|
|
Emotion and Context’s Impact on Users’ Engagement in Defensive Privacy Protection Behaviors |
Liu Bailing1,2(),Lei Xiaofang1,Xu Yang1 |
1School of Information Management, Central China Normal University, Wuhan 430079, China 2Center for Data Governance and Intelligent Decision-Making of Hubei Province, Wuhan 430079, China |
|
|
Abstract [Objective] This study explores the mechanism of threat assessment on users’ willingness to engage in defensive privacy protection behaviors. It helps companies make reasonable privacy management decisions and foster a healthy corporate digital ecosystem. [Methods] Based on the protection motivation theory and focusing on threat assessment, we introduced “information privacy anxiety” as an emotional mediating variable. Then, we used the information sensitivity of the context as a moderating variable to construct a model for the impact mechanism of threat assessment on users’ defensive intentions. We used the SEM-PLS to empirically analyze 183 financial and 200 e-commerce context datasets. [Results] Information privacy anxiety is a critical emotional factor influencing users’ willingness to defensive privacy protection behaviors. It plays a partial mediating role between perceived threats and defensive intentions. The information sensitivity of the context positively moderates the relationship between information privacy anxiety and defensive willingness. The information sensitivity of the context only has a moderating effect on the relationship between perceived vulnerability and threat. In contrast, it did not moderate the relationship between perceived severity and threat. [Limitations] This study explores willingness rather than actual behaviors. Regarding information sensitivity comparison, we only chose representative finance and e-commerce contexts. [Conclusions] This study advances the protection motivation theory, providing theoretical guidance for business to adopt appropriate management measures to reduce users’ defensive privacy protection behaviors.
|
Received: 13 January 2023
Published: 12 April 2024
|
|
Fund:National Social Science Fund of China(22&ZD324);Ministry of Education of Humanities and Social Science Project(23YJA630057);Fundamental Research Funds for the Central Universities(CCNU22QN017) |
Corresponding Authors:
Liu Bailing,ORCID:0000-0001-7825-5263,E-mail: bl_liu@ccnu.edu.cn。
|
[1] |
续继, 王于鹤. 数字经济中的隐私保护和数据共享——基于隐私顾虑与个人信息虚构的视角[J]. 统计研究, 2022, 39(2): 48-63.
|
[1] |
(Xu Ji, Wang Yuhe. Privacy Protection VS Data Sharing in Digital Economy: From the Perspective of Privacy Concern and False Personal Information Disclosing[J]. Statistical Research, 2022, 39(2): 48-63.)
|
[2] |
Youn S. Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors among Young Adolescents[J]. The Journal of Consumer Affairs, 2009, 43(3): 389-418.
doi: 10.1111/joca.2009.43.issue-3
|
[3] |
Sonnenschein R, Loske A, Buxmann P. Gender Differences in Mobile Users’ IT Security Appraisals and Protective Actions: Findings from a Mixed-Method Study[C]// Proceedings of the 37th International Conference on Information Systems. 2016: 1-21.
|
[4] |
Milne S, Orbell S, Sheeran P. Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions[J]. British Journal of Health Psychology, 2002, 7(2): 163-184.
doi: 10.1348/135910702169420
|
[5] |
Bansal G, Zahedi F M, Gefen D. Do Context and Personality Matter? Trust and Privacy Concerns in Disclosing Private Information Online[J]. Information & Management, 2016, 53(1): 1-21.
doi: 10.1016/j.im.2015.08.001
|
[6] |
Malhotra N K, Kim S S, Agarwal J. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model[J]. Information Systems Research, 2004, 15(4): 336-355.
doi: 10.1287/isre.1040.0032
|
[7] |
Miltgen C L, Smith H J. Falsifying and Withholding: Exploring Individuals’ Contextual Privacy-Related Decision-Making[J]. Information & Management, 2019, 56(5): 696-717.
doi: 10.1016/j.im.2018.11.004
|
[8] |
Bandara R J, Fernando M, Akter S. Construing Online Consumers’ Information Privacy Decisions: The Impact of Psychological Distance[J]. Information & Management, 2021, 58(7): 103497.
doi: 10.1016/j.im.2021.103497
|
[9] |
Son J Y, Kim S S. Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model[J]. MIS Quarterly, 2008, 32(3): 503-529.
doi: 10.2307/25148854
|
[10] |
Jiang Z H, Heng C S, Choi B C F. Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions[J]. Information Systems Research, 2013, 24(3): 579-595.
