Skip to main content
Log in

Cultural and generational influences on privacy concerns: a qualitative study in seven European countries

  • Empirical Research
  • Published:
European Journal of Information Systems

Abstract

This research examines how European citizens decide to disclose and protect their personal data and thereby reveals cultural and generational divides. Focus group discussions featured either young people, aged 15 to 24 years, or adults, between 25 and 70 years of age, and were conducted in seven EU member states. The results of a computer-aided text analysis with two complementary software packages suggest similarities and differences in participants’ views and privacy concerns (PC). Responsibility is relevant to personal data management, which represents a hotly contested issue. A geographical north–south divide appears for the importance of responsibility as opposed to trust. Moreover, people regard disclosure differently in the south (as a choice) and east (as forced) of Europe. Younger people express more positive attitudes toward data management, feel more responsible, and are more confident in their ability to prevent possible data misuse. Their lower PC and greater protective behaviours (i.e., a potential reversed privacy paradox) may help explain contradictory results in prior literature. These results offer significant and useful theoretical, managerial, and policy implications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4

Similar content being viewed by others

References

  • Allik J and Realo A (2004) Individualism–collectivism and social capital. Journal of Cross-Cultural Psychology 35 (January), 29–49.

    Article  Google Scholar 

  • Anderson R and Moore T (2009) Information security: where computer science, economics and psychology meet. Philosophical Transactions of the Royal Society 367 (1898), 2717–2727.

    Article  Google Scholar 

  • Asbury J (1995) Overview of focus group research. Qualitative Health Research 5 (4), 414–420.

    Article  Google Scholar 

  • Ba S and Pavlou PA (2002) Evidence of the effect of trust building technology in electronic markets: price premium and buyer behavior. MIS Quarterly 26 (3), 243–268.

    Article  Google Scholar 

  • Baier A (1986) Trust and antitrust. Ethics 96 (2), 231–260.

    Article  Google Scholar 

  • Bansal G, Zahedi F and Gefen D (2008) The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. 29th International Conference on Information Systems, Paris, France, 14–17 December.

  • Bansal G, Zahedib FM and Gefen D (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems 49 (2), 138–150.

    Article  Google Scholar 

  • Baskerville RF (2003) Hofstede never studied culture. Accounting, Organizations and Society 28 (1), 1–14.

    Article  Google Scholar 

  • Baumann M (2010) Pew report: digital natives get personal. Information Today 27 (10), 18.

    Google Scholar 

  • Bélanger F and Crossler RE (2011) Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly 35 (4), 1017–1041.

    Google Scholar 

  • Bélanger F, Hiller JS and Smith WJ (2002) Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11 (3–4), 245–270.

    Article  Google Scholar 

  • Bellman S, Johnson EJ, Kobrin SJ and Lohse L (2004) International differences in information privacy concerns: a global survey of consumers. The Information Society 20 (5), 313–324.

    Article  Google Scholar 

  • Bennett CJ (1992) Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Cornell University Press, Ithaca, NY.

    Google Scholar 

  • Benzécri JP (1981) Pratique de L'Analyse des Données, Linguistique et Lexicologie. Dunod, Paris.

    Google Scholar 

  • Blomqvist K (1997) The many faces of trust. Scandinavian Journal of Management 13 (3), 271–286.

    Article  Google Scholar 

  • Boyacigiller N, Kleinberg MJ, Philips M and Sackmann S (1996) Conceptualizing culture. In Handbook for International Management Research (Punnett BJ and Shenkar O, Eds), Cambridge: Blackwell.

    Google Scholar 

  • Boyd DM (2007) Why youth (heart) social network sites: the role of networked publics. In Youth, Identity and Digital Media (Buckingham D Ed), pp 119–142, MIT Press, Cambridge, MA.

    Google Scholar 

  • Boyd DM and Ellison NB (2007) Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication 13 (1), 210–230.

    Article  Google Scholar 

  • Burchell S, Clubb C, Hopwood AG, Hughes J and Nahapiet J (1980) The roles of accounting in organizations and society. Accounting, Organizations, and Society 5 (1), 5–27.

