Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy

The commercial potential and rapid growth of Web 2.0 phenomenon have been accompanied by concerns regarding the collection, dissemination, and reidentification of personal information by website operators, marketers, and other users on the social networks. To address critical and acute concerns for information privacy, this study investigated users’ privacy perceptions in the Web 2.0 context by integrating privacy values, beliefs and attitudes into a theoretical framework. The research model was tested through a survey study among 218 users of Web 2.0related sites. In addition to enhancing our theoretical understanding of privacy issues in the Web 2.0 context, this research is also potentially useful to privacy advocates, the website operators, and marketers to help shape or justify their decisions concerning the development and deployment of Web 2.0 features.

[1]  R. Mason Four ethical issues of the information age , 1986 .

[2]  Rob Kling,et al.  Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference , 1999, Inf. Soc..

[3]  S. Oskamp Attitudes and opinions. 3rd ed , 1977 .

[4]  D. Campbell,et al.  Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.

[5]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[6]  G. Zaltman,et al.  Factors affecting trust in market research relationships. , 1993 .

[7]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[8]  J. Phelps,et al.  Understanding privacy concerns , 1992 .

[9]  P. Wang,et al.  Information systems solutions for transborder data flow problems for multinational companies , 1993 .

[10]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[11]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[12]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[13]  Annie I. Antón,et al.  Examining Internet privacy policies within the context of user privacy values , 2005, IEEE Transactions on Engineering Management.

[14]  C. Goodwin Privacy: Recognition of a Consumer Right , 1991 .

[15]  L. Festinger,et al.  A Theory of Cognitive Dissonance , 2017 .

[16]  David G. Bromley,et al.  Secrecy: A Cross-Cultural Perspective. , 1982 .

[17]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[18]  Paul A. Pavlou,et al.  Institution-Based Trust in Interorganizational Exchange Relationships: The Role of Online B2B Marketplaces on Trust Formation , 2002, J. Strateg. Inf. Syst..

[19]  R. Sitgreaves Psychometric theory (2nd ed.). , 1979 .

[20]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[21]  Heng Xu,et al.  The Effects of Self-Construal and Perceived Control on Privacy Concerns , 2007, ICIS.

[22]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[23]  Jeffrey Rosen,et al.  The Unwanted Gaze: The Destruction of Privacy in America , 2000 .

[24]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[25]  Colin J. Bennett,et al.  The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..

[26]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[27]  Lawrence H. Cox,et al.  Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age" , 2010, J. Priv. Confidentiality.

[28]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[29]  J. Scott Armstrong,et al.  Estimating nonresponse bias in mail surveys. , 1977 .

[30]  H. J. Smith,et al.  Managing Privacy: Information Technology and Corporate America , 1994 .

[31]  R. Staelin,et al.  A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .

[32]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[33]  Alfred Kobsa,et al.  Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.

[34]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[35]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[36]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[37]  J. W. Taylor The role of risk in consumer behavior. , 1974 .

[38]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[39]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[40]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[41]  Robert H. Ducoffe ADVERTISING VALUE AND ADVERTISING ON THE WEB , 1996 .

[42]  P. Kelvin A Social‐Psychological Examination of Privacy , 1973 .

[43]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[44]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[45]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[46]  J. Bettman Perceived Risk and Its Components: A Model and Empirical Test , 1973 .

[47]  Deckle McLean Privacy and its invasion , 1995 .

[48]  Amitai Etzioni,et al.  The Limits Of Privacy , 1999 .

[49]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[50]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[51]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[52]  T. Cook,et al.  Quasi-experimentation: Design & analysis issues for field settings , 1979 .

[53]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[54]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[55]  R. Perloff The dynamics of persuasion , 1993 .

[56]  Sissela Bok,et al.  Secrets: On the Ethics of Concealment and Revelation , 1982 .

[57]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[58]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[59]  Eugene F. Stone Research methods in organizational behavior , 1978 .