1
|
Liu Y, Byrne KA, Aly H, Ghaiumy Anaraky R, Knijnenburg B. Can Stress Put Digital Privacy at Risk? Evidence from a Controlled Experiment Examining the Impact of Acute Stress on Privacy Decisions on a Simulated Social Network Site. CYBERPSYCHOLOGY, BEHAVIOR AND SOCIAL NETWORKING 2024; 27:664-672. [PMID: 39029514 DOI: 10.1089/cyber.2023.0687] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 07/21/2024]
Abstract
Internet and Communication Technologies (ICTs) can foster efficient communication and knowledge acquisition, but there are also tradeoffs in terms of risks to one's privacy. Previous research, including work with the privacy calculus framework, indicates that factors such as perceived risks and benefits of using ICTs, ICT trust, and general privacy concerns can influence individuals' digital privacy-related decisions. One pervasive psychological factor that may potentially alter such privacy-related behaviors is acute stress. Acute stress can promote risk-seeking behaviors and a tendency to prefer immediate rewards over delayed, greater value rewards. However, the effect of acute stress in the applied context of privacy decision making is relatively unknown. Participants (N = 143) in this study were randomly assigned to either an acute stress task (socially evaluated cold pressor task) or an active control task (lukewarm water alone). Results revealed that acute stress condition increased information disclosure, as indexed by accepting more online cookies, sharing one's location more frequently, and revealing greater willingness to self-disclose personal information. In addition, the impact of individuals' levels of perceived risk and benefits, trust, and privacy concern on privacy decision making was examined. However, none of these constructs consistently influenced privacy decisions over and above the effect of stress. Overall, our findings suggest that acute stress has robust, independent influence on privacy decision making.
Collapse
Affiliation(s)
- Yizhou Liu
- Department of Psychology, Clemson University, Clemson, South Carolina, USA
| | - Kaileigh A Byrne
- Department of Psychology, Clemson University, Clemson, South Carolina, USA
| | - Heba Aly
- School of Computing, Clemson University, Clemson, South Carolina, USA
| | - Reza Ghaiumy Anaraky
- Department of Technology Management and Innovation, New York University, Brooklyn, New York, USA
| | - Bart Knijnenburg
- School of Computing, Clemson University, Clemson, South Carolina, USA
| |
Collapse
|
2
|
Willem T, Zimmermann BM, Matthes N, Rost M, Buyx A. Acceptance of Social Media Recruitment for Clinical Studies Among Patients With Hepatitis B: Mixed Methods Study. J Med Internet Res 2024; 26:e54034. [PMID: 39186322 PMCID: PMC11384172 DOI: 10.2196/54034] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/27/2023] [Revised: 03/08/2024] [Accepted: 06/03/2024] [Indexed: 08/27/2024] Open
Abstract
BACKGROUND Social media platforms are increasingly used to recruit patients for clinical studies. Yet, patients' attitudes regarding social media recruitment are underexplored. OBJECTIVE This mixed methods study aims to assess predictors of the acceptance of social media recruitment among patients with hepatitis B, a patient population that is considered particularly vulnerable in this context. METHODS Using a mixed methods approach, the hypotheses for our survey were developed based on a qualitative interview study with 6 patients with hepatitis B and 30 multidisciplinary experts. Thematic analysis was applied to qualitative interview analysis. For the cross-sectional survey, we additionally recruited 195 patients with hepatitis B from 3 clinical centers in Germany. Adult patients capable of judgment with a hepatitis B diagnosis who understood German and visited 1 of the 3 study centers during the data collection period were eligible to participate. Data analysis was conducted using SPSS (version 28; IBM Corp), including descriptive statistics and regression analysis. RESULTS On the basis of the qualitative interview analysis, we hypothesized that 6 factors were associated with acceptance of social media recruitment: using social media in the context of hepatitis B (hypothesis 1), digital literacy (hypothesis 2), interest in clinical studies (hypothesis 3), trust in nonmedical (hypothesis 4a) and medical (hypothesis 4b) information sources, perceiving the hepatitis B diagnosis as a secret (hypothesis 5a), attitudes toward data privacy in the social media context (hypothesis 5b), and perceived stigma (hypothesis 6). Regression analysis revealed that the higher the social media use for hepatitis B (hypothesis 1), the higher the interest in clinical studies (hypothesis 3), the more trust in nonmedical information sources (hypothesis 4a), and the less secrecy around a hepatitis B diagnosis (hypothesis 5a), the higher the acceptance of social media as a recruitment tool for clinical hepatitis B studies. CONCLUSIONS This mixed methods study provides the first quantitative insights into social media acceptance for clinical study recruitment among patients with hepatitis B. The study was limited to patients with hepatitis B in Germany but sets out to be a reference point for future studies assessing the attitudes toward and acceptance of social media recruitment for clinical studies. Such empirical inquiries can facilitate the work of researchers designing clinical studies as well as ethics review boards in balancing the risks and benefits of social media recruitment in a context-specific manner.
Collapse
Affiliation(s)
- Theresa Willem
- Institute of Molecular Immunology, Klinikum Rechts der Isar, TUM School of Medicine and Health, Technical University of Munich, Munich, Germany
- Institute of History and Ethics in Medicine, TUM School of Medicine and Health, Technical University of Munich, Munich, Germany
- Department of Science, Technology and Society (STS), School of Social Sciences and Technology, Technical University of Munich, Munich, Germany
| | - Bettina M Zimmermann
- Institute of Molecular Immunology, Klinikum Rechts der Isar, TUM School of Medicine and Health, Technical University of Munich, Munich, Germany
- Institute of History and Ethics in Medicine, TUM School of Medicine and Health, Technical University of Munich, Munich, Germany
- Institute of Philosophy, Multidisciplinary Center for Infectious Diseases, University of Bern, Bern, Switzerland
| | - Nina Matthes
- Institute of History and Ethics in Medicine, TUM School of Medicine and Health, Technical University of Munich, Munich, Germany
| | - Michael Rost
- Institute for Biomedical Ethics, University of Basel, Basel, Switzerland
| | - Alena Buyx
- Institute of History and Ethics in Medicine, TUM School of Medicine and Health, Technical University of Munich, Munich, Germany
| |
Collapse
|
3
|
Sun R, Zhu Q, Cheng RX, Tang W, Zuo J, Lv D, Qin S. Research on the cognitive neural mechanism of privacy empowerment illusion cues regarding comprehensibility and interpretability for privacy disclosures. Sci Rep 2024; 14:8690. [PMID: 38622216 PMCID: PMC11018622 DOI: 10.1038/s41598-024-58917-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2023] [Accepted: 04/04/2024] [Indexed: 04/17/2024] Open
Abstract
In the era of artificial intelligence, privacy empowerment illusion has become a crucial means for digital enterprises and platforms to "manipulate" users and create an illusion of control. This topic has also become an urgent and pressing concern for current research. However, the existing studies are limited in terms of their perspectives and methodologies, making it challenging to fully explain why users express concerns about privacy empowerment illusion but repeatedly disclose their personal information. This study combines the associative-propositional evaluation model (APE) and cognitive load theory, using event-related potential (ERP) technology to investigate the underlying mechanisms of how the comprehensibility and interpretability of privacy empowerment illusion cues affect users' immediate attitudes and privacy disclosure behaviours; these mechanisms are mediated by psychological processing and cognitive load differences. Behavioural research results indicate that in the context of privacy empowerment illusion cues with low comprehensibility, users are more inclined to disclose their private information when faced with high interpretability than they are when faced with low interpretability. EEG results show that in the context of privacy empowerment illusion cues with low comprehensibility, high interpretability induces greater P2 amplitudes than does low interpretability; low interpretability induces greater N2 amplitudes than does high interpretability. This study extends the scopes of the APE model and cognitive load theory in the field of privacy research, providing new insights into privacy attitudes. Doing so offers a valuable framework through which digital enterprises can gain a deeper understanding of users' genuine privacy attitudes and immediate reactions under privacy empowerment illusion situations. This understanding can help increase user privacy protection and improve their overall online experience, making it highly relevant and beneficial.
Collapse
Affiliation(s)
- Rui Sun
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China
| | - Qiuhua Zhu
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China.
| | - Ru Xia Cheng
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China
| | - Wenlong Tang
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China
| | - Jiajia Zuo
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China
| | - Dong Lv
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China
| | - Shukun Qin
- School of Business Administration, Huaqiao University, Quanzhou, 362000, China
| |
Collapse
|
4
|
Biber M, Louis WR, Smith JR. Predicting online privacy protection for Facebook users with an extended theory of planned behavior. THE JOURNAL OF SOCIAL PSYCHOLOGY 2024:1-17. [PMID: 38380585 DOI: 10.1080/00224545.2024.2319177] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/19/2022] [Accepted: 02/12/2024] [Indexed: 02/22/2024]
Abstract
The current research uses an extended theory of planned behavior (TPB) model to predict Facebook users' (N = 376) intentions to protect their privacy online. It aims to replicate and extend Saeri et al. (2014) who found partial support for an extended TPB model that included descriptive norms, perceived risk, and trust. Facebook users completed an online questionnaire assessing attitudes, norms (subjective and group), perceived behavioral control (PBC), perceived risk, trust, privacy concerns, and intentions to protect their privacy online. Results revealed that attitudes, subjective norms, and PBC (i.e. the TPB) predicted online privacy intentions, as well as descriptive group norms and privacy concerns. However, perceived risk, trust, and injunctive group norms were not significant unique predictors of online privacy intentions. The implications for understanding influences on individuals' willingness to protect their privacy online are discussed.
Collapse
|
5
|
Alwafi G, Fakieh B. A machine learning model to predict privacy fatigued users from social media personalized advertisements. Sci Rep 2024; 14:3685. [PMID: 38355815 PMCID: PMC10867113 DOI: 10.1038/s41598-024-54078-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/08/2023] [Accepted: 02/08/2024] [Indexed: 02/16/2024] Open
Abstract
The increasing use of social media platforms as personalized advertising channels is a double-edged sword. A high level of personalization on these platforms increases users' sense of losing control over personal data: This could trigger the privacy fatigue phenomenon manifested in emotional exhaustion and cynicism toward privacy, which leads to a lack of privacy-protective behavior. Machine learning has shown its effectiveness in the early prediction of people's psychological state to avoid such consequences. Therefore, this study aims to classify users with low and medium-to-high levels of privacy fatigue, based on their information privacy awareness and big-five personality traits. A dataset was collected from 538 participants via an online questionnaire. The prediction models were built using the Support Vector Machine, Naïve Bayes, K-Nearest Neighbors, Decision Tree, and Random Forest classifiers, based on the literature. The results showed that awareness and conscientiousness trait have a significant relationship with privacy fatigue. Support Vector Machine and Naïve Bayes classifiers outperformed the other classifiers by attaining a classification accuracy of 78%, F1 of 87%, recall of 100% and 98%, and precision of 78% and 79% respectively, using five-fold cross-validation.
Collapse
Affiliation(s)
- Ghadeer Alwafi
- Information Systems Department, King Abdulaziz University, Jeddah, 21589, Saudi Arabia.
| | - Bahjat Fakieh
- Information Systems Department, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
| |
Collapse
|
6
|
Peng Z, Namyalo PK, Chen X, Lv M, Coyte PC. What motivates individuals to share information with governments when adopting health technologies during the COVID-19 pandemic? BMC Public Health 2023; 23:2527. [PMID: 38110945 PMCID: PMC10726615 DOI: 10.1186/s12889-023-17437-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/12/2023] [Accepted: 12/07/2023] [Indexed: 12/20/2023] Open
Abstract
BACKGROUND While digital governance has been adopted by governments around the world to assist in the management of the COVID-19 pandemic, the effectiveness of its implementation relies on the collection and use of personal information. This study examines the willingness of individuals to engage in information-sharing with governments when adopting health technologies during the COVID-19 pandemic. METHODS Data were obtained from a cross-sectional survey of 4,800 individuals drawn from 16 cities in China in 2021. Tobit regression models were used to assess the impacts of an array of determinants on an individual's willingness to share information with governments when adopting health technologies. RESULTS Individuals who perceived a higher level of helpfulness, risk, expectations from others, weariness toward privacy issues, and were sensitive to positive outcomes were more willing to share information with governments when adopting health technologies during the COVID-19 pandemic. Across all the subgroups, self-efficacy only reduced the willingness to share information with governments for individuals who spent more than seven hours per day online. The negative impacts of being sensitive to negative outcomes on the willingness to share information were only found among females and the less educated group. CONCLUSIONS This study revealed the seemingly paradoxical behavior of individuals who perceived high risks of sharing information and a sense of fatigue toward privacy issues yet continued to be willing to share their information with their governments when adopting health technologies during the COVID-19 pandemic. This work highlighted significant differential motivations for sharing information with governments when using health technologies during a pandemic. Tailored policies that resonate with population sub-groups were suggested to be proposed to facilitate crisis management in future situations.
Collapse
Affiliation(s)
- Zixuan Peng
- School of Public Health, Southeast University, Nanjing, China
| | - Prossy Kiddu Namyalo
- Institute of Health Policy, Management and Evaluation, University of Toronto, Toronto, Canada
| | - Xu Chen
- Zhejiang Provincial Philosophy and Social Sciences Pilot Laboratory, Hangzhou, China.
- Laboratory of Intelligent Society and Governance, Zhejiang Lab, Hangzhou, China.
