The Economic Impact of Privacy Violations and Security Breaches
2014, Business & Information Systems Engineering
https://doi.org/10.1007/S12599-014-0351-3Abstract
In an experiment, the authors distinguish between the impact of privacy violations and security breaches on the subjects' trust and behavior. They focus on first-order effects and thus the direct consumer reaction. While privacy is of prime importance for building trust, the actual behavior is affected less and customers value security higher when it comes to actual decision making. Evidence is found for the so-called "privacy paradox" which describes that people do not act according to their privacy concerns.
References (72)
- Ackerman M (2004) Privacy in pervasive envi- ronments: next generation labeling proto- cols. Personal and Ubiquitous Computing 8(6):430-439
- Acquisti A, Friedman A, Telang R (2006) Is there a cost to privacy breaches? An event study. In: Proc 27th international confer- ence on information systems, Milwaukee Andoh-Baidoo FK, Amoako-Gyampah K, Osei- Bryson KM (2010) How Internet security breaches harm market value. IEEE Security and Privacy 8(1):36-42
- Barber BM, Odean T (2001) Boys will be boys: gender, overconfidence, and com- mon stock investment. Quarterly Journal of Economics 116(1):261-292
- Belanger F, Hiller JS, Smith WJ (2002) Trust- worthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11(3-4):245-270
- Bellman S, Johnson EJ, Kobrin SJ, Lohse GL (2004) International differences in informa- tion privacy concerns: a global survey of consumers. Information Society 20(5):313- 324
- Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM 48(4):101-106
- Berg J, Dickhaut J, McCabe K (1995) Trust, reciprocity, and social history. Games and Economic Behavior 10(1):122-142
- Bhattacherjee A (2002) Individual trust in on- line firms: scale development and initial test. Journal of Management Information Systems 19(1):211-241
- Bilton N, Stelter B (2011) Sony says PlaySta- tion hacker got personal data. http://www. nytimes.com/2011/04/27/technology/ 27playstation.html?_r=0. Accessed 2013- 09-23
- Bolle F (1998) Rewarding trust: an experimen- tal study. Theory and Decision 45(1):83-98
- Buchan NR, Croson RTA, Solnick S (2008) Trust and gender: an examination of behavior and beliefs in the investment game. Jour- nal of Economic Behavior & Organization 68:466-476
- Campbell JY, Lo AW, MacKinlay AC (1997) The econometrics of financial markets. Prince- ton University Press, Princeton
- Cavusoglu H, Mishra B, Raghunathan S (2004) The effect of Internet security breach an- nouncements on market value: capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce 9(1):69- 104
- Childers TL, Houston MJ (1984) Conditions for a picture-superiority effect on consumer memory. Journal of Consumer Research 11(2):643-654
- Cho H, Rivera-Sánchez M, Lim SS (2009) A multinational study on online privacy: global concerns and local responses. New Media & Society 11(3):395-416
- Cohn RA, Lewellen WG, Lease RC, Schlarbaum GG (1975) Individual investor risk aver- sion and investment portfolio composition. Journal of Finance 30(2):605-620
- Culnan MJ (1993) How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17(3):341-364
- Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investiga- tion. Organization Science 10(1):104-115
- Culnan MJ, Williams CC (2009) How ethics can enhance organizational privacy: lessons from the choice point and TJX data breaches. MIS Quarterly 33(4):673-687
- De Bondt WFM, Thaler R (1985) Does the stock market overreact? Journal of Finance 40(3):793-805
- Dinev T, Bellotto M, Hart P, Russo V, Serra I, Colautti C (2006) Internet users' privacy concerns and beliefs about government surveillance: an exploratory study of dif- ferences between Italy and the United States. Journal of Global Information Man- agement 14:4:57-93
- Dommeyer CJ, Gross BL (2003) What con- sumers know and what they do: an investi- gation of consumer knowledge, awareness, and use of protection strategies. Journal of Interactive Marketing 17(2):34-51
- Eastlick MA, Lotz SL, Warrington P (2006) Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59(8):877-886
- Forsythe R, Horowitz JL, Savin NE, Sefton M (1994) Fairness in simple bargaining ex- periments. Games and Economic Behavior 6(3):347-369
- Foxman ER, Kilcoyne P (1993) Information technology, marketing practice, and con- sumer privacy: ethical issues. Journal of Public Policy & Marketing 12(1):106-119
- Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. Journal of Marketing 58(2):1-19
- Gefen D (2000) E-commerce: the role of famil- iarity and trust. Omega 28(6):725-737
- Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Quarterly 27(1):51-90
- Gilbert JA, Tang TLP (1998) An examination of organizational trust antecedents. Public Personnel Management 27(3):321-338
- Goodwin C (1991) Privacy: recognition of a consumer right. Journal of Public Policy & Marketing 10(1):149-166
- Gorn GJ (1982) The effects of music in adver- tising on choice behavior: a classical con- ditioning approach. Journal of Marketing 46:94-101
- Granovetter M (1985) Economic action and social structure: a theory of embed- dedness. American Journal of Sociology 91(3):481-510
- Greenaway KE, Chan YE (2005) Theoretical explanations for firms' information privacy behavior. Journal of the Association for Information Systems 6(6):171-198
- Hinz O, Hann IH, Spann M (2011) Price dis- crimination in e-commerce? An examina- tion of dynamic pricing in name-your-own- price markets. MIS Quarterly 35(1):81-98
- Hosmer LT (1995) Trust: the connecting link between organizational theory and philo- sophical ethics. Academy of Management Review 20(2):379-403
- John LK, Acquisti A, Loewenstein G (2011) Strangers on a plane: context-dependent willingness to divulge sensitive infor- mation. Journal of Consumer Research 37(5):858-873
- Johnson EJ, Tversky A (1983) Affect, gener- alization, and the perception of risk. Jour- nal of Personality and Social Psychology 45(1):20-31
- Kalakota R, Whinston AB (1996) Frontiers of electronic commerce. Addison-Wesley, Reading
- Kee HW, Knox RE (1970) Conceptual and methodological considerations in the study of trust and suspicion. Journal of Conflict Resolution 14(3):357-366
- Kelly H (2013) Twitter hacked; 250,000 ac- counts affected. http://edition.cnn.com/ 2013/02/01/tech/social-media/twitter- hacked/index.html. Accessed 2013-09-23
- Kim DJ, Ferrin DL, Raghav Rao H (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44(2):544-564
- Liu C, Marchewka JT, Lu J, Yu C (2005) Be- yond concern -a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42(1):289-304
- Luo X, Li H, Zhang J, Shim JP (2010) Exam- ining multi-dimensional trust and multi- faceted risk in initial acceptance of emerg- ing technologies: an empirical study of mobile banking services. Decision Support Systems 49(2):222-234
- MacKinlay AC (1997) Event studies in eco- nomics and finance. Journal of Economic Literature 35(1):13-39
- Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Academy of Management Review 20(3):709-734
- McKnight DH, Chervany NL (2001-2002) What trust means in e-commerce customer relationships: an interdisciplinary concep- tual typology. International Journal of Elec- tronic Commerce 6(2):35-59
- McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new orga- nizational relationships. Academy of Man- agement Review 23(3):473-490
- McKnight DH, Choudhury V, Kacmar C (2002) The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems 11(3-4):297-323
- Milberg SJ, Burke SJ, Smith HJ, Kallman EA (1995) Values, personal information, pri- vacy and regulatory approaches. Commu- nications of the ACM 38(12):65-74
- Milberg SJ, Smith HJ, Burke SJ (2000) Informa- tion privacy: corporate management and national regulation. Organization Science 11(1):35-57
- Milne GR, Boza ME (1999) Trust and concern in consumers' perceptions of marketing in- formation management practices. Journal of Interactive Marketing 13(1):5-24
- Morales L (2011) Google and Facebook users skew young, affluent, and educated. http:// www.gallup.com/poll/146159/facebook- google-users-skew-young-affluent- educated.aspx. Accessed 2013-09-23
- Norberg PA, Horne DR, Horne AA (2007) The privacy paradox: personal information dis- closure intentions versus behaviors. The Journal of Consumer Affairs 41(1):100-126
- Pavlou PA, Gefen D (2004) Building effec- tive online marketplaces with institution- based trust. Information Systems Research 15(1):37-59
- Phelps J (2000) Privacy concerns and con- sumer willingness to provide personal in- formation. Journal of Public Policy & Mar- keting 19(1):27-41
- Prosser WL (1960) Privacy. California Law Review 48(3):383-423
- Rotter JB (1971) Generalized expectancies for interpersonal trust. American Psychologist 26(5):443-452
- Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross- discipline view of trust. Academy of Man- agement Review 23(3):393-404
- Schwartz N, Clore GL (1983) Mood, misattri- bution, and judgments of well-being: in- formative and directive functions of affec- tive states. Journal of Personality and Social Psychology 45(3):513-523
- Silveira V (2012) Taking steps to protect our members. http://blog.linkedin.com/2012/ 06/07/taking-steps-to-protect-our- members/. Accessed: 2013-09-23
- Singh T, Hill ME (2003) Consumer privacy and the Internet in Europe: a view from Germany. Journal of Consumer Marketing 20(7):634-651
- Smith HJ, Milberg SJ, Burke SJ (1996) Informa- tion privacy: measuring individuals' con- cerns about organizational practices. MIS Quarterly 20(2):167-196
- Smith HJ, Dinev T, Xu H (2011) Informa- tion privacy research: an interdisciplinary review. MIS Quarterly 35(4):989-1015
- Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review 154(3):477-560
- Spiekermann S, Grossklags J, Berendt B (2001) E-privacy in second generation e- commerce: privacy preferences versus ac- tual behavior. In: Proc 3rd ACM conference on electronic commerce, New York Statman M (1999) Behavioral finance: past battle and future engagements. Financial Analysts Journal 55(6):18-27
- Straub DW, Collins RW (1990) Key informa- tion liability issues facing managers: soft- ware piracy, proprietary databases, and in- dividual rights to privacy. MIS Quarterly 14(2):143-156
- Suh B, Han I (2003) The impact of cus- tomer trust and perception of security con- trol on the acceptance of electronic com- merce. International Journal of Electronic Commerce 7(3):135-161
- Tsai J, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimen- tal study. Information Systems Research 22(2):254-268
- Westin A (1967) Privacy and freedom. Atheneum Books, New York
- Woodman RW, Ganster DC, Adams J, Mc- Cuddy MK, Tolchinsky PD, Fromkin H (1982) A survey of employee perceptions of infor- mation privacy in organizations. Academy of Management Journal 25(3):647-663
- Yoon E, Guffey HJ, Kijewski V (1993) The ef- fects of information and company reputa- tion on intentions to buy a business service. Journal of Business Research 27(3):215- 228
- Zellner A (1962) An efficient method of es- timating seemingly unrelated regressions and tests for aggregation bias. Journal of the American Statistical Association 57(298):348-368