Advertisement

The Interplay Between Privacy, Trust and Self-disclosure on Social Networking Sites

  • Eli Fianu
  • Kwame Simpe OforiEmail author
  • Richard Boateng
  • George Oppong Appiagyei Ampong
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 558)

Abstract

Social Networking Sites (SNSs) have become an essential part of the daily lives of billions of people worldwide. Because SNS service providers use a revenue model that relies on data licensing (selling of user data), they share user data with other parties such as government institutions and private businesses. Sharing of user data to third parties raises several privacy concerns. Apart from privacy issues emanating from SNSs sharing user information with third parties, privacy issues may also emanate from users sharing information with SNS members. This study is motivated by the researchers’ interest in investigating self-disclosure amongst Ghanaians especially from the perspective of privacy and trust primarily because of recent reports of revenge pornography and other self-disclosure related privacy violations on SNSs in Ghana. A survey was conducted on 523 students from three private universities in Ghana. Out of the 523 questionnaires administered, 452 were validated for analysis. Data collected from the survey was analyzed using the Partial Least Square approach to Structural Equation Modeling (PLS-SEM) performed on SmartPLS Version 3. Results of the study show that privacy awareness, privacy invasion experience, and privacy-seeking behavior have a significant effect on trust in SNS members. Privacy concern was found not to have a significant effect on trust in SNS members. Privacy awareness, privacy concerns, privacy invasion experience, and privacy-seeking behavior were found to have a significant effect on trust in the SNS service provider. Trust in SNS members and trust in the SNS service provider were found to have a significant effect on SNS self-disclosure. Theoretical and practical implications of the study are also discussed.

Keywords

Social Networking Sites Privacy Trust Self-disclosure Structural Equation Modelling 

References

  1. 1.
    Amichai-Hamburger, Y., Hayat, T.: Social networking. In: International Encyclopedia of Media Effects (2017)Google Scholar
  2. 2.
    Lenhart, A.: Teens, social media & technology overview, Washington DC (2015)Google Scholar
  3. 3.
    Ignatius, E., Kokkonen, M.: Factors contributing to verbal self-disclosure. Nord. Psychol. 59, 362–391 (2007).  https://doi.org/10.1027/1901-2276.59.4.362CrossRefGoogle Scholar
  4. 4.
    Stutzman, F., Gross, R., Acquisti, A.: Silent listeners: the evolution of privacy and disclosure on Facebook. J. Priv. Confid. 4, 7–41 (2012).  https://doi.org/10.1145/1958824.1958880CrossRefGoogle Scholar
  5. 5.
    Chang, C.W., Heo, J.: Visiting theories that predict college students’ self-disclosure on Facebook. Comput. Hum. Behav. 30, 79–86 (2014).  https://doi.org/10.1016/j.chb.2013.07.059CrossRefGoogle Scholar
  6. 6.
    Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Commun. 15, 83–108 (2009)Google Scholar
  7. 7.
    Huang, H.-Y., Chen, P.-L., Kuo, Y.-C.: Understanding the facilitators and inhibitors of individuals’ social network site usage. Online Inf. Rev. 41, 85–101 (2017).  https://doi.org/10.1108/OIR-10-2015-0319CrossRefGoogle Scholar
  8. 8.
    Zhu, Y., Bao, Z.: The role of negative network externalities in SNS fatigue. Data Technol. Appl. DTA-09-2017-0063 (2018).  https://doi.org/10.1108/dta-09-2017-0063CrossRefGoogle Scholar
  9. 9.
    Maier, C., Laumer, S., Eckhardt, A., Weitzel, T.: Giving too much social support : social overload on social networking sites, 1–18 (2014).  https://doi.org/10.1057/ejis.2014.3CrossRefGoogle Scholar
  10. 10.
    Feng, Y., Xie, W.: Teens’ concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162 (2014)CrossRefGoogle Scholar
  11. 11.
    Ghafla.com: Social Media Apps Ghanaians Visit The Most. http://www.ghafla.com/gh/social-media-apps-ghanaians-visit/
  12. 12.
  13. 13.
    Salter, M., Crofts, T.: Responding to revenge porn: challenges to online legal impunity. In: New Views on Pornography: Sexuality, Politics, and the Law, pp. 233–256 (2015)Google Scholar
  14. 14.
    Petronio, S., Reierson, J.: Regulating the privacy of confidentiality: grasping the complexities through communication privacy management theory. In: Afifi, T.A., Afifi, W.A. (eds.) Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications, pp. 365–383. Routledge, New York (2009)Google Scholar
  15. 15.
    Frampton, B.D., Child, J.T.: Friend or not to friend: coworker Facebook friend requests as an application of communication privacy management theory. Comput. Human Behav. 29, 2257–2264 (2013)CrossRefGoogle Scholar
  16. 16.
    Petronio, S.: Boundaries of Privacy: Dialects of Disclosure. State University of New York Press, Albany (2002)Google Scholar
  17. 17.
    Golish, T.D.: Stepfamily communication strengths; understanding the ties that bind. Hum. Commun. Res. 29, 41–80 (2003)Google Scholar
  18. 18.
    Special, W.P., Li-Barber, K.: Self-disclosure and student satisfaction with Facebook. Comput. Human Behav. 28, 624–630 (2012)CrossRefGoogle Scholar
  19. 19.
    Yoon, S.J., Han, H.E.: Experiential approach to the determinants of online word-of-mouth behavior. J. Glob. Sch. Mark. Sci. 22, 218–234 (2012)Google Scholar
  20. 20.
    Qian, H., Scott, C.R.: Anonymity and self-disclosure on weblogs. J. Comput. Commun. 12, 1428–1451 (2007)Google Scholar
  21. 21.
    Barth, S., de Jong, M.D.T.: The privacy paradox – investigating discrepancies between expressed privacy concerns and actual online behavior – a systematic literature review. Telemat. Inform. 34, 1038–1058 (2017).  https://doi.org/10.1016/j.tele.2017.04.013CrossRefGoogle Scholar
  22. 22.
    Zhou, T.: The effect of network externality on mobile social network site continuance. Program 49, 289–304 (2015).  https://doi.org/10.1108/PROG-10-2014-0078CrossRefGoogle Scholar
  23. 23.
    Myerscough, S., Lowe, B., Alpert, F.: Willingness to provide personal information online: the role of perceived privacy risk, privacy statements and brand strength. J. Website Promot. 2, 115–140 (2008)CrossRefGoogle Scholar
  24. 24.
    Angst, C.M., Agarwal, R.: Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q. 33, 339–370 (2009)CrossRefGoogle Scholar
  25. 25.
    Bansal, G., Zahedi, F.M., Gefen, D.: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis. Support Syst. 49, 138–150 (2010).  https://doi.org/10.1016/j.dss.2010.01.010CrossRefGoogle Scholar
  26. 26.
    Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Publ. Policy Mark. 19, 27–41 (2000).  https://doi.org/10.1509/jppm.19.1.27.16941CrossRefGoogle Scholar
  27. 27.
    Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17, 61–80 (2006).  https://doi.org/10.1287/isre.l060.0080CrossRefGoogle Scholar
  28. 28.
    Culnan, M., Bies, R.: Consumer privacy: balancing economic and justice considerations. J. Soc. Issues 59, 323–342 (2003).  https://doi.org/10.1111/1540-4560.00067CrossRefGoogle Scholar
  29. 29.
    Laufer, R., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33, 22–42 (1977).  https://doi.org/10.1111/j.1540-4560.1977.tb01880.xCrossRefGoogle Scholar
  30. 30.
    Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10, 104–115 (1999).  https://doi.org/10.1287/orsc.10.1.104CrossRefGoogle Scholar
  31. 31.
    Rachels, J.: Why privacy is important. Philos. Publ. Aff. 4, 323–333 (2003)Google Scholar
  32. 32.
    Jeong, Y., Kim, Y.: Privacy concerns on social networking sites: interplay among posting types, content, and audiences. Comput. Hum. Behav. 69, 302–310 (2017).  https://doi.org/10.1016/j.chb.2016.12.042CrossRefGoogle Scholar
  33. 33.
    Malik, A., Hiekkanen, K., Dhir, A., Nieminen, M.: Impact of privacy, trust and user activity on intentions to share Facebook photos. J. Inf. Commun. Ethics Soc. 14, 364–382 (2016).  https://doi.org/10.1108/jices-06-2015-0022CrossRefGoogle Scholar
  34. 34.
    Fox, J., Moreland, J.J.: The dark side of social networking sites: an exploration of the relational and psychological stressors associated with Facebook use and affordances. Comput. Hum. Behav. 45, 168–176 (2015).  https://doi.org/10.1016/j.chb.2014.11.083CrossRefGoogle Scholar
  35. 35.
    Awad, K.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 30, 13 (2006).  https://doi.org/10.2307/25148715CrossRefGoogle Scholar
  36. 36.
    Choi, B.C.F., Jiang, Z.J., Xiao, B., Kim, S.S.: Embarrassing exposures in online social networks: an integrated perspective of privacy invasion and relationship bonding. Inf. Syst. Res. 26, 675–694 (2015).  https://doi.org/10.1287/isre.2015.0602CrossRefGoogle Scholar
  37. 37.
    Hölbl, M., Zlatolas, L.N., Welzer, T., Heric, M.: Privacy antecedents for SNS self-disclosure: the case of Facebook. Comput. Hum. Behav. 45, 158–167 (2015).  https://doi.org/10.1016/j.chb.2014.12.012CrossRefGoogle Scholar
  38. 38.
    Lee, Y., Kwon, O.: Intimacy, familiarity and continuance intention: an extended expectation-confirmation model in web-based services. Electron. Commer. Res. Appl. 10, 342–357 (2011).  https://doi.org/10.1016/j.elerap.2010.11.005CrossRefGoogle Scholar
  39. 39.
    Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20, 709–734 (1995).  https://doi.org/10.5465/amr.1995.9508080335CrossRefGoogle Scholar
  40. 40.
    Friedman, B., Khan Jr., P.H., Howe, D.C.: Trust online. Commun. ACM 43, 34–40 (2000).  https://doi.org/10.1145/355112.355120CrossRefGoogle Scholar
  41. 41.
    Han, S., et al.: The Effect of using SNS to interpersonal relation and quality of life: focused on the moderating role of communication capability. J. Inf. Syst. 22, 29–64 (2013)Google Scholar
  42. 42.
    Flanagin, A.J., Metzger, M.J.: Internet use in the contemporary media environment. Hum. Commun. Res. 27, 153–181 (2001).  https://doi.org/10.1093/hcr/27.1.153CrossRefGoogle Scholar
  43. 43.
    Osatuyi, B.: Information sharing on social media sites. Comput. Hum. Behav. 29, 2622–2631 (2013).  https://doi.org/10.1016/j.chb.2013.07.001CrossRefGoogle Scholar
  44. 44.
    Zhou, T., Li, H.: Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Comput. Hum. Behav. 37, 283–289 (2014).  https://doi.org/10.1016/j.chb.2014.05.008CrossRefGoogle Scholar
  45. 45.
    Earp, J.B., Antón, A.I., Aiman-Smith, L., Stufflebeam, W.H.: Examining internet privacy policies within the context of user privacy values. IEEE Trans. Eng. Manag. 52, 227–237 (2005).  https://doi.org/10.1109/TEM.2005.844927CrossRefGoogle Scholar
  46. 46.
    Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877–886 (2006).  https://doi.org/10.1016/j.jbusres.2006.02.006CrossRefGoogle Scholar
  47. 47.
    Galanxhi, H., Nah, F.F.-H.: Privacy issues in the era of ubiquitous commerce. Electron. Mark. 16, 222–232 (2006).  https://doi.org/10.1080/10196780600841894CrossRefGoogle Scholar
  48. 48.
    Lwin, M.O., Wirtz, J., Stanaland, A.J.S.: The privacy dyad. Internet Res. 26, 919–941 (2016).  https://doi.org/10.1108/IntR-05-2014-0134CrossRefGoogle Scholar
  49. 49.
    Wu, K.W., Huang, S.Y., Yen, D.C., Popova, I.: The effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 28, 889–897 (2012).  https://doi.org/10.1016/j.chb.2011.12.008CrossRefGoogle Scholar
  50. 50.
    Zhang, Y., Fang, Y., Wei, K.K., Ramsey, E., McCole, P., Chen, H.: Repurchase intention in B2C e-commerce - a relationship quality perspective. Inf. Manag. 48, 192–200 (2011).  https://doi.org/10.1016/j.im.2011.05.003CrossRefGoogle Scholar
  51. 51.
    Lee, S., Kim, B.G.: The impact of qualities of social network service on the continuance usage intention. Manag. Decis. 55, 701–729 (2017).  https://doi.org/10.1108/MD-10-2016-0731CrossRefGoogle Scholar
  52. 52.
    Tan, X., Qin, L., Kim, Y., Hsu, J.: Impact of privacy concern in social networking web sites. Internet Res. 22, 211–233 (2012).  https://doi.org/10.1108/10662241211214575CrossRefGoogle Scholar
  53. 53.
    O’Bien, D., Torres, A.: Social networking and online privacy: Facebook users’ perceptions. Irish J. Manag. 31, 63–98 (2012)Google Scholar
  54. 54.
    Proudfoot, J.G., Wilson, D., Valacich, J.S., Byrd, M.D.: Saving face on Facebook: privacy concerns, social benefits, and impression management. Behav. Inf. Technol. 37, 16–37 (2018)CrossRefGoogle Scholar
  55. 55.
    Chen, H., Beaudoin, C.E.: An empirical study of a social network site: exploring the effects of social capital and information disclosure. Telemat. Inform. 33, 432–435 (2016).  https://doi.org/10.1016/j.tele.2015.09.001CrossRefGoogle Scholar
  56. 56.
    Young, A.L., Quan-Haase, A.: Privacy protection strategies on Facebook: the internet privacy paradox revisited. Inf. Commun. Soc. 16, 479–500 (2013).  https://doi.org/10.1080/1369118x.2013.777757CrossRefGoogle Scholar
  57. 57.
    Mohamed, N., Hawa, I.: Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput. Hum. Behav. 28, 2366–2375 (2012).  https://doi.org/10.1016/j.chb.2012.07.008CrossRefGoogle Scholar
  58. 58.
    Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347, 509–514 (2015).  https://doi.org/10.1126/science.aaa1465CrossRefGoogle Scholar
  59. 59.
    Straub, D., Boudreau, M.-C., Gefen, D.: Validation guidelines for IS positivist research. Commun. Assoc. Inf. Syst. 13, 63 (2004)Google Scholar
  60. 60.
    Cheung, C., Lee, Z.W.Y., Chan, T.K.H.: Self-disclosure in social networking sites: the role of perceived cost, perceived benefits and social influence. Internet Res. 25, 279–299 (2015).  https://doi.org/10.1108/IntR-09-2013-0192CrossRefGoogle Scholar
  61. 61.
    Henseler, J., Ringle, C.M., Sinkovics, R.: The use of partial least squares path modeling in international marketing. Adv. Int. Mark. 20, 277–319 (2009).  https://doi.org/10.1108/S1474-7979(2009)0000020014CrossRefGoogle Scholar
  62. 62.
    Henseler, J., Hubona, G., Ray, P.A.: Using PLS path modeling in new technology research: updated guidelines (2016).  https://doi.org/10.1108/imds-09-2015-0382CrossRefGoogle Scholar
