IS

Lee, Sang-Yong Tom

Topic Weight Topic Terms
0.556 privacy information concerns individuals personal disclosure protection concern consumers practices control data private calculus regulation
0.273 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.182 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses
0.121 secondary use primary data outcomes objective ways analysis range addresses development purpose budget past outcome

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Hui, Kai-Lung 2 Hann, Il-Horn 1 Png, Ivan P. L. 1 Teo, Hock Hai 1
conjointanalysis 1 expectancy theory 1 field experiment 1 financialreward 1
information request 1 information privacy 1 monetary incentive 1 onlineprivacy 1
Privacy assurance 1 privacy statement 1 privacy seal 1 segmentation 1

Articles (2)

Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. (Journal of Management Information Systems, 2007)
Authors: Abstract:
    The advent of the Internet has made the transmission of personally identifiable information more common and often unintended by the user. As personal information becomes more accessible, individuals worry that businesses misuse the information that is collected while they are online. Organizations have tried to mitigate this concern in two ways: (1) by offering privacy policies regarding the handling and use of personal information and (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information-processing theory of motivation. Information-processing theories, also known as expectancy theories in the context of motivated behavior, are built on the premise that people process information about behavior--outcome relationships. By doing so, they are forming expectations and making decisions about what behavior to choose. Using an experimental setting, we empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In a conjoint analysis exercise, 268 participants from the United States and Singapore face trade-off situations, where an organization may only offer incomplete privacy protection or some benefits. While privacy protections (against secondary use, improper access, and error) are associated with positive valences, we also find that financial gains and convenience can significantly increase individuals' motivational score of registering with a Web site. We find that benefits--monetary reward and future convenience--significantly affect individuals' preferences over Web sites with differing privacy policies. We also quantify the value of Web site privacy protection. Among U.S. subjects protection against errors, improper access, and secondary use of personal information is worth $30.49--$44.62. Finally, our approach also allows us to identify three distinct segments of Internet...
THE VALUE OF PRIVACY ASSURANCE: AN EXPLORATORY FIELD EXPERIMENT. (MIS Quarterly, 2007)
Authors: Abstract:
    This paper reports the results of an exploratory field experiment in Singapore that assessed the values of two types of privacy assurance: privacy statements and privacy seals. We collaborated with a local firm to host the experiment on its website with its real domain name, and the subjects were not informed of the experiment. Hence, the study provided a field observation of the subjects' behavioral responses toward privacy assurances. We found that (1) the existence of a privacy statement induced more subjects to disclose their personal information but that of a privacy seal did not; (2) monetary incentive had a positive influence on disclosure; and (3) information request had a negative influence on disclosure. These results were robust in other specifications that used alternative measures for some of our model variables. We discuss this study in relation to the extant privacy literature, most of which employs surveys and laboratory experiments for data collection, and draw related managerial implications.