| | - Mingjie Lv
- Zhejiang Provincial Philosophy and Social Sciences Pilot Laboratory, Hangzhou, China
- Laboratory of Intelligent Society and Governance, Zhejiang Lab, Hangzhou, China
| | - Peter C Coyte
- Institute of Health Policy, Management and Evaluation, University of Toronto, Toronto, Canada
| |
Collapse
|
7
|
Chatsuwan P, Phromma T, Surasvadi N, Thajchayapong S. Personal data protection compliance assessment: A privacy policy scoring approach and empirical evidence from Thailand's SMEs. Heliyon 2023; 9:e20648. [PMID: 37886776 PMCID: PMC10597812 DOI: 10.1016/j.heliyon.2023.e20648] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/04/2023] [Revised: 09/21/2023] [Accepted: 10/03/2023] [Indexed: 10/28/2023] Open
Abstract
Privacy policies, intended to provide information to individuals regarding how their personal data is processed, are often complex and challenging for users to understand. Businesses often demonstrate non-compliance with personal data protection laws, ranging from the absence of privacy policies to the existence of policies that do not adhere to legal requirements. This paper aims to (1) develop a quantitative and systematic tool for evaluating privacy policies' compliance with the Personal Data Protection Act (PDPA), (2) assess compliance among Small and Medium Enterprises (SMEs) in Thailand, and (3) provide recommendations for enhancing compliance practices. To achieve this, we proposed a multi-criteria privacy policy scoring model integrated with comprehensive statistical data analyses. The privacy policy scoring model consists of ten privacy principles and 31 privacy criteria, providing a structured framework for evaluating privacy policies. During a two-year postponement period for enforcing the PDPA law, we conducted a stratified random-sampling survey of 384 SMEs to evaluate their privacy policies using the proposed scoring model. The accomplished results revealed significantly lower scores than anticipated, with the nationwide average score of SMEs reaching only 6.1909 out of 100 points. More than half of the SMEs collected personal data without announcing privacy policies, and those with privacy policies adhered to an average of only 12.15 out of 31 privacy criteria. These findings highlight the pressing need to improve compliance practices among SMEs in Thailand. The proposed methodology can be customized and applied to align with the requirements of personal data protection laws in other countries. Additionally, our findings indicate that compliance with the PDPA is influenced by the Thailand Standard Industrial Classification (TSIC) sections, suggesting the adoption of tailored approaches by policymakers to address the specific needs of different TSIC sections.
Collapse
Affiliation(s)
- Panchapawn Chatsuwan
- National Electronics and Computer Technology Center (NECTEC), NSTDA, 111 Phahonyothin Road, Khlong Nueng, Khlong Luang, Pathum Thani, 12120, Thailand
| | - Tanawat Phromma
- National Electronics and Computer Technology Center (NECTEC), NSTDA, 111 Phahonyothin Road, Khlong Nueng, Khlong Luang, Pathum Thani, 12120, Thailand
| | - Navaporn Surasvadi
- National Electronics and Computer Technology Center (NECTEC), NSTDA, 111 Phahonyothin Road, Khlong Nueng, Khlong Luang, Pathum Thani, 12120, Thailand
| | - Suttipong Thajchayapong
- National Electronics and Computer Technology Center (NECTEC), NSTDA, 111 Phahonyothin Road, Khlong Nueng, Khlong Luang, Pathum Thani, 12120, Thailand
| |
Collapse
|
8
|
Ma S, Chen C. Are digital natives overconfident in their privacy literacy? Discrepancy between self-assessed and actual privacy literacy, and their impacts on privacy protection behavior. Front Psychol 2023; 14:1224168. [PMID: 37674752 PMCID: PMC10477717 DOI: 10.3389/fpsyg.2023.1224168] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/17/2023] [Accepted: 08/09/2023] [Indexed: 09/08/2023] Open
Abstract
Privacy literacy is recognized as a crucial skill for safeguarding personal privacy online. However, self-assessed privacy literacy often diverges from actual literacy, revealing the presence of cognitive biases. The protection motivation theory (PMT) is widely used to explain privacy protection behavior, positing that whether individuals take defensive measures depends on their cognitive evaluation of threats and coping capabilities. However, the role of cognitive biases in this process has been understudied in previous research. This study focuses on Chinese digital natives and examines the differential impacts of subjective and objective privacy literacy on privacy protection behavior, as well as the role of cognitive biases in privacy decision-making. The results show that there is no significant correlation between subjective and objective privacy literacy, and a bias exists. When privacy concern is used as a mediating variable, there are significant differences in the paths through which subjective and objective privacy literacy influence privacy protection behavior. Furthermore, privacy literacy overconfidence moderates the relationship between privacy concern and privacy protection behavior. The findings confirm the influence of cognitive biases in privacy behavior decision-making and extend the PMT. This study also calls for the government to enhance privacy literacy training for digital natives to improve their privacy protection capabilities.
Collapse
Affiliation(s)
- Shuai Ma
- School of International Business, Zhejiang Yuexiu University, Shaoxing, China
| | - Chen Chen
- China Institute of Regulation Research, Zhejiang University of Finance & Economics, Hangzhou, China
| |
Collapse
|
9
|
Wang Y, Qiao T, Liu C. A Study of Reasons for Self-Disclosure on Social Media among Chinese COVID-19 Patients: Based on the Theory of Planned Behavior Model. Healthcare (Basel) 2023; 11:1509. [PMID: 37239795 PMCID: PMC10218332 DOI: 10.3390/healthcare11101509] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/31/2023] [Revised: 05/17/2023] [Accepted: 05/19/2023] [Indexed: 05/28/2023] Open
Abstract
BACKGROUND With a massive population of internet users, China has witnessed a shift in the behavior of social media users towards the COVID-19 pandemic, transitioning from reticence to frequent sharing of information in response to changing circumstances and policy adjustments of the disease. This study aims to explore how perceived benefits, perceived risks, subjective norms, and self-efficacy influence the intentions of Chinese COVID-19 patients to disclose their medical history on social media, and thus to examine their actual disclosure behaviors. METHODS Based on the Theory of Planned Behavior (TPB) and Privacy Calculus Theory (PCT), a structural equation model was constructed to analyze the influence paths among perceived benefits, perceived risks, subjective norms, self-efficacy, and behavioral intentions to disclose medical history on social media among Chinese COVID-19 patients. A total of 593 valid surveys were collected via a randomized internet-based survey, which constituted a representative sample. Firstly, we used SPSS 26.0 to conduct reliability and validity analyses of the questionnaire, as well as the tests of demographic differences and correlations between variables. Next, Amos 26.0 was employed to construct and test the model fit degree, identify the relationships among latent variables, and conduct path tests. RESULTS Our findings revealed the following: (1) There were significant gender differences in the self-disclosure behaviors of medical history on social media among Chinese COVID-19 patients. (2) Perceived benefits had a positive effect on self-disclosure behavioral intentions (β = 0.412, p < 0.001); perceived risks had a positive effect on self-disclosure behavioral intentions (β = 0.097, p < 0.05); subjective norms had a positive effect on self-disclosure behavioral intentions (β = 0.218, p < 0.001); self-efficacy had a positive effect on self-disclosure behavioral intentions (β = 0.136, p < 0.001). (3) Self-disclosure behavioral intentions had a positive effect on disclosure behaviors (β = 0.356, p < 0.001). CONCLUSIONS Our study, by integrating TPB and PCT to examine the influencing factors of the self-disclosure behaviors among Chinese COVID-19 patients on social media, found that perceived risks, perceived benefits, subjective norms, and self-efficacy had a positive influence on the self-disclosure intentions of Chinese COVID-19 patients. We also found that self-disclosure intentions, in turn, positively influenced disclosure behaviors. However, we did not observe a direct influence of self-efficacy on disclosure behaviors. Our study provides a sample of the application of TPB in the context of social media self-disclosure behavior among patients. It also introduces a novel perspective and potential approach for individuals to address the feelings of fear and shame related to illness, particularly within the context of collectivist cultural values.
Collapse
Affiliation(s)
- Yi Wang
- College of Journalism and Communication, Huaqiao University, Xiamen 361021, China (T.Q.)
| | - Tianrui Qiao
- College of Journalism and Communication, Huaqiao University, Xiamen 361021, China (T.Q.)
| | - Chao Liu
- College of Journalism and Communication, Huaqiao University, Xiamen 361021, China (T.Q.)
- Business Analytics Research Center, Chang Gung University, Taoyuan 33302, Taiwan
| |
Collapse
|
10
|
Wang M, Qin Y, Liu J, Li W. Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks. HUMANITIES & SOCIAL SCIENCES COMMUNICATIONS 2023; 10:216. [PMID: 37192941 PMCID: PMC10166458 DOI: 10.1057/s41599-023-01673-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/25/2020] [Accepted: 04/13/2023] [Indexed: 05/18/2023]
Abstract
Personal physiological data is the digital representation of physical features that identify individuals in the Internet of Everything environment. Such data includes characteristics of uniqueness, identification, replicability, irreversibility of damage, and relevance of information, and this data can be collected, shared, and used in a wide range of applications. As facial recognition technology has become prevalent and smarter over time, facial data associated with critical personal information poses a potential security and privacy risk of being leaked in the Internet of Everything application platform. However, current research has not identified a systematic and effective method for identifying these risks. Thus, in this study, we adopted the fault tree analysis method to identify risks. Based on the risks identified, we then listed intermediate events and basic events according to the causal logic, and drew a complete fault tree diagram of facial data breaches. The study determined that personal factors, data management and supervision absence are the three intermediate events. Furthermore, the lack of laws and regulations and the immaturity of facial recognition technology are the two major basic events leading to facial data breaches. We anticipate that this study will explain the manageability and traceability of personal physiological data during its lifecycle. In addition, this study contributes to an understanding of what risks physiological data faces in order to inform individuals of how to manage their data carefully and to guide management parties on how to formulate robust policies and regulations that can ensure data security.
Collapse
Affiliation(s)
- Meng Wang
- School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan, Hubei Province China
| | - Yalin Qin
- School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan, Hubei Province China
| | - Jiaojiao Liu
- School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan, Hubei Province China
| | - Weidong Li
- School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan, Hubei Province China
| |
Collapse
|
11
|
Yang X, Mei H, Zheng Y. Understanding the antecedents of privacy fatigue in facial recognition-based m-Gov services: An empirical study from China. GOVERNMENT INFORMATION QUARTERLY 2023. [DOI: 10.1016/j.giq.2023.101827] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 04/08/2023]
|
12
|
Lyu T, Guo Y, Chen H. Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism. INFORMATION TECHNOLOGY & PEOPLE 2023. [DOI: 10.1108/itp-10-2021-0817] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/18/2023]
Abstract
PurposeBased on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.Design/methodology/approachThe data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).FindingsThe study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.Originality/valueThis study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.
Collapse
|
13
|
De Wolf R, Martens M, Vanden Abeele M, De Marez L. Predicting Teens' Privacy Management and Attitude Toward Data Protection on Social Media. CYBERPSYCHOLOGY, BEHAVIOR AND SOCIAL NETWORKING 2023; 26:153-160. [PMID: 36827593 DOI: 10.1089/cyber.2021.0338] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/26/2023]
Abstract
This study contributes to ongoing debates on the protection of teens' privacy on social media. While ample research is focused on teens' privacy management, less is known about their attitude toward data protection. Drawing from cross-sectional survey data, this study examines whether predictors of privacy management, namely privacy literacy, privacy concern, and perceptions of data control, also predict teens' attitude toward data protection. Structural equation modeling indicates that all three factors positively predict this facet of privacy. No significant differences were found in the strength of predictors for boys versus girls for privacy management, although the findings do suggest some gender differences for attitude toward data protection that call for further research.
Collapse
Affiliation(s)
- Ralf De Wolf
- Department of Communication Sciences, Imec-mict-Ugent, Ghent University, Ghent, Belgium
| | - Marijn Martens
- Department of Communication Sciences, Imec-mict-Ugent, Ghent University, Ghent, Belgium
| | - Mariek Vanden Abeele
- Department of Communication Sciences, Imec-mict-Ugent, Ghent University, Ghent, Belgium
| | - Lieven De Marez
- Department of Communication Sciences, Imec-mict-Ugent, Ghent University, Ghent, Belgium
| |
Collapse
|
14
|
Abbasi MA, Amran A, Khan R, Sahar NE. Linking corporate social irresponsibility to workplace deviant behavior: A comparative analysis of generation Z and Generation Y. CURRENT PSYCHOLOGY 2023. [DOI: 10.1007/s12144-023-04372-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/21/2023]
|
15
|
Bhana A, Ophoff J. Risk homeostasis and security fatigue: a case study of data specialists. INFORMATION AND COMPUTER SECURITY 2023. [DOI: 10.1108/ics-11-2022-0172] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/10/2023]
Abstract
Purpose
Organisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on compliance and constantly challenges employees to manage security-related risks. The purpose of this research is to explore the homeostatic mechanism proposed by risk homeostasis theory (RHT), as well as security fatigue, in an organisational context.
Design/methodology/approach
A case study approach was used to investigate the topic, focusing on data specialists who regularly work with sensitive information assets. Primary data was collected through semi-structured interviews with 12 data specialists in a large financial services company.
Findings
A thematic analysis of the data revealed risk perceptions, behavioural adjustments and indicators of security fatigue. The findings provide examples of how these concepts manifest in practice and confirm the relevance of RHT in the security domain.
Originality/value
This research illuminates homeostatic mechanisms in an organisational security context. It also illustrates links with security fatigue and how this could further impact risk. Examples and indicators of security fatigue can assist organisations with risk management, creating “employee-friendly” policies and procedures, choosing appropriate technical security solutions and tailoring security education, training and awareness activities.
Collapse
|
16
|
Reeves A, Calic D, Delfabbro P. “Generic and unusable”1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103137] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/27/2023]
|
17
|
Neal D, Gaber S, Joddrell P, Brorsson A, Dijkstra K, Dröes RM. Read and accepted? Scoping the cognitive accessibility of privacy policies of health apps and websites in three European countries. Digit Health 2023; 9:20552076231152162. [PMID: 36698427 PMCID: PMC9869200 DOI: 10.1177/20552076231152162] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/24/2022] [Accepted: 01/03/2023] [Indexed: 01/20/2023] Open
Abstract
Objective Trust and accessibility are vital to adoption of health and wellness apps. This research scoped three elements of cognitive accessibility of health app privacy policies: availability, ease of navigation, and readability. Methods For this cross-sectional study, quantitative data collected in the Netherlands, Sweden, and the United Kingdom included: whether privacy information was in a country's official language (availability); number of distracting visual elements (ease of navigation); word count and Common European Framework of Reference (CEFR) reading level (readability). Health app privacy policies were compared to policies from a purposively selected sample of websites, and to benchmarks, including CEFR reading level B1. Results Health app privacy policies were less often available in countries' official languages compared to sampled websites (Chi-Square [1, 180] = 57.470, p < 0.001) but contained fewer distracting visual elements. More UK privacy policies were in the country's official language, whereas Swedish privacy policies contained fewest words and fewest potentially distracting design elements. Only one privacy policy met the CEFR reading level benchmark. Conclusions Lack of privacy information in non-Anglophone app-users' native languages and high reading levels may be major barriers to cognitive accessibility. Web and app developers should consider recommendations arising from this study, to stimulate trust in and adoption of health and wellness apps.
Collapse
Affiliation(s)
- David Neal
- Department of Psychiatry, Amsterdam University Medical Centers, Location VUmc/Amsterdam Public Health Research Institute, Amsterdam, The Netherlands,David Neal, Department of Psychiatry Amsterdam UMC, Location VUmc, Oldenaller 1, 1081 HJ Amsterdam, The Netherlands.
| | - Sophie Gaber
- Division of Occupational Therapy, Department of Neurobiology, Care Sciences and Society (NVS), Karolinska Institutet, Stockholm, Sweden
| | - Phil Joddrell
- Centre for Assistive Technology and Connected Healthcare, School of Health and Related Research, The University of Sheffield, Sheffield, UK
| | - Anna Brorsson
- Division of Occupational Therapy, Department of Neurobiology, Care Sciences and Society (NVS), Karolinska Institutet, Stockholm, Sweden
| | - Karin Dijkstra
- Research Group Smart Health, School of Health, Saxion University of Applied Sciences, Enschede, The Netherlands
| | - Rose-Marie Dröes
- Department of Psychiatry, Amsterdam University Medical Centers, Location VUmc/Amsterdam Public Health Research Institute, Amsterdam, The Netherlands
| |
Collapse
|
18
|
Chen S, Gu C, Wei J, Lv M. Research on the influence mechanism of privacy invasion experiences with privacy protection intentions in social media contexts: Regulatory focus as the moderator. Front Psychol 2023; 13:1031592. [PMID: 36704686 PMCID: PMC9871891 DOI: 10.3389/fpsyg.2022.1031592] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/30/2022] [Accepted: 11/29/2022] [Indexed: 01/12/2023] Open
Abstract
Introduction In recent years, there have been numerous online privacy violation incidents caused by the leakage of personal information of social media users, yet there seems to be a tendency for users to burn out when it comes to privacy protection, which leads to more privacy invasions and forms a vicious circle. Few studies have examined the impact of social media users' privacy invasion experiences on their privacy protection intention. Protection motivation theory has often been applied to privacy protection research. However, it has been suggested that the theory could be improved by introducing individual emotional factors, and empirical research in this area is lacking. Methods To fill these gaps, the current study constructs a moderated chain mediation model based on protection motivation theory and regulatory focus theory, and introduces privacy fatigue as an emotional variable. Results and discussion An analysis of a sample of 4800 from China finds that: (1) Social media users' previous privacy invasion experiences can increase their privacy protection intention. This process is mediated by response costs and privacy fatigue. (2) Privacy fatigue plays a masking effect, i.e., increased privacy invasion experiences and response costs will raise individuals' privacy fatigue, and the feeling of privacy fatigue significantly reduces individuals' willingness to protect their privacy. (3) Promotion-focus individuals are less likely to experience privacy fatigue than those with prevention-focus. In summary, this trend of "lie flat" on social media users' privacy protection is caused by the key factor of "privacy fatigue", and the psychological trait of regulatory focus can be used to interfere with the development of privacy fatigue. This study extends the scope of research on privacy protection and regulatory focus theory, refines the theory of protection motivation, and expands the empirical study of privacy fatigue; the findings also inform the practical governance of social network privacy.
Collapse
Affiliation(s)
- Subai Chen
- School of Journalism and Communication, Xiamen University, Xiamen, China
| | - Chenyu Gu
- School of Journalism and Communication, Xiamen University, Xiamen, China
| | - Juan Wei
- School of Journalism and Communication, Xiamen University, Xiamen, China
| | - Mingjie Lv
- Research Center for Intelligent Society and Social Governance, Interdisciplinary Research Institute, Zhejiang Lab, Hangzhou, China,*Correspondence: Mingjie Lv ✉ ; ✉
| |
Collapse
|
19
|
Abbasi MA, Amran A. Linking corporate social irresponsibility with workplace deviant behaviour: mediated by moral outrage. JOURNAL OF GLOBAL RESPONSIBILITY 2022. [DOI: 10.1108/jgr-12-2021-0103] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
Abstract
Purpose
This study aims to examine the effects of external corporate social irresponsibility on organisational workplace deviant behaviours through the mediation of moral outrage (MO) among non-managerial employees.
Design/methodology/approach
The primary quantitative data was collected from a sample of 328 non-managerial employees working in banking, refinery, petroleum and power distribution companies in Pakistan. Partial least square-structural equation modelling was used to estimate the modelled relationships.
Findings
Results confirmed that external corporate social irresponsibility has a positive effect on organisational workplace deviant behaviours. MO mediated relationships between external corporate social irresponsibility and organisational workplace deviant behaviours positively.
Research limitations/implications
Theoretically, the findings indicate that moral values are also close to the hearts of non-managerial employees, as external corporate social irresponsibility has proved to be one of the significant predictors of organisational deviance.
Practical implications
This study provides a new, substantial pathway for the executive management of organisations and evidence that eliminating social irresponsibility is equally important as pursuing sustainability initiatives for addressing workplace deviant behaviour.
Originality/value
The originality of this study is twofold. Firstly, it has confirmed the impact of external corporate social irresponsibility on employees’ deviant behaviours targeted at the organisation. Secondly, it has extended the scope of expectancy violation theory into the field of human resource management.
Collapse
|
20
|
Islami L, Fischer-Hübner S, Papadimitratos P. Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102913] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
|
21
|
Khan MI, Loh J(M, Hossain A, Hasan Talukder MJ. Cynicism as strength: Privacy cynicism, satisfaction and trust among social media users. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107638] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
|
22
|
Abstract
The digital era introduces a significant issue concerning the preservation of individuals’ privacy. Each individual has two autonomous traits, privacy concern which indicates how anxious that person is about preserving privacy, and privacy behavior which refers to the actual actions the individual takes to preserve privacy. The significant gap between these two traits is called the privacy paradox. While the existence and the extensive distribution of the privacy paradox is widely-considered in both academic and public discussion, no convincing explanation of the phenomenon has been provided. In this study we harness a new mathematical approach, “soft logic,” to better represent the reality of the privacy paradox. Soft numbers extend zero from a singularity to an infinite one-dimensional axis, thus enabling the representation of contradictory situations that exist simultaneously, i.e., a paradox. We develop a mathematical model for representing the privacy paradox with soft numbers, and demonstrate its application empirically. This new theory has the potential to address domains that mix soft human reality with robust technological reality.
Collapse
|
23
|
Trust Transfer in Sharing Accommodation: The Moderating Role of Privacy Concerns. SUSTAINABILITY 2022. [DOI: 10.3390/su14127384] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/25/2023]
Abstract
Sharing accommodation (SA) has gained rapid growth in the last decade. To offer better service to users, the platform and hosts have to extensively collect and utilize confidential user data and information. With the extensive collection and utilization of personal user information, there are potential problems of data abuse and leakage, which makes users’ privacy concerns an important and unavoidable issue for repeated purchases and the sustainable development of SA. Privacy concerns are thus not only an important antecedent of purchase behaviors, but also an important conditional variable that will have impacts on the formation of trust and user purchase behaviors. However, the moderating effect of privacy concerns on trust formation has rarely been examined in the SA literature. To fill this knowledge gap, drawing on trust transfer theory and trust literature, this study builds a theoretical model to examine the relationships of three types of institution-based trust (i.e., trust in the SA platform, trust in the user community, and trust in the host community) and their effects on continuous use intention. Moreover, this study explores the moderating effect of privacy concerns on institution-based trust transfer in the context of SA. We then collected data through a questionnaire survey from experienced users of two reputable SA platforms in China, and empirically tested the research model with 470 valid responses. The results show that trust in the user community positively affects trust in the SA platform and trust in the host community; trust in the SA platform and trust in the host community positively affect users’ continuous use intention. Meanwhile, privacy concerns negatively moderate the relationship between trust in the user community and trust in the SA platform, as well as the relationship between trust in the user community and trust in the host community. The findings confirm the moderating role of privacy concerns in the trust transfer process, complementing existing research on trust transfer theory and trust.
