The development of the Internet has brought great convenience to citizens' lives, but also caused a series of privacy security problems. The netizens' leakage of other's privacy is a major concern for information security government. In efforts to understand this problem, we employed the neutralization theory, a theory prominent in criminology but not yet applied in the context of privacy leakage. It offers new insight into how netizens rationalize their leakage behaviors. Choosing the human flesh search as a typical example of our research object, we proposed a research model to test the influence factors of the intention to leak other' privacy under the Internet. Using data from a sample of 759 valid questionnaires, the relevance of neutralization theory was tested via SmartPLS2.0. The findings indicated that the techniques associated with denial of responsibility, denial of victim, and avoidance of greater harm positively influenced the intention of leaking other's privacy, the technologies of denial of injury and appeal to higher loyalties had no significant effect on the intention. Furthermore, enhancing personal privacy awareness can effectively weaken the behavior intention to disclose the privacy of others. Our empirical results highlight neutralization and privacy awareness as important factors to take into account with regard to developing and implementing netizens' behavior policies and practices.
Key words
leak the privacy of others /
neutralization theory /
privacy awareness /
human flesh search
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
References
[1]瑞星网.瑞星2012年中国信息安全综合报告[DB/OL]. http://www.rising.com.cn/about/news/rising/2013-01-15/13051.html. 2012.Rising.Chinese information security comprehensive report in 2012[DB/OL]. http://www.rising.com.cn/about/news/rising/2013-01-15/13051.html. 2012.
[2] Chao C H, Tao Y H. Human flesh search:A supplemental review[J]. Cyberpsychology, Behavior, and Social Networking. 2012, 15(7):350-356.
[3] Phelps J E, D'Souza G, Nowak G J. Antecedents and consequences of consumer privacy concerns:An empirical investigation[J]. Journal of Interactive Marketing. 2001, 15(4):2-17.
[4] Li Y. Theories in online information privacy research:A critical review and an integrated framework[J]. Decision Support Systems. 2012, 54(1):471-481.
[5] Moon Y. Intimate exchanges:Using computers to elicit self-disclosure from consumers[J]. Journal of Consumer Research. 2000, 26(4):323-339.
[6]王洪伟,周曼,何绍义.影响个人在线提供隐私信息意愿的实证研究[J].系统工程理论与实践. 2012, 32(10):2186-2197.Wang H W,Zhou M,He S Y. Empirical research of individual's intention to provide privacy information online[J].Sytems engineering-theory and practice. 2012, 32(10):2186-2197.
[7] Special W P, Li-Barber K T. Self-disclosure and student satisfaction with facebook[J]. Computers in Human Behavior. 2011.
[8] Sykes G M, Matza D. Techniques of neutralization:A theory of delinquency[J]. American Sociological Review. 1957, 22(6):664-670.
[9] Garrett D E, Bradford J L, Meyers R A, et al. Issues management and organizational accounts:An analysis of corporate responses to accusations of unethical business practices[J]. Journal of Business Ethics. 1989, 8(7):507-520.
[10] Eliason S L, Dodder R A. Techniques of neutralization used by deer poachers in the western united states:A research note[J]. Deviant Behavior. 1999, 20(3):233-252.
[11] Priest T B, Mcgrath Iii J H. Techniques of neutralization:Young adult marijuana smokers[J]. Criminology. 1970, 8(2):185-194.
[12] Thurman Q C, John C S, Riggs L. Neutralization and tax evasion:How effective would a moral appeal be in improving compliance to tax laws?[J]. Law & Policy. 1984, 6(3):309-327.
[13] Pershing J L. To snitch or not to snitch? Applying the concept of neutralization techniques to the enforcement of occupational misconduct[J]. Sociological Perspectives. 2003, 46(2):149-178.
[14] Harrington S J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions[J]. MIS Quarterly. 1996:257-278.
[15] Lim V K G. The IT way of loafing on the job:Cyberloafing, neutralizing and organizational justice[J]. Journal of Organizational Behavior. 2002, 23(5):675-694.
[16] Harris L C, Dumas A. Online consumer misbehaviour:An application of neutralization theory[J]. Marketing Theory. 2009, 9(4):379-402.
[17] Siponen M, Vance A. Neutralization:New insights into the problem of employee information systems security policy violations[J]. MIS Quarterly. 2010, 34(3):487.
[18] Mccabe D L. The influence of situational ethics on cheating among college students[J]. Sociological Inquiry. 1992, 62(3):365-374.
[19]雍自元.犯罪心理的解析与启示——以许霆案为例[J].安徽师范大学学报(人文社会科学版). 2008, 36(5).Yong Z Y. Parsing and revelations of the criminal mentality-xu ting case as an example. Journal of Anhui Normal University(Humanities and Social Sciences). 2008, 36(5).
[20] Choi N, Kim D, Goo J, et al. Knowing is doing:An empirical validation of the relationship between managerial information security awareness and action[J]. Information Management & Computer Security. 2008, 16(5):484-501.
[21] Tsohou A, Kokolakis S, Karyda M, et al. Investigating information security awareness:Research and practice gaps[J]. Information Security Journal:A Global Perspective. 2008, 17(5-6):207-227.
[22] Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance:An empirical study of rationality-based beliefs and information security awareness.[J]. MIS Quarterly. 2010, 34(3).
[23] Goodhue D L, Straub D W. Security concerns of system users:A study of perceptions of the adequacy of security[J]. Information & Management. 1991, 20(1):13-27.
[24] Siponen M T. Five dimensions of information security awareness[J]. Computers and Society. 2001, 31(2):24-29.
[25] Kumar N, Mohan K, Holowczak R. Locking the door but leaving the computer vulnerable:Factors inhibiting home users' adoption of software firewalls[J]. Decision Support Systems. 2008, 46(1):254-264.
[26] Phelps J, Nowak G, Ferrell E. Privacy concerns and consumer willingness to provide personal information[J]. Journal of Public Policy & Marketing. 2000:27-41.
[27] P tzsch S. Privacy awareness:A means to solve the privacy paradox?[M]. The Future of Identity in the Information Society, Springer, 2009, 226-236.
[28] Dinev T, Hu Q. The centrality of awareness in the formation of user behavioral intention toward protective information technologies.[J]. Journal of the Association for Information Systems. 2007, 8(7).
[29] Ingram J R, Hinduja S. Neutralizing music piracy:An empirical examination[J]. Deviant Behavior. 2008, 29(4):334-366.