Abstract
Privacy and security breaches have gained more attention and people’s trust in different platforms has been affected negatively. In light of the rise of data and security breaches, trust has become important to both experts and users. We are generating more data than ever before but how this data is being used or handled is unclear. The goal of this research is to understand Estonian Facebook users’ usage behavior and perception of trust in Facebook. Knowing how users perceive trust and its effect on their usage behavior, designers can create platforms that are trustworthy and thereby, user friendly.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Weisbaum, H.: Trust in Facebook has dropped by 66 percent since the Cambridge Analytica scandal, April 2018. https://nbcnews.to/2vJnYZX. Accessed 17 Mar 2020
Christofides, E., Muise, A., Desmarais, S.: Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyberpsychol. Behav. 12(3), 341–345 (2009)
Dhami, A., Agarwal, N., Chakraborty, T.K., Singh, B.P., Minj, J.: Impact of trust, security and privacy concerns in social networking: an exploratory study to understand the pattern of information revelation in Facebook. In: 2013 IEEE 3rd International Advance Computing Conference (IACC), pp. 465–469. IEEE, February 2013
Christofides, E., Muise, A., Desmarais, S.: Hey mom, what’s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Soc. Psychol. Personal. Sci. 3(1), 48–54 (2012)
Universal McCann: Wave 9. The Meaning of Moments. Glen Parker, New York (2017)
Lomas, N.: How Facebook has reacted since the data misuse scandal broke, April 2018. https://tcrn.ch/327pql5. Accessed 17 Mar 2020
Ivanova, I.: 8 promises from Facebook after Cambridge Analytica, April 2018. https://cbsn.ws/32hl1w0. Accessed 17 Mar 2020
Kokoszka, P.: #DeleteFacebook: Facebook alternatives to get your social media fix, July 2018. http://bit.ly/38M1JRC. Accessed 17 Mar 2020
Buchanan, T., Paine, C., Joinson, A.N., Reips, U.D.: Development of measures of online privacy concern and protection for use on the Internet. J. Am. Soc. Inf. Sci. Technol. 58(2), 157–165 (2007)
Data Never Sleeps 6.0 (2018). http://bit.ly/3d46QiF. Accessed 17 Mar 2020
Data Breaches (2019). https://www.privacyrights.org/data-breaches. Accessed 17 Mar 2020
Gemalto: Data privacy and new regulations take center stage (2019). https://breachlevelindex.com/request-report. Accessed 17 Mar 2020
Whittaker, Z.: 171 million VK.com accounts stolen by hackers, June 2016. https://zd.net/2IPZPnM. Accessed 17 Mar 2020
MacMillan, D., McMillan, R.: Google exposed user data, feared repercussions of disclosing to public, October 2018. https://on.wsj.com/2SHCdYg. Accessed 17 Mar 2020
Price, R.: Hackers stole millions of Facebook users’ highly sensitive data—and the FBI has asked it not to say who might be behind it, October 2018. http://bit.ly/2WwK4KL. Accessed 17 Mar 2020
Price, R.: Facebook endured a staggering number of scandals and controversies in 2018 - here they all are, December 2018. http://bit.ly/38U8bW1. Accessed 17 Mar 2020
Wathieu, L., Friedman, A.A.: An empirical approach to understanding privacy valuation. In: HBS Marketing Research Paper, (07-075) (2007)
Livingstone, S.: Children’s privacy online: experimenting with boundaries within and beyond the family (2006)
Cavoukian, A.: Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policy-makers (2011)
Hansen, M.: Marrying transparency tools with user-controlled identity management. In: Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds.) Privacy and Identity 2007. ITIFIP, vol. 262, pp. 199–220. Springer, Boston, MA (2008). https://doi.org/10.1007/978-0-387-79026-8_14
Borking, J.J., Raab, C.D.: Laws, PETs and other technologies for privacy protection. J. Inf. Law Technol. 1, 1–14 (2001)
Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)
Wang, N., Xu, H., Grossklags, J.: Third-party apps on Facebook: privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, p. 4. ACM, December 2011
Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003)
Kim, D., Benbasat, I.: Trust-related arguments in internet stores: a framework for evaluation. J. Electron. Commer. Res. 4(2), 49–64 (2003)
Lauer, T.W., Deng, X.: Building online trust through privacy practices. Int. J. Inf. Secur. 6(5), 323–331 (2007)
Schoorman, F.D., Mayer, R.C., Davis, J.H.: An integrative model of organizational trust: past, present, and future (2007)
Flechais, I., Riegelsberger, J., Sasse, M.A.: Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. In: Proceedings of the 2005 Workshop on New Security Paradigms, pp. 33–41. ACM, September 2005
Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 1–33 (2013)
Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 95–101 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Oper, T., Sousa, S. (2020). User Attitudes Towards Facebook: Perception and Reassurance of Trust (Estonian Case Study). In: Stephanidis, C., Antona, M. (eds) HCI International 2020 - Posters. HCII 2020. Communications in Computer and Information Science, vol 1226. Springer, Cham. https://doi.org/10.1007/978-3-030-50732-9_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-50732-9_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50731-2
Online ISBN: 978-3-030-50732-9
eBook Packages: Computer ScienceComputer Science (R0)