An integrative review of sensory marketing: Engaging the senses to affect perception, judgment and behavior

Référence 

Krishna, A. (2011). An integrative review of sensory marketing: Engaging the senses to affect perception, judgment and behavior. Journal of Consumer Psychology,  22, 332-351.

Idée dominante

Le  marketing sensoriel peut stimuler les cinq sens, ce qui provoque une plus grande implication du consommateur, à travers sa perception, son comportement d’achat, et ses prises de décisions.

Résumé

Le marketing sensoriel permet d’engager d’avantage le consommateur dans sa perception d’un produit, par une stimulation inconsciente des ses sens. A travers le marketing sensoriel il est possible de stimuler le toucher, l’odorat, le goût, la vue ou l’ouïe. Le processus de stimulation par le marketing sensoriel ne suit pas un schéma figé et varie selon les sens, c’est la raison pour laquelle les 5 sens sont étudiés séparément dans cet article.

Note d’intérêt pour la recherche en cours 

 Dans cet article, on s’intéressera principalement à :

–          La définition du marketing sensoriel selon Krishna : « marketing that engage the consumer’s senses and affects their behaviors ».

–        La section “Haptics” concernant le toucher: reprise de l’échelle Need For Touch de Peck et Childers (2003) en lien avec l’hypothèse n°2: les différentes perceptions et utilisation du toucher chez le consommateur entraînent des différences de jugement concernant un produit.

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances

Référence :
Xu, H., et al (2011). Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances. Journal of the Association for Information Systems, 12, 798-824

page1image2752

Idée / dominante :

Dans le cadre de la théorie du CPM, les inquiétudes des internautes quant à la protection des leurs données personnelles sont fonction des risques et du contrôle individuel perçus. Les politiques d’autorégulation adoptées par les entreprises ont également une influence (indirecte) sur ces inquiétudes. Les labels, attribués par une partie tierce, ont, quant à eux, une influence non-significative (Hui et al. 2007).

page1image10104

Résumé :

Définie comme le droit, du point de vue juridique (Warren & Brandeis, 1890), à un état d’accès limité ou d’isolation, en philosophie/psychologie (Schoeman, 1984), et au contrôle, en sciences sociales et SI (Culnan, 1993 ; Westin, 1967), la « privacy » et les inquiétudes sous-jacentes sont ici étudiées à la lumière de la théorie du «Communication Privacy Management» (Petronio, 2002). Cette théorie vise à comprendre comment les individus prennent des décisions en ce qui concerne la diffusion d’information au sein de relations interpersonnelles. Elle repose sur la métaphore des frontières (ouvertes ou fermées, cf. IBT) régissant la diffusion des informations, et comprend trois niveaux : (1) la création d’un espace personnel d’information, avec des frontières définies. Ces frontières dépendent d’une évaluation des risques, de dispositions personnelles, et du contexte d’une relation avec une entité extérieure avec laquelle un échange d’informations a lieu. (2) Lorsqu’ils diffusent des informations, les individus considèrent que celles-ci sont conservées dans un domaine sûr, à la disposition des entreprises à la condition que celles-ci appliquent leurs politiques de protection de confidentialité. (3) Lorsqu’il y a violation de ces politiques, les individus ont recours à un tiers, en portant plainte auprès de l’institution compétente.

Grâce à cette théorie, les auteurs mettent en place un modèle de recherche qu’ils cherchent à valider au moyen d’un questionnaire soumis en ligne à des étudiants du sud des Etats-Unis. Ils ont récolté 823 réponses exploitables. Principaux enseignements de l’enquête :

  • Les risques perçus pour la privacy ont une influence positive sur les inquiétudes (i.e. plus l’individu perçois des risques pour la confidentialité des ses informations, plus il sera inquiet) ;
  • Le contrôle perçu sur la privacy a une influence négative sur les inquiétudes ;
  • La propension d’un individu à attacher de l’importance à la privacy impacte la perception des risques, et, dans le cadre des réseaux sociaux, le contrôle ;
  • Cette propension impacte positivement les inquiétudes ;
  • L’efficacité perçue des politiques de protection des données impacte positivement la perception du contrôle, et négativement la perception du risque ;
  • L’efficacité perçue de l’autorégulation des entreprises impacte positivement la perception du contrôle, à l’exception des sites de finance.Globalement : plus un individu attache de l’importance à la protection de ses données personnelles, plus celui-ci sera enclin à sentir une violation de sa « privacy».
    Fait marquant : les sites de réseaux sociaux se détachent des autres sites observés lors de l’analyse de coefficients et de leur variance. Ceux-ci ont notamment développé certains attributs permettant à leurs utilisateurs de gérer eux-mêmes leurs paramètres de confidentialité, ce qui impacte leur perception du contrôle de leurs informations. E.g. pour Friendster.com, la définition de ces paramètres fait partie intégrante du processus d’inscription.

Notes d’intérêt pour la recherche en cours :

Définition de la « privacy », présentation et utilisation de la théorie du « Communication Privacy Management » comme cadre théorique, singularité des réseaux sociaux en termes de gestion de la confidentialité, qui affecte la perception du contrôle.

Ce qui n’a pas été abordé :

L’échantillon considéré se limite aux étudiants, il conviendrait d’élargir cela. L’étude reste théorique et ne permet pas de dresser les conséquences de tels enseignements sur le comportement des internautes (et plus particulièrement des utilisateurs de réseaux sociaux) => Comment ces inquiétudes se traduisent dans l’utilisation du web ?

Références :

Agarwal, R., & Karahanna, E. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665-694.

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.

Altman, I. (1974). Privacy: A conceptual analysis. In D.H. Carson (Ed.), Man-Environment Interactions: Evaluations and Applications: Part 2 (3-28). Washington, DC.: Environmental Design Research Association.

Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66-84.

Belanger, F., Hiller, J.S., & Smith, W.J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. Journal of Strategic Information Systems, 11(3-4), 245-270.

Bellman, S., Johnson, E.J., Kobrin, S.J., & Lohse, G.L. (2004). International differences in informationprivacy concerns: A global survey of consumers. Information Society, 20(5), 313-324.

Benassi, P. (1999). TRUSTe: An online privacy seal program. Communications of the ACM, 42(2),56-59.

Bennett, C.J. (1992). Regulating privacy: Data protection and public policy in Europe and the UnitedStates. Ithaca, NY: Cornell University Press.

Buchanan, T., Paine, C., Joinson, A. N., & Reips, U.-D. (2007). Development of measures of onlineprivacy concern and protection for use on the Internet. Journal of the American Society forInformation Science and Technology, 58(2), 157-165.

Campbell, D.T., & Fiske, D.W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81-105.

Chellappa, R.K., & Sin, R. (2005). Personalization versus privacy: An empirical examination of theonline consumer’s dilemma.Information Technology and Management, 6(2), 181-202.

Child, J.T., Pearson, J.C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure.Journal of the American Societyfor Information Science and Technology, 60(10), 2079-2094.

Chin, W. W. (1998). The partial least squares approach to structural equation modeling. In G. A.Marcoulides (Ed.), Modern methods for business research (pp. 295-336). Mahwah, NJ:Lawrence Erlbaum Associates.

Cook, M., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for fieldsettings. Boston, MA: Houghton Mifflin.

Culnan, M.J. (1993). ‘How did they get my name’? An exploratory investigation of consumer attitudestoward secondary information use. MIS Quarterly, 17(3), 341-363.

Culnan, M.J. (1995). Consumer awareness of name removal procedures: Implication for directmarketing. Journal of Interactive Marketing, 9(2), 10-19.

Culnan, M.J. (2000). Protecting privacy online: Is self-regulation working? Journal of Public Policy andMarketing, 19(1), 20-26.

Culnan, M.J., & Armstrong, P.K. (1999). Information privacy concerns, procedural fairness andimpersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.

Culnan, M.J., & Bies, J.R. (2003). Consumer privacy: Balancing economic and justiceconsiderations. Journal of Social Issues, 59(2), 323-342.

Culnan, M.J., & Williams, C.C. (2009). How ethics can enhance organizational privacy: Lessons fromthe ChoicePoint and TJX data breaches. MIS Quarterly, 33(4), 673-687.

Derlega, V.J., & Chaikin, A.L. (1977). Privacy and self-disclosure in social relationships. Journal ofSocial Issues, 33(3), 102-115.

Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – Measurement validityand a regression model. Behavior and Information Technology, 23(6), 413-423.

Dinev, T., & Hart, P. (2006a). An extended privacy calculus model for E-commerce transactions.Information Systems Research, 17(1), 61-80.

Dinev, T., & Hart, P. (2006b). Internet privacy concerns and social awareness as determinants ofintention to transact. International Journal of Electronic Commerce, 10(2), 7-29.

Dinev, T., Hart, P., & Mullen, M.R. (2008). Internet privacy concerns and beliefs about governmentsurveillance – An empirical investigation. Journal of Strategic Information Systems, 17(3), 214-233.

DMA. (2003). Privacy promise member compliance guide. Retrieved from http://www.the-dma.org/ privacy/privacypromise.shtml

Earp, J.B., Anton, A.I., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), 227-237.

Earp, J.B., & Payton, F.C. (2006). Information privacy in the service sector: An exploratory study of health care and banking professionals. Journal of Organizational Computing and Electronic Commerce, 16(2), 105-122.

Fornell, C., & Bookstein, F.L. (1982). Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research, 19(4), 440-452.

Ganesan, S. (1994). Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing, 58(2), 1-19.

Gefen, D. (2000). Lessons learnt from the successful adoption of an ERP: The central role of trust. In S. D. Zanakis, G. Zopounidis and C. Zopounidis (eds.), Recent Developments and Applications in Decision Making. Boston, MA: Kluwer Academic.

Gefen, D., Straub, D., & Boudreau, M. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of AIS, 4(1), 1-78.

Greenfield, Y.M.N.a. (2000). The Internet is ‘Big Man on Campus’—New study from Greenfield online reveals the Web is huge on campus. Retrieved from http://www8.techmall.com/techdocs/TS000807-2.html.

Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA.

Hansell, S. (2008a, May 27). Google fights for the right to hide its privacy policy. The New York Times. Retrieved from http://bits.blogs.nytimes.com/2008/05/27/google-fights-for-the-right-to- hide-its-privacy-policy/.

Hansell, S. (2008b, May 30). Is Google violating a California privacy law? The New York Times. Retrieved from http://bits.blogs.nytimes.com/2008/05/30/is-google-violating-a-california-privacy-law/.

Havlena, W.J., & DeSarbo, W.S. (1991). On the measurement of perceived consumer risk. DecisionSciences, 22(4), 927-939.

Hoadley, C.M., Xu, H., Lee, J.J., & Rosson, M.B. (2010). Privacy as information access and illusorycontrol: The case of the Facebook news feed privacy outcry. Electronic Commerce Researchand Applications, 9(1), 50-60.

Hoofnagle, C.J., King, J., Li, S., & Turow, J. (2010). How different are young adults from older adultswhen it comes to information privacy attitudes and policies?SSRN. Retrieved fromhttp://ssrn.com/abstract=1589864.

Hui, K.-L., Teo, H.H., & Lee, S.-Y.T. (2007). The value of privacy assurance: An exploratory fieldexperiment. MIS Quarterly, 31(1), 19-33.

Jarvenpaa, S.L., & Leidner, D.E. (1999). Communication and trust in global virtual teams.Organization Science, 10(6), 791-815.

Jensen, C., Potts, C., & Jensen, C. (2005). Privacy practices of Internet users: Self-reports versusobserved behavior. International Journal of Human-Computer Studies, 63(1-2), 203–227.

Kelvin, P. (1973). A social-psychological examination of privacy. British Journal of Social and Clinical Psychology, 12(3), 248-261.

Kim, D., & Benbasat, I. (2006). The effects of trust-assuring arguments on consumer trust in Internetstores: application of Toulmin’s model of argumentation. Information Systems Research,17(3), 286-300.

Laufer, R.S., & Wolfe, M. (1977). Privacy as a concept and a social issue – Multidimensionaldevelopmental theory. Journal of Social Issues, 33(3), 22-42.

Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as aprivacy calculus. Journal of Computer Information Systems, 51(1), 62-71.

Lindell, M.K., and Whitney, D.J. (2001). Accounting for common method variance in cross-sectional

research designs, Journal of Applied Psychology, 86(1), 114-121.

Ma, M., & Agarwal, R. (2007). Through a glass darkly: Information technology design, identityverification, and knowledge contribution in online communities. Information SystemsResearch, 18(1), 42-67.

Malhotra, N.K., Kim, S.S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC):The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.

Margulis, S.T. (1977). Conceptions of privacy: current status and next steps. Journal of Social Issues, 33(3), 5-21.

Margulis, S.T. (2003a). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, 59(2), 411-429.

Margulis, S.T. (2003b). Privacy as a social issue and behavioral concept. Journal of Social Issues, 59(2), 243-261.

Mayer, R.C., Davis, J.H., & Schoorman, F.D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-734.

McKnight, D.H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for E- commerce: An integrative typology. Information Systems Research, 13(3), 334-359.

Metzger, M.J. (2004). Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4).

Metzger, M.J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335–361.

Milberg, S.J., Burke, S.J., Smith, H.J., & Kallman, E.A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM,38(12), 65-74.

Milne, G.R., & Boza, M.-E. (1999). Trust and concern in consumers’ perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5-24.

Milne, G.R., & Culnan, M.J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15-29.

Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from consumers. Journal of Consumer Research, 26(4), 323-339.

Moores, T. (2005). Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM, 48(3), 86-91.

Moores, T.T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communications of the ACM, 46(12), 265-271.

Norberg, P.A., & Horne, D.R. (2007). Privacy attitudes and privacy-related behavior. Psychology and Marketing, 24(10), 829-847.

Nunnally, J.C. (1978). Psychometric Theory, 2nd ed.. New York: McGraw-Hill.

Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of theSIGCHI conference on human factors in computing systems, Ft. Lauderdale, Fl., 129-136.

Pavlou, P.A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust.Information Systems Research, 15(1), 37-59.

Petronio, S.S. (2002). Boundaries of privacy: Dialectics of disclosure (xix,pp. 268). Albany, NY: StateUniversity of New York Press.

PEW-Internet. (2008). Pew Internet & American life project: Demographics of Internet users. PEW,Retrieved from http://www.pewinternet.org/trends/User_Demo_10%2020%2008.htm.

Phelps, J., D’Souza, G., & Nowak, G.J. (2001). Antecedents and consequences of consumer privacyconcerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2-17.

Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to providepersonal information. Journal of Public Policy and Marketing, 19(1), 27-41.

Podsakoff, M.P., MacKenzie, B.S., Lee, J.Y., & Podsakoff, N.P. (2003). Common method biases inbehavioral research: A critical review of the literature and recommended remedies. Journal ofApplied Psychology, 88(5), 879-903.

Schoeman, F.D. (Ed.). (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge, UK:Cambridge University Press.

Schwartz, P. M. (1999). Privacy and democracy in cyberspace. Vanderbilt Law Review, 52, 1610-1701.

Sheehan, K.B. (1999). An investigation of gender differences in on-line privacy concerns andresultant behaviors. Journal of Interactive Marketing, 13(4), 24-38.

Sheehan, K.B. (2002). Toward a typology of Internet users and online privacy concerns. InformationSociety, 18(1), 21-32.

Sheehan, K.B., & Hoy, M.G. (2000). Dimensions of privacy concern among online consumers.Journal of Public Policy & Marketing, 19(1), 62-73.

Slyke, C.V., Shim, J.T., Johnson, R., & Jiang, J.J. (2006). Concern for information privacy and onlineconsumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444.

Smith, H.J., Milberg, J.S., & Burke, J.S. (1996). Information privacy: Measuring individuals’ concernsabout organizational practices. MIS Quarterly, 20(2), 167-196.

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1015.

Solove, D.J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477-560.

Solove, D.J. (2007). ‘I’ve got nothing to hide’ and other misunderstandings of privacy. San Diego LawReview(44), 745-772.

Solove, D.J. (2008). Understanding Privacy. Cambridge, MA: Harvard University Press.

Son, J.-Y., & Kim, S.S. (2008). Internet users’ information privacy-protective responses: A taxonomyand a nomological model. MIS Quarterly, 32(3), 503-529.

Squicciarini, C.A., Xu, H., & Zhang, X. (2011). CoPE: Enabling collaborative privacy management inonline social networks. Journal of the American Society for Information Science andTechnology, 62(3), 521-534.

Stanton, J.M., & Stam, K. (2003). Information technology, privacy, and power within organizations: A viewfrom boundary theory and social exchange perspectives. Surveillance and Society, 1(2), 152-190.

Stewart, K.A., & Segars, A.H. (2002). An empirical examination of the concern for information privacyinstrument. Information Systems Research, 13(1), 36-49.

Stone, B., & Stelter, B. (2009, February 19). Facebook backtracks on use terms. The New YorkTimes, B1, B6.

Stone, E.F., & Stone, D.L. (1990). Privacy in organizations: Theoretical issues, research findings, andprotection mechanisms. Research in Personnel and Human Resources Management, 8(3),349-411.

Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research.Communications of the Association for Information Systems, 13(1), 380-427.

Swire, P.P. (1997). Markets, self-regulation, and government enforcement in the protection ofpersonal information. In Privacy and Self-Regulation in the Information Age (pp. 3-19).Washington, D.C.: Department of Commerce, U.S.A..

Tang, Z., Hu, Y.J., & Smith, M.D. (2008). Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. Journal of Management InformationSystems, 24(4), 153-173.

Thurm, S., & Kane, Y.I. (2010). Your apps are watching you: A WSJ investigation finds that iPhoneand android apps are breaching the privacy of smartphone users.The Wall Street Journal.

Vascellaro, E.J. (2010). Websites rein in tracking tools. The Wall Street Journal.

Waldo, J., Lin, H., & Millett, L.I. (2007). Engaging privacy and information technology in a digital age.Washington, D.C.: National Academies Press.

Walsh, M. (2010). MMA taking on mobile privacy. MediaPost. Retrieved from http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=141646&nid=121943.

Warren, S.D., & Brandeis, L.D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.

Weiss, S. (2007). The need for a paradigm shift in addressing privacy risks in social networkingapplications. In The Future of Identity in the Information Society(Vol. 262/2008, pp.161–171).IFIP WG 9.2, Karlstad, Sweden.

Westin, A.F. (1967). Privacy and freedom. New York, NY: Atheneum.

Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. Proceedings of the28th Annual International Conference on Information Systems, Montréal, Canada, Paper 125.

Xu, H., and Teo, H.H. (2004). Alleviating consumer’s privacy concern in location-based services: A psychological control perspective, Proceedings of the 25th Annual International Conferenceon Information Systems, Washington, D. C., United States, 793-806.

Xu, H., Teo, H.-H., Tan, B.C.Y., & Agarwal, R. (2010). The role of push-pull technology in privacycalculus: The case of location-based services. Journal of Management Information Systems,26(3), 135-174.

Yao, M.Z., Rice, R.E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal ofthe American Society for Information Science and Technology, 58(5), 710-722.

Zwick, D., & Dholakia, N. (1999). Models of privacy in the digital age: Implications for marketing andE-commerce. Research Institute for Telecommunications and Information Marketing (RITIM), University of Rhode Island.

Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users

Référence :
Sutanto, J., et al. (2013). Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Quarterly, 37, 1141-1164

Idée / dominante :

Le paradoxe entre personnalisation du web et confidentialité des informations est latent. En se focalisant sur les applications mobiles, les chercheurs ont démontré qu’une application proposant des offres personnalisées mais respectant la confidentialité des informations de l’utilisateur (par le moyen d’un stockage local, sans serveur central) est plus rassurante et plus utilisée.
page1image7192

Résumé :

Les chercheurs souhaitent évaluer l’appréciation de la personnalisation des applications mobiles par les utilisateurs de smartphones selon deux paramètres : le « process » (la façon dont les informations sont recueillies et traitées) et la satisfaction procurée par la personnalisation (qualité/singularité des offres…). Il s’agit en fait de la confrontation de deux théories, finalement complémentaires. L’ensemble de l’étude est basée sur la réception de coupons de réductions par le moyen d’une application mobile.

UGT (Uses & Gratification Theory) : Un utilisateur est plus enclin à conserver une offre si celle-ci est personnalisée goûts/habitudes…). La mesure (selon ses de cette nombre de « gratification » est faite par sauvegarde de coupons proposés.

IBT (Information Boundary Theory)  : Chaque individu se crée un espace informationnel (physique ou virtuel) autour de lui, dont les frontières délimitent leur propension à dévoiler /diffuser des informations le concernant. Toute tentative, par un tiers extérieur, de franchir cette frontière est sentie comme une intrusion (mal perçue).

Pour mener à bien cette enquête, les chercheurs ont testé et mesuré le téléchargement et l’utilisation de trois applications de « m-couponing » : la première présente des offres non-ciblées et ne nécessite donc pas d’intégrer des informations personnelles, la seconde présente des offres ciblées, au moyen de la collecte d’informations qui sont traitées et stockées via un serveur externe, et la troisième cible ses offres par un traitement et un stockage local (le smartphone), ce qui respecte la confidentialité des informations.

Il apparaît que cette dernière application participe à un meilleur confort psychologique de son utilisateur car la frontière de la violation des données personnelles (cf. IBT) n’est pas franchie. Cela contribue à la fois à une meilleure appréciation du « process » de collecte et de traitement des informations (plus grand usage de l’application), ainsi que de la qualité du ciblage des offres (davantage de sauvegardes de coupons). En effet, le traitement local des données a la qualité de rassurer les utilisateurs de l’application, car la non-transmission de ses informations à un serveur externe garantit que celles-ci ne seront pas utilisées à des fins secondaires ou non-désirées. Le risque d’interception de ces données lors de la transmission à un serveur est également écarté.

page1image37712

Notes d’intérêt pour la recherche en cours :

Récapitulatif des différents travaux qui ont été faits au sujet du paradoxe personnalisation/confidentialité, et leurs conclusions dans un tableau, démarche de recherche,

Ce qui n’a pas été abordé :
L’étude se concentre sur les applications de « couponing » mobile. Il serait intéressant d’élargir cela aux applications sociales, et aux sites associés. Un stockage local des informations rassurerait-il et permettrait- il de générer plus de flux ?

Par ailleurs, quel type d’information un utilisateur est-il prêt à donner : où se situe « the information boundary » ?

page1image43760

Références :

Abrahamson, D. (1998). The Visible Hand: Money, Markets, and Media Evolution, Journalism and Mass Communication Quarterly, 75, 14-18.

Andrade, E. B., Kaltcheva, V., and Weitz, B. (2002). Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Company Reputation, Advances in Consumer Research, 29, 350-353.

Angst, C., and Agarwal, R. (2009). Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion, MIS Quarterly, 33(2), 339-370.

Angwin, J., and Valentino-DeVries, J. (2011). Apple, Google Collect User Data, The Wall Street Journal, U.S. Edition, April 22.

Ansari, A., and Mela, C. F. (2003). E-Customization, Journal of Marketing Research, 40(2), 131-145.

Awad, N. F., and Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization, MIS Quarterly, 30(1), 13-28.

Bargh, M. S., van Eijk, R., Ebben, P., and Salden, A. H. (2003). Agent-Based Privacy Enforcement of Mobile Services, in Proceedings of International Conference on Advances in Infrastructure for Elec- tronic Business, Education, Science and Medicine and Mobile Technologies on the Internet, L’Aquila, Italy.

Brar, A., and Kay, J. (2004). Privacy and Security in Ubiquitous Personalized Applications, Technical Report No. 561, School of Information Technologies, University of Sydney.

Brusilovsky, P., and Tasso, C. 2004. Preface to Special Issue on User Modeling for Web Information Retrieval, User Modeling and User- Adapted Interaction, 14(2-3), 147-157

Bulander, R., Decker, M., Kölmel, B., and Schiefer, G. (2005). Enabling Personalized and Context Sensitive Mobile Advertising while Guaranteeing Data Protection, in Proceedings of the EURO- mGOV 2005, Mobile Government International LLC, Brighton, UK, 445-454.

Chellappa, R. K., and Sin, R. (2005). Personalization Versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma, Information Technology and Management, 6(2-3), pp. 181-202.

Clifford, S. (2009). Advertisers Get a Trove of Clues in Smartphones, The New York Times, Media & Advertising, March 11.

Culnan, M. J., and Milne, G. R. ‘2001). The Culnan-Milne Survey on Consumers and Online Privacy Notices: Summary of Responses, Interagency Public Workshop: Getting Noticed: Writing Effective Financial Privacy Notices, December 4.

Cutler, N. E., and Danowski, J. A. ‘1980). Process Gratification in Aging Cohorts, Journalism Quarterly, 57, 269-277.

DeZoysa, S. (2002). Mobile Advertising Needs to Get Personal, Telecommunications: International Edition, 36(2), p. 8.

Dhar, S., and Varshney, U. (2011). Challenges and Business Models for Mobile Location-Based Services and Advertising, Communications of the ACM, 54(5), 121-129.

Federal Trade Commission. (2010). Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers, Preliminary FTC Staff Report, December.

Fox, S. (2000). Trust and Privacy Online: Why Americans Want to Rewrite the Rules, The Pew Internet & American Life Project.

Gartner, Inc. (2009). Gartner’s Top Predictions for IT Organizations and Users, 2010 and Beyond: A New Balance, Gartner’s Research.

Gedik, B., and Liu, L. (2008). Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms, IEEE Transactions on Mobile Computing 7(1), 1-18.

Ha, L., and James, E. L. (1998). Interactivity Reexamined: A Baseline Analysis of Early Business Web Sites, Journal of Broadcasting & Electronic Media, 42, 457-474.

Hann, I. H., Hui, K. L., Lee, T. S. Y., and Png, I. P. L. (2002). Online Information Privacy: Measuring the Cost-Benefit Tradeoff, in Proceedings of the 23rd International Conference on Information Systems, Barcelona, Spain, December 15-18, 1-10.

Harrison, G. W., and List, J. A. (2004). Field Experiments, Journal of Economic Literature, 42(4), 1009-1055.

Haselton, T. (2012). Congress Probes Apple Over Path Address Book Debacle, Apple to Require ‘Explicit User Approval,’ TechnoBuffalo, February, 15.

Heerink, M., Kröse, B., Wielinga, B., Evers, V. (2008). Enjoyment, Intention to Use and Actual Use of a Conversational Robot by Elderly People, in Proceedings of the 3rd ACM/IEEE International Conference on Human–Robot Interaction, 113-119.

Hui, K. L., Teo, H. H., and Lee, T. S. Y. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment, MIS Quarterly, 31(1), 19-33.

Hutchinson, R. (2011). 50 Percent of iPhone Apps Can Track User Data, Applie News, January 26.

Iyer, B., and Davenport, T. H. (2008). Reverse Engineering Google’s Innovation Machine, Harvard Business Review, 86(4), 56-68.

Jensen, C., Potts, C., and Jensen, C. (2005). Privacy Practices of Internet Users: Self-Report Versus Observed Behavior, International Journal of Human Computer Studies, 63(1-2), 203-227.

Kavassalis, P., Spyropoulou, N., Drossos, D., Mitrokostas, E., Gikas, G., and Hatzistamatiou, A. (2003). Mobile Permission Marketing: Framing the Market Inquiry, International Journal of Electronic Commerce, 8(1), 55-79.

Klapper, J. T. (1963). Mass Communication Research: An Old RoadResurveyed, Public Opinion Quarterly, 27, 515-527.

Lee, O. (2001). Internet Marketing Research: Theory and Practice,Hershey, PA: Idea Group Publishing.

Lee, Y. E., and Benbasat, I. (2003). Interface Design for MobileCommerce, Communications of the ACM, 46(12), 49-52.

Lin, C. (1999). Online Service Adoption Likelihood, Journal of Advertising Research, 39, 79-89.

Long, J. S., and Freese, J. (2006). Regression Models for Categorical Dependent Variables Using Stata (2nd ed.), College Station, TX:Stata Press.

McGuire, W. J. (1974). Psychological Motives and Communication Gratification, in The Uses of Mass Communications: Current Perspectives on Gratifications Research, J. Blumler and E. Kaatz (eds.), Beverly Hills, CA: Sage Publications, 167-196.

Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors, Journal of Consumer Affairs, 41, 100-126.

Peppers, D., and Rogers, M. (1997). The One to One Future, New York: Doubleday.

Petronio S. (1991). Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information between Marital Couples, Communication Theory, 1, 311-335.

Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information, Journal of Public Policy & Marketing, 19(1), 27-41.

Rognehaugh, R. (1999). The Health Information Technology Dictionary, Gaithersburg, MD: Aspen.

Rubin, A. M. (1985). Uses and Gratifications: Quasi-Functional Analysis, in Broadcasting Research Methods, J. Dominick and J. Fletcher (eds.), Boston: Allyn and Bacon, 202-220.

Rubin, A. M. (1993). Audience Activity and Media Use, Communication Monographs, 60(1), 98-105.

Ruggiero, T. E. (2000). Uses and Gratifications Theory in the 21st Century, Mass Communication and Society, 3(1), 3-37.

Sheng, H., Nah, F. F. H., and Siau, K. (2008). An Experimental Study on Ubiquitous Commerce Adoption: Impact of Personalization and Privacy Concerns, Journal of the Association for Information Systems, 9(6), Article 15.

Shi, X. (2006). Sharing Service Semantics Using SOAP-Based and REST Web Services, IT Professional, 8, 18-24.

Simonson, I. (2005). Determinants of Customers’ Responses to Customized Offers: Conceptual Framework and Research Proposi- tions, Journal of Marketing, 69, 32-45.

Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns About Organizational Practices, MIS Quarterly, 20(2), 167-196.

Solove, D. J. (2006). A Raxonomy of Privacy, University of Pennsylvania Law Review, 154(3), 477-560.

Song I., LaRose R., Eastin M. S., and Lin C. A. (2004). Internet Gratifications and Internet Addiction: On the Uses and Abuses of New Media, Cyberpsycholy & Behavior, 7(4), 384-94.

Stafford, M. R., and Stafford, T. F. (1996). Mechanical Commercial Avoidance: A Uses and Gratifications Perspective, Journal of Current Issues and Research in Advertising, 18, 27-38.

Stafford, T. F., and Stafford, M. R. (2000). Consumer Motivations to Engage in Electronic Commerce: Uses and Gratifications of the World Wide Web, in Electronic Commerce: Opportunities and Challenges, S. Rahman and M. Raisinghani (eds.), Hershey, PA: Idea Group Publishing.

Stafford, T. F., and Stafford, M. R. (2001). Investigating Social Motivations for Internet Use, in Internet Marketing Research: Theory and Practice, O. Lee (ed.), Hershey, PA: Idea Group Publishing, 93-107.

Stafford, T. F., Stafford, M. R., and Schkade, L. L. (2004). Determining Uses and Gratifications for the Internet, Decision Sciences, 35(2), 259-288.

Stanton, J. M. (2003). Information Technology and Privacy: A Boundary Management Perspective, in Socio-Technical and Human Cognition Elements of Information Systems, S. Clarke, E. Coakes, M. Hunter, and A. Wenn (eds.), Hershey, PA: Idea Books, 79-103.

Stanton, J. M., and Stam K. (2003). Information Technology, Privacy, and Power Within Organizations: A View from Boundary Theory and Social Exchange Perspectives, Surveillance and Society, 1(2), 152-190.

Stanton, J. M., and Weiss, E. M. (2000). Electronic Monitoring in Their Own Words: An Exploratory Study of Employees’ Experiences with New Types of Surveillance, Computers in Human Behavior, 16, 423-440.

Stewart, D. W., and Pavlou, P. A. (2002). From Consumer Response to Active Consumer: Measuring the Effectiveness of Interactive Media, Journal of the Academy of Marketing Science, 30(4), 376-396.

Swanson, D. L (1992). Understanding Audiences: Continuing Contributions of Gratifications Research, Poetics, 21(4), 305-28.

Tode, C. (2012). App Developers Face Mounting Pressures on Privacy, Mobile Marketer.

Treiblmaier, H., and Pollach, I. (2007). Users’ Perceptions of Benefits and Costs of Personalization, in Proceedings of the 28th Inter- national Conference on Information Systems, December 9-12, Montreal, Canada.

Utz, S., and Kramer, N. (2009). The Privacy Paradox on Social Network Sites Revisited: The Role of Individual Characteristics and Group Norms, Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2).

Venkatesh, V., Speier, C., and Morris, M. G. (2003). User Acceptance Enablers in Individual Decision Making about Technology: Toward an Integrated Model, Decision Sciences, 33(2), 297-316.

Vizard, M. (2010). Personalization vs. Privacy in the Age of the Mobile Web, IT Business Edge

Watson, R. T., Pitt, L. L., Berthon, P., and Zinkhan, G. M. (2002). U-Commerce: Expanding the Universe of Marketing, Journal of the Academy of Marketing Science, 30(4), 333-347.

West, P. M., Ariely, D., Bellman, S, Bradlow, E., Huber, J., Johnson, E., Kahn, B., Little, J., and Schkade, D. (1999). Agents to the Rescue?, Marketing Letters, 10(3), 285-300.

Xu, H. (2007). The Effects of Self-Construal and Perceived Control on Privacy Concerns, in Proceedings of 28th International Conference on Information Systems, December 9-12, Montreal, Canada.

Xu, H., Dinev, T., Smith, H. J., and Hart, P. (2008). Examining the Formation of Individual’s Information Privacy Concerns: Toward an Integrative View, in Proceedings of 29th Annual International Conference on Information Systems, December 14-17, Paris, France, Paper 6.

Xu, H., Luo, X., Carroll, J. M., and Rosson, M. B. (2011). The Personalization Privacy Paradox: An Exploratory Study of Decision Making Process for Location-Aware Marketing, Decision Support Systems, 51, 42-52.

Xu, H., Teo, H-H., and Tan, B. C. Y. (2005). Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk, in Proceedings of 26th International Conference on Information Systems, December 11-14, Las Vegas, NV, 897-910.

Yi, M. U., and Hwang, Y. (2003). Predicting the Use of Web-Based Information Systems: Self-Efficacy, Enjoyment, Learning Goal Orientation, and the Technology Acceptance Model, International Journal of Human–Computer Studies, 59(4), 431-449.

Youssef, M., Atluri, V., and Adam, N. R. (2005). Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Profiles, in Proceedings of 6th International Conference Mobile Data Management, 67-76.

Zakaria, N., Stam, K., and Stanton, J. M. (2003). Exploring Security and Privacy Issues in Hospital Information Systems: An Informa- tion Boundary Theory Perspective, American Medical Informatics Association Annual Symposium: Foundations of Informatics, Washington, D.C., November 8-12.

Zakaria, N., Stanton, J. M., and Sarker-Barney, S. T. M. (2003). Designing and Implementing Culturally-Sensitive IT Applications: The Interaction of Culture Values and Privacy Issues in the Middle East, Information Technology & People, 16(1), 49-75.

Zeng, L. (2011). More than Audio on the Go: Uses and Gratifications of MP3 Players, Communication Research Reports, 28(1), 97-108.

Information Privacy: Measuring Individual’s Concerns about Organizational Practices

Référence :
Smith, J., Milberg, S., & Burke, S. (1996). Information Privacy: Measuring Individual’s Concerns about Organizational Practices. MIS Quarterly, 20, 167- 196

Idée / dominante :

Les auteurs dressent un état des lieux conclusions qui ont été faites, à dates, concernant les inquiétudes de la population quant aux problèmes de confidentialité des informations détenues par les entreprises. Afin de faciliter les études ultérieures traitant ce sujet, les auteurs s’attachent à la mise au point d’un instrument de mesure de ces inquiétudes.

page1image8416

Résumé :

Les auteurs on discerné, grâce à la littérature existante, 4 grand thèmes autour desquels tournent les inquiétudes de la population quand aux politiques de protection des données personnelles détenues par les entreprises : la collecte, l’utilisation secondaire non-autorisée (interne ou externe), la légitimité de l’accès à ces données (qui peut y accéder ?) et les erreurs liées à la manipulation de ces données (la réticence à l’effacement des données anciennes les amène à rester « inertes », dans un monde en mouvement). En plus de ces 4 thèmes, deux autres dimensions « tangentielles » sont mises en avant, bien qu’elles semblent représenter un plus infime partie des inquiétudes de la population. Il s’agit de la réduction du jugement (liée à l’augmentation de l’automatisation, aussi bien dans la collecte que dans le traitement => l’être humain n’a plus voix au chapitre), et de la combinaison des bases de données en une database gigantesque, engendrant un effet « mosaïque » (cela va de paire avec la collecte parallèle et non-autorisée, pour un usage secondaire).

Les chercheurs ont ainsi mis au point une série de 15 affirmations à propos desquelles la personne interrogée doit préciser si elle est d’accord ou non. Parmi ces 15 affirmations, 4 permettent de mesurer l’inquiétude de la personne en ce qui concerne la collecte des données, 4 pour les erreurs de manipulation, 4 pour l’utilisation secondaire non-autorisée, et 3 permettent de mesurer le niveau d’inquiétude pour ce qui est de la légitimité d’accès aux données.

Des moyennes du niveau d’inquiétude peuvent ainsi être calculées par thème, ainsi qu’une moyenne globale.
Cet instrument de mesure a été mis au point par les chercheurs au moyen d’une méthode en trois étapes :

  • l’exploitation des travaux qui ont déjà été faits à ce sujet, et phase exploratoire via l’interview de 2318 individus entre 1989 et 1993.
  • Définition des 4 thèmes principaux via une phase exploratoire supplémentaire.
  • Validation des résultats de l’instrument (validité, convergence, généralisabilité), en prenant en compte différents paramètres comme la subjectivité de l’inquiétude. Ainsi, les auteurs se sont basés sur l’hypothèse selon laquelle l’inquiétude soit engendrée par une expérience personnelle préalable (Culnan, 1993 ; Stone et Stone, 1990), et par la couverture de certains scandales par les médias (Westin, 1990). L’inquiétude des individus serait également à associer à des facteurs individuels de personnalité : confiance ou non, paranoïa (Fenigstein et Vanable, 1992), et degréd’acceptation des pratiques de la société (Jessor et Jessor, 1977).
    Le but de la création de cet instrument est avant tout d’aider les personnes se penchant sur ces questions d’inquiétude face à la protection des données. Il s’agit aussi de donner aux managers la possibilité d’être proactif dans leurs politiques de confidentialité.

page1image32448

Notes d’intérêt pour la recherche en cours :

Etat de l’art de la problématique : les inquiétudes identifiées sont classées dans différentes dimensions. Dévoilement d’un outil de mesure, qui peut être utilisé dans la phase confirmatoire (quantitative).

Ce qui n’a pas été abordé :
Le papier date de 1996, et ne tient donc pas compte du rôle des réseaux sociaux dans ces inquiétudes. Il convient d’élargir cette recherche, en ajoutant éventuellement des items dans l’instrument de mesure. Il semblerait que le classement de ces items en 4 catégories soit à conserver. 

Références :

ACM (Association for Computing Machinery). (1980).Code of Ethics, Communications of the ACM 23(7), 425.

Bagozzi, R. P. (1980). Causai Modeling in Marketing, John Wiiey and Sons, New York.

Bagozzi, R. P. (1981). An Examination of the Validity of Two Models of Attitude, Multivariate Behavioral Research, 323- 359.

Bagozzi, R. P. (1983). A Holistic Methodology for Modeling Consumer Response to Innovation, Operations Research, 128-176.

Bagozzi, R.P. (1993). Assessing Construct Validity in Personality Research: Applications to Measures of Self-Esteem, Journal of Research in Personality, 27(1), 49-87.

Bagozzi, R. P. and Phillips, L. W. (1982). Representing and Testing Organizational Theories: A iHolistic Construal, Administrative Science Quarteriy 27(3), 459-489.

Bagozzi, R. P. and Yi, Y. (1988). On the Evaiuation of Structural Equation Models, Journal of the Academy of Marketing Science (16), 1988.

Bagozzi, R. P. and Yi, Y. (1991). Multitrait-Multi-method Matrices in Consumer Research, Journal of Consumer Research 17(4), 426-439.

Barki, H. and Hartwick, J. (1994). Measuring User Participation, User Involvement, and User Attitude, MIS Quarteriy 8(1), 59-82.

Bearden, W. O., Netemeyer, R. G. andMobley, M. F. (1993). Handbook of Marketing Scales, Sage Publications, Newbury Park, CA, 3-8.

Bennett, C. J. (1992). Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Cornell University Press, Ithaca, NY.

Bentier, P. M. (1990). Comparative Fit Indexes inStructural Models, Psychological Bulletin107(2), 238-246.

Bentier, P. M. and Bonett, D. (1980). SignificanceTests and Goodness of Fit in the Analysis of Covariance Structures, Psychological Bulletin, 88(3), 588- 606.

Berscheid, E. (1977). Privacy: A Hidden Variable in Experimental Social Psychology, Journal of Social issues, 33(3),85-101.

Bonoma, T. V. (1985). Case Research in Marketing: Opportunities, Problems, and a Process, Joumal of Marketing Research, 22, 199-208.

Cambridge Reports. (1989). Technology and Consumers: Jobs, Education, Privacy, Bulletin on Consumer Opinion no. 157, Cambridge, MA.

Campbell, D. T. and Fiske, D. W. (1959). Convergent and Discriminant Validation by the Multi- trait-Multimethod Matrix, Psychological Bulletin, 56(2), 81-105.

Cespedes, F. V. and Smith, H. J. (1993). Database Marketing: New Rules for Policy and Practice, Sloan Management Review, 34, 7-22.

Churchill, G. (1979). A Paradigm for Developing Better Measures of Marketing Constructs, Journal of Marketing Research, 16, 64-73.

 

Cook, T.D. and Campbell, D. T. (1979). Quasi-experimentation: Design and Analysis issues for Pield Settings, Rand McNally, Chicago.

Cote, J. A. and Buckley, M. R. (1987). Measurement Error and Theory Testing in Consumer Research: An Illustration of the Importance of Construct Validation, Journal of Consumer Research, 14, 579-582.

Cozby, P.C. (1973). Self-disclosure: A LiteratureReview, Psychological Bulletin 79(2),73-91.

Cronbach, L. (1971). Test Validation, in EducationaiMeasurement (2nd edition), R. L. Thomdike (ed.), American Council on Education, Washington, D.C, 443-507.

Cronbach, L J. and Meehl, P. E. (1955). Construct Validity in Psychological Tests, Psychoogical Bulletin 52(4), 281-302.

Culnan, M. J. (1993). ‘How Did They Get My Name?’: An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use, MIS Quarterly 17(3), 341-363.

Cyert, R. M. and March, J. G. (1963). A BehavioralTheory of the Pirm, Prentice Hall, NewYork.

Date, C J . (1986). An introduction to Database Systems (4th ed.), Addison-Wesley Publishing Company, Reading, MA.

Equifax Inc. (1993). The Equifax Report on Consumers in the information Age, 1990. Aiso Harris-Equifax Consumer Privacy Survey 1991, Harris-Equifax Consumer Privacy Survey 1992, and Harris-Equifax Heaith information Privacy Survey. Equifax Inc., Atlanta, GA.

Fenigstein, A. and Vanable, P. A. (1992). Paranoia and Self-Consciousness, Journal of Personality and Social Psychology 62(1), 129-138.

Fornell, C. and Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Joumal of Marketing Research 18, 39-50.

Gordon, M.E., Slade, L.A., and Schmitt, N. (1986). The ‘Science of the Sophomore’ Revisited: From Conjecture to Empiricism, Academy of Management Review 11(1), 1986, 191-207.

HEW (U.S. Department of Health, Education,and Welfare). (1973). Records, Computers, and the Rights of Citizens: Report of the Secretary’s Advisory Committee on Automated Personal Data Systems, U.S. Government Printing Office, Washington, D.C.

Jarvenpaa, S. L., Dickson, G. W., and DeSanctis, G. (1985). Methodological Issues in Experimental IS Research: Experiences and Recommendations, MIS Quarterly 9(2), 141-156.

Jessor, R. and Jessor, S. (1991). Problem Behavior and Psychosocial Development, Academic Press, New York, 1977, pp. 234-235, as reproduced in Measures of Personality and Social Psychological Attitudes, J. P. Robinson, P. R. Shaver, and L. S. Wrightsman (eds.). Academic Press, San Diego, 355-358.

Joreskog, K. and Sorbom, D. (19984). LISREL VI: Analysis of Linear Structural Relationships by the Maximum Likelihood and Least Squares Methods, Scientific Software, Mooresville, IN.

Katz, J. E. and Tassone, A. R. (1990). Public Opinion Trends: Privacy and Information Technology, Public Opinion Quarterly, 54, 125-143.

Kelvin, P. (1973). A Socio-psychological Examination of Privacy,” British Journal of Social Clinical Psychology, 2(3), 248-261.

Kerlinger, F. N. (1986). Foundations of Behavioral Research (3rd ed.). Holt, Rinehart, and Winston, New York, 477-483.

Kling, R. (1978). Value Conflicts and Social Choices in Electronic Funds Transfer Systems Developments, Communications of the ACM (21:8), 642-657.

Ladd, J. (1989). Computer and Moral Responsibility: A Framework for Ethical Analysis, in The Information Web: Ethical and Social Implications of Computer Networking, C. Gould (ed.), Westview Press, Boulder, CO.

Laudon, K.C. (1986). Dossier Society: Value Choices in the Design of National Information Systems, Columbia University Press, New York.

Laufer, R.S. and Wolfe, M. (1977). Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory, Journal of Social Issues 33(3), 22-41.

Lee, A. S. Integrating Positivist and Interpretive Approaches to Organizational Research, Organizational Science 2(4), 342-365.

Levin, H.A. and Askin, F. (1977). Privacy in the Courts: Law and Social Reality, Journal of Social Issues, 33(3),138-153.

Linowes, D. F. (1989). Privacy in America: Is Your Private Life in the Public Eye? University of Illinois Press, Urbana, IL.

Mason, R. O. (1986). Four Ethical Issues of the Information Age, MIS Quarterly 10(1), 4-12.

McDonald, R. P. and Marsh, H. W. (1990). Choosing a Multivariate Model: Noncentrality and Goodness of Fit, Psychological Bulletin, 107(2), 247-255.

Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. (1995). Values, Personal Information Privacy Concerns, and Regulatory Approaches, Communications of the ACM 38(12), 65-74.

Miller, A. (1982). Computers and Privacy, in Ethics and the Management of Computer Technology, W. M. Hoffman, and J. M. Moore (eds.), Oelgeschlager, Gunn, and Hain Publishers, Inc., Cambridge.

Mowshowitz, A. (1976). The Conquest of Will, Addison-Wesley, Reading, MA.

Orlikowski, W. J. and Baroudi, J. J. (1991). Studying Information Technology in Organizations: Research Approaches and Assumptions, Information Systems Research 2(1), 1-28.

PPSC (Privacy Protection Study Commission). (1977).Personal Privacy in an Information Society: Report of the Privacy Protection Study Commission, U.S. Government Printing Office, Washington, D.C.

Smith, H. J. (1994). Managing Privacy: Information Technology and Organizational America, University of North Carolina Press, Chapel Hill, NC.

Smith, H. J., Milberg, S. J., and Kallman, E. A. (1995). Privacy Practices Around the World: An Empirical Study, working paper, Georgetown University, Washington, D.C.

Stone, D. L. (1986). Relationship Between Introversion/Extraversion, Values Regarding Con- trol Over Information, and Perceptions of Invasion of Privacy, Perceptual and Motor Skills, 62(2), 371-376.

Stone, E. F. and Stone, D. L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms,” in Research in Personnel and Human Resources Management (8), K. M. Rowland and G. R. Ferris (eds.), JAIPress, Greenwich, CT, 349-411.

Stone, E. F., Gardner, D. G., Gueutal, H. G., and McClure, S. (1983). A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations,” Journal of Applied Psychoiogy (68:3), 459-468.

Straub, D. W. (1989). Validating instruments in MISResearch, MIS Quarterly, 3(2), 146-169.

Straub, D. W., Jr. and Collins, R. W. (1990). KeyInformation Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy, MIS Quarterly 14(2), 142-156.

Straub, D.W., Limayem, M., and Karahanna, E. (1995). Measuring System Usage: Implications for IS Theory Testing, Management Science 41(8), 1328- 1342.

Tolchinsky, P.D., McCuddy, M.K., Adams, J., Ganster, D.C, Woodman, R.W., and Fromkin, H.L. (1981). Employee Perceptions of Invasion of Privacy: A Field Simulation Experiment, Joumal of Applied Psychology 66(3), 308-313.

Warren, C. and Laslett, B. (1977). Privacy and Secrecy: A Conceptual Comparison, Journal of Social issues 33(3), 43-51.

Westin, A. F. (1967). Privacy and Preedom, Atheneum Publishers, New York.

Westin, A.F. (1990). Consumer Privacy Issues in the Nineties, in The Equifax Report on Consumers in the information Age, Equifax Inc., Atlanta, GA, 18-28.

Westin, A. F. and Baker, M. A. (1972). Databanks in a Pree Society, Ouadrangle Books, New York.

Yin, R. K. (1988). Case Study Research: Design and Methods, Sage Publications, Beverly Hills, CA.

Information Privacy Research: An Interdisciplinary Review

Référence :
Smith, H.J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35 (4), 989-1015

Idée / dominante :

Après avoir dressé une synthèse des différents travaux, faits à date, concernant la problématique de la « privacy », qui reste très difficile à définir, les auteurs expliquent que les études mentionnées n’étaient pas assez « cohésives ». En effet, les recherches effectuées. Les prochaines études devraient aller dans un sens commun, visant notamment à optimiser le modèle « APCO » pour le rendre universel et exploitable pour toutes les disciplines.

page1image8672

Résumé :

Cet article a pour principale vocation d’être une synthèse des travaux réalisés à date. Les problématiques liées à la « privacy » sont de plus en plus prégnantes, alors que Gomez et al. (2009) relatent que la plupart des sites internet utilisent les données personnelles des internautes pour la publicité ciblée et les partagent avec des centaines d’entreprises affiliées. Une enquête de l’institut Ponemon (2007) révèle que 62% des répondants ont été averti que leurs données personnelles avaient été perdues ou volées, et que 84% des répondant exprimaient des inquiétudes croissantes quant à ces pertes de données.

Les auteurs spécifient que l’aspect qui est traité dans l’article est bien la « privacy » de l’information (au sens large), à différencier de la «privacy» physique, qui peut faire allusion à toute autre intrusion/violation. Cette « privacy » de l’information est à mettre en relation avec la problématique éthique (Byrnum 2008 ; Pearlson & Saunder 2009), et est traitées sous 3 angles : l’angle normatif (ce qu’est la « privacy »), accompagné de l’angle purement descriptif, puis sous l’angle empirique (tests des différentes théories mises en lumière par les chercheurs).

La première définition de la « privacy » était celle d’un DROIT humain, intégré dans le système de valeurs morales. Cela a rapidement soulevé un paradoxe étant donné que le nombre d’inquiétudes augmentait, tout comme le nombre de renseignements laissés sur internet. La « privacy » a alors été considéré comme un bien (Bennett 1995), qui n’est pas absolu. Westin (1967) l’a définie comme « un retrait volontaire et temporaire d’une personne de la société ». Cela a introduit la notion d’état (« state »), comme un « état d’accès limité». Altman (1975) a quant à lui introduit la notion de «contrôle», en définissant la « privacy » comme « le contrôle sélectif de l’accès à soi ». Cette définition présente l’intérêt de mieux correspondre aux attributs de la «privacy» de l’information. Toutefois, cette définition a été contrebalancée par Laufer & Wolfe (1977), car, selon eux, le contrôle est un attribut de la « privacy », mais celle-ci ne peut pas être un contrôle, à proprement parler. La « privacy » doit petre distinguée de l’anonymat (Camp 1999), du secret, de la confidentialité (car la « privacy » est plus un souhait alors que la confidentialité en est une reponse), de la sécurité et de l’éthique (cf. mapping présenté dans l’article). => Difficile de trouver un synonyme en français.

Beaucoup de recherches ont été jusque là guidée par le modèle APCO : (1) Antecedents -> (2) Privacy concerns -> (3) Outcomes.

(1) Comprend différents paramètres comme l’expérience, le niveau d’information, les caractéritiques démographiques et ethniques…

(2)  Peut être considéré comme une variable fixe ou non.

(3)  Inclus notamment le calcul risques/bénéfices, influant sur le comportement (ou plus précisément sur les intentions).
Risque : potentielle perte de contrôle sur ses informations personnelles
Bénéfices: récompenses financières, personnalisation, ajustement social (établissement d’une identité social, via l’intégration de groupes sociaux).

page1image36392 page1image36816 page1image36976

Notes d’intérêt pour la recherche en cours :

Synthèse exhaustive des 320 articles et des 128 ouvrages écrits sur la «privacy», tableaux de classification des œuvres par thèmes en annexe, présentation du modèle APCO et de ses failles, mapping des tactiques de gestion de l’identité.

Ce qui n’a pas été abordé :

Pas de place pour les caractéristiques d’un site internet, dont l’appréciation est soumise à jugement subjectif, dans les antécédents jouant un rôle sur le niveau d’inquiétude des individus. Le croisement de cet article avec les recherches qui ont été faites ensuite permettrait de creuser ce point, notamment pour ce qui est des réseaux sociaux. 

Références :

 

Ackerman, M. (2004). Privacy in Pervasive Environments: Next Generation Labeling Protocols, Personal and Ubiquitous Computing 8 (6), 430-439.

Acquisti, A. (2004). Privacy in Electronic Commerce and the Economics of Immediate Gratification, in Proceedings of the 5th ACM Electronic Commerce Conference, New York: ACM Press, 21-29.

Acquisti, A., and Gross, R. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, in Proceedings of 6th Privacy Enhancing Technologies Symposium, Cambridge, UK, June 28-30, 36-58.

Acquisti, A., and Grossklags, J. (2005a). Privacy and Rationality in Individual Decision Making, IEEE Security & Privacy 3 (1), 26-33.

Acquisti, A., and Grossklags, J. (2005b). Uncertainty, Ambiguity and Privacy,” in Proceedings of the 4th Annual Workshop Economics and Information Security, Cambridge, MA, June 2-3, 2-3.

Acquisti, A., and Varian, H. R. (2005). Conditioning Prices on Purchase History, Marketing Science 24(3), 367-381.

Alderman, E., and Kennedy, C. (1997). The Right to Privacy, New York: Vintage Books.

Allen, M. W., Coopman, S. J., Hart, J. L., and Walker, K. L. (2007). Workplace Surveillance and Managing Privacy Boundaries, Management Communication Quarterly 21(2), 172-200.

Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Monterey, CA: Brooks/Cole Publishing.

Altman, I. (1977). Privacy Regulation: Culturally Universal or Cul- turally Specific?, Journal of Social Issues 33(3), 66-84.

Andrade, E. B., Kaltcheva, V., and Weitz, B. (2002). Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Brand Reputation, in Advances in Consumer Research, S. M. Broniarczyk and K. Nakamoto (eds.), Valdosta, GA: Association for Consumer Research, 350-353.

Ariss, S. S. (2002). Computer Monitoring: Benefits and Pitfalls Facing Management, Information & Management 39(7), 553-558.

Ashworth, L., and Free, C. (2006). Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Con- sumers Online Privacy Concerns, Journal of Business Ethics 67(2), 107-123.

Awad, N. F., and Krishnan, M. S. (2006). The Personalization Privacy Paradox: An Empirical Evaluation of Information Trans- parency and the Willingness to be Profiled Online for Personalization, MIS Quarterly 30(1), 13-28.

Bansal, G., Zahedi, F., and Gefen, D. (2008). The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation, in Proceedings of 29th International Conference on Information Systems. Paris, France, December 14-17.

Bansal, G., Zahedi, F. M., and Gefen, D. (2010). The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online, Decision Support Systems 49(2), 138-150.

Belanger, F., Hiller, J. S., and Smith, W. J. (2002). Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes, Journal of Strategic Information Systems 11(3-4), 245-270.

