Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract

A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce mo...

Full description

Saved in:  
Bibliographic Details
Main Author: Martin, Kirsten E. (Author)
Format: Electronic Article
Language:English
Check availability: HBZ Gateway
Journals Online & Print:
Drawer...
Fernleihe:Fernleihe für die Fachinformationsdienste
Published: Springer Science + Business Media B. V 2012
In: Journal of business ethics
Year: 2012, Volume: 111, Issue: 4, Pages: 519-539
Further subjects:B Factorial vignette methodology
B Privacy
B Survey
B Contractual business ethics
B Social Contract Theory
Online Access: Volltext (JSTOR)
Volltext (lizenzpflichtig)

MARC

LEADER 00000caa a22000002 4500
001 1785646397
003 DE-627
005 20230331053249.0
007 cr uuu---uuuuu
008 220112s2012 xx |||||o 00| ||eng c
024 7 |a 10.1007/s10551-012-1215-8  |2 doi 
035 |a (DE-627)1785646397 
035 |a (DE-599)KXP1785646397 
035 |a (DE-He213)s10551-012-1215-8-e 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 1  |2 ssgn 
100 1 |a Martin, Kirsten E.  |e VerfasserIn  |4 aut 
245 1 0 |a Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract 
264 1 |c 2012 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study validates a social contract approach to privacy by examining whether and how privacy norms vary across communities and contractors. The findings from this theoretical examination support the use of contractual business ethics to understand privacy in research and in practice. As predicted, insiders to a community had significantly different understandings of privacy norms as compared to outsiders. In addition, all respondents held different privacy norms across hypothetical contexts, thereby suggesting privacy norms are contextually understood within a particular community of individuals. The findings support two conclusions. First, individuals hold different privacy norms without necessarily having diminished expectations of privacy. Individuals differed on the factors they considered important in calculating privacy expectations, yet all groups had robust privacy expectations across contexts. Second, outsiders have difficulty in understanding the privacy norms of a particular community. For managers and scholars, this renders privacy expectations more difficult to identify at a distance or in deductive research. The findings speak directly to the needs of organizations to manage a diverse set of privacy issues across stakeholder groups. 
601 |a Vignette 
650 4 |a Survey 
650 4 |a Factorial vignette methodology 
650 4 |a Contractual business ethics 
650 4 |a Social Contract Theory 
650 4 |a Privacy 
773 0 8 |i Enthalten in  |t Journal of business ethics  |d Dordrecht [u.a.] : Springer Science + Business Media B.V, 1982  |g 111(2012), 4, Seite 519-539  |h Online-Ressource  |w (DE-627)270937129  |w (DE-600)1478688-6  |w (DE-576)121465284  |x 1573-0697  |7 nnns 
773 1 8 |g volume:111  |g year:2012  |g number:4  |g pages:519-539 
856 |3 Volltext  |u http://www.jstor.org/stable/23324816  |x JSTOR 
856 4 0 |u https://doi.org/10.1007/s10551-012-1215-8  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mteo 
936 u w |d 111  |j 2012  |e 4  |h 519-539 
951 |a AR 
ELC |a 1 
ITA |a 1  |t 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4033705287 
LOK |0 003 DE-627 
LOK |0 004 1785646397 
LOK |0 005 20220112043754 
LOK |0 008 220112||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-Tue135)IxTheo#2021-12-30#5E8AA06DCD4F831449B12B21BCABEA4003A537EE 
LOK |0 040   |a DE-Tue135  |c DE-627  |d DE-Tue135 
LOK |0 092   |o n 
LOK |0 852   |a DE-Tue135 
LOK |0 852 1  |9 00 
LOK |0 866   |x JSTOR#http://www.jstor.org/stable/23324816 
LOK |0 935   |a ixzs  |a ixrk  |a zota 
ORI |a SA-MARC-ixtheoa001.raw