22 February 2014


'Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts' by Tamara Dinev, Heng Xu, Jeff H. Smith and Paul Hart in (2013) 22 European Journal of Information Systems 295–316 argues that
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. 
The authors comment that
Privacy has been studied for more than 100 years in almost all spheres of social science, most notably law, economics, psychology, management, marketing, and management information systems. Amazingly, however, it is also a concept that ‘is in disarray [and n]obody can articulate what it means’ (Solove, 2006, p. 477). Margulis (1977) noted the variety of conceptualizations of privacy and the disagreement among scholars on what privacy is. The lack of a clear, concrete, measurable, and empirically testable conceptualization of privacy affects many aspects of the society – the vagueness of the concept fails to guide adjudication and lawmaking (Bennett, 1992; Solove, 2006), as well as formation of government and organizational management policies and practices regarding the privacy and security of employees, consumers and clients, and citizens. Numerous attempts have been made by scholars to define and develop a coherent understanding of privacy and to integrate the different perspectives from different fields. The picture of privacy that emerges is fragmented and usually discipline-specific. The concepts, definitions, and relationships are inconsistent and neither fully developed nor empirically validated.
In Law, many scholars defined privacy as a ‘right’ or ‘entitlement’ (e.g., Warren & Brandeis, 1890); others from other disciplines, including philosophy and psychology, define it as a ‘state of limited access or isolation’ (e.g., Schoeman, 1984); and yet another group of scholars, particularly from the social sciences and information systems used ‘control’ as a definition of privacy (Westin, 1967; Culnan, 1993). Privacy ‘has been described as multidimensional, elastic, depending upon context, and dynamic in the sense that it varies with life experience’ (Xu et al, 2011, p. 799). And yet, ‘much of the work y has come from groups with a single point of view (e.g., civil liberties advocates, trade associations) and/or a mission that is associated with a point of view (e.g., regulatory agencies)’ (Waldo et al, 2007, p. vii). Many overlapping concepts, such as intrusion, deception, secrecy, anonymity, have been built into the definition of privacy and have added to the confusion (Margulis, 2003a, b). Moreover, very few have been empirically measured or tested. As Solove (2006, p. 479) notes, ‘privacy seems to be about everything, and therefore it appears to be about nothing’. In its report on the status of privacy research, the Committee of Privacy in the Information Age at the National Research Council of the National Academy of Sciences notes that it was ‘struck by the extraordinary complexity associated with the subject of privacy’, and that ‘the notion of privacy is fraught with multiple meanings, interpretations, and value judgments’ (Waldo et al, 2007, p. x).
Solove (2006) also notes that many discussions about privacy are targeted toward people’s fears and anxiety to the extent that the expression ‘this violates my privacy’ or ‘my privacy should be protected’ has become more a product of instinctive recoil void of meaning rather than a well-articulated statement carrying reason and a specific relevance. The difficulty in articulating what constitutes privacy, and thus what constitutes harm to privacy, translates into policymaker’s and the courts’ difficulty in defending privacy interests. This further leads to dismissing cases and disregarding organizational and government problems (Solove, 2006).
Given these challenges and murky conceptual waters, our study attempts to build a more rigorous, empirically testable framework of privacy and its correlates, which have often been confused with or built into the definitions of privacy per se. The specific research goals of our study are to (i) identify the appropriate conceptualization of privacy and the correlates that previously have been closely associated or confused with privacy; and (ii) develop empirical measures and test a nomological model of these correlates to examine their relationship to privacy and their distinctness from it.
We believe that our study is timely and needed. The dynamic globalization of the economy and information technology (IT), and the ubiquitous distributed storage and sharing of data puts the issue of information privacy at the forefront of society policies and practices. This development contributes to the urgency and need for finding a better and common framework for privacy, and information privacy in particular, that can be used across multiple areas that affect social life.
The focus of our paper is information privacy, although we found that in public and political discourse, as well as in various research streams, a clear distinction between physical and information privacy is not made. For example, polls and surveys ask about ‘privacy’ rather than ‘information privacy’. In many disciplines, including law, marketing, management information systems and economics, physical privacy concepts and definitions are directly applied to information privacy, providing continuity in the nomological models associated with information privacy (Smith et al, 2011). Analogously, we will use earlier, general privacy concepts to derive and analyze information privacy-specific concepts. In an attempt to be as clear as possible in our framework, throughout the remainder of this paper we will use the term ‘privacy’ to refer to ‘information privacy’. We will refer to ‘general privacy’ when we use previous studies and theories that are relevant to information privacy, but did not specify whether the term ‘privacy’ concerns physical or information privacy.
The overarching models guiding this process are the general privacy theories of Altman (1974, 1975), Westin (1967), and Margulis (1977, 2003a, b; see Margulis, 2003a for a review) and the general privacy taxonomy developed by Solove (2006). Each of these identifies a set of privacy dimensions but to the best of our knowledge have not been empirically validated. In addition, we employ the Zwick & Dholakia’s (2004) conceptualization of identity management that will help us rigorously define and operationalize the tactics of information control we will identify in the study.We conducted a survey study to test the research model.
In what follows, we first describe the literature review for our research, presenting the overarching theories and privacy definitions that guide the development of the research model. Then we develop the logic underlying the research model that presents the process through which individuals form privacy perceptions. This is followed by a description of the research methodology, choice of context to empirically test our model, and our findings. The paper concludes with a discussion of the results and implications of the findings.