Is the Privacy Paradox a Domain-Specific Phenomenon
Abstract
:1. Introduction
2. Estimation Methodology
2.1. Estimating the Paradox—Elementary Elements
2.2. Formalizing the Paradox Raw Measurement
2.3. Paradox Analysis
3. Empirical Study
3.1. The Empirical Study Design
3.2. The Participants
3.3. Results
3.3.1. Data Cleansing
- Arbitrary answers: If 85% or above of the answers were identical, this participant’s answer was disqualified.
- Inconsistency: As described above, the survey also included a separate section where participants were asked about their general privacy concerns. This section contained eight questions, and the answers to these questions were given on an 11-level Likert scale. The average result was normalized to five levels (the same as section c, the core questionnaire). If the average of these two sections deviated by more than two levels, the participant’s answer was disqualified.
3.3.2. Raw Results
3.3.3. Domain-Specific Analysis
4. Discussion
5. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Correia, J.; Compeau, D. Information privacy awareness (IPA): A review of the use, definition and measurement of IPA. In Proceedings of the 50th Hawaii International Conference on System Sciences, Waikoloa Village, HI, USA, 4–7 January 2017. [Google Scholar]
- Wagner, C.; Trenz, M.; Veit, D. How do habit and privacy awareness shape privacy decisions? In Proceedings of the AMCIS 2020 Proceedings 23, Virtual, 15–17 August 2020.
- ITU. New ITU Statistics Show More than Half the World Is Now Using the Internet; International Telecommunication Union (ITU): Geneva, Switzerland, 2018. [Google Scholar]
- Shepherd, J. What is the digital era? In Social and Economic Transformation in the Digital Era; IGI Global: Hershey, PA, USA, 2004; pp. 1–18. [Google Scholar]
- Ahmed, A.; Javed, A.R.; Jalil, Z.; Srivastava, G.; Gadekallu, T.R. Privacy of web browsers: A challenge in digital forensics. In Proceedings of the Genetic and Evolutionary Computing: Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computing, Jilin, China, 21–23 October 2021; Springer: Singapore, 2022. [Google Scholar]
- Jones, B.I. Understanding Ecommerce Consumer Privacy From the Behavioral Marketers’ Viewpoint. Ph.D. Dissertation, Walden University, Minneapolis, MN, USA, 2019. [Google Scholar]
- Bellekens, X.; Seeam, A.; Hamilton, A.W.; Seeam, P.; Nieradzinska, K. Pervasive eHealth services a security and privacy risk awareness survey. In Proceedings of the 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), London, UK, 13–14 January 2016. [Google Scholar]
- Akman, G.; Ginzboorg, P.; Damir, M.T.; Niemi, V. Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility. Computers 2022, 12, 2. [Google Scholar] [CrossRef]
- Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
- Anic, I.-D.; Budak, J.; Rajh, E.; Recher, V.; Skare, V.; Skrinjaric, B. Extended model of online privacy concern: What drives consumers’ decisions? Online Inf. Rev. 2019, 43, 799–817. [Google Scholar] [CrossRef]
- IGI Global. What is Privacy Concern. 2021. Available online: https://www.igi-global.com/dictionary/privacy-concern/40729 (accessed on 28 June 2023).
- Lin, S.-W.; Liu, Y.-C. The effects of motivations, trust, and privacy concern in social networking. Serv. Bus. 2012, 6, 411–424. [Google Scholar] [CrossRef]
- Xu, H.; Gupta, S.; Rosson, M.B.; Carroll, J.M. Measuring mobile users’ concerns for information privacy. In Proceedings of the Thirty Third International Conference on Information Systems, Orlando, FL, USA, 16–19 December 2012. [Google Scholar]
- Aljifri, H.; Navarro, D.S. Search engines and privacy. Comput. Secur. 2004, 23, 379–388. [Google Scholar] [CrossRef]
- Petronio, S.; Altman, I. Boundaries of Privacy: Dialectics of Disclosure; Suny Press: Albany, NY, USA, 2002. [Google Scholar] [CrossRef]
- The Privacy Issue. Decoding the Privacy Paradox. 2021. Available online: https://theprivacyissue.com/privacy-and-society/decoding-privacy-paradox (accessed on 28 June 2023).
- Stouffer, C. The Privacy Paradox: How Much Privacy Are We Willing to Give up Online? Norton. 2021. Available online: https://us.norton.com/blog/privacy/how-much-privacy-we-give-up#:~:text=First%20coined%20in%202001%2C%20the,t%20protect%20their%20information%20online (accessed on 1 May 2023).
