Loading...
Thumbnail Image
Item

The Silent Epidemic: Unseen Factors Driving Data Breach Fatigue In Everyday Lives

Bryant, Phoebe
Research Projects
Organizational Units
Journal Issue
DOI
https://doi.org/10.34944/cctr-2p25
Abstract
In an era of pervasive data breaches, individuals are increasingly exposed to digital security threats, yet the psychological and behavioral responses to repeated breaches remain understudied. Despite growing concerns, existing literature lacks a comprehensive examination of the demographic and psychological factors that shape individuals’ perceptions and responses to breach fatigue. This study addresses a critical gap in the literature by investigating the demographic, socioeconomic, and psychological factors influencing data breach fatigue, and perceived data control. Prior research has explored privacy fatigue, but its integration with breach fatigue remains limited. This dissertation bridges that divide, offering a comprehensive framework to analyze data security behaviors. By incorporating cognitive models and behavioral theories, this research provides a deeper, more systematic understanding of how individuals respond to breaches. To achieve this, two empirical studies were conducted, testing eight hypotheses to examine the complex interplay of privacy concerns, security behavior, and perceived data control. Multivariate analytical approaches were employed to assess individual, experiential, and structural determinants. Findings indicate that not only do privacy concerns not significantly impact breach fatigue, internet activity, security awareness, and technical knowledge have minimal influence on security behaviors. Moreover, age positively correlates with control perceptions, contradicting initial expectations, while education and income show no substantial effect. More interestingly, prior breach experiences do not uniformly diminish control, except in cases of social hacking, which exhibits a significant positive association. These insights underscore the complex and often counterintuitive effects of data breaches.
Description
Citation
Citation to related work
Has part
ADA compliance
For Americans with Disabilities Act (ADA) accommodation, including help with reading this content, please contact scholarshare@temple.edu
Embedded videos
License
IN COPYRIGHT- This Rights Statement can be used for an Item that is in copyright. Using this statement implies that the organization making this Item available has determined that the Item is in copyright and either is the rights-holder, has obtained permission from the rights-holder(s) to make their Work(s) available, or makes the Item available under an exception or limitation to copyright (including Fair Use) that entitles it to make the Item available.