doi: 10.1287/isre.1120.0441
|
[11] |
刘百灵, 夏惠敏. 隐私反馈技术特征对用户隐私保护行为影响研究[J]. 科研管理, 2020, 41(11): 182-192.
|
[11] |
(Liu Bailing, Xia Huimin. A Research on the Influence of Privacy Feedback Technical Features on Users’ Privacy Protection Behaviors[J]. Science Research Management, 2020, 41(11): 182-192.)
|
[12] |
潘定, 谢菡. 授权时间和信息框架的匹配效应对隐私披露意愿的影响[J]. 外国经济与管理, 2020, 42(11): 81-93.
|
[12] |
(Pan Ding, Xie Han. Impact of the Matching Effect Between Permission Time and Message Framing on Privacy Disclosure Willingness[J]. Foreign Economics and Management, 2020, 42(11): 81-93.)
|
[13] |
谢卫红, 曲静静. 大数据背景下威胁评估对网络隐私顾虑的影响: 组织隐私政策的调节[J]. 科技管理研究, 2018, 38(19): 188-194.
|
[13] |
(Xie Weihong, Qu Jingjing. Impact of Threat Assessment on Internet Privacy Concerns in the Context of Big Data: Regulation of Organizational Privacy Policy[J]. Science and Technology Management Research, 2018, 38(19): 188-194.)
|
[14] |
Mousavi R, Chen R, Kim D J, et al. Effectiveness of Privacy Assurance Mechanisms in Users’ Privacy Protection on Social Networking Sites from the Perspective of Protection Motivation Theory[J]. Decision Support Systems, 2020, 135: 113323.
doi: 10.1016/j.dss.2020.113323
|
[15] |
朱侯, 张明鑫. 移动APP用户隐私信息设置行为影响因素及其组态效应研究[J]. 情报科学, 2021, 39(7): 54-62.
|
[15] |
(Zhu Hou, Zhang Mingxin. Influential Factors and Configuration Effects of User Privacy Setting Behavior in Mobile App[J]. Information Science, 2021, 39(7): 54-62.)
|
[16] |
Meier Y, Schäwel J, Kyewski E, et al. Applying Protection Motivation Theory to Predict Facebook Users’ Withdrawal and Disclosure Intentions[C]// Proceedings of International Conference on Social Media and Society. New York: ACM, 2020: 21-29.
|
[17] |
Rodríguez-Priego N, Porcu L, Kitchen P J. Sharing But Caring: Location Based Mobile Applications (LBMA) and Privacy Protection Motivation[J]. Journal of Business Research, 2022, 140: 546-555.
doi: 10.1016/j.jbusres.2021.11.022
|
[18] |
王璐瑶, 李琪, 乔志林, 等. 保护动机对社交网络用户隐私关注和隐私安全保护行为的影响研究[J]. 情报杂志, 2019, 38(10): 104-110.
|
[18] |
(Wang Luyao, Li Qi, Qiao Zhilin, et al. Impact of Protection Motivation on Privacy Concerns and Privacy Security Protection Behaviors of SNS Users[J]. Journal of Intelligence, 2019, 38(10): 104-110.)
|
[19] |
Ma X F. IS Professionals’ Information Security Behaviors in Chinese IT Organizations for Information Security Protection[J]. Information Processing & Management, 2022, 59(1): 102744.
doi: 10.1016/j.ipm.2021.102744
|
[20] |
Moody G D, Siponen M, Pahnila S. Toward a Unified Model of Information Security Policy Compliance[J]. MIS Quarterly, 2018, 42(1): 285-312.
doi: 10.25300/MISQ/2018/13853
|
[21] |
Boss S R, Galletta D F, Lowry P B, et al. What do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors[J]. MIS Quarterly, 2015, 39(4): 837-864.
doi: 10.25300/MISQ
|
[22] |
朱慧, 刘洪伟, 陈丽, 等. 网络用户的信息隐私边界及其敏感度等级研究[J]. 广东工业大学学报, 2013, 30(4): 26-32.
|
[22] |
(Zhu Hui, Liu Hongwei, Chen Li, et al. Research on Information Privacy Boundaries and Sensitivity of Net Users[J]. Journal of Guangdong University of Technology, 2013, 30(4): 26-32.)
|
[23] |
Hong W Y, Chan F K Y, Thong J Y L, et al. A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research[J]. Information Systems Research, 2014, 25(1): 111-136.
doi: 10.1287/isre.2013.0501
|
[24] |
Bansal G, Zahedi F M, Gefen D. The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online[J]. Decision Support Systems, 2010, 49(2): 138-150.
