Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives
Abstract
:1. Introduction
2. Theoretical Background
2.1. Personal Data, Personal Information, and Privacy
2.2. Privacy Calculus
2.3. Personality Traits
3. Research Model and Hypotheses
3.1. Effects of Personality Traits on Privacy Calculus and Trust
3.2. Effects of Prior Negative Experience on Privacy Concern and Intention
3.3. Effects of Privacy Calculus on Intention to Authorize Personal Information
3.4. Effects of Trust on Intention to Authorize Personal Information
4. Methodology
4.1. Measurement Development
4.2. Sample and Data Collection Procedure
5. Data Analysis
5.1. Common Method Variance
5.2. Reliability and Validity
5.3. Second-Order Factor Model
5.4. Data Analysis and Results
- (1)
- The extroversion of users’ personalities influences their perceived App benefits, with a standardized path coefficient of 0.196 for both and a significant path of influence (t = 4.378, p = 0.000 < 0.01), but extroversion has no effect on users’ privacy concern and trust (t = 0.441, p = 0.659 > 0.05; t = 0.303, p = 0.762 > 0.05). Users with agreeable personalities have standardized path coefficients of 0.244, 0.190, and 0.222 for all three paths, with a 0.01 level of significance (t = 5.402, p = 0.000 < 0.01; t = 3.831, p = 0.000 < 0.01; t = 5.576, p = 0.000 < 0.01). The personality trait of neuroticism increases privacy concern (t = 3.042, p = 0.002 < 0.01) and lessens trust (t = 5.012, p = 0.000 < 0.01), with path coefficients of 0.136 and −0.215, respectively, but has no effect on perceived benefits (t = 0.069, p = 0.945 > 0.05). Conscientiousness has no influence on perceived benefits or trust (t = 1.128, p = 0.260 > 0.05; t = 0.260, p = 0.795 > 0.05), but it does have a positive effect on privacy concern (t = 3.112, p = 0.002 < 0.01), with a path coefficient of 0.128. Benefits, privacy, and trust are not affected among users with an open personality (t = 0.085, p = 0.932 > 0.05; t = 0.551, p = 0.582 > 0.05; t = 0.105, p = 0.917 > 0.05).
- (2)
- The standardized path coefficient of prior negative experience on users’ privacy concern is 0.359, with a 0.01 level of significance (t = 7.856, p = 0.000 < 0.01), indicating that prior negative experience could have a significant positive influence on users’ privacy concern. Correspondingly, the standardized path coefficient of prior negative experience on users’ intention to authorize is −0.109, with a 0.01 level of significance (t = 2.746, p = 0.000 < 0.01), demonstrating that there is a negative relationship between past bad experience and App users’ willingness to authorize their personal information.
- (3)
- The standardized path coefficient values for users’ perceived benefits on trust and willingness to authorize are 0.291 and 0.284, respectively, and both paths show significance at the 0.01 level (t = 7.546, p = 0.000 < 0.01; t = 7.198, p = 0.000 < 0.01), demonstrating that users’ perceived benefits have a significant positive impact. Furthermore, the standardized path coefficient values of users’ privacy concern on their trust and willingness to authorize information are −0.318 and −0.135, respectively, with 0.01 level of significance (t = 8.347, p = 0.000 < 0.01; t = 3.031, p = 0.002 < 0.01), indicating that privacy concern has a significant negative impact on both users’ trust and their authorizing intention. Finally, the standardized path coefficient value of user trust on their desire to authorize is 0.312, with a significance level of 0.01 (t = 6.816, p = 0.000 < 0.01), demonstrating that user trust can have a significant positive influence relationship on users’ willingness to authorize information.
6. Discussion and Implications
6.1. Discussion
6.2. Implications for Theory
6.3. Implications for Providers
7. Limitation and Future Direction
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Authors and Years | Context | Privacy Calculus Related Constructs | Major Findings | ||
---|---|---|---|---|---|
Benefit | Cost | Outcome | |||
Dinev and Hart (2006) [6] | E-commerce | Personal Internet interest | Internet privacy concern | Willingness to provide personal information to transact on the Internet | This research attempts to better understand the cumulative influence of Internet trust and personal Internet interest are important to outweigh privacy concern in the decision to disclose personal information through online transactions. |
Yeh et al. (2018) [46] | E-commerce | Extrinsic rewards | Information privacy concern | Willingness to provide personal information | Information privacy concern did not significantly affect users’ willingness to provide personal information in the privacy calculation mechanism; however, extrinsic rewards directly affected users’ disclosure intention. |
Xu et al. (2011) [105] | location-aware marketing (LAM) | Perceived benefits of information disclosure | Perceived risks of information disclosure | Perceived value of information disclosure | The positive relationship between perceived benefits and perceived value, and the negative relationship between privacy risk and perceived value were found significant in both covert and overt approaches. |
Gutierrez et al. (2019) [23] | Mobile location-based advertising (MLBA) | PersonalizationMonetary rewards | Internet privacy Concern Intrusiveness | Acceptance of MLBA | While internet privacy concerns is a primary determinant of acceptance intentions towards MLBA, but monetary rewards and intrusiveness have a notably stronger impact on it. |
Jiang et al. (2013) [24] | Online social interaction | Social rewards | Privacy concern | Self-disclosure Misrepresentation | Drawing on the privacy calculus perspective, the interesting roles of privacy concerns and social rewards in synchronous online social interactions are developed and validated. |
Zlatolas et al. (2015) [104] | Social Network Sites (SNS) | Privacy value | Privacy concern | Disclosure intention | There is a significant relationship between privacy value/privacy concerns and self-disclosure, and the privacy value is more influential than privacy concern in determining users’ self-disclosure. |
Min and Kim (2015) [84] | Social Network Sites (SNS) | Behavior enticements (identification) (internalization) (compliance) | Privacy concern | Intentions to give personal information Continuous intentions to use SNS | The findings show that privacy concerns severely inhibit people from providing information in SNS, and, besides the subjective social norms, the other two behavior enticements have been proved to promote the disclosure intention and behavior. |
