Overcoming Online information privacy concerns: An information-processing theory approach

被引:292
作者
Hann, Il-Horn [1 ]
Hui, Kai-Lung
Lee, Sang-Yong Tom
Png, Ivan P. L.
机构
[1] Univ So Calif, Marshall Sch Business, Los Angeles, CA 90089 USA
[2] City Univ Hong Kong, Fac Business, Dept Informat Syst, Kowloon, Peoples R China
[3] Hanyang Univ, Coll Informat & Commun, Seoul 133791, South Korea
[4] Natl Univ Singapore, Singapore 117548, Singapore
关键词
conjoint analysis; expectancy theory; financial reward; information privacy; online privacy; segmentation; EMPLOYEE PERCEPTIONS; CONJOINT-MEASUREMENT; MANAGEMENT; ATTITUDES; DECISION; INVASION; EXPLAIN; SYSTEMS; VALUES; MODEL;
D O I
10.2753/MIS0742-1222240202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet has made the transmission of personally identifiable information more common and often unintended by the user. As personal information becomes more accessible, individuals worry that businesses misuse the information that is collected while they are online. Organizations have tried to mitigate this concern in two ways: (1) by offering privacy policies regarding the handling and use of personal information and (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information-processing theory of motivation. Information-processing theories, also known as expectancy theories in the context of motivated behavior, are built on the premise that people process information about behavior-outcome relationships. By doing so, they are forming expectations and making decisions about what behavior to choose. Using an experimental setting, we empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In a conjoint analysis exercise, 268 participants from the United States and Singapore face trade-off situations, where an organization may only offer incomplete privacy protection or some benefits. While privacy protections (against secondary use, improper access, and error) are associated with positive valences, we also find that financial gains and convenience can significantly increase individuals' motivational score of registering with a Web site. We find that benefits-monetary reward and future convenience-significantly affect individuals' preferences over Web sites with differing privacy policies. We also quantify the value of Web site privacy protection. Among U.S. subjects, protection against errors, improper access, and secondary use of personal information is worth $30.49-$44.62. Finally, our approach also allows us to identify three distinct segments of Internet users-privacy guardians, information sellers, and convenience seekers.
引用
收藏
页码:13 / 42
页数:30
相关论文
共 67 条
[1]   ORTHOGONAL MAIN-EFFECT PLANS FOR ASYMMETRICAL FACTORIAL EXPERIMENTS [J].
ADDELMAN, S .
TECHNOMETRICS, 1962, 4 (01) :21-+
[2]  
*ANDREWS S, 2000, PUBL BARR EL COMM
[3]  
[Anonymous], PERSONALIZATION VERS
[4]  
[Anonymous], 1980, GUID PROT PRIV TRANS
[5]  
BARBARO M, 2006, NY TIMES 0809
[6]  
BHARGAVA HK, 2002, 1 SIZE FITS ALL OPTI
[7]   Poaching and the misappropriation of information: Transaction risks of information exchange [J].
Clemons, EK ;
Hitt, LM .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2004, 21 (02) :87-107
[8]   Fabry Perot polymer film fibre-optic hydrophones and arrays for ultrasound field characterisation [J].
Cox, BT ;
Zhang, EZ ;
Laufer, JG ;
Beard, PC .
AMUM 2004: ADVANCED METROLOGY FOR ULTRASOUND IN MEDICINE 2004, 2004, 1 :32-37
[9]   Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation [J].
Culnan, MJ ;
Armstrong, PK .
ORGANIZATION SCIENCE, 1999, 10 (01) :104-115
[10]   HOW DID THEY GET MY NAME - AN EXPLORATORY INVESTIGATION OF CONSUMER ATTITUDES TOWARD SECONDARY INFORMATION USE [J].
CULNAN, MJ .
MIS QUARTERLY, 1993, 17 (03) :341-361