Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
Crossler, Robert E.
MetadataShow full item record
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on student- based and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.
Showing items related by title, author, creator and subject.
Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physiciansâ Offices Vega, Laurian Claire (Virginia Tech, 2011-03-28)Traditionally, security has been conceptualized as rules, locks, and passwords. More recently, security research has explored how people interact in secure (or insecure) ways in part of a larger socio-technical system. ...
Stewart, Michael Clark (Virginia Tech, 2013-06-17)Many Computer-Supported Cooperative Work (CSCW) applications go to great lengths to maximize transparency by making available participants\' actions and respective application states to all others in real-time. Designers ...
Implementing Differential Privacy for Privacy Preserving Trajectory Data Publication in Large-Scale Wireless Networks Stroud, Caleb Zachary (Virginia Tech, 2018-08-14)Wireless networks collect vast amounts of log data concerning usage of the network. This data aids in informing operational needs related to performance, maintenance, etc., but it is also useful for outside researchers in ...