ArticlePDF Available

Social media privacy concerns and risk beliefs

Authors:
  • Middle Georgia State University

Abstract and Figures

The purpose of this study was to investigate the link between users’ risk beliefs and social media privacy concerns (concerns users express regarding social media sites’ practices as to how they collect and use personal information). A Likert-type instrument with seven constructs, six of which described the social media privacy concerns and the seventh construct defined users’ risk beliefs, was used to collect data from students who were studying at a university in the southeastern United States. All students (N = 138) used Facebook as their major social networking site. Collected data were analyzed via multiple regression analysis. The results indicated that subjects’ risk beliefs are influenced by three social media privacy concerns (i.e., collection, error, and awareness). The Findings and their implications are discussed. Recommendations for future research are made.
Content may be subject to copyright.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
1"
Social media privacy concerns and risk beliefs
Johnathan Yerby, Middle Georgia State University, USA, johnathan.yerby@mga.edu
Alex Koohang, Middle Georgia State University, USA, alex.koohang@mga.edu
Joanna Paliszkiewicz, Warsaw University of Life Sciences, Poland,
joanna_paliszkiewicz@sggw.pl
Abstract
The purpose of this study was to investigate the link between users’ risk beliefs and social media
privacy concerns (concerns users express regarding social media sites’ practices as to how they
collect and use personal information). A Likert-type instrument with seven constructs, six of
which described the social media privacy concerns and the seventh construct defined users’ risk
beliefs, was used to collect data from students who were studying at a university in the
southeastern United States. All students (N = 138) used Facebook as their major social
networking site. Collected data were analyzed via multiple regression analysis. The results
indicated that subjects’ risk beliefs are influenced by three social media privacy concerns (i.e.,
collection, error, and awareness). The Findings and their implications are discussed.
Recommendations for future research are made.
Keywords: Risk beliefs, social media, privacy concerns, Facebook.
Introduction
A decade ago, people used social media to keep in touch with their friends. Today, social media
is more pervasive in many people’s lives and has transformed from merely a tool to share a
comment or photo, a news source, a journal of lives, a means to conduct business, organize
people for social causes, a marketing machine, and a distraction from reality. A Pew Research
study found that 79% of adults in America use social media (Greenwood, Perrin, & Duggan
2016). Over the past two years, the active social media users worldwide increased 21%, to 2.789
billion users, with 599 million users coming from the Americas (Kemp, 2017).
Adoption and diffusion of social media show no signs of slowing down, at the same time, there
are growing concerns about privacy and risk on these platforms where people are sharing
intimate details about their lives (Madden, 2012). Madden (2012) reported that there is a major
disconnect in peoples’ attitudes and practices regarding privacy. People say that privacy is
important, but when observed, their actions do not prioritize privacy (Madden, 2012).
The literature has documented that privacy concerns are restraining to the Internet users (e.g.,
Bansal & Gefen, 2010; Gerrard, Cunningham, & Devlin, 2006; Zhou, 2011) and various methods
have been suggested to lessen privacy concerns (Bartsch & Dienlin, 2016; Dinev & Hart, 2004).
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
2"
Online privacy concerns have been researched in many different topics, for example, consumer
willingness to provide personal information (Phelps, Nowak, & Ferrell, 2000); shopper attitude
(Inman & Nikolova, 2017); downloading mobile apps (Gu,
Xu, Xu, Zhang, & Ling
, 2017);
location-based apps (Wang & Lin, 2017); privacy protection behaviors (Chen, Beaudoin, &
Hong, 2017); self-disclosure across societies (Liang,
Shen, & Fu
, 2017); customer and firm
performance (Martin, Borah, & Palmatier, 2017); individual characteristics (Taddicken, 2014);
cultural and generational influences (Miltgen & Peyrat-Guillard, 2014); as well as photo sharing
(Liang,
Liu, Lu, & Wong
, 2015).
Privacy concerns are “the degree to which an Internet user is concerned about website practices
related to the collection and use of his or her personal information” (Hong & Thong, 2013, p.
276). Social media is increasingly ubiquitous on people’s mobile phone, tablets, and computers.
There is a debate among experts within the field of social media about privacy. Experts in the
social media privacy question whether privacy is a relic of the past or if there are settings, tools,
methods, and education that can allow privacy to coexist with social sharing (Madden, 2012).
Social media users frequently lack the technical ability to understand how their information is
collected, stored, and then repackaged to be sold (Rauhofer, 2008).
In their extensive research, Hong and Thong (2013) outlined six dimensions of the Internet
privacy concerns based on previous research. These dimensions are collection, secondary usage,
errors, improper access, control, and awareness. Koohang (2017) adapted the six dimensions of
the Internet privacy concern to distinctly describe the users’ social media sites privacy concerns
(SMPC) as listed below.
“Collection - the amount of specific user data absorbed by the social media sites.
Secondary usage [users’] personal information collected by the social media sites for
one purpose, but used, without authorization/permission from the user, for another
secondary purpose.
Errors - inadequate protections against deliberate and/or accidental errors in user personal
data collected by the social media sites.
Improper access - [users’] personal information held by the social media sites that is
readily available to others and/or not properly authorized to be viewed or accessed by
others.
Control - inadequate control over personal information held by the social media sites.
Awareness - [users are] not being made aware of information privacy practices by the
social media sites.” (Koohang, 2017, p. 17)
Literature has documented the role of users’ risk beliefs and their online privacy concerns (Dinev
& Hart, 2006; Youn, 2009). Some studies have shown risk as a predictor of online privacy
concerns (Dinev & Hart, 2006; Cocosila,
Archer, & Yuan
, 2009). Dinev and Hart (2006) stated
that as perceived privacy risk increased, so did privacy concerns which in turn decreased users’
willingness to provide personal information. Metzger (2007) asserted that disclosing personal
information online involves a degree of risk in such a way that if the user has a high privacy
concern, he or she will find it risky to disclose his or her personal information. Culnan and Bies
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
3"
(2003) argued that people are readily willing to accept the loss of privacy if they perceive a
positive outcome or benefit. This assertion may also be valid with social media privacy concerns
(SMPC). The purpose of the present study is, therefore, to examine the link between social media
privacy concerns and users’ risk beliefs. Consistent with its purpose, the following research
question is asked:
Which of the six predictor variables (SMPC: collection, SMPC: secondary usage, SMPC: error,
SMPC: improper access, SMPC: control, SMPC: awareness) are most influential in predicting
users’ risk beliefs?
