The effect of perceived justice on LBS users’ privacy concern

As a killer application of the mobile Internet, location-based services (LBS) have been popular among users. However, due to the collection and utilization of users’ location information, LBS have raised users’ privacy concern, which may negatively affect their usage. From the perspective of perceived justice, this research examined LBS users’ privacy concern and continuance usage. Perceived justice includes three dimensions: distributive justice, procedural justice and interactional justice. The results indicated that perceived justice has significant effects on privacy concern, satisfaction and flow. These three factors determine continuance usage. The results imply that service providers need to improve users’ perceived justice in order to mitigate their privacy concern and facilitate their continuance usage of LBS.

[1]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[2]  Richard T. Watson,et al.  Location-based services , 2008, CACM.

[3]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[4]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[5]  Maryam Masoudi,et al.  The effect of web interface features on consumer online purchase intentions , 2015 .

[6]  D. Hoffman,et al.  Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations , 1996 .

[7]  Sumeet Gupta,et al.  Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..

[8]  Michael F. Goodchild,et al.  Location-Based Services , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[9]  Hangjung Zo,et al.  User acceptance of location-based social networking services: An extended perspective of perceived value , 2013, Online Inf. Rev..

[10]  F. Reichheld,et al.  E-LOYALTY: YOUR SECRET WEAPON ON THE WEB , 2003 .

[11]  Hsin-Hui Lin,et al.  The relationship of service failure severity, service recovery justice and perceived switching costs with customer loyalty in the context of e-tailing , 2011, Int. J. Inf. Manag..

[12]  Murugan Anandarajan,et al.  Experiencing flow with instant messaging and its facilitating role on creative behaviors , 2010, Comput. Hum. Behav..

[13]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[14]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[15]  H. Teo,et al.  Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012 .

[16]  Tao Zhou,et al.  Examining Location-Based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk , 2012 .

[17]  Yuan Li,et al.  Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..

[18]  Xin Li,et al.  Understanding the adoption of location-based recommendation agents among active users of social networking sites , 2014, Inf. Process. Manag..

[19]  Tsung-Hsien Kuo,et al.  How can one amplify the effect of e-learning? An examination of high-tech employees' computer attitude and flow experience , 2010, Comput. Hum. Behav..

[20]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[21]  Alexander Brem,et al.  Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany , 2015, Comput. Hum. Behav..

[22]  H. Raghav Rao,et al.  Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender , 2011, J. Manag. Inf. Syst..

[23]  Lakshmi Goel,et al.  Predicting users' return to virtual worlds: a social perspective , 2013, Inf. Syst. J..

[24]  Catherine E. Connelly,et al.  In Justice We Trust: Predicting User Acceptance of E-Customer Services , 2008, J. Manag. Inf. Syst..

[25]  Jamie Carlson,et al.  Examining the effects of website-induced flow in professional sporting team websites , 2010, Internet Res..

[26]  Marshall Scott Poole,et al.  Antecedents of flow in online shopping: a test of alternative models , 2009, Inf. Syst. J..

[27]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[28]  G. I. Kustova,et al.  From the author , 2019, Automatic Documentation and Mathematical Linguistics.

[29]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[30]  Imsook Ha,et al.  Determinants of adoption of mobile games under mobile broadband wireless access environment , 2007, Inf. Manag..

[31]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[32]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[33]  Alexander Hars,et al.  Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..

[34]  M. Csíkszentmihályi,et al.  Optimal experience: Psychological studies of flow in consciousness. , 1988 .

[35]  Sonja Wiley-Patton,et al.  Consumer adoption of mobile TV: Examining psychological flow and media content , 2009, Comput. Hum. Behav..

[36]  Kun Chang Lee,et al.  Transfer From Offline Trust to Key Online Perceptions: An Empirical Study , 2007, IEEE Transactions on Engineering Management.

[37]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[38]  Choong-C. Lee,et al.  Understanding the Use of Location-Based Service Applications: Do Privacy Concerns Matter? , 2013 .

[39]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[40]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[41]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[42]  Marios Koufaris,et al.  Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior , 2002, Inf. Syst. Res..

[43]  Deborah J. Armstrong,et al.  Exploring neuroticism and extraversion in flow and user generated content consumption , 2014, Inf. Manag..

[44]  Sumeet Gupta,et al.  The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..

[45]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[46]  Pin Luarn,et al.  Why People Check In to Social Network Sites , 2015, Int. J. Electron. Commer..

[47]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[48]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[49]  Donald E. Conlon,et al.  Justice at the millennium: a meta-analytic review of 25 years of organizational justice research. , 2001, The Journal of applied psychology.

[50]  Xi Chen,et al.  Factors affecting privacy disclosure on social network sites: an integrated model , 2010, Electronic Commerce Research.

[51]  Richard D. Holowczak,et al.  Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls , 2008, Decis. Support Syst..

[52]  Hsi-Peng Lu,et al.  Continuance intention of Facebook check-in service users: An integrated model , 2014 .

[53]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..