Internet users' information privacy-protective responses : A Taxonomy and a nomological model

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

272 Scopus Citations
View graph of relations

Author(s)

  • Jai-Yeol Son
  • Sung S. Kim

Detail(s)

Original languageEnglish
Pages (from-to)503-529
Journal / PublicationMIS Quarterly: Management Information Systems
Volume32
Issue number3
Publication statusPublished - Sep 2008
Externally publishedYes

Abstract

Although Internet users are expected to respond in various ways to privacy threats from online companies, little attention has been paid so far to the complex nature of how users respond to these threats. This paper has two specific goals in its effort to fill this gap in the literature. The first, so that these outcomes can be systematically investigated, is to develop a taxonomy of information privacy-protective responses (IPPR). This taxonomy consists of six types of behavioral responses - refusal, misrepresentation, removal, negative word-of-mouth, complaining directly to online companies, and complaining indirectly to third-party organizations - that are classified into three categories: information provision, private action, and public action. Our second goal is to develop a nomological model with several salient antecedents - concerns for information privacy, perceived justice, and societal benefits from complaining - of IPPR, and to show how the antecedents differentially affect the six types of IPPR. The nomological model is tested with data collected from 523 Internet users. The results indicate that some discernible patterns emerge in the relationships between the antecedents and the three groups of IPPR. These patterns enable researchers to better understand why a certain type of IPPR is similar to or distinct from other types of IPPR. Such an understanding could enable researchers to analyze a variety of behavioralresponses to information privacythreats in a fairly systematic manner. Overall, this paper contributes to researchers' theory-building efforts in the area of information privacy by breaking new ground for the study of individuals ' responses to information privacy threats.

Research Area(s)

  • Causal model, Ethical issues, Information privacy, Information privacy concerns, Responses to information privacy threats, Structural equation modeling