Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook
dc.contributor.author | Young, Alyson L. | |
dc.contributor.author | Quan-Haase, Anabel | |
dc.date.accessioned | 2017-04-15T12:04:04Z | |
dc.date.available | 2017-04-15T12:04:04Z | |
dc.date.issued | 2009 | |
dc.description.abstract | Despite concerns raised about the disclosure of personal information on social network sites, research has demonstrated that users continue to disclose personal information. The present study employs surveys and interviews to examine the factors that influence university students to disclose personal information on Facebook. Moreover, we study the strategies students have developed to protect themselves against privacy threats. The results show that personal network size was positively associated with information revelation, no association was found between concern about unwanted audiences and information revelation and finally, students' Internet privacy concerns and information revelation were negatively associated. The privacy protection strategies employed most often were the exclusion of personal information, the use of private email messages, and altering the default privacy settings. Based on our findings, we propose a model of information revelation and draw conclusions for theories of identity expression. | |
dc.identifier.doi | 10.1145/1556460.1556499 | |
dc.language.iso | en | |
dc.publisher | ACM Press | |
dc.relation.ispartof | Communities and Technologies 2009: Proceedings of the Fourth Communities and Technologies Conference | |
dc.relation.ispartofseries | Communities and Technologies | |
dc.title | Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook | |
dc.type | Text | |
gi.citation.endPage | 274 | |
gi.citation.startPage | 265 | |
gi.citations.count | 166 | |
gi.citations.element | Adam N. Joinson, David J. Houghton, Asimina Vasalou, Ben L. Marder (2011): Digital Crowding: Privacy, Self-Disclosure, and Technology, In: Privacy Online, doi:10.1007/978-3-642-21521-6_4 | |
gi.citations.element | Vincent Chua (2016): Personal Networks: Ties, Space, and the Internet, In: Encyclopedia of Social Network Analysis and Mining, doi:10.1007/978-1-4614-7163-9_84-1 | |
gi.citations.element | Khe Foon Hew, Wing Sum Cheung (2012): Use of Facebook: a case study of Singapore students' experience, In: Asia Pacific Journal of Education 2(32), doi:10.1080/02188791.2012.685560 | |
gi.citations.element | Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage (2021): The Unheard Story of Organizational Motivations Towards User Privacy, In: Research Anthology on Privatizing and Securing Data, doi:10.4018/978-1-7998-8954-0.ch010 | |
gi.citations.element | Laurent Mell (2015): Hors de l’ombre, In: Questions de communication 28, doi:10.4000/questionsdecommunication.10116 | |
gi.citations.element | Catherine Waite, Lisa Bourke (2013): Using the cyborg to re-think young people’s uses of Facebook, In: Journal of Sociology 3(51), doi:10.1177/1440783313505007 | |
gi.citations.element | Javed Ahmed, Serena Villata, Guido Governatori (2017): Information and friend segregation for online social networks: a user study, In: AI & SOCIETY 4(34), doi:10.1007/s00146-017-0789-1 | |
gi.citations.element | Kelly Quinn (2016): Why We Share: A Uses and Gratifications Approach to Privacy Regulation in Social Media Use, In: Journal of Broadcasting & Electronic Media 1(60), doi:10.1080/08838151.2015.1127245 | |
gi.citations.element | Özlem Gelbal Odabaş, Tahsin İlhan, Kerem Kılıçer (2021): Ergenler İçin Sosyal Medya Mahremiyetini Koruma Becerileri Ölçeği’nin Geliştirilmesi, In: Bağımlılık Dergisi 4(22), doi:10.51982/bagimli.888283 | |
gi.citations.element | Naurin Farooq Khan, Naveed Ikram (2019): Development of Students’ Security and Privacy Habits Scale, In: Lecture Notes in Networks and Systems, doi:10.1007/978-3-030-12385-7_64 | |
gi.citations.element | Subhadra Sahoo, S. Vijayakumar Bharathi (2023): Threats and countermeasures in online social networks: A systematic review of existing research and future directions, In: AIP Conference Proceedings, doi:10.1063/5.0175782 | |
gi.citations.element | Margam Madhusudhan (2012): Use of social networking sites by research scholars of the University of Delhi: A study, In: International Information & Library Review 2(44), doi:10.1080/10572317.2012.10762919 | |
gi.citations.element | Sooyeon Maeng, Bong-Gwan Jun (2013): The New Communication Interface to Determine the Lifespan of Digital Information, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-39351-8_43 | |
gi.citations.element | James Williams (2010): Social networking applications in health care, In: Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care, doi:10.1145/1809085.1809091 | |
gi.citations.element | Shaikha Alduaij, Zhiyuan Chen, Aryya Gangopadhyay (2019): Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level, In: Censorship, Surveillance, and Privacy, doi:10.4018/978-1-5225-7113-1.ch003 | |
