Multivariate data analysis with readings (2nd ed.)
Multivariate data analysis with readings (2nd ed.)
Information technology puts power in control systems
Harvard Business Review
Information technology and dataveillance
Communications of the ACM
Designing information systems to support customer feedback
ICIS '89 Proceedings of the tenth international conference on Information Systems
Privacy policies and practices: inside the organizational maze
Communications of the ACM
Privacy in America: Is Your Private Life in the Public Eye?
Privacy in America: Is Your Private Life in the Public Eye?
Managing customer knowledge in electronic commerce
Knowledge management and networked environments
Internet privacy concerns and beliefs about government surveillance - An empirical investigation
The Journal of Strategic Information Systems
Information and Organization
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure
Decision Support Systems
An examination of the concern for information privacy in the New Zealand regulatory context
Information and Management
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust
International Journal of Electronic Commerce
The effect of online privacy policy on consumer privacy concern and trust
Computers in Human Behavior
Profit-maximizing firm investments in customer information security
Decision Support Systems
Journal of Medical Systems
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Aligning principal and agent's incentives: A principal-agent perspective of social networking sites
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Strategic uses of information technology based on personal information may raise privacy concerns among consumers if these applications do not reflect a common set of values. This study addresses what differentiates consumers who object to certain uses of personal information from those who do not object. Data collected by questionnaire from young consumers are used to identify a research approach for investigating attitudes toward the secondary use of personal information for direct marketing. Secondary information use occurs when personal information collected for one purpose is subsequently used for a different purpose. While secondary information use is both widespread and legal, it may be viewed as an invasion of privacy when it occurs without the knowledge or consent of the consumer. The setting for the study is the use of point-of-sale data from a supermarket frequent shopper program to generate direct mail solicitations. Control emerges as a clear theme in differentiating individuals with positive overall attitudes toward secondary information use from those with negative attitudes. Study participants with positive attitudes are less concerned about privacy (measured as control over personal information), perceive shopping by mail as beneficial, and have coping strategies for dealing with unwanted mail. The results also suggest that theory related to categorization of strategic issues as positive-negative with outcomes that are controllable/uncontrollable provides a basis for understanding differences in the ways individuals perceive practices involving personal information. Future research should focus on the specific characteristics of secondary use practices, including the sensitivity of the information, its source, its perceived relevance to the original transaction, and whether disclosure reflects informed consent or results in a potentially harmful outcome to the individual