2013
DOI: 10.25300/misq/2013/37.4.07
|View full text |Cite
|
Sign up to set email alerts
|

Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users

Abstract: Privacy has been an enduring concern associated with commercial information technology (IT) applications, in particular regarding the issue of personalization. IT-enabled personalization, while potentially making the user computing experience more gratifying, often relies heavily on the user's personal information to deliver individualized services, which raises the user's privacy concerns. We term the tension between personalization and privacy, which follows from marketers exploiting consumers' data to offer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

10
263
1
10

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 315 publications
(284 citation statements)
references
References 50 publications
10
263
1
10
Order By: Relevance
“…When they do, privacy concerns are often placed within a debate about the privacy calculus, which is directly related to social exchange theory (Schumann, von Wangenheim, and Groene 2014), acquisition-transaction utility theory (Baek and Morimoto 2012), and information boundary theory (Sutanto et al 2013).…”
Section: Theoretical Positioning Of Obamentioning
confidence: 99%
See 2 more Smart Citations
“…When they do, privacy concerns are often placed within a debate about the privacy calculus, which is directly related to social exchange theory (Schumann, von Wangenheim, and Groene 2014), acquisition-transaction utility theory (Baek and Morimoto 2012), and information boundary theory (Sutanto et al 2013).…”
Section: Theoretical Positioning Of Obamentioning
confidence: 99%
“…Aside from the theories that can be attributed to one of the factors in our framework, some general communication and processing theories are also applied to OBA: human-interaction theory (Ahrens and Coyle 2011), uses and gratifications theory (Sutanto et al 2013), overload theory (Schumann, von Wangenheim, and Groene 2014), and dual process theory (Phelan, Lampe, and Resnick 2016). These theories are helpful in explaining how people process and respond to computermediated communication and specific messages, but they do not seem to be specific to the concept of OBA or our framework.…”
Section: Theoretical Positioning Of Obamentioning
confidence: 99%
See 1 more Smart Citation
“…Ample IS research has focused on the importance of general privacy concerns in driving disclosure behaviour and technology usage (e.g., Awad and Krishnan 2006;Sutanto et al 2013) and emerging studies have revealed the importance of transactional privacy concerns (e.g., Junglas et al 2008;Xu et al 2012). Hence, following past research examining transactional concerns for privacy, this study emphasizes the distinction between general privacy concerns and transactional privacy concerns.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile IS were not new in late 2011 when we called for papers for this issue, but expectations of mobile access to information were not as deeply embedded in organisational and personal routines and practices as they are today. Mobile access is the norm now, as reflected in recent papers that investigate the use of mobile devices and development of mobile services as essential components of the IS environment (e.g., Bang et al, 2013;Kietzmann et al, 2013;Sutanto et al, 2013).…”
Section: Introductionmentioning
confidence: 99%