skip to main content
article

Privacy in the digital age: a review of information privacy research in information systems

Published: 01 December 2011 Publication History

Abstract

Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.

References

[1]
Agarwal, R., and Rodhain, F. 2002. "Mine or Ours: EMail Privacy Expectations, Employee Attitudes, and Perceived Work Environment Characteristics," in Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 2471-2480.
[2]
Akhter, F. 2007. "A Case Study: Adoption of Information Technology in E-Business of United Arab Emirates," in IEEE International Conference on e-Business Engineering, Los Alamitos, CA: IEEE Computer Society Press, pp. 383-387.
[3]
Alge, B. J., Ballinger, G. A., Tangirala, S., and Oakley, J. L. 2006. "Information Privacy in Organizations: Empowering Creative and Extrarole Performance," Journal of Applied Psychology (91:1), pp. 221-232.
[4]
Allen, M. W., Coopman, S. J., Hart, J. L., and Walker, K. L. 2007. "Workplace Surveillance and Managing Privacy Boundaries," Management Communication Quarterly (21:2), pp. 172-200.
[5]
Awad, N. F., and Krishnan, M. S. 2006. "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization," MIS Quarterly (30:1), pp. 13-28.
[6]
Bélanger, F., Crossler, R. E., Hiller, J. S., Park, J.-M., and Hsiao, M. 2009. "Children Online Privacy: Issues with Parental Awareness and Control," in Annals of Emerging Research in Information Assurance, Security and Privacy Services, H. R. Rao and S. Upadhyaya (eds.), London: Reed Elsevier, pp. 311-333.
[7]
Bélanger, F., and Hiller, J. S. 2006. "A Framework for E-Government: Privacy Implications," Business Process Management Journal (12:1), pp. 48-60.
[8]
Bélanger, F., Hiller, J., and Smith, W. J. 2002. "Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes," Journal of Strategic Information Systems (11:3/4), pp. 245-270.
[9]
Bellman, S., Johnson, E., Kobrin, S., and Lohse, G. 2004. "International Differences in Information Privacy Concerns: A Global Survey of Consumers," The Information Society (20:5), pp. 313-324.
[10]
Benbasat, I., Goldstein, D. K., and Mead, M. 1987. "The Case Research Strategy in Studies of Information Systems," MIS Quarterly (11:3), pp. 369-386.
[11]
Berendt, B., Günther, O., and Spiekermann, S. 2005. "Privacy in e-Commerce: Stated Preferences vs. Actual Behavior," Communications of the ACM (48:4), pp. 101-106.
[12]
Brown, E., and Kosa, T. A. 2008. "Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks," Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on, pp. 232-239.
[13]
Brown, M., and Muchira, R. 2004. "Investigating the Relationship Between Internet Privacy Concerns and Online Purchase Behavior," Journal of Electronic Commerce Research (5:1), pp. 62-70.
[14]
Cai, Y.-L., Wang, W.-D., Gong, X.-Y., Chen, C.-F., and Ma, J. 2009. "Sharing Information with Controllable Precision by Distance Measuring in Mobile Social Network," in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, Los Alamitos, CA: IEEE Computer Society Press.
[15]
Cao, J., and Everard, A. 2008. "User Attitude Towards Instant Messaging: The Effect of Espoused National Cultural Values on Awareness and Privacy," Journal of Global Information Technology Management (11:2), pp. 30-57.
[16]
Cazier, J. A., Shao, B. B. M., and Louis, R. D. S. 2003. "Addressing e-Business Privacy Concerns: The Roles of Trust and Value Compatibility," in Proceedings of the 2003 ACM Symposium on Applied Computing, Melbourne, FL, pp. 617-622.
[17]
Channakeshava, K., Bian, K., Hsiao, M., Park, J.-M., Crossler, R., Bélanger, F., Aggarwal, P., and Hiller, J. S. 2008. "On Providing Automatic Parental Consent over Information Collection from Children," in Proceedings of the 2008 International Conference on Security and Management (SAM'08), Las Vegas, NV, pp. 196-202.
