Abstract
If one wants to study privacy from an intercultural perspective, one must first validate whether there are any cultural variations in the concept of “privacy” itself. This study systematically examines cultural differences in collective privacy management strategies, and highlights methodological precautions that must be taken in quantitative intercultural privacy research. Using survey data of 498 Facebook users from the US, Singapore, and South Korea, we test the validity and cultural invariance of the measurement model and predictive model associated with collective privacy management. The results show that the measurement model is only partially culturally invariant, indicating that social media users in different countries interpret the same instruments in different ways. Also, cross-national comparisons of the structural model show that causal pathways from collective privacy management strategies to privacy-related outcomes vary significantly across countries. The findings suggest significant cultural variations in privacy management practices, both with regard to the conceptualization of its theoretical constructs, and with respect to causal pathways.
- Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy Enhancing Technologies. George Danezis and Philippe Golle (Eds.), Springer Berlin, 36--58. Google ScholarDigital Library
- Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Process 50, 2 (December 1991), 179--211.Google ScholarCross Ref
- Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brook, Cole Publishing Company, Monterey, CA.Google Scholar
- Irwin Altman. 1976. Privacy: A conceptual analysis. Environment and Behavior 8, 1 (March 1976), 7--29.Google ScholarCross Ref
- Irwin Altman. 1977. Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues 33, 3 (July 1977), 66--84.Google ScholarCross Ref
- Irwin Altman, Anne Vinsel, and Barbara B. Brown. 1981. Dialectic conceptions in social psychology: An application to social penetration and privacy regulation. Advances in Experimental Social Psychology 14, 1 (December 1981), 107--160.Google Scholar
- Pauline Anthonysamy, Awais Rashid, James Walkerdine, Phil Greenwood, and Georgios Larkou. 2012. Collaborative privacy management for third-party applications in online social networks. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, ACM, New York, NY, 5--9. Google ScholarDigital Library
- Albert Bandura. 1997. Self-efficacy: The Exercise of Control. W. H. Freeman, New York.Google Scholar
- Vladlena Benson, George Saridakis, and Hemamaali Tennakoon. 2015. Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology 8 People 28, 3 (August 2015), 426--441.Google ScholarCross Ref
- Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, and Gorrell Cheek. 2009. Social applications: Exploring a more secure framework. In Proceedings of the 5th Symposium on Usable Privacy and Security. 2--11. Google ScholarDigital Library
- Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, New York, NY, 1563--1572. Google ScholarDigital Library
- Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2010. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science 4, 3 (May 2013), 340--347.Google Scholar
- Petter Bae Brandtzaeg, Marika Lüders, and Jan Haavard Skjetne. 2010. Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human-Computer Interaction 26, 11--12 (November 2010), 1006--1030.Google ScholarCross Ref
- Barbara M. Byrne. 1989. Multigroup comparisons and the assumption of equivalent construct validity across groups: Methodological and substantive issues. Multivariate Behavioral Research 24, 4 (December 1989), 503--523.Google ScholarCross Ref
- Donald Thomas Campbell and Donald William Fiske. 1959. Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin 56, 2 (March 1959), 81--105.Google ScholarCross Ref
- Jinwei Cao, Kamile Asli Basoglu, Hong Sheng, and Paul Benjamin Lowry. 2015. A systematic review of social networking research in information systems. Communication of the Association for Information Systems 36, 1 (May 2015), 727--758.Google ScholarCross Ref
- Jinwei Cao and Andrea Everard. 2007. Influence of culture on attitude towards instant messaging: Balance between awareness and privacy. In Proceedings of the Human-Computer Interaction: Interaction Platforms and Techniques (HCI’07). Lecture Notes in Computer Science. Julie A. Jacko (Eds.), 236--240. Google ScholarDigital Library
- Jinwei Cao and Andrea Everard. 2008. User attitude towards instant messaging: The effect of espoused national cultural values on awareness and privacy. Journal of Global Information Technology Management 11, 2 (April 2008), 30--57.Google ScholarCross Ref
- Barbara Carminati and Elena Ferrari. 2008. Privacy-aware collaborative access control in web-based social networks. In Data and Applications Security XXII 5094. Springer, Berlin, 81--96. Google ScholarDigital Library
- Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in web-based social networks. ACM Transactions on Information and System Security 13, 1 (December 2009), 1--40. Google ScholarDigital Library
- Fang Fang Chen. 2008. What happens if we compare chopsticks with forks? The impact of making inappropriate comparisons in cross-cultural research. Journal of Personality and Social Psychology 95, 5 (November 2008), 1005--1018.Google ScholarCross Ref
- Jim Qingjun Chen, Ruidong Zhang, and Jaejung Lee. 2013. A cross-culture empirical study of m-commerce privacy concerns. Journal of Internet Commerce 12, 4 (November 2013), 348--364.Google ScholarCross Ref
- Xiao-Ping Chen and Chao C. Chen. 2004. On the intricacies of the Chinese guanxi: A process model of guanxi development. Asia Pacific Journal of Management 21, 3 (September 2004), 305--324.Google ScholarCross Ref
- Yunan Chen and Heng Xu. 2013. Privacy management in dynamic groups: Understanding information privacy in medical practices. In Proceedings of the 2013 Conference on Computer-Supported Cooperative Work. ACM, New York, NY, 541--552. Google ScholarDigital Library
- Christy Cheung, Zach W.Y. Lee, and Tommy K.H. Chan. 2015. Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence. Internet Research 25, 2 (April 2015), 279--299.Google ScholarCross Ref
- Hichang Cho and Anna Filippova. 2016. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work 8 Social Computing. ACM, New York, NY, 503--514. Google ScholarDigital Library
- Hichang Cho, Milagros Rivera-Sánchez, and Sun Sun Lim. 2009. A multinational study on online privacy: Global concerns and local responses. New Media 8 Society 11, 3 (May 2009), 395--416.Google Scholar
- Jayoung Choi and Loren V. Geistfeld. 2004. A cross-cultural investigation of consumer e-shopping adoption. Journal of Economic Psychology 25, 6 (December 2004), 821--838.Google ScholarCross Ref
- Emily Christofides, Amy Muise, and Serge Desmarais. 2009. Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? CyberPsychology and Behavior 12, 3 (June 2009), 341--345.Google ScholarCross Ref
- Emily Christofides, Amy Muise, and Serge Desmarais. 2012. Hey mom, what's on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Social Psychological and Personality Science 3, 1 (January 2012), 48--54.Google ScholarCross Ref
- Karina Davidson and Kenneth Prkachin. 1997. Optimism and unrealistic optimism have an interacting impact on health-promoting behavior and knowledge changes. Personality and Social Psychology Bulletin 23, 6 (June 1997), 617--625.Google ScholarCross Ref
- Marco De Boni and Martyn Prigmore. 2002. Cultural aspects of internet privacy. In Proceedings of the UKAIS Conference. 40--46.Google Scholar
- Ralf De Wolf, Koen Willaert, and Jo Pierson. 2014. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35, 1(June 2014), 444--454.Google Scholar
- Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1 (December 2009), 83--108.Google ScholarCross Ref
- Tobias Dienlin and Sabine Trepte. 2015. Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology 45, 3 (April 2015), 285--297.Google ScholarCross Ref
- Dimiter M. Dimitrov. 2010. Testing for factorial invariance in the context of construct validation. Measurement and Evaluation in Counseling and Development 43, 2 (July 2010), 121--149.Google ScholarCross Ref
- Paul Dourish and Ken Anderson. 2006. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-Computer Interaction 21, 3 (September 2006), 319--342. Google ScholarDigital Library
- P. Christopher Earley. 1993. East meets West meets Mideast: Further explorations of collectivistic and individualistic work groups. Academy of Management Journal 36, 2 (April 1993), 319--348.Google Scholar
- Nicole B. Ellison, Jessica Vitak, Charles Steinfield, Rebecca Gray, and Cliff Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environment. In Privacy online. Sabine Trepte and Leonard Reinkcke (Eds.), Springer, Berlin, 19--32.Google Scholar
- David Gefen, Detmar Straub, and Marie-Claude Boudreau. 2000. Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems 4, 1 (October 2000), 607--612.Google ScholarCross Ref
- Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. ACM, New York, NY, 71--80. Google ScholarDigital Library
- Nick Hajli and Xiaolin Lin. 2016. Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics 133, 1 (January 2016), 111--123.Google ScholarCross Ref
- Eszter Hargittai and Alice Marwick. 2016. What can I really do? Explaining the privacy paradox with online apathy. International Journal of Communication 10, 1 (July 2016), 3737--3757. http://ijoc.org/index.php/ijoc/article/view/4655/1738Google Scholar
- Geert Hofstede H, Gert Jan Hofstede, and Michael Minkov. 2010. Cultures and Organizations: Software of the Mind (3th ed.). McGraw Hill Professional, New York, NY.Google Scholar
- Yongick Jeong and Yeuseung Kim. 2017. Privacy concerns on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior 69, 1 (April 2017), 302--310. Google ScholarDigital Library
- Yong Gu Ji, Hwan Hwangbo, Ji Soo Yi, P. L. Patrick Rau, Xiaowen Fang, and Chen Ling. 2010. The influence of cultural differences on the use of social network services and the formation of social capital. International Journal of Human-Computer Interaction 26, 11--12 (November 2010), 1100--1121.Google ScholarCross Ref
- Haiyan Jia and Heng Xu. 2016. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 4286--4297. Google ScholarDigital Library
- Adam N. Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B. Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human-Computer Interaction 25, 1 (February 2010), 1--24.Google ScholarCross Ref
- Mark J. Keith, Jeffry S. Babb, Paul Benjamin Lowry, Christopher P. Furner, and Amjad Abdullat. 2015. The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal. 25, 6 (December 2015), 637--667. Google ScholarDigital Library
- David Kenny. (Jan 2018). Multiple Latent Variable Models: Confirmatory Factor Analysis. Retrieved January 17, 2018 from http://davidakenny.net/cm/mfactor.htm.Google Scholar
- Dan J. Kim. 2008. Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems 24, 4 (April 2008), 13--45. Google ScholarDigital Library
- Kyung-Hee Kim and Haejin Yun. 2007. Crying for me, crying for us: Relational dialectics in a Korean social network site. Journal of Computer-Mediated Communication 13, 1 (October 2007), 298--318. Google ScholarDigital Library
- Uichol Kim, Harry Charalambos, Triandis, Çiğdem Kâğitçibaşi, Sang-Chin Choi, and Gene Yoon. 1994. Individualism and Collectivism: Theory, Method, and Applications. Sage Publications, Thousand Oaks, CA.Google Scholar
- Bradley L. Kirkman, Kevin B. Lowe, and Cristina B. Gibson. 2006. A quarter century of culture's consequences: A review of empirical research incorporating Hofstede's cultural values framework. Journal of International Business Studies 37, 3 (May 2006), 285--320.Google ScholarCross Ref
- Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12 (December 2013), 1144--1162. Google ScholarDigital Library
- Jan Kolter, Thomas Kernchen, and Günther Pernul. 2010. Collaborative privacy management. Computers and Security 29, 5 (2010), 580--591. Google ScholarDigital Library
- Hanna Krasnova, Elena Kolesnikova, and Oliver Guenther. 2009. It won't happen to me!: Self-disclosure in online social networks. In Proceedings of AMCIS 2009, AIS/ICIS, Atlanta, Georgia, 343--354.Google Scholar
- Hanna Krasnova, Natasha F. Veltri, and Oliver Günther. 2012. Self-disclosure and privacy calculus on social networking sites: The role of culture. Business 8 Information Systems Engineering 4, 3 (June 2012), 127--135.Google Scholar
- Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 3217--3226. Google ScholarDigital Library
- Airi Lampinen, Fred Stutzman, and Markus Bylund. 2011. Privacy for a networked world: Bridging theory and design. In Proceedings of CHI’11 Extended Abstracts on Human Factors in Computing Systems. ACM, New York, NY, 2441--2444. Google ScholarDigital Library
- Yao Li, Alfred Kobsa, Bart P. Knijnenburg, and M.-H. Carolyn Nguyen. 2017. Cross-cultural privacy prediction. In Proceedings on Privacy Enhancing Technologies 3, 2 (April 2017), 113--132.Google Scholar
- Sun Sun Lim, Hichang Cho, and Milagros Rivera Sanchez. 2009. Online privacy, government surveillance and national ID cards. Communications of the ACM 52, 12 (December 2009), 116--120. Google ScholarDigital Library
- Heather Richter Lipford, Andrew Besmer, and Jason Watson. 2008. Understanding Privacy Settings in Facebook with an Audience View. In Proceedings of the 1st Conference on Usability, Psychology, and Security, USENIX Association Berkeley, CA, 1--8. Google ScholarDigital Library
- Paul Lowry, Jinwei Cao, and Andrea Everard. 2011. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems 27, 4 (April 2011), 163--200. Google ScholarDigital Library
- David Lyon. 2001. Surveillance Society: Monitoring Everyday Life. Open University, Philadelphia, PA.Google Scholar
- Stephen T. Margulis. 2003. On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues 59, 2 (June 2003), 411--429.Google ScholarCross Ref
- Bryan A. Marshall, Peter W. Cardon, Daniel T. Norris, Natalya Goreva, and Ryan D'Souza. 2008. Social networking websites In India and the United States: A cross-national comparison of online privacy and communication. Issues in Information Systems IX, 2 (2008), 87--94.Google Scholar
- Alice E. Marwick and Danah Boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media 8 Society 13, 1 (February 2011), 114--133.Google Scholar
- Alice E. Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media 8 Society 16, 7 (November 2014), 1051--1067.Google Scholar
- Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, and Ernest A. Kallman. 1995. Values, personal information, privacy and regulatory approaches. Communications of the ACM 38, 12 (December 1995), 65--74. Google ScholarDigital Library
- Sandra J. Milberg, H. Jeff Smith, and Sandra J. Burke. 2000. Information privacy: Corporate management and national regulation. Organization Science 11, 1 (January 2000), 35--57. Google ScholarDigital Library
- Caroline Lancelot Miltgen and Dominique Peyrat-Guillard. 2014. Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information System 23, 2 (March 2014), 103--125.Google ScholarCross Ref
- Masahiko Mizutani, James Dorsey, and James H. Moor. 2004. The Internet and Japanese conception of privacy. Ethics and Information Technology 6, 2 (June 2004), 121--128. Google ScholarDigital Library
- Ricarda Moll, Stephanie Pieschl, and Rainer Bromme. 2014. Trust into collective privacy? The role of subjective theories for self-disclosure in online communication. Societies 4, 4 (December 2014), 770--784.Google ScholarCross Ref
- Daphna Oyserman, Heather M. Coon, and Markus Kemmelmeier. 2002. Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychology Bulletin 128, 1 (January 2002), 3--72.Google ScholarCross Ref
- Zafer D. Ozdemir, John H. Benamati, and H. Jeff Smith. 2016. A cross-cultural comparison of information privacy concerns in Singapore, sweden and the united states. In Proceedings of the 18th Annual International Conference on Electronic Commerce: E-Commerce in Smart Connected World (ICEC’16). ACM, New York, NY, 4--9. Google ScholarDigital Library
- Xinru Page, Bart P. Knijnenburg, and Alfred Kobsa. 2013. FYI: Communication style preferences underlie differences in location-sharing adoption and usage. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’13). ACM, New York, NY, 153--162. Google ScholarDigital Library
- Xinru Page, Alfred Kobsa, and Bart P. Knijnenburg. 2012. Don't disturb my circles! boundary preservation is at the center of location-sharing concerns. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media. AAAI Press, Palo Alto, CA, 266--273.Google Scholar
- Xinru Page, Karen Tang, Fred Stutzman, and Airi Lampinen. 2013. Measuring networked social privacy. In Proceedings of the 2013 Conference on Computer-Supported Cooperative Work Companion. ACM, New York, NY, 315--320. Google ScholarDigital Library
- Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 129--136. Google ScholarDigital Library
- Cheol Park and Jong-Kun Jun. 2003. A cross-cultural comparison of internet buying behavior: Effects of internet usage, perceived risks, and innovativeness. International Marketing Review 20, 5 (October 2003), 534--553.Google ScholarCross Ref
- Sandra Petronio. 1991. Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory 1, 4 (November 1991), 311--335.Google ScholarCross Ref
- Sandra Petronio. 2012. Boundaries of Privacy. Sunny Press, Albany, NY.Google Scholar
- Sandra Petronio. 2015. Communication privacy management theory. In The International Encyclopedia of Interpersonal Communication. John Wiley 8 Sons, Hoboken, New Jersey.Google Scholar
- Sandra Petronio. 2012. Boundaries of Privacy: Dialectics of Disclosure. Sunny Press, Albany, NY.Google Scholar
- Clay Posey, Paul Benjamin Lowry, Tom L. Roberts, and T. Selwyn Ellis. 2010. Proposing the online community self-disclosure model: The case of working professionals in France and the U.K. who use online communities. European Journal of Information System 19, 2 (April 2010), 181--195.Google ScholarCross Ref
- Fred Rothbaum, John R. Weisz, and Samuel S. Snyder. 1982. Changing the world and changing the self: A two-process model of perceived control. Journal of Personality and Social Psychology 42, 1 (January 1982), 5--36.Google ScholarCross Ref
- Jian Rui and Michael A. Stefanone. 2013. Strategic self-presentation online: A cross-cultural study. Computers in Human Behavior 29, 1 (January 2013), 110--118. Google ScholarDigital Library
- Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, and Akira Yamada. 2017. Self-confidence trumps knowledge: A cross-cultural study of security behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, Google ScholarDigital Library
- Theodore M. Singelis. 1994. The measurement of independent and interdependent self-construals. Personality and Social Psychology Bulletin 20, 5 (October 1994), 580--591.Google ScholarCross Ref
- Theodore M. Singelis and William J. Brown. 1995. Culture, self, and collectivist communication linking culture to individual behavior. Human Communication Research 21, 3 (March 1995), 354--389.Google ScholarCross Ref
- Theodore M. Singelis, Harry C. Triandis, Dharm P. S. Bhawuk, and Michele J. Gelfand. 1995. Horizontal and vertical dimensions of individualism and collectivism: A theoretical and measurement refinement. Cross-Culture Research 29, 3 (August 1995), 240--275.Google ScholarCross Ref
- Edith G. Smit, Guda Van Noort, and Hilde A.M. Voorveld. 2014. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behavior in Europe. Computers in Human Behavior 32, (March 2014), 15--22.Google Scholar
- H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly 20, 2 (June 1996), 167--196. Google ScholarDigital Library
- H. Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: An interdisciplinary review. MIS Quarterly 35, 4 (December 2011), 989--1015. Google ScholarDigital Library
- Whitney P. Special and Kirsten T. Li-Barber. 2012. Self-disclosure and student satisfaction with Facebook. Computers in Human Behavior 28, 2 (March 2012), 624--630. Google ScholarDigital Library
- Anna Cinzia. Squicciarini, Heng Xu, and Xiaolong Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62, 3 (March 2011), 521--534. Google ScholarDigital Library
- Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web. ACM, New York, NY, 521--530. Google ScholarDigital Library
- Jan-Benedict E. M. Steenkamp and Hans Baumgartner. 1998. Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research 25, 1 (June 1998), 78--90.Google ScholarCross Ref
- Jan-Benedict E. M Steenkamp and Inge Geyskens. 2006. How country characteristic affect the perceived value of web sites. Journal of Marketing 70, 3 (July 2006), 136--150.Google ScholarCross Ref
- Fred Stutzman, Robert Capra, and Jamila Thompson. 2011. Factors mediating disclosure in social network sites. Computers in Human Behavior 27, 1 (January 2011), 590--598. Google ScholarDigital Library
- Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality 4, 2 (2013), 7--41.Google ScholarCross Ref
- Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends only: Examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 1553--1562. Google ScholarDigital Library
- Frederic Stutzman and Woodrow Hartzog. 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 Conference on Computer-Supported Cooperative Work. ACM, New York, NY, Google ScholarDigital Library
- Frederic Stutzman, Jessica Vitak, Nicole B. Ellison, Rebecca Gray, and Cliff Lampe. 2012. Privacy in interaction: Exploring disclosure and social capital in Facebook. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media. AAAI Press, Palo Alto, CA, 330--337.Google Scholar
- Stefano Taddei and Bastianina Contena. 2013. Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior 29, 3 (May 2013), 821--826. Google ScholarDigital Library
- Jim C. Tam. 2000. Personal data privacy in the Asia pacific: A real possibility. In Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions. ACM, New York, NY, 259--262. Google ScholarDigital Library
- Sabine Trepte and Leonard Reinecke (Eds.). 2011. Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Springer-Verlag, Berlin. Google ScholarCross Ref
- Harry C. Triandis, Robert Bontempo, Hector Betancourt, Michael Bond, Kwok Leung, Abelando Brenes, James Georgas, C. Harry Hui, Gerardo Marin, Bernadette Setiadi, Jai B. P. Sinha, Jyoti Verma, John Spangenberg, Hubert Touzard, and Germaine de Montmollin. 1986. The measurement of the etic aspects of individualism and collectivism across cultures. Australian Journal of Psychology 38, 3 (May 1986), 257--267.Google ScholarCross Ref
- Harry Charalambos Triandis, Robert Bontempo, Marcelo J. Villareal, Masaaki Asai, and Nydia Lucca. 1988. Individualism and collectivism: Cross-cultural perspectives on self-ingroup relationships. Journal of Personality and Social Psychology 54, 2 (February 1988), 323--338.Google ScholarCross Ref
- Harry Charalambos Triandis. 1995. Individualism 8 Collectivism. Westview Press, Boulder, Colorado.Google Scholar
- Mina Tsay-Vogel, James Shanahan, and Nancy Signorielli. 2016. Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media 8 Society 20, 1 (August 2016), 1--21.Google Scholar
- Jessica Vitak. 2012. The impact of context collapse and privacy on social network site disclosures. Journal of Broadcasting 8 Electronic Media 56, 4 (October 2012), 451--470.Google ScholarCross Ref
- Jessica Vitak, Pamela Wisniewski, Xinru Page, Airi Lampinen, Eden Litt, Ralf De Wolf, Patrick Gage Kelley, and Manya Sleeper. 2015. The future of networked privacy: Challenges and opportunities. In Proceedings of the 18th ACM Conference Companion on Computer-Supported Cooperative Work 8 Social Computing. ACM, New York, NY, Google ScholarDigital Library
- Jichuan Wang and Xiaoqian Wang. 2012. Structural Equation Modeling: Applications Using Mplus. John Wiley 8 Sons, Higher Education Press, Hoboken, New Jersey. Google ScholarDigital Library
- Samuel D. Warren and Louis D. Brandeis. 1890. The right to privacy. Harvard Law Review 4, 5 (December 1890), 193--220.Google ScholarCross Ref
- Neil D. Weinstein. 1989. Optimistic biases about personal risks. Science 246, 4935 (December 1989), 1232--1233.Google ScholarCross Ref
- Alan F. Westin. 1967. Privacy and Freedom. Atheneum, New York.Google Scholar
- Lawrence R. Wheeless and Jams Grotz. 1976. Conceptualization and measurement of reported self-disclosure. Human Communication Research 2, 4 (June 1976), 338--346Google ScholarCross Ref
- Pamela J. Wisniewski, Bart P. Knijnenburg, and Heather Richter Lipford. 2017. Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies 98, 1 (February 2017), 95--108. Google ScholarDigital Library
- Pamela Wisniewski, Bart P. Knijnenburg, and H. Richter Lipford. 2014. Profiling Facebook users’ privacy behaviors. In SOUPS2014 Workshop on Privacy Personas and Segmentation, 1--6Google Scholar
- Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, 609--618. Google ScholarDigital Library
- Heng Xu. 2012. Reframing privacy 2.0 in online social network. University of Pennsylvania Journal of Constitutional Law 14, 4 (March 2012), 1077--1102.Google Scholar
- Lili Nemec Zlatolas, Tatjana Welzer, Marjan Heričko, and Marko Hölbl. 2015. Privacy antecedents for SNS self-disclosure: The case of facebook. Computers in Human Behavior 45, 1 (April 2015), 158--167. Google ScholarDigital Library
Index Terms
- Collective Privacy Management in Social Media: A Cross-Cultural Validation
Recommendations
A cross-cultural framework for protecting user privacy in online social media
WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide WebSocial media has become truly global in recent years. We argue that support for users' privacy, however, has not been extended equally to all users from around the world. In this paper, we survey existing literature on cross-cultural privacy issues, ...
Disclosure, Privacy, and Stigma on Social Media: Examining Non-Disclosure of Distressing Experiences
Disclosures of distress and stigma on identified social media can be beneficial. Yet, many who may benefit from such disclosures do not engage in them. I examine factors that inform decisions to not disclose stigmatized experiences on identified social ...
Privacy & Social Media in the Context of the Arab Gulf
DIS '16: Proceedings of the 2016 ACM Conference on Designing Interactive SystemsTheories of privacy and how it relates to the use of Information Communication Technology (ICT) have been a topic of research for decades. However, little attention has been paid to the perception of privacy from the perspective of technology users in ...
Comments