journal article Dec 01, 2011

Information Privacy Research: an Interdisciplinary Review1

MIS Quarterly Vol. 35 No. 4 pp. 989-A27 · MIS Quarterly
Abstract
To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we classify previous literature in two ways: (1) using an ethics-based nomenclature of normative, purely descriptive, and empirically descriptive, and (2) based on their level of analysis: individual, group, organizational, and societal.
Based upon our analyses via these two classification approaches, we identify three major areas in which previous research contributions reside: the conceptualization of information privacy, the relationship between information privacy and other constructs, and the contextual nature of these relationships.
As we consider these major areas, we draw three overarching conclusions. First, there are many theoretical developments in the body of normative and purely descriptive studies that have not been addressed in empirical research on privacy. Rigorous studies that either trace processes associated with, or test implied assertions from, these value-laden arguments could add great value. Second, some of the levels of analysis have received less attention in certain contexts than have others in the research to date. Future empirical studies—both positivist and interpretive—could profitably be targeted to these under-researched levels of analysis. Third, positivist empirical studies will add the greatest value if they focus on antecedents to privacy concerns and on actual outcomes. In that light, we recommend that researchers be alert to an overarching macro model that we term APCO (Antecedents → Privacy Concerns → Outcomes).
Topics

No keywords indexed for this article. Browse by subject →

References
221
[1]
Ackerman "Privacy in Pervasive Environments: Next Generation Labeling Protocols" Personal and Ubiquitous Computing (2004) 10.1007/s00779-004-0305-8
[2]
Acquisti "Privacy in Electronic Commerce and the Economics of Immediate Gratification" (2004)
[3]
Acquisti "Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook" (2006)
[4]
Acquisti "Privacy and Rationality in Individual Decision Making" IEEE Security & Privacy (2005) 10.1109/msp.2005.22
[5]
Acquisti "Uncertainty, Ambiguity and Privacy" (2005)
[6]
Acquisti "Conditioning Prices on Purchase History" Marketing Science (2005) 10.1287/mksc.1040.0103
[7]
Alderman (1997)
[8]
Allen "Workplace Surveillance and Managing Privacy Boundaries" Management Communication Quarterly (2007) 10.1177/0893318907306033
[9]
Altman (1975)
[10]
Altman "Privacy Regulation: Culturally Universal or Culturally Specific?" Journal of Social Issues (1977) 10.1111/j.1540-4560.1977.tb01883.x
[11]
Andrade "Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Brand Reputation" (2002)
[12]
Ariss "Computer Monitoring: Benefits and Pitfalls Facing Management" Information & Management (2002) 10.1016/s0378-7206(01)00121-5
[13]
Ashworth "Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers Online Privacy Concerns" Journal of Business Ethics (2006) 10.1007/s10551-006-9007-7
[14]
Awad "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personali-zation" MIS Quarterly (2006) 10.2307/25148715
[15]
Bansal "The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation" (2008)
[16]
Bansal "The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online" Decision Support Systems (2010) 10.1016/j.dss.2010.01.010
[17]
Belanger "Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes" Journal of Strategic Information Systems (2002) 10.1016/s0963-8687(02)00018-5
[18]
Bellman "International Differences in Information Privacy Concerns: A Global Survey of Consumers" Information Society (2004) 10.1080/01972240490507956
[19]
Bennett (1992) 10.7591/9781501722134
[20]
Bennett (1995)
[21]
Bennett "The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response" Information Society (1997) 10.1080/019722497129124
[22]
Benson "A Field Study of End User Computing: Findings and Issues" MIS Quarterly (1983) 10.2307/248745
[23]
Blattberg "Interactive Marketing: Exploiting the Age of Addressability" Sloan Management Review (1991)
[24]
Bok (1989)
[25]
Bowie "Privacy Rights on the Internet: Self-Regulation or Government Regulation?" Business Ethics Quarterly (2006) 10.5840/beq200616340
[26]
Boyd "Facebook’s Privacy Trainwreck: Exposure, Invasion and Social Convergence" Convergence: The International Journal of Research into New Media Technologies (2008) 10.1177/1354856507084416
[27]
Social Network Sites: Definition, History, and Scholarship

