References
- Acquisti, A. 2012. “Nudging Privacy: The Behavioral Economics of Personal Information.” Digital Enlightenment Yearbook 2012: 193–197.
- Acquisti, A., I. Adjerid, R. H. Balebako, L. Brandimarte, L. F. Cranor, S. Komanduri, P. G. Leon, et al. 2016. Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online (SSRN Scholarly Paper ID 2859227). Social Science Research Network. https://papers.ssrn.com/abstract=2859227.
- Acquisti, A., and R. Gross. 2006. “Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.” In Privacy Enhancing Technologies, edited by G. Danezis, and P. Golle, 36–58. Berlin: Springer. http://link.springer.com/chapter/https://doi.org/10.1007/11957454_3.
- Alashoor, T., L. Lambert, and S. Farivar. 2016. A Review of Measures of Disclosure Outcomes in the IS Privacy Literature. AMCIS 2016 Proceedings. http://aisel.aisnet.org/amcis2016/ISSec/Presentations/20.
- Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, Monterey, California 93940 ($6.95 cloth).
- Altman, I. 1977. “Privacy Regulation: Culturally Universal or Culturally Specific?” Journal of Social Issues 33 (3): 66–84. doi:https://doi.org/10.1111/j.1540-4560.1977.tb01883.x.
- Bao, J., Y. Zheng, D. Wilkie, and M. Mokbel. 2015. “Recommendations in Location-Based Social Networks: A Survey.” GeoInformatica 19 (3): 525–565. doi:https://doi.org/10.1007/s10707-014-0220-8.
- Benisch, M., P. G. Kelley, N. Sadeh, and L. F. Cranor. 2011. “Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs.” Personal and Ubiquitous Computing 15 (7): 679–694. doi:https://doi.org/10.1007/s00779-010-0346-0.
- Ben Sassi, I., S. Mellouli, and S. Ben Yahia. 2017. “Context-aware Recommender Systems in Mobile Environment: On the Road of Future Research.” Information Systems 72: 27–61. doi:https://doi.org/10.1016/j.is.2017.09.001.
- Bilogrevic, I., K. Huguenin, B. Agir, M. Jadliwala, and J.-P. Hubaux. 2013. “Adaptive Information-sharing for Privacy-aware Mobile Social Networks.” Proceedings of the 2013 ACM international joint conference on pervasive and ubiquitous computing, 657–666. https://doi.org/https://doi.org/10.1145/2493432.2493510.
- Bond, R., and P. B. Smith. 1996. “Culture and Conformity: A Meta-Analysis of Studies Using Asch’s (1952b, 1956) Line Judgment Task.” Psychological Bulletin 119 (1): 111–137. doi:https://doi.org/10.1037/0033-2909.119.1.111.
- Boyd, D. M., and N. B. Ellison. 2007. “Social Network Sites: Definition, History, and Scholarship.” Journal of Computer-Mediated Communication 13 (1): 210–230. doi:https://doi.org/10.1111/j.1083-6101.2007.00393.x.
- Brzozowski, M. J., and D. M. Romero. 2011. “Who Should I Follow? Recommending People in Directed Social Networks.” Fifth international AAAI conference on weblogs and social media. Fifth International AAAI conference on weblogs and social media. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/viewPaper/2867.
- Burgoon, J. K., Roxanne Parrott, Beth A. Le Poire, Douglas L. Kelley, Joseph B. Walther, Denise Perry. 1989. “Maintaining and Restoring Privacy Through Communication in Different Types of Relationships.” Journal of Social and Personal Relationships 6 (2): 131–158. doi:https://doi.org/10.1177/026540758900600201
- Byrne, B. M. 1989. “Multigroup Comparisons and the Assumption of Equivalent Construct Validity Across Groups: Methodological and Substantive Issues.” Multivariate Behavioral Research 24 (4): 503–523.
- Chen, J., W. Geyer, C. Dugan, M. Muller, and I. Guy. 2009. “Make New Friends, but Keep the Old: Recommending People on Social Networking Sites.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 201–210. doi:https://doi.org/10.1145/1518701.1518735.
- Cho, H., B. Knijnenburg, A. Kobsa, and Y. Li. 2018. “Collective Privacy Management in Social Media: A Cross-Cultural Validation.” ACM Transactions on Computer-Human Interaction 25 (3): 17:1–17:33. doi:https://doi.org/10.1145/3193120
- Cho, S. E., and H. W. Park. 2013. “A Qualitative Analysis of Cross-Cultural new Media Research: SNS use in Asia and the West.” Quality & Quantity 47 (4): 2319–2330. doi:https://doi.org/10.1007/s11135-011-9658-z.
- Cho, H., M. Rivera-Sánchez, and S. S. Lim. 2009. “A Multinational Study on Online Privacy: Global Concerns and Local Responses.” New Media & Society 11 (3): 395–416. doi:https://doi.org/10.1177/1461444808101618.
- Consolvo, S., I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. 2005. “Location Disclosure to Social Relations: Why, When, & What People Want to Share.” Proceedings of the SIGCHI conference on human factors in computing systems, 81–90. ACM. https://doi.org/https://doi.org/10.1145/1054972.1054985
- Dienlin, T., and S. Trepte. 2015. “Is the Privacy Paradox a Relic of the Past? An in-Depth Analysis of Privacy Attitudes and Privacy Behaviors.” European Journal of Social Psychology 45 (3): 285–297.
- Dinev, T., M. Bellotto, P. Hart, V. Russo, I. Serra, and C. Colautti. 2006. “Privacy Calculus Model in e-Commerce – a Study of Italy and the United States.” European Journal of Information Systems 15 (4): 389–402. doi:https://doi.org/10.1057/palgrave.ejis.3000590.
- Dong, C., H. Jin, and B. P. Knijnenburg. 2015. “Predicting Privacy Behavior on Online Social Networks.” Ninth international AAAI conference on web and social media, 91–100. https://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10554.
- Facebook users by country Statistic. n.d. Statista. Retrieved May 24, 2019, from https://www.statista.com/statistics/268136/top-15-countries-based-on-number-of-facebook-users/.
- Fang, L., and K. LeFevre. 2010. “Privacy Wizards for Social Networking Sites.” Proceedings of the 19th international conference on World Wide Web, 351–360. https://doi.org/https://doi.org/10.1145/1772690.1772727.
- Fogues, R. L., P. K. Murukannaiah, J. M. Such, and M. P. Singh. 2017. “Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making.” ACM Transactions on Computer-Human Interaction 24 (1): 1–29. doi:https://doi.org/10.1145/3038920
- Gross, R., and A. Acquisti. 2005. “Information Revelation and Privacy in Online Social Networks.” Proceedings of the 2005 ACM workshop on privacy in the electronic society, 71–80. https://doi.org/https://doi.org/10.1145/1102199.1102214.
- Gudykunst, W. B., G. Gao, K. L. Schmidt, T. Nishida, M. H. Bond, K. Leung, G. Wang, and R. A. Barraclough. 1992. “The Influence of Individualism Collectivism, Self-Monitoring, and Predicted-Outcome Value on Communication in Ingroup and Outgroup Relationships.” Journal of Cross-Cultural Psychology 23 (2): 196–213. doi:https://doi.org/10.1177/0022022192232005.
- Hall, E. T. 1989. Beyond Culture. New York: Anchor Books.
- Hamamura, T. 2012. “Are Cultures Becoming Individualistic? A Cross-Temporal Comparison of Individualism–Collectivism in the United States and Japan.” Personality and Social Psychology Review 16 (1): 3–24. doi:https://doi.org/10.1177/1088868311411587.
- Hofstede, G. 2011. “Dimensionalizing Cultures: The Hofstede Model in Context.” Online Readings in Psychology and Culture 2 (1), doi:https://doi.org/10.9707/2307-0919.1014.
- Hofstede, G., G. J. Hofstede, and M. Minkov. 2010. Cultures and Organizations: Software of the Mind. 3rd ed. New York: McGraw Hill Professional.
- House, R. J., P. J. Hanges, M. Javidan, P. W. Dorfman, and V. Gupta. 2004. Culture, Leadership, and Organizations: The GLOBE Study of 62 Societies. Thousand Oaks: Sage.
- Hui, C. H., H. C. Triandis, and C. Yee. 1991. “Cultural Differences in Reward Allocation: Is Collectivism the Explanation?” British Journal of Social Psychology 30 (2): 145–157. doi:https://doi.org/10.1111/j.2044-8309.1991.tb00931.x.
