skip to main content
article

Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia

Published: 01 November 2012 Publication History

Abstract

The research aims at gaining insights into information privacy concerns, its antecedents and privacy measure use in social networking sites. The Social Cognitive, Protection Motivation theories and gender factor were used as a basis to develop and confirm a research model. Using a cross-sectional survey design and cluster sampling technique, four-hundred thirteen questionnaires were distributed to undergraduates at a public Malaysian university; three-hundred forty were included in analyses. Data was analyzed using structural equation modeling technique. Results suggest that in order of importance only perceived severity, self-efficacy, perceived vulnerability, and gender are antecedents of information privacy concerns with social networking sites; response efficacy and rewards were not significant antecedents contrary to many past findings in the literature that used Social Cognitive and Protection Motivation Theory as a theoretical basis. Information privacy concerns explain privacy measure use in social networking sites. The implications of these results and study limitations are discussed.

References

[1]
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. PET, pp. 1-22.
[2]
Aimeur, E., Gambs, S., & Ho, A. (2010). Towards a privacy-enhanced social networking Sites. In Proceedings of the international conference on availability, reliability and security, pp. 172-179.
[3]
The environment and social behavior: Privacy personal space territory crowding. Wadsworth Publishing Company Inc, Belmont.
[4]
Practicing safe computing: A multi method empirical examination of home computer user security behavioral intentions. MIS Quarterly. v34 i3. 613-643.
[5]
The practice of social research. Wadsworth/Thomson, Belmont.
[6]
On the evaluation of structural equation models. Journal of the Academy of Marketing Science. v16. 74-94.
[7]
Social foundations of thought and action. Prentice-Hall, New Jersey.
[8]
Regulation of cognitive processes through perceived self-efficacy. Development Psychology. v25. 729-735.
[9]
Self efficacy in changing societies. Cambridge University Press, Cambridge.
[10]
Baren, J. v., IJsselsteijn, W., Romero, N., Markopoulos, P. & de Ruyter, B. (2003). Affective benefits in communication: the development and field-testing of a new questionnaire measure. In Proceedings of PRESENCE, Aalborg, Denmark.
[11]
Structural equations with latent variables. Wiley and Sons, New York.
[12]
Boyd, D. M. (2004). Friendster and publicly articulated social networking. In Proceedings of the conference on human factors in computing systems, New York: ACM Press.
[13]
The language of privacy: Learning from video media space analysis and design. ACM Transactions on Computer-Human Interaction. v12 i2. 328-370.
[14]
Burcu, B., Cavusoglu, H. &amp; Benbasat, I. (2010). Understanding emergence and outcomes of information privacy concerns: a case of Facebook. In Proceedings of the 31st international conference of information systems. <http://people.commerce.ubc.ca/phd/bulgurcu/docs/2010_ICIS_Bulgurcu.pdf> Accessed 05.11.11.
[15]
Business Week (2000). Business Week/Harris Poll: A Growing Threat. <http://www.businessweek.com/2000/00_12/b3673010.htm> Accessed 05.11.11.
[16]
Structural equation modeling with AMOS. Routledge, New York.
[17]
California Healthcare Foundation (2000). Ethics survey of consumer attitudes about health web sites. <http://www.chcf.org/press/viewpress.cfm?itemID=1015> Accessed 20.10.10.
[18]
Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication. v52. 167-182.
[19]
Chenoweth, T., Minch, R. &amp; Gattiker, T. (2009). Application of protection motivation theory to adoption of protective technologies. In Proceedings of the 42nd hawaii international conference on system sciences, pp. 1-10.
[20]
CNET News (2004). Privacy in the age of transparency. <http://news.com.com/2030-1069_20335172731.html> Accessed 26.08.10.
[21]
Cockcroft, S. &amp; Clutterbuck, P. (2001). Attitudes towards information privacy. In Proceedings of the Australasian conference of information systems. <http://aisel.aisnet.org/acis2001/20> Accessed 02.12.10.
[22]
Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly. v23 i2. 145-159.
[23]
Crossler, R. E. (2010). Protection motivation theory: understanding determinants to backing up personal data. In Proceedings of the 43rd hawaii international conference on system sciences, pp. 1-10.
[24]
Das, S. K., Karkee, P. &amp; Majumder, K. (2009). Managing social networking in Web-based society: A need-based approach of present generation online users. In Proceedings of the 7th international CALIBER conference, 2009. <http://shodhganga.inflibnet.ac.in/dxml/bitstream/handle/1944/1042/39.pdf?sequence=1> Accessed 23.08.10.
[25]
Internet privacy concerns and their antecedents - Measurement validity and a regression model. Behavior and Information Technology. v23 i6. 413-422.
[26]
Dwyer, C. (2007). Task technology fit, the social technical gap, and social networking sites. In Proceedings of the 13th Americas conference on information systems. <http://aisel.aisnet.org/amcis2007/374> Accessed 02.12.10.
[27]
ECAR Research Study (2008). Social networking sites - Students and information technology. <http://net.educause.edu/ir/library/pdf/ERS0808/RS/ERS0808w.pdf> Accessed 23.08.10.
[28]
Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior. v25 i1. 153-160.
[29]
Evaluating structural equation models with unobserved variables and measurement error. Journal of Marketing Research. vXVIII. 39-50.
[30]
Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review. v26 i1. 20-43.
[31]
Use of protection motivation theory, affect, and barriers to understand and predict adherence to outpatient rehabilitation. Physical Therapy. v88 i2. 1529-1540.
[32]
Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising. v10 i2. 28-45.
[33]
IJsselsteijn, W., Baren, J. v., Markopoulos, P., Romero, N. &amp; Ruyter, B. d. (2009). Measuring affective benefits and costs of mediated awareness: development and validation of the ABC-Questionnaire. Human-Computer Interaction Series, pp. 473-488.
[34]
The sage directory for social research methods. Sage Publications, London.
[35]
Principles and practice of structural equation modelling. Guilford Press, New York.
[36]
The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems. v48. 15-24.
[37]
Consumer concerns for healthcare information privacy: A comparison of US and Canadian perspectives. Research in Healthcare Financial Management. v12 i1. 93-111.
[38]
Larose, R., Rifon, N., Liu, S. &amp; Lee, D. (2005). Online safety strategies: A content analysis and theoretical assessment. <https://www.msu.edu/~isafety/papers/icapanelca2.pdf> Accessed 03.10.10.
[39]
Promoting i-safety: Effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. The Journal of Consumer Affairs. v41 i1. 217-249.
[40]
Lee, Y., Lee, J. -Y. &amp; Liu, Y. (2007). Protection motivation theory in information system adoption: a case of anti-plagiarism system. In Proceedings of the Americas conference on information systems (AMCIS), pp. 1-10.
[41]
Lee, T. S., Kilbreath, S. L., Sullivan, G. &amp; Refshauge, K. M. (2007).The development of an arm activity survey for breast cancer survivors using the protection motivation theory. BMC Cancer. <http://www.biomedcentral.com/1471-2407/7/75> Accessed 20.10.10.
[42]
Keeping our network safe: A model of online protection behavior. Behaviour and Information Technology. v27 i5. 445-454.
[43]
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology. v19 i5. 469-479.
[44]
Effects of computer self-efficacy and system reliability on user interaction with decision support systems. Computers in Human Behavior. v26. 199-204.
[45]
Internet users' information privacy concerns (IUIPC): The construct, the scale and a causal model. Information Systems Research. v15 i4. 336-355.
[46]
Toward an understanding of the online consumer's risky behavior and protection practices. The Journal of Consumer Affairs. v43 i3. 449-473.
[47]
Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British Journal of Health Psychology. v7. 163-184.
[48]
Consumers' protection of online privacy and identity. The Journal of Consumer Affairs. v38 i2. 217-232.
[49]
Mui, C. (2011). Facebook's privacy issues are even deeper than we knew. Forbes. http://www.forbes.com/sites/chunkamui/2011/08/08/facebooks-privacy-issues-are-even-deeper-than-we-knew/> Accessed 24.04.12.
[50]
Pahnila, S., Siponen, M. &amp; Mahmood, A. (2007). Which factors explain employees' adherence to information security policies? An empirical study. In Proceedings of the Pacific Asia conference of the information systems, Auckland, New Zealand. <http://aisel.aisnet.org/pacis2007/73> Accessed 28.11.10.
[51]
Palen, L., &amp; Dourish, P. (2003). Unpacking "privacy" for a networked world. In Proceedings of the conference on human factors in computing systems (CHI 2003) (pp. 129-136).
[52]
Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing. v19 i1. 27-41.
[53]
Social networking searching and privacy issues. Information Security Technical Report. v16. 74-78.
[54]
First course in structural equation modeling. Lawrence Erlbaum, New Jersey.
[55]
A protection motivation theory of fear appeals and attitude change. Journal of Psychology. v91. 93-114.
[56]
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In: Cacioppo, B.L., Petty, L.L. (Eds.), Social psychophysiology: A source book, Guildford Press, London. pp. 153-176.
[57]
Psychosocial and clinical determinants of compliance with occlusion therapy for amblyopic children. Eye. v16. 150-155.
[58]
Dimensions of privacy concern among online consumers. Journal of Public Policy &amp; Marketing. v13. 62-73.
[59]
The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers. v22. 428-438.
[60]
Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly. v20 i2. 167-196.
[61]
MySpace.com - A social networking site and social contract theory. Information Systems Education Journal. v5 i2. 2-11.
[62]
Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly. v32 i2. 503-529.
[63]
Health information privacy survey. Technical Report. Louis Harris and Associates, New York.
[64]
Woon, I., Tai, G. W. &amp; Low, R. A. (2005). Protection Motivation Theory approach to home wireless security. In Proceeding of 26th international conference on information systems. <http://aisel.aisnet.org/icis2005/31> Accessed 02.12.10.
[65]
Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach. Journal of Broadcasting and Electronic Media. v49 i1. 86-110.
[66]
Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs. v43 i3. 389-418.
[67]
Am I really at risk? Determinants of online users' intentions to use strong passwords. Journal of Internet Commerce. v8. 180-197.
[68]
Zuckerberg, M. (2010). 500million stories. <http://www.facebook.com/blog.php?post=409753352130> Accessed 02.12.10.
[69]
User's perspectives on privacy in web-based applications. Journal of Computer Information Systems. v48 i4. 97-105.

Cited By

View all
  1. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Computers in Human Behavior
    Computers in Human Behavior  Volume 28, Issue 6
    November, 2012
    449 pages

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 November 2012

    Author Tags

    1. Information privacy
    2. Protection Motivation Theory
    3. Self-efficacy
    4. Social Cognitive Theory
    5. Social networking

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media