Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts

被引:291
作者
Dinev, Tamara [1 ]
Xu, Heng [2 ]
Smith, Jeff H. [3 ]
Hart, Paul [1 ]
机构
[1] Florida Atlantic Univ, Coll Business, Dept Informat Technol & Operat Management, Boca Raton, FL 33431 USA
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[3] Miami Univ, Farmer Sch Business, Dept Decis Sci & Management Informat Syst, Oxford, OH 45056 USA
基金
美国国家科学基金会;
关键词
privacy; anonymity; secrecy; confidentiality; control; risk; COMMON METHOD VARIANCE; E-COMMERCE; CALCULUS MODEL; PERCEIVED RISK; SOCIAL ISSUE; INTERNET; TRUST; ONLINE; PERCEPTIONS; TECHNOLOGY;
D O I
10.1057/ejis.2012.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.
引用
收藏
页码:295 / 316
页数:22
相关论文
共 139 条
[1]  
Acquisti A, 2006, LECT NOTES COMPUT SC, V4258, P36
[2]   Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage [J].
Agarwal, R ;
Karahanna, E .
MIS QUARTERLY, 2000, 24 (04) :665-694
[3]  
AKERS RL, 2001, CRIMINOLOGICAL THEOR
[4]  
Altman I., 1974, Man-environment interactions: Evaluations and applications, P3
[5]  
Altman I., 1975, The Environment and Social Behavior
[6]  
[Anonymous], 2004, P ACM ELECT COMMERCE
[7]  
[Anonymous], 2004, The digital person: Technology and privacy in the information age
[8]  
[Anonymous], 1990, Research in Personnel and Human Resources Management
[9]  
[Anonymous], 2000, Communications of the Association for Information Systems, DOI [DOI 10.17705/1CAIS.00407, 10.17705/1cais.00407]
[10]  
[Anonymous], 2005, SSRN ELECT J, DOI DOI 10.2139/SSRN.761109