Next Article in Journal
Design and Analysis of Joint Source-Channel Code System with Fixed-Length Code
Previous Article in Journal
Efficient Edge-AI Application Deployment for FPGAs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process

1
School of Economics and Management, Wenzhou University of Technology, Wenzhou 150080, China
2
Department of Information Systems, City University of Hong Kong, Hong Kong 999077, China
*
Author to whom correspondence should be addressed.
Information 2022, 13(6), 280; https://doi.org/10.3390/info13060280
Submission received: 28 April 2022 / Revised: 18 May 2022 / Accepted: 24 May 2022 / Published: 31 May 2022
(This article belongs to the Section Information Security and Privacy)

Abstract

:
In the era of global social media, Internet users’ privacy rights have been weakened, and the insight and alertness of individuals for privacy disclosure are decreasing. The security and flexibility of the system are usually the two ends of the measurement standard. While more and more users pursue the intelligence and convenience of using social media applications, letting big data technology and AI algorithms learn and use our privacy data cannot be avoided. On the basis of literature review, this paper summarized four categories of social media user behavior, which were divided into privacy concern behavior, privacy protection behavior, active disclosure behavior, and passive participation behavior. Using analytic hierarchy process, this paper explored their relationship with five different types of privacy: defensive privacy, identity authentication privacy, interactive privacy, psychological privacy, and integration information privacy. We finally formulated the most common twelve kinds of sub-internet user behavior on the degree of personal privacy disclosure, and provide users countermeasures to prevent privacy disclosure according to the different influence weights.

1. Introduction

With the rapid advancement of technologies, more and more social media networking sites are created and launched such as Facebook, Twitter, Instagram, Weibo, WeChat, etc. They help users stay connected with others, avoid data silos, and provide users the convenience to share their lives and discover their surroundings. It is undeniable that social media networking brings people comfort but also causes lots of privacy issues. Users are aware of the online privacy risks, but still tend to share private information to exchange preferential or personalized services. It shows that people’s concern for privacy shows contradictory psychology. The boundary between public space and private space used to distinguish privacy is becoming more and more blurred; we should try our best to balance these two ends, minimizing the risk of privacy disclosure caused by our behavior of transferring privacy for better service, and taking measures to protect important privacy as much as possible [1].
The current research focuses more on people’s risk perception and privacy concerns in social media behavior, as well as the preventive measures against privacy disclosure caused by different behaviors. However, there is a lack of classification of social media privacy. Different levels of privacy are of different importance to a person and different behaviors will lead to different categories of privacy disclosure. Therefore, the type of privacy disclosure caused by various behaviors of users on social networks and the degree of privacy disclosure (or protection) need to be quantified.
This study identified four super social network behaviors with twelve sub-behaviors and five types of privacy based on our literature reviews. Our paper studied the impact of social media behavior on privacy information security and then gives out the privacy prevention level to the users. Finally, protection suggestions are given by professionals.

2. Research Framework

2.1. Literature Review

2.1.1. Types of User’s Behavior

Firstly, we need to be clear about the type of user behavior on social networking.
Some articles analyze and summarize user behavior based on other theoretical research. Ryan and Xenos analyzed social network behavior factors based on five personality traits [2]. They divided Facebook-related behaviors into active social contributions, passive participation, news and information disclosure, and real-time social interaction. At the same time, some scholars believe that user behavior can be researched based on privacy. For example, in combination with mobile social networks’ characteristics and based on the research results of the existing index system of privacy disclosure, Wang Xueting and Sun Xiaoya established the index system of privacy disclosure prevention ability through the Expert Investigation Method. They classified user behaviors related to network privacy, privacy concerns, self-disclosure, and privacy protection behaviors. Privacy concerns are expressed fearing that personal information will be leaked when using social platforms. The vast majority of mobile social platform carriers are mobile applications (APP). The following three sub-indicators will be used to measure the privacy concern level of social users: APP background collects user information, APP obtains application rights, and malicious theft. Self-disclosure means social activities are essentially a kind of information transmission behavior. However, the emergence of the internet makes social activities shift to online interaction become traceable. Self-disclosure of social users has become one of the main ways of privacy disclosure including the frequency of sharing your life, the number of times the real information is entered, the degree of self-disclosure to ordinary friends, and self-disclosure to close friends. Privacy protection behavior, because of the concern about privacy, can only reflect netizens’ privacy awareness. The final factor related to privacy disclosure is what kind of privacy protection behavior is taken. Behavior can be divided into privacy settings for social applications, traces of social networks, and password management for social networks [3].

2.1.2. Types of Privacy

Several articles have talked about privacy and their different categories. Different articles explain privacy in their ways and divide them into different types.
According to Christian Fuchs [4], privacy is not only about information and communication. He concluded that information and communication is not the only dimension of privacy. Based on his theory, Tavani introduced four types of privacy [5], informational privacy, physical/accessibility privacy, decisional privacy, and psychological/mental privacy. Besides, Christopher Allen advocated another four types of privacy, i.e., defensive privacy, human rights privacy, personal privacy, and contextual privacy. Although not all types are related in social networks, some types can be employed in our concern.
In 2017, Koopsbj et al. did not clearly define privacy’s connotation but adopted the typological description method. In a typology of privacy, privacy is divided into eight types: body privacy, spatial privacy, communicative privacy, proprietary privacy, intellectual privacy, decision privacy, associative privacy, and behavior privacy.
Information privacy cannot be regarded as an independent privacy type. Floridi divided privacy into four types: “physical privacy, mental privacy, decisional privacy, and information privacy”. Information privacy has independent existence significance. Privacy is freedom from information interference or infringement. With the wide application of networks, social network users are keen on revealing their home address, tourism location, income, and other personal privacy. Traditional privacy, such as spatial privacy and physical privacy, has no longer become the content of privacy.
Gu Liping define that integrated privacy is mainly the data privacy with the arrival of digital era. [6] With the development of biometric information technology, such as fingerprint, face brush, gene technology, etc., intelligent machines can even penetrate the most secret private space by analyzing human facial muscle changes and eye movements, including personal whereabouts, social networks, values, political trends, etc., which are difficult to present biological characteristics, and it is easy to dig them out.

2.1.3. Facebook Case Study

According to statistics from Statista (2019) [7], the number of Facebook daily active users was 1.49 billion in 2018, and the total global number of Facebook users was approximately 1.69 billion in 2020 [8]. The active Facebook users regularly post sensitive data, which can be used to track their activities. However, most users do not know that their posts and updates are in the public domain and can be easily accessed by others. Facebook has a privacy policy statement but it is long and written in jargon which is not easy for users to read and understand [9].
Moreover, there is a risk for third party access control. Facebook cooperates with third parties such that there are lots of third parties’ apps on Facebook. The apps can collect users’ data and have publishing practices. When there is a conflict between the user’s privacy settings and the application’s data collection and publishing practices, privacy violation may occur easily. It was found that Facebook’s powerful application programming interface (API) enables application developers to collect and publish user data [10].
A study pointed out that the reasons for privacy violations include poor human–computer interaction mechanisms, the static nature of privacy settings, and much work that forces users to maintain their content privacy [11]. Due to our resources constraints, our study is only focused on Facebook users’ different behavior and privacy violations.

2.2. Theoretical Underpinnings

Theory 1.
Social Network Behavior Factors Based on Five Personality Traits.
Ryan et al. analyzed social network behavior factors based on five personality traits. They divided Facebook-related behaviors into active social contributions, passive participation, news and information disclosure, and real-time social interaction.
Theory 2.
Privacy Disclosure Prevention Ability Index System.
Wang et al. established the index system of privacy disclosure prevention ability through the Expert Investigation Method. They classified the user behaviors related to network privacy concern, privacy protection, self-disclosure, and privacy protection behaviors.
Theory 3.
Multi-dimensional Privacy in Online Social Networks Framework.
Based on the four-dimensional framework proposed by Burgoon et al. [12], Zhang Nan et al. expanded the concept of four-dimensional privacy for social network activities. The four dimensions include the integrity of virtual territory, control of personal factual information, freedom of interaction, and psychological independence. These four types of privacy are the main components of personal privacy in the internet social age [13].
Theory 4.
Integrated Privacy Theory.
Integrated privacy is mainly data privacy with the arrival of digital era. Floridi insisted that data information privacy has independent existence significance. On this basis, Gu Liping also proposed a similar concept. Integrated privacy has two premises: The first premise is that people’s words and deeds are digitized to form big data; the second is that big data formed by digitization can be mined with big data technology and become regular information.

