Abstract
One of the most important theories to be used and modified subsequently in the IS literature is the privacy calculus theory. This calculus governs the decision-making process of individuals to predict certain behavioral outcome like, disclosing personal information, intention to use an e-commerce site, in the presence of perceived privacy risk and perceived benefits. In this paper, we seek to analyze the relevancy of privacy calculus theory for certain emerging technologies and platforms (i) Bring Your Own Device (BYOD) (ii) Internet Of Things (IoT). We identify some of the perceived privacy risks and benefits in these emerging technologies. The insights gained from this study will enable researchers to further study the behavioral intention of organizations/people to use these technologies in the presence of privacy risks and benefits.
This is a preview of subscription content, log in via an institution.
References
Hann, I.H., Hui, K.L., Lee, S.Y.T., Png, I.P.: Overcoming online information privacy concerns: an information-processing theory approach. J. Manage. Inform. Syst. 24, 13–42 (2007)
Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues. 33, 22–42 (1977)
Youn, S.: Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J. Consum. Aff. 43, 389–418 (2009)
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15, 336–355 (2004)
Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Quart. 35, 989–1016 (2011)
Gandhi, V.: Bring Your Own Device (BYOD)—Key Trends and Considerations. Industry Report, Frost & Sullivan (2013)
Explosive Internet of Things Spending to Reach $1.7 Trillion in 2020, http://www.gartner.com/newsroom/id/2905717
Lebek, B., Degirmenci, K., Breitner, M. H.: Investigating the influence of security, privacy, and legal concerns on employees’ intention to use BYOD mobile devices. In: 19th Americas Conference on Information Systems, pp. 1–8. AIS Press, Atlanta (2013)
Johnson, N., Joshi, K.: The pathway to enterprise mobile readiness: analysis of perceptions, pressures, preparedness, and progression. In: 18th Americas Conference on Information Systems, pp. 1–8. AIS Press, Atlanta (2012)
Kowatsch, T., Maass, W.: Critical privacy factors of internet of things services: an empirical investigation with domain experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds.) MCIS 2012. LNBIP, vol. 129, pp. 200–211. Springer, Heidelberg (2012)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Majumdar, A., Bose, I. (2016). Privacy Calculus Theory and Its Applicability for Emerging Technologies. In: Sugumaran, V., Yoon, V., Shaw, M. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2015. Lecture Notes in Business Information Processing, vol 258. Springer, Cham. https://doi.org/10.1007/978-3-319-45408-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-45408-5_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45407-8
Online ISBN: 978-3-319-45408-5
eBook Packages: Business and ManagementBusiness and Management (R0)