DOI QR코드

DOI QR Code

Examining Factors that Determine the Use of Social Media Privacy Settings: Focused on the Mediating Effect of Implementation Intention to Use Privacy Settings

  • Jongki Kim (School of Business, Pusan National University) ;
  • Jianbo Wang (School of Business, Pusan National University)
  • Received : 2020.08.18
  • Accepted : 2020.12.10
  • Published : 2020.12.31

Abstract

Social media platforms such as Instagram and Facebook lead to potential security risks, which consequently raise public concerns about privacy. However, most people rarely make active efforts to protect their personal data, even though they have shown increasing concerns about privacy. Therefore, this study examines the factors that determine social media users' behavior of using privacy settings and testifies the existence of privacy paradox in such a context. In addition, it investigates the mediating effects of implementation intentions on the relationship between intentions and behaviors. In the study, we collected data through questionnaires, and the respondents were undergraduate and graduate students in South Korea. After a pilot test (n = 92) and a set of face-to-face interviews, 266 usable responses were retrieved for data analysis finally. The results confirmed the existence of the privacy paradox regarding the use of social media privacy settings. And the implication intention did positively mediate the relationship between intention and behavior in the context of social media privacy settings. To the best of our knowledge, our study is the first in the information privacy literature to introduce the notion of implementation intention which is a much more powerful explanation and prediction of actual behavior than the (behavioral) intention.

