Skip to main content

METHODS article

Front. Psychol., 22 November 2022
Sec. Personality and Social Psychology
This article is part of the Research Topic Highlights in Psychology: Cognitive Bias View all 14 articles

Online taxi users' optimistic bias: China youths' digital travel and information privacy protection

  • School of Journalism and Communication, Southwest University of Political Science and Law, Chongqing, China

Digital travel platforms not only provided people with convenient travel but also raised a series of problems regarding information privacy protection. In order to analyze privacy protection behavior, this study surveyed 441 subjects aged 18–35 who utilized digital travel platforms based on a structural model of protective motivation theory. The results indicated that a perceived threat, self-efficacy, and response efficacy positively and significantly impacted youths' privacy concerns. Furthermore, privacy concerns were positively related to privacy protection behavior and were an intermediate variable between the relationships among perceived threat, self-efficacy, response efficacy, and privacy protection behavior. This study identified the moderating effect of youths' knowledge of platform privacy settings on the relationship between privacy concerns and protection behavior. In addition, the results confirmed that an optimistic bias did exist among talented youth with high privacy knowledge in terms of a practical level of privacy management. These unique findings represent the exceptional contributions and innovation points of this study.

Introduction

Digital travel platforms (DTP) have gradually permeated our daily lives in various fields due to information technology's rapid development and evolution. According to a statistical report of the 49th China Internet Development Status, there were over 4.53 hundred million online taxi users in China, which accounted for 43.9% of Chinese Internet users. However, digital travel platforms not only provided them with convenient travel but also raised a series of problems regarding information privacy protection. Due to various incidents of serious illegal collection of people's personal information known to the public, the National Network Information Office officially shut down 25 digital travel platforms on July 4, 2021. The practical levels of this phenomenon illustrated that online taxi users' personal information was collected unreasonably and illegally, which reflected a tremendous threat to privacy loopholes. According to studies of digital travel platforms, youths account for the majority of customers of online taxis, and college students prefer carpooling. The data in DTP include users' ID card numbers, names, ages, and other information for privacy purposes such as audio/video records during the ride, facial IDs, travel routes, call logs, and sensitive sites. Leakage of information privacy would seriously damage an individual's personal safety, property, and dignity. Thus, this study focused on young users' attitudes toward online travel platforms' information privacy concerns and protection. This study aimed to explore privacy protection theories among youths and offer practical guidance regarding information privacy protection.

Few quantitative studies on youths' attitudes toward digital travel platform information privacy protection were identified, but they were very helpful. Protection motivation theory and social cognitive theory have become significant theories investigating the relationship between perceived online threats and online behavior (Milne et al., 2009). Studies argue that the enhancement of privacy concerns leads to an increase in protection behavior and a decrease in online privacy disclosure (Chen and Chen, 2015). From the perspective of privacy protection, youths' personal information safety behavior in social networks was significantly affected by their perceived threat, self-efficacy, and response efficacy (Wang et al., 2018). Certain studies showed that college students' perceived risk of the WeChat application process significantly triggered their privacy concerns in social networking (Shen, 2017), which illustrated their concerns about information privacy. In addition, the increase in online privacy concerns among youths directly affects their privacy protection behavior and disclosure of information privacy (Jia et al., 2021), which indicates that the privacy protection behavior of the youths was affected by multiple predisposing factors and variables. In contrast to the traditional privacy framework structure, a study asserted that privacy knowledge level was an intermediary factor in the relationship between privacy concerns and self-disclosure behavior (Qiang and Xiao, 2021). Based on current studies of privacy protection, we expanded privacy protection issues among youths to the information system of digital travel platforms. We intended to explore the relationships between protection motivation, privacy concern, and privacy protection behavior among young online taxi users. Thus, we listed the following research questions:

Research Question 1: What is the status of protection motivation and privacy protection behavior among young people?

Research Question 2: Does protection motivation affect privacy concerns and privacy protection behavior among young people?

Research Question 3: What is the level of privacy knowledge of young users? Will it affect the relationship between privacy concerns and privacy protection behavior?

Literature review

Theories and hypotheses

Protection Motivation Theory (PMT) uses the social cognition perspective to examine an individual's behavior when faced with threats (Rogers, 1975). Following a series of research, PMT described its coping strategies in detail and categorized the motivation to self-protect from threats into two cognitive assessment processes: threat assessment (including perceived susceptibility and perceived severity) and coping assessment (including self-efficacy and response efficacy). Based on the assessment results of its cognitive threat, individuals may choose to engage in protection behavior (Rippetoe and Rogers, 1987). In terms of the PMT cognitive assessment processes, Witte argued that perceptual susceptibility and perceived severity described an individual's cognition of severity and possibility of a threatening occurrence, i.e., a perceived threat (Witte, 1992). Technology Threat Avoidance Theory (TTAT) further proposed that perceived threat was determined by predisposed variables of perceptual susceptibility and perceived severity. The perceived degree of potential threat initiated by technology would affect subjects' attitudes and behavior (Liang and Xue, 2009). This study combined PMT, TTAT, and other related research and intended to investigate the relationships between perceived threat, self-efficacy, response efficacy, privacy concern, and privacy protection behavior among youths who utilized DTP.

Perceived threat, self-efficacy, response efficacy, and privacy concern

The predisposed variables of privacy concern, i.e., perceived threat, self-efficacy, and response efficacy, were used to measure the information privacy concerns. “Perceived threat” was defined as an individual's expected negative consequence of a certain technique, product, or even behavior, which affects the desire and motivation to take protective behavior (De Zwart et al., 2009). Therefore, this study used it to measure the perceived threat to personal information privacy among youths who utilized digital travel platforms. Self-efficacy is defined as an individual's capability to carry out expected behavior. Bandura asserted that self-efficacy was the perceived belief in individuals' capability to organize and execute the action process of established achievements (Bandura, 1977). Self-efficacy was the core concept of social psychology, which illustrated the belief in individuals' ability to execute behaviors successfully, and was critical to the explanation of subjective motivation. This study used self-efficacy as an attribute of youths' capability and confidence in protecting personal privacy from intrusion. Response efficacy was identified as the perceptual ability to reduce the risk effectively. The higher the belief that individuals benefit from protective behavior, the greater the motivation for engaging in such behavior (Maddux and Rogers, 1983), and an adaptive response to engaging in such protective behavior is capable of protecting themselves and others (Hanus and Wu, 2016).

The terminology and concept of privacy concern gradually appeared in academic fields due to the rapid development of information technology, which raised the issue of privacy protection and related research. Culnan argued that when an individual releases personal information to a certain organization, the issue of privacy concerns arises regarding how it will use and protect the information (Culnan, 1993). Information privacy concern refers to an inherent worry of information privacy loss, which was often applied to the research of predicting users' privacy protection behavior (Smith et al., 1996). Privacy concerns echoed the awareness of how service providers collect, restore, and use personal information obtained from customers (Sheng et al., 2008). Previous studies revealed that the worry about information privacy leakage significantly influenced the attitude and behavior of social media platforms (Adhikari and Panda, 2018). In addition, studies delineated that potential variables of protection motivation, such as perceived threat, self-efficacy, and response efficacy, tended to affect an individual's information privacy concern. Youn identified the perception of threat as a decisive factor in the internet privacy concern among youths (Youn, 2009). According to an empirical study of users' self-disclosure on the socialized internet, the greater the perceived risk, the higher the privacy concern (Chen, 2013).

Self-efficacy was another significant predisposing factor of privacy concern, which predicted the intention of taking protective behavior. Another study of accurate advertising push and consumers' privacy concerns found a positive correlation between self-efficacy in preventing privacy leakage from accurate advertising and privacy concern (Yu and Yang, 2019). Finally, a medical big data cloud study confirmed the significant positive relationship between self-efficacy and privacy concerns (Wu, 2020). Based on the above evidence, the following hypotheses were proposed:

H1. Self-efficacy has a positive influence on personal information privacy concerns.

H2. Response efficacy has a positive influence on personal information privacy concerns.

H3. A perceived threat has a positive influence on personal information privacy concerns.

Privacy concern and privacy protection behavior

An empirical study of internet fraud confirmed that an increase in victims' predicted online privacy concerns tended to amplify privacy protection behavior (Chen et al., 2017). In addition, a related study of privacy protection delineated that users of socialized media tended to employ various modes of privacy protection behavior due to a high level of privacy concern (Feng and Xie, 2014). A similar Singapore study based on broadened planned behavior theory also found that the level of privacy doubt magnified the intention of online privacy protection (Ho et al., 2017). Another study on college students' privacy protection behavior verified that their privacy concerns about the WeChat APP influenced their privacy protection behavior significantly and positively (Xie and Karan, 2019). In order to examine the relationship between information privacy concerns and privacy protection behavior among youths, the following hypothesis was proposed:

H4. Privacy concern has a positive influence on privacy protection behavior.

Indirect effect of privacy concern

In order to explore the predisposing factors of youths' privacy concerns, which affect privacy protection behavior among socialized internet users, a pragmatic study demonstrated that an indirect effect of privacy concern did exist in the relationships between perceived threat, self-efficacy, and privacy protection behavior (Hanus and Wu, 2016). Another study on the privacy protection behavior among Sina MicroBlog users also verified this indirect effect between perceived threat and privacy protection behavior; however, no indirect effect was found between the relationships of self-efficacy/response efficacy and privacy safety protection behavior (Wang et al., 2019). In addition, a Malaysian study of young socialized media users validated that perceived threat, self-efficacy, and response efficacy indirectly affect privacy protection behavior through privacy concerns (Adhikari and Panda, 2018). In order to verify the indirect effect of privacy concerns, the following hypotheses were proposed:

H5. Privacy concern mediates the relationship between perceived threats and privacy protection behavior.

H6. Privacy concern mediates the relationship between self-efficacy and privacy protection behavior.

H7. Privacy concern mediates the relationship between response efficacy and privacy protection behavior.

Moderating effect of privacy knowledge

Privacy knowledge is a latent variable that could be flexibly elevated with refinement and training, thus reflecting its moderating characteristic. The results of a quasi-experimental study on the development of intelligent mobile phone APP software for privacy knowledge showed that APP users tended to pay more attention to their private personal information and use active protection means (Gerber et al., 2018). Similar research on children's digital literacy training revealed that the boost in training cost led to a decline in their personal information disclosure, which means children paid more attention to protecting their personal information privacy after training and tended to acquire protective actions (Desimpelaere et al., 2020). Knowledge regulated the relationship between privacy concerns and privacy protection behavior to a certain degree. How do young online taxi users comprehend the extent of privacy and information safety settings in the digital travel software they are using in their daily lives? Will it affect their protective manners? In order to verify these questions, the following hypotheses were proposed:

H8a. Privacy knowledge moderates the relationship between privacy concerns and privacy protection behavior.

H8b. Privacy knowledge groups moderate the relationship between privacy concerns and privacy protection behavior.

Figure 1 summarizes the research model of the study.

FIGURE 1
www.frontiersin.org

Figure 1. The framework of the research model.

Research design

Data collection and implementation

According to the regulation of the “Medium and Long Term Youth Development Plan (2016-2035)” released by the CPC Central Committee and the State Council, these study subjects were limited to Chinese youths aged 18 to 35 who employ DTP. Questionnaire Star was utilized to sketch the questionnaire and distribute it via WeChat Moments on August 17 and 30, 2021. A total of 507 subjects responded to the survey, excluding 66 invalid subjects and responses. A total of 441 subjects remained, with a sample qualification rate of 86.9%. This study adopted SPSS v23.0 for descriptive analyses, and AMOS v23.0 was used for confirmatory factor analyses and research hypotheses testing.

This study consisted of six dimensions, i.e., perceived threat, self-efficacy, response efficacy, privacy concern, privacy protection behavior, and privacy knowledge. Except for privacy, knowledge was segregated by dichotomized categories (yes, no, don't know), and a Likert 7-point scale was used for measuring the other variables (1 = totally disagree, 7 = totally agree). In order to ensure the reliability and validity of the questionnaire, a small-scale pilot test was conducted, and the tested subjects' opinions on questioning, sentencing, and wording were for modifications. In addition, several experts and scholars were invited for content validity checks and revision. The final version of the questionnaire consisted of six dimensions and 27 measurement indicators. The Appendix A shows the detailed questionnaire measurement items. The structure of the survey is shown in Table 1.

TABLE 1
www.frontiersin.org

Table 1. Research variables and sources.

Statistical analysis and hypothesis test

Descriptive analysis

Female respondents accounted for 61.2 vs. 38.8% of males. Regarding age allocation, respondents aged 18–25 accounted for 46.7%, 26–30 34.9%, and 31–35 18.4%. The majority of respondents were students (39.9%), enterprise employees (35.1%), personnel of public institutions, and other occupations accounted for 25%. Education level of an undergraduate degree accounted for the majority of 49%. Regarding monthly income, 69.8% reported less than 8,000 RMB, and 30.2% over 8,000 RMB.

SEM-AMOS was used for the confirmatory factor analysis of the research model. All standardized factor loadings (STD) were greater than 0.6, Cronbach's α and composite reliability (CR) were higher than 0.7, and the convergence effect (AVE) was higher than 0.5, which illustrated the excellent reliability and validity of the research model. In addition, Table 2 identified all the AVE square roots as being greater than the correlation coefficients between the variables, which indicated outstanding discriminant validity among the variables. The Appendix B shows the detailed measurement model reliability.

TABLE 2
www.frontiersin.org

Table 2. Reliability, convergent and discriminant validities of the research model.

Structural model

Based on the calculations of AMOS, related indices of model fitness were as follows: Normed Chi-square (χ2/DF) = 2.947, GFI = 0.902, NFI = 0.922, IFI = 0.947, TLI (NNFI) = 0.937, CFI = 0.947, RMSEA = 0.067. All the indexes were in a reasonable range, which confirmed that the fitness of the research model was acceptable.

Path analysis and hypothesis test

Figure 2 illustrates the regression coefficients as follows: perceived threat (β = 0.533, p < 0.001), self-efficacy (β = 0.144, p < 0.05), and response efficacy (β = 0.150, p < 0.05), which significantly affect privacy concern (R2=0.441). In addition, privacy concern (β = 0.586, p < 0.001) significantly affects privacy protection behavior (R2 = 0.344). Therefore, hypotheses 1 4 were accepted to various degrees.

