Abstract
This research examines how European citizens decide to disclose and protect their personal data and thereby reveals cultural and generational divides. Focus group discussions featured either young people, aged 15 to 24 years, or adults, between 25 and 70 years of age, and were conducted in seven EU member states. The results of a computer-aided text analysis with two complementary software packages suggest similarities and differences in participants’ views and privacy concerns (PC). Responsibility is relevant to personal data management, which represents a hotly contested issue. A geographical north–south divide appears for the importance of responsibility as opposed to trust. Moreover, people regard disclosure differently in the south (as a choice) and east (as forced) of Europe. Younger people express more positive attitudes toward data management, feel more responsible, and are more confident in their ability to prevent possible data misuse. Their lower PC and greater protective behaviours (i.e., a potential reversed privacy paradox) may help explain contradictory results in prior literature. These results offer significant and useful theoretical, managerial, and policy implications.
Similar content being viewed by others
References
Allik J and Realo A (2004) Individualism–collectivism and social capital. Journal of Cross-Cultural Psychology 35 (January), 29–49.
Anderson R and Moore T (2009) Information security: where computer science, economics and psychology meet. Philosophical Transactions of the Royal Society 367 (1898), 2717–2727.
Asbury J (1995) Overview of focus group research. Qualitative Health Research 5 (4), 414–420.
Ba S and Pavlou PA (2002) Evidence of the effect of trust building technology in electronic markets: price premium and buyer behavior. MIS Quarterly 26 (3), 243–268.
Baier A (1986) Trust and antitrust. Ethics 96 (2), 231–260.
Bansal G, Zahedi F and Gefen D (2008) The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. 29th International Conference on Information Systems, Paris, France, 14–17 December.
Bansal G, Zahedib FM and Gefen D (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems 49 (2), 138–150.
Baskerville RF (2003) Hofstede never studied culture. Accounting, Organizations and Society 28 (1), 1–14.
Baumann M (2010) Pew report: digital natives get personal. Information Today 27 (10), 18.
Bélanger F and Crossler RE (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly 35 (4), 1017–1041.
Bélanger F, Hiller JS and Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11 (3–4), 245–270.
Bellman S, Johnson EJ, Kobrin SJ and Lohse L (2004) International differences in information privacy concerns: a global survey of consumers. The Information Society 20 (5), 313–324.
Bennett CJ (1992) Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Cornell University Press, Ithaca, NY.
Benzécri JP (1981) Pratique de L'Analyse des Données, Linguistique et Lexicologie. Dunod, Paris.
Blomqvist K (1997) The many faces of trust. Scandinavian Journal of Management 13 (3), 271–286.
Boyacigiller N, Kleinberg MJ, Philips M and Sackmann S (1996) Conceptualizing culture. In Handbook for International Management Research (Punnett BJ and Shenkar O, Eds), Cambridge: Blackwell.
Boyd DM (2007) Why youth (heart) social network sites: the role of networked publics. In Youth, Identity and Digital Media (Buckingham D Ed), pp 119–142, MIT Press, Cambridge, MA.
Boyd DM and Ellison NB (2007) Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication 13 (1), 210–230.
Burchell S, Clubb C, Hopwood AG, Hughes J and Nahapiet J (1980) The roles of accounting in organizations and society. Accounting, Organizations, and Society 5 (1), 5–27.
Castaneda JA and Montoro FJ (2007) The effect of internet general privacy concern on customer behavior. Electronic Commerce Research 7 (2), 117–141.
Caverlee J and Webb S (2008) A large-scale study of MySpace: observations and implications for online social networks. In 2nd International Conference on Weblogs and Social Media, (ICWSM), Association for the Advancement of Artificial Intelligence, Seattle.
Clarke R (1999) Internet privacy concerns confirm the case for intervention. Communications of the ACM 42 (2), 60–67.
Colesca SE and Dobrica L (2008) Adoption and use of e-government services: the case of Romania. Journal of Applied Research and Technology 6 (3), 204–217.