[18]
Chellappa, R. K., and Sin, R. G. 2005. "Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management (6), pp. 181-202.
[19]
Chen, K., and Rea Jr., A. I. 2004. "Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques," The Journal of Computer Information Systems (44:4), pp. 85-92.
[20]
Chen, S., and Li, J. 2009. "Factors Influencing the Consumers' Willingness to Buy in e-Commerce," in Proceedings of the International Conference on E-Business and Information System Security, Wuhan, China, May 23-24, pp. 1-8.
[21]
Clark Jr., T. D., Jones, M. C., and Armstrong, C. P. 2007. "The Dynamic Structure of Management Support Systems: Theory Development, Research Focus, and Direction," MIS Quarterly (31:3), pp. 579-615.
[22]
Clarke, I., Miller, S. G., Hong, T. W., Sandberg, O., and Wiley, B. 2002. "Protecting Free Expression Online with Freenet," IEEE Internet Computing (6:1), pp. 40-49.
[23]
Clarke, R. 1999. "Internet Privacy Concerns Confirm the Case for Intervention," Communications of the ACM (42:2), pp. 60-67.
[24]
Cockcroft, S. 2006. "Information Privacy: Culture, Legislation and User Attitudes," Australasian Journal of Information Systems (14:1), pp. 55-68.
[25]
Cranor, L. F. 1999. "Internet privacy," Communications of the ACM (42:2), pp. 28-31.
[26]
Cranor, L. F. 2006. "What Do They 'Indicate'?," Interactions (13:3), pp. 45-47.
[27]
Cranor, L. F., Guduru, P., and Arjula, M. 2006. "User Interfaces for Privacy Agents," ACM Transactions on Computer-Human Interaction (13:2), pp. 135-178.
[28]
Crossler, R. E., Bélanger, F., Hiller, J. S., Channakeshava, K., Bian, K., Park, J.-M., and Hsiao, M. 2007. "The Development of a Tool to Protect Children's Privacy Online," in Proceedings of the 2007 Annual International Workshop of the AIS Special Interest Group on Information Security and Privacy (SIG-SEC), Montreal, Canada.
[29]
Cullen, R., and Reilly, P. 2008. "Citizens' Concerns about the Privacy of Personal Information Held by Government: A Comparative Study, Japan and New Zealand," in Proceedings of the 41st Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 224-235.
[30]
Culnan, M. J. 1993. "'How Did They Get My Name?': An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use," MIS Quarterly (17:3), pp. 341-363.
[31]
Culnan, M. J., and Armstrong, P. K. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science (10:1), pp. 104-115.
[32]
Davison, R. M., Martinsons, M. G., and Kock, N. 2004. "Principles of Canonical Action Research," Information Systems Journal (14:1), pp. 65-86.
[33]
DeGrande, R. E., and Donizetti, S. 2006. "Privacy Protection Without Impairing Personalization by Using the Extended System MASKS and the Extended Contextualized P3P Privacy Policies," in Proceedings of the 12th Brazilian Symposium on Multimedia and the Web, Natal, Rio Grande do Norte, Brazil, pp. 89-98.
[34]
Deloitte. 2007. "Enterprise@Risk: 2007 Privacy & Data Protection Survey," http://www.deloitte.com/dtt/cda/doc/content/us_ risk_s%26P_2007%20Privacy10Dec2007final.pdf; retrieved January 16, 2008.
[35]
Dillon, T. W., Hamilton, A. J., Thomas, D. S., and Usry, M. L. 2008. "The Importance of Communicating Workplace Privacy Policies," Employee Responsibilities and Rights Journal (20:2), pp. 119-139.
[36]
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. 2006a. "Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States," Journal of Global Information Management (14:4), pp. 57-93.
[37]
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. 2006b. "Privacy Calculus Model in e-Commerce-- A Study of Italy and the United States," European Journal of Information Systems (15:4), pp. 389-402.
[38]
Dinev, T., and Hart, P. 2004. "Internet Privacy Concerns and Their Antecedents-Measurement Validity and a Regression Model," Behaviour & Information Technology (23:6), pp. 413-422.
