{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:45:13Z","timestamp":1776879913083,"version":"3.51.2"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T00:00:00Z","timestamp":1536105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10676-018-9480-6","type":"journal-article","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T08:12:25Z","timestamp":1536135145000},"page":"279-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Privacy perception and protection on Chinese social media: a case study of WeChat"],"prefix":"10.1007","volume":"20","author":[{"given":"Zhen Troy","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6711-9290","authenticated-orcid":false,"given":"Ming","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"issue":"2","key":"9480_CR1","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1177\/0973258616644808","volume":"11","author":"A Al-Kandari","year":"2016","unstructured":"Al-Kandari, A., Melkote, S. R., & Sharif, A. (2016). Needs and motives of Instagram users that predict self-disclosure use: A case study of young adults in Kuwait. Journal of Creative Communications, 11(2), 85\u2013101.","journal-title":"Journal of Creative Communications"},{"issue":"5","key":"9480_CR2","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1080\/08961530.2016.1189372","volume":"28","author":"YH Bae","year":"2016","unstructured":"Bae, Y. H., Jun, J. W., & Hough, M. (2016). Uses and gratifications of digital signage and relationships with user interface. Journal of International Consumer Marketing, 28(5), 323\u2013331.","journal-title":"Journal of International Consumer Marketing"},{"key":"9480_CR3","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2015.11.022","volume":"56","author":"M Bartsch","year":"2016","unstructured":"Bartsch, M., & Dienlin, T. (2016). Control your Facebook: An analysis of online privacy literacy. Computers in Human Behavior, 56, 147\u2013154.","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"9480_CR4","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1080\/1369118X.2016.1229001","volume":"20","author":"M B\u00fcchi","year":"2017","unstructured":"B\u00fcchi, M., Just, N., & Latzer, M. (2017). Caring is not enough: The importance of Internet skills for online privacy protection. Information, Communication & Society, 20(8), 1261\u20131278.","journal-title":"Information, Communication & Society"},{"issue":"4","key":"9480_CR37","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1287\/isre.2015.0602","volume":"26","author":"BC Choi","year":"2015","unstructured":"Choi, B. C., Jiang, Z., Xiao, B., & Kim, S. (2015). Embarrassing exposures in online social networks: An integrated perspective of privacy invasion and relationship bonding. Information Systems Research, 26(4), 675\u2013694.","journal-title":"Information Systems Research"},{"key":"9480_CR5","unstructured":"Clover, C. (2017). Overloaded China users battle \u2018WeChat fatigue\u2019. Financial Times. https:\/\/www.ft.com\/content\/51dfa598-0189-11e6-99cb-83242733f755 ."},{"issue":"1","key":"9480_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83\u2013108.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9480_CR7","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.chb.2016.02.040","volume":"59","author":"A Dhir","year":"2016","unstructured":"Dhir, A., Kaur, P., Chen, S., & Lonka, K. (2016). Understanding online regret experience in Facebook use\u2014effects of brand participation, accessibility and problematic use. Computers in Human Behavior, 59, 420\u2013430.","journal-title":"Computers in Human Behavior"},{"key":"9480_CR8","doi-asserted-by":"publisher","DOI":"10.1057\/9781137381040","volume-title":"Intercultural communication in the chinese workplace","author":"P Du","year":"2015","unstructured":"Du, P. (2015). Intercultural communication in the Chinese workplace. Basingstoke: Palgrave Macmillan."},{"key":"9480_CR9","doi-asserted-by":"crossref","unstructured":"Fei, X. (1992). From the soil, the foundations of Chinese society: A translation of Fei Xiaotong\u2019s Xiangtu Zhongguo (G. G. Hamilton & Z. Wang, Trans.). Berkeley: University of California Press.","DOI":"10.1525\/9780520912489"},{"key":"9480_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0065-2601(08)60317-2","volume":"23","author":"ST Fisk","year":"1990","unstructured":"Fisk, S. T., & Neuberg, S. L. (1990). A continuum of impression formation, from category-based to individuating processes: Influences of information and motivation on attention and interpretation. Advances in Experimental Social Psychology, 23, 1\u201374.","journal-title":"Advances in Experimental Social Psychology"},{"key":"9480_CR11","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.chb.2014.11.083","volume":"45","author":"J Fox","year":"2015","unstructured":"Fox, J., & Moreland, J. (2015). The dark side of social networking sites: An exploration of the relational and psychological stressors associated with Facebook use and affordances. Computers in Human Behavior, 45, 168\u2013176.","journal-title":"Computers in Human Behavior"},{"key":"9480_CR12","unstructured":"Fulco, M. (2017). The WeChat economy, from messaging to payment and more. Cheung Kong Graduate School of Business. http:\/\/knowledge.ckgsb.edu.cn\/2017\/08\/28\/mobile-commerce\/wechat-economy-messaging-wechat-pay\/ ."},{"issue":"2","key":"9480_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/10304312.2016.1265094","volume":"31","author":"JM Fulton","year":"2017","unstructured":"Fulton, J. M., & Kibby, M. D. (2017). Millennials and the normalization of surveillance on Facebook. Continuum-Journal of Media & Culture Studies, 31(2), 189\u2013199.","journal-title":"Continuum-Journal of Media & Culture Studies"},{"issue":"2","key":"9480_CR14","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1177\/1461444815605454","volume":"19","author":"P Hodkinson","year":"2017","unstructured":"Hodkinson, P. (2017). Bedrooms and beyond: Youth, identity and privacy on social network sites. New Media & Society, 19(2), 272\u2013288.","journal-title":"New Media & Society"},{"issue":"2","key":"9480_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1080\/15252019.2014.930678","volume":"14","author":"Y Jeong","year":"2014","unstructured":"Jeong, Y., & Coyle, E. (2014). What are you worrying about on Facebook and Twitter? An empirical investigation of young social network site users\u2019 privacy perceptions and behaviors. Journal of Interactive Advertising, 14(2), 51\u201359.","journal-title":"Journal of Interactive Advertising"},{"key":"9480_CR16","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.chb.2016.12.042","volume":"69","author":"Y Jeong","year":"2017","unstructured":"Jeong, Y., & Kim, Y. (2017). Privacy concerns on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior, 69, 302\u2013310.","journal-title":"Computers in Human Behavior"},{"key":"9480_CR17","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122\u2013134.","journal-title":"Computers & Security"},{"issue":"9","key":"9480_CR18","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1016\/j.ijhcs.2013.01.005","volume":"71","author":"H Lee","year":"2013","unstructured":"Lee, H., Park, H., & Kim, J. (2013). Why do people share their context information on social network services? A qualitative study and an experimental study on users\u2019 behavior of balancing perceived benefit and risk. International Journal of Human Computer Studies, 71(9), 862\u2013877.","journal-title":"International Journal of Human Computer Studies"},{"issue":"5","key":"9480_CR19","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1177\/1367877915595477","volume":"19","author":"HS Li","year":"2016","unstructured":"Li, H. S. (2016). Narrative dissidence, spoof videos and alternative memory in China. International Journal of Cultural Studies, 19(5), 501\u2013517.","journal-title":"International Journal of Cultural Studies"},{"issue":"5","key":"9480_CR20","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1080\/01463373.2014.949387","volume":"62","author":"RM McLaren","year":"2014","unstructured":"McLaren, R. M., Dillard, J. P., Tusing, K. J., & Solomon, D. H. (2014). Relational framing theory: Utterance form and relational context as antecedents of frame salience. Communication Quarterly, 62(5), 518\u2013535.","journal-title":"Communication Quarterly"},{"key":"9480_CR21","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-Lovin, L., & Cook, J. M. (2001). Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27, 415\u2013444.","journal-title":"Annual Review of Sociology"},{"issue":"2","key":"9480_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14763\/2014.2.283","volume":"3","author":"F Morando","year":"2014","unstructured":"Morando, F., Iemma, R., & Raiteri, E. (2014). Privacy evaluation: What empirical research on users\u2019 valuation of personal data tells us. Internet Policy Review, 3(2), 1\u201311.","journal-title":"Internet Policy Review"},{"issue":"1","key":"9480_CR23","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P. A., Horne, D., & Horne, D. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100\u2013126.","journal-title":"Journal of Consumer Affairs"},{"issue":"2","key":"9480_CR24","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1089\/cpb.2007.0056","volume":"11","author":"J Raacke","year":"2008","unstructured":"Raacke, J., & Bonds-Raacke, J. (2008). MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites. Cyberpsychology Behavior, 11(2), 169\u2013174.","journal-title":"Cyberpsychology Behavior"},{"issue":"4","key":"9480_CR25","first-page":"323","volume":"4","author":"J Rachels","year":"1975","unstructured":"Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323\u2013333.","journal-title":"Philosophy & Public Affairs"},{"issue":"2","key":"9480_CR26","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1093\/idpl\/ips036","volume":"3","author":"IS Rubinstein","year":"2013","unstructured":"Rubinstein, I. S. (2013). Big data: The end of privacy or a new beginning?\u00a0International Data Privacy Law, 3(2), 74\u201387.","journal-title":"International Data Privacy Law"},{"key":"9480_CR27","unstructured":"Smith, C. (2018). 110 amazing WeChat statistics and facts (January 2018). DMR. https:\/\/expandedramblings.com\/index.php\/wechat-statistics\/ ."},{"issue":"2","key":"9480_CR28","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals\u2019 concerns about organizational practices. MIS Quarterly, 20(2), 167\u2013196.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9480_CR29","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1111\/jcc4.12182","volume":"22","author":"EL Spottswood","year":"2017","unstructured":"Spottswood, E. L., & Hancock, J. T. (2017). Should I share that? Prompting social norms that influence privacy behaviors on a social networking site. Journal of Computer-Mediated Communication, 22(2), 55\u201370.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9480_CR30","volume-title":"Creator economy: A new era of the \u2018Internet+Cultural and Creative\u2019\u2014social reception, industry ecology and policy system","author":"Tengyun","year":"2017","unstructured":"Tengyun. (2017). Creator economy: A new era of the \u2018Internet\u2009+\u2009Cultural and Creative\u2019\u2014social reception, industry ecology and policy system. Beijing: Development Research Centre of the State Council, Tencent Social Research Centre."},{"issue":"8","key":"9480_CR31","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1080\/1369118X.2016.1220969","volume":"20","author":"MJ Walsh","year":"2017","unstructured":"Walsh, M. J., & Baker, S. A. (2017). The selfie and the transformation of the public\u2013private distinction. Information, Communication & Society, 20(8), 1185\u20131203.","journal-title":"Information, Communication & Society"},{"issue":"1","key":"9480_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1111\/j.1468-2958.2007.00312.x","volume":"34","author":"JB Walther","year":"2008","unstructured":"Walther, J. B., Van Der Heide, B., Kim, S. Y., Westerman, D., & Tong, S. T. (2008). The role of friends\u2019 appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?\u00a0Human Communication Research, 34(1), 28\u201349.","journal-title":"Human Communication Research"},{"issue":"1","key":"9480_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/1461444812472486","volume":"16","author":"C-C Yang","year":"2014","unstructured":"Yang, C.-C., Brown, B. B., & Braun, M. T. (2014). From Facebook to cell calls: Layers of electronic intimacy in college students\u2019 interpersonal relationships. New Media & Society, 16(1), 5\u201323.","journal-title":"New Media & Society"},{"issue":"4","key":"9480_CR34","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","volume":"16","author":"AL Young","year":"2013","unstructured":"Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479\u2013500.","journal-title":"Information, Communication & Society"},{"key":"9480_CR35","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.chb.2016.11.050","volume":"69","author":"B Zarouali","year":"2017","unstructured":"Zarouali, B., Ponnet, K., Walrave, M., & Poels, K. (2017). \u201cDo you like cookies?\u201d Adolescents\u2019 skeptical processing of retargeted Facebook-ads and the moderating role of privacy concern and a textual debriefing. Computers in Human Behavior, 69, 157\u2013165.","journal-title":"Computers in Human Behavior"},{"key":"9480_CR36","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"L Zlatolas","year":"2015","unstructured":"Zlatolas, L., Welzer, T., Hericko, M., & Holbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158\u2013167.","journal-title":"Computers in Human Behavior"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9480-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9480-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9480-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T23:17:40Z","timestamp":1604877460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9480-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,5]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9480"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9480-6","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,5]]},"assertion":[{"value":"5 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}