Professional Documents
Culture Documents
com/harris_mkt
http://uk.linkedin.com/pub/harris-imran/44/1b4/bb0/
harris_mkt@hotmail.co.uk
Acknowledgments
This dissertation could not have been completed without hard work, perseverance and commitment to the study. In life, you learn to appreciate the people who provide you with help and support when you need it most, but ultimately it is you who determines the outcomes of success or failure you achieve in life. Id like to show gratitude towards Grant Timms, my supervisor, for his support throughout the course of the process. Id like to also thank the participants who took part and helped me with the research process.
Abstract
The revolution of the internet has provided both consumers and companies with endless opportunities of potential; the ability to share and absorb mass amounts of information at high speeds on a global scale has never been so easy (Winer, 2001). The capacity to collect and share mass amounts of information with ease has been identified by many marketers as potential to reach heights of consumer profiling that have never been achieved before (Kotler and Zaltman, 1971). This however has resulted in consumers losing confidence in entering transactional relationships online, hampering many organisations ability to conduct business (Malhotra et al, 2004). The purpose of this study was to understand what the implications are of consumer privacy attitudes towards the disclosure of personal information online and what firms online can do to reduce the consumer apprehensions of sharing personal data. The process of the study began with a review of the relevant literature, establishing an understanding of privacy and the relevant dimensions within the notion that affect consumer concerns. It was identified from the social contract theory three key constructs are associated with consumer concerns of disclosing data; collection, control and awareness. Thusly, the research encompassed Malhotra et als (2004) Internet Users Information Privacy Concerns model (IUIPC), measuring consumer attitudes towards the collection of data, control for shared data and being made aware of the collection of personal data. The research findings did in fact reflect respondents held general concerns for privacy online, especially in the case of unknown entities collecting data. The majority of the respondents were very concerned of personal data being compromised, especially so for financial items of information. Strong attitudes were identified towards the awareness, collection and control of personal data.
Contents
1.0 Background ................................................................................................................. 8 1.1 Importance of the Study .................................................................................... 9
1.2 Research Question .................................................................................................. 9 1.3 Limitations .............................................................................................................. 9 1.3.1 Sample ............................................................................................................. 9 2.0 Literature Review ...................................................................................................... 10 2.1 Introduction .......................................................................................................... 10 2.2 The States, Dimensions and Functions of Privacy ................................................ 10 2.2.1 Information Privacy........................................................................................ 12 2.3 Consumer Privacy ................................................................................................. 12 2.3.1 Consumer Privacy Concerns .......................................................................... 13 2.4 The Collection of Consumer Data Online ............................................................. 14 2.4.1 The Implications of Online Data Collection ................................................... 14 2.5 Theoretical Frameworks of Individual Attitudes and Behaviours towards Online Information Privacy..................................................................................................... 16 2.5.1 Theory of Reasoned Action & the Theory of Reasoned Behaviour ............... 16 2.5.2 Social Contract Theory ................................................................................... 17 2.5.3 Privacy Calculus.............................................................................................. 19 2.6 Measuring Consumer Privacy Concerns (CFIP & IUIPC Models) .......................... 19 2.7 Organisational Factors of Theoretical Privacy Concerns ...................................... 20 2.7.1 Procedural Fairness Theory ........................................................................... 20 2.7.2 Social Presence Theory .................................................................................. 21 2.7.3 Social Response Theory ................................................................................. 21 2.8 Development of an Hypothesis ............................................................................ 22 2.8.1 Hypothesis ..................................................................................................... 22
3.0 Methodology............................................................................................................. 23 3.1 Chapter Introduction ............................................................................................ 23 3.2 Research Purpose ................................................................................................. 23 3.3 Research Philosophies .......................................................................................... 23 3.4 Research Approach ............................................................................................... 25 3.5 Research Strategy ................................................................................................. 25 3.5.1 Questionnaire ................................................................................................ 27 3.5.2 Interviews ...................................................................................................... 28 3.6 Time Horizons ....................................................................................................... 29 3.7 Research Conduct ................................................................................................. 29 3.7.1 Sampling......................................................................................................... 29 3.8 Data Analysis ......................................................................................................... 30 3.8.1 Data quality .................................................................................................... 30 3.8.2 Reliability........................................................................................................ 30 3.8.3 Validity ........................................................................................................... 31 3.9 Considerations ...................................................................................................... 31 3.9.1 Ethical considerations .................................................................................... 31 3.9.2 Budget Constraints ........................................................................................ 32 3.9.3 Sample Constraints ........................................................................................ 32 3.10 Chapter Summary ............................................................................................... 32 4.0 Results ....................................................................................................................... 33 4.1 Introduction .......................................................................................................... 33 4.2 Questionnaire ....................................................................................................... 33 4.3 Summary of Respondents ..................................................................................... 34 4.3.1 Age & Gender................................................................................................. 34
4.4 Exploratory Data Analysis of Internet Use, Online Privacy Concerns and Experience................................................................................................................... 35 4.4.1 Internet Usage ............................................................................................... 35 4.4.2 Experiences of Privacy Invasion ..................................................................... 36 4.4.3 General Concerns for Privacy Online ............................................................. 37 4.5 Central Tendency & Dispersion Measurement of Respondents Level of Privacy Concerns Online .......................................................................................................... 38 4.5.1 Attitudes of General Privacy Concerns Online .............................................. 38 4.6 Cross Tabulation of General Privacy Concerns ..................................................... 40 4.6.1 Level of Concerns by Gender ......................................................................... 40 4.7 Internet Users Information Privacy Concerns Model: Measurement of Central Tendency & Dispersion ............................................................................................... 42 4.8 Internet Users Information Privacy Concerns Model: Cross Tabulation by General Concerns for Privacy ..................................................................................... 44 4.9 Semi-Structured Interviews .................................................................................. 46 4.9.1 Results ............................................................................................................ 47 4.10 Results Summary ................................................................................................ 48 5.0 Discussion ................................................................................................................. 49 5.1 Introduction .......................................................................................................... 49 5.2 Outcomes .............................................................................................................. 50 5.2.1 Consumers Level of Concern for Privacy Scale ............................................. 50 5.2.2 Internet Users Information Privacy Concerns .............................................. 52 5.3 Summary ............................................................................................................... 53 6.0 Conclusion ................................................................................................................. 54 6.1 Research Implications ........................................................................................... 54 6.2 Implications of the Practice .................................................................................. 55 6.3 Revisiting the Limitations...................................................................................... 55 5
6.3.1 Sample ........................................................................................................... 55 6.3.2 Time ............................................................................................................... 55 6.3.3 IUIPC Model ................................................................................................... 55 6.4 Summary of the Study .......................................................................................... 56 7.0 Appendices................................................................................................................ 57 Appendix One Personal Reflection .......................................................................... 57 Appendix Two Ethics Form ...................................................................................... 58 Appendix Three Questionnaire Levels of Concern .................................................. 61 Appendix Four Questionnaire General Concerns for Privacy .................................. 64 Appendix Five Questionnaire IUIPC Model.............................................................. 66 Appendix Six Participant Consent Form............................................................... 69 Appendix Seven Interview Transcripts .................................................................... 71 Transcript 1 ............................................................................................................. 72 Transcript 2 ............................................................................................................. 74 Transcript 3 ............................................................................................................. 76 8.0 References ................................................................................................................ 78
Figure 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9
Title Age Gender (Percentage) Gender (Number) Frequency of Internet Use Location of Internet Use Invasion of Privacy Frequency General Concerns for Privacy Concern for Information Collected by Unknown Entities Concerns for Family & Friends Accessing Personal Data Levels of Concern for Privacy Online
Page 35 35 35 36 36 37 38 38 38 38
Tables: Table 1.0 1.1 1.2 2.0 2.1 2.2 3.0 3.1 3.2 Title Ranking Scale of Respondents Level of Privacy Concern Top 5 Concerns for Privacy Online: Male Top 5 Concerns for Privacy Online: Female Internet Users Information Privacy Concerns Model: Measurement of Central Tendency & Dispersion Cross Tabulation: General Concern for Privacy Online & The Importance of The right to Control Disclosed Data Cross Tabulation: Frequency of Privacy Invasion & The Importance of Being Made Aware of Disclosed Data Use Semi-Structured Interview Questions Responses 1 Responses 2 Page 40 41 41 42/43 45 46 47 48 49
1.0 Background
Many businesses have progressed from product orientated characteristics to a more market orientated approach (Kotler and Zaltman, 1971) and therefore many marketers have identified the importance of understanding the consumer within a marketing environment (Narver and Slater, 1990). This market orientated approach has led many firms to adopt a number of techniques (such as direct marketing) to establish marketing relationships with consumers and sustain competitive advantage (Jaworski, 1990). Although relationship building mechanisms bring benefits to both consumers and firms, it also carries with it a number of problems concerning consumer apprehensions of disclosing personal data due to the worry of privacy loss and therefore has implications to a firms ability to conduct business (Foxman & Kilcoyne, 1993). Authors such as White (2004) state information privacy online is of concern to individuals due to the ease of which personal data can be shared and collected, therefore many privacy rights advocates have called for organisations to revaluate the nature of consumer data collection methods. The purpose of this research is to gather an understanding of the implications of consumer attitudes towards information privacy in the online environment. The study will look to build upon past research that has identified a need for control, collection and awareness of the use and obtainment of disclosed data as key areas affecting consumer online privacy concerns.
