219
Views
5
CrossRef citations to date
0
Altmetric
Articles

The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context

, &

References

  • Ackerman, M. S. (2004). Privacy in pervasive environment: Next generation labeling protocols. Personal and Ubiquitous Computing, 8, 430–439. doi:10.1007/s00779-004-0305-8
  • Ackerman, M. S., Cranor, L., & Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preference. In Proceeding of ACM conference on electronic commerce, Denver, Colorado, 1–8.
  • Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. Management Information Systems Quarterly, 16, 227–247. doi:10.2307/249577
  • Anderson, C. L., & Agarwal, R. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490. doi:10.1287/isre.1100.0335
  • Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. Management Information Systems Quarterly, 30(1), 13–28.
  • Bandyopadhyay, S. (2012). Consumers’ online privacy concerns: Causes and effects. Innovative Marketing, 8(3), 32–39.
  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information system. Management Information Systems Quarterly, 35(4), 1017–1041.
  • Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6, 181–202. doi:10.1007/s10799-005-5879-y
  • Chen, K., & Rea, J. A. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information System, 44(4), 85–92.
  • Chen, X., Ma, J., Jin, J., & Fosh, P. (2013). Information privacy, gender differences, and intrinsic motivation in the workplace. International Journal of Information Management, 33, 917–926. doi:10.1016/j.ijinfomgt.2013.08.010
  • Chorppath, A. K., & Alpcan, T. (2013). Trading privacy with incentives in mobile commerce: A game theoretic approach. Pervasive and Mobile Computing, 9, 598–612. doi:10.1016/j.pmcj.2012.07.011
  • Christin, D., Lopey, P. S., Reinhardt, A., Hollick, M., & Kauer, M. (2013). Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. Information Security Technical Report, 17, 105–116. doi:10.1016/j.istr.2012.10.004
  • Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communication of the ACM, 42(2), 28–31. doi:10.1145/293411.293475
  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115. doi:10.1287/orsc.10.1.104
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems Quarterly, 13(3), 319–340. doi:10.2307/249008
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982
  • Dey, A. K., & Abowd, G. D. (2000). Towards a better understanding of context and context-awareness. In Proceedings of the CHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness, The Hague, Netherlands. Sunderland, United Kingdom.
  • Dhar, S., & Varshney, U. (2011). Challenges and business models for mobile location-based services and advertising. Communication of the ACM, 54(5), 121–129. doi:10.1145/1941487.1941515
  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – measurement validity and a regression model. Behavior & Information Technology, 23(6), 413–422. doi:10.1080/01449290410001715723
  • Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information System Research, 17(1), 61–80. doi:10.1287/isre.1060.0080
  • Dinev, T., & Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29. doi:10.2753/JEC1086-4415100201
  • Dinev, T., & Hart, P. (2007). Privacy concerns and levels if information exchange: An empirical investigation of intended e-service use. E-Service Journal, 4(3), 25–61. doi:10.2979/ESJ.2006.4.3.25
  • Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information System, 22, 295–316. doi:10.1057/ejis.2012.23
  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. Management Information Systems Quarterly, 27(1), 51–90.
  • George, J. F. (2004). The theory of planned behavior and internet purchasing. Internet Research, 14(3), 198–212. doi:10.1108/10662240410542634
  • Gervey, B., & Lin, J. (2000). Obstacles on the internet: A new advertising age survey finds privacy and security concerns are blocking the growth of e-commerce. Advertising Age, 71(16), 13–22.
  • Goodwin, C. (1991). Privacy: Recognition of a consumer right. Journal of Public Policy and Marketing, 10(1), 149–166.
  • Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: Consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4), 302–318. doi:10.1108/07363760210433627
  • Hann, I. H., Hui, K. L., Lee, T. S., & Png, I. P. L. (2002). Online information privacy: Measuring the cost-benefit trade-off. In Proceeding of 23rd International Conference on Information System, Barcelona, Spain, 1–10.
  • Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. Management Information Systems Quarterly, 37(1), 275–298.
  • Junglas, I. A., & Watson, R. T. (2006). The U-constructs: Four information drives. Communication of AIS, 17, 569–592.
  • Junglas, I. A., & Watson, R. T. (2008). Location-based services. Communications of the ACM, 51(3), 65–69, doi:10.1145/1325555.1325568.
  • Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., & Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human Computer Studies, 71, 1163–1173. doi:10.1016/j.ijhcs.2013.08.016
  • Kim, E., & Lee, B. (2009). E-service quality competition through personalization under consumer privacy concerns. Electronic Commerce Research and Applications, 8, 182–190. doi:10.1016/j.elerap.2009.04.001
