Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy

  • Stefanos GritzalisEmail author
  • Maria Sideri
  • Angeliki Kitsiou
  • Eleni Tzortzaki
  • Christos Kalloniatis
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 14)


Within Information and Knowledge Society the concept of Privacy has been enriched including aspects related to digital life, while the right to online Privacy gains more and more attention daily due to several cases of privacy breaches. Privacy is associated with the control, access and use or misuse of personal information by others, including governments, companies and other users as well. Social Network Sites as a part of digital space have altered the way that people communicate and have contributed to the construction of online social networks. During online interaction, users disclose information about them or others, while at the same time they express their concerns about Privacy infringement that may come up due to self-disclosure practices, not restricting or reversing though their disclosure behavior. Thus the “Privacy paradox” phenomenon is recorded since users cannot balance between Privacy concerns and their need for disclosure. Privacy’s circumvention destabilizes the trust between social actors, increases the feelings of insecurity and puts into risk social cohesion which is a prerequisite for the sustainability of our society. Legislation as well as technology may protect us, but sometimes they are not user friendly and sufficient. Users should protect themselves and other people in order to preserve their Privacy as a fundamental human right. In this paper, based on a literature review, we present the issue of Privacy in Social Network Sites focusing on factors that affect people’s Privacy concerns and behavior while relating these to social cohesion.


Privacy Privacy paradox Privacy protective behavior Social network sites Human rights Social cohesion 


  1. 1.
    U. Beck, Risk Society Towards a New Modernity (Sage, London, 1992)Google Scholar
  2. 2.
    S. Chtouris, Rational Symbolic Networks—Global States and National Hobbit (Nisos Publ, Athens, 2004). (in Greek)Google Scholar
  3. 3.
    L.F. Berkman, T. Glass, Social integration, social networks, social support and health, in Social Epidemiology, ed. by L.F. Berkman, I. Kawachi (Oxford University Press, New York, 2000), pp. 158–162Google Scholar
  4. 4.
    E. Breeze, C. Grundy, A. Fletcher, Inequalities in Quality of Life Among People Aged 75 Years and Over in Great Britain (University of Sheffield, UK, 2001), Accessed Jan 2019
  5. 5.
    K. Walker, A. Macbride, M.L.S. Vachon, Social support networks and the crisis of bereavement. Soc. Sci. Med. 11, 34–41 (1997)Google Scholar
  6. 6.
    K.Y. Lin, H.P. Lu, Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)MathSciNetCrossRefGoogle Scholar
  7. 7.
    P. Pai, D.C. Arnott, User adoption of social networking sites: eliciting uses and gratifications through a means–end approach. Comput. Hum. Behav. 29(3), 1039–1053 (2013)CrossRefGoogle Scholar
  8. 8.
    S. Gritzalis, Enhancing web privacy and anonymity in the digital era. Inf. Manag. Comput. Secur. 12(3), 255–288 (2004)CrossRefGoogle Scholar
  9. 9.
    L. Mitrou, Privacy protection in information and communication technology—the legal dimension, in Privacy and Information and Communication Technologies—Technical and Legal Issues, ed. by C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. Katsikas (Papasotiriou Publ., Athens, 2010), pp. 505–551. (in Greek)Google Scholar
  10. 10.
    T. Jones, T. Newburn, Private Security and Public Policing (Clarendon, Oxford, 1998)Google Scholar
  11. 11.
    G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)CrossRefGoogle Scholar
  12. 12.
    J. Panousis, Symbolic Constructions of Reality (Entelecheia Publ, Athens, 2004). (in Greek)Google Scholar
  13. 13.
    Α. Kitsiou, The social construction of crime in Information Society: the paradigm of free software movement. Ph.D. thesis. Department of Sociology, University of the Aegean, 2014 (in Greek)Google Scholar
  14. 14.
    J. Kallas, Information Society and the Role of Social Sciences (Nefeli Publ, Athens, 2006). (in Greek)Google Scholar
  15. 15.
    J.L. Cebrian, Τhe Network (Stachi, Αthens, 2000). (in Greek)Google Scholar
  16. 16.
    L. Mitrou, Law in Information Society (Sakkoulas Publ, Athens, 2002). (in Greek)Google Scholar
  17. 17.
    E. Simon, Introduction to the legal frame of information society, in Information Society, Studies on Information Society. From Theory to Political Practice, ed. by R. Pinter (Gondolat, Budapest, 2008)Google Scholar
  18. 18.
    K.T. Lee, M.J. Noh, D.M. Koo, Lonely people are no longer lonely on social networking sites: the mediating role of self-disclosure and social support. Cyberpsychol. Behav. Soc. Netw. 16(6), 413–418 (2013)CrossRefGoogle Scholar
  19. 19.
    E.M. Bryant, J. Marmo, A. Ramirez Jr., A functional approach to social networking sites, in Computer-Mediated Communication in Personal Relationships, ed. by K.B. Wright, L.M. Webb (Peter Lang, New York, 2011), pp. 3–20Google Scholar
  20. 20.
    J. Kim, J.R. Lee, The Facebook paths to happiness: effects of the number of Facebook friends and self-presentation on subjective wellbeing. Cyberpsychol. Behav. Soc. Netw. 14, 359–364 (2011)CrossRefGoogle Scholar
  21. 21.
    T.A. Pempek, Y.A. Yermolayeva, S.L. Yermolayeva, College students’ social networking experiences on Facebook. J. Appl. Dev. Psychol. 30, 227–238 (2009)CrossRefGoogle Scholar
  22. 22.
    J.A. Bargh, K. McKenna, The Internet and social life. Annu. Rev. Psychol. 55, 573–590 (2004)CrossRefGoogle Scholar
  23. 23.
    E. Pearson, All the worldwide web’s a stage: the performance of identity in online social networks. First Monday14(3) (2009), Accessed Dec 2018
  24. 24.
    M. Trusov, R.E. Bucklin, K. Pauwels, Effects of word-of-mouth versus traditional marketing: findings from an internet social networking site. J. Mark. 73, 90–102 (2009)CrossRefGoogle Scholar
  25. 25.
    Z. Papacharissi (ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites (Routledge, New York, 2011)Google Scholar
  26. 26.
    S. Conger, J.H. Pratt, K.D. Loch, Personal information privacy and emerging technologies. Inf. Syst. J. 23(5), 401–417 (2013)CrossRefGoogle Scholar
  27. 27.
    V. Benson, G. Saridakis, H. Tennakoon, Information disclosure of social media users. Does control over personal information, user awareness and security notices matter? Inf. Technol. People28(3), 426–441 (2015)Google Scholar
  28. 28.
    M. Taddicken, The ‘privacy paradox in the social web: the impact of privacy concerns, individual characteristics and the perceived social relevance on different forms of self-disclosure. J. Comput.-Mediat. Commun. 19(2), 248–273 (2014)CrossRefGoogle Scholar
  29. 29.
    F. Stutzman, J. Vitak, N.B. Ellison, R. Gray, C. Lampe, Privacy in interaction: exploring disclosure and social capital in Facebook, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Ireland, Dublin, 2012), pp. 330–337Google Scholar
  30. 30.
    N. Ellison, J. Vitak, C. Steinfield, R. Gray, C. Lampe, Negotiating privacy concerns and social capital needs in a social media environment, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 19–32CrossRefGoogle Scholar
  31. 31.
    M. Ziegele, O. Quiring, Privacy in social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 175–189CrossRefGoogle Scholar
  32. 32.
    S.A. Rains, S.R. Brunner, The outcomes of broadcasting self-disclosure using new communication technologies responses to disclosure vary across one’s social network. Commun. Res. 45(5), 659–687 (2015)CrossRefGoogle Scholar
  33. 33.
    N.N. Bazarova, Y.H. Choi, Self-disclosure in social media: extending the functional approach to self-disclosure motivations and characteristics on social network sites. J. Commun. 64, 635–657 (2014)CrossRefGoogle Scholar
  34. 34.
    T. Spiliotopoulos, I. Oakley, Understanding motivations for Facebook use: usage metrics, network structure, and privacy, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, Paris, France, 2013), pp. 3287–3296Google Scholar
  35. 35.
    S.C. Walton, R.E. Rice, Mediated disclosure on Twitter: the roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Comput. Hum. Behav. 29, 1465–1474 (2013)CrossRefGoogle Scholar
  36. 36.
    I. Buschel, R. Mehdi, A. Cammilleri, Y. Marzouki, B. Elger, Protecting human health and security in digital Europe: how to deal with the “privacy paradox”? Sci. Eng. Ethics 20, 639–658 (2014)CrossRefGoogle Scholar
  37. 37.
    S. Petronio, Boundary of Privacy: Dialectics of Disclosure (State University of New York Press, Albany, 2002)Google Scholar
  38. 38.
    M. Nguyen, Y.S. Bin, A. Campbell, Comparing online and offline self-disclosure: a systematic review. Cyberpsychol. Behav. Soc. Netw. 15(2), 103–111 (2012)CrossRefGoogle Scholar
  39. 39.
    D.M. Boyd, E. Hargittai, Facebook privacy settings: who cares? First Monday15(8) (2010), Accessed Jan 2019
  40. 40.
    A. Acquisti, R. Gross, Imagined communities: awareness, information sharing, and privacy on the Facebook, in Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET '06), ed. by G. Danezis, P. Golle (Robinson College, Cambridge, UK, 2006), pp. 36–58Google Scholar
  41. 41.
    Y.M. Baek, Solving the privacy paradox: a counter-argument experimental approach. Comput. Hum. Behav. 38, 33–42 (2014)CrossRefGoogle Scholar
  42. 42.
    T. Dienlin, S. Trepte, Putting the social (psychology) into social media is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45, 285–297 (2015)CrossRefGoogle Scholar
  43. 43.
    Sp. Kokolakis, Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)Google Scholar
  44. 44.
    C. Cheung, Z. W. Y. Lee, T. K. H. Chan, Self-disclosure in social networking sites. Internet Res. 25(2), 279–299 (2015)Google Scholar
  45. 45.
    H. Krasnova, S. Spiekermann, K. Koroleva, T. Hildebrand, Online social networks: why we disclose. J. Inf. Technol. 25, 109–125 (2010)CrossRefGoogle Scholar
  46. 46.
    W.M. Klein, Z. Kunda, Exaggerated self-assessments and the preference for controllable risks. Organ. Behav. Hum. Decis. Process. 59, 410–427 (1994)CrossRefGoogle Scholar
  47. 47.
    L.F. Nordgren, J. Van Der Pligt, F. Van Harreveld, Unpacking perceived control in risk perception: the mediating role of anticipated regret. J. Behav. Decis. Mak. 20(5), 533–544 (2007)CrossRefGoogle Scholar
  48. 48.
    L. Brandimarte, A. Acquisti, G. Loewenstein, Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2012)CrossRefGoogle Scholar
  49. 49.
    J.C. Bertot, P.T. Jaeger, J.M. Grimes, Using ICTs to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies. Gov. Inf. Q. 27(3), 264–271 (2010)CrossRefGoogle Scholar
  50. 50.
    J.C. Bertot, P.T. Jaeger, D. Hansen, The impact of polices on government social media use: issues, challenges, and recommendations. Gov. Inf. Q. 29(1), 30–40 (2012)CrossRefGoogle Scholar
  51. 51.
    E. Christofides, A. Muise, S. Desmarais, Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychol. Behav. 12(3), 341–345 (2012)CrossRefGoogle Scholar
  52. 52.
    S.B. Barnes, A privacy paradox: social networking in the United States. First Monday11(9) (2006), Accessed Jan 2019
  53. 53.
    R. Gross, A. Acquisti, Information revelation and privacy in online social networks, in Proceedings of the ACM Workshop on Privacy in the Electronic Society (ACM, Virginia, USA, 2005), pp. 71–80Google Scholar
  54. 54.
    H.J. Smith, T. Dinev, H. Xu, Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1015 (2011)CrossRefGoogle Scholar
  55. 55.
    Y.M. Baek, E. Kim, Y. Bae, My privacy is okay, but theirs is endangered: why comparative optimism matters in online privacy concerns. Comput. Hum. Behav. 31, 48–56 (2014)CrossRefGoogle Scholar
  56. 56.
    E. Hargittai, An update on survey measures of web-oriented digital literacy. Soc. Sci. Comput. Rev. 27(1), 130–137 (2009)CrossRefGoogle Scholar
  57. 57.
    Y.J. Park, Digital literacy and privacy behavior online. Commun. Res. 40(2), 215–236 (2011)CrossRefGoogle Scholar
  58. 58.
    B. Debatin, J.P. Lovejoy, A.K. Horn, B.N. Hughes, Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Med. Commun. 15, 83–108 (2009)CrossRefGoogle Scholar
  59. 59.
    B. Debatin, Ethics, privacy, and self-restraint in social networking, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 47–60CrossRefGoogle Scholar
  60. 60.
    S. Trepte, D. Teutsch, P.K. Masur, C. Eicher, M. Fischer, A. Hennhofer, F. Lind, Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale” (OPLIS), in Reforming European Data Protection Law, ed. by S. Gutwirth, R. Leenes, P. Hert (Springer, Heidelberg, 2015), pp. 333–365CrossRefGoogle Scholar
  61. 61.
    T. Zhou, Understanding online community user participation: a social influence perspective”. Internet Res. 21(1), 67–81 (2011)CrossRefGoogle Scholar
  62. 62.
    C. Posey, P.B. Lowry, T.L. Roberts, T.S. Ellis, Proposing the online community self- disclosure model: the case of working professionals in France and the UK who use online communities. Eur. J. Inf. Syst. 19(2), 181–195 (2010)CrossRefGoogle Scholar
  63. 63.
    C. Dwyer, S. Hiltz, K. Passerini, Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace, in Proceedings of 13th Americas Conference on Information Systems, AMCIS 2007, paper 339, Accessed Jan 2019
  64. 64.
    Z. Tufekci, Facebook, youth and privacy in networked publics, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Dublin, Ireland, 2012), pp. 338–35Google Scholar
  65. 65.
    M. Ragnedda, Social control and surveillance in the society of consumers. Int. J. Sociol. Anthropol. 3(6), 180–188 (2011)Google Scholar
  66. 66.
    N.B. Ellison, C. Steinfield, C. Lampe, The benefits of Facebook ‘‘friends’’: social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143–1168 (2007)CrossRefGoogle Scholar
  67. 67.
    M. Taddicken, C. Jers, The uses of privacy online: trading a loss of privacy for social web gratifications?, in Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 143–158CrossRefGoogle Scholar
  68. 68.
    S. Trepte, L. Reinecke, The reciprocal effects of social network site use and the disposition for self-disclosure: a longitudinal study. Comput. Hum. Behav. 29(3), 1102–1112 (2013)CrossRefGoogle Scholar
  69. 69.
    C.M.K. Cheung, P.-Y. Chiu, M.K.O. Lee, Online social networks: why do students use Facebook? Comput. Hum. Behav. 27(4), 1337–1343 (2011)CrossRefGoogle Scholar
  70. 70.
    S. Utz, N. Kramer, The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychol. J. Psychosoc. Res. Cyberspace 3(2) (2009), Accessed Jan 2019
  71. 71.
    D. Boyd, J. Heer, Profiles as conversation: networked identity performance on Friendster, in Proceedings of the Hawai'i International Conference on System Sciences (HICSS-39) (IEEE, Kauai, 2006)Google Scholar
  72. 72.
    C. Steinfield, N. Ellison, C. Lampe, J. Vitak, Online social network sites and the concept of social capital, in Frontiers in New Media Research, ed. by F.L. Lee, L. Leung, J.S. Qiu, D. Chu (Routledge, New York, 2012), pp. 115–131Google Scholar
  73. 73.
    P.M. Valkenburg, J. Peter, The effect of instant messaging on the quality of adolescents’ existing friendships: a longitudinal study. J. Commun. 59, 79–97 (2009)CrossRefGoogle Scholar
  74. 74.
    Z.J. Jiang, C.S. Heng, B.C. Choi, Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res. 24(3), 579–595 (2013)CrossRefGoogle Scholar
  75. 75.
    H. Xu, X.R. Luo, J.M. Carroll, M.B. Rosson, The personalization privacy paradox: an exploratory study of decision-making process for location-aware marketing. Decis. Support Syst. 51(1), 42–52 (2011)CrossRefGoogle Scholar
  76. 76.
    E.E. Hollenbaugh, A.L. Ferris, Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50–58 (2014)CrossRefGoogle Scholar
  77. 77.
    N.K. Malhotra, S.S. Kim, J. Agarwal, Ιnternet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15(4), 336–355 (2004)CrossRefGoogle Scholar
  78. 78.
    M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis, Privacy and Facebook universities students’ communities for confessions and secrets: the greek case, in e-Democracy 2015. CCIS, vol. 570, ed. by S.K. Katsikas, A.B. Sideridis (Springer, Cham, 2015), pp. 77–94Google Scholar
  79. 79.
    F. Stutzman, R. Gross, A. Acquisti, Silent listeners: the evolution of privacy and disclosure on facebook. J. Priv. Confid. 4(2), 7–41 (2013)Google Scholar
  80. 80.
    J.L. Gibbs, N.B. Ellison, C.-H. Lai, First comes love, then comes Google: an investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res. 38(1), 70–100 (2011)CrossRefGoogle Scholar
  81. 81.
    B.M. Okdie, Blogging and self-disclosure: the role of anonymity, self-awareness and audience size. Ph.D. dissertation. Department of Psychology in the Graduate School, University of Alabama, 2011Google Scholar
  82. 82.
    Z. Papacharissi, P.L. Gibson, Fifteen minutes of privacy: privacy, sociality, and publicity on social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 75–89CrossRefGoogle Scholar
  83. 83.
    P.A. Norberg, D. Horne, D. Horne, The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRefGoogle Scholar
  84. 84.
    Z. Tufekci, Can you see me now? Audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28, 20–36 (2008)CrossRefGoogle Scholar
  85. 85.
    T. Alashoor, M. Keil, L. Liu, H.J. Smith, How values shape concerns about privacy for self and others, in Proceedings of the Thirty Sixth International Conference on Information Systems, ICIS 2015, ed. by T. Carte, A. Heinzl, C. Urquhart (AIS Electronic Library, Atlanta, 2015)Google Scholar
  86. 86.
    H. Krasnova, N.F. Veltri, O. Günther, Self-disclosure and privacy calculus on social networking sites: the role of culture: intercultural dynamics of privacy calculus. Bus. Inf. Syst. Eng. 4(3), 127–135 (2012)CrossRefGoogle Scholar
  87. 87.
    P.B. Lowry, J. Cao, A. Everard, Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. J. Manag. Inf. Syst. 27(4), 163–200 (2011)CrossRefGoogle Scholar
  88. 88.
    M. Helweg-Larsen, J.A. Shepperd, Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature. Pers. Soc. Psychol. Bull. 5(1), 75–95 (2001)Google Scholar
  89. 89.
    C.M. Hoadley, H. Xu, J.J. Lee, M.B. Rosson, Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRefGoogle Scholar
  90. 90.
    A. Acquisti, L.K. John, G. Loewenstein, What is privacy worth? J. Leg. Stud. 42(2), 249–274 (2013)CrossRefGoogle Scholar
  91. 91.
    K.-L. Hui, H.-H. Teo, S.-Y.T. Lee, The value of privacy assurance: an exploratory field experiment. MIS Q. 31(1), 19–33 (2007)CrossRefGoogle Scholar
  92. 92.
    W.M.P. Steijn, Developing a sense of privacy: an investigation into privacy appreciation among young and older individuals in the context of social network sites. Dissertation, Tilburg University, 2014, Accessed Dec 2018
  93. 93.
    D. Boyd, What does the Facebook experiment teach us? The Message (2014), Accessed Jan 2019
  94. 94.
    S. Livingston, Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10(3), 393–411 (2008)CrossRefGoogle Scholar
  95. 95.
    K. Raynes-Goldie, Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook’. First Monday15(1) (2010), Accessed Jan 2019
  96. 96.
    P.B. Brandtzæg, M. Lüders, J.H. Skjetne, Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum.-Comput. Interact. 26, 1006–1030 (2010)CrossRefGoogle Scholar
  97. 97.
    E. Van den Broeck, K. Poels, M. Walrave, Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Soc. Media Soc. 1–11 (2015)Google Scholar
  98. 98.
    K. Sheehan, An investigation of gender differences in on-line privacy concerns and resultant behavior. J. Interact. Mark. 13, 24–38 (1999)CrossRefGoogle Scholar
  99. 99.
    C. Jensen, C. Potts, C. Jensen, Privacy practices of Internet users: Self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1–2), 203–227 (2005)CrossRefGoogle Scholar
  100. 100.
    M.S. Ackerman, L.F. Cranor, J. Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, in Proceedings of the ACM Conference on Electronic Commerce (ACM, Denver, U.S.A, 1999), pp. 1–8Google Scholar
  101. 101.
    K.B. Sheehan, Toward a typology of Internet users and online privacy concerns. Inf. Soc. 18, 21–32 (2002)CrossRefGoogle Scholar
  102. 102.
