610 results on '"Privacy paradox"'
Search Results
2. Influence of personality traits on generation Z consumers' click-through intentions towards personalized advertisements: A mixed-methods study
- Author
-
Saha, Partha, Sengupta, Angan, and Gupta, Priya
- Published
- 2024
- Full Text
- View/download PDF
3. Data privacy and smart home energy appliances: A stated choice experiment
- Author
-
Du, Hua, Han, Qi, Yang, Dujuan, de Vries, Bauke, and van Houten, Thomas
- Published
- 2023
- Full Text
- View/download PDF
4. Privacy at Risk: Examining the Impact of Artificial Superintelligence-Powered Mind-Reading Technology on Smartphone User Privacy
- Author
-
Moharam, Mohammed Mostafa Refaat, Kacprzyk, Janusz, Series Editor, Novikov, Dmitry A., Editorial Board Member, Shi, Peng, Editorial Board Member, Cao, Jinde, Editorial Board Member, Polycarpou, Marios, Editorial Board Member, Pedrycz, Witold, Editorial Board Member, Alareeni, Bahaaeddin, editor, and Elgedawy, Islam, editor
- Published
- 2025
- Full Text
- View/download PDF
5. The Costs of Connectivity: WhatsApp Usage, Privacy Concerns, and Protection Behaviors in Israel.
- Author
-
Ariel, Yaron and Levy, Eilat Chen
- Subjects
- *
DIGITAL technology , *POLICY sciences , *PARADOX , *AWARENESS , *COST - Abstract
This study examines the implications of WhatsApp usage in Israel, focusing on the interplay between usage patterns, privacy concerns, and protection behaviors. Using a sample of 505 participants, this study aimed to understand whether users are aware of privacy issues and how this awareness translates into proactive protection actions. Results showed a significant positive correlation between usage frequency and privacy concerns, but no significant correlation between usage frequency and protection behaviors. However, there was a strong positive correlation between privacy concerns and protection behaviors, with privacy concerns mediating the relationship between usage and protection behaviors. This study underscores the importance of understanding user behavior and privacy perceptions, providing insights for future research and policymaking to enhance privacy on digital platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
6. Beyond lazy; external locus of control as an alternative explanation for the privacy paradox.
- Author
-
Whelan, Eoin, Lang, Michael, and Butler, Martin
- Subjects
- *
LOCUS of control , *COGNITIVE dissonance , *INTERNET publishing , *LAZINESS , *SELF-disclosure - Abstract
Purpose: The privacy paradox refers to the situation where users of online services continue to disclose personal information even when they are concerned about their privacy. One recent study of Facebook users published in Internet Research concludes that laziness contributes to the privacy paradox. The purpose of this study is to challenge the laziness explanation. To do so, we adopt a cognitive dispositions perspective and examine how a person's external locus of control influences the privacy paradox, beyond the trait of laziness. Design/methodology/approach: A mixed method approach is adopted. We first develop a research model which hypothesises the moderating effects of both laziness and external locus of control on privacy issues. We quantitatively test the research model through a two-phase survey of 463 Facebook users using the Hayes PROCESS macro. We then conduct a qualitative study to verify and develop the findings from the quantitative phase. Findings: The privacy paradox holds true. The findings confirm the significant influence of external locus of control on the privacy paradox. While our quantitative findings suggest laziness does not affect the association between privacy concerns and self-disclosure, our qualitative data does provide some support for the laziness explanation. Originality/value: Our study extends existing research by showing that a person's external locus of control provides a stronger explanation for the privacy paradox than the laziness perspective. As such, this study further reveals the boundary conditions on which the privacy paradox exists for some users of social networking sites, but not others. Our study also suggests cognitive dissonance coping strategies, which are largely absent in prior investigations, may influence the privacy paradox. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
7. Will You Be Watching Me? A Conjoint-Based Study on Employee Attitudes Toward Personal Data Usage in Smart Factories.
- Author
-
Keil, Maike, Vervier, Luisa, Brauner, Philipp, and Ziefle, Martina
- Subjects
- *
DATA privacy , *EMPLOYEE attitudes , *INFORMATION sharing , *DATA protection , *PERSONALLY identifiable information - Abstract
AbstractThe rapid transformation of the industrial sector requires strategies to integrate digitalization and monitoring. While these advancements promote data-driven optimization of manufacturing processes, they raise concerns regarding employee data privacy. This study shifts the focus from the prevalent technological perspective to the perspectives of employees, critically examining the factors influencing their willingness to share data. Employing a Choice-Based Conjoint Analysis with n = 132 participants, our research suggests a strong preference for exclusive control over access to personal data, particularly health-related information, indicating that privacy concerns typically eclipse the advantages offered by data sharing in the workplace. Using latent class analysis, we distinguish between two employee groups characterized by distinct privacy attitudes: “Data Protectors” and “Team Players.” These findings underline the need to further investigate the influence of employee diversity, including demographics, attitudes, and job functions, to effectively optimize communication strategies and address diverse privacy expectations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Privacy paradox stems from overconfidence: a study of users’ privacy disclosure in online knowledge communities.
- Author
-
Jiaxuan, Li, Zhenyan, Li, Jiewang, Chu, and Yue, Wang
- Subjects
- *
PROTECTION motivation theory , *INTERNET privacy , *COMMUNITY development , *SEMI-structured interviews , *INFORMATION sharing , *VIRTUAL communities - Abstract
In OKCs, knowledge sharing is the main activity of users. However, the process of sharing knowledge inevitably discloses privacy. Understanding users’ privacy-disclosure behavior in OKCs is crucial for community development. In order to expose the phenomenon of privacy-disclosure behavior and privacy paradox in OKC, this study employs an explanatory sequential mixed methods design to explore the relationships among users’ privacy literacy (PL), the privacy paradox, and privacy-disclosure intentions in OKCs. We developed a research model based on privacy calculus and protective motivation theory, testing it among 442 long-term OKC users. Additionally, semi-structured interviews with 25 users provide qualitative insights. This paper indicates that many OKC users overestimate their PL, which influences their privacy-disclosure intentions and contributes to the privacy paradox. This implies that overestimating PL may be another reason for the privacy paradox. Furthermore, privacy attitudes and subjective norms emerge as significant factors shaping users’ decisions to disclose personal information, with peer perceptions playing a crucial role in users’ disclosure behaviors. This study contributes to the existing literature on privacy issues in OKCs by shedding light on the complexities surrounding users’ privacy behaviors. It offers practical recommendations for community managers and users to enhance privacy protection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. CBDC AND TRUST IN A CENTRAL BANK: TRANSITIVITY OF PREFERENCES VS. THE PRIVACY PARADOX.
