DOI QR코드

DOI QR Code

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi (School of Business Administration, Ulsan National Institute of Science and Technology) ;
  • Yoonhyuk Jung (School of Media and Communication, Korea University)
  • 투고 : 2020.02.14
  • 심사 : 2020.04.28
  • 발행 : 2020.09.30

초록

As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.

키워드

과제정보

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2018S1A5A2A01039335)

참고문헌

  1. Abraham, R. (2000). Organizational cynicism: Bases and consequences. Genetic, Social, and General Psychology Monographs, 126(3), 269-292. 
  2. Anderson, C. L., and Agarwal, R. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469-490. 
  3. Anderson, J. C., and Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423. 
  4. Andersson, L. M. (1996). Employee cynicism: An examination using a contract violation framework. Human Relations, 49(11), 1395-1418. 
  5. Ansari, S., and Gupta, S. (2018). To reveal or conceal? Understanding the notion of privacy among individuals. Asia Pacific Journal of Information Systems, 28(4), 258-273. 
  6. Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150. 
  7. Bateman, T. S., Sakano, T., and Fujita, M. (1992). Roger, me, and my attitude: Film propaganda and cynicism toward corporate leadership. Journal of Applied Psychology, 77(5), 768-771. 
  8. Belanger, F., and Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1042. 
  9. Bhavnani, K. K. (1991). Talking politics: A psychological framing of views from youth in Britain. Cambridge: Cambridge University Press. 
  10. Byrne, B. M. (2010). Structural equation modeling with AMOS. Basic concepts, applications, and programming. New York: Routledge. 
  11. Chen, H. T., and Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13-19. 
  12. Chiaburu, D. S., Peng, A. C., Oh, I. S., Banks, G. C., and Lomeli, L. C. (2013). Antecedents and consequences of employee organizational cynicism: A meta-analysis. Journal of Vocational Behavior, 83(2), 181-197. 
  13. Choi, H., Park, J., and Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51. 
  14. Chylinski, M., and Chu, A. (2010). Consumer cynicism: Antecedents and consequences. European Journal of Marketing, 44(6), 796-837. 
  15. Clarke, R. (2014). Persona missing, feared drowned: The digital persona concept, two decades later. Information Technology & People, 27(2), 182-207. 
  16. Cohen, J., Cohen, P., West, S. G., and Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioral sciences (3rd ed.). Mahwah: Lawrence Erlbaum & Associates. 
  17. Computerweekly (2016). 412 million user accounts exposed in friendfinder networks hack. Retrieved from http://www.computerweekly.com/news/450402859/412-million-user-accounts-exposed-in-FriendFinder-Networks-hack 
  18. Culnan, M. J., and Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115. 
  19. Dean Jr, J. W., Brandes, P., and Dharwadkar, R. (1998). Organizational cynicism. Academy of Management Review, 23(2), 341-352. 
  20. Dinev, T., and Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422. 
  21. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. 
  22. Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. 
  23. Garbarino, E., and Johnson, M. S. (2001). Effects of consumer goals on attribute weighting, overall satisfaction, and product usage. Psychology & Marketing, 18(9), 929-949. 
  24. Goodhue, D., Lewis, W., and Thompson, R. (2007). Research note-Statistical power in analyzing interaction effects: Questioning the advantage of PLS with product indicators. Information Systems Research, 18(2), 211-227. 
  25. Haans, R. F., Pieters, C., and He, Z. L. (2016). Thinking about U: Theorizing and testing U and inverted U shaped relationships in strategy research. Strategic Management Journal, 37(7), 1177-1195. 
  26. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs: Printice Hall. 
  27. Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227. 
  28. Hanisch, K. A., and Hulin, C. L. (1991). General attitudes and organizational withdrawal: An evaluation of a causal model. Journal of Vocational Behavior, 39(1), 110-128. 
  29. Hanson, G., Haridakis, P. M., Cunningham, A. W., Sharma, R., and Ponder, J. D. (2010). The 2008 presidential campaign: Political cynicism in the age of Facebook, MySpace, and YouTube. Mass Communication and Society, 13(5), 584-607. 
  30. Hargittai, E., and Marwick, A. (2016). "What can I really do?" Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737-3757. 
  31. Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago press. 
  32. Hoffmann, C. P., Lutz, C., and Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), 7. 
  33. Hooper, D., Coughlan, J., and Mullen, M. (2008). Structural equation modelling: Guidelines for determining model fit. Electronic Journal of Business Research Methods, 4(1), 53-60. 
  34. Hu, L. T., and Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55. 
  35. James, M. S. (2005). Antecedents and consequences of cynicism in organizations: An examination of the potential positive and negative effects on school systems. The Florida State University. 
  36. Jiang, Z., Heng, C. S., and Choi, B. C. (2013). Research note-Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. 
  37. Johnson, J. L., and O'Leary-Kelly, A. M. (2003). The effects of psychological contract breach and organizational cynicism: Not all social exchange violations are created equal. Journal of Organizational Behavior, 24(5), 627-647. 
  38. Jung, W. J., and Lee, S. Y. T. (2015). What affects the value of information privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305. 
  39. Kang, H., Shin, W., and Tam, L. (2016). Differential responses of loyal versus habitual consumers towards mobile site personalization on privacy management. Computers in Human Behavior, 56, 281-288. 
  40. Kanter, D. L., and Mirvis, P. H. (1989). The cynical Americans: Living and working in an age of discontent and disillusion. San Francisco: Jossey-Bass. 
  41. Krathwohl, D. R. (2009). Methods of educational and social science research: The logic of methods. Long Grove: Waveland Press. 
  42. Lee, R. T., and Ashforth, B. E. (1993). A longitudinal study of burnout among supervisors and managers: Comparisons between the Leiter and Maslach (1988) and Golembiewski et al. (1986) models. Organizational Behavior and Human Decision Processes, 54(3), 369-398. 
  43. Li, H., Luo, X. R., Zhang, J., and Xu, H. (2017). Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Information & Management, 54(8), 1012-1022. 
  44. Li, H., Sarathy, R., and Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71. 
  45. Lin, G. C., Wen, Z., Marsh, H. W., and Lin, H. S. (2010). Structural equation models of latent interactions: Clarification of orthogonalizing and double-mean-centering strategies. Structural Equation Modeling, 17(3), 374-391. 
  46. Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. ACM SIGCOMM Conference on Internet Measurement Conference (ACM) Proceedings, 61-70. 
  47. Liu, Z., Wang, X., and Liu, J. (2019). How digital natives make their self-disclosure decisions: A cross-cultural comparison. Information Technology & People, 32(3), 538-558. 
  48. Lwin, M., Wirtz, J., and Williams, J. D. (2007). Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585. 
  49. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. 
  50. Marsh, H. W., Wen, Z., Hau, K., and Nagengast, B. (2013). Structural equation models of latent interaction and quadratic effects. In G. R. Hancock and R. O. Mueller (eds.), A second course in structural equation modeling (pp. 267-308). Greenwich: Information Age. 
  51. Maslach, C., Schaufeli, W. B., and Leiter, M. P. (2001). Job burnout. Annual Review of Psychology, 52(1), 397-422. 
  52. Morin, A. J., Vandenberghe, C., Turmel, M. J., Madore, I., and Maiano, C. (2013). Probing into commitment's nonlinear relationships to work outcomes. Journal of Managerial Psychology, 28(2), 202-223. 
  53. Naus, F., Van Iterson, A., and Roe, R. (2007). Organizational cynicism: Extending the exit, voice, loyalty, and neglect model of employees' responses to adverse conditions in the workplace. Human Relations, 60(5), 683-718. 
  54. Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. 
  55. Nunnany, J. (1978). Psychometric theory. New York: McGraw Hill. 
  56. Peterman, M. L. (1997). The effects of concrete and abstract consumer goals on information processing. Psychology & Marketing, 14(6), 561-583. 
  57. Ping Jr, R. A. (1995). A parsimonious estimating technique for interaction and quadratic latent variables. Journal of Marketing Research, 32(3), 336-347. 
  58. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903. 
  59. Reichers, A. E., Wanous, J. P., and Austin, J. T. (1997). Understanding and managing cynicism about organizational change. Academy of Management Perspectives, 11(1), 48-59. 
  60. Rubino, C., Luksyte, A., Perry, S. J., and Volpone, S. D. (2009). How do stressors lead to burnout? The mediating role of motivation. Journal of Occupational Health Psychology, 14(3), 289-304. 
  61. Schaufeli, W. B., Leiter, M. P., Maslach, C., and Jackson, S. E. (1996). The Maslach burnout inventory-general survey. In C. Maslach, S. E. Jackson and M. P. Leiter (eds.), MBI manual (pp. 191-218). Palo Alto: Consulting Psychologists Press. 
  62. Schaufeli, W. B., and Taris, T. W. (2005). The conceptualization and measurement of burnout: Common ground and worlds apart. Work & Stress, 19(3), 256-262. 
  63. Sharma, S., and Crossler, R. E. (2014). Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electronic Commerce Research and Applications, 13(5), 305-319. 
  64. Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1016. 
  65. Son, J. Y., and Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529. 
  66. Stivers, R. (1994). The culture of cynicism: American morality in decline. Cambridge: Blackwell Publishers. 
  67. Taddicken, M. (2014). The 'privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self disclosure. Journal of Computer Mediated Communication, 19(2), 248-273. 
  68. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444. 
  69. Verizon (2018). 2018 data breach investigations report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir 
  70. Wanous, J. P., Reichers, A. E., and Austin, J. T. (1994). Organizational cynicism: An initial study. Academy of Management Best Papers Proceedings, 269-273. 
  71. Wanous, J. P., Reichers, A. E., and Austin, J. T. (2000). Cynicism about organizational change: Measurement, antecedents, and correlates. Group & Organization Management, 25(2), 132-153. 
  72. Westin, A. F. (1967). Privacy and freedom. New York: Atheneum. 
  73. Xie, E., Teo, H. H., and Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61-74. 
  74. Xu, H., Luo, X. R., Carroll, J. M., and Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52. 
  75. Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174. 
  76. Yoo, C. W., Ahn, H. J., and Rao, H. R. (2012). An exploration of the impact of information privacy invasion. International Conference on Information Systems (ICIS) Proceedings, 1-18.