主管:中国科学院
主办:中国优选法统筹法与经济数学研究会
   中国科学院科技战略咨询研究院
Articles

An Empirical Study on Effects of Privacy Setting and Feedback on Mobile Commerce Users' Behavior Intentions

Expand
  • School of Information Management, Central China Normal University, Wuhan 430079, China

Received date: 2016-10-28

  Revised date: 2017-09-04

  Online published: 2018-10-22

Abstract

With the development of internet industry, mobile service providers can easily obtain users' personal information, but privacy protections are relatively weak, leading to the lack of users' perceived privacy control, and further reducing their intention of information disclosure and mobile commerce usage.Thus, it is necessary to explore new privacy protection methods, and evaluate their effectiveness through empirical research.
In this paper, based on the justice theory and the theory of planned behavior, privacy preference setting and privacy feedback in the mobile commerce environment are proposed. To explore their affection to mobile users' intention to disclose personal information and use mobile commerce (referred to as behavior intention), the structure equation model was developed, in which we not only concentrated on our privacy protection methods'direct and indirect effects on mobile users' behavior intention, but also explored their interaction effects to mobile users'perceived control and behavior intention. 172 valid data are collected by conducting 2*2 full factorial experiments, and the data are analyzed using SPSS 21.0 and Smartpls 3.2.4.
The results show that our proposed privacy protection approaches have direct positive impacts on both users' perceived privacy control (referred to as perceived control) and behavioral intentions, and also indirectly influence users' behavior intentions through perceived control. Furthermore,privacy preferencesetting and privacy feedback have a significant negative interaction effect on users' behavior intentions, and privacy feedback has a substitution effecton privacy preference setting.Our research not only has some implications for future research in this field, but also provides some suggestions and guidance for mobile commerce service providers and developers to design effective privacy protection methods.

Cite this article

LIU Bai-ling, YANG Shi-long, LI Yan-hui . An Empirical Study on Effects of Privacy Setting and Feedback on Mobile Commerce Users' Behavior Intentions[J]. Chinese Journal of Management Science, 2018 , 26(8) : 164 -178 . DOI: 10.16381/j.cnki.issn1003-207x.2018.08.017

References

[1] 中国互联网络信息中心(CNNIC). 第38次《中国互联网络发展状况统计报告》[DB/OL.].[2016-08-03]. http://www.cnnic.net.cn/gywm/xwzx/rdxw/2016/201608/W020160803204144417902.pdf.

[2] Culnan M J, Armstrong P K. Information privacy concerns, procedural fairness and impersonal trust:An empirical investigation[J]. Organization Science,1999,10(1):104-115.

[3] Zhang Ruidong, Chen JQ, Lee C J. Mobile commerce and consumer privacy concerns[J]. Journal of Computer Information Systems, 2013,53(4):31-38.

[4] 中国互联网协会(ISC).2015中国网民权益保护调查报告[DB/OL].[2015-07-31]. http://www.miit.gov.cn/n11293472/n11295293/n11633884/n16766090.files/n16766089.pdf.

[5] Boyles, J.L., Smith, A. and Madden, M. Privacy and data management on mobile devices[DB/OL].[2012-09-05].http://www.pewinternet.org/2012/09/05/privacy-and-data-management-on-mobile-devices/.

[6] 王崇, 吴价宝, 王延青. 移动电子商务下交易成本影响消费者感知价值的实证研究[J]. 中国管理科学, 2016, 24(8):98-106.

[7] 陈昊, 李文立, 柯育龙. 社交媒体持续使用研究:以情感响应为中介[J]. 管理评论, 2016,28(9):61-71.

[8] Wang S C, Wu J H. Proactive privacy practices in transition:Toward ubiquitous services[J]. Information &Management, 2014, 51(1):93-103.

[9] Nunns J. Datasift CEO:Making social data consumable[EB/OL].[2015-11-27]. http://www.cbronline.com/news/big-data/analytics/datasift-ceo-making-social-data-consumable-4738572.

[10] Hui K L, Teo H H, Lee S Y T. The value of privacy assurance:An exploratory field experiment.[J] MIS Quarterly,2007,31(1):19-33.

[11] Xu Heng, Teo H H, Tan B C Y, et al. Research note-effects of individual self-protection, industryself-regulation, and government regulation on privacy concerns:A study of location-based services[J]. Information System Research, 2012,23(4):1342-1363.

[12] Xu Heng, Teo H H, Tan B C Y,et al. The role of push-pull technology in privacy calculus:The case of location-based services[J]. Journal of Management Information Systems, 2009,26(3):135-174.

[13] Xu Heng, Dinev T, Smith J, et al. Information privacy concerns:Linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems. 2011,12(12):798-824.

[14] 王洪伟,周曼,何绍义. 影响个人在线提供隐私信息意愿的实证研究[J]. 系统工程理论与实践,2012,32(10):2186-2197.

[15] Zhao Ling, Lu Yaobin, Gupta S. Disclosure intention of location-related information in location-based social network services[J] International Journal of Electronic Commerce, 2012,16(4):53-90.

