Advertisement

How pull vs. push information delivery and social proof affect information disclosure in location based services

  • Johannes Klumpe
  • Oliver Francis Koch
  • Alexander Benlian
Research Paper

Abstract

With the boom of the app economy, users’ location information has become an increasingly valuable differentiator to deliver personalized products and services, yet continues to raise severe privacy concerns. While research on information privacy has paid great attention on explaining and predicting factors of information disclosure decisions, there is still a significant gap in terms of how app providers can combine different mechanisms in the design of their apps to effectuate better disclosure outcomes. Drawing on a randomized online experiment with 143 smartphone users, we analyze how pull (i.e., services with user-controlled position awareness) and push (i.e., demanding always-on access location tracking) information delivery and social proof cues separately and jointly affect users’ actual location information disclosure. The results reveal that both strategies increase actual location information disclosure via two distinct mediation paths. While pull information delivery mitigates users’ privacy concerns, social proof increases their trusting beliefs. However, when both strategies are employed together, we found that social proof overrides the effect of pull information delivery mechanisms.

Keywords

Location based services Pull information delivery Social proof Location disclosure Privacy concerns Trust 

JEL classification

L86 Information and Internet Services Computer Software C91 Laboratory, Individual Behavior D81 Criteria for Decision-Making under Risk and Uncertainty 

