IDEAS home Printed from https://ideas.repec.org/a/spr/elmark/v29y2019i3d10.1007_s12525-019-00335-0.html
   My bibliography  Save this article

Perceived information sensitivity and interdependent privacy protection: a quantitative study

Author

Listed:
  • Jakob Wirth

    (University of Bamberg)

  • Christian Maier

    (University of Bamberg)

  • Sven Laumer

    (Friedrich-Alexander-Universität Erlangen-Nürnberg)

  • Tim Weitzel

    (University of Bamberg)

Abstract

From a theoretical point of view, previous research has considered information sensitivity in terms of potential negative consequences for someone who has disclosed information to others and that information becomes public. However, making information public could also have negative consequences for other individuals as well. In this study, we extend the concept of information sensitivity to include negative consequences for other individuals and apply it in a quantitative research study. The results prove that the extended concept of information sensitivity leads to a better understanding of privacy-related concepts especially in an interdependent privacy setting. We contribute to theory by defining the extended concept of information sensitivity and by drawing conclusions on how to use it in future privacy research studies.

Suggested Citation

  • Jakob Wirth & Christian Maier & Sven Laumer & Tim Weitzel, 2019. "Perceived information sensitivity and interdependent privacy protection: a quantitative study," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(3), pages 359-378, September.
  • Handle: RePEc:spr:elmark:v:29:y:2019:i:3:d:10.1007_s12525-019-00335-0
    DOI: 10.1007/s12525-019-00335-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12525-019-00335-0
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12525-019-00335-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. repec:hal:spmain:info:hdl:2441/14otokka698nb83lk2n7bhqbo2 is not listed on IDEAS
    2. Stephen Leider & Markus M. Möbius & Tanya Rosenblat & Quoc-Anh Do, 2009. "Directed Altruism and Enforced Reciprocity in Social Networks," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 124(4), pages 1815-1851.
    3. Michael Boyer O'Leary & Anca Metiu & Jeanne M. Wilson, 2011. "Beyond Being There: The Symbolic Role of Communication and Identification in the Emergence of Perceived Proximity in Geographically Dispersed Work," Post-Print hal-00661000, HAL.
    4. Gerlach, Jin & Widjaja, Thomas & Buxmann, Peter, 2015. "Handle with Care: How Online Social Network Providers’ Privacy Policies Impact Users’ Information Sharing Behavior," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 66108, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    5. Thomas Hess & Christine Legner & Werner Esswein & Wolfgang Maaß & Christian Matt & Hubert Österle & Hannes Schlieter & Peggy Richter & Rüdiger Zarnekow, 2014. "Digital Life as a Topic of Business and Information Systems Engineering?," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 6(4), pages 247-253, August.
    6. Nicky J. Welton & Howard H. Z. Thom, 2015. "Value of Information," Medical Decision Making, , vol. 35(5), pages 564-566, July.
    7. John Hulland, 1999. "Use of partial least squares (PLS) in strategic management research: a review of four recent studies," Strategic Management Journal, Wiley Blackwell, vol. 20(2), pages 195-204, February.
    8. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    9. Moon, Youngme, 2000. "Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 26(4), pages 323-339, March.
    10. Zike Cao & Kai-Lung Hui & Hong Xu, 2018. "An Economic Analysis of Peer Disclosure in Online Social Communities," Information Systems Research, INFORMS, vol. 29(3), pages 546-566, September.
    11. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    12. Berg Joyce & Dickhaut John & McCabe Kevin, 1995. "Trust, Reciprocity, and Social History," Games and Economic Behavior, Elsevier, vol. 10(1), pages 122-142, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Khaled Almotairi & Bilal Bataineh, 2020. "Perception of Information Sensitivity for Internet Users in Saudi Arabia," Acta Informatica Pragensia, Prague University of Economics and Business, vol. 2020(2), pages 184-199.
    2. Sk Abu Khalek & Chandan Kumar Behera & Tamal Samanta, 2024. "An integrated framework for understanding information disclosure behaviour in mobile payment services," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 29(3), pages 1077-1098, September.
    3. Anjuli Franz & Alexander Benlian, 2022. "Exploring interdependent privacy – Empirical insights into users’ protection of others’ privacy on online platforms," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(4), pages 2293-2309, December.
    4. Khaled Almotairi & Bilal Bataineh, . "Perception of Information Sensitivity for Internet Users in Saudi Arabia," Acta Informatica Pragensia, Prague University of Economics and Business, vol. 0.
    5. Eva-Maria Schomakers & Chantal Lidynia & Martina Ziefle, 2020. "All of me? Users’ preferences for privacy-preserving data markets and the importance of anonymity," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(3), pages 649-665, September.
    6. Dassel, Katharina Sophie & Klein, Stefan, 2023. "To Zoom or not: Diverging responses to privacy and security risks," Journal of Business Research, Elsevier, vol. 161(C).
    7. Christian Matt & Manuel Trenz & Christy M. K. Cheung & Ofir Turel, 2019. "The digitization of the individual: conceptual foundations and opportunities for research," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(3), pages 315-322, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. David Schneider & Johannes Klumpe & Martin Adam & Alexander Benlian, 2020. "Nudging users into digital service solutions," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(4), pages 863-881, December.
    2. Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
    3. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    4. Xuequn Wang & Mina Tajvidi & Xiaolin Lin & Nick Hajli, 2020. "Towards an Ethical and Trustworthy Social Commerce Community for Brand Value Co-creation: A trust-Commitment Perspective," Journal of Business Ethics, Springer, vol. 167(1), pages 137-152, November.
    5. Bonsón Ponte, Enrique & Carvajal-Trujillo, Elena & Escobar-Rodríguez, Tomás, 2015. "Influence of trust and perceived value on the intention to purchase travel online: Integrating the effects of assurance on trust antecedents," Tourism Management, Elsevier, vol. 47(C), pages 286-302.
    6. Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    7. Shirazi, Farid & Wu, Yun & Hajli, Ali & Zadeh, Arash H. & Hajli, Nick & Lin, Xiaolin, 2021. "Value co-creation in online healthcare communities," Technological Forecasting and Social Change, Elsevier, vol. 167(C).
    8. Tseng, Hsiao-Ting & Ibrahim, Fahad & Hajli, Nick & Nisar, Tahir M. & Shabbir, Haseeb, 2022. "Effect of privacy concerns and engagement on social support behaviour in online health community platforms," Technological Forecasting and Social Change, Elsevier, vol. 178(C).
    9. Liang, Sai & Li, Hui & Liu, Xianwei & Schuckert, Markus, 2019. "Motivators behind information disclosure: Evidence from Airbnb hosts," Annals of Tourism Research, Elsevier, vol. 76(C), pages 305-319.
    10. Hanna Krasnova & Natasha Veltri & Oliver Günther, 2012. "Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 4(3), pages 127-135, June.
    11. Gupta, Shaphali & Leszkiewicz, Agata & Kumar, V. & Bijmolt, Tammo & Potapov, Dmitriy, 2020. "Digital Analytics: Modeling for Insights and New Methods," Journal of Interactive Marketing, Elsevier, vol. 51(C), pages 26-43.
    12. Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
    13. Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
    14. Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
    15. Sara Moussawi & Marios Koufaris & Raquel Benbunan-Fich, 2021. "How perceptions of intelligence and anthropomorphism affect adoption of personal intelligent agents," Electronic Markets, Springer;IIM University of St. Gallen, vol. 31(2), pages 343-364, June.
    16. David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
    17. Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
    18. Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
    19. Emily Breza & Arun G. Chandrasekhar & Horacio Larreguy, 2014. "Social Structure and Institutional Design: Evidence from a Lab Experiment in the Field," NBER Working Papers 20309, National Bureau of Economic Research, Inc.
    20. Kim, Yeolib & Kim, Seung Hyun & Peterson, Robert A. & Choi, Jeonghye, 2023. "Privacy concern and its consequences: A meta-analysis," Technological Forecasting and Social Change, Elsevier, vol. 196(C).

    More about this item

    Keywords

    Privacy; Information sensitivity; Communication privacy management theory; Interdependent privacy; Motivation to comply;
    All these keywords.

    JEL classification:

    • O33 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Technological Change: Choices and Consequences; Diffusion Processes

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:elmark:v:29:y:2019:i:3:d:10.1007_s12525-019-00335-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.