Experience, comfort, and privacy concerns: antecedents of online spending

Deborah F.Spake1, R.Zachary Finney1, MathewJoseph2
1Mitchell College of Business, University of South Alabama, Mobile, Alabama, USA
2Bill Greehey School of Business, St. Mary’s University, San Antonio, Texas, USA

Tóm tắt

PurposeThe purpose of this paper is to examine antecedents of consumer online spending.Design/methodology/approachA sample of 766 college students in the USA completed surveys using intercept interviews on a college campus. The research examines the consumer's level of technological savvy, experience with online shopping, level of confidence that online activities are not monitored, worry about other parties obtaining credit card information, comfort providing personal information online, and concern for online privacy when predicting the amount a consumer will spend online.FindingsThe findings reveal that consumer experience with online shopping and level of comfort with providing personal information online were significant predictors of the amount spent online. Surprisingly, privacy concerns were not a significant factor in online spending.Practical implicationsThe results provide useful information to online marketers and privacy advocates by revealing factors that influence the amount spent by consumers via the internet.Originality/valueThis paper fills an identified gap in the literature on online shopping in that most research to date has either focused on regulatory issues or consumer demographics related to online privacy concerns.

Từ khóa


Tài liệu tham khảo

Ackerman, M.S., Cranor, L.F. and Reagle, J. (1999), “Privacy in e‐commerce: examining user scenarios and privacy preferences”, Proceedings of the First ACM Conference on Electronic Commerce, Denver, CO, USA.

Anderson, J.C. and Gerbing, D.W. (1988), “Structural equation modeling in practice: a review and recommended two‐step approach”, Psychological Bulletin, Vol. 103 No. 3, pp. 411‐23.

Andrade, E.B., Kaltcheva, V. and Weitz, B. (2002), “Self‐disclosure on the web: the impact of privacy policy, reward, and company reputation”, Advances in Consumer Research, Vol. 29, pp. 350‐2.

Anton, A.I., Bertino, E., Li, N. and Yu, T. (2007), “A roadmap for comprehensive online privacy policy management”, Communications ACM, Vol. 50 No. 7, pp. 109‐16.

Ashworth, L. and Free, C. (2006), “Marketing davaveillance and digital privacy: using theories of justice to understand consumers' online privacy concerns”, Journal of Business Ethics, Vol. 67, pp. 107‐23.

BBC News (2007), “Google ranked worst on privacy”, BBC News, available at: http://news.bbc.co.uk/2/hi/technology/6740075.stm (accessed 7 September 2010).

Becker, G.S. (1965), “A theory of the allocation of time”, Economic Journal, Vol. 75, pp. 493‐517.

Beldad, A., de Jong, M. and Steehouder, M. (2010), “How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust”, Computers in Human Behavior, Vol. 26 No. 5, pp. 857‐69.

Benassi, P. (1999), “TRUSTe: an online privacy seal program”, Communications of the ACM, Vol. 42 No. 2, pp. 56‐9.

Bergkvist, L. and Rossiter, J.R. (2007), “The predictive validity of multiple‐item versus single‐item measures of the same constructs”, Journal of Marketing Research, Vol. 44 No. 2, pp. 175‐84.

Bhatnagar, A., Misra, S. and Rao, H.R. (2000), “On risk, convenience, and internet shopping behavior”, Communications of the ACM, Vol. 43 No. 11, pp. 98‐105.

Bramall, C., Schoefer, K. and McKechnie, S. (2004), “The determinants and consequences of consumer trust in e‐retailing: a conceptual framework”, Irish Marketing Review, Vol. 17 Nos 1/2, pp. 13‐22.

Cai, X. and Gantz, W. (2000), “Privacy issues associated with web site for children”, Journal of Broadcasting & Electronic Media, Vol. 44 No. 2, pp. 197‐214.

Cai, X., Gantz, W., Schwartz, N. and Wang, X. (2003), “Children's website adherence to the FTC's online privacy protection rule”, Journal of Applied Communication Research, Vol. 31 No. 4, pp. 346‐62.

Caudill, E.M. and Murphy, P.E. (2000), “Consumer online privacy: legal and ethical issues”, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 7‐19.

Chan‐Olmsted, S.M., Li, J.C.C. and Jung, J. (2005), “The profiling of cable modem broadband consumers: characteristics, perceptions and satisfaction”, Journal of Targeting, Measurement & Analysis for Marketing, Vol. 13 No. 4, pp. 327‐45.

Chen, K. and Rea, A.I. Jr (2004), “Protecting personal information online: survey of user privacy concerns and control techniques”, Journal of Computer Information Systems, Vol. 44 No. 4, pp. 85‐92.

Chen, Y.H. and Barnes, S. (2007), “Initial trust and online buyer behavior”, Industrial Management Data Systems, Vol. 107 No. 1, pp. 21‐36.

Conchar, M.P., Zinkhan, G.M., Peters, C. and Olavarrieta, S. (2004), “An integrated framework for the conceptualization of consumers' perceived‐risk processing”, Journal of the Academy of Marketing Science, Vol. 32 No. 4, pp. 418‐36.

Corritore, C.L., Kracher, B. and Wiedenbeck, S. (2003), “Online trust: concepts, evolving themes, a model”, International Journal of Human‐Computer Studies, Vol. 58 No. 6, pp. 737‐58.

Culnan, M.J. (2000), “Protecting privacy online: is self‐regulation working?”, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 20‐6.

Dinev, T. and Hart, P. (2004), “Internet privacy concerns and their antecedents – measurement validity and a regression model”, Behavior & Information Technology, Vol. 23 No. 6, pp. 413‐23.

Dinev, T. and Hart, P. (2006a), “An extended privacy calculus model for e‐commerce transactions”, Information Systems Research, Vol. 17 No. 1, pp. 61‐80.

Dinev, T. and Hart, P. (2006b), “Internet privacy concerns and social awareness as determinants of intention to transact”, International Journal of Electronic Commerce, Vol. 10 No. 2, pp. 7‐29.

Dommeyer, C.J. and Gross, B.L. (2003), “What consumers know and what they do: an investigation of consumer knowledge, awareness, and use of privacy protection strategies”, Journal of Interactive Marketing, Vol. 17 No. 2, pp. 34‐51.

Duberman, J. and Beaudet, M. (2000), “Privacy perspectives of online searchers: confidentiality with confidence?”, Searcher, Vol. 8 No. 7, pp. 32‐48.

Earp, J.B. and Baumer, D. (2003), “Innovative web use to learn about consumer behavior and online privacy”, Communications ACM, Vol. 46 No. 4, pp. 81‐3.

Earp, J.B., Anton, A.I., Aiman‐Smith, L. and Stufflebeam, W.H. (2005), “Examining internet privacy policies within the context of user privacy values”, IEEE Transactions on Engineering Management, Vol. 52 No. 2, pp. 227‐37.

(The) Economist (2001), “United States: stealing people is wrong”, The Economist, Vol. 358 10 March, pp. 28‐9.

Ettema, J.S. (1984), “Three phases in the creation of information inequities: an empirical assessment of a prototype videotex system”, Journal of Broadcasting, Vol. 28 No. 4, pp. 383‐95.

Federal Trade Commission (2004), “Public workshop: monitoring software on your PC: Spyware, Adware, and Other Software”, 69 Fed. Reg. 8538, available at: www.ftc.gov/os/2004/02/040217spywareworkshopfrn.pdf (accessed 31 August 2010).

Fornell, C. and Larcker, D.F. (1981), “Evaluating structural equation models with observable variables and measurement error”, Journal of Marketing Research, Vol. 18, pp. 39‐50.

Garrie, D.B. and Wong, R. (2007), “The future of consumer web data: a European/US perspective”, International Journal of Law and Information Technology, Vol. 15 No. 2, pp. 129‐52.

Gellman, R. (2008), “Fair information practices: a basic history”, available at: www.bobgellman.com (accessed 1 May 2008).

Goodwin, C. (1991), “Privacy: recognition of a consumer right”, Journal of Public Policy & Marketing, Vol. 10 No. 1, pp. 149‐66.

Google Privacy Center (2009), “Privacy policy”, available at: www.google.com/privacypolicy.html (accessed 7 September 2010).

Ha, S. and Stoel, L. (2009), “Consumer e‐shopping acceptance: antecedents in a technology acceptance model”, Journal of Business Research, Vol. 62 No. 5, pp. 565‐71.

Hahn, K.H. and Kim, J. (2009), “The effect of offline brand trust and perceived internet on online shopping intention in the integrated multi‐channel context”, International Journal of Retail & Distribution Management, Vol. 37 No. 2, pp. 126‐41.

Hannaula, M. and Comegys, C. (2003), Students' Online Buying Behavior – A Comparative Study between Finland and the USA, Research Report 7, e‐Business Research Center, Confidence Tampere University of Technology and University of Tampere, available at: www.ebrc.info/kuvat/eBRC_rr7.pdf (accessed 1 May 2008).

Hoffman, D.L. and Novak, T.P. (1997), “Measuring the flow experience among web users”, Marketing Science and the Internet Mini‐Conference, March, Conference Proceedings, MIT Press, Cambridge, MA.

Hosmer, L.T. (1995), “Trust: the connecting link between organizational theory and philosophical ethics”, Academy of Management Review, Vol. 20 No. 2, pp. 373‐403.

Hu, L. and Bentler, P.M. (1999), “Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives”, Structural Equation Modeling, Vol. 6 No. 1, pp. 1‐55.

Jeffres, L.W. and Atkin, D.J. (1996), “Predicting use of technologies for consumer and communication needs”, Journal of Broadcasting & Electronic Media, Vol. 40 No. 3, pp. 315‐30.

Jones, M.G. (1991), “Privacy: a significant marketing issue for the 1990s”, Journal of Public Policy & Marketing, Vol. 10 No. 1, pp. 133‐48.

Jones, S. (2002), “The internet goes to college: how students are living in the future with today's technology”, Pew Internet and American Life Project, Washington, DC, available at: www.pewinternet.org/pdfs/PIP_College_Report.pdf (accessed 1 May 2008).

Kavak, B. and Demirsoy, C. (2009), “Identification of adopter categories for online banking in Turkey”, Service Industries Journal, Vol. 29 No. 8, pp. 1037‐51.

Kelley, C., Delhagen, K. and Yuen, E.H. (2003), “Online credit card security confidence erodes”, Forrester Research, available at: www.forrester.com/ER/Research/Brief/0,1317,17220,FF.html (accessed 5 September 2010).

Kobsa, A. (2007), “Privacy‐enhanced personalization”, Communications ACM, Vol. 50 No. 8, pp. 24‐33.

Kramer, L.C. (2002), “Private eyes are watching you: consumer online privacy protection – lessons from home and abroad”, Texas International Law Journal, Vol. 37 No. 2, pp. 387‐420.

Kumar, N., Scheer, L. and Steenkamp, J. (1995), “The effects of supplier fairness on vulnerable resellers”, Journal of Marketing Research, Vol. 32 No. 1, pp. 54‐65.

Langenderfer, J. and Cook, D.L. (2004), “Oh, what a tangled web we weave: the state of privacy protection in the information economy and recommendations for governance”, Journal of Business Research, Vol. 57 No. 7, pp. 734‐47.

Laroche, M., Bergeron, J. and Goutaland, C. (2001), “A three‐dimensional scale of intangibility”, Journal of Service Research, Vol. 4, pp. 26‐38.

LaRose, R. and Atkin, D.J. (1992), “Audiotext and the re‐invention of the telephone as a mass medium”, Journalism Quarterly, Vol. 69 No. 2, pp. 413‐21.

LaRose, R. and Rifon, N.J. (2007), “Promoting i‐safety: effects of privacy warnings and privacy seals on risk assessment and online privacy behavior”, Journal of Consumer Affairs, Vol. 41 No. 1, pp. 127‐49.

Lauer, T. and Deng, X. (2007), “Building online trust through privacy practices”, International Journal of Information Security, Vol. 6 No. 5, pp. 323‐31.

Lymperopoulos, C., Chaniotakis, I.E. and Rigopoulou, I.D. (2010), “Acceptance of detergent‐retail brands: the role of consumer confidence and trust”, International Journal of Retail & Distribution Management, Vol. 38 No. 9, pp. 719‐36.

Lyons, B. and Henderson, K. (2005), “Opinion leadership in a computer‐mediated environment”, Journal of Consumer Behaviour, Vol. 4 No. 5, pp. 319‐29.

Macdonald, E.K. and Uncles, M.D. (2007), “Consumer savvy: conceptualisation and measurement”, Journal of Marketing Management, Vol. 23 Nos 5/6, pp. 497‐517.

Mahmood, M.A., Bagchi, K. and Ford, T.C. (2004), “On‐line shopping behavior: cross‐country empirical research”, International Journal of Electronic Commerce, Vol. 9 No. 1, pp. 9‐30.

Mayer, R.C., Davis, J.H. and Schoorman, F.D. (1995), “An integration model of organizational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709‐34.

Meeks, B.N. (2000), “Being blank in bright waters”, Communications ACM, Vol. 43 No. 10, pp. 13‐15.

Metzger, M.J. and Docter, S. (2003), “Public opinion and policy initiatives for online privacy protection”, Journal of Broadcasting & Electronic Media, Vol. 47 No. 3, pp. 350‐74.

Milne, G.R. and Culnan, M.J. (2002), “Using the content of online privacy notices to inform public policy: a longitudinal analysis of the 1998‐2001 US web surveys”, The Information Society, Vol. 18 No. 5, pp. 345‐59.

Milne, G.R. and Culnan, M.J. (2004), “Strategies for reducing online privacy risks: why consumers read (or don't read) online privacy notices”, Journal of Interactive Marketing, Vol. 18 No. 3, pp. 15‐29.

Milne, G.R., Culnan, M.J. and Greene, H. (2006), “A longitudinal assessment of online privacy notice readability”, Journal of Public Policy & Marketing, Vol. 25 No. 2, pp. 238‐49.

Miyazaki, A.D. and Fernandez, A. (2000), “Internet privacy and security: an examination of retailer disclosures”, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 54‐61.

Miyazaki, A.D. and Krishnamurthy, S. (2002), “Internet seals of approval: effects on online privacy policies and consumer perceptions”, Journal of Consumer Affairs, Vol. 36 No. 1, pp. 28‐49.

Moore, F. (2005), “Preparing for encryption: new threats, legal requirements boost need for encrypted data”, Computer Technology Review, Vol. 25 No. 5, pp. 1‐33.

Morrison, E.W. (1993), “Newcomer information seeking: exploring types, modes, sources, and outcomes”, Academy of Management Journal, Vol. 36 No. 3, pp. 557‐89.

Nam, C., Song, C., Lee, E. and Park, C.I. (2006), “Consumers' privacy concerns and willingness to prove marketing‐related personal information online”, Advances in Consumer Research, Vol. 33, pp. 212‐17.

Nehf, J.P. (2007), “Shopping for privacy on the internet”, Journal of Consumer Affairs, Vol. 41 No. 2, pp. 351‐75.

Noort, G.V., Kerkhof, P. and Fennis, B.M. (2008), “The persuasiveness of online safety cues: the impact of prevention focus compatibility of web content on consumers' risk perceptions, attitudes, and intentions”, Journal of Interactive Marketing, Vol. 22 No. 4, pp. 58‐72.

Olivero, N. and Lunt, P. (2004), “Privacy versus willingness to disclose in e‐commerce exchanges: the effect of risk awareness on the relative role of trust and control”, Journal of Economic Psychology, Vol. 25 No. 2, pp. 243‐62.

Palmer, M. (2007), “EU probes Google grip on data”, Financial Times, 24 May, available at: www.ft.com/cms/s/2/dc89ec96‐0a24‐11dc‐93ae‐000b5df10621.html (accessed 7 September 2010).

Pan, Y. and Zinkhan, G.M. (2006), “Exploring the impact of online privacy disclosures on consumer trust”, Journal of Retailing, Vol. 82 No. 4, pp. 331‐8.

Pavlou, P.A., Liang, H. and Xue, Y. (2007), “Understanding and mitigating uncertainty in online exchange relationships: a principal‐agent perspective”, MIS Quarterly, Vol. 31 No. 1, pp. 105‐36.

Phelps, J., Nowak, G. and Ferrell, E. (2000), “Privacy concerns and consumer willingness to provide personal information”, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 27‐41.

Poddar, A., Donthu, N. and Wei, Y. (2009), “Web site customer orientations, web site quality, and purchase intentions: the role of web site personality”, Journal of Business Research, Vol. 62 No. 4, pp. 441‐50.

Pollach, I. (2007), “What's wrong with online privacy policies?”, Communications ACM, Vol. 50 No. 9, pp. 103‐8.

Ranganathan, C. and Ganapathy, S. (2002), “Key dimensions of business‐to‐user web sites”, Information & Management, Vol. 39 No. 1, pp. 457‐65.

Reagan, J. (1987), “Classifying adopters and nonadopters of four technologies using political activity, media use and demographic variables”, Telematics & Informatics, Vol. 4 No. 1, pp. 3‐16.

Reagan, J. (1989), “New technologies and news use: adopters vs nonadopters”, Journalism Quarterly, Vol. 66 No. 4, pp. 871‐5.

Ribbink, D., van Riel, A.C.R., Liljander, V. and Streukens, S. (2004), “Comfort your online customer: quality, trust and loyalty on the internet”, Managing Service Quality, Vol. 14 No. 6, pp. 446‐56.

Roberts, J.A. and Jones, E. (2001), “Money attitudes, credit card use, and compulsive buying among American college students”, Journal of Consumer Affairs, Vol. 35 No. 2, pp. 213‐40.

Rogers, E.M. (1995), Diffusion of Innovations, 4th ed., The Free Press, New York, NY.

Rifon, N.J., LaRose, R. and Choi, S.M. (2005), “Your privacy is sealed: effects of web privacy seals on trust and personal disclosures”, Journal of Consumer Affairs, Vol. 39 No. 2, pp. 339‐62.

Salam, A.F., Rao, H.R. and Pegels, C.C. (2003), “Consumer‐perceived risk in e‐commerce transactions”, Communications of the ACM, Vol. 46 No. 12, pp. 325‐31.

Schwartz, P.M. (2004), “Property, privacy, and personal data”, Harvard Law Review, Vol. 117 No. 7, pp. 2056‐128.

Sheehan, K.B. (2005), “In poor health: an assessment of privacy policies at direct‐to‐consumer web sites”, Journal of Public Policy & Marketing, Vol. 24 No. 2, pp. 273‐83.

Sheehan, K.B. and Hoy, M.G. (2000), “Dimensions of privacy concerns among online consumers”, Journal of Public Policy & Marketing, Vol. 19 No. 1, pp. 62‐73.

Spake, D.F., Beatty, S.E., Brockman, B.K. and Crutchfield, T.N. (2003), “Consumer comfort in service relationships: measurement and importance”, Journal of Service Research, Vol. 5 No. 4, pp. 316‐32.

Steenkamp, J.E. and Baumgartner, H. (1992), “The role of optimum stimulation level in exploratory consumer behavior”, Journal of Consumer Research, Vol. 19 No. 3, pp. 434‐48.

Sweat, J. (2001), “Privacy paradox: customers want control – and coupons”, Informationweek, Vol. 781, pp. 52‐3.

Tam, K.Y. and Ho, S.Y. (2006), “Understanding the impact of web personalization on user information processing and decision outcomes”, MIS Quarterly, Vol. 30 No. 4, pp. 865‐90.

Tang, Z., Hu, Y. and Smith, M.D. (2008), “Gaining trust through online privacy protection: self‐regulation, mandatory standards, or caveat emptor”, Journal of Management Information Systems, Vol. 24 No. 4, pp. 153‐73.

United States Department of the Treasury (2008), “Office of critical infrastructure protection and compliance policy: identity theft resource page”, available at: www.treas.gov (accessed 1 May 2008).

Vassilakis, C., Lepouras, G., Fraser, J., Haston, S. and Georgiadis, P. (2005), “Barriers to electronic service development”, e‐Service Journal, Vol. 4 No. 1, pp. 41‐65.

Viega, J., Kohno, T. and Potter, B. (2001), “Trust (and mistrust) in secure applications”, Communications ACM, Vol. 44 No. 2, pp. 31‐3.

Westin, A.F. (1967), Privacy and Freedom, Atheneum, New York, NY.

Williamson, A.W. (2006), “College students embrace the web”, eMarketer, available at: www.imediaconnection.com/content/8237.asp (accessed 7 September 2010).

Yao, M.Z., Rice, R.E. and Wallis, K. (2007), “Predicting user concerns about online privacy”, Journal of the American Society for Information Science Technology, Vol. 58 No. 5, pp. 710‐22.

Yoo, B. and Donthu, N. (2001), “Developing a scale to measure the perceived quality of an internet shopping site (SITEQUAL)”, Quarterly Journal of Electronic Commerce, Vol. 2 No. 1, pp. 31‐46.

Youn, S. (2005), “Teenagers' perceptions of online privacy and coping behaviors: a risk‐benefit appraisal approach”, Journal of Broadcasting & Electronic Media, Vol. 49 No. 1, pp. 86‐110.

Zuboff, S. and Maxmin, J. (2002), Support Economy, Penguin Books, New York, NY.

Hung, H. and Wong, Y.H. (2009), “Information transparency and digital privacy protection: are they mutually exclusive in provision of e‐services?”, Journal of Services Marketing, Vol. 23 No. 3, pp. 154‐64.

Liao, Z. and Shi, X. (2009), “Consumer perceptions of internet based e‐retailing: an empirical research in Hong Kong”, Journal of Services Marketing, Vol. 23 No. 2, pp. 24‐30.

McGraw, G. and Morrisett, G. (2000), “Attacking malicious code: report to the Infosec research council”, IEEE Software, Vol. 17 No. 5, pp. 33‐41.

Riley, F., Scarpi, D. and Manaresi, A. (2009), “Purchasing services online: a two country generalization of possible influences”, Journal of Services Marketing, Vol. 23 No. 2, pp. 92‐102.