References

  1. Amblee, N., & Bui, T. (2011). Harnessing the influence of social proof in online shopping: The effect of electronic word of mouth on sales of digital microproducts. International Journal of Electronic Commerce, 16(2), 91–114.Google Scholar
  2. Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14, 396–402.Google Scholar
  3. Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30, 13–28.Google Scholar
  4. Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 138–150.Google Scholar
  5. Bansal, G., & Zahedi, F. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. ICIS 2008 Proceedings, 7.Google Scholar
  6. Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21.Google Scholar
  7. Barkhuus, L. (2004). Privacy in location-based services, concern vs. coolness. Paper presented at the Workshop on Location System Privacy and Control at MobileHCI.Google Scholar
  8. Barkhuus, L., & Dey, A. K. (2003). Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Paper presented at the Interact 2003.Google Scholar
  9. Baroudi, J. J., & Orlikowski, W. J. (1989). The problem of statistical power in MIS research. MIS Quarterly, 13, 87–106.Google Scholar
  10. Bearden, W. O., & Rose, R. L. (1990). Attention to social comparison information: An individual difference factor affecting consumer conformity. Journal of Consumer Research, 16(4), 461–471.Google Scholar
  11. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.Google Scholar
  12. Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11, 245–270.  https://doi.org/10.1016/S0963-8687(02)00018-5.Google Scholar
  13. Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.Google Scholar
  14. Benlian, A. (2015). Web personalization cues and their differential effects on user assessments of website value. Journal of Management Information Systems, 32(1), 225–260.Google Scholar
  15. Bruner, G. C., & Kumar, A. (2007). Attitude toward location-based advertising. Journal of Interactive Advertising, 7(2), 3–15.Google Scholar
  16. Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2–3), 181–202.Google Scholar
  17. Chen, K., & Rea, A. I. J. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems, 44(4), 85–92.Google Scholar
  18. Cheverst, K., & Smith, G. (2001). Exploring the notion of information push and pull with respect to the user intention and disruption. Paper presented at the International workshop on Distributed and Disappearing User Interfaces in Ubiquitous Computing.Google Scholar
  19. Cialdini, R. B. (2001). Harnessing the science of persuasion. Harvard Business Review, 79(9), 72–81.Google Scholar
  20. Cialdini, R. B. (2007). Influence: The psychology of persuasion: Collins New York.Google Scholar
  21. Cialdini, R. B., & Garde, N. (1987). Influence (Vol. 3): A. Michel.Google Scholar
  22. Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55, 591–621.Google Scholar
  23. Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159.Google Scholar
  24. Cohen, P., West, S. G., & Aiken, L. S. (2014). Applied multiple regression/correlation analysis for the behavioral sciences: Psychology Press.Google Scholar
  25. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10, 104–115.  https://doi.org/10.1287/orsc.10.1.104.Google Scholar
  26. Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422.Google Scholar
  27. Duan, W., Gu, B., & Whinston, A. B. (2009). Informational cascades and software adoption on the internet: An empirical investigation. MIS Quarterly, 33, 23–48.Google Scholar
  28. Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings, 339.Google Scholar
  29. Elahi, S. (2009). Privacy and consent in the digital era. Information Security Technical Report, 14, 113–118.  https://doi.org/10.1016/j.istr.2009.10.004.Google Scholar
  30. eMarketer. (2016). Are Mobile users returning to apps after trying them out? In Retrieved from https://www.emarketer.com/Article/Mobile-Users-Returning-Apps-After-Trying-Them-Out/1014039. Accessed 2017-06-23
  31. Faul, F., Erdfelder, E., Buchner, A., & Lang, A.-G. (2009). Statistical power analyses using G* power 3.1: Tests for correlation and regression analyses. Behavior Research Methods, 41(4), 1149–1160.Google Scholar
  32. Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.Google Scholar
  33. Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 106–119.Google Scholar
  34. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.Google Scholar
  35. Ghosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2), 51–57.Google Scholar
  36. Goldbach, T., Kemper, V., & Benlian, A. (2014). Mobile application quality and platform stickiness under formal vs. self-control—Evidence from an experimental study. In International conference on information systems.Google Scholar
  37. Grabner-Kräuter, S., & Kaluscha, E. A. (2003). Empirical research in on-line trust: A review and critical assessment. International Journal of Human-Computer Studies, 58(6), 783–812.Google Scholar
  38. Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19–28.Google Scholar
  39. Hayes, A. F. (2013). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. New York: Guilford Press.Google Scholar
  40. Ho, S. Y., Bodoff, D., & Tam, K. Y. (2011). Timing of adaptive web personalization and its effects on online consumer behavior. Information Systems Research, 22(3), 660–679.Google Scholar
  41. Junglas, I. A., & Watson, R. T. (2008). Location-based services. Communications of the ACM, 51(3), 65–69.Google Scholar
  42. Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402.Google Scholar
  43. Kardes, F. R., Posavac, S. S., & Cronley, M. L. (2004). Consumer inference: A review of processes, bases, and judgment contexts. Journal of Consumer Psychology, 14(3), 230–256.Google Scholar
  44. Kazai, G., & Milic-Frayling, N. (2008). Trust, authority and popularity in social information retrieval. Paper presented at the Proceedings of the 17th ACM conference on Information and knowledge management.Google Scholar
  45. Kendall, J. E., & Kendall, K. E. (1999). Information delivery systems: An exploration of web pull and push technologies. Communications of the AIS, 1(4es), 1.Google Scholar
  46. Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.Google Scholar
  47. Koch, O. F., & Benlian, A. (2015). Promotional tactics for online viral marketing campaigns: How scarcity and personalization affect seed stage referrals. Journal of Interactive Marketing, 32, 37–52.Google Scholar
  48. Kumar, N., Scheer, L. K., & Steenkamp, J.-B. E. (1995). The effects of perceived interdependence on dealer attitudes. Journal of Marketing Research, 32, 348–356.Google Scholar
  49. Lee, A. (2011). Social Proof Is The New Marketing. Retrieved from https://techcrunch.com/2011/11/27/social-proof-why-people-like-to-follow-the-crowd/
  50. Li, T., Pavlou, P., & Santos, G. d. (2013). What drives users’ website registration? A randomized field experiment. ICIS 2013 Proceedings.Google Scholar
  51. Liang, T.-P., Chen, H.-Y., & Turban, E. (2009). Effect of personalization on the perceived usefulness of online customer services: A dual-core theory. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce.Google Scholar
  52. Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J. I., & Zhang, J. (2012). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, 501. doi: https://doi.org/10.1145/2370216.2370290
  53. Lowry, P. B., Moody, G. D., Galletta, D. F., & Vance, A. (2013). The drivers in the use of online whistle-blowing reporting systems. Journal of Management Information Systems, 30(1), 153–190.Google Scholar
  54. MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.Google Scholar
  55. Maier, C., Laumer, S., Weinert, C., & Weitzel, T. (2015). The effects of technostress and switching stress on discontinued use of social networking services: A study of Facebook use. Information Systems Journal, 25(3), 275–308.Google Scholar
  56. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.Google Scholar
  57. Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.Google Scholar
  58. McKnight, H. D., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.Google Scholar
  59. Moe, W. W., & Fader, P. S. (2004). Dynamic conversion behavior at e-commerce sites. Management Science, 50(3), 326–335.Google Scholar
  60. Moorman, C., Deshpandé, R., & Zaltman, G. (1993). Factors affecting trust in market research relationships. Journal of Marketing, 57(1), 81–101.Google Scholar
  61. Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20.Google Scholar
  62. Mulligan, B. (2014). The Right Way To Ask Users For iOS Permissions. Retrieved from https://techcrunch.com/2014/04/04/the-right-way-to-ask-users-for-ios-permissions/
  63. Nowak, G. J., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Interactive Marketing, 11(4), 94–108.Google Scholar
  64. Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: Desperately seeking the “IT” in IT research—A call to theorizing the IT artifact. Information Systems Research, 12(2), 121–134.Google Scholar
  65. Pan, L.-Y., & Chiou, J.-S. (2011). How much can you trust online information? Cues for perceived trustworthiness of consumer-generated online information. Journal of Interactive Marketing, 25(2), 67–74.Google Scholar
  66. Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.Google Scholar
  67. Phelps, J. E., D'Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17.Google Scholar
  68. Porter, C. E., & Donthu, N. (2008). Cultivating trust and harvesting value in virtual communities. Management Science, 54(1), 113–128.Google Scholar
  69. Rodden, T., Friday, A., Muller, H., & Dix, A. (2002). A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol 2002.Google Scholar
  70. Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006). Converting web site visitors into buyers: How web site investment increases consumer trusting beliefs and online purchase intentions. Journal of Marketing, 70(2), 133–148.Google Scholar
  71. Schneider, David, (2017). Rewarding prosociality on non-commercial online sharing platforms (pp. 2269–2284). In Proceedings of the 25th European Conference on Information Systems (ECIS), Guimarães, Portugal.Google Scholar
  72. Schoenbachler, D. D., & Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2–16.Google Scholar
  73. Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.Google Scholar
  74. Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73.Google Scholar
  75. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167–196.Google Scholar
  76. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 989–1016.Google Scholar
  77. Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37, 1141–1164.Google Scholar
  78. Thies, F., Wessel, M., & Benlian, A. (2016). Effects of social interaction dynamics on platforms. Journal of Management Information Systems, 33(3), 843–873.Google Scholar
  79. Truong, Y., & Simmons, G. (2010). Perceived intrusiveness in digital advertising: Strategic marketing implications. Journal of Strategic Marketing, 18(3), 239–256.Google Scholar
  80. Unni, R., & Harmon, R. (2007). Perceived effectiveness of push vs. pull mobile location based advertising. Journal of Interactive Advertising, 7(2), 28–40.Google Scholar
  81. Van Herpen, E., Pieters, R., & Zeelenberg, M. (2009). When demand accelerates demand: Trailing the bandwagon. Journal of Consumer Psychology, 19(3), 302–312.Google Scholar
  82. Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 415–444.Google Scholar
  83. Wang, W., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217–246.Google Scholar
  84. Wang, W., & Benbasat, I. (2016). Empirical assessment of alternative designs for enhancing different types of trusting beliefs in online recommendation agents. Journal of Management Information Systems, 33(3), 744–775.Google Scholar
  85. Wang, N., Zhang, B., Liu, B., & Jin, H. (2015). Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions. Paper presented at the Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services.Google Scholar
  86. Worchel, S., Lee, J., & Adewole, A. (1975). Effects of supply and demand on ratings of object value. Journal of Personality and Social Psychology, 32(5), 906–914.Google Scholar
  87. Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. ICIS 2007 proceedings, 125.Google Scholar
  88. Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electronic Markets, 19(2–3), 137–149.Google Scholar
  89. Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's privacy concerns: Toward an integrative view (pp. 6). Proceedings of 29th International Conference on Information Systems, Paris.Google Scholar
  90. Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26, 135–174.Google Scholar
  91. Yun, H., Lee, G., & Kim, D. J. (2014). A meta-analytic review of empirical research on online information privacy concerns : Antecedents , Outcomes , and Moderators. Proceedings of the ICIS (2014), pp. 1–13.Google Scholar

Copyright information

© Institute of Applied Informatics at University of Leipzig 2018
corrected publication 2018

Authors and Affiliations

  1. 1.Department of Business, Economics and LawTechnische Universität DarmstadtDarmstadtGermany

Personalised recommendations