Advertisement

Can I Live? College Student Perceptions of Risks, Security, and Privacy in Online Spaces

  • Kristin HaltinnerEmail author
  • Dilshani Sarathchandra
  • Nicole Lichtenberg
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 589)

Abstract

This study explores U.S. college students’ perceptions of risk, security, and privacy in online spaces, and the strategies used by students to manage online risks. Twenty-one students participated in in-depth interviews and shared their experiences with online spaces and their perceptions of cyber threats. Our findings indicate that student cybersecurity concerns are shaped mainly by routinization and ritualization of risk, optimistic bias, and self-efficacy. Strategies commonly employed to overcome risks include accessing sources that are perceived as credible and trustworthy, restricting information sharing, and exercising learned helplessness—or, what we term here as the “can-I-live syndrome.”

Keywords

College Student Social Capital Social Network Site Civic Engagement Internet Addiction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

The authors would like to thank Michelle Sing for her research assistance and insightful comments. This research was partially supported through the University of Idaho IGEM Grant.

References

  1. Al-Najjar, F., Al-Azemi, W., BuHaimed, W., Adib, S., Behbehani, J.: Knowledge and expectations among Kuwaiti mothers attending clinics for asthmatic children. Psychol. Health Med. 3(3), 253–259 (1998)CrossRefGoogle Scholar
  2. Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613–643 (2010)Google Scholar
  3. Ariely, D.: Our buggy moral code [Video file] (2009) http://www.ted.com/talks/dan_ariely_on_our_buggy_moral_code?language=en
  4. Arnett, J.: Optimistic bias in adolescent and adult smokers. Addict. Behav. 25(4), 625–632 (2000)CrossRefGoogle Scholar
  5. Bandura, A.: Self-efficacy mechanism in human agency. Am. Psychol. 37(2), 122–147 (1982)CrossRefGoogle Scholar
  6. Beck, U.: Risk Society: Towards a New Modernity. Sage, London (1992)Google Scholar
  7. Basar, B.A.: Credibility: a case in internet banking. Dissertation, London School of Economics and Political Science (2000)Google Scholar
  8. Brown, J.D.: Evaluations of self and others: self-enhancement biases in social judgments. Social Cogn. 4, 353–376 (1986)CrossRefGoogle Scholar
  9. Campbell, J., Greenauer, N., Macaluso, K., End, C.: Unrealistic optimism in internet events. Comput. Hum. Behav. 23(2007), 1273–1284 (2007)CrossRefGoogle Scholar
  10. Chapin, J., Coleman, G.: Optimistic bias: what you think, what you know, or whom you know? North Am. J. Psychol. 11(1), 121–132 (2009)Google Scholar
  11. Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput.-Mediated Commun. 15(2009), 83–108 (2009)CrossRefGoogle Scholar
  12. Dilmac, B.: Psychological needs as a predictor of cyber bullying: a preliminary report on college students. Educ. Sci. Theory Pract. 9(3), 1307–1325 (2009)Google Scholar
  13. Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of facebook ‘‘friends:’’ social capital and college students’ use of online social network sites. J. Comput.-Mediated Commun. 12(2007), 1143–1168 (2007)CrossRefGoogle Scholar
  14. Fischhoff, B.: Risk perception and communication unplugged: twenty years of process. Risk Anal. 15(2), 137–145 (1995)CrossRefGoogle Scholar
  15. Fogel, J., Nehmad, E.: Internet social network communities: risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25, 153–160 (2009)CrossRefGoogle Scholar
  16. Frewer, L., Howard, C., Hedderley, D., Shepherd, R.: Methodological approaches to assessing risk perceptions associated with food-related hazards. Risk Anal. 18(1), 95–102 (1998)CrossRefGoogle Scholar
  17. Giddens, A.: Risk and Responsibility. Mod. Law Rev. 62(1), 1–10 (1999)CrossRefGoogle Scholar
  18. Gist, M.E., Schwoerer, C., Rosen, B.: Effects of alternative training methods on self-efficacy and performance in computer software training. J. Appl. Psychol. 74, 884–891 (1989)CrossRefGoogle Scholar
  19. Helweg-Larsen, M., Shepperd, J.A.: Do moderators of the optimistic bias affect personal or target risk estimates? a review of the literature. Pers. Soc. Psychol. Rev. 5, 74–95 (2001). doi: 10.1207/S15327957PSPR0501_5 CrossRefGoogle Scholar
  20. Hill, T., Smith, N.D., Mann, M.F.: Role of efficacy expectations in predicting the decision to use advanced technologies. J. Appl. Psychol. 72(1987), 307–314 (1987)CrossRefGoogle Scholar
  21. Hoorens, V.: Self-enhancement and superiority biases in social comparison. In: Strobe, W., Hewstone, M. (eds.) European Review of Social Psychology, pp. 113–139. Wiley, Chichester, UK (1993)Google Scholar