danah m. boyd, Nicole B. Ellison

Journal of Computer-Mediated Communication 2007 10.1111/j.1083-6101.2007.00393.x
[28]
Breckenridge (1970)
[29]
Brenton (1964)
[30]
Bruner "Attitude toward Location-Based Advertising" Journal of Interactive Advertising (2007) 10.1080/15252019.2007.10722127
[31]
Budnitz "Privacy Protection for Consumer Transactions in Electronic Commerce: Why Self-Regulation Is Inadequate" South Carolina Law Review (1998)
[32]
Bynum, T.  2008. “Computer and Information Ethics,” in The Stanford Encyclopedia of Philosophy (Winter 2008 Edition), E. N. Zalta (ed.), Stanford, CA: Center for the Study of Language and Information (https://plato.stanford.edu/).
[33]
Camp "Web Security and Privacy: An American Perspective" Information Society (1999) 10.1080/019722499128411
[34]
Campbell "Relationship Marketing in Consumer Markets" Journal of Direct Marketing (1997) 10.1002/(sici)1522-7138(199722)11:3<44::aid-dir7>3.0.co;2-x
[35]
Campbell "Panopticon.com: Online Surveillance and the Commodification of Privacy" Journal of Broadcasting & Electronic Media (2002) 10.1207/s15506878jobem4604_6
[36]
Caudill "Consumer Online Privacy: Legal and Ethical Issues" Journal of Public Policy & Marketing (2000) 10.1509/jppm.19.1.7.16951
[37]
Cespedes "Database Marketing: New Rules for Policy and Practice" Sloan Management Review (1993)
[38]
Chellappa (2008)
[39]
Chellappa "Personalization Versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma" Information Technology and Management (2005) 10.1007/s10799-005-5879-y
[40]
Chen "Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques" Journal of Computer Information Systems (2004)
[41]
Clark "The Dynamic Structure of Management Support Systems: Theory Development, Research Focus, and Direction" MIS Quarterly (2007) 10.2307/25148808
[42]
Clarke "Person Location and Person Tracking: Technologies, Risks and Policy Implications" Information Technology & People (2001) 10.1108/09593840110695767
[43]
Cohen "Privacy, Ideology, and Technology: A Response to Jeffrey Rosen" Georgetown Law Journal (2001)
[44]
Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security Consumers-Union . 2008. “Consumer Reports Poll: Americans Extremely Concerned About Internet Privacy,” September 25 (https://www.consumersunion.org/pub/core_telecom_and_utilities/006189.html).
[46]
Cranor "I Didn’t Buy it for Myself’: Privacy and Ecommerce Personalization" (2003)
[47]
Cranor "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study" (2007)
[48]
Culnan "Consumer Awareness of Name Removal Procedures: Implication for Direct Marketing" Journal of Interactive Marketing (1985)
[49]
Culnan "How Did They Get My Name’? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use" MIS Quarterly (1993) 10.2307/249775
[50]
Culnan "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy and Marketing (2000) 10.1509/jppm.19.1.20.16944

Showing 50 of 221 references

Cited By
1,405
Business &amp; Society
Computers &amp; Security
Journal of Services Marketing
The Journal of Strategic Informatio...
Journal of Business Economics
Engagement in proactive recommendations

Laurens Rook, Adem Sabic · 2018

Journal of Intelligent Information...
Decision Support Systems
Death to the Privacy Calculus?

Bart Knijnenburg, Elaine Raybourn · 2017

SSRN Electronic Journal
Anxiety about electronic data hacking

Jon D. Elhai, Jason C. Levine · 2017

Internet Research
Privacy and human behavior in the age of information

Alessandro Acquisti, Laura Brandimarte · 2015

Science
Ethical and privacy principles for learning analytics

Abelardo Pardo, George Siemens · 2014

British Journal of Educational Tech...
Metrics
1,405
Citations
221
References
Details
Published
Dec 01, 2011
Vol/Issue
35(4)
Pages
989-A27
Cite This Article
H. Jeff Smith, Tamara Dinev, Heng Xu (2011). Information Privacy Research: an Interdisciplinary Review1. MIS Quarterly, 35(4), 989-A27. https://doi.org/10.2307/41409970
Related

You May Also Like