Saura Et Al
Saura Et Al
Review
A R T I C L E I N F O A B S T R A C T
Keywords: In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development
User-generated data of new products and business models in the digital market. However, these advances have given rise to the
Data-driven innovation development of sophisticated strategies for data management, predicting user behavior, or analyzing their ac
Users’ privacy
tions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy
Privacy concerns
concerns about how companies manage user data. Although there are some studies on data security, privacy
protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI
as main concepts is lacking. Therefore, the present study aims to provide a comprehensive understanding of the
main challenges related to user privacy that affect DDI. The methodology used in the present study unfolds in the
following three phases; (i) a systematic literature review (SLR); (ii) in-depth interviews framed in the perspec
tives of UGD and DDI on user privacy concerns, and finally, (iii) topic-modeling using a Latent Dirichlet allo
cation (LDA) model to extract insights related to the object of study. Based on the results, we identify 14 topics
related to the study of DDI and UGD strategies. In addition, 14 future research questions and 7 research prop
ositions are presented that should be consider for the study of UGD, DDI and user privacy in digital markets. The
paper concludes with an important discussion regarding the role of user privacy in DDI in digital markets.
* Corresponding author.
E-mail addresses: [email protected] (J.R. Saura), [email protected] (D. Ribeiro-Soriano), [email protected] (D. Palacios-Marqués).
https://doi.org/10.1016/j.ijinfomgt.2021.102331
Received 24 November 2020; Received in revised form 7 February 2021; Accepted 8 February 2021
Available online 19 February 2021
0268-4012/© 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
large amounts of data (Ferreira & Teixeira, 2019). All these approaches Table 1
are contextualized under the concept of Big Data Analytics (BDA). Theories of user-generated data production in digital markets.
In the framework of BDA and UGD, companies are developing stra Description Authors
tegies focused on increasing their profitability in the digital markets.
Critical-mass This theory posits that, provided Prasarnphanich and
Yet, these strategies can lead to concerns regarding user privacy (e.g., theory there is a sufficiently high number of Wagner (2009)
Arya et al., 2019; Zuboff, 2015). This occurs because, rather than relying supporters of an idea, technology, Peng (2010)
on functionality, useful information architecture, or user experience innovation, or social system, the Sledgianowski and
while maintaining an ethical design, companies prioritize their eco adoption of this idea, technology, Kulviwat (2009)
etc. will be self-sustaining and will
nomic objectives (Bandara, Fernando, & Akter, 2020; Zuboff, 2019). cause its growth.
Since users may not be aware of being manipulated in digital markets Information According to this theory, when a Kaufhold et al. (2020)
through advertising, design of information architectures, or prediction overload large amount of input into a digital Ndumu (2019)
of behavior, several previous studies have highlighted the importance of theory system exceeds its capacity for data Saxena and Lamest
processing, the information overload (2018)
concepts such as surveillance capitalism or ethical design in social net
will lead to worse decisions, as the Allen and Shoard
works (Zuboff, 2019). These approaches are usually designed by DDI cognitive processing capacity is (2005)
that companies test in their digital ecosystems (Pangrazio & Selwyn, limited.
2019). Common-ground This theory argued that the overlap Keller et al. (2017)
In surveillance capitalism, privacy of users and their data in digital theory between different opinions and Westerman et al.
positions on a subject may lead to (2014)
environments must prevail over the economic interests of large tech disagreements. In digital markets, Schoen et al. (2013)
nological multinationals and governments (Roberts, 2015). The ethical this phenomenon leads to the Wohn, Lee, Sung, and
design in digital environments should be a priority for companies. In this appearance of large amounts of data Bjornrud (2010)
respect, Hawi and Samaha (2017) demonstrated that companies can use with segmented feelings and
personalities.
data to benefit from users economically (González, 2017).
Companies use both DDI and BDA to innovate in their analytical Source: The authors.
development strategies, in an attempt to identify patterns in large da
tabases generated by user actions and to improve their decision making. • To create knowledge about the use of UGD in DDI preserving user
With these BDA analyses, companies modify the information structure of privacy
their sites, thereby increasing the possibility of achieving engagement as • To provide future guidelines to track the challenges of DDI with re
a key part of the interaction and data generation between users and the gard to privacy
company (Isaak & Hanna, 2018).
Many previous studies have highlighted the link between new In terms of methodology, the approach adopted in the present study
products and services focused on DDI and user privacy (Zuboff, 2015; unfolds in the following three steps. First, we undertake a systematic
Arya et al., 2019). Sometimes users are not aware that, as a result of their literature review (SLR). Second, based on its findings, we conduct in-
actions online (IoT, mobile devices, social media profiles, mobile ap depth interviews with leading professionals of the IT industry. Thirdly
plications, etc.), they are generating data that can be later used by and finally, we employ a Latent Dirichlet allocation (LDA) model and a
companies to gain economic benefit (Paine, Reips, Stieger, Joinson, & textual analysis (TA) to extract insights relative to the object of study
Buchanan, 2007). If these datasets are studied using Artificial Intelli using keyness as a statistical measure that values the log-likelihood score
gence, machine learning, deep learning, or BDA (Kar & Dwivedi, 2020), of the results. Based on the results, we identify a total of 14 topics related
it will be possible to considerably better predict user actions, which to the study of DDI and UGD strategies. Furthermore, 14 future research
would also enhance the risk of user privacy violations in digital eco questions and 7 research propositions are identified that must be taken
systems (Gutierrez, O’Leary, Rana, Dwivedi, & Calle, 2019). Despite the into account in future analysis strategies focused on the use of UGD, DDI,
growing concerns about user security and privacy, more and more data considering the user privacy in digital markets. The paper concludes
are generated, and users continue to share information, create content, with an important discussion regarding the role of user privacy in DDI in
and spread their messages and opinions on the Internet (Baird & Fisher, digital markets.
2005). In addition, the emergence of DDI models and strategies to track The remainder of this paper is structured as follows. In Section 2, we
user data (predictive algorithms, machine-learning, cookies, beacons, present the theoretical framework of the study. Section 3 discusses the
etc.) has led to the emergence of databases that, instead of collecting methodology. The results are reported in Section 4. In Section 5, we
content, gather behavioral data of users in digital markets. This type of provide a discussion of important theoretical contributions that our re
content is known as User-Generated Behavior (UGB) (Netzer, sults offer for the analysis of DDI in digital markets with respect to
Tenenboim-Weinblatt, & Shifman, 2014; Vanhala et al., 2020). privacy of the UGD, as well as discuss future research agenda regarding
In this context, the present study aims to investigate the link between the role of user privacy in DDI in digital markets. Conclusions are drawn
the generation of new products and services focused on DDI and UGD as in Section 6.
sources of data, as well as to explore the consequences these strategies
may have for user privacy. Moreover, we also explore how UGD can be 2. Theoretical framework
used by DDI to generate safe and consistent strategies that do not violate
user privacy in digital markets, which fills a gap in the literature by the In order to understand the theoretical framework that encompasses
analysis of user privacy from the DDI and UGD perspectives. The main the development of strategies focused on DDI and UGD, in this section,
research question addressed in the present study is as follows: What are we review the main theories on the production of UGD in digital markets
the challenges of DDI models in digital markets in the context of increasing (Kaufhold, Rupp, Reuter, & Habdank, 2020; Keller, Schoch, Stier, &
user privacy concerns? Yang, 2017; Prasarnphanich & Wagner, 2009;), the characteristics of the
To answer this research question, we aim to accomplish the UGD in DDI strategies (Karegar, Pettersson, & Fischer-Hübner, 2020;
following objectives: Saura, 2020), the types of intentionally vs. non-intentionally generated
consumer data (Schoen et al., 2013; Vanhala et al., 2020), and, finally,
• To identify definitional perspectives of user privacy in DDI from the the types of trust in UGD in digital markets (Hajli, 2014; Panahi, Watson,
UGD theoretical perspective & Partridge, 2016), since they encompass both the analysis data-centric
• To explore the types of DDI approaches to preserve user privacy in approaches, such as trust building, and the study of user behavior in
digital markets
2
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table 2 Table 3
User-generated data characteristics for data-driven innovation. Intentionally vs. non-intentionally generated consumer data (UGC and UGB).
Characteristics Description Key points Authors User-generated data (UGD)
Topic and Content categories Interest and Stieglitz et al. User-generated User-generated
purpose and objectives in relevance (2018) User Data points Possible sources content (UGC) behavior (UGB)
social networks Lozano, Intentionally Non-
Schreiber, and generated data intentionally
Brynielsson generated data
(2017)
Geographic Apps, mobiles √ √
Törnberg and
devices
Törnberg (2016)
Categorization/ Social media profiles √
Member Profile type, user, and Personal Hargittai (2010)
topical interests
characteristics customization information Su and
Demographic Profile preferences √
Contractor
(Age/Gender)
(2011)
Marital status Search terms, √
Chen,
searched content,
Vorvoreanu, and
interactions
Madhavan
Lifestyle Content consumed, √
(2014)
subscriptions
Trust and Trust and security in Level of trust / Cheng, Fu, and de
Psychographics user activity, √ √
security the digital market Perception of Vreede (2017)
Content consumed;
privacy Hansen,
content created
Saridakis, and
Household Type of products √
Benson (2018)
income bought, content
Sembada and
consumed,
Koay (2019)
subscriptions
Usability / UX Usability of data based Level of user Tenkanen et al.
Family size Family √
on the ecosystem experience (2017)
memberships,
where they are Baird and Fisher
number of devices
generated (2005)
per IP
Group/ Size of the user Power to bring Martinez and
Interests Content created, √
Community community around about change Walton (2014)
users/influencers
size which the data are Roberts (2015)
followed,
generated
Opinions digital platforms, √
Time factor Time horizon of Durability Saura (2020)
markets and social
subscription or use of Stieglitz et al.
media profiles
a product that (2018)
Browsing history Search engines √
generates UGD
Purchase history Digital √
Membership life UGD related to the Loyalty Sembada and
marketplaces, e-
cycle (cookies) development of plans generates more Koay (2019)
commerce profiles
and subscription confidence Lies (2019)
Time in social Social media profiles √
program
media and apps
Source: The authors. Ad interactions Digital markets, √
social networks,
emails
digital markets (Kar & Dwivedi, 2020). Types of media Digital markets, √
Of note, the public and free access to large amounts of data has consumed social networks
provided the companies an opportunity to implement massive adver Search terms used Search engines, √
websites search
tising campaigns, perform active listening in social networks, as well as
engines
offered them an array of commercial opportunities (Sembada & Koay, Bank company Apps downloaded √
2019). This easy access to large amounts of data has also driven com Sports Apps downloaded, √
panies to increase their data collection and compilation capacities in interests in social
order to be used to improve managerial decision making (Saxena & media, followed
users
Lamest, 2018).
Nearby connected Mobile devices, Wi- √
In order to understand how data can help companies to create DDI devices Fi access, location
models and make decisions, we should first consider how data are (Location) and connectivity
produced in digital markets (Pangrazio & Selwyn, 2019). From the Music Users profiles √
followed, type of
perspective of UGD analysis, there are different theories about data
apps downloaded,
production in digital ecosystems (see Table 1) and user motivations. subscriptions
These theories support the generation of UGD in digital markets, which Education level Content consumed, √
is the main source of data for companies. institutions
As indicated above, UGD emerge from intentional user publications followed,
professional social
and are a consequence of user actions in digital environments (Karegar
networks
et al., 2020). The analysis of these data—including user experiences, Health Medical apps, e- √
time of use, or personality types—allow companies to better understand information health services
user intentions and predict their behavior. Overall, UGD are derived installed in devices
Ideology Comments, users
from (i) information exchange, (ii) common activities, (iii) ideology/r √ √
followed,
eligion or (iv) purchase transactions (Karegar et al., 2020; Saura, 2020). Photos Places visited, users’ √
Therefore, the UGD has brought about the opportunity to access a social connections
multitude of data sources previously unavailable to companies (see Text messages Subscriptions √
Table 2). These data sources can serve as the basis for the generation of confirmations
new behavior prediction models, classifying target audiences, (continued on next page)
3
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table 4
Types of trust in user-generated data in digital markets.
Type of trust Description Key elements Authors
Interpersonal User perceptions of actions of other people that would harm them. An individual user is User perception Panahi et al. (2016)
trust willing to accept vulnerability or risk based on expectations regarding another person’s User interest Dutta and Bhat (2016)
behavior. User vulnerability Martinelli Watanuki and de Oliveira
User expectations Moraes (2019)
System trust User perceived security or reliance on both the platform system and the community Perceived security in the Hajli (2014)
they belong to. system Wu et al. (2016)
User reliance Ceron (2015)
Perceived security in the
community of users
Dispositional User confidence in others, independently of context or third-party users. General attitude Szymczak, Kücükbalaban, Lemanski,
trust Trustworthiness toward Knuth, and Schmidt (2016)
trust Utz and Krämer (2009)
Independent trust McKnight, Kacmar, and Choudhury
(2004)
Perceived Determined by factors such as secure payments, data privacy, data protection, system Perceived data security Areepattamannil and Santos (2019)
competence responsibility toward data, transparency, adequate access, third-party data sharing, Perceived data privacy Tsvere, Swamy, and Nyaruwata
etc. Trust in the system (2013)
transparency Hajli (2014)
Perceived Good intentions and trustworthiness of community members to develop interpersonal System good intentions and Spence, Lachlan, Westerman, and
goodwill trust. The higher the perceived goodwill, the more content users will generate, the trustworthiness Spates (2013)
more personal data will be shared, and the more trust they will have in the community Perceived goodwill Omilion-Hodges and Rodriguez
they belong to. (2014)
Judson et al. (2012)
4
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table 5 Table 6
Risk bias assessment of the studies included in the “theoretical contributions” Risk bias assessment of the studies included in the “data-driven models”
category. category.
Authors SD RSG BOA WDO IEC RAE Authors SD RSG BOA WDO IEC RAE
in digital markets. of the identified papers to identify the main contributions and gaps for
For our SLR, following Bem (1995), we first reviewed the theoretical future research. The 16 articles in the final dataset were analyzed in
and academic foundations of previous research on UGD and DDI. Next, depth in relation to the theories and definitions identified in the theo
we identified the main topics discussed within these two areas of retical framework process.
research. Finally, based on the two steps mentioned above, we decided Consequently, the 16 articles were classified into the following two
on the keywords and their combinations to be used in subsequent groups: (i) theoretical contributions and (ii) data-driven models (see
database search (Kraus, Breier, & Dasí-Rodríguez, 2020). Tables 5 and 6). In (i), we classified papers that made theoretical con
Following Stieglitz et al. (2018), our SLR was based on the papers in tributions to research on user privacy and data-driven innovations. In
reputed the academic databases: ACM Digital Library, IEEE Explore, (ii), we classified the studies that contributed solutions to user privacy in
ScienceDirect, and Web of Sciences (WOS). We also considered search digital markets with the use of data-driven models.
ing the AIS Electronic Library database; however, the results of Additionally, in order to ensure accuracy and precision of the
searching this database yielded only proceedings (rather than research reviewed articles (Kiss, Williams, & Houghton, 2013), we performed an
articles), so this database was not included in our review. In this deci assessment of risk bias in both groups of studies taking into account
sion, we followed suggested by Stieglitz et al. (2018) and Saura (2020). study design (SD), random sequence generation (RSG), blinding of
The terms used in the SLR were “User privacy” OR “user privacy outcome assessment (BOA), withdraw and drop out (WDO),
concerns” AND “data-driven” OR “data-driven innovation”. We used the inclusion-exclusion criteria (IEC) and reporting adverse events (RAE)
term “user privacy concerns” when the search of the terms “User pri (Table 7).
vacy” AND “data-driven” did not yield the expected results. The searches
were performed on October 12–14, 2020. We focused on titles, abstracts, 3.2. In-depth interviews
and keywords to identify relevant contributions. The total number of
articles obtained in the search was 134, of which 16 met the inclusion Next, in order to address our research question and acquire addi
criteria (see Fig. 1). tional knowledge regarding the challenges related to user privacy in
The number of studies found in the databases was as follows: ACM data innovation, we conducted a series of qualitative interviews with
Digital Library, 35 results, of which 3 met the inclusion criteria, IEEE leading IT professionals (MacDougall & Fudge, 2001). In doing so, our
Explore 46/2, ScienceDirect 46/6, WOS 7/5. As mentioned previously, aim was not to achieve statistical generation or significance, but rather
the total number of results was 134 articles, of which 16 were selected as to gain an in-depth understanding of the structure of the studied phe
relevant. nomenon (Orlikowski & Baroudi, 1991; Roberts, 2015).
The final step in the review process was to conduct in-depth reading We conducted a total of 11 interviews on data privacy and data
5
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table 7
provides further detail on the 16 identified articles (the authors, journal, category, classification, main definitions, and contributions to GDA and DDI). Results of
Systematic Literature Review.
