Référence :
Smith, H.J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35 (4), 989-1015
Idée / dominante :
Après avoir dressé une synthèse des différents travaux, faits à date, concernant la problématique de la « privacy », qui reste très difficile à définir, les auteurs expliquent que les études mentionnées n’étaient pas assez « cohésives ». En effet, les recherches effectuées. Les prochaines études devraient aller dans un sens commun, visant notamment à optimiser le modèle « APCO » pour le rendre universel et exploitable pour toutes les disciplines.
Résumé :
Cet article a pour principale vocation d’être une synthèse des travaux réalisés à date. Les problématiques liées à la « privacy » sont de plus en plus prégnantes, alors que Gomez et al. (2009) relatent que la plupart des sites internet utilisent les données personnelles des internautes pour la publicité ciblée et les partagent avec des centaines d’entreprises affiliées. Une enquête de l’institut Ponemon (2007) révèle que 62% des répondants ont été averti que leurs données personnelles avaient été perdues ou volées, et que 84% des répondant exprimaient des inquiétudes croissantes quant à ces pertes de données.
Les auteurs spécifient que l’aspect qui est traité dans l’article est bien la « privacy » de l’information (au sens large), à différencier de la «privacy» physique, qui peut faire allusion à toute autre intrusion/violation. Cette « privacy » de l’information est à mettre en relation avec la problématique éthique (Byrnum 2008 ; Pearlson & Saunder 2009), et est traitées sous 3 angles : l’angle normatif (ce qu’est la « privacy »), accompagné de l’angle purement descriptif, puis sous l’angle empirique (tests des différentes théories mises en lumière par les chercheurs).
La première définition de la « privacy » était celle d’un DROIT humain, intégré dans le système de valeurs morales. Cela a rapidement soulevé un paradoxe étant donné que le nombre d’inquiétudes augmentait, tout comme le nombre de renseignements laissés sur internet. La « privacy » a alors été considéré comme un bien (Bennett 1995), qui n’est pas absolu. Westin (1967) l’a définie comme « un retrait volontaire et temporaire d’une personne de la société ». Cela a introduit la notion d’état (« state »), comme un « état d’accès limité». Altman (1975) a quant à lui introduit la notion de «contrôle», en définissant la « privacy » comme « le contrôle sélectif de l’accès à soi ». Cette définition présente l’intérêt de mieux correspondre aux attributs de la «privacy» de l’information. Toutefois, cette définition a été contrebalancée par Laufer & Wolfe (1977), car, selon eux, le contrôle est un attribut de la « privacy », mais celle-ci ne peut pas être un contrôle, à proprement parler. La « privacy » doit petre distinguée de l’anonymat (Camp 1999), du secret, de la confidentialité (car la « privacy » est plus un souhait alors que la confidentialité en est une reponse), de la sécurité et de l’éthique (cf. mapping présenté dans l’article). => Difficile de trouver un synonyme en français.
Beaucoup de recherches ont été jusque là guidée par le modèle APCO : (1) Antecedents -> (2) Privacy concerns -> (3) Outcomes.
(1) Comprend différents paramètres comme l’expérience, le niveau d’information, les caractéritiques démographiques et ethniques…
(2) Peut être considéré comme une variable fixe ou non.
(3) Inclus notamment le calcul risques/bénéfices, influant sur le comportement (ou plus précisément sur les intentions).
Risque : potentielle perte de contrôle sur ses informations personnelles
Bénéfices: récompenses financières, personnalisation, ajustement social (établissement d’une identité social, via l’intégration de groupes sociaux).
Notes d’intérêt pour la recherche en cours :
Synthèse exhaustive des 320 articles et des 128 ouvrages écrits sur la «privacy», tableaux de classification des œuvres par thèmes en annexe, présentation du modèle APCO et de ses failles, mapping des tactiques de gestion de l’identité.
Ce qui n’a pas été abordé :
Pas de place pour les caractéristiques d’un site internet, dont l’appréciation est soumise à jugement subjectif, dans les antécédents jouant un rôle sur le niveau d’inquiétude des individus. Le croisement de cet article avec les recherches qui ont été faites ensuite permettrait de creuser ce point, notamment pour ce qui est des réseaux sociaux.
Références :
Ackerman, M. (2004). Privacy in Pervasive Environments: Next Generation Labeling Protocols, Personal and Ubiquitous Computing 8 (6), 430-439.
Acquisti, A. (2004). Privacy in Electronic Commerce and the Economics of Immediate Gratification, in Proceedings of the 5th ACM Electronic Commerce Conference, New York: ACM Press, 21-29.
