ArticlePDF Available

Compensation paradox: The influence of monetary rewards on user behaviour

Authors:

Abstract and Figures

Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners.
Content may be subject to copyright.
Behaviour & Information Technology, 2015
Vol. 34, No. 1, 45–56, http://dx.doi.org/10.1080/0144929X.2013.805244
Compensation paradox: the influence of monetary rewards on user behaviour
Hwansoo Leea, Dongwon Lima, Hyerin Kimb, Hangjung Zoaand Andrew P. Ciganekc
aDepartment of Management Science, Korea Advanced Institute of Science and Technology (KAIST), 291 Daehak-ro, Yuseong-gu,
Daejeon 305-701, Republic of Korea; bDepartment of Anthropology, London School of Economics and Political Science (LSE),
Houghton Street, London WC2A 2AE, UK; cCollege of Business and Economics, University of Wisconsin-Whitewater,
800 West Main Street, Whitewater, WI 53190 1790, USA
(Received 22 July 2012; final version received 1 May 2013)
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-
collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal
information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and
information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way
analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when
an information-collecting company requires sensitive information. Additional results indicate that building trust is a more
effective way of collecting personal data. This study identifies how organisations can best execute information-collection
activities and contributes additional insights for academia and practitioners.
Keywords: monetary rewards; information sensitivity; information privacy concerns; information providing intention;
information misrepresentation intention
1. Introduction
Many e-commerce companies collect consumers’ personal
information online and this is an important process to facil-
itate effective customer service and marketing (Hann et al.
2007). Data collected online can be abused by collect-
ing companies (e.g. improper access and secondary use),
which creates barriers for consumers of online services
(Kobsa et al. 2011). The U.S. Federal Trade Commis-
sion reports that the number of user complaints about
privacy has increased every year since the emergence of
Internet shopping (Antón et al. 2010). Online data col-
lection is an essential business practice despite privacy
concerns. Information-collecting companies use a variety
of approaches to alleviate privacy concerns, such as offer-
ing monetary rewards, adopting new security technologies,
and establishing online privacy policies.
Monetary rewards are a common means to elicit online
participation and have been repeatedly shown to be effective
in improving response rates (Dillman et al. 2009). Monetary
rewards include currency or currency-equivalent rewards
like gifts and coupons. Researchers have argued that mone-
tary rewards may not guarantee quality responses and result
in negative consequences like response errors. O’Neil and
Penrod (2001) believe that individuals give responses of
worse quality when offered monetary rewards.
Most information system studies have focused on the
positive effect of monetary rewards on information privacy
concerns (IPC) but have produced inconsistent results. No
clear relationship exists between monetary rewards and
IPC. Previous studies argued that the offer of monetary
rewards offsets an informant’s privacy concerns, but Taylor
et al. (2009) found an insignificant relationship between
monetary rewards and privacy concerns. Research has also
found that monetary rewards can work differently based
upon context, such as who collects the data and what data
are collected (Phelps et al. 2000, Sheehan and Hoy 2000,
Malhotra et al. 2004).
The purpose of this study is to explore the effect of
monetary rewards on IPC and related behaviours such
as information misrepresentation and disclosing. Web-
sites were developed for the experiment and a large-
scale survey approach was used to collect data analysed
using a two-way analysis of variance (ANOVA) and
a binomial logistic regression model. The results show
that monetary rewards can increase IPC when compa-
nies require sensitive information from individuals while
trust is a better way to persuade individuals to disclose
personal information. Information-collecting bodies must
understand the conditions which monetary rewards work
efficiently.
The remainder of this study is organised as follows.
Section 2 provides the theoretical background; Section 3
presents the research model and hypotheses; Section 4
describes the research method of this study; the results are
Corresponding author. Email: joezo@kaist.edu
© 2013 Taylor & Francis
46 H. Lee et al.
presented in Section 5; Section 6 concludes the study with
implications, limitations and directions for future research.
2. Theoretical background
2.1. Information privacy concerns
Privacy has been addressed by researchers in various
research domains including psychology, sociology and
information systems (Dinev and Hart 2004). Privacy is
‘the right to be let alone’ (Warren and Brandeis 1890,
p. 195) but is not easy to define because of multidimensional
characteristics (Castañeda and Montoro 2007). Researchers
classified privacy into four types: physical, interactional,
psychological and informational (Laufer and Wolfe 1977,
Burgoon et al. 1989, Buchanan et al. 2007, Paine et al.
2007). The focus of this research is on information pri-
vacy implications brought about by the advancement of
information technology.
Information privacy is ‘the ability of the individual to
personally control information about one’s self’ (Stone et al.
1983, p. 460). IPC exist when an individual feels threat-
ened by a perceived unfair loss of control over their privacy
by an information-collecting body. The concerns can also
be stated as ‘an individual’s subjective views of fairness
within the context of information privacy’ (Malhotra et al.
2004, p. 337). The concerns are based on an individual’s
own perception and values so people may perceive con-
cerns differently even in the same context (Donaldson and
Dunfee 1994). Different environmental factors (e.g. indus-
try, culture, laws) may also result in differences in perceived
privacy concerns (Malhotra et al. 2004).
Researchers have developed measures to assess IPC
(Smith et al. 1996, Stewart and Segars 2002, Dinev and
Hart 2004, Malhotra et al. 2004, Buchanan et al. 2007).
Malhotra et al. (2004) expanded upon the concerns for infor-
mation privacy (CFIP) framework of Smith et al. (1996)
to develop the Internet user’s information privacy con-
cerns (IUIPC) model to explain Internet user disclosure
behaviour. The CFIP and IUIPC were limited to a corpo-
rate evaluation framework. Research is needed to examine
individual perceptions of IPC.
2.2. Privacy calculus theory
Privacy calculus theory is a fundamental theory of pri-
vacy concerns that is applied to understand an individual’s
information providing or disclosing behaviour. Laufer and
Wolfe (1977) first introduced the ‘calculus of behaviour’ in
terms of privacy, defined as an assessment which compares
benefits and risks of information disclosure. Individuals
generally expect that their personal information will be
used for legitimate purposes and do not desire negative
consequences. Individuals expect economic value or social
benefits at the expense of losing control of their personal
information (Culnan and Armstrong 1999). Individuals
calculate the results of information disclosure and decide
whether to exchange personal information. Individuals per-
forming this calculus expect at least a balanced outcome
and are more likely to provide personal information and
accept the loss of privacy the greater the anticipated positive
outcome (Culnan and Bies 2003).
Researchers have investigated the factors that influence
the privacy calculus behaviour amongst a number of differ-
ent parties engaged in information exchange: employees
and organisations, consumers and corporations, Internet
users and Internet services (Dinev and Hart 2004). Dinev
and Hart (2006) extended the privacy calculus model to an
e-business environment finding that contextual differences
should be taken into account when dealing with privacy
concerns for Internet users. An individuals’ privacy risk
perception differs from others according to an individual’s
own complex process of privacy calculation. Dinev and
Hart (2006) found that trust and interest significantly miti-
gate privacy risk perceptions, which can also influence an
individual’s information disclosing behaviours. An exam-
ination of the factors that influence privacy calculation is
necessary.
2.3. Antecedents of information privacy concerns
The antecedents of IPC can be divided into four groups: fac-
tors related to information-collecting bodies, factors related
to information-providing individuals, environmental fac-
tors and factors related to the information itself. Several
studies have shown that IPC are influenced by the activities
of information-collecting bodies, including the collection,
improper access, unauthorised secondary use and errors
in personal information (Stone et al. 1983, Culnan 1993,
Smith et al. 1996, Campbell 1997, Stewart and Segars 2002,
Malhotra et al. 2004). Inappropriate technical and man-
agerial controls to protect personal information are also
collector’s factors (Wang et al. 1998).
Campbell (1997) suggested that individuals’ IPC may
vary according to their negative personal experiences,
knowledge of actual corporate policies and socioeconomic
status. Trust in a company is undermined and concerns over
personal information being exploited increase if an indi-
vidual has had a previous negative experience with data
inaccuracies or with the misuse of personal information by
a company. Smith et al. (1996) have empirically shown
that personal negative experiences significantly increase
IPC.
Knowledge of corporate practices and of the technology
that manages consumer information can affect individu-
als’ privacy concerns. When people are not knowledgeable
about a company’s collecting practices, people tend to be
more concerned about individual privacy concerns (Nowak
and Phelps 1992). People not familiar with information
technology have greater privacy concerns because of an
increased risk perception about the technology (Dinev
Behaviour & Information Technology 47
and Hart 2006, Paine et al. 2007). Age and level of
education also influence IPC. People of a lower socioe-
conomic status, lower educational level and of a greater
age are likely to have higher IPC (Wang and Petrison
1993, Milne et al. 1996, Campbell 1997). Individual
personality factors such as trust/distrust, paranoia and
social criticism are also associated with IPC (Smith et al.
