1,193
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

Revealing the relationship between rational fatalism and the online privacy paradox

ORCID Icon, &
Pages 742-759 | Received 03 Dec 2017, Accepted 19 Nov 2018, Published online: 04 Dec 2018

References

  • Altschuller, S., and R. Benbunan-Fich. 2013. “The Pursuit of Trust in Ad Hoc Virtual Teams: How Much Electronic Portrayal is too Much?” European Journal of Information Systems 22 (6): 619–636.
  • Alwin, D. F. 1973. “The Use of Factor Analysis in the Construction of Linear Composites in Social Research.” Sociological Methods & Research 2 (2): 191–212.
  • Archambault, E., and C. Shue. 2012. “Understanding New Anonymity Networks From a User’s Perspective.” Proceedings of the 2012 ACM conference on Computer and Communications Security, Raleigh, NC.
  • Arthur, L. 2013. Big Data Marketing: Engage Your Customers More Effectively and Drive Value. Hoboken, NJ: Wiley.
  • Bargh, J. A., K. Y. McKenna, and G. M. Fitzsimons. 2002. “Can You See the Real me? Activation and Expression of the “True Self” on the Internet.” Journal of Social Issues 58 (1): 33–48.
  • Barnes, S. 2006. “A Privacy Paradox: Social Networking in the United States.” First Monday 11 (9). doi:10.5210/fm.v11i9.1394.
  • Barnett, T., and P. Blaikie. 1992. AIDS in Africa: Its Present and Future Impact. London: The Guilford Press.
  • Barth, S., and M. D. de Jong. 2017. “The Privacy Paradox – Investigating Discrepancies Between Expressed Privacy Concerns and Actual Online Behavior – A Systematic Literature Review.” Telematics and Informatics 34: 1038–1058.
  • Benson, V., G. Saridakis, and H. Tennakoon. 2015. “Information Disclosure of Social Media Users: Does Control Over Personal Information, User Awareness and Security Notices Matter?” Information Technology & People 28 (3): 426–441.
  • Berger, C. R. 1986. “Uncertain Outcome Values in Predicted Relationships Uncertainty Reduction Theory Then and now.” Human Communication Research 13 (1): 34–38.
  • Blank, G., G. Bolsover, and E. Dubois. 2014. “ A New Privacy Paradox: Young People and Privacy on Social Network Sites.” Global Cyber Security Capacity Centre. Accessed August 15, 2014. http://www.oxfordmartin.ox.ac.uk/downloads/A20New20Privacy20Paradox20April%202014.pdf.
  • Burgoon, J. K., R. Parrott, B. A. Le Poire, D. L. Kelley, J. B. Walther, and D. Perry. 1989. “Maintaining and Restoring Privacy Through Communication in Different Types of Relationships.” Journal of Social and Personal Relationships 6 (2): 131–158.
  • Caplan, S. E. 2003. “Preference for Online Social Interaction: A Theory of Problematic Internet use and Psychosocial Well-Being.” Communication Research 30 (6): 625–648.
  • Cecere, G., F. Le Guel, and N. Soulié. 2015. “Perceived Internet Privacy Concerns on Social Networks in Europe.” Technological Forecasting and Social Change 96: 277–287.
  • Chahoud, M., R. Chahine, P. Salameh, and E. A. Sauleau. 2017. “Reliability, Factor Analysis and Internal Consistency Calculation of the Insomnia Severity Index (ISI) in French and in English among Lebanese Adolescents.” eNeurologicalSci 7: 9–14.
  • Chandler, C. R. 1979. “Traditionalism in a Modern Setting: A Comparison of Anglo-and Mexican-American Value Orientations.” Human Organization 38 (2): 153–159.
  • Chen, K., and A. Rea, Jr. 2004. “Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques.” Journal of Computer Information Systems 44 (4): 85–92.
  • Cho, H., J. S. Lee, and S. Chung. 2010. “Optimistic Bias About Online Privacy Risks: Testing the Moderating Effects of Perceived Controllability and Prior Experience.” Computers in Human Behavior 26 (5): 987–995.
  • Clarke, J. H., B. V. MacPherson, and D. R. Holmes. 1982. “Cigarette Smoking and External Locus of Control among Young Adolescents.” Journal of Health and Social Behavior 23 (3): 253–259.
  • Cohen, J., P. Cohen, S. G. West, and L. S. Aiken. 2014. Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. London: Psychology Press.
