Skip to main content
Log in

Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts

  • Research Article
  • Published:
European Journal of Information Systems

Abstract

Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

References

  • Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, p 21, ACM Press, New York.

    Chapter  Google Scholar 

  • Acquisti A and Gross R (2006) Imagined communities: awareness information sharing and privacy on the facebook. In Proceedings of the 6th Privacy Enhancing Technologies Symposium, p 36, Cambridge, United Kingdom.

    Chapter  Google Scholar 

  • Agarwal R and Karahanna E (2000) Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage. MIS Quarterly 24 (4), 665–694.

    Article  Google Scholar 

  • Akers R (2001) Criminological Theories: Introduction, Evaluations, and Application. Roxbury, Los Angeles, CA.

    Google Scholar 

  • Altman I (1974) Privacy: a conceptual analysis. In Man-Environment Interactions: Evaluations and Applications: Part 2 (Carson DH, Ed.), pp 3–28, Washington DC, Environmental Design Research Association.

    Google Scholar 

  • Altman I (1975) The Environment and Social Behavior: Privacy Personal Space Territory and Crowding. Brooks/Cole Pub. Co., Monterey, CA.

    Google Scholar 

  • Armstrong JS and Overton TS (1977) Estimating non-response bias in mail surveys. Journal of Marketing Research 14 (3), 396–402.

    Article  Google Scholar 

  • Awad NF and Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30 (1), 13–28.

    Google Scholar 

  • Bansal G, Zahedi F and Gefen D (2008) The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. In Proceedings of 29th Annual International Conference on Information Systems (ICIS 2008). Paris, France.

    Google Scholar 

  • Bansal G, Zahedi FM and Gefen D (2010) The impact of personal dispositions on information sensitivity privacy concern and trust in disclosing health information online. Decision Support Systems 49 (2), 138–150.

    Article  Google Scholar 

  • Baron RM and Kenny DA (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations. Journal of Personality and Social Psychology 51, 1173–1182.

    Article  Google Scholar 

  • Belanger F, Hiller JS and Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy security and site attributes. Journal of Strategic Information Systems 11 (3–4), 245–270.

    Article  Google Scholar 

  • Bellman S, Johnson EJ, Kobrin SJ and Lohse GL (2004) International differences in information privacy concerns: a global survey of consumers. Information Society 20 (5), 313–324.

    Article  Google Scholar 

  • Bennett CJ (1992) Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Cornell University Press, Ithaca, NY.

    Google Scholar 

  • Bok S (1989) Secrets: On the Ethics of Concealment and Revelation. Random House Digital, Inc., New York.

    Google Scholar 

  • Brin D (1998) The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? Perseus Books Group, Reading, MA.

    Google Scholar 

  • Burton-Jones A (2009) Minimizing method bias through programmatic research. MIS Quarterly 33 (3), 445–471.

    Google Scholar 

  • Burton-Jones A and Straub D (2006) Reconceptualizing system usage: An approach and empirical test. Information Systems Research 17 (3), 220–246.

    Article  Google Scholar 

  • Camp LJ (1999) Web security and privacy: an American perspective. Information Society 15 (4), 249–256.

    Article  Google Scholar 

  • Campbell DT and Fiske DW (1959) Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin 56 (2), 81–105.

    Article  Google Scholar 

  • Cate FH (1997) Privacy in the Information Age. Brookings Institution Press, Washington DC.

    Google Scholar 

  • Chellappa RK (2001a) The role of perceived privacy and perceived security in the development of trust in electronic commerce transactions. PhD Thesis, University of South California, Los Angeles, CA.

  • Chellappa RK (2001b) Contrasting expert assessment of privacy with perceived privacy: implications for public policy. In Proceedings of the National Conference on Digital Government Research, p 147, Redondo Beach, CA.

    Google Scholar 

  • Chellappa RK (2008) Consumers’ trust in electronic commerce transactions: the role of perceived privacy and perceived security. Working paper. [WWW document] http://www.bus.emory.edu/ram/Papers/sec-priv.pdf (accessed 6 March 2012).

  • Chin WW (1998) The partial least squares approach to structural equation modeling. In Modern Methods for Business Research (Marcoulides GA, Ed.) Mahwah, NJ, Lawrence Erlbaum Associates. pp 295–336.

    Google Scholar 

  • Clarke R (1988) Information technology and dataveillance. Communications of the ACM 31 (5), 498–512.

    Article  Google Scholar 

  • Cote S (2002) Introduction in Criminological Theories – Bridging the Past to the Future. Sage Publications, Thousand Oaks, CA.

    Google Scholar 

  • Cramer KM and Barry JE (1999) Psychometric properties and confirmatory factor analysis of the self-concealment scale. Personality and Individual Differences 27 (4), 629–637.

    Article  Google Scholar 

  • Culnan MJ (1993) ‘How did they get my name’? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 (3), 341–363.

    Article  Google Scholar 

  • Culnan MJ and Armstrong PK (1999) Information privacy concerns procedural fairness and impersonal trust: an empirical investigation. Organization Science 10 (1), 104–115.

    Article  Google Scholar 

  • Culnan MJ and Bies RJ (2003) Consumer privacy: balancing economic and justice considerations. Journal of Social Issues 59 (2), 323–342.

    Article  Google Scholar 

  • Dennis A and Valacich J (2001) Conducting research in information systems. Communications of the AIS 7 (5), 1–41.

    Google Scholar 

  • Dhillon GS and Moores T (2001) Internet privacy: interpreting key issues. Information Resources Management Journal 14 (4), 33.

    Article  Google Scholar 

  • Di Pietro R and Mancini LV (2003) Security and privacy issues of handheld and wearable wireless devices. Communications of the ACM 46 (9), 74–79.

    Article  Google Scholar 

  • Dinev T and Hart P (2004) Internet privacy concerns and their antecedents – measurement validity and a regression model. Behavior and Information Technology 23 (6), 413–423.

    Article  Google Scholar 

  • Dinev T and Hart P (2005) Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce 10 (2), 7–29.

    Article  Google Scholar 

  • Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17 (1), 61–80.

    Article  Google Scholar 

  • Dinev T and Hart P (2007) Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use. E-Service Journal 4 (3), 25–61.

    Article  Google Scholar 

  • Dinev T, Bellotto M, Hart P, Russo V, Serra I and Colautti C (2006) Privacy calculus model in e-commerce – a study of Italy and the United States. European Journal of Information Systems 15 (4), 389–402.

    Article  Google Scholar 

  • Dinev T, Hart P and Mullen MR (2008) Internet privacy concerns and beliefs about government surveillance – an empirical investigation. Journal of Strategic Information Systems 17 (3), 214–233.

    Article  Google Scholar 

  • Dowling G and Staelin RA (1994) Model of perceived risk and intended risk-handling activity. Journal of Consumer Research 21 (1), 119–134.

    Article  Google Scholar 

  • Earp JB and Payton FC (2006) Information privacy in the service sector: an exploratory study of health care and banking professionals. Journal of Organizational Computing and Electronic Commerce 16 (2), 105–122.

    Article  Google Scholar 

  • eMarketer (2007) User-generated content: will web 2.0 pay its way? [WWW document] http://www.emarketer.com/Products/Explore/ReportList.aspx?dsNav=Rpp:25,Nrc:id-1047,N:879,Nr:Type%3AReport (accessed 6 March 2012).

  • Etzioni A (1999) The Limits of Privacy. Basic Books, New York.

    Google Scholar 

  • Featherman M, Wright RT, Thatcher JB, Zimmer J and Pak R (2011) The Influence of interactivity on e-service offerings: an empirical examination of benefits and risks. AIS Transactions on Human-Computer Interaction 3 (1), 1–25.

    Google Scholar 

  • Featherman MS and Pavlou PA (2003) Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies 59 (4), 451–474.

    Article  Google Scholar 

  • Festinger LA (1957) Theory of Cognitive Dissonance. Stanford University Press, Stanford, CA.

    Google Scholar 

  • Flaherty DH (1979) Privacy and Government Data Banks: An International Perspective. Mansell, London.

    Google Scholar 

  • Frye NE and Dornischa MM (2010) When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure. Computers in Human Behavior 26 (5), 1120–1127.

    Article  Google Scholar 

  • Fusilier MR and Hoyer WD (1980) Variables affecting perceptions of invasion of privacy in a personnel selection situation. Journal of Applied Psychology 65 (5), 623–626.

    Article  Google Scholar 

  • Gefen D, Rigdon E and Straub DW (2011) An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly 35 (2), iii–xiv.

