Control your Facebook: An analysis of online privacy literacy

被引:103
|
作者
Bartsch, Miriam [1 ,3 ]
Dienlin, Tobias [2 ,4 ]
机构
[1] Univ Hamburg, Inst Media & Commun, Von Melle Pk 6, D-20146 Hamburg, Germany
[2] Univ Hohenheim, Dept Media Psychol, Wollgrasweg 23, D-70599 Stuttgart, Germany
[3] Univ Hamburg, Inst Psychol, D-20146 Hamburg, Germany
[4] Hamburg Media Sch, Hamburg, Germany
关键词
Privacy literacy; Social network site; Facebook; Media psychology; Structural equation modeling; COVARIANCE STRUCTURE-ANALYSIS; SOCIAL NETWORKING SITES; PARADOX; DISCLOSURE; USERS;
D O I
10.1016/j.chb.2015.11.022
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
For an effective and responsible communication on social network sites (SNSs) users must decide between withholding and disclosing personal information. For this so-called privacy regulation, users need to have the respective skills in other words, they need to have online privacy literacy. In this study, we discuss factors that potentially contribute to and result from online privacy literacy. In an online questionnaire with 630 Facebook users, we found that people who spend more time on Facebook and who have changed their privacy settings more frequently reported to have more online privacy literacy. People with more online privacy literacy, in turn, felt more secure on Facebook and implemented more social privacy settings. A mediation analysis showed that time spend on Facebook and experience with privacy regulation did not per se increase safety and privacy behavior directly, stressing the importance of online privacy literacy as a mediator to a safe and privacy-enhancing online behavior. We conclude that Internet experience leads to more online privacy literacy, which fosters a more cautious privacy behavior on SNSs. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:147 / 154
页数:8
相关论文
共 50 条
  • [21] Users' Awareness of Privacy on Online Social Networking sites - Case Facebook
    Tuunainen, Virpi Kristiina
    Pitkanen, Olli
    Hovi, Marjaana
    [J]. 22ND BLED ECONFERENCE-EENABLEMENT: FACILITATING AN OPEN, EFFECTIVE AND REPRESENTATIVE ESOCIETY, 2009, : 1 - +
  • [22] Facebook privacy management strategies: A cluster analysis of user privacy behaviors
    Lankton, Nancy K.
    McKnight, D. Harrison
    Tripp, John F.
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 76 : 149 - 163
  • [23] Factors Influencing Facebook Usage and Facebook Addictive Tendency in University Students: The Role of Online Psychological Privacy and Facebook Usage Motivation
    Hong, Fu-Yuan
    Chiu, Su-Lin
    [J]. STRESS AND HEALTH, 2016, 32 (02) : 117 - 127
  • [24] THE MUSEUM OF ME: A VISUAL PRESENTATION OF YOUR ONLINE SOCIAL LIFE ON FACEBOOK
    Ekim, Berna
    [J]. VISUALIST 2012: INTERNATIONAL CONGRESS ON VISUAL CULTURE NEW APPROACHES IN COMMUNICATION, ART AND DESIGN DIGITALIZATION, 2012, : 98 - 106
  • [25] Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry
    Hoadley, Christopher M.
    Xu, Heng
    Lee, Joey J.
    Rosson, Mary Beth
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2010, 9 (01) : 50 - 60
  • [26] A Conceptual Framework for Measuring Personal Privacy Risks in Facebook Online Social Network
    Al-Asmari, Hanan A.
    Saleh, Mohamed S.
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 372 - 377
  • [27] Predicting online privacy protection for Facebook users with an extended theory of planned behavior
    Biber, Mustafa
    Louis, Winnifred R.
    Smith, Joanne R.
    [J]. JOURNAL OF SOCIAL PSYCHOLOGY, 2024,
  • [28] Privacy in the age of Facebook
    不详
    [J]. NEW SCIENTIST, 2011, 210 (2812) : 3 - 3
  • [29] Third-Party Apps on Facebook: Privacy and the Illusion of Control
    Wang, Na
    Xu, Heng
    Grossklags, Jens
    [J]. PROCEEDINGS OF THE 5TH ACM SYMPOSIUM ON COMPUTER HUMAN INTERACTION FOR MANAGEMENT OF INFORMATION TECHNOLOGY (CHIMIT 2011), 2011,
  • [30] Privacy Management for Facebook
    Baatarjav, Enkh-Amgalan
    Dantu, Ram
    Phithakkitnukoon, Santi
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 273 - 286