The role of privacy in technology acceptance

School of Business and Social Sciences, Aarhus University
Department of Business Administration
The role of privacy
in technology acceptance
The effect of privacy concern on intention to use E-commerce
Master Thesis
Author
: Jasper van Zwieten
Date
: March, 2015
Program
: Msc. Marketing
Supervisor
: Dr. Athanasios Krystallis
Characters
: 131.464
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Abstract
This paper investigates the role that privacy can play in the consumer decisionmaking process for a privacy-sensitive technology. There is a great deal of ambiguity in
privacy literature regarding the manner in which privacy may affect technology acceptance.
This paper concerns itself with investigating discrepancies among works of privacy research
regarding technology acceptance, by means of established behavioral theories. This paper
focuses on the trade-offs between privacy concern and other determinants of E-commerce
acceptance. A conjoint analysis is conducted to find the extent to which privacy, security,
control, perceived usefulness, perceived ease-of-use and price can influence the intention to
use a technology that presents privacy implications, i.e. E-commerce. Accordingly these
variables are investigated in light of the moderating variables: privacy attitude, involvement,
and trust, in order to find how privacy concern can affect the intention to use an Ecommerce site.
Page ii
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Table of Contents
1
Introduction .............................................................. Fout! Bladwijzer niet gedefinieerd.
1.1
2
3
Research question ............................................. Fout! Bladwijzer niet gedefinieerd.
Literature review ............................................................................................................2
2.1
The concept of privacy ............................................................................................2
2.2
Perceived behavioral control ...................................................................................4
2.3
Privacy and attitude ................................................................................................5
2.4
Privacy trade-offs ....................................................................................................8
2.5
The role of involvement .................................... Fout! Bladwijzer niet gedefinieerd.
2.6
The role of trust ....................................................................................................14
Theoretical framework and methodology .....................................................................15
3.1
Conceptual model .................................................................................................15
3.2
Experimental design ..............................................................................................16
3.3
Independent variables...........................................................................................18
3.4
Privacy and the determinants of behavioral intention ...........................................21
3.5
Moderating variables ............................................................................................23
3.5.1 Privacy attitude .....................................................................................................23
3.5.2 Involvement ..........................................................................................................26
3.5.3 Trust .....................................................................................................................29
4
5
Data collection and analysis ..........................................................................................31
4.1
Pre-test .................................................................................................................31
4.2
Data collection ......................................................................................................32
4.3
Respondent base ..................................................................................................32
4.4
Conjoint analysis ...................................................................................................35
4.5
Factor analysis ......................................................................................................37
4.6
Bivariate correlation ..............................................................................................38
4.7
Reliability and cluster analysis ...............................................................................40
4.8
Analysis of variance ...............................................................................................40
4.9
Independent T-test ........................................... Fout! Bladwijzer niet gedefinieerd.
Conclusion and discussion ........................................ Fout! Bladwijzer niet gedefinieerd.
5.1
Recommendations for future research ..................................................................46
6
References ....................................................................................................................47
7
Appendices ............................................................. Fout! Bladwijzer niet gedefinieerd.6
Page iii
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
1.
Introduction
Privacy is a complex subject in consumer behavior research. While privacy has been
the subject of academic examinations for roughly a century, the investigated roles it may
play in the consumer decision-making process are largely unsubstantiated (Smith et al.,
2011). Classic consumer decision-making literature explains that consumers can search for
products after they notice a stimulus that evokes a specific need or desire (Pelsmacker et al.,
2010). For example, in the E-commerce context it could be the case that consumers have
trouble finding a product, and want to have access to a more extensive assortment of
products. Or consumers are unhappy regarding the website’s privacy conduction, and want
to feel more secure regarding privacy protection. Privacy could act as a bottom-line
requirement that consumers want fulfilled in order to make use of the technology. But
referring to privacy as a “bottom-line” requirement might be a bit excessive. Because even
consumers who state to be highly concerned regarding privacy have been found to engage in
behavior that entails privacy implications, despite their stated concerns (Acquisiti and
Grossklags, 2005).
The rise of the information age has caused consumer concerns regarding privacy to
be more evident than ever before (Smith et al., 2011). An American consumer poll showed
that 72% of consumers are concerned regarding privacy by means of corporate surveillance
of their online behavior (Consumers-Union, 2008). The same consumer poll showed that
82% of consumers are concerned regarding security by means of credit card data theft.
Privacy has been found to be the most important factor in consumer evaluations of Ecommerce by a substantial margin (Schaup and Belanger, 2005). Regardless, E-commerce
sales are increasing rapidly. In the U.S. E-commerce sales accounted for 4% of total sales in
2009 (U.S. Census Bureau, 2012), in respect to 1,7% of total sales in 2004 (Schaup and
Belanger, 2005). Despite an abundance of consumer concerns regarding E-commerce
privacy, the popularity of E-commerce is rising rapidly.
The effect of privacy perceptions on consumer behavior has not been properly
established by former privacy research (Norberg et al., 2007; Smith et al., 2011). Privacy is a
complex concept that requires sophisticated techniques to be properly examined (Malhotra
et al., 2004). Therefore, this paper will review the role of privacy in technology acceptance
literature. This paper will focus on technology acceptance via intentions to use an Ecommerce site, due to the availability of literature regarding this context and its tangibility to
consumers. This paper intends to find to what extent stated privacy concerns can affect
behavioral intention in a technology acceptance context, through investigating the role of
privacy in the decision-making process. In order to investigate the role of privacy in the
decision-making process, this paper will focus on the manner in which privacy perceptions
1
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
may satisfy consumer needs or desires in the evaluation of alternatives. To be more specific,
this paper will focus on the extent to which this evaluation can affect behavioral intention, in
light of established behavioral theories.
1.1
Research question
How can privacy concern affect the intention to use an E-commerce website?
2.
Literature review
2.1
The concept of privacy
Privacy literature has not yet properly established the role privacy can play in the
consumer decision-making process (Smith et al., 2011). When we look at privacy in a
technology acceptance context, the most apparent problem is that different works of privacy
research investigating similar notions consider privacy to play a different role in their models
(Breward, 2007; Drennan et al., 2006; Featherman and Pavlou, 2002; Liu et al., 2005; Martins
et al., 2013; McCole et al., 2010; Pavlou, 2003; Shin, 2010; Vijayasarathy, 2004; Ward et al.,
2005). A myriad of conceptualizations regarding what privacy entails and inclines has
resulted in a stream of recent literature that simply attempts to classify our knowledge of
privacy (Lanier and Saini, 2008; Malhotra et al., 2004; Smith et al., 2011). These
classifications expose parameters of the concept of privacy that help to distinguish a
definition of privacy, which can be universally used in empirical investigations of its effects. It
is important that we have a unified view of what privacy is, so that it can be used as a
foundation for current and future research. With a clear definition of privacy it can be
meaningfully related to established constructs such as attitude or behavior, the results of
privacy research can be replicated and build upon, and our knowledge on the effects of
privacy can grow. Marketing research in specific is appointed to understand the factors in
the consumer decision-making process, and must therefore gain a clear understanding of
what privacy is and what role it can play.
Unfortunately, different works of literature maintain different definitions for the
concept of privacy. Naturally research in different streams of literature (i.e. law, sociology or
business) view privacy from different perspectives, but even in the context of consumer
2
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
behavior the concept remains ill-defined. We can see a multitude of perspectives through
which privacy can be investigated; e.g. privacy as a subset of perceived risk (Breward, 2007;
Featherman and Pavlou, 2002; Zhou, 2012), privacy as uncertainty (George, 2002; Pavlou et
al., 2007) or privacy as a security concern (Dallaway, 2007; Ward et al., 2005). For example,
former research regarding perceived privacy risk refers to a fear of losing the data a
consumer provides to online services, namely falling victim to criminal activity in the form of
identity theft (Featherman and Pavlou, 2003). This exposes a security aspect of privacy that
can ultimately be related to a perceived financial risk. However, privacy in the traditional
sense is not necessarily related to this risk. There is a psychological component to privacy
that is innate in human nature. It can be found in our modern society as well as in primitive
cultures, and even in animals (Westin, 1967). This psychological component refers to the
need for a degree of seclusion from social interactivity (Lanier and Saini, 2008). But the type
of privacy concern that is currently most apparant is related to the disclosure and
accessibility of personal information, i.e. information privacy. From a consumer perspective,
information privacy involves the consumer’s sense of anxiety regarding the perceived
exposure and/or accessibility of personally identifiable information (Lanier and Saini, 2008;
Smith et al., 2011).
Information privacy is not necessarily limited to the type of personal information that
can be gathered with, for example, online registration forms. Personal information can refer
to something as simple as an individual’s age, but also to information that is a bit more
difficult to find, e.g. individuals’ biometric data, personal conversations or their product
preferences. But privacy investigations are naturally limited to the techniques available at
the time, so the vast majority of contemporary privacy research focuses on the type of
information that is typically registered for use of online services. Since the security aspect of
privacy is heavily intertwined with this type of personal information gathering, it is
understandable that a great deal of research ignores the distinction between privacy and
security. Security is generally considered to be a main category of consumer’s privacy
concerns (Lanier and Saini, 2008). But security and privacy are two different concepts. When
a company has completely secured the conduction of personal information from other
parties, the company itself can still choose to violate consumer privacy by inappropriately
handling the personal information (Culnan and Williams, 2009). The lack of this distinction
may provide some insight as to why privacy research shows different results for the
investigated manners in which privacy can effect behavior (Breward, 2007; Tan et al., 2012;
Lee and Song, 2013; Smith et al., 2011; Zhou, 2012). This will be discussed in further sections
of the literature review.
The investigation of the behavioral effects of privacy is something that only recent
works of literature are concerned with (Smith et al., 2011). But former privacy research has
found it difficult to investigate actual behavioral effects of privacy concern (Smith et al.,
2011). This may be attributed to privacy being a difficult concept to measure. To account for
this, Smith et al. (1996) have proposed the variable ‘privacy concern’ as a construct related
3
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
to an individual’s anxiety regarding information sharing. The measurement of privacy
concern has helped researchers to conduct empirical studies on the abstract concept of
privacy. Regardless, there is a problem associated to privacy research that makes it difficult
to investigate the relation between respondents’ stated privacy concern and their behavior
(Acquisiti, 2004; Acquisiti and Grossklags, 2005; Jensen et al., 2005). Norberg et al. (2007)
refer to a ‘privacy paradox’, where consumers may voice concern regarding the conduction
of privacy in privacy research, but perform behavior that presents privacy implications
despite their stated concerns. A great deal of privacy research may therefore be incorrect in
assuming that respondents’ stated behavioral intentions for engaging in privacy-sensitive
behavior are valid indicators of their behavior. Consumer privacy research would benefit
greatly from a deeper understanding on the behavioral effects of privacy. Unfortunately, it is
common practice for researchers to investigate the effects of stated privacy concerns on the
dependent variable ‘behavioral intention’ (Smith et al., 2011). This presents a problem for
contemporary privacy research, since a significant portion of our knowledge regarding
privacy may not be valid outside of the research context, and thus cannot be build upon.
Therefore, this paper will investigate the relation between privacy concern and behavioral
intention in light of established behavioral theories.
2.2
Perceived behavioral control
Smith et al. (2011) explain that former privacy research generally presupposes from
the Theory of Reasoned Action (Fishbein and Ajzen, 1975) that behavioral intention can
significantly reflect behavior. Theoretically, this assumption should be a reliable, but if we
further investigate it in light of the constructs of this behavioral theory and privacy concern
we may gain some insight in the problem of this reasoning. Ajzen (1991) identified that
behavioral intention is not a reliable predictor of behavior if consumers perceive they do not
have the ability to perform the desired behavior. Consumers are not only considered to
engage in a specific type of behavior when they perceive it to be the most desirable
alternative, but also because they perceive to have a level of control over attaining the
desired behavioral outcome. Ajzen (1991) constructed the Theory of Planned Behavior as an
improvement of the Theory of Reasoned Action with the addition of the variable ‘perceived
behavioral control’. Perceived behavioral control reflects the extent to which consumers
believe that they are capable of performing the desired behavior. The variable was derived
from self-efficacy theory (Bandura, 1977), but while self-efficacy focuses largely on the
individual’s own perceived aptitude of performing a task, perceived behavioral control takes
external factors into account as much as internal factors. Perceived behavioral control can
therefore be quite a significant explanatory variable for the relation between privacy
concern and behavior. After all, an old study exposed that a majority of consumers (81%)
4
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
believe that consumers in general have no control over the conduction of their personal
information (Budnitz et al., 1998).
The aspect of perceived control in relation to personal information sharing has
commonly been integrated in the investigated variable privacy concern (Lanier and Saini,
2008; Smith et al., 2012). The view of privacy concern as the individual’s perceived control
over the use and distribution of personal information can be dated back as early as the study
of Westin (1967). Perceived control is considered to be a subset of privacy concern since a
perceived lack of control over the conduction of personal information adds to the sense of
anxiety a consumer can feel in respect to privacy (Lanier and Saini, 2008; Phelps et al., 2000).
As such, privacy literature identifies control as a main category of consumers’ privacy
concerns, and commonly investigates control as a subset of the variable privacy concern
(Lanier and Saini, 2008; Martin, 2012; Phelps et al., 2001; Tan et al., 2012; Smith et al., 2012).
But the perceived ability to control information is not necessarily a type of privacy concern,
at least for the definition of privacy as a psychological concept related to information anxiety
(Sheehan and Hoy, 2000; Dinev and Hart, 2004), but could act as a separate variable with a
distinguished effect on behavioral intention (Phelps et al., 2000). Control has also been
suggested to act as an antecedent of privacy concern (Culnan and Armstrong, 1999), but this
relation could not be empirically validated (Dinev and Hart, 2004). Nevertheless, decades of
research that view control as a subset of privacy concerns indicate that the two constructs
clearly are related. However, to the best of our knowledge this relation, or more precisely
this distinction, between the two constructs has not been considered in light of the Theory
of Planned Behavior. This might explain the discrepancy between stated privacy concerns of
respondents and their observed behavior. When respondents state they perceive to have no
control over the conduction of their personal information, privacy concern is generally noted
to be higher. However, according to the Theory of Planned Behavior this infers that these
respondents’ stated behavioral intentions with regards to privacy-sensitive decisions are less
predictive of their behavior (Ajzen, 1991).
2.3
Privacy and attitude
Contemporary privacy literature generally investigates the discrepancy between
behavioral intention and behavior through the concept of bounded rationality (Acquisiti and
Grossklags, 2005; Norberg and Horne, 2007; Smith et al., 2012). It is nearly impossible for a
consumer to acquire and consider all information relevant to making a decision (Simon,
1982). It may be that many consumers engage in behavior that presents privacy implications
while they are not adequately aware of these implications, or simply unable to think of these
implications while making the decision. However, Acquisiti and Grossklags (2005) found that
even when consumers are able to process sufficient information that they are still likely to
engage in behavior with known privacy implications, despite their stated concerns. Acquisiti
5
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
(2004) explains that this may be the case because of hyperbolic discounting, which inclines
that consumers discount the possible future negative effects of engaging in privacy-sensitive
behavior over the immediate benefits. In other words, situational or environmental cues
weigh more importance in consumers’ evaluations of whether to engage in behavior than
their previously held beliefs and related risk perceptions. This exposes that in general the
attitude formation related to privacy concern might be weak (Holland et al., 2002).
An attitude encompasses the individual’s beliefs and emotions toward an attitudinal
object (Fazio, 1986). The concept of attitude specifically refers to the evaluation of an
attitudinal object as derived from held beliefs, e.g. providing personal information always
leads to a loss of privacy, or emotions, e.g. the anxiety related to privacy concern. (Ajzen and
Fishbein, 2000, Fischer and De Vries, 2008; Loewenstein et al, 2007; Slovic et al, 2007). For
example, in the evaluation of the attitudinal object: an E-commerce site that presents
privacy implications, a consumer who is highly concerned regarding privacy is assumed to
evolve a negative attitude towards the site, ceteris paribus. If the attitude is strong and can
be retrieved from the consumer’s memory prior to the behavior, it should serve as a reliable
indicator of behavior (Fazio, 1995). Therefore, the findings of Acquisiti and Grossklags (2005)
show that in general the attitude formation related to privacy concern may be weak. To the
best of our knowledge, former research has not investigated the relation between attitude
strength and privacy concern. Incorporating the concept of attitude strength could however
provide insight as to why the privacy paradox exists. This will be explicated further in this
section.
Literature on the antecedents of privacy concern has not properly established which
factors influence the individual’s privacy concern, i.e. the proposed factors are not
repeatedly confirmed in subsequent studies (Smith et al., 2011). Naturally factors such as
personality differences (Lu et al., 2004; Bansal et al. 2010), demographic differences (Culnan
and Armstrong 1999; Sheehan and Hoy, 2000) or culture (Milberg et al., 2000) can provide
insight as to why one person’s privacy concern differs from another, but the only factor that
can certainly influence the importance of privacy concern in the general consumer decisionmaking process is knowledge. After all, privacy concern regarding a technology can only be
triggered if the consumer is aware that the technology presents privacy implications
(Cespedes and Smith, 1993). When consumers are aware that a technology could present
privacy implications in some manner or form, they still do not necessarily have to consider
these privacy implications to be a threat to their privacy. Consumers have a defined general
attitude towards privacy based on their psychology and value-system, but their expectations
of how privacy ought to be conducted depends on the technology (Martin, 2012). For
example, social network sites such as Facebook are known to share the information of users
and their acquaintances with third parties, which in a different context would likely be seen
as a privacy violation (Hull et al., 2010). These context-dependent expectations are the result
of personal characteristics as well as the perceived attributes of the technology, but are
6
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
influenced by experiences with privacy violations as well as by the evaluation of information
regarding the technology’s privacy implications (Martin, 2012).
Smith et al. (1996) found that experience with privacy violations has a strong effect
on privacy concern. The attributional theory of motivation (Weiner, 1985; Weiner, 2000),
shows that judgments of what caused the emotional response to a former behavioral
outcome can affect future attitudes toward performing similar behavior, it stands to reason
that the attitude formation derived from privacy violations is likely to be strong, given that
they have evoked a strong enough emotional reaction. However, for this to happen the
consumer must receive some form of feedback on the violation (Fazio et al., 2004). Due to
the intricate nature of current data-gathering techniques, many occurrences that consumers
could consider to be privacy violations remain unnoticed. Research also shows that positive
cues are perceived as more significant in the evaluation of a behavioral outcome (Pierro et
al., 2004). In other words, consumers may generally weigh the perceived gains of former
privacy-sensitive behavior as more important than the perceived negative outcomes. In
addition, since privacy violations often occur a long period of time after the consumer has
engaged in behavior, the consumer may not even make a connection between the two
(Norberg and Horne, 2007). These considerations indicate that, while a percentage of people
certainly exists who have formed negative attitudes as the result of experience with privacy
violations, the majority of consumer privacy attitudes regarding a specific technology are
most likely formed through the evaluation of related information.
Negative information, such as is presented by the contemporary popularized media
coverage on privacy violations, is a stronger indicator of an attitude formation than positive
information (Ajzen, 2001; Norberg and Horne, 2007). It is therefore not surprising that many
respondents state to be negative towards privacy conduction in aforementioned works of
privacy research. In addition, attribution theory explains that consumers can have affective
responses in their evaluation toward future consequences of engaging in behavior (Weiner,
2000). For example, a service that requires someone to enter a telephone number before
they can make use of the service could invoke a negative emotional response toward the
service, since consumers might perceive that they could receive unwanted phone calls in the
future. There is no such thing as privacy benefits for engaging in behavior with privacy
implications, i.e. engaging in behavior that requires the consumer to provide personal
information can never protect privacy more than simply not engaging in this behavior.
Therefore individuals are believed to generally base their emotional response to perceived
consequences on evaluations of negative information, such as is presented in the media.
This inclines that consumer attitudes toward general privacy conduction are either negative
or neutral. A case could be made that consumers who have formed a negative attitude
toward general privacy conduction will have a negative attitude toward a specific attitudinal
object with privacy implications as well. However, a general attitude is not a strong predictor
of specific behavior (Schiffman et al., 2009). The findings of Acquisiti and Grossklags (2005)
may be attributed to the fact that this research investigated the behavioral effects of general
7
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
privacy concern. But even an attitude related to a specific attitudinal object is not necessarily
predictive of behavior (Schiffman et al., 2009). Fazio and Zanna (1978) explain that this
relation can be better explained when attitude strength is included as a variable.
A strong attitude is signified by several associations to relevant object evaluations
(Fazio, 1986). For example, individuals who signed up for a social network and accordingly
received unwanted e-mails, phone calls and advertisements, saw their pictures distributed
on other websites and have friends who experienced similar privacy violations, will likely
have a stronger attitude toward the social network’s privacy conduction than individuals
who have only encountered one of these occurrences. Privacy concern will be more deeply
embedded in the mind of consumers with a strong attitude toward privacy. Lavine et al.
(1998) show that a strong attitude is more easily retrieved when an individual evaluates
whether to engage in behavior, whereas a weak attitude is more likely to be formed at the
time of this evaluation. As Holland et al. (2002, p. 869) explain: “strong attitudes guide
behavior, whereas weak attitudes follow behavior in accordance with self-perception
principles.” In other words, a person with a strong negative attitude towards privacy
conduction may choose not to engage in behavior with privacy implications, whereas a
person with a weak negative attitude towards privacy conduction may engage in this
behavior and accordingly adjust their privacy attitude (e.g. I chose to offer my personal
information, hence privacy may not be so important to me) or adjust their view on the
perceived privacy implications of the attitudinal object (e.g. I offered my personal
information on a website that the media has portrayed as privacy endangering, but the
website is probably more reliable than it is portrayed).
2.4
Privacy trade-offs
Support for this can be found in cognitive dissonance theory (Festinger, 1956).
Cognitive dissonance is defined as the psychological discomfort that arises when the
consumer holds two contradictory beliefs when evaluating an attitudinal object (Festinger,
1956; Elliot et al., 1994), e.g. signing up for an e-commerce site saves money and is therefore
desirable, but presents a privacy risk and is therefore undesirable. Cognitive dissonance
typically causes the consumer to try to reduce this discomfort through justification of one of
these beliefs, while ignoring information that supports the contradictory belief (Festinger,
1956; Elliot et al., 1994). The concept of cognitive dissonance indicates there may be a tradeoff between privacy concern and the attributes of the attitudinal object. If consumers are
highly concerned regarding privacy, it is more likely that they will discount the perceived
benefits that the attributes of the attitudinal object provide than consumers who indicate
low privacy concern, who will more likely discount their privacy considerations. On the other
hand, it is also possible that consumers who indicate high privacy concern may discount their
privacy considerations in order to avoid cognitive dissonance. For example, in the
8
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
investigation of the effect of privacy concern in a social networking context, Tan et al. (2012)
found that ‘perceived usefulness’ was a stronger determinant of behavioral intention for
respondents who indicated high privacy concern than for respondents who indicated low
privacy concern.
‘Perceived usefulness’ is a variable from the Technology Acceptance Model (Davis,
1985) that refers to the degree to which consumers believe that the technology will provide
benefits in performing related activities. The Technology Acceptance Model investigates the
effects of the independent variables ‘perceived usefulness’ and ‘perceived ease-of-use’ (a
variable that reflects the degree to which the consumer believes that using the technology is
effortless) on behavioral intention (Davis, 1985). Originally, the TAM investigated these
effects through the mediating variable attitude, but it was found that excluding this variable
did not take away any of the TAM’s explanatory power (Davis, 1989). The TAM has been
confirmed to be a valid model in various technology investigations (Davis, 1989; King and He,
2006; O’cass and Fenech, 2003). Nevertheless, it is not necessarily a reliable predictor for the
acceptance of every technology due to its parsimony (Straub and Burton-Jones, 2007;
Venkatesh, 2000). However, broader models such as the Unified Theory of Technology
Acceptance (Venkatesh et al., 2003; Venkatesh et al., 2012) have the opposite problem of
including too many determinants of technology acceptance, which do not have to be
significant in every context (Attuquayefio and Addo, 2014). While the TAM may be too
generalized to be applied to every technology acceptance case, the constructs ‘perceived
usefulness’ and ‘perceived ease-of-use’ have been stated to capture all relevant beliefs
related to general technology acceptance (Benbasat and Barki, 2007). It has therefore
become common practice to add to the validity of the model by including variables that are
known to play a role in the acceptance of the specific technology that is being investigated
(Ha and Stoel, 2009). However, this does not necessarily alleviate other problems associated
with the TAM. A problem of the TAM is that because of the manner in which constructs are
presented to respondents, studies that investigate technology acceptance with this model
are vulnerable to common methods variance (Straub and Burton-Jones, 2007). In other
words, respondents may answer questions regarding the dependent variable ‘behavioral
intention’ based on previous answers to questions regarding the independent variables
‘perceived ease-of-use’ and ‘perceived usefulness’. If consumers’ actual behavioral
intentions differ from their perceptions regarding e.g. usefulness, these consumers may
state to have a behavioral intention that does in fact align with their previously stated
perceptions in order to avoid cognitive dissonance in their reasoning (Straub and BurtonJones, 2007). The TAM can provide more explanatory power when respondents are asked to
evaluate specific behavioral choices, e.g. “Which E-commerce site would you be most likely
to shop from?”, rather than inquiring the more general notion of whether the respondent
would engage in behavior (Kowalewski et al., 2013; Vijayasarathy, 2004). The common
method variance associated with the TAM can be alleviated by integrating this theoretical
model in a Conjoint Analysis.
9
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
The Expectancy-Value theory (Fishbein, 1963) was one of the first theories to state
that consumers evaluate objects based on a set of beliefs. Each of these beliefs contains an
importance score in the individual’s evaluation process, through which we can determine
the relative prominence of each belief in the consumers’ evaluation of an object. An
effective method for finding the importance of these beliefs in relation to specific products
or services is Conjoint Analysis (Green and Wind, 1975). Conjoint Analysis uses ordinary least
squares estimations to measure the consumers’ evaluations of a set of alternatives with
specified attributes and attribute levels, in order to find the consumers’ utility functions for
each alternative as an aggregate of the part-worth utilities for the attributes. Utility refers to
the perceived ability to satisfy consumer needs or desires, and part-worth utility refers to
the extent to which an attribute can satisfy consumer needs or desires. Conducting a
Conjoint Analysis is fairly representative of actual decision-making, since respondents are
asked to evaluate a set of alternatives. Particularly with the addition of a ‘cheap talk’ script,
i.e. a statement regarding the importance of filling in the questionnaire as realistically as a
real-life decision, the validity of this research method is increased (Carlsson et al., 2005).
Conjoint analysis makes no assumptions about the nature of- and relations between
independent variables, and is therefore a good tool for investigating the perceptions related
to these variables (Bajaj, 1998). Through Conjoint Analysis we can find the trade-offs
consumers make between privacy and the other attributes in their evaluation of the
alternatives. A problem of Conjoint Analysis however is that respondents can only properly
evaluate a limited number of attributes. Conjoint Analysis requires researchers to present a
relatively parsimonious choice-set in order for respondents to take all of the included
attributes in consideration. A general rule-of-thumb of Conjoint Analysis is that respondents
should not be presented with more than six attributes (Green and Srinivasan, 1978).
Therefore, not all perceptions that may influence technology acceptance in a specific case
can be addressed in a Conjoint Analysis. The validity of a Conjoint Analysis is therefore
dependent on the researchers who conduct it, since they have to choose the attributes that
are proposed to provide the most explanatory power for the respondent’s decision-making
process.
Privacy concern in a consumer context is generally considered to consist of the
categories ‘notification’ ‘control’ and ‘security’ (Lanier and Saini, 2008). The proposed
categories refer to the manner in which privacy conduction is perceived by the consumers.
For example, notification refers to consumer’s beliefs that they are properly informed on the
collection and use of personal information by the company (Lanier and Saini, 2008). This
paper concerns itself with investigating the importance of attributes related to the
psychological component of privacy, as well as security, control, perceived usefulness and
perceived ease-of-use, in order to reflect the most important considerations regarding
privacy in a technology acceptance context. The privacy attribute will include considerations
regarding the notification construct. The attributes are derived from privacy literature and
technology acceptance literature (i.e. Technology Acceptance Model) in relation to Ecommerce acceptance literature (Schaup and Belanger, 2005; Chen et al., 2010), and will be
10
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
further discussed in the section ‘Independent variables’. But even if the most detrimental
attributes for the research context are chosen, it is unlikely that they will reflect the full
extent of all perceptions related to an attitudinal object. The limitation regarding the
amount of attributes to be presented in a Conjoint Analysis research causes this method to
be dependent on the research context. But the study of Martin (2012) found that consumers
form judgments based on similar factors of similar importance in the evaluation of privacysensitive technologies across different contexts. Hence, this context-dependent method of
investigation can expose the role privacy concern plays in the consumer decision-making
process regarding a broader context than solely the specific context of this investigation.
In order to determine how privacy considerations can affect behavioral intention in a
technology acceptance context, we will also investigate how they affect the determinants of
behavioral intention. The principal-agent problem can provide insight on the effect of
privacy concern on these determinants. The principal-agent problem occurs when one party
(agent) holds more information than another party (principal) for which the first party
(agent) is capable of making decisions (Akerlof, 1970; Arrow, 1963; Eisenhardt, 1989). It is
therefore representative of the issue a consumer faces when offering privacy-sensitive
information to a company. Former research has related the principal-agent problem to
privacy concern in E-commerce (George, 2002; Pavlou et al., 2007). These works of research
have found significant relations between privacy concern and the formation of attitudes
regarding online purchasing, which affect behavioral intention. Pavlou et al. (2007) state that
privacy concern only influences attitudes regarding the company and not the product’s
perceived quality. Consumers who indicate high privacy concern can decide not to buy a
product regardless of quality perceptions. Perceived quality, as defined by Zheitaml (1988),
refers to the product attributes through which a consumer judges competitive advantage.
For example, when a consumer evaluates two products which are perceived as exactly
similar except for their perceived usefulness and perceived ease-of-use, the consumer will
most likely prefer the product that is perceived to provide the most performance benefits or
is the most effortless in usage. While privacy concern can certainly have an effect on
behavioral intention in this example, this effect is considered to relate to judgments
regarding the seller of the product rather than judgments regarding the product’s
advantages. This exposes that privacy concern does not have a direct effect on the
determinants of technology acceptance.
While privacy concern is unlikely to directly affect these determinants, as
aforementioned it may still play a moderating role in their effects on behavioral intention.
The research of Tan et al. (2012) found the following moderation effects: for privacy
concerned consumers ‘perceived usefulness’ is a stronger determinant of behavioral
intention and ‘perceived ease-of-use’ is a weaker determinant of behavioral intention, in
respect to consumers who are not concerned about privacy. However, the study of Im et al.
(2008), who investigated privacy as a subset of perceived risk across various types of
technology, found that these relations occur in the opposite direction. This discrepancy may
11
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
be explained by the difference in scope of the concepts privacy concern and perceived risk.
Whereas perceived risk is a broad concept including several risk attributes related to a loss
(e.g. financial or psychological), privacy concern as defined by Tan et al. (2012) refers to the
risk evaluation of privacy implications. Im et al. (2008) used former literature to find the
parameters of perceived risk. But former literature regarding perceived risk usually
investigates the effect of perceived risk as a whole rather than the individual effects of the
subsets of perceived risk (Featherman and Fuller, 2003; Im et al., 2008; Martins et al., 2013).
