252
Views
0
CrossRef citations to date
0
Altmetric
Research Article

UNDERSTANDING PRIVACY PARADOX: AN EXPERIMENTAL APPROACH TO STUDY PRIVACY CONCERNS AND ACTUAL DISCLOSURE AMONG APP USERS

ORCID Icon, &

References

  • Acquisti, A. 2004, May. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic commerce, 21–29. ACM.
  • Acquisti, A. 2009. Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy Magazine 7 (6):82–85. doi:10.1109/MSP.2009.163.
  • Acquisti, A. 2012. Nudging privacy: The behavioral economics of personal information. Digital Enlightenment Yearbook 2012:193–97.
  • Acquisti, A., and J. Grossklags. 2003, May. Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In 2nd Annual Workshop on Economics and Information Security-WEIS, Vol. 3, 1–27.
  • Acquisti, A., and J. Grossklags. 2004. Privacy attitudes and privacy behavior. In Economics of information security, 165–78. Boston, MA: Springer. doi:10.1007/1-4020-8090-5_13.
  • Acquisti, A., and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 3 (1):26–33. doi:10.1109/MSP.2005.22.
  • Almuhimedi, H., F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. F. Cranor, and Y. Agarwal, 2015, April. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the 33rd annual ACM conference on human factors in computing systems, 787–96.
  • Bandara, R., M. Fernando, and S. Akter. 2019. Privacy concerns in E-commerce: A taxonomy and a future research agenda. Electronic Markets 30 (3):1–19. doi:10.1007/s12525-019-00375-6.
  • Bansal, G., F. M. Zahedi, and D. Gefen. 2016. Do context and personality matter? Trust and privacy concerns in disclosing private information online. Information & Management 53 (1):1–21. doi:10.1016/j.im.2015.08.001.
  • Barnes, S. B. 2006. A privacy paradox: Social networking in the United States. First Monday 11 (9). doi:10.5210/fm.v11i9.1394.
  • Beresford, A. R., D. Kübler, and S. Preibusch. 2012. Unwillingness to pay for privacy: A field experiment. Economics Letters 117 (1):25–27. doi:10.1016/j.econlet.2012.04.077.
  • Bowie, N. E., and K. Jamal. 2006. Privacy rights on the internet: Self-regulation or government regulation? Business Ethics Quarterly 16 (3):323–42. doi:10.5840/beq200616340.
  • Brown, B. 2001. Studying the Internet experience. HP Laboratories Technical Report HPL, 49.
  • Chatterjee, S., R. Chaudhuri, D. Vrontis, and Z. Hussain. 2023. Usage of smartphone for financial transactions: From the consumer privacy perspective. Journal of Consumer Marketing 40 (2):193–208. doi:10.1108/JCM-03-2021-4526.
  • Chellappa, R. K., and R. G. Sin. 2005. Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management 6 (2–3):181–202. doi:10.1007/s10799-005-5879-y.
  • Chhabra, S. 2022. Why does privacy paradox exist?: A qualitative inquiry to understand the reasons for privacy paradox among smartphone users. Journal of Electronic Commerce in Organizations (JECO) 20 (1):1–20. doi:10.4018/JECO.292470.
  • Crossler, R. E., and F. Bélanger. 2019. Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap. Information Systems Research 30 (3):995–1006. doi:10.1287/isre.2019.0846.
  • Culnan, M. J., and P. K. Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science 10 (1):104–15. doi:10.1287/orsc.10.1.104.
  • Debatin, B., J. P. Lovejoy, A. K. Horn, and B. N. Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15 (1):83–108. doi:10.1111/j.1083-6101.2009.01494.x.
  • Deuker, A. 2009, September. Addressing the privacy paradox by expanded privacy awareness–the example of context-aware services. In IFIP PrimeLife international summer school on privacy and identity management for Life(pp, 275–83. Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-14282-6_23.
  • Dienlin, T., P. K. Masur, and S. Trepte. 2021. A longitudinal analysis of the privacy paradox. New Media & Society 14614448211016316 (5):1043–64. doi:10.1177/14614448211016316.
  • Dinev, T., and P. Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information Systems Research 17 (1):61–80. doi:10.1287/isre.1060.0080.
  • Felt, A. P., S. Egelman, and D. Wagner 2012, October. I’ve got 99 problems, but vibration ain’t one: A survey of smartphone users’ concerns. In Proceedings of the second ACM workshop on security and privacy in smartphones and mobile devices, 33–44. ACM.
  • Flender, C., and G. Müller. 2012, June. Type indeterminacy in privacy decisions: The privacy paradox revisited. In International symposium on quantum interaction, 148–59. Berlin, Heidelberg: Springer Berlin Heidelberg. doi:10.1007/978-3-642-35659-9_14.
  • Frederiks, E. R., K. Stenner, and E. V. Hobman. 2015. Household energy use: Applying behavioural economics to understand consumer decision-making and behaviour. Renewable and Sustainable Energy Reviews 41:1385–94. doi:10.1016/j.rser.2014.09.026.
  • Furini, M., S. Mirri, M. Montangero, and C. Prandi. 2020. Privacy perception when using smartphone applications. Mobile Networks and Applications 25 (3):1055–61. doi:10.1007/s11036-020-01529-z.
  • Hann, I. H., K. L. Hui, S. Y. T. Lee, and I. P. Png. 2007. Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems 24 (2):13–42. doi:10.2753/MIS0742-1222240202.
  • Harbach, M., M. Hettig, S. Weber, and M. Smith. 2014, April. Using personal examples to improve risk communication for security & privacy decisions. In Proceedings of the SIGCHI conference on human factors in computing systems, 2647–56.
  • Harsanyi, J. C. 1967. Games with incomplete information played by “Bayesian” players, I–III Part I. The basic model. Management Science 14 (3):159–82. doi:10.1287/mnsc.14.3.159.
  • Jiang, Q., J. Ma, G. Li, and L. Yang. 2013. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications 68 (4):1477–91. doi:10.1007/s11277-012-0535-4.
  • Joinson, A. N., U. D. Reips, T. Buchanan, and C. B. P. Schofield. 2010. Privacy, trust, and self-disclosure online. Human–Computer Interaction 25 (1):1–24. doi:10.1080/07370020903586662.
  • Joinson, A. N., A. Woodley, and U. D. Reips. 2007. Personalization, authentication and self-disclosure in self-administered Internet surveys. Computers in human behavior 23 (1):275–85.
  • Jozani, M., E. Ayaburi, M. Ko, and K. K. R. Choo. 2020. Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Computers in Human Behavior 107:106260. doi:10.1016/j.chb.2020.106260.
  • Kahneman, D., and A. Tversky. 1979. Prospect theory: An analysis of decision under risk. Econometrica 47 (2):263–91. doi:10.2307/1914185.
  • Kayhan, V. O., and C. J. Davis. 2016. Situational privacy concerns and antecedent factors. Journal of Computer Information Systems 56 (3):228–37. doi:10.1080/08874417.2016.1153913.
  • Keith, M. J., S. C. Thompson, J. Hale, P. B. Lowry, and C. Greer. 2013. Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies 71 (12):1163–73. doi:10.1016/j.ijhcs.2013.08.016.
  • Kelley, P. G., L. F. Cranor, and N. Sadeh 2013, April. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 3393–402. ACM.
  • Kim, G. S., S. B. Park, and J. Oh. 2008. An examination of factors influencing consumer adoption of short message service (SMS). Psychology & Marketing 25 (8):769–86. doi:10.1002/mar.20238.
  • Lee, H., H. Park, and J. Kim. 2013. Why do people share their context information on social network services? A qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk. International Journal of Human-Computer Studies 71 (9):862–77. doi:10.1016/j.ijhcs.2013.01.005.
  • Leon, P. G., I. Adjerid, R. Balebako, L. Brandimarte, S. Komanduri, F. Schaub, M. Sleeper, Y. Wang, S. Wilson, A. Acquisti, et al. September 2015. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys 1(1):1–40.
  • Li, Y. 2012. Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems 54 (1):471–81. doi:10.1016/j.dss.2012.06.010.
  • Li, H., R. Sarathy, and H. Xu. 2011. The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51 (3):434–45. doi:10.1016/j.dss.2011.01.017.
