Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
Abstract
:1. Introduction
2. The Literature Review
2.1. Privacy Behavior Theories
2.2. Privacy Behavior Determinant Factors
3. Theoretical Background
- The participants must have the will to learn through the experience they lived;
- The participants should be able to reproduce the experience;
- The participants must have analytical thinking and understand the experience;
- The participants have the ability to make decisions and solve problems to create new ideas through the experiences they lived.
- The participant reviews the events and has the ability to study the experience again, calling this review a return to the experience;
- The participant recognizes the importance of the experience to third parties, through emotions;
- The participant discovers the new dimensions of the experience so that, through it, the change in his behavior occurs and creates a new way of thinking and new abilities.
3.1. Neural and Neutral Stimulation
3.2. Practical Assessments
3.3. Motivational Interviewing
3.4. The Research Method
4. The Proposed Experiential Privacy Behavior Transformation Framework
5. Methodology to Empirically Test the Proposed Framework
- Phase 1: Creation of qualitative questionnaire with multiple-choice and open-type questions to assess users’ privacy behavior.
- Phase 2: Implementation of privacy behavior measurement using the methods derived from phase 1 in a small, closed group of up to 10 individuals.
- Phase 3: Creation of the experimental environment per experiential method (i.e., neutral stimuli, practical assessments, motivational interviews).
- Phase 4: Implementation of the experiential experiment aiming towards privacy behavior transformation.
- Phase 5: Analysis of results with regard to the success of behavioral transformation.
5.1. Participants’ Selection Criteria and Profile
5.2. Phase 1. Creation of Qualitative Questionnaire to Assess Users’ Privacy Behavior
5.3. Phase 2. Implementation of Privacy Behavior Measurement
5.4. Phase 3. Creation of the Experimental Environment Per Experiential Method
- One central and nine client Gmail accounts ([email protected], [email protected]);
- Virtual machines;
- Multiple streaming platform accounts in a legal, secure and anonymized way;
- Other applications (e.g., Family Link, Viber, and Streaming Platform App).
5.5. Phase 4. Implementation of the Experiential Experiment Aiming towards Privacy Behavior Transformation
5.6. Phase 5. Results Analysis and Framework Validation
6. Results
6.1. Pre-Study Privacy Behavior Assessment
6.2. Monitoring Results
6.3. Experiential Procedures
6.3.1. Experiential Procedure 1. Content Viewing
6.3.2. Experiential Procedure 2. Practical Assessments
6.3.3. Experiential Procedure 3. Motivational Interviews
6.4. Questionnaire Re-Execution
6.5. Framework Validation (Monitoring Re-Execution)
6.6. Final Results
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Questionnaire (ENG)
- [PA] How often do you check the privacy settings on your social media accounts?
- [TCCF,PRP,PC] How often you felt like your privacy was violated online?
- [PA] How often do you read the privacy policies or terms of service for the websites or apps you use?
- [PA,PC] Have you ever declined to use a service or app because of privacy concerns? If so, can you describe the situation (open)?
- [PA,PC] Do you use different passwords for different accounts? How do you keep track of them (open)?
- [TCFF] Have you ever been a victim of identity theft or online fraud? How did that experience affect your privacy behaviors (open)?
- [PRP,PA] How much personal information do you share online? Can you describe the reason (open)?
- [PA] How often do you take steps to protect your online privacy? Do you use ad-blockers or other tools and which (open)?
- [PRP,TCFF] Did you know companies collecting and using your personal data for targeted advertising?
- [PC] Do you have any concerns about government surveillance or monitoring of your online activities?
Appendix B. English (Interview Questions)
- (1)
- [TCCF, PC, PA, EVIE] Interview and simultaneous demonstration of her/her personalized image as well as data we have recovered, habits, etc. How do you feel about this?
- (2)
- [PA, PC, EVIE] Did you know that a lens app could access your daily location?
- (3)
- [TCCF, PC, PA, EVE] How do you feel about this? H8b triggering fear, privacy risk concerns, privacy awareness through visualization
- (1)
- [PA, TCCF] How do you feel about this?
- (2)
- [PA, PRP] Did you know that through your posted photos you could find the time and place they were taken or other data?
- (3)
- [TCCF, PRP, PC] How do you feel about it?
- (4)
- [PA, PRP] Do you think you should disable Google timeline, Strava, Viber? (photo from Viber/sqlite/Strava)
- (5)
- [EVIE] Will you do it or will you ask for help with it?
- (6)
- [EVIE] Do you know how to remove permissions from apps?
- (7)
- [PA, PC, PRP] Will you search and remove permissions from apps?
- (8)
- [PA, PC, PRP Will you continue to post photos on social networks?
- (9)
- [PA, PC, PRP Do you feel upset that a company or even a developer can create patterns of your daily life?
