Research on the Influence of Self-efficacy of Privacy Protection on Privacy Behaviors of Social Network Users

  • Xu Yiming ,
  • Li He ,
  • Yu Lu
Expand
  • School of Management, Jilin University, Changchun 130022

Received date: 2018-12-19

  Revised date: 2019-03-05

  Online published: 2019-09-05

Abstract

[Purpose/significance] With the frequent occurrence of data leakage events, more and more social network users have questioned the effectiveness of their privacy protection behaviors, and even abandoned the protection strategy for privacy information. This paper attempts to explore the reasons why social network users give up privacy protection from the perspective of self-efficacy of privacy protection.[Method/process] By sorting out relevant literature on self-efficacy, privacy fatigue was introduced as an intermediary variable, the structural equation model was established, and data were obtained by questionnaire survey for analysis.[Result/conclusion] The self-efficacy of privacy protection of social network users cannot directly influence their privacy separation behavior, and it needs to exert an indirect influence through the privacy fatigue of complete mediating variable. Different sources of privacy protection have different effects on self-efficacy.

Cite this article

Xu Yiming , Li He , Yu Lu . Research on the Influence of Self-efficacy of Privacy Protection on Privacy Behaviors of Social Network Users[J]. Library and Information Service, 2019 , 63(17) : 128 -136 . DOI: 10.13266/j.issn.0252-3116.2019.17.015

References

[1] CHEN D, ZHAO H. Data security and privacy protection issues in cloud computing[C]//ICCSEE'12 proceedings of the 2012 international conference on computer science and electronics engineering. Washington, DC:IEEE Computer Society, 2012:647-651.
[2] PEARSON S. Taking account of privacy when designing cloud computing services[C]//Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing. Washington, DC:IEEE Computer Society, 2009:44-52.
[3] SMITH H J, DINEV T, XU H. Information privacy research:an interdisciplinary review[J]. MIS quarterly, 2011, 35(4):989-1016.
[4] Risk Based Security. Data breach quickview 2016[EB/OL].[2018-10-30] https://pages.riskbasedsecurity.com/2016-ye-breach-quickview.
[5] GIGYA. The 2017 state of consumer privacy and trust[EB/OL].[2018-10-30] http://www.199it.com/wp-content/uploads/2017/05/201704-Gigya-DS-Privacy_Survey_Report-web.pdf.
[6] 郭敏. 2018年凯度中国社交媒体影响报告[EB/OL].[2019-03-06] https://cn.kantar.com/媒体动态/社交/2018/2018年凯度中国社交媒体影响报告/.
[7] ANDERSON B B, VANCE A, KIRWAN C B, et al. From warning to wallpaper:why the brain habituates to security warnings and what can be done about it[J]. Journal of management information systems, 2016, 33(3):713-743.
[8] JUHEE K, ERIC J.The market effect of healthcare security:do patients care about data breaches?[EB/OL].[2018-10-30].https://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_kwon.pdf.
[9] KEITH M J, MAYNES C, LOWRY P B, et al. Privacy fatigue:the effect of privacy control complexity on consumer electronic information disclosure[C]//International Conference on Information Systems (ICIS 2014). Auckland:Social Science Electronic Publishing, 2014.
[10] SON J Y, KIM S S. Internet users' information privacy-protective responses:a taxonomy and a nomological model[J]. Mis quarterly, 2008, 32(3):503-529.
[11] CARVER C S, SCHEIER M F, WEINTRAUB J K. Assessing coping strategies:a theoretically based approach[J]. Journal of personality and social psychol, 1989, 56(2):267-283.
[12] KAHN W A. Psychological conditions of personal engagement and disengagement at work[J]. Academy of management journal, 1990, 33(4):692-724.
[13] CHOI H, PARK J, JUNG Y. The role of privacy fatigue in online privacy behavior[J]. Computers in human behavior, 2018, 81(4):42-51.
[14] BIEN D O, TORRES A M. Social networking and online privacy:Facebook users' perceptions[J]. Irish journal of management, 2012, 31(2):63-97.
[15] PEMPEK T A, YERMOLAYEVA Y A, Calvert S L. College students' social networking experiences on Facebook[J]. Journal of applied developmental psychology, 2009, 30(3):227-238.
[16] PREIBUSCH S, KROL K, BERESFORD A R. The privacy economics of voluntary over-disclosure in web forms[M]//RAINER B. The economics of information security and privacy. Berlin:Springer, 2013.
[17] XU H, DINEV T, SMITH H J, et al. Information privacy concerns:linking individual perceptions with institutional privacy assurances[J]. Journal of the Association for Information Systems, 2011, 12(12):798-824.
[18] BANDURA A. Self-efficacy:toward a unifying theory of behavioral change[J]. Advances in behaviour research & therapy, 1977, 1(4):139-161.
[19] RIFON N J, LAROSE R, CHOI S M. Your privacy is sealed:effects of web privacy seals on trust and personal disclosures[J]. Journal of consumer affairs, 2005, 39(2):339-362.
[20] RHEE H S, KIM C, RYU Y U. Self-efficacy in information security:Its influence on end users' information security practice behavior[J]. Computers & Security, 2009, 28(8):816-826.
[21] LEE H H, HILL J T. Moderating effect of privacy self-efficacy on location-based mobile marketing[J]. International journal of mobile communications, 2013, 11(4):330-350.
[22] LAROSE R, RIFON N J. Promoting i-safety:effects of privacy warnings and privacy seals on risk assessment and online privacy behavior[J]. Journal of consumer affairs, 2007, 41(1):127-149.
[23] BANDURA A. Social foundations of thought and action:a social cognitive theory[M]. Englewood Cliffs:Prentice-Hall, 1986.
[24] SUNG H N, JEONG D Y, JEONG Y S, et al. The relationship among self-efficacy, social influence,performance expectancy, effort expectancy, and behavioral intention in mobile learning service[J]. International journal of u-and e-service, science and technology, 2015, 8(1):1-8.
[25] ZHU Y Q, CHEN L Y, CHEN H G, et al. How does Internet information seeking help academic performance? The moderating and mediating roles of academic self-efficacy[J]. Computers & education, 2011, 57(4):2476-2484.
[26] LANE J, LANE A M, KYPRIANOU A. Self-efficacy, self-esteem and their impact on academic performance[J]. Social behavior & personality an international journal, 2004, 32(3):247-256.
[27] YOUN S. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents[J]. Journal of consumer affairs, 2009, 43(3):389-418.
[28] ROTTER J B. Generalized expectancies for internal versus external control of reinforcement.[J]. Psychol monogr, 1965, 80(1):1-28.
[29] WEINER B. An attributional theory of achievement motivation and emotion[J]. Psychological review, 1985, 92(4):548.
[30] THATCHER J B, ZIMMER J C, GUNDLACH M J, et al. Internal and external dimensions of computer self-efficacy:an empirical examination[J]. IEEE transactions on engineering management, 2008, 55(4):628-644.
[31] ZIMMERMAN B. Self-efficacy and educational development[M]//BANDURA A.Self-efficacy in changing societies. New York:Cambridge University Press, 1995:202-231.
[32] MARAKAS G M, JOHNSON R D, PALMER J W. A theoretical model of differential social attributions toward computing technology:when the metaphor becomes the model[J]. International journal of human-computer studies, 2000, 52(4):719-750.
[33] VOHS K D,BAUMEISTER R F,SCHMEICHEL B J, et al. Making choices impairs subsequent self-control:a limited-resource account of decision making, self-regulation, and active initiative[J]. Journal of personality and social psychology, 2008, 94(5):883-898.
[34] ACQUISTI A, TELANG R, FRIEDMAN A. Is there a cost to privacy breaches? An event study[C]//Twenty Seventh International Conference on Information Systems. Milwaukee:WI, 2006:1563-1580.
[35] LEVAV J, HEITMANN M, HERRMANN A, et al. Order in product customization decisions:evidence from field experiments[J]. Journal of political economy, 2010, 118(2):274-299.
[36] SCHERMER B W,CUSTERS B, SIMONE V D H. The crisis of consent:how stronger legal protection may lead to weaker consent in data protection[J]. Ethics and information technology, 2014, 16(2):171-182.
[37] 朱侯,张明鑫,路永和.社交媒体用户隐私政策阅读意愿实证研究[J].情报学报,2018,37(4):362-371.
[38] AX S, GREGG V H, JONES D.Coping and illness cognitions:chronic fatigue syndrome[J]. Clinical psychology review, 2001, 21(2):161-182.
[39] HOPSTAKEN J F,LINDEN D V D, BAKKER A B, et al. A multifaceted investigation of the link between mental fatigue and task disengagement[J]. Psychophysiology, 2015, 52(3):305-315.
[40] DEMEROUTI E, MOSTERT K, BAKKER A B. Burnout and work engagement:a thorough investigation of the independency of both constructs[J]. Journal of occupational health psychology, 2010, 15(3):209-222.
[41] BAKKER A, DEMEROUTI E, VERBEKE W. Using the job demands-resources model to predict burnout and performance[J]. Human resource management, 2004, 43(1):83-104.
[42] IGBARIA M, ⅡVARI J. The effects of self-efficacy on computer usage[J]. Omega, 1995, 23(6):587-605.
[43] COMPEAU D, HIGGINS C A, HUFF S. Social cognitive theory and individual reactions to computing technology:a longitudinal study[J]. MIS quarterly, 1999, 23(2):145-158.
[44] 陈昊,李文立.基于情绪中介的信息安全保护行为研究[J].科研管理,2018,39(6):48-56.
[45] MORIN L, LATHAM G. The effect of mental practice and goal setting as a transfer of training intervention on supervisors' self-efficacy and communication skills:an exploratory study[J]. Applied psychology, 2000, 49(49):566-578.
[46] SCHAEFERS K G, EPPERSON D L, NAUTA M M. Women's career development:can theoretically derived variables predict persistence in engineering majors?[J]. Journal of counseling psychology, 1997, 44(2):173-183.
[47] BANDURA A, WOOD R. Effect of perceived controllability and performance standards on self-regulation of complex decision making[J]. Journal of personality & social psychology, 1989, 56(5):805-814.
[48] JOHANSSON A C, BRINK E, CLIFFORDSON C, et al. The function of fatigue and illness perceptions as mediators between self-efficacy and health-related quality of life during the first year after surgery in persons treated for colorectal cancer[J]. Journal of clinical nursing, 2018,27(7):1537-1548.
[49] ZUCKERMAN M. Attribution of success and failure revisited:or the motivational bias is alive and well in attribution theory[J]. Journal of personality, 1979, 47(2):245-287.
[50] BANDURA A. Self-efficacy:the exercise of control[J]. Journal of cognitive psychotherapy, 1997, 13(2):158-166.
[51] CHO H, LEE J S, CHUNG S. Optimistic bias about online privacy risks:testing the moderating effects of perceived controllability and prior experience[J]. Computers in human behavior, 2010, 26(5):987-995.
[52] BAEK Y M, KIM E M, BAE Y. My privacy is okay, but theirs is endangered:why comparative optimism matters in online privacy concerns[J]. Computers in human behavior, 2014, 31(31):48-56.
[53] JR N K, DICKSON P R. How believing in ourselves increases risk taking:perceived self-efficacy and opportunity recognition[J]. Decision sciences, 1994, 25(3):385-400.
[54] MILNE G R, LABRECQUE L I, CROMER C. Toward an understanding of the online consumer's risky behavior and protection practices[J]. Journal of consumer affairs, 2009, 43(3):449-473.
[55] BARTH S, DE JONG M. The privacy paradox-investigating discrepancies between expressed privacy concerns and actual online behavior-a systematic literature review[J]. Telematics and informatics, 2017,34(7):1038-1058.
[56] KOKOLAKIS S. Privacy attitudes and privacy behaviour:a review of current research on the privacy paradox phenomenon[J]. Computers & security, 2017, 64(1):122-134.
[57] WarpPLS 5.0 User Manual[EB/OL].[2018-11-23]. http://cits.tamiu.edu/WarpPLS/UserManual_v_5_0.pdf.
[58] BARON R M, KENNY D A. The moderator-mediator variable distinction in social psychological research:conceptual, strategic, and statistical considerations[J]. Journal of personality and social psychology, 1986, 51(6):1173-1182.
[59] 李贺, 余璐, 许一明,等. 解释水平理论视角下的社交网络隐私悖论研究[J]. 情报学报, 2018, 37(1):1-13.
[60] STANTON B, THEOFANOS M F, PRETTYMAN S S, et al. Security fatigue[J]. IT professional, 2016, 18(5):26-32.
[61] MORRISON E W. Newcomer information seeking:exploring types, modes, sources, and outcome[J]. Academy of management journal, 1993, 36(3):557-589.
[62] 谢兴政,蔡念中,黄志铭,等.社交媒体用户隐私悖论行为影响因素初探[J].图书情报工作,2018,62(18):55-63.
[63] DINEV T, HART P. An extended privacy calculus model for e-commerce transactions[J]. Information systems research, 2006, 17(1):61-80.
[64] 李睿,张锐剑,李文立,等.移动互联网环境下的隐私泄露容忍度测度方法[J].管理评论,2016,28(7):102-111.
[65] ZHANG S, ZHAO L, LU Y, et al. Do you get tired of socializing? An empirical explanation of discontinuous usage behaviour in social network services[J]. Information & management, 2016:53(7):904-914.
[66] 曾伏娥,邹周,陶然.个性化营销一定会引发隐私担忧吗:基于拟人化沟通的视角[J].南开管理评论,2018,21(5):83-92.
[67] 沈洪洲,汤雪婷,周莹.我国移动社会化媒体隐私保护功能的可用性研究[J].图书情报工作,2017,61(4):23-30.
[68] SPOKANE A R, MEIR E I, CATALANO M. Person-Environment congruence and Holland's theory:a review and reconsideration[J]. Journal of vocational behavior, 2000, 57(2):137-187.
[69] WEINER B. Human motivation[M]. New York:Springer, 1985.
[70] CHEN I S. Computer self-efficacy, learning performance, and the mediating role of learning engagement[J]. Computers in human behavior, 2017, 72(7):362-370.
Outlines

/