  • Lu, C. H., Y. H. Chen, and P. T. Jan. 2022. The privacy trap of digital transformation: The existence and the implication. Journal of Internet Technology 23 (1):63–71.
  • Lutz, C., and P. Strathoff. 2014. Privacy concerns and online behavior–Not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses. SSRN Electronic Journal. doi:10.2139/ssrn.2425132.
  • Lwin, M., J. Wirtz, and J. D. Williams. 2007. Consumer online privacy concerns and responses: A power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science 35 (4):572–85. doi:10.1007/s11747-006-0003-3.
  • Malhotra, N. K. 2007. Review of marketing research. In Review of marketing research, pp. v–v. Emerald Group Publishing Limited. doi:10.1108/S1548-6435(2007)0000003004.
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15 (4):336–55. doi:10.1287/isre.1040.0032.
  • Markowitz, H. 1952. The utility of wealth. Journal of Political Economy 60 (2):151–58. doi:10.1086/257177.
  • McKinsey, 2019, Nov 7. Consumer-data privacy and personalization at scale: How leading retailers and consumer brands can strategize for both. Retrieved from https://www.mckinsey.com/capabilities/growth-marketing-and-sales/our-insights/consumer-data-privacy-and-personalization-at-scale
  • McWilliam, G. 2000. Building stronger brands through online communities. MIT Sloan Management Review 41 (3):43.
  • Metsämuuronen, J. 2017. Basics of Test Theory. Journal Metsämuuronen, Essentials of Research Methods in Human Sciences 1:66–183.
  • Michaelidou, N., and L. Hassan. 2014. New advances in attitude and behavioural decision-making models. Journal of Marketing Management 30 (5–6):519–28. doi:10.1080/0267257X.2014.884368.
  • Norberg, P. A., and D. R. Horne. 2007. Privacy attitudes and privacy‐related behavior. Psychology & Marketing 24 (10):829–47. doi:10.1002/mar.20186.
  • Norberg, P. A., D. R. Horne, and D. A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41 (1):100–26. doi:10.1111/j.1745-6606.2006.00070.x.
  • Parasuraman, A., D. Grewal, and R. Krishnan. 2007. Marketing research. 2nd ed ed. Boston: Houghton Mifflin Co.
  • Pavlou, P. A., and M. Fygenson. 2006. Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly 30 (1):115–43. doi:10.2307/25148720.
  • Pentina, I., L. Zhang, H. Bata, and Y. Chen. 2016. Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior 65:409–19. doi:10.1016/j.chb.2016.09.005.
  • Phelps, J., G. Nowak, and E. Ferrell. 2000. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing 19 (1):27–41.
  • Pötzsch, S. 2008 September. Privacy awareness: A means to solve the privacy paradox? In IFIP summer school on the future of identity in the information society, 226–36. Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-03315-5_17.
  • Prelec, D., and G. Loewenstein. 1991. Decision making over time and under uncertainty: A common approach. Management Science 37 (7):770–86. doi:10.1287/mnsc.37.7.770.
  • Reynolds, B., J. Venkatanathan, J. Gonçalves, and V. Kostakos 2011, September. Sharing ephemeral information in online social networks: Privacy perceptions and behaviours. In IFIP Conference on Human-Computer Interaction, 204–15. Springer, Berlin, Heidelberg.
  • Schoenbachler, D. D., and G. L. Gordon. 2002. Trust and customer willingness to provide information in database‐driven relationship marketing. Journal of Interactive Marketing 16 (3):2–16. doi:10.1002/dir.10033.
  • Schomakers, E. M., C. Lidynia, and M. Ziefle. 2022. The role of privacy in the acceptance of smart technologies: Applying the privacy calculus to technology acceptance. International Journal of Human–Computer Interaction 38 (13):1276–89. doi:10.1080/10447318.2021.1994211.
  • Shim, K., and S. K. K. Oh. 2018. Who creates the bandwagon? The dynamics of fear of isolation, opinion congruency and anonymity-preference on social media in the 2017 South Korean presidential election. Computers in Human Behavior 86:181–89. doi:10.1016/j.chb.2018.04.012.
  • Shklovski, I., S. D. Mainwaring, H. H. Skúladóttir, and H. Borgthorsson, 2014, April. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2347–56.
  • Simon, H. A. 1957. Models of man; social and rational. New York, NY, USA: Wiley.
  • Simon, H. A. 1997. Models of bounded rationality: Empirically grounded economic reason. Vol. 3. MIT press.
  • Smith, R. S. 2009. Doing social work research. McGraw-Hill Education (UK).
  • Smith, H. J., T. Dinev, and H. Xu. 2011. Information privacy research: An interdisciplinary review. MIS Quarterly 35 (4):989–1016. doi:10.2307/41409970.
  • Solove, D. J. 2021. The myth of the privacy paradox. George Washington Law Review 89:1. doi:10.2139/ssrn.3536265.
  • Spake, D. F., R. Zachary Finney, and M. Joseph. 2011. Experience, comfort, and privacy concerns: Antecedents of online spending. Journal of Research in Interactive Marketing 5 (1):5–28. doi:10.1108/17505931111121507.
  • Statista, 2022. Retrieved from https://www.statista.com/topics/1002/mobile-app-usage/
  • Stone, E. F., and D. L. Stone. 1990. Privacy in organizations: Theoretical issues, research findings, and protection mechanisms. Research in Personnel and Human Resources Management 8 (3):349–411.
  • Sung, E. C. 2021. The effects of augmented reality mobile app advertising: Viral marketing via shared social experience. Journal of Business Research 122:75–87. doi:10.1016/j.jbusres.2020.08.034.
  • Taddicken, M. 2014. The ‘privacy paradox ‘in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication 19 (2):248–73. doi:10.1111/jcc4.12052.
  • Times of India, Feb 16, 2023. Data privacy in India: Current outlook and the future. Retrieved from https://timesofindia.indiatimes.com/blogs/voices/data-privacy-in-india-current-outlook-and-the-future/
  • Trepte, S., M. Scharkow, and T. Dienlin. 2020. The privacy calculus contextualized: The influence of affordances. Computers in Human Behavior 104:106115. doi:10.1016/j.chb.2019.08.022.
  • Tsai, J. Y., S. Egelman, L. Cranor, and A. Acquisti. 2011. The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research 22 (2):254–68. doi:10.1287/isre.1090.0260.
  • Valet, V. 2019, March 7. The world’s most reputable companies 2019. Retrieved from https://www.forbes.com/sites/vickyvalet/2019/03/07/the-worlds-most-reputable-companies-2019/#7447045213b6
  • Waddell, T. F., and S. S. Sundar. 2020. Bandwagon effects in social television: How audience metrics related to size and opinion affect the enjoyment of digital media. Computers in Human Behavior 107:106270. doi:10.1016/j.chb.2020.106270.
  • Wakefield, R. 2013. The influence of user affect in online information disclosure. Journal of Strategic Information Systems 22 (2):157–74. doi:10.1016/j.jsis.2013.01.003.
  • Waldman, A. E. 2020. Cognitive biases, dark patterns, and the ‘privacy paradox’. Current Opinion in Psychology 31:105–09. doi:10.1016/j.copsyc.2019.08.025.
  • Wang, L., H. H. Hu, J. Yan, and M. Q. Mei. 2020. Privacy calculus or heuristic cues? The dual process of privacy decision making on Chinese social media. Journal of Enterprise Information Management 33 (2):353–80. doi:10.1108/JEIM-05-2019-0121.
  • Wang, Z., and Y. Liu. 2014. Identifying key factors affecting information disclosure intention in online shopping. International Journal of Smart Home 8 (4):47–58. doi:10.14257/ijsh.2014.8.4.05.
  • Weisband, S., and S. Kiesler. 1996, April. Self disclosure on computer forms: Meta-analysis and implications. In Proceedings of the SIGCHI conference on human factors in computing systems, 3–10.
  • Xu, H., T. Dinev, J. Smith, and P. Hart. 2011. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12 (12):798. doi:10.17705/1jais.00281.
  • Xu, H., H. H. Teo, B. C. Tan, and R. Agarwal. 2009. The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems 26 (3):135–74. doi:10.2753/MIS0742-1222260305.
  • Zafeiropoulou, A. M., D. E. Millard, C. Webber, and K. O’Hara, 2013, May. Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? In Proceedings of the 5th Annual ACM Web Science Conference, 463–72.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.