Acquisti, A., and Gross, R. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, in Proceedings of 6th Privacy Enhancing Technologies Symposium, Cambridge, UK, June 28-30, 36-58.
Acquisti, A., and Grossklags, J. (2005a). Privacy and Rationality in Individual Decision Making, IEEE Security & Privacy 3 (1), 26-33.
Acquisti, A., and Grossklags, J. (2005b). Uncertainty, Ambiguity and Privacy,” in Proceedings of the 4th Annual Workshop Economics and Information Security, Cambridge, MA, June 2-3, 2-3.
Acquisti, A., and Varian, H. R. (2005). Conditioning Prices on Purchase History, Marketing Science 24(3), 367-381.
Alderman, E., and Kennedy, C. (1997). The Right to Privacy, New York: Vintage Books.
Allen, M. W., Coopman, S. J., Hart, J. L., and Walker, K. L. (2007). Workplace Surveillance and Managing Privacy Boundaries, Management Communication Quarterly 21(2), 172-200.
Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Monterey, CA: Brooks/Cole Publishing.
Altman, I. (1977). Privacy Regulation: Culturally Universal or Cul- turally Specific?, Journal of Social Issues 33(3), 66-84.
Andrade, E. B., Kaltcheva, V., and Weitz, B. (2002). Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Brand Reputation, in Advances in Consumer Research, S. M. Broniarczyk and K. Nakamoto (eds.), Valdosta, GA: Association for Consumer Research, 350-353.
Ariss, S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management, Information & Management 39(7), 553-558.
Ashworth, L., and Free, C. (2006). Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Con- sumers Online Privacy Concerns, Journal of Business Ethics 67(2), 107-123.
Awad, N. F., and Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Trans- parency and the Willingness to be Profiled Online for Personalization, MIS Quarterly 30(1), 13-28.
Bansal, G., Zahedi, F., and Gefen, D. (2008). The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation, in Proceedings of 29th International Conference on Information Systems. Paris, France, December 14-17.
Bansal, G., Zahedi, F. M., and Gefen, D. (2010). The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online, Decision Support Systems 49(2), 138-150.
Belanger, F., Hiller, J. S., and Smith, W. J. (2002). Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes, Journal of Strategic Information Systems 11(3-4), 245-270.
Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. (2004). International Differences in Information Privacy Concerns: A Global Survey of Consumers, Information Society 20(5), 313-324.
Bennett, C. J. (1992). Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca, NY: Cornell University Press.
Bennett, C. J. (1995). The Political Economy of Privacy: A Review of the Literature, Hackensack, NJ: Center for Social and Legal Research.
Bennett, C. J., and Raab, C. D. (1997). The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response,” Information Society 13(3), 245-263.
Benson, D. (1983). A Field Study of End User Computing: Findings and Issues, MIS Quarterly 7(4), 35-45.
Blattberg, R. C., and Deighton, J. (1991). Interactive Marketing: Exploiting the Age of Addressability, Sloan Management Review 33(1), 5-14.
Bok, S. (1989). Secrets: On the Ethics of Concealment and Revelation, New York: Vintage.
Bowie, N. E., and Jamal, K. (2006). Privacy Rights on the Internet: Self-Regulation or Government Regulation?, Business Ethics Quarterly 16(3), 323-342.
Boyd, D. (2008). Facebook’s Privacy Trainwreck: Exposure, Invasion and Social Convergence, Convergence: The Inter- national Journal of Research into New Media Technologies 14(1), 13-20.
Boyd, D., and Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication 13(1), Article 11.
Breckenridge, A. C. (1970). The Right to Privacy, Lincoln, NE: University of Nebraska Press, Lincoln.
Brenton, M. (1964). The Privacy Invaders, New York: Coward McCann.
Bruner II, G. C., and Kumar, A. (2007). Attitude toward Location- Based Advertising, Journal of Interactive Advertising 7(2)
Budnitz, M. E. (1998). Privacy Protection for Consumer Trans- actions in Electronic Commerce: Why Self-Regulation Is Inadequate, South Carolina Law Review (49).
Bynum, T. (2008). Computer and Information Ethics, in The Stanford Encyclopedia of Philosophy (Winter 2008 Edition), E. N. Zalta (ed.),Stanford, CA: Center for the Study of Language and Information.
Camp, L. J. (1999). Web Security and Privacy: An American Perspective, Information Society 15(4), 249-256.
Campbell, A. J. (1997). Relationship Marketing in Consumer Markets, Journal of Direct Marketing 11(3), 44-57.
Campbell, J. E., and Carlson, M. (2002). Panopticon.com: Online Surveillance and the Commodification of Privacy, Journal of Broadcasting & Electronic Media 46(4), 586-606.