Authors Journal Category Theoretical Data- Purpose Main concepts analyzed
contributions driven
models
Cheung and Transactions on Multimedia To study the privacy issues in online Real-world data, sensitivity,
•
She (2016) Multimedia Computing, Information Systems social networks from the individual visibility of information and data
Communications, and users’ viewpoint management
Applications
He et al. ACM Transactions on Human Computing To propose a data-driven approach to Developing privacy profiles,
•
(2020) Interactive Intelligent Interaction design privacy-setting interfaces for privacy default settings, user’s
Systems users in household IoT industry privacy preferences
Imran-Daud Computer Social and To automatically detect sensitive Privacy-driven access control,
•
et al. (2016) Communications Information information according to the privacy content-driven protection of user
Networks requirements of the publisher of data. publications, textual messages,
content
Karegar et al. ACM Transactions on Security and Privacy To investigate how interactions that User privacy and engagement,
•
(2020) Privacy and Security engage users with consent forms differ user attention and satisfaction,
in terms of their effectiveness, types of interactions
efficiency, user satisfaction and
privacy concerns
Liu and Terzi ACM Transactions on Privacy, Social To approach the privacy issues in Privacy scores, users in online
•
(2010) Knowledge Discovery from Network Services online social networks from the social networks, privacy issues,
Data individual users’ viewpoint proposing privacy risk
a framework to compute the privacy
score of a user
Malgieri and Computer Law & Security Computer To analyze whether consumers/users Data-driven economy, pricing
•
Custers Review Technology should have a right to know the value privacy, user personal data.
(2018) of their personal data.
Pratesi et al. Data & Knowledge Data Design, Data To analyze privacy issues related to the Privacy risk assessment, risk-
•
(2020) Engineering Base Tools sharing of user profiles, derived from users, quality of user profiles,
mobile phone data. user classification of privacy
Prince (2018) International Journal of Human Computer To assess the factors that affect web Privacy controls over data flows,
•
Human-Computer Studies Interaction users’ predisposition to exert control concerns over information
over personal data flows that targets privacy, individuals’ privacy
online users and their privacy empowerment
Qi et al. (2020) Information Sciences Information Science To propose a data-driven service Collaborative filtering, context-
•
(2016) Computers Computer Science which encrypts users’ sensitive data to behavior data, privacy
prevent privacy disclosure and to protection, privacy disclosure
evaluate a real online behavior dataset
Tahir et al. IEEE Access Computer To review the state-of-art application 5 G technology, connectivity,
•
(2020) Data Privacy security and privacy issues, data security, user’s privacy
encryption technology, and applicable protection, information
countermeasures in the cloud storage disclosure, privacy disclosure
system
Yeon Cho et al. KSII Transactions on Information Systems To investigate factors considered in Information privacy, collect
•
(2018) Internet and Information privacy calculus of fitness devices and sensitive data, privacy concerns
Systems verify differences among users
Yu et al. Industrial Marketing Information To construct a conceptual model based Consumer perceptions to ads on
•
(2019) Management Management on the effects of consumer perceptions the click-through intention,
of personalized online ads. privacy concerns, social content,
trust
Zhong et al. Computer Computer privacy & To propose a multi-dimensional Privacy-preservation, service
•
(2019) Areas in Communications models evaluation issues of users using a data- observable user data, privacy
driven model issues of social network
behaviors
innovation with the professionals from 9 companies. The informants a wider range of experiences (Dhillon & Torkzadeh, 2006). Each inter
were from medium and large companies with extensive experience in view lasted approximately one hour and was conducted between
developing strategies in digital markets (see Table 8). Our interviews October 21, 2020 and November 15, 2020.
were semi-structured and included open-ended questions (see Annex 1). The interview data were then transcribed and coded using explor
The main reason for using open-ended questions was to try to address atory data-based techniques (Bacq, Janssen, & Noël, 2019;
6
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table 8
Interviewees by sector, company and professional.
Informant Sector Company size Role of informant Core duties Organization Type
Table 9 Table 11
Demographic characteristics of the interviewees. Characteristics of textual analysis.
Demographic Sub-Level Count (%) Characteristics Boyd Rosa Jiang Ramirez-Andreotta Present
Characteristic et al. et al. et al. et al. (2016) Study
(2010) (2015) (2016)
Male 8 66.6
Gender Female 4 33.3 Classification √ √ √ √ √
Other – – into nodes
Categorization √
Profession CTO 1 8.3 Word count √ √ √
Computer Scientist 1 16.6 Keywords √ √ √
Digital Marketing Manager 2 8.3
Source: The authors.
Senior Consultant 1 8.3
Quality Manager Communication
1 8.3
Manager Stephens, & Donnelly, 2000). The originality of our study lies in that,
Big Data Manager 1 8.3 while LDA has previously been used to analyze the content extracted
CEO 1 8.3
User Experience Manager 1 8.3
from social networks and digital markers, in the present study, we used
SEO Manager 1 8.3 this technique to analyze our interview data by following Krippendorff
1 8.3 (2013) content analysis considerations.
Education
Postgraduate 9 75 In general, the LDA model identifies keywords within the analyzed
PhD 3 25
documents and proposes a distribution of themes in a randomly iden
tified sample. Specifically, the model shows the ten most relevant words
26− 35 4 33.3
36− 45 5 41.6 in the database and based on the results, the researchers can propose
Age
46− 56 2 16.6 different themes. These themes will be the topics that make up the
> 55 1 8.3 analyzed database (see Table 10 for a review of similar studies). In the
Source: The authors. present study, this approach was performed using Python software LDA
1.0.5.
In order to ensure that the analyzed topics are relevant, the concept
Table 10 of keyness, also known as the strength of the link, has previous been
Data sources in the LDA application. applied. Keyness is a statistical measure that values the log-likelihood
Lee and Büschken Hao score (Rayson & Garside, 2000; Reyes-Menendez, Saura, & Stephen,
Ye et al. Present
Characteristics
(2011)
Bradlow and Allenby et al.
Study
2020). This metric provides statistical meaning and makes it possible to
(2011) (2016) (2017) determine differences between two corpora. Specifically, the
Online rating
log-likelihood score of 3.8 or higher was reported to be statistically
√ – √ √
Comments √ √ √
LDA √ √ √ significant at p < 0.05 (Minhas & Hussain, 2014; Reyes-Menendez
Social et al., 2020). Therefore, in the present study, the conversations from the
√ √
interactions interviews were put into different in-puts phrases and text documents
Interviews √ that were considered as sub-corpus and were then compared with the
Topic
frequency
√ √ √ original corpus composed of the full texts collected from the in-depth
interviews.
Source: The authors. For the set of identified topics, the statistical significance was p <
0.05. According to Iyengar, Sood, and Lelkes (2012) and Reyes-Me
Cooke-Davies & Arzymanow, 2003). The demographic characteristics of nendez et al. (2020), this allows for measuring log-likehood to deter
the informants are summarized in Table 9 based on their professions. mine the importance of the identified topics in the overall analyzed
content.
3.3. Data mining: topic-modeling and textual analysis Secondly, we also performed textual analysis with data-mining
techniques (Krippendorff, 2013). To this end, different phrases and
In recent years, data mining techniques, such as modeling and tex concepts were grouped in nodes, or text groupings that discussed similar
tual analysis, have come to be extensively used in the literature (Amin issues. Each node had different variables to measure to evaluate the
et al., 2019; Jimenez-Marquez, Gonzalez-Carrasco, Lopez-Cuadrado, & relevance of the words and concepts that composed it. Specifically, we
Ruiz-Mezcua, 2019). In the present study, we used two techniques of measured the frequency and repetition of the words within the database,
data-based approaches. First, a model based on mathematical and and then the total weight of those word groupings in nodes within the
probabilistic functions, known as LDA, was applied to analyze the con database was measured (Hilal & Alabri, 2013) (see Table 11 for a review
tent of the interviews (Blei, Ng, Jordan, & Lafferty, 2003; Pritchard, of similar studies).
7
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table 12 analysis of user data in social networks and digital markets. Our results
Topics identified in interviews. suggest that, using DDI, companies personalize their messages based on
Topics Topic description Keyness p- the needs of their customers. Corresponding algorithms focus on inno
value vation in terms of collecting information from users, allowing companies
User privacy Users’ preferences regarding their 776.72 0.039 to find a multitude of data points to predict both user behavior and their
preferences privacy actions in digital ecosystems (Sheehan, 2002).
