{"id":346,"date":"2023-11-16T15:52:44","date_gmt":"2023-11-16T15:52:44","guid":{"rendered":"http:\/\/localhost\/bpscoretextbooks\/?post_type=content&#038;p=346"},"modified":"2025-03-25T09:47:20","modified_gmt":"2025-03-25T09:47:20","slug":"chapter-10-privacy-and-trust-onlinechapter-10","status":"publish","type":"content","link":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/9780367552299\/chapter-10-privacy-and-trust-onlinechapter-10\/","title":{"rendered":"Chapter 10 &#8211; Privacy and Trust Online"},"content":{"rendered":"\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#eedbd1;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/9780367552299\/chapter-10-privacy-and-trust-onlinechapter-10\/\" title=\"Chapter 10 \u2013 Privacy and Trust Online\">Chapter 10 \u2013 Privacy and Trust Online<\/a>\n<\/span><\/div>\n\n<h1 class=\"wp-block-post-title\">Chapter 10 &#8211; Privacy and Trust Online<\/h1>\n\n\n<p>In the earliest days of civilisation, humans lived in relatively small groups, often within the same room (or tent, or cave!) with very little privacy. Even today, in some small villages, inhabitants note that their activities and actions are known throughout the community, with such information being spread from person to person. On the other hand, those living in larger communities such as cities might find that they do not even know the names of their next-door neighbours. Nevertheless, they may find that this privacy is negated by the impact of the Internet as they disclose large amounts of information online. They may also have their information disclosed to others, sometimes without their consent. This chapter considers our concepts of online privacy and trust, the sacrifices we make to our privacy in order to make other perceived gains, and the important theories in the field that inform our understanding of privacy and security. It examines how we share information, what happens to our data online, how we decide what information to share, and how we go about reducing the available amount of online information about ourselves.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Chapter Summary<\/summary>\n<h3 class=\"wp-block-heading\">Sharing Information Online<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The concept of privacy is complex and it is a difficult phenomenon to define easily.<\/li>\n\n\n\n<li>Some people carefully curate their online information.<\/li>\n\n\n\n<li>Many methods of sharing our information online are available to us. Some of these are conscious, as we post messages and send communications. Some aspects of our online information sharing may be unwitting \u2013 for example, through embedded information or Internet cookies.<\/li>\n\n\n\n<li>Our data online also accumulates across various platforms.<\/li>\n\n\n\n<li>Online profiles might be linked through facial recognition software.<\/li>\n\n\n\n<li>Information online might also have a degree of permanency that is not considered when it is posted.<\/li>\n\n\n\n<li>Complaints against agencies who store information have led to clarifications regarding privacy legislation, such as the \u2018right to be forgotten\u2019 in Europe.<\/li>\n\n\n\n<li>Users also may not consider who has access to information that they share online, including third parties such as government agencies, advertisers, or malicious hackers, who may access the information despite not being the intended audience.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Deciding What Information to Share<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users have been found to be greatly concerned about their privacy.<\/li>\n\n\n\n<li>There are many factors which may lead them to share private information online.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cognitive Psychology and Decision Making<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Various models and theories in cognitive psychology can aid our understanding of why people share information online.<\/li>\n\n\n\n<li>Daniel Kahneman\u2019s (2011) System 1 and System 2 types of thinking may be relevant, with users employing the faster System 1 for decisions which require the greater deliberation of System 2.<\/li>\n\n\n\n<li>It is also possible that confirmation bias (Einhorn &amp; Hogarth, 1978) might affect decision making about privacy, with users selectively attending to information which suggests that online disclosure is safe.<\/li>\n\n\n\n<li>Similarly, if a user has experienced or witnessed negative consequences of privacy disclosure, they may be more susceptible to the availability heuristic proposed by Tversky and Kahneman (1973).<\/li>\n\n\n\n<li>Other theories and models in cognitive psychology may also have applicability to decision making regarding privacy.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Communication Privacy Management<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sandra Petronio (2002) developed the Communication Privacy Management Theory.<\/li>\n\n\n\n<li>This suggests that users believe that they own their private information and that they have the right to control the dissemination of this information.<\/li>\n\n\n\n<li>Communication Privacy Management Theory also suggests that users presume that others who hold this information will follow their rules regarding dissemination, and turbulence will ensue if the information is shared without permission.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Social Spheres and Space<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In some cases, users may be content to share private information with only small groups of close friends.<\/li>\n\n\n\n<li>In other cases, the user may feel that they can post very private information in a very public setting, provided that they feel they are anonymous.<\/li>\n\n\n\n<li>Problems may arise if a user wishes to share information that may not be well received by all of their contacts \u2013 different social spheres may have different expectations about the user\u2019s behaviour.<\/li>\n\n\n\n<li>It is also possible that users may feel \u2018digital crowding\u2019 where the disclosure inherent in social media results in withdrawal coping methods (Joinson&nbsp;<em>et al<\/em>., 2011).