Research Article
No access
Published Online: 13 January 2015

Couldn't or Wouldn't? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection

Publication: Cyberpsychology, Behavior, and Social Networking
Volume 18, Issue Number 1

Abstract

Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

Get full access to this article

View all available purchase options and get full access to this article.

References

1.
boyd dm, Ellison NB. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication 2007; 13:210–230.
2.
Acquisiti A, Gross R. (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In Golle P, Danezis G, eds. Proceedings of 6th Workshop on Privacy Enhancing Technologies. Cambridge, England: Robinson College, pp. 36–58.
3.
Debatin B, Lovejoy JP, Horn A-K, et al. Facebook and online privacy: attitudes, behaviors, and unintended consequence. Journal of Computer-Mediated Communication 2009; 15:83–108.
4.
Livingstone S. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy, and self-expression. New Media & Society 2008; 10:393–411.
5.
Madden M. (2012) Privacy management on social network sites. Pew Internet & American Life Project. www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites/ (accessed Dec. 10, 2013).
6.
Rainie L, Lenhart A, Smith A. (2012) The tone of life on social networking sites. Pew Internet & American Life Project. www.pewinternet.org/2012/02/09/the-tone-of-life-on-social-networking-sites/ (accessed Dec. 15, 2013).
7.
Taddicken M. The “Privacy Paradox” in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication 2013; 19:248–273.
8.
Christofides E, Muise A, Desmarais S. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychology & Behavior 2009; 12:341–345.
9.
Bultman M. (2012) Facebook IPO to make Dobbs Ferry's Mark Zuckerberg a $24 billion man. http://greenburgh.dailyvoice.com/news/facebook-ipo-make-dobbs-ferrys-mark-zuckerberg (accessed Feb. 3, 2014).
10.
Ellison NB, Vitak J, Steinfield C, et al. (2011) Negotiating privacy concerns and social capital needs in a social media environment. In Trepte S, Reinecke L, eds. Privacy online: perspectives on privacy and self-disclosure in the social web. New York: Springer, pp. 19–32.
11.
Warren S, Brandeis L. The right to privacy. Harvard Law Review 1890; 4:193–220.
12.
Fried C. Privacy. Yale Law Journal 1968; 77:475–493.
13.
Westin A. (1967) Privacy and freedom. New York: Atheneum.
14.
Dinev T, Hart P. An extended privacy calculus model for e-commerce transactions. Information Systems Research 2006; 17:61–80.
15.
Dinev T, Bellotto M, Hart P, et al. Privacy calculus model in e-commerce: a study of Italy and the United States. European Journal of Information Systems 2006; 15:389–402.
16.
Zhao S, Grasmuck S, Martin J. Identity construction on Facebook: digital empowerment in anchored relationships. Computers in Human Behavior 2008; 24:1816–1836.
17.
Goel V. Some privacy, please? Facebook, under pressure, gets the message. The New York Times, 2014. www.nytimes.com/2014/05/23/technology/facebook-offers-privacy-checkup-to-all-1-28-billion-users.html?_r=0 (accessed Aug. 25, 2014).
18.
Jiang ZJ, Heng CS, Choi BCF. Privacy concerns and privacy-protective behaviors in synchronous online social interactions. Information Systems Research 2013; 24:579–595.
19.
Ajzen I. The theory of planned behavior. Organizational Behavior & Human Decision Processes 1991; 50:179–211.
20.
Baek YM, Kim E-m, Bae Y. My privacy is okay, but theirs is endangered: why comparative optimism matters in online privacy concerns. Computers in Human Behavior 2014; 31:48–56.
21.
Yang S, Wang Y, Wang K-l. The influence of information sensitivity compensation on privacy concern and behavioral intention. The Database for Advances in Information Systems 2009; 2009:1.
22.
Baek YM. Solving the privacy paradox: a counter-argument experimental approach. Computers in Human Behavior 2014; 38:33–42.
23.
Jang SM. Challenges to selective exposure: selective seeking and avoidance in a multitasking media environment. Mass Communication & Society 2014; 17:665–688.
24.
Krasnova H, Veltri NF, Günther O. Self-disclosure and privacy calculus on social networking sites: the role of culture. Business & Information Systems Engineering 2012; 4:127–135.
25.
Culnan MJ, Bies RJ. Consumer privacy: balancing economic and justice considerations. Journal of Social Issues. 2003; 59:323–342.
26.
Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society 2008; 28:20–36.
27.
Krasnova H, Veltri NF. (2010) Privacy calculus on social networking sites: explorative evidence from Germany and USA. Proceedings of the 43rd Hawaii International Conference on System Sciences, Koloa, HI.
28.
Youn S, Hall K. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors. CyberPsychology & Behavior 2008; 11:763–765.
29.
Moscardelli DM, Divine R. Adolescents' concern for privacy when using the Internet: an empirical analysis of predictors and relationships with privacy-protecting behaviors. Family & Consumer Sciences Research Journal 2007; 35:232–252.
30.
Sheehan KB, Hoy MG. Flaming, complaining, abstaining: how online users respond to privacy concerns. Journal of Advertising 1999; 28:37–51.
31.
Milne GR, Culnan MJ. Strategies for reducing online privacy risks: why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing 2004; 18:15–29.
32.
Youn S. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs 2009; 43:389–418.
33.
Feng Y, Xie W. Teen's concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior 2014; 33:153–162.
34.
Aldhafferi N, Watson C, Sajeev ASM. Personal information privacy setting of online social networks and their suitability for mobile Internet devices. International Journal of Security, Privacy & Trust Management 2013; 2:1–17.
35.
Dwyer C, Hiltz SR. (2007) Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. Proceedings of the Thirteenth Americas Conference on Information Systems. Keystone, CO.
36.
LaRose R, Rifon NJ. Promoting i-Safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs 2007; 41:127–149.
37.
Rifon NJ, LaRose R, Choi SM. Your privacy is sealed: effects of web privacy seals on trust and personal disclosure. Journal of Consumer Affairs 2005; 39:339–362.
38.
Bandura A. (1997) Self-efficacy: the exercise of control. New York: Freeman.
39.
Lwin MO, Williams JD. A model integrating the multidimensional developmental theory of privacy and theory of planned behavior to examine fabrication of information online. Marketing Letters 2004; 14:257–272.
40.
Miyazaki AD, Fernandez A. Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs 2001; 35:27–44.
41.
boyd dm, Hargittai E. Facebook privacy settings: who cares? First Monday 2010; 15.
42.
Lewis K, Kaufman J, Christakis N. The taste for privacy: an analysis of college student privacy setting in an online social network. Journal of Computer-Mediated Communication 2008; 14:79–100.
43.
Chen H-T, Kim Y. Problematic use of social network sites: the interactive relationship between gratifications sought and privacy concerns. Cyberpsychology, Behavior, & Social Networking 2013; 16:806–812.
44.
Steinfield C, Ellison NB, Lampe C. Social capital, self-esteem, and use of online social network sites: a longitudinal analysis. Journal of Applied Developmental Psychology 2008; 29:434–445.
45.
Ellison. NB, Steinfield C, Lampe C. The benefits of Facebook “friends”: social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication 2007; 12.
46.
Kim Y, Sohn D, Choi SM. Cultural difference in motivations for using social network sites: a comparative study of American and Korean college students. Computers in Human Behavior 2011; 27:365–372.
47.
Lenhart A, Madden M. (2007) Social networking websites and teens: an overview. Pew Internet & American Life Project. www.pewinternet.org/files/old-media//Files/Reports/2007/PIP_SNS_Data_Memo_Jan_2007.pdf.pdf (accessed Nov. 20, 2013).
48.
Fogel J, Nehmad E. Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior 2009; 25:153–160.
49.
Joinson AN, Paine C, Buchanan T, et al. Measuring self-disclosure online: blurring and non-response to sensitive items in web-based surveys. Computers in Human Behavior 2008; 24:2158–2171.
50.
Borneo N, Barkhuus L. (2011) Privacy management in a connected world: students' perception of Facebook privacy setting. ACM conference on Computer Supported Cooperative Work (CSCW ’11), Hangzhou, China.

Information & Authors

Information

Published In

cover image Cyberpsychology, Behavior, and Social Networking
Cyberpsychology, Behavior, and Social Networking
Volume 18Issue Number 1January 2015
Pages: 13 - 19
PubMed: 25584726

History

Published online: 13 January 2015
Published in print: January 2015

Permissions

Request permissions for this article.

Authors

Affiliations

Hsuan-Ting Chen
School of Journalism and Communication, The Chinese University of Hong Kong, Shatin, Hong Kong.
Wenhong Chen
Department of Radio-TV-Film, The University of Texas at Austin, Austin, Texas.

Notes

Address correspondence to:Dr. Hsuan-Ting ChenSchool of Journalism and CommunicationThe Chinese University of Hong KongShatinHong Kong
E-mail: [email protected]

Author Disclosure Statement

No competing financial interests exist.

Metrics & Citations

Metrics

Citations

Export citation

Select the format you want to export the citations of this publication.

View Options

Get Access

Access content

To read the fulltext, please use one of the options below to sign in or purchase access.

Society Access

If you are a member of a society that has access to this content please log in via your society website and then return to this publication.

Restore your content access

Enter your email address to restore your content access:

Note: This functionality works only for purchases done as a guest. If you already have an account, log in to access the content to which you are entitled.

View options

PDF/EPUB

View PDF/ePub

Full Text

View Full Text

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share on social media

Back to Top