Appendix C. Experiment Content and Items
Activated Factor(s) | Movie/Series Name | Short Description | Purpose and Target |
---|---|---|---|
PRP, TCCF, PA, EVIE | The Great Hack | The Cambridge Analytica scandal is examined through the roles of several affected persons. | Awareness of the handling of personal data by social platforms. Decreased trust in social networks. |
PRP, TTCF, PA, EVIE | The Social Dilemma | Explores the dangerous human impact of social networking, with tech experts sounding the alarm on their own creations. | Awareness of the handling of personal data by social platforms. Decreased trust in social networks. |
FEBU, TCCF, NPEN, EVIE | Black Mirror: Nosedive | A woman desperate to boost her social media score hits the jackpot when she’s invited to a swanky wedding, but the trip doesn’t go as planned. | Social media awareness. Indication of compulsive behavior. |
TCCF, NPEN, PA, TL | Black Mirror: Smithereens | A cab driver with an agenda becomes the centre of attention on a day that rapidly spirals out of control. | Awareness of social networks and risks of compulsive behavior. |
Activated Factor(s) | Video Name | Short Description | Purpose and Target |
---|---|---|---|
PA, EVIE | “How to Protect Your Privacy Online” by Techquickie | This video covers the basics of online privacy and offers practical tips for staying safe on the internet. | Social media privacy awareness enhancer. |
PA, TCCF, PC, EVIE | Data Protection and Privacy. | (animated). Increasingly, an ever-wider range of economic, political and social activities are moving online, encompassing various kinds of information and communications technologies (ICTs). The evolving ICT use is having a transformational impact on the way business is done, and the way people interact among themselves, as well as with government, enterprises and other stakeholders. | Personal data protection privacy awareness, data control enhancer regarding companies, government, etc. |
PA, TCCF, EVIE | “Why Privacy Matters”. | When it comes to online privacy, many who skip over the subject have said: “I have nothing to hide, so I’m okay”. It’s a response to which some experts in the field of privacy point out, even if you’re alone in your home, would you be okay with someone watching through your window and taking notes on everything you do the entire day? Because that is essentially what’s happening online right now, and it’s legal. | Raise privacy awareness through control and fear. |
PA, TCCF, EVIE | Protecting Personal Privacy. | (animated) This animated video explains how your exposed personal data can get you in trouble. | Raise privacy awareness, enhance knowledge of privacy concerns and privacy risk perception through control and fear. |
PA, PC, EVIE | Why Care About Internet Privacy? | (animated) Whenever you browse the Internet, websites are collecting information about you and using it to fuel their businesses. They use your information to display relevant ads, to sell you products you might be interested in, and more.If you’re okay with companies collecting your information, that’s fine. If you’re not, there are steps you can take to lessen the risk. | Increase privacy awareness and enhance knowledge of privacy concerns. |
PA, PC, EVIE | Privacy Matters. | (animated). This video shows how private data exposition can hurt your job position. | Increase privacy awareness and enhance knowledge of privacy concerns. |
PA, PC, EVIE | Online Privacy for Kids—Internet Safety and Security for Kids. | (animated). Social media is a great tool to communicate with our family and friends but it’s important to be mindful of what we post, where we post it and who we share it with. In this educational video we’re going to give you advice on how to protect our online privacy. We should be careful with what we share, even more so if it’s personal information that we wouldn’t like other people to know about. Sharing is a responsibility. | Increase privacy awareness and enhance knowledge of privacy concerns among kids. |
PA, PC, EVIE | Online safety Staying safe online. | (animated). Learn how to stay safe and act responsibly when using the internet in school and at home. | Increase privacy awareness and enhance knowledge of privacy concerns among kids. |
PA, PC, EVIE | Cyber Security for kids|Internet Safety Tips for Kids. | This video talks about the importance of password, protecting personal information, limiting screen time etc. | Increase privacy awareness and enhance knowledge of privacy concerns among kids. |
PA, PC, PRP, EVIE | NetSafe Episode 11: Protect Your Personal Information. | This video explains why keeping personal information private is so important, and it offers tips on how to do it. | Increase privacy awareness and enhance knowledge of privacy concerns through showing the privacy risks. |
PA, TCCF, EVIE | “Social Media Privacy: How to Be Safe” by Norton | This video provides tips for protecting your privacy on social media platforms. | Increase privacy awareness and control. |
PA, EVIE | “Privacy Matters” by Mozilla | This video highlights the importance of privacy and provides tips for protecting your online privacy | Increase privacy awareness and confidence through education. |
PA, PC, EVIE | “The Cost of Privacy” by Vox | This video explores the trade-offs between privacy and convenience in our digital lives. | Increase privacy awareness and enhance knowledge of privacy concerns. |
Activated Factor(s) | Simulator Name | Short Description |
---|---|---|
PA, TCCF, EVIE | Privacy Choices | https://www.telus.com/en/wise/parents/privacy-quiz (accessed on 28 December 2023) |
PA, EVIE | Privasim | Privasim is a simulator game where you play as an app company, collect users, mine data, and sell data to get rich. Avoid cyber attacks, fight legal battles and get Influencers to join your app. https://privasim.itch.io/privacysimulator (accessed on 28 December 2023) |
PA, PC, EVIE | Data Detox Kit | Take control of your digital privacy, security, and well-being, learn about tackling misinformation, control your health data, find resources for youth and families, and browse our Alternative App Centre and workshop materials. Meet our partners to get a glimpse into the global movement of the Data Detox Kit. https://datadetoxkit.org/en/home (accessed on 28 December 2023) |
PA, PC, EVIE | The Realistic Facebook Privacy Simulator | https://www.tomscott.com/usvsth3m/realistic-facebook-privacy-simulator/ (accessed on 28 December 2023) |
PA, EVIE | Privacy Scores | Learn about your privacy settings and how they compare to others. It can also help you to identify areas where you can improve your privacy settings. |
Game Name | Short Description |
---|---|
Privacy Badger | This is a browser extension game that teaches users how to protect their online privacy by blocking ads and trackers |
Data Dealer | This is a web-based game that simulates the buying and selling of personal data. Players learn about data privacy issues and how to protect their information |
The Glass Room | This is a physical exhibition that can be turned into a game. Visitors learn about data privacy and security by engaging with interactive exhibits |
Keep Calm and Log On | This is a card game that teaches players how to protect their online privacy by recognizing different threats and taking appropriate measures |
Cryptoy | This is a mobile game that teaches players about encryption and digital security by challenging them to solve puzzles |
Quiz Name | Short Description |
---|---|
Online Privacy Quiz | This quiz, created by the Electronic Frontier Foundation (EFF), tests your knowledge of online privacy issues and helps you learn how to protect your personal information online. |
Privacy IQ Quiz | This quiz, created by the Privacy Rights Clearinghouse, tests your knowledge of privacy laws and practices in the United States. |
Data Privacy Quiz | This quiz, created by the National Cyber Security Alliance (NCSA), tests your knowledge of data privacy and security best practices. |
Facebook Privacy Quiz | This quiz, created by Facebook, helps you understand how to manage your privacy settings on the social media platform |
Google Privacy Quiz | This quiz, created by Google, tests your knowledge of how Google collects and uses your data. |
Appendix D. Experimental Environment Setup
- Google’s accounts and tools
- Create VPN accounts (1-click vpn)
- Streaming Platform Account Creation
- Virtual Machines Creation
- Viber και SQLite.
- Experimental Framework Tools
Application/Software | Connected Software | Target |
---|---|---|
Virtual Machine | Google Account | Google Account Management |
Viber For Desktop | Viber Account Management | |
Streaming Platform Account | Content Tracking Control | |
Google Account | Family Link | Location finding, pattern formation |
Find my phone | Location finding, pattern formation | |
Timeline | Participant movement tracking | |
YouTube progress | Content Monitoring Validation | |
Viber For Desktop | SQLite DB Browser | Finding patterns and participant information |
Streaming Platform Account | Streaming Platform | Content Monitoring Validation |
- Limitations and Challenges
References
- Thierer, A.D. The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation; Elsevier Inc.: Amsterdam, The Netherlands, 2015; Volume 21. [Google Scholar] [CrossRef]
- Rose, K.; Eldridge, S.; Chapin, L. The internet of things: An overview. Internet Soc. 2015, 80, 1–50. [Google Scholar]
- Menard, P.; Bott, G.J. Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment. Comput. Secur. 2020, 95, 101856. [Google Scholar] [CrossRef]
- Tsohou, A.; Kosta, E. Enabling valid informed consent for location tracking through privacy awareness of users: A process theory. Comput. Law Secur. Rev. 2017, 33, 434–457. [Google Scholar] [CrossRef]
- Kokolakis, S. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Comput. Secur. 2017, 64, 122–134. [Google Scholar] [CrossRef]
- Hallam, C.; Zanella, G. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput. Hum. Behav. 2017, 68, 217–227. [Google Scholar] [CrossRef]
- Li, H.; Luo, X.R.; Zhang, J.; Xu, H. Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Inf. Manag. 2017, 54, 1012–1022. [Google Scholar] [CrossRef]
- Gerber, N.; Gerber, P.; Volkamer, M. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 2018, 77, 226–261. [Google Scholar] [CrossRef]
- Bless, C.; Dötlinger, L.; Kaltschmid, M.; Reiter, M.; Kurteva, A.; Roa-Valverde, A.J.; Fensel, A. Raising awareness of data sharing consent through knowledge graph visualisation. In Further with Knowledge Graphs; Wageningen University & Research: Wageningen, The Netherlands, 2021; Volume 53, pp. 44–57. [Google Scholar] [CrossRef]
- Mathews-Hunt, K. CookieConsumer: Tracking online behavioural advertising in Australia. Comput. Law Secur. Rev. 2016, 32, 55–90. [Google Scholar] [CrossRef]
- Palos-Sanchez, P.; Saura, J.R.; Martin-Velicia, F. A study of the effects of programmatic advertising on users’ concerns about privacy overtime. J. Bus. Res. 2019, 96, 61–72. [Google Scholar] [CrossRef]
- Hinds, J.; Williams, E.J.; Joinson, A.N. “It wouldn’t happen to me”: Privacy concerns and perspectives following the Cambridge Analytica scandal. Int. J. Hum.-Comput. Stud. 2020, 143, 102498. [Google Scholar] [CrossRef]
- Paspatis, I.; Tsohou, A.; Kokolakis, S. How Is Privacy Behavior Formulated? A Review of Current Research and Synthesis of Information Privacy Behavioral Factors. Multimodal Technol. Interact. 2023, 7, 76. [Google Scholar] [CrossRef]
- Dinev, T.; Bellotto, M.; Hart, P.; Russo, V.; Serra, I.; Colautti, C. Privacy calculus model in e-commerce–a study of Italy and the United States. Eur. J. Inf. Syst. 2006, 15, 389–402. [Google Scholar] [CrossRef]
- The General Data Protection Regulation (GDPR). Available online: https://eur-lex.europa.eu/eli/reg/2016/679/oj (accessed on 23 January 2024).
- Lei Geral de Proteção de Dados (LGDP). Available online: https://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/L13709.htm (accessed on 23 January 2024).
- Personal Information Protection Act (PIPA). Available online: https://www.bclaws.gov.bc.ca/civix/document/id/complete/statreg/03063_01 (accessed on 23 January 2024).
- Personal Data Protection Act (PDPA). Available online: https://www.pdpc.gov.sg/Overview-of-PDPA/The-Legislation/Personal-Data-Protection-Act (accessed on 23 January 2024).
- Rogers, R.W.; Prentice-Dunn, S. Protection motivation theory. In Handbook of Health Behavior Research 1: Personal and Social Determinants; Hardcover; Gochman, D.S., Ed.; Plenum Press: New York, NY, USA, 1997; pp. 113–132. ISBN 0-306-45443-2. [Google Scholar]
- Chakraborty, R.; Vishik, C.; Rao, H.R. Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing. Decis. Support Syst. 2013, 55, 948–956. [Google Scholar] [CrossRef]
- Hofstra, B.; Corten, R.; Van Tubergen, F. Understanding the privacy behavior of adolescents on Facebook: The role of peers, popularity and trust. Comput. Hum. Behav. 2016, 60, 611–621. [Google Scholar] [CrossRef]
- Jiang, J. Social Login Acceptance: A DIF Study of Differential Factors. In Proceedings of the 22nd Pacific Asia Conference on Information Systems (PACIS 2018), Yokohama, Japan, 26–30 June 2018; Volume 20, p. 20. Available online: https://aisel.aisnet.org/pacis2018/20 (accessed on 1 May 2023).
- Park, Y.J. Do men and women differ in privacy? Gendered privacy and (in) equality in the Internet. Comput. Hum. Behav. 2015, 50, 252–258. [Google Scholar] [CrossRef]
- Reynolds, B.; Venkatanathan, J.; Gonçalves, J.; Kostakos, V. Sharing ephemeral information in online social networks: Privacy perceptions and behaviours. In Proceedings of the Human-Computer Interaction–INTERACT 2011: 13th IFIP TC 13 International Conference, Lisbon, Portugal, 5–9 September 2011; Proceedings, Part III 13. Springer: Berlin/Heidelberg, Germany, 2011; pp. 204–215. [Google Scholar] [CrossRef]
- Lankton, N.K.; McKnight, D.H.; Tripp, J.F. Facebook privacy management strategies: A cluster analysis of user privacy behaviors. Comput. Hum. Behav. 2017, 76, 149–163. [Google Scholar] [CrossRef]
- Li, C.; Chau, P.Y. Leveraging communication tools to reduce consumers’ privacy concern in the on-demand services: An extended SOR Model of perceived control and structural assurance. In Proceedings of the PACIS 2019 Proceedings, Xi’an, China, 8–12 July 2019; Volume 48. Available online: https://aisel.aisnet.org/pacis2019/48 (accessed on 5 April 2023).
- Dhir, A.; Kaur, P.; Lonka, K.; Nieminen, M. Why do adolescents untag photos on Facebook? Comput. Hum. Behav. 2016, 55, 1106–1115. [Google Scholar] [CrossRef]
- Yu, L.; Li, H.; He, W.; Wang, F.K.; Jiao, S. A meta-analysis to explore privacy cognition and information disclosure of internet users. Int. J. Inf. Manag. 2020, 51, 102015. [Google Scholar] [CrossRef]
- Shane-Simpson, C.; Manago, A.; Gaggi, N.; Gillespie-Lynch, K. Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital. Comput. Hum. Behav. 2018, 86, 276–288. [Google Scholar] [CrossRef]
- Ioannou, A.; Tussyadiah, I.; Lu, Y. Privacy concerns and disclosure of biometric and behavioral data for travel. Int. J. Inf. Manag. 2020, 54, 102122. [Google Scholar] [CrossRef]
- Wilson, D.W.; Schuetzler, R.M.; Dorn, B.; Proudfoot, J.G. When Disclosure Is Involuntary: Empowering Users with Control to Reduce Concerns; Criss Library: Omaha, NE, USA, 2015; Volume 17, Available online: https://digitalcommons.unomaha.edu/isqafacproc/17 (accessed on 1 May 2023).
- Ioannou, A.; Tussyadiah, I. Privacy and surveillance attitudes during health crises: Acceptance of surveillance and privacy protection behaviours. Technol. Soc. 2021, 67, 101774. [Google Scholar] [CrossRef] [PubMed]
- Nikkhah, H.R.; Sabherwal, R. Mobile cloud-computing applications: A privacy cost-benefit model. In Proceedings of the Americas Conference on Information Systems, Boston, MA, USA, 10–12 August 2017; Available online: https://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/11 (accessed on 24 January 2024).
- Van Zoonen, L. Privacy concerns in smart cities. Gov. Inf. Q. 2016, 33, 472–480. [Google Scholar] [CrossRef]
- Jordaan, Y.; Van Heerden, G. Online privacy-related predictors of Facebook usage intensity. Comput. Hum. Behav. 2017, 70, 90–96. [Google Scholar] [CrossRef]
- Fox, G.; Tonge, C.; Lynn, T.; Mooney, J. Communicating compliance: Developing a GDPR privacy label. In Proceedings of the AMCIS 2018 Proceedings, New Orleans, LA, USA, 16–18 August 2018; Volume 30. Available online: https://aisel.aisnet.org/amcis2018/Security/Presentations/30 (accessed on 24 January 2024).
- Risius, M.; Baumann, A.; Krasnova, H. Developing a new paradigm: Introducing the intention-behaviour gap to the privacy paradox phenomenon. In Proceedings of the Twenty-Eigth European Conference on Information Systems (ECIS2020), Marrakesh, Morocco, 15–17 June 2020; Available online: https://aisel.aisnet.org/ecis2020_rp/150 (accessed on 24 January 2024).
- Jozani, M.; Ayaburi, E.; Ko, M.; Choo, K.K.R. Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Comput. Hum. Behav. 2020, 107, 106260. [Google Scholar] [CrossRef]
- Sharma, S.; Crossler, R.E. Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electron. Commer. Res. Appl. 2014, 13, 305–319. [Google Scholar] [CrossRef]
- Zhang, Y.; He, W.; Peng, L. How perceived pressure affects users’ social media fatigue behavior: A case on WeChat. J. Comput. Inf. Syst. 2022, 62, 337–348. [Google Scholar] [CrossRef]
- Mager, S.; Kranz, J. Consent Notices and the Willingness-to-Sell Observational Data: Evidence from User Reactions in the Field. In Proceedings of the ECIS 2021, 14–16 June 2021; Research Papers. Volume 89. Available online: https://aisel.aisnet.org/ecis2021_rp/89 (accessed on 24 January 2024).
- Hew, J.J.; Tan, G.W.H.; Lin, B.; Ooi, K.B. Generating travel-related contents through mobile social tourism: Does privacy paradox persist? Telemat. Inform. 2017, 34, 914–935. [Google Scholar] [CrossRef]
- Xu, H.; Parks, R.; Chu, C.H.; Zhang, X.L. Information disclosure and online social networks: From the case of Facebook news feed controversy to a theoretical understanding. In Proceedings of the 16th Americas Conference on Information Systems 2010 (AMCIS 2010), Lima, Peru, 12–15 August 2010; Volume 7, p. 503. Available online: https://aisel.aisnet.org/amcis2010/503 (accessed on 24 January 2024).
- Gómez-Barroso, J.L. Experiments on personal information disclosure: Past and future avenues. Telemat. Inform. 2018, 35, 1473–1490. [Google Scholar] [CrossRef]
- Schomakers, E.M.; Lidynia, C.; Müllmann, D.; Ziefle, M. Internet users’ perceptions of information sensitivity–insights from Germany. Int. J. Inf. Manag. 2019, 46, 142–150. [Google Scholar] [CrossRef]
- Choi, H.; Park, J.; Jung, Y. The role of privacy fatigue in online privacy behavior. Comput. Hum. Behav. 2018, 81, 42–51. [Google Scholar] [CrossRef]
- European Union. EU Digital COVID Certificate. Available online: https://ec.europa.eu/info/live-work-travel-eu/coronavirus-response/safe-covid-19-vaccines-europeans/eu-digital-covid-certificate_en (accessed on 24 April 2023).
- Kraus, L.; Wechsung, I.; Möller, S. Psychological needs as motivators for security and privacy actions on smartphones. J. Inf. Secur. Appl. 2017, 34, 34–45. [Google Scholar] [CrossRef]
- Schreiber, T.; Deuker, A.; Albers, A.; Neves, M. The Privacy Trade-Off: App Usage on OSN. In Proceedings of the AMCIS 2013, Chicago, IL, USA, 15–17 August 2013. [Google Scholar]
- Chou, H.L.; Liu, Y.L.; Chou, C. Privacy behavior profiles of underage Facebook users. Comput. Educ. 2019, 128, 473–485. [Google Scholar] [CrossRef]
- Keith, M.; Ngo, N.; Babb, J. The effects of consumer self-regulation on information disclosure over mobile devices. In Proceedings of the International Conference on Interaction Sciences, AMCIS 2014 Proceedings, Savannah, GA, USA, 7–9 August 2014; Volume 8. Available online: https://aisel.aisnet.org/amcis2014/MobileComputing/GeneralPresentations/8 (accessed on 24 April 2023).
- Renaud, K.; Zimmermann, V. Ethical guidelines for nudging in information security & privacy. Int. J. Hum.-Comput. Stud. 2018, 120, 22–35. [Google Scholar]
- Paspatis, I.; Tsohou, A.; Kokolakis, S. AppAware: A policy visualization model for mobile applications. Inf. Comput. Secur. 2020, 28, 116–132. [Google Scholar] [CrossRef]
- Paspatis, I.; Tsohou, A. How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. J. Cybersecur. Priv. 2023, 3, 396–415. [Google Scholar] [CrossRef]
- Kolb, D.A. Experiential Learning: Experience as the Source of Learning and Development; FT Press: Upper Saddle River, NJ, USA, 2014; ISBN 0132952610. [Google Scholar]
- Jarvis, P. Adult Education and Lifelong Learning: Theory and Practice, 3rd ed.; Routledge: Abingdon, UK, 2004. [Google Scholar] [CrossRef]
- Dewey, J. Experience and Education; Macmillan: New York, NY, USA, 1938. [Google Scholar] [CrossRef]
- Freire, P. Teachers as Cultural Workers—Letters to Those Who Dare to Teach; Westview Press: Boulder, CO, USA, 1998; p. 100. ISBN 978-0-8133-4329-7. [Google Scholar]
- Rogers, A. Adult Education; Metaichmio Publications: Athens, Greece, 1999; Volume 1, ISBN 978-960-566-840-2. [Google Scholar]
- Kokko, A. Adult Education Methodology: Theoretical Framework and Learning Conditions; Patras EAP: Patras, Greece, 2005; Volume A. [Google Scholar]
- Mezirow, J. Transformative Dimensions of Adult Learning; Jossey-Bass: San Fransisco, CA, USA, 1991; ISBN -1-55542-339-6. [Google Scholar]
- Mezirow, J. Transformative learning and social action: A response to Inglis. Adult Educ. Q. 1998, 49, 70–72. [Google Scholar] [CrossRef]
- Mezirow, J. On Critical Reflection: A Review of Mezirow’s Theory and Its Operationalization. Hum. Resour. Dev. Rev. 2016, 15, 3–28. [Google Scholar] [CrossRef]
- Mezirow, J. Transformative Learning; Metaichmio Publications: Athens, Greece, 2006; Volume 1, ISBN 978-960-455-226-9. [Google Scholar]
- Taylor, W.E. The Theory and Practice of Transformative Learning: A Critical Review. In ERIC Clearinghouse on Adult, Career, and Vocational Education; The Ohio State University: Columbus, OH, USA, 1998. Available online: https://eric.ed.gov/?id=ED423422 (accessed on 31 January 2024).
