Documente Academic
Documente Profesional
Documente Cultură
Abstract. One of the most important theories to be used and modified subse‐
quently in the IS literature is the privacy calculus theory. This calculus governs
the decision-making process of individuals to predict certain behavioral outcome
like, disclosing personal information, intention to use an e-commerce site, in the
presence of perceived privacy risk and perceived benefits. In this paper, we seek
to analyze the relevancy of privacy calculus theory for certain emerging technol‐
ogies and platforms (i) Bring Your Own Device (BYOD) (ii) Internet Of Things
(IoT). We identify some of the perceived privacy risks and benefits in these
emerging technologies. The insights gained from this study will enable
researchers to further study the behavioral intention of organizations/people to
use these technologies in the presence of privacy risks and benefits.
1 Introduction
Privacy is not highlighted in terms of its physical, legal and behavioural aspects in the
IS discipline. The focus of IS discipline is in on the information aspect of privacy. Often
it is seen individuals indulge in a cost-benefit analysis in terms of whether to disclose
their personal information or not. It has been found that consumers sacrifice a certain
portion of their privacy in lieu of some benefits consisting of financial incentives or
convenience [1]. A growing amount of literature has emphasized on the privacy-related
decision making as a cognitive process by which individuals weigh the (a) anticipated
costs or the risks of disclosing information (b) perceived benefits from disclosing such
information. In this research in progress, we focus on the use of such a “privacy calculus”
in information privacy literature. To the best of our knowledge, this is the first paper in
IS literature which critically examines the academic literature on privacy calculus to
develop a greater understanding on its applicability for emerging technologies. Insights
shared in this study will help academic scholars to appreciate the privacy calculus better
in these emerging fields.
2 Theoretical Background
The term privacy calculus was first used to denote the “calculus of human behav‐
iour” [2]. This calculus governs the decision-making process of individuals to decide
whether to disclose personal information. Privacy calculus acknowledges the contri‐
bution of expectancy theory that proposes that human agents act in ways that maxi‐
mizes the positive outcomes and minimizes the negative results. The principal
components that are connected to the concept of privacy calculus are perceived risk
and perceived benefits. In this section, we briefly discuss the notion of ‘Privacy Risk’
and ‘Privacy Benefits’.
Perceived risk is the fear that the consumer’s private information could be used by
organizations for unfair purposes, like price discrimination or it could be sold to other
third parties who should not have access. It is the subjective evaluation of potential
privacy related losses that could affect a consumer. Privacy risks can be categorized
along five risk dimensions i.e. social, financial, time, psychological and physical [3].
Existing literature shows a significant positive relationship between privacy concerns
and the risk beliefs [4]. These privacy concerns are in turn dependent on the way the
personal information is collected, on the extent of control an individual has over personal
information and on his/her awareness of information practices. There is reasonable
accord among IS scholars that perceived privacy risks have a negative impact on the
intention to disclose personal information [4].
In this section we analyze the applicability of privacy calculus theory in the context of
two emerging trends in Information Technology, (i) BYOD and, (ii) IoT. According to
the industry reports, it is expected that around 78.48 % of organizations in the USA will
have BYOD activity by 2018 [6]. According to International Data Corporation, the
Privacy Calculus Theory and Its Applicability 193
worldwide IoT market is estimated to grow at a CAGR of 16.9 % and touch $1.7 trillion
in 2020 [7]. IoT aids real time decision making and handles challenges with aging
workforce. IoT promises to create billion dollar markets in the form of smart cities, smart
factories, smart supply chains etc.
4 Conclusion
References
1. Hann, I.H., Hui, K.L., Lee, S.Y.T., Png, I.P.: Overcoming online information privacy
concerns: an information-processing theory approach. J. Manage. Inform. Syst. 24, 13–42
(2007)
2. Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional
developmental theory. J. Soc. Issues. 33, 22–42 (1977)
3. Youn, S.: Determinants of online privacy concern and its influence on privacy protection
behaviors among young adolescents. J. Consum. Aff. 43, 389–418 (2009)
4. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC):
the construct, the scale, and a causal model. Inform. Syst. Res. 15, 336–355 (2004)
5. Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS
Quart. 35, 989–1016 (2011)
6. Gandhi, V.: Bring Your Own Device (BYOD)—Key Trends and Considerations. Industry
Report, Frost & Sullivan (2013)
7. Explosive Internet of Things Spending to Reach $1.7 Trillion in 2020, http://
www.gartner.com/newsroom/id/2905717
8. Lebek, B., Degirmenci, K., Breitner, M. H.: Investigating the influence of security, privacy,
and legal concerns on employees’ intention to use BYOD mobile devices. In: 19th Americas
Conference on Information Systems, pp. 1–8. AIS Press, Atlanta (2013)
9. Johnson, N., Joshi, K.: The pathway to enterprise mobile readiness: analysis of perceptions,
pressures, preparedness, and progression. In: 18th Americas Conference on Information
Systems, pp. 1–8. AIS Press, Atlanta (2012)
10. Kowatsch, T., Maass, W.: Critical privacy factors of internet of things services: an empirical
investigation with domain experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds.)
MCIS 2012. LNBIP, vol. 129, pp. 200–211. Springer, Heidelberg (2012)
11. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–
2805 (2010)