2013
DOI: 10.1287/isre.1120.0441
|View full text |Cite
|
Sign up to set email alerts
|

Research Note—Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions

Abstract: P rivacy is of prime importance to many individuals when they attempt to develop online social relationships.Nonetheless, it has been observed that individuals' behavior is at times inconsistent with their privacy concerns, e.g., they disclose substantial private information in synchronous online social interactions, even though they are aware of the risks involved. Drawing on the hyperpersonal framework and the privacy calculus perspective, this paper elucidates the interesting roles of privacy concerns and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
165
0
5

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 253 publications
(186 citation statements)
references
References 77 publications
5
165
0
5
Order By: Relevance
“…When submitting a resume or interviewing for a position, job seekers must not only choose what information to include but also what information to exclude. When companies threaten privacy with requests for social media logins, job applicants can provision information in two ways (Jiang, Heng, & Choi, 2013): they can refuse to disclose their social media login credentials or they can misrepresent their social media activity.…”
Section: Information Provisionmentioning
confidence: 99%
“…When submitting a resume or interviewing for a position, job seekers must not only choose what information to include but also what information to exclude. When companies threaten privacy with requests for social media logins, job applicants can provision information in two ways (Jiang, Heng, & Choi, 2013): they can refuse to disclose their social media login credentials or they can misrepresent their social media activity.…”
Section: Information Provisionmentioning
confidence: 99%
“…Although Eliasoph and Lichterman (2003) made this conclusion in relation to offline groups, a wealth of existing literature supports the idea that online groups interacting in virtual environments behave similarly to offline groups (Jiang, Heng, & Choi, 2013). For instance, Yee, Bailenson, Urbanek, Chang, and Merget (2007) conclude that social interactions in online environments are governed by similar norms and interaction patterns as those in the physical world even though the mode of interaction differs.…”
Section: Community Culturementioning
confidence: 94%
“…Triandis (1994) made this observation in relation to offline cultures, but the social dynamics in online collectives and groups have become increasingly similar to offline interactions (Jiang et al, 2013;Yee et al, 2007). Prior virtual community and computer-mediated communication research has demonstrated that online discussion forums have social norms that are expected to be followed and not following them may result in flaming and stronger in-group identification (Kayany, 1998;Kim, 2011).…”
Section: Interaction Of Culture-in-interaction and Occupational Culturementioning
confidence: 99%
“…Yet most of these studies have focused on investigating the general impact of privacy concerns on self-disclosure behaviours. While exceptional studies have recently attempted to identify factors pertinent to privacy concerns in the online environment (e.g., Jiang et al 2013), rarely has research focused on identifying the privacyrelated technical attributes in social media. Our study is meaningful in that it examines two key technical attributes of Facebook App that challenges privacy boundaries.…”
Section: 23mentioning
confidence: 99%
“…This paper has two objectives. First, past Information System (IS) research has substantially advanced our understanding of information privacy (e.g., Bélanger and Crossler 2011;Jiang et al 2013;Smith et al 2011). While IS literature has explored several aspects of information privacy, its primary focus has been on issues triggered by personal information collection (e.g., Malhotra et al 2004;Son and Kim 2008).…”
Section: Introductionmentioning
confidence: 99%