The interpersonal privacy identity (IPI): development of a privacy as control model

The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socializa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information technology and management 2016-12, Vol.17 (4), p.341-360
Hauptverfasser: James, Tabitha L., Nottingham, Quinton, Collignon, Stephane E., Warkentin, Merrill, Ziegelmayer, Jennifer L.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 360
container_issue 4
container_start_page 341
container_title Information technology and management
container_volume 17
creator James, Tabitha L.
Nottingham, Quinton
Collignon, Stephane E.
Warkentin, Merrill
Ziegelmayer, Jennifer L.
description The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 ( 1977 )). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.
doi_str_mv 10.1007/s10799-015-0246-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1845370042</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4268271921</sourcerecordid><originalsourceid>FETCH-LOGICAL-c364t-f2c854144fce45d0db095bbcab00a775cc94c8c6b9eb8cce6d91539d22d0c57b3</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoMouK7-AG8BL3qoTtp8NN5k8WNhQcEVvIU0SbVLt6lJd2H_vVkq4sXTDMPzDjMPQucErgmAuIkEhJQZEJZBTnkGB2hCmCgywbk4TH1Rskwy8n6MTmJcARCeCz5Br8tPh5tucKF3IfpOt7gPzVabHW6s64Zm2OHL-cv86hZbt3Wt79dpin2N9S-oIza-G4Jv8dpb156io1q30Z391Cl6e7hfzp6yxfPjfHa3yEzB6ZDVuSkZJZTWxlFmwVYgWVUZXQFoIZgxkprS8Eq6qjTGcSsJK6TNcwuGiaqYootxbx_818bFQa38JqQXoiIlZYUAoHmiyEiZ4GMMrlbp7rUOO0VA7d2p0Z1K7tTenYKUycdMTGz34cKfzf-GvgHeRnIO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1845370042</pqid></control><display><type>article</type><title>The interpersonal privacy identity (IPI): development of a privacy as control model</title><source>Springer Nature - Complete Springer Journals</source><creator>James, Tabitha L. ; Nottingham, Quinton ; Collignon, Stephane E. ; Warkentin, Merrill ; Ziegelmayer, Jennifer L.</creator><creatorcontrib>James, Tabitha L. ; Nottingham, Quinton ; Collignon, Stephane E. ; Warkentin, Merrill ; Ziegelmayer, Jennifer L.</creatorcontrib><description>The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 ( 1977 )). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.</description><identifier>ISSN: 1385-951X</identifier><identifier>EISSN: 1573-7667</identifier><identifier>DOI: 10.1007/s10799-015-0246-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access to information ; Analysis ; Behavior ; Business and Management ; Calculus ; Computer Communication Networks ; Computer science ; Data Structures and Information Theory ; Information sharing ; Information systems ; IT in Business ; Operations Research/Decision Theory ; Personal information ; Privacy ; Social networks ; Social psychology ; Socialization ; Society ; Studies</subject><ispartof>Information technology and management, 2016-12, Vol.17 (4), p.341-360</ispartof><rights>Springer Science+Business Media New York 2015</rights><rights>Information Technology and Management is a copyright of Springer, 2016.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c364t-f2c854144fce45d0db095bbcab00a775cc94c8c6b9eb8cce6d91539d22d0c57b3</citedby><cites>FETCH-LOGICAL-c364t-f2c854144fce45d0db095bbcab00a775cc94c8c6b9eb8cce6d91539d22d0c57b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10799-015-0246-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10799-015-0246-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>James, Tabitha L.</creatorcontrib><creatorcontrib>Nottingham, Quinton</creatorcontrib><creatorcontrib>Collignon, Stephane E.</creatorcontrib><creatorcontrib>Warkentin, Merrill</creatorcontrib><creatorcontrib>Ziegelmayer, Jennifer L.</creatorcontrib><title>The interpersonal privacy identity (IPI): development of a privacy as control model</title><title>Information technology and management</title><addtitle>Inf Technol Manag</addtitle><description>The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 ( 1977 )). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.</description><subject>Access to information</subject><subject>Analysis</subject><subject>Behavior</subject><subject>Business and Management</subject><subject>Calculus</subject><subject>Computer Communication Networks</subject><subject>Computer science</subject><subject>Data Structures and Information Theory</subject><subject>Information sharing</subject><subject>Information systems</subject><subject>IT in Business</subject><subject>Operations Research/Decision Theory</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Social networks</subject><subject>Social psychology</subject><subject>Socialization</subject><subject>Society</subject><subject>Studies</subject><issn>1385-951X</issn><issn>1573-7667</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kE1LxDAQhoMouK7-AG8BL3qoTtp8NN5k8WNhQcEVvIU0SbVLt6lJd2H_vVkq4sXTDMPzDjMPQucErgmAuIkEhJQZEJZBTnkGB2hCmCgywbk4TH1Rskwy8n6MTmJcARCeCz5Br8tPh5tucKF3IfpOt7gPzVabHW6s64Zm2OHL-cv86hZbt3Wt79dpin2N9S-oIza-G4Jv8dpb156io1q30Z391Cl6e7hfzp6yxfPjfHa3yEzB6ZDVuSkZJZTWxlFmwVYgWVUZXQFoIZgxkprS8Eq6qjTGcSsJK6TNcwuGiaqYootxbx_818bFQa38JqQXoiIlZYUAoHmiyEiZ4GMMrlbp7rUOO0VA7d2p0Z1K7tTenYKUycdMTGz34cKfzf-GvgHeRnIO</recordid><startdate>20161201</startdate><enddate>20161201</enddate><creator>James, Tabitha L.</creator><creator>Nottingham, Quinton</creator><creator>Collignon, Stephane E.</creator><creator>Warkentin, Merrill</creator><creator>Ziegelmayer, Jennifer L.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L.0</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20161201</creationdate><title>The interpersonal privacy identity (IPI): development of a privacy as control model</title><author>James, Tabitha L. ; Nottingham, Quinton ; Collignon, Stephane E. ; Warkentin, Merrill ; Ziegelmayer, Jennifer L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c364t-f2c854144fce45d0db095bbcab00a775cc94c8c6b9eb8cce6d91539d22d0c57b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Access to information</topic><topic>Analysis</topic><topic>Behavior</topic><topic>Business and Management</topic><topic>Calculus</topic><topic>Computer Communication Networks</topic><topic>Computer science</topic><topic>Data Structures and Information Theory</topic><topic>Information sharing</topic><topic>Information systems</topic><topic>IT in Business</topic><topic>Operations Research/Decision Theory</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Social networks</topic><topic>Social psychology</topic><topic>Socialization</topic><topic>Society</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>James, Tabitha L.</creatorcontrib><creatorcontrib>Nottingham, Quinton</creatorcontrib><creatorcontrib>Collignon, Stephane E.</creatorcontrib><creatorcontrib>Warkentin, Merrill</creatorcontrib><creatorcontrib>Ziegelmayer, Jennifer L.</creatorcontrib><collection>CrossRef</collection><collection>Global News &amp; ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Information technology and management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>James, Tabitha L.</au><au>Nottingham, Quinton</au><au>Collignon, Stephane E.</au><au>Warkentin, Merrill</au><au>Ziegelmayer, Jennifer L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The interpersonal privacy identity (IPI): development of a privacy as control model</atitle><jtitle>Information technology and management</jtitle><stitle>Inf Technol Manag</stitle><date>2016-12-01</date><risdate>2016</risdate><volume>17</volume><issue>4</issue><spage>341</spage><epage>360</epage><pages>341-360</pages><issn>1385-951X</issn><eissn>1573-7667</eissn><abstract>The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 ( 1977 )). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10799-015-0246-0</doi><tpages>20</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1385-951X
ispartof Information technology and management, 2016-12, Vol.17 (4), p.341-360
issn 1385-951X
1573-7667
language eng
recordid cdi_proquest_journals_1845370042
source Springer Nature - Complete Springer Journals
subjects Access to information
Analysis
Behavior
Business and Management
Calculus
Computer Communication Networks
Computer science
Data Structures and Information Theory
Information sharing
Information systems
IT in Business
Operations Research/Decision Theory
Personal information
Privacy
Social networks
Social psychology
Socialization
Society
Studies
title The interpersonal privacy identity (IPI): development of a privacy as control model
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T02%3A51%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20interpersonal%20privacy%20identity%20(IPI):%20development%20of%20a%20privacy%20as%20control%20model&rft.jtitle=Information%20technology%20and%20management&rft.au=James,%20Tabitha%20L.&rft.date=2016-12-01&rft.volume=17&rft.issue=4&rft.spage=341&rft.epage=360&rft.pages=341-360&rft.issn=1385-951X&rft.eissn=1573-7667&rft_id=info:doi/10.1007/s10799-015-0246-0&rft_dat=%3Cproquest_cross%3E4268271921%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1845370042&rft_id=info:pmid/&rfr_iscdi=true