Next Article in Journal
Mutual Information between EDA and EEG in Multiple Cognitive Tasks and Sleep Deprivation Conditions
Previous Article in Journal
The Measure of an Outcome: Comparing Norming and Stacking to Benchmark the Effectiveness of Brain Injury Rehabilitation Services
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Impact of Shared Information Presentation Time on Users’ Privacy-Regulation Behavior in the Context of Vertical Privacy: A Moderated Mediation Model

1
School of Business Administration, Huaqiao University, Quanzhou 362000, China
2
Oriental Business Management Research Center, Huaqiao University, Quanzhou 362000, China
3
School of Business Administration, Jimei University, Xiamen 362000, China
*
Author to whom correspondence should be addressed.
Behav. Sci. 2023, 13(9), 706; https://doi.org/10.3390/bs13090706
Submission received: 15 June 2023 / Revised: 21 August 2023 / Accepted: 22 August 2023 / Published: 25 August 2023
(This article belongs to the Topic Online User Behavior in the Context of Big Data)

Abstract

:
Combining data-sharing models and algorithm technologies has led to new data flow structures and usage patterns. In this context, the presentation time of shared low-sensitivity information across platforms has become a crucial factor that affects user perception and privacy-regulation behavior. However, previous studies have not conducted an in-depth exploration of this issue. Based on privacy process theory, this study discusses the impact and potential mechanism of the presentation time (immediate or delayed) of shared low-sensitivity information across platforms on privacy-regulation behavior. Through a pre-study and two online survey experimental studies, which included 379 participants in total, we verified that the immediate information presentation time has a significantly higher impact on online vigilance and privacy-regulation behavior than the delayed condition, βdirect = 0.5960, 95% CI 0.2402 to 0.9518; βindirect = 0.1765, 95% CI 0.0326 to 0.3397, and users’ perceived control as the moderating role influences online vigilance and privacy-regulation behaviors (preventive or corrective), βpreventive = −0.0562, 95% CI −0.1435 to −0.0063; βcorrective = −0.0581, 95% CI −0.1402 to −0.0065. Based on these results, we suggest that the presentation time of using shared low-sensitivity information across platforms should be concerned by companies’ recommendation algorithms to reduce users’ negative perceptions and privacy behaviors and improve user experience.

1. Introduction

Through multimodal communication [1], the combination of data-sharing models and algorithm technologies has led to novel data flow structures and usage patterns, which have altered users’ perceptions and reactions toward the use of personal data on mobile platforms [2]. For example, several mainstream applications (apps), such as Facebook, Twitter, and WeChat, have an increasing number of related parties and authorized partners with whom they share certain low-sensitivity information through the third-party service agreements that users have to authorize before using the service [3,4,5,6]. Concurrently, real-time recommendations with faster response capabilities [7,8,9] are widely adopted in these apps. The combination of platforms’ data stream sharing structure and real-time algorithms has improved the accuracy and responsiveness of apps’ personalized services [10]. However, scholars have cautioned that the combination of information flow and algorithm will produce qualitative changes in users’ perception of how data sharing affects their privacy; thus, the low-sensitivity information, previously regarded as less impactful on users’ privacy behaviors [2], could become an important influencing factor in this context [1,11]. Additionally, the massive usage of users’ low-sensitivity information in recent years has increased privacy-regulation behaviors, such as diving, closing personalized services, or directly refusing to use apps [12,13,14]. Many countries have introduced laws to empower users to refuse personalized services in the recent past, thus bringing immense challenges to platforms in terms of maintaining users’ activity and accessing personal data. Therefore, further in-depth study on the impact of sharing low-sensitivity information across platforms in novel algorithm contexts on users’ perception and privacy behavior is required.
Previous studies on the impact of shared information on user privacy behavior have mainly focused on the relationship between social media information sharing among user groups and user privacy disclosure behavior, privacy concerns, and authorization behavior [11,15]. Research on the impact of the collection and use of personal information by personalized algorithm technology on users’ privacy behavior and tendencies mainly focused on information-collection methods (hidden or open) [16,17], information-storage programs [18], information transparency [19,20], the relevance of advertising information [21], technology insecurity [22], illegal use of sensitive data [23], platform commitment [24,25], and other factors.
However, there are two problems with these prior studies. First, several previous investigations of personal privacy behavior caused by information sharing have focused on individuals’ active privacy behavior against potential threats to the users’ privacy in the horizontal privacy context. However, less attention has been paid to privacy behavior after users’ passive consent to share their personal information with the third-party platform, referred to as the vertical privacy context [2]. The loss of sensitive information not authorized by the users can be measured in the horizontal privacy context [23] by calculating the severity and probability of risk to explain users’ privacy behavior [22,26,27,28,29]. Nevertheless, in the vertical privacy context where information has been authorized by users at the beginning, the users cannot fully understand the underlying technology and rules of information sharing flow across platforms; thus, potential threat during the process of sharing low-sensitivity information among platforms for users is difficult to calculate using the loss and the probability of occurrence in the Privacy Calculus theory [1].
Second, theories such as Communication Privacy Management (CPM) suggest that the unsuitable timing of the release of unauthorized sensitive information to third parties can lead to the cessation of the privacy boundary from the original information discloser [30,31,32]. However, these theories failed to note how people perceived the low-sensitivity information already authorized across platforms and the strategies they would adopt in response. The Privacy Process Model theory (PPM), which was developed based on CPM theory, posits the necessity to analyze the characteristics of specific new technologies to discuss users’ perceptions and behavior and provides a theoretical framework to explain why people continue to disclose their information when perceived privacy risks exist [1].
However, so far, the PPM theory has not been applied in an empirical study focusing on users’ responses to the characteristics of specific new technologies, and the theory does not consider the collective privacy regulatory behavior involving information collection and usage by third-party apps and service suppliers [31,32]. Therefore, analysis of the impact of the presentation time of the sharing of low-sensitivity information on users’ perception of online vigilance and privacy-regulation behavior within the framework of the PPM theory would extend the theory’s application in the combined context of across-platform data-sharing models and real-time algorithm technology.
Altogether, this study investigated the effect of presentation time of shared low-sensitivity information across platforms and the boundary conditions of perceived control on users’ perception and privacy-regulation behaviors within the framework of the PPM theory. This study explored the collective privacy relationship between the users, the platform they used, and the third-party platform in the process of sharing users’ low-sensitivity information across platforms. This study expanded on users’ perceptions and privacy-regulation behaviors in regard to algorithm technology in the big data context. These findings will help to reduce users’ negative perceptions and privacy behaviors and inform digital platforms on how to improve real-time algorithms and user loyalty.
The rest of this study is arranged in the following manner: in the next section, the background of the research is explained based on the existing literature, followed by the research methods, results, discussion, and conclusions, along with theoretical and practical implications and limitations, which include potential directions for follow-up studies.

2. Literature Review and Research Hypothesis

2.1. Vertical Privacy

With the technological development of networks and big data technologies, users face a new economy in which personal information is a commodity. A platform can collect as much user information as possible and then summarize and analyze it to infer the user’s interests and purchase intentions. In this context, scholars have gradually started to distinguish vertical and horizontal privacy. Horizontal privacy refers to the threat from other users that results in the malign and uncontrolled spread of personal information on social media. Vertical privacy refers to the threat from the network platforms and institutions which collect and use a large amount of user information. At the vertical level, a platform starts gathering personal information as authorized through user registration, the agreement to the “service terms” and “privacy statement” of the online platform, and the agreement to authorize third-party application services. The platform can continuously track and collect information on users’ behavior and activity and even share or transfer collected low-sensitivity personal information with third-party applications.
Scholars point out that further study on vertical privacy is particularly important for the following reasons. First, vertical privacy threats originate from the progress of online service technology, both software and hardware, and have become increasingly prominent with the development of big data technology. Furthermore, different technologies vary in terms of the information flow characteristics of the unprecedented amount of collected users’ information, thus making it difficult for users to control vertical privacy risks. Second, compared to the horizontal level of self-disclosure, the vertical privacy issue is more difficult to recognize, leading to delayed awareness or even total ignorance of the existence of this concept by users. Previous studies showed that while users have taken various measures to protect their horizontal privacy, they remain largely uncertain about how to protect their vertical privacy. However, if people can perceive or understand the vertical characteristics of the collected and analyzed information, they will exhibit behavioral responses. For example, when participants became aware of how often some of their sensitive data are accessed by other apps, 95% of them reassessed their privacy settings, and 58% of the participants further restricted some of them [33]. Making people aware of the inferences that can be made based on the data they provide can make them more concerned about releasing this information and more cautious about posting it online [34]. Therefore, it is necessary to conduct an in-depth study on the impact of technical features on user privacy behavior in vertical privacy scenarios during the actual process of online communication services.

