The interpersonal privacy identity (IPI): development of a privacy as control model
Tabitha L. James (),
Quinton Nottingham (),
Stephane E. Collignon (),
Merrill Warkentin () and
Jennifer L. Ziegelmayer ()
Additional contact information
Tabitha L. James: Virginia Tech
Quinton Nottingham: Virginia Tech
Stephane E. Collignon: Virginia Tech
Merrill Warkentin: Mississippi State University
Jennifer L. Ziegelmayer: Qatar University
Information Technology and Management, 2016, vol. 17, issue 4, No 3, 360 pages
Abstract:
Abstract The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 (1977)). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.
Keywords: Privacy; Online behavior; Information control; Interaction control (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)
Downloads: (external link)
http://link.springer.com/10.1007/s10799-015-0246-0 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infotm:v:17:y:2016:i:4:d:10.1007_s10799-015-0246-0
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10799
DOI: 10.1007/s10799-015-0246-0
Access Statistics for this article
Information Technology and Management is currently edited by Raymond Patterson and Erik Rolland
More articles in Information Technology and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().