3,361
Views
448
CrossRef citations to date
0
Altmetric
Original Article

The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services

, , &
Pages 135-174 | Published online: 08 Dec 2014

References

  • Agarwal, R., and Karahanna, E. Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24, 4 (2000), 665-692.
  • Agarwal, R., and Prasad, J. A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9, 2 (1998), 204-215.
  • Ashworth, L., and Free, C. Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. Journal of Business Ethics, 67, 2 (2006), 107-123.
  • Ba, S. L.; Whinston, A. B.; and Zhang, H. Building trust in online auction markets through an economic incentive mechanism. Decision Support Systems, 35, 3 (2003), 273-286.
  • Bagozzi, R. P. Marketing as exchange. Journal of Marketing, 39, 4 (1975), 32-39.
  • Barnes, J. S. Known by the network: The emergence of location-based mobile commerce. In E.-P. Lim and K. Siau (eds.), Advances in Mobile Commerce Technologies. Hershey, PA: Idea Group, 2003, pp. 171-189.
  • Beinat, E. Privacy and location-based services: Stating the policies clearly. GeoInformatics, 4 (September 2001), 14-17.
  • Bellavista, P.; Kupper, A.; and Helal, S. Location-based services: Back to the future. IEEE Pervasive Computing, 7, 2 (2008), 85-89.
  • Benassi, P. TRUSTe: An online privacy seal program. Communications of the ACM, 42, 2 (1999), 56-59.
  • Bies, R. J., and Moag, J. S. Interactional justice: Communication criteria of fairness. In R. J. Lewicki, B. H. Sheppard, and M. Bazerman (eds.), Research on Negotiation in Organizations. Greenwich, CT: JAI Press, 1986, pp. 43-55.
  • Bruner, C. G., II., and Kumar, A. Attitude toward location-based advertising. Journal of Interactive Advertising, 7, 2 (Spring 2007) (available at www.jiad.org/article89
  • Campbell, D. T., and Fiske, D. W. Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56, 1 (1959), 81-105.
  • Carte, A. T., and Russell, J. C. In pursuit of moderation: Nine common errors and their solutions. MIS Quarterly, 27, 3 (2003), 479-501.
  • Chae, M., and Kim, J. Information quality for mobile Internet services: A theoretical model with empirical validation. In V. Storey, S. Sarkar, and J. DeGross (eds.), Proceedings of the Twenty-Second International Conference on Information Systems. Atlanta: AIS, 2001, pp. 43-53.
  • Chan, Y. E.; Culnan, M. J.; Greenaway, K.; Laden, G.; Levin, T.; and Smith, H. J. Information privacy: Management, marketplace, and legal challenges. Communications of the AIS, 16, 1 (2005), 593-634.
  • Chellappa, R. K., and Shivendu, S. An economic model of privacy: A property rights approach to regulatory choices for online personalization. Journal of Management Information Systems, 24, 3 (Winter 2007-8), 193-225.
  • Chin, W. W. The partial least squares approach to structural equation modeling. In G. A. Marcoulides (ed.), Modern Methods for Business Research. Mahwah, NJ: Lawrence Erlbaum, 1998, pp. 295-336.
  • Chin, W. W. Frequently asked questions—Partial least squares & PLS-Graph. 2004 (available at http://disc-nt.cba.uh.edu/chin/plsfaq.htm#Q1
  • Clarke, R. Person location and person tracking: Technologies, risks and policy implications. Information Technology & People, 14, 2 (2001), 206-231.
  • Colquitt, J. A.; Conlon, D. E.; Wesson, M. J.; Porter, C.; and Ng, K. Y. Justice at the millennium: A meta-analytic review of 25 years of organizational justice research. Journal of Applied Psychology, 86, 3 (2001), 425-445.
  • Cook, M., and Campbell, D. T. Quasi-Experimentation: Design and Analysis Issues for Field Settings. Boston: Houghton Mifflin, 1979.
  • Cropanzano, R., and Ambrose, M. L. Procedural and distributive justice are more similar than you think: A monistic perspective and a research agenda. In J. Greenberg and R. Cropanzano (eds.), Advances in Organizational Justice. Stanford: Stanford University Press, 2001, pp. 119-151.
  • Culnan, M. J. "How did they get my name"? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17, 3 (1993), 341-364.
  • Culnan, M. J. Consumer awareness of name removal procedures: Implication for direct marketing. Journal of Interactive Marketing, 9, 2 (Spring 1995), 10-19.
  • Culnan, M. J. Protecting privacy online: Is self-regulation working? Journal of Public Policy and Marketing, 19, 1 (2000), 20-26.
  • Culnan, M. J., and Armstrong, P. K. Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10, 1 (1999), 104-115.
  • Culnan, M. J., and Bies, J. R. Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59, 2 (2003), 323-342.
  • Cunningham, S. The major dimensions of perceived risk. In D. F. Cox (ed.), Risk Taking and Information Handling in Consumer Behavior. Cambridge: Harvard University Press, 1967, pp. 82-108.
  • Dinev, T., and Hart, P. An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 1 (2006), 61-80.
  • Dowling, G., and Staelin, R. A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21, 1 (1994), 119-134.
  • Featherman, M. S., and Pavlou, P. A. Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59, 4 (2003), 451-474.
  • Fornell, C., and Bookstein, F. L. Two structural equation models: LISREL and PLS applied to customer exit-voice theory. Journal of Marketing Research, 19, 11 (1982), 440-452.
  • Gibson, J. L., and Caldeira, G. A. The legal cultures of Europe. Law & Society Review, 30, 1 (1996), 55-85.
  • Gidari, A. No "L-commerce" without "L-privacy": Fair location information practices for mobile commerce. Paper presented at the L-Commerce 2000—The Location Services & GPS Technology Summit, Washington, DC, June 13-14, 2000.
  • Greenberg, J. The social side of fairness: Interpersonal and informational classes of organizational justice. In R. Cropanzano (ed.), Justice in the Workplace: Approaching Fairness in Human Resource Management. Hillsdale, NJ: Lawrence Erlbaum, 1993, pp. 79-103.
  • Hann, I.-H.; Hui, K.-L.; Lee, S. Y. T.; and Png, I. P. L. Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24, 2 (Fall 2008), 13-42.
  • Harding, A. Comparative law and legal transplantation in South East Asia. In D. Nelken and J. Feest (eds.), Adapting Legal Cultures. Portland, OR: Hart, 2001, pp. 199-222.
  • Hui, K.-L.; Teo, H.-H.; and Lee, T. S. Y. The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31, 1 (2007), 19-33.
  • Junglas, I. A., and Watson, R. T. The U-constructs: Four information drives. Communications of the AIS, 17, 1 (2006), 569-592.
  • Junglas, I. A., and Watson, R. T. Location-based services: Evaluating user perceptions of location-tracking and location-awareness services. Communications of the ACM, 51, 3 (2008), 65-69.
  • Junglas, I. A.; Johnson, N. A.; and Spitzmüller, C. Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17, 4 (2008), 387-402.
  • Konovsky, M. A. Understanding procedural justice and its impact on business organizations. Journal of Management, 26, 3 (2000), 489-511.
  • Lanier, D. C., and Saini, A. Understanding consumer privacy: A review and future directions. Academy of Marketing Science Review, 12, 2 (2008), 1-48.
  • Laufer, R. S., and Wolfe, M. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33, 3 (1977), 22-41.
  • Levy, S. A future with nowhere to hide? Newsweek (June 7, 2004) (available at www.newsweek.com/id/53986
  • Liang, T. P.; Lai, H. J.; and Ku, Y. C. Personalized content recommendation and user satisfaction: Theoretical synthesis and empirical findings. Journal of Management Information Systems, 23, 3 (Winter 2006-7), 45-70.
  • Lyytinen, K., and Yoo, Y. Research commentary: The next wave of nomadic computing. Information Systems Research, 13, 4 (2002), 377-388.
  • Malhotra, N. K.; Kim, S. S.; and Agarwal, J. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 336-355.
  • Margulis, T. S. Privacy as a social issue and behavioral concept. Journal of Social Issues, 59, 2 (2003), 243-261.
  • Martínez-Tur, V.; Peiró, M. J.; Ramos, J.; and Moliner, C. Justice perceptions as predictors of customer satisfaction: The impact of distributive, procedural, and interactional justice. Journal of Applied Social Psychology, 36, 1 (2006), 100-119.
  • Miller, D. T. Disrespect and the experience of injustice. Annual Reviews in Psychology, 52, 1 (2001), 527-553.
  • Milne, G. R., and Gordon, E. M. Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy and Marketing, 12, 2 (1993), 206-215.
  • Mobile location based services: Market development, revenue opportunities, LBS applications, and key industry players. Allied Business Intelligence Inc., New York, 2008 (available at www.abiresearch.com/research/1000821-Mobile_Location-Based_Services
  • Nunnally, J. C. Psychometric Theory. New York: McGraw-Hill, 1978.
  • Orwell, G. 1984. San Diego: Harcourt Brace Jovanovich, 1984. [Originally published as Nineteen Eighty-Four, London: Martin Secker & Warburg, 1949.]
  • Otjacques, B.; Hitzelberger, P.; and Feltz, F. Interoperability of e-government information systems: Issues of identification and data sharing. Journal of Management Information Systems, 23, 4 (Spring 2007), 29-51.
  • Pedersen, E. P. Adoption of mobile Internet services: An exploratory study of mobile commerce early adopters. Journal of Organizational Computing and Electronic Commerce, 15, 2 (2005), 203-222.
  • Phelps, J.; Nowak, G.; and Ferrell, E. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19, 1 (2000), 27-41.
  • Podsakoff, P. M.; MacKenzie, S. B.; Lee, J. Y.; and Podsakoff, N. P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879-890.
  • Privacy online: Fair information practices in the electronic marketplace. Report to Congress, Federal Trade Commission, Washington, DC, May 2000 (available at www.ftc.gov/reports/privacy2000/privacy2000.pdf
  • Rao, B., and Minakakis, L. Evolution of mobile location-based services. Communications of the ACM, 46, 12 (2003), 61-65.
  • Sarathy, R., and Robertson, C. J. Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46, 2 (2003), 111-126.
  • Sheng, H.; Nah, F.; and Siau, K. An experimental study on U-commerce adoption: The impact of personalization and privacy concerns. Journal of the Association for Information Systems, 9, 16 (2008), Article 15.
  • Smith, H. J. Information privacy and its management. MIS Quarterly Executive, 3, 4 (2004), 201-213.
  • Smith, H. J.; Milberg, J. S.; and Burke, J. S. Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 2 (1996), 167-196.
  • Son, J.-Y., and Kim, S. S. Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32, 3 (2008), 503-529.
  • Stone, E. F., and Stone, D. L. Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8, 3 (1990), 349-411.
  • Story, L., and Stone, B. Facebook retreats on online tracking. New York Times (November 30, 2007) (available at www.nytimes.com/2007/11/30/technology/30face.html?_r=1
  • Tang, Z.; Hu, Y. J.; and Smith, M. D. Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24, 4 (Spring 2008), 153-173.
  • Tittle, C. R. Sanctions and Social Deviance: The Question of Deterrence. New York: Praeger, 1980.
  • TRUSTe announces first wireless privacy standards to protect mobile users. TRUSTe, San Francisco, 2004 (available at http://clicktoverify.truste.com/about/press_release/02_18_04.php
  • Unni, R., and Harmon, R. Perceived effectiveness of push vs. pull mobile location-based advertising. Journal of Interactive Advertising, 7, 2 (2007) (available at www.jiad.org/article91
  • Westin, A. F. Privacy and Freedom. New York: Atheneum, 1967.
  • Wold, H. Soft modeling: The basic design and some extensions. In K. G. Jöreskog and H. Wold (eds.), Systems Under Indirect Observations: Part 2. Amsterdam: North-Holland, 1982, pp. 1-54.
  • Zeimpekis, V.; Giaglis, M. G.; and Lekakos, G. A taxonomy of indoor and outdoor positioning techniques for mobile location services. ACM SIGecom Exchanges, 3, 4 (2003), 19-27.
  • Zeithaml, V. A.; Parasuraman, A.; and Malhotra, A. A conceptual framework for under-standing e-service quality: Implications for future research and managerial practice. Report no. 00-115, Marketing Science Institute, Cambridge, MA, 2000.
  • Zimmermann, A.; Specht, M.; and Lorenz, A. Personalization and context management. User Modeling and User-Adapted Interaction, 15, 3 (2005), 275-302.
  • Zucker, L. G. Production of trust: Institutional sources of economic structure, 1840-1920. In B. M. Staw and L. L. Cummings (eds.), Research in Organizational Behavior, vol. 8. Greenwich, CT: JAI Press, 1986, pp. 53-111.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.