    Article  Google Scholar 

  • Castaneda JA and Montoro FJ (2007) The effect of internet general privacy concern on customer behavior. Electronic Commerce Research 7 (2), 117–141.

    Article  Google Scholar 

  • Caverlee J and Webb S (2008) A large-scale study of MySpace: observations and implications for online social networks. In 2nd International Conference on Weblogs and Social Media, (ICWSM), Association for the Advancement of Artificial Intelligence, Seattle.

  • Clarke R (1999) Internet privacy concerns confirm the case for intervention. Communications of the ACM 42 (2), 60–67.

    Article  Google Scholar 

  • Colesca SE and Dobrica L (2008) Adoption and use of e-government services: the case of Romania. Journal of Applied Research and Technology 6 (3), 204–217.

    Google Scholar 

  • Consumers-Union. (2008) Consumer reports poll: Americans extremely concerned about internet privacy. [WWW document], http://www.consumersunion.org/pub/core_telecom_and_utilities/006189.html, (accessed 25 September 2008).

  • Cox KK, Higginbotham JB and Burton J (1976) Applications of focus group interviews in marketing. Journal of Marketing 40 (1), 77–80.

    Article  Google Scholar 

  • Cullen R (2009) Culture, identity and information privacy in the age of digital government. Online Information Review 33 (3), 405–421.

    Article  Google Scholar 

  • Cullen R and Reilly P (2007) Information privacy and trust in government: a citizen-based perspective from New Zealand. Journal of Information Technology and Politics 4 (3), 61–80.

    Article  Google Scholar 

  • Culnan M and Armstrong P (1999) Information privacy concerns, procedural fairness and impersonal trust: an empirical investigation. Organization Science 10 (1), 104–115.

    Article  Google Scholar 

  • Davison RM, Clarke R, Smith HJ, Langford D and Kuo B (2003) Information privacy in a globally networked society: implications for IS research. Communications of the Association for Information Systems 12 (22), 341–365.

    Google Scholar 

  • Delong DW and Fahey L (2000) Diagnosing cultural barriers to knowledge management. Academy of Management Executive 14 (4), 113–127.

    Google Scholar 

  • Dietz G, Skinner D and Weibel A (2011) The true dark side of trust: when trust becomes a ‘poisoned chalice’. In Proceedings of the Academy of Management Annual Meeting.

  • Dinev T and Hart P (2006) Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce 10 (2), 7–29.

    Article  Google Scholar 

  • Dinev T, Massimo B, Hart P, Russo V and Colautti C (2006) Privacy calculus model in e-commerce – a study of Italy and the United States. European Journal of Information Systems 15 (4), 389–402.

    Article  Google Scholar 

  • Dinev T, Xu H, Smith JH and Hart P (2013) Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems 22: 295–316.

    Article  Google Scholar 

  • Donthu N and Yoo B (1998) Cultural influences on service quality expectations. Journal of Service Research 1 (2), 178–186.

    Article  Google Scholar 

  • Dwyer C (2007) Digital relationships in the ‘MySpace’ generation: results from a qualitative study. In Proceedings of 40th Hawaii International Conference on System Sciences, IEEE, Big Island, Hawaii, available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4076409&isnumber=4076362.

  • Eastlick MA, Lotz SL and Warrington P (2006) Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59 (8), 877–886.

    Article  Google Scholar 

  • Ess C and Sudweeks F (2005) Culture and computer-mediated communication: toward new understandings. Journal of Computer-Mediated Communication 11 (1), Article 9.,available at: http://jcmc.indiana.edu/vol11/issue1/ess.html.

  • Fern EF (1982) The use of focus groups for idea generation: the effects of group size, acquaintanceship, and moderator on response quantity and quality. Journal of Marketing Research 19 (1), 1–13.

    Article  Google Scholar 

  • Fogel J and Nehmad E (2009) Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior 25 (1), 153–160.

