A Privacy Control Theory for Online Environments

Extant literature in Information Systems often reports a significant level of unease among the Internet community with regard to threats to online privacy but fails to identify a comprehensive set of specific online privacy concerns. Moreover, out of the concerns that have been identified by a number of surveys, it is unclear whether any have adequate theoretical foundations. This paper uses the existing privacy literature and in particular the work of two prominent privacy theorists, Westin and Altman, to devise an online privacy model which outlines the components of the online privacy concept and their interdependencies. A theory for online privacy is then derived from this model.

[1]  Matthew K. O. Lee,et al.  A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..

[2]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[3]  D. H. Mills The Logic and Limits of Trust , 1983 .

[4]  W. Parent,et al.  A new definition of privacy for the law , 1983 .

[5]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[6]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[7]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[8]  J. Morsink,et al.  The Universal Declaration of Human Rights: Origins, Drafting, and Intent , 1999 .

[9]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[10]  Huaizhi Li,et al.  Secure Routing in Wired Networks and Wireless Ad Hoc Networks , 2002 .

[11]  H. Nissenbaum Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.

[12]  H. Levenson,et al.  Multidimensional locus of control in psychiatric patients. , 1973, Journal of consulting and clinical psychology.

[13]  Gurpreet Dhillon,et al.  Interpreting Dimensions of Consumer Trust in E-Commerce , 2003, Inf. Technol. Manag..

[14]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[15]  Ortwin Renn,et al.  Trust and credibility in risk communication , 1989 .

[16]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[17]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[18]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[19]  Anol Bhattacherjee,et al.  Individual Trust in Online Firms: Scale Development and Initial Test , 2002, J. Manag. Inf. Syst..

[20]  Fareed Bashir,et al.  European Convention on Human Rights , 2003 .

[21]  J. Alberto Castañeda,et al.  The effect of Internet general privacy concern on customer behavior , 2007, Electron. Commer. Res..

[22]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[23]  Maria Moloney,et al.  Online Privacy: Measuring Individuals' Concerns , 2008, EC-Web.

[24]  Frank Bannister,et al.  Consumer trust in Internet shopping in Ireland: towards the development of a more effective trust measurement instrument , 2007, J. Inf. Technol..

[25]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[26]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[27]  J. Rotter Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.

[28]  Aneil Mishra ORGANIZATIONAL RESPONSES TO CRISIS: THE CENTRALITY OF TRUST , 1996 .

[29]  Giles D'Souza,et al.  Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .

[30]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[31]  Shanyang Zhao,et al.  Do Internet Users Have More Social Ties? A Call for Differentiated Analyses of Internet Use , 2006, J. Comput. Mediat. Commun..

[32]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[33]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[34]  Joey F. George,et al.  The theory of planned behavior and Internet purchasing , 2004, Internet Res..

[35]  L. Macía,et al.  A Charter of Fundamental Rights for the European Union , 2000 .

[36]  Gurpreet Dhillon,et al.  Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..

[37]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[38]  C. Goodwin A Conceptualization of Motives to Seek Privacy for Nondeviant Consumption , 1992 .

[39]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[40]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[41]  V T Covello,et al.  The Determinants of Trust and Credibility in Environmental Risk Communication: An Empirical Study , 1997, Risk analysis : an official publication of the Society for Risk Analysis.

[42]  J. Lieberman,et al.  The Litigious Society , 1981 .