The Pennsylvania State University
The Graduate School
The College of Health and Human Development
SELECTED ANTECEDENTS OF CUSTOMER LOYALTY
WITHIN A RESTAURANT LOYALTY PROGRAM:
PERCEIVED CONTROL, PRIVACY CONCERN, PERCEIVED VALUE OF A
LOYALTY PROGRAM, AND WILLINGNESS TO DISCLOSE INFORMATION
A Dissertation in
Hotel, Restaurant and Institutional Management
by
Hee Seok Lee
© 2008 Hee Seok Lee
Submitted in Partial Fulfillment
of the Requirements
for the Degree of
Doctor of Philosophy
December 2008
This dissertation of Hee Seok Lee was reviewed and approved* by the following:
Carolyn U. Lambert Associate Professor of Hotel, Restaurant and Institutional Management Dissertation Adviser Chair of Committee
David A. Cranage Associate Professor of Hotel, Restaurant and Institutional Management
Karthik Namasivayam Associate Professor of Hotel, Restaurant and Institutional Management
Dongwon Lee Associate Professor of College of Information Science and Technology
Hubert B. Van Hoof Professor of Hotel, Restaurant and Institutional Management Director of the Department of Hotel, Restaurant and Institutional Management
*Signatures are on file in the Graduate School
iii
ABSTRACT
The objectives of this study were to examine a conceptual model of information
disclose and customer loyalty with respect to the sensitive level of information, perceived
control, privacy concern, and perceived value of a loyalty. Data for the study were
collected using an online survey distributed to customers who made a reservation for
dinner at a student managed restaurant and 300 participants completed the online survey.
The data were analyzed by univariate and multivariate analyses including analysis of
variance, analysis of covariance, multivariate analysis of variance, regression analyses
and the structural equation modeling. The findings indicated 1) customers’ willingness to
disclose and perceived value of a loyalty program are the determinants of customer
loyalty (e.g. behavioral intent and relative attitude); 2) willingness to disclose is affected
by perceived control (e.g. perceived cognitive and decisional control), privacy concern
and perceived value of a loyalty program; 3) privacy concern is affected by the sensitivity
level of information and perceived cognitive control; and 4) perceived value of loyalty
program is affected by information privacy concern.
The implications of the findings for restaurant managers are that they can collect
more disclosure-based information in a restaurant loyalty program by controlling the
sensitivity level of information and providing a loyalty program which has a high
perceived value. Also, restaurants may provide customers with more control over the way
that companies use personal information to collect disclosure-based information.
For future research, the generalizability could be improved by recruiting
participants from a restaurant which practices CRM with a loyalty program. By doing so,
iv
the information requested by the company would be more realistic. Also, other marketing
strategies to reduce privacy concern, other than providing an information edit function,
need to be examined in a restaurant loyalty context. Additionally, further examination of
an information edit function utilized in this study and its effect on privacy concern and
willingness to disclose would help to explain the relationship between greater willingness
to disclose (and greater privacy concern) and absence of information edit function.
v
TABLE OF CONTENTS
LISTS OF TABLES........................................................................................................... ix
LISTS OF FIGURES ........................................................................................................ xii
CHAPTER 1 INTRODUCTION ....................................................................................... 1
Statement of the Problem................................................................................................ 2
Objectives of the Study................................................................................................... 4
Research Questions......................................................................................................... 5
Significance of the Study ................................................................................................ 6
Organization of the Study ............................................................................................... 6
CHAPTER 2 LITERATURE REVIEW ............................................................................ 7
Customer Relationship Management.............................................................................. 7
Winer’s CRM Model .................................................................................................. 7
Construction of a Customer Database....................................................................... 10
Self-disclosure............................................................................................................... 10
Dimensions of Self-disclosure .................................................................................. 10
Intimacy and Sensitivity of Information ................................................................... 13
Privacy Concern............................................................................................................ 15
Perceived Control.......................................................................................................... 17
Averill’s Conceptualization of Perceived Control.................................................... 18
Perceived Control in the Information Disclosure Contexts ...................................... 19
Perceived Value ............................................................................................................ 21
Economic Benefits and Social Benefits.................................................................... 23
Exchange Theory: Perceived Value and Information Disclosure............................. 25
vi
Social Penetration Theory: Perceived Social Benefits and Information Disclosure. 26
Customer Loyalty.......................................................................................................... 29
Conceptual Model......................................................................................................... 32
Overview................................................................................................................... 32
Summary of Hypotheses ............................................................................................... 48
CHAPTER 3 METHODOLOGY .................................................................................... 50
Pilot Test ....................................................................................................................... 50
Development of Measurement Items ........................................................................ 50
Participants and Procedures for the Data Collection ................................................ 59
Results....................................................................................................................... 60
Main Study.................................................................................................................... 74
Design of the Study................................................................................................... 74
Experimental Treatments .......................................................................................... 75
Dependent Variables................................................................................................. 77
Participants................................................................................................................ 79
Procedures for the Data Collection ........................................................................... 80
Statistical Analysis........................................................................................................ 82
CHAPTER 4 RESULTS AND DISCUSSION................................................................ 87
Manipulation Check...................................................................................................... 88
Reliability and Validity of the Measurement Items...................................................... 90
Perceived Cognitive and Decisional Control............................................................ 90
Privacy Concern........................................................................................................ 91
Perceived Value of a Loyalty Program..................................................................... 91
vii
Customer Loyalty...................................................................................................... 91
Descriptive Characteristics of the Respondents............................................................ 92
Test of the Hypotheses.................................................................................................. 92
Hypothesis 1.............................................................................................................. 92
Hypotheses 2a and 2b ............................................................................................... 94
Hypotheses 2c and 2d ............................................................................................... 95
Hypotheses 3, 4a and 6 ............................................................................................. 99
Hypothesis 4b.......................................................................................................... 104
Hypotheses 5a, 5b, and 5c....................................................................................... 106
Hypothesis 7............................................................................................................ 109
Hypothesis 8............................................................................................................ 110
Summary ..................................................................................................................... 113
CHAPTER 5 SUMMARY, CONCLUSIONS, IMPLICATIONS, AND
RECOMMENDATIONS................................................................................................ 115
Introduction................................................................................................................. 115
Summary of the Findings............................................................................................ 116
Discussion ................................................................................................................... 120
Determinants of Customer Loyalty: Perceived Value of a Loyalty Program and
Willingness to Disclose........................................................................................... 120
Information Sensitivity, Privacy Concern, and Willingness to Disclose................ 121
Information Edit Function, Perceived Control, and Willingness to Disclose......... 122
Privacy Concern, Perceived Value, and Willingness to Disclose........................... 124
Conclusions and Implications ..................................................................................... 126
viii
Limitations and Recommendations for Future Research............................................ 129
Limitations .............................................................................................................. 129
Recommendations for Future Research .................................................................. 131
REFERENCES ............................................................................................................... 133
APPENDIX A DEFINITION OF TERMS.................................................................... 144
APPENDIX B SCREEN CAPTURES OF PILOT STUDY QUESTIONNAIRE ........ 147
APPENDIX C SCREEN CAPTURES OF HIGH SENSITIVE AND PRESENCE OF
INFORMATION EDIT FUNCTION QUESTIONNAIRE............................................ 156
APPENDIX D SCREEN CAPTURES OF LOW SENSITIVE AND ABSENCE OF
INFORMATION EDIT FUNCTION QUESTIONNAIRE............................................ 172
ix
LISTS OF TABLES
Table 1. Lists of information items and their categories in previous research. ................ 51
Table 2. Measurement items for cognitive control, adapted from Faranda’s study (2001).
................................................................................................................................... 55
Table 3. Measurement items for decisional control, adapted from previous research (de
Rijk et al., 1998; Mathwick & Rigdon, 2004). ......................................................... 55
Table 4. Measurement items for perceived value, adapted from previous research
(Gwinner et al., 1998; Lacey, 2007). ........................................................................ 57
Table 5. List of the benefits offered in the scenario and the scale to measure the
importance of the benefits, adapted from previous research (Gwinner et al., 1998;
Lacey, 2007). ............................................................................................................ 57
Table 6. Measurement items for customer loyalty, adapted from previous research
(Lacey, 2007; Mattila, 2006; Yi & Jeon, 2003)........................................................ 58
Table 7. Descriptive statistics of the measurement items for information sensitivity. ..... 61
Table 8. Analysis of variance for the measurement items for information sensitivity. .... 63
Table 9. Test of homogeneity of variance for the measurement items for information
sensitivity. ................................................................................................................. 63
Table 10. Multiple mean comparisons among the mean of the measurement items for
information sensitivity. ............................................................................................. 65
Table 11. Categorization of the measurement items for information sensitivity.............. 66
Table 12. Total variance explained for perceived control. ............................................... 68
Table 13. Rotated component matrix for the measurement items for perceived control.. 69
x
Table 14. Total variance explained for importance of perceived benefits........................ 72
Table 15. Rotated component matrix for the measurement items for importance of
perceived benefits. .................................................................................................... 73
Table 16. Measurement items for privacy concern, adapted from previous research
(Milne & Culnan, 2004; Miyazaki & Fernandez, 2001)........................................... 78
Table 17. Summary of independent and dependent variables and the statistical analysis
methods to examine the interests in hypotheses. ...................................................... 85
Table 18. Descriptive statistics of the perceived sensitivity level of the information items.
................................................................................................................................... 89
Table 19. Analysis of variance for the perceived sensitivity level of the information
items.......................................................................................................................... 89
Table 20. Chi-square test for the information edit function manipulation and the response
to the presence of the information edit function. ...................................................... 90
Table 21. Demographics of the participants. .................................................................... 92
Table 22. Means and standard deviation for privacy concern by information sensitivity
level........................................................................................................................... 93
Table 23. Means and standard deviation for perceived cognitive and decisional control by
information edit function. ......................................................................................... 95
Table 24. Means and standard deviation for information privacy concern by information
edit function level. .................................................................................................... 96
Table 25. Analysis of covariance for information privacy concern by information edit
function. .................................................................................................................... 96
Table 26. Parameter estimates from ANCOVA for information privacy concern. .......... 97
xi
Table 27. Fit indices for perceived value – privacy concern – willingness to disclose
model....................................................................................................................... 100
Table 28. Centroids and the number of cases in each cluster. ........................................ 102
Table 29. Means and standard deviation for willingness to disclose information by
information edit function. ....................................................................................... 103
Table 30. Means and standard deviation for willingness to disclose information by
information sensitivity level. .................................................................................. 105
Table 31. Analysis of covariance for willingness to disclose by information sensitivity.
................................................................................................................................. 105
Table 32. Analysis of covariance for willingness to disclose by information edit function.
................................................................................................................................. 107
Table 33. Parameter estimates from ANCOVA for willingness to disclose................... 107
Table 34. Means and standard deviation for willingness to disclose information by
information sensitivity level. .................................................................................. 108
Table 35. Regression coefficients for perceived value on customer loyalty. ................. 109
Table 36. Regression coefficients for willingness to disclose information on customer
loyalty. .................................................................................................................... 110
Table 37. Measurement items correlations among perceived value of a loyalty program,
willingness to disclose (IVs) and customer loyalty (DV)....................................... 112
Table 38. Regression coefficients for perceived value of a loyalty program and
willingness to disclose information on privacy concern......................................... 112
Table 39. Summary of the hypotheses and the results from the statistical analyses. ..... 113
xii
LISTS OF FIGURES
Figure 1. Winer’s seven-step customer relationship management (CRM) model. ............ 9
Figure 2. The relationship of three components of self-disclosure. ................................. 11
Figure 3. Conceptual model of information disclosure and its relationship with
information sensitivity, privacy concern, perceived value, perceived control and
customer loyalty........................................................................................................ 33
Figure 4. Summary of conceptual model of information disclosure and its relationship
with information sensitivity, privacy concern, perceived value, perceived control and
customer loyalty........................................................................................................ 48
Figure 5. Scree plot of the measurement items for perceived control.............................. 68
Figure 6. Scree plot of the measurement items for importance of perceived benefits. .... 72
Figure 7. Conceptual model of willingness to disclose information disclosure and its
relationship among information sensitivity, privacy concern, perceived value,
perceived control and customer loyalty. ................................................................... 88
Figure 8. Means for privacy concern by information sensitivity and information edit
function level. ........................................................................................................... 98
Figure 9. Parameter estimates of perceived value – privacy concern – willingness to
disclose model......................................................................................................... 100
Figure 10. Summary of the results from the hypotheses tests. ....................................... 117
1
CHAPTER 1
INTRODUCTION
Customer relationship management (CRM), also known as database marketing, is
an integrated concept of business processes, technology and the relationship between a
company and its customers (Chen & Popovich, 2003; Greenberg, 2004; Hughes, 2000;
Winer, 2001). Customer relationship management has emerged because customer
retention is more profitable than customer acquisition. For example, repeated customers
generate over twice as much gross income as new customers (Cigliano, Georgiadis,
Pleasance, & Whalley, 2000).
The main objective of CRM is to retain existing customers and increase their
loyalty by establishing long-term relationships (Dyche, 2002; Fitzgibbon & White, 2005).
The companies practicing CRM achieve the goal by way of various approaches such as
customer recognition, customization and individualization. Companies can more
precisely tailor service to customers by learning about the specific characteristics and
requirements of individual customers based on the data captured (Berry, 1983).
Customer information plays a critical role in the provision of customized services
because knowledge and insight about customers are obtained through a customer
database. Customer data are collected from two sources: customers’ transactions with a
company (transaction-based data) and customers’ disclosure (disclosure-based data)
(Norberg & Dholakia, 2004). Transaction-based data refer to data typically found in
transaction detail records on completion of a purchase and examples of transaction-based
data include name, address and telephone number. Disclosure-based data refer to data
2
that are typically related to internal beliefs and attitudes and are not usually collected
during completion of a commercial transaction.
Disclosure-based personal information is not obtainable unless customers agree to
provide it. However, customers may become concerned about information privacy when
they are asked to release their personal information (Hoffman, Novak, & Peralta, 1999;
Moon, 2000; Norberg & Dholakia, 2004). Privacy concern refers to the level of consumer
anxiety for the way that their personal information is used by companies (Phelps,
D'Souza, & Nowak, 2001). Besides privacy concern, other factors related to willingness
to disclose information include perceived control and perceived value of a loyalty
program.
This study focused on disclosure-based data collection and customers’ willingness
to disclose. Therefore, it is important to understand the effects of the antecedents on
customers’ willingness to disclose information and the relations among factors.
Statement of the Problem
Despite the importance of a customer information file, little is understood about
customers’ privacy concern and willingness to disclose in a restaurant loyalty program
context. While customers’ concern about information privacy was found to vary
depending on types of information requested, the information type does not fully explain
a situational influence. For example, a telephone number and social security number can
be categorized as examples of personal identification information; however, concern
about how companies use the information will vary. Therefore, another categorization of
information and its influence on privacy concern are worthy of investigation.
3
While privacy concern and control (e.g. desire for control and perceived control)
were examined as antecedents of willingness to disclose information in previous studies,
little research was found on the relationship between privacy concern and perceived
control empirically examined in a loyalty program context. Since perceived control was
proposed to have a stress-reducing effect on the impending stressful event in previous
research (Averill, 1973), the empirical examination of the effect of perceived control on
privacy concern needs to be examined.
In previous research, it was proposed that consumers are reluctant to disclose
personal information due to privacy issues and due to these tendencies, customers’
information disclosure is based on the assessment of benefits and costs associated with
providing such information (Franzak, Pitta, & Fritsche, 2001; Lee, Im, & Taylor, 2008).
That is, customers assess some form of a trade-off between what is received (e.g. benefits
received) and what is given (e.g. information and other costs associated with information
disclosure) and customers’ information disclosure is made based on such assessment. In a
loyalty program context, customers’ assessment of benefits associated with providing
information will be tied with benefits associated with a loyalty program. However,
benefits in a loyalty program seem to be closely associated with repeated patronage and
long-term relationship and loosely associated with information disclosure, so customers’
assessment of benefits associated with information disclosure may be less in a loyalty
context than in the context where information disclosure and benefits are closely
associated because customers perceive fewer benefits. That is, customers may think that
they receive benefits mainly due to repeated patronage, not due to information disclosure.
If so, customers’ assessment of benefits and costs associated with a loyalty program may
4
not explain information disclosure entirely. Instead, privacy concern might explain
willingness to disclose better than perceived value of a loyalty program. However, little is
known about the relationship between privacy concern and perceived value of a loyalty
program with respect to willingness to disclose. It is worth investigating how the
perceived value of a loyalty program and privacy concern play roles in willingness to
disclose in a loyalty program context.
Customer loyalty has been examined in terms of value proposition and
satisfaction, but few research studies were found on customer loyalty related to
customers’ willingness to disclose. While customers who assess benefits offered through
a loyalty program valuable are more likely to show loyalty (Yi & Jeon, 2003), little is
known about whether or not customers who value a loyalty program are more willing to
disclose personal information.
Objectives of the Study
The objectives of the study were to explore 1) the relationship between
customers’ willingness to disclose information and customer loyalty in a restaurant
loyalty program; 2) the role of privacy concern and perceived value of a loyalty program
in willingness to disclose; 3) the effects of requested information based on sensitivity
level and choice availability on privacy concern; and 4) the relationship between
perceived control and privacy concern.
This study examined customers’ willingness to disclose information and its
relationship with customer loyalty. Behavioral intent (e.g. intent to purchase or visit) and
relative attitude (e.g. commitment to continuing the relationship with the company)
5
toward the company were measured for customer loyalty in this study. Also, the
relationship of perceived value of a loyalty program on customer loyalty was examined.
The effects of privacy concern and perceived value of the loyalty program were
examined on customers’ willingness to disclose. More specifically, the accountability of
privacy concern and perceived value was examined on willingness to disclosure.
Privacy concern was examined with respect to the sensitivity level of information
requested and an option to edit, show, hide and view information. The effect of the option
availability was examined with respect to perceived control. Also, the direct effect of
sensitivity level of information and the availability of an option to manage information
was investigated on willingness to disclose.
Research Questions
1. What is the relationship between customers’ willingness to disclose and customer
loyalty?
2. What is the relationship between customers’ perception about value of a loyalty
program and customer loyalty?
3. What is the relationship among customers’ concern about privacy, perception about
value of a loyalty program, and willingness to disclose personal information?
4. Do customers’ concerns about privacy differ depending on types of information
requested?
5. What is the relationship between perceived control and privacy concern?
6
Significance of the Study
This study has two main contributions. First, this study embraced two fields of
research, namely, customer loyalty and information disclosure by examining the
relationship between customers’ willingness to disclose and customer loyalty. While
existing research on customer loyalty focuses mainly on the perceived value of the
loyalty program and satisfaction with products and services, this study explored an
integrated approach for customer loyalty from information disclosure explained by
customers’ concern about privacy, control over information disclosure and perceived
value of a loyalty program.
Second, this study was conducted in a restaurant loyalty program context. By
exploring a loyalty program and information disclosure in a restaurant context, this study
expanded the scope of the topic to restaurants in hospitality research.
Organization of the Study
This dissertation reviews the relevant literature including self-disclosure, privacy
concern, perceived control, perceived value, and customer loyalty in Chapter Two.
Chapter Three describes the development of measurement items with a pilot test and the
design of the main study, variables used and participants and procedures of data
collections in the main study. Results are presented and discussed in Chapter Four.
Chapter Five provides a summary, discussion of the findings, implications with
limitations and recommendations for future research. Definitions of terms are listed in
Appendix A.
7
CHAPTER 2
LITERATURE REVIEW
This chapter presents the concept of customer relationship management (CRM)
and focuses on the construction of a customer database in a CRM model. The concept of
self-disclosure is discussed with respect to the construction of a customer database. Then,
privacy concern, perceived control and their relationship are presented as influential
factors on self-disclosure. The concept of perceived value of a loyalty program and its
relationship with self-disclosure follow. Also, this chapter discusses the concept of
customer loyalty and its relationship with self-disclosure. From these discussions, a
conceptual research model and the hypotheses for the relationships in the model are
proposed.
Customer Relationship Management
Winer’s CRM Model
The marketing interest of many companies has shifted from acquiring a new
customer to retaining current ones (Reichheld, 1996) because repeated customers
generate over twice as much gross income as new customers (Cigliano, Georgiadis,
Pleasance, & Whalley, 2000). Consequently, the companies that focus on customer
retention have started implementing customer relationship management (CRM)
initiatives. Customer relationship management, also known as database marketing, is an
integrated concept of business processes, technology and the relationship between a
8
company and its customers (Chen & Popovich, 2003; Greenberg, 2004; Hughes, 2000;
Winer, 2001). Retaining existing customers by establishing long-term relationships is the
ultimate goal of CRM (Dyche, 2002; Fitzgibbon & White, 2005). The companies
practicing CRM achieve the goal by way of various approaches such as customer
recognition, customization and individualization. Companies can more precisely tailor
service to customers by learning about the specific characteristics and requirements of
individual customers based on the data captured (Berry, 1983).
Winer (2001) presented a model for CRM that consists of seven steps for a
successful program as shown in Figure 1. In his model (2001), the construction of a
customer database or information file is a necessary first step to a complete CRM
solution. The database usually contains information such as transactions, customer
contacts, descriptive information and responses to marketing stimuli (Winer, 2001). Once
a customer database is established, knowledge and insight about customers can be
obtained through cluster and discriminant analyses of the database (Gordon, 2002; Winer,
2001). In many cases, a target customer is selected based on lifetime customer value
(LCV), which is computed in terms of current and future profitability to the company
(Gordon, 2002; Reinartz & Kumar, 2000; Reinartz & Kumar, 2002).
9
Figure 1. Winer’s seven-step customer relationship management (CRM) model.
Relationships with target customers are maintained through various relationship,
or loyalty, programs. Loyalty programs, also called frequency programs, reward
customers for repeated purchases in various ways: customer service, customization, and
community building (Winer, 2001). Examples of customization in loyalty programs
include that customers are greeted by name; their preferences are recognized; and
products and services that fit their needs and wants are offered. Such customization based
on knowledge preferences and behaviors is available at the time of interaction and such
knowledge preferences and behaviors are based on the customer database (Dyche, 2002).
Also, customers can be reached through multiple communication media that fit
customers’ interaction preference. Since the CRM system depends on a database of
customer information and analysis of that data, many consumers are concerned about the
amount of personal information that is contained in databases and how it is being used
(Winer, 2001). In e-commerce, customers are provided with two choices as a way to
reduce privacy concern: opt-in and opt-out. In the opt-in case, customers must consent to
the collection and use of personal data while customers have to explicitly forbid the
10
collection and use in the opt-out case. As the last stage, metrics to measure the success of
the customer-centric CRM solution such as loyalty measures, retention rates, customer
share and other CRM-based measures are calculated.
Construction of a Customer Database
Among the seven steps in Winer’s CRM model, it is worthwhile to focus on a
customer database because the construction of a customer database is a necessary first
step to a complete CRM solution and the foundation for any customer relationship
management activity (Berry, 1983; Winer, 2001). Customer data are collected from two
sources: customers’ transactions with a company (transaction-based data) and customers’
disclosure (disclosure-based data) (Norberg & Dholakia, 2004). Transaction-based data
refer to data typically found in transaction detail records upon completion of a purchase
and examples of transaction-based data include name, address and telephone number.
