=Paper= {{Paper |id=Vol-2985/paper3 |storemode=property |title=Students’ Information Privacy Concerns in Learning Analytics: Towards Model Development |pdfUrl=https://ceur-ws.org/Vol-2985/paper3.pdf |volume=Vol-2985 |authors=Chantal Mutimukwe,Jean Damascene Twizeyimana,Olga Viberg }} ==Students’ Information Privacy Concerns in Learning Analytics: Towards Model Development== https://ceur-ws.org/Vol-2985/paper3.pdf
Students’ Information Privacy Concerns in Learning Analytics:
Towards Model Development
Chantal Mutimukwea, Jean Damascene Twizeyimanab and Olga Viberga
a
     KTH Royal Institute of Technology, Stockholm, 10044, Sweden
b
     University of Rwanda, Kigali, Rwanda

Abstract
The widespread interest in learning analytics (LA) is associated with increased availability of and access
to student data where students’ actions are monitored, recorded, stored and analyzed. The availability and
analysis of such data is argued to be crucial for improved learning and teaching. Yet, these data can be
exposed to misuse, for example, to be used for commercial purposes, consequently, resulting in
information privacy concerns (IPC) of students who are the key stakeholders and data subjects in the LA
context. The main objective of this study is to propose a theoretical model to understand the IPC of students
in relation to LA. We explore the concept of IPC as a central construct between its two antecedents:
perceived privacy vulnerability and perceived privacy control, and its consequences, trusting beliefs and
self-disclosure behavior. Although these relationships have been investigated in other contexts, this study
aims to offer mainly theoretical insights on how these relationships may be shaped in the context of LA in
higher education. Understanding students’ IPC, the related root causes and consequences in LA is the key
step to a more comprehensive understanding of privacy issues and the development of effective privacy
practices that would protect students’ privacy in the evolving setting of data-driven higher education.

Keywords 1
Information Privacy Concerns, Learning Analytics, Students, Higher Education, Model Development.

1. Introduction

Learning Analytics (LA) refers to “the measurement, collection, analysis and reporting of data
about learners and their contexts, for purposes of understanding and optimizing learning and
the environments in which it occurs” [1, p.34]. Although the practices of data collection,
analysis, and reporting are beneficial for improved teaching and learning [2], they are also
associated with the risks of privacy violation of students’ personal information [3]–[5]. One of
the most critical issues is that students’ personal information can be accessed and used for
commercial purposes without student’s awareness and/or consent [6]. Based on that, scholars
highlight the need for further research that takes into account information privacy concerns of
students in relation to LA [3], [7].
    Information privacy concerns (IPC) have been identified as a major and central construct
in various studies that have attempted to conceptualize ‘information privacy’ in different
contexts, including social media, commerce, governance, and health care contexts e.g., [9]–
[11]. IPC refer to individual concerns about the possible loss of privacy as a result of
information disclosure to a specific external agent/institution [12]. Such concerns may vary
from the intrusion of an individual’s privacy to potential breaches that can lead to identity theft
[13]. IPC reflect an individual’s perception of his/her concerns/worry for how his/her personal
information is handled by a specific institution, and this is different from his/her expectations,
______________________________________________________________________
Nordic Learning Analytics Summer Institute, 23 August, 2021, Stockholm (online)
EMAIL: chantal@kth.se (C. Mutimukwe); damas3d@gmail.com (J. D. Twizeyimana), oviberg@kth.se (O. Viberg)
ORCID: 0000-0002-5966-7649 (C. Mutimukwe);0000-0002-3249-0599 (J. D. Twizeyimana); 0000-0002-8543-3774 (O.Viberg)
                               © 2020 Copyright for this paper by its authors.
                               Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
    CEUR
    Wor
    Pr
       ks
        hop
     oceedi
          ngs
                ht
                I
                 tp:
                   //
                    ceur
                       -
                SSN1613-
                        ws
                         .or
                       0073
                           g