Caudill, E. M., and Murphy, P. E. (2000). Consumer Online Privacy: Legal and Ethical Issues, Journal of Public Policy & Marketing 19(1), 7-19.
Cespedes, F. V., and Smith, H. J. (1993). Database Marketing: New Rules for Policy and Practice, Sloan Management Review 34(4), 7-22.
Chellappa, R. K. (2008). Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security, unpublished paper, Emory University, Atlanta, GA.
Chellappa, R. K., and Sin, R. (2005). Personalization Versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma, Information Technology and Management 6(2), 181-202.
Chen, K., and Rea, A. I. (2004). Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems 44(4), 85-92.
Clark, T. D., Jones, M. C., and Armstrong, C. P. (2007). The Dynamic Structure of Management Support Systems: Theory Development, Research Focus, and Direction, MIS Quarterly 31(3), 579-615.
Clarke, R. (2001). Person Location and Person Tracking: Tech- nologies, Risks and Policy Implications, Information Technology & People 14(2), 206-231.
Cohen, J. E. (2001). Privacy, Ideology, and Technology: A Response to Jeffrey Rosen, Georgetown Law Journal (89), 2029.
Cranor, L. F. (2003). I Didn’t Buy it for Myself’: Privacy and Ecommerce Personalization, in Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, October 27-30, 111-117
Cranor, L. F., Egelman, S., Tsai, J., and Acquisti, A. (2007). The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study, in Proceedings of 28th International Conference on Information Systems, Montréal, Canada, December 9-12.
Culnan, M. J. (1985). Consumer Awareness of Name Removal Procedures: Implication for Direct Marketing, Journal of Interactive Marketing (9), 10-19.
Culnan, M. J. (1993). ‘How Did They Get My Name’? An Exploratory Investigation of Consumer Attitudes toward Secon- dary Information Use, MIS Quarterly 17(3), 341-364.
Culnan, M. J. 2000. Protecting Privacy Online: Is Self-Regulation Working?, Journal of Public Policy and Marketing 19(1), 20-26.
Culnan, M. J., and Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness and Impersonal Trust: An Empirical Investigation, Organization Science 10(1), 104-115.
Culnan, M. J., and Bies, R. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations, Journal of Social Issues 59(2), 323-342.
Culnan, M. J., and Williams, C. C. (2009). How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches, MIS Quarterly 33(4), 673-687.
D’Urso, S. (2006). Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations, Communication Theory 16(3), 281-303.
Davies, S. G. (1997). Re-Engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity, in Technology and Privacy: The New Landscape, P. E. Agre and M. Rotenberg (eds.), Cambridge, MA: MIT Press, 143-165.
Dhillon, G. S., and Moores, T. (2001). Internet Privacy: Interpreting Key Issues, Information Resources Management Journal 14(4), 33-37.
Dholakia, N., and Zwick, D. (2001). Contrasting European and American Approaches to Privacy in Electronic Markets: A Philosophical Perspective, Electronic Markets 11(2), 116-120.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. (2006a). Internet Users’ Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences between Italy and the United States, Journal of Global Information Management 14(4), 57-93.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. (2006b). Privacy Calculus Model in E-Commerce: A Study of Italy and the United States, European Journal of Information Systems 15(4), 389-402.
Dinev, T., and Hart, P. (2004). Internet Privacy Concerns and Their Antecedents: Measurement Validity and a Regression Model, Behavior and Information Technology 23(6), 413-423.
Dinev, T., and Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research 17(1), 61-80.
Dinev, T., and Hart, P. (2007). Privacy Concerns and Levels of Information Exchange: An Empirical Investigation of Intended E-Services Use, E-Service Journal 4(3), 25-61.
Dinev, T., Xu, H., and Smith, H. J. (2009). Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy, in Proceedings of 42nd Hawaii International Con- ference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
Dolnicar, S., and Jordaan, Y. (2007). A Market-Oriented Approach to Responsibly Managing Information Privacy Concerns in Direct Marketing, Journal of Advertising 36(2), 123-149.
Dwyer, C. 2007. Digital Relationships in the ‘MySpace’ Generation: Results from a Qualitative Study, in Proceedings of 40th Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.
Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace, in Proceedings of the 13th Americas Conference on Information Systems (AMCIS), Keystone, CO, August 9-12.
Eastlick, M. A., Lotz, S. L., and Warrington, P. (2006). Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment, Journal of Business Research 59(8), 877-886.
Edelman, B. (2011). Adverse Selection in Online ‘Trust’ Certifications and Search Results, Electronic Commerce Research and Applications (1), 17-25.
