The Psychology of Consumer Privacy

  • Robert. W. PalmatierEmail author
  • Kelly. D. Martin.


Experts bemoan consumers’ overall lack of concern about privacy and counterintuitive or even “paradoxical” behavior that exposes them to potential privacy violations. Vast evidence shows us that though consumers say that they are worried about privacy, they do not take the precautionary measures required to protect their personal information. These consumer-levied critiques become especially salient every time a large data breach or corporate privacy failure, such as the recent Facebook–Cambridge Analytica scandal or Equifax data breach, comes to light. Yet beyond these surface-level criticisms, far less attention has been devoted to the deep psychology of privacy.


  1. 1.
    Schneier, B. (2015). Fear and Convenience. In M. Rotenberg, J. Horwitz, & J. Scott (Eds.), Privacy in the Modern Age: A Search for Solutions (pp. 200–203). New York: The New Press.Google Scholar
  2. 2.
    Time-CNN. (1991). 93% of Respondents Believed That the Law Should Require Companies to Obtain Permission from Consumers Before Selling Their Personal Information. Public Opinion Polls Archive. Available at Accessed March 31, 2018.
  3. 3.
    Money Magazine. (1997). Poll Shows That 88% of the Public Favors a Privacy Bill of Rights. Public Opinion Polls Archive. Available at Accessed March 31, 2018.
  4. 4.
    BusinessWeek/Harris. (2000, March). A Growing Threat. BusinessWeek Magazine. Available at Accessed March 31, 2018.
  5. 5.
    Turow, J., Hennessy, M., & Draper, N. (2015). The Tradeoff Fallacy: How Marketers Are Misrepresenting American Consumers and Opening Them Up to Exploitation. Report from the Annenberg School for Communication, University of Pennsylvania. Available at Accessed May 14, 2018.
  6. 6.
    Fox, J. (2014, May 27). 85% of Online Consumer Oppose Internet Ad Tracking, Consumer Reports Finds (Consumer Reports). Available at Accessed April 5, 2018.
  7. 7.
    Madden, M., & Rainie, L. (2015). Americans’ Attitudes About Privacy, Security and Surveillance. Pew Research Center.
  8. 8.
    Rainie, L., & Anderson, J. (2014). The Future of Privacy. Pew Research Center.
  9. 9.
    Gallup. (1999). 70% of Respondents Believe the Constitution Guarantees Citizens the Right to Privacy. Public Opinion Polls Archive. Available at Accessed March 31, 2018.
  10. 10.
    YouGov. (2018, February 10–12). Majority of Americans Feel Their Personal Information Online Is at Risk. Available at Accessed March 26, 2018.
  11. 11.
    Olmstead, K., & Smith, A. (2017). What the Public Knows About Cybersecurity. Pew Research Center.
  12. 12.
    AARP. (1998). Survey of Member Attitudes on Privacy. Public Opinion Polls Archive. Available at Accessed March 31, 2018.
  13. 13.
    Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA: Brooks/Cole Publishing.Google Scholar
  14. 14.
    Pedersen, D. M. (1997, July). Psychological Functions of Privacy. Journal of Environmental Psychology, 17, 147–156.Google Scholar
  15. 15.
    Schwartz, B. (1968, May). The Social Psychology of Privacy. American Journal of Sociology, 73, 741–752.Google Scholar
  16. 16.
    Lombardi, D. B., & Ciceri, M. R. (2016). More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments. Europe’s Journal of Psychology, 12(1), 115–136.Google Scholar
  17. 17.
    Oulasvirta, A., Pihlajamaa, A., Perkio, J., Ray, D., Vahakangas, T., Hasu, T., Vainio, N., & Myllymaki, T. (2012). Long-Term Effects of Ubiquitous Surveillance in the Home. Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 41–50.
  18. 18.
    Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto, CA: Stanford University Press.Google Scholar
  19. 19.
    Jeff Smith, H., Dinev, T., & Xu, H. (2011, December). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35, 989–1015.Google Scholar
  20. 20.
    Solove, D. J. (2008). Understanding Privacy. Boston, MA: Harvard University Press.Google Scholar
  21. 21.
    Westin, A. F. (2003, July). Social and Political Dimensions of Privacy. Journal of Social Issues, 59, 431–453.Google Scholar
  22. 22.
    Dunbar, R. I. M. (2004). Gossip in Evolutionary Perspective. Review of General Psychology, 8(2), 100–110.Google Scholar
