Skip to main content
Erschienen in: Ethics and Information Technology 4/2012

01.12.2012 | Original Paper

Information technology and privacy: conceptual muddles or privacy vacuums?

verfasst von: Kirsten Martin

Erschienen in: Ethics and Information Technology | Ausgabe 4/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance—the privacy equation by which they form judgments—across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
This negotiation over privacy norms is not synonymous with privacy as a commodity (Smith et al. 2011), a privacy calculus (Culnan and Armstrong 1999; Dinev and Hart 2006), or a second exchange (Culnan and Bies 2003), all of which assume individuals relinquish privacy in order to gain something in return. In other words, individuals are seen as giving up some measure of privacy to benefit from a transaction (e.g., customizing products or using electronic health records or having books suggested online). In this paper, the negotiation is over the privacy norm function; actors within a context negotiate what the privacy rules will be while retaining every expectation of privacy.
 
2
In comparison, in experiments, factors are designed orthogonal to each other but manipulated one at a time; however, in a traditional survey, many factors are examined but are not necessarily orthogonal to each other (Appelbaum et al. 2006).
 
3
Individuals regularly give access to information to people or organizations while keeping the same information from others. Alternatively, the restricted access version of privacy—where information that is inaccessible is private and that which is accessible is public –supports a dichotomy where information can be universally declared ‘public’ or ‘private.’ Many find the distinction to be false (Solove 2006; Nissenbaum 2004, 2009; Tufekci 2008) and “the idea of two distinct spheres, of the ‘public’ and the ‘private’ is in many ways an outdated concept” (Marwick et al. 2010). Or, as Nissenbaum states, “the crucial issue is not whether the information is private or public, gathered from private or public settings, but whether the action breaches contextual integrity” (2004, p. 134).
 
4
Respondent fatigue was a factor for some respondent groups. Two dummy variables were created to signify vignette ratings with a sequence number over 30 and over 20. If the ordinal regression model demonstrated a significant impact on the rating task by either dummy variable, those associated vignette ratings were discarded for that model. The regression was rerun without the offending data. However, a larger design issue came from the respondents’ learning curve—presumably from the novelty of the survey design. Once the first two vignette ratings for each respondent (sequence numbers 1 and 2) were discarded for all respondents, the model fit criteria and parallel lines assumptions improved dramatically. all vignette ratings were discarded with a sequence number of 1 or 2 for the entire analysis.
 
5
The rating task in the survey was a five-level ordinal scale (0–4) as is shown in the “Appendix”, however the distribution of the ratings was not normal around the mean. The top three levels (0–2) were combined to create a new scale with three levels coded 1–3. The user was not, however, given an option to answer “I don’t know” or “I need more information.” The user could skip a vignette and continue.
 
6
In order to examine respondent level factors with OLS regression equations for each respondent, a minimum number of ratings per respondents was required. Therefore, all respondents were dropped who answered less than 20 vignettes and removed their ratings from the larger data set of vignette ratings. Therefore, the number of respondents used in this study is 471 (rather than 811) and the total number of vignette rated is 15,108 (rather than 21,187).
 
7
For ordinal variables, the outcome is at or below given outcome Y j . Ordinal dependent variables– such as the traditional Likert scale rating task used here—do not necessarily meet the assumptions required of traditional OLS models (O’Connell 2005; Kennedy, 2003) which impacts analysis below.
 
8
Each respondent equation is based on between 20 and 40 rated vignettes (N = number of vignettes). Each OLS regression equation was performed using clustered and unclustered regression with no significant difference. In addition, neither the undergraduate status or gender were statistically significant determinants of the number of vignettes rated.
 
9
Ideally, experience with each technology platform would also be used here, however, experience with email or Facebook was not collected in the survey. Undergraduate status may be an imprecise proxy for experience with Facebook.
 
Literatur
Zurück zum Zitat Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technology, 4258, 36–58. Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technology, 4258, 36–58.
Zurück zum Zitat Altman, I. (1975). The environment and social behavior. Monterey, CA: Brooks/Cole. Altman, I. (1975). The environment and social behavior. Monterey, CA: Brooks/Cole.
Zurück zum Zitat Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339–370. Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339–370.
Zurück zum Zitat Appelbaum, L. D., Lennon, M. C., & Aber, J. L. (2006). When effort is threatening: The influence of the belief in a just world on Americans’ attitudes toward antipoverty policy. Political Psychology, 27(3), 387–402.CrossRef Appelbaum, L. D., Lennon, M. C., & Aber, J. L. (2006). When effort is threatening: The influence of the belief in a just world on Americans’ attitudes toward antipoverty policy. Political Psychology, 27(3), 387–402.CrossRef
Zurück zum Zitat Awad, N. F., & Krishman, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28. Awad, N. F., & Krishman, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28.
Zurück zum Zitat Calo, M. (2010). People can be so fake: A new dimension to privacy and technology scholarship. Pennsylvania State Law Review, 9, 114. Calo, M. (2010). People can be so fake: A new dimension to privacy and technology scholarship. Pennsylvania State Law Review, 9, 114.
Zurück zum Zitat Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRef Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRef
Zurück zum Zitat Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342.
Zurück zum Zitat Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the Choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687. Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the Choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.
Zurück zum Zitat Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.CrossRef Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80.CrossRef
Zurück zum Zitat Floridi, L. (2006a). Information ethics, its nature and scope. Computers and Society, 36(3), 21–36. Floridi, L. (2006a). Information ethics, its nature and scope. Computers and Society, 36(3), 21–36.
Zurück zum Zitat Floridi, L. (2006b). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8(3), 109–119.CrossRef Floridi, L. (2006b). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8(3), 109–119.CrossRef
Zurück zum Zitat Ganong, L. H., & Coleman, M. (2006). Multiple segment factorial vignette designs. Journal of Marriage and Family, 69(2), 455–468.CrossRef Ganong, L. H., & Coleman, M. (2006). Multiple segment factorial vignette designs. Journal of Marriage and Family, 69(2), 455–468.CrossRef
Zurück zum Zitat Grimmelmann, J. (2010). Privacy as product safety. Widener Law Journal, 19, 793. Grimmelmann, J. (2010). Privacy as product safety. Widener Law Journal, 19, 793.
Zurück zum Zitat Hoofnagle, C. J, King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies? (April 14, 2010). Available at SSRN: http://ssrn.com/abstract=1589864. Hoofnagle, C. J, King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies? (April 14, 2010). Available at SSRN: http://​ssrn.​com/​abstract=​1589864.
Zurück zum Zitat Hui, K., Teo, H., & Sang-Yong, T. L. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33. Hui, K., Teo, H., & Sang-Yong, T. L. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19–33.
Zurück zum Zitat Hull, G., Lipford, H. R., & Latulipe, C. (2010). Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology, 13, 1–37. Hull, G., Lipford, H. R., & Latulipe, C. (2010). Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology, 13, 1–37.
Zurück zum Zitat Jasso, G. (1990). Factorial survey methods for studying beliefs and judgments. Sociology Methods and Research, 34(3), 334–423. Jasso, G. (1990). Factorial survey methods for studying beliefs and judgments. Sociology Methods and Research, 34(3), 334–423.
Zurück zum Zitat Jasso, G. (2006). Factorial survey methods for studying beliefs and judgments. Sociological Methods & Research, 34(3), 334–423.MathSciNetCrossRef Jasso, G. (2006). Factorial survey methods for studying beliefs and judgments. Sociological Methods & Research, 34(3), 334–423.MathSciNetCrossRef
Zurück zum Zitat Jasso, G., & Opp, K. (1997). Probing the character of norms: A factorial survey analysis of the norms of political action. American Sociological Review, 62, 947–964.CrossRef Jasso, G., & Opp, K. (1997). Probing the character of norms: A factorial survey analysis of the norms of political action. American Sociological Review, 62, 947–964.CrossRef
Zurück zum Zitat Johnson, D. (2004). Computer ethics. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computer and information (pp. 65–75). Oxford, UK: Blackwell Publishers Limited. Johnson, D. (2004). Computer ethics. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computer and information (pp. 65–75). Oxford, UK: Blackwell Publishers Limited.
Zurück zum Zitat Kennedy, P. (2003). A guide to econometrics (5th ed.). Cambridge, MA: MIT Press. Kennedy, P. (2003). A guide to econometrics (5th ed.). Cambridge, MA: MIT Press.
Zurück zum Zitat Kuo, F., Lin, C., & Hsu, M. (2007). Assessing gender differences in computer professionals’ self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics, 73(2), 145–160.CrossRef Kuo, F., Lin, C., & Hsu, M. (2007). Assessing gender differences in computer professionals’ self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics, 73(2), 145–160.CrossRef
Zurück zum Zitat Levitt, S. D., & List, J. A. (2007). What do laboratory experiments measuring social preferences reveal about the real world? The Journal of Economic Perspectives, 21(2), 153–174.CrossRef Levitt, S. D., & List, J. A. (2007). What do laboratory experiments measuring social preferences reveal about the real world? The Journal of Economic Perspectives, 21(2), 153–174.CrossRef
Zurück zum Zitat Lynch, J. G. (1982). The role of external validity in theoretical research. Journal of Consumer Research, 10(1), 109–111.CrossRef Lynch, J. G. (1982). The role of external validity in theoretical research. Journal of Consumer Research, 10(1), 109–111.CrossRef
Zurück zum Zitat Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRef Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.CrossRef
Zurück zum Zitat Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social Issues, 33(3), 5–21. Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social Issues, 33(3), 5–21.
Zurück zum Zitat Marwick, A. E., Murgia-Diaz, D., & Palfrey, J. G. (2010). Youth, privacy and reputation (literature review). Berkman Center Research Publication No. 2010-5; Harvard Public Law Working Paper No. 10–29. Available at SSRN: http://ssrn.com/abstract=1588163. Marwick, A. E., Murgia-Diaz, D., & Palfrey, J. G. (2010). Youth, privacy and reputation (literature review). Berkman Center Research Publication No. 2010-5; Harvard Public Law Working Paper No. 1029. Available at SSRN: http://​ssrn.​com/​abstract=​1588163.
Zurück zum Zitat Moor, J. (1985). What is computer ethics? Metaphilosophy, 16(4), 266–275.CrossRef Moor, J. (1985). What is computer ethics? Metaphilosophy, 16(4), 266–275.CrossRef
Zurück zum Zitat Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, September, 27–32. Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, September, 27–32.
Zurück zum Zitat Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158. Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.
Zurück zum Zitat Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Standford, CA: Stanford University Press. Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Standford, CA: Stanford University Press.
Zurück zum Zitat Nock, S., & Gutterbock, T. M. (2010). Survey experiments. In J. Wright & P. Marsden (Eds.), Handbook of survey research (2nd ed., pp. 837–864). Bingley, UK: Emerald Group Publishing Lmtd. Nock, S., & Gutterbock, T. M. (2010). Survey experiments. In J. Wright & P. Marsden (Eds.), Handbook of survey research (2nd ed., pp. 837–864). Bingley, UK: Emerald Group Publishing Lmtd.
Zurück zum Zitat O’Connell, A. A. (2005). Logistic regression models for ordinal response variables. Thousand Oaks, CA: Sage Publications. O’Connell, A. A. (2005). Logistic regression models for ordinal response variables. Thousand Oaks, CA: Sage Publications.
Zurück zum Zitat Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136. Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105–136.
Zurück zum Zitat Posner, R. A. (1981). The economics of privacy. The American Economic Review, 71(2), 405–409. Posner, R. A. (1981). The economics of privacy. The American Economic Review, 71(2), 405–409.
Zurück zum Zitat Rossi, P., & Nock, S. (Eds.). (1982). Measuring social judgments: The factorial survey approach. Beverly Hills, CA: Sage. Rossi, P., & Nock, S. (Eds.). (1982). Measuring social judgments: The factorial survey approach. Beverly Hills, CA: Sage.
Zurück zum Zitat Schoeman, F. (Ed.). (1984). Privacy: Philosophical dimensions of the literature. In Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press. Schoeman, F. (Ed.). (1984). Privacy: Philosophical dimensions of the literature. In Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press.
Zurück zum Zitat Smith, J. H., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015. Smith, J. H., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.
Zurück zum Zitat Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.CrossRef Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167–196.CrossRef
Zurück zum Zitat Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Rev, 154(3), 477.CrossRef Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Rev, 154(3), 477.CrossRef
Zurück zum Zitat Tavani, H. T. (2008). Floridi’s ontological theory of informational privacy: Some implications and challenges. Ethics and Information Technology, 10(2–3), 155–166.CrossRef Tavani, H. T. (2008). Floridi’s ontological theory of informational privacy: Some implications and challenges. Ethics and Information Technology, 10(2–3), 155–166.CrossRef
Zurück zum Zitat Taylor, B. J. (2006). Factorial surveys: Using vignettes to study professional judgment. British Journal of Social Work, 36, 1187–1207.CrossRef Taylor, B. J. (2006). Factorial surveys: Using vignettes to study professional judgment. British Journal of Social Work, 36, 1187–1207.CrossRef
Zurück zum Zitat Thurman, Q. C., Lam, J. A., & Rossi, P. H. (1988). Sorting out the cuckoo’s nest: A factorial survey approach to the study of popular conceptions of mental illness. The Sociological Quarterly, 29(4), 565–588.CrossRef Thurman, Q. C., Lam, J. A., & Rossi, P. H. (1988). Sorting out the cuckoo’s nest: A factorial survey approach to the study of popular conceptions of mental illness. The Sociological Quarterly, 29(4), 565–588.CrossRef
Zurück zum Zitat Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36.CrossRef Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36.CrossRef
Zurück zum Zitat Van de Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In J. Weckert & J. Van de Hoven (Eds.), Information technology and moral philosophy (pp. 301–321). Cambridge: Cambridge University Press. Van de Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In J. Weckert & J. Van de Hoven (Eds.), Information technology and moral philosophy (pp. 301–321). Cambridge: Cambridge University Press.
Zurück zum Zitat Wallander, L. (2009). 25 years of factorial surveys in sociology: A review. Social Science Research, 38, 505–520.CrossRef Wallander, L. (2009). 25 years of factorial surveys in sociology: A review. Social Science Research, 38, 505–520.CrossRef
Zurück zum Zitat Weisband, S. P., & Reinig, B. A. (1995). Managing user perceptions of email privacy. Communications of the ACM, 38(12), 40–47. Weisband, S. P., & Reinig, B. A. (1995). Managing user perceptions of email privacy. Communications of the ACM, 38(12), 40–47.
Zurück zum Zitat Westin, A. (1967). Privacy and freedom. New York: Atheneum. Westin, A. (1967). Privacy and freedom. New York: Atheneum.
Zurück zum Zitat Young, A. L., & Quan-Haase, A. (2009). Information revelation and internet privacy concerns on social network sites: a case study of Facebook. C&T ‘09 Proceedings of the fourth international conference on communities and technologies. Young, A. L., & Quan-Haase, A. (2009). Information revelation and internet privacy concerns on social network sites: a case study of Facebook. C&T ‘09 Proceedings of the fourth international conference on communities and technologies.
Metadaten
Titel
Information technology and privacy: conceptual muddles or privacy vacuums?
verfasst von
Kirsten Martin
Publikationsdatum
01.12.2012
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 4/2012
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-012-9300-3

Weitere Artikel der Ausgabe 4/2012

Ethics and Information Technology 4/2012 Zur Ausgabe