Repository logo
  • English
  • Deutsch
Log In
or
  1. Home
  2. HSG CRIS
  3. HSG Publications
  4. Organizational Privacy Orientation - Datenschutzorientierung messbar machen
 
  • Details

Organizational Privacy Orientation - Datenschutzorientierung messbar machen

Journal
Marketing Tag St. Gallen
Type
conference poster
Date Issued
2022-09-09
Author(s)
Gotsch, Mauro Luis  
Research Team
Prof. Dr. Marcus Schögel
Abstract (De)
Immer mehr Unternehmen stehen kommerzielle Datenverarbeitungsmöglichkeiten zur Verfügung. Dementsprechend wird die Demonstration von datenschutzfreundlichen Marketingstrategien zu einem wesentlichen Bestandteil des Wertversprechens eines Unternehmens. Bislang hat jedoch noch keine Studie alle organisatorischen Aspekte operationalisiert, die die Marketingstrategie eines Unternehmens als datenschutzorientiert einstufen könnten. In diesem Beitrag wird daher ein Überblick über eine Reihe von fünf Studien vorgestellt und eine Selbsteinschätzungsskala entwickelt, mit der die Datenschutzorientierung von Unternehmen ganzheitlich gemessen werden könnte. Erste Implikationen werden diskutiert.
Language
German
Keywords
Privacy strategy
information privacy
marketing strategy
scale development
HSG Classification
contribution to scientific community
HSG Profile Area
Global Center for Customer Insight
Publisher
Institut für Marketing und Customer Insight
Publisher place
Universität St. Gallen
Start page
1
End page
1
Pages
1
Event Title
Marketing Tag St. Gallen
Event Location
Weiterbildungszentrum Holzweid
Event Date
09.09.2022
Official URL
https://imc.unisg.ch/
URL
https://www.alexandria.unisg.ch/handle/20.500.14171/108313
Subject(s)

information managemen...

cultural studies

business studies

Division(s)

IMC – Institute for M...

