|
|
Research on Privacy Paradox in Social Network Sites under the Perspective of Construal Level Theory |
Li He, Yu Lu, Xu Yiming, Xie Mengfan |
School of Management, Jilin University, Changchun 130022 |
|
|
Abstract Recently, users of social network sites (SNS) have serious concerns over privacy problems. However, they continue to share personal information freely on SNS. The contradiction between privacy concerns and self-disclosure behavior has attracted significant attention of a large number of researchers. Under the perspective of construal level theory and combining Privacy Calculus, Trust theory, and Theory of Planned Behavior, we propose a theoretical framework and test its questionnaire survey. We aim to explore the existence of the paradox and attempt to explain the phenomenon. The results indicate that the SNS user’s concerns over privacy problems have a significant effect on people’s distant-future intention only. This low disclosure intention is inconsistent with their actual behavior. Consequently, the SNS users’ privacy concern and disclosure behavior are paradoxical. The perceived benefits affect the people’s behavior through the mediator of near-future intention, which is the dominant factor of disclosure behavior. Furthermore, trust remarkably moderates the negative effect of the privacy concern to the disclosure intention, which results in the insignificant relationship between concerns and behavior. This paper provides theoretical and empirical evidence on the mechanisms of privacy paradox and helps the SNS providers in optimizing their service.
|
Received: 16 May 2017
|
|
|
|
[1] 《中国网民权益保护调查报告2016》:54%的网民认为个人信息泄露严重[EB/OL]. (2016-06-26) [2017-05-04]. http://www. isc.org.cn/zxzx/xhdt/listinfo-33759.html. [2] Kokolakis S.Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon[J]. Computers & Security, 2017, 64: 122-134. [3] Spiekermann S, Grossklags J, Berendt B.E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior[C]// Proceedings of the 3rd ACM Conference on Electronic Commerce. New York: ACM Press, 2001: 38-47. [4] Barnes S B.A privacy paradox: Social networking in the United States[J]. First Monday, 2006, 11(9). [5] Lee H, Park H, Kim J.Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk[J]. International Journal of Human-Computer Studies, 2013, 71(9): 862-877. [6] Staddon J, Acquisti A, LeFevre K. Self-reported social network behavior: Accuracy predictors and implications for the privacy paradox[C]// Proceedings of the International Conference on Social Computing. IEEE, 2014: 295-302. [7] Bake Y M.Solving the privacy paradox: A counter-argument experimental approach[J]. Computers in Human Behavior, 2014, 38: 33-42. [8] Tönnies F.Community and society[M]. New York: Courier Dover Publications, 2002: 33-61. [9] Lutz C, Strathoff P. Privacy concerns and online behavior-not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses[J/OL]. (2014-04-15) [2017-05-10]. http://dx.doi.org/10.2139/ssrn.2425132. [10] Zafeiropoulou A M, Millard D E, Webber C, et al.Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?[C]// Proceedings of the 5th Annual ACM Web Science Conference. New York: ACM Press, 2013: 463-472. [11] Jiang Z H, Heng C S, Choi B C F. Privacy concerns and privacy-protective behavior in synchronous online social interactions[J]. Information System Research, 2013, 24(3): 579-595. [12] Debatin B, Lovejoy J P, Ann-Kathrin H M A, et al. Facebook and online privacy: Attitudes, behaviors, and unintended consequences[J]. Journal of Computer-Mediated Communication, 2009, 15(1): 83-108. [13] Acquisti A, Grossklags J.What can behavioral economics teach us about privacy[C]// Digital Privacy: Theory, Technology, and Practices. Washington DC: Auerbach Publications, 2007. [14] Cho H, Lee J S, Chung S.Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience[J]. Computers in Human Behavior, 2010, 26(5): 987-995. [15] Jensen C, Potts C, Jensen C.Privacy practices of Internet users: Self-reports versus observed behavior[J]. International Journal of Human-Computer Studies, 2005, 63(1-2): 203-227. [16] Kehr F, Kowatsch T, Wentzel D, et al.Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus[J]. Information Systems Journal, 2015, 25(6): 607-635. [17] Wilson D W, Valacich J S.Unpacking the privacy paradox: irrational decision-making within the privacy calculus[C]// Proceedings of the 33rd International Conference on Information Systems. Florida: AIS/ICIS Administrative Office, 2012. [18] 管家娃, 张玥, 朱庆华, 等. 国外社交网站隐私悖论问题研究综述与国内研究建议[J]. 图书情报工作, 2016, 60(22): 126-134. [19] 黄俊, 李晔, 张宏伟. 解释水平理论的应用及发展[J]. 心理科学进展, 2015, 23(1): 110-119. [20] Trope Y, Liberman N.Construal-level theory of psychological distance[J]. Psychological Review, 2010, 117(2): 440-463. [21] Liberman N, Sagristano M D, Trope Y.The effect of temporal distance on level of mental construal[J]. Journal of Experimental Social Psychology, 2002, 38(6): 523-534. [22] Trope Y, Liberman N, Wakslak C.Construal levels and psychological distance: Effects on representation, prediction, evaluation, and behavior[J]. Journal of Consumer Psychology, 2007, 17(2): 83-95. [23] Lynch Jr J G, Zauberman G. Construing consumer decision making[J]. Journal of Consumer Psychology, 2007, 17(2): 107-112. [24] Trope Y, Liberman N.Temporal construal and time-dependent changes in preference[J]. Journal of Personality and Social Psychology, 2000, 79(6): 876-889. [25] 李雁晨, 周庭锐, 周琇. 解释水平理论: 从时间距离到心理距离[J]. 心理科学进展, 2009, 17(4): 667-677. [26] Gamliel E, Kreiner H, McElroy T. The effect of construal level on unethical behavior[J]. The Journal of Social Psychology, 2017, 157(2): 211-222. [27] 张梦, 杨颖, 叶作亮. 酒店网络评论内容特征对消费者购买意愿的影响——基于时间距离和社会距离情景的实验研究[J]. 旅游学刊, 2012, 27(11): 97-104. [28] Henderson M D, Trope Y, Carnevale P J.Negotiation from a near and distant time perspective[J]. Journal of Personality and Social Psychology, 2006, 91(4): 712-729. [29] Lynch J G, Zauberman G.When do you want it? Time, decisions, and public policy[J]. Journal of Public Policy & Marketing, 2006, 25(1): 67-78. [30] Gurtner S, Reinhardt R.Ambidextrous idea generation—antecedents and outcomes[J]. Journal of Product Innovation Management, 2016, 33(S1): 34-54. [31] Jones C, Hine D W, Marks A D G. The future is now: Reducing psychological distance to increase public engagement with climate change[J]. Risk Analysis, 2017, 37(2): 331-341. [32] Acquisti A, Grossklags J.Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior[C]// Proceedings of the 2nd Annual Workshop on Economics and Information Security (WEIS 2003). Maryland: Economics of Information Security, 2003. [33] Hallam C, Zanella G.Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards[J]. Computers in Human Behavior, 2017, 68: 217-227. [34] 袁金巧. 基于隐私计算理论的移动医疗服务用户采纳意愿研究[D]. 哈尔滨: 哈尔滨工业大学, 2013: 16-18. [35] Jiang Z H, Heng C S, Choi B C F. Privacy concerns and privacy-protective behavior in synchronous online social interactions[J]. Information System Research, 2013, 24(3): 579-595. [36] Yao M Z.Self-protection of online privacy: A behavioral approach[M]// Trepte S, Reinecke L.(eds) Privacy Online. Heidelberg: Springer, 2011: 111-125. [37] Pentina I, Zhang L, Bata H, et al.Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison[J]. Computers in Human Behavior, 2016, 65: 409-419. [38] Lwin M O, Williams J D.A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online[J]. Marketing Letters, 2003, 14(4): 257-272. [39] Eyal T, Sagristano M D, Trope Y, et al.When values matter: Expressing values in behavioral intentions for the near vs. distant future[J]. Journal of Experimental Social Psychology, 2009, 45(1): 35-43. [40] Salo J, Karjaluoto H.A conceptual model of trust in the online environment[J]. Online Information Review, 2007, 31(5): 604-621. [41] Gefen D, Karahanna E, Straub D W.Trust and TAM in online shopping: An integrated model[J]. MIS Quarterly, 2003, 27(1): 51-90. [42] Zafeiropoulou A M.A paradox of privacy: unravelling the reasoning behind online location sharing[D]. University of Southampton, 2014. [43] 杨腾蛟. 基于消费者感知的企业品牌权益对品牌忠诚的作用研究[D]. 杭州: 浙江大学, 2008: 38-43. [44] Anderson C L, Agarwal R.The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information[J]. Information Systems Research, 2011, 22(3): 469-490. [45] Premazzi K, Castaldo S, Grosso M, et al.Customer information sharing with e-vendors: The roles of incentives and trust[J]. International Journal of Electronic Commerce, 2010, 14(3): 63-91. [46] Bansal G, Zahedi F, Gefen D.The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation[C]// Proceedings of International Conference on Information Systems. Paris: ICIS Doctoral Consortium, 2008. [47] 朱侯. 社交媒体用户隐私关注的心理机制研究[J]. 图书情报知识, 2016(2): 75-82. [48] Zlatolas L N, Welzer T, Heričko M, et al.Privacy antecedents for SNS self-disclosure: The case of Facebook[J]. Computers in Human Behavior, 2015, 45: 158-167. [49] 郭龙飞. 社交网络用户隐私关注动态影响因素及行为规律研究[D]. 北京: 北京邮电大学, 2013: 3-64. [50] Lutz C, Strathoff P.Privacy concerns and online behavior - Not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses[J]. SSRN Electronic Journal, 2014: 81-99. [51] Davison W P.The third-person effect in communication[J]. Public Opinion Quarterly, 1983, 47(1): 1. [52] Krasnova H, Günther O, Spiekermann S, et al.Privacy concerns and identity in online social networks[J]. Identity in the Information Society, 2009, 2(1): 39-63. [53] Metcalfe J, Mischel W.A hot/cool-system analysis of delay of gratification: Dynamics of willpower[J]. Psychological Review, 1999, 106(1): 3-19. [54] 朱侯, 王可, 严芷君, 等. 基于隐私计算理论的SNS用户隐私悖论现象研究[J]. 情报杂志, 2017, 36(2): 134-139, 121. [55] Förster J, Friedman R S, Liberman N.Temporal construal effects on abstract and concrete thinking: Consequences for insight and creative cognition[J]. Journal of Personality & Social Psychology, 2004, 87(2): 177-189. [56] Alsaad A, Mohamad R, Ismail N A.The moderating role of trust in business to business electronic commerce (B2B EC) adoption[J]. Computers in Human Behavior, 2017, 68: 157-169. [57] 王雪芬, 赵宇翔, 朱庆华. 社交媒体环境下的用户隐私关注研究现状[J]. 情报学报, 2015, 34(12): 1322-1334. [58] Lo J.Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites[C]// AMCIS 2010 Proceedings, 2010: 110-122. [59] Barry M.Applying the theory of planned behavior to cadastral systems[J]. Survey Review, 2005, 38(296): 124-137. [60] Malhotra N K, Kim S S, Agarwal J.Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model[J]. Information Systems Research, 2004, 15(4): 336-355. [61] Dienlin T, Trepte S.Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors[J]. European Journal of Social Psychology, 2015, 45(3): 285-297. [62] Sutanto J, Palme E, Tan C H, et al.Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users[J]. MIS Quarterly, 2013, 37(4): 1141-1164. [63] Baron R M, Kenny D A.The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations[J]. Journal of Personality and Social Psychology, 1986, 51(6): 1173-1182. [64] Cohen J.Statistical power analysis for the behavioral sciences[J]. Journal of the American Statistical Association, 1988, 2(4): 19-74. [65] Smith H J, Dinev T, Xu H.Information privacy research: An interdisciplinary review[J]. MIS Quarterly, 2011, 35(4): 989-1015. [66] 孙晓玲. 大学生自我透视的时间距离效应[D]. 上海: 华东师范大学, 2008: 1-2. [67] Sun Y, Wang N, Shen X L, et al.Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences[J]. Computers in Human Behavior, 2015, 52: 278-292. [68] Gurung A, Raja M K.Online privacy and security concerns of consumers[J]. Information and Computer Security, 2016, 24(4): 348-371. |
|
|
|