skip to main content
10.1145/3543758.3547540acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmundcConference Proceedingsconference-collections
short-paper

Links Between Online Privacy Fatigue, Technology Attitudes and Sociodemographic Factors in a German Population Sample

Published: 15 September 2022 Publication History

Abstract

Frequent cases of misuse of online service users’ data and legislation such as the General Data Protection Regulation GDPR emphasize the need for usable and user-oriented privacy and security solutions. In order to make privacy usable, characteristics of different user groups need to be taken into account when designing solutions. A user characteristic gaining increasing attention in privacy research is the concept of privacy fatigue. Privacy fatigue refers to online users feeling exhausted and cynical due to dealing with online privacy issues. It can be considered a risk factor for privacy violations, as users with higher privacy fatigue are more likely to disclose personal data and feel helpless regarding privacy threats. However, little is known about the expression of privacy fatigue in the population and about its relations to other relevant user characteristics like self-perceived technology competency and acceptance. The present online questionnaire study therefore examined in a German population sample (N = 995) how two facets of privacy fatigue — exhaustion and cynicism — are expressed in different sociodemographic groups and how they are linked to technology-related attitudes. The study reveals, among other links, that privacy exhaustion and cynicism are highest among users with lower technology competency and lower educational level. From the results, implications for the design of privacy tools and privacy-oriented services are drawn and further steps for research on privacy fatigue discussed.

References

[1]
Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, and Gerald L. Lohse. 2004. International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society 20, 5 (Nov. 2004), 313–324. https://doi.org/10.1080/01972240490507956
[2]
Ann Cavoukian. 2009. Privacy by Design, Take the Challenge. Information and Privacy Commissioner of Ontario, Ontario. https://policycommons.net/artifacts/1202287/privacy-by-design-take-the-challenge/1755397/
[3]
Hanbyul Choi, Jonghwa Park, and Yoonhyuk Jung. 2018. The Role of Privacy Fatigue in Online Privacy Behavior. Computers in Human Behavior 81 (April 2018), 42–51. https://doi.org/10.1016/j.chb.2017.12.001
[4]
Matthew Chylinski and Anna Chu. 2010. Consumer Cynicism: Antecedents and Consequences. European Journal of Marketing 44, 6 (Jan. 2010), 796–837. https://doi.org/10.1108/03090561011032720
[5]
Devendra Dhagarra, Mohit Goswami, and Gopal Kumar. 2020. Impact of Trust and Privacy Concerns on Technology Acceptance in Healthcare: An Indian Perspective. International Journal of Medical Informatics 141 (Sept. 2020), 104164. https://doi.org/10.1016/j.ijmedinf.2020.104164
[6]
Ersin Dincelli and Shobha Chengalur-Smith. 2017. Applying the Transtheoretical Model of Behavior Change to Online Self-Disclosure. In ICIS 2017 Proceedings, Vol. 21. Association for Information Systems AIS Electronic Library (AISeL), Seoul, 1–11. http://aisel.aisnet.org/icis2017/Security/Presentations/21
[7]
Tamara Dinev and Paul Hart. 2005. Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact. International Journal of Electronic Commerce 10, 2 (Dec. 2005), 7–29. https://doi.org/10.2753/JEC1086-4415100201
[8]
Simson Garfinkel and Heather Richter Lipford. 2014. Usable Security: History, Themes, and Challenges. Synthesis Lectures on Information Security, Privacy, and Trust 5, 2 (Sept. 2014), 1–124. https://doi.org/10.2200/S00594ED1V01Y201408SPT011
[9]
Nina Gerber, Paul Gerber, and Melanie Volkamer. 2018. Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior. Computers & Security 77 (Aug. 2018), 226–261. https://doi.org/10.1016/j.cose.2018.04.002
[10]
Katelyn Golladay and Kristy Holtfreter. 2017. The Consequences of Identity Theft Victimization: An Examination of Emotional and Physical Health Outcomes. Victims & Offenders 12, 5 (Sept. 2017), 741–760. https://doi.org/10.1080/15564886.2016.1177766
[11]
Nikolai Horn and Anne Riechert. 2018. Praktische Umsetzung des Rechts auf Datenübertragbarkeit. Rechtliche, technische und verbraucherbezogene Implikationen. Stiftung Datenschutz, Leipzig.
[12]
Li‐tze Hu and Peter M. Bentler. 1999. Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives. Structural Equation Modeling: A Multidisciplinary Journal 6, 1 (Jan. 1999), 1–55. https://doi.org/10.1080/10705519909540118
[13]
Sophie Kuebler-Wachendorff, Robert Luzsa, Johann Kranz, Stefan Mager, Emmanuel Syrmoudis, Susanne Mayr, and Jens Grossklags. 2021. The Right to Data Portability: Conception, Status Quo, and Future Directions. Informatik Spektrum 44 (July 2021), 264–272. https://doi.org/10.1007/s00287-021-01372-w
[14]
Markus Lennartsson, Joakim Kävrestad, and Marcus Nohlberg. 2021. Exploring the meaning of usable security – a literature review. Information & Computer Security 29, 4 (Oct. 2021), 647–663. https://doi.org/10.1108/ICS-10-2020-0167
[15]
Tianyuan Li and Helene H. Fung. 2013. Age Differences in Trust: An Investigation Across 38 Countries. The Journals of Gerontology: Series B 68, 3 (May 2013), 347–355. https://doi.org/10.1093/geronb/gbs072
[16]
Christoph Lutz, Christian Pieter Hoffmann, and Giulia Ranzini. 2020. Data Capitalism and the User: An Exploration of Privacy Cynicism in Germany. New Media & Society 22, 7 (July 2020), 1168–1187. https://doi.org/10.1177/1461444820912544
[17]
Robert Luzsa, Susanne Mayr, Emmanuel Syrmoudis, Jens Grossklags, Sophie Kübler-Wachendorff, and Johann Kranz. 2022. Datenportabilität zwischen Online-Diensten: Nutzeranforderungen und Gestaltungsempfehlungen. Ergebnisse einer bevölkerungsrepräsentativen Befragung.bidt Working Paper 5(2022), 38 pages. https://doi.org/10.35067/BV16-2Z31
[18]
Nicholas Micallef, Mike Just, Lynne Baillie, and Maher Alharby. 2017. Stop Annoying Me!: An Empirical Investigation of the Usability of App Privacy Notifications. In Proceedings of the 29th Australian Conference on Computer-Human Interaction - OZCHI ’17. ACM Press, Brisbane, Queensland, Australia, 371–375. https://doi.org/10.1145/3152771.3156139
[19]
Franz J. Neyer, Juliane Felber, and Claudia Gebhardt. 2012. Entwicklung und Validierung einer Kurzskala zur Erfassung von Technikbereitschaft. Diagnostica 58, 2 (April 2012), 87–99. https://doi.org/10.1026/0012-1924/a000067
[20]
James O Prochaska and Wayne F Velicer. 1997. The Transtheoretical Change Model of Health Behavior Change. American Journal of Health Promotion 12, 1 (1997), 38–48. https://doi.org/10.4278/0890-1171-12.1.38
[21]
Carin M. M. Reep-van den Bergh and Marianne Junger. 2018. Victims of cybercrime in Europe: a review of victim surveys. Crime Science 7, 1 (Dec. 2018), 5. https://doi.org/10.1186/s40163-018-0079-3
[22]
Anne Riechert. 2020. Data Portability Policy Paper. https://stiftungdatenschutz.org/fileadmin/Redaktion/Datenportabilitaet/SDS_Datenportabilitaet-PolicyPaper2020-05-22_EN.pdf
[23]
Risk Based Security Inc.2022. 2021 Year End Report. Data Breach QuickView.https://pages.riskbasedsecurity.com/2021-year-end-data-breach-report
[24]
Yves Rosseel. 2012. lavaan: An R package for Structural Equation Modeling and More. https://users.ugent.be/~yrosseel/lavaan/lavaanIntroduction.pdf
[25]
Kim Bartel Sheehan. 1999. An Investigation of Gender Differences in On-line privacy Concerns and Resultant Behaviors.Journal of Interactive Marketing 13, 4 (1999), 24–38.
[26]
Smith, Dinev, and Xu. 2011. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, 4 (2011), 989 – 1015. https://doi.org/10.2307/41409970
[27]
Than Htut Soe, Oda Elise Nordberg, Frode Guribye, and Marija Slavkovik. 2020. Circumvention by Design - Dark Patterns in Cookie Consents for Online News Outlets. arXiv 2006.13985 [cs] (June 2020), 1–15. http://arxiv.org/abs/2006.13985 arXiv:2006.13985.
[28]
Brian Stanton, Mary F. Theofanos, Sandra Spickard Prettyman, and Susanne Furman. 2016. Security Fatigue. IT Professional 18, 5 (Sept. 2016), 26–32. https://doi.org/10.1109/MITP.2016.84
[29]
Jie Tang, Umair Akram, and Wenjing Shi. 2021. Why People Need Privacy? The Role of Privacy Fatigue in App Users’ Intention to Disclose Privacy: Based on Personality Traits. Journal of Enterprise Information Management 34, 4 (July 2021), 1097–1120. https://doi.org/10.1108/JEIM-03-2020-0088
[30]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, London United Kingdom, 973–990. https://doi.org/10.1145/3319535.3354212
[31]
Viswanath Venkatesh and Hillol Bala. 2008. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences 39, 2 (2008), 273–315. https://doi.org/10.1111/j.1540-5915.2008.00192.x
[32]
Viswanath Venkatesh and Fred D. Davis. 2000. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science 46, 2 (Feb. 2000), 186–204. https://doi.org/10.1287/mnsc.46.2.186.11926

Cited By

View all
  • (2025)Privacy fatigue and its effects on ChatGPT acceptance among undergraduate students: is privacy dead?Education and Information Technologies10.1007/s10639-024-13198-6Online publication date: 10-Jan-2025
  • (2024)Unlocking personal data from online services: user studies on data export experiences and data transfer scenariosHuman–Computer Interaction10.1080/07370024.2024.2325347(1-25)Online publication date: 20-Mar-2024
  • (2023)Understanding the privacy protection disengagement behaviour of contactless digital service users: the roles of privacy fatigue and privacy literacyBehaviour & Information Technology10.1080/0144929X.2023.223760343:10(2007-2023)Online publication date: 18-Jul-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MuC '22: Proceedings of Mensch und Computer 2022
September 2022
624 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 September 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. human-computer interaction
  2. online services
  3. privacy concerns
  4. privacy fatigue
  5. technology attitudes

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

Conference

MuC '22
MuC '22: Mensch und Computer 2022
September 4 - 7, 2022
Darmstadt, Germany

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)6
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Privacy fatigue and its effects on ChatGPT acceptance among undergraduate students: is privacy dead?Education and Information Technologies10.1007/s10639-024-13198-6Online publication date: 10-Jan-2025
  • (2024)Unlocking personal data from online services: user studies on data export experiences and data transfer scenariosHuman–Computer Interaction10.1080/07370024.2024.2325347(1-25)Online publication date: 20-Mar-2024
  • (2023)Understanding the privacy protection disengagement behaviour of contactless digital service users: the roles of privacy fatigue and privacy literacyBehaviour & Information Technology10.1080/0144929X.2023.223760343:10(2007-2023)Online publication date: 18-Jul-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media