Online privacy control via anonymity and pseudonym: Cross-cultural implications
Privacy's exact nature needs to reflect the contemporary view of a society. A growing number of online users demand the protection of their personal privacy via anonymity and pseudonym. The efficacy of these two privacy controls in different online environments is unknown. This study applies so...
Saved in:
Published in | Behaviour & information technology Vol. 27; no. 3; pp. 229 - 242 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Colchester
Taylor & Francis
01.05.2008
|
Subjects | |
Online Access | Get full text |
ISSN | 0144-929X 1362-3001 |
DOI | 10.1080/01449290601156817 |
Cover
Loading…
Abstract | Privacy's exact nature needs to reflect the contemporary view of a society. A growing number of online users demand the protection of their personal privacy via anonymity and pseudonym. The efficacy of these two privacy controls in different online environments is unknown. This study applies social psychology theories to explore the relationship between these personal sentiments-authoritative personality, empathy, fear of negative evaluation, self-esteem, and motives of online privacy rights. We conducted a quasi-experiment by manipulating four online environments (personal e-mail exchange, members-only newsgroup, public newsgroup, and online chat room), and three user identification modes (real name, anonymity and pseudonym). More than 600 subjects from the USA and Taiwan participated in the experimental study. The results of path analysis confirm the effects of some personal sentiments on the motives of online privacy rights. The study concludes with theoretical and practical implications for the roles of privacy in the online society. |
---|---|
AbstractList | Privacy's exact nature needs to reflect the contemporary view of a society. A growing number of online users demand the protection of their personal privacy via anonymity and pseudonym. The efficacy of these two privacy controls in different online environments is unknown. This study applies social psychology theories to explore the relationship between these personal sentiments-authoritative personality, empathy, fear of negative evaluation, self-esteem, and motives of online privacy rights. We conducted a quasi-experiment by manipulating four online environments (personal e-mail exchange, members-only newsgroup, public newsgroup, and online chat room), and three user identification modes (real name, anonymity and pseudonym). More than 600 subjects from the USA and Taiwan participated in the experimental study. The results of path analysis confirm the effects of some personal sentiments on the motives of online privacy rights. The study concludes with theoretical and practical implications for the roles of privacy in the online society. |
Author | Chen, Charlie C. Yang, Samuel C. Chen, Houn-Gee Lo, Louis |
