scispace - formally typeset
Journal ArticleDOI

Internet privacy concerns: an integrated conceptualization and four empirical studies

Reads0
Chats0
TLDR
In this article, the authors identify alternative conceptualizations of Internet privacy concerns (IPC) based on multidimensional developmental theory and a review of the prior literature and examine the various conceptualizations with four online surveys involving nearly 4,000 Internet users.
Abstract
Internet privacy concerns (IPC) is an area of study that is receiving increased attention due to the huge amount of personal information being gathered, stored, transmitted, and published on the Internet. While there is an emerging literature on IPC, there is limited agreement about its conceptualization in terms of its key dimensions and its factor structure. Based on the multidimensional developmental theory and a review of the prior literature, we identify alternative conceptualizations of IPC. We examine the various conceptualizations of IPC with four online surveys involving nearly 4,000 Internet users. As a baseline, study 1 compares the integrated conceptualization of IPC to two existing conceptualizations in the literature. While the results provide support for the integrated conceptualization, the second-order factor model does not outperform the correlated first-order factor model. Study 2 replicates the study on a different sample and confirms the results of study 1. We also investigate whether the prior results are affected by the different perspectives adopted in the wording of items in the original instruments. In study 3, we find that focusing on one's concern for website behavior (rather than one's expectation of website behavior) and adopting a consistent perspective in the wording of the items help to improve the validity of the factor structure. We then examine the hypothesized third-order conceptualizations of IPC through a number of alternative higher-order models. The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives. In addition, the conceptualization of IPC that has the best fit with the data contains a third-order general IPC factor, two second-order factors of interaction management and information management, and six first-order factors (i.e., collection, secondary usage, errors, improper access, control, and awareness). Study 4 cross-validates the results with another data set and examines IPC within the context of a nomological network. The results confirm that the third-order conceptualization of IPC has nomological validity, and it is a significant determinant of both trusting beliefs and risk beliefs. Our research helps to resolve inconsistencies in the key underlying dimensions of IPC, the factor structure of IPC, and the wording of the original items in prior instruments of IPC. Finally, we discuss the implications of this research.

read more

Citations
More filters
Journal ArticleDOI

Exploring smart wearables through the lens of reactance theory: Linking values, social influence, and status quo

TL;DR: In this article , a research model that explores how perceptions of value incongruence and social influence affect perceptions of freedom restriction, affecting perceptions of intrusiveness of smartwatch and result in status quo behaviors towards the smartwatch.
Journal ArticleDOI

The role of personalized services and control: An empirical evaluation of privacy calculus and technology acceptance model in the mobile context

TL;DR: The results reveal that perceived enjoyment has replaced perceived ease-of-use as a main predictor of perceived behavioral intentions in a mobile TAM and show that personalized services and users’ perceived information control have a strong effect on both privacy calculus and mobile TAM.
Journal ArticleDOI

The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior

TL;DR: Exposure to news about government surveillance increases the level of concerns about government intrusion and has a negative impact on privacy self-efficacy, and contrary to expectations, this exposure also leads to weaker passwords used to protect information.
Book ChapterDOI

Dataveillance and Information Privacy Concerns: Ethical and Organizational Considerations

TL;DR: In this paper, the privacy and ethical issues surrounding emerging means of workplace surveillance are explored, considering both employee and employer perspectives and poses many questions to consider when deciding when legitimate monitoring becomes an invasion of employee privacy.
Journal ArticleDOI

Health Technology Assessment: The Role of Total Cost of Ownership

TL;DR: There is a gap in the analysis of TCO models in the context of AAL technologies particularly in public and private sector collaborations and TCO process should be developed into a key award criterion when conducting AAL technology assessment and procurements, thus aiding long term strategic decision making.
References
More filters
Book

Lisrel 8: Structural Equation Modeling With the Simplis Command Language

TL;DR: The SIMPLIS language shifts the focus away from the technical question "How to do it", so that researchers can concentrate on the question, "What does it all mean?"
Journal ArticleDOI

Accounting for common method variance in cross-sectional research designs.

TL;DR: A model is presented that allows partial correlation analysis to adjust the observed correlations for CMV contamination and determine if conclusions about the statistical and practical significance of a predictor have been influenced by the presence of CMV.
Book

Structural Equation Modeling With Lisrel, Prelis, and Simplis: Basic Concepts, Applications, and Programming

TL;DR: This paper presents a meta-modelling framework for testing the factorial Validity of a Theoretical Construct and the Invariant Factorial Structure of a theoretical construct using LISREL, PRELIS, and SIMPLIS through Windows.
Journal ArticleDOI

Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model

TL;DR: The results of this study indicate that the second-order IUIPC factor, which consists of three first-order dimensions--namely, collection, control, and awareness--exhibited desirable psychometric properties in the context of online privacy.
Related Papers (5)