Perceived privacy violations through unauthorized secondary use - diving into user's perceptions and responses

  • We see more and more incidents where users’ information collected by digital services is shared with external parties. Users becoming aware of such information (mis-)uses may perceive a privacy violation. In this study, we want to understand when, why, and how such external unauthorized secondary use (EUSU) is perceived as a privacy violation and what consequences such a perception entails. Employing the Critical Incident Technique (CIT), we inductively derive characteristics of real-world incidents of perceived privacy violations through EUSU and users’ perceptions and responses thereto. We present preliminary results of our qualitative data analysis as well as potential contributions of this research-in-progress study. As a next step, we plan to relate characteristics with responses through Qualitative Comparative Analysis (QCA).

Download full text files

Export metadata


Number of document requests

Additional Services

Share in Twitter Search Google Scholar
Author:Christina WagnerGND, Manuel TrenzGND, Chee-Wee Tan, Daniel J. VeitORCiDGND
Frontdoor URL
Parent Title (English):Proceedings of ECIS 2023 - European Conference on Information Systems, Research Papers, Kristiansand, Norway, June 11-16, 2023
Place of publication:New York, NY
Editor:Margunn Aanestad, Stefan Klein, Monideepa Tarafdar, Shengnan Han, Sven Laumer, Isabel Ramos
Type:Conference Proceeding
Year of first Publication:2023
Publishing Institution:Universität Augsburg
Release Date:2023/06/06
First Page:46
Institutes:Wirtschaftswissenschaftliche Fakultät
Wirtschaftswissenschaftliche Fakultät / Institut für Betriebswirtschaftslehre
Wirtschaftswissenschaftliche Fakultät / Institut für Betriebswirtschaftslehre / Lehrstuhl für Information Systems und Management
Dewey Decimal Classification:3 Sozialwissenschaften / 33 Wirtschaft / 330 Wirtschaft
Licence (German):Deutsches Urheberrecht