2.2. Privacy-Regulation Behavior

Privacy-regulation behavior refers to specific actions taken by people to adjust the privacy level they are facing to maintain social interactions while avoiding risks—in other words, individuals need to disclose themselves appropriately while achieving their comfort level of privacy protection [1]. Regulation of personal space and physical contact (also referred to as haptic and spatial privacy regulation), time, physical appearance, etc., can help to obtain the desired level of social interaction [1]. In the network environment, individuals’ information regulation behavior includes controlling and managing their own information by choosing which data to disclose or not (i.e., information hiding) [32].
Individual privacy-regulation behavior online can be categorized into preventive and corrective behavior. Preventive behaviors were identified, such as using pseudonyms and false information, creating a group friend list or adjusting privacy settings to limit the visibility of personal information, using different accounts to show different content, using anti-tracking software, and adopting a secret language [31,35]. Corrective behaviors include deleting published or disclosed content, choosing to quit some online activities, turning off personalized recommendation and advertising options, changing social platforms, and blacklisting or deleting friends [2,36].
Substantial literature shows that people have various privacy-regulation behaviors when they are aware of privacy threats online; however, most existing research focuses on horizontal privacy threats and less on the privacy-regulation behaviors towards vertical privacy threats caused by data sharing across multiple platforms [1].

2.3. Privacy Process Model Theory

PPM provides a theoretical framework to model how people perceive and respond in different privacy situations and explains why people still choose to disclose their information even when they perceive privacy risks. PPM is based on the assumption that individuals evaluate whether they have reached the desired privacy level through their subjective perception of the objective privacy situation and then adjust the level of self-disclosure to change the environment (i.e., privacy regulation) [37]. By improving on the CPM theory, which posits that people lose their privacy through self-disclosure, PPM has the following key features: (1) it regards privacy as the degree of separation from others, (2) it distinguishes between objective and subjective privacy perception, and (3) it integrates the concept of privacy regulation and self-disclosure [1]. The self-disclosure adjustment behavior of individuals is regarded as a useful function to adjust the privacy level in PPM [37]. For example, deliberately altering the options of the website cookie banner can manipulate the outcome of users’ privacy decisions and “nudge” users into sharing their data [38]. The PPM theory includes four main elements: privacy context, privacy perception, privacy-regulation behavior, and privacy controllability [37]. However, PPM is still ambiguous about the specific characteristics of privacy situations and ignores the collective privacy management process in multimodal communication [1]. Thus, further in-depth study on the impact of specific characteristics on privacy-regulation behavior is needed.

2.4. Information Presentation Time and Privacy-Regulation Behavior

The shared information presentation time across platforms refers to when user-authorized data are shared and transferred to the current platform and emerge as the recommended content. It can also refer to the time that recommended content based on cross-platform shared data updated by the recommendation algorithms is presented to the users. In a real-time or streaming recommendation situation [7,8,9], the data’s update and presentation time varies depending on the recommendation algorithms, which are typically based on the combination of two strategies that generate the updated recommendation results: (1) regular collection of user data for offline modeling and updating, or (2) online real-time update based on the user’s behavior in the recent seconds [7,8,9,39]. The latter is quite popular, with several mainstream apps, including Tiktok and Alibaba, adopting real-time recommendation algorithms.
In previous studies, scholars found that the presentation time of personalized recommendation had a significant impact on user behavior (e.g., click behavior), and some studies found that the presentation time (immediate or delayed) of personalized recommendation influenced the recommendation effect [40,41]. Burgoon et al. studied the impact of time on privacy behavior in the non-network context and realized that people could achieve privacy by time while allowing the territory to overlap in space, for example, people avoiding crowded low-privacy environments by taking public transport during off-peak hours [42] or delaying a reply to privacy violation dialogue to isolate the immediate privacy risks [42]. On the internet, the privacy regulation of users also involves time-level management behaviors. For example, due to the persistence of data storage technologies on social media, users delete or withdraw some content that could cause a risk in the future [41]. Tufekci also noted that current privacy decisions could cause problems in the future and suggested that further studies on the “time” boundary of privacy are required [43]. Petronio’s CPM theory defines the time when individuals’ sensitive information is disclosed from the second party to the third parties as the factor of linkage when the binary privacy information boundary is converted into collective multiple boundaries. Individuals evaluate the appropriateness of disclosure according to the transferring time to decide on the opening or closing of the private information boundary; if the transferring time of sensitive information is too short, then individuals are more likely to choose closed information boundaries [44]. However, studies based on the CPM theory mostly focus on sensitive information and thus cannot fully explain the perception of low-sensitivity information and privacy-regulation behavior caused by the transferring time of such information.
Therefore, in the vertical privacy context, which combines sharing technologies across platforms and real-time algorithms, we believe that the presentation time characteristic is the main factor that leads to users’ regulation behaviors. Users adjust the privacy-regulation behavior according to the transferring and presenting time among the multiple boundaries of information. Compared with the delayed condition, an immediate presentation time would lead to a higher privacy-regulation behavior. Consequently, we propose:
H1: 
The presentation time of shared information among platforms negatively affects users’ privacy-regulation behavior.

2.5. Online Vigilance

The concept of online vigilance was proposed by Klimmt et al. to explain the perception of blurred boundaries and work–life conflicts among social media users caused by the “always online” high responsiveness of the immediate communication technology [45]. For social media with job-like attributes, users’ workmates need to reply, follow, release, comment, or provide likes to the users’ updated information, which means that all users’ peers may be able to monitor them virtually [45]. The more immediate the other people’s responses are, the higher the perception of online vigilance is [46,47]. From the information processing perspective, different timing leads to different perceptions. For example, the accessibility–diagnosability theory posits that the ease of access to information from one’s memory is related to the likelihood of using this information to diagnose a situation the individual is facing, and that the time interval since the individual last activated the information cognition leads to different perception to the situation [48]. Information processing theory stipulates that a closer time interval among the events leads to their higher cognitive relevance to an individual and a higher perception of the relevance of the events [49,50]. Therefore, the closer the time of the potential threat, the higher the likelihood that it is perceived as more relevant.
Although it is difficult to calculate and measure the authorized low-sensitivity information from the dimensions of perceived severity and probability, the real-time recommendation algorithms make for the high response speed of user information sharing among platforms, which leads to users’ online vigilance. The shorter the information-sharing presentation time, the higher the online vigilance of the users. An immediate information presentation time causes higher user online vigilance than a delayed situation. Consequently, we propose:
H2: 
The shared information presentation time negatively affects users’ online vigilance.
Bossi et al. found that online vigilance generated by the high responsiveness of working social media leads to burnout or emotional exhaustion, resulting in social media avoidance [47,51]. An increase in online vigilance leads to more serious avoidance behavior [52]. Liang and other scholars noted that potential network security threats caused by technology improvements generate a sense of urgency among users—the stronger the threat perception is, the more likely they are to take protective actions, such as closing cookies or avoiding a sense of urgency through post-corrective actions [28,29]. Therefore, we posit that a higher online vigilance awareness leads to a higher privacy-regulation behavior:
H3: 
Online vigilance positively affects users’ privacy-regulation behavior.

