T he lack of consumer confidence in information privacy has been identified as a major problem hampering the growth of e-commerce. Despite the importance of understanding the nature of online consumers' concerns for information privacy, this topic has received little attention in the information systems community. To fill the gap in the literature, this article focuses on three distinct, yet closely related, issues. First, drawing on social contract theory, we offer a theoretical framework on the dimensionality of Internet users' information privacy concerns (IUIPC). Second, we attempt to operationalize the multidimensional notion of IUIPC using a secondorder construct, and we develop a scale for it. Third, we propose and test a causal model on the relationship between IUIPC and behavioral intention toward releasing personal information at the request of a marketer. We conducted two separate field surveys and collected data from 742 household respondents in one-on-one, face-to-face interviews. The results of this study indicate that the second-order IUIPC factor, which consists of three first-order dimensions-namely, collection, control, and awareness-exhibited desirable psychometric properties in the context of online privacy. In addition, we found that the causal model centering on IUIPC fits the data satisfactorily and explains a large amount of variance in behavioral intention, suggesting that the proposed model will serve as a useful tool for analyzing online consumers' reactions to various privacy threats on the Internet.
Despite recurring concerns about common method variance (CMV) in survey research, the information systems (IS) community remains largely uncertain of the extent of such potential biases. To address this uncertainty, this paper attempts to systematically examine the impact of CMV on the inferences drawn from survey research in the IS area. First, we describe the available approaches for assessing CMV and conduct an empirical study to compare them. From an actual survey involving 227 respondents, we find that although CMV is present in the research areas examined, such biases are not substantial. The results also suggest that few differences exist between the relatively new marker-variable technique and other well-established conventional tools in terms of their ability to detect CMV. Accordingly, the marker-variable technique was employed to infer the effect of CMV on correlations from previously published studies. Our findings, based on the reanalysis of 216 correlations, suggest that the inflated correlation caused by CMV may be expected to be on the order of 0.10 or less, and most of the originally significant correlations remain significant even after controlling for CMV. Finally, by extending the marker-variable technique, we examined the effect of CMV on structural relationships in past literature. Our reanalysis reveals that contrary to the concerns of some skeptics, CMV-adjusted structural relationships not only remain largely significant but also are not statistically differentiable from uncorrected estimates. In summary, this comprehensive and systematic analysis offers initial evidence that (1) the marker-variable technique can serve as a convenient, yet effective, tool for accounting for CMV, and (2) common method biases in the IS domain are not as serious as those found in other disciplines.common method variance, method biases, marker variable, logit analysis, path analysis
Although initial use is an important indicator of information system (IS) success, it does not necessarily lead to the desired managerial outcome unless the use continues. However, compared with the great amount of work done on IS adoption, little systematic effort has gone into providing insight into continued IS use over time. The objective of this study is to develop a longitudinal model of how users' evaluations and behavior evolve as they gain experience with the information technology application. The proposed model is a unified framework that sheds light on four different mechanisms underlying postadoption phenomena: (1) the processes suggested by the technology acceptance model; (2) sequential updating mechanisms; (3) feedback mechanisms; and (4) repeated behavioral patterns. The proposed model was empirically tested in the context of Web-based IS use in a nonexperimental setting. Our findings suggest that, as hypothesized, each of the four theoretical viewpoints is essential for a deeper understanding of continued IS use. We discuss important findings that emerged from this longitudinal study and suggest directions for additional research.longitudinal study, panel model, information systems use, continued use, technology acceptance model (TAM), theory of belief updating, self-perception theory, habit
Although Internet users are expected to respond in various ways to privacy threats from online companies, little attention has been paid so far to the complex nature of how users respond to these threats. This paper has two specific goals in its effort to fill this gap in the literature. The first, so that these outcomes can be systematically investigated, is to develop a taxonomy of information privacy-protective responses (IPPR). This taxonomy consists of six types of behavioral responses-refusal, misrepresentation, removal, negative word-of-mouth, complaining directly to online companies, and complaining indirectly to third-party organizations-1 Bernard C. Y. Tan was the accepting senior editor for this paper. Jeff Smith was the associate editor. Norm Chervany, Bradley Alge, and May Lwin served as reviewers. that are classified into three categories: information provision, private action, and public action. Our second goal is to develop a nomological model with several salient antecedents-concerns for information privacy, perceived justice, and societal benefits from complaining-of IPPR, and to show how the antecedents differentially affect the six types of IPPR. The nomological model is tested with data collected from 523 Internet users. The results indicate that some discernible patterns emerge in the relationships between the antecedents and the three groups of IPPR. These patterns enable researchers to better understand why a certain type of IPPR is similar to or distinct from other types of IPPR. Such an understanding could enable researchers to analyze a variety of behavioral responses to information privacy threats in a fairly systematic manner. Overall, this paper contributes to researchers' theory-building efforts in the area of information privacy by breaking new ground for the study of individuals' responses to information privacy threats.
O nline communities are new social structures dependent on modern information technology, and they face equally modern challenges. Although satisfied members regularly consume content, it is considerably harder to coax them to contribute new content and help recruit others because they face unprecedented social comparison and criticism. We propose that engagement-a concept only abstractly alluded to in information systems research-is the key to active participation in these unique sociotechnical environments. We constructed and tested a framework that demonstrates what engagement is, where it comes from, and how it powerfully explains both knowledge contribution and word of mouth. Our results show that members primarily contribute to and revisit an online community from a sense of engagement. Nonetheless, word of mouth is partly influenced by prior satisfaction. Therefore, engagement and satisfaction appear to be parallel mediating forces at work in online communities. Both mediators arise from a sense of communal identity and knowledge self-efficacy, but engagement also emerges from validation of self-identity. Nevertheless, we also found signs that the contributions of the most knowledgeable users are not purely from engagement, but also from a competing sense of self-efficacy. Our findings significantly contribute to the area of information systems by highlighting that engagement is a concrete phenomenon on its own, and it can be directly modeled and must be carefully managed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.