Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory

페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로

  • Received : 2016.01.25
  • Accepted : 2016.02.29
  • Published : 2016.03.31

Abstract

People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.

Keywords

References

  1. 고준, 신선진, 김희웅 (2008), 온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과, 경영정보학연구, 제 18권, 제 1호, 117-144.
  2. 김유정 (2013), 소셜네트워크서비스 이용에 대한 비교 연구, 언론과학연구, 제 13권, 제 1호, 5-32.
  3. 디임씨미디어(DMCMedia) (2015.12), 2015 디지털 소비자 및 한국인의 디지털 라이프 스타일 분석 보고서.
  4. 마은정, 한상연, 배성주 (2013), SNS 상에서의 자기표현행위가 오프라인 대인관계 및 지속사용의도에 미치는 영향 분석 연구, 지식경영연구, 제 14권, 제 2호, 25-48.
  5. 박경자, 유일, 이윤희 (2014), 소셜네트워크서비스(SNS) 사용의 부정적 감정과 사용중단의도에 관한 연구, 지식경영연구, 제 15권, 제 2호, 89-106.
  6. 이서한, 이호, 김경규 (2014), 기업 내 SNS 가 지식 공유 행위에 미치는 영향에 대한 연구: 사회심리학적 관점을 중심으로, 지식경영연구, 제 15권, 제4호, 189-206. https://doi.org/10.15813/kmr.2014.15.4.010
  7. Acquisti, A., and Grossklags, J. (2005), Privacy and rationality in individual decision making, IEEE Security & Privacy, 3(1), 26-33.
  8. Ajzen, I. (1991), The theory of planned behavior, Organizational behavior and human decision processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  9. Alam, M.M., and Wagner, C. (2013), "Facebook Distress": A Model to Investigate Discontinuation of Social Networking Site Use, In Proceedings of the PACIS 2013, 179.
  10. Alashoor, T., and Baskerville, R. (2015), The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity, In Proceedings of the ICIS 2015.
  11. Back, M. D., Kufner, A. C., Dufner, M., Gerlach, T. M., Rauthmann, J. F., and Denissen, J. J. (2013), Narcissistic admiration a nd rivalry: Disentangling the bright and dark sides of narcissism, Journal of personality and social psychology, 105(6), 1013-1037. https://doi.org/10.1037/a0034431
  12. Baek, Y. M. (2014), Solving the privacy paradox: A counter-argument experimental approach, Computersin Human Behavior, (38), 33-42.
  13. Bagozzi, R. P., and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the academy of marketing science, 16(1), 74-94. https://doi.org/10.1007/BF02723327
  14. Bandura, A. (1977), Self-efficacy: toward a unifying theory of behavioral change, Psychological review, 84(2), 191. https://doi.org/10.1037/0033-295X.84.2.191
  15. Bandura, A. (1995), Exercise of personal and collective efficacy in changing societies, Selfefficacy in changing societies, 15, 334.
  16. Barnes, S. (2006), A privacy paradox: Social networking in the United States, First Monday 11(9), Retrieved from http://firstmonday.org/article/view/1394/1312
  17. BBC. (2015, October 6), Facebook data transfers threatened by Safe Harbour ruling, BBC, Retrived from http://www.bbc.com/news/technology-34442618
  18. Belanger, F., and Crossler, R. E. (2011), Privacy in the digital age: a review of information privacy research in information systems, MIS quarterly, 35(4), 1017-1042. https://doi.org/10.2307/41409971
  19. Best, S. J., Krueger, B. S., and Ladewig, J. (2006), Privacy in the information age, Public Opinion Quarterly, 70(3), 375-401. https://doi.org/10.1093/poq/nfl018
  20. Bhattacherjee, A. (2001), Understanding in formation systems continuance: an expectation-confirmation model, MIS quarterly, 351-370.
  21. Boyd, D. (2008), Facebook's Privacy Trainwreck, Convergence: The International Journal of Research into New Media Technologies, 14(1), 13-20. https://doi.org/10.1177/1354856507084416
  22. Boyd, D. and Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication,13(1).
  23. Buffardi, L. E., and Campbell, W. K. (2008), Narcissism and social networking web sites, Personality and social psychology bulletin, 34(10), 1303-1314. https://doi.org/10.1177/0146167208320061
  24. Carpenter, C. J. (2012), Narcissism on Facebook: Self-promotional and antisocial behavior, Personality and individual differences, 52(4), 482-486. https://doi.org/10.1016/j.paid.2011.11.011
  25. Cenfetelli, R. T. (2004), Inhibitors and enablers as dual factor concepts in technology usage, Journal of the Association for Information Systems, 5(11), 16.
  26. Cenfetelli, R. T., and Schwarz, A. (2011), Identifying and testing the inhibitors of technology usage intentions, Information Systems Research, 22(4), 808-823. https://doi.org/10.1287/isre.1100.0295
  27. Chatterjee S., and Hadi , A. S. (1999), Regression analysis by example (3rd ed.), New York: John Wiley & Sons.
  28. Chatterjee, S., and Hadi, A . S. (2006), Regression analysis by example (4th ed.), New York: John Wiley & Sons.
  29. Chen, R. (2013), Living a private life in public social networks: An exploration of member self-disclosure, Decision support systems, 55(3), 661-668. https://doi.org/10.1016/j.dss.2012.12.003
  30. Cheng, T. E., Lam, D. Y., and Yeung, A. C. (2006), Adoption of internet banking: an empirical study in Hong Kong, Decision support systems, 42(3), 1558-1572. https://doi.org/10.1016/j.dss.2006.01.002
  31. Chin, W. W. (1998), Issues and opinion on structural equation modeling, MIS Quarterly, 22(1), 7-16.
  32. Chiu, C. M., Hsu, M. H., and Wang, E. T. (2006), Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories, Decision support systems, 42(3), 1872-1888. https://doi.org/10.1016/j.dss.2006.04.001
  33. Choi, C. F., and Jiang, Z. (2013), Trading Friendship for Value: A n Investigation of Collective Privacy Concerns in Social Application Usage, In Proceedings of the ICIS 2013, 81.
  34. Compeau, D. R., and Higgins, C. A. (1995), Computer self-efficacy: Development of a measure and initial test, MIS quarterly, 189-211.
  35. Culnan, M. J. (1993), "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use, MIS quarterly, 341-363.
  36. DeWall, C. N., Buffardi, L. E., Bonser, I., and Campbell, W. K. (2011), Narcissism and implicit attention seeking: Evidence from linguistic analyses of social networking and online presentation, Personality and Individual Differences, 51(1), 57-62. https://doi.org/10.1016/j.paid.2011.03.011
  37. Di Capua, I. (2012), A literature review of research on Facebook use, Open Communication Journal, 6, 37-42. https://doi.org/10.2174/1874916X01206010037
  38. Dinev, T., and Hart, P. (2004), Internet privacy concerns and their antecedentsmeasurement validity and a regression model., Behaviour & Information Technology, 23(6), 413-422. https://doi.org/10.1080/01449290410001715723
  39. Dinev, T., and Hart, P. (2005), Internet privacy concerns and social awareness as determinants of intention to transact, International Journal of Electronic Commerce, 10(2), 7-29. https://doi.org/10.2753/JEC1086-4415100201
  40. Dinev, T., and Hart, P. (2006), An extended privacy calculus model for e-commerce transactions, Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
  41. Dinev, T., Xu, H., and Smith, H. J. (2009, January), Information privacy values, beliefs and attitudes: An empirical analysis of web 2.0 privacy, In System Sciences, 2009. HICSS' 09. 42nd Hawaii International Conference on (pp. 1-10). IEEE.
  42. Dwyer, C. (2007, January), Digital relationships in the" myspace" generation: Results from a qualitative study., In System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on (pp.19-19). IEEE.
  43. Dwyer, C., Hiltz, S., and Passerini, K. (2007), Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, In Proceedings of t he AMCIS 2007, 339.
  44. Eastlick, M. A., Lotz, S. L., and Warrington, P. (2006), Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment, Journal of Business Research, 59(8), 877-886. https://doi.org/10.1016/j.jbusres.2006.02.006
  45. Ellison, N. B. (2007), Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, 13(1), 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
  46. Fornell, C ., and Larcker, D. F. (1981), Evaluating structural equation models with unobservable variables and measurement error, Journal of marketing research, 39-50.
  47. Gefen, D., Straub, D., and Boudreau, M. C. (2000), Structural equation modeling and regression: Guidelines for research practice, Communications of the association for information systems, 4(1), 7.
  48. Goffman, E. (1959), The presentation of self in everyday life, Garden City, NY: Anchor.
  49. Govani, T., and Pashley, H. (2005), Student awareness of the privacy implications when using Facebook, Presented at the "Privacy Poster Fair" at the Carnegie Mellon University School of Library and Information Science, 9.
  50. Gross, R., and Acquisti, A. (2005, November), Information revelation and privacy in online social networks, In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). ACM.
  51. Haferkamp, N., Eimler, S. C., Papadakis, A. M., and Kruck, J. V. (2012), Men are from Mars, women are from Venus? Examining gender differences in self-presentation on social networking sites, Cyberpsychology, Behavior, and Social Networking, 15(2), 91-98. https://doi.org/10.1089/cyber.2011.0151
  52. Haines, R ., Street, M. D., and Haines, D. (2008), The inf luence of perceived importance of an ethical issue on moral judgment, moral obligation, and moral intent, Journal of Business Ethics, 81(2), 387-399. https://doi.org/10.1007/s10551-007-9502-5
  53. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998), Multivariate Data Analysis with Readings, (5th ed.). NY: Macmillan.
  54. Hair Jr, J. F., Sarstedt, M., Hopkins, L., and G. Kuppelwieser, V. (2014), Partial least squares structural equation modeling (PLS-SEM) An emerging tool in business research, European Business Review, 26(2), 106-121. https://doi.org/10.1108/EBR-10-2013-0128
  55. Herzberg. F. (1966), Work and the nature of man (Chapter 6. pp. 71-91), New York: World Publishing.
  56. Herzberg, F. (1986), One more time: How do you motivate employees, New York: The Leader Manager, 433-448.
  57. Hess, T. J., Fuller, M., and Campbell, D. E. (2009), Designing interfaces with social presence: Using vividness and extraversion to create social recommendation agents, Journal of the Association for Information Systems, 10(12), 1. https://doi.org/10.17705/1jais.00182
  58. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M. B. (2010), Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry, Electronic commerce research and applications, 9(1), 50-60. https://doi.org/10.1016/j.elerap.2009.05.001
  59. Hogan, M. (2013), Facebook Data Storage Centers as the Archive's Underbelly, Television & New Media, 1527476413509415.
  60. Ives, B., and Olson, M. H. (1984), User involvement and MIS success: A review of research, Management science, 30(5), 586-603. https://doi.org/10.1287/mnsc.30.5.586
  61. Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. (2007), Social phishing, Communications of the ACM, 50(10), 94-100. https://doi.org/10.1145/1290958.1290968
  62. Jung, E. J., McKnight, D. H., Jung, E., and Lankton, N. K. (2011), The Surprising Lack of Effect of Privacy Concerns on Intention to Use Online Social Networks, In AMCIS.
  63. Kim, H. W., Chan, H. C., and Kankanhalli, A. (2012), What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation, Information systems research, 23(4), 1232-1245. https://doi.org/10.1287/isre.1110.0411
  64. Kim, H. W., Zheng, J. R., and Gupta, S. (2011), Examining knowledge contribution from the perspective of an online identity in blogging communities, Computers in Human Behavior, 27(5), 1760-1770. https://doi.org/10.1016/j.chb.2011.03.003
  65. Kontaxic, G., Polychronakis, M., and Markatos, E. P. (2011), SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms, In Information Security (pp. 197-212). Springer Berlin Heidelberg.
  66. Korolova, A., Motwani, R., Nabar, S. U., and Xu, Y. (2008, October), Link privacy in social networks, In Proceedings of the 17th ACM conference on Information and knowledge management (pp. 289-298). ACM.
  67. Kramer, N. C., and Haferkamp, N. (2011), Online self-presentation: Balancing privacy concerns and impression construction on social networking sites, In Privacy Online (pp. 127-141). Springer Berlin Heidelberg.
  68. Kramer, N. C ., and Winter, S. (2008), Impression management 2.0: The relationship of self-esteem, extraversion, self-efficacy, and self-presentation within social networking sites, Journal of Media Psychology, 20(3), 106-116. https://doi.org/10.1027/1864-1105.20.3.106
  69. Krasnova, H., Gunther, O., Spiekermann, S., and Koroleva, K. (2009), Privacy concerns and identity in online social networks, Identity in the Information Society, 2(1), 39-63. https://doi.org/10.1007/s12394-009-0019-1
  70. Krasnova, H., Hildebrand, T., Gunther, O., Kovrigin, A., and Nowobilska, A. (2008), Why Participate in an Online Social Network? An Empirical Analysis, In ECIS (pp. 2124-2135).
  71. Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. (2010), Online social networks: why we disclose, Journal of Information Technology, 25(2), 109-125. https://doi.org/10.1057/jit.2010.6
  72. Lang, C., and Barton, H. (2015), Just untag it: Exploring the management of undesirable Facebook photos, Computers in Human Behavior, 43, 147-155. https://doi.org/10.1016/j.chb.2014.10.051
  73. Leary, M. R., and Kowalski, R. M. (1990), Impression management: A literature review and two-component model, Psychological bulletin, 107(1), 34. https://doi.org/10.1037/0033-2909.107.1.34
  74. Lee, A. R., Son, S. M., and Kim, K. K. (2016), Information and communication technology overload and social networking service fatigue: A stress perspective, Computers in Human Behavior, 55, 51-61. https://doi.org/10.1016/j.chb.2015.08.011
  75. Li, Y. (2004), Bolgging and Identity Construction: A Study on Blogging Continuance Intentions, In Twentieht Americas Conference on Information Systems.
  76. Lit t , E ., Spot tswood, E ., Bir n holt z , J., Hancock, J. T., Smith, M. E., and Reynolds, L. (2014, February), Awkward encounters of an other kind: collective self-presentation and face threat on facebook, In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (pp. 449-460). ACM.
  77. Lowry, P.B., Cao, J., and Everard, A. (2011), Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures, Journal of Management Information Systems, 27(4), 163-200. https://doi.org/10.2753/MIS0742-1222270406
  78. Madden, T. J., Ellen, P. S., and Ajzen, I. (1992), A comparison of the theory of planned behavior and the theory of reasoned action, Personality and social psychology Bulletin, 18(1), 3-9. https://doi.org/10.1177/0146167292181001
  79. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004), Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
  80. McCullagh, K. (2008), Blogging: self presentation and privacy, Information & communications technology law, 17(1), 3-23. https://doi.org/10.1080/13600830801886984
  81. Mehdizadeh, S. (2010), Self-presentation 2.0: Narcissism and self-esteem on Facebook, Cyberpsychology, Behavior, and Social Networking, 13(4), 357-364. https://doi.org/10.1089/cyber.2009.0257
  82. Nadkarni, A., and Hofmann, S. G. (2012), Why do people use Facebook?, Personality and individual differences, 52(3), 243-249. https://doi.org/10.1016/j.paid.2011.11.007
  83. Nardi, B. A., Schiano, D. J., Gumbrecht, M., and Swartz, L. (2004), Why we blog, Communications of the ACM, 47(12), 41-46. https://doi.org/10.1145/1035134.1035163
  84. Nunnally, J., (1978), Psychometric Theory, MacGraw-Hill: New York.
  85. Ong, E. Y., Ang, R. P., Ho, J. C., Lim, J. C., Goh, D. H., Lee, C. S., and Chua, A. Y. (2011), Narcissism, extraversion and adolescents' self-presentation on Facebook, Personality and Individual Differences, 50(2), 180-185. https://doi.org/10.1016/j.paid.2010.09.022
  86. Park, N., and Lee, S. (2014), College Students' Motivations for Facebook Use and Psychological Outcomes, Journal of Broadcasting & Electronic Media, 58(4), 601-620. https://doi.org/10.1080/08838151.2014.966355
  87. Pavlou, P. A. (2011), State of the information privacy literature: where are we now and where should we go?, MIS quarterly, 35(4), 977-988. https://doi.org/10.2307/41409969
  88. Rader, E. (2014, July), Awareness of behavioral tracking and information privacy concern in facebook and google, In Proc. of Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA.
  89. Ringle, C . M., Wende, S., a nd Becker, J.-M. (2015), SmartPLS 3., Boenningstedt: SmartPLS GmbH, http://www.smartpls.com.
  90. Schlenker, B. R., and Leary, M. R. (1982), Social anxiety and self-presentation: A conceptualization model, Psychological bulletin, 92(3), 641. https://doi.org/10.1037/0033-2909.92.3.641
  91. Smith, H. J., Diney, T., and Xu, H. (2011), Information privacy research: an interdisciplinary review, MIS quarterly, 35(4), 989-1016. https://doi.org/10.2307/41409970
  92. Smith, H. J., Milberg, S. J., and Burke, S. J. (1996), Information privacy: measuring individuals' concerns about organizational practices, MIS quarterly, 167-196.
  93. Son, J. Y., and Kim, S. S. (2008), Internet users' information privacy-protective responses: A taxonomy and a nomological model, Mis Quarterly, 503-529.
