Information Privacy Concerns among novice and Expert Users of SoLoMo

SoLoMo (Social-Local-Mobile) services are becoming dominant to the huge population of semiliterate users living in emerging economies due to low costs and ubiquity. However, usage of SoLoMo services is still susceptible by information privacy concerns. Studies typically addressed the ways to mitigate information privacy concerns for the literate users and not the semi-literate users. To fill the gap of semi-literate users and have a better understanding of the information privacy concerns among different communities, this study draws upon theories of privacy calculus, familiarity, intrinsic and extrinsic motivation and protection motivation to identify the precursors of information privacy concerns related to SoLoMo services and users’ expertise. The proposed research model is empirically tested in a laboratory experiment. The findings show that the two channels (covert and overt) of delivering SoLoMo services affect the degree of information privacy concerns between the literate and semi-literate users. Implications for improving usage intentions and mitigating information privacy concerns for SoLoMo services for different types of mobile applications are discussed.

[1]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[2]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[3]  Joachim Meyer,et al.  User attitudes towards news content personalization , 2010, Int. J. Hum. Comput. Stud..

[4]  Hock Chuan Chan,et al.  The Moderating Effects of Utilitarian and Hedonic Values on Information Technology Continuance , 2012, TCHI.

[5]  WarkentinMerrill,et al.  Fear appeals and information security behaviors , 2010 .

[6]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[7]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[8]  Pin Luarn,et al.  AIS Electronic Library (AISeL) , 2017 .

[9]  Stefan Figge,et al.  Situation-dependent services—a challenge for mobile network operators , 2004 .

[10]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[11]  H. Raghav Rao,et al.  On risk, convenience, and Internet shopping behavior , 2000, CACM.

[12]  Thomas P. Moran,et al.  Guest Editor's Introduction: An Applied Psychology of the User , 1981, CSUR.

[13]  Heshan Sun,et al.  The role of moderating factors in user technology acceptance , 2006, Int. J. Hum. Comput. Stud..

[14]  Kai Lung Hui,et al.  What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses , 2002, ICIS.

[15]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[16]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[17]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[18]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[19]  Analía Amandi,et al.  User - interface agent interaction: personalization issues , 2004, Int. J. Hum. Comput. Stud..

[20]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[21]  M. Holbrook Consumer Value: A Framework for Analysis and Research , 1999 .

[22]  E. Diener,et al.  Will Money Increase Subjective Well-Being? , 2002 .

[23]  Alexandra J. Campbell Relationship marketing in consumer markets , 1997 .

[24]  Izak Benbasat,et al.  The Effects of Personalizaion and Familiarity on Trust and Adoption of Recommendation Agents , 2006, MIS Q..

[25]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[26]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[27]  Jule B. Gassenheimer,et al.  Marketing and Exchange , 1987 .

[28]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[29]  Mary Beth Rosson,et al.  The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..

[30]  R. Belk An Exploratory Assessment of Situational Effects in Buyer Behavior , 1974 .

[31]  Ben Shneiderman,et al.  Designing the User Interface: Strategies for Effective Human-Computer Interaction , 1998 .

[32]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[33]  Mo Adam Mahmood,et al.  Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[34]  Hock-Hai Teo,et al.  Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.

[35]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[36]  Pierre Chandon,et al.  A Benefit Congruency Framework of Sales Promotion Effectiveness , 2000 .

[37]  Ramnath K. Chellappa,et al.  Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..

[38]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[39]  Heng Xu,et al.  The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.

[40]  Hock-Hai Teo,et al.  The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services , 2009, J. Manag. Inf. Syst..

[41]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[42]  Margaret Tan,et al.  Factors Influencing the Adoption of Internet Banking , 2000, J. Assoc. Inf. Syst..

[43]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[44]  Amit Sharma,et al.  Communicating Price Information through Semantic Cues: The Moderating Effects of Situation and Discount Size , 1996 .

[45]  Kentaro Toyama,et al.  Designing mobile interfaces for novice and low-literacy users , 2011, TCHI.

[46]  Alan R. Dennis,et al.  Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis , 2001, MIS Q..

[47]  J. Russell,et al.  An approach to environmental psychology , 1974 .

[48]  J CulnanMary How did they get my name , 1993 .

[49]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[50]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[51]  R. Belk Situational Variables and Consumer Behavior , 1975 .

[52]  N. Luhmann Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .