Selectivity in posting on social networks: the role of privacy concerns, social capital, and technical literacy
People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker...
Saved in:
| Published in: | Heliyon Vol. 6; no. 2; p. e03298 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
England
Elsevier Ltd
01.02.2020
Elsevier |
| Subjects: | |
| ISSN: | 2405-8440, 2405-8440 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker for agility, the frequency in which people update their audience selection when posting information in online social networks, and evaluate the factors that contribute to the variability of agility between different users. We analyzed the posting behavior of Facebook 181 participants, as well as their answers to open and close questions. We find that frequent changes in privacy settings are correlated with high social privacy and with institutional privacy concerns, whereas social concerns were found to be more prominent. Agility was negatively correlated with low public sharing. Our findings show that users use privacy settings to effectively mitigate privacy concerns and desires for creating and strengthening social connections. We discuss how agility can be used to design and to evaluate new user interfaces for managing privacy in social settings.
Privacy, Online social networks, Privacy controls, Social capital, Behavior analysis, Boundary regulation theory, Facebook, Computer privacy; Cognitive aspect of human-computer system; Interaction design; User interface; Software engineering, Computer science, Psychology |
|---|---|
| AbstractList | People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker for agility, the frequency in which people update their audience selection when posting information in online social networks, and evaluate the factors that contribute to the variability of agility between different users. We analyzed the posting behavior of Facebook 181 participants, as well as their answers to open and close questions. We find that frequent changes in privacy settings are correlated with high social privacy and with institutional privacy concerns, whereas social concerns were found to be more prominent. Agility was negatively correlated with low public sharing. Our findings show that users use privacy settings to effectively mitigate privacy concerns and desires for creating and strengthening social connections. We discuss how agility can be used to design and to evaluate new user interfaces for managing privacy in social settings.
Privacy, Online social networks, Privacy controls, Social capital, Behavior analysis, Boundary regulation theory, Facebook, Computer privacy; Cognitive aspect of human-computer system; Interaction design; User interface; Software engineering, Computer science, Psychology People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker for agility, the frequency in which people update their audience selection when posting information in online social networks, and evaluate the factors that contribute to the variability of agility between different users. We analyzed the posting behavior of Facebook 181 participants, as well as their answers to open and close questions. We find that frequent changes in privacy settings are correlated with high social privacy and with institutional privacy concerns, whereas social concerns were found to be more prominent. Agility was negatively correlated with low public sharing. Our findings show that users use privacy settings to effectively mitigate privacy concerns and desires for creating and strengthening social connections. We discuss how agility can be used to design and to evaluate new user interfaces for managing privacy in social settings. People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker for agility, the frequency in which people update their audience selection when posting information in online social networks, and evaluate the factors that contribute to the variability of agility between different users. We analyzed the posting behavior of Facebook 181 participants, as well as their answers to open and close questions. We find that frequent changes in privacy settings are correlated with high social privacy and with institutional privacy concerns, whereas social concerns were found to be more prominent. Agility was negatively correlated with low public sharing. Our findings show that users use privacy settings to effectively mitigate privacy concerns and desires for creating and strengthening social connections. We discuss how agility can be used to design and to evaluate new user interfaces for managing privacy in social settings.People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker for agility, the frequency in which people update their audience selection when posting information in online social networks, and evaluate the factors that contribute to the variability of agility between different users. We analyzed the posting behavior of Facebook 181 participants, as well as their answers to open and close questions. We find that frequent changes in privacy settings are correlated with high social privacy and with institutional privacy concerns, whereas social concerns were found to be more prominent. Agility was negatively correlated with low public sharing. Our findings show that users use privacy settings to effectively mitigate privacy concerns and desires for creating and strengthening social connections. We discuss how agility can be used to design and to evaluate new user interfaces for managing privacy in social settings. People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we suggest a model that offers new insights into the relationship between perceptions and actual behaviors. We define a quantitative marker for agility, the frequency in which people update their audience selection when posting information in online social networks, and evaluate the factors that contribute to the variability of agility between different users. We analyzed the posting behavior of Facebook 181 participants, as well as their answers to open and close questions. We find that frequent changes in privacy settings are correlated with high social privacy and with institutional privacy concerns, whereas social concerns were found to be more prominent. Agility was negatively correlated with low public sharing. Our findings show that users use privacy settings to effectively mitigate privacy concerns and desires for creating and strengthening social connections. We discuss how agility can be used to design and to evaluate new user interfaces for managing privacy in social settings. Privacy, Online social networks, Privacy controls, Social capital, Behavior analysis, Boundary regulation theory, Facebook, Computer privacy; Cognitive aspect of human-computer system; Interaction design; User interface; Software engineering, Computer science, Psychology |
| ArticleNumber | e03298 |
| Author | Hirschprung, Ron Toch, Eran Mendel, Tamir Schwartz-Chassidim, Hadas Ayalon, Oshrat |
