Electronic Commerce Research

, Volume 13, Issue 2, pp 151–168 | Cite as

Factors affecting privacy disclosure on social network sites: an integrated model

  • Feng Xu
  • Katina Michael
  • Xi Chen


The self-disclosure of personal information by users on social network sites (SNSs) play a vital role in the self-sustainability of online social networking service provider platforms. However, people’s levels of privacy concern increases as a direct result of unauthorized procurement and exploitation of personal information from the use of social networks which in turn discourages users from disclosing their information or encourages users to submit fake information online. After a review of the Theory of Planned Behavior (TPB) and the privacy calculus model, an integrated model is proposed to explain privacy disclosure behaviors on social network sites. Thus, the aim of this paper is to find the key factors affecting users’ self-disclosure of personal information. Using privacy calculus, the perceived benefit was combined into the Theory of Planned Behavior, and after some modifications, an integrated model was prescribed specifically for the context of social network sites. The constructs of information sensitivity and perceived benefit were redefined after reviewing the literature. Through a study on the constructs of privacy concern and self-disclosure, this article aims at reducing the levels of privacy concern, while sustaining online transactions and further stimulating the development of social network sites.


Self-disclosure Personal information Perceived benefit Theory of planned behavior Privacy calculus 



The work was supported in part by the National Natural Science Foundation of China under Grant No. 70901039, 71171106 and 71101067, National Planning Office of Philosophy and Social Science under Grant No. 11&ZD169, NCET-11-0220 project, Jiangsu Planning Office of Social Science under Grant No. 11TQC010, Jiangsu University Philosophy and Social Science key project under Grant No. 2012ZDIXM036 and Nanjing University Innovation Team Support Project.


  1. 1.
    Acquisti, A., & Gross, R. (2006). Imagined communities: awareness, information sharing, and privacy on the Facebook. Paper read at 6th Workshop on Privacy Enhancing Technologies. Google Scholar
  2. 2.
    Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior & Human Decision Processes, 50(2), 179–211. CrossRefGoogle Scholar
  3. 3.
    Boyd, D. M., & Ellison, N. B. (2007). Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230. CrossRefGoogle Scholar
  4. 4.
    Chellappa, R. K., & Sin, R. (2005). Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Information Technology and Management, 6(2), 181–202. CrossRefGoogle Scholar
  5. 5.
    Culnan, M. J. (2000). Protecting privacy online: is self-regulation working? Journal of Public Policy & Marketing, 19(1), 20–26. CrossRefGoogle Scholar
  6. 6.
    Culnan, M. J., & Bies, J. R. (2003). Consumer privacy: balancing economic and justice considerations. Journal of social Issues, 59(2), 323–342. CrossRefGoogle Scholar
  7. 7.
    Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104–115. CrossRefGoogle Scholar
  8. 8.
    Dinev, T., & Hart, P. (2004). Privacy concerns and Internet use—a model of trade-off factors. Paper read at Working Paper, Department of Information Technology and Operations Management at Florida Atlantic University. Google Scholar
  9. 9.
    Donath, J., & Boyd, B. (2004). Public displays of connection. BT Technology Journal, 22(4), 71–82. CrossRefGoogle Scholar
  10. 10.
    Dwyer, C., Hiltz, S. R., & Passerini, K. (09–12 August 2007). Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. Paper read at the Thirteenth Americas Conference on Information Systems, at Keystone, Colorado. Google Scholar
  11. 11.
    Fogel, J., & Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153–160. CrossRefGoogle Scholar
  12. 12.
    Forman, C., Ghose, A., & Wiesenfeld, B. (2008). Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Information Systems Research, 19(3), 291–313. CrossRefGoogle Scholar
  13. 13.
    Granovetter, M. S. (1983). The strength of weak ties: a network theory revisited. Sociological Theory, 1, 201–233. CrossRefGoogle Scholar
  14. 14.
    Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Paper read at the 2005 ACM Workshop on Privacy in the Electronic Society. Google Scholar
  15. 15.
    Hui, K.-L., Teo, H. H., & Lee, S.-Y. T. (2007). The value of privacy assurance: an exploratory field experiment. Management Information Systems Quarterly, 31(1), 19–33. Google Scholar
  16. 16.
    Khan, J. I., & Shaikh, S. S. (2007). Computing in social networks with relationship algebra. Journal of Network and Computer Applications, 2008(31), 862–878. Google Scholar
  17. 17.
    Klopfer, P. H., & Rubenstein, D. L. (1977). The concept privacy and its biological basis. Journal of social Issues, 33, 52–65. CrossRefGoogle Scholar
  18. 18.
    Lehikoinen, J. T., Olsson, T., & Toivola, H. (2008). Privacy regulation in online social interaction. Paper read at ICT, Society and Human Beings 2008. Google Scholar
  19. 19.
    Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: an analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14, 79–100. CrossRefGoogle Scholar
  20. 20.
    Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. CrossRefGoogle Scholar
  21. 21.
    Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29. CrossRefGoogle Scholar
  22. 22.
    Milne, G. R., & Rohm, A. (2000). Consumer privacy and name removal across direct marketing channels: exploring opt-in and opt-out alternatives. Journal of Public Policy and Marketing, 19(2), 238–249. CrossRefGoogle Scholar
  23. 23.
    Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126. CrossRefGoogle Scholar
  24. 24.
    Paine, C., Reips, U.-D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. International Journal of Human-Computer Studies, 65, 526–536. CrossRefGoogle Scholar
  25. 25.
    Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37–59. CrossRefGoogle Scholar
  26. 26.
    Pfeil, U., Arjan, R., & Zaphiris, P. (2009). Age differences in online social networking—a study of user profiles and the social capital divide among teenagers and older users in MySpace. Computers in Human Behavior, 25(3), 643–654. CrossRefGoogle Scholar
  27. 27.
    Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27–41. CrossRefGoogle Scholar
  28. 28.
    Phelps, J. E., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing, 15(4), 2–17. CrossRefGoogle Scholar
  29. 29.
    Salancik, G. R., & Pfeffer, J. (1977). An examination of need-satisfaction models of job attitudes. Administrative Science Quarterly, 9(22), 427–456. CrossRefGoogle Scholar
  30. 30.
    Sheehan, K. B., & Hoy, G. M. (2000). Dimensions of privacy concern among online consumers. Journal of Public Policy and Marketing, 19(1), 62–73. CrossRefGoogle Scholar
  31. 31.
    Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: how online users respond to privacy concerns. Journal of Advertising, 28(3), 37–51. Google Scholar
  32. 32.
    Venkatesh, V., Morris, M. G., Gordon, B. D., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. Management Information Systems Quarterly, 27(3), 425–478. Google Scholar
  33. 33.
    Xu, H. (2009). Consumer responses to the introduction of privacy protection measures: an exploratory research framework. International Journal of E-Business Research, 5(2), 21–47. Special issue on the Protection of Privacy in E-Business. CrossRefGoogle Scholar
  34. 34.
    Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s information privacy concerns: toward an Integrative view. Paper read at 29th Annual International Conference on Information Systems (ICIS), at Paris, France. Google Scholar
  35. 35.
    Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 24(3), 135–174. CrossRefGoogle Scholar
  36. 36.
    Yang, S., & Wang, K. (2009). The influence of information sensitivity compensation on privacy concern and behavioral intention. The Data Base for Advances in Information Systems, 40(1), 38–51. CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.School of Management and EngineeringNanjing UniversityNanjingChina
  2. 2.School of Information Systems and TechnologyUniversity of WollongongWollongongAustralia
  3. 3.School of ManagementNanjing UniversityNanjingChina

Personalised recommendations