However, Featherman and Pavlou (2003) confirmed that there is a high degree of collinearity
among risks related to a physical loss, such as a financial loss, and among risks related to a
psychological loss, such as a loss of personally identifiable information. It could be that these
types of risk perceptions influence the decision-making process in different manners in
certain cases. Studies that investigate the effects of privacy and security separately show
that their effects can be different (Belanger et al., 2002; Pavlou et al., 2007; Vijayasarathy,
2004). Nevertheless, former research can regard privacy concern and security concern as
constructs which are too similar to be investigated separately (Urban et al., 1999), leading to
a lack of a distinction between the two constructs in privacy investigations (McCole et al.,
2010). Other works of privacy research that do distinguish between the two constructs tend
to investigate the effect of privacy- and security concern on a mediating variable (e.g.
anxiety, trust, perceived risk), and the effect of that variable on attitude or behavioral
intention (Pavlou et al., 2007; Zhou, 2012). This may be the case because former research
either cannot find a direct relation between privacy concern and indicators of acceptance
(McKnight et al., 2011; von Stetten et al., 2011; Tan et al., 2012), or states that the results of
such a finding bear no validity outside of the research context due to the privacy paradox
(Smith et al., 2011). However, the construct of perceived risk is not afflicted by the same
problem (Glover and Benbasat, 2011; Pavlou, 2003; Zhou, 2012). Perceived risk is a wellestablished construct that can affect the consumer in clear and distinct manners. The
financial risk associated to identity theft for example provides a clear causal relation
between providing personal information and a security violation. An invasion of privacy on
the other hand is less well-defined, and likely to be less well-understood. The study of
Belanger et al. (2002) found that a consumer’s perception regarding the implemented
security features on an e-commerce site is significantly more important for explaining
behavioral intention than the perceived presence of privacy seals or privacy statements.
However, perceived security features were also found to be significantly more important
than the presence of security statements (Belanger et al., 2002). These findings are
important to this paper for two reasons: Firstly, they indicate the significance of investigating
security and privacy as distinct constructs. Secondly, they indicate that we have to define the
privacy attribute as a clear and tangible construct, rather than the more common method to
be found in privacy research, which is to investigate the perceived importance of privacy
seals or statements. This will be further discussed in the section ‘Independent variables’.
12
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
2.5
The role of involvement
The difference in the findings of the studies of Tan et al. (2012) and Im et al. (2008)
may also be explained by the context of investigation. Even though registering for a social
network remains to be an interesting area of investigation for privacy concern, the barriers
for this decision are relatively low compared to other online services. In comparison to
online services with higher perceived risk elements, the social networking context is one that
can be signified by relatively low involvement.
Involvement refers to the consumer’s perception of the product’s intrinsic
importance (Howard and Sheth, 1969). The Elaboration Likelihood Model (Petty and
Cacioppo, 1986) indicates that having the motivation to evaluate a decision can be just as
important as having the ability to evaluate a decision. If consumers are not involved with a
behavioral decision, they may simply base their behavior on emotionally appealing stimuli
rather than a carefully considered evaluation of the available information (Petty et al., 1983).
On the other hand, when consumers are highly involved in the purchase decision, they are
more likely to actively search and analyze relevant information in order to avoid making the
wrong decision. Highly involved consumers form attitudinal changes through found and
retrieved information aimed at cognitive justification, rather than emotional justification.
The strong attitudinal change associated with this cognitive justification process is a more
reliable predictor of behavior than the weak attitudinal change that ensues from the
evaluation of emotionally appealing stimuli (Petty et al., 1983). If a consumer is highly
concerned regarding privacy, but not involved in the specific behavioral decision that entails
privacy implications, the consumer may not care to find, retrieve or analyze information
regarding these privacy implications. Therefore, privacy concern may not be a reliable
predictor of behavior if we ignore the role of involvement. Unfortunately, the role of
involvement is rarely investigated in privacy literature. Akhter (2014) found that consumers
who are involved with the internet as a whole are generally less concerned regarding
privacy. Pavlou et al. (2007) found that purchase involvement plays a moderating role
between the uncertainty of engaging in online shopping behavior (to which privacy concern
is a subset) and behavioral intention, in the sense that it strengthens its negative relation.
But to the best of our knowledge, former research has not investigated the difference in the
direct relations between privacy concern and behavioral intention for consumers who
indicate different levels of involvement.
13
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
2.6
The role of trust
Another variable that could affect the privacy-behavior relation is trust. We can
relate trust to privacy concern through ‘moral hazard’. The theory of moral hazard indicates
that the seller of a privacy-sensitive product may be inclined to inappropriately handle the
consumer’s private information if they have a financial incentive, since these actions are
difficult to observe by the consumer (Holmstrom, 1979). If the consumer is aware of this
when evaluating the purchase decision, anxiety may arise. This anxiety results from a lack of
trust towards the information provided by the seller before purchase and their perceived
actions post-purchase (Akerlof, 1970; Arrow, 1963). The literature has investigated the
relation between privacy and trust in several manners (Breward, 2007; Smith et al., 2011).
Former literature often cannot find a direct relation between privacy concern and behavioral
intention (McKnight et al., 2011; von Stetten et al., 2011; Tan et al., 2012). Trust is suggested
to act as a mediating variable, i.e. privacy concern affects trust, which in turn affects
behavioral intention (Breward, 2007; Eastlick et al., 2006; Smith et al., 2011). There is strong
support for these relations in the context of e-commerce (Liu et al., 2005). But the literature
exposes that the relation between privacy concern and trust is not necessarily a one-way
stream (Breward, 2007; Pavlou et al., 2007; Schoenbachler and Gordon, 2002; Smith et al.,
2011). Trust can mitigate the concerns a consumer has regarding privacy (Pavlou et al., 2007;
Schoenbachler and Gordon, 2002). Companies can easily signal that they handle private
information in an acceptable manner, which would generally help to alleviate privacy
concerns (Culnan and Armstrong, 1999; Milne and Boza, 1999; Xu et al., 2010). If consumers
trust E-commerce companies, than their privacy concerns can be mitigated by these signals
(Milne and Boza, 1999; Pavlou et al., 2007). Therefore, stated privacy concerns may not be
significant predictors of behavioral intention for consumers who trust E-commerce
companies.
14
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
3.
Theoretical framework and methodology
3.1
Conceptual model
Figure 1 portrays the proposed conceptual model that will be used to investigate the
role of privacy in the decision-making process regarding technology acceptance in an Ecommerce context. A total of 18 hypotheses are investigated, which are conglomerated into
4 hypotheses for clarity purposes. The conglomerations relate to the hypotheses’ main
variables of investigation. The variables, their proposed relations, and methods of
investigation will be defined in the following sections.
15
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
3.2
Experimental design
This paper will present respondents with a number of profiles regarding alternatives
of a hypothetical E-commerce website. E-commerce is a rather broad concept, but any
specific characterization of the website of investigation (e.g. online clothing retail, gadgets or
specialized goods) may cause respondents to evaluate the profiles based on a set of specific
privacy expectations that are not necessarily representative of E-commerce in general.
Extensive E-commerce websites, such as Amazon.com, could prove to be applicable to an
investigation of this nature. However, due to their presence in the mind of the consumer
these might induce bias. The companies may already have an established association with
privacy in the mind of the consumer, for example due to the company image or media
attention (Morran, 2011). Or different effects related to the company could distort the
accuracy of the investigated relationship, e.g. country of origin. The presented profiles will
not contain any brand names or distinguishing factors other than the attributes related to
privacy concern and technology acceptance, i.e. the presented profiles are nothing more
than combinations of the attributes. Behavioral intention therefore refers to the intention to
use a combination of these attributes in the evaluation of E-commerce websites. Through
this manner of investigation we focus on the attributes’ relative explanatory power of
behavioral intention.
We use a traditional conjoint analysis in order to discover the relative importance of
the attributes. A choice-based conjoint analysis or an adaptive conjoint analysis can arguably
reflect the consumer decision-making process in manners that are even more representative
of actual decision-making (Backhaus et al., 2007). However, since the focus of the analysis
lies with the attributes and their relative importance for explaining behavioral intention, a
traditional conjoint analysis is chosen. Eight profiles regarding alternatives for an Ecommerce site will be presented to respondents (see appendix B), so they can rate their
likeliness to use them. Rating methods in Conjoint Analysis are effective for finding choice
probabilities of the alternatives, and giving quantitative representations of the importance
of the investigated attributes for predicting behavioral intention (Louviere, 1998). The partworth utilities of the attributes will reflect how important consumer perceptions related to
privacy concern and determinants of technology acceptance are, when consumers evaluate
alternatives for a technology that present privacy implications. With the part-worth utilities
we can determine the coefficients of the independent variables, i.e. the quantitative value of
the attribute for determining utility. The coefficients will accordingly be tested for a set of
moderating variables that are proposed to influence the relations between these attributes
and behavioral intention.
Each of the attributes will contain two levels for consumers to evaluate. It can be
argued that more levels would allow us to find more predictive estimations of the
investigated relations, however, two levels were chosen for the following reasons: Firstly,
16
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
two levels for the attributes allows us to keep the profiles parsimonious. Six attributes with
two levels can be investigated through a fractional factorial design of eight profiles. Hence,
all respondents can evaluate all profiles of the fractional factorial design without bias
induced from the required number of evaluations. Secondly, this design is both balanced and
orthogonal, thus it can accurately investigate main-order effects. Thirdly, two levels for the
attributes allows us to keep the presentation of information regarding the attributes
relatively parsimonious as well, thus increasing the likelihood that consumers will take all
presented information into account. A case can be made that we should include more levels
for the important variables of investigation, as well as for the metric variable of price.
However, this might induce bias through the ‘number-of-levels effect’, inclining that
respondents would assign more weight to attributes with more levels (Steenkamp and
Wittink, 1994). In addition, even adding one extra level (or two levels in order to keep the
design balanced) to an attribute would incline that we have to investigate a fractional
factorial design of 16 alternatives. This is considered too many alternatives for all
respondents to give reliable estimates. There are manners to reduce the number of
presented alternatives, such as removing profiles that represent trivial choices, for example
a profile that has none of the innovations and no price reduction. Another method is to
create a block design where the presented profiles of the full experimental design are
divided among respondents. However, these methods can respectively have problems
regarding the reduction of the orthogonality of the design, or the reliability of the
measurement depending on the heterogeneity of respondents. Particularly since we will
investigate the variables in light of the respondent base’s heterogeneity (see section:
Moderating variables), we propose to investigate no more than two levels for each attribute.
The hypothetical manner of investigation presents consumers with relatively novel
innovations to an E-commerce site. This inclines that the evaluations consumers make will
be representative of more general technology acceptance cases. Respondents are more
likely to rely on evaluations of the alternatives rather than on heuristics in order to make a
decision, so we can effectively investigate the proposed trade-offs. However, the technology
can only be perceived as novel in relation to existing E-commerce sites. The respondent base
will only consist of individuals who have shopped online in some manner or form. This allows
us to define parameters for the proposed attributes, as well as reduce biased results from
individuals who do not have enough prior knowledge to make an evaluation in this context,
or for who the subject of investigation is simply not personally relevant. Due to the familiar
setting, consumers are presumed to have established expectations regarding how privacysensitive information ought to be conducted (Martin, 2012). Therefore respondents are
considered to evaluate the attributes based on established expectations regarding Ecommerce privacy conduction, that are not limited to the hypothetical context of
investigation. The investigated trade-offs are considered to bear validity outside of the
research context and may be extended beyond the hypothetical scope of this research.
17
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
3.3
Independent variables
In order for this research to representatively reflect the effect of privacy perceptions
in the consumer decision-making process, we must determine attributes that are
detrimental for these perceptions in an e-commerce context. This paper distinguishes the
psychological component associated with privacy from control and security perceptions, and
investigates these three categories of privacy concern as distinct attributes. An important
consideration in the presentation of these attributes is that it must have a neutral tone-ofvoice. Since respondents are susceptible to social desirability bias in privacy investigations,
they are assumed to be influenced by emphasis on benefits or drawbacks of the presented
attributes.
To representatively reflect the trade-offs between privacy, security, control and the
determinants of technology acceptance, we must also determine attributes that are
detrimental for perceived usefulness and perceived ease-of-use in this context. Lastly, in
order find meaningful trade-offs we must develop representative profiles that include the
notion of price. This section will explicate the proposed attributes.
Privacy will be investigated as software that collects and distributes browsing habits.
We address the most detrimental dimension of privacy concern investigations, outside of its
control, security and awareness aspects, by focusing on the collection of personal
information (Lanier and Saini, 2008; Malhotra et al., 2004; Smith et al., 2011). Presenting
respondents with an attribute regarding personal information collection provides them with
awareness of privacy implications, and allows respondents to have the ability to make a
carefully considered evaluation on the importance of privacy for their decision. Thus we can
examine the effect of privacy on behavioral intention in light of the examination of Acquisiti
and Grossklags (2005), who found that even when consumers have the opportunity to
adequately process information, privacy concern may not play a significant role in the
decision-making process. However, if we were to make consumers completely aware of the
full extent of the privacy implications than we would ignore an important aspect of privacy
concern. Awareness itself is a passive dimension of privacy concern (Malhotra et al., 2004),
i.e. consumers can be concerned that they are not properly notified regarding the use of
their personal information (Lanier and Saini, 2008). We can address this dimension of privacy
concern in the privacy attribute with the inference that personal information will be
distributed to secondary parties. The original scale for measuring privacy concern
incorporates secondary use as a main dimension of privacy concern (Smith et al., 1996). By
including this inference respondents are more likely to connect the collection of personal
information to privacy implications, whereas if this is not included in the privacy attribute
respondents may assume that companies intend to collect personal information solely for
consumers’ benefit. Respondents may still assume that personal information is collected
18
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
solely for their benefit, but since no information associated to any benefit is provided this is
considered to reflect a low sense of anxiety regarding personal information. The type of
personal information that we investigate is browsing habits, i.e. consumer’s search
results/activity on the E-commerce site. Schaup and Belanger (2005) found that the
presence of ‘cookies’, i.e. browsing habit registration software, was significantly more
important to consumers’ evaluation of E-commerce site attributes than any other
determinant of privacy. We focus on the collection of browsing habits because it adheres to
a distinct definition of personal information that is not associated with security implications,
i.e. if the collection of browsing habits is important to consumers, this reflects that the
aforementioned psychological component of privacy is important to the consumer decisionmaking process rather than, for example, the sense of anxiety related to a possible financial
risk.
Security will be investigated as software that encrypts financial information. By
distinguishing financial information from personal information we provide a clear distinction
between the concepts of privacy and security. Information encrypting is a fairly wellunderstood concept that translates easily into an attribute. It has been found to be the most
important aspect of security for consumers who value security (Chen et al., 2010). An
attribute related to the encryption of data is more important in explaining behavioral
intention for consumers who are less knowledgeable regarding information technology with
regards to consumers who have expertise in this aspect, but this is believed to be the case
because consumers with expertise are capable of judging the security of a website for
themselves (Chen et al., 2010). Due to the nature of our research, respondents cannot judge
the security of the website by any other factor than the security attribute. Therefore the
security attribute is believed to be reflective of security perceptions for both consumers with
expertise and those who have little knowledge regarding security features.
Control will be investigated as software that enters codes in personal information
which allow users to restrain the use and distribution of this information. An important
consideration for the attribute is that it mentions that these codes are linked to the user
accounts, and that the involved companies have no control over it. In this manner of
investigation we reflect important considerations of the control aspect of privacy, namely
the importance for consumers to feel a sense of control over the collection and distribution
of personal information (Milne and Boza, 1999; Phelps et al., 2010). The control attribute
refers to the relatively vague term ‘personal information’ so that it is distinct from the terms
‘browsing habits’ and ‘financial information’ as examined in the privacy and security
attributes respectively. The most important consideration for the control attribute is that it
relates to the psychological component of the consumers’ need for control, and that it
reflects the ability to exert control in a privacy context. The generality of the term ‘personal
information’ may therefore help address the need for control regarding the general
conduction of personal information rather than address a need for control regarding specific
types of personal information.
