Browse > Article
http://dx.doi.org/10.7737/KMSR.2012.29.2.001

Effects of Self-Presentation and Privacy Concern on an Individual's Self-Disclosure : An Empirical Study on Twitter  

Lee, Sae-Bom (경희대학교 경영대학)
Fan, Liu (경희대학교 경영대학)
Lee, Sang-Chul (그리스도대학교 경영학부)
Suh, Yung-Ho (경희대학교 경영대학)
Publication Information
Korean Management Science Review / v.29, no.2, 2012 , pp. 1-20 More about this Journal
Abstract
While feeling anxious about the risk of exposure of personal information and privacy, users of microblogs and social network services are continuously using them. This study aims to develop a model to investigate this phenomenon. Specifically, this study explores the relationship between personal characteristics (represented by privacy concern and self-presentation) and an individual's self-disclosure. An individual's personal belief (represented by perceived risk and perceived trust) is also tested as an mediator between the relationship. Through a questionnaire survey to 183 twitter users in Korea, the results indicate that self-presentation has a direct influence on self-disclosure as well as an indirect influence through perceived trust. In contrast, privacy concern has not a direct but an indirect negative influence on self-disclosure through perceived risk. In conclusion, self-presentation has a stronger influence on self-disclosure then privacy concern to Twitter users. An individual who has a higher propensity for self-presentation will form a stronger perceived trust on Twitter, which in turn, affects the individual's self-disclosure. On the other hand, an individual who is more concerned with personal privacy will feel more serious about perceived risk, which in turn, negatively influences one's perception of the trust in Twitter as well as his desire for self-disclosure.
Keywords
Twitter; Microblog; Privacy Concern; Self-Disclosure; Self-Presentation; Perceived Risk; Perceived Trust;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 McKenna, K.Y.A. and J.A. Bargh, "Coming out in the age of the Internet:identity demarginalization through virtual group participation," Journal of Personality and Social Psychology, Vol.75, No.68(1998), pp.1-94.
2 McKnight, D.H., L.L. Cummings, N.L. Chervany, "Initial trust formation in new organizational relationships," Academy of Management Review, Vol.23, No.3(1998), pp.472-490.
3 Milne, G.R. and M.-E. Boza, "Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices," Journal of Interactive Marketing, Vol.13, No.1(1999), pp.5-24.   DOI
4 Hollyman, F.M., The effect of personal control and instrumental value on the experience of invasion of privacy, Unpublished Doctoral Dissertation, Purdue University, 1977.
5 Jansen, B.J., M. Zhang, K. Sobel, and A. Chowdury, "Twitter power:Tweets as electronic word of mouth," Journal of the American Society for Information Science and Technology, Vol.60, No.11(2009), pp.2169-2188.   DOI   ScienceOn
6 Java, A., X. Song, T. Finin, and B. Tseng, Why we twitter:understanding microblogging usage and communities, Proceeding of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, (2007), pp.56-65.
7 Java, A., X. Song, T. Finin, and B. Tseng, "Why we twitter:An analysis of a microblogging community," Advances in Web Mining and Web Usage Analysis, Vol.54, No.39 (2009), pp.118-138.
8 Jarvenpaa, S.L., N. Tractinsky, and M. Vitale, "Consumer Trust in an Internet Store," Information Technology and Management, Vol.1, No.12(2000), pp.45-71.   DOI   ScienceOn
9 Jourard, S.M. and P. Lasakow, "Some factors in self-disclosure," Journal of Abnormal and Psychology, Vol.10(1958), pp.91-98.
10 Jourard, S.M., Self-disclosure:An experimental analysis of the transparent self, Wiley, New York, 1971.
11 Kim, H.S. and D.K. Sherman, "Express Yourself: culture and the effect of self-expression on choice," Journal of personality and Social psychology, Vol.92, No.1(2007), pp.1-11.   DOI   ScienceOn
12 Krishnamurthy, B. and C.E. Wills, "Characterizing privacy in online social networks," Proceedings of the first workshop on Online social networks, (2008), pp.37-42.
