3,523
Views
19
CrossRef citations to date
0
Altmetric
Articles

Consumers’ Privacy Concern and Privacy Protection on Social Network Sites in the Era of Big Data: Empirical Evidence from College Students

ORCID Icon &

References

  • Ardiansyah, Yusfi, Paul Harrigan, Geoffrey Soutar, and Timothy Daly (2018), “Antecedents to Consumer Peer Communication through Social Advertising: A Self-Disclosure Theory Perspective,” Journal of Interactive Advertising, 18 (1), 55–71.
  • Attaran, Sharmin, Elaine M. Notarantonio, and Charles J. Quigley, Jr. (2015), “Consumer Perceptions of Credibility and Selling Intent among Advertisements, Advertorials, and Editorials: A Persuasion Knowledge Model Approach,” Journal of Promotion Management, 21 (6), 703–20.
  • Barnes, Susan B. (2006), “A Privacy Paradox: Social Networking in the United States,” First Monday, 11 (9), https://firstmonday.org/ojs/index.php/fm/article/view/1394/1312%2523.
  • Beam, Michael, Jeffrey Child, Myiah Hutchens, and Jay Hmielowski (2018), “Context Collapse and Privacy Management: Diversity in Facebook Friends Increases Online News Reading and Sharing,” New Media and Society, 20 (7), 2296–2314.
  • Bleier, Alexander, and Maik Eisenbeiss (2015), “The Importance of Trust for Personalized Online Advertising,” Journal of Retailing, 91 (3), 390–409.
  • Brinson, Nancy H., and Matthew S. Eastin (2016), “Juxtaposing the Persuasion Knowledge Model and Privacy Paradox: An Experimental Look at Advertising Personalization, Public Policy, and Public Understanding,” Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10 (1), article 7.
  • Brinson, Nancy H., Matthew S. Eastin, and Laura F. Bright (2019), “Advertising in a Quantified World: A Proposed Model of Consumer Trust, Attitude toward Personalized Advertising, and Outcome Expectancies,” Journal of Current Issues and Research in Advertising, 40 (1), 54–72.
  • Chang, Chen-Wei, and Jun Heo (2014), “Visiting Theories that Predict College Students’ Self-Disclosure on Facebook,” Computers in Human Behavior, 30 (January), 79–86.
  • Child, Jeffrey, Paul Haridakis, and Sandra Petronio (2012), “Blogging Privacy Rule Orientations, Privacy Management, and Content Deletion Practices: The Variability of Online Privacy Management Activity at Different Stages of Social Media Use,” Computers in Human Behavior, 28 (5), 1859–72.
  • Choi, Sujeong (2018), “What Promotes Smartphone-Based Mobile Commerce? Mobile-Specific and Self-Service Characteristics,” Internet Research, 28 (1), 105–22.
  • Clason, Dennis, and Thomas Dormody (1994), “Analyzing Data Measured by Individual Likert-Type Items,” Journal of Agricultural Education, 35 (4), 31–35.
  • Davis, Fred D., Richard Bagozzi, and Paul Warshaw (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, 35 (8), 982–1003.
  • Debatin, Bernhard, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes (2009), “Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences,” Journal of Computer-Mediated Communication, 15 (1), 83–108.
  • Dunteman, George (1989), Principal Components Analysis, London: Sage.
  • Eastin, Matthew S., Nancy H. Brinson, Alexandra Doorey, and Gary Wilcox (2016), “Living in a Big Data World: Predicting Mobile Commerce Activity through Privacy Concerns,” Computers in Human Behavior, 58 (May), 214–20.
  • Ellison, Nicole B., Charles Steinfield, and Cliff Lampe (2007), “The Benefits of Facebook ‘Friends:’ Social Capital and College Students’ Use of Online Social Network Sites,” Journal of Computer-Mediated Communication, 12 (4), 1143–68.
  • Feng, Yang, and Wenjing Xie (2014), “Teens’ Concern for Privacy when Using Social Networking Sites: An Analysis of Socialization Agents and Relationships with Privacy-Protecting Behaviors,” Computers in Human Behavior, 33 (April), 153–62.
  • Friestad, Marian, and Peter Wright (1994), “The Persuasion Knowledge Model: How People Cope with Persuasion Attempts,” Journal of Consumer Research, 21 (1), 1–31.
  • Garland, Ron (1991), “The Mid-Point on a Rating Scale: Is It Desirable?,” Marketing Bulletin, 2 (1), 66–70.
  • Greenwood, Shannon, Andrew Perrin, and Maeve Duggan (2016), “Social Media Update 2016,” Pew Research Center, November 11, http://www.pewinternet.org/2016/11/11/social-media-update-2016/.
  • Gupta, Babita, and Anitha Chennamaneni (2018), “Understanding Online Privacy Protection Behavior of the Older Adults: An Empirical Investigation,” Journal of Information Technology Management, 29 (3), 1–13.
  • Hallnäs, Lars, and Johan Redström (2002), “From Use to Presence: On the Expressions and Aesthetics of Everyday Computational Things,” ACM Transactions on Computer-Human Interaction (TOCHI), 9 (2), 106–24.
  • Heyman, Rob, Ralf De Wolf, and Jo Pierson (2014), “Evaluating Social Media Privacy Settings for Personal and Advertising Purposes,” Info, 16 (4), 18–32.
  • Hofacker, Charles, Edward Malthouse, and Fareena Sultan (2016), “Big Data and Consumer Behavior: Imminent Opportunities,” Journal of Consumer Marketing, 33 (2), 89–97.
  • Jagerson, John (2019), “Wall Street Likes Facebook’s Earnings,” Investopedia, February 1, https://www.investopedia.com/wall-street-likes-facebook-s-earnings-4586348.
  • Jin, Seung-A. Annie (2013), “Peeling Back the Multiple Layers of Twitter’s Private Disclosure Onion: The Roles of Virtual Identity Discrepancy and Personality Traits in Communication Privacy Management on Twitter,” New Media and Society, 15 (6), 813–33.
  • Jung, A-Reum, and Jun Heo (2019), “Ad Disclosure vs. Ad Recognition: How Persuasion Knowledge Influences Native Advertising Evaluation,” Journal of Interactive Advertising, 19 (1), 1–14.
  • Kang, Ruogu (2015), “Incognito Online: Why and How People Hide Their Information,” unpublished doctoral dissertation, Carnegie Mellon University.
  • Kang, Ruogu, Stephanie Brown, and Sara Kiesler (2013), “Why Do People Seek Anonymity on the Internet? Informing Policy and Design,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York: ACM, 2657–66.
  • Karanja, Alice W., Daniel W. Engels, Ghizlane Zerouali, and Ariel Francisco (2018), “Unintended Consequences of Location Information: Privacy Implications of Location Information Used in Advertising and Social Media,” SMU Data Science Review, 1 (3), article 13.
  • Kessinger, Kristen, and Aaron Berger (2014), “2014 ISACA IT Risk/Reward Barometer—US Consumer Results,” ISACA, October, http://www.isaca.org/SiteCollectionDocuments/2014-Risk-Reward-Survey/2014-US-Consumer-Data-Summary_res_Eng_1114.pdf.
  • Khang, Hyoungkoo, Eyun-Jung Ki, and Lan Ye (2012), “Social Media Research in Advertising, Communication, Marketing, and Public Relations, 1997–2010,” Journalism & Mass Communication Quarterly, 89 (2), 279–98.
  • Kumar, Senthil, Saravanakumar Kandasamy, and K. Deepa (2016), “On Privacy and Security in Social Media: A Comprehensive Study,” Procedia Computer Science, 78 (December), 114–19.
  • Lee, Haein, Hyejin Park, and Jinwoo Kim (2013), “Why Do People Share Their Context Information on Social Network Services? A Qualitative Study and an Experimental Study on Users’ Behavior of Balancing Perceived Benefit and Risk,” International Journal of Human-Computer Studies, 71 (9), 862–77.
  • Lewis, Kevin, Jason Kaufman, and Nicholas Christakis (2008), “The Taste for Privacy: An Analysis of College Student Privacy Settings in An Online Social Network,” Journal of Computer-Mediated Communication, 14 (1), 79–100.
  • Limpf, Nina, and Hilde Voorveld (2015), “Mobile Location-Based Advertising: How Information Privacy Concerns Influence Consumers’ Attitude and Acceptance,” Journal of Interactive Advertising, 15 (2), 111–23.
  • Linacre, John (2002), “Optimizing Rating Scale Category Effectiveness,” Journal of Applied Measurement, 3 (1), 85–106.
  • Liu, Qian, Mike Yao, Ming Yang, and Caixie Tu (2017), “Predicting Users’ Privacy Boundary Management Strategies on Facebook,” Chinese Journal of Communication, 10 (3), 295–311.
  • Madden, Mary (2014), “Public Perceptions of Privacy and Security in the Post-Snowden Era,” Pew Research Center, November 12, http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/.
  • Martin, Kelly, and Patrick Murphy (2017), “The Role of Data Privacy in Marketing,” Journal of the Academy of Marketing Science, 45 (2), 135–55.
  • Mesch, Gustavo, and Guy Beker (2010), “Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?,” Human Communication Research, 36 (4), 570–92.
  • Metzger, Miriam (2007), “Communication Privacy Management in Electronic Commerce,” Journal of Computer-Mediated Communication, 12 (2), 335–61.
  • Nelson, Michelle, Heejo Keum, and Ronald Yaros (2004), “Advertainment or Adcreep: Game Players’ Attitudes toward Advertising and Product Placements in Computer Games,” Journal of Interactive Advertising, 5 (1), 3–21.
  • Nisbett, Richard, and Lee Ross (1980), Human Inference: Strategies and Shortcomings of Social Judgment, Pearson, NJ: Prentice-Hall.
  • Nunnally, Jum, Ira Bernstein, and Jos Berge (1967), Psychometric Theory, New York: McGraw-Hill.
  • Okazaki, Shintaro, and Morikazu Hirose (2009), “Effects of Displacement–Reinforcement between Traditional Media, PC Internet, and Mobile Internet: A Quasi-Experiment in Japan,” International Journal of Advertising, 28 (1), 77–104.
  • Okazaki, Shintaro, Hairong Li, and Morikazu Hirose (2009), “Consumer Privacy Concerns and Preference for Degree of Regulatory Control,” Journal of Advertising, 38 (4), 63–77.
  • Pavlou, Paul (2003), “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model,” International Journal of Electronic Commerce, 7 (3), 101–34.
  • Petronio, Sandra (2002), Boundaries of Privacy: Dialectics of Disclosure, Albany: State University of New York Press.
  • Petronio, Sandra, and Wesley Durham (2015), “Communication Privacy Management Theory: Significance for Interpersonal Communication,” in Engaging Theories in Interpersonal Communication: Multiple Perspectives, Braithwaite and Paul Schrodt, eds., Thousand Oaks, CA: Sage, 335–348.
  • Prince, Christine (2018), “Do Consumers Want to Control Their Personal Data? Empirical Evidence,” International Journal of Human–Computer Studies, 110 (Spring), 21–32.
  • Ramzan, Zulfikar (2010), “Phishing Attacks and Countermeasures,” in Handbook of Information and Communication Security, P. Stavroulakis and M. Stamp, eds., Berlin: Springer, 433–448.
  • Rosenman, Robert, Vidhura Tennekoon, and Laura Hill (2011), “Measuring Bias in Self-Reported Data,” International Journal of Behavioural and Healthcare Research, 2 (4), 320–32.
  • Shozi, Nobubele, and Jabu Mtsweni (2016), “Big Data Privacy and Security: A Systematic Analysis of Current and Future Challenges,” in Proceedings of the 11th International Conference on Cyber Warfare and Security, Sonning Common, United Kingdom: ACPIL, 296–303.
  • Smith, Aaron, and Monica Anderson (2018), “Social Media Use in 2018,” Pew Research Center, March 1, http://www.pewinternet.org/2018/03/01/social-media-use-in-2018/.
  • Smit, Edith G, Guda Van Noort, and Hilde AM Voorveld (2014), “Understanding Online Behavioural Advertising: User Knowledge, Privacy Concerns and Online Coping Behaviour in Europe,” Computers in Human Behavior, 32 (March), 15–22.
  • Stelzner, Michael (2018), “2018 Social Media Marketing Industry Report,” Social Media Examiner, May 7, https://www.socialmediaexaminer.com/social-media-marketing-industry-report-2018/.
  • Sweney, Mark (2018), “Is Facebook for Old People? Over -5s Flock In as the Young Leave,” The Guardian, February 12, https://www.theguardian.com/technology/2018/feb/12/is-facebook-for-old-people-over-55s-flock-in-as-the-young-leave.
  • Thielst, Christina (2011), “Social Media: Ubiquitous Community and Patient Engagement,” Frontiers Health Service Management, 28 (2), 3–14.
  • Tucker, Catherine (2014), “Social Networks, Personalized Advertising, and Privacy Control,” Journal of Marketing Research, 51 (5), 546–62.
  • Tufekci, Zeynep (2008), “Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites,” Bulletin of Science, Technology, and Society, 28 (1), 20–36.
  • Tversky, Amos, and Daniel Kahneman (1974), “Judgement under Uncertainty: Heuristics and Biases,” Science, 185 (4157), 1124–31.
  • Uzialko, Adam (2018), “20 Small Business Trends and Predictions for 2019,” November 26, https://www.businessnewsdaily.com/7605-business-trend-predictions.html
  • Venkatesh, Viswanath, and Fred D. Davis (2000), “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science, 46 (2), 186–204.
  • Venkatesh, Viswanath, and Hillol Bala (2008), “Technology Acceptance Model 3 and a Research Agenda on Interventions,” Decision Sciences, 39 (2), 273–315.
  • Vishwanath, Arun, Brynne Harrison, and Yu Jie Ng (2018), “Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility,” Communication Research, 45 (8), 1146–66.
  • Walrave, Michel, Ini Vanwesenbeeck, and Wannes Heirman (2012), “Connecting and Protecting? Comparing Predictors of Self-Disclosure and Privacy Settings Use between Adolescents and Adults,” Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 6 (1), article 3.
  • Weiser, Mark (1991), “The Computer for the 21st Century,” Scientific American, 265 (3), 94–104.
  • Westin, Alan (2003), “Social and Political Dimensions of Privacy,” Journal of Social Issues, 59 (2), 431–53.
  • Williamson, Debra (2019), “US Social Trends in 2019,” eMarketer, January 10, https://www.emarketer.com/content/us-social-trends-for-2019.
  • Wisniewski, Pamela J., Bart P. Knijnenburg, and Heather Richter Lipford (2017), “Making Privacy Personal: Profiling Social Network Users to Inform Privacy Education and Nudging,” International Journal of Human-Computer Studies, 98 (February), 95–108.
  • Xie, Wenjing, Amy Fowler-Dawson, and Anita Tvauri (2019), “Revealing the Relationship between Rational Fatalism and the Online Privacy Paradox,” Behaviour & Information Technology, 38 (7), 742–59.
  • Yang, Hongwei, and Hui Liu (2014), “Prior Negative Experience of Online Disclosure, Privacy Concerns, and Regulatory Support in Chinese Social Media,” Chinese Journal of Communication, 7 (1), 40–59.
  • Yao, Mike, and Daniel Linz (2008), “Predicting Self-Protections of Online Privacy,” CyberPsychology and Behavior, 11 (5), 615–17.
  • Youn, Seounmi (2009), “Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors among Young Adolescents,” Journal of Consumer Affairs, 43 (2), 389–418.
  • Zureik, Elia, and Lynda Stalker (2010), “The Cross-Cultural Study of Privacy: Problems and Prospects,” in Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons, E. Zureik, L. Stalker, E. Smith, D. Lyon, and Y.E. Chan, eds., Montreal, CA: McGill -Queen’s University Press, 8–30.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.