"Fool me once, shame on you... then, I learn." An examination of information disclosure in social networking sites

被引:30
作者
Osatuyi, Babajide [1 ]
Passerini, Katia [2 ]
Ravarini, Aurelio [3 ]
Grandhi, Sukeshini A. [4 ]
机构
[1] Penn State Univ, Dept Management Informat Syst, Sam & Irene Black Sch Business, 5101 Jordan Rd, Erie, PA 16563 USA
[2] St Johns Univ, 8000 Utopia Pkwy,St Augustine Hall,Second Floor, Queens, NY 11439 USA
[3] Univ Carlo Cattaneo LIUC, Cso Matteotti 22, I-21053 Castellanza, VA, Italy
[4] Eastern Connecticut State Univ, Dept Business Adm, Business Informat Syst, 3 Windham St, Willimantic, CT 06226 USA
关键词
Information sharing; Shallow disdosure; Deep disclosure; Social networking sites; Social penetration theory; Communication privacy management theory; STRUCTURAL EQUATION MODELS; SELF-DISCLOSURE; COMPUTER ANXIETY; PRIVACY; FACEBOOK; MEDIA; TECHNOLOGY; ACCEPTANCE; BEHAVIORS; TESTS;
D O I
10.1016/j.chb.2018.01.018
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
This study investigates factors that affect user decisions on which information to share, and specifically whether and how to disclose sensitive personal information, when using social networking sites (SNSs). The determinants of personal information disclosure (self-disclosure) are identified using a framework that combines communication privacy management and social penetration theories. Communication privacy management theory is applied to identify which rules guide users' sharing of personal information. Social penetration theory is used to understand personal information disclosure approaches deep and shallow that people employ on SNSs. Structural equation modeling was used to analyze data from 315 Facebook users who were also undergraduate students. Results show that individuals self disclose more on SNSs when they know how to coordinate disclosure boundaries, and particularly when they have learned from prior privacy infringements. While types of relationships are important in determining self-disclosure approaches, SNSs users who have experienced a privacy breach follow different privacy coordination rules compared with those who have not experienced such an incident. Our results present an interesting twist in which the "fooled once" users show higher levels of information sharing at all levels. These users have learned their lessons and their way through privacy management options, eventually leading to a higher self-disclosure. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:73 / 86
页数:14
相关论文
共 68 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]  
Ajzen I., 1985, ACTION CONTROL, P11
[3]  
Altman I., 1973, SOCIAL PENETRATION D
[4]   STRUCTURAL EQUATION MODELING IN PRACTICE - A REVIEW AND RECOMMENDED 2-STEP APPROACH [J].
ANDERSON, JC ;
GERBING, DW .
PSYCHOLOGICAL BULLETIN, 1988, 103 (03) :411-423
[5]  
[Anonymous], ADM SCI Q
[6]   Introduction to the Special Issue Social Media and Business Transformation: A Framework for Research [J].
Aral, Sinan ;
Dellarocas, Chrysanthos ;
Godes, David .
INFORMATION SYSTEMS RESEARCH, 2013, 24 (01) :3-13
[7]   ESTIMATING NONRESPONSE BIAS IN MAIL SURVEYS [J].
ARMSTRONG, JS ;
OVERTON, TS .
JOURNAL OF MARKETING RESEARCH, 1977, 14 (03) :396-402
[8]   Influence of Age and Genders on the Relationship between Computer Self-Efficacy and Information Privacy Concerns [J].
Awwal, Mohammad A. .
INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION, 2012, 8 (01) :14-37
[9]   The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online [J].
Bansal, Gaurav ;
Zahedi, Fatemeh Mariam ;
Gefen, David .
DECISION SUPPORT SYSTEMS, 2010, 49 (02) :138-150
[10]   Five-factor model personality traits as predictors of perceived and actual usage of technology [J].
Barnett, Tim ;
Pearson, Allison W. ;
Pearson, Rodney ;
Kellermanns, Franz W. .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2015, 24 (04) :374-390