HOW DID THEY GET MY NAME - AN EXPLORATORY INVESTIGATION OF CONSUMER ATTITUDES TOWARD SECONDARY INFORMATION USE

被引:273
作者
CULNAN, MJ
机构
[1] School of Business, Georgetown University, Washington
关键词
PRIVACY; DIRECT MARKETING; CONSUMER ATTITUDES; PRIVACY; TECHNOLOGY; ISSUES;
D O I
10.2307/249775
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Strategic uses of information technology based on personal information may raise privacy concerns among consumers if these applications do not reflect a common set of values. This study addresses what differentiates consumers who object to certain uses of personal information from those who do not object. Data collected by questionnaire from young consumers are used to identify a research approach for investigating attitudes toward the secondary use of personal information for direct marketing. Secondary information use occurs when personal information collected for one purpose is subsequently used for a different purpose. While secondary information use is both widespread and legal, it may be viewed as an invasion of privacy when it occurs without the knowledge or consent of the consumer. The setting for the study is the use of point-of-sale data from a supermarket frequent shopper program to generate direct mail solicitations. Control emerges as a clear theme in differentiating individuals with positive overall attitudes toward secondary information use from those with negative attitudes. Study participants with positive attitudes are less concerned about privacy (measured as control over personal information), perceive shopping by mail as beneficial, and have coping strategies for dealing with unwanted mail. The results also suggest that theory related to categorization of strategic issues as positive-negative with outcomes that are controllable/uncontrollable provides a basis for understanding differences in the ways individuals perceive practices involving personal information. Future research should focus on the specific characteristics of secondary use practices, including the sensitivity of the information, it source), its perceived relevance to the original transaction, and whether disclosure reflects informed consent or results in a potentially harmful outcome to the individual.
引用
收藏
页码:341 / 361
页数:21
相关论文
共 61 条
  • [1] [Anonymous], MISQUARTERLY
  • [2] [Anonymous], 1973, RECORDS, COMPUTERS, AND THE RIGHTS OF CITIZENS -XXIXX
  • [3] [Anonymous], CONCERN PRIVACY INST
  • [4] [Anonymous], 1890, Harvard Law Review, DOI [10.2307/1321160, DOI 10.2307/1321160]
  • [5] [Anonymous], 1967, Privacy and Freedom
  • [6] BAKER JA, 1991, 1ST P C COMP FREED P, P42
  • [7] BATES S, 1991, WASHINGTON POST 0101, pE1
  • [8] Bennett ColinJ., 1992, Regulating Privacy: Data Protection and Public Policy in Europe and the United States
  • [9] BRUNS WJ, 1987, HARVARD BUS REV, V65, P89
  • [10] BUCHWALD A, 1992, WASHINGTON POST 0625, pC1