ONLINE HEDONIC CONSUMERS’ PRIVACY AWATENESS AND PRIVACY PARADOX: A SYSTEMATIC LITERATURE REVIEW

Authors

  • FG. M. Shafayet Ullah
  • Sameer Kumar
  • Fumitaka Furuoka

DOI:

https://doi.org/10.51200/mjbe.v9i2.4359

Keywords:

Literature Review, Hedonic-Motivation System (HMS), Hedonic Consumers, Privacy, Privacy Paradox, Privacy Awareness

Abstract

The purpose of this paper is to provide a comprehensive review of the literature on Online Hedonic Consumers’ Privacy Paradox and Privacy Awareness. Furthermore, the authors attempt to identify a gap that can be addressed in the future by developing a comprehensive and integrated model on Online Hedonic Consumer Behaviour that focuses on their Privacy Awareness. The authors conducted a systematic literature review of the extant literature. The discussion on “Privacy”, “Privacy Paradox” and “Privacy Awareness” elucidated the differences among them, thereby helping to remove any confusions held by the researchers and readers. This review offered insight into the current status of research in this field and recognized the factor “Privacy Awareness” as a gap in the existing model on Online Hedonic Consumer Behaviour that could properly be explored in further scholarly empirical research. Managers and E-Commerce vendors could utilize the findings of this review to address their Hedonic Consumer Privacy Awareness for the growth of their online businesses. This paper lays a groundwork to explore Online Hedonic Consumer Privacy Awareness in detail. A new integrated model is suggested, which will lead to the development of a theoretical framework for researchers to further examine the mediation effect of Privacy Awareness.

Author Biographies

FG. M. Shafayet Ullah

Asia-Europe Institute

University of Malaya,

50603 Kuala Lumpur, Malaysia

Sameer Kumar

Asia-Europe Institute

University of Malaya,

50603 Kuala Lumpur, Malaysia

Fumitaka Furuoka

Asia-Europe Institute

University of Malaya,

50603 Kuala Lumpur, Malaysia

References

Acquisti, A., & Gross, R. (2006). Imagined

communities: Awareness, information

sharing, and privacy on the Facebook. Paper

presented at the International workshop on

privacy enhancing technologies.

Acquisti, A., & Grossklags, J. (2005). Privacy and

rationality in individual decision making.

IEEE security & privacy, 3(1), 26-33.

Awad, N. F., & Krishnan, M. S. (2006). The

personalization privacy paradox: an

empirical evaluation of information

transparency and the willingness to be

profiled online for personalization. MIS

quarterly, 13-28.

Aydoğan, R., Øzturk, P., & Razeghi, Y. (2017).

Negotiation for incentive driven privacypreserving

information sharing. Paper

presented at the International Conference

on Principles and Practice of Multi-Agent

Systems.

Baek, Y. M. (2014). Solving the privacy paradox: A

counter-argument experimental approach.

Computers in Human Behavior, 38, 33-42.

Bamossy, G. J., & Solomon, M. R. (2016). Consumer

behaviour: A European perspective: Pearson

Education.

Barnes, S. B. (2006). A privacy paradox: Social

networking in the United States. First

Monday, 11(9).

Barth, S., & De Jong, M. D. (2017). The privacy

paradox–Investigating discrepancies

between expressed privacy concerns

and actual online behavior–A systematic

literature review. Telematics and informatics,

(7), 1038-1058.

Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online

privacy concerns and privacy management:

A meta-analytical review. Journal of

Communication, 67(1), 26-53.

Bélanger, F., & Crossler, R. E. (2011). Privacy in

the Digital Age: A Review of Information

Privacy Research in Information

Systems. MIS quarterly, 35(4), 1017-1041.

doi:10.2307/41409971

Beldad, A., de Jong, M., & Steehouder, M. (2011). A

Comprehensive Theoretical Framework for

Personal Information-Related Behaviors on

the Internet. The Information Society, 27(4),

-232. doi:10.1080/01972243.2011.583802

Beltramini, R. F. (1983). Student surrogates in

consumer research. Journal of the Academy

of Marketing Science, 11(4), 438-443.

Benndorf, V., & Normann, H.-T. (2018). The

Willingness to Sell Personal Data. The

Scandinavian Journal of Economics, 120(4),

-1278. doi:10.1111/sjoe.12247

Bhimani, H., Mention, A.-L., & Barlatier, P.-J. (2019).

Social media and innovation: A systematic

literature review and future research

directions. Technological Forecasting and

Social Change, 144, 251-269.

Bidler, M., Zimmerman, J., Schumann, J. H., &

Widjaja, T. (2020). Previewing a Meaningfully

Gamified Data Disclosure Process to Increase

Consumers’ Willingness to Engage in Data

Disclosure Processes. Journal of retailing,

(4), 507-532.

Boyd, D. (2008). Facebook’s privacy trainwreck:

Exposure, invasion, and social convergence.

Convergence, 14(1), 13-20.

Boyd, D. M., & Ellison, N. B. (2007). Social

network sites: Definition, history, and

scholarship. Journal of computer‐mediated

Communication, 13(1), 210-230.

Brough, A. R., & Martin, K. D. (2021). Consumer

privacy during (and after) the COVID-19

pandemic. Journal of Public Policy &

Marketing, 40(1), 108-110.

Brown, B. (2001). Studying the Internet experience.

HP LABORATORIES TECHNICAL REPORT HPL, 49.

Brown, S. A., & Venkatesh, V. (2005). Model of

adoption of technology in households:

A baseline model test and extension

incorporating household life cycle. MIS

quarterly, 29(3).

Brunk, B. (2002). Understanding the privacy space.

First Monday, 7(10).

Buchanan, T., Paine, C., Joinson, A. N., & Reips, U.-D.

(2007). Development of measures of online

privacy concern and protection for use on

the Internet. Journal of the American Society

for Information Science and Technology, 58(2),

-165. doi:10.1002/asi.20459

Campbell, J. E., & Carlson, M. (2002). Panopticon.

com: Online Surveillance and the

Commodification of Privacy. Journal of

Broadcasting & Electronic Media, 46(4), 586-

doi:10.1207/s15506878jobem4604_6

Carrascal, J. P., Riederer, C., Erramilli, V., Cherubini,

M., & Oliveira, R. d. (2013). Your browsing

behavior for a big mac: economics of personal

information online. Rio de Janeiro, Brazil:

Association for Computing Machinery.

Chellappa, R. K., & Sin, R. G. (2005). Personalization

versus privacy: An empirical examination of

the online consumer’s dilemma. Information

technology and management, 6(2-3), 181-202.

Christofides, E., Muise, A., & Desmarais, S. (2012). Hey

mom, what’s on your Facebook? Comparing

Facebook disclosure and privacy in

adolescents and adults. Social Psychological

and Personality Science, 3(1), 48-54.

Csikszentmihalyi, M. (1991). Flow: The psychology

of optimal experience In: New York:

HarperPerennial (Vol. 41).

Culnan, M. J., & Armstrong, P. K. (1999). Information

privacy concerns, procedural fairness, and

impersonal trust: An empirical investigation.

Organization science, 10(1), 104-115.

Cunningham, W. H., Anderson, W. T., & Murphy, J. H.

(1974). Are students real people? The Journal

of Business, 47(3), 399-409.

Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes,

B. N. (2009). Facebook and online privacy:

Attitudes, behaviors, and unintended

consequences. Journal of computermediated

communication, 15(1), 83-108.

Dhar, R., & Wertenbroch, K. (2000). Consumer choice

between hedonic and utilitarian goods.

Journal of Marketing Research, 37(1), 60-71.

Dictionary, C. B. E. (2019). Definition of Privacy.

