The Role of Online Privacy Concern as a Mediator between Internet Self-Efficacy and Online Technical Protection Privacy Behavior

Authors

  • Wan Ying Lee Faculty of Arts and Social Science, Universiti Tunku Abdul Rahman, 31900 Kampar, Perak, Malaysia
  • Chee-Seng Tan Faculty of Arts and Social Science, Universiti Tunku Abdul Rahman, 31900 Kampar, Perak, Malaysia
  • Poh Chua Siah Faculty of Arts and Social Science, Universiti Tunku Abdul Rahman, 31900 Kampar, Perak, Malaysia

DOI:

https://doi.org/10.11113/sh.v9n3-2.1271

Keywords:

Privacy concern, internet self-efficacy, technical protection, privacy behavior

Abstract

Online risks may result in unnecessary harm but these risks can be minimized by being online privacy concerned and by taking privacy protective actions. Few studies examined the impact of privacy concern and internet self-efficacy on the online technical protection privacy behavior. Therefore, this research aims to investigate the effect of privacy concern and internet self-efficacy on technical protection. Quantitative and purposive sampling methods were used in this study. Data were gathered via questionnaire surveys from 235 undergraduates from six universities in Malaysia. The questionnaire includes participants’ demographic data, internet addiction test, web user self-efficacy scale, privacy concern, and technical protection scale. Hierarchical multiple regression analyses were conducted to examine the effect of internet self-efficacy and privacy concern on technical protection, while controlling for gender, course type, and internet addiction. Results showed that both privacy concern and internet self-efficacy were significant predictors of technical protection. Moreover, mediation analysis showed that there was an indirect effect of internet self-efficacy on technical protection through privacy concern. The results contribute to literature by revealing how internet self-efficacy and privacy concern increase technical protection. The government and policy makers can design intervention and prevention programs that aim to boost privacy concern and internet self-efficacy, so that internet users are more capable of safeguarding their online privacy.  

References

million Internet users in Malaysia by 2015. (2013, October 25). Economic Report 2013/2104 in Malaysia Kini.

Balakrishnan, V. (2015). Cyberbullying Among Young Adults In Malaysia: The Roles Of Gender, Age And Internet Frequency. Computers in Human Behavior, 46, 149-157. doi: 10.1016/j.chb.2015.01.021

Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. (2004). International Differences in Information Privacy Concerns: A Global Survey of Consumers. Information Society, 20(5), 313-324. doi: 10.1080/01972240490507956

Bonneau, J., Anderson, J., & Danezis, G. (2009). Prying Data Out Of A Social Network. Paper Presented at the International Conference on Advances in Social Networks Analysis and Mining, Athens, Greece. 2009. Retrieved from http://doi.ieeecomputersociety.org/10.1109/ASONAM.2009.45

Buchanan, T., Paine, C., Joinson, A. N., & Reips, U. D. (2007). Development of Measures Of Online Privacy Concern And Protection For Use On The Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165. doi: 10.1002/asi.20459

Chhikara, J., Dahiya, R., Garg, N., & Rani, M. (2013). Phising and anti-phising techniques: Case study. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 458-465. Retrieved from http://www.ijarcsse.com/docs/papers/Volume_3/5_May2013/V3I3-0315.pdf

Cyber Security Malaysia. (2013). Identity fraud: Platform for cybercrime. Retrieved from http://www.ilkap.gov.my

Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook And Online Privacy: Attitudes, Behaviors, And Unintended Consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. doi: 10.1111/j.1083-6101.2009.01494.x

Duerager, A., & Livingstone, S. (2012). How Can Parents Support Children's Internet Safety? London: Uk: EU Kids Online.

Eachus, P., Cassidy, S., & Hogg, P. (2006). Further Development of the Web User Self-efficacy Scale (WUSE). Education in a Changing Enviroment Conference Proceedings, 1-8. UK: University of Salford. Retrieved from http://usir.salford.ac.uk/1171/2/Further_DEvelopments.pdf

Eastin, M. S., & LaRose, R. (2000). Internet Self-Efficacy and the Psychology of the Digital Divide. Journal of Computer-Mediated Communication, 6(1). doi: 10.1111/j.1083-6101.2000.tb00110.x

Field, A. P. (2013). Discovering Statistics Using IBM SPSS Statistics (4th ed.). London: Sage Publications.

