Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-pftt2 Total loading time: 0 Render date: 2024-05-12T16:20:30.324Z Has data issue: false hasContentIssue false

2 - Privacy, Trust, and Disclosure Online

Published online by Cambridge University Press:  05 June 2012

Carina B. Paine Schofield
Affiliation:
The Open University
Adam N. Joinson
Affiliation:
University of Bath
Azy Barak
Affiliation:
University of Haifa, Israel
Get access

Summary

Introduction

The use of new technology, and particularly the Internet, increasingly requires people to disclose personal information online for various reasons. In computer-mediated communication (CMC), disclosure may serve to reduce uncertainty in an interaction (Tidwell & Walther, 2002) or to establish legitimacy when joining an online group (Galegher, Sproull, & Kiesler, 1998). Disclosure is often a prerequisite to access services (for instance, with the ubiquitous registration form), to make online purchases (Metzger, 2006) or is requested for those same services to be personalized. The increasingly social nature of much web-based software (e.g., social network sites) also places a privacy cost on users due to a heightened requirement for disclosure of personal information as part of the functionality of the system (see BBC News). In addition to this increased need for disclosure, the development of ambient and ubiquitous technologies has raised the possibility that devices will communicate, or even broadcast, personal information without recourse to the user. Moreover, the ability to store information easily and cross-reference databases raises the possibility of unwitting disclosure through information accrual. Perhaps not surprisingly, this has raised a number of privacy concerns, among consumers and privacy advocates (e.g., Jupiter Research, 2002; U.K. Information Commissioner, 2006).

We start this chapter by introducing the existing research literature surrounding privacy and trust online. We then go on to consider how privacy and trust interact in determining online behavior.

Type
Chapter
Information
Psychological Aspects of Cyberspace
Theory, Research, Applications
, pp. 13 - 31
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Electronic Commerce Conference (EC 04; pp. 21–29). New York, NY: ACM Press.Google Scholar
Acquisti, A., & Grossklags, J. (2003). Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. Second Annual Workshop on “Economics and Information Security.”
Altman, I. (1975). The environment and social behaviour. Monterey, CA: Brooks/Cole.Google Scholar
Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33, 66–84.CrossRefGoogle Scholar
Ang, L., & Lee, B.-C. (2000). Influencing perceptions of trustworthiness in Internet commerce: A rational choice framework. In Proceedings of Fifth CollECTer Conference on Electronic Commerce (pp. 1–12). Brisbane.Google Scholar
Bargh, J. A., & McKenna, K. Y. A. (2004). The Internet and social life. Annual Review of Psychology, 55, 573–590.CrossRefGoogle ScholarPubMed
Baron, R. M., & Kenny, D. A. (1986). The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations. Journal of Personality and Social Psychology, 51, 1173–1182.CrossRefGoogle ScholarPubMed
BBC News (2006). Privacy worried over web's future. Retrieved June 2006, from http://news.bbc.co.uk/1/hi/technology/5009774.stm.
Bhattacherjee, A. (2002). Individual trust in online firms: Scale development and initial test. Journal of Management Information Systems, 19, 211–241.Google Scholar
Bos, N., Olson, J. S., Gergle, D., Olson, G. M., & Wright, Z. (2002). Rich media helps trust development. In Proceedings of CHI 2002 (pp. 135–140). New York: ACM Press.Google Scholar
Boyd, J. (2003). The rhetorical construction of trust online. Communication Theory, 13, 392–410.CrossRefGoogle Scholar
Buchanan, T., Paine, C. B., Joinson, A. N., & Reips, U.-D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58, 157–165.CrossRefGoogle Scholar
Burgoon, J. K., Parrott, R., LePoire, B. A., Kelley, D. L., Walther, J. B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationship. Journal of Social and Personal Relationships, 6, 131–158.CrossRefGoogle Scholar
Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6, 181–202.CrossRefGoogle Scholar
Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human-Computer Studies, 58, 737–758.CrossRefGoogle Scholar
DeCew, J. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press.Google Scholar
Derlega, V. J., & Chaikin, A. L. (1977). Privacy and self-disclosure in social relationships. Journal of Social Issues, 33, 102–115.CrossRefGoogle Scholar
Deutsch, M. (1962). Cooperation and trust: Some theoretical notes. Nebraska Symposium on Motivation, 10, 275–318.Google Scholar
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – Measurement validity and a regression model. Behaviour and Information Technology, 23, 413–423.CrossRefGoogle Scholar
Earp, J. B., Anton, A. I., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 53, 227–237.CrossRefGoogle Scholar
Galegher, J., Sproull, L., & Kiesler, S. (1998). Legitimacy, authority and community in electronic support groups. Written Communication, 15, 493–530.CrossRefGoogle Scholar
Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database, 33, 38–53.CrossRefGoogle Scholar
Green, M. (2007). Trust and social interaction on the Internet. In Joinson, A. N., McKenna, K. Y. M., Postmes, T., & Reips, U.-D. (2007). Oxford Handbook of Internet Psychology (pp. 43–52). Oxford, UK: Oxford University Press.Google Scholar
Handy, C. (1995). Trust and the virtual organization. Harvard Business Review, 73, 40–50.Google Scholar
Harper, J., & Singleton, S. (2001). With a grain of salt: What consumer privacy surveys don't tell us. Retrieved on November 29, 2005, from http://www.cei.org/PDFs/with_a_grain_of_salt.pdf.
Heijden, H. V. D., & Verhagen, T. (2002, January). Measuring and assessing online store image: a study of two online bookshops in the Benelux. In Proceedings of the 35th Annual Hawali International Conference on System Sciences, Honolulu, Hawali.Google Scholar
Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42, 80–85.CrossRefGoogle Scholar
Holmes, J. G., & Rempel, J. K. (1989). Trust in close relationships. In Hendrick, C. (Ed.), Close relationships (pp. 187–220). Newbury Park, CA: Sage.Google Scholar
Ingham, R. (1978). Privacy and psychology. In Young, J. B. (Ed.), Privacy (pp. 35–59). Chichester, UK: Wiley.Google Scholar
Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there? Antecedents of trust in global virtual teams. Journal of Management Information Systems, 14, 29–64.CrossRefGoogle Scholar
Jarvenpaa, S. L., & Tractinsky, N. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer Mediated Communication, 5(2). Retrieved on October 19, 2007, from http://jcmc.indiana.edu/vol5/issue2/jarvenpaa.html.Google Scholar
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Management and Technology, 1, 45–71.CrossRefGoogle Scholar
Joinson, A. N. (2001a). Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European Journal of Social Psychology, 31, 177–192.CrossRefGoogle Scholar
Joinson, A. N. (2001b). Knowing me, knowing you: Reciprocal self-disclosure on the Internet. Cyberpsychology & Behavior, 4, 587–591.CrossRefGoogle Scholar
Joinson, A. N., Paine, C. B., Buchanan, T. B, & Reips, U.-R. (under review). Privacy, trust and self-disclosure online. Manuscript submitted for publication.
Joinson, A. N., & Reips, U.-D. (2007). Personalized salutation, power of sender and response rates to Web-based survey. Computers in Human Behavior, 23, 1372–1383.CrossRefGoogle Scholar
Joinson, A. N., Woodley, A., & Reips, U.-D. (2007). Personalization, authentication and self-disclosure in self-administered Internet surveys. Computers in Human Behavior, 23, 275–285.CrossRefGoogle Scholar
Jupiter Research. (2002). Security and privacy data. Presentation to the Federal Trade Commission Consumer Information Security Workshop. Retrieved on June 20, 2005, from http://www.ftc.gov/bcp/workshops/security/0205201leathern.pdf.
Larson, D. G., & Chastain, R. L. (1990). Self-concealment: Conceptualization, measurement, and health implications. Journal of Social and Clinical Psychology, 9, 439–455.CrossRefGoogle Scholar
Liu, C., Marchewka, J. T., Lu, J., & Yu, C.-S. (2005). Beyond concern: A privacy-trust-behavioural intention model of electronic commerce. Information and Management, 42, 289–304.CrossRefGoogle Scholar
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale and a causal model. Information Systems Research, 15, 336–355.CrossRefGoogle Scholar
Margulis, S. T. (2003). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59, 411–429.CrossRefGoogle Scholar
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review 20, 709–734.CrossRefGoogle Scholar
McKenna, K. Y. A., Green, A. S., & Gleason, M. E. J. (2002). Relationship formation on the Internet: What's the big attraction. Journal of Social Issues, 58, 9–32.CrossRefGoogle Scholar
McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23, 473–490.CrossRefGoogle Scholar
Metzger, M. J. (2004). Privacy, trust and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4). Retrieved on June 20, 2005, from http://jcmc.indiana.edu/vol9/issue4/metzger.html.Google Scholar
Metzger, M. J. (2006). Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Communication Research, 33, 155–179.CrossRefGoogle Scholar
Paine, C. B., Joinson, A. N., Reips, U.-D., & Buchanan, T. (2006, September). Privacy, trust, disclosure and the Internet. Paper presented to the Association of Internet Researchers (AOIR). Internet Research 7.0: Internet Convergences, Brisbane, Australia.Google Scholar
Paine, C. B., Reips, U.-D., Steiger, S., Joinson, A., & Buchanan, T. (2007). Internet users' perceptions of “privacy concerns” and “privacy actions.”International Journal of Human-Computer Studies, 65, 526–536.CrossRefGoogle Scholar
Parent, W. (1983). Privacy, morality and the law. Philosophy and Public Affairs, 12, 269–288.Google Scholar
Parks, M. R., & Floyd, K. (1996). Making friends in cyberspace. Journal of Communication, 46, 80–97.CrossRefGoogle Scholar
Pew Internet and American Life Project (Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., & Carter, C.). (2001).: Trust and privacy online: Why Americans want to rewrite the rules. Retrieved on June 15, 2007, from http://www.pewinternet.org/pdfs/PIP_Trust_Privacy_Report.pdf.
Privacy Knowledge Base (2005). Retrieved on June 20, 2005, from http://privacyknowledgebase.com.
Riegelsberger, J., Sasse, M. A., & McCarthy, J. D. (2003). The researcher's dilemma: Evaluating trust in computer mediated communications. International Journal of Human-Computer Studies, 58, 759–781.CrossRefGoogle Scholar
Resnick, P., Zeckhauser, R. (2001). Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system. Retrieved on June 1, 2007, from http://www.si.umich.edu/~presnick/papers/ebayNBER/RZNBERBodegaBay.pdf.
Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems. Communications of the ACM, 43, 45–48.CrossRefGoogle Scholar
Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality, 35, 651–665.CrossRefGoogle ScholarPubMed
Rust, R. T., Kannan, P. K., & Peng, N. (2002). The customer economics of Internet privacy. Journal of the Academy of Marketing Science, 30, 455–464.CrossRefGoogle Scholar
Byford, Schatz K. (1996). Privacy in cyberspace: Constructing a model of privacy for the electronic communications environment. Rutgers Computer and Technology Law Journal, 24, 1–74.Google Scholar
Schoeman, F. (1984). Privacy and intimate information. In Schoeman, F. (Ed.), Philosophical dimensions of privacy (pp. 403–417). Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Schoeman, F. (1992). Privacy and social freedom. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167–196.CrossRefGoogle Scholar
Sparck-Jones, K. (2003). Privacy: What's different now? Interdisciplinary Science Reviews, 28, 287–292.CrossRefGoogle Scholar
Spiekermann, S., Grossklags, J., & Berendt, B. (2001, October). E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. Proceedings of the 3rd ACM Conference on Electronic Commerce, 38–47, Florida, USA.
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13, 36–49.CrossRefGoogle Scholar
Tanis, M., & Postmes, T. (2007). Two faces of anonymity: Paradoxical effects of Cues to identity in CMC. Computers in Human Behaviour, 23, 955–970.CrossRefGoogle Scholar
The Guardian (March 15, 2007). Google to erase information on billions of internet searches. Retrieved on October 19, 2007, from http://www.guardian.co.uk/technology/2007/mar/15/news.microsoft.
Tidwell, L. C., & Walther, J. B. (2002). Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human Communication Research, 28, 317–348.CrossRefGoogle Scholar
Tsai, J., Cranor, L., Acquisti, A., & Fong, C. (2006). What's it to you? A survey of online privacy concerns and risks. Working Papers 06-29, NET Institute.
U.K. Information Commissioner. (2006). A report on the surveillance society [online]. Retrieved 27 November, 2006, from http://tinyurl.com/ya76db.
Viseu, A., Clement, A., & Aspinall, J. (2004). Situating privacy online: Complex perceptions and everyday practices. Information, Communication and Society 7, 92–114.CrossRefGoogle Scholar
Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 3–43.CrossRefGoogle Scholar
Walther, J. B. (1992). Interpersonal effects in computer-mediated interaction: A relational perspective. Communication Research, 19, 52–90.CrossRefGoogle Scholar
Warren, S., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193–220.CrossRefGoogle Scholar
Weiser, M. (1988). Ubiquitous computing. Retrieved on June 20, 2005, from http://sandbox.xerox.com/hypertext/weiser/UbiHome.html.
Westin, A. (1967). Privacy and freedom. New York: Atheneum.Google Scholar
Whitty, M. T., & Carr, A. N. (2006). Cyberspace romance: The psychology of online relationships. Basingstoke, UK: Palgrave Macmillan.CrossRefGoogle Scholar
Whitty, M., & Gavin, J. (2001). Age/sex/location: Uncovering the social cues in the development of online relationships. CyberPsychology & Behavior, 4, 623–630.CrossRefGoogle ScholarPubMed

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×