13 Leary, M.R. and R.M. Kowalski, "Impression Management:A Literature Review and Two-Component Model," Psychological Bulletin, Vol.107, No.1(1990), pp.34-47.   DOI
14 Dinev, T. and P. Hart, "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, Vol. 17, No.1(2006), pp.61-80.   DOI   ScienceOn
15 Dorminick, J.R., "Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web," Journalism and Mass Communication Quarterly, Vol.76, No.4(1999), pp.646-658.   DOI
16 Donthu, N. and A. Garcia, "The Internet shopper," Journal of Advertising Research, Vol.39, No.3(1999), pp.52-68.
17 Dowling, G.R., "The Effectiveness of Advertising Explicit Warranties," Journal of Public policy and Marketing, Vol.4(1985), pp.142-152.
18 Dowlin, G.R. and R. Staelin, "A Model of Perceived Risk and Intended Risk-Handling Activity," Journal of Consumer Research, Vol.21, No.1(1994), pp.119-134.   DOI   ScienceOn
19 Eastlick, M.A., S.L. Lotz, and P. Warrington, "Understanding Online B-to-C Relationships :An Integrated Model of Privacy Concerns, Trust, and Commitment," Journal of Business Research, Vol.59(2006), pp.877-886.   DOI   ScienceOn
20 Fishbein, M. and I. Ajzen, Belief, Attitude, Intention and Behavior:An Introduction to Theory and Research, Addison-Wesley, Reading, MA, 1975.
21 Gefen, D., E. Karahanna, and D.W. Straub, "Trust and TAM in Online Shopping:An Integrated Model," MIS Quarterly, Vol.27, No.1(2003), pp.51-90.   DOI
22 Goffman, E., The Presentation of Self in Everyday Life, Doubleday, New York, 1959.
23 Grazioli, S. and S.L. Jarvenpaa, "Perils of Internet Fraud:An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man, and Cybernetics, Part A:Systems Humans, Vol.30, No.4(2000), pp.395-410.   DOI   ScienceOn
24 Boyd, D.M. and N.B. Ellison, "Social network sites:Definition, History, and Scholarship," Journal of Computer Mediated Communication, Vol.13, No.1(2007), pp.210-230.   DOI
25 Brendan, M., J. Tam, P.G. Kelley, and L.F. Cranor, "RT@IWantPrivacy:Widespread Violation of Privacy Settings in the Twitter Social Network," In Web 2.0 Privacy and Security Workshop, IEEE Symposium on Security and Privacy, 2010.
26 Chang, L.K. and S. Kwon, "A cognitive mapdriven avatar design recommendation DSS and its empirical validity," Decision Support Systems, Vol.45, No.3(2008), pp.461-472.   DOI   ScienceOn
27 Chellappa, R.K. and R. Sin, "Personalization Versus Privacy:An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management, Vol.6, No.2(2005), pp.181-202.   DOI   ScienceOn
28 Cheung, C. and M.K.O. Lee, "Trust in internet shopping:a proposed model and measurement instrument," Proceedings of the 6th Americas Conference on Information Systems, (2000), pp.681-689.
29 Chiu, C.M., M.H. Hsu, and E.T.G. Wang, "Understanding knowledge sharing in virtual communities:an integration of social capital and social cognitive theories," Decision Support Systems, Vol.42, No.3(2006), pp.1872-1888.   DOI   ScienceOn
30 Cozby, P.C., "Self-disclosure:A literature review," Psychological Bulletin, Vol.79(1973), pp.73-91.   DOI   ScienceOn
31 Culnan, M.J., "How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, Vol.17, No.3(1993), pp.341-364.   DOI   ScienceOn
32 Davis, F.D., R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology :A Comparison of Two Theoretical Models," Management Science, Vol.35, No.8(1989), pp. 982-1003.   DOI   ScienceOn
33 신지영, 양희동, "온라인 커뮤니티기반 블로그 활동에 영향을 미치는 프라이버시 정보의 유형과 조절변수 연구, 경영학연구, 제35권, 제1호(2006), pp.81-108.
34 오이코랩 트위터통계 사이트(2011), http://twitter.com/oikolab.
35 이두희, 임승희, "블로그 이용자의 자발적 자기 정보공개의 동기요인과 결과요인에 관한 연구", 광고학연구, 제17권, 제5호(2006), pp.227-240.
36 이은미, 박현희, 전중옥, "인터넷 쇼핑몰의 이용자 특성이 상호작용성, 신뢰, 재이용의도에 미치는 영향", 마케팅논집, 제17권, 제3호(2009), pp.83-110.
37 이재신, 연보영, "미니홈페에서 나타나는 대학생들의 자기노출 및 이에 영향을 주는 요인들에 관한 연구", 한국언론학보, 제52권, 제3호 (2008), pp.99-121.
38 최혁라, 신정신, "온라인 거래에서 프라이버시 염려의 선행요인과 프라이버시 염려, 신뢰간의 관계에 관한 연구", 정보시스템연구, 제16권 제3호(2007), pp.21-44.
39 한국인터넷진흥원, "2010년 인터넷 이용실태 조사", 2010.
40 Ajzen, I., "The Theory of Planned Behavior," Organ, Behavior Human Decision Processes, Vol.50(1991), pp.179-211.   DOI
41 Archer, R.L., Role of personality and social situation. In G.J. Chelune(Ed.), Jossey-Bass, San Francisco, 1979.
42 Harris, L., Associates, and A.F. Westin, Harris-Equifax Consumer Privacy Survey, Equifax, Inc., Atlanta, GA. 1991.
43 Bagozzi, R.P. and Y. Yi, "On the Evaluation of Structural Equation Models," Journal of the Academy of Marketing Science, Vol.16, No.2(1988), pp.74-94.   DOI
44 Bauer, R.A., "Consumer Behavior as Risk Taking," 43rd Conference of American Marketing Association, Chicago, (1960), pp.389-398.
45 Bauer, H.H., M. Grether, and M. Leach, "Building customer relations over the internet," Industrial Marketing Management, Vol.31 (2002), pp.155-163.   DOI   ScienceOn
46 고 준, 신선진, 김희웅, "온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과", 경영정보학연구, 제18권, 제1호(2008), pp.118-144.   과학기술학회마을
47 글렌카로, 남수현, 강신철, 송희석, "Effects of Privacy Concern o Trust and Intention to Incremental Usage of Social Networking Systems", 디지털정책연구, 제6권, 제4호(2008), pp.123-135.
48 김교헌, 한덕웅, "자기노출의 목표, 자발성 및 분노억제경향이 생리적 각성, 정화 및 평가에 미치는 효과", 한국심리학회지:건강, 제1권 제1호(1996), pp.66-88.
49 김연정, "한국형 블로그 이용자의 가치체계에 관한 연구", 광고연구, 제68권(2005), pp.9-35.
50 김유정, "웹 개인미디어에서의 사이버 자기표현", 한국언론학보, 제52권, 제6호(2008), pp. 78-99.
51 메디컬투데이, "네티즌 54% SNS 이용시 개인정보노출우려", 2010.
52 사람인, "SNS 사용자 54%, 불안감 느껴", 2010.
53 손영란, 박은아, "자기노출 및 대인관계성향에 따른 인터넷 커뮤니티 활동의 차이", 미디어, 젠더와 문화, 제15권(2010), pp.157-284
54 Stewart, KJ., "Transference as a means of building trust in world wide web sites," Proceeding of the 20th International Conference on Information Systems, (1999), pp.459-464.
55 Xu, H., H.H. Teo, and B.C.Y. Tan, "Predicting the Adoption of Location-Based Services: The Roles of Trust and Privacy Risk," in Proceedings of 26th International Conference on Information Systems, D. Avison, D.F. Galletta, and J.I. DeGross (eds.), Las Vegas, NV, (2005), pp.897-910.
56 Yehoshua, L. and S. Shmuel, "Perceived risks as barriers to internet and e-commerce usage," Qualitative Market Research:An International Journal, Vol.5(2002), pp.291-300.   DOI   ScienceOn
57 Smith, H.J., S.J. Milberg, and S.J. Burke, "Information Privacy:Measuring Indiiduals' Concerns about Organizational Practices," MIS Quarterly, Vol.20, No.2(1996), pp.167- 196.   DOI   ScienceOn
58 Slyke, C.V., J.T. Shim, R. Johnson, and J. Jiang, "Concern for Information Privacy and Online Consumer Purchasing," Journal of the Association for Information Systems, Vol.7, No.6(2006), pp.415-444.
59 Stern, S.R., "Virtually speaking:Girls' Self- Disclosure on the WWW," Women's Studies in Communication, Vol.25(2002), pp.223-253.   DOI
60 Stewart, K.J. and H. Segars, "An empirical examination of the concern for information privacy instrument," Information Systems Research, Vol.13, No.1(2002), pp.36-49.   DOI   ScienceOn
61 Trumbo, C.W., "Heuristic-systematic information processing and risk judgment," Risk Analysis, Vol.19, No.3(1999), pp.391-400.
62 Walther, J.B. and J.K. Burgoon, "Relational Communication in Computer-Mediated Interaction," Human Communication Research, Vol.19, No.1(1992), pp.52-88.   DOI
63 Venkatesh, V. and F.D. Davis, "A Model of the Antecedents of Perceived Ease of Use: Development and Test," Decision Sciences, Vol.27, No3(1996), pp.451-481.   DOI   ScienceOn
64 Venkatesh, V. and F.D. Davis, "A theoretical extension of the technology acceptance model: four longitudinal field studies," Management Science, Vol.46(2000), pp.186-204.   DOI   ScienceOn
65 Wallace, P. The psychology of the internet, Cambridge Univ. Press, 1999.
66 Westin, A., Privacy and Freedom, Atheneum, New York, 1967.
67 Mitchell, V.W., F. Davies, L. Moutinho, and V. Vassos, "Using neural networks to understand service risk in the holiday product," Journal of Business Research, Vol.46 (1999), pp.167-80.   DOI   ScienceOn
68 Nardi, B.A., D.J. Schiano, M. Gumbrecht, and L. Swartz, "Why we blog," Commun. ACM, Vol.47, No.12(2004), pp.41-46.   DOI   ScienceOn
69 Park, S.-B. and N. Chung, "Mediating roles of self-presentation desire in online game community commitment and trust behavior of Massive Multiplayer Online Role-Playing Games," Computers in Human Behavior, Vol.27, No.6(2011), pp.2372-2379.   DOI   ScienceOn
70 Pavlou, P.A., "Consumer Acceptance of Electronic Commerce:Integrating Trust and Risk with the Technology Acceptance Model," International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.101-134.
71 Pedersen, P.E. and H. Nysveen, "Usefulness and Self-Expressiveness:Extending TAM to Explain the Adoption of a Mobile Parking Service," 16th Bled eCommerce Conference e-Transformation, Bled, Slovenia, 2003.
72 Sheehan, K.B. and M.G. Hoy, "Dimensions of Privacy Concern Among Online Consumers," Journal of Public Policy and Marketing, Vol.19, No.1(2000), pp.62-73.   DOI   ScienceOn
73 Posey, C., P.B Lowry, T.L. Roberts, and T.S. Ellis, "Proposing the online community self-disclosure model:the case of working professionals in France and the U.K. who use online communities," European Journal of Information Systems, Vol.19(2010), pp.181-195.   DOI   ScienceOn
74 Rice, R.E. and G. Love, "Electronic Emotion," Communication Research, Vol.14, No.1(1987), pp.85-108.   DOI
75 Schoenbachler, D.D. and G.L. Gordon, "Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing," Journal of Interactive Marketing, Vol.16, No.3(2002), pp.2-16.   DOI   ScienceOn
76 Leary, M.R., Self-Presentation:Impression Management and Interpersonal Behavior, Westview Press, Boulder, 1995.
77 Lee, H., G. Phillipa, and K. Balachander, "How much is too much? Privacy issues on Twitter," Conference of International Communication Association, Singapore, 2010.
78 Liu, C., J.T. Marchewka, J. Lu, C.S. Yu, "Beyond concern-a privacy-trust-behavioral intention model of electronic commerce," Information and Management, Vol.42(2005), pp.289-304.   DOI   ScienceOn
79 Macneil, I.R., The new social contract:An inquiry into modern contractual relations, New Haven, CT:Yale University Press, 1980.
80 Malhotra, N.K., S.S. Kim, and J. Agarwal, "Internet users' information Privacy Concerns (IUIPC):The Construct, The Scale, and a Causal Model," Information Systems Research, Vol.15, No.4(2004), pp.336-355.   DOI   ScienceOn
81 Metzger, M.J., "Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce," Journal of Computer-Mediated Communication, Vol.9, No.4(2004).