                               CEUR Workshop Proceedings (CEUR-WS.org)
     general perceptions, or awareness of how the institution should handle his or her personal
information [10].
     Researchers in information system have earlier identified a number of factors, including
awareness of information collection, unauthorized access, perceived vulnerability to
information misuse, experience with Internet use, cultural background of users to be
antecedents to individuals’ IPC [14]–[17]. The consequences of such concerns could range
from individuals declining or refusing to disclose personal information, and/or mistrust of
online service [18], [19]. In the context of LA, all these consequences can slow down and
hinder the adoption of LA, at scale. A stressed by Tsai et al. [20. p.230], “the associated [with
LA promises to support adaptive learning in higher education] issues around privacy
protection, especially their implications for students as data subjects, has been a hurdle to wide-
scale adoption”.
     As mentioned above, there is a significance number of studies that have explored IPC in
different contexts (e.g., e-commerce, e-government, e-health, social media), but our analysis
of extant literature shows this matter has so far received little attention in the context of LA.
Studies that explored students’ privacy – sometimes intermingled with other ethical issues from
the student perspectives in LA – focused on expectations, e.g., [21], [22], perceptions e.g., [3],
awareness e.g., [23], and preferences e.g., [24]. To our knowledge, few studies developed
models and/or carried empirical studies to explain the construct of IPC, by together exploring
its antecedents, and consequences.
     Researchers suggest that to better address the problems of information privacy within a
certain context, it is crucial to first comprehend the nature of IPC, its root causes, and
consequences from data subject perspective in that particular context e.g., [17], [18]. Moreover,
others stress that IPC is context-specific, and it is important to understand how they may vary
from one context to another or may be shaped by the type of information, the level of
sensitivity, and the types of institutions and data collection and analysis practices [9], [19].
     To address the gap in the existing research, this study aims at proposing a model that would
explain the construct of IPC from the student – the primary data subjects – perspective in the
LA context. We explore it as a central construct, between its two antecedents; perceived
privacy risks and perceived privacy control, and its consequences, trusting beliefs, and self-
disclosure behavior. For this study, we consider students from high education institutions since
the prevailing part of the LA research has hitherto been performed in the setting of higher
education [2]. Yet, Slade et al. [8] pointed out that higher education institutions are increasingly
making a complex, but fluid context where governments, business entities, and data brokers
can collect, analyze and exchange information.

2. Research background
2.1. Defining privacy

Privacy is a complex concept that is associated with several interrelated definitions and
interpretations. Some scholars define privacy is the desire of people to have the freedom of
choice under whatever circumstances and to whatever extent they expose their attitude and
behavior to others [25]. Others state that privacy “represents the control of transactions between
person(s) and other(s), the ultimate aim of which is to enhance autonomy and/or minimize
vulnerability” [26, p.10]. Moreover, researchers have suggested that privacy is one's ability to
control information about oneself [27], [28]. Different definitions and interpretations of
privacy have led to the observation that there is a general lack of consensus on what privacy
means. Because of the difficulties in defining privacy and also because the salient relationships
depend more on cognitions and perceptions than on rational assessments, most empiric privacy
research in the social sciences relies on the measurement of a privacy-related proxy of some
sort [12].
     In the information systems field for example, there has been a movement toward the
measurement of IPC as the central construct between different antecedents and/or
consequences [12]. Many studies have developed models with the aim of exploring the concept
of IPC from data subjects in different contexts, including ecommerce, e-government, e-health,
and social media e.g., [10], [12], [16]–[18], [29], [30]. However, in the context of LA research
in higher education, the IPC concept from the student perspective has been hitherto unexplored,
and this study aims to fill this gap by proposing a relevant theoretical model.