[16] Wu K W, Huang S Y, Yen D C, et al. The effect of online privacy policy on consumer privacy concern and trust[J]. Computers in Human Behavior, 2012, 28(3):889-897.

[17] Chang Y H, Wong S F, Lee H. Understanding perceived privacy:A privacy boundary management model[C]//Proceeding of the 19th Pacific Asia Conference on Information Systems[C], Singapore, 5-9 July, 2015:78.

[18] 李睿, 张锐剑, 李文立, 等. 移动互联网环境下的隐私泄露容忍度测度方法[J]. 管理评论, 2016, 28(7):102-111.

[19] 吴娜, 李文立, 吕欣, 等. 泄露他人隐私行为意向的影响要素研究[J]. 科研管理, 2015, 36(11):139-147.

[20] King N J. Direct marketing, mobile phones, and consumer privacy:Ensuring adequate disclosure and consent mechanisms for emerging mobile advertising practices[J]. Federal Communications Law Journal, 2008, 60(2):239-247.

[21] Meinert D B, Peterson D K, Criswell J R, et al.Privacy policy statements and consumer willingness to provide personal information[J]. Journal of Electronic Commerce in Organizations, 2006,4(1):1-17.

[22] Liu Yue. User control of personal information concerning mobile-app:Notice and consent?[J]. Computer Law & Security Review, 2014,30(5):521-529.

[23] 李晖,李凤华,曹进,等. 移动互联服务与隐私保护的研究进展[J].通信学报,2014, 35(11):1-11.

[24] 中华人民共和国中央人民政府.《国务院关于深化制造业与互联网融合发展的指导意见》[EB/OL].[2016-05-13].http://www.gov.cn/zhengce/content/2016-05/20/content_5075099.htm.

[25] Tsai J Y, Kelley P, Drielsma P, et al. Who's viewed you?:The impact of feedback in a mobile location-sharing application[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,Boston,MA, USA,April 4-9, 2009:2003-2012.

[26] Hsieh G, Tang K P, Low W Y, et al. Field deployment of IMBuddy:A study of privacy control and feedback mechanisms for contextual IM[C]//International Conference on Ubiquitous Computing. Innsbruck, Austria, September 16-19, 2007:91-108.

[27] Patil S, Schlegel R, Kapadia A, et al. Reflection or action?:How feedback and control affect location sharing decisions[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, Ontario, Canada, April 26-May 01,2014:101-110.

[28] Patil S, Hoyle R, Schlegel R, et al. Interrupt now or inform later?:Comparing immediate and delayed privacy feedback[C]//Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Korea, April 18-23, 2015:1415-1418.

[29] Ajezn I. The theory of planned behavior[J]. Research in Nursing & Health, 1991, 14(2):137-144.

[30] Al-Debei MM, Al-Lozi E, Papazafeiropoulou A. Why people keep coming back to Facebook:Explaining and predicting continuance partici pation from an extended theory of planned behavior perspective[J]. Decision Support Systems, 2013,55(1):43-54.

[31] Ajzen I, Fishbein M. Understanding attitudes and social behavior[M]. Englewood, NJ:Prentice Hall,1980.

[32] Bansal H S, Taylor S F. Investigating interactive effects in the theory of planned behavior in a service-provided switching context[J]. Psychology & Marketing, 2002, 19(5):407-425.

[33] Sutton S. Predicting and explaining intentions and behavior:how well are we doing[J]. Journal of Applied Social Psychology, 1998,28(15):1317-1338.

[34] Colquitt J A, Conlon D E, Wesson M J, et al. Justice at the millennium:A meta-analytic review of 25 years of organiza-tional justice research[J]. Journal of Applied Psychology, 2001,86(3):425-445.

[35] Culnan M J. Consumer awareness of name removal procedures:Implications for direct marketing[J]. Journal of Direct Marketing, 1995,9(2):10-19.

[36] Martinez-Tur V, Peiro J M, Ramos J, et al. Justice perceptions as sredictors of customer satisfaction:The impact of distributive, procedural, and interactional justice[J]. Journal of Applied Social Psychology, 2006,36(1):100-119.

[37] Ashworth L, Free C. Marketing dataveillance and digital privacy:Using theories of justice to understand consumers' online privacy concerns[J]. Journal of Business Ethics, 2006,67(2):107-123.

[38] Culnan M J, Bies J R. Consumer privacy:Balancing economic and justice considerations[J]. Journal of Social Issues, 2003,59(2):323-342.

[39] Sarathy R, Robertson C J. Strategic and ethical considerations in managing digital privacy[J]. Journal of Business Ethics, 2003,46(2):111-126.

[40] Eddy E R, Stone D L, Stone-Romero E E. The effects of information management policies on reactions to human resource information systems:An integration of privacy and procedural justice perspectives[J]. Personnel Psychology, 1999,52(2):335-358.

[41] Thibaut J, Walker L. Procedural justice:A psychological analysis[J]. Duke Law Journal,1975,(6):142-145.

[42] Bies R J. The predicament of injustice:The management of moral outrage[J]. Research in Organizational Behavior, 1987,9(4):289-319.

[43] Kraft P, Rise J, Sutton S, et al. Perceived difficulty in the theory of planned behavior, perceived behavioral control or affective attitude[J]. British Journal of Social Psychology, 2005, 44(3):479-496.

[44] Armitage C J, Conner M. Efficacy of theory of planned behavior:A meta-analytic review[J]. British Journal of Social Psychology, 2001,40(4):471-499.

[45] 张星,陈星,侯德林. 在线健康信息披露意愿的影响因素研究:一个集成计划行为理论与隐私计算的模型[J]. 情报资料工作,2016,37(1):48-53.

[46] 何伟,石永东,俞路平. 团购点评行为意愿影响因素的实证分析[J]. 中国管理科学,2014, 22(SI):8-14.

[47] Rahim M A, Magner N R, Shapiro D L. Do justice perceptions influence styles of handling conflict with supervisors? What justice perceptions, precisely?[J]. International Journal of Conflict Management, 2000,11(1):9-31.

[48] Greenberg J, Folger R. Procedural justice, participation, and the fair process effect in groups and organizations[M]. New York:Springer-Verlag,1983:235-256.

[49] Silva A D S E, Frith J. Locational privacy in public spaces:Media discourses on location-aware mobile technologies[J]. Communication Culture & Critique, 2010,3(4):503-525.

[50] Colquitt J A. On the dimensionality of organizational justice:A construct validation of a measure[J]. Journal of Applied Psychology,2001,86(3):386-400.

[51] Dholakia U M,Bagozzi R P,Pearo L K. A social influence model of consumer participation in network-and small-group-based virtual communities[J]. International Journal of Research in Marketing, 2004,21(3):241-263.

[52] Awad N F, Krishnan M S. The personalization privacy paradox:An empirical evaluation of information transparency and the willingness to be profiled online for personalization[J]. MIS Quarterly, 2006, 30(1):13-28.

[53] Schein E H, Bennis W G. Personal and organizational change through group methods:The laboratory approach[M]. New York:Wiley, 1965.

[54] Barkhuus L, Dey A. Location-based services for mobile telephony:A study of user's privacy concerns[C]//Proceedings ofthe 9th IFIP TC13 International Conference on Human-Computer Interaction, Zurich, Switzerland, 1-5 September, 2003:709-712.

[55] Xu Heng, Dinev T, Smith H J, et al. Examining the formation of individual's information privacy concerns:Toward an integrative view[C]//Proceedings of 29th Annual International Conference on Information Systems, Paris, France, 14-17 December, 2008:1-16.

[56] Eppler M J, Mengis J. The concept of information overload:A review of literature from organization science, marketing, accounting, MIS, and related disciplines[J]. The Information Society, 2004, 20(5):325-344.

[57] Ganesan S, Brown S P, Mariadoss B J, et al. Buffering and amplifying effects of relationship commitment in business-to-business relation-ships[J]. Journal of Marketing Research, 2010,47(2):361-373.

[58] Sharma S, Crossler R E. Disclosing too much? Situational factors affecting information disclosure in social commerce environment[J]. Electronic Commerce Research and Applications, 2014,13(5):305-319.

[59] Li Yuan. A multi-level model of individual information privacy beliefs[J]. Electronic Commerce Research and Applications, 2014,13(1):32-44.

[60] Nunally J C. Psychometric Theory[M]. New York:McGraw-Hill Book Company, 1978.

[61] Bagozzi R P, Yi Y. On the evaluation of structural equation models[J]. Journal of the Academy of Marketing Science, 1998,16(1):74-94.

[62] Fornell C, Larcker D F. Evaluating structural equation models with unobservable variables and measurement error[J]. Journal of Marketing Research, 1981, 18(2):39-50.

[63] Chin W W. Issues and opinion on structural equation modeling[J]. MIS Quarterly,1998, 22(1):7-16.

[64] Ringle C M, Sarstedt M, Straub D W. A critical look at the use of PLS-SEM in MIS Quarterly[J]. MIS Quarterly,2012, 36(1):3-14.

[65] Im G, Rai A. Knowledge sharing ambidexterity in long-term interorganizational relationships[J].Management Science, 2008,54(7):1281-1296.

[66] Carte A T, Russell J C. In pursuit of moderation:Nine common errors and their solutions[J]. MIS Quarterly, 2003, 27(3):479-501.

[67] Chin W W, Marcolin B L, Newsted P R.A partial least squares latent variable modeling approach for measuring interaction effects:Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study[J]. Information Systems Research, 2003,14(2):189-217.

[68] Chomsky N, Foucault M. Human nature:Justice versus power[M]. Ayer A J, Elders F. Rlexive Water:The Basic Concerns of Mankind, London:Souvenir Press, 1974, 133-197.

[69] Belanger F, Crossler R E. Privacy in the digital age:A review of information privacy research in information systems[J]. MIS Quarterly, 2011, 35(4):1017-1041.
Outlines

/