47
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Beyond the Birthday Cake Emoji: Unraveling Gender Differences and Behavioral Nuances in Nigerian Birthday Disclosures on Social Media

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Received 01 Oct 2023, Accepted 01 Mar 2024, Published online: 25 Mar 2024

References

  • Abdul Manap, N., Abdul Rahim, A., & Taji, H. (2015). Cyberspace identity theft: An overview. Mediterranean Journal of Social Sciences, 6(4), 209. https://doi.org/10.5901/mjss.2015.v6n4s3p290
  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis, P. Golle (Eds.), Privacy enhancing technologies. PET 2006. Lecture Notes in Computer Science (Vol. 4258, pp. 36–58). Springer.
  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514. https://doi.org/10.1126/science.aaa1465
  • Acquisti, A., Brandimarte, L., & Loewenstein, G. (2020). Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age. Journal of Consumer Psychology, 30(4), 736–758. https://doi.org/10.1002/jcpy.1191
  • Adetayo, A. J., Lawal, F. M., Enamudu, A. I., & Gbotoso, A. O. (2022). Ethno-religious diversity in Nigeria academic libraries: Role of swarm intelligence on teams. Library Leadership & Management, 36(3). https://doi.org/10.5860/llm.v36i3.7509
  • Akinsuyi, T. (2022). Fraudsters Clone Pius Akinyelure’s Facebook, Demand ₦275,000 For NNPC Contracts. Daily Independent Nigeria. Retrieved from https://independent.ng/fraudsters-clone-akinyelures-account-demand-n275000-for-nnpc-contract-registration/
  • Aliyu, S., Salehzadeh Niksirat, K., Huguenin, K., & Cherubini, M. (2023). On the role and form of personal information disclosure in cyberbullying incidents. Proceedings on Privacy Enhancing Technologies, 2023(4), 468–483. https://doi.org/10.56553/popets-2023-0120
  • Allahverdi, F. Z. (2022). Relationship between perceived social media addiction and social media applications frequency usage among university students. Psychology in the Schools, 59(6), 1075–1087. https://doi.org/10.1002/pits.22662
  • Alsarkal, Y., Zhang, N., & Xu, H. (2018). Your privacy is your friend’s privacy: Examining interdependent information disclosure on online social networks. In Hawaii International Conference on System Sciences. https://doi.org/10.24251/HICSS.2018.111
  • Andreassen, C. S., Billieux, J., Griffiths, M. D., Kuss, D. J., Demetrovics, Z., Mazzoni, E., & Pallesen, S. (2016). The relationship between addictive use of social media and video games and symptoms of psychiatric disorders: A large-scale cross-sectional study. Psychology of Addictive Behaviors, 30(2), 252–262. https://doi.org/10.1037/adb0000160
  • Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55–69. https://doi.org/10.1016/j.tele.2019.03.003
  • Bollen, K. A. (1989). Structural equations with latent variables (1st ed.). Wiley. https://doi.org/10.1002/9781118619179
  • Brown, A. J. (2020). “Should I stay or should I leave?”: Exploring (dis)continued Facebook use after the Cambridge Analytica Scandal. Social Media + Society, 6(1), 205630512091388. https://doi.org/10.1177/2056305120913884
  • Carpenter, S., Shreeves, M., Brown, P., Zhu, F., & Zeng, M. (2018). Designing warnings to reduce identity disclosure. International Journal of Human–Computer Interaction, 34(11), 1077–1084. https://doi.org/10.1080/10447318.2017.1413792
  • Casaleiro, R., Silva, P., Simões, P., Boavida, F., & Monteiro, E. (2019). Protection and control of personal identiable information: The PoSeID-on approach. 3.
  • Chan, S. H., & Lay, Y. F. (2018). Examining the reliability and validity of research instruments using partial least squares structural equation modeling (PLS-SEM). Journal of Baltic Science Education, 17(2), 239–251. https://doi.org/10.33225/jbse/18.17.239
  • Columbus, O. (2014). African cultural values and inter-communal relations: The case with Nigeria. Developing Country Studies, 4(24), 208–218. https://www.iiste.org/Journals/index.php/DCS/article/viewFile/17135/17495
  • Cook, K. S., Cheshire, C., Rice, E. R. W., & Nakagawa, S. (2013). Social exchange theory. In J. DeLamater & A. Ward (Eds.), Handbook of social psychology (pp. 61–88). Springer Netherlands. https://doi.org/10.1007/978-94-007-6772-0_3
  • Dienlin, T., & Metzger, M. J. (2016). An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative U.S. sample. Journal of Computer-Mediated Communication, 21(5), 368–383. https://doi.org/10.1111/jcc4.12163
  • Dragan, I. M., & Isaic-Maniu, A. (2013). Snowball sampling completion. Journal of Studies in Social Sciences, 5(2), 160–177.
  • Dupnack, J. (2020). Michigan man’s identity stolen by Nigerian romance scammers. Fox News, 2.
  • Eboiyehi, F. A. (2015). Perception of old age: Its implications for care and support for the aged among the Esan of south-south Nigeria. Journal of International Social Research, 8(36), 340–340. https://doi.org/10.17719/jisr.2015369511
  • Eckert, S., & Metzger-Riftkin, J. (2020). Doxing. In The international encyclopedia of gender, media, and communication. John Wiley & Sons. https://doi.org/10.1002/9781119429128.iegmc009
  • Fernandes, T., & Pereira, N. (2021). Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online? Telematics and Informatics, 65, 101717. https://doi.org/10.1016/j.tele.2021.101717
  • Garba, A. A., Siraj, M. M., Othman, S. H., & Zogaan, W. A. (2021). Cybersecurity awareness of university students in analysis approach. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(12), 3739–3752. https://doi.org/10.17762/turcomat.v12i12.8152
  • Ghaiumy Anaraky, R., Byrne, K. A., Wisniewski, P. J., Page, X., & Knijnenburg, B. (2021). To disclose or not to disclose: Examining the privacy decision-making processes of older vs. younger adults. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (pp. 1–14). https://doi.org/10.1145/3411764.3445204
  • Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organizational capabilities perspective. Journal of Management Information Systems, 18(1), 185–214. https://doi.org/10.1080/07421222.2001.11045669
  • Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines (NIST Special Publication 800-63-3). National Institute of Standards and Technology. https://doi.org/10.6028/nist.sp.800-63-3
  • Gross, R., Acquisti, A., & Heinz, H. J. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society – WPES ’05. https://doi.org/10.1145/1102199.1102214
  • Hair, J. F., Hult, G. T. M., Ringle, C. M., Sarstedt, M., Danks, N. P., & Ray, S. (2021). Partial least squares structural equation modeling (PLS-SEM) using R: A workbook. Springer International Publishing. https://doi.org/10.1007/978-3-030-80519-7
  • Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139–152. https://doi.org/10.2753/MTP1069-6679190202
  • Heith, C., & Vieraitis, L. (2007). Identity theft: Assessing offenders’ strategies and perceptions of risk (219122). U.S. Department of Justice. Retrieved from https://www.ojp.gov/pdffiles1/nij/grants/219122.pdf
  • Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135. https://doi.org/10.1007/s11747-014-0403-8
  • Hofstede, G. (2011). Dimensionalizing cultures: The Hofstede model in context. Online Readings in Psychology and Culture, 2(1), 1–26. https://doi.org/10.9707/2307-0919.1014
  • Hollenbaugh, E. E., & Ferris, A. L. (2014). Facebook self-disclosure: Examining the role of traits, social cohesion, and motives. Computers in Human Behavior, 30, 50–58. https://doi.org/10.1016/j.chb.2013.07.055
  • Hong, S. J., & Cho, H. (2021). Privacy management and health information sharing via contact tracing during the COVID-19 pandemic: A hypothetical study on AI-based technologies. Health Communication, 38(5), 913–924. https://doi.org/10.1080/10410236.2021.1981565
  • Hu, M. (2020). Cambridge Analytica’s black box. Big Data & Society, 7(2), 205395172093809. https://doi.org/10.1177/2053951720938091
  • Huang, J., Kumar, S., & Hu, C. (2017). Gender differences in motivations for identity reconstruction on social network sites. International Journal of Human–Computer Interaction, 34(7), 591–602. https://doi.org/10.1080/10447318.2017.1383061
  • Irshad, S., & Soomro, R. (2018). Identity theft and social media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43–54. http://paper.ijcsns.org/07_book/201801/20180106.pdf
  • Kanwal, S., Pitafi, A. H., Akhtar, S., & Irfan, M. (2019). Online self-disclosure through social networking sites addiction: A case study of Pakistani university students. Interdisciplinary Description of Complex Systems, 17(1), 187–208. https://doi.org/10.7906/indecs.17.1.18
  • Kareem, K. (2023, July 7). Nigeria’s gender parity, worsened by the COVID-19 pandemic. Dataphyte. Retrieved from https://www.dataphyte.com/latest-reports/nigerias-gender-parity-worsened-by-the-covid-19-pandemic/#:∼:text=Nigeria%20is%20ranked%20130th%20out,the%20global%20gender%20gap%20report
  • Kaur, R., Sandhu, R. S., Gera, A., Kaur, T., & Gera, P. (2020). Intelligent voice bots for digital banking. In A. K. Somani, R. S. Shekhawat, A. Mundra, S. Srivastava, V. K. Verma (Eds.), Smart systems and IoT: Innovations in computing. Smart innovation, systems and technologies (Vol. 141). Springer. https://doi.org/10.1007/978-981-13-8406-6_38
  • Keküllüoğlu, D., Magdy, W., & Vaniea, K. (2022). From an authentication question to a public social event: Characterizing birthday sharing on Twitter (arXiv:2201.10655). arXiv. Retrieved from http://arxiv.org/abs/2201.10655
  • Kezer, M., Dienlin, T., & Baruh, L. (2022). Getting the privacy calculus right: Analyzing the relations between privacy concerns, expected benefits, and self-disclosure using response surface analysis. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 16(4), 1–17. https://doi.org/10.5817/CP2022-4-1
  • Kircaburun, K., Alhabash, S., Tosuntaş, Ş B., & Griffiths, M. D. (2018). Uses and gratifications of problematic social media use among university students: A simultaneous examination of the big five of personality traits, social media platforms, and social media use motives. International Journal of Mental Health and Addiction, 18(3), 525–547. https://doi.org/10.1007/s11469-018-9940-6
  • Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005
  • Laurenceau, J.-P., Barrett, L. F., & Pietromonaco, P. R. (1998). Intimacy as an interpersonal process: The importance of self-disclosure, partner disclosure, and perceived partner responsiveness in interpersonal exchanges. Journal of Personality and Social Psychology, 74(5), 1238–1251. https://doi.org/10.1037/0022-3514.74.5.1238
  • Lee, K., Kaiser, B., Mayer, J., & Narayanan, A. (2020). An empirical study of wireless carrier authentication for SIM swaps (pp. 61–79). Retrieved from https://www.ieee-security.org/TC/SPW2020/ConPro/papers/lee-conpro20.pdf
  • Liu, Z., Wang, X., & Liu, J. (2018). How digital natives make their self-disclosure decisions: A cross-cultural comparison. Information Technology & People, 32(3), 538–558. https://doi.org/10.1108/ITP-10-2017-0339
  • López, C., Hartmann, P., & Apaolaza, V. (2019). Gratifications on social networking sites: The role of secondary school students’ individual differences in loneliness. Journal of Educational Computing Research, 57(1), 58–82. https://doi.org/10.1177/0735633117743917
  • Mahamid, F. A., & Berte, D. Z. (2018). Social media addiction in geopolitically at-risk youth. International Journal of Mental Health and Addiction, 17(1), 102–111. https://doi.org/10.1007/s11469-017-9870-8
  • Malik, A., Dhir, A., & Nieminen, M. (2016). Uses and gratifications of digital photo sharing on Facebook. Telematics and Informatics, 33(1), 129–138. https://doi.org/10.1016/j.tele.2015.06.009
  • Maqbali, F. A., & Mitchell, C. J. (2019). Web password recovery: A necessary evil? In: K. Arai, R. Bhatia, & S. Kapoor (Eds.), Proceedings of the future technologies conference (FTC) 2018. FTC 2018. Advances in intelligent systems and computing (Vol. 881). Springer. https://doi.org/10.1007/978-3-030-02683-7_23
  • Menon, D. (2022a). Factors influencing Instagram Reels usage behaviours: An examination of motives, contextual age and narcissism. Telematics and Informatics Reports, 5, 100007. https://doi.org/10.1016/j.teler.2022.100007
  • Menon, D. (2022b). Uses and gratifications of photo sharing on Instagram. International Journal of Human–Computer Studies, 168, 102917. https://doi.org/10.1016/j.ijhcs.2022.102917
  • Mutambik, I., Almuqrin, A., Liu, Y., Alhossayin, M., & Qintash, F. H. (2021). Gender differentials on information sharing and privacy concerns on social networking sites. Journal of Global Information Management, 29(3), 236–255. https://doi.org/10.4018/JGIM.2021050110
  • Najjar, M., Dahabiyeh, L., & Algharabat, R. (2021). Users’ affect and satisfaction in a privacy calculus context. Online Information Review, 45(3), 577–598. https://doi.org/10.1108/OIR-02-2019-0054
  • O’Maonaigh, C., & Saxena, D. (2021, May 1). Investigating personalisation-privacy paradox among young Irish consumers: A case of smart speakers. In Conference: Proceedings of the 1st Virtual Conference on Implications of Information and Digital Technologies for Development, 2021. Retrieved from https://arxiv.org/ftp/arxiv/papers/2108/2108.09945.pdf
  • Office of the Privacy Commissioner of Canada (2016). Guidelines for identification and authentication—Office of the Privacy Commissioner of Canada. Priv.Gc.Ca. Retrieved from https://www.priv.gc.ca/en/privacy-topics/identities/identification-and-authentication/auth_061013/
  • Pervan, M., Curak, M., & Pavic Kramaric, T. (2017). The influence of industry characteristics and dynamic capabilities on firms’ profitability. International Journal of Financial Studies, 6(1), 4. https://doi.org/10.3390/ijfs6010004
  • Phua, J., Jin, S. V., & Kim, J. (2017). Uses and gratifications of social networking sites for bridging and bonding social capital: A comparison of Facebook, Twitter, Instagram, and Snapchat. Computers in Human Behavior, 72, 115–122. https://doi.org/10.1016/j.chb.2017.02.041
  • Pötzsch, S. (2009). Privacy awareness: A means to solve the privacy paradox? In V. Matyáš, S. Fischer-Hübner, D. Cvrček, & P. Švenda (Eds.), The future of identity in the information society (Vol. 298, pp. 226–236). Springer. https://doi.org/10.1007/978-3-642-03315-5_17
  • Prager, K. J., Shirvani, F. K., Garcia, J. J., & Coles, M. (2013). Intimacy and positive psychology. In M. Hojjat & D. Cramer (Eds.), Positive psychology of love (pp. 16–29). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780199791064.003.0002
  • Rahman, I. A., & Al-Emad, N. (2018). Structural relationship of leadership qualities with worker’s issues for Saudi Arabia’s construction industry. MATEC Web of Conferences, 250, 05002. https://doi.org/10.1051/matecconf/201825005002
  • Rajah, P. R. S., Dastane, O., Bakon, K. A., & Johari, Z. (2020). The effect of bad password habits on personal data breach. International Journal of Emerging Trends in Engineering Research, 8(10), 6950–6960. https://doi.org/10.30534/ijeter/2020/538102020
  • Reis, H. T., Maniaci, M. R., Caprariello, P. A., Eastwick, P. W., & Finkel, E. J. (2011). Familiarity does indeed promote attraction in live interaction. Journal of Personality and Social Psychology, 101(3), 557–570. https://doi.org/10.1037/a0022885
  • Ringle, C. M., Wende, S., & Becker, J. M. (2022). SmartPLS 4. SmartPLS GmbH. Retrieved from https://www.smartpls.com/
  • Rusdan, M. (2020). Designing of user authentication based on multi-factor authentication on wireless networks. Journal of Advanced Research in Dynamical and Control Systems, 12(1), 201–209. https://doi.org/10.5373/JARDCS/V12I1/20201030
  • Sasha, R., Alessandro, A., & Richard, S. (2010). Data breaches and identity theft: When is mandatory disclosure optimal? In TPRC 2010: Telecommunications Policy Research Conference.
  • Schlosser, A. E. (2020). Self-disclosure versus self-presentation on social media. Current Opinion in Psychology, 31, 1–6. https://doi.org/10.1016/j.copsyc.2019.06.025
  • Stănculescu, E. (2023). The Bergen Social Media Addiction Scale validity in a Romanian sample using item response theory and network analysis. International Journal of Mental Health and Addiction, 21(4), 2475–2492. https://doi.org/10.1007/s11469-021-00732-7
  • Stieger, S., Burger, C., Bohn, M., & Voracek, M. (2013). Who commits virtual identity suicide? Differences in privacy concerns, internet addiction, and personality between Facebook users and quitters. Cyberpsychology, Behavior, and Social Networking, 16(9), 629–634. https://doi.org/10.1089/cyber.2012.0323
  • Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1–12. https://doi.org/10.1016/j.chb.2018.11.046
  • Tope Aladenusi & Funmilola Odumuboni (2022). Nigeria cybersecurity outlook 2022. Deloitte. Retrieved from https://www.deloitte.com/content/dam/assets-zone1/gh/en/docs/services/risk-advisory/2023/Nigeria-Cybersecurity-Outlook-2022.pdf
  • Torre, I., Sanchez, O. R., Koceva, F., & Adorni, G. (2018). Supporting users to take informed decisions on privacy settings of personal devices. Personal and Ubiquitous Computing, 22(2), 345–364. https://doi.org/10.1007/s00779-017-1068-3
  • Trepte, S., Reinecke, L., Ellison, N. B., Quiring, O., Yao, M. Z., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media + Society, 3(1), 205630511668803. https://doi.org/10.1177/2056305116688035
  • U.S. Office of Privacy and Open Government (2021). Safeguarding information. U.S. Office of Privacy and Open Government. Retrieved from https://www.osec.doc.gov/opog/privacy/PII_BII.html
  • Van Der Geest, S. (1997). Money and respect: The changing value of old age in rural Ghana. Africa, 67(4), 534–559. https://doi.org/10.2307/1161107
  • Vogel, E. A., Rose, J. P., Okdie, B. M., Eckles, K., & Franz, B. (2015). Who compares and despairs? The effect of social comparison orientation on social media use and its outcomes. Personality and Individual Differences, 86(86), 249–256. https://doi.org/10.1016/j.paid.2015.06.026
  • Wagenseil, P. (2021, April 13). Here’s the one piece of personal info that you shouldn’t share online. Tom’s Guide. Retrieved from https://www.tomsguide.com/news/why-not-to-share-birthday
  • Yisa, V., Anaraky, R. G., Knijnenburg, B. P., & Orji, R. (2023). Investigating privacy decision-making processes among Nigerian men and women. Proceedings on Privacy Enhancing Technologies, 2023(1), 294–308. https://doi.org/10.56553/popets-2023-0018

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.