2.2.   Related studies

Unlike other contexts, to our knowledge, there is a lack of literature, related evidence as well
as knowledge that pays attention to and explains students’ IPC related to LA, in the context of
higher education. The vast majority of studies that addressed privacy issues in this context have
been largely focused on the institutional perspective rather than on the student perspectives [7].
Few of the studies that attempted to cover this gap include the study of Ifenthaler and
Schumacher [3]; they conducted a quasi-experimental study for surveying students' preferences
for LA systems, their attitudes toward privacy as they relate to specific types of data, and how
their attitudes influence the acceptance of LA systems. The results revealed that students
consider some types of data (e.g., course enrollment, course results) to be much more important
to keep private than others (e.g., medical data, income, marital status).
     In another study, [28] carried out a survey aimed at investigating students' satisfaction with
the practice of LA. Their findings showed students in particular were agreeable to the use of
data to monitor their learning activity, and there was an overall acceptance of data usage to
improve their grades. Jones et al. [31] conducted interviews to see how US students perceive
privacy in relation to LA. The students highlighted that the process of data collection, sharing
and usage should be clear to them. The study’s findings stress that there is a general lack of
awareness among students about the importance and functionality of LA.
     Based on the views of students at the Open University (UK), Slade et al. [8] explored
differences between students’ attitudes to privacy and their online behaviors. The results
indicated that there was a lower level of awareness about the collection, analysis and use of
personal data. Also, the findings revealed that there is no obvious relationship between
students’ online frequency, privacy awareness and what they actually do to protect themselves.
The findings also indicated that students trust their university to use their data appropriately
and ethically.
     The study of Whitelock-Wainwright et al. [21] developed and validated the instrument
SELAQ to measure ‘ethical and privacy expectations’ and LA ‘service feature expectations’
from the student perspective. The instrument was primarily validated from a UK university.
One of the more recent studies [22] validated SELAQ in other three contexts – Estonian,
Spanish, and Dutch universities – to assess how students’ expectations may vary from one
context to another. The findings show that the model provided acceptable fits in both the
Spanish and Dutch context, but was not supported in the Estonian student context.
      In another recent work, Botnevik [32] utilized several privacy principles (i.e.,
accountability, accuracy, anonymity, awareness, consent, data ownership, data security, data
sharing, data preservation, limited access, opt-out, personal access, personal control, purpose,
relevance, trust) as indicators to measure students’ privacy perceptions in LA. The results
suggest that the majority of students accept the use of LA but with data security and consent
as the most important privacy principles for students. Also, Jones et al. [31] carried out an
investigation to understand students’ expectations of privacy issues related to LA, and their
study showed that while students have high expectations of how the university handles their
data, but they also held a self-protective attitude towards personal data.
     All in all, a brief analysis of the aforementioned studies highlights that there is already
some research literature in regards to understanding privacy issues and students’ expectations
and perceptions of LA, but there is still limited understanding of the concept of IPC. The
majority of studies investigated students’ awareness of privacy related issues, preferences and
expectations, and overall, the related insights from their studies do not reveal students’
concerns in relation to IPC. Thong and Hong [10] posit that perception of one’s concern for
others’ behavior is different from one’s expectation of others’ behavior. From that, they also
stress that IPC reflects an individual’s perception of his or her concern for how personal
information is handled by a certain institution, which is different from his or her expectation
of how institutions should handle his or her personal information [10]. For example, an
individual may expect an institution to provide adequate protection of his or her personal
information, but it does not necessarily mean that this individual is genuinely concerned about
providing his or her personal information to a specific agent. In the LA setting, “privacy
expectations refer to how the university collects and analyses student data, specifically
encompassing student expectations towards the provision of consent and the security of the
data itself” [20]. This may imply that to investigate students’ privacy expectations can help to
reveal students’ beliefs toward university privacy practices, but not necessarily individual
beliefs or concerns that are based for example, on personal experience and privacy awareness
gained from outside university boundaries.

3. Research Model

The present study aims at proposing a model that explores the concept of IPC from a student
perspective in the LA context. To take one step further toward a more cohesive knowledge
base that can guide a more responsible implementation of LA in higher education practice, we
propose a model that is inspired by the APCO (antecedents–IPC–consequences) framework
proposed by Smith et al. [33], by including constructs originating from the related previous
studies’ results. We have adapted two antecedents; perceived vulnerability, and perceived
ability to control from Dinev and Hart [16]. The motivation to start with these two constructs
is grounded in the fact that these constructs account for concerns an individual can develop
when determining whether to disclose personal information or not. These constucts “are related
to a ‘privacy calculus’ that is, an assessment individuals make that their personal information
will subsequently be used fairly and they will not suffer negative consequences”[16]. Further,
the relationships between them and IPC are based on different interpretations and definitions
of privacy per se [16]. Other previous studies (e.g., [10], [17]–[19]) have been also considered
perceived vulnerability and/ or perceived ability to control as antecedents of IPC constructs.
     Dinev and Hart [16] did not consider the consequences of IPC, but they suggested that
future research may include other factors (e.g., trust) that may play an important role in
mediating the control, vulnerability, and privacy concerns relationship. Other studies,
including [10], [17], [19], [33] hypothesized that it is important to not only explore individual
concerns or control-risks but to also explore how these concerns can be translated into trusting
beliefs and information disclosure behaviors, that have also been found important in the
learning analytics setting (Slade et al., 2019). Consequently, in our proposed model we include
two more constructs (i.e., consequences of IPC), namely trusting beliefs and self-disclosure
behaviors.
     In summary, the research model (Figure 1) underlying the present research takes into
account five constructs: the mediating variable; 1) information privacy concerns (IPC), two
independent variables: 2) perceived vulnerability and 3) perceived ability to control, and two
dependent variables: 4) trusting beliefs and 5) self-disclosure behavioral. For this study, we
understand perceived vulnerability as “the perceived potential risk when personal information
is revealed and has been considered in the literature as a factor that determines the perceived
state of privacy and individual experiences” [16, p.415], and perceived ability to control as
privacy control as the individual’s beliefs in his or her ability to manage the release and
dissemination of personal information [12], [16]. We consider trusting beliefs as the degree to
which organizations (e.g., higher educational institutions) are dependable in protecting users’
(e.g., students’) personal information [18] and self-disclosure behaviors generally involve
revealing information about oneself to others [34]. The relationship between these constructs
resulted in 8 hypotheses.




Figure 1. Research model

       1. Increased perceived vulnerability increases IPC.
       2. Increased perceived privacy vulnerability positively affects non-self-disclosure
          behavior.
       3. Increased perceived vulnerability negatively affects trusting beliefs.
       4. Increased perceived ability control reduces information privacy concerns.
       5. Perceived ability to control reduces non-self-disclosure behavior.
       6. Perceived ability to control increases trusting belief.
       7. Information privacy concerns increase non-self-disclosure behavior.
       8. Information privacy concerns reduce trusting beliefs.
Below, we present the theoretical foundation of the suggested hypotheses.

4. Research hypotheses
4.1. The effect of perceived vulnerability to information privacy concerns,
trusting beliefs and self-disclosure behavior

The notion of vulnerability emerges from the complex definition of privacy. Perceived
vulnerability describes the perceived potential risk when personal information is revealed and
has been considered in the literature as a factor that determines the perceived state of privacy
and individual experiences [16]. Various studies [12], [34]–[36] have shown that perceived
vulnerability strongly influences individuals’ IPC. Within the context of LA, students are
exposed to a risk of misuse and abuse of personal information that might raise the perception
of vulnerability e.g., [37]. They can be exposed to problems of surreptitious collection of, and
unauthorized access to, their personal information that can be caused by many factors including
insider curiosity or external threats [20]. All these factors contribute to increased perceived
vulnerability on the students' side, and thus, their concerns related to information privacy[16].
Hence, we hypothesize that:
H1: Increased perceived vulnerability increases IPC
     The perceived vulnerability is associated with risk that may affect an individual
emotionally, materially, and physically [38]. In the LA setting, one risk that is associated with
students’ perceptions of privacy vulnerability is their awareness of the LAs’ practices of
collecting, analyzing, and reporting personal information. Consciously and unconsciously
students may experience privacy vulnerability regarding the use of their personal data. This
can deter students from sharing their personal information, perhaps even leading them to the
provision of incomplete, false or inaccurate information [39]. Hence, we assume that students
with high vulnerability perceptions should exhibit self-limitation toward disclosing personal
information, such as refusing to give information to an institution because it is considered too
personal. In line with this reasoning, we hypothesize that:
H2: Increased perceived privacy vulnerability positively affects non-self-disclosure behavior.
     Malhotra et al. [18] define trusting beliefs as the degree to which organizations are
dependable in protecting users' personal information. Others explain trusting beliefs as
individual's beliefs that an organization (e.g., higher educational institution) will act according
to their expectations, without exploiting their vulnerabilities [40]. To gain users’(students’)
confidence, organizations need to gain trust of the users so that if users were to allow
organizations to access their personal information, this information will be safe and will not be
exploited [41]. It has been also indicated that perceived privacy vulnerability influences the
beliefs of trustworthiness. For example, Dinev and Hart [34] highlighted a direct negative
effect of perceived vulnerability on individual trust on online services or institutions.
Correspondingly, Liu et al. [42] suggest that the higher the perceived risks or vulnerability the
lower level of trust. Consistent with them, we hypothesize that:
H3: Increased perceived vulnerability negatively affects trusting beliefs.

