{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:19:40Z","timestamp":1778948380113,"version":"3.51.4"},"reference-count":68,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["247725"],"award-info":[{"award-number":["247725"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["275347"],"award-info":[{"award-number":["275347"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2020,7]]},"abstract":"<jats:p>Ever since empirical studies found only a weak, if any, relationship between privacy concerns and privacy behavior, scholars have struggled to explain the so-called privacy paradox. Today, a number of theoretical arguments illuminate users\u2019 privacy rationales, including the privacy calculus, privacy literacy, and contextual differentiations. A recent approach focuses on user resignation, apathy, or fatigue. In this piece, we concentrate on privacy cynicism, an attitude of uncertainty, powerlessness, mistrust, and resignation toward data handling by online services that renders privacy protection subjectively futile. We discuss privacy cynicism in the context of data capitalism, as a coping mechanism to address the tension between digital inclusion and a desire for privacy. Moreover, we introduce a measure for privacy cynicism and investigate the phenomenon based on a large-scale survey in Germany. The analysis highlights the multidimensionality of the construct, differentiating its relationships with privacy concerns, threat experience, Internet skills, and protection behavior.<\/jats:p>","DOI":"10.1177\/1461444820912544","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T08:49:52Z","timestamp":1595407792000},"page":"1168-1187","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":138,"title":["Data capitalism and the user: An exploration of privacy cynicism in Germany"],"prefix":"10.1177","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4389-6006","authenticated-orcid":false,"given":"Christoph","family":"Lutz","sequence":"first","affiliation":[{"name":"BI Norwegian Business School, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian Pieter","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"University of Leipzig, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giulia","family":"Ranzini","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2020,7,22]]},"reference":[{"key":"bibr1-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1097\/00006842-199103000-00006"},{"key":"bibr2-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"bibr3-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/001872679604901102"},{"key":"bibr4-1461444820912544","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"bibr5-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.022"},{"key":"bibr6-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"bibr7-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/comt.12090"},{"key":"bibr8-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2002.11045715"},{"key":"bibr9-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816667135"},{"key":"bibr10-1461444820912544","doi-asserted-by":"crossref","unstructured":"boyd d (2006) Friends, Friendsters, and MySpace Top 8: writing community into being on social network site. First Monday 11(12). Available at: https:\/\/journals.uic.edu\/ojs\/index.php\/fm\/article\/view\/1418\/1336","DOI":"10.5210\/fm.v11i12.1418"},{"key":"bibr11-1461444820912544","unstructured":"boyd d (2007) Why youth \u2665 social network sites. MacArthur Foundation. Available at: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1518924"},{"key":"bibr12-1461444820912544","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i8.3086"},{"key":"bibr13-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1229001"},{"key":"bibr14-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4604_6"},{"key":"bibr15-1461444820912544","doi-asserted-by":"crossref","unstructured":"Chen T, Chen Y, Luo J (2017) A selfie is worth a thousand words: mining personal patterns behind user selfie-posting behaviours. In: Proceedings of the 26th international conference on world wide web companion, pp. 23\u201331. Geneva: International WWW Conferences Steering Committee. Available at: https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3041021.3054142","DOI":"10.1145\/3041021.3054142"},{"key":"bibr16-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"bibr17-1461444820912544","doi-asserted-by":"publisher","DOI":"10.2307\/259378"},{"key":"bibr18-1461444820912544","first-page":"763","volume":"11","author":"Dencik L","year":"2017","journal-title":"International Journal of Communication"},{"key":"bibr19-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2049"},{"key":"bibr20-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.307"},{"key":"bibr21-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"bibr22-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1428652"},{"key":"bibr23-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819833331"},{"key":"bibr24-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"bibr25-1461444820912544","volume-title":"Capitalist Realism","author":"Fisher M","year":"2009"},{"key":"bibr26-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"bibr27-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/0894439308318213"},{"key":"bibr28-1461444820912544","first-page":"3737","volume":"10","author":"Hargittai E","year":"2016","journal-title":"International Journal of Communication"},{"key":"bibr29-1461444820912544","doi-asserted-by":"crossref","unstructured":"Hoffmann CP, Lutz C, Ranzini G (2016) Privacy cynicism: a new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Resarch on Cyberspace 10(4). Available at: https:\/\/cyberpsychology.eu\/article\/view\/6280\/5888","DOI":"10.5817\/CP2016-4-7"},{"key":"bibr30-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5170-5_13"},{"key":"bibr31-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815577797"},{"key":"bibr32-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/001316447403400115"},{"key":"bibr33-1461444820912544","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.1.13"},{"key":"bibr34-1461444820912544","volume-title":"The Cynical Americans: Living and Working in an Age of Discontent and Disillusion","author":"Kanter DL","year":"1989"},{"key":"bibr35-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"bibr36-1461444820912544","doi-asserted-by":"crossref","unstructured":"Kennedy H, Moss G (2015) Known or knowing publics? Social media data mining and the question of public agency. Big Data & Society 2(2): 2053951715611145. Available at: https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/2053951715611145","DOI":"10.1177\/2053951715611145"},{"key":"bibr37-1461444820912544","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-1-2"},{"key":"bibr38-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2011.06.003"},{"key":"bibr39-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"bibr40-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"bibr41-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1016\/0047-2352(87)90075-4"},{"key":"bibr42-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.705195"},{"key":"bibr43-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2017.1293129"},{"key":"bibr44-1461444820912544","doi-asserted-by":"crossref","unstructured":"Lutz C, Strathoff P (2014) Privacy concerns and online behavior \u2013 Not so paradoxical after all? Viewing the privacy paradox through different theoretical lenses. SSRN Electronic Journal. Available at: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2425132","DOI":"10.2139\/ssrn.2425132"},{"key":"bibr45-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"bibr46-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"bibr47-1461444820912544","volume-title":"Situational Privacy and Self-Disclosure","author":"Masur P","year":"2018"},{"key":"bibr48-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1139614"},{"key":"bibr49-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/j.0956-7976.2005.01545.x"},{"key":"bibr50-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2004.tb00865.x"},{"key":"bibr51-1461444820912544","volume-title":"Digital Citizenship","author":"Mossberger K","year":"2008"},{"key":"bibr52-1461444820912544","first-page":"119","volume":"79","author":"Nissenbaum H","year":"2004","journal-title":"Washington Law Review"},{"key":"bibr53-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"bibr54-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211418338"},{"key":"bibr55-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"bibr56-1461444820912544","doi-asserted-by":"crossref","unstructured":"Pybus J, Cot\u00e9 M, Blanke T (2015) Hacking the social life of big data. Big Data & Society 2(2): 1\u201310. Available at: https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/2053951715616649","DOI":"10.1177\/2053951715616649"},{"key":"bibr57-1461444820912544","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2775"},{"key":"bibr58-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/0013164405275662"},{"key":"bibr59-1461444820912544","first-page":"3751","volume":"12","author":"Sujon Z","year":"2018","journal-title":"International Journal of Communication"},{"key":"bibr60-1461444820912544","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2820060"},{"key":"bibr61-1461444820912544","first-page":"452","volume":"11","author":"Van Deursen A","year":"2017","journal-title":"International Journal of Communication"},{"key":"bibr62-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732140"},{"key":"bibr63-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1177\/0007650317718185"},{"key":"bibr64-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00072"},{"key":"bibr65-1461444820912544","volume-title":"Privacy and Freedom","author":"Westin AF","year":"1967"},{"key":"bibr66-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"bibr67-1461444820912544","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"},{"key":"bibr68-1461444820912544","volume-title":"The Age of Surveillance Capitalism: The Fight for the Future at the New Frontier of Power","author":"Zuboff S","year":"2019"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444820912544","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444820912544","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444820912544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:49:55Z","timestamp":1777693795000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444820912544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":68,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["10.1177\/1461444820912544"],"URL":"https:\/\/doi.org\/10.1177\/1461444820912544","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}