The Effects of Privacy Awareness, Security Concerns and Trust on Information Sharing in Social Media among Public University Students in Selangor
DOI:
https://doi.org/10.37134/ibej.Vol15.2.8.2022Keywords:
Privacy Awareness, Security Concerns, Trust, Information SharingAbstract
The purpose of this research was to investigate the effect privacy awareness as well as security concerns both on trust, privacy awareness, security concerns and further trust on information sharing then privacy awareness only on security concerns on platforms for social networking. A quantaitative approach was used in this research. 500 students from public universities who ranged in age of 18 to 29 were used as a selected sample for the data collection. A questionnaire as an instrument was used to obtain the actual data and the selection of respondents was made using the systematic street-intercept method. To analyse the data, descriptive analysis and covariance-based structural equation modeling (CB-SEM) were employed. Outcomes of the research revealed that privacy awareness (PA) significantly predicts security concerns (SC). A significant predictor of trust is shown to have both PA and SC. However, the effect of PA is positive, while SC is negative. Only PA and trust significantly affect the information sharing (IS), not SC. Trust is more likely to increase the willingness to share information, but the higher the SC, the less likely for the students to share information. In conclusion, to promote IS on social media platforms, trust should be built among the users. Despite that privacy awareness could reduce the willingness to share information, it plays a critical role to build trust. In implication, to win and secure the online users, the online service providers and sellers should overcome the trust and privacy issues.
Downloads
References
Aljohani M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users’ privacy setting & information disclosure. The Proceeding of 14th Australian Information Security Management Conference 67-75. https://doi.org/10.4225/75/58a693deee893
Almadhoun, N., Dominic, P., & Woon, F. (2011). Perceived Security, Privacy, and Trust concerns within Social Networking Sites. IEEE International Conference on Control System, Computing and Engineering. 426-431. https://doi.org/10.1109/iccsce.2011.6190564
Ampong, G., Mensah, A., Adu, A., Addae, J., Omoregie, O. K. & Ofori, K. S. (2018). Examining self-disclosure on social networking sites: A flow theory and privacy perspective. Behavioral Sciences. 8(6), 1-17. https://doi.org/10.3390/bs8060058
Bagozzi, R. P. & Yi, Y. 2012. Specification, Evaluation, and Interpretation of Structural Equation Models. Journal of the Academy of Marketing Science 40(1): 8-34. https://doi.org/10.1007/s11747-011-0278-x
Baruh, L., Secinti, E., Cemalcilar, Z. (2017). Online privacy concerns and privacy management: a meta-analytical review. J. Commun. 67, 26–53. https://doi.org/10.1111/jcom.12276
Beldad, A. D. (2015). Sharing to be sociable, posting to be popular: factors influencing non-static personal information disclosure on Facebook among young Dutch users. International Journal of Web Based Communities, 11(3/4), 357. https://doi.org/10.1504/ijwbc.2015.072132
Bernama. Malaysia ranks top 5 globally in mobile social penetration, highest in region. Retrieved January 31, 2019, from https://www.nst.com.my/lifestyle/bots/2019/01/456119/malaysia-ranks-top-5-globally-mobile-social-media-penetration-highest
Jai, T. M., & King, N. J. (2016). Privacy versus reward: Do loyalty programs increase consumers’ willingness to share personal information with third-party advertisers and data brokers? Journal of Retailing and Consumer Services, 28, 296–303. https://doi.org/10.1016/j.jretconser.2015.01.005
Bhattacherjee, A. 2012. Social Science Research: Principles, Methods, and Practices. 2nd edition. Zurich, Switzerland: Creative Commons Attribution
Cater, T. & Cater, B. 2010. Product and Relationship Quality Influence on Customer Commitment and Loyalty in B2b Manufacturing Relationships. Industrial Marketing Management 39(8): 1321-1333. https://doi.org/10.1016/j.indmarman.2010.02.006
Chiu, C.-M. & Wang, E. T. G. 2008. Understanding Web-Based Learning Continuance Intention: The Role of Subjective Task Value. Information & Management 45(3): 194-201. https://doi.org/10.1016/j.im.2008.02.003