  23. 23.
    Dinev, T., McConnell, A. R., & Jeff Smith, H. (2015). Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the ‘APCO’ Box. Information Systems Research, 26(4), 639–655.Google Scholar
  24. 24.
    Martin, K. D., & Murphy, P. E. (2017, March). The Role of Data Privacy in Marketing. Journal of the Academy of Marketing Science, 45, 135–155.Google Scholar
  25. 25.
    Milne, G. R., & Bahl, S. (2010). Are There Differences Between Consumers’ and Marketers’ Privacy Expectations? A Segment- and Technology-Level Analysis. Journal of Public Policy & Marketing, 29(Spring), 138–149.Google Scholar
  26. 26.
    Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2012, December). Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research, 23, 1342–1363.Google Scholar
  27. 27.
    Bowie, N. E., & Jamal, K. (2006, July). Privacy Rights on the Internet: Self-Regulation or Government Regulation. Business Ethics Quarterly, 16, 323–342.Google Scholar
  28. 28.
    Martin, K. (2015). Privacy Notices as Tabula Rasa: An Empirical Investigation into How complying with a Privacy Notice Is Related to Meeting Privacy Expectations Online. Journal of Public Policy & Marketing, 34(Fall), 210–227.Google Scholar
  29. 29.
    Vail, M. W., Earp, J. B., & Antón, A. I. (2008, August). An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies. IEEE Transactions on Engineering Management, 55, 442–454.Google Scholar
  30. 30.
    Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do Context and Personality Matter? Trust and Privacy Concerns in Disclosing Private Information Online. Information & Management, 53, 1–21.Google Scholar
  31. 31.
    Winter, S. J., Stylainou, A. C., & Giacolone, R. A. (2004, October). Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology. Journal of Business Ethics, 54, 273–301.Google Scholar
  32. 32.
    Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communication, 67, 26–53.Google Scholar
  33. 33.
    Goldfarb, A., & Tucker, C. (2012, May). Shifts in Privacy Concerns. American Economic Review, 102, 349–353.Google Scholar
  34. 34.
    Rainie, L., & Duggan, M. (2016). Privacy and Information Sharing. Pew Research Center.
  35. 35.
    Anderson, M., & Perrin, A. (2017). Tech Adoption Climbs Among Older Adults. Pew Research Center.
  36. 36.
    Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(Spring), 27–41.Google Scholar
  37. 37.
    Tucker, C. (2014, October). Social Networks, Personalized Advertising and Privacy Controls. Journal of Marketing Research, 51, 546–562.Google Scholar
  38. 38.
    White, T. B., Zahay, D. L., Thorbjørnsen, H., & Shavitt, S. (2008). Getting Too Personal: Reactance to Highly Personalized Email Solicitations. Marketing Letters, 19, 39–50.Google Scholar
  39. 39.
    Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research, 22(2), 254–268.Google Scholar
  40. 40.
    Bart, Y., Shankar, V., Sultan, F., & Urban, G. L. (2005, October). Are the Drivers and Role of Online Trust the Same for All Web Sites and Consumers? A Large-Scale Exploratory Empirical Study. Journal of Marketing, 69, 133–152.Google Scholar
  41. 41.
    Schlosser, A. E., White, T. B., & Lloyd, S. M. (2006, April). Converting Web Site Visitors into Buyers: How Web Site Investment Increases Consumer Trusting Beliefs and Online Purchase Intentions. Journal of Marketing, 70, 133–148.Google Scholar
  42. 42.
    Miyazaki, A. D. (2008). Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. Journal of Public Policy & Marketing, 27(Spring), 19–33.Google Scholar
  43. 43.
    Wirtz, J., & Lwin, M. O. (2009). Regulatory Focus Theory, Trust, and Privacy Concern. Journal of Service Research, 12(2), 190–207.Google Scholar
  44. 44.
    Aguirre, E., Mahr, D., Grewal, D., de Ruyter, K., & Wetzels, M. (2015). Unraveling the Personalization Paradox: The Effect of Information Collection and Trust-Building Strategies on Online Advertisement Effectiveness. Journal of Retailing, 91(1), 34–49.Google Scholar
  45. 45.
    Mikolajczak, M., Pinon, N., Lane, L., de Timary, P., & Luminet, O. (2010, September). Oxytocin Not Only Increases Trust When Money Is at Stake, but Also When Confidential Information Is in the Balance. Biological Psychology, 85, 182–184.Google Scholar
