IDEAS home Printed from https://ideas.repec.org/a/bla/jinfst/v69y2018i5p700-709.html
   My bibliography  Save this article

How people protect their privacy on facebook: A cost†benefit view

Author

Listed:
  • Arun Vishwanath
  • Weiai Xu
  • Zed Ngoh

Abstract

Realizing the many benefits from Facebook require users to share information reciprocally, which has overtime created trillions of bytes of information online—a treasure trove for cybercriminals. The sole protection for any user are three sets of privacy protections afforded by Facebook: settings that control information privacy (i.e., security of social media accounts and identity information), accessibility privacy or anonymity (i.e., manage who can connect with a user), and those that control expressive privacy (i.e., control who can see a user's posts and tag you). Using these settings, however, involves a trade†off between making oneself accessible and thereby vulnerable to potential attacks, or enacting stringent protections that could potentially make someone inaccessible thereby reducing the benefits that are accruable through social media. Using two theoretical frameworks, Uses and Gratifications (U&G) and Protection Motivation Theory (PMT), the research examined how individuals congitvely juxtaposed the cost of maintaining privacy through the use of these settings against the benefits of openness. The application of the U&G framework revealed that social need fulfillment was the single most significant benefit driving privacy management. From the cost standpoint, the PMT framework pointed to perceived severity impacting expressive and information privacy, and perceived susceptability influencing accessibility privacy.

Suggested Citation

  • Arun Vishwanath & Weiai Xu & Zed Ngoh, 2018. "How people protect their privacy on facebook: A cost†benefit view," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 69(5), pages 700-709, May.
  • Handle: RePEc:bla:jinfst:v:69:y:2018:i:5:p:700-709
    DOI: 10.1002/asi.23894
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/asi.23894
    Download Restriction: no

    File URL: https://libkey.io/10.1002/asi.23894?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Randa Aljably & Yuan Tian & Mznah Al-Rodhaan & Abdullah Al-Dhelaan, 2019. "Anomaly detection over differential preserved privacy in online social networks," PLOS ONE, Public Library of Science, vol. 14(4), pages 1-20, April.
    2. Carol Nash, 2020. "Report on Digital Literacy in Academic Meetings during the 2020 COVID-19 Lockdown," Challenges, MDPI, vol. 11(2), pages 1-24, September.
    3. Shengli Deng & Sudi Xia, 2020. "Mapping the interdisciplinarity in information behavior research: a quantitative study using diversity measure and co-occurrence analysis," Scientometrics, Springer;Akadémiai Kiadó, vol. 124(1), pages 489-513, July.
    4. Konrad, Kai A., 2020. "Attacking and defending multiple valuable secrets in a big data world," European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
    5. Ou, Carol & Zhang, Xiaowei & Angelopoulos, Spyros & Davison, Robert & Janse, Noury, 2022. "Security breaches and organization response strategy : Exploring consumers’ threat and coping appraisals," Other publications TiSEM 9ac0c2eb-87e8-4c1d-a0b0-c, Tilburg University, School of Economics and Management.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jinfst:v:69:y:2018:i:5:p:700-709. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.