- Boud, D.; Keohg, R.; Walker, D. Reflection: Turning Experience into Learning; Kogan Press: New York, NY, USA, 2002; ISBN 9781315059051. [Google Scholar]
- Tass, P.A. A model of desynchronizing deep brain stimulation with a demand-controlled coordinated reset of neural subpopulations. Biol. Cybern. 2003, 89, 81–88. [Google Scholar] [CrossRef]
- Pavlov, I.P. Conditioned Responses. In Readings in General Psychology; Dennis, W., Ed.; Prentice-Hall, Inc.: Upper Saddle River, NJ, USA, 1949; pp. 249–267. [Google Scholar] [CrossRef]
- Bandura, A. Social Learning through Imitation. In Nebraska Symposium on Motivation; Jones, M.R., Ed.; University of Nebraska Press: Lincoln, NE, USA, 2018; Volume 9, pp. 211–269. [Google Scholar]
- Ainsworth, M.D.S.; Blehar, M.C.; Waters, E.; Wall, S. Patterns of Attachment: A Psychological Study of the Strange Situation; Erlbaum: Hillsdale, NJ, USA, 1978; Available online: https://psycnet.apa.org/record/1980-50809-000 (accessed on 8 September 2023).
- Watson, J.B.; Rayner, R. Conditioned emotional reactions. J. Exp. Psychol. 1920, 3, 1–14. Available online: https://psycnet.apa.org/record/2006-01667-001 (accessed on 8 September 2023).
- Asch, S.E. Effects of group pressure upon the modification and distortion of judgments. In Groups, Leadership, and Men; Guetzkow, H., Ed.; Carnegie Press: Lancaster, UK, 1951; pp. 177–190. Available online: https://psycnet.apa.org/record/1952-00803-001 (accessed on 8 September 2023).
- Becker, H.S. Outsiders: Studies in the Sociology of Deviance; Free Press: Glencoe, IL, USA, 1963; Available online: https://psycnet.apa.org/record/1965-08393-000 (accessed on 8 September 2023).
- Gipps, C. Beyond Testing (Classic Edition): Towards a Theory of Educational Assessment; Routledge: Abingdon, UK, 2011. [Google Scholar] [CrossRef]
- Leenen, L.; van Vuuren, J.J. Framework for the cultivation of a military cybersecurity culture. In Proceedings of the 14th International Conference on Cyber Warfare and Security (ICCWS 2019), Stellenbosch, South Africa, 28 February–1 March 2019; pp. 212–220. Available online: https://www.proquest.com/openview/6081551115e65038b1797e1f71897f6f/1?pq-origsite=gscholar&cbl=396500 (accessed on 8 September 2023).
- Oh, B.M.; Byun, H.; Krishnamoorthy, A. Privacy Issues on Social Media: A Tool for Raising Privacy Awareness on Social Media. Available online: https://www.ideals.illinois.edu/items/106341/bitstreams/346901/object?dl=1 (accessed on 8 September 2023).
- Deterding, S.; Sicart, M.; Nacke, L.; O’Hara, K.; Dixon, D. Gamification: Using game-design elements in non-gaming contexts. In Proceedings of the CHI’11 Extended Abstracts on Human Factors in Computing Systems, Vancouver, BC, Canada, 7–12 May 2011; pp. 2425–2428. [Google Scholar] [CrossRef]
- Mavroeidi, A.G.; Kitsiou, A.; Kalloniatis, C. The role of gamification in privacy protection and user engagement. In Security and Privacy From a Legal, Ethical, and Technical Perspective; IntechOpen Limited: London, UK, 2020; Volume 79. [Google Scholar] [CrossRef]
- Karagiannis, S.; Papaioannou, T.; Magkos, E.; Tsohou, A. Game-based information security/privacy education and awareness: Theory and practice. In European, Mediterranean, and Middle Eastern Conference on Information Systems; Springer International Publishing: Cham, Switzerland, 2020; pp. 509–525. [Google Scholar] [CrossRef]
- Drozd, O.; Kirrane, S. Privacy CURE: Consent comprehension made easy. In Proceedings of the ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, 21–23 September 2020; Proceedings 35. Springer International Publishing: Cham, Switzerland, 2020; pp. 124–139. [Google Scholar] [CrossRef]
- Sofia-Niovi, M.; Christos, K. Virtual Reality as a mean for increasing privacy awareness: The escape room example. In Proceedings of the 26th Pan-Hellenic Conference on Informatics (PCI 2022), Athens, Greece, 25–27 November 2022; ACM: New York, NY, USA, 2022. 9p. [Google Scholar] [CrossRef]
- Mavroeidi, A.G.; Kitsiou, A.; Kalloniatis, C.; Gritzalis, S. Gamification vs. privacy: Identifying and analysing the major concerns. Future Int. 2019, 11, 67. [Google Scholar] [CrossRef]
- Mavroeidi, A.G.; Kitsiou, A.; Kalloniatis, C. Gamification: A Necessary Element for Designing Privacy Training Programs; IntechOpen Limited: London, UK, 2021. [Google Scholar] [CrossRef]
- Henne, B.; Szongott, C.; Smith, M. Towards a mobile security & privacy simulator. In Proceedings of the 2011 IEEE Conference on Open Systems, Langkawi, Malaysia, 25–28 September 2011; pp. 95–100. Available online: https://ieeexplore.ieee.org/abstract/document/6079294 (accessed on 8 September 2023).
