Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Coventry, Lynne; Jeske, Debora; Briggs, Pamela (2014)
Languages: English
Types: Unknown
Subjects: C800
Exploring the link between privacy and behaviour has been difficult, as many contextual and other variables lead to a schism between privacy attitudes and behaviour. We propose that one possible means forward is to consider risk perceptions as an important additional dimension when exploring individual differences in privacy concern. Using cluster analysis, we demonstrate the benefit of creating more multi-dimensional user profiles (=clusters) as these can provide a better inside into behaviour. These clusters were able to differentiate users based on both privacy and risk perceptions into users who were (a) highly concerned and risk-sensitive; (b) unconcerned but risk-aware; and (c) moderately concerned but less risk-aware cluster. Using these clusters, we were able to explain different patterns of self-reported behaviours related to technical and general caution. Further analysis of behaviours associated with the use of mobile devices, public networks and social networking in relation to these clusters did not result in any significant findings. We provide a number of topics for discussion and practical solutions that have yet to be implemented in order to better understand the link between privacy attitudes and behaviour.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Altman, J. The environment and social behaviour: privacy, personal space, territory and crowding. Brooks/Cole Publishers, 1975.
    • [2] Bansal, G., Zahedi, F.M., and Gefen, D. 2010. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems 49 (2010), 138-150.
    • [3] Buchanan, T., Paine, C., Joinson, A.N., and Reips, U.-R. Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science and Technology, 58, 2 (2007), 157-165.
    • [4] Chin, E., Porter Felt, A., Sekar, V., and Wagner, D. Measuring user confidence in smartphone security and privacy. Proc. SOUPS (Symposium on Usable Privacy and Security) (2012), 1-16.
    • [5] Clarke, R. Vignettes of corporate privacy disasters. (accessed April 11, 2014) http://www.rogerclarke.com/DV/PrivCorp.html.
    • [6] Drennan, J., Sullivan, G., and Previte, J. Privacy, risk perception, and expert online behavior: An exploratory study of household end users. Journal of Organizational and End User Computing, 18, 1 (2006), 1-22. DOI=10.4018/joeuc.2006010101.
    • [7] Furnell, S., Tsaganidi, V., and Phippen, A. 2008. Security beliefs and barriers for novice Internet users. Computers & Security 27 (2008), 235-240.
    • [8] Garfinkel, D. Database Nation: The death of privacy in the 21st Century. CA: O' Reilly Media, 2001.
    • [9] Han, J., and Kamber, M. Data Mining: Concepts and Techniques. Morgan Kaufmann, 2000.
    • [10] Hough, M. G. Keeping it to ourselves: Technology, privacy, and the loss of reserve. Technology in Society, 31, 4 (2009), 406-413.
    • [11] Hugl, U. Reviewing person's value of privacy of online social networking. Internet Research, 21, 4 (2011), 384-407.
    • [12] Ifinedo, P. Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory. Computers & Security, 31 (2012), 83-95.
    • [13] Jensen, C., Potts, C., and Jensen, C. Privacy practices of Internet users: Self-report versus observed behavior. International Journal of Human-Computer Studies, 63 (2005), 203-227.
    • [14] Joinson, A. N., and Paine, C. B. Self-disclosure, privacy and the Internet. In Oxford Handbook of Internet Psychology, no. 1971, A. Joinson, K. McKenna, T. Postmes, and U.-D. Reips, Eds. Oxford University Press, 237-252, 2007.
    • [15] King, J., Lampinen, A., and Smolen, A. Privacy: Is There An App for That? Proc. SOUPS (Symposium On Usable Privacy and Security) (2011), 1-20.
    • [16] Kurkovsky, S., and Syta, E. Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. Proc. ISTAS (International Symposium of the Technology and Society) (2010), 441 - 449.
    • [17] Lacohee, H., Phippen, A.D., and Furnell, S.M. Risk and restitution: Assessing how users establish online trust. Computers & Security 25 (2006), 486-493.
    • [18] Li, Y. Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems 54 (2012), 471-481.
    • [19] Metzger, M.J. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of ComputerMediated Communication 9, 4 (2006), 1-29.
    • [20] Newell, P. B. A systems model of privacy. Journal of Environmental Psychology 14, 1 (1994), 65-78.
    • [21] Pedersen, D.M. Model for types of privacy by privacy functions. Journal of Environmental Psychology 19 (1999), 397-405.
    • [22] Pollach, I. Online privacy as a corporate social responsibility: An empirical study. Business Ethics: A European Review 20, 1 (2011), 88-102.
    • [23] Toch, E., Wang, Y., and Cranor, L.F. Personalization and privacy: A survey of privacy risks and remedies in personalization-based systems. User Modelling and UserAdaptive Interaction 22 (2012), 203-220.
    • [24] Tsai, J.Y., Egelman, S., Cranor, L., and Acquisti, A. The effect of online privacy information on purchasing behaviorL An experimental study. Information Systems Research 22, 2 (2011), 254-268.
    • [25] Ward, J. H. Hierarchical Grouping to Optimize an Objective Function. Journal of the American Statistical Association, 58, 301 (1963), 236-244.
    • [26] Westin, A. Privacy and Freedom. New York: Atheneum, 1967.
    • [27] Wu, K.-W., Huan, S.Y., Yen, D.C., and Popova, I. The effect of online privacy policy on consumer policy concern and trust. Computers in Human Behavior 28 (2012), 889-897.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article