Cho, H., Lee, J., Chung, S. (2010). Optimistic bias about online privacy risks: testing the moderating effects of perceived controllability and prior experience. Comput. Hum. Behav. 26 (5), 987–995. https://doi.org/10.1016/j.chb.2010.02.012
Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416. http://dx.doi.org/10.1177/1461444808101618
Clement, J (2020). Social media-Statistics & Facts. Retrieved from: https://www.statista.com/topics/1164/social-networks/
Dhami, A., Agarwal, N., Chakraborty, T., Singh, B. P., & Minj, J. (2013). Impact of trust, security and privacy concerns in social networking: An exploratory study to understand the pattern of information revelation in Facebook. Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013. 2, 465-469. http://dx.doi.org/10.1109/IAdCC.2013.6514270
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
Dwyer, C., Roxanne Hiltz, S., Passerini, K., & Roxanne, S. (2007) Trust and Privacy Concerns Within Social Networking Sites: A Comparison of Facebook and MySpace. AIS eLibrary. 12-31. http://aisel.aisnet.org/amcis2007/339
Fairbairn, W., & Kessler, A. (2015). Practical Advice for Selecting Sample Sizes. Dced, (May), 1–11. Available from: https://www.enterprise-development.org/wpcontent/uploads/Practical_advice_for_selecting_sample_sizes_May2015.pdf
Flavián, C. and Guinalíu, M. (2006) ‘Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site’, Industrial Management and Data Systems, Vol. 106, No. 5, pp.601–620. https://doi.org/10.1108/02635570610666403
Fogel, J., Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 153–160. https://doi.org/10.1016/j.chb.2008.08.006
Fornell, C. & Larcker, D. F. 1981. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research 18(1): 39-50. https://doi.org/10.2307/3151312
Gao, S., Mokhtarian, P. L. & Johnston, R. A. 2008. Nonnormality of Data in Structural Equation Models. Transportation Research Record: Journal of the Transportation Research Board 2082(1): 116-124. https://doi.org/10.3141/2082-14
Garson, G. D. 2012a. Structural Equation Modeling. Asheboro, NC USA: Statistical Associates Publishing
Garson, G. D. 2012b. Testing Statistical Assumptions. Asheboro, NC USA: Statistical Associates Publishing
Gaskin, J. 2012a. Common Method Bias. Gaskination's Statistics. http://youtube.com/Gaskination [20th December 2021]
Gaskin, J. 2012b. Confirmatory Factor Analysis. Gaskination's StatWiki. http://statwiki.kolobkreations.com [20th December 2021]
Gaskin, J. 2013. Data Screening. Gaskination's StatWiki. https://www.youtube.com/watch?v=1KuM5e0aFgU [December 20, 2021]
Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: Database Adv. Inf. Syst. 33, 38–53. https://doi.org/10.1145/569905.569910
Gouldner, A.W., (1960). The norm of reciprocity: a preliminary statement, Am. Sociol. Rev. 25 (2) 161–178. https://doi.org/10.2307/2092623
Grazioli S. & Jarvenpaa, S.L. (2000). Perlis of Internet Fraud: An Empirical Investigation of Deception and Trust with Internet Consumers. Systems and Humans, 30(4), 395-410. https://doi.org/10.1109/3468.852434
Gupta, A., & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites. Journal of Direct, Data and Digital Marketing Practice. 17(1), 43-53. https://doi.org/10.1057/dddmp.2015.32
Hair, J. F., Black, W. C., Babin, B. J. & Anderson, R. E. 2010. Multivariate Data Analysis: A Global Perspective. 7th edition. Upper Saddle River, New Jersey: Pearson Education Inc
Hair, J. F., Sarstedt, M., Ringle, C. M. & Mena, J. A. 2012. An Assessment of the Use of Partial Least Squares Structural Equation Modeling in Marketing Research. Journal of the Academy of Marketing Science 40(3): 414-433. https://doi.org/10.1007/s11747-011-0261-6
Hall, H., Widén, G., & Paterson, L. (2010). Not what you know, nor who you know, but who you know already: Examining online information sharing behaviours in a blogging environment through the lens of social exchange theory. Libri. 60(2), 117-128. https://doi.org/10.1515/libr.2010.011
Haris@Harib, A. R., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9). https://doi.org/10.6007/ijarbss/v7-i9/3335
Hertzog, M. A. 2008. Considerations in Determining Sample Size for Pilot Studies. Research in Nursing & Health 31(2): 180–191. https://doi.org/10.1002/nur.20247
Hoadley, C.M.; Xu, H.; Lee, J.J.; Rosson, M.B. (2010). Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9, 50–60. https://doi.org/10.1016/j.elerap.2009.05.001
Homans, G. (1961). Social Behavior. New York: Harcourt, Brace & World
Jarvenpaa, S., Leidner, D. (1998). Communication and trust in global virtual teams. Journal of Computer-Mediated Communication 3 (4). https://doi.org/10.1111/j.1083-6101.1998.tb00080.x
JithiKrishna P P, Suresh Kumar R and Sreejesh V K, (2015). Impact of trust, privacy and security in Facebook information. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 4(6), 5–9. Retrieved from: https://ijettcs.org/pabstract_Share.php?pid=IJETTCS-2015-10-29-7
Joe, M. (2014). A Survey of Various Security Issues in Online Social Networks. International Journal of Computer Networks and Applications. 1(1), 11-14. Available from: https://www.academia.edu/10360339/A_Survey_of_Various_Security_Issues_in_Online_Social_Networks
Kayes, I., Kourtellis, N., Bonchi, F., & Iamnitchi, A. (2015). Privacy concerns vs. user behavior in community question answering. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. 681-688. https://doi.org/10.1145/2808797.2809422
Kisekka, V.; Bagchi-Sen, S.; Rao, H.R. (2013). Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users. Comput. Hum. Behav. 29, 2722–2729. https://doi.org/10.1016/j.chb.2013.07.023
Kline, R. B. 2011. Principles and Practice of Structural Equation Modeling. 3rd edition. New York: The Guilford Press
Kolotylo-Kulkarni, M., Xia, W., & Dhillon, G. (2021). Information disclosure in e-commerce: A systematic review and agenda for future research. Journal of Business Research, 126, 221-238. https://doi.org/10.1016/j.jbusres.2020.12.006
Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. https://doi.org/10.1057/jit.2010.6
Krejcie, R.V. & Morgan, D.W. (1970). Determining sample size for research activities. Educational & Psychological Measurement, 30, 607-610. https://doi.org/10.1177/001316447003000308
Malaysian Communications and Multimedia Commission. (2017). Section 3: Main Findings. Internet Users Survey 2017, 8–34. Retrieved from http://search.proquest.com/docview/1477205997?accountid=14744%5Cnhttp://fama.us.es/search*spi/i?SEARCH=18434711%5Cnhttp://pibserver.us.es/gtb/usuario_acceso.php?centro=$USEG¢ro=%24USEG&d=1
Malhotra N.K. (2002). Marketing Research: An Applied Orientation (4th Eds). United State, MA: Pearson Education, Inc
McKnight, D.H.; Lankton, N.; Tripp, J. (2011). Social Networking Information Disclosure and Continuance Intention: A Disconnect. In Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), Washington, DC, USA, 4–7, pp. 1–10. https://doi.org/10.1109/HICSS.2011.379
Ministry of Education, M. (2019). Educational Planning and Research Division Ministry Of Education Malaysia With Best Compliments. Available from: https://www.moe.gov.my/menumedia/media-cetak/penerbitan/quick-facts/2722-quick-facts-2019/file
Mohd Azul Mohamad Salleh, Ali Salman & Nurul Madiha Mohd Ilham (2015). Kesedaran Terhadap Isu Pengawasan Sewaktu Mengguna Aplikasi Media Sosial. Journal of Social Science and Humanities, 10(2), 217-229. Retrieved from http://ejournal.ukm.my/ebangi/article/view/11259/3646
O’Bien, D.; Torres, A. (2012). Social Networking and Online Privacy: Facebook Users’ Perceptions. Ir. J. Manag. 31, 63–97. Available from: https://aran.library.nuigalway.ie/handle/10379/4059
Padyab, A., Päivärinta, T., Ståhlbröst, A., Bergvall. K & Birgitta (2019). Awareness of Indirect Information Disclosure on Social Network Sites. SAGE Journals. 1-14. https://doi.org/10.1177/2056305118824199
Pallant, J. 2007. Spss Survival Manual: A Step-by-Step Guide to Data Analysis Using Spss for Windows. 3rd Edition. New York: Open University Press
Paramarta, V., Jihad, M., Dharma, A., Hapsari, I. C., Sandhyaduhita, P. I., Hidayanto, & Achmad, N. (2019). Impact of user awareness, trust, and privacy concerns on sharing personal information on social media: Facebook, twitter, and Instagram. 2018 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2018. 271-276. https://doi.org/10.1109/ICACSIS.2018.8618220
Perrin, A. (2015). Social Media Usage: 2005-2015, (October), 2005–2015. Retrieved from: www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/.
Petronio, S. (2004). Boundary of Privacy: Dialectics of Disclosure; State University of New York Press: Albany, NY, USA
Petronio, S.; Hernandez, R. (2019). Communication Privacy Management Theory. https://doi.org/10.1093/acrefore/9780190228613.013.373
Podsakoff, P. M., Mackenzie, S. B. & Podsakoff, N. P. 2012. Sources of Method Bias in Social Science Research and Recommendations on How to Control It. Annual Review of Psychology 63(1): 539-569. https://doi.org/10.1146/annurev-psych-120710-100452
Podsakoff, P. M., Mackenzie, S. B., Lee, J.-Y. & Podsakoff, N. P. 2003. Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies. Journal of applied psychology 88(5): 879- 903. https://doi.org/10.1037/0021-9010.88.5.879
Ramayah, T., Lee, J. W. C. & Mohamad, O. 2010. Green Product Purchase Intention: Some Insights from a Developing Country. Resources, Conservation and Recycling 54(12): 1419-1427. https://doi.org/10.1016/j.resconrec.2010.06.007
Reddy, K. & Reddy, E. S. (2019). Integrated approach to detect spam in social media networks using hybrid features. International Journal of Electrical and Computer Engineering (IJECE). 9(1), 562. https://doi.org/10.11591/ijece.v9i1.pp562-569
Reisinger, Y. & Mavondo, F. 2007. Structural Equation Modeling. Journal of Travel & Tourism Marketing 21(4): 41-71. https://doi.org/10.1300/J073v21n04_05
Saleh Zolait, A., Al-Anizi, R., Ababneh, S., BuAsalli, F. and Butaiba, N. (2014). User awareness of social media security: The public sector framework. International Journal of Business Information Systems. 17(3), 261-282. https://doi.org/10.1504/IJBIS.2014.064973
Saleh, Zakaria and Mashour, A. (2016). Evaluating Security Awareness Impact On Perceived Risk and Trust: The Case of Social Networks. International Journal in IT and Engineering, 4(5), 99–110. Available from: https://www.researchgate.net/publication/303700743_EVALUATING_SECURITY_AWARENESS_IMPACT_ON_PERCEIVED_RISK_AND_TRUST_THE_CASE_OF_SOCIAL_NETWORKS
Saunders, M., Lewis, P. & Thornhill, A. 2009. Research Methods for Business Students. 5th edition. Essex: Pearson Education Limited
Savolainen, R. (2017). Information sharing and knowledge sharing as communicative activities. Information Research, 22(3), 767. Available from: https://eric.ed.gov/?id=EJ1156371
Schumacker, R. E. & Lomax, R. G. 2004. A Beginner's Guide to Structural Equation Modeling. Second edition. Lawrence Erlbaum Associates
Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers. 22(5), 428-438. https://doi.org/10.1016/j.intcom.2010.05.001
Sriratanaviriyakul, N., Nkhoma, M., Felipe, A. L., Cao, T. K., Ha Tran, Q., Epworth, R., Shankaranarayanan, A, Quang, H. Le. (2017). ASEAN users’ privacy concerns and security in using online social networks. International Journal of Electronic Security and Digital Forensics, 9(1), 84–99. https://doi.org/10.1504/IJESDF.2017.081787
Surma, J. (2016). Social exchange in online social networks. the reciprocity phenomenon on Facebook. Computer Communications, 73, 342–346. https://doi.org/10.1016/j.comcom.2015.06.017
Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure? Computers in Human Behavior. 29(3), 821–826. https://doi.org/10.1016/j.chb.2012.11.022
Tuunainen V. K., Pitkanen, O. and Hovi, M. (2009). Users’ Awareness of Privacy on Online Social Networking Sites — Case Facebook. 22nd Bled eConference eEnablement: Facilitating an Open, Effective and Representative eSociety. https://aisel.aisnet.org/bled2009/42
Vemprala, N., & Dietrich, G. (2019). A Social Network Analysis (SNA) Study On Data Breach Concerns Over Social Media. Proceedings of the 52nd Hawaii International Conference on System Sciences, 6, 7186–7193. https://doi.org/10.24251/hicss.2019.862
Willoughby, M. (2018). A review of the risks associated with children and young people’s social media use and the implications for social work practice. Journal of Social Work Practice. 0533(5), 1-14. https://doi.org/10.1080/02650533.2018.1460587
Yuen Meikeng, Lim May Lee, & Clarissa Say, (2018). Our teens are bullies. Retrieved 18 March, 2018, from https://www.thestar.com.my/news/nation/2018/03/18/behaving-badly-in-cyberspace-malaysian-teens-more-likely-to-be-cyberbullies-than-victims-says-study
Zaefarian, G., Henneberg, S. C. & Naudé, P. 2013. Assessing the Strategic Fit between Business Strategies and Business Relationships in Knowledge- Intensive Business Services. Industrial Marketing Management 42(2): 260- 272. https://doi.org/10.1016/j.indmarman.2012.08.008
Zhang, Z., & Gupta, B.B. (2016). Social media security and trustworthiness: Overview and new direction. Future Generation Computer Systems, 86, 914- 925. https://doi.org/10.1016/j.future.2016.10.007
Zhou, T., Li, H. (2014). Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concerns. Comput. Hum. Behav. 37, 283–289. https://doi.org/10.1016/j.chb.2014.05.008
Zlatolas, L. N., Welzer, T., Heričko, M. & Hölbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior. 45, 158-167. https://doi.org/10.1016/j.chb.2014.12.012
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Anjuman Ara, Zuraidah Zainol, Balaganesh Duraisamy
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.