Skip to main content
Erschienen in: Journal of Business Ethics 3/2021

Open Access 17.06.2019 | Original Paper

Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective

verfasst von: Weiyin Hong, Frank K. Y. Chan, James Y. L. Thong

Erschienen in: Journal of Business Ethics | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey of 2417 individuals in Hong Kong. The results show that the factors under all four dimensions are significant in the formation of Internet privacy concern. Specifically, familiarity with government legislation, Internet knowledge, benefit of information disclosure, privacy protection, and social presence reduce Internet privacy concern, while individuals’ previous privacy invasion experience, risk avoidance personality, and sensitivity of information requested by websites increase Internet privacy concern. We conducted an analysis of unobserved heterogeneity to confirm the significance of these factors. A follow-up moderation analysis shows that the individual factors (i.e., previous privacy invasion experience, risk avoidance personality, and Internet knowledge) moderate the effects of the information management factor (i.e., information sensitivity) and the interaction management factors (i.e., privacy protection and social presence). The findings provide an integrated understanding of the formation of Internet privacy concern.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In this paper, the term “antecedents” is used interchangeably with the terms “drivers” and “inhibitors”.
 
2
Protection motivation theory proposes that individuals protect themselves based on their perceptions of: severity of, vulnerability to the threat, response efficacy (i.e., belief that implementing a behavioral response will reduce the threat), and self-efficacy (i.e., belief in one’s ability to perform the behavioral response) (Li 2012).
 
3
Asians are used to high-density living conditions (e.g., small homes, crowded subways, etc.) and are more tolerant of noise and crowding than Westerners (Gillis et al. 1986). Thus, Asians may be more tolerant of being closely observed by others and lower privacy (e.g., Wang and Lau 2013).
 
4
The individual dimension is an extension of the original self-ego dimension in the MDT. This dimension includes, in addition to an individual’s experience, other individual-related factors suggested by Westin (2003), such as individual traits and demographics. Information management and interaction management are related dimensions that describe how an individual manages his or her interpersonal interaction with others.
 
5
We also conducted a focus group discussion with seven Internet users to confirm the relevance of the selected factors.
 
6
In the U.S., some legislations, including the Privacy Act (1974), the Computer Matching and Privacy Act (1988), and the Telecommunications Act (1996), were introduced to restrict the collection, use, and dissemination of personal information. In Europe, the Council of Europe passed stricter rules that protect personal data from both the private and public sectors. In Asia, for example, Hong Kong has implemented privacy laws that are similar to that in Europe.
 
7
We compared the demographics of our sample to the government census data of 2016 on Hong Kong’s population. There was no significant difference in terms of gender (Chi-square, p>0.05), but our sample was relatively younger and more educated, and had lower income than the population average (Chi-square, p<0.05). Nevertheless, our sample was closely representative of the active adult Internet users in Hong Kong, who were aged between 25 and 44. 99% of users in this age group accessed the Internet every day (vs. the global median at 29%) (Statista 2016).
 
8
In the first round of analysis, we controlled for the effects of gender, age, Internet experience, and weekly Internet usage on IPC, and found that none of the control variables was significant. Also, we conducted a series of split-group analyses based on these control variables and did not find any difference across subgroups. Thus, we proceeded to test the model with the main constructs only. Further, to alleviate the concern with common method bias (CMB), we employed the marker variable technique to validate our results. Following Malhotra et al. (2006), we used the smallest positive correlation among the latent constructs (i.e., 0.01) as an estimate of common method bias to produce a CMB-adjusted correlation matrix and re-estimate the path coefficients. The results showed that the CMB-adjusted path coefficients were consistent with those without the CMB adjustment. Hence, CMB was not deemed a threat to our results.
 
Literatur
Zurück zum Zitat Aiken, L. S., & West, S. C. (1991). Multiple regression testing and interpreting interactions. Newbury Park, CA: Sage. Aiken, L. S., & West, S. C. (1991). Multiple regression testing and interpreting interactions. Newbury Park, CA: Sage.
Zurück zum Zitat Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the Web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350–353. Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-disclosure on the Web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350–353.
Zurück zum Zitat Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123. Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics, 67(2), 107–123.
Zurück zum Zitat Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28. Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28.
Zurück zum Zitat Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150. Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150.
Zurück zum Zitat Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21. Bansal, G., Zahedi, F. M., & Gefen, D. (2016). Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management, 53(1), 1–21.
Zurück zum Zitat Becker, J. M., Rai, A., Ringle, C. M., & Völckner, F. (2013). Discovering unobserved heterogeneity in structural equation models to avert validity threats. MIS Quarterly, 37(3), 665–694. Becker, J. M., Rai, A., Ringle, C. M., & Völckner, F. (2013). Discovering unobserved heterogeneity in structural equation models to avert validity threats. MIS Quarterly, 37(3), 665–694.
Zurück zum Zitat Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041.
Zurück zum Zitat Belanger, F., & Crossler, R. E. (2019). Dealing with digital traces: Understanding protective behaviors on mobile devices. Journal of Strategic Information Systems, 28(1), 34–49. Belanger, F., & Crossler, R. E. (2019). Dealing with digital traces: Understanding protective behaviors on mobile devices. Journal of Strategic Information Systems, 28(1), 34–49.
Zurück zum Zitat Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324. Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324.
Zurück zum Zitat Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an Antecedents-Privacy Concerns–Outcomes model. Journal of Information Science, 43(5), 583–600. Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an Antecedents-Privacy Concerns–Outcomes model. Journal of Information Science, 43(5), 583–600.
Zurück zum Zitat Bennett, C. J. (1992). Regulating privacy. Ithaca, NY: Cornell University Press. Bennett, C. J. (1992). Regulating privacy. Ithaca, NY: Cornell University Press.
Zurück zum Zitat Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44–57. Campbell, A. J. (1997). Relationship marketing in consumer markets: A comparison of managerial and consumer attitudes about information privacy. Journal of Direct Marketing, 11(3), 44–57.
Zurück zum Zitat Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7–19. Caudill, E. M., & Murphy, P. E. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7–19.
Zurück zum Zitat Chen, J. C., Zhang, Y., & Heath, R. (2001). An exploratory investigation of the relationships between consumer characteristics and information privacy. Marketing Management Journal, 11(1), 73–81. Chen, J. C., Zhang, Y., & Heath, R. (2001). An exploratory investigation of the relationships between consumer characteristics and information privacy. Marketing Management Journal, 11(1), 73–81.
Zurück zum Zitat Choi, Y. K., Miracle, G. E., & Biocca, F. (2001). The effects of anthropomorphic agents on advertising effectiveness and the mediating role of presence. Journal of Interactive Advertising, 2(1), 19–32. Choi, Y. K., Miracle, G. E., & Biocca, F. (2001). The effects of anthropomorphic agents on advertising effectiveness and the mediating role of presence. Journal of Interactive Advertising, 2(1), 19–32.
Zurück zum Zitat Culnan, M. J. (1993). How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341–363. Culnan, M. J. (1993). How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341–363.
Zurück zum Zitat Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedure fairness, and impersonal trust: An empirical investigation. Organizational Science, 10(1), 104–115. Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedure fairness, and impersonal trust: An empirical investigation. Organizational Science, 10(1), 104–115.
Zurück zum Zitat Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.
Zurück zum Zitat Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce – A study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402. Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce – A study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402.
Zurück zum Zitat Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: Measurement validity and a regression model. Behavior & Information Technology, 23(6), 413–422. Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: Measurement validity and a regression model. Behavior & Information Technology, 23(6), 413–422.
