The interpersonal privacy identity (IPI): development of a privacy as control model

The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 (1977)). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.

[1]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[2]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[3]  Darhl M. Pedersen,et al.  A factorial comparison of privacy questionnaires , 1996 .

[4]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[5]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[6]  M. Lwin,et al.  A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online , 2003 .

[7]  Reza Barkhi,et al.  An Empirical Investigation of an Individual's Perceived Need for Privacy and Security , 2008, Int. J. Inf. Secur. Priv..

[8]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[9]  Alan R. Dennis,et al.  Media, Tasks, and Communication Processes: A Theory of Media Synchronicity , 2008, MIS Q..

[10]  G. Simmel The sociology of Georg Simmel , 1950 .

[11]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[12]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[13]  I. Altman,et al.  Social penetration: The development of interpersonal relationships , 1973 .

[14]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[15]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[16]  W. Pearce,et al.  Self-disclosing communication. , 1973, The Journal of communication.

[17]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[18]  Annie I. Antón,et al.  How internet users' privacy concerns have evolved since 2002 , 2010, IEEE Security & Privacy.

[19]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[20]  V. Derlega,et al.  Privacy and self-disclosure in social relationships. , 1977 .

[21]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[22]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[23]  R. F. Murphy,et al.  Social Distance and the Veil1 , 1964 .

[24]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[25]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[26]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[27]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[28]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[29]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[30]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[31]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[32]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[33]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .

[34]  Vincenzo Russo,et al.  Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..

[35]  Daniel M. Oppenheimer,et al.  Instructional Manipulation Checks: Detecting Satisficing to Increase Statistical Power , 2009 .

[36]  A. Nosko To Tell or Not to Tell: Predictors of Disclosure and Privacy Settings Usage in an Online Social Networking Site (Facebook) , 2011 .

[37]  P Suedfeld,et al.  The Ascription of Responsibility Questionnaire: development and empirical extensions. , 1986, Journal of personality assessment.

[38]  Jordan Shropshire,et al.  The influence of the informal social learning environment on information privacy policy compliance efficacy and intention , 2011, Eur. J. Inf. Syst..

[39]  Andrew J. Rohm,et al.  Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .

[40]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[41]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[42]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[43]  H. Raghav Rao,et al.  Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use , 2006, J. Assoc. Inf. Syst..

[44]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[45]  Kelly G. Shaver,et al.  THE ENVIRONMENT AND SOCIAL BEHAVIOR , 2015 .

[46]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[47]  詹志禹 Response order effects in Likert-type scales , 1991 .

[48]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[49]  G. Bierbrauer,et al.  Measurement of normative and evaluative aspects in individualistic and collectivistic orientations: The Cultural Orientation Scale (COS). , 1994 .

[50]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[51]  Robert E. Kraut,et al.  Internet paradox. A social technology that reduces social involvement and psychological well-being? , 1998, The American psychologist.

[52]  Richard L. Daft,et al.  Message Equivocality, Media Selection, and Manager Performance: Implications for Information Systems , 1987, MIS Q..

[53]  Jeffrey T. Child,et al.  Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure , 2009, J. Assoc. Inf. Sci. Technol..

[54]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[55]  J. Rule Private Lives and Public Surveillance; Social Control in the Computer Age , 1974 .

[56]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[57]  Joan Welkowitz,et al.  The personal style inventory: Preliminary validation studies of new measures of sociotropy and autonomy , 1994 .

[58]  Xin Luo,et al.  The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance , 2009, AMCIS.

[59]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[60]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[61]  John B. Lansing,et al.  FAMILY LIFE CYCLE AS AN INDEPENDENT VARIABLE , 1957 .

[62]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[63]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[64]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[65]  H. Leino‐Kilpi,et al.  Privacy: a review of the literature. , 2001, International journal of nursing studies.

[66]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..