[39]
Dinev, T., and Hart, P. 2005. "Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact," International Journal of Electronic Commerce (10:2), pp. 7-29.
[40]
Dinev, T., and Hart, P. 2006. "An Extended Privacy Calculus Model for e-Commerce Transactions," Information Systems Research (17:1), pp. 61-80.
[41]
Dobosz, B., Green, K., and Sisler, G. 2006. "Behavioral Marketing: Security and Privacy Issues," Journal of Information Privacy & Security (2:4), pp. 45-59.
[42]
Donlan, A. E. 2007. "The IAPP Unveils Winners of the 2007 HP-IAPP Privacy Innovation Awards," Marketwire (http://www.marketwire.com/press-release/Iapp-784595.html; retrieved August 19, 2009).
[43]
Drennan, J., Mort, G. S., and Previte, J. 2006. "Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users," Journal of Organizational and End User Computing (18:1), pp. 1-22.
[44]
Dreyer, L. C. J., and Olivier, M. S. 1998. "A Workbench for Privacy Policies," in Proceedings of the 22nd Annual International Computer Software and Applications Conference, Los Alamitos, CA: IEEE Computer Society Press, pp. 350-355.
[45]
Earp, J. B., Anton, A. I., Aiman-Smith, L., and Stufflebeam, W. H. 2005. "Examining Internet Privacy Policies Within the Context of User Privacy Values," IEEE Transactions on Engineering Management (52:2), pp. 227-237.
[46]
Earp, J. B., and Payton, F. C. 2001. "Data Protection in the University Setting: Employee Perceptions of Student Privacy," in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 1-6.
[47]
Earp, J. B., and Payton, F. C. 2006. "Information Privacy in the Service Sector: An Exploratory Study of Health Care and Banking Professionals," Journal of Organizational Computing and Electronic Commerce (16:2), pp. 105-122.
[48]
Eastlick, M. A., Lotz, S. L., and Warrington, P. 2006. "Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment," Journal of Business Research (59:8), pp. 877-886.
[49]
Eisenhardt, K. M. 1989. "Building Theory from Case Study Research," Academy of Management Review (14:4), pp. 532-550.
[50]
EIU. 2009. "E-Readiness Rankings 2009: The Usage Imperative," Economicst Intelligence Unit, The Economist (http://graphics.eiu.com/pdf/E-readiness%20rankings.pdf).
[51]
Friedman, B. A., and Reed, L. J. 2007. "Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-Mail Use," Employee Responsibilities and Rights Journal (19:2), pp. 75-83.
[52]
George, J. F. 2004. "The Theory of Planned Behavior and Internet Purchasing," Internet Research (14:3), pp. 198-212.
[53]
Gkoulalas-Divanis, A., Verykios, V. S., and Eleftheriou, D. 2009. "PLOT: Privacy in Location Based Services: An Open-Ended Toolbox," in Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, Taipei, Taiwan, May 18-20, pp. 62-71.
[54]
Godfrey, B. 2000. "Electronic Work Monitoring: An Ethical Model," in Selected Papers from the Second Australian Institute Conference on Computer Ethics, Canberra, Australia: Australian Computer Society, Inc., pp. 18-21.
[55]
Goodman, P. 2005. "'Yahoo Says it Gave China Internet Data," Washington Post, September 11, 2005, p. A30.
[56]
Gregor, S. 2006. "The Nature of Theory in Information Systems," MIS Quarterly (30:3), pp. 611-642.
[57]
Hall, R. J., and Zisman, A. 2004. "Behavioral Models as Service Descriptions," in Proceedings of the 2nd International Conference on Service Oriented Computing, New York, November 15-19, pp. 163-172.
[58]
Hart, M. 2008. "Do Online Buying Behaviour and Attitudes to Web Personalization Vary by Age Group?," in Proceedings of the 2008 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, Wilderness, South Africa, October 6-8, pp. 86-93.
[59]
Hart, M., Castille, C., Johnson, R., and Stent, A. 2009. "Usable Privacy Controls for Blogs," in Proceedings of the International Conference on Computational Science and Engineering, San Francisco, October 20-22, pp. 401-408.
[60]
Hawkey, K. 2008. "Exploring a Human Centered Approach to Managing Visual Privacy Concerns During Collaboration," in Proceeding of the 3rd ACM International Workshop on Human-Centered Computing, Vancouver, British Columbia, Canada, October 16-31, pp. 69-76.
[61]
Henderson, S. C., and Snyder, C. A. 1999. "Personal Information Privacy: Implications for MIS Managers," Information & Management (36:4), pp. 213-220.
[62]
Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. 2010. "Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry," Electronic Commerce Research and Applications (9), pp. 50-60.
[63]
Hoffman, D., Novak, T. P., and Peralta, M. 1999. "Building Consumer Trust Online," Communications of the ACM (42:4), pp. 80-85.
[64]
Hofstede, G. 1991. Cultures and Organizations: Software of the Mind, New York: McGraw-Hill.
[65]
Hong, J. I., Ng, J. D., Lederer, S., and Landay, J. A. 2004. "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems," in Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, MA, August 1-4, pp. 91-100.
[66]
Hsu, C. J. 2006. "Privacy Concerns, Privacy Practices and Web Site Categories," Online Information Review (30:5), pp. 569-586.
[67]
Hui, K. L., Tan, B. C. Y., and Goh, C. Y. 2006. "Online Information Disclosure: Motivators and Measurements," ACM Transactions on Internet Technology (6:4), pp. 415-441.
[68]
Hui, K. L., Teo, H. H., and Lee, S. Y. T. 2007. "The Value of Privacy Assurance: An Exploratory Field Experiment," MIS Quarterly (31:1), pp. 19-33.
[69]
Janis, I. L. 1972. Victims of Groupthink: A Psychological Study of Foreign Policy Decisions and Fiascoes, Boston, MA: Houghton Mifflin.
[70]
Jensen, C., and Potts, C. 2004. "Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vienna, Austria, April 24-29, pp. 471-478.
[71]
Jensen, C., Sarkar, C., Jensen, C., and Potts, C. 2007. "Tracking Website Data-Collection and Privacy Practices with the iWatch Web Crawler," in Proceedings of the 3rd Symposium on Usable Privacy and Security, Pittsburgh, PA, July 18-20, pp. 29-40.
[72]
Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., and Wetherall, D. 2009. ""When I am on Wi-Fi, I am Fearless": Privacy Concerns & Practices in Everyday Wi-Fi Use," in Proceedings of the 27th International Conference on Human Factors in Computing Systems, Boston, MA, April 4-9, pp. 1993-2002.
[73]
Ko, H. G., Kim, S. H., and Jin, S. H. 2007. "Usability Enhanced Privacy Protection System Based on Users' Responses," in Proceedings of the IEEE International Symposium on Consumer Electronics, Los Alamitos, CA: IEEE Computer Society Press, pp. 1-6.
[74]
Kolter, J., and Pernul, G. 2009. "Generating User-Understandable Privacy Preferences," in Proceedings of the International Conference on Availability, Reliability and Security, Fukuoka, Japan, March 16-19, pp. 299-306.
[75]
Korzaan, M. L., and Boswell, K. T. 2008. "The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions," The Journal of Computer Information Systems (48:4), pp. 15-24.
[76]
Kudo, M., Araki, Y., Nomiyama, H., Saito, S., and Sohda, Y. 2007. "Best Practices and Tools for Personal Information Compliance Management," IBM Systems Journal (46:2), pp. 235-253.
[77]
Kuo, F. Y., Lin, C. S., and Hsu, M. H. 2007. "Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices," Journal of Business Ethics (73:2), pp. 145-160.
[78]
Kwantes, C., Arbour, S., and Boglarsky, C. 2007. "Organizational Culture Fit and Outcomes in Six National Contexts: An Organizational Level Analysis," Journal of Organizational Culture, Communication and Conflict (11:2), pp. 95-112.
[79]
Landis, J. R., and Koch, G. G. 1977. "The Measurement of Observer Agreement for Categorical Data," Biometrics (22), pp 79-94.
