Skip to main content

Self-Protection of Online Privacy: A Behavioral Approach

  • Chapter
  • First Online:
Privacy Online

Abstract

Major shifts in information and communication technologies often reshape the ways in which we produce and share personal information. For example, the development of writing systems allowed personal information to be recorded and stored; the invention of printing technology made it easy to reproduce private information and distribute it to the public; and electronic communications maximized the efficiency and the speed of information sharing. Each of these technological advancements forced human society to redefine the boundaries between the public and private and to re-conceptualize the concept of personal privacy. Not surprisingly, advances in digital communication technologies and the rapid proliferation of social media during the last two decades have once again challenged our views about privacy and privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ajzen I (1988) Attitudes, personality, and behavior. Open University Press, Milton Keynes

    Google Scholar 

  • Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211

    Article  Google Scholar 

  • Ajzen I, Fishbein M (2005) The influence of attitudes on behavior. In: Albarracin D, Johnson BT, Zanna MP (eds) The handbook of attitudes. Erlbaum, Mahwah, pp 173–221

    Google Scholar 

  • Altman I (1975) The environment and social behavior. Brooks/Cole, Belmont

    Google Scholar 

  • Arendt H (1958) The human condition. Chicago, IL: University of Chicago Press

    Google Scholar 

  • Bandura A (1997) Self-efficacy: the exercise of control. W. H. Freeman, New York

    Google Scholar 

  • Barnes S (2006) A privacy paradox: social networking in the United States. First Monday, 11. http://www.firstmonday.org/issues/issue11_9/barnes/index.htm

  • Bates A (1964) Privacy: a useful concept? Soc Forces 42:432–437

    Article  Google Scholar 

  • Bennett C (1967) What price privacy. Am Psychol 22:371–376

    Article  Google Scholar 

  • Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101–106

    Article  Google Scholar 

  • boyd d (2008) Facebook’s privacy trainwreck: exposure, invasion, and social convergence. Convergence 14:13–20

    Google Scholar 

  • boyd d, Ellison N (2005) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13, Article 11. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html

  • Burgoon JK (1982) Privacy and communication. In: Burgoon M (ed) Communication yearbook 6. Sage, Beverly Hills, pp 206–249

    Google Scholar 

  • Buss A (2001) Psychological dimensions of the self. Sage, Thousand Oaks

    Google Scholar 

  • Cate FH (1997) Privacy in the information age. Brooking Institute Press, Washington, DC

    Google Scholar 

  • Cooley T (1880) A treatise on the law of torts or the wrongs which arise independent of contract. Callaghan, Chicago

    Google Scholar 

  • DeCew JW (1997) In pursuit of privacy: law, ethics, and the rise of technology. Cornell University Press, Ithaca

    Google Scholar 

  • Dommeyer CJ, Gross BL (2003) What consumers know and what they do: an investigation of consumer knowledge, awareness, and use of privacy protection strategies. J Interact Mark 17:34–51

    Article  Google Scholar 

  • Elshtain JB (1995) Democracy on trial. Basic Book, New York

    Google Scholar 

  • Flanagin AJ, Metzger MJ (2003) The perceived credibility of web site information as influenced by the sex of the source. Comput Hum Behav 16:683–701

    Article  Google Scholar 

  • Gavison R (1980) Privacy and the limits of law. Yale Law J 89:420–435

    Article  Google Scholar 

  • Godin G, Kok G (1996) The theory of planned behavior: a review of its applications to health-related behaviors. Am J Heal Promot 11:87–98

    Google Scholar 

  • Graeff TR, Harmon S (2002) Collecting and using personal data: consumers’ awareness and concerns. J Consum Mark 19:302–313

    Article  Google Scholar 

  • Gross R, Acquisti AA (2005) Information revelation and privacy in online social networks. In: Proceedings of WPES’05, ACM, Alexandria, pp 71–80

    Google Scholar 

  • Hall ET (1966) The hidden dimension. Doubleay, New York

    Google Scholar 

  • Halmos P (1953) Solitude and privacy: a study of social isolation, its causes and therapy. Philosophical Library, New York

    Google Scholar 

  • Hoffman DL, Novak TP, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80–85

    Article  Google Scholar 

  • Ittelson W, Proshansky H, Rivlin L, Winkel G (1974) An introduction to environmental psychology. Holt, Rinehart and Winston, Oxford

    Google Scholar 

  • Jarvenpaa SL, Tractinsky N, Vitale M (1999) Consumer trust in an internet store: a cross-cultural validation. J Comput Mediat Commun 5. http://www.ascusc.org/jcmc/vol5/issue2

  • Jourard S (1966) Some psychological aspects of privacy. Law Contemp Probs 31:307–318

    Article  Google Scholar 

  • Klopfer P, Rubenstein D (1977) The concept of privacy and its biological basis. J Soc Issues 33:52–65

    Article  Google Scholar 

  • Konvitz MR (1966) Privacy and law: A philosophical prelude. Law and Contemporary Problems 31:272–288

    Google Scholar 

  • LaRose R, Mastro D, Eastin M (2001) Understanding internet usage: a social-cognitive approach to uses and gratifications. Soc Sci Comput Rev 19:395–413

    Article  Google Scholar 

  • Lawton MP, Bader J (1970) Wish for privacy by young and old. J Gerontol 25:48–54

    Google Scholar 

  • Leino-Kilpi H, Vaelimaeki M, Dassen T, Gasull M, Lemonidou C, Scott A, Arndt M (2001) Privacy: a review of the literature. Int J Nurs Stud 38:663–671

    Article  Google Scholar 

  • Lenhart A, Madden M (2007) Teens, privacy, & online social networks. Pew internet and American life project report. http://www.pewinternet.org/pdfs/PIP_Teens_Privacy_SNS_Report_Final.pdf

  • Locke J (1960) The second treatise on government. Bobbs-Merrill, Indianapolis

    Google Scholar 

  • Marshall NJ (1974) Dimensions of privacy preferences. Multivar Behav Res 9:255–271

    Article  Google Scholar 

  • McKinnon C (1989) Toward a feminist theory of the state. Harvard University Press, Cambridge, MA

    Google Scholar 

  • Melvin v. Reid, 112 Cal.App. 92 (1931)

    Google Scholar 

  • Metzger M, Docter S (2003) Public opinion and policy initiatives for online privacy protection. J Broadcast Electron Med 47:350–374

    Article  Google Scholar 

  • Mill JS (1976) On Liberty. New York, NY: Penguin

    Google Scholar 

  • Milne GR, Rohm AJ (2000) Consumer privacy and name removal across direct marketing channels: exploring opt-in and opt-out alternatives. J Public Policy Market 19:238–249

    Article  Google Scholar 

  • More PE (1923) Hellenistic philosophies. Princeton University Press, Princeton

    Google Scholar 

  • O’Neil D (2001) Analysis of internet user’ level of online privacy concerns. Soc Sci Comput Rev 19:17–31

    Article  Google Scholar 

  • Parke R, Sawin D (1979) Children’s privacy in the home: developmental, ecological and child-rearing determinants. Environ Behav 11:87–104

    Article  Google Scholar 

  • Parrot R, Burgoon JK, Burgoon M, LePoire BA (1989) Privacy between physicians and patients: more than a matter of confidentiality. Soc Sci Med 29:1381–1385

    Article  Google Scholar 

  • Petronio S (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, New York

    Google Scholar 

  • Phelps JE, Nowak GJ, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Market 19:27–41

    Article  Google Scholar 

  • Phelps JE, D’Souza G, Nowak GJ (2001) J Interact Mark 15:2–17

    Article  Google Scholar 

  • Prosser WJ (1960) Privacy. Calif Law Rev 383:48

    Google Scholar 

  • Schwarzer R (ed) (1992) Self-efficacy: thought control of action. Hemisphere, Washington, DC

    Google Scholar 

  • Sheehan KB (1999) An investigation of gender differences in on-line privacy concerns and resultant behaviors. J Interact Mark 13:24–38

    Article  Google Scholar 

  • Sommer R (1959) Studies in personal space. Sociemetry 22:247–260

    Google Scholar 

  • Sommer R (1969) Personal space. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  • Stephen JF (1967) Liberty, equality, fraternity. Liberty Fund, Indianapolis

    Google Scholar 

  • Swaminathan V, Lepkowska-White E, Rao BP (1999) Browsers or buyers in cyberspace? An investigation of factors influencing electronic exchange. J Comput Mediat Commun 5(2). Retrieved on December 6, 2003, from http://www.ascusc.org/jcmc/vol5/issue2

  • Tavani H (2000) Privacy-enhancing technologies as a panacea for online privacy concerns. J Inform Ethics fall:26–36

    Google Scholar 

  • Turkington RC, Allen AL (1999) Privacy law: cases and materials. West Group, St. Paul

    Google Scholar 

  • UCLA Center for Communication Policy (2000) The UCLA internet report: surveying the digital future: year one. http://www.ccp.ucla.edu. Accessed 7 Oct 2001

  • UCLA Center for Communication Policy (2001) The UCLA internet report 2001: surveying the digital future: year two. http://www.ccp.ucla.edu. Accessed 21 Jan 2002

  • UCLA Center for Communication Policy (2003) The UCLA internet report: surveying the digital future: year three. http://www.digitalcenter.org/pdf/InternetReportYearThree.pdf. Accessed 1 Oct 2005

  • UCLA Center for Communication Policy (2004) The UCLA internet report: surveying the digital future: year four. http://www.digitalcenter.org/downloads/DigitalFutureReport-Year4-2004.pdf. Accessed 1 Oct 2005

  • Warren S, Brandeis L (1890) The right to privacy. Harvard Law Rev 4:193–220

    Article  Google Scholar 

  • Westin A (1967) Privacy and freedom. Atheneum, New York (Witte, 1994)

    Google Scholar 

  • Wolfe M, Laufer R (1974) The concept of privacy in children and adolescence. In: Carson D (ed) Man-environment interactions: evaluations and applications: part 2, vol 6, Privacy. Environmental Design Research Association, Washington, DC, pp 29–54

    Google Scholar 

  • Yao MZ, Linz D (2008) Predicting internet users’ self-protection of online privacy violations. CyberPsychol Behav 11:615–617

    Article  Google Scholar 

  • Yao MZ, Zhang JG (2008) Predicting user concerns about online privacy in Hong Kong. CyberPsychol Behav 11:779–781

    Article  Google Scholar 

  • Yao MZ, Rice R, Wallis K (2007) Predicting user concerns about online privacy. J Am Soc Inf Sci Technol 58:710–722

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mike Z. Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yao, M.Z. (2011). Self-Protection of Online Privacy: A Behavioral Approach. In: Trepte, S., Reinecke, L. (eds) Privacy Online. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21521-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21521-6_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21520-9

  • Online ISBN: 978-3-642-21521-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics