Do context and personality matter? Trust and privacy concerns in disclosing private information online

Research and business practice have already established the central role of trust in business, particularly in online interactions. Many online business exchanges require the disclosure of sensitive personal information on a regular basis. Simultaneously, customers are reluctant to disclose private information online due to concerns about privacy. Thus, trust plays a critical role in such disclosures. However, a number of factors could influence the extent of customers' trust and their willingness to disclose their private information. In this study, we explore the critical roles of two sets of factors: the sensitivity of the context within which the private information is disclosed and the customer's personality. Our theory building is based on the contextualization of the theory of reasoned action (TRA-Privacy) and its synthesis with Prospect theory. Our theory argues that context sensitivity as a moderator and individuals' salient attributes in terms of personality types and privacy concern are critical factors impacting trust and the willingness to disclose personal information. Our results indicate that context moderates the parameters and path structure of the trust model and that the influence of personality on privacy concern and trust depends on the nature of the context. Applying these "who" and "where" aspects of theory building, the study opens a new avenue of context-related research that can further increase the specificity and richness of trust and privacy research. The study also provides a new perspective in trust scholarship, therein requiring the examination of three inter-related components: trustee, trustor and the context of trust.

[1]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[2]  Paul A. Pavlou,et al.  Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa , 2005, J. Glob. Inf. Manag..

[3]  이훈,et al.  지각된 유용성(Perceived Usefulness)의 영향분석 , 2004 .

[4]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[5]  P. Costa,et al.  Facet Scales for Agreeableness and Conscientiousness: A Revision of the NEO Personality Inventory☆ , 1991 .

[6]  Robert F. Easley,et al.  Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..

[7]  R. I. Sutton,et al.  Organizational behavior: linking individuals and groups to organizational contexts. , 1993, Annual review of psychology.

[8]  Daria Knoch,et al.  Personality, risky health behaviour, and perceived susceptibility to health risks , 1999 .

[9]  Straub,et al.  Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .

[10]  David Gefen,et al.  Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.

[11]  Fatemeh Zahedi,et al.  Trust violation and repair: The information privacy perspective , 2015, Decis. Support Syst..

[12]  Albert H. Segars,et al.  Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .

[13]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[14]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[15]  G. Āllport,et al.  Trait-names: A psycho-lexical study. , 1936 .

[16]  M. Deutsch Trust and suspicion , 1958 .

[17]  A. Tversky,et al.  The framing of decisions and the psychology of choice. , 1981, Science.

[18]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[19]  Bingjia Shao,et al.  The Impact of Psychological Factors on Consumers Trust in Adoption of M-Commerce , 2014 .

[20]  Risto Rajala,et al.  oes a contextualized theory of planned behavior explain why eenagers stay in virtual worlds ? , 2014 .

[21]  S. Briggs,et al.  Assessing the five-factor model of personality description. , 1992, Journal of personality.

[22]  J. Efrim Boritz,et al.  E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery , 2011, J. Inf. Syst..

[23]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[24]  David L. Mothersbaugh,et al.  Disclosure Antecedents in an Online Service Context , 2012 .

[25]  L. Wrightsman,et al.  Personality and attitudinal correlates of trusting and trustworthy behaviors in a two-person game. , 1966, Journal of personality and social psychology.

[26]  Gordon W. Cheung,et al.  Evaluating Goodness-of-Fit Indexes for Testing Measurement Invariance , 2002 .

[27]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[28]  E. Fraj,et al.  Influence of personality on ecological consumer behaviour , 2006 .

[29]  C. L. Rose,et al.  The role of the Big Five personality factors in vigilance performance and workload , 2002 .

[30]  L. R. Goldberg THE DEVELOPMENT OF MARKERS FOR THE BIG-FIVE FACTOR STRUCTURE , 1992 .

[31]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[32]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[33]  Laura A. Rosenbury Friends with Benefits? , 2007 .

[34]  Paul A. Pavlou,et al.  Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..

[35]  Athanasios Krystallis,et al.  Public trust in institutions and information sources regarding risk management and communication: towards integrating extant knowledge , 2009 .

[36]  Ralph L. Keeney,et al.  Decisions with multiple objectives: preferences and value tradeoffs , 1976 .

[37]  Y. Fried,et al.  Location, location, location: contextualizing organizational research* , 2001 .

[38]  D. Kahneman Thinking, Fast and Slow , 2011 .

[39]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[40]  Samer Faraj,et al.  The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements , 2006, J. Comput. Mediat. Commun..

[41]  Lawrence A. Pervin,et al.  Persons, Situations, Interactions: The History of a Controversy and a Discussion of Theoretical Models , 1989 .

[42]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[43]  Athman Bouguettaya,et al.  Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..

[44]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[45]  Michael J. Zickar,et al.  Linking the Big Five personality constructs to organizational commitment , 2006 .

[46]  Dennis W. Organ,et al.  Personality, satisfaction, and organizational citizenship behavior. , 1995 .

[47]  Jaeki Song,et al.  Trust in health infomediaries , 2007, Decis. Support Syst..

[48]  Tao Zhou,et al.  The Effects of Personality Traits on User Acceptance of Mobile Commerce , 2011, Int. J. Hum. Comput. Interact..

[49]  Mitsutoshi Okazaki,et al.  Revised NEO Personality Inventory(NEO-PI-R)を用いたてんかん患者におけるパーソナリティ傾向に関する検討 , 2018 .

[50]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[51]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[52]  Dale Goodhue,et al.  Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers , 2012, Inf. Syst. Res..

[53]  Magid Igbaria,et al.  Work Experiences, Job Involvement, and Quality of Work Life Among Information Systems Personnel , 1994, MIS Q..

[54]  F. Schoeman,et al.  Philosophical Dimensions of Privacy , 1984 .

[55]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[56]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[57]  D. Rousseau Psychological and implied contracts in organizations , 1989 .

[58]  Hsiang-Yi Wu,et al.  Information Privacy Concerns, Government Involvement, and Corporate Policies in the Customer Relationship Management Context , 2008 .

[59]  Paul Slovic,et al.  Perceived risk, trust, and democracy , 1993 .

[60]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[61]  W. Galston Trust: The Social Virtues and the Creation of Prosperity , 1996 .

[62]  J. Phelps,et al.  Understanding privacy concerns , 1992 .

[63]  D. M. Pedersen Personality Correlates of Privacy , 1982 .

[64]  Dan Jong Kim,et al.  Revisiting the role of web assurance seals in business-to-consumer electronic commerce , 2008, Decis. Support Syst..

[65]  Svenn Torgersen,et al.  Who takes health risks? A probe into eight personality types , 2002 .

[66]  David Gefen,et al.  The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.

[67]  Paul Wang,et al.  Direct marketing activities and personal privacy , 1993 .

[68]  Erving Goffman,et al.  The Neglected Situation , 1964 .

[69]  Shankar Ganesan Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .

[70]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[71]  David Gefen,et al.  The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern , 2015, Eur. J. Inf. Syst..

[72]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[73]  Edoardo M. Airoldi,et al.  An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..

[74]  G. Johns In praise of context , 2001 .

[75]  Rathindra Sarathy,et al.  The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors , 2011, Decis. Support Syst..

[76]  Bernard L. Rosenbaum,et al.  Attitude toward invasion of privacy in the personnel selection process and job applicant demographic and personality correlates. , 1973 .

[77]  Lawrence A. Crosby,et al.  Relationship Quality in Services Selling: An Interpersonal Influence Perspective: , 1990 .

[78]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[79]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[80]  Dianna L. Stone,et al.  Personnel Selection Procedures and Invasion of Privacy , 2003 .

[81]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[82]  Bengt Muthén,et al.  Mplus Short Courses Topic 1 Exploratory Factor Analysis, Confirmatory Factor Analysis, And Structural Equation Modeling For Continuous Outcomes , 2009 .

[83]  Ryan T. Wright,et al.  Understanding online customers’ ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty , 2014, Eur. J. Inf. Syst..

[84]  T. Grance,et al.  SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .

[85]  Jaeki Song,et al.  A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model , 2005, Manag. Sci..

[86]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[87]  D. Whetten What Constitutes a Theoretical Contribution , 1989 .

[88]  J. M. Digman PERSONALITY STRUCTURE: EMERGENCE OF THE FIVE-FACTOR MODEL , 1990 .

[89]  Jeremy Rose,et al.  Trust dynamics in a large system implementation: six theoretical propositions , 2013, Eur. J. Inf. Syst..

[90]  Mark R. Brown,et al.  Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..

[91]  Radhika Santhanam,et al.  Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees , 2008, Int. J. Inf. Secur. Priv..

[92]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[93]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[94]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[95]  Ritu Agarwal,et al.  Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective , 2012, Inf. Syst. Res..

[96]  Paul A. Pavlou,et al.  State of the information privacy literature: where are we now and where should we go? , 2011 .

[97]  Daniel Heller,et al.  Five-factor model of personality and job satisfaction: a meta-analysis. , 2002, The Journal of applied psychology.

[98]  Etienne Mullet,et al.  Risk Perception and Personality Facets , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[99]  M. Ashton,et al.  Big five factors and facets and the prediction of behavior. , 2001, Journal of personality and social psychology.

[100]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[101]  Kristina Irion Privacy and securityInternational communications surveillance , 2009, CACM.

[102]  J. Phelps,et al.  Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .

[103]  Xueming Luo Trust production and privacy concerns on the Internet , 2002 .

[104]  D. Ellsberg Decision, probability, and utility: Risk, ambiguity, and the Savage axioms , 1961 .

[105]  Nirmalya Kumar,et al.  The power of trust in manufacturer-retailer relationships , 1996 .

[106]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[107]  Jens Grossklags,et al.  What Can Behavioral Economics Teach Us about Privacy , 2008 .

[108]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[109]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[110]  Jaeki Song,et al.  Dynamics of Trust Revision: Using Health Infomediaries , 2008, J. Manag. Inf. Syst..

[111]  H. Cooper,et al.  The happy personality: a meta-analysis of 137 personality traits and subjective well-being. , 1998, Psychological bulletin.

[112]  Ed Diener,et al.  Choice of situations and congruence models of interactionism , 1985 .

[113]  George R. Milne Consumer Participation in Mailing Lists: A Field Experiment , 1997 .

[114]  A. Tversky,et al.  Context-dependent preferences , 1993 .

[115]  David Gefen,et al.  On the Need to Include National Culture as a Central Issue in E-Commerce Trust Beliefs , 2006, J. Glob. Inf. Manag..

[116]  Murray R. Barrick,et al.  THE BIG FIVE PERSONALITY DIMENSIONS AND JOB PERFORMANCE: A META-ANALYSIS , 1991 .

[117]  Gurpreet Dhillon,et al.  A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..

[118]  Rathindra Sarathy,et al.  Understanding Situational Online Information Disclosure as a Privacy Calculus , 2010, J. Comput. Inf. Syst..

[119]  I. Ajzen The theory of planned behavior , 1991 .

[120]  C. A. Higgins,et al.  THE BIG FIVE PERSONALITY TRAITS, GENERAL MENTAL ABILITY, AND CAREER SUCCESS ACROSS THE LIFE SPAN , 1999 .

[121]  K. Gergen Toward Transformation In Social Knowledge , 1982 .

[122]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[123]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[124]  杨文秀,et al.  此处“personality”译法探析 , 2000 .

[125]  Angelika Dimoka,et al.  The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums, and Seller Differentiation , 2006, Inf. Syst. Res..

[126]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[127]  Jason Bennett Thatcher,et al.  The Diffusion of Second-Generation Statistical Techniques in Information Systems Research from 1990-2008 , 2010 .

[128]  A. Tversky,et al.  Rational choice and the framing of decisions , 1990 .

[129]  N. Luhmann Trust and Power , 1979 .

[130]  P. Costa,et al.  NEO inventories for the NEO Personality Inventory-3 (NEO-PI-3), NEO Five-Factor Inventory-3 (NEO-FFI-3), NEO Personality Inventory-Revised (NEO PI-R) : professional manual , 2010 .

[131]  G. Johnson The essential impact of context on organizational behavior , 2006 .

[132]  Sirkka L. Jarvenpaa,et al.  Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..

[133]  R. Rosenfeld Belief , 2012, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[134]  H. Eysenck THINKING , 1958 .

[135]  Joseph P. Cannon,et al.  An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .

[136]  B. Byrne,et al.  Testing for the equivalence of factor covariance and mean structures: The issue of partial measurement invariance. , 1989 .

[137]  P. Costa,et al.  Adding Liebe und Arbeit: The Full Five-Factor Model and Well-Being , 1991 .

[138]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[139]  Detmar W. Straub,et al.  An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .

[140]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[141]  Carl Zimmer,et al.  Friends with benefits. , 2012, Time.

[142]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[143]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[144]  A. Tversky,et al.  A Belief-Based Account of Decision Under Uncertainty , 1998 .