Abstract
Major shifts in information and communication technologies often reshape the ways in which we produce and share personal information. For example, the development of writing systems allowed personal information to be recorded and stored; the invention of printing technology made it easy to reproduce private information and distribute it to the public; and electronic communications maximized the efficiency and the speed of information sharing. Each of these technological advancements forced human society to redefine the boundaries between the public and private and to re-conceptualize the concept of personal privacy. Not surprisingly, advances in digital communication technologies and the rapid proliferation of social media during the last two decades have once again challenged our views about privacy and privacy protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ajzen I (1988) Attitudes, personality, and behavior. Open University Press, Milton Keynes
Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211
Ajzen I, Fishbein M (2005) The influence of attitudes on behavior. In: Albarracin D, Johnson BT, Zanna MP (eds) The handbook of attitudes. Erlbaum, Mahwah, pp 173–221
Altman I (1975) The environment and social behavior. Brooks/Cole, Belmont
Arendt H (1958) The human condition. Chicago, IL: University of Chicago Press
Bandura A (1997) Self-efficacy: the exercise of control. W. H. Freeman, New York
Barnes S (2006) A privacy paradox: social networking in the United States. First Monday, 11. http://www.firstmonday.org/issues/issue11_9/barnes/index.htm
Bates A (1964) Privacy: a useful concept? Soc Forces 42:432–437
Bennett C (1967) What price privacy. Am Psychol 22:371–376
Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101–106
boyd d (2008) Facebook’s privacy trainwreck: exposure, invasion, and social convergence. Convergence 14:13–20
boyd d, Ellison N (2005) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13, Article 11. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html
Burgoon JK (1982) Privacy and communication. In: Burgoon M (ed) Communication yearbook 6. Sage, Beverly Hills, pp 206–249
Buss A (2001) Psychological dimensions of the self. Sage, Thousand Oaks
Cate FH (1997) Privacy in the information age. Brooking Institute Press, Washington, DC
Cooley T (1880) A treatise on the law of torts or the wrongs which arise independent of contract. Callaghan, Chicago
DeCew JW (1997) In pursuit of privacy: law, ethics, and the rise of technology. Cornell University Press, Ithaca
Dommeyer CJ, Gross BL (2003) What consumers know and what they do: an investigation of consumer knowledge, awareness, and use of privacy protection strategies. J Interact Mark 17:34–51
Elshtain JB (1995) Democracy on trial. Basic Book, New York
Flanagin AJ, Metzger MJ (2003) The perceived credibility of web site information as influenced by the sex of the source. Comput Hum Behav 16:683–701
Gavison R (1980) Privacy and the limits of law. Yale Law J 89:420–435
Godin G, Kok G (1996) The theory of planned behavior: a review of its applications to health-related behaviors. Am J Heal Promot 11:87–98
Graeff TR, Harmon S (2002) Collecting and using personal data: consumers’ awareness and concerns. J Consum Mark 19:302–313
Gross R, Acquisti AA (2005) Information revelation and privacy in online social networks. In: Proceedings of WPES’05, ACM, Alexandria, pp 71–80
Hall ET (1966) The hidden dimension. Doubleay, New York
Halmos P (1953) Solitude and privacy: a study of social isolation, its causes and therapy. Philosophical Library, New York
Hoffman DL, Novak TP, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80–85
Ittelson W, Proshansky H, Rivlin L, Winkel G (1974) An introduction to environmental psychology. Holt, Rinehart and Winston, Oxford
Jarvenpaa SL, Tractinsky N, Vitale M (1999) Consumer trust in an internet store: a cross-cultural validation. J Comput Mediat Commun 5. http://www.ascusc.org/jcmc/vol5/issue2
Jourard S (1966) Some psychological aspects of privacy. Law Contemp Probs 31:307–318
Klopfer P, Rubenstein D (1977) The concept of privacy and its biological basis. J Soc Issues 33:52–65
Konvitz MR (1966) Privacy and law: A philosophical prelude. Law and Contemporary Problems 31:272–288
LaRose R, Mastro D, Eastin M (2001) Understanding internet usage: a social-cognitive approach to uses and gratifications. Soc Sci Comput Rev 19:395–413
Lawton MP, Bader J (1970) Wish for privacy by young and old. J Gerontol 25:48–54
Leino-Kilpi H, Vaelimaeki M, Dassen T, Gasull M, Lemonidou C, Scott A, Arndt M (2001) Privacy: a review of the literature. Int J Nurs Stud 38:663–671
Lenhart A, Madden M (2007) Teens, privacy, & online social networks. Pew internet and American life project report. http://www.pewinternet.org/pdfs/PIP_Teens_Privacy_SNS_Report_Final.pdf
Locke J (1960) The second treatise on government. Bobbs-Merrill, Indianapolis
Marshall NJ (1974) Dimensions of privacy preferences. Multivar Behav Res 9:255–271
McKinnon C (1989) Toward a feminist theory of the state. Harvard University Press, Cambridge, MA
Melvin v. Reid, 112 Cal.App. 92 (1931)
Metzger M, Docter S (2003) Public opinion and policy initiatives for online privacy protection. J Broadcast Electron Med 47:350–374
Mill JS (1976) On Liberty. New York, NY: Penguin
Milne GR, Rohm AJ (2000) Consumer privacy and name removal across direct marketing channels: exploring opt-in and opt-out alternatives. J Public Policy Market 19:238–249
More PE (1923) Hellenistic philosophies. Princeton University Press, Princeton
O’Neil D (2001) Analysis of internet user’ level of online privacy concerns. Soc Sci Comput Rev 19:17–31
Parke R, Sawin D (1979) Children’s privacy in the home: developmental, ecological and child-rearing determinants. Environ Behav 11:87–104
Parrot R, Burgoon JK, Burgoon M, LePoire BA (1989) Privacy between physicians and patients: more than a matter of confidentiality. Soc Sci Med 29:1381–1385
Petronio S (2002) Boundaries of privacy: dialectics of disclosure. State University of New York Press, New York
Phelps JE, Nowak GJ, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Market 19:27–41
Phelps JE, D’Souza G, Nowak GJ (2001) J Interact Mark 15:2–17
Prosser WJ (1960) Privacy. Calif Law Rev 383:48
Schwarzer R (ed) (1992) Self-efficacy: thought control of action. Hemisphere, Washington, DC
Sheehan KB (1999) An investigation of gender differences in on-line privacy concerns and resultant behaviors. J Interact Mark 13:24–38
Sommer R (1959) Studies in personal space. Sociemetry 22:247–260
Sommer R (1969) Personal space. Prentice-Hall, Englewood Cliffs
Stephen JF (1967) Liberty, equality, fraternity. Liberty Fund, Indianapolis
Swaminathan V, Lepkowska-White E, Rao BP (1999) Browsers or buyers in cyberspace? An investigation of factors influencing electronic exchange. J Comput Mediat Commun 5(2). Retrieved on December 6, 2003, from http://www.ascusc.org/jcmc/vol5/issue2
Tavani H (2000) Privacy-enhancing technologies as a panacea for online privacy concerns. J Inform Ethics fall:26–36
Turkington RC, Allen AL (1999) Privacy law: cases and materials. West Group, St. Paul
UCLA Center for Communication Policy (2000) The UCLA internet report: surveying the digital future: year one. http://www.ccp.ucla.edu. Accessed 7 Oct 2001
UCLA Center for Communication Policy (2001) The UCLA internet report 2001: surveying the digital future: year two. http://www.ccp.ucla.edu. Accessed 21 Jan 2002
UCLA Center for Communication Policy (2003) The UCLA internet report: surveying the digital future: year three. http://www.digitalcenter.org/pdf/InternetReportYearThree.pdf. Accessed 1 Oct 2005
UCLA Center for Communication Policy (2004) The UCLA internet report: surveying the digital future: year four. http://www.digitalcenter.org/downloads/DigitalFutureReport-Year4-2004.pdf. Accessed 1 Oct 2005
Warren S, Brandeis L (1890) The right to privacy. Harvard Law Rev 4:193–220
Westin A (1967) Privacy and freedom. Atheneum, New York (Witte, 1994)
Wolfe M, Laufer R (1974) The concept of privacy in children and adolescence. In: Carson D (ed) Man-environment interactions: evaluations and applications: part 2, vol 6, Privacy. Environmental Design Research Association, Washington, DC, pp 29–54
Yao MZ, Linz D (2008) Predicting internet users’ self-protection of online privacy violations. CyberPsychol Behav 11:615–617
Yao MZ, Zhang JG (2008) Predicting user concerns about online privacy in Hong Kong. CyberPsychol Behav 11:779–781
Yao MZ, Rice R, Wallis K (2007) Predicting user concerns about online privacy. J Am Soc Inf Sci Technol 58:710–722
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yao, M.Z. (2011). Self-Protection of Online Privacy: A Behavioral Approach. In: Trepte, S., Reinecke, L. (eds) Privacy Online. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21521-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-21521-6_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21520-9
Online ISBN: 978-3-642-21521-6
eBook Packages: Computer ScienceComputer Science (R0)