An Empirical Study of Platform Enterprises’ Privacy Protection Behaviors Based on fsQCA
Table 5
Robust configurations for high privacy protection and nonhigh privacy protection.
Changing thresholds
High privacy protection
Nonhigh privacy protection
1/0.9/0.75
2/0.8/0.75
1/1/0.75
2/0.8/0.75
Configuration
RH1
RH2
RH3
RNH1
RNH2
RNH3
Technology capital
●
●
⊗
⊗
⊗
⊗
Business model
⊗
⊗
⊗
⊗
⊗
⊗
Market concentration
⊗
●
●
●
●
●
Market share
⊗
⊗
●
●
⊗
Local policy
●
●
●
⊗
●
Industry standards
⊗
●
⊗
●
●
●
Difference with the baseline model
Consistent with H2
Subset of H1
Consistent with H3, only different under core conditions
Subset of NH1
Subset of NH1
Subset of NH1
Note. ● and ● indicate that the condition is present, ⊗ and ⊗ indicate that the condition is absent, ● and ⊗ indicate a core condition, and ● and ⊗ indicate a marginal condition. A blank cell indicates that the condition may or may not be present.