- Norberg, P.A.; Horne, D.R.; Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consum. Aff. 2007, 41, 100–126. [Google Scholar] [CrossRef]
- Kim, B.; Kim, D. Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox. Sustainability 2020, 12, 5163. [Google Scholar] [CrossRef]
- Zhu, M.; Wu, C.; Huang, S.; Zheng, K.; Young, S.D.; Yan, X.; Yuan, Q. Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue. Telemat. Inform. 2021, 61, 101601. [Google Scholar] [CrossRef]
- Chen, L.; Huang, Y.; Ouyang, S.; Xiong, W. The Data Privacy Paradox and Digital Demand; National Bureau of Economic Research: Cambridge, MA, USA, 2021. [Google Scholar] [CrossRef]
- Barnes, S.B. A privacy paradox: Social networking in the United States. First Monday 2006, 11. [Google Scholar] [CrossRef]
- Gerber, N.; Gerber, P.; Volkamer, M. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 2018, 77, 226–261. [Google Scholar] [CrossRef]
- Hargittai, E.; Marwick, A. What can I really do?” Explaining the privacy paradox with online apathy. Int. J. Commun. 2016, 10, 21. [Google Scholar]
- Barth, S.; de Jong, M.D.; Junger, M.; Hartel, P.H.; Roppelt, J.C. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telemat. Inform. 2019, 41, 55–69. [Google Scholar] [CrossRef]
- Min, J.; Kim, B. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. J. Assoc. Inf. Sci. Technol. 2014, 66, 839–857. [Google Scholar] [CrossRef]
- Kokolakis, S. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Comput. Secur. 2017, 64, 122–134. [Google Scholar] [CrossRef]
- Stones, R. Structuration Theory, Traditions in Social Theory; Macmillan International Higher Education: London, UK, 2005. [Google Scholar]
- Solove, D.J. The myth of the privacy paradox. Geo. Wash. L. Rev. 2021, 89, 1. [Google Scholar] [CrossRef]
- Martin, K. Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms. Bus. Ethic Q. 2019, 30, 65–96. [Google Scholar] [CrossRef]
- Lutz, C.; Strathoff, P. Privacy Concerns and Online Behavior--Not So Paradoxical after All? Viewing the Privacy Paradox through Different Theoretical Lenses. 2014. Available online: https://ssrn.com/abstract=2425132 (accessed on 26 July 2023).
- AlAbdali, H.; AlBadawi, M.; Sarrab, M.; AlHamadani, A. Privacy preservation instruments influencing the trust-worthiness of e-government services. Computers 2021, 10, 114. [Google Scholar] [CrossRef]
- Cole, B.M. The Privacy Paradox Online: Exploring How Users Process Privacy Policies and the Impact on Privacy Protective Behaviors. Ph.D. Dissertation, San Diego State University, San Diego, CA, USA, 2023. [Google Scholar]
- Willems, J.; Schmid, M.J.; Vanderelst, D.; Vogel, D.; Ebinger, F. AI-driven public services and the privacy paradox: Do citizens really care about their privacy? Public Manag. Rev. 2022, 1–19. [Google Scholar] [CrossRef]
- Dienlin, T.; Trepte, S. Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 2014, 45, 285–297. [Google Scholar] [CrossRef]
- ElShahed, H. Privacy Paradox Amid E-Commerce Epoch: Examining Egyptian Youth’s Practices of Digital Literacy Online. In Marketing and Advertising in the Online-to-Offline (O2O) World; IGI Global: Hershey, PA, USA, 2023; pp. 45–64. [Google Scholar]
- Gouthier, M.H.; Nennstiel, C.; Kern, N.; Wendel, L. The more the better? Data disclosure between the con-flicting priorities of privacy concerns, information sensitivity and personalization in e-commerce. J. Bus. Res. 2022, 148, 174–189. [Google Scholar] [CrossRef]
- Schubert, R.; Marinica, I.; Mosetti, L.; Bajka, S. Mitigating the Privacy Paradox through Higher Privacy Literacy? Insights from a Lab Experiment Based on Facebook Data. 2022. Available online: https://ssrn.com/abstract=4242866 (accessed on 26 July 2023).
- Lee, A.-R. Investigating the Personalization–Privacy Paradox in Internet of Things (IoT) Based on Dual-Factor Theory: Moderating Effects of Type of IoT Service and User Value. Sustainability 2021, 13, 10679. [Google Scholar] [CrossRef]
- Duan, S.X.; Deng, H. Exploring privacy paradox in contact tracing apps adoption. Internet Res. 2022, 32, 1725–1750. [Google Scholar] [CrossRef]
- Bandara, R.; Fernando, M.; Akter, S. Explicating the privacy paradox: A qualitative inquiry of online shopping consumers. J. Retail. Consum. Serv. 2019, 52, 101947. [Google Scholar] [CrossRef]
- Wu, P.F. The privacy paradox in the context of online social networking: A self-identity perspective. J. Assoc. Inf. Sci. Technol. 2018, 70, 207–217. [Google Scholar] [CrossRef]
- Hou, Z.; Qingyan, F. Quantifying and Examining Privacy Paradox of Social Media Users. Data Anal. Knowl. Discov. 2021, 5, 111–125. [Google Scholar] [CrossRef]
- Gimpel, H.; Kleindienst, D.; Waldmann, D. The disclosure of private data: Measuring the privacy paradox in digital services. Electron. Mark. 2018, 28, 475–490. [Google Scholar] [CrossRef]
- Paolacci, G.; Chandler, J.; Ipeirotis, P.G. Running experiments on Amazon Mechanical Turk. Judgm. Decis. Mak. 2010, 5, 411–419. [Google Scholar] [CrossRef]
- Bentley, F.R.; Daskalova, N.; White, B. Comparing the Reliability of Amazon Mechanical Turk and Survey Monkey to Traditional Market Research Surveys. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017; pp. 1092–1099. [Google Scholar] [CrossRef]
- Bates, J.A.; Lanza, B.A. Conducting psychology student research via the Mechanical Turk crowdsourcing service. N. Am. J. Psychol. 2013, 15, 385–394. [Google Scholar]
- Burleigh, T. What Is Fair Payment on MTurk? 2019. Available online: https://tylerburleigh.com/blog/what-is-fair-payment-on-mturk/ (accessed on 26 July 2023).
- Gamire, E.; Pearson, G. Tech Tally: Approaches to Assessing Technological Literacy; Island Press: Washington, DC, USA, 2006; p. 5. [Google Scholar]
- Long, J.D.; Feng, D.; Cliff, N. Ordinal Analysis of Behavioral Data. In Handbook of Psychology; Wiley Online Library: Hoboken, NJ, USA, 2003; pp. 635–661. [Google Scholar]
- Supriyadi, T.; Saptani, E.; Rukmana, A.; Suherman, A.; Alif, M.N.; Rahminawati, N. Students’ Technological Literacy to Improve Academic Writing and Publication Quality. Univers. J. Educ. Res. 2020, 8, 6022–6035. [Google Scholar] [CrossRef]
- Baruh, L.; Secinti, E.; Cemalcilar, Z. Online Privacy Concerns and Privacy Management: A Meta-Analytical Review. J. Commun. 2017, 67, 26–53. [Google Scholar] [CrossRef]
- Elahi, S. Privacy and consent in the digital era. Inf. Secur. Tech. Rep. 2009, 14, 113–118. [Google Scholar] [CrossRef]
- Hu, R. Breaking the Privacy Paradox: Pushing AI to the Edge with Provable Guarantees. 2022. Available online: https://www.proquest.com/docview/2665535602?pq-origsite=gscholar&fromopenview=true (accessed on 1 April 2023).
- Goldfarb, A.; Que, V.F. The Economics of Digital Privacy. Annu. Rev. Econ. 2023, 15. [Google Scholar] [CrossRef]
- Obar, J.A.; Oeldorf-Hirsch, A. Older Adults and ‘The Biggest Lie on the Internet’: From Ignoring Social Media Policies to the Privacy Paradox. Int. J. Commun. 2022, 16, 4779–4800. [Google Scholar]
- Bhroin, N.N.; Dinh, T.; Thiel, K.; Lampert, C.; Staksrud, E.; Ólafsson, K. The privacy paradox by proxy: Considering predictors of sharenting. Media Commun. 2022, 10, 371–383. [Google Scholar] [CrossRef]
- ITEEA. Standards for Technological Literacy: Content for the Study of Technology; ITEEA: Reston, VA, USA, 2000. [Google Scholar]
- Furnell, S.; Moore, L. Security literacy: The missing link in today’s online society? Comput. Fraud. Secur. 2014, 5, 12–18. [Google Scholar] [CrossRef]
- Desimpelaere, L.; Hudders, L.; Van de Sompel, D. Knowledge as a strategy for privacy protection: How a privacy literacy training affects children’s online disclosure behaviour. Comput. Hum. Behav. 2020, 110, 106382. [Google Scholar] [CrossRef]
Domain | Tested Parameter |
---|---|
e-commerce | performing e-commerce transactions on secured/insecure sites. |
online social networks (OSN) | Sharing personal sensitive information via a post on OSN. |
Information-Sharing | providing personal information voluntarily to a survey request. |
Advertising trap (Ad Trap) | providing personal information to unknown commercial entities |
Phishing | browsing a website from a URL that was provided via email. |
Security | protecting a personal computer by using updated genuine antivirus software (refers to cyber security). |
Privacy Rigor | a general trait, reading privacy notices when installing a new smartphone application. |
Medical Information | Asking for medical advice on public platforms like a WhatsApp group. |
e-Commerce | OSN | Information- Sharing | Ad Trap | Phishing | Security | Privacy Rigor | Medical- Information | |
e-Commerce | = | |||||||
OSN | = | = | = | = | ||||
Information-Sharing | ||||||||
Ad Trap | = | = | ||||||
Phishing | ||||||||
Security | = | |||||||
Privacy Rigor | ||||||||
Medical-Information |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hirschprung, R.S. Is the Privacy Paradox a Domain-Specific Phenomenon. Computers 2023, 12, 156. https://doi.org/10.3390/computers12080156
Hirschprung RS. Is the Privacy Paradox a Domain-Specific Phenomenon. Computers. 2023; 12(8):156. https://doi.org/10.3390/computers12080156
Chicago/Turabian StyleHirschprung, Ron S. 2023. "Is the Privacy Paradox a Domain-Specific Phenomenon" Computers 12, no. 8: 156. https://doi.org/10.3390/computers12080156
APA StyleHirschprung, R. S. (2023). Is the Privacy Paradox a Domain-Specific Phenomenon. Computers, 12(8), 156. https://doi.org/10.3390/computers12080156