  94. Statista. (2015), Number of monthly active Facebook users worldwide as of 3rd quarter 2015, Statista, Retrived from http://www.statista.com/statistics/264810/number-ofmonthly-active-facebook-users-worldwide/
  95. Steers, R. M., and Braunstein, D. N. (1976), A behaviorally-based measure of manifest needs in work settings, Journal of Vocational Behavior, 9(2), 251-266. https://doi.org/10.1016/0001-8791(76)90083-X
  96. Taddicken, M. (2014), The 'Privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of Self-Disclosure1, Journal of Computer-Mediated Communication, 19(2), 248-273.
  97. Techcrunch, (2015, Dec 3), With No European Safe Harbor, Facebook Faces Privacy Complaints On Multiple Fronts, Techcrunch, Retrived from http://techcrunch.com/2015/12/03/schrems-steps-up-mass-surveillance-fight-against-facebook/
  98. Tran, X., and Ralston, L. (2006), Tourist preferences influence of unconscious needs, Annals of Tourism Research, 33(2), 424-441. https://doi.org/10.1016/j.annals.2005.10.014
  99. Tschersich, M., and Botha, R. (2014), EXPLORING THE IMPACT OF RESTRICTIVE DEFAULT PRIVACY SETTINGS ON THE PRIVACY CALCULUS ON SOCIAL NETWORK SITES, In Proceedings of ECIS 2014.
  100. Tufekci, Z. (2008), Can you see me now? Audience and disclosure regulation in online social network sites, Bulletin of Science, Technology & Society 28(1), 20-36. https://doi.org/10.1177/0270467607311484
  101. van Rompay, T. J., Krooshoop, J., Verhoeven, J. W., and Pruyn, A. T. (2012), With or without you: Interactive effects of retail density and need for affiliation on shopping pleasure and spending, Journal of business research, 65(8), 1126-1131. https://doi.org/10.1016/j.jbusres.2011.08.005
  102. Venkatesh, V., Brown, S. A., Maruping, L. M., and Bala, H. (2008), Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation, Mis Quarterly, 483-502.
  103. Walther, J. B. (1996), Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction, Communication research, 23(1), 3-43. https://doi.org/10.1177/009365096023001001
  104. Wang, D., Xu, L., and Chan, H. C. (2008), Understanding users' continua nce of Facebook: The role of general and specific computer self-efficacy. In Proceedings of the ICIS 2008, 168.
  105. Wang, N., Xu, H., and Grossklags, J. (2011a, December), Third-party apps on Facebook: privacy and the illusion of control, In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (p. 4). ACM.
  106. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., and Cranor, L. F. (2011b, July), I regretted the minute I pressed share: A qualitative study of regrets on Facebook, In Proceedings of the Seventh Symposium on Usable Privacy and Security (p. 10). ACM.
  107. Wilson, R. E., Gosling, S. D., a nd Graham, L. T. (2012), A review of Facebook research in the social sciences, Perspectives on psychological science, 7(3), 203-220. https://doi.org/10.1177/1745691612442904
  108. Wu, K. W., Huang, S. Y., Yen, D. C., and Popova, I. (2012), The effect of online privacy policy on consumer privacy concern and trust, Computers in human behavior, 28(3), 889-897. https://doi.org/10.1016/j.chb.2011.12.008
  109. Xu, H ., Dinev, T., Smith, H. J., and Hart, P. (2008), Examining the formation of individual's privacy concerns: toward an integrative view, In Proceedings of the ICIS 2008, 6.
  110. Yoo, Y. J. and Alavi, M. (2001), Media and Group Cohesion: Relative Inf luences on Social Presence, Task Participation, and Group Consensus, MIS Quarterly, 25(3), 371-390. https://doi.org/10.2307/3250922
  111. Zhang, P., and Von Dran, G. M. (2000), Satisfiers and dissatisfiers: A two-factor model for website design and evaluation, Journal of the American society for information science, 51(14), 1253-1268. https://doi.org/10.1002/1097-4571(2000)9999:9999<::AID-ASI1039>3.0.CO;2-O
  112. Zhou, T., and Li, H. (2014), Understanding mobile SNS continuance usage in China from the perspectives of social inf luence and privacy concern, Computers in Human Behavior, 37, 283-289. https://doi.org/10.1016/j.chb.2014.05.008
  113. Z latolas, L . N., Welzer, T., Hericko, M., and Holbl, M. (2015), Privacy antecedents for SNS self-disclosure: The case of Facebook, Computers in Human Behavior, 45, 158-167. https://doi.org/10.1016/j.chb.2014.12.012