1.3 Limitations
Some limitations of the study have occurred mainly surrounding the sample size and time constraints.
1.3.1 Sample
Due to the time and budget constraints it was difficult to collect data from a vast range of people, instead the study focused mainly on University students. A wider selection of respondents would most probably give a broader range of results as factors such as age, profession and also internet usage would vary greatly. Furthermore compared to older generations, students are more likely to use a vast array of internet media communications and therefore may be more comfortable in participating in online business transactions (Baek and Morimoto, 2012), although acting as a limitation in the study the argument can be made that this particular age group is an important consumer within the online environment.
10
remain unknown, or free from identification. Furthermore four functions of privacy were also discovered; personal autonomy, self-evaluation, emotional release and limited communication (Westin, 1967). These functions provide an individual with many social and emotional benefits such as the ability to act with independence through the function of personal autonomy, and also allowing someone the space to relieve pressures through the function of emotional release (Lanier & Saini, 2008; Shils, 1959; Goffman 1959). Clarke (1997) proposed a definition of privacy, which was: The interest that individuals have in sustaining a personal space, free from interference by other people and organisations This classification of privacy ensued Clarke to note a number of dimensions within the concept: Privacy of The Person: Concerned with the privacy of a persons body such as samples of DNA being taken without consent.
Privacy of Personal Behaviour: This dimension highlights the issues concerning the discretion of a persons behaviour within society such as their sexual orientation or religious belief.
Privacy of Personal Communications: This calls for the need to limit surveillance of a persons communication channels. The last decade has seen technological communications become so advanced that the issue has become especially prevalent.
Privacy of Personal Data: The most common dimension within the marketing environment, deals with a persons personal data and the need for individuals to possess some form of control over the dissemination of this data. Also known as information privacy. (Clarke, 1997)
11
This review will focus mainly on Information Privacy or Privacy of an individuals Personal Data, as most studies conducted concerning consumer privacy has focused on this paradigm.
12
His proposed definition of consumer privacy encompassed two main elements; the first being the social dimensions of privacy touching upon the ability to have some control over the presence of others within the consumers environment during a transaction, such as the number of interferences from other marketers and also the presence of other consumers (Lanier & Saini, 2008; Milne & Gordon 1993). The second part of the definition relates to the marketing and professional use of the information, provided by the consumer, and the ability to control unwarranted intrusions into their personal environment (Mascarenhas, 2003). Other studies have developed another important dimension of consumer privacy (Foxman & Kilcoyne, 1993) noting the importance of consumer knowledge within the make-up of consumer privacy, referring to the level of which firms inform consumers about the information practices and their privacy rights with regards to the submitting of personal data (Nowak & Phelps, 1997).
detailed profile of consumers and involves the reading and analysing of packets of information resultant of online user activity (Stecklow and Sonne, 2010). The method of web scraping, a rather questionable act of data collection, comprises collection of personal details shared by users on forum discussions and social media sites for the purpose of creating personal profiles of particular users; most information collected using this method is shared on private member only networks and is intended to be confidential (Angwin and Stecklow, 2010). A recent example of this use of data collection appeared in 2010 when the healthcare website patientslikeme.com noticed an intruder had accessed one of the sites discussion boards and with the use of sophisticated software was scraping all of the messages on the forum, it was later identified that the intruder was part of Nielsen Co, a private New York media-research firm (Angwing and Stecklow, 2010). Digital-device fingerprinting is one of the most criticised forms of tracking, the method works by collecting transmitted information from connected devices such as details of the operating system and browser versions, these signals are then shaped into a unique persistent fingerprint for specific devices; this indicator is used for similar purposes as the cookie technology of targeting and frequency capping (Angwin and Valentino-DeVries, 2010). With so many opportunities of data collection available to marketers, there has never been a time where detailed, accurate well informed personal profiles of consumers can be built and consequently sold amongst companies (Mascarenhas, 2003). Franzak (2003) calls attention to customers adopting feelings of insecurity with regards to the application of invasive methods of data collection and the acquiescence of control over the methods. Privacy violations transpire when firms use its customers information for uses of which the customer did not sanction at the time when personal data was submitted (Nakra, 2001). Consumer Privacy concerns have been present much before the introduction of the internet, however the ease of which mass information can be collected and disseminated without consent is the reason why it has become a much spoken about topic (Ho, 1999).
15
2.5 Theoretical Frameworks of Individual Attitudes and Behaviours towards Online Information Privacy
Several studies have been written and developed from a variety of theoretical backgrounds regarding the growing concerns of individuals information privacy in the online environment (Belanger, 2011; Li, 2011; Pavlou, 2011). Many theories illustrated by a number of researchers highlight the foundation of consumer privacy concerns online and the consequential behavioural attitudes to share personal data during an online transaction (Li, 2012).
16
strengths of the two beliefs within a specific environment determines a persons attitude.
transparency in the conduct of certain procedures, which also encompass the individuals ability to have some control over the procedures (Tyler, 1994; Malhotra et al, 2004). This essentially means consumers will call for the need of some control to have a prevalent effect on a firms information practices that they dont think is appropriate (Malhotra et al, 2004). Lanier and Saini (2008) note that a consumers desire for control is especially important in the online environment as the likelihood of personal data being used for unprincipled benefits is high and will consequently break many social contract established. Alge (2001) also states that when individuals exchange personal data, they do so in a highly risky environment (online) and therefore the mechanisms behind a social contract need to establish enough control for the consumer to manipulate the dissemination of their data. This has led Claudill and Murphy (2002) to suggest consumer concerns for privacy, focus on how much control they have over their personal data through mechanisms of exit and approval. Some studies have recognised individual needs for control of the use and dissemination of personal data (Malhotra et al, 2004). Authors such as Phelps et al (2002) have established in their study consumers have called for a requirement of more control in order to limit unwanted marketing communications online. Collection of Personal Data Data collection is one of the fundamental principles of consumer privacy concerns and is at the core of many organisational objectives in an e-commerce environment (Mascarenhas, 2003). In the context of consumer privacy concerns, collection can be understood as the extent of which an individual is apprehensive regarding the volume of personal data required in relation to the possible outcomes achieved in providing personal data (Culnan and Bies, 2003). Malhotra et al (2004) summarise a fair exchange as the process in which individuals provide personal data in exchange for a service or product once they have assessed the exchange will be beneficial to them. If the assessment results in negative outcomes as a result of the exchange, consumers will avoid the situation (Cohen, 1987). Awareness of Information Practices As many studies have sought to define privacy in the context of the consumer (Goodwin, 1991; Clarke, 1999; Lanier & Saini, 2008) citing control of personal data as a 18
key construct, some authors suggest the consumer also needs to hold some degree of awareness of the collection of data (Foxman & Kilcoyne, 1993). Awareness differs from control with the respect that its a slightly mellow element of info rmation privacy, as it is concerned with the level of which a consumer is aware of a firms information privacy practices (Malhotra et al, 2004; Culnan, 1995). Sheehan & Hoy (2000) note awareness compliments the control element of the social contract theory but is very different from control in practice.
