DOI QR코드

DOI QR Code

To Reveal or Conceal? Understanding the Notion of Privacy among Individuals

  • Sana Ansari (Management Information Systems, Indian Institute of Management Raipur) ;
  • Sumeet Gupta (Department of Operations and Systems, Indian Institute of Management Raipur)
  • Received : 2018.03.08
  • Accepted : 2018.10.08
  • Published : 2018.12.31

Abstract

What is individuals' privacy notion, and does it change with the social roles taken up by them? We explored these questions using a qualitative interpretive research approach. We found that individuals have mixed notion of privacy. Individuals view privacy either as a commodity or as a control. Further, we found that an individual's privacy notion is a function of their social role within the society and their privacy preferences. Our research points to the importance of expanding the notion of privacy to encompass a broader understanding of privacy preferences. We theorize our findings using social penetration theory and presents a privacy model which provides the logical framework for interpreting people's views on privacy.

Keywords

References

  1. Altman, I., and Taylor, D. A. (1973). Social penetration: The development of interpersonal relationships. Holt, Rinehart & Winston.
  2. Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150. https://doi.org/10.1016/j.dss.2010.01.010
  3. Belanger, F., and Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1042. https://doi.org/10.2307/41409971
  4. Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313-324. https://doi.org/10.1080/01972240490507956
  5. Bennett, C. J. (1995). The political economy of privacy: a review of the literature. Hackensack, NJ: Center for Social and Legal Research.
  6. Bennett, C. J., and Raab, C. D. (1997). The adequacy of privacy: The European Union data protection directive and the North American response. The Information Society, 13(3), 245-264. https://doi.org/10.1080/019722497129124
  7. Bowie, N. E., and Jamal, K. (2006). Privacy rights on the internet: self-regulation or government regulation? Business Ethics Quarterly, 16(3), 323-342. https://doi.org/10.5840/beq200616340
  8. Buchmann, J. (2014). Internet Privacy: Options for adequate realisation. Springer Science & Business Media.
  9. Cao, J., and Everard, A. (2008). User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy. Journal of Global Information Technology Management, 11(2), 30-57. https://doi.org/10.1080/1097198X.2008.10856466
  10. Chellappa, R. K., and Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2-3), 181-202. https://doi.org/10.1007/s10799-005-5879-y
  11. Chiu, C.-M., Hsu, M.-H., and Wang, E. T. G. (2006). Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems, 42(3), 1872-1888. https://doi.org/10.1016/j.dss.2006.04.001
  12. Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67. https://doi.org/10.1145/293411.293475
  13. Culnan, M. J. (1985). The dimensions of perceived accessibility to information: Implications for the delivery of information systems and services. Journal of the American Society for Information Science, 36(5), 302-308. https://doi.org/10.1002/asi.4630360504
  14. Culnan, M. J., and Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115. https://doi.org/10.1287/orsc.10.1.104
  15. Deutsch, M., and Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. The Journal of Abnormal and Social Psychology, 51(3), 629-636. https://doi.org/10.1037/h0046408
  16. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
  17. Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., and Carter, C. (2000). Trust and privacy online: Why americans want to rewrite the rules. pew internet & american life project, washington. The Pew Internet and American Life Project, 2, 1-29.
  18. Goodwin, C. (1991). Privacy: Recognition of a consumer right. Journal of Public Policy & Marketing, 149-166.
  19. Hichang, C. (2010). Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies. Journal of Information Privacy and Security, 6(1), 3-27. https://doi.org/10.1080/15536548.2010.10855879
  20. Jentzsch, N. (2001). The economics and regulation of financial privacy: A comparative analysis of the United States and Europe. John F. Kennedy Institute For North American Studies. Working Paper, (128).
  21. Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. https://doi.org/10.1016/j.cose.2015.07.002
  22. Lewis, K., Kaufman, J., and Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1), 79-100. https://doi.org/10.1111/j.1083-6101.2008.01432.x
  23. Lwin, M. O., and Williams, J. D. (2003). A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters, 14(4), 257-272. https://doi.org/10.1023/B:MARK.0000012471.31858.e5
  24. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
  25. Margulis, S. T. (2003). Privacy as a social issue and behavioral concept. Journal of Social Issues, 59(2), 243-261. https://doi.org/10.1111/1540-4560.00063
  26. Mason, R. O. (1986). Four ethical issues of the information age. Mis Quarterly, 5-12.
  27. Milberg, S. J., Smith, H. J., and Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35-57. https://doi.org/10.1287/orsc.11.1.35.12567
  28. Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS Quarterly, 977-988. 
  29. Porter, C. E., and Donthu, N. (2008). Cultivating trust and harvesting value in virtual communities. Management Science, 54(1), 113-128. https://doi.org/10.1287/mnsc.1070.0765
  30. Posey, C., Lowry, P. B., Roberts, T. L., and Ellis, T. S. (2010). Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities. European Journal of Information Systems, 19(2), 181-195. https://doi.org/10.1057/ejis.2010.15
  31. Posey, C., Roberts, T., Lowry, P., Bennett, B., and Courtney, J. (2013). Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors.
  32. Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73. https://doi.org/10.1509/jppm.19.1.62.16949
  33. Smith, H. J. (2001). Information privacy and marketing: What the US should (and shouldn't) learn from Europe. California Management Review, 43(2), 8-33. https://doi.org/10.2307/41166073
  34. Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. https://doi.org/10.2307/41409970
  35. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 167-196.
  36. Solove, D. J. (2004). The digital person: Technology and privacy in the information age. NY, US: NYU Press.
  37. Solove, D. J. (2008). Understanding privacy. Cambrige, US: Harvard University Press.
  38. Taddicken, M. (2014). The "privacy paradox"in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273. https://doi.org/10.1111/jcc4.12052
  39. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Associate for Information Systems, 7(6), 415-444. https://doi.org/10.17705/1jais.00092
  40. Vladlena, B., Saridakis, G., Tennakoon, H., and Ezingeard, J. N. (2015). The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal of Human-Computer Studies, 80, 36-44.
  41. Wang, H., Lee, M. K. O., and Wang, C. (1998). Consumer privacy concerns about Internet marketing. Communications of the ACM, 41(3), 63-70. https://doi.org/10.1145/272287.272299
  42. Westin, A. F. (1967). Privacy and freedom. New York: Athenaeum.
  43. Whitty, M. T. (2008). Revealing the "real"me, searching for the "actual"you: Presentations of self on an internet dating site. Computers in Human Behavior, 24(4), 1707-1723.  https://doi.org/10.1016/j.chb.2007.07.002