Protection or Cynicism? Dual Strategies for Coping with Privacy Threats

被引:0
|
作者
Yu, Lu [1 ]
He, Li [2 ]
Du, Jian [3 ]
Wu, Xiaobo [1 ]
机构
[1] Zhejiang Univ, Sch Management, Room 811,Sch Management Bldg, Hangzhou 310058, Zhejiang, Peoples R China
[2] Jilin Univ, Sch Management, Sch Management Bldg, Changchun 130022, Jilin, Peoples R China
[3] Zhejiang Univ, Sch Management, Room 818,Sch Management Bldg, Hangzhou 310058, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Information privacy; Coping theory; Privacy paradox; Privacy cynicism; Protection motivation; INFORMATION PRIVACY; INTERNET USERS; FEAR APPEALS; COGNITIVE APPRAISAL; MOTIVATION THEORY; SELF-DISCLOSURE; DARK SIDE; SECURITY; PARADOX; RESPONSES;
D O I
10.1007/s10796-024-10531-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users' motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users' information.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Online privacy concerns and privacy protection strategies among older adults in East York, Canada
    Quan-Haase, Anabel
    Ho, Dennis
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2020, 71 (09) : 1089 - 1102
  • [42] Personal privacy without computational obscurity: Rethinking privacy protection strategies for open information networks
    Weitzner, Daniel J.
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 174 - 174
  • [43] Privacy in Immersive Extended Reality: Exploring User Perceptions, Concerns, and Coping Strategies
    Hadan, Hilda
    Wang, Derrick M.
    Nacke, Lennart E.
    Zhang-Kennedy, Leah
    [J]. PROCEEDINGS OF THE 2024 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYTEMS, CHI 2024, 2024,
  • [44] Data capitalism and the user: An exploration of privacy cynicism in Germany
    Lutz, Christoph
    Hoffmann, Christian Pieter
    Ranzini, Giulia
    [J]. NEW MEDIA & SOCIETY, 2020, 22 (07) : 1168 - 1187
  • [45] Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA
    Posey, Clay
    Raja, Uzma
    Crossler, Robert E.
    Burns, A. J.
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2017, 26 (06) : 585 - 604
  • [46] CROWDING, PRIVACY, AND COPING
    WALDEN, TA
    NELSON, PA
    SMITH, DE
    [J]. ENVIRONMENT AND BEHAVIOR, 1981, 13 (02) : 205 - 224
  • [47] A review of secure federated learning: Privacy leakage threats, protection technologies, challenges and future directions
    Ge, Lina
    Li, Haiao
    Wang, Xiao
    Wang, Zhe
    [J]. NEUROCOMPUTING, 2023, 561
  • [48] The relative conservation impact of strategies that prioritize biodiversity representation, threats, and protection costs
    Sacre, Edmond
    Weeks, Rebecca
    Bode, Michael
    Pressey, Robert L.
    [J]. CONSERVATION SCIENCE AND PRACTICE, 2020, 2 (08)
  • [49] FORMATION OF EFFECTIVE COPING-STRATEGIES OF TEACHERS AS PROTECTION OF THEIR PSYCHOLOGICAL HEALTH
    Kiyas, A. V.
    [J]. SCIENCE AND EDUCATION, 2010, (03):
  • [50] Beyond secrecy - New privacy protection strategies for open information spaces
    Weitzner, Daniel J.
    [J]. IEEE INTERNET COMPUTING, 2007, 11 (05) : 96 - +