Skip to main content
Log in

How pull vs. push information delivery and social proof affect information disclosure in location based services

  • Research Paper
  • Published:
Electronic Markets Aims and scope Submit manuscript

A Correction to this article was published on 05 December 2018

This article has been updated

Abstract

With the boom of the app economy, users’ location information has become an increasingly valuable differentiator to deliver personalized products and services, yet continues to raise severe privacy concerns. While research on information privacy has paid great attention on explaining and predicting factors of information disclosure decisions, there is still a significant gap in terms of how app providers can combine different mechanisms in the design of their apps to effectuate better disclosure outcomes. Drawing on a randomized online experiment with 143 smartphone users, we analyze how pull (i.e., services with user-controlled position awareness) and push (i.e., demanding always-on access location tracking) information delivery and social proof cues separately and jointly affect users’ actual location information disclosure. The results reveal that both strategies increase actual location information disclosure via two distinct mediation paths. While pull information delivery mitigates users’ privacy concerns, social proof increases their trusting beliefs. However, when both strategies are employed together, we found that social proof overrides the effect of pull information delivery mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

  • 05 December 2018

    Table 1 was incorrectly captured.

References

  • Amblee, N., & Bui, T. (2011). Harnessing the influence of social proof in online shopping: The effect of electronic word of mouth on sales of digital microproducts. International Journal of Electronic Commerce, 16(2), 91–114.

    Article  Google Scholar 

  • Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14, 396–402.

    Article  Google Scholar 

  • Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30, 13–28.

    Article  Google Scholar 

  • Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 138–150.

    Article  Google Scholar 

  • Bansal, G., & Zahedi, F. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. ICIS 2008 Proceedings, 7.

  • Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21.

    Article  Google Scholar 

  • Barkhuus, L. (2004). Privacy in location-based services, concern vs. coolness. Paper presented at the Workshop on Location System Privacy and Control at MobileHCI.

  • Barkhuus, L., & Dey, A. K. (2003). Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Paper presented at the Interact 2003.

  • Baroudi, J. J., & Orlikowski, W. J. (1989). The problem of statistical power in MIS research. MIS Quarterly, 13, 87–106.

    Article  Google Scholar 

  • Bearden, W. O., & Rose, R. L. (1990). Attention to social comparison information: An individual difference factor affecting consumer conformity. Journal of Consumer Research, 16(4), 461–471.

    Article  Google Scholar 

  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.

    Article  Google Scholar 

  • Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11, 245–270. https://doi.org/10.1016/S0963-8687(02)00018-5.

    Article  Google Scholar 

  • Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.

    Article  Google Scholar 

  • Benlian, A. (2015). Web personalization cues and their differential effects on user assessments of website value. Journal of Management Information Systems, 32(1), 225–260.

    Article  Google Scholar 

  • Bruner, G. C., & Kumar, A. (2007). Attitude toward location-based advertising. Journal of Interactive Advertising, 7(2), 3–15.

    Article  Google Scholar 

  • Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2–3), 181–202.

    Article  Google Scholar 

  • Chen, K., & Rea, A. I. J. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems, 44(4), 85–92.

    Google Scholar 

  • Cheverst, K., & Smith, G. (2001). Exploring the notion of information push and pull with respect to the user intention and disruption. Paper presented at the International workshop on Distributed and Disappearing User Interfaces in Ubiquitous Computing.

    Google Scholar 

  • Cialdini, R. B. (2001). Harnessing the science of persuasion. Harvard Business Review, 79(9), 72–81.

    Google Scholar 

  • Cialdini, R. B. (2007). Influence: The psychology of persuasion: Collins New York.

  • Cialdini, R. B., & Garde, N. (1987). Influence (Vol. 3): A. Michel.

  • Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55, 591–621.

    Article  Google Scholar 

  • Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159.

    Article  Google Scholar 

  • Cohen, P., West, S. G., & Aiken, L. S. (2014). Applied multiple regression/correlation analysis for the behavioral sciences: Psychology Press.

  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10, 104–115. https://doi.org/10.1287/orsc.10.1.104.

    Article  Google Scholar 

  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422.

    Article  Google Scholar 

  • Duan, W., Gu, B., & Whinston, A. B. (2009). Informational cascades and software adoption on the internet: An empirical investigation. MIS Quarterly, 33, 23–48.

    Article  Google Scholar 

  • Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings, 339.

  • Elahi, S. (2009). Privacy and consent in the digital era. Information Security Technical Report, 14, 113–118. https://doi.org/10.1016/j.istr.2009.10.004.