  63. 63.
    Fornell, C., Larcker, D.F.: Structural equation models with unobservable variables and measurement error: algebra and statistics. J. Mark. Res. 382–388 (1981)CrossRefGoogle Scholar
  64. 64.
    Henseler, J., Ringle, C.M., Sarstedt, M.: A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 43, 115–135 (2014).  https://doi.org/10.1007/s11747-014-0403-8CrossRefGoogle Scholar
  65. 65.
    Hu, L., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equ. Model. Multidisc. J. 6, 1–55 (1999)CrossRefGoogle Scholar
  66. 66.
    Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9, 50–60 (2010).  https://doi.org/10.1016/j.elerap.2009.05.001CrossRefGoogle Scholar
  67. 67.
    Chang, S.E., Liu, A.Y., Shen, W.C.: User trust in social networking services: a comparison of Facebook and LinkedIn. Comput. Hum. Behav. 69, 207–217 (2017).  https://doi.org/10.1016/j.chb.2016.12.013CrossRefGoogle Scholar
  68. 68.
    Kapoor, K.K., Tamilmani, K., Rana, N.P., Patil, P., Dwivedi, Y.K., Nerur, S.: Advances in social media research: past, present and future. Inf. Syst. Front. 20(3), 531–558 (2018)CrossRefGoogle Scholar
  69. 69.
    Aladwani, A.M., Dwivedi, Y.K.: Towards a theory of SocioCitizenry: quality anticipation, trust configuration, and approved adaptation of governmental social media. Int. J. Inf. Manag. 43, 261–272 (2018)CrossRefGoogle Scholar
  70. 70.
    Hossain, M.A., Dwivedi, Y.K., Chan, C., Standing, C., Olanrewaju, A.S.: Sharing political content in online social media: a planned and unplanned behaviour approach. Inf. Syst. Front. 20(3), 485–501 (2018)CrossRefGoogle Scholar
  71. 71.
    Shiau, W.-L., Dwivedi, Y.K., Yang, H.-S.: Co-citation and cluster analyses of extant literature on social networks. Int. J. Inf. Manag. 37(5), 390–399 (2017)CrossRefGoogle Scholar
  72. 72.
    Shiau, W.-L., Dwivedi, Y.K., Lai, H.-H.: Examining the core knowledge on Facebook. Int. J. Inf. Manag. 43, 52–63 (2018)CrossRefGoogle Scholar
  73. 73.
    Alalwan, A.A., Rana, N.P., Dwivedi, Y.K., Algharabat, R.: Social media in marketing: a review and analysis of the existing literature. Telemat. Inform. 34(7), 1177–1190 (2017)CrossRefGoogle Scholar
  74. 74.
    Dwivedi, Y.K., Kapoor, K.K., Chen, H.: Social media marketing and advertising. Mark. Rev. 15(3), 289–309 (2015)CrossRefGoogle Scholar
  75. 75.
    Rathore, A.K., Ilavarasan, P.V., Dwivedi, Y.K.: Social media content and product co-creation: an emerging paradigm. J. Enterp. Inf. Manag. 29(1), 7–18 (2016)CrossRefGoogle Scholar
  76. 76.
    Shareef, M.A., Mukerji, B., Dwivedi, Y.K., Rana, N.P., Islam, R.: Social media marketing: comparative effect of advertisement sources. J. Retail. Consum. Serv. 46, 58–69 (2019)CrossRefGoogle Scholar
  77. 77.
    Abed, S.S., Dwivedi, Y.K., Williams, M.D.: Social media as a bridge to e-commerce adoption in SMEs: a systematic literature review. Mark. Rev. 15(1), 39–57 (2015)CrossRefGoogle Scholar
  78. 78.
    Plume, C.J., Dwivedi, Y.K., Slade, E.L.: Social Media in the Marketing Context: A State of the Art Analysis and Future Directions. Chandos Publishing, Amsterdam (2016)Google Scholar
  79. 79.
    Dwivedi, Y.K., et al. (eds.): Social Media: The Good, the Bad, and the Ugly, vol. 9844. Springer, Heidelberg (2016).  https://doi.org/10.1007/978-3-319-45234-0CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2019

Authors and Affiliations

  • Eli Fianu
    • 1
  • Kwame Simpe Ofori
    • 2
    Email author
  • Richard Boateng
    • 3
  • George Oppong Appiagyei Ampong
    • 4
  1. 1.College of Law and Management StudiesUniversity of KwaZulu NatalDurbanSouth Africa
  2. 2.Department of Computer ScienceHo Technical UniversityHoGhana
  3. 3.Department of Operations and Management Information SystemsUniversity of Ghana Business SchoolAccraGhana
  4. 4.Department of ManagementGhana Technology University CollegeAccraGhana

Personalised recommendations