331
Views
2
CrossRef citations to date
0
Altmetric
Research Articles

Understanding Coping Intentions of Fitness Tracker Users: An Empirical Investigation Using Fear Appeals

&
Pages 795-807 | Received 14 Mar 2022, Accepted 07 Sep 2022, Published online: 27 Sep 2022

References

  • Acquisti, A., John, L. K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies, 42(2), 249–274. https://doi.org/10.1086/671754
  • Alqhatani, A., & Lipford, H. R. (2019). There is nothing that I need to keep secret: Sharing Practices and Concerns of Wearable Fitness Data. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (pp. 421–434). https://www.usenix.org/conference/soups2019/presentation/alqhatani
  • Ayers, T. (2018). Self-regulation within the wearable device industry and the alignment to device users’ perceptions of health data privacy. Rochester Institute of Technology. https://scholarworks.rit.edu/theses/9763
  • Barlyn, S. (2018). Strap on the Fitbit: John Hancock to sell only interactive life insurance. Thomson Reuters.
  • Bartel Sheehan, K. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38. https://doi.org/10.1002/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O
  • BBC News (2018). Fitness app Strava lights up staff at military bases. BBC News. https://www.bbc.com/news/technology-42853072
  • Becker, M., Matt, C., Widjaja, T., Hess, T. (2017). Understanding privacy risk perceptions of consumer health wearables – An empirical taxonomy. In International Conference on Information Systems ICIS, 12.
  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017. https://doi.org/10.2307/41409971
  • Bélanger, F., Crossler, R. E., & Correia, J. (2021). Privacy maintenance in self-digitization. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 52(2), 7–24. https://doi.org/10.1145/3462766.3462769
  • Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864. https://doi.org/10.25300/MISQ/2015/39.4.5
  • Byrne, B. M. (2004). Testing for multigroup invariance using AMOS graphics: A road less traveled. Structural Equation Modeling: A Multidisciplinary Journal, 11(2), 272–300. https://doi.org/10.1207/s15328007sem1102_8
  • Carver, C. S., Scheier, M. F., & Weintraub, J. K. (1989). Assessing coping strategies: A theoretically based approach. Journal of Personality and Social Psychology, 56(2), 267–283. https://doi.org/10.1037/0022-3514.56.2.267
  • Cheung, M. L., Chau, K. Y., Lam, M. H. S., Tse, G., Ho, K. Y., Flint, S. W., Broom, D. R., Tso, E. K. H., & Lee, K. Y. (2019). Examining consumers’ adoption of wearable healthcare technology: The role of health attributes. International Journal of Environmental Research and Public Health, 16(13), 2257. https://doi.org/10.3390/ijerph16132257
  • Ching, K. W., & Singh, M. M. (2016). Wearable technology devices security and privacy vulnerability analysis. International Journal of Network Security & Its Applications, 8(3), 19–30. https://doi.org/10.5121/ijnsa.2016.8302
  • Christovich, M. M. (2016). Why should we care what Fitbit shares?: A proposed statutory solution to protect sensitive personal fitness information. Hastings Communications and Entertainment Law Journal, 38(1), 91–116. https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol38/iss1/4
  • Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159. https://doi.org/10.1037/0033-2909.112.1.155
  • Crawford, K. (2014). When Fitbit is the expert witness. The Atlantic. https://www.theatlantic.com/technology/archive/2014/11/when-fitbit-is-the-expert-witness/382936/
  • Crossler, R. E., & Belanger, F. (2009). Protection motivation theory: Understanding the determinants of individual security behavior. Virginia Polytechnic Institute and State University.
  • Crossler, R. E., & Bélanger, F. (2017). The mobile privacy-security knowledge gap model: Understanding behaviors. In Proceedings of the 50th Hawaii International Conference on System Sciences (2017) (pp. 4071–4080). https://doi.org/10.24251/HICSS.2017.491
  • Crossler, R. E., & Bélanger, F. (2019). Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap. Information Systems Research, 30(3), 995–1006. https://doi.org/10.1287/isre.2019.0846
  • Daily News (2018). Police, attorneys are using fitness trackers as court evidence. NY Daily News.