- Author
-
KOZIUK, VIKTOR, IVASHUK, YURII, HAYDA, YURII, and DLUHOPOLSKYI, OLEKSANDR
- Subjects
DATA privacy ,HUMAN behavior ,DIGITAL currency ,DIGITAL technology ,TRUST - Abstract
The privacy and anonymity of transactions are considered some of the biggest challenges when designing Central Bank Digital Currencies (CBDC). While many surveys show that people strongly prefer privacy in their transactions, behavioral theories suggest that human behaviour in digital spaces is more complex, a phenomenon known as the privacy paradox. The research aims to measure privacy preferences in specific situations and examine how these preferences influence choices between anonymous transactions versus the design of CBDC functionality. The study used the ANOVA method to determine if there were significant differences between groups based on privacy preferences. Survey data from respondents in emerging markets showed a mild form of the privacy paradox. The research measured privacy tendencies in three areas: general, digital, and financial environments, and found a statistically significant correlation between these measures. However, the respondents' privacy preferences did not consistently align with their choices between transaction anonymity and CBDC functionality, nor did they consistently relate to trust in central banks as privacy guarantors or the importance of central bank independence for ensuring privacy. The ANOVA test found no significant differences in privacy preferences between respondents who prioritized anonymity or functionality, or between those who trusted or did not trust central banks to guarantee privacy and their independence in doing so. This suggests that when faced with complex decisions, people may exhibit intricate patterns of preference, which is crucial for optimizing CBDC design. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. CBDC and Trust in A Central Bank: Transitivity Of Preferences Vs. The Privacy Paradox
- Author
-
Koziuk Viktor, Ivashuk Yurii, Hayda Yurii, and Dluhopolskyi Oleksandr
- Subjects
anonymity of transactions ,privacy paradox ,digital money ,central bank digital currency (cbdc) ,e41 ,e42 ,e51 ,e58 ,g20 ,Finance ,HG1-9999 - Abstract
The privacy and anonymity of transactions are considered some of the biggest challenges when designing Central Bank Digital Currencies (CBDC). While many surveys show that people strongly prefer privacy in their transactions, behavioral theories suggest that human behaviour in digital spaces is more complex, a phenomenon known as the privacy paradox. The research aims to measure privacy preferences in specific situations and examine how these preferences influence choices between anonymous transactions versus the design of CBDC functionality. The study used the ANOVA method to determine if there were significant differences between groups based on privacy preferences. Survey data from respondents in emerging markets showed a mild form of the privacy paradox. The research measured privacy tendencies in three areas: general, digital, and financial environments, and found a statistically significant correlation between these measures. However, the respondents' privacy preferences did not consistently align with their choices between transaction anonymity and CBDC functionality, nor did they consistently relate to trust in central banks as privacy guarantors or the importance of central bank independence for ensuring privacy. The ANOVA test found no significant differences in privacy preferences between respondents who prioritized anonymity or functionality, or between those who trusted or did not trust central banks to guarantee privacy and their independence in doing so. This suggests that when faced with complex decisions, people may exhibit intricate patterns of preference, which is crucial for optimizing CBDC design.
- Published
- 2024
- Full Text
- View/download PDF
11. Privacy in hospitality: managing biometric and biographic data with immersive technology
- Author
-
Liyanaarachchi, Gajendra, Viglia, Giampaolo, and Kurtaliqi, Fidan
- Published
- 2024
- Full Text
- View/download PDF
12. The adoption of smart services: do privacy concerns, trust in benevolence and usage experience matter?
- Author
-
Viot, Catherine, Lecuyer, Charlotte, Bayart, Caroline, and Lancini, Agnès
- Published
- 2024
- Full Text
- View/download PDF
13. PRIVACY PARADOX: INTEGRATIVE LITERATURE REVIEW.
- Author
-
Gonçalves, Renata Benigna and Bastos de Figueiredo, Júlio César
- Subjects
- *
DATA privacy , *DISCLOSURE , *RESEARCH personnel , *PRIVACY , *PARADOX - Abstract
The so-called privacy paradox refers to individuals' desire for privacy, which is subordinated to their willingness to trade it for the benefits of consuming a product or service, leading to a paradoxical situation. Although multiple theories attempt to explain this phenomenon, there is a lack of studies that integrate, at the construct level, the different theoretical approaches used to understand the privacy paradox. This study proposes a comprehensive view based on a literature review of 34 studies involving 14 theories that support the investigation of the privacy paradox. The review integrates studies addressing (1) the theoretical foundations of the privacy paradox, (2) the factors influencing the privacy paradox, and (3) the behavioral consequences that lead to the privacy paradox. We present an integrated theoretical framework at the construct level, allowing researchers in this field to propose new models derived from combinations of different theoretical approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
14. Does the type of privacy-protective behaviour matter? An analysis of online privacy protective action and motivation.
