Perceived Privacy Violations through Unauthorized Secondary Use: Diving into Users' Perceptions and Responses

Christina Wagner, Manuel Trenz, Chee-Wee Tan, Daniel Veit

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

We see more and more incidents where users’ information collected by digital services is shared with external parties. Users becoming aware of such information (mis-)uses may perceive a privacy violation. In this study, we want to understand when, why, and how such external unauthorized secondary use (EUSU) is perceived as a privacy violation and what consequences such a perception entails. Employing the Critical Incident Technique (CIT), we inductively derive characteristics of real-world incidents of perceived privacy violations through EUSU and users’ perceptions and responses thereto. We present preliminary results of our qualitative data analysis as well as potential contributions of this research-in-progress study. As a next step, we plan to relate characteristics with responses through Qualitative Comparative Analysis (QCA).
Original languageEnglish
Title of host publicationProceedings of the 31st European Conference on Information Systems (ECIS)
Number of pages11
Place of PublicationAtlanta, GA
PublisherAssociation for Information Systems. AIS Electronic Library (AISeL)
Publication date2023
Article number46
Publication statusPublished - 2023
EventThe 31st European Conference on Information Systems. ECIS 2023 - University of Agder, Campus Kristiansand, Kristiansand, Norway
Duration: 11 Jun 202316 Jun 2023
Conference number: 31
https://ecis2023.no/

Conference

ConferenceThe 31st European Conference on Information Systems. ECIS 2023
Number31
LocationUniversity of Agder, Campus Kristiansand
Country/TerritoryNorway
CityKristiansand
Period11/06/202316/06/2023
Internet address
SeriesProceedings of the European Conference on Information Systems
ISSN0000-0034

Keywords

  • Privacy violations
  • External unauthorized secondary use
  • External parties
  • Critical incident technique

Cite this