Author_xml | – sequence: 1 givenname: Houn-Gee surname: Chen fullname: Chen, Houn-Gee organization: Institute of Technology Management, National Tsing Hua University – sequence: 2 givenname: Charlie C. surname: Chen fullname: Chen, Charlie C. organization: Computer Information Systems Department , Appalachian State University – sequence: 3 givenname: Louis surname: Lo fullname: Lo, Louis organization: Department of Management Information System , National Chengchi University – sequence: 4 givenname: Samuel C. surname: Yang fullname: Yang, Samuel C. email: syang@fullerton.edu organization: Information Systems and Decision Sciences Department , California State University |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=20419564$$DView record in Pascal Francis |
BookMark | eNqNkMFu1DAQhi1UJLaFB-CWC9xCZ-I4iREXtCoUqdJeQOIWTWxHMnLsxXYKeXu8tHCgQnCy5fk-z8x_zs588Iax5wivEAa4BGxb2UjoAFF0A_aP2A5519QcAM_Y7lSvC_D5CTtP6QsAtN3Q7Njh4J31pjpGe0tqq1TwOQZX3VqqqPTYFpu3ctPVMZlVnx5eV_sYUqrV6vIayVV2OTqrKNvg01P2eCaXzLP784J9enf1cX9d3xzef9i_vamVgDbXGvkwGcBJEyAIgb2eBiF4J1DNaEQjpJ6U5Eb3YqKh6aRBwkFOPYGWg-QX7OXdv8cYvq4m5XGxSRnnyJuwppHzkkLfNAV8cQ9SUuTmSF7ZNJZ9F4rb2ECLUnRt4fCOU6flopl_IwjjKeLxQcTF6f9wlM0_c8iRrPsf0_o5xIW-hej0mGlzIf4a8YE15u-5mG_-afK_N_4B4U-myQ |
CODEN | BEITD5 |
CitedBy_id | crossref_primary_10_1080_0144929X_2015_1128973 crossref_primary_10_1108_IMR_09_2013_0213 crossref_primary_10_5209_clac_72002 crossref_primary_10_1016_j_giq_2019_01_002 crossref_primary_10_1016_j_dim_2023_100027 crossref_primary_10_1080_0144929X_2015_1066444 crossref_primary_10_4018_IJCBPL_2017100106 crossref_primary_10_1016_j_chb_2012_09_011 crossref_primary_10_5817_CP2024_4_9 crossref_primary_10_1016_j_dss_2019_02_007 crossref_primary_10_1016_j_chb_2014_12_032 crossref_primary_10_4018_IJICTHD_2018070101 crossref_primary_10_1080_17517575_2021_1913765 crossref_primary_10_1080_0144929X_2013_805244 crossref_primary_10_1002_ab_21923 crossref_primary_10_1016_j_adolescence_2013_03_016 crossref_primary_10_3390_soc5010043 crossref_primary_10_5859_KAIS_2015_24_3_21 crossref_primary_10_17662_ksdim_2015_11_3_159 crossref_primary_10_1108_JIBR_06_2012_0046 crossref_primary_10_1016_j_im_2013_07_011 crossref_primary_10_1177_0829573510396318 crossref_primary_10_1080_0144929X_2022_2046162 crossref_primary_10_1177_14614448211018797 crossref_primary_10_1080_0144929X_2020_1842907 crossref_primary_10_1080_0144929X_2023_2191748 crossref_primary_10_1108_K_12_2013_0264 crossref_primary_10_1080_0144929X_2016_1242653 crossref_primary_10_1080_0144929X_2018_1544275 crossref_primary_10_2139_ssrn_1746163 crossref_primary_10_1080_01449291003611326 crossref_primary_10_1007_s10551_017_3481_y |
ContentType | Journal Article |
Copyright | Copyright Taylor & Francis Group, LLC 2008 2015 INIST-CNRS |
Copyright_xml | – notice: Copyright Taylor & Francis Group, LLC 2008 – notice: 2015 INIST-CNRS |
DBID | AAYXX CITATION IQODW 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1080/01449290601156817 |
DatabaseName | CrossRef Pascal-Francis Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Psychology Computer Science |
EISSN | 1362-3001 |
EndPage | 242 |
ExternalDocumentID | 20419564 10_1080_01449290601156817 215611 |