- Author
-
Orszaghova, Eva and Blank, Grant
- Subjects
- *
PROTECTION motivation theory , *LOGISTIC regression analysis , *INTERNET surveys , *SEMI-structured interviews , *PRIVACY , *INTERNET privacy - Abstract
Individual decisions to protect privacy online are complex. Most research has treated privacy protection measures as a single, unitary category. This paper challenges this notion by looking at multiple categories of privacy protection behaviour. Our data are from the Oxford Internet Survey (OxIS) as well as insights from the semi-structured interviews. We find two types of privacy protective actions, which we call security actions and preventive actions. We use logistic regression, based on protection motivation theory, to investigate what leads people to take either type of action. The contribution of this research is three-fold. First, it shows that individual privacy protection cannot be treated as a single category. Second, it demonstrates that there are different motivations underlying different privacy protection actions. Finally, it proposes an expansion of protection motivation theory to include a contextual aspect based on Nissenbaum (2009, Privacy in context. Stanford University Press). This expansion considers the privacy context defined by actor, activity, values and norms. We suggest that future work on privacy should consider multiple categories and contextual settings. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. The Privacy Paradox and Optimal Bias–Variance Trade-offs in Data Acquisition.
- Author
-
Liao, Guocheng, Su, Yu, Ziani, Juba, Wierman, Adam, and Huang, Jianwei
- Subjects
INCENTIVE (Psychology) ,INTERNET privacy ,ARTIFICIAL intelligence ,ESTIMATION bias ,BUDGET - Abstract
Whereas users claim to be concerned about privacy, often they do little to protect their privacy in their online actions. One prominent explanation for this privacy paradox is that, when an individual shares data, it is not just the individual's privacy that is compromised; the privacy of other individuals with correlated data is also compromised. This information leakage encourages oversharing of data and significantly impacts the incentives of individuals in online platforms. In this paper, we study the design of mechanisms for data acquisition in settings with information leakage and verifiable data. We design an incentive-compatible mechanism that optimizes the worst case trade-off between bias and variance of the estimation subject to a budget constraint, with which the worst case is over the unknown correlation between costs and data. Additionally, we characterize the structure of the optimal mechanism in closed form and study monotonicity and nonmonotonicity properties of the marketplace. Funding: This work is supported by the National Natural Science Foundation of China [Grants 62202512 and 62271434], Shenzhen Science and Technology Program [Grant JCYJ20210324120011032], Guangdong Basic and Applied Basic Research Foundation [Grant 2021B1515120008], Shenzhen Key Laboratory of Crowd Intelligence Empowered Low-Carbon Energy Network [Grant ZDSYS20220606100601002], and the Shenzhen Institute of Artificial Intelligence and Robotics for Society. This work is also supported by the National Science Foundation [Grants CNS-2146814, CPS-2136197, CNS-2106403, and NGSDI-2105648]. Supplemental Material: The online appendix is available at https://doi.org/10.1287/moor.2023.0022. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Exploring Data Privacy and Privacy Paradox Nature of Consumers Using Block Chain Technology: Application of SLR and Bibliometric Analysis Tools.
- Author
-
Afridi, Mohd Faisal and Kumar, Kompalli Sasi
- Subjects
DATA privacy ,GENERAL Data Protection Regulation, 2016 ,BLOCKCHAINS ,TECHNOLOGICAL innovations ,DIGITAL technology - Abstract
This research presents an in-depth study of blockchain technology's impact on data privacy and the consumer behaviour phenomenon known as the privacy paradox. Through a systematic literature review (SLR) and bibliometric analysis, the study delves into the effectiveness of blockchain in safeguarding personal data in an increasingly digital world. Key databases such as Scopus and Web of Science provide rich academic contributions, particularly from regions with stringent data privacy laws. The findings highlight blockchain's effectiveness in limiting unauthorised data access, boosting user control and tackling the privacy paradox, where personal information is shared despite privacy worries. Yet, it points out challenges in aligning blockchain with legal frameworks, such as General Data Protection Regulation, particularly concerning data erasure rights. The study emphasises three themes: blockchain's progression toward robust data protection, psychological aspects of the privacy paradox in consumer decisions and attitudes toward blockchain solutions. It notes gaps in standardisation, public awareness and blockchain's practical applications, alongside ethical and policy issues. Conclusively, the research stresses the need for aligning technological advancements with legal and ethical frameworks, highlighting user experience in digital technology adoption. It positions blockchain as a pivotal factor in reshaping digital privacy, advocating for continued innovation and exploration in blockchain applications to ensure a secure, user-empowering future globally. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. CBDC, Trust in the Central Bank and the Privacy Paradox
- Author
-
Koziuk Viktor, Ivashuk Yurii, and Hayda Yurii
- Subjects
central bank digital currency ,digital money ,anonymity of transactions ,cbdc design ,privacy paradox ,e41 ,e42 ,e51 ,e58 ,g20 ,Business ,HF5001-6182 - Abstract
Privacy/anonymity of digital transactions is an issue that potentially may affect demand for central bank digital currency. Does discussions about privacy paradox related to CBDC? In this paper, basing on the respondent’s survey, we construct indexes of privacy preferences (in general, in digital and financial environment) to identify relations between stated preferences in different contexts and between choice toward anonymity vs functionality of CBDC, trust to central bank as CBDC issuer and its independence as a precondition to guaranty anonymity of transactions. We find that generally respondents demonstrate consequence of preferences in terms of, what we call, general privacy, privacy in digital and financial environment. Distribution of obtained 3 indexes demonstrates some differences. Probit model also demonstrates that relation between choice toward anonymity over functionality of CBDC and level of 3 indexes is modest. Where is no correspondence between choice toward anonymity over functionality and trust in central bank and its independence. However, respondents demonstrate high level of trust in central bank ability to guaranty anonymity of transactions and view independence as supporting it even opting functionality over anonymity. We reach a conclusion that some weak form of privacy paradox is exist, central banks, promoting CBDC, should stress on functionality of it. However, privacy should not be ignored. It is better to have it as “nice bonus” to functionality of CBDC.
- Published
- 2024
- Full Text
- View/download PDF
18. The role of regulatory disposition in explaining the privacy paradox : a study of internet users' interaction with cookie consent notices
- Author
-
Riaz, Sania
- Subjects
Privacy Paradox ,Cookie consent ,Regulatory Focus Theory ,Protection Motivation Theory - Abstract
Privacy has always been an important consideration in computer mediated connections but, more recently, the hyper-connectedness of current internet landscape and its natives has created an urgency for more complete privacy regulations. This research project is inspired by the EU privacy laws, General Data Protection Regulations and the E-Privacy Directives, and the onslaught of cookie banners that resulted from their mistaken interpretations. The current internet environment is a collaborative play between internet users, its myriad service providers, and the regulating bodies aiming to govern the relationships between them. It behoves us to study the interaction of internet users and the new consent management tool that promises to provide users control over their personal information. Of particular interest is the current body of literature that suggests there is a gap between users intending to implement their privacy decisions but not following through with appropriate behaviours. This is dubbed the Privacy Paradox in the literature. There are behavioural explanations for why the paradox may exist, and criticisms that the privacy paradox is observed only when the research design is flawed. The aim of this study is to identify whether there is a gap between the privacy intentions and behaviours when it comes to disabling cookies. It has been suggested in many studies of privacy paradox that the personality of the internet user may also affect the privacy intentions and behaviours. The current explanations of the effect of personal disposition on privacy behaviours are derived from personality psychology and lack depth. This research project intends to explore the effect of personal dispositions on the formation of privacy intentions and behaviours relating to disabling browser cookies on desktop computers. Specifically, the study aims to check if the personal dispositions of internet users affect how they make decisions about their privacy, and whether the differences in disposition could explain the privacy paradox. The study undertakes a rational decision-making approach to privacy, starting with a literature review on how privacy risks are usually modelled in situational settings. Furthermore, research into dispositional factors is explored. Finally, two formal theories, the Protection Motivation Theory (PMT) and the Regulatory Focus Theory (RFT), are identified to test the effect of disposition on privacy decision-making in the presence of situational risk elements. A survey study was designed with the constructs Perceived Severity, Self-Efficacy and Maladaptive Rewards from PMT to model privacy risk appraisal. A new scale called the Privacy Regulatory Scale with two subscales for Promotion and Prevention orientation were developed to measure privacy dispositions. The effect of these independent variables was checked on two dependent variables of Intention (intention to disable cookies) and Behaviour in the contexts of disabling cookies through cookie banners, as well as disabling cookies through browser settings. Behaviour data is collected separately for 3rd-party cookies and for all cookies together, as well as towards cookie banners served on trusted, non-trusted and unknown websites as well. Data was collected through an online survey presented to a Qualtrics panel of UK internet users aged between 18 and 35 for a total usable number of cases n=330. Confirmatory Factor Analysis was used to verify the factor structure before checking for the hypothesized relationships through Structural Equation Modelling using three nested models. A post-hoc analysis was conducted to check for moderating effects of the two dispositional variables on the relationships between PMT variables and the dependent variables. The study finds that the perceived severity of harms from cookie setting is a significant positive indicator of intention to disable cookies, but not the behaviour of disabling cookies. Self-efficacy significantly predicts the behaviour of disabling cookies both through the cookie banners and through the browser settings. Promotion regulatory focus does not affect the formation of intentions to disable cookies. However, promotion focus positively affects the behaviour of disabling cookies both through cookie banners and through browser settings. The effect is particularly large for disabling all cookies through browser settings. Mixed results were observed for prevention regulatory focus, which significantly predicts the intention to disable 3rd-party cookies only. Furthermore, a higher prevention focus significantly reduces the odds that a user would disables cookies through browser settings. Maladaptive Rewards were found to have no direct effects towards intentions or behaviour. We also find that while intentions are significant indicators of respective behaviours their effect is small, thus indicating a presence of privacy paradox in this sample as well. Post-hoc analysis of moderation effects of promotion and prevention focus reveal that they significantly affect the relationship between perceived severity and intentions to disable cookies. Interestingly, prevention orientation significantly affects the relationship between maladaptive rewards and cookie disabling behaviour for trusted websites only. The findings reveal that the regulatory dispositions of internet users directly affect the kind of solutions they adopt to preserve their privacy and indirectly also affect the magnitude of relationships between risk appraisal variables and intentions. The study directly contributes to the understanding of the effect of personal dispositions towards privacy behaviours. The development of privacy regulatory scale can help understand the extent that dispositions affect privacy self-management behaviours in other settings as well. However, the most significant practical implication of this work is that it suggests that neither kind of privacy disposition, as well as the solutions originating from that disposition, performs better at privacy self-management. Therefore, we may keep observing privacy-paradox in further studies as well if the framework for privacy provisions is the notice and choice paradigm. Hence, it can be concluded that the regulations that are based solely on the notice-andchoice framework are likely to fail universally.
- Published
- 2023
19. Does Privacy Awareness Matter? A Study of Voice Assistant-Related Privacy and Security Concerns
- Author
-
Mithila, Zafrin Malek, Lumor, Truth, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Hewage, Chaminda, editor, Nawaf, Liqaa, editor, and Kesswani, Nishtha, editor
- Published
- 2024
- Full Text
- View/download PDF
20. How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context
- Author
-
Schmitt, Vera, Ferrer, Paul Michel dit, Khan, Arooj Anwar, Kern, Ina, Möller, Sebastian, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Carette, Jacques, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Stettner, Lukasz, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Rettberg, Achim, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Bieker, Felix, editor, de Conca, Silvia, editor, Gruschka, Nils, editor, Jensen, Meiko, editor, and Schiering, Ina, editor
- Published
- 2024
- Full Text
- View/download PDF
21. The Privacy Paradox on Social Media: Balancing Privacy Concerns, Perceived Value, and Purchase Intentions with Habit Moderation
- Author
-
Tirtayani, I Gusti Ayu, Wardana, I Made, Setiawan, Putu Yudi, Widagda K, I Gst. Ngr. Jaya Agung, Kustina, Ketut Tanti, Arlita, I G. A. Desy, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Alareeni, Bahaaeddin, editor, and Hamdan, Allam, editor
- Published
- 2024
- Full Text
- View/download PDF
22. Privacy paradox resolution in mHealth: the moderating effect of rationality degree
- Author
-
Zhu, Guang, Li, Fengjing, Yan, Yi, and Guenis, Hustin
- Published
- 2024
- Full Text
- View/download PDF
23. Trust and Inclusion in Digital Health: The Need to Transform Consent
- Author
-
Brightwell, Celia, Brückner, Stefanie, Halpern, Orit, and Gilbert, Stephen
- Published
- 2024
- Full Text
- View/download PDF
24. Evaluation of the Effectiveness of National Promotion Strategies for the Improvement of Privacy and Security.
- Author
-
Iacono, Mauro and Mastroianni, Michele
- Subjects
GRAND strategy (Political science) ,PRIVACY ,CIVIL rights ,BAYESIAN analysis ,PROOF of concept - Abstract
Problems related to privacy and security preservation are in the scope of the concerns of governments and policymakers because of their impact on fundamental rights. Users are called to act responsibly whenever they are potentially exposed to related risks, but governments and parliaments must be proactive in creating safer conditions and a more appropriate regulation to both guide users towards good practices and create a favoring environment which reduces exposure. In this paper, we propose a modeling framework to define and evaluate policies which identify and use appropriate levers to accomplish these tasks. We present a proof-of-concept which shows the viability of estimating in advance the effects of policies and policymakers' initiatives by means of Influence Nets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. 基于数据多粒度的隐私差序保护.
- Author
-
林爱珺 and 章梦天
- Abstract
Copyright of Journal of Soochow University Philosophy & Social Sciences Edition is the property of Soochow University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
26. Understanding Privacy Paradox In Mobile Application Users: An Experimental Approach To Study Privacy Concerns And Actual Disclosure.
- Author
-
Chhabra, Sakhhi
- Subjects
CONSUMER research ,CONSUMER behavior ,CONSUMER attitudes ,MOBILE apps ,HEURISTIC - Published
- 2024
27. A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners †.
- Author
-
Porcelli, Lorenzo, Mastroianni, Michele, Ficco, Massimo, and Palmieri, Francesco
- Subjects
LANGUAGE models ,RIGHT of privacy ,COOKIES (Computer science) ,GENERATIVE pre-trained transformers ,PRIVACY - Abstract
Despite growing concerns about privacy and an evolution in laws protecting users' rights, there remains a gap between how industries manage data and how users can express their preferences. This imbalance often favors industries, forcing users to repeatedly define their privacy preferences each time they access a new website. This process contributes to the privacy paradox. We propose a user support tool named the User Privacy Preference Management System (UPPMS) that eliminates the need for users to handle intricate banners or deceptive patterns. We have set up a process to guide even a non-expert user in creating a standardized personal privacy policy, which is automatically applied to every visited website by interacting with cookie banners. The process of generating actions to apply the user's policy leverages customized Large Language Models. Experiments demonstrate the feasibility of analyzing HTML code to understand and automatically interact with cookie banners, even implementing complex policies. Our proposal aims to address the privacy paradox related to cookie banners by reducing information overload and decision fatigue for users. It also simplifies user navigation by eliminating the need to repeatedly declare preferences in intricate cookie banners on every visited website, while protecting users from deceptive patterns. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. A balancing act: how risk mitigation strategies employed by users explain the privacy paradox on social media.
- Author
-
Gruzd, Anatoliy and Hernández-García, Ángel
- Subjects
- *
PRIVACY , *STRATEGIC planning , *SOCIAL media , *RESEARCH methodology evaluation , *INFORMATION resources management , *SECURITY systems , *DISCRIMINANT analysis , *INFORMATION literacy , *SELF-disclosure , *CONCEPTUAL structures , *MEDICAL ethics , *QUESTIONNAIRES , *DESCRIPTIVE statistics , *RESEARCH funding , *PREDICTION models , *TRUST ,RESEARCH evaluation - Abstract
While there is a growing body of literature on information privacy suggesting different mechanisms of how people's privacy concerns might be impacting their attitudes and behaviour when using social media, recent questionable data use practices by social media platforms and third parties call for a renewed validation of existing information privacy models. The objective of this research is to re-examine the variables predicting why people disclose information on social media. Building on previous work, this paper puts forward a comprehensive Privacy Concerns and Social Media Use Model (PC-SMU) and evaluates it in a specific cultural and legal environment (social media users from a single county, Canada). The study delves into the privacy paradox and shows that the benefits of using social media are the main driver of self-disclosure, and that self-disclosing behaviours are nuanced by the users' information privacy protection strategies. We also find that higher levels of social media literacy, and concerns about organisational threats to a lesser extent, lead to higher levels of information privacy management, emphasizing the importance of educating users about how to use the different privacy and security features provided by social media platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Privacy Preferences and the Drive to Disclose.
- Author
-
Carbone, Erin and Loewenstein, George
- Subjects
- *
PRIVACY - Abstract
The literature on privacy-related behaviors and preferences often frames disclosure as strategic—the result of a weighing of costs and benefits and a pursuit of instrumental benefits rather than as a goal in and of itself. In the present article, we summarize evidence supporting the view that disclosure can exhibit drive-like qualities and that this "drive to disclose" can, at times, overwhelm the motive to maintain privacy. We discuss implications of this perspective, highlighting ways in which recognizing the existence of a drive to disclose can inform privacy research and policy making. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing.
- Author
-
Alashoor, Tawfiq, Keil, Mark, Smith, H. Jeff, and McConnell, Allen R.
