Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy ...and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.
As concerns about personal information privacy (PIP) continue to grow, an increasing number of studies have empirically investigated the phenomenon. However, researchers are not well informed about ...the shift of PIP research trends with time. In particular, there is a lack of understanding of what constructs have been studied in what contexts. As a result, researchers may design their study without sufficient guidance. This problem can lead to unproductive efforts in advancing PIP research. Therefore, it is important and timely to review prior PIP research to enhance our understanding of how it has evolved. We are particularly interested in understanding the chronological changes in contexts and research constructs studied. We use a chronological stage model of PIP research we develop, a set of contextual variables identified from prior literature, and the four-party PIP model suggested by Conger et al. (2013) as theoretical foundations to conduct a chronological literature review of empirical PIP concern studies. We find several PIP research trends during the last two decades, such as the quantity of PIP research has drastically increased; the variety of contexts and research constructs being studied has increased substantially; and many constructs have been studied only once while only a few have been repeatedly studied. We also find that the focus of PIP research has shifted from general/unspecified contexts to specific ones. We discuss the contributions of the study and recommendations for future research directions. We propose a fifth party as an emergent player in the ecosystem of PIP and call for future research that investigates it.
Mobile health (m‐health) technologies offer many benefits to individuals, organizations, and health professionals alike. Indeed, the utilization of m‐health by older adults can foster the development ...of proactive patients, while also reducing financial burden and resource pressures on health systems. However, the potentially transformative influence of m‐health is limited, as many older adults resist adoption leading to the emergence of an age‐based digital divide. This study leverages protection motivation theory and social cognitive theory to explore the factors driving resistance among older adults. This mixed methods study integrates survey findings with insights from qualitative interviews to highlight that the m‐health digital divide is deepening due to older adults' perceived inability to adopt and their unwillingness to adopt stemming from mistrust, high risk perceptions, and strong desire for privacy. The paper contributes to the privacy and social inclusion literature by demonstrating that while many older adults have access to m‐health, they are currently excluded and require careful consideration by technology organizations and researchers. The study provides recommendations for narrowing the m‐health digital divide through inclusive design and educational efforts to improve self‐efficacy, develop privacy literacy, and build trust, thereby ensuring that older citizens are both capable and willing to adopt.
•The focus of the study is on mobile users’ information privacy concerns.•We analyze the role of app permission requests regarding privacy concerns.•Other factors are prior privacy experience, ...computer anxiety, and perceived control.•We surveyed 775 mobile users and conducted structural equation modeling.•Results show that the impact of app permission concerns outweighs all other factors.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers.
Contact tracing is a key public health intervention during the coronavirus pandemic. While government contact tracing apps (e.g., COVIDSafe) may enforce personal information protection, privacy ...concerns remain among citizens. To date, few studies have investigated the adoption of contact tracing technology and corresponding citizen information privacy concerns. To address this gap, we propose a research model to explore the impact of individual privacy concerns, trust, and risk perceptions on citizen's willingness to download a federal contact tracing app. To test the model, we administer a survey to Australian citizens to assess their perceptions of the government's "COVIDSafe" app. The results of this study indicate that relative advantage, compatibility and trusting beliefs increase adoption intentions. The study provides recommendations for governments tackling COVID-19 and guidance for contact tracing strategies in preparation for future pandemics.
Video conferencing (VC) applications (apps) have surged in popularity as an alternative to face-to-face communications. Although VC apps offer myriad benefits, it has caught much media attention ...owing to concerns of privacy infringements. This study examines the key determinants of professionals’ attitude and intentions to use VC apps in the backdrop of this conflicting duality. A conceptual research model is proposed based on theoretical foundations of privacy calculus and extended with conceptualizations of mobile users’ information privacy concerns (MUIPC), trust, technicality, ubiquity, as well as theoretical underpinnings of social presence theory. Structural equation modeling is used to empirically test the model using data collected from 484 professionals. The study offers insights regarding the trade-offs that professionals are willing to make in the face of information privacy concerns associated with VC apps. Based on the findings, the study emphasizes the promotion of privacy protection at the organizational level, control mechanisms that motivate employees to actively engage in privacy protection behavior, and a multi-faceted approach for data transparency within the VC app platforms.
•Privacy concerns around the use of video conferencing (VC) apps are on the rise.•Professional’s use of VC apps despite its associated privacy risks is evaluated.•A research model is proposed and tested with data collected from 484 professionals.•Insights on the role of contradicting beliefs in the use of VC apps is provided.•Key recommendations pivotal to organizations and service providers are presented.
Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the ...Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its factor structure. Based on the multidimensional developmental theory and a review of the prior literature, we identify alternative conceptualizations of IPC. We examine the various conceptualizations of IPC with four online surveys involving nearly 4,000 Internet users. As a baseline, study 1 compares the integrated conceptualization of IPC to two existing conceptualizations in the literature. While the results provide support for the integrated conceptualization, the second-order factor model does not outperform the correlated first-order factor model. Study 2 replicates the study on a different sample and confirms the results of study 1. We also investigate whether the prior results are affected by the different perspectives adopted in the wording of items in the original instruments. In study 3, we find that focusing on one's concern for website behavior (rather than one's expectation of website behavior) and adopting a consistent perspective in the wording of the items help to improve the validity of the factor structure. We then examine the hypothesized third-order conceptualizations of IPC through a number of alternative higher-order models. The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives. In addition, the conceptualization of IPC that has the best fit with the data contains a third-order general IPC factor, two second-order factors of interaction management and information management, and six first-order factors (i.e., collection, secondary usage, errors, improper access, control, and awareness). Study 4 cross-validates the results with another data set and examines IPC within the context of a nomological network. The results confirm that the third-order conceptualization of IPC has nomological validity, and it is a significant determinant of both trusting beliefs and risk beliefs. Our research helps to resolve inconsistencies in the key underlying dimensions of IPC, the factor structure of IPC, and the wording of the original items in prior instruments of IPC. Finally, we discuss the implications of this research.
This study explores the relationship between individuals' demographic characteristics and information privacy concerns (IPC) using panel data from the Korea Information Society Development Institute ...(KISDI) that has collected a large sample from 7809 respondents. Its goal is to address the gaps in existing information privacy literature that focuses mainly on behavioral determinants of IPC and thus has not paid much attention to the direct examination of the relationship between demographic characteristics of individuals and IPC. A few relevant studies that focus on such a relationship have produced inconsistent results. In our study, we found that while the effects of educational attainment, income level, and marriage are in line with existing studies, the effects of gender and age are at odds with existing studies. The main contribution of this study is to confirm the results of previous studies with a large sample and enables the generalization of empirical findings. In addition, the results that are in contrast to the literature can generate new research avenue.
•We investigate the relationship between consumers’ demographic characteristics and information privacy concerns.•There is a nonlinear relationship between age and information privacy concerns.•Gender affects information privacy concerns differently by age.•We confirmed that the effect of income and education on IPC are inline with the previous studies.
Since working from home has become a new norm for many individuals worldwide, digital-conferencing tools have increased in popularity. To date, few studies have investigated how the adoption of ...digital-conferencing tools relates to user information privacy concerns against security incidents and coping appraisal. This paper utilizes an integrated IUIPC and Privacy Calculus model to explore the impact of privacy concerns, incident response efficacy, trust, and risk involved in digital conferencing adoption. To test the proposed model, we administer a survey to 212 participants and find that perceived benefits, trusting beliefs, and personal Internet interest increase intention to use digital conferencing software while risk beliefs decrease behavioral intentions. In addition, we find incident response efficacy to be a salient construct in explaining users’ trusting beliefs. The study provides recommendations for digital conferencing service providers on how to improve consumer adoption through strengthened security practices and incident response strategies.
According to the increase in electricity consumption in residential buildings, advanced metering infrastructures (AMIs) have been widely installed in residential buildings. AMIs help households to ...monitor and reduce their electricity consumption. Although the usefulness of AMIs has been validated, there still exist several barriers to their widespread use. This study considers household’s information privacy concerns (IPCs) and perceived electricity usage habits (PEUHs) as barriers to AMI penetration. AMI data on electricity usage may reveal extensive information about households, such as indoor behaviors and appliance types. This information may cause households to be concerned about invasion of privacy, and such concerns may affect AMI usage intentions. In terms of PEUHs, electric power companies argue that households with undesirable electricity usage habits, such as large amount of electricity usage with unpredictable usage patterns, are prospective AMI customers. This study develops IPCs and PEUHs scales and conducts a path analysis based on the framework of technology acceptance model to validate the influence of IPCs and PEUHs on AMI usage intention. The identified effects of IPCs and PEUHs on AMI usage intention are expected to provide practical information for understanding how IPCs and PEUHs influence AMI usage intention from the perspective of households.
Display omitted
•This study examines the influence of two key factors on the usage intention of AMIs.•Information privacy concerns negatively affect usage intention.•Perceived electricity usage habits positively affect perceived usefulness.•The effects are validated by an empirical analysis using household survey data.•The analysis results provide managerial implications for AMI penetration.