616
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites

Pages 31-51 | Published online: 07 Jul 2014

References

  • Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1): 26–33.
  • Agarwal, R. (2000). Individual acceptance of information technologies. In R. W. Zmud (Ed.), Framing the domains of IT management: Projecting the future through the past, 85–104. Pinnaflex: Cincinnati, OH.
  • Alsop, R. (2008). The trophy kids grow up: How the millennial generation is shaking up the workplace. NJ: Jossey-Bass.
  • Ajzen, I. & Fishbein, M. (1977). Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological Bulletin, 84, 888–918.
  • Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
  • Bagozzi, R. P., & Burnkrant, R. E. (1979). Attitude organization and attitude-behavior relationship. Journal of Personality and Social Psychology, 37, 913–929.
  • Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9).
  • Bart, Y., Shankar, V., Sultan, F., & Urban, G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 133–152.
  • Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3): 245–270.
  • Belanger, F. & Crossler, R. E. 2011 (2011). Privacy in the digital age: A review of information privacy research in information systems MIS Quarterly, 35(4): 1017–1041.
  • Bessen, J. (1993). Riding the marketing information wave. Harvard Business Review, 71(5): 150–160.
  • Brenner, J. (2013, February 14). Pew Internet: Social Networking. Retrieved from http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx
  • Brown, M. R., & Muchira, R. (2004). Investigating the relationship between internet privacy concerns and online purchase behavior. Journal of Electronic Commerce Research, 5(1): 62–70.
  • Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2): 117–141.
  • Chaney, P. (2009). The digital handshake: Seven proven strategies to grow you business using social media. New Jersey: John Wiley & Son.
  • Chen, K. & Rea, A. I., Jr. (2004). Protecting personal information online: A survey of user privacy concerns and control techniques. The Journal of Computer Information Systems, 44(4): 85–92.
  • Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches. MIS Quarterly, 33(4): 673–687.
  • Deaux, K., & Wrightsman, L. (1988). Social psychology. Pacific Grove, CA: Brooks/Cole.
  • Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1): 83–108.
  • Dwyer, C., Hiltz, S. R., & Passerini, K. (2007, August). Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace. In AMCIS (p. 339).
  • Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research, 59(8): 877–886.
  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1): 153–160.
  • Field, A. (2009). Discovering statistics using SPSS. CA: Sage Publications.
  • Foster, T. N., & Greene, C. R. (2012). Legal issues of online social networks and the workplace. Journal of Business & Ethics, 18, 131.
  • Gliner, J. A., Morgan, G. A., Leech, N. L. (2009). Research methods in applied settings: An integrated approach to design and analysis (2nd ed.). New York, NY: Routledge.
  • Gonzalez, V. E. (1992). On human attitudes: Root metaphors in theoretical conceptions. Goteborg, Sweden: Vasastadens Bokbinderi AB.
  • Graeff, T. R., & Harmon, S. (2002), Collecting and using personal data: consumers' awareness and concerns, Journal of Consumer Marketing, 19(4): 302–318.
  • Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71–80). ACM.
  • Hazari, S., Hargrave, W., & Clenney, B. (2009). An Empirical Investigation of Factors Influencing Information Security Behavior. Journal of Information Privacy and Security, 4(4): 3–20.
  • Holzner, S. (2008). Facebook marketing: Leverage social media to grow your business. New York: Que Publishing.
  • Hoofnagle, C., King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies?. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1589864
  • Jensen, C., & Potts, C. (2004, April). Privacy policies as decision-making tools: an evaluation of online privacy notices. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 471–478). ACM.
  • Joinson, A. N., Reips, U., Buchanan, T., & Schofield, C. (2010). Privacy, Trust, and Self-Disclosure Online. Human-Computer Interaction, 25, 1–24.
  • Junglas, I. (2006). Personality traits and privacy perceptions: An empirical study in the context of location-based services. Proceedings of the International Conference on Mobile Business, p. 36. doi: 10.1109/ICMB.2006.40.
  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, 44(2): 544–564.
  • Kaufman, L., & Rousseeuw, P. J. (2009). Finding groups in data: An introduction to cluster analysis. NJ: Wiley.
  • Lallmahamood, M. (2007). An examination of individual's perceived security and privacy of the Internet in Malaysia and the influence of this on their intention to use e-commerce: Using an extension of the Technology Acceptance Model. Journal of Internet Banking and Commerce, 12(3): 1–25.
  • Li, T., Greenberg, B. A., & Nicholls, J. A. F. (2007). Teaching experiential learning: Adoption of an innovative course in an MBA marketing curriculum. Journal of Marketing Education, 29(1): 25–33.
  • Mackay, W. E. (1991, March). Triggers and barriers to customizing software. In Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology (pp. 153–160). ACM.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4): 336–355.
  • Mckeon, M. (2010). The evolution of privacy on Facebook. Retrieved from http://www.mattmckeon.com/facebook-privacy/
  • Melone, N. P. (1990). A theoretical assessment of the user-satisfaction construct in information systems research. Management Science, 36(1): 76–91.
  • Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12): 65–74.
  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1): 35–57.
  • Milne, G. R., Rohm, A. J., Bahl, S. (2004). Consumers' protection of online privacy and identity. Journal of Consumer Affairs, 38(2): 217–232.
  • Milne, G. R., Culnan, M. J., & Greene, H. (2006). A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing, 238–249.
  • Nowak, G. J. & Phelps, J. (1992). Understanding privacy concerns: As assessment of consumers' information related knowledge and beliefs. Journal of Direct Marketing, 6(4): 28–39.
  • Nunnally, J. C. (1978). Psychometric theory. New York: McGraw-Hill.
  • O'Brien, D, and Torres, A. (2012). Social networking and online privacy: Facebook users' perceptions. Irish Journal of Management, 16(14): 63–97.
  • Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25(2): 243–262.
  • Opsahl, K. (2010, April 28). Facebook's eroding privacy policy: A timeline. Retrieved from https://www.eff.org/deeplinks/2010/04/facebook-timeline
  • Patterson, A. (2012). Social-networkers of the world, unite and take over: A metaintrospective perspective on the Facebook brand. Journal of Business Research, 65(4): 527–534.
  • Pavlou, P. A. (2011). State of information privacy literature: Where are we now and where should we go? MIS Quarterly, 35(4): 977–988.
  • Purcell, K., Brenner, J. & Rainie, L. (2012, March 9). Search engine use 2012. Retrieved from http://pewinternet.org/Reports/2012/Search-Engine-Use-2012.aspx
  • Rinaldo, S. B., Tapp, S., & Laverie, D. A. (2011). Learning by Tweeting using Twitter as a pedagogical tool. Journal of Marketing Education, 33(2): 193–203.
  • Sengupta, S. (2011, November 29). FTC settles privacy issue at Facebook. The New York Times. Retrieved from http://www.nytimes.com
  • Sheehan, K. B. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4): 24–38.
  • Shilton, K. (2009). Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection. Communications of the ACM, 52(11): 48–53.
  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An interdisciplinary review. MIS Quarterly, 35(4): 989–1015.
  • Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1): 36–49.
  • Stutzman, F. (2006). An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association, 3(1): 10–18.
  • Tan, X, Qin, L, Kim, Y, and Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2): 211–233.
  • Thorndike, R.M. (1996). Measurement and evaluation in psychology and education (6th ed.). Upper Saddle River, NJ: Prentice Hall.
  • Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2): 254–268.
  • Varian, H. R. (2006). Economic aspects of personal privacy. Retrieved from http://people.ischool.berkeley.edu/∼hal/Papers/privacy
  • Wang, Y., Burgener, D., Kuzmanovic, A., & Maciá-Fernández, G. (2011, June). Understanding the network and user-targeting properties of web advertising networks. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on (pp. 613–622). IEEE.
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. The Journal of Consumer Affairs, 43(3): 389–418.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.