Abstract
In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that information systems (IS) professionals' intentions to protect personal information privacy are influenced by their attitudes, subjective norms, perceived deindividuation, and organization-based self-esteem. It further shows that attitudes are influenced by subjective norms, which, in turn, are influenced by organization-based self-esteem.
Similar content being viewed by others
References
Ajzen, I.: 1985, 'From Intentions to Actions: A theory of Planned Behavior', in J. Kuhl and J. Bechmann (eds.), Action-Control: From Cognition to Behavior (Springer, Heidelberg), pp. 11-39.
Ajzen, I.: 1989, 'Attitude Structure and Behavior', in A. R. Pratkanis, S. J. Breckler and A.G. Greenwald (eds.), Attitude, Structure and Function (Lawrence Erlbaum Associates, Hillsdale, NJ), pp. 241-274.
Ajzen, I.: 1991, 'The Theory of Planned Behavior', Organizational Behavior and Human Decision Process 50(2), 179-211.
Ajzen, I. and M. Fishbein: 1980, Understanding Attitudes and Predicting Social Behavior (Prentice-Hall, Englewood Cliffs, NJ).
Anderson, J. C. and D. W. Gerbing: 1988, 'Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach', Psychological Bulletin 103, 411-423.
Bachman, R., R. Paternoster and S. Ward: 1992, 'The Rationality of Sexual Offending: Testing a Deterrence/Rational Choice Conception of Sexual Assault', Law & Society Review 26(2), 343-372.
Bandura, A.: 1991, 'Social Cognitive Theory of Moral Thought and Action', in W. M. Kuritines and J. L. Gewirtz (eds.), Handbook of Moral Behavior and Development, Volume 1: Theory (Lawrence Erlbaum Associates).
Banerjee, D., T. P. Cronan and T. W. Jones: 1998, 'Modeling IS Ethics: A Study in Situational Ethics', MIS Quarterly 22(1), 31-60.
Bommer, M., C. Gratto, J. Gravander and M. Tuttle: 1987, 'A Behavioral Model of Ethical and Unethical Decision Making', Journal of Business Ethics 6, 265-280.
Brown, A. D.: 1997, 'Narcissism, Identity, and Legitimacy', Academy of Management Review 22(3), 643-686.
Carmines, E. G. and J. P. McIver: 1981, 'Analyzing Models with Unobserved Variables: Analysis of Covariance Structures', in G. W. Bohrnstedt and E. F. Borgatta (eds.), Social Measurement: Current Issues (Sage, Newbury Park, CA).
Chang, M. K.: 1998, 'Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action on the Theory of Planned Behavior', Journal of Business Ethics 17(16), 1828-1834.
Chin, W. W. and P. Todd: 1995, 'On the Use, Usefulness, and Ease of Use of Structural Equation Modeling in MIS Research: A Note of Caution', MIS Quarterly 19(2), 237-246.
Culnan, M. J.: 1993, 'How Did You Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use', MIS Quarterly 17(3), 341-361.
Culnan, M. J.: 2000, 'Protecting Privacy Online: Is Self-Regulation Working', Journal of Public Policy & Marketing 19(1), 20-26.
Diener, E.: 1979, 'Deindividuation: The Absence of Self-awareness and Self-regulation in Group Members', in P. Paulus (eds.), Psychology of Group Influence (Lawrence Erlbaum, Hillsdale, NJ), pp. 209-242.
Eining, S. T. and A. L. Christensen: 1991, 'A Psycho-Social Model of Software Piracy: The Development and Test of Model,' in R. DeJoie, G. Flower and D. Paradice (eds.), Ethical Issue in Information Systems (Boyd & Fraser Publishing Company, Bosten, MA).
Felson, M.: 1994, Crime and Everyday Life: Insight and Implication for Society (Pine Forge Press, Newbury Park, CA).
Fishbein, M. and I. Ajzen: 1975, Beliefs, Attitude, Intentions and Behavior: An Introduction to theory and Research (Addition-Wesley, Boston, MA).
Fornell, C. and D. F. Larcker: 1981, 'Evaluating Structural Equation Models with Unobservable and Measurement Error', Journal of Marketing Research, 39-50.
Gardner, D. G. and J. L. Pierce: 1998, 'Self-esteem and Self-efficacy within the Organizational Context: An Empirical Examination', Group and Organization Management 23(1), 48-70.
Gerbing, D. W. and J. C. Anderson: 1993, 'Monte Carlo Evaluations of Goodness-of-fit Indices for Structural Equation Models', in K. A. Bollen and J. S. Long (eds.), Testing Structural Equation Models (Sage, Newbury Park, CA).
Gopal, R. D. and G. L. Sanders: 1998, 'International Software Piracy: Analysis of Key Issues and Impacts', Information System Research 9(4), 380-397.
Green, H.: 1997, 'A Little Privacy Please', Business Week 16, 98-102.
Hair, J. Jr., R. E. Anderson, R. L. Latham and M. C. Black: 1992, Multivariate Data Analysis: With Readings (MacMillan Publishing Company, New York).
Harrington, S.: 1996, 'The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intention', MIS Quarterly 20(3), 257-278.
Hoyle, R. H.: 1995, Structural Equation Modeling (SAGE Publications, Inc., Thousand Oaks, CA).
Joreskog, K. G. and D. Sorbom: 1993, 'Testing Structural Equation Models', in K. A. Bollen and L. S., Long (eds.), Testing Structural Equation Models (Sage Publications, Newbury Park, CA).
Kallman, E. A. and J. P. Grillo: 1996, Ethical Decision Making and Information Technology (McGraw-Hill Press).
Korman, A. M.: 1971, 'Organizational Achievement, Aggression and Creativity: Some Suggestions Toward an Integrated Theory', Organizational Behavior and Human Performance 6, 593-613.
Korman, A. K.: 1976, 'Hypothesis of Work Behavior Revisited and an Extension', Academy of Management Review 1, 50-63.
Loch, K. D. and S. Conger: 1996, 'Evaluating Ethical Decision Making and Computer Use,' Communication of the ACM 39(7), 74-83.
Milberg, S. J., S. J. Burke, H. J. Smith and E. A. Kallman: 1995, 'Values, Personal Information Privacy, and Regulatory Approached,' Communication of the ACM 38(12), 65-73.
Nunnally, J. C.: 1978, Psychometric Theory (McGraw-Hill, New York).
Oz, E.: 1992, 'Ethical Standards for Information System Professionals: A Case for a Unified Code,' MIS Quarterly 16(3), 423-433.
Paradice, D. B. and R. M. Dejoie: 1991, 'The Ethical Decision-Making Process of Information Systems Workers', Journal of Business Ethics 10, 57-77.
Pierce, J. L., D. G. Gardner, L. L. Cumming and R. B. Dunham: 1989, 'Organization-based Selfesteem: Construct Definition, Measurement, and Validation', Academy of Management Journal 32, 622-648.
Privacy and American Business: 1997, Commerce, Communication, and Privacy Online: A national Survey of Computer Users (Privacy and American Business, Hackensack, NJ).
Rainer, R., Jr. Kelly and A. Harrison: 1993, 'Toward Development of the End User Computing Construct in a University Setting', Decision Sciences Journal 24(6), 1187-1202.
Randall, D. M. and A. M. Gibson: 1991, 'Ethical Decision Making in the Medical Profession: An Application of Theory of Planned Behavior', Journal of Business Ethics 10, 111-122.
Schultz, P. D.: 1996, 'The Morally Accountable Corporation: A Postmodern Approach to Organizational Responsibility', The Journal of Business Communication 33(2), 165-183.
Sherer, M., J. E. Maddux, B. Mercadante, S. Prentice-Dunn, B. Jacobs and R. W. Rogers: 1982, 'The Self-Efficacy Scale: Construction and Validation', Psychological Reports 51, 663-671.
Simpson, P. M., D. Banerjee and C. L. Simpson: 1994, 'Softlifting: A Model of Motivating Factors,' Journal of Business Ethics 13, 431-438.
Smith, H. J.: 1994, Managing Privacy: Information Technology and Organizational America (University of North Carolina Press, Chapel Hill, NC).
Sproull, L. and S. Kiesler: 1991, Connections (MIS Press, Boston).
Thong, J. Y. L. and C. S. Yap: 1998, 'Testing an Ethical Decision-making Theory: The Case of Softlifting', Journal of Management Information System 15(1), 213-237.
Vallerand, R. J., P. Deshaies, J. Cuerrier, L. G. Pelletier and C. Mongeau: 1992, 'Ajzen and Fishbein's Theory of Reasoned Action as Applied to Moral Behavior: A Confirmatory Analysis', Journal of Personality and Social Psychology 62, 98-109.
Victor, B. and J. B. Cullen: 1988, 'The Organizational Bases of Ethical Work Climate', Administrative Science Quarterly 33(3), 101-125.
Wang, H., M. Lee, and C. Wang: 1998, 'Consumer Privacy Concerns about Internet Marketing', Communication of the ACM 41(3), 63-70.
Westin, A.: 1967, Privacy and Freedom (Antheneum, New York).
Wheaton, B., B. Muthen, D. F. Alwin and G. F. Summers: 1977, 'Assessing Reliability abd Stability in Panel Models,' in D. R. Heise (ed.), Social Methodology Research ( Jossey-Bass, San Francisco), pp. 84-136.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Hsu, MH., Kuo, FY. The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy. Journal of Business Ethics 42, 305–320 (2003). https://doi.org/10.1023/A:1022500626298
Issue Date:
DOI: https://doi.org/10.1023/A:1022500626298