19
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Perceived usefulness will be investigated as search software that allows the website
to have an extensive product assortment. There are a number of factors that may influence
the perceived usefulness of an e-commerce site, but the most important one for the stated
satisfaction of consumers is product assortment (Schaup and Belanger, 2005). While this
paper does not investigate satisfaction, consumer responses regarding e-commerce
determinants of satisfaction reflect that this attribute, in comparison to other presented
attributes, may be the most important attribute in their perception regarding why they
would use a particular e-commerce site in light of the alternatives. The findings of Schaup
and Belanger (2005) reflect that a consumer considers an extensive product assortment to
be the greatest benefit of the website (with the exclusion of privacy protection), specifically
when the product assortment contains seasonal and specialty goods. By presenting an
attribute that addresses the greatest perceived benefit of e-commerce sites we address the
most significant determinant of its perceived usefulness.
Perceived ease-of-use will be investigated as a user-friendly interface with improved
search capabilities that allow for easy location of products. Ease of shopping is undoubtedly
an advantage of e-commerce sites in comparison to traditional shopping methods, but in
comparisons of alternative websites consumers may only perceive subtle differences in
ease-of-use. The most reflective dimension of ease-of-use in comparisons of alternative
websites would be the user-friendliness of the interface. But particularly for consumers who
are convenience-oriented, the search capabilities of the site are deemed more important
than the interface (Chen et al., 2010). Therefore, in order to capture the largest explanatory
power for perceived ease-of-use, we integrate the user-friendliness of the interface with
enhanced search capabilities.
Price will be investigated as an investment in the distribution network that allows the
company to offer products for an average of 8% less than its main competitors. The cost of
products is undoubtedly an important factor for explaining behavioral intention in a
consumer technology acceptance context (Brown and Venkatesh, 2005; Venkatesh et al.,
2012). Even though the cost of products is not generally considered to be a detrimental
attribute in the evaluation of e-commerce sites (Chen et al., 2010; Schaup and Belanger,
2005), it is one of the most well-established variables known to have an effect in the
decision-making process. Price is traditionally considered as a perceived sacrifice that
consumers weigh against the perceived benefits of a product or service (Zheitaml, 1988),
and is therefore important for examining the trade-offs in the decision-making process. The
magnitude of the price differential has been decided upon based on informal interviews
conducted in the pilot study. Several respondents were asked if they considered other
respondents to base their answers solely on price, if these were presented with a price
differential of 5%, 10% or 15%. These findings showed that 5% was not considered a
noteworthy price differential, whereas 10% was already considered large enough for some
respondents to base their answers solely on price. In addition, if the price differential was
considered too extensive this may distort stated behavioral intentions, since the perception
20
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
of low prices can negatively influence quality perceptions (Dodds et al., 1991; Zheitaml,
1988). We account for this with a plausible reason for the price differential, i.e. an
investment in the distribution network.
3.4
Privacy and the determinants of behavioral intention
By implementing the independent variables in a conjoint analysis, this paper aims to
discover to what extent the psychological component related to privacy concern, and its
control and security aspects, can influence behavioral intention. When privacy is
investigated as an attribute in a conjoint analysis regarding the E-commerce context, it was
found that privacy is the most important factor in their evaluations by a substantial margin
(Schaup and Belanger, 2005). However, we present privacy as a distinguished tangible
attribute that respondents as to which consumers are required to evaluate its importance
for explaining behavioral intention in relation to other distinguished attributes. Rather than
investigating the perceived importance of privacy, we investigate the consumer utility of
mitigating the psychological anxiety related to information privacy. We propose that due to
the specificity of this method of investigation, privacy will not be the most prominent
determinant of behavioral intention in the consumer decision-making process.
H1a. Privacy is not the strongest determinant of behavioral intention.
While the previous hypothesis may be interesting for future research investigating
the importance of privacy for E-commerce acceptance, it is fairly straight-forward, and not
particularly meaningful for future privacy research. The main focus of this paper lies with the
privacy concern construct. It would be more meaningful to investigate the importance of
privacy in relation to security. As explicated in section 2.4 (privacy trade-offs), the financial
risk related to security provides a clearer causal relation between sharing personal
information and loss. We propose that security is therefore a stronger determinant of
behavioral intention than privacy. In case H1a is confirmed, and security is not the strongest
determinant of behavioral intention, we propose the following addition to H1a:
H1a\2. Privacy is a weaker determinant of behavioral intention than security
Accordingly this paper intends to investigate the adequacy of the privacy concern
construct in privacy investigations. This paper proposes that privacy, security and control
affect behavioral intention in distinct manners. A maximum likelihood factor analysis will be
conducted on the coefficients of the attributes in order to identify the structure among the
independent variables ‘privacy’ ‘security’ and ‘control’. Through this manner of investigation
21
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
we can discover if these attributes measure the same latent construct. If privacy, security
and control are subsets of the higher abstraction construct ‘privacy concern’, the variables
should influence behavioral intention in a similar manner (i.e. the coefficients for privacy,
security and control correlate lowly (-0.3 < r < 0.3) to the same latent factor(s)). Therefore, if
the factor analysis shows that the privacy coefficient does not relate to the same latent
construct as security or control, this would indicate that these variables do not affect
behavioral intention in a similar manner in the consumer decision-making process. We
propose:
H1b. The privacy coefficient and security coefficient do not correlate highly to the
same latent factor(s).
H1c. The privacy coefficient and control coefficient do not correlate highly to the same
latent factor(s).
The research of Tan et al. (2012) found the following effects: for consumers who
indicate high privacy concern ‘perceived usefulness’ is a stronger determinant of behavioral
intention while ‘perceived ease-of-use’ is a weaker determinant of behavioral intention, in
respect to consumers who indicate low privacy concern. In other words, consumers’
indicated degree of anxiety related to personal information disclosure is positively related to
the strength of the variable ‘perceived usefulness’s effect on behavioral intention and
negatively related to the strength of the variable ‘perceived ease-of-use’s effect on
behavioral intention. Support for this can be found in the study of Li and Unger (2012), who
found that for online services that use personalization technologies, i.e. presenting products
or offerings tailored to customers’ needs, customers who have fallen victim to an invasion of
privacy in the past considered the benefits that this technology brought to performance
were less important. As mentioned in section 2.3 – Privacy attitude, consumers with
negative privacy experiences are more likely to feel a higher degree of anxiety toward future
privacy-sensitive behavior.
However, as explicated in section 2.4 – Privacy trade-offs, the trade-offs discovered
by Tan et al. (2012) are not necessarily valid outside of the research context. One
explanation for this is the breadth of the privacy concern construct. This paper intends to reexamine the findings of Tan et al. (2012) in an E-commerce context, by investigating their
findings for the effect of the psychological component of privacy. Since the coefficient of
privacy reflects the strength of the anxiety related to consumers’ personal information
disclosure, and the coefficients of perceived usefulness indicates the relation between
perception of usefulness and behavioral intention, we propose the following hypothesis to
investigate the findings of Tan et al. (2012):
H1d: The privacy coefficient is positively related to the perceived usefulness
coefficient.
22
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Similarly to the findings of Featherman and Fuller (2003), Tan et al. (2012) state that
the effect of perceived ease-of-use on behavioral intention is lower (statistically
insignificant) for those who indicate high privacy concern in respect to those who indicate
low privacy concern. However, considering we assume the relation between privacy and
perceived usefulness to be positive, these findings are quite counter-intuitive. Due to
cognitive dissonance, it seems more likely that consumers who indicate a high degree of
anxiety toward privacy will either discount all perceived benefits of the technology in their
evaluations, in respect to consumers who indicate a low degree of anxiety toward privacy, or
will favor all benefits over privacy. If we consider the aforementioned findings to be
unrepresentative, than there is little confirmation regarding the direction of this trade-off.
Therefore we simply propose to go with our intuition and state that, similarly to perceived
usefulness, there will be a positive relation between the coefficients.
H1e: The privacy coefficient is positively related to the perceived ease-of-use
coefficient.
Lastly, we will investigate the privacy-price relationship. We propose that, due to
cognitive dissonance, the perceived benefit of a lower price plays a less important role for
consumers who show a high degree of anxiety toward a loss of personal information.
H1f: The privacy coefficient is positively related to the price coefficient.
3.5
Moderating variables
The moderating variables act as segmentation criteria for the respondent base. We
can use the respondent base’s heterogeneity in order to investigate if, and how, personal
factors may influence behavioral evaluations in a privacy context. This can be done by
analyzing the difference in the coefficients for the segments. This section will explicate the
moderating variables, and propose a set of hypotheses to help answer the research
question.
3.5.1 Privacy attitude
Traditionally, privacy research investigates the construct ‘privacy concern’ in order to
empirically investigate the abstract concept of privacy, and relate it to established constructs
such as behavioral intention. The construct typically includes an evaluative component. The
23
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
literature tends to express this through either the relation between ‘privacy awareness’ or
‘privacy knowledge’ and privacy concern (Smith et al., 2011), the relation between
‘presented information’ or ‘media exposure’ and privacy concern (Malhotra et al., 2004;
Pavlou et al., 2007), the relation between a former attitude or ‘privacy experience’ and
privacy concern (Malhotra et al., 2004; Phelps et al., 2001; Martin, 2012) or the relation
between perceptions regarding specific features such as a privacy seal or statement and
privacy concern (Belanger et al., 2002; Breward, 2007). Other works of literature that
investigate privacy concern tend to incorporate the evaluative component in the variable
itself. Literature that investigates privacy through a risk perspective for example generally
refers to privacy concern, or privacy risk, as the anxiety derived from an evaluation of
perceived privacy violations (Breward, 2007; Featherman and Pavlou, 2003; Im et al., 2008,
Tan et al., 2012, Zhou, 2012).
The evaluative component of the construct privacy concern reflects an attitude as
formed by beliefs and emotions regarding privacy. This attitude typically ranges from
completely neutral, i.e. no privacy concern, to completely negative, i.e. very high privacy
concern. Positive privacy attitudes are generally not considered, since privacy is considered
to be a resource of consumers that they can/have to expose in order to gain the benefits of
the product or service. Privacy concern and privacy attitude are similar in that they are both
expressions of favorability toward a specific attitudinal object as derived from emotions and
cognitive evaluations. But since the privacy concern construct includes privacy, security and
control aspects, this construct is not necessarily representative of consumers’ attitudes
toward privacy. In addition, the privacy concern construct generally only targets components
related to the anxieties and evaluations of privacy considerations (Smith et al., 1996;
Malhotra et al., 2004), but ignores the degree to which these anxieties and evaluations could
influence cognition and behavior as well as their resistance to change (attitude strength).
Particularly since privacy investigations are vulnerable to respondent bias, a measure of
attitude strength may lead to more predictive relations. Therefore we propose the variable
‘privacy attitude’, which relates only to the psychological component of privacy as mediated
by attitude strength. The privacy attitude construct also alleviates the necessity to
investigate the effect of privacy experiences as a separate variable, since privacy attitude
reflects the strength of the attitude which is considered to be the factor that distinguishes
the responses of consumers with privacy experiences from those without privacy
experiences.
The respondent base will be segmented in four groups based on their heterogeneity.
The groups reflect the degree of favorability respondents have towards privacy and the
strength of this attitude. Consumers are considered to fall in the following segments: weak
privacy attitude, strong privacy attitude, weak neutral attitude and strong neutral attitude.
Two or more of these segments may be combined based on the similarity of their decisionmaking process as exposed in the cluster analysis. For example, both consumers with a
weak negative attitude and a neutral attitude may evaluate the attitudinal object based on a
24
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
similar evaluation of situational cues when presented with an option to engage in privacysensitive behavior (Petty and Cacioppo, 1986).
The items which we measure the privacy attitude construct with have to be carefully
considered. In principal, attitude can be measured as a degree of favorability toward an
attitudinal object (Holland et al., 2002). But applying the same scale so that respondents can
evaluate privacy will likely lead to biased results (Malhotra et al., 2004). In order to discover
valid results, privacy attitude has to target latent privacy considerations. We adopt
constructs from the original scale for measuring privacy concern (Smith et al., 1996) in light
of scales constructed to investigate privacy concern regarding internet (Malhotra et al.,
2004) and E-commerce (Pavlou et al., 2007), which we consider in light of attitude literature
(Ajzen and Fishbein, 2000; Holland et al., 2002). Privacy attitude is measured through three
items that are proposed to capture the respondents’ degree of favorability toward the
conduction of privacy-sensitive information in E-commerce. Two items are affect-based
(measures of anxiety) and one measures favorability through external evaluation. Four items
to measure privacy attitude strength are adopted from attitude literature (Krosnick and
Smith, 1994; Pomerantz et al., 1995). Arguably, more items would increase the significance
of the construct, but a total of seven items was chosen in order to avoid biased results, due
to the length of the survey as well as common method variance. All items are constructed as
not to invoke social desirability bias or lead respondent considerations.
By testing the effect of privacy attitude on the relation between the privacy, control
and security attributes and behavioral intention, we propose a manner of investigation that
aims to discover discrepancies between the privacy concern construct and behavioral
intention. Due to the amount of segments and uncertainty regarding this construct, the
hypotheses related to privacy attitude are constructed solely to investigate if there is a
significant effect, rather than specifically test the direction of this effect. Assumptions
regarding the distribution of the effects of privacy attitude on the relations between the
independent variables and behavioral intention will be addressed in this section, and further
discussed in the section ‘Data collection and analysis’. Privacy attitude is designed to
measure a higher abstraction of privacy considerations than the privacy concern construct.
Privacy attitude relates to the latent perceptions regarding how privacy ought to be
conducted in an E-commerce context. This paper will investigate whether the variable
‘privacy attitude’ has a significant effect on the relation between the privacy attribute and
behavioral intention. The privacy attribute was constructed based on the items of privacy
concern in former research regarding the collection and distribution of personal information,
as well as relating to the passive dimension of privacy awareness. The privacy attribute is a
construct derived from the privacy concern construct designed to be more reflective of the
decision-making process, and targets the same latent considerations as the variable privacy
attitude. This inclines that privacy should follow a significant positive distribution along the
segments of privacy attitude, i.e. neutral respondents indicate low privacy coefficients, weak
negative respondents indicate higher privacy coefficients and strong negative respondents
25
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
indicate the highest coefficients. However, privacy attitude includes the aspect of attitude
strength. Therefore, by investigating whether there is a significant difference in the relations
between privacy and behavioral intention for the different segments of privacy attitude, we
can establish whether the strength of consumers’ privacy attitudes influences the
significance of privacy for explaining behavioral intention in the consumer decision-making
process. We propose:
H2a. Privacy has a significantly different effect on behavioral intention for consumers
who indicate different levels of privacy attitude.
When we investigate the effect of privacy attitude on the relation between security
and behavioral intention however, we expect different results. This paper assumes that
privacy and security affect behavioral in distinct manners. The latent considerations
regarding privacy are not considered to affect the importance of security. Therefore it is
considered unlikely that privacy attitude has a significant effect on the relation between
security and behavioral intention. We expect to confirm the null-hypothesis of the following
hypothesis:
H2b. Security has a significantly different effect on behavioral intention for consumers
who indicate different levels of privacy attitude.
We do expect a significant relation between privacy attitude and the relation
between control and behavioral intention. As explained in section 2.2 – Perceived behavioral
control, this relation might help explain the behavioral intention-behavior discrepancy. If
control is positively distributed among the segments, this would indicate that consumers
with a stronger (negative) privacy attitude require a greater deal of control over personal
information in order to justify engaging in behavior, in respect to consumers with a weaker
(negative) privacy attitude. We propose:
H2c. Control has a significantly different effect on behavioral intention for consumers
who indicate different levels of privacy attitude.
3.5.2 Involvement
The decision-making process of consumers who are involved with the attitudinal
object differs from that of consumers who are not involved (Petty and Cacioppo, 1986). The
behavioral decision is intrinsically more important to consumers who are involved with the
attitudinal object. Therefore the perceived psychological risk of making the wrong decision is
26
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
generally higher for these consumers (Dholakia, 2001). Involved consumers are more likely
to search and analyze all related information that is available to them. On the other hand,
consumers who are not involved will likely not care to make a carefully considered
evaluation of the attitudinal object (Petty et al., 1983). These consumers are considered to
base their intention for engaging in behavior on emotionally appealing stimuli. For example,
uninvolved consumers could decide not to use an E-commerce site because it has a
disclaimer it uses cookies, which they associate with a loss of privacy. While involved
consumers may care to find out what cookies are, how they work, and how they affect them,
and therefore decide on whether to engage in behavior based on an evaluation of their
perceived benefits and disadvantages. Given that privacy considerations presented in the
media are generally negative, this would incline that when consumers evaluate the decision
based only on information regarding the privacy implications of an E-commerce site, that the
intention to use this site will likely be higher for involved consumers than for uninvolved
consumers, ceteris paribus. As Akhter (2014) explains, involved consumers are more likely to
evaluate information on the attitudinal object that serves to mitigate their privacy concern.
This inclines that when involved consumers want to engage in behavior, they are more likely
to avoid cognitive dissonance by considering information that serves to mitigate privacy,
security and control considerations, in respect to uninvolved consumers.
On the other hand, consumers who are involved with the technology are more likely
to consider risk perceptions and their perceived probabilities to be more important than
consumers who are not involved (Venkatraman, 1989). Therefore, the anxiety associated
with privacy, security and control perceptions is likely to have a stronger effect on behavioral
intention for involved consumers than for uninvolved consumers (Pavlou et al., 2007). An
involved consumer should therefore be less likely to mitigate privacy considerations in light
of the perceived benefits, i.e. perceived usefulness, perceived ease-of-use and lower price,
than an uninvolved consumer.
Involvement is measured through three items, two related to the perceived intrinsic
importance of E-commerce, and one related to the willingness to search and analyze
information. Involvement will be measured before consumers are asked to evaluate a
decision, in order not to lead their answers (i.e. consumers might not give a valid score for
involvement if they first analyze the extent of the dimensions related to the behavioral
decision). The respondent base will be segmented in two groups based on their
heterogeneity. The segments will reflect if the consumers are relatively involved with online
shopping, i.e. indicate high involvement regarding E-commerce, or relatively uninvolved, i.e.
indicate low involvement regarding E-commerce.
Respondents are presented with information regarding privacy, security and control
that has a neutral tone-of-voice. No information regarding benefits and drawbacks is
available to respondents in the research. Therefore, respondents are considered to evaluate
the attributes based on how the attributes relate to their pre-existing attitudes toward
27
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
privacy, security and control. The attributes serve to mitigate their risk perceptions regarding
the dimensions of privacy concern, e.g. if consumers believe security is the most important
aspect, they are considered to weigh most importance on the security attribute since it
serves to mitigate their perceived security risks. Consumer evaluations of the attributes
reflect the weight they assign to their relative risk perceptions and perceived probabilities of
occurrence. In this line of reasoning, the privacy and security attributes ought to be stronger
determinants of behavioral intention for involved consumers than uninvolved consumers.
However, if this is not the case, it would infer that involved consumers are more likely to
discount their privacy and security considerations in the cognitive justification of using an Ecommerce site, relative to uninvolved consumers. It could also mean that uninvolved
consumers are more likely to indicate high privacy concern due to the evaluation of
emotionally appealing stimuli regarding the negative nature of privacy and security
implications. The object-specific attitudes that consumers form, and therefore the casespecific attitudes on which respondents base their stated behavioral intentions in privacy
research, are not very predictive of observed behavior for uninvolved consumers (Petty and
Cacioppo, 1986). Therefore, the finding that the privacy and security attributes are weaker
determinants of behavioral intention for involved than for uninvolved consumers might help
explain the discrepancy between stated intentions and observed behavior in privacy
research, i.e. if involved consumers are more likely to mitigate privacy and security
considerations when evaluating the behavioral decision and uninvolved consumers are
prone to state misrepresentative intentions to engage in behavior, than privacy concern
would not be a reliable predictor of behavior for either segment. We propose:
H3a. Privacy is a weaker (vs. stronger) determinant of behavioral intention for
consumers who indicate high (vs. low) involvement.
H3b. Security is a weaker (vs. stronger) determinant of behavioral intention for
consumers who indicate high (vs. low) involvement.
Consumers who are involved are more likely to consider risk perceptions as more
important and require cognitive justification of these perceived risks. We propose that
control is a stronger determinant of behavioral intention for involved consumers than for
uninvolved consumers, since control is considered to mitigate these risk perceptions.
H3c. Control is a stronger (vs. weaker) determinant of behavioral intention for
consumers who indicate high (vs. low) involvement.
This paper investigates the trade-offs consumers make between privacy concern and
the determinants of technology acceptance. While Tan et al. (2012) found significant
evidence for the direction of these trade-offs, we cannot assume that this direction is
28
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
representative for contexts other than social networking due to the role of involvement. As
aforementioned, the barriers for registering for a social network are relatively low.
Specifically in respect to a behavioral decision that is perceived to entail strong risk elements
for consumers, it is less likely that consumers will be highly involved and rely on cognitive
justification to make a decision. When respondents are not involved with the behavioral
decision it is more likely that they base their evaluation on situational cues or emotionally
appealing stimuli in their evaluations. (Petty et al., 1983). Therefore perceived usefulness
and perceived ease-of-use may not have the same effect on behavioral intention for
involved and uninvolved consumers in a privacy context. We propose that involved
consumers are more likely to discount the perceived benefits of the technology (such as its
perceived benefits in performing activities) when evaluating an attitudinal object, than
uninvolved consumers, who are considered to be more likely to discount their privacy
considerations in order to avoid cognitive dissonance.
H3d: Perceived usefulness is a weaker (vs. stronger) determinant of behavioral
intention for involved (vs. uninvolved) consumers.
H3e: Perceived ease-of-use is a weaker (vs. stronger) determinant of behavioral
intention for involved (vs. uninvolved) consumers.
3.5.2 Trust
In an organizational context, trust is defined as the willingness to accept vulnerability
with regards to the company (Mayers et al., 1995). The conceptualization proposed by
Mayers et al. (1995) indicates that trust consists of a belief that the company encompasses
the integrity, benevolence and ability to show appropriate behavior towards the consumer.
Consumers’ perceived intentions regarding the company’s conduction of personal
information are crucial for the variable trust. Trust indicates that consumers believe the
involved parties will show appropriate behavior instinctively and because of their own
initiative, rather than limiting themselves to solely adhering to the responsibilities proposed
in possible contracts. Furthermore, it also indicates a belief that companies are capable of
doing so. If, for example, consumers believe that the company is willing to protect privacysensitive information but is legally obliged to share this information with a third party, it is
unlikely that their privacy concerns will be mitigated.
Trust will be measured through three items that measure the perceived
trustworthiness of E-commerce companies. One is related to integrity, one to benevolence,
and one to ability. The items will be derived from Pavlou et al. (2007) due to the similarities
between the context and trust considerations of their study and this research. Similar to the
construct of privacy attitude it could be argued that more items would increase the
29
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
significance of the trust construct, but a total of three items was chosen in order to avoid
biased results due to the length of the survey. The trust segments will reflect whether
respondents show a relatively high or low degree of trust toward companies in E-commerce.
While the direct relations between trust and privacy concern are relatively wellestablished, the moderating effect of trust on the relation between privacy concern and
behavioral intention could benefit from further investigation (Smith et al., 2011). Pavlou et
al. (2007) explain that trust can affect privacy concern in two manners: Consumer privacy
concerns are likely to be lower for consumers who trust the company, since the signals send
by companies can mitigate these concerns before the consumer needs to decide whether to
engage in behavior. The other way that trust can affect privacy concern occurs when
consumers evaluate alternatives. The most trustworthy firm is perceived to be less inclined
to inappropriately handle private information, therefore privacy concerns are lower for
consumers who trust the firm. However, neither of these direct relations apply to this
research. The attributes are constructed so that they mitigate the related perceptions of
respondents, and the only stimuli that consumers can base their decision on are the specific
attributes that may mitigate related concerns. Secondly, respondents will not be presented
with specific company or brand names. Their decisions are proposed to reflect the
perceptions regarding E-commerce in general. Therefore consumers are not considered to
perceive a difference in trustworthiness among the alternatives. This inclines that trust can
only affect the manner in which the independent variables relate to behavioral intention.
Consider consumers who perceive privacy to be important, and who trust E-commerce
companies in general. While these consumers can feel a high degree of anxiety toward
providing personal information, it will still be less important in their behavioral evaluation of
the alternatives since they may believe that all of the alternatives will adequately handle
their personal information. Hence, we propose that their stated concerns are less significant
predictors of behavioral intention. Similar logic applies to security, i.e. security concerns can
be mitigated if consumers believe that companies can and want to protect security, and
control, i.e. the need for control over personal information can be mitigated if consumers
perceive that companies can and want to adequately handle personal information. We
propose:
H4a. Privacy is a weaker (vs. stronger) determinant of behavioral intention for
consumers who indicate high (vs. low) trust.
H4b. Security is a weaker (vs. stronger) determinant of behavioral intention for
consumers who indicate high (vs. low) trust.
H4c. Control is a weaker (vs. stronger) determinant of behavioral intention for
consumers who indicate high (vs. low) trust.
30
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
4.
Data analysis
4.1
Pre-test
An informal pre-test was conducted on 12 respondents (some of which were
presumed to hold strong privacy attitudes, some of which were presumed to hold weak
privacy attitudes). Respondents were asked to evaluate if they considered the presented
information and items capable of being understood by other respondents in the actual
survey, without leading their answers. The aim of the pre-test was to find if the survey was
adequately designed and phrased, the presented attributes were on an equal footing in
terms of the benefits they provided, if the survey could lead respondent answers, and was
short enough for respondents to be able to consider all information. This pre-test led to a
few important discoveries. For example, the initial survey included information about a
hypothetical E-commerce company, which the pre-test showed was unnecessary and forced
respondents to evaluate too much information. In addition, when respondents read the
information about the attributes they were prone to forget the characteristics of the specific
attributes on the following page. Including a note that respondents could read the attribute
descriptions on the previous page was considered too cumbersome, so a short reminder of
their most important qualities needed to be included on the evaluation page. An important
consideration of the survey was that respondents should not be explicitly aware that the
survey investigated privacy until after they had rated the conjoint profiles. The pre-test
confirmed that the manner in which items were presented gave the impression that the
survey solely investigated E-commerce.
The main issue of the survey was its length. Despite the fact that all items were kept
as parsimonious as possible, all text was kept to a minimum and the entire survey was
designed to be as short and straight-forward as possible given the methods of investigation,
respondents were not eager to read and evaluate. Therefore the choice was made to keep
the items for the moderating possible as short as possible, and to exclude holdout profiles
that would otherwise have helped to measure the validity of the conjoint analysis.
4.2
Data collection
The final survey (see appendix A) was distributed online via several channels in the
Netherlands: Multiple social networking pages, university mailing lists and websites
specifically designed for student research. The survey was distributed to a minimum of 312
subjects (not including social network exposure). Unfortunately the response rate was
extraordinarily low. The decision was made to expand the reach of the survey to channels
31
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
outside of the Netherlands, for which an extra item in the survey regarding language was
created in order to keep the responses separate. This paper is not concerned with the
antecedents of privacy concern but rather the effects. Therefore, unless there are many
statistical differences between the respondent groups, this is assumed to not affect the
validity of the research. The survey was distributed to a minimum of 395 additional subjects
– students of Aarhus University. A total of 161 subjects filled in the survey, out of whom 69
completed the survey. After the exclusion of invalid responses, respondents who rated low
on the excluding question regarding online shopping experience and outliers, a total of 56
useable responses were gathered from the online collection. The decision was made to
disengage from online collection methods and conduct a segregate field study. An additional
85 questionnaires were distributed among subjects in the waiting room of Den Haag city hall
and among train passengers, which yielded a total of 78 completed responses, out of which
65 were useable. The analysis is performed on a total of 121 responses. With a drop-out rate
of 8.2% the field study proved to be a preferable method over online surveys, which yielded
a drop-out rate of 57.1%. The high online drop-out rate may be attributed to the average
time to complete the survey, which is a little over 7 minutes. It can be concluded from this
that researchers should not base their method of data gathering on the study of Klein et al
(2010).
Although there is little difference in online- and traditionally gathered conjoint analysis data,
Online conjoint analysis data is considered to be slightly more reliable than data from
traditional channels since respondents don’t feel observed (Klein et al., 2010). To account for
this, respondents were told they were not required to fill in their name, the surveyor sat at a
distance from respondents, and respondents were asked to insert their filled-in
questionnaire in a closed shoebox. Several respondents were told about the problems of
social desirability bias and biased results due to observation, and were asked if this played a
role in their responses, which each of them disconfirmed. These statements could of course
have been given due to social desirability bias, however, they lead us to believe that due to
the method of investigation there is no reason to believe that these biases played a
significantly larger role in the field study than in the online study.
4.3
Respondent base
Due to the agglomeration of samples there is a risk of inconsistencies in the
responses. This could lead to some problems for the investigation, since it may indicate that
respondents evaluate the profiles and items in distinct manners.
Table 1 presents the respondent base.
32
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Table 1: Demographic, collection and familiarity sample descriptives
Gender
Age
Male
57 %
(N=69)
Female
43 %
(N=52)
Channels
15-25
26-35
36-45
46-55
55-65
40.5 %
(N=49)
31.4%
(N=38)
15.7 %
(N=19)
8.3 %
(N=10)
4.1%
(N=5)
Research method
Netherlands
Denmark and
other
Online survey
Field survey
82.6 %
(N=100)
17.4 %
(N=21)
45.5 %
(N=55)
54.5 %
(N=66)
Familiarity - I have purchased products online in the past
Likert-scale ratings (1 and 2 are excluded)
3
6.6 %
(N=8)
4
7.4 %
(N=9)
5
14 %
(N=17)
6
17.4 %
(N=21)
7
54.5 %
(N=66)
Due to the problem with data collection, a series of tests needed to be performed in
order to assess the existence of inconsistencies in the database. For structure purposes the
following sections will go into further detail regarding the tests, while this section concerns
itself mostly with the outputs. We can investigate for differences by performing an
independent T-test on the variables of investigation. The independent T-test requires a few
assumptions to be met in order to yield significant results.
Outliers will distort the result of the T-test, so these are removed. The dependent
variables need to be approximately normally distributed. Upon initial visual inspection
(histograms), most variables appear to be approximately normally distributed. For the
variables that may have deviated from normal distribution in the histograms an additional Qplot was created. All variables appear to be normally distributed, see Appendix C.
The T-test is conducted for the mean differences between the responses of the
different collection methods. The results can be found in Appendix D.
Independent T-tests also require homogeneity of variances. SPSS automatically uses
Levene’s test in the independent T-test. Levene’s test measures equality of variances. Ergo, if
Levene’s test is significant, this indicates that there is a statistically significant difference in
the variance between groups. As can be seen in the results of the T-test, there are 7 items
for which Levene’s test is confirmed. This is not ideal, since it indicates that there was some
difference in the degree to which the respondent groups were conservative or liberal in their
evaluations. However, no conclusions can be drawn from this without interpreting the
33
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
results of the T-test. SPSS incorporates the Welch-Satterthwaite method in order to expose
differences in the variable means when there is no homogeneity of variances.
There is a significant difference in respondent means for conjoint profile 7 – which
presents respondents with the attributes of privacy, security and price. Respondents of the
online study and field study indicate means of 6.47 and 5.58 respectively. However, for the
other conjoint profiles the means were closely related and the T-test showed insignificant
results. We have to take into account that the sample sizes are relatively small, leading to a
higher chance for distorted results. While the results of this should be taken into account in
further examinations, they are proposed to not significantly distort the analysis.
There is a significant difference in respondent means for item T1 – E-commerce
companies understand the market they work in, where respondents of the online study and
field study indicate means of 5.49 and 4.64 respectively. However, there is no significant
difference in T2 and T3. We conduct a quick factor analysis and reliability analysis to see how
well the items are interrelated (these will be discussed more in depth in the following
sections of the data analysis), and we can come to the conclusion that the items of trust are
significantly interrelated. Hence the results for T1 are proposed to not significantly distort
the analysis.
The same applies to PS3 - I am interested in privacy-related information, and PS4 My attitude towards privacy represents my personal values. PS3 shows means of 5.07 and
4.29 for online and field respectively, while PS4 shows means of 5.45 and 4.45. We perform
the tests on the items of privacy strength (see section 4.7 – Reliability and cluster analysis) ,
and propose that these results may also be distorted due to sample size.
The independent T-test is conducted for the mean differences between the
responses of the different countries (language) of collection. The results can be found in
Appendix E.
There is a significant difference in respondent means for item T2 – Promises made by
E-commerce companies are likely to be reliable, where respondents from the Dutch data
collection and English data collection indicate means of 4.31 and 5.05 respectively. But there
is no significant difference in the results of T1 and T3.
There is a significant difference in respondent means for item PS2 – I am certain that
my attitude towards privacy is the right one, in respect to others, and PS4. Respondents
from the Dutch data collection and English data collection indicate means of 5.49 and 4.64
respectively. But there is no significant difference in the results of PS1 and PS3.
To conclude the respondent analysis: this paper considers that there is no reason to
believe that the difference in collection methods resulted in serious validity issues. There is a
chance that the variables ‘Trust’ and ‘Privacy strength’ may be affected by the difference in
collection methods, however, it is more likely that the difference in these variables can be
34
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
explained by the small sample size. Regardless, we need to be careful in the analysis of these
variables due to the possibility of heteroscedasticity.
4.4
Conjoint analysis
Table 2 presents the regression coefficients of the attributes as discovered from the
conjoint analysis. SPSS uses ordinary least squares to measure these coefficients based on
respondent profile preferences. Since the attributes only have two levels, 0 refers to the
exclusion of the software relating to the independent variable and 1 refers to the inclusion.
The coefficients are equal to the part-worth utilities of attribute level 1 for each attribute
(level 0 works as a dummy variable, and is therefore always equal to 0).
Table 2: Coefficients
B Coefficient
Estimate
pu
peou
privacy
control
security
price
,618
1,048
-,651
,659
,870
,837
The utility function of the conjoint analysis is linear, and can be measured as the sum
of the coefficients multiplied by their attribute levels plus a constant. The utility function of
our model is:
U a  4.923  0.651 p  0.870s  0.659c  0.618u  1.048e  0.837d
Where
U a stands for the utility of a given alternative
p stands for the attribute related to privacy
s stands for the attribute related to security
c stands for the attribute related to control
u stands for the attribute related to perceived usefulness
e
stands for the attribute related to perceived ease-of-use
d
stands for the attribute related to price
35
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
We can measure the relative importance of each attribute in the consumer decisionmaking process by measuring the range of their part-worth utilities (in this case this is equal
to their coefficients) as a percentage of the sum of all part-worth utility ranges. The relative
importance of each attribute is displayed in table 3.
Table 3: Importance values
pu
peou
privacy
control
security
price
13,195
22,374
13,901
14,078
18,579
17,873
Table 3 indicates that the attributes related to perceived ease-of-use, security, price
and control are more important for explaining general behavioral intention than privacy.
However, these results may be attributed to the sample. Therefore, in order to investigate
hypothesis H1a, we conduct a T-test on the privacy coefficient using the coefficient of the
strongest determinant of behavioral intention (perceived ease-of-use) as a test value. While
the mean of the perceived ease-of-use coefficient is not necessarily representative of the
entire population (N), we consider the differences between the coefficients of our sample to
be reflective of the distance between means of the population. In order for the T-test to be
valid, we need to check its assumptions. After the exclusion of a few outliers (regarding only
the privacy coefficient. All above results have been re-examined. See appendix F for
coefficient distribution and T-test before exclusion), all coefficients were distributed
normally (see appendix H).
Table 4 shows the results of the T-test.
Table 4: T-test privacy coefficient - peou mean
Test Value = -1.048
t
df
Sig. (2-tailed)
Mean
Difference
95% Confidence Interval of the
Difference
Lower
privacy_L
3,053
120
,003
,39717
,1396
Upper
,6547
When we compare to an approximation of a normal distribution, the test value is
3.053 at 120 degrees of freedom with a p-value of .003, i.e. t(120)=3.043, p=.003. With p <
.05 it is clear that the results are significant. Under the assumption that the perceived easeof-use coefficient is representative of the population, or that the trade-offs between privacy
36
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
and perceived ease-of-use are representative of the population, we can state that privacy is
not the strongest determinant of behavioral intention. H1a is confirmed.
Since the security coefficient is higher than the privacy coefficient but not the
strongest determinant of behavioral intention, we perform the same test on the security
mean.
Table 5: T-test privacy coefficient security mean
Test Value = -0.87
t
df
Sig. (2-tailed)
Mean
95% Confidence Interval of the
Difference
Difference
Lower
privacy_L
1,685
120
,095
,21917
-,0384
Upper
,4767
With t(120)=1,685, p=.095, the results are (not surprisingly) not as statistically
significant as H1a. It could be argued that due to the size of the sample we may test the
results for a significance of p < 0.1, however, the size of the sample works as a double-edged
sword for that argumentation. Since the test value is not an absolute, but rather an
estimation based on the security score of the sample, we conclude that H1a\2 is not
confirmed.
4.5
Factor analysis
In order to investigate whether privacy, security and control relate to the same latent
construct (privacy concern), we conduct an exploratory factor analysis on the coefficients.
An orthogonal maximum likelihood factor analysis is generally considered to be the most
adequate measure of identifying latent constructs, as long as the factors, as well as the
variables, are independent of each other and normally distributed. Factor analysis measures
shared variance of the variables in order to relate them to a defined number of factors. We
use Kaiser’s rule of thumb to set the number of factors, which is to retain only the factors
that explain more than the average amount of the sample variance (eigenvalue > 1). In total
this leads us to investigate a total of 3 factors (see appendix I). Factor analysis works as a
dimension reduction technique. The downside of this is that through this method of
investigation, the factors only account for about 66% of the sample’s variance. This is
adequate, but not significantly much.
The factor analysis takes random points of the dataset’s variable scores and
accordingly maximizes squared loading variance across variables (varimax rotation) in
several (in our case 4) iterations. Table 6 presents the results.
37
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Table 6: Rotated Factor Matrix
Factor
pu_L
peou_L
privacy_L
control_L
security_L
price_L
1
2
3
,082
,348
,120
,914
,370
-,040
-,049
,175
,989
-,027
-,030
,170
,356
,014
,076
,404
-,271
,556
a. Rotation converged in 4 iterations.
As is evident from table 6, privacy, security and control do not correlate highly onto
the same latent constructs. This is an indication that H1b and H1c may be disconfirmed.
However, one of the assumptions of factor analysis is sampling adequacy. If the sample size
is not adequately large enough, the results of the factor analysis may not be reliable. The
Kaiser-Meyer-Olkin (KMO) measure of sampling adequacy indicates if our sample was
sufficiently large enough (see appendix I)
These results are not optimal. While the Bartlett’s Test of Sphericity confirms that
there are correlations among the sample that can be investigated with factory analysis, the
KMO measure of sampling adequacy is low. We generally want to see a sampling adequacy
that is, as a bare minimum, higher than 0.5. Our results are just below the bare minimum,
therefore we cannot state that the results of the factor analysis are fully reliable. Hence we
use an additional test to investigate H1b and H1c.
4.6
Bivariate correlation
In order to decide on the right method of investigation, we need to first understand
the relationship between privacy and the other coefficients. By plotting the coefficients
together (See appendix J), we can come to the conclusion that the relation between privacy
and price is somewhat linear, while the rest of the relations are non-linear. This inclines that,
technically, the privacy and price relation fulfills the assumptions of the Pearson ProductMoment correlation test. The Pearson correlation investigates the correlation between two
independent variables by measuring the averaged data of two variables. Accordingly, a line
of best fit is drawn between the variables, and the distance of the variables to this line is
measured. However, due to the nature of the variables, it would make little sense to
investigate linear relations. After all, we want to investigate similarities between the
strength of the variables for explaining behavioral intention. This would incline investigating
38
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
the position of the data at the extremes, or centre, of the distribution. The reason that there
may exist a linear relation between privacy and price is due to the price construct –
consumers are unlikely to indicate an inverse relation for price (i.e. indicate a favorable
attitude toward losing money), hence the data points of the coefficient or relatively
positively distributed from 0 to the top value (on average). Therefore all relations will be
investigated using the nonparametric version of the Pearson correlation: Spearman
correlation (see appendix K)
The results for the privacy-security relation show a correlation r=-.047 at a
significance of p=.612. Since p > 0.05, we can state that there is no statistically significant
relation between privacy and security.
The results for the privacy-control relation show a correlation r=.126 at a significance
of p=.167. There is no significant relation between privacy and control.
Considering that the factor analysis showed that privacy might not measure the same
latent construct as security and control, and since the variables are not significantly
correlated, H1b and H1c are confirmed.
The results for the privacy-perceived usefulness relation show a correlation r=-.074 at
a significance of p=.417. Since p > 0.05, this indicates that there is no significant relation
between privacy and perceived usefulness. H1d is not confirmed.
The results for the privacy-perceived ease-of-use relation show a correlation r=.207
at a significance of p=.023. Since p < 0.05, we can state that here is a significant positive
relation between privacy and perceived ease-of-use. The test shows that for an average
increase of 1 of the privacy coefficient the perceived ease-of-use coefficient increases by
.207. In order to interpret the results we have to take into account the inverse nature of the
privacy coefficient. On the negative scale, consumers who indicate that their information
anxiety is a more important deterrent of engaging in behavioral intention, i.e. feel a higher
degree of anxiety toward personal information conduction, consider the benefits related to
perceived ease-of-use to have a more negative effect on behavioral intention. In other
words, the perceived ease-of-use of the technology is less likely to persuade consumers who
indicate a high degree of privacy anxiety to desire engaging in behavior. H1e is confirmed.
The results for the privacy-price relation show a correlation r=.3 at a significance of
p=.001. Since p < 0.005, we can state that there is a clear significant positive relation
between privacy and price. H1f is confirmed.
39
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
4.7
Reliability and cluster analysis
In order to segment the respondent base on their scores regarding the moderating
variables’ items, we need to first examine the internal consistency of the items. This is done
by examining the Cronbach’s alpha output of a reliability analysis (see appendix L) as well as
by conducting a principal components analysis (see appendix M). The results show that all of
the items adequately measure the construct of higher abstraction and would not improve by
the deletion of items (with the exception of INV1, however, since the added value of
exclusion is low and the corrected items-total correlation for this item is low we propose it is
better to include it).
Principal components analysis is different from factor analysis in that it analyzes all
variances, and is better suited for combining variables into subsets. Though in SPSS the
output is the same. We control for 4 factors (one per item construct). With a KMO of .714
and 65% of variance explained, the items relate perfectly to the latent constructs without
significantly correlating to each other (see appendix M).
Accordingly the construct item responses were clustered using the K-means method.
The K-means method classifies segments through a few iterations of determining cluster
centers (means) and assigning the items that are closest. K-means clustering is effective for
identifying a pre-determined amount of clusters. The cluster results, and their group
descriptives, can be found in Appendix N.
In order to determine the number of clusters for the Privacy Attitude construct, an
ANOVA (see following section) was run for both 3 and 4 clusters (See appendix O and P).
Naturally the values differed, but they only differed slightly. The same tests were confirmed.
This indicates that consumers with a weak and strong neutral attitude have a similar
decision-making process. Therefore we run the analysis on 3 clusters, namely consumers
with a relatively neutral -, weak negative - and strong negative privacy attitude.
4.8
ANOVA
The Analysis of Variance (ANOVA) is a statistical method which tests the variance
between different samples and the variance within different samples. The main advantage
of ANOVA is that it allows us to investigate more than two groups. Unlike the T-test, which
compares the mean against a T-distribution, ANOVA compares the mean and variance
against a F-distribution, i.e. the ratio of two Chi-square random variables. A case can be
made that you could run multiple T-tests on the data and compare the results, however, this
would significantly increase the chance that the null hypothesis is falsely rejected.
40
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
ANOVA relies on the same assumptions as a T-test, so we use Levene’s test to
investigate homogeneity of variance (see appendix O). Control indicates p<0.05, which
indicates heterogeneity of variance between groups. Table 8 shows the F-values and pvalues the variables with homogeneous variance, as well as the methods of investigation and
p-values for control.
Table 8: coefficient p-values
Coefficient
F-value
privacy_L
security_L
Sig.
,492
5,245
,613
,007
Method
control_L
Ward
,007
Brown-Forsythe
,023
We can conclude from table 8 that there is no significant difference between groups
who indicate different levels of privacy attitude on the privacy coefficient (p=.613). The
clusters designed to represent the difference in responses on the dimensions of privacy
attitude do not show significant differences in respondent evaluations of the attribute
designed to measure the importance of personal information anxiety for determining
behavioral intention. In other words, even when stated concerns regarding privacy are
mediated by the strength of respondents privacy attitude, these privacy considerations have
not been found to effect the importance of privacy in the consumer decision-making
process. This result is a little unexpected, and could indicate several things.
It could indicate there is a measurement issue in the cluster analysis. Therefore we
run a multiple regression on the privacy coefficient. One of the assumptions of multiple
regression is that data cannot show multicollinearity. Therefore, we once more run a
principal components analysis on the moderating variable items (see appendix M). The
factor scores are saved using the Anderson-Rubin method, since this method correlates
items strongly within factors.
The factor scores for privacy favorability and privacy attitude strength are measured
against the privacy coefficient (See appendix Q). The results yield an R2 of .003 and adjusted
R2 of -.014, and the results of the accompanying ANOVA table show a significance of p=.843.
This indicates that the factors, and by an extension of reasonable doubt the items, cannot
predict the privacy coefficient. H2a is disconfirmed. Although the model is unreliable and we
cannot make any conclusions out of it, it is interesting to note the factor related to privacy
attitude strength is statistically deemed to be a more reliable indicator of the privacy
coefficient (p=.582) than the factor related to privacy favorability (p=.85).
41
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
What is interesting about the results is the relation of privacy attitude to the security
and control coefficients. Table 8 shows a significant difference between groups for security
(F(2,118)= 5.245, p=.007). A Tukey post-hoc test revealed that security was a significantly
weaker determinant of behavioral intention for respondents with a neutral privacy attitude
(.4257±.16) than respondents with a weak negative privacy attitude (1.106±.16, p=.015) and
respondents with a strong negative attitude (1.039±.15, p=.015). There were no statistical
differences between respondents who indicated a weak- and strong negative privacy
attitude (p=.952). H2b is confirmed.
Since the assumption of homogeneity is violated for the control coefficient, and since
we have unequal sample sizes, we use the more robust Welch, Brown-Forsythe and Gabriel
test to analyze the results. Both the Welch and Brown-Forsythe methods indicate a
significant difference between groups for control, respectively F(2,74)=4,079, p=.021 and
F(2,109)=3.425, p=.036. A Gabriel post hoc test shows that control was a significantly
stronger determinant of behavioral intention for respondents with a strong negative attitude
(.882±.18) than consumers with a neutral attitude (.291±.13, p=.043). H2c is confirmed.
Interestingly enough, the results show that respondents who indicated strong,
negative privacy attitudes consider security and control to be more important determinants
of behavioral intention than consumers with neutral privacy attitudes. Whereas there is no
significant difference, or even an indication, that privacy plays a more important role in the
decision-making of these respondents. The privacy attitude construct was designed so that it
might give representations of consumers’ anxiety regarding personal information exposure
that would be more reliable indicators their observed behavior. However, rather than
confirm the hypotheses designed for this investigation, the analysis exposed something far
more valuable for answering the research question. Namely that measuring higher
abstractions of privacy considerations through survey items is unlikely to yield results that
relate to the consumer’s psychological component of privacy. While this paper makes a clear
distinction between privacy, security and control, the results of H2 lead us to believe that
consumers may evaluate items regarding privacy based solely on their attitudes toward
security and control.
