The effect of online privacy policy on consumer privacy concern and

Computers in Human Behavior 28 (2012) 889–897
Contents lists available at SciVerse ScienceDirect
Computers in Human Behavior
journal homepage: www.elsevier.com/locate/comphumbeh
The effect of online privacy policy on consumer privacy concern and trust
Kuang-Wen Wu a,1, Shaio Yan Huang b,2, David C. Yen c,⇑, Irina Popova d,1
a
Department of International Trade, Feng Chia University, No. 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan
Department of Accounting and Information Technology, Advanced Institute of Manufacturing with High-tech Innovations, National Chung Cheng University, No. 168 University Rd.,
Minhsiung Township, Chiayi County 62102, Taiwan
c
Department of DSC & MIS, Miami University, Oxford, OH 45056, United States
d
Feng Chia University, No. 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan
b
a r t i c l e
i n f o
Article history:
Available online 24 January 2012
Keywords:
Trust
Privacy policy
Privacy concern
Personal information
Culture
a b s t r a c t
This study aims to investigate trust and privacy concerns related to the willingness to provide personal
information online under the influence of cross-cultural effects. This study investigated the relationships
among the content of online privacy statements, consumer trust, privacy concerns, and the moderating
effect of different cultural backgrounds of the respondents. In specific, this study developed a proposed
model based on Privacy–Trust–Behavioral Intention model. Further, a total of 500 participants participated in the survey, including 250 from Russia and 250 from Taiwan. The findings indicate a significant
relationship between the content of privacy policies and privacy concern/trust; willingness to provide
personal information and privacy concern/trust; privacy concern and trust. The cross-cultural effect on
the relationships between the content of privacy policies and privacy concern/trust was also found
significant.
Ó 2011 Elsevier Ltd. All rights reserved.
1. Introduction
Nowadays, the Internet has become an integral part of our lives.
It has penetrated all sectors of our daily activities: business, communication, shopping, and personal life. There are various types
of online activities offered currently such as Internet shopping,
Web service, e-mail, forum, blog, online game, online banking, online trading, online learning, etc. According to the latest data from
Internet World Statistics, there are 45.3 million Internet users in
Russia and 15.1 million people using the Internet in Taiwan. In
the whole world, there are more than 1.7 billion Internet users.
Globalization and the omnipresent nature of the Internet make
using online activities easier across nations. These activities demand a new conceptual view of online consumers’ behaviors
which take into consideration cross-cultural effects (Phelps, Souza,
& Nowak, 2001). Cultural differences, starting with Hofstede’s
(2001) work, have become an important construct for international
studies.
As the Internet has no borders or regulated restrictions, privacy
becomes a major concern for all online activities. Specifically, consumer apprehensions include the increase of databases, volume of
collected personal data, the possibility of privacy violations, loss of
⇑ Corresponding author. Tel.: +1 513 529 4827; fax: +1 513 529 9689.
E-mail addresses: kwwu@fcu.edu.tw (K.-W. Wu), actsyh@yahoo.com.tw (S.Y.
Huang), yendc@muohio.edu (D.C. Yen), asttw7@gmail.com (I. Popova).
1
Tel.: +886 4 24517250x4265; fax: +886 4 24510409.
2
Tel.: +886 5 2720411x34501; fax: +886 5 2721197.
0747-5632/$ - see front matter Ó 2011 Elsevier Ltd. All rights reserved.
doi:10.1016/j.chb.2011.12.008
control during the process of collecting, accessing, and how the
information could be utilized (Culnan, 1993; Hiller & Cohen,
2001). Online companies place their privacy policies on their websites to build consumer trust. Online privacy policies are aimed at
reducing the fear that their personal information will be disclosed
(Westin, 1967). Such privacy policies are usually built around the
US Federal Trade Commission’s (FTC) five widely accepted principles of fair information practices which are notice, choice, access,
security, and enforcement. Notice is the most fundamental principle, which means consumers should be given notice of an entity’s
information practices before any personal information is collected
and/or obtained from them. Choice means giving consumers the
options as to how to use any personal information collected from
them. Access provides for users’ access to their own data with a
possibility to view the data and also check for data’s accuracy
and completeness. Security means that data must be accurate and
secure. To assure data integrity, collectors must take reasonable
steps and/or actions providing consumers’ access to data, deleting
untimely data, and/or converting it to an anonymous form. Enforcement is one of the core principles of privacy protection which can
only be effective only if there is a mechanism or instrument in
place to enforce them. These are based on national and international reports and guidelines on the use of personal information.
It seems that privacy notices have become an important means
for reducing consumers’ privacy concerns by providing them with
information about how companies use the collected data. It helps
consumers decide whether or not to provide personal information
online or whether or not to even use the website at any level
890
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
(Culnan & Milberg, 1998). FTC principles have become widely used
as a base for building privacy notices. Due to the fact that the
Internet is a global phenomenon, online privacy concerns also
become global. Many solutions cannot work or cannot be implemented because consumer thoughts regarding privacy have been
ignored (Hofstede, 2001). Hence, there is a need for research to
investigate why consumers with different cultures react differently
to the content of various privacy policies which may influence their
trust or willingness to provide personal information. Moreover, the
findings based on the data from Taiwan can be a reference for western businesses which are interested in Pan-Chinese regions such
as Hong Kong, Macau, Singapore, and China. As for the findings
based on the data from Russia, these can be a reference for businesses which are interested in east Europe regions such as Latvia
and Yugoslavia.
2. Literature review
2.1. Trust and privacy concern in e-commerce
Online customers often measure the risk of online activity about
information privacy misuse or reveal (Milne & Culnan, 2004). They
must have feelings of trust toward the websites before revealing
information (Schoenbachler & Gordon, 2002). Many research studies propose that concerns over information privacy as well as trust
currently stifle e-commerce. While the regular business sales force
plays a key role in customer interface and market strategy implementation by developing customer trust (Doney & Cannon,
1997), trust assumes a more crucial role in an e-commerce context
where a sales force is not deployed. Businesses anticipate that
many millions of dollars of e-commerce can be conducted if customers’ concerns, including privacy, can be adequately addressed
(Odom, Kumar, & Saunders, 2002). However, completing a transaction without disclosing some personal data is very difficult, if not
impossible, even to a trusted third party (Ackerman, Cranor, &
Reagle, 1999). The research suggests that the willingness to provide personal information on-line is an important issue in e-commerce as well as a trust and privacy concern and can influence
the success of e-businesses.
Privacy has been a sensitive subject long before the invention of
computers. It was defined as the desire of people to choose freely
under what circumstances and to what extent they will expose
themselves, their attitude, and their behavior to others (Westin,
1967). Anonymity, which means to keep the remaining, unidentified information in the public realm, is another crucial concept related to privacy. It means to be able to. Nowadays, the spread of the
Internet eliminates the ability of people using the Web to remain
unidentified. Online users leave a lot of electronic footprints detailing their behavior and preferences that can be easily obtained,
used, or shared with strangers (Zviran, 2008). Because of the rapid
development of new Web technologies, the privacy of Internet
users can be invaded in many different ways. Furthermore, consumers have no control over the secondary use of the personal
information they provide during their Internet activity. In 2004,
more than half of large US firms monitored their employees’ e-mail
(Conley, 2004), which means the firms recorded their employees’
e-mail recipients, e-mail senders, number of words in the e-mail,
time the e-mail was sent, time spent composing e-mail, number
of attachments, and type of e-mail.
The World Wide Web created opportunities for companies to
extend their businesses globally and supported them switching
their activities to the Internet by including online shops, online
auctions, business to business (B2B) and business to consumer
(B2C) platforms, etc. E-commerce provides advantages for Internet
users such as online services, access to product related
information, and easy and fast communication. On the other hand,
huge amounts of personal information about customers are being
collected and utilized by companies through registration forms
and order forms and/or through the use of tracking software or
cookies. This information obtained allows businesses to follow customers’ online activities and gather information about personal
interests and preferences. These data become valuable to companies, as they help identify their customers’ demands, create effective advertising programs, and better sell advertising space on
their websites (Liu, Marchewka, & Ku, 2004b).
In the paper-and-ink world, the sheer physical effort of collecting, archiving, and analyzing such data acts as a deterrent which
helps to protect privacy to a certain extent (Blanchette & Johnson,
2002). However, the growth of technology-based systems not only
changes the quantity and the quality of what can be collected, but
also allows it to be explored and analyzed in increasingly sophisticated ways (O’Connor, 2006). Due to the dramatic increase of various Internet businesses and forms of activities, online users are
normally alerted to privacy concerns. According to a survey by
the American Electronic Privacy Information Center, 90% of respondents feel that privacy is the most pressing concern when shopping
online, rating it more important than prices or return policies (EPIC
Alert 7.16, 2000). Consumer apprehensions also include the increase of databases, volume of collected personal data, and the
possibility of privacy violations, loss of control during the process
of collecting, accessing, and utilizing the information (Culnan,
1993).
Online privacy concern leads to a lack of willingness to provide
personal information online, rejection of e-commerce, or even
unwillingness to use the Internet. Consumer concerns over privacy
not only limit the development of electronic commerce, but may
also affect the validity and completeness of consumer databases,
which may lead to inaccurate targeting, wasted effort, and frustrated customers. To avoid such inaccuracies, Internet companies
should ensure users that their privacy is well protected. The issue
comes down to the level of trust between the consumer and the
company.
Many researchers see this fight for trust as one of the prime barriers to the continued growth of the e-commerce, particularly as
less technically sophisticated consumers who log online are less
capable of distinguishing the valid threats from media hype
(Grabner-Kraeuter, 2002). Building trust becomes a key element
to reduce the privacy concerns of consumers and to improve relationships between consumers and businesses (Milne & Boza,
2000). With the advance of electronic commerce, some consumers
have become concerned about the disclosure, transfer, and sale of
information which businesses have collected from them. These
concerns purportedly are slowing the rate of expansion of electronic commerce (Rubin & Lenard, 2001). Willingness to provide
personal information online is closely related to concerns over privacy. One of the ways to improve consumers’ trust and reduce privacy concern is to build a privacy policy. Such policies provide an
explanation to customers about how websites will use personal
data and consequently inform them about security tools and protection systems of the websites.
2.2. Evolution of privacy policy regulations
Consumers realize that providing personal data can be beneficial. Many know that detailed, accurate information will result in
higher service quality, more relevant messages, and promotions.
Therefore, consumers are willing to provide personal information
but only under certain circumstances (Godin, 1999). A survey
found that 65% of respondents were more willing to provide information online if they had a guarantee that this information would
not be misused (Hinde, 1998). Other studies show that consumers
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
would cooperate better if they had the right to force companies to
delete personal information at a later date (Gilbert, 2001).
The privacy issue was noticed at the beginning of data computerization, long before the spread of the Internet. In 1970, the US
Congress adopted the Privacy Act which contained the main principles of Fair Information Practice (FIPPS) including transparency,
use limitation, access and correction, data quality, and security.
The Organization for Economic Cooperation and Development
(OECD) guidelines were introduced in 1980 and played a significant role in the development of guidelines for the Protection of Privacy Flows of Personal Data. The OECD guidelines contained eight
principles including the collection limitation principle, data quality
principle, purpose specification principle, use limitation principle,
security safeguards principle, openness principle, individual participation principle, and accountability principle. These principles
were widely adopted due to their breadth reflecting real-world
flexibility, but the implications of these principles caused some
restrictions and inconvenience for data processors.
In 1990, the commission of the European Community published
the EU Data Protection Directive Principles. It contained eight main
principles. Though the directives focused more on notice and consent, those principles were applied in Europe, Canada, Japan, and
other countries following FIPPS. In mid-1990, the Federal Trade
Commission encouraged commercial websites to publish online
privacy policies. In 1998, the FTC offered its suggestions for a privacy policy. They developed five core principles common to ‘‘fair
information practices’’ of USA, Canada, and Europe including notice/awareness, choice/consent, access/participation, integrity/
security, and enforcement/redress.
In 2004, the APEC Privacy Framework, presented by the Asia–
Pacific Economic Cooperation forum, basically modernized the
OECD Guidelines and included nine principles including Preventing
Harm, Notice, Collection Limitation, Uses of Personal Information,
Choice, Integrity of Personal Information, Security Safeguards, Access and Correction, and Accountability. Nowadays the problem
of which set of FIPPS to apply often occurs. The OECD Guidelines
provide eight, the EU data protection directives eleven, and the
FTC principles only five. Some of the FIPPS provide principle while
some others do not and different FIPPS have different focuses. After
evaluating the existing FIPPS, the FTC principles were chosen as the
most flexible and realistic system. It reflects a materially different
orientation towards data protection than that of earlier FIPPS. The
FTC principles are more concerned with the data collection related
to the consumers and the associated risks that the data collected
would be used for some unanticipated purposes.
891
privacy concerns only if consumers read and use the information
contained in the policies. If the policy is not perceived as comprehensible then it is less likely to be reviewed by users. On the contrary, when consumers perceive that they can comprehend the
Privacy Policy, they are more likely to read the policy and trust
it. This positive relationship was found between online privacy policy and trust (Milne & Culnan, 2004).
At the same, time there is evidence that consumers are often
not consistent about reading privacy policies. Only 54% of respondents indicated they would read the privacy policy upon first visiting a website. Sixty-six percentage of indicated increased
confidence in the website if a privacy policy is present. This may
suggest that most Internet users are reassured by the presence of
a privacy policy, but are less concerned about specific provisions
of the policy (Earp & Baumer, 2001).
H1. Online privacy policy has a negative impact on privacy
concern.
2.4. Privacy policy and trust
Companies try to use different ways to build consumers’ trust in
their websites including an electronic seal for financial transactions providing evidence of the security of website data and online
privacy policy. Liu, Marchewka, Lu, and Yu (2004a) found that a
successful relationship between buyer and seller depends on the
level of the buyer’s trust which is shown in their Privacy–Trust–
Behavioral Intention model. The model explains how privacy influences trust and then, trust influences consumer behavioral intention for online transactions.
Based on the results of the study, strong support exists for the
model. Relationships between privacy dimensions and trust were
found to be significant, but the model does not test the influence
of the presence of FTC categories on privacy concerns. It does not
suggest what kind of content or what format a privacy policy shall
have. Some studies argue that to build trust, privacy policies
should be informative and reassure consumers that disclosing their
personal information is a low-risk proposition (Dinev & Hart,
2006a; Milne & Boza, 2000). It was also noted that a clear and credible Privacy Policy helps marketers build a positive reputation with
consumers (Schoenbachler & Gordon, 2002).
H2. Online privacy policy has positive impact on trust.
2.5. Privacy concern and trust
2.3. Privacy policy and privacy concern
Research shows that people perform a simple risk–benefit calculation when deciding whether or not to disclose their personal
information (Laufer & Wolfe, 1977). If the benefits of disclosure
outweigh the risks, consumers are more likely to disclose. Privacy
notice is an important means for reducing the risk of disclosing
personal information online. It informs consumers about the firm’s
information practices. This information helps users decide whether
or not they want to provide personal data or to choose not to engage in the website at all (Culnan & Milberg, 1998).
Public opinion surveys find that most consumers are concerned
about losing control over the ways in which websites handle their
personal information. This means they indicate high privacy concern. Sixty percentage of users who provided false personal information would be willing to supply their real information if the
website provided notice about how this information would be used
(Harris Interactive, Inc. and Westin, 1997). It suggests that privacy
concerns could be decreased if websites would present comprehensible Privacy Policies. The Privacy Policy is able to reduce
There is a lot of evidence showing significant relationships between trust and privacy concern regardless of providing Personal
Information online. Many researchers propose that concerns for
information privacy are a huge barrier for e-commerce businesses.
Businesses anticipate that more than a trillion dollars of e-commerce could be conducted if customers’ concerns for privacy could
be reduced (Odom et al., 2002). Completing a transaction without
disclosing some personal data is very difficult, even if that disclosure
is made to a trusted third party, so privacy becomes a necessary concern in e-commerce (Ackerman et al., 1999). Without trusted people
retaining personal data that prevents others from seeing or using
that data (Gibb, 1694), increasing perceptions of trust will influence
the privacy concern to permit the customer to determine that the
benefits of disclosure of personal information outweigh the risks
(Luo, 2002). McKnight and Chervany (2002) see trust as a precedent
of information sharing, which reduces privacy concern.
H3. Privacy concern has negative impact on trust.
892
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
2.6. Privacy concern and willingness to provide personal information
Internet technologies allow websites to monitor the actions of
their visitors and use this information to personalize content. Consumers also benefit by getting content better matched to their personal needs, wants, and interests. Internet users may find it
beneficial when websites remember basic information about them
and use it to provide a customized service. Although such personalization brings benefits to both parties, if its use comes out, it is a
threat to personal privacy. The power of the Web to obtain, organize, and facilitate the distribution of personal information is
amazing (Valentine, 2000). Sites are able to create click-stream
data, which identifies where the user came from and goes, what
he was looking at and for how long, and even the user’s email address. Such information is collected automatically and often without the user’s knowledge or permission (Kelly, 2000).
A variety of studies have shown that consumers are increasingly
concerned about the lack of privacy protection during online activities. According to a survey of Web users, almost 95% of them
declined to provide personal information to websites at one time
or another when such information was asked (Hoffman, Novak, &
Peralta, 1999b). Another survey showed that 92% of Web users
are worried about online privacy and 61% refused to make purchases online (Ryker, LaFleur, Cox, & McManis, 2002). Consumers’
fears over the misuse of personal data have become the biggest
challenge facing online retailers and online businesses (Kandra &
Brandt, 2003). Such fears lead to providing falsified personal information. Nearly one fifth of consumers maintain a secondary email
address to avoid giving a website their real information (Phelps
et al., 2001). Others simply go elsewhere when required to provide
personal information (EPIC Alert 7.16, 2000).
It is obvious that privacy concerns have a strong influence over
the willingness to provide personal information. Consumers who
are concerned about their online privacy will be unwilling to disclose personal data to websites (Nam, Song, Lee, & Park, 2006;
Wirtz, Lwin, & Williams, 2007) or could be unwilling to make
transactions, as most of such transactions require disclosing credit
card numbers, telephone numbers, e-mail, and postal addresses
(Dinev & Hart, 2006a).
H4. Privacy concerns have a negative impact on willingness to
provide personal information.
2.7. Trust and willingness to provide personal information
The extended privacy calculus model suggested by Dinev and
Hart (2006a, 2006b) shows strong positive relationships between
trust and users’ willingness to provide personal information during
Internet activities. There are many research studies conducted
identifying dimensions of trust in Hyperspace. Some of them are
familiarity, exchange trust, and information privacy trust. According to the theory of Trust and Power, familiarity is a required condition of trust (Luhmann, 1979). The study of Shim, Slyke, Jiang,
and Johnson (2005) showed strong positive relationships between
a high level of familiarity and a high level of trust. In other research, familiarity was found as a predictor of trust (Bhattacherjee,
2002). Exchange trust is defined as consumer confidence that the
website will fulfill its obligations concerning the given promises
(Singh & Sirdeshmukh, 2000). Information privacy trust is violated
by unauthorized tracking and unauthorized information dissemination and refers to a website’s privacy protection responsibilities
(Hoffman, Novak, & Peralta, 1999a). In this way, trust may be
developed through the effective communication of privacy safeguards, market signals that effectively convey high reputation
and credibility, and previous favorable consumer experiences of
perceived value. The development of trust between direct marketers and consumers reduces consumers’ perceived risk, which then
improves consumers’ willingness to share their personal information with marketers.
H5. Trust has positive impact on willingness to provide personal
information.
2.8. Culture difference
Zhang, Sakaguchi, and Kennedy (2007) analyzed the online privacy statements of leading international companies in the USA,
China, Japan, UK, and Australia. The research was based on two factors: degree of application of FTC privacy principles to the online
privacy statement in different countries and the degree of dependence of such application on IDV index (Hofstede’s theory) for
those countries. The study found that individualistic and collectivist countries differ in terms of Privacy Policy focuses. Individualistic countries focus more on the aspect of Notice with privacy
policies, while collectivist countries focus more on the aspect of
choice. As a result, it assumed that for the Internet as a global
hyperspace, a consumer’s cultural background would moderate
his or her attitude toward online privacy concerns and trust.
Pavlou and Chai (2002) in their imperial study propose that cultural differences influence the e-commerce model and moderate
its key relationships. They found that the role of cultural differences was worth attention which emphasized the role of cultural
aspects in multi-national e-commerce research. To investigate
such a moderating effect of cultural differences in Russia and Taiwan, this research chose power distance. Power distance actually
reflects the way a culture handles inequality (Hofstede, 2001).
For power distance, Russia has a much higher score (90) than Taiwan (58).
The research model was developed based on the Privacy–
Trust–Behavioral Intention Model (Liu et al., 2004a) and the
cross-cultural analysis of privacy notices of Global 2000 (Zhang
et al., 2007). All four culture dimensions (masculinity/femininity,
individualism/collectivism, power distance, and uncertainty avoidance) indirectly affect trust formation through the subjective norm.
In addition, power distance directly affects trust formation
(McKnight, Kacmar, & Choudhury, 2004). In high power distance
cultures, less powerful members of the society accept power to
be distributed unequally (Hofstede, 1980). This often means that
people are more likely to tolerate giving up their privacy to authorities than in low power distance cultures.
H6. Power distance moderates the relationship between online
privacy policy and privacy concerns.
H7. Power distance moderates the relationship between online
privacy policy and trust.
3. Research method
The study uses an online questionnaire to identify the relationships between each FTC category in online privacy statements of
websites and trust/privacy concern. Cultural factors such as power
distance are used as moderated variables. This study was designed
to test 7 research hypotheses.
The sample consists of voluntary online respondents in Russia
and Taiwan age 18 years old and over. The survey was conducted
online, which has advantages – low financial cost, implications,
short response time, greater control over samples, and the ability
to directly load data using analysis software (Hofstede, 2001).
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
The questionnaire was translated to Chinese and Russian by a certified translation agency and was posted to online forums. There
are 500 respondents who participated in the survey, including
250 from Russia and 250 from Taiwan.
The variables are trust, privacy concern, willingness to provide
information, and the five FTC principles: notice, choice, access,
security, enforcement. Power Distance is used as a moderating variable. The questionnaire was designed based on the measurement
from Culnan, Carlin, and Logan (2006) and Liu et al. (2004b), and
the online privacy survey was developed based on FTC principles.
The research uses 5-Point Likert-type scales with anchors ranging
from (1) strongly disagree to (5) strongly agree, and their measurement items are shown in Table 1. Moderating variable Power Distance (PDI) is measured according to the study of Hofstede (1980).
Russia’s PDI score is 90; Taiwan PDI score is 58. The questionnaire
was developed in English and then translated into Chinese and
Russian.
4. Data analysis and results
4.1. Description of data
In this research questionnaires were collected online and distributed in paper form to randomly chosen respondents of different ages at different times of day. There were a total of 500 valid
responses. The distribution of demographics was as follows:
There were 29.6% male respondents in Taiwan compared to 64%
in Russia and 70.4% female respondents in Taiwan compared to
36% in Russia participating in the survey. In Russia, 34.4% of them
were 21–25 years old, 30.4% were between 18 and 20 years old,
15% between the ages of 26 and 30, 14.4% between the ages of
31 and 35, 13.2% between the ages 31 and 40, 7.2%. In Taiwan of
participants who were 21–25 years old, 44.8% of the age between
26 and 30, 15.6% of the age 31 and 35, 9.6% of the age 31 and 40,
7.6% 18 and 20 and 41 and 50, 5.6%.
A 72.4% of the participants in Russia and 83.6% in Taiwan use
the Internet every day. In Russia, 52.8% take a brief look at the Pri-
893
vacy Policy while visiting a website and 22% read the Privacy Policy
carefully. In Taiwan, 66.8% take a brief look at the Privacy Policy
while visiting the website and 14.4% read the Privacy Policy carefully. In Russia, 74% chose to access an Interactive website, such
as an e-mail service, compared with 40.8% in Taiwan. In Russia,
26% chose to access a commercial website, such as online shops,
compared with 59.2% in Taiwan.
4.2. Test of reliability
There are two basic goals in this questionnaire design: to obtain
information relevant to the purposes of the survey and to collect
this information with maximum reliability and validity (Warwick
& Linninger, 1975). The reliability of a research instrument concerns the extent to which the instrument yields the same results
in repeated trials. The tendency toward consistency found in repeated measurements is referred to as reliability (Carmines &
Zeller, 1979).
Cronbach’s a (alpha) is commonly used as a measure of the
internal consistency of reliability. The coefficient normally ranges
between 0 and 1. The closer it is to 1.0 the greater the internal consistency of the items in the scale. Nunnaly (1978) has indicated 0.7
to be an acceptable reliability coefficient but lower thresholds are
sometimes used in the literature. The Cronbach’s a for each constructs is presented in Table 2.
4.3. Test of validity
Validity can be defined as the degree to which a test measures
what it is supposed to measure. There are basic approaches to the
validity of tests and measures including content validity and construct validity (Manson & Bramble, 1989). This study employs factorial validity as a form of construct validity that is established
through factor analysis. Factor analysis is a statistical approach
involving finding a way of condensing the information containing
a number of original variables into a smaller set of dimensions (factors) with a minimum loss of information (Hair, Black, Babin, &
Anderson, 2010). Principle Component Analysis is used to extract
Table 1
Measurement of variables.
Constructs
Dimensions
Items
Privacy policy
Notice
– The website discloses what personal information is going to be collected
– The website explains why personal information is going to be collected
– The website explains how the collected personal information will be used
Choice
– The website informs whether personal information will be disclosed to a third party and explains under what conditions
– The website gives clear choice (asking permission) before disclosing personal information to third party
Access
– The website allows you to review collected personal information
– The website allows you to correct inaccuracies in collected personal information
– The website allows you to delete personal information from the website record
Security
– The website explains that the domain takes some steps to provide security for personal information has been collected
– The website informs that any personal information will not be disclosed to third party
– The website has the advanced technology to protect your personal information
Enforcement
– The website discloses that there is a law sanctioning those who violate the privacy statement
– The website discloses that the website will take action according to the law against those who violate the privacy
statement
Privacy concern
– The website is obligated to protect privacy
– The website should NOT reveal personal information to a third party
– The website should reveal privacy policy
Trust
– Even if not monitored, I would trust the website to do the job right
– I trust the website that protects personal information
– I believe that the website is trustworthy
Willingness to provide
info.
– You are willing to provide personal information to the website
– You are forced to provide personal information to the websites
894
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
Table 2
Reliability of measurement.
Constructs
Dimensions
Cronbach’s a
Notice
Choice
Access
Security
Enforcement
.727
.756
.771
.816
.898
Privacy policy
.857
Privacy concern
Trust
Willingness to provide personal information
.816
.704
.823
Overall
.832
factors and identify the constructs more clearly. The factor loadings
in the confirmatory factor analysis are ranged from 0.70 to 0.88 for
notice, from 0.90 to 0.91 for choice, from 0.80 to 0.88 for access,
from 0.85 to 0.86 for security, from 0.94 to 0.95 for enforcement,
from 0.77 to 0.83 for trust, from 0.58 to 0.85 for privacy concern,
and from 0.71 to 0.72 for willingness to provide information. Since
each factor loading on each construct was more than 0.50, the convergent validity for each scale was established (Hair et al., 2010).
4.4. Hypotheses testing
The primary aim of structural equation modeling (SEM) is to
model covariance’s, which entails proposing a set of relations and
evaluating their consistency with the relations actually observed
in an existing data set (Bollen, 1989). SEM procedures were used
in this study because this approach permits modeling a set of relations among constructs, simultaneous estimation of all hypothesized paths, and estimation of indirect or mediating effects.
Based on Hoyle and Panter’s (1995) recommendations, several fit
indices were used to evaluate fit of the model including comparative Fit Index (CFI), the Incremental Fit Index (IFI) Bollen, 1989, and
the Root Mean Square Error of approximation (RMSEA) Browne &
Cudeck, 1989.
Fit indices evaluate model fit for the data being examined. They
help determine which proposed model best fit the data by showing
how well the parameter estimates account for the observed covariances. Models demonstrate two main types of fit which are overall
fit (chi-squared test, CFI, GFI, AGFI, NFI, and RMSEA) and local fit of
individual parameters. Additional support regarding local fit is
indicated when significant paths are found to be in the hypothesized direction and the magnitude of the item loadings is greater
than .45 (parameter estimates or standardized regression weights)
(Bentler & Wu, 1993; Joreskog & Sorbom, 1989).
A statistically non-significant chi-squared result is considered
optimal, which indicates no statistical difference between the sample and the model covariance matrices (Smith & McMillan, 2001).
Many researchers have established .90 as an appropriate criterion
for determining adequate model fit for the indices of GFI and AGFI
(Bollen & Long, 1993). MacCallum and Hong (1997) examined the
GFI and the AGFI from the perspective of power analysis, and found
that because of the influence of degrees of freedom and sample
size, it is difficult to determine appropriate values for GFI and AGFI
to indicate model fit or a lack of model fit for any particular model.
NFI is used in absolute sense where 1 equals a perfect model fit and
0 equals a complete lack of fit. An index value of .9 or above has
been conventionally regarded as indicating good fit (Bentler &
Bonett, 1980). However, it was found that NFI may not have good
value if the sample size is small (Bentler & Wu, 1993).
The model proposed in this study intends to test the relationship between the degrees of presence of each FTC category in online privacy statements of websites and trust/privacy concern;
the influence of cultural factor such as power distance on the relationships between the degrees of presence of each FTC category in
online privacy statements of websites and trust/privacy concern;
the relationships between privacy concern and trust. To test
Hypotheses H1–H5, the main effects of the model proposed in
Fig. 1, this study further applied the SEM to generate the appropriate structural model. The goodness of fit indices of the proposed
model were v2 = 776.17, df = 166, p < .001, NFI = .82, CFI = .85,
GFI = .87, and RMSEA = .086. The overall fit measures indicated that
the proposed model had achieved a marginally good fit to the data.
Fig. 2 shows the structure model with the path coefficients and tvalues.
H1 hypothesizes the existence of a negative relationship between a website’s privacy policy and online privacy concerns.
The standardized regression weights for five dimensions (notice,
choice, access, security, and enforcement) were .03, .09, .26,
.75, and .23, respectively. The relationships between the first
two dimensions, notice and choice, were not significant, so H1
was partially supported. H2 proposes the existence of a positive
relationship between a website’s privacy policy and trust. The
standardized regression weights for five dimensions were .24,
.15, .29, .32, and .16, respectively. The relationships between the
two dimensions, choice and enforcement, were not significant, so
H2 was also partially supported. H3 argues the existence of a negative relationship between online privacy concern and trust and it
was supported (standardized regression weight = .43, t-value = 3.90, p < 0.001). H4 states the existence of a negative relationship between online privacy concern and willingness to provide
personal information. Its standardized regression weight was
.17 at a significant level (t-value = 2.66, p < 0.01), H4 was also
supported. H5 addresses the existence of a positive relationship
between trust and willingness to provide personal information.
Its standardized regression weight was .59 at a significant level
(t-value = 7.03, p < 0.001), H5 was supported, too.
4.5. Moderating effect
The Power Distance Index for cultural differences between Russia and Taiwan was chosen as a moderating variable. The PDI for
Russia is 90 indicating a high PDI, while the PDI for Taiwan is 58
indicating a low PDI. The index was chosen as it appears to be
the largest difference in value between two countries compared
to the other cultural indices. Model comparison through AMOS
software was employed to assess the moderating effect of culture
on the relationships between the presence of FTC principles in Privacy Policy and Privacy Concern/Trust.
H6 argues power distance moderates the relationship between
online privacy policy and privacy concern. The result shows that
model comparison is significant between two nations when power
distance moderates the relationship between two presences, Security (p < .05) and Enforcement (p < .05) and privacy concern, which
marginally supports H6. H7 states power distance moderates the
relationship between online privacy policy and trust. The result
shows that model comparison is significant between two nations
when power distance moderates the relationship between two
presences, Access (p < .05) and Security (p < .05)and trust, which
partially supports H7.
5. Conclusion
The study is aimed at investigating how the content of Privacy
Policy relates to Trust and Privacy Concern; how Trust and Privacy
Concern relate to Willingness to Provide Personal Information online under the influence of cross-cultural effects; how the different
cultural backgrounds of the respondents can moderate the results
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
895
Power distance
H6
H7
Online privacy
concern
H4
Privacy policy
- Notice
- Choice
- Access
- Security
- Enforcement
H1
Willingness to
provide personal
information
H3
H2
H5
Trust
Fig. 1. Research model.
Privacy policy
Notice
.24
t=2.74**
-.03
t=-.26
-.09
t=-.70
Choice
Online privacy
concern
.15
t=1.33
-.17
t=-2.66**
-.26
t=-3.13**
.29
t=3.80***
Access
-.43
t=-3.90***
-.75
t=-3.56***
.59
t=7.03***
.32
t=3.84***
Security
-.23
t=-2.51**
Willingness to
provide personal
information
Trust
.16
t=1.71
Enforcement
Note. *p<.05; **p<.01; ***p<.001
Fig. 2. Structural model.
(countries compared are Russia and Taiwan). The model of the
study was developed based on the Privacy–Trust–Behavioral Intention model (Liu et al., 2004a). A total of 500 participants participated in the survey including 250 from Russia and 250 from
Taiwan. The findings indicate significant relationships between
the content of Privacy Policy and Privacy Concern/Trust; Willingness to provide personal information and Privacy Concern/Trust;
Privacy Concern and Trust. The influence of cross-cultural effects
on the relationships between the content of Privacy Policy and Privacy Concern/Trust were also found to be significant.
The Privacy–Trust–Behavioral Intention model (Liu et al.,
2004a) describes the relationship between FTC dimensions, trust,
and intention to participate in online business activities. Mostly
it can be applied to online shopping and activities involving online
transactions and focused on investigating relationships between
Trust and Behavioral Intention. The relationships between Notice,
Choice, Access, and Security were found significant to Trust, but
the model does not test how the presence of FTC Categories would
influence Privacy concern. Then, it does not suggest what kind of
content and format the Privacy Policy shall have. Based on the Privacy–Trust–Behavioral Intention model (Liu et al., 2004a) a more
complex model was developed, which allowed extending the analysis into details such as analyzing the influence of the content of
Privacy Policy (FTC categories) on Privacy Concern and Trust. There
were some variables added in order to apply the model to other
online activities: Web services, emails, forums, blogs, online
games, online trading, and online learning, etc., which require providing different types of personal data. It allowed the investigation
896
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
of how Trust and Privacy Concern relate to Willingness to Provide
Personal Information online and what the influence of cross-cultural effects is on these relationships.
The Privacy–Trust–Behavioral Intention model (Liu et al.,
2004a) is based mostly on American perceptions. The present
study extends the perception to other cultures: Asia (Taiwan)
and the West (Russia) to see how online privacy statements content relate to consumer trust and privacy concerns and how the
different cultural backgrounds of the respondents can moderate
the results. The findings indicate significant relationships between
the presence of FTC dimensions in Privacy Policy and Trust, excluding Enforcement and Choice. This confirms the results of the Privacy–Trust–Behavioral Intention model study. Significant
Influence on Privacy Concern with the presence of FTC categories
in Privacy Policy was found, excluding Notice and Choice. The relationships between Privacy Concern and Willingness to Provide Personal Information and Trust and Willingness to Provide Personal
Information are also significant. It suggests that the content of
the Privacy Policies of websites is important for users and influences their intentions to interact with websites if there is a
requirement to provide personal information. Privacy Concern
has significant influence on Trust, which confirms the previous
findings in the literature.
The research also showed that Culture has a significant moderating effect on the attitude of online users to the content of Privacy
Policy. The Power Distance Index was chosen as a moderating variable, which moderates the relationships between the presence of
Security and Enforcement in Privacy Policy and Privacy Concern
and moderates the relationships between the presence of Access
and Security in Privacy Policy and Trust. In other words, compared
to Russian online users, Taiwanese online users increase their trust
in websites when they allow access to their information and when
their personal information is secure.
The study may contribute to further research studies on the
relation between the content of Privacy Policy and Privacy Concern/Trust under cross-cultural effects. It is obvious that culture
differences play an important role in online users’ behaviors and
influence their intentions toward online activities. The results of
the study confirmed earlier findings on the influence of Privacy
Concern over Trust, Privacy Policy content over Trust as well as assessed the influence of Privacy Policy content over Privacy Concern,
Trust and Privacy Concern over Willingness to Provide Personal
Information. The Findings may help further researchers to test
the mentioned relations in more detailed ways, for example, considering different cultural dimensions such as gender and age.
The results of this study would be useful for those companies
who want to create online businesses or activities for Russia or Taiwan (or countries with similar power distance, uncertainty avoidance score), as there is a significant influence of Culture on online
users’ behavior. The companies can increase consumers’ level of
trust and willingness to provide personal data, which in return will
increase their business activity by placing correct information into
their online Privacy Policies.
It would also appear that companies can increase the level of
trust and a customer’s willingness to provide personal data by integrating the notice, access, choice, security, and enforcement
dimensions into the design of their e-commerce websites. The result of the study showed that security is the most important concern of online consumers. It means that if a website wants to
improve the trust of their customers, it needs to focus much more
on providing security and security information while building the
Privacy Policy or the website itself.
The study extends the previous research on relations between
trust, privacy concern, and the content of privacy policy to willingness to provide personal information and assesses cultural influ-
ence on these relationships. The findings should be of interest to
both academics and practitioners.
The research did not analyze the influence of gender over privacy concern/trust and the content of privacy policy. There is evidence in literature that gender may influence privacy concerns and
willingness to provide personal information. While women have a
greater tendency to self-disclosure and have shown more openness
during interviews (Fletcher & Spencer, 1984), there is some evidence that they have a stronger preference for privacy (Marshall,
1974). Age may also influence the relationship between the content of privacy policy and privacy concern/trust. Younger users
may be less concerned about privacy than older users. Some online
research studies find that online privacy worries increase with age.
The type of information collected may influence the willingness
to provide personal data. This research does not specify what kind
of information is being collected and how it is relevant to the purpose of collecting data. Also, further research could study the influence of Power Distance on privacy concern, trust, and willingness
to provide personal information. The research model can be applied to analyze the influence of other cultural dimensions over
the assessed relationships.
Reference
Ackerman, M., Cranor, F., Reagle, J. (1999). Privacy in e-commerce: examining user
scenarios and privacy preferences. In Proceedings of the first ACM conference on
Electronic commerce, Denver, Colorado (pp. 1–8).
EPIC Alert 7.16 (2000). Electronic Privacy Information Center. Washington, DC.
Bentler, P. M., & Bonett, D. G. (1980). Significance test and goodness of fit in the
analysis of covariance structures. Psychological Bulletin, 88, 588–606.
Bentler, P., & Wu, E. (1993). EQS/windows user’s guide. Los Angeles: BMDP Statistical
Software.
Bhattacherjee, A. (2002). Individual trust in online firms: scale development and
initial test. Journal of Management Information Systems, 19(3), 211–241.
Blanchette, J., & Johnson, D. G. (2002). Data retention and the panoptic society: The
social benefits of forgetfulness. The Information Society, 18(1), 33–45.
Bollen, K. (1989). Structural equations with latent variables. NY: John Wiley & Sons.
Bollen, K., & Long, J. (1993). Testing structural equation models. Newbury Park, CA:
Sage Publications.
Browne, M., & Cudeck, R. (1989). Single sample cross-validation indices for
covariance structures. Multivariate Behavioral Research, 24(4), 445–455.
Carmines, E., & Zeller, R. (1979). Reliability and validity assessment. Newbury Park,
CA: Sage Publications.
Conley, L. (2004). The privacy arms race. Fast Company.
Culnan, M. (1993). How did they get my name? An exploratory investigation of
consumer attitudes toward secondary information use. MIS Quarterly, 17(3),
341–362.
Culnan, M. J., Milberg, S. J. (1998). The second exchange: Managing customer
information in marketing relationship. Working Paper, McDonough School of
Business, Georgetown University.
Culnan, M. J., Carlin, T. J., Logan, T. A. (2006). Bentley-Watchfire survey of online
privacy practices in higher education. Unpublished Report.
Dinev, T., & Hart, C. (2006a). An extended privacy calculus model for e-commerce.
Information System Transactions Research, 17(1), 61–80.
Dinev, T., & Hart, C. (2006b). Internet privacy concerns and social awareness as
determinants of intention to transact. International Journal of Electronic
Commerce, 10(2), 7–29.
Doney, P., & Cannon, J. (1997). An examination of the nature of trust in buyer–seller
relationships. Journal of Marketing, 61(2), 35–51.
Earp, J., & Baumer, D. (2001). Innovative web use to learn about consumer behavior
and online privacy. Communications of the ACM, 46(4), 81–83.
Fletcher, C., & Spencer, A. (1984). Sex of candidate and sex of interviewer as
determinants of self-preservation orientation in interviews: An experimental
study. International Review of Applied Psychology, 33, 305–313.
Gibb, J. (1694). Climate for trust formation. In Leland P. Bradford, Jack R. Gibb, &
Kenneth D. Benne (Eds.), T-group theory and laboratory method (pp. 279–301).
New York: John Wiley.
Gilbert, J., 2001. Privacy? Who needs privacy?. Business 2.0.
Godin, S. (1999). Permission marketing: Turning strangers into friends, and friend into
customers. NY: Simon and Schuster Publishing.
Grabner-Kraeuter, S. (2002). The role of consumers’ trust in online shopping. Journal
of Business Ethics, 39(1), 43–50.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis.
Upper Saddle River, NJ: Pearson Prentice Hall.
Harris Interactive, Inc., Westin, A., 1997. Commerce communication and Privacy
online. Hackensack: Privacy and American Business.
Hiller, J. S., & Cohen, R. (2001). Internet law and policy. Upper Saddle River, NJ:
Prentice-Hall.
K.-W. Wu et al. / Computers in Human Behavior 28 (2012) 889–897
Hinde, S. (1998). Privacy and security – The drivers for growth of E-commerce.
Computers and Security, 17, 475–478.
Hoffman, D., Novak, T., & Peralta, M. (1999a). Information Privacy in the Market
space: Implications for the commercial uses of anonymity on the Web. The
Information Society, 15(2), 129–140.
Hoffman, D., Novak, T., & Peralta, M. (1999b). Building consumer trust online.
Communication ACM, 42(4), 80–85.
Hofstede, G. (1980). Motivation, leadership and organization: Do American theories
apply abroad? Organization Dynamics, 42, 63.
Hofstede, G. (2001). Culture’s consequences: Comparing values, behaviors, institutions,
and organizations across nations (2nd ed.). Thousand Oaks, CA: Sage Publications.
Hoyle, R., & Panter, A. (1995). Writing about structural equation models. In R. H.
Hoyle (Ed.), Structural equation modeling: Concepts, issues, and applications.
Thousand Oakes, CA: Sage Publications.
Joreskog, K., & Sorbom, D. (1989). LISREL7: A guide to the program and applications
(2nd ed). Chicago: SPSS.
Kandra, A., & Brandt, A. (2003). The Great American privacy makeover. PC World,
145, 160.
Kelly, E. (2000). Ethical aspects of managing customer privacy in electronic
commerce. Human Systems Management, 19(4), 237–244.
Laufer, R., & Wolfe, M. (1977). Privacy as a concept and a social issue: A
multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.
Liu, C., Marchewka, J., & Ku, C. (2004b). American and Taiwanese perceptions
concerning privacy, trust, and behavioral intentions in electronic commerce.
Journal of Global Information Management, 12(1), 18–40.
Liu, C., Marchewka, J., Lu, J., & Yu, C. (2004a). Beyond Concern: A Privacy–Trust–
Behavioral Intention Model of electronic commerce. Information & Management,
42(1), 127–142.
Luhmann, N. (1979). Trust and power. Avon, UK: Pitman Press. Translated by
Howard Davis, John Raffan and Kathryn Rooney.
Luo, X. (2002). Trust production and privacy concerns on the Internet. A framework
based on relationship marketing and social exchange theory. Industrial
Marketing Management, 31(2), 111–118.
MacCallum, R., & Hong, S. (1997). Power analysis in covariance structure modeling
using GFI and AGFI. Multivariate Behavioral Research, 32, 193–210.
Manson, E., & Bramble, W. (1989). Understanding and conducting research. USA:
McGraw-Hill.
Marshall, N. (1974). Dimensions of privacy preferences. Multivariate Behavioral
Research, 9(3), 255–272.
McKnight, D., & Chervany, N. (2002). What trust means in e-commerce customer
relationships: An interdisciplinary conceptual typology. International Journal of
Electronic Commerce, 6(2), 35–59.
McKnight, D., Kacmar, C., & Choudhury, V. (2004). Dispositional trust and distrust
distinctions in predicting high- and low-risk Internet expert advice site
perceptions. E-Service Journal, 3(2), 35–55.
Milne, G., & Boza, M. (2000). Trust and concern in consumers’ perceptions of
marketing information management practices. Journal of Direct Marketing,
13(1), 5–24.
897
Milne, G., & Culnan, M. (2004). Strategies for reducing online privacy risks: Why
consumers read (or Don’t Read) online privacy notices. Journal of Interactive
marketing, 18(3), 15–29.
Nam, C., Song, C., Lee, E., & Park, C. (2006). Consumers’ privacy concerns and
willingness to provide marketing-related personal information online. Advance
in consumer research, 33, 212–217.
Nunnaly, J. (1978). Psychometric theory. New York: McGraw-Hill.
O’Connor, P. (2006). An international comparison of approaches to online privacy
protection: Implications for the hotels sector. Journal of Services Research, 6.
Odom, M., Kumar, A., & Saunders, L. (2002). Web assurance seals: How and why
they influence consumers’ decisions. Journal of Information Systems, 16(2),
231–250.
Pavlou, P., & Chai, L. (2002). What drives electronic commerce across the cultures? A
cross-cultural empirical investigation of the theory of planned behavior. Journal
of electronic commerce research, 3(4), 240–253.
Phelps, J., Souza, G., & Nowak, G. (2001). Antecedents and consequences of
consumer privacy concerns: An empirical investigation. Journal of Interactive
Marketing, 15(4), 2–17.
Rubin, P., & Lenard, T. (2001). Privacy and the commercial use of personal information.
Kluwer Academic Publishing.
Ryker, R., LaFleur, E., Cox, C., & McManis, B. (2002). Online privacy policies: An
assessment of the fortune E-50. Journal of Computer Information Systems, 42(4),
15–20.
Schoenbachler, D., & Gordon, G. (2002). Trust and consumer willingness to provide
information in database-driven relationship marketing. Journal of interactive
marketing, 16(3), 2–16.
Shim, J., Slyke, C., Jiang, J., Johnson, R. (2005). Does trust reduce concern for
information privacy in e-commerce?’’ Annual Conference on Southern Association
for Informational System.
Singh, J., & Sirdeshmukh, D. (2000). Agency and trust mechanisms in consumer
satisfaction and loyalty judgments. Journal of the Academy of Marketing Science,
28(1), 150–167.
Smith, T., & McMillan, B. (2001). A primer of model fit indices in structural equation
modeling. New Orleans: South Educational Research Association.
Valentine, D. (2000). Privacy on the Internet: The evolving legal landscape. Santa
Clara Computer and High Tech Law Journal, 16, 407–408.
Warwick, D., & Linninger, C. (1975). The sample survey: Theory and practice. New
York: McGraw Hill.
Westin, A. (1967). The right to privacy. New York: Athenaeum.
Wirtz, J., Lwin, M. O., & Williams, J. D. (2007). Causes and consequences of consumer
online privacy concern. International Journal of Service Industry Management,
18(4), 326–348.
Zhang, X., Sakaguchi, T., & Kennedy, M. (2007). A cross-cultural analysis of privacy
notices of the global 2000. Journal of Information Privacy & Security, 3(2), 18–36.
Zviran, M. (2008). User’s perspectives on privacy in web-based applications. Journal
of Computer Information Systems, 48(4), 97–105.