Privacy, Trust, and Manipulation in Online Relationships

Abstract This work studies factors that influence personal information disclosure coming from vulnerable users who may adopt risky online behavior on social media. These users trust their online relationships and reveal confidential or sensitive information, causing damage to themselves and their relatives and friends. We carried a survey-based study on 1,532 participants to see if they would reveal sensitive information when they have close online relationships whom they trust. The results led to several discoveries, especially concerning the factors affecting the disclosure in online relationships, and those affecting the attitude toward online manipulation. Moreover, this study attested a strong positive relation between disclosure issues and the user’s attitudes toward manipulation. The latter which is affected by their online behavior and social interaction ties. In a nutshell, users attitudes toward manipulation may lead to self-disclosure on the one hand, and these attitudes could be identified through their social behavior on the other hand.

[1]  Sulin Ba,et al.  Establishing Online Trust Through a Community Responsibility System , 2001, Decis. Support Syst..

[2]  I. Altman,et al.  Social penetration: The development of interpersonal relationships , 1973 .

[3]  Sonja Utz,et al.  Self-disclosure on SNS: Do disclosure intimacy and narrativity influence interpersonal closeness and social attraction? , 2017, Comput. Hum. Behav..

[4]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[5]  Daniel J. Solove,et al.  Risk and Anxiety: A Theory of Data Breach Harms , 2016 .

[6]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[7]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[8]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[9]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[10]  Esma Aïmeur,et al.  A Privacy Awareness System for Facebook Users , 2012 .

[11]  Herbert C. Kelman,et al.  Manipulation of Human Behavior: An Ethical Dilemma for the Social Scientist* , 1965 .

[12]  Pauline Ratnasingam,et al.  Trust in inter-organizational exchanges: a case study in business to business electronic commerce , 2005, Decis. Support Syst..

[13]  Jan H. P. Eloff,et al.  Cyber-security: Identity deception detection on social media platforms , 2018, Comput. Secur..

[14]  Relationship Formation , 2014, Encyclopedia of Social Network Analysis and Mining.

[15]  Sol Levine,et al.  Exchange as a Conceptual Framework for the Study of Interorganizational Relationships , 1961 .

[16]  Armin Falk,et al.  A Theory of Reciprocity , 2001, Games Econ. Behav..

[17]  Gilles Brassard,et al.  CLiKC: A Privacy-Mindful Approach When Sharing Data , 2016, CRiSIS.

[18]  Mehrdad Koohikamali,et al.  Beyond self-disclosure: Disclosure of information about others in social network sites , 2017, Comput. Hum. Behav..

[19]  Eric T. G. Wang,et al.  Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..

[20]  Jeffrey T. Hancock,et al.  From Perception to Behavior , 2013, Commun. Res..

[21]  Peter M. Bentler,et al.  Structural Equation Modeling , 2003 .

[22]  Esma Aïmeur,et al.  Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[23]  G. Hancock,et al.  EDUCATIONAL AND PSYCHOLOGICAL MEASUREMENT HANCOCK AND FREEMAN POWER AND SAMPLE SIZE FOR THE ROOT MEAN SQUARE ERROR OF APPROXIMATION TEST OF NOT CLOSE FIT IN STRUCTURAL EQUATION MODELING , 2001 .

[24]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[25]  A. Satorra,et al.  A scaled difference chi-square test statistic for moment structure analysis , 1999 .

[26]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[27]  Jacob Cohen,et al.  Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .

[28]  P. Cozby Self-disclosure: a literature review. , 1973, Psychological bulletin.

[29]  Natalie C. Ebner,et al.  Uncovering Susceptibility Risk to Online Deception in Aging. , 2020, The journals of gerontology. Series B, Psychological sciences and social sciences.

[30]  John P. Caughlin,et al.  Deception in online dating: Significance and implications for the first offline date , 2018, New Media Soc..

[31]  Rob Grace,et al.  Challenges in the use of social media data for the next generation analyst , 2015, Commercial + Scientific Sensing and Imaging.

[32]  B. Cornwell,et al.  Love on the Internet: involvement and misrepresentation in romantic relationships in cyberspace vs. realspace , 2001, Comput. Hum. Behav..

[33]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[34]  Chun-Ming Chang,et al.  Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..

[35]  Laura Stein,et al.  New Global Media and Communication Policy: The Role of the State in the Twenty-First Century , 2002 .

[36]  Rachel A. Elphinston,et al.  Time to Face It! Facebook Intrusion and the Implications for Romantic Jealousy and Relationship Satisfaction , 2011, Cyberpsychology Behav. Soc. Netw..

[37]  Jesse Fox,et al.  Relational dialectics and social networking sites: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution , 2014, Comput. Hum. Behav..

[38]  I. Altman,et al.  Interpersonal exchange as a function of rewards and costs and situational factors: Expectancy confirmation-disconfirmation. , 1969 .

[39]  Aniket Kittur,et al.  Crowdsourcing user studies with Mechanical Turk , 2008, CHI.

[40]  Structural Equation Modeling: Foundations and Extensions (Advanced Quantitative Techniques in the Social Sciences Series, Vol. 10.) by David Kaplan , 2003 .

[41]  M. Clyne,et al.  The kids are alright , 2013, Nature Reviews Urology.

[42]  Christian Coons,et al.  Manipulation: Theory and Practice , 2014 .

[43]  Sonia Livingstone,et al.  Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..

[44]  I. Altman,et al.  Intimacy-Scaled Stimuli for Use in Studies of Interpersonal Relations , 1966, Psychological reports.

[45]  Esma Aïmeur,et al.  Data privacy: An end-user perspective , 2013 .

[46]  A. Maslow A Theory of Human Motivation , 1943 .

[47]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[48]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[49]  B. Sockman,et al.  An Exploratory Study of Cyberbullying with Undergraduate University Students. , 2011 .

[50]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[51]  Russell L. Purvis,et al.  Trust-building mechanisms utilized in outsourced IS development projects: a case study , 2004, Inf. Manag..

[52]  Esma Aïmeur,et al.  When changing the look of privacy policies affects user trust: An experimental study , 2016, Comput. Hum. Behav..

[54]  Soo Yun Shin,et al.  Self-disclosure and liking in computer-mediated communication , 2017, Comput. Hum. Behav..

[55]  E. Zurbriggen,et al.  Negotiating privacy and intimacy on social media: Review and recommendations. , 2016 .

[56]  Sherali Zeadally,et al.  Online deception in social media , 2014, Commun. ACM.

[57]  S. Jourard,et al.  Some factors in self-disclosure. , 1958, Journal of abnormal psychology.

[58]  Chris Fullwood,et al.  Up-Dating: Ratings of Perceived Dating Success Are Better Online than Offline , 2018, Cyberpsychology Behav. Soc. Netw..

[59]  Tanupriya Choudhury,et al.  Detection of Fake Profile in Online Social Networks Using Machine Learning , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[60]  Beth Rajan Sockman and Steven Koehn Carol M. Walker An Exploratory Study of Cyberbullying with Undergraduate University Students , 2011 .

[61]  Richard W. Bloom,et al.  Foundations of Psychological Profiling: Terrorism, Espionage, and Deception , 2013 .

[62]  P. Bentler,et al.  Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .

[63]  Xiao Ma,et al.  Anonymity, Intimacy and Self-Disclosure in Social Media , 2016, CHI.

[64]  Katelyn Y. A. McKenna,et al.  Relationship formation on the Internet: What's the big attraction? , 2002 .

[65]  Emily Christofides,et al.  Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..

[66]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..