Next Article in Journal
Post-Quantum Authentication in the MQTT Protocol
Previous Article in Journal
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
 
 
Article
Peer-Review Record

How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors

J. Cybersecur. Priv. 2023, 3(3), 396-415; https://doi.org/10.3390/jcp3030020
by Ioannis Paspatis * and Aggeliki Tsohou
Reviewer 1: Anonymous
J. Cybersecur. Priv. 2023, 3(3), 396-415; https://doi.org/10.3390/jcp3030020
Submission received: 6 June 2023 / Revised: 10 July 2023 / Accepted: 13 July 2023 / Published: 17 July 2023
(This article belongs to the Section Privacy)

Round 1

Reviewer 1 Report

Overall, the paper provides a comprehensive literature review and proposes an integrated framework for influencing privacy behavior. While it demonstrates strengths in terms of its theoretical foundation and potential impact, further empirical research and a more detailed analysis of determinant factors would strengthen its overall contribution to the field. Additionally, expanding the discussion to include practical considerations would enhance the paper's relevance for policymakers and practitioners.

 Strengths:

Comprehensive Literature Review: The paper presents a thorough literature review of various theories and models related to behavior modification in fields such as sociology, psychology, philosophy, and health. This demonstrates the authors' comprehensive understanding of the subject and strengthens the credibility of their proposed framework.

Integration of Cognitive Theory and Health Belief Model: By integrating the cognitive theory and health belief model with privacy behavior determinant factors, the authors propose a theoretical framework that aligns existing influential factors with established behavior transformation theories. This integration provides a solid foundation for future research and suggests a novel approach to understanding and influencing privacy behavior.

Practical Implications and Potential Impact: The paper highlights the practical implications of the proposed framework, particularly in educational settings. The authors suggest that the framework can be beneficial to educational policy makers, practitioners, and academic institutes, offering new models of teaching to improve students' privacy behavior. Furthermore, the paper suggests that the framework has the potential to impact privacy awareness and contribute to the broader academic discourse on privacy.

Weaknesses:

Lack of Empirical Evidence: While the paper extensively reviews existing literature, it lacks empirical evidence to support the proposed framework. Future research should focus on conducting empirical experiments and applying experiential methods to validate the effectiveness of the framework in influencing ICT users' privacy behavior.

Limited Discussion on Privacy Behavior Determinant Factors: Although the paper mentions the synthesis of privacy behavior determinant factors, it does not provide a detailed discussion or analysis of these factors. Further exploration and examination of these factors would enhance the comprehensiveness and applicability of the proposed framework.

Theoretical Overemphasis: The paper heavily relies on theoretical frameworks and models, such as the cognitive theory and health belief model. While these theories offer a promising foundation for understanding behavior transformation, the practical implementation and contextual considerations of the proposed framework are not thoroughly explored. Providing more practical examples or case studies would strengthen the paper's applicability and relevance.

Outdated References: It is worth noting that the paper heavily relies on references that appear to be outdated. The authors should consider incorporating more recent literature to ensure the relevance and up-to-dateness of their research. Including recent studies and publications would strengthen the paper's credibility and demonstrate the authors' awareness of the current state of the field.

Improvement of Figure Quality: The figures presented in the paper could benefit from improvement in terms of their quality. Clearer and more visually appealing figures would enhance the readability and understanding of the proposed integrated framework. It is recommended that the authors revise and refine the figures to ensure they effectively convey the key concepts and relationships discussed in the paper.

N/A

Author Response

Dear reviewer,

We would like to thank you for your valuable comments and suggestions, which helped improve the quality of our manuscript.

We have made careful and significant revisions (highlighted in yellow) to our manuscript by considering all your comments.

Please see the attachment to check our responses. 

Best Regards,

Ioannis Paspatis

Author Response File: Author Response.pdf

Reviewer 2 Report

Major Improvements for the Paper:   Clarify the Research Gap and Importance: Begin the paper by clearly explaining the research gap and why it is important to study the modification of human behavior in the context of improving ICT users' privacy behavior. Highlight the limitations of the traditional learning approaches and the need for alternative methods.     Provide a Clear Methodology: Clearly explain the methodology used to conduct the literature review. Describe the criteria for selecting relevant theories and learning methods, as well as the process of aggregating the privacy behavior determinant factors. This will enhance the transparency and reproducibility of the research.     Expand on the Cognitive Theory and Health Belief Model: Instead of just mentioning that the cognitive theory and health belief model present optimistic results, provide a detailed explanation of these theories. Discuss how they have been applied in other fields to modify human behavior and explain their relevance to the context of privacy behavior in ICT users. Provide examples and empirical evidence to support your claims.     Elaborate on Experiential Learning: Instead of simply concluding that experiential learning is advantageous compared to other methods, provide a comprehensive discussion of experiential learning. Explain its principles, processes, and how it can be applied to enhance privacy behavior. Discuss real-life examples or case studies where experiential learning has been successfully implemented in the context of privacy education.     Develop a Comprehensive Theoretical Framework: Instead of just mentioning that a theoretical framework has been synthesized using the cognitive theory, provide a detailed explanation of the framework. Describe the components, relationships, and mechanisms within the framework that can enhance privacy behavior. Consider visual representations or diagrams to illustrate the framework.     Discuss Practical Implications: Extend the discussion beyond educational policy makers and practitioners to include potential applications and implications of the proposed framework. Discuss how the framework can be utilized in various educational settings, such as public and private schools and universities. Highlight the potential benefits for individuals, organizations, and society as a whole.     Highlight Research Opportunities: Emphasize the need for further research on experiential privacy learning and privacy behavior enhancement. Identify specific areas or topics that require more investigation and suggest potential research directions. Encourage interdisciplinary collaborations and the exploration of innovative approaches in this field.    

By incorporating these major improvements, the paper will provide a more comprehensive and impactful literature review on modifying human behavior to improve ICT users' privacy behavior. It will contribute to the development of effective educational strategies and policies for privacy education and inspire further research in this area.

Typos and grammar can be improved.

Author Response

Dear reviewer,

We would like to thank you for your valuable comments and suggestions, which helped improve the quality of our manuscript.

We have made careful and significant revisions (highlighted in yellow) to our manuscript by considering all your comments.

Please see the attachment to check our responses. 

Best Regards,

Ioannis Paspatis

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The statement in line 342 "The above is reflected in figure 3" should be revised.

N/A

Author Response

Response to Reviewer 1 Comments

Point 1: The statement in line 342 "The above is reflected in figure 3" should be revised.

Response 1: The statement in line 342 is been revised.

Thank you for your insightful comments and suggestions. They helped us enhance the quality of the manuscript.

Reviewer 2 Report

Authors updated the paper and no further comment from my side.

English is fine.

Author Response

Response to Reviewer 2 Comments

Point 1: - 

Response 1:-

Thank you for your insightful comments and suggestions. They helped us a lot enhance the quality of the manuscript.

 

 

Back to TopTop