This paper presents an overview of consumer privacy that integrates the public policy and behavioral literatures. Consumer privacy is defined in terms of control over information disclosure and the environment in which a consumer transaction occurs. These two dimensions generate a 2×2 matrix, identifying four states of privacy based on control over environment, information disclosure, both, or neither. For each state, managerial and policy implications can be derived.
Get full access to this article
View all access options for this article.
References
1.
AltmanIrwin (1976), “Privacy: A Conceptual Analysis,”Environment and Behavior, 18(March), 7–29.
2.
BaerWalter S. (1978), Controlling Unwanted Communications to the Home, The Rand Paper Series P–6107. Santa Monica: The Rand Corporation.
3.
BakerR. C., DickinsonRoger, and HollanderStanley (1986), “Big Brother 1994: Marketing Data and the IRS,”Journal of Public Policy and Marketing, 5, 227–242.
4.
BakkerCornelis B., and Bakker-RabdauMarianne K. (1973), No Trespassing! Explorations in Human Territoriality, San Francisco: Chandler and Sharp.
5.
BartonRichard A. (1989), “Privacy: The Gathering Storm,”Folio: The Magazine for Magazine Management, 18(October), 128–131.
6.
BaumeisterRoy F. (1987), “How the Self Became a Problem: A Psychological Review of Historical Research.”Journal of Personality and Social Psychology, 52(1), 163–176.
7.
BelkRussell W. (1984), “Cultural and Historical Differences in Concepts of Self and Their Effects on Attitudes Toward Having and Giving,” in Advances in Consumer Research, KinnearThomas, ed. Provo, Utah: Association for Consumer Research, 11, 754–760.
8.
BennStanley I. (1971), “Privacy, Freedom and Respect for Persons,” in Nomos XIII: Privacy, PennockJ. R., and ChapmanJ. W., eds. New York: Atherton Press, 56–70.
9.
BennStanley I., and GausGerald (1983), The Private and Public in Social Policy.London: Croon Helm and St. Martin's Press.
10.
“Bill Would Limit Mailing Lists” (1990), Fairbanks Daily News-Miner, January 30, 2.
11.
BlousteinEdward J. (1964), “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser,”New York University Law Review, 39, 962–1007.
12.
BokSissela (1982), Secrets: On the Ethics of Concealment and Revelation.New York: Pantheon.
13.
BrownBarbara B. (1987), “Territoriality,” in Handbook of Environmental Psychology, StokolsDaniel, and AltmanIrwin, eds. New York: John Wiley & Sons, 505–533.
14.
BurgoonJudee K. (1982), “Privacy and Communication,”Communication Yearbook 6, BurgoonMichael, ed. Beverly Hills: Sage.
15.
CarrollJohn M. (1975), Confidential Information Sources: Public and Private.Los Angeles: Security World.
16.
ColletteJohn (1984), “Role Demands, Privacy and Psychological Well-Being,”International Journal of Social Psychiatry, 30(Summer), 222–230.
17.
CooperClare (1971), The House as Symbol of Self, working paper 120, Institute of Urban and Regional Development.
18.
DavisFrederick (1959), “What Do We Mean by ‘Right to Privacy’?”South Dakota Law Review, 4(Spring), 1–24.
19.
DlabayLes (1990), “Focus on … U.S. Office of Consumer Affairs,”American Council on Consumer Interests Newsletter, 38(March), 3–4.
20.
DoiTakeo (1986), The Anatomy of Self.Tokyo: Kodansha International, Ltd.
21.
EdneyJulian J., and BudaMichael A. (1976), “Distinguishing Territoriality and Privacy: Two Studies,”Human Ecology, 4(4), 283–296.
22.
EngelJames F., BlackwellRoger D., and MiniardPaul W. (1990), Consumer Behavior, 6 ed., New York: Dryden Press.
FlahertyDavid H. (1989), Protecting Privacy in Surveillance Societies.Chapel Hill and London: The University of North Carolina Press.
25.
FoddyWilliam H., and FinnighanW. R. (1980), “The Concept of Privacy From a Symbolic Interactionist Perspective,”Journal of the Theory of Social Behavior, 10, 1–17.
26.
FreyJames H. (1986), “An Experiment With a Confidentiality Reminder in a Telephone Survey,”Public Opinion Quarterly, 50(Summer), 267–269.
27.
FriedCharles (1970), “Privacy: A Rational Context,” in Charles Fried, An Anatomy of Values: Problems of Personal and Social Choice, Chapter 9. Cambridge, Mass.: Harvard University Press; reprinted in Today's Moral Problems, (1975), Richard Wasserstromi, ed., New York: Macmillan, 21–33.
28.
FriedrichCarl J. (1971), “Secrecy versus Privacy: The Democratic Dilemma,” in Nomos XIII: Privacy, Roland PennockJ., and ChapmanJohn W., eds., New York: Atherton Press, 105–120.
29.
GavisonRuth (1980), “Privacy and the Limits of the Law,”Yale Law Journal, 89, 421–471.
30.
GoffmanErving (1961), Asylums.Garden City, N.Y.: Doubleday Anchor Books.
31.
GrossHyman (1967), “The Concept of Privacy,”New York University Law Review, 42, 34–53.
32.
HaimanFranklyn S. (1972), “Speech vs. Privacy: Is There a Constitutional Right Not to be Spoken to?”Northwestern University Law Review, 67(May-June), 153–197.
33.
Harris, Louis & Associates, Inc. (1979), The Dimensions of Privacy, A National Opinion Research Survey of Attitudes Toward Privacy, conducted for Sentry Insurance by Louis Harris & Associates, Inc., and Alan F. Westin. Stevens Point, Wis.: Sentry Insurance.
34.
Harris, Louis & Associates, Inc. (1990), The Equifax Report on Consumers in the Information Age, A National Opinion Research Survey of Attitudes Toward Privacy, conducted for Sentry Insurance by Louis Harris & Associates, Inc., and Alan F. Westin. Atlanta, Ga.: Equifax, Inc.
35.
HixsonRichard F (1987), Privacy in a Public Society: Human Rights in Conflict.New York and Oxford: Oxford University Press.
36.
HoffmanAlexander (1985), “Psychographics Can Be Useful but Sometimes Dangerous,”Direct Marketing, 48(July), 110.
37.
JohnsonJames E. (1989), “Is Direct Marketing an Invasion of Privacy?”Sales and Marketing Management in Canada, 30(March), 18–22.
38.
JourardSidney M. (1966), “Some Psychological Aspects of Privacy,”Law and Contemporary Problems, 31, 707–718.
39.
KalvenHarryJr. (1966), “Privacy in Tort Law: Were Warren and Brandeis Wrong?”Law and Contemporary Problems, 31, 326–341.
40.
KarstKenneth (1966), “The files: Legal Controls Over the Accuracy and Accessibility of Stored Personal Data,”Law and Contemporary Problems, 31, 341–376.
41.
KatzJames E., and TassoneAnnette R. (1990), “Public Opinion Trends: Privacy and Information Technology,”Public Opinion Quarterly, 54(April), 125–143.
42.
KelvinPeter (1973), “A Social-Psychological Examination of Privacy,”British Journal of Social and Clinical Psychology, 12(September), 248–261.
43.
LampmanRobert J. (1988), “JFK's Four Consumer Rights: A Retrospective View,” in The Frontier of Research in the Consumer Interest, E. Scott Maynes and the ACCI Research Committee, eds., Columbia, Mo.: American Council on Consumer Interests.
44.
LundsgaardeHenry P. (1971), “Privacy: An Anthropological Perspective on the Right to Be Let Alone,”Houston Law Review, 5(May), 858–875.
45.
LymanStanford M., and ScottMarvin B. (1967), “Territoriality: A Neglected Social Dimension,”Social Problems, 15(Fall), 236–249.
46.
McCrohanKevin F. (1989), “Information Technology, Privacy and the Public Good,”Journal of Public Policy and Marketing, 8, 265–278.
47.
“Marketers Tap Into Toll-Free Calls to Build Database” (1988), Catalog Age, 5(November), 9, 38–41.
48.
MarshallNancy J. (1974), “Dimensions of Privacy Preferences,”Multivariate Behavioral Research, 9(July), 252–271.
49.
MarxGary T. (1989), “Privacy and the Home,”Impact Assessment Bulletin, 7(1), 31–59.
50.
MaynesE. Scott (1988), “Introduction,” in The Frontier of Research in the Consumer Interest, E. Scott Maynes and the ACCI Research Committee, eds., Columbia, Mo.: American Council on Consumer Interests.
51.
MillerArthur R. (1971), The Assault on Privacy: Computers, Data Banks and Dossiers.Ann Arbor: University of Michigan Press.
52.
MillerCyndee (1989), “Telemarketing Foes: Don't Reach Out to Us,”Marketing News, 14(July 3), 1, 14.
53.
MooreBarringtonJr. (1984,) Privacy: Studies in Social and Cultural History, Armonk, N.Y.: M E Sharpe, Inc.
54.
ParasuramanA., ZeithamlValarie A., and BerryLeonard L. (1985), “A Conceptual Model of Service Quality and Its Implications for Future Research,”Journal of Marketing, 49(Fall), 41–50.
55.
ParentW.A. (1983), Recent Work on the Concept of Privacy, American Philosophical Quarterly, 20(October), 341–356.
56.
ParkerRichard (1974), “A Definition of Privacy,”Rutgers Law Review, 27, 275–296.
57.
PassavantPierre (1985), “Beware: Big Database Is Watching You,”Direct Marketing, 4(August), 30–38.
PoschRobert J.Jr. (1989), “Can We Have a la Carte Constitutional Rights?”Direct Marketing, 52(July), 76–77.
60.
PoschRobert J.Jr. (1988a), The Complete Guide to Marketing and the Law, Englewood Cliffs, N.J.: Prentice Hall.
61.
PoschRobert J.Jr. (1988b), “Worst List Threat of the Decade,” Legal Outlook, Direct Marketing, 50(March), 124.
62.
PosnerRichard (1981), The Economics of Justice.Cambridge, Mass.: Harvard University Press.
63.
PostaMelissa Della (1989), “List Restrictions Loom as Privacy Debate Heats Up,”Catalog Age, 6(August), 1, 28–30.
64.
ProsserWilliam (1960), “Privacy,”48California Law Review, 338–423.
65.
RasorPaul B. (1986), “Privacy Implications of Consumer Credit Protection Laws,”The John Marshall Law Review, 19(Summer), 941–957.
66.
RichardBill (1989), “Telemarketers Take Root in the Country,”The Wall Street Journal, (February 2), B1.
67.
RussellCheryl (1989), “Kiss and Tell: Consumer Information and Rights to Privacy,”American Demographics, 11(December), 2.
68.
ScheppeleKim Lane (1988), Legal Secrets: Equality and Efficiency in the Common Law.Chicago and London: University of Chicago Press.
69.
SchwartzBarry (1975), Queuing and Waiting: Studies in the Social Organization of Access and Delay.Chicago: University of Chicago Press.
70.
ShawRobert E. (1987), “Telemarketing: Its Impact on the Research Industry in the United States,”European Research, May, 78–80.
71.
ShwederRichard A., and BourneEdmund J. (1982), “Does the Concept of the Person Vary Cross-Culturally?” in Cultural Conceptions of Mental Health and Therapy, MarsellaAnthony J., and WhiteGeoffrey M., eds., Dordrecht: D. Reidel Publishing Company.
72.
SimitisSpiro (1987), “Reviewing Privacy in an Information Society,”University of Pennsylvania Law Review, Volume 135, 707–746.
73.
SimmelArnold (1971), “Privacy is Not an Isolated Freedom,” in Privacy, Roland PennockJ., and ChapmanJohn W., eds., New York: Atherton Press, 71–87.
74.
SommerRobert (1969), Personal Space.Englewood Cliffs, N.J.: Prentice-Hall.
75.
SpearJohn Barlow (1983), “Computers in the Private Sector: Right to Informational Privacy for the Consumer,”Washburn Law Journal, 22(Spring), 469–490.
76.
Target Marketing Forum (1989), “Can Direct Marketers Police Themselves? Four Direct Marketers Speak Out,”Target Marketing, 12(April), 16–18.
77.
ThomsonJudith Jarvis (1975), “The Right to Privacy,”Philosophy and Public Affairs, 4(Summer), 295–314.
78.
TuanYi-Fu (1982), Segmented Worlds and Self.Minneapolis: University of Minnesota Press.
79.
WareWillis H. (1985), Emerging Privacy Issues, The Rand Paper Series P–7145. Santa Monica: The Rand Corporation.
80.
WestinAlan (1967), “The Origin of Modern Claims to Privacy,” in Privacy and Freedom.New York: Association of the Bar of the City of New York.
81.
“Why Wait for ‘Daddy’ to Limit Calls?” (1986), editorial, Atlanta Constitution, (May 7), 18A.
82.
WolterRichard C. (1989), “Task Force Examines Self-Regulation,”Direct Marketing, 51(March), 104.
83.
YoungJohn B. (1978), “Introduction: A Look at Privacy,” in Privacy, YoungJohn B., ed., New York: John Wiley & Sons.
84.
ZimmermanDiane L. (1984), “Requiem for a Heavyweight: A Farewell to Warren and Brandeis’ Privacy Tort,”Cornell Law Review, 68, 291–370.