  • Dinev, T. (2014). Why would we care about privacy? European Journal of Information Systems, 23(2), 97–102. https://doi.org/10.1057/ejis.2014.1
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
  • Durnell, E., Okabe-Miyamoto, K., Howell, R. T., & Zizi, M. (2020). Online privacy breaches, offline consequences: Construction and validation of the concerns with the protection of informational privacy scale. International Journal of Human–Computer Interaction, 36(19), 1834–1848. https://doi.org/10.1080/10447318.2020.1794626
  • Emami-Naeini, P., Dixon, H., Agarwal, Y., & Cranor, L. F. (2019). Exploring how privacy and security factor into IoT device purchase behavior. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems – CHI ’19 (pp. 1–12). https://doi.org/10.1145/3290605.3300764
  • Epstein, D. A., Caraway, M., Johnston, C., Ping, A., Fogarty, J., & Munson, S. A. (2016). Beyond abandonment to next steps. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 1109–1113). https://doi.org/10.1145/2858036.2858045
  • Etkin, J. (2016). The hidden cost of personal quantification. Journal of Consumer Research, 42(6), 967–984. https://doi.org/10.1093/jcr/ucv095
  • Fei, D., & Wang, X. (2020). Narrative review of the role of wearable devices in promoting health behavior: Based on health belief model. In Intelligent Human Systems Integration 2020 (pp. 433–438). https://doi.org/10.1007/978-3-030-39512-4_68
  • Festic, N., Latzer, M., & Smirnova, S. (2021). Algorithmic self-tracking for health: User perspectives on risk awareness and coping strategies. Media and Communication, 9(4), 145–157. https://doi.org/10.17645/mac.v9i4.4162
  • Fietkiewicz, K., & Ilhan, A. (2020). Fitness tracking technologies: Data privacy doesn’t matter? In The (Un)Concerns of Users, Former Users, and Non-Users. https://doi.org/10.24251/HICSS.2020.421
  • Fipps, P. (2018). Notice of data breach.
  • Fitbit (2020). Fitbit privacy policy.
  • Folkman, S., Lazarus, R. S., Gruen, R. J., & DeLongis, A. (1986). Appraisal, coping, health status, and psychological symptoms. Journal of Personality and Social Psychology, 50(3), 571–579. https://doi.org/10.1037/0022-3514.50.3.571
  • Gabriele, S., & Chiasson, S. (2020). Understanding fitness tracker users’ security and privacy knowledge, attitudes and behaviours. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1–12). https://doi.org/10.1145/3313831.3376651
  • Gao, Y., Li, H., & Luo, Y. (2015). An empirical study of wearable technology acceptance in healthcare. Industrial Management & Data Systems, 115(9), 1704–1723. https://doi.org/10.1108/IMDS-03-2015-0087
  • Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16(1), 91–109. https://doi.org/10.17705/1CAIS.01605
  • Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 1–77. https://doi.org/10.17705/1CAIS.00407
  • Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77(1), 226–261. https://doi.org/10.1016/j.cose.2018.04.002
  • Hair, J. F. J., Black, W. C., Babin, B. J., & Anderson, R. E. (2014). Multivariate data analysis (7th ed.). Pearson Education Limited.
  • Hallam, C., & Zanella, G. (2016). Wearable device data and privacy: A study of perception and behavior. World Journal of Management, 7(1), 82–91. https://doi.org/10.21102/wjm.2016.03.71.06
  • Hofstra, B., Corten, R., & van Tubergen, F. (2016). Understanding the privacy behavior of adolescents on Facebook: The role of peers, popularity and trust. Computers in Human Behavior, 60(1), 611–621. https://doi.org/10.1016/j.chb.2016.02.091
  • Hui-Mei, H. (2016). Does privacy threat matter in mobile health service? From health belief model perspective. In PACIS 2016 Proceedings (Vol. 65).