Disclosure-based data refer to data that are typically related to internal beliefs and
attitudes and are not usually collected upon completion of a commercial transaction in
most cases. This study focuses on the construction of a customer database that relies on
disclosure-based data collection. Therefore, it is important to understand what factors
influence customers’ disclosure.
Self-disclosure
Dimensions of Self-disclosure
Jourard (1971) described self-disclosure as “the act of revealing personal
information to others” (p. 2) while other researchers define it as personal information that
11
is either oral or written communication to others (Cozby, 1973; Omarzu, 2000). The
emphasis of Jourard’s definition is on the behavioral aspect, the act to disclose, while the
emphasis of Omarzu and Cozby’s definitions is on the objective aspect, what is disclosed.
For the purpose of this study, the definition of self-disclosure follows Jourard’s definition
and the terms self-disclosure and information disclosure are used interchangeably.
Self-disclosure, by definition, consists of three components: the discloser, the
target-person, and the information that is disclosed and communicated as shown in Figure
2. Consequently, research on self-disclosure has been conducted with respect to these
components. Regarding self-disclosure research on the discloser component, Jourard
(1971) investigated the impacts of race and gender on the amount of information
disclosed.
Figure 2. The relationship of three components of self-disclosure.
Research on the target-person component has been examined under the topic of
reciprocity (Altman & Taylor, 1973; Jourard, 1971; Omarzu, 2000; Wheeless, 1976).
Reciprocity of self-disclosure was described as a dyadic effect in Jourard’s study (1971).
He proposed that the amount of information that an individual was willing to disclose
was correlated to the closeness of the relationship. That is, people disclose most to those
individuals who most confide in them, and vice versa. Similarly, other researchers
12
postulated a positive relationship between the depth of information exchanged and the
history of an interaction (Altman & Taylor, 1973; Omarzu, 2000; Wheeless, 1976).
Self-disclosure research on information disclosed has investigated the contents
and the measure of information disclosed (Cozby, 1973; Jourard, 1971; Omarzu, 2000).
Researchers suggested that information disclosed can be measured based on three
parameters, namely, breadth, depth, and duration (Cozby, 1973; Jourard, 1971; Moon,
2000; Omarzu, 2000). Breadth refers to the amount of information disclosed or the
number of topics covered while depth describes the intimacy of information or the
intimacy level of disclosure. The level of intimacy is the degree of reluctance to let others
know information about the disclosers. Duration is the time spent disclosing or words
used describing information. While depth and duration are partially independent, depth
and breadth are inversely dependent. That is, the more intimate information is, the less
individuals tend to disclose (Cozby, 1973). Intimate information either is emotionally
intense or contains potentially negative, risky or embarrassing information (Omarzu,
2000). Therefore, intimate self-disclosure will make the discloser feel vulnerable in some
way (Moon, 2000).
Research on self-disclosure has examined what and how much information is
disclosed in relation to the discloser and the target-person. The characteristics of the
discloser and the relationship with the target-person have been suggested to influence
self-disclosure. In addition, the intimacy of information has been proposed to impact self-
disclosure. While intimacy of information relates to emotional intensity, it does not
include monetary loss that may occur at the time of interaction. For example, revealing a
PIN number of a bank account to a third party may cause monetary loss. Thus, the
13
following section discusses intimacy, sensitivity, and type of information related to self-
disclosure.
Intimacy and Sensitivity of Information
While the intimacy level was proposed to influence willingness to disclose
information negatively in some studies (Cozby, 1973; Moon, 2000; Omarzu, 2000), the
type of information was examined as an influential factor on the willingness to disclose in
other studies (Cranor, Reagle, & Ackerman, 1999; Horne, Norberg, & Ekin, 2007;
Phelps, Nowak, & Ferrell, 2000). Previous research found that an individual’s
willingness to disclose and perceived comfort of providing information vary among the
types of information requested (Cranor et al., 1999; Horne et al., 2007; Phelps et al.,
2000). The types of information examined in previous research include demographic data
(e.g. age, marital status, and occupation), lifestyle interests (e.g. hobbies), media habits
(e.g. favorite TV show), personal identification data (e.g. name, address, or telephone
number) and financial data (e.g. annual income). Phelps and his colleagues (2000) found
that customers were more willing to provide demographic and lifestyle information than
purchased-related, personal identifier information, and financial information.
However, studies on the types of information and information disclosure do not
seem to fully explain a situational influence. For example, giving a home phone number
to a cashier at a department store may be perceived more appropriate or legitimate than
giving the same information to a cashier at a restaurant. This discrepancy may occur
because a cashier’s request for a home phone number or zip code occurs frequently at a
department store while such an event rarely happens at a restaurant. Servers or cashiers at
a restaurant usually don’t ask customers’ phone number or zip code so customers might
14
perceive such a request inappropriate. Thus, perceived appropriateness or relevance of
information requested is proposed to be a better indicator to examine information
disclosure (Annacker, Spiekermann, & Strobel, 2001; Chaikin & Derlega, 1974).
Perceived appropriateness or relevance is dependent on the specific circumstance
(Annacker et al., 2001; Howell & Conway, 1990) and it has been operationalized as
intimacy and sensitivity in previous studies (Moon, 2000; Norberg & Dholakia, 2004).
According to Norberg and Dholakia (2004), information intimacy is related to intrinsic
risk whereas information sensitivity is related to extrinsic risk. Information about
personality and physical characteristics is considered intimate information whereas
information about income and credit is considered sensitive information. According to
Moon (2000), intimacy and sensitivity are not mutually exclusive. Intimate self-
disclosure was defined as disclosure of high-risk information that makes the discloser feel
vulnerable in some way (Moon, 2000). The vulnerability is not only described
psychologically and emotionally but also associated with physical harm or material
damage.
Since the ambiguous delineation between intimacy and sensitivity exist in studies
on information disclosure, a clear definition is required to reconcile the ambiguity. For
the purpose of this study, information sensitivity refers to comprehensive information
characteristics that amalgamate emotion intensity and monetary value and reflects a
situational influence. Since sensitive information disclosure relates to psychological,
physical or material risk (Moon, 2000), customers might feel vulnerable upon disclosing
their personal information. Such vulnerable feeling and worries have been examined
under the topic of privacy concern and a discussion follows.
15
Privacy Concern
Privacy concern needs to be discussed with respect to information disclosure.
Customers become cautious when they are asked to disclose personal information
because they are concerned about privacy (Norberg & Dholakia, 2004). Privacy is
defined as “the ability of the discloser to control the access others have to personal
information” (Culnan, 1993, p. 344) and Phelps, Nowak and Ferrell (2000) expanded the
scope of access not only to information but also to the dissemination and use of
information. For the purpose of this study, privacy concern refers to the level of
consumer anxiety for the way their personal information is used by companies (Phelps,
D'Souza, & Nowak, 2001) and is used interchangeably with the term information privacy
concern. Prosser (1960) described privacy-invasion in terms of the legal torts, namely,
intrusion, public disclosure, a false light, and appropriation. Previous research has
examined customers’ privacy concerns, or perceptions of privacy invasion, instead of
privacy itself (Culnan, 1993; Hoffman, Novak, & Peralta, 1999; Martínez-López, Luna,
& Martínez, 2005; Phelps et al., 2000; Phelps et al., 2001). Whether or not they have an
actual ability to control the access that others have to their personal information,
customers are concerned about their information privacy whenever personal information
is requested (Hoffman et al., 1999). The four underlying dimensions of privacy concern
include collection (e.g. too much collection), unauthorized secondary use, errors and
improper access of personal information (Milberg, Burke, Smith, & Kallman, 1995).
Previous research has examined the antecedents and consequences of privacy
concern on the Web context. Examples of the antecedents are type of personal
information requested, control over information use, and consumer characteristics
16
(Phelps et al., 2000), attitude to the stimulus and desire for control (Phelps et al., 2001),
Internet experience and mode/medium (Miyazaki & Fernandez, 2001) and relevance of
information requested (Culnan & Armstrong, 1999). The consequences examined in
research include behavioral responses (Liu, Marchewka, & Ku, 2004; Miyazaki &
Fernandez, 2001; Phelps et al., 2000; Phelps et al., 2001), trust (Liu et al., 2004; Milne &
Culnan, 2004), attitudes or perceptions toward company’s information use or toward the
company (Culnan & Armstrong, 1999; Culnan, 1993; Martínez-López et al., 2005).
Behavioral responses include actual purchase, purchase intention, and request to remove
personal information from a company’s database. A negative relationship of privacy
concern with actual purchase and purchase intention, and a positive relationship with
request to remove personal information have been suggested (Liu et al., 2004; Miyazaki
& Fernandez, 2001; Phelps et al., 2000; Phelps et al., 2001). Similarly, negative
relationships of privacy concern with trust (Liu et al., 2004; Milne & Culnan, 2004) and
with attitudes toward information use by company were proposed (Culnan & Armstrong,
1999; Culnan, 1993; Martínez-López et al., 2005).
While previous research examined various behavioral responses to privacy
concern, little research was conducted on information disclosure as a behavioral response
(Nam, Song, Lee, & Park, 2005). Given that privacy concern, by definition, relates to
worries and risks (Phelps et al., 2001), and self-disclosure is a risk-involved action
(Norberg & Dholakia, 2004), privacy concern and self-disclosure can be examined jointly
and self-disclosure can be treated as a behavioral response to privacy concern (Nam,
Song, Lee, & Park, 2005).
17
Most customers are concerned about the way that personal information is used by
marketers and want more control over it (Phelps et al., 2000; Phelps et al., 2001). More
specifically, consumers desire more information about how companies use personal
information and the more concerned they are about the way their information is used, the
more they desire control over the use of their personal information by companies (Phelps
et al., 2000; Phelps et al., 2001). While previous research examined desire for control
with respect to the way that companies use personal information, the effects of perceived
control on customers’ privacy concern need to be explored. Perceived control is
discussed in the following section.
Perceived Control
Perceived control is worthy of investigation with respect to self-disclosure as an
extension of previous research on the influence of perceived control on behavior or
behavioral intention (Ajzen, 1991; Hui & Bateson, 1991; Povey, Conner, Sparks, James,
& Shepherd, 2000). The relationship between perceived control and behavior was
introduced in the theory of planned behavior, which was developed from the theory of
reasoned action (Ajzen, 1991). In the theory of reasoned action, a person’s behavioral
intention depends on the person’s attitude about the behavior and subjective norm. Due to
the limitations in explaining behaviors over which people have incomplete volitional
control (e.g. lack of confidence or control), the theory of reasoned action was extended to
the theory of planned behavior. The theory of planned behavior proposed that human
behavioral achievement is predicted by the combination of motivation (intention) and
ability (perceived control over behavior). Perceived control in the theory is not actual
18
control over behavior, but perception of ease or difficulty of performance. Literature on
perceived control is presented in the following section and then perceived control in a
loyalty program context is discussed.
Averill’s Conceptualization of Perceived Control
Averill (1973) examined perceived control with respect to stress and separated it
into three different types, namely, behavioral control, cognitive control and decisional
control. An individual takes various forms of actions in order to control unpleasant
situations by preventing entirely, terminating prematurely, or modifying the event
(Averill, 1973; Namasivayam, 2004). Such direct controllability over an external event
can be interpreted as behavioral control. Contrary to direct control to influence the
external environment, cognitive control deals with appraisal and reappraisal of the
impending threatening event (Averill, 1973). It implies that the impending threatening
event is not necessarily changed to be less threatening in order for cognitive control to be
perceived; instead, cognitive control can be perceived through appraisal and reappraisal
of potentially threatening information in a positive way without changing anything in the
threatening event. Thus, the stress-inducing or stress-reducing propertied of personal
control depend on the context in which it is bedded and not just on the effectiveness to
prevent or mitigate a potentially harmful stimulus (Averill, 1973).
Cognitive control is obtained by processing potentially threatening information to
reduce stress. Previous experiments showed that people preferred to have information
about the impending stress and those who had information were willing to endure more
intense stress than those who had no information (Jones, Bentler, & Petry, 1966; Staub &
Kellett, 1972). However, the former subjects did not differ in pain tolerance from the
19
latter. Thus, the result implies that gain in cognitive control makes people prepare for the
impending stressful event whether or not they act or feel differently toward the stress.
Decisional control refers to the range of choice or number of options available
and involves choices prior to an event (Averill, 1973). No freedom of choice often results
in extreme stress (Zimbardo, 1969) and the experience of choice varies as a function of
individual capabilities (Averill, 1973). While a form of choices is required to obtain
decisional control, decisional control is dependent on how a person perceived the choice
available, rather than on the objective range or number of choices. Decisional control is
perceived, so it is the degree to which people agree or identify with the choices available,
no matter how limited.
Perceived Control in the Information Disclosure Contexts
With respect to Averil’s conceptualization of control (1973), the concept of
perceived control has been examined in the service exchange context (Namasivayam,
2004; Van Raaij & Pruyn, 1998). Based on Averil’s conceptualization of control (1973),
Namasivayam (2004) proposed that cognitive control plays a lesser role in service
exchanges because it is less likely for customers to alter their evaluation process toward a
potentially poor service. He posited that two forms of control, behavioral and decisional
controls, are directly relevant to a service exchange. Customers are proactive to direct the
actions of service providers (i.e. behavioral control) and to decide the components of
service provided (i.e. decisional control).
Van Raaij and Pruyn (1998) postulated that control in the service context could be
characterized on the continuum between customer-controlled service and service
provider-controlled service. They define control as “the degree of power and influence on
20
the service specification, realization, and outcome” (p. 816). For example, a bus is an
example of a service provider-controlled service due to the lack of customers’ control
over its fixed route to a destination while a taxi is an example of a customer-controlled
service due to the customer’s freedom of routes.
Similar to Van Raaij and Pruyn’s (1998) and Namasivayam’s studies (2004),
Averill’s conceptualization of perceived control is relevant to the information disclosure
context. Both Averill’s conceptualization of perceived control and self-disclosure relate
to stress. Perceived control was examined to manage stressful situations (Averill, 1973)
and self-disclosure was examined in risks, worries and stress (Norberg & Dholakia, 2004;
Sassaroli & Ruggiero, 2004). However, the difference of this study from Van Raaij and
Pruyn (1998) and Namasivayam’s (2004) studies, where behavioral control is mainly
discussed in the service exchanges context, is in the focus of cognitive control in a loyalty
program context. In the service exchange situation, a customer’s action toward the
service provider is simultaneously interdependent; customers direct, or have freedom to
direct, the actions of the service provider. However, the loyalty program context differs
from a service exchange situation. That is, a company requests a set of information from
a customer, and the customer reacts toward its request: acceptance or denial. Customers
can’t direct the requests from the service provider. When an item of personal information
is requested, customers can’t alter the way that the question was asked or the content that
was requested. The only options available to customers are either disclosure of the
information requested or non-disclosure. Due to the lack of direct control over the actions
of the service provider, behavioral control plays a lesser role than cognitive and
decisional controls in the information disclosure context.
21
As perceived control is expected to influence the disclosure act or disclosure
intent, perceived value is also expected to have an impact, specifically a positive impact,
on the disclosure act or intent. While a positive relationship between perceived value and
a behavioral intent, such as willingness to purchase, was found in previous research
(Dodds, Monroe, & Grewal, 1991), little research was found on the relationship between
perceived value of a loyalty program and information disclosure. The discussion about
perceived value of a loyalty program and information disclosure follows.
Perceived Value
Given that self-disclosure is a behavior, it is worthwhile to investigate the
relationship between perceived value and information disclosure because it is legitimate
to consider self-disclosure to be dependent on perceived value (Dodds et al., 1991;
Monroe & Krishnan, 1985). In this study, perceived value is explained in terms of the
perceived value of a loyalty program, not perceived value of information requested or
disclosed.
The conceptualization of perceived value has been discussed in terms of utilities:
what is received and what is given. Zeithaml (1988) defined perceived value as the
consumer’s overall assessment of the utility of a product based on perceptions of what is
received and what is given. What is received also refers to benefits associated with the
loyalty program and what is given refers to costs or sacrifices associated with the loyalty
program (Monroe & Krishnan, 1985; Ravald & Gronroos, 1996; Zeithaml, 1988).
Christopher (1982) examined value in terms of price a customer is willing to pay
for a product offering, and pointed out that willingness to pay needs to be understood in
22
terms of the set of perceived benefits that the product offering provides to a customer. He
related this aspect of value to the notion of a customer surplus, which he expressed as the
amount by which the monetary equivalent of the set of perceived benefits exceeds the
price paid for it. Similarly, Ravald and Gronroos (1996) suggested perceived value as a
ratio between benefits and costs.
The benefit components of perceived value include salient intrinsic and extrinsic
attributes, and other relevant abstractions such as convenience (Zeithaml, 1988). Since a
loyalty program rewards repeated patronage with relational benefits such as discount and
tailored service (Winer, 2001), the relational benefits associated with the loyalty program
are discussed in the following section.
The cost components of perceived value include monetary and nonmonetary costs
(Zeithaml, 1988). Monetary costs include the amount of money paid, installation, and
handling costs and nonmonetary costs include time, energy, and effort to obtain products
and service. In a loyalty program context, costs of a loyalty program include those
monetary and nonmonetary costs to obtain the desired benefits associated with the loyalty
program such as price (e.g. price to purchase a reward card), effort (e.g. presentation of a
card to a cashier, and personal information disclosure) and other resources.
What is received and what is given are highly idiosyncratic and situational
(Bowman & Ambrosini, 2000; Christopher, 1982; Ravald & Gronroos, 1996; Zeithaml,
1988). A $39 calculator can be coded as expensive for some consumers and cheap for
others; thus, the perceptions of the same price stimulus may vary across consumers and
for one consumer across products, purchase situations, and time (Dodds et al., 1991).
Also consumers weight the components of perceived benefits and costs differently
23
(Christopher, 1982; Sweeney & Soutar, 2001; Zeithaml, 1988). Some consumers may
want volume, others high quality, still others convenience. Similarly, some are concerned
only with the money expended, other with time and effort (Zeithaml, 1988).
For the purpose of this study, perceived value refers to a subjective assessment of
the trade-off between what is received and what is given (Christopher, 1982; Lynn, 1991;
Zeithaml, 1988) and, consequently, customers’ assessment of benefits and costs
associated with a loyalty program. The influence of perceived value on behavior or
behavioral intention was examined in previous research (Dodds et al., 1991; Monroe &
Krishnan, 1985). Monroe and Krishnan (1985) proposed a model relating perceived value
and its impact on willingness to buy. Similarly, Dodds, Monroe and Grewal (1991)
provided a model conceptualizing perceived value as a direct antecedent of consumer
purchase intention. However, little research has been found on the relationship between
perceived value and information disclosure as its consequence in a loyalty program
context. The following sections present economic and social benefits as perceived
benefits and discuss two existing theories regarding trade-offs between perceived value
of a loyalty program and an individual’s willingness to disclose information.
Economic Benefits and Social Benefits
What is received in the loyalty program context relates to benefits associated with
loyalty programs. Loyalty programs commonly reward customers for repeated purchases
and offer relational benefits (Gwinner, Gremler, & Bitner, 1998; Winer, 2001) and
relational benefits refer to benefits that customers receive from long-term relationships
besides the core service. Gwinner and his colleagues (1998) identified four relational
benefits, namely, social, psychological, economic, and customization benefits. Social
24
benefits describe a kind of fraternization in addition to the delivery of the core service.
Psychological benefits describe a comfort or feeling of security. Economic benefits relate
to economic consideration such as discounts, price break and time savings.
Customization benefits are tailored services to meet particular needs.
Lacey, Suh and Morgan (2007) used the term preferential treatment as relational
benefits and identified two types of preferential treatment: economic-based and
customization-based. Economic-based preferential treatment describes the monetary
value and/or time-savings benefits. Examples of this type of benefit are product/service
rewards, complimentary product and service upgrades, gift certificates and discounts.
Economic-based preferential treatment matches to economic benefits in the relational
benefits (Gwinner et al., 1998). Customization-based preferential treatment refers to
customers’ perceptions of personal recognition, extra attention, and specific services not
available to regular customers. Examples of this type of benefit include customized
products, access to new product shipments, members-only concierge service, advanced
sales notices, private tours, and members-only invitations to special events.
Customization-based preferential treatment is the mixture of social benefits and
customization benefits in Gwinner et al.’s research (1998).
Based on previous research on the relational benefits and preferential treatments
(Gwinner et al., 1998; Lacey et al., 2007), what is received in this study is proposed to the
combination of economic benefits and social benefits. Economic benefits in this study
refer to the benefits associated with monetary value and time-savings as economic
benefits in Gwinner et al.’s research (1998) and economic-based treatment in Lacy et
al.’s research (2007). Social benefits in this study refer to the benefits associated with a
25
kind of fraternization including personal recognition, extra attention and specific service
not available to non-loyalty program members as customization-based treatment in Lacy
et al.’s research (2007).
While perceived value refers to trade-off between perceived benefits and costs,
how trade-offs are balanced is discussed with exchange theory and social penetration
theory in the following section. A quid pro quo mentality and equilibrium are common in
both theories, but social penetration theory includes the forecasted value derived from
interaction.
Exchange Theory: Perceived Value and Information Disclosure
The exchange between a customer and a company is reciprocal in the loyalty
program context. That is, a customer reveals personal information to a company on the
basis of value perceived in return (Lacey & Sneath, 2006) and this exchange is explained
in exchange theory (Bagozzi, 1975; Houston & Gassenheimer, 1987). Bagozzi (1975)
postulated three types of exchange: restricted, generalized, and complex exchange.
Among the three types of exchange, restricted exchange describes a reciprocal exchange
between two parties whereas generalized and complex exchanges describe an exchange
among three or more parties (Bagozzi, 1975). Therefore, restricted exchange is relevant
in the loyalty program context where dyadic exchanges occur between a customer and a
company occur.
Restricted exchanges include two characteristics, namely, equality and a quid pro
quo mentality, or “something of value in exchange for something for value” (Bagozzi,
1975, p. 33). In a loyalty program context, information disclosed (something of value to
companies) can be exchanged with perceived value of a loyalty program (something of
26
value to customers) when differences in the assessment of the utility of the loyalty
program and of the information disclose are minimized. In Bagozzi’s research (1975), an
attempt to maintain equality was made in repeatable social exchange, and emotional
reaction was heightened when equality is breached. Also, there was an attempt to balance
the mutual reciprocal exchange. Based on exchange theory, the utility of perceived value
should be equal to that of information disclosed at the moment of exchange and the
exchange is repeated as long as equality of the exchanged entities (e.g. perceived value of
a loyalty program and information disclosed) is maintained.
Social Penetration Theory: Perceived Social Benefits and Information Disclosure
Social penetration theory proposes growth or deterioration of interpersonal
relationships based on the reward and cost balance. According to social penetration
theory, the advancement of the relationship is dependent on the amount and nature of the
rewards and costs. People assess the reward/cost balance of an ongoing or previous
interaction and also forecast or predict implications of future interaction at the same or
deeper layers of exchange (Altman & Taylor, 1973). That is, they extrapolate to future
contacts with the other person, including more personal interactions. Assuming such
predictions to be favorable, it is hypothesized that the pair then gradually moves to
successively more intimate levels of encounters, from superficial biographical features to
emotions and attitudes.
Social penetration theory states that relationships proceed from non-intimate to
intimate areas and the more time people spend with others, the more likely people are to
disclose intimate thought and details of their life (Altman & Taylor, 1973; Cozby, 1973).
Social penetration refers to “overt interpersonal behaviors which take place in social
27
interaction and internal subjective processes which precede, accompany, and follow overt
exchange” (Altman & Taylor, 1973, p. 5). Overt interpersonal behaviors can be described
in terms of depth and breadth. Depth of penetration indicates the layers of an individual’s
ideas, beliefs, feelings and emotions and breath of penetration indicates the numbers of
major topical areas or categories and the amount of interaction within a certain topical
area or category.
Social penetration theory proposes that social penetration is affected by personal
characteristics of participants, outcomes of exchanges, and the situational context.
Personal characteristics of participants describe biographical properties, personality
features and social need characteristics. Outcomes of exchange are reward or cost
properties obtained from a relationship. The situational context describes the situational
and psychological determinants that excel, force or prevent a reciprocal interaction.
Outcomes of exchange can be examined with respect to perceived value because
both relate to reward and cost properties. Social penetration theory presents the following
reward/cost properties: reward/cost ratios, absolute reward and cost properties,
immediately obtained rewards and costs, forecast rewards and costs, and cumulative
reward and costs. Rewards and costs in the theory are conceptualized with several
dimensions. Rewards include the pleasure, satisfaction and gratification that a person
enjoys while costs refers to any factors that operate to inhibit or deter a performance of a
sequence of behavior. Costs hold opposite conceptualizations to rewards.
Reward/cost ratio refers to the balance of positive and negative relationships in an
interpersonal relationship. The higher the ratio is, the more satisfying the relationship is
considered. While the ratios of two relationship events can be equal, they can be different
28
when the absolute magnitude of positive and negative experiences is considered. For
example, when rewards are worthy of ten dollars, the same value of costs, $10, is
required in order to achieve the ratio of one. When rewards change to two dollars, costs
need to change to two dollars to maintain the ratio of one. Comparing the former event to
the latter, the absolute value of the former is five times higher than the latter while their
ratios are equal to one. It implies that, in order to maintain the same level of relationships,
some relationships require more effort while others require less. However, the
relationships where more effort is required need to provide more pleasure, satisfaction,
and gratification than the relationships where less effort is required.
Immediately obtained rewards and costs refer to the set of rewards and costs that
accrue from relatively immediate interaction whereas forecast rewards and costs are
projections to future rewards and costs. Cumulative reward and costs encompass the
accumulation of rewards and costs throughout the history of interaction.
The conceptualization of reward/cost ratio in social penetration theory is the same
as that of perceived value because both concepts are assessed based on a comparison
between benefits – or rewards in social penetration theory – and costs. Rewards in social
penetration theory refer to a positive experience in interpersonal relationship and
examples of the positive experience include a positive exchange of objects, symbolic
signs, gratifications and goal accomplishment via a relationship. According to social
penetration theory, rewards will be higher when the satisfying relationship is forecasted
than when it is not. In other words, perceived value will be higher for those who forecast
satisfying relationships (Altman & Taylor, 1973; Cozby, 1973).
29
Customer Loyalty
Since the objective of CRM is to retain customers through establishing long-term
relationship, how can customer retention be determined? Customer retention can be
identified in terms of repeated purchases and attitudinal commitment to the brand or
company, or customer loyalty (Winer, 2001). Customer loyalty has been proposed to
consist of two dimensions, namely, behavior and attitude (Baloglu, 2002; Dick & Basu,
1994; Fitzgibbon & White, 2005; Yi & Jeon, 2003). Behavioral loyalty is defined as
repeated purchases of particular products or service while attitudinal loyalty is defined
when repeated purchases occur due to a customer’s attitudinal commitment to the brand
or company. That is, repeat patronage is the key element of loyalty, but loyalty can be
categorized based on what drives repeated purchase. Behavioral loyalty is also called
spurious loyalty (Dick & Basu, 1994) or program loyalty (Yi & Jeon, 2003) whereas
attitudinal loyalty is also called brand loyalty (Yi & Jeon, 2003).
Dick and Basu (1994) described loyalty in terms of relative attitude and repeat
patronage. Relative attitude was used under the consideration of valence. Attitude is an
association between an object and an evaluation and customers’ attitude varies among
situations. Consequently, “relative attitude” reflects situational attitude. Dick and Basu
(1994) postulated that loyalty is customers’ repeat patronage with the positive relative
attitude. Repeat patronage in a loyalty relationship is directly influenced by relative
attitude whereas external factors such as social norm and situational influence impact
patronage. Dick and Basu (1994) assumed that loyal customers should have positive
relative attitudes and show repeat patronage while the magnitude of attitude and repeat
patronage would vary among customers.
30
Dick and Basu (1994) segmented loyalty into four categories based on the degree
of relative attitude and repeat patronage: loyalty, spurious loyalty, latent loyalty and no
loyalty. Spurious loyalty describes the situation when customers show high repeat
patronage while they have a low positive relative attitude. The impact of the attitude on
repeat patronage is weak, but other environmental factors such as social norm and
situational influence have a strong impact. Latent loyalty describes a high relative attitude
and low repeat patronage while environmental factors have the same strong impact on
repeat patronage as spurious loyalty. The magnitude of the environmental factors to the
loyalty relationship is high in both loyalty conditions, but the direction is opposite. The
environmental factors force repeated purchases in the spurious loyalty condition, and
prevent repeat purchases in the latent loyalty condition regardless of relative attitude. The
loyalty condition, or true loyalty (Oliver, 1997), is the most preferred condition with high
relative attitude and high repeat patronage. While the environmental factors are
influential, it is comparably hard to control them. When only internal factors are
considered, loyalty can be explained in the relationship between attitude (relative
attitude) and behavior (repeat patronage).
Oliver (1997) postulated that cognitive loyalty is initiated by the offers that
companies provide. He (1997) postulated that loyalty is developed sequentially from
cognitive to affective to conative loyalty while Dick and Basu’s research (1994)
examined cognitive, affective and conative elements as independent antecedents of
loyalty. Affective loyalty is developed from cognitive loyalty with the addition of
satisfaction. If the service/product is satisfactory, affective loyalty is developed from
cognitive loyalty. However, affective elements do not guarantee “true loyalty” because
31
satisfaction itself is not sufficient to lead to the behavioral aspect (e.g. purchase intention
or repeated purchase). Conation implies an intention or commitment to behave (Oliver,
1997) and conative loyalty is developed from affective loyalty when commitment to the
brand and to purchase plays a role.
It is worthwhile to note that behavior or behavioral intention is centered in the
conceptualization of loyalty in the previous research (Dick & Basu, 1994; Oliver, 1997).
However, repeated purchases do not necessarily represent psychological and attitudinal
preference and commitment towards the brand or company. Morgan and Hunt (1994)
define commitment as “an exchange partner believing that an ongoing relationship with
another is so important as to warrant maximum efforts at maintaining it; that is, the
committed party believes the relationship is worth working on to ensure that it endures
indefinitely” (p. 23). Behaviorally loyal customers are swayed when better alternatives
are available (Shankar, Smith, & Rangaswamy, 2003) while attitudinally loyal customers
repurchase despite situational influences and marketing efforts (Dick & Basu, 1994; Yi &
Jeon, 2003). True loyalty is posited as the balance between behavioral loyalty (e.g.
repeated patronage) and attitudinal, or affective, loyalty (e.g. favorability) in the sense of
higher magnitude (Dabholkar, 1996; Lee-Kelley, Gilbert, & Mannicom, 2003).
Customer loyalty in this study refers to behavioral intent (e.g. intent to repurchase
or revisit) and relative attitude (e.g. commitment to continuing the relationship with the
company) toward the company. With relation to perceived value, customer loyalty can be
examined as a behavioral and attitudinal response to perceived value of a loyalty
program. Repeated patronage is expected when the balance between benefits (e.g.
32
benefits associated with the loyalty program) and costs (e.g. purchase a meal) exists
according to exchange theory.
Conceptual Model
Overview
Compared to previous research examining information disclosure in relation to
information attributes and cue attributes (Cranor et al., 1999; Culnan & Armstrong, 1999;
Hoffman et al., 1999; Milne & Boza, 1999; Miyazaki & Fernandez, 2001; Phelps et al.,
2000), this study focuses on information disclosure in relation to perceived control,
privacy concern and perceived value as shown in Figure 3.
The construction of a customer database is a necessary first step to a complete
CRM solution and the foundation for any customer relationship management activity
(Berry, 1983; Winer, 2001). Relationships with customers are maintained through various
relationship programs. A loyalty program as a part of a relationship program offers
rewards and benefits to members, and customers join by providing personal information
in return. While the objective of the companies that have a loyalty program is customer
retention, little research was found on factors influencing customers’ decision to disclose
personal information in the loyalty program context. This study examines the roles of
privacy concern, perceived control and perceived value in information disclosure and
customer loyalty.
33
Figure 3. Conceptual model of information disclosure and its relationship with
information sensitivity, privacy concern, perceived value, perceived control and customer
loyalty.
Note. Parallelograms indicate control variables.
The scope of this study is the situation where a customer is requested to disclose
personal information while the customer is deciding whether to join a loyalty program.
Given the scope of this study, the focal company has not established a customer database
and is about to initiate the CRM model by collecting disclosure-based information from
customers. Disclosure-based data, by definition, are collected based on customers’ self-
disclosure and a literature review of research on self-disclosure follows. The model
presented in this study is proposed under the consideration of the first-time customer. The
first-time customer describes a customer who has never used the service or product of the
focal company providing a loyalty program and is deciding whether to participate in the
loyalty program. In this study, the first-time customers are exposed under a situation
34
where they are requested to disclose information as a process to become a member of the
loyalty program.
Hypotheses
Information sensitivity and privacy concern.
Privacy concern refers to the level of consumer anxiety for the way their
information is used by firms with respect of confidentiality and maintenance of privacy
(Martínez-López et al., 2005; Phelps et al., 2001). Research on privacy concern has
examined a positive relationship between the types of information requested and privacy
concern (Culnan, 1993; Norberg & Dholakia, 2004). While the types of information
requested were examined as the independent variables in the previous study (Phelps et
al., 2000), they do not fully explain a situational influence (Cranor et al., 1999; Horne et
al., 2007; Phelps et al., 2000). For example, a telephone number and social security
number can be categorized as a type of information to identify a customer (e.g. a personal
identification number), customers’ worry for the way that the information is used by
companies will vary. Therefore, another categorization of information and its influence
on privacy concern are worthy of investigation.
In this study, information sensitivity is proposed as an alternative way to
categorize information. While information sensitivity was differentiated from information
intimacy in some research (Norberg & Dholakia, 2004; Omarzu, 2000), sensitivity and
intimacy have been used interchangeably in other research (Moon, 2000; Phelps et al.,
2000). In previous research where information sensitivity was differentiated from
intimacy, the distinction was made based on emotion intensity versus monetary value, or
intrinsic risk versus extrinsic risk. That is, information intimacy was explained by
35
emotional intensity whereas information sensitivity was explained by monetary value
(Norberg & Dholakia, 2004; Omarzu, 2000). However, the distinction based on emotion
intensity and monetary value does not seem to be mutually exclusive. Since monetary
gain and loss triggers emotions, information characteristics can be described not with
either intimacy or sensitivity, but with both information intimacy and sensitivity. In order
to reconcile the ambiguity, information sensitivity, for the purpose of this study, refers to
comprehensive information characteristics that amalgamate emotion intensity and
monetary value and reflects situational influence. Given that information sensitivity
amalgamates both emotional intensity and monetary value, it is proposed that privacy
concern can be explained with a level of sensitivity (Norberg & Dholakia, 2004).
Therefore, the proposed hypothesis is:
H1: Information privacy concern is greater when high sensitive information is
requested than when low sensitive information is requested.
Information edit function, perceived control and privacy concern.
While information, choice, and predictability are the antecedents of control,
which have potential to influence experience and perceptions of control, increases in
information, choice, or predictability do not always lead to more perceived control
(Skinner, 1996). Thus, it needs to be examined empirically whether and under what
conditions information, choice, or predictability is likely to change perceived control
(Skinner, 1996).
36
In e-commerce, customers are provided with two choices as a way to reduce
privacy concern: opt-in and opt-out (Winer, 2001). In the opt-in case, customers must
consent to the collection and use of personal data while customers have to explicitly
forbid the collection and use in the opt-out case. While the opt-in option reduces privacy
concern because it gives customers more control over their personal information,
customers bear the loss of control in opt-out option (Winer, 2001). Thus, perceived
control varies between two options available.
In this study, an information edit function is proposed to have a similar role to the
opt-in option in privacy concern; it provides more perceived control. An information edit
function refers to an option to edit, hide, show and view personal information available
from a loyalty program. The availability of an information edit function is proposed to
help customers to decease their privacy concern with more control over companies’ use
of their personal information. The discussions about the role of perceived control in
privacy concern reduction and conceptualization of perceived control follow.
When personal information is requested by the company, the stress level
associated with privacy concern is increased (Milberg, Smith, & Burke, 2000). Perceived
control has a stress-reducing effect (Averill, 1973) and seeking for control is natural to
aversive events (Lefcourt, 1973). Perceived control consists of three domains, namely,
behavioral control, cognitive control, and decisional control (Averill, 1973). Although
cognitive control was postulated to play a lesser role in a service context than behavioral
and decisional controls (Namasivayam, 2004), it is proposed that behavioral control plays
a lesser role than cognitive and decisional control in the loyalty program context.
37
Given that behavioral control refers to the direct control over the actions of the
service provider (Namasivayam, 2004), behavioral control plays a greater role in a
service context since customers can directly influence the actions of the service provider
and request the components that they want to include. However, in most loyalty program
cases, the request of information disclosure (e.g. types and amount of information) is
fixed and customers cannot alter or modify the way in which questions are asked as they
can in the service exchange context. The only options available to customers are either
disclosure or non-disclosure of information requested. Due to the lack of direct control
over the actions of the service provider, behavioral control plays a lesser role than
cognitive and decisional controls in the information disclosure context. Therefore,
cognitive and decision controls, rather than behavioral control, need to be examined in
the loyalty program context.
Cognitive control plays a role in the information disclosure situation as follows.
Although the level of sensitivity of the information requested may vary, it is a stressful
event to customers when they decide to disclose personal information (Milberg et al.,
1995; Milberg et al., 2000). In this study, the stressful event is the restaurant’s request
for personal information. Consequently, customers have to impose meanings on the
aversive and stressful event. Cognitive control includes information gain and appraisal.
While information gain is the objective evaluation of threat, appraisal is the subjective
evaluation to conform to the needs and desires of the evaluator (Averill, 1973). In this
stressful situation, customers may seek cues to help them prepare for the impending
threat – it describes information gain in cognitive control. The cue in a loyalty program
can be present in various ways such as a policy statement about information handling,
38
opt-in and opt-out options, and so forth. When the cues for the impending threat are
present in the loyalty program, customers can appraise the current information request as
a less threatening event – it describes appraisal in cognitive control.
Decisional control refers to the opportunity to choose among various courses of
action. When various options are available to avoid or reduce the stressful event,
customers will perceive more decisional control than when no or fewer options are
available. While the choice available has been postulated to have a positive relationship
with stress reduction, too many choices may result in stress increase (Averill, 1973).
Thus, perceived control is proposed to play a significant role in privacy concern
reduction. Therefore, the following hypotheses are proposed:
H2a: Perceived cognitive control is greater when an information edit function is present
than when an information edit function is absent.
H2b: Perceived decisional control is greater when an information edit function is
present than when an information edit function is absent.
H2c: Perceived cognitive control has a negative relationship with information privacy
concern.
H2d: Perceived decisional control has a negative relationship with information privacy
concern.
39
Privacy concern and perceived value.
Based on previous research (Christopher, 1982; Lynn, 1991; Zeithaml, 1988),
perceived value, for the purpose of this study, refers to a subjective assessment of the
trade-off between benefits and costs associated with a loyalty program and is used in a
marketing context meaning values or utilities that consumers perceive (Monroe &
Krishnan, 1985; Ravald & Gronroos, 1996; Zeithaml, 1988).
The benefit components of perceived value include salient intrinsic and extrinsic
attributes, and other relevant abstractions such as convenience (Zeithaml, 1988) and the
benefits in a loyalty program context are rewards and benefits associated with a loyalty
program. Loyalty programs commonly reward customers for repeated purchases and
offer relational benefits (Gwinner et al., 1998; Winer, 2001). The cost components of
perceived value include monetary and nonmonetary costs (Zeithaml, 1988). Monetary
costs include the amount of money paid, installation, and handling costs and
nonmonetary costs include time, search costs, the risk of a product failure, fear of late or
inaccurate delivery and other factors (Christopher, 1982; Zeithaml, 1988). Since privacy
concern relates to worry and fear (Martínez-López et al., 2005; Phelps et al., 2001),
privacy concern is proposed to be a perceived cost.
Perceived value increases when perceived benefits increase, perceived costs
decrease or both events simultaneously occur. If privacy concern of a loyalty program
can be considered a perceived cost associated with a loyalty program, it will influence
perceived value in a negative way. Therefore, the proposed hypothesis is:
40
H3: Information privacy concern has a negative relationship with perceived value of a
loyalty program.
Privacy concern, information sensitivity and willingness to disclose.
Privacy concern in previous research was examined to have a negative influence
on behavioral responses (Liu et al., 2004; Miyazaki & Fernandez, 2001; Phelps et al.,
2000; Phelps et al., 2001). While behavioral responses in previous research examined
include actual purchase, purchase intention, and/or request to remove personal
information from companies’ database (Liu et al., 2004; Miyazaki & Fernandez, 2001;
Phelps et al., 2000; Phelps et al., 2001), little research was found on information
disclosure or intent to disclose as a behavioral response (Nam et al., 2005). Given that
self-disclosure is a behavior (Hartnack, 1968; Norberg & Dholakia, 2004), it is
worthwhile to investigate self-disclosure as a behavioral response to privacy concern.
Therefore, privacy concern may have a negative association with information disclosure,
specifically with willingness to disclose. The following hypothesis is proposed:
H4a: Information privacy concern has a negative relationship with willingness to
disclose information.
Also, the sensitivity level of information requested is proposed to influence
willingness to disclose information. While researchers have suggested that it is necessary
to include an information type factor in personal information disclosure in marketing
settings (Moon, 2000; Norberg & Dholakia, 2004), the type of information was criticized
41
not for reflecting situational influence (Annacker et al., 2001; Chaikin & Derlega, 1974).
Therefore, information sensitivity is proposed to be an alternative to the types of
information and the sensitivity level of information is proposed to influence willingness
to disclose in a negative way (Cozby, 1973; Omarzu, 2000).
Based on Hypotheses 1 and 4a, a higher level of information sensitivity is
proposed to be related to higher privacy concern, and an increment in privacy concern is
proposed to influence a decrement in willingness to disclose. The increment in privacy
concern describes the situation where people become worried more about information
privacy while a decrement in willingness to disclose describes the situation where people
become less willing to disclose information. Therefore, a higher level of information
sensitivity is proposed to be related to less willingness to disclose information and a
lower level of information sensitivity to be related to more willingness. Thus, the
following hypothesis is proposed:
H4b: Willingness to disclose information is greater when low sensitive information is
requested than when high sensitive information is requested.
Perceived control, information edit function and willingness to disclose.
The relationship between perceived control and behavior was introduced in the
theory of planned behavior, which was developed from the theory of reasoned action
(Ajzen, 1991). The theory of planned behavior proposed that human behavioral
achievement is predicted by the combination of motivation (intention) and ability
(perceived control over behavior). In addition, perceived control was examined to have
42
positive influence on behavior or a behavioral intent empirically (Hui & Bateson, 1991;
Povey et al., 2000). Given that self-disclosure is a behavior (Hartnack, 1968; Norberg &
Dholakia, 2004), its behavioral intent – willingness to disclose – can be examined as the
extension of research on perceived control and a behavioral intent. Thus, it is suggested
that an increment in perceived control results in an increment in willingness to disclose
information. Therefore, the following hypothesis is proposed:
H5a: Perceived cognitive control has a positive relationship with willingness to disclose
information.
H5b: Perceived decisional control has a positive relationship with willingness to
disclose information.
Based on Hypotheses 2a, 2b, and 5a, it is proposed that the presence of an
information edit function is related to greater perceived control and perceived control is
positively related to customers’ willingness to disclose information. Therefore, the
following hypothesis is proposed:
H5c: Willingness to disclose information is greater when an information edit function
is present than when an information edit function is absent.
43
Perceived value and willingness to disclose.
Similar to previous research on perceived control and a behavioral intent, little
was found on willingness to disclose information as a behavioral intent in research on
perceived value (Franzak, Pitta, & Fritsche, 2001). Previous research examined the
relationship between perceived value and purchase intent (Dodds et al., 1991; Monroe &
Krishnan, 1985). Given that willingness to disclose information is a behavioral intent, the
relationship between perceived value of a loyalty program and willingness to disclose can
be examined in a similar way as in previous studies.
The exchange between customers and companies is reciprocal in the loyalty
program context. That is, customers provide personal information to companies and the
companies provide economic and/or social benefits in return (Lacey & Sneath, 2006).
The reciprocal exchange relationship is explained in exchange theory. Based on Bagozzi,
restricted exchange describes the reciprocal exchange between a giver and a receiver and
restricted exchanges include two characteristics, namely, equality and a quid pro quo
mentality, or “something of value in exchange for something for value” (Bagozzi, 1975,
p. 33). He suggested an attempt to maintain equality is made in repeatable social
exchange and emotional reaction is heightened when equality is breached. In the case of
the information and benefits exchange, information disclosed should be equitable to
perceived value of the benefits associated with the loyalty program. An increment in
perceived value is expected to have an increment in information disclosed in order for
equality to be maintained. Therefore, the following hypothesis is proposed:
44
H6: Perceived value of a loyalty program has a positive relationship with willingness
to disclose information.
While the positive relationship between perceived value of a loyalty program and
willingness to disclose information can be explained by exchange theory, the positive
relationship may also be explained by social penetration theory. Based on social
penetration theory, the advancement of an interpersonal relationship is dependent on the
nature of the rewards and costs. That is, when current or future interactions are predicted
to be favorable, it is hypothesized that the pair then gradually moves to successively more
intimate levels of encounters, from superficial biographical features to emotions and
attitudes.
The prediction of interaction is made based on the comparison between the
rewards and costs. Rewards in social penetration theory refers to positive experiences in
an interpersonal relationship such as pleasure, satisfaction, and gratifications and hold a
similar conceptualization of social benefits in a loyalty program, which refers to the
benefits associated with a kind of fraternization. Costs hold the opposite
conceptualization to rewards. The higher the ratio of rewards to costs, the more satisfying
the relationship is considered. To the extent that repeated assessment of past interactions
and predictions of the future are favorable, the relationship will proceed further (Altman
& Taylor, 1973). It implies gradual increments in depth and breath of penetration; people
disclose more intimate thought and personal details to the extent that the ratio of rewards
to costs is assessed to be favorable.
45
Given that this study is proposed under the consideration of the first-time
customer who has never used the service or product at the focal company, future rewards
of the relationship, rather than immediately obtained rewards, are relevant to the scope of
the study. The first-time customer needs to assess future rewards due to no experience of
immediate and cumulated rewards. Therefore, it can be proposed that the first-time
customer will assess outcome of exchange between information requested to disclose and
forecasted benefits of the relationship. Consequently, those who assess future benefits
favorably will show different behavioral responses than those who do not. Therefore,
those who perceived more value of a loyalty program are more willing to disclose than ,
when those who perceived less value.
Perceived value and customer loyalty.
Loyalty has been proposed to consist of two dimensions, namely, behavior and
attitude (Dick & Basu, 1994; Yi & Jeon, 2003). Behavioral loyalty is defined as repeated
purchases of particular products or service while attitudinal loyalty is defined when
repeated purchases occur due to a customer’s attitudinal commitment to the brand or
company (Baloglu, 2002; Fitzgibbon & White, 2005). That is, repeat patronage is the key
element of loyalty, but loyalty can be categorized based on what drives repeated
purchase. However, customer loyalty in this study refers to behavioral intent (e.g. intent
to repurchase or revisit) and relative attitude (e.g. commitment to continuing the
relationship with the company) toward the company, rather than actual repeated
patronage.
46
Given that customer loyalty can be expressed in terms of repeated exchange – or
intent to repeated patronage – and affective commitment, the influence of perceived value
of a loyalty program on customer loyalty can be explained with exchange and social
penetration theories. According to exchange theory, repeated exchange is expected as
long as equality and a quid pro quo mentality, or “something of value in exchange for
something for value” is maintained (Bagozzi, 1975; Houston & Gassenheimer, 1987).
Customers will patronize a restaurant as long as customers know that they will receive
something of value in return. Therefore, customers’ assessment of benefits and costs
associated with a loyalty program can explain customer loyalty and customers who
perceive a loyalty program to be valuable will show customer loyalty (e.g. intent to
revisit or commitment to continuing the relationship). In addition, previous research
examined positive relationships between perceived value of a loyalty program and
behavioral loyalty and between benefits associated with a loyalty program and customer
loyalty (Bowen & Shoemaker, 2003; Yi & Jeon, 2003).
According to social penetration theory, the decision of future interaction is made
based on the reward/cost ratio; if the assessment is favorable (e.g. rewards is greater than
costs), future interaction will take place (Altman & Taylor, 1973). If the assessment is
uncertain, the interaction will slow down. With an unfavorable decision, the relationship
will terminate. Thus, a positive relationship between rewards and the advancement of
interaction is proposed. Therefore, the following hypothesis is proposed:
H7: Perceived value of a loyalty program has a positive relationship with customer
loyalty.
47
Willingness to disclose and customer loyalty.
The positive relationships of perceived value of a loyalty program with
willingness to disclose information and with customer loyalty are proposed in
Hypotheses 6 and 7. While the relationship between willingness to disclose and customer
loyalty can be examined with respect to perceived value of a loyalty program, little
research was found on willingness to disclose as a predictor of customer loyalty.
Willingness to disclose information and customer loyalty may be recursive, but
given the scope of this study, it is reasonable to assume that information disclosure
occurs prior to customer loyalty. That is, the scope of this study is for the first-time
customers who have not used the service or product of the focal company and
consequently, no or little loyalty has been established. Thus, willingness to disclose
information is a precedent of customer loyalty in this study and the following hypothesis
is proposed:
H8: Willingness to disclose information has a positive relationship with customer
loyalty.
48
Summary of Hypotheses
Figure 4. Summary of conceptual model of information disclosure and its relationship
with information sensitivity, privacy concern, perceived value, perceived control and
customer loyalty.
Note. Parallelograms indicate control variables.
H1: Information privacy concern is greater when high sensitive information is
requested than when low sensitive information is requested.
H2a: Perceived cognitive control is greater when an information edit function is
present than when an information edit function is absent.
H2b: Perceived decisional control is greater when an information edit function
is present than when an information edit function is absent.
49
H2c: Perceived cognitive control has a negative relationship with information
privacy concern.
H2d: Perceived decisional control has a negative relationship with information
privacy concern.
H3: Information privacy concern has a negative relationship with perceived
value of a loyalty program.
H4a: Information privacy concern has a negative relationship with willingness
to disclose information.
H4b: Willingness to disclose information is greater when low sensitive
information is requested than when high sensitive information is requested.
H5a: Perceived cognitive control has a positive relationship with willingness to
disclose information.
H5b: Perceived decisional control has a positive relationship with willingness to
disclose information.
H5c: Willingness to disclose information is greater when an information edit
function is present than when an information edit function is absent.
H6: Perceived value of a loyalty program has a positive relationship with
willingness to disclose information.
H7: Perceived value of a loyalty program has a positive relationship with
customer loyalty.
H8: Willingness to disclose information has a positive relationship with
customer loyalty.
50
CHAPTER 3
METHODOLOGY
This chapter discusses the methods used to examine the hypotheses proposed in
the previous chapter. A pilot test was conducted to develop and validate measurement
items and the main study was conducted to test the hypotheses. This chapter details the
definitions and variables of interest, the experimental design, measurement items, the
participants, experiment stimuli and procedures for the data collection. Then, the
analytical methods used to investigate the research hypotheses are discussed.
Pilot Test
The main purpose of the pilot test was 1) to determine the sensitivity level of
information items and 2) to define the underlying structure among the variables in the
analysis. In this section, the development of measurement items and the scenario are
discussed, followed by the procedures of the data collection, and the results of the pilot
test.
Development of Measurement Items
Identification of the level of information sensitivity.
Information sensitivity refers to comprehensive information characteristics that
amalgamate emotion intensity and monetary value. From previous studies, 29 items were
adapted with addition of the items date of birth, diabetes (i.e. presence) , marital status,
51
ethnicity and allergies (i.e. types and/or presence) as shown in Table 1 (Cranor, Reagle,
& Ackerman, 1999; Horne, Norberg, & Ekin, 2007; Norberg & Dholakia, 2004; Phelps,
Nowak, & Ferrell, 2000). The sensitivity of the items were measured by asking how
sensitive each item would be when it is asked in the membership application using a
seven-point Likert scale (1 = not sensitive at all, 7 = very sensitive). No identification of
the categorization was provided in the pilot study.
Table 1. Lists of information items and their categories in previous research.
Categories Information items Research
Demographic Marital status Phelps (2000)
Last grade of school completed Phelps (2000)
Occupation Phelps (2000)
Age Phelps (2000)
Name Cranor (1999)
Email address Cranor (1999)
52
Table 1 (continued). Lists of information items and their categories in previous research.
Categories Information items Research
Lifestyle Favorite hobbies Phelps (2000)
Favorite magazine Phelps (2000)
Favorite TV programs Phelps (2000)/ Cranor
(1999)
Favorite leisure activities Phelps (2000)
Smoke preference Horne (2007)
Alcohol consumption Horne (2007)
Favorite snack Cranor (1999)
Purchase-related Hotels/restaurant patronized most
often
Phelps (2000)
Most recent purchases Phelps (2000)
Preferred payment methods Phelps (2000)
Personal identifiers Telephone number Phelps (2000)/ Cranor
(1999)
Social security number Phelps (2000)
Preferred credit cards owned Phelps (2000)
53
Table 1 (continued). Lists of information items and their categories in previous research.
Categories Information items Research
Financial Annual income Phelps (2000)
Weekly money spent on
entertainment
Horne (2007)
Credit card number Cranor (1999)
Income Cranor (1999)
Medical Medications Norberg (2004)
Religion Religion Cranor (1999)
Additional items Date of birth Adapted from Cranor (1999)
Diabetes Adapted from Norberg
(2004)
Ethnicity Adpated from Cranor (1999)
Allergies Adapted from Norberg
(2004)
Development of a scenario.
A scenario was used because the advantages of using scenarios include
elimination of the difficulties associated with observation such as the time and expense
involved (Bateson & Hui, 1992; Smith, Bolton, & Wagner, 1999). In the scenario,
Riley’s Restaurant was described to be casual for lunch and upscale for dinner, featuring
American dishes with wine and beer. The loyalty program in the scenario was described
54
as a reward program with various member-exclusive benefits including recognition,
quicker service, discounts, redeemable points and other economic and social benefits. A
personal information policy stating how Riley’s Restaurant handles personal information
collected through the loyalty member registration was presented in the scenario. Also, a
written statement described how participants could view, edit, show or hide their
information after their account was created. The scenario was utilized after review from a
hospitality marketing professor.
Development of the measurement items for perceived control.
In the pilot test, two components of perceived control were measured, namely,
cognitive and decisional controls. Cognitive control is obtained by processing potentially
threatening information in a way to reduce stress and decisional control refers to the
range of choice or number of options available and involves choices prior to information
disclosure. Cognitive control was operationalized based on Faranda’s study (2001) and
measured using a seven-point Likert scale (1 = strongly disagree, 7 = strongly agree) as
shown in Table 2. The items of decisional control were adapted from the previous works
(de Rijk, Le Blanc, Schaufeli, & de Jonge, 1998; Mathwick & Rigdon, 2004) (see Table
3) and measured using a seven-point Likert scale (1 = strongly disagree, 7 = strongly
agree).
55
Table 2. Measurement items for cognitive control, adapted from Faranda’s study (2001).
Scale (1 = strongly disagree, 7 = strongly agree)
COGCTRL 1. There are parallels between this option and other options to add, edit,
delete, show and hide my personal information that I have experienced.
COGCTRL 2. The option that the loyalty program offers to view, edit, show and hide my
personal information is similar to others with which I am familiar.
COGCTRL 3. I am capable of using the option that the loyalty program offers to add,
edit, delete, show and hide my personal information.
COGCTRL 4. I have used other options that are fundamentally the same as this option.
Table 3. Measurement items for decisional control, adapted from previous research (de
Rijk et al., 1998; Mathwick & Rigdon, 2004).
Scale (1 = strongly disagree, 7 = strongly agree)
DECCTRL 1. This loyalty program offers many choices to add, edit, delete, show and
hide my personal information.
DECCTRL 2. This loyalty program allows me to add, edit, delete, show and hide my
personal information whenever it is necessary.
DECCTRL 3. I can select the method to add, edit, delete, show and hide my personal
information.
DECCTRL 4. I have very little freedom to add, edit, delete, show and hide my personal
information.
56
Development of the measurement items for perceived value.
Perceived value refers to some form of trade-off between benefits and costs
associated with a loyalty program (Christopher, 1982; Lynn, 1991; Zeithaml, 1988). The
benefit components of perceived value include salient intrinsic and extrinsic attributes,
and other relevant abstractions such as discount, tailored service and other rewards. The
cost components of perceived value include monetary and nonmonetary costs such as
price (e.g. price to purchase a reward card), effort (e.g. presentation of a card to a cashier,
and personal information disclosure) and other resources. Three measurement items,
adapted from previous research (Gwinner, Gremler, & Bitner, 1998; Lacey, 2007), were
used to measure perceived value of the loyalty program as shown in Table 4.
In the scenario, the importance of perceived benefits was measured regarding two
types of member-exclusive benefits: economic and social benefits as shown in Table 5.
The importance of perceived benefits was measured by asking how important the benefits
would be while no identification of the categorization was provided. The same number of
measurement items was listed for both benefits in order to control a confound effect. A
confound is defined as “an extraneous variable that covaries with the variable of interest”
(Shadish, Cook, & Campbell, 2002, p. 506). The confound effect anticipated in this case
was that the difference of value perception may result from the different number of
benefits (an extraneous variable), not from the different characteristics of benefits (the
variable of interest).
57
Table 4. Measurement items for perceived value, adapted from previous research
(Gwinner et al., 1998; Lacey, 2007).
Scale (1: strongly disagree, 7: strongly agree)
PERCVAL 1. The loyalty program of Riley’s restaurant is valuable to me.
PERCVAL 2. I look forward to participating in the loyalty program of Riley’s restaurant.
PERCVAL 3. What I get from the loyalty program of Riley’s restaurant makes it a great
value.
Table 5. List of the benefits offered in the scenario and the scale to measure the
importance of the benefits, adapted from previous research (Gwinner et al., 1998; Lacey,
2007).
Categories Scale (1 = not important at all, 7 = very important)
Economic benefits ECONBENF 1. Having quicker service
ECONBENF 2. Better prices / discount
ECONBENF 3. Time saving
ECONBENF 4. Redeemable reward points
Social benefits SOCBENF 1. The company’s anticipation of my service and menu
needs
SOCBENF 2. Recognition from the company (e.g. addressing me
by name)
SOCBENF 3. Special attention
SOCBENF 4. Long-term relationship with the company
58
Development of the measurement items for customer loyalty.
Customer loyalty has been proposed to consist of two dimensions, namely,
behavior and attitude (Baloglu, 2002; Dick & Basu, 1994; Fitzgibbon & White, 2005; Yi
& Jeon, 2003). Behavioral loyalty is defined as repeated purchases of particular products
or service while attitudinal loyalty is defined when repeated purchases occur due to a
customer’s attitudinal commitment to the brand or company. However, customer loyalty
in this study refers to behavioral intent (e.g. intent to purchase or visit) and relative
attitude (e.g. commitment to continuing the relationship with the company) toward the
company.
The measurement items for customer loyalty were adapted from previous research
(Lacey, 2007; Mattila, 2006; Yi & Jeon, 2003) as shown in Table 6. Customer loyalty
was measured with the two dimensions, behavioral intent and relative attitude.
Table 6. Measurement items for customer loyalty, adapted from previous research
(Lacey, 2007; Mattila, 2006; Yi & Jeon, 2003).
Categories Scale (1 = strongly disagree, 7 = strongly agree)
Behavioral intent BEHLOY 1. I would like to patronize this company more so than other
companies.
BEHLOY 2. I would recommend the proposed loyalty program to others.
BEHLOY 3. I like the proposed loyalty program more so than other
programs.
BEHLOY 4. I would encourage friends and relatives to do business with
this company.
59
Table 6 (continued). Measurement items for customer loyalty, adapted from previous
research (Lacey, 2007; Mattila, 2006; Yi & Jeon, 2003).
Categories Scale (1 = strongly disagree, 7 = strongly agree)
Behavioral intent BEHLOY 5. I have a strong preference for the proposed loyalty program.
BEHLOY 6. I would consider this company my first choice.
BEHLOY 7. I would say positive things about this company to other
people.
Relative attitude ATTDLOY 1. My relationship with this company is/will be worth my
effort to maintain.
ATTDLOY 2. My relationship with this company is/will be very
important to me.
ATTDLOY 3. My relationship with this company is/will be something
that I really care about.
ATTDLOY 4. My relationship with this company is/will be strong (e.g. I
am very committed to continuing it).
Participants and Procedures for the Data Collection
Participants for the pilot test were recruited from the listserv of a consumer taste
panel in a hospitality management program of a major northeastern US university after
permission from the Office for Research Protections (ORP) was obtained. An email
requesting voluntary participation was sent along with a link to the online survey.
Participants could begin the online survey by either clicking the link or copying and
pasting the link into the address bar in an Internet browser.
60
Before beginning the online survey, they were informed that they could not
resume the survey once they closed the Internet browser. Participants were asked to
complete the survey after reading a scenario about a loyalty program for a hypothetical
national restaurant chain named Riley’s Restaurant (see Appendix B). A scenario was
used because the advantages of using scenarios include elimination of the difficulties
associated with observation such as the time and expense involved (Bateson & Hui, 1992;
Smith et al., 1999).
The online survey was hosted in a commercial web service provider, Mutual
Gravity, which offers professional online survey instrument tools. The survey was open
from March 19, 2008 to March 25, 2008, and no reminder email was sent.
Results
Of 337 invitation emails, 86 participants completed the survey for a response rate
of 25.52%. From the server where the online survey resided, 46 incomplete responses
were found. The results of the sensitivity level identification of the information items are
discussed, followed by the underlying structure among and the reliability of the
measurement items assessed in the pilot study including cognitive and decisional
controls, perceived value, economic and social benefits, and customer loyalty.
Level of information sensitivity.
The items were assessed using a seven-point Likert scale (1 = not sensitive at all,
7 = very sensitive). First, the mean and standard deviation of each item was computed as
shown in Table 7. Although social security number was rated most sensitive, social
security number was excluded from the study because it is unrealistic to ask restaurant
customers for their social security number. Instead of two separate items (i.e. credit card
61
number and preferred credit card owned), preferred credit card number was used. Annual
income was considered to be the most sensitive information item (M = 5.95, SD = 1.55)
and gender the least sensitive information item (M = 1.64, SD = 1.39). Then, each item
was compared with annual income to see if it was statistically significantly different from
annual income.
Table 7. Descriptive statistics of the measurement items for information sensitivity.
Information item M SD
Gender 1.64 1.39
Smoking preference 1.75 1.68
Favorite snacks 1.74 1.47
Favorite TV programs 2.06 1.83
Favorite magazine 2.06 1.82
Favorite hobbies 2.13 1.81
Favorite leisure activities 2.25 1.89
Alcohols preferences 2.51 1.87
Full name 2.60 1.82
Restaurant chain patronized other than Riley 2.67 2.09
Occupation 3.14 2.01
Allergies 3.19 2.35
Prefer payment methods 3.90 2.33
62
Table 7 (continued). Descriptive statistics of the measurement items for information
sensitivity.
Information item M SD
Ethnicity 3.49 2.36
Age 3.50 2.20
Marital status 3.63 2.52
Email address 3.87 2.24
Prefer payment methods 3.90 2.33
Last grade of school complete 4.00 2.37
Date of birth 4.15 2.23
Most recent purchases 4.15 2.20
Weekly money spent on entertainment 4.30 2.17
Diabetes and other chronic diseases 4.63 2.26
Religion 4.81 2.42
Preferred credit card owned 5.10 2.03
Medication 5.21 2.23
Telephone numbers 5.26 1.95
Annual income 5.95 1.55
Credit card number 6.58 0.90
Social security number 6.89 0.49
63
Next, data were examined for outliers. Mahalanobis distances, which measure the
distance of cases from the mean of the predictor variable, were computed to detect
outliers (Field, 2005; Hair, Black, Babin, Anderson, & Tatham, 2006). Subjects whose
Mahalanobis chi-square exceeded the critical χ2(29) at p< .001, 58.30, were deleted
(Mertler & Vannatta, 2005).
One-way analysis of variance (ANOVA) was conducted to determine the
statistical difference of the means among the information items as shown in Table 8.
There was a significant difference among the means of the information items, F (28,
2407) = 44.67, p < .0001, and it implies that the sensitivity level of annual income was
significantly different from that of gender. Levene statistics, a test of homogeneity of
variances, indicate unequal variance of the groups (see Table 9).
Table 8. Analysis of variance for the measurement items for information sensitivity.
Source SS df MS F P
Between groups 4996.20 28 178.44 44.67** .000
Within groups 9615.39 2407 3.40
Total 14611.59 2435
** p < .01.
Table 9. Test of homogeneity of variance for the measurement items for information
sensitivity.
Levene statistics df 1 df 2 P
18.39** 28 2407 .000
** p < .01.
64
Multiple mean comparisons among the measurement items for information
sensitivity, a Post Hoc analysis, followed to determine the mean difference among the
measurement items. Specifically, the analysis would show which item’s mean was the
same as or different from that of the most sensitive item, annual income, and the least
sensitive item, gender.
A Dunnet T3 analysis was conducted due to the unequal variance (Field, 2005;
Kuehl, 2000). No significant mean differences were found among the item with the
lowest mean, gender, and the next five items, ranked by mean and no mean differences
were found among the item with the highest mean, annual income, and the next four
items, ranked by mean, as shown in Table 10. Diabetes was added into the highest means
group in order to match the number of items to the lowest means group. The mean of
favorite hobbies, which is the highest in the lowest means group, was statistically
different from the mean of diabetes, which is the lowest mean in the highest means
group. The six items in the lowest means group represented low sensitivity information
items and the other six items in the highest means group represented high sensitivity
information items (see Table 11).
65
Table 10. Multiple mean comparisons among the mean of the measurement items for
information sensitivity.
Information items 95% C. I.
(I) (J)
Mean
difference
(I-J)
SE P
Lower
bound
Upper
bound
Gender Smoking preference -.107 .24 1.00 -1.04 .83
Favorite snacks -.095 .22 1.00 -.96 .77
Favorite TV programs -.417 .25 1.00 -1.40 .57
Favorite magazine -.417 .25 1.00 -1.40 .56
Favorite hobbies -.488 .25 1.00 -1.47 .49
Annual Telephone number .69 .27 .97 -.38 1.76
income Medication .74 .30 .98 -.43 1.90
Preferred credit card number .86 .28 .58 -.24 1.95
Religion 1.14 .31 .14 -.09 2.38
Diabetes Favorite hobbies 2.50 .32 .00** 1.26 3.74
** p < .01
66
Table 11. Categorization of the measurement items for information sensitivity.
Sensitivity category Information sensitivity item
Low sensitivity information Gender
Favorite Snack
Smoking preferences
Favorite TV programs
Favorite Magazine
Favorite hobbies
High sensitivity information Annual income
Telephone number
Medication
Preferred credit card number
Religion
Diabetes
67
Underlying structure among the measurement items for perceived control.
Factor analysis was conducted to define the underlying structure among the
measurement items assessing perceived control. In this study, eight items were measured
and two underlying structures, namely cognitive and decisional control, were expected
with factor analysis.
First, data were examined for outliers. Mahalanobis distances, which measure the
distance of cases from the mean of the predictor variable, were computed to detect
outliers (Field, 2005; Hair et al., 2006). Subjects whose Mahalanobis chi-square exceeded
the critical χ2(8) at p< .001, 26.13, were deleted (Mertler & Vannatta, 2005). Bartlett’s
test, χ2 = 434.290, p < .0001, and Kaiser-Meyer-Olkin measure of sampling adequacy
(KMO) statistics, KMO = .783, indicated that factor analysis was adequate.
Principal component analysis was conducted utilizing a varimax rotation. The
analysis produced a two-component solution, which was evaluated with the following
criteria: eigenvalue, variance, scree plot and residuals. The criteria indicated a two-
component solution was appropriate as shown in Table 12 and Figure 5. With rotation for
improved interpretation, the first component accounted for 43.25% of the total variance
in the original variables, while the second component accounted for 31.58% as shown in
Table 12.
68
Table 12. Total variance explained for perceived control.
Initial Eigenvalues Extraction Sums of Squared
Loadings Rotation Sums of Squared Loadings
Compo
-nent Total
% of
Variance
Cumulative
% Total
% of
Variance
Cumulative
% Total
% of
Variance
Cumulative
%
1 4.188 52.354 52.354 4.188 52.354 52.354 3.460 43.245 43.245
2 1.798 22.470 74.824 1.798 22.470 74.824 2.526 31.579 74.824
3 .686 8.580 83.404
4 .498 6.229 89.633
5 .315 3.932 93.564
6 .260 3.245 96.810
7 .130 1.620 98.429
8 .126 1.571 100.000
Note. Principal component analysis used for extraction method.
Figure 5. Scree plot of the measurement items for perceived control.
69
Table 13. Rotated component matrix for the measurement items for perceived control.
Component
1 2
DECCTRL 2. This loyalty program allows me to add, edit, delete, show and
hide my personal information whenever it is necessary.
.902 .207
DECCTRL 3. I can select the method to add, edit, delete, show and hide my
personal information.
.900 .211
DECCTRL 1. This loyalty program offers many choices to add, edit, delete,
show and hide my personal information.
.880 .198
COGCTRL 3. I am capable of using the option that the loyalty program offers
to add, edit, delete, show and hide my personal information.
.736 .349
DECCTRL 4. I have very little freedom to add, edit, delete, show and hide my
personal information.
.676 -.109
COGCTRL 4. I have used other options that are fundamentally the same as this
option.
.154 .887
COGCTRL 2. The option that the loyalty program offers to view, edit, show
and hide my personal information is similar to others with which I am familiar.
.186 .865
COGCTRL 1. There are parallels between this option and other options to add,
edit, delete, show and hide my personal information that I have experienced.
.082 .855
Note. DECCTRL is decisional control and COGCTRL is cognitive control. DECCTRL 4 was
reverse coded.
70
Based on the rotated component matrix, the first component consisted of five
items including DECCTRL 1, DECCTRL 2, DECCTRL 3, DECCTRL 4 and COGCTRL 3
while the second component consisted of three items including COGCTRL 1, COGCTRL
2 and COGCTRL 4 as shown in Table 13. The first component could be labeled as
decisional control and the second component as cognitive control.
In the pilot study, COGCTRL 3 was found to be interrelated with four items
(DECCTRL 1, 2, 3 and 4), which were expected to be interrelated and represented
decisional control. Based on the factor loading and previous research (de Rijk et al.,
1998; Mathwick & Rigdon, 2004), COGCTRL 3 and DECCTRL 4 could be excluded to
represent decisional control. A reliability analysis followed to assure this decision. While
Cronbach’s alpha tends to increase as the number of items on scale increases, three items
(DECCTRL 1, 2 and 3) for decisional control (α = .942) were more reliable to measure
the construct than four items (DECCTRL 1, 2, 3 and 4) (α = .867). Similarly, three items
(COGCTRL 1, 2 and 4) for cognitive control (α = .861) were more adequate than four
items (COGCTRL 1, 2, 3 and 4) (α = .818).
Reliability of the measurement items for perceived value and underlying structure
among the measurement items for importance of perceived benefits.
A reliability analysis was conducted to assure that the measurement items reflect
the construct that they are measuring. First, one case was eliminated whose Mahalanobis
chi-square exceeded the critical χ2(3) at p< .001, 16.27 (Mertler & Vannatta, 2005). The
reliability of the measurement items for perceived value was acceptable with Cronbach’s
coefficient α = .942.
71
The factor analysis followed to examine the underlying structure among the
measurement items assessing the importance of perceived benefits. In this study, eight
items were measured and two underlying structures, namely the importance of economic
and social benefits, were examined with factor analysis.
First, data were examined for outliers. Mahalanobis distances, were computed to
detect outliers (Field, 2005; Hair et al., 2006). Subjects whose Mahalanobis chi-square
exceeded the critical χ2(8) at p< .001, 26.13, were deleted (Mertler & Vannatta, 2005).
Bartlett’s test, χ2 = 384.874, p < .0001, and KMO = .725 indicated that factor analysis
was adequate.
Principal component analysis was conducted utilizing a varimax rotation. The
analysis produced a two-component solution, which was evaluated with the following
criteria: eigenvalue, variance, scree plot and residuals. The criteria indicated a two-
component solution was appropriate as shown in Table 14 and Figure 6. With rotation for
improved interpretation, the first component accounted for 37.28% of the total variance
in the original variables, while the second component accounted for 32.08%.
72
Table 14. Total variance explained for importance of perceived benefits.
Initial Eigenvalues Extraction Sums of Squared
Loadings Rotation Sums of Squared Loadings
Compo
-nent Total
% of
Variance
Cumulative
% Total
% of
Variance
Cumulative
% Total
% of
Variance
Cumulative
%
1 4.067 50.837 50.837 4.067 50.837 50.837 2.982 37.279 37.279
2 1.481 18.517 69.354 1.481 18.517 69.354 2.566 32.075 69.354
3 .869 10.868 80.222
4 .669 8.364 88.586
5 .358 4.472 93.058
6 .233 2.916 95.973
7 .221 2.764 98.737
8 .101 1.263 100.000
Note. Principal component analysis used for extraction method.
Figure 6. Scree plot of the measurement items for importance of perceived benefits.
73
Table 15. Rotated component matrix for the measurement items for importance of
perceived benefits.
Component
1 2
ECONBENF 2. Better prices / discount .898 -.058
ECONBENF 1. Having quicker service .878 .285
ECONBENF 3. Time saving .865 .279
ECONBENF 4. Redeemable reward points .549 .228
SOCBENF 2. Recognition from the company (e.g. addressing me by name) .148 .837
SOCBENF 4. Long-term relationship with the company .309 .772
SOCBENF 1. The company’s anticipation of my service and menu needs .011 .754
SOCBENF 3. Special attention .489 .698
Note. ECONBENF is economic benefits and SOCBENF is social benefits.
Based on the rotated component matrix, the first component consisted of four
items including ECONBENF 1, ECONBENF 2, ECONBENF 3 and ECONBENF 4
whereas the second component consisted of four items including SOCBENF 1,
SOCBENF 2, SOCBENF 3 and SOCBENF 4 as shown in Table 15. The first component
can be labeled as the importance of economic benefits and the second component as the
importance of social benefits. The result showed two components of the measurement
items, which was expected in the development of the measurement items.
74
Reliability of the measurement items for customer loyalty.
A reliability analysis was conducted to assure that the measurement items reflect
the construct that they are measuring. First, subjects whose Mahalanobis chi-square
exceeded the critical χ2(7) = 24. 32 for behavioral intent and the critical χ2(4) = 18. 47 for
relative attitude at p< .001 were deleted (Mertler & Vannatta, 2005). The reliability of the
measurement items for behavioral intent was acceptable with Cronbach’s coefficient α =
.958 and for relative attitude with α = .973.
Main Study
Design of the Study
To test the hypotheses of this study, participants were divided into four groups
based on two experimental treatments, namely, information sensitivity and information
edit function. Information sensitivity refers to comprehensive information characteristics
that amalgamate emotion intensity and monetary value and was manipulated at two
levels: high and low sensitivity. An information edit function refers to an option to edit,
hide, show and view personal information available from a loyalty program and was
manipulated at two levels: presence and absence. The four groups were: high sensitive
information – presence of an information edit function, high sensitive information –
absence of an information edit function, low sensitive information – presence of an
information edit function, and low sensitive information – absence of an information edit
function.
Privacy concern, perceived control, perceived value, information disclosure and
customer loyalty were assessed for each group. That is, participants in each group were
75
asked about their opinions on a loyalty program for a hypothetical national restaurant
chain and privacy concern, perceived control over information use of the company,
perceived value of a loyalty program, willingness to disclose and customer loyalty (i.e.
behavioral intent and relative attitude toward the company) were measured.
Experimental Treatments
Scenarios.
Scenarios were used for this study since they eliminate the difficulties associated
with observation such as the time and expense involved (Bateson & Hui, 1992; Smith et
al., 1999). In the scenario, Riley’s Restaurant was described to be casual for lunch and
upscale for dinner, featuring American dishes with wine and beer. The loyalty program in
the scenario was described as a reward program with various member-exclusive benefits
and the eight benefit items were listed. A personal information policy was stated in the
scenario describing how Riley’s Restaurant handles personal information collected
through the loyalty member registration. Also, a written statement describing how
participants can view, edit, show or hide their information after their account is created
was present.
Information sensitivity.
Information sensitivity refers to comprehensive information characteristics that
amalgamate emotion intensity and monetary value and was manipulated at two levels:
high and low sensitivity. Based on the pilot test, 12 of 29 items were selected for
information sensitivity manipulation as shown in Table 11. The six items representing
low sensitivity information were gender, favorite snack, smoking preferences, favorite
TV programs, favorite magazine and favorite hobbies. The items representing high
76
sensitivity information were annual income, telephone number, medication which the
respondent takes, preferred credit card number, religion preferences of the respondent
and the presence of diabetes.
Information edit function.
An information edit function refers to an option to edit, hide, show and view
personal information available from a loyalty program and was manipulated at two
levels: presence and absence. This stimulus was manipulated in order to establish the
different settings for perceived control; perceived control is expected to be different
between presence and absence of the information edit function.
In the questionnaire where the information edit function was present, the function
was simulated so that participants could interact with the option to edit, hide, show, and
view a mock-up email address. An email address was included for the simulation because
it was not included in the high or low sensitivity information item group. When the Show
action was selected, the following message appeared: The staff in your local Riley’s
restaurant can see your email address. When the Hide action was selected, the following
message appeared: The staff in your local Riley’s restaurant CANNOT see your email
address. When the Edit action was selected, participants were asked to enter a new email
address. When the View action was selected, the following message appeared: Your email
address is [email protected]. At the condition where the information edit
function was absent, no simulation was available.
77
Dependent Variables
Five dependent variables used and measured were perceived control, privacy
concern, value perception, information disclosure, and customer loyalty. The same
measurement items used in the pilot test were used in the main study.
Perceived control.
Two components of perceived control, namely cognitive and decisional control,
were measured using the measurement items in the pilot test as shown in Table 2 and
Table 3. Participants were asked to indicate their level of agreement or disagreement with
the statements of the measurement items (1 = strongly disagree, 7 = strongly agree).
Cognitive control is obtained by processing potentially threatening information in a way
to reduce stress and decisional control refers to the range of choice or number of options
available and involves choices prior to information disclosure.
Perceived cognitive and decisional control were measured to examine the effect
of the information edit function on perceived control, not to examine the effect of the
company’s request for information. While information, choice, and predictability are the
antecedents of control, which have the potential to influence experience and perceptions
of control, increases in information, choice, or predictability do not always lead to more
perceived control (Skinner, 1996). Thus, it was examined whether and under what
conditions the information edit function changes perceived control. Similarly, the
experiments exemplified in previous research (Averill, 1973) examined the effect of
information on perceived control while an impending stressful event stayed constant.
78
Privacy concern.
Privacy concern refers to the level of consumers’ anxiety for the way their
information is used by companies (Phelps, D'Souza, & Nowak, 2001). The five items of
the scale were adapted from previous research (Milne & Culnan, 2004; Miyazaki &
Fernandez, 2001) and measured using a seven-point Likert scale (1 = strongly disagree, 7
= strongly agree) as shown in Table 16.
Table 16. Measurement items for privacy concern, adapted from previous research
(Milne & Culnan, 2004; Miyazaki & Fernandez, 2001).
Scale (1 = strongly disagree, 7 = strongly agree)
PRVCCONC 1. It usually bothers me when this company asks me for such personal
information.
PRVTCONC 2. I am concerned that this company is collecting too much personal
information about me.
PRVTCONC 3. It bothers me to give personal information to this company.
PRVTCONC 4. When this company asks for personal information, I sometimes think
twice.
PRVTCONC 5. It bothers me when I imagine that this company tracks my purchase
habits and histories
79
Perceived value.
Perceived value of a loyalty program refers to some form of trade-off between
benefits and costs associated with a loyalty program (Christopher, 1982; Lynn, 1991;
Zeithaml, 1988). It was measured using the measurement items in the pilot test as shown
in Table 4. Participants were asked to indicate their level of agreement or disagreement
with the statements (1 = strongly disagree, 7 = strongly agree).
The importance of perceived benefits was measured for economic and social
benefits using the measurement items used in the pilot test as shown in Table 5.
Participants were asked to rate the importance of the benefits listed (1 = not important at
all, 7 = very important).
Willingness to disclose information.
Willingness to disclose information was measured for the items used for the
information sensitivity as shown in Table 11. Participants were asked to rate their
willingness to disclose the items listed (1 = strongly unwilling, 7 = strongly willing).
Customer loyalty.
Behavioral intent and relative attitude were measured for customer loyalty
(Lacey, 2007; Mattila, 2006; Yi & Jeon, 2003) using the measurement items in the pilot
test as shown in Table 6. Participants were asked to indicate their level of agreement or
disagreement with the statements of the measurement items (1 = strongly disagree, 7 =
strongly agree).
Participants
A minimum sample size of 30 participants per group and 120 participants in total
is required to yield significant statistical analysis. A convenience sample was recruited
80
from the customers who made a reservation for dinner at a student managed restaurant of
a major northeastern university between March 1, 2007 and April 30, 2008. The dinner
service is managed and staffed by students majoring in hospitality management, as part of
an undergraduate class course.
Although the customers made a reservation either by an online reservation form
or phone, the customer email list was collected mainly from those who made a
reservation online since many of those who made a reservation by phone stated they
didn’t have an email address. The email list was obtained from the customer database of
the online reservation system with the permission from the Office for Research
Protections (ORP) and 1,441 email addresses were available from the contact
information.
Procedures for the Data Collection
An invitation email with a link to the online survey was sent to a sample size of
1,441. The online survey was hosted by a commercial web service company, Mutual
Gravity, which offers professional online survey instrument tools. The online survey
could be initiated by clicking the link or copying and pasting the link into the address bar
in an Internet browser.
Once the survey was initiated, participants were randomly exposed to one of the
four experimental conditions: 1) high sensitive information request – presence of an
information edit function, 2) low sensitive information – presence of an information edit
function, 3) high sensitive information – absence of an information edit function, or 4)
low sensitive information – absence of an information edit function.
81
After reading a scenario about a hypothetical national restaurant chain named
Riley’s Restaurant and its loyalty program, participants were asked to complete a
questionnaire evaluating their perceptions about control, privacy concern, value and
assessing their willingness to disclose information requested in the experiment as shown
in Appendix C. Also, their behavioral intent and relative attitude to the hypothetical
restaurant were assessed. The survey was open for two weeks in April, 2008, and a
reminder email was sent one week after the initial email had been sent.
Online survey.
The online survey offers the advantages of reaching a large number of potential
respondents cheaply and quickly (Couper, 2005; Couper, Blair, & Triplett, 1999). Also,
the online survey provides improved measurement with the capability of a computer-
assisted survey technique including automated branching or skipping and randomization
of questions or response opinions (Couper, 2001).
However, the response rate of the online survey might not reach the levels of an
equivalent paper-based survey (Couper et al., 1999). The nonresponse error can exist
when an obtained sample differs from the original selected sample and there are two
ways in which nonresponse can occur: the inability to contact all members of the sample
and nonresponse to some or all items on the measurement instrument (Smith & Albaum,
2005). Although a high response rate does not guarantee an absence of nonresponse rate
error, the lower rate tends to affect estimates derived from the sample (Couper, 2001).
The advantages of online survey in term of cost reduction, timeliness, or improved
measurement may be offset by possible losses with respect to nonresponse (Couper,
2005).
82
Randomized assignment to the experimental condition.
Participants were randomly exposed to one of the four experimental conditions. A
JavaScript was used to achieve this random assignment. A JavaScript is a scripting
language, which is a lightweight programming language used to add interactivity to
hypertext markup language (HTML) pages (W3C, 1999). When participants clicked the
hyperlink in the introduction page of the online survey, the JavaScript generated a
random number from zero to three, each of which linked to one of the four experimental
conditions.
One fourth of the participants were asked to disclose high sensitive information,
and the information edit function was available that they could show, hide, edit and view
released information. Another one fourth of the participants was asked to disclose low
sensitive information with the information edit function available. The third group was
asked to disclose high sensitive information but no information edit function was
available. The final fourth was asked to disclose low sensitive information and no
information edit function was available.
Statistical Analysis
A univariate analysis of variance (ANOVA) was conducted to investigate the
effect of information sensitivity on information privacy concern proposed in Hypothesis
1 (information privacy concern is greater when high sensitive information is requested
than when low sensitive information is requested). The difference in information privacy
concern between high and low sensitivity information condition was examined.
83
Multivariate analysis of variance (MANOVA) was conducted to analyze
Hypotheses 2a (perceived cognitive control is greater when an information edit function
is present than when an information edit function is absent) and 2b (perceived decisional
control is greater when an information edit function is present than when an information
edit function is absent). Since the variables, perceived cognitive and decisional control,
are the components of perceived control, the combined differences (e.g. differences in
perceived control combining perceived cognitive and decisional control) can be examined
with MANOVA.
To test Hypotheses 2c (perceived cognitive control has a negative relationship
with information privacy concern), and 2d (perceived decisional control has a negative
relationship with information privacy concern), a univariate ANCOVA was conducted.
Perceived cognitive and decisional control were controlled for in order to examine the
effect of an information edit function on an information edit function and the effect of
perceived cognitive and decisional control, as covariates, on privacy concern.
To test Hypotheses 3 (information privacy concern has a negative relationship
with perceived value of a loyalty program), 4a (information privacy concern has a
negative relationship with willingness to disclose information), and 6 (perceived value of
a loyalty program has a positive relationship with willingness to disclose information),
structural equation modeling (SEM) was conducted. The parameters and their sign
indicated the relationships among information privacy concern, perceived value of a
loyalty program, and willingness to disclose. Also, the model fit indices provided the
model fitness to the data.
84
ANCOVA was conducted to test Hypothesis 4b (willingness to disclose
information is greater when low sensitive information is requested than when high
sensitive information is requested) where information sensitivity was an independent
variable (IV), willingness to disclose was a dependent variable (DV) and information
privacy concern was a covariate. Similarly, ANCOVA was conducted to test Hypotheses
5a (perceived cognitive control has a positive relationship with willingness to disclose
information), 5b (perceived decisional control has a positive relationship with willingness
to disclose information), and 5c (willingness to disclose information is greater when an
information edit function is present than when an information edit function is absent)
where an information edit function was an IV, willingness to disclose was a DV and
perceived cognitive and decisional control were covariates.
A series of regression analyses was conducted to analyze Hypotheses 7 (perceived
value of a loyalty program has a positive relationship with customer loyalty), and 8
(willingness to disclose information has a positive relationship with customer loyalty). In
addition, multiple regression analysis was conducted to examine the relationship of
customer loyalty with perceived value of a loyalty program and willingness to disclose to
information. The summary of hypotheses and the correspondent statistical analyses are
shown in Table 17.
85
Table 17. Summary of independent and dependent variables and the statistical analysis
methods to examine the interests in hypotheses.
IV and DV Interest Statistical analysis
H1 IV: Information sensitivity
DV: Information privacy concern
Group difference ANOVA
H2a &b IV: Information edit function
DV: Perceived cognitive control (H2a)
DV: Perceived decisional control (H2b)
Group difference MANOVA
H2c & d IV: Information edit function
DV: Information privacy concern
Covariates: Perceived cognitive and
decisional control
Group difference ANCOVA
H3, 4a
& 6
IVs: Information privacy concern and
perceived value of a loyalty program
DV: Willingness to disclose information
Model fit SEM
H4b IV: Information sensitivity
DV: Willingness to disclose information
Covariate: Information privacy concern
Group difference ANCOVA
86
Table 17 (continued). Summary of independent and dependent variables and the
statistical analysis methods to examine the interests in hypotheses.
IV and DV Interest Statistical analysis
H5a, 5b
& 5c
IV: Information edit function
DV: Willingness to disclose information
Covariates: Perceived cognitive and
decisional control
Group difference ANCOVA
H7 IV: Perceived value
DV: Customer loyalty
Linear relationship Regression
H8 IV: Willingness to disclose information
DV: Customer loyalty
Linear relationship Regression
87
CHAPTER 4
RESULTS AND DISCUSSION
The purpose of this study was to examine the relationships among the levels of
information sensitivity, information edit function, perceived control, privacy concern,
perceived value of a restaurant-based loyalty program, willingness to disclose and
customer loyalty. An online survey with a scenario was used to investigate these
relationships among the variables of interest. The participants were instructed to read a
scenario and complete the questionnaire. The level of information sensitivity and an
information edit scheme were manipulated to investigate the influences on and the
relationships among perceived control, privacy concern, perceived value, willingness to
disclose information and customer loyalty as shown in Figure 7.
This chapter presents the results and findings of the statistical analyses performed
to investigate the hypothesis. The analyses include descriptive statistics, correlation
analysis, one-way ANOVA, and multiple regression analysis. The results and findings of
this study provide restaurant industry researchers and managers information about
customers’ willingness to disclose and its relationships with the antecedents.
88
Figure 7. Conceptual model of willingness to disclose information disclosure and its
relationship among information sensitivity, privacy concern, perceived value, perceived
control and customer loyalty.
Note. Parallelograms indicate control variables.
Manipulation Check
One-way ANOVA was conducted to examine the effect of the experimental
treatment, the information sensitivity, and a chi-square test was conducted to examine the
effect of the information edit function. More specifically, if the information sensitivity
manipulation is effective, the perceived sensitivity level of the information items would
vary between the group exposed to the high sensitivity information condition (HighSens)
and the group exposed to the low sensitivity information condition (LowSens). Also, if
the information edit function manipulation is effective, the responses to the question
89
asking the presence of the information edit function in the scenario would be different
between the group exposed to the presence condition (PresFn) and the group exposed to
the absence condition (AbsFn).
From the analysis, the perceived sensitivity level of the information items varied
significantly between the groups as shown in Tables 18 and 19. Also, the difference in
the responses between the two groups was found as shown in Table 20.
Table 18. Descriptive statistics of the perceived sensitivity level of the information items.
N M SD
Perceived sensitivity from the high sensitivity
information item condition group
151 4.78 1.28
Perceived sensitivity from the low sensitivity
information item condition group
149 2.34 1.28
Note. Scale (1 = not sensitive at all, 7 = very sensitive).
Table 19. Analysis of variance for the perceived sensitivity level of the information
items.
Source SS df MS F p
Between groups 445.41 1 445.41 270.45** .000
Within groups 490.79 298 1.65
Total 936.20 299
** p < .01.
90
Table 20. Chi-square test for the information edit function manipulation and the response
to the presence of the information edit function.
Value df
Asymptotic Sig. (2-sided)
Pearson Chi-Square 16.576** 2 .000 Likelihood Ratio 64.202** 2 .000 Linear-by-Linear Association
29.341** 1 .000
N of Valid Cases 300 ** p < .01.
Reliability and Validity of the Measurement Items
Perceived Cognitive and Decisional Control
In this study, cognitive and decisional controls were measured as the components
of perceived control. Four items were used to measure cognitive and decisional control,
respectively. Reliability analyses of the measurement items were conducted and showed
commonly acceptable coefficient alphas, α = .833 for cognitive control and α = .866 for
decisional control, implying the measurement items are reliable to measure the construct
(Field, 2005).
Construct validity is the extent to which a set of measured items actually reflects
the theoretical latent construct those items are designed to measure (Hair, Black, Babin,
Anderson, & Tatham, 2006). Convergent and discriminant validity are both considered
subcategories of construct validity and variance extracted (VE) is used as a summary
indicator of convergence. A VE of .5 or higher is considered to suggest adequate
convergence while less than .5 indicates that, on average, more error remains in the items
91
than the variance explained by the latent factor structure imposed on the measure (Hair et
al., 2006). The measurement items for cognitive control showed adequate convergent
validity, VE = .60, and the items for decisional control showed also adequate convergent
validity, VE = .66.
Privacy Concern
Five items were used to measure privacy concern. The reliability analysis for the
measurement item was conducted and showed an acceptable coefficient alpha, α = .943.
Perceived Value of a Loyalty Program
Three measurement items were used to measure the perceived value of the loyalty
program. The reliability of the three items was analyzed and showed an acceptable
coefficient alpha, α = .952.
Customer Loyalty
Behavioral intent and relative attitude were used as the components of customer
loyalty. The reliability of the seven measurement items for behavioral intent showed an
acceptable coefficient alpha, α = .971 and the reliability of the four measurement items
for relative attitude also showed an acceptable coefficient alpha, α = .972. The items for
behavioral intent showed adequate convergent validity, VE = .831, and the items for
relative attitude control showed also an adequate convergent validity, VE = .900. A
summated scale was generated for customer loyalty as a multivariate measurement. A
multivariate measurement was used to represent the combined aspects of customer
loyalty in a single measure (Hair et al., 2006). The reliability of the summated scale
92
showed an acceptable coefficient alpha, α = .977 and adequate convergent validity, VE =
.856.
Descriptive Characteristics of the Respondents
Of the 1,441 invitation emails, a sample of 300 participants completed the online
survey for a response rate of 20.82%. Based on gender, 34.0 % of the participants were
male and 63.7% were female. Based on age, 71.0% were between 35 and 64 years old.
The demographics of the participants are shown in Table 21.
Table 21. Demographics of the participants.
N Percent of the total response Age Male Female No response Male Female No response
18-25 6 32 0 2.0 10.7 .0 26-34 7 21 0 2.3 7.0 .0 35-49 54 53 2 18.0 17.7 .7 50-64 28 73 3 9.3 24.3 1.0 65 and over 7 10 0 2.3 3.3 .0 No response 0 2 2 .0 .7 .7
Test of the Hypotheses
Hypothesis 1
To test Hypotheses 1 (information privacy concern is greater when high sensitive
information is requested than when low sensitive information is requested), a univariate
ANOVA was conducted. The independent variable (IV) was the information sensitivity
93
with two levels, namely high and low sensitivity, and the dependent variable (DV) was
information privacy concern.
Based on Mahalanobis distances, no outliers were detected. Then, the assumption
of normality was examine graphically with normal Q-Q plots and an acceptable
distribution was found. Also, ANOVA F test is robust to the violation of normality (Hair
et al., 2006). Homoscedasticity was checked and no violation was detected (Levene F(1,
298) = 3.634, p = .058).
Next, a univariate ANOVA was conducted to test whether or not information
sensitivity had a significant effect on privacy concern. The results indicated a significant
effect of information sensitivity on privacy concern (F(1, 298) = 16.449, p < .0001). That
is, the group that was exposed to the high sensitivity information condition (HighSens)
showed a higher privacy concern than the group that was exposed to the low sensitivity
information condition (LowSens) as shown in Table 22. The results provide support for
Hypothesis 1.
Table 22. Means and standard deviation for privacy concern by information sensitivity
level.
Information privacy concern M SD High sensitivity information requested (HighSens) 5.634 1.302 Low sensitivity information requested (LowSens) 4.971 1.526
94
Hypotheses 2a and 2b
To test Hypotheses 2a (perceived cognitive control is greater when information
edit function is present than when information edit function is absent) and 2b (perceived
decisional control is greater when information edit function is present than when
information edit function is absent), a MANOVA was conducted to examine the
differences in perceived cognitive and decisional controls between when an information
edit function was present (PresFn) and when the function was absent (AbsFn). First,
outliers were examined with Mahalanobis distances which value exceeded the critical
value of chi-square of 13.82, df =2 at p = .01. Three cases were identified and excluded
from the analysis. Next, the assumption of homoscedasticity was checked and the Box’s
test indicated that the assumption was not violated (F(3, 18980000) = 1.497, p = .213).
The MANOVA results revealed the significant differences in perceived cognitive
and decisional control between two levels of the information edit function (Wilks’ Λ =
.045, F(2, 294) = 3125, p < .0001). Then, a univariate ANOVA was conducted on each
dependent variable as a follow-up test to the MANOVA. The information edit function
had a significant effect on perceived cognitive control (F(1, 295) = 23.829, p < .0001);
the group to whom an information edit function was available showed greater perceived
cognitive control than those to whom the information edit function was not available (see
Table 23). Similarly, a information edit function had a significant effect on perceived
decisional control (F(1, 295) = 29.424, p < .0001); the group to whom an information edit
function was available showed greater perceived decisional control than those to whom
the information edit function was not available (see Table 23). Thus, Hypotheses 2a and
2b were supported.
95
Table 23. Means and standard deviation for perceived cognitive and decisional control by
information edit function.
Perceived cognitive control
Perceived decisional control
M SD M SD Presence of information edit function (PresFn)
4.659 1.210 4.446 .932
Absence of information edit function (AbsFn)
3.906 1.430 3.860 .967
Hypotheses 2c and 2d
To test Hypotheses 2c (perceived cognitive control has a negative relationship
with information privacy concern), and 2d (perceived decisional control has a negative
relationship with information privacy concern), a univariate ANCOVA was conducted. In
the ANCOVA, the independent variable was an information edit function with two levels
(i.e. presence and absence) and the dependent variable was information privacy concern
while perceived cognitive and decisional control were covariates. The relationships of
perceived cognitive and decisional control with information privacy concern were
examined in terms of the covariates in the ANCOVA.
Based on Mahalanobis distances whose value exceeded the critical value of chi-
square of 16.27, df = 3 at p = .001, three cases were detected and excluded from the
analysis. Then, the assumption of normality was examine graphically with normal Q-Q
plots and indicated an acceptable distribution. Homoscedasticity was checked and no
violation was detected (Levene F(1, 294) = 1.065, p = .303). Homogeneity of regression
96
slopes was examined with the interaction effect between the IV and the covariates on DV
and no violation was detected (F(2, 290) = 1.816, p = .165).
Next, an univariate ANCOVA was conducted to test whether or not information
privacy concern differed for the information edit function while controlling for perceived
cognitive and decisional control. The means and standard deviations are presented in
Table 24. The ANCOVA results are summarized in Table 25 and parameter estimates are
presented in Table 26.
Table 24. Means and standard deviation for information privacy concern by information
edit function level.
Information privacy concern M SD Presence of information edit function (PresFn) 5.510 1.286 Absence of information edit function (AbsFn) 5.223 1.452
Table 25. Analysis of covariance for information privacy concern by information edit
function.
Source df F Partial η2 p Information edit function 1 11.431 .038 .001** Perceived cognitive control 1 10.027 .033 .002** Perceived decisional control 1 3.496 .012 .063 Error 292
Note. ** p < .01.
97
Table 26. Parameter estimates from ANCOVA for information privacy concern.
Parameter b SE t p Perceived cognitive control -.210 .066 -3.167 .002** Perceived decisional control -.181 .097 -1.870 .063
Note. ** p < .01.
The effect of an information edit function on information privacy concern was
significant (F(1, 292) = 11.431, p = .001) and perceived cognitive control significantly
adjusted information privacy concern (F(1, 292) = 10.027, p = .002). More specifically,
perceived cognitive control had a negative effect on information privacy concern while
perceive decisional control had an insignificant effect on information privacy concern
(see Table 26). Thus, the results provide support for Hypotheses 2c while the results
failed to provide support for 2d.
While the results indicated the significant effect of an information edit function on
information privacy concern, the direction of the effect was different from what was
expected. That is, information privacy concern was greater, not lesser, when the
information edit function was present than when the information edit function was
absent. It may be because the effect of information edit function on privacy concern was
minor with partial eta-squared of .038, so an information edit function wouldn’t explain
the privacy concern. Therefore, further examination of the relationship between a
information edit function and privacy concern is required.
The interaction effect between information sensitivity and an information edit
function on privacy concern was also examined with ANCOVA where perceived
98
cognitive and decisional control were covariates. The mean of each level is presented as
shown in Figure 8. and the results indicate the insignificant interaction effect on privacy
concern (F(1, 292) =.809, p = .369). Privacy concern was found to be greatest when high
sensitive information was requested with an information edit function and least when low
sensitive information was requested without an information edit function.
Figure 8. Means for privacy concern by information sensitivity and information edit
function level.
Note. for presence of an information edit function; for absence of an information edit function.
An additional ANOVA was conducted to investigate how the effect of the
information edit function on privacy concern changes when perceived cognitive and
decisional control were not controlled for. Without these variables controlled, the effect
of the information edit function on information privacy concern was insignificant (F(1,
99
294) = 3.208, p = .074). Therefore, perceived cognitive control was required to explain
the differences in information privacy concern for the information edit function.
Hypotheses 3, 4a and 6
Structural equation modeling (SEM) was conducted to estimate the model
proposed in Hypotheses 3 (information privacy concern has a negative relationship with
perceived value of a loyalty program ), 4a (information privacy concern has a negative
relationship with willingness to disclose information ), and 6 (perceived value of a loyalty
program has a positive relationship with willingness to disclose information).
The model proposed in the hypotheses and the standardized regression weights
are presented in Figure 9. The value of standardized regression weight can be interpreted
as a regression coefficient (Byrne, 1998) and the results provide support for Hypotheses 3
with standardized regression weight = -.342, p < .0001, 4a with standardized regression
weight = -.600, p < .0001, and 6with standardized regression weight =.193, p < .0001.
The goodness-of-fit statistics are presented in Table 27. The goodness-of-fit
statistics examined include a chi-square statistic, GFI, CFI, NFI, RMSEA. The values of
GFI, CFI, NFI well exceeded the value .90 and the value of RMSEA was less than .05,
recommended by Byrne (1998). The results indicate that a perceived value – privacy
concern – willingness to disclose model provides a good fit to the data. The results also
indicate the stronger effect of privacy concern on willingness to disclose than the effect
of perceived value of a loyalty program.
100
Figure 9. Parameter estimates of perceived value – privacy concern – willingness to
disclose model.
Note. Values indicate standardized regression weights. ** Significance of regression weight at p < .01.
Table 27. Fit indices for perceived value – privacy concern – willingness to disclose
model.
χ2 p GFI CFI NFI RMSEA Model 31.345 .178 .976 .998 .989 .029
Note. GFI = goodness-of-fit index; CFI = comparative fit index; NFI = normed fit index;
RMSEA = root mean square error of approximation. From “Structural Equation
Modeling with AMOS: Basic Concepts, Applications, and Programming,” by B. M.
Byrne, 2001, Mahwah, NJ: Lawrence Erlbaum Associates.
In addition, the relationship between perceived importance of social benefits and
willingness to disclose was analyzed with a univariate ANCOVA. Based on social
penetration theory, people who assess the relationship favorably are proposed to disclose
more. Since social benefits are associated with a kind of fraternization, social benefits are
101
proposed to be associated with the assessment of the relationship more closely than
economic benefits. Therefore, although social benefits may not be obtained instantly,
those who think social benefits associated with a loyalty program to be important will
assess future rewards to be more favorable than those who think social benefits to be
unimportant. A univariate ANCOVA was used where the independent variable was the
importance of social benefits with two levels and the dependent variable was willingness
to disclose information while the importance of economic benefits was a covariate.
Participants were divided into two groups based on their responses on the
importance of social benefits associated with the loyalty program using K-Means
clustering analysis. The K-means algorithm is one of the most popular iterative descent
clustering methods and the squared Euclidean distance is used as the dissimilarity
measure (Hastie, Tibshirani, & Friedman, 2001). In K-means analysis, an initial cluster
mean is randomly assigned and the squared Euclidean distance is computed based on the
initial cluster mean. After computing the squared Euclidean distance between
observations, a new cluster mean is set and compared to the previous mean. If two means
are different, the iteration continues. The K-means iteration continues until the previous
and current cluster means become statistically same.
Two clusters were identified based on the responses on how important
participants think social benefits associated with the loyalty program. The final cluster
mean (centroid) and the number of cases in each cluster are shown in Table 28. Cluster 1
had lower means for the importance of social benefits than Cluster 2 and was categorized
as the group who responded the importance of social benefits to be high; Cluster 2 was
categorized as the group who responded the importance of social benefits to be low.
102
Table 28. Centroids and the number of cases in each cluster.
Centroid 1 2 SOCBENF 1. Company’s anticipation 2.30 5.29 SOCBENF 2. Recognition from the company 2.00 5.27 SOCBENF 3. Special attention 2.99 5.51 SOCBENF 4. Long-term relationship 3.31 5.25 N 74.00 226.00
A univariate ANCOVA was followed to examine the differences in willingness to
disclose information between the groups. An ANCOVA, rather than an ANOVA, was
conducted because the importance of economic benefits was sought to be a confound
with the importance of social benefits; thus, the importance of economic benefits was a
covariate. Based on Mahalanobis distances whose value exceeded the critical value of
chi-square of 10.83, df = 1 at p = .001, no outliers were detected. Then, the assumptions
for ANCOVA, namely normality and homoscedasticity, were checked. Although
Kolmogorov-Smirnov statistics indicated a modest violation of normality for the DV
willingness to disclose information in the group who showed the importance of social
benefits to be high (statistic = .074, df = 226, p = .004), no violation for the DV
willingness to disclose information in the group who showed the importance of social
benefits to be low (statistic = .087, df = 74, p = .200) was examined. However, due to the
robustness of F tests to the violation of normality, no transformation was made (Hair et
al., 2006). Homoscedasticity was examined with the Levene test and no violation of the
assumption was found (Levene F(1, 298) =.204, p = .652). Homogeneity of regression
103
slopes was examined with the interaction effect between the IV and the covariate on DV
and no violation was detected (F(1, 296) =.325, p = .569).
Next, an ANCOVA was conducted to test whether or not willingness to disclose
information differs for the importance of social benefits while controlling for the effect of
the importance of economic benefits. The group who responded that the importance of
social benefits was high showed greater willingness to disclose information than the
group that responded the importance of social benefits was low as shown in Table 29.
The results provide support for the proposition that willingness to disclose information is
greater when the importance of social benefits is perceived to be high than when the
importance of social benefits is perceived to be low (F(1, 297) = 11.168, p < .0001). The
results indicate the covariate, the importance of economic benefits, significantly adjusted
willingness to disclose information (F (1, 297) = 14.451, p < .0001) and had a positive
effect on willingness to disclose (b for the importance of economic benefits = .317, p <
.0001).
Table 29. Means and standard deviation for willingness to disclose information by
information edit function.
Willingness to disclose information M SD Importance of social benefits to be high 4.235 .102 Importance of social benefits to be low 3.505 .186
The results indicate that the effect of the importance of social benefits on
willingness to disclose was significant and imply that those who value social benefits
104
associated with the loyalty program more show greater willingness to disclose than those
who place a low importance on social benefits.
Hypothesis 4b
To test Hypothesis 4b (willingness to disclose information is greater when low
sensitive information is requested than when high sensitive information is requested), a
univariate ANCOVA was conducted. In the ANCOVA, the independent variable was
information sensitivity with two levels (i.e. high and low sensitivity) and the dependent
variable was willingness to disclose information while information privacy concern was a
covariate. Thus, the effect of information sensitivity on willingness to disclose was
examined while controlling for information privacy concern.
Based on Mahalanobis distances whose value exceeded the critical value of chi-
square of 13.82, df = 2 at p = .001, two cases were detected and excluded from the
analysis. Then, the assumption of normality was examine graphically with normal Q-Q
plots and indicated acceptable distribution. Homoscedasticity was checked and no
violation was detected (Levene F(1, 296) =.048, p = .827). Homogeneity of regression
slopes was examined with the interaction effect between the IV and the covariate on DV
and no violation was detected (F(1, 294) =.060, p = .807).
Next, a univariate ANCOVA was conducted to test whether or not willingness to
disclose differed for information sensitivity while controlling for information privacy
concern. The ANCOVA results are summarized in Table 31.
105
Table 30. Means and standard deviation for willingness to disclose information by
information sensitivity level.
Willingness to disclose M SD High sensitivity information requested (HighSens) 3.199 1.229 Low sensitivity information requested (LowSens) 4.951 1.396
Table 31. Analysis of covariance for willingness to disclose by information sensitivity.
Source df F Partial η2 p Information sensitivity 1 123.967 .296 .000** Information privacy concern 1 257.116 .466 .000** Error 295
Note. ** p < .01.
The effect of information sensitivity on willingness to disclose was significant
(F(1, 295) = 123.967, p < .0001); the group that was asked for low sensitive information
showed greater willingness to disclose than the group that was requested to provide high
sensitive information as shown in Table 30. Information privacy concern significantly
adjusted willingness to disclose (F(1, 295) = 257.116, p < .0001). More specifically,
information privacy concern had a negative effect on willingness to disclose information
(b = -.650, p < .0001); the negative effect was also found in the results from SEM for
Hypothesis 4a. Thus, the results provide support for Hypothesis 4b. Also, the effect of
information privacy concern (partial η2 = .466, p < .0001) was greater than the effect of
information sensitivity (partial η2 = .296, p < .0001) on willingness to disclose.
106
An additional ANOVA was conducted to examine how the effect of information
sensitivity on willingness to disclose changes if information privacy concern was not
controlled for. When information privacy concern was not controlled for, the effect of
information sensitivity on willingness to disclose was also significant (F(1, 296) =
132.182, p < .0001). Both information sensitivity and information privacy concern
accounted for 63.1% of the variance in willingness to disclose while information
sensitivity accounted for 30.9%.
Hypotheses 5a, 5b, and 5c
A univariate ANCOVA was conducted to test Hypotheses 5a (perceived cognitive
control has a positive relationship with willingness to disclose information), 5b
(perceived decisional control has a positive relationship with willingness to disclose
information), and 5c (willingness to disclose information is greater when an information
edit function is present than when an information edit function is absent). In the
ANCOVA, the independent variable was an information edit function with two levels
(i.e. presence and absence) and the dependent variable was willingness to disclose
information while perceived cognitive and decisional control were covariates. Thus, the
effect of an information edit function on willingness to disclose was examined while
controlling for perceived cognitive and decisional control.
Based on Mahalanobis distances whose value exceeded the critical value of chi-
square of 16.27, df = 3 at p = .001, two cases were detected and excluded from the
analysis. Then, the assumption of normality was examine graphically with normal Q-Q
plots and indicated acceptable distribution. Homoscedasticity was checked and no
violation was detected (Levene F(1, 296) = 1.025, p = .312). Homogeneity of regression
107
slopes was examined with the interaction effect between the IV and the covariates on DV
and no violation was detected (F(1, 292) = .838, p = .433).
Next, a univariate ANCOVA was conducted to test whether or not willingness to
disclose differed for the information edit function while controlling for perceived
cognitive and decisional control. The ANCOVA results are summarized in Table 32 and
parameter estimates are presented in Table 33.
Table 32. Analysis of covariance for willingness to disclose by information edit function.
Source df F Partial η2 p Information edit function 1 14.670 .048 .000** Perceived cognitive control 1 5.446 .018 .020* Perceived decisional control 1 8.017 .027 .005** Error 294
Note. * p < .05. ** p < .01.
Table 33. Parameter estimates from ANCOVA for willingness to disclose.
Parameter b SE t p Perceived cognitive control .176 .075 2.334 .020* Perceived decisional control .304 .108 2.831 .005**
Note. * p < .05. ** p < .01.
The effect of the information edit function on willingness to disclose was
significant (F(1, 294) = 14.670, p < .0001) and perceived cognitive and decisional control
significantly adjusted willingness to disclose (F(1, 294) = 5.446, p = .020 for perceived
cognitive control; F(1, 294) = 8.017, p = .005 for perceived decisional control). More
specifically, both perceived cognitive and decisional control had positive effects on
108
willingness to disclose information as shown in Table 33. Thus, the results provide
support for Hypotheses 5a and 5b.
Table 34. Means and standard deviation for willingness to disclose information by
information sensitivity level.
Willingness to disclose M SD Presence of information edit function (PresFn) 3.828 1.551 Absence of information edit function (AbsFn) 4.227 1.586
While the effect of the information edit function on willingness to disclose was
significant, the group to whom the information edit function was not presented showed a
greater willingness to disclose than the group to whom the information edit function was
presented as shown in Table 34. Thus, the results fail to provide support for Hypothesis
5c. While the significant positive effect of perceived control on the relationship between
the information edit function and willingness to disclose was found, the reason that
Hypothesis 5c was not supported might be because a minor portion of the variance (9%)
in willingness to disclose was explained by the independent variable and the covariate.
Also, it implies that the information edit function did not explain willingness to disclose
information well.
An additional ANOVA was conducted to examine if the significance of the effect
of the information edit function on willingness to disclose changed if perceived cognitive
and decisional control were not controlled for. When perceived cognitive and decisional
control were not controlled for, the effect of the information edit function on willingness
109
to disclose was significant (F(1, 296) = 4.817, p = .029). Thus, the results showed no
changes in the significance of the effect.
Hypothesis 7
To test Hypothesis 7 (perceived value of a loyalty program has a positive
relationship with customer loyalty), a linear regression analysis was conducted where
perceived value of a loyalty program was the IV and customer loyalty was the DV. First,
outliers were examined with Mahalanobis distances which value exceeded the critical
value of chi-square of 13.82, df =2 at p = .01. One case was identified and excluded from
the analysis. Next, the assumptions of linearity, homoscedasticity and normality of
residuals were checked and no assumptions were violated. The assumption of
independent errors was not violated based on Durbin-Watson statistics (1.895), as a value
close to two indicates the assumption is met (Field, 2005).
Based on the results from the analysis, perceived value of a loyalty program
accounted for 78% of the variance in customer loyalty (R2 = .780, F(1, 297) = 1056.072,
p < .0001). The regression coefficient of perceived value of a loyalty program on
customer loyalty has a significant positive value as shown in Table 35. The results
provide support for Hypothesis 7.
Table 35. Regression coefficients for perceived value on customer loyalty.
B SE B β
Constant .354 .131
Perceived value of a loyalty program .841 .026 .883**
Note. R2 = .780 (p < .0001). ** p < .01.
110
Hypothesis 8
To test Hypothesis 8 (willingness to disclose information has a positive
relationship with customer loyalty), a linear regression analysis was conducted where
willingness to disclose information was the IV and customer loyalty was the DV. First,
outliers were examined with Mahalanobis distances which value exceeded the critical
value of chi-square of 13.82, df =2 at p = .01. No outlier was detected. Next, the
assumptions of linearity, homoscedasticity and normality of residuals were checked and
no assumptions were violated. The assumption of independent errors was not violated
based on Durbin-Watson statistics (1.975), as a value close to two indicates the
assumption is met (Field, 2005).
Based on the results from the analysis, willingness to disclose information
accounted for 14% of the variance in customer loyalty (R2 = .143, F(1, 298) = 49.586, p <
.0001). The regression coefficient of willingness to disclose information on customer
loyalty has a significant positive value as shown in Table 36. Thus, the results provided
support for Hypothesis 8.
Table 36. Regression coefficients for willingness to disclose information on customer
loyalty.
B SE B β
Constant 3.257 .186
Willingness to disclose information .301 .043 .378**
Note. R2 = .143 (p < .0001). ** p < .01.
Based on the findings from the tests of Hypotheses 6, 7, and 8, a multiple
regression analysis was conducted to examine the relationship of customer loyalty with
111
perceived value of a loyalty program and willingness to disclose information; perceived
value of a loyalty program and willingness to disclose were the IVs and customer loyalty
was the DV.
First, outliers were examined with Mahalanobis distances which value exceeded
the critical value of chi-square of 16.27, df =3 at p = .01. One case was identified and
excluded from the analysis. Next, linearity and homoscedasticity were checked with the
scatter plot of residual and predicted values and normality of residuals was checked with
the normal P-P plot of regression standardized residual and histograms. No assumptions
were violated. Then, multicollinearity was checked with the correlations among the
independent variables. The correlation of .80 or above indicates multicollinearity (Field,
2005) and no such high correlations were found as shown in Table 37.
A forced entry multiple regression was conducted to determine the influence of
perceived value of a loyalty program and willingness to disclose on customer loyalty as
shown in Table 38. Based on the results from the analysis, the regression coefficient of
perceived value of a loyalty program was significant (β = .869, p < .0001) while the
regression coefficient of willingness to disclose was not significant (β = .036, p = .224).
The difference in the variance explained between the model with perceived value of a
loyalty program and willingness to disclose (R2 = .782, F(2, 296) = 529.634, p < .0001)
and the mode with perceived value was 0.2% (R2 = .782, F(2, 296) = 529.634, p < .0001).
Thus, the variance explained by willingness to disclose was minimal.
While willingness to disclose had a significant positive influence on customer
loyalty when only willingness to disclose was taken into account (R2 = .143, F(1, 298) =
49.586, p < .0001), its effect on customer loyalty became insignificant when both
112
perceived value of a loyalty program and willingness to disclose were taken into account.
It might be because the effect of perceived value of a loyalty program (β = .883, p < .001)
was stronger than that of willingness to disclose (β = .378, p < .001) on customer loyalty,
so the effect of willingness became insignificant when both variables were included
simultaneously.
Table 37. Measurement items correlations among perceived value of a loyalty program,
willingness to disclose (IVs) and customer loyalty (DV).
1 2 3 Customer loyalty (1) 1.000 Perceived value of a loyalty program (2) .883** 1.000 Willingness to disclose information (3) .378** .393** 1.000
** p < .01.
Table 38. Regression coefficients for perceived value of a loyalty program and
willingness to disclose information on privacy concern.
B SE B β
Constant .303 .138
Perceived value of a loyalty program .828 .028 .869** Willingness to disclose information .029 .024 .036
Note. R2 = .782 (p < .0001). ** p < .01.
113
Summary
The hypotheses were analyzed with various techniques such as univariate
ANOVA, ANCOVA, MANOVA, linear and multiple regression analyses and SEM. The
hypotheses and the results are summarized in Table 39.
Table 39. Summary of the hypotheses and the results from the statistical analyses.
Hypothesis Result H1: Information privacy concern is greater when high
sensitive information is requested than when low sensitive information is requested.
Supported
H2a: Perceived cognitive control is greater when an information edit function is present than when an information edit function is absent.
Supported
H2b: Perceived decisional control is greater when an information edit function is present than when an information edit function is absent.
Supported
H2c: Perceived cognitive control has a negative relationship with information privacy concern.
Supported
H2d: Perceived decisional control has a negative relationship with information privacy concern.
Not supported
H3: Information privacy concern has a negative relationship with perceived value of a loyalty program.
Supported
H4a: Information privacy concern has a negative relationship with willingness to disclose information.
Supported
H4b: Willingness to disclose information is greater when low sensitive information is requested than when high sensitive information is requested.
Supported
114
Table 39 (continued). Summary of the hypotheses and the results from the statistical
analyses.
Hypothesis Result H5a: Perceived cognitive control has a positive relationship
with willingness to disclose information.
Supported
H5b: Perceived decisional control has a positive relationship with willingness to disclose information.
Supported
H5c: Willingness to disclose information is greater when an information edit function is present than when an information edit function is absent.
Not supported
H6: Perceived value of a loyalty program has a positive relationship with willingness to disclose information.
Supported
H7: Perceived value of a loyalty program has a positive relationship with customer loyalty.
Supported
H8: Willingness to disclose information has a positive relationship with customer loyalty.
Supported
115
CHAPTER 5
SUMMARY, CONCLUSIONS, IMPLICATIONS, AND RECOMMENDATIONS
Introduction
The objective of customer relationship management is to retain customers by way
of various approaches such as customer recognition, customization and individualization
(Dyche, 2002; Fitzgibbon & White, 2005). Companies can tailor service to customers by
learning about the specific characteristics and requirements of individual customers based
on the data captured (Berry, 1983). Thus, the CRM approaches are dependent on a
customer database, which consists of transaction-based and disclosure-based data (Berry,
1983; Norberg & Dholakia, 2004). Disclosure-based data refer to data that are typically
related to internal beliefs and attitudes and are not usually collected on completion of a
commercial transaction. Disclosure-based data cannot be obtained unless customers
choose to supply the information.
This dissertation examined customers’ willingness to disclose in a restaurant
loyalty program context and the relationship to customer loyalty (i.e. behavioral intent
and relative attitude). The antecedents of customers’ willingness to disclose included
information privacy concern, perceived value of a loyalty program, and perceived
cognitive and decisional control over the companies’ use of customer information. The
effect of each antecedent on willingness to disclose was investigated through
manipulation of information sensitivity level and the availability of an information edit
function.
116
This chapter first summarizes the key findings of the results and discusses these
results. Next, the conclusions and implications based on these results are provided.
Finally, limitations and recommendations for future research are presented.
Summary of the Findings
The purpose of this study was to examine the relationship between willingness to
disclose and customer loyalty in a restaurant loyalty program, the role of privacy concern
and perceived value of a loyalty program in customers’ willingness to disclose, the effect
of information sensitivity and the availability of an information edit function, and the
relationship between perceived control and privacy concern. An online survey was
conducted and 300 participants completed the survey. The techniques for the data
analysis included univariate ANOVA, ANCOVA, MANOVA, linear and multiple
regression analyses and SEM. The results provided support for all hypotheses except H2d
and H5c as shown in Figure 10.
117
Figure 10. Summary of the results from the hypotheses tests.
Results from a univariate ANOVA indicated that the group that was exposed to
the high sensitivity information condition showed higher privacy concern than the group
that was exposed to the low sensitivity information condition and provided support for
Hypothesis 1 (privacy concern is higher when high sensitive information is requested
than when low sensitive information is requested) (F(1, 298) = 16.449, p < .0001). It can
be interpreted as participants became worried about the company’s use of information
when information related to greater emotion intensity and monetary value was asked than
when information related to lower emotion intensity and monetary value was asked.
Perceived control was found to differ between the group that was offered an
information edit function (PresFn) and the group that did not have an information edit
function (AbsFn). When an information edit function was present, respondents perceived
greater cognitive and decisional control than when an information edit function was
absent. The results provided support for Hypotheses 2a (perceived cognitive control is
118
greater when information edit function is present than when information edit function is
absent) (F(1, 295) = 23.829, p < .0001) and 2b (perceived decisional control is greater
when information edit function is present than when information edit function is absent)
(F(1, 295) = 29.424, p < .0001).
Perceived cognitive control was found to have a significant negative relationship
with information privacy concern while perceived decisional control had no significant
relationship; the results provided support for Hypothesis 2c (perceived cognitive control
has a negative relationship with information privacy concern) (F(1, 292) = 10.027, p =
.002; b = -.210, p = .002). It can be interpreted that respondents were less concerned
about information privacy when they perceived cognitive control.
SEM was conducted to test a privacy concern – perceived value of a loyalty
program – willingness to disclose model. The results showed that privacy concern had a
stronger effect on willingness to disclose than perceived value of a loyalty program did.
Based on the standardized regression coefficients, the results provided support for
Hypotheses 3 (information privacy concern has a negative relationship with perceived
value of a loyalty program), 4a (information privacy concern has a negative relationship
with willingness to disclose information), and 6 (perceived value of a loyalty program has
a positive relationship with willingness to disclose information). An additional analysis to
test the relationship between perceived importance of social benefits and willingness to
disclose showed that those who thought that social benefits are important were more
willing to disclose than those who thought that social benefits are less important.
The group from whom low sensitive information was requested to disclose
(LowSens) was found to have greater willingness to disclose than the group from whom
119
high sensitive information was requested (HighSens) and provided support for
Hypothesis 4b (willingness to disclose information is greater when low sensitive
information is requested than when high sensitive information is requested) (F(1, 295) =
123.967, p < .0001). The relationships of perceived cognitive and decisional control with
willingness to disclose were analyzed with ANCOVA and the results provided support
for Hypothesis 5a (perceived cognitive control has a positive relationship with
willingness to disclose information) (F(1, 294) = 5.446, p = .020; b = .176) and 5b
(perceived decisional control has a positive relationship with willingness to disclose
information) (F(1, 294) = 8.017, p = .005; b = .304). It implies that participants who
perceived cognitive or decisional control were more willing to disclose information than
those who did not. The results from ANCOVA failed to provide support for Hypothesis
5c (willingness to disclose information is greater when information edit function is
present than when information edit function is absent).
Hypotheses 7 (perceived value has a positive relationship with customer loyalty)
(R2 = .780, F(1, 297) = 1056.072, p < .0001; β = .883) and 8 (willingness to disclose
information has a positive relationship with customer loyalty) (R2 = .143, F(1, 298) =
49.586, p < .0001; β = .373) were supported based on regression analysis results. It
implies that the more value is perceived, the greater customer loyalty is; the more willing
to disclose, the greater customer loyalty is.
120
Discussion
Determinants of Customer Loyalty: Perceived Value of a Loyalty Program and
Willingness to Disclose
Customer loyalty in this study refers to behavioral intent and relative attitude
toward a restaurant. Perceived value of a loyalty program was found to account for
significant variance in customer loyalty (R2 = .780, F(1, 297) = 1056.072, p < .0001), and
willingness to disclose was found to account for significant variance in customer loyalty
(R2 = .143, F(1, 298) = 49.586, p < .0001). More specifically, customer loyalty was found
to have a positive relationship with perceived value of a loyalty program, and willingness
to disclose, respectively. The positive relationship between the perceived value of a
loyalty program and customer loyalty is consistent with the findings in previous research
on perceived value and customer loyalty (or behavioral intent) (Brady et al., 2005;
Parasuraman & Grewal, 2000; Yi & Jeon, 2003); customers’ perceived value of a product
or service is a determinant of customer loyalty. However, the difference between
previous research and this study is that perceived value in previous studies is a subjective
assessment of a focal product or service after customers experienced the product or
service while perceived value in this study is a subjective assessment of a loyalty
program that is additive to a focal product or service; moreover, customers haven’t
experienced the loyalty program in this study.
The significance of this study is in the examination of a relationship between
willingness to disclose and customer loyalty (i.e. behavioral intent and relative attitude)
since little research was found on the relationship; previous research examined a
121
relationship between attitudes toward companies’ use of customer information and
purchase (or behavioral) intent (Culnan, 1993; Phelps, Nowak, & Ferrell, 2000).
However, the findings indicate willingness to disclose had no significant
accountability for the variance in customer loyalty when both perceived value of a loyalty
program and willingness to disclose were taken into account. The reason that willingness
to disclose was not found to have a significant effect on customer loyalty could be
because the perceived value of a loyalty program could explain the majority of the
variance in customer loyalty (i.e. 78.0%) and the addition of willingness to disclose might
not provide significant accountability. However, the predictability of customer loyalty
with two variables (i.e. perceived value of a loyalty program and willingness to disclose)
is greater than the predictability with one variable (i.e. perceived value of a loyalty
program).
Information Sensitivity, Privacy Concern, and Willingness to Disclose
Two levels of information sensitivity (high and low) were used to examine the
differences in privacy concern and willingness to disclose rather than a positive or
negative relationship between sensitivity and other factors (i.e. privacy concern and
willingness to disclose). The sensitivity level of 29 items was determined after a pilot
test. Of the 29 items, six items were believed to have high sensitivity and six items were
placed in a low sensitivity group; the rest of the items were excluded from the study.
The results indicate the effect of information sensitivity on privacy concern and
the effect of privacy concern on willingness to disclose to be significant. More
specifically, customers’ privacy concern was greater when high sensitive information was
requested than when low sensitive information was requested; customers’ privacy
122
concern had a negative relationship with willingness to disclose information. Thus,
customer loyalty is affected by information sensitivity and privacy concern with the link
to the positive relationship of willingness to disclose.
While some types of data were found to be more sensitive than others (e.g.
telephone number is more sensitive than email) (Culnan, 1993) and willingness to
disclose information was found to vary among the type of information (e.g. demographic,
lifestyle, and financial information) (Phelps et al., 2000), the findings in previous
research are inconclusive. For example, a greater willingness to disclose was found in
demographic information followed by lifestyle and financial information (Phelps et al.,
2000) while a greater information privacy concern about sharing lifestyle and medical
information with another company was found (Culnan, 1993). These studies did not show
whether or not the connection between willingness to disclose and customers’ privacy
concern exists. The finding about the relationship between customers’ privacy concern
and willingness to disclose is consistent with a previous study where the relationship was
examined in a web site context (Nam, Song, Lee, & Park, 2005). Thus, the findings from
this study can provide connections among information sensitivity, privacy concern and
willingness to disclose.
Information Edit Function, Perceived Control, and Willingness to Disclose
In addition to the effect of information privacy concern, the results show the
effect of perceived control (i.e. perceived cognitive and decisional control) on willingness
to disclose to be significant. That is, the greater control customers perceive, the more
willing they are to disclose and the greater customer loyalty they show.
123
The presence of an information edit function (i.e. an option to edit, show, hide or
view) was proposed to be related to perceived control. In e-commerce, customers are
provided with an opt-in option as a way to give customers more control over their
personal information (Winer, 2001) and an information edit function was proposed to
have a similar role to the options in a restaurant loyalty program context. The results are
consistent with previous research (Winer, 2001) and indicate that the presence of an
information edit function had the same effect as the opt-in option; perceived cognitive
and decisional control were greater with an information edit function than without the
function.
The positive relationship of perceived control with willingness to disclose and
customer loyalty was found to be consistent with the findings in previous research (Hui &
Bateson, 1991; Povey, Conner, Sparks, James, & Shepherd, 2000); a positive relationship
of perceived control was found to be significant with behavioral intent such as
completion of shopping and food intake. Thus, the presence of an information edit
function influences perceived control, and perceived control is predictive of willingness
to disclose and customer loyalty.
While willingness to disclose was proposed to be greater with an information edit
function than without the function, the current results are opposite to the proposition;
greater willingness to disclose was found when an information edit function was absent.
Such results might imply that another moderate (or mediator) exists between an
information edit function and willingness to disclose.
The weak effects of the information edit function might support a possible
moderator. Based on the partial eta-squared value, 7.5% of the variance in perceived
124
control and 9.1% of the variance in perceived decisional control were explained by the
information edit function. Compared to 46.6% of the variance in willingness to disclose
explained by privacy concern, 1.8% of the variance in willingness to disclose was
explained by perceived cognitive control and 2.7% by perceived decisional control. Such
small effect sizes (or small partial eta-squared values) imply that the manipulation of the
information edit function was not effective to explain the variance in willingness to
disclose information and possible existence of another moderator (or mediator) between
an information edit function and willingness to disclose.
Thus, a moderator such as awareness might exist between an information edit
function and willingness to disclose. Customers may not be aware of the company’s
request for information until an information edit function is present (Norberg &
Dholakia, 2004; Olivero & Lunt, 2004). Awareness of the company’s request for
information might heighten negative emotion or the feeling of suspicion when an
information edit function is present, and consequently, customers become less willing to
disclose (Hu & Dinev, 2005). Thus, customers’ awareness of the company’s request for
personal information may be greater when an information edit function is present than
when an information edit function is absent.
Privacy Concern, Perceived Value, and Willingness to Disclose
While perceived value of a loyalty program was found to be a determinant of
customer loyalty, perceived value was also found to have a positive influence on
willingness to disclose. That is, the more value customers perceive, the more willing they
are to disclose, and the greater customer loyalty they show. Also, customers’ privacy
concern was found to have a negative influence on perceived value of a loyalty program
125
and willingness to disclose information. That is, the less concerned customers are about
information privacy, the more value they perceive and consequently the greater
willingness to disclose and customer loyalty they show.
The findings about the negative relationship between privacy concern and
perceived value of a loyalty program imply that privacy concern might play a role as
perceived costs in the subjective assessment of benefits and costs associated with a
loyalty program. While previous research proposed that willingness to disclose
information is dependent on perceived benefits and costs associated with information
disclosure (Franzak, Pitta, & Fritsche, 2001; Lee, Im, & Taylor, 2008), this study
examined willingness to disclose with respect to perceived benefits and costs associated
with a loyalty program. The results indicate that customers’ willingness to disclose is
dependent on the assessment of perceived benefits and costs associated with a loyalty
program.
In addition, the relationship between the importance of social benefits and
willingness to disclose was examined and the results indicate a significant effect of
importance of social benefits on willingness to disclose information (F(1, 297) = 11.168,
p < .0001). Based on social penetration theory, people who assess the relationship
favorably are proposed to disclose more. Perceived benefits increase when something that
is perceived to be important is added to the product or service (Ravald & Gronroos,
1996). Therefore, when a certain benefit is provided in a loyalty program, those who
perceive the benefit to be important will perceive the loyalty program to be more
beneficial than those who think the benefit is trivial. Since the social benefits are
associated with fraternization and relationship (e.g. personal recognition, and extra
126
attention), those who place a high importance on social benefits will assess the
relationship with the company to be more favorable than those who place a low
importance on social benefits in a restaurant loyalty program.
Conclusions and Implications
The most significant findings of this study were 1) customers’ willingness to
disclose and perceived value of a loyalty program are the determinants of customer
loyalty (i.e. behavioral intent and relative attitude); 2) willingness to disclose is affected
by perceived control (i.e. perceived cognitive and decisional control), privacy concern
and perceived value of a loyalty program; 3) privacy concern is affected by the sensitivity
level of information and perceived cognitive control; and 4) perceived value of a loyalty
program is affected by information privacy concern.
Based on Winer’s seven-step CRM model (2001), the construction of a customer
database is a necessary first step to a complete CRM solution which aims for customer
retention by establishing long-term relationships. Companies practicing CRM establish
long-term relationships by way of various approaches such as customer recognition,
customization and individualization, and such approaches can be more precisely tailored
to customers by learning about customers based on the customer database. Thus, a
customer database provides a basis of a long-term relationship between customers and
companies.
Customer loyalty (i.e. behavioral intent and relative attitude) was examined with
respect to customers’ willingness to disclose and perceived value of a loyalty program in
a restaurant loyalty program context. Willingness to disclose and perceived value of a
127
loyalty program, respectively, were found to be predictive of customer loyalty. The
findings imply that participants who are more willing to disclose might show greater
customer loyalty, and that participants who perceive more value of a loyalty program
might show greater customer loyalty to the restaurant.
Customers’ willingness to disclose was found to be affected by perceived control,
privacy concern and perceived value of a loyalty program. The findings imply that an
increment in perceived control led to a decrement in privacy concern, which led to an
increment in perceived value of a loyalty program, which led to an increment in
willingness to disclose, and consequently increased customer loyalty. The availability of
an information edit function affects perceived control; greater perceived cognitive and
decisional control occurred with an information edit function than without the function.
Privacy concern was found to be affected by the sensitivity level of information.
While it is suggested to include an information type factor in personal information
disclosure in marketing settings (Moon, 2000; Norberg & Dholakia, 2004), the type of
information was not reflecting a situational influence (Annacker, Spiekermann, &
Strobel, 2001; Chaikin & Derlega, 1974). Therefore, information categorized based on
sensitivity level was proposed to be an alternative to the types of information (Moon,
2000; Norberg & Dholakia, 2004). This study empirically examined the usability of
information categorization based on sensitivity, and the findings support that information
sensitivity was an appropriate alternative. It was also found that the more value customers
perceive in a loyalty program, the more willing they are to disclose.
Privacy concern was also found to have a positive relationship with perceived
value of a loyalty program as well as with willingness to disclose. The findings indicate
128
that privacy concern might play a role as perceived costs in the subjective assessment of
benefits and costs associated with a loyalty program. Thus, it is important for companies
practicing CRM to lower customers’ privacy concern because privacy concern negatively
affects perceived value of a loyalty program as well as willingness to disclose
information, which positively influence customer loyalty.
The implications of the findings for restaurants are that managers can collect more
disclosure-based information in a restaurant loyalty program by controlling the sensitivity
level of information and providing a loyalty program which has a high perceived value.
Since customers’ privacy concern has a greater effect on willingness to disclose,
companies can influence customers’ privacy concern indirectly by manipulating the
information sensitivity level to increase willingness to disclose. The availability of a
policy statement assuring the fair use of personal information may decrease privacy
concern (Culnan & Armstrong, 1999).
Restaurants need to provide a loyalty program with more value to customers in
order to collect more disclosure-based information and to increase customer loyalty. The
value of a loyalty program is perceived (or subjectively assessed), so restaurants can
provide a loyalty program which increases customers’ perception of benefits or decreases
their perception of costs associated with the loyalty program. Member-exclusive benefits
which are attractive and cannot be copied will increase customers’ perception of the
value of a loyalty program. Restaurant managers can increase the value of loyalty
programs with cash value of redemption rewards, the various but relevant (to the core
service/product) redemption choices, and easy-to-use schemes (Yi & Jeon, 2003).
129
Also, restaurants may provide customers with more control over the way that
companies use personal information to collect disclosure-based information. Since
perceived cognitive and decisional control were found to have a significant positive effect
on willingness to disclose, restaurants may use various strategies to increase perceived
control such as offering various options to control over companies’ use and security of
information (e.g. Privacy Bird and Secure Sockets Layer).
It is also important for restaurants to distinguish those customers who place a high
value on social benefits from those who place a high value on economic benefits. Based
on the results, the group that placed a high value on social benefits placed a high value on
economic benefits also; it implies that it is a necessary condition for companies to
provide a loyalty program in a way that customers perceive a high value on economic
benefits. Restaurants can increase the value of a loyalty program by providing a form of
fraternization to the customers who think that social benefits are important while
providing monetary rewards or economic benefits to the customers who think social
benefits are less important.
Limitations and Recommendations for Future Research
Limitations
First, this study has a limitation on the generalizability. In spite of the advantages
of a scenario method, customers’ privacy concern, perceived control, perceived value,
willingness to disclose information and customer loyalty from an actual restaurant chain
would be different from a hypothetical restaurant chain. While trust, brand, and past
experience with the focal restaurant could be controlled for in this study by presenting a
130
hypothetical restaurant chain, customers might be more concerned about information
privacy concern in an actual loyalty program context. That is, if personal information
such as name, favorite magazine, or annual income were requested, participants would be
more concerned about information privacy.
Second, this study has a limitation on measurements of information disclosure.
While customers’ decision to disclose information would be dichotomous (i.e. to disclose
or not to disclose), the magnitude of willingness (e.g. more or less willing) was measured
in this study.
Third, the operationalization of the measurement items for perceived control can
be improved. Although the measurement items were adapted from previous studies and
the statistical analyses indicated their validity, the measurement items for perceived
cognitive control could be improved by decomposing the items into sub dimensions of
information gain and appraisal.
Fourth, the manipulations of the independent variables, information sensitivity
and an information edit function could be improved by including diverse lists of
information which vary in sensitivity and by providing more choices to edit, show, hide
and view. Two categorizations of information sensitivity had a limitation on variations in
information sensitivity. Also the lists used in this study were adapted from previous
studies (Cranor, Reagle, & Ackerman, 1999; Horne, Norberg, & Ekin, 2007; Norberg &
Dholakia, 2004; Phelps et al., 2000), and may need to be modified for a restaurant
context. While participants correctly recalled the availability of an information edit
function in the scenarios, their perceived decisional control was not significantly different
131
for the availability. This result may be because the information edit function used was not
effective to stimulate perceived cognitive and decisional control.
Recommendations for Future Research
For future research, the generalizability could be improved by recruiting
participants from a restaurant which practices CRM with a loyalty program. By doing so,
the information requested by the company would be more realistic. Although the
measurement items for perceived cognitive and decisional control were adapted from
previous studies, they need to be refined. The measurement items for perceived cognitive
and decisional control were somewhat limited in previous research.
Also, other marketing strategies to reduce privacy concern, other than providing
an information edit function, need to be examined in a restaurant loyalty context.
Additionally, further examination of an information edit function utilized in this study
and its effect on privacy concern and willingness to disclose would help to explain the
relationship between greater willingness to disclose (and greater privacy concern) and
absence of information edit function.
The order of control operation could be examined to further research on perceived
control. That is, the order in which perceived control is invoked could be examined. For
example, cognitive control may be perceived prior to decisional control. If so, an
individual who perceives cognitive control may not seek another cue to increase
decisional control; only those who do not perceive cognitive control look for a cue related
to decisional control. By understanding the order of control operation, the restaurants can
collect more disclosure-based information by effective strategies to invoke perceived
control. Consequently, the model proposed in this study can be examined by using
132
appropriate techniques such as SEM in order to explore the fitness of the model as a
whole. Also, the models with other possible paths can be compared to explore a better
fitted model than the proposed model.
Based on the findings from this study, the effect of data mining techniques on
customer loyalty can be examined. Customers who are willing to disclose are more likely
to receive customized service than those who are less willing because managers could
collect more information about them and use customer information for customization.
Future research can examine the effect of customized service based on disclosure-based
information on perceived value of a loyalty program and customer loyalty. Also, the
threshold of information (e.g. amount and sensitivity) that is allowed to be utilized for
customization can be explored in a restaurant loyalty program context.
133
REFERENCES
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human
Decision Processes, 50(2), 179-211.
Altman, I. & Taylor, D. A. (1973). Social Penetration: The Development of Interpersonal
Relationships. New York: Holt, Rinehart and Winston.
Annacker, D., Spiekermann, S., & Strobel, M. (2001). E-privacy: Evaluating a new
search cost in online environments. Paper presented at the 14th Bled Electronic
Commerce Conference, Bled, Slovenia.
Averill, J. R. (1973). Personal control over aversive stimuli and its relationship to stress.
Psychological Bulletin, 80(4), 286-303.
Bagozzi, R. P. (1975). Marketing as Exchange. Journal of Marketing, 39(4), 32-39.
Baloglu, S. (2002). Dimensions of customer loyalty: Separating friends from well
wishers. Cornell Hotel and Restaurant Administration Quarterly, 43(1), 47-59.
Bateson, J. & Hui, M. (1992). The eclogocial validity of photographic slides and
videotapes in simulating the service setting. Journal of Consumer Research, 19(2),
271-281.
Berry, L. (1983). Emerging perspectives on service marketing. Chicago, IL.: American
Marketing Association.
Bowen, J. & Shoemaker, S. (2003). Loyalty: A strategic commitment. Cornell Hotel and
Restaurant Administration Quarterly, 44(5-6), 31-46.
Bowman, C. & Ambrosini, V. (2000). Value creation versus value capture: Towards a
coherent definition of value in strategy. British Journal of Management, 11, 1-15.
134
Brady, M. K., Knight, G. A., Cronin, J. J., Tomas, G., Hult, M., & Keillor, B. (2005).
Removing the contextual lens: A multinational, multi-setting comparison of service
evaluation models. Journal of Retailing, 81(3), 215.
Byrne, B. M. (1998). Structural Equation Modeling with LISREL, PRELIS, and
SIMPLIS: Basic Concepts, Applications, and Programming. Mahwah, NJ:
Lawrence Erlbaum Associates, Inc.
Chaikin, A. L. & Derlega, V. J. (1974). Variables affecting the appropriateness of self-
disclosure. Journal of Consulting and Clinical Psychology, 42(4), 588-593.
Chen, I. J. & Popovich, K. (2003). Understanding customer relationship management
(CRM): People, process and technology. Business Process Management Journal,
9(5), 672-688.
Christopher, M. (1982). Value-in-use pricing. European Journal of Marketing, 16(5), 35-
46.
Cigliano, J. ., Georgiadis, M., Pleasance, D., & Whalley, S. (2000). The Price of Loyalty.
The McKinsey Quarterly, 4.
Couper, M. P. (2001). Web survey research: Challenges and oppotunities. Paper
presented at the The Annual Meeting of the American Statistical Association,
Atlanta, Geogia.
Couper, M. P. (2005). Technology trends in survey data collection. Social Science
Computer Review, 23(4), 486-501.
Couper, M. P., Blair, J., & Triplett, T. (1999). A comparison of mail and e-mail for a
survey of employees in federal statistical agencies. Journal of Official Statistics,
15(1), 39-56.
135
Cozby, P. C. (1973). Self-disclosure: A literature review. Psychological Bulletin, 79(2),
73-91.
Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999). Beyond concern: Understanding net
users' attitudes about online privacy. AT&T Labs-Research Technical Report TR
99.4.3.
Culnan, M. J. (1993). 'How did they get my name?': An exploratory investigation of. MIS
Quarterly, 17(3), 341-361.
Culnan, M. J. & Armstrong, P. K. (1999). Information privacy concerns, procedural
fairness, and impersonal trust: An empirical investigation. Organization Science,
10(1), 104-115.
Dabholkar, P. A. (1996). Consumer evaluations of new technology-based self-service
options: An investigation of alternative models of service quality. International
Journal of Research in Marketing, 13(1), 29-51.
de Rijk, A. E., Le Blanc, P., M., Schaufeli, W., B., & de Jonge, J. (1998). Active coping
and need for control as moderators of the job demand-control model: Effects on
burnout. Journal of Occupational and Organizational Psychology, 71, 1-18.
Dick, A. S. & Basu, K. (1994). Customer loyalty: Toward an integrated conceptual
framework. Journal of the Academy of Marketing Science, 22(2), 99-113.
Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of price, brand, and store
information on buyers' product evaluations. Journal of Marketing Research, 28(3),
307-319.
Dyche, J. (2002). The CRM Handbook: A Business Guide to Customer Relationship
Management. New York: Addison-Wesley.
136
Faranda, W. T. (2001). A scale to measure the cognitive control form of perceived
control: Construction and preliminary assessment. Psychology & Marketing,
18(21), 1259-1281.
Field, A. (2005). Discovering Statistics Using SPSS (2nd ed.). Thousand Oaks, CA:
SAGE Publications.
Fitzgibbon, C. & White, L. (2005). The role of attitudinal loyalty in the development of
customer relationship management strategy within service firms. Journal of
Financial Services Marketing, 9(3), 214-230.
Franzak, F., Pitta, D., & Fritsche, S. (2001). Online relationships and the consumer's right
to privacy. Journal of Consumer Marketing, 18(7), 631-641.
Gordon, I. (2002). Best practices: Customer relationship management. Ivey Business
Journal, 67(1), 1-5.
Greenberg, P. (2004). CRM at the Speed of Light: Essential Customer Strategies for the
21st Century. Emeryville, CA: McGraw-Hill.
Gwinner, K. P., Gremler, D. D., & Bitner, M. J. (1998). Relational benefits in services
industries: The customer's perspective. Journal of the Academy of Marketing
Science, 26(2), 101-114.
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006).
Multivariate Data Analysis (6th ed.). Upper Saddle River, NJ: Pearson Prentice
Hall.
Hartnack, J. (1968). The concept of act and behavior. Man and World, 2, 267-277.
Hastie, T., Tibshirani, R., & Friedman, J. (2001). The Elements of Statistical Learning:
Data Mining, Inference, and Prediction. New York, NY: Springer.
137
Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information Privacy in the
Marketspace: Implications for the Commercial Uses of Anonymity on the Web. The
Information Society, 15(2), 129 - 139.
Horne, D. R., Norberg, P. A., & Ekin, A. C. (2007). Exploring consumer lying in
information-based exchanges. The Journal of Consumer Marketing, 24(2), 90-99.
Houston, F. S. & Gassenheimer, J. B. (1987). Marketing and Exchange. Journal of
Marketing, 51(4), 3-18.
Howell, A. & Conway, M. (1990). Perceived intimacy of expressed emotion. Journal of
Social Psychology, 130(0), 467-476.
Hu, Q. & Dinev, T. (2005). Is spyware an Internet nuisance or public menace?
Communications of the ACM, 48(8), 61-66.
Hughes, A. M. (2000). Strategic Database Marketing (2nd ed.). New York, NY:
McGraw-Hill.
Hui, M. K. & Bateson, J. E. G. (1991). Perceived Control and the Effects of Crowding
and Consumer Choice on the Service Experience. Journal of Consumer Research,
18(2), 174.
Jones, A., Bentler, P. M., & Petry, G. (1966). The reduction of uncertainty concerning
future pain. Journal of abnormal psychology, 71(2), 87-94.
Jourard, S. M. (1971). Self-disclosure: An Experimental Analysis of the Transparent Self.
New York: Wiley-Interscience.
Kuehl, R. O. (2000). Design of Experiments: Statistical Principles of Research Design
and Analysis (2nd ed.). Pacific Grove, CA: Duxbury Press.
138
Lacey, R. (2007). Relationship drivers of customer commitment. Journal of Marketing
Theory and Practice, 15(4), 315-333.
Lacey, R. & Sneath, J. Z. (2006). Customer loyalty programs: are they fair to consumers?
The Journal of Consumer Marketing, 23(7), 458-464.
Lacey, R., Suh, J., & Morgan, R. M. (2007). Differential Effects of Preferential
Treatment Levels on Relational Outcomes. Journal of Service Research, 9(3), 241-
256.
Lee-Kelley, L., Gilbert, D., & Mannicom, R. (2003). How e-CRM can enhance customer
loyalty. Marketing Intelligence & Planning, 21(4/5), 239-248.
Lee, D.-H., Im, S., & Taylor, C. (2008). Voluntary self-disclosure of information on the
Internet: A multimethod study of the motivations and consequences of disclosing
information on blogs. Psychology & Marketing, 25(7), 692-710.
Lefcourt, H. M. (1973). The function of the illusions of control and freedom. American
Psychologist, 28(5), 417-425.
Liu, C., Marchewka, J. T., & Ku, C. (2004). American and Taiwanese perceptions
concerning privacy, trust, and behavioral intentions in electronic commerce.
Journal of Global Information Management, 12(1), 18-40.
Lynn, M. (1991). Scarcity Effects on Value: A Quantitative Review of the Commodity
Theory Literature. Psychology & Marketing, 8(1), 43-57.
Martínez-López, F. J., Luna, P., & Martínez, F. J. (2005). Online shopping, the standard
learning hierarchy, and the consumers’ internet expertise: An American-Spanish
comparison. Internet Research, 15(3), 312-334.
139
Mathwick, C. & Rigdon, E. (2004). Play, Flow, and the Online Search Experience.
Journal of Consumer Research, 31(2), 324-332.
Mattila, A. S. (2006). How Affective Commitment Boosts Guest Loyalty (and Promotes
Frequent-guest Programs). Cornell Hotel and Restaurant Administration Quarterly,
47(2), 174-181.
Mertler, C. A. & Vannatta, R. A. (2005). Advanced and Multivariate Statistical Methods:
Practical Application and Interpretation. Glendale, CA: Pyrczak Publishing.
Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal
information privacy, and regulatory approaches. Association for Computing
Machinery. Communications of the ACM, 38(12), 65-74.
Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information Privacy: Corporate
Management and National Regulation. Organization Science, 11(1), 35-57.
Milne, G. R. & Boza, M.-E. (1999). Trust and concern in consumers' perceptions of
marketing information management practices. Journal of Interactive Marketing,
13(1), 5.
Milne, G. R. & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why
consumers read (or don't read) online privacy notices. Journal of Interactive
Marketing, 18(3), 15.
Miyazaki, A. D. & Fernandez, A. (2001). Consumer perceptions of privacy and security
risks for online shopping. The Journal of consumer affairs, 35(1), 27-44.
Monroe, K. B. & Krishnan, R. (1985). The effect of price on subjective product
evaluations. In J. Jacoby & J. C. Olson (Eds.), Perceived Quality: How Consumers
View Stores and Merchandises. (pp. 209-232). Lexington, MA: Lexington Books.
140
Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from
consumers. Journal of Consumer Research, 26(4), 323-339.
Morgan, R. M. & Hunt, S. D. (1994). The commitment-trust theory of relationship
marketing. Journal of Marketing, 58(3), 20-38.
Nam, C., Song, C., Lee, E., & Park, C. I. (2005). Consumers' privacy concnerns and
willingness to provide marketing-related personal information online. Advances in
Consumer Research, 33, 212-217.
Namasivayam, K. (2004). Action Control, Proxy Control, and Consumers' Evaluations of
the Service Exchange. Psychology & Marketing, 21(6), 463-480.
Norberg, P. A. & Dholakia, R. R. (2004). Customization, information provision and
choice: what are we willing to give up for personal service? Telematics and
Informatics, 21(2), 143-155.
Oliver, R. (1997). Satisfaction: A Behavioral Perspective on the Consumer. New York,
NY: McGraw-Hill.
Olivero, N. & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce
exchanges: The effect of risk awareness on the relative role of trust and control.
Journal of Economic Psychology, 25(2), 243-262.
Omarzu, J. (2000). A Disclosure Decision Model: Determining How and When
Individuals Will Self-Disclose. Personality and Social Psychology Review, 4(2),
174-185.
Parasuraman, A. & Grewal, D. (2000). The impact of technology on the quality-value-
loyalty chain: A research agenda. Journal of the Academy of Marketing Science,
28(1), 168-174.
141
Phelps, J., D'Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of
consumer privacy concerns: An empirical investigation. Journal of Interactive
Marketing, 15(4), 2-17.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness
to provide personal information. Journal of Public Policy & Marketing, 19(1), 27.
Povey, R., Conner, M., Sparks, P., James, R., & Shepherd, R. (2000). Application of the
theory of planned behaviour to two dietary behaviours: Roles of perceived control
and self-efficacy. British Journal of Health Psychology, 5, 121-139.
Prosser, W. L. (1960). Privacy. California Law Review, 48(3), 383-423.
Ravald, A. & Gronroos, C. (1996). The value concept and relationship marketing.
European Journal of Marketing, 30(2), 19-30.
Reichheld, F. (1996). The Loyalty Effect. Cambridge, MA: Harvard Business School
Press.
Reinartz, W. & Kumar, V. (2002). The mismanagement of customer loyalty. Harvard
Business Review, 80(7), 86-94.
Reinartz, W. J. & Kumar, V. (2000). On the profitability of long-life customers in a
noncontractual setting: An empirical investigation and implications for marketing.
Journal of Marketing, 64(4), 17-35.
Sassaroli, S. & Ruggiero, G. M. (2004). The role of stress in the association between low
self-esteem, perfectionism, and worry, and eating disorders. International Journal
of Eating Disorders, 37(2), 135-141.
142
Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and Quasi-
Experimental Designs for Generalized Causal Inference. Boston, MA: Houghton
Mifflin Company.
Shankar, V., Smith, A. K., & Rangaswamy, A. (2003). Customer satisfaction and loyalty
in online and offline environments. International Journal of Research in Marketing,
20(2), 153-175.
Skinner, E. A. (1996). A guide to constructs of control. Journal of Personality and Social
Psychology, 71(3), 549-570.
Smith, A. K., Bolton, R., & Wagner, J. (1999). A model of customer satisfaction with
service encounters involving failure and recovery. Journal of Marketing Research,
36(3), 356-372.
Smith, S. M. & Albaum, G. S. (2005). Fundamentals of Marketing Research. Thousand
Oaks, CA: Sage Publications, Inc.
Staub, E. & Kellett, D. S. (1972). Increasing pain tolerance by information about aversive
stimuli. Journal of Personality and Social Psychology, 21(2), 198-203.
Sweeney, J. & Soutar, G. (2001). Consumer perceived value: the development of a
multiple item scale. Journal of Retailing, 77, 203-220.
Van Raaij, W. F. & Pruyn, A. T., H. (1998). Customer Control and Evaluation of Service
Validity and Reliability. Psychology & Marketing, 15(8), 811-832.
W3C. (1999). JavaScript Tutorial. Retrieved May 23, 2008, from
http://www.w3schools.com/JS/default.asp
Wheeless, L. R. (1976). Self-dsiclosure and interpersonal solidarity: Measurement,
validation, and relationships. Human Communication Research, 3(1), 47-61.
143
Winer, R. S. (2001). A framework for customer relationship management. California
Management Review, 43(4), 89-107.
Yi, Y. & Jeon, H. (2003). Effects of loyalty programs on value perception, program
loyalty, and brand loyalty. Journal of the Academy of Marketing Science, 31(3),
229-240.
Zeithaml, V. (1988). Consumer perceptions of price, quality and value: A means-end
model and synthesis of evidence. Journal of Marketing, 52(3), 2-22.
Zimbardo, P. G. (1969). The human choice: Individuation, reason, and order versus
deinidividualization, impulse, and class. Nebraska Symposium on Motivation: 1969.
144
APPENDIX A
Definition of Terms.
1. Customer loyalty. Customer loyalty consists of two dimensions, namely,
behavior and attitude. Behavioral loyalty is defined as repeated purchases of particular
products or service while attitudinal loyalty is defined as a customer’s attitudinal
commitment to the brand or company with repeated purchases (Baloglu, 2002; Dick &
Basu, 1994; Fitzgibbon & White, 2005; Yi & Jeon, 2003). Customer loyalty in this study
refers to behavioral intent (e.g. intent to purchase or visit) and relative attitude (e.g.
commitment to continuing the relationship with the company) toward the company.
2. Information disclosure. The act of revealing personal information to others
(Jourard, 1971). Self-disclosure and information disclosure were used interchangeably in
this study. Information disclosure in this study was operationalized as customers’
willingness to release requested information when they decide to join a loyalty program.
3. Information edit function. An information edit function refers to an option to
edit, hide, show and view personal information available from a loyalty program and was
manipulated at two levels: presence and absence.
4. Information sensitivity. Information items requested associated with a loyalty
program are categorized based on information sensitivity. Information sensitivity refers
to comprehensive information characteristics that amalgamate emotion intensity and
monetary value aspects (Moon, 2000; Norberg & Dholakia, 2004). For example,
information items which have greater emotion intensity and monetary value are high
145
sensitive information. Information sensitivity was manipulated at two levels: high and
low sensitivity information.
5. Preferential treatment. Rewards and benefits associated with a loyalty program.
Preferential treatment is classified as economic or social benefits. Economic benefits
describe the monetary enticements and examples include having quicker service, better
price / discount, time saving, and redeemable reward points. Social benefits describe
fraternization and other benefits from a relationship with the organization and examples
include the company’s anticipation of customers’ service and menu needs, recognition
from the company, special attention, long-term relationship with the company (Gwinner,
Gremler, & Bitner, 1998; Lacey, 2007).
6. Privacy concern. The level of customer anxiety for the way that personal
information is used by companies (Phelps, D'Souza, & Nowak, 2001). Four underlying
dimensions of privacy concern include collection, unauthorized secondary use, errors and
improper access of personal information (Milberg, Burke, Smith, & Kallman, 1995).
7. Perceived control. While Averill (1973) proposed a three dimensional
perceived control, namely, behavioral, cognitive and decisional control, perceived control
in the proposed study will be identified as cognitive and decisional control. Based on
Averill (1973), cognitive control describes the way to interpret a potentially harful event,
and it is obtained by processing potentially threatening information in a way to reduce
stress. Decisional control refers to the range of choice or number of options available.
8. Perceived value of a loyalty program. A subjective assessment of the trade-off
between benefits and costs associate with a loyalty program (Christopher, 1982;
Zeithaml, 1988). The benefit components of perceived value include salient intrinsic and
146
extrinsic attributes, and other relevant abstractions such as discount, tailored service and
other rewards. The cost components of perceived value include monetary and
nonmonetary costs such as price (e.g. price to purchase a reward card), effort (e.g.
presentation of a card to a cashier, and personal information disclosure) and other
resources.
156
APPENDIX C
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire.
157
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
158
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
159
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
160
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
161
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
162
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
163
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
164
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
165
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
166
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
167
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
168
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
169
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
170
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
171
Screen Captures of High Sensitive and Presence of Information Edit Function
Questionnaire (continued).
172
APPENDIX D
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire.
173
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
174
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
175
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
176
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
177
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
178
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
179
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
180
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
181
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
182
Screen Captures of Low Sensitive and Absence of Information Edit Function
Questionnaire (continued).
VITA
HEE SEOK LEE
EDUCATION
Ph.D., Hotel, Restaurant and Institutional Management, Penn State University, 2008.
M.S., Hospitality Business, Michigan State University, 2004.
B.S., Tourism, Hanyang Univerisity, Seoul, Korea, 1998.
WORK EXPERIENCE
F&B Coordinator, F&B Office, Seoul Hilton Hotel, 1999 - 2000.
Management Trainee, F&B Department, Seoul Hilton Hotel, 1998 - 1998.
HONORS AND AWARDS
Sung and Fumi Lee Scholarship for Outstanding Graduate Students, The
Pennsylvania State University, 2007 - 2008.
Fellowship, Michigan State University, 2003 - 2004.
Full Scholarship, Hanyang University, Seoul, Korea, 1991 - 1998.