4.9
Independent T-test
In order to examine H3 and H4, this section will conduct independent T-tests on the
coefficients for the involvement- and trust clusters. See appendix R and appendix S for
involvement and trust respectively.
When we investigate the involvement clusters, we can see from Levene’s test that
there is homogeneity of variances between the high- and low involvement segments for all
coefficients. Considering that the respondent groups are also evenly distributed (the high42
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
and low involvement groups have a population of 59 and 62 respectively), the test is fairly
reliable and straight-forward. From the results of the T-test we can state:
Respondents who indicate high involvement regarded privacy to be a significantly
weaker indicator of behavioral intention (-.292±.19) than respondents who indicate low
involvement (-.992±.16), with t(119)=2.761, p=.007. This indicates that the assumption of
this paper that highly involved consumers are more likely to discount their privacy
considerations in the cognitive justification of using an E-commerce site than consumers
who indicate low involvement, is justified. H1a is confirmed.
As for security, since p=.99>.05 it can be stated that there is no significant difference
between the means of the groups for security. Although H3b is disconfirmed, the results of
this are interesting. At a significance of p=.99 >.95 we can in fact conclude that the two
respondent groups are significantly equal in their evaluations regarding the importance of
security on behavioral intention.
Respondents who indicate high involvement regarded control to be a significantly
stronger indicator of behavioral intention (1.013±.12) than respondents who indicate low
involvement (-.327±.12), with t(119)=3.521, p=.001. This confirms that highly involved
consumers are more likely to require a greater degree of control over the privacy-sensitive
behavioral outcome than consumers who indicate low involvement. H3c is confirmed.
There is no significant difference between the groups for perceived usefulness
(p=.432). H3d is not confirmed.
At a statistical significance of 5% there is no significant difference between the
groups for perceived ease-of-use (p=.097). H3e is not confirmed.
Accordingly an independent T-test is conducted for trust. The results (see appendix S)
indicate that there is homogeneity between variance for all coefficients.
At a statistical significance of 5% there is no significant difference in the importance
of privacy for explaining behavioral intention between the groups (p=.053). Although
technically this would incline that H4a is not confirmed, we have to consider that cluster
populations are unevenly distributed between the groups of trust (N=88 for consumers who
indicate high trust, whereas N=33 for consumers who indicate low trust). This may have
somewhat inflated the p-values in the T-test. Due to the large amount of former research
that shows significant relations between trust and privacy concern (see section 2.6 – The
role of trust) and the consideration that p-value only barely crossed the threshold, this
relation is given the benefit of the doubt. Respondents who indicate high trust regarded
control to be a weaker determinant of behavioral intention (-.497 ±.15) than respondents
who indicate low trust (-1.061±.25), with t(119)=1.952, p=.053. This indicates that
43
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
respondents who indicate trust in the industry of E-commerce as a whole, rather than in
specific E-commerce companies that may use signals to enforce trust and alleviate privacy
anxieties, consider privacy to play a less important role in their evaluations than consumers
who indicate a lack of trust. H4a is confirmed.
Since the p-values for the security and control coefficient are .5 and .801 respectively,
we propose that there is no significant difference in the effects of security and control on
behavioral intention for respondents who indicate high or low concern. H4b and H4c are not
confirmed.
5.
Conclusion and discussion
This paper examined distortions in the relation between behavioral intention and
observed behavior in privacy investigations regarding a technological context, by
investigating how privacy concern can affect consumers’ behavioral intention to use an Ecommerce site. Several theories for why stated behavioral intentions may not be predictive
of behavior in privacy investigations were proposed and investigated. The theories were
investigated by conducting a traditional conjoint analysis on hypothetical E-commerce
alternatives, which varied only on several tangible attributes. The attributes were proposed
to address the most important considerations regarding acceptance of a privacy-sensitive
technology. Through this method of investigation, this paper discovered the trade-offs
between the importance of privacy, security, control, perceived usefulness, perceived easeof-use and price for explaining behavioral intention. These trade-offs were tested for several
variables proposed to influence behavioral intention.
A theory regarding the discrepancy between stated behavioral intentions and
behavior was that consumers may assign an unrepresentatively high importance to privacy
in privacy investigations. When consumers are forced to make a trade-off between their
privacy-related anxiety and the benefits of engaging in behavior, it was found that privacy
played a much smaller role in explaining behavioral intention than is commonly noted in
former research. In addition, it was discovered that respondents may base their evaluations
of items related to privacy in surveys on their security and control considerations, rather
than their privacy considerations. When Malhotra et al. (2004) proposed the IUICP as a more
adequate measurement of privacy concern, the underlying reasoning was that accurate
investigations of privacy required sophisticated methods. The findings of this paper affirm
that statement. However, based on the findings of H1 and H2, this paper goes as far to say
that perhaps privacy considerations should not be investigated by means of survey items at
all. A reason for the discrepancy between the effect of privacy on behavioral intentions in
44
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
research and consumer behavior regarding privacy-sensitive decisions could be that privacy
is too abstract of a concept for consumers to indicate their latent considerations on surveys.
In addition to survey bias, the measurement of the construct ‘privacy concern’ has
been found to be unreliable. The items that are used to measure privacy concern in
contemporary privacy research relate to the anxiety regarding personal information
exposure as well the anxiety regarding a financial loss and the need for perceived behavioral
control, which were found to not be related. In addition to examining these relations, this
paper found a possible explanation for why these constructs are commonly agglomerated in
former research. Namely that respondents who state to be concerned regarding privacy may
in fact be likely to be concerned regarding a possible financial loss related to privacy
implications, and may desire a degree of behavioral control in a privacy context. Particularly
the relation of respondents who indicate a strong negative attitude towards privacy and the
relatively higher need for a degree of behavioral control in relation to privacy neutral
respondents may explain the discrepancy between behavioral intention and observed
behavior. After all, the Theory of Planned Behavior shows that behavioral intentions are not
reliable indicators of behavior of consumers’ need for behavioral are not met (Ajzen, 1991).
However, these results are addressed with caution. After all, the privacy attitude construct
was not specifically designed to test for this.
In order to investigate the extent of the effect privacy concern can have on
behavioral intention, the paper investigated the trade-offs consumers make between the
technology’s ability to address their privacy considerations and the perceived benefits of
using the technology. It was found that respondents who consider privacy to be an
important determinant of engaging in behavior are more likely to discount the perceived
benefits in the effortlessness of using a technology alternative, as well as perceived
monetary gains, than consumers for who the anxiety toward privacy conduction has a
weaker effect on behavioral intention.
Another theory for the reason why former works of privacy show different or invalid
(in respect to observed behavior) results is the moderating role of involvement. Consumers
who are not (highly) involved with the product or service are more likely to be influenced by
emotionally appealing stimuli at the time of their behavioral evaluation. In respect to highly
involved consumers their stated intentions are less predictive of behavior (Petty and
Cacioppo, 1986). However, respondents who indicate low involvement were found to
consider privacy to be a significantly stronger determinant of behavioral intention than
consumers who indicate high involvement. This finding urges the need for future privacy
research to control for involvement in order to determine predictive behavioral intentions.
Oddly enough, both consumers who indicated high and low involvement were found to
consider security to play a similar role in their behavioral evaluations. Regardless of the
consumers’ tendency to base behavioral evaluations on a carefully considered trade-off
between the benefits and risks of the behavioral object, or to base behavioral evaluations on
45
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
heuristics and emotionally appealing stimuli, security is found to play an equally important
role in the decision making process. This once again illustrates the point that the financial
risk associated with privacy implications is a defined construct that affects consumers in a
clear and distinct manner. In addition, consumers who indicate high involvement were found
to be more likely to require a sense of control over the privacy-sensitive behavioral outcome
than consumers who indicate low involvement. This reaffirms the theory that when
consumers perceive to have no control over the behavioral outcome, that their stated
intentions are more likely to be unreliable predictors of actual behavior.
Lastly we propose that trust may play a moderating role in the relation between
privacy perceptions and behavioral intentions. This finding adds to the privacy literature in
the sense that trust may not only influence privacy considerations or be affected by them. It
may also distort the relation between the stated anxiety toward personal information
exposure and behavioral intention if this relation is not controlled for trust, regardless of
perceived differences between companies and consumers likelihood to be influenced by
signals send by companies to mitigate this anxiety.
5.1
Recommendations for future research
Although this study is confirmatory in design, it incorporated a great deal of
exploratory elements and was somewhat hypothetical in its nature. Therefore future
research would benefit from (large scale) empirical validations of the discovered relations
between privacy and behavioral intention. Particularly the use of a discrete choice analysis
might lead to more meaningful results. A design can be constructed that further inspects the
relation between the (latent) higher abstraction of privacy considerations and stated
responses regarding privacy, security and control. But most importantly, future privacy
research would benefit from an empirical validation of the relation between privacy
perceptions, stated behavioral intentions and observed behavior. It is only with a sufficient
analysis of the relation between these construct that privacy research can conduct
meaningful investigations of the effect of privacy considerations.
In addition, this paper focused heavily on investigating the acceptance of established
technologies. Particularly with all the advancements of biometric data gathering methods
the anxiety regarding personal information exposure may play a more significant role in
novel technologies.
The evaluation of privacy-related information plays a large role in the establishment
of an individual’s anxiety regarding personal information conduction. It is unclear to what
extent this may influence privacy consideration, and by the role of privacy in behavioral
evaluations. Privacy research could benefit from research using framing effects in order to
establish to what extent information regarding privacy can influence respondents.
46
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
6.
References
Acquisiti, A. (2004). “Privacy in electronic commerce and the economics of immediate
gratification.” Proceedings of the 5th ACM Electronic Commerce Conference, New York: ACM
Press, pp. 21-29
Acquisti, A. and J. Grossklags (2005). “Privacy and Rationality in Individual Decision Making,”
IEEE Security & Privacy, Vol. 3 Iss. 1, pp. 26-33
Ajzen, I. (1991) "The Theory of Planned Behavior," Organizational Behavior and Human
Decision Processes, Vol.50 Iss.2, pp. 179-211
Ajzen, I. (2001), “Residual effects of past on later behavior: Habituation and reasoned action
perspectives.” Personality and Social Psychology Review, Vol. 6, pp. 107–122
Ajzen, I. and M. Fishbein (2000), “Attitudes and the Attitude-Behavior Relation: Reasoned
and Automatic Processes,” European Review of Social Psychology, Vol.11 Iss.1, pp. 1-33
Akerlof, G. (1970) "The Market for Lemons: Quality Uncertainty and the Market
Mechanism," Quarterly Journal of Economics, Vol.84 Iss.3, pp. 488-500
Akhter, S.H. (2014). “Privacy concern and online transaction: the impact of internet selfefficacy and internet involvement.” Journal of Consumer Marketing, Vol. 31 Iss. 2, pp. 118125
Arrow, K. J. (1963), "Uncertainty and the Welfare Economics of Medical Care," American
Economic Review, Vol. 53 Iss. 5, pp. 941-973
Attuquayefio, S. and H. Addo (2014), “Review of studies with UTAUT as conceptual
framework” European Scientific Journal, Vol. 10 Iss. 8, pp. 249-258
Backhaus, K., T. Hillig and R. Wilken (2007). “Predicting purchase decisions with different
conjoint analysis methods: A Monte Carlo simulation.” International Journal of Market
Research, Vol. 49 Iss. 3, pp. 341-364
Bajaj, A. (1998). “Report 98-I. Technology factors influencing senior information systems
managers’ decisions to adopt new computing architectures.” Pittsburgh: The Heinz School,
Carnegie Mellon University
Banduras, A. (1977). “Self-efficacy: toward a unifying view of behavioral change.” Psychology
Review, Vol. 84 Iss. 2, pp. 191-215
47
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Bansal, G., F.M. Zahedi and D. Gefen (2010). “The Impact of Personal Dispositions on
Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online,”
Decision Support Systems, Vol. 49 Iss. 2, pp. 138-150
Belanger, F., J.S. Hiller, and W.J. Smith (2002). “Trustworthiness in Electronic Commerce: The
Role of Privacy, Security, and Site Attributes,” Journal of Strategic Information Systems, Vol.
11 Iss. 3/4, pp. 245-270
Benbasat, I. and H. Barki (2007). “Quo vadis, TAM?,” Journal of the Association for
Information Systems, Vol. 8 Iss. 4, pp. 212-218
Breward, M. (2007). “Perceived Privacy and Perceived Security and their effects on Trust,
Risk and User Intentions.” Eight World Congress on the Management of E-Business, IEEE
2007
Brown, S. A. and V. Venkatesh (2005). “Model of Adoption of Technology in the Household:
A Baseline Model Test and Extension Incorporating Household Life Cycle,” MIS Quarterly,
Vol. 29 Iss. 4, pp. 399-426
Budnitz, M.E. (1998). “Privacy protection for consumer transactions in electronic commerce:
why self-regulation is inadequate.” South Carolina Law Review, Vol. 49 Iss. 4, pp. 847-886
Carlsson, F., P. Frykblom and C.J. Lagerkvist (2005). “Using cheap talk as a test of validity in
choice experiments.” Economic Letters, Vol. 89 Iss. 2, pp. 147-152
Cespedes, F.V. and H.J. Smith (1993). “Database marketing: new rules for policy and
practice.” Sloan Management Review, Vol. 34 Iss. 4, pp. 7-22
Chen, Y.H. and I.C. Hsu (2010). “Website attributes that increase consumer purchase
intention: a conjoint analysis.” Journal of Business Research, Vol. 63 Iss. 9/10, pp. 1007-1014
Consumers-Union (2008). “Consumer Reports Poll: Americans Extremely Concerned About
Internet Privacy,” http://consumersunion.org/pub/core_telecom_and_utilities/006189.html
(Accessed on 4-10-2014)
Culnan, M.J. and C.C. Williams (2009), “How ethics can enhance organizational privacy;
lessons from the ChoicePoint and TJX data breaches.” Management Information Systems,
Vol. 33 Iss. 4, pp. 673-687
Culnan, M.J. and P.K. Armstrong (1999). "Information Privacy Concerns, Procedural Fairness,
and Impersonal Trust: An Empirical Investigation." Organization Science, Vol. 10 Iss. 1, pp.
104-115
Dallaway, E. (2007), “Biometrics can damage privacy” Infosecurity, Vol. 4 iss. 8, p. 10
48
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Davis, F.D. (1985). “A technology acceptance model for empirically testing new end-user
systems: theory and results.” Unpublished Doctoral Dissertation, Massachusetts Institute of
Technology
Davis, F.D. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of
information technology”, MIS Quarterly, Vol. 13 Iss. 3, pp. 318-340
Dholakia, U. M. (2001). "A Motivational Process Model of Purchase Involvement and
Consumer Risk Perception," European Journal of Marketing, Vol. 35 Iss. 11/12, pp. 13401360
Dinev, T. and P. Hart (2004). “Internet privacy concerns and their antecedents: measurement
validity and a regression model.” Behavior and Information Technology, Vol. 23 Iss. 6, pp.
413-423
Dodds, W. B., K. B. Monroe and D. Grewal (1991). “Effects of Price, Brand, and Store
Information on Buyers,” Journal of Marketing Research, Vol. 28 Iss. 3, pp. 307-319
Drennan, J., G.S. Mort, and J. Previte (2006). “Privacy, Risk Perception, and Expert Online
Behaviour: An Exploratory Study of Household End Users” Journal of Organizational and End
User Computing, Vol. 18 Iss. 1, pp. 1-22
Eastlick, M.A., S.L. Lotz and P. Warrington (2006). “Understanding online B-to-C
relationships: an integrated model of privacy concerns, trust and commitment.” Journal of
Business Research, Vol. 59 Iss. 8, pp. 877-886
Eisenhardt, K. (1989) "Agency Theory: An Assessment and Review," Academy of
Management Review, Vol.14 Iss.1, pp. 57-74
Elliot, A.J. and P.G. Devine (1994), “On the motivational nature of cognitive dissonance:
dissonance as psychological discomfort” Journal of personality and social psychology, Vol. 67
Iss. 3, pp. 382-394
Fazio, R.H. (1986) “How do attitudes guide behavior.” New York: Guilford Press. In R. M.
