The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns

Référence :
Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343-354

Idée / dominante :

Dans le e-commerce, la « disposition to privacy », ou aspiration générale d’un individu à la protection de ses données personnelles (fonction d’éventuelles expériences préalables), la réputation perçue du site internet et la familiarité personnelle avec ledit site ont une influence sur la naissance d’inquiétudes et de craintes, ressenties par les consommateurs, liées à la confidentialité.

page1image8552

Résumé :

L’article se concentre sur le e-commerce, aux yeux du consommateur, alors que ce domaine est souvent étudié du point de vue organisationnel. Il s’agit plus précisément d’étudier l’influence de la « disposition to privacy » (ou degré d’importance donné à la confidentialité des informations), de la familiarité personnelle avec un site internet, et de la perception de la réputation de ce site sur les différentes inquiétudes liées à la protection des données pouvant naître lors d’une expérience sur un site de e- commerce. L’auteur rappelle ici qu’il s’agit d’un type précis d’inquiétudes liées à l’utilisation d’internet, et défend l’idée selon laquelle il y a inquiétude lorsque le seuil d’exigence du consommateur n’est pas atteint. Autrement dit, son expérience ne parvient pas à la hauteur de ses attentes. Plusieurs facteurs peuvent influencer cette inquiétude : la réputation du site, la politique de confidentialité, les assurances de confidentialité (notamment les labels délivrées par une instance tierce => importance minime, cf autres travaux), la sensibilité de l’information délivrée et sa pertinence, la confiance et le degré de présence sociale, la perception du contrôle personnel sur sa « privacy », ainsi que l’importance que l’individu y attache (i.e. « disposition to privacy »).

Pour répondre à son modèle de recherche, l’auteur a créé un questionnaire dont les 28 items étaient répartis de la façon suivante : degré d’importance de la « privacy », réputation du site, familiarité avec le site, inquiétudes propres au site, bénéfice perçu, expérience préalable avec les problématiques de confidentialité, comportement envisagé. Ce questionnaire, soumis à un échantillon représentatif de la société américaine, a reçu 110 réponses exploitables (taux de participation de 32,9%).

Hypothèses de recherche validées par l’étude empirique :

  • le degré d’importance donnée à la « privacy » (« disposition to privacy ») a une influence positive sur les inquiétudes des consommateurs (plus le consommateur attache de l’importance à la protection de ses données, plus celui-ci sera inquiet),
  • la perception de la réputation du site internet (de e-commerce) a une influence négative sur les inquiétudes,
  • la familiarité du consommateur avec le site internet considéré a une influence négative sur les inquiétudes,
  • la confrontation préalable de l’individu à une situation présentant des risques pour la protection de ses données impacte positivement le degré d’importance donné à la « privacy »,
  • plus le consommateur est inquiet, moins il est enclin à utiliser le site internet considéré (impactnégatif).L’étude relate également que l’introduction de variables démographiques et sociales (âge, sexe, éducation) ont un impact non-significatif sur le degré d’importance donné à la protection des données.

page1image31840 page1image32000

Notes d’intérêt pour la recherche en cours :

Revue de la littérature sur les attributs de la « disposition to privacy », synthèse de travaux de Westin (1967), Altman (1975, 1976) et Laufer & Wolfe (1977), approfondissement des travaux de Xu et al. (2011) en incluant des facteurs contextuels.

Ce qui n’a pas été abordé :

Article centré sur le e-commerce. Dans quelle mesure, peut-on étendre ces enseignements à l’utilisation des réseaux sociaux ? L’utilisation de variables démographiques et sociales pour comprendre comment le consommateur appréhende un site internet (en termes de fiabilité/réputation/familiarité) n’est pas relatée ici.

page1image40016

Références :

Ajzen, I. (2001). Nature and operation of attitudes, Annual Review of Psychology, 52 (1), 27–58.

Altman, I. (1976). Privacy: a conceptual analysis, Environment and Behavior, 8 (1), 7–29.

Andrade, E.B., Kaltcheva, V. and Weitz, B. Self-disclosure on the web: the impact of privacy policy, reward, and company reputation, Advances in Consumer Research, 29 (1), 350–353.

Angst, C.M., Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion, MIS Quarterly, 33 (2), 339–370.

Awad, N.F. and Krishnan, M.S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly, 30 (1), 13–28.

Bansal, G., Zahedi, F.M. and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online, Decision Support Systems, 49 (2), 138–150.

Belanger, F. and Crossler, R.E. (2011). Privacy in the digital age: a review of information privacy research in information systems, MIS Quarterly, 35 (4), 1017–1041.

Bellman, S., Johnson, E., Kobrin, S. and Lohse, G. (2004). International differences in information privacy concerns: a global survey of consumers, Information Society, 20 (5), 313–324.

Casaló, L., Flavián, C. and Guinalíu, M. (2008). The role of perceived usability, reputation, satisfaction and consumer familiarity on the website loyalty formation process,Computers in Human Behavior, 24 (2), 325–345.

Casalo, L.V., Flavian, C., Miguel, G. (2007). The role of security, privacy, usability and reputation in the development of online banking, Online Information Review, 31 (5), 583–603.

Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H.R. and Upadhyaya, S.J. (2009). Internet and online information privacy: an exploratory study of preteens and early teens, IEEE Transactions on Professional Communication, 52 (2), 167–182.

Chin, W.W. (1998). Issues and opinion on structural equation modeling, MIS Quarterly, 22 (1), 7–16.

Culnan, M.J., Armstrong, P.K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation, Organization Science, 10 (1), 104–115.

Eastlick, M.A., Lotz, S.L., Warrington, P. (2006). Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment, Journal of Business Research, 59 (8), 877–886.

Facteau, J.D., Dobbins, G.H., Russell, J.E.A., Ladd, R.T. and Kudisch, J.D. (1995). The influence of general perceptions of the training environment on pretraining motivation and perceived training transfer, Journal of Management, 21 (1), 1–25.

Fornell, C., Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error, Journal of Marketing Research, 18, 39–50.

Gefen, D. (2000). E-commerce: the role of familiarity and trust, Omega, 28, 725–737.

Gefen, D., Karahanna, E. and Straub, D. (2003). Trust and TAM in online shopping: an integrated 
model, MIS Quarterly, 27 (1), 51–90.

Gefen, D. and Straub, D. The relative importance of perceived ease of use in IS adoption: 
a study of e-commerce adoption, Journal of the Association for Information Systems, 
1 (8), 1–28.

Gefen, D. and Straub, D.W. (2004). Consumer trust in B2C e-Commerce and the importance of 
social presence: experiments in e-Products and e-Services, Omega 32, (6), 407–424.

Haans, A., Kaiser, F.G. an de Kort, Y.A.W. (2007). Privacy needs in office environments: develop- 
ment of two behavior-based scales, European Psychologist, 12 (2), 93–102.

Hann, I., Hui, K. and Lee, S.T. (2007). I.P.L. Png, Overcoming online information privacy concerns: an information-processing theory approach, Journal of Management Information Systems, 24 (2), 13–42.

Hoadley, C.M., Xu, H., Lee, J.J. and Rosson, M.B. (2010). Privacy as information access and illusory 
control: the case of the Facebook News Feed privacy outcry, Electronic Commerce Research and Applications, 9 (1), 50–60.

Hoffman, D.L., Novak, T.P. and Peralta, M.A. (1999). Information privacy in the marketspace: 
implications for the commercial uses of anonymity on the Web, Information Society,
15 (2), 129–139.

Jin, B., Park, J.Y. and Kim, J. (2010). Joint influence of online store attributes and offline operations 
on performance of multichannel retailers, Behaviour & Information Technology, 29 
(1), 85–96.

Jøsang, A., Ismail, R. and Boyd, C. (2007). A survey of trust and reputation systems for online 
service provision, Decision Support Systems, 43 (2), 618–644.

Kim, D.J., Ferrin, D.L. and Rao, H.R. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents, 
Decision Support Systems, 44 (2), 544–564.

Kim, D.J., Steinfield, C. and Lai, Y.J. (2008). Revisiting the role of web assurance seals in 
business-to-consumer electronic commerce, Decision Support Systems, 44 (4),1000–1015.

Laufer, R.S. and Wolfe, M. (1977). Privacy as a concept and a social issue: a multidimensional 
development theory, Journal of Social Issues, 33 (3), 23–42.

Lee, C.H. and Cranage, D.A. (2011). Personalisation-privacy paradox: the effects of personalisation and privacy assurance on customer responses to travel Web sites, Tourism Management, 32 (5), 987–994.

Lee, D.J., Ahn, J.H. and Bang, Y. (2011). Managing consumer privacy concerns in personalization: a 
strategic analysis of privacy protection, MIS Quarterly, 35 (2), 423–444.

Lee, Y. and Kwon, O. (2011). Intimacy, familiarity and continuance intention: an extended expectation–confirmation model in web-based services, Electronic Commerce Research and Applications, 10 (3), 342–357.

Li, H., Sarathy, R. and Xu, H. (2010). Understanding situational online information disclosure as a 
privacy calculus, Journal of Computer Information Systems, 62–71.

Li, Y. (2011). Empirical studies on online information privacy concerns: literature review and an integrative framework, Communications of the Association for Information Systems, 28 (28), 453–496.

Li, Y. (2012). Theories in online information privacy research: a critical review and an 
integrated framework, Decision Support Systems, 54 (1), 471–481.

Liao, C., Liu, C.-C. and Chen, K. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model, Electronic Commerce Research and Applications, 10 (6), 702–715.

Lwin, M., Wirtz, J. and Williams, J.D. (2007). Consumer online privacy concerns and responses: a 
power-responsibility equilibrium perspective, Journal of the Academy of Marketing Science, 35 (4), 572–585.

Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004). Internet Users’ Information Privacy Concerns 
(IUIPC): the construct, the scale, and a causal model, Information Systems Research, 15 (4), 336–355.

Margulis, S.T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy, Journal of Social Issues, 59 (2), 411–429.

Margulis, S.T. (2003). Privacy as a social issue and behavioral concept, Journal of Social Issues, 59 (2), 243–261.

Meinert, D.B., Peterson, D.K., Criswell, J.R., Crossland, M.D. (2006). Privacy policy statements and consumer willingness to provide personal information, Journal of Electronic Commerce in Organizations, 4 (1), 1–17.

Milberg, S.J., Smith, H.J., Burke, S.J. (2000). Information privacy: corporate management and national regulation, Organization Science, 11 (1), 35–57.

Milne, G.R., Culnan, M.J. and Greene, H. (2006). A longitudinal assessment of online privacy notice readability, Journal of Public Policy & Marketing, 25 (2), 238–249.

Miyazaki, A.D. (2008). Online privacy and the disclosure of cookie use: effects on consumer trust and anticipated patronage, Journal of Public Policy & Marketing, 27 (1), 19–33.

Papacharissi, Z. and Fernback, J. (2005). Online privacy and consumer protection: an analysis of portal privacy statements, Journal of Broadcasting & Electronic Media, 49 (3), 259–281.

Pavlou, P.A. (2011). State of the information privacy literature: where are we now and where should we go?, MIS Quarterly, 35 (4), 977–988.

Pavlou, P.A., Liang, H. and Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective, MIS Quarterly, 31 (1), 105–136.

Petronio, S.S. (1991) Communication boundary management: a theoretical model of managing disclosure of private information between marital couples, Communication Theory, 311–335.

Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology, 88 (5), 879–903.

Rensel, A.D., Abbas, J.M. and Rao, H.R. (2006). Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use, Journal of the Association for Information Systems, 7 (1), 19–51.

Rohm, A.J. and Milne, G.R. (2004). Just what the doctor ordered: the role of information sensitivity and trust in reducing medical information privacy concern, Journal of Business Research, 57 (9), 1000–1011.

Rust, R., Kannan, P. and Peng, N. (2002). The customer economics of internet privacy, Journal of the Academy of Marketing Science, 30 (4), 455–464.

Sai, Y. (2008). Transparent Safe, Decision Support Systems, 46 (1), 41–51.

Smith, H.J., Dinev, T. and Xu, H. Information privacy research: an interdisciplinary review,MIS Quarterly, 35 (4), 989–1015.

Son, J.Y., Kim, S.S. (2008). Internet users’ information privacy-protective responses: ataxonomy and a nomological model, MIS Quarterly, 32 (3), 503–529.

Stafford, T.F., Urbaczewski, A. (2004). Spyware: the ghost in the machine, Communicationsof the Association for Information Systems, 14 (15), 291–306.

Van Slyke, C., Shim, J.T., Johnson, R., Jiang, J. (2006). Concern for information privacy and online consumer purchasing, Journal of the Association for Information Systems, 7(6), 415–443.

Westin, A.F. (2003). Social and political dimensions of privacy, Journal of Social Issues, 59 (2), 431–453.

Wood, W. (2000). Attitude change: persuasion and social influence, Annual Review of Psychology, 51 (1), 539.

Xu, H., Crossler, R.E. and Bélanger, F. (2012). A value sensitive design investigation of privacy enhancing tools in web browsers, Decision Support Systems.

Xu, H., Dinev, T., Smith, H.J. and Hart, P. (2011). Information privacy concerns: linking individual perceptions with institutional privacy assurances, Journal of the Association for Information Systems, 12 (12), 798–824.

Yao, M.Z., Rice, R.E. and Wallis, K. (2007). Predicting user concerns about online privacy, Journal ofthe American Society for Information Science & Technology, 58 (5), 710–722.

Zimmer, J.C., Arsal, R., Al-Marzouq, M., Moore, D. and Grover, V. (2010). Knowing your customers: using a reciprocal relationship to enhance voluntary information disclosure,Decision Support Systems, 48 (2), 395–406.

Zviran, M. (2008). User’s perspectives on privacy in web-based applications, Journal ofComputer Information Systems, 48 (4), 97–105.