Etzioni, A. (1999). The Limits of Privacy, New York: Basic Books.
Fairweather, N. B. (1999). Surveillance in Employment: The Case of Teleworking, Journal of Business Ethics 22(1), 39-49.
Featherman, M. S., and Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective, International Journal of Human-Computer Studies 59(4), 451-474.
Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
Foxman, E. R., and Kilcoyne, P. (1993). Information Technology Marketing Practice, and Consumer Privacy: Ethical Issues, Journal of Public Policy & Marketing 12(1), 106-119.
Garfinkel, S. (2000). Database Nation: The Death of Privacy in the 21st Century, Sebastopol, CA: O’Reilly Media.
Gomez, J., Pinnick, T., and Soltani, A. (2009). KnowPrivacy: The Current State of Web Privacy, Data Collection, and Information Sharing, School of Information, University of California Berkeley
Goodhue, D. L., and Straub, D. W. (1991). Security Concerns of System Users: A Study of Perceptions of the adequacy of Security, Information and Management 20(1), 13-27.
Grinter, R., and Palen, L. (2002). Instant Messaging in Teen Life, in Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, New Orleans, Louisiana, 21-30.
Gross, R., and Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks, in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA.
Häkkilä, J., and Chatfield, C. (2005). ‘It’s like If You OpenedSomeone Else’s Letter’: User Perceived Privacy and Social Practices with SMS Communication, in Proceedings of the Mobile HCI Conference, Salzburg, Austria, 219-222.
Hann, I.-H., Hui, K.-L., Lee, S. Y. T., and Png, I. P. L. (2008). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach, Journal of Management Information Systems 24(2), 13-42.
Henderson, H. (1999). Privacy in the Information Age, New York: Facts On File.
Herson, L. J. R. (1990). Politics of Ideas: Political Theory and American Public Policy, Long Grove, IL: Waveland Press.
Hirshleifer, J. (1980). Privacy: Its Origin, Function, and Future, The Journal of Legal Studies 9(4), 649-664.
Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010). Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry, Electronic Commerce Research and Applications 9(1), 50-60.
Hodge, M. J. (2006). Fourth Amendment and Privacy Issues on the New Internet: Facebook.com and Myspace.com, Southern Illinois University Law Journal (31), 95-123.
Hoffman, D. L., Novak, T. P., and Peralta, M. A. (1999). Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web, Information Society 15(2), 129-139.
Hui, K.-L., Tan, B. C. Y., and Goh, C.-Y. (2006). Online Information Disclosure: Motivators and Measurements, ACM Transactions on Internet Technology (6), 415-441.
Hui, K. L., Teo, H. H., and Lee, S. Y. T. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment, MIS Quarterly 31(1), 19-33.
Ito, M., and Daisuke, O. (2003). Mobile Phones, Japanese Youth and the Replacement of Social Contact, in Proceedings of Front Stage/Back Stage: Mobile Communication and the Renegotiation of the Social Sphere, R. Ling and P. Pedersen (eds.), Grimstad, Norway.
Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. (2007). Social Phishing, Communications of the ACM 50(10), 94-100.
Jarvenpaa, S. L., and Leidner, D. E. (1999). Communication and Trust in Global Virtual Teams, Organization Science 10(6), 791-815.
Jarvenpaa, S. L., and Tiller, E. H. (1999). Integrating Market, Technology, and Policy Opportunities in E-Business Strategy, Journal of Strategic Information Systems 8(3), 235-249.
Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000). Consumer Trust in an Internet Store, Information Technology and Management 1(12), 45-71.
Jensen, C., Potts, C., and Jensen, C. (2005). Privacy Practices of Internet Users: Self-Reports versus Observed Behavior, International Journal of Human-Computer Studies (63), 203–227.
Jentzsch, N. (2001). The Economics and Regulation of Financial Privacy: A Comparative Analysis of the United States and Europe, Working Paper, John F. Kennedy Institute.
Johnson, C. A. (1974). Privacy as Personal Control, in Man- Environment Interactions: Evaluations and Applications: Part 2, D. H. Carson (ed.), Washington, DC: Environmental Design Research Association, 83-100.
Junglas, A. I., and Spitzmüller, C. (2005). A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services, in Proceedings of the 38th Hawaii International Con- ference on System Sciences, Los Alamitos, CA: IEEE Computing Society Press.
Kelvin, P. (1973). A Social Psychological Examination of Privacy, British Journal of Social and Clinical Psychology (12), 248-261.
Kim, M.-C. (2004). Surveillance Technology, Privacy and Social Control: With Reference to the Case of the Electronic National Identification Card in South Korea, International Sociology 19(2), 193-213.
