Understanding Nuances of Privacy and Security in the Context of Information Systems

The concepts of privacy and security are interrelated but the underlying meanings behind them may vary across different contexts. As information technology is becoming integrated in our lives, emerging information privacy and security issues have been catching both scholars’ and practitioners’ attention with the aim to address these issues. Examples of such issues include users’ role in information security breaches, online information disclosure and its impact on information privacy, and the collection and use of electronic data for surveillance. These issues are associated with and can be explained by various disciplines, such as psychology, law, business, economics, and information systems. This diversity of disciplines leads to an inclusive approach that subsumes interrelated constructs, such as security, anonymity, and surveillance, as a part of privacy in the current literature. However, privacy and security are distinct concepts. In this paper, we argue that to better understand the role of human factors in the context of information privacy and security, these two concepts need to be examined independently. We examine the two concepts and systematically present various nuances of information privacy and security.

[1]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[2]  Sanjay Goel,et al.  Can Privacy and Security Be Friends? A Cultural Framework to Differentiate Security and Privacy Behaviors on Online Social Networks , 2017, HICSS.

[3]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[4]  Jim Q. Chen,et al.  A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness , 2008, J. Glob. Inf. Manag..

[5]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[6]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[7]  Jordan Shropshire,et al.  Continuance of protective security behavior: A longitudinal study , 2016, Decis. Support Syst..

[8]  G. C. Homans,et al.  Social Behavior as Exchange , 1958, American Journal of Sociology.

[9]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[10]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[11]  P. Himmel Health Behavior and Health Education: Theory, Research, and Practice , 1992, Annals of Internal Medicine.

[12]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[13]  Merrill Warkentin,et al.  How Direct and Vicarious Experience Promotes Security Hygiene , 2015 .

[14]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[15]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[16]  Gaurav Bansal,et al.  Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation , 2017, J. Comput. Inf. Syst..

[17]  J. Cacioppo,et al.  Source factors and the elaboration likelihood model of persuasion , 1984 .

[18]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[19]  A. Joinson,et al.  Self-disclosure, Privacy and the Internet , 2009 .

[20]  Robert F. Carey,et al.  a heuristics approach to understanding privacy-protecting behaviors in digital social environments , 2009 .

[21]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[22]  Jinyoung Min,et al.  How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost , 2015, J. Assoc. Inf. Sci. Technol..

[23]  Paul Benjamin Lowry,et al.  The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks , 2017, J. Manag. Inf. Syst..

[24]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[25]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..