From privacy concerns to digital literacies: negotiating trust and authenticity in AI-mediated student records systems
DOI:
https://doi.org/10.47989/ir31iConf64208Keywords:
Privacy literacy, AI-mediated student records systems, AI trust, Digital inclusion, APCO modelAbstract
Introduction. This study examines how students negotiate privacy concerns in AI-mediated student record systems, focusing on Xuexin.com, China’s national digital archive of university student records. Using the antecedent–privacy concern–outcome (APCO) model, privacy practices are framed as forms of information literacy tied to authenticity, trust, and digital inclusion.
Method. Semi-structured interviews were conducted with fifteen students and recent graduates (aged 20–27) between May and July 2025. Interviews lasted 30–60 minutes, face-to-face or online, guided by APCO categories while allowing emergent themes.
Analysis. Directed content analysis with NVivo was applied. APCO codes were refined to include themes of algorithmic opacity, fragile trust, and resistance. Reliability was checked by re-coding 20% of transcripts.
Results. Four antecedents (breaches, literacy, risk, and trust) shaped behaviours from reluctant compliance to withdrawal. Privacy literacy emerged as unevenly distributed, with implications for authenticity and digital inclusion.
Conclusion. Privacy in digital student records systems is best understood as a fragile, uneven literacy practice. Its unequal distribution risks deepening exclusion, raising questions about authenticity, trust, and the conditions for a digitally enlightened society.
References
Bawden, D., & Robinson, L. (2020). ‘The dearest of our possessions’: applying Floridi’s information privacy concept in models of information behavior and information literacy. Journal of the Association for Information Science and Technology, 71(9), 1030–1043. https://doi.org/10.1002/asi.24367
Benamati, J. H., Ozdemir, Z. D., & Smith, H. J. (2017). An empirical test of an antecedents–privacy concerns–outcomes model. Journal of Information Science, 43(5), 583–600. https://doi.org/10.1177/0165551516653590
Cao, H. J., Lee, H. R., & Peng, W. (2025, April 26–May 1). Empowering adults with AI literacy: using short videos to transform understanding and harness fear for critical thinking. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (CHI ’25) (pp. 1-8). ACM. https://doi.org/10.1145/3706598.3713254
Croskey, P., Offert, F., Jacobs, J., & Thaler, K. M. (2025, June 23–26). Liberatory collections and ethical AI: reimagining AI development from Black community archives and datasets. In Proceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency (FAccT ’25) (pp. 900-913). ACM. https://doi.org/10.1145/3715275.3732058
Folk, A. L. (2019). Reframing information literacy as academic cultural capital: a critical and equity-based foundation for practice, assessment, and scholarship. College & Research Libraries, 80(5), 658–672. https://doi.org/10.5860/crl.80.5.658
Han, Y. (2025). People first, preservation later: critical community engagement to activate dialogue-based archives. Journal of Documentation, 81(3), 767–787. https://doi.org/10.1108/JD-09-2024-0210
Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687
Jaillant, L., & Caputo, A. (2022). Unlocking digital archives: cross-disciplinary perspectives on AI and born-digital data. AI & Society, 37(3), 823–835. https://doi.org/10.1007/s00146-021-01367-x
Menard, P., & Bott, G. J. (2025). Artificial intelligence misuse and concern for information privacy: new construct validation and future directions. Information Systems Journal, 35(1), 322–367. https://doi.org/10.1111/isj.12544
Mooradian, N., Franks, P. C., & Srivastav, A. (2025). The impact of artificial intelligence on data privacy: a risk management perspective. Records Management Journal, 35(2), 147–159. https://doi.org/10.1108/RMJ-06-2024-0013
Oliver, G., Chawner, B., & Liu, H. P. (2011). Implementing digital archives: issues of trust. Archival Science, 11(3–4), 311–327. https://doi.org/10.1007/s10502-011-9167-9
Seeman, J., & Susser, D. (2024). Between privacy and utility: on differential privacy in theory and practice. ACM Journal on Responsible Computing, 1(1), Article 3. https://doi.org/10.1145/3626494
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015. https://doi.org/10.2307/41409970
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: measuring individuals’ concerns about organisational practices. MIS Quarterly, 20(2), 167–196. https://doi.org/10.2307/249477
Sun, Z., Pan, G., Yang, R., Zang, G., & Zhou, J. (2024). Consumer privacy decision-making in the digital era: an integrative review and taxonomy. Aslib Journal of Information Management, Advance online publication. https://doi.org/10.1108/AJIM-12-2023-0526
Vimalkumar, M., Sharma, S. K., Singh, J. B., & Dwivedi, Y. K. (2021). ‘Okay google, what about my privacy?’: User's privacy perceptions and acceptance of voice based digital assistants. Computers in Human Behavior, 120, 106763. https://doi.org/10.1016/j.chb.2021.106763
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Yang Lu , Yunjie Tang , Yijia Song

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
