A Review of Online Information Privacy Theories Advanced in Eight AIS Journals Over the Last Decade

A Review of Online Information Privacy Theories Advanced in Eight AIS Journals Over the Last Decade

Alanawd Alshehri
Copyright: © 2024 |Pages: 22
DOI: 10.4018/IRMJ.349977
Article PDF Download
Open access articles are freely available for download

Abstract

Privacy in the information systems (IS) context is becoming increasingly challenging and complicated. This study conducted a systematic review of the information privacy literature in the IS context to identify theories to understand and explain online information privacy. We reviewed eight journals from the Association for Information Systems over the 10-year period from 2013 to 2023. These journals were identified as mainstream in the IS discipline by senior scholars in the field. We identified and explored 20 theories in depth. Our findings have important implications for academics and practitioners. Scholars can build on our findings to identify and adopt promising theories from other disciplines to be contextualized and applied to examining information privacy. New theories can enrich our understanding of information privacy and provide in-depth insights from different perspectives, thereby enhancing our understanding of information privacy issues.
Article Preview
Top

Introduction

Information privacy is a fundamental and universal human right and a serious concern for individuals, organizations, societies, and governments worldwide (Bélanger & Crossler, 2011; Farayola et al., 2024). This privacy is becoming increasingly complicated in the era in which, throughout the globe, personal information has become a commodity that can be bought and sold (Wakefield, 2013(. With the growing use of social media platforms, protecting online information privacy has become a challenging endeavor as ubiquitous technologies can violate basic privacy principles through unregulated access to information and personal data stored and shared in different nodes of the global network (Becker, 2019; Romansky & Noninska, 2020). Security and privacy are at the center of information system (IS) artifacts (Lowry et al., 2017). Various risks have been identified from the breach of information privacy (Romansky & Noninska, 2020). In the digital age, individuals are continuously monitored as they consume products, services, and content (Zarsky, 2019(. The perception of privacy has continuously evolved from the original “right to be left alone” to the “right to be forgotten/to be erased” (Romansky & Noninska, 2020).

Privacy is defined and conceptualized in different ways and is impacted and perceived differently according to individual variances, cultures, and other factors (Miltgen & Peyrat-Guillard, 2014). Privacy concepts, definitions, and relationships are inconsistent across studies and disciplines, and privacy has been defined in various ways as “right,” “state of access,” “control,” “emotion,” “attitude,” “behavior,” “process,” and “goal” (Dinev et al., 2013; Smith et al., 2011). Individuals may perceive the same information with various degrees of sensitivity and with a lack of absolute agreement on what information is public, personal, or private (S. Lin & Armstrong, 2019). Therefore, the definition of privacy needs to be revisited. In this global age, technologically connected artifacts are embedded and woven into our daily lives; hence, reliance on these ubiquitous artifacts has become inevitable for individuals, companies, societies, and countries. Thus, privacy issues and concerns are critical for maintaining the privacy of individuals and data. The current era can be characterized as data-centric, in reference to the collection, aggregation, and analysis of data to identify individuals and their behaviors. The resulting knowledge can be used for various purposes (e.g., IS design and development, targeting and marketing, personalized e-business services, the tracing of consumer behaviors, and contact tracing).

Protecting information privacy requires that we consider heterogeneous threats, control data flows in ubiquitous technologies, and develop appropriate policies for personal data protection (Romansky & Noninska, 2020). However, challenges have emerged because of cross-border data flow and conflicts in protection laws among countries that organize and prioritize protection differently (De Busser, 2017).

Ozdemir et al. (2017) distinguished between privacy in an institutional context and in a peer context. They investigated the factors influencing individuals’ disclosure behaviors in a peer context. Individuals’ willingness to share information is affected by external factors such as culture, experience, personal characteristics, and regulatory jurisdictions (Lin et al., 2021). The usability and aesthetic graphics of IT artifacts can influence users’ perceptions of privacy risks and trust (Hoehle et al., 2019). Lin et al. (2021) investigated citizens’ perceptions of contact-tracing applications during the COVID-19 pandemic and found that relative advantage, compatibility, and trusting beliefs increased the intention to use contact-tracing applications.

Complete Article List

Search this Journal:
Reset
Volume 37: 1 Issue (2024)
Volume 36: 1 Issue (2023)
Volume 35: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 34: 4 Issues (2021)
Volume 33: 4 Issues (2020)
Volume 32: 4 Issues (2019)
Volume 31: 4 Issues (2018)
Volume 30: 4 Issues (2017)
Volume 29: 4 Issues (2016)
Volume 28: 4 Issues (2015)
Volume 27: 4 Issues (2014)
Volume 26: 4 Issues (2013)
Volume 25: 4 Issues (2012)
Volume 24: 4 Issues (2011)
Volume 23: 4 Issues (2010)
Volume 22: 4 Issues (2009)
Volume 21: 4 Issues (2008)
Volume 20: 4 Issues (2007)
Volume 19: 4 Issues (2006)
Volume 18: 4 Issues (2005)
Volume 17: 4 Issues (2004)
Volume 16: 4 Issues (2003)
Volume 15: 4 Issues (2002)
Volume 14: 4 Issues (2001)
Volume 13: 4 Issues (2000)
Volume 12: 4 Issues (1999)
Volume 11: 4 Issues (1998)
Volume 10: 4 Issues (1997)
Volume 9: 4 Issues (1996)
Volume 8: 4 Issues (1995)
Volume 7: 4 Issues (1994)
Volume 6: 4 Issues (1993)
Volume 5: 4 Issues (1992)
Volume 4: 4 Issues (1991)
Volume 3: 4 Issues (1990)
Volume 2: 4 Issues (1989)
Volume 1: 1 Issue (1988)
View Complete Journal Contents Listing