    Google Scholar 

  • Gefen D, Straub DW and Boudreau MC (2000) Structural equation modeling and regression: guidelines for research practice. Communications of AIS 4 (1), 1–78.

    Google Scholar 

  • Gillmor D (2007) The read-write web: technology that makes we the media possible. [WWW document] http://www.authorama.com/we-the-media-3.html (accessed 6 March 2012).

  • Goodwin C (1991) Privacy: recognition of a consumer right. Journal of Public Policy and Marketing 10 (1), 149–166.

    Google Scholar 

  • Gross R and Acquisti A (2005) Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. Alexandria, VA.

    Google Scholar 

  • Hoadley CM, Xu H, Lee JJ and Rosson MB (2010) Privacy as information access and illusory control: the case of the facebook news feed privacy outcry. Electronic Commerce Research and Applications 9 (1), 50–60.

    Article  Google Scholar 

  • Hui K-L, Teo H-H and Lee TSY (2007) The value of privacy assurance: an exploratory field experiment. MIS Quarterly 31 (1), 19–33.

    Google Scholar 

  • Jiang Z and Benbasat I (2007a) Investigating the influence of the functional mechanisms of online product presentations. Information Systems Research 18 (4), 454–470.

    Article  Google Scholar 

  • Jiang Z and Benbasat I (2007b) The effects of presentation methods and task complexity on online consumers’ product understanding. MIS Quarterly 31 (3), 475–500.

    Google Scholar 

  • Kelvin P (1973) A social-psychological examination of privacy. British Journal of Social Clinical Psychology 12 (2), 248–261.

    Article  Google Scholar 

  • Klopfer PH and Rubenstein DI (1977) The concept privacy and its biological basis. Journal of Social Issues 33 (3), 52–65.

    Article  Google Scholar 

  • Kobsa A and Schreck J (2003) Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology 3 (2), 149–183.

    Article  Google Scholar 

  • Komiak XS and Benbasat I (2006) The effects of personalization and familiarity on trust in and adoption of recommendation agents. MIS Quarterly 30 (4), 941–960.

    Google Scholar 

  • Krasnova H, Spiekermann S, Koroleva K and Hildebrand T (2009) Online social networks: why we disclose. Journal of Information Technology 25 (2), 109–125.

    Article  Google Scholar 

  • Laufer RS and WOLFE M (1977) Privacy as a concept and a social issue – multidimensional developmental theory. Journal of Social Issues 33 (3), 22–42.

    Article  Google Scholar 

  • Li H, Sarathy R and Xu H (2011) The role of affect and cognition on online consumers’ willingness to disclose personal information. Decision Support Systems 51 (3), 434–445.

    Article  Google Scholar 

  • Lindell MK and Whitney DJ (2001) Accounting for common method variance in cross-sectional research designs. Journal of Applied Psychology 86 (1), 114–121.

    Article  Google Scholar 

  • Liu C, Marchewka JT, Lu J and Yu CS (2005) Beyond concern – a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42 (2), 289–304.

    Article  Google Scholar 

  • Luo X, Li H, Zhang J and Shim JP (2010) Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems 49 (2), 222–234.

    Article  Google Scholar 

  • Madden M, Fox S, Smith A and Vitak J (2007) Digital footprints: online identity management and search in the age of transparency. PEW Internet & American Life Project. [WWW document] http://pewresearch.org/pubs/663/digital-footprints (accessed 6 March 2012).

  • Malhotra NK, Kim SS and Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct the scale and a causal model. Information Systems Research 15 (4), 336–355.

    Article  Google Scholar 

  • Malhotra NK, Kim SS and Patil A (2006) Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science 52 (12), 1865–1883.

    Article  Google Scholar 

  • Margulis ST (1977) Conceptions of privacy: current status and next steps. Journal of Social Issues 33 (3), 5–21.

    Article  Google Scholar 

  • Margulis ST (2003a) On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues 59 (2), 411–429.

    Article  Google Scholar 

  • Margulis ST (2003b) Privacy as a social issue and behavioral concept. Journal of Social Issues 59 (2), 243–261.

    Article  Google Scholar 

  • Marshall NJ (1974) Dimensions of privacy preferences. Multivariate Behavioral Research 9 (3), 255–271.

    Article  Google Scholar 

  • Marx GT (1999) What's in a name? Some reflections on the sociology of anonymity. Information Society 15 (2), 99–112.

    Article  Google Scholar 

  • Mason RO (1986) Four ethical issues of the information age. MIS Quarterly 10 (1), 4–12.

    Article  Google Scholar 

  • McElroy JC, Hendrickson AR, Townsend AM and Demarie SM (2007) Dispositional factors in internet use: personality versus cognitive style. MIS Quarterly 31 (4), 809–820.

    Google Scholar 

  • McGrath JE (1982) Dilemmatics: the study of research choices and dilemmas. In Judgment Calls in Research (McGrath JE, Martin J and Kulka RA, Eds), pp 69–102, Sage, Beverly Hills, CA.

    Google Scholar 

  • McKnight DH, Choudhury V and Kacmar C (2002) Developing and validating trust measures for e-commerce: an integrative typology. Information Systems Research 13 (3), 334–359.

    Article  Google Scholar 

  • McLean D (1995) Privacy and Its Invasion. Praeger, Westport, CT.

    Google Scholar 

  • Metzger MJ (2004) Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication 9 (4), 114–121.

    Google Scholar 

  • Milberg SJ, Burke JS, Smith HJ and Kallman AE (1995) Values personal information privacy concerns and regulatory approaches. Communication of the ACM 38 (12), 65–74.

    Article  Google Scholar 

  • Milberg SJ, Smith HJ and Burke SJ (2000) Information privacy: corporate management and national regulation. Organization Science 11 (1), 35–57.

    Article  Google Scholar 

  • Milne GR and Boza M-E (1999) Trust and concern in consumers’ perceptions of marketing information management practices. Journal of Interactive Marketing 13 (1), 5–24.

    Article  Google Scholar 

  • Milne GR and Gordon EM (1993) Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy and Marketing 12 (2), 206–215.

    Google Scholar 

  • Moorman C, Desphande R and Zaltman G (1993) Factors affecting trust in market research relationships. Journal of Marketing 57 (1), 81–101.

    Article  Google Scholar 

  • Nissenbaum H (1999) The meaning of anonymity in an information age. The Information Society 15 (2), 141–144.

    Article  Google Scholar 

  • Nunnally JC (1978) Psychometric Theory. McGraw-Hill, New York.

    Google Scholar 

  • Pavlou PA (2002) Institution-based trust in inter organizational exchange relationships: the role of online B2B marketplaces on trust formation. Journal of Strategic Information Systems 11 (3–4), 215–243.

    Article  Google Scholar 

  • Pedersen DM (1997) Psychological Functions of Privacy. Journal of Environmental Psychology 17 (2), 147–156.

    Article  Google Scholar 

  • Petronio SS (2002) Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY.

    Google Scholar 

  • Petter S, Straub DW and Rai A (2007) Specifying formative constructs in information systems research. MIS Quarterly 31 (4), 623–656.

    Google Scholar 

  • Pew Internet & American Life Project (2011) Demographics of internet users. [WWW document] http://www.pewinternet.org/Trend-Data/Whos-Online.aspx (accessed 6 March 2012).

  • Phelps J, Nowak G and Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing 19 (1), 27–41.

    Article  Google Scholar 

  • Podsakoff MP, Mackenzie BS, Lee JY and Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology 88 (5), 879–903.

    Article  Google Scholar 

  • Poindexter JC, Earp JB and Baumer DL (2006) An experimental economics approach toward quantifying online privacy choices. Information Systems Frontiers 8 (5), 363–374.

    Article  Google Scholar 

  • Qian H and Scott CR (2007) Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication 12 (4), 1428–1451.

    Article  Google Scholar 

  • Raab CD and Bennett CJ (1998) The distribution of privacy risks: who needs protection? Information Society 14 (4), 263–274.

    Article  Google Scholar 

  • Rensel AD, Abbas JM and Rao HR (2006) Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use. Journal of the Association for Information Systems 7 (1), 19–50.

    Google Scholar 

  • Rindfleisch TC (1997) Privacy information technology and health care. Communications of the ACM 40 (8), 92–100.

    Article  Google Scholar 

  • Ringle CM, Wende S and Will A (2005) SmartPLS, 2.0. University of Hamburg, Hamburg, Germany. [WWW document] http://www.smartpls.de (accessed 14 April 2012).

  • Rosen J (2000) The Unwanted Gaze: The Destruction of Privacy in America. Random House, New York.

    Google Scholar 

  • Rust R, Kannan PK and Peng N (2002) The customer economics of internet privacy. Journal of the Academy of Marketing Science 30 (4), 455–464.