Consumers-Union. (2008) Consumer reports poll: Americans extremely concerned about internet privacy. [WWW document], http://www.consumersunion.org/pub/core_telecom_and_utilities/006189.html, (accessed 25 September 2008).
Cox KK, Higginbotham JB and Burton J (1976) Applications of focus group interviews in marketing. Journal of Marketing 40 (1), 77–80.
Cullen R (2009) Culture, identity and information privacy in the age of digital government. Online Information Review 33 (3), 405–421.
Cullen R and Reilly P (2007) Information privacy and trust in government: a citizen-based perspective from New Zealand. Journal of Information Technology and Politics 4 (3), 61–80.
Culnan M and Armstrong P (1999) Information privacy concerns, procedural fairness and impersonal trust: an empirical investigation. Organization Science 10 (1), 104–115.
Davison RM, Clarke R, Smith HJ, Langford D and Kuo B (2003) Information privacy in a globally networked society: implications for IS research. Communications of the Association for Information Systems 12 (22), 341–365.
Delong DW and Fahey L (2000) Diagnosing cultural barriers to knowledge management. Academy of Management Executive 14 (4), 113–127.
Dietz G, Skinner D and Weibel A (2011) The true dark side of trust: when trust becomes a ‘poisoned chalice’. In Proceedings of the Academy of Management Annual Meeting.
Dinev T and Hart P (2006) Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce 10 (2), 7–29.
Dinev T, Massimo B, Hart P, Russo V and Colautti C (2006) Privacy calculus model in e-commerce – a study of Italy and the United States. European Journal of Information Systems 15 (4), 389–402.
Dinev T, Xu H, Smith JH and Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems 22: 295–316.
Donthu N and Yoo B (1998) Cultural influences on service quality expectations. Journal of Service Research 1 (2), 178–186.
Dwyer C (2007) Digital relationships in the ‘MySpace’ generation: results from a qualitative study. In Proceedings of 40th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4076409&isnumber=4076362.
Eastlick MA, Lotz SL and Warrington P (2006) Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59 (8), 877–886.
Ess C and Sudweeks F (2005) Culture and computer-mediated communication: toward new understandings. Journal of Computer-Mediated Communication 11 (1), Article 9.,available at: http://jcmc.indiana.edu/vol11/issue1/ess.html.
Fern EF (1982) The use of focus groups for idea generation: the effects of group size, acquaintanceship, and moderator on response quantity and quality. Journal of Marketing Research 19 (1), 1–13.
Fogel J and Nehmad E (2009) Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior 25 (1), 153–160.
Friedman B, Khan Jr. PH and Howe D (2000) Trust online. Communications of the ACM 43 (12), 34–40.
Fukuyama F (1996) Trust: The Social Virtues and the Creation of Prosperity. Simon and Schuster, New York.
Gephart R (2004) Qualitative research and the academy of management journal. Academy of Management Journal 47 (4), 454–462.
Govani T and Pashley H (2007) Student Awareness of the Privacy Implications When Using Facebook. Carnegie Mellon University, available at: http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf.
Grinstein A (2008) The effect of market orientation and its components on innovation consequences: a meta-analysis. Journal of the Academy of Marketing Science 36 (2), 166–173.
Gross R and Acquisti A (2005) Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society – WPES '05, Alexandria, VA, ACM.
Guba EG and Lincoln YS (1981) Effective Evaluation: Improving the Usefulness of Evaluation Results through Responsive and Naturalistic Approaches. Jossey-Bass, San Francisco, CA.
Herring SC (2008) Questioning the generational divide: technological exoticism and adult constructions of online youth identity. In Youth, Identity, and Digital Media (Buckingham D. Ed.), pp. 71–92. MIT Press, Cambridge MA.
Hofstede G (1980) Culture’s consequences: international differences. in Work-Related Values, pp 335–355, Sage Publications, Beverly Hills, CA.
Hofstede G (1991) Culture and Organizations: Software of the Mind. McGraw Hill, London.
Hoofnagle C, King J, Li S and Turow J (2010) How different are young adults from older adults when it comes to information privacy attitudes and policies. [WWW document] available at: http://ssrn.com/abstract=1589864 (accessed January 2, 2012).
Hope A (2007) Risk taking, boundary performance and intentional school internet ‘misuse’. Discourse: Studies in the Cultural Politics of Education 28 (1), 87–99.
House RJ, Hanges PJ, Javidan M, Dorfman P and Gupta V (2004) Culture, Leadership, and Organizations: The GLOBE Study of 62 Societies. Sage Publications, Thousand Oaks, CA.
Howard PN and Mazaheri N (2009) Telecommunications reform, internet use and mobile phone adoption in the developing world. World Development 37 (7), 1159–1169.
IBM. (1999) IBM Multi-National Consumer Privacy Survey. IBM Global Services, Somers, NY.
Javidi M, Long LW, Vasu ML and Ivy DK (1991) Enhancing focus group validity with computer-assisted technology in social science research. Social Science Computer Review 9 (2), 231–245.
Johnson J (1992) A theory of the nature and value of privacy. Public Affairs Quarterly 6 (3), 271–292.
Jones S, Johnson-Yale C, Millermaier S and Perez FS (2009) Everyday life, online: U.S. college students’ use of the internet. First Monday 14 (10), available at:http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2649/2301.
Kagitcibasi C (1997) Individualism and collectivism. In Handbook of Cross-Cultural Psychology: Social Behavior and Applications. Vol. 3 (Berry JW, Segall MH and Kagitcibasi C, Eds) pp 1–49, Allyn & Bacon, Boston.
Kelly AE and McKillop KJ (1996) Consequences of revealing personal secrets. Psychological Bulletin 120 (3), 450–465.
Kitzinger J (1995) Introducing focus groups. British Medical Journal 311 (7000), 299–302.
Kornai J (2006) The great transformation of central eastern Europe. Economics of Transition 14 (2), 207–244.
Krasnova H, Hildebrand T and Guenther O (2009) Investigating the value of privacy in online social networks: conjoint analysis. In Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, 15–18 December.
Lampe C, Ellison N and Steinfield C (2008) Changes in use and perception of Facebook. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, San Diego, CA. New York, ACM, pp 721–730.
Lebart L and Salem A (1994) Statistique Textuelle. Dunod, Paris.
Leidner DE and Kayworth TR (2006) A review of culture in information systems research: toward a theory of information technology culture conflict. Management Information Systems Quarterly 30 (2), 357–399.
Lenhart A and Madden M (2007) Teens, Privacy and Online Social Networks. Pew Internet & American Life Project, Washington DC.
Lenhart A, Madden M, Smith A and Macgill A (2007) Teens and Social Media. Pew Internet & American Life Project, Washington DC.
Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems 28 (28), 453–496.
Life Support. (2010) Young people’s needs in a digital age. [WWW document] available at: http://eryica.org/files/Life%20Support-%20Young%20people%27s%20needs%20in%20a%20digital%20age.pdf, (accessed 3 January 2012).
Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Society 10 (3), 393–411.
Lusoli W and Miltgen C (2009) Young people and emerging digital services: an exploratory survey on motivations, perceptions and acceptance of risks. (Lusoli W, Compañó R and Maghiros I, Eds) JRC Scientific and Technical Reports EUR 23765 EN, EC JRC IPTS, Sevilla.
Lytle AL, Brett JM, Barsness ZI, Tinsley CH and Janssens M (1995) A paradigm for confirmatory cross-cultural research in organizational behavior. In Research in organizational behaviour, 17, (Staw BM and Cummings LL, Eds.), pp. 167–214, JAI Press, Greenwich.
Madden M, Fox S, Smith A and Vitak J (2007) Digital Footprints: Online Identity Management and Search in the Age of Transparency. PEW Research Center Publications, available at: http://pewresearch.org/pubs/663/digital-footprints.
Madise U and Martens T (2006) E-voting in Estonia 2005: the first practice of country-wide binding internet voting in the world. In Electronic Voting 2006 (Krimmer R Ed.) pp 15–26, 2nd International Workshop, LNI, 86.
Malhotra NK, Kim SS and Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research 15 (4), 336–355.
Marchand P (2007) Concepts, méthodes et outils. In Analyse statistique de données textuelles en sciences de gestion – Concepts, méthodes et applications (Gauzente C and Peyrat-Guillard D, Eds) pp 47–70, Editions EMS, collection Management & Société, Paris.
Marsden CT (2008) Beyond Europe: the internet, regulation, and multistakeholder governance – representing the consumer interest? Journal of Consumer Policy 31 (1), 115–132.
Marwick AE, Diaz DM and Palfrey J (2010) Youth, privacy and reputation. Berkman Center for Internet and Society, Research Publication No. 2010-5, available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1588163.
Mason S (1986) Four ethical issues of the information age. MIS Quarterly 10 (1), 5–12.
Maynard ML and Taylor CR (1996) A comparative analysis of Japanese and U.S. attitudes toward direct marketing. Journal of Direct Marketing 10 (1), 34–44.
Mendes De Almeida PF (1980) A review of group discussion methodology. European Research 8 (3), 114–120.
Merriam SB (1998) Qualitative Research and Case Study Applications in Education. Jossey-Bass, San Francisco.
Merton RK, Fiske M and Kendall PL (1990) The Focused Interview. Free Press, New York.
Merton RK and Kendall PL (1946) The focused interview. American Journal of Sociology 51: 541–57.
Milberg SJ, Burke SJ, Smith HJ and Kallman EA (1995) Values, personal information privacy, and regulatory approaches. Communication of the ACM 38 (12), 65–74.
Milberg SJ, Smith HJ and Burke SJ (2000) Information privacy: corporate management and national regulation. Organization Science 11 (1), 35–57.
Morris MG, Venkatesh V and Ackerman PL (2005) Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior. IEEE Transactions on Engineering Management 52 (1), 69–84.
Moscardelli DM and Divine R (2007) Adolescents’ concern for privacy when using the internet: an empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal 35 (3), 232–252.
Moscardelli DM and Liston-Heyes C (2004) Teens surfing the net: how do they learn to protect their privacy? Journal of Business and Economics Research 2 (9), 43–56.
Mowday RT and Sutton RI (1993) Organizational behavior: linking individuals and groups to organizational contexts. Annual Reviews in Psychology 44 (1), 195–229.
Orviska M and Hudson J (2009) Dividing or uniting Europe? internet usage in the EU. Information Economics and Policy 21 (4), 279–290.
Oyserman D, Coon HM and Kemmelmeir M (2002) Rethinking individualism and collectivism: evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin 128 (1), 3–72.
Palfrey J and Gasser U (2008) Born Digital: Understanding the First Generation of Digital Natives. Basic Books, New York.
Panopoulou E, Tambouris E, Zotou M and Tarabanis K (2009) Evaluating eParticipation sophistication of Regional Authorities websites: the case of Greece and Spain. Computer Science 5694: 67–77.
Patterson P, Cowley E and Prasongsukarn K (2006) Service failure recovery: the moderating impact of individual-level cultural value orientation on perceptions of justice. International Journal of Research in Marketing 23 (3), 263–277.
Patton MQ (1991) Qualitative Evaluation Methods, 2nd edn, Sage, Newbury Park, CA.
Pavlou PA (2011) State of the information privacy literature: where are we now and where should we go? MIS Quarterly 35 (4), 977–988.
Peirce CS (1931–1935) Collected Papers of Charles Sanders Peirce. 8 vols (Hartshorne C, Weiss P and Burks AW, Eds), Harvard University Press, Cambridge, MA.
Pettigrew AM (1979) On studying organizational cultures. Administrative Science Quarterly 24 (4), 570–581.
Polasik M and Wisniewski TP (2009) Empirical analysis of internet banking adoption in Poland. International Journal of Bank Marketing 27 (1), 32–52.
Posey C, Lowry PB, Roberts TL and Ellis TS (2010) Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. European Journal of Information Systems 19: 181–195.
Prince M (1978) Focus groups can give marketers early clues on marketability of new product. Marketing News 12 (8), 12.
Reinert M (1986) Classification descendante hiérarchique: un algorithme pour le traitement des tableaux logiques de grandes dimensions. In Data analysis and Informatics (Diday M., Jambu L., Lebart J., Pages and R. Tomassone, Eds) pp 23–28, Elsevier Science Publishers, Amsterdam, North-Holland.
Reinert M (1990) Alceste: une méthodologie d'analyse des données textuelles et une application: Aurélia de G. de Nerval. Bulletin de Méthodologie Sociologique 26 (1), 24–54.
Reinert M (1998) Quel objet pour une analyse statistique du discours? Quelques réflexions à propos de la réponse Alceste. In Proceedings of Journées Internationales d'Analyse Statistique de Données Textuelles (JADT) International Conference on Textual Data Analysis (Salem A. and Fleury S. Eds) Nice, France.
Rousseau D, Sitkin SB, Burt RS and Camerer C (1998) Not so different after all: a cross-discipline view of trust. Academy of Management Review 23 (3), 393–404.
Ryan AM, McFarland L, Baron H and Page R (1999) An international look at selection practices: nation and culture as explanations for variability in practice. Personnel Psychology 52 (2), 359–391.
Sackmann SA (1992) Culture and subcultures: an analysis of organizational knowledge. Administrative Science Quarterly 37 (1), 140–161.
Shenkar O (2001) Cultural distance revisited: towards a more rigorous conceptualization and measurement of cultural differences. Journal of International Business Studies 32 (3), 519–535.
Shin SK, Ishman M and Sanders GL (2007) An empirical investigation of socio-cultural factors of information sharing in China. Information & Management 44 (2), 165–174.
Smith HJ, Dinev T and Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35 (4), 989–1015.
Smith HJ, Milberg SJ and Burke SJ (1996a) Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly 20 (2), 167–196.
Smith PB, Dugan S and Trompenaars F (1996b) National culture and the values of organizational employees: a dimensional analysis across 43 nations. Journal of Cross-cultural Psychology 27 (2), 231–264.
Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review 154 (3), 477–560.
Sondergaard M (1994) Research note: Hofstede’s consequences: a study of reviews, citations and replications. Organization Studies 15 (3), 447–456.
Srite M and Karahanna E (2006) The role of espoused national cultural values in technology acceptance. MIS Quarterly 30 (3), 679–704.
Staat W (1993) On abduction, deduction, induction and the categories. Transactions of the Charles S. Peirce Society 29 (2), 225–237.
Steenkamp J-B EM and Geyskens I (2006) How country characteristics affect the perceived value of web sites? Journal of Marketing 70 (3), 136–150.
Steeves V and Webster C (2008) Closing the barn door: the effect of parental supervision on Canadian children’s online privacy. Bulletin of Science, Technology & Society 28 (1), 4–19.
Straub D, Loch K, Evaristo R, Karahanna E and Strite M (2002) Toward a theory-based measurement of culture. In Human Factors in Information Systems (Szewczak EJ and Snodgrass CR, Eds) pp 61–82, IRM Press, London.
Ting-Toomey S (1991) Intimacy expressions in three cultures: France, Japan, and the United States. International Journal of Intercultural Relations 15 (1), 29–46.
Triandis HC (1995) Individualism and Collectivism. Westview Press, Boulder, CO.
