2007 Conjoint
2007 Conjoint
Concerns: An Information-Processing
Theory Approach
IL-HORN HANN, KAI-LUNG HUI, SANG-YONG TOM LEE, AND
IVAN P.L. PNG
IVAN P.L. PNG is Kwan Im Thong Hood Cho Temple Professor and Professor of Business
Policy and Economics at the National University of Singapore. His research focuses on
the economics of intellectual property, information privacy, and pricing. Dr. Png is the
author of Managerial Economics, which has been translated into Chinese (traditional
and simplified characters) and Korean. He is a Professorial Fellow of the IP Academy
of Singapore, and an Associate Editor of Management Science. He was a nominated
Member of Parliament (10th Parliament of Singapore), 2005–6.
ABSTRACT: The advent of the Internet has made the transmission of personally iden-
tifiable information more common and often unintended by the user. As personal
information becomes more accessible, individuals worry that businesses misuse the
information that is collected while they are online. Organizations have tried to mitigate
Journal of Management Information Systems / Fall 2007, Vol. 24, No. 2, pp. 13–42.
© 2007 M.E. Sharpe, Inc.
0742–1222 / 2007 $9.50 + 0.00.
DOI 10.2753/MIS0742-1222240202
this concern in two ways: (1) by offering privacy policies regarding the handling and
use of personal information and (2) by offering benefits such as financial gains or
convenience. In this paper, we interpret these actions in the context of the informa-
tion-processing theory of motivation. Information-processing theories, also known
as expectancy theories in the context of motivated behavior, are built on the premise
that people process information about behavior–outcome relationships. By doing so,
they are forming expectations and making decisions about what behavior to choose.
Using an experimental setting, we empirically validate predictions that the means to
mitigate privacy concerns are associated with positive valences resulting in an increase
in motivational score. In a conjoint analysis exercise, 268 participants from the United
States and Singapore face trade-off situations, where an organization may only offer
incomplete privacy protection or some benefits. While privacy protections (against
secondary use, improper access, and error) are associated with positive valences, we
also find that financial gains and convenience can significantly increase individuals’
motivational score of registering with a Web site. We find that benefits—monetary
reward and future convenience—significantly affect individuals’ preferences over Web
sites with differing privacy policies. We also quantify the value of Web site privacy
protection. Among U.S. subjects, protection against errors, improper access, and
secondary use of personal information is worth $30.49–$44.62. Finally, our approach
also allows us to identify three distinct segments of Internet users—privacy guardians,
information sellers, and convenience seekers.
KEY WORDS AND PHRASES: conjoint analysis, expectancy theory, financial reward, in-
formation privacy, online privacy, segmentation.
which regulate the online collection and use of personal information regarding children
under the age of 13 and California residents.2 Additional legislation, such as disclosure
requirements of security breaches of data are currently under consideration.
Rapid improvements in computing technologies and the advent of e-commerce have
amplified public concern about privacy, especially on electronic networks. With every
Web site visit, a visitor leaves an electronic trace that can later be retrieved and ana-
lyzed. Combined with technology to store identifying information (cookies), Web site
operators can profile visitors to an unprecedented degree and subsequently merge these
profiles with other demographic data. Such an enriched data set can then be used by
the company or sold to other parties [54]. This information could benefit the customer
by more precisely identifying his or her needs. However, it could also be used to his
or her detriment. For example, Amazon.com was suspected of engaging in differential
pricing based on prior shopping information and other customer demographics for
the sales of DVDs; more precisely, some customers were deliberately overcharged.3
In general, Westin observes that there “has been a well-documented transformation
in consumer privacy attitudes over the past decade, moving concerns from a modest
matter for a minority of consumers in the 1980s to an issue of high intensity expressed
by more than three-fourths of American consumers in 2001” [68].
Violation of privacy occurs when an organization, in its efforts to pursue the
organization’s objectives, collects, stores, manipulates, or transmits personal informa-
tion unbeknownst to the individual. Not all of these activities surrounding personal
information are necessarily perceived as invading privacy. A person submitting his or
her name, e-mail address, residential address, and credit card information online for
a purchase may not perceive the payment procedure as invasive, but as a necessity to
obtain the benefits of the product or service (Simmons made similar arguments regard-
ing disclosure of intimate personal information [55]). However, the person may feel
that his or her privacy is invaded if that information is then linked to other primary and
secondary data such as browsing behavior on the Web site and demographic informa-
tion. Yet other people might welcome these efforts if this leads to price and product
promotions. In general, perceptions of privacy infringements vary individually.
Privacy research has shown that this perception can be influenced by the firm’s ac-
tions. Naming the disclosure targets—that is, the person to whom private information
is disclosed and the purpose of the relationship—influences perception of privacy
violations [37, 62]. Fusilier and Hoyer [21] show that granting permission of disclo-
sure greatly reduces the perception of privacy invasion. Culnan and Armstrong [9]
find that privacy concerns can be addressed by explicitly stating that fair procedures
for managing private information will be employed. In addition, Spiekermann et al.
[58] show that in order to reduce product complexity, many participants, even some
privacy fundamentalists, willingly share private information with a Web site. Even
though their study does not measure the cost–benefit trade-off directly, it indicates
that perceptions of privacy are context dependent. One important contribution of our
study is to analyze such considerations.
Some actions of Internet businesses can certainly be interpreted as strategies to
mitigate privacy concerns. An organization’s promise to adhere to privacy policies
regarding the handling and use of personal information may reduce perceptions of
privacy violations. Perhaps the most common way of reducing privacy concerns
has been to offer incentives. Many online organizations have offered prizes (such as
participation in raffles or free shipping) in exchange for submitting personal infor-
mation. Even more pervasive is the facility of “customizing” a Web site according
to a customer’s preferences thereby increasing his or her convenience. For example,
Amazon’s “1-click ordering” technology greatly reduces the inconvenience of the
payment process for repeat customers.
Previous privacy research has, perhaps due to the nature of the subject, mostly fo-
cused on privacy concerns [8, 9, 45, 56, 60]. We extend this discussion by introducing
additional dimensions that the information-seeking organization has to offer—namely,
financial incentives and convenience. In this paper, we are interested in analyzing
these means of mitigating privacy concerns. Our research objectives are as follows:
first, we analyze privacy mitigation strategies from the viewpoint of information-
processing theories of motivation. Specifically, we apply the expectancy theory of
motivation (from now on “expectancy theory”), which assumes that an individual’s
choice is determined by his or her expectations about attaining desired outcomes. After
processing information about behavior–outcome relationships, people are considered
to form expectations and make decisions about what alternatives to choose. Based on
this theory, we hypothesize that efforts to mitigate privacy concerns effectively lead
to an increase in motivational score.
A second contribution of this study is that our research design allows for heterogene-
ity of privacy preferences. This study differs from previous work on information privacy
in that we use a within-person approach that allows us to estimate the individual’s
utility for the means to mitigate privacy concerns. We employ the technique of conjoint
analysis in which each subject is asked to assess trade-off situations, where an organiza-
tion may only be able to offer incomplete privacy protection and/or promotions and/or
convenience. Using this method, 84 U.S. and 184 Singapore subjects ranked alternative
combinations of benefits and privacy protection policies in an online setting. Based on
this approach, we estimate that for U.S. subjects, protection of personal information
is worth US$30.49–$44.62. For Singapore subjects, we find that privacy protection is
valued at S$57.11. An additional advantage of using a within-person approach is that
we can use the individual utilities as a basis to identify segments of Internet users.
Our results indicate that there are three distinct segments of Internet users, which we
term privacy guardians, information sellers, and convenience seekers.
establish personal boundaries, and avoid unwanted disclosure and intrusion [23, 24].
In many experimental and organizational settings, people are found to perceive privacy
invasions when they are not granted sufficient control on the solicitation, storage, use,
and disclosure of various types of personal information [15, 63, 69]. Such perception
may deter them from taking part in transactions that involve personal information
solicitation [8, 62].
Consumer research suggests that individuals face a degree of risk when they enter into
marketing transactions, and their perceived risk may significantly affect their extent of
information search and purchase decisions [7]. Generally, perceived risk encompasses
both the uncertainty and adverse consequences of taking part in a transaction [14].
Advances in network and telecommunications technologies have fostered the growth
of electronic commerce, which has added a new information dimension to marketing
transactions. Increasingly, personal information is acquired, exchanged, and used
by online establishments. This has expanded the risk of Internet users who now face
additional uncertainty regarding how their personal information is handled. Informa-
tion privacy has been found to be of utmost concern to consumers in contemporary
marketing exchanges [9, 35, 53].
Previous research by Laufer and Wolfe [40] in an organizational setting suggests
that individuals perform a “calculus of behavior” to assess the costs and benefits of
providing personal information. On the basis of this theoretical construct, individu-
als explicitly consider the trade-off between the merits of interactions and potential
consequences.4 Implicitly assumed in this “privacy calculus” is that individuals behave
to maximize the difference of benefits and costs. Based on this understanding, we use
an information-processing theory of motivation to analyze the extent of individuals’
online information privacy concerns. Like all cognitive theories, information-process-
ing theory focuses on the cognitive process that occurs before a behavior is undertaken
or a choice is made. Specifically, we employ the expectancy theory framework to give
more structure to the question of how individuals make decisions regarding privacy
in an online setting.5 Originally formulated by Vroom [66], expectancy theory is a
framework to explain how an individual chooses between alternative forms of behav-
ior. The theory proposes that the individual considers the outcomes associated with
various levels of performance as well as the likelihood of achieving these outcomes.
When deciding among alternatives, an individual selects the option with the greatest
motivational score.6
The motivational force for a behavior or action is a function of three distinct per-
ceptions: expectancy, instrumentality, and valence—that is, Motivational Score =
f(Expectancy, Instrumentality, Valence). Expectancy is a probability assessment that
reflects the individual’s belief that a given level of effort will result in a given level
of performance. Instrumentality refers to the subjective assessment that a given per-
formance level will lead to one or more outcomes. Valence refers to the value that an
individual places on a given outcome.
For illustration purposes, we discuss expectancy theory in the context of a person
considering whether to register at a financial Web site to trade stocks, to stay current
about the value of his or her stock holdings, to collect information about the companies
that are part of his or her stock portfolio, and to receive advice on the riskiness of
his or her stock portfolio. For these purposes, the financial Web site may require the
person to submit an e-mail address, name, residential address, banking information,
social security number, and the names of the stocks and quantities owned. Motivation
is seen as the force that directs behavior. It deals with the question of choice among
competing alternatives. As applied to online information privacy, in the case of fi-
nancial Web sites, we investigate which site the individual chooses, after controlling
for content and the amount of personal information that it collects and given that the
individual may choose among different mixes of privacy policies, convenience, and
financial benefits. Expectancy is the probability weight that characterizes the perceived
effort–performance relationship. It is the expectancy that one’s effort will lead to
the desired performance. In our example, an individual may provide the requested
personal and portfolio information that results in signing up with the financial Web
site. Instrumentality is the weight that describes the perceived performance–outcome
relationship. It characterizes the belief that if a person does meet performance ex-
pectations, he or she will receive a particular outcome. For the individual, signing up
with the financial Web site may provide more convenience when checking the stock
portfolio and becoming updated on relevant company news, and financial benefits
through promotions. Regarding online privacy, an important outcome is the commit-
ment of the financial Web site to protect personal information according to its privacy
policy. Finally, valence refers to the value the individual personally places on the
outcome. This is a function of his or her needs, goals, and values. Depending on the
outcome, the valence can be positive or negative. In the financial Web site example,
positive valences include the appreciation of the convenience of having all relevant
information without repeated search and the financial gain from having signed up with
this Web site. In the context of online privacy, positive valence includes the feeling
of security due to the specifics of the privacy policy. A Web site with an incomplete
privacy policy may generate negative valences such as the potential to be vulnerable
to others or to be exploited by others.
In the context of privacy, a consumer who has the choice between alternative finan-
cial Web sites will take the amount of personally identifiable information collected,
the privacy policy, the convenience, and the financial gains into consideration. Each
of these dimensions is associated with a value for expectancy, instrumentality, and
valence. An individual will rank the alternatives and choose the one with the greatest
motivational force. More formally, for an alternative with n dimensions, the expectancy
theory assumes a score that is computed as
n
Motivation Score = ∑ ( E → P )i × ( P → O )i × V
i =1 i ,
Expectancy Instrumentality Valence
Applying this model in the context of online information privacy, we note that ex-
pectancies, instrumentalities, and valences are specific to each person. However, this
model also implies that the variable outcome (O) can be influenced by the organization
to increase the motivational score of a person. If the organization can effectively use
outcomes that are associated with positive valences, it can increase the motivational
score and effectively decrease privacy concerns. Important to our approach is that
given a certain motivational score for fixed effort, performance, and a manipulated
outcome, we can elicit the valences that are associated with the means to mitigate
online privacy concerns.
Our first research objective addresses how organizations can mitigate privacy con-
cerns by managing outcomes and associated valences within the expectancy model.
We first have to establish the various outcomes that are associated with valences. Previ-
ous research by Smith et al. [56] identified four specific privacy concern dimensions
that represent the cognitive state of consumers toward corporate use of information.
These four privacy dimensions are collection, error, unauthorized secondary use, and
improper access. Collection refers to the concern that “extensive amounts of person-
ally identifiable data are being collected and stored in databases,” error refers to the
concern that “protections against deliberate and accidental errors in personal data are
inadequate,” unauthorized secondary use7 refers to the concern that “information is
collected for one purpose but is used for another, secondary purpose,” and improper
access refers to the concern that “data about individuals are readily available to people
not properly authorized to view or work with this data” [56, p. 172, table 2]. While
Smith et al. [56] identified these dimensions through a careful instrument develop-
ment and validation process using students, consumers, and professionals, Stewart
and Segars [60] further validated these dimensions with a large, representative sample
of consumers.8 Therefore, we use these dimensions (collection, error, unauthorized
secondary use, and improper access) as the basis for potential outcome variables, which
will determine the instrumentalities. Consistent with expectancy theory, businesses
can use the protection of privacy as an outcome to increase the motivational score of
the Web site. Specifically, individuals link performance (successfully obtaining an
account) with outcome (assurance by privacy policy). For example, a person may
give a privacy policy that restricts secondary use a higher instrumentality and hence
a greater motivational score than a policy that omits protection from secondary use.
Therefore, we hypothesize:
the context of information privacy, these theories posit that individuals may vary
in their judgments toward online privacy. Inasmuch as expectations about valences
across individuals are similar, groups may be identified. For example, past opinion
surveys have divided the U.S. population into a majority of “privacy pragmatists” and
minorities of “privacy fundamentalists” and “privacy unconcerned” [68]. Therefore,
we hypothesize:
of convenience benefits—the explicit time saving per session and the expected visit
frequency to the Web site. Accordingly, we operationalized convenience by “expected
visit frequency/total time savings” in our conjoint experiment.11
As mentioned before, we considered the four privacy dimensions identified by Smith
et al. [56]—collection, error, unauthorized secondary use, and improper access. For
our purpose, collection is a necessary antecedent to the three other dimensions. Error,
unauthorized secondary use, and improper access of information cannot happen without
ex ante collection of personal information. Further, individuals’ concerns on the other
three dimensions are a direct function of the amount of information collected—the
more information a Web site collects, the higher should be the concerns with error,
unauthorized secondary use, and improper access of information. Therefore, it would
not be appropriate to manipulate the collection of information and let subjects assess
the trade-offs between collection and other outcome dimensions. Accordingly, in our
conjoint analysis, we controlled for the collection of information and manipulated
the other three dimensions.
Taken together, our conjoint study assesses trade-offs among five dimensions—two
benefit outcomes and three privacy outcomes. Based on the discussion with our focus
groups, we created three outcomes for monetary reward ($5, $10, and $20, in the
respective currency) and visit frequency/time savings (monthly, weekly, and daily).12
The outcomes of the three privacy dimensions (error, unauthorized secondary use,
and improper access of information) were manipulated by the presence (or absence)
of proper information handling and access procedures.
Based on these five dimensions and their treatment levels, there were a maximum
of 3 × 3 × 2 × 2 × 2 = 72 conjoint stimuli. To avoid asking subjects to rank too many
alternatives, we selected 18 stimuli based on an optimal orthogonal design [1].13 For
example, one particular stimulus was a Web site that provided a $5 monetary reward
(in the respective currency) in return for personal information and which the subject
visited once a month with a total time savings of 24 minutes per year. Further, the Web
site had no error-correction procedure, no policies to prevent unauthorized secondary
use, and no policies to prevent improper access to information. Our conjoint analysis
asked subjects to rank 18 Web sites (stimuli) that represented different combinations
of benefits and privacy protection.
The basic estimation procedure underlying the conjoint analysis is a main effects
analysis of variance (ANOVA), which computes utilities such that the rank ordering
of the sums of each alternative’s set of part-worths is the same as the actual rank
ordering of the alternatives. The basic building block of our conjoint analysis is built
on the following model:
To recall, the part-worth (PW) is the marginal utility of the dimension in the individ-
ual’s ranking of the conjoint stimuli. To estimate the part-worths, we use least-squares
regression with the subjects’ rankings (from 1 to 18) as the dependent variable and
indicators of the various levels of the two benefit outcomes and three privacy protection
outcomes as the independent variables.14 Then, the coefficient of each independent
variable is the part-worth corresponding to the outcome of that dimension.
In summary, the conjoint analysis proceeds by the following steps [26]:
with US$7.16 In Singapore, 184 subjects completed the experiment and received course
credit. We collected 268 responses in total.
conjoint analysis regresses the subjects’ rankings of the conjoint stimuli (from 1 to 18)
on dummy variables, which represent the various levels of the two benefit outcomes
and three privacy protection outcomes.17 The coefficient of each independent variable
would be the part-worth corresponding to the outcome of that dimension (in order to
be consistent with the regression language, we will use the term coefficient to mean
part-worth from here on). In the context of the expectancy theory–based framework,
the coefficients of the dummy variables represent the valences of the outcomes.
The relationship between the expectancy-based theory of motivation framework for
privacy and the conjoint analysis can be depicted as follows:
Ranking
= α+ ∑ OutcomeFin. Rew. j
* PWFin. Rew. j
Motivation Score j ∈{$10,$20}
Instrumentality for Fin. Rew. j Valence for Fin. Rew. j
+ ∑ OutcomeFreq. k
* PWFreq. k
k ∈{dly , wkly}
Instrumentality for Freq. k Valence for Freq. k
+ OutcomeError * PWError
Instrumentality for Error Valence for Error
Relative Relative
importance importance
Instruments Level Coefficient1 (percent) Coefficient1 (percent)
(0.341) (0.165)
$202 3.141*** 1.388***
(0.534) (0.281)
Visit frequency/ Monthly n.a. 6.13 n.a. 6.02
time savings Weekly 0.568** 0.432***
(0.260) (0.153)
Daily 0.734* 0.715***
(0.411) (0.254)
Error No review n.a. 24.80 n.a. 15.06
Review 2.968*** 1.787***
(0.355) (0.194)
Improper access No restriction n.a. 25.12 n.a. 28.43
Restriction 3.007*** 3.374***
(0.529) (0.349)
Unauthorized Allowed n.a. 17.70 n.a. 38.80
secondary use Not allowed 2.118*** 4.605***
(0.324) (0.297)
Notes: 1 Standard errors are shown in parentheses. The lowest levels of each of the included dimensions are used as experimental control
and hence are excluded from the estimation. We label all lowest-level coefficients as “n.a.” (not applicable). 2 U.S. dollars for U.S. subjects
and Singapore dollars for Singapore subjects. *** Significant at the 1 percent level; ** significant at the 5 percent level; * significant at the
10 percent level.
8/9/2007 12:48:48 PM
OVERCOMING ONLINE INFORMATION PRIVACY CONCERNS 27
were willing to trade away privacy protection or convenience only when the monetary
reward exceeded a threshold, which lay between S$10–20 (US$5.40–10.80).
Taken together, the results from the U.S. and Singapore samples suggest that a suf-
ficiently large monetary reward significantly increased the relative attractiveness of
a Web site independent of its privacy policy. Further, when the monetary reward was
relatively low (as in the Singapore sample), the marginal utility of the reward was
increasing, and when the monetary reward was relatively high (as in the U.S. sample),
the marginal utility tended to decrease. These results indicate that the attractiveness
of a monetary reward relative to privacy protection or convenience might follow the
S-shape as shown in Figure 1. The results are consistent with economic analysis that
utility functions tend to be nonconcave [20, 31].
We also find support for the second part of the Financial Gain and Convenience
hypothesis (H1b), that outcomes such as time-saving services, operationalized by visit
frequency/time savings, are associated with positive valences and hence increase the
motivational score. Referring to Table 2, in the U.S. sample, the coefficient (valence)
for weekly visits was significant at the 5 percent level, but the coefficient for daily visits
was significant only at the 10 percent level. Even though the coefficient for weekly
visits were smaller than for daily visits, they were not significantly different. In the
Singapore sample, the coefficients for visit frequency/time savings were generally
more significant. However, as with the U.S. subjects, the effect due to weekly visits
was not significantly different from that due to daily visits.
From the results of both samples, we conclude that there is some evidence that
subjects value convenience. The evidence is stronger among Singapore subjects than
U.S. subjects. Further, once the subjects expected to visit a certain Web site sufficiently
frequently (at least once a week), more frequent visits did not seem to affect subjects’
preferences. This is consistent with the notion of a “convenience threshold,” which is
reached with a weekly visit frequency. The coefficients and relative importance as-
sociated with visit frequency/time savings among U.S. and Singapore subjects were
very close. In both samples, these were much lower than the coefficients and relative
importance for the other dimensions. Apparently, among our subjects, convenience
was only a minor factor when evaluating Web sites. By contrast, monetary reward and
privacy protection were perceived to be much more important.
The coefficient (valence) is the value associated with an outcome. In our setting, it
represents the marginal increase in the motivational score. However, with some simple
calculations, we can give the coefficients a more useful meaning. Specifically, we can
interpret the coefficient (valence) of monetary reward in terms of the marginal utility
of a $1 reward in the respective currency. Referring to Table 2, in the U.S. sample,
between the US$5 and US$10 rewards, the US$5 increase raised the motivational
score by 1.327, or 0.265 per dollar of reward. Further, between the US$10 and US$20
rewards, the US$10 increase raised the motivational score by 3.141 – 1.327 = 1.814,
or 0.181 per dollar of reward. These two estimates provide a range of 0.181–0.265
per U.S. dollar of reward.19 In the Singapore sample, the S$10 coefficient was not
significantly different from zero. Accordingly, we focus on the S$20 coefficient. Be-
tween the S$5 and S$20 rewards, the S$15 increase raised the motivational score by
1.388, which amounted to 0.0925 per Singapore dollar of reward or 0.171 per U.S.
dollar of reward. This was remarkably close to the range (0.181–0.265 per U.S. dollar
of reward) that we found among U.S. subjects.
Finally, using the marginal utilities of a US$1 reward and the coefficients for privacy
protection, we estimate the value of protection, on a per subject basis, for each of the
three privacy concerns. Recall that we estimated the marginal utility of a US$1 reward
to be 0.181–0.265 among the U.S. subjects. By Table 2, the coefficient for review
and editing of information was 2.968. Using the lower bound for the marginal utility
(0.181 per dollar), the value of review and editing of information is 2.968/0.181 =
US$16.40. Using the upper bound for the marginal utility (0.265 per dollar), the
value is 2.968/0.265 = US$11.20. We can use the same method to derive the values
of protecting against improper access and unauthorized secondary use. The results
are reported in Table 3. We also computed the values for the Singapore subjects using
the marginal utility of 0.171 per U.S. dollar.
Generally, our results in Table 3 suggest that Web sites might need to offer substantial
monetary incentives to overcome individuals’ concerns about error, improper access,
and unauthorized secondary use of information. Among U.S. subjects, protection
against errors, improper access, and secondary use of personal information is worth
between US$30.49 and US$44.62, as seen by summing the column entries for U.S.
subjects. Based on the S$20 coefficient in Table 2, the comparable number for Sin-
gapore subjects is S$57.11.
Segmentation Analysis
To address our secondary set of research questions—whether individuals systemati-
cally differ in their trade-off between benefits of disclosing personal information and
Value
privacy concerns—we applied cluster analysis [25, 65]. This technique groups subjects
into distinct segments according to the similarity of their estimated coefficients for
the various outcomes. In the present case, we apply cluster analysis to segment the
subjects according to their estimated valences over the various benefits and dimen-
sions of privacy protection.20
Specifically, we applied hierarchical cluster analysis using average between-group
linkage with (dis)similarity measured by the squared Euclidean distance to both the
U.S. and Singapore samples. The hierarchical method was preferred because we had
no a priori information on the number of clusters and initial cluster seeds/centers
[30, pp. 493–498]. We used a distance measure for (dis)similarity as all the valences
(the inputs to the cluster analyses) were derived from a common scale—the Web site
rankings.
For each sample, we began the analysis with every subject constituting a separate
cluster. We then examined the percentage drops in the similarity coefficient as clusters
were progressively merged. In both the U.S. and Singapore samples, we stopped at
three clusters, as further combination of any two clusters resulted in a sharp drop in
similarity, a stopping rule recommended by Hair et al. [30, p. 499]. Table 4 reports the
three clusters, their sample sizes, and the respective mean coefficients.21
Overall, we found strong support for the Privacy Diversity hypothesis (H2). Consis-
tent across the two samples, the majority of the subjects formed a cluster that could
be characterized by a high value on information privacy. Specifically, 72 percent of
the U.S. subjects and 84 percent of the Singapore subjects exhibited relatively high
coefficients for protection against error, improper access, and unauthorized secondary
use of their personal information. By contrast, their coefficients on monetary reward
and visit frequency/time savings were relatively low. We label this group of subjects
as “privacy guardians”—people who attach a relatively high value to information
privacy.
The next largest cluster consisted of subjects who attached a relatively high value to
monetary reward. We call them “information sellers,” as they tend to “sell” personal
information with little regard for convenience (visit frequency/time savings) or Web
site privacy policies.
The smallest cluster comprised subjects who focused exclusively on convenience
(operationalized by visit frequency/time savings).22 In fact, their coefficients for visit
frequency/time savings were so high that their preferences over alternative Web sites
could almost be predicted by visit frequency/time savings alone. We call these subjects
Average coefficient
8/9/2007 12:48:48 PM
32 HANN, HUI, LEE, AND PNG
“convenience seekers”—people who prefer convenience with little regard for money
or Web site privacy policies.
Across the three clusters, we observe very different attitudes toward benefits and
privacy. The privacy guardians prefer protection, but they still value monetary reward
(the mean coefficient for monetary reward was significantly different from zero). Only
the convenience seekers value convenience; for all other clusters, the coefficients for
visit frequency/time savings were insignificant. Among the three privacy concerns,
only unauthorized secondary use was significant in all three clusters.