- Miller, W.R.; Rollnick, S. Motivational Interviewing: Helping People Change; Hardcover; Guilford Press: New York, NY, USA, 2012; ISBN 978-1-60918-227-4. [Google Scholar]
- Naar, S.; Safren, S.A. Motivational Interviewing and CBT: Combining Strategies for Maximum Effectiveness; Guilford Press: New York City, NY, USA, 2017; Available online: https://psycnet.apa.org/record/2017-26282-000 (accessed on 8 September 2023).
- Towne, K.; Campagna, M.; Spohn, R.; Richey, A. “Put it in your toolbox”: How vocational programs support formerly incarcerated persons through reentry. Crime Delinq. 2023, 69, pp. 316–341. Available online: https://journals.sagepub.com/doi/full/10.1177/00111287221098581 (accessed on 8 September 2023).
- Cun, L.; Hu, L.; Hu, K.; Huang, H.; Deng, N.; Wen, J.; Yang, L.; Zhao, Y. Effect of Cognitive-behavioral Change Model-based Online Health Education in Hypertension Management. Chin. Gen. Pract. 2022, 25, 1984. [Google Scholar] [CrossRef]
- Dali, K.; Hohmann, G. Preserving the Wonder of Stories: The Role of Reflection in Reading Education in Library and Information Science Programs. J. Educ. Libr. Inf. Sci. 2023, 64, 206–229. [Google Scholar] [CrossRef]
- Dols, J.M.F.; Russell, J.A. (Eds.) Natural facial expression: A view from psychological constructionism and pragmatics. In The Science of Facial Expression; Oxford University Press: Oxford, UK, 2017; pp. 457–475. ISBN 978-0-19-061350-1. [Google Scholar]
- De Berardis, D.; Fornaro, M.; Orsolini, L. “No Words for Feelings, Yet!” Exploring Alexithymia, Disorder of Affect Regulation, and the “Mind-Body” Connection. Front. Psychiatry 2020, 11, 593462. [Google Scholar] [CrossRef] [PubMed]
- Rufer, M.; Hand, I.; Braatz, A.; Alsleben, H.; Fricke, S.; Peter, H. A prospective study of alexithymia in obsessive-compulsive patients treated with multimodal cognitive-behavioral therapy. Psychother. Psychosom. 2004, 73, 101–106. [Google Scholar] [CrossRef] [PubMed]
- COPE Core Practices. Available online: https://publicationethics.org/core-practices (accessed on 23 January 2024).
- Holmes, C.C.; Adams, N.M. Likelihood Inference in Nearest-Neighbour Classification Models. Biometrika 2003, 90, 99–112. [Google Scholar] [CrossRef]
- Murdoch, M.; Simon, A.B.; Polusny, M.A.; Bangerter, A.K.; Grill, J.P.; Noorbaloochi, S.; Partin, M.R. Impact of different privacy conditions and incentives on survey response rate, participant representativeness, and disclosure of sensitive information: A randomized controlled trial. BMC Med. Res. Methodol. 2014, 14, 90. [Google Scholar] [CrossRef]
- Fisher, R.A. Statistical methods for research workers. In Breakthroughs in Statistics: Methodology and Distribution; Springer: New York, NY, USA, 1970; pp. 66–70. [Google Scholar] [CrossRef]
- Cronbach, L.J. Coefficient alpha and the internal structure of tests. Psychometrika 1951, 16, 297–334. [Google Scholar] [CrossRef]
- Paspatis, I.; Tsohou, A.; Kokolakis, S. Mobile application privacy risks: Viber users’ de-anonymization using public data. In Proceedings of the MCIS 2017, Genoa, Italy, 4–5 September 2017; Proceedings 32. Available online: https://aisel.aisnet.org/mcis2017/32 (accessed on 24 January 2024).