Contact Email Address
mauro.gotsch@unisg.ch
References
Acquisti, A., Brandimarte, L., & Loewen-stein, G. (2020). Secrets and Likes: The Drive for Privacy and the Difficulty of Achieving It in the Digital Age. Journal of Consumer Psychology, 30(4), 736–758. https://doi.org/10.1002/jcpy.1191
Acquisti, A., Komanduri, S., Analytics, C., Leon, P. G., de Mexico, B., Schaub, F., Wang, Y., Wilson, S., Cranor, ; L F, Sadeh, N., Wang, ; Y, Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Sadeh, N., Sleeper, M., Wang, Y., Adjerid, I., … Sleeper, M. (2017). 44 Nudges for Privacy and Security: Un-derstanding and Assisting Users’ Choices Online ACM Reference For-mat. ACM Computing Surveys, 50(3), 1–41. https://doi.org/10.1145/3054926
Acquisti, A., Taylor, C., & Wagman, L. (2016). The Economics of Privacy. Jour-nal of Economic Literature, 54(2), 442–492. https://doi.org/10.1257/jel.54.2.442
Alashoor, T., & Baskerville, R. (2015). The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity. Proceedings of the 22nd Ameri-cas Conference on Information Systems, 1–20.
Alberto Fernandes Sampaio, C., Manuel Hernández-Mogollón, J., & Gouveia Rodrigues, R. (2018). Market Orienta-tion and Hotel Industry: Developing a Measurement Model. International Con-ference on Innovation, Engineering and Entrepreneurship, 1058–1065.
Allen, A. M., & Peloza, J. (2015). Someone to watch over me: The integration of pri-vacy and corporate social responsibility. Business Horizons, 58(6), 635–642. https://doi.org/10.1016/J.BUSHOR.2015.06.007
Amankwa, E., Loock, M., & Kritzinger, E. (2018). Establishing information security policy compliance culture in organiza-tions. Information & Computer Security, 420–436. https://doi.org/10.1108/ICS-09-2017-0063
Anna Clark, L., Watson, D., & Clark, A. (1995). Constructing Validity: Basic Is-sues in Objective Scale Development. Psychological Assessment, 7(3), 309–319.
Assarroudi, A., Heshmati Nabavi, F., Armat, M. R., Ebadi, A., & Vaismoradi, M. (2018). Directed qualitative content analysis: the description and elabora-tion of its underpinning methods and data analysis process. Journal of Research in Nursing, 23(1), 42–55. https://doi.org/10.1177/1744987117741667
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly: Management Information Sys-tems, 30(1), 13–28. https://doi.org/10.2307/25148715
Bamberger, K. A., & Mulligan, D. K. (2010). New Governance, Chief Privacy Offic-ers, and the Corporate Management of Information Privacy in the United States . Law and Policy, 1–32. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1701087
Bandara, R., Fernando, M., & Akter, S. (2017). The Privacy Paradox in the Da-ta-Driven Marketplace: The Role of Knowledge Deficiency and Psychologi-cal Distance. In C. / P. / CENTERIS - In-ternational Conference on ENTERprise Information Systems / ProjMAN - In-ternational Conference on Project MANagement / HCist - International Conference on Health and Social Care Information Systems and Technologies (Ed.), Procedia Computer Science (Vol. 121, pp. 562–567). Elsevier B.V. https://doi.org/10.1016/j.procs.2017.11.074
Barth, S., & de Jong, M. D. T. (2017). The Privacy Paradox - Investigating Dis-crepancies between Expressed Privacy Concerns and Actual Online Behavior - A Systematic Literature Review. Telematics and Informatics, 34, 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
Barth, S., de Jong, M. D. T., Junger, M., Har-tel, P. H., & Roppelt, J. C. (2019). Put-ting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial re-sources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
Baruh, L., & Cemalcilar, Z. (2014). It is more than personal: Development and vali-dation of a multidimensional privacy orientation scale. Personality and Indi-vidual Differences, 70, 165–170. https://doi.org/10.1016/J.PAID.2014.06.042
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. Journal of Communi-cation, 67(1), 26–53. https://doi.org/10.1111/jcom.12276
Bauer, C., & Strauss, C. (2016). Location-based advertising on mobile devices A literature review and analysis. Manage-ment Review Quarterly, 66, 159–194. https://doi.org/10.1007/s11301-015-0118-z
Beke, F. T., Eggers, F., & Verhoef, P. C. (2018). Consumer Informational Priva-cy: Current Knowledge and Research Directions. In Foundations and Trends in Marketing (Vol. 11, Issue 1). https://doi.org/10.1561/1700000057
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of infor-mation privacy research in information systems. In MIS Quarterly: Management Information Systems (Vol. 35, Issue 4, pp. 1017–1041). University of Minnesota. https://doi.org/10.2307/41409971
Bianchini, M., & Michalkova, V. (2019). Data Analytics in SMEs: Trends and Policies. OECD SME and Entrepreneurship Papers, 15, 1–45. https://doi.org/10.1787/1de6c6a7-en
Bleier, A., Goldfarb, A., & Tucker, C. (2020). Consumer privacy and the future of da-ta-based innovation and marketing. In-ternational Journal of Research in Market-ing, 37(3), 466–480. https://doi.org/10.1016/J.IJRESMAR.2020.03.006
Bloemendal, M. ten. (2022). On the advent of environmental, social and governance reporting and its intersection with pri-vacy. Journal of Data Protection & Priva-cy, 5(1), 39–49.
Boerman, S. C., Kruikemeier, S., & Zuider-veen Borgesius, F. J. (2018). Exploring Motivations for Online Privacy Protec-tion Behavior: Insights From Panel Da-ta. Communication Research, 00(0), 1–25. https://doi.org/10.1177/0093650218800915
Bosmans, A. (2006). Scents and Sensibility: When Do (In)Congruent Ambient Scents Influence Product Evaluations? Journal of Marketing, 70, 32–43. http://www.marketingpower.com/jmblog.
Brough, A. R., & Martin, K. D. (2021). Con-sumer Privacy During (and After) the COVID-19 Pandemic. Journal of Public Policy and Marketing, 40(1), 108–110. https://doi.org/10.1177/0743915620929999
Brown, J. D. (2009). Choosing the Right Type of Rotation in PCA and EFA. JALT Testing & Evaluation SIG Newslet-ter, 13(3), 1–6. https://hosted.jalt.org/test/PDF/Brown31.pdf
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2017). Information Security Policy Compliance: An Empirical Study of Ra-tionality-Based Beliefs and Information Security Awareness. In MIS Quarterly (Vol. 34, Issue 3). https://doi.org/10.2307/25750690
Casadesus-Masanell, R., & Hervas-Drane, A. (2015). Competing with privacy. Man-agement Science, 61(1), 229–246. https://doi.org/10.1287/mnsc.2014.2023
Chang, Y., Wong, S. F., Libaque-Saenz, C. F., & Lee, H. (2018). The role of privacy policy on consumers’ perceived priva-cy. Government Information Quarterly, 35(3), 445–459. https://doi.org/10.1016/J.GIQ.2018.04.002
Chellappa, R. K., & Sin, R. G. (2005). Per-sonalization versus Privacy: An Empiri-cal Examination of the Online Consum-er’s Dilemma. Information Technology and Management 2005 6:2, 6(2), 181–202. https://doi.org/10.1007/S10799-005-5879-Y
Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimi-zation, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/10.1016/j.chb.2017.01.003
Cheng, Y., Mei, S., Zhong, W., & Gao, X. (2021). Managing consumer privacy risk: The effects of privacy breach in-surance. Electronic Commerce Research, 1–35. https://doi.org/10.1007/S10660-021-09492-X/FIGURES/4
Child, J. T., Haridakis, P. M., & Petronio, S. (2012). Blogging privacy rule orienta-tions, privacy management, and con-tent deletion practices: The variability of online privacy management activity at different stages of social media use. Computers in Human Behavior, 28(5), 1859–1872. https://doi.org/10.1016/j.chb.2012.05.004
Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy be-havior. Computers in Human Behavior, 81, 42–51. https://doi.org/10.1016/j.chb.2017.12.001
Cisco. (2019). Consumer Privacy Survey - The growing imperative of getting data privacy right. https://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-series-2019-cps.pdf
Coleman, S., Göb, R., Manco, G., Pievatolo, A., Tort-Martorell, X., & Reis, M. S. (2016). How Can SMEs Benefit from Big Data? Challenges and a Path Forward. Quality and Reliability Engineering Inter-national, 32(6), 2151–2164. https://doi.org/10.1002/qre.2008
Dawes, J. (2008). Do data characteristics change according to the number of scale points used? International Journal of Market Research, 50(1), 61–77. https://www.researchgate.net/publication/312458209
de Wolf, R., & Pierson, J. (2014). Who’s my audience again? Understanding audi-ence management strategies for design-ing privacy management technologies. Telematics and Informatics, 31(4), 607–616. https://doi.org/10.1016/j.tele.2013.11.004
Dehghanpouri, H., Soltani, Z., & Rostamza-deh, R. (2020). The impact of trust, pri-vacy and quality of service on the suc-cess of E-CRM: the mediating role of customer satisfaction. Journal of Business & Industrial Marketing, 1–17. https://doi.org/10.1108/JBIM-07-2019-0325
Dienlin, T., & Metzger, M. J. (2016). An Ex-tended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample. Journal of Computer-Mediated Communication, 21(5), 368–383. https://doi.org/10.1111/jcc4.12163
Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
Dinev, T., Xu, H., & Smith, H. J. (2009). In-formation privacy values, beliefs and at-titudes: An empirical analysis of web 2.0 privacy. Proceedings of the 42nd An-nual Hawaii International Conference on System Sciences, HICSS, 1–10. https://doi.org/10.1109/HICSS.2009.255
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2012). Information privacy and corre-lates: an empirical attempt to bridge and distinguish privacy-related con-cepts. European Journal of Information Systems, 22, 295–316. https://doi.org/10.1057/ejis.2012.23
Domingo-Ferrer, J., Farràs, O., Ribes-González, J., & Sánchez, D. (2019). Pri-vacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications, 140–141, 38–60. https://doi.org/10.1016/J.COMCOM.2019.04.011
dos Santos, P. M., & Cirillo, M. Â. (2021). Construction of the average variance extracted index for construct validation in structural equation models with adaptive regressions. Communications in Statistics: Simulation and Computation. https://doi.org/10.1080/03610918.2021.1888122
Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C re-lationships: An integrated model of pri-vacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877–886. https://doi.org/10.1016/j.jbusres.2006.02.006
Ebert, N., & Widmer, M. (2018). Datenschutz in Schweizer Unternehmen 2018. ZHAW Zürcher Hochschule für Angewandte Wissenschaften. https://doi.org/10.21256/ZHAW-4001
Fraj, E., Martínez, E., & Matute, J. (2011). Green marketing strategy and the firm’s performance: the moderating role of environmental culture. Journal of Strategic Marketing, 19(4), 339–355. https://doi.org/10.1080/0965254X.2011.581382
Freudiger, J., Rane, S., Brito, A. E., & Uzun, E. (2014). Privacy Preserving Data Qual-ity Assessment for High-Fidelity Data Sharing. WISCS ’14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 21–29. https://doi.org/10.1145/2663876.2663885
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature inves-tigating privacy attitude and behavior. Computers and Security, 77, 226–261. https://doi.org/10.1016/j.cose.2018.04.002
Gerlach, J. P., Eling, N., Wessels, N., & Buxmann, P. (2019). Flamingos on a slackline: Companies’ challenges of bal-ancing the competing demands of han-dling customer information and priva-cy. Information Systems Journal, 29(2), 548–575. https://doi.org/10.1111/isj.12222
Glorfeld, L. W. (1995). An Improvement on Horn’s Parallel Analysis Methodology for Selecting the Correct Number of Factors to Retain. Educational and Psy-chological Measurement, 55(3), 377–393. https://doi.org/https://doi.org/10.1177/0013164495055003002
Gotsch, M. L., & Schögel, M. (2021). Ad-dressing the privacy paradox on the or-ganizational level: review and future directions. Management Review Quarter-ly 2021, 1–34. https://doi.org/10.1007/S11301-021-00239-4
Graneheim, U. H., & Lundman, B. (2004). Qualitative content analysis in nursing research: Concepts, procedures and measures to achieve trustworthiness. Nurse Education Today, 24(2), 105–112. https://doi.org/10.1016/j.nedt.2003.10.001
Greenaway, K. E., & Chan, Y. E. (2005). Theoretical Explanations for Firms’ In-formation Privacy Behaviors. Journal of the Association for Information Systems, 6(6), 171–198. https://doi.org/10.17705/1jais.00068
Greenaway, K. E., Chan, Y. E., & Crossler, R. E. (2015). Company information pri-vacy orientation: A conceptual frame-work. Information Systems Journal, 25(6), 579–606. https://doi.org/10.1111/isj.12080
Hagger, M. S., Gucciardi, D. F., & Chat-zisarantis, N. L. D. (2017). On nomolog-ical validity and auxiliary assumptions: The importance of simultaneously test-ing effects in social cognitive theories applied to health behavior and some guidelines. Frontiers in Psychology, 8(11), 1–14. https://doi.org/10.3389/FPSYG.2017.01933/FULL
Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. L. (2007). Overcoming Online In-formation Privacy Concerns: An Infor-mation-Processing Theory Approach. Journal of Management Information Sys-tems, 24(2), 13–42. https://doi.org/10.2753/MIS0742-1222240202
Hardesty, D. M., & Bearden, W. O. (2004). The use of expert judges in scale devel-opment. Implications for improving face validity of measures of unobserva-ble constructs. Journal of Business Re-search, 57(2), 98–107. https://doi.org/10.1016/S0148-2963(01)00295-8
Hassan, M. U., Rehmani, M. H., & Chen, J. (2020). Differential Privacy Techniques for Cyber Physical Systems: A Survey. In IEEE Communications Surveys and Tu-torials (Vol. 22, Issue 1, pp. 746–789). In-stitute of Electrical and Electronics En-gineers Inc. https://doi.org/10.1109/COMST.2019.2944748
Hassler, M. (2021). Von Data-Driven zu Peo-ple-Based Marketing (1st ed.). mitp.
Hermalin, B. E., & Katz, M. L. (2006). Priva-cy, property rights and efficiency: The economics of privacy as secrecy. Quant Market Econ, 4, 209–239. https://doi.org/10.1007/s11129-005-9004-7
Homburg, C., Artz, M., Wieseke, J., Hom-burg is Professor of Business Admin-istration, C., Wieseke is Professor of Business Administration, J., Glaser, M., Hahn, A., Haumann, T., Klar-mann, M., Totzek, D., & van Triest, S. (2012). Marketing Performance Measurement Systems: Does Comprehensiveness Re-ally Improve Performance?: Journal of Marketing, 76(3), 56–77. https://doi.org/10.1509/JM.09.0487
Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content anal-ysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687
Huang, H. Y., & Bashir, M. (2020). “Seeking Privacy Makes Me Feel Bad?”: An Ex-ploratory Study Examining Emotional Impact on Use of Privacy-Enhancing Features. Advances in Intelligent Systems and Computing, 1129 AISC, 600–617. https://doi.org/10.1007/978-3-030-39445-5_44
Hui, K., Teo, H. H., & Lee, S.-Y. T. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly, 31(1), 19–33.
Hummel, P., Braun, M., Tretter, M., & Dabrock, P. (2021). Data sovereignty: A review: Big Data & Society, 8(1), 1–17. https://doi.org/10.1177/2053951720982012
Ibdah, D., Lachtar, N., Raparthi, S. M., & Bacha, A. (2021). Why Should i Read the Privacy Policy, i Just Need the Ser-vice’: A Study on Attitudes and Percep-tions Toward Privacy Policies. IEEE Ac-cess, 9, 166465–166487. https://doi.org/10.1109/ACCESS.2021.3130086
Jiang, Z., Suang Heng, C., & F Choi, B. C. (2013). Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions. Information Systems Research, 24(3), 579–595. https://doi.org/10.1287/isre.1120.0441
Johnson, G. A., Shriver, S. K., & Du, S. (2020). Consumer Privacy Choice in Online Advertising: Who Opts Out and at What Cost to Industry? Marketing Science, 39(1), 33–51. https://doi.org/10.1287/mksc.2019.1198
Joshi, A., Kale, S., Chandel, S., & Pal, D. K. (2015). Likert Scale: Explored and Ex-plained. British Journal of Applied Science & Technology, BJAST(4), 397–403. https://doi.org/10.9734/BJAST/2015/14975
Jozani, M., Ayaburi, E., Ko, M., & Choo, K. K. R. (2020). Privacy concerns and ben-efits of engagement with social media-enabled apps: A privacy calculus per-spective. Computers in Human Behavior, 107, 1–15. https://doi.org/10.1016/j.chb.2020.106260
Kayworth, T., Brocato, L., Whitten, D., Kayworth, T. ;, Brocato, L. ;, Kayworth, T., Brocato, L., & Whitten, D. (2005). What is a Chief Privacy Officer? An Analysis Based on Mintzberg’s Taxon-omy of Managerial Roles. Communica-tions of the Association for Information Systems, 16(6), 110–126. https://doi.org/10.17705/1CAIS.01606
Kitkowska, A., Shulman, Y., Martucci, L. A., & Wästlund, E. (2020). Psychological Ef-fects and Their Role in Online Privacy Interactions: A Review. IEEE Access, 8, 21236–21260. https://doi.org/10.1109/ACCESS.2020.2969562
Kitkowska, A., Wästlund, E., Martucci, L. A., Warner, M., & Shulman, Y. (2020). Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. Sixteenth Symposium on Usable Privacy and Security, 437–456.
Kohli, A. K., Jaworski, B. J., & Kumar, A. (1993). MARKOR: A Measure of Mar-ket Orientation. Journal of Marketing Re-search, 30(4), 467. https://doi.org/10.2307/3172691
Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phe-nomenon. Computers and Security, 64(November), 122–134. https://doi.org/10.1016/j.cose.2015.07.002
KPMG. (2021). Corporate Data Responsibility - Bridging the consumer trust gap.
Lanier, C. D., & Saini, A. (2008). Under-standing Consumer Privacy: A Review and Future Directions. Academy of Mar-keting Science Review, 12(1), 1–48.
Li, Y. (2011). Privacy Concerns: Literature Review and an Integrative Framework . Communications of the Association for In-formation Systems, 28(28), 453–496. https://doi.org/10.17705/1CAIS.02828
Li, Z. S., Werner, C., Ernst, N., & Damian, D. (2022). Towards privacy compliance: A design science study in a small or-ganization. Information and Software Technology, 146, 106868. https://doi.org/10.1016/J.INFSOF.2022.106868
Linden, T., Khandelwal, R., Harkous, H., & Fawaz, K. (2020). The Privacy Policy Landscape After the GDPR. Proceedings on Privacy Enhancing Technologies, 1, 47–64. https://doi.org/10.2478/popets-2020-0004
Lobschat, L., Mueller, B., Eggers, F., Brandimarte, L., Diefenbach, S., Kroschke, M., & Wirtz, J. (2021). Cor-porate digital responsibility. Journal of Business Research, 122, 875–888. https://doi.org/10.1016/j.jbusres.2019.10.006
Lupiáñez-Villanueva, F., Boluda, A., Bogli-acino, F., Liva, G., Lechardoy, L., Rodríguez De Las, T., & Ballell, H. (2022). Behavioural study on unfair com-mercial practices in the digital environ-ment: dark patterns and manipulative per-sonalisation.
Mackenzie, S. B., Podsakoff, P. M., & Pod-sakoff, N. P. (2011). Construct Meas-urement and Validation Procedures in MIS and Behavioral Research: Integrat-ing New and Existing Techniques. MIS Quarterly, 35(2), 293–334.
Makri, E. L., & Lambrinoudakis, C. (2015). Privacy principles: Towards a common privacy audit methodology. Internation-al Conference on Trust and Privacy in Dig-ital Business, 9264, 219–234. https://doi.org/10.1007/978-3-319-22906-5_17/FIGURES/2
Malhotra, A., & Malhotra, C. K. (2011). Evaluating Customer Information Breaches as Service Failures: An Event Study Approach. Journal of Service Re-search, 14(1), 44–59. https://doi.org/10.1177/1094670510383409
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Pri-vacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Infor-mation Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
Martin, K. (2018). The penalty for privacy violations: How privacy violations im-pact trust online. Journal of Business Re-search, 82, 103–116. https://doi.org/10.1016/j.jbusres.2017.08.034
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data Privacy: Effects on Cus-tomer and Firm Performance. Journal of Marketing, 81(1), 36–58. https://doi.org/10.1509/jm.15.0497
Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Jour-nal of the Academy of Marketing Science, 45(2), 135–155. https://doi.org/10.1007/s11747-016-0495-4
Maydeu-Olivares, A., & Shi, D. (2017). Effect sizes of model misfit in structural equa-tion models: Standardized residual co-variances and residual correlations. Methodology, 13, 23–30. https://doi.org/10.1027/1614-2241/A000129
Merenda, P. F. (2019). Measurement and Evaluation in Counseling and Devel-opment A Guide to the Proper Use of Factor Analysis in the Conduct and Re-porting of Research: Pitfalls to Avoid. Measurement and Evaluation in Counsel-ing and Development, 30(3), 156–164. https://doi.org/10.1080/07481756.1997.12068936
Milne, G. R., Culnan, M. J., & Greene, H. (2006). A Longitudinal Assessment of Online Privacy Notice Readability. Journal of Public Policy, 25(2), 238–249.
Mohassel, P., & Zhang, Y. (2017). SecureML: A System for Scalable Privacy-Preserving Machine Learning. 2017 IEEE Symposium on Security and Privacy, 19–38. https://doi.org/10.1109/SP.2017.12
Morey, T., & Krajecki, K. (2016). Personalisa-tion, data and trust: The role of brand in a data-driven, personalised, experi-ence economy. Journal of Brand Strategy, 5(2), 178–185.
Morlok, T. (2016). Sharing is (not) caring - The role of external privacy in users’ in-formation disclosure behaviors on so-cial network sites. PACIS, 75–92. http://aisel.aisnet.org/pacis2016/75
Muscatella, D. la. (2020). Data protection officer: Tasks and responsibilities of a key role for the innovation of the rela-tionship between data and data subjects & rights. Data Protection & Privacy, 3(4), 403–417.
Netemayer, W., Bearden, W. O., & Sharma, S. (2003). Scaling procedures: Issues and applications. Sage.
Nissenbaum, H. (2010). Privacy in Context Technology, Policy, and the Integrity of Social Life. In Privacy in Context. Stan-ford University Press.
Nouwens, M., Liccardi, I., Veale, M., Karger, D., & Kagal, L. (2020). Dark Patterns after the GDPR: Scraping Con-sent Pop-ups and Demonstrating their Influence. In Association for Compu-ting Machinery (Ed.), CHI (pp. 1–13). Association for Computing Machinery. https://doi.org/10.1145/3313831.3376321
Oetzel, M. C., & Gonja, T. (2011). The online privacy paradox: A social representa-tions perspective. Conference on Human Factors in Computing Systems - Proceed-ings, 2107–2112. https://doi.org/10.1145/1979742.1979887
Ozdemir, Z. D., Smith, H. J., & Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 6, 642–660. https://doi.org/10.1057/s41303-017-0056-z
Palmatier, R. W., & Martin, K. D. (2019). The Intelligent Marketer’s Guide to Data Pri-vacy. palgrave macmillan.
Papadas, K. K., Avlonitis, G. J., & Carrigan, M. (2017). Green marketing orientation: Conceptualization, scale development and validation. Journal of Business Re-search, 80, 236–246. https://doi.org/10.1016/J.JBUSRES.2017.05.024
Parker, R. B. (1974). A Definition of Privacy. Rutgers Law Review, 27(2), 275–297. https://heinonline.org/HOL/Page?handle=hein.journals/rutlr27&id=283&div=23&collection=journals
Patil, V. H., Singh, S. N., Mishra, S., & Todd Donavan, D. (2008). Efficient theory development and factor retention crite-ria: Abandon the ‘eigenvalue greater than one’ criterion. Journal of Business Research, 61(2), 162–170. https://doi.org/10.1016/J.JBUSRES.2007.05.008
Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and Mitigating Uncer-tainty in Online Exchange Relation-ships: A Principal-Agent Perspective. Source: MIS Quarterly, 31(1), 105–136.
Pelteret, M., & Ophoff, J. (2016). A Review of Information Privacy and Its Im-portance to Consumers and Organiza-tions. Informing Science: The International Journal of an Emerging Transdiscipline, 19. http://www.informingscience.org/Publications/3573
Peterson, R. A. (2000). A Meta-Analysis of Variance Accounted for and Factor Loadings in Exploratory Factor Analy-sis. Marketing Letters, 11(3), 261–275.
Peukert, C., Bechtold, S., Batikas, M., & Kretschmer, T. (2022). Regulatory Spill-overs and Data Governance: Evidence from the GDPR. Marketing Science, 41(4). https://doi.org/10.1287/mksc.2021.1339
Pollach, I. (2011). Online privacy as a corpo-rate social responsibility: an empirical study. Business Ethics: A European Re-view, 20(1), 88–102. https://doi.org/10.1111/J.1467-8608.2010.01611.X
Pötzsch, S., Wolkerstorfer, P., & Graf, C. (2010). Privacy-Awareness Information for Web Forums: Results from an Em-pirical Study. In ACM (Ed.), NordiCHI (pp. 363–372). ACM.
Power, M., & Trope, R. L. (2007). Develop-ing a Culture of Privacy - A Case Study. IEEE Security & Privacy, 58–60. www.ssha.
Prince, C. (2018). Do consumers want to control their personal data? Empirical evidence. International Journal of Human Computer Studies, 110(March 2016), 21–32. https://doi.org/10.1016/j.ijhcs.2017.10.003
Puntoni, S., Reczek, R. W., Giesler, M., & Botti, S. (2020). Consumers and Artifi-cial Intelligence: An Experiential Per-spective: Https://Doi.Org/10.1177/0022242920953847, 85(1), 131–151. https://doi.org/10.1177/0022242920953847
Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: tensions in privacy and data. Journal of the Academy of Mar-keting Science, 1–25. https://doi.org/10.1007/S11747-022-00845-Y/TABLES/4
Raento, M., & Oulasvirta, A. (2008). Design-ing for privacy and self-presentation in social awareness. Personal and Ubiqui-tous Computing, 12(7), 527–542. https://doi.org/10.1007/s00779-008-0200-9
Rapp, J., Hill, R. P., Gaines, J., & Wilson, R. M. (2009). Advertising and Consumer Privacy: Old Practices and New Chal-lenges. Journal of Advertising, 38(4), 51–61. https://doi.org/10.2753/JOA0091-3367380404
Ribeiro-Navarrete, S., Saura, J. R., & Pala-cios-Marqués, D. (2021). Towards a new era of mass data collection: As-sessing pandemic surveillance technol-ogies to preserve user privacy. Techno-logical Forecasting and Social Change, 167, 120681. https://doi.org/10.1016/J.TECHFORE.2021.120681
Riedmann-Streitz, C. (2018). Redefining the Customer Centricity Approach in the Digital Age. International Conference of Design, User Experience, and Usability, 10918 LNCS, 203–222. https://doi.org/10.1007/978-3-319-91797-9_15
Rodiya, K., Paul Singh, A., & Parihar Asst, D. (2013). A Review of Privacy Preserv-ing Data Publishing Technique. Interna-tional Journal of Emerging Research in Management &Technology, 2, 2278–9359.
Salesforce. (2019). State of the connected cus-tomer.
Sarathy, R., & Robertson, C. J. (2003). Stra-tegic and Ethical Considerations in Managing Digital Privacy. Journal of Business Ethics 2003 46:2, 46(2), 111–126. https://doi.org/10.1023/A:1025001627419
Schneider, M. J., Jagpal, S., Gupta, S., Li, S., & Yu, Y. (2017). Protecting customer privacy when marketing with second-party data. International Journal of Re-search in Marketing, 34(3), 593–603. https://doi.org/10.1016/J.IJRESMAR.2017.02.003
Schögel, M., & Gotsch, M. L. (2021). Intelli-gente Automatisierung im Marketing. Wirtschaftsinformatik & Management 2021 13:4, 13(4), 256–265. https://doi.org/10.1365/S35764-021-00352-9
Sen, D., Ozturk, M., & Vayvay, O. (2016). An Overview of Big Data for Growth in SMEs. Procedia - Social and Behavioral Sciences, 235, 159–167. https://doi.org/10.1016/J.SBSPRO.2016.11.011
Shastri, S., Wasserman, M., & Chidam-baram, V. (2019). The Seven Sins of Personal-Data Processing Systems un-der GDPR. 11th USENIX Workshop on Hot Topics in Cloud Computing, 1–7.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, pri-vacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164. https://doi.org/10.1016/J.COMNET.2014.11.008
Smith, H. J., Dinev, T., & Xu, H. (2011). In-formation Privacy Research: An Inter-disciplinary Review. MIS Quarterly, 35(4), 989–1015.
Solove, D. J. (2013). Privacy Self-Management and the Consent Dilem-ma. Harvard Law Review, 126, 1880–1903.
Solove, D. J. (2021). The Myth of the Privacy Paradox. George Washington Law Re-view, 89(1), 1–51.
Son, B. J.-Y., & Kim, S. S. (2008). Internet User’s Information Privacy-Protective Responses: A Taxonomy and Nomolog-ical Model. MIS Quarterly, 32(3), 503–529.
Sundar, S. S., Kim, J., Rosson, M. B., & Mo-lina, M. D. (2020). Online Privacy Heu-ristics that Predict Information Disclo-sure. Conference on Human Factors in Computing Systems - Proceedings, 1–12. https://doi.org/10.1145/3313831.3376854
Taber, K. S. (2018). The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Educa-tion. Research in Science Education, 1273–1296. https://doi.org/10.1007/s11165-016-9602-2
Tahaei, M., Frik, A., & Vaniea, K. (2021). Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges; Privacy Champions in Software Teams: Under-standing Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–15. https://doi.org/10.1145/3411764
Teece, D. J., Pisano, G., & Shuen, A. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533. https://doi.org/10.1002/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z
Teixeira, G. A., da Silva, M. M., & Pereira, R. (2020). The Critical Success Factors of GDPR Implementation : a Systematic Literature Review. Digital Policy, Regu-lation and Governance, 21(4), 402–418. https://doi.org/https://dx.doi.org/10.1108/DPRG-01-2019-0007
Tesfay, W. B., Hofmann, P., Nakamura, T., Kiyomoto, S., & Serna, J. (2018). I Read but Don’t Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR. WWW ’ 18 Compan-ion, 163–166. https://doi.org/10.1145/3184558.3186969
Tsai, J. Y., Egelman, S., Cranor, L., & Ac-quisti, A. (2011). The effect of online privacy information on purchasing be-havior: An experimental study. Infor-mation Systems Research, 22(2), 254–268. https://doi.org/10.1287/isre.1090.0260
Turker, D. (2009). Measuring Corporate So-cial Responsibility: A Scale Develop-ment Study. Journal of Business Ethics, 85, 411–427. https://doi.org/10.1007/s10551-008-9780-6
Vergara-Laurens, I. J., Jaimes, L. G., & Lab-rador, M. A. (2017). Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges. In IEEE In-ternet of Things Journal (Vol. 4, Issue 4, pp. 855–869). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/JIOT.2016.2594205
Vimalkumar, M., Sharma, S. K., Singh, J. B., & Dwivedi, Y. K. (2021). ‘Okay google, what about my privacy?’: User’s priva-cy perceptions and acceptance of voice based digital assistants. Computers in Human Behavior, 120, 106763. https://doi.org/10.1016/J.CHB.2021.106763
Voorhees, C. M., Brady, M. K., Calantone, R., & Ramirez, E. (2016). Discriminant validity testing in marketing: an analy-sis, causes for concern, and proposed remedies. Journal of the Academy of Mar-keting Science, 44(1), 119–134. https://doi.org/10.1007/s11747-015-0455-4
Waldman, A. E. (2020). Cognitive biases, dark patterns, and the “privacy para-dox.” Current Opinion in Psychology, 31(2), 105–109. https://doi.org/10.1016/j.copsyc.2019.08.025
Walsh, G., & Beatty, S. E. (2007). Customer-based corporate reputation of a service firm: Scale development and validation. Journal of the Academy of Marketing Sci-ence, 35(1), 127–143. https://doi.org/10.1007/S11747-007-0015-7/TABLES/7
Wang, H., Lee, M. K. O., & Wang, C. (1998). Consumer Privacy Concerns about In-ternet Marketing. Communications of the ACM, 41(3), 63–70. https://doi.org/10.1145/272287.272299
Watkins, M. W. (2018). Exploratory Factor Analysis: A Guide to Best Practice: Journal of Black Psychology, 44(3), 219–246. https://doi.org/10.1177/0095798418771807
Williams, M., Nurse, J. R. C., & Creese, S. (2016). The perfect storm: The privacy paradox and the Internet-of-things. Pro-ceedings - 2016 11th International Confer-ence on Availability, Reliability and Securi-ty, ARES 2016, 644–652. https://doi.org/10.1109/ARES.2016.25
Wirtz, J., & Lwin, M. O. (2009). Regulatory Focus Theory, Trust, and Privacy Con-cern. Journal of Service Research, 12(2), 190–207. https://doi.org/10.1177/1094670509335772
Wortmann, F., Schäfer, F., Bronner, W., Slama, D., Peylo, C., & Natalia Orope-za. (2022). Establishing Digital Trust - Towards a Strategic Roadmap for Industri-al Companies.
Wu, K. W., Huang, S. Y., Yen, D. C., & Po-pova, I. (2012). The effect of online pri-vacy policy on consumer privacy con-cern and trust. Computers in Human Be-havior, 28(3), 889–897. https://doi.org/10.1016/j.chb.2011.12.008
Yun, H., Lee, G., & Kim, D. J. (2019). A chronological review of empirical re-search on personal information privacy concerns: An analysis of contexts and research constructs. Information and Management, 56(4), 570–601. https://doi.org/10.1016/j.im.2018.10.001
Zuboff, S. (2020). The Age of Surveillance Cap-italism: The Fight for a Human Future at the New Frontier of Power (Reprint). Pub-licAffairs.
Eprints ID
267227
File(s)
Loading...
Thumbnail Image

restricted

Name

Poster_Marketingtag.pdf

Size

675.13 KB

Format

Adobe PDF

Checksum (MD5)

fe824dbd1766ef9edb9d45114076b964

here you can find instructions and news.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback