1,273
Views
2
CrossRef citations to date
0
Altmetric
Research Articles

Privacy Literacy on Social Media: Its Predictors and Outcomes

Pages 217-232 | Received 21 Nov 2020, Accepted 10 Feb 2022, Published online: 18 Apr 2022

References

  • Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification [Paper presentation]. In Proceedings of the 5th ACM Conference on Electronic Commerce (pp. 21–29). ACM. https://doi.org/10.1145/988772.988777
  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science (New York, N.Y.), 347(6221), 509–514. https://doi.org/10.1126/science.aaa1465
  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2020). Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age. Journal of Consumer Psychology, 30(4), 736–758. https://doi.org/10.1002/jcpy.1191
  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis & P. Golle (Eds.), International workshop on privacy enhancing technologies (pp. 36–58). Springer.
  • Acquisti, A., & Grossklags, J. (2004). Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting. In J. Camp & R. Lewis (Eds.), The economics of information security (pp. 1–15). Kluwer Academic Publishers.
  • Adams, M. (2017). Big data and individual privacy in the age of the Internet of Things. Technology Innovation Management Review, 7(4), 12–24. https://doi.org/10.22215/timreview/1067
  • Bartsch, M., & Dienlin, T. (2016). Control your Facebook: An analysis of online privacy literacy. Computers in Human Behavior, 56, 147–154. https://doi.org/10.1016/j.chb.2015.11.022
  • Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67(1), 26–53. https://doi.org/10.1111/jcom.12276
  • Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588–606. https://doi.org/10.1037/0033-2909.88.3.588
  • Bernstein, M. S., Bakshy, E., Burke, M., & Karrer, B. (2013). Quantifying the invisible audience in social networks [Paper presentation]. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 21–30. https://doi.org/10.1145/2470654.2470658
  • Besmer, A., & Lipford, H. R. (2010). Moving beyond untagging: Photo privacy in a tagged world [Paper presentation]. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1563–1572. https://doi.org/10.1145/1753326.1753560
  • Bloom, B. S., Hastings, J. T., & Madaus, G. F. (1971). Handbook on formative and summative evaluation of student learning. McGraw-Hill.
  • Bodie, G. D., & Dutta, M. J. (2008). Understanding health literacy for strategic health marketing: eHealth literacy, health disparities, and the digital divide. Health Marketing Quarterly, 25(1–2), 175–203. https://doi.org/10.1080/07359680802126301
  • Boomsma, A., & Hoogland, J. J. (2001). The robustness of LISREL modeling revisited. In R. Cudeck, S. du Toit, & D. Sörbom (Eds.), Structural equation models: Present and future. A Festschrift in honor of Karl Jöreskog (pp. 139–168). Scientific Software International.
  • boyd, D. (2018, March 9). You think you want media literacy…Do you? Data & Society. https://points.datasociety.net/you-think-you-want-media-literacy-do-you-7cad6af18ec2
  • boyd, D., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday. https://doi.org/10.5210/fm.v15i8.3086
  • Bräunlich, K., Dienlin, T., Eichenhofer, J., Helm, P., Trepte, S., Grimm, R., Seubert, S., & Gusy, C. (2021). Linking loose ends: An interdisciplinary privacy and communication model. New Media & Society, 23(6), 1443–1464. https://doi.org/10.1177/1461444820905045
  • Burgoon, J. (1982). Privacy and communication. In M. Burgoon (Ed.), Communication yearbook (Vol. 6, pp. 206–249). SAGE. https://doi.org/10.1080/23808985.1982.11678499
  • Cambridge Dictionary (n.d). Literacy. https://dictionary.cambridge.org/us/dictionary/english/literacy
  • Cameron, J., & Stinson, D. A. (2019). Gender (mis)measurement: Guidelines for respecting gender diversity in psychological research. Social and Personality Psychology Compass, 13(11), e12506. https://doi.org/10.1111/spc3.12506
  • Chang-Wells, G. L. M., & Wells, G. (1993). Dynamics of discourse: Literacy and the construction of knowledge. In E. A. Forman, N. Minick, & C. A. Stone (Eds.), Contexts for learning: Sociocultural dynamics in children’s development (pp. 58–90). Oxford University Press.