Collapse
|
24
|
Chen H, Liu M, Lyu T. Understanding employees’ information security–related stress and policy compliance intention: the roles of information security fatigue and psychological capital. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2022-0047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and information security policy (ISP) compliance intention and the effects of psychological capital (PsyCap) on relieving SRS and promoting compliance.
Design/methodology/approach
The authors tested a series of hypotheses by applying partial least squares–based structural equation modeling to survey data from 488 employees in Chinese enterprises.
Findings
The results suggest that the relationship between SRS and ISP compliance intention is fully mediated by information security fatigue. Employees’ SRS promotes their information security fatigue, which reduces their intention to follow ISPs. In addition, employees with high PsyCap may experience low levels of SRS and information security fatigue, which promotes their willingness to comply with ISPs.
Originality/value
This study extends knowledge by introducing information security fatigue and PsyCap to the field of information security management, and it calls attention to the effects on information security behaviors of employee emotions and positive psychological resources in an organization. The authors reveal the emotion-based mediating effect of information security fatigue and the positive influence of PsyCap in information security management.
Collapse
|
25
|
Bano S, Sarfraz U, Salameh AA, Jan A. COVID-19 Paradox: The Role of Privacy Concerns and Ad Intrusiveness on Consumer's Attitude Toward App Usage Behavior. Front Psychol 2022; 13:836060. [PMID: 35707643 PMCID: PMC9191572 DOI: 10.3389/fpsyg.2022.836060] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/15/2021] [Accepted: 04/22/2022] [Indexed: 11/13/2022] Open
Abstract
The COVID-19 pandemic has changed lives in an unprecedented way. The most notable and urgent requirement to combat the epidemic was to transform the way human interacts with each other. The adherence to maintaining social distance has given an upsurge to the increased usage of mobile app users. This change in human interaction for fulling their basic to social to work needs through the intervention of app usage has led to privacy concerns by users. By keeping in view the changing dynamics of the way society works, this study is an endeavor to investigate gender differences of ad intrusive and privacy concerns on app usage behavior. Employing a quantitative research design, 371 respondents were surveyed using through an online structured questionnaire. Data were analyzed by using partial least square structural equation modeling (PLS-SEM). Results suggest that advertising intrusiveness and privacy concerns are significant in determining the consumer's attitude toward App usage, and a positive attitude toward App usage results in App usage behavior. However, gender's moderating role in attitude toward app usage and app usage behavior is insignificant for this study. The study provides a more comprehensive understanding and complements prior insights on ads intrusiveness and privacy concerns toward app usage.
Collapse
Affiliation(s)
- Sobia Bano
- Department of Management Sciences, GIFT Business School, GIFT University, Gujranwala, Pakistan
| | - Usama Sarfraz
- Department of Management Sciences, GIFT Business School, GIFT University, Gujranwala, Pakistan
| | - Anas A. Salameh
- Department of Management Information Systems, College of Business Administration, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia
| | - Amin Jan
- Faculty of Hospitality Tourism and Wellness, Universiti Malaysia Kelantan, Kota Bharu, Malaysia
| |
Collapse
|
26
|
Bioglio L, Pensa RG. Analysis and classification of privacy-sensitive content in social media posts. EPJ DATA SCIENCE 2022; 11:12. [PMID: 35261872 PMCID: PMC8892403 DOI: 10.1140/epjds/s13688-022-00324-y] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/14/2021] [Accepted: 02/14/2022] [Indexed: 06/14/2023]
Abstract
User-generated contents often contain private information, even when they are shared publicly on social media and on the web in general. Although many filtering and natural language approaches for automatically detecting obscenities or hate speech have been proposed, determining whether a shared post contains sensitive information is still an open issue. The problem has been addressed by assuming, for instance, that sensitive contents are published anonymously, on anonymous social media platforms or with more restrictive privacy settings, but these assumptions are far from being realistic, since the authors of posts often underestimate or overlook their actual exposure to privacy risks. Hence, in this paper, we address the problem of content sensitivity analysis directly, by presenting and characterizing a new annotated corpus with around ten thousand posts, each one annotated as sensitive or non-sensitive by a pool of experts. We characterize our data with respect to the closely-related problem of self-disclosure, pointing out the main differences between the two tasks. We also present the results of several deep neural network models that outperform previous naive attempts of classifying social media posts according to their sensitivity, and show that state-of-the-art approaches based on anonymity and lexical analysis do not work in realistic application scenarios.
Collapse
Affiliation(s)
- Livio Bioglio
- University of Turin, C.So Svizzera, 185, I-10149 Turin, Italy
| | | |
Collapse
|
27
|
|
28
|
Al-Samarraie H, Bello KA, Alzahrani AI, Smith AP, Emele C. Young users' social media addiction: causes, consequences and preventions. INFORMATION TECHNOLOGY & PEOPLE 2021. [DOI: 10.1108/itp-11-2020-0753] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeSocial media addiction has been an ongoing topic of debate for platform developers, well-being and mental health experts. There is a limited understanding of the factors leading to the addiction of young social media users, the consequences of experiencing addiction, and the measures/mechanisms used by parents and platform providers to limit/prevent problematic social media use amongst young users. This systematic review aims to provide a comprehensive overview of the literature concerning these issues.Design/methodology/approachThe Preferred Reporting Items for Systematic Reviews (PRISMA) protocol was used to evaluate and present the results. A total of 45 studies were screened and independently reviewed against predetermined criteria for eligibility.FindingsThe results revealed four categories of young users' addiction to social media networks (social, technological, behavioural and mental). Several prevention approaches directed at parents and platform providers were discussed.Originality/valueThis study offers important insights for health policy makers, platform providers, parents and researchers on designing interventions addressing social media addiction amongst young users. It also provides an in-depth understanding of the conceptualization of social media addiction and suggestions on possible actions to prevent it.
Collapse
|
29
|
Kasperbauer TJ, Halverson C, Garcia A, Schwartz PH. Biobank Participants' Attitudes Toward Data Sharing and Privacy: The Role of Trust in Reducing Perceived Risks. J Empir Res Hum Res Ethics 2021; 17:167-176. [PMID: 34779299 DOI: 10.1177/15562646211055282] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Biobank participants are often unaware of possible uses of their genetic and health information, despite explicit descriptions of those uses in consent forms. To explore why this misunderstanding persists, we conducted semi-structured interviews and knowledge tests with 22 participants who had recently enrolled in a research biobank. Results indicated that participants lacked understanding of privacy and data-sharing topics but were mostly unconcerned about associated risks. Participants described their answers on the knowledge test as largely driven by their trust in the healthcare system, not by a close reading of the information presented to them. This finding may help explain the difficulties in increasing participant understanding of privacy-related topics, even when such information is clearly presented in biobank consent forms.
Collapse
Affiliation(s)
- T J Kasperbauer
- Indiana University Center for Bioethics, 12250Indiana University School of Medicine, Indianapolis, IN, USA
| | - Colin Halverson
- Indiana University Center for Bioethics, 12250Indiana University School of Medicine, Indianapolis, IN, USA
| | - Abby Garcia
- Indiana University Center for Bioethics, 12250Indiana University School of Medicine, Indianapolis, IN, USA
| | - Peter H Schwartz
- Indiana University Center for Bioethics, 12250Indiana University School of Medicine, Indianapolis, IN, USA.,Department of Philosophy, Indiana University-Purdue University Indianapolis (IUPUI), Indianapolis, IN, USA
| |
Collapse
|
30
|
Bandara RJ, Fernando M, Akter S. Construing online consumers’ information privacy decisions: The impact of psychological distance. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103497] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
31
|
Agozie DQ, Kaya T. Discerning the effect of privacy information transparency on privacy fatigue in e-government. GOVERNMENT INFORMATION QUARTERLY 2021. [DOI: 10.1016/j.giq.2021.101601] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
32
|
Zhu M, Wu C, Huang S, Zheng K, Young SD, Yan X, Yuan Q. Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. TELEMATICS AND INFORMATICS 2021. [DOI: 10.1016/j.tele.2021.101601] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
|
33
|
Chan EY, Palmeira M. Political ideology moderates consumer response to brand crisis apologies for data breaches. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106801] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
34
|
Venkatesh V, Hoehle H, Aloysius JA, Nikkhah HR. Being at the cutting edge of online shopping: Role of recommendations and discounts on privacy perceptions. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106785] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
35
|
Leon S, Chen C, Ratcliffe A. Consumers’ perceptions of last mile drone delivery. INTERNATIONAL JOURNAL OF LOGISTICS-RESEARCH AND APPLICATIONS 2021. [DOI: 10.1080/13675567.2021.1957803] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
Affiliation(s)
- Steven Leon
- Department of Marketing and SCM, Walker College of Business, Appalachian State University, Boone, NC, USA
| | - Charlie Chen
- Department of CIS, Walker College of Business, Appalachian State University, Boone, NC, USA
| | - Aaron Ratcliffe
- Department of Marketing and SCM, Walker College of Business, Appalachian State University, Boone, NC, USA
| |
Collapse
|
36
|
McGill T, Thompson N. Exploring potential gender differences in information security and privacy. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-07-2020-0125] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
Information technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users’ privacy and securing their devices, software and data.
Design/methodology/approach
This paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.
Findings
This study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.
Originality/value
This research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply.
Collapse
|
37
|
Bauer JM, Bergstrøm R, Foss-Madsen R. Are you sure, you want a cookie? – The effects of choice architecture on users' decisions about sharing private online data. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106729] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
38
|
Silva Santos IL, Pimentel CE, Mariano TE. Cyberstalking scale: development and relations with gender, FOMO and social media engagement. CURRENT PSYCHOLOGY 2021; 42:4802-4810. [PMID: 33994760 PMCID: PMC8112835 DOI: 10.1007/s12144-021-01823-3] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 05/03/2021] [Indexed: 11/16/2022]
Abstract
Cyberstalking is a form of persecution that has proliferated with technology's evolution. The present research aimed to develop a cyberstalking measure and observe its relations with Fear of Missing Out (FOMO), social media engagement, and sociodemographic variables. To achieve these goals, two studies were performed. In the first study, 200 subjects (76.5% female, with a mean age of 21.6 years) answered the 15 items originally developed for the scale. These data went trough exploratory factor analysis and Cronbach's alpha to verify the reliability of the instrument. The results indicated the exclusion of five items, and after this removal, the scale was valid and reliable (α = 0.86). In the second study, which also had 200 subjects (65% female and an average age of 21.8 years), was realized confirmatory factor analysis (measuring the model fit), accompanied by correlations and mediation analysis. The analyzes demonstrated that the one-factor model was adequate (GFI = 0.98; CFI = 0.99; TLI = 0.99; RMSEA = 0.02; SRMR = 0.06). Path analysis showed social media engagement as a significant mediator of FOMO and gender's impact on cyberstalking: Both had direct (FOMO: λ = 0.31; CI = 0.19-0.42; p < 0.01; Gender: λ = 0.12; CI = 0.02-0.22; p < 0.05) and indirect effects (FOMO: λ = 0.07; CI = 0.03-0.11; p < 0.01; Gender: λ = 0.04; CI = 0.01-0.07; p < 0.01).
Collapse
Affiliation(s)
- Isabella Leandra Silva Santos
- grid.411216.10000 0004 0397 5145Departament of Psychology, Federal University of Paraíba, João Pessoa, Paraíba Brazil
| | - Carlos Eduardo Pimentel
- grid.411216.10000 0004 0397 5145Departament of Psychology, Federal University of Paraíba, João Pessoa, Paraíba Brazil
| | - Tailson Evangelista Mariano
- grid.411216.10000 0004 0397 5145Departament of Psychology, Federal University of Paraíba, João Pessoa, Paraíba Brazil
| |
Collapse
|
39
|
Jung Y, Choi B, Cho W. Group satisfaction with group work under surveillance: The stimulus-organism-response (SOR) perspective. TELEMATICS AND INFORMATICS 2021. [DOI: 10.1016/j.tele.2020.101530] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
40
|
Schairer CE, Cheung C, Kseniya Rubanovich C, Cho M, Cranor LF, Bloss CS. Disposition toward privacy and information disclosure in the context of emerging health technologies. J Am Med Inform Assoc 2020; 26:610-619. [PMID: 30938756 PMCID: PMC6562158 DOI: 10.1093/jamia/ocz010] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/16/2018] [Revised: 01/04/2019] [Accepted: 01/14/2019] [Indexed: 11/18/2022] Open
Abstract
Objective We sought to present a model of privacy disposition and its development based on qualitative research on privacy considerations in the context of emerging health technologies. Materials and Methods We spoke to 108 participants across 44 interviews and 9 focus groups to understand the range of ways in which individuals value (or do not value) control over their health information. Transcripts of interviews and focus groups were systematically coded and analyzed in ATLAS.ti for privacy considerations expressed by respondents. Results Three key findings from the qualitative data suggest a model of privacy disposition. First, participants described privacy related behavior as both contextual and habitual. Second, there are motivations for and deterrents to sharing personal information that do not fit into the analytical categories of risks and benefits. Third, philosophies of privacy, often described as attitudes toward privacy, should be classified as a subtype of motivation or deterrent. Discussion This qualitative analysis suggests a simple but potentially powerful conceptual model of privacy disposition, or what makes a person more or less private. Components of privacy disposition are identifiable and measurable through self-report and therefore amenable to operationalization and further quantitative inquiry. Conclusions We propose this model as the basis for a psychometric instrument that can be used to identify types of privacy dispositions, with potential applications in research, clinical practice, system design, and policy.
