ABSTRACT
In this paper we present early results from a study, which aims at understanding the privacy paradox from a social representations perspective. After identifying adequate stimulus words with the help of a preliminary study, we conducted the main study using an online questionnaire. Participants were instructed to associate freely to the given stimulus words. The results of the polarity and sequence analysis of the associations provide a first valuable insight into the social representations of online privacy.
- Abric, J.C. (1996). Specific processes of social representations. Papers on Social Representations, 5(1), 77--80.Google Scholar
- Acquisti, A., John, L. and Loewenstein, G. (2009). What is Privacy Worth?. Technical Report, Heinz College, Carnegie Mellon University.Google Scholar
- Brandimarte, L., Acquisti, A. and Loewenstein, G. (2009). Privacy Concerns and Information Disclosure: An Illusion of Control Hypothesis. Poster, iConference 2009.Google Scholar
- ConsumersUnions.org (2008). Consumer Reports Poll: Americans Extremely Concerned About Internet Privacy. Retrieved January 11, 2011 from http://www.consumersunion.org/pub/core_telecom_and_utilities/006189.html.Google Scholar
- de Rosa, A.S. (1995). Le "réseau d'associations" comme méthode d'étude dans la recherche sur les representations sociales: structure, contenus et polarité du champ semantique. Cahiers Internationaux de Psychologie Sociales, 28, 96--122.Google Scholar
- Dinev, T. and Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research (17:1), 61--80. Google ScholarDigital Library
- Jung, Y., Pawlowski, S., & Wiley-Patton, S. (2009). Conducting Social Cognition Research in IS: A Methodology for Eliciting and Analyzing Social Representations. Communications of the Association for Information Systems, 24(1), 15.Google Scholar
- Moscovici, S. (1984). The phenomenon of social representations. In: Farr, R.M., Moscovici, S. (Eds.), Social Representations. University Press, Cambridge, pp. 3--69.Google Scholar
- Norberg, P.A., Horne, D.R., et al. (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs, 41(1), 100--126.Google ScholarCross Ref
- Spiekermann, S., Grossklags, J. and Berendt, B. (2001). E-privacy In 2nd Generation E-Commerce: Privacy Preferences Versus Actual Behavior. Proceedings of the ACM Conference on Electronic Commerce, 38--47. Google ScholarDigital Library
- Vaast, E. (2007). Danger is in the eye of the beholders: social representations of information systems security in healthcare. Journal of Strategic Information Systems, 16, 130--152. Google ScholarDigital Library
- Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 137--176. Google ScholarDigital Library
Index Terms
- The online privacy paradox: a social representations perspective
Recommendations
Solving the privacy paradox: A counter-argument experimental approach
This study investigates why ordinary online users highly concerned about the misuse of personal information do not adopt privacy-protective behaviors, or even engage in risky behaviors, on the Internet. Given that people have few chances to directly ...
Beyond the privacy paradox: The moderating effect of online privacy concerns on online service use behavior
Highlights- Study the privacy paradox of using online services despite privacy concerns.
- ...
AbstractIn the digital information era, dealing with privacy issues is problematic in related research since online activities have become an inevitable trend. Following the privacy paradox, which occurs when online services are increasingly ...
The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online
HCI in Business, Government and Organizations. Information Systems and AnalyticsAbstractThe Privacy Paradox is an information privacy behavioral phenomenon wherein individuals are aware that the personally identifiable information (PII) they disclose in an online transaction may be compromised, yet disclose it nonetheless. One ...
Comments