Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order

Even though Privacy concerns (PC) and security concerns (SC) are acknowledged as separate constructs, many studies argue that they are related or, even worse, confused. Building upon the non-overlapping SC and PC dimensions, we propose Internet Users Information Transmission Security Concern (IUITSC) scale. We argue that the scale when used in conjunction with PC scale would cover the entire gamut of SC-PC. The construct is tested in a nomological network of Big 5 and trust. The results based on extensive statistical tests including chi-square difference tests suggest that IUITSC may be represented as a second-order factor structure rather than a set of four first-order factors. The results show that personality dimensions of conscientiousness, emotional instability and extraversion are positively associated with IUITSC (second order), which in turn is found to significantly lower trust in a website. Big5 dimensions are found to impact the IUITSC differently depending upon the factor structure.

[1]  Susan Landau Privacy and securityA multidimensional problem , 2008, Commun. ACM.

[2]  Martin Hershkowitz The “Insider” Threat , 2007 .

[3]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[4]  Mary J. Culnan,et al.  How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..

[5]  Gurpreet Dhillon,et al.  Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns , 2001 .

[6]  Barbara Krumay,et al.  Differentiating Privacy and Security: A Content Analysis of B2C Websites , 2011, AMCIS.

[7]  William David Salisbury,et al.  Perceived security and World Wide Web purchase intention , 2001, Ind. Manag. Data Syst..

[8]  David Gefen,et al.  The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online , 2010, Decis. Support Syst..

[9]  R. Lennox,et al.  Conventional wisdom on measurement: A structural equation perspective. , 1991 .

[10]  Dan Jong Kim,et al.  Revisiting the role of web assurance seals in business-to-consumer electronic commerce , 2008, Decis. Support Syst..

[11]  David Gefen,et al.  The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation , 2008, ICIS.

[12]  David H. Benson A Field Study of End User Computing: Findings and Issues , 1983, MIS Q..

[13]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[14]  Soumya Ray,et al.  Security Assurance: How Online Service Providers Can Influence Security Control Perceptions and Gain Trust , 2011, Decis. Sci..

[15]  Carlos Flavián,et al.  The impact of participation in virtual brand communities on consumer trust and loyalty: The case of free software , 2007, Online Inf. Rev..

[16]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[17]  Fatemeh Zahedi,et al.  Trading Trust for Discount: Does Frugality Moderate the Impact of Privacy and Security Concerns? , 2010, AMCIS.

[18]  E. Fraj,et al.  Influence of personality on ecological consumer behaviour , 2006 .

[19]  Godwin J. Udo,et al.  Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..

[20]  Binshan Lin,et al.  The Effect of Perceived Ethical Performance of Shopping Websites on Consumer Trust , 2009, J. Comput. Inf. Syst..

[21]  Clinton E. White,et al.  The Information Center Concept: A Normative Model and a Study of Six Installations , 1987, MIS Q..

[22]  Merrill Warkentin,et al.  Behavioral and policy issues in information systems security: the insider threat , 2009, Eur. J. Inf. Syst..

[23]  Jaeki Song,et al.  Dynamics of Trust Revision: Using Health Infomediaries , 2008, J. Manag. Inf. Syst..

[24]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[25]  Gaurav Bansal Understanding the Security in Privacy-Security Concerns: A Theoretical and Empirical Examination , 2011, AMCIS.

[26]  James C. Anderson,et al.  Some Methods for Respecifying Measurement Models to Obtain Unidimensional Construct Measurement , 1982 .

[27]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[28]  Jae-Hyeon Ahn,et al.  Comparison of Trust Sources of an Online Market-Maker in the E-Marketplace: Buyer's and Seller's Perspectives , 2006, J. Comput. Inf. Syst..

[29]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[30]  P. Pavlou,et al.  Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .

[31]  Jaeki Song,et al.  A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model , 2005, Manag. Sci..

[32]  Peter M. Bentler,et al.  Ensuring Positiveness of the Scaled Difference Chi-square Test Statistic , 2008, Psychometrika.

[33]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[34]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[35]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[36]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[37]  Pauline Ratnasingam,et al.  The Role of Facilitating Conditions and Institutional Trust in Electronic Marketplaces , 2005, J. Electron. Commer. Organ..

[38]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[39]  Jeffry Pilcher Growing Use of Twitter Raises Customer Security Concerns: A "Friendly Neighborhood Bank in the Twitterverse" Could Be Anybody ... and Anything but Friendly , 2010 .