Risk beliefs on social media are referred to
“the degree to which a user on a social media site risks disclosing his or her personal
information. Risk on a social media site entails potential for loss of personal information,
uncertainty about how personal information may be used, and unexpected problems
associated with disclosing user’s personal information.” (Koohang,
Paliszkiewicz, &
Goluchowski,
2018a, p. 1210)
Methodology
Instrument
The seven-point Likert type instrument used for this study is comprised of seven constructs. Six
of the seven constructs (i.e., collection, secondary usage, errors, improper access, control, &
awareness) describe the social media privacy concerns. These constructs were developed and
empirically validated by Koohang (2017), based on an extensive study researching the Internet
privacy concerns by (Hong & Thong, 2013). The seventh construct describes risk beliefs (i.e.,
revealing personal information that may be subjected to possible loss; the doubt of how the
information is used; and the probable unforeseen problems that may bring harm to users) taken
from Hong and Thong (2013) and modified by Koohang et al. (2018a) to specifically reflect
social media risk beliefs. The instrument’s scale entails the following: 7 = completely agree, 6 =
mostly agree, 5 = somewhat agree, 4 = neither agree nor disagree, 3 = somewhat disagree, 2 =
mostly disagree, 1 = completely disagree (See Appendix A).
Sample and Data Collection
Upon approval from the university’s Institutional Research Board (IRB) where this study took
place, we administered the survey instrument electronically to approximately 600 undergraduate
students. The students were majoring in the field of Information Technology at a university in
the southeastern United States. Students were asked to complete the survey only if they used
Facebook as their major social networking website. We received 142 completed surveys. Of the
142, four were eliminated because of incomplete data, yielding a final sample of 138. The
participants were male (N = 79, 57%) and female (N = 59, 43%). Their age categories were 18 –
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
4"
20 (N = 48, 35%), 21 – 29 (N = 60, 43%), 30 – 39 (N = 19, 14%), and 40 or older (N = 11, 8%).
Participants were told that their participation was completely voluntary, and their responses
would be kept confidential.
Data Analysis
SPSS™ version 25 was used to analyze the data. We used multiple regression analysis to answer
the research question. The independent variables (IVs) were IV_1 = SMPC: collection, IV_2 =
SMPC: secondary usage, IV_3 = SMPC: error, IV_4 = SMPC: improper access, IV_5 = SMPC:
control, IV_6 = SMPC: awareness. The dependent variable (DV) was DV = risk beliefs. We
applied the Enter method to include all independent variables into the model at the same time
irrespective of significant contribution. The analysis shows which of the independent variables
can best predict the dependent variable. The multiple regression includes a test of
multicollinearity, model fit determination, a test of Analysis of Variance (ANOVA), and the path
coefficients showing the beta weights, t and p values for the IVs (Mertler & Reinhart, 2016).
Results
The regression model’s tolerance level and Variance Inflation Factor (VIF) for all IVs were
SMPC: collection (.525, 1.906), SMPC: secondary usage (.377, 2.649), SMPC: errors (.496,
2.015), SMPC: improper access (.320, 3.125), SMPC: control (.368, 2.715), and SMPC:
awareness (.481, 2.079). These results indicate that the tolerance level for each IV yielded a
value below the threshold value of 0.1, and the VIF values for all IVs were below the threshold
value of 10. These results indicated that multicollinearity among the IVs did not exist, and the
analysis proceeded to interpret path coefficients.
The model fit was calculated to determine how well the IVs predicted the DV. The model fit
includes the R, R2, R2adj and the ANOVA (i.e., F statistics & p value). The results of multiple
correlation (R = 0.62), squared multiple correlation (R2 = 0.38), and the adjusted squared
multiple correlation (R2adj = 0.35) were robust enough to indicate that the six IVs could
reasonably predict the dependent variable (DV = risk beliefs). The F statistics (F = 13.551, p <
0.001) from the ANOVA indicated that the relationship between the DV and the IVs was linear
and positive.
The path coefficients were interpreted to determine the predictor variables (the six independent
variables) that are most influential in predicting the dependent variable. Table 1 shows the
coefficients table of the multiple regression model. From the six IVs, as shown in Table 1, the
significant SMPC variables that are most influential in predicting the users’ risk beliefs are
SMPC: collection, SMPC: error, and SMPC: awareness. Tables 2 and 3 show correlations and
descriptive statistics.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
5"
Table 1. Coefficients Table of the Multiple Regression Model (N=138)
Model
Unstandardized
Coefficients
Standardized
Coefficients
t
Sig.
B
Beta
(Constant)
.303
.517
.606
COL
.394
.302
3.190
.002
**
SEC
-.116
-.128
-1.143
.255
ERR
.208
.233
2.388
.018
*
ACC
.126
.129
1.067
.288
CON
-.007
-.007
-.060
.952
AWE
.231
.213
2.156
.033
*
*** p<0.001, ** p<0.01, * p<0.05
Note: COL = SMPC: collection, SEC = SMPC: secondary usage, ERR = SMPC: errors, ACC =
SMPC: improper access, CON = SMPC: control, AWE = SMPC: awareness
Table 2. Correlations (N=138)
RISK
COL
SEC
ERR
ACC
CON
AWE
RISK
1.000
.483
.336
.471
.509
.388
.502
COL
.483
1.000
.588
.365
.574
.630
.471
SEC
.336
.588
1.000
.519
.656
.691
.399
ERR
.471
.365
.519
1.000
.678
.386
.511
ACC
.509
.574
.656
.678
1.000
.609
.638
CON
.388
.630
.691
.386
.609
1.000
.580
AWE
.502
.471
.399
.511
.638
.580
1.000
Note: RISK = risk beliefs, COL = SMPC: collection, SEC = SMPC: secondary usage, ERR =
SMPC: errors, ACC = SMPC: improper access, CON = SMPC: control, AWE = SMPC:
awareness
Table 3. Descriptive Statistics (N=138)
Mean
Std. Deviation
RISK
5.0761
1.21638
COL
5.8889
0.93446
SEC
5.6763
1.34118
ERR
5.1377
1.36027
ACC
5.6908
1.25347
CON
5.9710
1.11502
AWE
5.9469
1.12355
Note: RISK = risk beliefs, COL = SMPC: collection, SEC = SMPC: secondary usage, ERR =
SMPC: errors, ACC = SMPC: improper access, CON = SMPC: control, AWE = SMPC:
awareness
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
6"
Discussion
This study was carried out to examine which of the six social media privacy concerns (SMPCs)
were most influential in predicting users’ risk beliefs. An instrument consisting of seven
constructs (six SMPCs & one risk beliefs) was administered electronically to subjects from a
university in the southeast region of the USA. All subjects used Facebook as their main social
media platform to communicate and share information. Collected data were analyzed using
multiple regression analysis.
The findings showed the absence of multicollinearity among the independent variables (COL =
SMPC: collection, SEC = SMPC: secondary usage, ERR = SMPC: errors, ACC = SMPC:
improper access, CON = SMPC: control, AWE = SMPC: awareness) signifying the strength of
the regression analysis model. Next, the model fit was established, and it showed that the
independent variables adequately predict the dependent variable (risk beliefs). Furthermore, the
test of ANOVA indicated a linear relationship between all the independent variables and the
dependent variable. Finally, the path coefficients were interpreted to establish the predictor
variables (the six SMPCs) that were most influential in predicting the dependent variable of risk
beliefs. The findings showed that SMPC: collection, SMPC: error, and SMPC: awareness were
significant variables and that they are most influential in predicting users’ risk beliefs.
Users, in general, find it risky to disclose their personal information because 1) the amount of
personal information collected by the social media; 2) the offering of inadequate protection of
their personal information by the social media against deliberate and/or accidental errors; and 3)
lack of awareness of information privacy practices by the social media sites. The SMPC:
collection focuses on the amount of specific user data collected. Zheleva (2011) described the
idea of differential privacy in an experiment where he created an open network and monitored
people’s risk beliefs. Differential privacy essentially found that some users were willing to give
up a little privacy alongside with several other users. In the case of the present research, perhaps
participants are willing to share some information if everyone else is doing the same. Therefore,
they would be averse to simply revealing information that may cause their privacy to be easily
violated.
The findings for the SMPC: improper access indicated that this variable was not a significant
predictor of risk beliefs. However, the SMPC: errors and the SMPC: awareness were significant
predictors of risk beliefs. One way to interpret these results is that the respondents may have felt
comfortable in being able to configure access to the information that they share. However, they
were concerned about exploits or accidents. Social media sites have proven to be penetrable to
override access controls, for example, Li et al., (2015) found seven exploits that worked on
multiple social networks. The attacks included errors made by social media platforms, errors
made by shared connections among users, and errors made when setting, tagging or sharing
information. Interestingly, a survey of 1,520 people in the United States showed that only 5.2%
of people using social media think that their accounts are safe from hackers (Newton, 2017). An
important issue to highlight regarding SMPC: improper access not being a significant predictor
of risk beliefs may be the timing of this study. The present study on users’ social media privacy
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
7"
concerns was conducted a few months before the New York Times reported that Cambridge
Analytica, a data mining/analytics company, was harvesting and misusing data from millions of
Facebook users (Granville, 2018). Following the breaking into the Cambridge Analytica story,
the Federal Trade Commission opened an investigation on Facebook and Cambridge Analytica.
Since March 2018, people have learned that the data collection was not a data breach, rather a
data collection and permissions issue. Cambridge Analytica was collecting data with consent on
an estimated 87 million people (Meyer, 2018). A #DeleteFacebook campaign followed where
millions of users vowed to get rid of their Facebook accounts, however, according to CEO Mark
Zuckerberg, the follow-through on leaving the social lifeline was not a meaningful number
(Leswing, 2018). In a survey of 1000 Americans, 76% were aware of the Cambridge Analytica
scandal; 17% deleted the Facebook application from their phone, and 9% reported that they had
deleted their account completely (Leswing, 2018). If this study were conducted at the time of the
Cambridge Analytica/Facebook story, the results of SMPC: improper access might likely be a
significant predictor of risk beliefs.
Shore and Steinman (2015) stated that the privacy policy is less transparent, harder to
understand, and contains fewer options to control data and third-party access. Social media sites
such as Facebook change privacy settings frequently, contradict policies in short time frames,
and generally seesaw between keeping users informed about privacy and changing the settings
without consent or knowledge (Fox, 2016). These frequent changes in privacy policy may be
translated into users’ risk behavior that is predicted by their awareness of the conditions that their
information is subjected to.
Because technology moves quickly, and people’s attention is drawn in many directions, there
may be limitations on how intensely or how long people focus on most things. Because of the
recent privacy issues with Facebook (Granville, 2018), Facebook users may attempt to be more
aware of their privacy, which may change some of their behaviors on the social media platform.
However, it is not clear how lasting or meaningful the changes will be for each individual.
Perhaps, differential privacy as described by Zheleva (2011) and time have a way of slowly
bringing users’ guards down, and they return to sharing personal and intimate details of their
lives on social media sites.
The findings of this study have implication for practice. First, Koohang,
Paliszkiewicz, and Nord
(2018b) suggested that social media sites should adopt the concept of privacy by design
advanced by Cavoukian (2010) to protect user privacy. The concept of privacy by design
includes seven principles. They are “1) proactive not reactive - preventative not remedial 2)
privacy as the default, 3) privacy embedded into design, 4) full functionality – positive-sum, not
zero-sum, 5) end-to-end lifecycle protection, 6) visibility and transparency, and 7) respect for
user privacy” (Cavoukian, 2010, para. 18). We assert that to protect user privacy, social media
sites should go beyond merely adopting these privacy principles. They must embed the privacy
by design principles into their platforms to protect users’ privacy and pledge to use various sound
strategies that include users’ safety and well-being. Implementing the concept of privacy by
design into the social media sites may lessen users’ risk beliefs, therefore, decreasing their
privacy concerns.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
8"
Second, Trepte et al. (2015) suggested that users’ privacy skills are important in protecting
personal information. Other studies have asserted that privacy skills must be considered as an
important part of any online activities (Bartsch & Dienlin, 2016; Dinev & Hart, 2004; Park &
Jang, 2014). Therefore, we assert that that privacy skills can be provided by social media sites
through privacy awareness training. The privacy awareness training should include the
awareness of:
necessary skills, knowledge, and competencies about privacy issues (i.e., issues such as
identity theft, hacking, web-based information brokers, and tracking apps) and their
negative consequences;
users’ responsibilities to ensure privacy protection of their personal information on
social media sites;
privacy compliance strategies to constantly protect, secure, safeguard, and enhance user
privacy on social media;
how personal information is collected, used, and shared with others; and
how privacy settings on a social media site are controlled.
In addition, the privacy awareness training must include users’ awareness of best practices to
keep safe on social media sites. Some examples of these best practices are regular managing of
privacy settings, limiting the amount of personal information users disclose, limiting details
about work history, verifying who users connect to, and using a strong password and changing
passwords routinely.
Conclusion
The social media privacy concerns are real and the outcomes of failing to protect personal
information can be critical and risky. Therefore, measures must be taken by social media sites to
ensure users’ privacy protection. Social media sites should develop and include tools that assist
their users to understand privacy and its importance to their daily lives. The seriousness of the
privacy breach must be communicated with users. Furthermore, a privacy awareness education
must be adopted and embedded as a required part of joining a social media site. This study has
limitations that may influence the generalizability of the results. These limitations include a self-
reported survey, a sample of convenience, an uneven age category and limited geographical
location for collection of data. The population sample was from students majoring in the
information technology field, which may not be generalizable to other population samples.
Another limitation of this study is the unevenness of the age category among subjects in which
78% were between 18 29 years old. Future studies should be mindful of these limitations.
Future research should also consider studying the role of other social media platforms as they
relate to privacy concerns and users’ risk beliefs.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
9"
References
Bansal, G., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity,
privacy concern and trust in disclosing health information online. Decision Support
Systems, 49, 138–150.
Bartsch, M., & Dienlin, T. (2016). Control your Facebook: An analysis of online privacy
literacy. Computers in Human Behavior, 56, 147–154.
Cavoukian, A. (2010). Privacy by design: The definitive workshop. Identity in the Information
Society, 3(2), 247-251.
Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on
Internet scam victimization, online privacy concerns, and privacy protection behaviors.
Computers in Human Behavior, 70, 291-302.
Cocosila, M., Archer, N., & Yuan, Y. (2009). Early investigation of new information technology
acceptance: A perceived riskmotivation model. Communications of the Association for
Information Systems, 25(1), 339358.
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice
considerations. Journal of Social Issues, 59(2), 323-342.
Dinev, T. & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions.
Information Systems Research, 17(1), 6180.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents—Measurement
validity and a regression model. Behaviour & Information Technology, 23, 413–422.
Fox-Brewster, T. (2016, June 29). Facebook is playing games with your privacy and there's
nothing you can do about it. Retrieved from:
https://www.forbes.com/sites/thomasbrewster/2016/06/29/facebook-location-tracking-
friend-games/#35c2e55c35f9 .
Gerrard, P., Cunningham, J. B., & Devlin, J. F. (2006). Why consumers are not using Internet
banking: A qualitative study. Journal of Services Marketing, 20, 160–168.
Granville, K. (2018). Facebook and Cambridge Analytica: What You Need to Know as Fallout
Widens.
The New York Times. Retrieved from:
https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-
explained.html
Greenwood, S., Perrin, A., & Duggan, M. (2016). Social media update 2016. Pew Research
Center, 11.
Gu, J., Xu, Y. C., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app
download: An elaboration likelihood model perspective. Decision Support Systems, 94,
19-28.
Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and
four empirical studies. MIS Quarterly, 37(1), 275298.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
10"
Inman, J. J., & Nikolova, H. (2017). Shopper-facing retail technology: A retailer adoption
decision framework incorporating shopper attitudes and privacy concerns. Journal of
Retailing, 93(1), 7-28.
Kemp, S. (2017). Digital in 2017: Global overview. We are social. Retrieved from:
https://wearesocial.com/special-reports/digital-in-2017-global-overview
Koohang, A., Paliszkiewicz, J. & Goluchowski, J. (2018a). Social media privacy concerns:
Trusting beliefs and risk beliefs. Industrial Management & Data Systems, 118(6), 1209-
1228.
Koohang, A., Paliszkiewicz, J. & Nord, J. (2018b). Social media privacy concerns among college
students. Issues in Information systems, 19(1), 11-19.
Koohang, A. (2017). Social media sites privacy concerns: Empirical validation of an instrument.
Online Journal of Applied Knowledge Management, 5(1), 14-26.
Leswing, K. (April 12, 2018). Nearly one in 10 Americans surveyed say they deleted their
Facebook account over privacy concerns. Business Insider. Retrieved from:
http://www.businessinsider.com/delete-facebook-statistics-nearly-10-percent-americans-
deleted-facebook-account-study-2018-4
Li, Y., Li, Y., Yan, Q., & Deng, R. H. (2015). Privacy leakage analysis in online social networks.
Computers & Security, 49, 239-254.
Liang, H., Shen, F., & Fu, K. W. (2017). Privacy protection and self-disclosure across societies: A
study of global Twitter users. New Media & Society, 19(9), 1476-1497.
Liang, K., Liu, J. K., Lu, R., & Wong, D. S. (2015). Privacy concerns for photo sharing in online
social networks. IEEE Internet Computing, 19(2), 58-63.
Madden, M. (2012). Privacy management on social media sites. Pew Internet Report, 1-20.
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm
performance. Journal of Marketing, 81(1), 36-58.
Mertler, C. A., & Reinhart, R. V. (2016). Advanced and multivariate statistical methods:
Practical application and interpretation. New York, NY: Routledge.
Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of
Computer Mediated Communication, 12(2), 335-361.
Meyer, R. (March 20, 2018). The Cambridge Analytica scandal, in 3 paragraphs. The Atlantic.
Retrieved from: https://www.theatlantic.com/technology/ archive/2018/03/the-cambridge-
analytica-scandal-in-three-paragraphs/556046/
Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy
concerns: A qualitative study in seven European countries. European Journal of
Information Systems, 23(2), 103-125.
Newton, C. (2017, October 27). America doesn't trust Facebook. The Verge. Retrieved from:
http://www.theverge.com/2017/10/27/16552620/facebook-trust-survey-usage-popularity-
fake-news
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
11"
Park, Y. J., & Jang, S. M. (2014). Understanding privacy knowledge and skill in mobile
communication. Computers in Human Behavior, 38, 296–303.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to
provide personal information. Journal of Public Policy & Marketing, 19(1), 27-41.
Rauhofer, J. (2008). Privacy is dead, get over it! Information privacy and the dream of a risk-free
society. Information & Communications Technology Law, 17(3), 185-197.
Shore, J., & Steinman, J. (2015). Did you really agree to that? The evolution of Facebooks
privacy policy. Technology Science, 2015081102.
Taddicken, M. (2014). The ‘privacy paradox’ in the social web: The impact of privacy concerns,
individual characteristics, and the perceived social relevance on different forms of self-
disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273.
Trepte, S., Teutsch, D., Masur, P. K., Eicher, C., Fischer, M., Hennhöfer, A., et al. (2015). Do
people know about privacy and data protection strategies? Towards the “Online Privacy
Literacy Scale” (OPLIS). In S. Gutwirth, R. Leenes, & P. de Hert (Eds.), Reforming
European data protection law (pp. 333–365). Dordrecht, Netherlands: Springer.
Wang, E. S. T., & Lin, R. L. (2017). Perceived quality factors of location-based apps on trust,
perceived privacy risk, and continuous usage intention. Behaviour & Information
Technology, 36(1), 2-10.
Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection
behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389418.
Zheleva, E., & Getoor, L. (2011). Privacy in social networks: A survey. In Social network data
analytics (pp. 277-306). Springer, Boston, MA.
Zhou, T. (2011). The impact of privacy concern on user adoption of location-based services.
Industrial Management & Data Systems, 111, 212–226.
Authors’ Biographies
Johnathan Yerby, Ph.D.
is the Director of the Center for Cybersecurity
Education and Applied Research and an Assistant Professor in the School of
Information Technology at Middle Georgia State University. He serves as
associate editor-in-chief for JCISSE, editor-in-chief for JITDIS, technical
editor for JSAIS, and on the editorial board for Knighted, which is a
university-hosted student journal. His teaching, service, and research center
around cybersecurity, forensics, awareness, and privacy. He has been
involved with several United States national initiatives and governmental agencies to direct and
develop security-related education.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
12"
Alex Koohang, Ph.D. is Payton Anderson Eminent Scholar, Endowed Chair
of Information Technology, Professor, and Dean of the School of
Information Technology at Middle Georgia State University. He is the
author/co-author of numerous scholarly papers and has written/edited several
books. Currently, he is the editor-in-chief of the Journal of Computer
Information Systems and serves on the editorial review board of several
IS/MIS publications. He is a Fellow at the Informing Science Institute. Dr.
Koohang is the recipient of many awards, including IACIS Computer Educator of the Year and
Lifetime Academic Achievement Award from IIAKM.
Joanna Paliszkiewicz, Ph.D. is a specialist in management issues connected
with knowledge management, intellectual capital and trust management. She
holds the rank of University Professor of Warsaw University of Life Sciences
and Polish-Japanese Academy of Information Technology. Prof. J.
Paliszkiewicz is well recognized in Poland and abroad with her expertise in
management issues. She has published over 170 original papers and eight
books. She serves on the editorial board of several international journals. She
is the editor of Issues in Information Systems and deputy editor-in-chief of
Management and Production Engineering Review Journal. Dr. Paliszkiewicz was named the
2013 Computer Educator of the Year by IACIS.
Appendix A. Instrument
SMPC: Collection
It bothers me when social media sites ask me to provide personal information.
When social media sites ask me for personal information, I sometimes think twice before
providing it.
I am concerned that social media sites are collecting personal information about me.
SMPC: Secondary usage
I am concerned that social media sites would use my stored personal information for their
own advantage/profit.
I am concerned that social media sites would sell my stored personal information in their
databases to other companies.
I am concerned that social media sites would share my stored personal information in
their databases with other companies without my authorization.
SMPC: Errors
I am concerned that social media sites do not take enough steps to make sure that my
personal information in their files is accurate.
I am concerned that social media sites do not have adequate procedures to correct errors
in my personal information.
Online&Journal&of&Applied&Knowledge&Management&
A"Publication"of"the"International"Institute"for"Applied"Knowledge"Management"
Volume7,)Issue)1,)2019
"
"
13"
I am concerned that social media sites do not devote enough time and effort to verifying
the accuracy of my personal information in their databases.
SMPC: Improper Access
I am concerned that social media site databases that contain my personal information are
not protected from unauthorized access.
I am concerned that social media sites do not devote enough time and effort to preventing
unauthorized access to my personal information.
I am concerned that social media sites do not take enough steps to make sure that
unauthorized people cannot access my personal information on their computers.
SMPC: Control
It usually bothers me when I do not have control of personal information that I provide to
social media sites.
It usually bothers me when I do not have control or autonomy over decisions about how
my personal information is collected, used, and shared by social media sites.
I am concerned when control of my personal information on a social media site is lost or
unwillingly reduced because of marketing transactions with other companies.
SMPC: Awareness
I am concerned when a clear and visible disclosure is missing in online privacy policies
of social media sites.
It usually bothers me when I am not aware or knowledgeable about how my personal
information will be used by social media sites.
It usually bothers me when social media sites seeking my information online do not
disclose the way the data are collected, processed, and used.
Risk beliefs
In general, it would be risky to give my personal information to social media sites.
There would be a high potential for loss associated with giving my personal information
to social media sites.
There would be too much uncertainty associated with giving my personal information to
social media sites.
Providing social media sites with my personal information would involve many
unexpected problems.!
Note: The six SMPC constructs (SMPC: collection, SMPC: secondary usage, SMPC: errors, SMPC: improper
access, SMPC: control, and SMPC: awareness) are adapted from Hong and Thong (2013) to specifically describe
social media privacy concerns and empirically validated by Koohang (2017). The Risk Beliefs construct is taken
from Hong and Thong (2013), and was modified by Koohang et al. (2018a) to reflect social media sites risk beliefs.
... Social media users harbor risk beliefs and concerns stemming from social media use [11], such as apprehension of vulnerability in social media [12], fear of rejection, and a desire for social approval [13]. The Neurocognitive Model of Nightmare Etiology [14] posits that affect load (i.e., frequency of current life stress and/or negative emotional events that impede emotion processing capacities) and affect distress (i.e., dispositional tendency to experience heightened negative emotional reactivity) contribute to the pathogenesis of nightmares. ...
... For this study, the Social Media Nightmare-Related Scale (SMNS) was developed, consisting of 14items (see Table 1). The scale construction drew upon previous classifications of nightmares, literature discussing nightmares [7][8][9], studies exploring the influence of media on dreaming [3,4], and common concerns expressed by social media users [11][12][13]. First, we synthesized literature on the content of dreaming [2,10], nightmare categories [7][8][9], and the interrelationship between media and dreams [4,5] to create a cohesive summary, establishing a robust framework for capturing social mediarelated nightmares. Initial items were formulated drawing on established measures assessing dream content, such as the Typical Dream Questionnaire (e.g., being chased or pursued, trying repeatedly to accomplish something, and being tied or unable to move; [10]), and proposed nightmare categories, such as Robert and Zadra's [8] thematic categories in nightmares and bad dreams (e.g., being chased, interpersonal conflicts, accidents, failures, and helplessness; [8]). ...
... Initial items were formulated drawing on established measures assessing dream content, such as the Typical Dream Questionnaire (e.g., being chased or pursued, trying repeatedly to accomplish something, and being tied or unable to move; [10]), and proposed nightmare categories, such as Robert and Zadra's [8] thematic categories in nightmares and bad dreams (e.g., being chased, interpersonal conflicts, accidents, failures, and helplessness; [8]). To enrich the connotation of the items, common concerns of social media users were also considered, such as harassment, data breach, posting anxiety, and social disapproval [11][12][13]. Subsequently, the initial items underwent refinement based on feedback from three media psychologists with expertise in scale development. Their comments and revisions focused on enhancing the clarity, simplicity, and relevance of the items [25]. ...
Article
Full-text available
Research has posited that social media use during the day may be reflected in nighttime dreams. Nevertheless, no prior studies have explored frightening, unpleasant dreams arising from social media use. This study introduces the construct of the social media-related nightmare by (a) developing and validating a scale capturing negativevalenced dreams with themes of helplessness, loss of control, inhibition, victimization, and making mistakes in social media, and (b) examining relationships between social media use, social media-related nightmares, sleep quality, and affective well-being. A convenience sample of 595 Iranian adult social media users (Mage = 27.45, SDage= 11.42) reported on social media-related nightmare, social media use integration, anxiety, peace of mind, sleep quality, and nightmare distress. The Social Media-Related Nightmare Scale (SMNS) demonstrated a unidimensional structure with sound psychometric properties. The most common nightmares involved the inability to log in to social media and the disruption of relationships with other users. Social media use intensity predicted frequency of social media-related nightmares. These nightmares were correlated with increased anxiety, lower peace of mind, poor sleep quality, and nightmare distress. Importantly, social media-related nightmares mediated the relationship between social media use intensity and low affective well-being (i.e., anxiety and peace of mind), poor sleeping, and nightmare distress. The findings suggest that social media-related nightmares could be a potential pathway through which social media engagement may lead to affective distress and sleep difficulties.
... Koohang (2017) and Koohang et al. (2018) developed, accordingly, an instrument to measure social media privacy concerns. Subsequent studies by Koohang andcollaborators (Koohang et al., 2021, 2022;Yerby et al., 2019) have, for the most part, followed the original characterization of social media privacy concerns initially developed by Koohang (2017) and Koohang et al. (2018). Other work on privacy concerns on social media has either employed conceptualizations that we consider partial, examining only a subset of the social media privacy concerns dimensions previously presented (e.g. ...
... Notably, the secondary usage (SEC) and awareness (AWA) dimensions were excluded from our PLS SEM analysis after the 55þ model did not meet the discriminant validity via the heterotrait-monotrait ratio (HTMT) test. This decision aligns with recent research which also considered select subsets of SMPC dimensions (Cain and Imre, 2022;Koohang et al., 2021;Yerby et al., 2019). This approach, while perhaps deviating from the Koohang (2017) and Koohang et al. (2018) standard model, is grounded in both statistical rigor and an emerging perspective within contemporary literature as referenced above. ...
Article
Full-text available
Purpose This paper explores the similarities and differences in privacy attitudes, trust and risk beliefs between younger and older adults on social networking sites. The objective of the article is to ascertain whether any notable differences exist between younger (18–25 years old) and older (55+ years old) adults in how trust and risk are influenced by privacy concerns upon personal information disclosure on social media. Design/methodology/approach A Likert scale instrument validated in previous research was employed to gather the responses of 148 younger and 152 older adults. The scale was distributed through Amazon Mechanical Turk. Data were analyzed through partial least squares structural equation modeling. Findings No significant differences were found between younger and older adults in how social media privacy concerns related to trust and risk beliefs. Two privacy concern dimensions were found to have a significant influence on perceptions of risk for both populations: collection and control. Predictability and a sense of control are proposed as two conceptual approaches that can explain these findings. Originality/value This article is the first one to explore age differences in privacy concerns, trust and risk on social media employing conceptual developments and an instrument specifically tailored to the social media environment. Based on the findings, several strategies are suggested to keep privacy concerns on social media at a minimum, reduce risk perceptions and increase users' trust.
... 2. Privacy concerns and data security: Belief systems impact individuals' privacy concerns and data security practices, influencing their attitudes towards data privacy, information sharing, and online security measures based on their religious beliefs, ethical values, and trust in digital platforms. Examining the impacts of belief systems on privacy concerns and data security highlights the importance of balancing individuals' spiritual beliefs, ethical values, and security practices in safeguarding their online identities, protecting their sensitive information, and mitigating cybersecurity risks in the digital age (Yerby, Koohang, & Paliszkiewicz, 2019). 3. Trust building and online communities: Belief systems contribute to trust building and community formation in online spaces, fostering a sense of belonging, shared values, and mutual support among individuals who share similar religious beliefs, ethical values, and cultural norms. ...
Article
Full-text available
In the contemporary digital epoch, the confluence of cybersecurity protocols and religious convictions engenders a multifaceted and profound dynamic that influences individuals' behaviors and perceptions in both cyberspace and their spiritual lives. This scholarly inquiry probes the intricate interplay between cybersecurity measures designed to protect digital assets and reli-gious doctrines, encompassing spiritual, moral, and ethical dimensions. As technological advancements accelerate, discerning this interaction becomes increasingly pivotal. By examining the influence of religious beliefs on se-curity practices, trust, and ethical comportment in the digital domain, this study illuminates the intricate correlations between digital fortifications and spiritual principles. Employing a multidisciplinary approach that synthesiz-es insights from psychology, cybersecurity, and theology, this research elu-cidates the challenges and prospects emerging at the intersection of technol-ogy and faith in the digital milieu. Consequently, it contributes to a pro-found comprehension of how individuals navigate their digital and spiritual identities within an interconnected global framework.
... Gbadeyan, B. T., Bayrakktar, Ü. A. (2023). Influence of Social Media on the Behavioral Formation of Digital Natives: a Moderation Approach Furthermore, users, according toYerby et al. (2019), find their privacy threatened on social media because there is not enough protection for personal details on social media sites against the deliberate and unplanned invasion of personal space or pages that might occur. Also, there is not enough privacy awareness on social media.Most digital natives do experience sexing or cyber-sexing issues (sending, receiving, or transferring sexually explicit text messages, photos, or images over a smartphone, tablet, or other digital device), whereby the majority of pictures or images sent over the internet spread in a twinkle of an eye. ...
Article
Full-text available
Purpose: This study examined the influence of social media on the behavioural formation of digital natives in Lagos, Nigeria, with a specific focus on the accessibility and pattern of social media usage, the online experience, and the influence of social media on the behavioural formation of digital natives. Design/Methodology/Approach: Using a stratified proportionate sample strategy, 450 social media users who grew up in the digital age across 10 local government areas in Lagos, Nigeria, provided the data for this quantitative study, where the heuristic model for the relationship was subjected to a string of tests using the partial least squares structural equation modelling (PLS-SEM) technique. Findings: Discovery revealed that social media has a favourable impact on the behavioural formation of digital natives, whereby digital natives’ nature moderates the structural relationship between social media and behavioural formation. Original/Value: The study novelty appears on the side of Technological Determinism Theory postulated on social media as extremely popular among Nigerian digital natives and is one of the key contributors to the deterioration of digital natives’ behavioural formation in terms of morality, secretive information accessing, online insecurity, as well as the propagation of rumor and propaganda. Practical implications: Because of the established dialectical connection between society and technology, widespread social media literacy is now possible, even among the humblest of households.
... También, en los últimos años ha aumentado la conciencia de los riesgos en materia de privacidad que los usuarios pueden padecer con el uso de los medios sociales (Yerby et al., 2019). La información personal que los usuarios comparten en sus redes puede terminar siendo utilizada con un fin distinto al que habían consentido o imaginado, como lo demostró el escándalo de Cambridge Analytics (Kaiser, 2019). ...
Chapter
La influencia de las redes sociales en la más reciente contienda electoral mexicana correspondía a un descrédito generalizado de los medios informativos en México. Pero también es cierto que la tendencia no se había originado únicamente en este país, pues correspondía a un cambio general que había sacudido a diversos gobiernos, y que había dado muestra de convertirse en poco tiempo en una nueva modalidad de implicación cívica.
Article
In the era of digital communication, ensuring user privacy on social media platforms is essential. A major challenge is aligning platform privacy settings with individual user preferences without overwhelming them with too many questions. This research presents a methodology for designing adaptive privacy preferences on social media sites, aimed at minimizing user burden while accurately capturing their privacy needs. The methodology involves four steps: clustering users based on their responses, classifying them into specific groups, selecting the most important questions, and implementing the tailored settings. By grouping users according to their privacy concerns, we gain insights into their preferences, which help in customizing their privacy settings. We applied various classification techniques, including random forest, gradient boosting, AdaBoost, SVM, and k-NN, with random forest showing the highest accuracy in assigning users to appropriate clusters. The selection of questions is optimized using feature importance analysis, ensuring that only the most critical questions are asked, which reduces user fatigue while maintaining accuracy. This research is significant because it offers practical, personalized privacy controls that can enhance user satisfaction and privacy protection on social media platforms. By reducing the number of questions and tailoring settings to specific user groups, our methodology improves the overall user experience and privacy management.
Technical Report
Full-text available
Developments in communication and information technology, including social media, have transformed daily life. This study investigates the awareness of university students using TikTok and Twitter regarding data security and privacy. The research aims to assess user awareness and their data protection measures. Data were collected through questionnaires and literature reviews, analyzed quantitatively. The results show that while many students recognize the importance of securing personal information, they often do not feel safe and neglect proactive measures. Major concerns include identity theft, illegal data use, and identity forgery. These findings highlight the need for further education on data privacy and security for students, especially active social media users. Future research should expand the sample size and explore factors like educational level and technological understanding. ABSTRAK Kemajuan teknologi informasi dan komunikasi, termasuk media sosial, telah mengubah kehidupan sehari-hari. Penelitian ini menyelidiki kesadaran mahasiswa pengguna TikTok dan Twitter terkait keamanan dan privasi data. Tujuan penelitian ini adalah menilai kesadaran pengguna dan langkah-langkah perlindungan data mereka. Data dikumpulkan melalui kuesioner dan tinjauan literatur, dianalisis secara kuantitatif. Hasilnya menunjukkan bahwa meskipun banyak mahasiswa menyadari pentingnya mengamankan informasi pribadi, banyak yang tidak merasa aman dan sering mengabaikan tindakan proaktif. Masalah utama adalah pencurian identitas, penggunaan data ilegal, dan pemalsuan identitas. Temuan ini menekankan perlunya edukasi lebih lanjut tentang privasi dan keamanan data bagi mahasiswa, terutama pengguna aktif media sosial. Penelitian lanjutan disarankan memperluas sampel dan mengeksplorasi faktor-faktor seperti tingkat pendidikan dan pemahaman teknologi.
Article
This article explores the diversity of privacy and security in the context of social media platforms. As society increasingly relies on these platforms for communication, networking and information sharing, the risks associated with privacy breaches and data security holes have become more prominent. This study draws on the extensive existing literature and examines various dimensions of privacy violation, including data collection, surveillance practices, and algorithmic manipulation. In addition, it examines the shortcomings of current regulatory frameworks and industry practices to protect user privacy and ensure data security.Using case studies and empirical analysis, the article explores the real impact of privacy breaches and data security breaches on individuals, organizations and society as a whole. Finally, it proposes a comprehensive approach to address these issues and emphasizes the need for improved user education, technical innovation and regulatory measures to promote a safer and more private online environment. Keywords:Data Breach,Privacy Concerns,Cyber Security,Transparency,Privacy Violations
Article
Full-text available
Continual innovation and new technology are critical in helping retailers’ create a sustainable competitive advantage. In particular, shopper-facing technology plays an important role in increasing revenues and decreasing costs. In this article, we briefly discuss some of the salient retail technologies over the recent past as well as technologies that are only beginning to gain traction. Additionally, we present a shopper-centric decision calculus that retailers can use when considering a new shopper-facing technology. We argue that new technologies provide value by either increasing revenue through (a) attracting new shoppers, (b) increasing share of volume from existing shoppers, or (c) extracting greater consumer surplus, or decreasing costs through offloading labor to shoppers. Importantly, our framework incorporates shoppers by considering their perceptions of the new technology and their resulting behavioral reactions. Specifically, we argue that shoppers update their perceptions of fairness, value, satisfaction, trust, commitment, and attitudinal loyalty and evaluate the potential intrusiveness of the technology on their personal privacy. These perceptions then mediate the effect of the technology on shopper behavioral reactions such as retail patronage intentions and WOM communication. We present preliminary support for our framework by examining consumers’ perceptions of several new retail technologies, as well as their behavioral intentions. The findings support our thesis that shopper perceptions of the retailer are affected by new shopper-facing technologies and that these reactions mediate behavioral intentions, which in turn drives the ROI of the new technology.
