DOI QR코드

DOI QR Code

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi (School of Business Administration, Ulsan National Institute of Science and Technology) ;
  • Yoonhyuk Jung (School of Media and Communication, Korea University)
  • Received : 2020.02.14
  • Accepted : 2020.04.28
  • Published : 2020.09.30

Abstract

As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.

Keywords

Acknowledgement

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2018S1A5A2A01039335)

References

  1. Abraham, R. (2000). Organizational cynicism: Bases and consequences. Genetic, Social, and General Psychology Monographs, 126(3), 269-292. 
  2. Anderson, C. L., and Agarwal, R. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469-490.  https://doi.org/10.1287/isre.1100.0335
  3. Anderson, J. C., and Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423.  https://doi.org/10.1037/0033-2909.103.3.411
  4. Andersson, L. M. (1996). Employee cynicism: An examination using a contract violation framework. Human Relations, 49(11), 1395-1418.  https://doi.org/10.1177/001872679604901102
  5. Ansari, S., and Gupta, S. (2018). To reveal or conceal? Understanding the notion of privacy among individuals. Asia Pacific Journal of Information Systems, 28(4), 258-273.  https://doi.org/10.14329/apjis.2018.28.4.258
  6. Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.  https://doi.org/10.1016/j.dss.2010.01.010
  7. Bateman, T. S., Sakano, T., and Fujita, M. (1992). Roger, me, and my attitude: Film propaganda and cynicism toward corporate leadership. Journal of Applied Psychology, 77(5), 768-771.  https://doi.org/10.1037/0021-9010.77.5.768
  8. Belanger, F., and Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1042.  https://doi.org/10.2307/41409971
  9. Bhavnani, K. K. (1991). Talking politics: A psychological framing of views from youth in Britain. Cambridge: Cambridge University Press. 
  10. Byrne, B. M. (2010). Structural equation modeling with AMOS. Basic concepts, applications, and programming. New York: Routledge. 
  11. Chen, H. T., and Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13-19.  https://doi.org/10.1089/cyber.2014.0456
  12. Chiaburu, D. S., Peng, A. C., Oh, I. S., Banks, G. C., and Lomeli, L. C. (2013). Antecedents and consequences of employee organizational cynicism: A meta-analysis. Journal of Vocational Behavior, 83(2), 181-197.  https://doi.org/10.1016/j.jvb.2013.03.007
  13. Choi, H., Park, J., and Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42-51.  https://doi.org/10.1016/j.chb.2017.12.001
  14. Chylinski, M., and Chu, A. (2010). Consumer cynicism: Antecedents and consequences. European Journal of Marketing, 44(6), 796-837.  https://doi.org/10.1108/03090561011032720
  15. Clarke, R. (2014). Persona missing, feared drowned: The digital persona concept, two decades later. Information Technology & People, 27(2), 182-207.  https://doi.org/10.1108/ITP-04-2013-0073
  16. Cohen, J., Cohen, P., West, S. G., and Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioral sciences (3rd ed.). Mahwah: Lawrence Erlbaum & Associates. 
  17. Computerweekly (2016). 412 million user accounts exposed in friendfinder networks hack. Retrieved from http://www.computerweekly.com/news/450402859/412-million-user-accounts-exposed-in-FriendFinder-Networks-hack 
  18. Culnan, M. J., and Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.  https://doi.org/10.1287/orsc.10.1.104
  19. Dean Jr, J. W., Brandes, P., and Dharwadkar, R. (1998). Organizational cynicism. Academy of Management Review, 23(2), 341-352.  https://doi.org/10.2307/259378
  20. Dinev, T., and Hart, P. (2004). Internet privacy concerns and their antecedents-measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413-422.  https://doi.org/10.1080/01449290410001715723
  21. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.  https://doi.org/10.1287/isre.1060.0080
  22. Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.  https://doi.org/10.1177/002224378101800104
  23. Garbarino, E., and Johnson, M. S. (2001). Effects of consumer goals on attribute weighting, overall satisfaction, and product usage. Psychology & Marketing, 18(9), 929-949.  https://doi.org/10.1002/mar.1036
  24. Goodhue, D., Lewis, W., and Thompson, R. (2007). Research note-Statistical power in analyzing interaction effects: Questioning the advantage of PLS with product indicators. Information Systems Research, 18(2), 211-227.  https://doi.org/10.1287/isre.1070.0123
  25. Haans, R. F., Pieters, C., and He, Z. L. (2016). Thinking about U: Theorizing and testing U and inverted U shaped relationships in strategy research. Strategic Management Journal, 37(7), 1177-1195.  https://doi.org/10.1002/smj.2399
  26. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs: Printice Hall. 
  27. Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227.  https://doi.org/10.1016/j.chb.2016.11.033
  28. Hanisch, K. A., and Hulin, C. L. (1991). General attitudes and organizational withdrawal: An evaluation of a causal model. Journal of Vocational Behavior, 39(1), 110-128.  https://doi.org/10.1016/0001-8791(91)90006-8
  29. Hanson, G., Haridakis, P. M., Cunningham, A. W., Sharma, R., and Ponder, J. D. (2010). The 2008 presidential campaign: Political cynicism in the age of Facebook, MySpace, and YouTube. Mass Communication and Society, 13(5), 584-607.  https://doi.org/10.1080/15205436.2010.513470
  30. Hargittai, E., and Marwick, A. (2016). "What can I really do?" Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737-3757. 
  31. Harman, H. H. (1976). Modern factor analysis. Chicago: University of Chicago press. 
  32. Hoffmann, C. P., Lutz, C., and Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), 7. 
  33. Hooper, D., Coughlan, J., and Mullen, M. (2008). Structural equation modelling: Guidelines for determining model fit. Electronic Journal of Business Research Methods, 4(1), 53-60. 
  34. Hu, L. T., and Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55.  https://doi.org/10.1080/10705519909540118
  35. James, M. S. (2005). Antecedents and consequences of cynicism in organizations: An examination of the potential positive and negative effects on school systems. The Florida State University. 
  36. Jiang, Z., Heng, C. S., and Choi, B. C. (2013). Research note-Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595.  https://doi.org/10.1287/isre.1120.0441
  37. Johnson, J. L., and O'Leary-Kelly, A. M. (2003). The effects of psychological contract breach and organizational cynicism: Not all social exchange violations are created equal. Journal of Organizational Behavior, 24(5), 627-647.  https://doi.org/10.1002/job.207
  38. Jung, W. J., and Lee, S. Y. T. (2015). What affects the value of information privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305.  https://doi.org/10.14329/apjis.2015.25.2.289
  39. Kang, H., Shin, W., and Tam, L. (2016). Differential responses of loyal versus habitual consumers towards mobile site personalization on privacy management. Computers in Human Behavior, 56, 281-288.  https://doi.org/10.1016/j.chb.2015.11.013
  40. Kanter, D. L., and Mirvis, P. H. (1989). The cynical Americans: Living and working in an age of discontent and disillusion. San Francisco: Jossey-Bass. 
  41. Krathwohl, D. R. (2009). Methods of educational and social science research: The logic of methods. Long Grove: Waveland Press. 
  42. Lee, R. T., and Ashforth, B. E. (1993). A longitudinal study of burnout among supervisors and managers: Comparisons between the Leiter and Maslach (1988) and Golembiewski et al. (1986) models. Organizational Behavior and Human Decision Processes, 54(3), 369-398.  https://doi.org/10.1006/obhd.1993.1016
  43. Li, H., Luo, X. R., Zhang, J., and Xu, H. (2017). Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Information & Management, 54(8), 1012-1022.  https://doi.org/10.1016/j.im.2017.02.005
  44. Li, H., Sarathy, R., and Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71. 
  45. Lin, G. C., Wen, Z., Marsh, H. W., and Lin, H. S. (2010). Structural equation models of latent interactions: Clarification of orthogonalizing and double-mean-centering strategies. Structural Equation Modeling, 17(3), 374-391.  https://doi.org/10.1080/10705511.2010.488999
  46. Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. ACM SIGCOMM Conference on Internet Measurement Conference (ACM) Proceedings, 61-70. 
  47. Liu, Z., Wang, X., and Liu, J. (2019). How digital natives make their self-disclosure decisions: A cross-cultural comparison. Information Technology & People, 32(3), 538-558.  https://doi.org/10.1108/ITP-10-2017-0339
  48. Lwin, M., Wirtz, J., and Williams, J. D. (2007). Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572-585.  https://doi.org/10.1007/s11747-006-0003-3
  49. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.  https://doi.org/10.1287/isre.1040.0032
  50. Marsh, H. W., Wen, Z., Hau, K., and Nagengast, B. (2013). Structural equation models of latent interaction and quadratic effects. In G. R. Hancock and R. O. Mueller (eds.), A second course in structural equation modeling (pp. 267-308). Greenwich: Information Age. 
  51. Maslach, C., Schaufeli, W. B., and Leiter, M. P. (2001). Job burnout. Annual Review of Psychology, 52(1), 397-422.  https://doi.org/10.1146/annurev.psych.52.1.397
  52. Morin, A. J., Vandenberghe, C., Turmel, M. J., Madore, I., and Maiano, C. (2013). Probing into commitment's nonlinear relationships to work outcomes. Journal of Managerial Psychology, 28(2), 202-223.  https://doi.org/10.1108/02683941311300739
  53. Naus, F., Van Iterson, A., and Roe, R. (2007). Organizational cynicism: Extending the exit, voice, loyalty, and neglect model of employees' responses to adverse conditions in the workplace. Human Relations, 60(5), 683-718.  https://doi.org/10.1177/0018726707079198
  54. Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.  https://doi.org/10.1111/j.1745-6606.2006.00070.x
  55. Nunnany, J. (1978). Psychometric theory. New York: McGraw Hill. 
  56. Peterman, M. L. (1997). The effects of concrete and abstract consumer goals on information processing. Psychology & Marketing, 14(6), 561-583.  https://doi.org/10.1002/(SICI)1520-6793(199709)14:6<561::AID-MAR3>3.0.CO;2-5
  57. Ping Jr, R. A. (1995). A parsimonious estimating technique for interaction and quadratic latent variables. Journal of Marketing Research, 32(3), 336-347.  https://doi.org/10.1177/002224379503200308
  58. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.  https://doi.org/10.1037/0021-9010.88.5.879
  59. Reichers, A. E., Wanous, J. P., and Austin, J. T. (1997). Understanding and managing cynicism about organizational change. Academy of Management Perspectives, 11(1), 48-59.  https://doi.org/10.5465/ame.1997.9707100659
  60. Rubino, C., Luksyte, A., Perry, S. J., and Volpone, S. D. (2009). How do stressors lead to burnout? The mediating role of motivation. Journal of Occupational Health Psychology, 14(3), 289-304.  https://doi.org/10.1037/a0015284
  61. Schaufeli, W. B., Leiter, M. P., Maslach, C., and Jackson, S. E. (1996). The Maslach burnout inventory-general survey. In C. Maslach, S. E. Jackson and M. P. Leiter (eds.), MBI manual (pp. 191-218). Palo Alto: Consulting Psychologists Press. 
  62. Schaufeli, W. B., and Taris, T. W. (2005). The conceptualization and measurement of burnout: Common ground and worlds apart. Work & Stress, 19(3), 256-262.  https://doi.org/10.1080/02678370500385913
  63. Sharma, S., and Crossler, R. E. (2014). Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electronic Commerce Research and Applications, 13(5), 305-319.  https://doi.org/10.1016/j.elerap.2014.06.007
  64. Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1016.  https://doi.org/10.2307/41409970
  65. Son, J. Y., and Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529.  https://doi.org/10.2307/25148854
  66. Stivers, R. (1994). The culture of cynicism: American morality in decline. Cambridge: Blackwell Publishers. 
  67. Taddicken, M. (2014). The 'privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self disclosure. Journal of Computer Mediated Communication, 19(2), 248-273.  https://doi.org/10.1111/jcc4.12052
  68. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444.  https://doi.org/10.17705/1jais.00092
  69. Verizon (2018). 2018 data breach investigations report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir 
  70. Wanous, J. P., Reichers, A. E., and Austin, J. T. (1994). Organizational cynicism: An initial study. Academy of Management Best Papers Proceedings, 269-273. 
  71. Wanous, J. P., Reichers, A. E., and Austin, J. T. (2000). Cynicism about organizational change: Measurement, antecedents, and correlates. Group & Organization Management, 25(2), 132-153.  https://doi.org/10.1177/1059601100252003
  72. Westin, A. F. (1967). Privacy and freedom. New York: Atheneum. 
  73. Xie, E., Teo, H. H., and Wan, W. (2006). Volunteering personal information on the Internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61-74.  https://doi.org/10.1007/s11002-006-4147-1
  74. Xu, H., Luo, X. R., Carroll, J. M., and Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52.  https://doi.org/10.1016/j.dss.2010.11.017
  75. Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174.  https://doi.org/10.2753/MIS0742-1222260305
  76. Yoo, C. W., Ahn, H. J., and Rao, H. R. (2012). An exploration of the impact of information privacy invasion. International Conference on Information Systems (ICIS) Proceedings, 1-18.