Keywords

References

  1. Acikgoz, Y., and Sumer, H. C. (2019). Implementation intentions as a predictor of applicant withdrawal. Military Psychology, 31(5), 347-354.  https://doi.org/10.1080/08995605.2019.1637208
  2. Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Conference on Electronic Commerce, EC'04, 21-29. 
  3. Acquisti, A., and Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In P. Golle and G. Danezis (eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies, 36-58. 
  4. Adam, A. F., and Fayolle, A. (2016). Can implementation intention help to bridge the intention-behaviour gap in the entrepreneurial process? An experimental approach. The International Journal of Entrepreneurship and Innovation, 17(2), 80-88.  https://doi.org/10.1177/1465750316648569
  5. Agarwal, R., and Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665-694.  https://doi.org/10.2307/3250951
  6. Aivazpour, Z., and Rao, V. S. (2020). Information disclosure and privacy paradox: The role of impulsivity. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 51(1), 14-36.  https://doi.org/10.1145/3380799.3380803
  7. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.  https://doi.org/10.1016/0749-5978(91)90020-T
  8. Ajzen, I., and Fishbein, M. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs, NJ: Prentice-Hall. 
  9. Armitage, C. J., and Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology, 40(4), 471-499.  https://doi.org/10.1348/014466601164939
  10. Awad, N. F., and Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1) 13-28.  https://doi.org/10.2307/25148715
  11. Bagozzi, R. P., Dholakia, U. M., and Basuroy, S. (2003). How effortful decisions get enacted: The motivating role of decision processes, desires, and anticipated emotions. Journal of Behavioral Decision Making, 16(4), 273-295.  https://doi.org/10.1002/bdm.446
  12. Bart, Y., Shankar, V., Sultan, F., and Urban, G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69(4), 133-152.  https://doi.org/10.1509/jmkg.2005.69.4.133
  13. Barth, S., and De Jong, M. D. (2017). The privacy paradox-Investigating discrepancies between expressed privacy concerns and actual online behavior-A systematic literature review. Telematics and Informatics, 34(7), 1038-1058.  https://doi.org/10.1016/j.tele.2017.04.013
  14. Barth, S., De Jong, M. D., Junger, M., Hartel, P. H., and Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41, 55-69.  https://doi.org/10.1016/j.tele.2019.03.003
  15. Belanger, F., Hiller, J. S., and Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3-4), 245-270.  https://doi.org/10.1016/S0963-8687(02)00018-5
  16. Bieleke, M., Legrand, E., Mignon, A., and Gollwitzer, P. M. (2018). More than planned: Implementation intention effects in non-planned situations. Acta Psychologica, 184, 64-74.  https://doi.org/10.1016/j.actpsy.2017.06.003
  17. Boyd, D., and Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8), 1. 
  18. Brandtzaeg, P. B., Luders, M., and Skjetne, J. H. (2010). Too many Facebook "friends"? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human-Computer Interaction, 26(11-12), 1006-1030.  https://doi.org/10.1080/10447318.2010.516719
  19. Cho, H., Lee, J. S., and Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995.  https://doi.org/10.1016/j.chb.2010.02.012
  20. Choon, M. J. K. (2018). Revisiting the privacy paradox on social media: An analysis of privacy practices associated with Facebook and Twitter. Canadian Journal of Communication, 43(2). doi: 10.22230/cjc.2018v43n2a3267 
  21. De Wolf, R., Willaert, K., and Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444-454.  https://doi.org/10.1016/j.chb.2014.03.010
  22. Debatin, B., Lovejoy, J. P., Horn, A. K., and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108.  https://doi.org/10.1111/j.1083-6101.2009.01494.x
  23. Deuker, A. (2009). Addressing the privacy paradox by expanded privacy awareness-the example of context-aware services. In IFIP prime life international summer school on privacy and identity management for life (pp. 275-283). Springer, Berlin, Heidelberg. 
  24. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.  https://doi.org/10.1287/isre.1060.0080
  25. Dinev, T., and Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 23. 
  26. Du, J., Jiang, C., Chen, K. C., Ren, Y., and Poor, H. V. (2018). Community-structured evolutionary game for privacy protection in social networks. IEEE Transactions on Information Forensics and Security, 13(3), 574-589.  https://doi.org/10.1109/TIFS.2017.2758756
  27. Dwyer, C., Hiltz, S., and Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 Proceedings, 339. 
  28. Fishbein, M., and Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Massachusetts: Addison-Wiley Publishing Company. 
  29. Flender, C., and Muller, G. (2012). Type indeterminacy in privacy decisions: The privacy paradox revisited. In International Symposium on Quantum Interaction (pp. 148-159). Springer, Berlin, Heidelberg. 
  30. Frik, A., and Gaudeul, A. (2020). A measure of the implicit value of privacy under risk. Journal of Consumer Marketing, 37(4), 457-472.  https://doi.org/10.1108/JCM-06-2019-3286
  31. Gerber, N., Gerber, P., and Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261.  https://doi.org/10.1016/j.cose.2018.04.002
  32. Ginosar, A., and Ariel, Y. (2017). An analytical framework for online privacy research: What is missing? Information & Management, 54(7), 948-957.  https://doi.org/10.1016/j.im.2017.02.004
  33. Gollwitzer, P. M. (1993). Goal achievement: The role of intentions. European Review of Social Psychology, 4(1), 141-185.  https://doi.org/10.1080/14792779343000059
  34. Gollwitzer, P. M. (1999). Implementation intentions: Strong effects of simple plans. American Psychologist, 54(7), 493-503.  https://doi.org/10.1037/0003-066X.54.7.493
  35. Gollwitzer, P. M. (2014). Weakness of the will: Is a quick fix possible? Motivation and Emotion, 38(3), 305-322.  https://doi.org/10.1007/s11031-014-9416-3
  36. Gollwitzer, P. M., and Brandstatter, V. (1997). Implementation intentions and effective goal pursuit. Journal of Personality and Social Psychology, 73(1), 186-199.  https://doi.org/10.1037/0022-3514.73.1.186
  37. Gollwitzer, P. M., and Schaal, B. (1998). Metacognition in action: The importance of implementation intentions. Personality and Social Psychology Review, 2(2), 124-136.  https://doi.org/10.1207/s15327957pspr0202_5
  38. Gollwitzer, P. M., and Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in Experimental Social Psychology, 38, 69-119.  https://doi.org/10.1016/S0065-2601(06)38002-1
  39. Grimmer, M., and Miles, M. P. (2017). With the best of intentions: A large sample test of the intention-behaviour gap in pro-environmental consumer behaviour. International Journal of Consumer Studies, 41(1), 2-10.  https://doi.org/10.1111/ijcs.12290
  40. Gross, R., and Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71-80. 
  41. Hallam, C., and Zanella, G. (2017). Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, 68, 217-227.  https://doi.org/10.1016/j.chb.2016.11.033
  42. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010). Privacy as information access and illusory control: The case of the Facebook news feed privacy outcry. Electronic Commerce Research and Applications, 9(1), 50-60.  https://doi.org/10.1016/j.elerap.2009.05.001
  43. Hoffman, D. L., Novak, T. P., and Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-85.  https://doi.org/10.1145/299157.299175
  44. Hsieh, S. H., and Lee, C. T. (2020). Traces of mobility: Examining location disclosure on social networks with mobile location tagging. Telematics and Informatics, 49, 101366. 
  45. Hsu, M. H., and Kuo, F. Y. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42(4), 305-320.  https://doi.org/10.1023/A:1022500626298
  46. Hughes-Roberts, T. (2013). Privacy and social networks: Is concern a valid indicator of intention and behaviour? In Proceedings of the 2013 International Conference on Social Computing, 909-912. 
  47. Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195-204.  https://doi.org/10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7
  48. Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. (1999). Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). doi: 10.1111/j.1083-6101.1999.tb00337.x 
  49. Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C. (2013). Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human-Computer Studies, 71(12), 1163-1173.  https://doi.org/10.1016/j.ijhcs.2013.08.016
  50. Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.  https://doi.org/10.1016/j.cose.2015.07.002
  51. Krishnamurthy, B., and Wills, C. E. (2008). Characterizing privacy in online social networks. In Proceedings of the First Workshop on Online Social Networks, 37-42. 
  52. Lee, N., and Kwon, O. (2015). A privacy-aware feature selection method for solving the personalization-privacy paradox in mobile wellness healthcare services. Expert Systems with Applications, 42(5), 2764-2771.  https://doi.org/10.1016/j.eswa.2014.11.031
  53. Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471-481.  https://doi.org/10.1016/j.dss.2012.06.010
  54. Li, Y., Vishwamitra, N., Hu, H., and Caine, K. (2020). Towards A taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1-14. 
  55. Lowry, P. B., Cao, J., and Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163-200.  https://doi.org/10.2753/MIS0742-1222270406
  56. MacMillan, D., and McMillan, R. (2018, October 8). Google exposed user data, feared repercussions of disclosing to public. Wall Street Journal, https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194 
  57. Madejski, M., Johnson, M., and Bellovin, S. M. (2011). The failure of online social network privacy settings. Columbia University, Technical Report CUCS-010-11. doi: 10.7916/D8NG4ZJ1 
  58. Madejski, M., Johnson, M., and Bellovin, S. M. (2012). A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 340-345. 
  59. McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.  https://doi.org/10.1287/isre.13.3.334.81
  60. Melicher, W., Sharif, M., Tan, J., Bauer, L., Christodorescu, M., and Leon, P. G. (2016). (Do Not) Track me sometimes: Users' contextual preferences for web tracking. Proceedings on Privacy Enhancing Technologies, 2016(2), 135-154.  https://doi.org/10.1515/popets-2016-0009
  61. Millham, M. H., and Atkin, D. (2018). Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors. New Media & Society, 20(1), 50-67.  https://doi.org/10.1177/1461444816654465
  62. Mosteller, J., and Poddar, A. (2017). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors. Journal of Interactive Marketing, 39, 27-38.  https://doi.org/10.1016/j.intmar.2017.02.003
  63. Netter, M., Riesner, M., Weber, M., and Pernul, G. (2013). Privacy settings in online social networks-preferences, perception, and reality. In 2013 46th Hawaii International Conference on System Sciences, 3219-3228. 
  64. Norberg, P. A., Horne, D. R., and Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.  https://doi.org/10.1111/j.1745-6606.2006.00070.x
  65. Nunnally J. C. (1978). An overview of psychological measurement. In B. B. Wolman (ed.), Clinical diagnosis of mental disorders (pp. 97-146). Boston, MA: Springer. 
  66. Oomen, I., and Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. In Policies and research in identity management (pp. 121-138). Boston, MA: Springer. 
  67. Papies, E. K. (2017). Situating interventions to bridge the intention-behaviour gap: A framework for recruiting nonconscious processes for behaviour change. Social and Personality Psychology Compass, 11(7), e12323. 
  68. Podsakoff, P. M., and Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-544.  https://doi.org/10.1177/014920638601200408
  69. Prestwich, A., and Kellar, I. (2014). How can the impact of implementation intentions as a behaviour change intervention be improved? European Review of Applied Psychology, 64(1), 35-41.  https://doi.org/10.1016/j.erap.2010.03.003
  70. Ramaswami, S. N., Srinivasan, S. S., and Gorton, S. A. (1997). Information asymmetry between salesperson and supervisor: Postulates from agency and social exchange theories. Journal of Personal Selling & Sales Management, 17(3), 29-50. 
  71. Reynolds, B., Venkatanathan, J., Goncalves, J., and Kostakos, V. (2011). Sharing ephemeral information in online social networks: Privacy perceptions and behaviours. In IFIP Conference on Human-Computer Interaction, 204-215. 
  72. Schoenbachler, D. D., and Gordon, G. L. (2002). Trust and customer willingness to provide information in database-driven relationship marketing. Journal of Interactive Marketing, 16(3), 2-16.  https://doi.org/10.1002/dir.10033
  73. Schwarzer, R., Richert, J., Kreausukon, P., Remme, L., Wiedemann, A. U., and Reuter, T. (2010). Translating intentions into nutrition behaviors via planning requires self-efficacy: Evidence from Thailand and Germany. International Journal of Psychology, 45(4), 260-268.  https://doi.org/10.1080/00207591003674479
  74. Sheeran, P. (2002). Intention-behavior relations: A conceptual and empirical review. European Review of Social Psychology, 12(1), 1-36.  https://doi.org/10.1080/14792772143000003
  75. Sheeran, P., and Orbell, S. (1999). Implementation intentions and repeated behaviour: Augmenting the predictive validity of the theory of planned behaviour. European Journal of Social Psychology, 29(2-3), 349-369.  https://doi.org/10.1002/(SICI)1099-0992(199903/05)29:2/3<349::AID-EJSP931>3.0.CO;2-Y
  76. Sheeran, P., and Silverman, M. (2003). Evaluation of three interventions to promote workplace health and safety: Evidence for the utility of implementation intentions. Social Science & Medicine, 56(10), 2153-2163.  https://doi.org/10.1016/S0277-9536(02)00220-4
  77. Sniehotta, F. F., Scholz, U., and Schwarzer, R. (2005). Bridging the intention-behaviour gap: Planning, self-efficacy, and action control in the adoption and maintenance of physical exercise. Psychology & Health, 20(2), 143-160.  https://doi.org/10.1080/08870440512331317670
  78. Spottswood, E. L., and Hancock, J. T. (2017). Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication, 22(2), 55-70.  https://doi.org/10.1111/jcc4.12182
  79. Strater, K., and Lipford, H. R. (2008). Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity, Interaction, 22, 111-119. 
  80. Sun, Y., Wang, N., Shen, X. L., and Zhang, J. X. (2015). Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences. Computers in Human Behavior, 52, 278-292.  https://doi.org/10.1016/j.chb.2015.06.006
  81. Taddicken, M. (2014). The 'privacy paradox'in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273.  https://doi.org/10.1111/jcc4.12052
  82. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C. (2005). PLS path modeling. Computational Statistics & Data Analysis, 48(1), 159-205.  https://doi.org/10.1016/j.csda.2004.03.005
  83. Thompson, R., Barclay, D. W., and Higgins, C. A. (1995). The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration. Technology Studies: Special Issue on Research Methodology, 2(2), 284-324. 
  84. Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93, 1-12.  https://doi.org/10.1016/j.chb.2018.11.046
  85. Utz, S., and Kramer, N. C. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), 2. 
  86. Van Gelderen, M., Kautonen, T., Wincent, J., and Biniari, M. (2018). Implementation intentions in the entrepreneurial process: Concept, empirical findings, and research agenda. Small Business Economics, 51(4), 923-941.  https://doi.org/10.1007/s11187-017-9971-6
  87. Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472-480.  https://doi.org/10.1016/j.giq.2016.06.004
  88. Wall, J. D., and Warkentin, M. (2019). Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Information & Management, 56(8), 103157. 
  89. Webb, T. L., and Sheeran, P. (2007). How do implementation intentions promote goal attainment? A test of component processes. Journal of Experimental Social Psychology, 43(2), 295-302.  https://doi.org/10.1016/j.jesp.2006.02.001
  90. Wisniewski, P. J., Knijnenburg, B. P., and Lipford, H. R. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95-108.  https://doi.org/10.1016/j.ijhcs.2016.09.006
  91. Xie, W., and Kang, C. (2015). See you, see me: Teenagers' self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398-407.  https://doi.org/10.1016/j.chb.2015.05.059
  92. Xu, H., Dinev, T., Smith, J., and Hart, P. (2011). Information privacy concerns: Linking perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 1. 
  93. Yang, Q., Gong, X., Zhang, K. Z., Liu, H., and Lee, M. K. (2020). Self-disclosure in mobile payment applications: Common and differential effects of personal and proxy control enhancing mechanisms. International Journal of Information Management, 52, 102065. 
  94. Young, A. L., and Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479-500.  https://doi.org/10.1080/1369118X.2013.777757
  95. Zafeiropoulou, A. M., Millard, D. E., Webber, C., and O'Hara, K. (2013). Unpicking the privacy paradox: Can structuration theory help to explain location-based privacy decisions? In Proceedings of the 5th Annual ACM Web Science Conference, 463-472. 
  96. Zhao, L., Lu, Y., and Gupta, S. (2012). Disclosure intention of location-related information in location-based social network services. International Journal of Electronic Commerce, 16(4), 53-90.  https://doi.org/10.2753/JEC1086-4415160403
  97. Ziegelmann, J. P., Luszczynska, A., Lippke, S., and Schwarzer, R. (2007). Are goal intentions or implementation intentions better predictors of health behavior? A longitudinal study in orthopedic rehabilitation. Rehabilitation Psychology, 52(1), 97-102.  https://doi.org/10.1037/0090-5550.52.1.97
  98. Zimmer, J. C., Arsal, R. E., Al-Marzouq, M., and Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123. https://doi.org/10.1016/j.im.2009.12.003