    M.Z. Yao, R.E. Rice, K. Wallis, Predicting user concerns about online privacy. J. Am. Soc. Inf. Sci. Technol. 58, 710–722 (2007)CrossRefGoogle Scholar
  103. 103.
    Y. Feng, W. Xie, Teens’ concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162 (2014)CrossRefGoogle Scholar
  104. 104.
    G. Cecere, F. Le Guel, N. Soulié, Perceived Internet privacy concerns on social networks in Europe. Technol. Forecast. Soc. Chang. 96, 277–287 (2015)CrossRefGoogle Scholar
  105. 105.
    D.H. Nguyen, E.D. Mynatt, Privacy Mirrors: Understanding and Shaping Socio-Technical Ubiquitous Computing Systems (Georgia Institute of Technology, USA, 2002)Google Scholar
  106. 106.
    E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating privacy requirements into the system design process: the PriS conceptual framework. Internet Res. 16(2), 140–158 (2006)CrossRefGoogle Scholar
  107. 107.
    C. Kalloniatis, E. Kavakli, S. Gritzalis, PriS methodology: incorporating privacy requirements into the system design process, in Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering ConferenceSymposium on Requirements Engineering for Information Security, ed. by J. Mylopoulos, G. Spafford (IEEE, France, Paris, 2005), pp. 1–9Google Scholar
  108. 108.
    C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing privacy requirements in system design: the PriS method. Requir. Eng. J. 13(3), 241–255 (2008)CrossRefGoogle Scholar
  109. 109.
    M. Pavlidis, H. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis, Trustworthy selection of cloud providers based in security and privacy requirements: justifying trust assumptions, in Proceedings of 10th International Conference on Trust, Privacy and Security in Digital Business, ed. by S. Furnell, C. Lambrinoudakis (Springer, Czech, Prague, 2013), pp. 185–198Google Scholar
  110. 110.
    N.C. Kramer, N. Haferkamp, Online self-presentation: balancing privacy concerns and impression construction on social networking sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 127–141CrossRefGoogle Scholar
  111. 111.
    E. Litt, Understanding social network site users' privacy tool use. Comput. Hum. Behav. 29, 1649–1656 (2013)CrossRefGoogle Scholar
  112. 112.
    A.L. Young, A. Quan-Haase, Privacy protection strategies on Facebook. Information. Commun. Soc. 16(4), 479–500 (2013)CrossRefGoogle Scholar
  113. 113.
    M. Johnson, S. Egelman, S.M. Bellovin, Facebook and privacy: it’s complicated, in Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012) (ACM, Washington, 2012), pp. 1–15Google Scholar
  114. 114.
    E. Vanderhoven, T. Schellens, M. Valcke, Exploring the usefulness of school education about risks on social network sites: a survey study. J. Media Liter. Educ. 5(1), 285–294 (2013)Google Scholar
  115. 115.
    E. Vanderhoven, T. Schellens, M. Valcke, Educating teens about the risks on social network sites: an intervention study in secondary education. Communicar Sci. J. Media Educ. 43(XXII), 123–131 (2014)Google Scholar
  116. 116.
    E. Vanderhoven, T. Schellens, R. Vanderlinde, M. Valcke, Developing educational materials about risks on social network sites: a design-based research approach. Educ. Tech. Res. Dev. 64, 459–480 (2016)CrossRefGoogle Scholar
  117. 117.
    R. Del Rey, J.A. Casas, R. Ortega, The ConRed program, an evidence-based practice. Communicar Sci. J. Media Educ. 39(XX), 129–137 (2012)Google Scholar
  118. 118.
    M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis, “I have learned that I must think twice before…”. An educational intervention for enhancing students’ privacy awareness in Facebook, in Proceedings of the 7th International Conference, E-Democracy 2017, ed. by S. Katsikas, V. Zorkadis (Springer, Cham, 2017), pp. 79–94Google Scholar
  119. 119.
    M. Foucault, Power, Knowledge Ethics (Ipsilon, Athens, 1987). (in Greek)Google Scholar
  120. 120.
    T.H. Eriksen, Tyranny of the Moment Fast and Slow Time in the Information Age (. Pluto Press, London, 2001)Google Scholar
  121. 121.
    Μ. Jakala, E. Berki, Communities, communication and online identities, in Digital Identity and Social Media, ed. by St. Warburton, St. Hatzipanagos (IGI Global, USA, 2013), pp. 1–13Google Scholar
  122. 122.
    E. Lampropoulou, Internal Security and Control Society (Kritiki Publ, Athens, 2001). (in Greek)Google Scholar
  123. 123.
    C. Norris, From personal to digital: CCTV, the panopticon and the technological mediation of suspicion and social control, in Surveillance and Social Sorting: Privacy Risk and Automated Discrimination, ed. by D. Lyon (Routledge, London, 2003), pp. 249–281Google Scholar
  124. 124.
    D. Lyon, The Electronic Eye: The Rise of Surveillance Society-Computers and Social Control in Context (Wiley, UK, 2013)Google Scholar
  125. 125.
    M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, Which side are you on? A new panopticon versus privacy, in Proceedings of 2013 International Conference on Security and Cryptography (SECRYPT) (IEEE, Reykjavik, Iceland, 2013), pp. 1–13Google Scholar
  126. 126.
    L. Mitrou, M. Kandias, V. Stavrou, D. Gritzalis, Social media profiling: a panopticon or omniopticon tool? in Proceedings of the 6th Biannual Surveillance and Society Conference (Spain, Barcelona, 2014), pp. 1–15Google Scholar
  127. 127.
    A. Melucci, Social Theory in the Information Era (Trotta Editorial, 2002)Google Scholar
  128. 128.
    E. Daskalakis, Criminology of Social Reaction: Traditions (Sakkoulas Publ, Athens, 1985). (in Greek)Google Scholar
  129. 129.
    F.B. Viégas, Blogger’s expectations of privacy and accountability: an initial survey. J. Comput.-Mediated Commun. 10(3), 1–31 (2005)Google Scholar
  130. 130.
    G. D’Souza, J.E. Phelps, The privacy Paradox: the case of secondary disclosure. Rev. Mark. Sci. 7, 1–29 (2009)Google Scholar
  131. 131.
    D.J. Solove, A taxonomy of privacy. Law Rev. 154(3), 477–560 (2006)Google Scholar
  132. 132.
    M.B. Islam, J. Watson, R. Iannella, S. Geva, What I Want for my Social Network Privacy (NICTA, Australia, 2014)Google Scholar
  133. 133.
    A. Beldad, M. De Jong, M. Steehouder, I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions. Comput. Hum. Behav. 27(6), 2233–2242 (2011)CrossRefGoogle Scholar
  134. 134.
    J. Midgley, Social Development The Developmental Perspective in Social Welfare (Sage, London, 1995)Google Scholar
  135. 135.
    J. Holmberg (ed.), Making Development Sustainable (Island Press, Washington D.C., 1992)Google Scholar
  136. 136.
    W. Streeck, Productive constraints: on the institutional conditions of diversified quality production, in Social Institutions and Economic Performance, ed. by W. Street (Sage, London, 1992), pp. 1–40Google Scholar
  137. 137.
    P. Cooke, K. Morgan, The Associational Economy (Oxford University Press, Oxford, 1998)CrossRefGoogle Scholar
  138. 138.
    N. Uphoff, Local Institutional Development: An Analytic Sourcebook with Cases (Kumarian, West Hartford, 1986)Google Scholar
  139. 139.
    L.F. Salmen, Listen to the People Participant-Observer Evaluation of Development Projects (Oxford University Press, Washington, 1987)Google Scholar
  140. 140.
    S.E. Henderson, Expectations of privacy in social media. Mississippi Coll. Law Rev. 31, 227–324 (2012)Google Scholar
  141. 141.
    J.E. Cohen, What privacy is for. Harvard Law Rev. 126(7), 1904–1933 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2021

Authors and Affiliations

  • Stefanos Gritzalis
    • 1
    Email author
  • Maria Sideri
    • 2
  • Angeliki Kitsiou
    • 2
  • Eleni Tzortzaki
    • 3
  • Christos Kalloniatis
    • 2
  1. 1.Laboratory of Systems Security, Department of Digital SystemsUniversity of PiraeusPiraeusGreece
  2. 2.Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and CommunicationUniversity of the AegeanLesvosGreece
  3. 3.Laboratory of Information and Communication Systems Security, Department of Information and Communications Systems EngineeringUniversity of the AegeanSamosGreece

Personalised recommendations