Advertisement

Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For

  • Iis TussyadiahEmail author
  • Shujun Li
  • Graham Miller
Conference paper

Abstract

The link between information privacy concerns and privacy behaviours has been a focus of extensive investigation in various disciplines. However, little attention has been devoted to this issue in the tourism literature. Spurred by technological development and shaped by tourism-related environments, emerging privacy issues call for comprehensive yet context-specific studies to ensure tourists are making beneficial privacy choices. This paper first presents a comprehensive review of state-of-the-art research on privacy concerns and behaviours. Then, it suggests a list of overarching research priorities, merging social and technical aspects of privacy protection approaches as they apply to tourism. The priorities include research to measure tourists’ privacy concerns, explore specific biases in tourists’ privacy decisions, experiment with privacy nudges, and explore how to integrate privacy nudges in system design. Thus, this paper contributes to guiding the direction of future research on privacy protection in tourism.

Keywords

Privacy concern Personal data Information disclosure Privacy paradox Nudges 

Notes

Acknowledgements

This work was part of the “PRIvacy-aware personal data management and Value Enhancement for Leisure Travellers (PriVELT)” Project supported by the UK’s Engineering and Physical Sciences Research Council (EPSRC) (EP/R033196/1, EP/R033749/1, and EP/R033609/1).

References

  1. 1.
    Gretzel U (2011) Intelligent systems in tourism: a social science perspective. Ann Tour Res 38(3):757–779CrossRefGoogle Scholar
  2. 2.
    Werthner H, Klein S (1999) Information technology and tourism—a challenging relationship. Springer, ViennaCrossRefGoogle Scholar
  3. 3.
    Drosatos G, Efraimidis PS, Arampatzis A, Stamatelatos G, Athanasiadis IN (2015) Pythia: a privacy-enhanced personalized contextual suggestion system for Tourism. 2015. In: IEEE 39th annual international computers, software & applications conference.  https://doi.org/10.1109/compsac.2015.88
  4. 4.
    Gavalas D, Kasapakis V, Konstantopoulos C, Mastakas K, Pantziou G (2013) A survey on mobile tourism recommender systems.  https://doi.org/10.1109/iccitechnology.2013.6579536
  5. 5.
    Lee CH, Cranage DA (2011) Personalisation–privacy paradox: the effects of personalisation and privacy assurance on customer responses to travel websites. Tour Manag 32(5):987–994CrossRefGoogle Scholar
  6. 6.
    Baruh L, Secinti E, Cemalcilar Z (2017) Online privacy concerns and privacy management: a meta-analytical review. J Commun 67(1):26–53CrossRefGoogle Scholar
  7. 7.
    Barth S, de Jong MDT (2017) The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior - a systematic literature review. Telemat Inf 34(7):1038–1058CrossRefGoogle Scholar
  8. 8.
    Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun Assoc Inf Syst 28:453–496Google Scholar
  9. 9.
    Anuar F, Gretzel U (2011) Privacy concerns in the context of location based services for tourism. Paper presented at the ENTER 2011 conference, Innsbruck, Austria, January 26–28, 2011Google Scholar
  10. 10.
    Gretzel U, Sigala M, Xiang Z, Koo C (2015) Smart tourism: foundations and developments. Electron Market 25(3):179–188CrossRefGoogle Scholar
  11. 11.
    Manikonda L, Deotale A, Kambhampati S (2017) What’s up with privacy?: User preferences and privacy concerns in intelligent personal assistants. https://arxiv.org/abs/1711.07543
  12. 12.
    Lutz C, Hoffmann CP, Bucher E, Fieseler C (2018) The role of privacy concerns in the sharing economy. Inf Commun Soc 21(10):1472–1492CrossRefGoogle Scholar
  13. 13.
    Westin AF (1967) Privacy and freedom. Atheneum, New YorkGoogle Scholar
  14. 14.
    Xu H, Teo H-H (2004) Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: ICIS 2004 Proceedings, 64. https://aisel.aisnet.org/icis2004/64
  15. 15.
    Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35(4):89–1015CrossRefGoogle Scholar
  16. 16.
    Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor LF, Komanduri S, Leon PG, Sadeh N, Schaub F, Sleeper M, Wang Y, Wilson S (2017) Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput Surv 50(3):44CrossRefGoogle Scholar
  17. 17.
    Kokolakis S (2017) Privacy attitudes and privacy behaviour. Comput Secur 64(C): 122–134Google Scholar
  18. 18.
    Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decis Support Syst 54(1):471–481CrossRefGoogle Scholar
  19. 19.
    Zhou T, Li H (2014) Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Comput Hum Behav 37:283–289CrossRefGoogle Scholar
  20. 20.
    Eisenhardt KM (1989) Agency theory: an assessment and review. Acad Manag Rev 14(1):57–74CrossRefGoogle Scholar
  21. 21.
    Milne GR, Gordon ME (1993) Direct mail privacy-efficiency trade-offs within an implied social contract framework. J Public Policy Market 12(2):206–215Google Scholar
  22. 22.
    Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211CrossRefGoogle Scholar
  23. 23.
    Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood-Cliffs, NJGoogle Scholar
  24. 24.
    Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, 21–29Google Scholar
  25. 25.
    Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday, 11. http://dx.doi.org/10.5210/fm.v11i9.1394
  26. 26.
    Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff 41(1):100–126CrossRefGoogle Scholar
  27. 27.
    Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104–115CrossRefGoogle Scholar
  28. 28.
    Laufer RS, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional development theory. J Soc Issues 33(3):23–42CrossRefGoogle Scholar
  29. 29.
    Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 30(1):13–28CrossRefGoogle Scholar
  30. 30.
    Stone EF, Stone DL (1990) Privacy in organizations: theoretical issues, research findings, and protection mechanisms. Res Pers Hum Resour Manag 8:349–411Google Scholar
  31. 31.
    Simon HA (1955) A behavioral model of rational choice. Q J Econ 69(1):99–118CrossRefGoogle Scholar
  32. 32.
    Donnenwerth GV, Foa UG (1974) Effect of resource class on retaliation to injustice in interpersonal exchange. J Personal Soc Psychol 29:785–793CrossRefGoogle Scholar
  33. 33.
    Foa UG (1971) Interpersonal and economic resources. Science 71:345–351CrossRefGoogle Scholar
  34. 34.
    Simon HA (1982) Models of Bounded Rationality. Volume 1: economic analysis and public policy. Vol 2. Behavioural economics and business organization. MIT Press, Cambridge, MAGoogle Scholar
  35. 35.
    Blumler JG, Katz E (1974) The uses of mass communication. Sage, Beverly Hills, CAGoogle Scholar
  36. 36.
    Katz E, Blumler JG, Gurevitch M (1973) Uses and gratifications research. Public Opin Q 37(4):509–523CrossRefGoogle Scholar
  37. 37.
    Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–291CrossRefGoogle Scholar
  38. 38.
    Harsanyi JC (1967) Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Manag Sci 14(3):159–182CrossRefGoogle Scholar
  39. 39.
    Floyd DL, Prentice-Dunn S, Rogers RW (2000) A meta-analysis of research on protection motivation theory. J Appl Soc Psychol 30(2):407–429CrossRefGoogle Scholar
  40. 40.
    Bandura A (1986) Social foundations of thought and action: a social cognitive theory. Prentice-Hall, Englewood Cliffs, NJGoogle Scholar
  41. 41.
    Bandura A (2001) Social cognitive theory: an agentic perspective. Ann Rev Psychol 52:1–26CrossRefGoogle Scholar
  42. 42.
    Smith HJ, Milberg S, Burke S (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20(2):167–196CrossRefGoogle Scholar
  43. 43.
    Malhotra NK, Kim SS, Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf Syst Res 15(4):336–355CrossRefGoogle Scholar
  44. 44.
    Buchanan T, Paine C, Joinson AN, Reips UD (2007) Development of measures of online privacy concern and protection for use on the internet. J Am Soc Inf Sci Technol 58(2):157–165CrossRefGoogle Scholar
  45. 45.
    Martin KD, Murphy PE (2017) The role of data privacy in marketing. J Acad Market Sci 45(2):135–155CrossRefGoogle Scholar
  46. 46.
    Son J-Y, Kim SS (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Q 32(3):503–529CrossRefGoogle Scholar
  47. 47.
    Ajzen I, Brown TC, Carvajal F (2004) Explaining the discrepancy between intentions and actions: the case of hypothetical bias in contingent valuation. Personal Soc Psychol Bull 30:1108–1121CrossRefGoogle Scholar
  48. 48.
    Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven & LondonGoogle Scholar
  49. 49.
    Hansen PG (2016) The definition of nudge and libertarian paternalism: does the hand fit the glove? Eur J Risk Regul 7(1):155–174CrossRefGoogle Scholar
  50. 50.
    Acquisti A (2009) Nudging privacy: the behavioral economics of personal information. IEEE Secur Priv 7(6):82–85CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Hospitality and Tourism ManagementUniversity of SurreyGuildfordUK
  2. 2.Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) and School of ComputingUniversity of KentCanterburyUK

Personalised recommendations