    Article  Google Scholar 

  • Schoeman FD (Ed) (1984) Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge, UK.

    Book  Google Scholar 

  • Sheehan KB and Hoy MG (2000) Dimensions of privacy concern among online consumers. Journal of Public Policy and Marketing 19 (1), 62–73.

    Article  Google Scholar 

  • Smith HJ (1994) Managing Privacy: Information Technology and Corporate America. University of North Carolina Press, Chapel Hill, NC.

    Google Scholar 

  • Smith HJ, Dinev T and Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35 (4), 989–1015.

    Google Scholar 

  • Smith HJ, Milberg JS and Burke JS (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly 20 (2), 167–196.

    Article  Google Scholar 

  • Solove DJ (2004) The Digital Person: Technology and Privacy in the Information Age. New York University Press, New York.

    Google Scholar 

  • Solove DJA (2006) Taxonomy of privacy. University of Pennsylvania Law Review 154 (3), 477–560.

    Article  Google Scholar 

  • Son J-Y and Kim SS (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Quarterly 32 (3), 503–529.

    Google Scholar 

  • Spiekermann S (2005) Perceived control: scales for privacy in ubiquitous computing environments. In Proceedings of the 10th International Conference on User Modeling. Edinburgh, Scotland.

    Google Scholar 

  • Sternberg R (2003) Cognitive Psychology. Thomson Wadsworth, Belmont, CA.

    Google Scholar 

  • Stewart KA and Segars AH (2002) An empirical examination of the concern for information privacy instrument. Information Systems Research 13 (1), 36–49.

    Article  Google Scholar 

  • Stone EF and Stone DL (1990) Privacy in organizations: theoretical issues research findings and protection mechanisms. Research in Personnel and Human Resources Management 8 (3), 349–411.

    Google Scholar 

  • Stone EF, Gueutal GH, Gardner DG and Mcclure S A (1983) Field experiment comparing information-privacy values beliefs and attitudes across several types of organizations. Journal of Applied Psychology 68 (3), 459–468.

    Article  Google Scholar 

  • Straub DW, Boudreau M-C and Gefen D (2004) Validation guidelines for IS positivist research. Communications of AIS 13 (1), 380–427.

    Google Scholar 

  • Strite M and Karahanna E (2006) The role of espoused national cultural values in technology acceptance. MIS Quarterly 30 (3), 679–704.

    Google Scholar 

  • Swire PP (1997) Markets self-regulation and government enforcement in the protection of personal information. In Privacy and Self-Regulation in the Information Age (Daley WM and Irving L, Eds), pp 3–19, Department of Commerce, Washington DC.

    Google Scholar 

  • Tam KY and Ho SY (2006) Understanding the impact of web personalization on user information processing behavior and judgment. MIS Quarterly 30 (4), 865–890.

    Google Scholar 

  • Taylor J (1974) The role of risk in consumer behavior. Journal of Marketing 38 (2), 54–60.

    Article  Google Scholar 

  • Tefft SK (1980) Secrecy a Cross-Cultural Perspective. Human Sciences Press, New York.

    Google Scholar 

  • Teich A, Frankel MS, Kling R and Lee YC (1999) Anonymous communication policies for the Internet: results and recommendations of the AAAS conference. Information Society 15 (2), 71–77.

    Article  Google Scholar 

  • Tolchinsky PD, McCuddy M, Adams J, Ganster DC, Woodman R and Fromkin HL (1981) Employee perceptions of invasion of privacy: a field simulation experiment. Journal of Applied Psychology 66 (3), 308–313.

    Article  Google Scholar 

  • Turkle S (1995) Life on the Screen: Identity in the Age of the Internet. Simon & Schuster New York.

    Google Scholar 

  • Turkle S (2011) Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books, New York.

    Google Scholar 

  • Vidmar N and Flaherty D (1985) Concern for personal privacy in an electronic age. Journal of Communication 35 (1), 91–103.

    Article  Google Scholar 

  • Waldo J, Lin H and Millett LI (2007) Engaging Privacy and Information Technology in a Digital Age. Washington DC, National Academies Press.

    Google Scholar 

  • Warren SD and Brandeis DL (1890) The right to privacy. Harvard Law Review 4 (5), 193–220.

