Skip to main content

Privacy Calculus Theory and Its Applicability for Emerging Technologies

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 258))

Abstract

One of the most important theories to be used and modified subsequently in the IS literature is the privacy calculus theory. This calculus governs the decision-making process of individuals to predict certain behavioral outcome like, disclosing personal information, intention to use an e-commerce site, in the presence of perceived privacy risk and perceived benefits. In this paper, we seek to analyze the relevancy of privacy calculus theory for certain emerging technologies and platforms (i) Bring Your Own Device (BYOD) (ii) Internet Of Things (IoT). We identify some of the perceived privacy risks and benefits in these emerging technologies. The insights gained from this study will enable researchers to further study the behavioral intention of organizations/people to use these technologies in the presence of privacy risks and benefits.

This is a preview of subscription content, log in via an institution.

References

  1. Hann, I.H., Hui, K.L., Lee, S.Y.T., Png, I.P.: Overcoming online information privacy concerns: an information-processing theory approach. J. Manage. Inform. Syst. 24, 13–42 (2007)

    Article  Google Scholar 

  2. Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues. 33, 22–42 (1977)

    Article  Google Scholar 

  3. Youn, S.: Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J. Consum. Aff. 43, 389–418 (2009)

    Article  Google Scholar 

  4. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15, 336–355 (2004)

    Article  Google Scholar 

  5. Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Quart. 35, 989–1016 (2011)

    Article  Google Scholar 

  6. Gandhi, V.: Bring Your Own Device (BYOD)—Key Trends and Considerations. Industry Report, Frost & Sullivan (2013)

    Google Scholar 

  7. Explosive Internet of Things Spending to Reach $1.7 Trillion in 2020, http://www.gartner.com/newsroom/id/2905717

  8. Lebek, B., Degirmenci, K., Breitner, M. H.: Investigating the influence of security, privacy, and legal concerns on employees’ intention to use BYOD mobile devices. In: 19th Americas Conference on Information Systems, pp. 1–8. AIS Press, Atlanta (2013)

    Google Scholar 

  9. Johnson, N., Joshi, K.: The pathway to enterprise mobile readiness: analysis of perceptions, pressures, preparedness, and progression. In: 18th Americas Conference on Information Systems, pp. 1–8. AIS Press, Atlanta (2012)

    Google Scholar 

  10. Kowatsch, T., Maass, W.: Critical privacy factors of internet of things services: an empirical investigation with domain experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds.) MCIS 2012. LNBIP, vol. 129, pp. 200–211. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adrija Majumdar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Majumdar, A., Bose, I. (2016). Privacy Calculus Theory and Its Applicability for Emerging Technologies. In: Sugumaran, V., Yoon, V., Shaw, M. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2015. Lecture Notes in Business Information Processing, vol 258. Springer, Cham. https://doi.org/10.1007/978-3-319-45408-5_20

Download citation

Publish with us

Policies and ethics