537
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Understanding the privacy protection disengagement behaviour of contactless digital service users: the roles of privacy fatigue and privacy literacy

, &
Received 29 Nov 2021, Accepted 25 Apr 2023, Published online: 18 Jul 2023

References

  • Agozie, D. Q., and T. Kaya. 2021. “Discerning the Effect of Privacy Information Transparency on Privacy Fatigue in e-Government.” Government Information Quarterly 38 (4): 101601. https://doi.org/10.1016/j.giq.2021.101601.
  • Aiken, L., and S. West. 1991. Multiple Regression: Testing and Interpreting Interactions. Newbury Park, CA: Sage.
  • Ayyagari, R., V. Grover, and R. Purvis. 2011. “Technostress: Technological Antecedents and Implications.” MIS Quarterly 35 (4): 831–858. https://doi.org/10.2307/41409963.
  • Barth, S., M. D. de Jong, M. Junger, P. H. Hartel, and J. C. Roppelt. 2019. “Putting the Privacy Paradox to the Test: Online Privacy and Security Behaviors Among Users with Technical Knowledge, Privacy Awareness, and Financial Resources.” Telematics and Informatics 41: 55–69. https://doi.org/10.1016/j.tele.2019.03.003.
  • Bartsch, M., and T. Dienlin. 2016. “Control Your Facebook: An Analysis of Online Privacy Literacy.” Computers in Human Behavior 56: 147–154. https://doi.org/10.1016/j.chb.2015.11.022.
  • Baruh, L., E. Secinti, and Z. Cemalcilar. 2017. “Online Privacy Concerns and Privacy Management: A Meta-Analytical Review.” Journal of Communication 67 (1): 26–53. https://doi.org/10.1111/jcom.12276.
  • Benlian, A., J. Klumpe, and O. Hinz. 2020. “Mitigating the Intrusive Effects of Smart Home Assistants by Using Anthropomorphic Design Features: A Multimethod Investigation.” Information Systems Journal 30 (6): 1010–1042. https://doi.org/10.1111/isj.12243.
  • Bove, L. L., and S. Benoit. 2020. “Restrict, Clean and Protect: Signaling Consumer Safety During the Pandemic and Beyond.” Journal of Service Management 31 (6): 1185–1202. https://doi.org/10.1108/JOSM-05-2020-0157.
  • Brough, A. R., and K. D. Martin. 2020. “Critical Roles of Knowledge and Motivation in Privacy Research.” Current Opinion in Psychology 31: 11–15. https://doi.org/10.1016/j.copsyc.2019.06.021.
  • Bu, F., N. Wang, B. Jiang, and Q. Jiang. 2021. “Motivating Information System Engineers’ Acceptance of Privacy by Design in China: An Extended UTAUT Model.” International Journal of Information Management 60: 102358. https://doi.org/10.1016/j.ijinfomgt.2021.102358.
  • Cai, R., and X. Y. Leung. 2020. “Mindset Matters in Purchasing Online Food Deliveries During the Pandemic: The Application of Construal Level and Regulatory Focus Theories.” International Journal of Hospitality Management 91: 102677. https://doi.org/10.1016/j.ijhm.2020.102677.
  • Cao, X., and J. Sun. 2018. “Exploring the Effect of Overload on the Discontinuous Intention of Social Media Users: An S-O-R Perspective.” Computers in Human Behavior 81: 10–18. https://doi.org/10.1016/j.chb.2017.11.035.
  • Chen, H., and D. Atkin. 2021. “Understanding Third-Person Perception About Internet Privacy Risks.” New Media & Society 23 (3): 419–437. https://doi.org/10.1177/1461444820902103.
  • Chen, H., C. E. Beaudoin, and T. Hong. 2017. “Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors.” Computers in Human Behavior 70: 291–302. https://doi.org/10.1016/j.chb.2017.01.003.
  • Chen, H., Y. Li, L. Chen, and J. Yin. 2021. “Understanding Employees’ Adoption of the Bring-Your-Own-Device (BYOD): The Roles of Information Security-Related Conflict and Fatigue.” Journal of Enterprise Information Management 34 (3): 770–792. https://doi.org/10.1108/JEIM-10-2019-0318.
  • Chen, H., and Y. Yuan. 2023. “The Impact of Ignorance and Bias on Information Security Protection Motivation: A Case of e-Waste Handling.” Internet Research, https://doi.org/10.1108/INTR-04-2022-0238.
  • Chen, H., Y. Zhang, S. Zhang, and T. Lyu. 2023. “Exploring the Role of Gamified Information Security Education Systems on Information Security Awareness and Protection Behavioral Intention.” Education and Information Technologies 143: 103667. https://doi.org/10.1007/s10639-023-11771-z.
  • Chen, Y., and F. M. Zahedi. 2016. “Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China.” MIS Quarterly 40 (1): 205–222. https://doi.org/10.25300/MISQ/2016/40.1.09.
  • Cheng, L.-K., H.-L. Huang, and S.-Y. Yang. 2021. “Attitude Toward 5G: The Moderating Effect of Regulatory Focus.” Technology in Society 67: 101795. https://doi.org/10.1016/j.techsoc.2021.101795.
  • Cheng, X., L. Su, X. Luo, J. Benitez, and S. Cai. 2022. “The Good, the Bad, and the Ugly: Impact of Analytics and Artificial Intelligence-Enabled Personal Information Collection on Privacy and Participation in Ridesharing.” European Journal of Information Systems 31 (3): 339–363. https://doi.org/10.1080/0960085X.2020.1869508.
  • Chin, W. W., B. L. Marcolin, and P. R. Newsted. 2003. “A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study.” Information Systems Research 14 (2): 189–217. https://doi.org/10.1287/isre.14.2.189.16018.
  • Cho, H., S. Roh, and B. Park. 2019. “Of Promoting Networking and Protecting Privacy: Effects of Defaults and Regulatory Focus on Social Media Users’ Preference Settings.” Computers in Human Behavior 101: 1–13. https://doi.org/10.1016/j.chb.2019.07.001.
  • Choe, J. Y., J. J. Kim, and J. Hwang. 2021. “Perceived Risks from Drone Food Delivery Services Before and After COVID-19.” International Journal of Contemporary Hospitality Management 33 (4): 1276–1296. https://doi.org/10.1108/IJCHM-08-2020-0839.
  • Choi, B. C. F., Z. Jiang, B. Xiao, and S. S. Kim. 2015. “Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding.” Information Systems Research 26 (4): 675–694. https://doi.org/10.1287/isre.2015.0602.
  • Choi, H., J. Park, and Y. Jung. 2018. “The Role of Privacy Fatigue in Online Privacy Behavior.” Computers in Human Behavior 81: 42–51. https://doi.org/10.1016/j.chb.2017.12.001.
  • Craciun, G. 2018. “Choice Defaults and Social Consensus Effects on Online Information Sharing: The Moderating Role of Regulatory Focus.” Computers in Human Behavior 88: 89–102. https://doi.org/10.1016/j.chb.2018.06.019.
  • Darehshiri, M., M. Ghaemi Asl, O. Babatunde Adekoya, and U. Shahzad. 2022. “Cross-spectral Coherence and Dynamic Connectedness among Contactless Digital Payments and Digital Communities, Enterprise Collaboration, and Virtual Reality Firms.” Technological Forecasting and Social Change 181: 121764. https://doi.org/10.1016/j.techfore.2022.121764.
  • Dazhong Daily. 2021. "Scan the QR Code to Order Aroused Heated Discussion: Just Order a Dish, Why Collect Personal Information?" https://baijiahao.baidu.com/s?id=1700607403654418793&wfr=spider&for=pc.
  • Desimpelaere, L., L. Hudders, and D. Van de Sompel. 2020. “Knowledge as a Strategy for Privacy Protection: How a Privacy Literacy Training Affects Children’s Online Disclosure Behavior.” Computers in Human Behavior 110: 106382. https://doi.org/10.1016/j.chb.2020.106382.
  • Diamantopoulos, A., and J. A. Siguaw. 2006. “Formative Versus Reflective Indicators in Organizational Measure Development: A Comparison and Empirical Illustration.” British Journal of Management 17 (4): 263–282. https://doi.org/10.1111/j.1467-8551.2006.00500.x.
  • Dinev, T., A. R. McConnell, and H. J. Smith. 2015. “Research Commentary—Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the “APCO” Box.” Information Systems Research 26 (4): 639–655. https://doi.org/10.1287/isre.2015.0600.
  • Elhai, J. D., J. C. Levine, and B. J. Hall. 2017. “Anxiety About Electronic Data Hacking: Predictors and Relations with Digital Privacy Protection Behavior.” Internet Research 27 (3): 631–649. https://doi.org/10.1108/IntR-03-2016-0070.
  • Epstein, D., and K. Quinn. 2020. “Markers of Online Privacy Marginalization: Empirical Examination of Socioeconomic Disparities in Social Media Privacy Attitudes, Literacy, and Behavior.” Social Media + Society 6 (2): 1–13. https://doi.org/10.1177/2056305120916853.
  • Farivar, S., O. Turel, and Y. Yuan. 2018. “Skewing Users’ Rational Risk Considerations in Social Commerce: An Empirical Examination of the Role of Social Identification.” Information & Management 55 (8): 1038–1048. https://doi.org/10.1016/j.im.2018.05.008.
  • Gu, J., Y. Xu, H. Xu, C. Zhang, and H. Ling. 2017. “Privacy Concerns for Mobile App Download: An Elaboration Likelihood Model Perspective.” Decision Support Systems 94: 19–28. https://doi.org/10.1016/j.dss.2016.10.002.
  • Hair, J. F., Jr., G. T. M. Hult, C. M. Ringle, and M. Sarstedt. 2014. “A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). California, USA.”
  • Herzenstein, M., S. S. Posavac, and J. J. Brakus. 2007. “Adoption of New and Really new Products: The Effects of Self-Regulation Systems and Risk Salience.” Journal of Marketing Research 44 (2): 251–260. https://doi.org/10.1509/jmkr.44.2.251.
  • Higgins, E. T. 1997. “Beyond Pleasure and Pain.” American Psychologist 52 (12): 1280–1300. https://doi.org/10.1037/0003-066X.52.12.1280.
  • Hwang, I., and O. Cha. 2018. “Examining Technostress Creators and Role Stress as Potential Threats to Employees’ Information Security Compliance.” Computers in Human Behavior 81: 282–293. https://doi.org/10.1016/j.chb.2017.12.022.
  • Jacoby, J. 2002. “Stimulus-Organism-Response Reconsidered: An Evolutionary Step in Modeling (Consumer) Behavior.” Journal of Consumer Psychology 12 (1): 51–57. https://doi.org/10.1207/S15327663JCP1201_05.
  • Jung, Y., B. Choi, and W. Cho. 2021. “Group Satisfaction with Group Work Under Surveillance: The Stimulus-Organism-Response (SOR) Perspective.” Telematics and Informatics 58: 101530. https://doi.org/10.1016/j.tele.2020.101530.
  • Jung, Y., and J. Park. 2018. “An Investigation of Relationships among Privacy Concerns, Affective Responses, and Coping Behaviors in Location-Based Services.” International Journal of Information Management 43: 15–24. https://doi.org/10.1016/j.ijinfomgt.2018.05.007.
  • Kehr, F., T. Kowatsch, D. Wentzel, and E. Fleisch. 2015. “Blissfully Ignorant: The Effects of General Privacy Concerns, General Institutional Trust, and Affect in the Privacy Calculus.” Information Systems Journal 25 (6): 607–635. https://doi.org/10.1111/isj.12062.
  • Kim, J.-Y. 2022. “Exploring Perceptional Typology of Social Media Quitters and Associations Among Self-Esteem, Personality, and Motivation.” Behaviour & Information Technology 41 (2): 262–275. https://doi.org/10.1080/0144929X.2020.1801841.
  • Kim, J. J., I. Kim, and J. Hwang. 2021. “A Change of Perceived Innovativeness for Contactless Food Delivery Services Using Drones After the Outbreak of COVID-19.” International Journal of Hospitality Management 93: 102758. https://doi.org/10.1016/j.ijhm.2020.102758.
  • Kline, R. B. 2011. Principles and Practice of Structural Equation Modeling. 3rd ed. New York: Guilford Press.
  • Lee, K. Y., S. Han, S. I. Shin, and S.-B. Yang. 2022. “Investigating the net Benefits of Contactless Technologies in Quick-Service Restaurants: The Moderating Roles of Social Interaction Anxiety and Language Proficiency.” Internet Research 33: 308–343. https://doi.org/10.1108/intr-07-2021-0462.
  • Lee, S. M., and D. Lee. 2021. “Opportunities and Challenges for Contactless Healthcare Services in the Post-COVID-19 Era.” Technological Forecasting and Social Change 167: 120712. https://doi.org/10.1016/j.techfore.2021.120712.
  • Li, H., A. Gupta, J. Zhang, and R. Sarathy. 2014. “Examining the Decision to Use Standalone Personal Health Record Systems as a Trust-Enabled Fair Social Contract.” Decision Support Systems 57: 376–386. https://doi.org/10.1016/j.dss.2012.10.043.
  • Li, H., X. Luo, J. Zhang, and H. Xu. 2017. “Resolving the Privacy Paradox: Toward a Cognitive Appraisal and Emotion Approach to Online Privacy Behaviors.” Information & Management 54 (8): 1012–1022. https://doi.org/10.1016/j.im.2017.02.005.
  • Liang, H., N. Saraf, Q. Hu, and Y. Xue. 2007. “Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management.” MIS Quarterly 31 (1): 59–87. https://doi.org/10.2307/25148781.
  • Liu, Y. L. 2020. “Maternal Mediation as an Act of Privacy Invasion: The Association with Internet Addiction.” Computers in Human Behavior 112: 106474. https://doi.org/10.1016/j.chb.2020.106474.
  • Liu, Y. L., W. Yan, and B. Hu. 2021. “Resistance to Facial Recognition Payment in China: The Influence of Privacy-Related Factors.” Telecommunications Policy 45 (5): 102155. https://doi.org/10.1016/j.telpol.2021.102155.
  • Luzsa, R., and S. Mayr. 2022. “Links Between Online Privacy Fatigue, Technology Attitudes and Sociodemographic Factors in a German Population Sample.” In Proceedings of Mensch und Computer 2022, 360–364. https://doi.org/10.1145/3543758.3547540.
  • Lyu, T., H. Chen, and Y. Guo. 2023. “Investigating Innovation Diffusion, Social Influence, and Personal Inner Forces to Understand People's Participation in Online e-Waste Recycling.” Journal of Retailing and Consumer Services 73: 103366. https://doi.org/10.1016/j.jretconser.2023.103366.
  • Lyu, T., Y. Guo, and H. Chen. 2023. “Understanding People’s Intention to Use Facial Recognition Services: The Roles of Network Externality and Privacy Cynicism.” Information Technology & People 38: 1138. https://doi.org/10.1108/ITP-10-2021-0817.
  • Ma, X., Y. Qin, Z. Chen, and H. Cho. 2021. “Perceived Ephemerality, Privacy Calculus, and the Privacy Settings of an Ephemeral Social Media Site.” Computers in Human Behavior 124: 106928. https://doi.org/10.1016/j.chb.2021.106928.
  • Mehrabian, A., and J. A. Russell. 1974. An Approach to Environmental Psychology. Cambridge.: The MIT Press.
  • Morosan, C. 2019. “Disclosing Facial Images to Create a Consumer’s Profile.” International Journal of Contemporary Hospitality Management 31 (8): 3149–3172. https://doi.org/10.1108/IJCHM-08-2018-0701.
  • Mosteller, J., and A. Poddar. 2017. “To Share and Protect: Using Regulatory Focus Theory to Examine the Privacy Paradox of Consumers’ Social Media Engagement and Online Privacy Protection Behaviors.” Journal of Interactive Marketing 39: 27–38. https://doi.org/10.1016/j.intmar.2017.02.003.
  • Mousavi, R., R. Chen, D. J. Kim, and K. Chen. 2020. “Effectiveness of Privacy Assurance Mechanisms in Users’ Privacy Protection on Social Networking Sites from the Perspective of Protection Motivation Theory.” Decision Support Systems 135: 113323. https://doi.org/10.1016/j.dss.2020.113323.
  • Moussawi, S., and R. Benbunan-Fich. 2020. “The Effect of Voice and Humour on Users’ Perceptions of Personal Intelligent Agents.” Behaviour & Information Technology 40 (15): 1603–1626. https://doi.org/10.1080/0144929X.2020.1772368.
  • Park, Y. J. 2013. “Digital Literacy and Privacy Behavior Online.” Communication Research 40 (2): 215–236. https://doi.org/10.1177/0093650211418338.
  • Piper, B. F., A. M. Lindsey, and M. J. Dodd. 1987. “Fatigue Mechanisms in Cancer Patients: Developing Nursing Theory.” Oncology Nursing Forum 14 (6): 17–23. PMID: 3320981.
  • Podsakoff, P. M., S. B. MacKenzie, and N. P. Podsakoff. 2012. “Sources of Method Bias in Social Science Research and Recommendations on How to Control It.” Annual Review of Psychology 63 (1): 539–569. https://doi.org/10.1146/annurev-psych-120710-100452.
  • Preacher, K. J., and A. F. Hayes. 2004. “SPSS and SAS Procedures for Estimating Indirect Effects in Simple Mediation Models.” Behavior Research Methods, Instruments, & Computers 36 (4): 717–731. https://doi.org/10.3758/BF03206553.
  • Rosenthal, S., O. C. Wasenden, G. A. Gronnevet, and R. Ling. 2020. “A Tripartite Model of Trust in Facebook: Acceptance of Information Personalization, Privacy Concern, and Privacy Literacy.” Media Psychology 23 (6): 840–864. https://doi.org/10.1080/15213269.2019.1648218.
  • Sindermann, C., H. S. Schmitt, F. Kargl, C. Herbert, and C. Montag. 2021. “Online Privacy Literacy and Online Privacy Behavior – The Role of Crystallized Intelligence and Personality.” International Journal of Human–Computer Interaction 37 (15): 1455–1466. https://doi.org/10.1080/10447318.2021.1894799.
  • So, H. J., and K. Y. Kwahk. 2021. “Motivational Factors Affecting Intention to Use Mobile Health Apps: Focusing on Regulatory Focus Tendency and Privacy Calculus Theory.” Knowledge Management Research 22 (2): 33–53. https://doi.org/10.15813/kmr.2021.22.2.003.
  • Sun, Y., N. Wang, and X.-L. Shen. 2021. “Calculus Interdependency, Personality Contingency, and Causal Asymmetry: Toward a Configurational Privacy Calculus Model of Information Disclosure.” Information & Management 58 (8): 103556. https://doi.org/10.1016/j.im.2021.103556.
  • Tang, J., U. Akram, and W. Shi. 2021. “Why People Need Privacy? The Role of Privacy Fatigue in app Users’ Intention to Disclose Privacy: Based on Personality Traits.” Journal of Enterprise Information Management 34 (4): 1097–1120. https://doi.org/10.1108/JEIM-03-2020-0088.
  • Xiao, L., and J. Mou. 2019. “Social Media Fatigue -Technological Antecedents and the Moderating Roles of Personality Traits: The Case of WeChat.” Computers in Human Behavior 101: 297–310. https://doi.org/10.1016/j.chb.2019.08.001.
  • Xie, X.-Z., and N.-C. Tsai. 2021. “The Effects of Negative Information-Related Incidents on Social Media Discontinuance Intention: Evidence from SEM and fsQCA.” Telematics and Informatics 56: 101503. https://doi.org/10.1016/j.tele.2020.101503.
  • Yao, J., and X. Cao. 2017. “The Balancing Mechanism of Social Networking Overuse and Rational Usage.” Computers in Human Behavior 75: 415–422. https://doi.org/10.1016/j.chb.2017.04.055.
  • Zhang, X., X. Ding, and L. Ma. 2022. “The Influences of Information Overload and Social Overload on Intention to Switch in Social Media.” Behaviour & Information Technology 41 (2): 228–241. https://doi.org/10.1080/0144929X.2020.1800820.
  • Zhang, S., Y. Lu, and B. Lu. 2023. “Shared Accommodation Services in the Sharing Economy: Understanding the Effects of Psychological Distance on Booking Behavior.” Journal of Theoretical and Applied Electronic Commerce Research 18 (1): 311–322. https://doi.org/10.3390/jtaer18010017.
  • Zhang, Y., and V. Mittal. 2007. “The Attractiveness of Enriched and Impoverished Options: Culture, Self-Construal, and Regulatory Focus.” Personality and Social Psychology Bulletin 33 (4): 588–598. https://doi.org/10.1177/0146167206296954.
  • Zhang, S., R. Wakefield, J. Huang, and X. Li. 2021. “Exploring Determinants of Consumers’ Attitudes Toward Real-Time Bidding (RTB) Advertising.” Information Technology & People 34 (2): 496–525. https://doi.org/10.1108/ITP-09-2019-0480.
  • Zhang, S., L. Zhao, Y. Lu, and J. Yang. 2016. “Do you Get Tired of Socializing? An Empirical Explanation of Discontinuous Usage Behaviour in Social Network Services.” Information & Management 53 (7): 904–914. https://doi.org/10.1016/j.im.2016.03.006.
  • Zhu, M., C. Wu, S. Huang, K. Zheng, S. D. Young, X. Yan, and Q. Yuan. 2021. “Privacy Paradox in mHealth Applications: An Integrated Elaboration Likelihood Model Incorporating Privacy Calculus and Privacy Fatigue.” Telematics and Informatics 61: 101601. https://doi.org/10.1016/j.tele.2021.101601.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.