EconPapers    
Economics at your fingertips  
 

Internet Privacy Concerns versus Behavior: A Protection Motivation Approach

Kenneth J. Sousa, Laurie E. MacDonald and Kenneth T. Fougere
Additional contact information
Kenneth J. Sousa: Department of Computer Information Systems, Bryant University, Smithfield, RI, USA
Laurie E. MacDonald: Department of Computer Information Systems, Bryant University, Smithfield, RI, USA
Kenneth T. Fougere: Department of Computer Information Systems, Bryant University, Smithfield, RI, USA

International Journal of Information Systems and Social Change (IJISSC), 2012, vol. 3, issue 4, 53-64

Abstract: This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students.

Date: 2012
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/jissc.2012100104 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jissc0:v:3:y:2012:i:4:p:53-64

Access Statistics for this article

International Journal of Information Systems and Social Change (IJISSC) is currently edited by John Wang

More articles in International Journal of Information Systems and Social Change (IJISSC) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jissc0:v:3:y:2012:i:4:p:53-64