FIGURE 2
www.frontiersin.org

Figure 2. Path coefficients of the structural equation model. *p < 0.05; **p < 0.01, ***p < 0.001.

Indirect effect of privacy concern

Bootstrapping 5,000 times was utilized to check the indirect effect, with the bias-corrected 95% CI and percentile 95% CI not including 0. Table 3 delineated the significant total effect and total indirect effect of perceived threat, self-efficacy, and response efficacy on privacy protection behavior (p < 0.05), which confirmed the indirect effect of privacy concern. Thus, hypothesis 5/6/7 were supported.

TABLE 3
www.frontiersin.org

Table 3. Indirect effects of privacy concerns.

Moderating effect of privacy knowledge

The moderating effect of privacy knowledge was one of the key interpretations of this study. The following specific procedures followed:

Step 1: The scores of eight items were summed up for a total score. All the total scores were divided into three groups: high (top 27 percentile), medium, and low (bottom 27 percentile) scores, based on Cureton (1957) proposal. In order to maintain statistical power, the difference only between high- and low-score groups (120 subjects each) was calculated. The independent t-test identified significant differences between high- and low-privacy knowledge level groups (t = −30.933).

Step 2: Grouping regression and identity tests were conducted using AMOS software. In order to examine the significant difference, the combination of high- and low-score groups was designated as the constraint model (all the parameters are equal) and compared with the default model (without any restriction) (Wen et al., 2012). Table 4 delineated significant results of grouping regression: the Chi-square value change of the constraint model (χ95%,1df2 = 8.941 > 3.84) with p = 0.003, which concluded that significant privacy knowledge moderates the relationship between privacy concern and privacy protection behavior. In order to consolidate the credibility of the findings, the following outcomes were identified:

The p values of both models were less than 0.001, and CMIN/df values were < 3.

The baseline comparison found significant differences in the NFI, RFI, IFI, TLI, and CFI values.

RMSEA indexes of the models were unequal (0.059 vs. 0.061).

TABLE 4
www.frontiersin.org

Table 4. Grouping regression of the constraint model vs. the default model.

Thus, the default and constraint models were not matched, i.e., hypothesis 8a should be accepted.

Step 3: Data from grouping regression demonstrated greater mean values of privacy concern and privacy protection behavior in the high privacy knowledge group than that of the low privacy knowledge group, with regression coefficients of 0.371 (high privacy knowledge group) vs. 0.620 (low privacy knowledge group), which means the impact of the moderating effect among the high privacy knowledge group was significantly lower than that of their counterparts (data not shown in Table 4). Therefore, hypothesis 8b should be rejected.

Conclusion and discussion

Conclusion

This study expanded privacy protection theory and context to digital travel platforms that youths employ in their daily lives, work, and social contact. Based on a comprehensive of understanding the privacy protection behavior of contemporary youth online taxi users, this study offered coping strategies from subjective and objective dimensions of youths' privacy protection and hoped digital society could protect the personal information and privacy of youths. The conclusions are as follows:

A perceived threat, self-efficacy, and response efficacy positively affected privacy concerns;

Privacy concerns positively affected privacy protection behavior. Youths tended to have a higher level of privacy concern (with a mean value of 5.187 over 7) and used countermeasures to protect their privacy, such as fake names and shutting off location services;

Privacy concern was an intermediate factor in the relationships between perceived threat, self-efficacy, response efficacy, and privacy protection behavior;

Privacy knowledge moderates the relationship between privacy concerns and privacy protection behavior. The mean values of privacy concern and privacy protection behavior in the high privacy knowledge group were significantly greater than those of their counterparts. However, the predictive power of privacy concern on privacy protection behavior in the high privacy knowledge group was significantly less than that of their counterparts.

Discussion

Perceived threat, self-efficacy, and response efficacy were significant variables in predicting the relationship between privacy concerns and privacy protection behavior among youths utilizing DTP. Of which, the perceived threat was identified as the main predictive factor of privacy concern, followed by response efficacy and self-efficacy. In addition, the mean values of these variables were greater than their average scores, which denoted that youth online taxi users did not trust digital travel platforms. The implications of this finding are 2 fold: on the one hand, at the level of the impact of perceived risk on privacy concern, the results of this study echo previous studies on Internet use and the privacy concern of social media use among youths (Youn, 2009; Ho et al., 2017). Although youths of internet aborigines handled digital travel platforms in their daily lives constantly, they still sharply noticed the threat of digital technology to personal information, data, and privacy.

On the other hand, previous studies have suggested that self-efficacy is unrelated to privacy concerns (Yao et al., 2007). Contrary to previous studies, the statistical results of the two kinds of efficacy reported in our study indicate that self-efficacy and response efficacy have significant effects on privacy concerns. It is precisely because the youths are technologically proficient and thus believe that they are able to effectively protect their private information. These findings exposed self-confidence in information technology among contemporary youths, i.e., they are capable of employing cutting-edge technological gadgets to protect their privacy.

Are youths concerned about their privacy? Youths are the most active and vital force in society. In the era of privacy transparency, the entire society is questioning privacy concerns among youths. It is valuable and meaningful to examine whether youths pay attention to the information privacy of DTP or not. This study found an average score of privacy concern of 5.187 out of 7, which revealed a high level of privacy concern about digital travel platforms among the youth of online taxi users. It is noteworthy that privacy concerns not only directly influenced the privacy protection behavior of the youths but also functioned as an indirect factor between the relationships of perceived threat, self-efficacy, response efficacy, and privacy protection behavior. This finding is in line with the study of Lee et al. (2017). They suggest that privacy concerns have a positive impact on online privacy protection behavior among young people, which means that privacy concerns are an important element of privacy management for youth that cannot be ignored.

One of the imperative findings of this study was that the predictive power of privacy concern on privacy protection behavior among the high privacy knowledge group was significantly less than that of the low privacy knowledge group. Schwarzer et al. (1999) suggest that self-efficacy pertains to optimistic beliefs about coping with a large variety of stressors. However, excessive optimism can lead individuals to develop “optimism bias.” Weinstein asserted that individuals tended to believe in having a greater opportunity to encounter active events than inactive ones, and negative experience with privacy protection might depress an individual's enthusiasm for acquiring protective action (Weinstein, 1980), which explained the logic of this finding. Sharot (2012) demonstrated the existence of optimism bias in human society through an experimental study and argued that optimism bias is a result of the evolution of the human brain, which can subconsciously change the subject's behavior and enhance individual wellbeing, but optimism bias may also cause blind optimism due to a lack of crisis awareness and reduce the individual's sense of prevention. Xu (2011) confirmed the optimism bias of social network users. People usually believe they may be less vulnerable to privacy risks than others.

Similarly, another study also shows that users generally believe that negative events such as privacy leaks or information trafficking are less likely to happen to them (Campbell et al., 2007). In line with the above studies, our study also found the existence of so-called “optimistic bias” among the high privacy knowledge group. Due to the phenomenon of optimistic bias, individuals with high privacy knowledge tend to assume that they cannot confront threats more often than their counterparts. Therefore, they had a high level of privacy concern but a low level of privacy protection behavior. On the contrary, individuals with low privacy knowledge tended to lack IT awareness and skill, thus paying less attention to privacy and protective settings. Because they were unfamiliar with the degree of threat and its damage, which led to anxiety, they tended to enhance privacy concerns and adopt an aggressive protection mode when facing threats. This finding supports earlier research on the optimism bias of privacy risk (Kim and Hancock, 2015; Metzger and Suh, 2017). In addition, the results illustrated an inadequate understanding and familiarity with the privacy settings of digital travel platforms among youths, and approximately two-thirds were college students, meaning the knowledge of privacy settings was irrelevant to education level. The probable rationale was that youths tended to operate DTP when they needed online taxi-hailing but neglected the concern of privacy settings in their daily lives.

Youths should enhance their coping abilities with privacy risks. Firstly, intensifying the threat perception could effectively promote their concern for personal information and encourage them to adopt positive protective action on DTP. Secondly, individuals with extraordinary self-efficacy tended to adopt more active protective measures when applying digital travel platforms—for example, downloading travel software via an authorized APP store instead of a homepage link and avoiding clicking offensive websites to prevent possible intrusion of personal information. In addition, youths are able to promote response efficacy by paying more attention to related information about upholding privacy protection, awakening the coping ability of risky behavior, conducting adaptive training, such as conscious training on specific cases (i.e., party role-playing), and exercising prompt response aptitude. Finally, youths must recognize that enhancing their level of privacy knowledge is the most important method of preventing privacy threats. The fortification of skills and knowledge on privacy risk can improve privacy protection behavior and reduce the probability of infringement. Youths should improve their identification of various privacy risks and realize how to avoid them (Marcolin et al., 2000). Paying attention to the various elements of information safety, obtaining safety education and related training, enriching the knowledge of personal privacy protection, and keeping risk awareness of preparing for a rainy day are the required courses for youths to elevate personal information literacy.

From the perspective of platform self-discipline, a digital travel platform (an immediate information processor) is responsible for protecting users' information safety, particularly youths' information privacy. DTP must visibly declare the critical content of its privacy protection policy straightforwardly and clearly illustrate what kind of personal information was collected and how it was used. Thus, platform users are able to know fairly well how to raise awareness of privacy management. In addition, explicit, informed consent is the core principle of personal privacy protection and a basic maxim to comply with. Digital travel platforms should carefully respect youths' informational self-determination, exercise withdrawal, and obtain users' re-authorization as they employ the platform.

From the perspective of industry supervision, relevant government authorities should establish proprietary specifications for digital travel platform information privacy protection as soon as possible. Due to economies of scale and capital-seduced self-discipline failure, digital travel platforms tend to exhibit opportunistic motivations of so-called “management malfeasance.” From the perspective of the legal guarantee, the legislations of the Civil Code, Personal Information Protection Law, and Data Security Law protected Chinese citizens' rights and interests in various information privacy matters effectively. When serious threats occur, youths should actively exercise their legal rights to defend personal information and privacy.

Nowadays, instead of sticking to a specific subject, communication research should focus on all walks of life (Schiller, 2018). Privacy is a multifaceted social problem, and youths are the backbone of society. Therefore, research on youths' consumption of DTP and privacy protection behaviors tended to have more academic value and space. This study explored the impact factors of digital travel platform utilization and privacy protection behavior among youths from a quantitative perspective. Further studies can examine the concerns and attitudes toward the privacy protection of DTP among youths. In addition, this study tried to examine youths' modes of acquiring knowledge of personal information privacy protection using test questions but failed to report the actual knowledge level objectively. Therefore, further studies are needed to measure multiple dimensions of knowledge regarding personal information protection.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary material, further inquiries can be directed to the corresponding author.

Author contributions

XM: guidance of research design, statistical analyses, and proof writing. BF: research designer and executor, conducting statistical analyses, and first draft writing. All authors contributed to the article and approved the submitted version.

Funding

This study was supported by Chongqing Academy of Social Sciences (Grant No. 2022NDYB112).

Acknowledgments

The authors thank all the participants in this study.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpsyg.2022.1049925/full#supplementary-material

References

Adhikari, K., and Panda, R. K. (2018). Users' information privacy concerns and privacy protection behaviors in social networks. J. Global Market. 31, 96–110. doi: 10.1080/08911762.2017.1412552

CrossRef Full Text | Google Scholar

Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84, 191. doi: 10.1037/0033-295X.84.2.191

PubMed Abstract | CrossRef Full Text | Google Scholar

Campbell, J., Greenauer, N., Macaluso, K., and End, C. (2007). Unrealistic optimism in internet events. Comput. Hum. Behav. 23, 1273–1284. doi: 10.1016/j.chb.2004.12.005

PubMed Abstract | CrossRef Full Text | Google Scholar

Chen, H., Beaudoin, C. E., and Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Comput. Hum. Behav. 70, 291–302. doi: 10.1016/j.chb.2017.01.003

CrossRef Full Text | Google Scholar

Chen, H. T., and Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychol. Behav. Soc. Netw. 18, 13–19. doi: 10.1089/cyber.2014.0456

PubMed Abstract | CrossRef Full Text | Google Scholar

Chen, R. (2013). Living a private life in public social networks: An exploration of member self-disclosure. Decis. Supp. Syst. 55, 661–668. doi: 10.1016/j.dss.2012.12.003

CrossRef Full Text | Google Scholar

Culnan, M. J. (1993). ‘How did they get my name?': An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17, 341. doi: 10.2307/249775

CrossRef Full Text | Google Scholar

Cureton, E. E. (1957). The upper and lower twenty-seven per cent rule. Psychometrika 22, 293–96. doi: 10.1007/BF02289130

CrossRef Full Text | Google Scholar

De Zwart, O., Veldhuijzen, I. K., Elam, G., Aro, A. R., Abraham, T., Bishop, G. D., and Brug, J. (2009). Perceived threat, risk perception, and efficacy beliefs related to SARS and other (emerging) infectious diseases: results of an international survey. Int. J. Behav. Med. 16, 30–40. doi: 10.1007/s12529-008-9008-2

PubMed Abstract | CrossRef Full Text | Google Scholar

Desimpelaere, L., Hudders, L., and Van de Sompel, D. (2020). Knowledge as a strategy for privacy protection: How a privacy literacy training affects children's online disclosure behavior. Comput. Hum. Behav. 110, 106382. doi: 10.1016/j.chb.2020.106382

CrossRef Full Text | Google Scholar

Feng, Y., and Xie, W. (2014). Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162. doi: 10.1016/j.chb.2014.01.009

CrossRef Full Text | Google Scholar

Gerber, N., Gerber, P., Drews, H., Kirchner, E., Schlegel, N., Schmidt, T., and Scholz, L. (2018). FoxIT: Enhancing Mobile “Users' privacy behavior by increasing knowledge and awareness,” in Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust - STAST'17 (Orlando, Florida: ACM Press), 53–63. doi: 10.1145/3167996.3167999

CrossRef Full Text | Google Scholar

Hanus, B., and Wu, Y. A. (2016). Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Inf. Syst. Manage. 33, 2–16. doi: 10.1080/10580530.2015.1117842

CrossRef Full Text | Google Scholar

Ho, S. S., Lwin, M. O., Yee, A. Z. H., and Lee, E. W. J. (2017). Understanding factors associated with singaporean adolescents' intention to adopt privacy protection behavior using an extended theory of planned behavior. Cyberpsychol. Behav. Soc. Netw. 20, 572–579. doi: 10.1089/cyber.2017.0061

PubMed Abstract | CrossRef Full Text | Google Scholar

Jia, R. N., Wang, X. W., and Fan, X. C. (2021). Empirical study on influencing factors of SNS user's personal information security and privacy protection behavior. J. Modern Inf. 41, 105–114.

Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. Mis Quarterly 34, 549–66. doi: 10.2307/25750691

PubMed Abstract | CrossRef Full Text | Google Scholar

Kim, S. J., and Hancock, J. T. (2015). Optimistic bias and facebook use: Self–other discrepancies about potential risks and benefits of facebook use. Cyberpsychol. Behav. Soc. Netw., 18, 214–220. doi: 10.1089/cyber.2014.0656

PubMed Abstract | CrossRef Full Text | Google Scholar

Lee, W. Y., Tan, C.-S., and Siah, P. C. (2017). The role of online privacy concern as a mediator between internet self-efficacy and online technical protection privacy behavior. Sains Humanika. 9, 1271. doi: 10.11113/sh.v9n3-2.1271

CrossRef Full Text | Google Scholar

Liang, H., and Xue, Y. (2009). Avoidance of information technology threats: a theoretical perspective. MIS Quart. 33, 71. doi: 10.2307/20650279

CrossRef Full Text | Google Scholar

Maddux, J. E., and Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Experim. Soc. Psychol. 19, 469–479. doi: 10.1016/0022-1031(83)90023-9

CrossRef Full Text | Google Scholar

Marcolin, B. L., Compeau, D. R., Munro, M. C., and Huff, S. L. (2000). Assessing user competence: conceptualization and measurement. Inf. Syst. Res. 11, 37–60. doi: 10.1287/isre.11.1.37.11782

PubMed Abstract | CrossRef Full Text | Google Scholar

Masur, P. K., Teutsch, D., and Trepte, S. (2017). Entwicklung und validierung der online-privatheitskompetenzskala (oplis). Diagnostica, 63, 256–268. doi: 10.1026/0012-1924/a000179

CrossRef Full Text | Google Scholar

Metzger, M. J., and Suh, J. J. (2017). Comparative optimism about privacy risks on Facebook. J. Commun. 67, 203–232. doi: 10.1111/jcom.12290

CrossRef Full Text | Google Scholar

Milne, G. R., Labrecque, L. I., and Cromer, C. (2009). Toward an understanding of the online consumer's risky behavior and protection practices. J. Consumer Affairs, 43, 449–473. doi: 10.1111/j.1745-6606.2009.01148.x

CrossRef Full Text | Google Scholar

Park, Y. J., and Jang, S. M. (2014). Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav., 38, 296–303. doi: 10.1016/j.chb.2014.05.041

CrossRef Full Text | Google Scholar

Qi, K. P., and Li, Z. Z. (2018). A study on privacy concerns of Chinese public and its influencing factors. Sci. Soc. 8, 36–58. doi: 10.19524/j.cnki.10-1009/g3.2018.02.036

CrossRef Full Text

Qiang, Y. X., and Xiao, D. (2021). Does overconfidence account for the Privacy Paradox? The impact of discrepancy between stated and actual privacy literacy on self-disclosure intention. J. Mass Commun. Monthly 6, 39–51. doi: 10.15897/j.cnki.cn51-1046/g2.20210507.002

CrossRef Full Text

Rippetoe, P. A., and Rogers, R. W. (1987). Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. J. Person. Soc. Psychol. 52, 596. doi: 10.1037/0022-3514.52.3.596

PubMed Abstract | CrossRef Full Text | Google Scholar

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91, 93–114. doi: 10.1080/00223980.1975.9915803

PubMed Abstract | CrossRef Full Text | Google Scholar

Rosenthal, S., Wasenden, O. C., Gronnevet, G. A., and Ling, R. (2020). A tripartite model of trust in Facebook: acceptance of information personalization, privacy concern, and privacy literacy. Media Psychol. 23, 840–864. doi: 10.1080/15213269.2019.1648218

CrossRef Full Text | Google Scholar

Schiller, D. (2018). Networks and the Age of Nixon. Beijing: Peking University Press.

Schwarzer, R., Mueller, J., and Greenglass, E. (1999). Assessment of perceived general self-efficacy on the Internet: data collection in cyberspace. Anxiety, Stress Coping. 12, 145–161. doi: 10.1080/10615809908248327

CrossRef Full Text | Google Scholar

Sharot, T. (2012). The Optimism Bias: Why we're wired to look on the bright side. The Psychiatrist. (2012) 36, 439–40. doi: 10.1192/pb.bp.111.038182

CrossRef Full Text

Shen, Q. (2017). Risk and cost trade-offs: Privacy Paradox in social networks——An example of college students taking the WeChat mobile social application (platform) in Shanghai. J. Commun. 24, 55–69. Available online at: http://gfagzcadd5f6184ce4461snouvkuxuu6qo6uvu.fzfy.oca.swupl.edu.cn/kcms/detail/detail.aspx?FileName=YANJ201708004&DbName=CJFQ2017

Sheng, H., Nah, F. F. H., and Siau, K. (2008). An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. J. Assoc. Inf. Syst. 9, 344–76. doi: 10.17705/1jais.00161

CrossRef Full Text | Google Scholar

Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quart. 20, 167. doi: 10.2307/249477

CrossRef Full Text | Google Scholar

Taylor, D. G., Davis, D. F., and Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electr. Commerce Res. 9, 203–223. doi: 10.1007/s10660-009-9036-2

CrossRef Full Text | Google Scholar

Wang, L. Y., Li, Q., Qiao, Z. L., and Liu, S. (2019). Impact of protection motivation on privacy concerns and privacy security protection behaviors of SNS users. J. Intell. 38, 104–10. Available online at: http://gfagzcadd5f6184ce4461snouvkuxuu6qo6uvu.fzfy.oca.swupl.edu.cn/kcms/detail/61.1167.G3.20190712.1301.007.html

Wang, X. W., Wang, L., Jia, R. N., and Wang, D. (2018). An empirical study on the influencing factors of the security behavior in personal information in social networks. Library Inf. Serv. 62, 24–33. doi: 10.13266/j.issn.0252-3116.2018.18.003

CrossRef Full Text | Google Scholar

Weinstein, N. D. (1980). Unrealistic Optimism about Future Life Events. J. Person. Soc. Psychol. 39, 806–20. doi: 10.1037/0022-3514.39.5.806

PubMed Abstract | CrossRef Full Text | Google Scholar

Wen, Z. L., Liu, H. Y., and Hau, K. T. (2012). Analyses of Moderating and Mediating Effects. Beijing: Educational Science Publishing House.

Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Commun. Monogr. 59, 329–49. doi: 10.1080/03637759209376276

PubMed Abstract | CrossRef Full Text | Google Scholar

Workman, M., Bommer, W. H., and Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Comput. Hum. Behav. 24, 2799–2816. doi: 10.1016/j.chb.2008.04.005

CrossRef Full Text | Google Scholar

Wu, D. J. (2020). Privacy concern of medical data and its influencing factors in the context of big data: An empirical study based on protection motivation theory. J. Henan Normal Univ. 47, 23–29. doi: 10.16366/j.cnki.1000-2359.2020.05.004

CrossRef Full Text

Xie, W., and Karan, K. (2019). Consumers' Privacy Concern and Privacy Protection on Social Network Sites in the Era of Big Data: Empirical Evidence from College Students. J. Inter. Advert. 19, 187–201. doi: 10.1080/15252019.2019.1651681

CrossRef Full Text | Google Scholar

Xu, H. (2011). Reframing Privacy 2.0 in online social network symposium: privacy jurisprudence as an instrument of social change. Univ. Pennsylvania J. Constit. Law, 14, 1077–1102. Available online at: https://heinonline.org/HOL/P?h=hein.journals/upjcl14&i=1084

Google Scholar

Yao, M. Z., Rice, R. E., and Wallis, K. (2007). Predicting user concerns about online privacy. J. Am. Soc. Inf. Sci. Technol. 58, 710–722. doi: 10.1002/asi.20530

PubMed Abstract | CrossRef Full Text | Google Scholar

Youn, S. (2009). Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. J. Consumer Affairs 43, 389–418. doi: 10.1111/j.1745-6606.2009.01146.x

CrossRef Full Text | Google Scholar

Yu, T. T., and Yang, Y. H. (2019). Privacy concerns in online behavioral advertising. J. Res. 9, 101–116. Available online at: http://gfagzcadd5f6184ce4461snouvkuxuu6qo6uvu.fzfy.oca.swupl.edu.cn/kcms/detail/detail.aspx?FileName=XWDX201909010&DbName=CJFQ2019

Keywords: privacy practice, privacy concern, privacy knowledge, optimistic bias, digital travel

Citation: Meng X and Feng B (2022) Online taxi users' optimistic bias: China youths' digital travel and information privacy protection. Front. Psychol. 13:1049925. doi: 10.3389/fpsyg.2022.1049925

Received: 21 September 2022; Accepted: 03 November 2022;
Published: 22 November 2022.

Edited by:

Sergio Da Silva, Federal University of Santa Catarina, Brazil

Reviewed by:

Doug Twitchell, Boise State University, United States
Valentina Marinescu, University of Bucharest, Romania

Copyright © 2022 Meng and Feng. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Bobo Feng, milk_bravo@163.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.