    Article  Google Scholar 

  • eMarketer. (2016). Are Mobile users returning to apps after trying them out? In Retrieved from https://www.emarketer.com/Article/Mobile-Users-Returning-Apps-After-Trying-Them-Out/1014039. Accessed 2017-06-23

  • Faul, F., Erdfelder, E., Buchner, A., & Lang, A.-G. (2009). Statistical power analyses using G* power 3.1: Tests for correlation and regression analyses. Behavior Research Methods, 41(4), 1149–1160.

    Article  Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.

    Article  Google Scholar 

  • Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 106–119.

  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.

    Article  Google Scholar 

  • Ghosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2), 51–57.

    Article  Google Scholar 

  • Goldbach, T., Kemper, V., & Benlian, A. (2014). Mobile application quality and platform stickiness under formal vs. self-control—Evidence from an experimental study. In International conference on information systems.

    Google Scholar 

  • Grabner-Kräuter, S., & Kaluscha, E. A. (2003). Empirical research in on-line trust: A review and critical assessment. International Journal of Human-Computer Studies, 58(6), 783–812.

    Article  Google Scholar 

  • Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19–28.

    Article  Google Scholar 

  • Hayes, A. F. (2013). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. New York: Guilford Press.

    Google Scholar 

  • Ho, S. Y., Bodoff, D., & Tam, K. Y. (2011). Timing of adaptive web personalization and its effects on online consumer behavior. Information Systems Research, 22(3), 660–679.

    Article  Google Scholar 

  • Junglas, I. A., & Watson, R. T. (2008). Location-based services. Communications of the ACM, 51(3), 65–69.

    Article  Google Scholar 

  • Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402.

    Article  Google Scholar 

  • Kardes, F. R., Posavac, S. S., & Cronley, M. L. (2004). Consumer inference: A review of processes, bases, and judgment contexts. Journal of Consumer Psychology, 14(3), 230–256.

    Article  Google Scholar 

  • Kazai, G., & Milic-Frayling, N. (2008). Trust, authority and popularity in social information retrieval. Paper presented at the Proceedings of the 17th ACM conference on Information and knowledge management.

  • Kendall, J. E., & Kendall, K. E. (1999). Information delivery systems: An exploration of web pull and push technologies. Communications of the AIS, 1(4es), 1.

    Google Scholar 

  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.

    Article  Google Scholar 

  • Koch, O. F., & Benlian, A. (2015). Promotional tactics for online viral marketing campaigns: How scarcity and personalization affect seed stage referrals. Journal of Interactive Marketing, 32, 37–52.

    Article  Google Scholar 

  • Kumar, N., Scheer, L. K., & Steenkamp, J.-B. E. (1995). The effects of perceived interdependence on dealer attitudes. Journal of Marketing Research, 32, 348–356.

    Article  Google Scholar 

  • Lee, A. (2011). Social Proof Is The New Marketing. Retrieved from https://techcrunch.com/2011/11/27/social-proof-why-people-like-to-follow-the-crowd/

  • Li, T., Pavlou, P., & Santos, G. d. (2013). What drives users’ website registration? A randomized field experiment. ICIS 2013 Proceedings.

  • Liang, T.-P., Chen, H.-Y., & Turban, E. (2009). Effect of personalization on the perceived usefulness of online customer services: A dual-core theory. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce.

  • Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J. I., & Zhang, J. (2012). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, 501. doi:https://doi.org/10.1145/2370216.2370290

  • Lowry, P. B., Moody, G. D., Galletta, D. F., & Vance, A. (2013). The drivers in the use of online whistle-blowing reporting systems. Journal of Management Information Systems, 30(1), 153–190.

    Article  Google Scholar 

  • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.

    Article  Google Scholar 

  • Maier, C., Laumer, S., Weinert, C., & Weitzel, T. (2015). The effects of technostress and switching stress on discontinued use of social networking services: A study of Facebook use. Information Systems Journal, 25(3), 275–308.

    Article  Google Scholar 

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

    Article  Google Scholar 

  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.

    Article  Google Scholar 

  • McKnight, H. D., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.

    Article  Google Scholar 

  • Moe, W. W., & Fader, P. S. (2004). Dynamic conversion behavior at e-commerce sites. Management Science, 50(3), 326–335.

    Article  Google Scholar 

  • Moorman, C., Deshpandé, R., & Zaltman, G. (1993). Factors affecting trust in market research relationships. Journal of Marketing, 57(1), 81–101.

  • Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20.

