Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory

페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로

  • Received : 2016.01.25
  • Accepted : 2016.02.29
  • Published : 2016.03.31


People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.


  1. 고준, 신선진, 김희웅 (2008), 온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과, 경영정보학연구, 제 18권, 제 1호, 117-144.
  2. 김유정 (2013), 소셜네트워크서비스 이용에 대한 비교 연구, 언론과학연구, 제 13권, 제 1호, 5-32.
  3. 디임씨미디어(DMCMedia) (2015.12), 2015 디지털 소비자 및 한국인의 디지털 라이프 스타일 분석 보고서.
  4. 마은정, 한상연, 배성주 (2013), SNS 상에서의 자기표현행위가 오프라인 대인관계 및 지속사용의도에 미치는 영향 분석 연구, 지식경영연구, 제 14권, 제 2호, 25-48.
  5. 박경자, 유일, 이윤희 (2014), 소셜네트워크서비스(SNS) 사용의 부정적 감정과 사용중단의도에 관한 연구, 지식경영연구, 제 15권, 제 2호, 89-106.
  6. 이서한, 이호, 김경규 (2014), 기업 내 SNS 가 지식 공유 행위에 미치는 영향에 대한 연구: 사회심리학적 관점을 중심으로, 지식경영연구, 제 15권, 제4호, 189-206.
  7. Acquisti, A., and Grossklags, J. (2005), Privacy and rationality in individual decision making, IEEE Security & Privacy, 3(1), 26-33.
  8. Ajzen, I. (1991), The theory of planned behavior, Organizational behavior and human decision processes, 50(2), 179-211.
  9. Alam, M.M., and Wagner, C. (2013), "Facebook Distress": A Model to Investigate Discontinuation of Social Networking Site Use, In Proceedings of the PACIS 2013, 179.
  10. Alashoor, T., and Baskerville, R. (2015), The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity, In Proceedings of the ICIS 2015.
  11. Back, M. D., Kufner, A. C., Dufner, M., Gerlach, T. M., Rauthmann, J. F., and Denissen, J. J. (2013), Narcissistic admiration a nd rivalry: Disentangling the bright and dark sides of narcissism, Journal of personality and social psychology, 105(6), 1013-1037.
  12. Baek, Y. M. (2014), Solving the privacy paradox: A counter-argument experimental approach, Computersin Human Behavior, (38), 33-42.
  13. Bagozzi, R. P., and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the academy of marketing science, 16(1), 74-94.
  14. Bandura, A. (1977), Self-efficacy: toward a unifying theory of behavioral change, Psychological review, 84(2), 191.
  15. Bandura, A. (1995), Exercise of personal and collective efficacy in changing societies, Selfefficacy in changing societies, 15, 334.
  16. Barnes, S. (2006), A privacy paradox: Social networking in the United States, First Monday 11(9), Retrieved from
  17. BBC. (2015, October 6), Facebook data transfers threatened by Safe Harbour ruling, BBC, Retrived from
  18. Belanger, F., and Crossler, R. E. (2011), Privacy in the digital age: a review of information privacy research in information systems, MIS quarterly, 35(4), 1017-1042.
  19. Best, S. J., Krueger, B. S., and Ladewig, J. (2006), Privacy in the information age, Public Opinion Quarterly, 70(3), 375-401.
  20. Bhattacherjee, A. (2001), Understanding in formation systems continuance: an expectation-confirmation model, MIS quarterly, 351-370.
  21. Boyd, D. (2008), Facebook's Privacy Trainwreck, Convergence: The International Journal of Research into New Media Technologies, 14(1), 13-20.
  22. Boyd, D. and Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication,13(1).
  23. Buffardi, L. E., and Campbell, W. K. (2008), Narcissism and social networking web sites, Personality and social psychology bulletin, 34(10), 1303-1314.
  24. Carpenter, C. J. (2012), Narcissism on Facebook: Self-promotional and antisocial behavior, Personality and individual differences, 52(4), 482-486.
  25. Cenfetelli, R. T. (2004), Inhibitors and enablers as dual factor concepts in technology usage, Journal of the Association for Information Systems, 5(11), 16.
  26. Cenfetelli, R. T., and Schwarz, A. (2011), Identifying and testing the inhibitors of technology usage intentions, Information Systems Research, 22(4), 808-823.
  27. Chatterjee S., and Hadi , A. S. (1999), Regression analysis by example (3rd ed.), New York: John Wiley & Sons.
  28. Chatterjee, S., and Hadi, A . S. (2006), Regression analysis by example (4th ed.), New York: John Wiley & Sons.
  29. Chen, R. (2013), Living a private life in public social networks: An exploration of member self-disclosure, Decision support systems, 55(3), 661-668.
  30. Cheng, T. E., Lam, D. Y., and Yeung, A. C. (2006), Adoption of internet banking: an empirical study in Hong Kong, Decision support systems, 42(3), 1558-1572.
  31. Chin, W. W. (1998), Issues and opinion on structural equation modeling, MIS Quarterly, 22(1), 7-16.
  32. Chiu, C. M., Hsu, M. H., and Wang, E. T. (2006), Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories, Decision support systems, 42(3), 1872-1888.
  33. Choi, C. F., and Jiang, Z. (2013), Trading Friendship for Value: A n Investigation of Collective Privacy Concerns in Social Application Usage, In Proceedings of the ICIS 2013, 81.
  34. Compeau, D. R., and Higgins, C. A. (1995), Computer self-efficacy: Development of a measure and initial test, MIS quarterly, 189-211.
  35. Culnan, M. J. (1993), "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use, MIS quarterly, 341-363.
  36. DeWall, C. N., Buffardi, L. E., Bonser, I., and Campbell, W. K. (2011), Narcissism and implicit attention seeking: Evidence from linguistic analyses of social networking and online presentation, Personality and Individual Differences, 51(1), 57-62.
  37. Di Capua, I. (2012), A literature review of research on Facebook use, Open Communication Journal, 6, 37-42.
  38. Dinev, T., and Hart, P. (2004), Internet privacy concerns and their antecedentsmeasurement validity and a regression model., Behaviour & Information Technology, 23(6), 413-422.
  39. Dinev, T., and Hart, P. (2005), Internet privacy concerns and social awareness as determinants of intention to transact, International Journal of Electronic Commerce, 10(2), 7-29.
  40. Dinev, T., and Hart, P. (2006), An extended privacy calculus model for e-commerce transactions, Information Systems Research, 17(1), 61-80.
  41. Dinev, T., Xu, H., and Smith, H. J. (2009, January), Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy, In System Sciences, 2009. HICSS' 09. 42nd Hawaii International Conference on (pp. 1-10). IEEE.
  42. Dwyer, C. (2007, January), Digital relationships in the" myspace" generation: Results from a qualitative study., In System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on (pp.19-19). IEEE.
  43. Dwyer, C., Hiltz, S., and Passerini, K. (2007), Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, In Proceedings of t he AMCIS 2007, 339.
  44. Eastlick, M. A., Lotz, S. L., and Warrington, P. (2006), Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment, Journal of Business Research, 59(8), 877-886.
  45. Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, 13(1), 210-230.
  46. Fornell, C ., and Larcker, D. F. (1981), Evaluating structural equation models with unobservable variables and measurement error, Journal of marketing research, 39-50.
  47. Gefen, D., Straub, D., and Boudreau, M. C. (2000), Structural equation modeling and regression: Guidelines for research practice, Communications of the association for information systems, 4(1), 7.
  48. Goffman, E. (1959), The presentation of self in everyday life, Garden City, NY: Anchor.
  49. Govani, T., and Pashley, H. (2005), Student awareness of the privacy implications when using Facebook, Presented at the "Privacy Poster Fair" at the Carnegie Mellon University School of Library and Information Science, 9.
  50. Gross, R., and Acquisti, A. (2005, November), Information revelation and privacy in online social networks, In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). ACM.
  51. Haferkamp, N., Eimler, S. C., Papadakis, A. M., and Kruck, J. V. (2012), Men are from Mars, women are from Venus? Examining gender differences in self-presentation on social networking sites, Cyberpsychology, Behavior, and Social Networking, 15(2), 91-98.
  52. Haines, R ., Street, M. D., and Haines, D. (2008), The inf luence of perceived importance of an ethical issue on moral judgment, moral obligation, and moral intent, Journal of Business Ethics, 81(2), 387-399.
  53. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998), Multivariate Data Analysis with Readings, (5th ed.). NY: Macmillan.
  54. Hair Jr, J. F., Sarstedt, M., Hopkins, L., and G. Kuppelwieser, V. (2014), Partial least squares structural equation modeling (PLS-SEM) An emerging tool in business research, European Business Review, 26(2), 106-121.
  55. Herzberg. F. (1966), Work and the nature of man (Chapter 6. pp. 71-91), New York: World Publishing.
  56. Herzberg, F. (1986), One more time: How do you motivate employees, New York: The Leader Manager, 433-448.
  57. Hess, T. J., Fuller, M., and Campbell, D. E. (2009), Designing interfaces with social presence: Using vividness and extraversion to create social recommendation agents, Journal of the Association for Information Systems, 10(12), 1.
  58. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010), Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry, Electronic commerce research and applications, 9(1), 50-60.
