10,327
Views
16
CrossRef citations to date
0
Altmetric
Articles

Breaching the contract? Using social contract theory to explain individuals’ online behavior to safeguard privacy

, & ORCID Icon

References

  • Acquisti, A., & Grossklags, J. (2008). What can behavioral economics teach us about privacy. In A. Acquisti, S. Gritzalis, C. Lambrinoudakis, & S. Di Vimercati (Eds.), Digital privacy: Theory, technologies, and practices (pp. 363–377). Boca Ration, Florida: Auerbach Publications.
  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347, 509–514. doi:10.1126/science.aaa1465
  • Antón, A. I., Earp, J. B., & Young, J. D. (2010). How internet users’ privacy concerns have evolved since 2002. IEEE Security & Privacy, 8, 21–27. doi:10.1109/MSP.2010.38
  • Baek, T. H., & Morimoto, M. (2012). Stay away from me. Journal of Advertising, 41, 59–76. doi:10.2753/JOA0091-3367410105
  • Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 138–150. doi:10.1016/j.dss.2010.01.010
  • Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67, 26–53. doi:10.1111/jcom.12276
  • Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2018). Exploring motivations for online privacy protection behavior: insights from panel data. Communication Research. doi: 10.1177/0093650218800915
  • Celeux, G., & Soromenho, G. (1996). An entropy criterion for assessing the number of clusters in a mixture model. Journal of Classification, 13, 195–212. doi:10.1007/BF01246098
  • Dienlin, T., & Metzger, M. J. (2016). An extended privacy calculus model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a representative US sample. Journal of Computer‐Mediated Communication, 21, 368–383. doi:10.1111/jcc4.12163
  • Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297. doi:10.1002/ejsp.2049
  • Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316. doi:10.1057/ejis.2012.23
  • Donaldson, T., & Dunfee, T. W. (1994). Toward a unified conception of business ethics: Integrative social contracts theory. Academy of Management Review, 19, 252–284. doi:10.5465/AMR.1994.9410210749
  • Dupree, J., Devries, R., Berry, D., & Lank, E. (2016). Privacy personas. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 5228–5239). New York, NY: ACM.
  • Eurobarometer. (2016). E-privacy (No. 2016.7036). European Commission. doi:10.2759/249540
  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153–160. doi:10.1016/j.chb.2008.08.006
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 39–50. Retrieved from www.jstor.org/stable/3151312
  • Friestad, M., & Wright, P. (1994). The persuasion knowledge model: How people cope with persuasion attempts. Journal of Consumer Research, 21, 1–31. doi:10.1086/209380
  • Gilbert, D. U., & Behnam, M. (2009). Advancing integrative social contracts theory: A habermasian perspective. Journal of Business Ethics, 89, 215–234. doi:10.1007/s10551-008-9995-6
  • Hagenaars, J. A., & McCutcheon, A. L. (2002). Applied latent class analysis. New York, NY: Cambridge University Press.
  • Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). doi:10.1111/j.1083-6101.1999.tb00337.x
  • Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note—Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579–595. doi:10.1287/isre.1120.0441
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 544–564. doi:10.1016/j.dss.2007.07.001
  • Kline, R. B. (2016). Principles and practice of structural equation modeling (4th ed.). New York, NY: The Guilford Press.
  • Kongsted, A., & Nielsen, A. M. (2017). Latent class analysis in health research. Journal of Physiotherapy, 63, 55–58. doi:10.1016/j.jphys.2016.05.018
  • Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54, 471–481. doi:10.1016/j.dss.2012.06.010
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 336–355. doi:10.1287/isre.1040.0032
  • Martin, K. E. (2012). Diminished or just different? A factorial vignette study of privacy as a social contract. Journal of Business Ethics, 111, 519–539. doi:10.1007/s10551-012-1215-8
  • Martin, K. E. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137, 551–569. doi:10.1007/s10551-015-2565-9
  • Masyn, K. E. (2013). Latent class analysis and finite mixture modeling. In T. D. Little (Ed.), Oxford library of psychology. The Oxford handbook of quantitative methods: Statistical analysis (pp. 551–611). New York, NY: Oxford University Press.
  • McDonald, A., & Cranor, L. F. (2010). Beliefs and behaviors: Internet users’ understanding of behavioral advertising. TPRC 2010. Retrieved from https://ssrn.com/abstract=1989092
  • Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4). doi:10.1111/j.1083-6101.2004.tb00292.x
  • Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an understanding of the online consumer’s risky behavior and protection practices. Journal of Consumer Affairs, 43, 449–473. doi:10.1111/j.1745-6606.2009.01148.x
  • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41, 100–126. doi:10.1111/j.1745-6606.2006.00070.x
  • Nylund, K. L., Asparouhov, T., & Muthén, B. O. (2007). Deciding on the number of classes in latent class analysis and growth mixture modeling: A monte carlo simulation study. Structural Equation Modeling, 14, 535–569. doi:10.1080/10705510701575396
  • Oberski, D. (2016). Mixture models: Latent profile and latent class analysis. In J. Robertson & M. Kaptein (Eds.), Modern statistical methods for HCI (pp. 275–287). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-26633-6_12
  • Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63–77. doi:10.2753/JOA0091-3367380405
  • Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82, 331–338. doi:10.1016/j.jretai.2006.08.006
  • Poddar, A., Mosteller, J., & Ellen, P. S. (2009). Consumers’ rules of engagement in online information exchanges. Journal of Consumer Affairs, 43(3), 419–448. doi:10.1111/j.1745-6606.2009.01147.x
  • Rainie, L. (2016, September 21). The state of privacy in post-snowden America. Retrieved from http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/
  • Sannon, S., Bazarova, N. N., & Cosley, D. (2018, April). Privacy lies: Understanding how, when, and why people lie to protect their privacy in multiple online contexts. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal QC, Canada (pp. 52). ACM.
  • Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society, 18(1), 21–32. doi:10.1080/01972240252818207
  • Smit, E. G., Van Noort, G., & Voorveld, H. A. M. (2014). Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe. Computers in Human Behavior, 32, 15–22. doi:10.1016/j.chb.2013.11.008
  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016. Retrieved from www.jstor.org/stable/41409970
  • Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 503–529. Retrieved from www.jstor.org/stable/25148854
  • Taddicken, M. (2014). The ‘Privacy paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19, 248–273. doi:10.1111/jcc4.12052
  • Trepte, S., & Reinecke, L. (2011). Privacy online: Perspectives on privacy and self-disclosure in the social web. Heidelberg, Germany: Springer.
  • Turow, J., & Hennessy, M. (2007). Internet privacy and institutional trust: Insights from a national survey. New Media & Society, 9(2), 300–318. doi:10.1177/1461444807072219
  • Ur, B., Leon, P. G., Cranor, L. F., Shay, R., & Wang, Y. (2012). Smart, useful, scary, creepy: Perceptions of online behavioral advertising. Proceedings of the Eighth Symposium on Usable Privacy and Security, art. 4, Washington, D.C., USA. doi:10.1145/2335356.2335362
  • Van de Pol, J., Holleman, B., Kamoen, N., Krouwel, A., & De Vreese, C. (2014). Beyond young, highly educated males: A typology of VAA users. Journal of Information Technology & Politics, 11, 397–411. doi:10.1080/19331681.2014.958794
  • Wang, J., & Wang, X. (2012). Structural equation modeling: Applications using Mplus. Chichester, UK: Wiley.
  • Wang, Y., Min, Q., & Han, S. (2016). Understanding the effects of trust and risk on individual behavior toward social media platforms: A meta-analysis of the empirical evidence. Computers in Human Behavior, 56, 34–44. doi:10.1016/j.chb.2015.11.011
  • Westin, A. F. (2000). Intrusions. Public Perspective, 11(6), 8–11.
  • Wright, P., Friestad, M., & Boush, D. M. (2005). The development of marketplace persuasion knowledge in children, adolescents, and young adults. Journal of Public Policy & Marketing, 24, 222–233. doi:10.1509/jppm.2005.24.2.222
  • Xu, H., Teo, H., & Tan, B. (2005, December). Predicting the adoption of location-based services: The role of trust and perceived privacy risk. International Conference on Information Systems (ICIS), Las Vegas, NV, USA (pp. 71).
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43, 389–418. doi:10.1111/j.1745-6606.2009.01146.x
  • Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The internet privacy paradox revisited. Information, Communication & Society, 16(4), 479–500. doi:10.1080/1369118X.2013.777757
  • Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115–123. doi:10.1016/j.im.2009.12.003