GPCP A G ERMAN V ERSION OF THE S CALE FOR O NLINE P RIVACY C ONCERN AND P ROTECTION FOR U SE ON THE I NTERNET Authors: Oostlander, J., Reips, U.-D., &

Slides:



Advertisements
Similar presentations
Is College Success Associated With High School Performance? Elizabeth Fisk, Dr. Kathryn Hamilton (Advisor), University of Wisconsin - Stout Introduction.
Advertisements

Experimental Research Designs
Privacy & Self-disclosure online: Implications for Web surveys Carina Paine (1), Adam Joinson (1), Tom Buchanan (2) & Ulf-Dietrich Reips (3) (1) The Open.
O NLINE L EARNING AND I NTERNET U SE By Linda Thompson EDTC 5103.
TeamSTEPPS TM National Implementation Measurement The following slides are not part of the TeamSTEPPS Instructor Guide. Due to federal 508 compliance requirements.
Experimental Design The Gold Standard?.
Internet safety By Lydia Snowden.
The Learning Behaviors Scale
Factor validation of the Consideration of Future Consequences Scale: An Assessment and Review Tom R. EikebrokkEllen K. NyhusUniversity of Agder.
IMPLEMENTATION QUALITY RESEARCH OF PREVENTION PROGRAMS IN CROATIA MIRANDA NOVAK University of Zagreb, Faculty of Education and Rehabilitation Sciences.
Masculinity Levels and the ‘Extreme Male Brain’ in Asperger’s Syndrome Jennifer Barr & Kathryn Lucas.
Introduction Disordered eating continues to be a significant health concern for college women. Recent research shows it is on the rise among men. Media.
College Student’s Beliefs About Psychological Services: A replication of Ægisdóttir & Gerstein Louis A. Cornejo San Francisco State University.
The effects of Peer Pressure, Living Standards and Gender on Underage Drinking Psychologist- Kanari zukoshi.
Individual differences in statistics anxiety Donncha Hanna School of Psychology QUB.
When eating healthy is not healthy: orthorexia nervosa and its measurement with the ORTO-15 in Hungary Presented by: Lauren Walker, Andrews Dietetic Intern.
University of Cologne / Rheinische Fachhochschule Cologne Christian Bosau Who do you trust: Facebook or your friends? Analyzing predictors of privacy protection.
COMPARING TWO PROPORTIONS Chapter 22 Part 1. Subscripts Use subscripts when comparing two groups.
T Relationships do matter: Understanding how nurse-physician relationships can impact patient care outcomes Sandra L. Siedlecki PhD RN CNS.
Empirical Evaluation of Web Survey Software Tools: Powerful or Friendly? Vasja Vehovar, Nejc Berzelak, Katja Lozar Manfreda, Tina Horvat University of.
Kaitlyn Patterson & Wendy Wolfe
The Basics of Social Science Research Methods
Classroom Assessments Checklists, Rating Scales, and Rubrics
Loneliness in Marriage Scale
Time stability of user perception of website aesthetics
Internet Marketing & e-Commerce Ward Hanson Kirthi Kalyanam Requests for permission to copy any part of the material should be addressed to: PERMISSIONS.
Mindfulness and Creativity
Rationale and Significance Findings/Conclusions
“Tell me and I'll forget; show me and I may remember; involve me and I'll understand.”
Assessing Personality
Simulating Virtual Behaviour A Facebook “Like” Questionnaire
Psyc 351 Measurement Techniques
Introduction Method Results Conclusions
The Disclosure of Virginity Status and Sexual Orientation
ASSESSMENT OF STUDENT LEARNING
Participants & Procedure
Friendship Quality as a Moderator
Classroom Assessments Checklists, Rating Scales, and Rubrics
Which of these is “a boy”?
C. K. Smith, G. Gaither, P. Lin & A. M. Spurling
Factors in Sojourners’ acculturationto the new culture and culture-of-origin: A Japanese Example Presentation at the NC ACES biennial convention in Kansas.
Facts, Theories, and Hypotheses
پرسشنامه کارگاه.
Business and Management Research
Research Methods Tutorial
Chapter Eight: Quantitative Methods
Definition Slides.
First study published in JOGS.
Gender Development.
Lesson 1 Foundations of measurement in Psychology
Competency 007: E.
Asist. Prof. Dr. Duygu FIRAT Asist. Prof.. Dr. Şenol HACIEFENDİOĞLU
Study Details Study Objective To understand online security of internet users by computing there safety index scores. Methodology Web based online interviews.
Sexual Consent: Changing the Gender Stereotype
Charles N. Elliott, Paul A. Story
eSafetyLabel+ Ambassadors Team
Chapter 14 Generalizing results.
Social Practical Charlie.
Assessing Personality
Method Results Discussion
Self-help on the Internet for affected family members of disordered gamblers – evaluation of a German programme Prof. Dr. Ursula Buchner.
Business and Management Research
Baumeister & Tice Chapter 2
Marketing Research: Course 4
TESTING AND EVALUATION IN EDUCATION GA 3113 lecture 1
The basics of Social Science Research Lecture 3
What is Research ?.
Table 2. Descriptive statistics and reliability coefficients
Personality and interpersonal communication
Do Now What are the pros and cons of using a case study as a means to gather information for describing behavior.
Presentation transcript:

GPCP A G ERMAN V ERSION OF THE S CALE FOR O NLINE P RIVACY C ONCERN AND P ROTECTION FOR U SE ON THE I NTERNET Authors: Oostlander, J., Reips, U.-D., & Buchanan, T. (2008)

O VERVIEW 1 Aim of this study: a) Translation of the „Scale for Online Privacy and Protection (PCP)“ (Buchanan, Paine, Joinson & Reips, 2007) b) Evaluation of: reliability factorial validity (factorial structure) criteria validity (technical knowledge)

Multidimensional definition of „Privacy“ by Burgoon, Parrot, LePoire, Kelley, Walther & Perry (1989): „the ability to control and limit physical, interactional, psychological and informational access to the self or to one’s group“ Central factor of all dimensions: “Desire, to keep personal information out of hands of others” (Buchanan et al., 2007) D EFINITION OF P RIVACY 2

 based on a multidimensional definition of privacy  includes attitudinal and behavioral aspects  validated for use on the Internet PCP S CALE, B UCHANAN ET AL. (2007) 3 behavior General Caution 6 Items ( α =.75) Technical Protection 6 Items ( α =.74) attitude Privacy Concern 16 Items ( α =.93)

Privacy Concern (Attitude) Are you concerned about online identity theft? Are you concerned that a computer virus could send out s in your name? General Caution (Behavior) Do you hide your bank card PIN number when using cash machines / making purchases? Do you look for a privacy certification on a website before you register your information? Technical Protection (Behavior) Do you check your computer for spy ware? Do you use a pop up window blocker? Answers on 5-point scales I TEM -E XAMPLES 4

Assumption of Buchanan et al. (2007): Technical students (e.g. computer science) are more aware of threats to their privacy on the Internet than non-technical students (e.g. social science) C RITERIA V ALIDITY OF THE PCP 5

1. Technical Knowledge by “field of study” (Buchanan et al., 2007)  Aim: Checking the translation 2. Questionnaire for “objective technical computer knowledge” INCOBI – Inventory of Computer Knowledge (Richter, Naumann & Groeben, 2002) out of it: TECOWI – Scale for technical computer knowledge 13 Items, α =.90,  Aim: Further validation of the PCP C RITERIA V ARIABLES OF THIS S TUDY 6

Aim: Checking the translation (Hypothesis similar to results from Buchanan et al., 2007) Hypothesis 1a People with a technical field of study do not differ in their level of Privacy Concern (attitude) compared to people with a non- technical field of study. Hypothesis 1b People with a technical field of study have higher scores on the General Caution Scale (behavior) compared to people with a non-technical field of study. Hypothesis 1c People with a technical field of study have higher scores on the Technical Protection Scale (behavior) compared to people with a non-technical field of study. H YPOTHESIS „F IELD OF S TUDY “ 7

Aim: Further validation of the Online Privacy Scale (Hypothesis similar to the original hypothesis of Buchanan et al., 2007). Hypothesis 2a People with a high technical computer knowledge have higher Privacy Concerns (attitude) compared to people with a low technical knowledge. Hypothesis 2b People with high technical computer knowledge have similar scores on the General Caution Scale (behavior) compared to people with a low technical knowledge. Hypothesis 2c People with high technical computer knowledge have higher scores on the Technical Protection Scale (behavior) compared to people with a low technical knowledge. H YPOTHESIS „O BJECTIVE T ECHNICAL K NOWLEDGE “ 8

Online survey with WEXTOR pages 1. Welcome 2. Privacy Concern items 3. General Caution and Technical Protection items 4. Instruction and items of TECOWI (4 pages) 5. demographical variables Same item order compared to Buchanan et al. (2007) Average time to fill in the online survey: M = 7:39 minutes D ATA C OLLECTION 9

E XAMPLE : O NLINE S URVEY, GPCP 10

E XAMPLE : O NLINE S URVEY, TECOWI 11

N = 566 age: M = 25.0 years sex: 56% male, 44% female recruited by Sample consists of: ETH students and assistants (n = 379) Psychology students of UNZH (n = 44) personal requests (no students) (n = 91) S AMPLE 12

D ROPOUT 13

Reliability: Privacy Concern Scale: α =.86 (.93 engl.) General Caution Scale : α =.75 (.75 engl.) Technical Protection Scale : α =.65 (.74 engl.) Factorial validity: Factorial structure was replicated in every of the three subscales. R ELIABILITY & F ACTORIAL V ALIDITY 14

Hypothesis 1a People with a technical field of study do not differ in their Privacy Concern (attitude). M tec (28.38) = M non-tec (27.81); p =.57 Hypothesis 1b People with a technical field of study get higher scores on General Caution Scale (behavior). M tec (10.43) = M non-tec (10.28); p =.71 Hypothesis 1c People with a technical field of study get higher scores on Technical Protection Scale (behavior). M tec (16.34) > M non-tec (14.42); p = <.001 R ESULTS „F IELD OF S TUDY “ 15

Hypothesis 2a People with high technical computer knowledge get higher scores on Privacy Concern Scale (attitude). r =.11; p =.01 Hypothesis 2b People with high technical computer knowledge do not differ in scores on General Caution Scale (behavior). r =.07; p =.10 Hypothesis 2c People with high technical computer knowledge get higher scores on Technical Protection Scale (behavior). r =.30; p <.001 R ESULTS : O BJECTIVE T ECHNICAL K NOWLEDGE 16

Translation of PCP was successful! Further advancement and validation is required. Weaknesses of PCP/GPCP: Ceiling- und floor effects in many items Items of Technical Protection Scale are highly dependent from technical changes (e.g. spyware filter or pop-up blocker). C ONCLUSION 17