doi: 10.1016/j.dss.2010.01.010
|
[25] |
陈昊, 李文立, 柯育龙. 社交媒体持续使用研究:以情感响应为中介[J]. 管理评论, 2016, 28(9): 61-71.
|
[25] |
(Chen Hao, Li Wenli, Ke Yulong. Empirical Study on Continuous Usage of Social Media: The Mediating Role of Affect Appeal[J]. Management Review, 2016, 28(9): 61-71.)
|
[26] |
Venkatesh V, Morris M G, Davis G B, et al. User Acceptance of Information Technology: Toward a Unified View[J]. MIS Quarterly, 2003, 27(3): 425-478.
doi: 10.2307/30036540
|
[27] |
Rachman S, Radomsky A S, Shafran R. Safety Behaviour: A Reconsideration[J]. Behaviour Research and Therapy, 2008, 46(2): 163-173.
doi: 10.1016/j.brat.2007.11.008
pmid: 18199423
|
[28] |
Raghunathan R, Pham M T. All Negative Moods are not Equal: Motivational Influences of Anxiety and Sadness on Decision Making[J]. Organizational Behavior and Human Decision Processes, 1999, 79(1): 56-77.
doi: 10.1006/obhd.1999.2838
pmid: 10388609
|
[29] |
Boukamcha F. Situational and Personality Effects on Smokers’ Psychological Reactance[J]. International Journal of Pharmaceutical and Healthcare Marketing, 2016, 10(4): 432-448.
doi: 10.1108/IJPHM-10-2015-0052
|
[30] |
Elhai J D, Levine J C, Hall B J. Anxiety about Electronic Data Hacking: Predictors and Relations with Digital Privacy Protection Behavior[J]. Internet Research, 2017, 27(3): 631-649.
doi: 10.1108/IntR-03-2016-0070
|
[31] |
王烨娣, 周雪, 蒋玉石. 推力和拉力因素组态效应对互联网用户隐私披露行为的影响[J]. 管理学报, 2021, 18(3): 426-433.
|
[31] |
(Wang Yedi, Zhou Xue, Jiang Yushi. The Influence of Push and Pull Factors Configuration Effect on Privacy Disclosure Behavior of Internet Users[J]. Chinese Journal of Management, 2021, 18(3): 426-433.)
|
[32] |
苏云, 张庆来. 民族智慧社区信息系统协同治理模式研究——基于需求层次理论[J]. 图书与情报, 2020(3): 86-92.
|
[32] |
(Su Yun, Zhang Qinglai. Research on Collaborative Governance Mode of Information System of Ethnic Minority Smart Community Based on the Hierarchy of Needs Theory[J]. Library and Information, 2020(3): 86-92.)
|
[33] |
余樱, 景奉杰, 杨艳. 怎样花钱更幸福?购买类型对幸福感的影响[J]. 心理科学进展, 2019, 27(12): 2133-2140.
doi: 10.3724/SP.J.1042.2019.02133
|
[33] |
(Yu Ying, Jing Fengjie, Yang Yan. How to Buy Happiness? The Effect of Purchase Type on Happiness[J]. Advances in Psychological Science, 2019, 27(12): 2133-2140.)
doi: 10.3724/SP.J.1042.2019.02133
|
[34] |
Liang H G, Xue Y J. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective[J]. Journal of the Association for Information Systems, 2010, 11(7): 394-413.
doi: 10.17705/1jais
|
[35] |
Ogbanufe O, Pavur R. Going Through the Emotions of Regret and Fear: Revisiting Protection Motivation for Identity Theft Protection[J]. International Journal of Information Management, 2022, 62: 102432.
doi: 10.1016/j.ijinfomgt.2021.102432
|
[36] |
梁晓丹, 李颖灏, 刘芳. 在线隐私政策对消费者提供个人信息意愿的影响机制研究——信息敏感度的调节作用[J]. 管理评论, 2018, 30(11): 97-107, 151.
|
[36] |
(Liang Xiaodan, Li Yinghao, Liu Fang. The Influence Mechanism of Privacy Policies on Consumers’ Willingness to Provide Information: Based on Moderating Effects of Information Sensitivity[J]. Management Review, 2018, 30(11): 97-107, 151.)
|
[37] |
陈昊, 李文立. 基于情绪中介的信息安全保护行为研究[J]. 科研管理, 2018, 39(6): 48-56.
|
[37] |
(Chen Hao, Li Wenli. An Empirical Study of Information Security Protection Behavior: Mediating Effect of Emotion[J]. Science Research Management, 2018, 39(6): 48-56.)