Based on opinion surveys, Westin characterized 12 percent of the U.S. population
as being “privacy unconcerned”: “for 5 cents off, they will give you any informa-
tion you want about their family, their lifestyle, their travel plans, and so forth” [68,
p. 16]. Interestingly, we found that 12.5 percent of the U.S. samples were “informa-
tion sellers.” However, our evidence is that information sellers demand a great deal
more than “5 cents off.” This point distinguishes our analysis from opinion surveys:
we can estimate the dollar amount that information sellers must be paid for their
personal information.
Further, our analysis revealed a cluster that Westin [68] did not identify. This cluster
consisted of convenience seekers—people who would “sell” their personal information
for convenience rather than money. Finally, among the remainder of the U.S. popula-
tion, Westin [68] differentiated between “privacy pragmatists” (63 percent) and “privacy
fundamentalists” (25 percent) according to their sensitivities to privacy, whereas our
cluster analysis did not find such a distinction. We did detect some evidence among
the U.S. subjects that the privacy guardians could be further segmented, with each
subsegment placing relatively greater weight on one of the three privacy concerns.
Having identified three clusters, we investigated whether cluster membership de-
pended systematically on particular demographic variables. We first sought system-
atic differences between information sellers and privacy guardians. Among the U.S.
subjects, we found that information sellers had significantly more prior experience
of providing personal information to Web sites than privacy guardians (t = 3.115,
p < 0.01). The information sellers’ greater prior experience was consistent with their
relatively high coefficients for money. However, among the Singapore subjects, there
was no significant difference between information sellers and privacy guardians in
terms of prior experience of providing personal information to Web sites.
We next investigated systematic differences between convenience seekers and
privacy guardians. Among the U.S. subjects, convenience seekers were much more
accepting of cookies than privacy guardians (t = 4.282, p < 0.001). Specifically, the
convenience seekers were less concerned about cookies, and they typically accepted
all cookie manipulations from Web sites without warning. By contrast, the majority
of the privacy guardians requested to be warned about cookies. Many of them even
configured their browsers to reject all cookies. The convenience seekers’ greater
acceptance of cookies was consistent with their relatively high coefficients for visit
frequency/time savings. Among the Singapore subjects, the convenience seekers were
also less concerned about the use of cookies than the privacy guardians (t = 6.954, p <
0.001). This result was consistent with the preferences of the U.S. sample.
Overall, we found some evidence that information sellers had more prior experience
of information provision than privacy guardians, and strong evidence that convenience
seekers were more accepting of cookies than privacy guardians. This latter finding is
particularly noteworthy, because cookies are useful for Web sites to provide personal-
ized and convenient services to consumers and hence should a priori be welcomed by
convenience seekers. The confirmation of this relationship provides face validity and
enhances the confidence in our modeling approach and empirical findings.
Concluding Remarks
IN THIS PAPER, WE ANALYZED STRATEGIES that might mitigate online information pri-
vacy concerns. To that end, we applied the expectancy-based theory of motivation
to define our research questions and hypotheses. Further, we linked the expectancy
theory–based framework to the chosen methodology—the conjoint analysis. We
empirically validated hypotheses based on the expectancy theory–based framework
that stipulates that individuals have positive valences for privacy protection policies,
which increases the motivational score. Similarly, we confirmed the hypotheses that
benefits such as financial rewards or convenience have a positive valence and increase
the motivational score.
One important implication of this research is that organizations may possess means
to actively manage the privacy concerns of Internet users. Our results distinctly show
that privacy policies are valued by users. Hence, organizations can capitalize on this
by stating their privacy policy more prominently. Often-cited benefits of increasing
convenience are increased value offering through personalization [5] and lowering of
frictional costs [29]. In addition, it appears that convenience also has a benefit that has
been overlooked—namely, mitigating privacy concerns. Perhaps the least surprising
result is that financial incentives are also a persuasive means to elicit personal infor-
mation. However, this finding is consistent with anecdotal evidence that has shown
that people are willing to disclose personal information for gifts and catalogs [50],
and even a $100 drawing [38].
Our secondary set of research questions investigated the differences in privacy pref-
erences. By applying cluster analysis to the subjects’ marginal rankings of the various
benefits and concerns (i.e., the valences), we find that our subjects can be categorized
into three distinct segments—privacy guardians, information sellers, and convenience
seekers. The majority of subjects were relatively sensitive to online information privacy
concerns (“privacy guardians”). By contrast, a smaller proportion was relatively willing
to provide personal information in exchange for money (“information sellers”), and
an even smaller proportion was relatively willing to provide personal information in
exchange for convenience (“convenience seekers”). All of the preceding results were
robust in the sense that they held in both the U.S. and Singapore samples.
The immediate implication is that organizations with online presence must dif-
ferentiate their services to serve these distinct segments to best meet the needs of
segments with differing trade-offs among money, convenience, and privacy concerns.
Convenience seekers will be the first to register with a Web site if it simplifies Web
site navigation or enables personalized content. Businesses can exploit this by offering
them the opportunity to provide personal information to customize the Web site and
simplify the shopping experience. Information sellers are distinguished from privacy
guardians by prior experience of information provision. This customer type cannot
be lured to provide personal information by offering them convenience. To the extent
that businesses cannot observe an individual’s prior experience, they must use indi-
rect methods to induce segmentation by self-selection [4, 49, 52]. Businesses could
use monetary rewards to attract information sellers to provide personal information.
Preferably, businesses would seek convenience seekers before enticing information
sellers. By elimination, the individuals who do not respond to either monetary reward
or convenience would be privacy guardians.
Privacy guardians represent the largest group in our study, and businesses do well to
recognize their right to privacy as a necessary cost of doing business. AOL discovered
this the hard way. After releasing 20 million “anonymized” search records of 658,000
users in early August 2006, AOL’s search engine received 18.6 percent fewer queries.
While intended for research purposes, AOL did not take into account that the search
terms often contained personally identifiable information [3]. On the other hand,
Google may have realized the importance of keeping its users’ trust. Google suc-
cessfully fended off Justice Department requests for some of its search data, whereas
other companies (AOL, Microsoft, and Yahoo) complied [48]. Protecting privacy can
provide Google with a competitive advantage over its competitors, while allowing
Google to derive full value out of the search data.
Our findings are subject to a number of limitations that are common to many experi-
mental settings. All of our subjects were undergraduate students. They are younger and
probably more familiar with the Internet and e-commerce than the general population.
Further, they may have had relatively little experience of medical problems, relatively
little travel experience, and had too little wealth to be familiar with investment oppor-
tunities and risks. This might explain why we found no systematic industry differences
in subjects’ preferences. For all of these reasons, it would be important to verify our
findings with a more representative sample of subjects.
