skip to main content
research-article

Collective Privacy Management in Social Media: A Cross-Cultural Validation

Published:08 June 2018Publication History
Skip Abstract Section

Abstract

If one wants to study privacy from an intercultural perspective, one must first validate whether there are any cultural variations in the concept of “privacy” itself. This study systematically examines cultural differences in collective privacy management strategies, and highlights methodological precautions that must be taken in quantitative intercultural privacy research. Using survey data of 498 Facebook users from the US, Singapore, and South Korea, we test the validity and cultural invariance of the measurement model and predictive model associated with collective privacy management. The results show that the measurement model is only partially culturally invariant, indicating that social media users in different countries interpret the same instruments in different ways. Also, cross-national comparisons of the structural model show that causal pathways from collective privacy management strategies to privacy-related outcomes vary significantly across countries. The findings suggest significant cultural variations in privacy management practices, both with regard to the conceptualization of its theoretical constructs, and with respect to causal pathways.

References

  1. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy Enhancing Technologies. George Danezis and Philippe Golle (Eds.), Springer Berlin, 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Process 50, 2 (December 1991), 179--211.Google ScholarGoogle ScholarCross RefCross Ref
  3. Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brook, Cole Publishing Company, Monterey, CA.Google ScholarGoogle Scholar
  4. Irwin Altman. 1976. Privacy: A conceptual analysis. Environment and Behavior 8, 1 (March 1976), 7--29.Google ScholarGoogle ScholarCross RefCross Ref
  5. Irwin Altman. 1977. Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues 33, 3 (July 1977), 66--84.Google ScholarGoogle ScholarCross RefCross Ref
  6. Irwin Altman, Anne Vinsel, and Barbara B. Brown. 1981. Dialectic conceptions in social psychology: An application to social penetration and privacy regulation. Advances in Experimental Social Psychology 14, 1 (December 1981), 107--160.Google ScholarGoogle Scholar
  7. Pauline Anthonysamy, Awais Rashid, James Walkerdine, Phil Greenwood, and Georgios Larkou. 2012. Collaborative privacy management for third-party applications in online social networks. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, ACM, New York, NY, 5--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Albert Bandura. 1997. Self-efficacy: The Exercise of Control. W. H. Freeman, New York.Google ScholarGoogle Scholar
  9. Vladlena Benson, George Saridakis, and Hemamaali Tennakoon. 2015. Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology 8 People 28, 3 (August 2015), 426--441.Google ScholarGoogle ScholarCross RefCross Ref
  10. Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, and Gorrell Cheek. 2009. Social applications: Exploring a more secure framework. In Proceedings of the 5th Symposium on Usable Privacy and Security. 2--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, New York, NY, 1563--1572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2010. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science 4, 3 (May 2013), 340--347.Google ScholarGoogle Scholar
  13. Petter Bae Brandtzaeg, Marika Lüders, and Jan Haavard Skjetne. 2010. Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human-Computer Interaction 26, 11--12 (November 2010), 1006--1030.Google ScholarGoogle ScholarCross RefCross Ref
  14. Barbara M. Byrne. 1989. Multigroup comparisons and the assumption of equivalent construct validity across groups: Methodological and substantive issues. Multivariate Behavioral Research 24, 4 (December 1989), 503--523.Google ScholarGoogle ScholarCross RefCross Ref
  15. Donald Thomas Campbell and Donald William Fiske. 1959. Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin 56, 2 (March 1959), 81--105.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jinwei Cao, Kamile Asli Basoglu, Hong Sheng, and Paul Benjamin Lowry. 2015. A systematic review of social networking research in information systems. Communication of the Association for Information Systems 36, 1 (May 2015), 727--758.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jinwei Cao and Andrea Everard. 2007. Influence of culture on attitude towards instant messaging: Balance between awareness and privacy. In Proceedings of the Human-Computer Interaction: Interaction Platforms and Techniques (HCI’07). Lecture Notes in Computer Science. Julie A. Jacko (Eds.), 236--240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jinwei Cao and Andrea Everard. 2008. User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy. Journal of Global Information Technology Management 11, 2 (April 2008), 30--57.Google ScholarGoogle ScholarCross RefCross Ref
  19. Barbara Carminati and Elena Ferrari. 2008. Privacy-aware collaborative access control in web-based social networks. In Data and Applications Security XXII 5094. Springer, Berlin, 81--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in web-based social networks. ACM Transactions on Information and System Security 13, 1 (December 2009), 1--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Fang Fang Chen. 2008. What happens if we compare chopsticks with forks? The impact of making inappropriate comparisons in cross-cultural research. Journal of Personality and Social Psychology 95, 5 (November 2008), 1005--1018.Google ScholarGoogle ScholarCross RefCross Ref
  22. Jim Qingjun Chen, Ruidong Zhang, and Jaejung Lee. 2013. A cross-culture empirical study of m-commerce privacy concerns. Journal of Internet Commerce 12, 4 (November 2013), 348--364.Google ScholarGoogle ScholarCross RefCross Ref
  23. Xiao-Ping Chen and Chao C. Chen. 2004. On the intricacies of the Chinese guanxi: A process model of guanxi development. Asia Pacific Journal of Management 21, 3 (September 2004), 305--324.Google ScholarGoogle ScholarCross RefCross Ref
  24. Yunan Chen and Heng Xu. 2013. Privacy management in dynamic groups: Understanding information privacy in medical practices. In Proceedings of the 2013 Conference on Computer-Supported Cooperative Work. ACM, New York, NY, 541--552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Christy Cheung, Zach W.Y. Lee, and Tommy K.H. Chan. 2015. Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence. Internet Research 25, 2 (April 2015), 279--299.Google ScholarGoogle ScholarCross RefCross Ref
  26. Hichang Cho and Anna Filippova. 2016. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work 8 Social Computing. ACM, New York, NY, 503--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Hichang Cho, Milagros Rivera-Sánchez, and Sun Sun Lim. 2009. A multinational study on online privacy: Global concerns and local responses. New Media 8 Society 11, 3 (May 2009), 395--416.Google ScholarGoogle Scholar
  28. Jayoung Choi and Loren V. Geistfeld. 2004. A cross-cultural investigation of consumer e-shopping adoption. Journal of Economic Psychology 25, 6 (December 2004), 821--838.Google ScholarGoogle ScholarCross RefCross Ref
  29. Emily Christofides, Amy Muise, and Serge Desmarais. 2009. Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? CyberPsychology and Behavior 12, 3 (June 2009), 341--345.Google ScholarGoogle ScholarCross RefCross Ref
  30. Emily Christofides, Amy Muise, and Serge Desmarais. 2012. Hey mom, what's on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Social Psychological and Personality Science 3, 1 (January 2012), 48--54.Google ScholarGoogle ScholarCross RefCross Ref
  31. Karina Davidson and Kenneth Prkachin. 1997. Optimism and unrealistic optimism have an interacting impact on health-promoting behavior and knowledge changes. Personality and Social Psychology Bulletin 23, 6 (June 1997), 617--625.Google ScholarGoogle ScholarCross RefCross Ref
  32. Marco De Boni and Martyn Prigmore. 2002. Cultural aspects of internet privacy. In Proceedings of the UKAIS Conference. 40--46.Google ScholarGoogle Scholar
  33. Ralf De Wolf, Koen Willaert, and Jo Pierson. 2014. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35, 1(June 2014), 444--454.Google ScholarGoogle Scholar
  34. Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1 (December 2009), 83--108.Google ScholarGoogle ScholarCross RefCross Ref
  35. Tobias Dienlin and Sabine Trepte. 2015. Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology 45, 3 (April 2015), 285--297.Google ScholarGoogle ScholarCross RefCross Ref
  36. Dimiter M. Dimitrov. 2010. Testing for factorial invariance in the context of construct validation. Measurement and Evaluation in Counseling and Development 43, 2 (July 2010), 121--149.Google ScholarGoogle ScholarCross RefCross Ref
  37. Paul Dourish and Ken Anderson. 2006. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-Computer Interaction 21, 3 (September 2006), 319--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. P. Christopher Earley. 1993. East meets West meets Mideast: Further explorations of collectivistic and individualistic work groups. Academy of Management Journal 36, 2 (April 1993), 319--348.Google ScholarGoogle Scholar
  39. Nicole B. Ellison, Jessica Vitak, Charles Steinfield, Rebecca Gray, and Cliff Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environment. In Privacy online. Sabine Trepte and Leonard Reinkcke (Eds.), Springer, Berlin, 19--32.Google ScholarGoogle Scholar
  40. David Gefen, Detmar Straub, and Marie-Claude Boudreau. 2000. Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems 4, 1 (October 2000), 607--612.Google ScholarGoogle ScholarCross RefCross Ref
  41. Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. ACM, New York, NY, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Nick Hajli and Xiaolin Lin. 2016. Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics 133, 1 (January 2016), 111--123.Google ScholarGoogle ScholarCross RefCross Ref
  43. Eszter Hargittai and Alice Marwick. 2016. What can I really do? Explaining the privacy paradox with online apathy. International Journal of Communication 10, 1 (July 2016), 3737--3757. http://ijoc.org/index.php/ijoc/article/view/4655/1738Google ScholarGoogle Scholar
  44. Geert Hofstede H, Gert Jan Hofstede, and Michael Minkov. 2010. Cultures and Organizations: Software of the Mind (3th ed.). McGraw Hill Professional, New York, NY.Google ScholarGoogle Scholar
  45. Yongick Jeong and Yeuseung Kim. 2017. Privacy concerns on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior 69, 1 (April 2017), 302--310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yong Gu Ji, Hwan Hwangbo, Ji Soo Yi, P. L. Patrick Rau, Xiaowen Fang, and Chen Ling. 2010. The influence of cultural differences on the use of social network services and the formation of social capital. International Journal of Human-Computer Interaction 26, 11--12 (November 2010), 1100--1121.Google ScholarGoogle ScholarCross RefCross Ref
  47. Haiyan Jia and Heng Xu. 2016. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 4286--4297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Adam N. Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B. Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human-Computer Interaction 25, 1 (February 2010), 1--24.Google ScholarGoogle ScholarCross RefCross Ref
  49. Mark J. Keith, Jeffry S. Babb, Paul Benjamin Lowry, Christopher P. Furner, and Amjad Abdullat. 2015. The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal. 25, 6 (December 2015), 637--667. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. David Kenny. (Jan 2018). Multiple Latent Variable Models: Confirmatory Factor Analysis. Retrieved January 17, 2018 from http://davidakenny.net/cm/mfactor.htm.Google ScholarGoogle Scholar
  51. Dan J. Kim. 2008. Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems 24, 4 (April 2008), 13--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Kyung-Hee Kim and Haejin Yun. 2007. Crying for me, crying for us: Relational dialectics in a Korean social network site. Journal of Computer-Mediated Communication 13, 1 (October 2007), 298--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Uichol Kim, Harry Charalambos, Triandis, Çiğdem Kâğitçibaşi, Sang-Chin Choi, and Gene Yoon. 1994. Individualism and Collectivism: Theory, Method, and Applications. Sage Publications, Thousand Oaks, CA.Google ScholarGoogle Scholar
  54. Bradley L. Kirkman, Kevin B. Lowe, and Cristina B. Gibson. 2006. A quarter century of culture's consequences: A review of empirical research incorporating Hofstede's cultural values framework. Journal of International Business Studies 37, 3 (May 2006), 285--320.Google ScholarGoogle ScholarCross RefCross Ref
  55. Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12 (December 2013), 1144--1162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jan Kolter, Thomas Kernchen, and Günther Pernul. 2010. Collaborative privacy management. Computers and Security 29, 5 (2010), 580--591. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Hanna Krasnova, Elena Kolesnikova, and Oliver Guenther. 2009. It won't happen to me!: Self-disclosure in online social networks. In Proceedings of AMCIS 2009, AIS/ICIS, Atlanta, Georgia, 343--354.Google ScholarGoogle Scholar
  58. Hanna Krasnova, Natasha F. Veltri, and Oliver Günther. 2012. Self-disclosure and privacy calculus on social networking sites: The role of culture. Business 8 Information Systems Engineering 4, 3 (June 2012), 127--135.Google ScholarGoogle Scholar
  59. Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 3217--3226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Airi Lampinen, Fred Stutzman, and Markus Bylund. 2011. Privacy for a networked world: Bridging theory and design. In Proceedings of CHI’11 Extended Abstracts on Human Factors in Computing Systems. ACM, New York, NY, 2441--2444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Yao Li, Alfred Kobsa, Bart P. Knijnenburg, and M.-H. Carolyn Nguyen. 2017. Cross-cultural privacy prediction. In Proceedings on Privacy Enhancing Technologies 3, 2 (April 2017), 113--132.Google ScholarGoogle Scholar
  62. Sun Sun Lim, Hichang Cho, and Milagros Rivera Sanchez. 2009. Online privacy, government surveillance and national ID cards. Communications of the ACM 52, 12 (December 2009), 116--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Heather Richter Lipford, Andrew Besmer, and Jason Watson. 2008. Understanding Privacy Settings in Facebook with an Audience View. In Proceedings of the 1st Conference on Usability, Psychology, and Security, USENIX Association Berkeley, CA, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Paul Lowry, Jinwei Cao, and Andrea Everard. 2011. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems 27, 4 (April 2011), 163--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. David Lyon. 2001. Surveillance Society: Monitoring Everyday Life. Open University, Philadelphia, PA.Google ScholarGoogle Scholar
  66. Stephen T. Margulis. 2003. On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues 59, 2 (June 2003), 411--429.Google ScholarGoogle ScholarCross RefCross Ref
  67. Bryan A. Marshall, Peter W. Cardon, Daniel T. Norris, Natalya Goreva, and Ryan D'Souza. 2008. Social networking websites In India and the United States: A cross-national comparison of online privacy and communication. Issues in Information Systems IX, 2 (2008), 87--94.Google ScholarGoogle Scholar
  68. Alice E. Marwick and Danah Boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media 8 Society 13, 1 (February 2011), 114--133.Google ScholarGoogle Scholar
  69. Alice E. Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media 8 Society 16, 7 (November 2014), 1051--1067.Google ScholarGoogle Scholar
  70. Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, and Ernest A. Kallman. 1995. Values, personal information, privacy and regulatory approaches. Communications of the ACM 38, 12 (December 1995), 65--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Sandra J. Milberg, H. Jeff Smith, and Sandra J. Burke. 2000. Information privacy: Corporate management and national regulation. Organization Science 11, 1 (January 2000), 35--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Caroline Lancelot Miltgen and Dominique Peyrat-Guillard. 2014. Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information System 23, 2 (March 2014), 103--125.Google ScholarGoogle ScholarCross RefCross Ref
  73. Masahiko Mizutani, James Dorsey, and James H. Moor. 2004. The Internet and Japanese conception of privacy. Ethics and Information Technology 6, 2 (June 2004), 121--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Ricarda Moll, Stephanie Pieschl, and Rainer Bromme. 2014. Trust into collective privacy? The role of subjective theories for self-disclosure in online communication. Societies 4, 4 (December 2014), 770--784.Google ScholarGoogle ScholarCross RefCross Ref
  75. Daphna Oyserman, Heather M. Coon, and Markus Kemmelmeier. 2002. Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychology Bulletin 128, 1 (January 2002), 3--72.Google ScholarGoogle ScholarCross RefCross Ref
  76. Zafer D. Ozdemir, John H. Benamati, and H. Jeff Smith. 2016. A cross-cultural comparison of information privacy concerns in Singapore, sweden and the united states. In Proceedings of the 18th Annual International Conference on Electronic Commerce: E-Commerce in Smart Connected World (ICEC’16). ACM, New York, NY, 4--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Xinru Page, Bart P. Knijnenburg, and Alfred Kobsa. 2013. FYI: Communication style preferences underlie differences in location-sharing adoption and usage. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’13). ACM, New York, NY, 153--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Xinru Page, Alfred Kobsa, and Bart P. Knijnenburg. 2012. Don't disturb my circles! boundary preservation is at the center of location-sharing concerns. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media. AAAI Press, Palo Alto, CA, 266--273.Google ScholarGoogle Scholar
  79. Xinru Page, Karen Tang, Fred Stutzman, and Airi Lampinen. 2013. Measuring networked social privacy. In Proceedings of the 2013 Conference on Computer-Supported Cooperative Work Companion. ACM, New York, NY, 315--320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Cheol Park and Jong-Kun Jun. 2003. A cross-cultural comparison of internet buying behavior: Effects of internet usage, perceived risks, and innovativeness. International Marketing Review 20, 5 (October 2003), 534--553.Google ScholarGoogle ScholarCross RefCross Ref
  82. Sandra Petronio. 1991. Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory 1, 4 (November 1991), 311--335.Google ScholarGoogle ScholarCross RefCross Ref
  83. Sandra Petronio. 2012. Boundaries of Privacy. Sunny Press, Albany, NY.Google ScholarGoogle Scholar
  84. Sandra Petronio. 2015. Communication privacy management theory. In The International Encyclopedia of Interpersonal Communication. John Wiley 8 Sons, Hoboken, New Jersey.Google ScholarGoogle Scholar
  85. Sandra Petronio. 2012. Boundaries of Privacy: Dialectics of Disclosure. Sunny Press, Albany, NY.Google ScholarGoogle Scholar
  86. Clay Posey, Paul Benjamin Lowry, Tom L. Roberts, and T. Selwyn Ellis. 2010. Proposing the online community self-disclosure model: The case of working professionals in France and the U.K. who use online communities. European Journal of Information System 19, 2 (April 2010), 181--195.Google ScholarGoogle ScholarCross RefCross Ref
  87. Fred Rothbaum, John R. Weisz, and Samuel S. Snyder. 1982. Changing the world and changing the self: A two-process model of perceived control. Journal of Personality and Social Psychology 42, 1 (January 1982), 5--36.Google ScholarGoogle ScholarCross RefCross Ref
  88. Jian Rui and Michael A. Stefanone. 2013. Strategic self-presentation online: A cross-cultural study. Computers in Human Behavior 29, 1 (January 2013), 110--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, and Akira Yamada. 2017. Self-confidence trumps knowledge: A cross-cultural study of security behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Theodore M. Singelis. 1994. The measurement of independent and interdependent self-construals. Personality and Social Psychology Bulletin 20, 5 (October 1994), 580--591.Google ScholarGoogle ScholarCross RefCross Ref
  91. Theodore M. Singelis and William J. Brown. 1995. Culture, self, and collectivist communication linking culture to individual behavior. Human Communication Research 21, 3 (March 1995), 354--389.Google ScholarGoogle ScholarCross RefCross Ref
  92. Theodore M. Singelis, Harry C. Triandis, Dharm P. S. Bhawuk, and Michele J. Gelfand. 1995. Horizontal and vertical dimensions of individualism and collectivism: A theoretical and measurement refinement. Cross-Culture Research 29, 3 (August 1995), 240--275.Google ScholarGoogle ScholarCross RefCross Ref
  93. Edith G. Smit, Guda Van Noort, and Hilde A.M. Voorveld. 2014. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behavior in Europe. Computers in Human Behavior 32, (March 2014), 15--22.Google ScholarGoogle Scholar
  94. H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly 20, 2 (June 1996), 167--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. H. Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: An interdisciplinary review. MIS Quarterly 35, 4 (December 2011), 989--1015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Whitney P. Special and Kirsten T. Li-Barber. 2012. Self-disclosure and student satisfaction with Facebook. Computers in Human Behavior 28, 2 (March 2012), 624--630. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Anna Cinzia. Squicciarini, Heng Xu, and Xiaolong Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62, 3 (March 2011), 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web. ACM, New York, NY, 521--530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Jan-Benedict E. M. Steenkamp and Hans Baumgartner. 1998. Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research 25, 1 (June 1998), 78--90.Google ScholarGoogle ScholarCross RefCross Ref
  100. Jan-Benedict E. M Steenkamp and Inge Geyskens. 2006. How country characteristic affect the perceived value of web sites. Journal of Marketing 70, 3 (July 2006), 136--150.Google ScholarGoogle ScholarCross RefCross Ref
  101. Fred Stutzman, Robert Capra, and Jamila Thompson. 2011. Factors mediating disclosure in social network sites. Computers in Human Behavior 27, 1 (January 2011), 590--598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality 4, 2 (2013), 7--41.Google ScholarGoogle ScholarCross RefCross Ref
  103. Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends only: Examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 1553--1562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Frederic Stutzman and Woodrow Hartzog. 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 Conference on Computer-Supported Cooperative Work. ACM, New York, NY, Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Frederic Stutzman, Jessica Vitak, Nicole B. Ellison, Rebecca Gray, and Cliff Lampe. 2012. Privacy in interaction: Exploring disclosure and social capital in Facebook. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media. AAAI Press, Palo Alto, CA, 330--337.Google ScholarGoogle Scholar
  106. Stefano Taddei and Bastianina Contena. 2013. Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior 29, 3 (May 2013), 821--826. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Jim C. Tam. 2000. Personal data privacy in the Asia pacific: A real possibility. In Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions. ACM, New York, NY, 259--262. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Sabine Trepte and Leonard Reinecke (Eds.). 2011. Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Springer-Verlag, Berlin. Google ScholarGoogle ScholarCross RefCross Ref
  109. Harry C. Triandis, Robert Bontempo, Hector Betancourt, Michael Bond, Kwok Leung, Abelando Brenes, James Georgas, C. Harry Hui, Gerardo Marin, Bernadette Setiadi, Jai B. P. Sinha, Jyoti Verma, John Spangenberg, Hubert Touzard, and Germaine de Montmollin. 1986. The measurement of the etic aspects of individualism and collectivism across cultures. Australian Journal of Psychology 38, 3 (May 1986), 257--267.Google ScholarGoogle ScholarCross RefCross Ref
  110. Harry Charalambos Triandis, Robert Bontempo, Marcelo J. Villareal, Masaaki Asai, and Nydia Lucca. 1988. Individualism and collectivism: Cross-cultural perspectives on self-ingroup relationships. Journal of Personality and Social Psychology 54, 2 (February 1988), 323--338.Google ScholarGoogle ScholarCross RefCross Ref
  111. Harry Charalambos Triandis. 1995. Individualism 8 Collectivism. Westview Press, Boulder, Colorado.Google ScholarGoogle Scholar
  112. Mina Tsay-Vogel, James Shanahan, and Nancy Signorielli. 2016. Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media 8 Society 20, 1 (August 2016), 1--21.Google ScholarGoogle Scholar
  113. Jessica Vitak. 2012. The impact of context collapse and privacy on social network site disclosures. Journal of Broadcasting 8 Electronic Media 56, 4 (October 2012), 451--470.Google ScholarGoogle ScholarCross RefCross Ref
  114. Jessica Vitak, Pamela Wisniewski, Xinru Page, Airi Lampinen, Eden Litt, Ralf De Wolf, Patrick Gage Kelley, and Manya Sleeper. 2015. The future of networked privacy: Challenges and opportunities. In Proceedings of the 18th ACM Conference Companion on Computer-Supported Cooperative Work 8 Social Computing. ACM, New York, NY, Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Jichuan Wang and Xiaoqian Wang. 2012. Structural Equation Modeling: Applications Using Mplus. John Wiley 8 Sons, Higher Education Press, Hoboken, New Jersey. Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Samuel D. Warren and Louis D. Brandeis. 1890. The right to privacy. Harvard Law Review 4, 5 (December 1890), 193--220.Google ScholarGoogle ScholarCross RefCross Ref
  117. Neil D. Weinstein. 1989. Optimistic biases about personal risks. Science 246, 4935 (December 1989), 1232--1233.Google ScholarGoogle ScholarCross RefCross Ref
  118. Alan F. Westin. 1967. Privacy and Freedom. Atheneum, New York.Google ScholarGoogle Scholar
  119. Lawrence R. Wheeless and Jams Grotz. 1976. Conceptualization and measurement of reported self-disclosure. Human Communication Research 2, 4 (June 1976), 338--346Google ScholarGoogle ScholarCross RefCross Ref
  120. Pamela J. Wisniewski, Bart P. Knijnenburg, and Heather Richter Lipford. 2017. Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies 98, 1 (February 2017), 95--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Pamela Wisniewski, Bart P. Knijnenburg, and H. Richter Lipford. 2014. Profiling Facebook users’ privacy behaviors. In SOUPS2014 Workshop on Privacy Personas and Segmentation, 1--6Google ScholarGoogle Scholar
  122. Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 609--618. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Heng Xu. 2012. Reframing privacy 2.0 in online social network. University of Pennsylvania Journal of Constitutional Law 14, 4 (March 2012), 1077--1102.Google ScholarGoogle Scholar
  124. Lili Nemec Zlatolas, Tatjana Welzer, Marjan Heričko, and Marko Hölbl. 2015. Privacy antecedents for SNS self-disclosure: The case of facebook. Computers in Human Behavior 45, 1 (April 2015), 158--167. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Collective Privacy Management in Social Media: A Cross-Cultural Validation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Computer-Human Interaction
      ACM Transactions on Computer-Human Interaction  Volume 25, Issue 3
      June 2018
      217 pages
      ISSN:1073-0516
      EISSN:1557-7325
      DOI:10.1145/3231919
      Issue’s Table of Contents

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 June 2018
      • Accepted: 1 March 2018
      • Revised: 1 January 2018
      • Received: 1 March 2017
      Published in tochi Volume 25, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format