2011
DOI: 10.2307/41409970
|View full text |Cite
|
Sign up to set email alerts
|

Information Privacy Research: An Interdisciplinary Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

34
1,273
1
31

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 1,437 publications
(1,413 citation statements)
references
References 386 publications
34
1,273
1
31
Order By: Relevance
“…Online incivility has attracted significant research interest in recent years, often discussed in the context of "echo chambers" facilitated by selective exposure and group think within homogeneous online communities (Papacharissi, 2004;Rowe, 2015). Finally, there is extensive research on privacy and security threats associated with online participation, including biases in user perceptions of privacy threats and privacy protection behavior (Kokolakis, 2015;Smith, Dinev, & Xu, 2011).…”
Section: Online Participation 11mentioning
confidence: 99%
“…Online incivility has attracted significant research interest in recent years, often discussed in the context of "echo chambers" facilitated by selective exposure and group think within homogeneous online communities (Papacharissi, 2004;Rowe, 2015). Finally, there is extensive research on privacy and security threats associated with online participation, including biases in user perceptions of privacy threats and privacy protection behavior (Kokolakis, 2015;Smith, Dinev, & Xu, 2011).…”
Section: Online Participation 11mentioning
confidence: 99%
“…Particularly, some view privacy loss as the price of acquiring desired benefits (Smith et al, 2011).…”
Section: Self-disclosure and Online Self-disclosurementioning
confidence: 99%
“…Another possible explanation for the inconclusive relationship between personality traits and information privacy concerns as well as usage intention is the contextual nature of information privacy formulation. Smith, Dinev and Xu [16] also raise another important perspective by arguing that since the contextual nature of information privacy may influence the very definition and meaning of information privacy, it may also change its relationship with other constructs.…”
Section: Research Methodsologymentioning
confidence: 99%
“…Secondary use is a concern for how collected personal information is used, either by internal or external party of the organization, or for other purpose other than initial intention. After an extensive interdisciplinary review of past information privacy research, Smith, Dinev and Xu [16] concluded that the dimensions used in the CFIP model are considered some of the most reliable scales in determining concerns towards privacy practices of organisations. Due to the reliability of CFIP and the nature of LBS (IT applications), CFIP model will be used in this research.…”
Section: B Concern For Information Privacy (Cfip)mentioning
confidence: 99%