gi.citations.element | Lynne M. Webb, Nicholas Temple (2000): Social Media and Gender Issues, In: Discrimination and Diversity, doi:10.4018/978-1-5225-1933-1.ch056 | |
gi.citations.element | Şakir GÜLER, Yusuf ŞAHİN, Emre Vadi BALCI (2022): Sosyal Medyada Çevrimiçi Benlik Sunumunun Öznel İyi Oluş Üzerine Etkisi: Instagram Kullanıcıları Üzerine Bir Araştırma, In: Erciyes İletişim Dergisi 1(9), doi:10.17680/erciyesiletisim.993055 | |
gi.citations.element | Wang Yongjing, Lin Zhiye (2017): Research on the Anonymous Social Network Ecology, In: 2017 4th International Conference on Information Science and Control Engineering (ICISCE), doi:10.1109/icisce.2017.136 | |
gi.citations.element | Kan-Min Lin (2016): Understanding undergraduates’ problems from determinants of Facebook continuance intention, In: Behaviour & Information Technology 9(35), doi:10.1080/0144929x.2016.1177114 | |
gi.citations.element | Imrul Kayes, Nicolas Kourtellis, Francesco Bonchi, Adriana Iamnitchi (2015): Privacy Concerns vs. User Behavior in Community Question Answering, In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, doi:10.1145/2808797.2809422 | |
gi.citations.element | Mohammad Hatim Abuljadail, Louisa Ha, Fang Wang, Liu Yang (2015): What Motivates Online Shoppers to “Like” Brands' Facebook Fan Pages?, In: Advances in Human and Social Aspects of Technology, doi:10.4018/978-1-4666-8450-8.ch014 | |
gi.citations.element | Amirhossein Aleyasen, Oleksii Starov, Alyssa Phung Au, Allan Schiffman, Jeff Shrager (2015): On the Privacy Practices of Just Plain Sites, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, doi:10.1145/2808138.2808140 | |
gi.citations.element | Alyson Young, David Gurzick, Anabel Quan-Haase (2000): Online Multi-Contextual Analysis, In: Handbook of Research on Methods and Techniques for Studying Virtual Communities, doi:10.4018/978-1-60960-040-2.ch032 | |
gi.citations.element | Chien Yu (2020): The Use of Social Media, In: Advances in Higher Education and Professional Development, doi:10.4018/978-1-7998-1306-4.ch019 | |
gi.citations.element | Victoria Kisekka, Sharmistha Bagchi-Sen, H. Raghav Rao (2013): Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users, In: Computers in Human Behavior 6(29), doi:10.1016/j.chb.2013.07.023 | |
gi.citations.element | Fehmi Ben Abdesslem, Iain Parris, Tristan Henderson (2012): Reliable Online Social Network Data Collection, In: Computational Social Networks, doi:10.1007/978-1-4471-4054-2_8 | |
gi.citations.element | Maxime Chrétien, Daniel Fortin-Guichard, Christian Jacques, Cathy Savard, Annie Goulet, Isabelle Giroux (2014): Le volontariat des joueurs rime-t-il avec problème ?, In: Drogues, santé et société 2(12), doi:10.7202/1026879ar | |
gi.citations.element | Sonja Utz (2000): Social Network Site Use among Dutch Students, In: Networked Sociability and Individualism, doi:10.4018/978-1-61350-338-6.ch006 | |
gi.citations.element | Nadine Barrett-Maitland, Corlane Barclay, Kweku-Muata Osei-Bryson (2016): Security in Social Networking Services: A Value-Focused Thinking Exploration in Understanding Users’ Privacy and Security Concerns, In: Information Technology for Development 3(22), doi:10.1080/02681102.2016.1173002 | |
gi.citations.element | Mohammad Salehan, Dan J. Kim, Chulmo Koo (2016): A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior, In: The Journal of Supercomputing 8(74), doi:10.1007/s11227-016-1790-z | |
gi.citations.element | Mohammad Salehan, Arash Negahban (2013): Social networking on smartphones: When mobile phones become addictive, In: Computers in Human Behavior 6(29), doi:10.1016/j.chb.2013.07.003 | |
gi.citations.element | Shuzhe Yang (2016): Understanding the Pain: Examining Individuals' Online Reputation Management Behaviour and Its Obstacles -- A Grounded Theory, In: 2016 49th Hawaii International Conference on System Sciences (HICSS), doi:10.1109/hicss.2016.485 | |
gi.citations.element | Vincent Chua (2018): Personal Networks: Ties, Space, and the Internet, In: Encyclopedia of Social Network Analysis and Mining, doi:10.1007/978-1-4939-7131-2_84 | |
gi.citations.element | Ali Pala, Jun Zhuang (2019): Information Sharing in Cybersecurity: A Review, In: Decision Analysis 3(16), doi:10.1287/deca.2018.0387 | |
gi.citations.element | Andrew Welsh, Jennifer A. A. Lavoie (2012): Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization, In: Cyberpsychology: Journal of Psychosocial Research on Cyberspace 1(6), doi:10.5817/cp2012-1-4 | |
gi.citations.element | Arunesh Sinha, Yan Li, Lujo Bauer (2013): What you want is not what you get, In: Proceedings of the 2013 ACM workshop on Artificial intelligence and security, doi:10.1145/2517312.2517317 | |
gi.citations.element | Kan Min Lin (2015): Understanding Undergraduates' Information Literacy from their Facebook Usage, In: 2015 IEEE 15th International Conference on Advanced Learning Technologies, doi:10.1109/icalt.2015.48 | |
gi.citations.element | Shaukat Ali, Azhar Rauf, Naveed Islam, Haleem Farman (2017): A framework for secure and privacy protected collaborative contents sharing using public OSN, In: Cluster Computing S3(22), doi:10.1007/s10586-017-1236-2 | |
gi.citations.element | Andrey Antonio de O. Rodrigues, Fabiane Aparecida Santos Clemente, Antonio Alberto Sena dos Santos (2016): An information window about online privacy aspects perceived by social networks users, In: Proceedings of the 15th Brazilian Symposium on Human Factors in Computing Systems, doi:10.1145/3033701.3033719 | |
gi.citations.element | Pamela Wisniewski, Heng Xu, Heather Lipford, Emmanuel Bello‐Ogunu (2015): <scp>F</scp>acebook apps and tagging: The trade‐off between personal privacy and engaging with friends, In: Journal of the Association for Information Science and Technology 9(66), doi:10.1002/asi.23299 | |
gi.citations.element | Mauro Conti, Arbnor Hasani, Bruno Crispo (2011): Virtual private social networks, In: Proceedings of the first ACM conference on Data and application security and privacy, doi:10.1145/1943513.1943521 | |
gi.citations.element | Anabel Quan‐Haase, Alyson L. Young (2014): The Uses and Gratifications (U&G) Approach as a Lens for Studying Social Media Practice, In: The Handbook of Media and Mass Communication Theory, doi:10.1002/9781118591178.ch15 | |
gi.citations.element | Zeynep Turan, Hasan Tinmaz, Yuksel Goktas (2013): The Reasons for Non-Use of Social Networking Websites by University Students, In: Comunicar 41(21), doi:10.3916/c41-2013-13 | |
gi.citations.element | Kan-Min Lin (2015): Predicting Asian undergraduates’ intention to continue using social network services from negative perspectives, In: Behaviour & Information Technology 9(34), doi:10.1080/0144929x.2015.1027736 | |
gi.citations.element | Tanmay Sinha, Vrns Srikanth, Mangal Sain, Hoon Jae Lee (2013): Trends and research directions for privacy preserving approaches on the cloud, In: Proceedings of the 6th ACM India Computing Convention, doi:10.1145/2522548.2523138 | |
gi.citations.element | (2024): Loss of Privacy, In: Digital Dreams Have Become Nightmares: What We Must Do, doi:10.1145/3640479.3640490 | |
gi.citations.element | Fredrik Erlandsson, Martin Boldt, Henric Johnson (2012): Privacy Threats Related to User Profiling in Online Social Networks, In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, doi:10.1109/socialcom-passat.2012.16 | |
gi.citations.element | Inès Mestaoui, Jeff B. Murray, Hela Zouaoui (2024): ‘I’ travel – eye-travel: analysing the paradoxical travel experience between self-promotion and the evil eye, In: Journal of Marketing Management 11-12(40), doi:10.1080/0267257x.2024.2406941 | |
gi.citations.element | Mona Nandwani, Rishabh Kaushal (2017): Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms, In: Advances in Intelligent Systems and Computing, doi:10.1007/978-3-319-61542-4_32 | |
gi.citations.element | MOHAMMAD MAHDI SHAFIEI, HOSSEIN SHIRGAHI, HOMAYUN MOTAMENI, BEHNAM BARZEGAR (2022): A Fuzzy System for Evaluating Trustworthiness of Users in a Social Network, In: IIUM Engineering Journal 2(23), doi:10.31436/iiumej.v23i2.1697 | |
gi.citations.element | Yan Bai, Lirong Dai, Sam Chung, Durga D. Devaraj (2013): Access control for cloud‐based eHealth social networking: design and evaluation, In: Security and Communication Networks 3(7), doi:10.1002/sec.759 | |
gi.citations.element | Catalina L. Toma, Jeffrey T. Hancock (2013): Self-Affirmation Underlies Facebook Use, In: Personality and Social Psychology Bulletin 3(39), doi:10.1177/0146167212474694 | |
gi.citations.element | Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens (2013): A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-45204-8_8 | |
gi.citations.element | Sofie Bitter, Sonja Grabner-Kräuter (2013): Customer Engagement Behavior: Interacting with Companies and Brands on Facebook, In: EAA Series, doi:10.1007/978-3-658-02365-2_1 | |
gi.citations.element | Joanne H. Pratt (2011): Privacy Loss, In: Security and Privacy Assurance in Advancing Technologies, doi:10.4018/978-1-60960-200-0.ch003 | |
gi.citations.element | Stan Damen, Nicola Zannone (2014): Privacy Implications of Privacy Settings and Tagging in Facebook, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-06811-4_16 | |
gi.citations.element | Maggie Kanter, Tamara Afifi, Stephanie Robbins (2012): The Impact of Parents “Friending” Their Young Adult Child on Facebook on Perceptions of Parental Privacy Invasions and Parent-Child Relationship Quality, In: Journal of Communication 5(62), doi:10.1111/j.1460-2466.2012.01669.x | |
gi.citations.element | Munmun De Choudhury, Meredith Ringel Morris, Ryen W. White (2014): Seeking and sharing health information online, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2556288.2557214 | |
gi.citations.element | Norsaremah Salleh, Ramlah Hussein, Norshidah Mohamed (2012): An Empirical Investigation on Internet Privacy on Social Network Sites among Malaysian Youths, In: Journal of Information Technology Research 3(5), doi:10.4018/jitr.2012070105 | |
gi.citations.element | Haiyan Jia, Heng Xu (2016): Measuring individuals’ concerns over collective privacy on social networking sites, In: Cyberpsychology: Journal of Psychosocial Research on Cyberspace 1(10), doi:10.5817/cp2016-1-4 | |
gi.citations.element | Ulrike Hugl (2011): Reviewing person's value of privacy of online social networking, In: Internet Research 4(21), doi:10.1108/10662241111158290 | |
gi.citations.element | Abdullah Saykili, Evrim Genç Kumtepe (2019): Educational Use of Facebook: A Comparison of Worldwide Examples and Turkish Context, In: Lecture Notes in Educational Technology, doi:10.1007/978-981-13-7361-9_17 | |
gi.citations.element | Kirsten Martin (2012): Information technology and privacy: conceptual muddles or privacy vacuums?, In: Ethics and Information Technology 4(14), doi:10.1007/s10676-012-9300-3 | |
gi.citations.element | Evanthia Faliagka, Athanasios Tsakalidis, Danae Vaikousi (2011): Teenagers' Use of Social Network Websites and Privacy Concerns: A Survey, In: 2011 15th Panhellenic Conference on Informatics, doi:10.1109/pci.2011.17 | |
gi.citations.element | AGNIDIPA SANYAMATH, SUHENA SARKAR, MANAB NANDY, SHRITAMA BANERJEE, BIRUPAKSHA BISWAS (2024): KNOWLEDGE, ATTITUDE, AND PRACTICES OF UNDERGRADUATE MEDICAL STUDENTS REGARDING THE USE OF SOCIAL MEDIA FOR EDUCATIONAL PURPOSES: A CROSSSECTIONAL, OBSERVATIONAL STUDY IN A TERTIARY CARE MEDICAL INSTITUTION IN THE EASTERN ZONE OF INDIA, In: Asian Journal of Pharmaceutical and Clinical Research, doi:10.22159/ajpcr.2024v17i9.51548 | |
gi.citations.element | Shavneet Sharma, Gurmeet Singh, Rashmini Sharma, Paul Jones, Sascha Kraus, Yogesh K. Dwivedi (2024): Digital Health Innovation: Exploring Adoption of COVID-19 Digital Contact Tracing Apps, In: IEEE Transactions on Engineering Management, doi:10.1109/tem.2020.3019033 | |
gi.citations.element | Vimala Balakrishnan, Azra Shamim (2013): Malaysian Facebookers: Motives and addictive behaviours unraveled, In: Computers in Human Behavior 4(29), doi:10.1016/j.chb.2013.01.010 | |
gi.citations.element | Chien Yu (2021): The Use of Social Media, In: Research Anthology on Adult Education and the Development of Lifelong Learners, doi:10.4018/978-1-7998-8598-6.ch044 | |
gi.citations.element | Jakob Henke, Sven Joeckel, Leyla Dogruel (2018): Processing privacy information and decision-making for smartphone apps among young German smartphone users, In: Behaviour & Information Technology 5(37), doi:10.1080/0144929x.2018.1458902 | |
gi.citations.element | Wedad Al Siyabi, Araby Madbouly, Preeti Shrivastava (2025): Towards Sustainable Consumption: Exploring Consumer Online Brand-Related Activities (COBRA) in Halal Products: The Case of Oman, In: SSRN Electronic Journal, doi:10.2139/ssrn.5075250 | |
gi.citations.element | Michael J. Scialdone, Anthony J. Rotolo, Jaime Snyder (2011): Social media futures, In: Proceedings of the 2011 iConference, doi:10.1145/1940761.1940832 | |
gi.citations.element | Koji Domon (2014): Privacy on Google's Street View in Taiwan and Thailand: An Empirical Analysis, In: SSRN Electronic Journal, doi:10.2139/ssrn.2504502 | |
gi.citations.element | Shihabur Rahman Chowdhury, Arup Raton Roy, Maheen Shaikh, Khuzaima Daudjee (2014): A taxonomy of decentralized online social networks, In: Peer-to-Peer Networking and Applications 3(8), doi:10.1007/s12083-014-0258-2 | |
gi.citations.element | David J. Houghton, Adam N. Joinson (2010): Privacy, Social Network Sites, and Social Relations, In: Journal of Technology in Human Services 1-2(28), doi:10.1080/15228831003770775 | |
gi.citations.element | Doris Ngozi Morah, Chinwe Elizabeth Uzochukwu (2022): Today Is Your Birthday!, In: Research Anthology on Usage, Identity, and Impact of Social Media on Society and Culture, doi:10.4018/978-1-6684-6307-9.ch060 | |
gi.citations.element | Mauro Conti, Arbnor Hasani, Bruno Crispo (2013): Virtual private social networks and a facebook implementation, In: ACM Transactions on the Web 3(7), doi:10.1145/2516633.2516636 | |
gi.citations.element | Alia Samreen, Adnan Ahmad, Furkh Zeshan, Farooq Ahmad, Sohaib Ahmed, Zuhaib Ashfaq Khan (2020): A Collaborative Method for Protecting Teens Against Online Predators Over Social Networks: A Behavioral Analysis, In: IEEE Access, doi:10.1109/access.2020.3007141 | |
gi.citations.element | Lili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko, Aida Kamišalić (2019): A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks, In: Entropy 8(21), doi:10.3390/e21080772 | |
gi.citations.element | Rachel Menzies, Karen Petrie, Mark Zarb (2015): A case study of Facebook use: Outlining a multi-layer strategy for higher education, In: Education and Information Technologies 1(22), doi:10.1007/s10639-015-9436-y | |
gi.citations.element | Pertti Saariluoma, José J. Cañas, Jaana Leikas (2016): Technology in Life, In: Designing for Life, doi:10.1057/978-1-137-53047-9_1 | |
gi.citations.element | Aqdas Malik (2016): Underpinnings of Digital-Photo Interaction in Computer-Mediated Platforms, In: SSRN Electronic Journal, doi:10.2139/ssrn.2912500 | |
gi.citations.element | Baoxi Liu, Peng Zhang, Yubo Shu, Zhengqing Guan, Tun Lu, Hansu Gu, Ning Gu (2022): Building a Personalized Model for Social Media Textual Content Censorship, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(6), doi:10.1145/3555657 | |
gi.citations.element | Lauren Croucher, Elif Mertan, Roz Shafran, Sophie D Bennett (2020): The Use of Mumsnet by Parents of Young People With Mental Health Needs: Qualitative Investigation, In: JMIR Mental Health 9(7), doi:10.2196/18271 | |
gi.citations.element | Zahra Aivazpour, V. Srinivasan (Chino) Rao (2020): Information Disclosure and Privacy Paradox, In: ACM SIGMIS Database: the DATABASE for Advances in Information Systems 1(51), doi:10.1145/3380799.3380803 | |
gi.citations.element | Ranjany Sundaram, Snehal Shetty (2022): Privacy concerns and protection behavior during the Covid-19 pandemic, In: Problems and Perspectives in Management 2(20), doi:10.21511/ppm.20(2).2022.06 | |
gi.citations.element | Ardion D. Beldad, Ruud Koehorst (2015): It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-20367-6_19 | |
gi.citations.element | April Suknot, Timothy Chavez, Nathan Rackley, Patrick Gage Kelley (2014): Immaculacy, In: Proceedings of the first ACM SIGCHI annual symposium on Computer-human interaction in play, doi:10.1145/2658537.2662971 | |
gi.citations.element | Surya Nepal, Wanita Sherchan, Cecile Paris (2012): Building Trust Communities Using Social Trust, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-28509-7_23 | |
gi.citations.element | Patrick Ferrucci, Edson C. Tandoc, Margaret E. Duffy (2014): Modeling Reality, In: Bulletin of Science, Technology & Society 3-4(34), doi:10.1177/0270467614564153 | |
gi.citations.element | Franco Curmi, Maria Angela Ferrario, Jon Whittle (2014): Sharing real-time biometric data across social networks, In: Proceedings of the 2014 conference on Designing interactive systems, doi:10.1145/2598510.2598515 | |
gi.citations.element | B. S. Vidyalakshmi, Raymond K. Wong, Mojgan Ghanavati, Chi Hung Chi (2014): Privacy as a Service in Social Network Communications, In: 2014 IEEE International Conference on Services Computing, doi:10.1109/scc.2014.67 | |
gi.citations.element | Judit García-Martín, Jesús-Nicasio García-Sánchez (2015): Use of Facebook, Tuenti, Twitter and Myspace among young Spanish people, In: Behaviour & Information Technology 7(34), doi:10.1080/0144929x.2014.993428 | |
gi.citations.element | Mariam El Ouirdi, Jesse Segers, Asma El Ouirdi, Ivana Pais (2015): Predictors of job seekers’ self-disclosure on social media, In: Computers in Human Behavior, doi:10.1016/j.chb.2015.06.039 | |
gi.citations.element | Casey Fiesler, Michaelanne Dye, Jessica L. Feuston, Chaya Hiruncharoenvate, C.J. Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S. Bruckman, Munmun De Choudhury, Eric Gilbert (2017): What (or Who) Is Public?, In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, doi:10.1145/2998181.2998223 | |
gi.citations.element | Heather A. Turner (2021): Collecting Child Victimization Information from Youth and Parents: Ethical and Methodological Considerations, In: Handbook of Interpersonal Violence and Abuse Across the Lifespan, doi:10.1007/978-3-319-89999-2_170 | |
gi.citations.element | Gohar Feroz Khan, Bobby Swar, Sang Kon Lee (2014): Social Media Risks and Benefits, In: Social Science Computer Review 5(32), doi:10.1177/0894439314524701 | |
gi.citations.element | Shampa Chakraverty, Anuradha Yadav, Ritu Sibal (2016): On evaluating the effectiveness of rating similarity-based trust, In: Social Network Analysis and Mining 1(6), doi:10.1007/s13278-016-0395-0 | |
gi.citations.element | Linda Chang, Jengchung Victor Chen (2014): Aligning principal and agent’s incentives: A principal–agent perspective of social networking sites, In: Expert Systems with Applications 6(41), doi:10.1016/j.eswa.2013.10.040 | |
gi.citations.element | Bart P. Knijnenburg (2018): Privacy in Social Information Access, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-90092-6_2 | |
gi.citations.element | Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, Margaret E. Morris (2011): It's not that i don't have problems, i'm just not putting them on facebook, In: Proceedings of the ACM 2011 conference on Computer supported cooperative work, doi:10.1145/1958824.1958876 | |
gi.citations.element | Christos Perentis, Michele Vescovi, Chiara Leonardi, Corrado Moiso, Mirco Musolesi, Fabio Pianesi, Bruno Lepri (2017): Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure, In: ACM Transactions on Internet Technology 2(17), doi:10.1145/3017431 | |
gi.citations.element | Kai Li, Xiaowen Wang, Kunrong Li, Jianguo Che (2016): Information privacy disclosure on social network sites, In: Nankai Business Review International 3(7), doi:10.1108/nbri-02-2015-0005 | |
gi.citations.element | Jiayi Chen, Jianping He, Lin Cai, Jianping Pan (2020): Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing, In: IEEE Transactions on Dependable and Secure Computing 6(17), doi:10.1109/tdsc.2018.2861403 | |
gi.citations.element | Taewan Kim, Hwajung Hong (2021): Understanding University Students’ Experiences, Perceptions, and Attitudes Toward Peers Displaying Mental Health–Related Problems on Social Networking Sites: Online Survey and Interview Study, In: JMIR Mental Health 10(8), doi:10.2196/23465 | |
gi.citations.element | Stephanie L. Black, Dianna L. Stone, Andrew F. Johnson (2014): Use of Social Networking Websites on Applicants’ Privacy, In: Employee Responsibilities and Rights Journal 2(27), doi:10.1007/s10672-014-9245-2 | |
gi.citations.element | Cheol Park, Jongkun Jun, Thaemin Lee (2015): Consumer characteristics and the use of social networking sites, In: International Marketing Review 3/4(32), doi:10.1108/imr-09-2013-0213 | |
gi.citations.element | Matthew T. Mullarkey (2012): Socially immature organizations, In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion, doi:10.1145/2141512.2141604 | |
gi.citations.element | Norsaremah Salleh, Ramlah Hussein, Norshidah Mohamed, Umar Aditiawarman (2013): An Empirical Study of the Factors Influencing Information Disclosure Behaviour in Social Networking Sites, In: 2013 International Conference on Advanced Computer Science Applications and Technologies, doi:10.1109/acsat.2013.43 | |
gi.citations.element | Pradeep K. Atrey (2011): A secret sharing based privacy enforcement mechanism for untrusted social networking operators, In: Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence, doi:10.1145/2072521.2072525 | |
gi.citations.element | Arianna Boldi, Alessandro Silacci, Amon Rapp, Maurizio Caon (2024): Designing for transparency: a web job board for e-recruitment to explore job seekers’ privacy behaviours, In: Behaviour & Information Technology, doi:10.1080/0144929x.2024.2427111 | |
gi.citations.element | Sean D. Young, Howard Padwa, Erin E. Bonar (2019): Social Big Data as a Tool for Understanding and Predicting the Impact of Cannabis Legalization, In: Frontiers in Public Health, doi:10.3389/fpubh.2019.00274 | |
gi.citations.element | Dmitry Epstein, Kelly Quinn (2020): Markers of Online Privacy Marginalization: Empirical Examination of Socioeconomic Disparities in Social Media Privacy Attitudes, Literacy, and Behavior, In: Social Media + Society 2(6), doi:10.1177/2056305120916853 | |
gi.citations.element | Yeslam Al-Saggaf, Sharon Nielsen (2014): Self-disclosure on Facebook among female users and its relationship to feelings of loneliness, In: Computers in Human Behavior, doi:10.1016/j.chb.2014.04.014 | |
gi.citations.element | Ester Gonzalez, Sinjini Mitra, Ofir Turel (2018): Motivational Impacts on Intent to Use Health-Related Social Media, In: Journal of Computer Information Systems 2(60), doi:10.1080/08874417.2017.1406829 | |
gi.citations.element | Jing Li, He Zhao, Shah Hussain, Junren Ming, Jie Wu (2021): The Dark Side of Personalization Recommendation in Short-Form Video Applications: An Integrated Model from Information Perspective, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-71305-8_8 | |
gi.citations.element | Stefan Kendzierskyj, Hamid Jahankhani, Arshad Jamal, Jaime Ibarra Jimenez (2019): The Transparency of Big Data, Data Harvesting and Digital Twins, In: Advanced Sciences and Technologies for Security Applications, doi:10.1007/978-3-030-11289-9_6 | |
gi.citations.element | Kelly Quinn (2014): An Ecological Approach to Privacy: “Doing” Online Privacy at Midlife, In: Journal of Broadcasting & Electronic Media 4(58), doi:10.1080/08838151.2014.966357 | |
gi.citations.element | Phumezo Ntlatywa, Reinhardt A. Botha, Bertram Haskins (2012): Factors that Influence the Choice of Privacy Settings on Facebook: Freshmen's View at a South African University, In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, doi:10.1109/socialcom-passat.2012.36 | |
gi.citations.element | Carolina Dania, Manuel Clavel (2014): Modeling Social Networking Privacy, In: 2014 Theoretical Aspects of Software Engineering Conference, doi:10.1109/tase.2014.21 | |
gi.citations.element | Maritza Johnson, Serge Egelman, Steven M. Bellovin (2012): Facebook and privacy, In: Proceedings of the Eighth Symposium on Usable Privacy and Security, doi:10.1145/2335356.2335369 | |
gi.citations.element | M. Loncar, D. Kermek (2020): Analysis of Social Networks Usage among Students, In: 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), doi:10.23919/mipro48935.2020.9245307 | |
gi.citations.element | Haslina Halim, Bahtiar Mohamad, Shamsu Abdu Dauda, Farah Lina Azizan, Muslim Diekola Akanmu (2021): Association of online political participation with social media usage, perceived information quality, political interest and political knowledge among Malaysian youth: Structural equation model analysis, In: Cogent Social Sciences 1(7), doi:10.1080/23311886.2021.1964186 | |
gi.citations.element | ChiatPin Tay, Vigneshwaran Subbaraju, Thivya Kandappu (2024): PrivObfNet: A Weakly Supervised Semantic Segmentation Model for Data Protection, In: 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), doi:10.1109/wacv57701.2024.00241 | |
gi.citations.element | Slava Kisilevich, Florian Mansmann (2010): Analysis of privacy in online social networks of runet, In: Proceedings of the 3rd international conference on Security of information and networks, doi:10.1145/1854099.1854112 | |
gi.citations.element | Efthymios Lalas, Anastasios Papathanasiou, Costas Lambrinoudakis (2012): Privacy and Traceability in Social Networking Sites, In: 2012 16th Panhellenic Conference on Informatics, doi:10.1109/pci.2012.57 | |
gi.citations.element | Wanita Sherchan, Surya Nepal, Cecile Paris (2013): A survey of trust in social networks, In: ACM Computing Surveys 4(45), doi:10.1145/2501654.2501661 | |
gi.citations.element | Bibi van den Berg, Ronald Leenes (2011): Keeping Up Appearances: Audience Segregation in Social Network Sites, In: Computers, Privacy and Data Protection: an Element of Choice, doi:10.1007/978-94-007-0641-5_10 | |
gi.citations.element | Murillo Pontual, Andreas Gampe, Omar Chowdhury, Bazoumana Kone, Md. Shamim Ashik, William H. Winsborough (2012): The privacy in the time of the internet, In: Proceedings of the second ACM conference on Data and Application Security and Privacy, doi:10.1145/2133601.2133618 | |
gi.citations.element | Yiran Wang, Gloria Mark (2017): Engaging with Political and Social Issues on Facebook in College Life, In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, doi:10.1145/2998181.2998295 | |
gi.citations.element | Shaikha Alduaij, Zhiyuan Chen, Aryya Gangopadhyay (2019): Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level, In: Cyber Law, Privacy, and Security, doi:10.4018/978-1-5225-8897-9.ch024 | |
gi.citations.element | Shruti Sannon, Elizabeth L. Murnane, Natalya N. Bazarova, Geri Gay (2019): "I was really, really nervous posting it", In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3290605.3300583 | |
gi.citations.element | Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz (2017): Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images, In: 2017 IEEE International Conference on Computer Vision (ICCV), doi:10.1109/iccv.2017.398 | |
gi.citations.element | Bibi van den Berg, Ronald Leenes (2010): Audience Segregation in Social Network Sites, In: 2010 IEEE Second International Conference on Social Computing, doi:10.1109/socialcom.2010.165 | |
gi.citations.element | Shamsu Dauda Abdu, Bahtiar Mohamad, Suhaini Muda (2017): Youth Online Political Participation: The Role of Facebook Use, Interactivity, Quality Information and Political Interest, In: SHS Web of Conferences, doi:10.1051/shsconf/20173300080 | |
gi.citations.element | Jayan Chirayath Kurian (2015): Facebook use by the open access repository users, In: Online Information Review 7(39), doi:10.1108/oir-02-2015-0055 | |
gi.citations.element | Nania Nuzulita, Apol Pribadi Subriadi (2019): The role of risk‐benefit and privacy analysis to understand different uses of social media by Generations X, Y, and Z in Indonesia, In: THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES 3(86), doi:10.1002/isd2.12122 | |
gi.citations.element | Eden Litt (2013): Understanding social network site users’ privacy tool use, In: Computers in Human Behavior 4(29), doi:10.1016/j.chb.2013.01.049 | |
gi.citations.element | Sangmi Chai (2020): Does Cultural Difference Matter on Social Media? An Examination of the Ethical Culture and Information Privacy Concerns, In: Sustainability 19(12), doi:10.3390/su12198286 | |
gi.citations.element | Siti Zainab Ibrahim, Ann Blandford, Nadia Bianchi-Berthouze (2012): Privacy Settings on Facebook: Their Roles and Importance, In: 2012 IEEE International Conference on Green Computing and Communications, doi:10.1109/greencom.2012.67 | |
gi.citations.element | Himani Singh, Mamta Bhusry (2017): Privacy policy inference of multiple user-uploaded images on social context websites (Automated generation of privacy policy), In: 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), doi:10.1109/ciact.2017.7977304 | |
gi.citations.element | Marco Ghiglieri, Martin Stopczynski, Michael Waidner (2014): Personal DLP for Facebook, In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), doi:10.1109/percomw.2014.6815279 | |
gi.citations.element | Dijana Peras, Renata Mekovec, Ruben Picek (2018): Influence of GDPR on social networks used by omnichannel contact center, In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), doi:10.23919/mipro.2018.8400206 | |
gi.citations.element | Anuradha Yadav, Shampa Chakraverty, Ritu Sibal (2018): A framework for classifying trust for online systems, In: World Wide Web 4(22), doi:10.1007/s11280-018-0626-6 | |
gi.citations.element | Yao Li, Hichang Cho, Reza Ghaiumy Anaraky, Bart Knijnenburg, Alfred Kobsa (2022): Antecedents of collective privacy management in social network sites: a cross-country analysis, In: CCF Transactions on Pervasive Computing and Interaction 2(4), doi:10.1007/s42486-022-00092-8 | |
gi.citations.element | Claus-Peter H. Ernst (2015): What Drives Sharing and Receiving Usage in Social Network Sites?, In: Factors Driving Social Network Site Usage, doi:10.1007/978-3-658-09918-3_6 | |
gi.citations.element | Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage (2020): The Unheard Story of Organizational Motivations Towards User Privacy, In: Advances in Information Security, Privacy, and Ethics, doi:10.4018/978-1-5225-9742-1.ch012 | |
gi.citations.element | Mariana Aparecida dos Santos, Maria Lúcia Bento Villela, Raquel Oliveira Prates (2020): Analyzing the application of the privacy design model in WhatsApp, In: Proceedings of the 19th Brazilian Symposium on Human Factors in Computing Systems, doi:10.1145/3424953.3426538 | |
gi.citations.element | Danielle Wallace, Gabriel Cesar, E. C. Hedberg (2018): The Effect of Survey Mode on Socially Undesirable Responses to Open-ended Questions, In: Field Methods 2(30), doi:10.1177/1525822x18766284 | |
gi.citations.element | Lynne M. Webb, Nicholas Temple (2016): Social Media and Gender Issues, In: Advances in Media, Entertainment, and the Arts, doi:10.4018/978-1-4666-8310-5.ch025 | |
gi.citations.element | Hung-Yue Suen (2018): The effects of employer SNS motioning on employee perceived privacy violation, procedural justice, and leave intention, In: Industrial Management & Data Systems 6(118), doi:10.1108/imds-10-2017-0453 | |
gi.citations.element | Hanan Ezzat (2022): Online Identity and Egyptian Youth: Exploring Construction Processes, In: ILCEA 46, doi:10.4000/ilcea.13947 | |
gi.citations.element | Jiao Huang, Sameer Kumar, Chuan Hu (2017): Gender Differences in Motivations for Identity Reconstruction on Social Network Sites, In: International Journal of Human–Computer Interaction 7(34), doi:10.1080/10447318.2017.1383061 | |
gi.citations.element | Heba Elshahed (2023): The Impact of Social Media Use, In: Advances in Religious and Cultural Studies, doi:10.4018/978-1-6684-8093-9.ch020 | |
gi.citations.element | Jacopo Staiano, Nuria Oliver, Bruno Lepri, Rodrigo de Oliveira, Michele Caraviello, Nicu Sebe (2014): Money walks, In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, doi:10.1145/2632048.2632074 | |
gi.citations.element | Aigul Kaskina (2022): Citizen Privacy Profile Framework, In: Fuzzy Management Methods, doi:10.1007/978-3-031-06021-2_3 | |
gi.citations.element | Aqdas Malik, Kari Hiekkanen, Marko Nieminen (2016): Privacy and trust in Facebook photo sharing: age and gender differences, In: Program 4(50), doi:10.1108/prog-02-2016-0012 | |
gi.citations.element | Mayank Kumar, Jang Bahadur Singh (2023): Anxiety in Immersive World: A Self-Presentational Perspective of Facebook Use, In: Immersive Technology and Experiences, doi:10.1007/978-981-99-8834-1_14 | |
gi.citations.element | Heather A. Turner (2020): Collecting Child Victimization Information from Youth and Parents: Ethical and Methodological Considerations, In: Handbook of Interpersonal Violence and Abuse Across the Lifespan, doi:10.1007/978-3-319-62122-7_170-1 | |
gi.citations.element | Yeslam Al-Saggaf, Md Zahidul Islam (2014): Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem, In: Science and Engineering Ethics 4(21), doi:10.1007/s11948-014-9564-6 | |
gi.citations.element | Slava Kisilevich, Mark Last (2011): Exploring Gender Differences in Member Profiles of an Online Dating Site Across 35 Countries, In: Lecture Notes in Computer Science, doi:10.1007/978-3-642-23599-3_4 | |
gi.citations.element | Megan Richardson, Rachelle Bosua, Karin Clark, Jeb Webb, Atif Ahmad, Sean Maynard (2017): Towards responsive regulation of the Internet of Things: Australian perspectives, In: Internet Policy Review 1(6), doi:10.14763/2017.1.455 | |
gi.citations.element | Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur (2013): The post anachronism, In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, doi:10.1145/2517840.2517859 | |
gi.citations.element | Eden Litt, Eszter Hargittai (2016): “Just Cast the Net, and Hopefully the Right Fish Swim into It”, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2819933 | |
gi.citations.element | Isha Ghosh, Vivek Singh (2018): Phones, privacy, and predictions, In: Online Information Review 2(44), doi:10.1108/oir-03-2018-0112 | |
gi.citations.element | Serge Egelman, Andrew Oates, Shriram Krishnamurthi (2011): Oops, I did it again, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979280 | |
gi.citations.element | Michael S. Bernstein, Eytan Bakshy, Moira Burke, Brian Karrer (2013): Quantifying the invisible audience in social networks, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/2470654.2470658 | |
gi.conference.sessiontitle | Full Papers |