Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 16
Page No. 2992 - 2998

Factor Motivating Privacy Protection Behaviour Strategies and Information Privacy Concern in Social Networking Sites

Authors : Nur Fadzilah Othman, Rabiah Ahmad and Muliati Sedek

References

Ary, D., L.C. Jacobs, A. Razavieh and C.K. Sorensen, 2010. Introduction to Research in Education. 8th Edn., Cengage Learning, Belmont, CA., USA., ISBN-13: 978-0495601227, Pages: 696.

Awang, Z., 2012. A Handbook on SEM: Structural Equation Modeling. 4th Edn., Centre For Graduate Studies, Kuala Lumpur, Malaysia.

Baumgartner, H. and C. Homburg, 1996. Application of structural equation modeling in marketing and consumer research: A review. Int. J. Res. Market., 13: 139-161.
CrossRef  |  

Burgoon, J.K., R. Parrott, B.A. Le Poire, D.L. Kelley, J.B. Walther and D. Perry, 1989. Maintaining and restoring privacy through communication in different types of relationships. J. Social Personal Relationships, 6: 131-158.
CrossRef  |  Direct Link  |  

Byrne, B.M., 2013. Structural Equation Modelling with Lisrel, Prelis and Simplis: Basic Concepts, Applications and Programming. 3rd Edn., Lawrence Erlbaum Associates Inc, Mahwah, New Jersey, ISBN:0-8058-2924-5,.

Cohen, J., P. Cohen, S.G. West and L.S. Aiken, 2002. Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. 3rd Edn., Routledge, New York, ISBN: 9780203774441, Pages: 536.

Colquitt, J.A., 2001. On the dimensionality of organizational justice: A construct validation of a measure. J. Applied Psychol., 86: 386-400.
CrossRef  |  Direct Link  |  

Dhawan, S. and S. Goel, 2014. Analysis of pattern of information revelation and site use behavior in social networking sites. Int. J. Comput. Applic. Technol. Res., 3: 42-44.
Direct Link  |  

Dinev, T. and P. Hart, 2004. Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inform. Technol., 23: 413-422.
CrossRef  |  Direct Link  |  

Doll, W.J., W. Xia and G. Torkzadeh, 1994. A confirmatory factor analysis of the end-user computing satisfaction instrument. MIS Q., 18: 453-461.
CrossRef  |  Direct Link  |  

Feng, Y. and W. Xie, 2014. Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav., 33: 153-162.
CrossRef  |  Direct Link  |  

Gibbs, J.L., N.B. Ellison and C.H. Lai, 2011. First comes love, then comes google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res., 38: 70-100.
CrossRef  |  Direct Link  |  

Goodwin, C., 1992. A conceptualization of motives to seek privacy for nondeviant consumption. J. Consum. Psychol., 1: 261-284.
CrossRef  |  Direct Link  |  

Jabar, J., 2011. An empirical study of strategic technology alliances and the performance of Malaysian manufactures. Msc Thesis, University of South Australia, Adelaide, South Australia.

Ji, P. and P.S. Lieber, 2010. Am I safe? Exploring relationships between primary territories and online privacy. J. Internet Commerce, 9: 3-22.
CrossRef  |  Direct Link  |  

Jia, H., P.J. Wisniewski, H. Xu, M.B. Rosson and J.M. Carroll, 2015. Risk-taking as a learning process for shaping teen's online information privacy behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, February 14-15, 2015, ACM, Vancouver, British, ISBN:978-1-4503-2922-4, pp: 583-599.

Jiang, Z., C.S. Heng and B.C. Choi, 2013. Privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res., 24: 579-595.
CrossRef  |  Direct Link  |  

Joreskog, K.G., 1993. Testing Structural Equation Models. In: Testing Structural Equation Models, Bollen, K.A. and J.S. Long (Eds.). Chapter 12, Sage Publication, Newbury Park, CA., USA., ISBN-13: 978-0803945074, pp: 294-316.

Korzaan, M.L. and K.T. Boswell, 2008. The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst., 48: 15-24.
Direct Link  |  

Lwin, M.O., B. Li and R.P. Ang, 2011. Stop bugging me: An examination of adolescents protection behavior against online harassment. J. Adolescence, 35: 31-41.
Direct Link  |  

Marett, K., A.L. McNab and R.B. Harris, 2011. Social networking websites and posting personal information: An evaluation of protection motivation theory. AIS Trans. Hum.-Comput. Interact., 3: 170-188.
Direct Link  |  

McDonald, A.M. and L.F. Cranor, 2010. Americans attitudes about internet behavioral advertising practices. Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, October 4-8, 2008, ACM, Chicago, Illinois, ISBN:978-1-4503-0096-4, pp: 63-72.

Mohamed, N. and I.H. Ahmad, 2012. Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Comput. Hum. Behav., 28: 2366-2375.
CrossRef  |  Direct Link  |  

Petronio, S., 2002. Communication Privacy Management Theory. In: Boundaries of Privacy: Dialectics of Disclosure, Petronio, S. (Ed.). State University of New York Press, USA., ISBN-13: 9780791455159, pp: 168-180.

Pinsonneault, A. and N. Heppel, 1997. Anonymity in group support systems research: A new conceptualization, measure and contingency framework. J. Manage. Inform. Syst., 14: 89-108.
CrossRef  |  Direct Link  |  

Rhee, H.S., C. Kim and Y.U. Ryu, 2009. Self-efficacy in information security: Its influence on end users information security practice behavior. Comput. Secur., 28: 816-826.
Direct Link  |  

Rogers, R.W., 1983. Cognitive and Physiological Process in fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. In: Social Psychophysiology: A Sourcebook, Cacioppo, J.T. and R.E. Petty (Eds.). Guildford Press, London, UK., ISBN-13: 9780898626261, pp: 153-176.

Salleh, N., R. Hussein, N. Mohamed, N.S.A. Karim, A.R. Ahlan and U. Aditiawarman, 2012. Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. J. Internet Social Networking Virtual Commun. 10.5171/2012.281869

Sedek, M., R. Mahmud, H.A. Jalil and S.M. Daud, 2012. Types and levels of ubiquitous technology use among ICT undergraduates. Procedia-Social Behav. Sci., 64: 255-264.
CrossRef  |  Direct Link  |  

Smit, E.G., V.G. Noort and H.A. Voorveld, 2014. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe. Comput. Hum. Behav., 32: 15-22.
Direct Link  |  

Smith, H.J., S.J. Milberg and S. Burke, 1996. Information privacy: Measuring individual's concerns about organizational practices. MIS Quart., 20: 167-196.
CrossRef  |  Direct Link  |  

Statista, 2016. Leading global social networks 2016. Statista Database company, http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

Vandebosch, H. and K. van Cleemput, 2009. Cyberbullying among youngsters: Profiles of bullies and victims. New Media Soc., 11: 1349-1371.
CrossRef  |  Direct Link  |  

Viegas, F.B., 2005. Bloggers' expectations of privacy and accountability: An initial survey. J. Comput.-Mediated Commun., Vol. 10, No. 3. 10.1111/j.1083-6101.2005.tb00260.x

Walther, J.B., 1996. Computer-mediated communication: Impersonal, interpersonal and hyperpersonal interaction. Commun. Res., 23: 3-43.
CrossRef  |  Direct Link  |  

Warren, S.D. and L.D. Brandeis, 1890. The right to privacy. Harvard Law Rev., 4: 193-220.
Direct Link  |  

Xu, H., T. Dinev, J. Smith and P. Hart, 2011. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst., 12: 798-824.
Direct Link  |  

Yao, M.Z. and A.J. Flanagin, 2006. A self-awareness approach to computer-mediated communication. Comput. Hum. Behav., 22: 518-544.
CrossRef  |  Direct Link  |  

Youn, S., 2009. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J. Consum. Affairs, 43: 389-418.
CrossRef  |  Direct Link  |  

Zheleva, E. and L. Getoor, 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. Proceedings of the 18th International Conference on World Wide Web, April 20-24, 2009, Madrid, Spain, pp: 531-540.

Zlatolas, L.N., T. Welzer, M. Hericko and M. Holbl, 2015. Privacy antecedents for SNS self-disclosure: The case of Facebook. Comput. Hum. Behav., 45: 158-167.
CrossRef  |  Direct Link  |  

Zwick, D. and N. Dholakia, 2014. Whose identity is it anyway? Consumer representation in the age of database marketing. J. Macromarketing, 24: 31-43.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved