{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:57:09Z","timestamp":1725825429449},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203669"},{"type":"electronic","value":"9783319203676"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20367-6_19","type":"book-chapter","created":{"date-parts":[[2015,7,18]],"date-time":"2015-07-18T11:40:20Z","timestamp":1437219620000},"page":"185-195","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["It\u2019s Not About the Risks, I\u2019m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users"],"prefix":"10.1007","author":[{"given":"Ardion D.","family":"Beldad","sequence":"first","affiliation":[]},{"given":"Ruud","family":"Koehorst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","volume-title":"I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy","author":"L Andrews","year":"2012","unstructured":"Andrews, L.: I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. Free Press, New York (2012)"},{"issue":"2","key":"19_CR2","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","volume":"17","author":"F Belanger","year":"2008","unstructured":"Belanger, F., Carter, L.: Trust and risk in e-government adoption. J. Strateg. Inf. Syst. 17(2), 165\u2013176 (2008)","journal-title":"J. Strateg. Inf. Syst."},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1080\/01972243.2011.583802","volume":"27","author":"A Beldad","year":"2011","unstructured":"Beldad, A., De Jong, M., Steehouder, M.: A comprehensive theoretical framework for personal information-related behaviors on the internet. Inf. Soc. 27, 220\u2013232 (2011)","journal-title":"Inf. Soc."},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1016\/j.chb.2011.07.002","volume":"27","author":"A Beldad","year":"2011","unstructured":"Beldad, A., De Jong, M., Steehouder, M.: I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions. Comput. Hum. Behav. 27, 2233\u20132242 (2011)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/10447318.2011.572331","volume":"28","author":"A Beldad","year":"2012","unstructured":"Beldad, A., Van Der Geest, T., De Jong, M., Steehouder, M.: Shall I tell you where I live and who I am? Factors influencing the behavioral intention to disclose personal data for online government transactions. Int. J. Hum. Comput. Inter. 28(3), 163\u2013177 (2012)","journal-title":"Int. J. Hum. Comput. Inter."},{"issue":"11\u201312","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1080\/10447318.2010.516719","volume":"26","author":"PB Brandtzaeg","year":"2010","unstructured":"Brandtzaeg, P.B., L\u00fcdersa, M., Skjetnea, J.H.: Too many Facebook \u201cfriends\u201d? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum. Comput. Inter. 26(11\u201312), 1006\u20131030 (2010)","journal-title":"Int. J. Hum. Comput. Inter."},{"unstructured":"Central Bureau voor Statistiek: Zeven op de tien gebruiken sociale media (Seven in ten internet users active on social media) (2013). http:\/\/www.cbs.nl\/nl-NL\/menu\/themas\/vrije-tijd-cultuur\/publicaties\/artikelen\/archief\/2013\/2013\u20133907-wm.htm. Accessed 29 January 2015","key":"19_CR7"},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.dss.2009.12.006","volume":"49","author":"CMK Cheung","year":"2010","unstructured":"Cheung, C.M.K., Lee, M.K.O.: A theoretical model of intentional social action in online social networks. Decis. Support Syst. 49(1), 24\u201330 (2010)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"19_CR9","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1089\/cpb.2008.0226","volume":"12","author":"E Christofides","year":"2009","unstructured":"Christofides, E., Muise, A., Desmarais, S.: Information disclosure and control on Facebook: are they two sides of the same coin or two different processes. CyberPsychology Behav. 12(3), 341\u2013345 (2009)","journal-title":"CyberPsychology Behav."},{"issue":"1","key":"19_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1177\/1948550611408619","volume":"3","author":"E Christofides","year":"2012","unstructured":"Christofides, E., Muise, A., Desmarais, S.: Hey mom, what\u2019s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Soc. Psychol. and Pers. Sci. 3(1), 48\u201354 (2012)","journal-title":"Soc. Psychol. and Pers. Sci."},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10(1), 104\u2013115 (1999)","journal-title":"Organ. Sci."},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/17439884.2012.658404","volume":"38","author":"K Davis","year":"2012","unstructured":"Davis, K., James, C.: Tween\u2019s conceptions of privacy online: implications for educators. Learn. Media Technol. 38, 4\u201325 (2012)","journal-title":"Learn. Media Technol."},{"issue":"1","key":"19_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:JOBU.0000040274.23551.1b","volume":"19","author":"TK Das","year":"2004","unstructured":"Das, T.K., Teng, B.S.: The risk-based view of trust: a conceptual framework. J. Bus. Psychol. 19(1), 85\u2013116 (2004)","journal-title":"J. Bus. Psychol."},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for ecommerce transactions. Inf. Syst. Res. 17, 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"19_CR15","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BF01834709","volume":"11","author":"GC Elliott","year":"1982","unstructured":"Elliott, G.C.: Self-esteem and self-presentation among the young as a function of age and gender. J. Youth Adolesc. 11(2), 135\u2013153 (1982)","journal-title":"J. Youth Adolesc."},{"issue":"2","key":"19_CR16","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/j.1083-6101.2006.00020.x","volume":"11","author":"NB Ellison","year":"2006","unstructured":"Ellison, N.B., Heino, R., Gibbs, J.: Managing impressions online: self-presentation processes in the online dating environment. J. Comput. Mediated Commun. 11(2), 415\u2013441 (2006)","journal-title":"J. Comput. Mediated Commun."},{"unstructured":"Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of Facebook \u2018friends\u2019: Social capital and college students\u2019 use of online social network sites. J. Comput. Mediated Commun. 12(article1) (2007). http:\/\/jcmc.indiana.edu\/vol12\/issue4\/ellison.html","key":"19_CR17"},{"issue":"4","key":"19_CR18","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/3468.852434","volume":"30","author":"S Grazioli","year":"2000","unstructured":"Grazioli, S., Jarvenpaa, S.L.: Perils of internet fraud: an empirical investigation of deception and trust with experienced internet consumers. IEEE Trans. Syst. Man, Cybern. \u2013 Part A: Syst. Hum. 30(4), 395\u2013410 (2000)","journal-title":"IEEE Trans. Syst. Man, Cybern. \u2013 Part A: Syst. Hum."},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10705519909540118","volume":"6","author":"L Hu","year":"1999","unstructured":"Hu, L., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equ. Model. 6, 1\u201355 (1999)","journal-title":"Struct. Equ. Model."},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim, D.J., Ferrin, D.L., Rao, H.R.: A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decis. Support Syst. 44(2), 544\u2013564 (2008)","journal-title":"Decis. Support Syst."},{"key":"19_CR21","volume-title":"Principles and Practice of Structural Equation Modeling","author":"RB Kline","year":"2005","unstructured":"Kline, R.B.: Principles and Practice of Structural Equation Modeling, 2nd edn. The Guilford Press, New York (2005)","edition":"2"},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s12394-009-0019-1","volume":"2","author":"H Krasnova","year":"2009","unstructured":"Krasnova, H., G\u00fcnther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. IDIS 2, 39\u201363 (2009)","journal-title":"IDIS"},{"key":"19_CR23","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","volume":"25","author":"H Krasnova","year":"2010","unstructured":"Krasnova, H., Spiekermann, S., Koroleva, K., Hildebrand, T.: Online social networks: why we disclose. J. Inf. Tech. 25, 109\u2013125 (2010)","journal-title":"J. Inf. Tech."},{"issue":"4","key":"19_CR24","doi-asserted-by":"publisher","first-page":"967","DOI":"10.2307\/2578601","volume":"63","author":"JD Lewis","year":"1985","unstructured":"Lewis, J.D., Weigert, A.: Trust as a social reality. Soc. Forces 63(4), 967\u2013985 (1985)","journal-title":"Soc. Forces"},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/1461444808089415","volume":"10","author":"S Livingstone","year":"2008","unstructured":"Livingstone, S.: Taking risky opportunities in youthful content creation: teenagers\u2019 use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10, 393\u2013411 (2008)","journal-title":"New Media Soc."},{"key":"19_CR26","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15, 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"19_CR27","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organization trust. Acad. Manag. Rev. 20(3), 709\u2013734 (1995)","journal-title":"Acad. Manag. Rev."},{"unstructured":"Meztger, M.J.: Privacy, trust, and disclosure: Exploring barriers to electronic commerce. J. Comput. Mediated Commun. 9(4) (2004). http:\/\/jcmc.indiana.edu\/vol9\/issue4\/metzger.html","key":"19_CR28"},{"issue":"3","key":"19_CR29","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"JH Moor","year":"1997","unstructured":"Moor, J.H.: Towards a theory of privacy in the information age. Comput. Soc. 27(3), 27\u201332 (1997)","journal-title":"Comput. Soc."},{"key":"19_CR30","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2004","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41, 100\u2013126 (2004)","journal-title":"J. Consum. Aff."},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.chb.2009.11.012","volume":"26","author":"A Nosko","year":"2010","unstructured":"Nosko, A., Wood, E., Molema, S.: All about me: disclosure in online social networking profiles: the case of Facebook. Comput. Hum. Behav. 26, 406\u2013418 (2010)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"19_CR32","first-page":"101","volume":"17","author":"P Pavlou","year":"2003","unstructured":"Pavlou, P.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 17(3), 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commer."},{"key":"19_CR33","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"S Petronio","year":"2002","unstructured":"Petronio, S.: Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany (2002)"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1089\/cpb.2007.0056","volume":"11","author":"J Raacke","year":"2008","unstructured":"Raacke, J., Raacke, J.B.: MySpace and Facebook: applying the uses and gratifications theory to exploring friend-networking sites. CyberPsychology Behav. 11, 169\u2013174 (2008)","journal-title":"CyberPsychology Behav."},{"key":"19_CR35","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.paid.2006.09.017","volume":"42","author":"JH Steiger","year":"2007","unstructured":"Steiger, J.H.: Understanding the limitations of global fit assessment in structural equation modeling. Pers. Individ. Differ. 42, 893\u2013898 (2007)","journal-title":"Pers. Individ. Differ."},{"key":"19_CR36","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/0-387-28222-X_3","volume-title":"Privacy and Technologies of Identity: A Cross-Disciplinary Conversation","author":"KJ Strandburg","year":"2006","unstructured":"Strandburg, K.J.: Social norms self-control, and privacy in the online world. In: Strandburg, K.J., Raicu, D.S. (eds.) Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, pp. 31\u201353. Springer Science, New York (2006)"},{"doi-asserted-by":"crossref","unstructured":"Strater, K., Richter, H.: Examining privacy and disclosure in a social networking community. In: ACM International Conference Proceeding Series \u2013 Proceedings of the 3rd Symposium on Usable Privacy and Security 229, pp. 157\u2013 158 (2007)","key":"19_CR37","DOI":"10.1145\/1280680.1280706"},{"issue":"3","key":"19_CR38","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1016\/j.chb.2012.11.022","volume":"29","author":"S Taddei","year":"2013","unstructured":"Taddei, S., Contena, B.: Privacy, trust, and control: which relationships with online self-disclosure. Comput. Hum. Behav. 29(3), 821\u2013826 (2013)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"19_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1467-9973.2006.00474.x","volume":"38","author":"HT Tavani","year":"2007","unstructured":"Tavani, H.T.: Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy 38(1), 1\u201322 (2007)","journal-title":"Metaphilosophy"},{"key":"19_CR40","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1002\/9780470281819.ch6","volume-title":"The Handbook of Information and Computer ethics","author":"HT Tavani","year":"2008","unstructured":"Tavani, H.T.: Informational privacy: concepts, theories, and controversies. In: Himma, K.E., Tavani, H.T. (eds.) The Handbook of Information and Computer ethics, pp. 131\u2013164. Wiley Interscience, Hoboken (2008)"},{"key":"19_CR41","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1111\/j.1083-6101.2009.01474.x","volume":"14","author":"S Valenzuela","year":"2009","unstructured":"Valenzuela, S., Park, N., Kee, K.F.: Is there social capital in a social network site? Facebook use an college students\u2019 life satisfaction, trust, and participation. J. Comput. Mediated Commun. 14, 875\u2013901 (2009)","journal-title":"J. Comput. Mediated Commun."},{"key":"19_CR42","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1177\/0907568211406456","volume":"19","author":"S Vandoninck","year":"2011","unstructured":"Vandoninck, S., d\u2019Haenens, L., De Cock, R., Donoso, V.: Social networking sites and contact risks among Flemish youth. Childhood 19, 69\u201385 (2011)","journal-title":"Childhood"},{"issue":"6","key":"19_CR43","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1111\/j.1559-1816.2003.tb01951.x","volume":"33","author":"B Verplanken","year":"2003","unstructured":"Verplanken, B., Orbell, S.: Reflections on past behavior: a self-report index of habit strength. J. Appl. Soc. Psychol. 33(6), 1313\u20131330 (2003)","journal-title":"J. Appl. Soc. Psychol."},{"issue":"3","key":"19_CR44","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/101967802320245929","volume":"12","author":"M Warkentin","year":"2002","unstructured":"Warkentin, M., Gefen, D., Pavlou, P.A., Rose, G.M.: Encouraging citizen adoption of e-government by building trust. Electron. Markets 12(3), 157\u2013162 (2002)","journal-title":"Electron. Markets"},{"issue":"1","key":"19_CR45","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1111\/j.1083-6101.2011.01559.x","volume":"17","author":"S Waters","year":"2011","unstructured":"Waters, S., Ackerman, J.: Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure. J. Comput. Mediated Commun. 17(1), 101\u2013115 (2011)","journal-title":"J. Comput. Mediated Commun."},{"unstructured":"Woollaston, V.: The meteoric rise of social networking in the UK: britons are the second most prolific Facebook and Twitter users in Europe with a fifth of over 65\u00a0s now using these sites (2013). http:\/\/www.dailymail.co.uk\/sciencetech\/article-2340893\/Britons-second-prolific-Facebook-Twitter-users-EUROPE-fifth-aged-65.html","key":"19_CR46"},{"doi-asserted-by":"crossref","unstructured":"Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In: Proceedings of the International Conference on Communities and Technologies, pp. 265\u2013274 (2009)","key":"19_CR47","DOI":"10.1145\/1556460.1556499"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20367-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T05:30:36Z","timestamp":1691818236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20367-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203669","9783319203676"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20367-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}