|
[38] |
Liang H G, Xue Y J. Avoidance of Information Technology Threats: A Theoretical Perspective[J]. MIS Quarterly, 2009, 33(1): 71-90.
doi: 10.2307/20650279
|
[39] |
Xu H, Teo H H, Tan B C Y, et al. Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services[J]. Information Systems Research, 2012, 23(4): 1342-1363.
doi: 10.1287/isre.1120.0416
|
[40] |
张晓娟, 李贞贞. 基于社会认知理论的智能手机用户信息安全行为意愿研究[J]. 现代情报, 2017, 37(9): 16-22.
doi: 10.3969/j.issn.1008-0821.2017.09.003
|
[40] |
(Zhang Xiaojuan, Li Zhenzhen. Research on the Information Security Behavior Intention of Smartphone Users Based on the Social Cognitive Theory[J]. Journal of Modern Information, 2017, 37(9): 16-22.)
doi: 10.3969/j.issn.1008-0821.2017.09.003
|
[41] |
Mohamed N, Ahmad I H. Information Privacy Concerns, Antecedents and Privacy Measure Use in Social Networking Sites: Evidence from Malaysia[J]. Computers in Human Behavior, 2012, 28(6): 2366-2375.
doi: 10.1016/j.chb.2012.07.008
|
[42] |
Hair J F, Risher J J, Sarstedt M, et al. When to Use and How to Report the Results of PLS-SEM[J]. European Business Review, 2019, 31(1): 2-24.
doi: 10.1108/EBR-11-2018-0203
|
[43] |
温忠麟, 叶宝娟. 中介效应分析: 方法和模型发展[J]. 心理科学进展, 2014, 22(5): 731-745.
doi: 10.3724/SP.J.1042.2014.00731
|
[43] |
(Wen Zhonglin, Ye Baojuan. Analyses of Mediating Effects: The Development of Methods and Models[J]. Advances in Psychological Science, 2014, 22(5): 731-745.)
doi: 10.3724/SP.J.1042.2014.00731
|
[44] |
Xu H, Teo H H, Tan B C Y, et al. The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-based Services[J]. Journal of Management Information Systems, 2009, 26(3): 135-174.
doi: 10.2753/MIS0742-1222260305
|
[45] |
Cho H, Li P X, Goh Z H. Privacy Risks, Emotions, and Social Media: A Coping Model of Online Privacy[J]. ACM Transactions on Computer-Human Interaction, 2020, 27(6): Article No.40.
|
[46] |
刘鲁川, 张冰倩, 李旭. 社交媒体用户焦虑和潜水行为成因及与信息隐私关注的关系[J]. 情报资料工作, 2018(5): 72-80.
|
[46] |
(Liu Luchuan, Zhang Bingqian, Li Xu. Social Media Users’ Anxiety and Diving Behaviors and Their Relationship with Information Privacy Concerns[J]. Information and Documentation Services, 2018(5): 72-80.)
|
[47] |
Chen Y, Zahedi F M. Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China[J]. MIS Quarterly, 2016, 40(1): 205-222.
doi: 10.25300/MISQ
|
[48] |
Ibrahim H, Al-Ajlouni M M Q. Sustainable Consumption: Insights from the Protection Motivation (PMT), Deontic Justice (DJT)and Construal Level (CLT) Theories[J]. Management Decision, 2018, 56(3): 610-633.
doi: 10.1108/MD-05-2016-0323
|
[49] |
Chou H L, Sun J C Y. The Moderating Roles of Gender and Social Norms on the Relationship Between Protection Motivation and Risky Online Behavior among In-Service Teachers[J]. Computers & Education, 2017, 112: 83-96.
doi: 10.1016/j.compedu.2017.05.003
|
[50] |
Qiao G H, Ruan W J, Pabel A. Understanding Tourists’ Protection Motivations When Faced with Overseas Travel after COVID-19: The Case of South Koreans Travelling to China[J]. Current Issues in Tourism, 2022, 25(10): 1588-1606.
doi: 10.1080/13683500.2021.1928011
|
[51] |
Venkatesh V, Davis F D. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies[J]. Management Science, 2000, 46(2): 186-204.
doi: 10.1287/mnsc.46.2.186.11926
|
[52] |
Chen A H, Lu Y B. Protective Behavior in Ride-Sharing Through the Lens of Protection Motivation Theory and Usage Situation Theory[J]. International Journal of Information Management, 2021, 61:102402.
doi: 10.1016/j.ijinfomgt.2021.102402
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|