•Identifies the Starbucks Effect - the positive effect of identifying an order by name (vs. number).•The effect is due to a decrease in customers’ sense of objectification.•The effect is mitigated ...when consumers highly value privacy or need privacy protection.•The effect is mitigated when such identification is less likely to decrease a sense of objectification.•Retailers can decrease customers’ sense of objectification with operational tactics (name-based identification).
Retailers traditionally use a number system to match a product or service to a customer, ensuring that the customer receives the right product (e.g., a specific hot drink). However, some retailers have started to match an order by using a customer's name. Six studies, including an incentive-compatible experiment and field study, examine whether, when, and why order identification by a customer's name can either benefit or harm retailers. In contrast to prior research suggesting a negative effect of using a customer's name in marketing communications (e.g., online ads), the current research demonstrates a positive effect of identifying an order by name, which we refer to as the “Starbucks effect.” This positive effect, however, is mitigated or even backfires under specific circumstances. The results suggest that managers can use customers’ names while avoiding the use of numbers to increase customer preference for stores and service satisfaction, but with caution, especially in situations where privacy concerns may arise, even when the customer is only asked for their first name and could provide a fake name.
Privacy threats in a social media-enabled application (app) can originate from either the institution or other app users. Although privacy in social media is well studied, the role of social (peer) ...privacy concerns is largely unknown and most privacy studies on mobile apps focus on initial adoption and ignore long-term behavioral outcomes. Drawing on the privacy calculus theory, this study examines the impact of both institutional and social privacy concerns on long-term user engagement with social media-enabled apps. Findings from the analysis of 354 survey responses reveal that both institutional and social privacy concerns decrease engagement. Regarding the antecedents, the perceived sensitivity of information increases institutional privacy concerns. However, social privacy concerns are influenced by the perception of risk and control. Moreover, while the impacts of social and enjoyment benefits are expectedly positive, the perception of efficiency benefits decreases engagement. These findings are further investigated and validated through a follow-up text analysis study, suggesting that users who enjoy the functionality of these apps are more likely to express social privacy concerns and minimize their engagement. This study contributes to the literature of privacy on mobile apps by unraveling the intricate dynamics of privacy concerns and benefits in the social mobile era.
•Privacy risk is positively related to social privacy concerns.•Privacy control is negatively related to social privacy concerns.•Information sensitivity is positively related to institutional privacy concerns.•Institutional privacy concerns are negatively related to engagement.•Social privacy concerns are negatively related to engagement.
Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the ...Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its factor structure. Based on the multidimensional developmental theory and a review of the prior literature, we identify alternative conceptualizations of IPC. We examine the various conceptualizations of IPC with four online surveys involving nearly 4,000 Internet users. As a baseline, study 1 compares the integrated conceptualization of IPC to two existing conceptualizations in the literature. While the results provide support for the integrated conceptualization, the second-order factor model does not outperform the correlated first-order factor model. Study 2 replicates the study on a different sample and confirms the results of study 1. We also investigate whether the prior results are affected by the different perspectives adopted in the wording of items in the original instruments. In study 3, we find that focusing on one's concern for website behavior (rather than one's expectation of website behavior) and adopting a consistent perspective in the wording of the items help to improve the validity of the factor structure. We then examine the hypothesized third-order conceptualizations of IPC through a number of alternative higher-order models. The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives. In addition, the conceptualization of IPC that has the best fit with the data contains a third-order general IPC factor, two second-order factors of interaction management and information management, and six first-order factors (i.e., collection, secondary usage, errors, improper access, control, and awareness). Study 4 cross-validates the results with another data set and examines IPC within the context of a nomological network. The results confirm that the third-order conceptualization of IPC has nomological validity, and it is a significant determinant of both trusting beliefs and risk beliefs. Our research helps to resolve inconsistencies in the key underlying dimensions of IPC, the factor structure of IPC, and the wording of the original items in prior instruments of IPC. Finally, we discuss the implications of this research.
The COVID-19 pandemic has disrupted the customers habits of purchasing as well as shopping behaviours. This study seeks to develop an integrated model of the critical role of trust and privacy ...concerns in influencing consumers purchase behaviour through social media. It also explored the moderating role of COVID-19 on these relationships. Quantitative data were collected using survey strategy through questionnaires to address different levels of the study. Our proposed model was tested with 1,200 consumers, 600 prior to COVID-19 and 600 during COVID-19. Partial Least Squares Structural Equation Modelling was conducted to assess the hypotheses. The findings revealed that purchase intention depends on trust and privacy concerns. Information quality, security concerns, ease of use, privacy/security assurance seal, and disposition to third party certification are the main drivers of trust and privacy concerns. Furthermore, our proposed model during COVID-19 period has higher explanator power (R2 = 0.741) than before COVID-19 period (R2 = 0.603 and consumers buying behaviour has been increased during COVID-19. The results offer important implications for retailers and are likely to stimulate further research in the area of purchase behaviour through social media.
Display omitted
•The main uses of the data-driven innovation strategies used by companies and their link to the privacy of users are reviewed.•Seven data-driven based topics were found as the main factor to ...determine next studies in this area of research.•A research agenda on user-generated data analysis using data-driven innovation and preserving user’s privacy are presented.•Our results highlight the urgent need to better understand data-driven innovation strategies that could affect user privacy.
In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. Therefore, the present study aims to provide a comprehensive understanding of the main challenges related to user privacy that affect DDI. The methodology used in the present study unfolds in the following three phases; (i) a systematic literature review (SLR); (ii) in-depth interviews framed in the perspectives of UGD and DDI on user privacy concerns, and finally, (iii) topic-modeling using a Latent Dirichlet allocation (LDA) model to extract insights related to the object of study. Based on the results, we identify 14 topics related to the study of DDI and UGD strategies. In addition, 14 future research questions and 7 research propositions are presented that should be consider for the study of UGD, DDI and user privacy in digital markets. The paper concludes with an important discussion regarding the role of user privacy in DDI in digital markets.
•UTUAT2 is modified by replacing price value by perceived value.•UTAUT2 is extended with constructs from the privacy calculus.•Perceived expectancy and perceived privacy concerns influence perceived ...value.•Hedonic motivation and perceived value influence intention to use.•Personal innovativeness has a weak moderating effect.
Consumers can conduct mobile commerce via their smartphones. They can search for products and when ready, they pay and have the products delivered to their homes. By sharing personal information, they receive faster and more customized service. Because of the risk of loss of privacy, consumers need to balance their privacy concerns against the perceived value of enhanced mobile commerce. In this empirical study, the unified theory of acceptance and use of technology (UTAUT2) is modified where perceived value replaces price value to represent the value of an IT artifact that has no direct costs attributable to it. The framework is extended to include constructs from the privacy calculus. In addition, the construct of personal innovativeness is added as a moderator with the anticipation that owners of smartphones who are more personally innovative will be more willing to share information. From an empirical study of Canadian smartphone owners, the results show that perceived privacy concerns influence perceived value and that intention to use is significantly influenced by hedonic motivation and perceived value.
Privacy concerns in smart cities van Zoonen, Liesbet
Government information quarterly,
July 2016, 2016-07-00, Volume:
33, Issue:
3
Journal Article
Peer reviewed
Open access
In this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, ...visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people's privacy concerns differ according to the purpose for which data is collected, with the contrast between service and surveillance purposes most paramount. These two dimensions produce a 2×2 framework that hypothesizes which technologies and data-applications in smart cities are likely to raise people's privacy concerns, distinguishing between raising hardly any concern (impersonal data, service purpose), to raising controversy (personal data, surveillance purpose). Specific examples from the city of Rotterdam are used to further explore and illustrate the academic and practical usefulness of the framework. It is argued that the general hypothesis of the framework offers clear directions for further empirical research and theory building about privacy concerns in smart cities, and that it provides a sensitizing instrument for local governments to identify the absence, presence, or emergence of privacy concerns among their citizens.
Display omitted
•Discussion of arguments for including people’s privacy concerns in research, policy and design of smart cities.•Thorough review of current research about people’s privacy concerns and the paradoxes that typify them.•People’s concerns are shown as structured by how they perceive city data, and for which purpose they feel this data is used.•Framework to assess if and how specific technologies and data-usage in smart cities will evoke people’s privacy concerns.•Clear directions for further academic research about people’s privacy concerns in smart cities.•Sensitizing instrument for policymakers and operational managers about privacy concerns among their citizens.
Ever since empirical studies found only a weak, if any, relationship between privacy concerns and privacy behavior, scholars have struggled to explain the so-called privacy paradox. Today, a number ...of theoretical arguments illuminate users’ privacy rationales, including the privacy calculus, privacy literacy, and contextual differentiations. A recent approach focuses on user resignation, apathy, or fatigue. In this piece, we concentrate on privacy cynicism, an attitude of uncertainty, powerlessness, mistrust, and resignation toward data handling by online services that renders privacy protection subjectively futile. We discuss privacy cynicism in the context of data capitalism, as a coping mechanism to address the tension between digital inclusion and a desire for privacy. Moreover, we introduce a measure for privacy cynicism and investigate the phenomenon based on a large-scale survey in Germany. The analysis highlights the multidimensionality of the construct, differentiating its relationships with privacy concerns, threat experience, Internet skills, and protection behavior.