Trompenaars F (1996) Resolving international conflict: culture and business strategy. Business Strategy Review 7 (3), 51–68.
Turow J and Nir L (2000) The Internet and the Family 2000: The View from Parents, the View from Kids. Annenberg Public Policy Center, University of Pennsylvania, Philadelphia, PA.
Van Slyke C, Shim JT, Johnson R and Jiang JJ (2006) Concerns for information privacy and online consumer purchasing. Journal of the Association for Information Systems 7 (6), 415–444.
Wang YD and Emurian HH (2005) An overview of online trust: concepts, elements, and implications. Computers in Human Behavior 21 (1), 105–125.
Warren SD and Brandeis LD (1890) The right to privacy. Harvard Law Review 4 (5), 193.
Westin AF (1967) Privacy and Freedom. Atheneum Press, New York.
Youn S (2005) Teenagers’ perceptions of online privacy and coping behaviors: a risk–benefit appraisal approach. Journal of Broadcasting & Electronic Media 49 (1), 86.
Youn S (2009) Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs 43 (3), 389–418.
Acknowledgements
The authors thank Ioannis Maghiros, Wainer Lusoli, and Margherita Bacigalupo from the European Commission IPTS Joint Research Centre for their support and confidence. This study was funded by the European Commission IPTS (Institute for Prospective Technological Studies) Joint Research Centre (EC JRC IPTS Contract No. 151592-2009 A08-FR).
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix A
Appendix B
Appendix C
Process of data collection and analysis
Step 1: Data collection
-
Two focus groups organised per country (one with young people and one with adults), 7 countries (14 focus groups), a total of 139 participants (8–12 in each focus group)
-
All moderators are scholars of partner universities, having a very good knowledge of English
-
The same instructions are given to the partners to recruit participants
-
Before the beginning of each focus group, participants completed a questionnaire to indicate their individual characteristics (see Appendix B)
-
The same guide was used by all moderators, trained and briefed in advance
-
The moderator and participants use their common native language during the discussion
-
The same moderator conducts the two focus groups in his or her country
-
All the discussions are audio and video-recorded
-
Each moderator is in charge of the transcription of the focus groups he or she conducted
-
Each moderator is in charge of the translation of the discussions in English
-
All the discussions translated into English are sent by the moderators to the authors
Step 2: Preparation of the corpus by the researchers
A global corpus of all translations of the discussions in the 7 countries is prepared for the analysis: a partition of the corpus is made to separate the discourse of each of the 139 participants. Thus, each sentence pronounced by one participant can be linked to the number of the participant, to the country, to one of the two focus groups of the country, and to the individual characteristics of this participant. With Alceste software, the separation is a row beginning with the number of the participant (four characters) and then the character ‘*’. The individual characteristics are added after the ‘*’.
Example:
0001 *Country_Estonia *Gender_F *Age_19to24 *FG_Young
Text of the focus group participant number 1, an Estonian female, aged between 19 and 24, interviewed in the focus group with young people
In this file, participants 1–19 are from Estonia; participants 20–39 are from France; participants 40–59 are from Romania; participants 60–80 are from Germany; participants 81–100 are from Greece; participants 101–120 are from Poland; participants 121–139 are from Spain.
Seven files (one per country) are also prepared in the same way to run detailed analyses per country.
Step 3: Data analyses by the software packages
Alceste software
-
Segmentation of the corpus and reduction of the words to their roots (lemmatisation): The software identifies the set of lexicometrical base units in the corpus. Each unit is named a graphical form, or word-type (Lebart & Salem, 1994). The software identifies more complex forms and thus regroups into units the graphical forms that correspond to the different ways in which the same lemma can occur (e.g., verbs changed to infinitives, plurals to singular). In the standard analysis, rare words (frequency less than 4) are eliminated.
-
Partition of the corpus by the software: The Alceste software divides the text into CUs that correspond more or less to a small paragraph, depending on the length of the corpus. The entire corpus is separated into different CUs. The lexical table cross-tabulates the lemmatised forms, with the text separated into different CUs. The rows of the data table correspond to the different CUs, and the columns correspond to the different graphical forms (lemmatised words). The cells contain either 0 or 1 (complete disjunctive table), depending on the absence or presence, respectively, of the graphical form in a CU.
-
DHC: A DHC is performed on the entire lexical table. A second classification tests the stability of the classes obtained. In this second classification, each CU is longer (minimum of 12 words instead of 10 in the standard configuration). In the classification, all the CUs are first placed together in a single class. Then, at each step, the two most different classes (i.e., with the greatest margin contrast) are identified until all CUs have been either classified or not, depending on their graphical forms
WordMapper software
-
Segmentation of the corpus, identification of ‘significant words’ (meaningful), and reduction of the words to their roots (lemmatisation): any WordMapper analysis must begin with the creation of meaningful words, and during that phase empty words, such as articles, are eliminated. In the standard analysis, rare words (frequency of the word in the corpus less than 3) and non-significant (empty) words (number of letters less than 3) are eliminated. The software establishes the list of all the significant words with a minimum frequency of 3.
-
Construction of the data table by the software: the list of the lemmatised significant words is used by the software to build the data table. The rows of the data table correspond to the different lemmatised significant words, and the columns correspond to the different modalities of the variable chosen.
-
A CFA is performed on the data table.
Step 4: Interpretation of the results by the researchers
Results with Alceste software
A dendogram resulting from the DHC shows the hierarchical division of the classes (each class, i.e., a group of co-occurring words, forms a specific lexical world). In practice, what is important is the stability of the classes obtained, and the percentage of CUs globally classified. The individual characteristics of the participants are not taken into account when classifying the responses (they are supplementary elements), but it is possible to describe each class in terms of its population. The software calculates the representativeness of each word and each CU for a specific class, according to the χ2 statistic (see Appendix D).
Results with WordMapper software
The statistics given by the software help the researcher to interpret the results of the CFA. These statistics are the same and the interpretation is the same as a CFA performed on non-textual data: absolute contributions per axis, relative contributions (squared cosine) per axis, coordinates per axes.
Appendix D
Appendix E
Examples of interactions during the focus groups
Focus group with young people in France: Discussion about ‘Responsibility’
Participant number 22
If you trust a website you also don’t want that Internet site or company to give out your information either. So the responsibility for the site is not just ours
Participant number 24
At the same time if there’s a problem you're not going to go and complain to the site
Participant number 22
It’s a bit pointless … you can only blame yourself
Participant number 23
Yes because you don't know if behind it there's actually a person at all. So you're not going to get angry … well yeah you get angry with the computer at the time, but the computer is not going to give you an answer. So then you blame yourself. The problem is when you get a call from a call centre, you don't know how to take your information back. If they start rattling off the details of your life you're not going to say: ‘no that's not me’
Participant number 20
Your reflex is to hang up, but a better thing to do would be to ask them how they got your information
Participant number 23
At the same time they use formulaic questions and you just answer them
Participant number 24
Then you can tell them for your landline you don’t want to or you don't agree with that kind of technique
Focus group with young people in Greece: Discussion about ‘Trust’
Moderator
How can companies gain your trust, so that you will give them your data?
Participant number 87
Mainly by being well-known
Participant number 88
I gave it to a company, only because a friend of mine was working there
Participant number 90
To be trustworthy actually. Not just having a good reputation, the company must also have terms of use, and we must be certain that the data will not be used for another purpose
Participant number 81
…If I were asked something irrelevant, I would be suspicious, why is he asking me that? I would question its motives, when I can’t imagine how the company will use it
Rights and permissions
About this article
Cite this article
Miltgen, C., Peyrat-Guillard, D. Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Eur J Inf Syst 23, 103–125 (2014). https://doi.org/10.1057/ejis.2013.17
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/ejis.2013.17