{"title":"“I don't get it, but I accept it” Exploring uninformed consent to privacy policies: A neutralization perspective","authors":"Hou Zhu , Mingxin Zhang","doi":"10.1016/j.cose.2025.104396","DOIUrl":null,"url":null,"abstract":"<div><div>While registering or logging onto an online platform, users are required to carefully read a privacy statement and decide whether they give consent. Accepting privacy policies without reading them is common yet detrimental to data privacy. Theorizing it as a type of deviant behavior, this study leverages neutralization theory to understand users’ uninformed consent decisions. Through a review of neutralization theory, we identified and contextualized four relevant neutralization techniques: denial of responsibility, denial of injury, claim of normality, and claim of necessity. We focused on how these neutralization techniques could individually and collectively lead to uninformed consent to privacy policies. We conducted a cross-sectional survey with 985 Internet users. A multi-method approach combining structural equation modelling (CB-SEM) with fuzzy-set qualitative comparative analysis (Fs/QCA) confirmed the proposed individual and configurational effects, thereby answering how these neutralization techniques could individually and collectively influence uninformed consent decisions. These insights provide an important theoretical angle to understand why users accept privacy policies without reading the content. Practitioners can leverage these insights to design user-friendly privacy policies.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"153 ","pages":"Article 104396"},"PeriodicalIF":4.8000,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825000859","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
While registering or logging onto an online platform, users are required to carefully read a privacy statement and decide whether they give consent. Accepting privacy policies without reading them is common yet detrimental to data privacy. Theorizing it as a type of deviant behavior, this study leverages neutralization theory to understand users’ uninformed consent decisions. Through a review of neutralization theory, we identified and contextualized four relevant neutralization techniques: denial of responsibility, denial of injury, claim of normality, and claim of necessity. We focused on how these neutralization techniques could individually and collectively lead to uninformed consent to privacy policies. We conducted a cross-sectional survey with 985 Internet users. A multi-method approach combining structural equation modelling (CB-SEM) with fuzzy-set qualitative comparative analysis (Fs/QCA) confirmed the proposed individual and configurational effects, thereby answering how these neutralization techniques could individually and collectively influence uninformed consent decisions. These insights provide an important theoretical angle to understand why users accept privacy policies without reading the content. Practitioners can leverage these insights to design user-friendly privacy policies.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.