Retrieved from https://dictionary.

cambridge.org/dictionary/english/privacy

Dienlin, T., & Trepte, S. (2015). Is the privacy paradox

a relic of the past? An in-depth analysis of

privacy attitudes and privacy behaviors.

European Journal of Social Psychology, 45(3),

-297. doi:10.1002/ejsp.2049

Dinev, T. (2014). Why would we care about privacy?

In: Springer.

Duhigg, C. (2012). How companies learn your

secrets. The New York Times, 16, 2012.

Ellison, N., Steinfield, C., & Lampe, C. (2007). The

benefit of Facebook ‘friends’: Exploring

the relationship between college students’

use of online social networks and social

capital. Journal of Computer–Mediated

Communication, 12(4).

Ellison, N. B., Vitak, J., Steinfield, C., Gray, R., & Lampe,

C. (2011). Negotiating Privacy Concerns

and Social Capital Needs in a Social Media

Environment. In S. Trepte & L. Reinecke

(Eds.), Privacy Online: Perspectives on Privacy

and Self-Disclosure in the Social Web (pp.

-32). Berlin, Heidelberg: Springer Berlin

Heidelberg.

Entertainment Software Association. (2007). Top 10

industry facts. Retrieved from http://www.

theesa.com/facts/index.asp

Entertainment Software Association. (2019). 2019

Essential facts about the computer and

video game industry. Retrieved from https://

www.theesa.com/esa-research/2019-

essential-facts-about-the-computer-andvideo-

game-industry/

Frenkel, S., Rosenberg, M., & Confessore, N. (2018).

Facebook data collected by quiz app

included private messages. The New York

Times, 10.

Gopalakrishnan, S., & Ganeshkumar, P. (2013).

Systematic reviews and meta-analysis:

understanding the best evidence in primary

healthcare. Journal of family medicine and

primary care, 2(1), 9.

Gross, R., & Acquisti, A. (2005). Information revelation

and privacy in online social networks. Paper

presented at the Proceedings of the 2005

ACM workshop on Privacy in the electronic

society.

Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. (2007).

Overcoming online information privacy

concerns: An information-processing

theory approach. Journal of management

information systems, 24(2), 13-42.

Heirman, W., Walrave, M., & Ponnet, K. (2013).

Predicting adolescents’ disclosure of

personal information in exchange for

commercial incentives: An application of

an extended theory of planned behavior.

Cyberpsychology, Behavior, and Social

Networking, 16(2), 81-87.

Hirschman, E. C., & Holbrook, M. B. (1982). Hedonic

Consumption: Emerging Concepts, Methods

and Propositions. Journal of Marketing, 46(3),

-101. doi:10.1177/002224298204600314

Hoffman, D. L., Novak, T. P., & Peralta, M.

(1999). Building consumer trust online.

Communications of the ACM, 42(4), 80-85.

Hsieh, T.-S., Noyes, D., Liu, H., & Fiondella, L. (2015).

Quantifying the impact of data loss incidents

on publicly-traded organizations. Paper

presented at the 2015 IEEE International

Symposium on Technologies for Homeland

Security (HST).

Hsu, C.-L., & Lu, H.-P. (2007). Consumer behavior in

online game communities: A motivational

factor perspective. Computers in Human

Behavior, 23(3), 1642-1659.

Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The Value

of Privacy Assurance: An Exploratory Field

Experiment. MIS quarterly, 31(1), 19-33.

doi:10.2307/25148779

Jagatic, T. N., Johnson, N. A., Jakobsson, M.,

& Menczer, F. (2007). Social phishing.

Communications of the ACM, 50(10), 94-100.

Jegers, K. (2007). Pervasive game flow:

understanding player enjoyment

in pervasive gaming. Computers in

Entertainment (CIE), 5(1), 9.

Jenkins, A. (2018, MARCH 28, 2018). These

Companies Have Cut Their Ties With

Facebook Amid the Cambridge Analytica

Data Scandal. Retrieved from https://

time.com/5216291/facebook-cambridgeanalytica-

companies-advertising/

Katawetawaraks, C., & Wang, C. (2011). Online

shopper behavior: Influences of online

shopping decision. Asian Journal of Business

Research, 1(2).

Kehr, F., Kowatsch, T., Wentzel, D., & Fleisch, E. (2015).

Blissfully ignorant: the effects of general

privacy concerns, general institutional

trust, and affect in the privacy calculus.

Information Systems Journal, 25(6), 607-635.

Kim, T., Barasz, K., & John, L. K. (2019). Why am I

seeing this ad? The effect of ad transparency

on ad effectiveness. Journal of consumer

research, 45(5), 906-932.

Kivetz, R., & Simonson, I. (2002a). Earning the

right to indulge: Effort as a determinant of

customer preferences toward frequency

program rewards. Journal of Marketing

Research, 39(2), 155-170.

Kivetz, R., & Simonson, I. (2002b). Self-control

for the righteous: Toward a theory of

precommitment to indulgence. Journal of

consumer research, 29(2), 199-217.

Kokolakis, S. (2017). Privacy attitudes and privacy

behaviour: A review of current research

on the privacy paradox phenomenon.

Computers & security, 64, 122-134.

Krishnamurthy, B., Naryshkin, K., & Wills, C. (2011).

Privacy leakage vs. protection measures: the

growing disconnect. Paper presented at the

Proceedings of the Web.

Lampe, C. A., Ellison, N., & Steinfield, C. (2007). A

familiar face (book): profile elements as signals

in an online social network. Paper presented

at the Proceedings of the SIGCHI conference

on Human factors in computing systems.

Lanier Jr, C. D., & Saini, A. (2008). Understanding

consumer privacy: A review and future

directions. Academy of Marketing Science

Review, 2008, 1.

Lee, H., Park, H., & Kim, J. (2013). Why do people

share their context information on Social

Network Services? A qualitative study and

an experimental study on users’ behavior

of balancing perceived benefit and risk.

International Journal of Human-Computer

Studies, 71(9), 862-877.

Lewis, K., Kaufman, J., & Christakis, N. (2008). The

Taste for Privacy: An Analysis of College

Student Privacy Settings in an Online Social

Network. Journal of computer-mediated

communication, 14(1), 79-100. doi:10.1111/

j.1083-6101.2008.01432.x

Li, H., Sarathy, R., & Xu, H. (2010). Understanding

situational online information disclosure

as a privacy calculus. Journal of Computer

Information Systems, 51(1), 62-71.

Li, H., Sarathy, R., & Xu, H. (2011). The role of

affect and cognition on online consumers’

decision to disclose personal information to

unfamiliar online vendors. Decision support

systems, 51(3), 434-445.

Li, Y. (2011). Empirical studies on online information

privacy concerns: Literature review and an

integrative framework. CAIS, 28, 28.

Liu, X., He, M., Gao, F., & Xie, P. (2008). An empirical

study of online shopping customer

satisfaction in China: a holistic perspective.

International Journal of Retail & Distribution

Management, 36(11), 919-940.

Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy

concerns versus desire for interpersonal

awareness in driving the use of selfdisclosure

technologies: The case of instant

messaging in two cultures. Journal of

management information systems, 27(4),

-200.

Lowry, P. B., Gaskin, J., Twyman, N., Hammer, B., &

Roberts, T. (2012). Taking ‘fun and games’

seriously: Proposing the hedonic-motivation

system adoption model (HMSAM). Journal

of the Association for Information Systems,

(11), 617-671.

Lu, J., Liu, Z., & Fang, Z. (2016). Hedonic products for

you, utilitarian products for me. Judgment &

Decision Making, 11(4).