| AuthorAffiliation | b Software Engineering Department, Shamoon College of Engineering, Beer Sheva, Israel c Faculty of Engineering, Ariel University, Ariel, Israel a Department of Industrial Engineering, Tel Aviv University, Tel Aviv, Israel |
| AuthorAffiliation_xml | – name: a Department of Industrial Engineering, Tel Aviv University, Tel Aviv, Israel – name: c Faculty of Engineering, Ariel University, Ariel, Israel – name: b Software Engineering Department, Shamoon College of Engineering, Beer Sheva, Israel |
| Author_xml | – sequence: 1 givenname: Hadas surname: Schwartz-Chassidim fullname: Schwartz-Chassidim, Hadas email: hadasch@ac.sce.ac.il organization: Department of Industrial Engineering, Tel Aviv University, Tel Aviv, Israel – sequence: 2 givenname: Oshrat orcidid: 0000-0002-5905-9838 surname: Ayalon fullname: Ayalon, Oshrat organization: Department of Industrial Engineering, Tel Aviv University, Tel Aviv, Israel – sequence: 3 givenname: Tamir surname: Mendel fullname: Mendel, Tamir organization: Department of Industrial Engineering, Tel Aviv University, Tel Aviv, Israel – sequence: 4 givenname: Ron surname: Hirschprung fullname: Hirschprung, Ron organization: Faculty of Engineering, Ariel University, Ariel, Israel – sequence: 5 givenname: Eran orcidid: 0000-0001-6939-5870 surname: Toch fullname: Toch, Eran organization: Department of Industrial Engineering, Tel Aviv University, Tel Aviv, Israel |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/32055733$$D View this record in MEDLINE/PubMed |
| BookMark | eNqFkktvEzEUhUeoiD7oTwB5yaIJfs54QAKhikelSiyAteWx7yQOjh1sJyj_vg5Jq5ZNVrbscz4d-57z5iTEAE3ziuApwaR9u5jOwbttDFOKKZ4CZrSXz5ozyrGYSM7xyaP9aXOZ8wJjTIRs-469aE4ZxUJ0jJ018Qd4MMVtXNkiF9Aq5uLCDMWAcjROexSg_I3pd36HyhxQih5QHNEquY02W2RiMJBCvrqXG71yRfsrpINFBcw8OFOPvSuQquFl83zUPsPlYb1ofn35_PP62-T2-9eb60-3EyPatkykJJxh6PRAx6HrqZSCYCYtNUITTDvBJDOjhr5viWWdZb3lgpJRaq7lKAd20dzsuTbqhapplzptVdRO_TuIaaZ0Ks54UN3QcTmakQk7cN7yYQArqGatAWkx0Mr6sGet1sMSrIFQkvZPoE9vgpurWdyoDmPBmaiANwdAin_WkItaumzAex0grrOignLa9rhlx6VMiJ71mO9ivX4c6yHP_XCrQOwFJsWcE4wPEoLVrkdqoQ49UrseqX2Pqu_9fz5TR1pc3L3O-aPuj3s31PFuHCSVjYPaEutSbVr9f3eEcAf4Kui- |
| CitedBy_id | crossref_primary_10_1016_j_comcom_2021_04_012 crossref_primary_10_1109_TAI_2021_3064901 crossref_primary_10_1016_j_techsoc_2021_101840 crossref_primary_10_3390_bs13100829 crossref_primary_10_1177_1461444820974955 crossref_primary_10_1108_INTR_09_2022_0745 crossref_primary_10_1007_s00146_023_01690_5 crossref_primary_10_1016_j_heliyon_2020_e05710 crossref_primary_10_1016_j_heliyon_2022_e10146 crossref_primary_10_1016_j_osnem_2022_100203 crossref_primary_10_1109_TEM_2021_3092702 crossref_primary_10_3390_app14177874 |
| Cites_doi | 10.1016/j.im.2017.01.001 10.1108/IntR-09-2013-0192 10.1089/cyber.2017.0709 10.1016/j.chb.2010.10.017 10.1016/j.ijhcs.2013.09.002 10.1016/j.chb.2014.11.076 10.1177/1461444815588902 10.1016/j.chb.2014.03.010 10.1111/j.1083-6101.2009.01494.x 10.1016/j.im.2015.07.010 10.1016/j.chb.2013.01.049 10.1016/j.cose.2014.10.012 10.1016/j.chb.2016.12.042 10.1111/j.1083-6101.2006.00029.x 10.1177/0190272516628298 10.1089/cyber.2014.0456 10.1080/08838151.2015.1127245 10.1177/1461444816660731 10.1086/228943 10.1080/0144929X.2010.550063 10.1016/j.chb.2012.11.022 10.1108/10662241211214575 10.1016/j.chb.2016.12.048 10.1126/science.aaa1465 10.1111/jcc4.12163 10.1016/j.cose.2015.07.002 10.1002/ejsp.2049 10.1177/1461444811405805 10.1177/0963721414531598 10.1080/00224545.2014.914881 10.24251/HICSS.2017.241 10.1177/1461444815605454 10.1111/j.1083-6101.2007.00367.x 10.1287/isre.1040.0032 10.1057/ejis.2012.23 10.1016/j.tele.2017.04.013 |
| ContentType | Journal Article |
| Copyright | 2020 The Authors 2020 Published by Elsevier Ltd. 2020 Published by Elsevier Ltd. 2020 |
| Copyright_xml | – notice: 2020 The Authors – notice: 2020 Published by Elsevier Ltd. – notice: 2020 Published by Elsevier Ltd. 2020 |
| DBID | 6I. AAFTH AAYXX CITATION NPM 7X8 7S9 L.6 5PM DOA |
| DOI | 10.1016/j.heliyon.2020.e03298 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef PubMed MEDLINE - Academic AGRICOLA AGRICOLA - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed MEDLINE - Academic AGRICOLA AGRICOLA - Academic |
| DatabaseTitleList | AGRICOLA MEDLINE - Academic PubMed |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Medicine Psychology Computer Science |
| EISSN | 2405-8440 |
| ExternalDocumentID | oai_doaj_org_article_7b748fcf35db4464bbed52a36ce8d0e2 PMC7005435 32055733 10_1016_j_heliyon_2020_e03298 S2405844020301432 |
| Genre | Journal Article |
| GroupedDBID | 0R~ 457 53G 5VS 6I. AAEDW AAFTH AAFWJ AALRI AAYWO ABMAC ACGFS ACLIJ ACVFH ADBBV ADCNI ADEZE ADVLN AEUPX AEXQZ AFJKZ AFPKN AFPUW AFTJW AGHFR AIGII AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ AOIJS APXCP BAWUL BCNDV DIK EBS EJD FDB GROUPED_DOAJ HYE IPNFZ KQ8 M~E O9- OK1 RIG ROL RPM SSZ AAYXX CITATION 0SF AACTN NCXOZ NPM 7X8 7S9 L.6 5PM |
| ID | FETCH-LOGICAL-c566t-881430e7ab2fb7928851038d2c5a10275383cfae9961d37d39d4521f8a4a8f8b3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 18 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000518367800026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2405-8440 |
| IngestDate | Fri Oct 03 12:51:02 EDT 2025 Tue Sep 30 16:53:09 EDT 2025 Thu Oct 02 11:46:58 EDT 2025 Fri Jul 11 09:58:57 EDT 2025 Thu Jan 02 22:59:58 EST 2025 Thu Nov 20 00:39:56 EST 2025 Tue Nov 18 20:56:39 EST 2025 Wed Dec 10 14:22:56 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Boundary regulation theory Psychology Behavior analysis Social capital Privacy controls Computer science Privacy User interface Interaction design Cognitive aspect of human-computer system Computer privacy Online social networks Software engineering |
| Language | English |
| License | This is an open access article under the CC BY license. 2020 Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c566t-881430e7ab2fb7928851038d2c5a10275383cfae9961d37d39d4521f8a4a8f8b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ORCID | 0000-0001-6939-5870 0000-0002-5905-9838 |
| OpenAccessLink | https://doaj.org/article/7b748fcf35db4464bbed52a36ce8d0e2 |
| PMID | 32055733 |
| PQID | 2355939042 |
| PQPubID | 23479 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_7b748fcf35db4464bbed52a36ce8d0e2 pubmedcentral_primary_oai_pubmedcentral_nih_gov_7005435 proquest_miscellaneous_2524269063 proquest_miscellaneous_2355939042 pubmed_primary_32055733 crossref_primary_10_1016_j_heliyon_2020_e03298 crossref_citationtrail_10_1016_j_heliyon_2020_e03298 elsevier_sciencedirect_doi_10_1016_j_heliyon_2020_e03298 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-02-01 |
| PublicationDateYYYYMMDD | 2020-02-01 |
| PublicationDate_xml | – month: 02 year: 2020 text: 2020-02-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | England |
| PublicationPlace_xml | – name: England |
| PublicationTitle | Heliyon |
| PublicationTitleAlternate | Heliyon |
| PublicationYear | 2020 |
| Publisher | Elsevier Ltd Elsevier |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
| References | Stutzman, Hartzog (bib71) 2012 James, Warkentin, Collignon (bib37) 2015; 52 Matei, Bruno, Morris (bib55) 2015 Stutzman, Capra, Thompson (bib69) 2011; 27 Cheung, Lee, Chan (bib14) 2015; 25 Saeri, Ogilvie, La Macchia, Smith, Louis (bib65) 2014; 154 Wisniewski, Islam, Knijnenburg, Patil (bib83) 2015 Hair, Black, Babin, Anderson, Tatham (bib28) 2006; 6 Hargittai, Litt (bib30) 2011; 13 Hodkinson (bib34) 2017; 19 Dong, Jin, Knijnenburg (bib23) 2015 Li, Gui, Chen, Xu, Kobsa (bib50) 2018; 2 Min, Kim (bib57) 2014 Poikela, Toch (bib60) 2017 Stutzman, Vitak, Ellison, Gray, Lampe (bib73) 2012 De Wolf, Willaert, Pierson (bib17) 2014; 35 Chen, Chen (bib13) 2015; 18 Harrell (bib32) 2015 James, Wallace, Warkentin, Kim, Collignon (bib36) 2017; 54 Kelley (bib44) 2010 Wilson, Valacich (bib82) 2012 Ellison, Steinfield, Lampe (bib25) 2007; 12 Taddei, Contena (bib74) 2013; 29 Braunstein, Granka, Staddon (bib8) 2011 Praveena, Smys (bib61) 2016; 5 Kairam, Brzozowski, Huffaker, Chi (bib41) 2012 Stutzman, Kramer-Duffield (bib72) 2010 Acquisti, Gross (bib1) 2006 Hampton, Goulet, Marlow, Rainie (bib29) 2012; 3 Hughes-Roberts (bib35) 2013 McCredie, Morey (bib56) 2018 Coleman (bib15) 1988 Dienlin, Metzger (bib20) 2016; 21 Dinev, Xu, Smith, Hart (bib22) 2013; 22 Hargittai, Marwick (bib31) 2016; 10 Perrin (bib59) 2015 Malhotra, Kim, Agarwal (bib54) 2004; 15 Wisniewski, Lipford, Wilson (bib85) 2012 Li, Li, Yan, Deng (bib51) 2015; 49 Cameron, Trivedi (bib11) 2013; 53 Burnham, Le, Piedmont (bib10) 2018 Utz (bib78) 2015; 45 Williams (bib81) 2006; 11 Johnston, Tanner, Lalla, Kawalski (bib39) 2013; 32 Acquisti, Grossklags (bib2) 2005; 2 Preibusch (bib62) 2013 Smith, Anderson (bib67) 2018; 1 Gruzd, Hernández-Garcı́a (bib27) 2018; 21 Chalklen, Anderson (bib12) 2017; 3 Athey, Catalini, Tucker (bib5) 2017 Acquisti, Brandimarte, Loewenstein (bib3) 2015; 347 Tsay-Vogel, Shanahan, Signorielli (bib77) 2018; 20 Stutzman, Gross, Acquisti (bib70) 2013; 4 Ayalon, Toch (bib6) 2019 Altman (bib4) 1975 Ellison, Vitak (bib24) 2015; 32 Kang, Brown, Dabbish, Kiesler (bib42) 2014 Litt, Hargittai (bib53) 2016 Teutsch, Niemann (bib76) 2015 Karr-Wisniewski, Wilson, Richter-Lipford (bib43) 2011 Confessore (bib16) 2018 Dey, Jelveh, Ross (bib19) 2012 Lampinen, Lehtinen, Lehmuskallio, Tamminen (bib49) 2011 Barth, De Jong (bib7) 2017; 34 Wisniewski, Knijnenburg, Richter Lipford (bib84) 2014 Dienlin, Trepte (bib21) 2015; 45 Jeong, Kim (bib38) 2017; 69 Kokolakis (bib45) 2017; 64 Krasnova, Günther, Spiekermann, Koroleva (bib46) 2009; 2 Watson, Besmer, Lipford (bib80) 2012 Debatin, Lovejoy, Horn, Hughes (bib18) 2009; 15 Utz, Krämer (bib79) 2009; 3 Hirschprung, Toch, Schwartz-Chassidim, Mendel, Maimon (bib33) 2017; 8 Jordaan, Van Heerden (bib40) 2017; 70 Brenner, DeLamater (bib9) 2016; 79 Skeels, Grudin (bib66) 2009 Quinn (bib63) 2016; 60 Stutzman (bib68) 2006; 3 Raynes-Goldie (bib64) 2010; 15 Tan, Qin, Kim, Hsu (bib75) 2012; 22 Litt (bib52) 2013; 29 Krasnova, Spiekermann, Koroleva, Hildebrand (bib47) 2010; 25 Ellison, Vitak, Steinfield, Gray, Lampe (bib26) 2011 Lambert (bib48) 2016; 18 Paolacci, Chandler (bib58) 2014; 23 Cameron (10.1016/j.heliyon.2020.e03298_bib11) 2013; 53 Poikela (10.1016/j.heliyon.2020.e03298_bib60) 2017 Jeong (10.1016/j.heliyon.2020.e03298_bib38) 2017; 69 Li (10.1016/j.heliyon.2020.e03298_bib51) 2015; 49 Ellison (10.1016/j.heliyon.2020.e03298_bib26) 2011 Confessore (10.1016/j.heliyon.2020.e03298_bib16) 2018 Hughes-Roberts (10.1016/j.heliyon.2020.e03298_bib35) 2013 Stutzman (10.1016/j.heliyon.2020.e03298_bib71) 2012 Dong (10.1016/j.heliyon.2020.e03298_bib23) 2015 Hargittai (10.1016/j.heliyon.2020.e03298_bib30) 2011; 13 Stutzman (10.1016/j.heliyon.2020.e03298_bib70) 2013; 4 Praveena (10.1016/j.heliyon.2020.e03298_bib61) 2016; 5 Kairam (10.1016/j.heliyon.2020.e03298_bib41) 2012 Barth (10.1016/j.heliyon.2020.e03298_bib7) 2017; 34 James (10.1016/j.heliyon.2020.e03298_bib37) 2015; 52 McCredie (10.1016/j.heliyon.2020.e03298_bib56) 2018 Coleman (10.1016/j.heliyon.2020.e03298_bib15) 1988 Krasnova (10.1016/j.heliyon.2020.e03298_bib47) 2010; 25 Perrin (10.1016/j.heliyon.2020.e03298_bib59) 2015 Hampton (10.1016/j.heliyon.2020.e03298_bib29) 2012; 3 James (10.1016/j.heliyon.2020.e03298_bib36) 2017; 54 Kang (10.1016/j.heliyon.2020.e03298_bib42) 2014 Acquisti (10.1016/j.heliyon.2020.e03298_bib2) 2005; 2 Litt (10.1016/j.heliyon.2020.e03298_bib52) 2013; 29 Hair (10.1016/j.heliyon.2020.e03298_bib28) 2006; 6 Hargittai (10.1016/j.heliyon.2020.e03298_bib31) 2016; 10 Kokolakis (10.1016/j.heliyon.2020.e03298_bib45) 2017; 64 Dey (10.1016/j.heliyon.2020.e03298_bib19) 2012 Dienlin (10.1016/j.heliyon.2020.e03298_bib20) 2016; 21 Tan (10.1016/j.heliyon.2020.e03298_bib75) 2012; 22 Williams (10.1016/j.heliyon.2020.e03298_bib81) 2006; 11 Kelley (10.1016/j.heliyon.2020.e03298_bib44) 2010 Karr-Wisniewski (10.1016/j.heliyon.2020.e03298_bib43) 2011 Wisniewski (10.1016/j.heliyon.2020.e03298_bib84) 2014 Acquisti (10.1016/j.heliyon.2020.e03298_bib3) 2015; 347 Wilson (10.1016/j.heliyon.2020.e03298_bib82) 2012 Brenner (10.1016/j.heliyon.2020.e03298_bib9) 2016; 79 Paolacci (10.1016/j.heliyon.2020.e03298_bib58) 2014; 23 Utz (10.1016/j.heliyon.2020.e03298_bib78) 2015; 45 Stutzman (10.1016/j.heliyon.2020.e03298_bib68) 2006; 3 Gruzd (10.1016/j.heliyon.2020.e03298_bib27) 2018; 21 Utz (10.1016/j.heliyon.2020.e03298_bib79) 2009; 3 Hirschprung (10.1016/j.heliyon.2020.e03298_bib33) 2017; 8 Smith (10.1016/j.heliyon.2020.e03298_bib67) 2018; 1 Ayalon (10.1016/j.heliyon.2020.e03298_bib6) 2019 Jordaan (10.1016/j.heliyon.2020.e03298_bib40) 2017; 70 Raynes-Goldie (10.1016/j.heliyon.2020.e03298_bib64) 2010; 15 Altman (10.1016/j.heliyon.2020.e03298_bib4) 1975 Malhotra (10.1016/j.heliyon.2020.e03298_bib54) 2004; 15 Krasnova (10.1016/j.heliyon.2020.e03298_bib46) 2009; 2 Ellison (10.1016/j.heliyon.2020.e03298_bib24) 2015; 32 Wisniewski (10.1016/j.heliyon.2020.e03298_bib85) 2012 Hodkinson (10.1016/j.heliyon.2020.e03298_bib34) 2017; 19 De Wolf (10.1016/j.heliyon.2020.e03298_bib17) 2014; 35 Acquisti (10.1016/j.heliyon.2020.e03298_bib1) 2006 Johnston (10.1016/j.heliyon.2020.e03298_bib39) 2013; 32 Stutzman (10.1016/j.heliyon.2020.e03298_bib69) 2011; 27 Athey (10.1016/j.heliyon.2020.e03298_bib5) 2017 Dienlin (10.1016/j.heliyon.2020.e03298_bib21) 2015; 45 Chalklen (10.1016/j.heliyon.2020.e03298_bib12) 2017; 3 Ellison (10.1016/j.heliyon.2020.e03298_bib25) 2007; 12 Saeri (10.1016/j.heliyon.2020.e03298_bib65) 2014; 154 Skeels (10.1016/j.heliyon.2020.e03298_bib66) 2009 Litt (10.1016/j.heliyon.2020.e03298_bib53) 2016 Stutzman (10.1016/j.heliyon.2020.e03298_bib73) 2012 Lampinen (10.1016/j.heliyon.2020.e03298_bib49) 2011 Teutsch (10.1016/j.heliyon.2020.e03298_bib76) 2015 Harrell (10.1016/j.heliyon.2020.e03298_bib32) 2015 Stutzman (10.1016/j.heliyon.2020.e03298_bib72) 2010 Wisniewski (10.1016/j.heliyon.2020.e03298_bib83) 2015 Tsay-Vogel (10.1016/j.heliyon.2020.e03298_bib77) 2018; 20 Quinn (10.1016/j.heliyon.2020.e03298_bib63) 2016; 60 Matei (10.1016/j.heliyon.2020.e03298_bib55) 2015 Debatin (10.1016/j.heliyon.2020.e03298_bib18) 2009; 15 Watson (10.1016/j.heliyon.2020.e03298_bib80) 2012 Cheung (10.1016/j.heliyon.2020.e03298_bib14) 2015; 25 Dinev (10.1016/j.heliyon.2020.e03298_bib22) 2013; 22 Burnham (10.1016/j.heliyon.2020.e03298_bib10) 2018 Min (10.1016/j.heliyon.2020.e03298_bib57) 2014 Braunstein (10.1016/j.heliyon.2020.e03298_bib8) 2011 Taddei (10.1016/j.heliyon.2020.e03298_bib74) 2013; 29 Lambert (10.1016/j.heliyon.2020.e03298_bib48) 2016; 18 Li (10.1016/j.heliyon.2020.e03298_bib50) 2018; 2 Chen (10.1016/j.heliyon.2020.e03298_bib13) 2015; 18 Preibusch (10.1016/j.heliyon.2020.e03298_bib62) 2013 |
