Abstract
Social Networking Sites (SNSs) have become an essential part of the daily lives of billions of people worldwide. Because SNS service providers use a revenue model that relies on data licensing (selling of user data), they share user data with other parties such as government institutions and private businesses. Sharing of user data to third parties raises several privacy concerns. Apart from privacy issues emanating from SNSs sharing user information with third parties, privacy issues may also emanate from users sharing information with SNS members. This study is motivated by the researchers’ interest in investigating self-disclosure amongst Ghanaians especially from the perspective of privacy and trust primarily because of recent reports of revenge pornography and other self-disclosure related privacy violations on SNSs in Ghana. A survey was conducted on 523 students from three private universities in Ghana. Out of the 523 questionnaires administered, 452 were validated for analysis. Data collected from the survey was analyzed using the Partial Least Square approach to Structural Equation Modeling (PLS-SEM) performed on SmartPLS Version 3. Results of the study show that privacy awareness, privacy invasion experience, and privacy-seeking behavior have a significant effect on trust in SNS members. Privacy concern was found not to have a significant effect on trust in SNS members. Privacy awareness, privacy concerns, privacy invasion experience, and privacy-seeking behavior were found to have a significant effect on trust in the SNS service provider. Trust in SNS members and trust in the SNS service provider were found to have a significant effect on SNS self-disclosure. Theoretical and practical implications of the study are also discussed.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
Social Networking Sites (SNSs) are generally described as Internet-based applications that allow users to construct and share a personalized profile and lists of confirmed contacts with others on the site. SNSs allow users to see, browse, and communicate with their online friends as well as with friends of other users in the user’s online community [1]. SNSs have become an essential part of the daily lives of billions of people worldwide [2].
Self-disclosure is a process of interaction by which a person discloses information about himself or herself to another person [3]. Self-disclosure is a predominant part of social networking because SNS users share a lot of personal information on SNSs. Due to the fast-growing popularity and usage of SNSs, there has been a tremendous rise in the information given out by SNS users [4]. Also, due to the high volumes of content shared by users on SNSs, concerns have been raised about the vulnerability of users with regards to content sharing [5].
SNSs collect and store user browsing data, personal information, as well as distributed content for an unlimited amount of time [6]. Owing to the fact that SNSs use a revenue model that relies on data licensing (selling of user data), they make user data available to other parties, including governmental agencies and business partners [5, 6]. Once user information is made available to third parties, users lose control of this information.
Apart from privacy issues emanating from SNSs sharing user information with third parties, privacy issues may also emanate from users sharing information with SNS members. SNS users fear that their posts will be exposed or abused by others [7, 8]. For users, as online social networks grow, the probability of engaging with new contacts also grows, likewise the probability of experiencing negative relationships that may give rise to social overload [9]. SNS users’ private information provided during the registration for SNS accounts may become exposed to several parties, leading to possible misuse [10].
Ghana has experienced tremendous growth in SNS usage [11]. Ghana recorded a 22% annual growth of social media users from January 2017 to January 2018, the fourth highest in the world; the global growth rate was 13% [12]. In recent times, Ghana has experienced instances of revenge pornography on SNSs such as Whatsapp and Twitter. Revenge pornography is a class of online pornography that comprises of unprofessional images or videos that were home-made with the approval of those shown, but then later circulated without their approval [13]. There is an aspect of self-disclosure in revenge pornography because victims share private pictures and videos with people they initially trust.
One will expect that these incidents of revenge pornography will deter SNS users in Ghana from self-disclosing private images or videos, but more recent happenings suggest otherwise. Apart from revenge pornography, there have been several reports of other forms of self-disclosure related privacy violations on SNSs in Ghana, such as fraud-related identity theft. This study is motivated by our interest in investigating self-disclosure amongst Ghanaians, especially from the perspective of privacy and trust mostly because of recent reports of revenge pornography and other privacy violations on SNSs in Ghana.
2 Literature Review
2.1 Self-disclosure, Privacy, and Trust on SNSs
Communication Privacy Management (CPM) theory was developed by Petronio in 1991. It is a theory proposed to generate an empirical understanding of how people make decisions on disclosing and hiding private information [14]. From the perspective of CPM, self-disclosure involves the setting of rules by people when they have to decide whether to reveal or conceal personal information [15]. In effect, the individual controls the disclosure of personal information based on the rules set, and by setting privacy boundaries. Privacy boundaries can vary from fully open to fully closed [14, 16].
Fully open boundaries can be described as situations where an individual discloses information vocally or online to everybody who wants access to it. On the other hand, closed boundary individuals are sceptical about revealing information, hence, they are very careful. During interactions, people usually move between open and closed boundaries, depending on the nature of the relationship between the individuals communicating [14]. CPM proposes that individuals set privacy rules during communication; privacy rules determine what the individual will disclose or not. These privacy rules depend on several factors such as gender, cultural values, and a person’s conviction about what is private or not private [14]. Privacy rules are also influenced by assessments of risk-benefits, as well as changes in situational circumstances, for instance, the changes that occur when there is a separation between couples [14]. When a couple separate, they will most likely not use the same privacy rules they had when they were a couple [14].
CPM proposes the phenomenon of boundary turbulence [14]. According to CPM, co-ownership of private information occurs when an individual shares private information with a confidant. If the two individuals who co-own the private information do not negotiate their jointly held privacy rules, there is the likelihood of “boundary turbulence”, which means that there are disruptions in the way that co-owners regulate the flow of private information to third parties [14]. Boundary turbulence occurs when a co-owner deliberately destroys the synchronized boundary of privacy to reveal private information [14]. One can, therefore, deduce from CPM that the revealer places some trust in the confidant while disclosing personal information with the hope that there will not be boundary turbulence. Consequently, before an individual will share private information with a confidant, certain expectations come to play. These expectations of confidentiality and responsibility must be met before the sharing of private information. “If you meet my expectations of confidentiality and responsibility, I will share my private information with you, and vice versa” [16].
In order to prevent conflict and unwanted breaches of confidentiality, original owners of information should discuss their expectations of co-ownership of information with confidants [16]. The boundary surrounding private information should be managed by mutually negotiated and agreed-upon privacy rules [17].
SNS use for most people is fueled by their desire to be entertained and to pass time [18]. While passing time on SNSs, SNS users are entertained by the active sharing of content (images and videos) as well as synchronous interactions via instant messaging. The amount of pleasure and amusement experienced by SNS users depends on satisfactory associations and trust building. Self-disclosure on SNSs is therefore influenced by satisfactory relationships based on enjoyment, connectedness, and SNS flow experience, as well as perceived risks [18,19,20,21].
Self-disclosure in SNSs can be affected by SNS members’ perceptions of the safety of their personal information with respect to the service provider [22]. Users are likely not to have a happy experience with SNS use when they have anxieties about the sharing of private information. Awareness of the credibility of a company may reduce one’s privacy concerns over self-disclosure or perceived privacy risk; in other words, the more reputable the SNS provider is, the more likely it is that users will disclose personal information [23,24,25,26].
In summary, self-disclosure on SNSs is multifaceted. Self-disclosure on SNSs depends largely on user enjoyment of interactions on the SNS, perceived risks, as well as perceptions of how personal information is handled by SNS service providers [27,28,29,30].
Regarding online social networking, privacy awareness refers to a person’s attention and understanding in terms of various aspects of privacy while using social media platforms [31,32,33]. Initial SNS studies showed that most SNS users had little knowledge of how their personal information was treated and used, however recent studies show an increase in privacy awareness among SNS users [34]. While increased privacy awareness has been found to reduce trust and information disclosure in e-commerce settings, the opposite holds true for SNSs [34]. Notwithstanding the enhanced level of privacy awareness among SNS users, activities on the SNS platforms keep increasing, which could be attributed to trust in the platforms [4].
Privacy invasion experience describes privacy violations a user might have personally experienced in the past [35]. Humor creation among friends on online social networks may lead some individuals to expose people’s private information such as that which exposes their previous improper behavior, mischief, or clumsiness. This exposure may be a playful tease, but the individual whose information is exposed may be offended by the involuntary exposure. Prior privacy invasion experience negatively affects trust and further information disclosure [36].
Privacy-seeking behavior refers to the things people do to protect their information [37]. From the perspective of CPM theory, to protect one’s privacy, a person would set privacy boundaries during interaction with people. Privacy boundaries are set based on trust; open when there is trust and closed when there is no trust [16]. Privacy-seeking behavior increases transactional avoidance and subsequent self-disclosure [33].
By definition, trust is the readiness to accept susceptibility based upon optimistic outlooks about another’s behavior [38]. Trust theory proposes that trust, which shows a readiness to accept susceptibility based on an optimistic outlook toward another participant’s imminent behavior, has a substantial effect on the behavioral intention of users of services [39]. Trust can be categorized as online or offline [40]. Online trust varies from offline trust because in an online setting, trust issues emanate from both the SNS technology and the SNS service provider. Therefore, it is difficult for internet users to keep a high level of trust for the websites. The internet is mostly viewed as a precarious territory; therefore, online trust is rather tough to achieve and sustain when compared to trust in an offline setting [40].
Interaction creates prospects for people to become acquainted, to form online communities, and to build trust [41]. Trust has been found to have a mediating effect on privacy concerns and information disclosure [42]. Self-disclosure has been a prevalent behavior of SNS users, which arguably motivated previous research to focus on the drivers and inhibitors of self-disclosure. From the perspective of a person using an SNS, ownership rules have an influence on an individual’s actions with respect to trust in a “third-party disclosure” of the shared information; we co-own shared private information and so we must be responsible co-owners [43].
SNS providers must assure users of the safety of their personal information during registration for service, especially from the activities of third parties [44]. Privacy seals are issued by a third-party organization (for instance TRUSTe) to show that a site’s privacy framework and processes are accredited by them. TRUSTe offers services to assist organizations to revise their privacy management procedures so that they conform to government laws and best practices. Both privacy guidelines and seals may help develop users’ trust and assuage their privacy concerns [44]. Previous literature has shown that people may demonstrate more trust in websites that disclose their privacy policies [45,46,47,48,49]. Online trust can, therefore, be seen from the perspective of the SNS provider and SNS members.
Default SNS privacy settings allow users to see each other’s profiles either through a one-on-one connection or through a closed or open user group [50]. This default setting (especially on Facebook) also implies that when for instance, A is a friend of B on the SNS, C who is a friend of B can view A’s profile even though A and C are not direct friends. Thus, if users maintain the default SNS settings, they may not be aware that people who are not their friends have access to their profile (because of visibility). Consequently, users may eventually share information with people they did not intend sharing the information with. It is therefore imperative that users adjust their privacy settings in SNSs to suit their privacy rules and boundaries [51].
Unwanted privacy breaches could occur even if a user has the most restricted privacy settings [52]. For instance, with Facebook, a user’s privacy is influenced by the privacy settings of their friends because if a user has restricted settings, but the friends do not have restricted settings, other people will have access to the user’s information. Additionally, in cases where the user removes his/her posts from the SNS (for example Facebook), the posts may still be accessible because of the ease at which information can be saved, shared, and reposted [34]. Another issue of interest in SNSs is the activity stream. An activity stream is a thread that displays every activity of the user (e.g., posts and likes). Activity streams have raised privacy concerns among SNS users because a user might not know all the activities that are included in their activity stream. Users may also not know the people who have access to their activity stream [34]. Hence, the failure to successfully control who has access to one’s information online can create discomfort for SNS users.
3 Research Model and Hypotheses Development
We develop hypotheses mainly from CPM theory and trust theory. We also refer to previous studies that have investigated the hypothesized relationships. The current study seeks to investigate three major variables namely self-disclosure, privacy and trust. Self-disclosure and privacy are inherent in CPM theory, while trust is inferred from CPM theory. To prevent parsimony while investigating these three variables, we combine CPM theory and trust theory to formulate our research model. The hypotheses are stated in the next sections.
Privacy Awareness:
Based on CPM theory, we argue that awareness of the privacy structure of SNSs (especially privacy settings) allows an individual to set privacy rules when disclosing information to the SNS service provider and other SNS members. When individuals are confident that there is no likelihood of boundary turbulence, they will have trust in the SNS service provider and other SNS members. Privacy awareness, therefore, has a positive effect on trust in the SNS service provider and other SNS members. In a study to determine the impact of privacy, trust and user activity on intentions to share Facebook photos, Malik, Hiekkanen, Dhir and Nieminen [33] found that privacy awareness had a significant positive effect on trust in the Facebook platform. Facebook users with high privacy awareness tend to exhibit greater levels of trust in the service and are more active [4, 53].
In line with the findings of Malik, Hiekkanen, Dhir and Nieminen [33], O’Bien and Torres [53], and Stutzman et al. [4] we posit that:
-
Hypothesis 1. Privacy awareness has a significant positive effect on trust in SNS members
-
Hypothesis 2. Privacy awareness has a significant positive effect on trust in SNS service provider
Privacy Concern:
From CPM theory we posit that privacy concern (user apprehension to disclose information) has the tendency to cause an individual to set privacy rules during interactions to prevent boundary turbulence. The higher the apprehension, the less the trust in the SNS service provider and other SNS members. Privacy concern, therefore, has a negative effect on trust in the SNS service provider and other SNS members. In the SNS setting, privacy concern is one of the key factors that affect trust in the service, as well as the intention to disclose information [53, 54]. Privacy concern has a negative influence on trust in Facebook and consequently, lower intentions to use Facebook [53]. Also, following CPM theory, we posit that privacy concern has the tendency to cause an individual to set privacy rules during interactions to prevent boundary turbulence. Privacy concern, therefore, influences trust.
In line with theory and the findings of O’Bien and Torres [53] and Proudfoot et al. [54], as well as the tenets of CPM, we posit that:
-
Hypothesis 3. Privacy concern has a significant negative effect on trust in SNS members
-
Hypothesis 4. Privacy concern has a significant negative effect on trust in SNS service provider
Privacy Invasion Experience:
We posit (From CPM theory) that when one experiences privacy invasion, there is boundary turbulence which in turn affects trust. Prior privacy experience will therefore negatively influence trust in the SNS service provider and other SNS members; the greater the impact of the experience, the lesser the level of trust. Prior privacy invasion increases perceptions of online privacy risks, which in turn influences trust in SNSs, that is, trust in the SNS service provider and SNS members as well [55]. Prior experience of privacy invasion on SNSs affects trust in SNSs and motivates an individual to alter his/her privacy settings [56]. The victims of online privacy attack tend to appreciate the grave outcomes of privacy loss; their prior experience influences their trust in SNSs [57].
Therefore, in support of the above-mentioned authors and the tenets of CPM, we posit that:
-
Hypothesis 5. Privacy invasion experience has a significant negative effect on trust in SNS members
-
Hypothesis 6. Privacy invasion experience has a significant negative effect on trust in SNS service provider
Privacy-Seeking Behavior:
Similar to privacy awareness, based on CPM theory, we argue that when exploring the privacy settings of the SNS allows an individual to set privacy rules when disclosing information to the SNS service provider and other SNS members. When individuals are confident that there is no likelihood of boundary turbulence, they will have trust in the SNS service provider and other SNS members. Privacy awareness, therefore, has a positive effect on trust in the SNS service provider and other SNS members. In a study to determine the impact of privacy, trust and user activity on intentions to share Facebook photos, Malik, Hiekkanen, Dhir and Nieminen [33] found that privacy-seeking behavior had a significant positive effect on Facebook usage activity. The extent to which SNS users pursue privacy protection strategies will positively affect their trust in the service and their actual activity [4, 56, 58].
In line with theory and the above findings, we posit that:
-
Hypothesis 7. Privacy-seeking behavior has a significant positive effect on trust in SNS members
-
Hypothesis 8. Privacy-seeking behavior has a significant positive effect on trust in SNS service provider
Trust in SNS Members and Trust in SNS Service Provider:
Based on trust theory, we posit that an individual who trusts the SNS service provider and other SNS members is ready to accept susceptibility (based on an optimistic outlook), and therefore will be willing to disclose personal information. Furthermore, following CPM theory, we posit that when one trusts the would-be confidant, it implies the would-be confidant meets the needed expectations (of confidentiality) for self-disclosure, hence personal information is likely to be given out, and vice versa. Trust, therefore, positively influences self-disclosure. In a study on the prediction of college students’ self-disclosure on Facebook, Chang and Heo [5] found that trust in Facebook had a significant positive effect on the disclosure of personal information on the platform. A study by Malik et al. [33] showed that trust positively impacts users’ intentions to share photos on Facebook. Wu, Huang, Yen and Popova [49] in a study to investigate the effect of online privacy policy on consumer privacy concern and trust found out that trust has a positive impact on willingness to provide personal information.
In line with the above findings and the tenets of CPM theory, we hypothesize that:
-
Hypothesis 9. Trust in SNS members has a significant positive effect on self-disclosure
-
Hypothesis 10. Trust in SNS service provider has a significant positive effect on self-disclosure
The proposed research model is shown in Fig. 1.
4 Methodology
4.1 Instrument Development, Sampling and Data Collection
In order to improve content validity, measurement items for the latent variables used in the current study were adopted from previous literature [59]. These items were however reworded to fit the context of social networking sites. Items for Privacy Awareness, Privacy Concerns and Privacy Seeking behavior were adopted from Malik et al. [33]. Privacy Invasion Experience, Trust in SNS members, Trust in SNS service provider and Self Disclosure were all measured with items derived from Cheung, Lee, and Chan [60]. All measurement items were measured using a 5-point Likert scale anchored between strongly disagree (1) and strongly agree (5). Over a five-day period, survey data was collected from 452 respondents, all of whom were students.
5 Results
Data analysis was conducted using the Partial Least Square approach to Structural Equation Modelling (PLS-SEM) performed on SmartPLS Version 3. The PLS-SEM technique is appropriate because it allows for the testing of the relationships between latent constructs in a proposed research model. The current study used the PLS approach since an initial study of the data collected revealed that the data was non-normal. Also, the PLS method is more appropriate since our model is quite new and untested.
5.1 Measurement Assessment
The measurement model was assessed based on reliability, discriminant validity and convergent validity. Cronbach’s alpha and composite reliability were used to test the reliability of the constructs. Henseler, Ringle, and Sinkovics [61] suggest a threshold of 0.7. It is evident from Table 1 that measurement model is reliable. Convergent validity was also assessed using the average variance extracted (AVE), Henseler et al. [62] recommended that the AVE for each construct should be greater than 0.5 for convergent validity to be assured. Clearly from Table 1 is can be confirmed that convergent validity is assured. Finally, discriminant validity was assessed using the Fornell-Larker criterion [63], and the Heterotrait-Monotrait ratio of correlation [64]. Evidence from Table 2 shows that the square root of the AVEs for each construct is greater than the cross-correlation with other constructs. Also, the results of the HTMT0.85 criterion shown in Table 2 confirm discriminant validity. Overall, the results showed that the psychometric properties of the measures used in the study were satisfactory.
5.2 Structural Model Assessment
The structural model was assessed based on the sign, magnitude and significance of the path coefficients of each hypothesized path. The significance of the path coefficients in the structural model was tested using a bootstrap resampling technique with 5000 subsamples drawn with replacement. Results of the assessment of the structural model are shown in Table 3. Apart from the path between Privacy Concern and Trust in Members, all the paths that were earlier hypothesized were found to be significant. About 56 per cent of the variance in the target variable (Self Disclosure) was explained by our model. To assess model fit in PLS we used the standardized root mean square residual (SRMR). The SRMR value for the model was 0.041; a value of less than 0.08 is generally considered a good fit [65]. This value indicates that the structural model exhibits a good fit.
6 Discussions
The current study sought to investigate self-disclosure on SNSs from the perspective of trust and privacy. As mentioned earlier, the researchers treated trust as a two-dimensional variable; trust in SNS provider and trust in SNS members, mainly because the invasion of SNS users’ privacy is likely to be caused by these two variables. The researchers captured privacy of the SNS user in terms of privacy awareness, privacy concerns, privacy invasion experience, and privacy-seeking behavior.
Results of the study show that privacy awareness, privacy invasion experience, and privacy-seeking behavior have a significant effect on trust in SNS members. Privacy concern was found not to have a significant effect on trust in SNS members. Privacy awareness, privacy concerns, privacy invasion experience, and privacy-seeking behavior were found to have a significant effect on trust in the SNS service provider. Trust in SNS members and trust in the SNS service provider were found to have a significant effect on SNS self-disclosure. Nine of the ten hypotheses were supported, which, significantly supports our research model.
Our study provides support for studies conducted by Malik, Hiekkanen, Dhir and Nieminen [33], O’Bien and Torres [53], and Stutzman et al. [4] which show that, in SNS settings, privacy awareness has a significant effect on trust. This finding shows that when SNS users in Ghana understand and pay attention to privacy issues, it affects the trust they have in the SNS provider as well as other SNS members. The positive relationship between privacy awareness and the trust constructs implies that when SNS users in Ghana are aware of the privacy implications of using the sites, they are likely to build more trust in the sites, that is, knowing and understanding the privacy statements and privacy settings of the SNS is likely to build trust in the SNS. Knowledge of user privacy rights and responsibilities is also likely to result in increased trust in the SNS [66]. This result also implies that SNS service providers can build more trust in SNS users if they find ingenious ways of exposing SNS users to the privacy framework of the sites.
Privacy concern was found to have a significant negative effect on trust in the SNS provider, but a non-significant effect on trust in the SNS members. This finding implies that the there is a high likelihood that Ghanaian SNS users are of the view that their concern for the manner in which their private information and information they submit on SNSs is managed does not influence their trust in SNS members, but influences their trust in the SNS provider. We argue that it is very likely that due to the influence of privacy awareness, the users may feel they are in control of the information they submit on the SNSs that may be misused by other SNS members, hence the non-significance of the influence of privacy concerns on trust in SNS members. However, due to the fact that users cannot control how their personal/private information on the SNS is used by SNS providers, a significant negative influence of privacy concerns is observed on trust in SNS provider. This finding is consistent with the findings of work done by Chang, Liu and Shen [67] who found that privacy concern has a significant negative influence on trust in using LinkedIn. Chang, Liu and Shen [67] state that because LinkedIn members mostly share their job-related information for career reasons, and the information disclosure on the site may be private between job seekers and providers or among groups with similar career interests, trust is very important for users on the site. Chang, Liu and Shen [67] also found out that for users of Facebook, there was a non-significant relationship between privacy concern and trust in using the site. Chang, Liu and Shen [67] state that relationships built on Facebook are based primarily on close friendships and acquaintances, hence, there is a less perceived risk in submitting non-confidential or non-career oriented information. This result may also explain why Ghanaian SNS users share a lot of personal content online.
Privacy invasion experience was found to have a significant negative effect on trust in SNS provider as well as trust in SNS members. This implies that SNS users in Ghana who have had prior privacy invasion experience(s) have less trust in SNSs as compared to those who have not had one. We argue that the finding in the current study is logical, and is also in line with work done by Mohamed and Hawa [57], as well as reviews made by Chen, Beaudoin and Hong [55] and Young and Quan-Haase [56] who had similar findings. We should also expect that Ghanaian SNS users who have been victims of revenge pornography would share less personal content online.
Privacy-seeking behavior was found to have a significant positive effect on trust in the SNS provider as well as trust in the SNS members. This finding implies that SNS users in Ghana who adopt strategies to protect their privacy on SNSs are likely to trust the SNSs more since they are confident their strategies will shield them from privacy risk. This finding is consistent with work by Young and Quan-Haase [56] who reported that SNS users use several privacy protection schemes in order to lessen privacy risks while still allowing them to reveal enough information to link up with colleagues and friends on Facebook. However, Malik et al. [33] found a non-significant relationship between privacy-seeking behavior and trust in a study on photo sharing on Facebook. Malik et al. [33] stated that the non-significant relationship was due to the fact that trust became negligible as users identified privacy protection strategies that they were confident will prevent privacy violations. Malik et al. [33] further state that users who vigorously involve themselves in several privacy protection schemes feel more self-assured and, thus, reveal more information and content. We, therefore, conclude that privacy protection strategies have the likelihood of making trust negligible. At the same time, privacy protection strategies can build trust in the SNS since privacy protection strategies give users confidence and help prevent privacy violations.
In line with studies by Chang and Heo [5], Malik et al. [33], and Wu, Huang, Yen and Popova [49], the current study showed that trust in SNS provider and SNS members have a significant positive effect on self-disclosure. This finding implies that the higher the levels of trust Ghanaian SNS users have in the SNS members and the SNS provider, the higher the likelihood of sharing their personal information. Previous literature also shows that trust is one of the most powerful factors that influence users’ activity and readiness to give out information and content on Facebook [5]. We did not identify any study that showed a negative effect of trust on self-disclosure in the literature to enable us to do further comparative analysis. The amount of self-disclosure shown by SNS users in Ghana will thus be a reflection of the amount of trust they have in SNS service providers and other SNS members.
7 Conclusion
7.1 Theoretical Implications
This study has made contributions to growing body of literature on social media related issues [68,69,70,71,72,73,74,75,76,77,78,79]. Particularly, the current study has theoretical implications for the study of privacy, trust, and self-disclosure in the area of social media and online social networking. Not much research has been done in the area of social media and online social networking involving the quantitative analyses of the relationships between privacy, trust, and self-disclosure constructs. The current study distinguishes itself from similar previous studies because those studies have treated Trust as a one-dimensional mediating variable, for instance, Zlatolas et al. [37], Malik et al. [33], and Wu, Huang, Yen and Popova [49] (see Appendix A). The current study treats Trust as a two-dimensional mediating variable between privacy and self-disclosure. The results of the quantitative analysis of the privacy concern – trust path in the research model, that is, the significant negative effect on trust in SNS provider, but a non-significant effect on trust in SNS members, shows the multidimensional nature of the trust construct.
Practical Implications.
The current study emphasizes the importance of privacy protection strategies in the use of SNSs. Most importantly, the ability of a user to adjust the privacy settings of the SNS and develop privacy protection strategies are key to the use of SNSs. It is therefore important for SNS providers to expose users to the need to adjust their privacy settings to suit their individual perceptions of risk. In our opinion, this may be better achieved if SNS providers mandatorily take users through a short tutorial on privacy settings immediately after sign-up, and also intermittently drop hints on privacy settings whilst users browse the sites.
In order to improve trust, SNS providers must assure users of the safety of their personal information during registration for service, especially from the activities of third parties. Both privacy policies and seals may help build users’ trust and alleviate their privacy concern.
Also, SNS users must consciously make an effort to adjust their privacy settings to their preference to give them the needed confidence to share their personal information freely, and also have an interesting user experience.
Limitations and Directions for Further Research.
Although the current study produced some interesting results that validated some theories and past research, a few limitations must be considered. First, the respondents were selected from three universities in Ghana. This sample cannot represent all SNS users. Secondly, the study used a cross-sectional design, which may not capture changes in behavior over time. A longitudinal design should be considered in future studies. Because the setting of the current study limits us from generalizing to other cultural frameworks and advanced economies, the research model could be tested in those settings. Finally, subsequent studies could investigate the moderating role of gender and age on the relationships in the model.
References
Amichai-Hamburger, Y., Hayat, T.: Social networking. In: International Encyclopedia of Media Effects (2017)
Lenhart, A.: Teens, social media & technology overview, Washington DC (2015)
Ignatius, E., Kokkonen, M.: Factors contributing to verbal self-disclosure. Nord. Psychol. 59, 362–391 (2007). https://doi.org/10.1027/1901-2276.59.4.362
Stutzman, F., Gross, R., Acquisti, A.: Silent listeners: the evolution of privacy and disclosure on Facebook. J. Priv. Confid. 4, 7–41 (2012). https://doi.org/10.1145/1958824.1958880
Chang, C.W., Heo, J.: Visiting theories that predict college students’ self-disclosure on Facebook. Comput. Hum. Behav. 30, 79–86 (2014). https://doi.org/10.1016/j.chb.2013.07.059
Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Commun. 15, 83–108 (2009)
Huang, H.-Y., Chen, P.-L., Kuo, Y.-C.: Understanding the facilitators and inhibitors of individuals’ social network site usage. Online Inf. Rev. 41, 85–101 (2017). https://doi.org/10.1108/OIR-10-2015-0319
Zhu, Y., Bao, Z.: The role of negative network externalities in SNS fatigue. Data Technol. Appl. DTA-09-2017-0063 (2018). https://doi.org/10.1108/dta-09-2017-0063
Maier, C., Laumer, S., Eckhardt, A., Weitzel, T.: Giving too much social support : social overload on social networking sites, 1–18 (2014). https://doi.org/10.1057/ejis.2014.3
Feng, Y., Xie, W.: Teens’ concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162 (2014)
Ghafla.com: Social Media Apps Ghanaians Visit The Most. http://www.ghafla.com/gh/social-media-apps-ghanaians-visit/
Chaffey, D.: Global Social Media Research Summary (2018). https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/
Salter, M., Crofts, T.: Responding to revenge porn: challenges to online legal impunity. In: New Views on Pornography: Sexuality, Politics, and the Law, pp. 233–256 (2015)
Petronio, S., Reierson, J.: Regulating the privacy of confidentiality: grasping the complexities through communication privacy management theory. In: Afifi, T.A., Afifi, W.A. (eds.) Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications, pp. 365–383. Routledge, New York (2009)
Frampton, B.D., Child, J.T.: Friend or not to friend: coworker Facebook friend requests as an application of communication privacy management theory. Comput. Human Behav. 29, 2257–2264 (2013)
Petronio, S.: Boundaries of Privacy: Dialects of Disclosure. State University of New York Press, Albany (2002)
Golish, T.D.: Stepfamily communication strengths; understanding the ties that bind. Hum. Commun. Res. 29, 41–80 (2003)
Special, W.P., Li-Barber, K.: Self-disclosure and student satisfaction with Facebook. Comput. Human Behav. 28, 624–630 (2012)
Yoon, S.J., Han, H.E.: Experiential approach to the determinants of online word-of-mouth behavior. J. Glob. Sch. Mark. Sci. 22, 218–234 (2012)
Qian, H., Scott, C.R.: Anonymity and self-disclosure on weblogs. J. Comput. Commun. 12, 1428–1451 (2007)
Barth, S., de Jong, M.D.T.: The privacy paradox – investigating discrepancies between expressed privacy concerns and actual online behavior – a systematic literature review. Telemat. Inform. 34, 1038–1058 (2017). https://doi.org/10.1016/j.tele.2017.04.013
Zhou, T.: The effect of network externality on mobile social network site continuance. Program 49, 289–304 (2015). https://doi.org/10.1108/PROG-10-2014-0078
Myerscough, S., Lowe, B., Alpert, F.: Willingness to provide personal information online: the role of perceived privacy risk, privacy statements and brand strength. J. Website Promot. 2, 115–140 (2008)
Angst, C.M., Agarwal, R.: Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q. 33, 339–370 (2009)
Bansal, G., Zahedi, F.M., Gefen, D.: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis. Support Syst. 49, 138–150 (2010). https://doi.org/10.1016/j.dss.2010.01.010
Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Publ. Policy Mark. 19, 27–41 (2000). https://doi.org/10.1509/jppm.19.1.27.16941
Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17, 61–80 (2006). https://doi.org/10.1287/isre.l060.0080
Culnan, M., Bies, R.: Consumer privacy: balancing economic and justice considerations. J. Soc. Issues 59, 323–342 (2003). https://doi.org/10.1111/1540-4560.00067
Laufer, R., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33, 22–42 (1977). https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10, 104–115 (1999). https://doi.org/10.1287/orsc.10.1.104
Rachels, J.: Why privacy is important. Philos. Publ. Aff. 4, 323–333 (2003)
Jeong, Y., Kim, Y.: Privacy concerns on social networking sites: interplay among posting types, content, and audiences. Comput. Hum. Behav. 69, 302–310 (2017). https://doi.org/10.1016/j.chb.2016.12.042
Malik, A., Hiekkanen, K., Dhir, A., Nieminen, M.: Impact of privacy, trust and user activity on intentions to share Facebook photos. J. Inf. Commun. Ethics Soc. 14, 364–382 (2016). https://doi.org/10.1108/jices-06-2015-0022
Fox, J., Moreland, J.J.: The dark side of social networking sites: an exploration of the relational and psychological stressors associated with Facebook use and affordances. Comput. Hum. Behav. 45, 168–176 (2015). https://doi.org/10.1016/j.chb.2014.11.083
Awad, K.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 30, 13 (2006). https://doi.org/10.2307/25148715
Choi, B.C.F., Jiang, Z.J., Xiao, B., Kim, S.S.: Embarrassing exposures in online social networks: an integrated perspective of privacy invasion and relationship bonding. Inf. Syst. Res. 26, 675–694 (2015). https://doi.org/10.1287/isre.2015.0602
Hölbl, M., Zlatolas, L.N., Welzer, T., Heric, M.: Privacy antecedents for SNS self-disclosure: the case of Facebook. Comput. Hum. Behav. 45, 158–167 (2015). https://doi.org/10.1016/j.chb.2014.12.012
Lee, Y., Kwon, O.: Intimacy, familiarity and continuance intention: an extended expectation-confirmation model in web-based services. Electron. Commer. Res. Appl. 10, 342–357 (2011). https://doi.org/10.1016/j.elerap.2010.11.005
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20, 709–734 (1995). https://doi.org/10.5465/amr.1995.9508080335
Friedman, B., Khan Jr., P.H., Howe, D.C.: Trust online. Commun. ACM 43, 34–40 (2000). https://doi.org/10.1145/355112.355120
Han, S., et al.: The Effect of using SNS to interpersonal relation and quality of life: focused on the moderating role of communication capability. J. Inf. Syst. 22, 29–64 (2013)
Flanagin, A.J., Metzger, M.J.: Internet use in the contemporary media environment. Hum. Commun. Res. 27, 153–181 (2001). https://doi.org/10.1093/hcr/27.1.153
Osatuyi, B.: Information sharing on social media sites. Comput. Hum. Behav. 29, 2622–2631 (2013). https://doi.org/10.1016/j.chb.2013.07.001
Zhou, T., Li, H.: Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Comput. Hum. Behav. 37, 283–289 (2014). https://doi.org/10.1016/j.chb.2014.05.008
Earp, J.B., Antón, A.I., Aiman-Smith, L., Stufflebeam, W.H.: Examining internet privacy policies within the context of user privacy values. IEEE Trans. Eng. Manag. 52, 227–237 (2005). https://doi.org/10.1109/TEM.2005.844927
Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59, 877–886 (2006). https://doi.org/10.1016/j.jbusres.2006.02.006
Galanxhi, H., Nah, F.F.-H.: Privacy issues in the era of ubiquitous commerce. Electron. Mark. 16, 222–232 (2006). https://doi.org/10.1080/10196780600841894
Lwin, M.O., Wirtz, J., Stanaland, A.J.S.: The privacy dyad. Internet Res. 26, 919–941 (2016). https://doi.org/10.1108/IntR-05-2014-0134
Wu, K.W., Huang, S.Y., Yen, D.C., Popova, I.: The effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 28, 889–897 (2012). https://doi.org/10.1016/j.chb.2011.12.008
Zhang, Y., Fang, Y., Wei, K.K., Ramsey, E., McCole, P., Chen, H.: Repurchase intention in B2C e-commerce - a relationship quality perspective. Inf. Manag. 48, 192–200 (2011). https://doi.org/10.1016/j.im.2011.05.003
Lee, S., Kim, B.G.: The impact of qualities of social network service on the continuance usage intention. Manag. Decis. 55, 701–729 (2017). https://doi.org/10.1108/MD-10-2016-0731
Tan, X., Qin, L., Kim, Y., Hsu, J.: Impact of privacy concern in social networking web sites. Internet Res. 22, 211–233 (2012). https://doi.org/10.1108/10662241211214575
O’Bien, D., Torres, A.: Social networking and online privacy: Facebook users’ perceptions. Irish J. Manag. 31, 63–98 (2012)
Proudfoot, J.G., Wilson, D., Valacich, J.S., Byrd, M.D.: Saving face on Facebook: privacy concerns, social benefits, and impression management. Behav. Inf. Technol. 37, 16–37 (2018)
Chen, H., Beaudoin, C.E.: An empirical study of a social network site: exploring the effects of social capital and information disclosure. Telemat. Inform. 33, 432–435 (2016). https://doi.org/10.1016/j.tele.2015.09.001
Young, A.L., Quan-Haase, A.: Privacy protection strategies on Facebook: the internet privacy paradox revisited. Inf. Commun. Soc. 16, 479–500 (2013). https://doi.org/10.1080/1369118x.2013.777757
Mohamed, N., Hawa, I.: Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput. Hum. Behav. 28, 2366–2375 (2012). https://doi.org/10.1016/j.chb.2012.07.008
Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347, 509–514 (2015). https://doi.org/10.1126/science.aaa1465
Straub, D., Boudreau, M.-C., Gefen, D.: Validation guidelines for IS positivist research. Commun. Assoc. Inf. Syst. 13, 63 (2004)
Cheung, C., Lee, Z.W.Y., Chan, T.K.H.: Self-disclosure in social networking sites: the role of perceived cost, perceived benefits and social influence. Internet Res. 25, 279–299 (2015). https://doi.org/10.1108/IntR-09-2013-0192
Henseler, J., Ringle, C.M., Sinkovics, R.: The use of partial least squares path modeling in international marketing. Adv. Int. Mark. 20, 277–319 (2009). https://doi.org/10.1108/S1474-7979(2009)0000020014
Henseler, J., Hubona, G., Ray, P.A.: Using PLS path modeling in new technology research: updated guidelines (2016). https://doi.org/10.1108/imds-09-2015-0382
Fornell, C., Larcker, D.F.: Structural equation models with unobservable variables and measurement error: algebra and statistics. J. Mark. Res. 382–388 (1981)
Henseler, J., Ringle, C.M., Sarstedt, M.: A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 43, 115–135 (2014). https://doi.org/10.1007/s11747-014-0403-8
Hu, L., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equ. Model. Multidisc. J. 6, 1–55 (1999)
Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9, 50–60 (2010). https://doi.org/10.1016/j.elerap.2009.05.001
Chang, S.E., Liu, A.Y., Shen, W.C.: User trust in social networking services: a comparison of Facebook and LinkedIn. Comput. Hum. Behav. 69, 207–217 (2017). https://doi.org/10.1016/j.chb.2016.12.013
Kapoor, K.K., Tamilmani, K., Rana, N.P., Patil, P., Dwivedi, Y.K., Nerur, S.: Advances in social media research: past, present and future. Inf. Syst. Front. 20(3), 531–558 (2018)
Aladwani, A.M., Dwivedi, Y.K.: Towards a theory of SocioCitizenry: quality anticipation, trust configuration, and approved adaptation of governmental social media. Int. J. Inf. Manag. 43, 261–272 (2018)
Hossain, M.A., Dwivedi, Y.K., Chan, C., Standing, C., Olanrewaju, A.S.: Sharing political content in online social media: a planned and unplanned behaviour approach. Inf. Syst. Front. 20(3), 485–501 (2018)
Shiau, W.-L., Dwivedi, Y.K., Yang, H.-S.: Co-citation and cluster analyses of extant literature on social networks. Int. J. Inf. Manag. 37(5), 390–399 (2017)
Shiau, W.-L., Dwivedi, Y.K., Lai, H.-H.: Examining the core knowledge on Facebook. Int. J. Inf. Manag. 43, 52–63 (2018)
Alalwan, A.A., Rana, N.P., Dwivedi, Y.K., Algharabat, R.: Social media in marketing: a review and analysis of the existing literature. Telemat. Inform. 34(7), 1177–1190 (2017)
Dwivedi, Y.K., Kapoor, K.K., Chen, H.: Social media marketing and advertising. Mark. Rev. 15(3), 289–309 (2015)
Rathore, A.K., Ilavarasan, P.V., Dwivedi, Y.K.: Social media content and product co-creation: an emerging paradigm. J. Enterp. Inf. Manag. 29(1), 7–18 (2016)
Shareef, M.A., Mukerji, B., Dwivedi, Y.K., Rana, N.P., Islam, R.: Social media marketing: comparative effect of advertisement sources. J. Retail. Consum. Serv. 46, 58–69 (2019)
Abed, S.S., Dwivedi, Y.K., Williams, M.D.: Social media as a bridge to e-commerce adoption in SMEs: a systematic literature review. Mark. Rev. 15(1), 39–57 (2015)
Plume, C.J., Dwivedi, Y.K., Slade, E.L.: Social Media in the Marketing Context: A State of the Art Analysis and Future Directions. Chandos Publishing, Amsterdam (2016)
Dwivedi, Y.K., et al. (eds.): Social Media: The Good, the Bad, and the Ugly, vol. 9844. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-45234-0
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A
Summary of models on privacy and self-disclosure
Independent variables | Mediator variables | Dependent variables | Reference |
---|---|---|---|
Privacy awareness Privacy-seeking behavior Privacy concerns | Trust Activity | Sharing intentions | Malik et al. [33] |
Privacy awareness Privacy social norms Privacy policy Privacy control | Privacy value Privacy concerns | Self-disclosure | Zlatolas et al. [37] |
Privacy Policy Online privacy concern | Trust | Willingness to provide personal information | Wu et al. [49] |
Appendix B
Research Items
Self-disclosure on SNS
-
SD1: I have a comprehensive profile on my favorite social networking site
-
SD2: I find time to keep my profile up-to-date
-
SD3: I keep my friends updated about what is going on in my life through my favorite social networking site
-
SD4: When I have something to say, I like to share it on my favorite social networking site
Trust in SNS’s Service Provider
-
TP1: My favorite social networking site is open and receptive to the needs of its members
-
TP2: My favorite social networking site makes good-faith efforts to address most member concerns TP3 My favorite social networking site is also interested in the well-being of its members, not just its own
-
TP4: My favorite social networking site is honest in its dealings with me
-
TP5: My favorite social networking site keeps its commitments to its members
-
TP6: My favorite social networking site is trustworthy
Trust in SNS’s Members
-
TM1: Other members on my favorite social networking site will do their best to help me
-
TM2: Members on my favorite social networking site care about the well-being of other member on the site
-
TM3: Members on my favorite social networking site are open and receptive to each other’s needs TM4 Members on my favorite social networking site are honest in dealing with each other
-
TM5: Members on my favorite social networking site keep their promises
-
TM6: Other members on my favorite social networking site are trustworthy
Privacy Invasion Experience
-
PIE1: I have you personally been victim of what felt like an invasion of privacy on a social networking site?
-
PIE2: I have heard or read during the last year about the use and potential misuse of personal information about users on social networking sites?
Privacy Awareness
-
PA1: I have read the privacy statement of my favorite social networking site
-
PA2: The privacy statement of my favorite social networking site is easy to understand
-
PA3: The privacy settings of my favorite social networking site are easy to use
-
PA4: I understand all the privacy setting of my favorite social networking site
-
PA5: I am aware of all the appropriate actions to ensure my privacy on favorite social networking site
-
PA6: I am aware of my privacy rights and responsibilities on my favorite social networking site
Privacy-seeking Behavior
-
PSB1: Since joining this social networking site, I have changed the privacy settings multiple times PSB2: I usually keep track of my photos shared on this social networking site
-
PSB3: I usually delete my photos shared on this social networking site
-
PSB4: I usually think carefully before sharing my photos on this social networking site
Privacy Concerns
-
PC1: The information is share could be misused by the social networking site
-
PC2: The information I share on social networking sites could be accessed by third parties
-
PC3: The information I share on social networking sites could be misused by other use on the social networking site
-
PC4: The information I share on social networking sites could be seen by unwanted people
-
PC5: The information I share on social networking sites could reveal private information
-
PC6: Information I disclose on favorite social networking site could have negative consequences that I cannot foresee
Rights and permissions
Copyright information
© 2019 IFIP International Federation for Information Processing
About this paper
Cite this paper
Fianu, E., Ofori, K.S., Boateng, R., Ampong, G.O.A. (2019). The Interplay Between Privacy, Trust and Self-disclosure on Social Networking Sites. In: Dwivedi, Y., Ayaburi, E., Boateng, R., Effah, J. (eds) ICT Unbounded, Social Impact of Bright ICT Adoption. TDIT 2019. IFIP Advances in Information and Communication Technology, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-030-20671-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-20671-0_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20670-3
Online ISBN: 978-3-030-20671-0
eBook Packages: Computer ScienceComputer Science (R0)