Measuring individuals’ concerns over collective privacy on social networking sites
Vol.10,No.1(2016)
Special issue: Online Self-disclosure and Privacy
Privacy concern; collective privacy; social networking sites
Haiyan Jia
Heng Xu
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, 36-58. Springer Berlin Heidelberg.
Arbuckle, J. L. (2013). IBM® SPSS® Amos™ 22 User’s Guide. Chicago, IL: IBM.
Bloustein, E.J. (1976). Group privacy: The right to huddle. Rutgers Law Journal, 8, 219-283.
Burgoon, J. K., Parrott, R., Le Poire, B. A., Kelley, D. L., Walther, J. B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships, 6, 131-158. https://doi.org/10.1177/026540758900600201
Child, J. T., & Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Computers in Human Behavior, 26, 957-963. https://doi.org/10.1016/j.chb.2010.02.009
Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60, 2079-2094. https://doi.org/10.1002/asi.21122
Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the Internet. In K. B. Wright & L. M. Webb (Eds.), Computer-mediated communication in personal relationships (pp. 21-40). Peter Lang.
Choi, C. F., & Jiang, Z. (2013). Trading friendship for value: An investigation of collective privacy concerns in social application usage. In Proceedings of Thirty Fourth International Conference on Information Systems (ICIS 2013) (pp. 1-10). Milano, Italy.
Cronbach, L. J. (1971). Test validation. In R. L. Thomdike (Ed.), Educational measurement (pp. 443-507). Washington DC: American Council on Education.
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – measurement validity and a regression model. Behaviour & Information Technology, 23, 413-422. https://doi.org/10.1080/01449290410001715723
Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of Americas Conference on Information Systems (AMCIS 2007) (pp. 339-350). Keystone, CO.
Ellison, N. B., Steinfield, C., & Lampe, C. 2011. Connection strategies: Social capital implications of Facebook-enabled communication practices. New Media & Society, 13, 873-892. https://doi.org/10.1177/1461444810385389
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12, 1143-1168. https://doi.org/10.1111/j.1083-6101.2007.00367.x
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153-160. https://doi.org/10.1016/j.chb.2008.08.006
Fong, P.W., Anwar, M., & Zhao, Z. (2009). A privacy preservation model for Facebook-style social network systems. Computer Security–ESORICS 2009, 303-320. Springer Berlin Heidelberg.
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (pp. 71-80).
Hart, M., Johnson, R., & Stent, A. (2007). More content-less control: Access control in the Web 2.0. IEEE Web (2).
Hoadley, M. C., Xu, H., Lee, J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50-60. https://doi.org/10.1016/j.elerap.2009.05.001
Houghton, D.J., & Joinson, A. N. (2010). Privacy, social network sites, and social relations. Journal of Technology in Human Services, 28, 74-94. https://doi.org/10.1080/15228831003770775
Hu, L.T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55.
Jin, S. A. A. (2012). “To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health. Computers in Human Behavior, 28, 69-77. https://doi.org/10.1016/j.chb.2011.08.012
Kane, G. C., Alavi, M., Labianca, G. J., & Borgatti, S. (2012). What’s different about social media networks? A framework and research agenda. MIS Quarterly, 38, 274-304. https://doi.org/10.25300/MISQ/2014/38.1.13
MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling. Psychological Methods, 1, 130-149. https://doi.org/10.1037/1082-989X.1.2.130
MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in mis and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35, 293-334. https://doi.org/10.2307/23044045
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336-355. https://doi.org/10.1287/isre.1040.0032
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119
Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1, 311-335. https://doi.org/10.1111/j.1468-2885.1991.tb00023.x
Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press.
Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, 2, 175-196. https://doi.org/10.1111/j.1756-2589.2010.00052.x
Petronio, S., & Reierson, J. (2009). Regulating the privacy of confidentiality: Grasping the complexities through communication privacy management theory. In T. Afifi & W. Afifi (Eds.), Uncertainty, information management, and disclosure decisions: Theories and applications (pp. 365-383). Routledge.
Shi, P., Xu, H., & Chen, Y. (2013). Using contextual integrity to examine interpersonal information boundary on social network sites. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI’13) (pp. 35-38). Paris, France.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 989-1015. https://doi.org/10.2307/41409970
Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167-196. https://doi.org/10.2307/249477
Squicciarini, C. A., Xu, H., & Zhang, X. (2011). CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, 62, 521-534.
Strater, K., & Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction (pp. 111-119). British Computer Society.
Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: Examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’10) (pp. 1553-1562). ACM.
Swathi, G., Radharani, A., & Babu, K. M. (2014). Self-controlled privacy policy for online social networks using multi-party access control. The International Journal of Computer Science Information and Engineering Technology, 4(3).
Utz, S., & Krämer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), article 1.
Walrave, M., Vanwesenbeeck, I., & Heirman, W. (2012). Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 6(1), article 9. https://doi.org/10.5817/CP2012-1-3
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220. https://doi.org/10.2307/1321160
Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.
Xu, H. (2012). Reframing privacy 2.0 in online social network. University of Pennsylvania Journal of Constitutional Law, 14, 1077-1102. https://doi.org/10.17705/1jais.00281
Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12, 798-824.
Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users’ concerns for information privacy. In Proceedings of 29th Annual International Conference on Information Systems (ICIS 2012), Orlando, FL.
Young, A. L., & Quan-Haase, A. (2009). Information revelation and internet privacy concerns on social network sites: A case study of Facebook. In Proceedings of the Fourth International Conference on Communities and Technologies (pp. 265-274). ACM.
Zittrain, J. (2008). Privacy 2.0. In The University of Chicago Legal Forum, 2008, 65-120.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright © 2016 Cyberpsychology: Journal of Psychosocial Research on Cyberspace