Abstract
AbstractSeveral theories and behavioral models aiming to explain user privacy behavior, including the privacy paradox, have been proposed in the literature. In this chapter, we give an introduction to the behavioral models that are most frequently used in privacy research, as well as those that originate in other contexts but nevertheless have the potential to make a meaningful contribution to explaining user privacy behavior. We further discuss to what extent the behavioral models help us to explain and predict privacy behaviors. The renowned privacy calculus model, for example, falls short in this respect since it remains unclear which consequences are evaluated by the user, whereas other models such as the theory of planned behavior can offer novel insights when combined with models such as HAPA or COM-B that are so far unfathomed in the context of privacy research.
Publisher
Springer International Publishing
Reference40 articles.
1. Abelson, R. P., Aronson, E. E., McGuire, W. J., Newcomb, T. M., Rosenberg, M. J., & Tannenbaum, P. H. (1968). Theories of cognitive consistency: A sourcebook. Rand-McNally.
2. Achtziger, A. & Gollwitzer, P. M. (2008). Motivation and volition in the course of action. In Motivation and action (2nd ed., pp. 272–295). Cambridge University Press.
3. Acock, A. C., & DeFleur, M. L. (1972). A configurational approach to contingent consistency in the attitude–behavior relationship. American Sociological Review, 37(6), 714–726.
4. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. Theories of Cognitive Self-Regulation.
5. Ajzen, I. (2012). Martin Fishbein’s legacy: The reasoned action approach. The ANNALS of the American Academy of Political and Social Science, 640(1), 11–27.