The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy

Journal of Business Ethics 42 (4):305 - 320 (2003)


In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that information systems (IS) professionals' intentions to protect personal information privacy are influenced by their attitudes, subjective norms, perceived deindividuation, and organization-based self-esteem. It further shows that attitudes are influenced by subjective norms, which, in turn, are influenced by organization-based self-esteem.

Download options


    Upload a copy of this work     Papers currently archived: 72,660

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library


Added to PP

22 (#518,060)

6 months
1 (#388,784)

Historical graph of downloads
How can I increase my downloads?

Similar books and articles

Biobank Research and the Right to Privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
Can Self-Esteem Sanction Morality?Nicholas K. Meriwether - 2003 - Journal of Moral Education 32 (2):167-181.
Privacy and Policy for Genetic Research.Judith Wagner DeCew - 2004 - Ethics and Information Technology 6 (1):5-14.
The Importance of Privacy Revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Is Information All We Need to Protect?David Meeler - 2008 - The Monist 91 (1):151-169.
Inaccuracy as a Privacy-Enhancing Tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.