Participant Number | Index | Gender | Age | Education | Occupation |
---|---|---|---|---|---|
Participant 1 | CD | W | 47 | University Education | Philologist |
Participant 2 | PE | M | 36 | University Education | Police officer |
Participant 3 | NB | M | 46 | University Education | Military |
Participant 4 | DS | W | 50 | University Education | IT |
Participant 5 | PM | M | 62 | University Education | Refrigerant |
Participant 6 | PW | W | 36 | Technological Education | Technologist |
Participant 7 | AA | M | 36 | Technological Education | Technologist |
Participant 8 | AΕ | W | 29 | High School | Employee |
Participant 9 | TE | M | 26 | High School | Employee |
Total: 9 | AVG = 40.9 y | MD = 36 y | SD = 11.33 |
Factor or Cluster | Acronym |
---|---|
Financial Exchanges/Benefits/Usefulness | FEBU |
Privacy Risk Perception | PRP |
Trust/Control/Confidence/Fear | TCCF |
Privacy Concerns | PC |
“Needs”/Psychological Engagement/Necessity | NPEN |
Sensitivity of Information | SOI |
Privacy Awareness | PA |
Time Lapse | TL |
Education/Visualization/Interaction/Experience | EVIE |
Demographics | DE |
Dimensionality/Complexity of Privacy Decision Making | DC |
Activated Factor | Question | Number of Articles |
---|---|---|
PA | Q1: How often do you check the privacy settings on your social media accounts? | 5 |
TCCF, PRP, PC | Q2: How often you felt like your privacy was violated online? | 5 |
PA | Q3: How often do you read the privacy policies or terms of service for the websites or apps you use? | 5 |
PA, PC | Q4: Have you ever declined to use a service or app because of privacy concerns? If so, can you describe the situation (open)? | 5 |
PA, PC | Q5: How often do you use different passwords for different accounts? How do you keep track of them (open)? | 4 |
TCFF | Q6: Have you ever been a victim of identity theft or online fraud? How did that experience affect your privacy behaviors (open)? | 4 |
PRP, PA | Q7: How much personal information do you share online? Can you describe the reason (open)? | 5 |
PA | Q8: How often do you take steps to protect your online privacy? Do you use ad-blockers or other tools and which (open)? | 4 |
PRP, TCFF | Q9: Did you know companies collecting and using your personal data for targeted advertising? | 5 |
PC | Q10: Do you have any concerns about government surveillance or monitoring of your online activities? | 3 |
Participant | Q1 | Q2 | Q3 | Q4 | Q5 | Q6 | Q7 | Q8 | Q9 | Q10 | Avg |
---|---|---|---|---|---|---|---|---|---|---|---|
Participant 1 | 5 | 5 | 4 | 5 | 5 | 5 | 5 | 4 | 5 | 5 | 4.80 |
Participant 2 | 4 | 5 | 4 | 5 | 4 | 4 | 5 | 4 | 5 | 4 | 4.40 |
Participant 3 | 5 | 5 | 4 | 5 | 5 | 5 | 5 | 4 | 5 | 5 | 4.80 |
Participant 4 | 2 | 4 | 4 | 5 | 4 | 2 | 4 | 4 | 5 | 4 | 3.80 |
Participant 5 | 5 | 4 | 4 | 5 | 3 | 5 | 4 | 4 | 5 | 3 | 4.20 |
Participant 6 | 5 | 3 | 3 | 5 | 5 | 5 | 3 | 3 | 5 | 5 | 4.20 |
Participant 7 | 4 | 3 | 5 | 4 | 4 | 4 | 3 | 5 | 4 | 4 | 4.00 |
Participant 8 | 4 | 5 | 2 | 4 | 3 | 4 | 5 | 2 | 4 | 3 | 3.60 |
Participant 9 | 3 | 5 | 1 | 1 | 5 | 3 | 5 | 1 | 1 | 5 | 3.00 |
Total Average | 4.11 | 4.33 | 3.44 | 4.33 | 4.22 | 4.11 | 4.33 | 3.44 | 4.33 | 4.22 | 4.09 |
ANOVA | ||||||
---|---|---|---|---|---|---|
Source of Variation | SS | df | MS | F | p-Value | F-Crit |
Rows | 26.48889 | 8 | 3.311111 | 3.566489 | 0.001557 | 2.069832 |
Columns | 9.955556 | 9 | 1.106173 | 1.191489 | 0.313744 | 2.012705 |
Error | 66.84444 | 72 | 0.928395 | |||
Total | 103.2889 | 89 |
Cronbach’s Alpha | Internal Consistency |
---|---|
0.9 ≤ α | Excellent |
0.8 ≤ α < 0.9 | Good |
0.7 ≤ α < 0.8 | Acceptable |
0.6 ≤ α < 0.7 | Questionable |
0.5 ≤ α < 0.6 | Poor |
α < 0.5 | Unacceptable |
Participants’ Score: | 0.71961223 |
Part/Ant | Q’1 | Q’2 | Q’3 | Q’4 | Q’5 | Q’6 | Q’7 | Q’8 | Q’9 | Q’10 |
---|---|---|---|---|---|---|---|---|---|---|
Participant 1 | 3 | 3 | 4 | 4 | 3 | 3 | 3 | 3 | 4 | 3 |
Participant 2 | 2 | 3 | 3 | 4 | 3 | 3 | 3 | 3 | 4 | 3 |
Participant 3 | 2 | 2 | 4 | 2 | 3 | 3 | 3 | 3 | 3 | 3 |
Participant 4 | 2 | 2 | 3 | 2 | 2 | 2 | 4 | 4 | 3 | 3 |
Participant 5 | 3 | 2 | 3 | 4 | 2 | 3 | 3 | 3 | 3 | 2 |
Participant 6 | 2 | 2 | 2 | 3 | 2 | 2 | 3 | 3 | 4 | 3 |
Participant 7 | 2 | 2 | 3 | 2 | 1 | 2 | 2 | 3 | 4 | 3 |
Participant 8 | 1 | 2 | 2 | 2 | 3 | 2 | 3 | 2 | 3 | 2 |
Participant 9 | 1 | 5 | 1 | 1 | 2 | 2 | 3 | 1 | 1 | 2 |
p-value | 0.00013 | 0.00058 | 0.02220 | 0.00105 | 0.00066 | 0.00042 | 0.00171 | 0.02220 | 0.00275 | 0.00020 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Paspatis, I.; Tsohou, A. Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. J. Cybersecur. Priv. 2024, 4, 76-104. https://doi.org/10.3390/jcp4010005
Paspatis I, Tsohou A. Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. Journal of Cybersecurity and Privacy. 2024; 4(1):76-104. https://doi.org/10.3390/jcp4010005
Chicago/Turabian StylePaspatis, Ioannis, and Aggeliki Tsohou. 2024. "Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement" Journal of Cybersecurity and Privacy 4, no. 1: 76-104. https://doi.org/10.3390/jcp4010005
APA StylePaspatis, I., & Tsohou, A. (2024). Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. Journal of Cybersecurity and Privacy, 4(1), 76-104. https://doi.org/10.3390/jcp4010005