1996).
Environmental factors such as laws, regulations and
sociocultural norms can influence one’s IPC (Chen et al.
2008). Milberg et al. (2000) empirically proved that
four types of group norms (individualism/collectivism,
masculinity/femininity, power distance and uncertainty
avoidance) influence privacy concerns. The type and
amount of information requested are also related to pri-
vacy concerns (Culnan and Armstrong 1999, Hann et al.
2007, Paine et al. 2007). Individuals tend to have greater pri-
vacy concerns when sensitive or specific information (e.g.
financial, medical, demographic information) is requested
(Malhotra et al. 2004).
2.4. Counterbalancing factors and monetary rewards
Information-collecting companies normally compensate
users for providing personal information and attempt to
make collected data secure to reduce IPC. Firms pub-
licise their privacy policy online because self-regulatory
efforts can build user trust and decrease user IPC (Phelps
et al. 2000, Bellman et al. 2004, Awad and Krishnan
2006, Hann et al. 2007, Hui et al. 2007). Adopting
new information technology (e.g. encryption technology)
is another approach organisations use to alleviate IPC
(Hung and Wong 2009). Most information-collecting
companies attempt to mitigate user concerns by offer-
ing compensation for personal information. Compensation
takes two forms: monetary rewards and non-monetary
rewards. Monetary rewards include cash and other forms
of physical gifts, whereas non-monetary rewards are intan-
gible benefits like personalised services (Taylor et al.
2009).
Offering monetary rewards is a common method to min-
imise response errors and increase the participation rate
in surveys. Previous studies have empirically proven the
effectiveness of the monetary rewards for respondent par-
ticipation (Church 1993, Helgeson et al. 2002, Cobanoglu
and Cobanoglu 2003). Hansen (1980) conversely argued
that the effect of monetary rewards on response quality is
not clear as the effectiveness of the rewards varies across
different sample groups and research areas. Higher levels
of monetary rewards may stimulate information-concealing
behaviour from respondents (Bentley and Thacker 2004).
O’Neil and Penrod (2001) found that offering monetary
rewards causes response errors because rewards motivate
individuals to participate simply to obtain the monetary
reward.
2.5. Behavioural outcomes of information privacy
concerns
Increased concerns of an organisation’s information-
collecting practice can influence individual’s behavioural
responses. The privacy calculus perspective suggests that
individuals tend to show information privacy-protective
responses when they expect unbalanced outcomes or
perceive threats to their privacy. Son and Kim (2008)
categorised negative responses into three broad types: infor-
mation provision (refusal and misrepresentation), private
action (removal and negative word-of-mouth) and pub-
lic action (complaining directly and indirectly). Refusal
and misrepresentation are the primary responses individ-
uals exhibit to protect their privacy (Milne and Boza 1999).
Individuals can also request to remove their personal infor-
mation from a database when a person feels that their
privacy is threatened (Smith et al. 1996). An individual can
share privacy concerns to salient others. Negative word-of-
mouth may damage an information-collecting companies’
reputation (Son and Kim 2008).
3. Conceptual framework and hypotheses
This study focuses on how monetary rewards influence IPC
and related behavioural outcomes. The characteristic of the
information requested is an important factor that influences
IPC. Several studies report that information sensitivity is
the primary factor to influence IPC (Castañeda and Montoro
2007, Yang and Wang 2009). Monetary rewards are often
utilised to alleviate privacy concerns and persuade indi-
viduals to disclose information online. Information refusal
and misrepresentation are the primary responses individuals
demonstrate when they have IPC. Information sensitivity
and monetary rewards are employed as the main inde-
pendent variables, whereas privacy concerns, information
providing and misrepresentations are the dependent vari-
ables examined in this study. Figure 1 illustrates the study’s
conceptual framework.
3.1. Information sensitivity
Previous research defines information sensitivity as ‘the
level of privacy concern an individual feels for a type of
data in a specific situation’ (Weible 1993, p. 30). Informa-
tion sensitivity and IPC are conceptually similar in that one
Information
sensitivity
Privacy concerns,
Disclosure,
Misrepresentation
Monetary rewards
Antecedent
Moderator
Outcomes
Figure 1. Conceptual framework.
48 H. Lee et al.
can be defined by the other and both account for subjective
risk perceptions which may vary from person to person.
People request that sensitive information tend to have
higher privacy concerns because releasing the information
is perceived to be riskier than non-sensitive information
(Malhotra et al. 2004). Increased concerns from informa-
tion sensitivity can drive negative behavioural responses.
Negative responses consist primarily of either informa-
tion refusal or misrepresentation (Son and Kim 2008). This
study hypothesizes:
H1a: Information sensitivity increases information privacy con-
cerns.
H1b: Information sensitivity decreases information providing
intention.
H1c: Information sensitivity increases information misrepresen-
tation intention.
3.2. Monetary rewards
Monetary reward effectiveness has been studied in various
research domains. Monetary rewards are often used to facil-
itate survey recruitment and motivate participation among
individuals who might otherwise not respond (Singer and
Bossarte 2006). Studies employing mail and online surveys
have shown that monetary rewards significantly increase
response rates and decrease dropout rate (Church 1993,
Helgeson et al. 2002, Cobanoglu and Cobanoglu 2003,
Göritz 2006). Risk-benefit or utility theory posits that mon-
etary reward is the main reason that individuals disclose
information (Xie et al. 2006). Information privacy stud-
ies suggest that a reward encourages people to exchange
their personal information with fewer IPC (Sheehan and
Hoy 2000, Faja 2005, Hann et al. 2007, Hui et al. 2007).
Monetary rewards influence information providing and mis-
representation intentions (Malhotra et al. 2004, Son and
Kim 2008). This study hypothesizes:
H2a: Monetary reward decreases information privacy concerns.
H2b: Monetary reward increases information providing intention.
H2c: Monetary reward decreases information misrepresentation
intention.
3.3. Interaction effect between information sensitivity
and monetary rewards
Monetary rewards can not only increase response rates but
also increase response errors (O’Neil and Penrod 2001). The
privacy calculus theory suggests that a respondent receiving
a monetary reward from an information-collecting company
will evaluate the cost of disclosing personal information
against compensation. Respondents’ will be reluctant to
provide personal information if there is a large gap between
costs and benefits. Monetary rewards may stimulate risk
perceptions and elevate respondents’ concerns for disclos-
ing sensitive and important information. Andrade et al.
(2002) found that the offer of a reward is not an effective way
for managing individual’s concerns and may strengthen the
negative effect of privacy concerns on behavioural inten-
tions. An interaction effect between monetary rewards and
information sensitivity on IPC and behavioural intentions
may be expected. This study hypothesizes:
H3a: A significant interaction effect between information sen-
sitivity and monetary rewards on information privacy concerns
exists.
H3b: A significant interaction effect between information sensi-
tivity and monetary rewards on information providing intention
exists.
H3c: A significant interaction effect between information sen-
sitivity and monetary rewards on information misrepresentation
intention exists.
4. Method
4.1. Research design
An experimental survey was conducted to test the effect of
monetary rewards. Four types of web pages imitating a well-
known Korean e-commerce company were developed for
the experiment to appear authentic. Following an approach
utilised by previous research, web pages Type I and II
included low sensitive information, whereas web pages
Type III and IV had high sensitive information (Culnan
1993, Phelps et al. 2000, Sheehan and Hoy 2000, Andrade
et al. 2002). Monetary rewards for participants using Type
II and IV included a $10 coupon and inclusion in a lottery
drawing for mobile devices.
An online pilot test was conducted with 66 university
students in Korea to examine the validity of each scenario
during March 2011. Respondents reported their perceived
sensitivity to the information requested and perception of
the amount of monetary rewards to verify the experimen-
tal setting of each case. Paired t-tests were conducted and
indicated that perceived sensitivity was significantly differ-
ent between the low (Types I and II) and high (Types III
and IV) sensitive cases; the mean of low sensitive cases
were 2.67 while the mean of high sensitive cases were 6.18
(t=−10.595, p<.001). Monetary rewards cases (Types
II and IV) were also significantly different compared with
cases with no monetary rewards (Type I and III); the mean
of no monetary rewards cases was 1.49, whereas the mean of
monetary rewards cases was 5.23 (t=−11.388, p<.001).
The experimental design was statistically valid but a few
piloted respondents reported that an excessive amount of
sensitive information was asked for in the high sensitive
cases and that the amount of monetary reward was rela-
tively small for the monetary cases. One of the sensitive
information questions was discarded (card limit informa-
tion) and the amount of monetary reward allocated was
adjusted. The final web page types with four different con-
ditions are shown in Figure 2. Participants were asked to
complete an online questionnaire after accessing and using
one of the randomly assigned pages.
Behaviour & Information Technology 49
Figure 2. Four types of web pages.
4.2. Measurement instrument
The questionnaire measurement items were designed to
assess information privacy concerns (IPC), information
misrepresentation intention (IMI) and information provid-
ing intention (IPI) as dependent variables. Additional data
were collected as independent variables, including manip-
ulation check variables and demographical variables, to
facilitate additional analysis (Malhotra et al. 2004, Ahmad
and Mykytyn 2012). The variable ‘information privacy
concerns’ was assessed using four items introduced by
Dinev and Hart (2004), while Malhotra et al. (2004)’s
items were adopted for IMI and the IPI. The mean val-
ues of the multi-item constructs were used in the analysis
model. A trust value about the data collecting company
was measured for additional analysis by modifying Dinev
and Hart (2006)’s construct. Dummy variables (0: No, 1:
Yes) for information sensitivity and monetary rewards were
incorporated to assess the sincerity of survey respondents.
Respondent answers that were consistent with their given
case were retained in the study (e.g. Monetary rewards?
‘Yes’ for Types II and IV), while contradictory answers
disqualified respondents from the analysis. Table 1 lists the
measurement items used in this research.
4.3. Data
This study examined the negative effects of monetary
rewards on both online IPC and online information dis-
closure. General Internet users were solicited to participate
in this study by an online survey agency to minimise sam-
pling bias and to generalise the research results. The agency
distributed the survey to randomly selected members from
a database and membership points were provided for sur-
vey participants. Four hundred ten samples were collected
during a 2-week period in April 2011. Inappropriately
answered questionnaire responses were eliminated through
a data-filtering process utilising the marker variables, result-
ing in 370 usable responses. The number of subjects for
each of the four scenarios ranged from 91 to 94. Over 80%
of respondents had earned an associate’s degree or higher.
Most respondents have used the Internet for more than 6
years. The respondents were able to understand this study’s
context because they had extensive experience with Inter-
net services and an appropriate knowledge background. A
chi-square homogeneity test was performed to check for
sample differences between groups. The test statistic was
not significant for all outcomes confirming that every group
is homogeneous. Table 2 lists the sample characteristics and
the result of the homogeneity test.
5. Results
5.1. Manipulation check and reliability test
An independent sample t-test was conducted for the
manipulation check. Perceived information sensitivity and
perceived monetary incentive were used to confirm each
scenario’s difference. The low sensitive cases (Types
I and II; mean =3.65, SD =1.09) had a lower per-
ceived information sensitivity than the high sensitive cases
(Types III and IV; mean =5.45, SD =1.16). The t-test
shows that the information sensitivity cases were well estab-
lished and distinguished (t-value =−15.38, p<.001).
The scenario cases also showed significant differences
for monetary rewards (no monetary reward: mean =2.44,
SD =1.06; monetary rewards: mean =4.82, SD =0.98;
t-value =−22.50, p<.001). All manipulations appear to
have significant differences.
Multiple items were used to measure the three con-
structs (IPC; IPI; IMI), so the reliability and convergent
validities were tested using Cronbach’s α, Composite Reli-
ability (CR) and Average Variance Extracted (AVE). The
Cronbach αvalues of three constructs were relatively high
(IPC =0.95, IPI =0.92, IMI =0.86). Constructs are reli-
able when the CR is over 0.70 and AVE is over 0.50
(Bagozzi and Yi 1988). Each construct exceeded the CR and
AVE thresholds (CR: IPC =0.96, IPI =0.94, IMI =0.90;
AVE: IPC =0.87, IPI =0.81, IMI =0.70). Table 3 lists
50 H. Lee et al.
Table 1. Measurement instruments.
Variable Description
Dependent variable
Information privacy concerns
(IPC)
Given this experimental scenario
IPC1: I am concerned that the information I submit to the E-Commerce website could be misused
IPC2: I am concerned that other people or company can access private information about me to the
e-commerce website
IPC3: I am concerned about submitting information the e-commerce website, because of what others
might do with it
IPC4: I am concerned about submitting information the e-commerce website, because it could be
used in a way I did not foresee
(1. Strongly disagree ...7. Strongly agree)
Information providing
intention (IPI)
Given this experimental scenario, specify the extent to which you would reveal the information to
the e-commerce website
IPI1: 1.Very unlikely ...7. Very likely
IPI2: 1. Not probable ...7. Probable
IPI3: 1. Impossible ...7. Possible
IPI4: 1. Unwilling ...7. Willing
Information misrepre-
sentation intention
(IMI)
Given this experimental scenario, specify the extent to which you would falsify some of your
personal information
IMI1: 1.Very unlikely ...7. Very likely
IMI2: 1. Not probable ...7. Probable
IMI3: 1. Impossible ...7. Possible
IMI4: 1. Unwilling ...7. Willing
Information disclosure Will you accurately provide requested information to the e-commerce website? (0. No; 1. Yes)
Independent variable
Sensitivity of information Is requested information from the website generally sensitive? (0. No; 1. Yes)
Perceived sensitivity of
information
The sensitivity of request information from the website is? (1. Very low ...7. Very high)
Monetary rewards Does the e-commerce company offer monetary rewards for your personal information? (0. No; 1.
Yes)
Perceived monetary rewards The amount of monetary rewards for your information is? (1. Very little ...7. Very much)
Company trust I trust the e-commerce company? (1. Strongly disagree ...7. Strongly agree)
E-commerce trust I think the e-commerce environment is trustworthy in general (1. Strongly disagree ...7. Strongly
agree)
Perceived privacy breach How frequently have you personally been the victim of what you felt was an improper invasion of
privacy?
(1. Very infrequently ...7. Very frequently)
Media exposure How much have you heard or read about the use and potential misuse of the information collected
from the Internet?
(1. Not at all ...7. Very much)
Biographical variable
Gender 0. Female; 1. Male
Age 1. Teenager ...5. Over 50s
Educational background 1. High school ...5. PhD
Internet experience 1. Less than 1 year ...7. Over 6 years
E-commerce frequency 1. Not at all ...7. Almost everyday
reliability and validity results. The scenario design, manip-
ulation as well as constructs’ reliability and validity were
appropriate for hypothesis testing.
5.2. Hypotheses testing
The proposed hypotheses were tested using two-way
ANOVA. Three ANOVAs were performed for each of the
four different cases in which IPC, IPI and IMI were the
dependent variables. Table 3 lists the mean score of each
dependant variable.
Table 3 indicates that misrepresentation intention was
high in high sensitivity cases (Types III and IV), and IPI was
high in low sensitivity cases (Types I and II). Individuals
tend to have positive IPI and weak misrepresentation inten-
tion when the sensitivity of requested information is low.
The mean value for IPC was over 5 in all cases although it
was relatively high in the high sensitivity cases. Requesting
information itself may increase IPC. The results listed in
Table 4 indicate statistical differences between the vari-
ables. The first ANOVA test on IPC provided support for
H1a and H3a, but not for H2a. Information sensitivity had a
Behaviour & Information Technology 51
Table 2. Sample characteristics and homogeneity test between groups.
Total Type I Type II Type III Type IV
Category (N=370) (n=92) (n=94) (n=91) (n=93) χ2p-Value
Gender 0.53 0.91
Male 188 (50.8%) 44 49 46 49
Female 182 (49.2%) 48 45 45 44
Age 18.18 0.11
10–19 1 (0.3%) 0010
20–29 43 (11.6%) 16 10 6 11
30–39 183 (49.5%) 44 49 42 48
40–49 103 (27.8%) 29 22 31 21
50+40 (10.8%) 3 13 11 13
Educational background 14.51 0.27
High school 65 (17.6%) 19 17 15 14
Associate’s degree 69 (18.6%) 14 22 18 15
Bachelor’s degree 198 (53.5%) 45 46 48 59
Master’s degree 36 (9.7%) 12 9 10 5
Doctoral degree 2 (0.5%) 2000
Internet experience 24.07 0.15
Less than 6 years 14 (3.8%) 6422
Over 6 years 356 (96.2%) 86 90 89 91
E-Commerce frequency 16.13 0.58
Not at all 3 (0.8%) 0210
1–2 times per year 16 (4.3%) 4453
1–2 times per half year 24 (6.5%) 5928
1–2 times per three months 52 (14.1%) 13 15 10 14
1–2 times per month 158 (42.7%) 43 38 41 36
1–2 times per week 102 (27.6%) 23 21 31 27
Almost everyday 15 (4.1%) 4515
Perceived privacy breach 19.75 0.35
1 (Not at all) 34 (9.19%) 7 8 11 8
2 56 (15.14%) 9 14 13 20
3 84 (22.70%) 18 23 21 22
4 64 (17.30%) 16 15 17 16
5 113 (30.54%) 34 33 26 20
6 18 (4.86%) 7137
7 (Very much) 1 (0.27%) 1000
Media exposure 22.16 0.26
1 (Not at all) 16 (4.32%) 5524
2 19 (5.14%) 4465
3 43 (11.62%) 8 12 13 10
4 77 (20.81%) 19 19 24 15
5 151 (40.81%) 40 38 37 36
6 57 (15.41%) 11 16 8 22
7 (Very much) 7 (1.89%) 5011
Table 3. Mean score comparison for dependant variables.
Alpha CR AVE Type I (n=92) Type II (n=94) Type III (n=91) Type IV (n=93)
IPC 0.95 0.96 0.87 5.29 (1.16) 5.00 (1.30) 5.45 (1.09) 5.69 (1.05)
IPI 0.92 0.94 0.81 4.29 (1.00) 4.20 (1.00) 3.43 (1.09) 3.76 (1.38)
IMI 0.86 0.90 0.70 3.85 (1.06) 3.68 (1.06) 4.33 (1.17) 4.23 (1.34)
Notes: Type I: low sensitivity ×no monetary rewards, Type II: low sensitivity ×monetary rewards, Type III: high
sensitivity ×no monetary rewards, Type IV: high sensitivity ×monetary rewards. IPC: information privacy concerns,
IPI: information providing intention, IMI: information misrepresentation intention. The values provided are mean
(standard deviation).
52 H. Lee et al.
Table 4. ANOVA results.
DV Source SS DF MS Fp-Value
Information privacy concerns (IPC) Main effects
IS 16.41 1 16.41 12.35 .000
MR 0.07 1 0.06 0.05 .825
Interaction effect
IS ×MR 6.46 1 6.46 4.86 .028
Error 486.55 366 1.33
Information providing intention (IPI) Main effects
IS 38.64 1 38.64 30.44 .000
MR 1.37 1 1.37 1.08 .299
Interaction effect
IS ×MR 3.99 1 3.99 3.14 .077
Error 464.64 366 1.27
Information misinterpretation intention (IMI) Main effects
IS 24.50 1 24.50 18.11 .000
MR 1.73 1 1.73 1.28 .259
Interaction effect
IS ×MR 0.16 1 0.16 0.12 .735
Error 494.99 366 1.35
Notes: DV, dependant variable; SS, sum of squares; DF, degree of freedom; MS, mean square; IS, information
sensitivity; MR, monetary rewards.
5.8
5.6
5.4
5.2
5.0
4.8
4.4
4.2
4.0
3.8
3.6
3.4
No Monetary Reward Monetary Reward No Monetary Reward Monetary Reward No Monetary Reward Monetary Reward
4.4
4.2
4.0
3.8
3.6
3.4
Type I
Type II
Type III
Type IV
Type I
Type II
Type III
Type IV
Type IV
Type I
Type II
1. Information
privacy concerns
(IPC)
2. Information
providing intention
(IPI)
Type III
3. Information
misinterpretation
intention (IMI)
Figure 3. Dependent variable graphical comparisons.
significant main effect on IPC (F=12.35, p<.001), while
monetary rewards did not. A significant interaction effect
between information sensitivity and monetary rewards on
privacy concerns exists (F=4.86, p<.05).
The second test showed similar results in that both
H1b and H3b were supported, but not H2b. Informa-
tion sensitivity had a significant main effect on IPI (F=
30.44, p<.001) and an interaction effect between infor-
mation sensitivity and monetary rewards on IPI (F=3.14,
p<0.1) was marginally significant. The p-value of H3b
was over .05, but it was still within a 90% confidence
interval using a two-tailed test. Only information sensitiv-
ity influenced IMI (F=18.11, p<.001) and there was no
significant interaction effect. H1c was supported while H2c
and H3c were rejected.
Figure 3 shows the results in a graphical format. There
were significant differences in the dependent variables for
most cases with respect to information sensitivity. Individ-
uals experienced stronger IPC while exhibiting lower IPI
and a higher misrepresentation intention when highly sen-
sitive information was requested. Monetary rewards had
no significant effect by itself on every dependent variable,
but there were significant interaction effects with IPC and
IPI. Monetary rewards alleviate IPC when information with
low sensitivity was requested. Monetary rewards in contrast
increase concerns when information with high sensitivity
Behaviour & Information Technology 53
was requested. Monetary rewards were positively related
with the intention to provide information for information
with high sensitivity, while intention to provide informa-
tion declined slightly for information with low sensitivity.
No significant interaction effect between monetary rewards
and information sensitivity on IMI exists.
5.3. Additional analysis
Figure 3 illustrates that individuals exhibit greater IPC and
have a stronger intention to provide personal information
at the same time when information with high sensitiv-
ity was requested with monetary rewards. Individuals also
exhibit less IPC and have a weaker intention to provide
personal information at the same time when information
with low sensitivity was requested without any reward.
These contrasting results indicate that an individual’s deci-
sion to provide personal information may be associated
with additional factors. A stepwise binomial logistic regres-
sion model was developed to deepen the understanding of
which factors affect information-disclosing behaviour. The
model considers several factors like perceived sensitivity of
information, perceived monetary rewards and demographic
information to calculate the probability that the person
discloses his or her personal information without distortion.
Logit ) =α+β1PSI +β2PMR +β3CT +β4ECT
+β5PRB +β6ME +β7GEN +β8AGE
+β9ECF
where dependent variable =information disclosure (0:
No, 1: Yes), αis the constant, βithe coefficient i, PSI
the perceived sensitivity of information, PMR the per-
ceived monetary rewards, CT the company trust, ECT the
E-commerce trust, PRB the perceived privacy breach, ME
the media exposure, GEN the gender, AGE the age, EDU
the education, ECF the E-commerce frequency.
Pearson’s Chi-square statistic indicates an adequate fit
for every model in Table 5 and the Nagelkerke’s R2of
model 3, an alternative form of R2for the binomial logis-
tic regression model, was higher than other models. The
probability of information disclosure was dependent on
perceived sensitivity of information (β=−0.58, p<.01),
perceived monetary rewards (β=0.14, p<0.1), company
trust (β=0.52, p<.01), e-commerce trust (β=0.24, p<
.05) and e-commerce frequency (β=0.25, p<.05). Per-
ceived sensitivity of information was the most influential
independent variable in every model. The significance of
perceived monetary rewards was not consistent as the β
of perceived monetary rewards was relatively lower than
the βof other variables. Company trust, e-commerce trust
and media exposure demonstrated a significant relationship
with the dependent variable. E-commerce frequency, one of
the demographic variables, significantly affected informa-
tion disclosure. The overall predicted power of the model
was 74.6%.
Table 5. Binomial logistic regression for information
disclosure.
Variable Model 1 Model 2 Model 3
Perceived sensitivity
of information
0.53∗∗∗ 0.56∗∗∗ 0.58∗∗∗
Perceived monetary
rewards
0.17∗∗ 0.13 0.14
Company trust 0.54∗∗∗ 0.52∗∗∗
E-commerce trust 0.23∗∗ 0.24∗∗
Perceived privacy
breach
0.07 0.11
Media exposure 0.20∗∗ 0.20∗∗
Gender 0.06
Age 0.06
Education 0.11
E-commerce
frequency
0.25∗∗
Constant 1.12 0.64 0.64
2 loglikelihood 435.64 396.26 390.30
Degrees of freedom 2 6 10
Chi-square 48.80∗∗∗ 88.18∗∗∗ 94.14∗∗∗
Pseudo-R2
(Nagelkerke)
0.17 0.29 0.31
N370 370 370
Significant at the 10% level.
∗∗Significant at the 5% level.
∗∗∗Significant at the 1% level with two-tails test.
6. Discussion
6.1. Key findings
Monetary rewards do not always work efficiently to col-
lect information online. Monetary rewards work differently
in varying contexts while information sensitivity shows
consistent effects. Information sensitivity was a significant
antecedent of information privacy concerns and related
behaviours, whereas monetary rewards had no statistical
effect. Hypothesis 3a results support the contention that
offering monetary rewards can increase the individuals’
information privacy concerns when information with high
sensitivity is requested. The reward for sensitive infor-
mation makes individuals worry about the motives of
information-collecting companies. Rewards may remind
individuals of direct or indirect negative experiences of
privacy violation. People may think that the information-
collecting bodies have improper intentions, such as unau-
thorised secondary use and abuse of personal information.
The research results are consistent with the previous studies,
which indicate that the reward does not diminish informa-
tion privacy concerns and raises the awareness of the value
of an individual’s information (Bentley and Thacker 2004,
Taylor et al. 2009).
Individuals’ intention to provide sensitive information
was higher when a monetary reward exists than when
no reward exits. Subjects had a stronger intention to
provide personal information that was highly sensitive
54 H. Lee et al.
despite increasing information privacy concerns attributed
to monetary rewards. Offering physical gifts undermines
an individual’s intrinsic motivation and induces a person
to focus on the extrinsic motivation. O’Neil and Penrod
(2001) found that offering monetary rewards can change
the respondent’s motivation to provide personal informa-
tion from a pure purpose to an impure purpose of receiving
the reward. Hypothesis 2c and 3c results support this con-
tention that monetary rewards do not guarantee the quality
of information because the difference between misrepre-
sentation intention with and without monetary rewards
was not significant. Intention of distorting personal infor-
mation remains unchanged or becomes higher due to
increased information privacy concerns. Information col-
lection activities will generate useless and inaccurate data
when the intention of distorting personal information is
high combined with a strong intention to provide per-
sonal information. Monetary rewards in contrast alleviate
privacy concerns during the collection of less sensitive
information. Figure 3 illustrates that monetary rewards mit-
igates information privacy concerns and misrepresentation
intention.
IPI coupled with monetary rewards was strong but
slightly declined. This was an unexpected result but may
indicate that IPI is not only related with the sensitivity and
rewards. A stepwise binomial logistic regression model was
examined to understand this result which emphasised the
importance of trust for information-collecting companies.
Trust was a significant antecedent to personal informa-
tion disclosure as well as information sensitivity. Previous
research suggests that building trust is an effective way
to persuade individuals to disclose personal information
(Milne and Boza 1999, Dinev and Hart 2006, Eastlick et al.
2006, Joinson et al. 2006, Taylor et al. 2009). Trust is an
important factor for fostering customer satisfaction and loy-
alty in e-commerce systems and transactions (Kim and Lee
2002, Horn et al. 2005). The results suggest that trust also
facilitates personal information sharing in an e-commerce
environment.
E-commerce frequency had a significant effect on infor-
mation disclosing behaviour in the regression model. Infor-
mation disclosing behaviour is associated with familiarity
with the environment in which personal information is
requested. Individuals familiar with an e-commerce envi-
ronment may know very well how their information will
be used and familiarity is positively associated with trust
(Gefen 2000).
Media exposure was also a significant antecedent, while
perceived privacy breach was not. People who have been
previous victims of privacy breaches may feel that the dam-
age was not as serious as expected and find the incident
to be a common occurrence. On the other hand, people
exposed to privacy victimisation incidents in the media but
have not been previous victims of privacy breaches may
hesitate to provide their personal information because the
inexperience might cause a disproportionately stronger risk
perception.
6.2. Theoretical and practical implications
This study deepens the understanding of online informa-
tion privacy concerns and disclosure behaviour. One of the
main contributions is the findings about the effectiveness of
monetary rewards. While many studies find that monetary
rewards generally have a positive effect on user’s infor-
mation privacy concerns and related behaviours, this study
presents a different perspective.
Monetary rewards have negative effects on information
privacy concerns in certain situations. A monetary reward
intensified information privacy concerns, which suggests
that individuals consider monetary rewards as ‘decoys’.
Andrade et al. (2002) expected that offering rewards would
decrease concerns about self-disclosure, but found that the
opposite was true. Faja (2005) found that individuals are
more concerned when they disclose information for finan-
cial rewards than for other benefits. This study confirms the
findings of Andrade et al. (2002) and Faja (2005) and offers
an explanation of their results. Requests for sensitive infor-
mation increases an individual’s apprehension and raises
doubts about the motives behind monetary reward offers.
This study also explains why previous research on
the effects of monetary rewards towards information pri-
vacy concerns has inconsistent results. Monetary rewards
can either mitigate or intensify information privacy con-
cerns depending on the context. Both positive and negative
relationships are observed between monetary rewards and
privacy concerns in previous studies (e.g. Andrade et al.
2002, Taylor et al. 2009). Yang and Wang (2009) in contrast
found that there is no direct effect of monetary rewards on
privacy concerns. The study results are consistent with pri-
vacy calculus theory and related studies in that individuals
respond to monetary rewards in complicated ways. A sim-
ple linear relationship does not exist for monetary rewards
between consumer’s privacy concerns and intention to pro-
vide information. This study’s results are similar to findings
in previous studies examining the relationship between
trust and behavioural outcomes (e.g. Culnan and Armstrong
1999, Eastlick et al. 2006, Taylor et al. 2009), which reaf-
firms the importance of trust. Building trust and developing
a close relationship with consumers is a more effective way
to collect high-quality information than offering monetary
rewards.
This study also provides practical implications about the
effect of monetary rewards for collecting personal informa-
tion. Information-collecting companies should design their
reward mechanisms prudently as monetary rewards exhibit
a negative influence on information privacy concerns. Com-
pensation should be based on the type of information
requested. Monetary rewards are appropriate to collect data
when requesting general information as an individual’s
Behaviour & Information Technology 55
intention to distort information is relatively low. Engender-
ing an individual’s trust to decrease perceptions of risk (e.g.
established privacy policy, transparent usage of collected
information, etc.) is more appropriate to collect sensitive
information. Demographic factors are also important to con-
sider when requesting information. Sensitive information
requests are appropriate for loyal users who have multi-
ple previous transactions with the information collecting
company or are familiar with the e-commerce environment.
Experienced individuals exhibit a high intention to dis-
close sensitive information, which is in contrast to novice
individuals.
6.3. Limitations and future research
This study sought to explain the unexpected and contra-
dictory findings from Andrade et al. (2002) and Yang and
Wang (2009). The focus of this study was on the possi-
ble negative effects that monetary rewards have on both
information privacy concerns and information disclosure.
Low and high information contexts as well as contexts
in which monetary rewards were provided and others in
which they were withheld were simulated to examine the
research hypotheses. Additional contexts are appropriate to
pursue in future research (e.g. reputation, variety of rewards,
requests of specific types of information, etc.) to gain a
more complete understanding of the complex processes
that influence online behaviours. This research will reveal
ways to satisfy both information-collecting companies and
information-providing individuals.
Multiple variables identified in the literature were not
considered in this study, like user’s dispositional factors,
privacy policy, technology issues and collector’s indus-
try. These variables also affect privacy concerns but were
not addressed because they were beyond the scope of this
study. The majority of study respondents were Korean.
Koreans normally have access to the Internet and have sig-
nificant experience using e-commerce. Respondents from
additional countries, cultures and industries might produce
different results. Future research should extend the study
to include respondents who are representative of additional
contexts. Cross-country, cross-cultural and cross-industrial
comparisons may possibly provide a deeper understanding
of user perceptions and behaviours.
References
Ahmad, A. and Mykytyn, P., 2012. Perceived privacy breach –
the construct, the scale, and its antecedents. AMCIS 2012
Proceedings, 9–11 August, Seattle, WA.
Andrade, E.B., Kaltcheva, V., and Weitz, B., 2002. Self-disclosure
on the web: the impact of privacy policy, reward, and com-
pany reputation. Advances in Consumer Research, 29 (1),
350–353.
Antón, A.I., Earp, J.B., and Young,J.D., 2010. How Internet users’
privacy concerns have evolved since 2002. IEEE on Security
& Privacy, 8 (1), 21–27.
Awad, N.F. and Krishnan, M., 2006. The personalization privacy
paradox: an empirical evaluation of information transparency
and the willingness to be profiled online for personalization.
MIS Quarterly, 30 (1), 13–28.
Bagozzi, R.P. and Yi, Y., 1988. On the evaluation of struc-
tural equation models. Journal of the Academy of Marketing
Science, 16 (1), 74–94.
Bellman, S., et al., 2004. International differences in informa-
tion privacy concerns: a global survey of consumers. The
Information Society, 20 (5), 313–324.
Bentley, J. and Thacker, P., 2004. The influence of risk and mon-
etary payment on the research participation decision making
process. Journal of Medical Ethics, 30 (3), 293–298.
Buchanan, T., et al., 2007. Development of measures of online
privacy concern and protection for use on the Internet. Jour-
nal of the American Society for Information Science and
Technology, 58 (2), 157–165.
Burgoon, J.K., et al., 1989. Maintaining and restoring privacy
through communication in different types of relationships.
Journal of Social and Personal Relationships, 6 (2), 131–158.