  • King, N. J., & Jessen, P. W. (2010). Profiling the mobile consumer – privacy concerns when behavioral advertisers target mobile phones – Part I. Computer Law and Security Review, 26, 455–478. doi:10.1016/j.clsr.2010.07.001
  • Kuo, F. Y., Lin, C. S., & Hsu, M. H. (2007). Assessing gender differences in computer professionals’ self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics, 73, 145–460. doi:10.1007/s10551-006-9179-1
  • Liang, T. P., Chen, H. Y., Du, T., Turban, E., & Li, Y. (2012). Effect of personalization on the perceived usefulness of online customer services: A dual-core theory. Journal of Electronic Commerce Research, 13(4), 275–288.
  • Liu, Z., Bonazzi, R., Fritscher, B., & Pigneur, Y. (2011). Privacy-friendly business models for location-based mobile services. Journal of Theoretical and Applied Electronic Commerce Research, 6(2), 90–107. doi:10.4067/S0718-18762011000200009
  • Liu, Z., Shan, J., Bonazzi, R., & Pigneur, Y. (2014). Privacy as a tradeoff: Introducing the notion of privacy calculus for context-aware mobile applications. In Proceeding of the 47st Hawaii International Conference in System Sciences, Waikoloa, Hawaii, USA, 1063–1072.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi:10.1287/isre.1040.0032
  • Nam, C., Song, C., Lee, E., & Park, C. I. (2006). Consumers’ privacy concerns and willingness to provide marketing-related personal information online. Advances in Consumer Research, 33, 212–217.
  • Nosko, A., Wood, E., Kenney, M., Archer, K., De Pasquale, D., Molema, S., & Zivcakova, L. (2012). Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when personal profiles are constructed? Computers in Human Behavior, 28, 2067–2074. doi:10.1016/j.chb.2012.06.010
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. doi:10.1509/jppm.19.1.27.16941
  • Pomery, E. A., Gibbons, F. X., Reis-Bergan, M., & Gerrard, M. (2009). From willingness to intention: Experience moderates the shift from reactive to reasoned behavior. Personality and Social Psychology Bulletin, 35(7), 894–908. doi:10.1177/0146167209335166
  • Sheng, H., Nah, F. F. H., & Siau, K. (2008). An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9(6), 344–376.
  • Simonson, M. R., Maurer, M., Montag-Torardi, M., & Whitaker, M. (1987). Development of a standardized test of computer literacy and a computer anxiety index. Journal of Educational Computing Research, 3(2), 231–247. doi:10.2190/7CHY-5CM0-4D00-6JCG
  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individual’s concerns about organizational practices. Management Information Systems Quarterly, 20(2), 167–196. doi:10.2307/249477
  • Spiekermann, S., Grossklags, J., & Berendt, B. (2001). E-Privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In Proceedings of ACM conference in electronic commerce, Tampa, Florida, US, 38–46.
  • Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49. doi:10.1287/isre.13.1.36.97
  • Sutanto, J., Palme, E., Tan, C. H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. Management Information Systems Quarterly, 37(4), 1141–1164.
  • Tam, K. Y., & Ho, S. Y. (2006). Understanding the impact of web personalization on user information processing and decision outcomes. Management Information Systems Quarterly, 30(4), 865–890.
  • Van Der Heijden, H. (2004). User acceptance of hedonic information system. Management Information Systems Quarterly, 28(4), 695–704.
  • Varian, H. R. (1996). Economic aspects of personal privacy. Technical report. Berkeley, US: University of California.
  • Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11, 342–365. doi:10.1287/isre.11.4.342.11872
  • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. doi:10.1287/mnsc.46.2.186.11926
  • Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. Management Information Systems Quarterly, 36(1), 157–178.
  • Wang, Y. S. (2007). Development and validation of a mobile computer anxiety scale. British Journal of Educational Technology, 38(6), 990–1009. doi:10.1111/j.1467-8535.2006.00687.x
  • Wills, C. E., & Zeljkovic, M. (2011). A personalized approach to web privacy: Awareness, attitudes, and actions. Information Management & Computer Security, 19(1), 53–73. doi:10.1108/09685221111115863
  • Xu, H. (2010). Locus of control and location privacy: An empirical study in Singapore. Journal of Global Information Technology Management, 13(3), 63–87. doi:10.1080/1097198X.2010.10856520
  • Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42–52. doi:10.1016/j.dss.2010.11.017
  • Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135–173. doi:10.2753/MIS0742-1222260305
  • Xu, J. D., Benbasat, I., & Cenfetelli, R. T. (2013). Integrating service quality with system and information quality: An empirical test in the e-service context. Management Information Systems Quarterly, 37(3), 777–794.
  • Yamaguchi, S. (2001). Culture and control orientations. In D. Matsumoto (Ed.), The handbook of culture and psychology (pp. 223–243). Oxford, UK: Oxford University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.