individuals concern for privacy (Smith et al, 1996). However the limitation of this model was its unintended use to be applied in an online context. Therefore Malhotra et al (2004) identified the need to develop a model that could measure information privacy concerns within the online environment. The Internet Users Information Privacy Concerns model (IUIPC) was the consequential outcome, the higher-order construct scale works on the basis of the Social Contract Theory and measures the three dimensions of Control, Collection and Awareness (Malhotra et al, 2004). Buchanan et al (2006) have also administered a study, in the field of psychology, in attempt to measure privacy attitudes online; however their attempted research was focused on identifying general concerns for privacy. It encompasses the use of a 16 point scale that measures different types of general online concerns respondents may have, each response is measured using a 5 point Likert Scale of awareness. It also looked to understanding the actions individuals were taking to protect privacy, using the constructs of General Caution and Technical Protection (Buchanan et al, 2006).
consequently allow the dissemination of this information but only when there exists procedures (such as FIP) that safeguard ones privacy (Culnan and Armstrong, 1999).
21
2.8.1 Hypothesis
H1: Consumers will respond positively for the need for control of personal data. H2: Consumers will respond positively for the need for organisations to make clear their intended use of personal data.
22
3.0 Methodology
3.1 Chapter Introduction
In order to proceed with the research question proposed, an exploration into research methods that will aid the cause for a conclusion needed to be established. This chapter will discuss the approach adopted to tackle the research question and also justifications for the strategy.
commitments one makes with regards to the strategy adopted as this will impact on the ability to not only carry out certain research methods but also how an understanding of the research is achieved. The studys characteristics meant that to understand concerns consumers hold towards disclosure of information, data regarding their attitudes towards certain situations of information disclosure was the most suitable form of research strategy. Thus akin to a positivist approach, as Gill and Johnson (2010) note this form of research philosophy embraces the position of the natural scientist where the collection of data about a distinct reality is subjected to analyses in order to achieve formal generalisations of regularities and causal relationships within the findings. Furthermore due to the limitations of budget and time constraints, another appealing component of the positivist philosophy is the cheap nature and value-free stance that can be taken. The value-free assumption plays on the basis that the researcher is value neutral, having no value judgements, this has created some criticisms that a value-free outcome becomes totally objective (Crotty, 1998). This stance also has an element of independence, Remenyi et al (1998) write that researchers arent dependent on anyone nor does the subject of research have any considerable effect on an outcome. The initial stages of the research gathered a simple broad understanding of consumer concerns of information disclosure; this then left room to further interrogate the research initially gathered to gain a richer understanding of consumer apprehensions. Some authors believe that the positivism approach overlooks the emotional human element, a component which cannot be ignored (Johnson, 2002). Instead positivist researchers use a highly structured methodology to assist with the interrogation of data. Arguments note that the strategy is limited and has disadvantages as the intricacies of social areas of business makes it very difficult to approach people being detached from their social contexts (Saunders et al, 2010). Measuring consumer concerns through a quantitative method did limit the depth of the data gathered, as the study aims to understand attitudes it is important to implement an interpretivist attitude too. The interpretivism approach advocates the need for the researcher to understand the differences between people in our roles as social actors (Easterby-
24
Smith et al, 2012). Mixes between qualitative and quantitative methods are highly appropriate to gain a greater understanding of the study.
questions. The survey strategy served as an appropriate tool when gathering respondents levels of concerns and attitudes as these emotions are usually gathered by asking the question how? and what?. Furthermore Saunders et al (2012) note, surveys that usually adopt questionnaires help facilitate the collection of standardised data from a large population in very economical circumstances. Therefore the use of this method was especially important due to the time constraints the study had to gather data, questionnaires served as a good method of collecting data from a vast number of respondents; however Silverman (2000) states quantitative methods do not allow the research to be evaluated in great depth. Easterby-Smith et al (2012) understand that quantitative methods are an important part of the research process identifying what features best give a story of the data and then search for patterns within the data to develop conclusions of the studys research. This simple process of summarizing and developing conclusions allowed the research findings to be illustrated efficiently. Qualitative methods generally study the meanings and relationships of participant (Saunders et al, 2012) and served as a relevant tool to pull out in depth insights of consumer concerns for privacy established in the quantitative phase. As the strategic method integrates two methods of research, the timing within the process conducted a sequential mixed method research approach as two phases of data collection and analysis needed to be established. Sequential mixed methods research is conducted with more than one phase of data collection and analysis and allows the ability to further understand or elaborate on a preliminary set of findings (Saunders et al, 2012). The double-phase research design adopted was the sequential explanatory approach, whereby the quantitative data methods are followed by qualitative research to gain further insight (Creswell and Plano Clark, 2007). The chosen research strategy is directed by firstly the aim of the research question, which is to gain an understanding of consumer privacy attitudes towards online marketing methods, secondly the research philosophy of which this adheres to, thirdly the approach adopted and finally the purpose of the research.
26
3.5.1 Questionnaire
The nature of this study called for the use of a closed end questionnaire which encompassed the use of ordinal variables, this data collection method presents the respondent with predefined answers to choose from. The questionnaire was designed in accordance with Malhotra et als (2004) IUIPC model of measuring privacy attitudes specifically focusing on the dimensions of Control, Awareness and Collection of personal data online. Questions were designed in accordance of each dimension. Secondly, the questionnaire also looked to build upon Buchanan et als (2006) 16 point scale to measure respondents general privacy concerns online. The questionnaire implemented a 5 point Likert Scale to measure both the respondent attitudes towards control, awareness and collection and also their general concern for privacy online. The First stage of measuring attitude using the IUIPC scale was done so with a level of agreement Likert Scale the second phase used a level of concern Likert Scale. Justifications As the study takes on an explanatory research approach it called for the use of questionnaires. Saunders et al (2009) state the use of questionnaires allows the researcher to retrieve data quickly and efficiently, Robson (2002) further state that the use of standardised questions allows the respondent interpretations to follow a similar trend. The use of questionnaires was also used to create an initial understanding of consumer privacy attitudes which would then be investigated further through the use of qualitative research to drive a richer understanding; Saunders et al (2009) also write that questionnaires can be used in a multiple-methods research design to compliment other more exploratory methods of research. Easterby-Smith et al (2012) make note of the great importance of designing the questionnaire in a manner that can be easily read and also analysed, uses of the Likert scale allow both the respondent and researcher to efficiently carry out their required actions. Also basing the survey on existing models of research reinforces the reliability of the collection method (Bell, 2005).
27
3.5.2 Interviews
To gain a richer understanding of consumer privacy attitudes a semi-structured interview was also conducted following on from the questionnaires. The objective of the interview was to further discuss the reasons behind privacy concerns online. Saunders et al (2009) define semi-structured interviews as the process where a list of themes and questions are established by the researcher; furthermore the loose structure of the interview leaves room for omitting certain questions in regards to the interview (Easterby-Smith et al, 2012). Therefore this method allowed the interview to be integrated from the basis of the questionnaire, as the theme of the interview was based upon the social contract theory. The participants were selected from those who agreed to take part with further questioning, which was asked within the questionnaire, this was prompted as the need to ask respondents who are interested in the subject matter will in turn gain richer insight as Stokes and Bergin (2006) note the researcher should look for people who understand the research subject to some degree. Justifications Many authors identify a variety of different types of interview (Healey, 1991; Robson, 2002; Saunders et al, 2012) all of which note that interviews take either a highly formal structured approach or adopt the opposite which consists of an informal unstructured design. Although, Easterby-Smith et al (2012) identify that a correct single approach doesnt exist but the form of research being implemented holds an important role when deciding which type of interview design to choose. Saunders et al (2009) defines the two interview approaches as structured and semi-structured. Regarding the first approach (structured interviews) the authors write it takes on a predetermined standardised basis, each question is read out and the interview process sticks by the set questions rarely moving away from them. The semi-structured interviews though take on a slightly relaxed approach; the researcher covers pre-established themes and questions which may vary with each interview (Saunders et al, 2009). Furthermore Denscombe (2003) writes that the semi-structured format allows the researcher to take on more control over the nature of the responses and the length of the answers, something which isnt quite so prevalent in structured interviews. 28
of Northampton. Although this sample may have many implications contributing to the restrictive stance it holds, students are one of the main internet and smart-phone users and are an important segment to consider.
3.8.2 Reliability
The reliability of the research is referred to the degree of which the data collection methods and consequently the analytical processes can create consistent findings (Easterby-Smith et al, 2012). Robson (2002) notes four components that may have implications to the reliability of the research data; Participant Error, Participant Bias, Observer Error and Observer Bias. To limit the effects of participant bias within the study it was important to conduct the questionnaires at a time of the respondents convenience, to achieve this amongst students, places of study were avoided as this environment was an inappropriate location to disrupt. Instead the use of online questionnaires was utilised as this method of collection allowed the participant to not only choose a time but they were also given the ability to choose the environment to complete the survey. All physical forms of the survey were distributed by asking the possible respondents first if they would like to participate. The steps taken to avoid a participant bias were to grant the respondent with the option of anonymity. The risk of observer error didnt apply to the closed questions nature of the questionnaire nevertheless the interviews conducted were open ended and subject to influence, the threat to reliability however was reduced with the implementation of predetermined questions asked word for word with the only time an additional question would be asked was if there arose an opportunity to develop better insight, and also if the answers were straying away from the relevant topic.
30
3.8.3 Validity
Easterby-Smith et al write the validity of a research project is the extent of which the findings provide an accurate representation of the concepts they are supposed to be describing. Saunders et al (2009) has noted the key areas that pose a threat to the research validity as History, Testing, Instrumentation, Mortality, Maturation and Ambiguity. In relation to the study, maturation posed a threat to the validity with regards to the time between the respondents answering the questionnaire and then taking part with an interview, during this time a great deal of information of online marketing data collection methods could be learnt and directly impact the respondents view. To minimise this occurrence, the interview was conducted within two days of receiving the respondents questionnaire to limit the amount of external influence. Instrumentation carries the possibility of affecting the research results via the measurement tool used. In the instance of the study makes use of semi-structured interviews, this called for the collection of information to be done so objectively and thus the questions of the interview were predetermined.
3.9 Considerations
3.9.1 Ethical considerations
Ethical considerations are an important area to note within the make-up of the research, Saunders et al (2009) note that the ethical concerns will emerge through the planning stages and refers to the appropriateness of the researchers behaviour towards those participating. When conducting research an option to grant anonymity was given to the participants, as Saunders et al (2009) note this non-maleficence is seen as the cornerstone of ethical issues. A summary of the research purpose was also presented for the participant to gain an understanding of the research they were partaking in. For classification purposes the survey asked for the respondents age and gender; however each participant was informed that the purposes of the research would not consist of the dissemination of personal data. Furthermore the only instances that a name and contact details was required was when the respondent was asked if they would be want to be involved in further study (semi-structured 31
interviews). To allow the participants to withdraw their information, a reference code was given with a contact email; this allowed respondents to simply ask for the removal of their data.
32
4.0 Results
4.1 Introduction
This section assembles the key research findings, obtained from both the questionnaires and the semi-structured interviews, an analysis of the key findings obtained from the questionnaires will be presented. The results section mainly focuses on the questionnaire results and some insight in the key understandings gathered from the interviews.
4.2 Questionnaire
The questionnaires made up the quantitative phase of the study, as stated in the methodology, and were designed in accordance with Malhotra et als (2004) privacy scale the Internet Users Information Privacy Concerns model (IUIPC) to measure consumer attitudes with regards to three main constructs; Control, Collection and Awareness. Furthermore the questionnaire also looked to gather some data on respondents Internet usage and also their experience of privacy invasion online. Additionally the questionnaire also implemented Buchanan et als (2006) 16 point scale to measure the general privacy concerns people have on the internet. The questionnaire used a five point Likert awareness scale (1=strongly disagree and 5=strongly agree) in accordance with the IUIPC model to measure consumer attitudes on Control, Awareness and Collection of personal data. A five point Likert concern scale (1=not at all concerned and 5=extremely concerned) was applied to measure respondents general concern for privacy online. In total 113 questionnaires were completed by a sample of University students attending the University of Northampton.
33
All surveys were completed online. The average age of the sample was 21.
Males (59%) were the majority gender represented in the study, compared to Females (41%).
34
4.4 Exploratory Data Analysis of Internet Use, Online Privacy Concerns and Experience
4.4.1 Internet Usage
Unsurprisingly due to the nature of the sample, all respondents used the Internet at least more than once a day. 94% of the participants stated they use the internet Several times a day.
Do you use the internet at least once a week at either of the following? University, Work, Home, or Other?
28% of the responses stated internet use occurred in other locations; places such as Cafes, Pubs and Smart Phones were noted.
35
A cumulative total of only 22% represented those who felt they were rarely or never victims of privacy invasion.
36
43% of the respondents indicated they were somewhat concerned about their general privacy online.
How concerned are you about personal information online being accessed and collected by businesses or people you dont know?
Over half of the respondents indicated they were extremely concerned (53%) about their data being obtained by people or businesses they dont know.
How concerned are you about family or friends being able to access your personal information online? 61% of the respondents were Not at all concerned about family or friends accessing personal data.
37
4.5 Central Tendency & Dispersion Measurement of Respondents Level of Privacy Concerns Online
4.5.1 Attitudes of General Privacy Concerns Online
Table 1.0 represents the respondents level of concern for privacy online; it is produced on the basis of Buchanan et als (2006) 16 point privacy concern measurement scale. For each item, respondents indicated how concerned they were on a 5 point Likert scale where 1=not at all concerned and 5=extremely concerned. General Concern for Online Privacy item was omitted from the scale leaving 15 items to measure respondents concerns. The Central Tendency measurement represents the average of the data set, for this study the average is constructed of the Mean score for each item; from the Mean respondents average level of concern was calculated from all 15 items. Dispersion measures the diversity within a data set. Standard Deviation (SD) was used to reflect how diverse peoples privacy concerns were for each item. Theres some evidence to suggest that as the level of privacy importance decreases the SD value increases, reflecting more varied attitudes amongst items of lower privacy concerns.
38
Table 1.0 Ranking Scale of Respondents Level of Privacy Concern (Descending order of Concern) Measure of Central Tendency Mean (Level of Concern) 4.82 4.78 4.63 4.36 3.76 3.66 3.58 2.96 2.73 2.45 2.19 2.12 2.05 1.83 1.44 High Concern Measure of Dispersion Standard Deviation 0.38 0.42 0.64 0.66 0.84 0.79 0.75 0.69 0.65 0.65 0.58 0.60 0.50 0.52 0.53
Concern
Table 1.0
Low Concern
39
The Privacy Concern Scale (Table 1.0) shows that the respondents felt any unauthorised use or access of financial information was of high concern, as the two highest ranked forms of online privacy online are items concerned with respondents credit/debit cards being compromised either by interception during a transaction or mischarged during a purchase. Both items also had the least variance (0.38 & 0.48) showing a low variation of answers and therefore further reinforcing the high level of concern. Furthermore high concerns were also notably attached to situations where an individuals information would be compromised; Online Identity Theft and Information collated by unknown entities were amongst the top five most concerned items. Other individuals or organisations misrepresenting themselves online was less of a concern to respondents, this may be due to the experience the sample have on the internet as the majority stated they use the internet Several times a day (94%).
Females showed a marginally higher level of concern (3.3) for online privacy in comparison to Males (3.1).
40
Top 5 Concerns for Privacy Online: Male (N=number of respondents) As stated in Table 1.0, concerns related to financial information being compromised ranked as items of high concern. This also resonated with the male respondents.
High concerns for financial information was also reflected amongst Female respondents, however Online Identity Theft was similarly idenitifed as an important cause for concern (4.83). Interestingly Female respondents felt more concern for Being asked too much personal information (3.74) than Male respondents (3.66).
41
4.7 Internet Users Information Privacy Concerns Model: Measurement of Central Tendency & Dispersion
Table 2.0 represents respondents attitudes towards each construct (Control, Collection & Awareness) of the IUIPC model; the Central Tendency was measured by the Mean score for each statement. The Awareness construct especially reflected a high level of agreement amongst the respondents. The Dispersion measured the variation amongst the data set.
Constructs
Mean
Std. Deviation
Collection
113
4.14
0.60
113
4.03
0.84
When online sites ask me for personal information, I sometimes think twice before disclosing information
113
3.90
0.94
I am concerned about giving my personal information to many online sites 113 3.75 1.00
Control
I believe it is important for online consumers to be able to exercise some control over the use of disclosed personal data 113 4.72 0.51
I believe that online privacy is invaded when control is lost or unwillingly reduced as a result of a marketing transaction
113
4.49
0.66
42
Continued
Constructs
Mean
Std. Deviatio n
1.21
Control (cont.)
I am concerned that if I disclose personal data online it could be misused if I am not given an option to control it
113
3.89
113
4.56
0.50
It is very important to me that I am aware and knowledgeable about how my personal information will be used 113 4.52 0.57
Online sites seeking information online should disclose the way the data are collected, processed and used
113
4.32
0.62
Table 2.0
43
4.8 Internet Users Information Privacy Concerns Model: Cross Tabulation by General Concerns for Privacy
Cross Tabulation is a useful technique applied to quantitative data in order to analyse the relationship between two or more variables. The following tables represent an analysis of the relationship between respondents general privacy concerns and the key items taken from each of the Awareness and Control constructs of the IUIPC model.
General concern for privacy online * I believe it is important for online consumers to be able to exercise some control over the use of disclosed personal data Cross Tabulation Count I believe it is important for online consumers to be able to exercise some control over the use of disclosed personal data Neither Disagree nor Agree Slightly concerned 2 9 4 15 Somewhat Agree Strongly Agree Total
13
35
49
32
36
Extremely Concerned
0 3
0 26
13 84
13 113
Total
Table 2.1 Cross Tabulation: General Concern for Privacy Online & The Importance of The right to Control Disclosed Data Table 2.1 reflects the relationship between respondents General concern for privacy online and the highest ranked item in the Control construct I believe it is important for online consumers to be able to exercise some control over the use of disclosed personal data. 60% of those who were Slightly concerned for their online privacy Somewhat agreed that it is important for consumers to have some right of control over disclosed personal information. However, 71% of those who were Somewhat
44
Concerned and 89% of those who were Moderately Concerned Strongly agreed with the importance of having some control over disclosed personal information; expectedly, 100% of the Extremely Concerned respondents also Strongly agreed with the statement.
How frequently have you personally been the victim of what you felt was an invasion of privacy (e.g. receiving unsolicited phone calls, unsolicited emails, etc?) * It is very important to me that I am aware and knowledgeable about how my personal information will be used Cross tabulation Count It is very important to me that I am aware and knowledgeable about how my personal information will be used Neither Disagree nor Agree Never Rarely Frequency of Privacy Invasion Occasionally A moderate amount A great deal Total 1 2 1 0 0 4 Somewhat Agree 2 15 19 7 3 46 Strongly Agree 0 5 26 20 12 63 3 22 46 27 15 113 Total
Table 2.2 Cross Tabulation: Frequency of Privacy Invasion & The Importance of Being Made Aware of Disclosed Data Use Table 2.2 represents the relationship between the frequencies of privacy invasions and the importance of being made aware about the intended use of disclosed personal data. 68% of those who have Rarely been the victim of some form of privacy invasion Somewhat agreed that being made aware of how their personal information will be used was important to them. In contrast to this, respondents who had more experiences of privacy invasion felt strongly about the importance of being made aware of the intended use of disclosed data. 57% of those who Occasionally experience invasions of privacy Strongly agreed on the importance of being made 45
aware; the same was also found for respondents that Moderately (74%) experienced invasion of privacy and so too those who experienced A great deal (80%) of invasion.
Are you bothered if websites you visit online collect your online activities and habits?
Table 3.0
46
4.9.1 Results
1st Participant (A) Male 2nd Participant (B) Female 3rd Participant (C) Male Collection The first area was concerned with understanding how hesitant the respondents were about sharing personal information with organisations online. Two respondents (B & C) stated that the reputation of the organisation was an important factor whilst respondent (A) wasnt concerned about sharing data as it usually encompasses an exchange for goods. A: Mmm, it depends. When Im buying stuff I have to give my details so Im not really hesitant about it. And its usually stuff Im happy with giving like my address, name and card details. (B): depending on which company and for what reason really. If Im buying something online from a company then if I it looks dubious Ill do quick background check just to reassure my card details wont be stolen. (C): Not to the ones I trust. The ones I trust more Im more likely to give my details to. I really hate giving details to websites that look crap and dont look professional. Also if I really want to buy something, like a game I wanted recently Ill give my details. Table 3.1
Control The next area looked to establish an understanding of the participants attitudes towards the importance of control when making a purchase. All three participants reflected similar attitudes about control, stating that they feel it is important for companies to allow them to exercise some control of the way their personal data will be used. Two of which stated they actively control their data:
47
A: Oh most definitely! When I buy stuff online I always tick the option to not get involved with their promotions or whatever it is they do. B: Oh I see, er, yeah. Even though I like a website I still untick that box about third party companies. Otherwise my email is flooded, so annoying. C: Yeah, well I know the trusted websites will give me the control so control is definitely a factor when I buy something. I buy a lot of stuff from Asos and I know that if I had to I could contact them if I was concerned with anything. Table 3.2
48
5.0 Discussion
5.1 Introduction
This section will analyse the research findings in detail, discussing the key areas uncovered and relating back to the literature (chapter 2). The section has been organised into key section of general concerns for privacy and also the three constructs of the IUIPC model; Control, Collection and Awareness. Hypothesise H1: Consumers will respond positively for the need for control of personal data. H2: Consumers will respond positively for the need for organisations to make clear their intended use of personal data. Outcomes H1: Although control wasnt the most concerned item between the th ree IUIPC constructs of Control, Collection and Awareness, the results from both the interviews and the questionnaires indicated participants did in fact agree strongly with the need for control of data. H2: The results showed awareness was the most concerned item, all levels of the construct measured a high average of concern.