We tested our hypotheses using experimental data collected from Singapore and U.S.
subjects, which include students from diverse countries and cultures. Although our
results are remarkably consistent across the two samples, future work could explore
the possible influences of cultural values on individuals’ preferences for privacy and
positive reinforcements. Previously, using Hofstede’s cross-cultural value indices [34],
Milberg et al. [45] find that privacy concern is positively related to power distance,
individualism, and masculinity, and negatively related to uncertainty avoidance. We
do not have a priori information on the cultural values of our subjects. Therefore, it
is infeasible for us to interpret our results in light of cultural differences. It would be
interesting for future research to extend our findings and introduce cultural factors
when studying decisions involving privacy trade-offs.
Further, the reported coefficients are sensitive to the specified attribute levels. For
example, our conjoint stimuli specified only two levels for each privacy concern—no
protection and protection. In reality, however, businesses have more flexibility. For
example, they may state that personal information is currently not used for secondary
purposes, but that such a practice cannot be ruled out in the future. Similarly, rewards
may range from cash or vouchers to lottery drawings. Different reward structures may
imply different estimates for the marginal utility of a US$1 reward. Future research
may attempt to measure the impact of privacy policies and reward structures more
directly.23
Acknowledgments: The authors thank the organizers, Eric Clemons, Rajiv Dewan, and Rob
Kauffman, and the participants of the Twentieth Anniversary Symposium on Competitive Stra-
tegic, Economics, and Information Systems Research, held at the 2007 Hawaii International
Conference on System Sciences, for valuable comments.
NOTES
1. Specifically, the Privacy Act of 1974 prohibits unauthorized disclosures of records and
gives individuals the right to review records about themselves to check whether records have been
disclosed and to request corrections or amendments. See www.usdoj.gov/oip/04_7_1.html.
2. For details of the 1998 Children’s Online Privacy Protection Act, see www.ftc.gov/bcp/conline/
edcams/coppa/index.html, and for the 2003 California Online Privacy Protection Act, see www
.leginfo.ca.gov/cgi-bin/displaycode?section=bpc&group=22001-23000&file=22575-22579.
3. Amazon has subsequently apologized for charging different prices and refunded an aver-
age of $3.10 to each of 6,896 customers who bought a DVD. These consumers paid between 25
to 66 percent more than the lowest available price. While it has been speculated that Amazon
engaged in price discrimination, Amazon claimed that these were “random” tests. See www.
internetnews.com/ec-news/article.php/4_471541 (September 28, 2000).
4. In the context of online marketing, Chellappa and Sin [5] propose a conceptual model
and construct several hypotheses to study Web-based personalization.
5. For an application of the expectancy theory in organizational privacy, see Stone and
Stone [61].
6. The expectancy value approach has been successfully applied in information systems
research surrounding user attitudes and satisfaction. A theoretical assessment is given by Mel-
one [43]. Several empirical studies have applied expectancy theory to study computer usage
[12, 23, 32, 36, 53, 57].
7. For more insights on the potential detriments of unauthorized secondary use in the context
of information exchanges, see Clemons and Hitt [6].
8. Stewart and Segars [60] find that concern for information privacy is well measured by
the four first-order constructs mentioned above. They also investigate and find support for a
general second-order factor regarding information privacy.
9. For instance, it is common for Web sites to offer shopping vouchers or discount coupons to
first-time consumers who register as members; Amazon’s “1-click ordering” facilitates quicker
and easier transactions for customers who have previously provided personal information, such
as delivery address and credit card profile.
10. In the context of privacy in direct mail participation, Milne and Gordon [46] exposed
subjects to a trade-off between compensation, targeting, volume, and permission.
11. The subjects were told during the experiments that if they expected to visit the Web site
daily, their average time saving over the year would be 8 hours and 20 minutes (assuming an
average saving of 2 minutes per transaction, 2 minutes × 5 days a week × 50 weeks = 8 hours
and 20 minutes); if they expected to visit the Web site weekly, the yearly saving would be 1
hour and 40 minutes; and if they expected to visit the Web site monthly, the yearly saving
would be 24 minutes.
12. The monetary rewards were framed in the respective local currencies. At the time of
the experiment, S$1 = 54 U.S. cents. Due to the currency differences, the effective ranges of
monetary rewards differed between the U.S. and Singapore experiments—in U.S. dollars, the
Singapore rewards were equivalent to US$2.70, US$5.40, and US$10.80, respectively.
13. The orthogonal design is a fractional factorial set, which is a sample of the full factorial
set. The advantage of a fractional design is the lower cognitive burden on the participant. A full
factorial design would require a ranking of 72 stimuli, which is an overwhelming task. With
an orthogonal fractional design, the information on interaction effects is lost. In general, this is
accepted practice. According to Louviere [41]: (1) the main effects explain the largest amount
of variance in response data, often 80 percent or more; (2) two-way interactions typically ac-
count for only 3–6 percent of variance; and (3) three-way interactions or higher usually rarely
account for more than 3 percent, typically between 0.5 and 1 percent.
14. We use dummy indicators instead of continuous variables to capture financial incentives
($5, $10, and $20) and convenience (monthly, weekly, and daily) in the regression because it is
possible for consumers to exhibit nonlinear utilities toward these benefit outcomes [20, 31].
15. The advantage of rank ordering is that it is based on a theoretical approach to modeling
decisions called axiomatic conjoint measurement [39, 42, 64]. Based on this theory, rank ordering
can be used to derive estimates of the part-worths for each level of each attribute as originally
discussed by Green and Wind [28]. From a practical point of view, the major advantage is that
one does not have to assume that subjects use rating scales in an equal interval manner. Rather,
one can make the weaker assumption of ordinality. It is easier for respondents to rank order
stimuli rather than to rate them on a rating scale [26].
16. We found no statistically significant difference in part-worths between those who received
course credit and those compensated with US$7. Hence, we pooled both groups into a single
sample.
17. The lowest levels of each of the outcome variables act as experimental “controls” and
hence are excluded when coding the dummy variables.
18. At the time of writing (end-April 2007), the U.S. dollar equivalents were US$3.20,
US$6.59, and US$13.18, respectively.
19. Between the US$20 and US$5 rewards, the US$15 increase raised the ranking by 3.141,
or 0.210 per dollar of reward, which is within the range of 0.181–0.265 calculated using the
other reward differences.
20. In the case of monetary reward and visit frequency/time savings, we used the maximum
part-worths—$20 monetary reward and daily frequency, respectively.
21. We excluded a small number of subjects who could not be classified into any of the three
clusters.
22. While the cluster size in an absolute sense is small, the relative size of the convenience
seeker cluster to the overall U.S. sample (7.69 percent) is similar to relative size of the conve-
nience seeker cluster to the overall Singapore sample (7.88 percent).
23. However, this may require a willingness of the businesses to share the kind of data that
they have promised not to share for secondary use.
REFERENCES
1. Addelman, S. Orthogonal main-effect plans for asymmetrical factorial experiments.
Technometrics, 4, 1 (February 1962), 21–46.
2. Andrews, S., and Shen, A. Public comment on barriers to electronic commerce. Response
to call by U.S. Department of Commerce (65 Federal Register 15898). Electronic Privacy In-
formation Center, U.S. Department of Commerce, Washington, DC, March 17, 2000 (available
at www.epic.org/privacy/internet/Barriers_to_E-commerce.html.
3. Barbaro, M., and Zeller, T., Jr. A face is exposed for AOL searcher 4417749. New York
Times (August 9, 2006) (available at www.freepress.net/news/16973).
4. Bhargava, H.K., and Choudhary, V. One size fits all? Optimality conditions for version-
ing and second-degree price discrimination. Working Paper, Pennsylvania State University,
College Park, March 2002.
5. Chellappa, R., and Sin, R. Personalization versus privacy: New exchange relationships
on the Web. Working Paper, ebizlab, Marshall School of Business, University of Southern
California, Los Angeles, May 2002.
6. Clemons, E.K., and Hitt, L.M. Poaching and the misappropriation of information:
Transaction risks of information exchange. Journal of Management Information Systems, 21,
2 (Fall 2004), 87–107.
7. Cox, D.F., and Rich, S.U. Perceived risk and consumer decision-making: The case of
telephone shopping. Journal of Marketing Research, 1, 4 (November 1964), 32–39.
8. Culnan, M.J. How did they get my name? An exploratory investigation of consumer at-
titudes toward secondary information use. MIS Quarterly, 17, 3 (September 1993), 341–363.
9. Culnan, M.J., and Armstrong, P.K. Information privacy concerns, procedural fairness,
and impersonal trust: An empirical investigation. Organization Science, 10, 1 (January–Febru-
ary 1999), 104–115.
10. Culnan, M.J., and Bies, R.J. Consumer privacy: Balancing economic and justice consid-
erations. Journal of Social Issues, 59, 2 (2003), 323–342.
11. Debreu, G. Topological methods in cardinal utility theory. In S. Karlin, K.J. Arrow, and
P. Suppes (eds.), Mathematical Methods in the Social Sciences. Palo Alto: Stanford University
Press, 1960, pp. 16–26.
12. DeSanctis, G. Expectancy theory as explanation of voluntary use of a decision support
system. Psychological Reports, 52, 1 (1983), 247–260.
13. Donnenwerth, G.V., and Foa, U.G. Effect of resource class on retaliation to injustice in in-
terpersonal exchange. Journal of Personality and Social Psychology, 29, 6 (1974), 785–793.
14. Dowling, G.R., and Staelin, R. A model of perceived risk and intended risk-handling
activity. Journal of Consumer Research, 21, 1 (June 1994), 119–134.
15. Eddy, E.R.; Stone, D.L.; and Stone-Romero, E.F. The effects of information management
policies on reactions to human resource information systems: An integration of privacy and
procedural justice perspectives. Personnel Psychology, 52, 2 (Summer 1999), 335–358.
16. Emerson, R.M. Exchange theory, Part II: Exchange relations and network structures. In J.
Berger, M. Zelditch Jr., and B. Anderson (eds.), Social Theories in Progress. Boston: Houghton
Mifflin, 1972, pp. 58–87.
17. Esrock, S.L., and Ferre, J.P. A dichotomy of privacy: Personal and professional attitudes
of marketers. Business and Society Review, 104, 1 (Spring 1999), 107–120.
18. European Union. Directive on the protection of individuals with regard to the processing
of personal data and on the free movement of such data (95/46/EC). Brussels, 1995.
19. Foa, U.G. Interpersonal and economic resources. Science, 171 (January 29, 1971),
345–351.
20. Friedman, M., and Savage, L.J. The utility analysis of choices involving risk. Journal of
Political Economy, 56, 4 (August 1948), 279–304.
21. Fusilier, M.R., and Hoyer, W.D. Variables affecting perceptions of invasion of privacy in
a personnel selection situation. Journal of Applied Psychology, 65, 5 (1980), 623–626.
22. Goffman, E. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday,
1959.
23. Goodhue, D. Supporting users of corporate data: The effect of is policy choices. Ph.D.
dissertation, Massachusetts Institute of Technology, Cambridge, 1988.
24. Goodwin, C. Privacy: Recognition of a consumer right. Journal of Public Policy and
Marketing, 10, 1 (Spring 1991), 149–166.
25. Green, P.E., and Krieger, A.M. Segmenting markets with conjoint analysis. Journal of
Marketing, 55, 4 (October 1991), 20–31.
26. Green, P.E., and Srinivasan, V. Conjoint analysis in consumer research: Issues and outlook.
Journal of Consumer Research, 5, 2 (1978), 103–123.
27. Green, P.E., and Srinivasan, V. Conjoint analysis in marketing: New developments with
implications for research and practice. Journal of Marketing, 54, 4 (1990), 3–19.
28. Green, P.E., and Wind, Y. New ways to measure consumer judgments. Harvard Business
Review, 53, 4 (July–August 1975), 107–117.
29. Hann, I.H., and Terwiesch, C. Measuring the frictional costs of online transactions:
The case of a name-your-own-price-channel. Management Science, 49, 11 (November 2003),
1563–1579.
30. Hair, J.F.; Tatham, R.L.; Anderson, R.E.; and Black, W.C. Multivariate Data Analysis
with Readings. Englewood Cliffs, NJ: Prentice Hall, 1998.
31. Hartley, R., and Farrell, L. Can expected utility theory explain gambling? American
Economic Review, 92, 2 (June 2002), 613–624.
32. Hill, T.; Smith, N.D.; and Mann, M.F. Role of efficacy expectations in predicting the
decision to use advanced technologies: The case of computers. Journal of Applied Psychology,
72, 2 (1987), 307–313.
33. Hirschman, E.C. People as products: Analysis of a complex marketing exchange. Journal
of Marketing, 51, 1 (January 1987), 98–108.
34. Hofstede, G.H. Cultures and Organizations. Berkshire, UK: McGraw-Hill, 1991.
35. Homans, G.C. Social Behavior: Its Elementary Forms. New York: Harcourt Brace Jo-
vanovich, 1974.
36. Howard, G.S., and Mendelow, A.L. Discretionary use of computers: An empirically
derived explanatory model. Decision Sciences, 22, 2 (1991), 241–265.
37. Jourard, S.M. Some psychological aspects of privacy. Law and Contemporary Problems,
31 (Winter 1966), 307–318.
38. Jupiter Media Metrix. Seventy percent of U.S. consumers worry about online privacy,
but few take protective action. Press Release, June 3, 2002.
39. Krantz, D.H., and Tversky, A. Conjoint measurement analysis of composition rules in
psychology. Psychology Review, 78, 2 (March 1971), 151–169.
40. Laufer, R.S., and Wolfe, M. Privacy as a concept and a social issue: A multidimensional
developmental theory. Journal of Social Issues, 33, 3 (1977), 22–42.
41. Louviere, J.L. Analyzing Decision Making: Metric Conjoint Analysis. Newbury Park,
CA: Sage, 1988.
42. Luce, R.D., and Tukey, J.W. Simultaneous conjoint measurement: A new type of funda-
mental measurement. Journal of Mathematical Psychology, 1, 1 (January 1964), 1–27.
43. Melone, N.P. A theoretical assessment of the user-satisfaction construct in information
systems research. Management Science, 36, 1 (1990), 76–91.
44. Milberg, S.J.; Burke, S.J.; and Smith, H.J. Values, personal information privacy, and
regulatory approaches. Communications of the ACM, 38, 12 (1995), 65–74.
45. Milberg, S.J.; Smith, H.J.; and Burke, S.J. Information privacy: Corporate management
and national regulation. Organization Science, 11, 1 (2000), 35–57.
46. Milne, G.R., and Gordon, M.E. Direct mail privacy–efficiency trade-offs within an implied
social contract. Journal of Public Policy and Marketing, 12, 2 (Fall 1993), 206–215.
47. Mitchell, T., and Beach, L. Expectancy theory, decision theory, and occupational preference
and choice. In M.F. Kapalan and S. Schwartz (eds.), Human Judgment and Decision Processes
in Applied Settings. New York: Academic Press, 1977, pp. 203–226.
48. Mohammed, A. Google refuses demand for search information. Washington Post (Janu-
ary 20, 2006), A1.
49. Moorthy, K.S. Market segmentation, self-selection, and product line design. Marketing
Science, 3, 4 (Fall 1984), 288–307.
50. Oberndorf, S. Registering for success. Catalog Age, 16, 13 (1999), 47–48.
51. Organisation for Economic Cooperation and Development. Guidelines on the protection
of privacy and transborder flows of personal data. Paris, September 23, 1980 (available at www
.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html).
52. Png, I. Managerial Economics. Malden, MA: Blackwell, 2002.
53. Robey, D. User attitudes and management information systems use. Academy of Manage-
ment Journal, 22, 3 (1979), 527–538.
54. Schwartz, J. Giving the Web a memory cost its users privacy. New York Times (September
4, 2001) (available at www.taborcommunications.com/dsstar/01/0911/103486.html).
55. Simmons, D.D. Invasion of privacy and judged benefit of personality-test inquiry. Journal
of General Psychology, 79 (1965), 77–81.
56. Smith, H.J.; Milberg, S.J.; and Burke, S.J. Information privacy: Measuring individuals’
concerns about organizational practices. MIS Quarterly, 20, 2 (June 1996), 167–196.
57. Snead, K.C., and Harrell, A.M. An application of expectancy theory to explain a manager’s
intention to use a decision support system. Decision Sciences, 25, 4 (1994), 499–513.
58. Spiekermann, S.; Grossklags, J.; and Berendt, B. E-privacy in 2nd generation e-commerce:
Privacy preferences vs. actual behavior. In M.P. Wellman and Y. Shoham (eds.), Proceedings of
the Third ACM Conference on Electronic Commerce. New York: ACM Press, pp. 38–47.
59. Stahl, M.J., and Harrell, A.M. Modeling effort decisions with behavioral decision theory:
Toward an individual differences model of expectancy theory. Organizational Behavior and
Human Performance, 27, 3 (1981), 303–325.
60. Stewart, K.A., and Segars, A.S. An empirical examination of the concern for information
privacy instrument. Information Systems Research, 13, 1 (March 2002), 36–49.
61. Stone, E.F., and Stone, D.L. Privacy in organizations: Theoretical issues, research findings,
and protection mechanisms. In K.M. Rowland and G. Ferris (eds.), Research in Personnel and
Human Resources Management, vol. 8. Greenwich, CT: JAI Press, (1990), pp. 349–411.
62. Stone, E.F.; Gueutal, H.G.; Gardner, D.G.; and McClure, S. A field experiment comparing
information-privacy values, beliefs, and attitudes across several types of organizations. Journal
of Applied Psychology, 68, 3 (1983), 459–468.
63. Tolchinsky, P.D.; McCuddy, M.K.; Adams, J.; Ganster, D.C.; Woodman, R.W.; and From-
kin, H.L. Employee perceptions of invasion of privacy: A field simulation experiment. Journal
of Applied Psychology, 66, 3 (1981), 308–313.
64. Tversky, A. A general theory of polynomial conjoint measurement. Journal of Mathemati-
cal Psychology, 4, 1 (February 1967), 1–20.
65. Vriens, M.; Wedel, M.; and Wilms, T. Metric conjoint segmentation methods: A Monte
Carlo comparison. Journal of Marketing Research, 33, 1 (1996), 73–85.
66. Vroom, V.H. Work and Motivation. New York: Wiley, 1964.
67. Westin, A. Privacy and Freedom. New York: Atheneum, 1967.
68. Westin, A. Opinion Surveys: What Consumers Have to Say About Information Privacy.
Testimony before U.S. House of Representatives, Committee on Energy and Commerce, Sub-
committee on Commerce, Trade, and Consumer Protection, Washington, DC, May 8, 2001
(available at http://energycommerce.house.gov/reparchives/107/hearings/05082001Hearing209/
Westin309.htm).
69. Woodman, R.W.; Ganster, D.C.; Adams, J.; McCuddy, M.K.; Tolchinsky, P.D.; and From-
kin, H. A survey of employee perceptions of information privacy in organizations. Academy of
Management Journal, 25, 3 (1982), 647–663.
All of the portals ask members for the following personal information during
registration:
• name
• home address
• phone number
• e-mail address
• credit card information
• household income
• current stock portfolio
• previous stock trading experience
Consider a selection of financial portals that differ in their privacy policies and the
benefits that they possibly provide. For the purpose of this exercise, assume that all
financial portals offer the features that you value. In the following screens, we de-
scribe the various dimensions that you may regard as important when deciding which
financial portal to sign up with.
1. Promotion. For signing up you obtain a discount on commission fees from the
financial portal for your first stock transaction. The financial portal offers a discount
of
• $5
• $10
• $20
2. Time savings. You anticipate to be a repeat visitor of the portal to obtain stock
price information or place stock orders and sign up to save time. You estimate that
you will return to the financial portal either:
• once a day, realizing time savings of 8 hour and 20 minutes per year
• once a week, realizing time savings of 1 hour and 40 minutes per year
• once a month, realizing time savings of 24 minutes per year
3. Secondary use. Regarding the use of your personal information the portal will
state either:
• your information will not be used for any purpose other than facilitating stock
quotations or transactions
• your information may be analyzed for other purposes, such as revealing your
Web usage preferences
4. Error. The financial portal will provide either:
• no option to review your personal information for mistakes
• option to review your personal information and correct mistakes
5. Improper access. Regarding the access to your personal information, the portal
will state either:
• no policy on access to personal information
• access to personal information only by authorized personnel from within the
company, who have been trained in privacy issues
Below you should see a list of 18 choices that are described by various combinations
of the above five attributes.
Sort the following 18 description of financial portals from “most preferred” to “least
preferred” by clicking on a choice and dragging it up or down in the list.