2011
DOI: 10.2307/41409971
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems

Abstract: Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

12
582
1
21

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 909 publications
(674 citation statements)
references
References 386 publications
12
582
1
21
Order By: Relevance
“…Of these three factors, little research has examined the impact of ethical issues on human computer interaction (HCI) (Zhang & Li, 2005). Privacy research in particular has focused more on concerns for privacy and paid little attention to individuals' ethical decision making and actions to protect privacy (Belanger & Crossler, 2011;Smith et al, 2011) in spite of the fact that privacy violations are considered immoral and sometimes illegal (Moore, 2010). One exception is the privacy model (Black et al, 2015) in which norms about privacy and ethical beliefs about violations therein affect job candidates' behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Of these three factors, little research has examined the impact of ethical issues on human computer interaction (HCI) (Zhang & Li, 2005). Privacy research in particular has focused more on concerns for privacy and paid little attention to individuals' ethical decision making and actions to protect privacy (Belanger & Crossler, 2011;Smith et al, 2011) in spite of the fact that privacy violations are considered immoral and sometimes illegal (Moore, 2010). One exception is the privacy model (Black et al, 2015) in which norms about privacy and ethical beliefs about violations therein affect job candidates' behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, consumers seek to provide the information solely for business transactions [24]. Many would perceive organizations to have the responsibility to ensure users that their information will be kept confidential and there is always the prospect of collected information being sold to third parties.…”
Section: B Cfip and Perceived Riskmentioning
confidence: 99%
“…While new opportunities are emerging to develop technical solutions to issues of data security and privacy, technical fixes alone will not address the very real concerns of private citizens regarding the appropriate control and use of personal data (Bélanger and Crossler, 2011;Krontiris et al, 2010). The QC environment creates an opportunity to explore alternative data collection and use restrictions and controls, ranging from "opt-in," voluntary data collection standards to individual and community ownership of personal and neighborhood-level data, with full control over their use (Mun et al, 2010).…”
Section: Privacy and Data Accessmentioning
confidence: 99%