Future Intention to disclose personal information via mobile apps
DOI:
https://doi.org/10.5007/2175-8077.2021.e67839Resumen
This study analyses the future intention to disclose personal information in order to use mobile applications (apps) and the framing effect in relation to privacy concerns. To test the effects, an experiment was conducted involving 405 participants, using a single-factor design with independent groups and covariates. The results indicate concern about privacy is negatively related to the future intention, confirming the effects of framing on future intention, with the effect being negative in relation to the negative framing of trust beliefs and positive in relation to the positive framing of risk beliefs, while the moderating effect was not confirmed. Thus, this paper contributes to two specific areas: 1) privacy, because it confirms the relationship between information privacy concerns and future intention (new proposed scale); and 2) decision-making, as it demonstrates the effects of framing on risk and trust beliefs in future intentions, which, as far as is known, has not previously been shown.Citas
Aaker, D.A. Kumar, V. and Day, G. S. (2004) Pesquisa de marketing. 2 ed., São Paulo: Atlas, 2004.
Baron, R.M. and Kenny, D. A. (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, Vol. 51, pp. 113-118.
Bélanger, F. and Crossler, R.E. (2011) Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, Vol. 35, No. 4, pp. 1017-1041.
Boniface, D. R. (1995) Experiment Design and Statistical Methods for Behavioural and Social Research. London, UK: Chapman & Hall.
Britto-Da-Silva, V.R. (2015) Preocupação com a privacidade na Internet: uma pesquisa exploratória no cenário brasileiro. Dissertação (Mestrado em Administração e Negócios) – Faculdade de Administração, Contabilidade e Economia (FACE). Pontifícia Universidade Católica do Rio Grande do Sul, Porto Alegre.
Cohen, J. (1988) Statistical power analysis for the behavioral sciences (2 ed.). New Jersey: Lawrence Erlbaum.
Degirmenci, K., Guhr, N. And Breitner, M. H. (2013) Mobile applications and access to personal information: A discussion of users’ privacy concerns. Thirty Fourth International Conference on Information Systems (ICIS). Milan.
Ferrin, D. Kim, P.H. Cooper, C.D. and Dirks, K.T. (2007) Silence speaks volumes: The effectiveness of reticence in comparison to apology and denial for responding to integrity and competence-based trust violations. Journal of Applied Psychology, Vol. 92, No. 4, pp. 893-908.
Hair Jr. J.F. William, B. Babin, B. and Anderson, R.E. (2009) Análise multivariada de dados. 6.ed. Porto Alegre: Bookman.
Hong, W. and Thong, J.Y. (2012) Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies. MIS Quarterly, Vol. 37, No. 1, pp. 275-298.
Kahneman, D. (2011) Thinking, fast and slow. New York: Farrar, Straus and Giroux.
Kahneman, D.P. and Tversky, A. (1979) Prospect theory: an analysis of decision under risk. Econometrica, Vol. 47, pp. 263-292.
Kahneman, D.P. and Tversky, A. (1984) Choices, Values, and Frames. American Psychologist, Vol. 39, No. 4, pp. 341-350.
Laer, T. and Ruyter, K. (2010) In stories we trust: How narrative apologies provide cover for competitive vulnerability after integrity-violating blog posts. International Journal of Research in Marketing, Vol. 27, No. 2, pp. 164-174.
Li, Y. (2014) A multi-level model of individual information privacy beliefs. Electronic Commerce Research and Applications, Vol. 13, No. 32, pp. 32-44.
Malhotra, N.K. Kim, S.S. and Agarwal, J. (2004) Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, Vol. 15, No. 4, pp. 336–355.
Malhotra, N.K. Pesquisa de Marketing: Uma Orientação Aplicada. Porto Alegre: Bookman, 2006.
Mylonas, A. Kastania, A. and Gritzalis, D. (2013) Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, Vol. 34, pp. 47-66.
Petronio, S. (2002) Boundaries of Privacy: Dialectics of Disclosure. Albany: State University of New York Press.
Punch, K. F. (2005) Introduction to Social Research: Quantitative and Qualitative Approaches. Thousand Oaks, California: Sage.
Smith, H. J. Dinev, T. and Xu, H. (2011) Information privacy research: An interdisciplinary review. MIS Quarterly, Vol. 35, No. 4, pp. 989-1015.