Bellman, S., Johnson, E. J., Kobrin, S. J., and Lohse, G. L. (2004). International Differences in Information Privacy Concerns: A Global Survey of Consumers, Information Society 20(5), 313-324.

Bennett, C. J. (1992). Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca, NY: Cornell University Press.

Bennett, C. J. (1995). The Political Economy of Privacy: A Review of the Literature, Hackensack, NJ: Center for Social and Legal Research.

Bennett, C. J., and Raab, C. D. (1997). The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response,” Information Society 13(3), 245-263.

Benson, D. (1983). A Field Study of End User Computing: Findings and Issues, MIS Quarterly 7(4), 35-45.

Blattberg, R. C., and Deighton, J. (1991). Interactive Marketing: Exploiting the Age of Addressability, Sloan Management Review 33(1), 5-14.

Bok, S. (1989). Secrets: On the Ethics of Concealment and Revelation, New York: Vintage.

Bowie, N. E., and Jamal, K. (2006). Privacy Rights on the Internet: Self-Regulation or Government Regulation?, Business Ethics Quarterly 16(3), 323-342.

Boyd, D. (2008). Facebook’s Privacy Trainwreck: Exposure, Invasion and Social Convergence, Convergence: The Inter- national Journal of Research into New Media Technologies 14(1), 13-20.

Boyd, D., and Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication 13(1), Article 11.

Breckenridge, A. C. (1970). The Right to Privacy, Lincoln, NE: University of Nebraska Press, Lincoln.

Brenton, M. (1964). The Privacy Invaders, New York: Coward McCann.

Bruner II, G. C., and Kumar, A. (2007). Attitude toward Location- Based Advertising, Journal of Interactive Advertising 7(2)

Budnitz, M. E. (1998). Privacy Protection for Consumer Trans- actions in Electronic Commerce: Why Self-Regulation Is Inadequate, South Carolina Law Review (49).

Bynum, T. (2008). Computer and Information Ethics, in The Stanford Encyclopedia of Philosophy (Winter 2008 Edition), E. N. Zalta (ed.),Stanford, CA: Center for the Study of Language and Information.

Camp, L. J. (1999). Web Security and Privacy: An American Perspective, Information Society 15(4), 249-256.

Campbell, A. J. (1997). Relationship Marketing in Consumer Markets, Journal of Direct Marketing 11(3), 44-57.

Campbell, J. E., and Carlson, M. (2002). Panopticon.com: Online Surveillance and the Commodification of Privacy, Journal of Broadcasting & Electronic Media 46(4), 586-606.

Caudill, E. M., and Murphy, P. E. (2000). Consumer Online Privacy: Legal and Ethical Issues, Journal of Public Policy & Marketing 19(1), 7-19.

Cespedes, F. V., and Smith, H. J. (1993). Database Marketing: New Rules for Policy and Practice, Sloan Management Review 34(4), 7-22.

Chellappa, R. K. (2008). Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security, unpublished paper, Emory University, Atlanta, GA.

Chellappa, R. K., and Sin, R. (2005). Personalization Versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma, Information Technology and Management 6(2), 181-202.

Chen, K., and Rea, A. I. (2004). Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems 44(4), 85-92.

Clark, T. D., Jones, M. C., and Armstrong, C. P. (2007). The Dynamic Structure of Management Support Systems: Theory Development, Research Focus, and Direction, MIS Quarterly 31(3), 579-615.

Clarke, R. (2001). Person Location and Person Tracking: Tech- nologies, Risks and Policy Implications, Information Technology & People 14(2), 206-231.

Cohen, J. E. (2001). Privacy, Ideology, and Technology: A Response to Jeffrey Rosen, Georgetown Law Journal (89), 2029.

Cranor, L. F. (2003). I Didn’t Buy it for Myself’: Privacy and Ecommerce Personalization, in Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, October 27-30, 111-117

Cranor, L. F., Egelman, S., Tsai, J., and Acquisti, A. (2007). The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study, in Proceedings of 28th International Conference on Information Systems, Montréal, Canada, December 9-12.

Culnan, M. J. (1985). Consumer Awareness of Name Removal Procedures: Implication for Direct Marketing, Journal of Interactive Marketing (9), 10-19.

Culnan, M. J. (1993). ‘How Did They Get My Name’? An Exploratory Investigation of Consumer Attitudes toward Secon- dary Information Use, MIS Quarterly 17(3), 341-364.

Culnan, M. J. 2000. Protecting Privacy Online: Is Self-Regulation Working?, Journal of Public Policy and Marketing 19(1), 20-26.

Culnan, M. J., and Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness and Impersonal Trust: An Empirical Investigation, Organization Science 10(1), 104-115.

Culnan, M. J., and Bies, R. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations, Journal of Social Issues 59(2), 323-342.

Culnan, M. J., and Williams, C. C. (2009). How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches, MIS Quarterly 33(4), 673-687.

D’Urso, S. (2006). Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations, Communication Theory 16(3), 281-303.

Davies, S. G. (1997). Re-Engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity, in Technology and Privacy: The New Landscape, P. E. Agre and M. Rotenberg (eds.), Cambridge, MA: MIT Press, 143-165.

Dhillon, G. S., and Moores, T. (2001). Internet Privacy: Interpreting Key Issues, Information Resources Management Journal 14(4), 33-37.

Dholakia, N., and Zwick, D. (2001). Contrasting European and American Approaches to Privacy in Electronic Markets: A Philosophical Perspective, Electronic Markets 11(2), 116-120.

Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. (2006a). Internet Users’ Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences between Italy and the United States, Journal of Global Information Management 14(4), 57-93.

Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., and Colautti, C. (2006b). Privacy Calculus Model in E-Commerce: A Study of Italy and the United States, European Journal of Information Systems 15(4), 389-402.

Dinev, T., and Hart, P. (2004). Internet Privacy Concerns and Their Antecedents: Measurement Validity and a Regression Model, Behavior and Information Technology 23(6), 413-423.

Dinev, T., and Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research 17(1), 61-80.

Dinev, T., and Hart, P. (2007). Privacy Concerns and Levels of Information Exchange: An Empirical Investigation of Intended E-Services Use, E-Service Journal 4(3), 25-61.

Dinev, T., Xu, H., and Smith, H. J. (2009). Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy, in Proceedings of 42nd Hawaii International Con- ference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.

Dolnicar, S., and Jordaan, Y. (2007). A Market-Oriented Approach to Responsibly Managing Information Privacy Concerns in Direct Marketing, Journal of Advertising 36(2), 123-149.

Dwyer, C. 2007. Digital Relationships in the ‘MySpace’ Generation: Results from a Qualitative Study, in Proceedings of 40th Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press.

Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace, in Proceedings of the 13th Americas Conference on Information Systems (AMCIS), Keystone, CO, August 9-12.

Eastlick, M. A., Lotz, S. L., and Warrington, P. (2006). Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment, Journal of Business Research 59(8), 877-886.

Edelman, B. (2011). Adverse Selection in Online ‘Trust’ Certifications and Search Results, Electronic Commerce Research and Applications (1), 17-25.

Etzioni, A. (1999). The Limits of Privacy, New York: Basic Books.

Fairweather, N. B. (1999). Surveillance in Employment: The Case of Teleworking, Journal of Business Ethics 22(1), 39-49.

Featherman, M. S., and Pavlou, P. A. (2003). Predicting E-Services Adoption: A Perceived Risk Facets Perspective, International Journal of Human-Computer Studies 59(4), 451-474.

Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.

Foxman, E. R., and Kilcoyne, P. (1993). Information Technology Marketing Practice, and Consumer Privacy: Ethical Issues, Journal of Public Policy & Marketing 12(1), 106-119.

Garfinkel, S. (2000). Database Nation: The Death of Privacy in the 21st Century, Sebastopol, CA: O’Reilly Media.

Gomez, J., Pinnick, T., and Soltani, A. (2009). KnowPrivacy: The Current State of Web Privacy, Data Collection, and Information Sharing, School of Information, University of California Berkeley

Goodhue, D. L., and Straub, D. W. (1991). Security Concerns of System Users: A Study of Perceptions of the adequacy of Security, Information and Management 20(1), 13-27.

Grinter, R., and Palen, L. (2002). Instant Messaging in Teen Life, in Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, New Orleans, Louisiana, 21-30.

Gross, R., and Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks, in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA.

Häkkilä, J., and Chatfield, C. (2005). ‘It’s like If You OpenedSomeone Else’s Letter’: User Perceived Privacy and Social Practices with SMS Communication, in Proceedings of the Mobile HCI Conference, Salzburg, Austria, 219-222.

Hann, I.-H., Hui, K.-L., Lee, S. Y. T., and Png, I. P. L. (2008). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach, Journal of Management Information Systems 24(2), 13-42.

Henderson, H. (1999). Privacy in the Information Age, New York: Facts On File.

Herson, L. J. R. (1990). Politics of Ideas: Political Theory and American Public Policy, Long Grove, IL: Waveland Press.

Hirshleifer, J. (1980). Privacy: Its Origin, Function, and Future, The Journal of Legal Studies 9(4), 649-664.

Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010). Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry, Electronic Commerce Research and Applications 9(1), 50-60.

Hodge, M. J. (2006). Fourth Amendment and Privacy Issues on the New Internet: Facebook.com and Myspace.com, Southern Illinois University Law Journal (31), 95-123.

Hoffman, D. L., Novak, T. P., and Peralta, M. A. (1999). Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web, Information Society 15(2), 129-139.

Hui, K.-L., Tan, B. C. Y., and Goh, C.-Y. (2006). Online Information Disclosure: Motivators and Measurements, ACM Transactions on Internet Technology (6), 415-441.

Hui, K. L., Teo, H. H., and Lee, S. Y. T. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment, MIS Quarterly 31(1), 19-33.

Ito, M., and Daisuke, O. (2003). Mobile Phones, Japanese Youth and the Replacement of Social Contact, in Proceedings of Front Stage/Back Stage: Mobile Communication and the Renegotiation of the Social Sphere, R. Ling and P. Pedersen (eds.), Grimstad, Norway.

Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. (2007). Social Phishing, Communications of the ACM 50(10), 94-100.

Jarvenpaa, S. L., and Leidner, D. E. (1999). Communication and Trust in Global Virtual Teams, Organization Science 10(6), 791-815.

Jarvenpaa, S. L., and Tiller, E. H. (1999). Integrating Market, Technology, and Policy Opportunities in E-Business Strategy, Journal of Strategic Information Systems 8(3), 235-249.

Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000). Consumer Trust in an Internet Store, Information Technology and Management 1(12), 45-71.

Jensen, C., Potts, C., and Jensen, C. (2005). Privacy Practices of Internet Users: Self-Reports versus Observed Behavior, International Journal of Human-Computer Studies (63), 203–227.

Jentzsch, N. (2001). The Economics and Regulation of Financial Privacy: A Comparative Analysis of the United States and Europe, Working Paper, John F. Kennedy Institute.

Johnson, C. A. (1974). Privacy as Personal Control, in Man- Environment Interactions: Evaluations and Applications: Part 2, D. H. Carson (ed.), Washington, DC: Environmental Design Research Association, 83-100.

Junglas, A. I., and Spitzmüller, C. (2005). A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services, in Proceedings of the 38th Hawaii International Con- ference on System Sciences, Los Alamitos, CA: IEEE Computing Society Press.

Kelvin, P. (1973). A Social Psychological Examination of Privacy, British Journal of Social and Clinical Psychology (12), 248-261.

Kim, M.-C. (2004). Surveillance Technology, Privacy and Social Control: With Reference to the Case of the Electronic National Identification Card in South Korea, International Sociology 19(2), 193-213.

Kimmel, A. J. (1996). Ethical Issues in Behavioral Research, Boston: Blackwell Publishers.

Klopfer, P. H., and Rubenstein, D. I. (1977). The Concept Privacy and Its Biological Basis, Journal of Social Issues 33(3), 52-65.

Kobsa, A. (2002). Personalized Hypermedia and International Privacy, Communications of the ACM 45(5), 64-67.

Kobsa, A. (2007). Privacy-Enhanced Personalization, Communications of the ACM 50(8), 24-33.

Kobsa, A., and Schreck, J. (2003). Privacy through Pseudonymity in User-Adaptive Systems, ACM Transactions on Internet Technology (3), 149–183.

LaRose, R., and Rifon, N. (2006). Your Privacy Is Assured—of Being Disturbed: Comparing Web Sites with and Without Privacy Seals, New Media and Society 8(6), 1009-1029.

Laudon, K. C. (1996). Markets and Privacy, Communications of the ACM 39(9), 92-104.

Laufer, R. S., and Wolfe, M. (1977). Privacy as a Concept and a Social Issue: Multidimensional Developmental Theory, Journal of Social Issues 33(3), 22-42.

Lederer, S., Hong, J. I., Dey, A. K., and Landay, J. A. (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers, Personal and Ubiquitous Computing 8(6), 440-454.

Lederer, S., Mankoff, J., and Dey, K. A. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing, in Proceedings of Conferences on Human Factors in Computing Systems, Fort Lauderdale, Florida.

Leidner, D., and Kayworth, T. (2006). Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict, MIS Quarterly 30(2), 357-399.

Ling, R. (2004). The Coordination of Everyday Life, in The Mobile Connection: The Cell Phone’s Impact on Society, R. Ling (ed.), Amsterdam: Elsevier, 57-81.

Lu, Y., Tan, B. C. Y., and Hui, K.-L. (2004). Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits, in Proceedings of 25th International Conference on Information Systems, R. Agarwal, L. J. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 9-12, 272-281.

Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research 15(4), 336-355.

Margulis, S. T. (1977a). Conceptions of Privacy: Current Status and Next Steps, Journal of Social Issues 33(3), 5-21.

Margulis, S. T. (1977b). Privacy as a Behavioral Phenomenon: Introduction, Journal of Social Issues 33(3), 1-4.

Margulis, S. T. (2003a). On the Status and Contribution of Westin’s and Altman’s Theories of Privacy, Journal of Social Issues 59(2), 411-429.

Margulis, S. T. (2003b). Privacy as a Social Issue and Behavioral Concept, Journal of Social Issues 59(2), 243-261.

Marx, G. T. (1999). What’s in a Name? Some Reflections on the Sociology of Anonymity, Information Society 15(2), 99-112.

Marx, G. T. (2001). Murky Conceptual Waters: The Public and the Private, Ethics and Information Technology 3(3), 157-169.

McGinity, M. (2000). Surfing Your Turf: For a Medium that Holds Anonymity in High Rregard, Privacy Is Fast Eroding, Communications of the ACM 43(4), 19-21.

McLean, D. (1995). Privacy and Its Invasion, Westport, CT: Praeger.

McRobb, S., and Rogerson, S. (2004). Are They Really Listening? An Investigation into Published Online Privacy Policies at the Beginning of the Third Millennium, Information Technology & People 17(4), 442.

Meeks, B. N. (1997). Privacy Lost, Anytime, Anywhere, Communications of the ACM 40(8), 11-13.

Meeks, B. N. (1999). The Privacy Hoax, Communications of the ACM 42(2), 17-19.

Metzger, M. J. (2004). Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce, Journal of Computer-Mediated Communication (9:4).

Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A. (1995). Values, Personal Information Privacy, and Regulatory Approaches, Communications of the ACM 38(12), 65-74.

Milberg, S. J., Smith, H. J., and Burke, S. J. 2000. Information Privacy: Corporate Management and National Regulation, Organization Science 11(1), 35-57.

Milne, G. R. (1997). Consumer Participation in Mailing Lists: A Field Experiment, Journal of Public Policy and Marketing 16(2), 298-309.

Milne, G. R., and Boza, M.-E. (1999). Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices, Journal of Interactive Marketing 13(1), 5-24.

Milne, G. R., and Culnan, M. J. (2002). Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 US Web Surveys, Information Society 18(5), 345-359.

Milne, G. R., and Gordon, E. M. (1993). Direct Mail Privacy- Efficiency Trade-Offs Within an Implied Social Contract Framework, Journal of Public Policy and Marketing 12(2), 206-215.

Milne, G. R., and Rohm, A. (2000). Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-in and Opt-out Alternatives, Journal of Public Policy and Marketing 19(2), 238-249.

Milne, G. R., Rohm, A., and Boza, M.-E. (1999). Trust Has to Be Earned, in Frontiers of Direct Marketing, J. Phelps (ed.), New York: Direct Marketing Educational Foundation, 31-41.

Miyazaki, A., and Krishnamurthy, S. (2002). Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions, Journal of Consumer Affairs 36(1), 28-49.

Moon, Y. (2000). Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers, Journal of Consumer Research (26), 323-339.

Mowday, R. T., and Sutton, R. I. (1993). Organizational Behavior: Linking Individuals and Groups to Organizational Contexts, Annual Reviews in Psychology 44(1), 195-229.

Nissenbaum, H. (1998). Protecting Privacy in an Information Age: The Problem of Privacy in Public, Law and Philosophy 17(5), 559-596.

Nissenbaum, H. (1999). The Meaning of Anonymity in an Information Age, The Information Society 15(2), 141-144.

Norberg, P. A., and Horne, D. R. (2007). Privacy Attitudes and Privacy-Related Behavior, Psychology and Marketing 24(10), 829-847.

Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors, Journal of Consumer Affairs 41(1), 100-126.

Nowak, G. J., and Phelps, J. (1992). Understanding Privacy Concerns: An Assessment of Consumers’s Information-Related Knowledge and Beliefs, Journal of Direct Marketing 6(4), 28-39.

Nowak, G. J., and Phelps, J. (1995). Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When ‘Privacy’ Matters, Journal of Direct Marketing 9(3), 46-60.

Nowak, G. J., and Phelps, J. (1997). Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When “Privacy” Matters, Journal of Direct Marketing 11(4), 94-108.

O’Donoghue, T., and Rabin, M. (2001). Choice and Procrastination, Quarterly Journal of Economics (116), 121-160.

Odlyzko, A. (2004). Privacy, Economics, and Price Discrimination on the Internet, in Economics of Information Security, L. J. Camp and S. Lewis (eds.), New York: Springer, 187-211.

Pavlou, P. A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce 7(3), 69-103.

Pavlou, P. A., and Gefen, D. (2004). Building Effective Online Marketplaces with Institution-Based Trust, Information Systems Research 15(1), 37-59.

Pearlson, K. E., and Saunders, C. S. (2009). Managing and Using Information Systems (4th ed.), Hoboken, NJ: John Wiley & Sons.

Pedersen, D. M. (1997). Psychological Functions of Privacy, Journal of Environmental Psychology 17(2), 147-156.

Pedersen, D. M. (1999). Model for Types of Privacy by Privacy Functions, Journal of Environmental Psychology 19(4), 397-405.

Peter, J. P., and Tarpey, S. L. X. (1997). A Comparative Analysis of Three Consumer Decision Strategies, Journal of Consumer Research 2(1), 29.

Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information, Journal of Public Policy and Marketing 19(1), 27-41.

Ponemon Institute. (2007). Database Security 2007: Threats and Priorities Within IT Database Infrastructure, Traverse City, MI.

Posner, R. A. (1981). The Economics of Privacy, American Economic Review 71(2), 405-409.

Posner, R. A. (1984). An Economic Theory of Privacy, in Philosophical Dimensions of Privacy: An Anthology, F. Schoeman (ed.), New York: Cambridge University Press, 333-345.

Preston, J. (2004). Judge Strikes Down Section of Patriot Act Allowing Secret Subpoenas of Internet Data, The New York Times, Technology Section, September 30.

Propp, K. M., and Kreps, G. L. (1994). A Rose by Any Other Name: The Vitality of Group Communication Research, Communication Studies 45(1), 7-19.

Qian, H., and Scott, C. R. (2007). Anonymity and Self-Disclosure on Weblogs, Journal of Computer-Mediated Communication 12(4), 1428-1451.

Rabin, M., and O’Donoghue, T. (2000). The Economics of Imme- diate Gratification, Journal of Behavioral Decision Making (13), 233-250.

Regan, P. M. (1995). Legislating Privacy: Technology, Social Values, and Public Policy, Chapel Hill, NC: University of North Carolina Press.

Rensel, A. D., Abbas, J. M., and Rao, H. R. (2006). Private Trans- actions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web Site Use, Journal of the Association for Information Systems 7(1), 19-50.

Richards, N. M., and Solove, D. J. (2007). Privacy’s Other Path: Recovering the Law of Confidentiality, Georgetown Law Journal 96(1), 123-182.

Rifon, N. J., LaRose, R., and Choi, S. M. (2005). Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures, Journal of Consumer Affairs 39(2), 339-362.

Rindfleisch, T. C. (1997). Privacy, Information Technology, and Health Care, Communications of the ACM 40(8), 92-100.

Rosen, J. (2000). The Unwanted Gaze: The Destruction of Privacy in America, New York: Random House.

Schoeman, F. D. (1984) Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press.

Schoenbachler, D. D., and Gordon, G. L. (2002). Trust and Cus- tomer Willingness to Provide Information in Database-Driven Relationship Marketing, Journal of Interactive Marketing 16(3), 2-16.

Schwaig, K. S., Kane, G. C., and Storey, V. C. (2006). Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?, Information & Management 43(7), 805-820.

Shah, J. R., White, G. L., and Cook, J. R. (2007). Privacy Protec- tion Overseas as Perceived by USA-Based IT Professionals, Journal of Global Information Management 15(1), 68-81.

Shapiro, S. (1998). Places and Spaces: The Historical Interaction of Technology, Home, and Privacy,” Information Society 14(4), 275-284.

Sheehan, K. B. (1999). An Investigation of Gender Differences in On-Line Privacy Concerns and Resultant Behaviors, Journal of Interactive Marketing 13(4), 24-38.

Sheehan, K. B. (2002). Toward a Typology of Internet Users and Online Privacy Concerns, Information Society 18(1), 21-32.

Sheehan, K. B., and Hoy, M. G. (1999). Using E-Mail To Survey Internet Users in the United States: Methodology and Assessment, Journal of Computer-Mediated Communication 4(3).

Sheehan, K. B., and Hoy, M. G. (2000). Dimensions of Privacy Concern among Online Consumers, Journal of Public Policy & Marketing 19(1), 62-73.

Sheng, H., Nah, F., and Siau, K. (2008). An Experimental Study on U-Commerce Adoption: The Impact of Personalization and Privacy Concerns, Journal of Associations for Information Systems 9(16), Article 15.

Singer, P. (1991). A Companion to Ethics, Hoboken, NJ: Wiley- Blackwell.

Sipior, J. C., and Ward, B. T. (1995). The Ethical and Legal Quandary of Email Privacy, Communications of the ACM 38(12), 48-54.

Sipior, J. C., Ward, B. T., and Rainone, S. M. (1998). Ethical Management of Employee E-Mail Privacy, Information Systems Management 15(1), 41-47.

Smith, H. J. (2001). Information Privacy and Marketing: What the US Should (and Shouldn’t) Learn from Europe, California Management Review 43(2), 8-33.

Smith, H. J. (2004). Information Privacy and its Management, MIS Quarterly Executive 3(4), 201-213.

Smith, H. J., Milberg, J. S., and Burke, J. S. (1996). Information Privacy: Measuring Individuals’ Concerns About Organizational Practices, MIS Quarterly 20(2), 167-196.

Sobel, L. A. (1976). War on Privacy, New York: Facts on File.

Solove, D. J. (2004). The Digital Person: Technology and Privacy in the Information Age, New York: New York University Press.

Solove, D. J. (2006). A Taxonomy of Privacy, University of Pennsylvania Law Review 154(3), 477-560.

Solove, D. J. (2008). Understanding Privacy, Cambridge, MA: Harvard University Press.

Stewart, K. A., and Segars, A. H. (2002). An Empirical Examination of the Concern for Information Privacy Instrument, Information Systems Research 13(1), 36-49.

Stone, E. F., and Stone, D. L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms, Research in Personnel and Human Resources Management 8(3), 349-411.

Stone-Romero, E. F., Stone, D. L., and Hyatt, D. (2003). Personnel Selection Procedures and Invasion of Privacy, Journal of Social Issues 59(2), 343-368.

Tabak, F., and Smith, W. P. (2005). Privacy and Electronic Monitoring in the Workplace: A Model of Managerial Cognition and Relational Trust Development, Employee Responsibilities and Rights Journal 17(3), pp. 173-189.

Tang, Z., Hu, Y. J., and Smith, M. D. (2008). Gaining TrustThrough Online Privacy Protection: Self-Regulation, Mandatory Standards, or Caveat Emptor, Journal of Management Information Systems 24(4), 153-173.

Taylor, C. R. (2004a). Consumer Privacy and the Market for Customer Information, RAND Journal of Economics 35(4), 631-650.

Taylor, C. R. (2004b). Privacy and Information Acquisition in Competitive Markets, Working Paper Series, Berkeley Olin Program in Law & Economics, Berkeley, CA.

Tefft, S. K. (1980). Secrecy: A Cross-Cultural Perspective, New York: Human Sciences Press.

Turow, J. (2003). Americans & Online Privacy: The System Is Broken, report from the Annenberg Public Policy Center, University of Pennsylvania.

Unni, R., and Harmon, R. (2007). Perceived Effectiveness of Push vs. Pull Mobile Location-Based Advertising, Journal of Interactive Advertising 7(2).

Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for Information Privacy, Risk Perception and Online Consumer Purchasing, Journal of the Association for Information Systems 7(6), 415-444.

Walczuch, R. M., and Steeghs, L. (2001). Implications of the New EU Directive on Data Protection for Multinational Corporations, Information Technology & People 14(2), 142-162.

Wald, M. (2004). Airline Gave Government Information on Passengers, New York Times, Technology Section, January 18.

Waldo, J., Lin, H., and Millett, L. I. (2007). Engaging Privacy and Information Technology in a Digital Age, Washington, DC: National Academies Press.

Walsham, G. (1996). Ethical Theory, Codes of Ethics and IS Practice, Information Systems Journal 6(1), 69-81.

Wang, S., Beatty, S. E., and Foxx, W. (2004). Signaling the Trust- worthiness of Small Online Retailers, Journal of Interactive Marketing 18(1), 53-69.

Warren, C., and Laslett, B. (1977). Privacy and Secrecy: Conceptual Comparison, Journal of Social Issues 33(3), 43-51.

Warren, S. D., and Brandeis, D. L. (1890). The Right to Privacy, Harvard Law Review 4(5), 193-220.

Weinstein, W. L. (1971). The Private and the Free: A Conceptual Inquiry, in Privacy: Nomos XIII, J. R. Pennock and J. W. Chapman (eds.), New York: Atherton Press, pp. 624-692.

Weisband, S. P., and Reinig, B. A. (1995). Managing User Percep- tions of Email Privacy, Communications of the ACM (38:12), 40-47.

Werhane, P. H. (1994). The Normative/Descriptive Distinction in Methodologies of Business Ethics, Business Ethics Quarterly 4(2), 175-180.

Westin, A. F. (1967). Privacy and Freedom, New York: Atheneum.

Westin, A. F. (2001). Opinion Surveys: What Consumers Have to Say About Information Privacy, Prepared Witness Testimony, The House Committee on Energy and Commerce, W. J. “Billy” Tauzin, Chairman, May 8.

Westin, A. F. (2003). Social and Political Dimensions of Privacy, Journal of Social Issues 59(2), 431-453.

White, C., and Christy, D. (1987). The Information Center Concept: A Normative Model and a Study of Six Installations, MIS Quarterly 11(4), 450-458.

White, T. B. (2004). Consumer Disclosure and Disclosure Avoidance: A Motivational Framework, Journal of Consumer Psychology 14(1/2), 41-51.

Xu, H. (2007). The Effects of Self-Construal and Perceived Control on Privacy Concerns, in Proceedings of the 28th International Conference on Information Systems, Montréal, Canada, December 9-12.

Xu, H., Dinev, T., Smith, H. J., and Hart, P. (2008). Examining the Formation of Individual’s Information Privacy Concerns: Toward an Integrative View, in Proceedings of 29th Inter- national Conference on Information Systems, Paris, France, December 14-17.

Xu, H., and Gupta, S. (2009). The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers’ Adoption of Location-Based Services, Electronic Markets—The International Journal on Networked Business 19(2), 137-140.

Xu, H., and Teo, H. H. (2004). Alleviating Consumer’s Privacy Concern in Location-Based Services: A Psychological Control Perspective, in Proceedings of the 25th International Con- ference on Information Systems, R. Agarwal, L. J. Kirsch, and J. I. DeGross (eds.), Washington, DC, December 9-12, 793-806.

Xu, H., Teo, H. H., and Tan, B. C. Y. (2005). Predicting the Adoption of Location-Based Services: The Roles of Trust and Privacy Risk, in Proceedings of 26th International Conference on Infor- mation Systems, D. Avison, D. Galletta, and J. I. DeGross (eds.), Las Vegas, NV, December 11-14, 897-910.

Xu, H., Teo, H. H., Tan, B. C. Y., and Agarwal, R. (2010). The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services, Journal of Management Information Systems 26(3), 137-176.

Younger Committee Report. (1972). Report of the Committee on Privacy, Cmnd.5012 HMSO.

Zweig, D., and Webster, J. (2002). Where Is the Line between Benign and Invasive? An Examination of Psychological Barriers to the Acceptance of Awareness Monitoring Systems, Journal of Organizational Behavior (23), 605-633.

Zweig, D., and Webster, J. 2003. Personality as a Moderator of Monitoring Acceptance, Computers in Human Behavior (19), 479-493.

Zwick, D., and Dholakia, N. (2004). Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing, Journal of Macromarketing 24(1), 31-43.

Proposing the online community self-disclosure model: the case of working professionals in France and in the U.K. who use online communities.

Référence :
Posey, C., Lowry, P.B., Roberts, T.L. & Selwyn Ellis, T. (2010). Proposing the online community self-disclosure model: the case of working professionals in France and in the U.K. who use online communities. European Journal of Information Systems, 19, 181-195

page1image3568

Idée / dominante :

Les théories de l’échange social (SET) et de la pénétration sociale (SPT) ne suffisent pas à expliquer la propension des individus à livrer des informations personnelles les concernant sur les communautés en ligne (plus particulièrement MySpace et Facebook). Certains de ces comportements sont drivés par la culture. L’étude se concentre sur une comparaison entre les utilisateurs de tels sites en France et au Royaume-Uni.page1image8656 page1image9664

Résumé :

Pour les entreprises, les réseaux sociaux et autres communautés en ligne représentent une source idéale pour la recherche marketing (Kozinets 2002), mais sont également un moyen de palier à la réticence des individus à dévoiler des informations personnelles via le marketing traditionnel (Robertshaw & Marr 2006), un moyen de créer des interactions entre la marque et le client (Im et al. 2008) et un levier pour augmenter la demande (Miller et al. 2009). Pourquoi les internautes partagent/retiennent des informations sur les communautés online ? D’un point de vue utilitariste, l’intention des individus d’utiliser et de continuer à utiliser ces sites est basée sur l’utilité, et sur la facilité d’utilisation. Toutefois, le partage d’informations renvoie à des motivations beaucoup plus sociales, incluant certaines différences culturelles. Ainsi, les auteurs se sont basés sur la théorie de l’échange social (les individus s’engagent dans une relation lorsque le coût perçu est moins important que le bénéfice escompté – focus sur les relations), et sur la théorie de la pénétration sociale qui la complète (pour maximiser la relation, l’individu se dévoilé. La réciprocité en est le premier bénéfice, tandis que le coût est le risque que cela suppose – focus sur le partage d’informations). Les auteurs cherchent ainsi à utiliser les deux lois pour comprendre, ce qui impacte le « self-disclosure » (comprenant les notions de quantité (fréquence et durée), d’intention (contrôle sur les informations dévoilées), de profondeur (degré de sensibilité), d’honnêteté et de valence (valeur positive de l’information)), en regardant également les paramètres socio-culturels qui, selon eux, jouent un rôle prépondérant dans l’attitude des internautes, outre le calcul coûts/bénéfices.

En termes de méthodologie, les auteurs ont fait le choix d’interroger 529 professionnels (263 en France / 266 en GB) utilisant au moins occasionnellement des communautés en ligne (choix délibéré de ne pas cibler des étudiants comme la plupart des études). L’âge moyen des participants était de 36 ans en GB, et de 33, 6 ans en France).

Principaux résultats : l’influence sociale (degré d’influence des croyances, attitudes et comportements des autres personnes de son environnement (Deutsch & Gerard 1955)), la réciprocité, et la confiance en la communauté en ligne impactent positivement le « self-disclosure ». Le collectivisme social (intégration de l’individu de façon cohésive dans un groupe qui le protège en échange de sa fidélité) a également un ipact positif sur le « self-disclosure » Cette propension à diffuser des informations personnelles est cependant impactée négativement par les risques perçus pour la « privacy ».

D’un point de vue plus « culturaliste », il est apparu que le modèle français était plus marqué par l’influence sociale suggérée par l ‘utilisation de communautés online, et que la réciprocité en était le premier facteur. Du côté anglais, ce sont les risques pour la « privacy » et la confiance en le site qui ont une influence pus grande. Cela suggère qu’il pourrait y avoir de grandes différences sur le type d’informations dévoilées.

page1image34248

Notes d’intérêt pour la recherche en cours :

Détails de la SET et de la SPT, introduction du fait culturel poussant les internautes à échanger de façon différente, va plus loin de que le traditionnel calcul coûts/bénéfices pour expliquer les raisons poussant un individu à « se livrer » sur des sites internet.

Ce qui n’a pas été abordé : Influence du sexe dans la disposition à livrer des informations personnelles sur les communautés en ligne. L’article se concentre sur les motivations sociales, il faudrait creuser ce qui touche au « design » de tels sites pour mesurer les notions de confiance, de fiabilité, mais aussi pour mesurer l’impact sur les informations dévoilées… En effet, d’après l’article, un design plus intrusif serait efficace pour inciter les individus à retirer des « couches de leur oignon » (cf. Altman & Taylor 1973)

Références :

Ajzen, I. (1991) The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

Altman, I. and Taylor D. (1973) Social Penetration: The Development of Interpersonal Relationships. Holt, Rinehart & Winston, New York.

Altman, I., Vinsel, A. and Brown, B. (1981) Dialectic conceptions in social psychology: an application to social penetration and privacy regula- tion. Advances in Experimental Social Psychology, 14(1981), 107–160.

Awad, N.F. and Krishnan, M.D. (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30(1), 13–28.

Ba, S.L. and Pavlou, P.A. (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly 26(3), 243–268.

Bandura, A. (1977) Social Learning Theory. Prentice-Hall, Englewood Cliffs.

Barak, A. and Gluck-Ofri, O. (2007) Degree and reciprocity of self- disclosure in online forums. CyberPsychology & Behavior, 10(3),407–417.

Bernoff, J. and Li, C. (2008) Harnessing the power of the oh-so-social web.MIT Sloan Management Review, 49(3), 36–42.

Chang Lee, K. and Kwon, S. (2008) A cognitive map-driven avatar designrecommendation DSS and its empirical validity. Decision SupportSystems, 45(3), 461–472.

Chin, W.W., Marcolin, B.L. and Newsted, P.R. (2003) A partial least squareslatent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189–217.

Chiu, C.M., Hsu, M.H. and Wang, E.T.G. (2006) Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decision Support Systems, 42(3), 1872–1888.

Cialdini, R.B. (2001) Influence: Science and Practice, 4th edn, Allyn & Bacon, Boston.

Connolly, T. and Jessup, L.M. (1990) Effects of anonymity and evaluative tone on idea generation in computer-mediated groups. Management Science, 36(6), 689–703.

Cook, S. (2008) The contribution revolution: letting volunteers build your business. Harvard Business Review, 86(10), 60–66.

Davis, F.D. (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.

Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989) User acceptance of computer technology: a comparison of two theoretical models.Management Science, 35(8), 982–1003.

Debalgo-Ballester, E. and Hernández-Espallardo, M. (2008) Effect of brandassociations on consumer reactions to unknown on-line brands.International Journal of Electronic Commerce, 12(3), 81–113.

Derlega, V.J., Metts, S., Petronio,S. and Margulis, S.T. (1993) Self-Disclosure.Sage Publications, Newbury Park.

Deutsch, M. and Gerard, H.B. (1955) A study of normative and informationsocial influences upon individual judgment. Journal of Abnormal andSocial Psychology, 51(3), 629–636.

Dietz-Uhler, B., Bishop-Clark, C. and Howard, E. (2005) Formation of andadherence to a self-disclosure norm in an online chat. CyberPsychology& Behavior, 8(2), 114–120.

Ellison, N.B., Steinfield, C. and Lampe, C. (2007) The benefits of facebook‘friends’: social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168.

Emmert, P. and Donaghy, W.C. (1981) Human Communication: Elements and Contexts. Addison-Wesley Publishing Company, Reading, MA.

Fishbein M and Ajzen I (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA.

Forman, C., Ghose, A. and Wiesenfeld, B. (2008) Examining the relationshipbetween reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research, 19(3), 291–313.

Gefen, D., Karahanna, E. and Straub, D.W. (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51–90.

Gefen, D. and Ridings, C.M. (2002) Implementation team responsiveness and user evaluation of customer relationship management: a quasi- experimental design study of social exchange theory. Journal of Management Information Systems, 19(1), 47–69.

Gefen, D. and Straub, D.W. (2005) A practical guide to factorial validity using PLS-Graph: tutorial and annotated example. Communications of the AIS, 16(5), 91–109.

Greenberg, M.A. and Stone, A.A. (1992) Emotional disclosure about traumas and its relation to health: effects of previous disclosure and trauma severity. Journal of Personality and Social Psychology, 63(1), 75–84.

Gudykunst, W.B. and Nishida, T. (1986) The influence of cultural variability on perceptions of communication behavior associated with relation- ship terms. Human Communication Research 13(2), 147–166.

Hargittai, E. (2007) Whose space? Differences among users and non-users of social network sites. Journal of Computer-Mediated Communication, 13(1), 276–297.

Hensley, W.E. (1996) A theory of the valenced other: the intersection of the looking-glass self and social penetration. Social Behavior and Personality, 24(3), 293–308.

Hofstede, G. (1991) Cultures and Organizations: Software of the Mind. McGraw-Hill Book Company Europe, Berkshire, England.

Horenstein, V.D.P. and Downey, J.L. (2003) A cross-cultural investigation of self-disclosure. North American Journal of Psychology, 5(3), 373–386.

Husted, B. and Allen, D. (2008) Toward a model of cross-cultural businessethics: the impact of individualism and collectivism on the ethicaldecision-making process. Journal of Business Ethics, 82(2), 293–305.

Im, S., Lee, D.H., Taylor, C.R., and D’Orazio, C. (2008) The influence of consumer self-disclosure on web sites on advertising response. Journalof Interactive Advertising, 9(1), 87–106.

Ishii, K. and Ogasahara, M. (2007) Links between real and virtual networks:a comparative study of online communities in Japan and Korea.CyberPsychology & Behavior, 10(2), 252–257.

Jarvenpaa, S.L. and Staples, D.S. (2001) Exploring perceptions of organizational ownership of information and expertise. Journal of ManagementInformation Systems, 18(1), 151–183.

Jarvenpaa, S.L. and Tractinsky, N. (1999) Consumer trust in an internetstore: a cross-cultural validation. Journal of Computer-Mediated Communication, 5(2), 1–35.

Jourard, S. (1971) Self-Disclosure: An Experimental Analysis of theTransparent Self. Wiley & Sons, Inc., New York.

Kankanhalli, A., Tan, B.C.Y. and Wei, K.K. (2005) Contributing knowledge toelectronic knowledge repositories: an empirical investigation. MISQuarterly, 29(1), 113–144.

Karahanna, E., Evaristo, R. and Strite, M. (2002) Methodological issues inMIS cross-cultural research. Journal of Global Information Management,10(1), 48–55.

Ko, H.C. and Kuo, F.Y. (2009) Can blogging enhance subjective well-beingthrough self-disclosure? CyberPsychology & Behavior, 12(1), 75–79.

Kozinets, R.V. (2002) The field behind the screen: using netnography for marketing research in online communities. Journal of MarketingResearch, 39(1), 61–72.

Lea, M., Spears, R., and De Groot., D. (2001) Knowing me, knowing you:anonymity effects on social identity processes within groups.Personality and Social Psychology Bulletin, 27(5), 526–537.

Lee, J. (2001) The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success. Information &Management, 38(5), 323–335.

Lowry, P.B., Romano, N.C., Jenkins, J.L. and Guthrie, R.W. (2009) The CMCinteractivity model: how interactivity enhances communication quality and satisfaction in lean-media groups. Journal of Management Information Systems, 26(1), 155–195.

Lowry, P.B., Vance, A., Moody, G., Beckman, B. and Read, A. (2008) Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24(4), 199–224.

Lowry, P.B., Zhang, D., Zhou, L. and Fu, X. (2010) Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups. Information Systems Journal, forthcoming.

Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

Marshall, B.A., Cardon, P.W., Norris DT, Goreva N and D’souza R (2008) Social networking websites in India and the United States: a cross- national comparison of online privacy and communication. Issues in Information Systems, 9(2), 87–94.

Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995) An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.

Miller, K.D., Fabian, F. and Lin, S.J. (2009) Strategies for online communities.Strategic Management Journal, 30(3), 305–322.

Moon, Y. (2000) Intimate exchanges: using computers to elicit self-disclosure from consumers. Journal of Consumer Research, 26(4), 323–339.

Moores, T.T. and Chang, J.C.J. (2006) Ethical decision making in software piracy: initial development and test of a four-component model. MISQuarterly, 30(1), 167–180.

Nunamaker Jr., J.F., Dennis A, Valacich J, Vogel D and George J (1991)Electronic meeting systems to support group work. Communications ofthe ACM, 34(7), 40–61.

Oyserman, D. (2006) High power, low power, and equality: culturebeyond individualism and collectivism. Journal of Consumer Psychology, 16(4), 352–356.

Pavlou, P., Liang, H. and Xue, Y. (2007) Understanding and mitigatinguncertainty in online exchange relationships: a principal-agentperspective. MIS Quarterly, 31(1), 105–136.

Pavlou, P.A. and Dimoka, A. (2006) The nature and role of feedback text comments in online marketplaces: implications for trust building, price premiums, and seller differentiation. Information Systems Research, 17(4), 392–414.

Pavlou, P.A. and Gefen, D. (2004) Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37–59.

Pavlou, P.A. and Gefen, D. (2005) Psychological contract violation in online marketplaces: antecedents, consequences, and moderating role.Information Systems Research, 16(4), 372–399.

Pearce, W.B. and Sharp, S.M. (1973) Self-disclosing communication. Journalof Communication, 23(4), 409–425.

Pennebaker, J.W. (1989) Confession, inhibition, and disease. In Advances inExperimental Social Psychology (Berkowitz L, Ed), Vol. 22, pp 211–244,Academic Press, New York.

Petronio S (2002) Boundaries of Privacy: Dialectics of Disclosure. StateUniversity of New York Press, Albany.
Pinsonneault A and Heppel N (1998) Anonymity in group supportsystems research: a new conceptualization, measure, and contingencyframework. Journal of Management Information Systems, 14(3), 89–108.

Podsakoff, P.M., Mackenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology,88(5), 879–903.

Porter, C.E. and Donthu, N. (2008) Cultivating trust and harvesting value invirtual communities. Management Science 54(1), 113–128.

Raykov, T. and Grayson, D. (2003) A test for change of composite reliability in scale development. Multivariate behavioral research 38(2), 143–159.

Robertshaw, G.S. and Marr, N.E. (2006) An empirical measure of the availability, completeness and reliability of voluntarily disclosed personal information for direct marketing purposes. Journal of FinancialServices Marketing 11(1), 85–94.

Shin, S.K., Ishman, M. and Sanders, G.L. (2007) An empirical investigation of socio-cultural factors of information sharing in China. Information & Management 44(2), 165–174.

Son, J.Y., Narasimhan, S. and Riggins, F.J. (2005) Effects of relational factors and channel climate on EDI usage in the customer-supplier relation- ship. Journal of Management Information Systems 22(1), 321–353.

Staples, D.S. and Webster, J. (2008) Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams. Information Systems Journal 18(6), 617–640.

Straub, D.W. (1989) Validating instruments in MIS research. MIS Quarterly 13(2), 147–169.

Straub, D.W., Boudreau, M.C. and Gefen, D. (2004) Validation guidelines for IS positivist research. Communications of the AIS 14(2004), 380–426.

Taylor, D. and Altman, I. (1975) Self-disclosure as a function of reward-cost outcomes. Sociometry 38(1), 18–31.

Thibaut, J.W. and Kelley, H.H. (1959) The Social Psychology of Groups. John Wiley, New York.

Triandis, H.C. (2001) Individualism-collectivism and personality. Journal of Personality 69(6), 907–924.

Triandis, H.C. and Gelfand, M.J (1998) Converging measurement of horizontal and vertical individualism and collectivism. Journal of Personality and Social Psychology 74(1), 118–128.

Triandis, H.C. and Suh, E.M. (2002) Cultural influences on personality. Annual Review of Psychology 53(February), 133–160.

Vanlear, C.A. (1987) The formation of social relationships: a longitudinal study of social penetration. Human Communication Research 13(3), 299–322.

Vanlear, C.A. (1991) Testing a cyclical model of communicative openness in relationship development: two longitudinal studies. Communication Monographs 58(4), 337–361.

Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003) User acceptance of information technology: toward a unified view. MIS Quarterly 27(3), 425–478.

Walther, J.B. and Burgoon, J.K. (1996) Relational communication in computer-mediated interaction. Human Communication Research 19(1), 50–88.

Wasko, M.M. and Faraj, S. (2005) Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly 29(1), 35–57.

Wheeless, L.R. (1978) A follow-up study of the relationships among trust, disclosure, and interpersonal solidarity. Human Communication Research 4(2), 143–157.

Wheeless, L.R. and Grotz, J. (1976) Conceptualization and measurement of reported self-disclosure. Human Communication Research 2(4), 338–346.

Wolfe, C.J. and Murthy, U.S. (2006) Negotiation support systems in budget negotiations: an experimental analysis. Journal of Management Information Systems 22(3), 351–381.

Zhang, D. and Lowry, P.B. (2008) Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems. Journal of Global Information Management 16(1), 61–92.

Zhang, D., Lowry, P.B., Zhou, L. and Fu, X. (2008) The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence. Journal of Management Information Systems 23(4), 53–80.

Market research and the ethics of big data

Référence :
Nunan, D., & Di Domenico, M-L. (2013). Market research and the ethics of big data. International Journal of Market Research, 55, 2-13

Idée / dominante :

La collecte de « big data » sur internet, bien plus qu’un phénomène technique, est devenue quasi- automatique et dépasse souvent les individus ainsi que les groupes à l’origine de cette collecte. Une grande partie de ces données n’est pas exploitée et se posent alors certaines questions éthiques comme celle du stockage de telles quantités d’information, celle de leur propriété, ou encore celle de leur espérance de vie. Les auteurs insistent sur l’importance de l’engagement d’un débat sur ces points.

page1image9472

Résumé :

Le concept de « big data » se définit comme conséquence de trois faits :

1) Une conséquence de l’intersection des différentes innovations technologiques des dernières années, permettant un plus grand stockage, ainsi qu’une plus grande vitesse d’échange et une plus grande variété d’informations échangées (selon IBM, en 2011, 90% de toute la data du monde a été produite au cours des deux années précédentes).

2) La valeur commerciale attribuée à ces données d’un nouveau type (issue par exemple d’application de géolocalisation pour smartphones), permettant aux organisations de générer automatiquement des insights (ce qui prenant beaucoup plus de temps auparavant), type d’information important pour la compréhension du comportement du consommateur.

3) Quatre challenges liés à la confidentialité :
Le glissement des politiques de confidentialité vers des domaines

  • Le glissement des politiques de confidentialité vers des domaines non-concernés jusque là,
  • La sécurité ne concerne pas plusieurs « morceaux » de données mais un système entier formant l’identité d’une personne,
  • L’implication de l’homme dans la collecte et l’analyse de données est minime étant donné que celles-ci sont automatiques et ne nécessite pas son consentement,
  • La capacité des organisations à collecter et stocker les données et bien au-delà de leur capacité à les exploiter.

L’utilisation de la « big data » en marketing pose également plusieurs problème. Tout d’abord, les interactions entre individus sur les réseaux sociaux (la graphe sociale) ne sont pas les mêmes que les liens unissant ces mêmes personnes dans le monde réel (ils ne sont pas tous « friends »). Se pose également le problème de la propriété à long terme des données actuellement détenues par des entreprises comme Facebook, Twitter, Linkedin ou Google. Si certaines entreprises ne vendent pas les datas de leurs clients, elles ne sont pas à l’abri d’être vendues elle-même, ce qui se impactera alors la propriété des données. Ces données ont également une dimension temporaire, et les principaux réseaux sociaux rendent visible des informations datant de plusieurs années, posant ainsi la question de la viabilité à long terme de telles informations qui peuvent aussi causer du tort à la personne concernée. La collecte d’informations est dorénavant automatique et passive, et même si une permission pour l’utilisation des données est initialement demandée, ce n’est pas le cas de façon systématique. Paradoxalement, bien que les internautes tendent à protéger leurs informations personnelles, ceux-ci ne sont pas prêts à abandonner les outils qui régissent leur vie sociale quotidiennement, et ne veulent ainsi pas s’exclure de leurs communautés online. Les auteurs mettent en valeur la traditionnelle proactivité des chercheurs en marketing dans l‘établissement de standards éthiques, et ce doit être le cas pour le débat présenté. Les pistes de réflexions présentées sont : « le droit d’être oublié », « le droit d’expiration des données » et « la propriété de la graphe sociale ».

Notes d’intérêt pour la recherche en cours :

Définition de la « big data », limite d l’homme dans la collecte et l’analyse automatisée des données, enjeu de l’établissement d’un éthique dans la collecte de données sur internet.

Ce qui n’a pas été abordé :
Quelles précautions prennent quotidiennement les internautes pour sécuriser leurs informations? Qu’est-ce qui leur fait le plus peur dans la collecte de « big data » ? L’établissement d’une charte éthique dans la collecte et l’analyse des données rassurerait-elle les internautes ? Dès lors, serait-ils prêts à livrer encore plus d’informations ? 

Références :

Acquisti, A., Gross, R. & Stutzman, F. (2011) Faces of Facebook: privacy in the age of augmented reality. Presented atBlackHat Conference, Las Vegas, 4 August.

Arthur, C. (2012) Cookies law changed at 11th hour to introduce ‘implied consent’. Guardian, 26 May.

Bednall, D., Adam, S. & Plocinski, K. (2010) Using compliance techniques to boost telephone response rates. International Journal of Market Research, 52, 2, 155–168.

Boyd, D. (2010) Privacy and publicity in the context of big data. Presented at WWW conference, Raleigh, North Carolina,29 April.

Bush, V., Venable, B. & Bush, A. (2000) Ethics and marketing on the internet: practitioners’ perceptions of societal, industryand company concerns. Journal of Business Ethics, 23, 237–248.

Christiansen, L. (2011) Personal privacy and internet marketing: an impossible conflict or a marriage made in heaven? Business Horizons, November–December, 509–514.

Cooke, M. & Buckley, N. (2008) Web 2.0, social networks and the future of market research. International Journal of Market Research, 50(2), 267–292.

Curtin, R., Presser, S. & Singer, E. (2005) Changes in telephone survey nonresponse over the past quarter century. Public Opinion Quarterly, 69, 87–98.

Economist, The (2012) Crunching the numbers: big data. The Economist, 19 May.

Falkenrath, R. (2012) Google must remember our right to be forgotten. Financial Times, 15 February.

Gantz, J,. Reinsel, D., Chute, C., Schlichting, W., McArthur, J., Minton, S., Xheneti, I., Toncheva, A. & Manfrediz, A. (2007) The expanding digital universe. IDC white paper, sponsored by EMC, March.

Garson, B. (1988) The Electronic Sweatshop: How Computers are Transforming the Office of the Future into the Factory of the Past.New York: Simon & Schuster.

Hair, N. & Clarke, M. (2007) Ethical dilemmas and challenges of ethnographic research in electronic communities. International Journal of Market Research, 49, 6.

Jacobs, A. (2009) Pathologies of big data. ACM Queue, 7, 6, July.

Jarvis, S. (2002) CMOR finds survey refusal rate still rising. Marketing News, 4 February, 4.

Kelly, K. (2011) Everything. Web 2.0 Expo and Conference, 29 March.

Kuechler, W. (2007) Business applications of unstructured text. Communications of the ACM, 50, 10, October.

Leigh, D. (2010) How 250,000 US embassy cables were leaked. Guardian, 28 November.

Lewis, I. (2012) The future of market research. International Journal of Market Research, 54, 1, pp. 11–13.

Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R. & Hung Byers, A. (2011) Big data: the next frontier for innovation, competition and productivity. McKinsey Global Institute Report.

Nissenbaum, H. (2004) Privacy as contextual integrity. Washington Law Review, 79, 1.

Ohm, P. (2009) Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.

Saafi, M. (2010) Wireless and embedded nanotechnology-based systems for structural integrity monitoring of civil structures: a feasibility study. International Journal of Materials and Structural Integrity, 4, 1.

Taylor, P. (2012) Crunch time for big data. Financial Times, 19 June.

Traung, P. (2010) EU law on spyware, web bugs, cookies, etc., revisited: Article 5 of the Directive on Privacy and Electronic Communications. Business Law Review, 31, 10, 216–218.

Tybout, A. & Zaltman, G. (1974) Ethics in marketing research: their practical relevance. Journal of Marketing Research, 11, 4, 357–358.

Warren, S. & Brandeis, L. (1890) The right to privacy. Harvard Law Review, IV, 5.

Woods, D. (2011) Curing the big data storage fetish. Forbes, 12 July.

Yulinsky, C. (2012) Decisions, decisions … will ‘big data’ have ‘big’ impact? Financial Times, 24 January.

Zuboff, S. (1988) In the Age of the Smart Machine: The Future of Work and Power. New York: Basic Books.

Beyond concern – a privacy- trust-behavioral intention model of electronic commerce

Référence :
Liu, C., Marchewka, J.T., Lu, J., Yu, C.S. (2005). Beyond concern – a privacy- trust-behavioral intention model of electronic commerce. Information & Management, 42, 289-304

page1image2768

Idée / dominante :

En matière de e-commerce, la perception par le consommateur de la politique de protection des données («privacy») et son reflet, en termes de «design» sur le site internet, impactent positivement la confiance de l’individu en le site concerné. Ce niveau de confiance impacte également positivement les intentions de comportement (« behavioral intentions ») du consommateur.

page1image8600

Résumé :

Les avantages du e-commerce ne sont plus à démontrer, que ce soit du côté des entreprises ou des clients. Pour actionner un nouveau levier de croissance, les entreprises se doivent de mieux comprendre leurs clients et ainsi construire une relation solide avec eux. Aujourd’hui, il existe beaucoup de techniques permettant de recueillir des données clients (cookies, tracking, formulaires d’inscription…). Le but étant d’adapter l’offre aux besoins des consommateurs. Cela soulève un paradoxe, car, bien qu’ils jouissent de ces offres adaptées, les consommateurs se montrent de plus en plus inquiets quant à la protection de leurs données personnelles. En effet, une étude de Hoffman et Novak (1999) montré que 95% des personnes qu’ils avaient sondés ont refusé de fournir des informations personnelles les concernant sur des sites internet. Cela engendre une baisse de la confiance accordée au vendeur. Certaines études ont aussi montré que les transactions B2B étaient moins efficaces si la confiance envers le partenaire était faible. Ces inquiétudes liées à la « privacy » sont de plus en plus prégnantes, particulièrement depuis que les SI ont permis la collecte, le stockage, l’usage et le partage des informations clients. Les inquiétudes liées au e-commerce s’appliquent aussi bien au B2C (le plus épineux car la relation avec le consommateur est directe), qu’au B2B (avec la question de la transmission d’information à un tiers) et qu’aux transactions intra-organisationnelles.

Selon Hoffman et Novak (1999), le manque de confiance en la transaction en ligne est la première raison pour laquelle un consommateur ne veut pas y dévoiler ses informations. Une bonne relation client suggère que l’entreprise décrive explicitement sa politique et ses pratiques en termes de protection des données. En échange, le consommateur doit être prêt à dévoiler ses données personnelles pour renforcer cette relation.

Pour valider leur modèle de recherche, les auteurs ont recueilli 212 réponses à un questionnaire soumis à deux groupes d’internautes (de 106 personnes chacun). Les sujets du premier groupe étaient confrontés à l’expérimentation d’un site de e-commerce présentant un bas niveau de « privacy », tandis que les participants du second groupe ont utilisé un site à haut niveau de « privacy » pour faire leur achat (9 caractéristiques, dont charte de confidentialité, label, page de vérification, etc.). Les mesures étaient effectuées grâce à une échelle de Likert 7 points

Les chercheurs ont ainsi pu valider leur modèle – en concédant certaines limites (type et taille de l’échantillon, nationalité…) – selon lequel l’observation de chacune des 4 pratiques informationnelles énumérées par la Commission Fédérale du Commerce Américaine* (US FTC) impacte positivement le degré de confiance accordé au site de e-commerce concerné. Ce degré de confiance a, à son tour, un impact positif sur chacune des intentions comportementales des consommateurs recensées. Parmi ces intentions, on compte celle d’un nouvel achat sur le site, celle d’une nouvelle visite, la recommandation à un proche, et les commentaires positifs.

Modèle : PRIVACY ==(+)==> TRUST ==(+)==> BEHAVIORAL INTENTIONS
* notice (information, en amont, de la collecte de données), access (donner le contrôle aux individus sur le type d’information qu’ils doivent fournir), choice (donner le choix d’autoriser ou non l’entreprise à partager l’information recueillie) & security (garantie de la sûreté de l’information recueillie).

page1image35360 page1image35520 page1image35680

Notes d’intérêt pour la recherche en cours :

Moyens d’améliorer la confiance du consommateur, qui impacte son intention de comportement.

Ce qui n’a pas été abordé :

L’article est basé sur les sites de e-commerce. Cela peut être étendu dans le domaine des réseaux sociaux. Ce modèle est-il applicable? D’autre part, les intentions de comportement se traduisent-elles en faits réels ? La recherche est basée sur un échantillon d’étudiants. Il conviendrait d’élargir ce schéma en ce demandant si les variables démographiques affectent ce modèle.

page1image43080

Références :

Applegate, L.M., Holsapple, C.W., Kalakota, R., Radermacher, F.J. and Whinston, A.B. (1996). Electronic commerce: building blocks of new business opportunity, Journal of Organizational Computing and Electronic Commerce, 6 (1), 1–10.

Albarracin, D., Johnson, B.T., Fishbein, M. and Muellerleile, P.A. (2001). Theories of reasoned action and planned behavior as models of condom use: a meta-analysis, Psychological Bulletin, 127 (1), 142–161.

Benassi, P. (1999). TRUSTe: an online privacy seal program, Communications of the ACM, 42 (2), 56–57.

Choate, T. (2000). 5 Keys to customer conversion, Catalog Age, s14–s15.

Churchill Jr., G.A. (1979). A paradigm for developing better measures of marketing constructs, Journal of Marketing Research, 16 (2), 64–73.

Clark, R.A. (1988). Information technology and dataveillance, Communications of the ACM, 31 (5), 498–512.

Culnan, M.J. (1993). How did you get my name? An exploratory investigation of consumer attitudes toward secondary information use, MIS Quarterly, 17 (3), 341–363.

Culnan, M.J. and Armstrong, P.K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation, Organization Science, 10 (1), 104–

Applegate, L.M., Holsapple, C.W., Kalakota, R., Radermacher, F.J. and Whinston, A.B. (1996). Electronic commerce: building blocks of new business opportunity, Journal of Organizational Computing and Electronic Commerce, 6 (1), 1–10.

Albarracin, D., Johnson, B.T., Fishbein, M. and Muellerleile, P.A. (2001). Theories of reasoned action and planned behavior as models of condom use: a meta-analysis, Psychological Bulletin, 127 (1), 142–161.

P. Benassi, TRUSTe: an online privacy seal program, Communications of the ACM 42 (2), 1999, pp. 56–57.
J.

Choate, T. (2000). 5 Keys to customer conversion, Catalog Age, s14–s15.

DeSanctis, G. (1989). Small group research in information systems: theory and method, I. Benbasat (Ed.), From The Information Systems Research Challenge: Experimental Research Methods, Harvard Business School Research Colloquium, 53–78.

Dickson, G.W. (1989). A programmatic approach to information systems research: an experimentalist’s view, I. Benbasat (Ed.), In the Information Systems Research Challenge: Experimental Research Methods, vol. 2, Harvard Business School Research Colloquium.

Doney, P.M. and Cannon, J.P. (1997). An examination of the nature of trust in buyer-seller relationships, Journal of Marketing, 61 (2), 31–35.

Dwyer, F.R. Schurr, P.H. and Oh, S. (1987). Developing buyer-seller relationships, Journal of Marketing, 51 (2), 11– 27.

Fukuyama, F. (1996). Trust still counts in a virtual world, Forbes ASAP Supplement, No. 01337051, 33, 69.

Garbarino, E. and Johnson, M.S. (1999). The different roles of satisfaction, trust, and commitment in customer relationships, Journal of Marketing, 63 (2), 70–87.

Gefen, D. (2000). E-commerce: the role of familiarity and trust, Omega, 28 (6), 725–737.

Gefen, D. Karahanna, E. Straub, D.W. (2003). Trust and TAM in online shopping: an integrated model, MIS Quarterly, 27 (1), 51–90.

Goodman, S. (2000d). Protecting privacy in a b2b world, Mortgage Banking, 83–87.

Lee, H.G. (1998). Do electronic marketplaces lower the price of goods? Communications of the ACM, 41 (1), 73–80.

Lewis, J.D. and Weigert, A. (1985). Trust as a social reality, Social Forces,63 (4), 967–985.

Liu, C. and Arnett, K.P. (2002). Raising a red flag on global WWWprivacy policies, Journal of Computer Information SystemsXXXXIII, (1), 117–127.

Madden, G. Coble-Neal, G. (2002). Internet economic and policy: anAustralian perspective, Economic Record, 78 (242), 343–357.

Madden, T.J., Ellen, P.S. and Ajzen, I. (1992). A comparison of the theoryof planned behavior and the theory of reasoned action, Personality and Social Psychology Bulletin, 18 (1), 3-9.

Martin, D.M., Smith, R.M., Brittain, M., Fetch, I. and Wu, H. (2001). The privacy practices of web browser extensions, Communications of the ACM, 44 (2), 45–50.

Mason, R.O. (1986). Four ethical issues of the information age, MIS Quarterly, 10 (1), 4–12.

Mayer, R.C. Davis, J.H. and Schoorman, F.D. (1995). An integrative model of organizational trust, Academy of Management Review, 20 (3), 709–734.

Mehta, A. (1994c). How advertising response modeling (ARM) can increase AD effectiveness ?, Journal of Advertising Research, 62–74.

Milberg, S.J., Burke, S.J., Smith, H.J. and Kallman, E.A. (1995). Values, personal information privacy, and regulatory approaches, Communications of the ACM, 38 (12), 65–84.

Milne, G.R. Boze, M. (1999). Trust and concern in consumers’ perceptions of marketing information management practices, Journal of Interactive Marketing, 13 (1), 5–24.

Mullaney, T.J., Green, H., Arndt, M. and Hof, R.D. (2003). The E-biz surprise, BusinessWeek, 60–68.

Nagai, E.W.T. and Wat, F.K.T. (2002). A literature review and classification of electronic commerce research, Information & Management, 39 (5), 415–429.

Preston, R. (2001b). It’s up to e-business to ‘get over’ privacy issue, Internetweek, 9.

Punch, L. (1997). The real internet security issue, Credit Card Management, 10 (9), 65–67.

Ricer, W.H.  (1971). The nature of trust, in: J.T. Tedeschi (Ed.), Perspectives on Social Power, Aldine Publishing Company, 63–81.

Sarker, S. Valacich, J.S. Sarker, S. (2003). Virtual team trust: instrument development and validation in an IS educational environment, Information Resources Management Journal, 16 (2), 35–55.

Scalet, S.D. (2001). Checking out your shopping cart, CIO, 14 (18), 30–32.

Shapiro, S.P. (1987). The social control of impersonal trust, American Journal of Sociology, 93, 623–658.

Smith, H.J., Milberg, S.J. and Burk, S.J. (1996). Information privacy: measuring individuals’ concerns about organizational practices, MIS Quarterly, 20 (2), 167–196.

Speier, C. Harvey, M. and Palmer, J. (1988). Virtual management of global marketing relationships, Journal of World Business, 33 (3), 263–276.

Viega, J., Kohno, T. and Potter, B. Trust (and mistrust) in secure applications, Communications of the ACM, 44 (2), 31–36.

S.D. Warren, L.D. Brandeis, The right to privacy, Harvard Law Review, 4 (5), 193–220.

Webster, J.  (1998). Desktop videoconferencing: exeperiences of complete users, wary users, and non-users, MIS Quarterly, 22 (3), 257–286.

Whiting, R. (2000). Double click gets double trouble with database plan, InformationWeek, 776, 24.

Zeithaml, V.A., Berry, L.B. and Parasuraman, A. The behavioral consequences of service quality, Journal of Marketing, 60 (4), 31–46.

The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns

Référence :
Li, Y. (2014). The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns. Decision Support Systems, 57, 343-354

Idée / dominante :

Dans le e-commerce, la « disposition to privacy », ou aspiration générale d’un individu à la protection de ses données personnelles (fonction d’éventuelles expériences préalables), la réputation perçue du site internet et la familiarité personnelle avec ledit site ont une influence sur la naissance d’inquiétudes et de craintes, ressenties par les consommateurs, liées à la confidentialité.

page1image8552

Résumé :

L’article se concentre sur le e-commerce, aux yeux du consommateur, alors que ce domaine est souvent étudié du point de vue organisationnel. Il s’agit plus précisément d’étudier l’influence de la « disposition to privacy » (ou degré d’importance donné à la confidentialité des informations), de la familiarité personnelle avec un site internet, et de la perception de la réputation de ce site sur les différentes inquiétudes liées à la protection des données pouvant naître lors d’une expérience sur un site de e- commerce. L’auteur rappelle ici qu’il s’agit d’un type précis d’inquiétudes liées à l’utilisation d’internet, et défend l’idée selon laquelle il y a inquiétude lorsque le seuil d’exigence du consommateur n’est pas atteint. Autrement dit, son expérience ne parvient pas à la hauteur de ses attentes. Plusieurs facteurs peuvent influencer cette inquiétude : la réputation du site, la politique de confidentialité, les assurances de confidentialité (notamment les labels délivrées par une instance tierce => importance minime, cf autres travaux), la sensibilité de l’information délivrée et sa pertinence, la confiance et le degré de présence sociale, la perception du contrôle personnel sur sa « privacy », ainsi que l’importance que l’individu y attache (i.e. « disposition to privacy »).

Pour répondre à son modèle de recherche, l’auteur a créé un questionnaire dont les 28 items étaient répartis de la façon suivante : degré d’importance de la « privacy », réputation du site, familiarité avec le site, inquiétudes propres au site, bénéfice perçu, expérience préalable avec les problématiques de confidentialité, comportement envisagé. Ce questionnaire, soumis à un échantillon représentatif de la société américaine, a reçu 110 réponses exploitables (taux de participation de 32,9%).

Hypothèses de recherche validées par l’étude empirique :

  • le degré d’importance donnée à la « privacy » (« disposition to privacy ») a une influence positive sur les inquiétudes des consommateurs (plus le consommateur attache de l’importance à la protection de ses données, plus celui-ci sera inquiet),
  • la perception de la réputation du site internet (de e-commerce) a une influence négative sur les inquiétudes,
  • la familiarité du consommateur avec le site internet considéré a une influence négative sur les inquiétudes,
  • la confrontation préalable de l’individu à une situation présentant des risques pour la protection de ses données impacte positivement le degré d’importance donné à la « privacy »,
  • plus le consommateur est inquiet, moins il est enclin à utiliser le site internet considéré (impactnégatif).L’étude relate également que l’introduction de variables démographiques et sociales (âge, sexe, éducation) ont un impact non-significatif sur le degré d’importance donné à la protection des données.

page1image31840 page1image32000

Notes d’intérêt pour la recherche en cours :

Revue de la littérature sur les attributs de la « disposition to privacy », synthèse de travaux de Westin (1967), Altman (1975, 1976) et Laufer & Wolfe (1977), approfondissement des travaux de Xu et al. (2011) en incluant des facteurs contextuels.

Ce qui n’a pas été abordé :

Article centré sur le e-commerce. Dans quelle mesure, peut-on étendre ces enseignements à l’utilisation des réseaux sociaux ? L’utilisation de variables démographiques et sociales pour comprendre comment le consommateur appréhende un site internet (en termes de fiabilité/réputation/familiarité) n’est pas relatée ici.

page1image40016

Références :

Ajzen, I. (2001). Nature and operation of attitudes, Annual Review of Psychology, 52 (1), 27–58.

Altman, I. (1976). Privacy: a conceptual analysis, Environment and Behavior, 8 (1), 7–29.

Andrade, E.B., Kaltcheva, V. and Weitz, B. Self-disclosure on the web: the impact of privacy policy, reward, and company reputation, Advances in Consumer Research, 29 (1), 350–353.

Angst, C.M., Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion, MIS Quarterly, 33 (2), 339–370.

Awad, N.F. and Krishnan, M.S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly, 30 (1), 13–28.

Bansal, G., Zahedi, F.M. and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online, Decision Support Systems, 49 (2), 138–150.

Belanger, F. and Crossler, R.E. (2011). Privacy in the digital age: a review of information privacy research in information systems, MIS Quarterly, 35 (4), 1017–1041.

Bellman, S., Johnson, E., Kobrin, S. and Lohse, G. (2004). International differences in information privacy concerns: a global survey of consumers, Information Society, 20 (5), 313–324.

Casaló, L., Flavián, C. and Guinalíu, M. (2008). The role of perceived usability, reputation, satisfaction and consumer familiarity on the website loyalty formation process,Computers in Human Behavior, 24 (2), 325–345.

Casalo, L.V., Flavian, C., Miguel, G. (2007). The role of security, privacy, usability and reputation in the development of online banking, Online Information Review, 31 (5), 583–603.

Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H.R. and Upadhyaya, S.J. (2009). Internet and online information privacy: an exploratory study of preteens and early teens, IEEE Transactions on Professional Communication, 52 (2), 167–182.

Chin, W.W. (1998). Issues and opinion on structural equation modeling, MIS Quarterly, 22 (1), 7–16.

Culnan, M.J., Armstrong, P.K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation, Organization Science, 10 (1), 104–115.

Eastlick, M.A., Lotz, S.L., Warrington, P. (2006). Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment, Journal of Business Research, 59 (8), 877–886.

Facteau, J.D., Dobbins, G.H., Russell, J.E.A., Ladd, R.T. and Kudisch, J.D. (1995). The influence of general perceptions of the training environment on pretraining motivation and perceived training transfer, Journal of Management, 21 (1), 1–25.

Fornell, C., Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error, Journal of Marketing Research, 18, 39–50.

Gefen, D. (2000). E-commerce: the role of familiarity and trust, Omega, 28, 725–737.

Gefen, D., Karahanna, E. and Straub, D. (2003). Trust and TAM in online shopping: an integrated 
model, MIS Quarterly, 27 (1), 51–90.

Gefen, D. and Straub, D. The relative importance of perceived ease of use in IS adoption: 
a study of e-commerce adoption, Journal of the Association for Information Systems, 
1 (8), 1–28.

Gefen, D. and Straub, D.W. (2004). Consumer trust in B2C e-Commerce and the importance of 
social presence: experiments in e-Products and e-Services, Omega 32, (6), 407–424.

Haans, A., Kaiser, F.G. an de Kort, Y.A.W. (2007). Privacy needs in office environments: develop- 
ment of two behavior-based scales, European Psychologist, 12 (2), 93–102.

Hann, I., Hui, K. and Lee, S.T. (2007). I.P.L. Png, Overcoming online information privacy concerns: an information-processing theory approach, Journal of Management Information Systems, 24 (2), 13–42.

Hoadley, C.M., Xu, H., Lee, J.J. and Rosson, M.B. (2010). Privacy as information access and illusory 
control: the case of the Facebook News Feed privacy outcry, Electronic Commerce Research and Applications, 9 (1), 50–60.

Hoffman, D.L., Novak, T.P. and Peralta, M.A. (1999). Information privacy in the marketspace: 
implications for the commercial uses of anonymity on the Web, Information Society,
15 (2), 129–139.

Jin, B., Park, J.Y. and Kim, J. (2010). Joint influence of online store attributes and offline operations 
on performance of multichannel retailers, Behaviour & Information Technology, 29 
(1), 85–96.

Jøsang, A., Ismail, R. and Boyd, C. (2007). A survey of trust and reputation systems for online 
service provision, Decision Support Systems, 43 (2), 618–644.

Kim, D.J., Ferrin, D.L. and Rao, H.R. (2008). A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents, 
Decision Support Systems, 44 (2), 544–564.

Kim, D.J., Steinfield, C. and Lai, Y.J. (2008). Revisiting the role of web assurance seals in 
business-to-consumer electronic commerce, Decision Support Systems, 44 (4),1000–1015.

Laufer, R.S. and Wolfe, M. (1977). Privacy as a concept and a social issue: a multidimensional 
development theory, Journal of Social Issues, 33 (3), 23–42.

Lee, C.H. and Cranage, D.A. (2011). Personalisation-privacy paradox: the effects of personalisation and privacy assurance on customer responses to travel Web sites, Tourism Management, 32 (5), 987–994.

Lee, D.J., Ahn, J.H. and Bang, Y. (2011). Managing consumer privacy concerns in personalization: a 
strategic analysis of privacy protection, MIS Quarterly, 35 (2), 423–444.

Lee, Y. and Kwon, O. (2011). Intimacy, familiarity and continuance intention: an extended expectation–confirmation model in web-based services, Electronic Commerce Research and Applications, 10 (3), 342–357.

Li, H., Sarathy, R. and Xu, H. (2010). Understanding situational online information disclosure as a 
privacy calculus, Journal of Computer Information Systems, 62–71.

Li, Y. (2011). Empirical studies on online information privacy concerns: literature review and an integrative framework, Communications of the Association for Information Systems, 28 (28), 453–496.

Li, Y. (2012). Theories in online information privacy research: a critical review and an 
integrated framework, Decision Support Systems, 54 (1), 471–481.

