Information Technology and Management

, Volume 6, Issue 2–3, pp 181–202 | Cite as

Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma



Personalization refers to the tailoring of products and purchase experience to the tastes of individual consumers based upon their personal and preference information. Recent advances in information acquisition and processing technologies have allowed online vendors to offer varieties of web-based personalization that not only increases switching costs, but also serves as important means of acquiring valuable customer information. However, investments in online personalization may be severely undermined if consumers do not use these services due to privacy concerns. In the absence of any empirical evidence that seeks to understand this consumer dilemma, our research develops a parsimonious model to predict consumers’ usage of online personalization as a result of the tradeoff between their value for personalization and concern for privacy. In addition to this tradeoff, we find that a consumer’s intent to use personalization services is positively influenced by her trust in the vendor. Our findings suggest that: 1. online vendors can improve their abilities to acquire and use customer information through trust building activities; 2. it is of critical importance that vendors understand and evaluate the different values consumers may place in enjoying various types of personalization.


personalization privacy trust online transactions SEM 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    J. Alba, et al., Interactive home shopping: Consumer, retailer, and manufacturer incentives to participate in electronic marketplaces, Journal of Marketing 61 (1997) 38–53.Google Scholar
  2. [2]
    J.C. Anderson and D.W. Gerbing, Structural equation modeling in practice: A review and recommended two-step approach, Psychological Bulletin 103(May) (1988) 411–423.CrossRefGoogle Scholar
  3. [3]
    R.P. Bagozzi and L.W. Philips, Representing and testing organizational theories: A holistic construal, Administrative Science Quarterly 27(3) (1982) 459–489.Google Scholar
  4. [4]
    P. Benassi, TRUSTe: An online privacy seal program, Association for Computing Machinery. Communications of the ACM 42(2): (1999) 56.CrossRefGoogle Scholar
  5. [5]
    R.C. Blattberg and J. Deighton, Interactive marketing: Exploiting the age of addressability, Sloan Management Review Fall (1991) 5–14.Google Scholar
  6. [6]
    P. Blau, Exchange and power in social Life (Wiley, New York, 1964).Google Scholar
  7. [7]
    L. Bruno, Certificate authorities: Who do you trust? Data Communications 27(4) (1998) 54–63.Google Scholar
  8. [8]
    B. Byrne, Structural equation modeling with LISREL, PRELIS and SIMPLIS (Lawrence Erlbaum Associates, Mahwah, NJ, 1998).Google Scholar
  9. [9]
    R.K. Chellappa, Contrasting expert assessment of privacy with perceived privacy: Implications for public policy, Redondo Beach, CA (2001) 147–154.Google Scholar
  10. [10]
    W.W. Chin and P.A. Todd, On the use, usefulness and ease of use of structural equation modeling in MIS research: A note of caution. MIS Quarterly 19(2) (1995) 237–246.Google Scholar
  11. [11]
    S. Choi, D. Stahl and A.B. Whinston, The Economics of Electronic Commerce (MacMillan Technical Publishing, Indianapolis, IN, 1997).Google Scholar
  12. [12]
    M.J. Culnan, Protecting privacy online: Is self-regulation working? Journal of Public Policy & Marketing 19(1) (2000) 20–26.Google Scholar
  13. [13]
    M.J. Culnan and P.K. Armstrong, Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation, Organization Science 10(1) (1999) 104–115.Google Scholar
  14. [14]
    M.J. Culnan and R.J. Bies, Consumer privacy: Balancing economic and justice considerations, Journal of Social Issues 59(2) (2003) 104–115.CrossRefGoogle Scholar
  15. [15]
    P.J. Daugherty, M.B. Myers and C.W. Autry, Automatic replenishment programs: An empirical examination, Journal of Business Logistics 20(2) (1999) 63–82.Google Scholar
  16. [16]
    R. Deshpande and G. Zaltman, Factors affecting the use of market research information: A path analysis, Journal of Marketing Research 19 (1982).Google Scholar
  17. [17]
    S. Devaraj, M. Fan and R. Kohli, Antecedents of B2C channel satisfaction and preference: Validating e-commerce metrics, Infomation Systems Research 13(3) (2002) 316–333.CrossRefGoogle Scholar
  18. [18]
    P.M. Doney and J.P. Cannon, An examination of the nature of trust in buyer-seller relationships, Journal of Marketing 61 (1997) 35–51.Google Scholar
  19. [19]
    B. Friedman, P.H. Kahn and D.C. Howe, Trust online, Communications of the ACM 43(12) (2000) 34–40.Google Scholar
  20. [20]
    FTC (Federal Trade Commission), Consumer privacy on the World Wide Web. US House of Representatives, Washington, DC (1998).Google Scholar
  21. [21]
    FTC (Federal Trade Commission), Privacy online: Fair information practices in the electronic marketplace, US Congress, Washington, DC (2000).Google Scholar
  22. [22]
    S. Ganesan, Determinants of long-term orientation in buyer-seller relationships, Journal of Marketing 58 (1994) 1–19.Google Scholar
  23. [23]
    D. Gefen, D. Straub and M.-C. Boudreau, Stuctural equation modeling techniques and regression: Guidelines for research practice, Communications of AIS 7(7) (2000a) 1–78.Google Scholar
  24. [24]
    S. Glazer, Marketing in an information-intensive environment: Strategic implications of knowledge as an asset, Journal of Marketing 55(4) (1991) 1–19.Google Scholar