Article
Full-text available
Although marketers increasingly rely on customer data, firms have little insight into the ramifications of such data use and do not know how to prevent negative effects. Data management efforts may heighten customers' vulnerability worries or create real vulnerability. Using a conceptual framework grounded in gossip theory, the authors link customer vulnerability to negative performance effects. Three studies show that transparency and control in firms' data management practices can suppress the negative effects of customer data vulnerability. Experimental manipulations reveal that mere access to personal data inflates feelings of violation and reduces trust. An event study of data security breaches affecting 414 public companies also confirms negative effects, as well as spillover vulnerabilities from rival firms' breaches, on firm performance. Severity of the breach hurts the focal firm but helps the rival firm, which provides some insight into mixed findings in prior research. Finally, a field study with actual customers of 15 companies across three industries demonstrates consistent effects across four types of customer data vulnerability and confirms that violation and trust mediate the effects of data vulnerabilities on outcomes.
Article
Full-text available
Privacy is a culturally specific phenomenon. As social media platforms are going global, questions concerning privacy practices in a cross-cultural context become increasingly important. The purpose of this study is to examine cultural variations of privacy settings and self-disclosure of geolocation on Twitter. We randomly selected 3.3 million Twitter accounts from more than 100 societies. Results revealed considerable cultural and societal differences. Privacy setting in collectivistic societies was more effective in encouraging self-disclosure; whereas it appeared to be less important for users in individualistic societies. Internet penetration was also a significant factor in predicting both the adoption of privacy setting and geolocation self-disclosure. However, we did not find any direct relationships between cultural values and self-disclosure.
Article
This study attempts to empirically validate a social media sites privacy concerns instrument with six constructs (collection, secondary usage, errors, improper access, control, & awareness). Each construct includes three designated items/variables. Data were collected from 157 participants and analyzed using exploratory factor analysis. The results indicated that all six constructs of the instrument were reliable to measure social media sites privacy concerns of users. Recommendations for future research are provided.
Article
Purpose The purpose of this paper is to build a research model that examines social media privacy concerns (SMPC) in relation to users’ trusting beliefs and risk beliefs. Design/methodology/approach An instrument with eight constructs (SMPC: collection, SMPC: secondary usage, SMPC: errors, SMPC: improper access, SMPC: control, SMPC: awareness, trusting beliefs and risk beliefs) was developed and administered to subjects from a mid-sized university in the USA. Collected data were analyzed using partial least square structural equation modeling. Findings The results showed that three of the six SMPC (i.e. secondary usage, improper access and awareness) were negatively and significantly associated with users’ trusting beliefs. In addition, three of the six SMPC (i.e. collection, errors and improper access) were positively and significantly associated with users’ risk beliefs. Practical implications Practical implications were aimed at the social media sites to design simple and straightforward privacy policy statements that are easy to understand; to safeguard users’ online privacy behaviors; and to develop mechanisms to protect personal information. Originality/value This study enhances the literature by contributing to a generalized knowledge of SMPC of users as they relate to their trusting beliefs and risk beliefs.
Book
Ideal for non-math majors, Advanced and Multivariate Statistical Methods teaches students to interpret, present, and write up results for each statistical technique without overemphasizing advanced math. This highly applied approach covers the why, what, when and how of advanced and multivariate statistics in a way that is neither too technical nor too mathematical. Students also learn how to compute each technique using SPSS software. New to the Sixth Edition Instructor ancillaries are now available with the sixth edition. All SPSS directions and screenshots have been updated to Version 23 of the software. Student learning objectives have been added as a means for students to target their learning and for instructors to focus their instruction. Key words are reviewed and reinforced in the end of chapter material to ensure that students understand the vocabulary of advanced and multivariate statistics.
Article
In the mobile age, protecting users' information from privacy-invasive apps becomes increasingly critical. To precaution users against possible privacy risks, a few Android app stores prominently disclose app permission requests on app download pages. Focusing on this emerging practice, this study investigates the effects of contextual cues (perceived permission sensitivity, permission justification and perceived app popularity) on Android users' privacy concerns, download intention, and their contingent effects dependent on users' mobile privacy victim experience. Drawing on Elaboration Likelihood Model, our empirical results suggest that perceived permission sensitivity makes users more concerned about privacy, while permission justification and perceived app popularity make them less concerned. Interestingly, users' mobile privacy victim experience negatively moderates the effect of permission justification. In particular, the provision of permission justification makes users less concerned about their privacy only for those with less mobile privacy victim experience. Results also reveal a positive effect of perceived app popularity and a negative effect of privacy concerns on download intention. This study provides a better understanding of Android users' information processing and the formation of their privacy concerns in the app download stage, and proposes and tests emerging privacy protection mechanisms including the prominent disclosure of app permission requests and the provision of permission justifications.
Article
Numerous location-based services (LBS) studies have suggested that the risk of disclosing personal privacy hinders consumers from adopting LBS, whereas scant attention has focused on clarifying how to mitigate the perceived privacy risk of using LBS. This quantitative study focuses on the effects of consumer quality perceptions (i.e. information quality, system quality, and service quality) on their trust in LBS, which consequently affects perceived privacy risk and continued usage intention towards LBS. Research data were collected through a market survey website; 1399 valid questionnaires were collected. Structural equation modelling analysis was applied to the data. The results revealed that information quality, system quality, and service quality were positively related to perceived trust. Perceived trust also correlated negatively with perceived privacy risk, but positively with continued usage intention. A managerial implication drawn from the findings is that LBS providers should develop more useful user interfaces or provide timely, personalised services to reduce perceived privacy risk and strengthen LBS continued usage intention.