49
5.2 Outcomes
5.2.1 Consumers Level of Concern for Privacy Scale
The initial stage of the research was to gather some insight of the participants general activity online and concerns for privacy. As expected, the large majority of the sample used the internet several times a day; their concerns of privacy did vary slightly but on average respondents expressed some concern for their privacy online. The first model implemented (Table 1.0) was Buchanan et als (2007) 16 point model to measure general concerns people have online, for this study the model was reduced to 15 items excluding the item what are your general concerns for privacy online?. The study looked into the concerns people have regarding informational privacy, as the literature found this to be the main privacy component relevant to consumers (Clarke, 1997; Goodwin, 1991). It was clear to see from the results that privacy concerns related to expressive privacy was not seen to be of high concern, for example the concern for emails being inappropriately forwarded to other unintended readers was represented in the bottom five concerns of privacy within the scale (table 1.0). Although the results showed a low level of concern for expressive privacy, this only shows that the sample of University students do little to protect a realm of expressing their self-identity as DeCew (1997) notes the active protection of ones surroundings to express self-identity defines expressive privacy. A larger more diverse sample of participants may find more varied attitudes towards expressive privacy. Risk-benefit analysis and the Disclosure of Financial Information Within the literature it was found that many studies identified that consumers carry out a risk-benefit analysis prior to disclosing personal information to reduce any negative implications that could occur as a result of disclosure (Xu et al, 2009), looking closely at table 1.0 the scale shows participants rated information being compromised and online identity theft as areas of high concern. Of the compromised information, financial related items were of the most concerned, indicating that consumers perceive the disclosure of their financial details as highly risky. Furthermore two participants that took part in the interviews noted a worry for their card details being stolen and cited hating to disclose data to websites that look unprofessional as This 50
means organisations should do their best to comply with procedural fairness, as Culnan & Armstrong (1999) illustrated, to ensure consumers that the disclosure of this information will not be compromised. Social Presence Within the literature, studies from Sheehan and Hoy (2000) and Short et al (1976) identified that a driving factor of concern for consumers when making a purchase online is the absence of a physical being during a transactional relationship. Therefore one of the objectives of the scale (table 1.0) was to measure how concerned individuals are about companies and people misrepresenting themselves online, or not saying who they really are. Interestingly the results showed that many of the participants were only somewhat concerned about misrepresentation from companies, other people and emails. 52% of the respondents were somewhat concerned about other people misrepresenting themselves online, and 53% were somewhat concerned about receiving emails from false senders. Somewhat concerned attitudes however were less evident towards companies misrepresenting themselves, which accounted for 38% of the total sample. Although the literature found consumers are hesitant to disclose information due to the lack of social presence (Kumar and Benbasar, 2002) studies from Tu (2002) found the implementation of a social actor does little to reassure the consumer. Because the sample was so specific to University students, and therefore limited the scope to test a more varied demographic this may have been the reason why such low levels of concern were perceived on misrepresentation. Data Collection from Unknown Sources One of the more concerned areas of privacy found in the results was the collection of personal information from people of whom the respondents did not know, 46% of the participants indicated they were Extremely concerned about their data being collected from those who they dont know resulting in involuntary disclosure. As Christensen (2011) found that consumers were highly concerned of organisations collecting data without notifying them, although research conducted didnt specifically touch upon concerns regarding the mechanics of involuntary disclosure, enough
51
evidence exists to say that the respondents of this study had high concerns of data collection by unknown entities.
data being shared at ease by organisations, resulting in a highly risky environment for transactional relationships (Lanier & Saini, 2008; Alge, 2001; Winer, 2001). Consequently, the research reflected this, as attitudes towards control of personal data were especially high with the item I believe it is important for online consumers to be able to exercise some control over the use of disclosed personal data being the most important item of concern. Claudill and Murphy (2002) suggested consumer concerns of collection focus on how much control they have over their personal data through mechanisms of exit and approval, in accordance with this the research found the item I am concerned that if I disclose personal data online it could be misused if I am not given an option to control it had high levels of agreement reinforcing Milne and Rohms (2000) argument that organisations should alert consumers of information practices through the use of opt-out or opt-in instruments and privacy policies Awareness From the literature many studies identified the importance of consumer knowledge within the make-up of consumer privacy, referring to the extent to which firms inform consumers about how they will use collected information (Foxman & Kilcoyne, 1993; Nowak & Phelps, 1997). The research showed that the awareness construct was the most concerned item amongst all of the constructs, indicating strong attitudes towards being made aware of the collection and use of disclosed information. The items within the awareness also had the lowest dispersion levels consequently reflecting the positive attitudes respondents have toward the need for awareness.
5.3 Summary
Overall the main findings of the research generally linked with the appropriate literature however some areas such as social presence were slightly disconnected from the literature due to the limitative nature of the sample. Furthermore the research identified that consumer attitudes towards information privacy is reliant on three main areas of the social contract theory, control of disclosed data, awareness of the collection of personal data and also the type and how often collection of data occurs.
53
6.0 Conclusion
This chapter compromises of the conclusion of the study discussing the implications of the research and practice and also highlighting the areas of limitations.
54
6.3.2 Time
Time heavily restricted the research potential, better time management and longer time for the questionnaires may have resulted in a much larger sample which could have reinforced the reliability of the research a little more. For example only three interviews were conducted; more qualitative research could have arrived at some more detailed insight to consumer attitudes of privacy.
55
56
7.0 Appendices
Appendix One Personal Reflection
The journey I embarked on for this dissertation was one of mixed emotions. The study I chose to base my dissertation one was concerns and attitudes towards information privacy. At the beginning of the process I felt I didnt have a focused objective, instead I was looking at general marketing methods that are a cause of concern. I also didnt narrow down the complex notion of privacy to just the relevance to consumers. This lack of preparation impacted on my work progress immensely as the initial stages of the dissertation (literature review) was being amended continuously to fit the research objective. Eventually however I felt I developed a relatively good understanding surround the literature and theory of consumer informational privacy concerns and decided to focus on online marketing issues as this industry was the most spoken in the studies I was reading on. Working to meet other deadlines for other modules was also something I felt was difficult to achieve, on occasions my priorities could have been questioned when considering the amount of work needed to be done for the dissertation. The amount of time spent on the initial stage of the dissertation consequently impacted the potential of the research process as time was of the essence. I tried my best to obtain as many responses as possible with the time I had and also ensure the research was a clear and distinctive. The experienced I gained from the dissertation process I felt was valuable in two instances; firstly on an educational level my knowledge in the field of consumer privacy was increased dramatically. An understanding of the importance and the procedures organisations must take to reduce consumer apprehensions of disclosing data was valuable. Secondly, the process gave me a few things to contemplate for the application of my work in life in general; good prioritisation is an important skill I feel I need to implement in my everyday life.
57
58
59
60
61
Concern
Slightly Concerned
Somewhat Concerned
Moderately Concerned
Extremely Concerned
How concerned are you about: about online organisations not being who they claim they are? about online identity theft? about people online not being who they say they are? about people you do not know obtaining personal information about you from your online activities? about emails you receive not being from whom they say they are? about who might access your medical records electronically? Are you concerned that: you are asked for too much personal information when you register or make online purchases? that information about you could be found on an old computer? that if you use your credit card to buy something on the internet your credit card number will obtained/ .738 intercepted by someone else? that if you use your credit card to buy something on the internet your card will be mischarged? that an email you send may be read by someone else besides the person you sent it to?
1 1 1 1 1 1 1 1 1 1 1
2 2 2 2 2 2 2 2 2 2 2
3 3 3 3 3 3 3 3 3 3 3
4 4 4 4 4 4 4 4 4 4 4
5 5 5 5 5 5 5 5 5 5 5
62
Not at all Concerned Are you concerned that: that an email you send someone may be inappropriately forwarded to others? that an email you send someone may be printed out in a place where others could see it? that a computer virus could send out emails in your name? that an email containing a seemingly legitimate internet address may be fraudulent?
Slightly Concerned
Somewhat Concerned
Moderately Concerned
Extremely Concerned
1 1 1 1
2 2 2 2
3 3 3 3
4 4 4 4
5 5 5 5
63
64
How often do you use the internet? Please tick one Do you use the internet at least once a week in the following places? Tick appropriate
Less often
University
Work
Home
How frequently Never Rarely Occasionally have you personally been the victim of what you felt was an invasion of privacy (e.g. receiving unsolicited phone calls, unsolicited emails, etc?) Answer General Concerns for Privacy Online Not at all Slightly Somewhat concerned concerned concerned How concerned are you generally about your privacy online? How concerned are you about personal information online being accessed and collected by businesses or people you dont know?
Frequently
Very Frequently
Moderately concerned
Extremely concerned
1 1
2 2
3 3
4 4
5 5
65
66
Statement
Strongly Disagree
Somewhat Disagree
Somewhat Agree
Strongly Agree
I am concerned when online sites collect personal information about me I am concerned when online sites ask me for personal information When online sites ask me for personal information, I sometimes think twice before disclosing information I am concerned about giving my personal information to many online sites I believe it is important for online consumers to be able to exercise some control over the use of disclosed personal data I believe that online privacy is invaded when control is lost or unwillingly reduced as a
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
1 1
2 2
3 3
4 4
5 5
67
result of a marketing transaction I am concerned that if I disclose personal data online it could be misused if I am not given an option to control it A good consumer online privacy policy should have clear and understandable disclosure practices It is very important to me that I am aware and knowledgeable about how my personal information will be used Online sites seeking information online should disclose the way the data are collected, processed and used
68
69
_________________________________
Participants signature*
Date
_______________________________
_________________________________
70
1. Are you usually hesitant to give your information to organisations online? Possible Probing Questions 1a) What would reduce your apprehensions (if any) of disclosing personal information 2. When you do give information to an online company for either a transaction or a for signing up to newsletters do you do so knowing you have some control of its use? Possible Probing Questions 2a) Would the lack of control affect your decision to disclose information? 3. Do you feel its important for companies to tell consumers how they will use personal data collected online? Possible Probing Questions 3a) Do you take precautions to safeguard your data? For example delete cookies 4. Are you bothered if websites you visit online collect your online activities and habits?
71
Transcript 1
Semi-structured interview Researcher (R) 1st Participant (A) Age: 22 Gender: Male
R: Hi, good to see you today. I just want to say thanks for showing an interest in taking part in this short interview, as youre aware form the questionnaire the questions asked today are for a study that is looking at the implications of consumer privacy attitudes online. Well look to discuss three areas, your concern of the collection of personal information, your views on having some control over the use of your shared information and also your views on being made aware by companies collecting your data. Okay does that all make sense? A: Yep R: Brilliant, so I presume you use the internet regularly, the questionnaires showed a lot of you used the internet a lot! So when youre online, browsing, buying stuff and all that, would you say youre quite hesitant in sharing your data with companies? A: Mmm, it depends. When Im buying stuff I have to give my details so Im not really hesitant about it. And its usually stuff Im happy with giving like my address, name and card details. R: So youd give your details up for something in return, what if you wanted to view something on a website and you had to give your details like name, a home address and things, to access it? Would you be hesitant then? A: Well, if Im being honest unless Im buying something, I usually lie about stuff like that to get access. Like a forum sites, some magazine sites want my email address and name for me to read an article so I just give an email I dont use and a fake name. R: So if you give fake data would that mean youre hesitant about giving real data? Why do you feel the need to fake a name or use an old email? A: I dont know why I do it, I wouldnt say Im hesitant about giving data but I prefer to have some, er, privacy for things I only need to use once.
72
R: Okay, so would you say providing data for something youre interested in like a product or service is fine but for things, services you only use once or not gonna use that often you like to keep data anonymous? A: Yeah, definitely! R: So when you give a company your data for something youre interested in say a product you like, do you feel its important that you, erm, have control of how that data can be used by the company? A: Oh most definitely! When I buy stuff online I always tick the option to not get involved with their promotions or whatever it is they do. R: Okay, so lets say youre shopping online and you find something you want, if the website doesnt give you any option to control your data will you still give the information and buy it? A: Well (Pauses) If its a company ive used before then most likely I will yes. But if ive never bought something from it then Id think about it, depends how desperately I want this product! (Laughs) R: (Laughs) Thats fine. In that case then, do you think companies online should tell consumers how theyre gonna use the data they collect? A: Definitely R: Could you elaborate on that? A: Yeah, well I think its the responsibility companies have. Its not really fair if my data is sold on to other companies I might not really fancy having my data. R: Brilliant. Well that concludes the interview; I hope you felt comfortable with it and thank you for taking the time to participate. A: No problem.
73
Transcript 2
Semi-structured interview Researcher (R) 2st Participant (B) Age: 22 Gender: Female R: Hello. I just want to start with saying thank you for showing an interest in the study and taking time out to participate in this short interview. B: Thats okay. R: Alright, the interview today will be on the basis of the questionnaire, which is to look at the implications of consumer privacy attitudes online. Today Im hoping to discuss three areas with you. Your concern about the collection of personal information, your views on having some control over the use of your shared information and also your views on being made aware by companies collecting your data. That all cool? B: Yes! R: Perfect, okay lets start. I assume you use the internet regularly B: (Laughs) Definitely! R: So, when youre online would you say youre hesitant in sharing your personal data with companies? B: Well, depending on which company and for what reason really. If Im buying something online from a company then if I it looks dubious Ill do quick background check just to reassure my card details wont be stolen. But just sharing my data willy nilly is not something I do. R: Okay, so trust plays a big part when sharing data? You need to be able to trust the company will treat your data appropriately before youre willing to buy something? B: Hm, definitely. R: Okay then if you do decide to buy something, and the website seems, er, trusting, trustworthy, do you need to have some say in how your information will be used? B: Information like? 74
R: Well, personal details, home address, name, email address? B: Oh I see, er, yeah. Even though I like a website I still untick that box about third party companies. Otherwise my email is flooded, so annoying. R: How important do you think it is for companies to tell consumers how theyll use their personal information? And why? B: I think its very important. Just because the result of data being shared with other companies means youre target for so many emails that are just not of interest. R: Are you bothered about websites collecting data about your online habits and activities? B: Well yes, that would be a real gross invasion of privacy, especially if im not aware of it! R: Okay, I think thats everything. Thank you again. B: Oh thats no problem.
75
Transcript 3
Semi-structured interview Researcher (R) 3rd Participant (C) Age: 24 Gender: Male R: Hi, good to see you today. I just want to say thanks for showing an interest in taking part in this short interview, as youre aware form the questionnaire the questions asked today are for a study that is looking at the implications of consumer privacy attitudes online. Well look to discuss three areas, your concern of the collection of personal information, your views on having some control over the use of your shared information and also your views on being made aware by companies collecting your data. Okay does that all make sense? C: Sure R: When youre online, browsing or buying products for example, do you feel hesitant in sharing your personal data with companies? C: Not to the ones I trust. The ones I trust more Im more likely to give my details to. I really hate giving details to websites that look crap and dont look professional. Also if I really want to buy something, like a game I wanted recently Ill give my details. R: Okay brilliant. So when you do buy something online do you give your personal data knowing that youll have some control of the use of it? C: Yeah, well I know the trusted websites will give me the control so control is definitely a factor when I make a purchase online. I buy a lot of stuff from Asos and I know that if I had to I could contact them if I was concerned with anything. R: Do you feel it is important for companies to tell consumer how they will use collected data? C: Not really, legally Im sure they should have to abide by something. I dont think it matters to be honest. I think consumers have the ability to either not share the information or even ask the organisation if they were really concerned. R: Are you bothered about online websites collecting data regarding your online activities?
76
C: Yeah its annoying but I can live with, I dont mind too much. If I do receive emails linked to this I just disregard them. R: Okay I think thats everything. Thank you again.
77
8.0 References
1. Alge, B. J. 2001. Effects of computer surveillance on perceptions of privacy and procedural justice. J. App. Psych. 86(4) 797804. 2. Allan, E Lind, T Tyler T (1988). The Social Psychology of Procedural Justice. UK: Springer 3. Belanger, F., Hiller, J.S. & Smith, W.J., 2002. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3-4), pp.245270. 4. Blumberg et al (2005). Business Research Methods. UK: McGraw-Hill Higher Education 5. Buchanan, T., Paine, C. & Joinson, A.N., 2007. Development of Measures of Online Privacy Concern and Protection for Use on the Internet. , 58(2), pp.157 165. 6. Burgoon, J.K., Parrott, R., LePoire, B.A., Kelley, D.L., Walther, J.B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationship. Journal of Social and Personal Relationships, 6, 131158. 7. Caudill, E.M., Murphy, P.E., 2000. Consumer online privacy: legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7-20. 8. Christiansen, L., 2011. Personal privacy and Internet marketing: An impossible conflict or a marriage made in heaven? Business Horizons, 54(6), pp.509514. 9. Crotty, M (1998). The Foundations of Social Research. UK: Sage. 10. Cespedes, F. V., H. J. Smith. 1993. Database marketing: New rules for policy and practice. Sloan Management Rev. 34(4) 722. 11. Creswell, J Plan-Clarke, V (2006). Designing and Conducting Mixed Methods Research. UK: Sage Publications. 12. Culnan, M.J. & Armstrong, P.K., 1999. Information Privacy Concerns , Procedural Fairness , and Impersonal Trust : An Empirical Investigation. , (February).
