How people protect their privacy on facebook: A cost‐benefit view

Realizing the many benefits from Facebook require users to share information reciprocally, which has overtime created trillions of bytes of information online—a treasure trove for cybercriminals. The sole protection for any user are three sets of privacy protections afforded by Facebook: settings that control information privacy (i.e., security of social media accounts and identity information), accessibility privacy or anonymity (i.e., manage who can connect with a user), and those that control expressive privacy (i.e., control who can see a user's posts and tag you). Using these settings, however, involves a trade‐off between making oneself accessible and thereby vulnerable to potential attacks, or enacting stringent protections that could potentially make someone inaccessible thereby reducing the benefits that are accruable through social media. Using two theoretical frameworks, Uses and Gratifications (U&G) and Protection Motivation Theory (PMT), the research examined how individuals congitvely juxtaposed the cost of maintaining privacy through the use of these settings against the benefits of openness. The application of the U&G framework revealed that social need fulfillment was the single most significant benefit driving privacy management. From the cost standpoint, the PMT framework pointed to perceived severity impacting expressive and information privacy, and perceived susceptability influencing accessibility privacy.

[1]  Andrew Howes,et al.  The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites , 2009, CHI.

[2]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[3]  Michael A. Stefanone,et al.  Strategic self-presentation online: A cross-cultural study , 2013, Comput. Hum. Behav..

[4]  Robert P. Minch,et al.  Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[5]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[6]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[7]  Dahui Li,et al.  Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..

[8]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[9]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[10]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[11]  S. Wok,et al.  Religious motives for using facebook among university muslim students , 2011 .

[12]  Arun Vishwanath,et al.  From Belief-Importance to Intention: The Impact of Framing on Technology Adoption , 2009 .

[13]  Xiaoming Li,et al.  Protection motivation theory and adolescent drug trafficking: relationship between health motivation and longitudinal risk involvement. , 2005, Journal of pediatric psychology.

[14]  Shuting Xu,et al.  Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .

[15]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[16]  Adam N. Joinson,et al.  Looking at, looking up or keeping up with people?: motives and use of facebook , 2008, CHI.

[17]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[18]  Arun Vishwanath,et al.  The 360° News Experience: Audience Connections with the Ubiquitous News Organization , 2008 .

[19]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[20]  George Dvorak Collective education , 2001, UBIQ.

[21]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[22]  Monika Taddicken,et al.  The Uses of Privacy Online: Trading a Loss of Privacy for Social Web Gratifications? , 2011, Privacy Online.

[23]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[24]  Asimina Vasalou,et al.  Digital Crowding: Privacy, Self-Disclosure, and Technology , 2011, Privacy Online.

[25]  Yasmin Ibrahim,et al.  The new risk communities: Social networking sites and risk , 2008 .

[26]  John Raacke,et al.  MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites , 2008, Cyberpsychology Behav. Soc. Netw..

[27]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[28]  Stephanie Moser,et al.  How People Perceive and Will Cope with Risks from the Diffusion of Ubiquitous Information and Communication Technologies , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[29]  J. Doll,et al.  Motives of Adolescents to Use the Internet as a Function of Personality Traits, Personal and Social Factors , 2001 .

[30]  Lauren I. Labrecque,et al.  Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices , 2009 .

[31]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[32]  S. Upadhyaya,et al.  Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens , 2009, IEEE Transactions on Professional Communication.

[33]  David M'Raïhi,et al.  Designing a Trade-Off Between Usability and Security: A Metrics Based-Model , 2007, INTERACT.

[34]  Arun Vishwanath,et al.  Diffusion of deception in social media: Social contagion effects and its antecedents , 2014, Information Systems Frontiers.

[35]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[36]  Anthony M. Limperos,et al.  Uses and Grats 2.0: New Gratifications for New Media , 2013 .

[37]  I. Altman,et al.  Social penetration: The development of interpersonal relationships , 1973 .

[38]  Walter G. Stephan,et al.  Protection Motivation Theory: Prediction of Intentions to Engage in Anti‐Nuclear War Behaviors1 , 1986 .

[39]  Namkee Park,et al.  Effects of self-disclosure on relational intimacy in Facebook , 2011, Comput. Hum. Behav..

[40]  K. Witte Putting the fear back into fear appeals: The extended parallel process model , 1992 .