Liao, C., Liu, C.-C. and Chen, K. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: an integrated model, Electronic Commerce Research and Applications, 10 (6), 702–715.

Lwin, M., Wirtz, J. and Williams, J.D. (2007). Consumer online privacy concerns and responses: a 
power-responsibility equilibrium perspective, Journal of the Academy of Marketing Science, 35 (4), 572–585.

Malhotra, N.K., Kim, S.S. and Agarwal, J. (2004). Internet Users’ Information Privacy Concerns 
(IUIPC): the construct, the scale, and a causal model, Information Systems Research, 15 (4), 336–355.

Margulis, S.T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy, Journal of Social Issues, 59 (2), 411–429.

Margulis, S.T. (2003). Privacy as a social issue and behavioral concept, Journal of Social Issues, 59 (2), 243–261.

Meinert, D.B., Peterson, D.K., Criswell, J.R., Crossland, M.D. (2006). Privacy policy statements and consumer willingness to provide personal information, Journal of Electronic Commerce in Organizations, 4 (1), 1–17.

Milberg, S.J., Smith, H.J., Burke, S.J. (2000). Information privacy: corporate management and national regulation, Organization Science, 11 (1), 35–57.

Milne, G.R., Culnan, M.J. and Greene, H. (2006). A longitudinal assessment of online privacy notice readability, Journal of Public Policy & Marketing, 25 (2), 238–249.

Miyazaki, A.D. (2008). Online privacy and the disclosure of cookie use: effects on consumer trust and anticipated patronage, Journal of Public Policy & Marketing, 27 (1), 19–33.

Papacharissi, Z. and Fernback, J. (2005). Online privacy and consumer protection: an analysis of portal privacy statements, Journal of Broadcasting & Electronic Media, 49 (3), 259–281.

Pavlou, P.A. (2011). State of the information privacy literature: where are we now and where should we go?, MIS Quarterly, 35 (4), 977–988.

Pavlou, P.A., Liang, H. and Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective, MIS Quarterly, 31 (1), 105–136.

Petronio, S.S. (1991) Communication boundary management: a theoretical model of managing disclosure of private information between marital couples, Communication Theory, 311–335.

Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology, 88 (5), 879–903.

Rensel, A.D., Abbas, J.M. and Rao, H.R. (2006). Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use, Journal of the Association for Information Systems, 7 (1), 19–51.

Rohm, A.J. and Milne, G.R. (2004). Just what the doctor ordered: the role of information sensitivity and trust in reducing medical information privacy concern, Journal of Business Research, 57 (9), 1000–1011.

Rust, R., Kannan, P. and Peng, N. (2002). The customer economics of internet privacy, Journal of the Academy of Marketing Science, 30 (4), 455–464.

Sai, Y. (2008). Transparent Safe, Decision Support Systems, 46 (1), 41–51.

Smith, H.J., Dinev, T. and Xu, H. Information privacy research: an interdisciplinary review,MIS Quarterly, 35 (4), 989–1015.

Son, J.Y., Kim, S.S. (2008). Internet users’ information privacy-protective responses: ataxonomy and a nomological model, MIS Quarterly, 32 (3), 503–529.

Stafford, T.F., Urbaczewski, A. (2004). Spyware: the ghost in the machine, Communicationsof the Association for Information Systems, 14 (15), 291–306.

Van Slyke, C., Shim, J.T., Johnson, R., Jiang, J. (2006). Concern for information privacy and online consumer purchasing, Journal of the Association for Information Systems, 7(6), 415–443.

Westin, A.F. (2003). Social and political dimensions of privacy, Journal of Social Issues, 59 (2), 431–453.

Wood, W. (2000). Attitude change: persuasion and social influence, Annual Review of Psychology, 51 (1), 539.

Xu, H., Crossler, R.E. and Bélanger, F. (2012). A value sensitive design investigation of privacy enhancing tools in web browsers, Decision Support Systems.

Xu, H., Dinev, T., Smith, H.J. and Hart, P. (2011). Information privacy concerns: linking individual perceptions with institutional privacy assurances, Journal of the Association for Information Systems, 12 (12), 798–824.

Yao, M.Z., Rice, R.E. and Wallis, K. (2007). Predicting user concerns about online privacy, Journal ofthe American Society for Information Science & Technology, 58 (5), 710–722.

Zimmer, J.C., Arsal, R., Al-Marzouq, M., Moore, D. and Grover, V. (2010). Knowing your customers: using a reciprocal relationship to enhance voluntary information disclosure,Decision Support Systems, 48 (2), 395–406.

Zviran, M. (2008). User’s perspectives on privacy in web-based applications, Journal ofComputer Information Systems, 48 (4), 97–105.

Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan

Référence :
Ku, Y.C., Chen, R., & Zhang, H. (2013). Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan. Information & Management, 50, 571-581

page1image3184

Idée / dominante :

L’intention des internautes de continuer à utiliser un réseau social est régie par 4 variables : la satisfaction (cf. Uses and Gratifications Theory), le degré d’utilisation et de viabilité perçu du réseau social, les normes subjectives (liées notamment à l’appartenance à un groupe), et les inquiétudes portant sur la confidentialité des données. Ce dernier élément, ainsi que la satisfaction, ont une influence différente à Taiwan et aux US.

page1image8432 page1image9440

Résumé :

Les études qui ont été faites jusque maintenant peuvent être classées en deux courants : le premier faisant état des motivations pour s’inscrire sur un réseau social, à l’image de Baek et al. (2011) qui en recensent 6 raisons (le partage d’information, l’aspect pratique, le divertissement, l’utilité sociale, le contrôle et la promotion professionnelle. Le second courant vise, quant à lui, à aborder les motivations pour y rester. E.g. Shi et al. (2010) : la satisfaction de conserver des contacts « offline », le divertissement et la recherche d’informations. De fait, aucun n’a été consacré à l’étude des motivations pour rester sur un réseau social en utilisant la « Uses and Gratifications Theory »* (Blumler 1979), et les influences interpersonnelles suggérées par l’usage des réseaux sociaux. Ainsi, la recherche vise à connaître les motivations pour continuer à utiliser les réseaux sociaux, en utilisant 4 paramètres : la satisfaction, les inquiétudes liées à la confidentialité, les normes subjectives et la perception du degré d’utilisation et de viabilité du réseau observé.

L’étude a été réalisée par le moyen d’un sondage soumis à un échantillon de 225 étudiants (103 aux USA et 122 à Taïwan), utilisateurs de Facebook à 91,6%. Ce sondage se présentait sous la forme d’items à évaluer via une échelle de Likert à 7 points (Pas du tout d’accord/Tout à fait d’accord).
Principaux enseignements tirés de la recherche :

  • La satisfaction des différents besoins (information, divertissement, mode, sociabilité) est appréhendée de façon différente parmi les deux groupes : les taïwanais en attendant beaucoup plus des réseaux sociaux, mais ils évaluent de façon similaire la façon dont les réseaux sociaux satisfont ces besoins. Le premier besoin est celui de la conservation des relations.
  • Les étudiants américains sont plus inquiets sur les questions liées à la confidentialité que le sont les taïwanais (cf. Hui et al., 2007), étant donné que cette problématique n’a pas beaucoup d’écho en Asie. Cette question a donc un impact négatif sur l’intention de rester sur les réseaux sociaux aux Etats-Unis, pays qui a initié les premiers actes de protection des données en 1966, 1974 et 1980.
  • Il n’y a pas de différence liée à la géographie dans l’impact de la perception du média et des normes subjectives sur l’intention de rester sur les réseaux sociaux. Ces deux paramètres sont d’une grande influence aux Etats-Unis, comme à Taïwan.
  • Les normes subjectives (liées à l’appartenance à un groupe) affectent directement, et positivement la satisfaction, tandis que la confidentialité affecte de façon indirecte la satisfaction en modérant positivement l’impact de celle-ci sur la volonté de continuer à utiliser le réseau social. Autrement dit, les problématiques de confidentialité augmentent l’impact de la satisfaction sur la volonté de rester sur le réseau social. L’impact négatif des problématiques de confidentialité pourrait être enrayé en instaurant plus de confiance entre les utilisateurs de réseaux sociaux. _______________________________________________________________________________________*Théorie sociologique expliquant la préférence des individus pour un média spécifique qui satisfera leurs besoins. Elle considère que la satisfaction d’un média résulte de la socialisation des évènements de la vie et de la réaction individuelle associée.
page1image36640 page1image37648

Notes d’intérêt pour la recherche en cours :

Etat de l’art sur les motivations pour s’inscrire sur un réseau social, définition de « Privacy concerns », utilisation de l’UGT, influence des problèmes de confidentialité sur l’utilisation des réseaux sociaux, différences de perceptions selon les régions.
Ce qui n’a pas été abordé :

Concentration sur des étudiants : les plus de 22 ans ne sont pas mentionnés, ni les plus jeunes. L’étude faisant état des différences de perceptions des problèmes de confidentialité entre les Etats-Unis et Taiwan, est-ce que le développement de différentes versions des réseaux sociaux selon les régions aurait un intérêt ? Qu’est-ce qui fait le plus peur : le site lui-même ou les autres utilisateurs ?

 

Références :

Arkes, H.R., and Blumer, C. (1985). The psychology of sunk cost, Organisational Behaviour and Human Decisions Processes. 35 (1), 124–140.

Awad, N.F. and Krishnan, M.S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly. 30 (1), 13–28.

Baek, K., Holton, A., Harp, D., Yaschur, C. (2011). The links that bind: uncovering novel 
motivations for linking on facebook, CHB, 27 (6), 2243–2248.

Baker, R.K. and White, K.M. (2010). Predicting adolescents’ use of social networking sites from an extended theory of planned behaviour perspective, CHB, 26 (6), 1591–1597.

Baron, R.M. and Kenny, D.A. (1986). The moderator–mediator variable distinction in social 
psychological research: conceptual, strategic, and statistical considerations, Journal of Personality and Social Psychology, 51 (6), 1173–1182.

Benbasat, I. and Barki, H. (2007). Quo vadis TAM? Journal of the Association for Information Systems, 8 (4), 211– 
218.

Blumler, J.G. (1979). The role of theory in uses and gratifications studies, Commununication Research, 6 
(1), 9–36.

Boyd, D.M. and Ellison, N.B. (2007). Social network sites: definition, history, and scholarship, Journal of Computer-Mediated Communication, 13 (1), 210–230.

Carte, T.A. and Russell, C.J. (2003). In pursuit of moderation: nine common errors and their 
solutions, MIS Quarterly, 27 (3), 479–501.

Cenfetelli, R.T., and Bassellier, G. (2009). Interpretation of formative measurement in information systems research, MIS Quarterly, 33 (4), 689–707.

Chau, P.Y.K. (2008). Cultural differences in diffusion, adoption, and infusion of web 2.0, Journal of 
Global Information Management, 16 (1), i–iii.

Chen, H.G., Chen, C.C., Lo, L., Yang, S.C. (2008). Online privacy control via anonymity and 
pseudonym: cross-cultural implications, Behavariol and Information Technology, 27 (3), 229–242.

Chen, R. (2013). Living a private life in public social networks: an exploration of member 
self-disclosure, Decision Support System.

Cheung, C.M.K. and Lee, M.K.O. (2010). A theoretical model of intentional social action in 
online social networks, Decision Support System, 49 (1), 24–30.

Chin, W.W. (1998). Issues and opinion on structural equation modeling, MIS Quarterly, 22(1), 7–16.

Chin, W.W., Marcolin, B.L., and Newsted, P.R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study, Information System Research, 14 (2), 189–217.

Davison, R.M., Clarke, R., Smith, H.J., Langford, D., Kuo, F.Y. (2003). Information privacy in a globally networked society: implications for IS research, Communication of the Association for Information Systems, 12, 341–365.

Debatin, B., Lovejoy, J.P., Horn, A.K. and Hughes, B.N. (2009). Facebook and online privacy: attitudes, behaviors, and unintended consequences, Journal of Computer-Mediated Communication, 15 (1), 83–108.

Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I. and Colautti, C. (2006). Privacy calculus model in e-commerce—a study of Italy and the United States, European Journal of Information Systems, 15 (4), 389–402.

Fogel, J. and Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concerns, Computers in Human Behavior, 25 (1), 153–160.

Gefen, D. and Straub, D.W. (1997). Gender differences in the perception and use of e-mail: an extension to the technology acceptance model, MIS Quarterly, 21 (4), 389–400.

Geisser, S. (2010). The predictive sample reuse method with applications, Journal of the American Satistical Assocation, 70 (350), 320–328.

Hoadley, C.M., Xu, H., Lee, J.J., and Rosson, M.B. (2010). Privacy as information access and illusory control: the case of the facebook news feed privacy outcry, Electronic Commerce Research and Applications, 9 (1), 50–60.

Hsu, C.L. and Wu, C.C. (2011). Understanding users’ continuance of facebook: an integrated model with the unified theory of acceptance and use of technology, expectation disconfirmation model, and flow theory, International Journal of Virtual Communication and Social Network, 3 (2), 1–16.

Hu, T., Poston, R.S. and Kettinger, W.J. (2011). Non-adopters of online social network services: is it easy to have fun yet? Communication of the Association for the Information System. 29, 441–458.

Jackson, L.A., and Wang, J.L. (2013). Cultural differences in social networking site use: a comparative study of China and the United States, Computers in Human Behaviour, 29 (3), 910–921.

Kim, B. (2011). Understanding antecedents of continuance intention in social-networkingservices, Cyberpsychogy, Behavior, and Social Networking, 14(4), 199–205.

Kim, Y., Sohn, D. and Choi, S.M. (2011). Cultural difference in motivations for using social network sites: a comparative study of American and Korean college students, Computers in Human Behavior,27 (1), 365–372.

Ku, Y.C., Chu, T.H. and Tseng, C.H. Gratifications for using CMC technologies: acomparison among SNS, IM, and e-mail, Computers in Human Behavior, 29 (1), 226–234.

Leung, L. (2001). College student motives for chatting on ICQ, New Media and Society, 3(4), 483–500.

Li, D., Browne, G.J. and Wetherbe, J. (2006). Why do internet users stick with a specific website? A relationship perspective, International Journal of Electronic Commerce, 10 (4), 105–141.

Li, D., Chau, P.Y.K. and Slyke, C.V. (2010). A comparative study of individual acceptance of instant messaging in the US and China: a structural equation modeling approach, Communication of the Association for Information System. 26, 85–106.

Liu, C., Marchewka, J.T., Lu, J. and Yu, C.S. (2005). Beyond concern—a privacy–trust–behavioral intention model of electronic commerce, Information Management. 42 (2), 289–304.

Lo, O.W.Y., Leung, L. (2009). Effects of gratification-opportunities and gratifications-obtained on preferences of instant messaging and e-mail among college students,Telematics and Informatics. 26 (2), 156–166.

Lou, H., Luo, W. and Strong, D. Perceived critical mass effect on group ware acceptance, European Journal of Information Systems, 9 (2), 91–103.

Luo, X., Gurung, A. and Shim, J.P. (2010). Understanding the determinants of user acceptance ofenterprise instant messaging: an empirical study, Journal of Organizational Computing and Electronic Commerce, 20 (2), 155–181.

Pavlou, P.A. (2011). State of the information privacy literature: where are we now andwhere should we go?, MIS Quarterly, 35 (4), 977–988.

Phang, C.W., Kankanhalli, A. and Sabherwal, R. (2009). Usability and sociability in online communities: a comparative study of knowledge seeking and contribution, Journal of theAssociation for Information Systems. 10 (10), 721–747.

Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003). Common method biases inbehavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology, 88 (5), 879–903.

Posey, C., Lowry, P.B., Roberts, T.L. and Ellis, T.S. Proposing the online community self-disclosure model: the case of working professionals in France and the UK who useonline communities, European Journal of Information Systems, 19 (2), 181–195.

Quan-Haase, A., Young, A.L. (2010). Uses and gratifications of social media: a compar- ison of facebook and instant messaging, Bulletin of Science, Society and Technology, 30 (5), 350–361.

Raacke, J. and Bonds-Raacke, J. (2008). Myspace and facebook: applying the uses and gratifications theory to exploring friend-networking sites, CyberPsycholy and Behavior, 11 (2), 169–174.

Rouibah, K., Abbas, H. and Rouibah, S. (2011). Factors affecting camera mobile phone adoption before e-shopping in the Arab world, Technology in Society, 33 (3–4), 271–283.

Rubin, A.M. (1983). Television uses and gratifications: the interactions of viewing patterns and motivations, Journal of Broadcasting and Electronic Media, 27 (1), 37–51.

Ruggiero, T.E. (2000). Uses and gratifications theory in the 21st century, Mass Communication and 
Society, 3 (1), 3–37.

Sledgianowski, D. and Kulviwat, S. (2009). Using social network sites: the effects of playful- ness, critical mass and trust in a hedonic context, Journal of Computer Information Systems, 49 (4), 74–83.

Smock, A.D., Ellison, N.B., Lampe, C. and Wohn, D.Y. (2011). Facebook as a toolkit: a uses and gratification approach to unbundling feature use, Computers in Human Behavior, 27 (6), 2322– 2329.

Stafford, T.F. Stafford, M.R. Schkade, L.L. (2004). Determining uses and gratifications for the Internet, Decision Sciences, 35 (2), 259–288.

Stewart, K.A. and Segars, A.H. (2002). An empirical examination of the concern for information privacy instrument, Information Systems Research, 13 (1), 36–49.

Stone, M. (1974). Cross-validatory choice and assessment of statistical predictions, Journals of the Royal Statistical Society, 36 (2), 111–147.

Tenenhaus, M., Vinzi, V.E. Chatelin, Y.M. and Lauro, C. (2005). PLS path modeling, Computational Statistics and Data Analysis. 48 (1), 159–205.

Trammell, K.D., Tarkowski, A., Hofmokl, J., and Sapp, A.M. Rzeczpospolita blogo ́ [republic of blog]: examining polish bloggers through content analysis, Journal of Computer-Mediated Communication, 11 (3), 702–722.

van de Schoot, R., Lugtig, P. and Hox, J. (2012). A checklist for testing measurement invariance, European Journal of Develomental Psychology, 9 (4), 486–492.

Van Slyke, C., Ilie, V., Lou, H. and Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology, European Journal of Information Systems, 16 (3), 270–283.

Vathanophas, V., Krittayaphongphun, N. and Klomsiri, C. (2008). Technology acceptance toward e-government initiative in royal Thai navy, Transforming Government : People, Process and Policy, 2 (4), 256–282.

Xu, C., Ryan, S., Prybutok, V. and Wen, C. (2012). It is not for fun: an examination of social network site usage, Information Management. 49 (5), 210–217.

Yang, H.L., Chiu, H.K. (2002). Privacy disclosures of web sites in Taiwan, Journal of Information Technology and Theory Application, 4 (3), 15–42.