Privacy policies and practices: inside the organizational maze
Communications of the ACM
Values, personal information privacy, and regulatory approaches
Communications of the ACM
Qualitative research in information systems
MIS Quarterly
Communications of the ACM
The platform for privacy preferences
Communications of the ACM
Internet privacy concerns confirm the case for intervention
Communications of the ACM
Building consumer trust online
Communications of the ACM
Staying connected: surfing the turf
Communications of the ACM
Enterprise resource planning: cultural fits and misfits: is ERP a universal solution?
Communications of the ACM
Personal data privacy in the Asia Pacific: a real possibility
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Personal information privacy: implications for MIS managers
Information and Management
Investigating information systems with ethnographic research
Communications of the AIS
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Electronic work monitoring: an ethical model
CRPIT '00 Selected papers from the second Australian Institute conference on Computer ethics
Protecting Free Expression Online with Freenet
IEEE Internet Computing
A Workbench for Privacy Policies
COMPSAC '98 Proceedings of the 22nd International Computer Software and Applications Conference
Information Privacy: Corporate Management and National Regulation
Organization Science
An Empirical Examination of the Concern for Information Privacy Instrument
Information Systems Research
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Data Protection in the University Setting: Employee Perceptions of Student Privacy
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 8 - Volume 8
Addressing E-business privacy concerns: the roles of trust and value compatibility
Proceedings of the 2003 ACM symposium on Applied computing
Do privacy seals in e-commerce really work?
Communications of the ACM - Mobile computing opportunities and challenges
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
The internet and Japanese conception of privacy
Ethics and Information Technology
Behavioral models as service descriptions
Proceedings of the 2nd international conference on Service oriented computing
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
Information Systems Research
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research
Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
Information Technology and Management
What do they "indicate?": evaluating security and privacy indicators
interactions - A contradiction in terms?
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Online information disclosure: Motivators and measurements
ACM Transactions on Internet Technology (TOIT)
WebMedia '06 Proceedings of the 12th Brazilian Symposium on Multimedia and the web
An Extended Privacy Calculus Model for E-Commerce Transactions
Information Systems Research
IEEE Security and Privacy
Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact
International Journal of Electronic Commerce
Tracking website data-collection and privacy practices with the iWatch web crawler
Proceedings of the 3rd symposium on Usable privacy and security
eBPSM: a new security paradigm for e-business organisations (e-business process security model)
Proceedings of the ninth international conference on Electronic commerce
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
Toward a Theory of Knowledge Reuse: Types of Knowledge Reuse Situations and Factors in Reuse Success
Journal of Management Information Systems
Examining the influence of demographic factors on internet users' information privacy concerns
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
Best practices and tools for personal information compliance management
IBM Systems Journal
Proceedings of the 1st international conference on Theory and practice of electronic governance
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
A Case Study: Adoption of Information Technology in E-Business of United Arab Emirates
ICEBE '07 Proceedings of the IEEE International Conference on e-Business Engineering
Public key superstructure "it's PKI Jim, but not as we know it!"
Proceedings of the 7th symposium on Identity and trust on the Internet
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
FlyByNight: mitigating the privacy risks of social networking
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Do online buying behaviour and attitudes to web personalization vary by age group?
Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
A privacy-preserving UBICOMP architecture
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Sharing information for product quality and food safety in China: barriers and enablers
Proceedings of the 2nd international conference on Theory and practice of electronic governance
Social computing privacy concerns: antecedents and effects
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ICMB '09 Proceedings of the 2009 Eighth International Conference on Mobile Business
PLOT: Privacy in Location Based Services: An Open-Ended Toolbox
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
Sharing private information online: the mediator effect of social exchange
Proceedings of the 11th International Conference on Electronic Commerce
Protecting the Privacy Based on Reasoning in E-business Using Anonymous
ESIAT '09 Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology - Volume 03
Privacy Protecting in E-business Using Reasoning
SSME '09 Proceedings of the 2009 IITA International Conference on Services Science, Management and Engineering
Usable Privacy Controls for Blogs
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04
An examination of the concern for information privacy in the New Zealand regulatory context
Information and Management
Sharing information with controllable precision by distance measuring in mobile social network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Four ethical issues of the information age
MIS Quarterly
Validating instruments in MIS research
MIS Quarterly
The nature of theory in information systems
MIS Quarterly
Internet Privacy Policies: A Review and Survey of the Fortune 50
Information Resources Management Journal
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Theories in online information privacy research: A critical review and an integrated framework
Decision Support Systems
POCKET: A tool for protecting children's privacy online
Decision Support Systems
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
A model of consumers' perceptions of the invasion of information privacy
Information and Management
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Privacy practices in collaborative environments: a study of emergency department staff
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
International Journal of Human-Computer Studies
Aligning principal and agent's incentives: A principal-agent perspective of social networking sites
Expert Systems with Applications: An International Journal
Electronic Commerce Research and Applications
A multi-level model of individual information privacy beliefs
Electronic Commerce Research and Applications
Pricing and disseminating customer data with privacy awareness
Decision Support Systems
Hi-index | 0.00 |
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.