    Article  Google Scholar 

  • Webster J and Ahuja JS (2006) Enhancing the design of Web navigation systems: the influence of user disorientation on engagement and performance. MIS Quarterly 30 (3), 661–678.

    Google Scholar 

  • Westin AF (1967) Privacy and Freedom. Atheneum, New York.

    Google Scholar 

  • Xu H (2007) The effects of self-construal and perceived control on privacy concerns. In Proceedings of the 28th Annual International Conference on Information Systems (ICIS). Montréal, Canada.

    Google Scholar 

  • Xu H, Dinev T, Smith HJ and Hart P (2011) Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12 (12), 798–824.

    Google Scholar 

  • Xu H, Teo HH, Tan BCY and Agarwal R (2010) The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems 26 (3), 135–174.

    Article  Google Scholar 

  • Young JB (1978) Privacy. Wiley, Chichester, UK.

    Google Scholar 

  • Zwick D and Dholakia N (2004) Whose identity is it anyway? Consumer representation in the age of database marketing. Journal of Macromarketing 24 (1), 31–43.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Appendices

Appendix A

Measurement items (measured on 7-point Likert-type scale)

Perceived privacy (PRIV)

When you answer the following questions about your privacy, please think about the limited access the Web sites have to your personal information

  1. 1

    I feel I have enough privacy when I use these Web sites.

  2. 2

    I am comfortable with the amount of privacy I have.

  3. 3

    I think my online privacy is preserved when I use these Web sites.

Perceived information control (PCTL)

  1. 1

    I think I have control over what personal information is released by these Web sites.

  2. 2

    I believe I have control over how personal information is used by these Web sites.

  3. 3

    I believe I have control over what personal information is collected by these Web sites.

  4. 4

    I believe I can control my personal information provided to these Web sites.

Perceived privacy risk (RISK)

  1. 1

    In general, it would be risky to give personal information to Web sites.

  2. 2

    There would be high potential for privacy loss associated with giving personal information to Web sites.

  3. 3

    Personal information could be inappropriately used by Web sites.

  4. 4

    Providing Web sites with my personal information would involve many unexpected problems.

Anonymity (ANYT)

  1. 1

    I believe I can hide my true identity on these Web sites.

  2. 2

    I believe I can stay anonymous and do everything I want on these Web sites.

  3. 3

    I can keep my information anonymous on these Web sites.

Secrecy (SCRT)

  1. 1

    I believe, I can conceal some information from these Web sites when I want to.

  2. 2

    I feel I can falsify some of my personal information if it is asked for by these Web sites.

  3. 3

    I believe, I can refuse to give my personal information to these Web sites when I think it is too personal.

Confidentiality (CFDT)

  1. 1

    I believe my personal information provided to these Web sites remains confidential.

  2. 2

    I believe these Web sites will prevent unauthorized people from accessing my personal information in their databases.

  3. 3

    I believe my personal information is accessible only to those authorized to have access.

Information sensitivity (IS)

When visiting Web sites that collect information, many people find there is some information that they generally feel comfortable providing, some information they feel comfortable providing only under certain conditions, and some information is too personal that they never or rarely feel comfortable providing. Please indicate how much you agree with the following statements:

  1. 1

    I do not feel comfortable with the type of information these Web sites request from me.

  2. 2

    I feel that these Web sites gather highly personal information about me.

  3. 3

    The information I provide to these Web sites is very sensitive to me.

Perceived benefits of information disclosure (BEN)

  1. 1

    Revealing my personal information on these Web sites will help me obtain information/products/services I want.

  2. 2

    I need to provide my personal information so I can get exactly what I want from these Web sites.

  3. 3

    I believe that as a result of my personal information disclosure, I will benefit from a better, customized service and/or better information and products.

Importance of information transparency (TR)

Please specify the importance of …

  1. 1

    whether these Web sites will allow me to find out what information about me they keep in their databases;

  2. 2

    whether these Web sites tell me how long they will retain information they collect from me; and

  3. 3

    the purpose for which these Web sites want to collect information from me.

Regulatory expectations (LAW)

  1. 1

    I believe that the law should protect me from the misuse of my personal data by online companies.

  2. 2

    I believe that the law should govern and interpret the practice of how online companies collect, use, and protect my private information.

  3. 3

    I believe that the law should be able to address violation of the information I provided to online companies.

Appendix B

Mediation tests

To obtain further insight into the potential mediating effects of perceived information control, we conducted a post hoc analysis following Baron and Kenny's (1986) recommendations for examining the mediating effects. In a mediation relationship, there is a direct effect between an independent variable (IV) and a DV and also indirect effects between an IV and a mediator variable, and between a mediator variable and a DV. Mediation is useful when we need to explain how the IV–DV relationship can be statistically explained by the IV–Mediator–DV relationship.

Baron and Kenny's (1986) argue that mediation is demonstrated if three conditions are fulfilled: the first condition stipulates that the IV must significantly affect the proposed mediator. As shown in Regression (1) in Table B1, the relationships between the proposed mediator (perceived information control) and the three IVs were all significant. The second condition requires the IV must significantly affect the DV. As shown in Regression (2) in Table B1, anonymity (ANYT) and secrecy (SCRT) were significantly related to perceived privacy (PRIV). But confidentiality (CFDT) was not significantly related to perceived privacy (PRIV). The last condition stipulates that the relationship between the IV and the DV should be weaker or insignificant when the proposed mediator is in the regression equation than when the proposed mediator is not in the equation. The results, shown in Regression (3) in Table B1 indicated that β for anonymity (β=0.285 compared with β=0.148) and β for secrecy (β=0.257 compared with β=0.151) were lower when perceived information control (PCTL) was included in the model. Table B1 summarizes the results for testing the mediating effect of perceived information control, which indicate partial mediation except for confidentiality, transparency, and regulatory expectations, which were not mediated.

Table B1 Testing the mediating effects of perceived information control (PCTL)

Similarly, we conducted a post hoc analysis following Baron and Kenny's (1986) recommendations for examining the mediating effects of perceived risk (RISK). Table B2 summarizes the results, which indicated that RISK mediates the effects of perceived benefits of information disclosure (BEN) and information sensitivity (IS) on perceived privacy (PRIV). However, the results failed to demonstrate the mediation effect of RISK for the relationship between expectations of information transparency (TR) and perceived privacy (PRIV), as well as for the relationship between regulatory expectations (LAW) and perceived privacy (PRIV).

Table B2 Testing the mediating effects of perceived risk (RISK)

In all, Baron and Kenny mediation tests provided above did not bring a conclusive argument about the extent of the partial mediation, especially the importance of the non-hypothesized relationships between the seven leftmost exogenous variables in our model, and the DV of perceived privacy. It is not known how much more explanatory power is brought into the model if these relationships are present in our model in the first place. To further investigate the mediation effects and empirically validate our model by SEM methods rather than the simpler multiple regression techniques, we ran the fully saturated PLS model, per the recommendations by Gefen et al (2011, p. viii) who discussed the importance of the saturated model in SEM validation. Per the authors:

This is rarely done in reported PLS research but it should. It is mainly needed to compare the theoretical model, which includes only the hypothesized paths, with the saturated model, which includes all possible paths in order to verify (1) that the significant paths in the theoretical model also remain significant in the saturated model, and (2) that adding the paths via the saturated model does not significantly increase the f2, a standard measure of effect size. By convention, f2 values of 0.02, 0.15, and 0.35 are labeled small, medium, and large effects, respectively, f2 is calculated as (R2 saturated model−R2 theoretical model/(1−R2 saturated model).

Table B3 presents the results from the saturated model and the comparison with the results from the hypothesized model. One can see that both conditions are met: first, all the significant paths in our theoretical model also remain significant in the saturated model; and second, with the only exception of information sensitivity, none of the leftmost variables have direct effect to perceived privacy. This result indicates full mediation for the six of the seven leftmost variables. Adding the additional paths in the saturated model changed the R2 from 52.2 to 56.1%, giving a small effect size of 0.089. This procedure validated our theoretical model. While the significance of the direct effect of Information sensitivity to perceived privacy is relatively small, possible theoretical underpinning of the relationship should be considered in future research.

Table B3 Theoretical and saturated structural models

Finally, an additional insight about the mediation can be obtained by performing a pseudo F-test, per Burton-Jones and Straub (2006). Applying the test to our data yields a pseudo F-test of 16.198, which is not significant (16.198>0.05). This demonstrates that the saturated model did not explain significantly more R2 than did our original model.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dinev, T., Xu, H., Smith, J. et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst 22, 295–316 (2013). https://doi.org/10.1057/ejis.2012.23

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/ejis.2012.23

Keywords

Navigation