4.2. The effect of perceived ability to control to information privacy
concerns, trusting beliefs and self-disclosure behavior

The ability to control individuals' information privacy is also embedded in the definition of
privacy. Dinev & Hart [16] found that control is one of the major factors influencing privacy
concerns. Other studies showed that low perceptions of control lead individuals to have high
levels of IPC [43], and vice versa for high perceptions of privacy control [17]. Therefore, we
hypothesize that:
H4: Increased perceived privacy control reduces information privacy concerns.
    Previous studies argued that when control is not allowed or when the future use of
information is not known, individuals distrust organizations [44], and consider that control is
possible only through limiting self-disclosure [18], [45]. Hence, we hypothesize that:
H5: Perceived privacy control increases non-self-disclosure behavior, and
H6: Perceived privacy control increases trusting belief.

4.3. The effect of information privacy concerns to trusting beliefs and self-
disclosure behavior
Researchers posit that people are more willing to disclose their personal information in online
interactions if they perceive less information privacy concerns e.g., [35], [46], [47]. Moreover,
Steward and Segars [30] also stress that individuals of high level of IPC are prone to non-self-
disclosure behavior such as removing their names from mailing lists and refusing to provide
personal information in the future. Consistent with this, we hypothesize that:
H7: Information privacy concerns increase non-self-disclosure behavior.
     A consensus in the privacy-trust literature shows that individuals with high levels of IPC
are likely to be low in trusting beliefs [18]. In addition, Thong and Hong [10] in their study,
confirmed a significant negative effect of IPC to trusting beliefs. From that we also
hypothesized that:
H8: Information privacy concerns reduces trusting beliefs.

5. Conclusion

In this study, we have proposed a theoretical model that aims to unveil students’ information
privacy concerns in regard to learning analytics in higher education. The concept of students’
information privacy concerns is one of the key pillars in a more comprehensive understanding
of students’ privacy. A further theoretical justification as well as an empirical validation of the
proposed model across different higher educational settings and cultures will assist in
developing and practicing more effective practices at different levels aimed at protecting
students’ privacy in online higher education settings.

6. References

[1]    P. Long and G. Siemens, “Penetrating the Fog: Analytics in Learning and Education.”
       EDUCAUSE REVIEW, pp. 31–40, 2011.
[2]    O. Viberg, M. Hatakka, O. Bälter, and A. Mavroudi, “The current landscape of
       learning analytics in higher education Olga,” Comput. Hum. Behav. J., vol. 89, no.
       July, pp. 98–110, 2018.
[3]    D. Ifenthaler and C. Schumacher, “Student perceptions of privacy principles for
       learning analytics,” Educ. Technol. Res. Dev., vol. 64, no. 5, pp. 923–938, 2016.
[4]    R. Kimmons, “Safeguarding student privacy in an age of analytics,” Educ. Technol.
       Res. Dev., vol. 69, no. 1, pp. 343–345, 2021.
[5]    J. Park and A. Vance, “Data Privacy in Higher Education: Yes, Students Care.”
       EDUCAUSE REVIEW, 2021.
[6]    M. Alier, C. Severance, and D. Amo, “Learner Privacy , a pending assignment,” in
       Eighth International Conference on Technological Ecosystems for Enhancing
       Multiculturality (TEEM’20), 2020, pp. 725–729.
[7]    M. Mahmoud, “Learning analytics stakeholders ’ expectations in higher education
       institutions : a literature review,” Int. J. Inf. Learn. Technol., vol. 38, no. 1, pp. 33–48,
       2021.
[8]    S. Slade, P. Prinsloo, and M. Khalil, “Learning analytics at the intersections of student
       trust , disclosure and benefit,” in The 9th International Learning Analytics &
       Knowledge Conference (LAK19), 2019, pp. 235–244.
[9]    F. Bélanger and R. E. Crossler, “Privacy in the digital age: A review of information
       privacy research in information systems,” MIS Q., vol. 35, no. 4, pp. 1017–1041, 2011.
[10]   W. Hong and J. Y. L. Thong, “Internet Privacy Concerns: An Integrated
       Conceptualization and Four Empirical Studies,” MIS Q., vol. 37, no. 1, pp. 275–298,
       2013.
[11]   D. K. Rath and A. Kumar, “Information privacy concern at individual , group ,
       organization and societal level - a literature review,” Vilakshan - XIMB J. Manag., no.
       January, 2021.
[12]   H. Xu, T. Dinev, J. Smith, and P. Hart, “Information Privacy Concerns : Linking
       Individual Perceptions with Institutional Privacy Assurances.,” J. Assoc. Inf. Syst., vol.
       12, no. 12, pp. 798–824, 2011.
[13]   S. Bandyopadhyay, “Antecedents And Consequences Of Consumers Online Privacy
       Concerns,” J. Bus. Econ. Res., vol. 7, no. 3, pp. 41–48, 2009.
[14]   H. J. Smith, S. J. Milberg, and S. J. Burke, “Information Privacy: Measuring
       Individuals’ Concerns about Organizational Practices,” Manag. Inf. Syst. Q., vol. 20,
       no. 2, pp. 167–196, 1996.
[15]   S. Bellman, E. J. Johnson, S. J. Kobrin, and G. L. Lohse, “International differences in
       information privacy concerns: A global survey of consumers,” Inf. Soc., vol. 20, no. 5,
       pp. 313–324, 2004.
[16]   T. Dinev and P. Hart, “Internet privacy concerns and their antecedents - measurement
       validity and a regression model,” Behav. Inf. Technol., vol. 23, no. 6, pp. 413–422,
       2004.
[17]   Y. Chang, S. F. Wong, C. F. Libaque-Saenz, and H. Lee, “The role of privacy policy
       on consumers’ perceived privacy,” Gov. Inf. Q., vol. 35, no. 3, pp. 1–15, 2018.
[18]   N. K. Malhotra, S. S. Kim, and J. Agarwal, “Internet users’ information privacy
       concerns (IUIPC): The construct, the scale, and a causal model,” Inf. Syst. Res., vol.
       15, no. 4, pp. 336–355, 2004.
[19]   C. Mutimukwe, E. Kolkowska, and Å. Grönlund, “Information privacy in e-service :
       Effect of organizational privacy assurances on individual privacy concerns ,
       perceptions , trust and self-disclosure behavior,” Gov. Inf. Q., vol. 37, no. 1, 2020.
[20]   Y. Tsai, A. Whitelock-wainwright, and D. Gasevic, “The privacy paradox and its
       implications for learning analytics,” in the 10th International Conference on
       LearningAnalytics andKnowledge was formally introduced to students, we set out to
       explore student (LAK ’20), 2020, no. March.
[21]   A. Whitelock-wainwright, D. Gasevic, Y. S. Tsai, R. Tejeiro, and K. Bennett, “The
       Student Expectations of Learning Analytics Questionnaire,” J. Comput. Assist. Learn.,
       vol. 35, no. 5, pp. 633–666, 2019.
[22]   A. Whitelock-wainwright, D. Gasevic, Y.-S. Tsai, and H. Drachsler, “Assessing the
       validity of a learning analytics expectation instrument : A Assessing the validity of a
       learning analytics expectation instrument : A multinational study,” J. Comput. Assist.
       Learn., no. February, 2020.
[23]   P. Vu, M. Adkins, and S. Henderson, “Aware , but Don ’ t Really Care : Student
       Perspectives on Privacy and Data Collection in Online Courses,” J. Open, Flex.
       Distance Learn., vol. 23, no. 2, pp. 42–51, 2020.