  • IDC (2018). IDC forecasts slower growth for wearables in 2018 before ramping up again through 2022. https://www.businesswire.com/news/home/20180913005136/en/IDC-Forecasts-Slower-Growth-for-Wearables-in-2018-Before-Ramping-Up-Again-Through-2022
  • IDC (2021). Worldwide quarterly wearable device tracker 2021. IDC. https://www.idcjapan.co.jp/Press/Current/201810171Apr.html
  • Janakiraman, R., Lim, J. H., & Rishika, R. (2018). The effect of a data breach announcement on customer behavior: Evidence from a multichannel retailer. Journal of Marketing, 82(2), 85–105. https://doi.org/10.1509/jm.16.0124
  • Johnston, A. C., Warkentin, M., McBride, M., & Carter, L. (2016). Dispositional and situational factors: Influences on information security policy violations. European Journal of Information Systems, 25(3), 231–251. https://doi.org/10.1057/ejis.2015.15
  • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549. https://doi.org/10.2307/25750691
  • Kang, H., & Jung, E. H. (2021). The smart wearables-privacy paradox: A cluster analysis of smartwatch users. Behaviour & Information Technology, 40(16), 1755–1768. https://doi.org/10.1080/0144929X.2020.1778787
  • Kim, T., & Cho, J. (2016). Wearable computing healthcare by smart band: Based on fear-appeal persuasion. Indian Journal of Science and Technology, 9(46), 1–7. https://doi.org/10.17485/ijst/2016/v9i46/107194
  • Labrecque, L. I., Markos, E., Swani, K., & Peña, P. (2021). When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach. Journal of Business Research, 135(1), 559–571. https://doi.org/10.1016/j.jbusres.2021.06.054
  • Lerner, J. S., Han, S., & Keltner, D. (2007). Feelings and consumer decision making: Extending the appraisal-tendency framework. Journal of Consumer Psychology, 17(3), 181–187. https://doi.org/10.1016/S1057-7408(07)70027-X
  • Li, H., Luo, X. (., Zhang, J., & Xu, H. (2017). Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors. Information & Management, 54(8), 1012–1022. https://doi.org/10.1016/j.im.2017.02.005
  • Li, H., Wu, J., Gao, Y., & Shi, Y. (2016). Examining individuals’ adoption of healthcare wearable devices: An empirical study from privacy calculus perspective. International Journal of Medical Informatics, 88(555), 8–17. https://doi.org/10.1016/j.ijmedinf.2015.12.010
  • Li, K., Lin, Z., & Wang, X. (2015). An empirical analysis of users’ privacy disclosure behaviors on social network sites. Information & Management, 52(7), 882–891. https://doi.org/10.1016/j.im.2015.07.006
  • Li, Y. (2011). Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems, 28(1), 453–496. https://doi.org/10.17705/1CAIS.02828
  • Liang, H., Xue, Y., Pinsonneault, A., & Wu, Y. A. (2019). What users do besides problem-focused coping when facing IT security threats: An emotion-focused coping perspective. MIS Quarterly, 43(2), 373–394. https://doi.org/10.25300/MISQ/2019/14360
  • Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29(4), 1649–1656. https://doi.org/10.1016/j.chb.2013.01.049
  • Malandrino, D., Scarano, V., & Spinelli, R. (2013). Impact of privacy awareness on attitudes and behaviors online. Science, 2(2), 65–82. https://doi.org/10.1109/SocialCom.2013.15
  • Malhotra, A., & Kubowicz Malhotra, C. (2011). Evaluating customer information breaches as service failures: An event study approach. Journal of Service Research, 14(1), 44–59. https://doi.org/10.1177/1094670510383409
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
  • Mangan, D. (2018). There’s a hack for that: Fitbit user accounts attacked. CNBC. https://www.cnbc.com/2016/01/08/theres-a-hack-for-that-fitbit-user-accounts-attacked.html
  • Marelli, L., Lievevrouw, E., & Van Hoyweghen, I. (2020). Fit for purpose? The GDPR and the governance of European digital health. Policy Studies, 41(5), 447–467. https://doi.org/10.1080/01442872.2020.1724929
  • Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36–58. https://doi.org/10.1509/jm.15.0497
  • Maslakovic, M. (2020). What’s inside a fitness tracker? Gadgets & Wearables, 1. https://gadgetsandwearables.com/2020/07/05/whats-inside-fitness-tracker/#comment-33457
  • McKeon, J. (2021). 61M Fitbit, Apple users had data exposed in wearable device data breach. Health IT Security, 1. https://healthitsecurity.com/news/61m-fitbit-apple-users-had-data-exposed-in-wearable-device-data-breach
  • Montgomery, K. C., Chester, J., Kopp, K. (2017). Health wearable devices in the Big Data era: Ensuring privacy, security, and consumer protection. https://www.democraticmedia.org/CDD-Wearable-Devices-Big-Data-Report.