Hayes, A. F. (2013). Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Appraoch. NY: The Guildford Press Interactive Marketing, 18(3), 15-29. doi: 10.1002/dir.20009

Jensen, C., Potts, C., & Jensen, C. (2005). Privacy Practices Of Internet Users: Self-Reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63(1), 203-227. doi: 10.1016/j.ijhcs.2005.04.019

Kavuk, M., Keser, H., & Teker, N. (2011). Reviewing Unethical Behaviors Of Primary Education Students’ Internet Usage. Procedia-Social and Behavioral Sciences, 28, 1043-1052. doi: 10.1016/j.sbspro.2011.11.190

Kurt, M. (2010). Determination of in Internet Privacy Behaviours Of Students. Procedia - Social and Behavioral Sciences, 9(0), 1244-1250. doi: 10.1016/j.sbspro.2010.12.314

LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting Personal Responsibility For Internet Safety. Communications of the ACM, 51(3), 71-76. doi: 10.1145/1325555.1325569

Lee, D., Larose, R., & Rifon, N. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445-454. doi: 10.1080/01449290600879344

Livingstone, S., Haddon, L., Gorzig, A., & Olafsson, K. (2011). EU Kids Online: Final Report. London: London School of Economics & Political Science. Retrieved from http://www.lse.ac.uk/

Madden, M., Fox, S., Smith, A., & Vitak, J. (2007). Digital Footprints: Online Identity Management And Search In The Age Of Transparency. Pew Internet & American Life Project Washington, DC. Retrieved from http://www.pewinternet.org

Milne, G. R., & Culnan, M. J. (2004). Strategies for Reducing Online Privacy Risks: Why Consumers Read (Or Don’t Read) Online Privacy Notices. Journal of Interactive Marketing 18.3 (2004): 15-29.

Mohamed, N., & Ahmad, I. H. (2012). Information Privacy Concerns, Antecedents And Privacy Measure Use In Social Networking Sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366-2375. doi: 10.1016/j.chb.2012.07.008

Paine, C., Reips, U.-D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet Users’ Perceptions Of ‘Privacy Concerns’ And ‘Privacy Actions’. International Journal of Human-Computer Studies, 65(6), 526-536. doi: 10.1016/j.ijhcs.2006.12.001

Pan, Y., & Zinkhan, G. M. (2006). Exploring the Impact Of Online Privacy Disclosures On Consumer Trust. Journal of Retailing, 82(4), 331-338. doi: 10.1016/j.jretai.2006.08.006

Pempek, T. A., Yermolayeva, Y. A., & Calvert, S. L. (2009). College Students' Social Networking Experiences on Facebook. Journal of Applied Developmental Psychology, 30(3), 227-238. doi: 10.1016/j.appdev.2008.12.010

Raytheon. (2013). Preparing Millennials To Lead In Cyberspace: A Raytheon-Commissioned Study Of Attitudes, Behaviors And Career Aspirations Among Young American Adults Online. Retrieved from http://www.raytheon.com/

Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-Efficacy In Information Security: Its Influence On End Users' Information Security Practice Behavior. Computers & Security, 28(8), 816-826. doi: http://dx.doi.org/10.1016/j.cose.2009.05.008

Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-Efficacy In Information Security: Its Influence On End Users' Information Security Practice Behavior. Computers & Security, 28(8), 816-826. doi: http://dx.doi.org/10.1016/j.cose.2009.05.008

Sheehan, K. B. (2002). Toward a Typology of Internet Users and Online Privacy Concerns. Information Society, 18(1), 21-32. doi: 10.1080/01972240252818207

Singer, G., Pruulmann-Vengerfeldt, P., Norbisrath, U., & Lewandowski, D. (2012). The Relationship Between Internet User Type And User Performance When Carrying Out Simple Vs. Complex Search Tasks. arXiv preprint arXiv:1511.05819

Wirth, C. B., Rifon, N. J., LaRose, R., & Lewis, M. L. (2007). Promoting Teenage Online Safety With An I-Safety Intervention: Enhancing Self-Efficacy And Protective Behaviors. Paper presented at the Annual Meeting of the International Communication Association, Montreal, Quebec, Canada.

Youn, S. (2009). Determinants of Online Privacy Concern And Its Influence On Privacy Protection Behaviors Among Young Adolescents. Journal of Consumer Affairs, 43(3), 389-418. doi: 10.1111/j.1745-6606.2009.01146.x

Young, K. S. (1998). Caught in the Net: How To Recognize The Signs Of Internet Addiction And A Winning Strategy For Recovery. Canada: John Wiley & Sons.

Downloads

Published

2017-07-27

How to Cite

Lee, W. Y., Tan, C.-S., & Siah, P. C. (2017). The Role of Online Privacy Concern as a Mediator between Internet Self-Efficacy and Online Technical Protection Privacy Behavior. Sains Humanika, 9(3-2). https://doi.org/10.11113/sh.v9n3-2.1271