Lutz, C., & Strathoff, P. (2014). Privacy concerns and

online behavior–Not so paradoxical after

all? Viewing the privacy paradox through

different theoretical lenses. Viewing the

Privacy Paradox Through Different Theoretical

Lenses (April 15, 2014).

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004).

Internet users’ information privacy concerns

(IUIPC): The construct, the scale, and a causal

model. Information systems research, 15(4),

-355.

Mallett, R., Hagen-Zanker, J., Slater, R., &

Duvendack, M. (2012). The benefits and

challenges of using systematic reviews in

international development research. Journal

of development effectiveness, 4(3), 445-455.

Manion, J. (2016). Data Security And Privacy:

Marketing’s Top Conundrum In 2016.

Retrieved from https://martech.org/

data-security-privacy-marketings-topconundrum-

/

MarketWatch, I. (2020). “Videogames are a

bigger industry than movies and North

American sports combined, thanks to the

pandemic”. Retrieved from https://www.

marketwatch.com/story/videogamesare-

a-bigger-industry-than-spor t s -

and-movies-combined-thanks-to-thepandemic-

Martin, K. D., Borah, A., & Palmatier, R. W. (2017).

Data privacy: Effects on customer and firm

performance. Journal of Marketing, 81(1), 36-

Martin, K. D., Borah, A., & Palmatier, R. W. (2018). A

strong privacy policy can save your company

millions. Harvard business review.

Martin, K. D., Kim, J. J., Palmatier, R. W., Steinhoff,

L., Stewart, D. W., Walker, B. A., . . . Weaven,

S. K. (2020). Data privacy in retail. Journal of

retailing, 96(4), 474-489.

Martin, K. D., & Murphy, P. E. (2017). The role of data

privacy in marketing. Journal of the Academy

of Marketing Science, 45(2), 135-155.

Martin, K. D., & Palmatier, R. W. (2020). Data privacy

in retail: Navigating tensions and directing

future research. In (Vol. 96, pp. 449-457):

Elsevier.

Migone, A. (2007). Hedonistic consumerism:

patterns of consumption in contemporary

capitalism. Review of Radical Political

Economics, 39(2), 173-200.

Milne, G. R., & Gordon, M. E. (1993). Direct mail

privacy-efficiency trade-offs within an

implied social contract framework. Journal

of Public Policy & Marketing, 12(2), 206-215.

Miyazaki, A. D., & Fernandez, A. (2001). Consumer

perceptions of privacy and security risks for

online shopping. Journal of Consumer Affairs,

(1), 27-44.

Mothersbaugh, D. L., Foxx, W. K., Beatty, S. E., & Wang,

S. (2012). Disclosure Antecedents in an Online

Service Context:The Role of Sensitivity of

Information. Journal of service research, 15(1),

-98. doi:10.1177/1094670511424924

Newzoo B.V. (2017, April 20). The global games

market will reach $108.9 billion in 2017 with

mobile taking 42%. Retrieved from https://

newzoo.com/insights/articles/the-globalgames-

market-will-reach-108-9-billion-in-

-with-mobile-taking-42/

Norberg, P. A., Horne, D. R., & Horne, D. A. (2007).

The privacy paradox: Personal information

disclosure intentions versus behaviors.

Journal of Consumer Affairs, 41(1), 100-126.

Novak, T. P., Hoffman, D. L., & Yung, Y.-F. (2000).

Measuring the customer experience in

online environments: A structural modeling

approach. Marketing science, 19(1), 22-42.

Oakes, W. (1972). External validity and the use of real

people as subjects. American Psychologist,

(10), 959.

Okazaki, S., Eisend, M., Plangger, K., de Ruyter, K.,

& Grewal, D. (2020). Understanding the

strategic consequences of customer privacy

concerns: A meta-analytic review. Journal of

retailing, 96(4), 458-473.

Olmstead, K., & Smith, A. (2017). What the public

knows about cybersecurity. Pew Research

Center, 22.

