Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-030-22338-0_13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online

Published: 26 July 2019 Publication History

Abstract

The Privacy Paradox is an information privacy behavioral phenomenon wherein individuals are aware that the personally identifiable information (PII) they disclose in an online transaction may be compromised, yet disclose it nonetheless. One explanation that has been given for this phenomenon is that the decision to disclose information online is informed by a risk/reward analysis, referred to as Privacy Calculus. However, the broad privacy calculus framework does not necessarily provide insight into specifically how an individual assesses either risk or reward. In our study, we evaluate several behavioral factors in an effort to assess whether and to what extent each informs or influences an individual’s risk assessment when deciding whether to disclose or withhold their PII in a given online transaction. Specifically, we report findings from a recent survey we administered, examining factors included in three different behavioral models. Results from this survey were analyzed using exploratory factor analysis, which provided insights as to the salience of each variable vis-à-vis online information behavior. Of the factors included in our study, our results surfaced four variables – perceived trustworthiness, perceived vulnerability, “cyber” self-efficacy, and perceived controllability – that appear to be particularly salient in an individual’s decision to withhold or disclose PII online.

References

[1]
Warren SD and Brandeis LD The right to privacy Harv. Law Rev. 1890 4 5 194-220
[2]
Office of E-Government and Information Technology, M-06-19: Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments, O.o.M.a. Budget, Editor, Washington, D.C (2006)
[3]
Gandy OH The Panopic Sort: A Political Economy of Personal Information 1993 Boulder Westview Press
[4]
Pew Research Center, Public Perceptions of Privacy and Security in the Post-Snowden Era. Pew Research Center (2014)
[5]
Norberg PA, Horne DR, and Horne DA The privacy paradox: personal information disclosure intentions versus behaviors J. Consum. Aff. 2007 41 1 100-126
[6]
Culnan MJ and Bies RJ Consumer privacy: balancing economic and justice considerations J. Soc. Issues 2003 59 2 323-342
[7]
Laufer RS and Wolfe M Privacy as a concept and a social issue: a multidimensional developmental theory J. Soc. Issues 1977 33 3 22-42
[8]
Dinev T and Hart P An extended privacy calculus model for e-commerce transactions Inf. Syst. Res. 2006 17 1 61-80
[9]
Smith HJ, Dinev T, and Xu H Information privacy research: an interdisciplinary review MIS Q. 2011 35 4 989-1015
[10]
Bauer RA Cox DF Consumer behavior as risk taking Risk Taking and Information Handling in Consumer Behavior 1967 Boston Harvard University 23-33
[11]
Malhotra NK, Kim SS, and Agarwal J Internet users’ information privacy concerns (IUIPC): the construct, the scale and a causal model Inf. Syst. Res. 2004 15 4 336-355
[12]
Featherman MS and Pavlou PA Predicting e-services adoption: a perceived risk facets perspective Hum.-Comput. Stud. 2003 59 451-474
[13]
Smith HJ, Milberg SJ, and Burke SJ Information privacy: measuring individuals’ cocnerns about organizational practices MIS Q. 1996 20 2 167-196
[14]
Deutsch M Trust and Suspicion J. Conflict Resolut. 1958 2 4 265-279
[15]
Deutsch, M.: Trust and suspicion: theoretical notes. In: The Resolution of Conflict: Constructive and Destructive Processes, pp. 143–176. Yale University Press, New Haven (1973)
[16]
Ben-Ner A and Putterman L Trusting and trustworthiness Boston Univ. Law Rev. 2001 81 523-551
[17]
Colquitt JA, Scott BA, and LePine JA Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationship with risk taking and job performance J. Appl. Psychol. 2007 92 4 909-927
[18]
Hardin R Trustworthiness Ethics 1996 107 1 26-42
[19]
Hosmer LT Trust: the connecting link between organizational theory and philosophical ethics Acad. Manag. Rev. 1995 20 2 379-403
[20]
Zand DE Trust and managerial problem solving Adm. Sci. Q. 1972 17 2 229-239
[21]
Ajzen I Perceived behavioral control, self-efficacy, locus of control and the theory of planned behavior J. Appl. Soc. Psychol. 2002 32 4 665-683
[22]
Allport GW Murchison C Attitudes A Handbook of Social Psychology 1935 Worcester Clark University Press 799-844
[23]
Fishbein M Readings in Attitude Theory and Measurement 1967 New York Wiley
[24]
Cialdini RB and Trost MR Gilbert DT, Fiske ST, Lindzey G, and Aronson E Social influence: social norms, conformity, and compliance The Handbook of Social Psychology 1998 New York McGraww-Hill Companies, Inc. 151-192
[25]
Fishbein M and Ajzen I Predicting and Changing Behavior: The Reasoned Action Approach 2010 New York Routledge Taylor & Francis Group
[26]
Ajzen, I.: Constructing a theory of planned behavior questionnaire: conceptual and methodological considerations (2002)
[27]
Thompson B Exploratory and Confirmatory Factor Analysis 2004 Washington American Psychological Association
[28]
Guttman L Some necessary conditions for common-factor analysis Psychometrika 1954 19 2 149-161
[29]
Kaiser HF The varimax criterion for analytic rotation in factor analysis Psychometrika 1958 23 3 187-200

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
HCI in Business, Government and Organizations. Information Systems and Analytics: 6th International Conference, HCIBGO 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings, Part II
Jul 2019
499 pages
ISBN:978-3-030-22337-3
DOI:10.1007/978-3-030-22338-0
  • Editors:
  • Fiona Fui-Hoon Nah,
  • Keng Siau

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 26 July 2019

Author Tags

  1. Information privacy
  2. Human computer interaction
  3. Personally identifiable information (PII)
  4. Information privacy behavior
  5. Privacy paradox

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media