| References_xml | – start-page: 19 year: 2011 end-page: 32 ident: bib26 article-title: Negotiating privacy concerns and social capital needs in a social media environment publication-title: Privacy Online – volume: 27 start-page: 590 year: 2011 end-page: 598 ident: bib69 article-title: Factors mediating disclosure in social network sites publication-title: Comput. Hum. Behav. – volume: 3 year: 2012 ident: bib29 article-title: Why Most Facebook Users Get More than They Give publication-title: Pew Internet Am. Life Project – volume: 22 start-page: 211 year: 2012 end-page: 233 ident: bib75 article-title: Impact of privacy concern in social networking web sites publication-title: Internet Res. – start-page: 1065 year: 2012 end-page: 1074 ident: bib41 article-title: Talking in circles: selective sharing in google+ publication-title: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems – volume: 8 start-page: 57 year: 2017 ident: bib33 article-title: Analyzing and optimizing access control choice architectures in online social networks publication-title: ACM Trans. Intell. Syst. Technol. (TIST) – volume: 32 start-page: 24 year: 2013 end-page: 36 ident: bib39 article-title: Social capital: the benefit of Facebook `friends publication-title: Behav. Inf. Technol. – volume: 25 start-page: 279 year: 2015 end-page: 299 ident: bib14 article-title: Self-disclosure in social networking sites: the role of perceived cost, perceived benefits and social influence publication-title: Internet Res. – volume: 15 year: 2010 ident: bib64 publication-title: Aliases, Creeping, and wall Cleaning: Understanding Privacy in the Age of Facebook – volume: 60 start-page: 61 year: 2016 end-page: 86 ident: bib63 article-title: Why we share: a uses and gratifications approach to privacy regulation in social media use publication-title: J. Broadcast. Electron. Media – volume: 347 start-page: 509 year: 2015 end-page: 514 ident: bib3 article-title: Privacy and human behavior in the age of information publication-title: Science – start-page: 1 year: 2018 end-page: 11 ident: bib10 article-title: Who is Mturk? Personal characteristics and sample consistency of these online workers publication-title: Ment. Health Relig. Cult. – volume: 54 start-page: 851 year: 2017 end-page: 865 ident: bib36 article-title: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use publication-title: Inf. Manag. – volume: 15 start-page: 336 year: 2004 end-page: 355 ident: bib54 article-title: Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model publication-title: Inf. Syst. Res. – volume: 23 start-page: 184 year: 2014 end-page: 188 ident: bib58 article-title: Inside the turk understanding mechanical turk as a participant pool publication-title: Curr. Dir. Psychol. Sci. – start-page: 1488 year: 2016 end-page: 1500 ident: bib53 article-title: “Just cast the net, and hopefully the right fish swim into it”: audience management on social network sites publication-title: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing – start-page: 1 year: 2015 end-page: 20 ident: bib76 article-title: Social network sites as a threat to users’ self-determination and security: a framing analysis of German newspapers publication-title: J. Int. Commun. – volume: 2 start-page: 39 year: 2009 end-page: 63 ident: bib46 article-title: Privacy concerns and identity in online social networks publication-title: Identity Inf. Soc. – year: 2017 ident: bib5 article-title: The digital privacy paradox: small money, small costs, small talk publication-title: Tech. Rep. – volume: 18 start-page: 13 year: 2015 end-page: 19 ident: bib13 article-title: Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection publication-title: Cyberpsychol., Behav. Soc. Netw. – start-page: 769 year: 2012 end-page: 778 ident: bib71 article-title: Boundary regulation in social media publication-title: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, New York, NY, USA – start-page: S95 year: 1988 end-page: S120 ident: bib15 article-title: Social capital in the creation of human capital publication-title: Am. J. Sociol. – start-page: 609 year: 2012 end-page: 618 ident: bib85 article-title: Fighting for my space: coping mechanisms for SNS boundary regulation publication-title: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems – volume: 3 year: 2017 ident: bib12 article-title: Mothering on Facebook: exploring the privacy/openness paradox publication-title: Soc. Media+ Soc. – start-page: 346 year: 2012 end-page: 352 ident: bib19 article-title: Facebook users have become much more private: a large-scale study publication-title: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference – start-page: 3217 year: 2011 end-page: 3226 ident: bib49 article-title: We're in it together: interpersonal management of disclosure in social network services publication-title: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems – start-page: 1553 year: 2010 end-page: 1562 ident: bib72 article-title: Friends only: examining a privacy-enhancing behavior in facebook publication-title: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems – year: 2017 ident: bib60 article-title: Understanding the valuation of location privacy: a crowdsourcing-based approach publication-title: Proceedings of the 50th Hawaii International Conference on System Sciences – volume: 6 year: 2006 ident: bib28 publication-title: Multivariate Data Analysis – volume: 154 start-page: 352 year: 2014 end-page: 369 ident: bib65 article-title: Predicting Facebook users' online privacy protection: risk, trust, norm focus theory, and the theory of planned behavior publication-title: J. Soc. Psychol. – volume: 79 start-page: 333 year: 2016 end-page: 354 ident: bib9 article-title: Lies, damned lies, and survey self-reports? Identity as a cause of measurement bias publication-title: Soc. Psychol. Q. – year: 2012 ident: bib73 article-title: Privacy in interaction: exploring disclosure and social capital in facebook publication-title: ICWSM – year: 2014 ident: bib84 article-title: Profiling Facebook Users' Privacy Behaviors publication-title: SOUPS2014 Workshop on Privacy Personas and Segmentation – volume: 45 start-page: 1 year: 2015 end-page: 10 ident: bib78 article-title: The function of self-disclosure on social network sites: not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection publication-title: Comput. Hum. Behav. – volume: 2 start-page: 108 year: 2018 ident: bib50 article-title: When SNS privacy settings become granular: investigating users' choices, rationales, and influences on their social experience publication-title: Proceedings of the ACM on Human-Computer Interaction – year: 2015 ident: bib59 article-title: Social Media Usage: 2005-2015 – volume: 34 start-page: 1038 year: 2017 end-page: 1058 ident: bib7 article-title: The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review publication-title: Telematics Inf. – year: 2018 ident: bib16 article-title: Cambridge Analytica and Facebook: the Scandal and the Fallout So Far Kernel Description – volume: 3 start-page: 10 year: 2006 end-page: 18 ident: bib68 article-title: An evaluation of identity-sharing behavior in social network communities publication-title: J. Int. Digit. Media Arts Assoc. – volume: 29 start-page: 1649 year: 2013 end-page: 1656 ident: bib52 article-title: Understanding social network site users' privacy tool use publication-title: Comput. Hum. Behav. – year: 2019 ident: bib6 article-title: Evaluating users’ perceptions about a system’s privacy: differentiating social and institutional aspects publication-title: Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019) – volume: 49 start-page: 239 year: 2015 end-page: 254 ident: bib51 article-title: Privacy leakage analysis in online social networks publication-title: Comput. Secur. – volume: 15 start-page: 83 year: 2009 end-page: 108 ident: bib18 article-title: Facebook and online privacy: attitudes, behaviors, and unintended consequences publication-title: J. Computer-Mediated Commun. – volume: 22 start-page: 295 year: 2013 end-page: 316 ident: bib22 article-title: Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts publication-title: Eur. J. Inf. Syst. – volume: 10 start-page: 21 year: 2016 ident: bib31 article-title: “What can I really do?” Explaining the privacy paradox with online apathy publication-title: Int. J. Commun. – year: 2015 ident: bib32 article-title: Regression Modeling Strategies: with Applications to Linear Models, Logistic and Ordinal Regression, and Survival Analysis – volume: 2 start-page: 24 year: 2005 end-page: 30 ident: bib2 article-title: Privacy and rationality in individual decision making publication-title: IEEE Secur. Priv. – volume: 19 start-page: 272 year: 2017 end-page: 288 ident: bib34 article-title: Bedrooms and beyond: youth, identity and privacy on social network sites publication-title: New Media Soc. – volume: 52 start-page: 893 year: 2015 end-page: 908 ident: bib37 article-title: A dual privacy decision model for online social networks publication-title: Inf. Manag. – year: 2014 ident: bib57 article-title: How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost publication-title: J. Assoc. Inf. Sci. Technol. – volume: 64 start-page: 122 year: 2017 end-page: 134 ident: bib45 article-title: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon publication-title: Comput. Secur. – volume: 69 start-page: 302 year: 2017 end-page: 310 ident: bib38 article-title: Privacy concerns on social networking sites: interplay among posting types, content, and audiences publication-title: Comput. Hum. Behav. – year: 2012 ident: bib82 article-title: Unpacking the Privacy Paradox: Irrational Decision-Making within the Privacy Calculus – volume: 70 start-page: 90 year: 2017 end-page: 96 ident: bib40 article-title: Online privacy-related predictors of Facebook usage intensity publication-title: Comput. Hum. Behav. – volume: 1 year: 2018 ident: bib67 publication-title: Social media Use in 2018 – volume: 45 start-page: 285 year: 2015 end-page: 297 ident: bib21 article-title: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors publication-title: Eur. J. Soc. Psychol. – start-page: 1427 year: 2015 end-page: 1441 ident: bib83 article-title: Give social network users the privacy they want publication-title: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing – year: 2013 ident: bib62 article-title: Guide to measuring privacy concern: review of survey and observational instruments publication-title: Int. J. Hum. Comput. Stud. – volume: 53 year: 2013 ident: bib11 publication-title: Regression Analysis of Count Data – volume: 32 start-page: 205 year: 2015 ident: bib24 article-title: Social network site affordances and their relationship to social capital processes publication-title: Handb. Psychol. Commun. Technol. – volume: 13 start-page: 824 year: 2011 end-page: 842 ident: bib30 article-title: The tweet smell of celebrity success: explaining variation in Twitter adoption among a diverse group of young adults publication-title: New Media Soc. – volume: 35 start-page: 444 year: 2014 end-page: 454 ident: bib17 article-title: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook publication-title: Comput. Hum. Behav. – year: 2010 ident: bib44 article-title: Conducting usable privacy & security studies with amazon's mechanical turk publication-title: Symposium on Usable Privacy and Security (SOUPS)(Redmond, WA) – volume: 25 start-page: 109 year: 2010 end-page: 125 ident: bib47 article-title: Online social networks: why we disclose publication-title: J. Inf. Technol. – volume: 3 start-page: 2 year: 2009 ident: bib79 article-title: The privacy paradox on social network sites revisited: the role of individual characteristics and group norms publication-title: Cyberpsychology: J. Psychosoc. Res. Cyberspace – volume: 11 start-page: 593 year: 2006 end-page: 628 ident: bib81 article-title: On and off the Net: scales for social capital in an online era publication-title: J. Computer-Mediated Commun. – volume: 29 start-page: 821 year: 2013 end-page: 826 ident: bib74 article-title: Privacy, trust and control: which relationships with online self-disclosure? publication-title: Comput. Hum. Behav. – year: 1975 ident: bib4 article-title: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding – volume: 21 start-page: 368 year: 2016 end-page: 383 ident: bib20 article-title: An extended privacy calculus model for SNSs: analyzing self-disclosure and self-withdrawal in a representative US sample publication-title: J. Computer-Mediated Commun. – volume: 18 start-page: 2559 year: 2016 end-page: 2575 ident: bib48 article-title: Intimacy and social capital on Facebook: beyond the psychological perspective publication-title: New Media Soc. – start-page: 36 year: 2006 end-page: 58 ident: bib1 article-title: Imagined communities: awareness, information sharing, and privacy on the Facebook publication-title: International workshop on privacy enhancing technologies – volume: 12 start-page: 1143 year: 2007 end-page: 1168 ident: bib25 article-title: The benefits of Facebook “friends:” Social capital and college students' use of online social network sites publication-title: J. Computer-Mediated Commun. – year: 2018 ident: bib56 article-title: Who Are the Turkers? A Characterization of MTurk Workers Using the Personality Assessment Inventory – year: 2011 ident: bib43 article-title: A new social order: mechanisms for social network site boundary regulation publication-title: Americas Conference on Information Systems, AMCIS – start-page: 109 year: 2015 end-page: 123 ident: bib55 article-title: Visible effort: visualizing and measuring group structuration through social