Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Facebook apps and tagging: The trade-off between personal privacy and engaging with friends

Published: 01 September 2015 Publication History

Abstract

The use of social network sites offers many potential social benefits, but also raises privacy concerns and challenges for users. The trade-off users have to make between using sites such as Facebook to connect with their friends versus protecting their personal privacy is not well understood. Furthermore, very little behavioral research has focused on how personal privacy concerns are related to information disclosures made by one's friends. Our survey study of 116 Facebook users shows that engaging with friends through tagging activity and third-party application use is associated with higher levels of personal Facebook usage and a stronger emotional attachment to Facebook. However, users who have high levels of personal privacy concern and perceive a lack of effectiveness in Facebook's privacy policies tend to engage less frequently in tagging and app activities with friends, respectively. Our model and results explore illustrate the complexity of the trade-off between privacy concerns, engaging with friends through tagging and apps, and Facebook usage.

References

[1]
Acquisti, A., &Gross, R. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook Vol. Volume 4258. Berlin/Heidelberg, Germany: Springer.
[2]
Altman, I. 1975. The environment and social behavior. Monterey, CA: Brooks/Cole.
[3]
Babbie, E. 2004. The practice of social research 10th ed. Belmont, CA: Wadsworth.
[4]
Ballam, D., &Fullwood, C. 2010. Fluidity of personal boundaries in online social media: implications for netiquette. Contemporary ergonomics and human factors 2010 pp. pp.391-399. London: Taylor Francis.
[5]
Barnes, S.B. 2006. A privacy paradox: Social networking in the United States. First Monday, 119.
[6]
Baumer, E., Adams, P., Khovanskaya, V., Liao, T., Smith, M., Sosik, V.S., Williams, K. 2013. Limiting, leaving, and relapsing: An exploratoration of Facebook non-use practices and experiences. Paper presented at the Conference on Human Factors in Computing Systems, Paris, France.
[7]
Besmer, A., &Lipford, H.R. 2010a. Moving beyond untagging: Photo privacy in a tagged world. Paper presented at the ACM Conference on Human Factors in Computing Systems, Atlanta, GA.
[8]
Besmer, A., &Lipford, H.R. 2010b. Users' misconceptions of social applications. Paper presented at the Proceedings of Graphics Interface, Ottawa, Ontario, Canada.
[9]
Blasiola, S. 2013. What friends are for: How network ties enable invasive third party applications on Facebook. Paper presented at the Measuring Networked Privacy Workshop at CSCW, San Antonio, TX.
[10]
Brenner, J. 2013. Pew Internet: Social networking full detail. Retrieved from "http://pewinternet.org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail.aspx"
[11]
Buchanan, T., Paine, C., Joinson, A.N., &Reips, U.D. 2007. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, Volume 58 Issue 2, pp.157-165.
[12]
Burke, M., Marlow, C., &Lento, T. 2010. Social network activity and social well-being. In Proceedings of the 28th International Conference on Human Factors in Computing Systems pp. pp.1909-1912. Atlanta, GA: ACM.
[13]
BusinessDictionary.com. 2013. Network effects. Retrieved from "http://www.businessdictionary.com/definition/network-effects.html"
[14]
Campbell, D.T., &Fiske, D.W. 1959. Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, Volume 56 Issue 1, pp.81-105.
[15]
Child, J.T., Pearson, J.C., &Petronio, S. 2009. Blogging, communication, and privacy management: Development of the blogging privacy management measure. Journal of the American Society for Information Science and Technology, Volume 60 Issue 10, pp.2079-2094.
[16]
Cohen, J. 1988. Statistical power analysis for the behavioral sciences 2nd ed. Hillsdale, MI: Erlbaum.
[17]
Cook, M., &Campbell, D.T. 1979. Quasi-experimentation: Design and analysis issues for field settings. Boston, MA: Houghton Mifflin.
[18]
Ellison, N.B., Steinfield, C., &Lampe, C. 2007. The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of Computer-Mediated Communication, Volume 12 Issue 4, pp.1143-1168.
[19]
Ellison, N.B., Steinfield, C., &Lampe, C. 2011. Connection strategies: Social capital implications of Facebook-enabled communication practices. New Media & Society, Volume 13 Issue 6, pp.873-892.
[20]
Ellison, N.B., Vitak, J., Steinfield, C., Gray, R., &Lampe, C. 2011. Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environments. In S.Trepte &L.Reinecke Eds, Privacy online pp. pp.19-32. Berlin Heidelberg: Springer-Verlag.
[21]
Facebook. 2013. Timeline. Retrieved from "http://newsroom.fb.com/Timeline"
[22]
Falk, R.F., &Miller, N.B. 1992. A primer for soft modeling. Akron, OH: University of Akron Press.
[23]
Faul, F., Erdfelder, E., Lang, A., &Buchner, A. 2007. G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, Volume 39 Issue 2, pp.175-191.
[24]
Fornell, C., &Larcker, D.F. 1981. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, Volume 18 Issue 2, pp.39-50.
[25]
Gefen, D., Rigdon, E., &Straub, W.D. 2011. An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly, Volume 35 Issue 2, pp.iii-iv.
[26]
Goldman, D. 2010. Facebook unveils new groups tool. Retrieved from "http://money.cnn.com/2010/10/06/technology/facebook_event/index.htm"
[27]
Hughes-Roberts, T. 2013, 8-14 Sept. 2013. Privacy and social networks: Is concern a valid indicator of intention and behaviour? Paper presented at the 2013 International Conference on Social Computing, Washington, DC.
