4,156
Views
43
CrossRef citations to date
0
Altmetric
Original Articles

Saving face on Facebook: privacy concerns, social benefits, and impression management

, , &
Pages 16-37 | Received 09 Feb 2017, Accepted 02 Oct 2017, Published online: 20 Oct 2017

References

  • Ajzen, I. 1991. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50: 179–211.
  • Al-Debei, M., E. Al-Lozi, and A. Papazafeiropoulou. 2013. “Why People Keep Coming Back to Facebook: Explaining and Predicting Continuance Participation from an Extended Theory of Planned Behaviour Perspective.” Decision Support Systems 55: 43–54.
  • Ba, Sulin, and Paul A. Pavlou. 2002. “Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior.” MIS Quarterly 26 (3): 243–268.
  • Bagozzi, R. P., and U. M. Dholakia. 2002. “Intentional Social Action in Virtual Communities.” Journal of Interactive Marketing 16 (2): 2–21. doi:10.1002/dir.10006.
  • Belanger, France, Janine S. Hiller, and Wanda J. Smith. 2002. “Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes.” The Journal of Strategic Information Systems 11 (3): 245–270.
  • Bhattacherjee, A., and G. Premkumar. 2004. “Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test.” MIS Quarterly 28: 229–254.
  • Birnholtz, Jeremy, Moira Burke, and Annie Steele. 2017. “Untagging on Social Media: Who Untags, What Do They Untag, and Why?” Computers in Human Behavior 69: 166–173. doi:10.1016/j.chb.2016.12.008.
  • Blanchard, Anita L., and M. Lynne Markus. 2004. “The Experienced ‘Sense’ of a Virtual Community: Characteristics and Processes.” Database for Advances in Information Systems 35 (1): 65–79.
  • Blau, Peter Michael. 1964. Exchange and Power in Social Life. New York: Wiley.
  • Bohnert, Daniel, and William H. Ross. 2010. “The Influence of Social Networking Web Sites on the Evaluation of Job Candidates.” Cyberpsychology, Behavior, and Social Networking 13 (3): 341–347. doi:10.1089/cyber.2009.0193.
  • Boyd, Danah. 2002. “Faceted Id/Entity: Managing Representation in a Digital World.” PhD diss., Massachusetts Institute of Technology.
  • Boyd, D., and J. Heer. 2006. “Profiles as Conversation: Networked Identity Performance on Friendster.” 39th Annual Hawaii International Conference on System Sciences, Kauia, HI, January 4–7.
  • Brewer, Marilynn B. 1991. “The Social Self: On Being the Same and Different at the Same Time.” Personality and Social Psychology Bulletin 17 (5): 475–482.
  • Brown, Timothy A. 2006. Confirmatory Factor Analysis for Applied Research, Methodology in the Social Sciences. New York: Guilford Press.
  • Cenfetelli, Ronald T., and Geneviève Bassellier. 2009. “Interpretation of Formative Measurement in Information Systems Research.” MIS Quarterly 33 (4): 689–707.
  • Chakraborty, R., C. Vishik, and H. R. Rao. 2013. “Privacy Preserving Actions of Older Adults on Social Media: Exploring the Behavior of Opting Out of Information Sharing.” Decision Support Systems 55: 948–956.
  • Chellappa, Ramnath K., and Raymond G. Sin. 2005. “Personalization Versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma.” Information Technology & Management 6 (2): 181–202. doi:10.1007/s10799-005-5879-y.
  • Chen, R., and S. K. Sharma. 2015. “Learning and Self-Disclosure Behavior on Social Networking Sites: The Case of Facebook Users.” European Journal of Information Systems 24: 93–106.
  • Chen, Rui, Sushil K. Sharma, and H. Raghav Rao. 2016. “Members’ Site Use Continuance on Facebook: Examining the Role of Relational Capital.” Decision Support Systems 90: 86–98. doi:10.1016/j.dss.2016.07.001.
  • Cheung, C. M. K., and M. K. O. Lee. 2010. “A Theoretical Model of Intentional Social Action in Online Social Networks.” Decision Support Systems 49: 24–30.
  • Chopra, Kari, and William A Wallace. 2003. “Trust in Electronic Environments.” Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Kauia, HI, January 4–7.
  • Constine, Josh. 2017. “Facebook Now Has 2 Billion Monthly Users … and Responsibility.” TechCrunch. http://social.techcrunch.com/2017/06/27/facebook-2-billion-users/; https://techcrunch.com/2017/06/27/facebook-2-billion-users/.
  • Culnan, Mary J., and Pamela K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10 (1): 104–115.
  • Davis, F. D., R. P. Bagozzi, and P. R. Warshaw. 1989. “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models.” Management Science 35: 982–1003.
  • Dennis, Alan, Robert M. Fuller, and Joseph Valacich. 2008. “Media, Tasks, and Communication Processes: A Theory of Media Synchronicity.” MIS Quarterly 32 (3): 575–600.
  • Diamantopoulos, Adamantios, and Heidi M. Winklhofer. 2001. “Index Construction with Formative Indicators: An Alternative to Scale Development.” Journal of Marketing Research 38 (2): 269–277.
  • Dienlin, Tobias, and Miriam J. Metzger. 2016. “An Extended Privacy Calculus Model for SNSs: Analyzing Self-Disclosure and Self-Withdrawal in a Representative U.S. Sample.” Journal of Computer-Mediated Communication 21 (5): 368–383. doi:10.1111/jcc4.12163.
  • Dinev, Tamara, and Paul Hart. 2006. “An Extended Privacy Calculus Model for e-Commerce Transactions.” Information Systems Research 17 (1): 61–80.
  • Döring, Nicola. 2002. “Personal Home Pages on the Web: A Review of Research.” Journal of Computer-Mediated Communication 7 (3).
  • Dwyer, Catherine, Starr Hiltz, and Katia Passerini. 2007. “ Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace.” AMCIS 2007 Proceedings: 339, Keystone, CO, August 10–12.
  • Eastlick, Mary Ann, Sherry L. Lotz, and Patricia Warrington. 2006. “Understanding Online B-to-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment.” Journal of Business Research 59 (8): 877–886.
  • Ellison, Nicole, Rebecca Heino, and Jennifer Gibbs. 2006. “Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment.” Journal of Computer-Mediated Communication 11 (2): 415–441. doi:10.1111/j.1083-6101.2006.00020.x.
  • Feng, Jinjuan, Jonathan Lazar, and Jenny Preece. 2004. “Empathy and Online Interpersonal Trust: A Fragile Relationship.” Behaviour & Information Technology 23 (2): 97–106.
  • Fenigstein, Allan, Michael F Scheier, and Arnold H Buss. 1975. “Public and Private Self-Consciousness: Assessment and Theory.” Journal of Consulting and Clinical Psychology 43 (4): 522.
  • Fornell, C., and David F. Larcker. 1981. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.” Journal of Marketing Research 18 (1): 39–50.
  • Fromkin, Howard L. 1970. “Effects of Experimentally Aroused Feelings of Undistinctiveness upon Valuation of Scarce and Novel Experiences.” Journal of Personality and Social Psychology 16 (3): 521–529. doi:10.1037/h0030059.
  • Ganley, D., and C. Lampe. 2009. “The Ties that Bind: Social Network Principles in Online Communities.” Decision Support Systems 47 (3): 266.
  • Gefen, David, Elena Karahanna, and Detmar W. Straub. 2003. “Trust and TAM in Online Shopping: An Integrated Model.” MIS Quarterly 27 (1): 51–90.
  • Gefen, David, and Catherine M. Ridings. 2002. “Implementation Team Responsiveness and User Evaluation of Customer Relationship Management: A Quasi-Experimental Design Study of Social Exchange Theory.” Journal of Management Information Systems 19 (1): 47–70.
  • Giles, Martin. 2010. “A World of Connections: A Special Report on Social Networking.” The Economist.
  • Goffman, Erving. 1959. The Presentation of Self in Everyday Life. New York: Doubleday.
  • Goffman, Erving. 1967. Interaction Ritual: Essays on Face-to-Face Behavior. New York: Doubleday.
  • Gross, Ralph, and Alessandro Acquisti. 2005. “Information Revelation and Privacy in Online Social Networks.” Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, November 7–10.
  • Hair, J., W. Black, B. Babin, and R. Anderson. 2010. Multivariate Data Analysis. Upper Saddle River, NJ: Prentice-Hall.
  • Hsieh, J. J. P., A. Rai, and M. Keil. 2008. “Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvantaged.” MIS Quarterly 32: 97–126.
  • Huang, Hsin-Yi. 2016. “Examining the Beneficial Effects of Individual’s Self-Disclosure on the Social Network Site.” Computers in Human Behavior 57 (C): 122–132. doi:10.1016/j.chb.2015.12.030.
  • Jarvenpaa, Sirkka L., and D. Sandy Staples. 2001. “Exploring Perceptions of Organizational Ownership of Information and Expertise.” Journal of Management Information Systems 18 (1): 151–184.
  • Jiang, Zhenhui, Cheng Suang Heng, and Ben C. F. Choi. 2013. “Research Note – Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions.” Information Systems Research 24 (3): 579–595.
  • Jin, Byoungho, Jin Yong Park, and Hye-Shin Kim. 2010. “What Makes Online Community Members Commit? A Social Exchange Perspective.” Behaviour & Information Technology 29 (6): 587–599.
  • Jones, Sydney. 2009. Generations Online in 2009. Washington, DC: Pew Research Center.
  • Kankanhalli, Atreyi, Bernard C. Y. Tan, and Kwok-Kee Wei. 2005. “Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation.” MIS Quarterly 29 (1): 113–143.
  • Khan, Z., and S. Jarvenpaa. 2010. “Exploring Temporal Coordination of Events with Facebook.com.” Journal of Information Technology 25 (2): 137.
  • Kim, Hyang-Sook. 2016. “What Drives You to Check In on Facebook? Motivations, Privacy Concerns, and Mobile Phone Involvement for Location-Based Information Sharing.” Computers in Human Behavior 54: 397–406.
  • Kim, Gil Son, Se-Bum Park, and Jungsuk Oh. 2008. “An Examination of Factors Influencing Consumer Adoption of Short Message Service (SMS).” Psychology & Marketing 25 (8): 769–786.
  • Kim, S. S., and J.-Y. Son. 2009. “Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services.” MIS Quarterly 33: 49–70.
  • Kobsa, Alfred, Sameer Patil, and Bertolt Meyer. 2012. “Privacy in Instant Messaging: An Impression Management Model.” Behaviour & Information Technology 31 (4): 355–370. doi:10.1080/01449291003611326.
  • Kock, Ned. 2010. WarpPLS 1.0 User Manual. Laredo, TX: ScriptWarp Systems.
  • Kokolakis, Spyros. 2017. “Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon.” Computers & Security 64: 122–134. doi:10.1016/j.cose.2015.07.002.
  • Krämer, N. C., and S. Winter. 2008. “Impression Management 2.0: The Relationship of Self-Esteem, Extraversion, Self-Efficacy, and Self-Presentation Within Social Networking Sites.” Journal of Media Psychology 20 (3): 106–116.
  • Krasnova, Hanna, Sarah Spiekermann, Ksenia Koroleva, and Thomas Hildebrand. 2010. “Online Social Networks: Why We Disclose.” Journal of Information Technology 25 (2): 109–125.
  • Ku, Y., R. Chen, and H. Zhang. 2013. “Why Do Users Continue Using Social Networking Sites? An Exploratory Study of Members in the United States and Taiwan.” Information & Management 50: 571–581.
  • Leary, Mark R., and Robin M. Kowalski. 1990. “Impression Management: A Literature Review and Two-Component Model.” Psychological Bulletin 107 (1): 34–47.
  • Lecky, Prescott, and John F. A. Taylor. 1945. Self-Consistency, a Theory of Personality. New York: Island press.
  • Lee, Jung. 2017. “Social Capital Expectation and Usage of Social Media: The Moderating Role of Social Capital Susceptibility.” Behaviour & Information Technology, 1–14. doi:10.1080/0144929X.2017.1344730.
  • Lee, Y., K. A. Kozar, and K. R. Larsen. 2009. “Avatar e-mail Versus Traditional e-mail: Perceptual Difference and Media Selection Difference.” Decision Support Systems 46: 451–467.
  • Lee, Haein, Hyejin Park, and Jinwoo Kim. 2013. “Why Do People Share Their Context Information on Social Network Services? A Qualitative Study and an Experimental Study on Users’ Behavior of Balancing Perceived Benefit and Risk.” International Journal of Human-Computer Studies 71 (9): 862–877. doi:10.1016/j.ijhcs.2013.01.005.
  • Li, Yuan. 2014. “The Impact of Disposition to Privacy, Website Reputation and Website Familiarity on Information Privacy Concerns.” Decision Support Systems 57 (1): 343–354.
  • Li, Han, Rathindra Sarathy, and Heng Xu. 2011. “The Role of Affect and Cognition on Online Consumers’ Decision to Disclose Personal Information to Unfamiliar Online Vendors.” Decision Support Systems 51 (3): 434–445.
  • Lin, H., W. Fan, and P. Y. K. Chau. 2014. “Determinants of Users’ Continuance of Social Networking Sites: A Self-Regulation Perspective.” Information & Management 51: 595–603.
  • Litt, Eden. 2015. “The Imagined Audience: How People Think About Their Audience and Privacy on Social Network Sites.” PhD diss., Northwestern University.
  • Liu, Zilong, Qingfei Min, Qingguo Zhai, and Russell Smyth. 2016. “Self-Disclosure in Chinese Micro-Blogging: A Social Exchange Theory Perspective.” Information & Management 53 (1): 53–63.
  • Lu, H., and K. Hsiao. 2010. “The Influence of Extro/Introversion on the Intention to Pay for Social Networking Sites.” Information & Management 47 (3): 150.
  • Lu, Yin, Bernard Tan, and Kai-Lung Hui. 2004. “Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits.” ICIS 2004 Proceedings, Washington, DC, December 9–12.
  • Ma, Meng, and Ritu Agarwal. 2007. “Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities.” Information Systems Research 18 (1): 42–67.
  • MacKenzie, Scott B., Philip M. Podsakoff, and Nathan P. Podsakoff. 2011. “Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques.” MIS Quarterly 35 (2): 293–334.
  • Madden, Mary, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith, and Meredith Beaton. 2013. “Teens, Social Media, and Privacy.” Accessed May 21, 2013/T00:00:00+00:00. http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/
  • Madden, Mary, and Lee Rainie. 2015. “Americans’ Attitudes About Privacy, Security and Surveillance.” Accessed May 20, 2015/T09:55:23+00:00. http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/.
  • Malhotra, Naresh K., Sung S. Kim, and James Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15: 336–355.
  • Marwick, A. 2005. “I’m More Than Just a Friendster Profile: Identity, Authenticity, and Power in Social Networking Services.” Association for Internet Researchers 6.0.
  • McKnight, D. Harrison, Vivek Choudhury, and Charles Kacmar. 2002a. “Developing and Validating Trust Measures for e-Commerce: An Integrative Typology.” Information Systems Research 13 (3): 334–359.
  • McKnight, Harrison D., Vivek Choudhury, and Charles Kacmar. 2002b. “The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: A Trust Building Model.” The Journal of Strategic Information Systems 11 (3): 297–323.
  • Messinger, Paul R., Xin Ge, Eleni Stroulia, Kelly Lyons, Kristen Smirnov, and Michael Bone. 2008. “On the Relationship between My Avatar and Myself.” Journal of Virtual Worlds Research 1 (2).
  • Metzger, Miriam J. 2004. “Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce.” Journal of Computer-Mediated Communication 9 (4).
  • Millham, Mary Helen, and David Atkin. 2016. “Managing the Virtual Boundaries: Online Social Networks, Disclosure, and Privacy Behaviors.” New Media & Society. doi:10.1177/1461444816654465.
  • Milne, George R., and Maria-Eugenia Boza. 1999. “Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices.” Journal of Interactive Marketing 13 (1): 5–24.
  • Min, Jinyoung, and Byoungsoo Kim. 2015. “How Are People Enticed to Disclose Personal Information Despite Privacy Concerns in Social Network Sites? The Calculus Between Benefit and Cost.” Journal of the Association for Information Science and Technology 66 (4): 839–857. doi:10.1002/asi.23206.
  • Norman, Donald A. 1988. The Design of Everyday Things. New York: Basic Books.
  • Nowak, Kristine L., and Christian Rauh. 2005. “The Influence of the Avatar on Online Perceptions of Anthropomorphism, Androgyny, Credibility, Homophily, and Attraction.” Journal of Computer-Mediated Communication 11 (1): 153–178.
  • Nunnally, J. C., and I. H. Bernstein. 1994. Psychometric Theory. New York: McGraw-Hill.
  • Pavlou, Paul A., and Angelika Dimoka. 2006. “The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums, and Seller Differentiation.” Information Systems Research 17 (4): 392–414.
  • Pavlou, Paul A., and David Gefen. 2004. “Building Effective Online Marketplaces with Institution-Based Trust.” Information Systems Research 15 (1): 37–59.
  • Pavlou, P., H. Liang, and Y. Xue. 2007. “Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective.” MIS Quarterly 31 (1): 105–136.
  • Pentina, I., B. S. Gammoh, L. Zhang, and M. Mallin. 2013. “Drivers and Outcomes of Brand Relationship Quality in the Context of Online Social Networks.” International Journal of Electronic Commerce 17: 63–86.
  • Petter, Stacie, Detmar W. Straub, and Arun Rai. 2007. “Specifying Formative Constructs in Information Systems Research.” MIS Quarterly 31 (4): 623–656.
  • Pew Research Center. 2017. “Social Media Fact Sheet.” Accessed August 11, 2017. http://www.pewinternet.org/fact-sheet/social-media/
  • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology 88 (5): 879–903.
  • Posey, C., P. Lowry, T. Roberts, and T. Ellis. 2010. “Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the U.K. Who Use Online Communities.” European Journal of Information Systems 19 (2): 181.
  • Putnam, Robert D. 1993. “The Prosperous Community.” The American Prospect 4 (13): 35–42.
  • Raban, Daphne Ruth, Avinoam Danan, Inbal Ronen, and Ido Guy. 2017. “Impression Management through People Tagging in the Enterprise: Implications for Social Media Sampling and Design.” Journal of Information Science 43 (3): 295–315. doi:10.1177/0165551516636305.
  • Ranzini, Giulia, and Elles Hoek. 2017. “To You Who (I Think) Are Listening: Imaginary Audience and Impression Management on Facebook.” Computers in Human Behavior 75: 228–235. doi:10.1016/j.chb.2017.04.047.
  • R Core Team. 2014. R: A Language and Environment for Statistical Computing. Vienna: R Foundation for Statistical Computing.
  • Reeve, Johnmarshall. 2005. Understanding Motivation and Emotion. New York: John Wiley & Sons.
  • Rosseel, Yves. 2012. “lavaan: An R Package for Structural Equation Modeling.” Journal of Statistical Software 48 (2): 1–36.
  • Schau, Hope Jensen, and Mary C. Gilly. 2003. “We Are What We Post? Self-Presentation in Personal Web Space.” The Journal of Consumer Research 30 (3): 385–404.
  • Schoenbachler, Denise D., and Geoffrey L. Gordon. 2002. “Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing.” Journal of Interactive Marketing 16 (3): 2–16.
  • Secord, P. F., and C. W. Backman. 1965. “An Interpersonal Approach to Personality.” In Progress in Experimental Personality Research, edited by B. Maher, 91–125. New York: Academic Press.
  • Shin, Dong-Hee. 2010. “The Effects of Trust, Security and Privacy in Social Networking: A Security-Based Approach to Understand the Pattern of Adoption.” Interacting with Computers 22 (5): 428–438. doi:10.1016/j.intcom.2010.05.001.
  • Shin, Ho Kyoung, and Kyoung Kyu Kim. 2010. “Examining Identity and Organizational Citizenship Behaviour in Computer-Mediated Communication.” Journal of Information Science 36 (1): 114–126.
  • Short, J. A., E. Williams, and B. Christie. 1976. The Social Psychology of Telecommunications. New York: John Wiley & Sons.
  • Smit, E., F. Bronner, and M. Tolboom. 2007. “Brand Relationship Quality and its Value for Personal Contact.” Journal of Business Research 60: 627–633.
  • Smith, Aaron. 2011. “Why Americans use Social Media.” Pew Internet & American Life Project, November 15, 2011. http://www.pewinternet.org/2011/11/15/why-americans-use-social-media.
  • Smith, H. Jeff, Tamara Dinev, and Heng Xu. 2011. “Information Privacy Research: An Interdisciplinary Review.” MIS Quarterly 35 (4): 989–1015.
  • Smith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. 1996. “Information Privacy: Measuring Individuals’ Concerns About Organizational Practices.” MIS Quarterly 20 (2): 167–196.
  • Staples, D. Sandy, and Jane Webster. 2008. “Exploring the Effects of Trust, Task Interdependence and Virtualness on Knowledge Sharing in Teams.” Information Systems Journal 18 (6): 617–640.
  • Stieger, Stefan, Christoph Burger, Manuel Bohn, and Martin Voracek. 2013. “Who Commits Virtual Identity Suicide? Differences in Privacy Concerns, Internet Addiction, and Personality Between Facebook Users and Quitters.” Cyberpsychology, Behavior, and Social Networking 16 (9): 629–634.
  • Straub, Detmar, Marie-Claude Boudreau, and David Gefen. 2004. “Validation Guidelines for IS Positivist Research.” Communications of the Association for Information Systems 13 (24): 380–427.
  • Swann, W. B. 1983. “Self-verification: Bringing Social Reality into Harmony with the Self.” In Psychological Perspectives on the Self, edited by J. Suls and A. G. Greenwald, 33–66. Hillsdale, NJ: Erlbaum.
  • Swann, W. B. 1990. “To Be Adored or To Be Known? The Interplay of Self-Enhancement and Self-Verification.” In Handbook of Motivation and Cognition: Foundation of Social Behavior, edited by E. T. Higgins and R. M. Sorrentino, 408–448. New York: The Guilford Press.
  • Swann, W. B., and R. J. Ely. 1984. “A Battle of Wills – Self-Verification Versus Behavioral Confirmation.” Journal of Personality and Social Psychology 46 (6): 1287–1302.
  • Swann, W. B., J. T. Polzer, D. C. Seyle, and S. J. Ko. 2004. “Finding Value in Diversity: Verification of Personal and Social Self-Views in Diverse Groups.” Academy of Management Review 29 (1): 9–27.
  • Thatcher, S. M. B., and L. L. Greer. 2008. “Does It Really Matter If You Understand Me? The Implications of Identity Comprehension for Individuals in Organizations.” Journal of Management 34 (1): 5–24.
  • Thomson, Robert, Masaki Yuki, and Naoya Ito. 2015. “A Socio-Ecological Approach to National Differences in Online Privacy Concern: The Role of Relational Mobility and Trust.” Computers in Human Behavior 51: 285–292.
  • Tow, W. N. H., P. Dell, and J. Venable. 2010. “Understanding Information Disclosure Behaviour in Australian Facebook Users.” Journal of Information Technology 25: 126–136.
  • van Slyke, Craig, J. T. Shim, Richard Johnson, and James Jiang. 2006. “Concern for Information Privacy and Online Consumer Purchasing.” Journal of the Association for Information Systems 7 (6): 415–444.
  • Wang, Tien, Trong Danh Duong, and Charlie C. Chen. 2016. “Intention to Disclose Personal Information via Mobile Applications: A Privacy Calculus Perspective.” International Journal of Information Management 36 (4): 531–542. doi:10.1016/j.ijinfomgt.2016.03.003.
  • Wasko, Molly McLure, and Samer Faraj. 2005. “Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice.” MIS Quarterly 29 (1): 35–57.
  • Whitbourne, S. K., and L. A. Connolly. 1999. “The Developing Self in Midlife.” In Life in the Middle: Psychological and Social Development in Middle Age, edited by S. L. Willis and J. D. Reid, 25–45. New York: Academic Press.
  • Wilson, David W., and Joseph S. Valacich. 2012. “Unpacking the Privacy Paradox: Irrational Decision-Making within the Privacy Calculus.” ICIS 2012 Proceedings, Orlando, FL, December 16–19.
  • Wynn, Eleanor, and James E. Katz. 1997. “Hyperbole over Cyberspace: Self-Presentation and Social Boundaries in Internet Home Pages and Discourse.” Information Society 13 (4): 297.
  • Xu, H., T. Dinev, H. J. Smith, and P. Hart. 2008. “Examining the Formation of Individual’s Privacy Concerns: Toward an Integrative View.” International Conference on Information Systems, 2008, Paris, France, December 14–17.
  • Xu, Chenyan, Sherry Ryan, Victor Prybutok, and Chao Wen. 2012. “It Is Not for Fun: An Examination of Social Network Site Usage.” Information & Management 49 (5): 210–217. doi:10.1016/j.im.2012.05.001.
  • Xu, Heng, Hock-Hai Teo, Bernard C. Y. Tan, and Ritu Agarwal. 2009. “The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.” Journal of Management Information Systems 26 (3): 135–173.
  • Zaheer, Akbar, Bill McEvily, and Vincenzo Perrone. 1998. “Does Trust Matter? Exploring the Effects of Interorganizational and Interpersonal Trust on Performance.” Organization Science 9 (2): 141–159.
  • Zeithaml, V. A. 1988. “Consumer Perceptions of Price, Quality and Value: A Means–End Model and Synthesis of Evidence.” Journal of Marketing 52: 2–22.
  • Zhang, Ping. 2008a. “Motivational Affordances: Reasons for ICT Design and Use.” Communications of the ACM 51 (11): 145–147.
  • Zhang, Ping. 2008b. “Toward a Positive Design Theory: Principles for Designing Motivating Information and Communication Technologies.” In Designing Information and Organizations with a Positive Lens, edited by M. Avital, R. J. Boland, and D. L. Cooperrider, 45–74. Amsterdam: JAI Press.
  • Zheng, Y., K. Zhao, and A. Stylianou. 2013. “The Impacts of Information Quality and System Quality on Users’ Continuance Intention in Information-Exchange Virtual Communities: An Empirical Investigation.” Decision Support Systems 56: 513–524.
  • Zlatolas, Lili Nemec, Tatjana Welzer, Marjan Heričko, and Marko Hölbl. 2015. “Privacy Antecedents for SNS Self-Disclosure: The Case of Facebook.” Computers in Human Behavior 45: 158–167.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.