Campbell, A.J., 1997. Relationship marketing in consumer mar-
kets: a comparison of managerial and consumer attitudes
about information privacy. Journal of Direct Marketing,
11 (3), 44–57.
Castañeda, J.A. and Montoro, F.J., 2007. The effect of Internet
general privacy concern on customer behavior. Electronic
Commerce Research, 7 (2), 117–141.
Chen, H.-G., et al., 2008. Online privacy control via anonymity
and pseudonym: cross-cultural implications. Behaviour &
Information Technology, 27 (3), 229–242.
Church, A.H., 1993. Estimating the effect of incentives on mail
survey response rates: a meta-analysis. Public Opinion Quar-
terly, 57 (1), 62–79.
Cobanoglu, C. and Cobanoglu, N., 2003. The effect of incen-
tives in web surveys: application and ethical considerations.
International Journal of Market Research, 45 (4), 475–488.
Culnan, M.J., 1993. How did they get my name?: an exploratory
investigation of consumer attitudes toward secondary infor-
mation use. MIS Quarterly, 17 (3), 341–363.
Culnan, M.J. and Armstrong, P.K., 1999. Information privacy con-
cerns, procedural fairness, and impersonal trust: an empirical
investigation. Organization Science, 10 (1), 104–115.
Culnan, M.J. and Bies, R.J., 2003. Consumer privacy: balanc-
ing economic and justice considerations. Journal of Social
Issues, 59 (2), 323–342.
Dillman, D.A., et al., 2009. Response rate and measurement
differences in mixed-mode surveys using mail, telephone,
interactive voice response (IVR) and the Internet. Social
Science Research, 38 (1), 1–18.
Dinev, T. and Hart, P., 2004. Internet privacy concerns and their
antecedents – measurement validity and a regression model.
Behaviour & Information Technology, 23 (6), 413–422.
Dinev, T. and Hart, P., 2006. An extended privacy calculus model
for e-commerce transactions. Information Systems Research,
17 (1), 61–80.
Donaldson, T. and Dunfee, T.W., 1994. Toward a unified concep-
tion of business ethics: integrative social contracts theory.
The Academy of Management Review, 19 (2), 252–284.
Eastlick, M.A., Lotz, S.L., and Warrington, P., 2006. Under-
standing online B-to-C relationships: an integrated model of
privacy concerns, trust, and commitment. Journal of Business
Research, 59 (8), 877–886.
Faja, S., 2005. Privacy in e-commerce: understanding user trade-
offs. Issues in Information Systems, 6 (2), 83–89.
Göritz, A.S., 2006. Incentives in web studies: methodological
issues and a review. International Journal of Internet Science,
1 (1), 58–70.
56 H. Lee et al.
Gefen, D., 2000. E-commerce: the role of familiarity and trust.
Omega, 28, 725–737.
Hann, I.H., et al., 2007. Overcoming online information pri-
vacy concerns: an information-processing theory approach.
Journal of Management Information Systems, 24 (2), 13–42.
Hansen, R.A., 1980. A self-perception interpretation of the effect
of monetary and nonmonetary incentives on mail survey
respondent behavior. Journal of Marketing Research, 17 (1),
77–83.
Helgeson, J.G., Voss, K.E., and Terpening, W.D., 2002. Deter-
minants of mail-survey response: survey design factors
and respondent factors. Psychology and Marketing, 19 (3),
303–328.
Horn, D., Feinberg, R., and Salvendy, G., 2005. Determinant ele-
ments of customer relationship management in e-business.
Behaviour & Information Technology, 24 (2), 101–109.
Hui, K.L., Teo, H.H., and Lee, S.Y.T., 2007. The value of privacy
assurance: an exploratory field experiment. MIS Quarterly,
31 (1), 19–33.
Hung, H. and Wong, Y., 2009. Information transparency and dig-
ital privacy protection: are they mutually exclusive in the
provision of e-services? Journal of Services Marketing, 23
(3), 154–164.
Joinson, A.N., et al., 2006. Watching me, watching you: pri-
vacy attitudes and reactions to identity card implementation
scenarios in the United Kingdom. Journal of Information
Science, 32 (4), 334–343.
Kim, J. and Lee, J., 2002. Critical design factors for successful
e-commerce systems. Behaviour & Information Technology,
21 (3), 185–199.
Kobsa, A., Patil, S., and Meyer, B., 2011. Privacy in instant
messaging: an impression management model. Behaviour &
Information Technology, 31 (4), 355–370.
Laufer, R.S. and Wolfe, M., 1977. Privacy as a concept and a social
issue: a multidimensional developmental theory. Journal of
Social Issues, 33 (3), 22–42.
Malhotra, N.K., Kim, S.S., and Agarwal, J., 2004. Internet users’
information privacy concerns (IUIPC): the construct, the
scale, and a causal model. Information Systems Research,
15 (4), 336–355.
Milberg, S.J., Smith, H.J., and Burke, S.J., 2000. Information
privacy: corporate management and national regulation.
Organization Science, 11 (1), 35–57.
Milne, G.R., Beckman, J., and Taubman, M.L., 1996. Consumer
attitudes toward privacy and direct marketing in Argentina.
Journal of Direct Marketing, 10 (1), 22–33.
Milne, G.R. and Boza, M.-E., 1999. Trust and concern in con-
sumers’ perceptions of marketing information management
practices. Journal of Interactive Marketing, 13 (1), 5–24.
Nowak, G.J. and Phelps, J.E., 1992. Understanding privacy
concerns: an assessment of consumers’ information-related
knowledge and beliefs. Journal of Direct Marketing, 6 (4),
28–39.
O’Neil, K. and Penrod, S., 2001. Methodological variables in web-
based research that may affect results: sample type, monetary
incentives, and personal information. Behavior Research
Methods, 33 (2), 226–233.
Paine, C., et al., 2007. Internet users’ perceptions of ‘privacy
concerns’ and ‘privacy actions’. International Journal of
Human-Computer Studies, 65 (6), 526–536.
Phelps, J., Nowak, G., and Ferrell, E., 2000. Privacy con-
cerns and consumer willingness to provide personal infor-
mation. Journal of Public Policy & Marketing, 19 (1),
27–41.
Sheehan, K.B. and Hoy, M.G., 2000. Dimensions of privacy con-
cern among online consumers. Journal of Public Policy &
Marketing, 19 (1), 62–73.
Singer, E. and Bossarte, R.M., 2006. Incentives for survey par-
ticipation: when are they ‘coercive’? American Journal of
Preventive Medicine, 31 (5), 411–418.
Smith, H.J., Milberg, S.J., and Burke, S.J., 1996. Information pri-
vacy: measuring individuals’ concerns about organizational
practices. MIS Quarterly, 20 (2), 167–196.
Son, J.-Y. and Kim, S.S., 2008. Internet users’ information
privacy-protective response: a taxonomy and a nomological
model. MIS Quarterly, 32 (3), 503–529.
Stewart, K.A. and Segars, A.H., 2002. An empirical exami-
nation of the concern for information privacy instrument.
Information Systems Research, 13 (1), 36–49.
Stone, E.F., et al., 1983. A field experiment comparing
information-privacy values, beliefs, and attitudes across sev-
eral types of organizations. Journal of Applied Psychology,
68 (3), 459–468.
Taylor, D.G., Davis, D.F., and Jillapalli, R., 2009. Privacy con-
cern and online personalization: the moderating effects of
information control and compensation. Electronic Commerce
Research, 9 (3), 203–223.
Wang, H., Lee, M.K.O., and Wang, C., 1998. Consumer privacy
concerns about Internet marketing. Communications of the
ACM, 41 (3), 63–70.
Wang, P. and Petrison, L.A., 1993. Direct marketing activities
and personal privacy: a consumer survey. Journal of Direct
Marketing, 7 (1), 7–19.
Warren, S.D. and Brandeis, L.D. 1890. The right to privacy.
Harvard law review, 4 (5), 193–220.
Weible, R.J., 1993. Privacy and data: an empirical study of the
influence of types of data and situational context upon pri-
vacy perceptions. Doctoral dissertation. Mississippi State
University.
Xie, E., Teo, H.-H., and Wan, W., 2006. Volunteering personal
information on the Internet: effects of reputation, privacy
notices, and rewards on online consumer behavior. Marketing
Letters, 17 (1), 61–74.
Yang, S. and Wang, K., 2009. The influence of information sen-
sitivity compensation on privacy concern and behavioral
intention. ACM SIGMIS Database, 40 (1), 38–51.
... The literature on information disclosure, not specific to chatbot use, has identified two antecedents to users' information disclosure: the level of sensitivity of the information asked [52,53] and the relevance of the information asked to the given context [54,55]. These variables "have been most frequently shown to have a significant impact" [56] (p. ...
... Question sensitivity is known to change through time and vary across cultures [58]. In general, it has been shown that people are more averse to disclosing more sensitive information [52,53,59]. ...
... First, this research complements the literature on user disclosure by confirming that question sensitivity has an impact on disclosure in the context of interactions with chatbots. This result is consistent with previous research on question sensitivity and disclosure (not specific to chatbot interactions) [52,53,59]. Indeed, research on antecedents to disclosure had previously shown that sensitivity played a role in disclosure. ...
Article
Full-text available
Drawing from the tension between a company’s desire for customer information to tailor experiences and a consumer’s need for privacy, this study aims to test the effect of two information disclosure nudges on users’ information disclosure behaviors. Whereas previous literature on user-chatbot interaction focused on encouraging and increasing users’ disclosures, this study introduces measures that make users conscious of their disclosure behaviors to low and high-sensitivity questions asked by chatbots. A within-subjects laboratory experiment entailed 19 participants interacting with chatbots, responding to pre-tested questions of varying sensitivity while being presented with different information disclosure nudges. The results suggest that question sensitivity negatively impacts users’ information disclosures to chatbots. Moreover, this study suggests that adding a sensitivity signal—presenting the level of sensitivity of the question asked by the chatbot—influences users’ information disclosure behaviors. Finally, the theoretical contributions and managerial implications of the results are discussed.
... When it comes to relinquishing one's information for monetary incentive, various findings note an enhanced likelihood of disclosure can be motivated by such offerings (Benndorf & Normann,2018;Gómez-Barroso, 2021;Mukherjee et al., 2013;Roth, 2017). Others however, indicate a negative influence-people being less likely to release their details when offered a monetary reward (Lee et al., 2015;Li et al., 1097399S GOXXX10.1177/21582440221097399SAGE OpenPhonthanukitithaworn and Sellitto research-article20222022 1 Mahidol University International College, Salaya, Thailand 2 Victoria University Business School, Melbourne, Australia 2010). ...
... Malhotra et al. (2004), indicates that information can embody privacy value with information perceived by people to be sensitive influencing the likelihood of disclosure. Lee et al. (2015), indicates that requesting sensitive information intensified an individual's awareness of privacy-any associated benefits or monetary rewards being viewed as a "decoy" by people. Personal information may also embody different formats. ...
... As part of online disclosure activities, a website's perceived reliability and secure data collection practices can address the issue of trust belief (Dinev & Hart, 2006). Lee et al. (2015) suggest that trust belief can be influenced by the presence of a firm's privacy policy, a declaration of how information is to be used and whether the requesting entity has built a relationship with the consumer. The perceptions associated with trust belief also align with consumer privacy concernswhich in turn influences the release of information (K. ...
Article
Full-text available
The paper investigates a person’s willingness to reveal personal information for a monetary reward using a model that includes factors reflecting trust belief, risk belief, information type, subjective norm, and privacy concerns. A survey of fitness-tracker users ( N = 504) using a convenience sampling approach allowed data to be collected. Data analysis used a measurement model to assess construct reliability and validity, with structural equation modeling (SEM) used to test the model’s hypotheses. Findings highlight the direct effect of information type and subjective norm as factors that influence privacy. Trust and risk belief associated with information disclosure did not affect privacy concerns nor the willingness to disclose for monetary reward. Subjective norm was the only factor associated with people’s willingness to disclose information for monetary reward—highlighting the influence of peer groups and culture on the disclosure process. Notably, subjective norm as a factor that influences information disclosure is seldom reported. The paper contributes to further understanding of factors that influence personal information disclosure when people are offered a monetary incentive. Practical implications include how a reasonable monetary reward can potentially influence disclosure and that leveraging social networks when requesting information may enhance disclosure. Theoretical implications highlight that the modeling of commonly measured risk and trust factors may not hold in certain situations.
... Previous studies (Morton and Sasse, 2014;Shih et al., 2015) reveal that requests for data that meet individuals' preferences reduce privacy concerns. Moreover, rewards mitigate privacy concerns (Hallam and Zanella, 2017;Lee et al., 2015). Therefore, understanding individuals' preferences can support the offering of appropriate reward that mitigates information sensitivity. ...
... In performing this calculus, individuals expect at least a balanced outcome and are more likely to disclose personal information when the anticipated benefit is greater (Fife and Orjuela, 2012). This concept assumes that individuals expect economic value or social benefit for losing control of their personal information (Lee et al., 2015). ...
Thesis
Full-text available
The level of sensitivity with which smartphone users perceive information influences their privacy decisions. Information sensitivity is complex to understand due to the multiple factors influencing it. Adding to this complexity is the intimate nature of smartphone usage that produces personal information about various aspects of users’ lives. Users perceive information differently and this plays an important role in determining responses to privacy risks. The different levels of perceived sensitivity in turn point out how users could be uniquely supported through information cues that will enhance their privacy. However, several studies have tried to explain information sensitivity and privacy decisions by focusing on single-factor analysis. The current research adopts a different approach by exploring the influences of the disclosure context (smartphone ecosystem), three critical factors (economic status, location tracking, apps permission requests) and privacy attributes (privacy guardian, pragmatist, and privacy unconcerned) for a more encompassing understanding of how smartphone user categories in the UK perceive information. The analysis of multiple factors unearth deep complexities and provide a nuanced understanding of how information sensitivity varies across categories of smartphone users. Understanding how user categories perceive information enables tailored�privacy. Tailored privacy moves from “one-size-fits-all” to tailoring support to users and their context. The present research applied the Struassian grounded theory to analyse the qualitative interview data collected from 47 UK university graduates who are smartphone users. The empirical research findings show that smartphone users can be characterised into eight categories. However, the category a user belongs depends on the influencing factor or the information (identity or financial) involved and the privacy concern category of the user. This study proposes a middle-range theory for understanding smartphone users’ perception of information sensitivity. Middle-range theories are testable propositions resulting from an in-depth focus on a specific subject matter by looking at the attributes of individuals. The propositions show that an effective privacy support model for smartphone users should consider the varying levels of information sensitivity. Therefore, the study argues that users who perceive information as highly sensitive require privacy assurance to strengthen privacy, whereas users who perceive information as less sensitive require appropriate risk awareness to mitigate privacy risks. The proposition provides insight that could support tailored privacy for smartphone users.
... In addition, some firms try to provide monetary benefits for users in exchange for their information. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information [17]. Despite users paying great attention to their privacy, their economic behaviors present otherwise. ...
... Letting these two utilities be equal, and then combining equations in (15), and (17) to (18), we get the marginal users in the first period, i.e., θ 1 = ...
Article
Full-text available
The behavior-based discrimination price model (BBPD) needs to collect a large amount of user information, which would spark user privacy concerns. However, the literature on BBPD typically overlooks consumer privacy concerns. Additionally, most of the existing research provides some insights from the perspective of traditional privacy protection measures, but seldom discusses the role of quality discrimination in alleviating users’ privacy concerns. By establishing a Hotelling duopoly model of two-period price-quality competition, this paper explores the impact of quality discrimination on industry profits, user surplus, and social welfare under user privacy concerns. The results show that, with the increase of user privacy cost, given weak market competition intensity, quality discrimination can increase users’ surplus and social welfare, thereby alleviating users’ privacy concerns. We then discuss the managerial implications for alleviating consumer privacy concerns. In addition, we take Airbnb as an example to provide practical implications.
... Clerkin et al. [46] Concerned about the risk of data breaches. Lee et al. [23] Medical records are highly sensitive information. Brown et al. [54] Concerned about health information sharing. ...
Article
Full-text available
As information technology rapidly advances, digitized personal information is becoming more accessible. However, the increasing likelihood of data breaches has negatively aroused privacy concerns that may even affect individuals’ health. This study aims to identify contributory factors to the overall divulgence of personal medical information within a majority of healthcare contexts. Study data collected between 2018 and 2019 is from 3,170 eligible in-patients at a medical center in southern Taiwan who requested concealment of their recorded hospitalization information. By utilizing association rule mining, this study uncovers those factors contributing to in-patients’ privacy concerns. Association rule mining yields six rules that are associated with in-patients’ requests to conceal personal information at the time of hospitalization. These rules include (1) female gender; (2) accompanied when at home; (3) undergoing procedures during hospitalization; (4) severe illness or injury; (5) admission to a general medicine ward; and (6) procedures applied during hospitalization and accompanied when at home. The findings of this study suggest that healthcare facilities should pay special attention to those factors that may raise patients’ privacy concerns and should plan effective corresponding privacy protection policies to meet those concerns. Healthcare facilities must convey these privacy protection policies to patients via a range of digital channels. In this way, healthcare facilities can implement practical measures relating to patient perceptions in order to improve quality healthcare provision.