    Article  Google Scholar 

  • Friedman B, Khan Jr. PH and Howe D (2000) Trust online. Communications of the ACM 43 (12), 34–40.

    Article  Google Scholar 

  • Fukuyama F (1996) Trust: The Social Virtues and the Creation of Prosperity. Simon and Schuster, New York.

    Google Scholar 

  • Gephart R (2004) Qualitative research and the academy of management journal. Academy of Management Journal 47 (4), 454–462.

    Article  Google Scholar 

  • Govani T and Pashley H (2007) Student Awareness of the Privacy Implications When Using Facebook. Carnegie Mellon University, available at: http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf.

    Google Scholar 

  • Grinstein A (2008) The effect of market orientation and its components on innovation consequences: a meta-analysis. Journal of the Academy of Marketing Science 36 (2), 166–173.

    Article  Google Scholar 

  • Gross R and Acquisti A (2005) Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society – WPES '05, Alexandria, VA, ACM.

  • Guba EG and Lincoln YS (1981) Effective Evaluation: Improving the Usefulness of Evaluation Results through Responsive and Naturalistic Approaches. Jossey-Bass, San Francisco, CA.

    Google Scholar 

  • Herring SC (2008) Questioning the generational divide: technological exoticism and adult constructions of online youth identity. In Youth, Identity, and Digital Media (Buckingham D. Ed.), pp. 71–92. MIT Press, Cambridge MA.

  • Hofstede G (1980) Culture’s consequences: international differences. in Work-Related Values, pp 335–355, Sage Publications, Beverly Hills, CA.

  • Hofstede G (1991) Culture and Organizations: Software of the Mind. McGraw Hill, London.

    Google Scholar 

  • Hoofnagle C, King J, Li S and Turow J (2010) How different are young adults from older adults when it comes to information privacy attitudes and policies. [WWW document] available at: http://ssrn.com/abstract=1589864 (accessed January 2, 2012).

  • Hope A (2007) Risk taking, boundary performance and intentional school internet ‘misuse’. Discourse: Studies in the Cultural Politics of Education 28 (1), 87–99.

    Google Scholar 

  • House RJ, Hanges PJ, Javidan M, Dorfman P and Gupta V (2004) Culture, Leadership, and Organizations: The GLOBE Study of 62 Societies. Sage Publications, Thousand Oaks, CA.

    Google Scholar 

  • Howard PN and Mazaheri N (2009) Telecommunications reform, internet use and mobile phone adoption in the developing world. World Development 37 (7), 1159–1169.

    Article  Google Scholar 

  • IBM. (1999) IBM Multi-National Consumer Privacy Survey. IBM Global Services, Somers, NY.

  • Javidi M, Long LW, Vasu ML and Ivy DK (1991) Enhancing focus group validity with computer-assisted technology in social science research. Social Science Computer Review 9 (2), 231–245.

    Article  Google Scholar 

  • Johnson J (1992) A theory of the nature and value of privacy. Public Affairs Quarterly 6 (3), 271–292.

    Google Scholar 

  • Jones S, Johnson-Yale C, Millermaier S and Perez FS (2009) Everyday life, online: U.S. college students’ use of the internet. First Monday 14 (10), available at:http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2649/2301.

  • Kagitcibasi C (1997) Individualism and collectivism. In Handbook of Cross-Cultural Psychology: Social Behavior and Applications. Vol. 3 (Berry JW, Segall MH and Kagitcibasi C, Eds) pp 1–49, Allyn & Bacon, Boston.

    Google Scholar 

  • Kelly AE and McKillop KJ (1996) Consequences of revealing personal secrets. Psychological Bulletin 120 (3), 450–465.

    Article  Google Scholar 

  • Kitzinger J (1995) Introducing focus groups. British Medical Journal 311 (7000), 299–302.

    Article  Google Scholar 

  • Kornai J (2006) The great transformation of central eastern Europe. Economics of Transition 14 (2), 207–244.

    Article  Google Scholar 

  • Krasnova H, Hildebrand T and Guenther O (2009) Investigating the value of privacy in online social networks: conjoint analysis. In Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, 15–18 December.

  • Lampe C, Ellison N and Steinfield C (2008) Changes in use and perception of Facebook. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, San Diego, CA. New York, ACM, pp 721–730.

  • Lebart L and Salem A (1994) Statistique Textuelle. Dunod, Paris.

    Google Scholar 

  • Leidner DE and Kayworth TR (2006) A review of culture in information systems research: toward a theory of information technology culture conflict. Management Information Systems Quarterly 30 (2), 357–399.

    Google Scholar 

  • Lenhart A and Madden M (2007) Teens, Privacy and Online Social Networks. Pew Internet & American Life Project, Washington DC.

    Google Scholar 

  • Lenhart A, Madden M, Smith A and Macgill A (2007) Teens and Social Media. Pew Internet & American Life Project, Washington DC.

    Google Scholar 

  • Li Y (2011) Empirical studies on online information privacy concerns: literature review and an integrative framework. Communications of the Association for Information Systems 28 (28), 453–496.

    Google Scholar 

  • Life Support. (2010) Young people’s needs in a digital age. [WWW document] available at: http://eryica.org/files/Life%20Support-%20Young%20people%27s%20needs%20in%20a%20digital%20age.pdf, (accessed 3 January 2012).

  • Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Society 10 (3), 393–411.

    Article  Google Scholar 

  • Lusoli W and Miltgen C (2009) Young people and emerging digital services: an exploratory survey on motivations, perceptions and acceptance of risks. (Lusoli W, Compañó R and Maghiros I, Eds) JRC Scientific and Technical Reports EUR 23765 EN, EC JRC IPTS, Sevilla.

  • Lytle AL, Brett JM, Barsness ZI, Tinsley CH and Janssens M (1995) A paradigm for confirmatory cross-cultural research in organizational behavior. In Research in organizational behaviour, 17, (Staw BM and Cummings LL, Eds.), pp. 167–214, JAI Press, Greenwich.

  • Madden M, Fox S, Smith A and Vitak J (2007) Digital Footprints: Online Identity Management and Search in the Age of Transparency. PEW Research Center Publications, available at: http://pewresearch.org/pubs/663/digital-footprints.

    Google Scholar 

  • Madise U and Martens T (2006) E-voting in Estonia 2005: the first practice of country-wide binding internet voting in the world. In Electronic Voting 2006 (Krimmer R Ed.) pp 15–26, 2nd International Workshop, LNI, 86.

  • Malhotra NK, Kim SS and Agarwal J (2004) Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research 15 (4), 336–355.

    Article  Google Scholar 

  • Marchand P (2007) Concepts, méthodes et outils. In Analyse statistique de données textuelles en sciences de gestion – Concepts, méthodes et applications (Gauzente C and Peyrat-Guillard D, Eds) pp 47–70, Editions EMS, collection Management & Société, Paris.

    Google Scholar 

  • Marsden CT (2008) Beyond Europe: the internet, regulation, and multistakeholder governance – representing the consumer interest? Journal of Consumer Policy 31 (1), 115–132.

    Article  Google Scholar 

  • Marwick AE, Diaz DM and Palfrey J (2010) Youth, privacy and reputation. Berkman Center for Internet and Society, Research Publication No. 2010-5, available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1588163.

  • Mason S (1986) Four ethical issues of the information age. MIS Quarterly 10 (1), 5–12.

    Article  Google Scholar 

  • Maynard ML and Taylor CR (1996) A comparative analysis of Japanese and U.S. attitudes toward direct marketing. Journal of Direct Marketing 10 (1), 34–44.

    Article  Google Scholar 

  • Mendes De Almeida PF (1980) A review of group discussion methodology. European Research 8 (3), 114–120.

    Google Scholar 

  • Merriam SB (1998) Qualitative Research and Case Study Applications in Education. Jossey-Bass, San Francisco.

    Google Scholar 

  • Merton RK, Fiske M and Kendall PL (1990) The Focused Interview. Free Press, New York.

    Google Scholar 

  • Merton RK and Kendall PL (1946) The focused interview. American Journal of Sociology 51: 541–57.

    Article  Google Scholar 

  • Milberg SJ, Burke SJ, Smith HJ and Kallman EA (1995) Values, personal information privacy, and regulatory approaches. Communication of the ACM 38 (12), 65–74.

    Article  Google Scholar 

  • Milberg SJ, Smith HJ and Burke SJ (2000) Information privacy: corporate management and national regulation. Organization Science 11 (1), 35–57.

    Article  Google Scholar 

  • Morris MG, Venkatesh V and Ackerman PL (2005) Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior. IEEE Transactions on Engineering Management 52 (1), 69–84.

    Article  Google Scholar 

  • Moscardelli DM and Divine R (2007) Adolescents’ concern for privacy when using the internet: an empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal 35 (3), 232–252.

    Article  Google Scholar 

  • Moscardelli DM and Liston-Heyes C (2004) Teens surfing the net: how do they learn to protect their privacy? Journal of Business and Economics Research 2 (9), 43–56.

    Google Scholar 

  • Mowday RT and Sutton RI (1993) Organizational behavior: linking individuals and groups to organizational contexts. Annual Reviews in Psychology 44 (1), 195–229.

    Article  Google Scholar 

  • Orviska M and Hudson J (2009) Dividing or uniting Europe? internet usage in the EU. Information Economics and Policy 21 (4), 279–290.

    Article  Google Scholar 

  • Oyserman D, Coon HM and Kemmelmeir M (2002) Rethinking individualism and collectivism: evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin 128 (1), 3–72.

    Article  Google Scholar 

  • Palfrey J and Gasser U (2008) Born Digital: Understanding the First Generation of Digital Natives. Basic Books, New York.

    Google Scholar 

  • Panopoulou E, Tambouris E, Zotou M and Tarabanis K (2009) Evaluating eParticipation sophistication of Regional Authorities websites: the case of Greece and Spain. Computer Science 5694: 67–77.

    Google Scholar 

  • Patterson P, Cowley E and Prasongsukarn K (2006) Service failure recovery: the moderating impact of individual-level cultural value orientation on perceptions of justice. International Journal of Research in Marketing 23 (3), 263–277.

    Article  Google Scholar 

  • Patton MQ (1991) Qualitative Evaluation Methods, 2nd edn, Sage, Newbury Park, CA.

    Google Scholar 

  • Pavlou PA (2011) State of the information privacy literature: where are we now and where should we go? MIS Quarterly 35 (4), 977–988.

    Google Scholar 

  • Peirce CS (1931–1935) Collected Papers of Charles Sanders Peirce. 8 vols (Hartshorne C, Weiss P and Burks AW, Eds), Harvard University Press, Cambridge, MA.

    Google Scholar 

  • Pettigrew AM (1979) On studying organizational cultures. Administrative Science Quarterly 24 (4), 570–581.

    Article  Google Scholar 

  • Polasik M and Wisniewski TP (2009) Empirical analysis of internet banking adoption in Poland. International Journal of Bank Marketing 27 (1), 32–52.

    Article  Google Scholar 

  • Posey C, Lowry PB, Roberts TL and Ellis TS (2010) Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. European Journal of Information Systems 19: 181–195.

    Article  Google Scholar 

  • Prince M (1978) Focus groups can give marketers early clues on marketability of new product. Marketing News 12 (8), 12.

    Google Scholar 

  • Reinert M (1986) Classification descendante hiérarchique: un algorithme pour le traitement des tableaux logiques de grandes dimensions. In Data analysis and Informatics (Diday M., Jambu L., Lebart J., Pages and R. Tomassone, Eds) pp 23–28, Elsevier Science Publishers, Amsterdam, North-Holland.

    Google Scholar 

  • Reinert M (1990) Alceste: une méthodologie d'analyse des données textuelles et une application: Aurélia de G. de Nerval. Bulletin de Méthodologie Sociologique 26 (1), 24–54.

    Article  Google Scholar 

  • Reinert M (1998) Quel objet pour une analyse statistique du discours? Quelques réflexions à propos de la réponse Alceste. In Proceedings of Journées Internationales d'Analyse Statistique de Données Textuelles (JADT) International Conference on Textual Data Analysis (Salem A. and Fleury S. Eds) Nice, France.

    Google Scholar 

  • Rousseau D, Sitkin SB, Burt RS and Camerer C (1998) Not so different after all: a cross-discipline view of trust. Academy of Management Review 23 (3), 393–404.

    Article  Google Scholar 

  • Ryan AM, McFarland L, Baron H and Page R (1999) An international look at selection practices: nation and culture as explanations for variability in practice. Personnel Psychology 52 (2), 359–391.

    Article  Google Scholar 

  • Sackmann SA (1992) Culture and subcultures: an analysis of organizational knowledge. Administrative Science Quarterly 37 (1), 140–161.

    Article  Google Scholar 

  • Shenkar O (2001) Cultural distance revisited: towards a more rigorous conceptualization and measurement of cultural differences. Journal of International Business Studies 32 (3), 519–535.

    Article  Google Scholar 

  • Shin SK, Ishman M and Sanders GL (2007) An empirical investigation of socio-cultural factors of information sharing in China. Information & Management 44 (2), 165–174.

    Article  Google Scholar 

  • Smith HJ, Dinev T and Xu H (2011) Information privacy research: an interdisciplinary review. MIS Quarterly 35 (4), 989–1015.

    Google Scholar 

  • Smith HJ, Milberg SJ and Burke SJ (1996a) Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly 20 (2), 167–196.

    Article  Google Scholar 

  • Smith PB, Dugan S and Trompenaars F (1996b) National culture and the values of organizational employees: a dimensional analysis across 43 nations. Journal of Cross-cultural Psychology 27 (2), 231–264.

    Article  Google Scholar 

  • Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review 154 (3), 477–560.

    Article  Google Scholar 

  • Sondergaard M (1994) Research note: Hofstede’s consequences: a study of reviews, citations and replications. Organization Studies 15 (3), 447–456.

    Article  Google Scholar 

  • Srite M and Karahanna E (2006) The role of espoused national cultural values in technology acceptance. MIS Quarterly 30 (3), 679–704.

    Google Scholar 

  • Staat W (1993) On abduction, deduction, induction and the categories. Transactions of the Charles S. Peirce Society 29 (2), 225–237.

    Google Scholar 

  • Steenkamp J-B EM and Geyskens I (2006) How country characteristics affect the perceived value of web sites? Journal of Marketing 70 (3), 136–150.

    Article  Google Scholar 

  • Steeves V and Webster C (2008) Closing the barn door: the effect of parental supervision on Canadian children’s online privacy. Bulletin of Science, Technology & Society 28 (1), 4–19.

    Article  Google Scholar 

  • Straub D, Loch K, Evaristo R, Karahanna E and Strite M (2002) Toward a theory-based measurement of culture. In Human Factors in Information Systems (Szewczak EJ and Snodgrass CR, Eds) pp 61–82, IRM Press, London.

    Chapter  Google Scholar 

  • Ting-Toomey S (1991) Intimacy expressions in three cultures: France, Japan, and the United States. International Journal of Intercultural Relations 15 (1), 29–46.

    Article  Google Scholar 

  • Triandis HC (1995) Individualism and Collectivism. Westview Press, Boulder, CO.

    Google Scholar 

  • Trompenaars F (1996) Resolving international conflict: culture and business strategy. Business Strategy Review 7 (3), 51–68.

    Article  Google Scholar 

  • Turow J and Nir L (2000) The Internet and the Family 2000: The View from Parents, the View from Kids. Annenberg Public Policy Center, University of Pennsylvania, Philadelphia, PA.

    Google Scholar 

  • Van Slyke C, Shim JT, Johnson R and Jiang JJ (2006) Concerns for information privacy and online consumer purchasing. Journal of the Association for Information Systems 7 (6), 415–444.

    Google Scholar 

  • Wang YD and Emurian HH (2005) An overview of online trust: concepts, elements, and implications. Computers in Human Behavior 21 (1), 105–125.

    Article  Google Scholar 

  • Warren SD and Brandeis LD (1890) The right to privacy. Harvard Law Review 4 (5), 193.

    Article  Google Scholar 

  • Westin AF (1967) Privacy and Freedom. Atheneum Press, New York.

    Google Scholar 

  • Youn S (2005) Teenagers’ perceptions of online privacy and coping behaviors: a risk–benefit appraisal approach. Journal of Broadcasting & Electronic Media 49 (1), 86.

    Article  Google Scholar 

  • Youn S (2009) Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs 43 (3), 389–418.

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank Ioannis Maghiros, Wainer Lusoli, and Margherita Bacigalupo from the European Commission IPTS Joint Research Centre for their support and confidence. This study was funded by the European Commission IPTS (Institute for Prospective Technological Studies) Joint Research Centre (EC JRC IPTS Contract No. 151592-2009 A08-FR).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caroline Lancelot Miltgen.

Appendices

Appendix A

Table A1

Table A1 Justification for the countries chosen for the study (Eurostat 2008)

Appendix B

Table B1

Table B1 Sample characteristics

Appendix C

Process of data collection and analysis

Step 1: Data collection

  • Two focus groups organised per country (one with young people and one with adults), 7 countries (14 focus groups), a total of 139 participants (8–12 in each focus group)

  • All moderators are scholars of partner universities, having a very good knowledge of English

  • The same instructions are given to the partners to recruit participants

  • Before the beginning of each focus group, participants completed a questionnaire to indicate their individual characteristics (see Appendix B)

  • The same guide was used by all moderators, trained and briefed in advance

  • The moderator and participants use their common native language during the discussion

  • The same moderator conducts the two focus groups in his or her country

  • All the discussions are audio and video-recorded

  • Each moderator is in charge of the transcription of the focus groups he or she conducted

  • Each moderator is in charge of the translation of the discussions in English

  • All the discussions translated into English are sent by the moderators to the authors

Step 2: Preparation of the corpus by the researchers

A global corpus of all translations of the discussions in the 7 countries is prepared for the analysis: a partition of the corpus is made to separate the discourse of each of the 139 participants. Thus, each sentence pronounced by one participant can be linked to the number of the participant, to the country, to one of the two focus groups of the country, and to the individual characteristics of this participant. With Alceste software, the separation is a row beginning with the number of the participant (four characters) and then the character ‘*’. The individual characteristics are added after the ‘*’.

Example:

0001 *Country_Estonia *Gender_F *Age_19to24 *FG_Young

Text of the focus group participant number 1, an Estonian female, aged between 19 and 24, interviewed in the focus group with young people

In this file, participants 1–19 are from Estonia; participants 20–39 are from France; participants 40–59 are from Romania; participants 60–80 are from Germany; participants 81–100 are from Greece; participants 101–120 are from Poland; participants 121–139 are from Spain.

Seven files (one per country) are also prepared in the same way to run detailed analyses per country.

Step 3: Data analyses by the software packages

Alceste software

  • Segmentation of the corpus and reduction of the words to their roots (lemmatisation): The software identifies the set of lexicometrical base units in the corpus. Each unit is named a graphical form, or word-type (Lebart & Salem, 1994). The software identifies more complex forms and thus regroups into units the graphical forms that correspond to the different ways in which the same lemma can occur (e.g., verbs changed to infinitives, plurals to singular). In the standard analysis, rare words (frequency less than 4) are eliminated.

  • Partition of the corpus by the software: The Alceste software divides the text into CUs that correspond more or less to a small paragraph, depending on the length of the corpus. The entire corpus is separated into different CUs. The lexical table cross-tabulates the lemmatised forms, with the text separated into different CUs. The rows of the data table correspond to the different CUs, and the columns correspond to the different graphical forms (lemmatised words). The cells contain either 0 or 1 (complete disjunctive table), depending on the absence or presence, respectively, of the graphical form in a CU.

illustration

figure b
  • DHC: A DHC is performed on the entire lexical table. A second classification tests the stability of the classes obtained. In this second classification, each CU is longer (minimum of 12 words instead of 10 in the standard configuration). In the classification, all the CUs are first placed together in a single class. Then, at each step, the two most different classes (i.e., with the greatest margin contrast) are identified until all CUs have been either classified or not, depending on their graphical forms

WordMapper software

  • Segmentation of the corpus, identification of ‘significant words’ (meaningful), and reduction of the words to their roots (lemmatisation): any WordMapper analysis must begin with the creation of meaningful words, and during that phase empty words, such as articles, are eliminated. In the standard analysis, rare words (frequency of the word in the corpus less than 3) and non-significant (empty) words (number of letters less than 3) are eliminated. The software establishes the list of all the significant words with a minimum frequency of 3.

  • Construction of the data table by the software: the list of the lemmatised significant words is used by the software to build the data table. The rows of the data table correspond to the different lemmatised significant words, and the columns correspond to the different modalities of the variable chosen.

illustration

figure a
  • A CFA is performed on the data table.

Step 4: Interpretation of the results by the researchers

Results with Alceste software

A dendogram resulting from the DHC shows the hierarchical division of the classes (each class, i.e., a group of co-occurring words, forms a specific lexical world). In practice, what is important is the stability of the classes obtained, and the percentage of CUs globally classified. The individual characteristics of the participants are not taken into account when classifying the responses (they are supplementary elements), but it is possible to describe each class in terms of its population. The software calculates the representativeness of each word and each CU for a specific class, according to the χ2 statistic (see Appendix D).

Results with WordMapper software

The statistics given by the software help the researcher to interpret the results of the CFA. These statistics are the same and the interpretation is the same as a CFA performed on non-textual data: absolute contributions per axis, relative contributions (squared cosine) per axis, coordinates per axes.

Appendix D

Table D1

Table D1 Example calculation of χ 2 with Alceste

Appendix E

Examples of interactions during the focus groups

Focus group with young people in France: Discussion about ‘Responsibility’

Participant number 22

If you trust a website you also don’t want that Internet site or company to give out your information either. So the responsibility for the site is not just ours

Participant number 24

At the same time if there’s a problem you're not going to go and complain to the site

Participant number 22

It’s a bit pointless … you can only blame yourself

Participant number 23

Yes because you don't know if behind it there's actually a person at all. So you're not going to get angry … well yeah you get angry with the computer at the time, but the computer is not going to give you an answer. So then you blame yourself. The problem is when you get a call from a call centre, you don't know how to take your information back. If they start rattling off the details of your life you're not going to say:no that's not me’

Participant number 20

Your reflex is to hang up, but a better thing to do would be to ask them how they got your information

Participant number 23

At the same time they use formulaic questions and you just answer them

Participant number 24

Then you can tell them for your landline you don’t want to or you don't agree with that kind of technique

Focus group with young people in Greece: Discussion about ‘Trust’

Moderator

How can companies gain your trust, so that you will give them your data?

Participant number 87

Mainly by being well-known

Participant number 88

I gave it to a company, only because a friend of mine was working there

Participant number 90

To be trustworthy actually. Not just having a good reputation, the company must also have terms of use, and we must be certain that the data will not be used for another purpose

Participant number 81

…If I were asked something irrelevant, I would be suspicious, why is he asking me that? I would question its motives, when I can’t imagine how the company will use it

Rights and permissions

Reprints and permissions

About this article

Cite this article

Miltgen, C., Peyrat-Guillard, D. Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Eur J Inf Syst 23, 103–125 (2014). https://doi.org/10.1057/ejis.2013.17

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/ejis.2013.17

Keywords

Navigation