How Cognitive Factors and Personality Traits Affect Privacy

2016 49th Hawaii International Conference on System Sciences
Sweet Idleness, but Why? How Cognitive Factors and Personality Traits
Affect Privacy-Protective Behavior
Christian Matt
LMU Munich
[email protected]
Philipp Peckelsen
LMU Munich
[email protected]
Abstract
control in relation to the status quo. PETs are usually
add-on software, i.e. they need to be installed in addition to an operating system. Many PETs are gratis
and are available for various technology platforms.
Therefore, financial acquisition costs or technological
incompatibilities should not be critical reasons for
non-use, and it is unclear why PET diffusion remains
low. PETs’ missing success stands in contrast to
antivirus software or firewalls, which many users
already use to protect their computers.
There are several possible explanations for users’
reluctance to use PETs, which have differential consequences for practice and policy makers: First, users
state a wish for more privacy protection for reasons
of social desirability but do not in fact want more
privacy, or even hope to profit from more personalization. If this is the case, no regulatory actions are
required from policy makers. Second, users may
judge the personal consequences resulting from privacy incidents to be low. Third, users perceive privacy risks as severe enough and seek more privacy
protection but then fail to assess the concrete risks
that result from privacy incidents, or their perception
is that they would not fall victim to such incidents. In
both of the latter two cases, more public information
about privacy could help users to reconsider their
opinion about potential consequences, to better calculate potential risks and to make better decisions.
Fourth, users want more privacy protection but do not
know how to achieve this or do not trust the current
solutions. In this case, the development of more userfriendly, directly integrated solutions, and the better
communication of such technology’s effectiveness
are required. In order to suggest proper measures that
foster PET diffusion, we first need to find the reason(s) for PET non-use.
We take a first step toward figuring out why users do
not act by posing the question how cognitive factors
and personality traits influence PET usage intention.
By drawing on protection motivation theory (PMT),
we seek to explain users’ cognitive weighing up of
the perceived need to act and their assessment of the
measures they could take at present. However, in our
view, users’ decision whether or not to adopt PETs is
According to media and research, users have a
high interest in protecting their personal data. Although privacy-enhancing technologies (PETs) can
help secure users’ privacy, only very few make use of
PETs – even if some of these are gratis. Given the
overall impact for individuals, good answers are
needed, which we seek in both cognitive and personality factors. By drawing on protection motivation
theory (PMT) and the five-factor model (FFM), we
seek to explain individuals’ intention to use PETs.
Our results support the suitability of the PMT in the
PET context. In particular, perceived response efficacy has a strong effect on individuals’ intention to
use PETs. Most personality factors have no or somewhat unexpected influences, but due to the measurements’ brevity further research with extended personality scales is needed to validate these results.
1. Introduction
Privacy has long been a frequently discussed topic in information systems research, but discrepancies
between online services’ demands for personal information and users’ willingness to provide such
information remain. Research has found that users
have three options to prevent undesired usage of their
personal information [51]. First, they could refrain
from disclosing their personal information. However,
in many cases, refraining to provide information
prohibits further usage of a service. Hence, particularly for services that are offered gratis, many users
give in and disclose their personal information despite their concerns [4]. Second, users could provide
false information. However, although no true personal information is given, certain negative effects may
result from not providing actual information, such as
suspension from using the service or simply not obtaining regular notifications owing to incorrect contact details. Third, users have an increasing choice of
privacy-enhancing technologies (PETs) – tools and
applications (e.g. e-mail encryption or advertising
cookie blocking) that increase individuals’ privacy
1530-1605/16 $31.00 © 2016 IEEE
DOI 10.1109/HICSS.2016.599
4831
4832
not only cognitively governed. We therefore seek to
place a stronger emphasis on personality factors and
integrate a brief version of the well-established fivefactor model (FFM) as a second pillar. While PMT
primarily accounts for cognitive components (i.e. the
abovementioned assessments of threats and ways to
cope with them), we suggest that, especially in the
field of privacy, additional non-cognitive elements
have an important influence on individuals’ decision
processes. These connections are empirically assessed in a large-scale survey and seek to provide a
better understanding of users’ privacy-protective
behavior using PETs.
In our view, our results have implications for
practice and research. The question why users fear
privacy but do not act in privacy-sensitive ways remains unsolved. Research can benefit from further
insights as well as PET suppliers and policy makers
to improve their strategies to promote PETs.
ing from information disclosure, falsifying personal
information, or using PETs [51].
To date, there has been no commonly accepted
definition of privacy-enhancing technologies. But, as
privacy is usually referred to as “the ability of individuals to control the terms under which their personal information is acquired and used” [12], we
consider PETs as technological mechanisms that
increase individuals’ privacy control in relation to the
status quo. Hence, PETs are tools and applications
that enhance users’ privacy levels regarding one or
more central privacy issues: information collection,
information processing, information dissemination,
or invasion [47]. Examples of PETs are anonymization or encryption tools, such as “The Onion Router”
(TOR), or “Pretty Good Privacy” (PGP). Other PETs
include features to block third-party trackers, spyware, and popups.
Research has explored antecedents of users’ intentions to use PETs by considering software firewalls [30] and anonymity software [5]. By using an
extended version of TAM, these studies find the
attitude toward security and privacy protection technologies, as well as Internet privacy awareness, to be
significant predictors of usage intention. In a qualitative approach, users were asked why they do not use
end-to-end encryption solutions, finding potential
explanations in lack of awareness, lack of concern,
lack of knowledge, misconceptions on how to protect, and lack of perceived need to take action [40].
2. Conceptual foundations
2.1. Users’ evaluation of privacy threats and
privacy-enhancing technologies
It is widely assumed that most users have an inherent interest in not disclosing personal information
to third parties. Similar to other decisions that involve
weighing up benefits and costs, a mental calculus
perspective can be assumed for privacy concerns.
Primary user incentives for sharing information are
financial rewards, personalization, social adjustment,
and actual participation in a specific offering [45]. By
contrast, the potential costs of revealing information
to third parties can include risks pertaining to discrimination, exclusion from future transactions, social embarrassment, and stigmatization, among others
[41].
To examine individuals’ willingness to share information, past research has applied privacy calculus
theory as an antecedent and has analyzed the formation of individuals’ concerns for information privacy (CFIP) [17]. The most frequently used operationalization is from Smith et al. [46], who introduced four distinct yet correlated dimensions – collection, unauthorized access, secondary use, and
error. Research has found that various environmental
factors (e.g. governmental regulation and social presence), individual factors (e.g. demographic factors
and the need for privacy) and personality-related
factors can influence CFIP [28]. User demands for
privacy are not uniform, nor are users’ knowledge
and awareness of privacy [8]. Concerning the effects
of privacy concerns, different studies have found a
positive impact on protective actions, such as refrain-
2.2. Protection motivation theory
Grounded in fear appeal research, protection motivation considers persuasive messages about a specific
threat and potential remedies that individuals could take
to reduce or circumvent its impact [43]. In the domain
of privacy concerns, these threat messages are sent via
both public media and individuals. When facing a specific threat, individuals seek either to get rid of the
unpleasant feelings evoked by a threat or to come to
grips with the situation [26]. If a certain fear threshold
level fails to be reached, there is no motivation to
take any action [3]. Building on expectancy-value
theory, Rogers [44] elaborated that two cognitive processes – threat appraisal and coping appraisal – determine individuals’ protection motivation, which, in
health research, is considered to be the most immediate predictor of behaviors [50]. In the threat appraisal,
the perceived severity (i.e. the magnitude of expected
harm) and perceived susceptibility (i.e. the extent of
feeling at risk) of the threat determine maladaptive
behavior (e.g. non-use of PETs), while extrinsic or
intrinsic rewards can foster adaptive behavior. For
coping appraisal, adaptive behavior is generally sup4833
4832
ported by higher perceived self-efficacy (i.e. beliefs
in the ability to perform a recommended response)
and perceived response efficacy (i.e. beliefs in the
effectiveness of a recommended response to avert a
threat).
The PMT has seen frequent applications in other
fields, such as communication science or medicine.
In the IS domain, there are various applications pertaining to organizational security compliance [26]
and IT-related security behavior [54]. The application
in these contexts has been criticized, since the threats
did not affect the physical self but rather corporate
assets (e.g. data and systems), and it would therefore
lack perceived relevance [27]. However, we hold that
privacy related to personal information directly affects an individual’s personal self and should consequently be sufficiently relevant. Furthermore, as
evidence from practice shows, while IT security
software (e.g. antivirus or firewall products) has seen
large diffusion among individuals, this is by far not
the case for PETs, indicating that the models from IT
security behavior are not simply transferable to the
field of privacy.
of new ideas), and (e) agreeableness (i.e. a compassionate interpersonal orientation) [10]. The integration
of personality can lead to substantially better model
explanatory power, thus confirming that personality
traits directly influence technology usage intention [14,
36]. Applications of the FFM in IS often use TAM or
UTAUT models. It has been found, however, that
models that are based on the theory of planned behavior often fail to consider perceptions of risk adequately [9]. By contrast, PMT enables us to grasp
users’ perceptions of the risks and threats inherent to
privacy-related behavior.
3. Research model and hypotheses development
Grounded in the conceptual foundations described
above, our research model combines both cognitive
factors and personality traits to explain intentions to
use PETs (Figure 1). By building on PMT, we integrate a comprehensive concept that accounts for
users’ perceived threats of privacy-invading practices, and their beliefs in the measures that could be
taken to alleviate these threats. The FFM provides a
picture of personality traits in the usage decision and
is employed here as a complement to the cognitive
aspects.
2.3. Personality cues and five-factor model
Personality refers to a largely stable set of characteristics that determine the differences in individuals’
thoughts, feelings, and actions [32]. Owing to its
general importance for human cognition and behavior, researchers in the IS domain have integrated a
large number of personality traits (e.g. affinity, computer anxiety, personal innovativeness) to assess
personality differences within the domain of technology acceptance behavior [24]; however, to date, only
a few approaches have integrated the entire essence
of a personality [33]. This might be due to the large
number of isolated personality variables, which has
made it difficult to compare results. However, there
is now considerable agreement in psychology that
personality can be represented by five superordinate
constructs [6], all of which have been integrated into
the five-factor model (FFM). The FFM is considered
the most parsimonious model and the most useful
taxonomy in personality research [2], and it enables
research to cover individuals’ personality broadly and
systematically [6].
The FFM clusters all personality traits into five
factors: (a) conscientiousness (i.e. the extent of organization, persistence, and motivation in goaldirected behavior), (b) extraversion (i.e. being sociable, gregarious, and ambitious), (c) neuroticism (i.e.
insecurity, anxiousness, and hostility), (d) openness
to experience (i.e. flexibility of thought and tolerance
3.1. Users’ protection motivation
People tend to adjust their protective behavior to the
extent of harm that a certain threat may cause [39]. In
line with this tendency, researchers have observed
that individuals who received stronger messages
about a threat’s severity exhibited a higher motivation to engage in responsive actions [37]. In IS contexts, user behavior can be determined by the perception of the seriousness of a consequence in case of
non-compliance, for instance, in case of avoiding
malicious IT [31]. The positive effect of severity
perception on protection motivation has been widely
supported, especially in health research [16]. Results
have found analogous results in IS research, for instance in the context of home wireless network security [53] and user IT security behavior [54]. Thus, we
propose:
H1: Perceived severity of privacy threats positively influences the intention to use PETs.
Behavioral economics has shown that when faced
with uncertainty, individuals evaluate probabilistic
outcomes differently, depending on their personal
reference points [29]. Similarly, perceived occurren-
4834
4833
Cognitive factors
Control variables
Privacy
concerns
Threat appraisal
Perceived severity of privacy threats
Personality traits
Prev. privacy
experience
-
-
Perc. susceptibility of privacy threats
Emotional stability
H1+
Agreeableness
H2+
Intention to
use PETs
+
Conscientiousness
Coping appraisal
Perceived self-efficacy to use PETs
Perceived response efficacy of PETs
-
H3+
H4+
Adoption of
PETs
H5a-e
+
Extraversion
Openness
Figure 1. Conceptual research model
ces of a specific threat vary, subject to other personal
factors. However, individuals often misperceive personal vulnerabilities to certain threats as well as the
advantageousness of preventive measures [23]. Higher perceived threat susceptibility has been shown to
have a positive impact on adopting recommended
responses, for instance in responding to security
breaches [54]. We therefore hold:
H2: Perceived susceptibility of privacy threats
positively influences the intention to use PETs.
ceived usefulness and is likewise perceived as a positive predictor of IT adoption [13]. We therefore hold:
H4: Perceived response efficacy positively influences the intention to use PETs.
In addition to the two threat appeal factors, we include two coping resources to obtain a more comprehensive picture of the antecedents of individuals’
intentions to use. Thus, after the arousal of psychological pressure, perceived self-efficacy and the perceived efficacy of recommended responses (i.e. using
PETs) determine whether users seek to engage in
danger control (i.e. adoption) instead of fear control
(i.e. rejection) processes.
Perceived self-efficacy expresses subjective beliefs in a user’s ability to perform a desired behavior.
External factors, such as the ease of obtaining and
interpreting information, can play an important role
in influencing perceived self-efficacy and resulting
behavior [25, 48]. In the IS literature, numerous studies have examined the effects of perceived selfefficacy on IT adoption and have found a positive
effect on adoption [e.g. 1]. Thus, we hold:
H3: Perceived self-efficacy positively influences
the intention to use PETs.
Emotional stability. Emotional stability is generally
accepted as the reverse pole of neuroticism [6]. Neuroticism is associated with characteristics such as being
anxious, depressed, impulsive, and vulnerable to stress
[34]. Since individuals who score high on neuroticism,
and are thus emotionally instable, tend to be more concerned and more susceptible to anxiety, we suggest that
they are more likely to undertake protective efforts to
safeguard themselves from potential threats by enhancing their privacy level. We propose:
H5a: Emotional stability negatively influences the
intention to use PETs.
3.2. Personality cues
The FFM assumes that people can be described
along five dimensions of personality. We will now
briefly explain each of these and derive hypotheses:
Agreeableness. Agreeableness has primarily been
considered a dimension of interpersonal behavior [11],
but it has been revealed that it also influences individuals’ self-image and helps to shape social attitudes and
philosophy of life [11, 28], since agreeable individuals
strive for harmony and shirk conflicts [35]. The facets
of agreeableness are trust, straightforwardness, altruism, compliance, modesty, and tender-mindedness [11].
As individuals who score high on agreeableness tend to
regard others as honest and trustworthy, in our view,
they might consider themselves less threatened by their
environment and consider it less necessary to apply
protective actions. Thus, we propose:
H5b: Agreeableness negatively influences the intention to use PETs.
Perceived response efficacy is a user’s belief in a
technology’s effectiveness in mitigating the threat to
which the user is exposed. In IS research, perceived
response efficacy has recently been analyzed as it
relates to IS security threats, among others [26]. Response efficacy exhibits some connection with per-
4835
4834
Conscientiousness. Individuals scoring high on conscientiousness tend to be well-organized, thorough,
reliable, and exact [20]. A conscientious person adheres
to standards of conduct and values order and persistence [11]. Chauvin et al. [7] found that conscientious
individuals take more precautionary steps. Since conscientious individuals tend to stick to established rules
and procedures and experience discomfort when deviating from familiar paths, we suppose that they are less
willing to get involved in risky situations and will initiate efforts to protect themselves from potential threats.
Therefore, we hold:
H5c: Conscientiousness positively influences the
intention to use PETs.
et al. [27]. Intention to use PETs was measured by
adopting items from Venkatesh et al. [49]. For the
FFM, we used the Ten Item Personality Inventory
(TIPI) [21]. TIPI has been successfully implemented
in several applications, also in the field of IS, e.g. in
privacy research [28].
In addition to our focal constructs, we accounted
for two controls: users’ privacy concerns and previous privacy experience. The items measuring context-specific concerns for information privacy were
taken from Dinev and Hart [17]. Users’ past privacy
experience was integrated, since we see a direct relationship between negative past privacy experiences
and a potential behavioral change as a result. The
items were taken from Xu et al. [55]. Each item was
measured using a seven-point Likert scale.
Extraversion. Extraversion is primarily related to the
preferred amount of social stimulation [11]. Extraverted
individuals stand out through characteristics such as
assertiveness, activity, positive emotions, or cheerfulness, and being excitement-seeking. Chauvin et al. [7]
found that extraversion is negatively associated with
hazards linked to individual behavior. Individuals who
score high on extraversion tend to live an actionoriented life that includes some risks [7]. We follow
this reasoning and conclude:
H5d: Extraversion negatively influences the intention to use PETs.
4.2. Procedure and participants
Data was collected in two stages. First, a 10-minute
paper-based questionnaire with IS undergraduate students of a major German university was handed out.
Second, a follow-up online questionnaire was distributed three weeks later. Participants of the first survey
were asked to take part in the follow-up survey by
disclosing their e-mail addresses.
For the initial survey, participants received extensive information on PETs. To ensure that participants
had completed the survey with a shared understanding of the core issue, the participants needed to answer test questions to complete the survey.
Additionally, three different available PET solutions that can help the participants protect their
smartphone privacy (“Cyber Ghost VPN”, “Disconnect” and “Whiteout Mail”) were described to them.
The PET examples were printed on a flyer that could
be taken home. Besides the description, a screenshot
of the software and a QR code with a link to the
download page was provided. All three solutions are
available for iOS and Android phones. More than
97% of the participants indicated that they use one of
these two mobile operating systems.
In the initial survey, 227 questionnaires were completed. After removing 87 invalid answers, 140 questionnaires were used in the analysis. Criteria for invalid
answers were (a) non-smartphone users (3 cases), (b)
more than 15% missing values (14 cases) [22], and (c)
respondents who failed to answer one or both of the
PET comprehension test questions (70 cases). An absolute majority of the participants were aged between 16
and 24 years (92.5%). 81 (58.7%) of the participants
were female, and 57 male; two did not specify. The
sample comprised 12 individuals (8.6%) who indicated
that they are already using a PET on their smartphones.
Three weeks later, an invitation to the follow-up quest-
Openness. Openness is connected to dimensions such
as fantasy, aesthetics, feelings, actions, ideas, and values [34]. Devaraj et al. [14] found support that openness impacts usage intention in technology adoption.
Individuals who score high on openness are characterized by a broader and deeper scope of awareness and a
higher need to enlarge and examine experience [35],
which leads to a higher willingness to try new and
different things. Given that PETs are still niche products, these individuals should have a higher interest in
discovering PETs. We hold:
H5e: Openness positively influences the intention
to use PETs.
4. Methodology
4.1. Operationalization of constructs
For the operationalization of our constructs, we
used validated measures from prior studies and
adapted them to the PET context (Appendix 1). Multi-item scales were used, since they have been proved
to provide better predictive validity for construct
measurement than single-item constructs [15]. The
protection motivation constructs and their subdomains (threat and coping appraisals) were operationalized with items from Witte et al. [52] and Johnston
4836
4835
Table 1. Internal consistency, discriminant validity, and latent variable correlation matrix
(1) AGREE
(2) BEH
(3) CONC
(4) CONSC
(5) EMOST
(6) EXP
(7) EXTRA
(8) INT
(9) OPEN
(10) PREF
(11) PSEF
(12) PSEV
(13) PSUS
CR
1.00
1.00
0.93
1.00
1.00
0.72
0.89
0.97
1.00
0.92
0.84
0.96
0.90
AVE
1.00
1.00
0.77
1.00
1.00
0.57
0.79
0.92
1.00
0.80
0.64
0.90
0.76
(1)
1.00
-0.07
0.03
0.34
0.10
0.08
0.04
0.16
0.14
0.11
0.04
0.00
-0.17
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
1.00
0.28
-0.25
-0.01
0.31
0.01
0.23
0.20
-0.06
0.09
0.25
0.08
0.88
-0.02
-0.13
0.33
-0.05
0.50
0.12
0.20
0.09
0.37
0.40
1.00
0.15
0.14
-0.08
-0.10
0.04
-0.07
-0.05
-0.09
-0.04
1.00
0.12
0.23
0.10
0.02
-0.10
0.13
0.03
0.02
0.76
0.13
0.39
0.19
0.04
0.18
0.15
0.35
0.89
0.13
0.17
0.05
-0.04
0.00
-0.03
0.96
0.08
0.36
0.32
0.38
0.34
1.00
0.01
0.06
0.11
0.05
0.90
0.25
0.10
0.09
0.80
0.12
0.18
0.95
0.30
0.87
ionnaire was sent via e-mail to 98 (of the 140) individuals who consented to take part in a second survey. Out
of the 98, a total of 71 participated in the follow-up.
one we had hypothesized. All the other personality
effects were not statistically significant, and the hypotheses (H5a, H5d, and H5e) were not supported.
Both control variables showed strong and significant influences and help to explain individuals’ intentions to use PETs. It is remarkable that privacy concerns had the strongest influence overall of any of the
constructs (b=0.31, p<0.01), while the values for prior
privacy experience were also fairly high (b=0.20,
p<0.01).
5. Results
5.1. Measurement model analysis
SmartPLS 3.0 was used for data analysis [42].
Composite reliability (CR), indicator loadings, and
average variance extracted (AVE) were assessed to
evaluate convergent validity. In addition, the FornellLarcker criterion and cross loadings were analyzed to
assess discriminant validity [18]. Five personality items
were deleted immediately due to low indicator loadings
with values below 0.4 (PER2; PER3; PER5; PER9),
and the items EXP1 (0.60) and EXP3 (0.66) were considered for removal [22]. We eliminated EXP1 since it
led to a substantial increase in AVE and CR of the
construct. All other suggested cut-off values were exceeded and the quality criteria met (Table 1).
6. Discussion
By drawing on PMT and FFM, this study developed a model that included both cognitive and personality-related factors and tested the proposed model in a
two-stage survey. The model explains a considerable
amount of PET usage intention. While PET usage
intention proved to be a significant antecedent of
PET adoption behavior, individuals’ intention still
covers only a small amount of explained variance of
the actual usage. As a substantial part of the variance
remains unexplained, other motives do notably influence PET adoption behavior. This leads us to the
conclusion that an analogous intention-behavior dichotomy, as observed by other researchers in the field
of privacy-related behavior [4], is manifested in the
field of PET adoption.
From the results of the PMT side of our model, it
can be concluded that the perceptions of the consequences of a privacy incident are important enough to
build a strong predictor of PET usage intention. Thus,
if individuals can grasp the potential negative consequences of privacy incidents, they should be more
likely to make use of PETs. By contrast, users’ assessment of the occurrence likelihood of a privacy
incident (=perceived susceptibility) yielded no significant impact on PET usage intention, thus not constituting a considerable antecedent. An interpretation of
this finding could be that users have difficulties as-
5.2. Structural model analysis
To test structural relationships, the hypothesized
causal paths were estimated using the pairwise replacement option, owing to the different sample sizes
for the initial and the follow-up questionnaires (Figure
2). The model explained a considerable amount of
variance in individuals’ intention to use PETs (R2 =
0.498), while the explanatory power for the subsequent
adoption behavior remained low (R2 = 0.051).
Concerning the hypotheses, we found a mixed picture (Table 2). Three of the four hypotheses related to
the PMT constructs found support, namely those for
severity, self-efficacy and response-efficacy, supporting
hypotheses 1, 3, and 4. Only the effect of susceptibility
on usage intention was not significant (p=0.28), and
thus H2 was not supported. The results concerning the
personality constructs led were surprising, as H5b and
H6c were significant, but in the direction opposite the
4837
4836
Cognitive factors
Threat appraisal
Perceived severity of privacy threats
Perc. susceptibility of privacy threats
Personality traits
Control variables
Privacy
concerns
+0.16*
Prev. privacy
experience
+0.31**
+0.10
Emotional stability
+0.16*
Agreeableness
+0.20**
+0.08
Intention to
use PETs
-0.14*
Perceived self-efficacy to use PETs
Conscientiousness
(R2=0.498)
Coping appraisal
+0.23*
+0.15*
Perceived response efficacy of PETs +0.21**
Adoption of
PETs
+0.09
Extraversion
-0.06
Openness
(R2=0.051)
* p < 0.05; ** p < 0.01.
Figure 2. Results of PLS analysis
sessing the chances that a privacy incident may happen to them or that they just believe these things will
happen only to others. It is conceivable that ongoing
press reports may lead to an increase in individuals’
susceptibility perception. However, while many users
have presumably already experienced damage caused
by viruses, at least some of the privacy incidents will
not be noticed, and the actual negative consequences
are more difficult to assess than losing data because
of a virus attack.
Perceived response efficacy is a significant predictor of PET usage intention. Thus, individuals’ perception of the availability and effectiveness of the PET
solution is a significant antecedent of users’ protective
intentions. Similar findings (albeit with a weaker influence) are obtained with respect to individuals’ perceived self-efficacy: If users feel they are able to find,
set up and install such solutions, they are more likely to
start using PETs. Both factors demonstrate the importance of clear and convincing communication of the
PET functional benefits and of its ease of use, as the
absence of one of the two might lead to further user
inaction.
Concerning personality, while few authors successfully implemented the TIPI in their research [28], others encountered substantial difficulties with respect to
its reliability coefficients [38]. We have chosen to
implement TIPI for the sake of brevity, but sadly, comparable problems occurred in our study, resulting in
low reliability coefficients (except extraversion). Although not aiming for high reliability levels, TIPI seeks
to be an adequate proxy for longer FFM instruments
[21]. Nevertheless, very low scores raise concerns
about the reliability of the results. In order to reach
more reliable conclusions regarding the personality
factors, four items have been eliminated. Keeping in
mind that single-item constructs reduce predictive
validity, the elimination led to four single-item constructs. We therefore emphasize that the conclusions
drawn from the personality side of our model should be
handled with caution.
Agreeableness was hypothesized to influence PET
usage intention negatively, while a positive link was
proposed for conscientiousness. Surprisingly, the results were the opposite of the effect we had expected
for both relations. Agreeableness is associated with
individuals who regard others as honest and trustworthy. While we assumed that this would result in individuals’ lower perceived need to act and install a PET,
it could apparently rather be individuals’ greater trust in
the PET supplier that leads to higher intention to use.
To test this assumption, we will add a construct to
measure trust in provider for a reassessment. Concerning conscientiousness, we can only imagine that using a
PET that could lead to restrictions concerning familiar
paths and functions can impose discomfort on conscious users, and thus lower intention to use.
6.1. Implications for theory
One contribution of our work is the integration of
both cognitive factors and personality traits as antecedents of individuals’ intention to use PETs. Previous
research related to PETs has often applied a technology-centered perspective or used common technology
acceptance models. However, in our view, traditional
approaches to technology adoption are not fully able to
grasp the ubiquitous privacy risks that users face. Thus,
we included personality traits to map latent, nonexplicitly expressed aspects that have an impact on
users’ behavior and are generally still under-researched
in IS. However, since the chosen inventory to assess
individuals’ personality turned out not to be elaborate
4838
4837
enough for our purpose, further research efforts are
necessary.
Related to the analysis of cognitive factors, we contribute by introducing protection motivation theory in
the context of individual privacy, in particular to PET
usage. While PMT has already been used to explain
information security behavior concerning threats
related to IT assets, to the best of our knowledge,
PMT has not yet been applied to our particular field
of interest. In our context, the fundamental PMT
assumptions are met, since privacy threats are of high
relevance to an individual’s self, while the application of PETs can directly alleviate these threats.
Hence, for future research in this context, we suggest
making use of the PMT and its facets.
Although our joint model explains a considerable
share of variance on PET usage intention, there is a
substantial difference with the explained share of variance for actual usage. Acknowledging the limitation
that we put participants into a scenario in which they
otherwise might not have shown any interest, this limitation implies that especially in the field of privacy,
further research should seek to further explain the gap
between intention and actual behavior.
tion, suppliers’ communication should target PETs’
convenient ease of use, implementation and setup.
Second, new insights are also highly relevant for
actors that are still profiting from users’ passive responses to privacy threats – among others, online
advertisers and suppliers of advertising-financed
services. Although we do not intend to strengthen
their currently sometimes privacy-invasive practices
– which continue to work, despite being disliked by
many users – these actors also have an interest in a
better understanding of why users often do not act in
privacy-sensitive ways. Our results indicate that users
do not take into account the susceptibility of being
subject to privacy incidents, which might be caused
by their inability to quantify this risk. Following
these lines, it is even possible that the oft-cited omnipresent fear that users appear to have of privacy incidents might be a conformity statement rather than a
true fear.
7. Next steps
Owing to the methodological shortcomings of the
TIPI operationalization to measure the personality traits
in our study, we will replicate our survey with minor
adaptations of the research model and an extended
personality framework. For the latter, we hope that a
more elaborate personality scale will lead to more
robust results. We decided to extend the personality
inventory to 25 items with five items per dimension
[19]. On this basis, we seek to expand our
understanding of how cognitive and personality-related
factors interact in users’ adoption and usage of PETs.
6.2. Implications for practice
Different actors in practice can benefit from an
improved understanding of how users handle threats
to their personal privacy, how their beliefs in the
application of technologies alleviate these matters,
and how their personality influences all of these factors.
First, the implications are useful for PET suppliers, whose products continue to have low usage rates.
They can be providers of security software (e.g. antivirus) that sell PETs as an additional module, but also
providers of standalone PETs that seek greater insight
into how they can foster the diffusion of their products. Our results show that while the fear of the consequences of a privacy incident causes the intention
to use protective software, the susceptibility does not
account for such intentions. Since the public media is
already sending strong and frequent threat messages
to users, our findings indicate that more precise supplier communication messages need to be sent out.
Certain antivirus software suppliers are already sending out messages on a regular basis about current
severe threats to users of their free versions in order
to encourage them to upgrade to the full version of
their products. In addition, users need to be convinced of the PETs’ effectiveness and easy usability.
Following the privacy-by-design principles, we suggest
integrated solutions wherever possible to reduce the
implementation effort for users to near zero. In addi-
Appendix 1
Perceived Severity (SEV, adapted from Witte et al. [52])
1. I believe that the consequences of a privacy incident
are severe.
2. I believe that the consequences of a privacy incident
are serious.
3. I believe that the consequences of a privacy incident
are significant.
Perceived Susceptibility (SUS, adapted from Witte et al.
[52])
1. I am at risk of becoming a victim of privacy incidents.
2. It is likely that I will experience privacy incidents.
3. It is possible that I will experience privacy incidents.
Self-efficacy (SEF, adapted from Johnston et al. [27])
1. Setting up a PET is easy.
2. Setting up a PET is convenient.
3. I am able to set up a PET without much effort.
4839
4838
Model of User Adaptation", MIS Quart., 29(3), 2005, pp.
493-524.
[4] Berendt, B., Günther, O., and Spiekermann, S., "Privacy
in E-Commerce: Stated Preferences Vs. Actual Behavior",
Comm. ACM, 48(4), 2005, pp. 101-106.
[5] Brecht, F., Fabian, B., Kunz, S., and Mueller, S., "Are
You Willing to Wait Longer for Internet Privacy?", ECIS
Proceedings, 2011
[6] Briggs, S.R., "Assessing the Five-Factor Model of
Personality Description", J Pers, 60(2), 1992, pp. 253-293.
[7] Chauvin, B., Hermand, D., and Mullet, E., "Risk
Perception and Personality Facets", Risk Anal, 27(1), 2007,
pp. 171-185.
[8] Clemons, E.K., and Wilson, J., "Students' and Parents'
Attitudes Towards Online Privacy: An International
Study", HICSS Proceedings, 2015, pp. 4844-4853.
[9] Conner, M., and Abraham, C., "Conscientiousness and
the Theory of Planned Behavior: Toward a More Complete
Model of the Antecedents of Intentions and Behavior", Pers
Soc Pychol B, 27(11), 2001, pp. 1547-1561.
[10] Costa, P.T., and Mccrae, R.R., Revised NEO
Personality Inventory (NEO PI-R) and NEO Five-Factor
Inventory (NEO FFI): Professional Manual, Psychological
Assessment Resources, Odessa, FL, 1992.
[11] Costa, P.T., Mccrae, R.R., and Dye, D.A., "Facet
Scales for Agreeableness and Conscientiousness: A
Revision of the NEO Personality Inventory", Personality
and Individual Differences, 12(9), 1991, pp. 887-898.
[12] Culnan, M.J., and Bies, R.J., "Consumer Privacy:
Balancing Economic and Justice Considerations", J. Soc.
Issues, 59(2), 2003, pp. 323-342.
[13] Davis, F.D., "Perceived Usefulness, Perceived Ease of
Use, and User Acceptance of Information Technology",
MIS Quart., 13(3), 1989, pp. 319-340.
[14] Devaraj, S., Easley, R.F., and Crant, J.M., "Research
Note—How Does Personality Matter? Relating the FiveFactor Model to Technology Acceptance and Use", Inform.
Systems Res., 19(1), 2008, pp. 93-105.
[15] Diamantopoulos, A., Sarstedt, M., Fuchs, C.,
Wilczynski, P., and Kaiser, S., "Guidelines for Choosing
between Multi-Item and Single-Item Scales for Construct
Measurement: A Predictive Validity Perspective", J. of the
Acad. Mark. Sci., 40(3), 2012, pp. 434-449.
[16] Dimatteo, M.R., Haskard, K.B., and Williams, S.L.,
"Health Beliefs, Disease Severity, and Patient Adherence:
A Meta-Analysis", Med. Care, 45(6), 2007, pp. 521-528.
[17] Dinev, T., and Hart, P., "An Extended Privacy
Calculus Model for E-Commerce Transactions", Inform.
Systems Res., 17(1), 2006, pp. 61-80.
[18] Fornell, C., and Larcker, D.F., "Evaluating Structural
Equation Models with Unobservable Variables and
Measurement Error", J. Marketing Res., 1981, pp. 39-50.
[19] Gerlitz, J.-Y., and Schupp, J., "Zur Erhebung Der BigFive-Basierten Persönlichkeitsmerkmale Im SOEP", DIW
Research Notes, 2005, pp. 1-44.
[20] Goldberg, L.R., "The Development of Markers for the
Big-Five Factor Structure", Psychol Assessment, 4(1),
1992, pp. 26-42.
[21] Gosling, S.D., Rentfrow, P.J., and Swann, W.B., "A
Very Brief Measure of the Big-Five Personality Domains",
J Res Pers, 37(6), 2003, pp. 504-528.
Response Efficacy (REF, adapted from Witte et al. [52])
1. A PET is able to prevent privacy incidents.
2. Using a PET is effective in preventing privacy incidents.
3. If I use a PET, I am less likely to experience privacy incidents.
Ten-Item Personality Invent. (PER, Gosling et al. [21])
I see myself as:
1. Extraverted, enthusiastic.
2. Critical, quarrelsome. (reversed)
3. Dependable, self-disciplined.
4. Anxious, easily upset. (reversed)
5. Open to new experiences, complex.
6. Reserved, quiet. (reversed)
7. Sympathetic, warm.
8. Disorganized, careless. (reversed)
9. Calm, emotionally stable.
10. Conventional, uncreative. (reversed)
Privacy Concerns (PC, Dinev and Hart [17])
1. I am concerned that the information I submit on the
Internet could be misused.
2. I am concerned that a person can find private information about me on the Internet.
3. I am concerned about submitting information on the
Internet, because of what others might do with it.
4. I am concerned about submitting information on the
Internet, because it could be used in a way I did not
foresee.
Previous Privacy Experience (EXP, Xu et al. [55])
1. How often have you been a victim of what you felt
was an improper invasion of privacy?*
2. How much have you heard or read during the past
year about the use and potential misuse of information collected from the Internet?
3. How often have you experienced incidents where
your personal information was used by a company
without your authorization?
Behavioral Intention (BI, adapted from Venkatesh et al.
[49])
1. I intend to use PETs in the next few months.
2. I predict I would use PETs in the next few months.
3. I plan to use PETs in the next few months.
Actual Behavior (ACT, adapted from Liang and Xue [31])
I use a PET on my smartphone to protect me from privacy
incidents.
* Item has been removed for analyses.
References
[1] Agarwal, R., Sambamurthy, V., and Stair, R.M., "The
Evolving Relationship between General and Specific
Computer Self-Efficacy-an Empirical Assessment", Inform.
Systems Res., 11(4), 2000, pp. 418-430.
[2] Barrick, M.R., Mount, M.K., and Judge, T.A.,
"Personality and Performance at the Beginning of the New
Millennium: What Do We Know and Where Do We Go
Next?", Int J Select Assess, 9(1-2), 2001, pp. 9-30.
[3] Beaudry, A., and Pinsonneault, A., "Understanding
User Responses to Information Technology: A Coping
4840
4839
[39] Pyszczynski, T., Greenberg, J., and Solomon, S.,
"Why Do We Need What We Need? A Terror Management
Perspective on the Roots of Human Social Motivation",
Psychol Inq, 8(1), 1997, pp. 1-20.
[40] Renaud, K., Volkamer, M., and Renkema-Padmos, A.,
"Why Doesn’t Jane Protect Her Privacy?", Privacy
Enhancing Technologies Proceedings, 2014, pp. 244-262.
[41] Rindfleisch, T.C., "Privacy. Information Technology,
and Health Care", Comm. ACM, 40(8), 1997, pp. 93-100.
[42] Ringle, C.M., Wende, S., and Becker, J.-M.,
SmartPLS 3, SmartPLS, Hamburg, 2015.
[43] Rogers, R.W., "A Protection Motivation Theory of
Fear Appeals and Attitude Change", J. Psychol., 91(1),
1975, pp. 93-114.
[44] Rogers, R.W., "Cognitive and Physiological Processes
in Fear Appeals and Attitude Change: A Revised Theory of
Protection Motivation", in Cacioppo, J.T., and Petty, R.E.:
Social Psychophysiology: A Sourcebook, The Guilford
Press, New York, NY, 1983, pp. 153-177.
[45] Smith, H.J., Dinev, T., and Xu, H., "Information
Privacy Research: An Interdisciplinary Review", MIS
Quart., 35(4), 2011, pp. 989-1015.
[46] Smith, H.J., Milberg, S.J., and Burke, S.J.,
"Information Privacy: Measuring Individuals' Concerns
About Organizational Practices", MIS Quart., 20(2), 1996,
pp. 167-196.
[47] Solove, D.J., "A Taxonomy of Privacy", U. Pa. L.
Rev., 154(3), 2006, pp. 477-564.
[48] Sweeny, K., Melnyk, D., Miller, W., and Shepperd,
J.A., "Information Avoidance: Who, What, When, and
Why", Rev. Gen. Psychol., 14(4), 2010, pp. 340-353.
[49] Venkatesh, V., Morris, M.G., Davis, G.B., and Davis,
F.D., "User Acceptance of Information Technology:
Toward a Unified View", MIS Quart., 27(3), 2003, pp. 425478.
[50] Webb, T.L., and Sheeran, P., "Does Changing
Behavioral Intentions Engender Behavior Change? A MetaAnalysis of the Experimental Evidence", Psychol. Bull.,
132(2), 2006, pp. 249-268.
[51] Wirtz, J., Lwin, M.O., and Williams, J.D., "Causes and
Consequences of Consumer Online Privacy Concern", Int J
Serv Ind Manag, 18(4), 2007, pp. 326-348.
[52] Witte, K., Cameron, K.A., Mckeon, J.K., and
Berkowitz, J.M., "Predicting Risk Behaviors: Development
and Validation of a Diagnostic Scale", J. Health Commun.,
1(4), 1996, pp. 317-342.
[53] Woon, I., Tan, G.-W., and Low, R., "A Protection
Motivation Theory Approach to Home Wireless Security",
ICIS Proceedings, 2005
[54] Workman, M., Bommer, W.H., and Straub, D.,
"Security Lapses and the Omission of Information Security
Measures: A Threat Control Model and Empirical Test",
Comput. Hum. Behav., 24(6), 2008, pp. 2799-2816.
[55] Xu, H., Dinev, T., Smith, J., and Hart, P., "Information
Privacy Concerns: Linking Individual Perceptions with
Institutional Privacy Assurances", J. Assoc. Inf. Syst.,
12(12), 2011, pp. 798-824.
[22] Hair Jr., J.F., Hult, G.T.M., Ringle, C.M., and Sarstedt,
M., A Primer on Partial Least Squares Structural Equation
Modeling (PLS-SEM), SAGE Publications, Thousand
Oaks, 2014.
[23] Herck, K., Zuckerman, J., Castelli, F., Damme, P.,
Walker, E., and Steffen, R., "Travelers' Knowledge,
Attitudes, and Practices on Prevention of Infectious
Diseases: Results from a Pilot Study", J. Travel. Med,
10(2), 2003, pp. 75-78.
[24] Jackson, J.D., Yi, M.Y., and Park, J.S., "An Empirical
Test of Three Mediation Models for the Relationship
between Personal Innovativeness and User Acceptance of
Technology", Inform. Manage., 50(4), 2013, pp. 154-161.
[25] Johnson, J.D., Cancer-Related Information Seeking,
Hampton Press, Cresskill, NJ, 1997.
[26] Johnston, A.C., and Warkentin, M., "Fear Appeals and
Information Security Behaviors: An Empirical Study", MIS
Quart., 34(3), 2010, pp. 549-566.
[27] Johnston, A.C., Warkentin, M., and Siponen, M., "An
Enhanced Fear Appeal Rhetorical Framework: Leveraging
Threats to the Human Asset through Sanctioning Rhetoric",
MIS Quart., 39(1), 2015, pp. 113-134.
[28] Junglas, I.A., Johnson, N.A., and Spitzmüller, C.,
"Personality Traits and Concern for Privacy: An Empirical
Study in the Context of Location-Based Services", Eur. J.
Inform. Syst., 17(4), 2008, pp. 387-402.
[29] Kahneman, D., and Tversky, A., Choices, Values, and
Frames, Cambridge Univ. Press, Cambridge, UK, 2000.
[30] Kumar, N., Mohan, K., and Holowczak, R., "Locking
the Door but Leaving the Computer Vulnerable: Factors
Inhibiting Home Users' Adoption of Software Firewalls",
Decis. Support Syst., 46(1), 2008, pp. 254-264.
[31] Liang, H., and Xue, Y., "Understanding Security
Behaviors in Personal Computer Usage: A Threat
Avoidance Perspective", J. Assoc. Inf. Syst., 11(7), 2010,
pp. 394-413.
[32] Maddi, S.R., Personality Theories: A Comparative
Analysis, Dorsey Press, Homewood, IL, US, 1989.
[33] Maier, C., "Personality within Information Systems
Research: A Literature Analysis", ECIS Proceedings, 2012
[34] Mccrae, R.R., and Costa, P.T., "Personality, Coping,
and Coping Effectiveness in an Adult Sample", J Pers,
54(2), 1986, pp. 385-405.
[35] Mccrae, R.R., and Costa, P.T., "Adding Liebe Und
Arbeit: The Full Five-Factor Model and Well-Being", Pers
Soc Pychol B, 17(2), 1991, pp. 227-232.
[36] Mcelroy, J.C., Hendrickson, A.R., Townsend, A.M.,
and Demarie, S.M., "Dispositional Factors in Internet Use:
Personality Versus Cognitive Style", MIS Quart., 31(4),
2007, pp. 809-820.
[37] Pechmann, C., Zhao, G., Goldberg, M.E., and
Reibling, E.T., "What to Convey in Antismoking
Advertisements for Adolescents:The Use of Protection
Motivation Theory to Identify Effective Message Themes",
J. Marketing, 67(2), 2003, pp. 1-18.
[38] Picazo-Vela, S., Chou, S.Y., Melcher, A.J., and
Pearson, J.M., "Why Provide an Online Review? An
Extended Theory of Planned Behavior and the Role of BigFive Personality Traits", Comput. Hum. Behav., 26(4),
2010, pp. 685-696.
4841
4840