... Despite the option of non-disclosure, Jiang, Heng and Choi [25] find greater privacy concerns within individuals associated with a higher incidence of misrepresentation in synchronous online chatroom communications. Lee, Lim, Kim, Zo and Ciganek [27] find a higher willingness to misrepresent information among survey respondents who believed highly sensitive information was at risk. ...
Conference Paper
In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure to media reports of privacy invasion incidents - on information privacy concerns in the diffusion of mobile contact tracing applications. We aim to investigate how these factors in culmination shape privacy concerns. Our findings offer insights to devise more effective strategies for managing privacy concerns. This research expands the current academic discourse around technology adoption and privacy and has practical implications for the design and rollout of mobile contact tracing applications.
... According to existing research, privacy is classified into four types: physical, interactional, psychological, and informational [19,20]. Among these, information privacy refers to the right to make decisions about one's own information [18,21]. ...
... In the interview, there was a distinction between rewards: monetary compensation, well-being insights, and improving building automation as potential benefits. While previous research has shown monetary rewards can motivate many different behaviors, previous works have shown that monetary contributions may not cause people to overlook their privacy concerns or incentivize contributions [30][31][32][33] . However, it was clear in participant responses that significantly higher compensations are needed as an incentive for more intrusive modalities (i.e., A/V). ...
Article
Full-text available
Building management systems tout numerous benefits, such as energy efficiency and occupant comfort but rely on vast amounts of data from various sensors. Advancements in machine learning algorithms make it possible to extract personal information about occupants and their activities beyond the intended design of a non-intrusive sensor. However, occupants are not informed of data collection and possess different privacy preferences and thresholds for privacy loss. While privacy perceptions and preferences are most understood in smart homes, limited studies have evaluated these factors in smart office buildings, where there are more users and different privacy risks. To better understand occupants’ perceptions and privacy preferences, we conducted twenty-four semi-structured interviews between April 2022 and May 2022 on occupants of a smart office building. We found that data modality features and personal features contribute to people’s privacy preferences. The features of the collected modality define data modality features – spatial, security, and temporal context. In contrast, personal features consist of one’s awareness of data modality features and data inferences, definitions of privacy and security, and the available rewards and utility. Our proposed model of people’s privacy preferences in smart office buildings helps design more effective measures to improve people’s privacy.
Article
Mobile and web apps are increasingly relying on the data generated or provided by users such as from their uploaded documents and images. Unfortunately, those apps may raise significant user privacy concerns. Specifically, to train or adapt their models for accurately processing huge amounts of data continuously collected from millions of app users, app or service providers have widely adopted the approach of crowdsourcing for recruiting crowd workers to manually annotate or transcribe the sampled ever-changing user data. However, when users' data are uploaded through apps and then become widely accessible to hundreds of thousands of anonymous crowd workers, many human-in-the-loop related privacy questions arise concerning both the app user community and the crowd worker community. In this paper, we propose to investigate the privacy risks brought by this significant trend of large-scale crowd-powered processing of app users' data generated in their daily activities. We consider the representative case of receipt scanning apps that have millions of users, and focus on the corresponding receipt transcription tasks that appear popularly on crowdsourcing platforms. We design and conduct an app user survey study (n=108) to explore how app users perceive privacy in the context of using receipt scanning apps. We also design and conduct a crowd worker survey study (n=102) to explore crowd workers' experiences on receipt and other types of transcription tasks as well as their attitudes towards such tasks. Overall, we found that most app users and crowd workers expressed strong concerns about the potential privacy risks to receipt owners, and they also had a very high level of agreement with the need for protecting receipt owners' privacy. Our work provides insights on app users' potential privacy risks in crowdsourcing, and highlights the need and challenges for protecting third party users' privacy on crowdsourcing platforms. We have responsibly disclosed our findings to the related crowdsourcing platform and app providers.
Article
Full-text available
This investigation analysed the kinds of communicative acts that are considered privacy-invading, which communication strategies are used to restore privacy when it has been violated and how relationship type affects communication of privacy. A preliminary self-report survey and a pilot study employing open-ended interviews (n=43) led to the development of a questionnaire in which respondents (n=444) rated 39 possible actions on invasiveness and rated the likelihood of using 40 different tactics to restore privacy. Types of privacy violations formed five dimensions: (1) psychological and informational violations, (2) non-verbal interactional violations, (3) verbal interactional violations, (4) physical violations and (5) impersonal violations. Strategies used to restore privacy included: (1) interaction control, (2) dyadic intimacy, (3) negative arousal, (4) distancing, (5) blocking and (6) confrontation. Significant differences emerged across doctor-patient, employeremployee, teacher-student, parent-child, spouse-spouse and siblingsibling relationships.
Article
Full-text available
This article reports the results of a meta-analysis of 38 experimental and quasi-experimental studies that implemented some form of mail survey incentive in order to increase response rates. A total of 74 observations or cases were classified into one of four types of incentive groups: those using prepaid monetary or nonmonetary rewards included with the initial survey mailing and those using monetary or nonmonetary rewards as conditional upon the return of the survey. Results were generated using an analysis of variance approach. The overall effect size across the 74 observations was reported as low to moderate at d = .241. When compared across incentive types, only those surveys that included rewards (both monetary and nonmonetary) in the initial mailing yielded statistically significant estimates of effect size (d = .347, d = .136). The average increase in response rates over control conditions for these types of incentives was 19.1 percent and 7.9 percent, respectively. There was no evidence of any impact for those incentive types offering rewards contingent upon the return of the survey.
Article
Full-text available
The authors examine potential relationships among categories of personal information, beliefs about direct marketing, situational characteristics, specific privacy concerns, and consumers' direct marketing shopping habits. Furthermore, the authors offer an assessment of the trade-offs consumers are willing to make when they exchange personal information for shopping benefits. The findings indicate that public policy and self-regulatory efforts to alleviate consumer privacy concerns should provide consumers with more control over the initial gathering and subsequent dissemination of personal information. Such efforts must also consider the type of information sought, because consumer concern and willingness to provide marketers with personal data vary dramatically by information type.
Article
This paper describes the development of an instrument to measure the perception of privacy breaches. Perceived Privacy Breaches are divided into three dimensions: Dispersion, Fairness and Impact. These dimensions were derived using exploratory factor analysis on data gathered from 197 subjects. The instrument was utilized as part of a model to test the focal construct's relationships with its antecedents. A multiple regression was performed on a sample constituting 70% randomly selected cases. A cross-validation of the regression equation was performed using the remaining cases. Results indicate that the level of privacy concern an individual possesses has a positive impact on the severity of perceived privacy breaches. It was also found that personal experience of privacy invasions had a negative impact on the severity of perceived privacy breaches. © (2012) by the AIS/ICIS Administrative Office All rights reserved.
Article
In the United Kingdom, government proposals for the introduction of an identity (ID) card have raised considerable privacy concerns. In the present research, opinions and attitudes about different ways of implementing ID cards are examined using an experimental methodology. Specifically, the level and type of compulsion and application process, and the use of a centralized database or trusted third party to hold personal information, are compared for attitudes towards ID cards. Moreover, the impact of implementation scenarios on people with different privacy concern profiles is examined. The results show that an implementation that combines high compulsion with a centralized database (the approach currently favoured by the UK Government) leads to the greatest negative shift in attitudes towards ID cards. Implementations proposed by others (e.g. the London School of Economics) show significantly less negative shift in attitudes. People’s pre-existing privacy concerns also influence their evaluation of the different implementation scenarios.
Article
Self-perception theory is applied to explain mail survey respondent behavior when incentives to respond are used. The results support the hypothesis that when external cues are present (i.e., incentives are used) the level of compliance, as measured by response quality, is reduced. A monetary and a comparable value nonmonetary incentive are used. The psychological value of money explanation is supported as the monetary incentive group yields a significantly higher response rate and faster response.
Article
The Federal Trade Commission (FTC) is one of many organizations studying influences on consumer privacy online. The authors investigate these influences, taking into consideration the current body of literature on privacy and the Internet and the FTC's core principles of fair information practice. The authors analyze these influences to assess the underlying factors of privacy concern online. The authors examine the current recommendations and actions of the FTC in light of the results of an e-mail survey of online consumers in the United States that assessed their attitudes toward privacy online. The authors find that the FTC's core principles address many of online consumers' privacy concerns. However, two factors not directly incorporated in the five principles, the relationships between entities and online users and the exchange of information for appropriate compensation, may influence consumers' privacy concerns.