Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study
- 763 Downloads
Academic studies typically view privacy threats as originating solely from organizations. With the rise of social media, such a view is incomplete because consumers increasingly face risks from peers’ misuse of data. In this paper, we study information privacy in the context of peer relationships on commercial social media sites. We develop a model that considers relationships between the constructs of privacy experiences, privacy awareness, trust, risk, and benefits and how those relationships impact individuals’ disclosure behaviors. We test the model by creating a survey that includes a number of measures that were taken directly from or were closely based on measures from prior studies. We conduct seven pilot tests of undergraduate students in order to validate the survey items. Working with the online survey firm Qualtrics, we gather a dataset of 314 Facebook users’ responses to our validated survey, and we test our model using partial least squares techniques. We find that both privacy experiences and privacy awareness are quite significant predictors of privacy concerns. We also find that trust, risk, benefits, and privacy concerns work together to explain a large amount (37%) of the variance in disclosure behaviors. We discuss implications for practice and for future research.
Keywordsprivacy concerns peer behavioral outcomes disclosure
- Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, pp 21–29, ACM Press, New York, NY.Google Scholar
- AIS (2016) Senior scholars’ basket of journals. http://aisnet.org/?SeniorScholarBasket. Accessed on August 30, 2016.
- Blatt SJ (1990) Interpersonal relatedness and self-definition: Two personality configurations and their implications for psychopathology and psychotherapy. In Repression: Defense mechanisms and personality (Singer JL, Ed), pp 299–335, University of Chicago Press, Chicago, IL.Google Scholar
- Chin WW and Newsted PR (1999) Structural equation modeling analysis with small samples using partial least squares. In Statistical strategies for small sample research (Hoyle R, Ed), pp 307–341, Sage Publications, Thousand Oaks, CAGoogle Scholar
- Gefen D and Straub DW (2005) A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Communications of the Association for Information Systems 16(5), 39–50.Google Scholar
- Hair JF, Hult GTM, Ringle CM and Sarstedt M (2017) A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage Publications, Inc., Thousand Oaks, CA.Google Scholar
- Hinde RA (1979) Toward Understanding Relationships, Academic Press, London.Google Scholar
- Jarvenpaa SL, Tractinsky N, Saarinen N and Vitale M (1999) Consumer trust in an internet store: a cross-cultural validation. Journal of Computer-Mediated Communication 5(2), 44–71.Google Scholar
- Krasnova H and Veltri NF (2010) Privacy calculus on social networking sites: explorative evidence from Germany and USA. In 43rd Hawaii International Conference on System Sciences, Hawaii.Google Scholar
- Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems 28(1), 453–496.Google Scholar
- Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression New Media Society 10(3), 393–411.Google Scholar
- Mangelsdorf ME (2007) Beyond enterprise 2.0. MIT Sloan Management Review 48(3), 50–55.Google Scholar
- Mayer RC, Davis JH and Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20(3), 709–734.Google Scholar
- Mello JA (2012) Social media, employee privacy and concerted activity: brave new world or big brother? Labor Law Journal 63(3), 165–173.Google Scholar
- Metzger MJ (2004) Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication 9(4).Google Scholar
- Morris JB (2016) First look: internet use in 2015. http://www.ntia.doc.gov/blog/2016/first-look-internet-use-2015. Accessed on September 7, 2016.
- Morrison EW and Robinson SL (1997) When employees feel betrayed: a model of how psychological contract violation develops. Academy of Management Review 22(2), 226–256.Google Scholar
- Pate J and Malone C (2000) Enduring perceptions of violation. Human Resource Management Journal 8(6), 28–31.Google Scholar
- Pavlou PA (2003) Consumer acceptance of electronic commerce – integrating trust and risk, with the technology acceptance model. International Journal of Electronic Commerce 7(3), 101–134.Google Scholar
- Pettersen L and Brandtzaeg PB (2012) Privacy Challenges in Enterprise 2.0. Association of Internet Researchers Salford, UK.Google Scholar
- Petty R and Wegener D (1998) Attitude change: multiple roles for persuasion variables. In Handbook of Social Psychology (Gilbert D, Fiske S, Lindzey G, Eds), pp 323–390, McGraw-Hill, New York.Google Scholar
- Pew Research (2016) The state of privacy in America: what we learned. http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/. Accessed on August 30, 2016.
- Raynes-Goldie K (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook. First Monday 15(1–4), article 32.Google Scholar
- Ringle CM, Wende S and Becker JM (2015) SmartPLS 3. SmartPLS GmbH, Boenningstedt. http://www.smartpls.com.
- Sheng H, Nah FF and Siau K (2008) An experimental study on ubiquitous commerce adoption: impact of personalization and privacy concerns. Journal of the Association for Information Systems 9(6), 344–377.Google Scholar
- Smith HJ (1994) Managing Privacy: Information Technology and Corporate America, University of North Carolina Press, Chapel Hill, NC.Google Scholar
- Straub DW, Boudreau M-C and Gefen D (2004) Validation guidelines for is positivist research. Communications of the Association for Information Systems 13(24), 380–427.Google Scholar
- TRUSTe (2016) U.S. consumer privacy index 2016. https://www.truste.com/resources/privacy-research/ncsa-consumer-privacy-index-us/. Accessed on August 30, 2016.
- Van Slyke C, Shim JT, Johnson R and Jiang JJ (2006) Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems 7(6), 415–444.Google Scholar
- Vroom VH (1964) Work and Motivation, Wiley, New York.Google Scholar
- Wall JD, Lowry PB and Barlow JB (2016) Organizational violations of externally governed privacy and security rules: explaining and predicting selective violations under conditions of strain and excess. Journal of the Association for Information Systems 17(1), 39–76.Google Scholar
- Witte EH (2013) Small-group research and the crisis of social psychology: an introduction. In Understanding Group Behavior: Small Group Processes and Interpersonal Relations (Witte EH, Davis JH, Eds), pp 1–8, Psychology Press, New York.Google Scholar
- Xu H (2007) The effects of self-construal and perceived control on privacy concerns. In Proceedings of 28th Annual International Conference on Information Systems (ICIS), Montreal.Google Scholar
- Xu H, Dinev T, Smith HJ and Hart P (2011) Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12(12), 798–824.Google Scholar
- Xu H, Teo HH and Tan BCY (2005) Predicting the adoption of location-based services: the roles of trust and privacy risk. In Proceedings of 26th Annual International Conference on Information Systems (ICIS), pp 897–910, Las Vegas, NV.Google Scholar