Protection or Cynicism? Dual Strategies for Coping with Privacy Threats

被引:0
|
作者
Yu, Lu [1 ]
He, Li [2 ]
Du, Jian [3 ]
Wu, Xiaobo [1 ]
机构
[1] Zhejiang Univ, Sch Management, Room 811,Sch Management Bldg, Hangzhou 310058, Zhejiang, Peoples R China
[2] Jilin Univ, Sch Management, Sch Management Bldg, Changchun 130022, Jilin, Peoples R China
[3] Zhejiang Univ, Sch Management, Room 818,Sch Management Bldg, Hangzhou 310058, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Information privacy; Coping theory; Privacy paradox; Privacy cynicism; Protection motivation; INFORMATION PRIVACY; INTERNET USERS; FEAR APPEALS; COGNITIVE APPRAISAL; MOTIVATION THEORY; SELF-DISCLOSURE; DARK SIDE; SECURITY; PARADOX; RESPONSES;
D O I
10.1007/s10796-024-10531-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users' motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users' information.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Threats to privacy protection
    Barash, Carol Isaacson
    [J]. SCIENCE, 2007, 318 (5852) : 913 - 914
  • [2] Coping with cynicism
    Morris, Meaghan
    [J]. CULTURAL STUDIES, 2011, 25 (01) : 123 - 127
  • [3] Privacy risk perceptions and privacy protection strategies
    Oomen, Isabelle
    Leenes, Ronald
    [J]. POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 121 - 138
  • [4] Review on privacy threats and protection mechanisms for blockchain technology
    Liu, Haiou
    Zhou, Yingyu
    Zhou, Xin
    Xie, Jin
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2023, 29 (07): : 2292 - 2312
  • [5] Online advertising: Analysis of privacy threats and protection approaches
    Estrada-Jimenez, Jose
    Parra-Arnau, Javier
    Rodriguez-Hoyos, Ana
    Forne, Jordi
    [J]. COMPUTER COMMUNICATIONS, 2017, 100 : 32 - 51
  • [6] Anatomization and Protection of Mobile Apps' Location Privacy Threats
    Fawaz, Kassem
    Feng, Huan
    Shin, Kang G.
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 753 - 768
  • [7] The biological weapons threats and coping strategies for health promotion
    Hosseini-Shokouh, Seyyed-Javad
    Sheikhi, Rahim Ali
    Hosseini, Seyed Mohammad Reza
    Moradimajd, Parisa
    [J]. JOURNAL OF EDUCATION AND HEALTH PROMOTION, 2021, 10 (01)
  • [8] Privacy cynicism: A new approach to the privacy paradox
    Hoffmann, Christian Pieter
    Lutz, Christoph
    Ranzini, Giulia
    [J]. CYBERPSYCHOLOGY-JOURNAL OF PSYCHOSOCIAL RESEARCH ON CYBERSPACE, 2016, 10 (04):
  • [9] PRIVACY PROTECTION STRATEGIES ON FACEBOOK: The Internet privacy paradox revisited
    Young, Alyson Leigh
    Quan-Haase, Anabel
    [J]. INFORMATION COMMUNICATION & SOCIETY, 2013, 16 (04) : 479 - 500
  • [10] Threats to privacy
    Nesson, C
    [J]. SOCIAL RESEARCH, 2001, 68 (01): : 105 - 113