2,597
Views
10
CrossRef citations to date
0
Altmetric
Articles

Users' Information Privacy Concerns and Privacy Protection Behaviors in Social Networks

ORCID Icon &

References

  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on Facebook. In G. Danezis & P. Golle (Eds.), Privacy enhancing technologies (pp. 36–58). Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag.
  • Akhter, S. H. (2014). Privacy concern and online transactions: The impact of Internet self-efficacy and Internet involvement. Journal of Consumer Marketing, 31(2), 118–125. doi:10.1108/JCM-06-2013-0606
  • Altman, I. (1975). The environment and social behavior: Privacy personal space territory crowding. Monterey, CA: Brooks/Cole.
  • Anderson, J. C., & Gerbing, W. D. (1988). Structural equation modelling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411–423. doi:10.1037/0033-2909.103.3.411
  • ASSOCHAM Mahindra-SSG Report. (2015). Cyber and network security framework. Retrieved from http://www.assocham.org/newsdetail.php?id=4821
  • Awwal, M. A. (2011). An empirical investigation of the relationship between computer self-efficacy and information privacy concerns (Doctoral dissertation). Nova Southeastern University, Ft. Lauderdale, FL, USA.
  • Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice-Hall.
  • Bandura, A. (1989). Regulation of cognitive processes through perceived self-efficacy. Developmental Psychology, 25(5), 729–735. doi:10.1037/0012-1649.25.5.729
  • Bandura, A. (1995). Self efficacy in changing societies. Cambridge, England: Cambridge University Press.
  • Baren, J. V., Ijsselsteijn, W., Romero, N., Markopoulos, P., & Ruyter, B. (2003, October). Affective benefits in communication: The development and field-testing of a new questionnaire measure. Paper presented at the PRESENCE, Aalborg, Denmark.
  • Basak, E., & Calisir, F. (2015). An empirical study on factors affecting continuance intention of using Facebook. Computers in Human Behavior, 48, 181–189. doi:10.1016/j.chb.2015.01.055
  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1042. doi:10.2307/41409971
  • Big Brother Watch. (2013). New research: Global attitudes to privacy online. Retrieved from https://bigbrotherwatch.org.uk/2013/06/new-research-global-attitudes-to-privacy-online/
  • Blatterer, H. (2010). Social networking, privacy, and the pursuit of visibility. In H. Blatterer, P. Johnson, & M. Markus (Eds.), Modern privacy: Shifting boundaries, new forms (pp. 73–87). New York, NY: Palgrave Macmillan.
  • Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864. doi:10.25300/MISQ/2015/39.4.5
  • Burcu, B., Cavusoglu, H., & Benbasat, I. (2010). Understanding emergence and outcomes of information privacy concerns: A case of Facebook. Proceedings of the 31st International Conference on Information Systems (ICIS 2010), St. Louis, MO, USA (December 12–15, 2010).
  • Business Insider. (2015). Here's how much time people spend on Facebook per day. Retrieved from https://www.businessinsider.in/Heres-how-much-time-people-spend-on-Facebook-per-day/articleshow/47995030.cms
  • Byrne, B. M. (2010). Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming, 2nd ed. (Multivariate Applications Series), New York: Routledge.
  • Byrne, B. M. (2016). Structural Equation Modeling With AMOS: Basic Concepts, Applications, and Programming, Third Edition (Multivariate Applications Series), NY: Routledge.
  • Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167–182. doi:10.1109/TPC.2009.2017985
  • Chenoweth, T., Minch, R., & Gattiker, T. (2009, January). Application of protection motivation theory to adoption of protective technologies. Paper presented at the 42nd Hawaii International Conference on System Sciences, Honolulu, HI.
  • Cho, H. (2010). Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies. Journal of Information Privacy and Security, 6(1), 3–27. doi:10.1080/15536548.2010.10855879
  • Chu, S. C., & Choi, S. M. (2011). Electronic word-of-mouth in social networking sites: A cross-cultural study of the United States and China. Journal of Global Marketing, 24(3), 263–281. doi:10.1080/08911762.2011.592461
  • Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145–158. doi:10.2307/249749
  • Crossler, R. E. (2010, January). Protection motivation theory: Understanding determinants to backing up personal data. Paper presented at the 43rd Hawaii International Conference on System Sciences, Honolulu, HI.
  • Craighead, C. W., Ketchen, D. J., Dunn, K. S., & Hult, G. T. M. (2011). Addressing common method variance: guidelines for survey research on information technology, operations, and supply chain management. IEEE Transactions on Engineering Management, 58(3), 578–588.
  • Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297.
  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: Measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. doi:10.1002/ejsp.2049. doi:10.1080/01449290410001715723
  • Feng, Y., & Xie, W. (2014). Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153–162. doi:10.1016/j.chb.2014.01.009
  • Forbes. (2011). Facebook's Privacy Issues Are Even Deeper Than We Knew. Retrieved from https://www.forbes.com/sites/chunkamui/2011/08/08/facebooks-privacy-issues-are-even-deeper-than-we-knew/#644a31951421
  • Fornell, C. G., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. doi:10.2307/3151312
  • Grindley, E. J., Zizzi, S. J., & Nasypany, A. M. (2008). Use of protection motivation theory, affect, and barriers to understand and predict adherence to outpatient rehabilitation. Physical Therapy, 88(12), 1529–1540. doi:10.2522/ptj.20070076
  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2012). Multivariate Data Analysis, 7th ed., Upper Saddle River, NJ: Pearson Prentice Hall.
  • Hair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate data analysis: A global perspective (Vol. 7). Upper Saddle River, NJ: Pearson Education.
  • Harman, H. H. (1976). Modern factor analysis. Chicago, IL: University of Chicago Press.
  • Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298. doi:10.25300/MISQ/2013/37.1.12
  • Hsu, M. H., Ju, T. L., Yen, C. H., & Chang, C. M. (2007). Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65(2), 153–169. doi:10.1016/j.ijhcs.2006.09.003
  • Hudson, S., Huang, L., Roth, M. S., & Madden, T. J. (2016). The influence of social media interactions on consumer-brand relationships: A three-country study of brand perceptions and marketing behaviors. International Journal of Research in Marketing, 33(1), 27–41. doi:10.1016/j.ijresmar.2015.06.004
  • Ijsselsteijn, W., van Baren, J., Markopoulos, P., Romero, N., & De Ruyter, B. (2009). Measuring affective benefits and costs of mediated awareness: Development and validation of the ABC-Questionnaire. In P. Markopoulos, B. De Ruyter, & W. Mackay (Eds.), Awareness systems (pp. 473–488). London, England: Springer-Verlag.
  • Jeong, Y., & Kim, Y. (2017). Privacy concerns on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior, 69, 302–310. doi:10.1016/j.chb.2016.12.042
  • Kansal, P. (2014). Online privacy concerns and consumer reactions: Insights for future strategies. Journal of Indian Business Research, 6(3), 190–212. doi:10.1108/JIBR-06-2012-0046
  • Korzaan, M. L., & Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4), 15–24.
  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. doi:10.1057/jit.2010.6
  • Kumar Mishra, M., Kesharwani, A., & Das, D. (2016). The relationship between risk aversion, brand trust, brand affect and loyalty: Evidence from the FMCG industry. Journal of Indian Business Research, 8(2), 78–97.
  • Lanier, C. D., & Saini, A. (2008). Understanding consumer privacy: A review and future directions. Academy of Marketing Science Review, 12(2), 1–49.
  • LaRose, R., & Rifon, N. J. (2007). Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. Journal of Consumer Affairs, 41(1), 127–149. doi:10.1111/j.1745-6606.2006.00071.x
  • LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005, May). Online safety strategies: A content analysis and theoretical assessment. Paper presented at the 55th Annual Conference of the International Communication Association, New York, NY.
  • Lee, D., Larose, R., & Rifon, N. (2008). Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454.
  • Lee, T. S., Kilbreath, S. L., Sullivan, G., Refshauge, K. M., & Beith, J. M. (2007a). The development of an arm activity survey for breast cancer survivors using the Protection Motivation Theory. BMC Cancer, 7(1), 75. doi:10.1186/1471-2407-7-75
  • Lee, Y., Lee, J. Y., & Liu, Y. (2007b). Protection motivation theory in information system adoption: A case of anti-plagiarism system. Proceedings of the 13th Americas Conference on Information Systems (AMCIS 2007), Keystone, CO (August 9–12, 2007), 62.
  • Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.
  • Lim, J. S., Heinrichs, J. H., & Lim, K. S. (2017). Gender and hedonic usage motive differences in social media site usage behavior. Journal of Global Marketing, 30(3), 1–13. doi:10.1080/08911762.2017.1308615
  • Lindell, M. K., & Whitney, D. J. (2001). Accounting for common method variance in cross-sectional research designs. Journal of Applied Psychology, 86(1), 114–121.
  • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469–479. doi:10.1016/0022-1031(83)90023-9
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi:10.1287/isre.1040.0032
  • Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29.
  • Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward an understanding of the online consumer's risky behavior and protection practices. Journal of Consumer Affairs, 43(3), 449–473. doi:10.1111/j.1745-6606.2009.01148.x
  • Milne, S., Orbell, S., & Sheeran, P. (2002). Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British Journal of Health Psychology, 7(2), 163–184. doi:10.1348/135910702169420
  • Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. doi:10.1016/j.chb.2012.07.008
  • Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). New York, NY: McGraw-Hill.
  • Pahnila, S., Siponen, M., & Mahmood, A. (2007). Which factors explain employees' adherence to information security policies? An empirical study. Proceedings of the Pacific Asia Conference of the Information Systems, Auckland, New Zealand (July 4–6, 2007).
  • Panek, E. T., Nardis, Y., & Konrath, S. (2013). Mirror or megaphone? How relationships between narcissism and social networking site use differ on Facebook and Twitter. Computers in Human Behavior, 29(5), 2004–2012. doi:10.1016/j.chb.2013.04.012
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41. doi:10.1509/jppm.19.1.27.16941
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. doi:10.1037/0021-9010.88.5.879
  • Prentice-Dunn, S., & Rogers, R. W. (1986). Protection motivation theory and preventive health: Beyond the health belief model. Health Education Research, 11(3), 153–161. doi:10.1093/her/1.3.153
  • Raschke, R. L., Krishen, A. S., & Kachroo, P. (2014). Understanding the components of information privacy threats for location-based services. Journal of Information Systems, 28(1), 227–242. doi:10.2308/isys-50696
  • Reid, M., & Levy, Y. (2008). Integrating trust and computer self-efficacy with TAM: An empirical assessment of customers' acceptance of banking information systems (BIS) in Jamaica. Journal of Internet Banking and Commerce, 12(3), 1–17.
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. doi:10.1080/00223980.1975.9915803
  • Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. E. Petty (Eds.), Social psychophysiology: A sourcebook (pp. 153–176). New York, NY: Guilford Press.
  • Schwarzer, R., & Renner, B. (2000). Social-cognitive predictors of health behavior: Action self-efficacy and coping self-efficacy. Health Psychology, 19(5), 487–495. doi:10.1037/0278-6133.19.5.487
  • Searle, A., Norman, P., Harrad, R., & Vedhara, K. (2002). Psychosocial and clinical determinants of compliance with occlusion therapy for amblyopic children. Eye, 16(2), 150–155. doi:10.1038/sj/eye/6700086
  • Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising, 28(3), 37–51. doi:10.1080/00913367.1999.10673588
  • Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing, 19(1), 62–73. doi:10.1509/jppm.19.1.62.16949
  • Sheeran, P., Harris, P. R., & Epton, T. (2014). Does heightening risk appraisals change people's intentions and behavior? A meta-analysis of experimental studies. Psychological Bulletin, 140(2), 511–543. doi:10.1037/a0033065
  • Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438. doi:10.1016/j.intcom.2010.05.001
  • Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167–196. doi:10.2307/249477
  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016. doi:10.2307/41409970
  • Son, J. Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(2), 503–529. doi:10.2307/25148854
  • Soper, D. S. (2015). A-priori sample size calculator for structural equation models [Software]. Available from http://www.danielsoper.com/statcalc
  • Statista. (2016). India: Number of Facebook users in India from 2015-2022. Retrieved from https://www.statista.com/statistics/304827/number-of-facebook-users-in-india/
  • Sung, Y., Kim, Y., Kwon, O., & Moon, J. (2010). An explorative study of Korean consumer participation in virtual brand communities in social network sites. Journal of Global Marketing, 23(5), 430–445. doi:10.1080/08911762.2010.521115
  • Umeh, K. (2004). Cognitive appraisals, maladaptive coping, and past behaviour in protection motivation. Psychology & Health, 19(6), 719–735. doi:10.1080/0887044042000196692
  • VentureBeat. (2016). Facebook passes 1.65 billion monthly active users, 54% access the service only on mobile. Retrieved from https://venturebeat.com/2016/04/27/facebook-passes-1-65-billion-monthly-active-users-54-access-the-service-only-on-mobile/
  • Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & Ijsselsteijn, W. (2008). Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review, 26(1), 20–43. doi:10.1177/0894439307307682
  • Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531–542. doi:10.1016/j.ijinfomgt.2016.03.003
  • Woon, I., Tan, G. W., & Low, R. (2005). A protection motivation theory approach to home wireless security. Proceedings of the 26th International Conference on Information Systems, Las Vegas, NV (December 11–14, 2015), 367–380.
  • Xie, E., Teo, H. H., & Wan, W. (2006). Volunteering personal information on the internet: Effects of reputation, privacy notices, and rewards on online consumer behavior. Marketing Letters, 17(1), 61–74. doi:10.1007/s11002-006-4147-1
  • Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's information privacy concerns: Toward an integrative view. Proceedings of 29th International Conference on Information Systems, Paris, France (December 14–17, 2008), 1–16.
  • Youn, S. (2005). Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86–110. doi:10.1207/s15506878jobem4901_6
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.
  • Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479–500. doi:10.1080/1369118X.2013.777757
  • Zhang, L., & McDowell, W. C. (2009). Am I really at risk? Determinants of online users' intentions to use strong passwords. Journal of Internet Commerce, 8(34), 180–197. doi:10.1080/15332860903467508

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.