198
Views
4
CrossRef citations to date
0
Altmetric
Articles

Information Disclosure on a Chinese Social Media Platform

, &

REFERENCES

  • Bagozzi, R. P., & Dholakia, U. M. (2002). Intentional social actions in virtual communities. Journal of Interactive Marketing, 16(2), 2–21.
  • Bamman, D., O’ Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3–5).
  • Bansal, G., Zahedi, E., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138–150.
  • Bergami, M., & Bagozzi, R. P. (2000). Self-categorization, affective commitment and group self-esteem as distinct aspects of social identity in the organization. British Journal of Social Psychology, 39, 555–577.
  • Chen, L. Zhang, C., & Wilson, C. (2013). Tweeting under pressure: Analyzing trending topics and evolving word choice on Sina Weibo. In Proceedings of the First ACM conference on online social networks, (pp. 89–100), Boston, MA, October 7–8. New York, NY: ACM.
  • Chen, R., & Sharma, S. K. (2013). Self-disclosure at social networking sites: An exploration through relational capitals. Information Systems Frontier, 15(2), 269–278.
  • Chiu, C., Hsu, M., & Wang, E. T. G. (2006). Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems, 42, 1872–1888.
  • Consumer Reports. (2012). Facebook and your privacy: Who sees the data you share on the biggest social network. Retrieved from http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm
  • Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17, 263–282.
  • Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research, 38, 269–77.
  • Dinev, T., Bellotto, M., Hart, P. Russo, V., & Calautti, C. (2006). Internet users’ privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57–93.
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80.
  • Fornell, C., & Bookstein, F. L. (1982). Two structural equation models: LISREL and PLS Applied to customer exit-voice theory. Journal of Marketing Research, 19(11), 440–452.
  • Fornell, C., & Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.
  • Gefen, D., Straub, D. W., & Boudreau, M-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(7), 2–75.
  • Gellman, B., & Poitras, L. (2013, June 7). U.S., British Intelligence mining data from nine U.S. internet companies in broad secret program. Washington Post. Retrieved from http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
  • Gross, R., & Acquisiti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on privacy in the electronic society, (pp. 71–80), San Jose, CA, April 28--May 3. New York, NY: ACM.
  • Hann, I., Hui, K., Lee, S. T., & Png, I. P. L. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13–42.
  • Hars, A., & Ou, S. (2002). Working for free? Motivations for participating in open-source projects. International Journal of Electronic Commerce, 6(3): 25–39.
  • Hazari, S., & Brown, C. (2013). An empirical investigation of privacy awareness and concerns on social networking sites. Journal of Information Privacy & Security, 9(4), 31–51.
  • Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.
  • Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media, Business Horizons, 54(3), 241–251.
  • King, G., Pan, J., & Roberts, M. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 107(2), 1–18.
  • Kline, R. B. (2004). Principles and practices of structural equation modeling (2nd ed.). New York, NY: Guilford.
  • Kolek, E. A., & Saunders, D. (2008). Online disclosure: An empirical examination of undergraduate Facebook profiles, NASPA Journal, 45(1), 1–25.
  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109–125.
  • Lampe, C., Ellision, N. B., & Steinfeld, C. (2007). A familiar Face(book): Profile elements as signals on online social network. In Proceedings of the conference on human factor in computing systems, (pp. 435–444), San Jose, CA, April 28--May 3. New York, NY: ACM.
  • Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33, 22–41.
  • Lee, H., Park, H., & Kim, J. (2013). Why do people share their context information on social network services? A qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk. International Journal of Human-Computer Studies, 71, 862–877.
  • Li, H., Sarathy, R, and Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62–71.
  • Lum, T., Figliola, P. M., & Weed, M. C. (2012). China, Internet freedom, and U.S. policy. Congressional Research Service. Available at: http://fas.org/sgp/crs/row/R42601.pdf
  • Madden, M. Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. Pew Research Center. Retrieved from http://www.lateledipenelope.it/public/52dff2e35b812.pdf
  • Marthews, A., & Tucker, C. (2014). Government surveillance and Internet search behavior. Retrieved from http://ssrn.com/abstract=2412564
  • New York Daily News. (2013). Facebook and Microsoft get government OK to make broader surveillance revelations post-Edward Snowden leaks. Retrieved from http://www.nydailynews.com/news/national/facebook-microsoft-government-broader-surveillance-revelations-article-1.1373545
  • Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). Privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126.
  • Okazaki, S., & Taylor, C. R. (2013). Social media and international advertising: theoretical challenges and future directions. International Marketing Review, 30(1), 56–71.
  • Pedersen, D. M. (1982). Personality correlates of privacy. Journal of Psychology, 112, 11–14.
  • PEW Internet. (2013). The demographics of social media users—2012. Retrieved from http://www.pewinternet.org/reports/2013/social-media-users.aspx
  • Pitäkanen, O., & Tuunainen, V. K. (2012). Disclosing personal information socially—An empirical study on Facebook users’ privacy awareness. Journal of Information Privacy & Security, 8(1), 3–29.
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879–903.
  • Rauchfleisch, A., & Schafer, M. S. (2015). Multiple public spheres of Weibo: A typology of forms and potentials of online public spheres in China. Information, Communication, and Society, 18(2), 139–155.
  • Reisinger, D. (2012). China clamps down on Sina Weibo as censorship abounds. Retrieved from http://www.cnet.com/news/china-clamps-down-on-sina-weibo-as-censorship-abounds/
  • Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS 2.0 M3. Retrieved from http://www.smartpls.de
  • Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27, 590–598.
  • Stutzman, F., Vitak, J., Ellison, N.B., Gray, R., & Lampe, C. (2012). Privacy in interaction: Exploring disclosure and social capital in Facebook. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media, (pp. 330–337), Dublin, Ireland, June 4–7. Palo Alto, CA: AAAI.
  • Tan, J., & Tan, A. E. (2012). Business under threat, technology under attack, ethics under fire: The experience of Google in China. Journal of Business Ethics, 110, 469–479.
  • Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36.
  • Xu, H., Dinev, T., Smith, J., & Hart, P. (2011. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798–824.
  • Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. Database for Advances in Information Systems, 40(1), 38–51.
  • Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook. Information, Communication & Society, 16(4), 479–500.
  • Zhang, Y., Chen, J. Q., & Wen, K.-W. (2002). Characteristics of internet users and their privacy concerns: A comparative study between China and the United States. Journal of Internet Commerce, 1(2), 1–16.
  • Zhao, L., Lu, Y., & Gupta, S. (2012). Disclosure intention of location-relation information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53–90.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.