Privacy Risk Perceptions and Privacy Protection Strategies
نویسندگان
چکیده
Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies? On the basis of a large scale survey amongst Dutch students, this paper explores the relation between privacy risk perception and privacy protection strategies in more detail. It elaborates on factors that constitute privacy risk perception, as well as three kinds of strategies adopted by individuals to protect their privacy: behavioral measures, common privacy enhancing technologies (PETs), and more complex PETs. Next, it explores the relation between the respondents’ perception and the strategies they employ in more detail to answer the question what characteristics the users of the various strategies have in terms of perception, gender and age. Gender appears not to influence privacy risk perception, yet men are more familiar with the various privacy protection strategies and use them more of-ten than women. In general, a higher privacy risk perception does not lead to the adoption of stronger or more protection strategies, except for the use of pseudonyms, cookie crunchers, anonymous email, safe email, and providing false personal data. Our analysis deepens the understanding of privacy risk perception and privacy protection strategies, yet leaves the privacy paradox unresolved.
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملAn Empirical Investigation on Customer's Privacy Perceptions An Empirical Investigation on Customer's Privacy Perceptions, Trust and Security Awareness in E-commerce Environment
Privacy concerns ofthe users have been listed as one ofthe hindrances in the growth of e-commerce. Understanding the consequences of privacy and its relationship with risk perceptions may help in finding solutions to this problem. Internet users may use different strategies to protect their privacy so that they can become confident in taking part in e-commerce. In this study, we investigate how...
متن کاملApplying Risk Management Strategies to Information Privacy Protection: A Conceptual Approach
REQUIRED) This paper examines the application of risk management strategies to the protection of customer information privacy at the corporate level of analysis. The emerging discipline of privacy risk management is virtually non-existent in academic discourse despite an expressed and growing interest by regulators and practitioners. We show how the concept and practices of operational risk man...
متن کاملCitizens’ Perceptions of Data Protection and Privacy in Europe
Data protection and privacy gain social importance as technology and data flows play an ever greater role in shaping social structure. Despite this, understanding of public opinion on these issues is conspicuously lacking. This article is a meta-analysis of public opinion surveys on data protection and privacy focussed on EU citizens. The article firstly considers the understanding and awarenes...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کامل