Free Essay

Privacy

In:

Submitted By rachelroth22
Words 5399
Pages 22
Computers in Human Behavior 31 (2014) 48–56

Contents lists available at ScienceDirect

Computers in Human Behavior journal homepage: www.elsevier.com/locate/comphumbeh

My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns
Young Min Baek a,⇑, Eun-mee Kim b, Young Bae c a Department of Communication, Yonsei University, Republic of Korea Department of Communication, Seoul National University, Republic of Korea c Department of Information Sociology, Soongsil University, Republic of Korea b a r t i c l e

i n f o

a b s t r a c t
It is easy to trace and compile a record of individuals’ online activities, and cases of online privacy infringement (i.e., improper use of personal information) have been reported in advanced societies. Based on existing risk perception research, this study examines comparative optimism regarding online privacy infringement (i.e., users tend to believe privacy infringement is less likely to happen to oneself than to others) and its antecedents and consequences. Relying on large-scale online survey data in South Korea (N = 2028), this study finds: (1) comparative optimism is higher when the comparison targets are younger; (2) online knowledge and maternalistic personality traits increase comparative optimism mainly by influencing perceived risk to others, while prior experience of privacy infringement increases comparative optimism mainly by influencing perceived personal risk; and (3) comparative optimism is related to both greater adoption of privacy-protective behaviors and a higher level of support for government policies to restrict the use of online information. Theoretical and practical implications of the findings, along with potential limitations, are discussed. Ó 2013 Elsevier Ltd. All rights reserved.

Article history: Available online 29 October 2013 Keywords: Online privacy Privacy infringement Comparative optimism Privacy policy

1. Introduction Individuals’ online activities are easily traced, collected, and stored (Holtzman, 2006; Lessig, 2002; Solove, 2007). Internet use has become integrated into the daily lives of many people, whose online activities may be under ‘‘24/7’’ surveillance (Andrejevic, 2007; Farrell, 2012). While such large-scale data may serve to advance our knowledge of human psychology and behavior, these circumstances raise the likelihood that individuals’ online privacy, defined as controllability over personal information (Holtzman, 2006; Lessig, 2002), will be infringed (Solove, 2007). With Internet use proliferating, online privacy is becoming an important social issue (Solove, 2007, 2011), but most studies on online privacy, to the best of our knowledge, examine personal privacy concerns or privacy-protective behaviors at the individual level (Gross & Acquisti, 2005; Norberg, Horne, & Horne, 2007; Tufekci, 2008; Youn & Hall, 2008). This study suggests that research on online privacy risk should be expanded to include risk perception about other members of society. To the best of our knowledge, only one study (Cho, Lee,
⇑ Corresponding author. Address: Department of Communication, Yonsei University, 50 Yonsei-ro, Seodaemun, Seoul 120-749, Republic of Korea. Tel.: +82 2 2123 2970; fax: +82 2 2123 8660. E-mail address: ymbaek@gmail.com (Y.M. Baek).
0747-5632/$ - see front matter Ó 2013 Elsevier Ltd. All rights reserved. http://dx.doi.org/10.1016/j.chb.2013.10.010

& Chung, 2010) has attempted to survey users’ perceptions of others’ online privacy risks. According to the study, online users perceive their own privacy to be safer and less vulnerable to external intrusion than that of generalized others. In the risk perception literature, this phenomenon (i.e., the tendency for people to report that they are less likely than others to experience negative events) has been termed comparative optimism,1 and it has been confirmed in a wide variety of risk scenarios, including car accidents, crime, and cancer (Helweg-Larsen & Shepperd, 2001). We examine the interrelationships among comparative optimism considering both personal risk and risk to others, its antecedents, and its consequences. After the empirical results are presented, the last section discusses theoretical and practical implications.

1 The concept of comparative optimism may be referred to by different terms, such as unrealistic optimism or optimistic bias. This study prefers comparative optimism to optimistic bias or unrealistic optimism for two reasons (Helweg-Larsen & Shepperd, 2001). First, ‘bias’ or ‘unrealistic’ implies that people’s risk perceptions are at odds with some ‘objective risk’ level. However, online privacy risks are very difficult to measure using objective statistics. Second, ‘bias’ or ‘unrealistic’ further implies that some respondents’ personal risk estimates seem more biased or unrealistic while others’ seem less biased or more realistic. However, no theoretical justifications are possible for this idea without statistics of objective risk which are very hard to accurately estimate in our study of online privacy risk.