  46. 46.
    Martin, K. D., Borah, A., & Palmatier, R. W. (2017, January) Data Privacy: Effects on Customer and Firm Performance. Journal of Marketing, 81, 36–58.Google Scholar
  47. 47.
    Smith, N. C., & Cooper-Martin, E. (1997, July). Ethics and Target Marketing: The Role of Product Harm and Consumer Vulnerability. Journal of Marketing, 61, 1–20.Google Scholar
  48. 48.
    Vertesi, J. (2014, May 1). My Experiment Opting Out of Big Data Made Me Look Like a Criminal. Time. Available at Accessed March 1, 2018.
  49. 49.
    Solove, D. J. (2003). Identity Theft, Privacy, and the Architecture of Vulnerability. Hastings Law Journal, 54(1227), 1–47.Google Scholar
  50. 50.
    Identity Theft Resource Center. (2017). Retrieved from
  51. 51.
    Martin, K. D., Borah, A., & Palmatier, R. W. (2018, February 15). A Strong Privacy Policy Can Save Your Company Millions. Harvard Business Review.
  52. 52.
    Feinberg, M., Willer, R., Stellar, J., & Keltner, D. (2012). The Virtues of Gossip: Reputational Information Sharing as Prosocial Behavior. Journal of Personality and Social Psychology, 102(5), 1015–1030.Google Scholar
  53. 53.
    Foster, E. K. (2004). Research on Gossip: Taxonomy, Methods, and Future Directions. Review of General Psychology, 8(2), 78–99.Google Scholar
  54. 54.
    Emler, N. (1994). Gossip, Reputation and Social Adaption. In R. F. Goodman & A. Ben-Ze’ev (Eds.), Good Gossip (pp. 119–140). Lawrence: University of Kansas Press.Google Scholar
  55. 55.
    Beersma, B., & Van Kleef, G. A. (2012). Why People Gossip: An Empirical Analysis of Social Motives, Antecedents, and Consequences. Journal of Applied Social Psychology, 42(11), 2640–2670.Google Scholar
  56. 56.
    Mills, C. (2010). Experiencing Gossip: The Foundations for a Theory of Embedded Organizational Gossip. Group and Organization Management, 35(4), 371–390.Google Scholar
  57. 57.
    Baumeister, R., Zhang, L., & Vohs, K. D. (2004). Gossip as Cultural Learning. Review of General Psychology, 8(2), 111–121.Google Scholar
  58. 58.
    Leary, M. R., & Leder, S. (2009). The Nature of Hurt Feelings: Emotional Experience and Cognitive Appraisals. In A. L. Vangelisti (Ed.), Feeling Hurt in Close Relationships (pp. 15–33). New York: Cambridge University Press.Google Scholar
  59. 59.
    Richman, L. S., & Leary, M. R. (2009). Reactions to Discrimination, Stigmatization, Ostracism, and Other Forms of Interpersonal Rejection: A Multimotive Model. Psychological Review, 116(2), 365–383.Google Scholar
  60. 60.
    Turner, M. M., Mazur, M. A., Wendel, N., & Winslow, R. (2003, June). Relational Ruin or Social Glue? The Joint Effect of Relationship Type and Gossip Valence on Liking, Trust, and Expertise. Communication Monographs, 70, 129–141.Google Scholar
  61. 61.
    Baker, S. M., Gentry, J. W., & Rittenburg, T. L. (2005, December). Building Understanding of the Domain of Consumer Vulnerability. Journal of Macromarketing, 25, 128–139.Google Scholar
  62. 62.
    Eder, D., & Enke, J. L. (1991, August). The Structure of Gossip: Opportunities and Constrains on Collective Expression Among Adolescents. American Sociological Review, 56, 494–508.Google Scholar
  63. 63.
    Cumbley, R., & Church, P. (2013, October). Is ‘Big Data’ Creepy? Computer Law & Security Review, 29, 601–609.Google Scholar
  64. 64.
    Williams, K. D. (2007). Ostracism. Annual Review of Psychology, 58, 425–452.Google Scholar
  65. 65.
    Kumar, V., Zhang, X., & Luo, A. (2014, August). Modeling Customer Opt-In and Opt-Out in a Permission-Based Marketing Context. Journal of Marketing Research, 51, 403–419.Google Scholar
  66. 66.
    Steel, E., & Fowler, G. A. (2010). Facebook in Privacy Breach. Wall Street Journal, 256(92), A1–A2.Google Scholar
  67. 67.
    McKinnon, J., & Hagey, K. (2018). As Mark Zuckerberg Prepares to Testify, Here’s How Washington Could Regulate Silicon Valley. Wall Street Journal. Available at Accessed May 22, 2018.

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.Foster School of BusinessUniversity of WashingtonSeattleUSA
  2. 2.Colorado State UniversityFort CollinsUSA

Personalised recommendations