Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3378539.3393854acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
research-article

Benefits in Privacy Research: A Literature Review, Status Quo and Future Research Directions

Published: 19 June 2020 Publication History

Abstract

Research in the stream of privacy considers benefits as an important and central concept. Benefits are the positive outcomes that individuals will experience when disclosing information. However, we see that only few papers theorize benefits in their research and thereby the operationalization and understanding of benefits is mixed, unstandardized and seems to follow no specific order. Based on that observation, we aim to provide a first step towards a standardized usage of benefits in privacy research studies, by summarizing existing benefits in privacy research and categorizing them. To do so, we base on the theory of perceived value. This theory uses five dimensions (emotional value, social value for myself, social value for others, monetary value as well as utility value), which we use to categorize different benefits. The results confirm our initial observations that indeed different constructs of benefits are used even in the same research context without justification. Implications among others refer to the recommendation to use the same term for the same construct and to consider all five dimensions of benefits in privacy research studies.

References

[1]
Acquisti, A., John, L., Loewenstein, G., What is privacy worth. WEIS, 2009.
[2]
Anderson, C.L., Agarwal, R., Genetic Information Altruists: How Far and To Whom Does Their Generosity Extend?, In, Nunamaker, J., Currie, W.L. (eds.), Proceedings of the 30th International Conference on Information Systems: Phoenix, USA, 2009.
[3]
Bélanger, F., Crossler, R.E., Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35, 4, 2011, 1017--1042.
[4]
Buckel, T., Thiesse, F., Predicting The Disclosure of Personal Information on Social Networks: An Empirical Investigation, In, Alt, R., Franczyk, B. (eds.), 11th International Conference on Wirtschaftsinformatik: Leipzig, Germany, 2013.
[5]
Chellappa, R., Sin, R., Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma. Information Technology and Management, 6, 2--3, 2005, 181--202.
[6]
Choi, B.C.F., Jiang, Z., Ramesh, B., Dong, Y., Privacy Tradeoff and Social Application Usage, In, 48th Hawaii International Conference on System Sciences (HICSS): HI, USA, pp. 304--313, 2015.
[7]
Consumption values and market choices, In, 1991.
[8]
Cox, L.A.T., Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks. Risk analysis : an official publication of the Society for Risk Analysis, 28, 6, 2008, 1749--1761.
[9]
Dienlin, T., Metzger, M.J., An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample. J Comput-Mediat Comm, 21, 5, 2016, 368--383.
[10]
Dinev, T., Hart, P., An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 1, 2006, 61--80.
[11]
Dinev, T., Xu, H., Smith, J.H., Hart, P., Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22, 3, 2013, 295--316.
[12]
Ellison, N., Heino, R., Gibbs, J., Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. J Comput-Mediat Comm, 11, 2, 2006, 415--441.
[13]
Keith, M.J., Thompson, S.C., Hale, J., Lowry, P.B., Greer, C., Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71, 12, 2013, 1163--1173.
[14]
Keith, M.J., Babb, J., Lowry, P.B., Furner, C., Abdullat, A., The Role of Mobile-Computing Self-Efficacy in Consumer Information Disclosure. Information Systems Journal, 25, 6, 2015, 637--667.
[15]
Kim, H.-W., Chan, H.C., Gupta, S., Value-based Adoption of Mobile Internet: An empirical investigation. Decision Support Systems, 43, 1, 2007, 111--126.
[16]
Kordzadeh, N., Warren, J., Communicating Personal Health Information in Virtual Health Communities. An Integration of Privacy Calculus Model and Affective CommitmentJournal of the Association for Information Systems, 18, 1, 2017, 45--81.
[17]
Krasnova, H., Veltri, N.F., Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA, In, Sprague, R., Laney, S. (eds.), 43rd Hawaii International Conference on System Sciences (2010): Koloa, Kauai, Hawaii, pp. 1--10, 2010.
[18]
Li, H., Sarathy, R., Xu, H., Understanding Situational Online Information Disclosure as a Privacy Calculus. Journal of Computer Information Systems, 51, 1, 2010, 62--71.
[19]
Lin, H.-H., Wang, Y.-S., An examination of the determinants of customer loyalty in mobile commerce contexts. Inf. Manage., 43, 3, 2006, 271--282.
[20]
Li, T., Unger, T., Willing to pay for quality personalization? Trade-off between quality and privacy European Journal of Information Systems, 21, 6, 2012, 621--642.
[21]
Li, Y., Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. Communications of the Association for Information Systems, 28, 28, 2011, 453--496.
[22]
Lowry, P.B., Moody, G.D., Gaskin, J., Galletta, D.F., Humphreyes, S., Barlow, J.B., Wilson, D., Evaluating Journal Quality and the Association for Information Systems (AIS) Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value? MIS Quarterly, 37, 4, 2013, 993--1012.
[23]
Maier, C., Laumer, S., Wirth, J., Weitzel, T., Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples. European Journal of Information Systems, 28, 5, 2019, 496--522.
[24]
Monroe, K.B., Pricing. Making profitable decisions. New York: McGraw-Hill Pub. Co, 1990.
[25]
Nissenbaum, H.F., Privacy in context. Technology, policy, and the integrity of social life. Stanford, California: Stanford Law Books an imprit of Standford University Press, 2010.
[26]
Paré, G., Trudel, M.-C., Jaana, M., Kitsiou, S., Synthesizing information systems knowledge A typology of literature reviews. Information & Management, 52, 2, 2015, 183--199.
[27]
Recker, J., Scientific research in information systems. A beginner's guide. Berlin, Heidelberg: Springer, 2013.
[28]
Rockmann, R., Gewald, H., Activity Tracking Affordances: Identification and Instrument Development, In, Twenty-Second Pacific Asia Conference on Information Systems: Japan, 2018.
[29]
Sánchez, J., Callarisa, L., Rodríguez, R.M., Moliner, M.A., Perceived value of the purchase of a tourism product. Tourism Management, 27, 3, 2006, 394--409.
[30]
Schreiner, M., Hess, T., On The Willingness To Pay For Privacy As A Freemium Model: First Empirical Evidence. ECIS 2013 Proceedings, 2013.
[31]
Schreiner, M., Hess, T., Why Are Consumers Willing to Pay for Privacy? An Application of the Privacy-freemium Model to Media Companies, In, Becker, J., vom Brocke, J., de Marco, M. (eds.), Twenty-Third European Conference on Information Systems (ECIS): Münster, Germany, 2015.
[32]
Smith, J.H., Dinev, T., Xu, H., Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 4, 2011, 980--1015.
[33]
Sweeney, J.C., Soutar, G.N., Consumer perceived value: The development of a multiple item scale. Journal of Retailing, 77, 2, 2001, 203--220.
[34]
Tam, E.-C., Hui, K.-L., Tan, B., What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses, In, Proceedings of the 23rd International Conference on Information Systems: Barcelona, Spain, 2002.
[35]
Turel, O., Serenko, A., Bontis, N., User acceptance of wireless short messaging services: Deconstructing perceived value. Information & Management, 44, 1, 2007, 63--73.
[36]
van Eerde, W., Thierry, H., Vroom's expectancy models and work-related criteria: A meta-analysis. Journal of Applied Psychology, 81, 5, 1996, 575--586.
[37]
vhb-jourqual, Teilrating Wirtschaftsinformatik, http://vhbonline.org/en/service/jourqual/vhb-jourqual-3/teilrating-wi/
[38]
Vroom, V.H., Work and motivation. New York: Wiley, 1964.
[39]
Wakefield, R., The influence of user affect in online information disclosure. The Journal of Strategic Information Systems, 22, 2, 2013, 157--174.
[40]
Webster, J., Watson, R.T., Analyzing the past to prepare for the future: Writing a literature review. Management Information Systems Quarterly, 26, 2, 2002, xiii--xxiii.
[41]
Wirth, J., Dependent Variables in the Privacy-Related Field: A Descriptive Literature Review, In, Bui, T. (ed.), Proceedings of the 51st Hawaii International Conference on System Sciences: Waikoloa Village, Hawaii, pp. 3658--3667, 2018.
[42]
Wirth, J., Maier, C., Laumer, S., The Influence of Resignation on the Privacy Calculus in the Context of Social Networking Sites: an Empirical Analysis, In, Bednar, P., Frank, U., Kautz, K. (eds.), Proceedings of the 26th European Conference on Information Systems: Portsmouth, UK, 2018.
[43]
Wirth, J., Maier, C., Laumer, S., Weitzel, T., Perceived information sensitivity and interdependent privacy protection: a quantitative study. electronic markets, 29, 3, 2019, 359--378.
[44]
Xu, H., Teo, H.-H., Tan, Bernard C. Y., Agarwal, R., The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services. Journal of Management Information Systems, 26, 3, 2009, 135--173.
[45]
Yang, Y.-C., Huang, L.-T., Su, Y.-T., Are Consumers More Willing to Pay for Digital Items in Mobile Applications? Consumer Attitudes toward Virtual Goods. Pacific Asia Journal of the Association for Information Systems, 9, 4, 2017.
[46]
Zeithaml, V.A., Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence. Journal of marketing, 52, 3, 1988, 2.
[47]
Zhou, T., The Impact of Perceived Value on User Acceptance of Mobile Commerce, In, Yu, F. (ed.), International Symposium on Electronic Commerce and Security, 2008. ISECS 2008; 3-5 Aug. 2008, Guangzhou, China: Los Alamitos, Calif.: Guangzhou City, China, pp. 237--240: IEEE Computer Society, 2008.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMIS-CPR '20: Proceedings of the 2020 Computers and People Research Conference
June 2020
180 pages
ISBN:9781450371308
DOI:10.1145/3378539
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 June 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. benefits
  2. privacy
  3. privacy calculus
  4. theory of perceived value

Qualifiers

  • Research-article

Conference

SIGMIS-CPR '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 300 of 480 submissions, 63%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media