Abstract
With the boom of the app economy, users’ location information has become an increasingly valuable differentiator to deliver personalized products and services, yet continues to raise severe privacy concerns. While research on information privacy has paid great attention on explaining and predicting factors of information disclosure decisions, there is still a significant gap in terms of how app providers can combine different mechanisms in the design of their apps to effectuate better disclosure outcomes. Drawing on a randomized online experiment with 143 smartphone users, we analyze how pull (i.e., services with user-controlled position awareness) and push (i.e., demanding always-on access location tracking) information delivery and social proof cues separately and jointly affect users’ actual location information disclosure. The results reveal that both strategies increase actual location information disclosure via two distinct mediation paths. While pull information delivery mitigates users’ privacy concerns, social proof increases their trusting beliefs. However, when both strategies are employed together, we found that social proof overrides the effect of pull information delivery mechanisms.
Similar content being viewed by others
Change history
05 December 2018
Table 1 was incorrectly captured.
References
Amblee, N., & Bui, T. (2011). Harnessing the influence of social proof in online shopping: The effect of electronic word of mouth on sales of digital microproducts. International Journal of Electronic Commerce, 16(2), 91–114.
Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14, 396–402.
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30, 13–28.
Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 138–150.
Bansal, G., & Zahedi, F. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. ICIS 2008 Proceedings, 7.
Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21.
Barkhuus, L. (2004). Privacy in location-based services, concern vs. coolness. Paper presented at the Workshop on Location System Privacy and Control at MobileHCI.
Barkhuus, L., & Dey, A. K. (2003). Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Paper presented at the Interact 2003.
Baroudi, J. J., & Orlikowski, W. J. (1989). The problem of statistical power in MIS research. MIS Quarterly, 13, 87–106.
Bearden, W. O., & Rose, R. L. (1990). Attention to social comparison information: An individual difference factor affecting consumer conformity. Journal of Consumer Research, 16(4), 461–471.
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35, 1017–1042.
Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11, 245–270. https://doi.org/10.1016/S0963-8687(02)00018-5.
Beldad, A., De Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.
Benlian, A. (2015). Web personalization cues and their differential effects on user assessments of website value. Journal of Management Information Systems, 32(1), 225–260.
Bruner, G. C., & Kumar, A. (2007). Attitude toward location-based advertising. Journal of Interactive Advertising, 7(2), 3–15.
Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2–3), 181–202.
Chen, K., & Rea, A. I. J. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems, 44(4), 85–92.
Cheverst, K., & Smith, G. (2001). Exploring the notion of information push and pull with respect to the user intention and disruption. Paper presented at the International workshop on Distributed and Disappearing User Interfaces in Ubiquitous Computing.
Cialdini, R. B. (2001). Harnessing the science of persuasion. Harvard Business Review, 79(9), 72–81.
Cialdini, R. B. (2007). Influence: The psychology of persuasion: Collins New York.
Cialdini, R. B., & Garde, N. (1987). Influence (Vol. 3): A. Michel.
Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55, 591–621.
Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159.
Cohen, P., West, S. G., & Aiken, L. S. (2014). Applied multiple regression/correlation analysis for the behavioral sciences: Psychology Press.
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10, 104–115. https://doi.org/10.1287/orsc.10.1.104.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422.
Duan, W., Gu, B., & Whinston, A. B. (2009). Informational cascades and software adoption on the internet: An empirical investigation. MIS Quarterly, 33, 23–48.
Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings, 339.
Elahi, S. (2009). Privacy and consent in the digital era. Information Security Technical Report, 14, 113–118. https://doi.org/10.1016/j.istr.2009.10.004.
eMarketer. (2016). Are Mobile users returning to apps after trying them out? In Retrieved from https://www.emarketer.com/Article/Mobile-Users-Returning-Apps-After-Trying-Them-Out/1014039. Accessed 2017-06-23
Faul, F., Erdfelder, E., Buchner, A., & Lang, A.-G. (2009). Statistical power analyses using G* power 3.1: Tests for correlation and regression analyses. Behavior Research Methods, 41(4), 1149–1160.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.
Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 106–119.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.
Ghosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2), 51–57.
Goldbach, T., Kemper, V., & Benlian, A. (2014). Mobile application quality and platform stickiness under formal vs. self-control—Evidence from an experimental study. In International conference on information systems.
Grabner-Kräuter, S., & Kaluscha, E. A. (2003). Empirical research in on-line trust: A review and critical assessment. International Journal of Human-Computer Studies, 58(6), 783–812.
Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19–28.
Hayes, A. F. (2013). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. New York: Guilford Press.
Ho, S. Y., Bodoff, D., & Tam, K. Y. (2011). Timing of adaptive web personalization and its effects on online consumer behavior. Information Systems Research, 22(3), 660–679.
Junglas, I. A., & Watson, R. T. (2008). Location-based services. Communications of the ACM, 51(3), 65–69.
Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402.
Kardes, F. R., Posavac, S. S., & Cronley, M. L. (2004). Consumer inference: A review of processes, bases, and judgment contexts. Journal of Consumer Psychology, 14(3), 230–256.
Kazai, G., & Milic-Frayling, N. (2008). Trust, authority and popularity in social information retrieval. Paper presented at the Proceedings of the 17th ACM conference on Information and knowledge management.
Kendall, J. E., & Kendall, K. E. (1999). Information delivery systems: An exploration of web pull and push technologies. Communications of the AIS, 1(4es), 1.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.
