Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors

Version 1 : Received: 7 June 2023 / Approved: 7 June 2023 / Online: 7 June 2023 (08:46:03 CEST)

A peer-reviewed article of this Preprint also exists.

Paspatis, I.; Tsohou, A. How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. J. Cybersecur. Priv. 2023, 3, 396-415. Paspatis, I.; Tsohou, A. How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors. J. Cybersecur. Priv. 2023, 3, 396-415.

Abstract

Several studies have shown that the traditional way of learning is not optimal when we aim to improve ICT users’ actual privacy behavior. In this research, we present a literature review of the theories that are followed in other fields to modify human behavior. Our findings show that the cognitive theory and the health belief model present optimistic results. Further, we examine various learning methods and we conclude that experiential learning is advantageous compared to other methods. In this paper aggregate the privacy behavior determinant factors found in the literature and we use the cognitive theory to we synthesize a theoretical framework. The proposed framework can be beneficial to educational policy makers and practitioners, such as public and private schools, and universities. Also, our framework provides a fertile ground for more research on experiential privacy learning and privacy behavior enhancement.

Keywords

privacy behavior factors; privacy behavior; cognitive theory; health belief model

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.