2.3. Research Model

This above Figure 1 depicts the model based on the analytic hierarchy process. It is divided into four layers. According to the literature review and theoretical underpinnings, we hope to quantify the complex privacy comprehensive score into the score formed by the sum of different privacy scores. In the privacy category layer, we adopt and improve the combination of “Multi-dimensional Privacy in Online Social Networks Framework” and “Integrated Privacy Theory”. These different types of privacy are affected by different social media behaviors. We divided the behaviors on social media into four categories according to “Privacy Disclosure Prevention Ability Index System” trying to find out the weight of each behavior affecting each type of privacy. After that, our research team included the 12 most common sub-behaviors into four types of behaviors, and finally wanted to know the weights of these 12 common sub-behaviors in the final privacy score, so as to acquire everyone’s privacy prevention score according to everyone’s sub-behaviors and put forward behavior suggestions for different people.
The proportion of sub-behavior layer in the corresponding behavior layer is marked as H1; the influence weight of behavior layer on privacy layer is marked as H2; finally, the proportion weight of privacy layer to final privacy score is marked as H3. H1/H2/H3 correspond to the following three hypotheses. In this way, we can quantify each small behavior’s impact on the final privacy rating score.

2.4. Hypotheses Building

There are three hypotheses in this paper:
Hypotheses 1 (H1):
The four types of Internet social behaviors are composed of many specific user sub-behaviors, and sub-behaviors have different weights.
This hypothesis is based on two theories: “Privacy disclosure prevention ability index system” and “Social network behavior factors based on five personality traits”. They proposed a variety of social media internet behaviors; based on them, the criteria level “Type of Behaviors” was set as four items:
  • H2a. Privacy Concern: H1a. Against excessive information collection; H1b. Pay attention to app request permission; H1c. Care about information security.
  • H2b. Privacy Protection: H1d. APP Privacy settings; H1e. Clean up the traces; H1f. Change Password.
  • H2c. Active disclosure: H1g. Input real information; H1h. Share your personal life; H1i. Real-time social interaction. H1j. Express personal feelings and value.
  • H2d. Passive participation: H1k. News and information disclosure; H1l. Traces of associated third party websites.
Hypotheses 2 (H2):
Five types of user privacy in the digital age will be lost due to various user behaviors. Each behavior has a different influence weight on specific types of privacy loss.
Those hypotheses are based on two theories: “Integrated privacy theory” and “Multi-dimensional Privacy in Online Social Networks framework”. They put forward a variety of privacy types in the internet era; based on them, we set the decision-making level to five types of privacy:
  • H3a. Defensive privacy—It mainly describes the following aspects of privacy: virtual territory/accessibility.
  • H3b. Identity authentication privacy—It mainly describes the following aspects of privacy: factual/personal/Bodily/Biological.
  • H3c. Interactional privacy—It mainly describes the following aspects of privacy: Communication/comment/share.
  • H3d. Psychological privacy—It mainly describes the following aspects of privacy: emotion/decision/value/knowledge.
  • H3e. Integration informational privacy—It mainly describes the following aspects of privacy: Proprietary/preference/Commercial history and traces.
Hypotheses 3 (H3):
The comprehensive privacy score of social media comprises five privacy scores, and the importance of the five kinds of privacy is not the same.
This layer’s weight needs professional knowledge to evaluate, so we adopted the data of the evaluation results of more than 20 experts summarized in the theoretical underpinnings research model “Multi-dimensional Privacy in Online Social Networks framework”, whose H3a = 0.193, H3b = 0.339, H3c = 0.121, H3d = 0.220.
We set the final score “Comprehensive privacy score” as the target level. Finally, according to the total score and losing points, this paper provides targeted preventive suggestions to different levels of users.

3. Results

3.1. Descriptive Statistical Analysis

We targeted teenagers with experience in using social networking to conduct our data collection randomly. The analysis was conducted based on social networking sites. We used the “questionnaire star” statistical software to distribute and recover the questionnaire. After eliminating 5 invalid answers, we collected 416 valid samples and summarize them in the form of Excel. Our online survey was designed with 30 questions. They are all quantitative questions.
The descriptive statistical analysis of the sample is shown in Table 1 and Table 2 below.

3.2. Analytic Hierarchy Process

3.2.1. Determine the Measurement Table

This paper used the seven-point system Likert Scale; the specific scoring rules are shown in the Table 3 below.

3.2.2. Construct Judgment Matrix

For example, the Figure 2 shows the scores given by experts and the public (the number indicates the importance of the row indicators over the column indicators). The numerical value is obtained after comparing behaviors which reflects the ratio of the importance of the impact on virtual space defensive privacy.
Then we can convert the numbers of these importance ratios into a judgment matrix as Figure 3 below.
Now we can use SPSS to do the AHP to analyze the judgment matrix and discern the weight of each coefficient. Figure 4 and Figure 5 reflect the influence weight of each behavior on the virtual space defensive privacy from the judgment matrix Figure 3 above.
To understand the relationship weights of four behaviors, five types of privacy and a comprehensive general privacy score, ten judgment matrices are needed. Here we only show the relationship between H2 and H3 layers.

3.2.3. Consistency Test

The so-called consistency refers to the logical consistency of judgment thinking. If A is more important than C and B is slightly more important than C, A must be more important than B. This is the logical consistency of judgment thinking; otherwise, there will be contradictions in judgment. Figure 6 below shows the results of the consistency test.

3.2.4. Model Analysis Result

The weight of each specific relationship between H1, H2, and H3 is shown in the Figure 7 above. Now we know which behavior has the biggest influence on comprehensive privacy level. We can also use this set of functions to evaluate each social network user’s privacy prevention level.

3.3. User Behavior Empirical Analysis

3.3.1. User Behavior Evaluation Model

In the index system of personal privacy disclosure prevention interval, the weights of each code of conduct layer’s indexes to the privacy target layer are established, and the scores collected from the questionnaire are combined to make a comprehensive evaluation. The weighted calculation of social users’ grading system for each indicator is processed into a score (out of 100).
Z i = ( i = 1 12 W i X i ) ( 100 / F )
In the above formula, Wi represents the weight of the behavior criteria interval index relative to the privacy target interval in the ‘ith’ question of the questionnaire, Xi represents the score of the ‘ith’ question, F represents the full score of the questionnaire. Z represents the final score of the user’s questionnaire (out of 100). The maximum value of each question is 7 points, and the minimum value is 1 point. After the full score of 100 is divided into 10 segments, the following privacy protection intervals are obtained, as shown in the Table 4 below.
The score of each question in each investigator’s questionnaire is multiplied by the corresponding weight value, and then the score is calculated and divided into the corresponding score interval. After that, the histogram of the score distribution of the privacy disclosure prevention status of 416 users is obtained, as shown in the following Figure 8.

3.3.2. Survey Result Analysis

According to the survey results, we divided the 416 samples into different levels based on average marks for analysis. Additionally, we found that there were significant differences among levels in some subsets.
In Figure 9, there are five defined intervals. Since all data samples only stay at 30–80 points, for convenience, we can artificially name these five intervals as A–E level from grade high to low.
The samples of level E were the lowest average marks in the result. It means that the respondents in level E lack privacy awareness compared with other levels. The lowest rating was the changing password of privacy protection. It shows that users do not change their password periodically. It may become a risk of their private information, which increases the chance of cracking the password by hackers to steal private information.
The lowest rating of level D was the news and information disclosure of passive participation. It reveals that these respondents often receive advertisements or news on social media. It is possible that there may have leakage of their personal information.
Level C contained the largest number of samples in the result. The lowest rating of level C was the care about information security of privacy concerns. It shows that the majority of people normally do not concern themselves about privacy much.
The respondents of level B were above the average in the result. They are defined as having an awareness of privacy protection. The lowest rating of level B was the pay attention to the app request permission of privacy concern. It shows that most people do not care about the permissions that app asks for from users, which has also become the sociological reason why app excessively collects information. If there is a malicious app and it is granted permission, the risk of leaking privacy information is increased.
The sample of Level A is very interesting. They have a certain level of privacy prevention in all aspects of their behavior. However, they still think they “don’t have privacy awareness”. It can be seen that these groups are highly sensitive to privacy. Maybe these people are experts in the field of data and will think deeply about how to better protect privacy. It is precisely because they know that there is still much room to improve the protection of privacy that they feel that they have not done enough.
From Figure 10 above, there was a significant difference between level E to level A in the clean-up the traces of privacy protection. The rating of level E was only 34.3% but the rating of level A was 100%. Even level C was 57.5%. People who do not focus on privacy protection do not clean up their history often. On the other hand, people who are aware of privacy protection clean up their traces periodically.
The result of the changing password of privacy protection shows that there is a significant difference. The lowest rating was level E, which was 17.1%; the highest rating was 85.7% from level A. The second-highest rating was 38.2% from level C. The difference between level E and level A was large. It shows that people do not often change their passwords, even though for level C, their rating was lower than 50%.
Another significant difference is the shared personal life of active disclosure. The lowest rating was 31.4% from level D. The highest rating was 92.9% from level A. The second-highest rating was 79.1% from level B. It reveals that people who are not aware of privacy security often share their personal life on social media. Those shared contents could be photos, locations, or habits, etc. These all are privacy data and are easily taken by others in social media. People who care about privacy are more likely to set up rights to control information visibility.

4. Discussion

The above descriptive statistical table shows that respondents think passive participation and active disclosure are the riskiest in privacy disclosure.

5. Conclusions

After we learned that 160,000 Facebook pages were hacked every day [14] and that Facebook faced a $5 billion fine for privacy violations [15], we began to carry out this research. Trying to make social media users aware of the relationship between behavior and privacy.
We quantified the degree of different privacy disclosure behind each user’s behavior. In this regard, we need to pay more attention to those behaviors with greater weight. Based on the theoretical model and data collection of experts and users, two conclusions were found.
First, from the comparison of importance and the conclusion of AHP is that: among the privacy types that affect the comprehensive score of privacy, the order is identity authentication privacy (0.339), psychological privacy (0.220), virtual space defensive privacy (0.193), integrated information privacy (0.127), and interactive privacy (0.121).
Specifically, for each type of privacy, such as virtual space defensive privacy, the order of influence of each behavior on it is: privacy protection behavior (0.5902), privacy concern behavior (0.1779), active interaction behavior (0.141), and passive participation behavior (0.0909).
For a specific type of behavior, the weight of sub-behavior can be ranked as follows. For example, the order of privacy concern behavior is: worry about over-collecting of information (0.394), degree of information security concern (0.390), and concern about app access rights (0.216).
With these weights, we can rate the behavior of users, so we have a series of second conclusions.
The lowest rating of all levels shows that people normally do not change their password periodically, even those who have some awareness of privacy protection. Nowadays, most social networks provide a feature which is called ‘Keep login’. People use this function on mobile devices frequently. When they enter the social network, they do not need to enter a password. Therefore, they may think that the password may not be important and changing the password is unnecessary. However, we suggest people change their passwords periodically, say, every half year. To achieve this purpose, people should set a timer to alert themselves. Some companies require their employees to update the passwords of the ID accounts after a period. People who are in those companies can update the passwords of social media accounts at the same time. They should avoid password reuse at all costs when updating the passwords. Although people may think it is annoying, many social media accounts are being hacked every day.
Moreover, the lowest rating reveals that people normally do not pay attention to the request for apps’ permission. Many apps require permissions of some aspects, such as photos, contacts, on mobile devices. Some of them must have permission; otherwise, users cannot use the apps. When people use these apps, they have to accept the requests, even paying attention to the requests. If they keep using these types of apps, they ignore the request for permission over time.
The conclusion of empirical analysis of behavior tells us that most people normally are not aware of their privacy. For instance, most people often share their personal life on social media. Although it is the main activity on social media, it still raises a problem with the disclosure. This disclosure is activated by people’s behavior. It is impossible to restrict people from sharing but people should be conscious about what they share and who can view the contents. People also should limit other people who could view the shared contents. Usually, there is a setting of who can view the posts on social media. People should set it to those they know.
This study provides the weight of various behaviors that affect privacy and evaluates users’ level of privacy prevention. In this way, we can provide specific suggestions for different groups of people and improve the privacy prevention of the whole people from the users’ perspective. Additionally, this study aimed to enrich our understanding of people’s privacy and adjust their behavior in social networks. Privacy protections are crucial for both people and social networks. While the discussion proposed in this study is preliminary, it shows the value of adding specificity about privacy.

6. Limitations and Improvements

Our research team only provides some references on the relationship between social media behavior and personal privacy protection based on student samples and thinking. Whether the questionnaire design can significantly reflect the facts needs to be further optimized, and we hope to promote larger-scale research on data security and personal privacy in future when we have sufficient resources.

Author Contributions

Conceptualization, Y.L.; methodology, Y.L.; software, Y.L. and P.Y.K.; Data analysis, Y.L. and P.Y.K.; validation, P.Y.K.; formal analysis, P.Y.K. and Y.H.C.; investigation, Y.H.C.; writing—review and editing, Y.L., P.Y.K. and W.K.T.; supervision, W.K.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Ethical review and approval were waived for this study, due to the fact we conducted the questionnaire survey in Hong Kong and strictly abided by the Personal Data (Privacy) Ordinance (PCPD) in the Data Privacy Law of HKSAR through making a declamation at the start of our questionnaire survey, which is ‘This survey is an anonymous survey, only for our research study this time, you are not compulsory to participate in this survey. This questionnaire survey research is entirely dependent on your voluntary help, and all your information will be kept strictly confidential and will be cleared after the survey. If you can take a few minutes to participate in this survey, we would be very grateful!’

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kenton, W.; Mansa, J. Understanding Social Networking. Available online: https://www.investopedia.com/terms/s/social-networking.asp (accessed on 10 November 2020).
  2. Ryan, T.; Xenos, S. Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Comput. Hum. Behav. 2011, 27, 1658–1664. [Google Scholar] [CrossRef]
  3. Wang, X.; Sun, X. Evaluation of personal Privacy Disclosure Prevention Ability based on Mobile Social Network. Mod. Inf. Technol. 2019, 3, 144–147. [Google Scholar]
  4. Fuchs, C. An Alternative View of Privacy on Facebook. Information 2011, 2, 140–165. Available online: https://www.mdpi.com/2078-2489/2/1/140/htm (accessed on 7 November 2020). [CrossRef] [Green Version]
  5. Tavani, H.T. Informational privacy: Concepts, theories, and controversies. In The Handbook of Information and Computer Ethics; Fuchs, C., Ed.; Rivier University: Nashua, NH, USA, 2008; pp. 131–164. [Google Scholar]
  6. Gu, L. Integrated privacy: A new type of privacy in the era of big data. Nanjing Soc. Sci. 2020, 4, 106–111+122. [Google Scholar] [CrossRef]
  7. Clement, J. Facebook: Number of Users Worldwide. Available online: https://www.statista.com/statistics/490424/number-of-worldwide-facebook-users/ (accessed on 7 November 2020).
  8. Smith, K. 53 Incredible Facebook Statistics and Facts. Available online: https://www.brandwatch.com/blog/facebook-statistics/ (accessed on 7 November 2020).
  9. Nyoni, P.; Velempini, M. Privacy and user awareness on Facebook. South Afr. J. Sci. 2018, 114, 1–5. Available online: https://www.sajs.co.za/article/view/5165 (accessed on 7 November 2020). [CrossRef]
  10. Wang, N.; Xu, H.; Grossklags, J. Third-party apps on Facebook: Privacy and the illusion of control. In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, New York, NY, USA, 4 December 2011; Available online: http://docplayer.net/17187683-Third-party-apps-on-facebook-privacy-and-the-illusion-of-control.html (accessed on 7 November 2020).
  11. Liu, Y.; Gummadi, K.P.; Krishnamurthy, B.; Mislove, A. Analyzing Facebook Privacy Settings: User Expectations vs. Reality. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, New York, NY, USA, 2 November 2011; Available online: https://scinapse.io/papers/2118994807 (accessed on 7 November 2020).
  12. Bumgarner, B.A. You Have Been Poked: Exploring the Uses and Gratifications of Facebook among Emerging Adults. Available online: https://firstmonday.org/article/view/2026/1897 (accessed on 7 November 2020).
  13. Wang, A.; Zhang, A.; Xu, Y. Privacy in Online Social Networks. In Proceedings of the Thirty Second International Conference on Information Systems, Shanghai, China, 4–7 December 2011. [Google Scholar]
  14. Callahan, M. Big Brother 2.0: 160,000 Facebook Pages Are Hacked a Day. Available online: https://nypost.com/2015/03/01/big-brother-2-0-160000-facebook-pages-are-hacked-a-day/ (accessed on 13 November 2020).
  15. Facebook Faces $5 Billion Fine Over Privacy Violations. 2019. Available online: https://www.dw.com/en/facebook-faces-5-billion-fine-over-privacy-violations/a-49575702 (accessed on 13 November 2020).
Figure 1. Research Model.
Figure 1. Research Model.
Information 13 00280 g001
Figure 2. Case of constructing judgment matrix.
Figure 2. Case of constructing judgment matrix.
Information 13 00280 g002
Figure 3. Judgment matrix.
Figure 3. Judgment matrix.
Information 13 00280 g003
Figure 4. Single-level weight graph.
Figure 4. Single-level weight graph.
Information 13 00280 g004
Figure 5. Multi-level weight graph.
Figure 5. Multi-level weight graph.
Information 13 00280 g005
Figure 6. Consistency test.
Figure 6. Consistency test.
Information 13 00280 g006
Figure 7. Model analysis result.
Figure 7. Model analysis result.
Information 13 00280 g007
Figure 8. Frequency histogram of privacy protection capability.
Figure 8. Frequency histogram of privacy protection capability.
Information 13 00280 g008
Figure 9. Frequency histogram of privacy protection capability (A–E).
Figure 9. Frequency histogram of privacy protection capability (A–E).
Information 13 00280 g009
Figure 10. Questionnaire—user behavior 5 intervals.
Figure 10. Questionnaire—user behavior 5 intervals.
Information 13 00280 g010
Table 1. Descriptive statistics for twelve sub-behaviors.
Table 1. Descriptive statistics for twelve sub-behaviors.
Types of User BehaviorVariables in Twelve User BehaviorsMeanSDDescription
Privacy ConcernAgainst excessive information collection5.671.43The degree of over-collection of information on social media
Pay attention to app request permission2.231.39The degree that users pay attention to app request permission and read privacy policy statement
Care about information security6.560.86The importance of information security
Privacy ProtectionApp privacy settings4.041.52The degree of application privacy settings can help reduce privacy leaks
Clean up the traces3.491.63The extent to which clean up the traces on social media can help reduce privacy disclosures
Change password3.321.71The extent to which social media passwords are regularly changed can help reduce privacy disclosures
Active DisclosureInput real information5.741.19The extent to which use real information increase privacy disclosures
Share your personal life5.471.18The extent to which share personal life increase privacy disclosures
Real-time social interaction4.721.55The extent to which real-time social interaction has privacy disclosures risk
Express personal feelings and value4.511.56The extent to which express personal feelings and value increase privacy disclosures
Passive ParticipationBe involved in news/ topic/ recommend5.11.69The degree of users that being involved in news/ topic/ recommend
Traces of associated third party websites5.141.44Due to traces of associated third party websites, users received recommended information from social media
Table 2. Descriptive statistics for four behaviors.
Table 2. Descriptive statistics for four behaviors.
Four Types of User BehaviourMeanDescription
Lack of Privacy Concern4.82The extent to which privacy concern can help reduce privacy disclosures
Lack of Privacy Protection3.62The extent to which privacy protection can help reduce privacy disclosures
Active Disclosure5.11The extent to which use active disclosure increase privacy disclosures
Passive Participation5.12The degree of users that involved in passive participation and that increase privacy disclosures
Table 3. Score Likert Scale.
Table 3. Score Likert Scale.
ScoreMeansScoreMeans
1The same//
3A bit more importantReciprocal 1/3A bit less important
5More importantReciprocal 1/5Less important
7Extremely importantReciprocal 1/7Extremely unimportant
2, 4, 6, 8Median on both sidesReciprocal ½, ¼Median on both side
Table 4. Comparison table of privacy protection interval and grade.
Table 4. Comparison table of privacy protection interval and grade.
Grade0–1010–2020–3030–4040–5050–6060–7070–8080–9090–100
Interval12345678910
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, Y.; Tse, W.K.; Kwok, P.Y.; Chiu, Y.H. Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process. Information 2022, 13, 280. https://doi.org/10.3390/info13060280

AMA Style

Liu Y, Tse WK, Kwok PY, Chiu YH. Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process. Information. 2022; 13(6):280. https://doi.org/10.3390/info13060280

Chicago/Turabian Style

Liu, Yuxuan, Woon Kwan Tse, Pui Yu Kwok, and Yu Hin Chiu. 2022. "Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process" Information 13, no. 6: 280. https://doi.org/10.3390/info13060280

APA Style

Liu, Y., Tse, W. K., Kwok, P. Y., & Chiu, Y. H. (2022). Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process. Information, 13(6), 280. https://doi.org/10.3390/info13060280

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop