How pull vs. push information delivery and social proof affect information disclosure in location based services

With the boom of the app economy, users’ location information has become an increasingly valuable differentiator to deliver personalized products and services, yet continues to raise severe privacy concerns. While research on information privacy has paid great attention on explaining and predicting factors of information disclosure decisions, there is still a significant gap in terms of how app providers can combine different mechanisms in the design of their apps to effectuate better disclosure outcomes. Drawing on a randomized online experiment with 143 smartphone users, we analyze how pull (i.e., services with user-controlled position awareness) and push (i.e., demanding always-on access location tracking) information delivery and social proof cues separately and jointly affect users’ actual location information disclosure. The results reveal that both strategies increase actual location information disclosure via two distinct mediation paths. While pull information delivery mitigates users’ privacy concerns, social proof increases their trusting beliefs. However, when both strategies are employed together, we found that social proof overrides the effect of pull information delivery mechanisms.

[1]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[2]  Jie Gu,et al.  Privacy concerns for mobile app download: An elaboration likelihood model perspective , 2017, Decis. Support Syst..

[3]  Keith Cheverst,et al.  Exploring the notion of information push and pull with respect to the user intention and disruption , 2001 .

[4]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[5]  David Gefen,et al.  Do context and personality matter? Trust and privacy concerns in disclosing private information online , 2016, Inf. Manag..

[6]  H. Raghav Rao,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..

[7]  Richard T. Watson,et al.  Location-based services , 2008, CACM.

[8]  G. Zaltman,et al.  Factors affecting trust in market research relationships. , 1993 .

[9]  Wanda J. Orlikowski,et al.  The Problem of Statistical Power in MIS Research , 1989, MIS Q..

[10]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[11]  Gabriella Kazai,et al.  Trust, authority and popularity in social information retrieval , 2008, CIKM '08.

[12]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[13]  Maria L. Cronley,et al.  Consumer Inference: A Review of Processes, Bases, and Judgment Contexts , 2004 .

[14]  E. Erdfelder,et al.  Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses , 2009, Behavior research methods.

[15]  Noah J. Goldstein,et al.  Social influence: compliance and conformity. , 2004, Annual review of psychology.

[16]  Izak Benbasat,et al.  Empirical Assessment of Alternative Designs for Enhancing Different Types of Trusting Beliefs in Online Recommendation Agents , 2016, J. Manag. Inf. Syst..

[17]  J. Phelps,et al.  Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .

[18]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[19]  Alexander Benlian,et al.  Promotional Tactics for Online Viral Marketing Campaigns: How Scarcity and Personalization Affect Seed Stage Referrals , 2015 .

[20]  Shuk Ying Ho,et al.  Timing of Adaptive Web Personalization and Its Effects on Online Consumer Behavior , 2011, Inf. Syst. Res..

[21]  Ellen R. Foxman,et al.  Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .

[22]  K. Sheehan,et al.  An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .

[23]  Bin Liu,et al.  Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions , 2015, MobileHCI.

[24]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[25]  Ardion Beldad,et al.  How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..

[26]  Scott B. MacKenzie,et al.  Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques , 2011, MIS Q..

[27]  Alexander Benlian,et al.  Web Personalization Cues and Their Differential Effects on User Assessments of Website Value , 2015, J. Manag. Inf. Syst..

[28]  William O. Bearden,et al.  Attention to Social Comparison Information: An Individual Difference Factor Affecting Consumer Conformity , 1990 .

[29]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[30]  Izak Benbasat,et al.  Recommendation Agents for Electronic Commerce: Effects of Explanation Facilities on Trusting Beliefs , 2007, J. Manag. Inf. Syst..

[31]  Heng Xu,et al.  The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.

[32]  Kuanchin Chen,et al.  Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..

[33]  David Gefen,et al.  The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.

[34]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[35]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[36]  Efraim Turban,et al.  Effect of personalization on the perceived usefulness of online customer services: a dual-core theory , 2009, ICEC.

[37]  Constance Elise Porter,et al.  Cultivating Trust and Harvesting Value in Virtual Communities , 2008, Manag. Sci..

[38]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[39]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[40]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[41]  A. Hayes Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach , 2013 .

[42]  J. Chiou,et al.  How Much can you Trust Online Information? Cues for Perceived Trustworthiness of Consumer-generated Online Information , 2011 .

[43]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[44]  Paul A. Pavlou,et al.  What Drives Users' Website Registration? A Randomized Field Experiment , 2013, ICIS.

[45]  Gordon C. Bruner,et al.  Attitude toward Location-based Advertising , 2007 .

[46]  Tom Rodden,et al.  A lightweight approach to managing privacy in location-based services , 2002 .

[47]  Anind K. Dey,et al.  Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.

[48]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[49]  R. Pieters,et al.  When demand accelerates demand: Trailing the bandwagon , 2009 .

[50]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[51]  Dennis F. Galletta,et al.  The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..

[52]  Alexander Benlian,et al.  Effects of Social Interaction Dynamics on Platforms , 2016, J. Manag. Inf. Syst..

[53]  J. Steenkamp,et al.  The Effects of Perceived Interdependence on Dealer Attitudes , 1995 .

[54]  Jacob Cohen,et al.  Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .

[55]  Tung Bui,et al.  Harnessing the Influence of Social Proof in Online Shopping: The Effect of Electronic Word of Mouth on Sales of Digital Microproducts , 2011, Int. J. Electron. Commer..

[56]  Jacob Cohen,et al.  A power primer. , 1992, Psychological bulletin.

[57]  S. Hunt,et al.  The Commitment-Trust Theory of Relationship Marketing , 1994 .

[58]  Chuan-Hoo Tan,et al.  Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..

[59]  Sven Laumer,et al.  The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use , 2015, Inf. Syst. J..

[60]  Ann E. Schlosser,et al.  Converting Web Site Visitors into Buyers: How Web Site Investment Increases Consumer Trusting Beliefs and Online Purchase Intentions , 2006 .

[61]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[62]  R. Cialdini Influence: The Psychology of Persuasion , 1993 .

[63]  Yann Truong,et al.  Perceived intrusiveness in digital advertising: strategic marketing implications , 2010 .

[64]  Shirin Elahi Privacy and consent in the digital era , 2009, Inf. Secur. Tech. Rep..

[65]  Ewald A. Kaluscha,et al.  Empirical research in on-line trust: a review and critical assessment , 2003, Int. J. Hum. Comput. Stud..

[66]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[67]  Julie E. Kendall,et al.  Information Delivery Systems: An Exploration of Web Pull and Push Technologies , 1999, Commun. Assoc. Inf. Syst..

[68]  O. Gadiesh,et al.  Transforming corner-office strategy into frontline action. , 2001, Harvard business review.

[69]  David Schneider Rewarding prosociality on non-Commercial Online Sharing Platforms , 2017, ECIS.

[70]  D. D. Schoenbachler,et al.  Trust and customer willingness to provide information in database-driven relationship marketing , 2002 .

[71]  Haejung Yun,et al.  A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators , 2014, ICIS.

[72]  Alexander Benlian,et al.  Mobile Application Quality and Platform Stickiness under Formal vs. Self-Control - Evidence from an Experimental Study , 2014, ICIS.

[73]  J. Scott Armstrong,et al.  Estimating nonresponse bias in mail surveys. , 1977 .

[74]  Bin Gu,et al.  Informational Cascades and Software Adoption on the Internet: An Empirical Investigation , 2008, MIS Q..

[75]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[76]  Giles D'Souza,et al.  Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .

[77]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[78]  Robert R. Harmon,et al.  Perceived Effectiveness of Push vs. Pull Mobile Location Based Advertising , 2007 .

[79]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[80]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[81]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[82]  Sumeet Gupta,et al.  The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..

[83]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[84]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[85]  Stephen Worchel,et al.  Effects of Supply and Demand on Ratings of Object Value , 1975 .

[86]  Peter S. Fader,et al.  Dynamic Conversion Behavior at E-Commerce Sites , 2004, Manag. Sci..