Consumer Privacy Expectations and the Impact on Buying Intentions

Authors

  • Edward L. Linde, II Marist College
  • William S. Brown Marist College
  • John C. Cary Marist College
  • Pamela J. Harper Marist College

DOI:

https://doi.org/10.33423/jmpp.v25i2.7185

Keywords:

management policy, data privacy, privacy preferences, privacy expectations, buying intentions

Abstract

Based on past research and attitudinal theories, this study intends to investigate the effect of attitudes about data privacy protection and disclosure and the perception of corporate data privacy performance on future purchase intention. Additionally, it seeks to understand the relationship between purchase behavior intensity, personal data privacy concerns and privacy expectations (attitude). A total of 271 usable surveys were gathered from United States consumers and analyzed by two multiple linear regression models and correlation analysis. The results show that attitude (data privacy protection and disclosure responsibility) and perceptions about corporate data privacy performance predict purchase intention. Furthermore, past purchase behavior intensity and personal data privacy concerns influence corporate data privacy responsibility attitudes. This study extends the current data privacy literature by understanding how data privacy expectations (attitude) and data privacy performance perceptions impact purchase intent and are influenced by personal data privacy concerns and purchase behavior.

References

Abdul-Muhmin, A.G. (2011). Repeat purchase intentions in online shopping: The role of satisfaction, attitude and online retailers’ performance. Journal of International Consumer Marketing, 23(1), 5–20.

Acquisti, A. (2014). The economics and behavioral economics of privacy. Privacy, Big Data, and the Public Good: Frameworks for Engagement, 1, 76–95.

Acquisti, A., Taylor, C., & Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442–492.

Alexander, B., & Cano, M.B. (2019). Futurizing the physical store in the omnichannel retail environment. In W. Piotrowicz & R. Cuthbertson (Eds.), Exploring Omnichannel Retailing (pp. 1–20). Cham: Springer.

Allen, I.E., & Seaman, C.A. (2007). Likert scales and data analyses. Quality Progress, 40(7), 64–65.

Berezina, K., Cobanoglu, C., Miller, B.L., & Kwansa, F.A. (2012). The impact of information security breach on hotel guest perception of service quality, satisfaction, revisit intentions and word‐of‐mouth. International Journal of Contemporary Hospitality Management, 24(7), 991–1010.

Bernard, E.K., & Makienko, I. (2011). The effects of information privacy and online shopping experience in e-commerce. Academy of Marketing Studies Journal, 15, 97–110.

Bloom, P.N., Milne, G.R., & Adler, R. (1994). Avoiding misuse of new information technologies: Legal and societal considerations. Journal of Marketing, 58(1), 98–110.

Boone, Jr., H.N., & Boone, D.A. (2012). Analyzing Likert data. The Journal of Extension, 50(2), 48–56.

Brown, J.D. (2011). Likert items and scales of measurement. Statistics, 15(1), 10–14.

Carifio, J., & Perla, R.J. (2007). Ten common misunderstandings, misconceptions, persistent myths and urban legends about Likert scales and Likert response formats and their antidotes. Journal of Social Sciences, 3(3), 106–116.

Cassell, J., & Bickmore, T. (2000). External manifestations of trustworthiness in the interface. Communications of the ACM, 43(12), 50–56.

Cheah, J.-H., Lim, X.-J., Ting, H., Liu, Y., & Quach, S. (2022). Are privacy concerns still relevant? Revisiting consumer behaviour in omnichannel retailing. Journal of Retailing and Consumer Services, 65, 102242.

Chellappa, R.K., & Pavlou, P.A. (2002). Perceived information security, financial liability, and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046

Choi, J., & Nazareth, D.L. (2014). Repairing trust in an e-commerce and security context: An agent-based modeling approach. Information Management & Computer Security, 22(5), 490–512.

Choong, P., Hutton, E., Richardson, P.S., & Rinaldo, V. (2017). Protecting the brand: Evaluating the cost of security breach from a marketer’s perspective. Journal of Marketing Development and Competitiveness, 11(1), 59–66.

Cisco. (2024). Data Privacy Benchmark Study.

Clason, D.L., & Dormody, T.J. (1994). Analyzing data measured by individual Likert-type items. Journal of Agricultural Education, 35(4), 31–35.

Creyer, E.H. (1997). The influence of firm behavior on purchase intention: Do consumers really care about business ethics? Journal of Consumer Marketing, 14(6), 421–432.

Dongre, S., Mishra, S., Romanowski, C., & Buddhadev, M. (2019). Quantifying the costs of data breaches. In Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers, 13, (pp. 3–16). Springer International Publishing.

Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., . . . Treinen, M. (2001, March). What makes web sites credible? A report on a large quantitative study. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 61–68).

Grabner-Kräuter, S., & Kaluscha, E.A. (2003). Empirical research in on-line trust: A review and critical assessment. International Journal of Human-Computer Studies, 58(6), 783–812.

Grewal, D., & Roggeveen, A.L. (2020). Understanding retail experiences and customer journey management. Journal of Retailing, 96(1), 3–8.

Hansen, T., & Jensen, J.M. (2009). Shopping orientation and online clothing purchases: The role of gender and purchase situation. European Journal of Marketing, 43(9/10), 1154–1170.

Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47(2), 263–291.

Karwatzki, S., Dytynko, O., Trenz, M., & Veit, D. (2017). Beyond the personalization–privacy paradox: Privacy valuation, transparency features, and service personalization. Journal of Management Information Systems, 34(2), 369–400.

Krafft, M., Kumar, V., Harmeling, C., Singh, S., Zhu, T., Chen, J., . . . Rosa, E. (2021). Insight is power: Understanding the terms of the consumer-firm data exchange. Journal of Retailing, 97(1), 133–149.

Kumar, D.V., & Dange, U. (2012). A study of factors affecting online buying behavior: A conceptual model. Available at SSRN 2285350.

LaRose, R., & Rifon, N.J. (2007). Promoting i‐safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs, 41(1), 127–149.

Li, N., & Zhang, P. (2002). Consumer online shopping attitudes and behavior: An assessment of research. AMCIS 2002 Proceedings, 74.

Lim, Y.J., Osman, A., Salahuddin, S.N., Romle, A.R., & Abdullah, S. (2016). Factors influencing online shopping behavior: The mediating role of purchase intention. Procedia Economics and Finance, 35, 401–410.

Maples, C., & Thales Group. (2022). Consumer Digital Trust Index. Retrieved from https://www.thalesgroup.com/sites/default/files/prezly/documents/04102022_PR_Thales%20Trust%20index_EN.pdf

Marthews, A., & Tucker, C. (2023). What blockchain can and can’t do: Applications to marketing and privacy. International Journal of Research in Marketing, 40(1), 49–53.

Martin, K.D., & Murphy, P.E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45, 135–155.

Mayer, P., Zou, Y., Schaub, F., & Aviv, A.J. (2021). “Now I’m a bit {angry:}” Individuals’ awareness, perception, and responses to data breaches that affected them. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 393–410).

McCole, P., Ramsey, E., & Williams, J. (2010). Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns. Journal of Business Research, 63(9–10), 1018–1024.

McNulty, E. (2007). Boss, I think someone stole our customer data. Harvard Business Review, 85(9), 37.

Nehf, J.P. (2007). Shopping for privacy on the internet. Journal of Consumer Affairs, 41(2), 351–375.

Polonioli, A. (2022). Zero party data between hype and hope. Frontiers in Big Data, 5, 943372. doi:10.3389/fdata.2022.943372

Pomfret, L., Previte, J., & Coote, L. (2020). Beyond concern: Socio-demographic and attitudinal influences on privacy and disclosure choices. Journal of Marketing Management, 36(5–6), 519–549.

Pramanik, R., & Prabhu, S. (2022, March). Analyzing cyber security and data privacy models for decision making among Indian consumers in an e-commerce environment. In 2022 International Conference on Decision Aid Sciences and Applications (DASA) (pp. 735–739). IEEE.

Priyadharshini, A.K., & Mathew, S.K. (2016, September). The impact of individual privacy and personalization on online buying behavior: An experimental study. In 2016 IEEE International Conference on Management of Innovation and Technology (ICMIT) (pp. 150–155). IEEE.

Quach, S., Thaichon, P., Martin, K.D., Weaven, S., & Palmatier, R.W. (2022). Digital technologies: Tensions in privacy and data. J. of the Acad. Mark. Sci., 50, 1299–1323.

Regner, T., & Riener, G. (2017). Privacy Is Precious: On the Attempt of Lifting Anonymity on the Internet to Increase Revenue: Privacy Is Precious. Journal of Economics & Management Strategy.

Sánchez, M., & Urbano, A. (2019). Security in digital markets. Journal of Business Research, 101, 485–491.

Sarathy, R., & Robertson, C.J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46, 111–126.

Schoorman, F.D., Mayer, R.C., & Davis, J.H. (1996). Organizational trust: Philosophical perspectives and conceptual definitions. Academy of Management Review, 21(2), 337–340.

Sharma, N., Oriaku, E.A., & Oriaku, N. (2020). Cost and effects of data breaches, precautions, and disclosure laws. International Journal of Emerging Trends in Social Sciences, 8(1), 33–41.

Shewan, D. (2020, February 25). Ethical marketing: 5 examples of companies with a conscience. Wordstream.

Shim, S., Eastlick, M.A., Lotz, S.L., & Warrington, P. (2001). An online prepurchase intentions model: The role of intention to search. Journal of Retailing, 77(3), 397–416.

Sinanaj, G., & Zafar, H. (2016). Who wins in a data breach? A comparative study on the intangible costs of data breach incidents. Journal of Information Privacy and Security, 12(4), 216–229.

Song, Z., & Cheng, J. (2023). Omnichannel expansion for traditional retailers: Considering consumers’ privacy concerns. Managerial and Decision Economics, 44(7), 3997–4010. https://doi.org/10.1002/mde.3931

Spanos, G., & Angelis, L. (2016). The impact of information security events on the stock market: A systematic literature review. Computers & Security, 58, 216–229.

Tanimura, J.K., & Wehrly, E.W. (2009, October). The market value and reputational effects from lost confidential information. International Journal of Financial Management, 5, 18–35.

Theodori, G.L., & Luloff, A.E. (2000). Urbanization and community attachment in rural areas. Society & Natural Resources, 13(5), 399–420.

Tucker, C.E. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5), 546–562.

Vail, M.W., Earp, J.B., & Anton, A.I. (2008). An empirical study of consumer perceptions and comprehension of web site privacy policies. IEEE Transactions on Engineering Management, 55, 442–454.

Varian, H.R. (1996). Economic issues facing the Internet. Consortium for Research on Telecommunications Policy.

Willits, F.K., Theodori, G.L., & Luloff, A.E. (2016). Another look at Likert scales. Journal of Rural Social Sciences, 31(3), 6.

Wolff, J., & Lehr, W. (2017, March 31). Degrees of ignorance about the costs of data breaches: What policymakers can and can’t do about the lack of good empirical data. SSRN.

Downloads

Published

2024-08-19

How to Cite

Linde, II, E. L., Brown, W. S., Cary, J. C., & Harper, P. J. (2024). Consumer Privacy Expectations and the Impact on Buying Intentions. Journal of Management Policy and Practice, 25(2). https://doi.org/10.33423/jmpp.v25i2.7185

Issue

Section

Articles