Zurück zum Zitat Dinev, T. & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29. Dinev, T. & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7–29.
Zurück zum Zitat Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.
Zurück zum Zitat Dinev, T., & Hart, P. (2006b). Privacy concerns and levels of information exchange: An empirical investigation of intended eservices use. eService Journal, 4(3), 25–59. Dinev, T., & Hart, P. (2006b). Privacy concerns and levels of information exchange: An empirical investigation of intended eservices use. eService Journal, 4(3), 25–59.
Zurück zum Zitat Dinev, T., Xu, H., Smith, H. J., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316. Dinev, T., Xu, H., Smith, H. J., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316.
Zurück zum Zitat Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online b-to-c relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886. Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online b-to-c relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886.
Zurück zum Zitat Esposito Vinzi, V., Trinchera, L., Squillacciotti, S., & Tenenhaus, M. (2008). REBUS-PLS: A response-based procedure for detecting unit segments in PLS path modelling. Applied Stochastic Models in Business & Industry, 24(5), 439–458. Esposito Vinzi, V., Trinchera, L., Squillacciotti, S., & Tenenhaus, M. (2008). REBUS-PLS: A response-based procedure for detecting unit segments in PLS path modelling. Applied Stochastic Models in Business & Industry, 24(5), 439–458.
Zurück zum Zitat Etzioni, A. (2019). Cyber trust. Journal of Business Ethics, 156(1), 1–13. Etzioni, A. (2019). Cyber trust. Journal of Business Ethics, 156(1), 1–13.
Zurück zum Zitat Flaherty, D. H. (1989). Protecting privacy in surveillance societies. Chapel Hill, NC: University of North Carolina Press. Flaherty, D. H. (1989). Protecting privacy in surveillance societies. Chapel Hill, NC: University of North Carolina Press.
Zurück zum Zitat Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.
Zurück zum Zitat Garfinkel, R., Gopal, R., & Thompson, S. (2007). Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information. Information Systems Research, 18(1), 23–41. Garfinkel, R., Gopal, R., & Thompson, S. (2007). Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information. Information Systems Research, 18(1), 23–41.
Zurück zum Zitat Gillis, A. R., Richard, M. A., & Hagan, J. (1986). Ethnic susceptibility to crowding: An empirical analysis. Environment and Behavior, 18(6), 683–706. Gillis, A. R., Richard, M. A., & Hagan, J. (1986). Ethnic susceptibility to crowding: An empirical analysis. Environment and Behavior, 18(6), 683–706.
Zurück zum Zitat Goodhue, D. L., Lewis, W., & Thompson, R. (2012). Comparing PLS to regression and LISREL: A response to Marcoulides, Chin, and Saunders. MIS Quarterly, 36(3), 703–716. Goodhue, D. L., Lewis, W., & Thompson, R. (2012). Comparing PLS to regression and LISREL: A response to Marcoulides, Chin, and Saunders. MIS Quarterly, 36(3), 703–716.
Zurück zum Zitat Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: Consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4/5), 302–318. Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: Consumers’ awareness and concerns. Journal of Consumer Marketing, 19(4/5), 302–318.
Zurück zum Zitat Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152. Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152.
Zurück zum Zitat Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111–123. Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111–123.
Zurück zum Zitat Hann, I. H., Hui, K. L., Lee, S. Y., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13–42. Hann, I. H., Hui, K. L., Lee, S. Y., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13–42.
Zurück zum Zitat Harris, M. M., Hoye, G. V., & Lievens, F. (2003). Privacy and attitudes towards Internet-based selection systems: A cross-cultural comparison. International Journal of Selection and Assessment, 11(2/3), 230–236. Harris, M. M., Hoye, G. V., & Lievens, F. (2003). Privacy and attitudes towards Internet-based selection systems: A cross-cultural comparison. International Journal of Selection and Assessment, 11(2/3), 230–236.
Zurück zum Zitat Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2019). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 91–113. Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2019). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 91–113.
Zurück zum Zitat Hoffman, D. L., Novak, T., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85. Hoffman, D. L., Novak, T., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80–85.
Zurück zum Zitat Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: software of the mind. Columbus, OH: McGraw Hill. Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: software of the mind. Columbus, OH: McGraw Hill.
Zurück zum Zitat Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136. Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136.
Zurück zum Zitat Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298. Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.
Zurück zum Zitat Hui, K. L., Tan, B. C. Y., & Goh, C. Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology, 6(4), 415–441. Hui, K. L., Tan, B. C. Y., & Goh, C. Y. (2006). Online information disclosure: Motivators and measurements. ACM Transactions on Internet Technology, 6(4), 415–441.
Zurück zum Zitat Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33. Hui, K. L., Teo, H. H., & Lee, S. Y. T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33.
Zurück zum Zitat International Data Corporation (IDC). (2017). IDC special report: measuring U.S. Privacy Sentiment (IDC #US42238617). International Data Corporation (IDC). (2017). IDC special report: measuring U.S. Privacy Sentiment (IDC #US42238617).
Zurück zum Zitat Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579–595. Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579–595.
Zurück zum Zitat Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402. Junglas, I. A., Johnson, N. A., & Spitzmüller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387–402.
Zurück zum Zitat Klopfer, P. H., & Rubenstein, D. L. (1977). The concept privacy and its biological basis. Journal of Social Issues, 33(3), 52–65. Klopfer, P. H., & Rubenstein, D. L. (1977). The concept privacy and its biological basis. Journal of Social Issues, 33(3), 52–65.
Zurück zum Zitat LaRose, R., & Rifon, N. (2006). Your privacy is assured—of being disturbed: Comparing Web Sites with and without privacy seals. New Media and Society, 8(6), 1009–1029. LaRose, R., & Rifon, N. (2006). Your privacy is assured—of being disturbed: Comparing Web Sites with and without privacy seals. New Media and Society, 8(6), 1009–1029.
Zurück zum Zitat Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional development theory. Journal of Social Issues, 33(3), 22–42. Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional development theory. Journal of Social Issues, 33(3), 22–42.
Zurück zum Zitat Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481. Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481.
Zurück zum Zitat Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343–354. Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343–354.
Zurück zum Zitat Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers’ willingness to disclose personal information. Decision Support Systems, 51(3), 434–445. Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers’ willingness to disclose personal information. Decision Support Systems, 51(3), 434–445.
Zurück zum Zitat Li, X. B., & Sarkar, S. (2006). Privacy protection in data mining: A perturbation approach for categorical data. Information Systems Research, 17(3), 254–270. Li, X. B., & Sarkar, S. (2006). Privacy protection in data mining: A perturbation approach for categorical data. Information Systems Research, 17(3), 254–270.
Zurück zum Zitat Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern: A privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(1), 289–304. Liu, C., Marchewka, J. T., Lu, J., & Yu, C. S. (2005). Beyond concern: A privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42(1), 289–304.
Zurück zum Zitat Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200. Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.
Zurück zum Zitat Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
Zurück zum Zitat Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865–1883. Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865–1883.
Zurück zum Zitat Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271. Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271.
Zurück zum Zitat Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569. Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569.
Zurück zum Zitat Metzger, M. J., & Docter, S. (2003). Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media, 47(3), 350–374. Metzger, M. J., & Docter, S. (2003). Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media, 47(3), 350–374.
Zurück zum Zitat Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65–74. Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65–74.
Zurück zum Zitat Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57. Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
Zurück zum Zitat Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28(3), 255–265. Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28(3), 255–265.
Zurück zum Zitat Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1–6. Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1–6.
Zurück zum Zitat Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206–215. Milne, G. R., & Gordon, M. E. (1993). Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Public Policy & Marketing, 12(2), 206–215.
Zurück zum Zitat Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125. Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.
Zurück zum Zitat Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs, 35(1), 27–44. Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. The Journal of Consumer Affairs, 35(1), 27–44.
Zurück zum Zitat Nowak, G., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when ‘privacy’ matters. Journal of Direct Marketing, 11(4), 94–108. Nowak, G., & Phelps, J. (1997). Direct marketing and the use of individual-level consumer information: Determining how and when ‘privacy’ matters. Journal of Direct Marketing, 11(4), 94–108.
Zurück zum Zitat Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642–660. Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6), 642–660.
Zurück zum Zitat Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go?”. MIS Quarterly, 35(4), 977–988. Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go?”. MIS Quarterly, 35(4), 977–988.
Zurück zum Zitat Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: An agency theory perspective. MIS Quarterly, 31(1), 105–136. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online environments: An agency theory perspective. MIS Quarterly, 31(1), 105–136.
Zurück zum Zitat Peng, D. X., & Lai, F. (2012). Using partial least squares in operations management research: A practical guideline and summary of past research. Journal of Operations Management, 30(6), 467–480. Peng, D. X., & Lai, F. (2012). Using partial least squares in operations management research: A practical guideline and summary of past research. Journal of Operations Management, 30(6), 467–480.
Zurück zum Zitat Phelps, J. P., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17. Phelps, J. P., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17.
Zurück zum Zitat Phelps, J. P., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. Phelps, J. P., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41.
Zurück zum Zitat Pollach, I. (2005). A typology of communicative strategies in online privacy policies: Ethics, power and informed consent. Journal of Business Ethics, 62(3), 221–235. Pollach, I. (2005). A typology of communicative strategies in online privacy policies: Ethics, power and informed consent. Journal of Business Ethics, 62(3), 221–235.
Zurück zum Zitat Reinartz, W., Haenlein, M., & Henseler, J. (2009). An empirical comparison of the efficacy of covariance-based and variance-based SEM. International Journal of Research in Marketing, 26(4), 332–344. Reinartz, W., Haenlein, M., & Henseler, J. (2009). An empirical comparison of the efficacy of covariance-based and variance-based SEM. International Journal of Research in Marketing, 26(4), 332–344.
Zurück zum Zitat Resnick, M. L., & Montania, R. (2003). Perceptions of consumer service, information privacy, and product quality from semiotic design features in an online Web store. International Journal of Human-Computer Interaction, 16(2), 211–234. Resnick, M. L., & Montania, R. (2003). Perceptions of consumer service, information privacy, and product quality from semiotic design features in an online Web store. International Journal of Human-Computer Interaction, 16(2), 211–234.
Zurück zum Zitat Rice, R. (1993). Using social presence theory to compare traditional and new organizational media. Human Communication Research, 19(4), 451–484. Rice, R. (1993). Using social presence theory to compare traditional and new organizational media. Human Communication Research, 19(4), 451–484.
Zurück zum Zitat Ringle, C. M., Sarstedt, M., & Straub, D. W. (2012). A critical look at the use of PLS-SEM in MIS Quarterly. MIS Quarterly, 36(1), iii–xiv. Ringle, C. M., Sarstedt, M., & Straub, D. W. (2012). A critical look at the use of PLS-SEM in MIS Quarterly. MIS Quarterly, 36(1), iii–xiv.
Zurück zum Zitat Rohm, A., & Milne, G. (2004). Just what the doctor ordered: The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000–1011. Rohm, A., & Milne, G. (2004). Just what the doctor ordered: The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57(9), 1000–1011.
Zurück zum Zitat Rose, E. A. (2006). An examination of the concern for information privacy in the New Zealand regulatory context. Information & Management, 43(3), 322–335. Rose, E. A. (2006). An examination of the concern for information privacy in the New Zealand regulatory context. Information & Management, 43(3), 322–335.
Zurück zum Zitat Ruiz-Palomino, P., & Martinez-Cañas, R. (2011). Supervisor role modeling, ethics-related organizational policies, and employee ethical intention: The moderating impact of moral ideology. Journal of Business Ethics, 102(4), 653–668. Ruiz-Palomino, P., & Martinez-Cañas, R. (2011). Supervisor role modeling, ethics-related organizational policies, and employee ethical intention: The moderating impact of moral ideology. Journal of Business Ethics, 102(4), 653–668.
Zurück zum Zitat Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126. Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.
Zurück zum Zitat Shaw, T. R. (2003). The moral intensity of privacy: An empirical study of webmaster’ attitudes. Journal of Business Ethics, 46(4), 301–318. Shaw, T. R. (2003). The moral intensity of privacy: An empirical study of webmaster’ attitudes. Journal of Business Ethics, 46(4), 301–318.
Zurück zum Zitat Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. Information Society, 18(1), 21–32. Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. Information Society, 18(1), 21–32.
Zurück zum Zitat Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73. Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73.
Zurück zum Zitat Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. London: Wiley. Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. London: Wiley.
Zurück zum Zitat Singer, E., Mathiowetz, N. A., & Couper, M. P. (1993). The impact of privacy and confidentiality concerns on survey participation: The case of the 1990 US census. Public Opinion Quarterly, 57(4), 465–482. Singer, E., Mathiowetz, N. A., & Couper, M. P. (1993). The impact of privacy and confidentiality concerns on survey participation: The case of the 1990 US census. Public Opinion Quarterly, 57(4), 465–482.
Zurück zum Zitat Singh, T., & Hill, M. E. (2003). Consumer privacy and the Internet in Europe: A view from Germany. Journal of Consumer Marketing, 20(7), 634–651. Singh, T., & Hill, M. E. (2003). Consumer privacy and the Internet in Europe: A view from Germany. Journal of Consumer Marketing, 20(7), 634–651.
Zurück zum Zitat Sitkin, S. B., & Weingart, L. R. (1995). Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38(6), 1573–1592. Sitkin, S. B., & Weingart, L. R. (1995). Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity. Academy of Management Journal, 38(6), 1573–1592.
Zurück zum Zitat Smith, H. J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: University of North Carolina Press. Smith, H. J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: University of North Carolina Press.
Zurück zum Zitat Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.
Zurück zum Zitat Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
Zurück zum Zitat Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529. Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503–529.
Zurück zum Zitat Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49. Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36–49.
Zurück zum Zitat Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8(3), 349–411. Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management, 8(3), 349–411.
Zurück zum Zitat Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.
Zurück zum Zitat Turner, E. C., & Dasgupta, S. (2003). Privacy on the Web: An examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management, 20(1), 8–19. Turner, E. C., & Dasgupta, S. (2003). Privacy on the Web: An examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management, 20(1), 8–19.
Zurück zum Zitat Van Dyke, T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17(1), 68–81. Van Dyke, T. P., Midha, V., & Nemati, H. (2007). The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electronic Markets, 17(1), 68–81.
Zurück zum Zitat Wang, J., & Lau, S. S. (2013). Hierarchical production of privacy: Gating in compact living in Hong Kong. Current Urban Studies, 1(2), 11–18. Wang, J., & Lau, S. S. (2013). Hierarchical production of privacy: Gating in compact living in Hong Kong. Current Urban Studies, 1(2), 11–18.
Zurück zum Zitat Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of on-line privacy concerns and willingness to provide personal and financial information. Journal of Marketing Communications, 11(1), 21–40. Ward, S., Bridges, K., & Chitty, B. (2005). Do incentives matter? An examination of on-line privacy concerns and willingness to provide personal and financial information. Journal of Marketing Communications, 11(1), 21–40.
Zurück zum Zitat Warkentin, M., Goel, S., & Menard, P. (2017). Shared benefits and information privacy: What determines smart meter technology adoption? Journal of the Association for Information Systems, 18(11), 758–786. Warkentin, M., Goel, S., & Menard, P. (2017). Shared benefits and information privacy: What determines smart meter technology adoption? Journal of the Association for Information Systems, 18(11), 758–786.
Zurück zum Zitat Weigel-Garrey, C. J., Cook, C. C., & Brotherson, M. J. (1998). Children and Privacy. Journal of Family Issues, 19(1), 43–64. Weigel-Garrey, C. J., Cook, C. C., & Brotherson, M. J. (1998). Children and Privacy. Journal of Family Issues, 19(1), 43–64.
Zurück zum Zitat Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453. Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431–453.
Zurück zum Zitat Wetzels, M., Odekerken-Schröder, G., & van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177–195. Wetzels, M., Odekerken-Schröder, G., & van Oppen, C. (2009). Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33(1), 177–195.
Zurück zum Zitat White, T. B. (2004). Consumer disclosure and disclosure avoidance: A motivational framework. Journal of Consumer Psychology, 14(1/2), 41–51. White, T. B. (2004). Consumer disclosure and disclosure avoidance: A motivational framework. Journal of Consumer Psychology, 14(1/2), 41–51.
Zurück zum Zitat Wijethilake, C., Munir, R., & Appuhami, R. (2018). Environmental innovation strategy and organizational performance: Enabling and controlling uses of management control systems. Journal of Business Ethics, 151(4), 1139–1160. Wijethilake, C., Munir, R., & Appuhami, R. (2018). Environmental innovation strategy and organizational performance: Enabling and controlling uses of management control systems. Journal of Business Ethics, 151(4), 1139–1160.
Zurück zum Zitat Xie, E., Teo, H. H., & Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61–74. Xie, E., Teo, H. H., & Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61–74.
Zurück zum Zitat Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2011a). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 518–546. Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2011a). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 518–546.
Zurück zum Zitat Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011b). The personalization privacy paradox: A study of privacy decision making process for location-awareness marketing. Decision Support Systems, 51(1), 42–52. Xu, H., Luo, X., Carroll, J. M., & Rosson, M. B. (2011b). The personalization privacy paradox: A study of privacy decision making process for location-awareness marketing. Decision Support Systems, 51(1), 42–52.
Zurück zum Zitat Xu, H. & Teo, H. H. (2004). Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: Proceedings of the 25th international conference on information systems (pp. 793–806). Washington, DC, 2004. Xu, H. & Teo, H. H. (2004). Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: Proceedings of the 25th international conference on information systems (pp. 793–806). Washington, DC, 2004.
Zurück zum Zitat Xu, H., Teo, H. H., & Tan, B. C. Y. (2005). Predicting the adoption of location-based services: The role of trust and perceived privacy risk. In: Proceedings of the 26th international conference on information systems (pp. 897–910). Las Vegas, NV, 2005. Xu, H., Teo, H. H., & Tan, B. C. Y. (2005). Predicting the adoption of location-based services: The role of trust and perceived privacy risk. In: Proceedings of the 26th international conference on information systems (pp. 897–910). Las Vegas, NV, 2005.
Zurück zum Zitat Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push–pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 137–176. Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push–pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 137–176.
Zurück zum Zitat Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342–1363. Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: A study of location-based services. Information Systems Research, 23(4), 1342–1363.
Zurück zum Zitat Yap, C. S., & Thong, J. Y. L. (1997). Programme evaluation of a government information technology programme for small businesses. Journal of Information Technology, 12(2), 107–120. Yap, C. S., & Thong, J. Y. L. (1997). Programme evaluation of a government information technology programme for small businesses. Journal of Information Technology, 12(2), 107–120.
Zurück zum Zitat Yap, C. S., Thong, J. Y. L., & Raman, K. S. (1994). Effect of government incentives on computerization in small business. European Journal of Information Systems, 3(3), 191–206. Yap, C. S., Thong, J. Y. L., & Raman, K. S. (1994). Effect of government incentives on computerization in small business. European Journal of Information Systems, 3(3), 191–206.
Zurück zum Zitat Youn, S. (2005). Teenagers’ perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86–110. Youn, S. (2005). Teenagers’ perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86–110.
Zurück zum Zitat Zhou, W., & Piramuthu, S. (2015). Information relevance model of customized privacy for IoT. Journal of Business Ethics, 131(1), 19–30. Zhou, W., & Piramuthu, S. (2015). Information relevance model of customized privacy for IoT. Journal of Business Ethics, 131(1), 19–30.
Metadaten
Titel
Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective
verfasst von
Weiyin Hong
Frank K. Y. Chan
James Y. L. Thong
Publikationsdatum
17.06.2019
Verlag
Springer Netherlands
Erschienen in
Journal of Business Ethics / Ausgabe 3/2021
Print ISSN: 0167-4544
Elektronische ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-019-04237-1

Weitere Artikel der Ausgabe 3/2021

Journal of Business Ethics 3/2021 Zur Ausgabe