Collapse
Affiliation(s)
- Cynthia E Schairer
- Department of Psychiatry, School of Medicine, University of California, San Diego, San Diego, La Jolla, California, USA
| | - Cynthia Cheung
- Center for Wireless and Population Health Systems, California Institute for Telecommunications and Technology, University of California, San Diego, San Diego, La Jolla, California, USA
| | - Caryn Kseniya Rubanovich
- Clinical Psychology Joint Doctoral Program, San Diego State University/University of California, San Diego, San Diego, California, USA
| | - Mildred Cho
- Department of Pediatrics, Center for Biomedical Ethics, Stanford University, Stanford, California, USA
| | - Lorrie Faith Cranor
- Institute for Software Research, School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA.,Engineering & Public Policy Department, College of Engineering, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
| | - Cinnamon S Bloss
- Department of Psychiatry, School of Medicine, University of California, San Diego, San Diego, La Jolla, California, USA.,Center for Wireless and Population Health Systems, California Institute for Telecommunications and Technology, University of California, San Diego, San Diego, La Jolla, California, USA.,Department of Family Medicine and Public Health, School of Medicine, University of California, San Diego, San Diego, La Jolla, California, USA
| |
Collapse
|
41
|
Wang H, Gao C, Li Y, Zhang ZL, Jin D. Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.3013335] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
|
42
|
Aleisa N, Renaud K, Bongiovanni I. The privacy paradox applies to IoT devices too: A Saudi Arabian study. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101897] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
43
|
Tang J, Akram U, Shi W. Why people need privacy? The role of privacy fatigue in app users' intention to disclose privacy: based on personality traits. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-03-2020-0088] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeMobile Applications (App) privacy has become a prominent social problem. Compared with privacy concerns, this study examines a relatively novel concept of privacy fatigue and explores its effect on the users’ intention to disclose their personal information via mobile Apps. In addition, the personality traits are proposed as antecedents that will induce the personal perception of privacy fatigue and privacy concerns differently.Design/methodology/approachData were collected from 426 respondents. Structure equation modeling was used to test the hypotheses.FindingsThe findings describe that App users’ intention toward personal information disclosure is determined by privacy fatigue and privacy concerns, but the former has a greater impact. With minor exceptions, the two factors are also influenced by different personality traits. Specifically, neuroticism has positive effects on privacy fatigue, but agreeableness and extraversion have presented the opposite results on the two variables.Practical implicationsThis research is very scarce to examine the joint effects of privacy fatigue, privacy concerns and personality traits on App users’ disclosing intention. In doing so, these results will be of benefit to App providers and platform managers and can be the basis for a variety of follow-up studies.Originality/valueWhile previous research just focuses on privacy concerns, this study explores the critical roles of privacy fatigue and opens up a new avenue of emotion-attitude analysis that can further increase the specificity and richness of users’ privacy research. Additionally, implications for personality traits as antecedents in the impact of App users’ privacy emotions and attitudes are discussed.
Collapse
|
44
|
Affiliation(s)
- Carey Pike
- Desmond Tutu HIV FoundationCape TownSouth Africa
| | - Lwandile Sigaqa
- Youth mentorAdolescent Health ProgrammesDesmond Tutu HIV FoundationCape TownSouth Africa
| |
Collapse
|
45
|
Thompson N, McGill T, Bunn A, Alexander R. Cultural factors and the role of privacy concerns in acceptance of government surveillance. J Assoc Inf Sci Technol 2020. [DOI: 10.1002/asi.24372] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
- Nik Thompson
- School of ManagementCurtin University Perth Western Australia Australia
| | - Tanya McGill
- Discipline of Information Technology, Mathematics and StatisticsMurdoch University Perth Western Australia Australia
| | - Anna Bunn
- Curtin Law SchoolCurtin University Perth Western Australia Australia
| | - Rukshan Alexander
- Department of Economics and ManagementVavuniya Campus, University of Jaffna Vavuniya Sri Lanka
| |
Collapse
|
46
|
Bazarova NN, Masur PK. Towards an integration of individualistic, networked, and institutional approaches to online disclosure and privacy in a networked ecology. Curr Opin Psychol 2020; 36:118-123. [PMID: 32604066 DOI: 10.1016/j.copsyc.2020.05.004] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2020] [Revised: 05/14/2020] [Accepted: 05/15/2020] [Indexed: 11/16/2022]
Abstract
In this paper, we review three different approaches to disclosure and privacy: a) an individualistic approach, which emphasizes an individual's control over information access and flow, b) a networked approach focused on information flow in horizontal relations between people, and c) an institutional approach concerned with public and societal privacy risks from platforms, providers, and governments. These approaches co-exist largely independently of each other in privacy and disclosure literature. However, with overlapping public and private spheres of communication where a presumption of individual agency over personal information is no longer tenable, we argue for the importance of bridging these perspectives towards a more multifaceted view on online disclosure and privacy in a networked ecology.
Collapse
Affiliation(s)
| | - Philipp K Masur
- Department of Communication, Johannes Gutenberg University Mainz, Germany
| |
Collapse
|
47
|
Distler V, Lallemand C, Koenig V. How Acceptable Is This? How User Experience Factors Can Broaden our Understanding of The Acceptance of Privacy Trade-offs. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2019.106227] [Citation(s) in RCA: 20] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
48
|
Segijn CM, van Ooijen I. Perceptions of Techniques Used to Personalize Messages Across Media in Real Time. CYBERPSYCHOLOGY, BEHAVIOR AND SOCIAL NETWORKING 2020; 23:329-337. [PMID: 32330393 DOI: 10.1089/cyber.2019.0682] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
Abstract
The amount of online messages that are personalized based on people's characteristics and interests is growing. Due to technological advancements, it has become possible to personalize messages across media in real time. However, little is known about people's perceptions of these different personalization techniques, while this can have important implications for message effectiveness and the privacy debate. A survey with U.S. adults (N = 1,008) showed that in the context of real-time personalization, all personalization techniques are seen as unacceptable and they are all associated with perceptions of surveillance. This applies to all generations, but younger generations are more likely to accept and to perceive less surveillance than older generations. Furthermore, we found that, of all predictors, perceived surveillance and attitudes toward personalization were the strongest predictors of acceptance of all personalization techniques. The results advance theory by differentiating between personalization techniques and introducing privacy cynicism and mobile device dependency as factors that positively relate to acceptance of personalization techniques. Practically, the results contribute to the debate on consumer agency related to people's personal data and inform media literacy programs.
Collapse
Affiliation(s)
- Claire M Segijn
- Hubbard School of Journalism and Mass Communication, University of Minnesota Twin-Cities, Minneapolis, Minnesota, USA
| | - Iris van Ooijen
- Faculty of Social Sciences, Behavioural Science Institute, Radboud University, Nijmegen, The Netherlands
| |
Collapse
|
49
|
Cho H, Roh S, Park B. Of promoting networking and protecting privacy: Effects of defaults and regulatory focus on social media users’ preference settings. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.07.001] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
50
|
He W, Zhang Z(J. Enterprise cybersecurity training and awareness programs: Recommendations for success. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2019. [DOI: 10.1080/10919392.2019.1611528] [Citation(s) in RCA: 16] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
Affiliation(s)
- Wu He
- Strome College of Business, Old Dominion University, Norfolk, VA, USA
| | | |
Collapse
|