Exploring User Attitude to Information Privacy

Seung Ik Baek, Duk Sun Choi

Abstract


As many companies have been interested in big data, they have invested a lot of resources to get more customer data. Some companies try to trade the data illegally. In order to collect more customer data, companies provide various incentive programs to customers. However, their results are normally much less than their expectations. This study focuses on exploring the relative importance of the factors which influence customer attitudes to providing his/her personal information. This study conducts a conjoint analysis to assess trade-offs among the five influential factors-monetary reward, concern for data collection, concern for secondary use, concern for unauthorized use, and concern for errors. This study finds that the customer attitude to providing personal information is most influenced by the concern for secondary use. Furthermore, it shows that there are some differences between the light internet user group and the heavy internet user group in the relative importances of these factors. The monetary rewards appeal to the heavy internet users, rather than the light internet users.


Full Text:

PDF

References


Ackermann, T., Widjaja, T., Benlian, A., and Buxmann, P., “Perceived IT Security Risks of Cloud Computing : Conceptualization and Scale Development,” Proceedings of International Conference of Information Systems, 2012.

Bélanger, F. and Crossler, R. E., “Privacy in the digital age : a review of information privacy research in information systems,” MIS quarterly, Vol. 35, No. 4, pp. 1017-1042, 2011.

Culnan, M. J., “How did they get my name? : An exploratory investigation of consumer attitudes toward secondary information use,” MIS Quarterly, Vol. 17, No. 2, pp. 341-363, 1993.

Culnan, M. J. and Bies, R. J., “Consumer privacy : Balancing economic and justice considerations,” Journal of Social Issues, Vol. 59, No. 2, pp. 323-342, 2003.

Esrock, S. L. and Ferre, J. P., “A Dichotomy of Privacy : Personal and Professional Attitudes of Marketers,” Business and Society Review, Vol. 104, No. 1, pp. 107-120, 1999.

Green, P. E., Carroll, D., and Goldberg, S. M., “A general approach to product design optimization via conjoint analysis,” Journal of Marketing, Vol. 45, pp. 17-37, 1981.

Green, P. E. and Rao, V., “Conjoint measurement for quantifying judgemental data,” Journal of Marketing Research, Vol. 8, pp. 355-363, 1971.

Green, P. E. and Srinivasan, V., “Conjoint analysis in consumer research : issues and outlook,” Journal of Consumer Research, Vol. 5, pp. 103-123, 1978.

Green, P. E. and Srinivasan, V., “Conjoint analysis in marketing : new developments with implications for research and practice,” Journal of Marketing, Vol. 54, pp. 3-19, 1990.

Hann, I., Hui, K., Lee, T., and Png, I., “Online Information Privacy : Measuring the Cost-Benefit Trade-Off,” Proceedings of International Conference on Information Systems, 2002.

Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M., “Privacy as information access and illusory control : The case of the Facebook News Feed privacy outcry,” Electronic Commerce Research and Applications, Vol. 9, No. 1, pp. 50-60, 2010.

Ji, H. and Cho, W., “Attribute Analysis for Cellular Phone using Conjoint Analysis,” Journal of the Korean Data and Information Science Society, Vol. 20, No. 4, pp. 695-703, 2009.

Krasnova, H., Hildebrand, T., and Guenther, O., “Investigating the value of privacy in online social networks : conjoint analysis,” Proceedings of International Conference on Information Systems, 2002.

Lee, J., Lee, M., and Choi, H., “Conjoint Analysis of Online Content : A Case of Video on Demand Service,” The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 89-102, 2007.

Lee, Z., Choi, H., and Choi, S., “Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance,” The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 37-51, 2007.

Li, T. and Slee, T., “The Effects of Information Privacy Concerns on Digitizing Personal Health Records,” Journal of the Association for Information Science and Technology, Vol. 65, No. 8, pp. 1541-1554, 2014.

Lim, J., Park, H., and Kang, M., Marketing Research Methodology, Bobmunsa, Seoul, Korea, 2001.

Malhotra, N. K., Kim, S. S., and Agarwal, J., “Internet users’ information privacy concerns(IUIPC) : the construct, the scale, and a causal model,” Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004.

Milberg, S. J., Burke, S. J., and Smith, H. J., and Kallman, E. A., “Values, personal information privacy concerns, and regulatory approaches,” Communications of ACM, Vol. 38, No. 12, pp. 65-74, 1995.

Phelps, J., Nowak, G., and Ferrell, E., “Privacy Concerns and Consumer Willingness to Provide Personal Information,” Journal of Public Policy and Marketing, Vol. 19, No. 1, pp. 27-41, 2000.

Ratcliffe, J., “The use of conjoint analysis to elicit willingness-to-pay values,” International Journal of Technology Assessment in Health Care, Vol. 16, No. 1, pp. 270-290, 2000.

Smith, H. J., Milberg, J. S., and Burke, S. J., “Information Privacy : Measuring Individuals’ Concerns About Organizational Practices,” MIS Quarterly, Vol. 20, No. 2, pp. 167-196, 1996.

Stewart, K. and Segars, A. H., “An Empirical Examination of the Concern for Information Privacy Instrument,” Information Systems Research, Vol. 13, No. 1, pp. 36-49, 2002.

Westin, A., “Opinion Surveys : What Consumers Have To Say About Information Privacy,” Testimony before U. S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade and Consumer Protection, May 8, 2001.


Refbacks

  • There are currently no refbacks.