  • Choi, N. G., & DiNitto, D. M. (2013). The digital divide among low-income homebound older adults: Internet use patterns, eHealth literacy, and attitudes toward computer/Internet use. Journal of Medical Internet Research, 15(5), e93. https://doi.org/10.2196/jmir.2645
  • Cleveland-Innes, M., & Ally, M. (2013). Affective learning outcomes in workplace training: A test of synchronous vs. asynchronous online learning environments. Canadian Journal of University Continuing Education, 30(1), 15–35. https://doi.org/10.21225/D5259V
  • Cohen, J. E. (2012). Configuring the networked self: Law, code, and the play of everyday practice. Yale University Press.
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
  • DeGroot, J. M., & Vik, T. A. (2017). “We were not prepared to tell people yet”: Confidentiality breaches and boundary turbulence on Facebook. Computers in Human Behavior, 70, 351–359. https://doi.org/10.1016/j.chb.2017.01.016
  • Desimpelaere, L., Hudders, L., & Van de Sompel, D. (2020). Knowledge as a strategy for privacy protection: How a privacy literacy training affects children’s online disclosure behavior. Computers in Human Behavior, 110, 106382. https://doi.org/10.1016/j.chb.2020.106382
  • Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3), 285–297. https://doi.org/10.1002/ejsp.2049
  • DiMaggio, P., & Hargittai, E. (2001). From the “Digital Divide” to “Digital Inequality”: Studying internet use as penetration increases. Working Paper 19. Center for Arts and Cultural Policy Studies, Woodrow Wilson School, Princeton University.
  • DiMaggio, P., Hargitta, E., Neuman, W. R., & Robinson, J. P. (2001). Social implications of the Internet. Annual Review of Sociology, 27(1), 307–336. https://doi.org/10.1146/annurev.soc.27.1.307
  • Ellison, N. B., & Vitak, J. (2015). Social media affordances and their relationship to social capital processes. In S. Sundar (Ed.), The handbook of psychology of communication technology (pp. 205–227). Wiley-Blackwell.
  • Ellison, N. B., Vitak, J., Steinfield, C., Gray, R., & Lampe, C. (2011). Negotiating privacy concerns and social capital needs in a social media environment. In S. Trepte, & L. Reinecke (Eds.), Privacy online: Perspectives on privacy and self-disclosure in the social web (pp. 19–32). Springer.
  • Epstein, D., & Quinn, K. (2020). Markers of online privacy marginalization: Empirical examination of socioeconomic disparities in social media privacy attitudes, literacy, and behavior. Social Media + Society, 6(2), 205630512091685. https://doi.org/10.1177/2056305120916853
  • Eshet-Alkalai, Y. (2004). Digital literacy: A conceptual framework for survival skills in the digital era. Journal of Educational Multimedia and Hypermedia, 13(1), 93–106. https://www.learntechlib.org/primary/p/4793/
  • Ferdman, B. (1990). Literacy and cultural identity. Harvard Educational Review, 60(2), 181–205. https://doi.org/10.17763/haer.60.2.k10410245xxw0030
  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153–160. https://doi.org/10.1016/j.chb.2008.08.006
  • Ferro, E., Helbig, N. C., & Gil-Garcia, J. R. (2011). The role of IT literacy in defining digital divide policy needs. Government Information Quarterly, 28(1), 3–10. https://doi.org/10.1016/j.giq.2010.05.007
  • Gangadharan, S. P. (2017). The downside of digital inclusion: Expectations and experiences of privacy and surveillance among marginal Internet users. New Media & Society, 19(4), 597–615. https://doi.org/10.1177/1461444815614053
  • Gaver, W. W. (1991). Technology affordances [Paper presentation]. In Proceedings of the SCIGCHI Conference on Human Factors in Computing Systems Reaching Through Technology – CHI’91 (pp. 79–84). ACM Press.
  • Gilster, P. (1997). Digital literacy. Wiley.
  • Gómez, D. C. (2021). The third digital divide and Bourdieu: Bidirectional conversion of economic, cultural, and social capital to (and from) digital capital among young people in Madrid. New Media & Society, 23(9), 2534–2553. https://doi.org/10.1177/1461444820933252
  • Goode, J. (2010). The digital identity divide: how technology knowledge impacts college students. New Media & Society, 12(3), 497–513. https://doi.org/10.1177/1461444809343560
  • Griffith, T. L. (1999). Technology features as triggers for sensemaking. Academy of Management Review, 24(3), 472–488. https://doi.org/10.5465/amr.1999.2202132
  • Hargittai, E. (2007a). A framework for studying differences in people’s digital media uses. In N. Kutscher & H.-U. Otto (Ed.), Cyberworld unlimited? (pp. 121–137). VS Verlag für Sozialwissenschaften/GWV Fachverlage GmbH.
  • Hargittai, E. (2007b). Whose space? Differences among users and non-users of social network sites. Journal of Computer-Mediated Communication, 13(1), 276–297. https://doi.org/10.1111/j.1083-6101.2007.00396.x
  • Hargittai, E., & Litt, E. (2013). New strategies for employment? Internet skills and online privacy practices during people’s job search. IEEE Security & Privacy, 11(3), 38–45. https://doi.org/10.1109/MSP.2013.6
  • Hargittai, E., & Marwick, E. (2016). “What can I really do” Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737–3757.
  • Helm, P., & Seubert, S. (2020). Normative paradoxes of privacy: Literacy and choice in platform societies. Surveillance & Society, 18(2), 185–198. https://doi.org/10.24908/ss.v18i2.13356
  • Hooper, D., Coughlan, J., & Mullen, M. R. (2008). Structural equation modeling: Guidelines for determining model fit. The Electronic Journal of Business Research Methods, 6(1), 53–60.
  • Hsieh, Y. P. (2012). Online social networking skills: The social affordances approach to digital inequality. First Monday, 17(4). https://doi.org/10.5210/fm.v17i4.3893
  • Humphreys, L., & Wilken, R. (2015). Social media, small businesses, and the control of information. Information, Communication & Society, 18(3), 295–309. https://doi.org/10.1080/1369118X.2014.989249
  • Hutchby, I. (2001). Technologies, texts, and affordances. Sociology, 35(2), 441–456. https://doi.org/10.1177/S0038038501000219
  • Jarvenpaa, S. L., & Staples, D. S. (2001). Exploring perceptions of organizational ownership of information and expertise. Journal of Management Information Systems, 18(1), 151–183. https://doi.org/10.1080/07421222.2001.11045673
  • Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122–134. https://doi.org/10.1016/j.cose.2015.07.002
  • Kontos, E., Blake, K. D., Chou, W.-Y S., & Prestin, A. (2014). Predictors of eHealth usage: Insights on the digital divide from the Health Information National Trends Survey 2012. Journal of Medical Internet Research, 16(7), e172. https://doi.org/10.2196/jmir.3117
  • Krathwohl, D. R., Bloom, B. S., & Masia, B. B. (1964). Taxonomy of educational objectives; The classification of educational goals. Handbook II: The affective domain. Longman, Green.
  • Kyriazos, T. A. (2018). Applied psychometrics: Sample size and sample power consideration in factor analysis (EFA, CFA) and SEM in general. Psychology, 09(08), 2207–2230. https://doi.org/10.4236/psych.2018.98126
  • Kuo, F. Y., Tseng, C. Y., Tseng, F. C., & Lin, C. S. (2013). A study of social information control affordances and gender difference in Facebook self-presentation. Cyberpsychology, Behavior and Social Networking, 16(9), 635–644. https://doi.org/10.1089/cyber.2012.0345
  • Langenderfer, J., & Miyazaki, A. D. (2009). Privacy in the information economy. Journal of Consumer Affairs, 43(3), 380–388. https://doi.org/10.1111/j.1745-6606.2009.01152.x
  • Lavin, M. (2006). Cookies: What do consumers know and what can they learn? Journal of Targeting, Measurement and Analysis for Marketing, 14(4), 279–288. https://doi.org/10.1057/palgrave.jt.5740188
  • Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1), 79–100. https://doi.org/10.1111/j.1083-6101.2008.01432.x
  • Li, X., Chen, W., & Straubhaar, J. D. (2018). Concerns, skills, and activities: Multilayered privacy issues in disadvantaged urban communities. International Journal of Communication, 12, 1269–1290.
  • Lindqvist, A., Sendén, M. G., & Renström, E. A. (2021). What is gender, anyway: a review of the options for operationalizing gender. Psychology & Sexuality, 12(4), 332–344. https://doi.org/10.1080/19419899.2020.1729844
  • Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29(4), 1649–1656. https://doi.org/10.1016/j.chb.2013.01.049
  • Litt, E., & Hargittai, E. (2014). Smile, snap, and share? A nuanced approach to privacy and online photo-sharing. Poetics, 42, 1–21. https://doi.org/10.1016/j.poetic.2013.10.002
  • Livingstone, S. (2004). Media literacy and the challenge of new information and communication technologies. The Communication Review, 7(1), 3–14. https://doi.org/10.1080/10714420490280152
  • Livingstone, S. (2008). Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10(3), 393–411. https://doi.org/10.1177/1461444808089415
  • Livingstone, S., Stoilova, M., & Nandagiri, R. (2020). Data and privacy literacy: The role of the school in educating children in a datafied society. In D. Frau-Meigs (Ed.), Handbook on media education research (pp. 413–425). Wiley Blackwell.
  • Lonsdale, M., McCurry, D. (2004). Literacy in the new millennium. Retrieved September 5, 2021, from https://files.eric.ed.gov/fulltext/ED494062.pdf
  • Marwick, A. E., & Boyd, D. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133. https://doi.org/10.1177/1461444810365313
  • Marwick, A. E., & Boyd, D. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051–1067. https://doi.org/10.1177/1461444814543995
  • McVeigh-Schultz, J., & Baym, N. K. (2015). Thinking of you: Vernacular affordance in the context of the microsocial relationship app, Couple. Social Media + Society, 1(2), 205630511560413–205630511560464. https://doi.org/10.1177/2056305115604649
  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57. https://doi.org/10.1287/orsc.11.1.35.12567
  • Montano, D., & Kasprzyk, D. (2002). The theory of reasoned action and the theory of planned behavior. In K. Glanz, B. K. Rimer, & F. M. Lewis (Eds.), Health behavior and health education: Theory, research, and practice (pp. 67–99). Jossey-Bass.
  • Morrison, B. (2013). Do we know what we think we know? An exploration of online social network users’ privacy literacy. Retrieved August 10, 2020, from http://library2.smu.ca/xmlui/bitstream/handle/01/28824/workplacereview_Apr2013_v10i1.pdf?sequence=1&isAllowed=y
  • Nagy, P., & Neff, G. (2015). Imagined affordance: Reconstructing at keyword for communication theory. Social Media + Society, 1(2), 205630511560338–205630511560339. https://doi.org/10.1177/2056305115603385
  • Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48. https://doi.org/10.1162/DAED_a_00113
  • Papacharissi, Z. (2010). Privacy as a luxury commodity. First Monday, 15(8). https://doi.org/10.5210/fm.v15i8.3075
  • Park, Y. J. (2013a). Digital literacy and privacy behavior online. Communication Research, 40(2), 215–236. https://doi.org/10.1177/0093650211418338
  • Park, Y. J. (2013b). Offline status, online status: Reproduction of social categories in personal information skill and knowledge. Social Science Computer Review, 31(6), 680–702. https://doi.org/10.1177/0894439313485202
  • Park, Y. J., & Jang, S. M. (2014). Understanding privacy knowledge and skill in mobile communication. Computers in Human Behavior, 38, 296–303. https://doi.org/10.1016/j.chb.2014.05.041
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. State University of New York Press.
  • Regan, P. M. (2002). Privacy as a common good in the digital world. Information, Communication & Society, 5(3), 382–405. https://doi.org/10.1080/13691180210159328
  • Ritzhaupt, A. D., Liu, F., Dawson, K., & Barron, A. E. (2013). Differences in students’ information and communication technology literacy based on socio-economic status, ethnicity, and gender. Journal of Research on Technology in Education, 45(4), 291–307. https://doi.org/10.1080/15391523.2013.10782607
  • Rotman, D. (2009, February). Are you looking at me? Social media and privacy literacy [Poster presentation]. iConference, Chapel Hill, NC.
  • Ryle, G. (1949). The concept of mind. Hutchinson.
  • Shamsi, J. A., & Khojaye, M. A. (2018). Understanding privacy violations in big data systems. IT Professional, 20(3), 73–81. https://doi.org/10.1109/MITP.2018.032501750
  • Sindermann, C., Schmitt, H. S., Kargl, F., Herbert, C., & Montag, C. (2021). Online privacy literacy and online privacy behavior – The role of crystallized intelligence and personality. International Journal of Human-Computer Interaction, 37(15), 1455–1466. https://doi.org/10.1080/10447318.2021.1894799
  • Sivo, S. A., Fan, X., Witta, E. L., & Willse, J. T. (2006). The search of “optimal” cutoff properties: Fit index criteria in structural equation modeling. The Journal of Experimental Education, 74(3), 267–288. https://doi.org/10.3200/JEXE.74.3.267-288
  • Solove, D. J. (2021). The myth of the privacy paradox. George Washington Law Review, 89(1).
  • Stalder, F. (2011). Autonomy beyond privacy: A rejoinder to Bennett. Surveillance & Society, 8(4), 508–512. https://doi.org/10.24908/ss.v8i4.4188
  • Steinfield, C., Ellison, N. B., & Lampe, C. (2008). Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. Journal of Applied Developmental Psychology, 29(6), 434–445. https://doi.org/10.1016/j.appdev.2008.07.002
  • Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: Examining a privacy-enhancing behavior in Facebook. In CHI 2010 Proceedings (pp. 1553–1562). ACM.
  • Taneja, A., Vitrano, J., & Gengo, N. J. (2014). Rationality-based beliefs affecting individual’s attitude and intention to use privacy controls on Facebook: An empirical investigation. Computers in Human Behavior, 38, 159–173. https://doi.org/10.1016/j.chb.2014.05.027
  • Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1–12. https://doi.org/10.1016/j.chb.2018.11.046
  • Trepte, S., Teutsch, D., Masur, P. K., Eicher, C., Fischer, M., Hennhöfer, A., & Lind, F. (2015). Do people know about privacy and data protection strategies? Towards the “online privacy literacy scale” (OPLIS). In S. Gutwirth, R. Leenes, & P. de Hert (Eds.), Reforming European data protection law (Vol. 20, pp. 333–365). Springer.
  • Turow, J., & Hennessy, M. (2007). Internet privacy and institutional trust: Insights from a national survey. New Media & Society, 9(2), 300–318. https://doi.org/10.1177/1461444807072219
  • van Deursen, A., & van Dijk, J. (2014). The digital divide shifts to differences in usage. New Media & Society, 16(3), 507–526. https://doi.org/10.1177/1461444813487959
  • van Dijk, J. (2017). Digital divide: Impact of access. In P. Rössler (Ed.), The international encyclopedia of media effects (Vol. IV, pp. 384–392). Willey-Blackwell.
  • Vitak, J. (2015, July 22–24). Balancing privacy concerns and impression management strategies on Facebook. Symposium on Usable Privacy and Security (SOUPS), Ottawa, Ontario, Canada. Retrieved from https://cups.cs.cmu.edu/soups/2015/papers/ppsVitak.pdf
  • Vitak, J., & Kim, J. (2014). You can’t block people offline: Examining how Facebook’s affordances shape the disclosure process. In Proceedings of the 17th ACM conference on Computer Supported Cooperative Work, 461–474. https://doi.org/10.1145/2531602.2531672
  • Westin, A. (1967). Privacy and freedom. Atheneum.
  • Wilson, D., Valacich, J. (2012). Unpacking the privacy paradox: Irrational decision-making within the privacy calculus. In Proceedings of the International Conference on Information Systems. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.690.1819&rep=rep1&type=pdf
  • Yang, K. C. C., & Kang, Y. (2015). Exploring big data and privacy in strategic communication campaigns: A cross-cultural study of mobile social media users’ daily experiences. International Journal of Strategic Communication, 9(2), 87–101. https://doi.org/10.1080/1553118X.2015.1008635

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.