Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach

The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that companies misuse their information. Firms have tried to mitigate this concern in two ways: (1) offering privacy policies regarding the handling and use of personal information, (2) offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. Information processing theories, in the context of motivated behavior also known as expectancy theories, are built on the premise that people process information about behavior-outcome relationships. We empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. Further, we investigate these means in trade-off situation, where a firm may only offer partially complete privacy protection and/or some benefits

[1]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[2]  G. C. Homans,et al.  Social Behavior: Its Elementary Forms. , 1975 .

[3]  K. Moorthy Market Segmentation, Self-Selection, and Product Line Design , 1984 .

[4]  P. Green,et al.  Conjoint Analysis in Consumer Research: Issues and Outlook , 1978 .

[5]  Lee Rainie,et al.  Getting Serious Online. , 2002 .

[6]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[7]  A. Tversky,et al.  Conjoint-measurement analysis of composition rules in psychology. , 1971 .

[8]  Philippe Cattin,et al.  Commercial Use of Conjoint Analysis: An Update , 1989 .

[9]  N. Anderson An exchange on functional and conjoint measurement: Comment. , 1971 .

[10]  Michael A. Turner The Impact of Data Restrictions On Consumer Distance Shopping , 2001 .

[11]  Daniel Robey,et al.  User Attitudes and Management Information System Use , 1979 .

[12]  Paul D. Tolchinsky,et al.  A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .

[13]  S. Jourard Some Psychological Aspects of Privacy , 1966 .

[14]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[15]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[16]  Geoffry S. Howard,et al.  Discretionary Use of Computers: An Empirically Derived Explanatory Model* , 1991 .

[17]  V. Vroom Work and motivation , 1964 .

[18]  Stuart L. Esrock,et al.  A Dichotomy of Privacy: Personal and Professional Attitudes of Marketers , 1999 .

[19]  김정년,et al.  Managerial Economics 『관리경제학』 , 1976 .

[20]  M. Wedel,et al.  Metric Conjoint Segmentation Methods: A Monte Carlo Comparison , 1996 .

[21]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[22]  JULIA A. ERICKSEN,et al.  Kiss and Tell , 2001 .

[23]  N. Melone A theoretical assessment of the user-satisfaction construct in information systems research , 1990 .

[24]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[25]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[26]  David Jones Kiss and tell , 1993, Nature.

[27]  R. Staelin,et al.  A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .

[28]  J CulnanMary,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust , 1999 .

[29]  A. M. Harrell,et al.  An Application of Expectancy Theory to Explain a Manager's Intention to Use a Decision Support System , 1994 .

[30]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[31]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[32]  G. Debreu Topological Methods in Cardinal Utility Theory , 1959 .

[33]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[34]  D. D. Simmons,et al.  Invasion of privacy and judged benefit of personality-test inquiry. , 1968, The Journal of general psychology.

[35]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[36]  Erik R. Eddy,et al.  THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .

[37]  R. Luce,et al.  Simultaneous conjoint measurement: A new type of fundamental measurement , 1964 .

[38]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[39]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[40]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[41]  Varun Grover,et al.  An Application of Expectancy Theory for Assessing User Motivation to Utilize an Expert System , 1992, J. Manag. Inf. Syst..

[42]  Uriel G. Foa,et al.  Effect of resource class on retaliation to injustice in interpersonal exchange. , 1974 .

[43]  Thomas Hill,et al.  Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers. , 1987 .

[44]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[45]  Amos Tversky,et al.  A general theory of polynomial conjoint measurement , 1967 .

[46]  Michael R. Ward The economics of online retail markets , 2003 .

[47]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[48]  E. Clemons,et al.  Poaching and the Misappropriation of Information: Transaction Risks of Information Exchange , 2004 .

[49]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[50]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[51]  L. J. Savage,et al.  The Utility Analysis of Choices Involving Risk , 1948, Journal of Political Economy.

[52]  D. Wittink Market Measurement and Analysis: The First Marketing Science Conference* , 2001 .

[53]  Paul E. Green,et al.  Segmenting Markets with Conjoint Analysis , 1991 .

[54]  Lisa Farrell,et al.  Can Expected Utility Theory Explain Gambling , 2002 .

[55]  Uriel G. Foa,et al.  Interpersonal and Economic Resources , 1971, Science.

[56]  P E Green,et al.  NEW WAYS TO MEASURE CONSUMER JUDGMENTS , 1975 .

[57]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[58]  Michael J. Stahl,et al.  Modeling effort decisions with behavioral decision theory: Toward an individual differences model of expectancy theory , 1981 .

[59]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[60]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[61]  C. Goodwin A Conceptualization of Motives to Seek Privacy for Nondeviant Consumption , 1992 .

[62]  Jasmine Schwartz Giving the Web a Memory Cost Its Users Privacy , 2001 .

[63]  M. Kaplan,et al.  Human judgment and decision processes in applied settings , 1977 .

[64]  D. Brinberg,et al.  A Resource Exchange Theory Analysis of Consumer Behavior , 1983 .

[65]  Paul E. Green,et al.  Conjoint Analysis in Marketing: New Developments with Implications for Research and Practice , 1990 .

[66]  H. Varian Economic Aspects of Personal Privacy , 2009 .

[67]  Donald F. Cox,et al.  Perceived Risk and Consumer Decision-Making—The Case of Telephone Shopping , 1964 .

[68]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: New Exchange Relationships on the Web , 2006 .

[69]  R. b Hahn,et al.  An Assessment of the Costs of Proposed Online Privacy Legislation , 2001 .

[70]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[71]  L. Beach,et al.  Expectancy Theory, Decision Theory and Occupational Preference and Choice. Organizational Research. Technical Report 75-75. , 1975 .

[72]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[73]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[74]  Dale Goodhue,et al.  Supporting users of corporate data : the effect of I/S policy choices , 1988 .

[75]  Gerardine De Sanctis,et al.  Expectancy Theory as an Explanation of Voluntary Use of a Decision-Support System: , 1983 .

[76]  Jordan J. Louviere,et al.  Analyzing Decision Making: Metric Conjoint Analysis , 1988 .

[77]  Elizabeth C. Hirschman,et al.  People as Products: Analysis of a Complex Marketing Exchange , 1987 .

[78]  S. Addelman Orthogonal Main-Effect Plans for Asymmetrical Factorial Experiments , 1962 .

[79]  Christian Terwiesch,et al.  Measuring the Frictional Costs of Online Transactions: The Case of a Name-Your-Own-Price Channel , 2003, Manag. Sci..