Privacy as a Social Issue and Behavioral Concept

Stephen T. Margulis

Corresponding Author

Grand Valley State University

*Correspondence concerning this article should be addressed to Stephen T. Margulis, Management Department, Seidman School of Business, Grand Valley State University, 401 W. Fulton, Grand Rapids, MI 49504‐6431 [e‐mail:

Margulis@gvsu.edu

].
Search for more papers by this author
First published: 29 April 2003
Cited by: 97

Abstract

This introduction, to an issue on privacy as a social issue and behavioral concept, discusses what privacy is, by examining definitions and theories of privacy, and what privacy does, by reviewing the benefits of obtaining privacy and the costs of failing to achieve and of losing privacy. It provides a possible bridge between social psychological and social issues approaches to privacy and examines privacy as a social issue for Americans as citizens, health‐care recipients, consumers, and employees. It then briefly explores behavioral aspects of privacy, including indicators of privacy's importance and the generally overlooked status of privacy in psychology.

Number of times cited according to CrossRef: 97

  • , Privacy Concerns and Customers' Information-Sharing Intentions, Censorship, Surveillance, and Privacy, 10.4018/978-1-5225-7113-1.ch005, (75-90), (2019).
  • , Privacy Awareness and the Networking Generation, Censorship, Surveillance, and Privacy, 10.4018/978-1-5225-7113-1.ch063, (1309-1332), (2019).
  • , The effect of role conflict on self‐disclosure in social network sites: An integrated perspective of boundary regulation and dual process model, Information Systems Journal, 29, 2, (279-316), (2018).
  • , A Heuristic Model for Supporting Users’ Decision-Making in Privacy Disclosure for Recommendation, Security and Communication Networks, 2018, (1), (2018).
  • , What determines the acceptance of government surveillance? Examining the influence of information privacy correlates, The Social Science Journal, 10.1016/j.soscij.2018.10.001, (2018).
  • , Privacy Awareness and the Networking Generation, International Journal of Technoethics, 10.4018/IJT.2018010105, 9, 1, (51-70), (2018).
  • , Privacy Concerns and Customers' Information-Sharing Intentions, Global Observations of the Influence of Culture on Consumer Buying Behavior, 10.4018/978-1-5225-2727-5.ch007, (108-123)
  • , Studying the controversy in online crowds’ interactions, Applied Soft Computing, 10.1016/j.asoc.2017.03.022, 66, (557-563), (2018).
  • , Privacy, Trust and Security in Two-Sided Markets, E-Health Two-Sided Markets, 10.1016/B978-0-12-805250-1.00005-8, (65-89), (2017).
  • , Chinese adolescents' reports of covert parental monitoring: Comparisons with overt monitoring and links with information management, Journal of Adolescence, 55, (24), (2017).
  • , Privacy by disaster? Press coverage of privacy and digital technology, European Journal of Communication, 32, 3, (189), (2017).
  • , Toward a Sociology of Privacy, Annual Review of Sociology, 43, 1, (249), (2017).
  • , The Ontological Interpretation of Informational Privacy, Ethics, Law and the Politics of Information, 10.1007/978-94-024-1150-8_7, (117-140), (2017).
  • , A power-responsibility equilibrium framework for fairness: Understanding consumers' implicit privacy concerns for location-based services, Journal of Business Research, 73, (20), (2017).
  • , Beyond ‘nothing to hide’: When identity is key to privacy threat under surveillance, European Journal of Social Psychology, 47, 6, (694-707), (2017).
  • , Patients’ support for health information exchange: a literature review and classification of key factors, BMC Medical Informatics and Decision Making, 17, 1, (2017).
  • , Technology Studies and the Sociological Debate on Monitoring of Social Interactions, Biometrics, 10.4018/978-1-5225-0983-7.ch022, (529-558), (2017).
  • , Privacy Challenges with Genetic Information, Handbook of Missing Persons, 10.1007/978-3-319-40199-7_25, (379-387), (2016).
  • , Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook, Information Systems Research, 27, 4, (848), (2016).
  • , Disclosure Management on Social Network Sites: Individual Privacy Perceptions and User-Directed Privacy Strategies, Social Media + Society, 2, 1, (205630511663436), (2016).
  • , This backyard is my serenity place: learning from incarcerated women about the architecture and design of restorative justice, Restorative Justice, 4, 2, (214), (2016).
  • , Home is Private…Do Not Enter! Introversion and Sensitivity to Work–Home Conflict, Stress and Health, 32, 4, (441-445), (2014).
  • , Political Attitudes on the Dutch Electronic Patient Record, E-Health and Telemedicine, 10.4018/978-1-4666-8756-1.ch060, (1207-1221), (2016).
  • , Adapting to Surveillance and Privacy Issues in the Era of Technological and Social Networking, International Journal of Social Science and Humanity, 5, 6, (572), (2015).
  • , Safety, Security, and Privacy in Future IT Environments, Ethical IT Innovation, 10.1201/b19060-9, (97-112), (2015).
  • , Privacy, The Wiley Blackwell Encyclopedia of Consumption and Consumer Studies, (1-4), (2015).
  • , Consumer Personality, Privacy Concerns and Usage of Location-Based Services (LBS), Journal of Economics, Business and Management, 3, 10, (2015).
  • , Privacy and human behavior in the age of information, Science, 347, 6221, (509), (2015).
  • , The Emergence of Mobile Social Network Platforms on the Mobile Internet, The Wiley Handbook of Psychology, Technology, and Society, (321-338), (2015).
  • , Consumer adoption of personalised nutrition services from the perspective of a risk–benefit trade-off, Genes & Nutrition, 10, 6, (2015).
  • , From trait to state: understanding privacy concerns, Journal of Consumer Marketing, 32, 2, (99), (2015).
  • , Surfing on Social Network Sites, Computers in Human Behavior, 49, (30), (2015).
  • , Examining Applicant Reactions to the Use of Social Networking Websites in Pre-Employment Screening, Journal of Business and Psychology, 30, 1, (73), (2015).
  • , The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns, Decision Support Systems, 57, (343), (2014).
  • , Coping with information requests in marketing exchanges: an examination of pre-post affective control and behavioral coping, Journal of the Academy of Marketing Science, 42, 4, (415), (2014).
  • , What Are You Worrying About on Facebook and Twitter? An Empirical Investigation of Young Social Network Site Users’ Privacy Perceptions and Behaviors, Journal of Interactive Advertising, 14, 2, (51), (2014).
  • , Political Attitudes on the Dutch Electronic Patient Record, International Journal of Privacy and Health Information Management, 10.4018/ijphim.2014010103, 2, 1, (34-50), (2014).
  • , An interactive ethical assessment of surveillance‐capable software within the home‐help service sector, Journal of Information, Communication and Ethics in Society, 11, 1, (43), (2013).
  • , Managing and controlling HIV/AIDS talk among Ghanaians living with HIV/AIDS, Communicatio, 39, 3, (319), (2013).
  • , The Concept of Privacy and the Malay Dwelling Interior Space Planning, Procedia - Social and Behavioral Sciences, 101, (404), (2013).
  • , Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts, European Journal of Information Systems, 22, 3, (295), (2013).
  • , Presentation Formats of Policy Statements on Hotel Websites and Privacy Concerns, Journal of Hospitality & Tourism Research, 37, 4, (470), (2013).
  • , “Privacy” in Semantic Networks on Chinese Social Media: The Case of Sina Weibo, Journal of Communication, 63, 6, (1011-1031), (2013).
  • , Identity Profiles in Lesbian, Gay, and Bisexual Youth: The Role of Family Influences, Journal of Youth and Adolescence, 42, 3, (417), (2013).
  • , Monitoring Social Life and Interactions, Human Behavior Recognition Technologies, 10.4018/978-1-4666-3682-8.ch011, (225-248), (2013).
  • , Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data, Financial Cryptography and Data Security, 10.1007/978-3-642-27576-0_1, (1-15), (2012).
  • , Biometric solutions for today's travel security problems, Journal of Hospitality and Tourism Technology, 3, 3, (176), (2012).
  • , Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services, Information Systems Research, 23, 4, (1342), (2012).
  • , Voluntary Steps toward Air Travel Security, Journal of Travel Research, 51, 4, (436), (2012).
  • , The Impact of Relative Standards on the Propensity to Disclose, Journal of Marketing Research, 10.1509/jmr.09.0215, 49, 2, (160-174), (2018).
  • , Why do close partners snoop? Predictors of intrusive behavior in newlywed couples, Personal Relationships, 18, 1, (110-124), (2010).
  • , A Grounded Theory of Control over Communication Among Individuals with Cancer, Journal of Applied Communication Research, 39, 3, (310), (2011).
  • , Towards an alternative concept of privacy, Journal of Information, Communication and Ethics in Society, 9, 4, (220), (2011).
  • , A comparative study of online privacy regulations in the U.S. and China, Telecommunications Policy, 35, 7, (603), (2011).
  • , Consumer Responses to the Introduction of Privacy Protection Measures, E-Business Applications for Product Development and Competitive Growth, 10.4018/978-1-60960-132-4.ch008, (161-185), (2011).
  • , Online Privacy as a News Factor in Journalism, Privacy Online, 10.1007/978-3-642-21521-6_15, (205-218), (2011).
  • , Ethical issues in Computer‐Assisted Language Learning: Perceptions of teachers and learners, British Journal of Educational Technology, 41, 5, (796-813), (2009).
  • , You’ve been tagged! (Then again, maybe not): Employers and Facebook, Business Horizons, 53, 5, (491), (2010).
  • , Locus of Control and Location Privacy: An Empirical Study in Singapore, Journal of Global Information Technology Management, 13, 3, (63), (2010).
  • , Monitoring Employee Use of the Internet in Philippine Organizations, The Electronic Journal of Information Systems in Developing Countries, 40, 1, (1), (2010).
  • , Privacidade física referente à exposição e manipulação corporal: percepção de pacientes hospitalizados, Texto & Contexto - Enfermagem, 19, 1, (36), (2010).
  • , Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry, Electronic Commerce Research and Applications, 9, 1, (50), (2010).
  • , Customer Information Sharing with E-Vendors: The Roles of Incentives and Trust, International Journal of Electronic Commerce, 10.2753/JEC1086-4415140304, 14, 3, (63-91), (2014).
  • , Privacy and control: Are they related?, Psychological Studies, 10.1007/s12646-010-0014-5, 55, 2, (108-117), (2010).
  • , PRIVACY AS ROGUERY: PERSONAL FINANCIAL INFORMATION IN AN AGE OF TRANSPARENCY, Public Administration, 87, 4, (717-731), (2009).
  • 2009 International Conference on Computational Science and Engineering Vancouver, BC, Canada 2009 International Conference on Computational Science and Engineering IEEE , (2009). 978-1-4244-5334-4 Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0 , (2009). 990 995 5283753 , 10.1109/CSE.2009.434 http://ieeexplore.ieee.org/document/5283753/ 2009 Eighth International Conference on Mobile Business Dalian, Liaoning, China 2009 Eighth International Conference on Mobile Business IEEE , (2009). 978-0-7695-3691-0 Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States , (2009). 278 283 5169272 , 10.1109/ICMB.2009.54 http://ieeexplore.ieee.org/document/5169272/
  • , Counter design influences the privacy of patients in health care, Social Science & Medicine, 68, 6, (1000), (2009).
  • 2009 42nd Hawaii International Conference on System Sciences, (2009).110.1109/HICSS.2009.31
  • , Consumer privacy issues in mobile commerce: a comparative study of British, French and Romanian consumers, Journal of Consumer Marketing, 26, 7, (496), (2009).
  • , Behavioral Mapping of Residents’ Activity in Five Residential Style Care Centers for Elderly Persons Diagnosed with Dementia: Small Differences in Sites Can Affect Behaviors, Journal of Housing For the Elderly, 23, 4, (335), (2009).
  • 2009 42nd Hawaii International Conference on System Sciences, (2009).110.1109/HICSS.2009.255
  • , Internet Users' Privacy Concerns and Beliefs About Government Surveillance, Handbook of Research on Information Management and the Global Landscape, 10.4018/978-1-60566-138-4.ch013, (229-257)
  • , The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services, Journal of Management Information Systems, 10.2753/MIS0742-1222260305, 26, 3, (135-174), (2014).
  • , Internet privacy concerns and beliefs about government surveillance – An empirical investigation, The Journal of Strategic Information Systems, 17, 3, (214), (2008).
  • , Employee attitudes to information sharing: a case study at the European Central Bank, Records Management Journal, 18, 3, (194), (2008).
  • , Adolescents' Perceptions of Privacy Invasion in Reaction to Parental Solicitation and Control, The Journal of Early Adolescence, 28, 4, (583), (2008).
  • , Challenges of Capturing Natural Web-Based User Behaviors, International Journal of Human–Computer Interaction, 10.1080/10447310801973739, 24, 4, (385-409), (2008).
  • , Privacy and intrusion in ethnographic health research, Access, a Zone of Comprehension, and Intrusion, 10.1016/S1474-7863(08)12005-1, (83-96)
  • , Online Privacy: Measuring Individuals’ Concerns, E-Commerce and Web Technologies, 10.1007/978-3-540-85717-4_3, (21-30), (2008).
  • , Perceived Control, Digital Privacy, 10.1201/9781420052183.ch13, (267-281), (2009).
  • , Personal Information, Borders, and the New Surveillance Studies, Annual Review of Law and Social Science, 3, 1, (375), (2007).
  • , Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective, Journal of the Academy of Marketing Science, 10.1007/s11747-006-0003-3, 35, 4, (572-585), (2007).
  • , Technologiepaternalismus — Soziale Auswirkungen des Ubiquitous Computing jenseits von Privatsphäre, Die Informatisierung des Alltags, 10.1007/978-3-540-71455-2_16, (311-325), (2007).
  • , Your privacy is assured - of being disturbed: websites with and without privacy seals, New Media & Society, 8, 6, (1009), (2006).
  • , Privacy calculus model in e-commerce – a study of Italy and the United States, European Journal of Information Systems, 15, 4, (389), (2006).
  • , Patients’ attitudes towards sharing their health information, International Journal of Medical Informatics, 75, 7, (530), (2006).
  • , Technology paternalism – wider implications of ubiquitous computing, Poiesis & Praxis, 4, 1, (6), (2006).
  • , Four challenges for a theory of informational privacy, Ethics and Information Technology, 10.1007/s10676-006-9121-3, 8, 3, (109-119), (2006).
  • , Seeing Hazily (But Not Darkly) Through the Lens: Some Recent Empirical Studies of Surveillance Technologies, Law & Social Inquiry, 30, 2, (339-399), (2006).
  • , Privacy Considerations in Location-Based Advertising, Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges, 10.1007/0-387-28918-6_8, (71-90), (2005).
  • 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the Big Island, HI, USA 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the IEEE , (2004). 0-7695-2056-1 Privacy issues in location-aware mobile devices , (2004). 10 pp. 1265320 , 10.1109/HICSS.2004.1265320 http://ieeexplore.ieee.org/document/1265320/
  • , Can You Keep a (Genetic) Secret? The Genetic Privacy Movement, Journal of Genetic Counseling, 13, 4, (273-291), (2004).
  • , Employees’ experiences of the stigma of HIV in a retail organisation: secrecy, privacy or trust?, African Journal of AIDS Research, 10.2989/16085906.2018.1536671, (1-10), (2018).
  • , An Investigation of Attitudes of Students Towards Privacy on Facebook, Akdeniz Üniversitesi İletişim Fakültesi Dergisi, 10.31123/akil.441782, 29, (368-384), (2018).
  • , Cloud privacy objectives a value based approach, Information and Computer Security, 10.1108/ICS-05-2017-0034, (2019).
  • , Self-censorship in social networking sites (SNSs) – privacy concerns, privacy awareness, perceived vulnerability and information management, Journal of Information, Communication and Ethics in Society, 10.1108/JICES-07-2018-0060, (2019).