[24]   K. M. L. Jones, “Learning analytics and higher education : a proposed model for
       establishing informed consent mechanisms to promote student privacy and autonomy,”
       Int. J. Educ. Technol. High. Educ., vol. 16, no. 24, 2019.
[25]   A. F. Westin, Privacy and Freedom. New York: Atheneum, 1967.
[26]   S. T. Margulis, “Conceptions of privacy: current status and next steps,” J. Soc. Issues,
       vol. 33, 1977.
[27]   F. Bélanger, J. Hiller, and W. J. Smith, “Trustworthiness in Electronic Commerce: The
       Role of Privacy, Security, and Site Attributes,” J. Strateg. Inf. Syst., vol. 11, 2002.
[28]   E. F. Stone, D. G. Gardner, H. G. Gueutal, and S. McClure, “A Field Experiment
       Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types
       of Organizations,” J. Appl. Psychol., vol. 68, no. 3, pp. 459–468, 1983.
[29]   M. . Culnan and P. K. Armstrong, “Information privacy concerns, procedural fairness
       and impersonal trust: An empirical investigation.,” Organ. Sci., vol. 10, no. 1, pp. 104–
       115, 1999.
[30]   K. a Stewart, A. H. Segars, and H. Albert, “Examination Empirical for Information
       Privacy of the Concern Instrument,” Inf. Syst. Res., vol. 13, no. 1, pp. 36–49, 2002.
[31]   K. M. L. Jones et al., “‘ We ’ re being tracked at all times ’ : Student perspectives of
       their privacy in relation to learning analytics in higher education,” J. Acad. Libr. Inf.
       Sci. Technol., vol. 71, no. 9, pp. 1044–1059, 2020.
[32]   S. Botnevik, “Student Perceptions of Privacy in Learning Analytics : A Quantitative
       Study of Norwegian Students,” University of Bergen, 2021.
[33]   H. J. Smith, T. Dinev, and H. Xu, “Information Privacy Research: An interdisciplinary
       Review.,” Mis Q., vol. 35, no. 4, pp. 989–1015, 2011.
[34]   T. Dinev and P. Hart, “An Extended Privacy Calculus Transactions Model for E-
       Commerce Transactions,” Inf. Syst. Res., vol. 17, no. 1, pp. 61–80, 2006.
[35]   T. Dinev and P. Hart, “Internet Privacy Concerns and Social Awareness as
       Determinants of Intention to Transact,” Int. J. Electron. Commer., vol. 10, no. 2, pp.
       7–29, 2006.
[36]   H. Xu, H. Teo, B. C. Y. Tan, and R. Agarwal, “Effects of Individual Self-Protection ,
       Industry Self-Regulation , and Government Regulation on Privacy Concerns : A Study
       of Location-Based Services.,” Inf. Syst. Res., vol. 23, no. 4, pp. 1342–1363, 2012.
[37]   P. Prinsloo and S. Slade, “Student privacy self-management : implications for learning
       analytics Student privacy self-management : implications for learning analytics,” in
       Proceedings of the Fifth International Conference on Learning Analytics And
       Knowledge, 2015, no. March.
[38]   Y. Moon, “Intimate exchanges: Using computers to elicit self-disclosure from
       consumers.,” J. Consum. Res., vol. 26, no. 4, pp. 323–339, 2000.
[39]   D. a Abri, T. Mcgill, and M. Dixon, “Examining the Impact of E-Privacy Risk
       Concerns on Citizens’ Intentions to Use E-Government Services: An Oman
       Perspective,” J. Inf. Priv. Secur., vol. 5, no. 2, pp. 3–26, 2009.
[40]   P. A. Pavlou and M. Fygenson, “Understanding and predicting electronic commerce
       adoption: An extension of the theory of planned behavior.,” Manag. Inf. Syst. Q., vol.
       30, no. 1, pp. 115–143, 2006.
[41]   J. Wirtz and M. O. Lwin, “Regulatory Focus Theory, Trust and Privacy Concern,” J.
       Serv. Res., vol. 12, no. 2, pp. 190–205, 2009.
[42]   C. Liu, J. Marchewka, J. Lu, and C.-S. Yu, “Beyond cocnern a privacy-trust-behavior
       intention model of electronic commerce.,” Inf. Manag., vol. 24, no. 2, pp. 289–304,
       2005.
[43]   C. F. Libaque-Sáenz, S. F. Wong, Y. Chang, Y. W. Ha, and M. C. Park,
       “Understanding antecedents to perceived information risks: An empirical study of the
       Korean telecommunications market,” Inf. Dev., vol. 32, no. 1, pp. 91–106, 2016.
[44]   S. Taddei and B. Contena, “Privacy, trust and control: Which relationships with online
       self-disclosure?,” Comput. Human Behav., vol. 29, no. 3, pp. 821–826, 2013.
[45]   R. Clarke, “Beyond the OECD Guidelines: Privacy Protection for the 21st Century,”
       Xamax Consultancy Pty Ltd, Canberra, 2000. [Online]. Available:
       http://www.rogerclarke.com/DV/PP21C.html.
[46]   T. Dinev, P. Hart, and M. R. Mullen, “Internet privacy concerns and beliefs about
       government surveillance - An empirical investigation,” J. Strateg. Inf. Syst., vol. 17,
       no. 3, pp. 214–233, 2008.
[47]   M. Mousavizadeh and D. J. Kim, “A Study of the Effect of Privacy Assurance
       Mechanisms on Self-disclosure in Social Networking Sites from the View of
       Protection Motivation Theory,” in International Conference on Information Systems,
2015, pp. 1–20.