skip to main content
10.1145/3481127.3481176acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemeConference Proceedingsconference-collections
research-article

Research on the Influence of Internet Privacy Setting Structure on User Privacy Decision

Published:02 December 2021Publication History

ABSTRACT

In order to study the influence mechanism of Internet setting structure on user privacy decisions, this paper puts forward some suggestions on the structure of Internet application enterprise privacy policy setting. Methods: Based on the theoretical model of planning behavior, this study constructs a theoretical model of the influence of Internet privacy structure setting on user privacy decisions. Research shows that the privacy audience setting can influence the privacy decision of the user indirectly through the perception control, but also indirectly through the subjective norm.

References

  1. XX. 2016. The Corporate Responsibility and Practice of the Protection of Internet Users' Rights —— China Internet Congress 2016 China Internet users' Rights and interests Protection Forum will be held in June. China Internet, 05(2016), 84-85.Google ScholarGoogle Scholar
  2. Hui KL, Teo HH, Lee SYT. 2007. The value of privacy assurance: An exploratory field experiment. Mis Quart 31, 1(March 2007), 19-33. https://doi.org/10.2307/25148779Google ScholarGoogle ScholarCross RefCross Ref
  3. Xu H, Teo H-H, Tan BCY, Agarwal R. 2012. Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research 23, 4(Dec 2012), 1342-1363. https://doi.org/10.1287/isre.1120.0416Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Zhao L, Lu YB, Gupta S. 2012. Disclosure Intention of Location-Related Information in Location-Based Social Network Services. International Journal of Electronic Commerce 16, 4(Sum 2012), 53-89. https://doi.org/10.2753/jec1086-4415160403Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rui J, Stefanone MAJCiHB. 2013. Strategic self-presentation online: A cross-cultural study. Computers inhuman behavior 29, 1(2013), 110-118. https://doi.org/10.1016/j.chb.2012.07.022Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Roselyn, J., Lee-Won, Minsun, Shim, Yeon, 2014. Who puts the best "face" forward on Facebook?: Positive self-presentation in online social networking and the role of self-consciousness, actual-to-total Friends ratio, and culture - ScienceDirect. Computers in human behavior 39, Oct.(2014), 413-423. https://doi.org/10.1016/j.chb.2014.08.007Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shane-Simpson C, Manago A, Gaggi N, Gillespie-Lynch KJCiHB. 2018. Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital. Computers in human behavior 86, SEP.(2018), 276-288. https://doi.org/10.1016/j.chb.2018.04.041Google ScholarGoogle ScholarCross RefCross Ref
  8. Bansal G, Zahedi FM, Gefen DJI, Management. 2016. Do context and personality matter? Trust and privacy concerns in disclosing private information online. Elsevier science publishers BV 53, 1(2016), https://doi.org/10.1016/j.im.2015.08.001Google ScholarGoogle ScholarCross RefCross Ref
  9. Morosan C, Defranco A. 2015. Disclosing personal information via hotel apps: A privacy calculus perspective. International Journal of Electronic Commerce 47, (2015), 120-130. https://doi.org/10.2753/JEC1086-4415160403Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Libaque-Saenz C, Chang Y, Kim J, Park MC, Rho JJJB, Technology I. 2016. The role of perceived information practices on consumers' intention to authorise secondary use of personal data. Behaviour & information technology, (2016), 339-356. https://doi.org/10.1080/0144929X.2015.1128973Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Li Yanhui LL, Liu Bailing. 2016. An Empirical Study of the Privacy Belief and Information Disclosure Intention of Mobile Social Network User. Information Studies: Theory & Application 39, 06(2016), 76-81. https://doi.org/10.16353/j.cnki.1000-7490.2016.06.015Google ScholarGoogle ScholarCross RefCross Ref
  12. Yuan Hong HY. 2016. On Personal Data Privacy Paradox of Network Generation on Basis of Wechat Usage. Journal of Information 35, 03(2016), 169-173+164. https://doi.org/10.3969/j.issn.1002-1965.2016.03.030Google ScholarGoogle ScholarCross RefCross Ref
  13. Ming S. Research on Privacy Information Disclosure Behavior in LBSNS Based on Evolutionary Game: South China University of Technology; 2016.Google ScholarGoogle Scholar
  14. Hao Sensen XZ, Zhong Zheming. 2017. Enterprise Mobile Terminal App User Information Privacy Concern Model. Library and Information Service 61, 05(2017), 57-65. https://doi.org/10.13266/j.issn.0252-3116.2017.05.008Google ScholarGoogle ScholarCross RefCross Ref
  15. Zhang Yue SX, Lu Jiaying, 2018. The Empirical Research on the Willingness of Information Disclosure for Mobile Social Platform Users———Taking Wechat as an Example. Library & Information, 03(2018), 90-97. https://doi.org/10.11968/tsyqb.1003-6938.2018049Google ScholarGoogle ScholarCross RefCross Ref
  16. Malhotra NK, Kim SS, Agarwal JJISR. 2004. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4(2004), 336-355. https://doi.org/10.1287/isre.1040.0032Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Zhang Xing CX, Hou Delin, 2016. An analysis of online health information disclosure willingness influencing factors: An integrated of TPB and Privacy Calculus. Information and Documentation Services, 01(2016), 48-53. https://doi.org/CNKI:SUN:QBZL.0.2016-01-011Google ScholarGoogle Scholar
  18. Choi B, Land LJI, Management. 2016. The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage. Information & Management 53, 7(2016), 868-877. https://doi.org/10.1016/j.im.2016.02.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Wang T, Duong TD, Management CCJIJoI. 2016. Intention to disclose personal information via mobile applications: A privacy calculus perspective. International journal of information management 36, 4(2016), 531-542. https://doi.org/10.1016/j.ijinfomgt.2016.03.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Pentina I, Zhang L, Bata H, Chen YJCiHB. 2016. Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior 65, DEC.(2016), 409-419. https://doi.org/10.1016/j.chb.2016.09.005Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Lim N. 2004. Consumers' perceived risk: Sources versus consequences. Electronic Commerce Research & Applications 2, 3(2004), 216-228. https://doi.org/10.1016/S1567-4223(03)00025-5Google ScholarGoogle ScholarCross RefCross Ref
  22. Hallam C, Zanella GJCiHB. 2017. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior 68, MAR.(2017), 217-227. https://doi.org/10.1016/j.chb.2016.11.033Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. James TL, Warkentin M, Collignon SE. 2015. A dual privacy decision model for online social networks. Information & Management 52, 8(Dec 2015), 893-908. https://doi.org/10.1016/j.im.2015.07.010Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Zlatolas LN, Welzer T, Heri?Ko M, H?Lbl MJCiHB. 2015. Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior 45, apr.(2015), 158-167. https://doi.org/10.1016/j.chb.2014.12.012Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Heirman W, Walrave M, Vermeulen A, Ponnet K, Vandebosch H, Ouytsel JV, 2016. An open book on Facebook? Examining the interdependence of adolescents' privacy regulation strategies. Behaviour & Information Technology, (2016), 1-14. https://doi.org/10.1080/0144929x.2016.1181210Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. ZHANG, RUIDONG, CHEN, Jim Q, Lee CJJoCIS. 2013. MOBILE COMMERCE AND CONSUMER PRIVACY CONCERNS. Journal of Computer Information Systems, (2013), https://doi.org/10.1080/08874417.2013.11645648Google ScholarGoogle ScholarCross RefCross Ref
  27. Wang SC, Wu JH. 2014. Proactive privacy practices in transition: Toward ubiquitous services. Information & Management 51, 1(Jan 2014), 93-103. https://doi.org/10.1016/j.im.2013.09.005Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Li X, Xi C, editors. Factors affecting privacy disclosure on social network sites: an integrated model. International Conference on Multimedia Information Networking & Security; 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Tsai JY, Kelley P, Drielsma P, Cranor L, Sadeh N, editors. Who's viewed you?: the impact of feedback in a mobile location-sharing application. Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009; 2009.Google ScholarGoogle Scholar
  30. Jiayin L. 2018. The Impact of Social Media on Young Adults’ Political Participation, and Moderation Effects of Internet Regulation: A Survey on Students from Nine Universities in China. Chinese Journal of Journalism & Communication 40, 08(2018), 98-121. https://doi.org/10.13495/j.cnki.cjjc.2018.08.006Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEME '21: Proceedings of the 2021 12th International Conference on E-business, Management and Economics
    July 2021
    882 pages
    ISBN:9781450390064
    DOI:10.1145/3481127

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 December 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format