  25. [25]
    D. Gillin, The federal trade commission and Internet privacy, Marketing Research 12(3) (2000) 39.Google Scholar
  26. [26]
    J. Hagel III and J.F. Rayport, The coming battle for customer information, Harvard Business Review (1997) 5–11.Google Scholar
  27. [27]
    J. Hair, et al., Multivariate Data Analysis (Prentice Hall, London, 1998).Google Scholar
  28. [28]
    D.L. Hoffman, T. Novak and M.A. Peralta, Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web. Information Society 15(2) (1999) 129–139.CrossRefGoogle Scholar
  29. [29]
    G.G. Homans, Social behavior: Its elementary forms (Harcourt, Brace and Company, New York, 1961).Google Scholar
  30. [30]
    S.F. Hurley and D.C. Whybark, Comparing JIT approaches in a manufacturing cell, Production and Inventory Management Journal 40(2) (1999) 32–37.Google Scholar
  31. [31]
    S.L. Jarvenpaa, N. Tractinsky and M. Vitale, Consumer trust in an internet store, Information Technology and Management 1(12) (2000) 45–71.Google Scholar
  32. [32]
    K.G. Joreskog and D. Sorbom, LISREL-8 User? Reference Guide (Scientific Software, Mooreville, IN, 1996).Google Scholar
  33. [33]
    J. Karimi, T.M. Somers and Y.P. Gupta, Impact of Information Technology Management Practices on Customer Service, Journal of Management Information Systems 17(4) (2001) 125–158.Google Scholar
  34. [34]
    A.K. Kohli and B.J. Jaworski, Market orientation: The construct, research propositions and managerial implications, Journal of Marketing 54(2) (1990) 1–18.Google Scholar
  35. [35]
    R.S. Laufer and M. Wolfe, Privacy as a concept and a social issue: A multidimensional developmental theory, Social Issues 33(3) (1977) 22–24.Google Scholar
  36. [36]
    R.R. Lummus and R.J. Vokurka, Managing the demand chain through managing the information flow: Capturing moments of information, Production and Inventory Management Journal 40(1) (1999) 16–20.Google Scholar
  37. [37]
    J. Magretta, The power of virtual integration: An interview with dell computer’s Michael Dell, Harvard Business Review (1998) 73–84.Google Scholar
  38. [38]
    A. Mattila, Consumers’ value judgement, Hotel and Restaurant Administration Quarterly (1999) 40–46.Google Scholar
  39. [39]
    D.H. McKnight, V. Choudhury and C. Kacmar, Developing and validating trust measures for e-commerce: An integrative typology, Information Systems Research 13(3) (2002) 334–359.Google Scholar
  40. [40]
    G.R. Milne and M.E. Gordon, Direct mail privacy-efficiency trade-offs within an implied social contract framework, Journal of Public Policy & Marketing 12(3) (1993) 206–215.Google Scholar
  41. [41]
    A.D. Miyazaki and A. Fernandez, Internet privacy and security: An examination of online retailer disclosures, Journal of Public Policy & Marketing 19(1) (2000) 54–61.Google Scholar
  42. [42]
    H.-J. Mosler, Self-dissemination of environmentally-responsible behavior: The influence of trust in a commons dilemma game, Journal-of-Environmental-Psychology 13(2) (1993) 111–123.Google Scholar
  43. [43]
    D. Peppers, M. Rogers and B. Dorf, Is your company ready for one-to-one marketing? Harvard Business Review (1999) 3–12.Google Scholar
  44. [44]
    B.J. Pine II, D. Peppers and M. Rogers, Do you want to keep your customers forever? Harvard Business Review (1995) 103–114.Google Scholar
  45. [45]
    T.S. Raghu, et al., Dynamic profiling of consumers for customized offerings over the Internet: A model and analysis, Decision Support Systems 32(2) (2001) 117–134.Google Scholar
  46. [46]
    A.H. Segars and V. Grover, Re-examining perceived ease of use and usefulness: A confirmatory factor analysis, MIS Quarterly 17(4) (1993) 517–525.Google Scholar
  47. [47]
    K.B. Sheehan and M.G. Hoy, Dimensions of privacy concern among online consumers, Journal of Public Policy & Marketing 19(1) (2000) 62–72.Google Scholar
  48. [48]
    B. Shneiderman, Designing trust into online experiences, Communications of the ACM 43(12) (2000) 34–40.Google Scholar
  49. [49]
    J.H. Smith, S.J. Milberg and S.J. Burke, Information privacy: Measuring individuals’ concerns about corporate practices, MIS Quarterly 20(2) (1996) 167–196.Google Scholar
  50. [50]
    D.F. Spake, et al., Consumer comfort in service relationships: Measurement and importance, Journal of Service Research 5(4) (2003) 316–332.Google Scholar
  51. [51]
    K.A. Stewart and A.H. Segars, An empirical examination of the concern for information privacy instrument, Information Systems Research 13(1) (2002) 36–49.Google Scholar
  52. [52]
    J.W. Thibaut and H.H. Kelley, The social psychology of groups (John Wiley and Sons, Inc, New York, 1959).Google Scholar
  53. [53]
    Volokh, Eugene, Personalization and Privacy, Communications of the ACM 43(8) (2000) 84–88.Google Scholar
  54. [54]
    M.R. Ward and M.J. Lee, Internet shopping, consumer search, and product branding, Journal of Product and Brand Management 9(1) (2000) 6–20.Google Scholar
  55. [55]
    A.F. Westin, Privacy and freedom, ed. Atheneum (New York: NY, 1967).Google Scholar
  56. [56]
    R.S. Winer, A framework for customer relationship management, California Management Review 43(4) (2001) 89–105.Google Scholar

Copyright information

© Springer Science + Business Media, Inc. 2005

Authors and Affiliations

  1. 1.Department of Information and Operations Management, Marshall School of BusinessUniversity of Southern CaliforniaLos AngelesUSA

Personalised recommendations