- Hull, G., H. R. Lipford, and C. Latulipe. 2011. “Contextual Gaps: Privacy Issues on Facebook.” Ethics and Information Technology 13 (4): 289–302. doi:https://doi.org/10.1007/s10676-010-9224-8.
- Jarvenpaa, S. L., N. Tractinsky, and L. Saarinen. 1999. “Consumer Trust in an Internet Store: A Cross-Cultural Validation.” Journal of Computer-Mediated Communication 5 (2): 0–0. doi:https://doi.org/10.1111/j.1083-6101.1999.tb00337.x.
- Jiang, Z. (Jack), C. S. Heng, and B. C. F. Choi. 2013. “Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions.” Information Systems Research 24 (3): 579–595. doi:https://doi.org/10.1287/isre.1120.0441
- Karr-Wisniewski, P., D. C. Wilson, and H. Richter-Lipford. 2011. “A New Social Order: Mechanisms for Social Network Site Boundary Regulation.” AMCIS 2011 proceedings, Paper 101. http://aisel.aisnet.org/amcis2011_submissions/101.
- Kim, Y., D. Sohn, and S. M. Choi. 2011. “Cultural Difference in Motivations for Using Social Network Sites: A Comparative Study of American and Korean College Students.” Computers in Human Behavior 27 (1): 365–372. doi:https://doi.org/10.1016/j.chb.2010.08.015.
- Knijnenburg, B. P., A. Kobsa, and H. Jin. 2013. “Dimensionality of Information Disclosure Behavior.” International Journal of Human-Computer Studies 71 (12): 1144–1162. doi:https://doi.org/10.1016/j.ijhcs.2013.06.003.
- Krasnova, H., S. Spiekermann, K. Koroleva, and T. Hildebrand. 2010. “Online Social Networks: Why we Disclose.” Journal of Information Technology 25 (2): 109–125. doi:https://doi.org/10.1057/jit.2010.6.
- Krasnova, H., and N. F. Veltri. 2010. “Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA.” 2010 43rd Hawaii international conference on system sciences (HICSS), 1–10. https://doi.org/https://doi.org/10.1109/HICSS.2010.307.
- Kwan, V. S., M. H. Bond, and T. M. Singelis. 1997. “Pancultural Explanations for Life Satisfaction: Adding Relationship Harmony to Self-Esteem.” Journal of Personality and Social Psychology 73 (5): 1038–1051.
- Lederer, S., J. Mankoff, and A. K. Dey. 2003. “Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing.” Proceedings of the SIGCHI conference on human factors in computing systems, 724–725. https://doi.org/https://doi.org/10.1145/765891.765952.
- Li, Y., A. Kobsa, B. P. Knijnenburg, and M.-H. C. Nguyen. 2017. “Cross-Cultural Privacy Prediction.” Proceedings on Privacy Enhancing Technologies 3 (2): 113–132.
- Lipford, H. R., G. Hull, C. Latulipe, A. Besmer, and J. Watson. 2009. “Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites.” CSE’09, international conference on computational science and engineering, 2009. 4, 985–989. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5283751.
- Lo, J. 2010. “Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites.” AMCIS 2010 proceedings. https://aisel.aisnet.org/amcis2010/110.
- Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15 (4): 336–355. doi:https://doi.org/10.1287/isre.1040.0032.
- Milberg, S. J., H. J. Smith, and S. J. Burke. 2000. “Information Privacy: Corporate Management and National Regulation.” Organization Science 11 (1): 35–57. doi:https://doi.org/10.1287/orsc.11.1.35.12567.
- Miltgen, C. L., and D. Peyrat-Guillard. 2014. “Cultural and Generational Influences on Privacy Concerns: A Qualitative Study in Seven European Countries.” European Journal of Information Systems 23 (2): 103–125. doi:https://doi.org/10.1057/ejis.2013.17.
- Min, J. 2015. “Personal Information Concerns and Provision in Social Network Sites: Interplay Between Secure Preservation and True Presentation.” Journal of the Association for Information Science and Technology, n/a-n/a, doi:https://doi.org/10.1002/asi.23376.
- Min, J., and B. Kim. 2014. “How are People Enticed to Disclose Personal Information Despite Privacy Concerns in Social Network Sites? The Calculus Between Benefit and Cost.” Journal of the Association for Information Science and Technology, doi:https://doi.org/10.1002/asi.23206.
- Nissenbaum, H. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, California: Stanford University Press.
- Norberg, P. A., D. R. Horne, and D. A. Horne. 2007. “The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors.” Journal of Consumer Affairs 41 (1): 100–126. doi:https://doi.org/10.1111/j.1745-6606.2006.00070.x.
- Oyserman, D., H. M. Coon, and M. Kemmelmeier. 2002. “Rethinking Individualism and Collectivism: Evaluation of Theoretical Assumptions and Meta-Analyses.” Psychological Bulletin 128 (1): 3–72. doi:https://doi.org/10.1037/0033-2909.128.1.3.
- Park, C., and J.-K. Jun. 2003. “A Cross-Cultural Comparison of Internet Buying Behavior: Effects of Internet Usage, Perceived Risks, and Innovativeness.” International Marketing Review 20 (5): 534–553. doi:https://doi.org/10.1108/02651330310498771.
- Petronio, S. 2002. Boundaries of Privacy: Dialectics of Disclosure. Albany: State University of New York Press.
- Posey, C., P. B. Lowry, T. L. Roberts, and T. S. Ellis. 2010. “Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the U.K. who use Online Communities.” European Journal of Information Systems 19 (2): 181–195. doi:https://doi.org/10.1057/ejis.2010.15.
- Rui, J., and M. A. Stefanone. 2013. “Strategic Self-Presentation Online: A Cross-Cultural Study.” Computers in Human Behavior 29 (1): 110–118. doi:https://doi.org/10.1016/j.chb.2012.07.022
- Sadeh, N., J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. 2009. “Understanding and Capturing People’s Privacy Policies in a Mobile Social Networking Application.” Personal and Ubiquitous Computing 13 (6): 401–412. doi:https://doi.org/10.1007/s00779-008-0214-3.
- Schimmack, U., S. Oishi, and E. Diener. 2005. “Individualism: A Valid and Important Dimension of Cultural Differences Between Nations.” Personality and Social Psychology Review 9 (1): 17–31. doi:https://doi.org/10.1207/s15327957pspr0901_2.
- Schwartz, S. H. 1994. “Beyond Individualism/Collectivism: New Cultural Dimensions of Values.” In Individualism and Collectivism: Theory, Method, and Applications, edited by U. Kim, H. C. Triandis, S.-C. Kâğitçibaşi, and G. Yoon, 85–119. Aki: Sage.
- Shklovski, I., S. D. Mainwaring, H. H. Skúladóttir, and H. Borgthorsson. 2014. “Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use.” Proceedings of the 32nd annual ACM conference on human factors in computing systems, 2347–2356. https://doi.org/https://doi.org/10.1145/2556288.2557421.
- Smith, H. J., T. Dinev, and H. Xu. 2011. “Information Privacy Research: An Interdisciplinary Review.” MIS Quarterly 35 (4): 989–1016.
- Smith, H. J., S. J. Milberg, and S. J. Burke. 1996. “Information Privacy: Measuring Individuals’ Concerns About Organizational Practices.” MIS Quarterly 20 (2): 167–196. doi:https://doi.org/10.2307/249477.
- Son, J.-Y., and S. S. Kim. 2008. “Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model.” MIS Quarterly 32 (3): 503–529.
- Steenkamp, J.-B. E. M., and I. Geyskens. 2006. “How Country Characteristics Affect the Perceived Value of Web Sites.” Journal of Marketing 70 (3): 136–150. doi:https://doi.org/10.1509/jmkg.70.3.136.
- Stewart, K. A., and A. H. Segars. 2002. “An Empirical Examination of the Concern for Information Privacy Instrument.” Information Systems Research 13 (1): 36–49. doi:https://doi.org/10.1287/isre.13.1.36.97.
- Strater, K., and H. R. Lipford. 2008. “Strategies and Struggles with Privacy in an Online Social Networking Community.” Proceedings of the 22nd British HCI group annual conference on people and computers: culture, creativity, interaction – volume 1, 111–119. http://dl.acm.org/citation.cfm?id=1531514.1531530.
- Tang, K., J. Lin, J. Hong, D. Siewiorek, and N. Sadeh. 2010. “Rethinking Location Sharing: Exploring the Implications of Social-driven vs. Purpose-driven Location Sharing.” Proceedings of the 12th ACM international conference adjunct papers on ubiquitous computing, 85–94. https://doi.org/https://doi.org/10.1145/1864349.1864363.
- Triandis, Harry Charalambos. 1995. Individualism & Collectivism: Vol. xv. Boulder, Colorado: Westview Press.
- Triandis, Harry C., R. Bontempo, M. J. Villareal, M. Asai, and N. Lucca. 1988. “Individualism and Collectivism: Cross-Cultural Perspectives on Self-Ingroup Relationships.” Journal of Personality and Social Psychology 54 (2): 323–338.
- Tsoi, H. K., and L. Chen. 2011. “From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey. Privacy, Security, Risk and Trust (Passat).” 2011 IEEE third international conference on and social computing (Socialcom), 457–464. https://doi.org/https://doi.org/10.1109/PASSAT/SocialCom.2011.71.
- Tufekci, Z. 2008. “Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites.” Bulletin of Science, Technology & Society 28 (1): 20–36. doi:https://doi.org/10.1177/0270467607311484.
- Wang, Y., Y. Li, and J. Tang. 2015. “Dwelling and Fleeting Encounters: Exploring Why People Use WeChat – A Mobile Instant Messenger.” Proceedings of the 33rd annual ACM conference extended abstracts on human factors in computing systems, 1543–1548. https://doi.org/https://doi.org/10.1145/2702613.2732762.
- Wang, Y., G. Norice, and L. F. Cranor. 2011. “Who is Concerned About What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites.” International conference on trust and trustworthy computing, 146–153. http://link.springer.com/10.1007%2F978-3-642-21599-5_11.
- Wheeler, L., H. T. Reis, and M. H. Bond. 1989. “Collectivism-individualism in Everyday Social Life: The Middle Kingdom and the Melting pot.” Journal of Personality and Social Psychology 57 (1): 79–86. doi:https://doi.org/10.1037/0022-3514.57.1.79.
- Wheeless, L. R., and J. Grotz. 1976. “Conceptualization and Measurement of Reported Self-Disclosure.” Human Communication Research 2 (4): 338–346.
- Wiese, J., P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong, and J. Zimmerman. 2011. “Are you Close with me? Are you Nearby? Investigating Social Groups, Closeness, and Willingness to Share.” Proc. UbiComp, 197–206. doi:https://doi.org/10.1145/2030112.2030140
- Wilkinson, D., M. Namara, K. Badillo-Urquiola, P. J. Wisniewski, B. P. Knijnenburg, X. Page, E. Toch, and J. Romano-Bergstrom. 2018. “Moving Beyond a ‘One-size Fits All’: Exploring Individual Differences in Privacy.” Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, W16:1–W16:8. https://doi.org/https://doi.org/10.1145/3170427.3170617.
- Wisniewski, P., Knijnenburg, B. P., and Lipford, H. R. 2020. “Making Privacy Personal: Profiling Social Network Users as a Prerequisite for Privacy Education and Nudging.” International Journal of Human-Computer Studies 98: 95–108. https://doi.org/https://doi.org/10.1016/j.ijhcs.2016.09.006.
- Wisniewski, P., H. Lipford, and D. Wilson. 2012. “Fighting for My Space: Coping Mechanisms for Sns Boundary Regulation.” Proceedings of the SIGCHI conference on human factors in computing systems, 609–618. https://doi.org/https://doi.org/10.1145/2207676.2207761.
- Xu, H., H.-H. Teo, B. C. Y. Tan, and R. Agarwal. 2009. “The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.” Journal of Management Information Systems 26 (3): 135–174. doi:https://doi.org/10.2753/MIS0742-1222260305.
- Yamagishi, T. 1988. “The Provision of a Sanctioning System in the United States and Japan.” Social Psychology Quarterly 51 (3): 265–271. doi:https://doi.org/10.2307/2786924.
- Yamagishi, T., and M. Yamagishi. 1994. “Trust and Commitment in the United States and Japan.” Motivation and Emotion 18 (2): 129–166. doi:https://doi.org/10.1007/BF02249397.
- Zhang, N., C. Wang, and Y. Xu. 2011. “Privacy in Online Social Networks.” Proceedings of the 2011 international conference on information systems. Shanghai.