Smith, H.J. Milberg, S.J. and Burke, S. J. (1996) Information Privacy: Measuring Individuals' Concerns About Organizational Practices. MIS Quarterly, Vol. 20, No. 2, pp. 167-196.
Stewart, K.A. and Segars, A.H. (2002) An Empirical Examination of the Concern for Information Privacy Instrument. Information Systems Research, Vol. 13, No. 1, pp. 36–49
Stone, E. F. Gardner, D. G. Gueutal, H. G. and Mcclure, S. (1983) A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations. Journal of Applied Psychology, Vol. 68, No. 3, pp. 459-468.
Sutanto, J. Palme, E. Tan, C.-H. and Phang, C.W. (2013) Addressing the personalization–privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Quarterly, Vol. 37, No. 4, pp. 1141-1164.
Tversky, A. and Kahneman, D. (1981) The framing of decisions and the psychology of choice. Science, Vol. 211, pp. 453-458, 1981.
Tversky, A.; Kahneman, D. (1986) Rational Choice and the Framing of Decisions. The Journal of Business, Vol. 59, No. 4, Part 2: The Behavioral Foundations of Economic Theory, pp. S251-S278.
Tversky, A.; Kahneman, D. P. (1974) Judgment under uncertainty: heuristics and biases. Science, Vol. 185, No. 4157, pp. 1124-1131.
Westin, A.F. (1967) Privacy and Freedom. New York: Atheneum, 1967.
Westin, A.F. (2003) Social and political dimensions of privacy. Journal of Social Issues, Vol. 59, No. 2, pp. 431–453.
Winer, R.S. (1999) Experimentation in the 21st century: The importance of external validity. Journal of the Academy of Marketing Science, Vol. 27, No. 3, pp. 349-358.
Xu, H. and Teo, H.H. (2004) Alleviating Consumer's Privacy Concern in Location-Based Services: A Psychological Control Perspective. Proceedings of the Twenty-Fifth Annual International Conference on Information Systems (ICIS 2004), (pp. 793-806). Washington, D. C., United States.
Xu, H. Gupta, S. Rosson, M. B. and Carroll, J. M. (2012) Measuring Mobile Users' Concerns for Information Privacy. Thirty Third International Conference on Information Systems (ICIS). Orlando.
Descargas
Publicado
Cómo citar
Número
Sección
Licencia
El autor deberá garantizar:
- que exista pleno consenso entre todos los coautores para aprobar la versión final del documento y su envío para publicación.
que su trabajo es original, y si se utilizó trabajo y/o palabras de otras personas, estos fueron debidamente reconocidos.
El plagio en todas sus formas constituye un comportamiento editorial poco ético y es inaceptable. RCA se reserva el derecho de utilizar software o cualquier otro método de detección de plagio.
Todos los envíos recibidos para evaluación en la revista RCA pasan por la identificación de plagio y autoplagio. El plagio identificado en los manuscritos durante el proceso de evaluación dará lugar al archivo del envío. Si se identifica plagio en un manuscrito publicado en la revista, el Editor Jefe realizará una investigación preliminar y, de ser necesario, se retractará.
Los autores otorgan a RCA los derechos exclusivos de primera publicación, estando la obra licenciada simultáneamente bajo la Licencia Creative Commons (CC BY) 4.0 Internacional.
Los autores están autorizados a celebrar contratos adicionales por separado, para la distribución no exclusiva de la versión del trabajo publicado en esta revista (por ejemplo, publicación en un repositorio institucional, en un sitio web personal, publicación de una traducción o como capítulo de un libro), con reconocimiento de autoría y publicación inicial en esta revista.
Esta licencia permite a cualquier usuario tener derecho a:
Compartir: copiar, descargar, imprimir o redistribuir el material en cualquier medio o formato.
Adapte: remezcle, transforme y cree a partir del material para cualquier propósito, incluso comercial.
Bajo los siguientes términos:
Atribución: debe dar el crédito apropiado (citar y hacer referencia), proporcionar un enlace a la licencia e indicar si se realizaron cambios. Debe hacerlo bajo cualquier circunstancia razonable, pero de ninguna manera que sugiera que el licenciante lo respalda a usted o su uso.
Sin restricciones adicionales: no puede aplicar términos legales ni medidas tecnológicas que restrinjan legalmente a otros hacer algo que la licencia permite.