- Abstract
Policy-oriented Abstract Data privacy is one of the most pressing issues today. The world is thirsty for novel, effective, and efficient policies to strike an appropriate balance between protecting individuals' privacy and creating economic value from their personal information. Whereas governmental efforts, such as the enaction of General Data Protection Regulation, California Consumer Privacy Act, and other privacy regulations, have been pushing boundaries to strike this balance, the effects of these types of initiatives on individuals' privacy awareness and behavior are uncertain, likely to be nuanced, and will take time to sort out. In this paper, we explain the privacy paradox, a phenomenon with important implications that apply to policymakers, industry professionals, and individuals. The privacy paradox refers to a mismatch between individuals' stated privacy concerns and their actual disclosure behaviors. In three behavioral experiments, we show how the paradox is revealed when individuals are cognitively tired especially when they are in a good mood. These findings do not indicate that individuals do not care about privacy because they do when they are not cognitively tired especially when they are in a bad mood. By explaining the privacy paradox, we inform existing and future privacy policies to strike that balance we all strive for. The confluence of digital transactions, growing cybersecurity threats, and the internet of the future (e.g., web 3.0 and the metaverse) have made information privacy increasingly important to consumers and companies that rely on consumers willingly sharing their personal information. Although information privacy has been of interest to researchers for decades and much has been learned, one thing that perplexes scholars is the privacy paradox, which we define as a mismatch between stated privacy concerns and actual disclosure behaviors. In this paper, we shed light on this phenomenon and show that low-effort information processing triggered by cognitive depletion (Experiment 1), positive mood (Experiment 2), or both (Experiment 3) significantly attenuates the association between stated privacy concerns and disclosure behaviors. These findings do not indicate that individuals do not care about privacy because we find consistent evidence in the three experiments for a significant negative association between stated privacy concerns and disclosure behaviors when individuals have sufficient cognitive capacity (Experiment 1), experience a negative (or neutral) mood (Experiment 2), or have sufficient cognitive capacity coupled with a negative mood state (Experiment 3). Our findings reveal that the paradox is neither an absolute phenomenon nor a myth, but its existence is conditional on contextual factors, including psychological factors related to information processing. We discuss our contribution to privacy theory and provide implications for consumers, companies, and policymakers. History: Alessandro Acquisti, Senior Editor; Idris Adjerid, Associate Editor. Supplemental Material: The online appendix is available at https://doi.org/10.1287/isre.2022.1182. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Protection or Cynicism? Dual Strategies for Coping with Privacy Threats
- Author
-
Yu, Lu, He, Li, Du, Jian, and Wu, Xiaobo
- Published
- 2024
- Full Text
- View/download PDF
32. 'I Simply Accept the Terms and Conditions so that I Can Use an App at All': Smartphone Use and Privacy Among Older Adults in Switzerland
- Author
-
Speck, Sarah, Pauli, Cora, Ursprung, Cornelia, Wallimann, Miriam, Huber, Robert, Misoch, Sabina, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Gao, Qin, editor, Zhou, Jia, editor, Duffy, Vincent G., editor, Antona, Margherita, editor, and Stephanidis, Constantine, editor
- Published
- 2023
- Full Text
- View/download PDF
33. How do privacy concerns affect consumers’ self-disclosure on social media?
- Author
-
Ni, ShiYang, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Yacob, Shakila, editor, Cicek, Berat, editor, Rak, Joanna, editor, and Ali, Ghaffar, editor
- Published
- 2023
- Full Text
- View/download PDF
34. Unpacking Privacy Calculus and Interplay of Data Privacy and Healthcare: Paths Towards Safeguarding Patient Empowerment
- Author
-
Sakib, Nazmus, Veeramalla, Hari Sai Jogesh, Naidu, Nisarga Allu Raghu, Anik, Fahim Islam, Vanga, Lakshman Reddy, Valero, Maria, Hossain, Eklas, Kacprzyk, Janusz, Series Editor, Daimi, Kevin, editor, Alsadoon, Abeer, editor, and Seabra Dos Reis, Sara, editor
- Published
- 2023
- Full Text
- View/download PDF
35. From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior
- Author
-
Gerber, Nina, Stöver, Alina, Gerber, Nina, editor, Stöver, Alina, editor, and Marky, Karola, editor
- Published
- 2023
- Full Text
- View/download PDF
36. Evaluating the Effectiveness of Privacy and Security Promotion Strategies
- Author
-
Iacono, M., Mastroianni, M., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Gervasi, Osvaldo, editor, Murgante, Beniamino, editor, Rocha, Ana Maria A. C., editor, Garau, Chiara, editor, Scorza, Francesco, editor, Karaca, Yeliz, editor, and Torre, Carmelo M., editor
- Published
- 2023
- Full Text
- View/download PDF
37. Alternative Platforms and Privacy Paradox: A System Dynamics Analysis
- Author
-
Arzoglou, Ektor, Kortesniemi, Yki, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Mikyška, Jiří, editor, de Mulatier, Clélia, editor, Paszynski, Maciej, editor, Krzhizhanovskaya, Valeria V., editor, Dongarra, Jack J., editor, and Sloot, Peter M.A., editor
- Published
- 2023
- Full Text
- View/download PDF
38. The Determinants of the Self-disclosure on Social Network Sites : Research-in-Progress
- Author
-
Salih, Lina, Al-Balushi, Ahlam, Al-Busaidi, Amal, Al-Rahbi, Shaikha, Tarhini, Ali, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Al-Emran, Mostafa, editor, Al-Sharafi, Mohammed A., editor, and Shaalan, Khaled, editor
- Published
- 2023
- Full Text
- View/download PDF
39. Unmasking the Privacy Paradox: Understanding Moderating Role of Myopic-Self in the Relationship between Privacy Concern and Self-Disclosure
- Author
-
Puthiyakath, Hashim H and Goswami, Manash P
- Published
- 2023
- Full Text
- View/download PDF
40. Postprivacy in the digital age
- Author
-
Chesnokova, Lesya V.
- Subjects
postprivacy ,digital media ,social networks ,digital traces ,privacy paradox ,Philosophy (General) ,B1-5802 - Abstract
Introduction. The article deals with the actual problem of changing attitudes towards privacy in connection with the development of modern information and communication technologies. The purpose of the study is to philosophically analyze the phenomenon of post-privacy, identify the causes and consequences of its occurrence using logical, hermeneutic and comparative methods. The novelty of the work lies in the conceptualization of the socio-philosophical phenomenon of post-privacy. Theoretical analysis. It is stated that due to the development of computer technologies, we have lost control over access to our personal information, since any action we perform in the Internet space leaves digital traces. It is argued that the payment of an individual for participation in modern society is to provide access to his personal data for state and commercial organizations. It is noted that knowledge about a person gives power over him, enabling to influence his thinking and behavior and exercise social control over him. Conclusion. Since we live in an era of new information openness, we should reconsider our attitude to the problem of privacy. As one of the ways of social interaction in the era of post-privacy, the individual refuses to claim complete control over information about himself.
- Published
- 2023
- Full Text
- View/download PDF
41. Defining Biometrics With Privacy and Benefits: A Research Agenda.
- Author
-
Payne, Ryan, Martin, Brett A. S., Tuzovic, Sven, and Wang, Shasha
- Abstract
This conceptual paper defines and gives examples of biometrics, explains how biometric tracking is currently used (e.g. to predict IQ), and presents innovative future uses of biometric tracking (e.g. to customize the price of products in real time). Specifically, this paper outlines a novel biometric pricing technology (BPT) which uses facial tracking to set the price of products using a new participatory dynamic pricing (vs. static pricing) system. Based on the privacy paradox, this paper addresses the acceptance, concerns and usage of a new emerging technology by consumers and its potential applications. To explore this, we develop a typology of perceived benefits and perceived privacy to predict consumer reactions to biometric technology. In addition, we present a research agenda to guide future research on biometric pricing technology. This research agenda offers new insights on how biometric tracking and specifically biometric price setting could be explored from multiple angles, including the consumer experience, technology acceptance, online profiling, governance, public policy, regulation, ethical and future usage-based perspectives. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. AI-driven public services and the privacy paradox: do citizens really care about their privacy?
- Author
-
Willems, Jurgen, Schmid, Moritz J., Vanderelst, Dieter, Vogel, Dominik, and Ebinger, Falk
- Subjects
MUNICIPAL services ,PRIVACY ,DATA privacy ,PARADOX ,ARTIFICIAL intelligence - Abstract
Based on privacy calculus theory, we derive hypotheses on the role of perceived usefulness and privacy risks of artificial intelligence (AI) in public services. In a representative vignette experiment (n = 1,048), we asked citizens whether they would download a mobile app to interact in an AI-driven public service. Despite general concerns about privacy, we find that citizens are not susceptible to the amount of personal information they must share, nor to a more anthropomorphic interface. Our results confirm the privacy paradox, which we frame in the literature on the government's role to safeguard ethical principles, including citizens' privacy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. 言行不一?态度元认知视角下在线用户" 隐私悖论"研究: ERPs证据.
- Author
-
孙 锐, 朱秋华, 王 伟, 唐文龙, 周颖芮, and 韦志颖
- Abstract
Copyright of Nankai Business Review is the property of Nankai Business Review Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
44. Digital natives aren’t concerned much about privacy, or are they?
- Author
-
Maier Edith, Doerk Michael, Reimer Ulrich, and Baldauf Matthias
- Subjects
data protection ,privacy ,privacy by design ,privacy paradox ,voice assistants ,Communication. Mass media ,P87-96 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Voice assistants have become embedded in people’s private spaces and domestic lives where they gather enormous amounts of personal information which is why they evoke serious privacy concerns. The paper reports the findings from a mixed-method study with 65 digital natives, their attitudes to privacy and actual and intended behaviour in privacy-sensitive situations and contexts. It also presents their recommendations to governments or organisations with regard to protecting their data. The results show that the majority are concerned about privacy but are willing to disclose personal data if the benefits outweigh the risks. The prevailing attitude is one characterised by uncertainty about what happens with their data, powerlessness about controlling their use, mistrust in big tech companies and uneasiness about the lack of transparency. Few take steps to self-manage their privacy, but rely on the government to take measures at the political and regulatory level. The respondents, however, show scant awareness of existing or planned legislation such as the GDPR and the Digital Services Act, respectively. A few participants are anxious to defend the analogue world and limit digitalization in general which in their opinion only opens the gate to surveillance and misuse.
- Published
- 2023
- Full Text
- View/download PDF
45. Problem of Personal Data Security and the Phenomenon of Post-Privacy in the Digital Society
- Author
-
Lesya V. Chesnokova
- Subjects
information privacy ,personal data security ,digitalization ,privacy paradox ,Philology. Linguistics ,P1-1091 ,Philosophy (General) ,B1-5802 - Abstract
The purpose of the article is to conceptualize the changes that are taking place in the perception of information privacy in today’s digital society. The relevance of the work is due to the development of modern information and communication technologies, the global spread of which changes the attitude towards the security of personal data. To analyze the problems associated with the rethinking of the phenomenon of privacy in the modern digital age, a systematic approach is used, as well as methods of historical analysis, hermeneutic and logical methods. The phenomenon of the privacy paradox is described, which lies in the fact that, despite the fact that many users express concern about the safety of their personal information, they are not ready to give up the benefi ts that the use of new technologies gives them. Doubts are increasingly being expressed about the fundamental possibility of controlling the dissemination of personal information, since the life of an individual becomes transparent to both government agencies and commercial structures. As a result of the development of digital technologies and the associated possibilities for collecting, storing and processing information, an argument is put forward that privacy, in the form in which it existed before, is an outdated concept. The fi ndings suggest that since it is impossible to control access to personal data, claims to privacy should be abandoned altogether. The changes taking place in modern society are refl ected in the term “post-privacy”, which describes a situation in which information privacy is no longer perceived as a value that requires protection. In a rapidly developing digital environment, further research into the problem of post-privacy is of particular importance.
- Published
- 2022
- Full Text
- View/download PDF
46. Privacy on the Internet: An Empirical Study of Poles’ Attitudes
- Author
-
Daniel Mider
- Subjects
online behavior ,online freedom ,privacy paradox ,privacy perceptions ,Management information systems ,T58.6-58.62 - Abstract
The value system of Poles in terms of the phenomenon of privacy on the Internet was analysed. The following aspects were taken into account: privacy on the Internet as a moral value, privacy on the Internet as a subject of legal regulations (current or future) and actual actions taken by users to protect privacy. The differentiation of Polish society in terms of the three above-mentioned areas was also examined. Results were obtained on the basis of a quantitative empirical study conducted on a representative sample (N=1001) of adult Poles. The method of computer assisted telephone interviews (CATI) was used. Descriptive statistics and selected inductive statistics were used in the analyses. Intra-group differentiation was investigated using a method called two-step cluster analysis. Poles have low technical competences in the field of Internet privacy protection. This value is appreciated; however, it rarely translates into active protection of ones own identity and information. A strong polarization of Poles attitudes towards the requirement to disclose their identity on the Internet was identified, as well as ensuring access to any user information by law enforcement agencies. Poles are willing to accept legal regulations preventing their profiling. We note a moderately strong negative attitude towards state institutions as a factor limiting privacy on the Internet and a significantly lower (but still negative) attitude towards Internet service providers. Poles differ in terms of attitudes towards privacy on the Internet (IT competences, age, education, gender, socioeconomic status and size of the place of residence).
- Published
- 2022
- Full Text
- View/download PDF
47. Is the Privacy Paradox a Domain-Specific Phenomenon.
- Author
-
Hirschprung, Ron S.
- Subjects
ONLINE social networks ,PRIVACY ,DIGITAL technology ,PARADOX ,SOCIAL media - Abstract
The digital era introduces significant challenges for privacy protection, which grow constantly as technology advances. Privacy is a personal trait, and individuals may desire a different level of privacy, which is known as their "privacy concern". To achieve privacy, the individual has to act in the digital world, taking steps that define their "privacy behavior". It has been found that there is a gap between people's privacy concern and their privacy behavior, a phenomenon that is called the "privacy paradox". In this research, we investigated if the privacy paradox is domain-specific; in other words, does it vary for an individual when that person moves between different domains, for example, when using e-Health services vs. online social networks? A unique metric was developed to estimate the paradox in a way that enables comparisons, and an empirical study in which (n = 437) validated participants acted in eight domains. It was found that the domain does indeed affect the magnitude of the privacy paradox. This finding has a profound significance both for understanding the privacy paradox phenomenon and for the process of developing effective means to protect privacy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Affective forces of connection and disconnection on Facebook: a study of Australian parents beyond toddlerhood.
- Author
-
Maslen, Sarah
- Subjects
- *
AFFECT (Psychology) , *PARENTS , *PARENTING , *AFFECTIVE computing , *USER experience - Abstract
Research has demonstrated that new mothers are among the most active users of Facebook. There has been only limited empirical investigation of parents' Facebook practices in the years following babyhood. This article examines patterns of Facebook use among parents of children aged between two and eight based on interviews and observations. In contrast to earlier phases of parenting, many users had adopted selective modes of engagement or were seeking to step back from the platform. Parents' accounts highlight the affective dimensions of their enactments of Facebook for information and support. Situated in the literature on connective and disconnective strategies on Facebook, I argue that the affective forces users experience in relation to Facebook extend beyond what we would traditionally think of as the boundaries of the Facebook user assemblage, with experiences of anxiety and judgment continuing after the choice to disconnect. Parents who remained active users had developed strategies to know with the technology, and to manage its affective forces. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Information Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information.
- Author
-
Kaleta, Jeffrey P., Mahadevan, Lakshman, and Thackston, Russell
- Subjects
ARTIFICIAL intelligence ,INFORMATION technology ,PERSONALLY identifiable information ,INCOME ,AGE groups - Abstract
People are faced with a variety of incentives to divulge personally identifiable information (PII) as online businesses aim to personalize consumer experiences. However, little is known about how people perceive the worth of their PII in relation to the benefits they receive. This brings to question the true worth of information specifically in terms of importance and value. Understanding how people perceive the worth of the PII allows online businesses to establish strategies to enhance the experiences offered to online consumers. In this study, we examine the question “what is the worth of PII?” by employing a survey instrument measuring perceptions across different groups of socioeconomic indicators: education, income, and age. Our findings suggest that the worth of PII is not equally perceived across all groups. More specifically, we find education to be a larger contributor to the perceived differences in information worth. We believe our findings can impact how researchers evaluate PII and how online businesses evaluate PII worth to improve the consumer experience. [ABSTRACT FROM AUTHOR]
- Published
- 2023
50. UNDERSTANDING PRIVACY PARADOX: AN EXPERIMENTAL APPROACH TO STUDY PRIVACY CONCERNS AND ACTUAL DISCLOSURE AMONG APP USERS.
- Author
-
Chhabra, Sakhhi, Mukherjee, Jaydeep, and N Agarwal, Madhushree
- Subjects
DATA privacy ,RIGHT of privacy ,BOUNDED rationality ,COGNITIVE bias ,INFORMATION asymmetry - Abstract
Consumers increasingly protest invasions of privacy by digital applications and platforms, yet they habitually reveal more information than their disclosure intent. This paradoxical behavior has been explained using rational and irrational reasons (cognitive biases and heuristics), but they have been essentially conjectural. Thus, in this research, we empirically verify the existence of the privacy paradox and test four such reasons using quasi-experiments: privacy calculus as a rational explanation, information asymmetry as part of bounded rationality, bandwagon effect as a cognitive bias, and trust as a decision-making heuristic. A dummy app was developed to collect data from 594 mobile application users. The existence of the privacy paradox was tested using regression between privacy concern and actual disclosure. Following this, the reasons for the privacy paradox were tested using ANOVA. We concluded that privacy paradox exists in the defined sample, and the two reasons that explain the privacy paradox are information asymmetry and the peanut effect. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.