You are here: Home Contents V18 N2 V18N2_Kaur.html
Personal tools

Sharing Confidential Information and Privacy Calculus



Full text

Journal of Information Systems Security
Volume 18, Number 2 (2022)
Pages 141152
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Joti Kaur — University of North Texas, USA
Simran Dhillon — University of North Texas, USA
Information Institute Publishing, Washington DC, USA




The act of disclosing sensitive information such as location, finances, and health on social media platforms can result in serious repercussions for users. Despite this, users occasionally choose to disclose such information willingly, and may even receive incentives from the platform provider to do so. The confidential information shared by users is a valuable asset that some providers use to their advantage. Therefore, users should carefully evaluate the benefits and drawbacks of sharing confidential information in order to make informed decisions. This study aims to explore users' inclination to share confidential information by utilizing the concepts of privacy calculus and prospect theory.




Privacy Calculus, Implicit Trust, Confidentiality of Personal Information.




Cialdini, R. B. (2009). Influence: Science and Practice 5th Ed Boston. Pearson Education.

Chen, S. and Dhillon, G. (2003). Interpreting dimensions of consumer trust in e-commerce. Information Technology and Management, 4(2/3), 303-318.

Culnan, M. J. and Armstrong, P. K. (1999). Information privacy concerns, procedural fairness & impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.

Dhillon, G., Oliveira, T., and Syed, R. (2018). Value-based information privacy objectives for Internet Commerce. Computers in Human Behavior, 87, 292-307.

Dinev, T. and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.

Dinev, T., McConnell, A. R., and Smith, H. J. (2015). Research commentary - informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box. Information Systems Research, 26(4), 639-655.

Gillon, K., Branz, L., Culnan, M., Dhillon, G., Hodgkinson, R., and MacWillson, A. (2011). Information Security and Privacy-Rethinking Governance Models [Article]. Communications of AIS, 28, 561-570.

Jarvenpaa, S. L., Tractinsky, N., and Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1(1-2), 45-71.

Jensen, A. S., Cazier, J. A., and Dave, D. S. (2008). Mitigating consumer perceptions of privacy and security risks with the use of residual RFID technologies through governmental trust. Journal of Information System Security, 4(1), 41-66.

Kahneman, D. (1979). Prospect theory: An analysis of decisions under risk. Econometrica, 47, 278.

Kahneman, D. and Tversky, A. (2013). Choices, values, and frames. In: Handbook of the fundamentals of financial decision making: Part I. Cambridge University Press, Cambridge, UK.

Keith, M., Thompson, S., Hale, J., and Greer, C. (2012). Examining the rationality of location data disclosure through mobile devices. Proceedings of the 33rd International Conference of Information Systems (ICIS 2012), Orlando.

Klopfer, P. H. and Rubenstein, D. I. (1977). The concept privacy and its biological basis. Journal of Social Issues, 33(3), 52-65.

Kolotylo-Kulkarni, M., Xia, W., and Dhillon, G. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research, 126, 221-238.

Kordzadeh, N., Warren, J., and Seifi, A. (2016). Antecedents of privacy calculus components in virtual health communities. International Journal of Information Management, 36(5), 724-734.

Lowry, P. B., Cao, J., and Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.

Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4), JCMC942.

Moores, T. and Dhillon, G. (2002). Trust, and the role of privacy seals in e-commerce. Communications of the ACM, 46(12), 265-271.

Muchnik, L., Aral, S., and Taylor, S. J. (2013). Social influence bias: A randomized experiment. Science, 341(6146), 647-651.

Tversky, A. and Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124-1131.

Wakefield, R. (2013). The influence of user affect in online information disclosure. The Journal of Strategic Information Systems, 22(2), 157-174.