2019
DOI: 10.1108/itp-01-2018-0020
|View full text |Cite
|
Sign up to set email alerts
|

Retaining users after privacy invasions

Abstract: Purpose The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions. Design/methodology/approach Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(32 citation statements)
references
References 74 publications
2
30
0
Order By: Relevance
“…Third, the study builds on recent work harnessing CPM to link privacy assurances to privacy perceptions (e.g. Wang et al, 2019). While Wang et al (2019) focus on how perceived privacy risks and selfefficacy jointly determine privacy concerns in a social media context, we extend our understanding of the boundary rule formation and coordination processes among a broader range of privacy perceptions in an e-commerce context, while also incorporating trust and behavioral intentions.…”
Section: Enhancing Perceptions Of Privacy and Trustmentioning
confidence: 99%
See 4 more Smart Citations
“…Third, the study builds on recent work harnessing CPM to link privacy assurances to privacy perceptions (e.g. Wang et al, 2019). While Wang et al (2019) focus on how perceived privacy risks and selfefficacy jointly determine privacy concerns in a social media context, we extend our understanding of the boundary rule formation and coordination processes among a broader range of privacy perceptions in an e-commerce context, while also incorporating trust and behavioral intentions.…”
Section: Enhancing Perceptions Of Privacy and Trustmentioning
confidence: 99%
“…CPM posits that individuals define privacy boundaries based on their preexisting perceptions as well as boundary coordination in new situations such as transacting with an E-commerce vendor. Indeed, when harnessing CPM, Wang et al (2019) assert that individuals' privacy perceptions are not static and may be highly influenced by institutional assurances such as privacy policies. Thus, we adopt a different approach to prior work (Chang et al, 2018;Xu et al, 2011) and include both general perceptions related to privacy online and situational perceptions related to the E-commerce vendor.…”
Section: Gdpr Privacy Label Developmentmentioning
confidence: 99%
See 3 more Smart Citations