Y.M. Baek et al. / Computers in Human Behavior 31 (2014) 48–56

49

2. Online privacy risk estimate When explaining comparative optimism, most studies have emphasized risk denial, the idea that people disregard the probability of experiencing negative events (Arnett, 2000); ego protection, the idea that people desire to defend themselves against a negative self-image (Helweg-Larsen, Sadeghian, & Webb, 2002); or illusion of control, the idea that people are over-confident in their ability to control events (Weinstein, 1980). Prior studies, however, have focused solely on individuals’ internal psychological processes. In other words, the main focus of comparative optimism research has been the role of ‘me,’ rather than ‘others.’ Concern about others’ risk is also important, however, because it reflects people’s concern for the socially vulnerable, who need social or legal protection (Rojas, Shah, & Faber, 1996; Schmierbach, Boyle, Xu, & McLeod, 2011). As comparative optimism arises through comparing one’s own risk with that of others, it results from two different risk estimates, i.e., personal and target risk estimates (Helweg-Larsen & Shepperd, 2001), and it reflects societal risk as well as personal risk (Tyler & Cook, 1984). This study focuses on two issues which have not been addressed in the literature on comparative optimism regarding online privacy. First, online privacy has been emerging as a social issue, so that it is now perceived as ‘our’ problem rather than ‘my’ problem (Lessig, 2006; Solove, 2007, 2011). In other words, people who express serious concerns about online privacy may be driven partly by a desire to protect their own privacy and partly by the belief that society should provide legal protection for the socially vulnerable (Milberg, Smith, & Burke, 2000). Thus, comparative optimism regarding online privacy risk must have a dual characteristic, derived from concern about both personal risk and risk to others. This study examines how both aspects of comparative optimism relate to individual differences (online knowledge, personality, and prior experience with privacy infringement). Second, this study examines the effect of comparative optimism on people’s online privacy-protective behaviors and on their support for government regulatory policies to restrict the use of personal information on the Internet. Most studies on comparative optimism in the risk perception literature have investigated its effects on risky behaviors at the individual level (examining, for example, whether people with a high level of comparative optimism are more likely to engage in risky behaviors). This approach stems from the assumption that comparative optimism is more a result of underestimated personal risk than of overestimated target risk. Comparative optimism, however, can result from concern about target risk (i.e., overestimated target risk rather than underestimated personal risk). Perceived target risk, as opposed to perceived personal risk, will be more influential in determining people’s support for a preventive policy when a socially vulnerable group is expected to experience a negative event (Rojas et al., 1996). With online privacy policies emerging as one of the central issues in advanced societies, the perceived risk of others experiencing privacy infringement is important to consider when examining people’s motivations for supporting online privacy regulations (Milberg et al., 2000). To investigate these two issues, we rely on large-scale national survey data from 2012, focusing on three areas: (1) comparative optimism, calculated by subtracting perceived personal risk from perceived risk to comparison targets, who are classified according to five age groups; (2) antecedent factors influencing comparative optimism, including online knowledge, personality, and prior experience with privacy infringement; and (3) consequences of comparative optimism, including adoption of privacy-protective behaviors and support for government regulatory policies to restrict the use of personal information on the Internet.

2.1. Comparative optimism and typicality of comparison group Offline privacy has been a ‘‘latently ambiguous’’ concept (Lessig, 2006) even among judges and legal scholars, and online privacy is also notorious for its lack of clear definitions (Solove, 2007). In this regard, Internet law scholars have approached online privacy contextually (Nissenbaum, 2010; Solove, 2007) or metaphorically (Lessig, 2006). Despite the murkiness of the concept, online privacy is widely understood and accepted as an issue of control over personal information (Holtzman, 2006; Lessig, 2002) because the Internet can be understood as a database of digital information (Berners-Lee, 1999; boyd & Ellison, 2007). Consistent with this notion, Lessig (2002) suggested that online privacy can also be understood in terms of copyright (i.e., intellectual property rights over personal information). In our study, online privacy is understood to mean control over personal information, and online privacy risk perception refers to the perceived danger of a user’s personal information being used improperly without his or her consent. Most studies on online privacy have focused on the so-called privacy paradox (Norberg et al., 2007), whereby users show substantial concern about misuse of personal information but tend not to engage in privacy-protective behaviors (e.g., selecting protection-oriented privacy settings or erasing cookies) or even engage in risky behaviors (e.g., visiting suspicious sites or revealing critical personal information) (Gross & Acquisti, 2005; Norberg et al., 2007). In short, the attitudes and actual behaviors of online users generally are inconsistent and in some contexts are even contradictory. To solve the privacy paradox, recent studies have focused on the lack of online skills, knowledge, or abilities among users (Debatin, Lovejoy, Horn, & Hughes, 2009; Park, 2013), which these studies term cognitive deficiency theory. Basically, cognitive deficiency theory argues that users are sincerely concerned about online privacy infringement but lack specific knowledge about how to protect their privacy (Debatin et al., 2009; Park, 2013). While cognitive deficiency theory is an effective and promising explanation of why users engage in risky online behaviors at the individual level, it is limited in its ability to explain why online privacy has emerged as a ‘social’ problem that many citizens want to address through legal protection (Solove, 2011). In fact, people fear that private companies will practice surveillance in the near future (Andrejevic, 2007) and are concerned that socially vulnerable groups, especially young online users, will be more likely to fall victim to privacy infringement (Livingstone, 2009). For example, some observers warn that young SNS users’ careless comments might hurt their future career prospects, as employers may examine applicants’ past online behaviors (Rosen, 2010). Cases like that of Kimberly Swan (Case, 2009), a young worker who was fired because she posted job-related complaints on Facebook, are alarming, though rare. For the above reasons, concerns about online privacy should be investigated at the societal level, not just the personal level, and the privacy paradox literature should distinguish personal privacy risk from risk to others. To the best of our knowledge, only one study (Cho et al., 2010) has compared these two sources (i.e., personal versus others) of privacy risk estimates. Consistent with the comparative optimism literature related to other risks (e.g., cancer or car accidents), Cho et al. (2010) reported that users, in general, believe that their own privacy is well-protected but that other users’ online privacy is vulnerable to external intrusion. Despite their theoretical achievements, Cho et al. (2010) defined others as ‘generalized others’ and thus did not attempt to differentiate the comparison targets. The literature suggests that the level of comparative optimism is related to the typicality of comparison targets (Helweg-Larsen & Shepperd, 2001; Perloff, 2009). For example, if the comparison targets are known to be very vulnerable to a particular risk (e.g., females as victims of crime), comparative

50

Y.M. Baek et al. / Computers in Human Behavior 31 (2014) 48–56

optimism is heightened among the less socially vulnerable. In the context of online privacy risk, young users are usually discussed as strong candidates to fall victim to privacy infringement, while older users are less concerned partly because they are not as active online and partly because their remaining days are shorter. Hence: H1: People, in general, perceive the likelihood of personal online privacy infringement to be lower than that for comparison targets. H2: The comparative optimism found in H1 is more pronounced when the comparison target is younger.

et al., 1996; Schmierbach et al., 2011). In other words, people whose personalities are strongly oriented towards protecting the socially vulnerable from external danger (i.e., maternalistic personality) (McLeod, Detenber, & Eveland, 2001; Silver & Weiss, 1992) will be more sensitive to others’ vulnerabilities, and this will lead them to overestimate others’ risk (i.e., target-oriented comparative optimism). In contrast, people who emphasize independence or self-confidence (i.e., paternalistic personality) show comparative optimism because they underestimate personal risk (i.e., person-oriented comparative optimism). Thus, it is expected: H4a: Having a maternalistic personality will be positively correlated with comparative optimism mainly due to the overestimation of target risk. H4b: Having a paternalistic personality will be positively correlated with comparative optimism mainly due to the underestimation of personal risk. Finally, prior experience with a certain risk has been shown to be a strong predictor for reduced comparative optimism (Cho et al., 2010; Helweg-Larsen & Shepperd, 2001). People who already experienced a negative event tend to believe that they lack controllability over the risk, and their risk perception, in turn, becomes more realistic or pessimistic. If a person experiences privacy infringement online and/or offline, he or she will perceive the online space as more threatening. Thus, this study expects personoriented comparative optimism: H5: Prior experience with privacy infringement will be negatively correlated with comparative optimism, mainly due to the underestimation of personal risk. 2.3. Consequences of comparative optimism Comparative optimism is important because of its behavioral implications. This study examines two consequences of comparative optimism: (1) privacy-protective behaviors and (2) support for government regulatory policy to restrict the use of personal information on the Internet. The literature on comparative optimism has demonstrated that comparatively optimistic people are more likely to engage in risky behaviors because they feel safe; they believe that negative events will not occur in their future (for a discussion of comparative optimism among smokers, see Arnett, 2000). However, there have been no studies to test the effect of comparative optimism regarding online privacy infringement on privacy-protective behaviors; even Cho et al. (2010), who examined comparative optimism among online users, did not address this issue. To fill this gap in the literature, we formulated the following hypothesis based on previous research into the effect of comparative optimism on individuals’ risky behaviors: H6: Comparative optimism regarding online privacy infringement will be negatively related to the adoption of privacyprotective behaviors. With online privacy becoming a controversial issue in society, ordinary users as well as advocacy groups argue that government or legal protection should be provided for teenagers or adolescents, who are perceived as the group most vulnerable to privacy infringement. If it is admitted that comparative optimism may result from societal risk perception (i.e., target-oriented comparative optimism), we expect that it will result in support for protectionoriented social policies. Formally put:

2.2. Antecedents of comparative optimism In the literature on comparative optimism and privacy risk perception, there has accumulated a list of antecedents of (comparative) risk estimates that can be grouped into three categories: (1) cognition, (2) personality, and (3) prior experience with the relevant risk. Because comparative optimism denotes the difference between personal and target risk (calculated as ‘perceived target risk – perceived personal risk’), its cause is expected to involve antecedents that either decrease perceived personal risk or increase perceived target risk. Our study termed the former as person-oriented comparative optimism and the latter as target-oriented comparative optimism.2 First, cognitive factors refer to a person’s stored knowledge about a certain topic—in this case, Internet use. Prior studies reported that people with sufficient knowledge about a topic showed higher levels of comparative optimism (Helweg-Larsen & Shepperd, 2001). Internet users with highly developed online skills or knowledge are more likely to know how to protect their personal information, such as erasing cookies (i.e., traces of online usage) or changing the default settings on SNS or browsers to be more protective (Debatin et al., 2009; Park, 2013). Consistent with the reasoning in prior studies, knowledgeable users may underestimate their own risk (i.e., person-oriented comparative optimism). At the societal level, however, knowledgeable users may also be expected to overestimate others’ vulnerabilities to online privacy infringement, assuming that others are relatively less knowledgeable about how to protect their privacy (i.e., target-oriented comparative optimism). Therefore: H3: Online knowledge will be positively correlated with comparative optimism by decreasing the estimate of personal risk and/or increasing the estimate of target risk. Second, this study defines personality as a person’s stable orientation towards others. While cognitive factors relate to domainspecific knowledge or beliefs, personality factors involve people’s generalized orientation towards other members of society. Given that most social discourse about online privacy focuses on teenagers and/or adolescents, online privacy is understood as an issue that concerns the protection of socially vulnerable groups (Rojas
2 To capture the difference between person-oriented and target-oriented comparative optimism, it might be helpful to consider an example. Let us imagine two people, John and Jack, who have the same estimates for perceived personal risk and target risk (‘3’ for each risk). First, assume that John’s perception of his own risk becomes weaker (‘1’), but his perceived target risk (‘3’) is maintained, resulting in a comparative score of ‘À2.’ Second, assume that Jack’s perception of his own risk is maintained (‘3’), but his perceived target risk increases (‘5’), in which case his comparative optimism is calculated as ‘À2.’ As shown in these two imaginary cases, the same comparative optimism score can be distinguished: John’s comparative optimism might be termed person-oriented, as it is triggered by his underestimation of his own risk, while Jack’s comparative optimism might be labeled target-oriented because it is driven by his overestimation of target risk.

Y.M. Baek et al. / Computers in Human Behavior 31 (2014) 48–56 Table 1 Descriptive statistics of respondents. Frequency Gender Male Female Age 19–29 30–39 40–49 50 and above Educational achievement Less than high school graduate High school graduate College/BA Advanced degree Monthly income Less than $1,000 $1000–$2000 $2000–$3000 $3000–$4000 $4000–$5000 $5000–$6000 $6000 and above

51

Percentage 53% 47% 23% 31% 27% 18% 1% 16% 72% 11% 26% 25% 21% 13% 7% 5% 3%

1083 945 474 674 552 368 20 321 1457 229 535 502 427 256 141 100 67

Note: N = 2028. Age was measured in years but then categorized by age group. Monthly income swas measured in Korean won but then converted to U.S. dollars. (According to the World Bank, GDP per capita in South Korea in 2012 was $23,113).

H7: Comparative optimism regarding online privacy infringement will be positively related to support for governmental policies regulating the use of personal information online. 3. Methods 3.1. Sample A total of 2028 representative online users were drawn from the South Korean online panel (about 12,000) maintained by Nielsen/ KoreanClick. In essence, Nielsen/KoreanClick is a company that gathers online usage metrics (e.g., internet traffic or user traces), similar to Nielsen/Online in the United States. The survey was conducted on the Internet, and its total length was about 25 min. Basic sociodemographic information on the respondents is provided in Table 1. 3.2. Measures 3.2.1. Comparative optimism regarding online risk There are two distinct sources that constitute comparative optimism: perceived personal and target risk. First, perceived personal risk was measured by asking respondents, ‘‘How likely are you to fall victim to improper use of online personal information?’’ A conventional 5-point Likert scale was used (‘1’ = ‘Least likely’; ‘5’ = ‘Most likely’). On average, the perceived personal risk among respondents was above the midpoint (M = 3.66, SD = .75). Second, perceived target risk was measured using the same question and Likert scale, but replacing ‘you’ with ‘others,’ with ‘others’ specified as teenagers or those in their 20s, 30s, 40s, or 50s and above (i.e., a total of five target groups). As the comparison targets became older, the perceived target risks declined, but all remained above the midpoint: (Mteenagers = 3.99, SDteenagers = .77; M20s = 3.91, SD20s = .73; M30s = 3.78, SD30s = .76; M40s = 3.62, SD40s = .86; M50s above = 3.49, SD50s above = .97). 3.2.2. Antecedents of comparative optimism Three antecedents were considered in this study: (1) online knowledge, (2) maternalistic and paternalistic personalities, and (3) prior experience with privacy infringement.

First, online knowledge was measured based on web-use skill questions suggested by a previous study (Hargittai & Hsieh, 2012). Specifically, this study pre-tested the full list of 27 items of skill indices recommended by Hargittai and Hsieh (2012, see Table 4a) using a small undergraduate sample in South Korea (N = 62). Based on the results of the student sample, items whose mean scores were extremely high or low were excluded; the skills excluded for having high scores are known to everyone, while those excluded for having low scores are so esoteric that almost no ordinary users can identify them. A total of eight items were finally selected and included in a survey to the general population in South Korea: tagging, podcasting, cookies, spyware, RSS, firewall, bookmark, and phishing. All eight items were included in the abbreviated web-use skills index for the general population that Hargittai and Hsieh (2012) recommended. Consistent with those authors, a four-point scale was used to measure respondents’ online knowledge (‘1’ = ‘Not familiar at all’; ‘4’ = ‘Very familiar’). Thus, online knowledge was calculated by averaging the self-reported familiarity with these eight items (M = 2.66; SD = .59, Cronbach’s a = .74).3 Second, maternalistic personality was assessed based on prior studies on regulatory policy (McLeod et al., 2001; Rojas et al., 1996) and medical psychology (Silver & Weiss, 1992). Based on measures borrowed from prior studies (McLeod et al., 2001; Schmierbach et al., 2011), seven items were adopted using a conventional five-point Likert scale (‘1’ = ‘Strongly disagree’; ‘5’ = ‘Strongly agree’). Four items were averaged for the paternalism score (M = 3.27, SD = .58, Cronbach’s a = .76): ‘‘The world would be a better place if more people thought like me’’; ‘‘I wish I had more power to get people to act the way I do’’; ‘‘I am smarter than most people’’; and ‘‘My beliefs about the world are better than most.’’ Three items were averaged to construct a maternalism index (Mmaternalism = 3.54, SDmaternalism = .56, Cronbach’s a = .72): ‘‘I feel upset when others are harmed’’; ‘‘I worry about what happens to other people’’; and ‘‘It bothers me when people are hurt.’’ Finally, prior experience with privacy infringement was calculated by assessing whether users had experienced dissemination of their personal information without their consent. Respondents were asked whether they had experienced the following four situations: (1) ‘‘I received an email from unknown companies about products that I had not requested’’ (95%); (2) ‘‘I received postal mail from unknown companies about products that I had not requested’’ (91%); (3) ‘‘My phone number was revealed to unknown people or companies that I had never contacted before’’ (61%); and (4) ‘‘I have experienced voice phishing’’ (61%). On average, the users had experienced about three cases of privacy infringement (M = 3.07, SD = .99, KR-20 = .67). 3.2.3. Consequences of comparative optimism As measures for consequences of comparative optimism, we considered both privacy-protective behaviors and support for relevant government regulatory policies. Privacy-protective behavior was calculated by asking users whether they engage in the following three online behaviors to guard against improper use of their personal information: (1) erasing cookies on a regular basis, (2) using anti-spyware programs, and (3) avoiding suspicious
3 The self-reported familiarity with each item, in increasing order of familiarity, is as follows: tagging (M = 1.59; SD = .88), RSS (M = 1.78; SD = .98), podcasting (M = 1.98; SD = 1.01), phishing (M = 3.17; SD = 1.02), favorites (M = 3.29; SD = .99), firewall (M = 3.34; SD = .91), spyware (M = 3.62; SD = .75), and bookmark (M = 3.82; SD = .54). In general, Korean respondents’ reported familiarity corresponds closely with that of American people, except for the item of tagging. Americans are very familiar with tagging, while Koreans report being unfamiliar. While it is not conclusive, we suspect that the term ‘tagging’ may sound unfamiliar to Korean ears because of linguistic differences, as many Korean bloggers use the function but refer to it by a different Korean term. In other words, suboptimal translation may have caused the reported unfamiliarity for this item.

52

Y.M. Baek et al. / Computers in Human Behavior 31 (2014) 48–56

websites. This study counted the number of positive responses (M = 1.96, SD = 1.15, KR-20 = .75). Support for relevant government policies was measured using three questionnaire items: ‘‘The government should pass a law prohibiting use of online personal information without obtaining service users’ explicit consent’’; ‘‘The government should allow use of personal information except for commercial purposes’’; ‘‘The government should allow use of personal information if personal identifying information is deleted.’’ A conventional five-point Likert scale (‘1’ = ‘Strongly disagree’; ‘5’ = ‘Strongly agree’) was used to obtain responses, and the averaged scores across the three questions were used (M = 3.97, SD = .80, Cronbach’s a = .66) after the second and third items were reversely coded. 3.2.4. Control variables Seven variables were used as statistical controls in analyzing the relationships among comparative optimism, its antecedents, and its consequences. First and foremost, the following sociodemographic characteristics of respondents were included in analyses: gender, age, education level, and household income (descriptive statistics found in Table 1). Second, respondents’ political ideology, measured on a 10-point scale (‘1’ = ‘Extremely liberal’; ‘10’ = ‘Extremely conservative’), was included (M = 5.17, SD = 1.65) because this variable may influence support for government regulatory policies. Third, the amount of time respondents spend using the Internet is controlled (Mhour = 2.43, SDhour = 1.64), as less active users may be less concerned about online privacy. 3.3. Statistical methods To test H1 and H2, the paired sample t-test was used, and exploratory factor analysis was adopted to cluster the five age groups. To test H3, H4, and H5, perceived personal risk, perceived target risk, and comparative optimism (calculated as ‘perceived target risk – perceived personal risk’) were regressed on a set of antecedents as well as statistical controls. To test H6 and H7, privacy-protective behavior and support for government regulatory policy were regressed on comparative optimism after entering statistical controls, antecedents of comparative optimism, and personal risk estimates into the regression equations. All measures in regression analyses were re-scaled from 0 to 1 in order to compare the effect size of predictors on each outcome measure. 4. Results 4.1. Target typicality and comparative optimism regarding online privacy infringement H1 tests whether comparative optimism is observed in generalized others, and H2 tests whether target typicality moderates the size of comparative optimism. Table 2 provides a series of results from the paired sample t-test and Cohen’s d with repeated measures (Morris & DeShon, 2002), which shows the effect size of comparative optimism across the five age groups. As shown in Table 2, the perceived online privacy risks to others are closely related to the age of comparison targets. When the five target age groups are aggregated, a weak effect size of comparative optimism is detected (t(2026) = 6.28, p < .001, Cohen’s d = .14), indicating that H1 is supported. However, the magnitude of comparative optimism fluctuates according to the age of comparison targets. When the comparison targets are teenagers, the mean of the perceived target risk is substantially higher than the perceived personal risk (t(2026) = 17.90, p < .001, Cohen’s d = .40). The effect size of comparative optimism (i.e., Cohen’s d) drops slightly to .34 when the comparison targets

are in their 20s (t(2026) = 15.29, p < .001), and it further drops to .16 when they are in their 30s (t(2026) = 7.33, p < .001). However, when the comparison targets are in their 40s, comparative optimism disappears, while comparative pessimism is detected (t(2026) = À2.78, p < .01, Cohen’s d = À.06). Comparative pessimism becomes more pronounced when the comparison targets are in their 50s and above (t(2026) = À7.86, p < .001, Cohen’s d = À.18). In short, comparative optimism regarding online privacy infringement depends on how similar the given comparison targets are to the socially vulnerable, indicating that H2 is also supported. While it is meaningful that comparative optimism decreases as the age of the comparison target increases, the five perceived targets are inter-correlated, suggesting the need for factor analysis. Exploratory factor analysis with oblique rotation showed that the five comparison target groups can be classified into two groups: young users (teens, 20s, and 30s; Cronbach’s a = .85) versus old users (40s and 50s and above; Cronbach’s a = .91). Thus, two factor scores were calculated: (1) comparative optimism towards young users, which subtracts perceived personal risk from perceived young users’ risk; and (2) comparative optimism towards old users, which subtracts perceived personal risk from perceived old users’ risk. 4.2. Antecedents of comparative optimism regarding online privacy infringement H3, H4, and H5, respectively, test the effects of online knowledge, maternalism and paternalism, and prior experience with privacy infringement on comparative optimism regarding online privacy risk. After testing the hypotheses, this study examined their effect on perceived personal risk and perceived risk to both young and old users in order to assess whether comparative optimism is person-oriented or target-oriented. The results are provided in Table 3. First, comparative optimism increases as a respondent possesses more online knowledge, regardless of whether the comparison target is young (b = .04, p < .01) or old (b = .04, p < .01). However, online knowledge increases the perceived risk to both young users (b = .07, p < .01) and old users (b = .08, p < .01), while it fails to affect perceived personal risk (b = .01, p = n.s.). These findings indicate that more knowledgeable respondents are more likely to overestimate the perceived risk to others without underestimating perceived personal risk. In short, target-oriented comparative optimism emerges among knowledgeable users. H3 receives limited support because online knowledge fails to

Table 2 Paired sample t-test and effect size of comparative optimism regarding online privacy. Mean (SD) Perceived personal risk Perceived target risk when target’s age Teenagers 20s [20–29] 30s [30–39] 40s [40–49] 50s and above [50$] Aggregated risk for five target groups 3.67 (.75) is . . . 3.99 3.91 3.78 3.62 3.49 3.76 (.65) (.73) (.76) (.86) (.97) (.65) 17.90*** 15.29*** 7.33*** À2.78** À7.86** 6.28*** .40 .34 .16 À.06 À.18 .14 t statistic Cohen’s d

Note. N = 2023. The paired sample t-test compares the means of perceived target risk and perceived personal risk. Cohen’s d is calculated following Morris and DeShon’s (2002) Eq. (8), which corrects dependency between two variables. Please note that the original formula for Cohen’s d is designed for the independent sample t-test, not for the paired sample t-test. ** p < .01. *** p < .001.

Y.M. Baek et al. / Computers in Human Behavior 31 (2014) 48–56 Table 3 Effects of online knowledge, personality, and experience with privacy infringement on perceived personal risk, perceived target risk, and comparative optimism. Comparative optimism towards Young users Intercept Control variables Gender (1 = female) Age years Education level Household income Liberal-conservative Internet use Antecedents of comparative optimism Online knowledge Paternalistic personality Maternalistic personality Prior experience with privacy infringement R2 Adjusted R2 .43*** (.02) Old users .49*** (.02) .51*** (.03) Perceived personal risk Perceived target risk Young users .45*** (.03) Old users .49*** (.04)

53

.01* (.005) .04*** (.01) .01 (.01)

Similar Documents

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8

Premium Essay

Privacy

...Privacy ‘The Limits of Privacy’ and ‘The Case for privacy’ are written by Amitai Etzioni and David D. Friedman respectively. Both of them have opposite views about privacy, which Etzioni states that less privacy is good for us and Friedman claims that more privacy makes the world a better place. In this paper, I will argue that Etzioni’s argument fails because privacy is really important for us to protect ourselves. I am going to explain in detail based on three different points in the next three paragraphs. First, in ‘The Limits of Privacy’, Etzioni argues that privacy is not important as many other goods. Based on his argument, he claims that “there are numerous values that trump or take precedence over privacy” (p.254) such as safety. However, I totally disagree his standpoint. Although safety also considers as a part of importance, it does not mean that safety can take priority over privacy consideration. Privacy does have significance effect for us to protect ourselves. Some people may think that it is worth to sacrifice their individual privacy in order to get freedom for safety. Once you give up your own privacy and allow anyone like governments to access to your information freely, your information is disclosed and you cannot get them back anymore. For example, after 9/11 attack in the United States, a lot of new measures about surveillance are introduced. The government can have authorities to wiretap, record or trace orders for email made by all Americans. These...

Words: 1250 - Pages: 5

Premium Essay

Techonology and Privacy

...monitor the actions and performance of their employees. This is due to worries about; quality of work, productivity employee theft or misuse of company property One of the main ethical issues of the workplace is employee privacy and surveillance. Argument raised is: is it ethical to monitor employees whilst they are in the workplace? Is there privacy for employees and should employees expect Privacy at workplace? Technology has offered various options to help people maintain privacy depending on their situation. At the same time, technology has made it almost impossible for anyone to have privacy. There are devices and programs that can help you get privacy but they can also be used to invade it. Modern society has too many incidences and events that include invasion of privacy, including on national and international levels. Is it possible to ever maintain a level of privacy when you are on the computer, your cellphone, or even in your own home due to technology advancements? In this writing the prominent examples of surveillance at work that I would like to discuss about are surveillance cameras and internet surveillance. Since this topic is based around privacy in the workplace, "privacy" is a key term to be explored. I will analyze the definition of “Privacy” term as well as the reality of using Surveillance today to illustrate for my opinion on this...

Words: 3636 - Pages: 15

Premium Essay

Workplace Privacy

...conflicting interests concerns the privacy rights and considerations of the employees versus the rights of the employer to monitor the activities of its employees. A relaxed, comfortable workplace promotes good morale but too much comfort can result in a workforce that takes their responsibilities for granted. Achieving a happy medium is the ultimate goal. The development of modern technology has provided employers with increased opportunity to monitor the activities of their employees both on the job and off. Telephone, computers, voice mail, and the internet have provided employers with vehicles that were not available just a decade or so ago. Because of the newness of such devices, regulations and laws governing the use of them are not well developed. As a result, at the present time, employers are enjoying virtually unfettered opportunities to listen, watch, and read most anything and everything that their employees are doing while at work. Some more aggressive employers are even using such devices to do the same in regard to their employees’ private lives as well. In limited cases, some corporations and businesses have enacted policies limiting such interventions by the company but there are very few such companies. The concept of privacy is complicated. What is private for one person may not be for another and when it comes to privacy in the workplace the issue becomes even more complicated. From a legal point of view, what constitutes privacy is essentially the expectation...

Words: 1752 - Pages: 8

Premium Essay

Blackboard Privacy

...Privacy and Blackboard: Every Good Service Has a Price Thanks to new technology, Blackboard has become a powerful eLearning tool, but, for such effectiveness, students must pay a price, privacy. Blackboard has an all-seeing system that records data from all students which can be accessed by professors. However, professors tracking students’ academic activities hinder the educational process due to Blackboard’s high level of supervision, therefore, professors should not have access to all databases. Primarily, the excessive monitoring contains information that is needless for the professors. Besides, such data creates prejudice against those who follow the program differently. Moreover, students who are aware of this supervision experience a...

Words: 992 - Pages: 4

Premium Essay

Privacy Laws

...Privacy Laws and Policies Debate Many employees embark on their employers violating their privacy. Employers are becoming more aggressive on how they screen new potential hires as well as their current employees. Normally employers will conduct criminal background checks, drug testing and sometimes a credit check. The question I am asking is how far is too far? Employees need to become more aware of this situation. Employee privacy laws are limited, which makes it easier for employers to invade workers privacy. Something’s are personal and should remain that way. Therefore I am against communication privacy laws and policies in the workplace. Nothing in life exist with infinity as such I believe employers need to re-evaluate heir approach regarding privacy in the work place and perhaps explore alternative solutions to the problem. There are limits to everything in life and employers’ privacy laws should be no different. For the most part the laws are design to not protect the employee but the employers. Information technology such as computers and internet makes it easier to collect, keep, incorporate, switch ad obtain information and data of a company in a technical manner. Today more companies are wired to the internet and because of this users of the internet are more prone to violations of privacy. In order to restrict access to private information the government enacted privacy laws that enforces the privacy of files communication that is based on the computer. Acts...

Words: 410 - Pages: 2

Premium Essay

The Right to Privacy

...The Right to Privacy Privacy is one of the most fundamental values on which our country was founded, and the privacy of an individual is one of the most important rights. So do we really have a right to privacy? According to the article written by Warren and Brandeis “the individual shall have full protection in person and in property of the law”. The purpose of this article written by Samuel Warren and Louis Brandeis is to consider whether the existing laws properly protect the privacy of an individual. Warren and Brandeis purpose for writing such an article was to argue that the laws have to change with the times. Rather than just protect an individual only for “physical interference with life and property” the laws had to evolve with the changing times. Because an individual life gradually expanded so should the laws that was set out to protect them. The authors argue that individuals have the right to enjoy life and to be left alone. The individual have the right to determine how their thoughts and emotions be communicated and how, their thoughts and emotions are expressed. The authors concluded that the thoughts, emotions, and sentiments of individuals needed protection. Protection preventing what could be ultimately written and publish, giving the individual the right to enjoy life. The authors assume that individuals shall have full protection in person and in property, and also the right to life served only to protect the person from battery. They realized that...

Words: 492 - Pages: 2

Premium Essay

Privacy Actions

...American Management Association (AMA), the top two reasons employers provided for monitoring their employees were performance evaluation and quality control. Workplace monitoring may sound wrong, but it provides many benefits to an organization and its staff members, such as lower operating costs and high production rates. However, in the process of monitoring employees, employees’ privacy rights are violated mainly through computer monitoring, telephone monitoring and background checks. Productivity is one of the main reasons cited by employers for introducing electronic surveillance and employee testing to the workplace. Employers believe that corporate survival demands continuous improvements in employee productivity. Errors, poor products, and slow service hurt business. Therefore, monitoring and testing to identify and correct these problems are considered to be sound management practices (Wright). However, the following will analyze privacy in the workplace from an ethical point of view using three workable theories: Kantianism, Act Utilitarianism, and Social Contract Theory. Privacy...

Words: 3902 - Pages: 16

Premium Essay

Privacy and Confidentiality

...patients’ expectations are becoming higher and now they always want everything best (Rafique & Bhatti, 2014). Nurses are subject to numerous ethical and legal duties in their professional role, including the imperative to maintain patients’ privacy and confidentiality. Beginning in 1893, nurses take the Nightingale Pledge “I promise to do all in my power to maintain and elevate the standard of my profession, and hold in confidence all personal matters committed to my keeping and all family affairs coming to my knowledge in the practice of my calling” (Gretter, 2012). The duty continues today, with hospital policies, state regulations, and federal law aimed at protecting patients’ confidentiality. Critical care providers are often privy to confidential information in the course of clinical practice. The dilemma may arise when confidential information is requested by family members or friends of the patient. Although at times it seems that regulations and laws are so stringent that any disclosure of health care information is forbidden, it may be necessary and appropriate to make disclosures, and the current regulations and laws support the professional judgment in communicating patients’ health information (Wielawski, 2009). Privacy is limited access to a person, the person’s body, conversations, bodily functions or objects immediately associated with the person. Because people have different beliefs and values about...

Words: 9016 - Pages: 37

Free Essay

Privacy and Technolgy

...People’s pace of life is increasingly fast. Numerous people depend on modern technology for work and entertainment because it is more efficient. For instance, Facebook is the most popular social network website in the world, but use of Facebook is becoming a controversial issue as it has potential hazards that threaten users’ privacy. Facebook is a great innovation since it makes people easily contact friends and families, but when users upload their personal information on profile pages, their privacy may be confirmed by strangers. Nevertheless, some people believe that users’ privacy can be protected with technological tools. Although some technology experts claim that companies can protect users’ personal information, modern technology is an invasion of privacy. Using modern technology allows other people to track users’ movements, so it invades people’s privacy. GPS devices can reveal users’ physical location information to others. Leah Yamshon, the author of “Mobile Apps Can Compromise Your Privacy” suggests that if people use GPS technology without sufficient understanding of the system, their movements may be easily tracked by other people (par. 1). Using GPS devices without controlling data transition processes may let other people easily know users’ location, yet most consumers do not know how to control data transition processes. Dishonest people can also steal users’ location information though smart phone applications. Patrick Leahy, the chairman of Senate Judiciary...

Words: 1368 - Pages: 6

Premium Essay

Digital Privacy

...The Value of Digital Privacy in the IT Age The Value of Digital Privacy in the IT Age Digital Privacy in the IT age is almost extinct. The World Wide Web houses information about anything and everyone. People use the digital technology everyday with the impression that what they are doing is protected from others, unless they chose. While few consumers are fully aware of how their data is being used and even fewer are capable of actively managing it, most individuals expect their digital identity to be treated responsibly and openly: 79%, for example, said companies should be more transparent about use of personal data. There are systems and technologies that people use to gain access to a person’s information. The information obtained can be an advantage or disadvantage. The government has implemented laws for years to try to establish some controls There are many technologies that will allow an individual to research citizens, but the three that will be discussed are Facebook, Intellus, and Google. Facebook is a web based social app use to contact friends. A person can either download for free or buy “apps” for a small amount of money. Apps are games, quizzes and sharing services. These “apps” are consists a host of personal information which includes emails, current locations, sexual preferences of “app” users and their friends. Intelius allows people to access personal records by name, social security number or phone number. People use this system to find family or do...

Words: 963 - Pages: 4

Free Essay

Privacy

...* Explain why you agree or disagree that Americans seem willing to sell their own privacy cheaply while simultaneously craving private information about one another. Americans want to believe that they aren’t willing to sell their own privacy cheaply. They would fill out surveys online to enter to win $1000 to Kmart or a chance to win a new car. People given the opportunity to win something will put all their private self out there. They will give name, number, address, email…they’ll tell you their buying habits and so on for the chance to win a NEW CAR (Forbes, 2012). As Alan Westin states “In democratic societies there is a fundamental belief in the uniqueness of the individual, in his basic dignity and worth as a creature of God and a human being, and in the need to maintain social processes that safeguard his sacred individuality (Halbert, 2010, pp 75)”. People act differently in school, work, with friends, when they go to the grocery store and when the time comes where they need to unwind and be themselves, they should be able to. Whether venting fear, anger, happiness, or anything else they have hidden throughout the day, people want that privacy. This is why people choose to live in a “free society”. * Describe what role you think technology has played in these trends towards privacy. Technology is ever encroaching on people’s lives whether they are aware of it or not. Camera’s videoing the parking lots, video’s watching the apartments’ you live in, certain...

Words: 464 - Pages: 2

Premium Essay

Workplace Privacy

...workers 06 Gender pay equity Best Practice Guide Workplace privacy 07 Small business & the Fair Work Act 08 Workplace privacy 09 Managing underperformance 10 Effective dispute resolution 11 Improving workplace productivity in bargaining 12 Parental leave Working at best practice Employers should implement best practice when it comes to maintaining privacy in the workplace. It is important for employers, employees and their representatives to know what information may be collected and retained by employers and whether it can be passed on to others. Best practice creates certainty and security for both employers and employees. There is also a checklist to assist with achieving best practice on workplace privacy. This guide illustrates best practice when it comes to workplace privacy. For more specific information regarding your minimum legal obligations and entitlements, contact the organisations listed under the ‘For more information’ section at the end of this guide. This Best Practice Guide explains: what is privacy what is workplace privacy general privacy principles obligations when information is provided to third parties, particularly when given under the Fair Work Act 2009 (FW Act) privacy in relation to email and the internet. Fair Work Ombudsman1 Best Practice Guide Workplace privacy What is privacy? What is workplace privacy? Privacy is the word we give to being able to keep certain information to...

Words: 2400 - Pages: 10

Premium Essay

Privacy Laws

...Privacy Laws and Policies Debate CheckPoint After examining the privacy laws as well as policies within the workplace, I find that companies should insist on such laws and policies in a working environment. Many reasons for my decision exist, the first is companies have reasons for monitoring the computer systems as well as phone lines. After all the software employees operate is the employer's property, and by monitoring the computer systems will assist in preventing the staff. Some employees have been known to use the Internet for personal reasons instead of business purposes; therefore, employees will pay more attention to the Internet than completing the tasks assigned. The Electronic Privacy Communication Act (ECPA) is a law that can protect the employees' privacy; however, one can continue to discover exceptions to the ECPA. One exception is employer's can monitor his or her employees activities so that he or she can prevent unauthorized use. Services like e-mail, telephone, and Internet are other exceptions owned as well as offered by the company; therefore, the company has the right to monitor any employee. The third exception is the consent, in which, "When a party consents to the interception of a communication," (E-Monitoring in the Workplace: Privacy, Legislation, and Surveillance Software, 2006). Organizations desire to make certain workers are using company time proficiently. Companies do not pay employees to deal with personal matters on the clock; however...

Words: 293 - Pages: 2

Premium Essay

Privacy Concerns on Facebook

...Privacy Concerns on Facebook With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focusing on the privacy issue of the network. The main question being asked is: how do users navigate their privacy on Facebook? In Facebook’s short history it has quickly become a repeat offender on privacy and plays loose and easy with our data which means that we need to be even more vigilant about privacy issues (Malik, 2013). The concept of privacy can be defined in several ways, both legally and philosophically. Also, privacy has been found to be culturally relative, based on economic and cultural factors. Privacy is a form of protection and it can protect the general population as well as individuals. (Moor, 1997). However, one definition that seems especially applicable to this paper is the one put forth by Alan Westin in his 1967 book Privacy and Freedom. He defines privacy as “The claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” (Westin, 1967). By this definition, Facebook has infringed upon this right on several occasions. I believe Facebook has an ethical responsibility to provide its users with a high degree of privacy. I believe the company should engage in what privacy advocate Michael Zimmer calls “value-conscious design.” (Zimmer, 2007) This type of design can be related to a virtue-based model of ethics. Under this...

Words: 2790 - Pages: 12