{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:50:45Z","timestamp":1742993445341,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_44","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"640-655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sharing the \u2018Real Me\u2019 \u2013 How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook"],"prefix":"10.1007","author":[{"given":"Nina","family":"Gerber","sequence":"first","affiliation":[]},{"given":"Paul","family":"Gerber","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Hernando","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"44_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36\u201358. Springer, Heidelberg (2006). doi:10.1007\/11957454_3"},{"key":"44_CR2","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.chb.2010.03.018","volume":"26","author":"Y Amichai-Hamburger","year":"2010","unstructured":"Amichai-Hamburger, Y., Vinitzky, G.: Social network use and personality. Comput. Hum. Behav. 26, 1289\u20131295 (2010). doi:10.1016\/j.chb.2010.03.018","journal-title":"Comput. Hum. Behav."},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11948-013-9511-y","volume":"20","author":"I B\u00fcschel","year":"2014","unstructured":"B\u00fcschel, I., Mehdi, R., Cammilleri, A., Marzouki, Y., Elger, B.: Protecting human health and security in digital Europe: how to deal with the \u201cPrivacy Paradox\u201d. Sci. Eng. Ethics 20, 639\u2013658 (2014). doi:10.1007\/s11948-013-9511-y","journal-title":"Sci. Eng. Ethics"},{"key":"44_CR4","volume-title":"How to Win Friends and Influence People","author":"D Carnegie","year":"1936","unstructured":"Carnegie, D.: How to Win Friends and Influence People. Simon & Schuster, New York (1936)"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.chb.2009.09.003","volume":"26","author":"T Correa","year":"2010","unstructured":"Correa, T., Hinsley, A.W., de Z\u00fa\u00f1iga, H.G.: Who interacts on the Web? The intersection of users\u2019 personality and social media use. Comput. Hum. Behav. 26, 247\u2013253 (2010). doi:10.1016\/j.chb.2009.09.003","journal-title":"Comput. Hum. Behav."},{"key":"44_CR6","doi-asserted-by":"publisher","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J.C.M.C. 19, 83\u2013108 (2009). doi:10.1111\/j.1083-6101.2009.01494.x","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"44_CR7","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.chb.2014.03.010","volume":"35","author":"R De Wolf","year":"2014","unstructured":"De Wolf, R., Willaert, K., Pierson, J.: Managing privacy boundaries together: exploring individual and group privacy management strategies in Facebook. Comput. Hum. Behav. 35, 444\u2013454 (2014). doi:10.1016\/j.chb.2014.03.010","journal-title":"Comput. Hum. Behav."},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Dey, R., Jelveh, Z., Ross, K.: Facebook users have become much more private: a large-scale study. In: PerCom Workshops, pp. 346\u2013352. IEEE Computer Society (2012)","DOI":"10.1109\/PerComW.2012.6197508"},{"key":"44_CR9","unstructured":"Diefenbach, S., Lenz, E., Hassenzahl, M.: Handbuch proTACT Toolbox. Tools zur User Experience Gestaltung und Evaluation. http:\/\/germanupa.de\/events\/mensch-und-computer-2014\/tutorials\/experience-design-tools.html"},{"key":"44_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1108\/17505931011033551","volume":"4","author":"A Dunne","year":"2010","unstructured":"Dunne, A., Lawlor, M.A., Rowley, J.: Young people\u2019s use of online social networking sites \u2013 a uses and gratifications perspective. J. Res. Interact. Mark 4, 46\u201358 (2010). doi:10.1108\/17505931011033551","journal-title":"J. Res. Interact. Mark"},{"key":"44_CR11","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chb.2014.01.009","volume":"33","author":"Y Feng","year":"2014","unstructured":"Feng, Y., Xie, W.: Teens\u2019 concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153\u2013162 (2014). doi:10.1016\/j.chb.2014.01.009","journal-title":"Comput. Hum. Behav."},{"key":"44_CR12","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.intcom.2010.04.002","volume":"22","author":"M Hassenzahl","year":"2010","unstructured":"Hassenzahl, M., Diefenbach, S., G\u00f6ritz, A.: Needs, affect, and interactive products - facets of user experience. Interact. Comput. 22, 353\u2013362 (2010). doi:10.1016\/j.intcom.2010.04.002","journal-title":"Interact. Comput."},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.chb.2013.07.055","volume":"30","author":"EE Hollenbaugh","year":"2014","unstructured":"Hollenbaugh, E.E., Ferris, A.L.: Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50\u201358 (2014). doi:10.1016\/j.chb.2013.07.055","journal-title":"Comput. Hum. Behav."},{"key":"44_CR14","doi-asserted-by":"publisher","unstructured":"Joinson, A.N.: Looking at, looking up or keeping up with people? Motives and use of Facebook. In: SIGCHI, pp. 1027\u20131036. ACM Press, New York (2008). doi:10.1145\/1357054.1357213","DOI":"10.1145\/1357054.1357213"},{"key":"44_CR15","doi-asserted-by":"publisher","first-page":"164","DOI":"10.2307\/2094393","volume":"38","author":"E Katz","year":"1973","unstructured":"Katz, E., Gurevitch, M., Haas, H.: On the use of the mass media for important things. Am. Sociol. Rev. 38, 164\u2013181 (1973). doi:10.2307\/2094393","journal-title":"Am. Sociol. Rev."},{"key":"44_CR16","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017). doi:10.1016\/j.cose.2015.07.002","journal-title":"Comput. Secur."},{"key":"44_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","volume":"25","author":"H Krasnova","year":"2010","unstructured":"Krasnova, H., Spiekermann, S., Koroleva, K., Hildebrand, T.: Online social networks: why we disclose. J. Inform. Technol. 25, 109\u2013125 (2010). doi:10.1057\/jit.2010.6","journal-title":"J. Inform. Technol."},{"key":"44_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2014.10.051","volume":"43","author":"C Lang","year":"2015","unstructured":"Lang, C., Barton, H.: Just untag it: exploring the management of undesirable Facebook photos. Comput. Hum. Behav. 43, 147\u2013155 (2015). doi:10.1016\/j.chb.2014.10.051","journal-title":"Comput. Hum. Behav."},{"key":"44_CR19","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1016\/j.chb.2013.01.049","volume":"29","author":"E Litt","year":"2013","unstructured":"Litt, E.: Understanding social network site users\u2019 privacy tool use. Comput. Hum. Behav. 29, 1649\u20131656 (2013). doi:10.1016\/j.chb.2013.01.049","journal-title":"Comput. Hum. Behav."},{"key":"44_CR20","volume-title":"Privacy Management on Social Media Sites","author":"M Madden","year":"2012","unstructured":"Madden, M.: Privacy Management on Social Media Sites. Pew Research Center, Washington, D.C. (2012)"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.chb.2014.05.047","volume":"39","author":"PK Masur","year":"2014","unstructured":"Masur, P.K., Reinecke, L., Ziegele, M., Quiring, O.: The interplay of intrinsic need satisfaction and Facebook specific motives in explaining addictive behavior on Facebook. Comput. Hum. Behav. 39, 376\u2013386 (2014). doi:10.1016\/j.chb.2014.05.047","journal-title":"Comput. Hum. Behav."},{"key":"44_CR22","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1467-6494.1992.tb00970.x","volume":"60","author":"RR McCrae","year":"1992","unstructured":"McCrae, R.R., John, O.P.: An introduction to the five-factor model and its applications. J. Pers. 60, 175\u2013215 (1992). doi:10.1111\/j.1467-6494.1992.tb00970.x","journal-title":"J. Pers."},{"issue":"1","key":"44_CR23","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.chb.2011.09.009","volume":"28","author":"K Moore","year":"2012","unstructured":"Moore, K., McElroy, J.C.: The influence of personality on Facebook usage, wall postings, and regret. Comput. Hum. Behav. 28(1), 267\u2013274 (2012). doi:10.1016\/j.chb.2011.09.009","journal-title":"Comput. Hum. Behav."},{"key":"44_CR24","unstructured":"oFb - der onlineFragebogen. https:\/\/www.soscisurvey.de"},{"key":"44_CR25","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.chb.2015.02.065","volume":"49","author":"AN Peters","year":"2015","unstructured":"Peters, A.N., Winschiers-Theophilus, H., Mennecke, B.E.: Cultural influences on Facebook practices. Comput. Hum. Behav. 49, 259\u2013271 (2015). doi:10.1016\/j.chb.2015.02.065","journal-title":"Comput. Hum. Behav."},{"key":"44_CR26","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.jrp.2006.02.001","volume":"41","author":"B Rammstedt","year":"2007","unstructured":"Rammstedt, B., John, O.P.: Measuring personality in one minute or less: a 10-item short version of the Big Five Inventory in English and German. J. Res. Pers. 41, 203\u2013212 (2007). doi:10.1016\/j.jrp.2006.02.001","journal-title":"J. Res. Pers."},{"key":"44_CR27","doi-asserted-by":"publisher","unstructured":"Reinecke1, L., Vorderer, P., Knop, K.: Entertainment 2.0? The role of intrinsic and extrinsic need satisfaction for the enjoyment of Facebook Use. J. Comm. 64, 417\u201343 (2014). doi:10.1111\/jcom.12099","DOI":"10.1111\/jcom.12099"},{"key":"44_CR28","doi-asserted-by":"publisher","unstructured":"Ross, C., Orr, E.S., Sisic, M., Arseneault, J.M., Simmering, M.G., Orr, R.R.: Personality and motivations associated with Facebook use. Comput. Hum. Behav. 25, 578\u2013586 (2009). doi:10.1016\/j.chb.2008.12.024","DOI":"10.1016\/j.chb.2008.12.024"},{"key":"44_CR29","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/0003-066X.55.1.68","volume":"55","author":"RM Ryan","year":"2000","unstructured":"Ryan, R.M., Deci, E.L.: Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. Am. Psychol. 55, 68\u201378 (2000)","journal-title":"Am. Psychol."},{"key":"44_CR30","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1016\/j.chb.2011.02.004","volume":"27","author":"T Ryan","year":"2011","unstructured":"Ryan, T., Xenos, S.: Who uses Facebook? An investigation into the relationship between the Big 5, shyness, narcissism, loneliness, and Facebook usage. Comput. Hum. Behav. 27, 1658\u20131664 (2011). doi:10.1037\/0003-066X.55.1.68","journal-title":"Comput. Hum. Behav."},{"key":"44_CR31","doi-asserted-by":"publisher","unstructured":"Saleh, F., Jani, H., Marzouqi, M., Khajeh, N., Rajan, A.: Social networking by the youth in the UAE: a privacy paradox. In: CTIT 2011, pp. 28\u201331. IEEE, Dubai (2011). doi:10.1109\/CTIT.2011.6107957","DOI":"10.1109\/CTIT.2011.6107957"},{"key":"44_CR32","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1037\/0022-3514.80.2.325","volume":"80","author":"KM Sheldon","year":"2001","unstructured":"Sheldon, K.M., Elliot, A.J., Kim, Y., Kasser, T.: What is satisfying about satisfying events? Testing 10 candidate psychological needs. J. Pers. Soc. Psychol. 80, 325\u2013339 (2001). doi:10.1037\/0022-3514.80.2.325","journal-title":"J. Pers. Soc. Psychol."},{"key":"44_CR33","first-page":"39","volume":"23","author":"P Sheldon","year":"2008","unstructured":"Sheldon, P.: Student favorite: Facebook and motives for its use. Southwest. Mass. Commun. J. 23, 39\u201355 (2008)","journal-title":"Southwest. Mass. Commun. J."},{"key":"44_CR34","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1027\/1864-1105.20.2.67","volume":"20","author":"P Sheldon","year":"2008","unstructured":"Sheldon, P.: The relationship between unwillingness-to-communicate and students\u2019 Facebook use. J. Media Psychol. 20, 67\u201375 (2008). doi:10.1027\/1864-1105.20.2.67","journal-title":"J. Media Psychol."},{"key":"44_CR35","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.chb.2011.11.008","volume":"28","author":"W Special","year":"2012","unstructured":"Special, W., Li-Barber, K.: Self-disclosure and student satisfaction with Facebook. Comput. Hum. Behav. 28, 624\u2013630 (2012). doi:10.1016\/j.chb.2011.11.008","journal-title":"Comput. Hum. Behav."},{"key":"44_CR36","doi-asserted-by":"publisher","unstructured":"Staddon, J., Acquisti, A., LeFevre, K.: Self-reported social network behavior: accuracy predictors and implications for the privacy paradox. In: SOCIALCOM, pp. 295\u2013302. IEEE Press, Washington (2013). doi:10.1109\/SocialCom.2013.48","DOI":"10.1109\/SocialCom.2013.48"},{"key":"44_CR37","doi-asserted-by":"publisher","unstructured":"Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in Facebook. In: CHI 2014, pp. 1777\u20131786. ACM, New York (2010). doi:10.1145\/2556288.255699","DOI":"10.1145\/2556288.255699"},{"key":"44_CR38","doi-asserted-by":"publisher","unstructured":"Taddicken, M.: The \u2018Privacy Paradox\u2019 in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. J.C.M.C. 19, 248\u2013273 (2013). doi:10.1111\/jcc4.12052","DOI":"10.1111\/jcc4.12052"},{"key":"44_CR39","unstructured":"Utz, S., Kramer, N.C.: The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychol.: J. Psychosoc. Res. 3, Article no. 1 (2009)"},{"key":"44_CR40","doi-asserted-by":"publisher","unstructured":"Waters, S., Ackerman, J.: Exploring privacy management on Facebook: motivations and perceived consequences of voluntary disclosure. J.C.M.C. 17, 101\u2013115 (2011). doi:10.1111\/j.1083-6101.2011.01559.x","DOI":"10.1111\/j.1083-6101.2011.01559.x"},{"key":"44_CR41","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","volume":"6","author":"AL Young","year":"2013","unstructured":"Young, A.L., Quan-Haase, A.: Privacy protection strategies on Facebook. Inform. Commun. Soc. 6, 479\u2013500 (2013). doi:10.1080\/1369118X.2013.777757","journal-title":"Inform. Commun. Soc."},{"key":"44_CR42","unstructured":"Zephoria Internet Marketing: The Top 20 Valuable Facebook Statistics. https:\/\/zephoria.com\/top-15-valuable-facebook-statistics\/"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:03:53Z","timestamp":1625105033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}