Privacy in the digital age: a review of information privacy research in information systems

F Bélanger, RE Crossler - MIS quarterly, 2011 - JSTOR
Information privacy refers to the desire of individuals to control or have some influence over
data about themselves. Advances in information technology have raised concerns about …

Information privacy research: an interdisciplinary review

HJ Smith, T Dinev, H Xu - MIS quarterly, 2011 - JSTOR
To date, many important threads of information privacy research have developed, but these
threads have not been woven together into a cohesive fabric. This paper provides an …

Consumer privacy and the future of data-based innovation and marketing

A Bleier, A Goldfarb, C Tucker - International Journal of Research in …, 2020 - Elsevier
Digitization makes it easier for firms to build their innovation and marketing efforts around
consumers' personal data. In this research, we employ a privacy perspective based on …

Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users

J Sutanto, E Palme, CH Tan, CW Phang - MIS quarterly, 2013 - JSTOR
Privacy has been an enduring concern associated with commercial information technology
(IT) applications, in particular regarding the issue of personalization. IT-enabled …

Privacy and rationality in individual decision making

A Acquisti, J Grossklags - IEEE security & privacy, 2005 - ieeexplore.ieee.org
Traditional theory suggests consumers should be able to manage their privacy. Yet,
empirical and theoretical research suggests that consumers often lack enough information to …

The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns

VM Wottrich, EA van Reijmersdal, EG Smit - Decision support systems, 2018 - Elsevier
Today, mobile app users regularly “pay” for various mobile services, such as social
networking or entertainment apps, by accepting app permission requests, thereby sharing …

Privacy in electronic commerce and the economics of immediate gratification

A Acquisti - Proceedings of the 5th ACM conference on Electronic …, 2004 - dl.acm.org
Dichotomies between privacy attitudes and behavior have been noted in the literature but
not yet fully explained. We apply lessons from the research on behavioral economics to …

The value of privacy assurance: An exploratory field experiment

KL Hui, HH Teo, SYT Lee - MIS quarterly, 2007 - JSTOR
This paper reports the results of an exploratory field experiment in Singapore that assessed
the values of two types of privacy assurance: privacy statements and privacy seals. We …

Understanding situational online information disclosure as a privacy calculus

H Li, R Sarathy, H Xu - Journal of Computer Information Systems, 2010 - Taylor & Francis
The effect of situational factors is largely ignored by current studies on information privacy.
This paper theorized and empirically tested how an individual's decision-making on …

Priming and warnings are not effective to prevent social engineering attacks

M Junger, L Montoya, FJ Overink - Computers in human behavior, 2017 - Elsevier
Humans tend to trust each other and to easily disclose personal information. This makes
them vulnerable to social engineering attacks. The present study investigated the …