How Much for My Name? Privacy Perceptions and Motivations for Sharing Personal Information on Social Networking Sites
Keywords:Social Network Sites, Privacy, Personally Identifiable Information, Personal Information Sharing
This study surveyed young adults in order to study their attitudes toward what personally identifiable information they deemed private and what they hoped to gain from sharing personal information on social network services. Respondents chose telephone numbers, home addresses, search history, date of birth, and online purchases most often as personal information they felt was private. As far as motivations for sharing this information, users seeking to manage friendships or entertainment on social networks were found to also spend more time on them, find them more important, and to be more willing to share information. These findings help explain what SNS users feel is private and what benefit they hope to gain from sharing it.
Ball-Rokeach, S. J., & DeFleur, M. L. (1976). A dependency model of mass-media effects. Communication research, 3(1), 3-21.
Barker, D.A., & Barker, L.L. (1989). Survey research. In Emmert, P., & Barker, L.L. (Eds.), Measurement of communication behavior. (pp. 168-196). White Plains, NY: Longman.
Bartlett, M. S. (1954). A note on the multiplying factors for various χ 2 approximations. Journal of the Royal Statistical Society. Series B (Methodological), 296-298.
Book, C. L., & Barnett, B. (2006). PCTV: Consumers, expectancy-value and likely adoption. Convergence: The International Journal of Research into New Media Technologies, 12(3), 325-339.
boyd, d.. (2010). "Social network sites as networked publics: Affordances,
dynamics, and implications." In Z. Papacharissi, Networked Self: Identity, Community, and Culture on Social Network Sites (pp. 39-58). New York: Routledge.
boyd, d., and Ellison, N.B. (2007). "Social network sites: Definition, history, and scholarship." Journal of Computer-Mediated Communication 13(1), 210-230.
Cadwalladr, C., & Graham-Harrison, E. (2018). How Cambridge Analytica turned Facebook ‘likes’ into a lucrative political tool. The Guardian. Retrieved from: https://www.theguardian.com/technology/2018/mar/17/facebook-cambridge-analytica-kogan-data-algorithm
Dunleavy, P., & Weir, S. (1998). “How to freshen up democracy.” New Statesman, 11(535), 571-572.
Dunne, Á., Lawlor, M. A., & Rowley, J. (2010). Young people's use of online social networking sites–a uses and gratifications perspective. Journal of Research in Interactive Marketing, 4(1), 46-58.
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer‐Mediated Communication, 12(4), 1143-1168.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, Mass: Addison-Wesley Pub. Co.
Galloway, J. J. (1981). Audience uses and gratifications: An expectancy model. Communication Research, 8(4), 435-449.
Hao, K. (2017). The complete guide to the Equifax breach. Quartz. Retrieved from: https://qz.com/1079253/the-complete-guide-to-the-equifax-breach/
Hu, S. L., & Leung, L. (2003). Effects of expectancy-value, attitudes, and use of the Internet on psychological empowerment experienced by Chinese women at the workplace. Telematics and Informatics, 20(4), 365-382.
Joinson, A. N. (2008, April). Looking at, looking up or keeping up with people? Motives and use of Facebook. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems (pp. 1027-1036). ACM.
Kaiser, H. F. (1970). A second generation little jiffy. Psychometrika, 35(4), 401-415.
Katz, E., Blumler, J. G., & Gurevitch, M. (1973). Uses and gratifications research. Public Opinion Quarterly, 37(4), 509-523.
Ko, H., Cho, C. H., & Roberts, M. S. (2005). Internet uses and gratifications: a structural equation model of interactive advertising. Journal of advertising, 34(2), 57-70.
La Monica, P. R. (2018). Facebook has lost $80 billion in market value since its data scandal. CNN Money. Retrieved from: http://money.cnn.com/2018/03/27/news/companies/facebook-stock-zuckerberg/index.html
LaRose, R., & Eastin, M. S. (2004). A social cognitive theory of internet uses and gratifications: Toward a new model of media attendance. Journal of Broadcasting & Electronic Media, 48(3), 358-377.
LaRose, R., Lai, Y. J., Lange, R., Love, B., & Wu, Y. (2005). Sharing or piracy? An exploration of downloading behavior. Journal of Computer‐Mediated Communication, 11(1), 1-21.
Leung, L. (2008). Internet embeddedness: links with online health information seeking, expectancy value/quality of health information websites, and Internet usage patterns. CyberPsychology & Behavior, 11(5), 565-569.
Lim, H., & Dubinsky, A. J. (2004). Consumers' perceptions of e-shopping characteristics: an expectancy-value approach. Journal of Services Marketing, 18(7), 500-513.
McLeod, J. M., & Becker, L. B. (1974). Testing the validity of gratification measures through political effects analysis. The uses of mass communications: Current perspectives on gratifications research, 3, 137-164.
Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6).
Palmgreen, P., & Rayburn, J. D. (1979). Uses and Gratifications and Exposure To Public Television A Discrepancy Approach. Communication Research, 6(2), 155-179.
Palmgreen, P., Wenner, L. A., & Rayburn, J. D. (1981). Gratification discrepancies and news program choice. Communication Research, 8(4), 451-478.
Palmgreen, P., & Rayburn, J. D. (1982). Gratifications sought and media exposure an expectancy value model. Communication Research, 9(4), 561-580.
Parker, B. J., & Plank, R. E. (2000). A uses and gratifications perspective on the Internet as a new information source. American Business Review, 18(2), 43-49.
Raacke, J., & Bonds-Raacke, J. (2008). MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites. Cyberpsychology & behavior, 11(2), 169-174.
Rhee, K. Y., & Kim, W. B. (2004). The adoption and use of the Internet in South Korea. Journal of Computer‐Mediated Communication, 9(4), 00-00.
Ruggiero, T. E. (2000). Uses and gratifications theory in the 21st century. Mass communication & society, 3(1), 3-37.
Rosenberg, M., Confessore, N., & Cadwalladr, C. (2018). How Trump Consultants Exploited the Facebook Data of Millions. The New York Times. Retrieved from: https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.htm
Schwartz, Paul M., and Daniel J. Solove. "The PII problem: Privacy and a new concept of personally identifiable information." NYUL rev. 86 (2011): 1814.
Solove, D. J. "Conceptualizing Privacy." California Law Review 90(4), 2002: 1087-1155.
Sorrentino, R. M., & Higgins, E. T. (1986). Motivation and cognition: Warming up to synergism. Handbook of motivation and cognition: Foundations of social behavior, 1, 3-19.
Stafford, T. F., Stafford, M. R., & Schkade, L. L. (2004). Determining uses and gratifications for the Internet. Decision Sciences, 35(2), 259-288.
Sun, S., Rubin, A. M., & Haridakis, P. M. (2008). The role of motivation and media involvement in explaining Internet dependency. Journal of Broadcasting & Electronic Media, 52(3), 408-431.
Van den Broeck, A., Vansteenkiste, M., Lens, W., & De Witte, H. (2010). Unemployed individuals' work values and job flexibility: An explanation from expectancy‐value theory and self‐determination theory. Applied Psychology, 59(2), 296-317.
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).