entropy publication-title: Transparency in Social Media – start-page: 15 year: 2011 ident: bib8 article-title: Indirect content privacy surveys: measuring privacy without asking about it publication-title: Proceedings of the Seventh Symposium on Usable Privacy and Security – start-page: 909 year: 2013 end-page: 912 ident: bib35 article-title: Privacy and social networks: is concern a valid indicator of intention and behaviour? publication-title: Social Computing (SocialCom), 2013 International Conference – start-page: 12 year: 2012 ident: bib80 article-title: Your circles: sharing behavior on Google publication-title: Proceedings of the Eighth Symposium on Usable Privacy and Security – volume: 4 start-page: 2 year: 2013 ident: bib70 article-title: Silent listeners: the evolution of privacy and disclosure on Facebook publication-title: J. Priv. Confidentiality – volume: 20 start-page: 141 year: 2018 end-page: 161 ident: bib77 article-title: Social media cultivating perceptions of privacy: a 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users publication-title: New Media Soc. – volume: 5 start-page: 15912 year: 2016 end-page: 15918 ident: bib61 article-title: Anonymization in social networks: a survey on the issues of data privacy in social network sites publication-title: J. Int. J. Eng. Comput. Sci. – volume: 21 start-page: 418 year: 2018 end-page: 428 ident: bib27 article-title: Privacy concerns and self-disclosure in private and public uses of social media publication-title: Cyberpsychol., Behav. Soc. Netw. – start-page: 91 year: 2015 end-page: 100 ident: bib23 article-title: Predicting Privacy Behavior on Online Social Networks – year: 2014 ident: bib42 article-title: Privacy attitudes of mechanical turk workers and the us public publication-title: Symposium on Usable Privacy and Security (SOUPS) – start-page: 95 year: 2009 end-page: 104 ident: bib66 article-title: When social networks cross boundaries: a case study of workplace use of facebook and linkedin publication-title: Proceedings of the ACM 2009 International Conference on Supporting Group Work – year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib16 – volume: 54 start-page: 851 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib36 article-title: Exposing others’ information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use publication-title: Inf. Manag. doi: 10.1016/j.im.2017.01.001 – volume: 6 year: 2006 ident: 10.1016/j.heliyon.2020.e03298_bib28 – volume: 25 start-page: 279 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib14 article-title: Self-disclosure in social networking sites: the role of perceived cost, perceived benefits and social influence publication-title: Internet Res. doi: 10.1108/IntR-09-2013-0192 – volume: 21 start-page: 418 year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib27 article-title: Privacy concerns and self-disclosure in private and public uses of social media publication-title: Cyberpsychol., Behav. Soc. Netw. doi: 10.1089/cyber.2017.0709 – start-page: 3217 year: 2011 ident: 10.1016/j.heliyon.2020.e03298_bib49 article-title: We're in it together: interpersonal management of disclosure in social network services – start-page: 769 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib71 article-title: Boundary regulation in social media – start-page: 1553 year: 2010 ident: 10.1016/j.heliyon.2020.e03298_bib72 article-title: Friends only: examining a privacy-enhancing behavior in facebook – volume: 2 start-page: 108 year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib50 article-title: When SNS privacy settings become granular: investigating users' choices, rationales, and influences on their social experience – volume: 27 start-page: 590 year: 2011 ident: 10.1016/j.heliyon.2020.e03298_bib69 article-title: Factors mediating disclosure in social network sites publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2010.10.017 – year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib73 article-title: Privacy in interaction: exploring disclosure and social capital in facebook publication-title: ICWSM – year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib62 article-title: Guide to measuring privacy concern: review of survey and observational instruments publication-title: Int. J. Hum. Comput. Stud. doi: 10.1016/j.ijhcs.2013.09.002 – volume: 45 start-page: 1 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib78 article-title: The function of self-disclosure on social network sites: not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2014.11.076 – volume: 2 start-page: 39 year: 2009 ident: 10.1016/j.heliyon.2020.e03298_bib46 article-title: Privacy concerns and identity in online social networks publication-title: Identity Inf. Soc. – volume: 18 start-page: 2559 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib48 article-title: Intimacy and social capital on Facebook: beyond the psychological perspective publication-title: New Media Soc. doi: 10.1177/1461444815588902 – volume: 2 start-page: 24 year: 2005 ident: 10.1016/j.heliyon.2020.e03298_bib2 article-title: Privacy and rationality in individual decision making publication-title: IEEE Secur. Priv. – start-page: 1065 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib41 article-title: Talking in circles: selective sharing in google+ – year: 2019 ident: 10.1016/j.heliyon.2020.e03298_bib6 article-title: Evaluating users’ perceptions about a system’s privacy: differentiating social and institutional aspects – volume: 35 start-page: 444 year: 2014 ident: 10.1016/j.heliyon.2020.e03298_bib17 article-title: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2014.03.010 – year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib56 – start-page: 91 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib23 – volume: 15 start-page: 83 year: 2009 ident: 10.1016/j.heliyon.2020.e03298_bib18 article-title: Facebook and online privacy: attitudes, behaviors, and unintended consequences publication-title: J. Computer-Mediated Commun. doi: 10.1111/j.1083-6101.2009.01494.x – volume: 10 start-page: 21 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib31 article-title: “What can I really do?” Explaining the privacy paradox with online apathy publication-title: Int. J. Commun. – start-page: 36 year: 2006 ident: 10.1016/j.heliyon.2020.e03298_bib1 article-title: Imagined communities: awareness, information sharing, and privacy on the Facebook – volume: 3 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib29 article-title: Why Most Facebook Users Get More than They Give publication-title: Pew Internet Am. Life Project – volume: 52 start-page: 893 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib37 article-title: A dual privacy decision model for online social networks publication-title: Inf. Manag. doi: 10.1016/j.im.2015.07.010 – start-page: 909 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib35 article-title: Privacy and social networks: is concern a valid indicator of intention and behaviour? – volume: 29 start-page: 1649 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib52 article-title: Understanding social network site users' privacy tool use publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2013.01.049 – volume: 15 year: 2010 ident: 10.1016/j.heliyon.2020.e03298_bib64 – volume: 49 start-page: 239 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib51 article-title: Privacy leakage analysis in online social networks publication-title: Comput. Secur. doi: 10.1016/j.cose.2014.10.012 – volume: 32 start-page: 205 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib24 article-title: Social network site affordances and their relationship to social capital processes publication-title: Handb. Psychol. Commun. Technol. – volume: 69 start-page: 302 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib38 article-title: Privacy concerns on social networking sites: interplay among posting types, content, and audiences publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2016.12.042 – volume: 11 start-page: 593 year: 2006 ident: 10.1016/j.heliyon.2020.e03298_bib81 article-title: On and off the Net: scales for social capital in an online era publication-title: J. Computer-Mediated Commun. doi: 10.1111/j.1083-6101.2006.00029.x – start-page: 346 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib19 article-title: Facebook users have become much more private: a large-scale study – volume: 79 start-page: 333 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib9 article-title: Lies, damned lies, and survey self-reports? Identity as a cause of measurement bias publication-title: Soc. Psychol. Q. doi: 10.1177/0190272516628298 – volume: 3 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib12 article-title: Mothering on Facebook: exploring the privacy/openness paradox publication-title: Soc. Media+ Soc. – year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib59 – volume: 18 start-page: 13 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib13 article-title: Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection publication-title: Cyberpsychol., Behav. Soc. Netw. doi: 10.1089/cyber.2014.0456 – year: 2014 ident: 10.1016/j.heliyon.2020.e03298_bib57 article-title: How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost publication-title: J. Assoc. Inf. Sci. Technol. – start-page: 95 year: 2009 ident: 10.1016/j.heliyon.2020.e03298_bib66 article-title: When social networks cross boundaries: a case study of workplace use of facebook and linkedin – volume: 60 start-page: 61 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib63 article-title: Why we share: a uses and gratifications approach to privacy regulation in social media use publication-title: J. Broadcast. Electron. Media doi: 10.1080/08838151.2015.1127245 – volume: 20 start-page: 141 year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib77 article-title: Social media cultivating perceptions of privacy: a 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users publication-title: New Media Soc. doi: 10.1177/1461444816660731 – year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib82 – start-page: S95 year: 1988 ident: 10.1016/j.heliyon.2020.e03298_bib15 article-title: Social capital in the creation of human capital publication-title: Am. J. Sociol. doi: 10.1086/228943 – volume: 32 start-page: 24 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib39 article-title: Social capital: the benefit of Facebook `friends publication-title: Behav. Inf. Technol. doi: 10.1080/0144929X.2010.550063 – volume: 29 start-page: 821 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib74 article-title: Privacy, trust and control: which relationships with online self-disclosure? publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2012.11.022 – volume: 22 start-page: 211 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib75 article-title: Impact of privacy concern in social networking web sites publication-title: Internet Res. doi: 10.1108/10662241211214575 – start-page: 109 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib55 article-title: Visible effort: visualizing and measuring group structuration through social entropy – volume: 70 start-page: 90 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib40 article-title: Online privacy-related predictors of Facebook usage intensity publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2016.12.048 – volume: 5 start-page: 15912 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib61 article-title: Anonymization in social networks: a survey on the issues of data privacy in social network sites publication-title: J. Int. J. Eng. Comput. Sci. – volume: 3 start-page: 10 year: 2006 ident: 10.1016/j.heliyon.2020.e03298_bib68 article-title: An evaluation of identity-sharing behavior in social network communities publication-title: J. Int. Digit. Media Arts Assoc. – year: 2014 ident: 10.1016/j.heliyon.2020.e03298_bib42 article-title: Privacy attitudes of mechanical turk workers and the us public – start-page: 609 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib85 article-title: Fighting for my space: coping mechanisms for SNS boundary regulation – volume: 347 start-page: 509 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib3 article-title: Privacy and human behavior in the age of information publication-title: Science doi: 10.1126/science.aaa1465 – volume: 21 start-page: 368 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib20 article-title: An extended privacy calculus model for SNSs: analyzing self-disclosure and self-withdrawal in a representative US sample publication-title: J. Computer-Mediated Commun. doi: 10.1111/jcc4.12163 – volume: 64 start-page: 122 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib45 article-title: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon publication-title: Comput. Secur. doi: 10.1016/j.cose.2015.07.002 – year: 1975 ident: 10.1016/j.heliyon.2020.e03298_bib4 – volume: 45 start-page: 285 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib21 article-title: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors publication-title: Eur. J. Soc. Psychol. doi: 10.1002/ejsp.2049 – volume: 13 start-page: 824 year: 2011 ident: 10.1016/j.heliyon.2020.e03298_bib30 article-title: The tweet smell of celebrity success: explaining variation in Twitter adoption among a diverse group of young adults publication-title: New Media Soc. doi: 10.1177/1461444811405805 – volume: 25 start-page: 109 year: 2010 ident: 10.1016/j.heliyon.2020.e03298_bib47 article-title: Online social networks: why we disclose publication-title: J. Inf. Technol. – start-page: 12 year: 2012 ident: 10.1016/j.heliyon.2020.e03298_bib80 article-title: Your circles: sharing behavior on Google – year: 2011 ident: 10.1016/j.heliyon.2020.e03298_bib43 article-title: A new social order: mechanisms for social network site boundary regulation – start-page: 1427 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib83 article-title: Give social network users the privacy they want – volume: 23 start-page: 184 year: 2014 ident: 10.1016/j.heliyon.2020.e03298_bib58 article-title: Inside the turk understanding mechanical turk as a participant pool publication-title: Curr. Dir. Psychol. Sci. doi: 10.1177/0963721414531598 – volume: 154 start-page: 352 year: 2014 ident: 10.1016/j.heliyon.2020.e03298_bib65 article-title: Predicting Facebook users' online privacy protection: risk, trust, norm focus theory, and the theory of planned behavior publication-title: J. Soc. Psychol. doi: 10.1080/00224545.2014.914881 – start-page: 1 year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib76 article-title: Social network sites as a threat to users’ self-determination and security: a framing analysis of German newspapers publication-title: J. Int. Commun. – year: 2010 ident: 10.1016/j.heliyon.2020.e03298_bib44 article-title: Conducting usable privacy & security studies with amazon's mechanical turk – year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib60 article-title: Understanding the valuation of location privacy: a crowdsourcing-based approach doi: 10.24251/HICSS.2017.241 – year: 2014 ident: 10.1016/j.heliyon.2020.e03298_bib84 article-title: Profiling Facebook Users' Privacy Behaviors – volume: 19 start-page: 272 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib34 article-title: Bedrooms and beyond: youth, identity and privacy on social network sites publication-title: New Media Soc. doi: 10.1177/1461444815605454 – volume: 8 start-page: 57 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib33 article-title: Analyzing and optimizing access control choice architectures in online social networks publication-title: ACM Trans. Intell. Syst. Technol. (TIST) – volume: 53 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib11 – year: 2015 ident: 10.1016/j.heliyon.2020.e03298_bib32 – start-page: 1488 year: 2016 ident: 10.1016/j.heliyon.2020.e03298_bib53 article-title: “Just cast the net, and hopefully the right fish swim into it”: audience management on social network sites – volume: 12 start-page: 1143 year: 2007 ident: 10.1016/j.heliyon.2020.e03298_bib25 article-title: The benefits of Facebook “friends:” Social capital and college students' use of online social network sites publication-title: J. Computer-Mediated Commun. doi: 10.1111/j.1083-6101.2007.00367.x – start-page: 19 year: 2011 ident: 10.1016/j.heliyon.2020.e03298_bib26 article-title: Negotiating privacy concerns and social capital needs in a social media environment – volume: 1 year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib67 – volume: 4 start-page: 2 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib70 article-title: Silent listeners: the evolution of privacy and disclosure on Facebook publication-title: J. Priv. Confidentiality – year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib5 article-title: The digital privacy paradox: small money, small costs, small talk – start-page: 15 year: 2011 ident: 10.1016/j.heliyon.2020.e03298_bib8 article-title: Indirect content privacy surveys: measuring privacy without asking about it – volume: 15 start-page: 336 year: 2004 ident: 10.1016/j.heliyon.2020.e03298_bib54 article-title: Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model publication-title: Inf. Syst. Res. doi: 10.1287/isre.1040.0032 – volume: 22 start-page: 295 year: 2013 ident: 10.1016/j.heliyon.2020.e03298_bib22 article-title: Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts publication-title: Eur. J. Inf. Syst. doi: 10.1057/ejis.2012.23 – volume: 3 start-page: 2 year: 2009 ident: 10.1016/j.heliyon.2020.e03298_bib79 article-title: The privacy paradox on social network sites revisited: the role of individual characteristics and group norms publication-title: Cyberpsychology: J. Psychosoc. Res. Cyberspace – volume: 34 start-page: 1038 year: 2017 ident: 10.1016/j.heliyon.2020.e03298_bib7 article-title: The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review publication-title: Telematics Inf. doi: 10.1016/j.tele.2017.04.013 – start-page: 1 year: 2018 ident: 10.1016/j.heliyon.2020.e03298_bib10 article-title: Who is Mturk? Personal characteristics and sample consistency of these online workers publication-title: Ment. Health Relig. Cult. |
| SSID | ssj0001586973 |
| Score | 2.2831967 |
| Snippet | People's posting behaviors in social networks was perceived as ambiguous, with concerns misaligned with people's public postings. To address this gap, we... |
| SourceID | doaj pubmedcentral proquest pubmed crossref elsevier |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | e03298 |
| SubjectTerms | Behavior analysis Boundary regulation theory Cognitive aspect of human-computer system Computer privacy Computer science Interaction design literacy Online social networks people Privacy Privacy controls Psychology Social capital Software engineering User interface |
| Title | Selectivity in posting on social networks: the role of privacy concerns, social capital, and technical literacy |
| URI | https://dx.doi.org/10.1016/j.heliyon.2020.e03298 https://www.ncbi.nlm.nih.gov/pubmed/32055733 https://www.proquest.com/docview/2355939042 https://www.proquest.com/docview/2524269063 https://pubmed.ncbi.nlm.nih.gov/PMC7005435 https://doaj.org/article/7b748fcf35db4464bbed52a36ce8d0e2 |
| Volume | 6 |
| WOSCitedRecordID | wos000518367800026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2405-8440 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001586973 issn: 2405-8440 databaseCode: DOA dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2405-8440 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001586973 issn: 2405-8440 databaseCode: M~E dateStart: 20150101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELagQogL4s22UBmJY7NNYie2uQFqxaUVEiDtzXL8UFNVzmqzrbQXfjtjO1k2ILEXLjkkdiJ7xp5v4plvEHoPq0wRZkhGDcsz6qzKhC7qrBbOVU2hla5TsQl2eckXC_F1p9RXiAlL9MBp4k5Zwyh32pHKNOC60KaxpioVqbXlJrdx982Z2HGmUn4wr0U8XgaLVWWc0vx3-s7p9fzK3rSbLvCflvnc5qQUfGKYIn__xD79jT__DKPcsUvnT9DjAVDij2kgT9E965-hhxfDkflz1H2LlW5ijQjcerzs-hDpjDuP0_9y7FMkeP8BAxjEIdwQdw4vV-2d0husQ17jyvcnY3OtYqGRE6y8wYkCFuSMUy6z3rxAP87Pvn_-kg1VFjINUG6dcQ6QKbdMNaVrmCg5DyR73JS6UkU41AQfVjtlwTEqTBCrMBRsvuOKKu54Q16iA995-xphRxRnBpxtbsDoibJxxNACIIZgjVC6mCE6TrHUAwV5qIRxI8dYs2s5SEYGycgkmRmab7stEwfHvg6fgvy2jQOFdrwBiiUHxZL7FGuG-Ch9OaCRhDLgVe2-778btUXCag1HMMrb7raXJcA7QQTslP9oU8X8YsCOM_Qqadh2JKQMnGkEnrCJ7k2GOn3i26vIGs4COifV4f-YmyP0KAw3Ra-_QQfr1a19ix7ou3Xbr47Rfbbgx3FBwvXi59kvbEU9KQ |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Selectivity+in+posting+on+social+networks%3A+the+role+of+privacy+concerns%2C+social+capital%2C+and+technical+literacy&rft.jtitle=Heliyon&rft.au=Schwartz-Chassidim%2C+Hadas&rft.au=Ayalon%2C+Oshrat&rft.au=Mendel%2C+Tamir&rft.au=Hirschprung%2C+Ron&rft.date=2020-02-01&rft.issn=2405-8440&rft.eissn=2405-8440&rft.volume=6&rft.issue=2&rft.spage=e03298&rft_id=info:doi/10.1016%2Fj.heliyon.2020.e03298&rft_id=info%3Apmid%2F32055733&rft.externalDocID=32055733 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2405-8440&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2405-8440&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2405-8440&client=summon |