IDEAS home Printed from https://ideas.repec.org/a/spr/infotm/v17y2016i4d10.1007_s10799-015-0246-0.html
   My bibliography  Save this article

The interpersonal privacy identity (IPI): development of a privacy as control model

Author

Listed:
  • Tabitha L. James

    (Virginia Tech)

  • Quinton Nottingham

    (Virginia Tech)

  • Stephane E. Collignon

    (Virginia Tech)

  • Merrill Warkentin

    (Mississippi State University)

  • Jennifer L. Ziegelmayer

    (Qatar University)

Abstract

The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 (1977)). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.

Suggested Citation

  • Tabitha L. James & Quinton Nottingham & Stephane E. Collignon & Merrill Warkentin & Jennifer L. Ziegelmayer, 2016. "The interpersonal privacy identity (IPI): development of a privacy as control model," Information Technology and Management, Springer, vol. 17(4), pages 341-360, December.
  • Handle: RePEc:spr:infotm:v:17:y:2016:i:4:d:10.1007_s10799-015-0246-0
    DOI: 10.1007/s10799-015-0246-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10799-015-0246-0
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10799-015-0246-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Taner Pirim & Tabitha James & Katherine Boswell & Brian Reithel & Reza Barkhi, 2008. "An Empirical Investigation of an Individual's Perceived Need for Privacy and Security," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 2(1), pages 42-53, January.
    2. Mary J. Culnan & Pamela K. Armstrong, 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, INFORMS, vol. 10(1), pages 104-115, February.
    3. Jeffrey T. Child & Judy C. Pearson & Sandra Petronio, 2009. "Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 60(10), pages 2079-2094, October.
    4. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    5. May O. Lwin & Jerome D. Williams, 2003. "A Model Integrating the Multidimensional Developmental Theory of Privacy and Theory of Planned Behavior to Examine Fabrication of Information Online," Marketing Letters, Springer, vol. 14(4), pages 257-272, December.
    6. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    7. Kathy A. Stewart & Albert H. Segars, 2002. "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research, INFORMS, vol. 13(1), pages 36-49, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Grace Fox & Tabitha L. James, 2021. "Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study," Information Systems Frontiers, Springer, vol. 23(6), pages 1537-1562, December.
    2. Girish N. Punj, 2019. "Understanding individuals’ intentions to limit online personal information disclosures to protect their privacy: implications for organizations and public policy," Information Technology and Management, Springer, vol. 20(3), pages 139-151, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Corey Angst, 2009. "Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges," Journal of Business Ethics, Springer, vol. 90(2), pages 169-178, November.
    2. Rouven-B. Wiegard & Michael H. Breitner, 2019. "Smart services in healthcare: A risk-benefit-analysis of pay-as-you-live services from customer perspective in Germany," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(1), pages 107-123, March.
    3. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
    4. Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    5. Liang, Sai & Li, Hui & Liu, Xianwei & Schuckert, Markus, 2019. "Motivators behind information disclosure: Evidence from Airbnb hosts," Annals of Tourism Research, Elsevier, vol. 76(C), pages 305-319.
    6. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 0. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
    7. Carpenter, Darrell & Maasberg, Michele & Hicks, Chelsea & Chen, Xiaogang, 2016. "A multicultural study of biometric privacy concerns in a fire ground accountability crisis response system," International Journal of Information Management, Elsevier, vol. 36(5), pages 735-747.
    8. Heng Xu & Hock-Hai Teo & Bernard C. Y. Tan & Ritu Agarwal, 2012. "Research Note ---Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services," Information Systems Research, INFORMS, vol. 23(4), pages 1342-1363, December.
    9. Janice Y. Tsai & Serge Egelman & Lorrie Cranor & Alessandro Acquisti, 2011. "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study," Information Systems Research, INFORMS, vol. 22(2), pages 254-268, June.
    10. Wall, Marco, 2022. "One User – Two Viewpoints? An Examination of Information Privacy Concerns from the Employee and Consumer Perspective," Junior Management Science (JUMS), Junior Management Science e. V., vol. 7(4), pages 986-1000.
    11. Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg, 2018. "Privacy and biometrics: An empirical examination of employee concerns," Information Systems Frontiers, Springer, vol. 20(1), pages 91-110, February.
    12. Grace Fox & Tabitha L. James, 2021. "Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study," Information Systems Frontiers, Springer, vol. 23(6), pages 1537-1562, December.
    13. Huarng, Kun-Huang & Yu, Tiffany Hui-Kuang & Lee, Cheng fang, 2022. "Adoption model of healthcare wearable devices," Technological Forecasting and Social Change, Elsevier, vol. 174(C).
    14. Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
    15. David Harborth & Sebastian Pape, 2020. "Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias," Future Internet, MDPI, vol. 12(12), pages 1-16, December.
    16. Grace Fox & Lisa van der Werff & Pierangelo Rosati & Patricia Takako Endo & Theo Lynn, 2022. "Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil: An extended privacy calculus perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 944-967, July.
    17. Tajvidi, Mina & Richard, Marie-Odile & Wang, YiChuan & Hajli, Nick, 2020. "Brand co-creation through social commerce information sharing: The role of social media," Journal of Business Research, Elsevier, vol. 121(C), pages 476-486.
    18. Sun, Shiwei & Zhang, Jin & Zhu, Yiwei & Jiang, Mian & Chen, Shuhui, 2022. "Exploring users' willingness to disclose personal information in online healthcare communities: The role of satisfaction," Technological Forecasting and Social Change, Elsevier, vol. 178(C).
    19. Kim, Yeolib & Kim, Seung Hyun & Peterson, Robert A. & Choi, Jeonghye, 2023. "Privacy concern and its consequences: A meta-analysis," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    20. Pagani, Margherita & Racat, Margot & Hofacker, Charles F., 2019. "Adding Voice to the Omnichannel and How that Affects Brand Trust," Journal of Interactive Marketing, Elsevier, vol. 48(C), pages 89-105.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infotm:v:17:y:2016:i:4:d:10.1007_s10799-015-0246-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.