2.6. Perceived Control

Perceived control related to privacy behavior refers to how much the users feel in control of their personal privacy information [53]. In personalized services, Tucke found that if websites’ privacy settings offer options such as “opt out” that can be used to enhance consumers’ perceived control of personal information, consumers’ click rate on personalized ads generated by using their personal data is improved [54]. Song et al. noted that when consumers feel they have more control over personal information, the impact of personalized privacy risks on the consumers’ privacy behavior decreases, even when they perceive privacy threats [55]. Brandimarte et al. manipulated participants’ perceived control of information in the experiment and found that participants who clearly perceived that they could control the release and access of personal information would disclose more personal information—a sense of more control makes users more inclined to ignore privacy risks [56].
Compensatory control theory notes that acquiring and maintaining a high sense of personal control is a basic human need [57]. When people believe their control is threatened, they are motivated to restore it [58,59] by adopting different following strategies. First, a person’s sense of control is enhanced by solving problems. Thus, when people feel threatened by losing control, they become motivated to solve their current problems [57] using their own ability and resources to restore their sense of control. Moreover, a lack of personal control leads to an increased desire to establish order and structure to draw tangible or intangible boundaries that can increase individuals’ sense of control in response to threats [60]. In addition, the lack of sense of control makes it easier to believe or recall exaggerated opinions and news, such as conspiracy theories and negative news, and users tend to seek an explanation for the chaotic outside world to make it feel more understandable and controllable [58,61]. Therefore, during the collection and use of cross-platform low-sensitivity information, users with low perceived control are more likely to recall news and opinions that report on privacy violation issues, stimulate their privacy awareness, and exhibit a desire to establish invisible psychological boundaries. All these feelings generate online vigilance and privacy-regulation behavior to restore the sense of control.
Therefore, this study assumes that a low perception of control strengthens the relationship between online vigilance and corrective vs. preventive behaviors and thus enhances corrective vs. preventive behaviors. A low perception of control strengthens the relationship between the information presentation time and both corrective and preventive behaviors, thereby enhancing corrective vs. preventive behaviors in advance. Consequently, we propose:
H4: 
Perceived control moderates the relations between online vigilance and preventive behavior and between the information presentation time and preventive behavior.
H5: 
Perceived control moderates the relations between online vigilance and corrective behavior and between the information presentation time and corrective behavior.

2.7. Research Model

The conceptual model of this study is shown in Figure 1. The independent variable is the presentation time of information shared between platforms; the dependent variable is privacy-regulation behavior (including preventive behavior and corrective behavior); the mediating variable is online vigilance; the mediating variable is perceived control; and the control variables include gender, age, education background, individual privacy concerns, and perceived information overload.
We tested the participants’ privacy concerns and perceived information overload as two control variables besides demographics in this conceptual model. The existence of the effect of privacy concerns on the users’ privacy behaviors is still controversial because many studies have found a phenomenon privacy paradox wherein privacy concerns did not affect the users’ privacy behaviors, while many other studies posited that privacy concerns did affect the users’ privacy behaviors [62,63,64]. Perceived information overload is also regarded as a factor that could cause user privacy fatigue, leading to privacy behaviors [65].
Our aim is to test whether the presentation times of shared low-sensitivity information affect participants’ privacy behaviors irrespective of their levels of privacy concern. We also refer to a prior study [66] to control perceived information overload in the materials and procedures below. To enhance the validation of the conceptual model at the statistical level, we used the participants’ privacy concerns and perceived information overload as control variables.

3. Materials and Methods

To assess the conceptual model shown in Figure 1, we adopted a questionnaire survey experimental method [17,40] and created one pre-study and two online questionnaire surveys. The purpose of the pre-study was to test whether the participants could significantly perceive the different presentation times of shared low-sensitivity information (delayed or immediate) while eliminating the interference of information overload and other factors in the experimental materials used in the main studies. Study 1 tested the main and mediating effects of the model, and Study 2 tested the moderating effect of the model.

3.1. Pre-Study

To simulate real app browsing scenarios and exclude as much as possible the different preferences for online products, an e-book that ranked among the top ten most popular online shopping digital products according to the Ministry of Commerce of China was used as the product that was presented to the participants in the form of pictures in the pre-study. Participants’ trust and preference for different platforms and product brands were controlled by using “X” and “Y” as the names of the two apps, and “B” was used as the name of the product brand.
The pre-study featured two different presentation time conditions [40]. In the immediate condition, participants received a recommendation message based on the content of shared target information immediately when switching from app X to app Y. In the delayed condition, the participants received a recommendation message based on the content of shared target information after switching from app X to app Y and browsing three irrelevant content messages. The impact of information overload was controlled by setting the number of words as well as the speed and time of three irrelevant recommendation messages, referring to Liu’s study on non-information overload conditions [66].
The participants were randomly chosen to read the following notes: “Please imagine and put it into the following scenario: your mobile phone has installed apps X and Y at the same time, and you have already agreed to the users’ privacy policies of both apps and have begun to use them. One morning you opened your mobile phone and did the following things: first, clicked on app ‘X’ to view the configuration, price, and other information of brand B e-book”. The following message was then conveyed to the participants in the immediate condition: “Then, you opened another app ‘Y’ and saw the recommended information of brand B e-book”. On the other hand, the following message was sent to the participants in the delayed condition: “Then, you opened app ‘Y’ to browse the following information (three irrelevant content messages that control the time and the number of words), after which you saw the recommended information of brand B e-book.”
From 10 to 13 June 2022, we recruited 75 college students from a university in Fujian Province, China, including 39 males and 36 females (mean age = 25.4, SD = 3.64), to participate in the pre-study. The participants read two kinds of material carefully and completed the manipulation test items [67] for information presentation times in the two conditions (1 = low, 7 = high). The paired sample t-tests of the presentation times manipulation test items revealed the following: Mimmediate = 3.468, Mdelayed = 5.021 (p = 0.0007 < 0.001). There was a significant difference between the two groups in terms of the presentation time, indicating that the two types of material can be used as experimental manipulation materials.

3.2. Study 1

One of the main objectives of Study 1 was to investigate the effect of the information presentation time (immediate vs. delayed) on users’ privacy-regulation behavior and the mediating effect of online vigilance, thus testing the hypotheses H1–H3.

3.2.1. Materials and Procedures

(1)
Materials
The questionnaire comprised four parts. The first part presented the tested experimental stimulus materials in the pre-study. In the second part, the participants completed the control variables related to participants’ privacy concerns and information overload. In the third part, the participants finished the target information recognition item, online vigilance scale, and privacy-regulation behavior scale. The fourth part comprised the control variables related to participants’ gender, age, and educational background [17]. To the greatest extent possible, we adapted the constructs from the measurement scales used in prior studies to fit the context. A seven-point Likert scale was used for all the measurement scale items, with responses ranging from “strongly disagree” (1) to “strongly agree” (7). The online vigilance scale was adapted from Liang and Xue [28,29] and included three items. Privacy-regulation behavior was measured using Wolf’s scale [68] and included seven items across two subscales measuring the corrective and preventive behaviors. The privacy concern scale was adapted from the Internet users’ information privacy concerns scale [69]. The information overload scale was adapted from the perceived information overload scale from Chung et al. [70]. The full list of all items is illustrated in the Supplementary Materials.
To validate the questionnaire, we employed the content and face validity methods used in previous studies [71]. The questionnaire was first evaluated by four experts from the Department of User Behavior of E-commerce [72]. It was then read by 30 volunteers who were recruited from 2 universities in Fujian province, China, who were asked to provide any recommendations to ensure that every item was clear and readable. We then revised the questionnaire considering all the feedback and performed the survey using the online survey platform Credamo, which is one of the most commonly used survey platforms in China.
The unit of analysis was an independent user of the apps. The volunteer participant app users were recruited using Credamo online randomly to minimize any potential bias [73]. Each participant provided informed consent in order to be included in the study. The participants were then randomly sent the links to the two types of surveys previously tested in the pre-study and were rewarded with 3–5 RMB if they read the experimental scenario carefully and completed the test honestly and seriously. The application to conduct the studies was reviewed and approved by the Science and Technology Ethics Committee of Jimei University.
(2)
Procedures
Participants (n = 220) aged 18–40 years were recruited voluntarily through the platform Credamo. Those who failed to pass the attention test, finished too fast, failed the target information recognition test, or repeatedly provided the same answer were excluded (n = 40). The data from 180 participants, including 89 and 91 in, respectively, the immediate and delayed groups (see Table 1), were analyzed.
The experiment controlled the following factors. One, to control the influence of forgetting the initial presentation in the delayed group, the participants were asked to perform the target information recognition test [74]. Two, as mentioned above, we also tested the participants’ privacy concerns and perceived information overload as control variables before the main test. Third, to control the influence of demographics, the participants were required to report the corresponding information (gender, age, and education level) after completing the experiment. In addition, the participants were told to complete the questionnaire anonymously to ensure their privacy; thus, they were expected to answer as truthfully as possible.

3.2.2. Results of Study 1

(1)
Reliability and validity test
SPSS 23.0 was used to test the reliability and validity of items and scales. The Cronbach’s α of the items that measured time manipulation, privacy-regulation behavior, online vigilance, privacy concerns, and perceived information overload ranged from 0.804 to 0.904, indicating acceptable to excellent internal consistency. The average variance extracted (AVE) values of the above items and scales ranged from 0.606 to 0.695, meeting the requirements of convergence validity.
(2)
Multicollinearity diagnosis
A multicollinearity diagnosis was conducted using variance inflation factor (VIF) and tolerance values. The VIF of the independent, mediating, and control variables ranged from 1.033 to 1.260, and the tolerance values ranged from 0.783 to 0.968, which meets the accepted requirements of VIF (<10) and tolerance values (>0.1) [75], indicating no multicollinearity problem.
(3)
Hypothesis test
First, an independent sample t-test was conducted on the effective items of presentation time manipulation. We found Mdelayed = 5.930 (SD = 0.785) and Mimmediate = 5.258 (SD = 0.936) (t = 5.224, p = 0.001 < 0.01), which indicated that the operation of information presentation time difference was effective.
Second, the main effect of presentation time on privacy-regulation behavior was tested: Mdelayed = 4.438 (SD = 1.151) and Mimmediate = 5.319 (SD = 1.190) (t = 5.244, p = 4.9 × 10−7 < 0.001). The impact of immediate and delayed information presentation time on user privacy-regulation behavior significantly differed. Thus, H1 is valid.
Third, we tested the mediating effect of online vigilance in the association between presentation time and privacy-regulation behavior. The independent sample t-test results showed that online vigilance differed significantly between the two groups Mdelayed = 5.056 (SD = 1.275) and Mimmediate = 6.036 (SD = 1.136); t = 5.447, p = 1.7 × 10−7 < 0.001. Then, we used the bootstrapping (5000 resamplings) method to test the mediating effect, as proposed by Hayes et al. (Model 4) [76]. The control variables were gender, age, educational background, perceived control, and privacy concerns. Figure 2 indicates the standardized coefficients and significance values for each path in the hypothesized model. According to the regression analysis results of the mediation model, presentation time had a significant positive impact on (1) online vigilance (β = 0.8434, p = 5.6 × 10−6) and (2) privacy-regulation behavior (β = 0.5960, p = 0.0011 < 0.01); online vigilance had a significant positive impact on privacy-regulation behavior (β = 0.2093, p = 0.0040 < 0.01); and education background had a significant positive impact on (1) online vigilance (β = 0.3848, p = 0.0003 < 0.001) and (2) privacy-regulation behavior (β = 0.3388, p = 0.0011 < 0.01). On the other hand, gender, age, educational background, and privacy concern level did not have significant impacts on online vigilance and privacy-regulation behavior.
Table 2 shows that the mediating effect of online vigilance was significant. Therefore, the mediating effect of online vigilance is only partial, and H2 and H3 are supported.

3.3. Study 2: The Regulatory Role of Perceived Control

3.3.1. Materials and Procedures

Study 2 aimed to verify the robustness of the concept model and explore the moderating effect of perceived control. We adopted a 2 (information presentation time: immediate or delayed) × 2 (perceived control: high or low) two-factor inter-group design. Perceived control was measured and grouped by using the scores of the Perceived Control Scale adapted from Xu et al. [77]. The Cronbach’s α of the items was 0.78, indicating acceptable to excellent internal consistency, and the other measurement items were the same as in Study 1.
A total of 240 participants aged 18–40 years were recruited through the same online survey platform as in Study 1. The experimental process was the same as described for Study 1. The only change was that the target product was a kettle (instead of an e-book) to test the conceptual model’s robustness in different product categories. Finally, 199 informative participants were obtained, including 99 and 100 in, respectively, the immediate and delayed groups (see Table 3).

3.3.2. Results of Study 2

(1)
Reliability and validity test
SPSS 23.0 was used to test the reliability and validity of each scale and item. The Cronbach’s α of the measures of time manipulation, corrective behavior, preventive behavior, online vigilance, perceived control, and privacy concern ranged from 0.739 to 0.904, indicating acceptable to excellent internal consistency. The AVE value of each item and the scale ranged from 0.537 to 0.767, meeting the requirements of convergence validity.
The Cronbach’s α of the items that measured time manipulation, corrective behavior, preventive behavior, online vigilance, privacy concerns, perceived control, and perceived information overload ranged from 0.817 to 0.931, indicating acceptable to excellent internal consistency. The average variance extracted (AVE) values of the above items and scales ranged from 0.603 to 0.773, meeting the requirements of convergence validity.
(2)
Multicollinearity diagnosis
The VIF of the independent variable, mediating variable, moderating variable, and control variables ranged from 1.060 to 1.353, and the tolerance value ranged from 0.739 to 0.940, which meets the accepted requirements of VIF (<10) and tolerance value (>0.1) [75], indicating no multicollinearity problem.
(3)
Hypothesis test
First, an independent sample t-test was performed to test the effect of the presentation time. The results showed a significant difference between the two groups (Mdelayed = 5.640 (SD = 0.857) and Mimmediate = 5.283 (SD = 0.785); t = 3.058, p = 0.0031 < 0.01).
Second, we tested the moderating effect of perceived control on information presentation time and corrective and preventive behaviors, as well as the moderating effect of perceived control on online vigilance mediation. Bootstrapping (5000 resamples) was used to analyze the mediating effect of regulation (Model 15 in Hayes et al. [76]) (see Table 4).
Table 4 shows that educational background had a significant positive impact on CRB (β = 0.3723, p = 0.0003 < 0.001), while other control variables had no significant impact on CRB. The interaction items of PRT and PRC had a significant negative impact on CRB (β = −0.2519, p = 0.0403 < 0.05). PRC weakened the relationship between PRT and CRB—participants with low PRC had higher CRB under immediate conditions. The interaction of OV and PRC had a significant negative impact on CRB (β = −0.0912, p = 0.0048 < 0.05), which means that perceived control weakened the relationship between OV and CRB; that is, people with low PRC under high OV had higher CRB. Education had a significant positive impact on CRB (β = 0.3723, p = 0.0003 < 0.001), while other control variables had no significant impact on CRB.
Education background had a significant positive impact on PRB (β = 0.3296, p = 0.0028 < 0.05), while other control variables had no significant impact on PRB. The interaction term of the PRT and PRC had a significant negative impact on PRB (β = −0.3401, p = 0.0101 < 0.05). PRC weakened the relationship between PRT and PRB. Under the condition of immediate PRT, people with low PRC had higher PRB. The interaction of OV and PRC had a significant negative impact on PRB (β = −0.0882, p = 0.0109 < 0.05). PRC weakened the relationship between PRT and PRB; people with low PRC had higher PRB under the high OV condition. Education had a significant positive impact on PRB (β = 0.3723, p = 0.0003 < 0.001), while other control variables had no significant impact on PRB (see Figure 3, Figure 4, Figure 5 and Figure 6).
High and low perceived control groups were generated from the participants whose levels of perceived control were outside of the ± 1 SD range from the mean. According to the results of the moderated mediation effect on CRB (Table 5), the interaction of OV and PRC had a significant positive impact on CRB. The decision index was −0.0581, and the corresponding confidence interval was [−0.1402, −0.0065], indicating a valid moderated mediation effect. The negative value indicated that low PRC strengthened the mediating role of OV in the relationship between PRT and CRB, thereby enhancing CRB. The mediating effect value of OV under low perceived control was 0.2526, which was higher than the mediating effect value of 0.0704 under high perceived control. Individuals with low PRC demonstrated a stronger effect on CRB through OV.
The results of the test that measured the moderated mediating effect showed that PRC moderated the mediating effect of OV between PRT and PRB. The decision index was −0.0562, and the corresponding confidence interval was [−0.1435, −0.0063], indicating a true negative moderated mediating effect. This demonstrated that PRC weakened the mediating effect of OV between PRT and PRB. High PRC weakened the mediating role of OV in the relationship between PRT and PRB, thereby reducing PRB. The mediating effect value of OV under a low PRC was 0.2417, higher than that under a high PRC of 0.0656. Individuals with low perceived control had a stronger effect on PRB through OV. Therefore, H4 and H5 are supported.
Except for the pre-study, the two studies had data from 379 participants for final analysis, larger than the minimum sample size (250 responses) recommended by the multiple regression model [75,78].

4. Discussion

4.1. Theoretical Implications

This study aimed to explore whether the combination of cross-platform data flow and real-time recommendation algorithm technologies in vertical privacy contexts of multi-platforms communication changed users’ perceptions toward using low-sensitivity personal data on mobile multi-platform exchanges (i.e., vertical privacy context). The main conclusion is that the shared information presentation time between platforms affected users’ privacy-regulation behaviors. This finding aligned with the previous results based on CPM theory [79,80]. However, several differences exist between this work and prior studies. First, previous studies showed that the notification used by enterprises to publicly inform customers regarding data collection is a critical factor for customers’ willingness to use the recommended information and obviating their privacy behaviors [17,23,81,82]. Our study, based on PPM, showed that privacy-related behaviors could occur after the users have been informed about the data collection rules and even after they authorized sharing a part of their data at the beginning of using the apps via the corresponding privacy policies. Second, prior studies demonstrated that users only showed privacy reactions to the use of sensitive information [35,83,84]; however, our study proved that sharing and using low-sensitivity information also caused privacy-regulation behavior in the context of real-time recommendation technology and sharing data flow mode between platforms. This study confirmed the relationship between the presentation time of the recommended content generated by the low-sensitivity shared information between platforms and the users’ privacy-regulation behavior, thus expanding the privacy context characteristics of PPM [44]. Furthermore, we proved that the privacy concern, tested as a control variable, did not affect the participants’ privacy behaviors within the tested ranges of the presentation times of shared low-sensitivity information across platforms. This result is in line with the studies that suggested that the privacy paradox is caused by users’ delayed awareness or even total ignorance of the risks posed by the new big data technologies [65].
In terms of users’ perception of low-sensitivity information usage in real-time recommendations technology, this study verified the partial mediating role of online vigilance. Prior studies based on CPM and Technology Threat Avoidance theories showed that the collection and usage of personal sensitive information cause the perception of severe and sensitive privacy risks, thus leading to privacy behaviors [28,29]. However, these theories fail to explain why low-sensitivity information sharing, regarded as having low severity and sensitivity levels, could also lead to privacy behaviors [11]. This study showed that highly responsive instant technology could cause online vigilance perception of low-sensitivity information [45,46]. We verified that online vigilance played an important mediating role between the use and presentation time of shared information and privacy-regulation behavior, thus expanding the application of PPM and extending the mediating mechanism of the impact of information presentation time on user information behavior.
Finally, this study verified that a user’s perceived control affected that person’s strategies of privacy-regulation behavior caused by presentation time and online vigilance. Previous studies emphasized sensitive information usage and found that precautionary behavior was the most common response to the users’ privacy-regulation behavior [35,83,84]. This study found that low-sensitivity information could lead to both corrective and preventive regulation behavior. Perceived control moderated the main effect of information presentation time on privacy-regulation behavior and mediated the effect of online vigilance on privacy-regulation behavior. This result expands the understanding of the boundary conditions of the impact of information presentation time on privacy-regulation behavior.

4.2. Practical Implications

From the macro level of the policy system and the meso level of platform enterprises, studies have demonstrated that the sharing and flow of non- or low-sensitivity data between platforms are conducive to improving the utilization rate of data resources and creating greater value [85,86,87]. Although, at the vertical level, many online companies are investing substantially in cybersecurity, and a large amount of research on recommendation technology is also striving to desensitize and de-identify sensitive data for applications [86,87,88], from the micro perspective of user perception, the combination of information sharing between platforms and real-time recommendation technology is a “double-edged sword”. On the one hand, it will improve the pertinence and responsiveness of recommendation content; on the other hand, it will cause users to be vigilant and display privacy-related behavior regarding the collection and sharing of personal information across platforms.
In order to reduce users’ privacy-regulation behavior caused by the presentation time of low-sensitivity information sharing between platforms, this study suggests the following. First, there is a need to adjust the algorithm combination of information sharing and real-time recommendation to avoid using new, short-term, and immediate preferences across platforms to reduce the users’ online vigilance. Instead, we suggest focusing on analyzing users’ long-term and stable preferences regarding the shared information.
Second, from the perspective of reducing privacy behavior, digital platforms can regularly offer users information-protection measures options on the website, adopt more intuitive explanation flow charts to improve users’ information-protection skills, provide more channels to express users’ opinions, and encourage users to participate in the feedback improvement of recommendation algorithms. These measures will improve users’ perception of personal information control and reduce preventive behavior. Further, there is a need to make users aware of how platforms manage huge amounts of low-sensitivity data to reduce the negative impact of corrective behavior. For example, platforms can set up rules mandating the periodical removal of users’ low-sensitivity data.

4.3. Limitations

We note a few considerations that provide context for the conclusions that can be drawn from these findings. The first two limitations are directly related to the survey-based experimental setup. First, the times of information transfer and presentation tested in this work cannot fully represent the entire timeframe of users’ perceptions and reactions. Thus, additional time points can be used for longitudinal follow-up studies. Second, in the additional studies, EEG, eye movements, and other methods can be used to directly measure and verify user behavior. Third, the results of this study are directly applicable to 18–40-year-old adults; however, additional studies are required to test the applicability and robustness of the results to broader age groups and a larger number of participants. Finally, from the perspective of computer science, the effects of novel personalized recommendation algorithms and other features of information presentation generated by technological progress on user perception must be further explored.

5. Conclusions

By employing a survey experimental method based on PPM theory, this study showed that the information presentation time is a critical feature that would cause users to become vigilant and display privacy-regulation behaviors towards cross-platform sharing of low-sensitivity information in the vertical privacy context of multi-platform communication. Meanwhile, this study analyzed the mediating role of online vigilance and the moderating role of perceived control, expanding the scope of PPM and the understanding of users’ attitudes to utilizing low-sensitivity data. Therefore, reducing users’ negative perception and privacy-regulation behavior caused by the time factor of sharing information among platforms has important theoretical and practical value for the effectiveness of shared information flow across platforms and algorithm development and implementation. In the future, this work can serve as the basis for additional studies that explore other information presentation timeframes and additional categories of participants, such as those outside the tested age interval, as well as other features of information presentation to gain more insights into the complex interactions between human behavior and technological progress.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/bs13090706/s1, Table S1: Manipulation of Presentation Time; Table S2: Variables’ Measurements.

Author Contributions

L.Z. and R.S. conceived the study idea. L.Z. and W.T. developed the survey questionnaire. L.C. gained ethical approval. L.Z. and W.T. processed and analyzed the data. L.Z. and R.S. finalized the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research project was supported by Humanities and Social Sciences Planning Project of the Ministry of Education, PRC (Grant No. 20YJA630054), and The National Social Sciences Fund of China (Grant No. 22BGL006).

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Science and Technology Ethics Committee of Jimei University (protocol code JMU202206033, approved on 10 June 2022).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data can be requested from the corresponding author.

