Skip to main content

Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For

  • Conference paper
  • First Online:
Information and Communication Technologies in Tourism 2019

Abstract

The link between information privacy concerns and privacy behaviours has been a focus of extensive investigation in various disciplines. However, little attention has been devoted to this issue in the tourism literature. Spurred by technological development and shaped by tourism-related environments, emerging privacy issues call for comprehensive yet context-specific studies to ensure tourists are making beneficial privacy choices. This paper first presents a comprehensive review of state-of-the-art research on privacy concerns and behaviours. Then, it suggests a list of overarching research priorities, merging social and technical aspects of privacy protection approaches as they apply to tourism. The priorities include research to measure tourists’ privacy concerns, explore specific biases in tourists’ privacy decisions, experiment with privacy nudges, and explore how to integrate privacy nudges in system design. Thus, this paper contributes to guiding the direction of future research on privacy protection in tourism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gretzel U (2011) Intelligent systems in tourism: a social science perspective. Ann Tour Res 38(3):757–779

    Article  Google Scholar 

  2. Werthner H, Klein S (1999) Information technology and tourism—a challenging relationship. Springer, Vienna

    Book  Google Scholar 

  3. Drosatos G, Efraimidis PS, Arampatzis A, Stamatelatos G, Athanasiadis IN (2015) Pythia: a privacy-enhanced personalized contextual suggestion system for Tourism. 2015. In: IEEE 39th annual international computers, software & applications conference. https://doi.org/10.1109/compsac.2015.88

  4. Gavalas D, Kasapakis V, Konstantopoulos C, Mastakas K, Pantziou G (2013) A survey on mobile tourism recommender systems. https://doi.org/10.1109/iccitechnology.2013.6579536

  5. Lee CH, Cranage DA (2011) Personalisation–privacy paradox: the effects of personalisation and privacy assurance on customer responses to travel websites. Tour Manag 32(5):987–994

    Article  Google Scholar 

  6. Baruh L, Secinti E, Cemalcilar Z (2017) Online privacy concerns and privacy management: a meta-analytical review. J Commun 67(1):26–53

    Article  Google Scholar 

  7. Barth S, de Jong MDT (2017) The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior - a systematic literature review. Telemat Inf 34(7):1038–1058

    Article  Google Scholar 

  8. Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun Assoc Inf Syst 28:453–496

    Google Scholar 

  9. Anuar F, Gretzel U (2011) Privacy concerns in the context of location based services for tourism. Paper presented at the ENTER 2011 conference, Innsbruck, Austria, January 26–28, 2011

    Google Scholar 

  10. Gretzel U, Sigala M, Xiang Z, Koo C (2015) Smart tourism: foundations and developments. Electron Market 25(3):179–188

    Article  Google Scholar 

  11. Manikonda L, Deotale A, Kambhampati S (2017) What’s up with privacy?: User preferences and privacy concerns in intelligent personal assistants. https://arxiv.org/abs/1711.07543

  12. Lutz C, Hoffmann CP, Bucher E, Fieseler C (2018) The role of privacy concerns in the sharing economy. Inf Commun Soc 21(10):1472–1492

    Article  Google Scholar 

  13. Westin AF (1967) Privacy and freedom. Atheneum, New York

    Google Scholar 

  14. Xu H, Teo H-H (2004) Alleviating consumers’ privacy concerns in location-based services: A psychological control perspective. In: ICIS 2004 Proceedings, 64. https://aisel.aisnet.org/icis2004/64

  15. Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35(4):89–1015

    Article  Google Scholar 

  16. Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor LF, Komanduri S, Leon PG, Sadeh N, Schaub F, Sleeper M, Wang Y, Wilson S (2017) Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput Surv 50(3):44

    Article  Google Scholar 

  17. Kokolakis S (2017) Privacy attitudes and privacy behaviour. Comput Secur 64(C): 122–134

    Google Scholar 

  18. Li Y (2012) Theories in online information privacy research: a critical review and an integrated framework. Decis Support Syst 54(1):471–481

    Article  Google Scholar 

  19. Zhou T, Li H (2014) Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Comput Hum Behav 37:283–289

    Article  Google Scholar 

  20. Eisenhardt KM (1989) Agency theory: an assessment and review. Acad Manag Rev 14(1):57–74

    Article  Google Scholar 

  21. Milne GR, Gordon ME (1993) Direct mail privacy-efficiency trade-offs within an implied social contract framework. J Public Policy Market 12(2):206–215

    Google Scholar 

  22. Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211

    Article  Google Scholar 

  23. Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood-Cliffs, NJ

    Google Scholar 

  24. Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, 21–29

    Google Scholar 

  25. Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday, 11. http://dx.doi.org/10.5210/fm.v11i9.1394

  26. Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff 41(1):100–126

    Article  Google Scholar 

  27. Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104–115

    Article  Google Scholar 

  28. Laufer RS, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional development theory. J Soc Issues 33(3):23–42

    Article  Google Scholar 

  29. Awad NF, Krishnan MS (2006) The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q 30(1):13–28

    Article  Google Scholar 

  30. Stone EF, Stone DL (1990) Privacy in organizations: theoretical issues, research findings, and protection mechanisms. Res Pers Hum Resour Manag 8:349–411

    Google Scholar 

  31. Simon HA (1955) A behavioral model of rational choice. Q J Econ 69(1):99–118

    Article  Google Scholar 

  32. Donnenwerth GV, Foa UG (1974) Effect of resource class on retaliation to injustice in interpersonal exchange. J Personal Soc Psychol 29:785–793

    Article  Google Scholar 

  33. Foa UG (1971) Interpersonal and economic resources. Science 71:345–351

    Article  Google Scholar 

  34. Simon HA (1982) Models of Bounded Rationality. Volume 1: economic analysis and public policy. Vol 2. Behavioural economics and business organization. MIT Press, Cambridge, MA

    Google Scholar 

  35. Blumler JG, Katz E (1974) The uses of mass communication. Sage, Beverly Hills, CA

    Google Scholar 

  36. Katz E, Blumler JG, Gurevitch M (1973) Uses and gratifications research. Public Opin Q 37(4):509–523

    Article  Google Scholar 

  37. Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–291

    Article  Google Scholar 

  38. Harsanyi JC (1967) Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Manag Sci 14(3):159–182

    Article  Google Scholar 

  39. Floyd DL, Prentice-Dunn S, Rogers RW (2000) A meta-analysis of research on protection motivation theory. J Appl Soc Psychol 30(2):407–429

    Article  Google Scholar 

  40. Bandura A (1986) Social foundations of thought and action: a social cognitive theory. Prentice-Hall, Englewood Cliffs, NJ

    Google Scholar 

  41. Bandura A (2001) Social cognitive theory: an agentic perspective. Ann Rev Psychol 52:1–26

    Article  Google Scholar 

  42. Smith HJ, Milberg S, Burke S (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20(2):167–196

    Article  Google Scholar 

  43. Malhotra NK, Kim SS, Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf Syst Res 15(4):336–355

    Article  Google Scholar 

  44. Buchanan T, Paine C, Joinson AN, Reips UD (2007) Development of measures of online privacy concern and protection for use on the internet. J Am Soc Inf Sci Technol 58(2):157–165

    Article  Google Scholar 

  45. Martin KD, Murphy PE (2017) The role of data privacy in marketing. J Acad Market Sci 45(2):135–155

    Article  Google Scholar 

  46. Son J-Y, Kim SS (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Q 32(3):503–529

    Article  Google Scholar 

  47. Ajzen I, Brown TC, Carvajal F (2004) Explaining the discrepancy between intentions and actions: the case of hypothetical bias in contingent valuation. Personal Soc Psychol Bull 30:1108–1121

    Article  Google Scholar 

  48. Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven & London

    Google Scholar 

  49. Hansen PG (2016) The definition of nudge and libertarian paternalism: does the hand fit the glove? Eur J Risk Regul 7(1):155–174

    Article  Google Scholar 

  50. Acquisti A (2009) Nudging privacy: the behavioral economics of personal information. IEEE Secur Priv 7(6):82–85

    Article  Google Scholar 

Download references

Acknowledgements

This work was part of the “PRIvacy-aware personal data management and Value Enhancement for Leisure Travellers (PriVELT)” Project supported by the UK’s Engineering and Physical Sciences Research Council (EPSRC) (EP/R033196/1, EP/R033749/1, and EP/R033609/1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iis Tussyadiah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tussyadiah, I., Li, S., Miller, G. (2019). Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, J., Neidhardt, J. (eds) Information and Communication Technologies in Tourism 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-05940-8_22

Download citation

Publish with us

Policies and ethics