[28]
King, J., Lampinen, A., &Smolen, A. 2011. Privacy: Is there an app for that? Paper presented at the Symposium On Usable Privacy and Security, Pittsburgh, PA.
[29]
Klemperer, P.F., Liang, Y., Mazurek, M.L., Sleeper, M., Ur, B., Bauer, L., etal. 2012. Tag, you can see it! Using tags for access control in photo sharing. Paper presented at CHI 2012, Austin, TX.
[30]
Krasnova, H., &Veltri, N.F. 2010, 5-8 Jan. 2010. Privacy calculus on social networking sites: Explorative evidence from Germany and USA. Paper presented at the 2010 43rd Hawaii International Conference on System Sciences HICSS, Koloa, Kauai, HI.
[31]
Lampinen, A., Lehtinen, V., Lehmuskallio, A., &Tamminen, S. 2011. We're in it together: Interpersonal management of disclosure in social network services. Paper presented at the Proceedings of the annual conference on Human factors in computing systems, Vancouver, BC, Canada.
[32]
Lipford, H.R., Wisniewski, P., Lampe, C., Kisselburgh, L., &Caine, K. 2012. Reconciling privacy and social media. Paper presented at the 2012 ACM Conference on Computer Supported Cooperative Work, Seattle, WA.
[33]
McDonald, J.H. 2009. Handbook of biological statistics 2nd ed. Baltimore: Sparky House.
[34]
Mukherjee, A., &Shih, G. 2013. FTC to scrutinize new Facebook facial recognition feature. Retrieved from "http://www.reuters.com/article/2013/09/12/net-us-facebook-privacy-idUSBRE98B01V20130912"
[35]
Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review, Volume 79 Issue 1, pp.119-158.
[36]
Nunnally, J.C. 1978. Psychometric theory 2nd ed. New York: McGraw-Hill.
[37]
Pesce, J.P., Casas, D.L., Rauber, G., &Almeida, V. 2012. Privacy attacks in social media using photo tagging networks: A case study with Facebook. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media pp. pp.1-8. Lyon, France: ACM.
[38]
Petronio, S. 2002. Boundaries of privacy: Dialectics of disclosure. Albany, NY: SUNY Press.
[39]
Schneier, B. 2010. A taxonomy of social networking data. Security & Privacy, IEEE, Volume 8 Issue 4, pp.88-88.
[40]
Smith, C. 2013. May 2013 update By the numbers: 32 amazing Facebook stats. Retrieved from "http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook-stats/"
[41]
Squicciarini, A.C., Xu, H., &Zhang, X.L. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, Volume 62 Issue 3, pp.521-534.
[42]
Staddon, J., Huffaker, D., &Sedley, A. 2012. Are privacy concerns a turn-off? Engagement and privacy in social networks. Paper presented at the Symposium on Usable Privacy and Security, Newcastle, United Kingdom.
[43]
Stern, T., &Kumar, N. 2014. Improving privacy settings control in online social networks with a wheel interface. Journal of the Association for Information Science and Technology, Volume 65 Issue 3, pp.524-538.
[44]
Stutzman, F., &Kramer-Duffield, J. 2010. Friends only: Examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems pp. pp.1553-1562. Atlanta, GA: ACM.
[45]
Stutzman, F., Gross, R., &Acquisti, A. 2012. Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality, Volume 4 Issue 2, pp.7-41.
[46]
Stutzman, F., Vitak, J., Ellison, N.B., Gray, R., &Lampe, C. 2012. Privacy in interaction: Exploring disclosure and social capital in Facebook. Paper presented at the Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, Dublin, Ireland.
[47]
Tufekci, Z. 2008. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, Volume 28 Issue 1, pp.20-36.
[48]
Walther, J.B., Van Der Heide, B., Kim, S.-Y., Westerman, D., &Tong, S.T. 2008. The role of friends' appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep? Human Communication Research, Volume 34 Issue 1, pp.28-49.
[49]
Wang, N., Xu, H., &Grossklags, J. 2011. Third-party apps on Facebook: Privacy and the illusion of control. Paper presented at the CHIMIT 2011, Boston, MA.
[50]
Wang, N., Grossklags, J., &Xu, H. 2013. An online experiment of privacy authorization dialogues for social applications. Paper presented at the Proceedings of the 2013 Conference on Computer Supported Cooperative Work and Social Computing, San Antonio, TX.
[51]
Williams, D. 2006. On and off the 'Net: Scales for social capital in an online era. Journal of Computer-Mediated Communication, Volume 11 Issue 2, pp.593-628.
[52]
Wisniewski, P. 2012. Understanding and designing for interactional privacy needs within social networking sites. Unpublished Dissertation, University of North Carolina at Charlotte, Charlotte, NC.
[53]
Wisniewski, P., Lipford, H.R., &Wilson, D.C. 2011. A new social order: Mechanisms for social network site boundary regulation. Paper presented at the Americas Conference on Information Systems, Detroit, MI.
[54]
Wisniewski, P., Lipford, H., &Wilson, D. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. Paper presented at the ACM Conference on Human Factors in Computing Systems, Austin, TX.
[55]
Xu, H., Dinev, T., Smith, H.J., &Hart, P. 2008. Examining the formation of individual's privacy concerns: Toward an integrative view. Paper presented at the Twenty-Ninth International Conference on Information Systems, Paris, France.
[56]
Xu, H., Dinev, T., Smith, H.J., &Hart, P. 2011. Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, Volume 12 Issue 12, pp.798-824.
[57]
Young, A.L., &Quan-Haase, A. 2009. Information revelation and internet privacy concerns on social network sites: A case study of Facebook. In Proceedings of the Fourth International Conference on Communities and Technologies pp. pp.265-274. University Park, PA: ACM.

Cited By

View all
  • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
  • (2022)Examining Co-Owners’ Privacy Consideration in Collaborative Photo SharingComputer Supported Cooperative Work10.1007/s10606-021-09421-431:1(79-109)Online publication date: 1-Mar-2022
  • (2022)“Not all my friends are friends”Journal of the Association for Information Science and Technology10.1002/asi.2458073:6(797-810)Online publication date: 26-Apr-2022
  • Show More Cited By
  1. Facebook apps and tagging: The trade-off between personal privacy and engaging with friends

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Journal of the Association for Information Science and Technology
      Journal of the Association for Information Science and Technology  Volume 66, Issue 9
      September 2015
      218 pages
      ISSN:2330-1635
      EISSN:2330-1643
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 01 September 2015

      Author Tags

      1. disclosure
      2. social networking
      3. user behavior

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
      • (2022)Examining Co-Owners’ Privacy Consideration in Collaborative Photo SharingComputer Supported Cooperative Work10.1007/s10606-021-09421-431:1(79-109)Online publication date: 1-Mar-2022
      • (2022)“Not all my friends are friends”Journal of the Association for Information Science and Technology10.1002/asi.2458073:6(797-810)Online publication date: 26-Apr-2022
      • (2021)“I thought you were okay”: Participatory Design with Young Adults to Fight Multiparty Privacy Conflicts in Online Social NetworksProceedings of the 2021 ACM Designing Interactive Systems Conference10.1145/3461778.3462040(104-124)Online publication date: 28-Jun-2021
      • (2021)When Forcing Collaboration is the Most Sensible ChoiceProceedings of the ACM on Human-Computer Interaction10.1145/34491275:CSCW1(1-36)Online publication date: 22-Apr-2021
      • (2021)Does This Photo Make Me Look Good?Proceedings of the ACM on Human-Computer Interaction10.1145/34491205:CSCW1(1-32)Online publication date: 22-Apr-2021
      • (2020)Engagement in proactive recommendationsJournal of Intelligent Information Systems10.1007/s10844-018-0529-054:1(79-100)Online publication date: 1-Feb-2020
      • (2019)Effects of Anonymity, Ephemerality, and System Routing on Cost in Social Question AskingProceedings of the ACM on Human-Computer Interaction10.1145/33611193:GROUP(1-21)Online publication date: 5-Dec-2019
      • (2019)Lack of the normative lensProceedings of the Association for Information Science and Technology10.1002/pra2.7456:1(450-453)Online publication date: 18-Oct-2019
      • (2019)The privacy paradox in the context of online social networkingJournal of the Association for Information Science and Technology10.1002/asi.2411370:3(207-217)Online publication date: 6-Feb-2019
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media