  • Mulligan, B. (2014). The Right Way To Ask Users For iOS Permissions. Retrieved from https://techcrunch.com/2014/04/04/the-right-way-to-ask-users-for-ios-permissions/

  • Nowak, G. J., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Interactive Marketing, 11(4), 94–108.

    Google Scholar 

  • Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: Desperately seeking the “IT” in IT research—A call to theorizing the IT artifact. Information Systems Research, 12(2), 121–134.

    Article  Google Scholar 

  • Pan, L.-Y., & Chiou, J.-S. (2011). How much can you trust online information? Cues for perceived trustworthiness of consumer-generated online information. Journal of Interactive Marketing, 25(2), 67–74.

    Article  Google Scholar 

  • Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.

    Article  Google Scholar 

  • Phelps, J. E., D'Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17.

    Article  Google Scholar 

  • Porter, C. E., & Donthu, N. (2008). Cultivating trust and harvesting value in virtual communities. Management Science, 54(1), 113–128.

    Article  Google Scholar 

  • Rodden, T., Friday, A., Muller, H., & Dix, A. (2002). A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol 2002.

  • Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006). Converting web site visitors into buyers: How web site investment increases consumer trusting beliefs and online purchase intentions. Journal of Marketing, 70(2), 133–148.

    Article  Google Scholar 

  • Schneider, David, (2017). Rewarding prosociality on non-commercial online sharing platforms (pp. 2269–2284). In Proceedings of the 25th European Conference on Information Systems (ECIS), Guimarães, Portugal.

  • Schoenbachler, D. D., & Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2–16.

    Article  Google Scholar 

  • Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.

    Article  Google Scholar 

  • Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73.

    Article  Google Scholar 

  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167–196.

    Article  Google Scholar 

  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 989–1016.

    Article  Google Scholar 

  • Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37, 1141–1164.

    Article  Google Scholar 

  • Thies, F., Wessel, M., & Benlian, A. (2016). Effects of social interaction dynamics on platforms. Journal of Management Information Systems, 33(3), 843–873.

    Article  Google Scholar 

  • Truong, Y., & Simmons, G. (2010). Perceived intrusiveness in digital advertising: Strategic marketing implications. Journal of Strategic Marketing, 18(3), 239–256.

    Article  Google Scholar 

  • Unni, R., & Harmon, R. (2007). Perceived effectiveness of push vs. pull mobile location based advertising. Journal of Interactive Advertising, 7(2), 28–40.

    Article  Google Scholar 

  • Van Herpen, E., Pieters, R., & Zeelenberg, M. (2009). When demand accelerates demand: Trailing the bandwagon. Journal of Consumer Psychology, 19(3), 302–312.

    Article  Google Scholar 

  • Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 415–444.

    Article  Google Scholar 

  • Wang, W., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217–246.

    Article  Google Scholar 

  • Wang, W., & Benbasat, I. (2016). Empirical assessment of alternative designs for enhancing different types of trusting beliefs in online recommendation agents. Journal of Management Information Systems, 33(3), 744–775.

    Article  Google Scholar 

  • Wang, N., Zhang, B., Liu, B., & Jin, H. (2015). Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions. Paper presented at the Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services.

  • Worchel, S., Lee, J., & Adewole, A. (1975). Effects of supply and demand on ratings of object value. Journal of Personality and Social Psychology, 32(5), 906–914.

    Article  Google Scholar 

  • Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. ICIS 2007 proceedings, 125.

  • Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electronic Markets, 19(2–3), 137–149.

    Article  Google Scholar 

  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's privacy concerns: Toward an integrative view (pp. 6). Proceedings of 29th International Conference on Information Systems, Paris.

  • Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26, 135–174.

    Article  Google Scholar 

  • Yun, H., Lee, G., & Kim, D. J. (2014). A meta-analytic review of empirical research on online information privacy concerns : Antecedents , Outcomes , and Moderators. Proceedings of the ICIS (2014), pp. 1–13.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Johannes Klumpe.

Additional information

Responsible Editor: Maria Madlberger

The original version of this article was revised. Table 1 is corrected.

Appendix

Appendix

Table 3 Measurement items
Table 4 Descriptive statistics, internal consistency, discriminant validity, and construct correlations

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Klumpe, J., Koch, O.F. & Benlian, A. How pull vs. push information delivery and social proof affect information disclosure in location based services. Electron Markets 30, 569–586 (2020). https://doi.org/10.1007/s12525-018-0318-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12525-018-0318-1

Keywords

JEL classification

Navigation