Achieving a Balance Between Privacy Protection and Data Collection: A Field Experimental Examination of a Theory-Driven Information Technology Solution

Companies face a trade-off between creating stronger privacy protection policies for consumers and employing more sophisticated data collection methods. Justice-driven privacy protection outlines a method to manage this trade-off. We built on the theoretical lens of justice theory to integrate justice provision with two key privacy protection features, negotiation and active-recommendation, and proposed an information technology (IT) solution to balance the trade-off between privacy protection and consumer data collection. In the context of mobile banking applications, we prototyped a theory-driven IT solution, referred to as negotiation, active-recommendation privacy policy application, which enables customer service agents to interact with and actively recommend personalized privacy policies to consumers. We benchmarked our solution through a field experiment relative to two conventional applications: an online privacy statement and a privacy policy with only a simple negotiation feature. The results showed that the proposed IT solution improved consumers’ perceived procedural justice, interactive justice, and distributive justice and increased their psychological comfort in using our application design and in turn reduced their privacy concerns, enhanced their privacy awareness, and increased their information disclosure intentions and actual disclosure behavior in practice. Our proposed design can provide consumers better privacy protection while ensuring that consumers voluntarily disclose personal information desirable for companies.

[1]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[2]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[3]  H. Teo,et al.  Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior , 2004 .

[4]  Laurence Ashworth,et al.  Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .

[5]  Anupam Das,et al.  Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.

[6]  Dane K. Peterson,et al.  Privacy Policy Statements and Consumer Willingness to Provide Personal Information , 2006, J. Electron. Commer. Organ..

[7]  J. Cacioppo,et al.  Communication and persuasion , 1986 .

[8]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[9]  Paul A. Pavlou,et al.  State of the information privacy literature: where are we now and where should we go? , 2011 .

[10]  Yuan Li,et al.  A multi-level model of individual information privacy beliefs , 2014, Electron. Commer. Res. Appl..

[11]  Daniel J. Veit,et al.  Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization , 2017, J. Manag. Inf. Syst..

[12]  Sumeet Gupta,et al.  Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..

[13]  David Gefen,et al.  Do context and personality matter? Trust and privacy concerns in disclosing private information online , 2016, Inf. Manag..

[14]  Shyi-Ming Chen,et al.  Handling multicriteria fuzzy decision-making problems based on vague set theory , 1994 .

[15]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[16]  Jen-Her Wu,et al.  Proactive privacy practices in transition: Toward ubiquitous services , 2014, Inf. Manag..

[17]  Tao Zhou,et al.  The effect of perceived justice on LBS users’ privacy concern , 2016 .

[18]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[19]  Zhenhui Jiang,et al.  Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior , 2016, J. Manag. Inf. Syst..

[20]  Camilla M. Holmvall,et al.  Predicting Customer Service Employees’ Job Satisfaction and Turnover Intentions: The Roles of Customer Interactional Injustice and Interdependent Self-Construal , 2007 .

[21]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[22]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[23]  Yue Liu User control of personal information concerning mobile-app: Notice and consent? , 2014, Comput. Law Secur. Rev..

[24]  David N. Chin Information Filtering, Expertise and Cognitive Load , 2007, HCI.

[25]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[26]  Norman M. Sadeh,et al.  The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences , 2020, Proc. Priv. Enhancing Technol..

[27]  Rüdiger Grimm,et al.  Can P3P help to protect privacy worldwide? , 2000, MULTIMEDIA '00.

[28]  Peter D. Nyheim,et al.  Predictors of avoidance towards personalization of restaurant smartphone advertising: A study from the Millennials’ perspective , 2015 .

[29]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[30]  Stefano Taddei,et al.  Privacy, trust and control: Which relationships with online self-disclosure? , 2013, Comput. Hum. Behav..

[31]  Jie Gu,et al.  Privacy concerns for mobile app download: An elaboration likelihood model perspective , 2017, Decis. Support Syst..

[32]  Zhu Jian Aggregation Approach of Two Kinds of Three-Point Interval Number Comparison Matrix in Group Decision Making , 2007 .

[33]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[34]  L. A. ZADEH,et al.  The concept of a linguistic variable and its application to approximate reasoning - I , 1975, Inf. Sci..

[35]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[36]  Yang Wang,et al.  Nudges for Privacy and Security , 2017, ACM Comput. Surv..

[37]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[38]  Elisa Bertino,et al.  Achieving privacy in trust negotiations with an ontology-based approach , 2006, IEEE Transactions on Dependable and Secure Computing.

[39]  Zeshui Xu,et al.  An interactive procedure for linguistic multiple attribute decision making with incomplete weight information , 2007, Fuzzy Optim. Decis. Mak..

[40]  Sören Preibusch,et al.  Implementing Privacy Negotiations in E-Commerce , 2006, APWeb.

[41]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[42]  David A. Wagner,et al.  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[43]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[44]  Robert E. Crossler,et al.  Disclosing too much? Situational factors affecting information disclosure in social commerce environment , 2014, Electron. Commer. Res. Appl..

[45]  Ken Barker,et al.  A Model for Privacy Compromisation Value , 2014, EUSPN/ICTH.

[46]  Ohbyung Kwon,et al.  A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce , 2010, Decis. Support Syst..

[47]  Rong Lan,et al.  TOPSIS Decision-Making Method for Three Parameters Interval-Valued Fuzzy Sets , 2009 .

[48]  S. Upadhyaya,et al.  Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens , 2009, IEEE Transactions on Professional Communication.

[49]  Beverley Sparks,et al.  Justice strategy options for increased customer satisfaction in a services recovery setting , 2001 .