Acknowledgments

The authors would like to thank the anonymous reviewers for their expert suggestions, which improved this study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Masur, P.K. Situational Privacy and Self-disclosure: Communication Process in Online Environments; Springer: Cham, Switzerland, 2018. [Google Scholar]
  2. Teutsch, D.; Masur, P.K.; Trepte, S. Privacy in mediated and nonmediated interpersonal communication how subjective concepts and situational perceptions influence behaviors. Soc. Med. Soc. 2018, 4, 2056305118767134. [Google Scholar] [CrossRef]
  3. Huckvale, K.; Torous, J.; Larsen, M.E. Assessment of the data sharing and privacy practices of smartphone apps for depression and smoking cessation. JAMA Netw. Open 2019, 4, e192542. [Google Scholar] [CrossRef] [PubMed]
  4. van Hoboken, J.; Fathaigh, R.O. Smartphone platforms as privacy regulators. Comput. Law Secur. Rev. 2021, 41, 22–43. [Google Scholar] [CrossRef]
  5. Teubner, T.; Adam, M.T.P.; Hawlitschek, F. Unlocking online reputation on the effectiveness of cross-platform signaling in the sharing economy. Bus. Inf. Syst. Eng. 2020, 62, 501–513. [Google Scholar] [CrossRef]
  6. Ju, J. Antitrust analysis of some issues concerning big data, market power, and privacy in digital multi-sided platform businesses. J. Korean Compet. Law 2019, 159–202. [Google Scholar] [CrossRef]
  7. Wang, H.; Li, P.; Liu, Y.; Shao, J. Towards real-time demand-aware sequential POI recommendation. Inf. Sci. 2021, 547, 482–497. [Google Scholar] [CrossRef]
  8. Kwiecinski, R.; Melniczak, G.; Gorecki, T. Comparison of real-time and batch job recommendations. IEEE Access 2023, 11, 20553–20559. [Google Scholar] [CrossRef]
  9. Zhou, X.; Qin, D.; Chen, L.; Zhang, Y. Real-time context-aware social media recommendation. VLDB J. 2019, 28, 197–219. [Google Scholar] [CrossRef]
  10. Weihua, X.; Jianhang, Y. A novel approach to information fusion in multisource dataswts: A granular computing viewpoint. Inf. Sci. 2017, 378, 410–423. [Google Scholar] [CrossRef]
  11. Cichy, P.; Salge, T.O.; Kohli, R. Privacy Concerns and Data Sharing in the Internet of Things: Mixed Methods Evidence from Connected Cars. MIS Q. 2021, 45, 1863–1891. [Google Scholar] [CrossRef]
  12. Felipe, T. Ghosts in the dark: How to prepare for times of hyper-privacy. NIM Mark. Intell. Rev. 2021, 13, 36–41. [Google Scholar]
  13. Djatsa, F. Threat perceptions, avoidance motivation and security behaviors correlations. J. Inf. Secur. 2020, 11, 19–45. [Google Scholar] [CrossRef]
  14. Kim, T.; Barasz, K.; John, L.K.; Morales, A. Why am i seeing this ad? the effect of ad transparency on ad effectiveness. J. Consum. Res. 2018, 45, 906–932. [Google Scholar] [CrossRef]
  15. Abbas, A.E.; Agahari, W.; van de Ven, M.; Zuiderwijk, A. Business data sharing through data marketplaces: A systematic literature review. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 3321–3339. [Google Scholar] [CrossRef]
  16. Xu, H.; Luo, X.R.; Carroll, J.M.; Rosson, M.B. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decis. Support Syst. 2011, 51, 42–52. [Google Scholar] [CrossRef]
  17. Aguirre, E.; Mahr, D.; Grewal, D.; de Ruyter, K.; Wetzels, M. Unraveling the personalization paradox: The effect of information collection and trust-building strategies on online advertisement effectiveness. J. Retail. 2015, 91, 34–49. [Google Scholar] [CrossRef]
  18. Sutanto, J.; Palme, E.; Tan, C.H.; Phang, C.W. Addressing the personalizationprivacy paradox: An empirical assessment from a field experiment on smartphone users. MIS Q. 2013, 37, 1141–1164. [Google Scholar] [CrossRef]
  19. Awad, N.F.; Krishnan, M.S. The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 2006, 30, 13–28. [Google Scholar] [CrossRef]
  20. Nam, T. What determines the acceptance of government surveillance? Examining the influence of information privacy correlates. Soc. Sci. J. 2019, 56, 530–544. [Google Scholar] [CrossRef]
  21. Goldfarb, A.; Tucker, C. Online display advertising: Targeting and obtrusiveness. Mark. Sci. 2011, 30, 389–404. [Google Scholar] [CrossRef]
  22. Jong-Youn, R.; Jin-Myong, L. Personalization-privacy paradox and consumer conflict with the use of location-based mobile e-commerce. Comput. Hum. Behav. 2016, 63, 453–462. [Google Scholar] [CrossRef]
  23. Martin, K.D.; Borah, A.; Palmatier, R.W.; Jm, H.D.O. Data privacy: Effects on customer and firm performance. J. Mark. 2017, 81, 36–58. [Google Scholar] [CrossRef]
  24. Zeng, F.; Ye, Q.; Li, J.; Yang, Z. Does self-disclosure matter? A dynamic two-stage perspective for the personalization-privacy paradox. J. Bus. Res. 2021, 124, 667–675. [Google Scholar] [CrossRef]
  25. Lee, C.H.; Cranage, D.A. Personalisation-privacy paradox: The efects of personalisation and privacy assurance on customer r esponses to travel Web sites. Tour. Manag. 2011, 32, 987–994. [Google Scholar] [CrossRef]
  26. Li, T.; Unger, T. Willing to pay for quality personalization? Trade-off between quality and privacy. Eur. J. Inform. Syst. 2012, 21, 621–642. [Google Scholar] [CrossRef]
  27. Lee, N.; Kwon, O. A privacy-aware feature selection method for solving the personalization—Privacy paradox in mobile wellness healthcare services. Expert Syst. Appl. 2015, 42, 2764–2771. [Google Scholar] [CrossRef]
  28. Liang, H.; Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Q. 2009, 33, 71–90. [Google Scholar] [CrossRef]
  29. Liang, H.; Xue, Y. Understanding Security behaviors in personal computer usage: A threat avoidance perspective. J. Assoc. Inf. Syst. 2010, 11, 1. [Google Scholar] [CrossRef]
  30. Abraham, J.; Septian, D.L.; Prayoga, T.; Ruman, Y.S. Predictive factors of attitude towards online disruptive advertising. In Strategies for Business Sustainability in a Collaborative Economy; IGI Global: Hershey, PA, USA, 2020; pp. 102–121. [Google Scholar]
  31. Masur, P.K.; Scharkow, M. Disclosure Management on Social Network Sites: Individual Privacy Perceptions and User-Directed Privacy Strategies. Soc. Med. Soc. 2016, 2, 12–24. [Google Scholar] [CrossRef]
  32. Crowley, J.L. A framework of relational information control: A review and extension of information control research in interpersonal contexts. Commun. Theory 2017, 27, 202–222. [Google Scholar] [CrossRef]
  33. Almuhimedi, H.S.F.; Sadeh, N.; Adjerid, I.; Acquisti, A.; Agarwal, Y. A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems(CHI’15), Seoul, Republic of Korea, 18–23 April 2015; ACM: New York, NY, USA, 2015; pp. 787–796. [Google Scholar]
  34. Padyab, A.; Päivärinta, T.; Ståhlbröst, A.; Bergvall-Kåreborn, B. Bergvall-Karebom Facebook user attitudes towards secondary use of personal information. In Proceedings of the Thirty Seventh International Conference on Information Systems, Dublin, Ireland, 11–14 December 2016. [Google Scholar]
  35. van Schaik, P.; Jansen, J.; Onibokun, J.; Camp, J.; Kusev, P. Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Comput. Hum. Behav. 2018, 78, 279–283. [Google Scholar] [CrossRef]
  36. Trepte, S.; Masur, P.K.; Scharkow, M. Mutual friend’s social support and self-disclosure in face-to-face and instant messenger communication. J. Soc. Psychol. 2017, 158, 430–445. [Google Scholar] [CrossRef] [PubMed]
  37. Dienlin, T. The privacy process model. In Medien and Privatheir Media and Privacy; Garnett, S., Halft, S., Herz, M., Eds.; Stutz: Passau, Germany, 2014; pp. 105–122. [Google Scholar]
  38. Bauer, J.M.; Bergstrøm, R.; Foss-Madsen, R. Are you sure, you want a cookie?–The effects of choice architecture on users’ decisions about sharing private online data. Comput. Hum. Behav. 2021, 120, 106729. [Google Scholar] [CrossRef]
  39. Hui-ting, L.; Lei, C.; Xiao-xue, G.; Peng, Z. Real-time personalized micro-blog recommendation system. Comput. Sci. 2018, 45, 253–259. [Google Scholar]
  40. Ho, S.Y.; David, B.; Tam, K.Y. Timing of Adaptive Web Personalization and Its Effects on Online Consumer Behavior. Inf. Syst. Res. 2011, 22, 660–679. [Google Scholar] [CrossRef]
  41. Dienlin, T.; Metzger, M.J. An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. Sample. J. Comput.-Mediat. Commun. 2016, 21, 368–383. [Google Scholar] [CrossRef]
  42. Burgoon, J.K.; Parrott, R.; LePoire, B.A.; Kelley, D.L.; Walther, J.B.; Perry, D. Maintaining and restoring privacy through communication in different types of relationships. J. Soc. Pers. Relatsh. 1989, 23, 131–158. [Google Scholar] [CrossRef]
  43. Tufekci, Z. Can you see me now? audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 2008, 28, 20–36. [Google Scholar] [CrossRef]
  44. Petronio, S.; Altman, I. Boundaries of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA, 2002. [Google Scholar]
  45. Liu, S.; Ye, Z.; Chen, L.; Li, G.; Yu, D. Enterprise WeChat groups: Their effect on worklife conflict and life-work enhancement. Front. Bus. Res. China 2015, 9, 516–535. [Google Scholar]
  46. Klimmt, C.; Hefner, D.; Reinecke, L.; Rieger, D.; Vorderer, P. The permanently online and permanently connected mind.Mapping the cognitive structures behind mobile Internet use. In Permanently Online, Permanently Connected. Living and Communication in a POPC World; Vorderer, P., Hefner, D., Reinecke, L., Klimmt, C., Eds.; Routledge: NewYork, NY, USA, 2018; pp. 18–28. [Google Scholar]
  47. Bossio, D.; Holton, A.E. Burning out and turning off: Journalists’ disconnection strategies on social media. Journalism 2019, 22, 42422535. [Google Scholar] [CrossRef]
  48. Wyer, R.S.; Srull, T.K. Human cognition in its social context. Psychol. Rev. 1986, 93, 322–359. [Google Scholar] [CrossRef]
  49. Xiaomin, S.; Houcan, Z.; Gang, X.; Han, L. The application of the multivariate generalizability theory toa structured interview. J. Psychol. Sci. 2009, 32, 919–922. [Google Scholar] [CrossRef]
  50. Wen, S.G.; Xing, X.X.; Zong, L.C.; Feng, H.Y. Influences of temporal distances, cover story, and probability on framing effect. Acta Psychol. Sinica 2013, 44, 957–963. [Google Scholar] [CrossRef]
  51. Gerten, E.; Beckmann, M.; Bellmann, L. Controlling Working Crowds: The impact of digitalization on worker autonomy and monitoring across hierarchical levels. Jahrbücher Natl. Und Stat. 2019, 239, 441–481. [Google Scholar] [CrossRef]
  52. Schlachter, S.; McDowall, A.; Cropley, M.; Inceoglu, I. Voluntary work-related technology use during non-work time: A narrative synthesis of empirical research and research agenda. Int. J. Manag. Rev. 2018, 20, 825–846. [Google Scholar] [CrossRef]
  53. Kraft, P.; Rise, J.; Sutton, S.; Røysamb, E. Perceived difficulty in the theory of planned behavior, perceived behavioral control or affective attitude. Br. J. Soc. Psychol. 2005, 44, 479–496. [Google Scholar] [CrossRef] [PubMed]
  54. Tucker, C.E. Social networks, personalized advertising, and privacy controls. J. Mark. Res. 2014, 51, 546–562. [Google Scholar] [CrossRef]
  55. Song, J.H.; Kim, H.Y.; Kim, S.; Lee, S.W.; Lee, J.H. Effects of personalized e-mail messages on privacy risk: Moderating roles of control and intimacy. Mark. Lett. 2016, 27, 89–101. [Google Scholar] [CrossRef]
  56. Brandimarte, L.; Acquisti, A.; Loewenstein, G. Misplaced confidences: Privacy and the control paradox. Soc. Psychol. Personal. Sci. 2013, 4, 340–347. [Google Scholar] [CrossRef]
  57. Chen, C.; Lee, L.; Yap, A.J. Control deprivation motivates acquisition of utilitarian products. J. Consum. Res. 2017, 43, 1031–1047. [Google Scholar] [CrossRef]
  58. Landau, M.J.; Kay, A.C.; Whitson, J.A. Compensatory control and the appeal of a structured world. Psychol. Bull. 2015, 141, 694–722. [Google Scholar] [CrossRef]
  59. Mandel, N.; Rucker, D.D.; Levav, J.; Galinsky, A.D. The compensatory consumer behavior model: How self-discrepancies drive consumer behavior. J. Consum. Psychol. 2017, 27, 133–146. [Google Scholar] [CrossRef]
  60. Cutright, K.M. The beauty of boundaries: When and why we seek structure in consumption. J. Consum. Res. 2012, 38, 775–790. [Google Scholar] [CrossRef]
  61. Whitson, J.A.; Galinsky, A.D. Lacking control increases illusory pattern perception. Science 2008, 322, 115–117. [Google Scholar] [CrossRef] [PubMed]
  62. Massara, F.; Raggiotto, F.; Voss, W.G. Unpacking theprivacy paradox of consumers: A psychological perspective. Psychol. Mark. 2021, 38, 1814–1827. [Google Scholar] [CrossRef]
  63. Gotsch, M.L.; Schögel, M. Addressing the privacy paradox on the organizational level: Review and future directions. Manag. Rev. Q. 2021, 73, 263–296. [Google Scholar] [CrossRef]
  64. Nisreen, A.; Sameer, H.; Justin, P. The personalisation-privacy paradox: Consumer interaction with smart technologies and shopping mall loyalty. Comput. Hum. Behav. 2022, 126, 106976. [Google Scholar] [CrossRef]
  65. Xiaojuan, Z.; Xinluan, T.; Yuxin, H. Influence of privacy fatigue of social media users on their privacy protection disengagement behaviour—A psm based analysis. J. Integr. Des. Process Sci. 2022, 25, 78–92. [Google Scholar] [CrossRef]
  66. Luchuan, L.; Bingqian, Z.; Xu, L. An experimental study on the effects of social media and user’s anxiety. J. Inf. Resour. Manag. 2019, 9, 66–76. [Google Scholar] [CrossRef]
  67. Yedi, W.; Yushi, J.; Miao, M.; Xin, A. The Joint Effect of Privacy Salience, Platform Credibility and Regulatory Focus onthePersuasion Effect of Internet Targeted Advertising. Manag. Rev. 2022, 34, 144–156. [Google Scholar] [CrossRef]
  68. Wolf, R.D.; Willaert, K.; Pierson, J. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Comput. Hum. Behav. 2014, 35, 444–454. [Google Scholar] [CrossRef]
  69. Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Inf. Syst. Res. 2004, 15, 336–355. [Google Scholar] [CrossRef]
  70. Donghwa, C.; Yuanxin, C.; Yanfang, M. Perceived Information overload and intention to discontinue use of short-form video_ the mediating roles of cognitive and psychological factors. Behav. Sci. 2023, 13, 50. [Google Scholar] [CrossRef]
  71. Broder, H.L.; McGrath, C.; Cisneros, G.J. Ouestionnaire development: Face validity and item impact testing of the Child Oral Health mpact Profile. Community Dent. Oral Epidemiol. 2007, 35, 19. [Google Scholar] [CrossRef] [PubMed]
  72. Sabry, S.D.; Sucheta, A.; Ibrahim, A.Y.; Momin, M.M.; Ariz, N. Occupational stress among Generation-Y employees in the era of COVID-19: Cases from universities in India. Ind. Commer. Train. 2023, 55, 234–252. [Google Scholar] [CrossRef]
  73. Steiner, M. Experimental vignette studies in survey research. Methodology 2010, 6, 128–138. [Google Scholar]
  74. Yuan, Y.; Rui, S.; Jiajia, Z.; Xue, C. A new explanation for the attitude-behavior inconsistency based on the contextualized attitude. Behav. Sci. 2023, 13, 223. [Google Scholar] [CrossRef] [PubMed]
  75. Hair, J.F.; Black, W.C.; Babin, B.J.; Anderson, R.E.; Tatham, R.L. Multivariate Data Analysis, 7th ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
  76. Andrew, H. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach; Guilford: New York, NY, USA, 2017. [Google Scholar]
  77. Xu, F.; Michael, K.; Chen, X. Factors affecting privacy disclosure on social Network sites: An integgrated model. Electron. Commer. Res. 2013, 13, 151–168. [Google Scholar] [CrossRef]
  78. Schönbrodt, F.D.; Perugini, M. At what sample size do correlations stabilize? J. Res. Pers. 2013, 47, 609–612. [Google Scholar] [CrossRef]
  79. Petronio, S.; Child, J.T. Conceptualization and operationalization: Utility of communication privacy management theory. Curr. Opin. Psychol. 2020, 31, 76–82. [Google Scholar] [CrossRef]
  80. Petronio, S. Privacy Management Theory: What do we know about family privacy regulation. J. Fam. Theory. Rev. 2010, 2, 175–196. [Google Scholar] [CrossRef]
  81. Tang, J.; Zhang, B.; Xiao, S. Examining the intention of authorization via apps: Personality traits and expanded privacy calculus perspectives. Behav. Sci. 2022, 12, 218. [Google Scholar] [CrossRef] [PubMed]
  82. Pang, H.; Ruan, Y.; Wang, Y. Unpacking Detrimental effects of network externalities on privacy invasion, communication overload and mobile app discontinued intentions: A cognition-affectconation perspective. Behav. Sci. 2023, 13, 47. [Google Scholar] [CrossRef] [PubMed]
  83. Lee, J.K.; Chang, Y.; Kwon, H.Y.; Kim, B. Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Inf. Syst. Front. 2020, 22, 45–57. [Google Scholar] [CrossRef]
  84. Lei, W.; Hu, S.; Hsu, C. Unveiling the process of phishing precautions taking: The moderating role of optimism bias. Comput. Secur. 2023, 129, 103249. [Google Scholar] [CrossRef]
  85. Broekhuizen, T.L.J.; Emrich, O.; Gijsenberg, M.J.; Broekhuis, M.; Donkers, B.; Sloot, L.M. Digital platform openness: Drivers, dimensions and outcomes. J. Bus. Res. 2021, 122, 902–914. [Google Scholar] [CrossRef]
  86. Mishra, A.; Alzoubi, Y.I.; Gill, A.Q.; Anwar, M.J. Cybersecurity enterprises policies: A comparative study. Sensors 2022, 22, 538. [Google Scholar] [CrossRef]
  87. Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H.; Jaradat, A. Internet of things and blockchain integration: Security, privacy, technical, and design challenges. Future Internet 2022, 14, 216. [Google Scholar] [CrossRef]
  88. Fayyaz, Z.; Ebrahimian, M.; Nawara, D.; Ibrahim, A.; Kashef, R. Recommendation systems: Algorithms, challenges, metrics, and business opportunities. Appl. Sci. 2020, 10, 21. [Google Scholar] [CrossRef]
Figure 1. The conceptual model.
Figure 1. The conceptual model.
Behavsci 13 00706 g001
Figure 2. Mediating effect of online vigilance.
Figure 2. Mediating effect of online vigilance.
Behavsci 13 00706 g002
Figure 3. The moderating effects of PRT and PRC on CRB.
Figure 3. The moderating effects of PRT and PRC on CRB.
Behavsci 13 00706 g003
Figure 4. The moderating effects of OV and PRC on CRB.
Figure 4. The moderating effects of OV and PRC on CRB.
Behavsci 13 00706 g004
Figure 5. The moderating effects of PRT and PRC on PRB.
Figure 5. The moderating effects of PRT and PRC on PRB.
Behavsci 13 00706 g005
Figure 6. The moderating effects of OV and PRC on PRB.
Figure 6. The moderating effects of OV and PRC on PRB.
Behavsci 13 00706 g006
Table 1. Participant profile in Study 1 (N = 180).
Table 1. Participant profile in Study 1 (N = 180).
Variables N%
GenderMale7843.3
Female10256.7
Age (years)Mean: 25.66
Range: 18–40
SD: 5.469
Education levelBachelor’s degree11463.3
Master’s degree or above3821.1
Junior college degree/other2815.6
Privacy
concern
Low PC level (mean: 3.47, SD: 0.62)9854.4
High PC level (mean: 5.27, SD: 0.66)8245.6
InformationMean: 4.42
Overload SD: 1.11
Table 2. Mediating effect of online vigilance.
Table 2. Mediating effect of online vigilance.
EffectStandard ErrorLower Limit CIUpper Limit CI
Indirect effect0.17650.07900.03260.3397
Direct effect0.59600.18030.24020.9518
Note: CI: confidence interval.
Table 3. Participant profile in Study 2 (N = 199).
Table 3. Participant profile in Study 2 (N = 199).
Variables N%
GenderMale7236.2
Female12763.8
Age (years)Mean: 25.97
Range: 18–40
SD: 5.529
Education levelBachelor’s degree13869.3
Master’s degree or above3115.6
Junior college degree/other3015.1
Privacy concern Low PC level (mean: 2.86, SD: 0.75)10452.26
High PC level (mean: 4.88, SD: 0.74)9547.74
Information
Overload
Mean: 4.23
SD: 0.95
Table 4. Moderating effect of perceived control.
Table 4. Moderating effect of perceived control.
Corrective behavior Preventive behavior
Coeff.SEtpCoeff.SEtp
Constant1.75930.88581.98620.04851.24370.95011.30900.1921
PRT 0.48110.17312.77880.00600.69060.18573.71860.0003
OV0.25340.05874.31842.5 × 10−50.24110.06303.83000.0002
PRC−0.02260.054−0.41850.6760−0.03810.0579−0.65820.5112
PRT * PRC−0.25190.1220−2.06490.0403−0.34010.1309−2.59910.0101
OV * PRC−0.09120.0320−2.85260.0048−0.08820.0343−2.57070.0109
Gender0.02470.17590.14050.8884−0.01450.1887−0.07710.9386
Age0.00570.01570.36120.71830.01830.01681.08780.2781
Education0.37230.10153.66900.00030.32960.10883.02850.0028
PC0.00310.06930.04450.9646−0.03860.0743−0.52010.6036
IO0.02640.09000.29300.76980.00420.09650.04360.9653
R20.3168 0.3307
F8.7171 9.2902
Note: PRT: Presentation time; OV: Online vigilance; PRC: Perceived control; CRB: Corrective behavior; PRB: Preventive behavior; PC: Privacy concern; IO: Information overload.
Table 5. Analysis results of moderated mediating effects.
Table 5. Analysis results of moderated mediating effects.
Moderating
Variable
Mediating
Variable
Dependent VariableMediating EffectMediated Effect
Effect ValueStandard DeviationLower LimitUpper LimitDetermine
Index
SDLower LimitUpper Limit
Low PRCOVCRB0.25260.09690.07970.4549−0.05810.0347−0.1402−0.0065
High PRC0.07040.0685−0.06470.2166
Low PRCOVPRB0.24170.08600.08470.4168−0.05620.0357−0.1435−0.0063
High PRC0.06560.0787−0.11160.2091
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhuang, L.; Sun, R.; Chen, L.; Tang, W. The Impact of Shared Information Presentation Time on Users’ Privacy-Regulation Behavior in the Context of Vertical Privacy: A Moderated Mediation Model. Behav. Sci. 2023, 13, 706. https://doi.org/10.3390/bs13090706

AMA Style

Zhuang L, Sun R, Chen L, Tang W. The Impact of Shared Information Presentation Time on Users’ Privacy-Regulation Behavior in the Context of Vertical Privacy: A Moderated Mediation Model. Behavioral Sciences. 2023; 13(9):706. https://doi.org/10.3390/bs13090706

Chicago/Turabian Style

Zhuang, Lei, Rui Sun, Lijun Chen, and Wenlong Tang. 2023. "The Impact of Shared Information Presentation Time on Users’ Privacy-Regulation Behavior in the Context of Vertical Privacy: A Moderated Mediation Model" Behavioral Sciences 13, no. 9: 706. https://doi.org/10.3390/bs13090706

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop