Skip to main content
Log in

Personality traits and concern for privacy: an empirical study in the context of location-based services

  • Original Article
  • Published:
European Journal of Information Systems

Abstract

For more than a century, concern for privacy (CFP) has co-evolved with advances in information technology. The CFP refers to the anxious sense of interest that a person has because of various types of threats to the person's state of being free from intrusion. Research studies have validated this concept and identified its consequences. For example, research has shown that the CFP can have a negative influence on the adoption of information technology; but little is known about factors likely to influence such concern. This paper attempts to fill that gap. Because privacy is said to be a part of a more general ‘right to one's personality’, we consider the so-called ‘Big Five’ personality traits (agreeableness, extraversion, emotional stability, openness to experience, and conscientiousness) as factors that can influence privacy concerns. Protection motivation theory helps us to explain this influence in the context of an emerging pervasive technology: location-based services. Using a survey-based approach, we find that agreeableness, conscientiousness, and openness to experience each affect the CFP. These results have implications for the adoption, the design, and the marketing of highly personalized new technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

References

  • Ackerman M (2004) Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Computing 8, 430–439.

    Article  Google Scholar 

  • Agarwal R and Karahanna E (2000) Time flies when you're having fun: cognitive absorption and beliefs about information technology usage. MIS Quarterly 24 (4), 665–694.

    Article  Google Scholar 

  • Ajzen I (1988) Attitudes, Personality, and Behavior. Open University Press, Stony Startford.

    Google Scholar 

  • Alavi M and Joachimsthaler EA (1992) Revisiting dss implementation research: a meta analysis of the literature and suggestions for researchers. MIS Quarterly 16 (1), 95–116.

    Article  Google Scholar 

  • Armstrong MP and Ruggles AJ (2005) Geographic information technologies and personal privacy. Cartographica 40 (4), 63–73.

    Article  Google Scholar 

  • Barrick MR and Mount MK (1991) The big five personality dimensions and job performance: a meta-analysis. Personnel Psychology 44, 1–26.

    Article  Google Scholar 

  • Barrick MR, Mount MK and Judge TA (2001) Personality and performance at the beginning of the new millennium: what do we know and where do we go next?. International Journal of Selection and Assessment 9, 9–30.

    Article  Google Scholar 

  • Beinat E (2001) Privacy and location-based: stating the policies clearly. GeoInformatics 4 (September), 14–17.

    Google Scholar 

  • Benbasat I and Dexter AS (1982) Individual differences in the use of decision support aids. Journal of Accounting Research 20 (1), 1–11.

    Article  Google Scholar 

  • Bergeman CS, Chipuer HM, Plomin R, Pedersen NL, McClearn GE, Nesselroade JR, Costa PT and McCrae RR (1993) Genetic and environmental effects on openness to experience, agreeableness, and conscientiousness: an adoption/twin study. Journal of Personality 61 (2), 159–179.

    Article  Google Scholar 

  • Bermudez J (1999) Personality and health-protective behaviour. European Journal of Personality 13, 83–103.

    Article  Google Scholar 

  • Black P (2006) Thrust to wholeness: the nature of self-protection. Review of General Psychology 10 (3), 191–209.

    Article  Google Scholar 

  • Bohn J, Coroama V, Langheinrich M, Mattern F and Rohs M (2004) Living in a world of smart everyday objects – social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment 10 (5), 763–786.

    Article  Google Scholar 

  • Boost Mobile Media (2007) Boost mobile and loopt pioneer social mapping for young mobile phone users. Press Release, http://www.loopt.com/loopt/press/boostpressrelease.html (accessed 13 March 2008).

  • Brown I, Zaheeda C, Davies D and Stroebel S (2003) Cell phone banking: predictors of adoption in south africa – an exploratory study. International Journal of Information Management 23, 381–394.

    Article  Google Scholar 

  • Buss DM (Ed.) (2005) The Handbook of Evolutionary Psychology. John Wiley & Sons, Hoboken, NJ.

    Google Scholar 

  • Chin W (1998) Issues and opinions on structural equation modeling. MIS Quarterly 22 (1), vii–xvi.

    Google Scholar 

  • Chin W and Newsted PR (1999) Structural equation modeling analysis with small samples using partial least squares. In Statistical Strategies for Small Sample Research (HOYLE RH, Ed.), pp 307–322, Sage Publications, Thousand Oaks, CA.

    Google Scholar 

  • Costa Jr. PT and McCrae RR (1992) Revised Neo Personality Inventory (neo-pi-r) and Neo Five-Factor Inventory (neo-ffi) Professional Manual. Psychological Assessment Resources, Odessa, FL.

    Google Scholar 

  • Costa PT, McCrae RR and Dye DA (1991) Facet scales for agreeableness and conscientiousness: a revision of the neo personality inventory. Personal Individual Differences 12 (9), 887–898.

    Article  Google Scholar 

  • Costa PT, McCrae RR and Zonderman AB (1987) Environmental and dispositional influences on well-being: longitudinal follow-up of an american national sample. British Journal of Psychology 78, 299–306.

    Article  Google Scholar 

  • Culnan MJ (1993) ‘How did they get my name?’ An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 (2), 341–363.

    Article  Google Scholar 

  • Culnan MJ (2000) Protecting privacy online: is self-regulation working. Journal of Public Policy & Marketing 19 (1), 20–26.

    Article  Google Scholar 

  • Culnan MJ and Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 10 (1), 104–115.

    Article  Google Scholar 

  • Dinev T, Bellotto M, Hart P, Russo V, Serra I and Colautti C (2006) Privacy calculus model in e-commerce – a study of Italy and the United States. European Journal of Information Systems 15 (4), 389–402.

    Article  Google Scholar 

  • Dinev T and Hart P (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research 17 (1), 61–80.

    Article  Google Scholar 

  • Eddy ER, Stone DL and Stone-Romero EF (1999) The effects of information management policies on reactions to human resource information systems: an integration of privacy and procedural justice perspectives. Personnel Psychology 52, 335–358.

    Article  Google Scholar 

  • Electronic Frontier Foundation (2005) New Case Reveals Routine Abuse of Government Surveillance Powers. Press Release, http://www.eff.org/press/archives/2005/09/26 (accessed 13 March 2008).

  • Fischer K (2004) Consumers ready for wireless location-based services; 2005 will be a strong year for carrier deployment, InStat, http://www.instat.com/press.asp?ID=1175&sku=IN0401660MCD (accessed 10 October 2006).

  • Floyd DL, Prentice-Dunn S and Rogers RW (2000) A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology 30 (2), 407–429.

    Article  Google Scholar 

  • Fornell C and Larcker DF (1981) Evaluating structural equations models with unobservable variables and measurement error. Journal of Marketing Research 18 (1), 39–50.

    Article  Google Scholar 

  • Gaur A and Gaur S (2006) Statistical Methods for Practice and Research: A Guide to Data Analysis Using SPSS. Sage Publications, New Delhi.

    Google Scholar 

  • Gefen D, Straub DW and Boudreau M-C (2000) Structural equation modeling and regression: guidelines for research practice. Communications of the Association for Information Systems 4 (7), 1–80.

    Google Scholar 

  • Goldberg LR (1990) An alternative ‘description of personality’: the big-five factor structure. Journal of Personality and Social Psychology 59, 1216–1229.

    Article  Google Scholar 

  • Gonzalez JJ and Sawicka A (2002) A framework for human factors in information security. In Presented at the WSEAS International Conference on Information Security. Rio de Janeiro, http://ikt.hia.no/josejg/Papers/A%20Framework%20for%20Human%20Factors%20in%20Information%20Security.pdf (accessed 13 March 2008).

    Google Scholar 

  • Gosh AK and Swaminatha TM (2001) Software security and privacy risks in mobile e-commerce. Communications of the ACM 44 (2), 51–57.

    Article  Google Scholar 

  • Gosling SD, Rentfrow PJ and William BS (2003) A very brief measure of the big-five personality domains. Journal of Research in Personality 37, 504–528.

    Article  Google Scholar 

  • Gullone E and Moore S (2000) Adolescent risk-taking and the five-factor model of personality. Journal of Adolescence 23, 393–407.

    Article  Google Scholar 

  • Heller D, Judge TA and Watson D (2002) The confounding role of personality and trait affectivity in the relationship between job and life satisfaction. Journal of Organizational Behavior 23, 815–835.

    Article  Google Scholar 

  • Herzberg PY and Braehler E (2006) Assessing the big-five personality domains via short forms. European Journal of Psychological Assessment 22 (3), 139–148.

    Article  Google Scholar 

  • Hoffman DL, Novak TP and Peralta MA (1999) Information privacy in the marketspace: implications for the commercial uses of anonymity on the web. The Information Society 15, 129–139.

    Article  Google Scholar 

  • Jahng JJ, Jain H and Ramamurthy K (2002) Personality traits and effectiveness of presentation of product information in e-business systems. European Journal of Information Systems 11, 181–195.

    Article  Google Scholar 

  • Judge TA, Heller D and Mount MK (2002) Five-factor model of personality and job satisfaction: a meta-analysis. Journal of Applied Psychology 87, 530–541.

    Article  Google Scholar 

  • Katz YJ (1992) Toward a personality profile of successful computer-using teacher. Educational Technology 32, 39–40.

    Google Scholar 

  • Kelvin P (1973) A social-psychological examination of privacy. British Journal of Social Clinical Psychology 12, 248–261.

    Article  Google Scholar 

  • Laufer RS and Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional development theory. Journal of Social Issues 33 (3), 22–42.

    Article  Google Scholar 

  • Lauriola M and Levin IP (2001) Personality traits and risky decision-making in a controlled experimental task: an exploratory study. Personality and Individual Differences 31, 215–226.

    Article  Google Scholar 

  • Lederer S, Hong JI, Dey AK and Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Computing 8, 440–454.

    Article  Google Scholar 

  • Levin HA and Askin F (1977) Privacy in the courts: law and social reality. Journal of Social Issues 33 (3), 138–153.

    Article  Google Scholar 

  • Lu HP, Yu HJ and Lu SSK (2001) The effects of cognitive style and model type on dss acceptance: an empirical study. European Journal of Operational Research 131 (3), 649–663.

    Article  Google Scholar 

  • Lucas HC (1978) Empirical evidence for a descriptive model of implementation. MIS Quarterly 2 (2), 27–41.

    Article  Google Scholar 

  • Lyytinen K, Yoo Y, Varshney U, Ackerman MS, Davis G, Avital M, Robey D, Sawyer S and Sørensen C (2004) Surfing the next wave: design and implementation challenges of ubiquitous computing environments. Communications of the AIS 13, 697–716.

    Google Scholar 

  • Maddux JE and Rogers RW (1983) Protection motivation theory and self-efficacy: a revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19, 242–253.

    Article  Google Scholar 

  • Malhotra NK, Kim SS and Agarwal J (2004) Internet users' information privacy concerns (iuipc): the construct, the scale, and a causal model. Information Systems Research 15 (4), 336–355.

    Article  Google Scholar 

  • Mason RO and Mitroff II (1973) A program for research on management information systems. Management Science 19 (5), 475–487.

    Article  Google Scholar 

  • McCrae RR and Costa P (1999) A five factor theory of personality. In Handbook of Personality: Theory and Research (PERVIN L, Ed), pp 139–153, Guilford, New York.

    Google Scholar 

  • McCrae RR and Costa PT (1987) Validation of the five-factor model of personality across instruments and observers. Journal of Personality & Social Psychology 52, 81–90.

    Article  Google Scholar 

  • McCrae RR and Costa PT (1991) Adding liebe and arbeit: the full five-factor model and well-being. Personality and Social Psychology Bulletin 17 (2), 227–232.

    Article  Google Scholar 

  • McCrae RR, Costa PT, Hrebickova M, Urbanek T, Martin TA, Oryol VE, Rukavishnikov AA and Senin IG (2004) Age differences in personality traits across cultures: self-report and observer perspectives. European Journal of Personality 18, 143–157.

    Article  Google Scholar 

  • Milne S, Sheeran P and Orbell S (2000) Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 (1), 106–143.

    Article  Google Scholar 

  • Mount MK, Barrick MR, Scullen SM and Rounds J (2005) Higher-order dimensions of the big five personality traits and the big six vocational interest types. Personnel Psychology 58, 447–478.

    Article  Google Scholar 

  • Mount MK, Barrick MR and Stewart GL (1998) Five-factor model of personality and performance in jobs involving interpersonal interactions. Human Performance 11 (2/2), 145–165.

    Article  Google Scholar 

  • Muck PM, Hell B and Gosling SD (2007) Construct validation of a short five-factor model instrument: a self-peer study on german adaptation of the ten-item personality inventory (tipi-g). European Journal of Psychological Assessment 23 (3), 166–175.

    Article  Google Scholar 

  • Myers MD and Miller L (1996) Ethical dilemmas in the use of information technology: an aristotelian perspective. Ethics & Behavior 6 (2), 153–160.

    Article  Google Scholar 

  • Nagy MS (2002) Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology 75, 77–86.

    Article  Google Scholar 

  • Nunnally J (1978) Psychometric Theory. McGraw-Hill, New York.

    Google Scholar 

  • Okazaki S (2006) What do we know about mobile internet adopters? A cluster analysis. Information & Management 43, 127–141.

    Article  Google Scholar 

  • Pechmann C, Zhao G, Goldberg ME and Reibling ET (1993) What to convey in antismoking advertisements for adolescents: the use of protection motivation theory to identify effective message themes. Journal of Marketing 67 (April), 1–18.

    Google Scholar 

  • Pedersen DM (1987) Relationship of personality to privacy preferences. Journal of Social Behavior and Personality 2 (2), 267–274.

    Google Scholar 

  • Pedersen DM (1996) A factorial comparison of privacy questionnaires. Social Behavior and Personality 24 (3), 249–262.

    Article  Google Scholar 

  • Porus J and Ellis M (2007) Location-based services and presence technology: the future of telecommunications is closer than you think. Harris Interactive, The Harris Report, http://www.harrisinteractive.com/news/newsletters/HarrisReport/HI_TheHarrisReport_2007_v02_i01.pdf (accessed 13 March 2008).

  • Rammstedt B (2007) The 10-item big five inventory: norm values and investigation of sociodemographic effects based in a German population representative sample. European Journal of Psychological Assessment 23 (3), 193–201.

    Article  Google Scholar 

  • Redknee (2006) Redknee protects wireless subscribers' privacy concerns with industry first solution: personalization allows users to decide which wireless services, applications and users can access their personal data. Redknee. http://www.redknee.com/news_events/news_releases/archive_2006/156/?PHPSESSID=d99270ce1b41ea4c39b1ec7eab2e6f95 (accessed 10 October 2006).

  • Rodden T, Friday A, Muller H and Dix A (2002) A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol.

  • Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91, 93–114.

    Article  Google Scholar 

  • Rogers RW (Ed.) (1983) Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. Plenum, New York, NY.

    Google Scholar 

  • Saldago JF (2002) The big five personality dimensions and counterproductive behaviors. International Journal of Selection and Assessment 10 (1/2), 117–125.

    Google Scholar 

  • Saldago JF, Moscoso S and Lado M (2003) Evidence of cross-cultural invariance of the big five personality dimensions in work settings. European Journal of Personality 17, 67–76.

    Article  Google Scholar 

  • Senecal D (2008) Demographics matter to mobile banking strategies. CreditUnions.com.

  • Sheehan K (2002) Toward a typology of internet users and online privacy concerns. The Information Society 18, 21–32.

    Article  Google Scholar 

  • Siau K and Shen Z (2003) Building customer trust in mobile commerce. Communications of the ACM 46 (4), 91–94.

    Article  Google Scholar 

  • Smith HJ, Milberg SJ and Burke SJ (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 20 (2), 167–196.

    Article  Google Scholar 

  • Soldz S and Vaillant GE (1999) The big five personality traits and the life course: a 45-year longitudinal study. Journal of Research in Personality 33, 208–232.

    Article  Google Scholar 

  • Spector PE, Zapf D, Chen PY and Frese M (2000) Why negative affectivity should not be controlled in job stress research: don't throw out the baby with the bath water. Journal of Organizational Behavior 21, 79–95.

    Article  Google Scholar 

  • Stewart KA and Segars AH (2002) An empirical examination of the concern for information privacy instrument. Information Systems Research 13 (1), 36–49.

    Article  Google Scholar 

  • Stone DL (1986) Relationship between introversion/extraversion, values regarding control over information, and perceptions of invasion of privacy. Perceptual and Motor Skills 62, 371–376.

    Article  Google Scholar 

  • Taylor WA (2004) Computer-mediated knowledge sharing and individual user differences: an exploratory study. European Journal of Information Systems 13, 52–64.

    Article  Google Scholar 

  • Tett RP and Burnett DD (2003) A personality trait-based interactionist model of job performance. Journal of Applied Psychology 88 (3), 500–517.

    Article  Google Scholar 

  • Valacich JS (2003) Case Western Workshop on Ubiquitous Computing Environments, October 24–26, 2003, Weatherhead School of Management, Case Western Reserve University, Cleveland, OH, USA, http://weatherhead.case.edu/pervasive/Paper/UBE%202003%20-%20Valacich.pdf (accessed 13 March 2008).

  • Van Slyke C, Shim JT, Johnson R and Jiang J (2006) Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems 7 (6), 415–444.

    Google Scholar 

  • Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research 11 (4), 342–365.

    Article  Google Scholar 

  • Venkatesh V, Morris MG and Ackerman PL (2000) A longitudinal field investigation of gender differences in individual technology adoption decision-making processes. Organizational Behavior and Human Decision Processes 83 (1), 33–60.

    Article  Google Scholar 

  • Wallace B (2006) 30 countries passed 100% mobile phone penetration in q1. Telecommunications Online, http://www.telecommagazine.com/newsglobe/article.asp?HH_ID=AR_2148 (accessed 20 March 2007).

  • Warren S and Brandeis L (1890) The right to privacy. Harvard Law Review 4 (5), 193.

    Article  Google Scholar 

  • Waxer C (2006) Satellite Plumbing. Fortune Small Business, http://money.cnn.com/magazines/fsb/fsb_archive/2006/02/01/8368208/index.htm (accessed 13 March 2008).

  • Weinstein N (1993) Testing four competing theories of health-protective behavior. Health Psychology 12 (4), 324–333.

    Article  Google Scholar 

  • Westin A (2003) Social and political dimensions of privacy. Journal of Social Issues 59 (2), 431–453.

    Article  Google Scholar 

  • Woods SA and Hampson SE (2005) Measuring the big five with single item using a bipolar response scale. European Journal of Personality 19, 373–390.

    Article  Google Scholar 

  • Xu H and Teo H-H (2004) Alleviating consumers' privacy concerns in location-based services: a psychological control perspective. In Proceedings of the 25th International Conference on Information Systems. Washington, DC, http://www.ais.bepress.com/icis2004/64 (accessed 13 March 2008).

    Google Scholar 

  • Xu H, Teo H-H and Tan BCY (2005) Predicting the adoption of location-based services: the role of trust and perceived privacy risk. In Proceedings of the 26th International Conference on Information Systems. Las Vegas, NV, http://www.ais.bepress.com/icis2005/71 (accessed 13 March 2008).

    Google Scholar 

  • Zhao G and Pechmann C (2007) The impact of regulatory focus on adolescents' response to antismoking advertising campaigns. Journal of Marketing Research 44 (November), 671–687.

    Article  Google Scholar 

  • Zmud RW (1979) Individual differences and MIS success: a review of the empirical literature. Management Science 25 (10), 966–979.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iris A Junglas.

Appendix (for reviewing purposes only)

Appendix (for reviewing purposes only)

See Tables A1, A2, A3 and A4.

Table a1 Scenario description (textual part)
Table a2 Questionnaire items
Table a3 Correlation matrix and AVE
Table a4 Psychometric properties of original CFP measures

Rights and permissions

Reprints and permissions

About this article

Cite this article

Junglas, I., Johnson, N. & Spitzmüller, C. Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur J Inf Syst 17, 387–402 (2008). https://doi.org/10.1057/ejis.2008.29

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/ejis.2008.29

Keywords

Navigation