Ma et al. (2021) [106] | Social Network Sites (SNS) | Perceived usefulness Perceived controllability | Perceived severity Perceived intrusion | Self-disclosure intentions | The findings confirmed that individuals’ perceptions of severity and intrusion influenced users’ self-disclosure intentions, and predicting benefit constructs such as perceived usefulness and perceived controllability were found to positively influence self-disclosure intentions. |
Sun (2021) [107] | Social Network Sites (SNS) | Self-expression Life documentation Social rewards | Privacy risks | Intention to disclose | The findings suggest that when users believe that disclosing personal information will meet their needs for social rewards, self-expression, or life documentation, and the privacy risks are low, they will do so. |
Pentina et al. (2016) [29] | Mobile apps | Perceived benefits | Perceived privacy concern | Mobile apps’ use intention Mobile apps’ use | The perceived benefits are partially identified as drivers of a wide range of mobile app adoption and use in both US and China, but the effect of privacy concerns on the adoption is not obvious. |
Wang et al. (2016) [85] | Mobile apps | Perceived benefits | Perceived risks | Intention to disclose via Mobile application | Drawing on the privacy calculus theory, this research proved that the lure of perceived benefits is greater than the loss of perceived costs when users are weighing up whether to disclose their information or not. |
Cho et al. (2018) [108] | Wearable device & service | Perceived value | Perceived privacy concern | Self-disclosure intention | The perceived value had a greater impact than perceived privacy concern on information disclosure, and the perceived privacy concern decreased the perceived value from a wearable device user’s perspective. |
Widjaja et al. (2019) [21] | Cloud storage | Personal interest Perceived usefulness | Privacy concern Privacy risk Security concerns | Willingness to put personal information Trust | Cloud storage users’ willingness to put personal information is highly influenced by trust, perceived costs, and perceived benefits. |
Bui Thanh Khoa (2020) [109] | Mobile banking services | Perceived credibility Information interest Perceived control | Privacy concern Perceived vulnerability | Perceived value | It was found that all the constructs of perceived benefits and perceived costs have a remarkable effect on perceived value in the mobile banking services context. |
Duan and Deng, H. (2021) [110] | Contact tracing apps | Performance expectancy | Perceived privacy risk | Perceived value of information disclosure | The analysis result confirmed that performance expectancy and perceived privacy risks are indirectly significant on the adoption through the influence of perceived value of information disclosure. |
Zhu et al. (2021) [111] | mHealth apps | Perceived benefits | Privacy concern | Disclosure intention | When determining information disclosure, the users’ benefits perception for using mHealth applications is two or three times more influential than their privacy concerns. |
Zhang et al. (2018) [9] | Online health communities | Perceived informational support Perceived emotional support | Privacy concern | Disclosure intention | Results indicate that health information privacy concerns, together with informational and emotional support, significantly influence personal health information (PHI) disclosure intention. |
Appendix B
Factor | Item | Wording | |
---|---|---|---|
Extraversion | EXTR1 | I like to be surrounded by friends | |
EXTR2 | I am always happy and energetic | ||
EXTR3 | I am passionate about others | ||
Agreeableness | AGRE1 | I have a tolerant nature | |
AGRE2 | I am courteous and friendly to others | ||
AGRE3 | I like to work with others | ||
Neuroticism | NEUR1 | I am easily anxious | |
NEUR2 | My emotional ups and downs are numerous. | ||
NEUR3 | I am constantly worried that something bad will occur. | ||
Conscientiousness | CONS1 | I am good at developing plans and carrying them out. | |
CONS2 | I am meticulous when it comes to completing tasks | ||
CONS3 | I consider myself disorganized and irresponsible (R) | ||
Openness | OPEN1 | I am curious about new and exciting things | |
OPEN2 | I like to come up with new ideas and new thoughts | ||
OPEN3 | I like to break the rules and experience new things | ||
Perceived benefits | Information source | INF1 | I get information more easily through the mobile app |
INF2 | I get better products and services through the mobile app | ||
INF3 | Mobile apps provide me with the latest information and news | ||
Leisure | LEI1 | I can relax more by using mobile apps | |
LEI2 | Mobile apps can make my daily life more leisurely | ||
LEI3 | Mobile apps enable me to get more entertainment | ||
Social interaction | SOC1 | I can interact with others through the use of mobile apps | |
SOC2 | I can stay connected to the community by using mobile apps | ||
Privacy Concern | PC1 | I am concerned that this app will over-collect my personal information | |
PC2 | I am concerned that the personal information stored in this app could be misused | ||
PC3 | I am concerned that this app will leak my personal information to unauthorized third-party agencies | ||
PC4 | I am concerned that my personal information is at risk due to errors and omissions of data users | ||
Trust | TRU1 | This app is trustworthy in authorizing my personal information. | |
TRU2 | I trust that this app will tell the truth and fulfill promises related to my personal information | ||
TRU3 | I trust that this app will keep my best interests in mind when dealing with personal information | ||
TRU4 | I trust that this app is always honest with users when it comes to using the information that I would provide | ||
Intention to authorize | AI1 | At the right time, I intend to authorize my personal information to the apps’ background | |
AI2 | In the future, I will probably authorize my personal information to the apps’ background | ||
AI3 | In the future, I would like to authorize my personal information to the apps’ background | ||
Prior negative experience | PPIE1 | While utilizing existing mobile apps, I have been the victim of numerous privacy intrusions | |
PPIE2 | Apps have regularly collected enormous amounts of personal information from me | ||
PPIE3 | Apps have regularly used my personal information without my permission |
References
- KPMG. Corporate Data Responsibility, Bridging the Consumer Trust Gap. Available online: https//advisory.kpmg.us/articles/2021/bridging-the-trust-chasm.htm (accessed on 2 August 2021).
- Laufer, R.S.; Wolfe, M. Privacy as a concept and a social issue, A multidimensional developmental theory. J. Soc. Issues 1977, 33, 22–42. [Google Scholar] [CrossRef]
- Stone, E.F.; Stone, D.L. Privacy in organizations, Theoretical issues, research findings, and protection mechanisms. Res. Pers. Hum. Resour. Manag. 1990, 8, 349–411. [Google Scholar]
- Awad, N.F.; Krishnan, M.S. The personalization privacy paradox, an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 2006, 30, 13–28. [Google Scholar] [CrossRef] [Green Version]
- Wottrich, V.M.; van Reijmersdal, E.A.; Smit, E.G. The privacy trade-off for mobile app downloads, The roles of app value, intrusiveness, and privacy concerns. Decis. Support Syst. 2018, 106, 44–52. [Google Scholar] [CrossRef]
- Dinev, T.; Hart, P. An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 2006, 17, 61–80. [Google Scholar] [CrossRef]
- Thompson, N.; Brindley, J. Who are you talking about? Contrasting determinants of online disclosure about self or others. Inf. Technol. People 2020, 34, 999–1017. [Google Scholar] [CrossRef]
- Finck, M.; Pallas, F. They who must not be identified—distinguishing personal from non-personal data under the GDPR. Int. Data Priv. Law 2020, 10, 11–36. [Google Scholar] [CrossRef]
- Hoofnagle, C.J.; van der Sloot, B.; Borgesius, F.Z. The European Union general data protection regulation: What it is and what it means. Inf. Commun. Technol. Law 2019, 28, 65–98. [Google Scholar] [CrossRef]
- Bamberger, K.A.; Mulligan, D.K. Privacy on the Books and on the Ground. Stan. L. Rev. 2010, 63, 247. [Google Scholar]
- Reidenberg, J.R. Privacy in public. U. Miami L. Rev. 2014, 69, 141. [Google Scholar]
- Phelps, J.; Nowak, G.; Ferrell, E. Privacy concerns and consumer willingness to provide
personal information. J. Public Policy Mark. 2000, 19, 27–41. [Google Scholar] [CrossRef] - Wu, K.W.; Huang, S.Y.; Yen, D.C.; Popova, I. The effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 2012, 28, 889–897. [Google Scholar] [CrossRef]
- Norberg, P.A.; Horne, D.R.; Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consum. Aff. 2007, 41, 100–126. [Google Scholar] [CrossRef]
- Montes, R.; Sand-Zantman, W.; Valletti, T. The value of personal information in online markets with endogenous privacy. Manag. Sci. 2019, 65, 1342–1362. [Google Scholar] [CrossRef] [Green Version]
- Hann, I.H.; Hui, K.L.; Lee, S.Y.T.; Png, I.P. Overcoming online information privacy concerns: An information-processing theory approach. J. Manag. Inf. Syst. 2007, 24, 13–42. [Google Scholar] [CrossRef]
- Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet users’ information privacy concerns (IUIPC), The construct, the scale, and a causal model. Inf. Syst. Res. 2004, 15, 336–355. [Google Scholar] [CrossRef] [Green Version]
- Westin, A. Privacy and freedom. Wash. Lee Law Rev. 1968, 32, 321–322. [Google Scholar]
- Wheeless, L.R.; Grotz, J. Conceptualization and measurement of reported self-disclosure. Hum. Commun. Res. 1976, 2, 338–346. [Google Scholar] [CrossRef]
- Davies, S.G. Re-Engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity. In Technology and Privacy; MIT Press: Cambridge, MA, USA, 1997; pp. 143–165. [Google Scholar]
- Widjaja, A.E.; Chen, J.V.; Sukoco, B.M.; Ha, Q.A. Understanding Users’ Willingness to Put Their Personal Information on the Personal Cloud-Based Storage applications, An Empirical Study. Comput. Hum. Behav. 2019, 91, 167–185. [Google Scholar] [CrossRef]
- Zhang, X.; Liu, S.; Chen, X.; Wang, L.; Gao, B.; Zhu, Q. Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Inf. Manag. 2018, 55, 482–493. [Google Scholar] [CrossRef]
- Gutierrez, A.; O’Leary, S.; Rana, N.P.; Dwivedi, Y.K.; Calle, T. Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising, Identifying intrusiveness as the critical risk factor. Comput. Hum. Behav. 2019, 95, 295–306. [Google Scholar] [CrossRef] [Green Version]
- Jiang, Z.; Heng, C.S.; Choi, B.C.F. Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions. Inf. Syst. Res. 2013, 24, 579–595. [Google Scholar] [CrossRef] [Green Version]
- Klopfer, P.H.; Rubenstein, D.L. The concept privacy and its biological basis. J. Soc. Issues 1977, 33, 52–65. [Google Scholar] [CrossRef]
- Li, H.; Sarathy, R.; Xu, H. Understanding situational online information disclosure as a privacy calculus. J. Comput. Inf. Syst. 2010, 51, 62–71. [Google Scholar]
- Wang, L.; Yan, J.; Lin, J.; Cui, W. Let the users tell the truth, Self-disclosure intention and self-disclosure honesty in mobile social networking. Int. J. Inf. Manag. 2017, 37, 1428–1440. [Google Scholar] [CrossRef] [Green Version]
- Wang, L.; Hu, H.H.; Yan, J.; Mei, M.Q. Privacy calculus or heuristic cues? The dual process of privacy decision making on Chinese social media. J. Enterp. Inf. Manag. 2019, 33, 265–284. [Google Scholar] [CrossRef]
- Pentina, I.; Zhang, L.; Bata, H.; Chen, Y. Exploring privacy paradox in information-sensitive mobile app adoption, A cross-cultural comparison. Comput. Hum. Behav. 2016, 65, 409–419. [Google Scholar] [CrossRef]
- Homans, G.C. Social behavior as exchange. Am. J. Sociol. 1958, 63, 597–606. [Google Scholar] [CrossRef]
- Premazzi, K.; Castaldo, S.; Grosso, M.; Raman, P.; Brudvig, S.; Hofacker, C.F. Customer information sharing with e-vendors: The roles of incentives and trust. Int. J. Electron. Commer. 2010, 14, 63–91. [Google Scholar] [CrossRef]
- Krasnova, H.; Veltri, N.F.; Günther, O. Self-disclosure and privacy calculus on social networking sites: The role of culture. Bus. Inf. Syst. Eng. 2012, 4, 127–135. [Google Scholar] [CrossRef]
- Pervin, L.A.; John, O.P. Handbook of Personality; Theory and Research: New York, NY, USA, 1990. [Google Scholar]
- Devaraj, S.; Easley, R.F.; Crant, M. How does personality matter? Relating the five-factor model to technology acceptance and use. Inf. Syst. Res. 2008, 19, 93–105. [Google Scholar] [CrossRef]
- Cattell, R.B. Validation and intensification of the sixteen personality factor questionnaire. Read. Clin. Psychol. 1966, 12, 241–254. [Google Scholar]
- Eysenck, H.J.; Eysenck, S. Manual of the Eysenck Personality Questionnaire; University of London Press: London, UK, 1975. [Google Scholar]
- Norman, W.T. Toward an adequate taxonomy of personality attributes, Replicated factor structure in peer nomination personality ratings. J. Abnorm. Soc. Psychol. 1963, 66, 574. [Google Scholar] [CrossRef]
- Goldberg, L. Language and individual differences, The search for universals in personality lexicons. Rev. Personal. Soc. Psychol. 1981, 2, 141–165. [Google Scholar]
- Costa, P.T.; McCrae, R.R. The NEO Personality Inventory; Psychological Assessment Resource: Odessa, FL, USA, 1985. [Google Scholar]
- Junglas, I.A.; Johnson, N.A.; Spitzmüller, C. Personality traits and concern for privacy, an empirical study in the context of location-based services. Eur. J. Inf. Syst. 2008, 17, 387–402. [Google Scholar] [CrossRef]
- Deng, S.; Lin, Y.; Liu, Y.; Chen, X.; Li, H. How Do Personality Traits Shape Information-Sharing Behavior in Social Media? Exploring the Mediating Effect of Generalized Trust. Inf. Res. Int. Electron. J. 2017, 22, n3. [Google Scholar]
- Wang, J.L.; Jackson, L.A.; Zhang, D.J.; Su, Z.Q. The relationships among the Big Five Personality factors, self-esteem, narcissism, and sensation-seeking to Chinese University students’ uses of social networking sites (SNSs). Comput. Hum. Behav. 2012, 28, 2313–2319. [Google Scholar] [CrossRef]
- Smith, H.J.; Milberg, S.J.; Burke, S.J. Information privacy, measuring individuals’ concerns about organizational practices. MIS Q. 1996, 20, 167–196. [Google Scholar] [CrossRef]
- Bansal, G.; Zahedi, F.M.; Gefen, D. Do context and personality matter? Trust and privacy concerns in disclosing private information online. Inf. Manag. 2016, 53, 1–21. [Google Scholar] [CrossRef]
- Zhou, T.; Lu, Y. The effects of personality traits on user acceptance of mobile commerce. Intl. J. Hum. Comput. Interact. 2011, 27, 545–561. [Google Scholar] [CrossRef]
- Yeh, C.H.; Wang, Y.S.; Lin, S.J.; Tseng, T.H.; Lin, H.H.; Shih, Y.W.; Lai, Y.H. What drives internet users’ willingness to provide personal information? Online Inf. Rev. 2018, 42, 923–939. [Google Scholar] [CrossRef]
- James, A.; Shaorong, S.; Eugene, A.; Kofi, P.E.; Richmond, O.B. Mobile Banking Adoption, Examining the Role of Personality Traits. Sage Open 2020, 10, 227–247. [Google Scholar]
- Koohikamali, M.; Peak, D.A.; Prybutok, V.R. Beyond self-disclosure: Disclosure of information about others in social network sites. Comput. Hum. Behav. 2017, 69, 29–42. [Google Scholar] [CrossRef]
- Mouakket, S.; Sun, Y. Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China, the Moderating Role of Gender. Inf. Syst. Front. 2019, 22, 1305–1321. [Google Scholar] [CrossRef]
- van der Schyff, K.; Flowerday, S.; Lowry, P.B. Information privacy behavior in the use of Facebook apps, A personality-based vulnerability assessment. Heliyon 2020, 6, e04714. [Google Scholar] [CrossRef]
- Pour, M.J.; Taheri, F. Personality traits and knowledge sharing behavior in social media, mediating role of trust and subjective well-being. Horizon 2019, 27, 98–117. [Google Scholar] [CrossRef]
- Mooradian, T.; Renzl, B.; Matzler, K. Who trusts? Personality, trust and knowledge sharing. Manag. Learn. 2006, 37, 523–540. [Google Scholar] [CrossRef]
- Bawack, R.E.; Wamba, S.F.; Carillo, K.D.A. Exploring the role of personality, trust, and privacy in customer experience performance during voice shopping, Evidence from SEM and fuzzy set qualitative comparative analysis. Int. J. Inf. Manag. 2021, 58, 102309. [Google Scholar] [CrossRef]
- Goldberg, L.R. An alternative “description of personality”, the big-five factor structure. J. Personal. Soc. Psychol. 1990, 59, 1216. [Google Scholar] [CrossRef]
- Ufer, D.; Lin, W.; Ortega, D.L. Personality traits and preferences for specialty coffee, Results from a coffee shop field experiment. Food Res. Int. 2019, 125, 108504.1–108504.9. [Google Scholar] [CrossRef]
- Chen, R. Living a private life in public social networks, An exploration of member self-disclosure. Decis. Support Syst. 2013, 55, 661–668. [Google Scholar] [CrossRef]
- Svendsen, G.B.; Johnsen, J.K.; Almas-Sorensen, L.; Vitterso, J. Personality and technology acceptance, The influence of personality factors on the core constructs of the technology acceptance model. Behav. Inf. Technol. 2013, 32, 323–334. [Google Scholar] [CrossRef]
- Bansal, G.; Zahedi, F.; Gefen, D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis. Support Syst. 2010, 49, 138–150. [Google Scholar] [CrossRef]
- Hin, S. Consumer Personality, Privacy Concerns and Usage of Location-Based Services (LBS). J. Econ. Bus. Manag. 2015, 3, 961. [Google Scholar] [CrossRef] [Green Version]
- Osatuyi, B. Personality traits and information privacy concern on social media platforms. J. Comput. Inf. Syst. 2015, 55, 11–19. [Google Scholar] [CrossRef]
- Walczuch, R.; Lundgren, H. Psychological antecedents of institution-based consumer trust in e-retailing. Inf. Manag. 2004, 42, 159–177. [Google Scholar] [CrossRef] [Green Version]
- Costa, P.T., Jr.; McCrae, R.R.; Dye, D.A. Facet Scales for Agreeableness and Conscientiousness, A Revision of the NEO Personality Inventory. Personal. Individ. Differ. 1991, 12, 887–898. [Google Scholar] [CrossRef]
- Xu, R.; Frey, R.M.; Fleisch, E.; Ilic, A. Understanding the impact of personality traits on mobile app adoption—Insights from a large-scale field study. Comput. Hum. Behav. 2016, 62, 244–256. [Google Scholar] [CrossRef]
- Islam, J.; Rahman, Z.; Hollebeek, L.D. Personality factors as predictors of online consumer engagement, an empirical investigation. Mark. Intell. Plan. 2017, 35, 510–528. [Google Scholar] [CrossRef]
- Korzaan, M.L.; Boswell, K.T. The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 2008, 48, 15–24. [Google Scholar]
- Anastasi, A.; Urbina, S. Psychological Testing, 7th ed.; Prentice Hall Pearson Education: Englewood Cliffs, NJ, USA, 1997. [Google Scholar]
- Judge, T.A.; Bono, J.E.; Ilies, R.; Gerhardt, M.W. Personality and leadership, a qualitative and quantitative review. J. Appl. Psychol. 2002, 87, 765. [Google Scholar] [CrossRef] [PubMed]
- Chauvin, B.; Hermand, D.; Mullet, E. Risk perception and personality facets. Risk Analysis. Int. J. 2007, 27, 171–185. [Google Scholar]
- Uffen, J.; Kaemmerer, N.; Breitner, M.H. Personality traits and cognitive determinants–an empirical investigation of the use of smartphone security measures. J. Inf. Secur. 2013, 4, 203–212. [Google Scholar] [CrossRef] [Green Version]
- McCormac, A.; Zwaans, T.; Parsons, K.; Calic, D.; Butavicius, M.; Pattinson, M. Individual differences and information security awareness. Comput. Hum. Behav. 2017, 69, 151–156. [Google Scholar] [CrossRef]
- Wang, W. How personality affects continuance intention, An empirical investigation of instant messaging. In Proceedings of the 14th Pacific Asia Conference on Information Systems, Taipei, Taiwan, 9–12 July 2010; pp. 9–12, paper 113. [Google Scholar]
- McCrae, R.R.; Costa, P.T. Revised NEO Personality Inventory (NEO-PI-R) and NEO Five-Factor Inventory (NEO-FFI) Professional Manual; Psychological Assessment Resources: Odessa, FL, USA, 1992. [Google Scholar]
- Ross, C.; Orr, E.S.; Sisic, M.; Arseneault, J.M.; Simmering, M.G.; Orr, R.R. Personality and motivations associated with Facebook use. Comput. Hum. Behav. 2009, 25, 578–586. [Google Scholar] [CrossRef] [Green Version]
- Moore, K.; McElroy, J.C. The influence of personality on Facebook usage, wall postings, and regret. Comput. Hum. Behav. 2012, 28, 267–274. [Google Scholar] [CrossRef]
- Pizzi, G.; Scarpi, D. Privacy threats with retail technologies, A consumer perspective. J. Retail. Consum. Serv. 2020, 56, 102160. [Google Scholar] [CrossRef]
- Dinero, J.; Chua, H.N. Predicting personal mobility data disclosure. In Proceedings of the 2018 IEEE Conference on Big Data and Analytics (ICBDA), Seattle, WA, USA, 10–13 December 2018; IEEE: Piscataway, NJ, USA, , 2018; pp. 1–6. [Google Scholar]
- Xu, H. The effects of self-construal and perceived control on privacy concerns. In Proceedings of the 28th Annual International Conference on Information Systems (ICIS 2007), Montreal, QC, Canada, 9–12 December 2007. [Google Scholar]
- Helweg-Larsen, M.; Shepperd, J.A. Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature. Personal. Soc. Psychol. Rev. 2001, 5, 74–95. [Google Scholar] [CrossRef]
- Li, P.; Cho, H.; Goh, Z.H. Unpacking the process of privacy management and self-disclosure from the perspectives of regulatory focus and privacy calculus. Telemat. Inform. 2019, 41, 114–125. [Google Scholar] [CrossRef]
- Ampong, G.O.; Mensah, A.; Adu, A.S.; Addae, J.A.; Omoregie, O.K.; Ofori, K.S. Examining self-disclosure on social networking sites, A flow theory and privacy perspective. Behav. Sci. 2018, 8, 58. [Google Scholar] [CrossRef] [Green Version]
- Metzger, M.J. Communication privacy management in electronic commerce. J. Comput. Mediat. Commun. 2007, 12, 335–361. [Google Scholar] [CrossRef] [Green Version]
- Wakefield, R. The influence of user affect in online information disclosure. J. Strateg. Inf. Syst. 2013, 22, 157–174. [Google Scholar] [CrossRef]
- Liu, Z.; Min, Q.; Zhai, Q.; Smyth, R. Self-disclosure in Chinese micro-blogging, A social exchange theory perspective. Inf. Manag. 2016, 53, 53–63. [Google Scholar] [CrossRef]
- Min, J.; Kim, B. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. J. Assoc. Inf. Sci. Technol. 2015, 66, 839–857. [Google Scholar] [CrossRef]
- Wang, T.; Duong, T.D.; Chen, C.C. Intention to disclose personal information via mobile applications, A privacy calculus perspective. Int. J. Inf. Manag. 2016, 36, 531–542. [Google Scholar] [CrossRef]
- Susanto, A.; Chang, Y.; Ha, Y. Determinants of continuance intention to use the smartphone banking services, An extension to the expectation-confirmation model. Ind. Manag. Data Syst. 2016, 116, 508–525. [Google Scholar] [CrossRef]
- Xu, H.; Gupta, S.; Rosson, M.B.; Carroll, J.M. Measuring mobile users’ concerns for information privacy. In Proceedings of the Thirty Third International Conference on Information Systems, Orlando, FL, USA, 14–16 December 2012. [Google Scholar]
- Xu, H.; Dinev, T.; Smith, J.; Hart, P. Information privacy concerns, Linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 2011, 12, 798–824. [Google Scholar] [CrossRef]
- Van Dyke, T.P.; Midha, V.; Nemati, H. The effect of consumer privacy empowerment on trust and privacy concerns in e-commerce. Electron. Mark. 2007, 17, 68–81. [Google Scholar] [CrossRef]
- McKnight, D.H.; Choudhury, V.; Kacmar, C. Developing and validating trust measures for e-commerce, An integrative typology. Inf. Syst. Res. 2002, 13, 334–359. [Google Scholar] [CrossRef] [Green Version]
- Van Slyke, C.; Shim, J.T.; Johnson, R.; Jiang, J.J. Concern for information privacy and online consumer purchasing. J. Assoc. Inf. Syst. 2006, 7, 1–30. [Google Scholar]
- Luo, X.; Li, H.; Zhang, J.; Shim, J.P. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies, An empirical study of mobile banking services. Decis. Support Syst. 2010, 49, 222–234. [Google Scholar] [CrossRef]
- Davis, J.M.; Mun, Y.Y. User disposition and extent of Web utilization, A trait hierarchy approach. Int. J. Hum. Comput. Stud. 2012, 70, 346–363. [Google Scholar] [CrossRef]
- Bender, P.M.; Chou, C. Practical Issues in Structural Modeling. Sociol. Methods Res. 1987, 16, 78–117. [Google Scholar]
- Hair, J.F.; Risher, J.J.; Sarstedt, M.; Ringle, C.M. When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. 2019, 31, 2–24. [Google Scholar] [CrossRef]
- Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; Podsakoff, N.P. Common method biases in behavioral research, a critical review of the literature and recommended remedies. J. Appl. Psychol. 2003, 88, 879. [Google Scholar] [CrossRef]
- Hair, J.F., Jr.; Black, W.C.; Babin, B.J.; Anderson, R.E. Multivariate Data Analysis, A Global Perspective, 7th ed.; Pearson Education: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
- Fornell, C.; Larcker, D.F. Structural equation models with unobservable variables and measurement error, Algebra and statistics. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Lohmöller, J.B. Latent Variable Path Modeling with Partial Least Squares; Springer Science & Business Media: Heidelberg, Germany, 2013. [Google Scholar]
- Shmueli, G.; Ray, S.; Estrada, J.M.; Chatla, S.B. The elephant in the room, Predictive performance of PLS models. J. Bus. Res. 2016, 69, 4552–4564. [Google Scholar] [CrossRef]
- Hair, J.F.; Ringle, C.M.; Sarstedt, M. PLS-SEM: Indeed a silver bullet. J. Mark. Theory Pract. 2011, 19, 139–152. [Google Scholar] [CrossRef]
- Falk, R.F.; Miller, N.B. A Primer for Soft Modeling; University of Akron Press: Akron, OH, USA, 1992. [Google Scholar]
- Xu, F.; Michael, K.; Chen, X. Factors affecting privacy disclosure on social network sites, an integrated model. Electron. Commer. Res. 2013, 13, 151–168. [Google Scholar] [CrossRef]
- Zlatolas, L.N.; Welzer, T.; Heričko, M.; Hölbl, M. Privacy antecedents for SNS self-disclosure, The case of Facebook. Comput. Hum. Behav. 2015, 45, 158–167. [Google Scholar] [CrossRef]
- Xu, H.; Luo, X.R.; Carroll, J.M.; Rosson, M.B. The personalization privacy paradox, An exploratory study of decision making process for location-aware marketing. Decis. Support Syst. 2011, 51, 42–52. [Google Scholar] [CrossRef]
- Ma, X.; Qin, Y.; Chen, Z.; Cho, H. Perceived ephemerality, privacy calculus, and the privacy settings of an ephemeral social media site. Comput. Hum. Behav. 2021, 124, 106928. [Google Scholar] [CrossRef]
- Sun, Y.; Wang, N.; Shen, X.L. Calculus interdependency, personality contingency, and causal asymmetry, Toward a configurational privacy calculus model of information disclosure. Inf. Manag. 2021, 58, 103556. [Google Scholar] [CrossRef]
- Cho, J.Y.; Ko, D.; Lee, B.G. Strategic approach to privacy calculus of wearable device user regarding information disclosure and continuance intention. KSII Trans. Internet Inf. Syst. (TIIS) 2018, 12, 3356–3374. [Google Scholar]
- Khoa, B.T. The impact of the personal data disclosure’s tradeoff on the trust and attitude loyalty in mobile banking services. J. Promot. Manag. 2020, 4, 1–24. [Google Scholar] [CrossRef]
- Duan, S.X.; Deng, H. Hybrid analysis for understanding contact tracing apps adoption. Ind. Manag. Data Syst. 2021, 121, 1599–1616. [Google Scholar] [CrossRef]
- Zhu, M.; Wu, C.; Huang, S.; Zheng, K.; Young, S.D.; Yan, X.; Yuan, Q. Privacy paradox in mHealth applications, an integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. Telemat. Inform. 2021, 61, 101601. [Google Scholar] [CrossRef]
Authors | Context | Personality Traits | Investigated Constructs | ||
---|---|---|---|---|---|
Perceived Benefits | Privacy Concern | Trust | |||
Pentina et al. [29] | Mobile apps | Big Five Factors | √ | √ | |
Yeh et al. [46] | E-commerce | Big Five Factors | √ | ||
Zhou and Lu [45] | Mobile Commerce | Big Five Factors | √ | √ | |
Agyei et al. [47] | Mobile Banking | Big Five Factors | √ | ||
Bansal et al. [44] | Online Finance/Health/E-commerce | Big Five Factors | √ | √ | |
Koohikamali et al. [48] | Social Network Sites (SNS) | Agreeableness Extraversion | √ | ||
Mouakket and Sun [49] | Social Network Sites (SNS) | Big Five Factors | √ | ||
Schyff et al. [50] | Big Five Factors | √ | |||
Deng et al. [41] | Social Media | Agreeableness Conscientiousness | √ | ||
Pour and Taheri [51] | Knowledge Sharing | Big Five Factors | √ | ||
Mooradian et al. [52] | Knowledge Sharing | Agreeableness | √ | ||
Junglas et al. [40] | Location-based Services | Big Five Factors | √ | ||
Bawack et al. [53] | Voice shopping | Big Five Factors | √ | √ |
Characteristics | Items | Frequency | Percentage |
---|---|---|---|
Gender | Male | 237 | 52.1% |
Female | 218 | 47.9% | |
Age (years) | <20 | 108 | 23.8% |
20~30 | 169 | 37.1% | |
30~45 | 103 | 22.6% | |
>45 | 75 | 16.5% | |
Monthly Profit (RMB) | Less than 3000 | 152 | 33.4% |
3000~4999 | 102 | 22.4% | |
5000~7999 | 114 | 25.1% | |
More than 8000 | 87 | 19.1% | |
Education | Less than high school | 33 | 7.3% |
College or university | 308 | 67.6% | |
Advanced degree | 114 | 25.1% | |
Operating System | Android | 325 | 63.7% |
iPhone OS | 185 | 36.3% | |
Frequency of authorization (times a week) | Less than 5 | 103 | 22.6% |
5~10 | 152 | 33.4% | |
11~20 | 123 | 27% | |
More than 20 | 77 | 17% |
Factor | Item | Standardized Item Loading | CR | Cronbach’s α | AVE | |
---|---|---|---|---|---|---|
Extraversion | EXTR1 | 0.953 | 0.963 | 0.943 | 0.898 | |
EXTR2 | 0.962 | |||||
EXTR3 | 0.927 | |||||
Agreeableness | AGRE1 | 0.971 | 0.969 | 0.952 | 0.913 | |
AGRE2 | 0.955 | |||||
AGRE3 | 0.940 | |||||
Neuroticism | NEUR1 | 0.956 | 0.959 | 0.936 | 0.886 | |
NEUR2 | 0.952 | |||||
NEUR3 | 0.915 | |||||
Conscientiousness | CONS1 | 0.951 | 0.964 | 0.945 | 0.900 | |
CONS2 | 0.962 | |||||
CONS3 | 0.933 | |||||
Openness | OPEN1 | 0.957 | 0.951 | 0.952 | 0.866 | |
OPEN2 | 0.874 | |||||
OPEN3 | 0.958 | |||||
Perceived Benefits | Information source | INF1 | 0.921 | 0.961 | 0.893 | 0.940 |
INF2 | 0.958 | |||||
INF3 | 0.955 | |||||
Leisure | LEI1 | 0.947 | 0.964 | 0.900 | 0.944 | |
LEI2 | 0.946 | |||||
LEI3 | 0.952 | |||||
Social interaction | SOC1 | 0.954 | 0.952 | 0.909 | 0.900 | |
SOC2 | 0.952 | |||||
Privacy Concern | PC1 | 0.939 | 0.967 | 0.955 | 0.880 | |
PC2 | 0.943 | |||||
PC3 | 0.934 | |||||
PC4 | 0.937 | |||||
Trust | TRU1 | 0.941 | 0.967 | 0.954 | 0.880 | |
TRU2 | 0.937 | |||||
TRU3 | 0.933 | |||||
TRU4 | 0.940 | |||||
Intention to authorize | AI1 | 0.943 | 0.960 | 0.938 | 0.889 | |
AI2 | 0.943 | |||||
AI3 | 0.943 | |||||
Prior negative experience | PPIE1 | 0.945 | 0.965 | 0.945 | 0.902 | |
PPIE2 | 0.952 | |||||
PPIE3 | 0.952 |
EXTR | AGRE | NEUR | CONS | OPEN | INF | LEI | SOC | PC | TRU | AI | PNEF | |
EXTR | 0.947 | |||||||||||
AGRE | 0.110 | 0.956 | ||||||||||
NEUR | −0.108 | 0.043 | 0.941 | |||||||||
CONS | 0.079 | −0.040 | −0.090 | 0.949 | ||||||||
OPEN | −0.094 | −0.058 | 0.024 | −0.012 | 0.931 | |||||||
INF | 0.167 | 0.218 | 0.012 | 0.020 | −0.001 | 0.945 | ||||||
LEI | 0.176 | 0.182 | 0.012 | −0.057 | −0.079 | 0.380 | 0.949 | |||||
SOC | 0.165 | 0.235 | −0.046 | −0.095 | 0.034 | 0.405 | 0.444 | 0.953 | ||||
PC | −0.019 | 0.215 | 0.165 | 0.142 | −0.016 | −0.075 | −0.008 | −0.046 | 0.938 | |||
TRU | 0.103 | 0.222 | −0.256 | −0.060 | −0.024 | 0.335 | 0.247 | 0.270 | −0.322 | 0.938 | ||
AI | 0.157 | 0.097 | −0.081 | −0.005 | −0.045 | 0.366 | 0.291 | 0.309 | −0.294 | 0.482 | 0.943 | |
PNEF | −0.045 | 0.078 | 0.084 | 0.099 | −0.091 | −0.086 | −0.053 | −0.068 | 0.396 | −0.209 | −0.253 | 0.949 |
Second-Order Factor | First-Order Factor | CR | AVE | Path Coefficient | R2 |
---|---|---|---|---|---|
Perceived Benefits | Information Source | 0.907 | 0.549 | 0.794 *** (t = 36.503) | 0.630 |
Leisure | 0.803 *** (t = 45.550) | 0.645 | |||
Social Interaction | 0.729 *** (t = 30.806) | 0.532 |
Factor | SSO | SSE | Q2 (=1 − SSE/SSO) | R2 |
---|---|---|---|---|
Perceived Benefits | 3640.000 | 3429.237 | 0.058 | 0.111 |
Privacy Concern | 1820.000 | 478.515 | 0.188 | 0.223 |
Trust | 1820.000 | 1327.706 | 0.270 | 0.312 |
Intention to Authorize | 1365.000 | 965.616 | 0.293 | 0.335 |
Hypotheses | t-Value | Standard Deviation | p-Value | Path Coefficients | Results |
---|---|---|---|---|---|
H1a | 4.378 | 0.045 | 0.000 | 0.196 | Supported |
H1b | 0.441 | 0.038 | 0.659 | −0.017 | Unsupported |
H1c | 0.303 | 0.043 | 0.762 | −0.013 | Unsupported |
H2a | 5.402 | 0.045 | 0.000 | 0.244 | Supported |
H2b | 3.831 | 0.049 | 0.000 | 0.190 | Supported |
H2c | 5.576 | 0.040 | 0.000 | 0.222 | Supported |
H3a | 0.069 | 0.041 | 0.945 | 0.003 | Unsupported |
H3b | 3.042 | 0.045 | 0.002 | 0.136 | Supported |
H3c | 5.012 | 0.043 | 0.000 | −0.215 | Supported |
H4a | 1.128 | 0.048 | 0.260 | −0.054 | Unsupported |
H4b | 3.112 | 0.041 | 0.002 | 0.128 | Supported |
H4c | 0.260 | 0.040 | 0.795 | −0.010 | Unsupported |
H5a | 0.085 | 0.052 | 0.932 | 0.004 | Unsupported |
H5b | 0.551 | 0.044 | 0.582 | 0.025 | Unsupported |
H5c | 0.105 | 0.044 | 0.917 | −0.005 | Unsupported |
H6a | 7.856 | 0.046 | 0.000 | 0.359 | Supported |
H6b | 2.746 | 0.040 | 0.006 | −0.109 | Supported |
H7a | 7.546 | 0.039 | 0.000 | 0.291 | Supported |
H7b | 7.198 | 0.039 | 0.000 | 0.284 | Supported |
H8a | 8.347 | 0.038 | 0.000 | −0.318 | Supported |
H8b | 3.031 | 0.044 | 0.003 | −0.135 | Supported |
H9 | 6.816 | 0.046 | 0.000 | 0.312 | Supported |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tang, J.; Zhang, B.; Xiao, S. Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives. Behav. Sci. 2022, 12, 218. https://doi.org/10.3390/bs12070218
Tang J, Zhang B, Xiao S. Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives. Behavioral Sciences. 2022; 12(7):218. https://doi.org/10.3390/bs12070218
Chicago/Turabian StyleTang, Jie, Bin Zhang, and Shuochen Xiao. 2022. "Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives" Behavioral Sciences 12, no. 7: 218. https://doi.org/10.3390/bs12070218
APA StyleTang, J., Zhang, B., & Xiao, S. (2022). Examining the Intention of Authorization via Apps: Personality Traits and Expanded Privacy Calculus Perspectives. Behavioral Sciences, 12(7), 218. https://doi.org/10.3390/bs12070218