  59. Hogan, M. (2013), Facebook Data Storage Centers as the Archive's Underbelly, Television & New Media, 1527476413509415.
  60. Ives, B., and Olson, M. H. (1984), User involvement and MIS success: A review of research, Management science, 30(5), 586-603.
  61. Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. (2007), Social phishing, Communications of the ACM, 50(10), 94-100.
  62. Jung, E. J., McKnight, D. H., Jung, E., and Lankton, N. K. (2011), The Surprising Lack of Effect of Privacy Concerns on Intention to Use Online Social Networks, In AMCIS.
  63. Kim, H. W., Chan, H. C., and Kankanhalli, A. (2012), What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation, Information systems research, 23(4), 1232-1245.
  64. Kim, H. W., Zheng, J. R., and Gupta, S. (2011), Examining knowledge contribution from the perspective of an online identity in blogging communities, Computers in Human Behavior, 27(5), 1760-1770.
  65. Kontaxic, G., Polychronakis, M., and Markatos, E. P. (2011), SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms, In Information Security (pp. 197-212). Springer Berlin Heidelberg.
  66. Korolova, A., Motwani, R., Nabar, S. U., and Xu, Y. (2008, October), Link privacy in social networks, In Proceedings of the 17th ACM conference on Information and knowledge management (pp. 289-298). ACM.
  67. Kramer, N. C., and Haferkamp, N. (2011), Online self-presentation: Balancing privacy concerns and impression construction on social networking sites, In Privacy Online (pp. 127-141). Springer Berlin Heidelberg.
  68. Kramer, N. C ., and Winter, S. (2008), Impression management 2.0: The relationship of self-esteem, extraversion, self-efficacy, and self-presentation within social networking sites, Journal of Media Psychology, 20(3), 106-116.
  69. Krasnova, H., Gunther, O., Spiekermann, S., and Koroleva, K. (2009), Privacy concerns and identity in online social networks, Identity in the Information Society, 2(1), 39-63.
  70. Krasnova, H., Hildebrand, T., Gunther, O., Kovrigin, A., and Nowobilska, A. (2008), Why Participate in an Online Social Network? An Empirical Analysis, In ECIS (pp. 2124-2135).
  71. Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. (2010), Online social networks: why we disclose, Journal of Information Technology, 25(2), 109-125.
  72. Lang, C., and Barton, H. (2015), Just untag it: Exploring the management of undesirable Facebook photos, Computers in Human Behavior, 43, 147-155.
  73. Leary, M. R., and Kowalski, R. M. (1990), Impression management: A literature review and two-component model, Psychological bulletin, 107(1), 34.
  74. Lee, A. R., Son, S. M., and Kim, K. K. (2016), Information and communication technology overload and social networking service fatigue: A stress perspective, Computers in Human Behavior, 55, 51-61.
  75. Li, Y. (2004), Bolgging and Identity Construction: A Study on Blogging Continuance Intentions, In Twentieht Americas Conference on Information Systems.
  76. Lit t , E ., Spot tswood, E ., Bir n holt z , J., Hancock, J. T., Smith, M. E., and Reynolds, L. (2014, February), Awkward encounters of an other kind: collective self-presentation and face threat on facebook, In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (pp. 449-460). ACM.
  77. Lowry, P.B., Cao, J., and Everard, A. (2011), Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures, Journal of Management Information Systems, 27(4), 163-200.
  78. Madden, T. J., Ellen, P. S., and Ajzen, I. (1992), A comparison of the theory of planned behavior and the theory of reasoned action, Personality and social psychology Bulletin, 18(1), 3-9.
  79. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004), Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, 15(4), 336-355.
  80. McCullagh, K. (2008), Blogging: self presentation and privacy, Information & communications technology law, 17(1), 3-23.
  81. Mehdizadeh, S. (2010), Self-presentation 2.0: Narcissism and self-esteem on Facebook, Cyberpsychology, Behavior, and Social Networking, 13(4), 357-364.
  82. Nadkarni, A., and Hofmann, S. G. (2012), Why do people use Facebook?, Personality and individual differences, 52(3), 243-249.
  83. Nardi, B. A., Schiano, D. J., Gumbrecht, M., and Swartz, L. (2004), Why we blog, Communications of the ACM, 47(12), 41-46.
  84. Nunnally, J., (1978), Psychometric Theory, MacGraw-Hill: New York.
  85. Ong, E. Y., Ang, R. P., Ho, J. C., Lim, J. C., Goh, D. H., Lee, C. S., and Chua, A. Y. (2011), Narcissism, extraversion and adolescents' self-presentation on Facebook, Personality and Individual Differences, 50(2), 180-185.
  86. Park, N., and Lee, S. (2014), College Students' Motivations for Facebook Use and Psychological Outcomes, Journal of Broadcasting & Electronic Media, 58(4), 601-620.
  87. Pavlou, P. A. (2011), State of the information privacy literature: where are we now and where should we go?, MIS quarterly, 35(4), 977-988.
  88. Rader, E. (2014, July), Awareness of behavioral tracking and information privacy concern in facebook and google, In Proc. of Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA.
  89. Ringle, C . M., Wende, S., a nd Becker, J.-M. (2015), SmartPLS 3., Boenningstedt: SmartPLS GmbH,
  90. Schlenker, B. R., and Leary, M. R. (1982), Social anxiety and self-presentation: A conceptualization model, Psychological bulletin, 92(3), 641.
  91. Smith, H. J., Diney, T., and Xu, H. (2011), Information privacy research: an interdisciplinary review, MIS quarterly, 35(4), 989-1016.
  92. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996), Information privacy: measuring individuals' concerns about organizational practices, MIS quarterly, 167-196.
  93. Son, J. Y., and Kim, S. S. (2008), Internet users' information privacy-protective responses: A taxonomy and a nomological model, Mis Quarterly, 503-529.
  94. Statista. (2015), Number of monthly active Facebook users worldwide as of 3rd quarter 2015, Statista, Retrived from
  95. Steers, R. M., and Braunstein, D. N. (1976), A behaviorally-based measure of manifest needs in work settings, Journal of Vocational Behavior, 9(2), 251-266.
  96. Taddicken, M. (2014), The 'Privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of Self-Disclosure1, Journal of Computer-Mediated Communication, 19(2), 248-273.
  97. Techcrunch, (2015, Dec 3), With No European Safe Harbor, Facebook Faces Privacy Complaints On Multiple Fronts, Techcrunch, Retrived from
  98. Tran, X., and Ralston, L. (2006), Tourist preferences influence of unconscious needs, Annals of Tourism Research, 33(2), 424-441.
  100. Tufekci, Z. (2008), Can you see me now? Audience and disclosure regulation in online social network sites, Bulletin of Science, Technology & Society 28(1), 20-36.
  101. van Rompay, T. J., Krooshoop, J., Verhoeven, J. W., and Pruyn, A. T. (2012), With or without you: Interactive effects of retail density and need for affiliation on shopping pleasure and spending, Journal of business research, 65(8), 1126-1131.
  102. Venkatesh, V., Brown, S. A., Maruping, L. M., and Bala, H. (2008), Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation, Mis Quarterly, 483-502.
  103. Walther, J. B. (1996), Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction, Communication research, 23(1), 3-43.
  104. Wang, D., Xu, L., and Chan, H. C. (2008), Understanding users' continua nce of Facebook: The role of general and specific computer self-efficacy. In Proceedings of the ICIS 2008, 168.
  105. Wang, N., Xu, H., and Grossklags, J. (2011a, December), Third-party apps on Facebook: privacy and the illusion of control, In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (p. 4). ACM.
  106. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., and Cranor, L. F. (2011b, July), I regretted the minute I pressed share: A qualitative study of regrets on Facebook, In Proceedings of the Seventh Symposium on Usable Privacy and Security (p. 10). ACM.
  107. Wilson, R. E., Gosling, S. D., a nd Graham, L. T. (2012), A review of Facebook research in the social sciences, Perspectives on psychological science, 7(3), 203-220.
  108. Wu, K. W., Huang, S. Y., Yen, D. C., and Popova, I. (2012), The effect of online privacy policy on consumer privacy concern and trust, Computers in human behavior, 28(3), 889-897.
  109. Xu, H ., Dinev, T., Smith, H. J., and Hart, P. (2008), Examining the formation of individual's privacy concerns: toward an integrative view, In Proceedings of the ICIS 2008, 6.
  110. Yoo, Y. J. and Alavi, M. (2001), Media and Group Cohesion: Relative Inf luences on Social Presence, Task Participation, and Group Consensus, MIS Quarterly, 25(3), 371-390.
  111. Zhang, P., and Von Dran, G. M. (2000), Satisfiers and dissatisfiers: A two-factor model for website design and evaluation, Journal of the American society for information science, 51(14), 1253-1268.<::AID-ASI1039>3.0.CO;2-O
  112. Zhou, T., and Li, H. (2014), Understanding mobile SNS continuance usage in China from the perspectives of social inf luence and privacy concern, Computers in Human Behavior, 37, 283-289.
  113. Z latolas, L . N., Welzer, T., Hericko, M., and Holbl, M. (2015), Privacy antecedents for SNS self-disclosure: The case of Facebook, Computers in Human Behavior, 45, 158-167.