Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox
Abstract
:1. Introduction
2. Theoretical Background and Research Model
2.1. Privacy Calculus Model and Privacy Paradox
2.2. Research Model and Hypotheses
2.2.1. Users’ Intention to Disclose Personal Information
2.2.2. Perceived Benefits
2.2.3. Trust in an SNS Provider
2.2.4. Perceived Control over Personal Information
2.2.5. Privacy Concerns
2.2.6. Subjective Norms
3. Research Methodology
3.1. Instrument Development
3.2. Subjects and Data Collection
4. Research Results
4.1. Measurement Model
4.2. Structural Model and Hypothesis Testing
5. Discussion and Implications
5.1. Theoretical and Practical Implications
5.2. Limitations and Future Research Directions
Author Contributions
Funding
Conflicts of Interest
References
- Boyd, D.M.; Ellison, N.B. Social network sites: Definition, history, and scholarship. J. Comput. Mediat. Commun. 2007, 13, 210–230. [Google Scholar] [CrossRef] [Green Version]
- Min, J.; Kim, B. How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost. J. Assoc. Inf. Sci. Technol. 2015, 66, 839–857. [Google Scholar] [CrossRef]
- Number of Monthly Active Facebook Users Worldwide as of 1st Quarter 2020. Available online: https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/ (accessed on 24 June 2020).
- Sun, Y.; Fang, S.; Hwang, Y. Investigating privacy and information disclosure behavior in social electronic commerce. Sustainability 2019, 11, 3311. [Google Scholar] [CrossRef] [Green Version]
- Hajli, N.; Lin, X. Exploring the security of information sharing on social networking sites: The role of perceived control of information. J. Bus. Ethics 2016, 133, 111–123. [Google Scholar] [CrossRef]
- Gross, R.; Acquisti, A. Information revelation and privacy in online social networks (the Facebook case). In Proceedings of the Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, 7 November 2005; pp. 71–79. [Google Scholar]
- Acquisti, A.; Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Proceedings of 6th Workshop on Privacy Enhancing Technologies; Golle, P., Danezis, G., Eds.; Robinson College: Cambridge, UK, 2006; pp. 36–58. [Google Scholar]
- Mohamed, N.; Ahmad, I.H. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Comput. Hum. Behav. 2012, 28, 2366–2375. [Google Scholar] [CrossRef]
- Trump-Linked Firm Cambridge Analytica Collected Personal Information from 50 Million Facebook Users without Permission. Available online: https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3 (accessed on 24 June 2020).
- Barth, S.; de Jong, M.D.T. The privacy paradox—Investigating discrepancies between expressed privacy concerns and actual online behavior—A systematic literature review. Telem. Inform. 2017, 1038–1058. [Google Scholar] [CrossRef]
- Joinson, A.N.; Reips, U.D.; Buchanan, T.; Paine Schofield, C.B. Privacy, trust, and self-disclosure online. Hum. Comput. Interact. 2010, 25, 1–24. [Google Scholar] [CrossRef]
- Norberg, P.A.; Horne, D.R.; Horne, D.A. The privacy paradox: Personal information disclosure intentions versus behaviors. J. Consum. Aff. 2007, 41, 100–126. [Google Scholar] [CrossRef]
- Dienlin, T.; Metzger, M.J. An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. sample. J. Comput. Mediat. Commun. 2016, 21, 368–383. [Google Scholar] [CrossRef] [Green Version]
- Min, J.; Kim, B. A study on continued intention of social network services by applying privacy calculus model: Facebook and KakaoTalk cases. Inf. Syst. Rev. 2013, 15, 105–122. [Google Scholar]
- Dinev, T.; Hart, P. An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 2006, 17, 61–80. [Google Scholar] [CrossRef]
- Dinev, T.; Xu, H.; Smith, J.H.; Hart, P. Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. Eur. J. Inf. Syst. 2013, 22, 295–316. [Google Scholar] [CrossRef]
- Xu, H.; Teo, H.H.; Tan, B.C.Y.; Agarwal, R. The role of push-pull technology in privacy calculus: The case of location-based services. J. Manag. Inf. Syst. 2010, 26, 135–173. [Google Scholar] [CrossRef]
- Kim, B.; Min, J. The distinct roles of dedication-based and constraint-based mechanisms in social networking sites. Internet Res. 2015, 25, 30–51. [Google Scholar] [CrossRef]
- Mosteller, J.; Poddar, A. To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers’ social media engagement and online privacy protection behaviors. J. Interact. Mark. 2017, 39, 27–38. [Google Scholar] [CrossRef]
- Kokolakis, S. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Comput. Secur. 2017, 64, 122–134. [Google Scholar] [CrossRef]
- Leem, J.M.; Rha, J.Y. Personalization–privacy paradox and consumer conflict with the use of location-based mobile commerce. Comput. Hum. Behav. 2016, 63, 453–462. [Google Scholar]
- Benson, V.; Saridakis, G.; Tennakoon, H. Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Inf. Technol. People 2015, 28, 426–441. [Google Scholar] [CrossRef] [Green Version]
- Phelps, J.; Nowak, G.; Ferrell, E. Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 2000, 19, 27–41. [Google Scholar] [CrossRef]
- Zhoi, T.; Li, H. Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Comput. Hum. Behav. 2014, 37, 283–289. [Google Scholar] [CrossRef]
- Cheung, C.M.; Chiu, P.Y.; Lee, M.K. Online social networks: Why do students use Facebook? Comput. Hum. Behav. 2011, 27, 1337–1343. [Google Scholar] [CrossRef]
- Li, F. Chinese tourists’ barriers to sharing travel photos in WeChat. Sustainability 2020, 12, 887. [Google Scholar] [CrossRef] [Green Version]
- Homans, C.G. Social Behavior: Its Elementary Forms; Harcourt, Brace & World: New York, NY, USA, 1961. [Google Scholar]
- Laufer, R.S.; Wolfe, M. Privacy as a concept and a social issue: A multidimensional developmental theory. J. Soc. Issues 1977, 33, 22–42. [Google Scholar] [CrossRef]
- Xu, H.; Gupta, S. The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electron. Mark. 2009, 19, 137–149. [Google Scholar] [CrossRef]
- Westin, A.F. Social and political dimensions of privacy. J. Soc. Issues 2003, 59, 431–453. [Google Scholar] [CrossRef]
- Kim, B. A study of antecedents of continuance intention in mobile social network service: The role of trust and privacy concerns. Knowl. Manag. Res. 2012, 13, 83–100. [Google Scholar]
- Frampton, B.D.; Child, J.T. Friend or not to friend: Coworker Facebook friend requests as an application of communication privacy management theory. Comput. Hum. Behav. 2013, 29, 2257–2264. [Google Scholar] [CrossRef]
- Wu, P.F. The privacy paradox in the context of online social networking: A self-identity perspective. J. Assoc. Inf. Sci. Technol. 2019, 70, 207–217. [Google Scholar] [CrossRef]
- Kroll, T.; Stieglitz, S. Digital nudging and privacy: Improving decisions about self-disclosure in social networks. Behav. Inf. Technol. 2019. [Google Scholar] [CrossRef]
- Americans’ Complicated Feelings about Social Media in an Era of Privacy Concerns. Available online: https://www.pewresearch.org/fact-tank/2018/03/27/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns/ (accessed on 24 June 2020).
- Kobsa, A.; Patil, S.; Meyer, B. Privacy in instant messaging: An impression management model. Behav. Inf. Technol. 2012, 21, 355–370. [Google Scholar] [CrossRef]
- Teubner, T.; Flath, C.M. Privacy in the sharing economy. J. Assoc. Inf. Syst. 2019, 20, 213–242. [Google Scholar] [CrossRef]
- Fishbein, M.; Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research; Addison-Wesley: Boston, MA, USA, 1975. [Google Scholar]
- Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [Google Scholar] [CrossRef]
- Kim, B. Understanding the role of conscious and automatic mechanisms in social networking services: A longitudinal study. Int. J. Hum. Comput. Interact. 2018, 34, 805–818. [Google Scholar] [CrossRef]
- Katz, E.; Blumler, J.G.; Gurevitch, M. Uses and gratifications research. Public Opin. Q. 1973, 37, 509–523. [Google Scholar] [CrossRef]
- Hossain, N.A.; Kim, M.; Jahan, N. Can “Liking” behavior lead to usage intention on Facebook? Uses and gratification theory perspective. Sustainability 2019, 11, 1166. [Google Scholar] [CrossRef] [Green Version]
- Malik, A.; Dhir, A.; Nieminen, M. Uses and gratifications of digital photo sharing on Facebook. Telem. Inform. 2016, 33, 129–138. [Google Scholar] [CrossRef] [Green Version]
- Stafford, T.F.; Stafford, M.R.; Schkade, L.L. Determining uses and gratifications for the Internet. Decis. Sci. 2004, 35, 259–288. [Google Scholar] [CrossRef]
- Hew, K.F. Students’ and teachers’ use of Facebook. Comput. Hum. Behav. 2011, 27, 662–676. [Google Scholar] [CrossRef]
- Ku, Y.C.; Chu, T.H.; Tseng, C.H. Gratifications for using CMC technologies: A comparison among SNS, IM, and e-mail. Comput. Hum. Behav. 2013, 29, 226–234. [Google Scholar] [CrossRef]
- Huang, L.Y.; Hsiehm, Y.J.; Wu, Y.C.J. Gratifications and social network service usage: The mediating role of online experience. Inf. Manag. 2014, 51, 774–782. [Google Scholar] [CrossRef]
- James, T.L.; Warkentin, M.; Collignon, S.E. A dual privacy decision model for online social networks. Inf. Manag. 2015, 52, 893–908. [Google Scholar] [CrossRef]
- Ifinedo, P. Applying uses and gratifications theory and social influence processes to understand students’ pervasive adoption of social networking sites: Perspectives from the Americas. Int. J. Inf. Manag. 2016, 36, 192–206. [Google Scholar] [CrossRef]
- Dwyer, C.; Hiltz, S.; Passerini, K. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, CO, USA, 9–12 August 2007; pp. 725–1735. [Google Scholar]
- Chang, S.E.; Liu, A.Y.; Shen, W.C. User trust in social networking services: A comparison of Facebook and LinkedIn. Comput. Hum. Behav. 2017, 69, 207–217. [Google Scholar] [CrossRef]
- Rau, P.L.; Gao, Q.; Ding, Y. Relationship between the level of intimacy and lurking in online social network services. Comput. Hum. Behav. 2008, 24, 2757–2770. [Google Scholar] [CrossRef]
- Wang, T.; Duong, T.D.; Chen, C.C. Intention to disclose personal information via mobile applications: A privacy calculus perspective. Int. J. Inf. Manag. 2016, 36, 531–542. [Google Scholar] [CrossRef]
- Shin, D.H. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interact. Comput. 2010, 22, 428–438. [Google Scholar] [CrossRef]
- Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf. Syst. Res. 2004, 15, 311–416. [Google Scholar] [CrossRef]
- Chadwick, S.A. Communicating Trust in E-Commerce Interactions. Manag. Commun. Q. 2001, 14, 653–658. [Google Scholar] [CrossRef] [Green Version]
- Venkatesh, V.; Brown, S.A. A longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MIS Q. 2001, 25, 71–102. [Google Scholar] [CrossRef] [Green Version]
- Kim, S.S.; Malhotra, N.K.; Narasimhan, S. Two competing perspectives on automatic use: A theoretical and empirical comparison. Inf. Syst. Res. 2005, 16, 418–432. [Google Scholar] [CrossRef]
- Chin, W.W. The partial least squares approach to structural equation modeling. In Modern Methods for Business Research; Marcoulides, G.A., Ed.; Lawrence Erlbaum: Mahway, NJ, USA, 1998; pp. 295–336. [Google Scholar]
- Hair, F.; Sarstedt, M.S.; Ringle, C.M.; Mena, J.A. An assessment of the use of partial least squares structural equation modeling in marketing research. J. Acad. Mark. Sci. 2012, 40, 414–433. [Google Scholar] [CrossRef]
- Hair, J.; Anderson, R.; Tatham, R.B. Multivariate Data Analysis; Prentice Hall: Upper Saddle River, NJ, USA, 1998. [Google Scholar]
- Fornell, C.; Larcker, D.F. Evaluating structural evaluation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Heirman, W.; Walrave, M.; Ponnet, K. Predicting adolescents’ disclosure of personal information in exchange for commercial incentives: An application of an extended theory of planned behavior. Cyberpsychol. Behav. Soc. Netw. 2013, 16, 81–87. [Google Scholar] [CrossRef] [PubMed]
- Ji, Y.G.; Hwangbo, H.; Yi, J.S.; Rau, P.L.P.; Fang, X.; Ling, C. The Influence of Cultural Differences on the Use of Social Network Services and the Formation of Social Capital. Int. J. Hum. Comput. Interact. 2010, 26, 1100–1121. [Google Scholar] [CrossRef]
- Makri, K.; Schlegelmilch, B.B. Time orientation and engagement with social networking sites: A cross-cultural study in Austria, China and Uruguay. J. Bus. Res. 2017, 80, 155–163. [Google Scholar] [CrossRef]
Demographics | Item | Subjects (N = 350) | |
---|---|---|---|
Frequency | Percentage | ||
Gender | Male | 190 | 54.3 |
Female | 160 | 45.7 | |
Age | Less than 30 | 118 | 33.7 |
31~40 | 112 | 32.0 | |
More than 40 | 120 | 34.3 | |
Main Usage Device | PC | 144 | 41.1 |
Notebook | 23 | 6.6 | |
Smart Phone | 171 | 48.9 | |
Smart Pad | 12 | 3.4 |
Construct | Item | Mean | St. Dev. | Factor Loading | CR | AVE | |
---|---|---|---|---|---|---|---|
Disclosing Behaviors | DEB1 | 2.709 | 1.787 | 0.917 | 0.914 | 0.78 | |
DEB2 | 4.731 | 1.520 | 0.799 | ||||
DEB3 | 2.900 | 1.800 | 0.929 | ||||
Intention to Disclose Personal Information | IDPI1 | 3.949 | 1.496 | 0.931 | 0.953 | 0.836 | |
IDPI2 | 3.983 | 1.529 | 0.946 | ||||
IDPI3 | 3.974 | 1.537 | 0.927 | ||||
IDPI4 | 3.603 | 1.637 | 0.851 | ||||
Perceived Benefits | Network Management | NET1 | 4.686 | 1.42 | 0.906 | 0.937 | 0.831 |
NET2 | 4.951 | 1.333 | 0.923 | ||||
NET3 | 4.814 | 1.297 | 0.906 | ||||
Enjoyment | ENJ1 | 4.829 | 1.166 | 0.912 | 0.953 | 0.836 | |
ENJ2 | 4.840 | 1.201 | 0.920 | ||||
ENJ3 | 4.889 | 1.224 | 0.906 | ||||
ENJ4 | 4.843 | 1.233 | 0.919 | ||||
Self-Expression | SEL1 | 4.594 | 1.254 | 0.906 | 0.950 | 0.827 | |
SEL2 | 4.531 | 1.286 | 0.897 | ||||
SEL3 | 4.689 | 1.286 | 0.930 | ||||
SEL4 | 4.709 | 1.242 | 0.903 | ||||
Trust in an SNS Provider | TSP1 | 4.217 | 1.202 | 0.873 | 0.938 | 0.752 | |
TSP2 | 4.417 | 1.277 | 0.882 | ||||
TSP3 | 4.223 | 1.361 | 0.864 | ||||
TSP4 | 4.32 | 1.181 | 0.877 | ||||
TSP5 | 4.123 | 1.242 | 0.84 | ||||
Privacy Concerns | PCO1 | 5.386 | 1.068 | 0.863 | 0.936 | 0.786 | |
PCO2 | 5.449 | 1.109 | 0.879 | ||||
PCO3 | 5.451 | 1.125 | 0.909 | ||||
PCO4 | 5.389 | 1.14 | 0.895 | ||||
Perceived Control over Personal Information | PCPI1 | 4.251 | 1.314 | 0.899 | 0.954 | 0.838 | |
PCPI2 | 4.206 | 1.364 | 0.920 | ||||
PCPI3 | 4.069 | 1.380 | 0.921 | ||||
PCPI4 | 4.020 | 1.399 | 0.920 | ||||
Subjective Norms | SUI1 | 4.660 | 1.22 | 0.861 | 0.930 | 0.816 | |
SUI2 | 4.594 | 1.312 | 0.923 | ||||
SUI3 | 4.600 | 1.331 | 0.925 |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | |
---|---|---|---|---|---|---|---|---|---|
1. Disclosing Behaviors | 0.883 | ||||||||
2. Intention to Disclose Personal Information | 0.356 | 0.915 | |||||||
3. Network Management | 0.321 | 0.356 | 0.912 | ||||||
4. Enjoyment | 0.428 | 0.471 | 0.597 | 0.914 | |||||
5. Self-Expression | 0.402 | 0.507 | 0.623 | 0.788 | 0.909 | ||||
6. Trust in an SNS Provider | 0.364 | 0.613 | 0.428 | 0.526 | 0.595 | 0.867 | |||
7. Privacy Concerns | 0.091 | −0.185 | 0.155 | 0.21 | 0.172 | −0.020 | 0.887 | ||
8. Perceived Control over Personal Information | 0.400 | 0.609 | 0.451 | 0.516 | 0.532 | 0.690 | −0.130 | 0.915 | |
9. Subjective Norms | 0.406 | 0.525 | 0.637 | 0.69 | 0.756 | 0.597 | 0.162 | 0.537 | 0.903 |
Cause | Effect | Coeffi. | t-Value | Significant | |
---|---|---|---|---|---|
H1 | Users’ Intention to Disclose Personal Information | Users’ Disclosing Behaviors | 0.115 | 1.647 | Marginally Significant |
H2a | Perceived Benefits | Users’ Intention to Disclose Personal Information | 0.128 | 1.679 | Marginally Significant |
H2b | Perceived Benefits | Users’ Disclosing Behaviors | 0.196 | 2.557 | Significant |
H3a | Trust in an SNS Provider | Users’ Intention to Disclose Personal Information | 0.273 | 4.686 | Significant |
H3b | Trust in an SNS Provider | Users’ Disclosing Behaviors | 0.006 | 0.073 | Not significant |
H4a | Perceived Control over Personal Information | Users’ Intention to Disclose Personal Information | 0.229 | 3.709 | Significant |
H4b | Perceived Control over Personal Information | Users’ Disclosing Behaviors | 0.186 | 2.551 | Significant |
H5a | Perceived Control over Personal Information | Trust in an SNS Provider | 0.690 | 17.694 | Significant |
H5b | Perceived Control over Personal Information | Privacy Concerns | −0.130 | 2.089 | Significant |
H5c | Privacy Concerns | Users’ Intention to Disclose Personal Information | −0.203 | 5.556 | Significant |
H5d | Privacy Concerns | Users’ Disclosing Behaviors | 0.085 | 1.403 | Not significant |
H6a | Subjective Norms | Users’ Intention to Disclose Personal Information | 0.171 | 2.170 | Significant |
H6b | Subjective Norms | Users’ Disclosing Behaviors | 0.075 | 0.916 | Not significant |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, B.; Kim, D. Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox. Sustainability 2020, 12, 5163. https://doi.org/10.3390/su12125163
Kim B, Kim D. Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox. Sustainability. 2020; 12(12):5163. https://doi.org/10.3390/su12125163
Chicago/Turabian StyleKim, Byoungsoo, and Daekil Kim. 2020. "Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox" Sustainability 12, no. 12: 5163. https://doi.org/10.3390/su12125163
APA StyleKim, B., & Kim, D. (2020). Understanding the Key Antecedents of Users’ Disclosing Behaviors on Social Networking Sites: The Privacy Paradox. Sustainability, 12(12), 5163. https://doi.org/10.3390/su12125163