Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach

The advent of the Internet has made the transmission of personally identifiable information more common and often unintended by the user. As personal information becomes more accessible, individuals worry that businesses misuse the information that is collected while they are online. Organizations h...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:Journal of Management Information Systems. - Taylor & Francis, Ltd.. - 24(2007), 2, Seite 13-42
1. Verfasser: Hann, Il-Horn (VerfasserIn)
Weitere Verfasser: Hui, Kai-Lung, Lee, Sang-Yong Tom, Png, Ivan P. L.
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2007
Zugriff auf das übergeordnete Werk:Journal of Management Information Systems
Schlagworte:conjoint analysis expectancy theory financial reward information privacy online privacy segmentation Information science Health sciences Mathematics Behavioral sciences mehr... Business Economics Applied sciences
LEADER 01000caa a22002652 4500
001 JST049758667
003 DE-627
005 20240621171328.0
007 cr uuu---uuuuu
008 150324s2007 xx |||||o 00| ||eng c
035 |a (DE-627)JST049758667 
035 |a (JST)40398677 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Hann, Il-Horn  |e verfasserin  |4 aut 
245 1 0 |a Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach 
264 1 |c 2007 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The advent of the Internet has made the transmission of personally identifiable information more common and often unintended by the user. As personal information becomes more accessible, individuals worry that businesses misuse the information that is collected while they are online. Organizations have tried to mitigate this concern in two ways: (1) by offering privacy policies regarding the handling and use of personal information and (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information-processing theory of motivation. Information-processing theories, also known as expectancy theories in the context of motivated behavior, are built on the premise that people process information about behavior-outcome relationships. By doing so, they are forming expectations and making decisions about what behavior to choose. Using an experimental setting, we empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In a conjoint analysis exercise, 268 participants from the United States and Singapore face trade-off situations, where an organization may only offer incomplete privacy protection or some benefits. While privacy protections (against secondary use, improper access, and error) are associated with positive valences, we also find that financial gains and convenience can significantly increase individuals' motivational score of registering with a Web site. We find that benefits—monetary reward and future convenience—significantly affect individuals' preferences over Web sites with differing privacy policies. We also quantify the value of Web site privacy protection. Among U. S. subjects, protection against errors, improper access, and secondary use of personal information is worth $ 30.49-$ 44.62. Finally, our approach also allows us to identify three distinct segments of Internet users—privacy guardians, information sellers, and convenience seekers. 
540 |a Copyright 2007 M.E. Sharpe, Inc. 
650 4 |a conjoint analysis 
650 4 |a expectancy theory 
650 4 |a financial reward 
650 4 |a information privacy 
650 4 |a online privacy 
650 4 |a segmentation 
650 4 |a Information science  |x Personal information 
650 4 |a Health sciences  |x Health and wellness  |x Public health  |x Health policy  |x Health care information privacy 
650 4 |a Mathematics  |x Pure mathematics  |x Algebra  |x Coefficients 
650 4 |a Behavioral sciences  |x Behavioral economics  |x Consumer behavior  |x Consumer sovereignty  |x Consumer preferences  |x Consumer convenience 
650 4 |a Behavioral sciences  |x Psychology  |x Personality psychology  |x Motivation  |x Expectancy theory 
650 4 |a Business  |x Business administration  |x Corporate communications  |x External corporate communications  |x Marketing 
650 4 |a Economics  |x Economic disciplines  |x Financial economics  |x Finance  |x Financial instruments  |x Financial securities  |x Capital stocks  |x Stock prices 