Koch, O. F., & Benlian, A. (2015). Promotional tactics for online viral marketing campaigns: How scarcity and personalization affect seed stage referrals. Journal of Interactive Marketing, 32, 37–52.
Kumar, N., Scheer, L. K., & Steenkamp, J.-B. E. (1995). The effects of perceived interdependence on dealer attitudes. Journal of Marketing Research, 32, 348–356.
Lee, A. (2011). Social Proof Is The New Marketing. Retrieved from https://techcrunch.com/2011/11/27/social-proof-why-people-like-to-follow-the-crowd/
Li, T., Pavlou, P., & Santos, G. d. (2013). What drives users’ website registration? A randomized field experiment. ICIS 2013 Proceedings.
Liang, T.-P., Chen, H.-Y., & Turban, E. (2009). Effect of personalization on the perceived usefulness of online customer services: A dual-core theory. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce.
Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J. I., & Zhang, J. (2012). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, 501. doi:https://doi.org/10.1145/2370216.2370290
Lowry, P. B., Moody, G. D., Galletta, D. F., & Vance, A. (2013). The drivers in the use of online whistle-blowing reporting systems. Journal of Management Information Systems, 30(1), 153–190.
MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.
Maier, C., Laumer, S., Weinert, C., & Weitzel, T. (2015). The effects of technostress and switching stress on discontinued use of social networking services: A study of Facebook use. Information Systems Journal, 25(3), 275–308.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.
McKnight, H. D., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.
Moe, W. W., & Fader, P. S. (2004). Dynamic conversion behavior at e-commerce sites. Management Science, 50(3), 326–335.
Moorman, C., Deshpandé, R., & Zaltman, G. (1993). Factors affecting trust in market research relationships. Journal of Marketing, 57(1), 81–101.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of Marketing, 58(3), 20.
Mulligan, B. (2014). The Right Way To Ask Users For iOS Permissions. Retrieved from https://techcrunch.com/2014/04/04/the-right-way-to-ask-users-for-ios-permissions/
Nowak, G. J., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters. Journal of Interactive Marketing, 11(4), 94–108.
Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: Desperately seeking the “IT” in IT research—A call to theorizing the IT artifact. Information Systems Research, 12(2), 121–134.
Pan, L.-Y., & Chiou, J.-S. (2011). How much can you trust online information? Cues for perceived trustworthiness of consumer-generated online information. Journal of Interactive Marketing, 25(2), 67–74.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 101–134.
Phelps, J. E., D'Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17.
Porter, C. E., & Donthu, N. (2008). Cultivating trust and harvesting value in virtual communities. Management Science, 54(1), 113–128.
Rodden, T., Friday, A., Muller, H., & Dix, A. (2002). A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol 2002.
Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006). Converting web site visitors into buyers: How web site investment increases consumer trusting beliefs and online purchase intentions. Journal of Marketing, 70(2), 133–148.
Schneider, David, (2017). Rewarding prosociality on non-commercial online sharing platforms (pp. 2269–2284). In Proceedings of the 25th European Conference on Information Systems (ECIS), Guimarães, Portugal.
Schoenbachler, D. D., & Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2–16.
Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.
Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167–196.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 989–1016.
Sutanto, J., Palme, E., Tan, C.-H., & Phang, C. W. (2013). Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37, 1141–1164.
Thies, F., Wessel, M., & Benlian, A. (2016). Effects of social interaction dynamics on platforms. Journal of Management Information Systems, 33(3), 843–873.
Truong, Y., & Simmons, G. (2010). Perceived intrusiveness in digital advertising: Strategic marketing implications. Journal of Strategic Marketing, 18(3), 239–256.
Unni, R., & Harmon, R. (2007). Perceived effectiveness of push vs. pull mobile location based advertising. Journal of Interactive Advertising, 7(2), 28–40.
Van Herpen, E., Pieters, R., & Zeelenberg, M. (2009). When demand accelerates demand: Trailing the bandwagon. Journal of Consumer Psychology, 19(3), 302–312.
Van Slyke, C., Shim, J. T., Johnson, R., & Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(1), 415–444.
Wang, W., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217–246.
Wang, W., & Benbasat, I. (2016). Empirical assessment of alternative designs for enhancing different types of trusting beliefs in online recommendation agents. Journal of Management Information Systems, 33(3), 744–775.
Wang, N., Zhang, B., Liu, B., & Jin, H. (2015). Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions. Paper presented at the Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services.
Worchel, S., Lee, J., & Adewole, A. (1975). Effects of supply and demand on ratings of object value. Journal of Personality and Social Psychology, 32(5), 906–914.
Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. ICIS 2007 proceedings, 125.
Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electronic Markets, 19(2–3), 137–149.
Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's privacy concerns: Toward an integrative view (pp. 6). Proceedings of 29th International Conference on Information Systems, Paris.
Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26, 135–174.
Yun, H., Lee, G., & Kim, D. J. (2014). A meta-analytic review of empirical research on online information privacy concerns : Antecedents , Outcomes , and Moderators. Proceedings of the ICIS (2014), pp. 1–13.
Author information
Authors and Affiliations
Corresponding author
Additional information
Responsible Editor: Maria Madlberger
The original version of this article was revised. Table 1 is corrected.
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Klumpe, J., Koch, O.F. & Benlian, A. How pull vs. push information delivery and social proof affect information disclosure in location based services. Electron Markets 30, 569–586 (2020). https://doi.org/10.1007/s12525-018-0318-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12525-018-0318-1
Keywords
- Location based services
- Pull information delivery
- Social proof
- Location disclosure
- Privacy concerns
- Trust