skip to main content
10.1145/3492323.3495620acmconferencesArticle/Chapter ViewAbstractPublication PagesuccConference Proceedingsconference-collections
research-article

General data protection regulation: an individual's perspective

Published: 07 February 2022 Publication History

Abstract

Rapid digitalisation has resulted in a massive exchange of digital data between individuals and organisations, accelerating the importance of privacy-preserving legal frameworks, such as the General Data Protection Regulation (GDPR). Despite the importance of the implementation of such a framework, current research lacks evidence about how individuals perceive GDPR compliance. Given that, the objective of this study was to explore individuals' attitudes towards GDPR compliance in line with Protection Motivation Theory. This study employed a cross-sectional research design and collected 540 valid responses to test a model using structural equational modelling. The result of the analysis showed that perceived threat severity, response efficacy and self-efficacy have positive relationships with attitude towards GDPR compliance. In addition, it was found that attitude correlates with emotional empowerment. The findings of this paper contribute to the literature on privacy-preserving mechanisms by shedding light on individuals' perceptions of the GDPR. The evidence also adds to the current body of literature on information systems management by giving insights into the factors that determine the utilisation of privacy-preserving technologies. These pieces of evidence offer implications for policymakers by providing guidelines on how to communicate the benefits of the GDPR to the public.

References

[1]
Pandey, N. and A. Pal, Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International journal of information management, 2020. 55: p. 102171.
[2]
Goddard, M., The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 2017. 59(6): p. 703--705.
[3]
van Ooijen, I. and H.U. Vrabec, Does the GDPR enhance consumers' control over personal data? An analysis from a behavioural perspective. Journal of consumer policy, 2019. 42(1): p. 91--107.
[4]
Albrecht, J.P., How the GDPR will change the world. Eur. Data Prot. L. Rev., 2016. 2: p. 287.
[5]
Truong, N.B., et al., Gdpr-compliant personal data management: A blockchain-based solution. IEEE Transactions on Information Forensics and Security, 2019. 15: p. 1746--1761.
[6]
Larrucea, X., et al., Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0. Computer Standards & Interfaces, 2020. 69: p. 103408.
[7]
Paul, C., K. Scheibe, and S. Nilakanta. Privacy concerns regarding wearable IoT devices: how it is influenced by GDPR? in Proceedings of the 53rd Hawaii International Conference on System Sciences. 2020.
[8]
Zaeem, R.N. and K.S. Barber, The effect of the GDPR on privacy policies: Recent progress and future promise. ACM Transactions on Management Information Systems (TMIS), 2020. 12(1): p. 1--20.
[9]
Campanile, L., et al., Designing a GDPR compliant blockchain-based IoV distributed information tracking system. Information Processing & Management, 2021. 58(3): p. 102511.
[10]
Mougiakou, E. and M. Virvou. Based on GDPR privacy in UML: case of e-learning program. in 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA). 2017. IEEE.
[11]
Sanchez-Rola, I., et al. Can i opt out yet? gdpr and the global illusion of cookie control. in Proceedings of the 2019 ACM Asia conference on computer and communications security. 2019.
[12]
De Hert, P., et al., The right to data portability in the GDPR: Towards user-centric interoperability of digital services. Computer law & security review, 2018. 34(2): p. 193--203.
[13]
Forcier, M.B., et al., Integrating artificial intelligence into health care through data access: can the GDPR act as a beacon for policymakers? Journal of Law and the Biosciences, 2019. 6(1): p. 317.
[14]
Kuner, C., The GDPR and international organizations. American Journal of International Law, 2020. 114: p. 15--19.
[15]
de Búrca, G., Introduction to the Symposium on the GDPR and International Law. American Journal of International Law, 2020. 114: p. 1--4.
[16]
Mombeuil, C., An exploratory investigation of factors affecting and best predicting the renewed adoption of mobile wallets. Journal of Retailing and Consumer Services, 2020. 55: p. 102127.
[17]
Oghazi, P., et al., User self-disclosure on social network sites: A cross-cultural study on Facebook's privacy concepts. Journal of Business Research, 2020. 112: p. 531--540.
[18]
Menard, P., G.J. Bott, and R.E. Crossler, User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 2017. 34(4): p. 1203--1230.
[19]
Ifinedo, P., Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 2012. 31(1): p. 83--95.
[20]
Boss, S.R., et al., What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. 2015.
[21]
Wu, D., Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior. Computers in Human Behavior, 2020. 105: p. 106229.
[22]
Rogers, R.W., Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychophysiology: A sourcebook, 1983: p. 153--176.
[23]
Crossler, R.E. Protection motivation theory: Understanding determinants to backing up personal data. in 2010 43rd Hawaii International Conference on System Sciences. 2010. IEEE.
[24]
Lee, Y., Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decision Support Systems, 2011. 50(2): p. 361--369.
[25]
Chenoweth, T., R. Minch, and T. Gattiker. Application of protection motivation theory to adoption of protective technologies. in 2009 42nd Hawaii International Conference on System Sciences. 2009. IEEE.
[26]
Vance, A., M. Siponen, and S. Pahnila, Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 2012. 49(3--4): p. 190--198.
[27]
Hass, J.W., G.S. Bagley, and R.W. Rogers, Coping with the energy crisis: Effects of fear appeals upon attitudes toward energy consumption. Journal of Applied Psychology, 1975. 60(6): p. 754.
[28]
Woon, I., G.-W. Tan, and R. Low, A protection motivation theory approach to home wireless security. ICIS 2005 proceedings, 2005: p. 31.
[29]
Bandura, A., Self-efficacy mechanism in human agency. American psychologist, 1982. 37(2): p. 122.
[30]
Rippetoe, P.A. and R.W. Rogers, Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of personality and social psychology, 1987. 52(3): p. 596.
[31]
Lee, Y. and K.R. Larsen, Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 2009. 18(2): p. 177--187.
[32]
Schwarz, N., Attitude construction: Evaluation in context. Social cognition, 2007. 25(5): p. 638--656.
[33]
Tamilmani, K., N.P. Rana, and Y.K. Dwivedi, Consumer acceptance and use of information technology: A meta-analytic evaluation of UTAUT2. Information Systems Frontiers, 2020: p. 1--19.
[34]
Karahanna, E., D.W. Straub, and N.L. Chervany, Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS quarterly, 1999: p. 183--213.
[35]
Maton, K.I., Empowering community settings: Agents of individual development, community betterment, and positive social change. American journal of community psychology, 2008. 41(1--2): p. 4--21.
[36]
Mak, V. and E. Terryn, Circular economy and consumer protection: The consumer as a citizen and the limits of empowerment through consumer law. Journal of Consumer Policy, 2020. 43(1): p. 227--248.
[37]
Guchait, P., M.G. Kim, and K. Namasivayam, Error management at different organizational levels-frontline, manager, and company. International Journal of Hospitality Management, 2012. 31(1): p. 12--22.
[38]
Peterson, N.A., et al., Psychometric properties of a Recovery Empowerment Scale: Testing emotional, cognitive, behavioral, and relational domains. Journal of Community Psychology, 2021.
[39]
Boshoff, C., An experimental study of service recovery options. International Journal of service industry management, 1997.
[40]
Elliott, M.A., C.J. Armitage, and C.J. Baughan, Using the theory of planned behaviour to predict observed driving behaviour. British journal of social psychology, 2007. 46(1): p. 69--90.
[41]
Hair, J.F., et al., Multivariate data analysis: Pearson new international edition. Essex: Pearson Education Limited, 2014.

Cited By

View all
  • (2024)Understanding Chinese Internet Users' Perceptions of, and Online Platforms' Compliance with, the Personal Information Protection Law (PIPL)Proceedings of the ACM on Human-Computer Interaction10.1145/36374158:CSCW1(1-26)Online publication date: 26-Apr-2024
  • (2023)Chatbots in Pharmacy: A Boon or a Bane for Patient Care and Pharmacy Practice?Sciences of Pharmacy10.58920/sciphar020300012:3(1-23)Online publication date: 3-Jul-2023
  • (2022)SPChain: A Smart and Private Blockchain-Enabled Framework for Combining GDPR-Compliant Digital Assets Management With AI ModelsIEEE Access10.1109/ACCESS.2022.322796910(130424-130443)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UCC '21: Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion
December 2021
256 pages
ISBN:9781450391634
DOI:10.1145/3492323
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE TCSC: IEEE Technical Committee on Scalable Computing

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 February 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. GDPR
  2. digital economy
  3. protection motivation theory

Qualifiers

  • Research-article

Funding Sources

Conference

UCC '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 38 of 125 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)55
  • Downloads (Last 6 weeks)7
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Understanding Chinese Internet Users' Perceptions of, and Online Platforms' Compliance with, the Personal Information Protection Law (PIPL)Proceedings of the ACM on Human-Computer Interaction10.1145/36374158:CSCW1(1-26)Online publication date: 26-Apr-2024
  • (2023)Chatbots in Pharmacy: A Boon or a Bane for Patient Care and Pharmacy Practice?Sciences of Pharmacy10.58920/sciphar020300012:3(1-23)Online publication date: 3-Jul-2023
  • (2022)SPChain: A Smart and Private Blockchain-Enabled Framework for Combining GDPR-Compliant Digital Assets Management With AI ModelsIEEE Access10.1109/ACCESS.2022.322796910(130424-130443)Online publication date: 2022
  • (2022)Homogeneous Learning: Self-Attention Decentralized Deep LearningIEEE Access10.1109/ACCESS.2022.314289910(7695-7703)Online publication date: 2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media