  • Moore, S. (2016). Gartner survey shows wearable devices need to be more useful. https://www.gartner.com/newsroom/id/3537117
  • Motti, V. G., & Caine, K. (2015). Users’ privacy concerns about wearables. In M. Brenner, N. Christin, B, Johnson & K. Rohloff (Eds.), Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science, (Vol. 8976). Springer. https://doi.org/10.1007/978-3-662-48051-9_17
  • Ostherr, K., Borodina, S., Bracken, R. C., Lotterman, C., Storer, E., & Williams, B. (2017). Trust and privacy in the context of user-generated health data. Big Data & Society, 4(1), 205395171770467. https://doi.org/10.1177/2053951717704673
  • Park, Y. J. (2015). Do men and women differ in privacy? Gendered privacy and (in)equality in the Internet. Computers in Human Behavior, 50(1), 252–258. https://doi.org/10.1016/j.chb.2015.04.011
  • Patel, M. S., Asch, D. A., & Volpp, K. G. (2015). Wearable devices as facilitators, not drivers, of health behavior change. JAMA, 313(5), 459–460. https://doi.org/10.1001/jama.2014.14781
  • Petronio, S., & Altman, I. (2002). Boundaries of privacy: Dialectics of disclosure. State University of New York Press.
  • Pingo, Z., & Narayan, B. (2018). Users’ responses to privacy issues with the connected information ecologies created by fitness trackers. In International Conference on Asian Digital Libraries (pp. 240–255). https://doi.org/10.1007/978-3-030-04257-8_25
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. The Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879
  • Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health Information Science and Systems, 2(1), 3–10. https://doi.org/10.1186/2047-2501-2-3
  • Raij, A., Ghosh, A., Kumar, S., & Srivastava, M. (2011). Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems – CHI ’11 (p. 11). https://doi.org/10.1145/1978942.1978945
  • Rocher, L., Hendrickx, J. M., & de Montjoye, Y.-A. (2019). Estimating the success of re-identifications in incomplete datasets using generative models. Nature Communications, 10(1), 3069. https://doi.org/10.1038/s41467-019-10933-3
  • Rogers, R. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
  • Rogers, R. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation (R. Petty & J. Cacioppo, Eds.; Social psy). Guilford Press.
  • Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft? Journal of Policy Analysis and Management, 30(2), 256–286. https://doi.org/10.1002/pam.20567
  • Rothstein, M. A. (2007). Health privacy in the electronic age. The Journal of Legal Medicine, 28(4), 487–501. https://doi.org/10.1080/01947640701732148
  • Ruiter, R. A. C., Kessels, L. T. E., Peters, G.-J Y., & Kok, G. (2014). Sixty years of fear appeal research: Current state of the evidence. International Journal of Psychology, 49(2), 63–70. https://doi.org/10.1002/ijop.12042
  • Schomakers, E.-M., Lidynia, C., & Ziefle, M. (2022). The role of privacy in the acceptance of smart technologies: Applying the privacy calculus to technology acceptance. International Journal of Human–Computer Interaction, 38(13), 1276–1289. https://doi.org/10.1080/10447318.2021.1994211
  • Segura Anaya, L. H., Alsadoon, A., Costadopoulos, N., & Prasad, P. W. C. (2018). Ethical implications of user perceptions of wearable devices. Science and Engineering Ethics, 24(1), 1–28. https://doi.org/10.1007/s11948-017-9872-8
  • Sheehan, K., & Hoy, M. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73. https://doi.org/10.1509/jppm.19.1.62.169
  • Shklovski, I., Mainwaring, S. D., Skúladóttir, H. H., & Borgthorsson, H. (2014). Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems (pp. 2347–2356). https://doi.org/10.1145/2556288.2557421
  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational. MIS Quarterly, 20(2), 167–196. https://doi.org/10.2307/249477
  • Srikrishna, B. N., Sundararajan, A., Pandey, A. B., Kumar, A., Moona, R., Rai, G., T. Krishnan, R., Sengupta, A., & Vedashree, R. (2018). The Personal Data Protection Bill, 2018. Ministry of Electronics and Information Technology Government of India.
  • Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13(24), 380–427. https://doi.org/10.17705/1CAIS.01324
  • Taddicken, M. (2014). The ‘privacy paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273. https://doi.org/10.1111/jcc4.12052
  • Tanner, J. F., Hunt, J. B., & Eppright, D. R. (1991). The protection motivation model: A normative model of fear appeals. Journal of Marketing, 55(3), 36–45. https://doi.org/10.2307/1252146
  • Velykoivanenko, L., Niksirat, K. S., Zufferey, N., Humbert, M., Huguenin, K., & Cherubini, M. (2021). Are those steps worth your privacy? Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(4), 1–41. https://doi.org/10.1145/3494960
  • Vitak, J., Liao, Y., Kumar, P., Zimmer, M., & Kritikos, K. (2018). Privacy attitudes and data valuation among fitness tracker users. In Transforming Digital Worlds. iConference 2018. Lecture Notes in Computer Science (pp. 229–239). https://doi.org/10.1007/978-3-319-78105-1_27
  • Warkentin, M., Walden, E., Johnston, A., & Straub, D. (2016). Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. Journal of the Association for Information Systems, 17(3), 194–215. https://doi.org/10.17705/1jais.00424
  • Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, 59(4), 329–349. https://doi.org/10.1080/03637759209376276
  • Witte, K. (1994). Fear control and danger control: A test of the extended parallel process model (EPPM). Communication Monographs, 61(2), 113–134. https://doi.org/10.1080/03637759409376328
  • Witte, K. (1996). Fear as motivator, fear as inhibitor. In Handbook of communication and emotion (pp. 423–450). Elsevier. https://doi.org/10.1016/B978-012057770-5/50018-7
  • Witte, K., Cameron, K. A., McKeon, J. K., & Berkowitz, J. M. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1(4), 317–41341. https://doi.org/10.1080/108107396127988
  • Witte, K. (1997). Preventing teen pregnancy through persuasive communications: Realities, myths, and the hard-fact truths. Journal of Community Health, 22(2), 137–154. https://doi.org/10.1023/A:1025116923109
  • Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education & Behavior, 27(5), 591–615. https://doi.org/10.1177/109019810002700506
  • Xiaomi (2020). Xiaomi privacy policy.
  • Xie, W., & Kang, C. (2015). See you, see me: Teenagers’ self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52(1), 398–407. https://doi.org/10.1016/j.chb.2015.05.059
  • Yan, C. (2017). Examining internet users’ adaptive and maladaptive security behaviors using the extended parallel process model. In ICIS 2017 Proceedings.
  • Yeung, D., Cevallos, A. S. (2017). Using wearable fitness devices to monitor more than just fitness. https://www.rand.org/blog/2017/05/using-wearable-fitness-devices-to-monitor-more-than.html
  • Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyberpsychology & Behavior, 11(6), 763–765. https://doi.org/10.1089/cpb.2007.0240
  • Zhu, X., Zhu, P., & Qiu, Y. (2018). Research on the influence of fear appeals on APP users’ privacy protection behavior. In Proceedings of the 2018 International Conference on Information Management & Management Science – IMMS ’18 (pp. 200–205). https://doi.org/10.1145/3277139.3277172
  • Zimmer, M., Kumar, P., Vitak, J., Liao, Y., & Chamberlain Kritikos, K. (2020). ‘There’s nothing really they can do with this information’: Unpacking how users manage privacy boundaries for personal fitness information. Information, Communication & Society, 23(7), 1020–1037. https://doi.org/10.1080/1369118X.2018.1543442

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.