Abstract
The link between information privacy concerns and privacy behaviours has been a focus of extensive investigation in various disciplines. However, little attention has been devoted to this issue in the tourism literature. Spurred by technological development and shaped by tourism-related environments, emerging privacy issues call for comprehensive yet context-specific studies to ensure tourists are making beneficial privacy choices. This paper first presents a comprehensive review of state-of-the-art research on privacy concerns and behaviours. Then, it suggests a list of overarching research priorities, merging social and technical aspects of privacy protection approaches as they apply to tourism. The priorities include research to measure tourists’ privacy concerns, explore specific biases in tourists’ privacy decisions, experiment with privacy nudges, and explore how to integrate privacy nudges in system design. Thus, this paper contributes to guiding the direction of future research on privacy protection in tourism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gretzel U (2011) Intelligent systems in tourism: a social science perspective. Ann Tour Res 38(3):757–779
Werthner H, Klein S (1999) Information technology and tourism—a challenging relationship. Springer, Vienna
Drosatos G, Efraimidis PS, Arampatzis A, Stamatelatos G, Athanasiadis IN (2015) Pythia: a privacy-enhanced personalized contextual suggestion system for Tourism. 2015. In: IEEE 39th annual international computers, software & applications conference. https://doi.org/10.1109/compsac.2015.88
Gavalas D, Kasapakis V, Konstantopoulos C, Mastakas K, Pantziou G (2013) A survey on mobile tourism recommender systems. https://doi.org/10.1109/iccitechnology.2013.6579536
Lee CH, Cranage DA (2011) Personalisation–privacy paradox: the effects of personalisation and privacy assurance on customer responses to travel websites. Tour Manag 32(5):987–994
Baruh L, Secinti E, Cemalcilar Z (2017) Online privacy concerns and privacy management: a meta-analytical review. J Commun 67(1):26–53
Barth S, de Jong MDT (2017) The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior - a systematic literature review. Telemat Inf 34(7):1038–1058
Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun Assoc Inf Syst 28:453–496
Anuar F, Gretzel U (2011) Privacy concerns in the context of location based services for tourism. Paper presented at the ENTER 2011 conference, Innsbruck, Austria, January 26–28, 2011
Gretzel U, Sigala M, Xiang Z, Koo C (2015) Smart tourism: foundations and developments. Electron Market 25(3):179–188
Manikonda L, Deotale A, Kambhampati S (2017) What’s up with privacy?: User preferences and privacy concerns in intelligent personal assistants. https://arxiv.org/abs/1711.07543
Lutz C, Hoffmann CP, Bucher E, Fieseler C (2018) The role of privacy concerns in the sharing economy. Inf Commun Soc 21(10):1472–1492
Westin AF (1967) Privacy and freedom. Atheneum, New York
Xu H, Teo H-H (2004) Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: ICIS 2004 Proceedings, 64. https://aisel.aisnet.org/icis2004/64
Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35(4):89–1015
Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor LF, Komanduri S, Leon PG, Sadeh N, Schaub F, Sleeper M, Wang Y, Wilson S (2017) Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput Surv 50(3):44
Kokolakis S (2017) Privacy attitudes and privacy behaviour. Comput Secur 64(C): 122–134
Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decis Support Syst 54(1):471–481
Zhou T, Li H (2014) Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Comput Hum Behav 37:283–289
Eisenhardt KM (1989) Agency theory: an assessment and review. Acad Manag Rev 14(1):57–74
Milne GR, Gordon ME (1993) Direct mail privacy-efficiency trade-offs within an implied social contract framework. J Public Policy Market 12(2):206–215
Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211
Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood-Cliffs, NJ
Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, 21–29
Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday, 11. http://dx.doi.org/10.5210/fm.v11i9.1394
Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff 41(1):100–126
Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104–115
Laufer RS, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional development theory. J Soc Issues 33(3):23–42
Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 30(1):13–28
Stone EF, Stone DL (1990) Privacy in organizations: theoretical issues, research findings, and protection mechanisms. Res Pers Hum Resour Manag 8:349–411
Simon HA (1955) A behavioral model of rational choice. Q J Econ 69(1):99–118
Donnenwerth GV, Foa UG (1974) Effect of resource class on retaliation to injustice in interpersonal exchange. J Personal Soc Psychol 29:785–793
Foa UG (1971) Interpersonal and economic resources. Science 71:345–351
Simon HA (1982) Models of Bounded Rationality. Volume 1: economic analysis and public policy. Vol 2. Behavioural economics and business organization. MIT Press, Cambridge, MA
Blumler JG, Katz E (1974) The uses of mass communication. Sage, Beverly Hills, CA
Katz E, Blumler JG, Gurevitch M (1973) Uses and gratifications research. Public Opin Q 37(4):509–523
Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–291
Harsanyi JC (1967) Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Manag Sci 14(3):159–182
Floyd DL, Prentice-Dunn S, Rogers RW (2000) A meta-analysis of research on protection motivation theory. J Appl Soc Psychol 30(2):407–429
Bandura A (1986) Social foundations of thought and action: a social cognitive theory. Prentice-Hall, Englewood Cliffs, NJ
Bandura A (2001) Social cognitive theory: an agentic perspective. Ann Rev Psychol 52:1–26
Smith HJ, Milberg S, Burke S (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20(2):167–196
Malhotra NK, Kim SS, Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf Syst Res 15(4):336–355
Buchanan T, Paine C, Joinson AN, Reips UD (2007) Development of measures of online privacy concern and protection for use on the internet. J Am Soc Inf Sci Technol 58(2):157–165
Martin KD, Murphy PE (2017) The role of data privacy in marketing. J Acad Market Sci 45(2):135–155
Son J-Y, Kim SS (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Q 32(3):503–529
Ajzen I, Brown TC, Carvajal F (2004) Explaining the discrepancy between intentions and actions: the case of hypothetical bias in contingent valuation. Personal Soc Psychol Bull 30:1108–1121
Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven & London
Hansen PG (2016) The definition of nudge and libertarian paternalism: does the hand fit the glove? Eur J Risk Regul 7(1):155–174
Acquisti A (2009) Nudging privacy: the behavioral economics of personal information. IEEE Secur Priv 7(6):82–85
Acknowledgements
This work was part of the “PRIvacy-aware personal data management and Value Enhancement for Leisure Travellers (PriVELT)” Project supported by the UK’s Engineering and Physical Sciences Research Council (EPSRC) (EP/R033196/1, EP/R033749/1, and EP/R033609/1).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tussyadiah, I., Li, S., Miller, G. (2019). Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, J., Neidhardt, J. (eds) Information and Communication Technologies in Tourism 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-05940-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-05940-8_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05939-2
Online ISBN: 978-3-030-05940-8
eBook Packages: Business and ManagementBusiness and Management (R0)