78
13. Culnan, M.J., 2000. Protecting privacy online: is self-regulation working? Journal of Public Policy & Marketing, 19(1), 20-27. 14. DeCew, J. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press. 15. Denscombe, M (2003). The Good Research Guide: For Small-scale Social Research Projects. 2nd ed. UK: Open University. 16. D.L. Hoffman, T.P. Novak, M.A. Peralta, Information privacy in the marketspace: implications for the commercial uses of anonymity on the web, The Information Society 15 (2) (1999) 129139. 17. D.H. Lee, S. Im, C.R. Taylor, Voluntary self-disclosure of information on the internet: a multi-method study of the motivations and consequences of disclosing information on blogs, Psychology and Marketing 25 (7) (2008) 692 710. 18. Dinev, T., Hart, P. & Mullen, M.R., 2008. Internet privacy concerns and beliefs about government surveillance An empirical investigation. The Journal of Strategic Information Systems, 17(3), pp.214233. 19. E.A. Lind, T.R. Tyler, The Social Psychology of Procedural Justice, Plenum Press, New York, 1988. 20. Easterby-Smith et al (2012). Management Research. 4th ed. UK: Sage 21. Erspective, A.G.P., Pavlou, P.A. & Anderson, A.G., 2007. U NDERSTANDING AND M ITIGATING U NCERTAINTY IN O NLINE E XCHANGE R ELATIONSHIPS : A P RINCIPAL . , 31(1), pp.105136. 22. Folger, Robert and Robert J, Bies (1989), "Managerial Responsibilities and Procedural Justice," Employee Responsibilities and Rights Journal, 2, 2, 79-90, 23. Foxman, E. R., P. Kilcoyne. 1993. Information technology, marketing practice, and consumer privacy: Ethical issues. J. Public Policy Marketing 12(1) 106119. 24. Gill, G. Jackson, P (2010). Research Methods for Managers . UK: Sage. 25. Gilliland, S. W. 1993. The perceived fairness of selection systems: An organizational justice perspective. Acad. Management Rev. 18(4) 694734.
79
26. Goodwin, Cathy. 1991. "Privacy: Recognition of a Consumer Right." Journal of Public Policy & Marketing 10 (1): 149-166. 27. Greenberg, Jerald (1985), "Procedural Justice: An Interpretive Analysis of Personnel Systems," in Kendrith M, Rowland and Gerald R, Ferris Research in Personnel and Human Resources Management, Vol 3, Greenwich, CT: JAI Press, 141-183 28. Hann, I.-H. et al., 2007. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach. Journal of Management Information Systems, 24(2), pp.1342. 29. Remenyi, D et al (1998). Doing Research in Business and Management: An Introduction to Process and Method. Sage: UK 30. Hague, P Hague, N, Morgan C (2004). Market Research in Practice. UK: Sage. 31. Hyun Baek, T., & Morimoto, M. (2012). Stay away from me. Examining the determinants of consumer avoidance of personalized advertising. Journal of Advertising, 41(1), 59-76. 32. H.J. Smith, T. Dinev, H. Xu, Information privacy research: an interdisciplinary review, MIS Quarterly 35 (4) (2011) 9891015. 33. K.M. Eisenhardt, Agency theory: an assessment and review, The Academy of Management Review 14 (1) (1989) 5774. 34. Kelemen, M Rumens, N (2008). An Introduction to Critical Management Research. UK: Sage. 35. Kohli, A. K. and Jaworski, B.J. (1990). Market Orientation: The Construct, Research Propositions, and Managerial Implications. The Journal of Marketing, 54(2) 36. Lanier, Clintond D and Saini, Amit. (2008). Understanding Consumer Privacy. Academy of Marketing Science review. 12 (2), 1. 37. Li, Y., 2012. Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), pp.471 481. 38. Mary, J., 1993. How did they get my name ?: An exploratory investigation of. 39. M. Bergen, S. Dutta, O.C. Walker Jr., Agency relationships in marketing: a review of the implications and applications of agency and related, Journal of Marketing 56 (3) (1992) 124. 80
40. M.J. Culnan, P.K. Armstrong, Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation, Organization Science 10 (1) (1999) 104115. 41. Mascarenhas, O,A ,J ., Kesavan, R. and Bernacchi, D,M. (2003). Co-Managing Online Privacy: A Call for Joint Ownership. Journal of Consumer Marketing, 20 (7): 686-702. 42. Malhotra, N.K., Kim, S.S. & Agarwal, J., 2004. Internet Users Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), pp.336355. 43. Milne, George R. and Mary Ellen Gordon. 1993. "Direct Mail Privacy-Efficiency Trade-offs Within an Implied Social Contract Framework." Journal of Public Policy & Marketing 12 (2): 206-215. 44. Phelps, Joseph; Nowak, Glen; Ferrell, Elizabeth, Privacy concerns and consumer willingness to provide personal information, Journal of Public Policy & Marketing; Spring 2000; 19, 1; ABI/INFORM Global pg. 27 45. Samuel D. Warren and Louis D. Brandeis, "The Right to Privacy," Harvard Law Review, 4 (5), (1890): 193-220, p. 195 46. Saunders et al (2009). Research methods for Business Students. London: Pearson Education Limited. 47. Sekaran and Bougie (2013). Research methods for Business Students. UK: Wiley. 48. Sheehan, K. B., M. G. Hoy. 2000. Dimensions of privacy concern among online consumers. J. Public Policy Marketing 19(1) 6273. 49. Silverman, D (2000). Doing qualitative research: a practical handbook. UK: Sage. 50. Smith, H.J., Milberg, S.J. & Burke, S.J., 1996. Information Privacy: Measuring Individuals Concerns about Organizational Practices. MIS Quarterly, 20(2), p.167. Available at: http://www.jstor.org/stable/249477?origin=crossref. 51. Tyler, T. R. 1994. Psychological models of the justice motive: Antecedents of distributive and procedural justice. J. Personality Soc. Psych. 67 850863.
81
52. T. Donaldson, T.W. Dunfee, Toward a unified conception of business ethics: integrative social contracts theory, Academy of Management Review 19 (2) (1994) 252284. 53. Y. Moon, Intimate exchanges: using computers to elicit self-disclosure from consumers, Journal of Consumer Research 26 (4) (2000) 323339. 54. L.C. Wang, J. Baker, J.A. Wagner, K. Wakefield, Can a retail web site be social? Journal of Marketing 71 (2007) 143157. 55. Laufer, R. S., M. Wolfe. 1977. Privacy as a concept and a social issue: A multidimensional development theory. J. Soc. Issues 33(3) 2242. 56. Mohamed, N. & Ahmad, I.H., 2012. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), pp.23662375. 57. Smith, H. J., S. J. Milberg, S. J. Burke. 1996. Information privacy: Measuring individuals concerns about organizational practices. MIS Quart. 20(2) 167196. 58. Westin, A. (1967), Privacy and Freedom. New York: Atheneum 59. William L. Prosser, "Privacy," California Law Review, 48 (1960): 338-423. 60. Winer, R.S., 2001. A Framework for Customer Relationship Management. California Management Review, 43(4), pp.89105. Available at: http://www.jstor.org/stable/info/10.2307/41166102. 61. Xu, H. et al., 2009. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services. Journal of Management Information Systems, 26(3), pp.135174. 62. Zhang, T.C., Agarwal, R. & Lucas, H.C., 2011. R ESEARCH A RTICLE T HE V ALUE OF IT-E NABLED R ETAILER L EARNING : P ERSONALIZED P RODUCT R ECOMMENDATIONS AND C USTOMER S TORE L OYALTY IN E LECTRONIC M ARKETS 1. , 35(4), pp.859881.
82