Privacy controls as an information source to reduce data poisoning in artificial intelligence-powered personalization

被引:18
作者
Cloarec, Julien [1 ]
机构
[1] Univ Jean Moulin Lyon 3, Iaelyon Sch Management, Lyon, France
关键词
Protection motivation theory; Privacy control; Vulnerability; Self-efficacy; Falsifying information; PROTECTION MOTIVATION THEORY; SELF-EFFICACY; FEAR APPEALS; SOCIAL NETWORKS; ONLINE; SECURITY; MODEL; RESPONSIBILITY; DISCLOSURE; CUSTOMERS;
D O I
10.1016/j.jbusres.2022.07.045
中图分类号
F [经济];
学科分类号
02 ;
摘要
The latest advances in data-driven marketing, such as real-time personalization, have increasingly made con -sumers more vulnerable. In response, some consumers deliberately falsify information in order to redress the balance of power, a practice that constitutes a serious threat to the digital economy. The topic of falsification is still largely under-researched in information systems and marketing. Based on protection motivation theory, the author conceptualizes privacy controls as a source of information and the falsification of information as a coping response, with vulnerability representing the threat appraisal mechanism and self-efficacy the coping appraisal mechanism. Through a within-subject experiment (n = 207), the results of the mediation analysis for repeated measures show that the effect of privacy controls as a source of information on the falsification of information is fully mediated by vulnerability and self-efficacy. The author provides insights for managers regarding the sig-nificant trade-off between reducing consumer vulnerability and maintaining the usefulness of the data.
引用
收藏
页码:144 / 153
页数:10
相关论文
共 95 条
[71]   Disclosure Antecedents in an Online Service Context: The Role of Sensitivity of Information [J].
Mothersbaugh, David L. ;
Foxx, William K., II ;
Beatty, Sharon E. ;
Wang, Sijun .
JOURNAL OF SERVICE RESEARCH, 2012, 15 (01) :76-98
[72]   Past the Privacy Paradox: The Importance of Privacy Changes as a Function of Control and Complexity [J].
Mourey, James A. ;
Waldman, Ari Ezra .
JOURNAL OF THE ASSOCIATION FOR CONSUMER RESEARCH, 2020, 5 (02) :162-180
[73]   Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory [J].
Mousavi, Reza ;
Chen, Rui ;
Kim, Dan J. ;
Chen, Kuanchin .
DECISION SUPPORT SYSTEMS, 2020, 135
[74]   Coping with information requests in marketing exchanges: an examination of pre-post affective control and behavioral coping [J].
Norberg, Patricia A. ;
Horne, Daniel R. .
JOURNAL OF THE ACADEMY OF MARKETING SCIENCE, 2014, 42 (04) :415-429
[75]  
Palmatier R.W., 2019, The Intelligent Marketer's Guide to Data Privacy, P153, DOI [10.1007/978-3-030-03724-6_8, DOI 10.1007/978-3-030-03724-6_8]
[76]   Information Privacy Research: Framework for Integrating Multiple Publics, Information Channels, and Responses [J].
Peltier, James W. ;
Milne, George R. ;
Phelps, Joseph E. .
JOURNAL OF INTERACTIVE MARKETING, 2009, 23 (02) :191-205
[77]   Consumers' Rules of Engagement in Online Information Exchanges [J].
Poddar, Amit ;
Mosteller, Jill ;
Ellen, Pam Scholder .
JOURNAL OF CONSUMER AFFAIRS, 2009, 43 (03) :419-448
[78]   Common method biases in behavioral research: A critical review of the literature and recommended remedies [J].
Podsakoff, PM ;
MacKenzie, SB ;
Lee, JY ;
Podsakoff, NP .
JOURNAL OF APPLIED PSYCHOLOGY, 2003, 88 (05) :879-903
[79]   Consumer intentions to falsify personal information online: unethical or justifiable? [J].
Punj, Girish .
JOURNAL OF MARKETING MANAGEMENT, 2017, 33 (15-16) :1402-1412
[80]   PROTECTION MOTIVATION THEORY OF FEAR APPEALS AND ATTITUDE-CHANGE [J].
ROGERS, RW .
JOURNAL OF PSYCHOLOGY, 1975, 91 (01) :93-114