Skip to main content
Log in

Antecedents of collective privacy management in social network sites: a cross-country analysis

  • Regular Paper
  • Published:
CCF Transactions on Pervasive Computing and Interaction Aims and scope Submit manuscript

Abstract

In this paper, we examine the psychological antecedents of privacy management strategies in social network sites (SNS) and extend the understanding to collective privacy management. By surveying Facebook users in the US (N = 454), Singapore (N = 467) and South Korea (N = 472), we are able to test our prediction model in these three countries to examine whether the effects of the antecedents are robust from a cross-country perspective. Although some of the effects are significantly different between the three countries, we find that in general users’ privacy attitudes, social norms, and self/collective control beliefs substantially predict the adoption of collective privacy management strategies. These findings contribute to the explanations of users’ adoption of behavioral privacy management strategies. We conclude with global and country-specific recommendations regarding future privacy designs for collective privacy management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. The IRB in Singapore requires participants to be at least 21 years old.

References

  • Afsar, B., Masood, M.: Transformational leadership, creative self-efficacy, trust in supervisor, uncertainty avoidance, and innovative work behavior of nurses. J. Appl. Behav. Sci. 54(1), 36–61 (2018). https://doi.org/10.1177/0021886317711891

    Article  Google Scholar 

  • Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991). https://doi.org/10.1016/0749-5978(91)90020-T

    Article  Google Scholar 

  • Akhter, S.H.: Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. J. Consum. Mark. 31(2), 118–125 (2014). https://doi.org/10.1108/JCM-06-2013-0606

    Article  MathSciNet  Google Scholar 

  • Altman, I.: The environment and social behavior: privacy, personal space, territory, and crowding. Brooks/Cole Publishing Company, Monterey, ($6.95 cloth) (1975)

  • Bandura, A.: Self-efficacy mechanism in human agency. Am. Psychol. 37(2), 122–147 (1982). https://doi.org/10.1037/0003-066X.37.2.122

    Article  Google Scholar 

  • Bandura, A.: Self-Efficacy in Changing Societies. Cambridge University Press (1997)

    Google Scholar 

  • Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2010), 1563–1572 (2010)

  • Boardley, I.D., Jackson, B., Simmons, A.: Changes in task self-efficacy and emotion across competitive performances in golf. J. Sport Exer. Psychol. 37(4), 393–409 (2015). https://doi.org/10.1123/jsep.2014-0331

    Article  Google Scholar 

  • Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.-Mediat. Commun. 13(1), 210–230 (2007). https://doi.org/10.1111/j.1083-6101.2007.00393.x

    Article  Google Scholar 

  • Chang, C.-W., Chen, G.M.: College students’ disclosure of location-related information on Facebook. Comput. Hum. Behav. 35, 33–38 (2014). https://doi.org/10.1016/j.chb.2014.02.028

    Article  Google Scholar 

  • Cho, H.: Determinants of behavioral responses to online privacy: the effects of concern, risk beliefs, self-efficacy, and communication sources on self- protection strategies. J. Inform. Priv. Secur. 6(1), 3–27 (2010)

    Article  Google Scholar 

  • Cho, H., Filippova, A.: Networked privacy management in facebook: a mixed-methods and multinational study (2016)

  • Cho, S.E., Park, H.W.: A qualitative analysis of cross-cultural new media research: SNS use in Asia and the West. Qual. Quant. 47(4), 2319–2330 (2013). https://doi.org/10.1007/s11135-011-9658-z

    Article  Google Scholar 

  • Cho, H., Rivera-Sánchez, M., Lim, S.S.: A multinational study on online privacy: global concerns and local responses. New Media Soc. 11(3), 395–416 (2009). https://doi.org/10.1177/1461444808101618

    Article  Google Scholar 

  • Cialdini, R.B., Reno, R.R., Kallgren, C.A.: A focus theory of normative conduct: recycling the concept of norms to reduce littering in public places. J. Personal. Soc. Psychol. 58(6), 1015–1026 (1990). https://doi.org/10.1037/0022-3514.58.6.1015

    Article  Google Scholar 

  • Constructing a TpB questionnaire: conceptual and methodological considerations: 2006. http://www.uni-bielefeld.de/ikg/zick/ajzen%20construction%20a%20tpb%20questionnaire.pdf

  • Cybulski, M., Cybulski, L., Krajewska-Kulak, E., Cwalina, U.: The level of emotion control, anxiety, and self-efficacy in the elderly in Bialystok Poland. Clin. Interv. Aging. 12, 305–314 (2017). https://doi.org/10.2147/CIA.S128717

    Article  Google Scholar 

  • Das, S., Kramer, A.: Self-censorship on Facebook. ICWSM (2013)

    Google Scholar 

  • De Wolf, R., Willaert, K., Pierson, J.: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook. Comput. Hum. Behav. 35, 444–454 (2014). https://doi.org/10.1016/j.chb.2014.03.010

    Article  Google Scholar 

  • Earley, P.C.: East meets West Meets Mideast: further explorations of collectivistic and individualistic work groups. Acad. Manag. J. 36(2), 319–348 (1993). https://doi.org/10.2307/256525

    Article  Google Scholar 

  • Goddard, R.D.: Collective efficacy: a neglected construct in the study of schools and student achievement. J. Educ. Psychol. 93(3), 467–476 (2001). https://doi.org/10.1037/0022-0663.93.3.467

    Article  Google Scholar 

  • Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp 103–112 (2011)

  • James, T.L., Wallace, L., Warkentin, M., Kim, B.C., Collignon, S.E.: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inform. Manag. (2017). https://doi.org/10.1016/j.im.2017.01.001

    Article  Google Scholar 

  • Jia, H., Xu, H.: Autonomous and Interdependent: collaborative privacy management on social networking sites. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 4286–4297 (2016)

  • Jiang, Z., Heng, C.S., Choi, B.C.F.: Research Note—privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res. 24(3), 579–595 (2013). https://doi.org/10.1287/isre.1120.0441

    Article  Google Scholar 

  • Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N.: An Investigation into Facebook Friend Grouping. INTERACT. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds) Springer Heidelberg, Berlin, pp 216–233 (2011)

  • Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017). https://doi.org/10.1016/j.cose.2015.07.002

    Article  Google Scholar 

  • Krasnova, H., Veltri, N.F.: Privacy calculus on social networking sites: explorative evidence from Germany and USA. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS) (Jan. 2010), 1–10 (2010)

  • Lampe, C., Wohn, D.Y., Vitak, J., Ellison, N.B., Wash, R.: Student use of Facebook for organizing collaborative classroom activities. Int. J. Comput.-Support. Collab. Learn. 6(3), 329–347 (2011). https://doi.org/10.1007/s11412-011-9115-y

    Article  Google Scholar 

  • Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2011), 3217–3226 (2011)

  • Lankton, N., McKnight, D., Tripp, J.: Privacy management strategies: an exploratory cluster analysis (2016)

  • Lee, J.-M., Rha, J.-Y.: Personalization–privacy paradox and consumer conflict with the use of location-based mobile commerce. Comput. Hum. Behav. 63, 453–462 (2016). https://doi.org/10.1016/j.chb.2016.05.056

    Article  Google Scholar 

  • Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediat. Commun. 14(1), 79–100 (2008). https://doi.org/10.1111/j.1083-6101.2008.01432.x

    Article  Google Scholar 

  • Litt, E.: Understanding social network site users’ privacy tool use. Comput. Hum. Behav. 29(4), 1649–1656 (2013). https://doi.org/10.1016/j.chb.2013.01.049

    Article  Google Scholar 

  • Min, J., Kim, B.: How are people enticed to disclose personal information despite privacy concerns in social network sites. The calculus between benefit and cost. J. Assoc. Inform. Sci. Technol. (2014). https://doi.org/10.1002/asi.23206

    Article  Google Scholar 

  • Mohamed, N., Ahmad, I.H.: Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput. Hum. Behav. 28(6), 2366–2375 (2012). https://doi.org/10.1016/j.chb.2012.07.008

    Article  Google Scholar 

  • Nemec Zlatolas, L., Welzer, T., Heričko, M., Hölbl, M.: Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Hum. Behav. 45, 158–167 (2015). https://doi.org/10.1016/j.chb.2014.12.012

    Article  Google Scholar 

  • Nov, O., Wattal, S.: Social computing privacy concerns: antecedents and effects. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2009a), pp 333–336 (2009a)

  • Nov, O., Wattal, S.: Social computing privacy concerns: antecedents and effects. In: Proceedings of the 27th international conference on Human factors in computing systems (New York, NY, USA), 333–336 (2009b)

  • Pai, P., Tsai, H.-T.: Reciprocity norms and information-sharing behavior in online consumption communities: an empirical investigation of antecedents and moderators. Inform. Manag. 53(1), 38–52 (2016). https://doi.org/10.1016/j.im.2015.08.002

    Article  Google Scholar 

  • Petronio, S.: Boundaries of privacy: dialectics of disclosure. State University of New York Press (2002)

    Google Scholar 

  • Posey, C., Lowry, P.B., Roberts, T.L., Ellis, T.S.: Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities. Eur. J. Inform. Syst. 19(2), 181–195 (2010). https://doi.org/10.1057/ejis.2010.15

    Article  Google Scholar 

  • Ridings, C.M., Gefen, D., Arinze, B.: Some antecedents and effects of trust in virtual communities. J. Strateg. Inform. Syst. 11(4), 271–295 (2002). https://doi.org/10.1016/S0963-8687(02)00021-5

    Article  Google Scholar 

  • Rui, J., Stefanone, M.A.: Strategic self-presentation online: a cross-cultural study. Comput. Hum. Behav. 29(1), 110–118 (2013). https://doi.org/10.1016/j.chb.2012.07.022

    Article  Google Scholar 

  • Sampson, R.J., Raudenbush, S.W., Earls, F.: Neighborhoods and violent crime: a multilevel study of collective efficacy. Science 277(5328), 918–924 (1997). https://doi.org/10.1126/science.277.5328.918

    Article  Google Scholar 

  • Shi, P., Xu, H., Chen, Y.: Using contextual integrity to examine interpersonal information boundary on social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp 35–38 (2013)

  • Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn’t: exploring self-censorship on Facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work (New York, NY, USA), 793–802 (2013)

  • Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996). https://doi.org/10.2307/249477

    Article  Google Scholar 

  • Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1016 (2011)

    Article  Google Scholar 

  • Squicciarini, A.C., Xu, H., Zhang, X.: CoPE: enabling collaborative privacy management in online social networks. J. Am. Soc. Inform. Sci. Technol. 62(3), 521–534 (2011)

    Google Scholar 

  • Staddon, J., Acquisti, A., LeFevre, K.: Self-reported social network behavior: accuracy predictors and implications for the privacy paradox. In: 2013 International Conference on Social Computing (SocialCom), pp 295–302 (2013)

  • Steenkamp, J.-B.E.M., Baumgartner, H.: Assessing measurement invariance in cross-national consumer research. J. Consum. Res. 25(1), 78–90 (1998). https://doi.org/10.1086/209528

    Article  Google Scholar 

  • Steenkamp, J.-B.E.M., Geyskens, I.: How country characteristics affect the perceived value of web sites. J. Mark. 70(3), 136–150 (2006). https://doi.org/10.1509/jmkg.70.3.136

    Article  Google Scholar 

  • Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. J. Appl. Psychol. 68(3), 459–468 (1983). https://doi.org/10.1037/0021-9010.68.3.459

    Article  Google Scholar 

  • Strater, K., Lipford, H.R.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22Nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1 (Swinton, UK, UK), pp 111–119 (2008)

  • Stutzman, F., Hartzog, W.: Boundary regulation in social media. In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, pp 769–778 (2012)

  • Stutzman, F., Capra, R., Thompson, J.: Factors mediating disclosure in social network sites. Comput. Hum. Behav. 27(1), 590–598 (2011). https://doi.org/10.1016/j.chb.2010.10.017

    Article  Google Scholar 

  • Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inform. Syst. Res. 6(2), 144–176 (1995). https://doi.org/10.1287/isre.6.2.144

    Article  Google Scholar 

  • Triandis, H.C.: Individualism and collectivism. Westview Press (1995)

    Google Scholar 

  • Tsoi, H.K., Chen, L.: From privacy concern to uses of social network sites: a cultural comparison via user survey. In: Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 IEEE third international conference on social computing (socialcom), pp 457–464 (2011)

  • Ur, B., Wang, Y.: A cross-cultural framework for protecting user privacy in online social media. In: Proceedings of the 22nd International Conference on World Wide Web, pp 755–762 (2013)

  • Wang, S.-L., Lin, S.S.J.: The effects of group composition of self-efficacy and collective efficacy on computer-supported collaborative learning. Comput. Hum. Behav. 23(5), 2256–2268 (2007). https://doi.org/10.1016/j.chb.2006.03.005

    Article  MathSciNet  Google Scholar 

  • Wang, Y., Norcie, G., Cranor, L.F.: Who is concerned about what? A study of American, Chinese and Indian users’ privacy concerns on social network sites. In: Proceedings of the 4th International Conference on Trust and Trustworthy Computing (Berlin, Heidelberg), pp 146–153 (2011)

  • Wilfong, J.D.: Computer anxiety and anger: the impact of computer use, computer experience, and self-efficacy beliefs. Comput. Hum. Behav. 22(6), 1001–1011 (2006). https://doi.org/10.1016/j.chb.2004.03.020

    Article  Google Scholar 

  • Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA), pp 609–618 (2012)

  • Wisniewski, P., Islam, A.K.M.N., Knijnenburg, B.P., Patil, S. Give Social network users the privacy they want. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp 1427–1441 (2015a)

  • Wisniewski, P., Xu, H., Lipford, H., Bello-Ogunu, E.: Facebook apps and tagging: the trade-off between personal privacy and engaging with friends. J. Assoc. Inform. Sci. Technol. 66(9), 1883–1896 (2015b). https://doi.org/10.1002/asi.23299

    Article  Google Scholar 

  • Wisniewski, P.J., Knijnenburg, B.P., Lipford, H.R.: Making privacy personal: profiling social network users to inform privacy education and nudging. Int. J. Hum. Comput. Stud. 98, 95–108 (2017). https://doi.org/10.1016/j.ijhcs.2016.09.006

    Article  Google Scholar 

  • Xu, H., Dinev, T., Smith, H.J., Hart, P.: Examining the formation of individual’s privacy concerns: Toward an integrative view. In: ICIS 2008 Proceedings (Paris, France) (2008)

  • Yao, M.Z., Zhang, J.: Predicting user concerns about online privacy in Hong Kong. Cyber Psychol. Behav. 11(6), 779–781 (2008). https://doi.org/10.1089/cpb.2007.0252

    Article  Google Scholar 

  • Youn, S.: Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J. Consum. Aff. 43(3), 389–418 (2009). https://doi.org/10.1111/j.1745-6606.2009.01146.x

    Article  Google Scholar 

  • Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies (University Park, PA), 265–274 (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao Li.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Appendix

Appendix

See Table 5

Table 5 Comparison of overall (marginal) effects of country on privacy management strategies, privacy concerns, norms, and efficacy

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Cho, H., Anaraky, R.G. et al. Antecedents of collective privacy management in social network sites: a cross-country analysis. CCF Trans. Pervasive Comp. Interact. 4, 106–123 (2022). https://doi.org/10.1007/s42486-022-00092-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42486-022-00092-8

Keywords

Navigation