[80]
Leidner, D. E., and Kayworth, T. 2006. "Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict," MIS Quarterly (30:2), pp. 357-399.
[81]
Lin, Y. 2005. "Information Privacy Concerns in the Customer Relationship Management Context: A Comparison of Consumer Attitudes in the United States, China, and Taiwan," D.B.A. thesis, Golden Gate University, San Francisco.
[82]
Lin, Y., and Wu, H. Y. 2008. "Information Privacy Concerns, Government Involvement, and Corporate Policies in the Customer Relationship Management Context," Journal of Global Business and Technology (4:1), pp. 79-91.
[83]
Liu, C., and Arnett, K. P. 2002. "Raising a Red Flag on Global WWW Privacy Policies," The Journal of Computer Information Systems (43:1), pp. 117-127.
[84]
Lobato, L. L., Fernandez, E. B., and Zorzo, S. D. 2009. "Patterns to Support the Development of Privacy Policies," in Proceedings of the International Conference on Availability, Reliability and Security, Fukuoka, Japan, March 16-19, pp. 744-749.
[85]
Lucas, M. M., and Borisov, N. 2008. "Flybynight: Mitigating the Privacy Risks of Social Networking," in Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, October 27-31, pp. 1-8.
[86]
Madden, M., Fox, S., Smith, A., and Vitak, J. 2007. "Digital Footprints: Online Identity Management and Search in the Age of Transparency," PEW Research Center Publications (http://pewresearch.org/pubs/663/digital-footprints; retrieved January 16, 2008).
[87]
Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research (15:4), pp. 336-355.
[88]
Markus, M. L. 2001. "Toward a Theory of Knowledge Reuse: Types of Knowledge Reuse Situations and Factors in Reuse Success," Journal of Management Information Systems (18:1), pp. 57-93.
[89]
Mason, R. O. 1986. "Four Ethical Issues of the Information Age," MIS Quarterly (10:1), pp. 5-12.
[90]
McGinity, M. 2000. "Surfing Your Turf," Communications of the ACM (43:4), pp. 19-21.
[91]
Meinert, D. B., Peterson, D. K., Criswell, J. R., and Crossland, M. D. 2006. "Privacy Policy Statements and Consumer Willingness to Provide Personal Information," Journal of Electronic Commerce in Organizations (4:1), pp. 1-17.
[92]
Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. 1995. "Values, Personal Information Privacy, and Regulatory Approaches," Communications of the ACM (38:12), pp. 65-74.
[93]
Milberg, S. J., Smith, H. J., and Burke, S. J. 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science (11:1), pp. 35-57.
[94]
Miles, M. B., and Huberman, A. M. 1994. Qualitative Data Analysis: An Expanded Sourcebook, Thousand Oaks, CA: Sage Publications.
[95]
Milne, G. R., and Gordon, M. E. 1993. "Direct Mail Privacy-Efficiency Trade-Offs Within an Implied Social Contract Framework," Journal of Public Policy & Marketing (12:2), pp. 206-215.
[96]
Miyazaki, A. D., and Krishnamurthy, S. 2002. "Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions," The Journal of Consumer Affairs (36:1), pp. 28-49.
[97]
Mizutani, M., Dorsey, J., and Moor, J. H. 2004. "The Internet and Japanese Conception of Privacy," Ethics and Information Technology (6:2), pp. 121-128.
[98]
Moores, T. T., and Dhillon, G. 2003. "Do Privacy Seals in e-Commerce Really Work?," Communications of the ACM (46:12), pp. 265-271.
[99]
Morgeson, F. P., and Hofmann, D. A. 1999. "The Structure and Function of Collective Constructs: Implications for Multilevel Research and Theory Development," Academy of Management (24:2), pp. 249-265.
[100]
Moscovici, S. (ed.). 1980. Toward a Theory of Conversion Behaviour, New York: Academic Press.
[101]
Mossholder, K. W., Giles, W. F., and Wesolowski, M. A. 1991. "Information Privacy and Performance Appraisal: An Examination of Employee Perceptions and Reactions," Journal of Business Ethics (10:2), pp. 151-156.