Palmatier, R. W., & Martin, K. D. (2019). Customer

Data Privacy: Why Every Marketer Should

Care. In The Intelligent Marketer’s Guide to

Data Privacy (pp. 3-20): Springer.

Palmer, D. (2019). What is GDPR? Everything you

need to know about the new general data

protection regulations. ZDNet. ZDNet, ZDNet.

Papacharissi, Z. (2010). A private sphere: Democracy

in a digital age: Polity.

Parboteeah, D. V., Valacich, J. S., & Wells, J. D. (2009).

The influence of website characteristics

on a consumer’s urge to buy impulsively.

Information systems research, 20(1), 60-78.

Paul, K. (2018). Everything you wanted to know

about data breaches, privacy violations

and hacks. Retrieved from https://www.

marketwatch.com/story/at-what-pointshould-

you-be-concerned-about-a-databreach-

-04-03

Pavlou, P. A. (2011). State of the Information Privacy

Literature: Where are We Now And Where

Should We Go? MIS quarterly, 35(4), 977-988.

doi:10.2307/41409969

Polatin-Reuben, D., & Wright, J. (2014). An Internet

with {BRICS} Characteristics: Data Sovereignty

and the Balkanisation of the Internet. Paper

presented at the 4th {USENIX} Workshop

on Free and Open Communications on the

Internet ({FOCI} 14).

PWC, C. I. S. (2018). Prepare for the Voice Revolution.

White Paper.

Qiu, L., & Benbasat, I. (2009). Evaluating

anthropomorphic product recommendation

agents: A social relationship perspective to

designing information systems. Journal of

management information systems, 25(4),

-182.

Rosenbush, S. (2018). The Morning Download:

Companies Should Beware Public’s Rising

Anxiety Over Data. Wall Street Journal.

Rosenthal, R. (1995). Writing meta-analytic reviews.

Psychological bulletin, 118(2), 183.

Saadé, R. G., Nebebe, F., & Mak, T. (2009). The role

of intrinsic motivation in system adoption:

A cross-cultural perspective. Journal of

Information, Information Technology, and

Organizations, 4, 107-127.

Sayre, S., & Horne, D. (2000). Trading secrets for

savings: how concerned are consumers

about club cards as a privacy threat? ACR

North American Advances.

Sen, R., & Borle, S. (2015). Estimating the contextual

risk of data breach: An empirical approach.

Journal of management information systems,

(2), 314-341.

Sherry, J. L. (2004). Flow and media enjoyment.

Communication theory, 14(4), 328-347.

Smith, H. J., Dinev, T., & Xu, H. (2011). Information

privacy research: an interdisciplinary review.

MIS quarterly, 35(4), 989-1016.

Soghoian, C. (2008). Exclusive: The next Facebook

privacy scandal. CNet News. Com.

Soghoian, C. (2008). Flaws emerge in Facebook’s

new privacy controls. CNet News. Com.

Spiekermann, S., Grossklags, J., & Berendt, B. (2001).

E-privacy in 2nd generation E-commerce:

privacy preferences versus actual behavior.

Paper presented at the Proceedings of

the 3rd ACM conference on Electronic

Commerce.

Stewart, D. W. (2017). A comment on privacy.

Journal of the Academy of Marketing Science,

(2), 156-159.

Stone, E. F., Gueutal, H. G., Gardner, D. G., &

McClure, S. (1983). A field experiment

comparing information-privacy values,

beliefs, and attitudes across several types of

organizations. Journal of Applied Psychology,

(3), 459.

Strahilevitz, M., & Myers, J. G. (1998). Donations to

charity as purchase incentives: How well

they work may depend on what you are

trying to sell. Journal of consumer research,

(4), 434-446.

Straub, D. B., & Boudreau, M.-C. MC, & Gefen,

D.(2004).“Validation Guidelines for IS

Positivist Research”. Communications of the

Association for information systems, 13(24),

-427.

Straub, D. W. (1989). Validating instruments in MIS

research. MIS quarterly, 147-169.

Stutzman, F. (2006). An evaluation of identity-sharing

behavior in social network communities.

Journal of the International Digital Media and

Arts Association, 3(1), 10-18.

Sweetser, P., & Wyeth, P. (2005). GameFlow: a model

for evaluating player enjoyment in games.

Computers in Entertainment (CIE), 3(3), 3-3.

Taddicken, M. (2014). The ‘privacy paradox’in the

social web: The impact of privacy concerns,

individual characteristics, and the perceived

social relevance on different forms of selfdisclosure.

Journal of computer-mediated

communication, 19(2), 248-273.

Thesaurus, C. A. L. s. D. (2019). Definition of

Privacy. Retrieved from https://dictionary.

cambridge.org/dictionary/english/privacy

Thomas, K. W., & Velthouse, B. A. (1990). Cognitive

elements of empowerment: An “interpretive”

model of intrinsic task motivation. Academy

of management review, 15(4), 666-681.

Trevinal, A. M., & Stenger, T. (2014). Toward a

conceptualization of the online shopping

experience. Journal of Retailing and

Consumer Services, 21(3), 314-326.

Tufekci, Z. (2008). Can you see me now? Audience

and disclosure regulation in online social

network sites. Bulletin of Science, Technology

& Society, 28(1), 20-36.

Utz, S., & Krämer, N. C. (2009). The privacy paradox

on social network sites revisited: The role of

individual characteristics and group norms.

Cyberpsychology: Journal of Psychosocial

Research on Cyberspace, 3(2).

Valentino-Devries, J., & Singer-Vine, J. (2012). They

know what you’re shopping for. Wall Street

Journal.

Van der Heijden, H. (2004). User acceptance of

hedonic information systems. MIS quarterly,

-704.

Venkatesh, V. (2000). Determinants of perceived

ease of use: Integrating control, intrinsic

motivation, and emotion into the

technology acceptance model. Information

systems research, 11(4), 342-365.

Venkatesh, V., & Bala, H. (2008). Technology

acceptance model 3 and a research agenda

on interventions. Decision sciences, 39(2),

-315.

Venkatesh, V., Davis, F., & Morris, M. G. (2007). Dead

or alive? The development, trajectory and

future of technology adoption research.

Journal of the Association for Information

Systems, 8(4), 1.

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F.

D. (2003). User acceptance of information

technology: Toward a unified view. MIS

quarterly, 425-478.

Voss, K. E., Spangenberg, E. R., & Grohmann, B.

(2003). Measuring the hedonic and utilitarian

dimensions of consumer attitude. Journal of

Marketing Research, 40(3), 310-320.

Walker, K. L. (2016). Surrendering information

through the looking glass: Transparency,

trust, and protection. Journal of Public Policy

& Marketing, 35(1), 144-158.

Warren, S. D., & Brandeis, L. D. (1890). The Right to

Privacy. Harvard Law Review, 4(5), 193-220.

Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B.

(2011). The personalization privacy paradox:

An exploratory study of decision making

process for location-aware marketing.

Decision support systems, 51(1), 42-52.

Xu, H., Teo, H.-H., Tan, B. C., & Agarwal, R. (2009).

The role of push-pull technology in privacy

calculus: the case of location-based services.

Journal of management information systems,

(3), 135-174.

Published

2022-12-31

How to Cite

FG. M. Shafayet Ullah, Sameer Kumar, & Fumitaka Furuoka. (2022). ONLINE HEDONIC CONSUMERS’ PRIVACY AWATENESS AND PRIVACY PARADOX: A SYSTEMATIC LITERATURE REVIEW. Malaysian Journal of Business and Economics (MJBE), 9(2), 92 –. https://doi.org/10.51200/mjbe.v9i2.4359
Total Views: 144 | Total Downloads: 126