The Role of Privacy Risk in IT Acceptance: An Empirical Study

Privacy risk is increasingly entering the public consciousness when using information technologies. To gain insight into the role of risk in the technology adoption process, we studied the use of information systems for student registration and schedule management at a major U.S. university. We further extended the technology acceptance model (TAM) to include perceptual measures of privacy risk harm and privacy risk likelihood, which apply to the extended model and predict students’ intentions to use technology. Privacy risk factors are found to negatively influence intention and contribute substantially to model predictiveness. This finding underlines the growing importance of privacy risk in the use of information technology.

[1]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[2]  Kenneth A. Bollen,et al.  Structural Equations with Latent Variables , 1989 .

[3]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[4]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[5]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[6]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[7]  Sangkyun Kim,et al.  Security of the internet-based instant messenger: Risks and safeguards , 2005, Internet Res..

[8]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[9]  Jan H. P. Eloff,et al.  Electronic commerce: the information-security challenge , 2000, Inf. Manag. Comput. Secur..

[10]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[11]  R. Peterson A Meta-analysis of Cronbach's Coefficient Alpha , 1994 .

[12]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[13]  Younghwa Lee,et al.  The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..

[14]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[15]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[16]  Naresh K. Malhotra,et al.  A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..

[17]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[18]  E. Vance Wilson,et al.  Predicting Continuing Acceptance of IT in Conditions of Sporadic Use , 2005, AMCIS.

[19]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[20]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[21]  Robert K. Gable,et al.  Instrument Development in the Affective Domain , 1986 .

[22]  VenkateshViswanath Determinants of Perceived Ease of Use , 2000 .

[23]  E. Kelloway Using LISREL for Structural Equation Modeling: A Researcher′s Guide , 1998 .

[24]  B. Dawn Medlin,et al.  Technology-based security threats: taxonomy of sources, targets and a process model of alleviation , 2005, Int. J. Inf. Technol. Manag..