  • Debatin, B., J. P. Lovejoy, A. K. Horn, and B. N. Hughes. 2009. “Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences.” Journal of Computer-Mediated Communication 15 (1): 83–108.
  • DeVellis, R. F. 2003. Scale Development: Theory and Applications. 2nd ed. Thousand Oaks, CA: Sage.
  • Dienlin, T., and M. J. Metzger. 2016. “An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative US Sample.” Journal of Computer-Mediated Communication 21 (5): 368–383.
  • DiStefano, C., M. Zhu, and D. Mindrila. 2009. “Understanding and Using Factor Scores: Considerations for the Applied Researcher.” Practical Assessment, Research & Evaluation 14 (20): 1–11.
  • Esparza, O. A., J. S. Wiebe, and J. Quiñones. 2015. “Simultaneous Development of a Multidimensional Fatalism Measure in English and Spanish.” Current Psychology 34 (4): 597–612.
  • European Commission. (2012, January 25). “ Commission Proposes a Comprehensive Reform of Data Protection Rules to Increase Users’ Control of Their Data and to Cut Costs for Businesses.” Accessed January 25, 2012. http://europa.eu/rapid/press-release_IP-12-46_en.htm.
  • Fogel, J., and E. Nehmad. 2009. “Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns.” Computers in Human Behavior 25 (1): 153–160.
  • Fonseca, M. J., P. Costa, L. Lencastre, and F. Tavares. 2013. “A Statistical Approach to Quantitative Data Validation Focused on the Assessment of Students’ Perceptions About Biotechnology.” SpringerPlus 2 (1): 496–509.
  • Franklin, M. D., D. G. Schlundt, L. H. McClellan, T. Kinebrew, J. Sheats, R. Belue, A. Brown, D. Smikes, K. Patel, and M. Hargreaves. 2007. “Religious Fatalism and its Association with Health Behaviors and Outcomes.” American Journal of Health Behavior 31 (6): 563–572.
  • Garson, D. 2014. Multiple Regression. Asheboro, NC: Statistical Publishing Associates.
  • Gorsuch, R. L. (1983). Factor Analysis (2nd ed.). Hillsdale, NJ: Erlbaum Associates.
  • Green, T., T. Wilhelmsen, E. Wilmots, B. Dodd, and S. Quinn. 2016. “Social Anxiety, Attributes of Online Communication and Self-Disclosure Across Private and Public Facebook Communication.” Computers in Human Behavior 58: 206–213.
  • Greene, K., V. J. Derlega, and A. Mathews. 2006. “Self-disclosure in Personal Relationships.” In The Cambridge Handbook of Personal Relationships, edited by A. Vangelisti and D. Pelman, 409–427. New York: Cambridge University Press.
  • Grice, J. W. 2001. “Computing and Evaluating Factor Scores.” Psychological Methods 6 (4): 430–450.
  • Grice, J. W., and R. J. Harris. 1998. “A Comparison of Regression and Loading Weights for the Computation of Factor Scores.” Multivariate Behavioral Research 33 (2): 221–247.
  • Guthrie, L. C., S. C. Butler, K. Lessl, O. Ochi, and M. M. Ward. 2014. “Time Perspective and Exercise, Obesity, and Smoking: Moderation of Associations by age.” American Journal of Health Promotion 29 (1): 9–16.
  • Hann, I.-H., K.-L. Hui, S.-Y. T. Lee, and I. P. L. Png. 2007. “Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach.” Journal of Management Information Systems 24 (2): 13–42.
  • Hannak, A., G. Soeller, D. Lazer, A. Mislove, and C. Wilson. 2014. “Measuring Price Discrimination and Steering on e-Commerce web Sites.” Proceedings of the 2014 conference on Internet Measurement Conference, Vancouver, BC, Canada.
  • Hoffmann, C. P., C. Lutz, and G. Ranzini. 2016. “Privacy Cynicism: A new Approach to the Privacy Paradox.” Cyberpsychology: Journal of Psychological Research on Cyberspace 10 (4): article 7.
  • Holland, H. B. 2010. “Privacy Paradox 2.0.” Widener Law Journal 19 (3): 893–932.
  • Hubbell, F. A., L. R. Chavez, S. I. Mishra, and R. B. Valdez. 1996. “Beliefs About Sexual Behavior and Other Predictors of Papanicolaou Smear Screening among Latinas and Anglo Women.” Archives of Internal Medicine 156 (20): 2353–2358.
  • Ignatius, E., and M. Kokkonen. 2007. “Factors Contributing to Verbal Self-Disclosure.” Nordic Psychology 59 (4): 362–391.
  • Jamal, A. 2011. “ Towards a Taxonomy of Privacy Concerns of Online Social Network Sites Users: A Case Study of Facebook Beacon.” Accessed January 25, 2011. http://kth.diva-portal.org/smash/record.jsf?pid=diva2%3A391634&dswid=-7117.
  • Jensen, C., C. Potts, and C. Jensen. 2005. “Privacy Practices of Internet Users: Self-Reports Versus Observed Behavior.” International Journal of Human-Computer Studies 63 (1-2): 203–227.
  • Jiang, Z., C. S. Heng, and B. C. Choi. 2013. “Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions.” Information Systems Research 24 (3): 579–595. [Chicago].
  • Joiner, T. E. Jr, M. Perez, K. D. Wagner, A. Berenson, and G. S. Marquina. 2001. “On Fatalism, Pessimism, and Depressive Symptoms among Mexican-American and Other Adolescents Attending an Obstetrics-Gynecology Clinic.” Behaviour Research and Therapy 39 (8): 887–896.
  • Joinson, A. N., U. D. Reips, T. Buchanan, and C. B. P. Schofield. 2010. “Privacy, Trust, and Self-Disclosure Online.” Human–Computer Interaction 25 (1): 1–24.
  • Jorstad, E. 2001. “The Privacy Paradox.” William Mitchell Law Review 27 (3): Article 16.
  • Jung, J., and J. Kim. 2015. “A Study on Developing Framework for Information Privacy Protection.” Proceedings of the 17th International Conference on Electronic Commerce 2015, Seoul, Republic of Korea.
  • Kerwin, J. T. 2012. “Rational Fatalism’: Non-Monotonic Choices in Response to Risks.” Paper presented at the Working group in African Political Economy meeting, University of California, Berkeley, CA.
  • Kim, J., and J.-E. R. Lee. 2011. “The Facebook Paths to Happiness: Effects of the Number of Facebook Friends and Self-Presentation on Subjective Well-Being.” Cyberpsychology, Behavior and Social Networking 14 (6): 359–364.
  • Kimberlin, C. L., and A. G. Winterstein. 2008. “Validity and Reliability of Measurement Instruments Used in Research.” American Journal of Health-System Pharmacy 65 (23): 2276–2284.
  • Kokolakis, S. 2015. “Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon.” Computers & Security 64: 122–134.
  • Kosta, E., and J. Dumortier. 2008. “Searching the Man Behind the Tag: Privacy Implications of RFID Technology.” International Journal of Intellectual Property Management 2 (3): 276–288.
  • Kumar, S., K. Saravanakumar, and K. Deepa. 2016. “On Privacy and Security in Social Media–A Comprehensive Study.” Procedia Computer Science 78: 114–119.
  • Lee, H., H. Park, and J. Kim. 2013. “Why do People Share Their Context Information on Social Network Services? A Qualitative Study and an Experimental Study on Users’ Behavior of Balancing Perceived Benefit and Risk.” International Journal of Human-Computer Studies 71 (9): 862–877.
  • Leon, G., and E. Miguel. 2011. Transportation Choices, Fatalism and the Value of Life in Africa (Working Paper). Working Group in African Political Economy. Berkeley: University of California.
  • Lessing, L. 1998. “ The Architecture of Privacy.” http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf.
  • Libert, Timothy. 2015. “Exposing the Hidden Web: Third-Party HTTP Requests on one Million Websites.” International Journal of Communication 9: 3544–3561.
  • Loewenthal, K. M. 2004. An Introduction to Psychological Tests and Scales. 2nd ed. Hove: Psychology Press.
  • Manago, A., T. Taylor, and P. M. Greenfield. 2012. “Me and my 400 Friends: The Anatomy of College Students’ Facebook Networks, Their Communication Patterns, and Well-Being.” Developmental Psychology 48 (2): 369–380.
  • Mayo, R. M., J. R. Ureda, and V. G. Parker. 2001. “Importance of Fatalism in Understanding Mammography Screening in Rural Elderly Women.” Journal of Women & Aging 13 (1): 57–72.
  • McCarthy, J. D., and W. L. Yancey. 1971. “Uncle Tom and Mr. Charlie: Metaphysical Pathos in the Study of Racism and Personal Disorganization.” American Journal of Sociology 76 (4): 648–672.
  • Mesch, G. S. 2012. “Is Online Trust and Trust in Social Institutions Associated with Online Disclosure of Identifiable Information Online?” Computers in Human Behavior 28 (4): 1471–1477.
  • Mesch, G. S., and G. Beker. 2010. “Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?” Human Communication Research 36 (4): 570–592.
  • Milne, G. R., and M. J. Culnan. 2004. “Strategies for Reducing Online Privacy Risks: Why Consumers Read (or Don’t Read) Online Privacy Notices.” Journal of Interactive Marketing 18 (3): 15–29.
  • Moscardelli, D. M., and R. Divine. 2007. “Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships with Privacy‐Protecting Behaviors.” Family and Consumer Sciences Research Journal 35 (3): 232–252.
  • Neff, J. A., and S. K. Hoppe. 1993. “Race/Ethnicity, Acculturation, and Psychological Distress: Fatalism and Religiosity as Cultural Resources.” Journal of Community Psychology 21 (1): 3–20.
  • O'Reilly, T. 2006. “ Web 2.0 Compact Definition: Trying Again.” Accessed June 29, 2009. http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html.
  • Neter, J., M. H. Kutner, C. J. Nachtsheim, and W. Wasserman. 1996. Applied Linear Statistical Models. Chicago, IL: Irwin.
  • Norberg, P., D. Horne, and D. Horne. 2007. “The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors.” Journal of Consumer Affairs 41 (1): 100–126.
  • Petronio, S. 1991. “Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples.” Communication Theory 1 (4): 311–335.
  • Powe, B. D., and R. Finnie. 2003. “Cancer Fatalism: the State of the Science.” Cancer Nursing 26 (6): 454–467.
  • Powe, B. D., and A. Johnson. 1995. “Fatalism as a Barrier to Cancer Screening among African-Americans: Philosophical Perspectives.” Journal of Religion and Health 34 (2): 119–126.
  • Rainie, L., S. Kiesler, R. Kang, and M. Madden. 2013. “Anonymity, Privacy, and Security Online.” Accessed September 5, 2013 from file:///C:/Users/Wenjing%20Non-Admin/Downloads/PIP_AnonymityOnline_090513%20(1).pdf
  • Rice, H. 2002. “Fatalism.” In The Stanford Encyclopedia of Philosophy, edited by E. Zalta. https://plato.stanford.edu/entries/fatalism/
  • Ritvo, P., R. E. Myers, L. Paszat, M. Serenity, D. F. Perez, and L. Rabeneck. 2013. “Gender Differences in Attitudes Impeding Colorectal Cancer Screening.” BMC Public Health 13 (1): 500–514.
  • Robinson, J. P., P. R. Shaver, L. S. Wrightsman, J. P. Robinson, P. R. Shaver, and L. S. Wrightsman. 1991. “Criteria for Scale Selection and Evaluation.” In Measures of Personality and Social Psychological Attitudes, 1–15. San Diego, CA: Academia Press.
  • Rogers, R. W. 1975. “A Protection Motivation Theory of Fear Appeals and Attitude Change.” Journal of Psychology 91 (1): 93–114.
  • Russell, D. W. 2002. “In Search of Underlying Dimensions: The use (and Abuse) of Factor Analysis in Personality and Social Psychology Bulletin.” Personality and Social Psychology Bulletin 28 (12): 1629–1646.
  • Sang, L. 2015. “ Social Big Data and Privacy Awareness.” Unpublished master thesis.
  • Sarathy, R. 2003. “Privacy Protection and Global Marketing: Balancing Consumer and Corporate Interests.” In Handbook of Research in International Marketing, edited by S. C. Jain, 358–376. Northampton, MA: Edward Elgar Pub.
  • Sawilowsky, S. 2009. “New Effect Size Rules of Thumb.” Journal of Modern Applied Statistical Methods 8 (2): 467–474.
  • Scheier, M. F., and M. W. Bridges. 1995. “Person Variables and Health: Personality Predispositions and Acute Psychological States as Shared Determinants for Disease.” Psychosomatic Medicine 57 (3): 255–268.
  • Semenza, J. C., D. E. Hall, D. J. Wilson, B. D. Bontempo, D. J. Sailor, and L. A. George. 2008. “Public Perception of Climate Change: Voluntary Mitigation and Barriers to Behavior Change.” American Journal of Preventive Medicine 35 (5): 479–487.
  • Shen, L., C. M. Condit, and L. Wright. 2009. “The Psychometric Property and Validation of a Fatalism Scale.” Psychology and Health 24 (5): 597–613.
  • Shugart, H. 2011. “Heavy Viewing: Emergent Frames in Contemporary News Coverage of Obesity.” Health Communication 26: 635–648.
  • Solove, D. J. 2013. “ Privacy Self-management and the Consent Dilemma.” http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&context=faculty_publications.
  • Somlai, A. M., J. A. Kelly, T. G. Heckman, K. Hackl, L. Runge, and C. Wright. 2000. “Life Optimism, Substance use, and AIDS-Specific Attitudes Associated with HIV Risk Behavior among Disadvantaged Innercity Women.” Journal of Women's Health & Gender-Based Medicine 9 (10): 1101–1111.
  • Sundar, S. S., H. Kang, M. Wu, E. Go, and B. Zhang. 2013. “Unlocking the Privacy Paradox: do Cognitive Heuristics Hold the key?.” CHI'13 Extended Abstracts on Human Factors in Computing Systems, 811–816. ACM.
  • Sutanto, J., E. Palme, C. Tan, and C. W. Phang. 2013. “Addressing the Personalization-Privacy Paradox: An Empirical Assessment From a Field Experiment on Smartphone Users.” MIS Quarterly 37 (4): 1141–1164.
  • Tabachnick, B. G., and L. S. Fidell. 2007. Using Multivariate Statistics. 5th ed. Upper Saddle River, NJ: Pearson Allyn & Bacon.
  • Taddicken, M. 2014. “The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure.” Journal of Computer-Mediated Communication 19 (2): 248–273.
  • Ten Berge, J. M., and D. L. Knol. 1985. “Scale Construction on the Basis of Components Analysis: A Comparison of Three Strategies.” Multivariate Behavioral Research 20 (1): 45–55.
  • Tidwell, L. C., and J. B. Walther. 2002. “Computer-Mediated Communication Effects on Disclosure, Impressions, and Interpersonal Evaluations: Getting to Know one Another a bit at a Time.” Human Communication Research 28 (3): 317–348.
  • Timm, C., and R. Perez. 2010. Seven Deadliest Social Network Attacks. Boston, MA: Syngress.
  • Tufekci, Z. 2008. “Can you see me now? Audience and Disclosure Regulation in Online Social Network Sites.” Bulletin of Science, Technology & Society 28 (1): 20–36.
  • Turow, J., M. Hennessy, and N. Draper. 2015. “The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them up to Exploitation.” The Annenberg School for Communication, University of Pennsylvania. https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf
  • Tuunainen, V. K., O. Pitkänen, and M. Hovi. 2009. “Users’ Awareness of Privacy on Online Social Networking Sites-Case Facebook.” Bled 2009 Proceedings 42: 1–16.
  • van Schaik, P., J. Jansen, J. Onibokun, J. Camp, and P. Kusev. 2018. “Security and Privacy in Online Social Networking: Risk Perceptions and Precautionary Behaviour.” Computers in Human Behavior 78: 283–297.
  • Vrinten, C., J. Wardle, and L. A. Marlow. 2016. “Cancer Fear and Fatalism among Ethnic Minority Women in the United Kingdom.” British Journal of Cancer 114 (5): 597–604.
  • Wade, J. 1996. “An Examination of Locus of Control/Fatalism for Blacks, Whites, Boys, and Girls Over a two-Year Period of Adolescence.” Social Behavior and Personality: An International Journal 24 (3): 239–247.
  • Walton, S. C., and R. E. Rice. 2013. “Mediated Disclosure on Twitter: The Roles of Gender and Identity in Boundary Impermeability, Valence, Disclosure, and Stage.” Computers in Human Behavior 29 (4): 1465–1474.
  • Westin, A. 1967. Privacy and Freedom. New York: Atheneum.
  • Wimmer, R. D., and J. R. Dominick. 2013. Mass Media Research: An Introduction. Boston, MA: Cengage Learning.
  • Young, A. L., and A. Quan-Haase. 2013. “Privacy Protection Strategies on Facebook: The Internet Privacy Paradox Revisited.” Information, Communication & Society 16 (4): 479–500.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.