53
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Cultural and Generational Influences on Information Privacy Concerns within Online Social Networks: An Empirical Evaluation of the Miltgen and Peyrat-Guillard Model

& ORCID Icon

References

  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347 (6221), 509–514.
  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the facebook. International Workshop on Privacy Enhancing Technologies, 4258, 36–58.
  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35 (4), 1017–1042.
  • Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20 (5), 313–324.
  • Cecere, G., Le Guel, F., & Soulié, N. (2015). Perceived internet privacy concerns on social networks in Europe. Technological Forecasting and Social Change, 96, 277–287.
  • Diamantopoulos, A., Sarstedt, M., Fuchs, C., Wilczynski, P., & Kaiser, S. (2012). Guidelines for choosing between multi-item and single-item scales for construct measurement: A predictive validity perspective. Journal of the Academy of Marketing Science, 40 (3), 434–449.
  • Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22 (3), 295–316.
  • European Commission (2013): Eurobarometer 74.3 (2010). TNS Opinion and Social, Brussels [Producer]. GESIS Data Archive, Cologne. ZA5450 Data file Version 5.2.0. doi:10.4232/1.11627
  • Hair, J., Black, W., Babin, B., & Anderson, R. (2010). Multivariate data analysis (7th ed.). Upper Saddle River, New Jersey: Prentice Hall.
  • Hair, J. F., Jr, Hult, G. T. M., Ringle, C., & Sarstedt, M. (2016). A primer on partial least squares structural equation modeling (PLS-SEM). Thousand Oaks, California: Sage Publications.
  • Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133 (1), 111–123.
  • Halperin, R., & Dror, Y. (2016). Information privacy and the digital generation gap: An exploratory study. Journal of Information Privacy and Security, 12 (4), 166–180.
  • Hayduk, L. A., & Littvay, L. (2012). Should researchers use single indicators, best Indicators, or multiple indicators in structural equation models? BMC Medical Research Methodology, 12 (1), 159.
  • Hoadley, C. M., Xu, H., Lee, J. J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50–60.
  • Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: Software of the mind: Intercultural cooperation and its importance for survival. New York City, NY: McGraw-Hill.
  • Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37 (1), 275–298.
  • Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies?.
  • Hsu, C. W. (2006). Privacy concerns, privacy practices and web site categories: Toward a situational paradigm. Online Information Review, 30 (5), 569–586.
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44 (2), 544–564.
  • Kock, N. (2014). Stable P value calculation methods in PLS-SEM. Laredo, TX: ScriptWarp Systems.
  • Kock, N. (2015). A note on how to conduct a factor-based PLS-SEM analysis. International Journal of e-Collaboration (Ijec), 11 (3), 1–9.
  • Kock, N. (2017). WarpPLS 6.0 user manual. Laredo, Texas: Script Warp Systems.
  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25 (2), 109–125.
  • Krasnova, H., & Veltri, N. F. (2010). Privacy calculus on social networking sites: Explorative evidence from Germany and USA. Hawaii International Conference on System Sciences, (43), 3039–3048.
  • Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and privacy calculus on social networking sites: The role of culture. Business & Information Systems Engineering, 4 (3), 127–135.
  • Lauer, T. W., & Deng, X. (2007). Building online trust through privacy practices. International Journal of Information Security, 6(5), 323–331.
  • Lenhart, A., & Fox, S. (2009). Twitterpated: Mobile Americans increasingly take to tweeting. Washington DC: Pew Research Center Publications. Retrieved from http://www.pewinternet.org/2009/02/12/twitter-and-status-updating/
  • Lenhart, A., Madden, M., Smith, A., & Macgill, A. (2007). Teens and social media. Washington DC : Pew Internet & American Life Project.
  • Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28 (1), 453–496.
  • Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54 (1), 471–481.
  • Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29, 1649–1656. doi:10.1016/j.chb.2013.01.049
  • Livingstone, S. (2008). Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10 (3), 393–411.
  • Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27 (4), 163–200.
  • Mesch, G. S. (2012). Is online trust and trust in social institutions associated with online disclosure of identifiable information online? Computers in Human Behavior, 28 (4), 1471–1477.
  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11 (1), 35–57.
  • Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23 (2), 103–125.
  • Minkov, M., & Hofstede, G. (2011). The evolution of Hofstede’s doctrine. Cross Cultural & Strategic Management, 18 (1), 10–20.
  • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. The Journal of Consumer Affairs, 41 (1), 100.
  • Nov, O., & Wattal, S. (2009, April). Social computing privacy concerns: Antecedents and effects. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 333–336), Boston, MA. New York, NY: ACM.
  • Osatuyi, B. (2015). Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms. Computers in Human Behavior, 49, 324–332.
  • Peluchette, J., & Karl, K. (2008). Social networking profiles: An examination of student attitudes regarding use and appropriateness of content. CyberPsychology & Behavior, 11 (1), 95–97.
  • Pentland, A. (2014). Social physics: How good ideas spread-the lessons from a new science. New York, NY: Penguin.
  • Petrescu, M. (2013). Marketing research using single-item indicators in structural equation models. Journal of Marketing Analytics, 1 (2), 99–117.
  • Post, G. V., & Walchli, S. B. (2014). Social network privacy: Trusting friends. Journal of Information Privacy and Security, 10 (3), 113–137.
  • Ringle, C. M., Sarstedt, M., & Straub, D. (2012). A critical look at the use of PLS-SEM in MIS quarterly. MIS Quarterly (MISQ), 36, 1.
  • Rönkkö, M., & Evermann, J. (2013). A critical examination of common beliefs about partial least squares path modeling. Organizational Research Methods, 16 (3), 425–448.
  • Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22 (5), 428–438.
  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35 (4), 989–1016.
  • Tucker, C. E. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research (JMR), 51 (5), 546–562. doi:10.1509/jmr.10.0355
  • Turow, J., & Hennessy, M. (2007). Internet privacy and institutional trust insights from a national survey. New Media & Society, 9 (2), 300–318.
  • Xie, B., Watkins, I., Golbeck, J., & Huang, M. (2012). Understanding and changing older adults’ perceptions and learning of social media. Educational Gerontology, 38 (4), 282–296.
  • Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: An integrated model. Electronic Commerce Research, 13 (2), 151–168.
  • Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12 (12), 798–824.
  • Xu, H., Teo, H.-H., Bernard, C. Y. T., & Agarwal, R. (2012). Research note: Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23 (4), 1342–1363.
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. The Journal of Consumer Affairs, 43 (3), 389–418.
  • Zajicek, M. (2007, May). Web 2.0: Hype or happiness?. In Proceedings of the 2007 international cross-disciplinary conference on Web accessibility (W4A) (pp. 35–39). New York, NY: Association of Computing Machinery. doi:10.1145/1243441.1243453
  • Zhang, N., Wang, C., & Xu, Y. (2011). Privacy in online social networks. ICIS 2011 Proceedings. Paper 3 Retrieved from https://aisel.aisnet.org/icis2011/proceedings/ISsecurity/3

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.