  22. Ibrahim, Y.: The new risk communities: social networking sites and risk. Int. J. Media Cult. Polit. 4(2), 245–253 (2008)CrossRefGoogle Scholar
  23. Jones, A., Ashenden, D.: Risk Management for Computer Security: Protecting Your Network and Information Assets. Butterworth-Heinemann, Oxford (2005)Google Scholar
  24. Kendall, J.J.: Internet addiction on campus: the vulnerability of college students. CyberPsychol. Behav. 1(1), 11–17 (1998)CrossRefGoogle Scholar
  25. Krueger, N.K., Dickson, P.R.: How believing in ourselves increases risk taking: perceived self-eYcacy and opportunity recognition. Decis. Sci. 25, 385–400 (1995)CrossRefGoogle Scholar
  26. James, P.L., Molluzzo, J.C.: A survey of first-year college student perceptions of privacy in social networking. Consortium Comput. Sci. Coll. 26(3), 36–41 (2011)Google Scholar
  27. Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput.-Mediated Commun. 14(2008), 79–100 (2008)CrossRefGoogle Scholar
  28. Livingstone, S.: Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10(3), 393–411 (2008)CrossRefGoogle Scholar
  29. Luo, J., Isaacowitz, D.: How optimists face skin cancer information: Risk assessment, attention, memory and behavior. Psychol. Health 22(8), 963–984 (2007)CrossRefGoogle Scholar
  30. MacDonald, C.D., Roberts-Pittman, B.: Cyberbullying among college students: prevalence and demographic differences. Proc. Soc. Behav. Sci. 9(2010), 2003–2009 (2010)CrossRefGoogle Scholar
  31. Mary, M., Rainie, L.: Pew research center 2015. Americans’ Attitudes About Privacy, Security and Surveillance, 20 May 2015. (http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/)
  32. Morahan-Martin, J., Schumacher, P.: Loneliness and social use of the internet. Comput. Hum. Behav. 19, 659–671 (2003)CrossRefGoogle Scholar
  33. Moreno, M.A., Stewart, M., Pumper, M., Cox, E., Young, H., Zhang, C., Eickhoff, J.: Facebook use during a stressful event: a pilot evaluation investigating facebook use patterns and biologic stress response. Bull. Sci. Technol. Soc. 34(3–4), 94–98 (2014)Google Scholar
  34. O’Keeffe, G.S., Clarke-Pearson, K.: The impact of social media on children, adolescents, and families. Pediatrics 127(4), 800–804 (2011)CrossRefGoogle Scholar
  35. Peterson, C., Seligman, Martin E.P.: Learned helplessness and victimization. Soc. Issues (1983). doi: 10.1111/j.1540-4560.1983.tb00143.x Google Scholar
  36. Pew Research Center: Social networking fact sheet (2014), 21 May 2015. (http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/)
  37. Ralson, P.A.S., Graham, J.H., Hieb, J.L.: Cybersecurity risk assessment for SCADA and DCS networks. ISA Trans. 46(4), 583–594 (2007)CrossRefGoogle Scholar
  38. Ortwin, R., Levine, D.: Credibility and trust in risk communication. In: Kasperson, R.E., Stallen, P.J.M. (eds.) Communicating Risks to the Public, vol. 4, pp. 175–217. Springer, Heidelberg (1991)Google Scholar
  39. Schenk, A.M., Fremouw, W.J.: Prevalence, psychological impact, and coping of cyberbully victims among college students. J. Sch. Violence 11(1), 21–37 (2012)CrossRefGoogle Scholar
  40. Shibutani, T.: Reference groups as perspectives. Am. J. Sociol. 60(6), 562–569 (1955)CrossRefGoogle Scholar
  41. Silverman, D.: Qualitative Methodology and Sociology. Gower Publishing, Aldershot, England (1985)Google Scholar
  42. Tufekci, Z.: Can you see me now? audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28(1), 20–36 (2008)CrossRefGoogle Scholar
  43. U.S. Chamber of Commerce Foundation: The Millennial Generation Research Review (2012), 20 May 2015 http://www.uschamberfoundation.org/millennial-generation-research-review
  44. Valenzuela, S., Park, N., Kee, K.F.: Is there social capital in a social network site?: facebook use and college students’ life satisfaction, trust, and participation. J. Comput.-Mediated Commun. 14(2009), 875–901 (2009)CrossRefGoogle Scholar
  45. Walker, E., Caban, A., Schecter, C., Basch, C., Blanco, E., DeWitt, T., Kalten, M., Mera, M., Mojica, G.: Measuring comparative risk perceptions in an urban minority population. the risk perception survey for diabetes. Diab. Educ. 33(1), 103–110 (2007)CrossRefGoogle Scholar
  46. Whyte, G., Saks, A., Hook, S.: When success breeds failure: the role of self-eycacy in escalating commitment to a losing course of action. J. Organ. Behav. 18, 415–432 (1997)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Kristin Haltinner
    • 1
    Email author
  • Dilshani Sarathchandra
    • 1
  • Nicole Lichtenberg
    • 1
  1. 1.University of IdahoMoscowUSA

Personalised recommendations