Assessing Theories for Research on Personal Data Transparency

A growing number of business models are based on the collection, processing and dissemination of personal data. For a free decision about the disclosure of personal data, the individual concerned needs transparency as insight into which personal data is collected, processed, passed on to third parties, for what purposes and for what time (Personal Data Transparency, or PDT for short). The intention of this paper is to assess theories for research on PDT. We performed a literature review and explored theories used in research on PDT. We assessed the selected theories that may be appropriate for exploring PDT. Such research may build on several theories that open up different perspectives and enable various fields of study.

[1]  Emilee J. Rader,et al.  Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google , 2014, SOUPS.

[2]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[3]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[4]  Daniel J. Veit,et al.  Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization , 2017, J. Manag. Inf. Syst..

[5]  Johana Cabinakova,et al.  An Empirical Analysis of Privacy Dashboard Acceptance: the Google Case , 2016, ECIS.

[6]  K. Eisenhardt Agency Theory: An Assessment and Review , 1989 .

[7]  H. Tavani Informational Privacy: Concepts, Theories, and Controversies , 2009 .

[8]  J. Greenberg,et al.  A Taxonomy of Organizational Justice Theories , 1987 .

[9]  Kristen L. Walker Surrendering Information through the Looking Glass: Transparency, Trust, and Protection , 2016 .

[10]  Marit Hansen,et al.  Marrying Transparency Tools with User-Controlled Identity Management , 2007, FIDIS.

[11]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[12]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[13]  M. Spence Job Market Signaling , 1973 .

[14]  H. Simon,et al.  A Behavioral Model of Rational Choice , 1955 .

[15]  Christian Fuchs,et al.  Towards an Alternative Concept of Privacy , 2011, J. Inf. Commun. Ethics Soc..

[16]  Shirley Gregor,et al.  The Nature of Theory in Information Systems , 2006, MIS Q..

[17]  P. K. Kannan,et al.  The customer economics of internet privacy , 2002 .

[18]  Jennifer A. Pope,et al.  Marketing implications of privacy concerns in the US and Canada , 2009 .

[19]  Irene Pollach,et al.  Privacy Statements as a Means of Uncertainty Reduction in WWW Interactions , 2006, J. Organ. End User Comput..

[20]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[21]  Shara Monteleone Addressing the 'Failure' of Informed Consent in Online Data Protection: Learning the Lessons from Behaviour-Aware Regulation , 2015 .

[22]  I. Ajzen,et al.  Predicting and Changing Behavior: The Reasoned Action Approach , 2009 .

[23]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[24]  E CrosslerRobert,et al.  Company information privacy orientation , 2015 .

[25]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[26]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[27]  Kelly G. Shaver,et al.  THE ENVIRONMENT AND SOCIAL BEHAVIOR , 2015 .

[28]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[29]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[30]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[31]  Benjamin Thomsen,et al.  Personal data: how context shapes consumers’ data sharing with organizations from various sectors , 2015, Electron. Mark..

[32]  Jennifer Heath,et al.  Contemporary Privacy Theory Contributions to Learning Analytics , 2014, J. Learn. Anal..

[33]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[34]  Dirk Ifenthaler,et al.  Student perceptions of privacy principles for learning analytics , 2016, Educational Technology Research and Development.

[35]  Alessandro Acquisti,et al.  Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.

[36]  S. Petronio Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .

[37]  Alessandro Acquisti,et al.  Sleights of privacy: framing, disclosures, and the limits of transparency , 2013, SOUPS.

[38]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[39]  Robert G. Capra,et al.  Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..

[40]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[41]  Wolfgang Maass,et al.  Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts , 2012, MCIS.

[42]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[43]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[44]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[45]  Barry M. Staw,et al.  What Theory is Not , 1995 .

[46]  A. Tversky,et al.  The framing of decisions and the psychology of choice. , 1981, Science.

[47]  Simone Fischer-Hübner,et al.  Tools for Achieving Usable Ex Post Transparency: A Survey , 2017, IEEE Access.

[48]  Bo Zhang,et al.  Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes , 2016, CSCW.

[49]  Jules Polonetsky,et al.  To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising , 2011 .

[50]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[51]  Robert E. Crossler,et al.  Company information privacy orientation: a conceptual framework , 2015, Inf. Syst. J..

[52]  A. Tversky,et al.  Judgment under Uncertainty , 1982 .

[53]  Markus Raab,et al.  Theories of Decision Making , 2011 .

[54]  Frantz Rowe,et al.  What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..

[55]  I. Ajzen The theory of planned behavior , 1991 .

[56]  Marit Hansen,et al.  Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals , 2011, PrimeLife.

[57]  George Siemens,et al.  Ethical and privacy principles for learning analytics , 2014, Br. J. Educ. Technol..

[58]  Yuan Li,et al.  Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..

[59]  H. Simon,et al.  Theories of Decision-Making in Economics and Behavioural Science , 1966 .

[60]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[61]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[62]  Mireille Hildebrandt,et al.  The Dawn of a Critical Transparency Right for the Profiling Era , 2012 .

[63]  Daniel Veit,et al.  The Influence of Privacy Dispositions on Perceptions of Information Transparency and Personalization Preferences , 2017, HICSS.