User engagement Analysis of the type of actions and user 497.80 0.027 However, the effectiveness of these innovation-focused approach
engagement strategies raises privacy concerns (Dutta & Bhat, 2016). Pursuing eco
Privacy risk Risks relating to the privacy of user data 417.02 0.024
Data-driven Economics based on data-driven 390.94 00.23
nomic and business objectives (Keller et al., 2017), companies can
economy approaches achieve change in user behavior, or behavioral modification (Zuboff,
User behavior Study of user behavior in digital 390.03 0.023 2019) based on the application of DDI (Imran-Daud et al., 2016). For
markets instance, psychographic variables and their collection with Big Data
Information Decisions taken by company 379.58 0.021
techniques allow companies to predict the personality of users. In this
management management of
Decision making Influence of data-driven innovation and 305.11 0.014 respect, our findings are consistent with those reported by Paine et al.
improved decision making (2007) and Qian, F., Ruan, Chen, and Tang (2016).
User perceptions User perceptions of security and risk on 269.08 0.011 One of the interviewed informants indicated:
filtering personal user data
Driven content Actions, techniques, and models 164.10 0.008 "We can say that personality drives user behavior online, and behavior
focused on data-driven content influences user actions in digital markets. These actions generate and
Social ads Influence of data-driven models on 135.75 0.006
mark the personality of the profiles that are then analyzed using DDI".
social ads
Sensitive data Access to sensitive data to study online 135.32 0.006
In line with Sledgianowski and Kulviwat (2009) and Yu et al. (2019),
user behaviors
our results demonstrate that these actions make it possible to understand
Source: The authors. the factors related to personal data, such as user personality, tastes,
habits, and actions in digital environments. Therefore, we can conclude
that mining such details from UGD in digital markets allows companies
Table 13
to increase profitability of their content marketing strategies, as they
Grouped keyword nodes.
know users better and can personalize content automatically (Brighi,
Keywords Count WP Lucarelli, & Venturelli, 2019; Prince, 2018).
Data driven-innovation, data-driven economy, data-driven models, 430 3.14 However, as discussed previously, the fact that companies can use
data points, data-driven behavior, etc. DDI techniques to construct psychological profiles of users can lead to
Protect user data, user personal data, data abused activities, 412 2.79
unethical experiments that violate the privacy of personal data of users.
unethical experiments with user data, etc.
Personalized content, monetization of user content, personalized 371 2.23
As noted by one of our interviewees:
messages, etc.
Privacy concerns, digital privacy, privacy-driven access, privacy 332 2.04
“We train models that work with machine-learning using common pat
protection, pricing privacy, privacy score, etc. terns among the users with whom we carry out A/B tests, and on the
Social ads, social engagement, social media profiles, social 293 1.93 results of these, we add more information on the profiles used until we
networks preferences, social networks abuse, etc. achieve the level of accuracy that we consider profitable”.
Information management, decision making in management, 257 1.45
insights, innovation in management, etc. Although Big Data marketing and content customization make it
Social media trust, trust in the platform, trust in the social media 193 1.08
possible to quantitatively evaluate the effectiveness of advertising and
algorithm, user trust to other users, etc.
social ads campaigns in digital environments, they also lead to the
Source: the authors. emergence of trends such as fake news and abusive activities related to
advertising (Lies, 2019; Liu & Terzi, 2010).
The total grouping of words in nodes was represented by the Therefore, user privacy concern increases as innovation and models
weighted percentage (WP) that reflected the total weight based on the developed to get increasingly advanced, and users can perceive these
relevance of the set of keywords in the entire initial database (Hutch technologies in the personalization of content (see also Palos-Sanchez
ison, Johnston, & Breckon, 2010). The analysis was performed using the et al., 2019). Content customization, i.e., segmented targeting based on
NVivo Pro-11 textual analysis software with extensions for content data-driven models and testing of new market segments, includes ac
filtering and classification. tions focused on the analysis of user data applying innovation models
and algorithms that study their online actions (He, Bahirat, Knijnenburg,
4. Results & Menon, 2020). In this respect, one of our interviewees noted:
5. Discussion, implications, and research agenda “We have come to question whether the predictive capabilities of our
models can influence purchasing behavior and the choices that users make
In the present study, we identified different challenges related to the online. We respect user privacy, but the segmentation tools are becoming
implementation and development of DDI strategies that focus on the more robust and intelligent”.
8
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
9
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
UGD analyzed with DDI models is key for digital business models. Therefore, since user data and information are used to increase the
Accordingly, the following proposition is established: profits of companies, regulations on the use of user data and information
they share on the Internet must be improved (Romansky, 2019).
Proposition 2. The greater the predictability and size of the UGD data
Therefore, the following proposition is formulated:
bases, the greater the profitability and monetization of the value of users using
DDI models. Proposition 7. A legal framework to make users aware of the economic
value of their data that companies can use to increase their profits should be
According to Missaglia et al. (2017), the improvement of the study
introduced.
and optimization of social ads and personalized content in digital mar
kets plat a key role in purchase considerations. Holmlund et al. (2020)
6. Conclusions
indicated that the development and application of techniques focused on
BDA to explore and influence the customer journey of users is decisive
In the present study, we analyzed how, from the perspective of UGD,
for the success of digital strategies. Accordingly, the study of online user
data-driven models can be used to address the issues of user data
behavior has become a priority for companies that develop digital
privacy.
strategies (Oestreicher-Singer & Zalmanson, 2013). Therefore, the
With regard to our main research question (“What are the challenges
following research proposal is formulated:
of DDI models in digital markets in the context of increasing user privacy
Proposition 3. The use of BDA and DDI for the study of user behavior concerns?), we proposed a detailed research agenda, including the main
improves the personalization of social ads / content, increasing the possibil questions and research propositions that should be addressed in future
ities of positive purchase decisions in digital markets. research regarding using DDI models and strategies with respect to user
privacy.
However, the application of DDI to large UGD databases has become
This roadmap for future research is based on the results of our
a problem for the industry in terms of user perception (Xie & Karan,
achieving the specific goals of the present investigation. Specifically, we
2019). As highlighted by Tan, Qin, Kim, and Hsu (2012), one of the
identified definitional perspectives of user privacy in DDI from the UGD
challenges is to understand the limits of large-scale automation with the
theoretical perspective, explored the types of DDI approaches to pre
use of DDI, since the prediction and optimization capabilities increase.
serve user privacy in digital markets, reviewed and analyzed what is
This effectiveness has led to privacy concerns about the use of the in
known about the use of UGD in DDI preserving user privacy, and pro
formation published by users, as well as the insights, both direct and
vided guidelines to track the challenges of DDI with regard to user pri
indirect, which can be extracted from user publications online actions
vacy. Therefore, seven data-driven based topics were found as the main
(Huertas & Marine-Roig, 2015). Therefore, the following proposition is
factor to determine next studies in this area of research: intentionally
formulated
versus non-intentionally generated data, monetization of user content,
Proposition 4. Strategies focused on large-scale data automation and DDI social ads and personalized content, data abuse activities, online user
must be standardized and examined to avoid abuse that could harm user behavior, information management and laws on digital privacy.
privacy and data. Similarly, DDI tools were found to drive these new challenges: data-
driven models and user data points analysis, DDI strategies to increase
The application of DDI and BDA to the study of online user behavior
profitability, data-driven innovation actions to personalized social ads,
has been studied from behavioral (Pachidi, Spruit, & Van De Weerd,
data-driven models to collect and process user information on a large
2014) and marketing perspectives (Vinerean, Cetina, Dumitrescu, &
scale, data-driven innovation based on user habits online, decision-
Tichindelean, 2013; Palos-Sanchez et al., 2019). However, these
making related to the application of strategies based on DDI, and arti
analytical approaches have allowed tracking users online, allowing thise
ficial intelligences DDI models to study online user profiles.
companies to anticipate user decisions and understand how users
We also reviewed the main uses of the DDI strategies by companies
behave on the Internet (Steinfeld, 2016; Tene & Polenetsky, 2012).
and their link to the privacy of users (in terms of their personality,
Therefore, and from the point of view of modifying the decisions that
behavior, and actions on the Internet). Taken together, our results
users make in digital markets using DDI models, the following propo
highlight the urgent need to better understand the DDI strategies that
sition is proposed.
could affect user privacy.
Proposition 5. Tracking online user behavior and using DDI to personalize
content and advertising in digital marketplaces may result in the change of 6.1. Theoretical contributions
decisions that users make in digital environments.
In terms of theoretical implications, the present study provides an
Information management in this digital age is a key element needed
adequate framework in relation to the concepts of UGD and DDI for
for business success (Dwivedi, Lal, & Williams, 2009). According to
further research on management, processing, and prediction of user
Kache and Seuring (2017), in this new connected paradigm,
behaviors on the Internet based on the data users share in digital mar
decision-making processes driven by data dashboards is key in market
kets. Accordingly, future studies can address the questions included in
ing, sales, communication, and strategy (Jones, Ball, & Ekmekcioglu,
the proposed research agenda.
