7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Understanding social media users’ privacy-protection behaviors

      , ,
      Information & Computer Security
      Emerald

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Purpose

          This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the number of users and functionality; it is important to understand social media user privacy-protection behaviors and the users’ psychological underpinnings driving those behaviors. Among these, perceptions are the users’ evaluation of their privacy concerns and data sharing benefits inherent in social media use which influence the users’ behaviors to protect their privacy.

          Design/methodology/approach

          To research these issues, a theoretical model and hypotheses were developed, based on self-efficacy theory. The theoretical model was empirically tested using 193 questionnaire responses collected from students enrolled in business courses at a medium-sized university in the western USA. All the respondents reported that they routinely use social media. The empirical analysis was performed using structural equations modeling in PC SAS version 9.4, procedure Calis.

          Findings

          The estimation of the paths in the structural model indicates that privacy concerns positively influence social media users’ protection behaviors while the perceived benefits of data sharing negatively influence protection behaviors. Privacy experience positively influences privacy concerns. Alternatively, social media use positively influences social media self-efficacy and perceived usefulness, which, in turn, have meaningful influences on data sharing benefits.

          Originality/value

          Previous findings about the effect of self-efficacy on protection behaviors has been inconclusive. This study adds some clarity. Specifically, the findings suggest that the effect depends upon the foci of self-efficacy. While higher self-efficacy with respect to using privacy-related features of a specific technology tends to lead to greater privacy concerns, higher self-efficacy with respect to the more general technology (e.g. social media, computer) seems to affect protection behaviors through perceived benefits. Further, the results of this study offer conclusions about the roles that privacy experiences, social media use and perceived social media benefits play in affecting protection behaviors.

          Related collections

          Most cited references80

          • Record: found
          • Abstract: not found
          • Article: not found

          Evaluating Structural Equation Models with Unobservable Variables and Measurement Error

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Self-efficacy: Toward a unifying theory of behavioral change.

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Self-efficacy mechanism in human agency.

                Bookmark

                Author and article information

                Journal
                Information & Computer Security
                ICS
                Emerald
                2056-4961
                2056-4961
                November 17 2021
                May 27 2022
                November 17 2021
                May 27 2022
                : 30
                : 3
                : 324-345
                Article
                10.1108/ICS-07-2021-0099
                23811857-ffda-47f8-a44e-2695fc999bbd
                © 2022

                https://www.emerald.com/insight/site-policies

                History

                Comments

                Comment on this article