[102]
Mugny, G., and Perez, J. A. 1991. The Social Psychology of Minority Influence, Cambridge, UK: Cambridge University Press.
[103]
Myers, M. D. 1997. "Qualitative Research in Information Systems," MISQ Discovery (http://www.qual.auckland.ac.nz/).
[104]
Myers, M. D. 1999. "Investigating Information Systems with Ethnographic Research," Communications of the AIS (2:23), pp. 1-19.
[105]
Nachtigal, S. 2007. "eBPSM: A New Security Paradigm for e-Business Organisations (E-Business Process Security Model)," in Proceedings of the 9th International Conference on Electronic Commerce. Minneapolis, MN, August 19-22, pp. 101-106.
[106]
Nguyen, D. H., Kobsa, A., and Hayes, G. R. 2008. "An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies," in Proceedings of the 10th International Conference on Ubiquitous Computing, Seoul, Korea, pp. 182-191.
[107]
Nilakanta, S., and Scheibe, K. 2005. "The Digital Persona and Trust Bank: A Privacy Management Framework," Journal of Information Privacy & Security (1:4), pp 3-21.
[108]
Norberg, P. A., and Horne, D. R. 2007. "Privacy Attitudes and Privacy-Related Behavior," Psychology & Marketing (24:10), pp. 829-847.
[109]
Norberg, P. A., Horne, D. R., and Horne, D. A. 2007. "The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors," The Journal of Consumer Affairs (41:1), pp. 100-126.
[110]
Nov, O., and Wattal, S. 2009. "Social Computing Privacy Concerns: Antecedents and Effects," in Proceedings of the 27th International Conference on Human Factors in Computing Systems, Boston, MA, April 4-9, pp. 333-336.
[111]
Nowak, G. J., and Phelps, J. 1997. "Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When 'Privacy' Matters," Journal of Interactive Marketing (11:4), pp. 46-60.
[112]
Pavlou, P. A., Liang, H., and Xue, Y. 2007. "Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal--Agent Perspective," MIS Quarterly (31:1), pp. 105-136.
[113]
Peng, T., Jiang, M., and Hu, M. 2009a. "Privacy Protecting in E-business Using Reasoning," in Proceedings of the 2009 IITA International Conference on Services Science, Management and Engineering, IEEE Computer Society, Washington, DC, pp. 374-377.
[114]
Peng, T., Jiang, M., and Hu, M. 2009b. "Protecting the Privacy Based on Reasoning in E-Business Using Anonymous," in Proceedings of the International Conference on Environmental Science and Information Application Technology, Wuhan, China, July 4-5, pp. 232-235.
[115]
Peslak, A. R. 2005a. "Internet Privacy Policies: A Review and Survey of the Fortune 50," Information Resources Management Journal (18:1), pp. 29-41.
[116]
Peslak, A. R. 2005b. "Privacy Policies of the Largest Privately Held Companies: A Review and Analysis of the Forbes Private 50," in Proceedings of the 2005 ACM SIGMIS CPR Conference on Computer Personnel Research. Atlanta, GA, April 14-16, pp. 104-111.
[117]
Peslak, A. R. 2006. "Internet Privacy Policies of the Largest International Companies," Journal of Electronic Commerce in Organizations (4:3), pp. 46-62.
[118]
Pramatari, K., and Theotokis, A. 2009. "Consumer Acceptance of RFID-Enabled Services: A Model of Multiple Attitudes, Perceived System Characteristics and Individual Traits," European Journal of Information Systems (18:6), pp. 541-552.
[119]
Princeton Survey Research Associates. 2002. "A Matter of Trust: What Users Want From Web Sites," Princeton, NJ (http://www.consumerwebwatch.org/pdfs/a-matter-of-trust.pdf).
[120]
Razavi, M. N., and Iverson, L. 2006. "A Grounded Theory of Information Sharing Behavior in a Personal Learning Space," in Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, Banff, Alberta, Canada, November 4-8, pp. 459-468.
[121]
Razzouk, N. Y., Seitz, V., and Nicolaou, M. 2008. "Consumer Concerns Regarding RFID Privacy: An Empirical Study," Journal of Global Business and Technology (4:1), pp. 69-78.