650 4 |a Business  |x Business operations  |x Commerce  |x Electronic commerce 
650 4 |a Economics  |x Economic disciplines  |x Information economics 
650 4 |a Applied sciences  |x Food science  |x Foodstuffs  |x Food  |x Baked goods  |x Cookies 
650 4 |a Information science  |x Personal information 
650 4 |a Health sciences  |x Health and wellness  |x Public health  |x Health policy  |x Health care information privacy 
650 4 |a Mathematics  |x Pure mathematics  |x Algebra  |x Coefficients 
650 4 |a Behavioral sciences  |x Behavioral economics  |x Consumer behavior  |x Consumer sovereignty  |x Consumer preferences  |x Consumer convenience 
650 4 |a Behavioral sciences  |x Psychology  |x Personality psychology  |x Motivation  |x Expectancy theory 
650 4 |a Business  |x Business administration  |x Corporate communications  |x External corporate communications  |x Marketing 
650 4 |a Economics  |x Economic disciplines  |x Financial economics  |x Finance  |x Financial instruments  |x Financial securities  |x Capital stocks  |x Stock prices 
650 4 |a Business  |x Business operations  |x Commerce  |x Electronic commerce 
650 4 |a Economics  |x Economic disciplines  |x Information economics 
650 4 |a Applied sciences  |x Food science  |x Foodstuffs  |x Food  |x Baked goods  |x Cookies  |x Special Section: Applying Information Economics to Corporate Strategy 
655 4 |a research-article 
700 1 |a Hui, Kai-Lung  |e verfasserin  |4 aut 
700 1 |a Lee, Sang-Yong Tom  |e verfasserin  |4 aut 
700 1 |a Png, Ivan P. L.  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t Journal of Management Information Systems  |d Taylor & Francis, Ltd.  |g 24(2007), 2, Seite 13-42  |w (DE-627)32495817X  |w (DE-600)2033010-8  |x 1557928X  |7 nnns 
773 1 8 |g volume:24  |g year:2007  |g number:2  |g pages:13-42 
856 4 0 |u https://www.jstor.org/stable/40398677  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_JST 
912 |a GBV_ILN_11 
912 |a GBV_ILN_20 
912 |a GBV_ILN_22 
912 |a GBV_ILN_23 
912 |a GBV_ILN_24 
912 |a GBV_ILN_26 
912 |a GBV_ILN_31 
912 |a GBV_ILN_32 
912 |a GBV_ILN_39 
912 |a GBV_ILN_40 
912 |a GBV_ILN_60 
912 |a GBV_ILN_62 
912 |a GBV_ILN_63 
912 |a GBV_ILN_65 
912 |a GBV_ILN_69 
912 |a GBV_ILN_70 
912 |a GBV_ILN_90 
912 |a GBV_ILN_95 
912 |a GBV_ILN_100 
912 |a GBV_ILN_110 
912 |a GBV_ILN_120 
912 |a GBV_ILN_151 
912 |a GBV_ILN_152 
912 |a GBV_ILN_187 
912 |a GBV_ILN_224 
912 |a GBV_ILN_285 
912 |a GBV_ILN_370 
912 |a GBV_ILN_374 
912 |a GBV_ILN_647 
912 |a GBV_ILN_702 
912 |a GBV_ILN_2001 
912 |a GBV_ILN_2003 
912 |a GBV_ILN_2005 
912 |a GBV_ILN_2006 
912 |a GBV_ILN_2007 
912 |a GBV_ILN_2009 
912 |a GBV_ILN_2010 
912 |a GBV_ILN_2011 
912 |a GBV_ILN_2014 
912 |a GBV_ILN_2015 
912 |a GBV_ILN_2018 
912 |a GBV_ILN_2020 
912 |a GBV_ILN_2021 
912 |a GBV_ILN_2025 
912 |a GBV_ILN_2026 
912 |a GBV_ILN_2027 
912 |a GBV_ILN_2034 
912 |a GBV_ILN_2044 
912 |a GBV_ILN_2048 
912 |a GBV_ILN_2050 
912 |a GBV_ILN_2055 
912 |a GBV_ILN_2056 
912 |a GBV_ILN_2057 
912 |a GBV_ILN_2059 
912 |a GBV_ILN_2061 
912 |a GBV_ILN_2065 
912 |a GBV_ILN_2068 
912 |a GBV_ILN_2088 
912 |a GBV_ILN_2093 
912 |a GBV_ILN_2106 
912 |a GBV_ILN_2107 
912 |a GBV_ILN_2108 
912 |a GBV_ILN_2111 
912 |a GBV_ILN_2112 
912 |a GBV_ILN_2113 
912 |a GBV_ILN_2118 
912 |a GBV_ILN_2119 
912 |a GBV_ILN_2122 
912 |a GBV_ILN_2129 
912 |a GBV_ILN_2143 
912 |a GBV_ILN_2147 
912 |a GBV_ILN_2148 
912 |a GBV_ILN_2152 
912 |a GBV_ILN_2153 
912 |a GBV_ILN_2190 
912 |a GBV_ILN_2232 
912 |a GBV_ILN_2336 
912 |a GBV_ILN_2470 
912 |a GBV_ILN_2472 
912 |a GBV_ILN_2507 
912 |a GBV_ILN_2548 
912 |a GBV_ILN_2949 
912 |a GBV_ILN_2950 
912 |a GBV_ILN_4035 
912 |a GBV_ILN_4037 
912 |a GBV_ILN_4046 
912 |a GBV_ILN_4112 
912 |a GBV_ILN_4125 
912 |a GBV_ILN_4126 
912 |a GBV_ILN_4242 
912 |a GBV_ILN_4246 
912 |a GBV_ILN_4249 
912 |a GBV_ILN_4251 
912 |a GBV_ILN_4305 
912 |a GBV_ILN_4306 
912 |a GBV_ILN_4307 
912 |a GBV_ILN_4313 
912 |a GBV_ILN_4322 
912 |a GBV_ILN_4323 
912 |a GBV_ILN_4324 
912 |a GBV_ILN_4325 
912 |a GBV_ILN_4326 
912 |a GBV_ILN_4335 
912 |a GBV_ILN_4338 
912 |a GBV_ILN_4346 
912 |a GBV_ILN_4393 
912 |a GBV_ILN_4700 
951 |a AR 
952 |d 24  |j 2007  |e 2  |h 13-42