GroupedDBID | -~X .4I .4S .7F .DC .QJ 0BK 0R~ 23N 2DF 30N 4.4 53G 5GY 5VS 6J9 6PF 77K 8VB AAENE AAIKC AAJMT AALDU AAMIU AAMNW AAPUL AAQRR AAWTL ABCCY ABDBF ABFIM ABHAV ABIVO ABJNI ABLIJ ABLJU ABPAQ ABPEM ABTAI ABXUL ABXYU ABZLS ACGEJ ACGFO ACGFS ACGOD ACHQT ACNCT ACTIO ACUHS ADCVX ADGTB ADUMR ADXPE AEGXH AEISY AEMOZ AENEX AEOZL AEPSL AEYOC AGDLA AGMYJ AHDZW AHQJS AIAGR AIJEM AJWEG AKBVH AKOOK AKVCP ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH ARCSS AVBZW AWYRJ BLEHA CAG CCCUG CE4 COF CS3 DGEBU DKSSO EAP EBR EBS EBU ECS EDO EJD ELW EMK EPL EPS EST ESX E~A E~B F5P FEDTE GTTXZ H13 HVGLF HZ~ H~P IPNFZ ITG ITH J.P K1G KYCEM M4Z MK~ ML~ NA5 NX~ O9- P2P PQQKQ QWB RIG RNANH ROSJB RTWRZ S-T SNACF TBQAZ TDBHL TEN TFL TFT TFW TH9 TN5 TNC TTHFI TUROJ TUS TWF UT5 UU3 XJE ZGOLN ZL0 ~S~ 07I 1TA 3EH 4B5 AAGDL AAHIA AAYLN AAYXX ABDPE ACTTO ADMLS ADXEU ADYSH AEHZU AEZBV AFBWG AFION AFRVT AGBLW AGVKY AGWUF AI. AIYEW AKHJE AKMBP ALRRR ALXIB AMPGV BGSSV BWMZZ C0- C5H CITATION CYRSC DAOYK DEXXA FETWF HF~ IFELN L8C LJTGL NUSFT OPCYK TAJZE TAP UB6 VH1 IQODW 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c504t-d138be01bda0105517db8553651cf1e5259dbc93ed75ba8269e1a189b7a0d9893 |
ISSN | 0144-929X |
IngestDate | Fri Jul 11 09:14:33 EDT 2025 Wed Apr 02 07:16:24 EDT 2025 Thu Apr 24 22:57:22 EDT 2025 Tue Jul 01 02:06:43 EDT 2025 Mon May 13 12:09:09 EDT 2019 Wed Dec 25 09:03:24 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Private life Anonymity User study World wide web |
Language | English |
License | CC BY 4.0 |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c504t-d138be01bda0105517db8553651cf1e5259dbc93ed75ba8269e1a189b7a0d9893 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
OpenAccessLink | http://libres.uncg.edu/ir/asu/f/Chen_Charlie_2008_Online_privacy_Control_Anonymity_pdf.X.pdf |
PQID | 33568722 |
PQPubID | 23500 |
PageCount | 14 |
ParticipantIDs | crossref_primary_10_1080_01449290601156817 informaworld_taylorfrancis_310_1080_01449290601156817 proquest_miscellaneous_33568722 crossref_citationtrail_10_1080_01449290601156817 pascalfrancis_primary_20419564 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2008-05-00 |
PublicationDateYYYYMMDD | 2008-05-01 |
PublicationDate_xml | – month: 05 year: 2008 text: 2008-05-00 |
PublicationDecade | 2000 |
PublicationPlace | Colchester |
PublicationPlace_xml | – name: Colchester |
PublicationTitle | Behaviour & information technology |
PublicationYear | 2008 |
Publisher | Taylor & Francis |
Publisher_xml | – name: Taylor & Francis |
SSID | ssj0004682 |
Score | 1.97363 |
Snippet | Privacy's exact nature needs to reflect the contemporary view of a society. A growing number of online users demand the protection of their personal privacy... |
SourceID | proquest pascalfrancis crossref informaworld |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 229 |
SubjectTerms | Authoritative personality Cyber society Empathy Exact sciences and technology Information and communication sciences Information science. Documentation Library and information science. General aspects Privacy Pseudonym Sciences and techniques of general use Self-esteem Use and user studies. Information needs |
Title | Online privacy control via anonymity and pseudonym: Cross-cultural implications |
URI | https://www.tandfonline.com/doi/abs/10.1080/01449290601156817 https://www.proquest.com/docview/33568722 |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaW9tILjwJieRQfOFG5ihM7cbhVy2OFEFxaUbhEduxIK5W2apMK-BH8ZsaPeJNdWFEuUWQ5zmMm8_LMNwi90MIoMDMkUaJkhNWlIKJhDZFcUaYYeBS1y7b4mM-P2fsTfjKZ_BpkLXWtOqh__rGu5H-oCmNAV1slewPKxkVhAM6BvnAECsPxn2jscUL3Ly4X17Zre592fu0Kraxbb01shwRwZTptB2wAYGYVI1lCbgxyykdbvL6Av_MNOALAquOWdi0cPws1HnOQHeSdMavjblN_YfZnBzEByIVoP5x3i2jUf-lD1_JbZ077uX1EQizz_2KQkpHSt8gFHeMFq63OypIwLUhejwoQOCwbitEQBfEaOfX4W2vCPmRHwt1KC1pvjdtc-ErQMbD2isKLaYi0x0ddXeIW2k7B7QBBv304f_3186DS1rUfi2_Y75NbtPbVRUaWzggH1ybgyiv4BxvfPGXNDnDGzdFddDt4JfjQs9g9NDFnu-hO3_EDBwWwi3aivvxxH33y7IcD--HAfhjYD0f2gzONI_u9wmPmw0Pme4CO3745ms1J6M9Bap6wlmiaCWUSqrR0fVZpoZXgPMs5rRtqOHjWWtVlZnTBlQQ_tjRUUlGqQia6BEP5IdqCpzGPEJaM5SVP86JowEQGLWpReutM1YmWlDZ6ipL-W1Z1AK-3PVROq7_ScIpexksuPHLLpsnJkEBV68JlgTzr06v2eztFfMMl2YZb7Y2IHx8uTZgt3mVT9Lznhgpkvd3Ak2fmvINFM1ihSNPHN3m1J2hn-ZM-RVvtZWeegSHdqr3A3b8B-6fAlA |
linkProvider | Library Specific Holdings |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB1BOcCFsoqy-sAJyRA3dhJzQwhUtnIBqbfIW6QKBBVNEfD1jLNULaAeuEWRl9gZj2fGz28ADm3iNJoZiupEcsqNTGiS8YwqoRnXHD0KU6AtulHnkV_3RK8KuA0rWKX3obOSKKLQ1X5x-2B0DYk78V6A9Dzl3p6JEhbPw4KQUewXZhh0J-5FFsmifHGK5Xv1qeZfTUztS1OspR4uqYY4Y1mZ6uKX1i62ossmpPUgSgTK0_Eo18fm6we_4_9HuQLLlZVKzkqxWoU597IGzToDBKkUwhosjfXn5zrcl7SlZPDWf1fmk1QoePLeV0QVUQa0-PHJksHQjax_cUrO_WzQmv-D9CcA7hvweHnxcN6hVb4GakTAc2pZmGgXMG1VkXeTxVYnQoSRYCZjTqCnZbWRobOx0Ar9GumYYonUsQqsRMNpExr4NW4LiEIvVYp2FMcZmkyoVT1rqwm1CaxiLLMtCOq_lZqKzNzn1HhOWc15-nP2WnA0rjIomTxmFQ4mRSDNi_BJJQC_i6f5R94CMaNKOKOr_SnxGn9cO-D-MidvwUEtbymufX-go17c6wgbDbGFuN3e_mfXB7DYebi7TW-vujc7sFRCYTyWcxca-dvI7aG9lev9YlF9A1uCHc8 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTxsxEB7xkBCX8lZDC_jQE5JhnbX30VtFiaCtAgeQclv5tVLUKo3IBhV-fWe8u1ECKAduq9XY3rXH4xn78zcAX1zmDboZmpssl1zaPONZKUuulRHSSIwobEBb9JOre_ljoAYNNmfSwCophi5roohgq2lyj13ZIuLOKQjIiaac3JkkE-kqrCd0wEc3OKL-3LXIkCuKxDnKD9pDzbeqWFiWFkhLCS2pJ9hhZZ3p4pXRDitRb6tOtzoJBIYEQPl9Nq3MmX1-Qe_47p_chg-Nj8q-1Uq1Ayt-tAtbbf4H1piDXdicWc-nPbipSUvZ-GH4qO0TazDw7HGomQ57DOjv45Nj44mfOnrxlV1QZ_CW_YMN5-Dt-3Dfu7y7uOJNtgZuVSQr7kScGR8J43TIuilSZzKl4kQJWwqvMM5yxuaxd6kyGqOa3AststykOnI5uk0HsIZf4z8C0xij5qqbpGmJDhPaVOJstbGxkdNClK4DUTtYhW2ozCmjxp9CtIynL3uvA6ezIuOax2OZcDSvAUUVNk-a8X8tXlT_qg6oJUXiJU0dL2jX7OO6kaSrnLIDJ626FTjz6ThHj_zfKVYaYw1pt3v4zqZPYOP2e6_4dd3_-Qk2axwMATk_w1r1MPVH6GxV5jhMqf-4bBxz |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Online+privacy+control+via+anonymity+and+pseudonym%3A+Cross-cultural+implications&rft.jtitle=Behaviour+%26+information+technology&rft.au=Chen%2C+Houn-Gee&rft.au=Chen%2C+Charlie+C.&rft.au=Lo%2C+Louis&rft.au=Yang%2C+Samuel+C.&rft.date=2008-05-01&rft.issn=0144-929X&rft.eissn=1362-3001&rft.volume=27&rft.issue=3&rft.spage=229&rft.epage=242&rft_id=info:doi/10.1080%2F01449290601156817&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_01449290601156817 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0144-929X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0144-929X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0144-929X&client=summon |