Why We Disclose Personal Information Despite Cybersecurity Risks and Vulnerabilities: Obligatory Passage Point Perspective

Isitfairtosaythatthedisclosureofpersonalinformation,inanonlinesetting,isvoluntaryordue toincentivization,cognitiverisk-benefitanalysis,cognitivepredisposition,orbasedoninformation sensitivity,whereasourpersonalinformationisbeingcollected,knowinglyandforciblymostofthe time,andunknowinglyandinadvertentlyatothertimes?Whilethecollectionofpersonalinformation isnecessarytoorganizationsandonlineusersalike,incompletingonlinetransactions,theissueis thecollectionofadditionalnon-pertinentinformationthatservesonlyorganizations’prescriptiveand predictiveanalyticsandtheirbusinessinterests,andnottheusers’.Moststudyonthephenomenon havecenteredonvoluntaryorwillfuldisclosure,andontechnicalcollections.Thisarticleexamines thephenomenonbasedontheconceptoftheobligatorypassagepointandfoundthatonlineusers disclosetheirpersonalinformationonlinemostlybecausetheinformationaredesignatedasrequired inanonlinesetting,contrarytoconventionalbeliefs. KEyWORDS Actor-Network Theory, Cybersecurity Incidents and Attacks, Cybersecurity Risks and Vulnerabilities, Information Privacy, Obligatory Passage Point, Personal Data, Personal Information Disclosure

[1]  H. B. Marri,et al.  E-commerce and its impact on operations management , 2002 .

[2]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[3]  M. Callon Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .

[4]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[5]  V. Derlega,et al.  The Cambridge Handbook of Personal Relationships: Self-Disclosure in Personal Relationships , 2006 .

[6]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[7]  Jac Fitz-enz,et al.  Predicting people: From metrics to analytics , 2009 .

[8]  B. Latour Technology is Society Made Durable , 1990 .

[9]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[10]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[11]  Patrick I. Offor Examining Consumers’ Selective Information Privacy Disclosure Behaviors in an Organization’s Secure e-Commerce Systems , 2016 .

[12]  David L. Mothersbaugh,et al.  Disclosure Antecedents in an Online Service Context , 2012 .

[13]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[14]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[15]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[16]  Celeste Chen,et al.  Trust in Internet Privacy and Security and Online Activity , 2016 .

[17]  Eri Koike,et al.  Software Analysis of Internet Bots Using a Model Checker , 2013, 2013 International Conference on Information Science and Cloud Computing Companion.

[18]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[19]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[20]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[21]  James Backhouse,et al.  Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard , 2006, MIS Q..

[22]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[23]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[24]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[25]  Tzao-Lin Lee,et al.  An integrated software processor with autofilling out web forms , 2008, 2008 13th Asia-Pacific Computer Systems Architecture Conference.

[26]  Ivan Bekavac,et al.  Web analytics tools and web metrics tools: An overview and comparative analysis , 2015 .

[27]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[28]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[29]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..