Communication Privacy Management in Electronic Commerce

This study applies Petronio’s Communication Privacy Management theory (CPM) to understand the tension between information disclosure and privacy within e-commerce relationships. It proposes that consumers manage their privacy concerns through decisions to reveal or conceal information about themselves in interactions with online retailers. The study investigates the degree to which privacy management strategies identified by CPM theory to regulate privacy and disclosure within interpersonal relationships, including withholding and falsifying information, as well as seeking information seeking from a relational partner, operate in the computer-mediated context of e-commerce relational transactions. Findings suggest that online consumers do erect boundaries around personal information and form rules to decide when to reveal information that are consistent with CPM theory. Overall, this study provides knowledge about privacy in online commercial transactions, serves as a basis for more directed theory construction in this arena, and has important practical and policy implications.

[1]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[2]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[3]  Jens Grossklags,et al.  Stated Privacy Preferences versus Actual Behaviour in EC Environments: a Reality Check , 2001 .

[4]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[5]  H. Raghav Rao,et al.  On risk, convenience, and Internet shopping behavior , 2000, CACM.

[6]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[7]  J. Horrigan,et al.  Trust and privacy online: Why Americans want to rewrite the rules , 2000 .

[8]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[9]  C. Berger,et al.  SOME EXPLORATIONS IN INITIAL INTERACTION AND BEYOND: TOWARD A DEVELOPMENTAL THEORY OF INTERPERSONAL COMMUNICATION , 1975 .

[10]  K. Sheehan,et al.  An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .

[11]  Anthony D. Miyazaki,et al.  Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .

[12]  Richard West,et al.  Introducing Communication Theory: Analysis and Application , 2000 .

[13]  R. Bharat Rao,et al.  Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange , 2006, J. Comput. Mediat. Commun..

[14]  Miriam J. Metzger Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure , 2006, Commun. Res..

[15]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[16]  J. Stanton,et al.  Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. , 2002 .

[17]  Samer Faraj,et al.  The Role of Intermediaries in the Development of Trust on the WWW: The Use and Prominence of Trusted Third Parties and Privacy Statements , 2006, J. Comput. Mediat. Commun..

[18]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[19]  T. White,et al.  Consumer Disclosure and Disclosure Avoidance: A Motivational Framework , 2004 .

[20]  I. Altman,et al.  Social penetration: The development of interpersonal relationships , 1973 .

[21]  Jennifer A. Epstein,et al.  Sex differences in lying: How women and men deal with the dilemma of deceit. , 1993 .

[22]  S. Jourard,et al.  Some factors in self-disclosure. , 1958, Journal of abnormal psychology.

[23]  Judee K. Burgoon,et al.  Sex differences in presenting and detecting deceptive messages , 2006 .

[24]  K. Sheehan,et al.  Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns , 1999 .

[25]  G. Chelune,et al.  A Neuropsychological Perspective of Interpersonal Communication , 1987 .