[122]
Reagle, J., and Cranor, L. F. 1999. "The Platform for Privacy Preferences," Communications of the ACM (42:2), pp. 48-51.
[123]
Resnick, M. L., and Montania, R. 2003. "Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features in an Online Web Store," International Journal of Human-Computer Interaction (16:2), pp. 211-234.
[124]
Rose, E. A. 2006. "An Examination of the Concern for Information Privacy in the New Zealand Regulatory Context," Information & Management (43:3), pp. 322-335.
[125]
Ryker, R., Lafleur, E., McManis, B., and Cox, K. C. 2002. "Online Privacy Policies: An Assessment of the Fortune e-50," Journal of Computer Information Systems (42:4), pp. 15-20.
[126]
Schwaig, K. S., Kane, G. C., and Storey, V. C. 2005. "Privacy, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance," The Data Base for Advances in Information Systems (36:1), pp. 49-63.
[127]
Sheehan, K. B. 2005. "In Poor Health: An Assessment of Privacy Policies at Direct-to-Consumer Web Sites," Journal of Public Policy & Marketing (24:2), pp. 273-283.
[128]
Skinner, G., Han, S., and Chang, E. 2006. "An Information Privacy Taxonomy for Collaborative Environments," Information Management & Computer Security (14:4), pp. 382-394.
[129]
Smith, H. J. 1993. "Privacy Policies and Practices: Inside the Organizational Maze," Communications of the ACM (36:12), pp. 105-122.
[130]
Smith, H. J. 2004. "Information Privacy and Its Management," MIS Quarterly Executive (3:4), pp. 291-313.
[131]
Smith, H. J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review," MIS Quarterly (35:4), pp. 989-1016.
[132]
Smith, H. J., Milberg, S. J., and Burke, S. J. 1996. "Information Privacy: Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly (20:2), pp. 167-196.
[133]
Sobiesk, E., Conti, G., Acad, U., and Point, W. 2007. "The Cost of Free Web Tools," IEEE Security & Privacy (5:3), pp. 66-68.
[134]
Soh, C., Sia, S. K., and Tay-Yap, J. 2000. "Cultural Fits and Misfits: Is ERP a Universal Solution?," Communications of the ACM (43:4), pp. 47-51.
[135]
Solove, D. J. 2006. "A Taxonomy of Privacy," University of Pennsylvania Law Review (154:3), pp. 477-564.
[136]
Son, J. Y., and Kim, S. S. 2008. "Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model," MIS Quarterly (32:3), pp. 503-529.
[137]
Spiekermann, S., Grossklags, J., and Berendt, B. 2001. "E-Privacy in 2nd Generation e-Commerce: Privacy Preferences Versus Actual Behavior," in Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL, October 14-17, pp. 38-47.
[138]
Stewart, K. A., and Segars, A. H. 2002. "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research (13:1), pp. 36-49.
[139]
Stone, E. F., Gardner, D. G., Gueutal, H. G., and McClure, S. 1983. "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations," Journal of Applied Psychology (68:3), pp. 459-468.
[140]
Storey, V. C., Kane, G. C., and Schwaig, K. S. 2009. "The Quality of Online Privacy Policies: A Resource-Dependency Perspective," Journal of Database Management (20:2), pp. 19-37.
[141]
Straub, D. W. 1989. "Validating Instruments in MIS Research," MIS Quarterly (13:2), pp. 147-169.
[142]
Swartz, N. 2004. "U.S., Canadian Firms Have Different Views of Privacy," Information Management Journal (38:5), p. 14.
[143]
Sydell, L. 2006. "Google Fights Request to Turn Over Search Records," NPR, January 20 (http://www.npr.org/templates/ story/story.php?storyId=5165530).
[144]
Tam, J. C. 2000. "Personal Data Privacy in the Asia Pacific: A Real Possibility," in Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, Toronto, Ontario, Canada, April 4-7, pp. 259-262.
[145]
Thiesse, F. 2007. "RFID, Privacy and the Perception of Risk: A Strategic Framework," The Journal of Strategic Information Systems (16:2), pp. 214-232.
[146]
Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. 2006. "Concern for Information Privacy and Online Consumer Purchasing," Journal of the Association for Information Systems (7:6), pp. 415-444.
[147]
Warkentin, M., and Johnston, A. C. 2006. "An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments," Journal of Information Privacy & Security (2:1), pp. 16-28.
[148]
Watson-Manheim, M. B., and Bélanger, F. 2002. "Support for Communication-Based Work Processes in Virtual Work," E-Service Journal (1:3), pp. 61-82.
[149]
Watson-Manheim, M. B., and Bélanger, F. 2007. "Communication Media Repertoires: Dealing With the Multiplicity of Media Choices," MIS Quarterly (31:2), pp. 267-293.
[150]
Webster, J. 1998. "Desktop Videoconferencing: Experiences of Complete Users, Wary Users, and Non-Users," MIS Quarterly (22:3), pp. 257-286.
[151]
Westin, A. 1967. Privacy and Freedom, New York: Athenaeus.
[152]
Wilson, S. 2008. "Public Key Superstructure 'It's PKI Jim, but Not as We Know It!,'" in Proceedings of the 7th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, March 4-6, pp. 72-88.
[153]
Xu, H., Gupta, S., Rosson, M. B., and Carroll, J. M. 2009. "Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States," in Proceedings of the 8th International Conference on Mobile Business, June 27-28, pp. 278-283.
[154]
Yang, H. L., and Chiu, H. K. 2002. "Privacy Disclosures of Web Sites in Taiwan," Journal of Information Technology Theory and Application (4:3), pp. 15-42.
[155]
Yang, H. L., and Miao, X. M. 2008. "Concern for Information Privacy and Intention to Transact Online," in Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October 12-14, pp. 1-4.
[156]
Yang, S., and Wang, K. 2009. "The Influence of Information Sensitivity Compensation on Privacy Concern and Behavioral Intention," SIGMIS Database (40:1), pp. 38-51.
[157]
Yazici, H. 2009. "The Role of Project Management Maturity and Organizational Culture in Perceived Performance," Project Management Journal (40:3), pp. 14-33.
[158]
Yee, G. 2006. "A Privacy-Preserving UBICOMP Architecture," in Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, Markham, Ontario, Canada, October 30- November 1, pp. 1-8.
[159]
Yee, G. O. M. 2007. "A Privacy Controller Approach for Privacy Protection in Web Services," in Proceedings of the 2007 ACM Workshop on Secure Web Services, New York: ACM Press, pp. 44-51.
[160]
Yu, C. C. 2007. "A Value-Based Strategic Management Process for e-Government Strategy Planning and Performance Control," in Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, Macao, China, December 10-pp. 169-178.
[161]
Zeng, S. Y., Wu, L. L., and Chen, H. G. 2009. "Sharing Private Information Online: The Mediator Effect of Social Exchange," in Proceedings of the 11th International Conference on Electronic Commerce, Taipei, Taiwan, August 12-15, pp. 231-239.
[162]
Zhao, H., and He, M. 2009. "Study on Social Culturology of the 'Internet Sharer,'"in Proceedings of the 1st IEEE Symposium on Web Society, Lanzhou, China, August 23-24, pp. 219-224.
[163]
Zheng, L., Jiang, Y., Yang, T. M., and Pardo, T. A. 2008. "Sharing Information for Product Quality and Food Safety in China: Barriers and Enablers," in Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, Cairo, Egypt, December 1-4, pp. 90-97.
[164]
Zukowski, T., and Brown, I. 2007. "Examining the Influence of Demographic Factors on Internet Users' Information Privacy Concerns," in Proceedings of the 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, Port Elizabeth, South Africa, October 2-3, pp. 197-204.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image MIS Quarterly
MIS Quarterly  Volume 35, Issue 4
December 2011
437 pages

Publisher

Society for Information Management and The Management Information Systems Research Center

United States

Publication History

Published: 01 December 2011

Author Tags

  1. information privacy
  2. information privacy concerns
  3. information privacy framework
  4. level of analysis
  5. privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media