Abstract—We examine how consumers perceive publicized instances of privacy flaws and private information data breaches. Using three real-world privacy breach incidents, we study how these flaws affected consumers ’ future purchasing behavior and perspective on a company’s trustworthiness. We investigate whether despite a lack of widespread privacy enhancing tech-nology (PET) usage, consumers are taking some basic security precautions when making purchasing decisions. We survey 600 participants on three well-known privacy breaches. Our results show that, in general, consumers are less likely to purchase products that had experienced some form of privacy breach. We find evidence of a slight bias toward giving products the consumers owned them...
Every transaction that is made either online or offline, and every social interaction that is transf...
We explore the impact of privacy disclosures on online shoppers’ trust in an e-tailer through a two-...
This research addresses the tensions that arise between the col-lection and use of personal informat...
Privacy and security incidents represent a serious threat for a company's business success. While pr...
We investigate consumer and firm responses to information privacy and security factors across three ...
Privacy and security incidents represent a serious threat for a company’s business success. While pr...
Many organizations now emphasize the use of technology that can help them get closer to consumers an...
Many innovative products can only fully deploy their value if they rely on consumers' personal infor...
The travel and tourism industry has come to rely heavily on information and communication technologi...
This paper focuses on new retail technologies that acquire information from consumers, advancing tha...
This study explicates why consumers allow the unconditional collection and processing of personal da...
The travel and tourism industry has come to rely heavily on information and communication technologi...
This paper shows that privacy concerns in commercial contexts are not solely driven by a desire to c...
Data privacy refers to the safeguarding of personal information from those who shouldn't have access...
Consumer privacy has received substantial attention recently due to increased cases of data breaches...
Every transaction that is made either online or offline, and every social interaction that is transf...
We explore the impact of privacy disclosures on online shoppers’ trust in an e-tailer through a two-...
This research addresses the tensions that arise between the col-lection and use of personal informat...
Privacy and security incidents represent a serious threat for a company's business success. While pr...
We investigate consumer and firm responses to information privacy and security factors across three ...
Privacy and security incidents represent a serious threat for a company’s business success. While pr...
Many organizations now emphasize the use of technology that can help them get closer to consumers an...
Many innovative products can only fully deploy their value if they rely on consumers' personal infor...
The travel and tourism industry has come to rely heavily on information and communication technologi...
This paper focuses on new retail technologies that acquire information from consumers, advancing tha...
This study explicates why consumers allow the unconditional collection and processing of personal da...
The travel and tourism industry has come to rely heavily on information and communication technologi...
This paper shows that privacy concerns in commercial contexts are not solely driven by a desire to c...
Data privacy refers to the safeguarding of personal information from those who shouldn't have access...
Consumer privacy has received substantial attention recently due to increased cases of data breaches...
Every transaction that is made either online or offline, and every social interaction that is transf...
We explore the impact of privacy disclosures on online shoppers’ trust in an e-tailer through a two-...
This research addresses the tensions that arise between the col-lection and use of personal informat...