• Asia-Europe Institute (AEI)
  • pengarah_aei@um.edu.my
  • +603 7967 4645
logo
logo

AEI-Insights: An International Journal of Asia-Europe Relations 
ISSN: 2289-800X, Vol. 9, Issue 1, July 2023
DOI: https://doi.org/10.37353/aei-insights.vol9.issue1.2

ONLINE HEDONIC CONSUMERS’ PRIVACY CONCERNS: A SYSTEMATIC LITERATURE REVIEW

G. M. Shafayet Ullah
Sameer Kumar
Fumitaka Furuoka+

Asia-Europe Institute, University of Malaya, 50603 Kuala Lumpur, Malaysia

+Corresponding author: fumitaka@um.edu.my

Abstract

The purpose of this paper is to provide a comprehensive review of extant literature on online hedonic consumer’s various privacy related issues and in particular- the privacy concern. Further, the authors attempt to identify a gap that can be addressed in future through developing a comprehensive and integrated model on online hedonic consumer behaviour that focuses on their privacy concerns. The authors conducted a systematic literature review of the extant literature on online hedonic consumers, their various privacy related issues and in particular- the privacy concern. This paper, through its thorough literature review, made a clear distinction among privacy related issues that the online consumers face, namely privacy awareness. The discussion on “privacy concern” elucidated any confusions held by the researchers and readers. This review offered an insight into the current status of research in this field and recognized the factor “privacy concern” as a gap in the existing model on online hedonic consumer behaviour that could be properly explored in further scholarly empirical research. Exclusion of non-English language articles and lack of inclusion of different kinds of hedonic products or services other than SNSs were the limitation of this paper. Managers and e-commerce vendors could utilize the findings of this review to address their hedonic consumer’s privacy concern for the growth of their online businesses. This paper lays the groundwork to explore hedonic consumer’s privacy concern in detail. A new integrated model on online hedonic consumer behaviour is proposed, which provides a theoretical framework for researchers to further examine the mediation effect of privacy concern.

Keywords: Hedonic-Motivation System (HMS), Hedonic-Motivation System Adoption Model (HMSAM), hedonic consumers, hedonic consumption, privacy concerns, literature review

Introduction

Hedonic products and services, their consumers and the associated consumer behaviours occupy interesting positions in academia. The growth in the hedonic products and services consumption as well as their relevant business have been reported by scholars (Brown & Venkatesh, 2005; C.-L. Hsu & Lu, 2007) and predicted by the mainstream media (Entertainment Software Association, 2007; Newzoo B.V., 2017, April 20). The Covid-19 pandemic and large number of people staying indoors worldwide as a consequence resulted in a surge in the consumption of hedonic products and services. Yet, this avenue is largely unexplored through scholarly research. The progress of “mobile computing”, “social networking”, “computer gaming”, etc. i.e., kinds of hedonic products and services signals that an economic and social revolution in technology usage is inevitable. As evident by various business indicators i.e., increased sales figures (Entertainment Software Association, 2019), and mainstream interest (MarketWatch, 2020) in the category of hedonic products and services, this phenomenon is too big to ignore and academicians must have a closer look into this without delay. Therefore, “Hedonic-Motivation Systems” or “HMSs”, their usage, adoption as well a key factor influencing its users- are the focal point of this study.  

Several researchers (Janda, Trocchia, & Gwinner, 2002; Novak, Hoffman, & Yung, 2000; Wolfinbarger & Gilly, 2003) include “security” and “privacy”, among the key aspects of a retail experience. “Security” and “privacy” related problems during online shopping might result in consumer’s negative evaluation, comments and subsequent distrust in respective online stores and their offerings (Miyazaki & Fernandez, 2001). Researchers (Chen, Beaudoin, & Hong, 2017) suggest that “privacy” is an integral part in consumers’ decision-making process. Scholars (Suki & Suki, 2007) mention that from the customers’ perspective, “privacy concerns” in online shopping surpass those in physical stores. “Privacy concern” is also associated with “perceived risk” (Glover & Benbasat, 2010), “attitude toward online buying” (Teo & Liu, 2007) and “online purchase behaviour” (H. Li, Sarathy, & Xu, 2011; Liao, Liu, & Chen, 2011). Online privacy issues includes “spam emails”, “usage tracking”, “sensitive personal data collection”, “sharing of information with third parties” etc., as described by Wang, Lee, and Wang (1998). “Privacy concerns” differ because of personal variances i.e., “educational background”, “culture”, “demographic background” etc. (C.-w. Hsu, 2006; Peslak, 2006). 

This study aims to review extant literature on hedonic consumer’s privacy concern in the specific context of online purchase, to identify existing research gaps, and to propose probable directions for future research. More specifically, this study addresses these research questions by carrying out a systematic literature review: (1) which research contexts i.e., types of markets, types of consumers and others have been studied? (2) what were the findings in previous studies? and (3) do the issue of privacy concern has any impact on hedonic consumers consumption behaviour? Due to its uniqueness, a specific look and focus will be given at hedonic products and services, leading to establish a new model of consumer behaviour that might address any potential research gap that might be discovered in this literature review. A model, that might help us explain how and why, the socially networked hedonic consumers behave in the way they behave during their online purchases – if they are concerned about their privacy. Initially starting in Asia and later followed by extensive research conducted in other parts of the world, this research might even expand the generalisation of this proposed model and establish it further. This idea could hopefully open up new avenues for further research i.e., looking into the impact of privacy concerns on many other areas of consumer behaviour, plus inclusion of any new variable(s) should the need arises.

Methodology

For the purpose of providing an overview of the existing research on “privacy concern” in the context of online hedonic consumers, we carried out a systematic literature review. It is expected to provide “research synthesis of existing studies on an issue, identifying opportunities for future research” (Bhimani, Mention, & Barlatier, 2019). It is aimed to be “rigorous” and “transparent” (Mallett, Hagen-Zanker, Slater, & Duvendack, 2012). Systematic reviews exercise clear and pre-specified methodologies to “select, scan, and analyse all the available evidence” for reducing bias and allowing subsequent replications (Gopalakrishnan & Ganeshkumar, 2013). 

Eligibility criteria

To recognize present and pertinent literature on the “privacy concern” of hedonic consumers, certain selection criteria were agreed on. The peer-reviewed academic journal articles that were included in this review were (a) published in English; (b) based on online context; (c) focused on the “privacy concern” of hedonic consumers. Logically, the excluded articles were: (a) non-academic by nature; (b) written in languages other than English, (c) based on offline context only; (d) focused on aspects other than “privacy concern” of hedonic consumers.

Literature search and selection

A significant number of academic journal articles were collected after appropriate keyword searches in diverse databases. These were then screened based on the aforementioned selection and exclusion criteria. Since the emphasis of this review is the privacy concerns of hedonic consumers in online context, a multidisciplinary topic, the key multidisciplinary and widely used databases were utilized for literature search. These databases were selected as they have a rather high volume of scholarly articles related with information systems, marketing, social networks, hedonic consumers and privacy concerns and the fact that articles found in these databases come from high impact, highly ranked peer reviewed journals. Additionally, several leading academic journals (e.g., “Journal of Marketing”, “Computers in Human Behaviour”, “MIS Quarterly” etc.) where quantitative, relevant studies are often featured were researched. Published articles from 1960 to 2020 were systematically reviewed to find out if they included our topics and its antecedents and consequences as measured variables. Conference proceedings, dissertation databases i.e., ProQuest dissertations & theses full text, review papers and references from the retrieved papers were also researched. The emphasis were put mostly on scholarly journal articles as Rosenthal (1995) quite clearly notes “since journals are more likely to publish statistically significant results than nonsignificant results, articles therein are more likely to report the results of studies with effect sizes larger than studies that are not published”. 

The keywords were selected based on the concepts, ideas and theories related to privacy concerns and hedonic consumers. To identify possible pertinent research related to privacy concerns and hedonic consumers, the terms “privacy concerns”, “social networking sites”, “online shopping”, “hedonic-motivation system”, “hedonic consumers”, were applied as keywords. Simultaneously, their synonyms (e.g., “SNS”, “Internet”, “HMS”) were also made use of as keywords. To include the maximum number of scholarly papers in this study, the full text (i.e., all fields except for the reference section) of the journal articles were combed. The search concluded on 31 December 2020, yielding a total of 620 journal articles. After taking away a few copies, 561 articles remained. The scrutinization of titles, abstracts, and keywords excluded 250 irrelevant journal articles. Most of the excluded papers focused neither on the privacy concern nor on the hedonic consumers. Afterwards, the authors of this review evaluated the full text of the outstanding 311 journal articles independently to recognize pertinent papers on the basis of the research questions and the eligibility criteria. Differences of opinions that were raised were resolved through discussions. Among these 311 journal articles, 44 journal articles along with few additional book chapters (5) and conference papers (3) were utilized for this systematic literature review. Lastly, 84 journal articles along with few additional book chapters (9), conference papers (5) and recent web resources (5) were reviewed for the rest of this study. The outstanding 183 journal articles were not included for numerous reasons. 

The authors found that many research that were carried out in the context of online shopping were, in fact, referring to the utilitarian consumers rather than hedonic consumers. There were few papers focusing on the privacy concern of utilitarian consumers, rather than the privacy concern of hedonic consumers. Finally, some other studies focused on the privacy concern of hedonic consumers, but they were not conducted in an online context. 

Results

This review analysed the selected articles from three perspectives: (1) the research theme; (2) the research context & (3) key findings related to the “privacy concern” of online hedonic consumers.

Literature Review

Hedonic consumers

“Hedonic” products and services are described as “fun, exciting, delightful, thrilling, enjoyable, sensational and experiential” and “utilitarian” as “effective, helpful, necessary, practical, instrumental, and functional” (Lu, Liu, & Fang, 2016; Voss, Spangenberg, & Grohmann, 2003). Earlier investigations (Hirschman & Holbrook, 1982; Strahilevitz & Myers, 1998) simply put it as “hedonic products provide more experiential consumption that results in fun, pleasure, and excitement i.e., designer clothes, sports cars, luxury watches, etc., whereas utilitarian products are focused primarily being instrumental and functional i.e., microwaves, minivans, personal computers, etc.”. Hedonistic consumption of items are termed as “the multi-sensory, fantasy and emotional aspects of consumers’ interactions with products” (Bamossy & Solomon, 2016). The use of hedonic items is significantly connected to luxuries (Kivetz & Simonson, 2002a, 2002b). Researchers (Dhar & Wertenbroch, 2000; Voss et al., 2003) argue that certain products and services have both utilitarian and hedonic characteristics.

Hedonic-Motivation System (HMS)

Consumer’s use of any information technology as an information system can be categorized as “Utilitarian-Motivation System” (UMS), “Hedonic-Motivation System” (HMS) or “Mixed-Motivation System” (MMS) based on their motivations to use the information system. Interestingly, arguments exist on all frontiers. Scholars (Jegers, 2007; Sherry, 2004) note common examples of HMS i.e. “video games”, “social networking sites”, “virtual worlds” etc., and observe that they “can create a level of deep immersion and devotion which is seldom seen with UMS”. Furthermore, users dedicate time to use HMS for “intrinsic rewards”. The users of HMS commonly have the slightest concern for the acquisition of any “potential external reward(s)” that they might obtain (Sweetser & Wyeth, 2005); instead, the users are typically perturbed about the “process or experience of use” itself. The research carried by Lowry, Cao, and Everard (2011) explained the motivation for putting attention to and accepting systems with respect to “intrinsic motivation” and “extrinsic motivation”. Researchers (Csikszentmihalyi, 1991; Thomas & Velthouse, 1990) have outlined how “intrinsic motivations” can influence behaviour of humans more strongly than “extrinsic motivations”. Furthermore, “joy” (i.e. “perceived enjoyment”), a type of “intrinsic motivation”, was included in the “Technology Acceptance Model (TAM)” by Venkatesh (2000), and “intrinsic motivation” since then has sustained to collect attention in IS acceptance research in various contemporary scholarly works (Qiu & Benbasat, 2009; Saadé, Nebebe, & Mak, 2009). 

To utilize these prospects, scholars (Lowry, Gaskin, Twyman, Hammer, & Roberts, 2012) built and tested a brand new acceptance model titled “Hedonic-Motivation System Adoption Model (HMSAM)”. Rather than an inconsequential, all-purpose extension of TAM, HMSAM is an “HMS-specific system acceptance model” that is very much focused. The theory the scholars (Lowry et al., 2012) developed and tested focused precisely on the “underlying motivations driving HMS acceptance in a process-oriented context”. Here, “intrinsic motivation” is further protuberant compared to the outcome-oriented “extrinsic motivation” that is commonly accentuated in any traditional TAM studies. Van der Heijden (2004) proposed an acceptance model of “Hedonic Information Systems” in an effort to emphasize on HMS use by employing the construct “joy” as the surrogate for “intrinsic motivation” instead of taking advantage of the more comprehensive CA construct. This new model “HMSAM”- builds on Van der Heijden’s (2004) proposed acceptance model, accompanied by two key extensions intended to catch the significant part of “intrinsic motivation” in use of HMS. This works side by side with the literature on consumer behaviour that differentiates between “utilitarian products” and “hedonic products” (Hirschman & Holbrook, 1982; Holbrook & Hirschman, 1982).

Social networking sites or SNSs, a prime example of HMS

SNS is defined as “a cyber-environment, a virtual community which permits any person to construct his/her own profile, share text, images, photos, and to link other members of the same site with the help of the applications and groups provided on the internet” (Boyd & Ellison, 2007; N. Ellison, Steinfield, & Lampe, 2006). Some SNSs allow their users to make their own groups and also limit other users admission to few specific content (Marwick & Boyd, 2014). Even though the concept of online social network dates back to the 1960s, it’s swift development and popularity grew after the emergence of the internet. There are more than two hundred (List, 2019) SNSs with a variety of software applications, serving an extensive assortment of interests. A majority of these SNSs support the preservation of pre-existing social connections. Various scholars (Boyd & Ellison, 2007; Naone, 2008; Urstadt, 2008) discussed the history of SNSs in a detailed manner. The role of “influential users” in SNSs and their role in marketing has also been noted (Mahmoudi, Yaakub, & Bakar, 2018).

“Information disclosure” on SNSs-as a part of managing the user’s identity (Strater & Lipford, 2008), generated much attention because of the “privacy concerns” (Buchanan, Paine, Joinson, & Reips, 2007; Yaakop, Anuar, & Omar, 2013). Although, scholars (Hann, Hui, Lee, & Png, 2007; Luo, 2002) speculated that the use of the SNSs, combined with the benefits from networking socially online outweigh any potential privacy concerns of the users. Scholars (Reynolds, Venkatanathan, Gonçalves, & Kostakos, 2011) fixated on SNSs and the affiliation between “privacy concerns” and “information disclosure”, finding little to no connection. However, Tufekci (2008) reported that students would rather regulate the “visibility of information” than the “levels of disclosure” to address their privacy concerns. But like all modern information technologies that are existing, SNSs are also not without its own unique set of problems. Users become far more concerned about their privacy due to the privacy related problems raised by SNSs (Blank, Bolsover, & Dubois, 2014). Several academic studies on privacy (Tsai, Egelman, Cranor, & Acquisti, 2011) revealed that many problems of the SNSs and online businesses arise from the threats to consumers’ information privacy. There have been reports of waning in Facebook members in developed nations (Garside, 2013). Stieger, Burger, Bohn, and Voracek (2013) identified people’s privacy concerns as primary reason. Several scholars (Andrejevic, 2007; Rosen, 2010) highlight the potential problems caused by SNSs due to their use by private companies to scrutinize any future job applicant’s past online behaviours online when they were young, jeopardizing future career opportunities.

Online privacy concerns

N. Mohamed and Ahmad (2012) define “online privacy concerns” as “the extent to which a consumer is worried over the organizational practices that are related to the collection and use of their personal information”. This tendency to worry is generally found to be one type of relatively stable personal traits (Buchanan et al., 2007; Malhotra, Kim, & Agarwal, 2004). Dinev and Hart (2006) define “privacy concerns” as anxieties regarding “possible loss of privacy as a result of a voluntary or surreptitious information disclosure to a web site”. “Online privacy concern” can also be defined as “the process through which users modify their online privacy behaviour to keep their sensitive personal information protected from unwanted audiences” (Strater & Lipford, 2008). 

Table 1 provides a detailed overview of “online consumer’s concerns and anxieties”, “correlation between privacy concern and protective strategies”, “privacy-protection behaviours”, and “dimensions of factors affecting overall privacy concerns” with a variety of specific focus points. Chellappa and Sin (2005) emphasized how especially important concerns for information privacy are in the online context (Pavlou & Fygenson, 2006). There have been several instances of problematic data usage that have been associated with elevated privacy concerns (Malheiros, Preibusch, & Sasse, 2013; Scism, 2013). Researchers showed that “trust” (Gefen, Karahanna, & Straub, 2003a, 2003b) and “privacy concerns” (Eastlick, Lotz, & Warrington, 2006; Malhotra et al., 2004) are the two key apparatuses for the decision to divulge personal information on the internet. 

Factors influencing privacy concerns

Numerous studies report that “internet skills”, “experiences” and “usage” influence “privacy concerns” in variety of ways: 

  • On one side, a few researchers state that “users’ level of online privacy concern” is unaffected by the “level of their internet experience” (A. A.-A. Mohamed, 2011). 
  • Alternatively, academics have also revealed that a “positive” & “direct” relationship exists between “users’ internet experience” and their “online privacy concern”, as the users are “more aware of how data about them could be collected and used against their wishes” (Beldad, de Jong, & Steehouder, 2011). 
  • Additionally, several studies have reported that “users’ online privacy concerns” actually lessens as the “level of their internet usage and experience” surges (Bellman, Johnson, Kobrin, & Lohse, 2004; Cho, Rivera-Sánchez, & Lim, 2009). 
  •  But studies could not conclude whether “victims of scams are more concerned about privacy or not” (Jensen, Potts, & Jensen, 2005). 

Previous studies reported that demographics could help in understanding the “risk perception” and “privacy concerns” in digital media use (Blank et al., 2014; Marwick & Boyd, 2014):

  • “Gender” significantly influences usage of “privacy settings”, as men are more inclined to take risks while posting personal and private information online (Fogel & Nehmad, 2009). 
  • Additionally, women are “more concerned about privacy than men” (O’Neil, 2001). 
  • But few scholars (Yao, Rice, & Wallis, 2007) argue that this influence of “gender” on “privacy settings” is rather inconclusive. 
  • Similarly, few researchers (Hoofnagle, King, Li, & Turow, 2010) want to claim “little or no significant differences” by “age”. 
  • Yet, older users exhibited more “protective usage” (Madden et al., 2013) and younger users were better at managing “privacy settings” (Grant, 2005). 

Table 2 provides a comprehensive review of “factors influencing privacy concerns” from specific viewpoints of SNS users, online users, online shoppers, online marketing & online merchants.

Table 1. Summary of the reviewed articles
Research context Specific focus Authors Research methodology Data collection method Sample
Online consumer’s concerns and anxieties Online & offline consumers Culnan and Armstrong (1999) Quantitative Telephone survey 1000 U.S. adults
Online consumers Novak et al. (2000) Quantitative Web-based consumer survey 1654 respondents
Miyazaki and Fernandez (2001) Quantitative Pencil and paper survey 160 respondents
Correlation between privacy concern and protective strategies Internet users Lutz and Strathoff (2014) Quantitative Telephone interviews 1002 Swiss adults
Online consumers Larose and Rifon (2007) Quantitative Experiments 227 undergraduates from 
a midwestern university
Facebook users N. B. Ellison, Vitak, Steinfield, Gray, and Lampe (2011) Quantitative Survey 299 undergraduates at
Michigan State University
The relationship between “individuals’ privacy perceptions” and “institutional privacy assurances” Xu, Dinev, Smith, and Hart (2011) Quantitative Survey 823 users
Privacy-protection behaviours  Uninstalling mobile applications Boyles, Smith, and Madden (2012) Quantitative Telephone surveys 2,254 adults
Embracing or resisting the acceptance of latest technologies that defend or contest privacy Miltgen, Popovič, and Oliveira (2013) Quantitative Online survey 326 young (15–25 years old) respondents
Submit false data Sheehan and Hoy (1999) Quantitative E-mail survey 889 respondents
Dommeyer and Gross (2003) Quantitative E-mail survey 137 respondents
Lwin, Wirtz, and Williams (2007) Quantitative Controlled experiments 180 adults
Refusal to buy/enrol at a website Milne, Rohm, and Bahl (2004) Quantitative Survey 340 respondents
Data removal request  Dolnicar and Jordaan (2006) Quantitative Online survey 1055 respondents
Pursue supplementary information (i.e., “privacy statement”) Youn (2009) Quantitative Survey 144 middle school students
Remove their information from databases   Phelps, Nowak, and Ferrell (2000) Quantitative Mail survey 556 respondents
Unwilling to disclose personal data to websites Nam, Song, Park, and Ik (2006) Quantitative Online survey 323 respondents
Wirtz, Lwin, and Williams (2007) Quantitative Online survey 182 respondents
Unwilling to make transactions Dinev and Hart (2006) Quantitative Survey 369 respondents
Dimensions of factors affecting overall privacy concerns Private understandings of “internet use” and “areas of the internet”  Lee (2009) Quantitative Online survey 368 online banking users
Bryce and Fraser (2014) Qualitative Focus group discussion 108 young respondents
Socio-demographic factors  Marwick and Boyd (2014) Qualitative Semi-structured interviews 166 teenagers
Taddicken (2014) Quantitative Online survey 2739 German internet users
"Trust in institutions" and "trust in other people" Jarvenpaa, Tractinsky, and Saarinen (1999) Quantitative Survey 382 respondents
Metzger (2004) Quantitative Survey 189 participants
Chellappa and Sin (2005) Quantitative Survey 243 online consumers
Okazaki, Li, and Hirose (2009) Quantitative Survey 510 mobile phone users in Japan
Knowledge about “privacy settings” Baek, Kim, and Bae (2014)   Quantitative  Survey      2028 South Korean online users   
“Internet consumption practices” and “objective for internet use”  Yao et al. (2007) Quantitative  Survey  413 undergraduates from a southwestern U.S. university


 

Table 2. Factors influencing privacy concerns
Research context Specific focus Authors Research methodology Data collection method Sample
SNS users Users with detailed profiles tend to be more risk averse than users with limited profiles  Lewis et al. (2008) Quantitative Survey 1710 students from a northeastern U.S. private university 
Paine, Reips, Stieger, Joinson, and Buchanan (2007) Quantitative Survey 530 respondents
Fogel and Nehmad (2009) Quantitative Survey 205 undergraduates 
Park, Campbell, and Kwak (2012) Quantitative Survey 456 adult internet users
Trepte, Dienlin, and Reinecke (2013) Quantitative Survey 327 German SNS users 
Positive correlation between “users’ education” and “concern with privacy issues and utilizing privacy protection”  O’Neil (2001) Quantitative Survey 1223 U.S. respondents
Rainie et al. (2013) Quantitative Survey 1002 adults
Blank et al. (2014) Quantitative Survey 2000 individuals aged 14 and older in England, Scotland, and Wales
Online users    Positive correlation between “user’s belief in the right to privacy” and “having online privacy concerns”  Yao et al. (2007) Quantitative Survey 413 undergraduates from a southwestern U.S. university
Familiarity about integrity and safety settings amounts to a sense of security in action and to less apprehension about privacy issues  Jensen et al. (2005) Quantitative Survey 175 volunteers from U.S.
Positive correlation between “user’s awareness of the society” and “privacy concerns”  Dinev and Hart (2005) Quantitative Survey 422 U.S. respondents
Online shoppers Privacy leaks on websites will influence an online shopper’s trust of online sellers Pan and Zinkhan (2006) Quantitative Telephone interviews 150 respondents
“Privacy concerns” strongly impacting “customers’ insight of online seller’s service quality”  Wolfinbarger and Gilly (2003) Quantitative Online Survey 1013 respondents
Dinev and Hart (2004) Quantitative Survey 369 respondents
Xu, Dinev, Smith, and Hart (2008) Quantitative Survey 823 respondents
Bandyopadhyay (2009) Qualitative Literature review n/a
Privacy concerns are initiated when online users are aware of organizations collecting information about them but do not precisely comprehend how the information is used  Smith et al. (1996) Quantitative Survey 147 U.S. business graduate students
Milne and Boza (1999) Quantitative Mail survey 1,508 direct marketing
consumers from U.S.
Poddar, Mosteller, and Ellen (2009) Qualitative Interviews 21 internet users
Wu, Huang, Yen, and Popova (2012) Quantitative Survey 500 participants (250 from Russia and 250 from Taiwan)
Inverse relationship between “customer’s higher level of privacy concern” and “appreciation for personalized emails” White, Zahay, Thorbjørnsen, and Shavitt (2008) Quantitative Experiments 86 (study 1) & 354 (study 2) undergraduates
Control over information, short-term and long-term transactional relationships influence user’s privacy concerns.  Sheehan and Hoy (2000) Quantitative E-mail survey 889 U.S. consumers
Online marketing Negative correlation between “privacy concern” and “information disclosure”; however, positive correlation between “privacy concern” and “protection intention”  Yang and Wang (2009) Quantitative Survey 458 Chinese university students
Online merchants “Large-scale collection” and “processing of personal facts” causing “privacy concerns”  Preibusch, Peetz, Acar, and Berendt (2016) Qualitative Content analysis of personal information leakage patterns 881 most popular US web shops

Discussion

Despite existing research investigating the issues of “privacy concerns” from diverse perspectives, some gaps in previous studies yet remain. First, further evidence is required to offer a better understanding on these issues from the perspective of hedonic consumers as it is traditionally overlooked, until now. In earlier sections of this paper, the different kinds of products or services, namely utilitarian and hedonic were discussed; and the fact that their respective consumers will behave differently than their counterparts has been quite evident in the preceding literature review section. Therefore, for future empirical research, a suggestion would be to explore the issue of “privacy concerns” from the perspective of hedonic consumers and extend the existing research into this unexplored area in the academia.

Second, there is a strong need for an updated behaviour model regarding the hedonic consumers. The literature review so far revealed paucity of research in several key areas of hedonic consumer behaviour concerning few crucial privacy issues (e.g., “privacy concerns”). While looking closely into an existing HMSAM, especially in observing SNSs effects on the consumers purchase decision making- it was revealed that there are scopes for adding new dimensions. The issue of privacy is of utmost concern to the SNS users, more so to them compared to other systems i.e., “online shopping”, “online dating”, “online gaming”, “virtual worlds”, “digital music repositories”, “learning/education” and “gamified systems”; so, it is quite reasonable to assume that the user’s concerns regarding privacy issues will not be similar in case of SNSs usage as compared to all these systems. As SNSs are used for multitude of purposes, the generalized assumption of privacy and its impact in this regard would not be the best course of action. For all we know, the impact of privacy in terms of some SNSs usage could be quite the reverse compared to its impact in some other above-described systems. Interestingly enough, some of those effects might be similar to some other HMS systems i.e., “pornography”, “online gaming”, “online gambling” etc., where the users require their anonymity to be preserved. Thus, the decision to address this issue by including these HMSs by adding mediator variables i.e., “privacy concerns”, seems logical. An updated and comprehensive model can provide profound insights into the hedonic consumer behaviour in an organized manner and offer improved direction for pertinent research.

Third, additional longitudinal studies are required in the ongoing research on hedonic consumer behaviour in the contexts of “privacy concerns”. Also, almost the entire domain of research, process models of privacy-related online behaviour of HMS consumers remains largely unexplored. Only a few studies (Bélanger & Crossler, 2011; Y. Li, 2011; Smith, Dinev, & Xu, 2011) exist that explore this idea despite not providing a specific theoretical framework to online privacy in the context of HMS. 

Fourth, to ensure validity, any proposed future empirical studies should include diversified, representative samples – containing participants from different contexts (i.e., age groups, occupations, working environments, income group, countries etc.). Most of the reviewed articles that contained empirical results, utilized student samples. Numerous opinions in favour and against convenience samples containing students exist. Quite a few authors (Beltramini, 1983; Oakes, 1972) specified the perils of having student samples in academic studies. Scholars frequently cited warnings to external validity as their key apprehension, disagreeing that students are “atypical of the general population”; consequently, any results founded on student samples might not be “generalizable to other populations” (Cunningham, Anderson, & Murphy, 1974). Yet, scholars addressed this by stating “students are often forerunners in the adoption of new communication technologies” (Lewis, Kaufman, & Christakis, 2008). 

And finally, Lowry et al. (2012) noted that group and community oriented HMSs, i.e., “multiplayer games”, “social networks”, “online gambling”, “blogging” etc., were not focused. This can be addressed by expanding the breadth of the research by testing the newly proposed model on consumers of different HMSs such as “online dating”, “online gaming”, “virtual worlds”, “digital music repositories”, “learning/education” and “gamified systems” etc., thereby increasing the validity of the newly proposed model.

Conclusion & scope of future studies

This review contributes to the research on hedonic consumer behaviour in a few ways. First, this review offers an overview of the existing research, offering the scholars and readers an update on the current status of research related to hedonic consumer behaviour. Additionally, the discussions on “privacy concerns” help to remove any confusions held by the researchers and readers. Moreover, while carrying out the systematic review of pertinent existing literature, quite a few knowledge gaps were identified. Subsequently, clear directions as well as suggestions for future research were provided. The ensuing objective of this study is to develop a predictive model for gaining insights into online hedonic consumer’s privacy concerns and to test it empirically. Therefore, this study is proposing a modified version of HMSAM by adding a new dimension- “privacy concerns”, especially when the consumers are using SNSs in their purchase decision making. This study proposes to skip the intricate process of full creation and validation of an instrument, only partial – by possibly involving few established scales during formation of the construct, but still employing numerous succeeding pilot tests, ensuing evaluation for nomological validity, etc. as suggested by scholars (D. B. Straub & Boudreau; D. W. Straub, 1989). For measuring “privacy concerns”, future studies might employ “concern for information privacy scale” (Smith, Milberg, & Burke, 1996) or “Internet Privacy Concern Scale” (Hong & Thong, 2013) or “Internet Users' Information Privacy Concerns (IUIPC)” scale (Malhotra et al., 2004) etc., thereby including “privacy concerns” as a possible mediator in the proposed privacy related behaviour process model. 

No research endeavour is free from limitations, and this review was no exception. Articles written in non-English language were not included in this review. Many different kinds of hedonic products or services exist i.e., “video games”, “online gambling” etc. But for scale and scope’s sake, one of the most prominent i.e., SNSs were chosen as a focus of this paper. As SNS’s issues i.e., “SNS fatigue” (Zhu & Bao, 2018; Zong, Yang, & Bao, 2019) etc. are being noticed, other hedonic products or services in future subsequent studies should be included to explore avenues of HMS further.

Disclosure statement

The authors of this review paper report no potential conflict of interests.

References

Andrejevic, M. (2007). iSpy: Surveillance and power in the interactive era: University Press of Kansas Lawrence.

Baek, Y. M., Kim, E.-M., & Bae, Y. (2014). My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns. Computers in Human Behavior, 31, 48-56. doi:10.1016/j.chb.2013.10.010

Bamossy, G. J., & Solomon, M. R. (2016). Consumer Behaviour: A European perspective (7 ed.): Pearson Education.

Bandyopadhyay, S. (2009). Antecedents and consequences of consumers online privacy concerns. Journal of Business & Economics Research (JBER), 7(3). doi:10.19030/jber.v7i3.2269

Bélanger, F., & Crossler, R. E. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35(4), 1017-1041. doi:10.2307/41409971

Beldad, A., de Jong, M., & Steehouder, M. (2011). A Comprehensive Theoretical Framework for Personal Information-Related Behaviors on the Internet. The Information Society, 27(4), 220-232. doi:10.1080/01972243.2011.583802

Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313-324. doi:10.1080/01972240490507956

Beltramini, R. F. (1983). Student surrogates in consumer research. Journal of the Academy of Marketing Science, 11(4), 438-443. doi:10.1007/bf02721926

Bhimani, H., Mention, A.-L., & Barlatier, P.-J. (2019). Social media and innovation: A systematic literature review and future research directions. Technological Forecasting and Social Change, 144, 251-269. doi:10.1016/j.techfore.2018.10.007

Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox: Young people and privacy on social network sites. Paper presented at the Prepared for the Annual Meeting of the American Sociological Association.

Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer‐Mediated Communication, 13(1), 210-230. doi:10.1111/j.1083-6101.2007.00393.x

Boyles, J. L., Smith, A., & Madden, M. (2012). Privacy and data management on mobile devices. Retrieved from USA: https://www.pewresearch.org/internet/2012/09/05/privacy-and-data-management-on-mobile-devices/

Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS Quarterly, 29(3). doi:10.2307/25148690

Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior, 30, 299-306. doi:10.1016/j.chb.2013.09.012

Buchanan, T., Paine, C., Joinson, A. N., & Reips, U.-D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165. doi:10.1002/asi.20459

Chellappa, R. K., & Sin, R. G. (2005). Personalization versus privacy: An empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2-3), 181-202. doi:10.1007/s10799-005-5879-y

Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291-302. doi:10.1016/j.chb.2017.01.003

Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: global concerns and local responses. New Media & Society, 11(3), 395-416. doi:10.1177/1461444808101618

Csikszentmihalyi, M. (1991). Flow: The psychology of optimal experience In: New York: HarperPerennial (Vol. 41).

Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115. doi:10.1287/orsc.10.1.104

Cunningham, W. H., Anderson, W. T., & Murphy, J. H. (1974). Are students real people? The Journal of Business, 47(3), 399-409. doi:10.1086/295654

Dhar, R., & Wertenbroch, K. (2000). Consumer choice between hedonic and utilitarian goods. Journal of Marketing Research, 37(1), 60-71. doi:10.1509/jmkr.37.1.60.18718

Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. doi:10.1080/01449290410001715723

Dinev, T., & Hart, P. (2005). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7-29. doi:10.2753/jec1086-4415100201

Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. doi:10.1287/isre.1060.0080

Dolnicar, S., & Jordaan, Y. (2006). Protecting consumer privacy in the company's best interest. Australasian Marketing Journal (AMJ), 14(1), 39-61. doi:10.1016/s1441-3582(06)70052-0

Dommeyer, C. J., & Gross, B. L. (2003). What consumers know and what they do: An investigation of consumer knowledge, awareness, and use of privacy protection strategies. Journal of Interactive Marketing, 17(2), 34-51. doi:10.1002/dir.10053

Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8), 877-886. doi:10.1016/j.jbusres.2006.02.006

Ellison, N., Steinfield, C., & Lampe, C. (2006). Spatially bounded online social networks and social capital. Paper presented at the International Communication Association.

Ellison, N. B., Vitak, J., Steinfield, C., Gray, R., & Lampe, C. (2011). Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environment. In S. Trepte & L. Reinecke (Eds.), Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web (pp. 19-32). Berlin, Heidelberg: Springer Berlin Heidelberg.

Entertainment Software Association. (2007). Top 10 industry facts. Retrieved from http://www.theesa.com/facts/index.asp

Entertainment Software Association. (2019). 2019 Essential facts about the computer and video game industry. Retrieved from https://www.theesa.com/esa-research/2019-essential-facts-about-the-computer-and-video-game-industry/

Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160. doi:10.1016/j.chb.2008.08.006

Garside, J. (2013). Facebook loses millions of users as biggest markets peak. The Guardian.

Gefen, D., Karahanna, E., & Straub, D. W. (2003a). Inexperience and experience with online stores: The importance of TAM and trust. IEEE Transactions on Engineering Management, 50(3), 307-321. doi:10.1109/tem.2003.817277

Gefen, D., Karahanna, E., & Straub, D. W. (2003b). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51-90. doi:10.2307/30036519

Glover, S., & Benbasat, I. (2010). A comprehensive model of perceived risk of e-commerce transactions. International Journal of Electronic Commerce, 15(2), 47-78. doi:10.2753/jec1086-4415150202

Gopalakrishnan, S., & Ganeshkumar, P. (2013). Systematic reviews and meta-analysis: understanding the best evidence in primary healthcare. Journal of Family Medicine and Primary Care, 2(1), 9. doi:10.4103/2249-4863.109934

Grant, I. C. (2005). Young peoples' relationships with online marketing practices: An intrusion too far? Journal of Marketing Management, 21(5-6), 607-623. doi:10.1362/0267257054307417

Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13-42. doi:10.2753/mis0742-1222240202

Hirschman, E. C., & Holbrook, M. B. (1982). Hedonic consumption: emerging concepts, methods and propositions. Journal of Marketing, 46(3), 92-101.

Holbrook, M. B., & Hirschman, E. C. (1982). The experiential aspects of consumption: Consumer fantasies, feelings, and fun. Journal of Consumer Research, 9(2), 132-140. doi:10.1086/208906

Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 275-298. doi:10.25300/misq/2013/37.1.12

Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies? Available at SSRN 1589864. doi:10.2139/ssrn.1589864

Hsu, C.-L., & Lu, H.-P. (2007). Consumer behavior in online game communities: A motivational factor perspective. Computers in Human Behavior, 23(3), 1642-1659. doi:10.1016/j.chb.2005.09.001

Hsu, C.-w. (2006). Privacy concerns, privacy practices and web site categories: Toward a situational paradigm. Online Information Review, 30(5), 569-586. doi:10.1108/14684520610706433

Janda, S., Trocchia, P. J., & Gwinner, K. P. (2002). Consumer perceptions of Internet retail service quality. International Journal of Service Industry Management, 13(5), 412-431. doi:10.1108/09564230210447913

Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2), JCMC526. doi:10.1111/j.1083-6101.1999.tb00337.x

Jegers, K. (2007). Pervasive game flow: understanding player enjoyment in pervasive gaming. Computers in Entertainment (CIE), 5(1), 9. doi:10.1145/1236224.1236238

Jensen, C., Potts, C., & Jensen, C. (2005). Privacy practices of Internet users: self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1-2), 203-227. doi:10.1016/j.ijhcs.2005.04.019

Kivetz, R., & Simonson, I. (2002a). Earning the right to indulge: Effort as a determinant of customer preferences toward frequency program rewards. Journal of Marketing Research, 39(2), 155-170. doi:10.1509/jmkr.39.2.155.19084

Kivetz, R., & Simonson, I. (2002b). Self-control for the righteous: Toward a theory of precommitment to indulgence. Journal of Consumer Research, 29(2), 199-217. doi:10.1086/341571

Larose, R., & Rifon, N. J. (2007). Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior. Journal of Consumer Affairs, 41(1), 127-149. doi:10.1111/j.1745-6606.2006.00071.x

Lee, M.-C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130-141. doi:10.1016/j.elerap.2008.11.006

Lewis, K., Kaufman, J., & Christakis, N. (2008). The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. Journal of Computer-Mediated Communication, 14(1), 79-100. doi:10.1111/j.1083-6101.2008.01432.x

Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. doi:10.1016/j.dss.2011.01.017

Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28, 28. doi:10.17705/1cais.02828

Liao, C., Liu, C.-C., & Chen, K. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications, 10(6), 702-715. doi:10.1016/j.elerap.2011.07.003

List, S. M. (2019). Social Media Sites & Apps List 2019. Retrieved from https://socialmedialist.org/

Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200. doi:10.2753/mis0742-1222270406

Lowry, P. B., Gaskin, J., Twyman, N., Hammer, B., & Roberts, T. (2012). Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM). Journal of the Association for Information Systems, 14(11), 617-671. doi:10.17705/1jais.00347

Lu, J., Liu, Z., & Fang, Z. (2016). Hedonic products for you, utilitarian products for me. Judgment & Decision Making, 11(4). doi:10.1017/s1930297500003764

Luo, X. (2002). Trust production and privacy concerns on the Internet: A framework based on relationship marketing and social exchange theory. Industrial Marketing Management, 31(2), 111-118. doi:10.1016/s0019-8501(01)00182-1

Lutz, C., & Strathoff, P. (2014). Privacy concerns and online behavior–Not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses. Viewing the Privacy Paradox Through Different Theoretical Lenses (April 15, 2014). doi:10.2139/ssrn.2425132

Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585. doi:10.1007/s11747-006-0003-3

Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, Social Media, and Privacy. Retrieved from https://www.pewresearch.org/internet/2013/05/21/teens-social-media-and-privacy/

Mahmoudi, A., Yaakub, M. R., & Bakar, A. A. (2018). New time-based model to identify the influential users in online social networks. Data Technologies and Applications. doi:10.1108/dta-08-2017-0056

Malheiros, M., Preibusch, S., & Sasse, M. A. (2013). “Fairly truthful”: The impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure. Paper presented at the 6th International Conference on Trust and Trustworthy Computing.

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. doi:10.1287/isre.1040.0032

Mallett, R., Hagen-Zanker, J., Slater, R., & Duvendack, M. (2012). The benefits and challenges of using systematic reviews in international development research. Journal of Development Effectiveness, 4(3), 445-455. doi:10.1080/19439342.2012.711342

MarketWatch, I. (2020). "Videogames are a bigger industry than movies and North American sports combined, thanks to the pandemic". Retrieved from https://www.marketwatch.com/story/videogames-are-a-bigger-industry-than-sports-and-movies-combined-thanks-to-the-pandemic-11608654990

Marwick, A. E., & Boyd, D. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051-1067. doi:10.1177/1461444814543995

Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4), JCMC942. doi:10.1111/j.1083-6101.2004.tb00292.x

Milne, G. R., & Boza, M. E. (1999). Trust and concern in consumers' perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5-24. doi:10.1002/(sici)1520-6653(199924)13:1<5::aid-dir2>3.0.co;2-9

Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232. doi:10.1111/j.1745-6606.2004.tb00865.x

Miltgen, C. L., Popovič, A., & Oliveira, T. (2013). Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context. Decision Support Systems, 56, 103-114. doi:10.1016/j.dss.2013.05.010

Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35(1), 27-44. doi:10.1111/j.1745-6606.2001.tb00101.x

Mohamed, A. A.-A. (2011). Online privacy concerns among social networks’ users. Cross-Cultural Communication, 6(4), 74-89. doi:10.3968/j.ccc.1923670020100604.015

Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375. doi:10.1016/j.chb.2012.07.008

Nam, C., Song, C., Park, E. L., & Ik, C. (2006). Consumers' privacy concerns and willingness to provide marketing-related personal information online. Paper presented at the ACR North American Advances.

Naone, E. (2008). A brief history of microblogging. Technology Review.

Newzoo B.V. (2017, April 20). The global games market will reach $108.9 billion in 2017 with mobile taking 42%. Retrieved from https://newzoo.com/insights/articles/the-global-games-market-will-reach-108-9-billion-in-2017-with-mobile-taking-42/

Novak, T. P., Hoffman, D. L., & Yung, Y.-F. (2000). Measuring the customer experience in online environments: A structural modeling approach. Marketing Science, 19(1), 22-42. doi:10.1287/mksc.19.1.22.15184

O’Neil, D. (2001). Analysis of Internet users’ level of online privacy concerns. Social Science Computer Review, 19(1), 17-31. doi:10.1177/089443930101900103

Oakes, W. (1972). External validity and the use of real people as subjects. American Psychologist, 27(10), 959. doi:10.1037/h0033454

Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising, 38(4), 63-77. doi:10.2753/joa0091-3367380405

Paine, C., Reips, U.-D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. International Journal of Human-Computer Studies, 65(6), 526-536. doi:10.1016/j.ijhcs.2006.12.001

Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331-338. doi:10.1016/j.jretai.2006.08.006

Park, Y. J., Campbell, S. W., & Kwak, N. (2012). Affect, cognition and reward: Predictors of privacy protection online. Computers in Human Behavior, 28(3), 1019-1027. doi:10.1016/j.chb.2012.01.004

Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 115-143. doi:10.2307/25148720

Peslak, A. R. (2006). PAPA revisited: A current empirical study of the Mason framework. Journal of Computer Information Systems, 46(3), 117-123. doi:10.1080/08874417.2006.11645905

Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 27-41. doi:10.1509/jppm.19.1.27.16941

Poddar, A., Mosteller, J., & Ellen, P. S. (2009). Consumers' rules of engagement in online information exchanges. Journal of Consumer Affairs, 43(3), 419-448. doi:10.1111/j.1745-6606.2009.01147.x

Preibusch, S., Peetz, T., Acar, G., & Berendt, B. (2016). Shopping for privacy: Purchase details leaked to PayPal. Electronic Commerce Research and Applications, 15, 52-64. doi:10.1016/j.elerap.2015.11.004

Qiu, L., & Benbasat, I. (2009). Evaluating anthropomorphic product recommendation agents: A social relationship perspective to designing information systems. Journal of Management Information Systems, 25(4), 145-182. doi:10.2753/mis0742-1222250405

Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Retrieved from https://www.pewresearch.org/internet/2013/09/05/anonymity-privacy-and-security-online/

Reynolds, B., Venkatanathan, J., Gonçalves, J., & Kostakos, V. (2011). Sharing ephemeral information in online social networks: privacy perceptions and behaviours. Paper presented at the IFIP Conference on Human-Computer Interaction.

Rosen, J. (2010). The web means the end of forgetting. The New York Times. Retrieved from https://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html

Rosenthal, R. (1995). Writing meta-analytic reviews. Psychological Bulletin, 118(2), 183. doi:10.1037/0033-2909.118.2.183

Saadé, R. G., Nebebe, F., & Mak, T. (2009). The role of intrinsic motivation in system adoption: A cross-cultural perspective. Journal of Information, Information Technology, and Organizations, 4, 107-127. doi:10.28945/620

Scism, L. (2013). State Farm Is There: As You Drive. Wall Street Journal, pp. C1-C3.

Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising, 28(3), 37-51. doi:10.1080/00913367.1999.10673588

Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62-73. doi:10.1509/jppm.19.1.62.16949

Sherry, J. L. (2004). Flow and media enjoyment. Communication Theory, 14(4), 328-347. doi:10.1111/j.1468-2885.2004.tb00318.x

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. doi:10.2307/41409970

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 167-196. doi:10.2307/249477

Stieger, S., Burger, C., Bohn, M., & Voracek, M. (2013). Who commits virtual identity suicide? Differences in privacy concerns, internet addiction, and personality between Facebook users and quitters. Cyberpsychology, Behavior, and Social Networking, 16(9), 629-634. doi:10.1089/cyber.2012.0323

Strahilevitz, M., & Myers, J. G. (1998). Donations to charity as purchase incentives: How well they work may depend on what you are trying to sell. Journal of Consumer Research, 24(4), 434-446. doi:10.1086/209519

Strater, K., & Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. Paper presented at the Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1.

Straub, D. B., & Boudreau, M.-C. MC, & Gefen, D.(2004).“Validation Guidelines for IS Positivist Research”. Communications of the Association for Information Systems, 13(24), 380-427.

Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 147-169. doi:10.2307/248922

Suki, N. M., & Suki, N. M. (2007). Online buying innovativeness: effects of perceived value, perceived risk and perceived enjoyment. International Journal of Business and Society, 8(2), 81-93.

Sweetser, P., & Wyeth, P. (2005). GameFlow: a model for evaluating player enjoyment in games. Computers in Entertainment (CIE), 3(3), 3-3. doi:10.1145/1077246.1077253

Taddicken, M. (2014). The ‘privacy paradox’in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273. doi:10.1111/jcc4.12052

Teo, T. S., & Liu, J. (2007). Consumer trust in e-commerce in the United States, Singapore and China. Omega, 35(1), 22-38. doi:10.1016/j.omega.2005.02.001

Thomas, K. W., & Velthouse, B. A. (1990). Cognitive elements of empowerment: An “interpretive” model of intrinsic task motivation. Academy of Management Review, 15(4), 666-681. doi:10.5465/amr.1990.4310926

Trepte, S., Dienlin, T., & Reinecke, L. (2013). Privacy, self-disclosure, social support, and social network site use: research report of a three-year panel study. Retrieved from http://opus.uni-hohenheim.de/volltexte/2013/889/

Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254-268. doi:10.1287/isre.1090.0260

Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20-36. doi:10.1177/0270467607311484

Urstadt, B. (2008). Social networking is not a business. Technology Review.

Van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 695-704. doi:10.2307/25148660

Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342-365. doi:10.2139/ssrn.4062395

Voss, K. E., Spangenberg, E. R., & Grohmann, B. (2003). Measuring the hedonic and utilitarian dimensions of consumer attitude. Journal of Marketing Research, 40(3), 310-320. doi:10.1509/jmkr.40.3.310.19238

Wang, H., Lee, M. K., & Wang, C. (1998). Consumer privacy concerns about Internet marketing. Communications of the ACM, 41(3), 63-70. doi:10.1145/272287.272299

White, T. B., Zahay, D. L., Thorbjørnsen, H., & Shavitt, S. (2008). Getting too personal: Reactance to highly personalized email solicitations. Marketing Letters, 19(1), 39-50. doi:10.1007/s11002-007-9027-9

Wirtz, J., Lwin, M. O., & Williams, J. D. (2007). Causes and consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348. doi:10.1108/09564230710778128

Wolfinbarger, M., & Gilly, M. C. (2003). eTailQ: dimensionalizing, measuring and predicting etail quality. Journal of Retailing, 79(3), 183-198. doi:10.1016/s0022-4359(03)00034-4

Wu, K.-W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28(3), 889-897. doi:10.1016/j.chb.2011.12.008

Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's privacy concerns: Toward an integrative view. Paper presented at the ICIS 2008 proceedings.

Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1. doi:10.17705/1jais.00281

Yaakop, A., Anuar, M. M., & Omar, K. (2013). Like it or not: Issue of credibility in Facebook advertising. Asian Social Science, 9(3), 154. doi:10.5539/ass.v9n3p154

Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 40(1), 38-51. doi:10.1145/1496930.1496937

Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710-722. doi:10.1002/asi.20530

Youn, S. (2009). Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. Journal of Consumer Affairs, 43(3), 389-418. doi:10.1111/j.1745-6606.2009.01146.x

Zhu, Y., & Bao, Z. (2018). The role of negative network externalities in SNS fatigue: an empirical study based on impression management concern, privacy concern, and social overload. Data Technologies and Applications. doi:10.1108/dta-09-2017-0063

Zong, W., Yang, J., & Bao, Z. (2019). Social network fatigue affecting continuance intention of social networking services: The case of WeChat users in China’s universities. Data Technologies and Applications. doi:10.1108/dta-06-2018-0054

Last Update: 27/07/2023