2008). However, business managers should carefully consider the limits
From the theoretical perspective, researchers should focus on the
of the use of personal data information in the predictions made to
development of legislation that would regulate the use of targeting tools
personalized content and increase the benefits. Therefore, the following
in digital ecosystems. These initiatives should protect users from abusive
research proposal is proposed:
privacy practices developed by companies that collect UGC and UGB
Proposition 6. DDI that works with Artificial Intelligence plays an data from online users.
important role in information management; however, with regard to mar In addition, future large-scale analyses of user data should follow the
keting and sales, the limits of user personal data analysis and predictions best practice guidelines that ensure the appropriate ethical design of
should be considered. both the ways of collecting data and predicting user behavior. In this
way, although the economic objectives of companies could be ambi
The evolution of DDI in companies and the data generated daily have
tions, companies should ensure that user privacy, the strategies used to
led to the emergence of a new ecosystem where data are the center of all
influence user online behavior, and predictions about their actions are
decisions and strategies implemented in digital markets (Calvano &
not violated or abused.
Polo, 2020). However, according to Morse and Birnhack (2020), the
laws on digital privacy have not advanced at a comparable speed.
10
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Table A1 Amin, A., Shah, B., Khattak, A. M., Moreira, F. J. L., Ali, G., Rocha, Á., et al. (2019).
Interview questions. Cross-company customer churn prediction in telecommunication: A comparison of
data transformation methods. International Journal of Information Management, 46,
Questions Codification 304–319. https://doi.org/10.1016/j.ijinfomgt.2018.08.015.
Arya, V., Sethi, D., & Paul, J. (2019). Does digital footprint act as a digital asset? ?
What is your use of Data-Driven Innovation (DDI) in your QD1 Enhancing brand experience through remarketing. International Journal of
organization? Information Management, 49, 142–156. https://doi.org/10.1016/j.
What is the role of user-generated data (UGD) in your organization? QD2 ijinfomgt.2019.03.013.
What kind of user-generated data (UGD) do you collect? QD3 Areepattamannil, S., & Santos, I. M. (2019). Adolescent students’ perceived information
Do you apply DDI-centric models on UGD databases? QD4 and communication technology (ICT) competence and autonomy: Examining links to
What actions do you take to ensure the privacy of users and their QD5 dispositions toward science in 42 countries. Computers in Human Behavior, 98, 50–58.
data? https://doi.org/10.1016/j.chb.2019.04.005.
What use will you give to DDI-based strategies in the future? QD6 Bacq, S., Janssen, F., & Noël, C. (2019). What happens next? A qualitative study of
What is the role that DDI and UGD play in the marketing, QD7 founder succession in social enterprises. Journal of Small Business Management, 57(3),
communication, and data management decisions of the 820–844. https://doi.org/10.1111/jsbm.12326.
Baird, D. E., & Fisher, M. (2005). Neomillennial user experience design strategies:
organization?
Utilizing social networking media to support “always on” learning styles. Journal of
Educational Technology Systems, 34(1), 5–32. https://doi.org/10.2190/6WMW-47L0-
M81Q-12G1.
6.2. Managerial contributions Bandara, R., Fernando, M., & Akter, S. (2019). Privacy concerns in E-commerce: A
taxonomy and a future research agenda. Electronic Markets, 1–19. https://doi.org/
10.1007/s12525-019-00375-6.
From a more practical point of view, managers and heads of
Bandara, R., Fernando, M., & Akter, S. (2020a). Managing consumer privacy concerns
communication, marketing, data and development innovation strategies and defensive behaviours in the digital marketplace. European Journal of Marketing.
can use the results of the present study as the starting point to develop https://doi.org/10.1108/EJM-06-2019-0515. Vol. ahead-of-print No. ahead-of-
ethical approaches to the management and processing of user data that print.
Bandara, R., Fernando, M., & Akter, S. (2020b). Explicating the privacy paradox: A
would not violate user privacy and appropriately handle user personal qualitative inquiry of online shopping consumers. Journal of Retailing and Consumer
information and behavioral data. Services, 52, 101947. https://doi.org/10.1016/j.jretconser.2019.101947.
In addition, when applying DDI models on these databases, gov Bandara, R., Fernando, M., & Akter, S. (2020c). Addressing privacy predicaments in the
digital marketplace: A power-relations perspective. International Journal of Consumer
ernments, public institutions, and private companies that collect, pro Studies, 44(5), 423–434. https://doi.org/10.1111/ijcs.12576.
cess, and analyze user data must ensure that user privacy is maintained. Blei, D. M., Ng, A. Y., Jordan, M. I., & Lafferty, J. (2003). Latent dirichlet allocation.
With the development and improvement of data science techniques, Journal of Machine Learning Research, 3, 993–1022. https://doi.org/10.1162/
jmlr.2003.3.4-5.993.
technology is advancing exponentially; however, no comparable ad Bouncken, R. B., Kraus, S., & Roig-Tierno, N. (2019). Knowledge-and innovation-based
vances are observed in relevant legislation. business models for future growth: Digitalized business models and portfolio
Therefore, from the practical and management points of view, it is considerations. Review of Managerial Science, 1–14.
Boyd, D., Golder, S., & Lotan, G. (2010). Tweet, tweet, retweet: Conversational aspects of
important that policy makers and managers develop flexible. This is
retweeting on twitter. In 2010 43rd Hawaii International Conference on System Sciences
needed to both protect user privacy and to implement DDI strategies that (pp. 1–10). https://doi.org/10.1109/HICSS.2010.412.
do not infringe user rights. Brighi, P., Lucarelli, C., & Venturelli, V. (2019). Predictive strength of lending
technologies in funding smes. Journal of Small Business Management, 57(4),
1350–1377. https://doi.org/10.1111/jsbm.12444.
6.3. Future research and limitations Büschken, J., & Allenby, G. M. (2016). Sentence-based text analysis for customer reviews.
Marketing Science, 35(6), 953–975. https://doi.org/10.1287/mksc.2016.0993.
Calvano, E., & Polo, M. (2020). Market power, competition and innovation in digital
The limitations of the present study are related to the number of markets: A survey1. Information Economics and Policy, Article 100853.
articles identified and reviewed in our systematic literature review, the Ceron, A. (2015). Internet, news, and political trust: The difference between social media
number of interviewees who participated in the interviews, and the and online media outlets. Journal of Computer-Mediated Communication, 20(5), 487.
https://doi.org/10.1111/jcc4.12129.
types of analysis used to analyze the data.
Chen, X., Vorvoreanu, M., & Madhavan, K. (2014). Mining social media data for
In terms of future research objectives, the research propositions understanding students’ learning experiences. IEEE Transactions on Learning
described above should be taken into account as starting points to Technologies, 7(3), 246–259. https://doi.org/10.1109/TLT.2013.2296520.
Cheng, X., Fu, S., & de Vreede, G. J. (2017). Understanding trust influencing factors in
establish new directions and lines of research focused on gaining a better
social media communication: A qualitative study. International Journal of Information
understanding of user behavior with DDI strategies and models. Management, 37(2), 25–35. https://doi.org/10.1016/j.ijinfomgt.2016.11.009.
Cheung, M., & She, J. (2016). Evaluating the privacy risk of user-shared images. ACM
Authors statement Transactions on Multimedia Computing Communications and Applications, 12(4s), 1–21.
https://doi.org/10.1145/2978568.
Cooke-Davies, T. J., & Arzymanow, A. (2003). The maturity of project management in
Conceptualization: J.R.S, D.R.S, D.P.M; Formal analysis: D.P.M; different industries: An investigation into variations between project management
Investigation: J.R.S, D.R.S, D.P.M; Methodology: J.R.S, D.R.S, D.P.M; models. International Journal of Project Management, 21(6), 471–478.
Cui, D., & Curry, D. (2005). Prediction in marketing using the support vector machine.
Resources: J.R.S; Software: J.R.S, D.R.S, D.P.M; Supervision: D.R.S, D.P. Marketing Science, 24(4), 595–615.
M; Validation: J.R.S; Visualization: J.R.S; Roles/Writing - original draft: de Camargo Fiorini, P., Seles, B. M. R. P., Jabbour, C. J. C., Mariano, E. B., & de Sousa
J.R.S, D.R.S, D.P.M; Writing - review & editing: J.R.S, D.R.S, D.P.M. Jabbour, A. B. L. (2018). Management theory and big data literature: From a review
to a research agenda. International Journal of Information Management, 43, 112–129.
https://doi.org/10.1016/j.ijinfomgt.2018.07.005.
Annex 1 Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system
security in organizations. Information Systems Journal, 16(3), 293–314.
Duan, Y., Edwards, J. S., & Dwivedi, Y. K. (2019). Artificial intelligence for decision
Table A1 making in the era of Big Data–evolution, challenges and research agenda.
International Journal of Information Management, 48, 63–71. https://doi.org/
References 10.1016/j.ijinfomgt.2019.01.021.
Dutta, N., & Bhat, A. (2016). Exploring the effect of store characteristics and
interpersonal trust on purchase intention in the context of online social media
Akter, S., & Wamba, S. F. (2016). Big data analytics in E-commerce: A systematic review
marketing. Journal of Internet Commerce, 15(3), 239–273. https://doi.org/10.1080/
and agenda for future research. Electronic Markets, 26(2), 173–194. https://doi.org/
15332861.2016.1191053.
10.1017/S0963180114000589.
Dwivedi, Y. K., Lal, B., & Williams, M. D. (2009). Managing consumer adoption of
Akter, S., Bandara, R., Hani, U., Wamba, S. F., Foropon, C., & Papadopoulos, T. (2019).
broadband: Examining drivers and barriers. Industrial Management & Data Systems.
Analytics-based decision-making for service systems: A qualitative study and agenda
Ferreira, J. J., & Teixeira, A. A. (2019). Open innovation and knowledge for fostering
for future research. International Journal of Information Management, 48, 85–95.
business ecosystems. Journal of Innovation & Knowledge, 4(4), 253–255. https://doi.
https://doi.org/10.1016/j.ijinfomgt.2019.01.020.
org/10.1016/j.jik.2018.10.002.
Allen, D. K., & Shoard, M. (2005). Spreading the load: Mobile information and
communications technologies and their effect on information overload. Information
Research: An International Electronic Journal, 10(2), n2.
11
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
García-Cabrera, A. M., García-Soto, M. G., & Olivares-Mesa, A. (2019). Entrepreneurs’ platform alerting system. Behaviour & Information Technology, 39(3), 319–342.
resources, technology strategy, and new technology-based firms’ performance. https://doi.org/10.1080/0144929X.2019.1620334.
Journal of Small Business Management, 57(4), 1506–1530. Keller, F. B., Schoch, D., Stier, S., & Yang, J. (2017). How to manipulate social media:
Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European Analyzing political astroturfing using ground truth data from South Korea. In
regulation that has a global impact. International Journal of Market Research, 59(6), Eleventh International AAAI Conference on Web and Social Media.
703–705. https://doi.org/10.2501/IJMR-2017-050. Kiss, A. N., Williams, D. W., & Houghton, S. M. (2013). Risk bias and the link between
González, R. J. (2017). Hacking the citizenry?: Personality profiling,‘big data’and the motivation and new venture post-entry international growth. International Business
election of Donald Trump. Anthropology Today, 33(3), 9–12. https://doi.org/ Review, 22(6), 1068–1078. https://doi.org/10.1016/j.ibusrev.2013.02.007.
10.1111/1467-8322.12348. Kraus, S., Breier, M., & Dasí-Rodríguez, S. (2020). The art of crafting a systematic
Gutierrez, A., O’Leary, S., Rana, N. P., Dwivedi, Y. K., & Calle, T. (2019). Using privacy literature review in entrepreneurship research. International Entrepreneurship and
calculus theory to explore entrepreneurial directions in mobile location-based Management Journal, 1–20.
advertising: Identifying intrusiveness as the critical risk factor. Computers in Human Krippendorff, K. (2013). Content analysis: An introduction to its methodology (3rd ed., pp.
Behavior, 95, 295–306. https://doi.org/10.1016/j.chb.2018.09.015. 221–250). Thousand Oaks, CA, USA: Sage. https://doi.org/10.2307/2288384.
Hajli, M. N. (2014). A study of the impact of social media on consumers. International Lee, T. Y., & Bradlow, E. T. (2011). Automated marketing research using online customer
Journal of Market Research, 56(3), 387–404. https://doi.org/10.2501/IJMR-2014- reviews. Journal of Marketing Research, 48(5), 881–894. https://doi.org/10.2139/
025. ssrn.1726055.
Hansen, J. M., Saridakis, G., & Benson, V. (2018). Risk, trust, and the interaction of Li, S., Song, X., Lu, H., Zeng, L., Shi, M., & Liu, F. (2020). Friend recommendation for
perceived ease of use and behavioral control in predicting consumers’ use of social cross marketing in online brand community based on intelligent attention allocation
media for transactions. Computers in Human Behavior, 80, 197–206. https://doi.org/ link prediction algorithm. Expert Systems With Applications, 139, Article 112839.
10.1016/j.chb.2017.11.010. Lies, J. (2019). Marketing intelligence and big data: Digital marketing techniques on
Hao, H., Zhang, K., Wang, W., & Gao, G. (2017). A tale of two countries: International their way to becoming social engineering techniques in marketing. International
comparison of online doctor reviews between China and the United States. Journal of Interactive Multimedia and Artificial Intelligence, 5(5). https://doi.org/
International Journal of Medical Informatics, 99, 37–44. https://doi.org/10.1016/j. 10.9781/ijimai.2019.05.002.
ijmedinf.2016.12.007. Liu, T., & Lai, Z. (2020). From non-player characters to othered participants: Chinese
Hargittai, E. (2010). Digital na (t) ives? Variation in internet skills and uses among women’s gaming experience in the ‘free’digital market. Information, Communication
members of the “net generation”. Sociological Inquiry, 80(1), 92–113. https://doi. and Society, 1–19. https://doi.org/10.1080/1369118X.2020.1791217.
org/10.1111/j.1475-682X.2009.00317.x. Liu, K., & Terzi, E. (2010). A framework for computing the privacy scores of users in
Hawi, N. S., & Samaha, M. (2017). The relations among social media addiction, self- online social networks. ACM Transactions on Knowledge Discovery From Data, 5(1),
esteem, and life satisfaction in university students. Social Science Computer Review, 35 1–30. https://doi.org/10.1145/1870096.1870102.
(5), 576–586. https://doi.org/10.1177/0894439316660340. Lozano, M. G., Schreiber, J., & Brynielsson, J. (2017). Tracking geographical locations
He, Y., Bahirat, P., Knijnenburg, B. P., & Menon, A. (2020). A data-driven approach to using a geo-aware topic model for analyzing social media data. Decision Support
designing for privacy in household IoT. ACM Transactions on Interactive Intelligent Systems, 99, 18–29. https://doi.org/10.1016/j.dss.2017.05.006.
Systems, 10(1), 1–47. https://doi.org/10.1145/3241378. Ma, X., Chen, X., & Zhang, X. (2019). Non-interactive privacy-preserving neural network
Hilal, A. H., & Alabri, S. S. (2013). Using NVivo for data analysis in qualitative research. prediction. Information Sciences, 481, 507–519.
International Interdisciplinary Journal of Education, 2(2), 181–186. https://doi.org/ MacDougall, C., & Fudge, E. (2001). Planning and recruiting the sample for focus groups
10.12816/0002914z. and in-depth interviews. Qualitative Health Research, 11(1), 117–126. https://doi.
Holmlund, M., Van Vaerenbergh, Y., Ciuchita, R., Ravald, A., Sarantopoulos, P., org/10.1177/104973201129118975.
Ordenes, F. V., et al. (2020). Customer experience management in the age of big data Malgieri, G., & Custers, B. (2018). Pricing privacy – The right to know the value of your
analytics: A strategic framework. Journal of Business Research. personal data. Computer Law & Security Report, 34(2), 289–303. https://doi.org/
Huertas, A., & Marine-Roig, E. (2015). Destination brand communication through the 10.1016/j.clsr.2017.08.006.
social media: What contents trigger most reactions of users?. Information and Martinelli Watanuki, H., & de Oliveira Moraes, R. (2019). Exploring the influence of
communication technologies in tourism 2015 (pp. 295–308). Cham: Springer. social media information on interpersonal trust in new virtual work partners.
Hughes, L., Dwivedi, Y. K., Misra, S. K., Rana, N. P., Raghavan, V., & Akella, V. (2019). Informatics, 6(September (3)). https://doi.org/10.3390/informatics6030033.
Blockchain research, practice and policy: Applications, benefits, limitations, Martinez, M. G., & Walton, B. (2014). The wisdom of crowds: The potential of online
emerging research themes and research agenda. International Journal of Information communities as a tool for data analysis. Technovation, 34(4), 203–214. https://doi.
Management, 49, 114–129. https://doi.org/10.1016/j.ijinfomgt.2019.02.005. org/10.1016/j.technovation.2014.01.011.
Hutchison, A. J., Johnston, L. H., & Breckon, J. D. (2010). Using QSR-NVivo to facilitate McKnight, D. H., Kacmar, C. J., & Choudhury, V. (2004). Dispositional trust and distrust
the development of a grounded theory project: An account of a worked example. distinctions in predicting high-and low-risk internet expert advice site perceptions.
International Journal of Social Research Methodology, 13(4), 283–302. https://doi.org/ E-Service, 3(2), 35–58. https://doi.org/10.2979/ESJ.2004.3.2.35.
10.1080/13645570902996301. Minhas, S., & Hussain, A. (2014). Linguistic correlates of deception in financial text a
Imran-Daud, M., Sánchez, D., & Viejo, A. (2016). Privacy-driven access control in social corpus linguistics based approach. Psychology Review, 19, 307–342.
networks by means of automatic semantic annotation. Computer Communications, 76, Missaglia, A. L., Oppo, A., Mauri, M., Ghiringhelli, B., Ciceri, A., & Russo, V. (2017). The
12–25. https://doi.org/10.1016/j.comcom.2016.01.001. impact of emotions on recall: An empirical study on social ads. Journal of Consumer
Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and Behaviour, 16(5), 424–433.
privacy protection. Computer, 51(8), 56–59. https://doi.org/10.1109/ Morse, T., & Birnhack, M. (2020). The posthumous privacy paradox: Privacy preferences
MC.2018.3191268. and behavior regarding digital remains. New Media & Society, Article
Iyengar, S., Sood, G., & Lelkes, Y. (2012). Affect, not ideologya social identity perspective 1461444820974955.
on polarization. Public Opinion Quarterly, 76(3), 405–431. https://doi.org/10.1093/ Ndumu, A. (2019). Linkages between information overload and acculturative stress: The
poq/nfs038. case of Black diasporic immigrants in the US. Journal of Librarianship and Information
Jiang, B., Liang, J., Sha, Y., Li, R., Liu, W., Ma, H., et al. (2016). Retweeting behavior Science. doi: 0961000619857115.
prediction based on one-class collaborative filtering in social networks. In Netzer, Y., Tenenboim-Weinblatt, K., & Shifman, L. (2014). The construction of
Proceedings of the 39th International ACM SIGIR Conference on Research and participation in news websites: A five–Dimensional model. Journalism Studies, 15(5),
Development in Information Retrieval (pp. 977–980). https://doi.org/10.1145/ 619–631. https://doi.org/10.1080/1461670X.2014.895527.
2911451.2914713. Nisar, T. M., & Yeung, M. (2018). Attribution modeling in digital advertising: An
Jimenez-Marquez, J. L., Gonzalez-Carrasco, I., Lopez-Cuadrado, J. L., & Ruiz-Mezcua, B. empirical investigation of the impact of digital sales channels. Journal of Advertising
(2019). Towards a big data framework for analyzing social media content. Research, 58(4), 399–413.
International Journal of Information Management, 44, 1–12. https://doi.org/10.1016/ Öberg, C., & Alexander, A. T. (2019). The openness of open innovation in
j.ijinfomgt.2018.09.003. ecosystems–Integrating innovation and management literature on knowledge
Jones, S., Ball, A., & Ekmekcioglu, Ç. (2008). The data audit framework: A first step in linkages. Journal of Innovation & Knowledge, 4(4), 211–218. https://doi.org/
the data management challenge. International Journal of Digital Curation, 3(2). 10.1016/j.jik.2017.10.005.
Judson, K. M., Devasagayam, P. R., & Buff, C. L. (2012). Self-perceived brand relevance Oestreicher-Singer, G., & Zalmanson, L. (2013). Content or community? A digital
of and satisfaction with social media. Marketing Management Journal, 22(2), business strategy for content providers in the social age. MIS Quarterly, 591–616.
131–144. Omilion-Hodges, L. M., & Rodriguez, M. (2014). The effect of system generated cues on
Kache, F., & Seuring, S. (2017). Challenges and opportunities of digital information at the users perceptions of organizational trustworthiness, competence and goodwill.
intersection of Big Data Analytics and supply chain management. International Journal of Media and Communication Studies, 6(10), 161–164. https://doi.org/
Journal of Operations & Production Management. 10.5897/JMCS2014.0405.
Kar, A. K., & Dwivedi, Y. K. (2020). Theory building with big data-driven Orlikowski, W. J., & Baroudi, J. J. (1991). Studying information technology in
research–Moving away from the “What” towards the “Why. International Journal of organizations: Research approaches and assumptions. Information Systems Research,
Information Management, 54, Article 102205. https://doi.org/10.1016/j. (2:1), 1–28. https://doi.org/10.1287/isre.2.1.1.
ijinfomgt.2020.102205. Pachidi, S., Spruit, M., & Van De Weerd, I. (2014). Understanding users’ behavior with
Karegar, F., Pettersson, J. S., & Fischer-Hübner, S. (2020). The dilemma of user software operation data mining. Computers in Human Behavior, 30, 583–594.
engagement in privacy notices. ACM Transactions on Privacy and Security, 23(1), Paine, C., Reips, U. D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users’
1–38. https://doi.org/10.1145/3372296. perceptions of ‘privacy concerns’ and ‘privacy actions’. International Journal of
Kaufhold, M. A., Rupp, N., Reuter, C., & Habdank, M. (2020). Mitigating information Human-computer Studies, 65(6), 526–536. https://doi.org/10.1016/j.
overload in social media during conflicts and crises: Design and evaluation of a cross- ijhcs.2006.12.001.
12
J.R. Saura et al. International Journal of Information Management 60 (2021) 102331
Palos-Sanchez, P., Saura, J. R., & Martin-Velicia, F. (2019). A study of the effects of International Journal of Information Management, 39, 156–168. https://doi.org/
Programmatic Advertising on users’ Concerns about Privacy overtime. Journal of 10.1016/j.ijinfomgt.2017.12.002.
Business Research, 96(2019), 61–72. https://doi.org/10.1016/j.jbusres.2018.10.059. Su, C., & Contractor, N. (2011). A multidimensional network approach to studying team
Panahi, S., Watson, J., & Partridge, H. (2016). Fostering interpersonal trust on social members’ information seeking from human and digital knowledge sources in
media: Physicians’ perspectives and experiences. Postgraduate Medical Journal, 92 consulting firms. Journal of the American Society for Information Science and
(1084), 70–73. https://doi.org/10.1136/postgradmedj-2015-133270. Technology, 62(7), 1257–1275. https://doi.org/10.1002/asi.21526.
Pangrazio, L., & Selwyn, N. (2019). Personal data literacies’: A critical literacies Szymczak, H., Kücükbalaban, P., Lemanski, S., Knuth, D., & Schmidt, S. (2016). Trusting
approach to enhancing understandings of personal digital data. New Media & Society, Facebook in crisis situations: The role of general use and general trust toward
21(2), 419–437. https://doi.org/10.1177/1461444818799523. Facebook. Cyberpsychology, Behavior and Social Networking, 19(1), 23–27. https://
Peng, G. (2010). Critical mass, diffusion channels, and digital divide. Journal of Computer doi.org/10.1089/cyber.2015.0450.
Information Systems, 50(3), 63–71. https://doi.org/10.1080/ Tahir, M., Habaebi, M. H., Dabbagh, M., Mughees, A., Ahad, A., & Ahmed, K. I. (2020).
08874417.2010.11645408. A review on application of blockchain in 5G and beyond networks: Taxonomy, field-
Prasarnphanich, P., & Wagner, C. (2009). Explaining the sustainability of digital trials, challenges and opportunities. IEEE Access : Practical Innovations, Open
ecosystems based on the wiki model through critical-mass theory. IEEE Transactions Solutions, 8, 115876–115904. https://doi.org/10.1109/access.2020.3003020.
on Industrial Electronics, 58(6), 2065–2072. https://doi.org/10.1109/ Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking
TIE.2009.2027248. web sites. Internet Research.
Pratesi, F., Gabrielli, L., Cintia, P., Monreale, A., & Giannotti, F. (2020). PRIMULE: Tang, A. K. (2016). Mobile app monetization: App business models in the digital era.
Privacy risk mitigation for user profiles. Data & Knowledge Engineering, 125, Article International Journal of Innovation Management and Technology, 7(5), 224.
101786. https://doi.org/10.1016/j.datak.2019.101786. Tene, O., & Polenetsky, J. (2012). To track or do not track: Advancing transparency and
Prince, C. (2018). Do consumers want to control their personal data? Empirical evidence. individual control in online behavioral advertising. Minn. JL Sci. & Tech., 13, 281.
International Journal of Human-computer Studies, 110, 21–32. https://doi.org/ Tenkanen, H., Di Minin, E., Heikinheimo, V., Hausmann, A., Herbst, M., Kajala, L., et al.
10.1016/j.ijhcs.2017.10.003. (2017). Instagram, Flickr, or Twitter: Assessing the usability of social media data for
Pritchard, J. K., Stephens, M., & Donnelly, P. (2000). Inference of population structure visitor monitoring in protected areas. Scientific Reports, 7(1), 1–11. https://doi.org/
using multilocus genotype data. Genetics, 155(2), 945–959. 10.1038/s41598-017-18007-4.
Qi, L., Zhang, X., Li, S., Wan, S., Wen, Y., & Gong, W. (2020). Spatial-temporal data- Törnberg, A., & Törnberg, P. (2016). Muslims in social media discourse: Combining topic
driven service recommendation with privacy-preservation. Information Sciences, 515, modeling and critical discourse analysis. Discourse Context & Media, 13, 132–142.
91–102. https://doi.org/10.1016/j.ins.2019.11.021. https://doi.org/10.1016/j.dcm.2016.04.003.
Qian, J., Qiu, F., Wu, F., Ruan, N., Chen, G., & Tang, S. (2016). Privacy-preserving Trabucchi, D., & Buganza, T. (2019). Data-driven innovation: Switching the perspective
selective aggregation of online user behavior data. IEEE Transactions on Computers. on Big Data. European Journal of Innovation Management.
https://doi.org/10.1109/tc.2016.2595562, 1–1. Tsvere, M., Swamy, S., & Nyaruwata, T. L. (2013). Perceived competence of Zimbabwean
Ramirez-Andreotta, M. D., Brody, J. G., Lothrop, N., Loh, M., Beamer, P. I., & Brown, P. academics in the use of information technology in university academic business.
(2016). Improving environmental health literacy and justice through environmental International Journal of Science and Research, 2(8), 284–289.
exposure results communication. International Journal of Environmental Research and Utz, S., & Krämer, N. C. (2009). The privacy paradox on social network sites revisited:
Public Health, 13(7), 690. https://doi.org/10.3390/ijerph13070690. The role of individual characteristics and group norms. Cyberpsychology Journal of
Rayson, P., & Garside, R. (2000). Comparing corpora using frequency profiling. In The Psychosocial Research on Cyberspace, 3(2).
Workshop on Comparing Corpora (pp. 1–6). https://doi.org/10.3115/ Vanhala, M., Lu, C., Peltonen, J., Sundqvist, S., Nummenmaa, J., & Järvelin, K. (2020).
1117729.1117730. The usage of large data sets in online consumer behaviour: A bibliometric and
Reyes-Menendez, A., Saura, J. R., & Stephen, B. T. (2020). Exploring key indicators of computational text-mining–Driven analysis of previous research. Journal of Business
social identity in the #MeToo era: Using discourse analysis in UGC. International Research, 106, 46–59. https://doi.org/10.1016/j.jbusres.2019.09.009.
Journal of Information Management, 54, Article 102129. https://doi.org/10.1016/j. Vinerean, S., Cetina, I., Dumitrescu, L., & Tichindelean, M. (2013). The effects of social
ijinfomgt.2020.102129. media marketing on online consumer behavior. International Journal of Business and
Ricciardi, F., Zardini, A., & Rossignoli, C. (2018). Organizational integration of the IT Management, 8(14), 66.
function: A key enabler of firm capabilities and performance. Journal of Innovation & Westerman, D., Spence, P. R., & Van Der Heide, B. (2014). Social media as information
Knowledge, 3(3), 93–107. https://doi.org/10.1016/j.jik.2017.02.003. source: Recency of updates and credibility of information. Journal of Computer-
Roberts, L. D. (2015). Ethical issues in conducting qualitative research in online Mediated Communication, 19(2), 171–183. https://doi.org/10.1111/jcc4.12041.
communities. Qualitative Research in Psychology, 12(3), 314–325. https://doi.org/ Wohn, D. Y., Lee, Y. H., Sung, J., & Bjornrud, T. (2010). Building common ground and
10.1080/14780887.2015.1008909. reciprocity through social network games. CHI’10 Extended Abstracts on Human
Romansky, R. (2019). A survey of informatization and privacy in the digital age and Factors in Computing Systems, 4423–4428. https://doi.org/10.1145/
basic principles of the new regulation. International Journal on Information 1753846.1754164.
Technologies and Security, 11(1), 95–106. Wu, H., Yue, K., Pei, Y., Li, B., Zhao, Y., & Dong, F. (2016). Collaborative topic regression
Rosa, H., Carvalho, J. P., Astudillo, R., & Batista, F. (2015). Detecting user influence in with social trust ensemble for recommendation in social media systems. Knowledge-
twitter: Pagerank vs. Katz, a case study. In Proceedings of the Seventh European based Systems, 97, 111–122. https://doi.org/10.1016/j.knosys.2016.01.011.
Symposium on Computational Intelligence and Mathematics (pp. 7–10). Xie, W., & Karan, K. (2019). Consumers’ privacy concern and privacy protection on
Sarkis, J., Zhu, Q., & Lai, K. H. (2011). An organizational theoretic review of green social network sites in the era of big data: Empirical evidence from college students.
supply chain management literature. International Journal of Production Economics, Journal of Interactive Advertising, 19(3), 187–201.
130(1), 1–15. https://doi.org/10.1016/j.ijpe.2010.11.010. Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud
Saura, J. R. (2020). Using data sciences in digital marketing: Framework, methods, and storage: A survey. IEEE Access : Practical Innovations, Open Solutions, 8,
performance metrics. Journal of Innovation & Knowledge, 1(2020). https://doi.org/ 131723–131740. https://doi.org/10.1109/access.2020.3009876.
10.1016/j.jik.2020.08.001. Ye, Q., Law, R., Gu, B., & Chen, W. (2011). The influence of user-generated content on
Saxena, D., & Lamest, M. (2018). Information overload and coping strategies in the big traveler behavior: An empirical investigation on the effects of e-word-of-mouth to
data context: Evidence from the hospitality sector. Journal of Information Science, 44 hotel online bookings. Computers in Human Behavior, 27(2), 634–639. https://doi.
(3), 287–297. https://doi.org/10.1177/0165551517693712. org/10.1016/j.chb.2010.04.014.
Schoen, H., Gayo-Avello, D., Metaxas, P. T., Mustafaraj, E., Strohmaier, M., & Gloor, P. Yeon Cho, J., Ko, D., & Gyou Lee, B. (2018). Strategic approach to privacy Calculus of
(2013). The power of prediction with social media. Internet Research. https://doi. wearable device user regarding information disclosure and continuance intention.
org/10.1108/IntR-06-2013-0115. Transactions on Internet and Information Systems, 12(7). https://doi.org/10.3837/
Sembada, A. Y., & Koay, K. Y. (2019). How perceived behavioral control affects trust to tiis.2018.07.020.
purchase in social media stores. Journal of Business Research, 2019. https://doi.org/ Yu, C., Zhang, Z., Lin, C., & Wu, Y. J. (2019). Can data-driven precision marketing
10.1016/j.jbusres.2019.09.028. promote user ad clicks? Evidence from advertising in WeChat moments. Industrial
Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. Marketing Management. https://doi.org/10.1016/j.indmarman.2019.05.001.
The Information Society, 18(1), 21–32. https://doi.org/10.1080/ Zhong, W., Yin, X., Zhang, X., Li, S., Dou, W., Wang, R., et al. (2020). Multi-dimensional
01972240252818207. quality-driven service recommendation with privacy-preservation in mobile edge
Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of environment. Computer Communications, 157, 116–123. https://doi.org/10.1016/j.
playfulness, critical mass and trust in a hedonic context. Journal of Computer comcom.2020.04.018.
Information Systems, 49(4), 74–83. Zhou, L., Wu, D., Wei, X., & Dong, Z. (2019). Seeing isn’t believing: QoE evaluation for
Spence, P. R., Lachlan, K. A., Westerman, D., & Spates, S. A. (2013). Where the gates privacy-aware users. IEEE Journal on Selected Areas in Communications, 37(7),
matter less: Ethnicity and perceived source credibility in social media health 1656–1665. https://doi.org/10.1109/jsac.2019.2916452.
messages. Howard Journal of Communications, 24(1), 1–16. https://doi.org/10.1080/ Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information
10646175.2013.748593. civilization. Journal of Information Technology, 30(1), 75–89. https://doi.org/
Steinfeld, N. (2016). “I agree to the terms and conditions”: (how) do users read privacy 10.1057/jit.2015.5.
policies online? An eye-tracking experiment. Computers in Human Behavior, 55, Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the
992–1000. new frontier of power. Profile books.
Stieglitz, S., Mirbabaie, M., Ross, B., & Neuberger, C. (2018). Social media
analytics–Challenges in topic discovery, data collection, and data preparation.
13