10.1016/j.jtbi.2004.09.006
  • Edelman, B. G., & Luca, M. (2014). Digital discrimination: The case of Airbnb.com. Harvard Business School NOM Unit Working Paper (14-054). Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2377353
  • Edelman, B., Luca, M., & Svirsky, D. (2015). Racial discrimination in the Sharing Economy: Evidence from a field experiment. Harvard Business School NOM Unit Working Paper (16-069). Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2701902
  • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook ‘friends’: Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168. doi: 10.1111/j.1083-6101.2007.00367.x
  • Eurobarometer. (2011). Special Eurobarometer 359. Attitudes on Data Protection and Electronic Identity in the European Union. June 2011. Retrieved from https://ec.europa.eu/digital-agenda/sites/digital-agenda/files/report_eb_743_eid_just_jrc_en_full_report_final.pdf
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. doi: 10.2307/3151312
  • Friedman, B., Khan, P. H., & Howe, D. C. (2000). Trust online. Communications of the ACM, 43(12), 34–40. doi: 10.1145/355112.355120
  • Gefen, D. (2000). E-commerce: The role of familiarity and trust. Omega, 28(6), 725–737. doi: 10.1016/S0305-0483(00)00021-9
  • Goffman, E. (1971). The territories of the self. Relations in Public, 28–61.
  • Goldenberg, J., Han, S., Lehmann, D. R., & Hong, J. W. (2009). The role of hubs in the adoption process. Journal of Marketing, 73(2), 1–13. doi: 10.1509/jmkg.73.2.1
  • Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on privacy in the electronic society (pp. 71–80). New York,NY: ACM.
  • Gurven, M. (2006). The evolution of contingent cooperation. Current Anthropology, 47, 185–192. doi: 10.1086/499552
  • Hamari, J., Sjöklint, M., & Ukkonen, A. (2016). The sharing economy: Why people participate in collaborative consumption. Journal of the Association for Information Science and Technology, 67(9), 2047–2059. doi: 10.1002/asi.23552
  • Hoffmann, C. P., Lutz, C., & Meckel, M. (2014). Digital natives or digital immigrants? The impact of user characteristics on online trust. Journal of Management Information Systems, 31(3), 138–171. doi: 10.1080/07421222.2014.995538
  • Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web. The Information Society, 15(2), 129–139. doi: 10.1080/019722499128583
  • Iyengar, R., Van Den Bulte, C., & Valente, T. W. (2011). Opinion leadership and social contagion in new product diffusion. Marketing Science, 30(2), 195–212. doi: 10.1287/mksc.1100.0566
  • Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an internet store. Journal of Computer-Mediated Communcation, 5(2), 34–67.
  • Jenkins, R., Molesworth, M., & Scullion, R. (2014). The messy social lives of objects: Inter-personal borrowing and the ambiguity of possession and ownership. Journal of Consumer Behaviour, 13(2), 131–139. doi: 10.1002/cb.1469
  • John, N. A. (2013a). The social logics of sharing. The Communication Review, 16(3), 113–131. doi: 10.1080/10714421.2013.807119
  • John, N. A. (2013b). Sharing and web 2.0: The emergence of a keyword. New Media & Society, 15(2), 167–182. doi: 10.1177/1461444812450684
  • Khadem, N. (2015). Turbulence for Airbnb over privacy concerns. The Sydney Morning Herald, 17 February 2015. Retrieved from http://www.smh.com.au/business/turbulence-for-airbnb-over-privacy-concerns-20150216-13g8tm.html
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564. doi: 10.1016/j.dss.2007.07.001
  • Kleine, S. S., KleineIIIR. E., & Allen, C. T. (1995). How is a possession ‘Me’ or ‘Not Me’? characterizing types and an antecedent of material possession attachment. Journal of Consumer Research, 22(3), 327–343. doi: 10.1086/209454
  • Kokolakis, S. (2015). Privacy attitudes and privacy behaviour: A review of cur-rent research on the privacy paradox phenomenon. Computers & Security online first. doi: 10.1016/j.cose.2015.07.002
  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. doi: 10.1057/jit.2010.6
  • Lamberton, C. P., & Rose, R. L. (2012). When is ours better than mine? A framework for understanding and altering participation in commercial sharing systems. Journal of Marketing, 76(4), 109–125. doi: 10.1509/jm.10.0368
  • Lanier, C. D., & Saini, A. (2008). Understanding consumer privacy: A review and future directions. Academy of Marketing Science Review, 12(2), 1–45.
  • Lee, H., Park, H., & Kim, J. (2013). Why do people share their context information on social network services? A qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk. International Journal of Human-Computer Studies, 71(9), 826–877. doi: 10.1016/j.ijhcs.2013.01.005
  • Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17(1), 39–71. doi: 10.1016/j.jsis.2008.01.001
  • Madden, M., & Rainie, L. (2015). Americans’ attitudes about privacy, security and surveillance. Pew Internet & American Life Project Report. Retrieved from http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi: 10.1287/isre.1040.0032
  • McKnight, D. H., & Chervany, N. L. (2002). What trust means in E-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35–59. doi: 10.1080/10864415.2001.11044235
  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for E-commerce: An integrative typology. Information Systems Research, 13(3), 334–359. doi: 10.1287/isre.13.3.334.81
  • Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1–6. doi: 10.1509/jppm.19.1.1.16934
  • Milne, G. R., & Boza, M.-E. (1999). Trust and concern in consumers’ perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5–24. doi: 10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
  • Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29. doi: 10.1002/dir.20009
  • Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an understanding of the online consumer’s risky behavior and protection practices. Journal of Consumer Affairs, 43(3), 449–473. doi: 10.1111/j.1745-6606.2009.01148.x
  • Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217–232. doi: 10.1111/j.1745-6606.2004.tb00865.x
  • Netemeyer, R. G., Bearden, W. O., & Sharma, S. (2003). Scaling procedures. Issues and applications. London: Sage.
  • Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron? Boston University Law Review, 81(3), 101–131.
  • Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in E-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(2), 243–262. doi: 10.1016/S0167-4870(02)00172-1
  • Ozanne, L. K., & Ballantine, P. W. (2010). Sharing as a form of anti-consumption? An examination of Toy library users. Journal of Consumer Behaviour, 9(6), 485–498. doi: 10.1002/cb.334
  • Phelps, J. E., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17. doi: 10.1002/dir.1019
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. doi: 10.1509/jppm.19.1.27.16941
  • Raghunathan, R., & Corfman, K. (2006). Is happiness shared doubled and sadness shared halved? Social influence on enjoyment of hedonic experiences. Journal of Marketing Research, 43(3), 386–394. doi: 10.1509/jmkr.43.3.386
  • Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1). doi: 10.5210/fm.v15i1.2775
  • Reisinger, D. (2014). Uber’s ‘god view’ under scrutiny as spotlight intensifies on its practices. CNET, 19 November. Retrieved from http://www.cnet.com/news/god-view-under-spotlight-as-uber-investigation-intensifies/
  • Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404. doi: 10.5465/amr.1998.926617
  • Rust, R. T., Kannan, P. K., & Peng, N. (2002). The customer economics of internet privacy. Journal of the Academy of Marketing Science, 30(4), 455–464. doi: 10.1177/009207002236917
  • Schoenbachler, D. D., & Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2–16. doi: 10.1002/dir.10033
  • Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising, 28(3), 37–51. doi: 10.1080/00913367.1999.10673588
  • Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73. doi: 10.1509/jppm.19.1.62.16949
  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016. doi: 10.2307/41409970
  • Special, W. P., & Li-Barber, K. T. (2012). Self-disclosure and student satisfaction with Facebook. Computers in Human Behavior, 28(2), 624–630. doi: 10.1016/j.chb.2011.11.008
  • Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590–598. doi: 10.1016/j.chb.2010.10.017
  • Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36. doi: 10.1177/0270467607311484
  • Urban, G. L., Amyx, C., & Lorenzon, A. (2009). Online trust: State of the art, new frontiers, and research potential. Journal of Interactive Marketing, 23(2), 179–190. doi: 10.1016/j.intmar.2009.03.001
  • Utz, S., & Krämer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology. Journal of Psychosocial Research on Cyberspace, 3(2), Article 2. Retrieved from https://cyberpsychology.eu/article/view/4223
  • Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315. doi: 10.1111/j.1540-5915.2008.00192.x
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. doi: 10.1287/mnsc.46.2.186.11926
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. doi: 10.2307/30036540
  • Wang, S., Beatty, S. E., & Foxx, W. (2004). Signaling the trustworthiness of small online retailers. Journal of Interactive Marketing, 18(1), 53–69. doi: 10.1002/dir.10071
  • Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220. doi: 10.2307/1321160
  • Watts, D. J., & Dodds, P. S. (2007). Influentials, networks, and public opinion formation. Journal of Consumer Research, 34(4), 441–458. doi: 10.1086/518527
  • Wells, J. D., Valacich, J. S., & Hess, T. J. (2011). What signal are you sending? How website quality influences perceptions of product quality and purchase intentions. MIS Quarterly, 35(2), 373–396. doi: 10.2307/23044048
  • Wilson, R. E., Gosling, S. D., & Graham, L. T. (2012). A review of Facebook research in the social sciences. Perspectives on Psychological Science, 7(3), 203–220. doi: 10.1177/1745691612442904
  • Wittel, A. (2011). Qualities of sharing and their transformation in the digital Age. International Review of Information Ethics, 15(9), 3–8.
  • Yoon, S.-J. (2002). The antecedents and consequences of trust in online-purchase decisions. Journal of Interactive Marketing, 16(2), 47–63. doi: 10.1002/dir.10008
  • Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The internet privacy paradox revisited. Information, Communication & Society, 16(4), 479–500. doi: 10.1080/1369118X.2013.777757
  • Zhang, Y., & Leung, L. (2015). A review of social networking service (SNS) research in communication journals from 2006 to 2011. New Media & Society, 17(7), 1007–1024. doi: 10.1177/1461444813520477

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.