The Impact of Privacy Concerns on the Use of Information Technologies: A Preliminary Conceptual Model

Privacy-related concerns are likely to be important to the successful adoption and implementation of new information technologies. While personal concerns about privacy (especially information privacy) are well documented in the literature, research on the specific source of these concerns is limited. In particular, there is a dearth of information system’ s research that focuses on the characteristics of information technologies that positively or negatively influence individual privacy perceptions. The objective of this paper is to present a preliminary conceptual model that identifies the privacy-related dimensions of information technologies that influence individual privacy perceptions. This knowledge should help organizations better determine the extent to which these new technologies are likely to be adopted by end users who perceive these technologies as threats to their privacy.

[1]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[2]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[3]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[4]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[5]  J CulnanMary How did they get my name , 1993 .

[6]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[7]  D. H. Carson Man-environment interactions : evaluations and applications , 1974 .

[8]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[9]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[10]  Steven C. Wheelwright,et al.  Strategic Management of Technology and Innovation , 1992 .

[11]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[12]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[13]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[14]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[15]  F. Schoeman,et al.  Philosophical Dimensions of Privacy , 1984 .

[16]  E. Shils,et al.  Privacy: Its Constitution and Vicissitudes , 1966 .

[17]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[18]  P. Kelvin A Social‐Psychological Examination of Privacy , 1973 .

[19]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[20]  Timothy Grance,et al.  Guide to Selecting Information Technology Security Products , 2003 .

[21]  V. Derlega,et al.  Privacy and self-disclosure in social relationships. , 1977 .

[22]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[23]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[24]  Ritu Agarwal,et al.  A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..

[25]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .