Measuring individuals’ concerns over collective privacy on social networking sites

Vol.10,No.1(2016)
Special issue: Online Self-disclosure and Privacy

Abstract
With the rise of social networking sites (SNSs), individuals not only disclose personal information but also share private information concerning others online. While shared information is co-constructed by self and others, personal and collective privacy boundaries become blurred. Thus there is an increasing concern over information privacy beyond the individual perspective. However, limited research has empirically examined if individuals are concerned about privacy loss not only of their own but their social ties’; nor is there an established instrument for measuring the collective aspect of individuals’ privacy concerns. In order to address this gap in existing literature, we propose a conceptual framework of individuals’ collective privacy concerns in the context of SNSs. Drawing on the Communication Privacy Management (CPM) theory (Petronio, 2002), we suggest three dimensions of collective privacy concerns, namely, collective information access, control and diffusion. This is followed by the development and empirical validation of a preliminary scale of SNS collective privacy concerns (SNSCPC). Structural model analyses confirm the three-dimensional conceptualization of SNSCPC and reveal antecedents of SNS users’ concerns over violations of the collective privacy boundaries. This paper serves as a starting point for theorizing privacy as a collective notion and for understanding online information disclosure as a result of social interaction and group influence.

Keywords:
Privacy concern; collective privacy; social networking sites
Author biographies

Haiyan Jia

Dr. Haiyan Jia is a post-doctoral scholar at the Pennsylvania State University in the College of Information Sciences and Technology. Her research interest primarily focuses on the social and psychological effects of communication technology ranging from Web to mobile apps to smart objects. Her current work investigates online privacy in social and collective contexts.

Heng Xu

Dr. Heng Xu is an associate professor of Information Sciences and Technology at the Pennsylvania State University. Her research focus is on the interplay between social and technological issues associated with information privacy. She approaches privacy issues through a combination of empirical, theoretical, and technical research efforts. Her research projects have been dealing with individuals' information privacy concerns and behaviors, strategic management of organizational privacy and security practices, and design and empirical evaluations of privacy-enhancing technologies.
References

Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, 36-58. Springer Berlin Heidelberg.

Arbuckle, J. L. (2013). IBM® SPSS® Amos™ 22 User’s Guide. Chicago, IL: IBM.

Bloustein, E.J. (1976). Group privacy: The right to huddle. Rutgers Law Journal, 8, 219-283.

Burgoon, J. K., Parrott, R., Le Poire, B. A., Kelley, D. L., Walther, J. B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships, 6, 131-158. https://doi.org/10.1177/026540758900600201

Child, J. T., & Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Computers in Human Behavior, 26, 957-963. https://doi.org/10.1016/j.chb.2010.02.009

Child, J. T., Pearson, J. C., & Petronio, S. (2009). Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, 60, 2079-2094. https://doi.org/10.1002/asi.21122

Child, J. T., & Petronio, S. (2011). Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the Internet. In K. B. Wright & L. M. Webb (Eds.), Computer-mediated communication in personal relationships (pp. 21-40). Peter Lang.

Choi, C. F., & Jiang, Z. (2013). Trading friendship for value: An investigation of collective privacy concerns in social application usage. In Proceedings of Thirty Fourth International Conference on Information Systems (ICIS 2013) (pp. 1-10). Milano, Italy.

Cronbach, L. J. (1971). Test validation. In R. L. Thomdike (Ed.), Educational measurement (pp. 443-507). Washington DC: American Council on Education.

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x

Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – measurement validity and a regression model. Behaviour & Information Technology, 23, 413-422. https://doi.org/10.1080/01449290410001715723

Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of Americas Conference on Information Systems (AMCIS 2007) (pp. 339-350). Keystone, CO.

Ellison, N. B., Steinfield, C., & Lampe, C. 2011. Connection strategies: Social capital implications of Facebook-enabled communication practices. New Media & Society, 13, 873-892. https://doi.org/10.1177/1461444810385389

Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12, 1143-1168. https://doi.org/10.1111/j.1083-6101.2007.00367.x

Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153-160. https://doi.org/10.1016/j.chb.2008.08.006

Fong, P.W., Anwar, M., & Zhao, Z. (2009). A privacy preservation model for Facebook-style social network systems. Computer Security–ESORICS 2009, 303-320. Springer Berlin Heidelberg.

Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (pp. 71-80).

Hart, M., Johnson, R., & Stent, A. (2007). More content-less control: Access control in the Web 2.0. IEEE Web (2).

Hoadley, M. C., Xu, H., Lee, J., & Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9, 50-60. https://doi.org/10.1016/j.elerap.2009.05.001

Houghton, D.J., & Joinson, A. N. (2010). Privacy, social network sites, and social relations. Journal of Technology in Human Services, 28, 74-94. https://doi.org/10.1080/15228831003770775

Hu, L.T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55.

Jin, S. A. A. (2012). “To disclose or not to disclose, that is the question”: A structural equation modeling approach to communication privacy management in e-health. Computers in Human Behavior, 28, 69-77. https://doi.org/10.1016/j.chb.2011.08.012

Kane, G. C., Alavi, M., Labianca, G. J., & Borgatti, S. (2012). What’s different about social media networks? A framework and research agenda. MIS Quarterly, 38, 274-304. https://doi.org/10.25300/MISQ/2014/38.1.13

MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling. Psychological Methods, 1, 130-149. https://doi.org/10.1037/1082-989X.1.2.130

MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in mis and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35, 293-334. https://doi.org/10.2307/23044045

Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15, 336-355. https://doi.org/10.1287/isre.1040.0032

Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119

Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1, 311-335. https://doi.org/10.1111/j.1468-2885.1991.tb00023.x

Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press.

Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, 2, 175-196. https://doi.org/10.1111/j.1756-2589.2010.00052.x

Petronio, S., & Reierson, J. (2009). Regulating the privacy of confidentiality: Grasping the complexities through communication privacy management theory. In T. Afifi & W. Afifi (Eds.), Uncertainty, information management, and disclosure decisions: Theories and applications (pp. 365-383). Routledge.

Shi, P., Xu, H., & Chen, Y. (2013). Using contextual integrity to examine interpersonal information boundary on social network sites. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI’13) (pp. 35-38). Paris, France.

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35, 989-1015. https://doi.org/10.2307/41409970

Smith, H. J., Milberg, J. S., & Burke, J. S. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167-196. https://doi.org/10.2307/249477

Squicciarini, C. A., Xu, H., & Zhang, X. (2011). CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, 62, 521-534.

Strater, K., & Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction (pp. 111-119). British Computer Society.

Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: Examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’10) (pp. 1553-1562). ACM.

Swathi, G., Radharani, A., & Babu, K. M. (2014). Self-controlled privacy policy for online social networks using multi-party access control. The International Journal of Computer Science Information and Engineering Technology, 4(3).

Utz, S., & Krämer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), article 1.

Walrave, M., Vanwesenbeeck, I., & Heirman, W. (2012). Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 6(1), article 9. https://doi.org/10.5817/CP2012-1-3

Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220. https://doi.org/10.2307/1321160

Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.

Xu, H. (2012). Reframing privacy 2.0 in online social network. University of Pennsylvania Journal of Constitutional Law, 14, 1077-1102. https://doi.org/10.17705/1jais.00281

Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12, 798-824.

Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users’ concerns for information privacy. In Proceedings of 29th Annual International Conference on Information Systems (ICIS 2012), Orlando, FL.

Young, A. L., & Quan-Haase, A. (2009). Information revelation and internet privacy concerns on social network sites: A case study of Facebook. In Proceedings of the Fourth International Conference on Communities and Technologies (pp. 265-274). ACM.

Zittrain, J. (2008). Privacy 2.0. In The University of Chicago Legal Forum, 2008, 65-120.

Metrics

3628

Views

1276

PDF views