DOI QR코드

DOI QR Code

Examining Factors that Determine the Use of Social Media Privacy Settings: Focused on the Mediating Effect of Implementation Intention to Use Privacy Settings

  • Jongki Kim (School of Business, Pusan National University) ;
  • Jianbo Wang (School of Business, Pusan National University)
  • Received : 2020.08.18
  • Accepted : 2020.12.10
  • Published : 2020.12.31

Abstract

Social media platforms such as Instagram and Facebook lead to potential security risks, which consequently raise public concerns about privacy. However, most people rarely make active efforts to protect their personal data, even though they have shown increasing concerns about privacy. Therefore, this study examines the factors that determine social media users' behavior of using privacy settings and testifies the existence of privacy paradox in such a context. In addition, it investigates the mediating effects of implementation intentions on the relationship between intentions and behaviors. In the study, we collected data through questionnaires, and the respondents were undergraduate and graduate students in South Korea. After a pilot test (n = 92) and a set of face-to-face interviews, 266 usable responses were retrieved for data analysis finally. The results confirmed the existence of the privacy paradox regarding the use of social media privacy settings. And the implication intention did positively mediate the relationship between intention and behavior in the context of social media privacy settings. To the best of our knowledge, our study is the first in the information privacy literature to introduce the notion of implementation intention which is a much more powerful explanation and prediction of actual behavior than the (behavioral) intention.

Keywords

References

  1. Acikgoz, Y., and Sumer, H. C. (2019). Implementation intentions as a predictor of applicant withdrawal. Military Psychology, 31(5), 347-354. 
  2. Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce, EC'04, 21-29. 
  3. Acquisti, A., and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In P. Golle and G. Danezis (eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies, 36-58. 
  4. Adam, A. F., and Fayolle, A. (2016). Can implementation intention help to bridge the intention-behaviour gap in the entrepreneurial process? An experimental approach. The International Journal of Entrepreneurship and Innovation, 17(2), 80-88. 
  5. Agarwal, R., and Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665-694. 
  6. Aivazpour, Z., and Rao, V. S. (2020). Information disclosure and privacy paradox: The role of impulsivity. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 51(1), 14-36. 
  7. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. 
  8. Ajzen, I., and Fishbein, M. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs, NJ: Prentice-Hall. 
  9. Armitage, C. J., and Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology, 40(4), 471-499. 
  10. Awad, N. F., and Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1) 13-28. 
  11. Bagozzi, R. P., Dholakia, U. M., and Basuroy, S. (2003). How effortful decisions get enacted: The motivating role of decision processes, desires, and anticipated emotions. Journal of Behavioral Decision Making, 16(4), 273-295. 
  12. Bart, Y., Shankar, V., Sultan, F., and Urban, G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69(4), 133-152. 
  13. Barth, S., and De Jong, M. D. (2017). The privacy paradox-Investigating discrepancies between expressed privacy concerns and actual online behavior-A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. 
  14. Barth, S., De Jong, M. D., Junger, M., Hartel, P. H., and Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55-69. 
  15. Belanger, F., Hiller, J. S., and Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3-4), 245-270. 
  16. Bieleke, M., Legrand, E., Mignon, A., and Gollwitzer, P. M. (2018). More than planned: Implementation intention effects in non-planned situations. Acta Psychologica, 184, 64-74. 
  17. Boyd, D., and Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8), 1. 
  18. Brandtzaeg, P. B., Luders, M., and Skjetne, J. H. (2010). Too many Facebook "friends"? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human-Computer Interaction, 26(11-12), 1006-1030. 
  19. Cho, H., Lee, J. S., and Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995. 
  20. Choon, M. J. K. (2018). Revisiting the privacy paradox on social media: An analysis of privacy practices associated with Facebook and Twitter. Canadian Journal of Communication, 43(2). doi: 10.22230/cjc.2018v43n2a3267 
  21. De Wolf, R., Willaert, K., and Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444-454. 
  22. Debatin, B., Lovejoy, J. P., Horn, A. K., and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. 
  23. Deuker, A. (2009). Addressing the privacy paradox by expanded privacy awareness-the example of context-aware services. In IFIP prime life international summer school on privacy and identity management for life (pp. 275-283). Springer, Berlin, Heidelberg. 
  24. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. 
  25. Dinev, T., and Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 23. 
  26. Du, J., Jiang, C., Chen, K. C., Ren, Y., and Poor, H. V. (2018). Community-structured evolutionary game for privacy protection in social networks. IEEE Transactions on Information Forensics and Security, 13(3), 574-589. 
  27. Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 Proceedings, 339. 
  28. Fishbein, M., and Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Massachusetts: Addison-Wiley Publishing Company. 
  29. Flender, C., and Muller, G. (2012). Type indeterminacy in privacy decisions: The privacy paradox revisited. In International Symposium on Quantum Interaction (pp. 148-159). Springer, Berlin, Heidelberg. 
  30. Frik, A., and Gaudeul, A. (2020). A measure of the implicit value of privacy under risk. Journal of Consumer Marketing, 37(4), 457-472. 
  31. Gerber, N., Gerber, P., and Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261. 
  32. Ginosar, A., and Ariel, Y. (2017). An analytical framework for online privacy research: What is missing? Information & Management, 54(7), 948-957. 
  33. Gollwitzer, P. M. (1993). Goal achievement: The role of intentions. European Review of Social Psychology, 4(1), 141-185. 
  34. Gollwitzer, P. M. (1999). Implementation intentions: Strong effects of simple plans. American Psychologist, 54(7), 493-503. 
  35. Gollwitzer, P. M. (2014). Weakness of the will: Is a quick fix possible? Motivation and Emotion, 38(3), 305-322. 
  36. Gollwitzer, P. M., and Brandstatter, V. (1997). Implementation intentions and effective goal pursuit. Journal of Personality and Social Psychology, 73(1), 186-199. 
  37. Gollwitzer, P. M., and Schaal, B. (1998). Metacognition in action: The importance of implementation intentions. Personality and Social Psychology Review, 2(2), 124-136. 
  38. Gollwitzer, P. M., and Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in Experimental Social Psychology, 38, 69-119. 
  39. Grimmer, M., and Miles, M. P. (2017). With the best of intentions: A large sample test of the intention-behaviour gap in pro-environmental consumer behaviour. International Journal of Consumer Studies, 41(1), 2-10. 
  40. Gross, R., and Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71-80. 
  41. Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227. 
  42. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9(1), 50-60. 
  43. Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85. 
  44. Hsieh, S. H., and Lee, C. T. (2020). Traces of mobility: Examining location disclosure on social networks with mobile location tagging. Telematics and Informatics, 49, 101366. 
  45. Hsu, M. H., and Kuo, F. Y. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42(4), 305-320. 
  46. Hughes-Roberts, T. (2013). Privacy and social networks: Is concern a valid indicator of intention and behaviour? In Proceedings of the 2013 International Conference on Social Computing, 909-912. 
  47. Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195-204. 
  48. Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). doi: 10.1111/j.1083-6101.1999.tb00337.x 
  49. Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173. 
  50. Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. 
  51. Krishnamurthy, B., and Wills, C. E. (2008). Characterizing privacy in online social networks. In Proceedings of the First Workshop on Online Social Networks, 37-42. 
  52. Lee, N., and Kwon, O. (2015). A privacy-aware feature selection method for solving the personalization-privacy paradox in mobile wellness healthcare services. Expert Systems with Applications, 42(5), 2764-2771. 
  53. Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481. 
  54. Li, Y., Vishwamitra, N., Hu, H., and Caine, K. (2020). Towards A taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1-14. 
  55. Lowry, P. B., Cao, J., and Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200. 
  56. MacMillan, D., and McMillan, R. (2018, October 8). Google exposed user data, feared repercussions of disclosing to public. Wall Street Journal, https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194 
  57. Madejski, M., Johnson, M., and Bellovin, S. M. (2011). The failure of online social network privacy settings. Columbia University, Technical Report CUCS-010-11. doi: 10.7916/D8NG4ZJ1 
  58. Madejski, M., Johnson, M., and Bellovin, S. M. (2012). A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 340-345. 
  59. McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359. 
  60. Melicher, W., Sharif, M., Tan, J., Bauer, L., Christodorescu, M., and Leon, P. G. (2016). (Do Not) Track me sometimes: Users' contextual preferences for web tracking. Proceedings on Privacy Enhancing Technologies, 2016(2), 135-154. 
  61. Millham, M. H., and Atkin, D. (2018). Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors. New Media & Society, 20(1), 50-67. 
  62. Mosteller, J., and Poddar, A. (2017). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors. Journal of Interactive Marketing, 39, 27-38. 
  63. Netter, M., Riesner, M., Weber, M., and Pernul, G. (2013). Privacy settings in online social networks-preferences, perception, and reality. In 2013 46th Hawaii International Conference on System Sciences, 3219-3228. 
  64. Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. 
  65. Nunnally J. C. (1978). An overview of psychological measurement. In B. B. Wolman (ed.), Clinical diagnosis of mental disorders (pp. 97-146). Boston, MA: Springer. 
  66. Oomen, I., and Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. In Policies and research in identity management (pp. 121-138). Boston, MA: Springer. 
  67. Papies, E. K. (2017). Situating interventions to bridge the intention-behaviour gap: A framework for recruiting nonconscious processes for behaviour change. Social and Personality Psychology Compass, 11(7), e12323. 
  68. Podsakoff, P. M., and Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-544. 
  69. Prestwich, A., and Kellar, I. (2014). How can the impact of implementation intentions as a behaviour change intervention be improved? European Review of Applied Psychology, 64(1), 35-41. 
  70. Ramaswami, S. N., Srinivasan, S. S., and Gorton, S. A. (1997). Information asymmetry between salesperson and supervisor: Postulates from agency and social exchange theories. Journal of Personal Selling & Sales Management, 17(3), 29-50. 
  71. Reynolds, B., Venkatanathan, J., Goncalves, J., and Kostakos, V. (2011). Sharing ephemeral information in online social networks: Privacy perceptions and behaviours. In IFIP Conference on Human-Computer Interaction, 204-215. 
  72. Schoenbachler, D. D., and Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2-16. 
  73. Schwarzer, R., Richert, J., Kreausukon, P., Remme, L., Wiedemann, A. U., and Reuter, T. (2010). Translating intentions into nutrition behaviors via planning requires self-efficacy: Evidence from Thailand and Germany. International Journal of Psychology, 45(4), 260-268. 
  74. Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. European Review of Social Psychology, 12(1), 1-36. 
  75. Sheeran, P., and Orbell, S. (1999). Implementation intentions and repeated behaviour: Augmenting the predictive validity of the theory of planned behaviour. European Journal of Social Psychology, 29(2-3), 349-369. 
  76. Sheeran, P., and Silverman, M. (2003). Evaluation of three interventions to promote workplace health and safety: Evidence for the utility of implementation intentions. Social Science & Medicine, 56(10), 2153-2163. 
  77. Sniehotta, F. F., Scholz, U., and Schwarzer, R. (2005). Bridging the intention-behaviour gap: Planning, self-efficacy, and action control in the adoption and maintenance of physical exercise. Psychology & Health, 20(2), 143-160. 
  78. Spottswood, E. L., and Hancock, J. T. (2017). Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication, 22(2), 55-70. 
  79. Strater, K., and Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity, Interaction, 22, 111-119. 
  80. Sun, Y., Wang, N., Shen, X. L., and Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278-292. 
  81. Taddicken, M. (2014). The 'privacy paradox'in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273. 
  82. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. (2005). PLS path modeling. Computational Statistics & Data Analysis, 48(1), 159-205. 
  83. Thompson, R., Barclay, D. W., and Higgins, C. A. (1995). The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration. Technology Studies: Special Issue on Research Methodology, 2(2), 284-324. 
  84. Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1-12. 
  85. Utz, S., and Kramer, N. C. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), 2. 
  86. Van Gelderen, M., Kautonen, T., Wincent, J., and Biniari, M. (2018). Implementation intentions in the entrepreneurial process: Concept, empirical findings, and research agenda. Small Business Economics, 51(4), 923-941. 
  87. Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480. 
  88. Wall, J. D., and Warkentin, M. (2019). Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Information & Management, 56(8), 103157. 
  89. Webb, T. L., and Sheeran, P. (2007). How do implementation intentions promote goal attainment? A test of component processes. Journal of Experimental Social Psychology, 43(2), 295-302. 
  90. Wisniewski, P. J., Knijnenburg, B. P., and Lipford, H. R. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95-108. 
  91. Xie, W., and Kang, C. (2015). See you, see me: Teenagers' self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398-407. 
  92. Xu, H., Dinev, T., Smith, J., and Hart, P. (2011). Information privacy concerns: Linking perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1. 
  93. Yang, Q., Gong, X., Zhang, K. Z., Liu, H., and Lee, M. K. (2020). Self-disclosure in mobile payment applications: Common and differential effects of personal and proxy control enhancing mechanisms. International Journal of Information Management, 52, 102065. 
  94. Young, A. L., and Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479-500. 
  95. Zafeiropoulou, A. M., Millard, D. E., Webber, C., and O'Hara, K. (2013). Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? In Proceedings of the 5th Annual ACM Web Science Conference, 463-472. 
  96. Zhao, L., Lu, Y., and Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90. 
  97. Ziegelmann, J. P., Luszczynska, A., Lippke, S., and Schwarzer, R. (2007). Are goal intentions or implementation intentions better predictors of health behavior? A longitudinal study in orthopedic rehabilitation. Rehabilitation Psychology, 52(1), 97-102. 
  98. Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., and Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123.