<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Paradoxes, Trade-Offs and Gaps<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users may sometimes know what the most secure behaviour is, but fail to behave in a way that promotes such security \u2013 a phenomenon known as the knowing\u2013doing gap.<\/li>\n\n\n\n<li>A similar concept is the privacy paradox (Barnes, 2006).<\/li>\n\n\n\n<li>Users may maintain a balance between privacy settings, selective disclosures, and selective inclusion of others to maintain privacy (Ellison&nbsp;<em>et al<\/em>., 2011).<\/li>\n\n\n\n<li>Security is a related concept to privacy, and users may choose to engage in behaviours which make their digital lives easier rather than safer. This concept is known as the convenience-security trade-off (Tam&nbsp;<em>et al<\/em>., 2009).<\/li>\n\n\n\n<li>Rogers (1975, 1983) proposed Protection Motivation Theory, which includes several factors which might trigger engagement in more secure behaviours. These include how severe the user perceived the threatened event would be, how likely they perceive the event to be, how effective the preventative measure is, what are the potential rewards if the threat is avoided, what are the potential costs of implementing the preventative measure, and if the user believes that they can successfully implement the preventative measures (self-efficacy).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Removing Our Data Online<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is difficult to remove all data once it has appeared online.<\/li>\n\n\n\n<li>There are many reasons why a user may wish to remove this data, including avoiding unwanted attention, fear of cyberstalking, or removal of a comment which attracted criticism.<\/li>\n\n\n\n<li>Untagging may be a method of managing undesirable photographs on social media (Lang and Barton, 2015).<\/li>\n\n\n\n<li>Bloggers may also engage in \u2018scrubbing\u2019 behaviours for a variety of reasons (Child&nbsp;<em>et al<\/em>., 2011, 2012).<\/li>\n\n\n\n<li>Similarly, users may delete social networking profiles, termed \u2018virtual identity suicide\u2019 by Stieger&nbsp;<em>et al<\/em>. (2013).<\/li>\n<\/ul>\n<\/details>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-query alignwide is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-1279 content type-content status-publish format-standard hentry content-type-content parent-book-40 resource-type-weblinks\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 10 \u2013 Useful Websites<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<p>The Princetown University Security and Privacy Research Group\u2019s website includes information relating to their work and researchers in this important field, as well as links to publications by their group. Their research can be found at:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/security.cs.princeton.edu\/\">https:\/\/security.cs.princeton.edu\/<\/a><\/li>\n<\/ul>\n\n\n\n<p>A similar website is maintained by the University of Washington Security and Privacy Research Lab. Their publications, courses, and research activities are described at:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/seclab.cs.washington.edu\/\">https:\/\/seclab.cs.washington.edu\/<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-1278 content type-content status-publish format-standard hentry content-type-content parent-book-40 resource-type-further-reading\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 10 \u2013 Further Reading<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<p>This fascinating paper by Joanne Hinds, Emma Williams, and Adam Joinson considers how people\u2019s privacy concerns were (or were not) affected by the Cambridge Analytica case.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hinds, J., Williams, E. J., and Joinson, A. N. (2020). \u201cIt wouldn&#8217;t happen to me\u201d: Privacy concerns and perspectives following the Cambridge Analytica scandal.\u00a0<em>International Journal of Human-Computer Studies<\/em>,\u00a0<em>143<\/em>, 102498. <a href=\"https:\/\/doi.org\/10.1016\/j.ijhcs.2020.102498\">https:\/\/doi.org\/10.1016\/j.ijhcs.2020.102498<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1071581920301002\">https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1071581920301002<\/a><\/li>\n<\/ul>\n\n\n\n<p>The Pew Research Centre has published data regarding people\u2019s perceptions of privacy online. A summary of their results and a link to the full report are available here:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/\">https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/<\/a><\/li>\n\n\n\n<li>Broader content on online privacy and security from the Pew Research Centre is also available at: <a href=\"https:\/\/www.pewresearch.org\/topic\/internet-technology\/technology-policy-issues\/online-privacy-security\/\">https:\/\/www.pewresearch.org\/topic\/internet-technology\/technology-policy-issues\/online-privacy-security\/<\/a><\/li>\n<\/ul>\n\n\n\n<p>Bruce Schneier maintains a fascinating blog \u2018Schneier on Security\u2019. As the name suggests, the primary focus is on security, but occasional posts relate more specifically to privacy.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.schneier.com\/\">https:\/\/www.schneier.com\/<\/a><\/li>\n<\/ul>\n\n\n\n<p>The IEEE publication <em>Security &amp; Privacy<\/em> includes articles, interviews, tutorials and case studies:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/RecentIssue.jsp?punumber=8013\">https:\/\/ieeexplore.ieee.org\/xpl\/RecentIssue.jsp?punumber=8013<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-1277 content type-content status-publish format-standard hentry content-type-content parent-book-40 resource-type-audio-and-video-links\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 10 \u2013 Audio and Video links<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<p>Here\u2019s a short interview with Professor Sandra Petronio explaining the principles of Communication Privacy Management theory.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Ay7ZJQubKA4\">https:\/\/www.youtube.com\/watch?v=Ay7ZJQubKA4<\/a><\/li>\n<\/ul>\n\n\n\n<p>Prof. Daniel Kahneman, winner of the Nobel Prize in Economics, describes the research presented in his book \u2018Thinking Fast and Slow\u2019 in this \u2018Talks at Google\u2019 video.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=CjVQJdIrDJ0\">https:\/\/www.youtube.com\/watch?v=CjVQJdIrDJ0<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-258 content type-content status-publish format-standard hentry category-uncategorized content-type-content parent-book-40 resource-type-essay-questions\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 10 &#8211; Essay questions<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Explain how at least three cognitive psychology theories or models can aid our understanding of why individuals might engage in risky online privacy management behaviours.<\/li>\n\n\n\n<li>Evaluate the applicability of Petronio\u2019s Communication Privacy Management Theory to online communication.<\/li>\n\n\n\n<li>How does the ability to utilise online social spheres lead to an increase in online disclosures?<\/li>\n\n\n\n<li>Legislation regarding the right to be forgotten online is ineffective unless users are educated about the risks of online information sharing. Discuss.&nbsp;<\/li>\n<\/ol>\n<\/div><\/div>\n\n<\/li><\/ul>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignwide\">Chapter 10 &#8211; Quiz<\/h2>\n\n\n<script>\n                            if (window.qmn_quiz_data === undefined) {\n                                    window.qmn_quiz_data = new Object();\n                            }\n                    <\/script><script>window.qmn_quiz_data[\"10\"] = {\"quiz_id\":\"10\",\"quiz_name\":\"9780367552299 - Chapter 10\",\"disable_answer\":0,\"ajax_show_correct\":0,\"progress_bar\":0,\"contact_info_location\":0,\"qpages\":{\"1\":{\"id\":\"1\",\"quizID\":\"10\",\"pagekey\":\"cne2OPL1\",\"hide_prevbtn\":\"0\"}},\"skip_validation_time_expire\":0,\"timer_limit_val\":0,\"disable_scroll_next_previous_click\":0,\"disable_scroll_on_result\":0,\"disable_first_page\":0,\"enable_result_after_timer_end\":0,\"enable_quick_result_mc\":0,\"end_quiz_if_wrong\":0,\"form_disable_autofill\":0,\"disable_mathjax\":0,\"enable_quick_correct_answer_info\":0,\"quick_result_correct_answer_text\":\"Correct! You have selected correct answer.\",\"quick_result_wrong_answer_text\":\"Wrong! You have selected wrong answer.\",\"quiz_processing_message\":\"\",\"quiz_limit_choice\":\"Limit of choice is reached.\",\"not_allow_after_expired_time\":0,\"scheduled_time_end\":false,\"prevent_reload\":0,\"limit_email_based_submission\":0,\"total_user_tries\":0,\"is_logged_in\":false,\"pagination\":{\"amount\":1,\"section_comments\":1,\"total_questions\":10,\"previous_text\":\"Previous\",\"next_text\":\"Next\",\"start_quiz_survey_text\":\"Start Quiz\",\"submit_quiz_text\":\"Submit\"},\"error_messages\":{\"email_error_text\":\"Not a valid e-mail address!\",\"number_error_text\":\"This field must be a number!\",\"incorrect_error_text\":\"The entered text is not correct!\",\"empty_error_text\":\"Please complete all required fields!\",\"contact_field_required_error_text\":\"Please complete all required fields!\",\"url_error_text\":\"The entered URL is not valid!\",\"minlength_error_text\":\"Required atleast %minlength% characters.\",\"maxlength_error_text\":\"Maximum %maxlength% characters allowed.\",\"recaptcha_error_text\":\"ReCaptcha is missing\",\"phone_error_text\":\"Phone number is invalid\"},\"question_list\":{\"112\":{\"question_id\":\"112\",\"quiz_id\":\"10\",\"question_name\":\"Communication Privacy Management Theory was proposed by:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:15:\\\"Sandra Petronio\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:10:\\\"Danah Boyd\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:15:\\\"Daniel Kahneman\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:12:\\\"Adam Joinson\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 1\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Sandra Petronio\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Danah Boyd\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Daniel Kahneman\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Adam Joinson\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"113\":{\"question_id\":\"113\",\"quiz_id\":\"10\",\"question_name\":\"Knowing that it is important to maintain security or privacy, but failing to do so, is termed the knowing\\u2013doing ___:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:7:\\\"Paradox\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:9:\\\"Trade-off\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:6:\\\"Sphere\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:3:\\\"Gap\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 2\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Paradox\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Trade-off\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Sphere\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Gap\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"}]},\"114\":{\"question_id\":\"114\",\"quiz_id\":\"10\",\"question_name\":\"Websites use which of the following to record information about user visits and activity?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:4:\\\"Bars\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:8:\\\"Biscuits\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:7:\\\"Cookies\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:7:\\\"Candies\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 3\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Bars\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Biscuits\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cookies\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Candies\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"115\":{\"question_id\":\"115\",\"quiz_id\":\"10\",\"question_name\":\"Clarifications regarding which right have helped to reduce the permanency of online information?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:21:\\\"Right to be anonymous\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:21:\\\"Right to be forgotten\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:22:\\\"Right to be recognised\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:19:\\\"Right to be private\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 4\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Right to be anonymous\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Right to be forgotten\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Right to be recognised\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Right to be private\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"116\":{\"question_id\":\"116\",\"quiz_id\":\"10\",\"question_name\":\"Which of the following was proposed by Kahneman as a fast, instinctive method of thinking?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:8:\\\"System 1\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:8:\\\"System 2\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:6:\\\"Type 1\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:6:\\\"Type 2\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 5\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"System 1\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"System 2\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Type 1\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Type 2\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"117\":{\"question_id\":\"117\",\"quiz_id\":\"10\",\"question_name\":\"Marder, Joinson and Shankar (2012) suggest that problems may arise in online communications when there are conflicting social _____:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:5:\\\"Signs\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:7:\\\"Systems\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:7:\\\"Spheres\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:10:\\\"Sympathies\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 6\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Signs\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Systems\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Spheres\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Sympathies\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"118\":{\"question_id\":\"118\",\"quiz_id\":\"10\",\"question_name\":\"Which of the following is not an element of Rogers\\u2019s Protection Motivation Theory?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:23:\\\"Perceived self-efficacy\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:15:\\\"Potential costs\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:17:\\\"Potential rewards\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:17:\\\"Potential strains\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 7\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Perceived self-efficacy\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Potential costs\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Potential rewards\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Potential strains\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"}]},\"119\":{\"question_id\":\"119\",\"quiz_id\":\"10\",\"question_name\":\"Which method of managing undesirable photographs on social media did Lang and Barton (2015) note as being the preferred method?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:9:\\\"Untagging\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:9:\\\"Scrubbing\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:30:\\\"Asking the friend to remove it\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:11:\\\"Unfriending\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 8\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Untagging\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Scrubbing\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Asking the friend to remove it\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Unfriending\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"120\":{\"question_id\":\"120\",\"quiz_id\":\"10\",\"question_name\":\"Stieger, Burger, Bohn and Voracek (2013) referred to the complete removal of a social networking profile as:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:24:\\\"Virtual identity removal\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:31:\\\"Virtual identity deconstruction\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:24:\\\"Virtual identity suicide\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:28:\\\"Virtual identity elimination\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 9\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Virtual identity removal\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Virtual identity deconstruction\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Virtual identity suicide\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Virtual identity elimination\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"121\":{\"question_id\":\"121\",\"quiz_id\":\"10\",\"question_name\":\"If an individual has recently experienced negative consequences of disclosure of personal information, they are more likely to be affected by:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:34:\\\"The convenience-security trade-off\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:26:\\\"The availability heuristic\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:21:\\\"The confirmation bias\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:19:\\\"The privacy paradox\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:11:\\\"Question 10\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"The convenience-security trade-off\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"The availability heuristic\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"The confirmation bias\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"The privacy paradox\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]}},\"first_page\":false,\"questions_settings\":[]}\n                    <\/script>\t\t<div class='qsm-quiz-container qsm-quiz-container-10 qmn_quiz_container mlw_qmn_quiz qsm_auto_pagination_enabled quiz_theme_default  '>\n\t\t\t\t\t\t\t\t<form name=\"quizForm10\" id=\"quizForm10\" action=\"\/bpscoretextbooks\/wp-json\/wp\/v2\/content\/346\" method=\"POST\" class=\"qsm-quiz-form qmn_quiz_form mlw_quiz_form\" novalidate enctype=\"multipart\/form-data\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_hidden_questions\" id=\"qsm_hidden_questions\" value=\"\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_nonce\" id=\"qsm_nonce_10\" value=\"382e6ce5d5\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_unique_key\" id=\"qsm_unique_key_10\" value=\"69fc9e9c42b1b\">\n\t\t\t\t<div id=\"mlw_error_message\" class=\"qsm-error-message qmn_error_message_section\"><\/div>\n\t\t\t\t<span id=\"mlw_top_of_quiz\"><\/span>\n\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-1\" data-apid=\"1\" data-qpid=\"1\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-112 slide0 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 1 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Communication Privacy Management Theory was proposed by:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question112-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question112\" id=\"question112_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question112_1\">\n\t\t\t\t\tSandra Petronio\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question112-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question112\" id=\"question112_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question112_2\">\n\t\t\t\t\tDanah Boyd\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question112-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question112\" id=\"question112_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question112_3\">\n\t\t\t\t\tDaniel Kahneman\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question112-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question112\" id=\"question112_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question112_4\">\n\t\t\t\t\tAdam Joinson\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question112_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question112\" id=\"question112_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_112\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-2\" data-apid=\"2\" data-qpid=\"2\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-113 slide1 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 2 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Knowing that it is important to maintain security or privacy, but failing to do so, is termed the knowing\u2013doing ___:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question113-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question113\" id=\"question113_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question113_1\">\n\t\t\t\t\tParadox\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question113-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question113\" id=\"question113_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question113_2\">\n\t\t\t\t\tTrade-off\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question113-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question113\" id=\"question113_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question113_3\">\n\t\t\t\t\tSphere\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question113-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question113\" id=\"question113_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question113_4\">\n\t\t\t\t\tGap\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question113_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question113\" id=\"question113_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_113\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-3\" data-apid=\"3\" data-qpid=\"3\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-114 slide2 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 3 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Websites use which of the following to record information about user visits and activity?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question114-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question114\" id=\"question114_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question114_1\">\n\t\t\t\t\tBars\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question114-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question114\" id=\"question114_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question114_2\">\n\t\t\t\t\tBiscuits\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question114-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question114\" id=\"question114_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question114_3\">\n\t\t\t\t\tCookies\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question114-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question114\" id=\"question114_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question114_4\">\n\t\t\t\t\tCandies\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question114_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question114\" id=\"question114_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_114\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-4\" data-apid=\"4\" data-qpid=\"4\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-115 slide3 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 4 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Clarifications regarding which right have helped to reduce the permanency of online information?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question115-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question115\" id=\"question115_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question115_1\">\n\t\t\t\t\tRight to be anonymous\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question115-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question115\" id=\"question115_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question115_2\">\n\t\t\t\t\tRight to be forgotten\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question115-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question115\" id=\"question115_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question115_3\">\n\t\t\t\t\tRight to be recognised\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question115-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question115\" id=\"question115_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question115_4\">\n\t\t\t\t\tRight to be private\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question115_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question115\" id=\"question115_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_115\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-5\" data-apid=\"5\" data-qpid=\"5\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-116 slide4 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 5 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which of the following was proposed by Kahneman as a fast, instinctive method of thinking?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question116-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question116\" id=\"question116_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question116_1\">\n\t\t\t\t\tSystem 1\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question116-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question116\" id=\"question116_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question116_2\">\n\t\t\t\t\tSystem 2\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question116-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question116\" id=\"question116_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question116_3\">\n\t\t\t\t\tType 1\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question116-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question116\" id=\"question116_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question116_4\">\n\t\t\t\t\tType 2\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question116_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question116\" id=\"question116_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_116\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-6\" data-apid=\"6\" data-qpid=\"6\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-117 slide5 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 6 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Marder, Joinson and Shankar (2012) suggest that problems may arise in online communications when there are conflicting social _____:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question117-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question117\" id=\"question117_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question117_1\">\n\t\t\t\t\tSigns\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question117-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question117\" id=\"question117_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question117_2\">\n\t\t\t\t\tSystems\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question117-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question117\" id=\"question117_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question117_3\">\n\t\t\t\t\tSpheres\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question117-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question117\" id=\"question117_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question117_4\">\n\t\t\t\t\tSympathies\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question117_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question117\" id=\"question117_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_117\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-7\" data-apid=\"7\" data-qpid=\"7\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-118 slide6 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 7 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which of the following is not an element of Rogers\u2019s Protection Motivation Theory?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question118-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question118\" id=\"question118_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question118_1\">\n\t\t\t\t\tPerceived self-efficacy\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question118-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question118\" id=\"question118_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question118_2\">\n\t\t\t\t\tPotential costs\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question118-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question118\" id=\"question118_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question118_3\">\n\t\t\t\t\tPotential rewards\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question118-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question118\" id=\"question118_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question118_4\">\n\t\t\t\t\tPotential strains\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question118_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question118\" id=\"question118_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_118\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-8\" data-apid=\"8\" data-qpid=\"8\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-119 slide7 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 8 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which method of managing undesirable photographs on social media did Lang and Barton (2015) note as being the preferred method?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question119-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question119\" id=\"question119_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question119_1\">\n\t\t\t\t\tUntagging\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question119-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question119\" id=\"question119_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question119_2\">\n\t\t\t\t\tScrubbing\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question119-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question119\" id=\"question119_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question119_3\">\n\t\t\t\t\tAsking the friend to remove it\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question119-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question119\" id=\"question119_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question119_4\">\n\t\t\t\t\tUnfriending\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question119_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question119\" id=\"question119_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_119\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-9\" data-apid=\"9\" data-qpid=\"9\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-120 slide8 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 9 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Stieger, Burger, Bohn and Voracek (2013) referred to the complete removal of a social networking profile as:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question120-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question120\" id=\"question120_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question120_1\">\n\t\t\t\t\tVirtual identity removal\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question120-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question120\" id=\"question120_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question120_2\">\n\t\t\t\t\tVirtual identity deconstruction\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question120-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question120\" id=\"question120_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question120_3\">\n\t\t\t\t\tVirtual identity suicide\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question120-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question120\" id=\"question120_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question120_4\">\n\t\t\t\t\tVirtual identity elimination\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question120_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question120\" id=\"question120_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_120\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-10\" data-apid=\"10\" data-qpid=\"10\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-121 slide9 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 10 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>If an individual has recently experienced negative consequences of disclosure of personal information, they are more likely to be affected by:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question121-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question121\" id=\"question121_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question121_1\">\n\t\t\t\t\tThe convenience-security trade-off\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question121-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question121\" id=\"question121_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question121_2\">\n\t\t\t\t\tThe availability heuristic\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question121-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question121\" id=\"question121_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question121_3\">\n\t\t\t\t\tThe confirmation bias\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question121-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question121\" id=\"question121_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question121_4\">\n\t\t\t\t\tThe privacy paradox\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question121_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question121\" id=\"question121_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_121\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"qmn_question_list\" value=\"112Q113Q114Q115Q116Q117Q118Q119Q120Q121Q\" \/>\n\t\t\t\t\t<div class=\"qsm-auto-page-row quiz_section quiz_end empty_quiz_end qsm-d-none\" >\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div id=\"mlw_error_message_bottom\" class=\"qsm-error-message qmn_error_message_section\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"qmn_all_questions_count\" id=\"qmn_all_questions_count\" value=\"10\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"total_questions\" id=\"total_questions\" value=\"10\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"timer\" id=\"timer\" value=\"0\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"timer_ms\" id=\"timer_ms\" value=\"0\"\/>\n\t\t\t\t\t<input type=\"hidden\" class=\"qmn_quiz_id\" name=\"qmn_quiz_id\" id=\"qmn_quiz_id\" value=\"10\" \/>\n\t\t\t\t\t<input type='hidden' name='complete_quiz' value='confirmation' \/>\n\t\t\t\t\t\t\t\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t<div style=\"display: none;\" class=\"qsm-popup qsm-popup-slide\" id=\"modal-4\" aria-hidden=\"false\"><div class=\"qsm-popup__overlay\" tabindex=\"-1\" data-micromodal-close=\"\"><div class=\"qsm-popup__container qmn_quiz_container\" role=\"dialog\" aria-modal=\"true\"><div class=\"qsm-popup__content\"><img decoding=\"async\" src=\"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-content\/plugins\/quiz-master-next\/assets\/clock.png\" alt=\"clock.png\"\/><p class=\"qsm-time-up-text\"> Time's up<\/p><\/div><footer class=\"qsm-popup__footer\"><button class=\"qsm-popup-secondary-button qmn_btn\" data-micromodal-close=\"\" aria-label=\"Close this dialog window\" onclick=\"location.reload();\">Cancel<\/button><\/footer><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the earliest days of civilisation, humans lived in relatively small groups, often within the same room (or tent, or cave!) with very little privacy. Even today, in some small villages, inhabitants note that their activities and actions are known throughout the community, with such information being spread from person to person. On the other [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"single-chapter","format":"standard","meta":{"_acf_changed":false},"categories":[1],"content-type":[34],"parent-book":[40],"resource-type":[32],"class_list":["post-346","content","type-content","status-publish","format-standard","hentry","category-uncategorized","content-type-chapter","parent-book-40","resource-type-chapter"],"acf":{"linked_book":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/content\/346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/content"}],"about":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/types\/content"}],"wp:attachment":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/media?parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/categories?post=346"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/content-type?post=346"},{"taxonomy":"parent-book","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/parent-book?post=346"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/resource-type?post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}