Privacy by design and customers' perceived privacy and security concerns in the success of e-commerce

– The purpose of this paper is to gain a deeper understanding of customers’ perceived privacy and security (CPPS) by investigating privacy concerns, data security, and exploring the factors that elevate or minimise these concerns in relation to organisations’ practices. , – The research study utilises an explanatory research design. Data were collected from six organisations from different industry sectors through in-depth interviews with managers and from customers’ through four focus groups of a high-user demographic segment. , – The paper identified Privacy by Design (PbD) in the area of organisations’ practices as well as identifying the main areas of CPPS. These themes were used as the basis for an analysis of customer concerns instrumental to the success of e-commerce. , – The findings will inform the development of a general conceptual model. This will provide a better understanding of CPPS in general and in relation to the success of e-commerce web sites and transactional sites in particular. , – The value and the originality of the paper comes from the adoption of the “PbD” paradigm. Organisations have to explore the factors that elevate or minimise customers’ concerns in relation to adopting and continuing to use online transactions. It is necessary for organisations to do this because when privacy and security practices are clearly disclosed, customers increase their intention to use, or continue to use online transactions.

[1]  Vincenzo Russo,et al.  Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States , 2006, J. Glob. Inf. Manag..

[2]  Athman Bouguettaya,et al.  Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..

[3]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[4]  Tomaz Klobucar,et al.  Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.

[5]  R. Petty Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .

[6]  Chen Wang,et al.  Consumer privacy concerns about Internet marketing , 1998, CACM.

[7]  Pauline Ratnasingam,et al.  The Role of E-Commerce Adoption Among Small Businesses: An Exploratory Study , 2006 .

[8]  I. Ajzen The theory of planned behavior , 1991 .

[9]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[10]  Hsiu-Sen Chiang,et al.  Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..

[11]  J. Efrim Boritz,et al.  E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery , 2011, J. Inf. Syst..

[12]  J. Creswell,et al.  Determining Validity in Qualitative Inquiry , 2000 .

[13]  Nina Evans,et al.  Internet Usage in Small Businesses in Regional South Australia: Service Learning Opportunities for a Local University. , 2009 .

[14]  Peter Schaar,et al.  Privacy by Design , 2010 .

[15]  Robert W. Zmud,et al.  Arrangements for Information Technology Governance: A Theory of Multiple Contingencies , 1999, MIS Q..

[16]  Ann Cavoukian,et al.  Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D , 2010 .

[17]  Carmela Troncoso,et al.  Engineering Privacy by Design , 2011 .

[18]  Steven Furnell,et al.  Security implications of electronic commerce: a survey of consumers and businesses , 1999, Internet Res..

[19]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[20]  S. C. L. Koh,et al.  The adoption of e‐business and knowledge management in SMEs , 2007 .

[21]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[22]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[23]  Steven De Haes,et al.  An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment , 2009, Inf. Syst. Manag..

[24]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[25]  S. Laforet,et al.  CONSUMERS’ ATTITUDES TOWARDS ONLINE AND MOBILE BANKING IN CHINA , 2005 .

[26]  M. D. Myers,et al.  Qualitative Research in Business & Management , 2008 .

[27]  Angèle L. M. Cavaye,et al.  Case study research: a multi‐faceted research approach for IS , 1996, Inf. Syst. J..

[28]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[29]  C. R. Baker,et al.  Information Technology and the Social Construction of Information Privacy , 2001 .

[30]  Nena Lim,et al.  Consumers' perceived risk: sources versus consequences , 2003, Electron. Commer. Res. Appl..

[31]  L. Kool,et al.  Privacy by Design: an alternative to existing practice in safeguarding privacy , 2011 .

[32]  John Mingers,et al.  Combining IS Research Methods: Towards a Pluralist Methodology , 2001, Inf. Syst. Res..

[33]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[34]  J. Alberto Castañeda,et al.  The dimensionality of customer privacy concern on the internet , 2007, Online Inf. Rev..

[35]  David C. Yen,et al.  Cyberspace security management , 1999 .

[36]  Matthew K. O. Lee,et al.  A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..

[37]  Greg Dimitriadis,et al.  Focus Groups: Strategic Articulations of Pedagogy, Politics, and Inquiry. , 2005 .

[38]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[39]  Juan José García,et al.  The importance of perceived trust, security and privacy in online trading systems , 2009, Inf. Manag. Comput. Secur..

[40]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[41]  Michael D. Myers,et al.  Qualitative Research in Information Systems , 1997, MIS Q..

[42]  Elizabeth Dowler,et al.  Short cuts to safety: Risk and 'rules of thumb' in accounts of food choice , 2003 .

[43]  Michael D. Myers,et al.  The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..