Towards a Taxonomy of Perceived Consequences of Privacy-invasive Practices

Internet users are increasingly concerned about their information privacy based on how individuals and organisations access and handle personal information. So far, literature has mostly dealt with information privacy concerns, referring to how individuals perceive organisational privacy practices, or with privacy risks in general. Yet, a deeper understanding is missing regarding the consequences individuals perceive to arise from privacy-invasive practices, i.e. the negative outcomes that people are afraid of due to an infringement of their privacy. To fill this gap in research, we systematically investigate how perceived privacy-invasive data collection and usage can affect individuals. Based on our focus group data, we develop a taxonomy of perceived consequences of privacy-invasive practices. It consists of six identified categories of consequences, namely social, psychological, resource-related, independence-related, legal, and physical consequences, and several privacyspecific subtypes within these categories.

[1]  Yunjie Calvin Xu,et al.  Am I Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context , 2009, ICIS.

[2]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[3]  Erik Brynjolfsson,et al.  Big data: the management revolution. , 2012, Harvard business review.

[4]  J. Jacoby,et al.  The Components of Perceived Risk , 1972 .

[5]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[6]  Keiji Takeda User Identification and Tracking with online device fingerprints fusion , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).

[7]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[8]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[9]  Shahper Vodanovich,et al.  Research Commentary - Digital Natives and Ubiquitous Information Systems , 2010, Inf. Syst. Res..

[10]  Niels Bjørn-Andersen,et al.  Exploring Value Cocreation in Relationships Between an ERP Vendor and its Partners: A Revelatory Case Study , 2012, MIS Q..

[11]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[12]  France Bélanger,et al.  Theorizing in Information Systems Research Using Focus Groups , 2012, Australas. J. Inf. Syst..

[13]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[14]  Xin Luo,et al.  Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services , 2010, Decis. Support Syst..

[15]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[16]  G. Dowling Perceived risk: The concept and its measurement , 1986 .

[17]  Sören Preibusch,et al.  Guide to measuring privacy concern: Review of survey and observational instruments , 2013, Int. J. Hum. Comput. Stud..

[18]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[19]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[20]  Yuan Li,et al.  Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework , 2011, Commun. Assoc. Inf. Syst..

[21]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[22]  Judith A. Holton,et al.  The Coding Process and Its Challenges , 2010 .

[23]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[24]  M. S. Cunningham The Major Dimensions of Perceived Risk , 1967 .

[25]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[26]  Tamara Dinev,et al.  Why would we care about privacy? , 2014, Eur. J. Inf. Syst..

[27]  Edward F. Fern,et al.  Advanced focus group research , 2001 .

[28]  Saonee Sarker,et al.  Exploring Agility in Distributed Information Systems Development Teams: An Interpretive Study in an Offshoring Context , 2009, Inf. Syst. Res..

[29]  V. Mitchell Consumer perceived risk: conceptualisations and models , 1999 .

[30]  Allen S. Lee Integrating Positivist and Interpretive Approaches to Organizational Research , 1991 .

[31]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[32]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .