Abstract
PurposeOnline privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users' stated preferences. This article investigates the level of modeling that contemporary approaches rely on to explain said inconsistencies and whether drawn conclusions are justified by the applied modeling methodology. Additionally, it provides resources for researchers interested in using computational modeling.Design/methodology/approachThe article uses data from a pre-existing literature review on the privacy paradox (N = 179 articles) to identify three characteristics of prior research: (1) the frequency of references to computational-level theories of human decision-making and perception in the literature, (2) the frequency of interpretations of human decision-making based on computational-level theories, and (3) the frequency of actual computational-level modeling implementations.FindingsAfter excluding unrelated articles, 44.1 percent of investigated articles reference at least one theory that has been traditionally interpreted on a computational level. 33.1 percent of all relevant articles make statements regarding computational properties of human cognition in online privacy scenarios. Meanwhile, 5.1 percent of all relevant articles apply formalized computational-level modeling to substantiate their claims.Originality/valueThe findings highlight the importance of formal, computational-level modeling in online privacy research, which has so far drawn computational-level conclusions without utilizing appropriate modeling techniques. Furthermore, this article provides an overview of said modeling techniques and their benefits to researchers, as well as references for model theories and resources for practical implementation.
Subject
General Business, Management and Accounting,Education
Reference82 articles.
1. Acquisti, A. and Grossklags, J. (2004), “Privacy attitudes and privacy behavior”, in Camp, L.J. and Lewis, S. (Eds.), Economics of Information Security, Kluwer Academic Publishers, Vol. 12, pp. 165-178.
2. The economics of privacy;Journal of Economic Literature,2016
3. The 6As model of social content management;International Journal of Information Management,2014
4. Anderson, J.R. and Matessa, M. (1990), “A rational analysis of categorization”, Proceedings of the Seventh International Machine Learning Conference, Palo Alto, CA, Morgan Kaufmann Publishers, pp. 76-84.
5. Theory, the final Frontier? a corpus-based analysis of the role of theory in psychological articles;Frontiers in Psychology,2017
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献