Academia.eduAcademia.edu

Outline

The Economic Impact of Privacy Violations and Security Breaches

2014, Business & Information Systems Engineering

https://doi.org/10.1007/S12599-014-0351-3

Abstract

In an experiment, the authors distinguish between the impact of privacy violations and security breaches on the subjects' trust and behavior. They focus on first-order effects and thus the direct consumer reaction. While privacy is of prime importance for building trust, the actual behavior is affected less and customers value security higher when it comes to actual decision making. Evidence is found for the so-called "privacy paradox" which describes that people do not act according to their privacy concerns.

References (72)

  1. Ackerman M (2004) Privacy in pervasive envi- ronments: next generation labeling proto- cols. Personal and Ubiquitous Computing 8(6):430-439
  2. Acquisti A, Friedman A, Telang R (2006) Is there a cost to privacy breaches? An event study. In: Proc 27th international confer- ence on information systems, Milwaukee Andoh-Baidoo FK, Amoako-Gyampah K, Osei- Bryson KM (2010) How Internet security breaches harm market value. IEEE Security and Privacy 8(1):36-42
  3. Barber BM, Odean T (2001) Boys will be boys: gender, overconfidence, and com- mon stock investment. Quarterly Journal of Economics 116(1):261-292
  4. Belanger F, Hiller JS, Smith WJ (2002) Trust- worthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11(3-4):245-270
  5. Bellman S, Johnson EJ, Kobrin SJ, Lohse GL (2004) International differences in informa- tion privacy concerns: a global survey of consumers. Information Society 20(5):313- 324
  6. Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM 48(4):101-106
  7. Berg J, Dickhaut J, McCabe K (1995) Trust, reciprocity, and social history. Games and Economic Behavior 10(1):122-142
  8. Bhattacherjee A (2002) Individual trust in on- line firms: scale development and initial test. Journal of Management Information Systems 19(1):211-241
  9. Bilton N, Stelter B (2011) Sony says PlaySta- tion hacker got personal data. http://www. nytimes.com/2011/04/27/technology/ 27playstation.html?_r=0. Accessed 2013- 09-23
  10. Bolle F (1998) Rewarding trust: an experimen- tal study. Theory and Decision 45(1):83-98
  11. Buchan NR, Croson RTA, Solnick S (2008) Trust and gender: an examination of behavior and beliefs in the investment game. Jour- nal of Economic Behavior & Organization 68:466-476
  12. Campbell JY, Lo AW, MacKinlay AC (1997) The econometrics of financial markets. Prince- ton University Press, Princeton
  13. Cavusoglu H, Mishra B, Raghunathan S (2004) The effect of Internet security breach an- nouncements on market value: capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce 9(1):69- 104
  14. Childers TL, Houston MJ (1984) Conditions for a picture-superiority effect on consumer memory. Journal of Consumer Research 11(2):643-654
  15. Cho H, Rivera-Sánchez M, Lim SS (2009) A multinational study on online privacy: global concerns and local responses. New Media & Society 11(3):395-416
  16. Cohn RA, Lewellen WG, Lease RC, Schlarbaum GG (1975) Individual investor risk aver- sion and investment portfolio composition. Journal of Finance 30(2):605-620
  17. Culnan MJ (1993) How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17(3):341-364
  18. Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investiga- tion. Organization Science 10(1):104-115
  19. Culnan MJ, Williams CC (2009) How ethics can enhance organizational privacy: lessons from the choice point and TJX data breaches. MIS Quarterly 33(4):673-687
  20. De Bondt WFM, Thaler R (1985) Does the stock market overreact? Journal of Finance 40(3):793-805
  21. Dinev T, Bellotto M, Hart P, Russo V, Serra I, Colautti C (2006) Internet users' privacy concerns and beliefs about government surveillance: an exploratory study of dif- ferences between Italy and the United States. Journal of Global Information Man- agement 14:4:57-93
  22. Dommeyer CJ, Gross BL (2003) What con- sumers know and what they do: an investi- gation of consumer knowledge, awareness, and use of protection strategies. Journal of Interactive Marketing 17(2):34-51
  23. Eastlick MA, Lotz SL, Warrington P (2006) Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59(8):877-886
  24. Forsythe R, Horowitz JL, Savin NE, Sefton M (1994) Fairness in simple bargaining ex- periments. Games and Economic Behavior 6(3):347-369
  25. Foxman ER, Kilcoyne P (1993) Information technology, marketing practice, and con- sumer privacy: ethical issues. Journal of Public Policy & Marketing 12(1):106-119
  26. Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing 58(2):1-19
  27. Gefen D (2000) E-commerce: the role of famil- iarity and trust. Omega 28(6):725-737
  28. Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly 27(1):51-90
  29. Gilbert JA, Tang TLP (1998) An examination of organizational trust antecedents. Public Personnel Management 27(3):321-338
  30. Goodwin C (1991) Privacy: recognition of a consumer right. Journal of Public Policy & Marketing 10(1):149-166
  31. Gorn GJ (1982) The effects of music in adver- tising on choice behavior: a classical con- ditioning approach. Journal of Marketing 46:94-101
  32. Granovetter M (1985) Economic action and social structure: a theory of embed- dedness. American Journal of Sociology 91(3):481-510
  33. Greenaway KE, Chan YE (2005) Theoretical explanations for firms' information privacy behavior. Journal of the Association for Information Systems 6(6):171-198
  34. Hinz O, Hann IH, Spann M (2011) Price dis- crimination in e-commerce? An examina- tion of dynamic pricing in name-your-own- price markets. MIS Quarterly 35(1):81-98
  35. Hosmer LT (1995) Trust: the connecting link between organizational theory and philo- sophical ethics. Academy of Management Review 20(2):379-403
  36. John LK, Acquisti A, Loewenstein G (2011) Strangers on a plane: context-dependent willingness to divulge sensitive infor- mation. Journal of Consumer Research 37(5):858-873
  37. Johnson EJ, Tversky A (1983) Affect, gener- alization, and the perception of risk. Jour- nal of Personality and Social Psychology 45(1):20-31
  38. Kalakota R, Whinston AB (1996) Frontiers of electronic commerce. Addison-Wesley, Reading
  39. Kee HW, Knox RE (1970) Conceptual and methodological considerations in the study of trust and suspicion. Journal of Conflict Resolution 14(3):357-366
  40. Kelly H (2013) Twitter hacked; 250,000 ac- counts affected. http://edition.cnn.com/ 2013/02/01/tech/social-media/twitter- hacked/index.html. Accessed 2013-09-23
  41. Kim DJ, Ferrin DL, Raghav Rao H (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44(2):544-564
  42. Liu C, Marchewka JT, Lu J, Yu C (2005) Be- yond concern -a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42(1):289-304
  43. Luo X, Li H, Zhang J, Shim JP (2010) Exam- ining multi-dimensional trust and multi- faceted risk in initial acceptance of emerg- ing technologies: an empirical study of mobile banking services. Decision Support Systems 49(2):222-234
  44. MacKinlay AC (1997) Event studies in eco- nomics and finance. Journal of Economic Literature 35(1):13-39
  45. Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20(3):709-734
  46. McKnight DH, Chervany NL (2001-2002) What trust means in e-commerce customer relationships: an interdisciplinary concep- tual typology. International Journal of Elec- tronic Commerce 6(2):35-59
  47. McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new orga- nizational relationships. Academy of Man- agement Review 23(3):473-490
  48. McKnight DH, Choudhury V, Kacmar C (2002) The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems 11(3-4):297-323
  49. Milberg SJ, Burke SJ, Smith HJ, Kallman EA (1995) Values, personal information, pri- vacy and regulatory approaches. Commu- nications of the ACM 38(12):65-74
  50. Milberg SJ, Smith HJ, Burke SJ (2000) Informa- tion privacy: corporate management and national regulation. Organization Science 11(1):35-57
  51. Milne GR, Boza ME (1999) Trust and concern in consumers' perceptions of marketing in- formation management practices. Journal of Interactive Marketing 13(1):5-24
  52. Morales L (2011) Google and Facebook users skew young, affluent, and educated. http:// www.gallup.com/poll/146159/facebook- google-users-skew-young-affluent- educated.aspx. Accessed 2013-09-23
  53. Norberg PA, Horne DR, Horne AA (2007) The privacy paradox: personal information dis- closure intentions versus behaviors. The Journal of Consumer Affairs 41(1):100-126
  54. Pavlou PA, Gefen D (2004) Building effec- tive online marketplaces with institution- based trust. Information Systems Research 15(1):37-59
  55. Phelps J (2000) Privacy concerns and con- sumer willingness to provide personal in- formation. Journal of Public Policy & Mar- keting 19(1):27-41
  56. Prosser WL (1960) Privacy. California Law Review 48(3):383-423
  57. Rotter JB (1971) Generalized expectancies for interpersonal trust. American Psychologist 26(5):443-452
  58. Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross- discipline view of trust. Academy of Man- agement Review 23(3):393-404
  59. Schwartz N, Clore GL (1983) Mood, misattri- bution, and judgments of well-being: in- formative and directive functions of affec- tive states. Journal of Personality and Social Psychology 45(3):513-523
  60. Silveira V (2012) Taking steps to protect our members. http://blog.linkedin.com/2012/ 06/07/taking-steps-to-protect-our- members/. Accessed: 2013-09-23
  61. Singh T, Hill ME (2003) Consumer privacy and the Internet in Europe: a view from Germany. Journal of Consumer Marketing 20(7):634-651
  62. Smith HJ, Milberg SJ, Burke SJ (1996) Informa- tion privacy: measuring individuals' con- cerns about organizational practices. MIS Quarterly 20(2):167-196
  63. Smith HJ, Dinev T, Xu H (2011) Informa- tion privacy research: an interdisciplinary review. MIS Quarterly 35(4):989-1015
  64. Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review 154(3):477-560
  65. Spiekermann S, Grossklags J, Berendt B (2001) E-privacy in second generation e- commerce: privacy preferences versus ac- tual behavior. In: Proc 3rd ACM conference on electronic commerce, New York Statman M (1999) Behavioral finance: past battle and future engagements. Financial Analysts Journal 55(6):18-27
  66. Straub DW, Collins RW (1990) Key informa- tion liability issues facing managers: soft- ware piracy, proprietary databases, and in- dividual rights to privacy. MIS Quarterly 14(2):143-156
  67. Suh B, Han I (2003) The impact of cus- tomer trust and perception of security con- trol on the acceptance of electronic com- merce. International Journal of Electronic Commerce 7(3):135-161
  68. Tsai J, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimen- tal study. Information Systems Research 22(2):254-268
  69. Westin A (1967) Privacy and freedom. Atheneum Books, New York
  70. Woodman RW, Ganster DC, Adams J, Mc- Cuddy MK, Tolchinsky PD, Fromkin H (1982) A survey of employee perceptions of infor- mation privacy in organizations. Academy of Management Journal 25(3):647-663
  71. Yoon E, Guffey HJ, Kijewski V (1993) The ef- fects of information and company reputa- tion on intentions to buy a business service. Journal of Business Research 27(3):215- 228
  72. Zellner A (1962) An efficient method of es- timating seemingly unrelated regressions and tests for aggregation bias. Journal of the American Statistical Association 57(298):348-368