From privacy concerns to digital literacies: negotiating trust and authenticity in AI-mediated student records systems

Authors

DOI:

https://doi.org/10.47989/ir31iConf64208

Keywords:

Privacy literacy, AI-mediated student records systems, AI trust, Digital inclusion, APCO model

Abstract

Introduction. This study examines how students negotiate privacy concerns in AI-mediated student record systems, focusing on Xuexin.com, China’s national digital archive of university student records. Using the antecedent–privacy concern–outcome (APCO) model, privacy practices are framed as forms of information literacy tied to authenticity, trust, and digital inclusion.

Method. Semi-structured interviews were conducted with fifteen students and recent graduates (aged 20–27) between May and July 2025. Interviews lasted 30–60 minutes, face-to-face or online, guided by APCO categories while allowing emergent themes.

Analysis. Directed content analysis with NVivo was applied. APCO codes were refined to include themes of algorithmic opacity, fragile trust, and resistance. Reliability was checked by re-coding 20% of transcripts.

Results. Four antecedents (breaches, literacy, risk, and trust) shaped behaviours from reluctant compliance to withdrawal. Privacy literacy emerged as unevenly distributed, with implications for authenticity and digital inclusion.

Conclusion. Privacy in digital student records systems is best understood as a fragile, uneven literacy practice. Its unequal distribution risks deepening exclusion, raising questions about authenticity, trust, and the conditions for a digitally enlightened society.

References

Bawden, D., & Robinson, L. (2020). ‘The dearest of our possessions’: applying Floridi’s information privacy concept in models of information behavior and information literacy. Journal of the Association for Information Science and Technology, 71(9), 1030–1043. https://doi.org/10.1002/asi.24367

Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an antecedents–privacy concerns–outcomes model. Journal of Information Science, 43(5), 583–600. https://doi.org/10.1177/0165551516653590

Cao, H. J., Lee, H. R., & Peng, W. (2025, April 26–May 1). Empowering adults with AI literacy: using short videos to transform understanding and harness fear for critical thinking. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (CHI ’25) (pp. 1-8). ACM. https://doi.org/10.1145/3706598.3713254

Croskey, P., Offert, F., Jacobs, J., & Thaler, K. M. (2025, June 23–26). Liberatory collections and ethical AI: reimagining AI development from Black community archives and datasets. In Proceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency (FAccT ’25) (pp. 900-913). ACM. https://doi.org/10.1145/3715275.3732058

Folk, A. L. (2019). Reframing information literacy as academic cultural capital: a critical and equity-based foundation for practice, assessment, and scholarship. College & Research Libraries, 80(5), 658–672. https://doi.org/10.5860/crl.80.5.658

Han, Y. (2025). People first, preservation later: critical community engagement to activate dialogue-based archives. Journal of Documentation, 81(3), 767–787. https://doi.org/10.1108/JD-09-2024-0210

Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687

Jaillant, L., & Caputo, A. (2022). Unlocking digital archives: cross-disciplinary perspectives on AI and born-digital data. AI & Society, 37(3), 823–835. https://doi.org/10.1007/s00146-021-01367-x

Menard, P., & Bott, G. J. (2025). Artificial intelligence misuse and concern for information privacy: new construct validation and future directions. Information Systems Journal, 35(1), 322–367. https://doi.org/10.1111/isj.12544

Mooradian, N., Franks, P. C., & Srivastav, A. (2025). The impact of artificial intelligence on data privacy: a risk management perspective. Records Management Journal, 35(2), 147–159. https://doi.org/10.1108/RMJ-06-2024-0013

Oliver, G., Chawner, B., & Liu, H. P. (2011). Implementing digital archives: issues of trust. Archival Science, 11(3–4), 311–327. https://doi.org/10.1007/s10502-011-9167-9

Seeman, J., & Susser, D. (2024). Between privacy and utility: on differential privacy in theory and practice. ACM Journal on Responsible Computing, 1(1), Article 3. https://doi.org/10.1145/3626494

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015. https://doi.org/10.2307/41409970

Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organisational practices. MIS Quarterly, 20(2), 167–196. https://doi.org/10.2307/249477

Sun, Z., Pan, G., Yang, R., Zang, G., & Zhou, J. (2024). Consumer privacy decision-making in the digital era: an integrative review and taxonomy. Aslib Journal of Information Management, Advance online publication. https://doi.org/10.1108/AJIM-12-2023-0526

Vimalkumar, M., Sharma, S. K., Singh, J. B., & Dwivedi, Y. K. (2021). ‘Okay google, what about my privacy?’: User's privacy perceptions and acceptance of voice based digital assistants. Computers in Human Behavior, 120, 106763. https://doi.org/10.1016/j.chb.2021.106763

Downloads

Published

2026-03-20

How to Cite

Lu, Y., Tang, Y., & Song, Y. (2026). From privacy concerns to digital literacies: negotiating trust and authenticity in AI-mediated student records systems. Information Research an International Electronic Journal, 31(iConf), 718–726. https://doi.org/10.47989/ir31iConf64208

Issue

Section

Conference proceedings

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.