Kimmel, A. J. (1996). Ethical Issues in Behavioral Research, Boston: Blackwell Publishers.
Klopfer, P. H., and Rubenstein, D. I. (1977). The Concept Privacy and Its Biological Basis, Journal of Social Issues 33(3), 52-65.
Kobsa, A. (2002). Personalized Hypermedia and International Privacy, Communications of the ACM 45(5), 64-67.
Kobsa, A. (2007). Privacy-Enhanced Personalization, Communications of the ACM 50(8), 24-33.
Kobsa, A., and Schreck, J. (2003). Privacy through Pseudonymity in User-Adaptive Systems, ACM Transactions on Internet Technology (3), 149–183.
LaRose, R., and Rifon, N. (2006). Your Privacy Is Assured—of Being Disturbed: Comparing Web Sites with and Without Privacy Seals, New Media and Society 8(6), 1009-1029.
Laudon, K. C. (1996). Markets and Privacy, Communications of the ACM 39(9), 92-104.
Laufer, R. S., and Wolfe, M. (1977). Privacy as a Concept and a Social Issue: Multidimensional Developmental Theory, Journal of Social Issues 33(3), 22-42.
Lederer, S., Hong, J. I., Dey, A. K., and Landay, J. A. (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers, Personal and Ubiquitous Computing 8(6), 440-454.
Lederer, S., Mankoff, J., and Dey, K. A. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing, in Proceedings of Conferences on Human Factors in Computing Systems, Fort Lauderdale, Florida.
Leidner, D., and Kayworth, T. (2006). Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict, MIS Quarterly 30(2), 357-399.
Ling, R. (2004). The Coordination of Everyday Life, in The Mobile Connection: The Cell Phone’s Impact on Society, R. Ling (ed.), Amsterdam: Elsevier, 57-81.
Lu, Y., Tan, B. C. Y., and Hui, K.-L. (2004). Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits, in Proceedings of 25th International Conference on Information Systems, R. Agarwal, L. J. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 9-12, 272-281.
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research 15(4), 336-355.
Margulis, S. T. (1977a). Conceptions of Privacy: Current Status and Next Steps, Journal of Social Issues 33(3), 5-21.
Margulis, S. T. (1977b). Privacy as a Behavioral Phenomenon: Introduction, Journal of Social Issues 33(3), 1-4.
Margulis, S. T. (2003a). On the Status and Contribution of Westin’s and Altman’s Theories of Privacy, Journal of Social Issues 59(2), 411-429.
Margulis, S. T. (2003b). Privacy as a Social Issue and Behavioral Concept, Journal of Social Issues 59(2), 243-261.
Marx, G. T. (1999). What’s in a Name? Some Reflections on the Sociology of Anonymity, Information Society 15(2), 99-112.
Marx, G. T. (2001). Murky Conceptual Waters: The Public and the Private, Ethics and Information Technology 3(3), 157-169.
McGinity, M. (2000). Surfing Your Turf: For a Medium that Holds Anonymity in High Rregard, Privacy Is Fast Eroding, Communications of the ACM 43(4), 19-21.
McLean, D. (1995). Privacy and Its Invasion, Westport, CT: Praeger.
McRobb, S., and Rogerson, S. (2004). Are They Really Listening? An Investigation into Published Online Privacy Policies at the Beginning of the Third Millennium, Information Technology & People 17(4), 442.
Meeks, B. N. (1997). Privacy Lost, Anytime, Anywhere, Communications of the ACM 40(8), 11-13.
Meeks, B. N. (1999). The Privacy Hoax, Communications of the ACM 42(2), 17-19.
Metzger, M. J. (2004). Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce, Journal of Computer-Mediated Communication (9:4).
Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. (1995). Values, Personal Information Privacy, and Regulatory Approaches, Communications of the ACM 38(12), 65-74.
Milberg, S. J., Smith, H. J., and Burke, S. J. 2000. Information Privacy: Corporate Management and National Regulation, Organization Science 11(1), 35-57.
Milne, G. R. (1997). Consumer Participation in Mailing Lists: A Field Experiment, Journal of Public Policy and Marketing 16(2), 298-309.
Milne, G. R., and Boza, M.-E. (1999). Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices, Journal of Interactive Marketing 13(1), 5-24.
Milne, G. R., and Culnan, M. J. (2002). Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 US Web Surveys, Information Society 18(5), 345-359.
Milne, G. R., and Gordon, E. M. (1993). Direct Mail Privacy- Efficiency Trade-Offs Within an Implied Social Contract Framework, Journal of Public Policy and Marketing 12(2), 206-215.
Milne, G. R., and Rohm, A. (2000). Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-in and Opt-out Alternatives, Journal of Public Policy and Marketing 19(2), 238-249.
Milne, G. R., Rohm, A., and Boza, M.-E. (1999). Trust Has to Be Earned, in Frontiers of Direct Marketing, J. Phelps (ed.), New York: Direct Marketing Educational Foundation, 31-41.
Miyazaki, A., and Krishnamurthy, S. (2002). Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions, Journal of Consumer Affairs 36(1), 28-49.
Moon, Y. (2000). Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers, Journal of Consumer Research (26), 323-339.
Mowday, R. T., and Sutton, R. I. (1993). Organizational Behavior: Linking Individuals and Groups to Organizational Contexts, Annual Reviews in Psychology 44(1), 195-229.
Nissenbaum, H. (1998). Protecting Privacy in an Information Age: The Problem of Privacy in Public, Law and Philosophy 17(5), 559-596.
Nissenbaum, H. (1999). The Meaning of Anonymity in an Information Age, The Information Society 15(2), 141-144.
Norberg, P. A., and Horne, D. R. (2007). Privacy Attitudes and Privacy-Related Behavior, Psychology and Marketing 24(10), 829-847.
Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors, Journal of Consumer Affairs 41(1), 100-126.
Nowak, G. J., and Phelps, J. (1992). Understanding Privacy Concerns: An Assessment of Consumers’s Information-Related Knowledge and Beliefs, Journal of Direct Marketing 6(4), 28-39.
Nowak, G. J., and Phelps, J. (1995). Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When ‘Privacy’ Matters, Journal of Direct Marketing 9(3), 46-60.
Nowak, G. J., and Phelps, J. (1997). Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When “Privacy” Matters, Journal of Direct Marketing 11(4), 94-108.
O’Donoghue, T., and Rabin, M. (2001). Choice and Procrastination, Quarterly Journal of Economics (116), 121-160.
Odlyzko, A. (2004). Privacy, Economics, and Price Discrimination on the Internet, in Economics of Information Security, L. J. Camp and S. Lewis (eds.), New York: Springer, 187-211.
Pavlou, P. A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce 7(3), 69-103.
Pavlou, P. A., and Gefen, D. (2004). Building Effective Online Marketplaces with Institution-Based Trust, Information Systems Research 15(1), 37-59.
Pearlson, K. E., and Saunders, C. S. (2009). Managing and Using Information Systems (4th ed.), Hoboken, NJ: John Wiley & Sons.
Pedersen, D. M. (1997). Psychological Functions of Privacy, Journal of Environmental Psychology 17(2), 147-156.
Pedersen, D. M. (1999). Model for Types of Privacy by Privacy Functions, Journal of Environmental Psychology 19(4), 397-405.
Peter, J. P., and Tarpey, S. L. X. (1997). A Comparative Analysis of Three Consumer Decision Strategies, Journal of Consumer Research 2(1), 29.
Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information, Journal of Public Policy and Marketing 19(1), 27-41.
Ponemon Institute. (2007). Database Security 2007: Threats and Priorities Within IT Database Infrastructure, Traverse City, MI.
Posner, R. A. (1981). The Economics of Privacy, American Economic Review 71(2), 405-409.
Posner, R. A. (1984). An Economic Theory of Privacy, in Philosophical Dimensions of Privacy: An Anthology, F. Schoeman (ed.), New York: Cambridge University Press, 333-345.
Preston, J. (2004). Judge Strikes Down Section of Patriot Act Allowing Secret Subpoenas of Internet Data, The New York Times, Technology Section, September 30.
Propp, K. M., and Kreps, G. L. (1994). A Rose by Any Other Name: The Vitality of Group Communication Research, Communication Studies 45(1), 7-19.
Qian, H., and Scott, C. R. (2007). Anonymity and Self-Disclosure on Weblogs, Journal of Computer-Mediated Communication 12(4), 1428-1451.
Rabin, M., and O’Donoghue, T. (2000). The Economics of Imme- diate Gratification, Journal of Behavioral Decision Making (13), 233-250.
Regan, P. M. (1995). Legislating Privacy: Technology, Social Values, and Public Policy, Chapel Hill, NC: University of North Carolina Press.
Rensel, A. D., Abbas, J. M., and Rao, H. R. (2006). Private Trans- actions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use, Journal of the Association for Information Systems 7(1), 19-50.
Richards, N. M., and Solove, D. J. (2007). Privacy’s Other Path: Recovering the Law of Confidentiality, Georgetown Law Journal 96(1), 123-182.
Rifon, N. J., LaRose, R., and Choi, S. M. (2005). Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures, Journal of Consumer Affairs 39(2), 339-362.
Rindfleisch, T. C. (1997). Privacy, Information Technology, and Health Care, Communications of the ACM 40(8), 92-100.
Rosen, J. (2000). The Unwanted Gaze: The Destruction of Privacy in America, New York: Random House.
Schoeman, F. D. (1984) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press.
Schoenbachler, D. D., and Gordon, G. L. (2002). Trust and Cus- tomer Willingness to Provide Information in Database-Driven Relationship Marketing, Journal of Interactive Marketing 16(3), 2-16.
Schwaig, K. S., Kane, G. C., and Storey, V. C. (2006). Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?, Information & Management 43(7), 805-820.
Shah, J. R., White, G. L., and Cook, J. R. (2007). Privacy Protec- tion Overseas as Perceived by USA-Based IT Professionals, Journal of Global Information Management 15(1), 68-81.
Shapiro, S. (1998). Places and Spaces: The Historical Interaction of Technology, Home, and Privacy,” Information Society 14(4), 275-284.
Sheehan, K. B. (1999). An Investigation of Gender Differences in On-Line Privacy Concerns and Resultant Behaviors, Journal of Interactive Marketing 13(4), 24-38.
Sheehan, K. B. (2002). Toward a Typology of Internet Users and Online Privacy Concerns, Information Society 18(1), 21-32.
Sheehan, K. B., and Hoy, M. G. (1999). Using E-Mail To Survey Internet Users in the United States: Methodology and Assessment, Journal of Computer-Mediated Communication 4(3).
Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of Privacy Concern among Online Consumers, Journal of Public Policy & Marketing 19(1), 62-73.
Sheng, H., Nah, F., and Siau, K. (2008). An Experimental Study on U-Commerce Adoption: The Impact of Personalization and Privacy Concerns, Journal of Associations for Information Systems 9(16), Article 15.
Singer, P. (1991). A Companion to Ethics, Hoboken, NJ: Wiley- Blackwell.
Sipior, J. C., and Ward, B. T. (1995). The Ethical and Legal Quandary of Email Privacy, Communications of the ACM 38(12), 48-54.
Sipior, J. C., Ward, B. T., and Rainone, S. M. (1998). Ethical Management of Employee E-Mail Privacy, Information Systems Management 15(1), 41-47.
Smith, H. J. (2001). Information Privacy and Marketing: What the US Should (and Shouldn’t) Learn from Europe, California Management Review 43(2), 8-33.
Smith, H. J. (2004). Information Privacy and its Management, MIS Quarterly Executive 3(4), 201-213.
Smith, H. J., Milberg, J. S., and Burke, J. S. (1996). Information Privacy: Measuring Individuals’ Concerns About Organizational Practices, MIS Quarterly 20(2), 167-196.
Sobel, L. A. (1976). War on Privacy, New York: Facts on File.
Solove, D. J. (2004). The Digital Person: Technology and Privacy in the Information Age, New York: New York University Press.
Solove, D. J. (2006). A Taxonomy of Privacy, University of Pennsylvania Law Review 154(3), 477-560.
Solove, D. J. (2008). Understanding Privacy, Cambridge, MA: Harvard University Press.
Stewart, K. A., and Segars, A. H. (2002). An Empirical Examination of the Concern for Information Privacy Instrument, Information Systems Research 13(1), 36-49.
Stone, E. F., and Stone, D. L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms, Research in Personnel and Human Resources Management 8(3), 349-411.
Stone-Romero, E. F., Stone, D. L., and Hyatt, D. (2003). Personnel Selection Procedures and Invasion of Privacy, Journal of Social Issues 59(2), 343-368.
Tabak, F., and Smith, W. P. (2005). Privacy and Electronic Monitoring in the Workplace: A Model of Managerial Cognition and Relational Trust Development, Employee Responsibilities and Rights Journal 17(3), pp. 173-189.
Tang, Z., Hu, Y. J., and Smith, M. D. (2008). Gaining TrustThrough Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor, Journal of Management Information Systems 24(4), 153-173.
Taylor, C. R. (2004a). Consumer Privacy and the Market for Customer Information, RAND Journal of Economics 35(4), 631-650.
Taylor, C. R. (2004b). Privacy and Information Acquisition in Competitive Markets, Working Paper Series, Berkeley Olin Program in Law & Economics, Berkeley, CA.
Tefft, S. K. (1980). Secrecy: A Cross-Cultural Perspective, New York: Human Sciences Press.
Turow, J. (2003). Americans & Online Privacy: The System Is Broken, report from the Annenberg Public Policy Center, University of Pennsylvania.
Unni, R., and Harmon, R. (2007). Perceived Effectiveness of Push vs. Pull Mobile Location-Based Advertising, Journal of Interactive Advertising 7(2).
Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for Information Privacy, Risk Perception and Online Consumer Purchasing, Journal of the Association for Information Systems 7(6), 415-444.
Walczuch, R. M., and Steeghs, L. (2001). Implications of the New EU Directive on Data Protection for Multinational Corporations, Information Technology & People 14(2), 142-162.
Wald, M. (2004). Airline Gave Government Information on Passengers, New York Times, Technology Section, January 18.
Waldo, J., Lin, H., and Millett, L. I. (2007). Engaging Privacy and Information Technology in a Digital Age, Washington, DC: National Academies Press.
Walsham, G. (1996). Ethical Theory, Codes of Ethics and IS Practice, Information Systems Journal 6(1), 69-81.
Wang, S., Beatty, S. E., and Foxx, W. (2004). Signaling the Trust- worthiness of Small Online Retailers, Journal of Interactive Marketing 18(1), 53-69.
Warren, C., and Laslett, B. (1977). Privacy and Secrecy: Conceptual Comparison, Journal of Social Issues 33(3), 43-51.
Warren, S. D., and Brandeis, D. L. (1890). The Right to Privacy, Harvard Law Review 4(5), 193-220.
Weinstein, W. L. (1971). The Private and the Free: A Conceptual Inquiry, in Privacy: Nomos XIII, J. R. Pennock and J. W. Chapman (eds.), New York: Atherton Press, pp. 624-692.
Weisband, S. P., and Reinig, B. A. (1995). Managing User Percep- tions of Email Privacy, Communications of the ACM (38:12), 40-47.
Werhane, P. H. (1994). The Normative/Descriptive Distinction in Methodologies of Business Ethics, Business Ethics Quarterly 4(2), 175-180.
Westin, A. F. (1967). Privacy and Freedom, New York: Atheneum.
Westin, A. F. (2001). Opinion Surveys: What Consumers Have to Say About Information Privacy, Prepared Witness Testimony, The House Committee on Energy and Commerce, W. J. “Billy” Tauzin, Chairman, May 8.
Westin, A. F. (2003). Social and Political Dimensions of Privacy, Journal of Social Issues 59(2), 431-453.
White, C., and Christy, D. (1987). The Information Center Concept: A Normative Model and a Study of Six Installations, MIS Quarterly 11(4), 450-458.
White, T. B. (2004). Consumer Disclosure and Disclosure Avoidance: A Motivational Framework, Journal of Consumer Psychology 14(1/2), 41-51.
Xu, H. (2007). The Effects of Self-Construal and Perceived Control on Privacy Concerns, in Proceedings of the 28th International Conference on Information Systems, Montréal, Canada, December 9-12.
Xu, H., Dinev, T., Smith, H. J., and Hart, P. (2008). Examining the Formation of Individual’s Information Privacy Concerns: Toward an Integrative View, in Proceedings of 29th Inter- national Conference on Information Systems, Paris, France, December 14-17.
Xu, H., and Gupta, S. (2009). The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers’ Adoption of Location-Based Services, Electronic Markets—The International Journal on Networked Business 19(2), 137-140.
Xu, H., and Teo, H. H. (2004). Alleviating Consumer’s Privacy Concern in Location-Based Services: A Psychological Control Perspective, in Proceedings of the 25th International Con- ference on Information Systems, R. Agarwal, L. J. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 9-12, 793-806.
Xu, H., Teo, H. H., and Tan, B. C. Y. (2005). Predicting the Adoption of Location-Based Services: The Roles of Trust and Privacy Risk, in Proceedings of 26th International Conference on Infor- mation Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, 897-910.
Xu, H., Teo, H. H., Tan, B. C. Y., and Agarwal, R. (2010). The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services, Journal of Management Information Systems 26(3), 137-176.
Younger Committee Report. (1972). Report of the Committee on Privacy, Cmnd.5012 HMSO.
Zweig, D., and Webster, J. (2002). Where Is the Line between Benign and Invasive? An Examination of Psychological Barriers to the Acceptance of Awareness Monitoring Systems, Journal of Organizational Behavior (23), 605-633.
Zweig, D., and Webster, J. 2003. Personality as a Moderator of Monitoring Acceptance, Computers in Human Behavior (19), 479-493.
Zwick, D., and Dholakia, N. (2004). Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing, Journal of Macromarketing 24(1), 31-43.