DOI QR코드

DOI QR Code

To Reveal or Conceal? Understanding the Notion of Privacy among Individuals

  • Sana Ansari (Management Information Systems, Indian Institute of Management Raipur) ;
  • Sumeet Gupta (Department of Operations and Systems, Indian Institute of Management Raipur)
  • Received : 2018.03.08
  • Accepted : 2018.10.08
  • Published : 2018.12.31

Abstract

What is individuals' privacy notion, and does it change with the social roles taken up by them? We explored these questions using a qualitative interpretive research approach. We found that individuals have mixed notion of privacy. Individuals view privacy either as a commodity or as a control. Further, we found that an individual's privacy notion is a function of their social role within the society and their privacy preferences. Our research points to the importance of expanding the notion of privacy to encompass a broader understanding of privacy preferences. We theorize our findings using social penetration theory and presents a privacy model which provides the logical framework for interpreting people's views on privacy.

Keywords

References

  1. Altman, I., and Taylor, D. A. (1973). Social penetration: The development of interpersonal relationships. Holt, Rinehart & Winston.
  2. Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
  3. Belanger, F., and Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1042.
  4. Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313-324.
  5. Bennett, C. J. (1995). The political economy of privacy: a review of the literature. Hackensack, NJ: Center for Social and Legal Research.
  6. Bennett, C. J., and Raab, C. D. (1997). The adequacy of privacy: The European Union data protection directive and the North American response. The Information Society, 13(3), 245-264.
  7. Bowie, N. E., and Jamal, K. (2006). Privacy rights on the internet: self-regulation or government regulation? Business Ethics Quarterly, 16(3), 323-342.
  8. Buchmann, J. (2014). Internet Privacy: Options for adequate realisation. Springer Science & Business Media.
  9. Cao, J., and Everard, A. (2008). User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy. Journal of Global Information Technology Management, 11(2), 30-57.
  10. Chellappa, R. K., and Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2-3), 181-202.
  11. Chiu, C.-M., Hsu, M.-H., and Wang, E. T. G. (2006). Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems, 42(3), 1872-1888.
  12. Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.
  13. Culnan, M. J. (1985). The dimensions of perceived accessibility to information: Implications for the delivery of information systems and services. Journal of the American Society for Information Science, 36(5), 302-308.
  14. Culnan, M. J., and Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
  15. Deutsch, M., and Gerard, H. B. (1955). A study of normative and informational social influences upon individual judgment. The Journal of Abnormal and Social Psychology, 51(3), 629-636. https://doi.org/10.1037/h0046408
  16. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
  17. Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., and Carter, C. (2000). Trust and privacy online: Why americans want to rewrite the rules. pew internet & american life project, washington. The Pew Internet and American Life Project, 2, 1-29.
  18. Goodwin, C. (1991). Privacy: Recognition of a consumer right. Journal of Public Policy & Marketing, 149-166.
  19. Hichang, C. (2010). Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies. Journal of Information Privacy and Security, 6(1), 3-27.
  20. Jentzsch, N. (2001). The economics and regulation of financial privacy: A comparative analysis of the United States and Europe. John F. Kennedy Institute For North American Studies. Working Paper, (128).
  21. Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.
  22. Lewis, K., Kaufman, J., and Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1), 79-100.
  23. Lwin, M. O., and Williams, J. D. (2003). A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters, 14(4), 257-272.
  24. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
  25. Margulis, S. T. (2003). Privacy as a social issue and behavioral concept. Journal of Social Issues, 59(2), 243-261.
  26. Mason, R. O. (1986). Four ethical issues of the information age. Mis Quarterly, 5-12.
  27. Milberg, S. J., Smith, H. J., and Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35-57.
  28. Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS Quarterly, 977-988. 
  29. Porter, C. E., and Donthu, N. (2008). Cultivating trust and harvesting value in virtual communities. Management Science, 54(1), 113-128.
  30. Posey, C., Lowry, P. B., Roberts, T. L., and Ellis, T. S. (2010). Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities. European Journal of Information Systems, 19(2), 181-195.
  31. Posey, C., Roberts, T., Lowry, P., Bennett, B., and Courtney, J. (2013). Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors.
  32. Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73.
  33. Smith, H. J. (2001). Information privacy and marketing: What the US should (and shouldn't) learn from Europe. California Management Review, 43(2), 8-33.
  34. Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016.
  35. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 167-196.
  36. Solove, D. J. (2004). The digital person: Technology and privacy in the information age. NY, US: NYU Press.
  37. Solove, D. J. (2008). Understanding privacy. Cambrige, US: Harvard University Press.
  38. Taddicken, M. (2014). The "privacy paradox"in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273.
  39. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Associate for Information Systems, 7(6), 415-444.
  40. Vladlena, B., Saridakis, G., Tennakoon, H., and Ezingeard, J. N. (2015). The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal of Human-Computer Studies, 80, 36-44.
  41. Wang, H., Lee, M. K. O., and Wang, C. (1998). Consumer privacy concerns about Internet marketing. Communications of the ACM, 41(3), 63-70.
  42. Westin, A. F. (1967). Privacy and freedom. New York: Athenaeum.
  43. Whitty, M. T. (2008). Revealing the "real"me, searching for the "actual"you: Presentations of self on an internet dating site. Computers in Human Behavior, 24(4), 1707-1723.