Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Managing user perceptions of email privacy
Communications of the ACM
The ethical and legal quandary of email privacy
Communications of the ACM
Values, personal information privacy, and regulatory approaches
Communications of the ACM
Communications of the ACM
Privacy lost, anytime, anywhere
Communications of the ACM
Privacy, information technology, and health care
Communications of the ACM
Electronic Frontier: The privacy hoax
Communications of the ACM
Database nation: the death of privacy in the 21st century
Database nation: the death of privacy in the 21st century
Staying connected: surfing the turf
Communications of the ACM
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
The Unwanted Gaze: The Destruction of Privacy in America
The Unwanted Gaze: The Destruction of Privacy in America
Legislating Privacy: Technology, Social Values, and Public Policy
Legislating Privacy: Technology, Social Values, and Public Policy
Instant messaging in teen life
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Murky conceptual waters: The public and the private
Ethics and Information Technology
Consumer trust in an Internet store
Information Technology and Management
Computer monitoring: benefits and pitfalls facing management
Information and Management
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Communication and Trust in Global Virtual Teams
Organization Science
Information Privacy: Corporate Management and National Regulation
Organization Science
An Empirical Examination of the Concern for Information Privacy Instrument
Information Systems Research
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Predicting e-services adoption: a perceived risk facets perspective
International Journal of Human-Computer Studies - Special issue on HCI and MIS
The Mobile Connection: The Cell Phone's Impact on Society
The Mobile Connection: The Cell Phone's Impact on Society
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Building Effective Online Marketplaces with Institution-Based Trust
Information Systems Research
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
The Digital Person: Technology And Privacy In The Information Age
The Digital Person: Technology And Privacy In The Information Age
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
Information Systems Research
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
Information Technology and Management
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Online information disclosure: Motivators and measurements
ACM Transactions on Internet Technology (TOIT)
Information and Management
An Extended Privacy Calculus Model for E-Commerce Transactions
Information Systems Research
Conditioning Prices on Purchase History
Marketing Science
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Privacy-enhanced personalization
Communications of the ACM
International Journal of Electronic Commerce
Communications of the ACM
Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach
Journal of Management Information Systems
Journal of Management Information Systems
Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Engaging Privacy and Information Technology in a Digital Age
Engaging Privacy and Information Technology in a Digital Age
Managing and Using Information Systems
Managing and Using Information Systems
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
Journal of Management Information Systems
Adverse selection in online "trust" certifications and search results
Electronic Commerce Research and Applications
A field study of end user computing: findings and issues
MIS Quarterly
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Internet Privacy: Interpreting Key Issues
Information Resources Management Journal
Theories in online information privacy research: A critical review and an integrated framework
Decision Support Systems
Information technology and privacy: conceptual muddles or privacy vacuums?
Ethics and Information Technology
An online experiment of privacy authorization dialogues for social applications
Proceedings of the 2013 conference on Computer supported cooperative work
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
Measuring networked social privacy
Proceedings of the 2013 conference on Computer supported cooperative work companion
A model of consumers' perceptions of the invasion of information privacy
Information and Management
Getting Real About Virtual Worlds: A Review
International Journal of Virtual Communities and Social Networking
Using contextual integrity to examine interpersonal information boundary on social network sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The influence of user affect in online information disclosure
The Journal of Strategic Information Systems
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Privacy practices in collaborative environments: a study of emergency department staff
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
International Journal of Human-Computer Studies
Electronic Commerce Research and Applications
A multi-level model of individual information privacy beliefs
Electronic Commerce Research and Applications
Pricing and disseminating customer data with privacy awareness
Decision Support Systems
Hi-index | 0.00 |
To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we classify previous literature in two ways: (1) using an ethics-based nomenclature of normative, purely descriptive, and empirically descriptive, and (2) based on their level of analysis: individual, group, organizational, and societal. Based upon our analyses via these two classification approaches, we identify three major areas in which previous research contributions reside: the conceptualization of information privacy, the relationship between information privacy and other constructs, and the contextual nature of these relationships. As we consider these major areas, we draw three overarching conclusions. First, there are many theoretical developments in the body of normative and purely descriptive studies that have not been addressed in empirical research on privacy. Rigorous studies that either trace processes associated with, or test implied assertions from, these value-laden arguments could add great value. Second, some of the levels of analysis have received less attention in certain contexts than have others in the research to date. Future empirical studies-both positivist and interpretive--could profitably be targeted to these under-researched levels of analysis. Third, positivist empirical studies will add the greatest value if they focus on antecedents to privacy concerns and on actual outcomes. In that light, we recommend that researchers be alert to an overarching macro model that we term APCO (Antecedents → Privacy Concerns → Outcomes).