Behaviors, adverse events, and dispositions: An empirical study of online discretion and information control

In this article, the authors develop hypotheses about three key correlates of attitudes about discretionary online behaviors and control over one's own online information: frequency of engaging in risky online behaviors, experience of an online adverse event, and the disposition to be more or less trusting and cautious of others. Through an analysis of survey results, they find that online adverse events do not necessarily relate to greater overall Web discretion, but they do significantly associate with users' perceptions of Web information control. However, the frequencies with which individuals engage in risky online activities and behaviors significantly associate with both online discretion and information control. In addition, general dispositions to trust and be cautious are strongly related to prudent Internet behavior and attitudes about managing personal online information. The results of this study have clear consequences for our understanding of behaviors and attitudes that might lead to greater online social intelligence, or the ability to make prudent decisions in the presence of Internet uncertainties and risks. Implications for theory and practice are discussed. © 2010 Wiley Periodicals, Inc.

[1]  Byoungsoo Kim,et al.  The role of trust belief and its antecedents in a community-driven knowledge environment , 2009 .

[2]  Gill Valentine,et al.  On-line Dangers?: Geographies of Parents’ Fears for Children's Safety in Cyberspace , 2001 .

[3]  Omar El Sawy,et al.  The Four Tigers of Global E-Business Infrastructure: Strategies and Implications for Emerging Economies , 2003, Commun. Assoc. Inf. Syst..

[4]  Jennifer Preece,et al.  Etiquette online: from nice to necessary , 2004, CACM.

[5]  Lee S. Strickland,et al.  Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..

[6]  Toshio Yamagishi,et al.  Trust as a form of social intelligence. , 2001 .

[7]  M. Birnbaum Human research and data collection via the internet. , 2004, Annual review of psychology.

[8]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[9]  Ben Shneiderman,et al.  Designing trust into online experiences , 2000, CACM.

[10]  Alexandra Gerbasi,et al.  Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives , 2010 .

[11]  S. Turkle Life on the Screen , 1995 .

[12]  Raymond R. Burke Technology and the customer interface: What consumers want in the physical and virtual store , 2002 .

[13]  Han Yi,et al.  Trust and e-commerce: a study of consumer perceptions , 2003, Electron. Commer. Res. Appl..

[14]  Z. Sardar alt.civilizations.faq cyberspace as the darker side of the West , 1995 .

[15]  Howard Rheingold,et al.  The Virtual Community: Homesteading on the Electronic Frontier , 2000 .

[16]  Detmar W. Straub,et al.  Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture , 2008, J. Manag. Inf. Syst..

[17]  Christy M. K. Cheung,et al.  Understanding consumer trust in Internet shopping: A multidisciplinary approach , 2006 .

[18]  Mark R. Brown,et al.  Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..

[19]  M. Gilly,et al.  Shopping Online for Freedom, Control, and Fun , 2001 .

[20]  Coye Cheshire,et al.  The Role of Trust in Online Relationship Formation , 2010 .

[21]  Dhruv Grewal,et al.  Internet retailing: enablers, limiters and market consequences , 2004 .

[22]  Ellen Garbarino,et al.  GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .

[23]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[24]  T. Yamagishi,et al.  Trust and commitment in the United States and Japan , 1994 .

[25]  Ziauddin Sardar Cyberspace as the darker side of the West , 1995 .

[26]  Batya Friedman,et al.  Trust online , 2000, CACM.

[27]  Henry H. Emurian,et al.  An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..

[28]  P. Kollock,et al.  Writing in the body , 2002 .

[29]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[30]  P. Lunt,et al.  Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control , 2004 .

[31]  Brock Read,et al.  Think before You Share. , 2006 .

[32]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[33]  Motoko Kosugi,et al.  Trust, Gullibility, and Social Intelligence , 1999 .

[34]  Kenneth R. Fleischmann,et al.  Trust in digital information , 2008 .

[35]  K. Cook,et al.  Cooperation Without Trust , 2005 .

[36]  K. Witte Putting the fear back into fear appeals: The extended parallel process model , 1992 .

[37]  Helen Nissenbaum,et al.  Will Security Enhance Trust Online, or Supplant It? , 2004 .

[38]  John M. Collins,et al.  Military Strategy: Principles, Practices, and Historical Perspectives , 2001 .

[39]  B. J. Fogg,et al.  Prominence-interpretation theory: explaining how people assess credibility online , 2003, CHI Extended Abstracts.

[40]  R. Hardin Trust and Trustworthiness , 2002 .

[41]  Katelyn Y. A. McKenna,et al.  The internet and social life. , 2004, Annual review of psychology.

[42]  John P. Robinson,et al.  Social Implications of the Internet , 2001 .

[43]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[44]  Matthew K. O. Lee,et al.  A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..

[45]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[46]  Kuanchin Chen,et al.  Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..

[47]  K. Cook,et al.  Trust Building via Risk Taking: A Cross-Societal Experiment , 2005 .

[48]  S. Gordon Interpersonal trust, vigilance and social networks roles in the process of entrepreneurial opportunity recognition , 2007 .

[49]  Kallol Kumar Bagchi,et al.  An Analysis of the Growth of Computer and Internet Security Breaches , 2003, Commun. Assoc. Inf. Syst..

[50]  Robert LaRose,et al.  Promoting personal responsibility for internet safety , 2008, CACM.