Sorrentino & E. T. Higgins (Eds.), Handbook of motivation and cognition: Foundations of
social behavior, pp. 204–223
Fazio, R.H. (1995). “Attitudes as object-evaluation associations: determinants, consequences
and correlates of attitude accessibility.” In R.E. Petty, & J.A. Korsnic (Eds.), Attitude strength:
antecedents and consuequences (pp.247-282). Hillsdale, NJ: Erlbaum,
Fazio, R.H. and M.P. Zanna (1978). “Attitudinal qualities relating to the strength of the
attitude-behavior relationship” Journal of Experimental Social Psychology, Vol. 14 Iss. 4, pp.
398-408
49
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Fazio, R.H., N.J Shook and J.R. Eiser (2005). “Attitude formation through exploration: valence
asymmetries.” Journal of Personality and Social Psychology, Vol. 87, pp. 293-311
Festinger, L. (1958), “A theory of Cognitive Dissonance” American Sociological Review, Vol.
23 Iss.1, p. 225
Featherman, M.S. and M.A. Fuller. (2003), “Applying TAM to e-services adoption: the
moderating role of perceived risk”, Proceedings of 36th Hawaii International Conference on
System Sciences (ICSS 2003), Big Island, HI, January 6-9
Featherman, M.S. and P.A. Pavlou (2003). “Predicting e-services adoption: A perceived risk
facets perspective.” International Journal of Human-Computer Studies, Vol. 59 Iss. 4, pp. 451474
Fischer, A. R. H. and P.W. De Vries (2008). “Everyday behaviour and everyday risk: An
exploration how people respond to frequently encountered risks.” Health, Risk and Society
Vol. 10 Iss. 4, pp. 385–397
Fishbein, M. (1963). “An investigation of relationships between beliefs about an object and
the attitude toward that object.” Human Relations, Vol. 16 Iss. 3, pp. 233-240
Fishbein, M., and I. Ajzen (1975). “Belief, Attitude, Intention and Behavior: An Introduction
to Theory and Research.” Addison-Wesley, Reading, MA, 1975. Fornell, C.
George, J. (2002), “Influences on the intent to make internet purchases”, Internet Research,
Vol. 12 Iss. 2, pp. 165-80
Green, P.E. and J. Wind (1975). “New Way to Measure Consumers’ Judgments,” Harvard
Business Review, Vol. 53 Iss. 4, pp. 107-117
Green. P.E. and V. Srinivasan (1978). “Conjoint analysis in consumer research: issues and
outlook.” The Journal of Consumer Research, Vol. 5 Iss. 2, pp. 103-123
Ha, S. and L. Stoel (2009), “Consumer e-shopping acceptance: antecedents in a technology
acceptance model” Journal of Business Research, Vol.62 Iss.5, pp. 565–571
Holland, R. W., B. Verplanken and A. van Knippenberg (2002) “On the nature of attitudebehavior relations: The strong guide, the weak follow.” European Journal of Social
Psychology, Vol. 32, pp. 869–876
Holmstrom, B. (1979), "Moral hazard and observability". Bell Journal of Economics, pp. 74-91
Howard, J. A. and J.N. Sheth (1969), “The Theory of Buyer Behavior”, John Wiley, New York
Hull, G., H.R. Lipford and C. Latulipe (2010), “Contextual gaps: Privacy issues on Facebook.”
Ethics and Information Technology, Vol. 13 Iss. 4, pp. 289-302
50
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Im, I., Kim, Y. and Han, H.J. (2008), “The effects of perceived risk and technology type on
users’ acceptance of technologies”, Information & Management, Vol. 45 Iss. 1, pp. 1-9
Jensen, C., C. Potts and C. Jensen (2005). “Privacy practices of internet users: self-reports
versus observed behavior.” International Journal of Human-Computer Studies, Vol 63 Iss. 1,
pp. 203-227
Klein, A., K. Nihalani and K.S. Khrisnan (2010). “A comparison of the validity of interviewbased and online conjoint analyses.” Journal of Management and Marketing Research, Vol. 4
Iss. 1, pp. 1-15
King, W. R. and J. He (2006). “A meta-analysis of the technology acceptance model.”
Information & Management, Vol. 43 Iss. 6, pp. 740–755
Kowalewski, S., K. Arning, A. Minwegen, M. Ziefle and G. Ascheid (2013). “Extending the
engineering trade-off analysis by integrating user preferences in conjoint analysis.” Expert
Systems with Applications, Vol. 40 Iss. 8, pp. 2947-2955
Krosnick, J.A. and W.R. Smith (1994). “Attitude strength.” Encyclopedia of Human Behavior,
Vol. 1, Iss. 1, pp. 279-289
Lanier, C.D. and Saini, A. (2008), “Understanding consumer privacy: a review and future
directions”, Academy of Marketing Science Review, Vol. 12 Iss. 2
Lavine, H., J.W. Huff, S.H. Wagner, and D. Sweeney (1998). “The moderating influence of
attitude strength on the susceptibility to context effects in attitude surveys.” Journal of
Personality and Social Psychology, Vol. 75 Iss. 2, pp. 359–373
Lee, J. and C. Song (2013), “Effects of trust and perceived risk on user acceptance of a new
technology service” Social behavior and personality: an international journal, Vol. 41 Iss. 4,
pp. 587- 598
Li, T. and T. Unger (2012), “Willing to pay for quality personalization? Trade-off between
quality and privacy” European Journal of Information Systems, Vol.21 Iss.6, pp. 621-642
Lilienthal, M., C.M. Messerschmidt, and B. Skiera, (2010) "The Utility of TAM-Perceptions:
Integration of Technology Perceptions into Choice-Based Conjoint Analysis" ACIS 2010
Proceedings. Paper 105. http://aisel.aisnet.org/acis2010/105 (Accessed on 5-11-2014)
Liu, C., J.T. Marchewka, J. Lu and C. Yu (2005), “Beyond concern – a privacy-trust-behavioral
intention model of electronic commerce” Information & Management, Vol. 42 Iss. 2, pp.
289-304
Loewenstein, G. F., C. K. Hsee, E. U. Weber and N. Welch (2001). “Risk as feelings.”
Psychological Bulletin, Vol. 127 Iss. 2, pp. 267–286
51
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Louviere, J.J. (1998). “Conjoint analysis modelling of stated preferences: a review of theory,
methods, recent developments and external validity.” Journal of Transport Economics and
Policy, Vol. 22 Iss. 1, pp. 93-119
Lu, Y., B.C.Y. Tan, and K.L. Hui (2004). “Inducing Customers to Disclose Personal Information
to Internet Businesses with Social Adjustment Benefits,” Proceedings of 25th International
Conference on Information Systems, R. Agarwal, L. J. Kirsch, and J. I. DeGross (eds.),
Washington, DC, pp. 272-281
Malhotra, N.K., S.S. Kim and J. Agarwal (2004). “Internet Users’ Information Privacy Concerns
(IUIPC): The Construct, the Scale, and a Causal Model,” Information Systems Research, Vol.
15 Iss. 4, pp. 336-355
Martin, K. (2012). “Information technology and privacy: conceptual muddles or privacy
vacuums.” Ethics Inf Technology, Vol. 14 Iss. 1, pp. 267-284
Martins, C., T. Oliviera and A. Popovic (2013). “Understanding the Internet banking adoption:
A unified theory of acceptance and use of technology and perceived risk application”
International Journal of Information Management, Vol. 34 Iss. 1, pp. 1-13
McCole, P., E. Ramsey and J. Williams (2010). “Trust considerations on attitudes towards
online purchasing: The moderating effect of privacy and security concerns.” Journal of
Business Research, Vol. 63 Iss. 9-10, pp. 1018-1024
McKnight, D.H., Lankton, N. and Tripp, J. (2011), “Social networking information disclosure
and continuance intention: a disconnect”, Proceedings of the 44th Hawaii International
Conference on System Sciences (HICSS 44), Manoa, HI, January 4-7
Milberg, S.J., H. Smith, J. Burke and J. Sandra (2000). “Information privacy: corporate
management and national regulation.” Organization Science, Vol. 11 Iss. 1, pp. 35-57
Milne, G.R. and M.E. Boza (1999). “Trust and concern in consumers’perceptions of marketing
information management practices.” Journal of Interactive Marketing, Vol. 13 Iss 1, pp. 5-24
Morran, C. (2011). “Amazon sued over alleged privacy policy violations.” Consumerist,
http://consumerist.com/2011/03/04/amazon-sued-over-invasion-of-privacy-allegations
(Accessed on 20-10-2014)
Norberg, P.A. and D.R. Horne (2007), “Privacy attitudes and privacy-related behavior”
Psychology & Marketing, Vol.24 Iss.10, pp.829-847
Norberg, P. A., D.R. Horne and D.A. Horne (2007). “The Privacy Paradox: Personal
Information Disclosure Intentions Versus Behaviors,” Journal of Consumer Affairs, Vol. 41 Iss.
1, pp. 100-126
52
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
O’cass, A. and T. Fenech (2003). “Web retailing adoption exploring the nature of internet
users web retailing behavior.” Journal of Retailing and Consumer services, Vol. 10 Iss. 2, pp.
81-94
Pavlou, P.A. (2003). “Consumer acceptance of electronic commerce: Integrating Trust and
Risk with the Technology Acceptance Model.” International Journal of Electronic Commerce,
Vol. 7 Iss. 3, pp. 101-134
Pavlou, P.A., Liang, H. and Xue, Y. (2007), “Understanding and mitigating uncertainty in
online exchange relationships: a principal-agent perspective”, MIS Quarterly, Vol. 31 Iss. 1,
pp. 105-136
Pelsmacker, P.D., M. Geuens and J. van de Berg (2010). “Marketing Communications – a
European perspective” (4th ed.) Essex: Person Education Limited, Prentice Hall.
Petty, R. E. and J.T. Cacioppo (1986). “Communication and persuasion: Central and peripheral routes
to attitude change.” New York: Springer.
Petty, R. E., J.T. Cacioppo and D. Schumann, (1983) “Central and peripheral routes to
advertising effectiveness: The moderating role of involvement.” Journal of Consumer
Research, Vol. 10, pp. 135-146.
Phelps, J. E., G. Nowak and E. Ferrell (2000) "Privacy Concerns and Consumer Willingness to
Provide Personal Information." Journal of Public Policy & Marketing, Vol. 19 Iss. 1, pp. 27-41
Phelps, J. E., G. D'Souza, and G.J. Nowak (2001). “Antecedents and consequences of
consumer privacy concerns: An empirical investigation.” Journal of Interactive
Marketing, Vol. 15 Iss. 4, pp. 2-17
Pierro, A., L. Manneti, A.W. Kruglanski and D. Sleeth-Keppler (2004). “Relevance override: on
the reduced impact of “cues” under high-motivation conditions of persuasion studies.”
Journal of Personality and Social Psychology, Vol. 86, pp. 251-264
Pomerantz, E. M., S. Chaiken and R.S. Tordesillas (1995). “Attitude strength and resistance
processes.” Journal of Personality and Social Psychology, Vol. 69 Iss. 3, pp. 408–419
Sheehan, K.B. and M.G. Hoy (2000). “Dimensions of privacy concern among online
consumers” Journal of Public Policy & Marketing, Vol. 19 Iss. 1, pp. 62-73
Schaup, L.C. and F. Belanger (2005). “A conjoint analysis of online customer satisfaction.”
Journal of Electronic Commerce, Vol. 2 Iss. 6, pp. 95-111
Schiffman, L. G., L.L. Kanuk and H. Hansen (2008). “Consumer behaviour: A European
outlook” Upper Saddle River, NJ: Pearson
53
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Schoenbachler, D.D. and G.L. Gordon (2002) "Trust and Customer Willingness to Provide
Information in Database-Driven Relationship Marketing." Journal of Interactive Marketing,
Vol.16 Iss.3, pp.2-16
Shin, D. (2010), “The effects of trust, security and privacy in social networking: a securitybased approach to understand the pattern of adoption” Interacting with computers, Vol. 22
Iss. 5, pp. 428-438
Simon, H.A., (1982). “Models of bounded rationality.” MIT Press
Slovic, P., M.L. Finucane, E. Peters and D. G. MacGregor (2007). “The affect heuristic.”
European Journal of Operational Research, Vol. 177 Iss. 3, pp. 1333–1352
Smith, J. H., T. Dinev and H. Xu (2011), “Information privacy research: An interdisciplinary
review.” MIS Quarterly, Vol. 35 Iss. 4, pp. 989–1015
Steenkamp, J.B.E.M. and D.R. Wittink (1994). “The metric quality of full-profile judgments
and the number-of-levels effect in conjoint analysis.” International Journal of Research in
Marketing, Vol. 11 Iss. 3, pp. 275-286
Straub, D.W. Jr. and A. Burton-Jones (2007). “Veni, vidi, vici: breaking the TAM logjam.”
Journal of the Association for Information Systems, Vol. 8 Iss. 4, p. 223
Tan, X., L. Qin, Y. Kim and J. Hsu (2012). “Impact of privacy concern in social networking web
sites.” Internet Research, Vol. 22 Iss. 2, pp. 211-233
U.S. Census Bureau (2012). “Retail Trade Sales--Total and E-Commerce by Kind of Business.
United States Department of Commerce.”
http://census.gov/compendia/statab/2012/tables/12s1055.pdf (date accessed 18-9-2014)
Venkatesh, V. (2000). “Determinants of perceived ease of use: integrating control, intrinsic
motivation, and emotion into the technology acceptance model.” Information System
Research. Vol. 11 Iss. 4, pp. 342-365
Venkatraman, M. P. (1989) "Involvement and Risk," Psychology & Marketing, Vol. 6 Iss. 3,
pp. 229-247
Vijayasarathy, L.R. (2004). “Predicting consumer intentions to use on-line shopping: the case
for an augmented technology acceptance model.” Information Management, Vol. 41 Iss. 6,
pp. 747-762
Ward, S., K. Bridges and B. Chitty (2005), “Do incentives matter? An examination of on-line
privacy concerns and willingness to provide personal and financial information” Journal of
marketing communications, Vol. 11 Iss. 1, pp. 21-40
Westin, A. (1967). “Privacy and Freedom.” New York: Atheneum
54
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
Xu, H., H.H. Teo, B.C.Y Tan and R, Aagarwal (2010). “The role of push-pull technology in
privacy calculus: The case of location-based services.” Journal of Management Information
Systems, Vol. 26 Iss. 3, pp. 137-176
Venkatesh, V., M.G. Morris, G.B. Davis and F.D. Davis (2003) "User Acceptance of
Information Technology: toward A Unified View." MIS Quarterly, Vol. 27 Iss. 3, pp. 425-478
Venkatesh, V., J.Y.L. Thong and X. Xu (2012) “Consumer acceptance and use of information
technology: extending the unified theory of acceptance and use of technology.” MIS
Quarterly, Vol. 36 Iss. 1, pp. 157-178
Von Stetten, A., Wild, U. and Chrennikow, W. (2011), “Adopting social network sites - the
role of individual IT culture and privacy concerns”, Proceedings of the Americas Conference
on Information Systems (AMCIS 2011), Detroit, MI, 4-7 August
Zheitaml, V.A. (1988). “Consumer perceptions of price, quality and value: A means-end
model and synthesis of evidence.” Journal of Marketing, Vol. 52 Iss. 2, pp. 2-22
Zhou, T. (2012), “Examing location-based services usage from the perspectives of unified
theory of acceptance and use of technology and privacy risk” Journal of electronic commerce
research, Vol. 13 Iss. 3, pp. 135-144
55
The role of privacy in technology acceptance - the effect of privacy concern on intention to use E-commerce
56